IDEAS home Printed from https://ideas.repec.org/a/ami/journl/v21y2022i3p452-470.html
   My bibliography  Save this article

Security Breaches and Modifications on Cybersecurity Disclosures

Author

Listed:
  • Jacob Peng

    (Department of Accounting and Taxation, Robert Morris University, USA)

  • Chang-Wei Li

    (Department of Accountancy and Graduate Institute of Finance, National Cheng Kung University, Taiwan)

Abstract

Research Question - How do firms approach their cybersecurity disclosure obligations, especially for those who experienced a cyber-attack? Prior research has found that year-after-year modification on textual disclosures adds more appreciable information that makes it more relevant. But do firms provide meaningful disclosures to promote market transparency? Motivation - Because of growing cybersecurity threats in recent years, the U.S. Securities and Exchange Commission (SEC) has issued several regulations and guidance that emphasized on the disclosure of material information on cybersecurity. Given that the mandatory risk factor disclosures in SEC Form 10-K is the first place firms are encouraged to disclose cybersecurity-related assessment, it is important to examine how firms approach their disclosure expectations. Idea - To examine whether firms respond to cyber-attacks with meaningful disclosures, we use the Vector Space Model (VSM) to calculate disclosure modifications before and after major cyber-attack incident. Data: We extracted cybersecurity breach incidents from the Data Breach Database, a centralized and global database of data breaches maintained by a leading security company. In addition, we use the SEC data depository to find firms’ 10-K disclosures. Findings - We find that firms modify their cybersecurity disclosures by increasing the quantity of disclosures, but not necessarily the quality of disclosures as measured by document similarity. Furthermore, we find partial evidence that the degree of modification is positively associated with the severity of cyber-attacks. Contribution - Our evidence suggests that firms tend to use boilerplate language to disclose cybersecurity-related issues. This finding is consistent with prior research. That is, consistent with prior literature, the information content in public company 10-Ks is limited. We find that this seems to be the case as well when it comes to cybersecurity disclosures.

Suggested Citation

  • Jacob Peng & Chang-Wei Li, 2022. "Security Breaches and Modifications on Cybersecurity Disclosures," Journal of Accounting and Management Information Systems, Faculty of Accounting and Management Information Systems, The Bucharest University of Economic Studies, vol. 21(3), pages 452-470, September.
  • Handle: RePEc:ami:journl:v:21:y:2022:i:3:p:452-470
    as

    Download full text from publisher

    File URL: http://online-cig.ase.ro/RePEc/ami/articles/21_3_7.pdf
    Download Restriction: no
    ---><---

    More about this item

    Keywords

    cybersecurity; text analytics; VSM; risk factor;
    All these keywords.

    JEL classification:

    • M41 - Business Administration and Business Economics; Marketing; Accounting; Personnel Economics - - Accounting - - - Accounting

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:ami:journl:v:21:y:2022:i:3:p:452-470. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Cristina Tartavulea (email available below). General contact details of provider: .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.