create a website

The determinants of cybersecurity risk disclosure in firms’ financial reporting: Empirical evidence. (2022). Masoud, Najeb ; Al-Utaibi, Ghassan.
In: Research in Economics.
RePEc:eee:reecon:v:76:y:2022:i:2:p:131-140.

Full description at Econpapers || Download paper

Cited: 1

Citations received by this document

Cites: 89

References cited by this document

Cocites: 44

Documents which have cited the same bibliography

Coauthors: 0

Authors who have wrote about the same topic

Citations

Citations received by this document

  1. Investigating the influence of governance determinants on reporting cybersecurity incidents to police: Evidence from Canadian organizations’ perspectives. (2023). Agbodoh-Falschau, Kouassi Raymond ; Ravaonorohanta, Bako Harinivo.
    In: Technology in Society.
    RePEc:eee:teinso:v:74:y:2023:i:c:s0160791x23001148.

    Full description at Econpapers || Download paper

References

References cited by this document

  1. Adler, T. Building Protection from Payments Fraud. 2011 Financial Executives Institute: Morristown, NJ
    Paper not yet in RePEc: Add citation now
  2. Amir, E. ; Levi, S. ; Livne, T Do firms underreport information on cyber-attacks? Evidence from capital markets. 2018 Rev. Acc. Stud.. 23 1177-1206

  3. Ashbaugh-Skaife, H. ; Collins, D. ; LaFond, R. The effect of SOX internal control deficiencies and their remediation on accrual quality. 2008 Acc. Rev.. 83 217-250
    Paper not yet in RePEc: Add citation now
  4. Balsam, S. ; Krishnan, J. ; Yang, J.S. Auditor industry specialization and earnings quality. 2003 Audit. A J. Pract. Theory. 22 71-97
    Paper not yet in RePEc: Add citation now
  5. Benaroch, M. ; Chernobai, A. ; Goldstein, J. An internal control perspective on the market value consequences of IT operational risk events. 2012 Int. J. Acc. Inf. Syst.. 13 357-381

  6. Bernard, T. S., Hsu, T., Perlroth, N., Lieber, R., 2017. Equifax says cyberattack may have affected 143 million in the U.S. New York Times (Sept. 7, 2018). Retrieved December 8, 2018, from https://www.nytimes.com/2017/09/07/business/equifax-cyberattack.html.
    Paper not yet in RePEc: Add citation now
  7. Blankley, A.I. ; Hurtt, D.N. ; MacGregor, J.E. Abnormal audit fees and restatements. 2012 Audit. A J. Pract. Theory. 31 79-96
    Paper not yet in RePEc: Add citation now
  8. Campbell, K. ; Gordon, L.A. ; Loeb, M.P. ; Zhou, L. The economic cost of publicly announced information security breaches: Empirical evidence from the stock market. 2003 J. Comput. Secur.. 11 431-448
    Paper not yet in RePEc: Add citation now
  9. Cavusoglu, H. ; Mishra, B. ; Raghunathan, S. The effect of internet security breach announcements on market value of breached firms and internet security developers. 2004 Int. J. Electron. Comm.. 9 69-105
    Paper not yet in RePEc: Add citation now
  10. Chai, S. ; Kim, M. ; Rao, H.R. Firms’ information security investment decisions: Stock market evidence of investors’ behavior. 2011 Decis. Supp. Syst.. 50 651-661
    Paper not yet in RePEc: Add citation now
  11. Chen, X. ; Cheng, Q. ; Lo, A. Accounting restatements and external financing choices. 2013 Contemp. Acc. Res.. 30 750-779

  12. Cheng, Q. ; Farber, D.B. Earnings restatements, changes in CEO compensation, and firm performance. 2008 Acc. Rev.. 83 1217-1250
    Paper not yet in RePEc: Add citation now
  13. Chernobai, A. ; Jorion, P. ; Yu, F. The determinants of operational risk in U.S. financial institutions. 2011 J. Financ. Quant. Anal.. 46 1683-1725

  14. Cybint., 2020 15 Alarming Cyber Security Facts and Stats. (Accessed 12 November 2020). Available at: https://www.cybintsolutions.com/cyber-security-facts-stats.
    Paper not yet in RePEc: Add citation now
  15. Das, S. ; Mukhopadhyay, A. ; Anand, M. Stock market response to information security breach: A study using firm and attack characteristics. 2012 J. Inf. Privacy Secur.. 8 27-55

