A proposal of event study methodology with Twitter sentimental analysis for risk management

Once organizations have the security incident and breaches, they have to pay tremendous costs. Although visible cost, such as the incident response cost, customer follow-up care, and legal cost are predictable and calculable, it is tough to evaluate and estimate the invisible damage, such as losing customer loyalty, reputation impact, and the damage of branding. This paper proposes a new method, called "Event Study Methodology with Twitter Sentimental Analysis" to evaluate the invisible cost. This method helps to assess the impact of the security breach and the impact on corporate valuation.

[1]  Ritsuko Kawasaki,et al.  Proposal of a Model Supporting Decision-Making on Information Security Risk Treatment , 2014 .

[2]  Guido Caldarelli,et al.  S 1 Appendix , 2016 .

[3]  Ritsuko Kawasaki,et al.  Proposal of a Model Supporting Decision-Making Based On Multi-Objective Optimization Analysis on Information Security Risk Treatment , 2014 .

[4]  Michele Tomaiuolo,et al.  A Case-Study for Sentiment Analysis on Twitter , 2015, WOA.

[5]  Owen Rambow,et al.  Sentiment Analysis of Twitter Data , 2011 .

[6]  Johanna D. Moore,et al.  Twitter Sentiment Analysis: The Good the Bad and the OMG! , 2011, ICWSM.

[7]  ShinDong-Hee,et al.  Security assessment framework for IoT service , 2017 .

[8]  Dong-Hee Shin,et al.  Why do people play social network games? , 2011, Comput. Hum. Behav..

[9]  Byungjoon Yoo,et al.  A Quantitative Assessment Model of Private Information Breach , 2011 .

[10]  Keon Chul Park,et al.  Security assessment framework for IoT service , 2016, Telecommunication Systems.

[11]  Taku Kudo,et al.  MeCab : Yet Another Part-of-Speech and Morphological Analyzer , 2005 .

[12]  Qing Hu,et al.  The impact of information security events on the stock value of firms: the effect of contingency factors , 2011, J. Inf. Technol..

[13]  Dong-Hee Shin,et al.  Erratum to: Security assessment framework for IoT service , 2016, Telecommunications Systems.

[14]  정경호,et al.  Estimating Economic Damages from Internet Incidents , 2008 .

[15]  Lawrence A. Gordon,et al.  Market Value of Voluntary Disclosures Concerning Information Security , 2010, MIS Q..

[16]  Johan Bollen,et al.  Twitter mood predicts the stock market , 2010, J. Comput. Sci..

[17]  Dong-Hee Shin,et al.  The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption , 2010, Interact. Comput..