메뉴 건너뛰기




Volumn 8, Issue 1, 2010, Pages 36-42

How internet security breaches harm market value

Author keywords

Abnormal returns; Decision tree induction; Internet security breach; Market value

Indexed keywords

ABNORMAL RETURNS; DECISION-TREE INDUCTION; INFORMATION SECURITY; INTERNET SECURITY; MANAGERIAL IMPLICATIONS; MARKET VALUES; SECURITY BREACHES; STATISTICAL TESTING; STOCK MARKET;

EID: 77249108841     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2010.37     Document Type: Article
Times cited : (28)

References (19)
  • 1
    • 77249159222 scopus 로고    scopus 로고
    • When the law chases the internet
    • "When the Law Chases the Internet," Christian Science Monitor, vol.98, no.77, 2006, p. 8.
    • (2006) Christian Science Monitor , vol.98 , Issue.77 , pp. 8
  • 2
    • 77249119594 scopus 로고    scopus 로고
    • Firms trying to crack down on cybercrime
    • 9 Feb
    • C. Madden, "Firms Trying to Crack Down on Cybercrime," The Irish Times, 9 Feb. 2007, p. 14.
    • (2007) The Irish Times , pp. 14
    • Madden, C.1
  • 3
    • 84891427413 scopus 로고    scopus 로고
    • Authentication technology: Identity theft and account takeover
    • J. Pollock and J. May, "Authentication Technology: Identity Theft and Account Takeover," FBI Law Enforcement Bulletin, vol.71, no.6, 2002, pp. 1-4; www.fbi. gov/publications/leb/2002/june2002/june02leb.htm.
    • (2002) FBI Law Enforcement Bulletin , vol.71 , Issue.6 , pp. 1-4
    • Pollock, J.1    May, J.2
  • 4
    • 34250015784 scopus 로고    scopus 로고
    • Embedding information security into the organization
    • M.E. Johnson and E. Goetz, "Embedding Information Security into the Organization," IEEE Security & Privacy, vol.5, no.3, 2007, pp. 16-24.
    • (2007) IEEE Security & Privacy , vol.5 , Issue.3 , pp. 16-24
    • Johnson, M.E.1    Goetz, E.2
  • 5
    • 0037599474 scopus 로고    scopus 로고
    • The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
    • K. Campbell et al., "The Economic Cost of Publicly Announced Information Security Breaches: Empirical Evidence from the Stock Market," J. Computer Security, vol.11, no.3, 2003, pp. 431-448.
    • (2003) J. Computer Security , vol.11 , Issue.3 , pp. 431-448
    • Campbell, K.1
  • 6
    • 54049098864 scopus 로고    scopus 로고
    • A life or death infosec subversion
    • C. Viecco and J. Camp, "A Life or Death InfoSec Subversion," IEEE Security & Privacy, vol.6, no.5, 2008, pp. 74-76.
    • (2008) IEEE Security & Privacy , vol.6 , Issue.5 , pp. 74-76
    • Viecco, C.1    Camp, J.2
  • 7
    • 33750966470 scopus 로고    scopus 로고
    • Exploring the characteristics of internet security breaches that impact the market value of breached firms
    • F.K. Andoh-Baidoo and K.-M. Osei-Bryson, "Exploring the Characteristics of Internet Security Breaches that Impact the Market Value of Breached Firms," Expert Systems with Applications, vol.32, no.3, 2007, pp. 703-725.
    • (2007) Expert Systems with Applications , vol.32 , Issue.3 , pp. 703-725
    • Andoh-Baidoo, F.K.1    Osei-Bryson, K.-M.2
  • 8
    • 0003531721 scopus 로고    scopus 로고
    • PhD thesis, Dept. of Engineering and Public Policy, Carnegie Mellon Univ.
    • J. Howard, An Analysis of Security Incidents on the Internet 1989-1995, PhD thesis, Dept. of Engineering and Public Policy, Carnegie Mellon Univ., 1997; www.cert. org/archive/pdf/JHThesis.pdf.
    • (1997) An Analysis of Security Incidents on the Internet 1989-1995
    • Howard, J.1
  • 9
    • 0041766623 scopus 로고    scopus 로고
    • Information security expenditures and real options: A wait-and-see approach
    • L.A. Gordon, M.P. Loeb, and W. Lucyshyn, "Information Security Expenditures and Real Options: A Wait-and-See Approach," Computer Security J., vol.19, no.2, 2003, pp. 1-7.
    • (2003) Computer Security J. , vol.19 , Issue.2 , pp. 1-7
    • Gordon, L.A.1    Loeb, M.P.2    Lucyshyn, W.3
  • 10
    • 0001884696 scopus 로고
    • The adjustment of stock prices to new information
    • E.F. Fama et al., "The Adjustment of Stock Prices to New Information," Int'l Economic Rev., vol.10, no.1, 1969, pp. 1-21.
    • (1969) Int'l Economic Rev. , vol.10 , Issue.1 , pp. 1-21
    • Fama, E.F.1
  • 11
    • 0001217228 scopus 로고
    • A simplified model for portfolio analysis
    • W. Sharpe, "A Simplified Model for Portfolio Analysis," Management Science, vol.9, no.2, 1963, pp. 277-293.
    • (1963) Management Science , vol.9 , Issue.2 , pp. 277-293
    • Sharpe, W.1
  • 13
    • 3142771235 scopus 로고    scopus 로고
    • Reexamining the value relevance of e-commerce initiatives
    • B. Dehning et al., "Reexamining the Value Relevance of E-Commerce Initiatives," J. Management Information Systems, vol.21, no.1, 2004, pp. 55-82.
    • (2004) J. Management Information Systems , vol.21 , Issue.1 , pp. 55-82
    • Dehning, B.1
  • 14
    • 33745926506 scopus 로고    scopus 로고
    • Splitting methods for decision-tree induction: An exploration of the relative performance of two entropy-based families
    • K.-M. Osei-Bryson and K. Giles, "Splitting Methods for Decision-Tree Induction: An Exploration of the Relative Performance of Two Entropy-Based Families," Information Systems Frontiers, vol.8, no.3, 2006, pp. 195-209.
    • (2006) Information Systems Frontiers , vol.8 , Issue.3 , pp. 195-209
    • Osei-Bryson, K.-M.1    Giles, K.2
  • 16
    • 13444274614 scopus 로고    scopus 로고
    • Evaluating information security investments using the analytic hierarchy process
    • L.D. Bodin, L.A. Gordon, and M.P. Loeb, "Evaluating Information Security Investments Using the Analytic Hierarchy Process," Comm. ACM, vol.48, no.2, 2005, pp. 79-83.
    • (2005) Comm. ACM , vol.48 , Issue.2 , pp. 79-83
    • Bodin, L.D.1    Gordon, L.A.2    Loeb, M.P.3
  • 18
    • 0036395373 scopus 로고    scopus 로고
    • A framework for understanding and predicting insider attacks
    • E.E. Schultz, "A Framework for Understanding and Predicting Insider Attacks," Computers & Security, vol.21, no.6, 2002, pp. 526-531.
    • (2002) Computers & Security , vol.21 , Issue.6 , pp. 526-531
    • Schultz, E.E.1
  • 19
    • 3242808612 scopus 로고    scopus 로고
    • CSI computer crime and security survey
    • Computer Security Inst.
    • R. Richardson, "CSI Computer Crime and Security Survey," 12th Ann. Computer Crime and Security Survey, Computer Security Inst., 2007; http://netscale.cse. nd.edu/twiki/bin/view/Repository/CsiSurvey2007.
    • (2007) 12th Ann. Computer Crime and Security Survey
    • Richardson, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.