65,547 research outputs found

    The effect of cyber-attacks on stock returns

    Get PDF
    A widely debated issue in recent years is cybercrime. Breaches in the security of accessibility, integrity and confidentiality of information involve potentially high explicit and implicit costs for firms. This paper investigates the impact of information security breaches on stock returns. Using event-study methodology, the study provides empirical evidence on the effect of announcements of cyber-attacks on the market value of firms from 1995 to 2015. Results show that substantial negative market returns occur following announcements of cyber-attacks. Financial entities often suffer greater negative effects than other companies and non-confidential cyber-attacks are the most dangerous, especially for the financial sector. Overall findings seem to show a link between cybercrime and insider trading

    Plan Now for Managing Electronic Data and Avoid Tomorrow’s Legal Risks

    Get PDF
    [Excerpt] In a world where the use of electronic data is rapidly increasing, companies must find ways to manage data now so that they effectively control compliance risks. The proliferation of electronic data is both astonishing and overwhelming. Given the storage power of average computers today, even the most modest mom-and-pop business may have electronic storage capacity equivalent to 2,000 four-drawer file cabinets. The task of managing electronic data is further compounded by the fact that the data is no longer just tangible pieces of paper, but rather are bytes of information that are constantly being edited, changed, and updated from different people and sources. Proper archiving, retention, monitoring, filtering, and encryption of electronic data are no longer optional: they are imperative

    How does intellectual capital align with cyber security?

    Get PDF
    Purpose – To position the preservation and protection of intellectual capital as a cyber security concern. We outline the security requirements of intellectual capital to help Boards of Directors and executive management teams to understand their responsibilities and accountabilities in this respect.Design/Methodology/Approach – The research methodology is desk research. In other words, we gathered facts and existing research publications that helped us to define key terms, to formulate arguments to convince BoDs of the need to secure their intellectual capital, and to outline actions to be taken by BoDs to do so.Findings – Intellectual capital, as a valuable business resource, is related to information, knowledge and cyber security. Hence, preservation thereof is also related to cyber security governance, and merits attention from boards of directors.Implications – This paper clarifies boards of directors’ intellectual capital governance responsibilities, which encompass information, knowledge and cyber security governance.Social Implications – If boards of directors know how to embrace their intellectual capital governance responsibilities, this will help to ensure that such intellectual capital is preserved and secured.Practical Implications – We hope that boards of directors will benefit from our clarifications, and especially from the positioning of intellectual capital in cyber space.Originality/Value – This paper extends a previous paper published by Von Solms and Von Solms (2018), which clarified the key terms of information and cyber security, and the governance thereof. The originality and value is the focus on the securing of intellectual capital, a topic that has not yet received a great deal of attention from cyber security researchers

    Music in electronic markets: an empirical study

    Get PDF
    Music plays an important, and sometimes overlooked part in the transformation of communication and distribution channels. With a global market volume exceeding US$40 billion, music is not only one of the primary entertainment goods in its own right. Since music is easily personalized and transmitted, it also permeates many other services across cultural borders, anticipating social and economic trends. This article presents one of the first detailed empirical studies on the impact of internet technologies on a specific industry. Drawing on more than 100 interviews conducted between 1996 and 2000 with multinational and independent music companies in 10 markets, strategies of the major players, current business models, future scenarios and regulatory responses to the online distribution of music files are identified and evaluated. The data suggest that changes in the music industry will indeed be far-reaching, but disintermediation is not the likely outcome

    Privacy, Restriction, and Access: Legal and Ethical Dilemmas

    Get PDF
    This paper examines the intersection of privacy and access in archival repositories. Archival repositories are well known for containing restricted material, and for protecting the privacy of the donors. This literature review examines the need for restricted material from both legal and ethical standpoints, as well as discussing culturally sensitive materials while determining what archives and libraries can do to protect both themselves and their donors while enhancing accessibility and freedom of information

    Diversity As A Trade Secret

    Get PDF
    When we think of trade secrets, we often think of famous examples such as the Coca-Cola formula, Google’s algorithm, or McDonald’s special sauce used on the Big Mac. However, companies have increasingly made the novel argument that diversity data and strategies are protected trade secrets. This may sound like an unusual, even suspicious, legal argument. Many of the industries that dominate the economy in wealth, status, and power continue to struggle with a lack of diversity. Various stakeholders have mobilized to improve access and equity, but there is an information asymmetry that makes this pursuit daunting. When potential plaintiffs and other diversity advocates request workforce statistics and related employment information, many companies have responded with virulent attempts to maintain secrecy, including the use of trade secret protection. In this Article, I use the technology industry as an example to examine the trending legal argument of treating diversity as a trade secret. I discuss how companies can use this tactic to hide gender and race disparities and interfere with the advancement of civil rights law and workplace equity. I argue that instead of permitting companies to hide information, we should treat diversity data and strategies as public resources. This type of open model will advance the goals of equal opportunity law by raising awareness of inequalities and opportunities, motivating employers to invest in effective practices, facilitating collaboration on diversity goals, fostering innovation, and increasing accountability for action and progress
    • 

    corecore