2020
DOI: 10.1057/s41288-020-00170-x
|View full text |Cite
|
Sign up to set email alerts
|

Time-varying effects of cyberattacks on firm value

Abstract: This paper adds to research on the effect of cyber events on the attacked firm's value in light of conflicting results from previous studies. Using 536 cyberattack announcements that occurred during the 2007-2016 period, the main goal is to investigate for changes in investor reaction over time as cyberattacks have become more frequent. Empirical evidence shows that cumulative abnormal returns of attacked firms were volatile earlier in the period, became increasingly negative, but have moderated recently. This… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
13
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 12 publications
(13 citation statements)
references
References 43 publications
0
13
0
Order By: Relevance
“…One way to classify and identify cyberattacks is whether they affect the “confidentiality, availability or integrity of information or information systems” (Biener et al, 2015). For example, data breach mainly affects confidentiality, denial of service and ransomware attacks involve availability of information, and website defacement reduces integrity, whereas phishing attacks might affect both confidentiality and integrity (McShane & Nguyen, 2020). Generally, an item is considered an identifiable asset when there are significantly negative consequences if the breached data are made publicly available, falsified, or no longer accessible.…”
Section: Literature Review: By Steps Of the Risk Management Processmentioning
confidence: 99%
See 4 more Smart Citations
“…One way to classify and identify cyberattacks is whether they affect the “confidentiality, availability or integrity of information or information systems” (Biener et al, 2015). For example, data breach mainly affects confidentiality, denial of service and ransomware attacks involve availability of information, and website defacement reduces integrity, whereas phishing attacks might affect both confidentiality and integrity (McShane & Nguyen, 2020). Generally, an item is considered an identifiable asset when there are significantly negative consequences if the breached data are made publicly available, falsified, or no longer accessible.…”
Section: Literature Review: By Steps Of the Risk Management Processmentioning
confidence: 99%
“…Some event studies document significant negative shareholder reactions to cyber‐related incidents (e.g., Bose & Leung, 2014; Cavusoglu et al, 2004; Gatzlaff & McCullough, 2010; Higgs et al, 2016; Modi et al, 2015; Yayla & Hu, 2011), whereas others find insignificant evidence (e.g., Amir et al, 2018; Das et al, 2012; Hovav & D'Arcy, 2003; McShane & Nguyen, 2020). In addition, there is inconsistency with respect to the reported average market value loss (if any).…”
Section: Literature Review: By Steps Of the Risk Management Processmentioning
confidence: 99%
See 3 more Smart Citations