{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,24]],"date-time":"2024-08-24T05:45:29Z","timestamp":1724478329976},"reference-count":52,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T00:00:00Z","timestamp":1552262400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JICES"],"published-print":{"date-parts":[[2019,3,11]]},"abstract":"\nPurpose<\/jats:title>\nCybercrime is a prevalent and serious threat to publicly traded companies. Defending company information systems from cybercrime is one of the most important aspects of technology management. Cybercrime often not only results in stolen assets and lost business but also damages a company\u2019s reputation, which in turn may affect the company\u2019s stock market value. This is a serious concern to company managers, financial analysts, investors and creditors. This paper aims to examine the impact of cybercrime on stock prices of a sample of publicly traded companies.<\/jats:p>\n<\/jats:sec>\n\nDesign\/methodology\/approach<\/jats:title>\nFinancial data were gathered on companies that were reported in news stories as victims of cybercrime. The market price of the company\u2019s stock was recorded for several days before the news report and several days after. The percentage change in the stock price was compared to the change in the Dow Jones Industrial average to determine whether the stock price increased or decreased along with the rest of the market.<\/jats:p>\n<\/jats:sec>\n\nFindings<\/jats:title>\nStock prices were negatively affected in all time periods examined, significantly so in one period.<\/jats:p>\n<\/jats:sec>\n\nPractical implications<\/jats:title>\nThis paper describes cases concerning cybercrime, thereby bringing attention to the value of cybersecurity in protecting computers, identity and transactions. Cyber security is necessary to avoid becoming a victim of cybercrime. Specific security improvements and preventive measures are provided within the paper. Preventive measures are generally less costly than repairs after a cybercrime.<\/jats:p>\n<\/jats:sec>\n\nOriginality\/value<\/jats:title>\nThis is an original manuscript that adds to the literature regarding cybercrime and preventive measures.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/jices-02-2018-0010","type":"journal-article","created":{"date-parts":[[2018,10,18]],"date-time":"2018-10-18T14:08:52Z","timestamp":1539871732000},"page":"42-60","source":"Crossref","is-referenced-by-count":26,"title":["Examination of cybercrime and its effects on corporate stock value"],"prefix":"10.1108","volume":"17","author":[{"given":"Katherine Taken","family":"Smith","sequence":"first","affiliation":[]},{"given":"Amie","family":"Jones","sequence":"additional","affiliation":[]},{"given":"Leigh","family":"Johnson","sequence":"additional","affiliation":[]},{"given":"Lawrence Murphy","family":"Smith","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020092617374850700_ref001","unstructured":"Anthem (2016), \u201cAbout anthem, inc\u201d, Anthem, available at: https:\/\/www.antheminc.com\/AboutAnthemInc\/index.htm (accessed 2 November 2016)."},{"key":"key2020092617374850700_ref002","first-page":"175","article-title":"How does cyber crime affect firms? The effect of information security breaches on stock returns","year":"2017","journal-title":"In ITASEC"},{"key":"key2020092617374850700_ref003","unstructured":"Barnes, B. and Cieply, M. (2014), \u201cSony cyberattack, first a nuisance, swiftly grew into a firestorm\u201d, The New York Times, available at: www.nytimes.com\/2014\/12\/31\/business\/media\/sony-attack-first-a-nuisance-swiftly-grew-into-a-firestorm-.html (accessed 2 November 2016)."},{"issue":"1","key":"key2020092617374850700_ref004","first-page":"59","article-title":"Protecting the brand: evaluating the cost of security breach from a marketer\u2019s perspective","volume":"11","year":"2017","journal-title":"Journal of Marketing Development and Competitiveness"},{"key":"key2020092617374850700_ref005","unstructured":"Community Health Systems (2016), \u201cCompany overview\u201d, Community Health Systems, available at: www.chs.net\/#skip-menu (accessed 13 November 2016)."},{"key":"key2020092617374850700_ref006","unstructured":"Criminal Laws (2017), \u201cMust know facts on computer crimes\u201d, Criminal Laws, available at: https:\/\/criminal.laws.com\/cyber-crimes (accessed 21 April 2018)."