The impacts of data breaches have received much attention from information systems researchers; however, most studies have focused on breached firms. The organizational crisis literature suggests that negative perceptions from an organizational crisis can spread to others in the same industry, and this negative crisis spillover can cause significant losses to them. This study examines whether and how a data breach affects firm values of non-breached firms using the event study. We find that a data breach that occurs due to an industry-wide problem is likely to decrease the shareholder value of industry peers. Also, it has been shown that the data breach risk contagion effect is stronger for industry peers that have visibly disclosed data br...
A threat for a growing number offirms in various industries is the occurrence of different breaches ...
Hospitality firms are susceptible to data breaches due to the high volume of information they keep o...
Purpose – In this study, we examined the influence of one or more information security breaches on a...
The impacts of data breaches have received much attention from information systems researchers; howe...
Information security breaches pose a growing threat to organizations and individuals, particularly t...
Managing information resources including protecting the privacy of customer data plays a critical ro...
Over the years data breaches have become a status quo due to an attacker’s repeated ability to succe...
Data breaches are not only on the increase but firms struggle to detect, defend and respond to such ...
IT managers often struggle to justify investments in information security. In addition to standard q...
Characterized as negative events, data breaches can disrupt an organization’s operations and lead to...
Data breaches are not only on the increase but firms struggle to detect, defend and respond to such ...
Data breaches represent one of the main concerns for executives across all sectors. Data breaches op...
Corporate reputation represents a core asset of companies and research has shown that better reputat...
Firms are collecting more information about their customers than ever before in an attempt to unders...
Companies may face serious adverse consequences as a result of a data breach event. To repair the po...
A threat for a growing number offirms in various industries is the occurrence of different breaches ...
Hospitality firms are susceptible to data breaches due to the high volume of information they keep o...
Purpose – In this study, we examined the influence of one or more information security breaches on a...
The impacts of data breaches have received much attention from information systems researchers; howe...
Information security breaches pose a growing threat to organizations and individuals, particularly t...
Managing information resources including protecting the privacy of customer data plays a critical ro...
Over the years data breaches have become a status quo due to an attacker’s repeated ability to succe...
Data breaches are not only on the increase but firms struggle to detect, defend and respond to such ...
IT managers often struggle to justify investments in information security. In addition to standard q...
Characterized as negative events, data breaches can disrupt an organization’s operations and lead to...
Data breaches are not only on the increase but firms struggle to detect, defend and respond to such ...
Data breaches represent one of the main concerns for executives across all sectors. Data breaches op...
Corporate reputation represents a core asset of companies and research has shown that better reputat...
Firms are collecting more information about their customers than ever before in an attempt to unders...
Companies may face serious adverse consequences as a result of a data breach event. To repair the po...
A threat for a growing number offirms in various industries is the occurrence of different breaches ...
Hospitality firms are susceptible to data breaches due to the high volume of information they keep o...
Purpose – In this study, we examined the influence of one or more information security breaches on a...