Access the full text.
Sign up today, get DeepDyve free for 14 days.
A. Adebiyi, C. Ayo, S. Otokiti (2011)
Fuzzy-neural model with hybrid market indicators for stock forecastingInternational Journal of Electronic Finance, 5
P. Pavlou, Huigang Liang, Yajiong Xue (2007)
Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-Agent PerspectiveMIS Q., 31
D. Straub, Patricia Carlson, E. Jones (1992)
Detering Highly Motivated Computer Abusers: A Field Experiment in Computer Security
Lawrence Gordon, Martin Loeb (2002)
The economics of information security investment
K. Mccrohan (2003)
Facing the threats to electronic commerceJournal of Business & Industrial Marketing, 18
Zhilin Yang, Minjoon Jun (1970)
Consumer Perception of E-Service Quality: From Internet Purchaser and Non-Purchaser PerspectivesJournal of Business Strategies
Huseyin Cavusoglu, B. Mishra, Srinivasan Raghunathan (2004)
The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security DevelopersInternational Journal of Electronic Commerce, 9
D. Straub, William Nance (1990)
Discovering and Disciplining Computer Abuse in Organizations: A Field StudyMIS Q., 14
Lawrence Gordon, Martin Loeb, W. Lucyshyn (2003)
Information Security Expenditures and Real Options: A Wait-and-See Approach
D. Straub, R. Welke (1998)
Coping With Systems Risk: Security Planning Models for Management Decision MakingMIS Q., 22
S. Karnouskos (2004)
Mobile payment: A journey through existing procedures and standardization initiativesIEEE Communications Surveys & Tutorials, 6
Katherine Campbell, Lawrence Gordon, Martin Loeb, Lei Zhou (2003)
The Economic Cost of Publicly Announced Information Security Breaches: Empirical Evidence from the Stock MarketJ. Comput. Secur., 11
J. D'Arcy, A. Hovav (2007)
Deterring internal information systems misuseCommun. ACM, 50
K. Im, K. Dow, V. Grover (2001)
Research Report: A Reexamination of IT Investment and the Market Value of the Firm - An Event Study MethodologyInf. Syst. Res., 12
Ehsan Rasolinezhad (2009)
Evaluating electronic banking systems in developing nations through Analytic Hierarchy Process model: a case studyInternational Journal of Electronic Finance, 3
W. Sharpe (1963)
A Simplified Model for Portfolio AnalysisManagement Science, 9
M. Siponen, Anthony Vance (2010)
Neutralization: New Insights into the Problem of Employee Systems Security Policy ViolationsMIS Q., 34
F. Andoh-Baidoo, Kweku-Muata Osei-Bryson (2007)
Exploring the characteristics of Internet security breaches that impact the market value of breached firmsExpert Syst. Appl., 32
P. Lin, Jiah-Shing Chen (2008)
A genetic-based hybrid approach to corporate failure predictionInternational Journal of Electronic Finance, 2
D. Straub (1990)
Effective IS Security
A. Hovav, J. D'Arcy (2003)
The Impact of Denial‐of‐Service Attack Announcements on the Market Value of FirmsRisk management and insurance review, 6
P. Mishra, Satchidananda Dehuri (2012)
Potential indicators for stock index prediction: a perspectiveInternational Journal of Electronic Finance, 6
E. Fama, L. Fisher, M. Jensen, Richard Roll (1969)
The Adjustment of Stock Prices to New InformationCapital Markets: Market Efficiency eJournal
H. Highland (1995)
Internet sniffer attacks: E. Eugene Schultz, SRI International, Menlo Park, CA and Thomas Longstaff, Carnegie Mellon University, Pittsburgh, PA, USAComputers & Security, 14
Michael Ettredge, V. Richardson (2001)
Assessing the risk in e-commerceProceedings of the 35th Annual Hawaii International Conference on System Sciences
F. Andoh-Baidoo, Kwasi Amoako-Gyampah, Kweku-Muata Osei-Bryson (2010)
How Internet Security Breaches Harm Market ValueIEEE Security & Privacy, 8
Stefan Tams, V. Grover (2010)
The Effect of an IS Article's Structure on Its ImpactCommun. Assoc. Inf. Syst., 27
J. Quinlan (1990)
Decision trees and decision-makingIEEE Trans. Syst. Man Cybern., 20
F. Pearson, N. Weiner (1985)
Toward an Intergration of Criminological TheoriesJournal of Criminal Law & Criminology, 76
Ahmad Khasawneh, Iyad Azzam, Mohammad Bsoul (2009)
A study on e-commerce security in JordanInternational Journal of Electronic Finance, 3
J. D'Arcy, A. Hovav, D. Galletta (2009)
User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence ApproachInf. Syst. Res., 20
This study uses the deterrence theory to explain investors' behaviour towards the announcement of internet security breaches in the public media. Using the event study methodology, we compute the abnormal returns over a three day window. We then use decision tree induction to investigate how firm type and time affect the likelihood that an attack would lead to abnormal returns. The results reveal that investors are more likely to react negatively to announcements involving internet firms. In addition, investors are more likely to react negatively to more recent attacks. We argue that managers, especially in Net firms, should develop effective mechanisms to address security breach since investors interpret a security breach as management's failure to deter computer abusers from violating organisational security policies and controls. From a theoretical perspective, we demonstrate that event study research can use theory to explain investor's behaviour towards announcement of events in the public media.
International Journal of Electronic Finance – Inderscience Publishers
Published: Jan 1, 2013
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.