},{"key":"key2020092617374850700_ref007","unstructured":"Dash, E. and Schwartz, N. (2011), \u201cThieves found Citigroup site an easy entry\u201d, The New York Times, available at: www.nytimes.com\/2011\/06\/14\/technology\/14security.html (accessed 2 November 2016)."},{"key":"key2020092617374850700_ref008","article-title":"Michaels warns of possible data breach","year":"2014","journal-title":"The Wall Street Journal"},{"key":"key2020092617374850700_ref009","unstructured":"The Economist (2015), \u201cWhat lies behind the JPMorgan chase cyber-attack\u201d, The Economist Newspaper Limited, available at: www.economist.com\/news\/business-and-finance\/21678214-criminal-economy-developing-faster-lawful-one-can-defend-itself-what-lies-behind (accessed 21 February 2017)."},{"issue":"7-8","key":"key2020092617374850700_ref010","doi-asserted-by":"crossref","first-page":"565","DOI":"10.1080\/1351847X.2017.1303528","article-title":"Financial crime \u2018hot spots\u2019 \u2013 empirical evidence from the foreign exchange market","volume":"24","year":"2018","journal-title":"The European Journal of Finance"},{"key":"key2020092617374850700_ref011","unstructured":"Event Study Metrics (2018), \u201cThe basic idea and purpose of event studies\u201d, available at: https:\/\/eventstudymetrics.com\/index.php\/the-basic-idea-and-purpose-of-event-studies\/ (accessed 20 April 2018)."},{"key":"key2020092617374850700_ref012","unstructured":"Granville, K. (2015), \u201c9 Recent cyberattacks against big businesses\u201d, The New York Times, available at: www.nytimes.com\/interactive\/2015\/02\/05\/technology\/recent-cyberattacks.html?_r=0 (accessed 2 November 2016)."},{"key":"key2020092617374850700_ref013","unstructured":"FBI (2016), \u201cCyber crime\u201d, FBI, available at: https:\/\/www.fbi.gov\/investigate\/cyber (accessed 2 October 2016)."},{"key":"key2020092617374850700_ref014","unstructured":"Fox-Brewster, T. (2014), \u201cMeet Anunak - The hacker crew that owned staples and earned $18m in 2014\u201d, Forbes. 22 Dec. 2014, available at: www.forbes.com\/sites\/thomasbrewster\/2014\/12\/22\/anunak-hackers-who-hit-staples\/#4789489a3334 (accessed 2 October 2016)."},{"key":"key2020092617374850700_ref015","unstructured":"Harris, E. (2014), \u201cMichaels stores\u2019 breach involved 3 million customers\u201d, The New York Times, available at: www.nytimes.com\/2014\/04\/19\/business\/michaels-stores-confirms-breach-involving-three-million-customers.html?_r=0 (accessed 3 November 2016)."},{"key":"key2020092617374850700_ref016","unstructured":"Holland, S. and Spetalnick, M. (2014), \u201cObama vows US response to North Korea over Sony cyber attack\u201d, REUTERS. 19 Dec. 2014, available at: www.reuters.com\/article\/us-sony-cybersecurity-usa-idUSKBN0JX1MH20141219 (accessed 10 November 2016)."},{"issue":"1","key":"key2020092617374850700_ref017","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1145\/3051473.3051476","article-title":"Market reaction to security breach announcements: Evidence from South Korea","volume":"48","year":"2017","journal-title":"ACM SIGMIS Database: The DATABASE for Advances in Information Systems"},{"key":"key2020092617374850700_ref018","unstructured":"Hsu, T. (2014), \u201c2 arrested in connection with target hack\u201d, The Los Angeles Times, available at: www.latimes.com\/business\/la-fi-target-arrests-20140121-story.html (accessed 21 February 2016)."},{"issue":"2","key":"key2020092617374850700_ref019","doi-asserted-by":"crossref","first-page":"497","DOI":"10.25300\/MISQ\/2017\/41.2.08","article-title":"Cybercrime deterrence and international legislation: Evidence from distributed denial of service attacks","volume":"41","year":"2017","journal-title":"MIS Quarterly"},{"key":"key2020092617374850700_ref020","unstructured":"INTERPOL (2016), \u201cCybercrime\u201d, Interpol, available at: www.Interpol.int\/Crime-areas\/Cybercrime\/Cybercrime (accessed 2 October 2016)."},{"key":"key2020092617374850700_ref021","unstructured":"ITBusinessEdge (2016), \u201cEight reasons why cyber attacks hit retailers\u201d, ITBusinessEdge, available at: www.itbusinessedge.com\/slideshows\/eight-reasons-why-cyber-attacks-hit-retailers-10.html (accessed 1 November 2016)."