Predicting stock market returns from malicious attacks: A comparative analysis of vector autoregression and time-delayed neural networks

With the growing importance of Internet-based businesses, malicious code attacks on information technology infrastructures have been on the rise. Prior studies have indicated that these malicious attacks are associated with detrimental economic effects on the attacked firms. On the other hand, we conjecture that more intense malicious attacks boost the stock price of information security firms. Furthermore, we use artificial neural networks and vector autoregression analyses as complementary methods to study the relationship between the stock market returns of information security firms and the intensity of malicious attacks, computed as the product of the number of malicious attacks and their severity levels. A major contribution of this work is the resulting time-delayed artificial neural network model that allows stock return predictions and is particularly useful as an investment decision support system for hedge funds and other investors, whose portfolios are at risk of losing market value during malicious attacks.

[1]  Masafumi Hagiwara,et al.  Removal of hidden units and weights for back propagation networks , 1993, Proceedings of 1993 International Conference on Neural Networks (IJCNN-93-Nagoya, Japan).

[2]  Kristen Bell DeTienne,et al.  Neural Networks as Statistical Tools for Business Researchers , 2003 .

[3]  N. Groenewold,et al.  US share prices and real supply and demand shocks , 2006 .

[4]  Yong Liu,et al.  Does a Firm's Product-Recall Strategy Affect Its Financial Value? An Examination of Strategic Alternatives during Product-Harm Crises , 2009 .

[5]  James D. Hamilton Time Series Analysis , 1994 .

[6]  E. Fama EFFICIENT CAPITAL MARKETS: A REVIEW OF THEORY AND EMPIRICAL WORK* , 1970 .

[7]  S. Johansen STATISTICAL ANALYSIS OF COINTEGRATION VECTORS , 1988 .

[8]  Alfredo Vellido,et al.  Neural networks in business: a survey of applications (1992–1998) , 1999 .

[9]  William Stallings Network Security Essentials: Applications and Standards (3rd Edition) , 2006 .

[10]  Huseyin Cavusoglu,et al.  Decision-Theoretic and Game-Theoretic Approaches to IT Security Investment , 2008, J. Manag. Inf. Syst..

[11]  B. G. Quinn,et al.  The determination of the order of an autoregression , 1979 .

[12]  Qing Cao,et al.  Neural network earnings per share forecasting models: A comparison of backward propagation and the genetic algorithm , 2009, Decis. Support Syst..

[13]  Rolph E. Anderson,et al.  Multivariate Data Analysis: Text and Readings , 1979 .

[14]  Lara Khansa,et al.  Valuing the flexibility of investing in security process innovations , 2009, Eur. J. Oper. Res..

[15]  Brad M. Barber,et al.  Product Reliability and Firm Value: The Experience of American and Japanese Automakers, 1973-1992 , 1996, Journal of Political Economy.

[16]  H. L. Le Roy,et al.  Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability; Vol. IV , 1969 .

[17]  Huseyin Cavusoglu,et al.  The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers , 2004, Int. J. Electron. Commer..

[18]  Nicholas G. Rupp Are government initiated recalls more damaging for shareholders? Evidence from automotive recalls, 1973–1998 , 2001 .

[19]  Hui Li,et al.  Data mining method for listed companies' financial distress prediction , 2008, Knowl. Based Syst..

[20]  I. Ehrlich Participation in Illegitimate Activities: A Theoretical and Empirical Investigation , 1973, Journal of Political Economy.

[21]  Wei Zhang,et al.  Neural Network Earnings per Share Forecasting Models: A Comparative Analysis of Alternative Methods , 2004, Decis. Sci..

[22]  Kin Keung Lai,et al.  An intelligent-agent-based fuzzy group decision making model for financial multicriteria decision support: The case of credit scoring , 2009, Eur. J. Oper. Res..

[23]  Jay F. Nunamaker,et al.  A Comparison of Classification Methods for Predicting Deception in Computer-Mediated Communication , 2004, J. Manag. Inf. Syst..

[24]  Huimin Zhao,et al.  Commercial Internet filters: Perils and opportunities , 2010, Decis. Support Syst..

[25]  Hong Wang,et al.  Predicting stock index increments by neural networks: The role of trading volume under different horizons , 2008, Expert Syst. Appl..

[26]  Lara Khansa,et al.  Quantifying the benefits of investing in information security , 2009, Commun. ACM.

[27]  William Stallings Zhu,et al.  Network Security Essentials : Applications and Standards , 2007 .

[28]  Ramayya Krishnan,et al.  An Empirical Analysis of Software Vendors' Patch Release Behavior: Impact of Vulnerability Disclosure , 2010, Inf. Syst. Res..

[29]  Jan Muntermann,et al.  Towards ubiquitous information supply for individual investors: A decision support system design , 2009, Decis. Support Syst..

[30]  Lara Khansa,et al.  How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management , 2009, Computers & security.

[31]  C. Sims MACROECONOMICS AND REALITY , 1977 .

