The Long-Run Impact of Information Security Breach Announcements on Investors’ Confidence: The Context of Efficient Market Hypothesis
Abstract
:1. Introduction
1.1. Impact on Investors’ Confidence
1.1.1. Long-Run Impact on Investors’ Confidence
1.1.2. Impact on Long-Run Abnormal Returns
1.1.3. Impact on Equity Risk
2. Literature Review
2.1. Efficient Market Theory and Studies on Short-Run Impact
2.2. Studies on Long-Run Impact
3. Hypothesis Development and Conceptual Framework
3.1. ISec Breaches and Long-Run Abnormal Returns
3.2. ISec Breaches and the Equity Risk of the Firm
4. Methodology
4.1. Sample Selection
- The firm is publicly listed in any of the stock exchange in US (i.e., New York Stock Exchange (NYSE) or the National Association of Securities Dealers Automated Quotations (NASDAQ).
- The firms must have returned information on the Center for Research on Security Prices (CRSP) database.
- The firm must trade on at least 80 percent of their trading days within one year before the ISec breach announcement.
- The firm did not report any other ISec breach within 18 months of this date of notification.
- When the breach occurred on an unlisted subsidiary firm, the parent company was tracked.
- The firm must have a book value greater than zero.
4.2. Assessing the Long-Run Abnormal Returns
4.2.1. Buy-and-Hold Abnormal Returns (BHARs) Using One-to-One Match Samples
- Choose a firm nearest in size to the sample firm from the sample firm’s industry (size-matched).
- Choose a firm nearest to the sample firm regarding its previous performance from the sample firm’s industry (market-book ratio).
4.3. Assessing the Equity Risk
4.4. Mapping of ISec-Events for Assessment of Investors’ Confidence
- Six months pre-announcement: trading days −135 to −11,
- Six months post-announcement: trading days 11 to 135,
- Twelve months post-announcement: trading days 136 to 260.
5. Results
5.1. Evidence of Long-Run Abnormal Returns
5.2. Evidence of Changes in Equity Standard Deviations
6. Discussion of Findings
6.1. Theoretical Contribution
6.2. Practical Contribution
6.3. Limitations of the Study and Future Research Directions
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Dalampira, E.S.; Nastis, S.A. Mapping sustainable development goals: A network analysis framework. Sustain. Dev. 2020, 28, 46–55. [Google Scholar] [CrossRef]
- Minges, M.; Korka, D.; Fondeur, S. UNCTAD Technical Notes on ICT for Development. Available online: https://unctad.org/system/files/officialdocument/tn_unctad_ict4d06_en.pdf (accessed on 1 April 2016).
- UN. Transforming Our World: The 2030 Agenda for Sustainable Development; United Nations General Assembly: New York, NY, USA, 2015. [Google Scholar]
- Shad, M.K.; Lai, F.-W.; Fatt, C.L.; Klemeš, J.J.; Bokhari, A. Integrating sustainability reporting into enterprise risk management and its relationship with business performance: A conceptual framework. J. Clean. Prod. 2019, 208, 415–425. [Google Scholar] [CrossRef]
- OECD/WTO. Aid for Trade at a Glance 2017-Promoting Trade, Inclusiveness and Connectivity for Sustainable Development; OECD Publishing: Paris, France, 2017. [Google Scholar]
- Evangelista, R.; Guerrieri, P.; Meliciani, V. The economic impact of digital technologies in Europe. Econ. Innov. N. Tech. 2014, 23, 802–824. [Google Scholar] [CrossRef]
- Demekas, D.G. Emerging Technology-Related Issues in Finance and the IMF—A Stocktaking. Available online: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3330190 (accessed on 24 February 2019).
- Fama, E.F.; French, K.R. Dissecting anomalies. J. Financ. 2008, 63, 1653–1678. [Google Scholar] [CrossRef]
- Savoie, M. Security. In Building Successful Information Systems: Five Best Practices to Ensure Organizational Effectiveness and Profitability, 2nd ed.; Business Expert Press: New York, NY, USA, 2016. [Google Scholar] [CrossRef]
- Ponemon Institute. Cost of a Data Breach Report; IBM Security: North Traverse City, MI, USA, 2020. [Google Scholar]
- Cavusoglu, H.; Mishra, B.; Raghunathan, S. The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers. Int. J. Electron. Commer. 2004, 9, 70–104. [Google Scholar] [CrossRef]
- Smith, K.T.; Jones, A.; Johnson, L.; Smith, L.M. Examination of cybercrime and its effects on corporate stock value. J. Inf. Commun. Ethics Soc. 2019, 17, 42–60. [Google Scholar] [CrossRef]
