create a website

Understanding cybersecurity breach contagion effects: The role of the loss heuristic and internal controls. (2024). Yang, Ya-Wen ; Kelton, Andrea Seaton.
In: International Journal of Accounting Information Systems.
RePEc:eee:ijoais:v:55:y:2024:i:c:s1467089524000472.

Full description at Econpapers || Download paper

Cited: 0

Citations received by this document

Cites: 43

References cited by this document

Cocites: 44

Documents which have cited the same bibliography

Coauthors: 0

Authors who have wrote about the same topic

Citations

Citations received by this document

    This document has not been cited yet.

References

References cited by this document

  1. Amir, E. ; Levi, S. ; Livne, T. Do firms underreport information on cyber-attacks? Evidence from capital markets. 2018 Rev. Acc. Stud.. 23 1177-1206

  2. Ashbaugh-Skaife, H. ; Collins, D.W. ; Kinney, W.R. ; LaFond, R. The effect of SOX internal control deficiencies on firm risk and cost of equity. 2009 J. Account. Res.. 47 1-43

  3. Ashraf, M. The role of peer events in corporate governance: evidence from data breaches. 2022 Account. Rev.. 97 1-24
    Paper not yet in RePEc: Add citation now
  4. Barber, B.M. ; Lyon, J.D. Detecting long-run abnormal stock returns: the empirical power and specification of test statistics. 1997 J. Financ. Econ.. 43 341-372

  5. Barnett, M.L. ; King, A. Good fences make good neighbors: a longitudinal analysis of an industry self-regulatory institution. 2008 Acad. Manag. J.. 51 1150-1170
    Paper not yet in RePEc: Add citation now
  6. Chen, J. ; Henry, E. ; Jiang, X. Is cybersecurity risk factor disclosure informative? Evidence from disclosures following a data breach. 2023 J. Bus. Ethics. 187 199-224

  7. Committee of Sponsoring Organizations of the Treadway Commission (COSO) (2013) Internal control—Integrated framework: Executive summary. Available at: https://www.coso.org/Documents/990025P-Executive-Summary-final-may20.pdf.
    Paper not yet in RePEc: Add citation now
  8. DeAngelo, H. ; DeAngelo, L. ; Skinner, D.J. Dividends and losses. 1992 J. Financ.. 47 1837-1863

  9. Dechow, P.M. ; Dichev, I.D. The quality of accruals and earnings: the role of accrual estimation errors. 2002 Account. Rev.. 77 35-59
    Paper not yet in RePEc: Add citation now
  10. Du, S. ; Gwebu, K.L. ; Wang, J. ; Yu, K. Differential market reaction to data security breaches: a screening perspective. 2024 Commun. Assoc. Inf. Syst.. 54 376-401
    Paper not yet in RePEc: Add citation now
  11. Ettredge, M.L. ; Richardson, V.J. Information transfer among Internet firms: the case of hacker attacks. 2003 J. Inf. Syst.. 17 71-82
    Paper not yet in RePEc: Add citation now
  12. Fiske, S.T., Taylor, S.E. (1991) Social Contagion Mc-Graw-Hill, New York, NY.
    Paper not yet in RePEc: Add citation now
  13. Foerderer, J. ; Schuetz, S.W. Data breach announcements and stock market reactions: a matter of timing?. 2022 Manag. Sci.. 68 7298-7322

  14. Ghosh, A.A. ; Wang, J. Accounting losses as a heuristic for managerial failure: evidence from CEO turnovers. 2019 J. Financ. Quant. Anal.. 54 877-906

  15. Gordon, L.A. ; Wilford, A.L. An analysis of multiple consecutive years of material weaknesses in internal control. 2012 Account. Rev.. 87 2027-2060
    Paper not yet in RePEc: Add citation now
  16. Gwebu, K.L. ; Wang, J. ; Wang, L. The role of corporate reputation and crisis response strategies in data breach management. 2018 J. Manag. Inf. Syst.. 35 683-714
    Paper not yet in RePEc: Add citation now
  17. Haislip, J. ; Lim, J. ; Pinsker, R. The impact of executives’ IT expertise on reported data security breaches. 2021 Inf. Syst. Res.. 32 318-334

