Access the full text.
Sign up today, get DeepDyve free for 14 days.
M. Blume, Donald Keim (2012)
Institutional Investors and Stock Market Liquidity: Trends and RelationshipsS&P Global Market Intelligence Research Paper Series
Huseyin Cavusoglu, B. Mishra, Srinivasan Raghunathan (2004)
The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security DevelopersInternational Journal of Electronic Commerce, 9
S. Dartmouth (2007)
What Hackers Learn that the Rest of Us Don't
Yubo Chen, Shankar Ganesan, Yong Liu (2009)
Does a Firm's Product-Recall Strategy Affect Its Financial Value? An Examination of Strategic Alternatives during Product-Harm CrisesJournal of Marketing, 73
Ashish Garg, Jeffrey Curtis, H. Halper (2003)
Quantifying the financial impact of IT security breachesInf. Manag. Comput. Secur., 11
A. Hovav, M. Hemmert, Yoo-Jung Kim (2011)
Determinants of Internet standards adoption: The case of South KoreaResearch Policy, 40
F. Gul, Hanqing Qiu (2002)
Legal Protection, Corporate Governance and Information Asymmetry in Emerging Financial MarketsCorporate Finance and Organizations eJournal
A. Hovav, J. D'Arcy (2004)
The Impact of Virus Attack Announcements on the Market Value of FirmsInformation Systems Security, 13
Katherine Campbell, Lawrence Gordon, Martin Loeb, Lei Zhou (2003)
The Economic Cost of Publicly Announced Information Security Breaches: Empirical Evidence from the Stock MarketJ. Comput. Secur., 11
Hyun-Han Shin, Y. Park (1999)
Financing constraints and internal capital markets: Evidence from Korean `chaebols'Journal of Corporate Finance, 5
B. Santos, K. Peffers, D. Mauer (1993)
The Impact of Information Technology Investment Announcements on the Market Value of the FirmInf. Syst. Res., 4
E. Morse, Vasant Raval, John Wingender (2011)
Market Price Effects of Data Security BreachesInformation Security Journal: A Global Perspective, 20
Saini Das, Arunabha Mukhopadhyay, M. Anand (2012)
Stock Market Response to Information Security Breach: A Study Using Firm and Attack CharacteristicsJournal of Information Privacy and Security, 8
Sangmi Chai, Minkyun Kim, H. Rao (2011)
Firms' information security investment decisions: Stock market evidence of investors' behaviorDecis. Support Syst., 50
K. Im, K. Dow, V. Grover (2001)
Research Report: A Reexamination of IT Investment and the Market Value of the Firm - An Event Study MethodologyInf. Syst. Res., 12
P. Bolster, Coleen Pantalone, E. Trahan (2010)
Security Breaches and Firm ValueJournal of Business Valuation and Economic Loss Analysis, 5
A. Marcus (1989)
THE DETERRENT TO DUBIOUS CORPORATE BEHAVIOR : PROFITABILITY, PROBABILITY, AND SAFETY RECALLSSouthern Medical Journal, 10
I. Dyck, N. Volchkova, Luigi Zingales (2004)
The Corporate Governance Role of the Media: Clinical Evidence from Russia
Han-soo Choi, Hyoung-Goo Kang, Woojin Kim, Changmin Lee, Jongsik Park (2016)
Too Big to Jail? Company Status and Judicial Bias in an Emerging MarketWiley-Blackwell: Corporate Governance: An International Review
B. Barber, M. Darrough (1996)
Product Reliability and Firm Value: The Experience of American and Japanese Automakers, 1973-1992Journal of Political Economy, 104
Claudio Loderer, D. Mauer (1992)
Corporate Dividends and Seasoned Equity Issues: An Empirical InvestigationJournal of Finance, 47
Jongtae Choi (1999)
Confucian Value on the Corporate Community & HRM in Korea
L. Shao, C. Kwok, O. Guedhami (2010)
National culture and dividend policyJournal of International Business Studies, 41
A. Hovav, P. Gray (2014)
The Ripple Effect of an Information Security Breach Event: A Stakeholder AnalysisCommun. Assoc. Inf. Syst., 34
A. Hovav, J. D'Arcy (2003)
The Impact of Denial‐of‐Service Attack Announcements on the Market Value of FirmsRisk management and insurance review, 6
