REFERENCES
- Ajinkya , B. B. and Jain , P. C. 1989 . The behavior of daily stock market trading volume . Journal of Accounting and Economics , 1 ( 4 ) : 331 – 359 .
- Aquisti , A. , Friedman , A. and Telang , R. 2006 . “Is there a cost to privacy breaches? An event study.” . In The 5th Workshop on the Economics of Information Security , England : Robinson College, University of Cambridge .
- Atiase , A. and Bamber , L. 1994 . Trading volume reactions to annual accounting earnings announcements: The incremental role of predisclosure information asymmetry . Journal of Accounting and Economics , 17 ( 3 ) : 281 – 308 .
- Ayers , B. C. , Jiang , J. and Yeung , P. E. 2006 . Discretionary accruals and earnings management: An analysis of pseudo earnings targets . The Accounting Review , 81 ( 3 ) : 617 – 652 .
- Baesens , B. , Setiono , R. , Mues , C. and Vanthienen , J. 2003 . Using neural network rule extraction and decision tables for credit-risk evaluation . Management Science , 49 ( 3 ) : 312 – 329 .
- Bamber , L. 1987 . Unexpected earnings, firm size, and trading volume around quarterly earnings announcements . The Accounting Review , 62 ( 3 ) : 510 – 532 .
- Bamber , L. , Barron , O. E. and Stober , T. L. 1997 . Trading volume and different aspects of disagreement coincident with earnings announcements . The Accounting Review , 72 ( 4 ) : 575 – 597 .
- Bamber , L. and Cheon , Y. S. 1995 . Differential price and volume reactions to accounting earnings announcements . The Accounting Review , 70 ( 3 ) : 417 – 441 .
- Barron , O. E. , Byard , D. and Yu , Y. 2008 . Earnings surprises that motivate analysts to reduce average forecast error . The Accounting Review , 83 ( 2 ) : 303 – 325 .
- Barth , M. , Kasznik , R. and McNichols , M. 2001 . Analyst coverage and intangible assets . Journal of Accounting Research , 39 ( 1 ) : 1 – 34 .
- Beaver , W. 1968 . The information content of annual earnings announcements . Journal of Accounting Research , 6 : 67 – 92 .
- Beneish , M. D. 2001 . Earnings management: A perspective . Managerial Finance , 27 ( 12 ) : 3 – 17 .
- Bhattacharya , N. 2001 . Investors' trade size and trading responses around earnings announcements: An empirical investigation . The Accounting Review , 76 ( 2 ) : 221 – 244 .
- Bhushan , R. 1989 . Firm characteristics and analyst following . Journal of Accounting and Economics , 11 ( 2–3 ) : 255 – 274 .
- Bowen , P. , Hash , J. and Wilson , M. 2002 . Information security handbook: A guide for managers , Gaithersburg , MD : NIST Special Publication 800–100 .
- Brandãn , L. E. , Dyer , J. S. and Hahn , W. J. 2005 . Using binomial decision trees to solve real-option valuation problems . Decision Analysis , 2 ( 2 ) : 69 – 88 .
- Brown , L. D. 1991 . Forecast selection when all forecasts are not equally recent . International Journal of Forecasting , 7 ( 3 ) : 349 – 356 .
- Brown , L. D. 1993 . Earnings forecasting research: Its implications for capital markets research . International Journal of Forecasting , 9 ( 3 ) : 295 – 320 .
- Campbell , K. , Gordon , L. A. , Loeb , M. P. and Zhou , L. 2003 . The economic cost of publicly announced information security breaches: Empirical evidence from the stock market . Journal of Computer Security , 11 ( 3 ) : 431 – 448 .
- Cavusoglu , H. , Mishra , B. and Raghunathan , S. 2004 . The effect of internet security breach announcements on market value of breached firms and internet security developers . International Journal of Electronic Commerce , 9 ( 1 ) : 69 – 105 .
- Cecchini , M. , Aytug , H. , Koehler , G. J. and Pathak , P. 2010 . Detecting management fraud in public companies . Management Science , 56 ( 7 ) : 1146 – 1160 .