  16. DeAngelo, L.E. Auditor size and audit quality. 1981 J. Account. Econ.. 3 183-199

  17. DeFond, M. ; Lennox, C. Do PCAOB inspections improve the quality of internal control audits?. 2017 J. Acc. Res.. 55 591-627

  18. DeFond, M.L. ; Jiambalvo, J. Debt covenant violation and manipulation of accruals. 1994 J. Account. Econ.. 17 145-176

  19. Dichev, I.D. ; Skinner, D.J. Large-sample evidence on the debt covenant hypothesis. 2002 J. Acc. Res.. 40 1091-1123

  20. Dinev, T. ; Hu, Q. The centrality of awareness in the formation of user behavioral intention toward protective information technologies. 2007 J. Assoc. Inf. Syst.. 8 386-408
    Paper not yet in RePEc: Add citation now
  21. Doyle, J.T. ; Ge, W. ; McVay, S. Accruals quality and internal control over financial reporting. 2007 Acc. Rev.. 82 1141-1170
    Paper not yet in RePEc: Add citation now
  22. Doyle, J.T. ; Ge, W. ; McVay, S. Determinants of weaknesses in internal control over financial reporting. 2007 J. Account. Econ.. 44 193-223

  23. Ettredge, M.L. ; Richardson, V.J. Information transfer among internet firms: the case of hacker attacks. 2003 J. Inf. Syst.. 17 71-82
    Paper not yet in RePEc: Add citation now
  24. Field, A. Discovering Statistics using SPSS. 2009 Sage: London
    Paper not yet in RePEc: Add citation now
  25. Gal-Or, E. ; Ghose, A. The economic incentives for sharing security information. 2005 Inf. Syst. Res.. 16 186-208

  26. Garg, A. ; Curtis, J. ; Halper, H. Quantifying the financial impact of IT security breaches. 2003 Inf. Manag. Comput. Secur.. 11 74-83
    Paper not yet in RePEc: Add citation now
  27. Gietzmann, M.B. ; Pettinicchio, A.K. External auditor reassessment of client business risk following the issuance of a comment letter by the SEC. 2014 Eur. Acc. Rev.. 23 57-85

  28. Gordon, L.A. ; Loeb, M. ; Lucyshyn, W. ; Zhou, L. Empirical evidence on the determinants of cybersecurity investments in private sector firms. 2018 J. Inf. Secur.. 9 133-153
    Paper not yet in RePEc: Add citation now
  29. Gordon, L.A. ; Loeb, M.P. Budgeting process for information security expenditures. 2006 Commun. ACM. 49 121-125
    Paper not yet in RePEc: Add citation now
  30. Gordon, L.A. ; Loeb, M.P. Market value of voluntary disclosures concerning information security. 2010 MIS Quart.. 34 567-594
    Paper not yet in RePEc: Add citation now
  31. Gordon, L.A. ; Loeb, M.P. Return on information security investments: myths vs. realities. 2002 Strat. Finance. 84 26-31
    Paper not yet in RePEc: Add citation now
  32. Gordon, L.A. ; Loeb, M.P. The economics of information security investment. 2002 ACM Trans. Inf. Syst. Secur. Secur.. 5 438-457
    Paper not yet in RePEc: Add citation now
  33. Gordon, L.A. ; Loeb, M.P. ; Lucyshyn, W. Sharing information on computer systems security: an economic analysis. 2003 J. Acc. Public Policy. 22 461-485

  34. Gordon, L.A. ; Loeb, M.P. ; Lucyshyn, W. ; Sohail, T. The impact of the Sarbanes-Oxley act on the corporate disclosures of information security activities. 2006 J. Acc. Public Policy. 25 503-530

  35. Gordon, L.A. ; Loeb, M.P. ; Sohail, T. Market value of voluntary disclosures concerning information security. 2010 MIS Quart.. 34 567-594
    Paper not yet in RePEc: Add citation now
  36. Gordon, L.A. ; Loeb, M.P. ; Zhou, L. The impact of information security breaches: Has there been a downward shift in costs?. 2011 J. Comput. Secur.. 19 33-56
    Paper not yet in RePEc: Add citation now
  37. Grant, G.H. ; Grant, C.T. SEC cybersecurity disclosure guidance is quickly becoming a requirement. 2014 CPA J.. 84 69-
    Paper not yet in RePEc: Add citation now
  38. Gwebu, K. ; Wang, J. ; Wang, L. Data security breach impact and disclosure. 2013 En : Proceedings of the American Accounting Association Annual Meeting, Anaheim, CA. :
    Paper not yet in RePEc: Add citation now
  39. Haislip, J.Z. ; Masli, A. ; Richardson, V.J. ; Sanchez, J.M. Repairing organizational legitimacy following information technology (IT) material weaknesses: executive turnover, IT expertise, and IT system UPGRADES. 2016 J. Inf. Syst.. 30 41-70
    Paper not yet in RePEc: Add citation now
  40. Hausken, K. Income, interdependence, and substitution effects affecting incentives for security investment. 2006 J. Acc. Public Policy. 25 629-665