- Bose, I.; Leung, A.C.M. Do phishing alerts impact global corporations? A firm value analysis. Decis. Support. Syst. 2014, 64, 67–78. [Google Scholar] [CrossRef]
- Ettredge, M.; Richardson, V.J. Assessing the risk in e-commerce. In Proceedings of the Annual Hawaii International Conference on System Sciences, Big Island, HI, USA, 10 January 2002; pp. 1–11. [Google Scholar]
- Campbell, K.; Gordon, L.A.; Loeb, M.P.; Zhou, L. The economic cost of publicly announced information security breaches: Empirical evidence from the stock market. J. Comput. Secur. 2003, 11, 431–448. [Google Scholar] [CrossRef] [Green Version]
- Hovav, A.; D’Arcy, J. The impact of virus attack announcements on the market value of firms. Inf. Syst. Secur. 2004, 13, 32–40. [Google Scholar] [CrossRef]
- Kannan, K.; Rees, J.; Sridhar, S. Market reactions to information security breach announcements: An empirical analysis. Int. J. Electron. Commer. 2007, 12, 69–91. [Google Scholar] [CrossRef]
- Malhotra, A.; Kubowicz Malhotra, C. Evaluating customer information breaches as service failures: An event study approach. J. Serv. Res. 2011, 14, 44–59. [Google Scholar] [CrossRef] [Green Version]
- Sinanaj, G.; Muntermann, J. Assessing corporate reputational damage of data breaches: An empirical analysis. In Proceedings of the 26th Bled EConference—EInnovations Challenges and Impacts for Individuals, Organizations and Society, Bled, Slovenia, 9–13 June 2013; pp. 78–89. [Google Scholar]
- Tweneboah-Kodua, S.; Atsu, F.; Buchanan, W. Impact of cyberattacks on stock performance: A comparative study. Inf. Comput. Secur. 2018, 26, 637–652. [Google Scholar] [CrossRef]
- Fama, E.F.; Fisher, L.; Jensen, M.C.; Roll, R. The adjustment of stock prices to new information. Int. Econ. Rev. 1969, 10, 1–21. [Google Scholar] [CrossRef]
- Schwartz, R.A. Efficient capital markets: A review of theory and empirical work: Discussion. J. Financ. 1970, 25, 421–423. [Google Scholar] [CrossRef]
- Fama, E.F. Market efficiency, long-term returns, and behavioral finance. J. Finan. Econ. 1998, 49, 283–306. [Google Scholar] [CrossRef]
- Robert, A.; Haugen, N.L.B. Case closed. In Handbook of Portfolio Construction: Contemporary Applications of Markowitz Techniques; Springer Science & Business Media: Anchorage, AK, USA, 2009. [Google Scholar]
- Shiller, R.J. Measuring bubble expectations and investor confidence. J. Psych. Fin. Mark. 2000, 1, 49–60. [Google Scholar] [CrossRef]
- Hendricks, K.B.; Singhal, V.R. The effect of supply chain glitches on shareholder wealth. J. Oper. Manag. 2003, 21, 501–522. [Google Scholar] [CrossRef]
- Galai, D.; Masulis, R.W. The option pricing model and the risk factor of stock. J. Finan. Econ. 1976, 3, 53–81. [Google Scholar] [CrossRef]
- Smith, C.W., Jr.; Warner, J.B. On financial contracting: An analysis of bond covenants. J. Finan. Econ. 1979, 7, 117–161. [Google Scholar] [CrossRef]
- Gordon, L.A.; Loeb, M.P. Budgeting process for information security expenditures. Commun. ACM 2006, 49, 121–125. [Google Scholar] [CrossRef]
- Gordon, L.A.; Loeb, M.P. The economics of information security investment. ACM Trans. Inf. Syst. Secur. 2002, 5, 438–457. [Google Scholar] [CrossRef]
- Hsu, C.; Lee, J.N.; Straub, D.W. Institutional influences on information systems security innovations. Inf. Syst. Res. 2012, 23, 918–939. [Google Scholar] [CrossRef]
- Wang, T.; Kannan, K.N.; Ulmer, J.R. The association between the disclosure and the realization of information security risk factors. Inf. Syst. Res. 2013, 24, 201–218. [Google Scholar] [CrossRef] [Green Version]
- Gordon, L.A.; Loeb, M.P.; Sohail, T. Market value of voluntary disclosures concerning information security. MIS Q. 2010, 34, 567–594. [Google Scholar] [CrossRef] [Green Version]
- Lowry, P.B.; Cao, J.; Everard, A. Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two cultures. J. Manag. Inf. Syst. 2011, 27, 163–200. [Google Scholar] [CrossRef]
- Hovav, A.; D’Arcy, J. Capital market reaction to defective IT products: The case of computer viruses. Comput. Secur. 2005, 24, 409–424. [Google Scholar] [CrossRef]
- Deane, J.K.; Goldberg, D.M.; Rakes, T.R.; Rees, L.P. The effect of information security certification announcements on the market value of the firm. Inf. Technol. Manag. 2019, 20, 107–121. [Google Scholar] [CrossRef]
