ArticlePDF Available

The Effect of Data Breaches on Company Performance

Authors:

Abstract

Purpose: This paper aims to analyze the effect of data breaches – whose concerns and implications can be legal, social, and economic – on companies’ overall performance. Design/methodology/approach: Information on data breaches was collected from online compilations, and financial data on breached companies were collected from the Mergent Online database. The financial variables used were related to profitability, liquidity, solvency, and company size to analyze the financial performance of the breached companies before and after the data breach event. Nonfinancial data, such as the type and the size of the breaches, was also collected. The data were analyzed using multiple regression. Findings: The results confirm that nonmandatory information related to announcements of data breaches is a signal of companies’ overall performance, as measured by profitability ratios, return on assets, and return on equity. The study does not confirm a relationship between data breaches and stock market reaction when measuring quarterly changes in share prices. Research limitations/implications: The main limitation of the study relates to ratio and trend analyses. Such analyses are commonly used when researching accounting information. However, they do not directly reflect the companies’ conditions and realities, and they rely on companies’ released financial reports. Another limitation concerns the confounding factors. The major confounding factors around the data breaches’ dates were identified; however, this was not enough to assure that other factors were not affecting the companies’ financial performance. Because of the nature of such events, this study needs to be replicated to include specific information about the companies using case studies. Therefore, the authors recommend replicating the research to validate the article’s findings when each industry makes more announcements available. Practical implications: To remediate the risks and losses associated with data breaches, companies may use their reserved funds. Social implications: Company data breach announcements signal internal deficiencies. Therefore, the affected companies become liable to their employees, customers, and investors. Originality/value: The paper contributes to both theory and practice in the areas of accounting, finance, and information management.
The eect of data breaches on
company performance
Ahmad H. Jumah
Department of Accountancy, University of Illinois, Springeld, Illinois, USA, and
Yazan Alnsour
Department of Management Information Systems, University of Illinois,
Springeld, Illinois, USA
Abstract
Purpose This paper aims to analyze the effect of data breaches whose concerns and implications can be
legal, social and economic on companiesoverall performance.
Design/methodology/approach Information on data breaches was collected from online
compilations, and nancial data on breached companies was collected from the Mergent Online database. The
nancial variables used were related to protability, liquidity, solvency and company size to analyze the
nancial performance of the breached companies before and after the data breach event. Nonnancial data,
such as the type and the size of the breaches, was also collected. The data was analyzed using multiple
regression.
Findings The results conrm that nonmandatory information related to announcements of data breaches
is a signal of companiesoverall performance, as measured by protability ratios, return on assets and return
on equity. The study does not conrm a relationship between data breaches and stock market reaction when
measuring quarterly changes in share prices.
Research limitations/implications The main limitation of the study relates to ratio and trend
analyses. Such analyses are commonly used when researching accounting information. However, they do not
directly reect the companiesconditions and realities, and they rely on companiesreleased nancial reports.
Another limitation concerns the confounding factors. The major confounding factors around the data
breachesdates were identied; however, this was not enough to assure that other factors were not affecting
the companiesnancial performance. Because of the nature of such events, this study needs to be replicated
to include specic information about the companies using case studies. Therefore, the authors recommend
replicating the research to validate the articlesndings when each industry makes more announcements
available.
Practical implications To remediate the risks and losses associated with data breaches, companies
may use their reserved funds.
Social implications Company data breach announcements signal internal deciencies. Therefore, the
affected companies become liable to their employees, customers and investors.
Originality/value The paper contributes to both theory and practice in the areas of accounting nance,
and information management.
Keywords Financial performance, Data breaches, Nonnancial factors,
Number of breached records
Paper type Research paper
Declaration of interest: The authors report no conicts of interest. The authors alone are responsible
for the content and writing of this paper.
Data breaches
Received 19 January2019
Revised 20 April 2019
27 June 2019
Accepted 5 August2019
International Journal of
Accounting & Information
Management
© Emerald Publishing Limited
1834-7649
DOI 10.1108/IJAIM-01-2019-0006
The current issue and full text archive of this journal is available on Emerald Insight at:
https://www.emerald.com/insight/1834-7649.htm
1. Introduction
Accelerated progress in communication, networks and information technologies is shaping
global business, and it is estimated to continue changing business structures for the
foreseeable future. This development has many advantages and disadvantages for all
organizationsstakeholders. Information systems management is increasingly considering
information security and privacy due to their potential critical issues for all company
activities. The magnitude of the importance of breached data was described in the California
Data Breach Report 2012-2015 (Harris, 2016) as follows:
In the past four years, the Attorney General has received reports on 657 data breaches,
affecting a total of over 49 million records of Californians. In 2012, there were 131 breaches,
involving 2.6 million records of Californians; in 2015, 178 breaches put over 24 million
records at risk. This means that nearly three in ve Californians were victims of a data
breach in 2015 alone (p. 8).
Multinational companies rely heavily on technology and always have some technical
vulnerabilities, which means data breaches and losses are inevitable. Data is one of the
companys most important assets, and the threat of losing data control is becoming an issue
that affects everyone. No matter whether companies establish guidelines and controls to
mitigate the risk of data breaches, hacking and phishing threats still exist. Information
security and privacy is a determining factor for companiescontinuity and sustainability.
Companies are adopting several protection techniques such as system authentication, data
encryption, user access control and rewalls as well as practices that aim to minimize such
risks such as employee training and user orientation to the companys information security
policy and protocols. Despite these measures, perpetrators are becoming more organized
and sophisticated, and the risk is growing.
There are many recent examples of companies that have suffered from major data
breaches Equifax, Anthem, eBay, JPMorgan Chase, Home Depot, Yahoo and Target,
among others. Assessing the economic effects of data breaches is a challenge for both
accounting and information security management (Schatz and Bashroush, 2016). Research
concerning the implications of data breaches is considered an emerging area (Ghosh and
Swaminatha, 2001;Spanos and Angelis,2015, 2016). Event studies have mostly shown that
data breaches have a negative effect on cumulative abnormal returns of publicly traded
companies. However, these same studies have shown mixed results concerning the
signicance of the relationship between data breaches and company value/share. Event
studies using daily share prices investigate the immediate effect of a breach. Over a longer
timeframe, Kannan et al. (2007) found no signicant negative effect of information security
breaches on company value. In descriptive and comparative studies, Ko and Dorantes (2006)
found that sales increased signicantly for the breached rms in the fourth quarter after a
security breach, contradicting the negative effects shown in most event studies performed
using daily share prices.
Stoel and Muhanna (2011) found that companies with information technology (IT)
weaknesses performed worse than rms with no weaknesses. Data breaches indicate
deciencies in internal controls particularly IT internal controls. Companies that are
continually improving their IT controls to avoid cyber-incidents can reduce the risk of data
breaches. However, hackersability to penetrate larger companiesrecords, such as those of
Apple, Walmart and Equifax, indicates that hackers are becoming threats even to
companies that invest heavily in IT. Brody et al. (2018) indicate that the potentially harmful
effects of malware, which can be nancial and nonnancial, are often not well known.
To contribute to the existing literature, the goal of this article is to analyze the
intermediate (quarterly) term effect of data breaches on companiesperformance by
IJAIM
including qualitative and quantitative factors. Qualitative factors are increasingly being
used by researchers in accounting, nance and IT studies (Arnold et al.,2012;Vasarhelyi,
2012;No and Vasarhelyi, 2017). The article aims to verify the effect of data breach
announcements on the overall performance of affected companies, as measured by changes
in return on assets (ROA) and changes in return on equity (ROE). The study used
nonnancial variables such as the number of records breached and the type of breach. The
nonnancial information was obtained from online databases. The yearly xed and
industry-xed effects were also incorporated. The nancial variables used were ratios
related to liquidity, solvency, leverage, book-to-market and capitalization. The Mergent
Online database was used to obtain the companiesquarterly nancial information.
The following section discusses the theoretical background to develop research
statements. Section 3 discusses the data collection and research methodology. Section 4
presents the results. The last two sections present a summary of the main ndings, notable
conclusions, limitations and suggestions for future research.
2. Theoretical background
Since 2000, researchers have been increasingly more interested in the effect of information
security events such as privacy violations, denials of service and website defacements on
the condentiality, integrity and availability of information systems (Spanos and Angelis,
2016). In the executive summary of the California Data Breach Report 2012-2015, these types
of breaches are identied as generally being caused by malware and hacking, physical loss
and human error. Data breaches are mostly breaches of sensitive personal information such
as social security numbers, bank account information and medical information. The
industry sectors most affected by data breaches are retail, nance, healthcare and small
business.
Internal and external perpetrators have different motives and methods for accessing
company data. External perpetrators or hackers are more skilled, organized and innovative.
Therefore, the data breach type depends on the perpetrator, their intentions and the source
of the threat. The source is important because outsider activities will be more dangerous
than those from the inside (Jouini et al.,2014). Therefore, this study anticipates that the data
breaches characterized by a large number of breached records and perpetrated by external
hackers affect companiesnancial performance most negatively.
Parallel to advances in IT, companies are accumulating data to serve their customers
better and become more competitive in the market. According to Muhanna and Stoel (2010),
investors reward companies that have superior IT capability. However, using the internet is
not without cost. Stakeholders are concerned when they see a company with a less-than-
optimal level of IT security and information privacy (Schmidt et al., 2016). Securing personal
data is an ethical and legal responsibility of every organization that stores and uses that
data. Several rules, regulations, enforcement actions, common law duties, contracts and self-
regulatory regimes address secure information. Laws in the USA and European Union have
security requirements for specic types of entities. The Federal Trade Commission (FTC)
has the authority to ne a rm responsible for data breaches but this does not limit the
companiespossible liability for the occurrence of data breaches (Silverman, 2014).
The main objective of management is to pursue the perpetual growth of a corporation
such that the wealth of its stockholders is maximized. The agency theory (Jensen and
Meckling, 1976), and information asymmetry are crucial to understanding how and when
management report information about data breach incidents; rms can improve their
corporate governance and business ethics to reduce the self-interested motives of
management and to avoid moral hazard. The agency theory examines how managements
Data breaches
behavior could be directed at stockholdersinterest by reducing agency costs (Wang, 2010;
Chen et al., 2012). According to Brush et al. (2000) and Wang (2010), the agency theory is
related to a managers goal to maximize his or her personal wealth instead of the
stockholderswealth: managements self-interest produces waste and inefciency in the
presence of free cash ows, and the burden of agency costs is incurred by stockholders
because of weak corporate governance (Jensen, 1986).