  41. Hennes, K. ; Leone, A. ; Miller, B. The importance of distinguishing errors from irregularities in restatement research: the case of restatements and CEO/CFO turnover. 2008 Acc. Rev.. 83 1487-1519
    Paper not yet in RePEc: Add citation now
  42. Hogan, C.E. ; Wilkins, M.S. Evidence on the audit risk model: Do auditors increase audit fees in the presence of internal control deficiencies?. 2008 Contemporary Acc. Res.. 25 219-242

  43. Hovav, A. ; D'Arcy, J. The impact of Denial-of-Service attack announcements on the market value of firms. 2003 Risk Manag. Insur. Rev.. 6 97-121

  44. Hovav, A. ; Gray, P. The ripple effect of an information security breach event: a stakeholder analysis. 2014 Commun. Assoc. Inf. Syst.. 34 894-913
    Paper not yet in RePEc: Add citation now
  45. Hribar, P. ; Jenkins, N. The effect of accounting restatements on earnings revisions and the estimated cost of capital. 2004 Rev. Account. Stud.. 9 337-356
    Paper not yet in RePEc: Add citation now
  46. Hribar, P. ; Nichols, G.D. The use of unsigned earnings quality measures in tests of earnings management. 2007 J. Acc. Res.. 45 1017-1053

  47. Hsu, C. ; Lee, J.-N. ; Straub, D.W. Institutional influences on information systems security innovations. 2012 Inf. Syst. Res.. 23 918-939

  48. Hsu, C. ; Wang, T. Composition of the top management team and information security breaches. 2014 En : Cruz-Cunha, M.M. ; Portela, I.M. Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance. IGI Global: Hershey, PA
    Paper not yet in RePEc: Add citation now
  49. Hsu, C. ; Wang, T. Exploring the association between board structure and information security breaches. 2014 Asia Pac. J. Inf. Syst.. 24 531-557
    Paper not yet in RePEc: Add citation now
  50. Hsu, C. ; Wang, T. ; Lu, A. The Impact of ISO 27001 Certification on Firm Performance. 2016 En : Proceedings of the 49th Hawaii International Conference on System Sciences (HICSS), Kauai, Hawaii. :
    Paper not yet in RePEc: Add citation now
  51. Islam, M.S. ; Farah, N. ; Stafford, T.S. Factors associated with security/cybersecurity audit by internal audit function: an international study. 2018 Manag. Audit. J.. 33 377-409

  52. Jaggi, B. ; Lee, P. Earnings management response to debt covenant violations and debt restructuring. 2002 J. Acc. Audit. Finance. 17 295-324
    Paper not yet in RePEc: Add citation now
  53. Johnson, S. SEC Pushes Companies for More Risk Information. 2010 CFO Magazine:
    Paper not yet in RePEc: Add citation now
  54. Johnston, R. ; Petacchi, R. Regulatory oversight of financial reporting: securities and exchange commission comment letters. 2017 Contemp. Acc. Res.. 34 1128-1155

  55. Kamiya, S. ; Kang, J.K. ; Kim, J. ; Milidonis, A. ; Stulz, R.M. Risk management, firm reputation, and the impact of successful cyberattacks on target firms. 2020 J. Financ. Econ.. -
    Paper not yet in RePEc: Add citation now
  56. Klamm, B.K. ; Kobelsky, K.W. ; Watson, M.W. Determinants of the persistence of internal control weaknesses. 2012 Acc. Horiz.. 26 307-333
    Paper not yet in RePEc: Add citation now
  57. Klamm, B.K. ; Watson, M.W. SOX 404 reported internal control weaknesses: a test of COSO framework components and information technology. 2009 J. Inf. Syst.. 23 1-23
    Paper not yet in RePEc: Add citation now
  58. Knechel, W.R. ; Sharma, D.S. Auditor-provided nonaudit services and audit effectiveness and efficiency: Evidence from pre-and post-SOX audit report lags. 2012 Audit. A J. Pract. Theory. 31 85-114
    Paper not yet in RePEc: Add citation now
  59. Krishnan, G. Does Big 6 auditor industry expertise constrain earnings management?. 2003 Acc. Horiz.. 17 1-16
    Paper not yet in RePEc: Add citation now
  60. Kuhn, J.R. ; Morris, B. IT internal control weaknesses and the market value of firms. 2017 J. Enterprise Inf. Manag.. 30 964-986
    Paper not yet in RePEc: Add citation now
  61. Lainhart, J.W. COBITTM: a methodology for managing and controlling information and information technology risks and vulnerabilities. 2000 J. Inf. Syst.. 14 21-25
    Paper not yet in RePEc: Add citation now
  62. Lawrence, A. ; Minutti-Meza, M. ; Vyas, D. Is operational control risk informative of financial reporting deficiencies?. 2018 Audit. A J. Pract. Theory. 37 139-165
    Paper not yet in RePEc: Add citation now
  63. Lechner, M. The estimation of causal effects by difference-in-difference method estimation of spatial panels. 2010 Found. Trends Econ.. 4 165-224
    Paper not yet in RePEc: Add citation now
  64. Li, C. ; Peters, G.F. ; Richardson, V.J. ; Watson, M. The consequences of information technology control weaknesses on management information systems: the case of Sarbanes Oxley internal control reports. 2012 MIS Quart.. 36 179-203
    Paper not yet in RePEc: Add citation now
  65. Li, H. ; No, W.G. ; Wang, T. SEC's cybersecurity disclosure guidance and disclosed cybersecurity risk factors. 2018 J. Acc. Inf. Syst.. 30 40-55

  66. Li, H., No, W.G., Boritz, J.E., 2016. Are external auditors concerned about cyber incidents? Evidence from audit fees., Working Paper. SSRN: 2880928).
    Paper not yet in RePEc: Add citation now
  67. Masli, A. ; Peters, G.F. ; Richardson, V.J. ; Sanchez, J.M. Examining the potential benefits of internal control monitoring technology. 2010 Acc. Rev.. 85 1001-1034
    Paper not yet in RePEc: Add citation now
  68. Menon, K. ; Williams, D.D. Former audit partners and abnormal accruals. 2004 Acc. Rev.. 79 1095-1118
    Paper not yet in RePEc: Add citation now
  69. Messier, W.F. ; Eilifsen, A. ; Austen, L.A. Auditor detected misstatements and the effect of information technology. 2004 Int. J. Audit.. 8 223-235

  70. Palmrose, Z-V. ; Richardson, V. ; Scholz, S. Determinants of market reactions to restatement announcements. 2004 J. Account. Econ.. 37 59-89

  71. PricewaterhouseCoopers. Mandatory Rotation of Audit Firms: Will It Improve Audit Quality?. 2002 PricewaterhouseCoopers LLP: New York, NY
    Paper not yet in RePEc: Add citation now
  72. Public Company Accounting Oversight Board (PCAOB)., 2014. Auditing standard no. 2-An audit of internal control over financial reporting performed in conjunction with an audit of financial statements.
    Paper not yet in RePEc: Add citation now
  73. Richardson, S. ; Tuna, I. ; Wu, W. Predicting Earnings Management: the Case of Earnings Restatements. 2002 University of Pennsylvania:
    Paper not yet in RePEc: Add citation now
  74. Rosati, P. ; Deeney, P. ; Cummins, M. ; Van der Werff, L. ; Lynn, T. Social media and stock price reaction to data breach announcements: Evidence from US listed companies. 2019 Res. Int. Bus. Finance. 47 458-469

  75. Rosati, P. ; Gogolin, F. ; Lynn, T. Audit firm assessments of cyber-security risk: evidence from audit fees and SEC comment letters. 2019 Int. J. Acc.. 54 1-75