Kevin Gatzlaff, Kathleen McCullough (2008)
The Effect of Data Breaches on Shareholder WealthCorporate Finance: Valuation
R. Porta, Florencio Silanes, Andrei Shleifer, Robert Vishny (1999)
Investor Protection and Corporate ValuationChicago Booth: Fama-Miller Working Paper Series
E. Fama, L. Fisher, M. Jensen, Richard Roll (1969)
The Adjustment of Stock Prices to New InformationCapital Markets: Market Efficiency eJournal
M. Thomsen, A. McKenzie (2001)
Market Incentives for Safe Foods: An Examination of Shareholder Losses from Meat and Poultry RecallsComparative Political Economy: Regulation eJournal
F. Andoh-Baidoo, Kwasi Amoako-Gyampah, Kweku-Muata Osei-Bryson (2010)
How Internet Security Breaches Harm Market ValueIEEE Security & Privacy, 8
C. McLeish, Roumeen Islam, S. Djankov (2002)
The right to tell : the role of mass media in economic development
F. Andoh-Baidoo (2013)
Explaining investors' reaction to internet security breach using deterrence theoryInternational Journal of Electronic Finance, 7
G. Dhillon, J. Backhouse (2000)
Technical opinion: Information system security management in the new millenniumCommun. ACM, 43
R. Porta, Florencio Silanes, Andrei Shleifer, Robert Vishny (1999)
Investor Protection and Corporate GovernanceChicago Booth: Fama-Miller Working Paper Series
Jun-Koo Kang, Jae-Seung Baek, K. Park (2002)
Corporate Governance and Firm Value: Evidence from the Korean Financial CrisisCorporate Finance: Governance
Karthik Kannan, Jackie Ulmer, S. Sridhar (2007)
Market Reactions to Information Security Breach Announcements: An Empirical AnalysisInternational Journal of Electronic Commerce, 12
A. Chui, S. Titman, K. Wei (2009)
Individualism and Momentum Around the WorldInternational Corporate Finance eJournal
J. D'Arcy, A. Hovav, D. Galletta (2009)
User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence ApproachInf. Syst. Res., 20
Seung-Jung Shin (2011)
The Model Proposal of Mobile Cloud Security TechnologyThe Journal of the Institute of Webcasting, Internet and Telecommunication, 11
Mingyi Hung (2000)
ACCOUNTING STANDARDS AND VALUE RELEVANCE OF FINANCIAL STATEMENTS: AN INTERNATIONAL ANALYSISJournal of Accounting and Economics, 30
S. Byun, Da Kim, S. Yun (2012)
Revealing the Family Name: Valuation Effects of Name Changes for Chaebol-Affiliated FirmsERN: Behavioral Finance (Microeconomics) (Topic)
R. Porta, Florencio Silanes, Andrei Shleifer, Robert Vishny (1997)
Legal Determinants of External FinanceCapital Markets eJournal
A. Hovav, F. Andoh-Baidoo (2007)
Classification of security breaches and their impact on the market value of firms
Kee‐Hong Bae, Jun-Koo Kang, Jin-Mo Kim (2000)
Tunneling or Value Addition? Evidence from Mergers by Korean Business GroupsCorporate Finance and Organizations eJournal
I. Dyck, Luigi Zingales (2002)
The Corporate Governance Role of the MediaCorporate Finance: Governance
Jens Hagendorff, M. Collins, K. Keasey (2008)
Investor Protection and the Value Effects of Bank Merger Announcements in Europe and the USJournal of Banking and Finance, 32
Kai Li, D. Griffin, Heng Yue, Longkai Zhao (2010)
National culture and capital structure decisions: Evidence from foreign joint ventures in ChinaJournal of International Business Studies, 42
S. Petter, Thomas Stafford, Xihui Zhang, Heidi Seward (2017)
The DATABASE for advances in information systems, 48
J. Howard (1998)
An analysis of security incidents on the Internet 1989-1995
Li Wang, Pervaiz Alam (2007)
Information Technology Capability: Firm Valuation, Earnings Uncertainty, and Forecast AccuracyJ. Inf. Syst., 21
Lawrence Gordon, Martin Loeb, Lei Zhou (2011)
The impact of information security breaches: Has there been a downward shift in costs?J. Comput. Secur., 19
Spyridon Samonas, D. Coss (2014)
