{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:50:08Z","timestamp":1761897008520,"version":"build-2065373602"},"reference-count":39,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T00:00:00Z","timestamp":1556323200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["BDCC"],"abstract":"<jats:p>As information technologies and the Internet have rapidly evolved, businesses have begun to use them to improve communication efficiency within and outside the organization. However, applications of information technologies are accompanied by information delivery, personal data protection, and information security problems. There are potential risks inherent in any application of information technologies. Moreover, with the improvement of networking and computing capabilities, the impact of attacks from hackers and malicious software has also increased. A breach or leakage of important corporate data may not only damage the firm\u2019s image but also sabotage the firm\u2019s operation, resulting in financial losses. In this study, the content of information security news reports was analyzed in an attempt to clarify the association between information security news and corporate stock prices. Methods including decision trees, support vector machines (SVMs), and random forests were used to explore the associations of news related variables with abnormal returns. Results indicate that the news source and the presence of negative words in the news have an impact on abnormal returns.<\/jats:p>","DOI":"10.3390\/bdcc3020024","type":"journal-article","created":{"date-parts":[[2019,4,29]],"date-time":"2019-04-29T02:57:32Z","timestamp":1556506652000},"page":"24","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Analysis of Information Security News Content and Abnormal Returns of Enterprises"],"prefix":"10.3390","volume":"3","author":[{"given":"Chia-Ching","family":"Hung","sequence":"first","affiliation":[{"name":"Department of Information Management, National Chung Cheng University, Chiayi County 62102, Taiwan"}]}],"member":"1968","published-online":{"date-parts":[[2019,4,27]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/S1047-8310(96)90007-3","article-title":"The management and control of information in high-technology firms","volume":"7","author":"Mohr","year":"1996","journal-title":"J. High Technol. Manag. Res."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1089","DOI":"10.1111\/j.1467-6486.2009.00836.x","article-title":"Institutional Reforms and Investor Reactions to CSR Announcements: Evidence from an Emerging Economy","volume":"46","author":"Arya","year":"2009","journal-title":"J. Manag. Stud."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"563","DOI":"10.1002\/smj.404","article-title":"Do early birds get the returns? An empirical investigation of early-mover advantages in acquisitions","volume":"25","author":"Carow","year":"2004","journal-title":"Strateg. Manag. J."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1509\/jmkg.73.6.214","article-title":"Does a Firm\u2019s Product-Recall Strategy Affect Its Financial Value? An Examination of Strategic Alternatives during Product-Harm Crises","volume":"73","author":"Chen","year":"2009","journal-title":"J. Mark."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/j.accinf.2011.01.002","article-title":"Event study methodologies in information systems research","volume":"12","author":"Konchitchki","year":"2011","journal-title":"Int. J. Account. Inf. Syst."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1080\/10919392.2013.807712","article-title":"The Textual Contents of Media Reports of Information Security Breaches and Profitable Short-Term Investment Opportunities","volume":"23","author":"Wang","year":"2013","journal-title":"J. Organ. Comput. Electron. Commer."},{"key":"ref_7","unstructured":"Huang, C.K., Wang, T.T., and Tsai, Y.T. (July, January 27). Market reactions to big data implementation announcements. Proceedings of the Pacific Asia Conference on Information Systems, Chiayi, Taiwan."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1287\/isre.4.1.1","article-title":"The Impact of Information Technology Investment Announcements on the Market Value of the Firm","volume":"4","author":"Peffers","year":"1993","journal-title":"Inf. Syst. Res."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1016\/j.im.2014.05.006","article-title":"Market perception on cloud computing initiatives in organizations: An extended resource-based view","volume":"51","author":"Son","year":"2014","journal-title":"Inf. Manag."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/j.im.2013.01.002","article-title":"The impact of Business Intelligence systems on stock return volatility","volume":"50","author":"Rubin","year":"2013","journal-title":"Inf. Manag."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/j.najef.2017.07.010","article-title":"Abnormal research and development investments and stock returns","volume":"42","author":"Songur","year":"2017","journal-title":"North Am. J. Econ. Finance"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/j.ribaf.2017.05.009","article-title":"Assessing abnormal returns: The case of Chinese M & A acquiring firms","volume":"42","author":"Song","year":"2017","journal-title":"Res. Int. Bus. Finance"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.jom.2014.10.003","article-title":"Shareholder value implications of service failures in triads: The case of customer information security breaches","volume":"35","author":"Modi","year":"2015","journal-title":"J. Oper. Manag."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jocs.2017.04.002","article-title":"Twitter mood, CEO succession announcements and stock returns","volume":"21","author":"Leitch","year":"2017","journal-title":"J. Comput. Sci."},{"key":"ref_15","first-page":"19","article-title":"Six Design Theories for IS Security Policies and Guidelines","volume":"7","author":"Siponen","year":"2006","journal-title":"J. AIS"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1287\/isre.1.3.255","article-title":"Effective IS security: An. empirical study","volume":"1","year":"1990","journal-title":"Inf. Syst. Res."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1287\/isre.1050.0053","article-title":"The Economic Incentives for Sharing Security Information","volume":"16","author":"Ghose","year":"2005","journal-title":"Inf. Syst. Res."},{"key":"ref_18","unstructured":"Wright, R.N. (2003). How Much Security Is Enough to Stop a Thief?. Financial Cryptography, Proceeding of the 7th International Conference, Guadeloupe, French, 27\u201330 January 2003, Springer."},{"key":"ref_19","first-page":"219","article-title":"The Association between Top Management Involvement and Compensation and Information Security Breaches","volume":"27","author":"Kwon","year":"2013","journal-title":"J. Inf. Syst."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"567","DOI":"10.2307\/25750692","article-title":"Market value of voluntary disclosures concerning information security","volume":"34","author":"Gordon","year":"2010","journal-title":"MIS Q."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"7041","DOI":"10.1016\/j.eswa.2010.12.011","article-title":"Re-examining information systems user performance: Using data mining to identify properties of IS that lead to highest levels of user performance","volume":"38","author":"Kositanurit","year":"2011","journal-title":"Expert Syst. Appl."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Feldman, R., and Sanger, J. (2006). The Text Mining Handbook: Advanced Approaches in Analyzing Unstructured Data, Cambridge University Press.","DOI":"10.1017\/CBO9780511546914"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1145\/545151.545179","article-title":"Emerging scientific applications in data mining","volume":"45","author":"Han","year":"2002","journal-title":"Commun. ACM"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1146","DOI":"10.1287\/mnsc.1100.1174","article-title":"Detecting Management Fraud in Public Companies","volume":"56","author":"Cecchini","year":"2010","journal-title":"Manag. Sci."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1007\/BF00994018","article-title":"Support-vector networks","volume":"20","author":"Cortes","year":"1995","journal-title":"Mach. Learn."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.eswa.2015.11.027","article-title":"Business health characterization: A hybrid regression and support vector machine analysis","volume":"49","author":"Pal","year":"2016","journal-title":"Expert Syst. Appl."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/j.amc.2014.02.028","article-title":"Combining market and accounting-based models for credit scoring using a classification scheme based on support vector machines","volume":"234","author":"Niklis","year":"2014","journal-title":"Appl. Math. Comput."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1016\/j.eswa.2016.09.041","article-title":"Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system","volume":"67","author":"Othman","year":"2017","journal-title":"Expert Syst. Appl."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/j.procs.2018.01.108","article-title":"Support Vector Machines for a new Hybrid Information Retrieval System","volume":"127","author":"Khalifi","year":"2018","journal-title":"Procedia Comput. Sci."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1016\/j.ijmedinf.2006.11.006","article-title":"Predictive data mining in clinical medicine: Current issues and guidelines","volume":"77","author":"Bellazzi","year":"2008","journal-title":"Int. J. Med. Inf."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","article-title":"Random Forests","volume":"45","author":"Breiman","year":"2001","journal-title":"Mach. Learn."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"5445","DOI":"10.1016\/j.eswa.2008.06.121","article-title":"Customer churn prediction using improved balanced random forests","volume":"36","author":"Xie","year":"2009","journal-title":"Expert Syst. Appl."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1007\/s10618-008-0116-z","article-title":"Transaction aggregation as a strategy for credit card fraud detection","volume":"18","author":"Whitrow","year":"2009","journal-title":"Data Min. Knowl. Discov."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Kouzani, A.Z. (2006, January 14\u201317). Faceparts for Recognition. Proceedings of the TENCON 2006\u20142006 IEEE Region 10 Conference, Hong Kong, China.","DOI":"10.1109\/TENCON.2006.343761"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Gupta, R., Pierdzioch, C., Vivian, A.J., and Wohar, M.E. (2018). The predictive value of inequality measures for stock returns: An analysis of long-span UK data using quantile random forests. Financ. Res. Lett.","DOI":"10.1016\/j.frl.2018.08.013"},{"key":"ref_36","first-page":"283","article-title":"Research on Abnormal Return of Enterprise Stock Price for the Information Security News","volume":"25","author":"Hung","year":"2018","journal-title":"J. Inf. Manag."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"431","DOI":"10.3233\/JCS-2003-11308","article-title":"The economic cost of publicly announced information security breaches: Empirical evidence from the stock market","volume":"11","author":"Campbell","year":"2003","journal-title":"J. Comput. Secur."},{"key":"ref_38","first-page":"425","article-title":"Capital Asset Prices: A Theory of Market Equilibrium under Conditions of Risk","volume":"19","author":"Sharpe","year":"1964","journal-title":"J. Finance"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"626","DOI":"10.2307\/257056","article-title":"Event Studies in Management Research: Theoretical and Empirical Issues","volume":"40","author":"McWilliams","year":"1997","journal-title":"Acad. Manag. J."}],"container-title":["Big Data and Cognitive Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2504-2289\/3\/2\/24\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:47:33Z","timestamp":1760186853000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2504-2289\/3\/2\/24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,27]]},"references-count":39,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2019,6]]}},"alternative-id":["bdcc3020024"],"URL":"https:\/\/doi.org\/10.3390\/bdcc3020024","relation":{},"ISSN":["2504-2289"],"issn-type":[{"type":"electronic","value":"2504-2289"}],"subject":[],"published":{"date-parts":[[2019,4,27]]}}}