  76. Rosati, P. ; Gogolin, F. ; Lynn, T. Cyber-security incidents and audit quality. 2020 Eur. Acc. Rev.. -
    Paper not yet in RePEc: Add citation now
  77. Securities and Exchange Commission (SEC)., 2010. 17 CFR PARTS 211, 231 and 241. Release Nos. 33-9106; 34-61469; FR-82.
    Paper not yet in RePEc: Add citation now
  78. Securities and Exchange Commission (SEC)., 2018. Commission statement and guidance on public company cybersecurity disclosures, (Accessed 12 November 2020). Available at: https://www.sec.gov/rules/interp/2018/33-10459.pdf.
    Paper not yet in RePEc: Add citation now
  79. Verizon., 2017. 2017 data breach investigations report (Accessed 13 November 2020). available at: http://www.verizonenterprise.com/resources/reports/rp_DBIR_2017_Report_execsummary_en_xg.pdf.
    Paper not yet in RePEc: Add citation now
  80. Wall Street Journal (WSJ). Cyberattacks Represent Top Risk, SEC Chief Says. 2015 Wall Street Journal (WSJ):
    Paper not yet in RePEc: Add citation now
  81. Wang, T. ; Hsu, C. Board composition and operational risk events of financial institutions. 2013 J. Bank. Finance. 37 2042-2051

  82. Wang, T. ; Kannan, K.N. ; Ulmer, J.R. The association between the disclosure and the realization of information security risk factors. 2013 Inf. Syst. Res.. 24 201-218

  83. Wang, T. ; Rees, J. ; Karthik, K. The textual contents of media reports of information security breaches and profitable short-term investment opportunities. 2013 J. Org. Comput. Electron. Commerce. 23 200-223
    Paper not yet in RePEc: Add citation now
  84. Wang, X. Increased disclosure requirements and corporate governance decisions: Evidence from chief financial officers in the pre-and post-Sarbanes-Oxley periods. 2010 J. Acc. Res.. 48 885-920

  85. World Bank. Financial sector's Cybersecurity: Regulations and Supervision. 2018 World Bank:
    Paper not yet in RePEc: Add citation now
  86. Yayla, A.A. ; Hu, Q. The impact of information security events on the stock value of firms: the effect of contingency factors. 2011 J. Inform. Technol.. 26 60-77
    Paper not yet in RePEc: Add citation now
  87. Yen, J. ; lim, J. ; Hus, T.W. The impact of audit firms’ characteristics on audit fees following information security breaches. 2018 J. Acc. Public Policy. 37 489-507
    Paper not yet in RePEc: Add citation now
  88. Yu, J. ; Kwak, B. ; Park, M.S. ; Zang, Y. The impact of CEO/CFO outside directorships on auditor selection and audit quality. 2020 Eur. Acc. Rev.. -
    Paper not yet in RePEc: Add citation now
  89. Zhang, J.Z. ; Yu, Y. Does board independence affect audit fees? Evidence from recent regulatory reforms. 2016 Eur. Acc. Rev.. 25 793-814

Cocites

Documents in RePEc which have cited the same bibliography

  1. How the three lines of defense can contribute to public firms’ cybersecurity effectiveness. (2025). Fortin, Anne ; Hroux, Sylvie.
    In: International Journal of Disclosure and Governance.
    RePEc:pal:ijodag:v:22:y:2025:i:2:d:10.1057_s41310-024-00226-7.

    Full description at Econpapers || Download paper

  2. The effect of corporate risk management on cyber risk mitigation: Evidence from the insurance industry. (2025). Yun, Jiyeon ; Kim, Chanjin ; Jung, Kwangmin.
    In: The Geneva Papers on Risk and Insurance - Issues and Practice.
    RePEc:pal:gpprii:v:50:y:2025:i:2:d:10.1057_s41288-024-00326-z.

    Full description at Econpapers || Download paper

  3. Stock-Term market impact of major cyber-attacks: Evidence for the ten most exposed insurance firms to cyber risk. (2025). Moutinho, Nuno ; Martins, Antnio Miguel.
    In: Finance Research Letters.
    RePEc:eee:finlet:v:71:y:2025:i:c:s1544612324013904.

    Full description at Econpapers || Download paper

  4. From green to digital: Exploring the role of ecological footprints on cybersecurity risk. (2025). Lin, Weizheng ; Chen, Jian-Yun ; Wang, Chih-Wei.
    In: Energy Economics.
    RePEc:eee:eneeco:v:146:y:2025:i:c:s0140988325003706.

    Full description at Econpapers || Download paper

  5. Should firms invest more in cybersecurity?. (2024). El-Dardiry, Ramy ; Dinkova, Milena ; Overvest, Bastiaan.
    In: Small Business Economics.
    RePEc:kap:sbusec:v:63:y:2024:i:1:d:10.1007_s11187-023-00803-0.