- Goldstein, J.; Chernobai, A.; Benaroch, M. An event study analysis of the economic impact of IT operational risk and its subcategories. J. Assoc. Inf. Syst. 2011, 12, 606–631. [Google Scholar] [CrossRef]
- Cao, J.; Calderon, T.; Chandra, A.; Wang, L. Analyzing late SEC filings for differential impacts of IS and accounting issues. Int. J. Account. Inf. Syst. 2010, 11, 189–207. [Google Scholar] [CrossRef]
- Chai, S.; Kim, M.; Rao, H.R. Firms’ information security investment decisions: Stock market evidence of investors’ behavior. Decis. Support. Syst. 2011, 50, 651–661. [Google Scholar] [CrossRef]
- Goel, S.; Shawky, H.A. Estimating the market impact of security breach announcements on firm values. Inf. Manag. 2009, 46, 404–410. [Google Scholar] [CrossRef]
- Hovav, A.; Gray, P. The ripple effect of an information security breach event: A stakeholder analysis. Commun. Assoc. Inf. Syst. 2014, 34, 893–912. [Google Scholar] [CrossRef]
- Hovav, A.; Andoh-Baidoo, F.K.; Dhillion, G. Classification of security breaches and their impact on the market value of firms. In Proceedings of the 6th Annual Security Conference, Las Vegas, NV, USA, 11–12 April 2007. [Google Scholar]
- Telang, R.; Wattal, S. An empirical analysis of the impact of software vulnerability announcements on firm stock price. IEEE Trans. Softw. Eng. 2007, 33, 544–557. [Google Scholar] [CrossRef] [Green Version]
- Hovav, A.; D’Arcy, J. The impact of denial-of-service attack announcements on the market value of firms. Risk Manag. Insur. Rev. 2003, 6, 97–121. [Google Scholar] [CrossRef]
- Garg, A.; Curtis, J.; Halper, H. Quantifying the financial impact of IT security breaches. Inf. Manag. Comput. Secur. 2003, 11, 74–83. [Google Scholar] [CrossRef]
- Acquisti, A.; Friedman, A.; Telang, R.J.I.P. Is there a cost to privacy breaches? An event study. In Proceedings of the 27th International Conference on Information Systems, Milwaukee, WI, USA, 10–13 December 2006. [Google Scholar]
- Tanimura, J.K.; Wehrly, E.W. The market value and reputational effects from lost confidential information. Int. J. Financ. Manag. 2009, 5, 18–35. [Google Scholar] [CrossRef]
- Hinz, O.; Nofer, M.; Schiereck, D.; Trillig, J. The influence of data theft on the share prices and systematic risk of consumer electronics companies. Inf. Manag. 2015, 52, 337–347. [Google Scholar] [CrossRef]
- Yayla, A.A.; Hu, Q. The impact of information security events on the stock value of firms: The effect of contingency factors. J. Inf. Technol. 2011, 26, 60–77. [Google Scholar] [CrossRef]
- Lin, Z.; Sapp, T.R.; Ulmer, J.R.; Parsa, R. Insider trading ahead of cyber breach announcements. J. Financ. Mark. 2019, 50, 100527–100541. [Google Scholar] [CrossRef]
- Agrawal, A.; Jaffe, J.F.; Mandelker, G.N. The post-merger performance of acquiring firms: A re-examination of an anomaly. J. Financ. 1992, 47, 1605–1621. [Google Scholar] [CrossRef]
- Draper, P.; Paudyal, K. Acquisitions: Prvate versus public. Eur. Financ. Manag. 2006, 12, 57–80. [Google Scholar] [CrossRef]
- Lehn, K.M.; Zhao, M. CEO turnover after acquisitions: Are bad bidders fired? J. Financ. 2006, 61, 1759–1811. [Google Scholar] [CrossRef]
- Loughran, T.; Vijh, A.M. Do long-term shareholders benefit from corporate acquisitions? J. Financ. 1997, 52, 1765–1790. [Google Scholar] [CrossRef]
- Boehme, R.D.; Sorescu, S.M. The long-run performance following dividend initiations and resumptions: Underreaction or product of chance? J. Financ. 2002, 57, 871–900. [Google Scholar] [CrossRef]
- Ikenberry, D.; Lakonishok, J.; Vermaelen, T. Market underreaction to open market share repurchases. J. Financ. Econ. 1995, 39, 181–208. [Google Scholar] [CrossRef] [Green Version]
- Ikenberry, D.L.; Ramnath, S. Underreaction to self-selected news events: The case of stock splits. Rev. Financ. Stud. 2002, 15, 489–526. [Google Scholar] [CrossRef]
- Kryzanowski, L.; Zhang, H. Market behaviour around Canadian stock-split ex-dates. J. Empir. Financ. 1993, 1, 57–81. [Google Scholar] [CrossRef]
- Michaely, R.; Thaler, R.H.; Womack, K.L. Price reactions to dividend initiations and omissions: Overreaction or drift? J. Financ. 1995, 50, 573–608. [Google Scholar] [CrossRef]
- Bradley, D.J.; Jordan, B.D.; Yi, H.C.; Roten, I.C. Venture capital and IPO lockup expiration: An empirical analysis. J. Finan. Res. 2001, 24, 465–493. [Google Scholar] [CrossRef]
