Exploring the characteristics of Internet security breaches that impact the market value of breached firms

被引:37
作者
Andoh-Baidoo, Francis K.
Osei-Bryson, Kweku-Muata
机构
[1] Virginia Commonwealth Univ, Dept Informat Syst, Richmond, VA 23284 USA
[2] Virginia Commonwealth Univ, Informat Syst Res Inst, Richmond, VA 23284 USA
关键词
Internet security breaches; event study; market value; firm characteristics; attack characteristics; decision tree induction; data mining; regression; exploratory data analysis; PRELIMINARY CLASSIFICATION SCHEME; ATTACKS; MODEL;
D O I
10.1016/j.eswa.2006.01.020
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The impact of Internet security breaches on firms has been a concern to both researchers and practitioners. One measure of the damage to the breached firm is the observed cumulative abnormal stock market return (CAR) when there is announcement of the attack in the public media. To develop effective Internet security investment strategies for preventing such damage, firms need to understand the factors that lead to the occurrence of CAR. While previous research have involved the use of regression analysis to explore the relationship between firm and attack characteristics and the occurrence of CAR, in this paper we use decision tree (DT) induction to explore this relationship. The results of our DT-based analysis indicate that both attack and firm characteristics determine CAR. While each of our results is consistent with that of at least one previous study, no previous single study has provided evidence that both firm and attack characteristics are determinants of CAR. Further, the DT-based analysis provides an interpretable model in the form of understandable and actionable rules that may be used by decision makers. The DT-based approach thus provides additional insights beyond what may be provided by the regression approach that has been employed in previous research. The paper makes methodological, theoretical and practical contribution to understanding the predictors of damage when a firm is breached. (C) 2006 Published by Elsevier Ltd.
引用
收藏
页码:703 / 725
页数:23
相关论文
共 23 条
[1]  
[Anonymous], 1994, Fundamentals of Computer Security Technology
[2]  
Bener A., 2000, RISK PERCEPTION TRUS
[3]  
Breiman L., 1984, Classification and Regression Trees, V432, P151
[4]  
Campbell K., 2003, Journal of Computer Security, V11, P431
[5]   The effect of Internet security breach announcements on market value: Capital market reactions for breached firms and Internet security developers [J].
Cavusoglu, H ;
Mishra, B ;
Raghunathan, S .
INTERNATIONAL JOURNAL OF ELECTRONIC COMMERCE, 2004, 9 (01) :69-104
[6]   A cause and effect model of attacks on information systems [J].
Cohen, F ;
Phillips, C ;
Swiler, LP ;
Gaylor, T ;
Leary, P ;
Rupley, F ;
Isler, R .
COMPUTERS & SECURITY, 1998, 17 (03) :211-221
[7]   Information system defences: A preliminary classification scheme [J].
Cohen, F .
COMPUTERS & SECURITY, 1997, 16 (02) :94-114
[8]   Information system attacks: A preliminary classification scheme [J].
Cohen, F .
COMPUTERS & SECURITY, 1997, 16 (01) :29-46
[9]  
Ettredge M., 2001, INT C INF SYST NEW O, P275
[10]  
Gordon L. A., 2002, ACM Transactions on Information and Systems Security, V5, P438, DOI 10.1145/581271.581274