},{"issue":"4","key":"key2020092617374850700_ref022","first-page":"68.1","article-title":"Abuse reporting and the fight against cybercrime","volume":"49","year":"2017","journal-title":"ACM Computing Surveys"},{"key":"key2020092617374850700_ref023","unstructured":"JPMorgan Chase and Co (2016), \u201cAbout Us\u201d, JPMorgan Chase and Co, available at: www.jpmorganchase.com\/corporate\/About-JPMC\/about-us.htm (accessed 13 November 2016)."},{"key":"key2020092617374850700_ref024","unstructured":"Julien, T. (2016), \u201cDefining moments in the history of Cyber-Security and the rise of incident response\u201d, InfoSecurity, available at: www.infosecurity-magazine.com\/opinions\/the-history-of-cybersecurity\/ (accessed 2 November 2016)."},{"key":"key2020092617374850700_ref025","unstructured":"Krebs (2014), \u201cHome depot: Hackers stole 53M email addresses\u201d, KrebsonSecurity, available at: https:\/\/krebsonsecurity.com\/2014\/11\/home-depot-hackers-stole-53m-email-addreses\/ (accessed 13 November 2016)."},{"issue":"1","key":"key2020092617374850700_ref026","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1504\/IJTM.2016.074675","article-title":"Measuring the change in knowledge sharing efficiency of virtual communities of practice: a case study","volume":"70","year":"2016","journal-title":"International Journal of Technology Management"},{"key":"key2020092617374850700_ref027","unstructured":"Mathews, A.W. (2015), \u201cAnthem: Hacked database included 78.8 million people\u201d, Wall Street Journal. 24 Feb. 2015. Web. 01 Oct. 2016, available at: www.wsj.com\/articles\/anthem-hacked-database-included-78-8-million-people-1424807364 (accessed 2 October 2016)."},{"key":"key2020092617374850700_ref028","unstructured":"McAfee (2016), \u201cNet losses: Estimating the global cost of cybercrime: Economic impact of cybercrime\u201d, McAfee, available at: www.mcafee.com\/us\/resources\/reports\/rp-economic-impact-cybercrime2.pdf (accessed 2 October 2016)."},{"key":"key2020092617374850700_ref029","unstructured":"Mercer, E. (2016), \u201cCauses of cybercrime\u201d, Tech in our Everyday Life, available at: http:\/\/techin.oureverydaylife.com\/causes-cyber-crime-1846.html (accessed 1 November 2016)."},{"key":"key2020092617374850700_ref030","unstructured":"Morgan, S. (2016), \u201cCyber crime costs projected to reach $2 trillion by 2019\u201d, Forbes. 17 Jan. 2016, available at: www.forbes.com\/sites\/stevemorgan\/2016\/01\/17\/cyber-crime-costs-projected-to-reach-2-trillion-by-2019\/#81fe0503bb0c (accessed 2 October 2016)."},{"issue":"6","key":"key2020092617374850700_ref031","first-page":"33","article-title":"Identity hack! is your company next?","volume":"96","year":"2014","journal-title":"Strategic Finance"},{"key":"key2020092617374850700_ref032","unstructured":"Munro, D. (2014), \u201cCyber attack nets 4.5 million records from large hospital system\u201d, Forbes, available at: www.forbes.com\/sites\/danmunro\/2014\/08\/18\/cyber-attack-nets-4-5-million-records-from-large-hospital-system\/#c8522818bce0 (accessed 3 November 2016)."},{"key":"key2020092617374850700_ref033","unstructured":"Norton (2016), \u201cCybercrime \u2013 The definition of cybercrime\u201d, Norton, available at: http:\/\/us.norton.com\/cybercrime-definition\/ (accessed 1 October 2016)."},{"key":"key2020092617374850700_ref034","unstructured":"Oxford Dictionary (2018a), \u201cCyber attack definition\u201d, available at: https:\/\/en.oxforddictionaries.com\/definition\/cyberattack (accessed 20 March 2018)."},{"key":"key2020092617374850700_ref035","unstructured":"Oxford Dictionary (2018b), \u201cHacker definition\u201d, available at: https:\/\/en.oxforddictionaries.com\/definition\/hacker (accessed 20 March 2018)."},{"key":"key2020092617374850700_ref036","unstructured":"Paganini, P. (2015), \u201cAnthem breach: a slow and silent attack\u201d, Wall Street Journal, available at: http:\/\/securityaffairs.co\/wordpress\/33582\/cyber-crime\/anthem-breach-slow-silent-attack.html (accessed 1 October 2016)."},{"key":"key2020092617374850700_ref037","unstructured":"Peterson, A. (2014), \u201cThe Sony pictures hack, explained\u201d, The Washington Post, available at: https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2014\/12\/18\/the-sony-pictures-hack-explained\/ (accessed 2 November 2016)."},{"key":"key2020092617374850700_ref038","unstructured":"Rashid, F. (2014), \u201cHow cybercriminals attacked target: Analysis\u201d, Security Week, available at: www.securityweek.com\/how-cybercriminals-attacked-target-analysis (accessed 3 November 2016)."