Extending the literature that has focused thus far on stock price impact, this study investigates the effect of data breach announcements on market activity, specifically through the response of the bid-ask spread and trading volume. We investigate data breach announcements as a potential source of asymmetric information and provide a new dimension to the ongoing debate on market efficiency. Adopting an event study methodology on a sample of 74 data breaches from 2005 to 2014, we find that data breach announcements have a positive short-term effect on both bid-ask spread and trading volume. The effect is only evidenced however on the day of the event, with market efficiency ensuring a quick return to normal market activity. No abnormal trad...
Characterized as negative events, data breaches can disrupt an organization’s operations and lead to...
In a 2008 survey of 522 computer security professionals, the Computer Security Institute found an av...
Using a sample of security and privacy breaches the present research examines the comparative announ...
Extending the literature that has focused thus far on stock price impact, this study investigates th...
Extending the literature that has focused thus far on stock price impact, this study investigates th...
Extending the literature that has focused thus far on stock price impact, this study investigates th...
Data breaches are not only on the increase but firms struggle to detect, defend and respond to such ...
Data breaches are not only on the increase but firms struggle to detect, defend and respond to such ...
The 2009 CSI Computer Crime and Security Survey indicate that the financial fraud costs about $450,0...
Purpose – In this study, we examined the influence of one or more information security breaches on a...
Managing information resources including protecting the privacy of customer data plays a critical ro...
While the infosec economics literature has begun to investigate the stock market impact of security ...
Over the years data breaches have become a status quo due to an attacker’s repeated ability to succe...
I study how financial markets react to unexpected corporate security breaches in the short and the l...
While the infosec economics literature has begun to investigate the stock market impact of security ...
Characterized as negative events, data breaches can disrupt an organization’s operations and lead to...
In a 2008 survey of 522 computer security professionals, the Computer Security Institute found an av...
Using a sample of security and privacy breaches the present research examines the comparative announ...
Extending the literature that has focused thus far on stock price impact, this study investigates th...
Extending the literature that has focused thus far on stock price impact, this study investigates th...
Extending the literature that has focused thus far on stock price impact, this study investigates th...
Data breaches are not only on the increase but firms struggle to detect, defend and respond to such ...
Data breaches are not only on the increase but firms struggle to detect, defend and respond to such ...
The 2009 CSI Computer Crime and Security Survey indicate that the financial fraud costs about $450,0...
Purpose – In this study, we examined the influence of one or more information security breaches on a...
Managing information resources including protecting the privacy of customer data plays a critical ro...
While the infosec economics literature has begun to investigate the stock market impact of security ...
Over the years data breaches have become a status quo due to an attacker’s repeated ability to succe...
I study how financial markets react to unexpected corporate security breaches in the short and the l...
While the infosec economics literature has begun to investigate the stock market impact of security ...
Characterized as negative events, data breaches can disrupt an organization’s operations and lead to...
In a 2008 survey of 522 computer security professionals, the Computer Security Institute found an av...
Using a sample of security and privacy breaches the present research examines the comparative announ...