[32]  K Palepu 多角化戦略,収益性業績,エントロピー測度 , 1985 .

[33]  Ashish Garg,et al.  Quantifying the financial impact of IT security breaches , 2003, Inf. Manag. Comput. Secur..

[34]  Aytürk Keles,et al.  The adaptive neuro-fuzzy model for forecasting the domestic debt , 2008, Knowl. Based Syst..

[35]  G. Rasch On General Laws and the Meaning of Measurement in Psychology , 1961 .

[36]  Edward Tsang,et al.  EDDIE-automation, a decision support tool for financial forecasting , 2004 .

[37]  Lei Zhou,et al.  The Economic Cost of Publicly Announced Information Security Breaches: Empirical Evidence from the Stock Market , 2003, J. Comput. Secur..

[38]  L. Thurstone A law of comparative judgment. , 1994 .

[39]  Mukta Paliwal,et al.  Neural networks and statistical techniques: A review of applications , 2009, Expert Syst. Appl..

[40]  Zhaoli Meng,et al.  The value of IT to firms in a developing country in the catch-up process: An empirical comparison of China and the United States , 2007, Decis. Support Syst..

[41]  Jonathan D. Cryer,et al.  Time Series Analysis , 1986, Encyclopedia of Big Data.

[42]  Eric K. Clemons,et al.  Evaluation of strategic investments in information technology , 1991, CACM.

[43]  Sanjay Goel,et al.  Estimating the market impact of security breach announcements on firm values , 2009, Inf. Manag..

[44]  Robert J. Kauffman,et al.  Comparing the Modeling Performance of Regression and Neural Networks as Data Quality Varies: A Business Value Approach , 1993, J. Manag. Inf. Syst..

[45]  Kin Keung Lai,et al.  Credit risk assessment with a multistage neural network ensemble learning approach , 2008, Expert Syst. Appl..

[46]  David A. Elizondo,et al.  Bankruptcy forecasting: An empirical comparison of AdaBoost and neural networks , 2008, Decis. Support Syst..

[47]  Sam Peltzman,et al.  The Impact of Product Recalls on the Wealth of Sellers , 1985, Journal of Political Economy.

[48]  Ömer Kaan Baykan,et al.  Predicting bank financial failures using neural networks, support vector machines and multivariate statistical methods: A comparative analysis in the sample of savings deposit insurance fund (SDIF) transferred banks in Turkey , 2009, Expert Syst. Appl..

[49]  Ross J. Anderson Why information security is hard - an economic perspective , 2001, Seventeenth Annual Computer Security Applications Conference.

[50]  Simon Haykin,et al.  Neural Networks: A Comprehensive Foundation , 1998 .

[51]  Andreas S. Weigend,et al.  Data Mining for Financial Decision Making , 2002 .

[52]  C. Granger,et al.  Forecasting Economic Time Series. , 1988 .

[53]  Michael M. May,et al.  How much is enough? A risk management approach to computer security , 2000 .

[54]  Chih-Chou Chiu,et al.  Financial time series forecasting using independent component analysis and support vector regression , 2009, Decis. Support Syst..

[55]  A. Blumstein,et al.  Deterrence and incapacitation : estimating the effects of criminal sanctions on crime rates , 1980 .

[56]  Kevin B. Hendricks,et al.  The effect of supply chain glitches on shareholder wealth , 2003 .

[57]  K. Palepu Diversification strategy, profit performance and the entropy measure , 1985 .

[58]  Product Safety, Buybacks and the Post-Sale Duty to Warn , 2011 .

[59]  Renata Pomponi,et al.  Gain a Competitive Edge by Preventing Recalls , 2003 .

[60]  Mooweon Rhee,et al.  THE LIABILITY OF GOOD REPUTATION: A STUDY OF PRODUCT RECALLS IN THE U.S. AUTOMOBILE INDUSTRY. , 2003 .

[61]  Alan Pankratz,et al.  Forecasting with Dynamic Regression Models: Pankratz/Forecasting , 1991 .

[62]  Jerrold H. May,et al.  Evaluating and Tuning Predictive Data Mining Models Using Receiver Operating Characteristic Curves , 2004, J. Manag. Inf. Syst..

[63]  G. Lewicki,et al.  Approximation by Superpositions of a Sigmoidal Function , 2003 .

[64]  William R. King,et al.  An Evaluation of the Role and Performance of a Decision Support System in Business Education , 1990 .

[65]  Steven Walczak,et al.  A Comparative Analysis of Regression and Neural Networks for University Admissions , 1999, Inf. Sci..

[66]  Dongsong Zhang,et al.  Predicting and explaining patronage behavior toward web and traditional stores using neural networks: a comparative analysis with logistic regression , 2006, Decis. Support Syst..

[67]  E. Fama,et al.  Efficient Capital Markets : II , 2007 .

[68]  A. Hovav,et al.  The Impact of Denial‐of‐Service Attack Announcements on the Market Value of Firms , 2003 .