메뉴 건너뛰기




Volumn 50, Issue 4, 2011, Pages 651-661

Firms' information security investment decisions: Stock market evidence of investors' behavior

Author keywords

Abnormal returns; Event methodology; Information security investment; Investors' behavior; Market value; Sarbanes Oxley Act (SOX)

Indexed keywords

ABNORMAL RETURNS; EVENT METHODOLOGY; INFORMATION SECURITY INVESTMENT; INVESTORS' BEHAVIOR; MARKET VALUES; SARBANES-OXLEY ACT;

EID: 79151484723     PISSN: 01679236     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.dss.2010.08.017     Document Type: Article
Times cited : (132)

References (64)
  • 2
    • 33749612200 scopus 로고    scopus 로고
    • Market reactions to e-business outsourcing announcements: An event study
    • M. Agrawal, R. Kishore, and H.R. Rao Market reactions to e-business outsourcing announcements: an event study Information Management 43 7 2006 861 873
    • (2006) Information Management , vol.43 , Issue.7 , pp. 861-873
    • Agrawal, M.1    Kishore, R.2    Rao, H.R.3
  • 3
    • 84993869147 scopus 로고
    • Event study methods and evidence on their performance
    • S. Armitage Event study methods and evidence on their performance Journal of Economic Surveys 9 1 1995 25 52
    • (1995) Journal of Economic Surveys , vol.9 , Issue.1 , pp. 25-52
    • Armitage, S.1
  • 4
    • 33645684599 scopus 로고    scopus 로고
    • Sample-based quality estimation of query results in relational database environments
    • D. Ballou, C.-S. In, and R. Wang Sample-based quality estimation of query results in relational database environments IEEE Transactions on Knowledge and Data Engineering 18 5 2006 639 650
    • (2006) IEEE Transactions on Knowledge and Data Engineering , vol.18 , Issue.5 , pp. 639-650
    • Ballou, D.1    In, C.-S.2    Wang, R.3
  • 5
    • 16444374009 scopus 로고    scopus 로고
    • The two sides of ROI: Return on investment vs. risk of incarceration
    • H. Berghel The two sides of ROI: return on investment vs. risk of incarceration Communications of the ACM 48 4 2005 15 21
    • (2005) Communications of the ACM , vol.48 , Issue.4 , pp. 15-21
    • Berghel, H.1
  • 6
    • 0012208471 scopus 로고    scopus 로고
    • Finally, real return on security spending
    • S. Berinato Finally, real return on security spending CIO 2002
    • (2002) CIO
    • Berinato, S.1
  • 7
    • 9744285772 scopus 로고    scopus 로고
    • A resource-based perspective on information technology capability and firm performance: An empirical investigation
    • A. Bharadwaj A resource-based perspective on information technology capability and firm performance: an empirical investigation MIS Quarterly 24 1 2000 169 196
    • (2000) MIS Quarterly , vol.24 , Issue.1 , pp. 169-196
    • Bharadwaj, A.1
  • 10
    • 39749181513 scopus 로고    scopus 로고
    • Towards a standard approach for quantifying an ICT security investment
    • R. Bojanc, and B. Jerman-Blazic Towards a standard approach for quantifying an ICT security investment Computer & Standards Interface 30 4 2008 216 222
    • (2008) Computer & Standards Interface , vol.30 , Issue.4 , pp. 216-222
    • Bojanc, R.1    Jerman-Blazic, B.2
  • 11
    • 36749092418 scopus 로고
    • Using daily stock returns: The case of event studies
    • S. Brown, and J. Warner Using daily stock returns: the case of event studies Journal Financial Economics 14 1 1985 3 31
    • (1985) Journal Financial Economics , vol.14 , Issue.1 , pp. 3-31
    • Brown, S.1    Warner, J.2
  • 13
    • 0037599474 scopus 로고    scopus 로고
    • The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
    • K. Campbell, L. Gordon, M. Loeb, and L. Zhou The economic cost of publicly announced information security breaches: empirical evidence from the stock market Journal of Computer Security 11 3 2003 431 448