The Committee of Sponsoring Organizations (COSO), US Securities and Exchange
Commission (SEC), Public Company Accounting Oversight Board (PCAOB), American
Institute of Certied Public Accountants (AICPA), International Federation of Accountants
(IFAC) and other regulators have created an ongoing eld for internal controls discussion
(Leach and Newsom, 2007). The SEC requires that publicly held corporations submit their
audited nancial statements and other supplementary information annually. Public data
unavailability implies that investors cannot use frequently released nancial information as
an opportunity to generate prot from private information (Fu et al.,2012). Companies that
choose not to disclose material data breaches, losses or damage may face legal issues for not
complying with the 2011 SEC disclosure guidance for cybersecurity and other released SEC
requirements for cybersecurity disclosure (Trope, 2012). Companies are required to report
material cybersecurity incidents to make the information available to stakeholders and
investors.
There is a need for greater specication of systematic, policy-related controls to reduce
the differences between software, mathematical models and accounting procedures to
increase company efciency (Karimi et al., 2014). Auditors use different types of software
and systems verications; these verications cannot assure that the data cannot be breached
(Bradford and Florin, 2003;Eden et al., 2014). The understanding of internal controls helps
external auditors determine the scope of their audits (Gramling et al.,2004). According to the
PCAOB (2007) and the IFAC (2012), the external auditors may choose to rely on internal
audit functions depending on their understanding of their strength. SarbanesOxley Act
(2002) increased researchersinterest in evaluating the internal controls of organizations
(Desai et al., 2011).
Further research can be carried out in this area to link internal controls and company
events (Messier et al.,2011;Weisner and Sutton, 2015). Noncompliance with the mandatory
disclosure of an activity (e.g. corporate social responsibility) might affect companies
nancial performance (Chen et al., 2017). Data breaches, as company events, are related to a
companys internal controls and its operational and overall efciency.
According to the PCAOB, internal control deciencies are related to signicant single or
combined deciencies that result in the likelihood of a material misstatement on the annual
or interim nancial statements not being prevented or detected. In addition, signicant
deciency and material weakness are both shortfalls in the design and administration of the
internal controls. Deciencies are less pervasive than material weaknesses, but multiple
signicant deciencies such as data breaches could lead to material weakness.
According to Leach and Newsom (2007), control activities include top-level reviews,
information processing, physical controls, performance indicators, duty segregation, control
over information systems and ongoing monitoring. Doyle et al. (2007) investigate the
relationship between internal control (material weakness), rm size and market value, but
they do not make a correlation with bankruptcy. According to Ashbaugh-Skaife et al. (2007),
there is a positive relationship between internal control deciencies, control failure and
unavailability of internal control resources. Kuhn et al. (2013) indicate that companies
reporting IT weaknesses perform worse nancially than companies with non-IT
weaknesses.
IJAIM
To meet company needs, managers should seek operational and overall efciency.
Operational efciency requires investing in new technologies such as software and
maintaining training programs for employees to assure compliance with goals and policies;
seeking a satisfactory relationship with customers, creditors and investors enables
companies to maintain their overall performance (Haislip and Richardson, 2017). Data
breach costs may be considered immaterial for larger companies, but data breaches signal
inadequate investment in IT assets. This motivates comparing nancial ratios of the
performance of a company that suffered from data breaches.
According to Baird and Morrison (2005) and Lajili and Zéghal (2010),nancial variables
and ratios are suitable for performing nancial data analysis. The use of nancial ratios is
common in accounting and nance research ratios like indicators related to solvency,
liquidity, leverage and effect size (Beaver,1966, 1968;Roumani et al., 2016). Altman (1968)
designed a discriminatory model that, until now, had retained a predictive value for
companies with nancial difculties. Discriminant analyses permit the use of qualitative
and quantitative information for group rms according to similarities and differences.
Grouping rms by observations leads to discriminant analysis. Some economic studies
combine nonparametric approaches with parametric discrimination, as used by Altman
(1968); logit analysis for distress prediction, as used by Ohlson (1980); and multiple
regression univariate analysis, as used by Theodossiou (1993). The variables included in
these studies were the following: earning per share (EPS), growth, ROA, assets, liabilities,
rate of increase in sales, rate of increase in equity, rate of increase in assets, ROE, accounts
receivables, inventory, debts, interest expense and dummy variables.
Fu et al. (2012) argue that more frequent nancial reporting reduces information
asymmetry. Some companies tend to deliberately exclude outsiders from the critical early
phases of incident response to prevent a negative perception of their performance (Ahmad
et al.,2015). The quality and timing of reporting are important to investorsdecisions. Leach
and Newsom (2007),Stubben (2010) and Beaver et al. (2005,2012) indicate that nancial
information quality is a considerable constraint for any reportage of nancial information.
The ratio analysis is affected by common variations when applying accounting principles,
including inventory valuation, depreciation and amortization methods, capitalization and
expenses recognitions, leasing, post-retirement benet costs and recognition of specic
items in the nancial statements such as discontinued operations, impairments and
signicant operational and non-operational deciencies.
In this article, we considered nonnancial variables that include the type of data breach,
number of records, whether the perpetrators were internal or external and industry
classication; this is consistent of the materiality concept in accounting (Jumah, 2009,2014,
2019). These qualitative variables indicate the data breachesmateriality. For example, the
performance was affected more in companies that suffered from a large breach of records
(e.g. Yahoo, Sony and Equifax) than in those that suffered a smaller breach of records.
Moreover, internal perpetrators did not affect companiesoverall performance as much as
sophisticated external ones. Operational deciencies are reected in a companys
operational performance, and therefore, the authors of this article anticipate that, in the
companies that suffered from data breaches, changes in operational performance are related
to the changes in the companiesoperational measures of liquidity, solvency and leverage.
The incidence of the data breaches is related to the deciencies linked to internal controls,
especially the preventive controls to protect a companys data (Stoel and Muhanna, 2011).
The data breach announcements affect customer satisfaction and trust, which affect the
breached companiesperformance (Martin et al.,2017). Bose and Luo (2014) state that
managers should view security investment from a more comprehensive perspective,
Data breaches
considering IT- and non-IT-related factors related to rm performance, for example, to
identifying and measuring companiesIT risks, which is linked to the data regarding
information assets, threats, system vulnerability and security controls (Jerman-Blaži
c, 2008).
Companies use their resources to face and mitigate risks associated with severe data
breaches; increase internal controls efciency; increase investment in assets related to
information systems; improve the relationship with affected parties through intensive
marketing programs; compensate customers; improve the companiesimage, reputation and
trust (Martin, 2018;Mathur, 2018); and (in some cases) deal with charges or penalties from
government agencies such as the SEC on accusations of not reporting events according to
SEC regulation deadlines.
In relation to the stock market, there is evidence indicating that investors perceive the
occurrence of data breaches negatively (Spanos and Angelis, 2016). Empirical investigations
concerning companiesannouncements are associated with stock market reactions. This is
because companiesshare prices and returns are commonly referenced, and the data is easy
to access. Frino et al. (2007) indicate that market behaviors could be used to predict nancial
distress or difculties, which includes data breaches. A more holistic approach to
information security is needed to enable managers to play an effective role in information
security (Soomro et al.,2016;Marriott et al.,2017). SEC requires that publicly held
corporations annually submit their number of outstanding shares and closing market price
(using rmsscal years as the valuation date). Based on nance theories related to the
efcient market hypothesis, and at least in a semi-strong manner, the stock market is
informationally efcient and reects new information (Fama, 1970;Fama and French, 2015).
The implications of the data breaches, as well as the implications of other nancial and
nonnancial announcements or events, may affect the breached companiesmarket value.
To consider the market price as an explanatory variable, this study used quarterly share
prices around the data breach incidences.
3. Data and methodology
After 2000, many empirical studies (Campbell et al., 2003;Ettredge and Richardson, 2003;
Garg et al.,2003;Hovav and DArcy, 2003;Kannan et al.,2007;Gordon et al.,2010) discussed
the effect of data breaches on a rms value. By searching the existing empirical studies,
Spanos and Angelis (2016) found 37 related articles about 45 studies. They indicate that 75.6
per cent of the event studies show that data breaches have signicant negative effects on
companiesvalues. In general, the previous studies are limited to a few indicators, such as
company and market return and the announcement of the data breaches. According to
Spanos and Angelis (2016), there is a need to conduct more studies on the general effects of
data breaches on a companys performance such as the effects and implications in terms of
sales, revenue, liquidity, solvency protability andsustainability indicators.
3.1 Data collection
According to Pindado et al. (2008), panel data allows the elimination of unobservable
heterogeneity by adding a large range of observations in a data set. Similar to Altman and
Sabato (2007), panel data was used to organize the collected data in this study, and
secondary data was used. To relate the data breaches to company performance, data is
collected related to the announcements of data breaches that occurred due to security
deciencies, attacks, lost data, thefts or any other data privacy mismanagement. The
authors search for announcements in online databases, namely, PrivacyRights.org and
InformationIsBeautiful.net. The primary data source is PrivacyRights.org, which stores
more than 8,000 events, most of which are related to governmental units, nonprots and
IJAIM
private entities. InformationIsBeautiful.net is used to validate data content and to identify
major breaches. Google Search is used to validate the announcementscontent when
discrepancies arose among them. For the purpose of the study, companies included in the
sample must have nancial reporting before and after the data breach announcements.
From 2005 to 2017, the authors identied 795 data breach events from 450 companies that
report ROA yearly. From these, the authors found 441 events for 290 companies that report
ROA quarterly. These constitute the sample size of the analysis, which is comparable to that
of contemporary accounting research on cybersecurity (Higgs et al.,2016;Ettredge et al.,
2018).