- Dharan, B.G.; Ikenberry, D.L. The long-run negative drift of post-listing stock returns. J. Financ. 1995, 50, 1547–1574. [Google Scholar] [CrossRef]
- Ritter, J.R. The long-run performance of initial public offerings. J. Financ. 1991, 46, 3–27. [Google Scholar] [CrossRef]
- Teoh, S.H.; Welch, I.; Wong, T.J. Earnings management and the long-run market performance of initial public offerings. J. Financ. 1998, 53, 1935–1974. [Google Scholar] [CrossRef] [Green Version]
- Espenlaub, S.; Gregory, A.; Tonks, I. Re-assessing the long-term underperformance of UK Initial Public Offerings. Eur. Financ. Manag. 2000, 6, 319–342. [Google Scholar] [CrossRef]
- Muntermann, J.; Roßnagel, H. On the effectiveness of privacy breach disclosure legislation in Europe: Empirical evidence from the US stock market. In Proceedings of the Nordic Conference on Secure IT Systems, Oslo, Norway, 14–16 October 2009; pp. 1–14. [Google Scholar]
- Liginlal, D.; Sim, I.; Khansa, L. How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management. Comput. Secur. 2009, 28, 215–228. [Google Scholar] [CrossRef]
- Gatzlaff, K.M.; McCullough, K.A. The effect of data breaches on shareholder wealth. Risk Manag. Insur. Rev. 2010, 13, 61–83. [Google Scholar] [CrossRef]
- Patel, N. The effect of IT hack announcements on the market value of publicly traded corporations. Duke J. Econ. April 2010, 22, 1–25. [Google Scholar]
- Bolster, P.; Pantalone, C.H.; Trahan, E.A. Security breaches and firm value. J. Bus. Valuat. Econ. Loss Anal. 2010, 5, 1–13. [Google Scholar] [CrossRef]
- Andoh-Baidoo, F.K.; Amoako-Gyampah, K.; Osei-Bryson, K.M. How internet security breaches harm market value? IEEE Secur. Priv. 2010, 8, 36–42. [Google Scholar] [CrossRef]
- Smith, K.T.; Smith, L.M.; Smith, J.L. Case studies of cybercrime and their impact on marketing activity and shareholder value. Acad. Mark. Stud. J. 2011, 15, 67–82. [Google Scholar]
- Morse, E.A.; Raval, V.; Wingender, J.R. Market price effects of data security breaches: A global perspective. Inf. Secur. J. 2011, 20, 263–273. [Google Scholar] [CrossRef]
- Gordon, L.A.; Loeb, M.P.; Zhou, L. The impact of information security breaches: Has there been a downward shift in costs? J. Comput. Secur. 2011, 19, 33–56. [Google Scholar] [CrossRef]
- Wang, T.; Ulmer, J.R.; Kannan, K. The textual contents of media reports of information security breaches and profitable short-term investment opportunities. J. Organ. Comput. Electron. Commer. 2013, 23, 200–223. [Google Scholar] [CrossRef]
- Goel, S.; Shawky, H.A. The impact of federal and state notification laws on security breach announcements. Commun. Assoc. Inf. Syst. 2014, 34, 37–50. [Google Scholar] [CrossRef]
- Pirounias, S.; Mermigas, D.; Patsakis, C. The relation between information security events and firm market value, empirical evidence on recent disclosures: An extension of the GLZ study. J. Inf. Secur. Appl. 2014, 19, 257–271. [Google Scholar] [CrossRef]
- Arcuri, M.C.; Brogi, M.; Gandolfi, G. The effect of information security breaches on stock returns: Is the cyber crime a threat to firms? In Proceedings of the European Financial Management Meeting, Rome, Italy, 25–28 June 2014; pp. 1–12. [Google Scholar]
- Das, S.; Mukhopadhyay, A.; Anand, M. Stock market response to information security breach: A study using firm and attack characteristics. J. Inf. Priv. Sec. 2012, 8, 27–55. [Google Scholar] [CrossRef]
- Modi, S.B.; Wiles, M.A.; Mishra, S. Shareholder value implications of service failures in triads: The case of customer information security breaches. J. Oper. Manag. 2015, 35, 21–39. [Google Scholar] [CrossRef]
- Schatz, D.; Bashroush, R. The impact of repeated data breach events on organisations’ market value. Inf. Comput. Secur. 2016, 24, 73–92. [Google Scholar] [CrossRef] [Green Version]
- Chen, Y.; Dong, F.; Chen, H.; Xu, L. Can cross-listing mitigate the impact of an information security breach announcement on a firm’s values? In Proceedings of the 7th International Scientific Practical Conference “Innovative Technologies in Engineering”, Yurga, Russia, 19–21 May 2016. [Google Scholar]
- Martin, K.D.; Borah, A.; Palmatier, R.W. Data privacy: Effects on customer and firm performance. J. Mark. 2017, 81, 36–58. [Google Scholar] [CrossRef] [Green Version]
- Sinanaj, G.; Zafar, H. Who wins in a data breach? A comparative study on the intangible costs of data breach incidents. In Proceedings of the Pacific Asia Conference on Information Systems (PACIS), Chiayi City, Taiwan, 27 June–1 July 2016; pp. 60–75. [Google Scholar]
- Arcuri, M.C.; Brogi, M.; Gandolfi, G. How does cyber crime affect firms? The effect of information security breaches on stock returns. In Proceedings of the First Italian Conference on Cybersecurity, Venice, Italy, 17–20 January 2017; pp. 175–193. [Google Scholar]
- Johnson, M.S.; Kang, M.J.; Lawson, T. Stock price reaction to data breaches. J. Financ. Issues 2017, 16, 1–12. [Google Scholar]
- Abhishta, A.; Joosten, R.A.; Nieuwenhuis, L.J.M. Analysing the impact of a DDoS attack announcement on victim stock prices. In Proceedings of the 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing, PDP 2017, St. Petersburg, Russia, 6–8 March 2017; pp. 354–362. [Google Scholar]
- Rosati, P.; Cummins, M.; Deeney, P.; Gogolin, F.; van der Werff, L.; Lynn, T. The effect of data breach announcements beyond the stock price: Empirical evidence on market activity. Int. Rev. Financ. Anal. 2017, 49, 146–154. [Google Scholar] [CrossRef] [Green Version]
- Hovav, A.; Han, J.Y.; Kim, J. Market reaction to security breach announcements: Evidence from South Korea. Data Base Adv. Inf. Syst. 2017, 48, 11–52. [Google Scholar] [CrossRef]
- Patsakis, C.; Charemis, A.; Papageorgiou, A.; Mermigas, D.; Pirounias, S. The market’s response toward privacy and mass surveillance: The snowden aftermath. Comput. Secur. 2018, 73, 194–206. [Google Scholar] [CrossRef]
- Jeong, C.Y.; Lee, S.Y.T.; Lim, J.H. Information security breaches and IT security investments: Impacts on competitors. Inf. Manag. 2019, 56, 681–695. [Google Scholar] [CrossRef]
- Rosati, P.; Deeney, P.; Cummins, M.; Van der Werff, L.; Lynn, T. Social media and stock price reaction to data breach announcements: Evidence from US listed companies. Res. Int. Bus. Financ. 2019, 47, 458–469. [Google Scholar] [CrossRef]
- Chang, K.-C.; Gao, Y.-K.; Lee, S.-C. The effect of data theft on a firm’s short-term and long-term market value. Mathematics 2020, 8, 808. [Google Scholar] [CrossRef]
- Filbeck, G.; Swinarski, M.; Zhao, X. Shareholder reaction to firm investments in the capability maturity model: An event study. Eur. J. Inf. Syst. 2013, 22, 170–190. [Google Scholar] [CrossRef]
- Dehning, B.; Richardson, V.J.; Zmud, R.W. The financial performance effects of IT-based supply chain management systems in manufacturing firms. J. Oper. Manag. 2007, 25, 806–824. [Google Scholar] [CrossRef]
- Hendricks, K.B.; Singhal, V.R.; Stratman, J.K. The impact of enterprise systems on corporate performance: A study of ERP, SCM and CRM system implementations. J. Oper. Manag. 2007, 25, 65–82. [Google Scholar] [CrossRef]
- Bener, A.B. Risk Perception, Trust and Credibility: A Case in Internet Banking. Ph.D. Thesis, London School of Economics and Political Sciences, London, UK, 2000. [Google Scholar]
- Barber, B.M.; Lyon, J.D. Detecting long-run abnormal stock returns: The empirical power and specification of test statistics. J. Financ. Econ. 1997, 43, 341–372. [Google Scholar] [CrossRef] [Green Version]
- Kothari, S.; Warner, J.B. Measuring long-horizon security price performance. J. Financ. Econ. 1997, 43, 301–339. [Google Scholar] [CrossRef]
- Lyon, J.D.; Barber, B.M.; Tsai, C.L. Improved methods for tests of long-run abnormal stock returns. J. Financ. 1999, 54, 165–201. [Google Scholar] [CrossRef]
- Hendricks, K.B.; Singhal, V.R. The effect of demand–supply mismatches on firm risk. Prod. Oper. Manag. 2014, 23, 2137–2151. [Google Scholar] [CrossRef]
- Healy, P.M.; Palepu, K.G. Earnings and risk changes surrounding primary stock offers. J. Account. Res. 1990, 28, 25–48. [Google Scholar] [CrossRef] [Green Version]
- Hertzel, M.; Jain, P.C. Earnings and risk changes around stock repurchase tender offers. J. Account. Econ. 1991, 14, 253–274. [Google Scholar] [CrossRef]
- Fargher, N.L.; Wilkins, M.S. Evidence on risk changes around audit qualification and qualification withdrawal announcements. J. Bus. Financ. Account. 1998, 25, 829–847. [Google Scholar] [CrossRef] [Green Version]
- Clayton, M.C.; Hartzell, J.C.; Rosenberg, J. The impact of CEO turnover on equity volatility. J. Bus. 2005, 78, 1779–1808. [Google Scholar] [CrossRef] [Green Version]
- Barberis, N.; Huang, M. Mental accounting, loss aversion, and individual stock returns. J. Financ. 2001, 56, 1247–1292. [Google Scholar] [CrossRef] [Green Version]
- Xu, Y.; Malkiel, B.G. Investigating the behavior of idiosyncratic volatility. J. Bus. 2003, 76, 613–645. [Google Scholar] [CrossRef] [Green Version]
- Goyal, A.; Santa-Clara, P. Idiosyncratic risk matters! J. Financ. 2003, 58, 975–1007. [Google Scholar] [CrossRef]
- Ang, A.; Hodrick, R.J.; Xing, Y.; Zhang, X. The cross-section of volatility and expected returns. J. Financ. 2006, 61, 259–299. [Google Scholar] [CrossRef] [Green Version]
- Bali, T.G.; Cakici, N.; Yan, X.; Zhang, Z. Does idiosyncratic risk really matter? J. Financ. 2005, 60, 905–929. [Google Scholar] [CrossRef]
- Hsieh, S.J.; Jerris, S.I.; Kross, W. Quarterly earnings announcements and market risk adjustments. J. Bus. Financ. Account. 1999, 26, 313–336. [Google Scholar] [CrossRef]
- Ashbaugh-Skaife, H.; Collins, D.W.; Kinney, W.R., Jr.; LaFond, R. The effect of SOX internal control deficiencies on firm risk and cost of equity. J. Account. Res. 2009, 47, 1–43. [Google Scholar] [CrossRef]
- Lee, I.; Loughran, T. Performance following convertible bond issuance. J. Corp. Financ. 1998, 4, 185–207. [Google Scholar] [CrossRef]
- Hendricks, K.B.; Singhal, V.R. An empirical analysis of the effect of supply chain disruptions on long-run stock price performance and equity risk of the firm. Prod. Oper. Manag. 2005, 14, 35–52. [Google Scholar] [CrossRef]
- Ali, S.E.A.; Khurram, S. Impact of demographic and health factors on GDP growth of South Asian Countries. Int. J. Acad. Res. Bus. Soc. Sci. 2017, 7, 2222–6990. [Google Scholar]
- Carhart, M.M. On persistence in mutual fund performance. J. Financ. 1997, 52, 57–82. [Google Scholar] [CrossRef]
- Fama, E.F.; French, K.R. Multifactor explanations of asset pricing anomalies. J. Financ. 1996, 51, 55–84. [Google Scholar] [CrossRef]
- Jegadeesh, N.; Titman, S. Returns to buying winners and selling losers: Implications for stock market efficiency. J. Financ. 1993, 48, 65–91. [Google Scholar] [CrossRef]
- Cowan, A.R.; Sergeant, A.M. Interacting biases, non-normal return distributions and the performance of tests for long-horizon event studies. J. Bank. Fin. 2001, 25, 741–765. [Google Scholar] [CrossRef]
- Bhagat, S.; Brickley, J.A.; Loewenstein, U. The pricing effects of interfirm cash tender offers. J. Financ. 1987, 42, 965–986. [Google Scholar] [CrossRef]
- Dann, L.Y.; Masulis, R.W.; Mayers, D. Repurchase tender offers and earnings information. J. Account. Econ. 1991, 14, 217–251. [Google Scholar] [CrossRef]
- Abergel, F.; Politi, M. Optimizing a basket against the efficient market hypothesis. Quant. Financ. 2013, 13, 13–23. [Google Scholar] [CrossRef]
- Malkiel, B.G. The efficient market hypothesis and its critics. J. Econ. Perspect. 2003, 17, 59–82. [Google Scholar] [CrossRef] [Green Version]
- Shleifer, A.; Vishny, R.W. The limits of arbitrage. J. Financ. 1997, 52, 35–55. [Google Scholar] [CrossRef]
- De Bondt, W.F.; Thaler, R.H. Further evidence on investor overreaction and stock market seasonality. J. Financ. 1987, 42, 557–581. [Google Scholar] [CrossRef]
- StarTribune. Target settles class-action suit over data breach claims for $39 million. StarTribune. 7 January 2017. Available online: https://www.startribune.com/financial-firms-target-settle-breach-claims-for-39-million/360051311/ (accessed on 13 December 2020).
- Sidel, R. Home depot’s 56 million card breach bigger than target’s. Wall Street Journal. 18 September 2014. Available online: https://www.wsj.com/articles/home-depot-breach-bigger-than-targets-1411073571 (accessed on 13 December 2020).
- Khansa, L.; Cook, D.F.; James, T.; Bruyaka, O. Impact of HIPAA provisions on the stock market value of healthcare institutions, and information security and other information technology firms. Comput. Secur. 2012, 31, 750–770. [Google Scholar] [CrossRef]
Authors | Time Interval | Estimation Model | Sample Events | Event Window | Findings |
---|---|---|---|---|---|
Garg, Curtis, and Halper (2003) [45] | 1996–2002 | One factor | 22 | (0, 2) | Significant negative, (5.6%) |
Campbell, Gordon, Loeb, and Zhou (2003) [15] | 1995–2001 | One factor | 43 | (−1, 1) | Insignificant negative |
Hovav and D’Arcy (2003) [44] | 1998–2002 | One factor | 23 | (−1, 0), (−1, 1), (1, 5), (−1, 10), (−1, 25) | Insignificant negative |
