C4.5: programs for machine learning
C4.5: programs for machine learning
Fundamentals of computer security technology
Fundamentals of computer security technology
The experimental analysis of information security management issues for online financial services
ICIS '00 Proceedings of the twenty first international conference on Information systems
The economics of information security investment
ACM Transactions on Information and System Security (TISSEC)
Information Systems Research
Journal of Computer Security - IFIP 2000
How to Systematically Classify Computer Security Intrusions
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
International Journal of Electronic Commerce
Review: Expert systems and evolutionary computing for financial investing: A review
Expert Systems with Applications: An International Journal
Vote prediction by iterative domain knowledge and attribute elimination
International Journal of Business Intelligence and Data Mining
Information Technology and Management
Assessing the severity of phishing attacks: A hybrid data mining approach
Decision Support Systems
The impact of information security breaches: Has there been a downward shift in costs?
Journal of Computer Security
Explaining investors' reaction to internet security breach using deterrence theory
International Journal of Electronic Finance
Information Resources Management Journal
Information Resources Management Journal
Hi-index | 12.05 |
The impact of Internet security breaches on firms has been a concern to both researchers and practitioners. One measure of the damage to the breached firm is the observed cumulative abnormal stock market return (CAR) when there is announcement of the attack in the public media. To develop effective Internet security investment strategies for preventing such damage, firms need to understand the factors that lead to the occurrence of CAR. While previous research have involved the use of regression analysis to explore the relationship between firm and attack characteristics and the occurrence of CAR, in this paper we use decision tree (DT) induction to explore this relationship. The results of our DT-based analysis indicate that both attack and firm characteristics determine CAR. While each of our results is consistent with that of at least one previous study, no previous single study has provided evidence that both firm and attack characteristics are determinants of CAR. Further, the DT-based analysis provides an interpretable model in the form of understandable and actionable rules that may be used by decision makers. The DT-based approach thus provides additional insights beyond what may be provided by the regression approach that has been employed in previous research. The paper makes methodological, theoretical and practical contribution to understanding the predictors of damage when a firm is breached.