The nancial variables and ratios the authors use in this article are obtained from
Mergent Online by the FTSE Russell database. The authors consider public rms traded in
US stock markets rms that have announced data breaches for the study because they
are required to report any major issues to the SEC within four days using 8-k reports. The
companiesdata is publicly accessible through the EDGAR database. The denitions of the
nancial variables are provided in Table X. The authors use the two-digit North American
Industry Classication System (NAICS) for industry classication. The data collected for
each breach includes the type of breach, number of records affected, date of the breach, type
of industry and whether the company is publicly traded. The denitions of the nonnancial
variables are provided in Table XI.
3.2 Data description
Tables I and II provide some data-related descriptions of the sample used. Table I shows
that there were more incidences of data breaches in 2010 and 2014 than in other years, and
that about two-third of the sample occurred in or after 2010. The number of records hacked
is an indicator of the data breachesmateriality (Table II).
According to Stoel and Muhanna (2009), the effect of IT capability on company
performance depends on the external environment, such as industry characteristics. Table
III shows the industry classications using the two-digit NAICS. The nance and insurance
industry demonstrates the most frequent occurrence of data breaches. This industry is
targeted by hackers because of the sensitivity of the information on record; in addition, the
black-market price motivates hackers to target the records of rms in the nancial and
insurance industry.
Table I.
Distribution of data
breaches by year
Year Frequency Cumulative frequency (%) Cumulative (%) Total number of breached records
2005 10 10 2.27 2.27 27,934,500
2006 36 46 8.16 10.43 238,602
2007 36 82 8.16 18.59 84,329
2008 19 101 4.31 22.90 24,300
2009 15 116 3.40 26.30 23,829
2010 53 169 12.02 38.32 786,264
2011 37 206 8.39 46.71 2,771,782
2012 41 247 9.30 56.01 50,116,187
2013 43 290 9.75 65.76 36,491,461
2014 65 355 14.74 80.50 155,186,775
2015 30 385 6.80 87.30 90,379,471
2016 27 412 6.12 93.42 32,312
2017 29 441 6.58 100.00 34,086,353
Total 441 100.00
Data breaches
We used nancial ratios as nancial indicators related to a specic event such as a data
breach. Changes in each companys overall performance for each company are used to
measure the data breacheseffects on company performance. To determine the degree of
change in a specic ratio as an indicator of such effects, the indicator (R) is considered in the
quarter of the data breach incident, namely, (Rt0); as a benchmark, the average of R in the
four quarters immediately before the event is used, namely, (AR
t1_Rt4
ð). The degree of
change in R (dDR) is dened as (Rt0/(AR
t1_Rt4
ð)1). For example, the degree of change in
ROA is (ROAt0/(A ROAt1_ROAt4
)1).
Table IV presents the variables used in the correlation analysis using multiple linear
regression (MLR) with nancial variables or ratios and MLR with nancial variables or
ratios and dummy variables (MLRDV).
The variablesdescriptions as mean, median and standard deviations are provided in
Table V. The mean values of dDROA and dDROE are 54.4 and 46.1 per cent, respectively.
And, 23 per cent of the breaches are due to outside hackers. For major data breaches, the
study considers companies with more than 100,000 records breached; examples of these
companies are provided in Table XII. For these breaches, on average, the quarter (t
0
)
represents the minimum of the selected ratios. For example, ROAper cent on a subset of the
sample related to major hacks shows, on average, a minimum level of ROAper cent at the
event quarter (t
0
). The polynomial function (ROAper cent = 0.0196t
2
0.0317t þ6.76; R
2
=
0.569) is a better estimate than the linear function (ROAper cent = 0.0149t þ6.947; R
2
=
0.454). From Figure 1, we can observe that after the quarter t
0
, ROAper cent began to
increase.
Table II.
Data breach volume
Data breach volume range Frequency (%)
2-499 60 13.2
500-4,999 62 14.1
5,000-19,999 43 9.8
20,000-999,999 17 3.9
1,000,000-25,000,000 8 2
>25,000,000 4 1
No reported records 247 56
Total announcements 441 100.00
Table III.
Industry
classication
Industry classification Frequency (%)
Finance and insurance 165 37.4
Manufacturing 58 13.2
Retail trade 44 10.0
Information and culture 44 10.0
Accommodation and food services 21 4.8
Administration and support services 21 4.8
Transportation and warehousing 19 4.3
Healthcare and social assistance 14 3.2
Professional, scientic and technical services 12 2.7
Wholesale trade 7 1.6
Others 36 8.2
441 100
IJAIM
Table IV.
The classication of
variables as either
dependent or
independent in MLR
and MLRDV
Variable Variable description
dDROA The degree of change in returns on assets (dependent variable)
dDROE The degree of change in returns on equity (dependent variable)
Recs The reported number of records
RecsM The number of records affected by the data breach in millions
BInsd Data breach conducted by an insider (someone with legitimate access intentionally breaching
information, such as an employee, contractor or customer)
BHack Data breach due to being hacked by an outside party or being infected by malware
BPhys Data breach due to paper (nonelectronic) documents being lost, discarded or stolen
BDisc Unintended disclosure (not involving hacking, intentional breaching or physical loss e.g.
sensitive information being posted publicly, mishandled or sent to the wrong party via online
publishing, email, mail or fax)
BStat Data breach due to stationary computer loss (lost, inappropriately accessed, discarded or
stolen computer or server not designed for mobility)
BCard Fraud involving debit and credit cards not accomplished via hacking (e.g. skimming devices at
point-of-service terminals)
BUnkn The data breach cause is unknown
CapM The total capitalization in millions
dDSP The degree of change in the share price
dDCR The degree of change in the current ratio
dDTAT The degree of change in the total asset turnover
dDCFS The degree of change in the cash ow per share
dDB/M The degree of change in the book-to-market ratio
dDCET The degree of change in the cash and equivalent turnover
NAICS The rst two digits of the NAICS industry classication
Year The year of the data breach
Table V.
Descriptive statistics
Variable Mean SD Minimum Maximum
dDROA 0.544 20.980 25.673 4.600
dDROE 0.461 20.262 17.000 4.500
RecsM 7.749 30.435 0.693 18.792
BInsd 0.121 00.327 0.000 1.000
BHack 0.232 00.423 0.000 1.000
BPhys 0.158 00.366 0.000 1.000
BDisc 0.221 00.416 0.000 1.000
BStat 0.026 00.160 0.000 1.000
BUnkn 0.042 00.201 0.000 1.000
CapM 37,621 481,039 0.001 6,198,039
dDSP 0.000 00.188 0.504 0.976
dDCR 0.000 00.188 0.504 0.976
dDTAT 0.003 00.135 0.259 1.281
dDCFS 1.527 17.388 4.160 233.000
dDB/M 0.009 00.339 2.622 1.569
dDCET 0.0212 00.420 0.838 2.560
NAICS ––21 72
Year ––2005 2017
Data breaches
3.3 Statistical tests
The p-test,t-test,F-statistic test and R
2
values are used to analyze regression results. Usually,
p-values use 0.05 as a threshold. The t-test is used to verify multiple regressionscoefcient
signicance (Black, 2009). According to Iqbal and French (2005) and Tinoco and Wilson
(2013), regression analysis is suitable for nancial data analysis. This analysis uses the
ordinary least squares (OLS) model to analyze the effect of data breaches on the affected
companiesperformance. Three measures are identied for performance measures
(Table IV): dDROA and dDROE, acting as measures of overall performance; and dDSP,
acting as a measure of the reactions of investors in the stock markets to the data breach
announcements.
Panel data sets have a fundamental advantage over cross-sections: they enable exibility
in modeling differences across individual companies in the sample. For the OLS model, this
is the following: yit ¼X0
it
b
þZ0
it
a
þeit;yit ¼X0
it
b
þCit þeit. The individual company
effect is Z0
it
a
, where Z
i
contains a constant term and a set of specic variables related to an
individual (a company) or a group (a business classication). The specic variables are
those that can be identied, such as nancial ratios or variables, and those that are
unobserved, such as a companys or a businesss specic characteristics. If Z
i
contains only a
constant term, pooled regression can be used. For model structuring, the xed and random
effects are considered in panel data research. For xed effects, if Z
i
is unobserved but
correlated with X
it
, the OLS of
b
is biased and inconsistent because of omitted variable(s),
and the model is yit ¼X0
it
b
þ
a
it þeit. Considering the random effect, the unobserved
variables can be assumed to be uncorrelated with the included variables, and the model can
be formulated as yit ¼X0
it
b
þ
a
þuit þeit. The random-effects approach species that u
it
is a group-specic random element. The crucial difference between xed and random effects
is whether the omitted (unobserved) variables are correlated with the regressors in the
model, not whether these effects are stochastic or not (Greene, 2012).
The authors use dummy variables for year-xed effects and for business-
classication-xed effects to minimize the effect of omitted variable bias. A dummy
variable is assigned, starting with 2005 and ending with 2017, for year-xed effects,
and the industry classications are considered according to the two digits of the NAICS
classication. The treatment of xed effect assists in dealing with variation between
inter-data breaches (variation from one data breach to another) and intra-data breaches
(the variation within each data breach over time; Greene, 2012). The regression used is
dened as yit ¼X0
it
b
þyear*dummies þindustry classifications*dummies þeit.One
year and one business classication are omitted to avoid perfect multcolinearity in the
regression.
Figure 1.
ROA% polynomial
trend 6.0
6.5
7.0
7.5
8.0
8.5
9.0
9.5
10.0
10.5
10 –9 –8 –7 –6 –5 –4 –3 –2 –1 0 1 2 3 4
ROA%
Quarte
r
IJAIM
3.4 Results
Table VI shows the pairwise correlation coefcients of the dependent and independent
variables. The dDROA and dDROE correlate with the BHack and the number of records in
millions (RecsM) with a level of signicance of 10 per cent. Because most of the companies
use technology in some way, nding a higher correlation between dDROA and dDROE and
the business classication is not expected. As expected, the correlation between dDROA and
dDROE is high; this is because both ROA and ROE ratios are dependent on each other and
are used as proxies to understand a companys overall performance.