},{"key":"key2020092617374850700_ref039","unstructured":"ReadyCloud (2016), \u201cEcommerce statistics all retailers should know\u201d, ReadyCloud, available at: https:\/\/www.readycloud.com\/info\/ecommerce-statistics-all-retailers-should-know (accessed 11 November 2016)."},{"key":"key2020092617374850700_ref040","unstructured":"Riley, M. and Robertson, J. (2015), \u201cChina-Tied Hackers that hit US said to breach united airlines\u201d, Bloomberg, available at: www.bloomberg.com\/news\/articles\/2015-07-29\/china-tied-hackers-that-hit-u-s-said-to-breach-united-airlines (accessed 3 November 2016)."},{"key":"key2020092617374850700_ref041","unstructured":"SANS Institute (2004), \u201cFederal computer crime laws\u201d, SANS Institute, available at: https:\/\/www.sans.org\/reading-room\/whitepapers\/legal\/federal-computer-crime-laws-1446 (accessed 21 April 2018)."},{"issue":"2","key":"key2020092617374850700_ref042","first-page":"67","article-title":"Case studies of cybercrime and its impact on marketing activity and shareholder value","volume":"15","year":"2011","journal-title":"Academy of Marketing Studies Journal"},{"key":"key2020092617374850700_ref043","unstructured":"Smith, G. (2014), \u201cHome depot admits 56 million payments after cyber attack\u201d, The Huffington Post, available at: www.huffingtonpost.com\/2014\/09\/18\/home-depot-hack_n_5845378.html (accessed 13 November 2016)."},{"key":"key2020092617374850700_ref044","unstructured":"Staples (2014), \u201cNews release\u201d, Staples, available at: http:\/\/investor.staples.com\/phoenix.zhtml?c=96244&p=irol-newsArticle&ID=2001185 (accessed 1 October)."},{"key":"key2020092617374850700_ref045","unstructured":"Statista (2016a), \u201cB2B E-Commerce\u201d, Statista, available at: https:\/\/www.statista.com\/markets\/413\/topic\/458\/b2b-e-commerce\/ (accessed 2 October 2016)."},{"key":"key2020092617374850700_ref046","unstructured":"Statista (2016b), \u201cB2C E-Commerce\u201d, Statista, available at: https:\/\/www.statista.com\/markets\/413\/topic\/457\/b2c-e-commerce\/ (accessed 2 October 2016.)."},{"key":"key2020092617374850700_ref047","first-page":"51","article-title":"Cybercrime law","year":"2017","journal-title":"Digital Forensics"},{"key":"key2020092617374850700_ref048","unstructured":"Tobias, S. (2014), \u201c2014: The year in cyberattacks\u201d, Newsweek, available at: www.newsweek.com\/2014-year-cyber-attacks-295876 (accessed 2 November 2016)."},{"issue":"7","key":"key2020092617374850700_ref049","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1089\/cyber.2017.0028","article-title":"Big five personality traits of cybercrime victims","volume":"20","year":"2017","journal-title":"Cyberpsychology, Behavior, and Social Networking"},{"key":"key2020092617374850700_ref050","unstructured":"Wavefront (2016), \u201cA brief history of cybercrime\u201d, Wavefront Consulting Group, available at: www.wavefrontcg.com\/A_Brief_History_of_Cybercrime.html (accessed 11 November 2016)."},{"key":"key2020092617374850700_ref051","doi-asserted-by":"crossref","unstructured":"Weise, E. (2015), \u201cMassive breach at health care company Anthem Inc\u201d, USA Today, available at: www.usatoday.com\/story\/tech\/2015\/02\/04\/health-care-anthem-hacked\/22900925\/ (accessed 1 October 2016).","DOI":"10.1016\/S1361-3723(15)30001-4"},{"key":"key2020092617374850700_ref052","unstructured":"Wright, C. (2011), \u201cWhat the law says about distributing a virus or malware\u201d, Infosec, available at: www.infosecisland.com\/blogview\/16567-What-the-Law-Says-about-Distributing-a-Virus-or-Malware.html (accessed 21 April 2018)."}],"container-title":["Journal of Information, Communication and Ethics in Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JICES-02-2018-0010\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JICES-02-2018-0010\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,26]],"date-time":"2020-09-26T17:38:13Z","timestamp":1601141893000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JICES-02-2018-0010\/full\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,11]]},"references-count":52,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,3,11]]}},"alternative-id":["10.1108\/JICES-02-2018-0010"],"URL":"https:\/\/doi.org\/10.1108\/jices-02-2018-0010","relation":{},"ISSN":["1477-996X"],"issn-type":[{"value":"1477-996X","type":"print"}],"subject":[],"published":{"date-parts":[[2019,3,11]]}}}