  18. Haislip, J., Kolev, K., Pinsker, R., Steffen, T. (2019) The economic cost of cybersecurity breaches: A broad-based analysis. Workshop on the Economics of Information Security (WEIS): 1-37.
    Paper not yet in RePEc: Add citation now
  19. Hammersley, J.S. ; Myers, L.A. ; Shakespeare, C. Market reactions to the disclosure of internal control weaknesses and to the characteristics of those weaknesses under section 302 of the Sarbanes Oxley Act of 2002. 2008 Rev. Acc. Stud.. 13 141-165
    Paper not yet in RePEc: Add citation now
  20. Higgs, J.L. ; Pinsker, R.E. ; Smith, T.J. ; Young, G.R. The relationship between board-level technology committees and reported security breaches. 2016 J. Inf. Syst.. 30 79-98
    Paper not yet in RePEc: Add citation now
  21. Hinz, O. ; Nofer, M. ; Schiereck, D. ; Trillig, J. The influence of data theft on the share prices and systematic risk of consumer electronics companies. 2015 Inf. Manage.. 52 337-347

  22. Hoitash, U. ; Hoitash, R. ; Bedard, J.C. Corporate governance and internal control over financial reporting: a comparison of regulatory regimes. 2009 Account. Rev.. 84 839-867
    Paper not yet in RePEc: Add citation now
  23. Islam, M.S. ; Wang, T. ; Farah, N. ; Staford, T. The spillover effect of focal firms’ cybersecurity breaches on rivals and the role of the CIO: evidence from stock trading volume. 2022 J. Account. Public Policy. 41 -
    Paper not yet in RePEc: Add citation now
  24. Jeong, C.Y. ; Lee, S.Y.T. ; Lim, J.H. Information security breaches and IT security investments: impacts on competitors. 2019 Inf. Manag.. 56 681-695
    Paper not yet in RePEc: Add citation now
  25. Jonsson, S. ; Greve, H.R. ; Fujiwara-Greve, T. Underserved loss: the spread of legitimacy loss to innocent organizations in response to reported corporate deviances. 2009 Adm. Sci. Q.. 54 195-228
    Paper not yet in RePEc: Add citation now
  26. Kashmiri, S. ; Nicol, C.D. ; Hsu, L. Birds of a feather: intra-industry spillover of the Target customer data breach and the shielding role of IT, marketing, and CSR. 2017 J. Acad. Mark. Sci.. 45 208-228

  27. Kelton, A.S. ; Montague, N.R. The unintended consequences of uncertainty disclosures made by auditors and managers on nonprofessional investor judgments. 2018 Acc. Organ. Soc.. 65 44-55

  28. Kelton, A.S. ; Pennington, R.R. Do voluntary disclosures mitigate the cybersecurity breach contagion effect?. 2020 J. Inf. Syst.. 34 133-157
    Paper not yet in RePEc: Add citation now
  29. Leung, E. ; Veenman, D. Non-GAAP earnings disclosure in loss firms. 2018 J. Account. Res.. 56 1083-1137

  30. Macrae, N. ; Bodenhausen, G. Social cognition: thinking categorically about others. 2000 Annu. Rev. Psychol.. 51 93-120
    Paper not yet in RePEc: Add citation now
  31. McMullin, J.L. ; Miller, B.P. ; Twedt, B.J. Increased mandated disclosure frequency and price formation: evidence from the 8-K expansion regulation. 2019 Rev. Acc. Stud.. 24 1-33

  32. Noh, S. ; So, E.C. ; Weber, J.P. Voluntary and mandatory disclosure: do managers view them as substitutes?. 2019 J. Account. Econ.. 68 1-18

  33. Paruchuri, S. ; Misangyi, V. Investor perceptions of financial misconduct: the heterogeneous contamination of bystander firms. 2015 Acad. Manag. J.. 58 169-194
    Paper not yet in RePEc: Add citation now
  34. Pinnuck, M. ; Lillis, A.M. Profits versus losses: does reporting an accounting loss act as a heuristic trigger to exercise the abandonment option and divest employees?. 2007 Account. Rev.. 82 1031-1053
    Paper not yet in RePEc: Add citation now
  35. Pinnuck, M. ; Sheckhar, C. The profit versus loss heuristic and firm financing decisions. 2013 Acc. Organ. Soc.. 38 420-439