The models of overall performance (proxies: dDROA and dDROE) are explained by the
controlling variables. Table VII shows 12 models to explain dDROA. In the models that
include the natural logarithm of the number of records (LnRecs) as explanatory variables for
dDROA, the t-test is signicant at the 1 per cent level. This indicates that larger data
breaches had a greater effect than smaller ones. Using other controlling variables and
including industry classication- and year-xed effect, the LnRecs are signicant at the 5
per cent level. Equation (1) shows F = 2.44 with p<0.01. The data breaches affect the
overall companiesperformance as measured by dDROA. The magnitude of the data
breaches can be measured by the number of records affected (Table VII). The number of
records is considered the key factor in determining the materiality of the effect of a data
breach on a companys performance:
dDROA ¼0:777 0:114 RecsM þ1:110 BInsd þ1:111 BHack þ1:668 BPhys
þ0:720 BDisc 0:033 BStat þ0:755 BUnkn þ0:001 CapM
1:497 dDCR þ0:511 dDTAT 0:097 CFS 0:254 B=M
0:629 dDCET þNAICS *dummies þYearit *dummies þit (1)
Like with dDROA, equation (2) shows that dDROE was found signicant (F = 1.47, p<0.01;
see Table VIII). Furthermore, the number of records breached is considered the material
factor in explaining the decrease in company performance, measured by dDROE
(Table VIII):
dDROE ¼1:76 0:056 RecsM þ0:869 BInsd þ1:195 BHack þ2:287 BPhys
þ1:111 BDisc þ0:331 BStat þ0:855 BUnkn þ0:001 CapM 2:392 dDCR
þ0:567 dDTAT 0:171 CFS 0:435 B=M0:761 dDCET
þNAICS *dummies þYearit *dummies þit
(2)
However, for the model of stock market reaction (proxy: dDSP), the F-test is not signicant
at the 10 per cent level. Investors in stock markets may react to data breach announcements
on a daily basis, as indicated by previous research (Spanos and Angelis, 2016), and not on a
quarterly basis; this is because other confounding events may minimize the effect of the
announcements over time.
4. Conclusion
From the trend analysis, the evidence showed that breached companies suffered in terms of
performance during the quarter of the breach. This conrms that the nancial statements
Data breaches
Variables 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
1. RecsM 1.000
2. BInsd 0.056 1.000
3. BHack 0.285* 0.204* 1.000
4. BPhys 0.069 0.161* 0.238* 1.000
5. BDisc 0.085 0.198* 0.292* 0.231* 1.000
6. BStat 0.026 0.061 0.090 0.071 0.088 1.000
7. BUnkn 0.034 0.078 0.115 0.091 0.112 0.035 1.000
8. CapM 0.013 0.027 0.044 0.032 0.138 0.014 0.018 1.000
9. dDROA 0.498* 0.064 0.113 0.008 0.060 0.033 0.023 0.005 1.000
10. dDROE 0.319 0.045 0.129 0.023 0.019 0.046 0.022 0.012 0.869 1.000
11. dDCR 0.134 0.110 0.049 0.051 0.090 0.029 0.021 0.040 0.126 0.007 1.000
12. dDTAT 0.019 0.064 0.103 0.102 0.021 0.012 0.033 0.090 0.011 0.016 0.036 1.000
13. dDCFS 0.013 0.030 0.055 0.032 0.023 0.015 0.019 0.010 0.013 0.021 0.056 0.028 1.000
14. dDB/M 0.007 0.085 0.047 0.053 0.167* 0.032 0.043 0.065 0.017 0.100 0.093 0.107 0.016 1.000
15. dDCET 0.035 0.045 0.040 0.192* 0.015 0.045 0.026 0.034 0.085 0.043 0.333* 0.383* 0.004 0.166* 1.000
Note: *p<0.1
Table VI.
Pairwise correlation
coefficient between
variables
IJAIM
123456
Variables dDROA dDROA dDROA dDROA dDROA dDROA
RecsM 0.114*** (0.014) 0.115*** (0.015) 0.116*** (0.015) 0.119*** (0.016) 0.116*** (0.015) 0.116*** (0.016)
BInsd 0.585 (0.693) 0.453 (0.736)
BHack 0.475 (0.596) 0.290 (0.627)
BPhys 0.006 (0.641) 0.256 (0.677)
BDisc 0.400 (0.587) 0.075 (0.611)
BStat 0.654 (1.248) 0.059 (1.247)
BUnkn 0.395 (1.020) 0.079 (1.046)
CapM
dDCR
dDTAT
dDCFS
dDB/M
dDCET
Industry included Yes Yes Yes
Years included Yes Yes
Constant 0.307 (0.190) 0.303 (2.529) 0.206 (1.297) 0.931 (2.955) 0.607 (0.426) 0.593 (2.646)
Number of breaches 190 190 190 190 190 190
R
2
0.248 0.348 0.294 0.389 0.254 0.351
Adjusted R
2
0.244 0.280 0.242 0.274 0.225 0.256
F-test 61.950 5.080 5.650 3.380 8.850 3.710
Notes: Standard errors in parentheses; ***p<0.01; **p<0.05; *p<0.1
(continued)
Table VII.
OLSDV results for
variables predicting
dROA
Data breaches
789101112
Variables dDROA dDROA dDROA dDROA dDROA dDROA
RecsM 0.116*** (0.015) 0.118*** (0.017) 0.116*** (0.014) 0.116*** (0.015) 0.116*** (0.014) 0.114*** (0.017)
BInsd 1.395* (0.747) 1.090 (0.799) 0.271 (0.793) 0.018 (0.930) 1.229 (0.972) 1.110 (1.174)
BHack 0.522 (0.704) 0.243 (0.742) 0.018 (0.658) 0.017 (0.736) 0.946 (0.944) 1.111 (1.110)
BPhys 0.453 (0.762) 0.467 (0.824) 0.146 (0.749) 0.394 (0.847) 1.228 (1.052) 1.668 (1.268)
BDisc 0.663 (0.670) 0.227 (0.725) 0.139 (0.692) 0.144 (0.771) 0.784 (0.895) 0.720 (1.069)
BStat 0.850 (1.274) 0.265 (1.286) 0.099 (1.253) 0.340 (1.281) 0.602 (1.369) 0.0334 (1.476)
BUnkn 1.518 (1.094) 1.149 (1.147) 0.149 (0.950) 0.515 (1.041) 0.914 (1.136) 0.755 (1.313)
CapM 0.001 (0.001) 0.001 (0.001) 0.001 (0.001) 0.001 (0.001)
dDCR 1.010 (1.393) 0.711 (1.537) 1.925 (1.517) 1.497 (1.723)
dDTAT 0.079 (1.636) 0.004 (1.756) 0.346 (1.747) 0.511 (1.977)
dDCFS 0.061 (0.172) 0.044 (0.179) 0.011 (0.188) 0.097 (0.199)
dDB/M 0.739 (0.690) 0.619 (0.762) 0.397 (0.737) 0.254 (0.856)
dDCET 0.602 (0.684) 0.435 (0.727) 0.753 (0.778) 0.629 (0.841)
Industry included Yes Yes Yes
Years included Yes Yes Yes Yes
Constant 1.1 (1.388) 1.599 (3.045) 0.288 (0.487) 0.369 (2.437) 0.391 (1.438) 0.777 (3.053)
Number of breaches 190 190 122 122 122 122
R
2
0.312 0.4000 0.434 0.534 0.483 0.565
Adjusted R
2
0.236 0.258 0.366 0.380 0.349 0.334
F-test 4.070 2.830 6.380 3.470 3.590 2.440
Table VII.
IJAIM
1 23456
Variables dDROE dDROE dDROE dDROE dDROE dDROE
RecsM 0.054*** 0.0122 0.058*** (0.013) 0.054*** (0.013) 0.060*** (0.014) 0.052*** (0.013) 0.057*** (0.014)
BInsd 0.030 (0.593) 0.366 (0.656)
BHack 0.382 (0.517) 0.443 (0.554)
BPhys 0.187 (0.558) 0.134 (0.599)
BDisc 0.384 (0.502) 0.595 (0.528)
BStat 0.302 (1.042) 0.0483 (1.053)
BUnkn 0.079 (0.854) 0.254 (0.882)
CapM
dDCR
dDTAT
dDCFS
dDB/M
dDCET
Industry included Yes Yes Yes
Years included Yes Yes
Constant 0.351** (0.163) 0.249 (2.124) 0.487 (1.092) 0.302 (2.531) 0.154 (0.368) 0.195 (2.224)
Number of breaches 178 178 178 178 178 178
R
2
0.101 0.208 0.142 0.241 0.108 0.216
Adjusted R
2
0.096 0.118 0.074 0.087 0.072 0.093
F-test 19.870 2.320 2.080 1.560 2.940 1.760
Notes: Standard errors in parentheses; ***p<0.01; **p<0.05; *p<0.1
(continued)
Table VIII.
OLSDV results for
variables predicting
dROE
Data breaches
789101112
Variables dDROE dDROE dDROE dDROE dDROE dDROE
RecsM 0.052*** (0.013) 0.058*** (0.014) 0.053*** (0.013) 0.055*** (0.014) 0.054*** (0.013) 0.056*** (0.015)
BInsd 0.484 (0.654) 0.086 (0.732) 0.147 (0.724) 0.513 (0.857) 1.299 (0.881) 0.869 (1.072)
BHack 0.304 (0.622) 0.498 (0.669) 0.448 (0.604) 0.636 (0.662) 1.047 (0.900) 1.195 (1.038)
BPhys 0.121 (0.688) 0.013 (0.761) 0.0771 (0.702) 0.341 (0.765) 1.508 (0.990) 2.287* (1.169)
BDisc 0.229 (0.593) 0.492 (0.651) 0.136 (0.623) 0.225 (0.677) 1.029 (0.825) 1.111 (0.959)
BStat 0.534 (1.087) 0.029 (1.117) 0.204 (1.120) 0.273 (1.112) 0.930 (1.215) 0.331 (1.264)
BUnkn 0.705 (0.947) 0.542 (1.006) 0.125 (0.850) 0.514 (0.906) 0.997 (1.018) 0.855 (1.146)
CapM 0.001 (0.001) 0.001 (0.001) 0.001 (0.001) 0.001 (0.001)
dDCR 1.444 (1.295) 1.534 (1.381) 2.533* (1.418) 2.392 (1.536)
dDTAT 0.334 (1.487) 0.116 (1.531) 0.905 (1.576) 0.567 (1.701)
dDCFS 0.027 (0.156) 0.064 (0.157) 0.068 (0.168) 0.171 (0.172)
dDB/M 0.470 (1.000) 0.344 (1.029) 0.351 (1.030) 0.435 (1.087)
dDCET 0.433 (0.627) 0.406 (0.651) 0.688 (0.700) 0.761 (0.734)
Industry included Yes Yes Yes
Years included Yes Yes Yes Yes
Constant 0.53 (1.179) 0.970 (2.595) 0.314 (0.436) 0.760 (1.420) 0.523 (1.272) 1.76 (2.629)
Number of breaches 178 178 115 115 115 115
R
2
0.156 0.253 0.202 0.393 0.293 0.462
Adjusted R
2
0.055 0.063 0.1000 0.176 0.095 0.148
F-test 1.540 1.330 1.970 1.810 1.480 1.470
Table VIII.
IJAIM
123456
Variables roeMod 1 roeMod 2 roeMod 3 roeMod 4 roeMod 5 roeMod 6
RecsM 0.001 (0.001) 0.001 (0.001) 0.001 (0.001) 0.001 (0.001) 0.001 (0.001) 0.001 (0.001)
BInsd 0.068 (0.058) 0.093 (0.063)
BHack 0.032 (0.048) 0.038 (0.052)
BPhys 0.012 (0.054) 0.030 (0.060)
BDisc 0.015 (0.049) 0.039 (0.051)
BStat 0.136 (0.097) 0.117 (0.099)
BUnkn 0.005 (0.090) 0.043 (0.092)
CapM
dDCR
dDTAT
dDCFS
dDB/M
dDCET
Industry included Yes Yes Yes
Years included Yes Yes
Constant 0.0534*** (0.016) 0.166 (0.140) 0.0784 (0.100) 0.126 (0.177) 0.0788** (0.036) 0.166 (0.142)
Number of breaches 168 168 168 168 168 168
R
2
0.002 0.124 0.08 0.208 0.022 0.143
Notes: Standard errors in parentheses; ***p<0.01; **p<0.05; *p<0.1
(continued)
Table IX.
OLSDV results for
variables predicting
dSP
Data breaches
7891011 12
Variables roeMod 7 roeMod 8 roeMod 9 roeMod 10 roeMod 11 roeMod 12
RecsM 0.001 (0.001) 0.001 (0.001) 0.001 (0.001) 0.001 (0.001) 0.001 (0.001) 0.001 (0.001)
BInsd 0.077 (0.063) 0.107 (0.068) 0.027 (0.071) 0.074 (0.083) 0.075 (0.081) 0.140 (0.086)
BHack 0.021 (0.057) 0.030 (0.061) 0.054 (0.060) 0.037 (0.067) 0.138* (0.078) 0.137* (0.082)
BPhys 0.019 (0.064) 0.024 (0.072) 0.032 (0.072) 0.057 (0.085) 0.110 (0.090) 0.124 (0.100)
BDisc 0.017 (0.056) 0.047 (0.060) 0.048 (0.064) 0.083 (0.070) 0.109 (0.075) 0.179** (0.078)
BStat 0.093 (0.101) 0.048 (0.103) 0.160 (0.110) 0.115 (0.111) 0.111 (0.110) 0.020 (0.106)
BUnkn 0.019 (0.096) 0.076 (0.100) 0.026 (0.095) 0.127 (0.102) 0.057 (0.101) 0.182* (0.103)
CapM 0.000 (0.000) 0.000 (0.000) 0.000 (0.000) 0.000 (0.000)
dDCR 0.080 (0.127) 0.154 (0.136) 0.065 (0.127) 0.140 (0.124)
dDTAT 0.057 (0.144) 0.010 (0.152) 0.115 (0.142) 0.042 (0.141)
dDCFS 0.002 (0.015) 0.010 (0.016) 0.011 (0.015) 0.005 (0.014)
dDB/M 0.060 (0.060) 0.044 (0.064) 0.057 (0.060) 0.014 (0.059)
dDCET 0.055 (0.062) 0.040 (0.064) 0.068 (0.064) 0.031 (0.062)
Industry included Yes Yes Yes
Years included Yes Yes Yes Yes
Constant 0.0504 (0.109) 0.0879 (0.182) 0.0891* (0.046) 0.164 (0.138) 0.694*** (0.208) 0.554** (0.218)
Number of breaches 168 168 112 112 112 112
R
2
0.093 0.225 0.048 0.284 0.273 0.559
Table IX.
IJAIM
and their accompanying notes, as mandatory information adhering to generally accepted
accounting principles and SEC guidelines and requirements, are an important source of
information for all stakeholders. The information voluntarily released by companies
regarding data breaches and cybersecurity incidents can be considered an indication of their
performance. The number of records affected and the type of breach (as proxies for the
importance of data breach incidents) are shown to be signicant explanatory variables for
dDROA and dDROE, as shown by pairwise correlation coefcient analysis and MLRDV
analysis. This supports the argument that nonmandatory information can assist
stakeholders in determining the effect of events on companiesperformance.
In summary, the occurrence of a data breach affects a companys overall performance as
measured by dDROA and dDROE. Data breach announcements signal internal deciencies
in breached companies; therefore, the affected companies become liable to their employees,
customers and investors. To remediate the risks and losses associated with data breaches,
companies may use their reserved funds. The ndings of this research contribute to both
theory and practice in the areas of accounting, nance and information management.
Table X.
Financial variables
denitions and
purposes
Variable Symbol Definition Purpose
Return on assets ROA Net income divided by
average total assets
Overall nancial performance; signals
effective uses of both assets and capital
Return on equity ROE Net income divided by
average stockholdersequity
Indicates how efciently a company uses the
capital it receives from its owners to
generate an investment return to those
shareholders
Share price SP Market value per common
share
Measures the stock market valuation of the
companys assets
Current ratio CR Current assets divided by
current liabilities
Proxy for company nancial health; the
ability to pay back company liabilities with
its assets
Total assets
turnover ratio
TAT Net sales revenue divided by
average total assets
Measures the value of a companys sales or
revenues generated relative to the value of
its assets; efciency measurement
Cash ow per share CFS Net income divided by the
number of outstanding
shares
Proxy for nancial strength
Book value to
market value
B/M Book value by market value
per share
Proxy for the value of a company
Cash and
equivalents
turnover
CET Sales revenue divided by
average cash and
equivalents
Proxy for immediate liquidity
Table XI.
Description of
nonnancial
explanatory
variables
Variable Description
Number of records A numeric variable that indicates the number of breached records. For normalization
purposes, the number of records in millions was used in the regression analysis
Reported number of
records
1for events announcements reporting the number of records.0 for announcements
not reporting the number of records
NAICS The rst two digits of NAICS to present industry classication
Date of the breach The date of the breach in MM/DD/YYYY
Data breaches
Name Business class Records (1,000) Breach method The content of the announcement Source
Yahoo BSO 3,000,000 Hack 2016: Yahoo warned on that it had uncovered a massive
cyber-attack, saying data from more than 1 billion user
accounts were compromised in 2013, making it the largest
breach in history. The number of affected accounts was
double the number implicated in 2014 breach that the
internet company disclosed and blamed on hackers working
on behalf of a government. Yahoo required all of its
customers to reset their passwords. Yahoo also said that it
believes hackers responsible for the previous breach had
also accessed the company proprietary code to learn how to
forge cookiesthat would allow hackers to access an
account without a password
privacyrights.org
eBay BSO 145,000 Hack 2014: The company has said hackers attacked between late
February and early March with login credentials obtained
from a small numberof employees. They then accessed a
database containing all user records and copied a large
partof those credentials
informationisbeautiful.net
Equifax BSF 143,000 Hack 2017: One of the largest credit bureaus in the U.S. said on
Sept. 7, 2017, that an application vulnerability on one of
their websites led to a data breach that exposed about 147.9
million consumers. The breach was discovered in July, but
the company says that it started in May
csoonline.com
TJX BSO 94,000 Hack 2007: Hackers hacked a Minnesota store Wi-Fi network
and stole data from credit and debit cards of shoppers at
off-price retailers TJX, owners of nearly 2,500 stores,
including T.J. Maxx and Marshalls. This case is believed to
be the largest such breach of consumer information
informationisbeautiful.net
(continued)
Table XII.
Examples of data
breached
IJAIM
Name Business class Records (1,000) Breach method The content of the announcement Source
Anthem MED 80,000 Hack 2016: The second-largest health insurer in the U.S.,
formerly known as WellPoint, said a cyber attack had
exposed the names, addresses, Social Security numbers,
dates of birth and employment histories of current and
former customerseverything necessary to steal an
identity
csoonline.com
Chase BSF 76,000 Hack 2014: The USs largest bank was compromised by hackers,
stealing names, addresses, phone numbers and emails of
account holders. The hack began in June but was not
discovered until July, when the hackers had already
obtained the highest level of administrative privilege to
dozens of the banks computer servers
informationisbeautiful.net
Target Stores BSR 70,000 Hack 2014: Investigators believe the data was obtained via
software installed on machines that customers use to swipe
magnetic strips on their cards when paying for merchandise
at Target
informationisbeautiful.net
Home Depot BSO 56,000 Hack 2014: Malware installed on cash register system across
2,200 stores syphoned credit card details of up to 56 million
customers. Maybe the same group of Russian and
Ukrainian hackers responsible for the data breaches at
Target, Sally Beauty and P.F. Changs...
informationisbeautiful.net
Adobe BSO 36,000 Hack 2013: Hackers obtained access to a large swath of Adobe
customer IDs and encrypted passwords and removed
sensitive information (i.e., names, encrypted credit or debit
card numbers, expiration dates, etc.). Approximately 36
million Adobe customers were involved: 3.1 million whose
credit or debit card information was taken and nearly 33
million active users whose current, encrypted passwords
were in the database [were] taken
informationisbeautiful.net
(continued)
Table XII.
Data breaches
Name Business class Records (1,000) Breach method The content of the announcement Source
Dun and Bradstreet BSO 33,600 Hack 2014: Hackers stole millions of social security numbers
from large US data brokers Dun and Bradstreet Corp and
Kroll Background America Inc, owned by Altegrity.
