-
1
-
-
79751480868
-
Is there a cost to privacy breaches? An event study
-
Cambridge, UK, available at
-
A. Acquisti, A. Friedman and R. Telang, Is there a cost to privacy breaches? An event study, in: Workshop on the Economics of Information Security, Cambridge, UK, 2006, available at: http://citeseerx.ist.psu.edu/viewdoc/ download?doi=10.1.1.73.2942&rep=rep1&type=pdf.
-
(2006)
Workshop on the Economics of Information Security
-
-
Acquisti, A.1
Friedman, A.2
Telang, R.3
-
3
-
-
33750966470
-
Exploring the characteristics of Internet security breaches that impact the market value of breached firms
-
DOI 10.1016/j.eswa.2006.01.020, PII S0957417406000303
-
F.K. Andoh-Baidoo and K.M. Osei-Bryson, Exploring the characteristics of Internet security breaches that impact the market value of breached firms, Expert Systems with Applications 32 (2007), 703-725. (Pubitemid 44750609)
-
(2007)
Expert Systems with Applications
, vol.32
, Issue.3
, pp. 703-725
-
-
Andoh-Baidoo, F.K.1
Osei-Bryson, K.-M.2
-
4
-
-
33745713930
-
Market reaction to e-commerce impairments evidenced by website outages
-
DOI 10.1016/j.accinf.2005.10.002, PII S1467089506000194
-
J.H. Anthony, W. Choi and S. Grabski, Market reaction to e-commerce impairments evidenced by website outages, International Journal of Accounting Information Systems 7 (2006), 60-78. (Pubitemid 44004829)
-
(2006)
International Journal of Accounting Information Systems
, vol.7
, Issue.2
, pp. 60-78
-
-
Anthony, J.H.1
Choi, W.2
Grabski, S.3
-
5
-
-
79951814952
-
The value of indirect investment advice: Stock recommendations in Barron's
-
G.A. Benesh and J.A. Clark, The value of indirect investment advice: stock recommendations in Barron's, Journal of Financial and Strategic Decisions 7 (1994), 35-43.
-
(1994)
Journal of Financial and Strategic Decisions
, vol.7
, pp. 35-43
-
-
Benesh, G.A.1
Clark, J.A.2
-
6
-
-
0034179209
-
Is the abnormal return following equity issuances anomalous?
-
A. Brav, C. Geczy and P.A. Gompers, Is the abnormal return following equity issuances anomalous?, Journal of Financial Economics 56 (2000), 209-249.
-
(2000)
Journal of Financial Economics
, vol.56
, pp. 209-249
-
-
Brav, A.1
Geczy, C.2
Gompers, P.A.3
-
9
-
-
0037599474
-
The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
-
K. Campbell, L.A. Gordon, M.P. Loeb and L. Zhou, The economic cost of publicly announced information security breaches: empirical evidence from the stock market, Journal of Computer Security 11 (2003), 431-448.
-
(2003)
Journal of Computer Security
, vol.11
, pp. 431-448
-
-
Campbell, K.1
Gordon, L.A.2
Loeb, M.P.3
Zhou, L.4
-
10
-
-
0002624840
-
On persistence in mutual fund performance
-
M.M. Carhart, On persistence in mutual fund performance, Journal of Finance 52 (1997), 57-82.
-
(1997)
Journal of Finance
, vol.52
, pp. 57-82
-
-
Carhart, M.M.1
-
11
-
-
7444242205
-
The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers
-
H. Cavusoglu, B. Mishra and S. Raghunathan, The effect of Internet security breach announcements on market value: capital market reactions for breached firms and Internet security developers, International Journal of Electronic Commerce 9 (2004), 69-104. (Pubitemid 39444049)
-
(2004)
International Journal of Electronic Commerce
, vol.9
, Issue.1
, pp. 69-104
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
12
-
-
28244480422
-
Changing names with style: Mutual fund name changes and their effects on fund flows
-
M.J. Cooper, H. Gulen and P.R. Rau, Changing names with style: mutual fund name changes and their effects on fund flows, Journal of Finance 60 (2005), 2825-2857.
-
(2005)
Journal of Finance
, vol.60
, pp. 2825-2857
-
-
Cooper, M.J.1
Gulen, H.2
Rau, P.R.3
-
13
-
-
0006025721
-
Identification of host audit data to detect attacks on low-level IP vulnerabilities
-
T.E. Daniels and E.H. Spafford, Identification of host audit data to detect attacks on low-level IP vulnerabilities, Journal of Computer Security 7 (1999), 3-36.
