{"id":"https://openalex.org/W184498472","doi":"https://doi.org/10.1007/1-4020-8090-5_18","title":"How and Why More Secure Technologies Succeed in Legacy Markets","display_name":"How and Why More Secure Technologies Succeed in Legacy Markets","publication_year":2006,"publication_date":"2006-01-14","ids":{"openalex":"https://openalex.org/W184498472","doi":"https://doi.org/10.1007/1-4020-8090-5_18","mag":"184498472"},"language":"en","primary_location":{"id":"doi:10.1007/1-4020-8090-5_18","is_oa":false,"landing_page_url":"https://doi.org/10.1007/1-4020-8090-5_18","pdf_url":null,"source":{"id":"https://openalex.org/S4306463519","display_name":"Kluwer Academic Publishers eBooks","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"ebook platform"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Advances in Information Security","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://nrs.harvard.edu/urn-3:HUL.InstRepos:16781951","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040524775","display_name":"Nicholas Rosasco","orcid":null},"institutions":[{"id":"https://openalex.org/I79272384","display_name":"University of Maryland, Baltimore County","ror":"https://ror.org/02qskvh78","country_code":"US","type":"education","lineage":["https://openalex.org/I79272384"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Nicholas Rosasco","raw_affiliation_strings":["University of Maryland Baltimore County, USA"],"affiliations":[{"raw_affiliation_string":"University of Maryland Baltimore County, USA","institution_ids":["https://openalex.org/I79272384"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037385329","display_name":"David Larochelle","orcid":null},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"David Larochelle","raw_affiliation_strings":["University of Virginia, USA"],"affiliations":[{"raw_affiliation_string":"University of Virginia, USA","institution_ids":["https://openalex.org/I51556381"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5040524775"],"corresponding_institution_ids":["https://openalex.org/I79272384"],"apc_list":null,"apc_paid":null,"fwci":2.6182,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.94294625,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"247","last_page":"254"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11437","display_name":"Digital Platforms and Economics","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1408","display_name":"Strategy and Management"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11437","display_name":"Digital Platforms and Economics","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1408","display_name":"Strategy and Management"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11499","display_name":"ICT Impact and Policies","score":0.9876999855041504,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9455000162124634,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/telnet","display_name":"Telnet","score":0.9633451700210571},{"id":"https://openalex.org/keywords/file-transfer-protocol","display_name":"File Transfer Protocol","score":0.5898870825767517},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.5047098398208618},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46543896198272705},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.46446695923805237},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4137401580810547},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.39344942569732666},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3195239305496216},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.268179714679718},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.16610750555992126},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.12497055530548096},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.09742957353591919}],"concepts":[{"id":"https://openalex.org/C2776538122","wikidata":"https://www.wikidata.org/wiki/Q160470","display_name":"Telnet","level":4,"score":0.9633451700210571},{"id":"https://openalex.org/C169485995","wikidata":"https://www.wikidata.org/wiki/Q42283","display_name":"File Transfer Protocol","level":3,"score":0.5898870825767517},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.5047098398208618},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46543896198272705},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.46446695923805237},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4137401580810547},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.39344942569732666},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3195239305496216},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.268179714679718},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.16610750555992126},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.12497055530548096},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.09742957353591919}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/1-4020-8090-5_18","is_oa":false,"landing_page_url":"https://doi.org/10.1007/1-4020-8090-5_18","pdf_url":null,"source":{"id":"https://openalex.org/S4306463519","display_name":"Kluwer Academic Publishers eBooks","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"ebook platform"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Advances