36 research outputs found

    The Economic Impact of Security Breaches on Publicly Traded Corporations: An Empirical Investigation

    Get PDF
    In a 2008 survey of 522 computer security professionals, the Computer Security Institute found an average reported cost close to $500,000 for those companies that experienced a financial fraud. A survey of potential cloud computing adopters show that security and privacy are the primary concerns for not using the cloud. The present research conducts an event study to investigate the impact of publicly announced security breaches on the market value of the breached companies. We utilize the cumulative abnormal returns, risk shifts, and volume changes to measure this impact. Our results show that the cumulative abnormal return due to a security breach is -.19%. We also found the mean risk factor increases by about 22 percent. Our results also show an abnormal trading volume of about 6%. None of the previous research studies in the information systems area has investigated the impact of security breaches on cumulative abnormal returns, volume changes, and risk shifts

    Impact of cloud computing adoption on firm stock price - An empirical research

    Get PDF
    In this paper, we investigate how cloud computing adoption impacts publicly traded 26 cloud-adopting companies\u27 stocks. In an effort to perform a valid assessment of a firm\u27s cloud adoption initiatives, we also evaluate the stocks of 26 companies, which did not adopt cloud computing and operate in the same industry with similar market capitalization. Our study differs from the previous studies in the area because it uses Fama-French three factor model to derive the stock abnormal returns for both adopters and non-adopters. Furthermore, given the announced risks of cloud computing in the literature, we analyzed the stock risk between adopters and non-adopters. Our preliminary analysis implies that businesses adopting cloud computing experience positive cumulative abnormal returns during the time the event was announced. Our research also indicates that both cloud adopting and non-cloud adopting companies suffer from higher stock risk during the announcement but this risk is not statistically significant

    TP53 codon 72 polymorphism affects accumulation of mtDNA damage in human cells

    Get PDF
    Human TP53 gene is characterised by a polymorphism at codon 72 leading to an Arginine-to-Proline (R/P) substitution. The two resulting p53 isoforms have a different subcellular localisation after stress (more nuclear or more mitochondrial for the P or R isoform, respectively). p53P72 variant is more efficient than p53R72 in inducing the expression of genes involved in nuclear DNA repair. Since p53 is involved also in mitochondrial DNA (mtDNA) maintenance, we wondered whether these p53 isoforms are associated with different accumulation of mtDNA damage. We observed that cells bearing p53R72 accumulate lower amount of mtDNA damage upon rotenone stress with respect to cells bearing p53P72, and that p53R72 co-localises with polymerase gamma more than p53P72. We also analysed the in vivo accumulation of heteroplasmy in a 300 bp fragment of mtDNA D-loop of 425 aged subjects. We observed that subjects with heteroplasmy higher than 5% are significantly less than expected in the p53R72/R72 group. On the whole, these data suggest that the polymorphism of TP53 at codon 72 affects the accumulation of mtDNA mutations, likely through the different ability of the two p53 isoforms to bind to polymerase gamma, and may contribute to in vivo accumulation of mtDNA mutations

    Minimal information for studies of extracellular vesicles 2018 (MISEV2018):a position statement of the International Society for Extracellular Vesicles and update of the MISEV2014 guidelines

    Get PDF
    The last decade has seen a sharp increase in the number of scientific publications describing physiological and pathological functions of extracellular vesicles (EVs), a collective term covering various subtypes of cell-released, membranous structures, called exosomes, microvesicles, microparticles, ectosomes, oncosomes, apoptotic bodies, and many other names. However, specific issues arise when working with these entities, whose size and amount often make them difficult to obtain as relatively pure preparations, and to characterize properly. The International Society for Extracellular Vesicles (ISEV) proposed Minimal Information for Studies of Extracellular Vesicles (“MISEV”) guidelines for the field in 2014. We now update these “MISEV2014” guidelines based on evolution of the collective knowledge in the last four years. An important point to consider is that ascribing a specific function to EVs in general, or to subtypes of EVs, requires reporting of specific information beyond mere description of function in a crude, potentially contaminated, and heterogeneous preparation. For example, claims that exosomes are endowed with exquisite and specific activities remain difficult to support experimentally, given our still limited knowledge of their specific molecular machineries of biogenesis and release, as compared with other biophysically similar EVs. The MISEV2018 guidelines include tables and outlines of suggested protocols and steps to follow to document specific EV-associated functional activities. Finally, a checklist is provided with summaries of key points

    Hyperoxemia and excess oxygen use in early acute respiratory distress syndrome : Insights from the LUNG SAFE study