  36. Richardson, V.J. ; Smith, R.E. ; Watson, M.W. Much ado about nothing: the (lack of) economic impact of data privacy breaches. 2019 J. Inf. Syst.. 33 227-265
    Paper not yet in RePEc: Add citation now
  37. Ritter, J. The long-run performance of initial public offerings. 1991 J. Financ.. 46 3-27

  38. Schloetzer, J.D. ; Tseng, A. ; Yohn, T.L. ; Yoon, Y.S. Blame attribution and disclosure propensity. 2021 Account. Rev.. 96 405-432
    Paper not yet in RePEc: Add citation now
  39. Securities and Exchange Commission (SEC) (2023) Cybersecurity Risk Management, Governance, and Incident Disclosure. Release Nos. 33-11216; 34-97989; Washington, D.C.: SEC.
    Paper not yet in RePEc: Add citation now
  40. Tversky, A. ; Kahneman, D. Judgment under uncertainty: heuristics and biases. 1974 Science. 185 1124-1131
    Paper not yet in RePEc: Add citation now
  41. Walton, S. ; Wheeler, P.R. ; Zhang, Y. ; Zhao, X. An integrative review and analysis of cybersecurity research: current state and future directions. 2021 J. Inf. Syst.. 35 155-186
    Paper not yet in RePEc: Add citation now
  42. Wang, T. ; Wang, Y. ; Yen, J. It’s not my fault: the transfer of information security breach information. 2019 J. Database Manag.. 30 18-37
    Paper not yet in RePEc: Add citation now
  43. Whited, R.L. ; Swanquist, Q.T. ; Shipman, J.E. ; Moon, J.R. Out of control: the (over) use of controls in accounting research. 2022 Account. Rev.. 97 395-413
    Paper not yet in RePEc: Add citation now

Cocites

Documents in RePEc which have cited the same bibliography

  1. How the three lines of defense can contribute to public firms’ cybersecurity effectiveness. (2025). Fortin, Anne ; Hroux, Sylvie.
    In: International Journal of Disclosure and Governance.
    RePEc:pal:ijodag:v:22:y:2025:i:2:d:10.1057_s41310-024-00226-7.

    Full description at Econpapers || Download paper

  2. The effect of corporate risk management on cyber risk mitigation: Evidence from the insurance industry. (2025). Yun, Jiyeon ; Kim, Chanjin ; Jung, Kwangmin.
    In: The Geneva Papers on Risk and Insurance - Issues and Practice.
    RePEc:pal:gpprii:v:50:y:2025:i:2:d:10.1057_s41288-024-00326-z.

    Full description at Econpapers || Download paper

  3. Stock-Term market impact of major cyber-attacks: Evidence for the ten most exposed insurance firms to cyber risk. (2025). Moutinho, Nuno ; Martins, Antnio Miguel.
    In: Finance Research Letters.
    RePEc:eee:finlet:v:71:y:2025:i:c:s1544612324013904.

    Full description at Econpapers || Download paper

  4. From green to digital: Exploring the role of ecological footprints on cybersecurity risk. (2025). Lin, Weizheng ; Chen, Jian-Yun ; Wang, Chih-Wei.
    In: Energy Economics.
    RePEc:eee:eneeco:v:146:y:2025:i:c:s0140988325003706.

    Full description at Econpapers || Download paper

  5. Should firms invest more in cybersecurity?. (2024). El-Dardiry, Ramy ; Dinkova, Milena ; Overvest, Bastiaan.
    In: Small Business Economics.
    RePEc:kap:sbusec:v:63:y:2024:i:1:d:10.1007_s11187-023-00803-0.

    Full description at Econpapers || Download paper

  6. Board of directors’ attributes and aspects of cybersecurity disclosure. (2024). Heroux, Sylvie ; Fortin, Anne.
    In: Journal of Management & Governance.
    RePEc:kap:jmgtgv:v:28:y:2024:i:2:d:10.1007_s10997-022-09660-7.