Correction 7 Jan 2015: we previously stated that records
were stolen from LexisNexis. LexisNexis conducted a
thorough investigation of the malware intrusion and found
no evidence that the malware accessed or stole any
customer or consumer data
informationisbeautiful.net
Sony BSO 24,600 Hack 2011: Hacked by LulzSec. In addition to the Sony
PlayStation Network breach, compromised 77 million
records. More than 23,000 lost nancial data, according to
Sony
informationisbeautiful.net
Table XII.
IJAIM
5. Limitations and future research
The main limitation of this study, as in all empirical studies, relates to ratio and trend
analyses. Such analyses are commonly used in researching accounting information.
However, they are mere proxies of the companiesconditions and realities, and they rely on
companiesreleased nancial reports. Companies use and make different accounting
treatments, estimations and decisions to report their nancial performance. The consistency
or reliability of such information is a matter of judgment. Another limitation concerns the
confounding events. The authors have attempted to identify the major confounding events
around the dates of the data breaches; however, this is not enough to rule out the possibility
that other events do not affect these companiesnancial performance. Therefore, the
authors recommend replicating the research when more announcements become available
per industry type to enable thevalidation of the ndings.
Risk assessment is another avenue to be addressed. This would verify how investors
perceive data breaches, taking into consideration several factors such as the size of the
companies, the type of industry, whether the effects are local or global, the hackers
ability to penetrate larger companiesrecords and other nonnancial items.
Stakeholders are concerned by the companieslevel of IT security and information
privacy (Schmidt et al., 2016). More research is needed on the integration of qualitative
factors regarding the risk of cyber exposure in auditing works (No and Vasarhelyi,
2017). Further research can be carried out to link internal accounting controls and
information technology controls and the occurrence of data breaches as part of
company events related to companiesoperational and overall nancial and
nonnancial efciency. Acquiring new technologies, such as software and hardware,
should be considered by information security management. Investing in IT can reduce
the likelihood of a data breach. Future research can investigate the relationship
between investing in IT and the occurrence of data breaches (Table IX-XII).
References
Ahmad, A., Maynard, S.B. and Shanks, G. (2015), A case analysis of information systems and security
incident responses,International Journal of Information Management, Vol. 35 No. 6,
pp. 717-723.
Altman, E.I. (1968), Financial ratios, discriminant analysis and the prediction of corporate
bankruptcy,The Journal of Finance, Vol. 23 No.4, pp. 589-609.
Altman, E.I. and Sabato, G. (2007), Modelling credit risk for SMEs: evidence from the US market,
Abacus, Vol. 43 No. 3, pp. 332-357.
Arnold, V., Bedard, J.C., Phillips, J.R. and Sutton, S.G. (2012), The impact of tagging qualitative
nancial information on investor decision making: implications for XBRL,International
Journal of Accounting Information Systems, Vol. 13 No. 1, pp. 2-20.
Ashbaugh-Skaife, H., Collins, D.W. and Kinney, W.R. Jr, (2007), The discovery and reporting of
internal control deciencies prior to SOX-mandated audits,Journal of Accounting and
Economics, Vol. 44 Nos 1/2, pp. 166-192.
Baird, D.G. and Morrison, E.R. (2005), Serial entrepreneurs and small business bankruptcies,
Columbia Law Review, Vol. 105, p. 2310.
Beaver, W.H. (1966), Financial ratios as predictors of failure,Journal of Accounting Research, Vol. 4,
pp. 71-111.
Beaver, W.H. (1968), Market prices, nancial ratios, and the prediction of failure,Journal of
Accounting Research, Vol. 6 No. 2, pp. 179-192.
Data breaches
Beaver, W.H., Correia, M. and McNichols, M.F. (2012), Do differences in nancial reporting attributes
impair the predictive ability of nancial ratios for bankruptcy?,Review of Accounting Studies,
Vol. 17 No. 4, pp. 969-1010.
Beaver, W.H., McNichols, M.F. and Rhie, J.-W. (2005), Have nancial statements become less
informative? Evidence from the ability of nancial ratios to predict bankruptcy,Review of
Accounting Studies, Vol. 10 No. 1, pp. 93-122.
Black, K. (2009), Business Statistics: Contemporary Decision Making, John Wiley and Sons,
Hoboken, NJ.
Bose, R. and Luo, X. (2014), Investigating security investment impact on rm performance,
International Journal of Accounting and Information Management, Vol. 22 No. 3, pp. 194-208.
Bradford, M. and Florin, J. (2003), Examining the role of innovation diffusion factors on the
implementation success of enterprise resource planning systems,International Journal of
Accounting Information Systems, Vol. 4 No. 3, pp. 205-225.
Brody, R.G., Chang, H.U. and Schoenberg, E.S. (2018), Malware at its worst: death and destruction,
International Journal of Accounting and Information Management, Vol. 26 No. 4, pp. 527-540.
Brush, T.H., Bromiley, P. and Hendrickx, M. (2000), The free cash ow hypothesis for sales growth
and rm performance,Strategic Management Journal, Vol. 21 No. 4, pp. 455-472.
Campbell, K., Gordon, L.A., Loeb, M.P. and Zhou, L. (2003), The economic cost of publicly announced
information security breaches: empirical evidence from the stock market,Journal of Computer
Security, Vol. 11 No.3, pp. 431-448.
Chen, C.X., Lu, H. and Sougiannis, T. (2012), The agency problem, corporate governance, and the
asymmetrical behavior of selling, general, and administrative costs,Contemporary Accounting
Research, Vol. 29 No. 1, pp. 252-282.
Chen, Y.C., Hung, M. and Wang, Y. (2017), The effect of mandatory CSR disclosure on rm
protability and social externalities: evidence from China,Journal of Accounting and
Economics, Vol. 65 No. 1, pp. 169-190.
Desai, N.K., Gerard, G.J. and Tripathy, A. (2011), Internal audit sourcing arrangements and reliance by
external auditors,Auditing: A Journal of Practice and Theory, Vol. 30 No. 1, pp. 149-171.
Doyle, J., Ge, W. and McVay, S. (2007), Determinants of weaknesses in internal control over nancial
reporting,Journal of Accounting and Economics, Vol. 44 Nos 1/2, pp. 193-223.
Eden, R., Sedera, D. and Tan, F.B. (2014), Sustaining the momentum: archival analysis of enterprise
resource planning systems (2006-2012),Communications of the Association for Information
Systems, Vol. 35, p. 3.
Ettredge, M., Guo, F. and Li, Y. (2018), Trade secrets and cyber security breaches,Journal of
Accounting and Public Policy, Vol. 37 No. 6, pp. 564-585.
Ettredge, M. and Richardson, V.J. (2003), Information transfer among internet rms: the case of hacker
attacks,Journal of Information Systems, Vol. 17 No. 2, pp. 71-82.
Fama, E.F. (1970), Efcient Capital markets: a review of theory and empirical work,The Journal of
Finance, Vol. 25 No.2, pp. 383-417.
Fama, E.F. and French, K.R. (2015), Incremental variables and the investment opportunity set,
Journal of Financial Economics, Vol. 117 No. 3, pp. 470-488.
Frino, A., Jones, S. and Wong, J.B. (2007), Market behaviour around bankruptcy announcements:
evidence from the Australian stock exchange,Accounting and Finance, Vol. 47 No. 4,
pp. 713-730.
Fu, R., Kraft, A. and Zhang, H. (2012), Financial reporting frequency, information asymmetry, and the
cost of equity,Journal of Accounting and Economics, Vol. 54 Nos 2/3, pp. 132-149.
Garg, A., Curtis, J. and Halper, H. (2003), Quantifying the nancial impact of IT security breaches,
Information Management and Computer Security, Vol. 11 No. 2, pp. 74-83.
IJAIM
Ghosh, A.K. and Swaminatha, T.M. (2001), Software security and privacy risks in mobile e-
commerce,Communications of the ACM, Vol. 44 No. 2, pp. 51-57.
Gordon, L.A., Loeb, M.P. and Sohail, T. (2010), Market value of voluntary disclosures concerning
information security,MIS Quarterly, Vol. 34, No. 3, pp. 567-594.
Gramling, A.A., Maletta, M.J., Schneider, A. and Church, B.K. (2004), The role of the internal audit
function in corporate governance: a synthesis of the extant internal auditing literature and
directions for future research,Journal of Accounting Literature, Vol. 23,p. 194.
Greene, W.H. (2012), Econometric Analysis, 71e, Stern School of Business, New York University,
New York, NY.
Haislip, J.Z. and Richardson, V.J. (2017), The effect of customer relationship management systems on
rm performance,International Journal of Accounting Information Systems, Vol. 27, pp. 16-29.
Harris, K. (2016), California data breach report 2012-2015, available at: https://oag.ca.gov/sites/all/
les/agweb/pdfs/dbr/2016-data-breach-report.pdf (accessed 26 June 2019).
Higgs, J.L., Pinsker, R.E., Smith, T.J. and Young, G.R. (2016), The relationship between board-level
technology committees and reported security breaches,Journal of Information Systems, Vol. 30
No. 3, pp. 79-98.
Hovav, A. and DArcy, J. (2003), The impact of denial-of-service attack announcements on the market
value of rms,Risk Management and Insurance Review, Vol. 6 No. 2, pp. 97-121.
Iqbal, Z. and French, D. (2005), Managerial actions and stock transactions during nancial distress:
some empirical evidence,Journal of Economics and Finance, Vol. 29 No. 2, pp. 154-171.
Jensen, M.C. (1986), Agency costs of free cash ow, corporate nance, and takeovers,The American
Economic Review, Vol. 76 No. 2, pp. 323-329.
Jensen, M.C. and Meckling, W.H. (1976), Theory of the rm: managerial behavior, agency costs and
ownership structure,Journal of Financial Economics, Vol. 3 No. 4, pp. 305-360.
Jerman-Blaži
c, B. (2008), An economic modelling approach to information security risk management,
International Journal of Information Management, Vol. 28 No. 5, pp. 413-422.
Jouini, M., Rabai, L.B.A. and Aissa, A.B. (2014), Classication of security threats in information
systems,Procedia Computer Science, Vol. 32, pp. 489-496.
Jumah, A.H. (2009), The implications of materiality concept on accounting practices and decision
making,Revista Empresarial Inter Metro/Inter Metro Business Journal, Vol. 5 No. 1, pp. 22-37.
