Pesquisa de referências

Time-varying effects of cyberattacks on firm value

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000cab a2200000   4500</leader>
    <controlfield tag="001">MAP20200032847</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20201020131127.0</controlfield>
    <controlfield tag="008">201015e20201001che|||p      |0|||b|eng d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
      <subfield code="d">MAP</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">861</subfield>
    </datafield>
    <datafield tag="100" ind1=" " ind2=" ">
      <subfield code="0">MAPA20200020707</subfield>
      <subfield code="a">McShane, Michael</subfield>
    </datafield>
    <datafield tag="245" ind1="1" ind2="0">
      <subfield code="a">Time-varying effects of cyberattacks on firm value</subfield>
      <subfield code="c">Michael McShane, Trung Nguyen</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">This paper adds to research on the effect of cyber events on the attacked firm's value in light of confticting results from previous studies. Using 536 cyberattack announcements that occurred during the 2007-2016 period, the main goal is to investigate for changes in investor reaction over time as cyberattacks have become more frequent. Empirical evidence shows that cumulative abnormal returns of attacked firms were volatile earlier in the period, became increasingly negative, but have moderated recentIy. This paper proposes and discusses potential explanations for this observed U-shaped pattern over the l O-year periodo The relation between stock market reaction and type of attack, type of data affected, type of perpetrator and various firm level characteristics is also examined.</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140023066</subfield>
      <subfield code="a">Ciberataques</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080609184</subfield>
      <subfield code="a">Valoración de empresas</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140022700</subfield>
      <subfield code="a">Ciberseguridad</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080580698</subfield>
      <subfield code="a">Gestión de crisis</subfield>
    </datafield>
    <datafield tag="700" ind1="1" ind2=" ">
      <subfield code="0">MAPA20200020769</subfield>
      <subfield code="a">Nguyen, Trung </subfield>
    </datafield>
    <datafield tag="773" ind1="0" ind2=" ">
      <subfield code="w">MAP20077100215</subfield>
      <subfield code="t">Geneva papers on risk and insurance : issues and practice</subfield>
      <subfield code="d">Geneva : The Geneva Association, 1976-</subfield>
      <subfield code="x">1018-5895</subfield>
      <subfield code="g">01/10/2020 Volumen 45 Número 4 - octubre 2020 , p. 580-615</subfield>
    </datafield>
  </record>
</collection>