Did IT consulting firms gain when their clients were breached?

[1]  E. Fama,et al.  The Adjustment of Stock Prices to New Information , 1969 .

[2]  J. Tobin A General Equilibrium Approach to Monetary Theory , 1969 .

[3]  E. Fama EFFICIENT CAPITAL MARKETS: A REVIEW OF THEORY AND EMPIRICAL WORK* , 1970 .

[4]  Richard L. Nolan,et al.  Managing the computer resource , 1973, Commun. ACM.

[5]  H. Theil Introduction to econometrics , 1978 .

[6]  T. Copeland,et al.  Financial Theory and Corporate Policy. , 1980 .

[7]  Chris Olsen,et al.  Vertical Information Transfers: The Association between Retailers' Sales Announcements and Suppliers' Security Returns , 1985 .

[8]  Sam Peltzman,et al.  The Impact of Product Recalls on the Wealth of Sellers , 1985, Journal of Political Economy.

[9]  David R. Peterson,et al.  SECURITY PRICE REACTIONS AROUND PRODUCT RECALL ANNOUNCEMENTS , 1985 .

[10]  Ahmad Etebari,et al.  To Be Or Not to Be ‐ Reaction of Stock Returns to Sudden Deaths of Corporate Chief Executive Officers , 1987 .

[11]  George E. Hoffer,et al.  The Impact of Product Recalls on the Wealth of Sellers: A Reexamination , 1988, Journal of Political Economy.

[12]  E. Bruning,et al.  AIRLINE ACCIDENTS AND STOCK RETURN PERFORMANCE , 1989 .

[13]  Detmar W. Straub,et al.  Effective IS Security: An Empirical Study , 1990, Inf. Syst. Res..

[14]  R. B. Corbett,et al.  Catastrophic Events and Retroactive Liability Insurance: The Case of the MGM Grand Fire , 1991 .

[15]  George J. Siomkos Conceptual and Methodological Propositions for Assessing Responses to Industrial Crises , 1992 .

[16]  Roy D. Pea,et al.  The Collaboratory Notebook , 1996, CACM.

[17]  K. B. Hendricks,et al.  Quality awards and the market value of the firm: an empirical investigation , 1996 .

[18]  Dorothy E. Denning,et al.  A taxonomy for key escrow encryption systems , 1996, CACM.

[19]  A. Mackinlay,et al.  Event Studies in Economics and Finance , 1997 .

[20]  E. Fama,et al.  Value Versus Growth: The International Evidence , 1997 .

[21]  Kin Lam,et al.  An examination of the determinants of stock price effects of US–Chinese joint venture announcements , 1998 .

[22]  Eric Walden,et al.  The Impact of E-Commerce Announcements on the Market Value of Firms , 2001, Inf. Syst. Res..

[23]  Deborah A. Frincke,et al.  Balancing cooperation and risk in intrusion detection , 2000, TSEC.

[24]  Stefan Axelsson,et al.  The base-rate fallacy and the difficulty of intrusion detection , 2000, TSEC.

[25]  Vernon J. Richardson,et al.  Assessing the Risk in E-Commerce , 2001 .

[26]  Varun Grover,et al.  Research Report: A Reexamination of IT Investment and the Market Value of the Firm - An Event Study Methodology , 2001, Inf. Syst. Res..

[27]  Lawrence A. Gordon,et al.  The economics of information security investment , 2002, TSEC.

[28]  Sheng-Syan Chen,et al.  How Does Strategic Competition Affect Firm Values? A Study of New Product Announcements , 2002 .

[29]  Lei Zhou,et al.  The Economic Cost of Publicly Announced Information Security Breaches: Empirical Evidence from the Stock Market , 2003, J. Comput. Secur..

[30]  Richard L. Nolan,et al.  Information Technology Consulting , 2003 .

[31]  A. Hovav,et al.  The Impact of Denial‐of‐Service Attack Announcements on the Market Value of Firms , 2003 .

[32]  Huseyin Cavusoglu,et al.  The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers , 2004, Int. J. Electron. Commer..

[33]  Govind S. Iyer,et al.  Procurement of IT Consulting Services and Firm-Specific Characteristics , 2006, J. Assoc. Inf. Syst..

[34]  David M. Cannon,et al.  Danger–corporate data breach! , 2007 .

[35]  Jackie Rees Ulmer,et al.  Market Reactions to Information Security Breach Announcements: An Empirical Analysis , 2007, Int. J. Electron. Commer..

[36]  Linda G. Wallace,et al.  Is Information Security Under Control?: Investigating Quality in Information Security Management , 2007, IEEE Security & Privacy.

[37]  Kevin M. Gatzlaff,et al.  The Effect of Data Breaches on Shareholder Wealth , 2008 .

[38]  Gordon Smith Hackers don't take vacations , 2009 .

[39]  Mary J. Culnan,et al.  How Ethics Can Enhance Organizational Privacy: Lessons from the ChoicePoint and TJX Data Breaches , 2009, MIS Q..

[40]  Jan Muntermann,et al.  On the Effectiveness of Privacy Breach Disclosure Legislation in Europe: Empirical Evidence from the US Stock Market , 2009, NordSec.