IDEAS home Printed from https://ideas.repec.org/p/tsa/wpaper/0085is.html
   My bibliography  Save this paper

Planning Technology Investments For High Payoffs: A Rational Expectations Approach To Gauging Potential And Realized Value In A Changing Environment

Author

Listed:
  • Myung Ko

    (University of Texas at San Antonio)

  • Kweku-Muata

    (Virginia Commonwealth University)

  • Carlos Dorantesa

    (University of Texas at San Antonio)

Abstract

This paper examines the impact of information security breaches on organizational performance. Up to date, there have been only a few empirical academic studies that have investigated this issue and they have investigated information security breaches with the focus on the short-term impact on the market value of the firm. This study offers an alternate approach to investigate this issue as it explores the impact of breaches on financial performance of the firm, one year after the breach. Using a “matched sampling” methodology, we explored the impact of each type of breach (i.e. confidentiality, integrity, and availability) and also by IT intensity and size. Our results suggest that the direction of the impact (i.e. positive, negative) is dependent on the type of security breaches and also the impact of IT intensive firms is different from non-IT intensive firms. Our study also includes some important implications for managers and stock market investors.

Suggested Citation

  • Myung Ko & Kweku-Muata & Carlos Dorantesa, 2008. "Planning Technology Investments For High Payoffs: A Rational Expectations Approach To Gauging Potential And Realized Value In A Changing Environment," Working Papers 0040, College of Business, University of Texas at San Antonio.
  • Handle: RePEc:tsa:wpaper:0085is
    as

    Download full text from publisher

    File URL: http://interim.business.utsa.edu/wps/IS/0040IS-299-2008.pdf
    File Function: Full text
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Anat Hovav & John D'Arcy, 2003. "The Impact of Denial‐of‐Service Attack Announcements on the Market Value of Firms," Risk Management and Insurance Review, American Risk and Insurance Association, vol. 6(2), pages 97-121, September.
    2. Neil F. Doherty & Heather Fulford, 2005. "Do Information Security Policies Reduce the Incidence of Security Breaches: An Exploratory Analysis," Information Resources Management Journal (IRMJ), IGI Global, vol. 18(4), pages 21-39, October.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Sanghyun Kim & Bora Kim & Minsoo Seo, 2020. "Impacts of Sustainable Information Technology Capabilities on Information Security Assimilation: The Moderating Effects of Policy—Technology Balance," Sustainability, MDPI, vol. 12(15), pages 1-24, July.
    2. Michael McShane & Trung Nguyen, 2020. "Time-varying effects of cyberattacks on firm value," The Geneva Papers on Risk and Insurance - Issues and Practice, Palgrave Macmillan;The Geneva Association, vol. 45(4), pages 580-615, October.
    3. Narcyz Roztocki & Heinz Roland Weistroffer, 2015. "Investments in enterprise integration technology: An event study," Information Systems Frontiers, Springer, vol. 17(3), pages 659-672, June.
    4. Björn Häckel & Florian Hänsch & Michael Hertel & Jochen Übelhör, 2019. "Assessing IT availability risks in smart factory networks," Business Research, Springer;German Academic Association for Business Research, vol. 12(2), pages 523-558, December.
    5. Shinichi Kamiya & Jun-Koo Kang & Jungmin Kim & Andreas Milidonis & René M. Stulz, 2018. "What is the Impact of Successful Cyberattacks on Target Firms?," NBER Working Papers 24409, National Bureau of Economic Research, Inc.
    6. Bolster Paul & Pantalone Coleen H & Trahan Emery A, 2010. "Security Breaches and Firm Value," Journal of Business Valuation and Economic Loss Analysis, De Gruyter, vol. 5(1), pages 1-13, April.
    7. Mendiela, Pauline, 2021. "Information security breaches and financial market reaction: the French case," MPRA Paper 105029, University Library of Munich, Germany.
    8. Henner Gimpel & Dominikus Kleindienst & Niclas Nüske & Daniel Rau & Fabian Schmied, 2018. "The upside of data privacy – delighting customers by implementing data privacy measures," Electronic Markets, Springer;IIM University of St. Gallen, vol. 28(4), pages 437-452, November.
    9. Eli Amir & Shai Levi & Tsafrir Livne, 2018. "Do firms underreport information on cyber-attacks? Evidence from capital markets," Review of Accounting Studies, Springer, vol. 23(3), pages 1177-1206, September.
    10. Martin Eling & Michael McShane & Trung Nguyen, 2021. "Cyber risk management: History and future research directions," Risk Management and Insurance Review, American Risk and Insurance Association, vol. 24(1), pages 93-125, March.
    11. Prof. Dr. Walter Krämer & Sebastian Schich, "undated". "Large - scaledisasters and the insurance industry," Working Papers 4, Business and Social Statistics Department, Technische Universität Dortmund, revised Mar 2005.
    12. Kevin M. Gatzlaff & Kathleen A. McCullough, 2010. "The Effect of Data Breaches on Shareholder Wealth," Risk Management and Insurance Review, American Risk and Insurance Association, vol. 13(1), pages 61-83, March.
    13. Ou, Carol & Zhang, Xiaowei & Angelopoulos, Spyros & Davison, Robert & Janse, Noury, 2022. "Security breaches and organization response strategy : Exploring consumers’ threat and coping appraisals," Other publications TiSEM 9ac0c2eb-87e8-4c1d-a0b0-c, Tilburg University, School of Economics and Management.
    14. Foecking, Nico & Wang, Mei & Huynh, Toan Luu Duc, 2021. "How do investors react to the data breaches news? Empirical evidence from Facebook Inc. during the years 2016–2019," Technology in Society, Elsevier, vol. 67(C).
    15. Masoud, Najeb & Al-Utaibi, Ghassan, 2022. "The determinants of cybersecurity risk disclosure in firms’ financial reporting: Empirical evidence," Research in Economics, Elsevier, vol. 76(2), pages 131-140.
    16. Kamiya, Shinichi & Kang, Jun-Koo & Kim, Jungmin & Milidonis, Andreas & Stulz, René M., 2021. "Risk management, firm reputation, and the impact of successful cyberattacks on target firms," Journal of Financial Economics, Elsevier, vol. 139(3), pages 719-749.
    17. Qian Tang & Andrew B. Whinston, 2020. "Do Reputational Sanctions Deter Negligence in Information Security Management? A Field Quasi‐Experiment," Production and Operations Management, Production and Operations Management Society, vol. 29(2), pages 410-427, February.
    18. Michael McShane & Trung Nguyen, 0. "Time-varying effects of cyberattacks on firm value," The Geneva Papers on Risk and Insurance - Issues and Practice, Palgrave Macmillan;The Geneva Association, vol. 0, pages 1-36.
    19. Doherty, Neil Francis & Anastasakis, Leonidas & Fulford, Heather, 2011. "Reinforcing the security of corporate information resources: A critical review of the role of the acceptable use policy," International Journal of Information Management, Elsevier, vol. 31(3), pages 201-209.
    20. Benaroch, Michel & Chernobai, Anna & Goldstein, James, 2012. "An internal control perspective on the market value consequences of IT operational risk events," International Journal of Accounting Information Systems, Elsevier, vol. 13(4), pages 357-381.

    More about this item

    Keywords

    Information security; impact; security breach; organizational performance; confidentiality; integrity; availability;
    All these keywords.

    JEL classification:

    • M15 - Business Administration and Business Economics; Marketing; Accounting; Personnel Economics - - Business Administration - - - IT Management

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:tsa:wpaper:0085is. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wendy Frost (email available below). General contact details of provider: https://edirc.repec.org/data/cbutsus.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.