    Full description at Econpapers || Download paper

  6. Board of directors’ attributes and aspects of cybersecurity disclosure. (2024). Heroux, Sylvie ; Fortin, Anne.
    In: Journal of Management & Governance.
    RePEc:kap:jmgtgv:v:28:y:2024:i:2:d:10.1007_s10997-022-09660-7.

    Full description at Econpapers || Download paper

  7. When the Data Are Out: Measuring Behavioral Changes Following a Data Breach. (2024). Feinberg, Fred M ; Turjeman, Dana.
    In: Marketing Science.
    RePEc:inm:ormksc:v:43:y:2024:i:2:p:440-461.

    Full description at Econpapers || Download paper

  8. Understanding Data Breach from a Global Perspective: Incident Visualization and Data Protection Law Review. (2024). de Oliveira, Robson ; Garcia, Luis Javier ; Pimenta, Gabriel Arquelau ; Lopes, Fabio Lucio ; Canedo, Edna Dias ; Marques, Andre Luiz ; Sandoval, Ana Lucila.
    In: Data.
    RePEc:gam:jdataj:v:9:y:2024:i:2:p:27-:d:1330575.

    Full description at Econpapers || Download paper

  9. HACKED: Understanding the stock market response to cyberattacks. (2024). Conlon, Thomas ; Corbet, Shaen ; Hou, Yang ; Akyildirim, Erdinc.
    In: Journal of International Financial Markets, Institutions and Money.
    RePEc:eee:intfin:v:97:y:2024:i:c:s1042443124001483.

    Full description at Econpapers || Download paper

  10. Understanding cybersecurity breach contagion effects: The role of the loss heuristic and internal controls. (2024). Yang, Ya-Wen ; Kelton, Andrea Seaton.
    In: International Journal of Accounting Information Systems.
    RePEc:eee:ijoais:v:55:y:2024:i:c:s1467089524000472.

    Full description at Econpapers || Download paper

  11. Corporate social irresponsibility and the occurrence of data breaches: A stakeholder management perspective. (2024). Rezaee, Zabihollah ; Bu, Luofan ; Zhou, Gaoguang.
    In: International Journal of Accounting Information Systems.
    RePEc:eee:ijoais:v:53:y:2024:i:c:s1467089524000101.

    Full description at Econpapers || Download paper

  12. Asset redeployability and the market reaction to cyberattacks. (2024). Nguyen, Trung ; Harris, Oneil.
    In: Finance Research Letters.
    RePEc:eee:finlet:v:70:y:2024:i:c:s1544612324013072.

    Full description at Econpapers || Download paper

  13. Cybersecurity data breaches and internal control. (2024). Huang, Jianning ; Zhou, Fuzhao.
    In: International Review of Financial Analysis.
    RePEc:eee:finana:v:93:y:2024:i:c:s1057521924001066.

    Full description at Econpapers || Download paper

  14. Data breach disclosures and stock price crash risk: Evidence from data breach notification laws. (2024). Silveri, Sabatino ; Cao, Hung ; Phan, Hieu V.
    In: International Review of Financial Analysis.
    RePEc:eee:finana:v:93:y:2024:i:c:s1057521924000966.

    Full description at Econpapers || Download paper

  15. Auditing decentralized finance. (2024). Bhambhwani, Siddharth M ; Huang, Allen H.
    In: The British Accounting Review.
    RePEc:eee:bracre:v:56:y:2024:i:2:s0890838923001270.

    Full description at Econpapers || Download paper

  16. Measuring the performance of investments in information security startups: An empirical analysis by cybersecurity sectors using Crunchbase data. (2024). Humbert, Mathias ; Mar, Loic ; David, Dimitri Percia ; Mermoud, Alain.
    In: Papers.
    RePEc:arx:papers:2402.04765.

    Full description at Econpapers || Download paper

  17. The Anatomy of Cyber Risk. (2023). Rey, Helene ; Jamilov, Rustam ; Tahoun, Ahmed.
    In: Working Papers Series.
    RePEc:thk:wpaper:inetwp206.

    Full description at Econpapers || Download paper

  18. Regulation of data breach publication: the case of US healthcare and the HITECH act. (2023). Bohn, Lorenz ; Schiereck, Dirk.
    In: Journal of Economics and Finance.
    RePEc:spr:jecfin:v:47:y:2023:i:2:d:10.1007_s12197-022-09607-6.

