References
- Anthem, Inc. (2016). Form 10-K. Washington, D.C.: The United States Securities And Exchange Commission.
- Azzimonti, M., & Marks, A. (2016). Hacking induced externalities and the apathy of stockholders Retrieved from http://marinaazzimonti.com/wp-content/uploads/2016/05/Hacks2.pdf/
- Bose, N. (2014, September 9). Home depot confirms security breach following target data theft. Retrieved December 2016, from Reuters Technology News: http://www.reuters.com/article/us-usa-home-depot-databreach-idUSKBN0H327E20140909
- Business Wire. (2009). Heartland payment systems returns to visa’s list of PCI DSS validated service providers. Princeton, NJ: Heartland Payment Systems. Retrieved from http://www.businesswire.com/news/home/20090501005695/en/Heartland-Payment-Systems-Returns-Visa’s-List-PCI
- Crum, R. (2014, January 14). Apple gives worst performance in a year. Retrieved December 2016, from MarketWatch http://www.marketwatch.com/story/no-reprieve-for-apple-in-wake-of-iphone-weakness-2014-01-28
- Curtis, J. (2016, November 15). TalkTalk hack: Teenager admits to seven charges of hacking. Retrieved 2016 December, from IT Pro UK: http://www.itpro.co.uk/security/24136/talktalk-hack-teenager-admits-to-seven-charges-of-hacking
- Department of Homeland Security & The United States Secret Service. (2014). Backoff malware: infection assessment. Department of Homeland Security.
- DHS. (2014, July 31). Backoff: New Point of Sale Maleware. U.S. Department of Homeland Security and U.S. Secret Service, National Cybersecurity and Communications Integration Center. Retrieved from https://www.us-cert.gov/sites/default/files/publications/BackoffPointOfSaleMalware_1.pdf
- Global Payments. (2013). 2013 Form 10-K. Washington, D.C.: The Securities And Exchange Commission.
- Garg, A., Curtis, J., & Halper, H. (2003). The financial impact of IT security breaches: What do investors think? Information Systems Security, 12(1), 22–33. doi:10.1201/1086/43325.12.1.20030301/41478.5.
- Harris, E. (2014, May 5). Cyber-risk disclosure: Who cares?. (Research Paper No. 2852519). Georgetown McDonough School of Business
- Hillary, G., Segal, B., & Zhang, M. (2016, October 14). Cyber-risk disclosure: Who cares?. (Research Paper No. 2852519). Georgetown McDonough School of Business. doi:10.2139/ssrn.2852519.
- Home Depot. (2014). The home depot completes malware elimination and enhanced encryption of payment data in all U.S. Stores. Atlanta, GA: Press Release September 18, 2014. Retrieved from http://ir.homedepot.com/newsreleases/2014/09-18-2014-014517752
- Hovav, A., & Gray, P. (2014). The ripple effect of an information security breach event: A stakeholder analysis. Communications of the Association for Information Systems, 34(50), 894–912. Retrieved from http://aisel.aisnet.org/cais/vol34/iss1/50
- Kannan, K., Rees, J., & Sridhar, S. (2007). Market reactions to information security breach announcements: An empirical analysis. International Journal of Electronic Commerce, 69–91. doi:10.2753/JEC1086-4415120103
- Kende, M. (2016). Global Internet Report 2016. Retrieved from Internet Society https://www.internetsociety.org/globalinternetreport/2016/wp-content/uploads/2016/11/ISOC_GIR_2016-v1.pdf
- King, R. (2009, July 6). Lessons from the data breach at heartland. Retrieved 2016 December, from Bloomberg http://www.bloomberg.com/news/articles/2009-07-06/lessons-from-the-data-breach-at-heartlandbusinessweek-business-news-stock-market-and-financial-advice
- Knutson, R. (2016, June 7). Verizon to bid $3 billion for yahoo’s web assets. Retrieved December 2016, from Wall Street Journal http://www.wsj.com/articles/verizon-to-bid-3-billion-for-yahoos-web-assets-1465264919
- Ko, M., Osei-Bryson, K.-M., & Dorantes, C. (2009, April). Investigating the impact of publicly announced information security breaches on three performance indicators of the breached firms. Information Resources Management Journal, 22(2), 1–21. doi:10.4018/IRMJ
- Krebs, B. (2014, September 18). In Home depot breach, investigation focuses on self-checkout lanes. Retrieved December 2016, from KrebsOnSecurity: https://krebsonsecurity.com/2014/09/in-home-depot-breach-investigation-focuses-on-self-checkout-lanes/
- Lange, R. (2016). Implications of data breaches. Student Report, Washington, D.C.
- Mandiant Consulting. (2016). M-Trends 2016. Milpitas, CA: Mandiant.
- McGrath, M. (2014, January 20). Target data breach spilled info on as many as 70 million customers. Retrieved December 2016, from Forbes: http://www.forbes.com/sites/maggiemcgrath/2014/01/10/target-data-breach-spilled-info-on-as-many-as-70-million-customers/#569752346bd1
- Osborne, C. (2015, February 12). Anthem data breach cost likely to smash $100 million barrier. Retrieved December 2016, from ZDNet: http://www.zdnet.com/article/anthem-data-breach-cost-likely-to-smash-100-million-barrier/
- Payments, H. (2010). 2009 Form 10-K annual report. Washington, D.C.: The Securities And Exchange Commission.
- Perlroth, N. (2014, July 31). Checking In From Home Leaves Entry For Hackers. Retrieved December 2016, from The New York Times: http://www.nytimes.com/2014/07/31/technology/checking-in-from-home-leaves-entry-for-hackers.html
- Ponemon Institute. (2016). 2016 Cost of data breach study: Global analysis. Traverse City, MI: Author.
- Quick, M., Hollowood, E., Miles, C., & Hampson, D. (2016). World’s biggest data breaches, information is beautiful. Retrieved October 2016, from http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
- Rudavsky, S. (2015, February 7). Anthem data breach could be ‘lifelong battle’ for customers. Retrieved December 2016, from IndyStar: http://www.indystar.com/story/news/2015/02/05/anthem-data-breach-lifelong-battle-customers/22953623/
- Sidel, R. (2014, September 18). Home depot’s 56 million card breach bigger than target’s. Retrieved December 2016, from Wall Street Journal: http://www.wsj.com/articles/home-depot-breach-bigger-than-targets-1411073571
- Target. (2015). Form 10-K. Washington, D.C.: The Securities And Exchange Commission.
- Telang, R., & Wattal, S. (2007). An empirical analysis of the impact of software vulnerability announcements on firm stock price. IEEE Transactions on Software Engineering, 544–557. doi:10.1109/TSE.2007.70712
- ThreatMetrix. (2016). Q2 2016 Cybercrime Report. San Jose, CA: Author.
- Whitney, L. (2016, February 6). Anthem’s stolen customer data not encrypted. Retrieved December 2016, from C|Net https://www.cnet.com/news/anthems-hacked-customer-data-was-not-encrypted/
- Yayla, A. A., & Hu, Q. (2011, March). The impact of information security events on the stock value of firms: The effect of contingency factors. Journal of Information Technology, 26(1), 60–77. doi:10.1057/jit.2010.4