- Christensen , B. J. and Prabhala , N. R. 1998 . The relation between implied and realized volatility . Journal of Financial Economics , 50 ( 2 ) : 125 – 150 .
- Core , J. E. 2001 . A review of the empirical disclosure literature: Discussion . Journal of Accounting and Economics , 31 ( 1–3 ) : 441 – 456 .
- CSI/FBI. 2007. “The CSI/FBI computer crime and security report in 2006.” Retrieved from (accessed April 9, 2007) http://abovesecurity.com/doc/communiquespdf/fbisurvey2006 (http://abovesecurity.com/doc/communiquespdf/fbisurvey2006)
- Degeorge , F. , Patel , J. and Zeckhauser , R. 1999 . Earnings management to exceed thresholds . The Journal of Business , 72 ( 1 ) : 1 – 33 .
- Easley , D. and O'Hara , M. 1987 . Price, trade size, and information in securities markets . Journal of Financial Economics , 19 ( 1 ) : 69 – 90 .
- Elgers , P. and Murray , D. 1992 . The relative and complementary performance of analyst and security-price-based measures of expected earnings . Journal of Accounting and Economics , 15 ( 2–3 ) : 303 – 346 . “”
- Ettredge , M. L. and Richardson , V. J. 2003 . Information transfer among internet firms: The case of hacker attacks . Journal of Information Systems , 17 ( 2 ) : 71 – 82 .
- Fama , E. F. and French , K. R. 1992 . The cross-section of expected stock returns . Journal of Finance , 47 : 427 – 465 .
- Fan , W. , Wallace , L. , Rich , S. and Zhang , Z. 2006 . Tapping the power of text mining . Communications of the ACM , 49 ( 9 ) : 77 – 82 .
- Francis , J. , Hanna , J. D. and Philbrick , D. R. 1997 . Management communications with securities analysts . Journal of Accounting and Economics , 24 ( 3 ) : 363 – 394 .
- Francis , J. , Schipper , K. and Vincent , L. 2002 . Earnings announcements and competing information . Journal of Accounting and Economics , 33 ( 3 ) : 313 – 342 .
- Frankel , R. , Kothari , S. P. and Weber , J. 2006 . Determinants of the informativeness of analyst research . Journal of Accounting and Economics , 41 ( 1–2 ) : 29 – 54 .
- Gal-Or , E. and Ghose , A. 2005 . The economic incentives for sharing security information . Information Systems Research , 16 ( 2 ) : 186 – 208 .
- Garg , A. , Curtis , J. and Halper , H. 2003 . Quantifying the financial impact of IT security breaches . Information Management and Computer Security , 11 ( 2 ) : 74 – 83 .
- Glover , S. , Liddle , S. and Prawitt , D. 2001 . E-Business: Principles and strategies for accountants , 2nd , Upper Saddle River , NJ : Prentice Hall .
- Gordon , L. A. and Loeb , M. P. 2002 . The economics of information security investment . ACM Transactions on Information and System Security , 5 ( 4 ) : 438 – 457 .
- Gordon , L. A. , Loeb , M. P. and Lucyshyn , W. 2003 . Sharing information on computer systems security: An economic analysis . Journal of Accounting and Public Policy , 22 ( 6 ) : 503 – 530 .
- Goto , M. , Kawamura , T. , Wakai , K. , Ando , M. , Endoh , M. and Tomino , Y. 2008 . Risk stratification for progression of IgA nephropathy using a decision tree induction algorithm . Nephrology Dialysis Transplantation , 24 ( 4 ) : 1242 – 1247 .
- Han , J. , Altman , R. , Kumar , V. , Mannila , H. and Pregibon , D. 2002 . Emerging scientific applications in data mining . Communications of the ACM , 45 ( 8 ) : 54 – 58 .
- Harvey , C. R. and Whaley , R. E. 1992 . Dividends and S&P 100 index option valuation . Journal of Futures Markets , 12 ( 2 ) : 123 – 137 .
- Hasbrouck , J. 1988 . Trades, quotes, inventories, and information . Journal of Financial Economics , 22 : 229 – 252 .
- Hasbrouck , J. 1991 . Measuring the information content of stock trades . Journal of Finance , 46 ( 1 ) : 179 – 207 .
- Hovav , A. and D'Arcy , J. 2003 . The impact of denial-of-service attack announcements on the market value of firms . Risk Management and Insurance Review , 6 ( 2 ) : 97 – 121 .
- Ivkovic , Z. and Jegadeesh , N. 2004 . The timing and value of forecast and recommendation revisions . Journal of Financial Economics , 73 ( 3 ) : 433 – 463 .
- Kannan , K. , Rees , J. and Sridhar , S. 2007 . Market reactions to information security breach announcements: An empirical study . International Journal of Electronic Commerce , 12 ( 1 ) : 69 – 91 .
- Karpoff , J. M. 1986 . A theory of trading volume . Journal of Finance , 41 ( 5 ) : 1069 – 1087 .
- Kasznik , R. and Lev , B. 1995 . To warn or not to warn: Management disclosures in the face of an earnings surprise . The Accounting Review , 70 ( 1 ) : 113 – 134 .
- Kim , J. W. , Lee , B. H. , Shaw , M. J. , Chang , H. and Nelson , M. 2001 . Application of decision-tree induction techniques to personalized advertisements on internet storefronts . International Journal of Electronic Commerce , 5 ( 3 ) : 45 – 62 .
- Kim , O. and Verrecchia , R. 1991 . Trading volume and price reactions to public announcements . Journal of Accounting Research , 29 ( 2 ) : 302 – 321 .
- Kim , O. and Verrecchia , R. 1994 . Market liquidity and volume around earnings announcements . Journal of Accounting and Economics , 17 ( 1 ) : 41 – 67 .
- Kim , O. and Verrecchia , R. 1997 . Pre-announcement and event-period private information . Journal of Accounting and Economics , 24 ( 3 ) : 395 – 419 . “”
- Kohavi , R. 1995 . “A study of cross-validation and bootstrap for accuracy estimation and model selection.” . In Proceedings of the 14th International Joint Conference on Artificial Intelligence, Montréal , Canada : Québec .
- Kross , W. , Ro , B. and Schroeder , D. 1990 . Earnings expectations: The analysts information advantage . The Accounting Review , 65 ( 2 ) : 461 – 476 .
- Kwon , J. , Rees , J. and Wang , T. 2013 . The association between top management involvement and compensation and information security breaches . Journal of Information Systems, forthcoming. ,
- Lakonishok , J. , Shleifer , A. and Vishny , R. W. 1992 . The impact of institutional trading on stock prices . Journal of Financial Economics , 32 : 23 – 43 .
- Lang , M. H. and Lundholm , R. J. 1993 . Cross-sectional determinants of analyst ratings of corporate disclosures . Journal of Accounting Research , 31 ( 2 ) : 216 – 271 .
- Lev , B. and Thiagarajan , R. 1993 . Fundamental information analysis . Journal of Accounting Research , 31 ( 2 ) : 190 – 215 .
- Masand , B. , Linoff , G. and Waltz , D. 1992 . “Classifying news stories using memory based reasoning.” . In Proceedings of the 15th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval , Denmark : Copenhagen .
- Matsumoto , D. A. 2002 . Management's incentives to avoid negative earnings surprises . The Accounting Review , 77 ( 3 ) : 483 – 514 .
- McNichols , M. F. 2000 . Research design issues in earnings management studies . Journal of Accounting and Public Policy , 19 ( 4–5 ) : 313 – 345 .
- Morse , D. 1981 . Price and trading volume reaction surrounding earnings announcements: A closer examination . Journal of Accounting Research , 19 ( 2 ) : 374 – 383 .
- O'Brien , P. 1988 . Analysts' forecasts as earnings expectations . Journal of Accounting and Economics , 10 ( 1 ) : 53 – 83 .
- Metrics , Option . 2006 . Ivy DB file and Data Reference Manual , New York : Author .
