Peer governance effects of information security breaches

被引:0
|
作者
Wang, Jiaxin [1 ]
Wu, Zhifeng [1 ]
Yuan, Xue [1 ]
Song, Zilong [2 ]
机构
[1] Zhongnan Univ Econ & Law, Sch Accounting, Wuhan, Peoples R China
[2] Nanjing Univ Finance & Econ, Sch Accounting, Nanjing, Peoples R China
基金
中国国家自然科学基金;
关键词
Information security breaches; Internal control; Peer effect; INTERNAL CONTROL; DISCLOSURE;
D O I
10.1016/j.eneco.2023.107264
中图分类号
F [经济];
学科分类号
02 ;
摘要
Peers' information security risks may have sent negative signals to the market, thus forcing firms to strengthen their internal control governance. Solow's paradox, however, suggests that when information technology (IT) investment does not reach equilibrium, firms may still blindly increase IT investment while neglecting information security management. Using the unique information security breaches data released by the China National Information Security Vulnerability Database (CNVD), we find that the peers' information security breaches have a governance effect on firm internal control. The underlying mechanism is that peer information security breach increases the cost of proprietary information and reputation maintenance. In addition, we find that the above peer governance effects are more significant in samples with higher agency conflicts, high-tech industries, and higher supply. Further, our further analysis also shows that the peer governance effects of information security breaches positively affect firms' investment efficiency. Overall, our findings verify the peer governance effects of the information security breaches.
引用
收藏
页数:10
相关论文
共 50 条
  • [21] BREACHES OF COMPUTER SECURITY
    LLAURADO, JG
    [J]. INTERNATIONAL JOURNAL OF BIO-MEDICAL COMPUTING, 1983, 14 (02): : 87 - 93
  • [22] Effects of Information Security and Innovations on Country’s Image: Governance Aspect
    Petroye O.
    Lyulyov O.
    Lytvynchuk I.
    Paida Y.
    Pakhomov V.
    [J]. International Journal of Safety and Security Engineering, 2020, 10 (04) : 459 - 466
  • [23] Investigating security breaches
    Casey, Eoghan
    [J]. DIGITAL INVESTIGATION, 2005, 2 (03) : 169 - 170
  • [24] Fight security breaches
    Coombes, P
    [J]. ELECTRONICS WORLD, 2005, 111 (1829): : 47 - 47
  • [25] Blame Distribution Following Information Security Breaches Emergent Research Forum
    Miller, Andrew S.
    Marett, Kent
    [J]. AMCIS 2018 PROCEEDINGS, 2018,
  • [26] The impact of information security breaches: Has there been a downward shift in costs?
    Gordon, Lawrence A.
    Loeb, Martin P.
    Zhou, Lei
    [J]. JOURNAL OF COMPUTER SECURITY, 2011, 19 (01) : 33 - 56
  • [27] Assessing liability arising from information security breaches in data privacy
    Mitrakas, Andreas
    [J]. INTERNATIONAL DATA PRIVACY LAW, 2011, 1 (02) : 129 - 136
  • [28] Analytical Techniques for Decision Making on Information Security for Big Data Breaches
    Albeshri, Aiiad
    Thayananthan, Vijey
    [J]. INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY & DECISION MAKING, 2018, 17 (02) : 527 - 545
  • [29] The Association between Top Management Involvement and Compensation and Information Security Breaches
    Kwon, Juhee
    Ulmer, Jackie Rees
    Wang, Tawei
    [J]. JOURNAL OF INFORMATION SYSTEMS, 2013, 27 (01) : 219 - 236
  • [30] Information Security Governance in Colleges and Universities
    Wang, Jia
    [J]. 4TH INTERNATIONAL CONFERENCE ON ECONOMICS AND MANAGEMENT (ICEM), 2017, : 696 - 699