    Full description at Econpapers || Download paper

  7. When the Data Are Out: Measuring Behavioral Changes Following a Data Breach. (2024). Feinberg, Fred M ; Turjeman, Dana.
    In: Marketing Science.
    RePEc:inm:ormksc:v:43:y:2024:i:2:p:440-461.

    Full description at Econpapers || Download paper

  8. Understanding Data Breach from a Global Perspective: Incident Visualization and Data Protection Law Review. (2024). de Oliveira, Robson ; Garcia, Luis Javier ; Pimenta, Gabriel Arquelau ; Lopes, Fabio Lucio ; Canedo, Edna Dias ; Marques, Andre Luiz ; Sandoval, Ana Lucila.
    In: Data.
    RePEc:gam:jdataj:v:9:y:2024:i:2:p:27-:d:1330575.

    Full description at Econpapers || Download paper

  9. HACKED: Understanding the stock market response to cyberattacks. (2024). Conlon, Thomas ; Corbet, Shaen ; Hou, Yang ; Akyildirim, Erdinc.
    In: Journal of International Financial Markets, Institutions and Money.
    RePEc:eee:intfin:v:97:y:2024:i:c:s1042443124001483.

    Full description at Econpapers || Download paper

  10. Understanding cybersecurity breach contagion effects: The role of the loss heuristic and internal controls. (2024). Yang, Ya-Wen ; Kelton, Andrea Seaton.
    In: International Journal of Accounting Information Systems.
    RePEc:eee:ijoais:v:55:y:2024:i:c:s1467089524000472.

    Full description at Econpapers || Download paper

  11. Corporate social irresponsibility and the occurrence of data breaches: A stakeholder management perspective. (2024). Rezaee, Zabihollah ; Bu, Luofan ; Zhou, Gaoguang.
    In: International Journal of Accounting Information Systems.
    RePEc:eee:ijoais:v:53:y:2024:i:c:s1467089524000101.

    Full description at Econpapers || Download paper

  12. Asset redeployability and the market reaction to cyberattacks. (2024). Nguyen, Trung ; Harris, Oneil.
    In: Finance Research Letters.
    RePEc:eee:finlet:v:70:y:2024:i:c:s1544612324013072.

    Full description at Econpapers || Download paper

  13. Cybersecurity data breaches and internal control. (2024). Huang, Jianning ; Zhou, Fuzhao.
    In: International Review of Financial Analysis.
    RePEc:eee:finana:v:93:y:2024:i:c:s1057521924001066.

    Full description at Econpapers || Download paper

  14. Data breach disclosures and stock price crash risk: Evidence from data breach notification laws. (2024). Silveri, Sabatino ; Cao, Hung ; Phan, Hieu V.
    In: International Review of Financial Analysis.
    RePEc:eee:finana:v:93:y:2024:i:c:s1057521924000966.

    Full description at Econpapers || Download paper

  15. Auditing decentralized finance. (2024). Bhambhwani, Siddharth M ; Huang, Allen H.
    In: The British Accounting Review.
    RePEc:eee:bracre:v:56:y:2024:i:2:s0890838923001270.

    Full description at Econpapers || Download paper

  16. Measuring the performance of investments in information security startups: An empirical analysis by cybersecurity sectors using Crunchbase data. (2024). Humbert, Mathias ; Mar, Loic ; David, Dimitri Percia ; Mermoud, Alain.
    In: Papers.
    RePEc:arx:papers:2402.04765.

    Full description at Econpapers || Download paper

  17. The Anatomy of Cyber Risk. (2023). Rey, Helene ; Jamilov, Rustam ; Tahoun, Ahmed.
    In: Working Papers Series.
    RePEc:thk:wpaper:inetwp206.

    Full description at Econpapers || Download paper

  18. Regulation of data breach publication: the case of US healthcare and the HITECH act. (2023). Bohn, Lorenz ; Schiereck, Dirk.
    In: Journal of Economics and Finance.
    RePEc:spr:jecfin:v:47:y:2023:i:2:d:10.1007_s12197-022-09607-6.

    Full description at Econpapers || Download paper

  19. Board effectiveness and cybersecurity disclosure. (2023). Smaili, Nadia ; Radu, Camelia ; Khalili, Amir.
    In: Journal of Management & Governance.
    RePEc:kap:jmgtgv:v:27:y:2023:i:4:d:10.1007_s10997-022-09637-6.