    Get PDF
    Publisher Copyright: © 2020 The Author(s). Copyright: Copyright 2020 Elsevier B.V., All rights reserved.Background: Concerns exist regarding the prevalence and impact of unnecessary oxygen use in patients with acute respiratory distress syndrome (ARDS). We examined this issue in patients with ARDS enrolled in the Large observational study to UNderstand the Global impact of Severe Acute respiratory FailurE (LUNG SAFE) study. Methods: In this secondary analysis of the LUNG SAFE study, we wished to determine the prevalence and the outcomes associated with hyperoxemia on day 1, sustained hyperoxemia, and excessive oxygen use in patients with early ARDS. Patients who fulfilled criteria of ARDS on day 1 and day 2 of acute hypoxemic respiratory failure were categorized based on the presence of hyperoxemia (PaO2 > 100 mmHg) on day 1, sustained (i.e., present on day 1 and day 2) hyperoxemia, or excessive oxygen use (FIO2 ≄ 0.60 during hyperoxemia). Results: Of 2005 patients that met the inclusion criteria, 131 (6.5%) were hypoxemic (PaO2 < 55 mmHg), 607 (30%) had hyperoxemia on day 1, and 250 (12%) had sustained hyperoxemia. Excess FIO2 use occurred in 400 (66%) out of 607 patients with hyperoxemia. Excess FIO2 use decreased from day 1 to day 2 of ARDS, with most hyperoxemic patients on day 2 receiving relatively low FIO2. Multivariate analyses found no independent relationship between day 1 hyperoxemia, sustained hyperoxemia, or excess FIO2 use and adverse clinical outcomes. Mortality was 42% in patients with excess FIO2 use, compared to 39% in a propensity-matched sample of normoxemic (PaO2 55-100 mmHg) patients (P = 0.47). Conclusions: Hyperoxemia and excess oxygen use are both prevalent in early ARDS but are most often non-sustained. No relationship was found between hyperoxemia or excessive oxygen use and patient outcome in this cohort. Trial registration: LUNG-SAFE is registered with ClinicalTrials.gov, NCT02010073publishersversionPeer reviewe

    Reducing the environmental impact of surgery on a global scale: systematic review and co-prioritization with healthcare workers in 132 countries

    Get PDF
    Abstract Background Healthcare cannot achieve net-zero carbon without addressing operating theatres. The aim of this study was to prioritize feasible interventions to reduce the environmental impact of operating theatres. Methods This study adopted a four-phase Delphi consensus co-prioritization methodology. In phase 1, a systematic review of published interventions and global consultation of perioperative healthcare professionals were used to longlist interventions. In phase 2, iterative thematic analysis consolidated comparable interventions into a shortlist. In phase 3, the shortlist was co-prioritized based on patient and clinician views on acceptability, feasibility, and safety. In phase 4, ranked lists of interventions were presented by their relevance to high-income countries and low–middle-income countries. Results In phase 1, 43 interventions were identified, which had low uptake in practice according to 3042 professionals globally. In phase 2, a shortlist of 15 intervention domains was generated. In phase 3, interventions were deemed acceptable for more than 90 per cent of patients except for reducing general anaesthesia (84 per cent) and re-sterilization of ‘single-use’ consumables (86 per cent). In phase 4, the top three shortlisted interventions for high-income countries were: introducing recycling; reducing use of anaesthetic gases; and appropriate clinical waste processing. In phase 4, the top three shortlisted interventions for low–middle-income countries were: introducing reusable surgical devices; reducing use of consumables; and reducing the use of general anaesthesia. Conclusion This is a step toward environmentally sustainable operating environments with actionable interventions applicable to both high– and low–middle–income countries

    The economic worth of cloud computing adoption: A financial analysis

    No full text
    Using resource based view theory and efficient market hypotheses as a basis, this study examined the impact of cloud computing adoption on the market value of the firm using an event study perspective and firm performance perspective. The study\u27s population was chosen based on their participation on a US stock exchange. Using a sample of 139 cloud computing adoption announcements, I found that the announcement of cloud computing adoption is associated with negative abnormal market returns however the effect is not statistically significant. The trading volume showed a significant increase but this increase was not statistically significant. The risk, ÎČ, showed an increase but was not statistically significant. Last I investigated firm performance and derived the return on assets (ROA), return on sales (ROS) and selling general and administrative (SG&A) costs for the firms that adopted cloud computing. Expected were an increase in ROA and ROS and a decrease in SG&A. Rather, ROA and ROS both showed a decrease in value. The mean SG&A shows a decrease in the year after cloud computing adoption. I conclude with potential reasons for the findings . There were several limitations, lack of direct information from the firms, and a small sample size due to the lack of announcements. Despite, this study\u27s results further acknowledge that cloud computing adoption does provide some financial impact on the adopting firms

    The Economic Value of Back-sourcing: An Event Study

    Get PDF
    Back-sourcing is the practice of bringing a once outsourced process back to the originating firm. Prior research have established that the opposite of back-sourcing, outsourcing, has generated positive market reactions. This study uses event study methodology to examine market reactions to back-sourcing. The results strongly support the idea that back-sourcing is a good strategic decision

    The Economic Effect of Privacy Breach Announcements on Stocks: A Comprehensive Empirical Investigation

    Get PDF
    The 2009 CSI Computer Crime and Security Survey indicate that the financial fraud costs about $450,000 per victimorganization. A comprehensive empirical investigation was conducted on the effect of publicly announced privacy breacheson the market value of breached companies. We use the abnormal returns, risk factors, and volumes to measure the marketeffect on the breached firms. Our results show that the cumulative abnormal return (CAR) due to a privacy breach is -1.5percent at the .05 level. Our results also show that the mean risk factor for the breached firms increases by about 4 percent onthe event day compare to the 250 pre-event days Finally, our results show that the volume of the event stocks are higherduring the event days relative to the pre-event 60 days. None of the research studies in the information privacy breach areahas investigated the abnormal risk and abnormal volume patterns around the privacy breach announcements
    corecore