ABSTRACT
Once organizations have the security incident and breaches, they have to pay tremendous costs. Although visible cost, such as the incident response cost, customer follow-up care, and legal cost are predictable and calculable, it is tough to evaluate and estimate the invisible damage, such as losing customer loyalty, reputation impact, and the damage of branding. This paper proposes a new method, called "Event Study Methodology with Twitter Sentimental Analysis" to evaluate the invisible cost. This method helps to assess the impact of the security breach and the impact on corporate valuation.
- USA TODAY, "Massive breach at health care company Anthem Inc.." http://www.usatoday.com/story/tech/2015/02/04/health-care-anthem-hacked/22900925/, February 2015.Google Scholar
- USA TODAY, "Premera says data breach affects up to 11M people." http://www.usatoday.com/story/tech/2015/03/17/premera-says-cyber-attack-affects-customers/24917883/, March 2015.Google Scholar
- USA TODAY, "1.1 million CareFirst members in D.C.-area potentially breached." http://www.usatoday.com/story/tech/2015/05/20/1-million-carefirst-blueshield-cyberattack-fireeye-mandiant/27587659/, May 2015.Google Scholar
- USA TODAY, "Cyber breach hits 10 million Excellus healthcare customers." http://www.usatoday.com/story/tech/2015/09/10/cyber-breach-hackers-excellus-blue-cross-blue-shield/72018150/, September 2015.Google Scholar
- Forbes, "Sony Pictures Hacked And Blackmailed." http://www.forbes.com/sites/davelewis/2014/11/24/sony-pictures-hacked-and-blackmailed/, November 2014.Google Scholar
- The Wall Street Journal, "OPM Breach Was Enormous, FBI Director Says." http://www.wsj.com/articles/breach-was-enormous-fbi-director-says-1436395157, July 2015.Google Scholar
- The Wall Street Journal, "Breach at IRS Exposes Tax Returns." http://www.wsj.com/articles/criminals-steal-taxpayer-data-via-irs-web-service-1432672691, May 2015.Google Scholar
- The Japan Times, "Japan Pension Service hack used classic attack method." http://www.japantimes.co.jp/news/2015/06/02/national/social-issues/japan-pension-service-hack-used-classic-attack-method/, May 2015.Google Scholar
- A. Yoran, "Escaping Securitys Dark Ages, RSA Conference 2015." http://www.rsaconference.com/media/escaping-securitys-dark-ages, April 2015.Google Scholar
- K. C. Park and D.-H. Shin, "Security assessment framework for iot service," Telecommunication Systems, pp. pp. 1 -- 17, May 2016. Google ScholarDigital Library
- D.-H. Shin, "The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption," Interacting with Computers, vol. 22, pp. pp. 428 -- 438, September 2010. Google ScholarDigital Library
- D.-H. Shin and Y.-J. Shin, "Why do people play social network games?," Computers in Human Behavior, vol. 27, pp. pp. 852 -- 861, March 2011. Google ScholarDigital Library
- Information-technology Promotion Agency, "The Research Report about Information Security Incident." https://www.ipa.go.jp/files/000045629.pdf, June 2002.Google Scholar
- Information-technology Promotion Agency, "The report of "Damanage Estimation Model"." http://www.ipa.go.jp/security/fy14/reports/current/2002-calc-model.pdf, March 2003.Google Scholar
- Japan Network Security Association, "The Research Report of Information Security Incident Part 1." http://www.jnsa.org/houkoku2003/incident_survey1.pdf, March 2004.Google Scholar
- Japan Network Security Association, "The Research Report of Information Security Incident Part 2." http://www.jnsa.org/houkoku2003/incident_survey2.pdf, March 2004.Google Scholar
- Information-technology Promotion Agency, "The comittiee report of Information Security Damanage and Countermeasures." http://www.ipa.go.jp/files/000027865.pdf, March 2013.Google Scholar
- European Network and Information Security Agency, "Introduction to Return on Security Investment." https://www.enisa.europa.eu/activities/cert/other-work/introduction-to-return-on-security-investment/at_download/fullReport, December 2012.Google Scholar
- The Economist IntelligenceUnit Ltd, "CyberTab." https://cybertab.boozallen.com/.Google Scholar
- Korea Advanced Institute of Science and Technology, "Economic Damage Assessment of the March 20 Cyber Attack and its Counter Measures," May 2013.Google Scholar
- J. Yoo, S. Gee, H. Song, K. Chung, and J. Lim, "Estimating Economic Damages from Internet Incidents," Informatization policy, 2008.Google Scholar
- C. H. Han, S. W. Chai, B. J. Yoo, D. H. Ahn, and C. H. Park, "A Quantitative Assessment Model of Private Information Breach," Journal of Society for e-Business Studies, 2011.Google ScholarCross Ref
- L. A. Gordon, M. P. Loeb, and T. Sohail, "Market value of voluntary disclosures concerning information security," Mis Quarterly, vol. 34, no. 3, pp. pp. 567 -- 594, 2010. Google ScholarCross Ref
- A. A. Yayla and Q. Hu, "The impact of information security events on the stock value of firms: the effect of contingency factors," Journal of Information Technology, vol. 26, no. 1, pp. 60--77, 2011.Google ScholarCross Ref
- R. Kawasaki and T. Hiromatsu, "Proposal of a model supporting decision-making on information security risk treatment," International Journal of Computer, Electrical, Automation, Control and Information Engineering, vol. 8, no. 4, pp. 583--589, 2014.Google Scholar
- R. Kawasaki and T. Hiromatsu, "Proposal of a model supporting decision-making based on multi-objective optimization analysis on information security risk treatment," International Journal of Computer, Electrical, Automation, Control and Information Engineering, vol. 8, no. 5, pp. 827--833, 2014.Google Scholar
- A. Agarwal, B. Xie, I. Vovsha, O. Rambow, and R. Passonneau, "Sentiment analysis of twitter data," Proceedings of the Workshop on Languages in Social Media, pp. 30--38, 2011. Google ScholarDigital Library
- P. Fornacciari, M. Mordonini, and M. Tomaiuolo, "A case-study for sentiment analysis on twitter," 16th Workshop From Objects to Agents, pp. 53--58, 2015.Google Scholar
- E. Kouloumpis, T. Wilson, and J. Moore, "Twitter sentiment analysis:the good the bad and the omg!," Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, pp. 538--541, 2011.Google Scholar
- J. Bollen, H. Mao, and X. J. Zeng, "Twitter mood predicts the stock market," Journal of Computational Science, vol. 2, pp. 1--8, 2011.Google ScholarCross Ref
- G. Ranco, D. Aleksovski, G. Caldarelli, M. Grcar, and I. Mozetic, "The effects of twitter sentiment on stock price returns," PLoS ONE 10, 2015.Google Scholar
- Japan Securities Dealers Association, "National Survey about Stock Investment." http://www.jsda.or.jp/shiryo/chousa/data/research_h27.html, 2015.Google Scholar
- Fortune, "Twitter Is Bigger Than Facebook in This Country." http://fortune.com/2016/02/19/twitter-facebook-japan/, February 2016.Google Scholar
- Google Inc, "Build web apps and automate tasks with Google Apps Script'." https://www.google.com/script/start/.Google Scholar
- Twitter Inc, "API Overview." https://dev.twitter.com/overview/api.Google Scholar
- T. Kudo, "MeCab: Yet Another Part-of-Speech and Morphological Analyzer." http://taku910.github.io/mecab/.Google Scholar
- H. Takamura, "Semantic Orientations of Words." http://www.lr.pi.titech.ac.jp/takamura/pndic_en.html.Google Scholar
- NIKKEI Asian Review, "System trouble grounds JAL's domestic flights, affects travelers." http://asia.nikkei.com/Business/Companies/System-trouble-grounds-JAL-s-domestic-flights-affects-travelers.Google Scholar
- Yahoo! Japan, "Yahoo! Finance." http://finance.yahoo.co.jp/.Google Scholar
Index Terms
- A proposal of event study methodology with Twitter sentimental analysis for risk management
Recommendations
Principles and procedures of the LRAM approach to information systems risk analysis and management
Risk assessment methods vary in nature and depth. Their application to the evaluation of information security issues should be decided on the basis of their capability to provide answers to the fundamental questions concerning the design and ...
Usage and analysis of Twitter during 2015 Chennai flood towards disaster management
Social media plays a major role in the propagation of information during disasters. This paper mainly contains a study regarding how people of Chennai used social media especially twitter, in response to the countrys worst flood that had occurred ...
Comments