    • (2003) Journal of Computer Security , vol.11 , Issue.3 , pp. 431-448
    • Campbell, K.1    Gordon, L.2    Loeb, M.3    Zhou, L.4
  • 14
    • 1642413541 scopus 로고    scopus 로고
    • IT doesn't matter
    • N. Carr IT doesn't matter Harvard Business Review 81 5 2003 41 49
    • (2003) Harvard Business Review , vol.81 , Issue.5 , pp. 41-49
    • Carr, N.1
  • 15
    • 7444242205 scopus 로고    scopus 로고
    • The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers
    • H. Cavusoglu, B. Mishra, and S. Raghunathan The effect of internet security breach announcements on market value: capital market reactions for breached firms and internet security developers International Journal of Electronic Commerce 9 1 2004 70 104
    • (2004) International Journal of Electronic Commerce , vol.9 , Issue.1 , pp. 70-104
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 16
    • 0036753966 scopus 로고    scopus 로고
    • The shareholder wealth and trading volume effects of IT infrastructure investments
    • D. Chatterjee, C. Pacini, and V. Sambamurthy The shareholder wealth and trading volume effects of IT infrastructure investments Journal Management Information Systems 19 2 2002 7 43
    • (2002) Journal Management Information Systems , vol.19 , Issue.2 , pp. 7-43
    • Chatterjee, D.1    Pacini, C.2    Sambamurthy, V.3
  • 17
    • 79151473122 scopus 로고    scopus 로고
    • PricewaterhouseCoopers, the state of information security
    • CIO PricewaterhouseCoopers, the state of information security CIO Research Report Volume 2003 DOI
    • (2003) CIO Research Report Volume
  • 18
    • 79151469153 scopus 로고    scopus 로고
    • CISSP forum, I.k.i.s. forum, Top information security risks for 2008 in: C.p.b.p.i.s. communities (Ed.), (2007), pp. 1-8
    • CISSP forum, I.k.i.s. forum, Top information security risks for 2008 in: C.p.b.p.i.s. communities (Ed.), (2007), pp. 1-8.
  • 19
    • 21144484222 scopus 로고
    • The specification and power of the sign test in event study hypothesis tests using daily stock returns
    • C. Corrado, and T. Zivney The specification and power of the sign test in event study hypothesis tests using daily stock returns Journal of Financial and Quantitative Analysis 27 3 1992 465 478
    • (1992) Journal of Financial and Quantitative Analysis , vol.27 , Issue.3 , pp. 465-478
    • Corrado, C.1    Zivney, T.2
  • 21
    • 0032220622 scopus 로고    scopus 로고
    • Impact of strategic alliances on firm valuation
    • S. Das, P. Sen, and S. Sengupta Impact of strategic alliances on firm valuation Academy of Management Journal 41 1 1998 27 41
    • (1998) Academy of Management Journal , vol.41 , Issue.1 , pp. 27-41
    • Das, S.1    Sen, P.2    Sengupta, S.3
  • 22
    • 3142771412 scopus 로고    scopus 로고
    • The value relevance of announcements of transformational information technology investments
    • B. Dehning, V. Richardson, and R. Zmud The value relevance of announcements of transformational information technology investments MIS Quarterly 27 4 2003 637 656
    • (2003) MIS Quarterly , vol.27 , Issue.4 , pp. 637-656
    • Dehning, B.1    Richardson, V.2    Zmud, R.3
  • 25
    • 71149116783 scopus 로고
    • The impact of information technology investment announcements on the market value of the firm
    • B. Dos Santos, D. Peffers, and D. Mauer The impact of information technology investment announcements on the market value of the firm Information Systems Research 4 1 1993 1 23
    • (1993) Information Systems Research , vol.4 , Issue.1 , pp. 1-23
    • Dos Santos, B.1    Peffers, D.2    Mauer, D.3
  • 26
    • 85015677821 scopus 로고    scopus 로고
    • When does cross-border acquisition of insurance firms lead to valuecreation
