Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 管理學院
  3. 會計學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/88087
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor高偉娟zh_TW
dc.contributor.advisorWei-Chuan Kaoen
dc.contributor.author陳家揚zh_TW
dc.contributor.authorChia-Yang Chenen
dc.date.accessioned2023-08-08T16:14:22Z-
dc.date.available2023-11-09-
dc.date.copyright2023-08-08-
dc.date.issued2023-
dc.date.submitted2023-07-10-
dc.identifier.citationAgarwal, S., Chen, V. Y., & Zhang, W. (2016). The information value of credit rating action reports: A textual analysis. Management Science, 62(8), 2218-2240.
Agrafiotis, I., Nurse, J. R., Goldsmith, M., Creese, S., & Upton, D. (2018). A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. Journal of Cybersecurity, 4(1), 1-15.
Akey, P., Lewellen, S., Liskovich, I., & Schiller, C. (2021). Hacking corporate reputations. Rotman School of Management Working Paper(3143740).
Amihud, Y. (2002). Illiquidity and stock returns: Cross-section and time-series effects. Journal of Financial Markets, 5(1), 31-56.
Amihud, Y.and Mendelson, H. (1988). Liquidity and asset prices: Financial management implications. Financial Management, 5-15.
Amihud, Y., Mendelson, H., & Pedersen, L. H. (2006). Liquidity and asset prices. Foundations and Trends® in Finance, 1(4), 269-364.
Amir, E., Levi, S., & Livne, T. (2018). Do firms underreport information on cyber-attacks? Evidence from capital markets. Review of Accounting Studies, 23, 1177-1206.
Anderson, R., Barton, C., Bölme, R., Clayton, R., Ganán, C., Grasso, T., Levi, M., Moore, T., & Vasek, M. (2019). Measuring the changing cost of cybercrime. Workshop on the Economics of Information Security (WEIS).
Angst, C. M., Block, E. S., D’Arcy, J., & Kelley, K. (2017). When do IT security investments matter? Accounting for the influence of institutional factors in the context of healthcare data breaches. MIS Quarterly, 41(3), 893-A898.
Ashraf, M. (2022). The role of peer events in corporate governance: Evidence from data breaches. The Accounting Review, 97(2), 1-24.
Aytes, K., Byers, S., & Santhanakrishnan, M. (2006). The economic impact of information security breaches: Firm value and intra-industry effects. Proceedings of 12th Americas Conference on Information Systems.
Banker, R. D. and Feng, C. (2019). The impact of information security breach incidents on CIO turnover. Journal of Information Systems, 33(3), 309-329.
Beaupain, R. and Joliet, R. (2011). Corporate drivers of market liquidity on the Warsaw stock exchange. International Economics, 125, 83-104.
Będowska-Sójka, B. (2018). The coherence of liquidity measures. The evidence from the emerging market. Finance Research Letters, 27, 118-123.
Będowska-Sójka, B. and Kliber, A. (2019). The causality between liquidity and volatility in the Polish stock market. Finance Research Letters, 30, 110-115.
Berezina, K., Cobanoglu, C., Miller, B. L., & Kwansa, F. A. (2012). The impact of information security breach on hotel guest perception of service quality, satisfaction, revisit intentions and word‐of‐mouth. International Journal of Contemporary Hospitality Management, 24(7), 991-1010.
Bolster, P., Pantalone, C. H., & Trahan, E. A. (2010). Security breaches and firm value. Journal of Business Valuation and Economic Loss Analysis, 5(1), 1-13.
Bradrania, M. R. and Peat, M. (2014). Characteristic liquidity, systematic liquidity and expected returns. Journal of International Financial Markets, Institutions and Money, 33, 78-98.
Bradrania, M. R., Peat, M., & Satchell, S. (2015). Liquidity costs, idiosyncratic volatility and expected stock returns. International Review of Financial Analysis, 42, 394-406.
Brennan, M. J., Chordia, T., Subrahmanyam, A., & Tong, Q. (2012). Sell-order liquidity and the cross-section of expected stock returns. Journal of Financial Economics, 105(3), 523-541.
