Affiliation:
1. Kennesaw State University, USA
2. The University of Texas at San Antonio, USA
3. Virginia Commonwealth University, USA
Abstract
Information security breaches pose a growing threat to organizations and individuals, particularly those that are heavily involved in e-business/e-commerce. An information security breach can have wide-ranging impacts, including influencing the behaviors of competitors and vice versa within the context of a competitive marketplace. Therefore, there is a need for further exploration of implications of information security breaches beyond the focus of the breached firm. This study investigates the financial impact of publicly announced information security breaches on breached firms and their non-breached competitors. While controlling for size and the industry the firm operates in, the authors focus on specific types of information security breaches (Denial of Service, Website Defacement, Data Theft, and Data Corruption). Unlike previous studies that have used event study methodology, the authors investigate information transfer effects that result from information security breaches using the matched sampling method. The study reveals statistically significant evidence of the presence of intra-industry information transfer for some types of security breaches. The authors also found evidence of contagion effects, but no similar evidence concerning competition effect.
Subject
Library and Information Sciences,Strategy and Management,Business and International Management
Reference46 articles.
1. Acquisti, A., Friedman, A., & Telang, R. (2006). Is there a cost to privacy breaches? An event study. Paper presented at the 27th International Conference on Information Systems, Milwaukee, WI.
2. Contagion Effects of Bank Failures: Evidence from Capital Markets
3. Exploring the characteristics of Internet security breaches that impact the market value of breached firms
4. An analysis of the growth of computer and Internet security breaches.;K.Bagchi;Communications of the Association for Information Systems,2003
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献