skip to main content
10.1145/3022227.3022240acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

A proposal of event study methodology with Twitter sentimental analysis for risk management

Published:05 January 2017Publication History

ABSTRACT

Once organizations have the security incident and breaches, they have to pay tremendous costs. Although visible cost, such as the incident response cost, customer follow-up care, and legal cost are predictable and calculable, it is tough to evaluate and estimate the invisible damage, such as losing customer loyalty, reputation impact, and the damage of branding. This paper proposes a new method, called "Event Study Methodology with Twitter Sentimental Analysis" to evaluate the invisible cost. This method helps to assess the impact of the security breach and the impact on corporate valuation.

References

  1. USA TODAY, "Massive breach at health care company Anthem Inc.." http://www.usatoday.com/story/tech/2015/02/04/health-care-anthem-hacked/22900925/, February 2015.Google ScholarGoogle Scholar
  2. USA TODAY, "Premera says data breach affects up to 11M people." http://www.usatoday.com/story/tech/2015/03/17/premera-says-cyber-attack-affects-customers/24917883/, March 2015.Google ScholarGoogle Scholar
  3. USA TODAY, "1.1 million CareFirst members in D.C.-area potentially breached." http://www.usatoday.com/story/tech/2015/05/20/1-million-carefirst-blueshield-cyberattack-fireeye-mandiant/27587659/, May 2015.Google ScholarGoogle Scholar
  4. USA TODAY, "Cyber breach hits 10 million Excellus healthcare customers." http://www.usatoday.com/story/tech/2015/09/10/cyber-breach-hackers-excellus-blue-cross-blue-shield/72018150/, September 2015.Google ScholarGoogle Scholar
  5. Forbes, "Sony Pictures Hacked And Blackmailed." http://www.forbes.com/sites/davelewis/2014/11/24/sony-pictures-hacked-and-blackmailed/, November 2014.Google ScholarGoogle Scholar
  6. The Wall Street Journal, "OPM Breach Was Enormous, FBI Director Says." http://www.wsj.com/articles/breach-was-enormous-fbi-director-says-1436395157, July 2015.Google ScholarGoogle Scholar
  7. The Wall Street Journal, "Breach at IRS Exposes Tax Returns." http://www.wsj.com/articles/criminals-steal-taxpayer-data-via-irs-web-service-1432672691, May 2015.Google ScholarGoogle Scholar
  8. The Japan Times, "Japan Pension Service hack used classic attack method." http://www.japantimes.co.jp/news/2015/06/02/national/social-issues/japan-pension-service-hack-used-classic-attack-method/, May 2015.Google ScholarGoogle Scholar
  9. A. Yoran, "Escaping Securitys Dark Ages, RSA Conference 2015." http://www.rsaconference.com/media/escaping-securitys-dark-ages, April 2015.Google ScholarGoogle Scholar
  10. K. C. Park and D.-H. Shin, "Security assessment framework for iot service," Telecommunication Systems, pp. pp. 1 -- 17, May 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D.-H. Shin, "The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption," Interacting with Computers, vol. 22, pp. pp. 428 -- 438, September 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. D.-H. Shin and Y.-J. Shin, "Why do people play social network games?," Computers in Human Behavior, vol. 27, pp. pp. 852 -- 861, March 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Information-technology Promotion Agency, "The Research Report about Information Security Incident." https://www.ipa.go.jp/files/000045629.pdf, June 2002.Google ScholarGoogle Scholar
  14. Information-technology Promotion Agency, "The report of "Damanage Estimation Model"." http://www.ipa.go.jp/security/fy14/reports/current/2002-calc-model.pdf, March 2003.Google ScholarGoogle Scholar
  15. Japan Network Security Association, "The Research Report of Information Security Incident Part 1." http://www.jnsa.org/houkoku2003/incident_survey1.pdf, March 2004.Google ScholarGoogle Scholar
  16. Japan Network Security Association, "The Research Report of Information Security Incident Part 2." http://www.jnsa.org/houkoku2003/incident_survey2.pdf, March 2004.Google ScholarGoogle Scholar
  17. Information-technology Promotion Agency, "The comittiee report of Information Security Damanage and Countermeasures." http://www.ipa.go.jp/files/000027865.pdf, March 2013.Google ScholarGoogle Scholar
  18. European Network and Information Security Agency, "Introduction to Return on Security Investment." https://www.enisa.europa.eu/activities/cert/other-work/introduction-to-return-on-security-investment/at_download/fullReport, December 2012.Google ScholarGoogle Scholar