Bushman, R. M., Williams, C. D., & Wittenberg‐Moerman, R. (2017). The informational role of the media in private lending. Journal of Accounting Research, 55(1), 115-152.
Caliendo, M. and Kopeinig, S. (2008). Some practical guidance for the implementation of propensity score matching. Journal of Economic Surveys, 22(1), 31-72.
Campbell, K., Gordon, L. A., Loeb, M. P., & Zhou, L. (2003). The economic cost of publicly announced information security breaches: empirical evidence from the stock market. Journal of Computer Security, 11(3), 431-448.
Cavusoglu, H., Mishra, B., & Raghunathan, S. (2004). The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers. International Journal of Electronic Commerce, 9(1), 70-104.
Chakrabarty, B. and Pascual, R. (2023). Stock liquidity and algorithmic market making during the COVID-19 crisis. Journal of Banking & Finance, 147, 106415.
Chakraborty, R., Lee, J., Bagchi-Sen, S., Upadhyaya, S., & Rao, H. R. (2016). Online shopping intention in the context of data breach in online retail stores: An examination of older and younger adults. Decision Support Systems, 83, 47-56.
Chen, J., Henry, E., & Jiang, X. (2022). Is cybersecurity risk factor disclosure informative? Evidence from disclosures following a data breach. Journal of Business Ethics, 1-26.
Chen, W. P., Chung, H., Lee, C., & Liao, W. L. (2007). Corporate governance and equity liquidity: Analysis of S&P transparency and disclosure rankings. Corporate Governance: An International Review, 15(4), 644-660.
Chen, Y., Hu, G., Yu, D. B., & Zhao, J. (2019). Catastrophic risk and institutional investors: Evidence from institutional trading around 9/11. Pacific-Basin Finance Journal, 56, 211-233.
Chung, K. H., Elder, J., & Kim, J.-C. (2010). Corporate governance and liquidity. Journal of Financial and Quantitative Analysis, 45(2), 265-291.
Dang, M., Puwanenthiren, P., Nguyen, M. T., Hoang, V. A., Mazur, M., & Henry, D. (2022). Does managerial tone matter for stock liquidity? Evidence from textual disclosures. Finance Research Letters, 48, 102917.
Dang, T. L., Moshirian, F., & Zhang, B. (2019). Liquidity shocks and institutional investors. The North American Journal of Economics and Finance, 47, 184-209.
Díaz, A. and Escribano, A. (2020). Measuring the multi-faceted dimension of liquidity in financial markets: A literature review. Research in International Business and Finance, 51, 101079.
Domingos, F., Febra, L., & Costa, M. (2022). Corporate reputation and stock liquidity: The US case. European Journal of Applied Business & Management, 8(3), 1-14.
Ellington, M. (2018). Financial market illiquidity shocks and macroeconomic dynamics: Evidence from the UK. Journal of Banking & Finance, 89, 225-236.
Ettredge, M., Guo, F., & Li, Y. (2018). Trade secrets and cyber security breaches. Journal of Accounting and Public Policy, 37(6), 564-585.
Fama, E. F. (1970). Efficient capital markets: A review of theory and empirical work. The Journal of Finance, 25(2), 383-417.
Fedele, A. and Roner, C. (2022). Dangerous games: A literature review on cybersecurity investments. Journal of Economic Surveys, 36(1), 157-187.
Fernández-Amador, O., Gächter, M., Larch, M., & Peter, G. (2013). Does monetary policy determine stock market liquidity? New evidence from the euro zone. Journal of Empirical Finance, 21, 54-68.
Firth, M. (2002). Auditor–provided consultancy services and their associations with audit fees and audit opinions. Journal of Business Finance & Accounting, 29(5‐6), 661-693.
Fong, K. Y., Holden, C. W., & Trzcinka, C. A. (2017). What are the best liquidity proxies for global research? Review of Finance, 21(4), 1355-1401.
