Facing an increasing information security threat, companies react by engaging in various counter-breach initiatives. The business value of such initiatives is under-studied. This paper utilizes an organizational legitimacy view, overlaid by behavioral theory of the firm (BTOF), to examine whether counter-breach initiatives are rewarded by the market, and whether the magnitude of such rewards depends on the institutional environment. Based on a dataset of 3,212 observations from 2005 to 2015, and focusing on counter-breach initiatives that are revealed in public announcements and/or emphasized in annual reports, the results unfold an overall significant positive effect of counter-breach initiatives on Tobin’s q and future return on assets....
Information security breaches pose a growing threat to organizations and individuals, particularly t...
Strategic transactions can affect a firm’s structural complexity and data breach risk. Mergers and a...
Managing information resources including protecting the privacy of customer data plays a critical ro...
We address a long-standing lacuna in the Information Management literature on the relationships amon...
We address a long-standing lacuna in the Information Management literature on the relationships amon...
IT managers often struggle to justify investments in information security. In addition to standard q...
This study investigates the impact of information security breaches on firm performance. Unlike prev...
Data breaches can severely damage a firm’s reputation and its customers’ confidence. Firms must, the...
ABSTRACT: Assessing the value of information technology (IT) security is challenging because of the ...
IS literature has identified various economic, performance, and environmental factors affecting cybe...
The information systems security is nowadays no longer independent from the security environment of ...
A persistent danger for many organizations is the prospect of a security breach impactful enough to ...
The first essay focuses on technology firms in the sharing economy and attempts to enrich our under...
We investigate consumer and firm responses to information privacy and security factors across three ...
Purpose – In this study, we examined the influence of one or more information security breaches on a...
Information security breaches pose a growing threat to organizations and individuals, particularly t...
Strategic transactions can affect a firm’s structural complexity and data breach risk. Mergers and a...
Managing information resources including protecting the privacy of customer data plays a critical ro...
We address a long-standing lacuna in the Information Management literature on the relationships amon...
We address a long-standing lacuna in the Information Management literature on the relationships amon...
IT managers often struggle to justify investments in information security. In addition to standard q...
This study investigates the impact of information security breaches on firm performance. Unlike prev...
Data breaches can severely damage a firm’s reputation and its customers’ confidence. Firms must, the...
ABSTRACT: Assessing the value of information technology (IT) security is challenging because of the ...
IS literature has identified various economic, performance, and environmental factors affecting cybe...
The information systems security is nowadays no longer independent from the security environment of ...
A persistent danger for many organizations is the prospect of a security breach impactful enough to ...
The first essay focuses on technology firms in the sharing economy and attempts to enrich our under...
We investigate consumer and firm responses to information privacy and security factors across three ...
Purpose – In this study, we examined the influence of one or more information security breaches on a...
Information security breaches pose a growing threat to organizations and individuals, particularly t...
Strategic transactions can affect a firm’s structural complexity and data breach risk. Mergers and a...
Managing information resources including protecting the privacy of customer data plays a critical ro...