{"title":"互联网企业间的信息传递:黑客攻击的案例","authors":"Michael L. Ettredge, V. Richardson","doi":"10.2139/ssrn.334460","DOIUrl":null,"url":null,"abstract":"This study focuses on the stock market reaction to denial of service attacks against certain well‐known Internet firms in February 2000. Investors appear to have used several heuristics in deciding which firms were “similar” to those attacked, and thus predicted that they were also likely to be attacked. The primary heuristic employed appears to have been similarity in reliance on the Internet to conduct operating activities (i.e., the set of Internet firms). We find negative mean abnormal returns among Internet firms not actually attacked (i.e., information transfer). This occurred both within Internet industries in which some firms were attacked, and within Internet industries with no attacks. A secondary heuristic appears to have been that Internet firms similar in size to those attacked (i.e., relatively large) were more likely to be attacked. In contrast to all other Internet industries, providers of Internet security products and services experienced positive mean abnormal returns.","PeriodicalId":285194,"journal":{"name":"IRPN: Innovation & Information Management (Topic)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2002-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"131","resultStr":"{\"title\":\"Information Transfer Among Internet Firms: The Case of Hacker Attacks\",\"authors\":\"Michael L. Ettredge, V. Richardson\",\"doi\":\"10.2139/ssrn.334460\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This study focuses on the stock market reaction to denial of service attacks against certain well‐known Internet firms in February 2000. Investors appear to have used several heuristics in deciding which firms were “similar” to those attacked, and thus predicted that they were also likely to be attacked. The primary heuristic employed appears to have been similarity in reliance on the Internet to conduct operating activities (i.e., the set of Internet firms). We find negative mean abnormal returns among Internet firms not actually attacked (i.e., information transfer). This occurred both within Internet industries in which some firms were attacked, and within Internet industries with no attacks. A secondary heuristic appears to have been that Internet firms similar in size to those attacked (i.e., relatively large) were more likely to be attacked. In contrast to all other Internet industries, providers of Internet security products and services experienced positive mean abnormal returns.\",\"PeriodicalId\":285194,\"journal\":{\"name\":\"IRPN: Innovation & Information Management (Topic)\",\"volume\":\"162 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2002-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"131\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IRPN: Innovation & Information Management (Topic)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.2139/ssrn.334460\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IRPN: Innovation & Information Management (Topic)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2139/ssrn.334460","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Information Transfer Among Internet Firms: The Case of Hacker Attacks
This study focuses on the stock market reaction to denial of service attacks against certain well‐known Internet firms in February 2000. Investors appear to have used several heuristics in deciding which firms were “similar” to those attacked, and thus predicted that they were also likely to be attacked. The primary heuristic employed appears to have been similarity in reliance on the Internet to conduct operating activities (i.e., the set of Internet firms). We find negative mean abnormal returns among Internet firms not actually attacked (i.e., information transfer). This occurred both within Internet industries in which some firms were attacked, and within Internet industries with no attacks. A secondary heuristic appears to have been that Internet firms similar in size to those attacked (i.e., relatively large) were more likely to be attacked. In contrast to all other Internet industries, providers of Internet security products and services experienced positive mean abnormal returns.