Peer governance effects of information security breaches

被引:0
|
作者
Wang, Jiaxin [1 ]
Wu, Zhifeng [1 ]
Yuan, Xue [1 ]
Song, Zilong [2 ]
机构
[1] Zhongnan Univ Econ & Law, Sch Accounting, Wuhan, Peoples R China
[2] Nanjing Univ Finance & Econ, Sch Accounting, Nanjing, Peoples R China
基金
中国国家自然科学基金;
关键词
Information security breaches; Internal control; Peer effect; INTERNAL CONTROL; DISCLOSURE;
D O I
10.1016/j.eneco.2023.107264
中图分类号
F [经济];
学科分类号
02 ;
摘要
Peers' information security risks may have sent negative signals to the market, thus forcing firms to strengthen their internal control governance. Solow's paradox, however, suggests that when information technology (IT) investment does not reach equilibrium, firms may still blindly increase IT investment while neglecting information security management. Using the unique information security breaches data released by the China National Information Security Vulnerability Database (CNVD), we find that the peers' information security breaches have a governance effect on firm internal control. The underlying mechanism is that peer information security breach increases the cost of proprietary information and reputation maintenance. In addition, we find that the above peer governance effects are more significant in samples with higher agency conflicts, high-tech industries, and higher supply. Further, our further analysis also shows that the peer governance effects of information security breaches positively affect firms' investment efficiency. Overall, our findings verify the peer governance effects of the information security breaches.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Information security breaches and IT security investments: Impacts on competitors
    Jeong, Christina Y.
    Lee, Sang-Yong Tom
    Lim, Jee-Hae
    [J]. INFORMATION & MANAGEMENT, 2019, 56 (05) : 681 - 695
  • [2] The Role of Peer Events in Corporate Governance Evidence from Data Breaches
    Ashraf, Musaib
    [J]. ACCOUNTING REVIEW, 2022, 97 (02): : 1 - 24
  • [3] Information Security Governance
    Williams, Paul
    [J]. 2001, Elsevier Ltd (06): : 60 - 70
  • [4] The influence of human factors on vulnerability to information security breaches
    Luciano, Edimara M.
    Mahmood, M. Adam
    Macada, Antonio Carlos G.
    [J]. AMCIS 2010 PROCEEDINGS, 2010,
  • [5] Hierarchical approach to analyzing security breaches in information systems
    Pavlenko E.Y.
    Yarmak A.V.
    Moskvin D.A.
    [J]. Automatic Control and Computer Sciences, 2017, 51 (8) : 829 - 834
  • [6] Market Price Effects of Data Security Breaches
    Morse, Edward A.
    Raval, Vasant
    Wingender, John R., Jr.
    [J]. INFORMATION SECURITY JOURNAL, 2011, 20 (06): : 263 - 273
  • [7] Do Information Security Policies Reduce the Incidence of Security Breaches: An Exploratory Analysis
    Doherty, Neil
    Fulford, Heather
    [J]. INFORMATION RESOURCES MANAGEMENT JOURNAL, 2005, 18 (04) : 21 - 39
  • [8] WHERE IS IT IN INFORMATION SECURITY? THE INTERRELATIONSHIP AMONG IT INVESTMENT, SECURITY AWARENESS, AND DATA BREACHES
    Li, Wilson Weixun
    Leung, Alvin Chung Man
    Yue, Wei Thoo
    [J]. MIS QUARTERLY, 2023, 47 (01) : 317 - 342
  • [9] The information content of Sarbanes-Oxley in predicting security breaches
    Westland, J. Christopher
    [J]. COMPUTERS & SECURITY, 2020, 90
  • [10] Visualization as an aid for assessing the mission impact of information security breaches
    D'Amico, A
    Salas, S
    [J]. DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL II, PROCEEDINGS, 2003, : 190 - 195