Jumah, A.H. (2014), The materiality concept: implications for managers and investors,Revista
Finanzas y Política Econ
omica, Vol. 6 No. 1, pp. 159-168.
Jumah, A.H. (2019), Behavioral elements related to consideration and use of materiality concept in
accounting practices, accountancy business and the public interest.
Kannan, K., Rees, J. and Sridhar, S. (2007), Market reactions to information security breach
announcements: an empirical analysis,International Journal of Electronic Commerce, Vol. 12
No. 1, pp. 69-91.
Karimi, V., Cowan, D. and Alencar, P. (2014), An approach to correctness of security and operational
business policies,International Journal of Accounting Information Systems, Vol. 15 No. 4,
pp. 323-334.
Ko, M. and Dorantes, C. (2006), The impact of information security breaches on nancial performance
of the breached rms: an empirical investigation,Journal of Information Technology
Management, Vol. 17 No. 2, pp. 13-22.
Kuhn, J.R., Jr, Ahuja, M. and Mueller, J. (2013), An examination of the relationship of IT control
weakness to company nancial performance and health,International Journal of Accounting
and Information Management, Vol. 21 No. 3, pp. 227-240.
Lajili, K. and Zéghal, D. (2010), Corporate governance and bankruptcy ling decisions,Journal of
General Management, Vol. 35 No. 4, pp. 3-26.
Data breaches
Leach, R. and Newsom, P. (2007), Do rms manage their earnings prior to ling for bankruptcy?,
Academy of Accounting and Financial Studies Journal, Vol. 11 No. 3, pp. 125.
Marriott, H.R., Williams, M.D. and Dwivedi, Y.K. (2017), Risk, privacy and security concerns in digital
retail,The Marketing Review, Vol. 17 No.3, pp. 337-365.
Martin, K. (2018), The penalty for privacy violations: how privacy violations impact trust online,
Journal of Business Research, Vol. 82, pp. 103-116.
Martin, K.D., Borah, A. and Palmatier, R.W. (2017), Data privacy: effects on customer and rm
performance,Journal of Marketing, Vol. 81 No. 1, pp.36-58.
Mathur, M. (2018), Where is the security blanket? Developing social media marketing capability as a shield from
perceived cybersecurity risk,Journal of Promotion Management, Vol. 25 No. 2, pp. 1-25.
Messier, W.F., Jr, Reynolds, J.K., Simon, C.A. and Wood, D.A. (2011), The effect of using the internal
audit function as a management training ground on the external auditors reliance decision,
The Accounting Review, Vol. 86 No. 6, pp. 2131-2154.
Muhanna, W.A. and Stoel, M.D. (2010), How do investors value IT? An empirical investigation of the
value relevance of IT capability and IT spending across industries,Journal of Information
Systems, Vol. 24 No. 1, pp. 43-66.
No, W.G. and Vasarhelyi, M.A. (2017), Cybersecurity and continuous assurance,Journal of Emerging
Technologies in Accounting, Vol. 14 No. 1, pp. 1-12.
Ohlson, J.A. (1980), Financial ratios and the probabilistic prediction of bankruptcy,Journal of
Accounting Research, Vol. 18 No. 1, pp. 109-131.
Pindado, J., Rodrigues, L. and de la Torre, C. (2008), Estimating nancial distress likelihood,Journal
of Business Research, Vol. 61 No. 9, pp. 995-1003.
Roumani, Y., Nwankpa, J.K. and Roumani, Y.F. (2016), Examining the relationship between rms
nancial records and security vulnerabilities,International Journal of Information
Management, Vol. 36 No. 6, pp. 987-994.
Schatz, D. and Bashroush, R. (2016), The impact of repeated data breach events on organisations
market value,Information and Computer Security, Vol. 24 No. 1, pp. 73-92.
Schmidt, P.J., Wood, J.T. and Grabski, S.V. (2016), Business in the cloud: research questions on
governance, audit, and assurance,Journal of Information Systems, Vol. 30No. 3, pp. 173-189.
Silverman, D.L. (2014), Developments in data security breach liability,The Business Lawyer, Vol. 70
No. 1, pp. 231-245.
Soomro, Z.A., Shah, M.H. and Ahmed, J. (2016), Information security management needs more holistic
approach: a literature review,International Journal of Information Management, Vol. 36 No. 2,
pp. 215-225.
Spanos, G. and Angelis, L. (2015), Impact metrics of security vulnerabilities: analysis and weighing,
Information Security Journal: A Global Perspective, Vol. 24 Nos 1/3, pp. 57-71.
Spanos, G. and Angelis, L. (2016), The impact of information security events to the stock market: a
systematic literature review,Computers and Security, Vol. 58, pp. 216-229.
Stoel, M.D. and Muhanna, W.A. (2009), IT capabilities and rm performance: a contingency analysis of the
role of industry and IT capability type,Information and Management, Vol. 46 No. 3, pp. 181-189.
Stoel, M.D. and Muhanna, W.A. (2011), IT internal control weaknesses and rm performance: an
organizational liability lens,International Journal of Accounting Information Systems, Vol. 12
No. 4, pp. 280-304.
Stubben, S.R. (2010), Discretionary revenues as a measure of earnings management,The Accounting
Review, Vol. 85 No. 2, pp. 695-717.
Theodossiou, P.T. (1993), Predicting shifts in the mean of a multivariate time series process: an
application in predicting business failures,Journal of the American Statistical Association,
Vol. 88 No. 422, pp. 441-449.
IJAIM
Tinoco, M.H. and Wilson, N. (2013), Financial distress and bankruptcy prediction among listed
companies using accounting, market and macroeconomic variables,International Review of
Financial Analysis, Vol. 30, pp. 394-419.
Trope, R.L. (2012), “‘Theres no app for that: calibrating cybersecurity safeguards and disclosures,
The Business Lawyer, Vol. 68 No. 1, pp. 183-195.
Vasarhelyi, M.A. (2012), Financial accounting standards should not matter: its just a layer,Journal of
Information Systems, Vol. 26 No. 2, pp. 1-11.
Wang, G.Y. (2010), The impacts of free cash ows and agency costs on rm performance,Journal of
Service Science and Management, Vol. 03 No. 4, pp. 408-418.
Weisner, M.M. and Sutton, S.G. (2015), When the world isnt always at: the impact of psychological
distance on auditorsreliance on specialists,International Journal of Accounting Information
Systems, Vol. 16, pp. 23-41.
Corresponding author
Ahmad H. Jumah can be contacted at: jumah@uis.edu
For instructions on how to order reprints of this article, please visit our website:
www.emeraldgrouppublishing.com/licensing/reprints.htm
Or contact us for further details: permissions@emeraldinsight.com
Data breaches
... Information is considered a highly valuable asset for any organisational entity, given that any loss or unintended disclosure of such information has the potential to seriously impact a company's public image, financial stability, and operational continuity (Juma'h & Alnsour, 2020). Threats to information security can arise from a variety of sources, which include hacking attacks, malware infections, data leakage incidents, and insider threats originating from individuals who have access to the organisation's internal systems. ...
Article
Full-text available
In the continually evolving digital business era, information security has become paramount for organizations to ensure the continuity of their operations. Information security systems involve not only technology but also organizational and social factors that play a crucial role in managing human resources. This research aims to conduct an in-depth analysis of how human resources can influence the success of information security systems in the context of digital business. The research method employed in this study is a qualitative literature review with data collection from Google Scholar for the years 2006-2024. The study findings indicate that in the ever-evolving digital era, information security is crucial in the context of digital business. Information security systems rely not only on technology but also on organizational, social, and human factors. Effective integration of technology, organization, and human resources is key to creating a strong and adaptive information security environment.
... To overcome these reservations, well-known brand names can serve as the foundation of trust (Boukis, 2020;Ertemel, 2018;Wottrich et al., 2017). The underlying consumer heuristic builds on the notion that well-known brands have more to lose in the case of a data breach, with high amounts of brand reputation and stock value at stake (Conroy et al., 2014;Juma'h & Alnsour, 2020;Whitler & Farris, 2017). This pertains particularly to Big Tech brands like Google, Amazon, IBM, Apple, or Microsoft, which consistently rank among the most valuable and most trusted brands in the world (Kantar, 2020;morningconsult, 2020). ...
Article
Full-text available
This paper explores the dynamics between value-added services, intermediary brands, and consumer privacy concerns in shaping attitudes toward blockchain-enabled consumer services. Grounded in the Antecedents-Privacy Concerns-Outcomes (APCO) framework, we develop a theoretical model that we test in three experimental studies with a total of 1613 participants, utilizing verbal scenarios featuring blockchain applications for international money transfer and hotel booking. Our research reveals that complete disintermediation via pure peer-to-peer blockchain transactions is unlikely. Consumers prefer blockchain applications offering supplementary services like call centers, password assistance, and cancellation options. As consumers become familiar with blockchain technology, privacy concerns intensify due to its distributed and immutable storage. The fears of data breaches are more pronounced when blockchain applications are offered by unknown startups as opposed to well-known Big Tech companies. However, privacy-conscious consumers also value the prospect of distancing themselves from big-data ecosystems by embracing blockchain solutions from startups. Our research extends the APCO framework by clarifying how privacy concerns, brand-based heuristics, and technological attributes interact. For managerial implications, blockchain applications necessitate re-intermediation to meet consumer preferences. Potential intermediaries, including Big Tech firms, startups, and industry incumbents, face unique challenges in developing and marketing blockchain-enabled consumer services.
Article
Full-text available
Data protection laws play a crucial role in enhancing consumer trust in the digital economy, especially with the rise of online cybersecurity threats due to firm expansion. Despite advances, personal data protection laws remain controversial globally, with challenges in implementation hindering progress in some regions. This research examines the competitive advantage of building consumer trust through the Personal Data Protection Law. This research uses juridical-normative research with a legislative approach and comparison with other countries. A comparison was made with India, one of the countries with higher awareness of the importance of personal data protection laws than other countries. The results show that Consumer trust in a company is measured by the extent to which they believe the company will protect their data. Public privacy policies and government regulations that enforce data security measures and increase transparency positively impact trust by reducing concerns about privacy risks. Although data protection laws have been introduced, obstacles such as lack of legal assistance and overlapping sectoral regulations still exist, hindering the smooth implementation of these laws. Nevertheless, implementing data protection laws, such as Indonesia's Private Data Protection Law No. 27 of 2022 and India's Digital Personal Data Protection Act of 2023, is crucial for boosting consumer confidence and regulating data processing. Data security is critical in establishing and maintaining consumer trust in companies as online cybersecurity threats increase with business expansion.
