{"title":"Understanding cybersecurity breach contagion effects: The role of the loss heuristic and internal controls","authors":"Andrea Seaton Kelton , Ya-Wen Yang","doi":"10.1016/j.accinf.2024.100714","DOIUrl":null,"url":null,"abstract":"<div><div>In this study, we seek to provide insights into the conflicting findings from prior research about whether the consequences of a cybersecurity breach spillover to non-breached bystander firms in the same industry − a phenomenon known as contagion effects. When considering the implications of a breach for a bystander firm, we suggest investors will rely on the loss heuristic and thus view loss (profit) bystander firms as more (less) likely to suffer a similar breach in the future. This will lead to greater cybersecurity breach contagion effects for loss firms than for profit firms. Furthermore, we propose that internal control quality will mitigate contagion effects and to a greater extent for loss firms than for profit firms. To test our hypotheses, we use a sample of cybersecurity breaches and identify a sample of non-breached bystander firms in the same subindustry as the breached firms. Our findings support our predictions and help explain the mixed findings from research on cybersecurity breach contagion effects. Results should also be informative to boards of directors and firm management considering ways to minimize costs associated with contagion effects.</div></div>","PeriodicalId":47170,"journal":{"name":"International Journal of Accounting Information Systems","volume":"55 ","pages":"Article 100714"},"PeriodicalIF":4.1000,"publicationDate":"2024-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Accounting Information Systems","FirstCategoryId":"91","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1467089524000472","RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"BUSINESS","Score":null,"Total":0}
引用次数: 0
Abstract
In this study, we seek to provide insights into the conflicting findings from prior research about whether the consequences of a cybersecurity breach spillover to non-breached bystander firms in the same industry − a phenomenon known as contagion effects. When considering the implications of a breach for a bystander firm, we suggest investors will rely on the loss heuristic and thus view loss (profit) bystander firms as more (less) likely to suffer a similar breach in the future. This will lead to greater cybersecurity breach contagion effects for loss firms than for profit firms. Furthermore, we propose that internal control quality will mitigate contagion effects and to a greater extent for loss firms than for profit firms. To test our hypotheses, we use a sample of cybersecurity breaches and identify a sample of non-breached bystander firms in the same subindustry as the breached firms. Our findings support our predictions and help explain the mixed findings from research on cybersecurity breach contagion effects. Results should also be informative to boards of directors and firm management considering ways to minimize costs associated with contagion effects.
期刊介绍:
The International Journal of Accounting Information Systems will publish thoughtful, well developed articles that examine the rapidly evolving relationship between accounting and information technology. Articles may range from empirical to analytical, from practice-based to the development of new techniques, but must be related to problems facing the integration of accounting and information technology. The journal will address (but will not limit itself to) the following specific issues: control and auditability of information systems; management of information technology; artificial intelligence research in accounting; development issues in accounting and information systems; human factors issues related to information technology; development of theories related to information technology; methodological issues in information technology research; information systems validation; human–computer interaction research in accounting information systems. The journal welcomes and encourages articles from both practitioners and academicians.