Gatzlaff, K. M. and McCullough, K. A. (2010). The effect of data breaches on shareholder wealth. Risk Management and Insurance Review, 13(1), 61-83.
Hanley, K. W. and Hoberg, G. (2010). The information content of IPO prospectuses. The Review of Financial Studies, 23(7), 2821-2864.
He, C., HuangFu, J., Kohlbeck, M. J., & Wang, L. (2020). The impact of customer’s reported cybersecurity breaches on key supplier’s relationship-specific investments and relationship duration. Available at SSRN 3544245.
Helm, S. (2007). The role of corporate reputation in determining investor satisfaction and loyalty. Corporate Reputation Review, 10, 22-37.
Hillert, A., Maug, E., & Obernberger, S. (2016). Stock repurchases and liquidity. Journal of Financial Economics, 119(1), 186-209.
Hovav, A. and D’Arcy, J. (2003). The impact of denial‐of‐service attack announcements on the market value of firms. Risk Management and Insurance Review, 6(2), 97-121.
Hovav, A. and Gray, P. (2014). The ripple effect of an information security breach event: A stakeholder analysis. Communications of the Association for Information Systems, 34(1), 893-912.
Hsu, P.-H., Kao, W.-C., & Wang, Y. (2022). Cybersecurity, internal controls, and brand capital. Available at SSRN 3907923.
Huang, H. H. and Wang, C. (2021). Do banks price firms’ data breaches? The Accounting Review, 96(3), 261-286.
Hvozdyk, L. and Rustanov, S. (2016). The effect of financial transaction tax on market liquidity and volatility: an Italian perspective. International Review of Financial Analysis, 45, 62-78.
Jacoby, G. and Zheng, S. X. (2010). Ownership dispersion and market liquidity. International Review of Financial Analysis, 19(2), 81-88.
Jeong, C. Y., Lee, S.-Y. T., & Lim, J.-H. (2019). Information security breaches and IT security investments: Impacts on competitors. Information & Management, 56(5), 681-695.
Jiang, F., Lee, J., Martin, X., & Zhou, G. (2019). Manager sentiment and stock returns. Journal of Financial Economics, 132(1), 126-149.
Judge, G. G., Hill, R. C., Griffiths, W., Lutkepohl, H., & Lee, T. C. (1988). Introduction to the theory and practice of econometrics (2nd ed.). New York: Wiley.
Kamiya, S., Kang, J.-K., Kim, J., Milidonis, A., & Stulz, R. M. (2021). Risk management, firm reputation, and the impact of successful cyberattacks on target firms. Journal of Financial Economics, 139(3), 719-749.
Kamoun, F. and Nicho, M. (2014). Human and organizational factors of healthcare data breaches: The swiss cheese model of data breach causation and prevention. International Journal of Healthcare Information Systems and Informatics, 9(1), 42-60.
Karpoff, J. M. (2012). Does Reputation Work to Discipline Corporate misconduct? In M. L. Barnett & T. G. Pollock (Eds), The Oxford handbook of corporate reputation, 361-382. Oxford, UK. Oxford University Press.
Kashmiri, S., Nicol, C. D., & Hsu, L. (2017). Birds of a feather: Intra-industry spillover of the Target customer data breach and the shielding role of IT, marketing, and CSR. Journal of the Academy of Marketing Science, 45, 208-228.
Khan, B., Tahir, M., Nasir, A. M., & Mushtaq, M. (2019). The impact of companies’ internal factors on stock liquidity in Pakistan. Afro-Asian Journal of Finance and Accounting, 9(4), 459-473.
Khediri, K. B. and Daadaa, W. (2011). Stock trading and capital structure in Tunisian stock exchange. Journal of Business Studies Quarterly, 3(2), 10-24.
Kim, J.-C., Jain, P. K., & Rezaee, Z. (2006). Trends and determinants of market liquidity in the pre-and post-Sarbanes-Oxley act periods. 14th Annual Conference on Financial Economics and Accounting (FEA).
