{"language":[{"iso":"eng"}],"ddc":["000"],"file":[{"file_name":"Conference Version.pdf","file_id":"6311","creator":"hsiemes","file_size":594302,"date_updated":"2018-12-18T13:14:48Z","date_created":"2018-12-18T13:14:48Z","relation":"main_file","content_type":"application/pdf","access_level":"open_access"}],"publication":"5th International Conference on IT Security Incident Management \\& IT Forensics","date_updated":"2022-01-06T07:02:19Z","type":"conference","has_accepted_license":"1","status":"public","year":"2009","extern":"1","abstract":[{"text":"While many theoretical arguments against or in favor of open source and closed source software development have been presented, the empirical basis for the assessment of arguments is still weak. Addressing this research gap, this paper presents a comprehensive empirical investigation of the patching behavior of software vendors/communities of widely deployed open source and closed source software packages, including operating systems, database systems, web browsers, email clients, and office systems. As the value of any empirical study relies on the quality of data available, this paper also discusses in detail data issues, explains to what extent the empirical analysis can be based on vulnerability data contained in the NIST National Vulnerability Database, and shows how data on vulnerability patches was collected by the author to support this study. The results of the analysis suggest that it is not the particular software development style that determines patching behavior, but rather the policy of the particular software vendor.","lang":"eng"}],"author":[{"first_name":"Guido","full_name":"Schryen, Guido","id":"72850","last_name":"Schryen"}],"oa":"1","file_date_updated":"2018-12-18T13:14:48Z","department":[{"_id":"277"}],"_id":"5646","title":"A comprehensive and comparative analysis of the patching behavior of open source and closed source software vendors","citation":{"bibtex":"@inproceedings{Schryen_2009, title={A comprehensive and comparative analysis of the patching behavior of open source and closed source software vendors}, booktitle={5th International Conference on IT Security Incident Management \\& IT Forensics}, author={Schryen, Guido}, year={2009} }","short":"G. Schryen, in: 5th International Conference on IT Security Incident Management \\& IT Forensics, 2009.","chicago":"Schryen, Guido. “A Comprehensive and Comparative Analysis of the Patching Behavior of Open Source and Closed Source Software Vendors.” In 5th International Conference on IT Security Incident Management \\& IT Forensics, 2009.","ieee":"G. Schryen, “A comprehensive and comparative analysis of the patching behavior of open source and closed source software vendors,” in 5th International Conference on IT Security Incident Management \\& IT Forensics, 2009.","ama":"Schryen G. A comprehensive and comparative analysis of the patching behavior of open source and closed source software vendors. In: 5th International Conference on IT Security Incident Management \\& IT Forensics. ; 2009.","mla":"Schryen, Guido. “A Comprehensive and Comparative Analysis of the Patching Behavior of Open Source and Closed Source Software Vendors.” 5th International Conference on IT Security Incident Management \\& IT Forensics, 2009.","apa":"Schryen, G. (2009). A comprehensive and comparative analysis of the patching behavior of open source and closed source software vendors. In 5th International Conference on IT Security Incident Management \\& IT Forensics."},"user_id":"61579","date_created":"2018-11-14T14:40:04Z"}