-
(1999)
Journal of Computer Security
, vol.7
, pp. 3-36
-
-
Daniels, T.E.1
Spafford, E.H.2
-
14
-
-
71149116783
-
The impact of information technology investment announcements on the market value of the firm
-
B.L. Dos Santos, G.K. Peffers and D.C. Mauer, The impact of information technology investment announcements on the market value of the firm, Information Systems Research 4 (1993), 1-23.
-
(1993)
Information Systems Research
, vol.4
, pp. 1-23
-
-
Dos Santos, B.L.1
Peffers, G.K.2
Mauer, D.C.3
-
15
-
-
3142661232
-
Information transfer among Internet firms: The case of hacker attacks
-
M.L. Ettredge and V.J. Richardson, Information transfer among Internet firms: the case of hacker attacks, Journal of Information Systems 17 (2003), 71-82.
-
(2003)
Journal of Information Systems
, vol.17
, pp. 71-82
-
-
Ettredge, M.L.1
Richardson, V.J.2
-
16
-
-
84977737676
-
The cross-section of expected stock returns
-
E.F. Fama and K.R. French, The cross-section of expected stock returns, Journal of Finance 47 (1992), 427-465.
-
(1992)
Journal of Finance
, vol.47
, pp. 427-465
-
-
Fama, E.F.1
French, K.R.2
-
17
-
-
38549147867
-
Common risk factors in the returns on stocks and bonds
-
E.F. Fama and K.R. French, Common risk factors in the returns on stocks and bonds, Journal of Financial Economics 33 (1993), 3-56.
-
(1993)
Journal of Financial Economics
, vol.33
, pp. 3-56
-
-
Fama, E.F.1
French, K.R.2
-
18
-
-
0013413658
-
Multifactor explanations of asset pricing anomalies
-
E.F. Fama and K.R. French, Multifactor explanations of asset pricing anomalies, Journal of Finance 51 (1996), 55-84.
-
(1996)
Journal of Finance
, vol.51
, pp. 55-84
-
-
Fama, E.F.1
French, K.R.2
-
21
-
-
0037548357
-
Conspiracy of silence
-
A. Genusa, Conspiracy of silence, CIO 14 (2001), 92-96.
-
(2001)
CIO
, vol.14
, pp. 92-96
-
-
Genusa, A.1
-
24
-
-
15744399767
-
The impact of denial-of-service attack announcements on the market value of firm
-
A. Hovav and J. D'arcy, The impact of denial-of-service attack announcements on the market value of firm, Risk Management and Insurance Review 6 (2003), 97-121.
-
(2003)
Risk Management and Insurance Review
, vol.6
, pp. 97-121
-
-
Hovav, A.1
D'arcy, J.2
-
25
-
-
85017361394
-
The Impact of Virus Attack Announcements on the Market Value of Firms
-
A. Hovav and J. D'arcy, The impact of virus attack announcements on the market value of firms, Information Security Journal: A Global Perspective 13 (2004), 32-40. (Pubitemid 39101930)
-
(2004)
Information Systems Security
, vol.13
, Issue.3
, pp. 32-40
-
-
Hovav, A.1
D Arcy, J.2
-
26
-
-
27844527031
-
Cost effective management frameworks for intrusion detection systems
-
C. Iheagwara, A. Blyth and M. Singhal, Cost effective management frameworks for intrusion detection systems, Journal of Computer Security 12 (2004), 777-798. (Pubitemid 41652789)
-
(2004)
Journal of Computer Security
, vol.12
, Issue.5
, pp. 777-798
-
-
Iheagwara, C.1
Blyth, A.2
Singhal, M.3
-
27
-
-
84899444129
-
The effect of information security incidents on corporate values in the Japanese stock market
-
Arlington, VA, available at
-
M. Ishiguro, H. Tanaka, K. Matsuura and I. Murase, The effect of information security incidents on corporate values in the Japanese stock market, in: Workshop on the Economics of Securing the Information Infrastructure, Arlington, VA, 2006, available at: http://www.mri.co.jp/PUBLICITY/ PAPER/2006/20061023-si304.pdf.