Ko, M. and Dorantes, C. (2006). The impact of information security breaches on financial performance of the breached firms: an empirical investigation. Journal of Information Technology Management, 17(2), 13-22.
Kwon, J. and Johnson, M. E. (2014). Proactive versus reactive security investments in the healthcare sector. MIS Quarterly, 38(2), 451-A453.
Labidi, M. and Gajewski, J. F. (2019). Does increased disclosure of intangible assets enhance liquidity around new equity offerings? Research in International Business and Finance, 48, 426-437.
Laube, S. and Böhme, R. (2016). The economics of mandatory security breach reporting to authorities. Journal of Cybersecurity, 2(1), 29-41.
Lawrence, A., Minutti-Meza, M., & Vyas, D. (2018). Is operational control risk informative of financial reporting deficiencies? Auditing: A Journal of Practice & Theory, 37(1), 139-165.
Lee, C.-F. and Lee, J. C. (2015). Handbook of financial econometrics and statistics. Springer, New York.
Lending, C., Minnick, K., & Schorno, P. J. (2018). Corporate governance, social responsibility, and data breaches. Financial Review, 53(2), 413-455.
Levi, S. and Zhang, X.-J. (2015). Asymmetric decrease in liquidity trading before earnings announcements and the announcement return premium. Journal of Financial Economics, 118(2), 383-398.
Li, H., No, W. G., & Boritz, J. E. (2020). Are external auditors concerned about cyber incidents? Evidence from audit fees. Auditing: A Journal of Practice & Theory, 39(1), 151-171.
Li, H., No, W. G., & Wang, T. (2018). SEC’s cybersecurity disclosure guidance and disclosed cybersecurity risk factors. International Journal of Accounting Information Systems, 30, 40-55.
Lin, J.-C., Singh, A. K., & Yu, W. (2009). Stock splits, trading continuity, and the cost of equity capital. Journal of Financial Economics, 93(3), 474-489.
Loughran, T. and McDonald, B. (2011). When is a liability not a liability? Textual analysis, dictionaries, and 10‐Ks. The Journal of Finance, 66(1), 35-65.
Loughran, T. and McDonald, B. (2013). IPO first-day returns, offer price revisions, volatility, and form S-1 language. Journal of Financial Economics, 109(2), 307-326.
Maher, D. and Parikh, A. (2013). The turn of the month effect in India: A case of large institutional trading pattern as a source of higher liquidity. International Review of Financial Analysis, 28, 57-69.
Martin, K. D., Borah, A., & Palmatier, R. W. (2017). Data privacy: Effects on customer and firm performance. Journal of Marketing, 81(1), 36-58.
Nadarajah, S., Ali, S., Liu, B., & Huang, A. (2018). Stock liquidity, corporate governance and leverage: New panel evidence. Pacific-Basin Finance Journal, 50, 216-234.
Nagar, V., Schoenfeld, J., & Wellman, L. (2019). The effect of economic policy uncertainty on investor information asymmetry and management disclosures. Journal of Accounting and Economics, 67(1), 36-57.
Norvaišienė, R. and Stankevičienė, J. (2014). Impact of companies’ internal factors on stock liquidity in Baltic markets. Procedia-Social and Behavioral Sciences, 156, 543-547.
OECD. (2020). OECD digital economy outlook 2020. Retrieved from: https://www.oecd-ilibrary.org/docserver/bb167041-en.pdf?expires=1686602119&id=id&accname=ocid53016431a&checksum=994EEA22A6ECD5D39E599A91FB12B218. Extracted on Jun. 13, 2023.
Pan, D., Shi, J., Wu, F., & Zhang, B. (2015). Investor heterogeneity and commonality in stock return and liquidity. Economic Systems, 39(3), 458-473.
Pan, Y. and Jackson, R. T. (2008). Ethnic difference in the relationship between acute inflammation and serum ferritin in US adult males. Epidemiology & Infection, 136(3), 421-431.
Pavabutr, P. and Sirodom, K. (2010). Stock splits in a retail dominant order driven market. Pacific-Basin Finance Journal, 18(5), 427-441.