    • B. Elango When does cross-border acquisition of insurance firms lead to valuecreation Journal of Risk Finance 7 4 2006 402 414
    • (2006) Journal of Risk Finance , vol.7 , Issue.4 , pp. 402-414
    • Elango, B.1
  • 29
    • 17644401409 scopus 로고    scopus 로고
    • Bringing security home: A process for developing secure and usable systems
    • ACM Press Ascona, Switzerland
    • A.I. Flechais, A. Sasse, and S. Hailes Bringing security home: a process for developing secure and usable systems The 2003 Workshop on New Security Paradigms 2003 ACM Press Ascona, Switzerland 49 57
    • (2003) The 2003 Workshop on New Security Paradigms , pp. 49-57
    • Flechais, A.I.1    Sasse, A.2    Hailes, S.3
  • 30
    • 0001771362 scopus 로고    scopus 로고
    • Core IS capabilities for exploiting information technology
    • D. Freeny, and L. Willcocks Core IS capabilities for exploiting information technology Sloan Management Review 39 3 1998 9 21
    • (1998) Sloan Management Review , vol.39 , Issue.3 , pp. 9-21
    • Freeny, D.1    Willcocks, L.2
  • 31
    • 79151478624 scopus 로고    scopus 로고
    • A.a.I.M. Division (Ed.), (General Accounting Office, 1999)
    • G.A. Office, Information Security Risk Assessment, in: A.a.I.M. Division (Ed.), (General Accounting Office, 1999), pp. 1-48.
    • Information Security Risk Assessment , pp. 1-48
    • Office, G.A.1
  • 32
    • 72249120536 scopus 로고    scopus 로고
    • The economic impact of regulatory information disclosure on information security investments, competition, and social welfare
    • Robinson College, University of Cambridge England
    • A. Ghose, and U. Rajan The economic impact of regulatory information disclosure on information security investments, competition, and social welfare Workshop on Economics of Information Security 2006 Robinson College, University of Cambridge England
    • (2006) Workshop on Economics of Information Security
    • Ghose, A.1    Rajan, U.2
  • 35
    • 33745210521 scopus 로고    scopus 로고
    • Budgeting process for information security expenditure
    • L. Gordon, and M. Loeb Budgeting process for information security expenditure Communications of the ACM 29 1 2006 121 126
    • (2006) Communications of the ACM , vol.29 , Issue.1 , pp. 121-126
    • Gordon, L.1    Loeb, M.2
  • 36
    • 0345386339 scopus 로고    scopus 로고
    • An economic perspective on the sharing of information related to security breaches: Concepts and empirical evidence
    • L. Gordon, M. Loeb, and W. Lucyshyn An economic perspective on the sharing of information related to security breaches: concepts and empirical evidence The 1st Workshop on Economics and Information Security 2002 Berkeley, CA
    • (2002) The 1st Workshop on Economics and Information Security
    • Gordon, L.1    Loeb, M.2    Lucyshyn, W.3
  • 37
    • 0042016882 scopus 로고    scopus 로고
    • Market reaction to ERP implementation announcements
    • D. Hayes, J. Hunton, and J. Reck Market reaction to ERP implementation announcements Journal of Information Systems 15 1 2001 3 18
    • (2001) Journal of Information Systems , vol.15 , Issue.1 , pp. 3-18
    • Hayes, D.1    Hunton, J.2    Reck, J.3
  • 38
    • 0001057052 scopus 로고
    • Problems and solutions in conducting event studies
    • G. Henderson Problems and solutions in conducting event studies The Journal of Risk and Insurance 57 2 1990 282 306
    • (1990) The Journal of Risk and Insurance , vol.57 , Issue.2 , pp. 282-306
    • Henderson, G.1
  • 39
    • 3042809894 scopus 로고    scopus 로고
    • Tangible ROI through secure software engineering
    • K. Hoo Tangible ROI through secure software engineering Secure Business Quarterly 2001 Fourth Quarter
    • (2001) Secure Business Quarterly