    Full description at Econpapers || Download paper

  19. Board effectiveness and cybersecurity disclosure. (2023). Smaili, Nadia ; Radu, Camelia ; Khalili, Amir.
    In: Journal of Management & Governance.
    RePEc:kap:jmgtgv:v:27:y:2023:i:4:d:10.1007_s10997-022-09637-6.

    Full description at Econpapers || Download paper

  20. Is Cybersecurity Risk Factor Disclosure Informative? Evidence from Disclosures Following a Data Breach. (2023). Jiang, XI ; Chen, Jing ; Henry, Elaine.
    In: Journal of Business Ethics.
    RePEc:kap:jbuset:v:187:y:2023:i:1:d:10.1007_s10551-022-05107-z.

    Full description at Econpapers || Download paper

  21. Pirates without borders: The propagation of cyberattacks through firms’ supply chains. (2023). Crosignani, Matteo ; Macchiavelli, Marco ; Silva, Andre F.
    In: Journal of Financial Economics.
    RePEc:eee:jfinec:v:147:y:2023:i:2:p:432-448.

    Full description at Econpapers || Download paper

  22. The impact of customer firm data breaches on the audit fees of their suppliers. (2023). Zhang, Yimei ; Smith, Thomas.
    In: International Journal of Accounting Information Systems.
    RePEc:eee:ijoais:v:50:y:2023:i:c:s1467089523000209.

    Full description at Econpapers || Download paper

  23. Cybersecurity breaches and investors’ interest in the firm as an investment. (2023). Kaplan, Steven E ; Demek, Kristina C.
    In: International Journal of Accounting Information Systems.
    RePEc:eee:ijoais:v:49:y:2023:i:c:s1467089523000088.

    Full description at Econpapers || Download paper

  24. Data breaches (hacking) and trade credit. (2023). Singh, Amanjot.
    In: Global Finance Journal.
    RePEc:eee:glofin:v:57:y:2023:i:c:s1044028323000534.

    Full description at Econpapers || Download paper

  25. Do data breach disclosure laws matter to shareholder risk?. (2023). Elmawazini, Khaled ; Sassi, Syrine ; Saadi, Samir ; Ali, Mohammed ; Khiyar, Khiyar Abdalla.
    In: Finance Research Letters.
    RePEc:eee:finlet:v:53:y:2023:i:c:s1544612322007644.

    Full description at Econpapers || Download paper

  26. Data breaches in the age of surveillance capitalism: Do disclosures have a new role to play?. (2023). Baker, Max ; Andrew, Jane ; Huang, Casey.
    In: CRITICAL PERSPECTIVES ON ACCOUNTING.
    RePEc:eee:crpeac:v:90:y:2023:i:c:s1045235421001155.

    Full description at Econpapers || Download paper

  27. Tone emphasis and insider trading. (2023). Jin, Qinglu ; Cheng, Lin ; Ma, Hui.
    In: Journal of Corporate Finance.
    RePEc:eee:corfin:v:80:y:2023:i:c:s0929119923000688.

    Full description at Econpapers || Download paper

  28. Implications of false alarms in dynamic games on cyber-security. (2023). Han, Kookyoung ; Choi, Jinhyuk.
    In: Chaos, Solitons & Fractals.
    RePEc:eee:chsofr:v:169:y:2023:i:c:s0960077923002230.

    Full description at Econpapers || Download paper

  29. Board Gender Diversity and Corporate Response to Cyber Risk: Evidence from Cybersecurity Related Disclosure. (2022). Smaili, Nadia ; Radu, Camelia.
    In: Journal of Business Ethics.
    RePEc:kap:jbuset:v:177:y:2022:i:2:d:10.1007_s10551-020-04717-9.

    Full description at Econpapers || Download paper

  30. The determinants of cybersecurity risk disclosure in firms’ financial reporting: Empirical evidence. (2022). Masoud, Najeb ; Al-Utaibi, Ghassan.
    In: Research in Economics.
    RePEc:eee:reecon:v:76:y:2022:i:2:p:131-140.

    Full description at Econpapers || Download paper

  31. Dangerous games: A literature review on cybersecurity investments. (2022). Fedele, Alessandro ; Roner, Cristian.
    In: Journal of Economic Surveys.
    RePEc:bla:jecsur:v:36:y:2022:i:1:p:157-187.