-
(2006)
Workshop on the Economics of Securing the Information Infrastructure
-
-
Ishiguro, M.1
Tanaka, H.2
Matsuura, K.3
Murase, I.4
-
28
-
-
35948938098
-
Market reactions to information security breach announcements: An empirical analysis
-
A. Kannan, J. Rees and S. Sridhar, Market reactions to information security breach announcements: an empirical analysis, International Journal of Electronic Commerce 12 (2007), 69-91.
-
(2007)
International Journal of Electronic Commerce
, vol.12
, pp. 69-91
-
-
Kannan, A.1
Rees, J.2
Sridhar, S.3
-
29
-
-
0036090464
-
Using internal sensors and embedded detectors for intrusion detection
-
F. Kerschbaum, E.H. Spafford and D. Zamboni, Embedded sensors and detectors for intrusion detection, Journal of Computer Security 10 (2002), 23-70. (Pubitemid 34531412)
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 23-70
-
-
Kerschbaum, F.1
Spafford, E.H.2
Zamboni, D.3
-
30
-
-
84882486619
-
Econometrics of event studies
-
B. Espen Eckbo, ed., Empirical Corporate Finance, North-Holland, Amsterdam, Chapter 1
-
S.P. Kothari and J.B. Warner, Econometrics of event studies, in: Handbook in Corporate Finance, B. Espen Eckbo, ed., Empirical Corporate Finance, Vol. 1, North-Holland, Amsterdam, 2007, pp. 3- 36, Chapter 1.
-
(2007)
Handbook in Corporate Finance
, vol.1
, pp. 3-36
-
-
Kothari, S.P.1
Warner, J.B.2
-
31
-
-
79951832876
-
Data breaches up almost 50 percent, affecting records of 35.7 million people
-
January 6
-
B. Krebs, Data breaches up almost 50 percent, affecting records of 35.7 million people, The Washington Post (2009), January 6, D02.
-
(2009)
The Washington Post
-
-
Krebs, B.1
-
32
-
-
0011765591
-
Event Studies in Economics and Finance
-
A.C. MacKinlay, Event studies in economics and finance, Journal of Economic Literature 35 (1997), 13-39. (Pubitemid 127461268)
-
(1997)
Journal of Economic Literature
, vol.35
, Issue.1
, pp. 13-39
-
-
MacKinlay, A.C.1
-
33
-
-
0001641008
-
Corporate capital expenditure decisions and the market value of the firm
-
J.J. McConnell and C.J. Muscarella, Corporate capital expenditure decisions and the market value of the firm, Journal of Financial Economics 13 (1985), 399-422.
-
(1985)
Journal of Financial Economics
, vol.13
, pp. 399-422
-
-
McConnell, J.J.1
Muscarella, C.J.2
-
35
-
-
0004198635
-
-
3rd edn, Pearson Education, Upper Saddle River, NJ, USA
-
C. Pfleeger and S.L. Pfleeger, Security in Computing, 3rd edn, Pearson Education, Upper Saddle River, NJ, USA, 2007.
-
(2007)
Security in Computing
-
-
Pfleeger, C.1
Pfleeger, S.L.2
-
36
-
-
0036508551
-
2002 CSI/FBI computer crime and security survey
-
R. Power, CSI/FBI, computer crime and security survey, Computer Security Issues and Trends 18 (2002), 7-30. (Pubitemid 34725543)
-
(2002)
Computer Security Journal
, vol.18
, Issue.2
, pp. 7-30
-
-
Power, R.1
-
40
-
-
34547100991
-
An empirical analysis of the impact of software vulnerability announcements on firm stock price
-
DOI 10.1109/TSE.2007.70712
-
R. Telang and S. Wattal, Impact of software vulnerability announcements on the market value of software vendors - an empirical investigation, IEEE Transactions on Software Engineering 33 (2007), 544-557. (Pubitemid 47098724)
-
(2007)
IEEE Transactions on Software Engineering
, vol.33
, Issue.8
, pp. 544-557
-
-
Telang, R.1
Wattal, S.2
-
41
-
-
0002067431
-
NetSTAT: A network-based intrusion detection system
-
G. Vigna and R.A. Kemmerer, NetSTAT: a network-based intrusion detection system, Journal of Computer Security 7 (1999), 37-71.
-
(1999)
Journal of Computer Security
, vol.7
, pp. 37-71
-
-
Vigna, G.1
Kemmerer, R.A.2
|