    • Hoo, K.1
  • 40
    • 15744399767 scopus 로고    scopus 로고
    • The impact of denial-of-service attack announcements on the market value of firms
    • A. Hovav, and J. D'arcy The impact of denial-of-service attack announcements on the market value of firms Risk Management and Insurance Review 6 2 2003 97 121
    • (2003) Risk Management and Insurance Review , vol.6 , Issue.2 , pp. 97-121
    • Hovav, A.1    D'Arcy, J.2
  • 41
    • 85017361394 scopus 로고    scopus 로고
    • The impact of virus attack announcements on the market value of firms
    • A. Hovav, and J. D'arcy The impact of virus attack announcements on the market value of firms Information Systems Security 13 3 2005 32 40
    • (2005) Information Systems Security , vol.13 , Issue.3 , pp. 32-40
    • Hovav, A.1    D'Arcy, J.2
  • 43
    • 0035589482 scopus 로고    scopus 로고
    • A reexamination of IT investment and market value of the firm: An event study methodology
    • K. Im, K. Dow, and V. Grover A reexamination of IT investment and market value of the firm: an event study methodology Information Systems Research 12 1 2001 103 117
    • (2001) Information Systems Research , vol.12 , Issue.1 , pp. 103-117
    • Im, K.1    Dow, K.2    Grover, V.3
  • 45
    • 24944582185 scopus 로고    scopus 로고
    • Cost-benefit analysis of security investments: Methodology and case study
    • ICCSA 2005
    • S. Kim, and H. Lee Cost-benefit analysis of security investments: methodology and case study ICCSA 2005, LNCS 3482 2005 1239 1248
    • (2005) LNCS , vol.3482 , pp. 1239-1248
    • Kim, S.1    Lee, H.2
  • 46
    • 78650018495 scopus 로고    scopus 로고
    • An empirical analysis of security investment in countermeasures based on an enterprise survey in Japan
    • WEIS University of Cambridge, England
    • W. Liu, H. Tanaka, and K. Maysuura An empirical analysis of security investment in countermeasures based on an enterprise survey in Japan The Fifth Workshop on the Economics of Information Security 2006 WEIS University of Cambridge, England
    • (2006) The Fifth Workshop on the Economics of Information Security
    • Liu, W.1    Tanaka, H.2    Maysuura, K.3
  • 48
    • 84977702266 scopus 로고
    • Corporate dividends and seasoned equity issues: An empirical investigation
    • C. Loderer, and D. Mauer Corporate dividends and seasoned equity issues: an empirical investigation The Journal of Finance 47 1 1992 201 225
    • (1992) The Journal of Finance , vol.47 , Issue.1 , pp. 201-225
    • Loderer, C.1    Mauer, D.2
  • 49
    • 0011765591 scopus 로고    scopus 로고
    • Event studies in economics and finance
    • A. Mackinlay Event studies in economics and finance Journal of Econonic Literature 35 1 1997 13 39
    • (1997) Journal of Econonic Literature , vol.35 , Issue.1 , pp. 13-39
    • MacKinlay, A.1
  • 50
    • 3042771207 scopus 로고    scopus 로고
    • The efficient market hypothesis and its critics
    • B. Malkiel The efficient market hypothesis and its critics The Journal of Economic Perspectives 17 1 2003 59 82
    • (2003) The Journal of Economic Perspectives , vol.17 , Issue.1 , pp. 59-82
    • Malkiel, B.1
  • 51
    • 0031510754 scopus 로고    scopus 로고
    • Event studies in management research: Theoretical and empirical issues
    • A. McWilliams, and D. Siegel Event studies in management research: theoretical and empirical issues Academy of Management Journal 40 3 1997 626 657
    • (1997) Academy of Management Journal , vol.40 , Issue.3 , pp. 626-657
    • McWilliams, A.1    Siegel, D.2
  • 52
    • 0001317094 scopus 로고
    • Hazardous waste lawsuits, stockholder returns, and deterrence
    • M. Muoghalu, H. Robinson, and J. Glascock Hazardous waste lawsuits, stockholder returns, and deterrence Sourthern Econonic Journal 57 2 1990 357 370
