IT managers often struggle to justify investments in information security. In addition to standard quantitative analyses such as Return on Security Investment (ROSI), executive management may also want to know what the effect of potential security breaches would be on the market value of a publicly-traded firm. This study attempts to shed light on the issue by examining the impact of information security breach announcements on shareholder value. This study also examines the effects of such announcements on a portfolio of the firm’s competitors in an effort to examine the contagion and competitive intra-industry effects. We find that the market value of an affected firm’s competitors increases following the announcement of a security breach...
When a company is hacked, market participants take notice. This has been observed consistently for ...
The impacts of data breaches have received much attention from information systems researchers; howe...
Managing information resources including protecting the privacy of customer data plays a critical ro...
The information systems security is nowadays no longer independent from the security environment of ...
ABSTRACT: Assessing the value of information technology (IT) security is challenging because of the ...
Information security breaches pose a growing threat to organizations and individuals, particularly t...
This study investigates the impact of information security breaches on firm performance. Unlike prev...
A breach in information security (infosec) can materially impact a firm’s long-term competitiveness....
While the infosec economics literature has begun to investigate the stock market impact of security ...
Purpose – In this study, we examined the influence of one or more information security breaches on a...
In a 2008 survey of 522 computer security professionals, the Computer Security Institute found an av...
A very debated issue in recent years is the cyber crime and its impact on market returns and reputa...
The 2009 CSI Computer Crime and Security Survey indicate that the financial fraud costs about $450,0...
Understanding which elements affect a company’s value is one of the main goals for the board of dire...
Instances of information security breaches are wide ranging, and can affect companies of different i...
When a company is hacked, market participants take notice. This has been observed consistently for ...
The impacts of data breaches have received much attention from information systems researchers; howe...
Managing information resources including protecting the privacy of customer data plays a critical ro...
The information systems security is nowadays no longer independent from the security environment of ...
ABSTRACT: Assessing the value of information technology (IT) security is challenging because of the ...
Information security breaches pose a growing threat to organizations and individuals, particularly t...
This study investigates the impact of information security breaches on firm performance. Unlike prev...
A breach in information security (infosec) can materially impact a firm’s long-term competitiveness....
While the infosec economics literature has begun to investigate the stock market impact of security ...
Purpose – In this study, we examined the influence of one or more information security breaches on a...
In a 2008 survey of 522 computer security professionals, the Computer Security Institute found an av...
A very debated issue in recent years is the cyber crime and its impact on market returns and reputa...
The 2009 CSI Computer Crime and Security Survey indicate that the financial fraud costs about $450,0...
Understanding which elements affect a company’s value is one of the main goals for the board of dire...
Instances of information security breaches are wide ranging, and can affect companies of different i...
When a company is hacked, market participants take notice. This has been observed consistently for ...
The impacts of data breaches have received much attention from information systems researchers; howe...
Managing information resources including protecting the privacy of customer data plays a critical ro...