- Peterson , C. , Luborsky , L. and Seligman , N. E. 1983 . Attribution and depressive mood shifts: A case study using the symptom-context method . Journal of Abnormal Psychology , 92 ( 1 ) : 96 – 103 .
- Roulstone , D. T. 2003 . Analyst following and market liquidity . Contemporary Accounting Research , 20 ( 3 ) : 551 – 578 .
- Institute , SAS . 2004 . Getting Started with SAS_9.1 Text Miner , Cary , NC : SAS Institute .
- Schechter , S. E. and Smith , M. D. 2003 . “How much security is enough to stop a thief? The economics of outsider theft via computer systems networks.” . In Proceedings of the Financial Cryptography Conference , Guadeloupe : Gosier .
- Sheikh , A. 1989 . Stock splits, volatility increases and implied volatility . Journal of Finance , 44 ( 5 ) : 1361 – 1372 .
- Siponen , M. 2006 . Information security standards focus on the existence of process, not its content . Communications of the ACM , 49 ( 8 ) : 97 – 100 .
- Siponen , M. and Iivari , J. 2006 . Six design theories for IS security policies and guidelines . Journal of the Association for Information Systems , 7 ( 7 ) : 445 – 472 .
- Smyth , P. 2000 . Model selection for probabilistic clustering using cross-validated likelihood . Statistics and Computing , 10 ( 1 ) : 63 – 72 .
- Stickel , S. E. 1990 . Predicting individual analyst earnings forecasts . Journal of Accounting Research , 28 ( 2 ) : 409 – 417 .
- Still , S. and Bialek , W. 2004 . How many clusters? An information-theoretic perspective . Neural Computation , 16 ( 12 ) : 2483 – 2506 .
- Straub , D. W. 1990 . Effective IS security: An empirical study . Information Systems Research , 1 ( 3 ) : 255 – 276 .
- Sordo , M. and Zeng , Q. 2005 . “On sample size and classification accuracy: A performance comparison.” . In Proceedings of the 6th International Conference on Biological and Medical Data Analysis , Portugal : Aveiro .
- Tibshirani , R. , Walther , G. and Hastie , T. 2001 . Estimating the number of clusters in a dataset via the gap statistic . Journal of the Royal Statistical Society B , 63 ( 2 ) : 411 – 423 .
- Wang , T. and Hsu , C. 2010a . “The impact of a company's board structure on the effectiveness of information security management.” . In Pacific Asia Conference on Information Systems (PACIS) , Taiwan : Taipei .
- Wang , T. and Hsu , C. 2010b . “The composition of the top management team and the effectiveness of information security management.” . In Americas Conference on Information Systems , Peru : Lima .
- Wang , T. , Kannan , K. and Rees , J. 2013 . The association between the disclosure and the realization of information security risk factors . Information Systems Research, forthcoming. ,
- Wakabayashi , D. 2011 . Sony CEO Warns of ‘Bad New World.' . The Wall Street Journal, May , 18 : 2011
- Weiss , S. M. and Kapouleas , L. 1989 . “An empirical comparison of pattern recognition, neural nets, and machine learning classification methods.” . In Proceedings of the 11th International Joint Conference on Artificial Intelligence Detroit , MI
- Winters , D. G. 1987 . Leader appeal, leader performance, and the motive profiles of leaders and followers: A study of American presidents and elections . Journal of Personality and Social Psychology , 52 ( 1 ) : 196 – 202 .
- Young , S. R. and Hayes , P. J. 1985 . “Automatic classification and summarization of banking telexes.” . In Proceedings of the 2nd IEEE Conference on AI Applications Miami Beach , FL
- Zhang , S. and Zhu , Z. 2006 . Research on decision tree induction from self-map space based on web . Knowledge-Based Systems , 19 ( 8 ) : 675 – 680 .
- Zhou , Z. and Jiang , Y. 2004 . NeC4.5: Neural ensemble based C4.5 . IEEE Transactions on Knowledge and Data Engineering , 16 ( 6 ) : 770 – 773 .