    Full description at Econpapers || Download paper

  20. Is Cybersecurity Risk Factor Disclosure Informative? Evidence from Disclosures Following a Data Breach. (2023). Jiang, XI ; Chen, Jing ; Henry, Elaine.
    In: Journal of Business Ethics.
    RePEc:kap:jbuset:v:187:y:2023:i:1:d:10.1007_s10551-022-05107-z.

    Full description at Econpapers || Download paper

  21. Pirates without borders: The propagation of cyberattacks through firms’ supply chains. (2023). Crosignani, Matteo ; Macchiavelli, Marco ; Silva, Andre F.
    In: Journal of Financial Economics.
    RePEc:eee:jfinec:v:147:y:2023:i:2:p:432-448.

    Full description at Econpapers || Download paper

  22. The impact of customer firm data breaches on the audit fees of their suppliers. (2023). Zhang, Yimei ; Smith, Thomas.
    In: International Journal of Accounting Information Systems.
    RePEc:eee:ijoais:v:50:y:2023:i:c:s1467089523000209.

    Full description at Econpapers || Download paper

  23. Cybersecurity breaches and investors’ interest in the firm as an investment. (2023). Kaplan, Steven E ; Demek, Kristina C.
    In: International Journal of Accounting Information Systems.
    RePEc:eee:ijoais:v:49:y:2023:i:c:s1467089523000088.

    Full description at Econpapers || Download paper

  24. Data breaches (hacking) and trade credit. (2023). Singh, Amanjot.
    In: Global Finance Journal.
    RePEc:eee:glofin:v:57:y:2023:i:c:s1044028323000534.

    Full description at Econpapers || Download paper

  25. Do data breach disclosure laws matter to shareholder risk?. (2023). Elmawazini, Khaled ; Sassi, Syrine ; Saadi, Samir ; Ali, Mohammed ; Khiyar, Khiyar Abdalla.
    In: Finance Research Letters.
    RePEc:eee:finlet:v:53:y:2023:i:c:s1544612322007644.

    Full description at Econpapers || Download paper

  26. Data breaches in the age of surveillance capitalism: Do disclosures have a new role to play?. (2023). Baker, Max ; Andrew, Jane ; Huang, Casey.
    In: CRITICAL PERSPECTIVES ON ACCOUNTING.
    RePEc:eee:crpeac:v:90:y:2023:i:c:s1045235421001155.

    Full description at Econpapers || Download paper

  27. Tone emphasis and insider trading. (2023). Jin, Qinglu ; Cheng, Lin ; Ma, Hui.
    In: Journal of Corporate Finance.
    RePEc:eee:corfin:v:80:y:2023:i:c:s0929119923000688.

    Full description at Econpapers || Download paper

  28. Implications of false alarms in dynamic games on cyber-security. (2023). Han, Kookyoung ; Choi, Jinhyuk.
    In: Chaos, Solitons & Fractals.
    RePEc:eee:chsofr:v:169:y:2023:i:c:s0960077923002230.

    Full description at Econpapers || Download paper

  29. Board Gender Diversity and Corporate Response to Cyber Risk: Evidence from Cybersecurity Related Disclosure. (2022). Smaili, Nadia ; Radu, Camelia.
    In: Journal of Business Ethics.
    RePEc:kap:jbuset:v:177:y:2022:i:2:d:10.1007_s10551-020-04717-9.

    Full description at Econpapers || Download paper

  30. The determinants of cybersecurity risk disclosure in firms’ financial reporting: Empirical evidence. (2022). Masoud, Najeb ; Al-Utaibi, Ghassan.
    In: Research in Economics.
    RePEc:eee:reecon:v:76:y:2022:i:2:p:131-140.

    Full description at Econpapers || Download paper

  31. Dangerous games: A literature review on cybersecurity investments. (2022). Fedele, Alessandro ; Roner, Cristian.
    In: Journal of Economic Surveys.
    RePEc:bla:jecsur:v:36:y:2022:i:1:p:157-187.

    Full description at Econpapers || Download paper

  32. The Impact of Executives’ IT Expertise on Reported Data Security Breaches. (2021). Pinsker, Robert ; Lim, Jee-Hae ; Haislip, Jacob.
    In: Information Systems Research.
    RePEc:inm:orisre:v:32:y:2021:i:2:p:318-334.