Ponemon Institute. (2019). Cost of a data breach report 2019. Retrieved from: https://www.ibm.com/downloads/cas/RDEQK07R. Extracted on Jun. 13, 2023.
Ponemon Institute. (2022). Cost of a data breach report 2022. Retrieved from: https://www.ibm.com/downloads/cas/3R8N1DZJ. Extracted on Jun. 13, 2023.
Prommin, P., Jumreornvong, S., & Jiraporn, P. (2014). The effect of corporate governance on stock liquidity: The case of Thailand. International Review of Economics & Finance, 32, 132-142.
Romanosky, S., Hoffman, D., & Acquisti, A. (2014). Empirical analysis of data breach litigation. Journal of Empirical Legal Studies, 11(1), 74-104.
Rosati, P., Cummins, M., Deeney, P., Gogolin, F., Van der Werff, L., & Lynn, T. (2017). The effect of data breach announcements beyond the stock price: Empirical evidence on market activity. International Review of Financial Analysis, 49, 146-154.
Rosati, P., Gogolin, F., & Lynn, T. (2019). Audit firm assessments of cyber-security risk: evidence from audit fees and SEC comment letters. The International Journal of Accounting, 54(03), 1950013.
Sarr, A. and Lybek, T. (2002). Measuring liquidity in financial markets. IMF Working Paper, 1-64.
Schoenfeld, J. (2017). The effect of voluntary disclosure on stock liquidity: New evidence from index funds. Journal of Accounting and Economics, 63(1), 51-74.
SEC. 2011. CF Disclosure Guidance: Topic No. 2. Available at: https://www.sec.gov/divisions/corpfin/guidance/cfguidance-topic2.htm. Extracted on Jun. 13, 2023.
SEC. 2018. Commission statement and guidance on public company cybersecurity disclosures. Available at: https://www.sec.gov/rules/interp/2018/33-10459.pdf. Extracted on Jun. 13, 2023.
Sen, R. and Borle, S. (2015). Estimating the contextual risk of data breach: An empirical approach. Journal of Management Information Systems, 32(2), 314-341.
Shipman, J. E., Swanquist, Q. T., & Whited, R. L. (2017). Propensity score matching in accounting research. The Accounting Review, 92(1), 213-244.
Siikanen, M., Kanniainen, J., & Valli, J. (2017). Limit order books and liquidity around scheduled and non-scheduled announcements: Empirical evidence from nasdaq nordic. Finance Research Letters, 21, 264-271.
So, E. C. and Wang, S. (2014). News-driven return reversals: Liquidity provision ahead of earnings announcements. Journal of Financial Economics, 114(1), 20-35.
Tetlock, P. C., Saar‐Tsechansky, M., & Macskassy, S. (2008). More than words: Quantifying language to measure firms’ fundamentals. The Journal of finance, 63(3), 1437-1467.
Tosun, O. K. (2021). Cyber-attacks and stock market activity. International Review of Financial Analysis, 76, 101795.
Wang, P., D’Cruze, H., & Wood, D. (2019). Economic costs and impacts of business data breaches. Issues in Information Systems, 20(2), 162-171.
Yayla, A. A. and Hu, Q. (2011). The impact of information security events on the stock value of firms: The effect of contingency factors. Journal of Information Technology, 26(1), 60-77.
Yen, J.-C., Lim, J.-H., Wang, T., & Hsu, C. (2018). The impact of audit firms’ characteristics on audit fees following information security breaches. Journal of Accounting and Public Policy, 37(6), 489-507.