Ettredge and Richardson (2003) [14] | 2000 | One factor | 4 | (0.3), (0,6) | Significant negative, (−4 to −10%) |
Cavusoglu, Mishra, and Raghunathan (2004) [8] | 1996–2001 | One factor | 66 | (0, 1) | Significant negative, (−2.1%) |
Hovav and D’Arcy (2004) [16] | 1988–2002 | One factor | 186 | (0, 0), (0, 1), (0, 5), (0, 10), (0, 25) | Insignificant negative |
Hovav and D’Arcy (2005) [35] | 1988–2002 | One factor | 92 | (0, 1), (0, 5), (0, 10), (0, 25) | Insignificant negative |
Acquisti, Friedman, and Telang (2006) [46] | 2000–2006 | One factor | 79 | (0, 1) | Significant negative, (−0.58%) |
Kannan, Rees, and Sridhar (2007) [17] | 1997–2003 | One factor | 72 | (−1, 2), (−1, 7), (−1, 29) | Insignificant negative |
Goel and Shawky (2009) [40] | 2004–2008 | Three factor | 168 | (−119, 10) | Significant negative, (−1.1%) |
Muntermann and Roßnagel (2009) [65] | 2001–2007 | One factor | 97 | (−5, 5) | Significant negative, (−0.42%) |
Liginlal, Sim, and Khansa (2009) [66] | 2005–2008 | One factor | 151 | (−2, 9) | Significant negative, (−0.59 to −0.72%) |
Gatzlaff and McCullough (2010) [67] | 2004–2006 | One factor | 77 | (0, 1) | Significant negative, (−0.46%) |
Patel (2010) [68] | – | One factor | 34 | (0, 2), (0, 7), (0, 29) | Significant negative, (−2.27%) |
Bolster, Pantalone, and Trahan (2010) [69] | 2000–2007 | One factor | 93 | (−1, 0), (−1, 1), (1, 30) | Insignificant positive |
Andoh-Baidoo, Amoako-Gyampah, and Osei-Bryson (2010) [70] | 1997–2003 | One factor | 41 | (−1, 1) | Significant negative (3.18%) |
Yayla and Hu (2011) [49] | 1994–2006 | One factor | 123 | (−1, 1), (−1, 5), (−1,10) | Significant negative, (−0.92 to −1.61%) |
Katherine T. Smith, Smith, and Smith (2011) [71] | 2000–2005 | One factor | 10 | (0, 1), (0, 3) | Significant negative, (−2.2 to 3.5%) |
Morse, Raval, and Wingender (2011) [72] | 2000–2010 | One factor | 306 | (0, 1) | Significant negative, (−0.28%) |
Gordon, Loeb, and Zhou (2011) [73] | 1995–2007 | One factor, three-factor | 121 | (−1, 1) | Significant negative, (−1.36%) |
Malhotra and Kubowicz Malhotra (2011) [18] | 2000–2007 | Four factor | 93 | (−1, 1), (2, 30) | Significant negative, (−0.78 to −1.92%) |
Sinanaj and Muntermann (2013) [15] | 2004–2011 | One factor | 72 | (−5, 5) | Significant negative, (0.72 to 1.55%) |
Wang, Ulmer, and Kannan (2013) [74] | 1997–2008 | One factor | 89 | (−1, 1) | Significant negative, (−0.15%) |
Goel and Shawky (2014) [75] | 2001–2008 | One factor, four factor model | 201 | (−30, 30) | Significant negative, (−0.63%) |
Pirounias, Mermigas, and Patsakis(2014) [76] | 2008–2012 | Three factor model | 105 | (−1, 0, 1) | Significant negative, (−0.39%) |
Arcuri, Brogi, and Gandolfi (2014) [77] | 1995–2012 | One factor | 128 | (−20, 20), (−10, 10), (−5, 5), (−3, 3), (−1, 1) | Significant negative, (−0.3 to −1.2%) |
Das, Mukhopadhyay, and Anand (2014) [78] | 2000–2012 | Three factor | 101 | (−1, 1), (−1, 3) | Insignificant negative |
S. Modi, M. Wiles and S. Mishra Modi, Wiles, and Mishra (2015) [79] | 1995–2012 | One factor | 128 | (−2, 2) | Significant negative, (−1.17%) |
Hinz, Nofer, Schiereck, and Trillig (2015) [48] | 2011–2012 | One factor | 6 | (0, 1), (0, 2), (0, 3), (0,5)) | Significant negative, (−1.16 to −4.06%) |
Schatz and Bashroush (2016) [80] | 2005–2014 | One factor | 120 | (−1, 1), (0, 0), (1, 5), (−1, 5) | Insignificant negative |
Y. Chen, Dong, Chen, and Xu(2016) [81] | 2005–2014 | One factor | 50 | (−2, 2) | Significant negative, (−2.38%) |
Martin, Borah, and Palmatier (2016) [82] | 2006–2015 | One factor | 414 | (−1, 1) | Significant negative, (−0.29%) |
Sinanaj and Zafar (2016) [83] | 2011–2013 | One factor | 28 | (−1, 10) | Insignificant negative |
Arcuri, Brogi, and Gandolfi (2017) [84] | 1995–2015 | One factor | 226 | (−20, 20), (−10, 10), (−5, 5), (−3, 3), (−20, −1), (−10, −1), (−5, −1), (−3, −1), (0, 20), (0, 10), (0, 5), (0, 3), (0, 1) | Significant negative, (−3.32 to −0.23%) |
Johnson, Kang, and Lawson (2017) [85] | 2005–2014 | One factor | 467 | (0, 2) | Significant negative, (−0.37%) |
Abhishta, Joosten, and Nieuwenhuis (2017) [86] | 2010–2015 | Three factor | 35 | (−1, 0), (−1, 1), (−1, 3), (−1, 5), (−1, 10) | Insignificant negative |
Rosati et al. (2017) [87] | 2005–2014 | Bid ask model | 74 | (−5, 5) | Significant negative, (−2.53%) |
