Market Reaction to Cyber Strategy Disclosure: Word Embedding Derived Approach
dc.contributor.author | Cao, Rui | |
dc.contributor.author | Kafaee, Özüm | |
dc.contributor.author | Aziz, Arslan | |
dc.contributor.author | Cavusoglu, Hasan | |
dc.date.accessioned | 2022-12-27T19:20:47Z | |
dc.date.available | 2022-12-27T19:20:47Z | |
dc.date.issued | 2023-01-03 | |
dc.description.abstract | In this study, we use a semi-supervised natural language processing (NLP) methodology to assess cybersecurity strategy of firms based on their 10-K filings. Adapted from the Cybersecurity Framework developed by the National Institute of Standards and Technology (NIST), five distinct cybersecurity strategies, namely identification, protection, detection, response, and recovery, are measured annually. We find evidence that cybersecurity identification strategy is positively and significantly associated with firm market value. For those firms experienced a cyberattack in the past, disclosing cybersecurity protection strategy is not positively assessed by the market. This paper makes contribution to the literature on cybersecurity by identifying the cyber strategies disclosed in 10-K reports using textual analysis, which can be used in future cyber studies. We further show empirical evidence of how market reacts to different strategies, which have valuable implications for industry as to how to better manage cyber risk. | |
dc.format.extent | 10 | |
dc.identifier.doi | 10.24251/HICSS.2023.737 | |
dc.identifier.isbn | 978-0-9981331-6-4 | |
dc.identifier.other | 59d06456-f5ae-4618-889d-71f23f005571 | |
dc.identifier.uri | https://hdl.handle.net/10125/103371 | |
dc.language.iso | eng | |
dc.relation.ispartof | Proceedings of the 56th Hawaii International Conference on System Sciences | |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 International | |
dc.rights.uri | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.subject | Organizational Cybersecurity: Advanced Cyber Defense, Cyber Analytics, and Security Operations | |
dc.subject | cyberattacks | |
dc.subject | cybersecurity strategy | |
dc.subject | disclosure | |
dc.title | Market Reaction to Cyber Strategy Disclosure: Word Embedding Derived Approach | |
dc.type.dcmi | text | |
prism.startingpage | 6078 |
Files
Original bundle
1 - 1 of 1