Reaction of Stock Volatility to Data Breach: an Event Study
DOI:
https://doi.org/10.13052/jcsm2245-1439.931Keywords:
Cybersecurity, Stock Volatility, Data Breach, Time-Varying Volatility, Event Study MethodologyAbstract
The paper assesses how stock market volatility reacts to data breach disclosure. The paper applies Volatility Event Analysis and Kolmogorov-Smirnov Test to analyse how equity risk (stock volatility) of 96 firms listed on the S&P 500 index reacted to the announcement of a data breach using records from Breach Level Index (BLI ) over the period between January 2013 and December 2018. Two levels of empirical analysis were performed: cross-section level and industry level. We employ statistical tests that adjust for the effects of cross-section firm-specific mean and volatility. The analysis delivers the following results: Firstly, cross-sectional analysis shows that there is evidence of significant abnormal across the firms and significant difference between before and after cyberattacks announcements. Secondly, the industry level analysis reveals that the firms in the financial industry exhibit more abnormal volatility and returns than firms in other sectors. Additionally, there is significant evidence of the difference in pre and post cyberattacks or data breach announcements, however, this effect tends to be more pronounced after the announcement of a data breach. Implying that data breach announcements can significantly influence equity volatility. In conclusion, the paper posits, equity investors and other stakeholders should reconsider their approach to cybersecurity events when updating the risk measures of their stocks and portfolios.
Downloads
References
A. Hovav and J. D’Arcy, “The impact of denial-of-service attack announcements on the market value of firms,” Risk Manag. Insur. Rev., vol. 6, no. 2, pp. 97–121, 2003.
H. Cavusoglu, B. Mishra, and S. Raghunathan, “The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers,” Int. J. Electron. Commer., vol. 9, no. 1, pp. 70–104, 2004.
M. Ko and C. Dorantes, “The impact of information security breaches on the financial performance of the breached firms: an empirical investigation,” J. Inf. Technol. Manag., vol. 17, no. 2, pp. 13–22, 2006.
S. Tweneboah-Koduah, F. Atsu, and W. Buchanan, “Impact of Cyberattacks on Stock Performance: A Comparative Study,” Inf. Comput. Secur., no. 5, Oct. 2018.
W. F. Sharpe, “Capital asset prices: A theory of market equilibrium under conditions of risk,” J. Finance, vol. 19, no. 3, pp. 425–442, 1964.
J. Lintner, “The aggregation of investor’s diverse judgments and preferences in purely competitive security markets,” J. Financ. Quant. Anal., vol. 4, no. 4, pp. 347–400, 1969.
J. Y. Campbell and L. M. Viceira, “The term structure of the risk–return trade-off,” Financ. Anal. J., vol. 61, no. 1, pp. 34–44, 2005.
E. Balaban and C. T. Constantinou, “Volatility clustering and event-induced volatility: Evidence from UK mergers and acquisitions,” Eur. J. Finance, vol. 12, no. 5, pp. 449–453, 2006.
R. Schimmer, K. K. Geschuhn, and A. Vogler, “Disrupting the subscription journals’ business model for the necessary large-scale transformation to open access,” 2015.
M. Cruz, R. Coleman, and G. Salkin, “Modeling and measuring operational risk,” J. Risk, vol. 1, no. 1, pp. 63–72, 1998.
F. S. Khan, J. H. Kim, R. L. Moore, and L. Mathiassen, “Data Breach Risks and Resolutions: A Literature Synthesis,” 2019.
D. Hopkins and L. Mooney, “Caring about the notifiable data breach: The human impact on victims,” Gov. Dir., vol. 71, no. 8, p. 433, 2019.
X. Chen, G. Hilary, and X. S. Tian, “Data Breach Disclosure and Insider Trading,” 2019.
H. Copes, K. R. Kerley, R. Huff, and J. Kane, “Differentiating identity theft: An exploratory study of victims using a national victimization survey,” J. Crim. Justice, vol. 38, no. 5, pp. 1045–1052, 2010.
A. Acquisti, A. Friedman, and R. Telang, “Is there a cost to privacy breaches? An event study,” ICIS 2006 Proc., p. 94, 2006.
“Cost of a Data Breach Study | IBM.” [Online]. Available: https://www.ibm.com/security/data-breach?cm_mc_uid=32364261289715675090710&cm_mc_sid_50200000=90151091567509071047&cm_mc_sid_52640000=29709811567509071049. [Accessed: 03-Sep-2019].
J. R. Veltsos, “An analysis of data breach notifications as negative news,” Bus. Commun. Q., vol. 75, no. 2, pp. 192–207, 2012.
P. A. Argenti, “How technology has influenced the field of corporate communication,” J. Bus. Tech. Commun., vol. 20, no. 3, pp. 357–370, 2006.
S. Romanosky, R. Telang, and A. Acquisti, “Do data breach disclosure laws reduce identity theft?,” J. Policy Anal. Manage., vol. 30, no. 2, pp. 256–286, 2011.
S. Romanosky, R. Telang, and A. Acquisti, “Do data breach disclosure laws reduce identity theft?,” J. Policy Anal. Manage., vol. 30, no. 2, pp. 256–286, 2011.