-
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/88087-
dc.description.abstract本研究透過實證,檢驗首次揭露資料外洩事件的公司是否會對其流動性水平造成負面影響。本研究首先透過傾向性評分配對,找出與資料外洩公司性質最接近的同產業公司,並以差異中之差異估計法建立迴歸模型,迴歸所得結果顯示,首次揭露資料外洩事件公司的流動性水平有顯著下降的現象。另外,本研究亦發現,首次揭露資料外洩後公司的營運表現下降,且媒體的語調也變得更加負面,這些可能是導致流動性水平下降的原因。最後,本研究亦透過語調分析發現,管理階層於資料外洩事件揭露前,在10-K文件有關資訊風險之段落中,更加正向語調,將可減少資料外洩事件對流動性水平造成的影響。zh_TW
dc.description.abstractTo empirically examine the potential negative impact of the initial disclosure of a data breach on companies’ liquidity levels, this study employs the propensity score matching technique to identify industry-matched firms that closely resemble the breached companies in terms of their characteristics. Subsequently, this study utilizes the difference-in-differences method to establish a regression model. The findings reveal a significant decrease in liquidity levels for companies experiencing the initial disclosure of a data breach. Moreover, this study uncovers that the operational performance of companies tends to deteriorate following the data breach disclosure, accompanied by a shift towards more negative media sentiment. These factors likely contribute to the observed decline in liquidity levels. Additionally, a tone analysis conducted in this study suggests that the positive tone in management’s cybersecurity-related disclosures in the 10-K filings before the disclosure of a data breach can mitigate the impact on liquidity levels after the occurrence of a data breach event.en
dc.description.provenanceSubmitted by admin ntu (admin@lib.ntu.edu.tw) on 2023-08-08T16:14:22Z
No. of bitstreams: 0
en
dc.description.provenanceMade available in DSpace on 2023-08-08T16:14:22Z (GMT). No. of bitstreams: 0en
dc.description.tableofcontents致謝 i
摘要 ii
ABSTRACT iii
目 錄 iv
表目錄 vi
第一章 緒論 1
第二章 文獻回顧與假說發展 4
第一節 文獻回顧 4
第二節 假說發展 11
第三章 研究方法 12
第一節 資料來源與樣本選取 12
第二節 實證模型與變數定義 15
第四章 實證結果 22
第一節 敘述性統計 22
第二節 單變量分析 23
第三節 主要測試結果 26
第四節 穩健性測試 29
第五節 額外測試 32
第五章 結論與建議 39
第一節 研究結論 39
第二節 研究貢獻 41
第三節 研究限制與建議 42
附錄 43
第一節 短期模型變數定義與計算 43
第二節 與網路安全相關段落篩選標準 45
參考文獻 53
-
dc.language.isozh_TW-
dc.subject管理階層語調zh_TW
dc.subject資料外洩zh_TW
dc.subject流動性水平zh_TW
dc.subject營運表現zh_TW
dc.subject媒體語調zh_TW
dc.subject與網路安全有關之揭露zh_TW
dc.subjectLiquidity levelsen
dc.subjectDisclosure related to cybersecurityen
dc.subjectMedia sentimenten
dc.subjectOperational performanceen
dc.subjectData breachen
dc.subjectManagement toneen
dc.title首次揭露資料外洩事件對企業流動性水平之影響zh_TW
dc.titleThe Impact of Initial Disclosure of Data Breach Event on Liquidity Levelsen
dc.typeThesis-
dc.date.schoolyear111-2-
dc.description.degree碩士-
dc.contributor.oralexamcommittee廖芝嫻;顏如君zh_TW
dc.contributor.oralexamcommitteeChih-Hsien Liao;Ju-Chun Yenen
dc.subject.keyword資料外洩,流動性水平,營運表現,媒體語調,與網路安全有關之揭露,管理階層語調,zh_TW
dc.subject.keywordData breach,Liquidity levels,Operational performance,Media sentiment,Disclosure related to cybersecurity,Management tone,en
dc.relation.page63-
dc.identifier.doi10.6342/NTU202301407-
dc.rights.note同意授權(限校園內公開)-
dc.date.accepted2023-07-12-
dc.contributor.author-college管理學院-
dc.contributor.author-dept會計學系-
顯示於系所單位:會計學系

文件中的檔案:
檔案 大小格式 
ntu-111-2.pdf
授權僅限NTU校內IP使用(校園外請利用VPN校外連線服務)
1.07 MBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved