479
Views
23
CrossRef citations to date
0
Altmetric
Original Articles

The Textual Contents of Media Reports of Information Security Breaches and Profitable Short-Term Investment Opportunities

, &
Pages 200-223 | Published online: 18 Jul 2013

REFERENCES

  • Ajinkya , B. B. and Jain , P. C. 1989 . The behavior of daily stock market trading volume . Journal of Accounting and Economics , 1 ( 4 ) : 331 – 359 .
  • Aquisti , A. , Friedman , A. and Telang , R. 2006 . “Is there a cost to privacy breaches? An event study.” . In The 5th Workshop on the Economics of Information Security , England : Robinson College, University of Cambridge .
  • Atiase , A. and Bamber , L. 1994 . Trading volume reactions to annual accounting earnings announcements: The incremental role of predisclosure information asymmetry . Journal of Accounting and Economics , 17 ( 3 ) : 281 – 308 .
  • Ayers , B. C. , Jiang , J. and Yeung , P. E. 2006 . Discretionary accruals and earnings management: An analysis of pseudo earnings targets . The Accounting Review , 81 ( 3 ) : 617 – 652 .
  • Baesens , B. , Setiono , R. , Mues , C. and Vanthienen , J. 2003 . Using neural network rule extraction and decision tables for credit-risk evaluation . Management Science , 49 ( 3 ) : 312 – 329 .
  • Bamber , L. 1987 . Unexpected earnings, firm size, and trading volume around quarterly earnings announcements . The Accounting Review , 62 ( 3 ) : 510 – 532 .
  • Bamber , L. , Barron , O. E. and Stober , T. L. 1997 . Trading volume and different aspects of disagreement coincident with earnings announcements . The Accounting Review , 72 ( 4 ) : 575 – 597 .
  • Bamber , L. and Cheon , Y. S. 1995 . Differential price and volume reactions to accounting earnings announcements . The Accounting Review , 70 ( 3 ) : 417 – 441 .
  • Barron , O. E. , Byard , D. and Yu , Y. 2008 . Earnings surprises that motivate analysts to reduce average forecast error . The Accounting Review , 83 ( 2 ) : 303 – 325 .
  • Barth , M. , Kasznik , R. and McNichols , M. 2001 . Analyst coverage and intangible assets . Journal of Accounting Research , 39 ( 1 ) : 1 – 34 .
  • Beaver , W. 1968 . The information content of annual earnings announcements . Journal of Accounting Research , 6 : 67 – 92 .
  • Beneish , M. D. 2001 . Earnings management: A perspective . Managerial Finance , 27 ( 12 ) : 3 – 17 .
  • Bhattacharya , N. 2001 . Investors' trade size and trading responses around earnings announcements: An empirical investigation . The Accounting Review , 76 ( 2 ) : 221 – 244 .
  • Bhushan , R. 1989 . Firm characteristics and analyst following . Journal of Accounting and Economics , 11 ( 2–3 ) : 255 – 274 .
  • Bowen , P. , Hash , J. and Wilson , M. 2002 . Information security handbook: A guide for managers , Gaithersburg , MD : NIST Special Publication 800–100 .
  • Brandãn , L. E. , Dyer , J. S. and Hahn , W. J. 2005 . Using binomial decision trees to solve real-option valuation problems . Decision Analysis , 2 ( 2 ) : 69 – 88 .
  • Brown , L. D. 1991 . Forecast selection when all forecasts are not equally recent . International Journal of Forecasting , 7 ( 3 ) : 349 – 356 .
  • Brown , L. D. 1993 . Earnings forecasting research: Its implications for capital markets research . International Journal of Forecasting , 9 ( 3 ) : 295 – 320 .
  • Campbell , K. , Gordon , L. A. , Loeb , M. P. and Zhou , L. 2003 . The economic cost of publicly announced information security breaches: Empirical evidence from the stock market . Journal of Computer Security , 11 ( 3 ) : 431 – 448 .
  • Cavusoglu , H. , Mishra , B. and Raghunathan , S. 2004 . The effect of internet security breach announcements on market value of breached firms and internet security developers . International Journal of Electronic Commerce , 9 ( 1 ) : 69 – 105 .
  • Cecchini , M. , Aytug , H. , Koehler , G. J. and Pathak , P. 2010 . Detecting management fraud in public companies . Management Science , 56 ( 7 ) : 1146 – 1160 .
  • Christensen , B. J. and Prabhala , N. R. 1998 . The relation between implied and realized volatility . Journal of Financial Economics , 50 ( 2 ) : 125 – 150 .
  • Core , J. E. 2001 . A review of the empirical disclosure literature: Discussion . Journal of Accounting and Economics , 31 ( 1–3 ) : 441 – 456 .
  • CSI/FBI. 2007. “The CSI/FBI computer crime and security report in 2006.” Retrieved from (accessed April 9, 2007) http://abovesecurity.com/doc/communiquespdf/fbisurvey2006 (http://abovesecurity.com/doc/communiquespdf/fbisurvey2006)
  • Degeorge , F. , Patel , J. and Zeckhauser , R. 1999 . Earnings management to exceed thresholds . The Journal of Business , 72 ( 1 ) : 1 – 33 .
  • Easley , D. and O'Hara , M. 1987 . Price, trade size, and information in securities markets . Journal of Financial Economics , 19 ( 1 ) : 69 – 90 .
  • Elgers , P. and Murray , D. 1992 . The relative and complementary performance of analyst and security-price-based measures of expected earnings . Journal of Accounting and Economics , 15 ( 2–3 ) : 303 – 346 . “”
  • Ettredge , M. L. and Richardson , V. J. 2003 . Information transfer among internet firms: The case of hacker attacks . Journal of Information Systems , 17 ( 2 ) : 71 – 82 .
  • Fama , E. F. and French , K. R. 1992 . The cross-section of expected stock returns . Journal of Finance , 47 : 427 – 465 .
  • Fan , W. , Wallace , L. , Rich , S. and Zhang , Z. 2006 . Tapping the power of text mining . Communications of the ACM , 49 ( 9 ) : 77 – 82 .
  • Francis , J. , Hanna , J. D. and Philbrick , D. R. 1997 . Management communications with securities analysts . Journal of Accounting and Economics , 24 ( 3 ) : 363 – 394 .
  • Francis , J. , Schipper , K. and Vincent , L. 2002 . Earnings announcements and competing information . Journal of Accounting and Economics , 33 ( 3 ) : 313 – 342 .
  • Frankel , R. , Kothari , S. P. and Weber , J. 2006 . Determinants of the informativeness of analyst research . Journal of Accounting and Economics , 41 ( 1–2 ) : 29 – 54 .
  • Gal-Or , E. and Ghose , A. 2005 . The economic incentives for sharing security information . Information Systems Research , 16 ( 2 ) : 186 – 208 .
  • Garg , A. , Curtis , J. and Halper , H. 2003 . Quantifying the financial impact of IT security breaches . Information Management and Computer Security , 11 ( 2 ) : 74 – 83 .
  • Glover , S. , Liddle , S. and Prawitt , D. 2001 . E-Business: Principles and strategies for accountants , 2nd , Upper Saddle River , NJ : Prentice Hall .
  • Gordon , L. A. and Loeb , M. P. 2002 . The economics of information security investment . ACM Transactions on Information and System Security , 5 ( 4 ) : 438 – 457 .
  • Gordon , L. A. , Loeb , M. P. and Lucyshyn , W. 2003 . Sharing information on computer systems security: An economic analysis . Journal of Accounting and Public Policy , 22 ( 6 ) : 503 – 530 .
  • Goto , M. , Kawamura , T. , Wakai , K. , Ando , M. , Endoh , M. and Tomino , Y. 2008 . Risk stratification for progression of IgA nephropathy using a decision tree induction algorithm . Nephrology Dialysis Transplantation , 24 ( 4 ) : 1242 – 1247 .
  • Han , J. , Altman , R. , Kumar , V. , Mannila , H. and Pregibon , D. 2002 . Emerging scientific applications in data mining . Communications of the ACM , 45 ( 8 ) : 54 – 58 .
  • Harvey , C. R. and Whaley , R. E. 1992 . Dividends and S&P 100 index option valuation . Journal of Futures Markets , 12 ( 2 ) : 123 – 137 .
  • Hasbrouck , J. 1988 . Trades, quotes, inventories, and information . Journal of Financial Economics , 22 : 229 – 252 .
  • Hasbrouck , J. 1991 . Measuring the information content of stock trades . Journal of Finance , 46 ( 1 ) : 179 – 207 .
  • Hovav , A. and D'Arcy , J. 2003 . The impact of denial-of-service attack announcements on the market value of firms . Risk Management and Insurance Review , 6 ( 2 ) : 97 – 121 .
  • Ivkovic , Z. and Jegadeesh , N. 2004 . The timing and value of forecast and recommendation revisions . Journal of Financial Economics , 73 ( 3 ) : 433 – 463 .
  • Kannan , K. , Rees , J. and Sridhar , S. 2007 . Market reactions to information security breach announcements: An empirical study . International Journal of Electronic Commerce , 12 ( 1 ) : 69 – 91 .
  • Karpoff , J. M. 1986 . A theory of trading volume . Journal of Finance , 41 ( 5 ) : 1069 – 1087 .
  • Kasznik , R. and Lev , B. 1995 . To warn or not to warn: Management disclosures in the face of an earnings surprise . The Accounting Review , 70 ( 1 ) : 113 – 134 .
  • Kim , J. W. , Lee , B. H. , Shaw , M. J. , Chang , H. and Nelson , M. 2001 . Application of decision-tree induction techniques to personalized advertisements on internet storefronts . International Journal of Electronic Commerce , 5 ( 3 ) : 45 – 62 .
  • Kim , O. and Verrecchia , R. 1991 . Trading volume and price reactions to public announcements . Journal of Accounting Research , 29 ( 2 ) : 302 – 321 .
  • Kim , O. and Verrecchia , R. 1994 . Market liquidity and volume around earnings announcements . Journal of Accounting and Economics , 17 ( 1 ) : 41 – 67 .
  • Kim , O. and Verrecchia , R. 1997 . Pre-announcement and event-period private information . Journal of Accounting and Economics , 24 ( 3 ) : 395 – 419 . “”
  • Kohavi , R. 1995 . “A study of cross-validation and bootstrap for accuracy estimation and model selection.” . In Proceedings of the 14th International Joint Conference on Artificial Intelligence, Montréal , Canada : Québec .
  • Kross , W. , Ro , B. and Schroeder , D. 1990 . Earnings expectations: The analysts information advantage . The Accounting Review , 65 ( 2 ) : 461 – 476 .
  • Kwon , J. , Rees , J. and Wang , T. 2013 . The association between top management involvement and compensation and information security breaches . Journal of Information Systems, forthcoming. ,
  • Lakonishok , J. , Shleifer , A. and Vishny , R. W. 1992 . The impact of institutional trading on stock prices . Journal of Financial Economics , 32 : 23 – 43 .
  • Lang , M. H. and Lundholm , R. J. 1993 . Cross-sectional determinants of analyst ratings of corporate disclosures . Journal of Accounting Research , 31 ( 2 ) : 216 – 271 .
  • Lev , B. and Thiagarajan , R. 1993 . Fundamental information analysis . Journal of Accounting Research , 31 ( 2 ) : 190 – 215 .
  • Masand , B. , Linoff , G. and Waltz , D. 1992 . “Classifying news stories using memory based reasoning.” . In Proceedings of the 15th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval , Denmark : Copenhagen .
  • Matsumoto , D. A. 2002 . Management's incentives to avoid negative earnings surprises . The Accounting Review , 77 ( 3 ) : 483 – 514 .
  • McNichols , M. F. 2000 . Research design issues in earnings management studies . Journal of Accounting and Public Policy , 19 ( 4–5 ) : 313 – 345 .
  • Morse , D. 1981 . Price and trading volume reaction surrounding earnings announcements: A closer examination . Journal of Accounting Research , 19 ( 2 ) : 374 – 383 .
  • O'Brien , P. 1988 . Analysts' forecasts as earnings expectations . Journal of Accounting and Economics , 10 ( 1 ) : 53 – 83 .