The CIA Strikes Back: Redefining Confidentiality, Integrity and Availability in Security, 10
N. Roztocki, H. Weistroffer (2009)
Event Studies in Information Systems Research: An Updated ReviewCapital Markets: Market Efficiency
Michael Ettredge, V. Richardson, Susan Scholz (2001)
The presentation of financial information at corporate Web sitesInt. J. Account. Inf. Syst., 2
A. Mamun, M. Hassan, S. Lai (2004)
The impact of the Gramm-Leach-Bliley act on the financial services industryJournal of Economics and Finance, 28
Stefano Rossi, P. Volpin (2003)
Cross-Country Determinants of Mergers and AcquisitionsAmerican Finance Association Meetings (AFA)
Kwang-Suk Lee (2009)
A final flowering of the developmental state: The IT policy experiment of the Korean Information Infrastructure, 1995-2005Gov. Inf. Q., 26
P. Brockman, Dennis Chung (2003)
Investor Protection and Firm LiquidityJournal of Finance, 58
F. Andoh-Baidoo, Kweku-Muata Osei-Bryson (2007)
Exploring the characteristics of Internet security breaches that impact the market value of breached firmsExpert Syst. Appl., 32
M. Benaroch, A. Chernobai, James Goldstein (2012)
An Internal Control Perspective on the Market Value Consequences of IT Operational Risk EventsFinancial Accounting eJournal
Jan Muntermann, Heiko Rossnagel (2009)
On the Effectiveness of Privacy Breach Disclosure Legislation in Europe: Empirical Evidence from the US Stock Market
Rafael Porta, Florencio López‐de‐Silanes, Andrei Shleifer, Robert Vishny (1996)
Law and FinanceJournal of Political Economy, 106
R. Kalra (2004)
Earnings Management and Investor Protection: An International ComparisonCfa Digest, 34
J. Chen, Hung-Chih Li, D. Yen, Kenneth Bata (2012)
Did IT consulting firms gain when their clients were breached?Comput. Hum. Behav., 28
R. Porta, Florencio Silanes, Andrei Shleifer (2003)
What Works in Securities Laws?Emerging Markets: Finance
I. Dyck, N. Volchkova, Luigi Zingales (2006)
The Corporate Governance Role of the Media: Evidence from RussiaChicago Booth PCE: Entrepreneurship - Other (Topic)
Mehdi Bouaziz (2012)
An Introduction to Computer Security
Ali Yayla, Qing Hu (2011)
The impact of information security events on the stock value of firms: the effect of contingency factorsJournal of Information Technology, 26
A. Tversky, D. Kahneman (1973)
Availability: A heuristic for judging frequency and probabilityCognitive Psychology, 5
E. Fama (1970)
EFFICIENT CAPITAL MARKETS: A REVIEW OF THEORY AND EMPIRICAL WORK*Journal of Finance, 25
Kent Daniel, S. Titman (2001)
Market Reactions to Tangible and Intangible InformationBehavioral & Experimental Finance eJournal
O. Lee (2000)
The role of cultural protocol in media choice in a confucian virtual workplaceIEEE Transactions on Professional Communication, 43
Sara Moeller, Frederik Schlingemann (2005)
Global diversification and bidder gains: A comparison between cross-border and domestic acquisitionsFuel and Energy Abstracts
Charlie Chen, B. Medlin, R. Shaw (2008)
A cross-cultural investigation of situational information security awareness programsInf. Manag. Comput. Secur., 16
A. Hovav, J. D'Arcy (2012)
Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South KoreaInf. Manag., 49
S. Bratus (2007)
What Hackers Learn that the Rest of Us Don't: Notes on Hacker CurriculumIEEE Security & Privacy, 5
Jeong Seog (2012)
The countermeasure against recent cyber terrors, 12
R. McLean, Tianyu Zhang, Mengxin Zhao (2011)
Why Does the Law Matter? Investor Protection and its Effects on Investment, Finance, and GrowthCorporate Law: Law & Finance eJournal
ACM SIGMIS Database: the DATABASE for Advances in Information Systems – Association for Computing Machinery
Published: Feb 8, 2017
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.