    Full description at Econpapers || Download paper

  32. The Impact of Executives’ IT Expertise on Reported Data Security Breaches. (2021). Pinsker, Robert ; Lim, Jee-Hae ; Haislip, Jacob.
    In: Information Systems Research.
    RePEc:inm:orisre:v:32:y:2021:i:2:p:318-334.

    Full description at Econpapers || Download paper

  33. Risk management, firm reputation, and the impact of successful cyberattacks on target firms. (2021). Milidonis, Andreas ; Kamiya, Shinichi ; Stulz, Rene M ; Kim, Jungmin ; Kang, Jun-Koo.
    In: Journal of Financial Economics.
    RePEc:eee:jfinec:v:139:y:2021:i:3:p:719-749.

    Full description at Econpapers || Download paper

  34. Time-varying effects of cyberattacks on firm value. (2020). Nguyen, Trung ; McShane, Michael.
    In: The Geneva Papers on Risk and Insurance - Issues and Practice.
    RePEc:pal:gpprii:v:45:y:2020:i:4:d:10.1057_s41288-020-00170-x.

    Full description at Econpapers || Download paper

  35. A Survey of Fintech Research and Policy Discussion. (2020). Jagtiani, Julapa ; Allen, Franklin ; Gu, Xian.
    In: Working Papers.
    RePEc:fip:fedpwp:88120.

    Full description at Econpapers || Download paper

  36. Pirates without Borders: The Propagation of Cyberattacks through Firms’ Supply Chains. (2020). Silva, André ; Crosignani, Matteo ; Macchiavelli, Marco.
    In: Staff Reports.
    RePEc:fip:fednsr:88465.

    Full description at Econpapers || Download paper

  37. Insider trading ahead of cyber breach announcements. (2020). Lin, Zhaoxin ; Parsa, Rahul ; Ulmer, Jackie Rees.
    In: Journal of Financial Markets.
    RePEc:eee:finmar:v:50:y:2020:i:c:s138641811930357x.

    Full description at Econpapers || Download paper

  38. Cyberattacks and impact on bond valuation. (2020). Iyer, Subramanian R ; Wang, Heng ; Simkins, Betty J.
    In: Finance Research Letters.
    RePEc:eee:finlet:v:33:y:2020:i:c:s1544612319302934.

    Full description at Econpapers || Download paper

  39. Cyber incidents, security measures and financial returns: Empirical evidence from Dutch firms. (2020). El-Dardiry, Ramy ; Dinkova, Milena ; Overvest, Bastiaan.
    In: CPB Discussion Paper.
    RePEc:cpb:discus:411.rdf.

    Full description at Econpapers || Download paper

  40. Cyber incidents, security measures and financial returns: Empirical evidence from Dutch firms. (2020). El-Dardiry, Ramy ; Dinkova, Milena ; Overvest, Bastiaan.
    In: CPB Discussion Paper.
    RePEc:cpb:discus:411.

    Full description at Econpapers || Download paper

  41. Cybersecurity Risk. (2020). Weber, Michael ; michaely, roni ; Louca, Christodoulos ; Florackis, Chris.
    In: CESifo Working Paper Series.
    RePEc:ces:ceswps:_8760.

    Full description at Econpapers || Download paper

  42. Dangerous Games: A Literature Review on Cybersecurity Investments. (2020). Fedele, Alessandro ; Roner, Cristian.
    In: BEMPS - Bozen Economics & Management Paper Series.
    RePEc:bzn:wpaper:bemps75.

    Full description at Econpapers || Download paper

  43. Cybersecurity Risk. (2020). Weber, Michael ; michaely, roni ; Louca, Christodoulos ; Florakis, Chris.
    In: Working Papers.
    RePEc:bfi:wpaper:2020-178.

    Full description at Econpapers || Download paper

  44. Time-varying effects of cyberattacks on firm value. (). Nguyen, Trung ; McShane, Michael.
    In: The Geneva Papers on Risk and Insurance - Issues and Practice.
    RePEc:pal:gpprii:v::y::i::d:10.1057_s41288-020-00170-x.

    Full description at Econpapers || Download paper

Coauthors

Authors registered in RePEc who have wrote about the same topic

Report date: 2025-10-03 21:27:22 || Missing content? Let us know

CitEc is a RePEc service, providing citation data for Economics since 2001. Last updated August, 3 2024. Contact: Jose Manuel Barrueco.