  • Metrics , Option . 2006 . Ivy DB file and Data Reference Manual , New York : Author .
  • Peterson , C. , Luborsky , L. and Seligman , N. E. 1983 . Attribution and depressive mood shifts: A case study using the symptom-context method . Journal of Abnormal Psychology , 92 ( 1 ) : 96 – 103 .
  • Roulstone , D. T. 2003 . Analyst following and market liquidity . Contemporary Accounting Research , 20 ( 3 ) : 551 – 578 .
  • Institute , SAS . 2004 . Getting Started with SAS_9.1 Text Miner , Cary , NC : SAS Institute .
  • Schechter , S. E. and Smith , M. D. 2003 . “How much security is enough to stop a thief? The economics of outsider theft via computer systems networks.” . In Proceedings of the Financial Cryptography Conference , Guadeloupe : Gosier .
  • Sheikh , A. 1989 . Stock splits, volatility increases and implied volatility . Journal of Finance , 44 ( 5 ) : 1361 – 1372 .
  • Siponen , M. 2006 . Information security standards focus on the existence of process, not its content . Communications of the ACM , 49 ( 8 ) : 97 – 100 .
  • Siponen , M. and Iivari , J. 2006 . Six design theories for IS security policies and guidelines . Journal of the Association for Information Systems , 7 ( 7 ) : 445 – 472 .
  • Smyth , P. 2000 . Model selection for probabilistic clustering using cross-validated likelihood . Statistics and Computing , 10 ( 1 ) : 63 – 72 .
  • Stickel , S. E. 1990 . Predicting individual analyst earnings forecasts . Journal of Accounting Research , 28 ( 2 ) : 409 – 417 .
  • Still , S. and Bialek , W. 2004 . How many clusters? An information-theoretic perspective . Neural Computation , 16 ( 12 ) : 2483 – 2506 .
  • Straub , D. W. 1990 . Effective IS security: An empirical study . Information Systems Research , 1 ( 3 ) : 255 – 276 .
  • Sordo , M. and Zeng , Q. 2005 . “On sample size and classification accuracy: A performance comparison.” . In Proceedings of the 6th International Conference on Biological and Medical Data Analysis , Portugal : Aveiro .
  • Tibshirani , R. , Walther , G. and Hastie , T. 2001 . Estimating the number of clusters in a dataset via the gap statistic . Journal of the Royal Statistical Society B , 63 ( 2 ) : 411 – 423 .
  • Wang , T. and Hsu , C. 2010a . “The impact of a company's board structure on the effectiveness of information security management.” . In Pacific Asia Conference on Information Systems (PACIS) , Taiwan : Taipei .
  • Wang , T. and Hsu , C. 2010b . “The composition of the top management team and the effectiveness of information security management.” . In Americas Conference on Information Systems , Peru : Lima .
  • Wang , T. , Kannan , K. and Rees , J. 2013 . The association between the disclosure and the realization of information security risk factors . Information Systems Research, forthcoming. ,
  • Wakabayashi , D. 2011 . Sony CEO Warns of ‘Bad New World.' . The Wall Street Journal, May , 18 : 2011
  • Weiss , S. M. and Kapouleas , L. 1989 . “An empirical comparison of pattern recognition, neural nets, and machine learning classification methods.” . In Proceedings of the 11th International Joint Conference on Artificial Intelligence Detroit , MI
  • Winters , D. G. 1987 . Leader appeal, leader performance, and the motive profiles of leaders and followers: A study of American presidents and elections . Journal of Personality and Social Psychology , 52 ( 1 ) : 196 – 202 .
  • Young , S. R. and Hayes , P. J. 1985 . “Automatic classification and summarization of banking telexes.” . In Proceedings of the 2nd IEEE Conference on AI Applications Miami Beach , FL
  • Zhang , S. and Zhu , Z. 2006 . Research on decision tree induction from self-map space based on web . Knowledge-Based Systems , 19 ( 8 ) : 675 – 680 .
  • Zhou , Z. and Jiang , Y. 2004 . NeC4.5: Neural ensemble based C4.5 . IEEE Transactions on Knowledge and Data Engineering , 16 ( 6 ) : 770 – 773 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.