How Do Investors Perceive the Materiality of Data Security Incidents

How Do Investors Perceive the Materiality of Data Security Incidents

Ahmad H. Juma'h, Yazan Alnsour
Copyright: © 2021 |Pages: 32
DOI: 10.4018/JGIM.20211101.oa4
Article PDF Download
Open access articles are freely available for download

Abstract

Data security incidents are continually increasing; hackers, governments, and other actors increasingly attempt to gain unauthorized access to confidential data. Information Systems (IS) users are becoming more vulnerable to the risks of data breaches. Many stakeholders perceive cybersecurity incidents as indicators of firms' operational and technological internal deficiencies. Previous research has revealed that investors react negatively to data breaches, yet little is known about investors' reactions to material data security incidents. Using a sample of 232 data security incidents for 132 publicly traded companies in the United States, we applied an event study methodology to discern investors' reactions to material versus immaterial incidents. We also use multivariate regression and time-to-event analysis to examine what determines the degree of investors' reactions, considering several intervals around the event day. Our results show that investors perceive material data security incidents as a deficiency of breached companies in comparison to immaterial incidents.
Article Preview
Top

Introduction

The ongoing growth in the collection, storage, and analysis of data brings new opportunities and challenges for both practitioners and researchers in the fields of information systems, finance, and accounting. The sensitivity of stored data and information privacy are concerns for all firms’ stakeholders (Park et al., 2018; Park & Shin, 2020). The benefits obtained from collecting data about customers, potential customers, employees, creditors, and investors, among others, are not without risks. For example, in the California Data-Breach Report, nearly three out of five Californians were victims of a data breach in 2015 alone (Harris, 2016). The recent public health crisis has made companies rely even more on information systems for the continuity of their operations. Thus, organizations are becoming more vulnerable to perpetrators of sensitive data that could weaken the organization’s performance and reputation.

A data breach refers to internal or external unauthorized access to or use of a firm’s data in a way that compromises the confidentiality, integrity, or availability of the data. Companies guarantee the availability of data for authorized users when needed to meet the firms’ objectives. Also, firms safeguard the integrity of data by employing and implementing preventive measures against unauthorized or accidental modifications, loss, or disclosures (Rosati et al., 2019; Yayla & Hu, 2011; Goel & Shawky, 2009). There are many types of information and cybersecurity incursions, such as data manipulation, alterations, or theft, and malicious malware intrusions, such as viruses, logic bombs, worms, Trojan horses, backdoors, spyware, and ransomware, which may financially damage a firm’s reputation (Rosati et al., 2018; Sen & Borle, 2015; Shabtai et al., 2012). Firms adopt security procedures and policies that are related to the inherent risk of their information systems by using data encryption, firewalls, data backups, and off-site rotations, and engaging in continuing planning (Yayla & Hu, 2011; Schmidt et al., 2008).

Compliance with IS security policies is an important factor that the end-users and employees should abide by to prevent breaches. Not protecting firms’ assets increases the possibility of cybersecurity incidents due to human behavior that can be responsible for losses of (portable) assets (Chen et al., 2015). Considerable cybersecurity incidents also occur from inside—cyberattacks that are related to unethical or behavioral issues of employees (Li et al., 2019). Employees may use neutralization techniques to rationalize IS policy violations; these violations plague firms worldwide (Teh et al., 2015) and affect firms’ reputations. The IS culture improves employees’ security awareness, and through training, firms can improve employee’s security behavior (Lyu & Zhang, 2015). Dinev et al. (2006) argue that individuals react differently based on their culture, and therefore through employee training, firms can enhance employee relations and encourage accountability and engagement in complying with IS policies (He & Zhang, 2019; Yaokumah et al., 2019).

Complete Article List

Search this Journal:
Reset
Volume 32: 1 Issue (2024)
Volume 31: 9 Issues (2023)
Volume 30: 12 Issues (2022)
Volume 29: 6 Issues (2021)
Volume 28: 4 Issues (2020)
Volume 27: 4 Issues (2019)
Volume 26: 4 Issues (2018)
Volume 25: 4 Issues (2017)
Volume 24: 4 Issues (2016)
Volume 23: 4 Issues (2015)
Volume 22: 4 Issues (2014)
Volume 21: 4 Issues (2013)
Volume 20: 4 Issues (2012)
Volume 19: 4 Issues (2011)
Volume 18: 4 Issues (2010)
Volume 17: 4 Issues (2009)
Volume 16: 4 Issues (2008)
Volume 15: 4 Issues (2007)
Volume 14: 4 Issues (2006)
Volume 13: 4 Issues (2005)
Volume 12: 4 Issues (2004)
Volume 11: 4 Issues (2003)
Volume 10: 4 Issues (2002)
Volume 9: 4 Issues (2001)
Volume 8: 4 Issues (2000)
Volume 7: 4 Issues (1999)
Volume 6: 4 Issues (1998)
Volume 5: 4 Issues (1997)
Volume 4: 4 Issues (1996)
Volume 3: 4 Issues (1995)
Volume 2: 4 Issues (1994)
Volume 1: 4 Issues (1993)
View Complete Journal Contents Listing