    • (1990) Sourthern Econonic Journal , vol.57 , Issue.2 , pp. 357-370
    • Muoghalu, M.1    Robinson, H.2    Glascock, J.3
  • 54
    • 8444250312 scopus 로고    scopus 로고
    • Improving the ROI of the security management process
    • S. Purser Improving the ROI of the security management process Computers and Security 23 7 2004 542 546
    • (2004) Computers and Security , vol.23 , Issue.7 , pp. 542-546
    • Purser, S.1
  • 56
    • 33745314972 scopus 로고    scopus 로고
    • Knowledge management using information technology: Determinants of short-term impact on firm value
    • R. Sabherwal, and S. Sabherwal Knowledge management using information technology: determinants of short-term impact on firm value Decision Sciences 36 4 2005 531 568
    • (2005) Decision Sciences , vol.36 , Issue.4 , pp. 531-568
    • Sabherwal, R.1    Sabherwal, S.2
  • 57
    • 24944436916 scopus 로고    scopus 로고
    • Sarbanes-Oxley-a huge boon to information security in the US
    • E. Schultz Sarbanes-Oxley-a huge boon to information security in the US Computer Security 23 2004 353 354
    • (2004) Computer Security , vol.23 , pp. 353-354
    • Schultz, E.1
  • 58
    • 30744438863 scopus 로고    scopus 로고
    • An analysis of the traditional IS security approaches: Implications for research and practice
    • M. Siponen An analysis of the traditional IS security approaches: implications for research and practice European Journal of Information Systems 14 3 2005 303 315
    • (2005) European Journal of Information Systems , vol.14 , Issue.3 , pp. 303-315
    • Siponen, M.1
  • 59
    • 0035595781 scopus 로고    scopus 로고
    • The impact of E-commerce announcements on the market value of firms
    • M. Subramani, and E. Walden The impact of E-commerce announcements on the market value of firms Information Systems Research 12 2 2001 135 154
    • (2001) Information Systems Research , vol.12 , Issue.2 , pp. 135-154
    • Subramani, M.1    Walden, E.2
  • 60
    • 34547100991 scopus 로고    scopus 로고
    • An empirical analysis of the impact of software vulnerability announcements on firm stock price
    • R. Tealng, and S. Wattal An empirical analysis of the impact of software vulnerability announcements on firm stock price IEEE Transactions on Software Engineering 33 8 2007 547 557
    • (2007) IEEE Transactions on Software Engineering , vol.33 , Issue.8 , pp. 547-557
    • Tealng, R.1    Wattal, S.2
  • 61
    • 0030384059 scopus 로고    scopus 로고
    • First to market, first to fail? Real causes of enduring market leadership
    • G. Tellis, and P. Golder First to market, first to fail? Real causes of enduring market leadership Sloan Management Review 37 2 1996 65 75
    • (1996) Sloan Management Review , vol.37 , Issue.2 , pp. 65-75
    • Tellis, G.1    Golder, P.2
  • 63
    • 33749351964 scopus 로고    scopus 로고
    • Opportunities for computer crime: Considering systems risk from a criminological perspective
    • R. Willison, and J. Backhouse Opportunities for computer crime: considering systems risk from a criminological perspective European Journal of Information Systems 15 2006 403 414
    • (2006) European Journal of Information Systems , vol.15 , pp. 403-414
    • Willison, R.1    Backhouse, J.2
  • 64
    • 79151482435 scopus 로고    scopus 로고
    • The impact of security breaches on the value of stocks: A short-term vs. long-term perspective
    • A. Yayla, and Q. Hu The impact of security breaches on the value of stocks: a short-term vs. long-term perspective The Annual Conference of IS in Asia-Pacific 2005 Las Vegas, NV.
    • (2005) The Annual Conference of IS in Asia-Pacific
    • Yayla, A.1    Hu, Q.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.