in Information Security","raw_type":"book-chapter"},{"id":"pmh:oai:dash.harvard.edu:1/16781951","is_oa":true,"landing_page_url":"http://nrs.harvard.edu/urn-3:HUL.InstRepos:16781951","pdf_url":null,"source":{"id":"https://openalex.org/S4306401540","display_name":"Digital Access to Scholarship at Harvard (DASH) (Harvard University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I136199984","host_organization_name":"Harvard University","host_organization_lineage":["https://openalex.org/I136199984"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Research Paper or Report"}],"best_oa_location":{"id":"pmh:oai:dash.harvard.edu:1/16781951","is_oa":true,"landing_page_url":"http://nrs.harvard.edu/urn-3:HUL.InstRepos:16781951","pdf_url":null,"source":{"id":"https://openalex.org/S4306401540","display_name":"Digital Access to Scholarship at Harvard (DASH) (Harvard University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I136199984","host_organization_name":"Harvard University","host_organization_lineage":["https://openalex.org/I136199984"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Research Paper or Report"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W55144912","https://openalex.org/W83751335","https://openalex.org/W1513380209","https://openalex.org/W1953826241","https://openalex.org/W2021638366","https://openalex.org/W2032382690","https://openalex.org/W2172169275","https://openalex.org/W2600441078","https://openalex.org/W3045239074"],"related_works":["https://openalex.org/W2004696930","https://openalex.org/W4206239162","https://openalex.org/W1980574554","https://openalex.org/W2330301703","https://openalex.org/W2211739180","https://openalex.org/W2005326558","https://openalex.org/W2015978338","https://openalex.org/W2314132885","https://openalex.org/W2018370880","https://openalex.org/W1695212876"],"abstract_inverted_index":{"SSH":[0,17,95,256],"provided":[1],"superior":[2],"security":[3,31,105,199],"while":[4],"maintaining":[5],"current":[6],"functionality.":[7],"SSH\u2019s":[8],"acceptance":[9,77],"is":[10,23,38,111,118,151,173],"demonstrated":[11],"by":[12,94,128,301],"the":[13,53,73,115,125,133,136,139,158,182,187,195,206,218,225,250,268,272,279,282,286,297],"fact":[14],"that":[15,147,163,220,236,255],"installing":[16],"as":[18,41,60,78,201],"an":[19,83,155],"alternative":[20],"to":[21,27,86,141,153,176,180,211,214,274],"telnet":[22,36,89,129],"now":[24,39],"widely":[25,99],"considered":[26],"be":[28,177,215,229],"a":[29,42,104,240,246,293],"minimal":[30],"practice.":[32],"The":[33,101],"removal":[34],"of":[35,55,76,103,138,160,186,252,263,281,288],"clients":[37],"seen":[40],"best":[43],"practice":[44],"[Fenzi,":[45],"2002],":[46],"and":[47,130,169,172,184,190,203,223,254,260],"this":[48],"view":[49,197],"has":[50,90],"further":[51],"increased":[52],"adoption":[54,251],"SSH.":[56,79],"Similar":[57],"technologies":[58],"such":[59],"secure":[61,226],"file":[62],"transfer":[63],"protocols":[64],"provide":[65],"similar":[66],"benefits":[67],"but":[68,96,135],"have":[69,81,154,209,234],"not":[70,245],"achieved":[71],"nearly":[72],"same":[74],"level":[75],"We":[80,208,233],"performed":[82],"economic":[84,298],"analysis":[85],"determine":[87],"why":[88],"been":[91],"largely":[92],"supplanted":[93],"FTP":[97,131],"remains":[98],"used.":[100],"consequences":[102],"breach":[106],"exploiting":[107],"clear":[108],"text":[109],"passwords":[110],"far":[112],"reaching":[113],"-":[114],"entire":[116],"system":[117,302],"placed":[119],"at":[120],"risk.":[121],"In":[122],"many":[123],"cases":[124],"risks":[126],"posed":[127],"were":[132,244,267],"same,":[134],"perception":[137],"costs":[140,185],"change":[142],"obviously":[143],"differs.":[144],"An":[145],"organization":[146],"provides":[148],"shell":[149],"accounts":[150],"likely":[152,175],"interest":[156],"in":[157,271,296],"integrity":[159],"user":[161],"data":[162],"extends":[164],"beyond":[165],"concerns":[166],"for":[167],"reputation":[168],"liability":[170],"alone,":[171],"also":[174],"more":[178,191,231],"willing":[179],"accept":[181],"difficulties":[183],"switch.":[188],"How":[189],"importantly":[192],"why,":[193],"does":[194],"market":[196],"one":[198],"solution":[200],"achievable,":[202],"yet":[204],"ignore":[205],"other?":[207],"attempted":[210],"find":[212],"lessons":[213],"learned":[216],"about":[217],"tradeoffs":[219],"are":[221],"made,":[222],"how":[224],"option":[227],"can":[228],"made":[230,300],"attractive.":[232],"shown":[235],"network":[237],"externalities,":[238],"usually":[239],"first":[241],"order":[242],"effect,":[243],"significant":[247],"factor":[248],"impeding":[249],"SSH,":[253],"offered":[257],"equivalent":[258],"functionality":[259],"greater":[261],"ease":[262],"use.":[264],"These":[265],"factors":[266],"primary":[269],"consideration":[270],"willingness":[273],"change.":[275],"Additionally,":[276],"we":[277],"believe":[278],"openness":[280],"standard,":[283],"which":[284],"facilitated":[285],"creation":[287],"numerous":[289],"compatible":[290],"implementations,":[291],"was":[292],"key":[294],"element":[295],"decision":[299],"administrators.":[303]},"counts_by_year":[{"year":2017,"cited_by_count":2}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
