LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Publisher: Emerald
Languages: English
Types: Article
Subjects:
Purpose – In this study, we examined the influence of one or more information security breaches on an organization’s stock market value as a way to benchmark the wider economic impact of such events.\ud Design/Methodology/approach – We used an event studies based approach where a measure of the event’s economic impact can be constructed using security prices observed over a relatively short period of time.\ud Findings – Based on the results, we argue that although no strong conclusions could be made given the current data constraints, there was enough evidence to show that such correlation exists, especially for recurring security breaches.\ud Research limitations/implications – One of the main limitations of this study was the quantity and quality of published data on security breaches, as organisations tend not to share this information.\ud Practical implications – One of the challenges in information security management is assessing the wider economic impact of security breaches. Subsequently, this helps drive investment decisions on security programmes that are usually seen as cost rather than moneymaking initiatives.\ud Originality/value – We envisage that as more breach event data become more widely available due to compliance and regulatory changes, this approach has the potential to emerge as an important tool for information security managers to help support investment decisions.\ud Keywords - Information Security, Event Based Analysis, Information Security Breaches \ud Paper type - Research paper\ud
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • ANDERSON, R. Why information security is hard - An economic perspective. 17th Annual Computer Security Applications Conference, Proceedings, 2001 Los Alamitos. IEEE Computer Society, 358-365.
    • ANDOH-BAIDOO, F. K., AMOAKO-GYAMPAH, K. & OSEI-BRYSON, K. M. 2010. How Internet Security Breaches Harm Market Value. Security & Privacy, IEEE, 8, 36-42.
    • BOEHMER, E., MASUMECI, J. & POULSEN, A. B. 1991. Event-study methodology under conditions of event-induced variance. Journal of Financial Economics, 30, 253-272.
    • BROWN, S. J. & WARNER, J. B. 1985. USING DAILY STOCK RETURNS - THE CASE OF EVENT STUDIES. Journal of Financial Economics, 14, 3-31.
    • CAMPBELL, K., GORDON, L. A., LOEB, M. P. & LEI, Z. 2003. The economic cost of publicly announced information security breaches: empirical evidence from the stock market. Journal of Computer Security, 11, 431-48.
    • CAVUSOGLU, H., MISHRA, B. & RAGHUNATHAN, S. 2004. The effect of Internet security breach announcements on market value: Capital market reactions for breached firms and Internet security developers. International Journal of Electronic Commerce, 9, 69-104.
    • CORRADO, C. J. 1989. A nonparametric test for abnormal security-price performance in event studies. Journal of Financial Economics, 23, 385-395.
    • COWAN, A. R. 1992. Nonparametric event study tests. Review of Quantitative Finance and Accounting, 2, 343-358.
    • CUTLER, D. M., POTERBA, J. M. & SUMMERS, L. H. 1989. WHAT MOVES STOCKPRICES. Journal of Portfolio Management, 15, 4-12.
    • DEBONDT, W. F. M. & THALER, R. 1985. Does the Stock Market Overreact? The Journal of Finance, 40, 793-805.
    • DICHEV, I. D. & JANES, T. D. 2003. Lunar cycle effects in stock returns. The Journal of Private Equity, 6, 8-29.
    • DIPIETRO, B. 2013. International Data Breach Laws Are All Over The Map [Online]. Available: http://blogs.wsj.com/riskandcompliance/2013/09/24/international-data-breachlaws-are-all-over-the-map/ [Accessed November 23rd 2013].
    • DUSO, T., GUGLER, K. & YURTOGLU, B. 2010. Is the event study methodology useful for merger analysis? A comparison of stock market and accounting data. International Review of Law and Economics, 30, 186-192.
    • DYCKMAN, T., PHILBRICK, D. & STEPHAN, J. 1984. A Comparison of Event Study Methodologies Using Daily Stock Returns: A Simulation Approach. Journal of Accounting Research, 22, 1-30.
    • FAMA, E. F. 1970. EFFICIENT CAPITAL MARKETS - REVIEW OF THEORY AND EMPIRICAL WORK. Journal of Finance, 25, 383-423.
  • No related research data.
  • Discovered through pilot similarity algorithms. Send us your feedback.

Share - Bookmark

Cite this article