G. W. Schwert, “Stock volatility in the new millennium: how wacky is Nasdaq?,” J. Monet. Econ., vol. 49, no. 1, pp. 3–26, 2002.
K. M. Gatzlaff and K. A. McCullough, “The effect of data breaches on shareholder wealth,” Risk Manag. Insur. Rev., vol. 13, no. 1, pp. 61–83, 2010.
E. A. Morse, V. Raval, and J. R. Wingender Jr, “Market price effects of data security breaches,” Inf. Secur. J. Glob. Perspect., vol. 20, no. 6, pp. 263–273, 2011.
T. G. Andersen, T. Bollerslev, F. X. Diebold, and H. Ebens, “The distribution of realized stock return volatility,” J. Financ. Econ., vol. 61, no. 1, pp. 43–76, 2001.
B. J. Bushee and C. F. Noe, “Corporate disclosure practices, institutional investors, and stock return volatility,” J. Account. Res., pp. 171–202, 2000.
F. Zhang, “High-frequency trading, stock volatility, and price discovery,” 2010.
R. C. Merton, “On estimating the expected return on the market: An exploratory investigation,” J. Financ. Econ., vol. 8, no. 4, pp. 323–361, 1980.
S. Baiman and R. E. Verrecchia, “Earnings and price-based compensation contracts in the presence of discretionary trading and incomplete contracting,” J. Account. Econ., vol. 20, no. 1, pp. 93–121, 1995.
J. Francis, D. Philbrick, and K. Schipper, “Shareholder litigation and corporate disclosures,” J. Account. Res., pp. 137–164, 1994.
N. Nonejad, “Forecasting aggregate stock market volatility using financial and macroeconomic predictors: Which models forecast best, when and why?,” J. Empir. Finance, vol. 42, pp. 131–154, 2017.
V. Corradi, W. Distaso, and A. Mele, “Macroeconomic determinants of stock volatility and volatility premiums,” J. Monet. Econ., vol. 60, no. 2, pp. 203–220, 2013.
A. C. MacKinlay, “Event studies in economics and finance,” J. Econ. Lit., vol. 35, no. 1, pp. 13–39, 1997.
A. Garg, J. Curtis, and H. Halper, “Quantifying the financial impact of IT security breaches,” Inf. Manag. Comput. Secur., vol. 11, no. 2, pp. 74–83, 2003.
C. Martin, A. Kadry, and G. Abu-Shady, “Quantifying the financial impact of it security breaches on business processes,” in Privacy, Security and Trust (PST), 2014 Twelfth Annual International Conference on, 2014, pp. 149–155.
R. Telang and S. Wattal, “An empirical analysis of the impact of software vulnerability announcements on firm stock price,” IEEE Trans. Softw. Eng., vol. 33, no. 8, pp. 544–557, 2007.
A. A. Yayla and Q. Hu, “The impact of information security events on the stock value of firms: The effect of contingency factors,” J. Inf. Technol., vol. 26, no. 1, pp. 60–77, 2011.
K. Kannan, J. Rees, and S. Sridhar, “Market reactions to information security breach announcements: An empirical analysis,” Int. J. Electron. Commer., vol. 12, no. 1, pp. 69–91, 2007.
N. Gupta, “Partial privatization and firm performance,” J. Finance, vol. 60, no. 2, pp. 987–1015, 2005.
S. D. Friedman and H. Singh, “CEO succession and stockholder reaction: The influence of organizational context and event content,” Acad. Manage. J., vol. 32, no. 4, pp. 718–744, 1989.
A. Pajuste, “Corporate governance and stock market performance in Central and Eastern Europe: A study of nine countries, 1994-2001,” Available SSRN 310419, 2002.
M. Ko and C. Dorantes, “The impact of information security breaches on financial performance of the breached firms: an empirical investigation,” J. Inf. Technol. Manag., vol. 17, no. 2, pp. 13–22, 2006.
B. L. Dos Santos, K. Peffers, and D. C. Mauer, “The impact of information technology investment announcements on the market value of the firm,” Inf. Syst. Res., vol. 4, no. 1, pp. 1–23, 1993.
K. S. Im, K. E. Dow, and V. Grover, “A reexamination of IT investment and the market value of the firm—An event study methodology,” Inf. Syst. Res., vol. 12, no. 1, pp. 103–117, 2001.
A. Hovav and J. D’Arcy, “The impact of denial-of-service attack announcements on the market value of firms,” Risk Manag. Insur. Rev., vol. 6, no. 2, pp. 97–121, 2003.
T. Bollerslev, “Generalized autoregressive conditional heteroskedasticity,” J. Econom., vol. 31, no. 3, pp. 307–327, 1986.
S. J. Brown and J. B. Warner, “Measuring security price performance,” J. Financ. Econ., vol. 8, no. 3, pp. 205–258, 1980.
R. Savickas, “Event-induced volatility and tests for abnormal performance,” J. Financ. Res., vol. 26, no. 2, pp. 165–178, 2003.
S. Armitage, “Event study methods and evidence on their performance,” J. Econ. Surv., vol. 9, no. 1, pp. 25–52, 1995.
D. Krivin, R. Patton, E. Rose, and D. Tabak, “Determination of the appropriate event window length in individual stock event studies,” Available SSRN 466161, 2003.