Peer governance effects of information security breaches

被引:0
|
作者
Wang, Jiaxin [1 ]
Wu, Zhifeng [1 ]
Yuan, Xue [1 ]
Song, Zilong [2 ]
机构
[1] Zhongnan Univ Econ & Law, Sch Accounting, Wuhan, Peoples R China
[2] Nanjing Univ Finance & Econ, Sch Accounting, Nanjing, Peoples R China
基金
中国国家自然科学基金;
关键词
Information security breaches; Internal control; Peer effect; INTERNAL CONTROL; DISCLOSURE;
D O I
10.1016/j.eneco.2023.107264
中图分类号
F [经济];
学科分类号
02 ;
摘要
Peers' information security risks may have sent negative signals to the market, thus forcing firms to strengthen their internal control governance. Solow's paradox, however, suggests that when information technology (IT) investment does not reach equilibrium, firms may still blindly increase IT investment while neglecting information security management. Using the unique information security breaches data released by the China National Information Security Vulnerability Database (CNVD), we find that the peers' information security breaches have a governance effect on firm internal control. The underlying mechanism is that peer information security breach increases the cost of proprietary information and reputation maintenance. In addition, we find that the above peer governance effects are more significant in samples with higher agency conflicts, high-tech industries, and higher supply. Further, our further analysis also shows that the peer governance effects of information security breaches positively affect firms' investment efficiency. Overall, our findings verify the peer governance effects of the information security breaches.
引用
收藏
页数:10
相关论文
共 50 条
  • [31] Information security governance: Due care
    von Solms, Rossouw
    von Solms, S. H. Basie
    [J]. COMPUTERS & SECURITY, 2006, 25 (07) : 494 - 497
  • [32] Information security governance in the electricity industry
    de Oliveira, Igor Antonio Magalhaes
    Mexas, Mirian Picinini
    Machado, Elaine Mara Marcal
    Drumond, Geisa Meirelles
    [J]. BRAZILIAN JOURNAL OF OPERATIONS & PRODUCTION MANAGEMENT, 2022, 19 (01):
  • [33] A Framework for Information Security Governance and Management
    Carcary, Marian
    Renaud, Karen
    McLaughlin, Stephen
    O'Brien, Conor
    [J]. IT PROFESSIONAL, 2016, 18 (02) : 22 - 30
  • [34] Information technology and the governance of social security
    Henman, P
    Adler, M
    [J]. CRITICAL SOCIAL POLICY, 2003, 23 (02) : 139 - 164
  • [35] Obstacles to Implementation of Information Security Governance
    Lidster, William W.
    Rahman, Shawon S. M.
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1826 - 1831
  • [36] The role of information security in corporate governance
    Lindup, K
    [J]. COMPUTERS & SECURITY, 1996, 15 (06) : 477 - 485
  • [37] Information security: A corporate governance issue
    Kritzinger-von Solms, E
    Strous, LAM
    [J]. INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS V, 2003, 124 : 115 - 133
  • [38] Integrating information security into corporate governance
    Thomson, KL
    von Solms, R
    [J]. SECURITY AND PRIVACY IN THE AGE OF UNCERTAINTY, 2003, 122 : 169 - 180
  • [39] Role of information security in corporate governance
    SRI Int, London, United Kingdom
    [J]. Comput Secur, 6 (477-485):
  • [40] Enterprise Security Governance - A practical guide to implement and control Information Security Governance (ISG)
    Alberto de Oliveira Alves, Gustavo
    Rust da Costa Carmo, Luiz Fernando
    Dutra de Almeida, Ana Cristina Ribeiro
    [J]. INFORMATION TECHNOLOGY MANAGEMENT FROM A BUSINESS PERSPECTIVE, 2006, : 71 - +