Article
Unauthorized access to sensitive or confidential data results in a data breach, which can cause significant harm to an organization. Reporting breaches and reviewing prior records can help reduce damages. To aid in preparation, antivirus and security companies have published data breach reports, but they can be difficult to comprehend and require substantial effort to study. This article proposes a data breach incident classification framework using machine learning algorithms (naive Bayes, logistic regression, support vector machine, and random forest) on a dataset from the Privacy Rights Clearinghouse. The framework’s performance is evaluated using various metrics, including accuracy, F1 score, and confusion matrix. The article also employs topic modeling with latent Dirichlet allocation to enhance the classification’s accuracy.
Article
Full-text available
Agriculture is the backbone of our economy. Major Indian families benefit because of this industry, and thanks to technology today, major startups are engaged in this industry, which it believes to be "sustainable." Agriculture, 70 percent of its rural households depend primarily work on agriculture for their livelihood, the agriculture industry contributes to around 16.5 percentage of India's Gross Domestic Product. The focus of this research is to examine the influence of solvency and profitability regarding the price of Agri-related stocks using multiple regression analysis. The study finds a significant relationship between solvency and stock price, suggesting that agri stocks with higher solvency are prone to experience an increase in stock prices. However, the research does not find any association among profitability and price of the stocks, implying that profitability does not necessarily affect the stock price of Agri stocks. This study is conducted by taking the top ten agriculture companies in terms of market capitalization value. The sample consists of ten Agricultural stocks that are publicly traded on the stock exchange of India, chosen according to market capitalization, and the period of analysis is from 2018 to 2022.The research design is employed empirical model with the variables Net Profit Margin, Debt-to-equity ratio, Return on Equity, and return on assets are chosen as independent variables and stock price is considered a dependent variable. The MS Excel is used for storing and data pre-processing. The Statistical Package for Social Science is used for data analysis. The descriptive statistics, correlation matrix, Variance inflation factor, and regression analysis are used for research analysis and helped to reach the research objectives. This study's results have crucial significance for individuals who invest and make financial decisions, especially for those in the agricultural sector, as they can use solvency as a reliable indicator of future stock prices.
Article
Full-text available
As digital marketing strategies become increasingly integrated into business models, unique vulnerabilities to cyber threats make cybersecurity essential. This descriptive study provides a detailed analysis of cybersecurity for digital marketing, which is rapidly evolving with technological advancements and consumer behavior transitions. The integration of tools like Search Engine Optimization, social media, and online advertising and their susceptibility to cyber risks are investigated. Critical cybersecurity threats in digital marketing, including phishing attacks, malware and ransomware, data breaches, and Distributed Denial of Service attacks, are explored, emphasizing their potential impact on business operations, customer trust, and brand reputation. The study further explores best practices in cybersecurity tailored to the digital marketing area, advocating for regular software updates, comprehensive employee training, stringent data encryption protocols, strong password policies, multi-factor authentication, and periodic security audits, highlighting the importance of data backups and adherence to data protection laws in maintaining legal and ethical standards. The role of Artificial Intelligence and Machine Learning is investigated, emphasizing how these technologies enhance cybersecurity measures through proactive threat detection and efficient incident management. Additionally, the study examines the rising consumer concerns and awareness regarding data privacy and security in digital marketing, reflecting how these concerns influence business practices and the increasing demand for transparency and data control among consumers. Necessitating continuous vigilance and adaptation to protect against ever-evolving cyber threats, effective cybersecurity is indispensable in digital marketing for protection against cyber threats and as a vital element in building and maintaining consumer trust and loyalty.
Article
Many business and technology organizations see cloud adoption and migrating existing systems to the cloud as an accelerator of digital transformation. The benefits of cloud adoption are perceived as increased scalability and cost reduction. At the same time, there are concerns about whether the information on cloud-based systems is secure and whether the privacy of the data in a cloud environment is at risk. This research brings out the industry’s perspective, both from an end-user perspective as well as IT transformation and IT procurement decision makers of accounting information systems and enterprise resource planning systems in Asia geography, on the preference for cloud-based or on-premise systems, top enablers for cloud adoption and importance of SOC 2® as an assurance for information security and data privacy concerns. The findings of this research indicate that decision-makers for IT transformation and IT procurement prefer cloud-based accounting information systems and enterprise resource planning systems over on-premise systems. Scalability, cost reduction, business agility, business continuity and disaster recovery, and enhanced collaboration are top enablers for cloud adoption. This research also indicates that the SOC 2® report is increasingly seen to address information security and data privacy concerns. Keywords: SOC 2®; Trust services criteria; Information security; Data privacy; Cloud computing; Accounting Information Systems
Article
Full-text available
This paper aims to investigate the impact of information security that results from applying information technology governance on the financial and non-financial performance in Egyptian business environment. This paper analyzes the impact of information technology governance on achieving information security protection in companies using the COBIT 2019 framework and related ISO standards versions. As well as, it illustrates the information technology governance mechanisms and its impact to improve the financial and non-financial performance. Finally, this paper analyzes the impact of protecting accounting information that provided by information security, as a result of information technology governance, on the financial and non-financial performance in the Egyptian business environment. This paper also provided a field study that included many companies working in the information technology such as telecommunications companies and information technology
Article
Full-text available
Although cybersecurity is important for any organization, firms have little understanding of the ramifications of perceived cybersecurity risk and how marketers can avert its negative marketing outcomes. The inability of firms to prevent massive data breaches in the recent past has heightened cybersecurity risk perceptions of customers and cybersecurity-related marketing challenges and opportunities. This study links cybersecurity risk with firm risk through firm reputation by developing a conceptual framework grounded in perceived risk theory in conjunction with dynamic capabilities and social network theoretical perspectives. Our findings show that social media marketing capabilities enable firms in mitigating the adverse impact of cybersecurity risk in declining firm reputation and value. Thus, this study provides significant implications for marketing theory and practice.
Article
Full-text available
We examine how mandatory disclosure of corporate social responsibility (CSR) impacts firm performance and social externalities. Our analysis exploits China's 2008 mandate requiring firms to disclose CSR activities, using a difference-in-differences design. Although the mandate does not require firms to spend on CSR, we find that mandatory CSR reporting firms experience a decrease in profitability subsequent to the mandate. In addition, the cities most impacted by the disclosure mandate experience a decrease in their industrial wastewater and SO2 emission levels. These findings suggest that mandatory CSR disclosure alters firm behavior and generates positive externalities at the expense of shareholders.
Article
Full-text available
With information misuse as a particularly salient form of risk online, respecting privacy is often closely tied to trust in consumer surveys. This study uses factorial vignette survey methodology to measure the relative importance of violating privacy expectations to consumers' trust in a website. The findings suggest consumers find violations of privacy expectations, specifically the secondary uses of information, to diminish trust in a website. Firms that violate privacy expectations are penalized twice: violations of privacy (1) impact trust directly and (2) diminish the importance of trust factors such as integrity and ability on trust. In addition, consumers with greater technology savvy place greater importance on privacy factors than respondents with less knowledge. Violations of privacy may place firms in a downward trust spiral by decreasing not only trust in the website but also the impact of possible mechanisms to rebuild trust such as a firm's integrity and ability.
Article
We study the association between firms’ disclosures in Forms 10-K of the existence of trade secrets, and cyber theft of corporate data (which we refer to as “Breaches”). Prior academic research explaining occurrence of Breaches is scarce, and no prior study has focused specifically on Breaches that likely target trade secrets. We provide such evidence, and our use of Form 10-K contents related to trade secrets is a first step toward determining whether corporations actually attract Breach activity through their public disclosures. We find that firms mentioning the existence of trade secrets have a significantly higher subsequent probability of being Breached relative to firms that do not do so. Our results are stronger among younger firms, firms with fewer employees, and firms operating in less concentrated industries. By conducting a battery of additional tests, we attempt to go beyond merely establishing correlations to provide evidence whether such proprietary information can actually attract cyber attacks. Specifically, our results are robust to additional control variables, an instrumental variable approach, firm fixed effects, and a propensity score matching technique.
Article
Purpose Most people are probably aware of malware but they may not be aware of malware in what may be its most dangerous form: causing physical harm, even death, to individuals. This paper will document how software can cause malicious harm to individuals by attacking modern systems that appear to be neglected and under-researched. Design/methodology/approach This paper will review some of the most significant areas of concern with respect to end of days malware; that is, malware that has a dangerous intent. Areas included are: automobiles, medical devices and air traffic control systems. Findings The potential harmful effects of malware are often not well known by consumers and businesses around the world. These issues are not limited to just financial harm. Lives can actually be in danger. Underestimating the importance of cybersecurity and understanding the dangers that are associated with advancing technology are global issues that will continue to persist unless there is enough awareness to force businesses and governments to address these issues. It is critical that safeguards are established. Originality/value While many articles have been written about malware and the implications of having malicious software infect a computer or a network, little attention has been paid to "end of days" malware. With advancing technology, malware now has the ability to cause serious injury or death to individuals who have minimal or no knowledge of the potential consequences of their use of, for example, an automobile, a medical device or an airplane. It is up to businesses and governments to address these issues.
Article
This paper provides a review of various aspects of the digital retail environment to inform understanding of the antecedents and consequences of the main barriers towards consumer acceptance behaviour and to identify limitations in literature requiring empirical exploration. Through analysis of relevant secondary research, this paper draws on significance research findings and limitations and offers three important contributions for both academics and practitioners. First, it adds to the understanding of the roles of perceived risk, privacy and security concerns throughout the digital environment, and second, it specifically recognises limitations in risk related research within online shopping literature. Finally, it indicates the potential consequences of the barriers identified providing a framework for future consideration, which informs the development of mobile shopping platforms and facilitates the establishment of mechanisms to defuse the barriers affecting m-shopping acceptance.