    Full description at Econpapers || Download paper

  33. Risk management, firm reputation, and the impact of successful cyberattacks on target firms. (2021). Milidonis, Andreas ; Kamiya, Shinichi ; Stulz, Rene M ; Kim, Jungmin ; Kang, Jun-Koo.
    In: Journal of Financial Economics.
    RePEc:eee:jfinec:v:139:y:2021:i:3:p:719-749.

    Full description at Econpapers || Download paper

  34. Time-varying effects of cyberattacks on firm value. (2020). Nguyen, Trung ; McShane, Michael.
    In: The Geneva Papers on Risk and Insurance - Issues and Practice.
    RePEc:pal:gpprii:v:45:y:2020:i:4:d:10.1057_s41288-020-00170-x.

    Full description at Econpapers || Download paper

  35. A Survey of Fintech Research and Policy Discussion. (2020). Jagtiani, Julapa ; Allen, Franklin ; Gu, Xian.
    In: Working Papers.
    RePEc:fip:fedpwp:88120.

    Full description at Econpapers || Download paper

  36. Pirates without Borders: The Propagation of Cyberattacks through Firms’ Supply Chains. (2020). Silva, André ; Crosignani, Matteo ; Macchiavelli, Marco.
    In: Staff Reports.
    RePEc:fip:fednsr:88465.

    Full description at Econpapers || Download paper

  37. Insider trading ahead of cyber breach announcements. (2020). Lin, Zhaoxin ; Parsa, Rahul ; Ulmer, Jackie Rees.
    In: Journal of Financial Markets.
    RePEc:eee:finmar:v:50:y:2020:i:c:s138641811930357x.

    Full description at Econpapers || Download paper

  38. Cyberattacks and impact on bond valuation. (2020). Iyer, Subramanian R ; Wang, Heng ; Simkins, Betty J.
    In: Finance Research Letters.
    RePEc:eee:finlet:v:33:y:2020:i:c:s1544612319302934.

    Full description at Econpapers || Download paper

  39. Cyber incidents, security measures and financial returns: Empirical evidence from Dutch firms. (2020). El-Dardiry, Ramy ; Dinkova, Milena ; Overvest, Bastiaan.
    In: CPB Discussion Paper.
    RePEc:cpb:discus:411.rdf.

    Full description at Econpapers || Download paper

  40. Cyber incidents, security measures and financial returns: Empirical evidence from Dutch firms. (2020). El-Dardiry, Ramy ; Dinkova, Milena ; Overvest, Bastiaan.
    In: CPB Discussion Paper.
    RePEc:cpb:discus:411.

    Full description at Econpapers || Download paper

  41. Cybersecurity Risk. (2020). Weber, Michael ; michaely, roni ; Louca, Christodoulos ; Florackis, Chris.
    In: CESifo Working Paper Series.
    RePEc:ces:ceswps:_8760.

    Full description at Econpapers || Download paper

  42. Dangerous Games: A Literature Review on Cybersecurity Investments. (2020). Fedele, Alessandro ; Roner, Cristian.
    In: BEMPS - Bozen Economics & Management Paper Series.
    RePEc:bzn:wpaper:bemps75.

    Full description at Econpapers || Download paper

  43. Cybersecurity Risk. (2020). Weber, Michael ; michaely, roni ; Louca, Christodoulos ; Florakis, Chris.
    In: Working Papers.
    RePEc:bfi:wpaper:2020-178.

    Full description at Econpapers || Download paper

  44. Time-varying effects of cyberattacks on firm value. (). Nguyen, Trung ; McShane, Michael.
    In: The Geneva Papers on Risk and Insurance - Issues and Practice.
    RePEc:pal:gpprii:v::y::i::d:10.1057_s41288-020-00170-x.

    Full description at Econpapers || Download paper

Coauthors

Authors registered in RePEc who have wrote about the same topic

Report date: 2025-09-22 05:11:32 || Missing content? Let us know

CitEc is a RePEc service, providing citation data for Economics since 2001. Last updated August, 3 2024. Contact: Jose Manuel Barrueco.