Hovav, Han, and Kim (2017) [88] | 2001–2011 | One factor | 105 | (−1, 0), (−1, 1), (−1, 5), (−1, 10), (−1, 25) | Significant negative, (−0.34 to −0.39%) |
Patsakis, Charemis, Papageorgiou, Mermigas, and Pirounias (2018) [89] | 2013–2015 | One factor, Three factor | 80 | (0, 3) | Insignificant negative |
Tweneboah-Kodua, Atsu, and Buchanan (2018) [20] | 2013–2017 | One factor | 96 | (−30, 30) | Insignificant negative |
Katherine Taken Smith, Jones, Johnson, and Smith (2019) [12] | – | One factor | 10 | (−1, 1), (−3, 3), (−7, 7) | Insignificant negative |
Jeong, Lee, and Lim (2019) [90] | 2010–2017 | One factor | 118 | (−2, 2), (−1, 1), (0, 1), (0, 2) | Significant negative, (−0.251 to 0.42%) |
Rosati, Deeney, Cummins, van der Werff, and Lynn (2019) [91] | 2011–2014 | One factor | 87 | (0, 1), (0, 2), (0, 3), (4, 10) | Significant negative, (−0.8 to −1.6%) |
Chang (2020) [92] | 2003–2015 | One factor, Three factor, BHAR | 47, 33, and 26 | (0, 0), (0, 1), (1 year), (2 years), (3 years) | Significant negative, (−0.23%)—short-run Significant negative, (−10 to −34%)—long-run |
Year | Sample Size | Confounding Effect | Book Value < 0 | Event Period < 1 Year |
---|---|---|---|---|
2011 | 8 | 5 | 0 | 0 |
2012 | 10 | 6 | 0 | 0 |
2013 | 11 | 7 | 1 | 1 |
2014 | 12 | 6 | 0 | 0 |
2015 | 15 | 5 | 1 | 1 |
2016 | 20 | 7 | 0 | 0 |
2017 | 26 | 11 | 0 | 1 |
2018 | 28 | 10 | 1 | 1 |
2019 | 25 | 2 | 1 | 15 |
Total | 155 | 59 | 4 | 19 |
Measure | Mean | Median | Standard Deviation | Minimum | Maximum |
---|---|---|---|---|---|
Sales ($million) | 52,495.0 | 21,285.6 | 62,370.5 | 96.3 | 2,997,148 |
Equity market value ($million) | 85,7688.8 | 32,019.2 | 105,775.9 | 108.5 | 823,027.9 |
Total assets ($million) | 501,915.3 | 60,850 | 590,815 | 101.5 | 2,998,788 |
Operating income ($million) | 6127 | 2887 | 6227.3 | −1579 | 45,781 |
Market to Book | 6.1 | 2.1 | 19.5 | 0.8 | 150.6 |
Size-Matched Control Firm | Performance-Matched Control Firm | |||||||
---|---|---|---|---|---|---|---|---|
Observations | Mean | %Negative | t | Observations | Mean | %Negative | t | |
Six months before announcement (days −136 to −11) | 73 | 0.04 | 40% | 1.45 | 73 | −0.136 | 52% | −1.37 |
Six months after announcement (days 11 to 135) | 73 | −0.15 | 60% | −3.81 | 73 | −0.063 | 58% | −4.23 |
Twelve months after announcement (days 136 to 260) | 73 | −0.185 | 55% | −4.98 | 73 | −0.125 | 60% | −2.96 |
Six months before through twelve months after the announcement (days −136 to 260) | 73 | −0.125 | 57% | −2.97 | 73 | −0.09 | 55% | −1.99 |
Performance Statistics of Changes in Equity Standard Deviation (σe) | Time Period | |
---|---|---|
Six Months before through Six Months after the ISec Breach Announcement | Six Months before through Twelve Months after the ISec Breach Announcement | |
Relative to the size-matched control sample | ||
Number of observations | 73 | 73 |
Mean abnormal change in standard deviation | 0.135 | 0.07 |
% of abnormal changes that are positive | 58% | 40% |
t-statistic | 7.54 | 1.47 |
Relative to the performance-matched control sample | ||
Number of observations | 73 | 73 |
Mean abnormal change in standard deviation | 0.109 | 0.0673 |
% of abnormal changes that are positive | 52% | 44% |
t-statistic | 6.38 | 0.6351 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ali, S.E.A.; Lai, F.-W.; Hassan, R.; Shad, M.K. The Long-Run Impact of Information Security Breach Announcements on Investors’ Confidence: The Context of Efficient Market Hypothesis. Sustainability 2021, 13, 1066. https://doi.org/10.3390/su13031066
Ali SEA, Lai F-W, Hassan R, Shad MK. The Long-Run Impact of Information Security Breach Announcements on Investors’ Confidence: The Context of Efficient Market Hypothesis. Sustainability. 2021; 13(3):1066. https://doi.org/10.3390/su13031066
Chicago/Turabian StyleAli, Syed Emad Azhar, Fong-Woon Lai, Rohail Hassan, and Muhammad Kashif Shad. 2021. "The Long-Run Impact of Information Security Breach Announcements on Investors’ Confidence: The Context of Efficient Market Hypothesis" Sustainability 13, no. 3: 1066. https://doi.org/10.3390/su13031066
APA StyleAli, S. E. A., Lai, F. -W., Hassan, R., & Shad, M. K. (2021). The Long-Run Impact of Information Security Breach Announcements on Investors’ Confidence: The Context of Efficient Market Hypothesis. Sustainability, 13(3), 1066. https://doi.org/10.3390/su13031066