  19. The Economist IntelligenceUnit Ltd, "CyberTab." https://cybertab.boozallen.com/.Google ScholarGoogle Scholar
  20. Korea Advanced Institute of Science and Technology, "Economic Damage Assessment of the March 20 Cyber Attack and its Counter Measures," May 2013.Google ScholarGoogle Scholar
  21. J. Yoo, S. Gee, H. Song, K. Chung, and J. Lim, "Estimating Economic Damages from Internet Incidents," Informatization policy, 2008.Google ScholarGoogle Scholar
  22. C. H. Han, S. W. Chai, B. J. Yoo, D. H. Ahn, and C. H. Park, "A Quantitative Assessment Model of Private Information Breach," Journal of Society for e-Business Studies, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  23. L. A. Gordon, M. P. Loeb, and T. Sohail, "Market value of voluntary disclosures concerning information security," Mis Quarterly, vol. 34, no. 3, pp. pp. 567 -- 594, 2010. Google ScholarGoogle ScholarCross RefCross Ref
  24. A. A. Yayla and Q. Hu, "The impact of information security events on the stock value of firms: the effect of contingency factors," Journal of Information Technology, vol. 26, no. 1, pp. 60--77, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  25. R. Kawasaki and T. Hiromatsu, "Proposal of a model supporting decision-making on information security risk treatment," International Journal of Computer, Electrical, Automation, Control and Information Engineering, vol. 8, no. 4, pp. 583--589, 2014.Google ScholarGoogle Scholar
  26. R. Kawasaki and T. Hiromatsu, "Proposal of a model supporting decision-making based on multi-objective optimization analysis on information security risk treatment," International Journal of Computer, Electrical, Automation, Control and Information Engineering, vol. 8, no. 5, pp. 827--833, 2014.Google ScholarGoogle Scholar
  27. A. Agarwal, B. Xie, I. Vovsha, O. Rambow, and R. Passonneau, "Sentiment analysis of twitter data," Proceedings of the Workshop on Languages in Social Media, pp. 30--38, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. P. Fornacciari, M. Mordonini, and M. Tomaiuolo, "A case-study for sentiment analysis on twitter," 16th Workshop From Objects to Agents, pp. 53--58, 2015.Google ScholarGoogle Scholar
  29. E. Kouloumpis, T. Wilson, and J. Moore, "Twitter sentiment analysis:the good the bad and the omg!," Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, pp. 538--541, 2011.Google ScholarGoogle Scholar
  30. J. Bollen, H. Mao, and X. J. Zeng, "Twitter mood predicts the stock market," Journal of Computational Science, vol. 2, pp. 1--8, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  31. G. Ranco, D. Aleksovski, G. Caldarelli, M. Grcar, and I. Mozetic, "The effects of twitter sentiment on stock price returns," PLoS ONE 10, 2015.Google ScholarGoogle Scholar
  32. Japan Securities Dealers Association, "National Survey about Stock Investment." http://www.jsda.or.jp/shiryo/chousa/data/research_h27.html, 2015.Google ScholarGoogle Scholar
  33. Fortune, "Twitter Is Bigger Than Facebook in This Country." http://fortune.com/2016/02/19/twitter-facebook-japan/, February 2016.Google ScholarGoogle Scholar
  34. Google Inc, "Build web apps and automate tasks with Google Apps Script'." https://www.google.com/script/start/.Google ScholarGoogle Scholar
  35. Twitter Inc, "API Overview." https://dev.twitter.com/overview/api.Google ScholarGoogle Scholar
  36. T. Kudo, "MeCab: Yet Another Part-of-Speech and Morphological Analyzer." http://taku910.github.io/mecab/.Google ScholarGoogle Scholar
  37. H. Takamura, "Semantic Orientations of Words." http://www.lr.pi.titech.ac.jp/takamura/pndic_en.html.Google ScholarGoogle Scholar
  38. NIKKEI Asian Review, "System trouble grounds JAL's domestic flights, affects travelers." http://asia.nikkei.com/Business/Companies/System-trouble-grounds-JAL-s-domestic-flights-affects-travelers.Google ScholarGoogle Scholar
  39. Yahoo! Japan, "Yahoo! Finance." http://finance.yahoo.co.jp/.Google ScholarGoogle Scholar

Index Terms

  1. A proposal of event study methodology with Twitter sentimental analysis for risk management

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      IMCOM '17: Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication
      January 2017
      746 pages
      ISBN:9781450348881
      DOI:10.1145/3022227

      Copyright © 2017 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 5 January 2017

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      IMCOM '17 Paper Acceptance Rate113of366submissions,31%Overall Acceptance Rate213of621submissions,34%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader