1.Ali, S. E. A., Lai, F. W., Dominic, P. D. D., Brown, N. J., Lowry, P. B. B., & Ali, R. F. (2021). Stock market reactions to favorable and unfavorable information security events: A systematic literature review. Computers & Security, 110, 102451.
2.Ali, S. E. A., Lai, F. W., Hassan, R., & Shad, M. K. (2021). The long-run impact of information security breach announcements on investors’ confidence: The context of efficient market hypothesis. Sustainability, 13(3), 1066.
3.Angafor, G. N., Yevseyeva, I., & Maglaras, L. (2024). Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns. International Journal of Information Security, 1-15.
4.Bose, I., & Leung, A. C. M. (2019). Adoption of identity theft countermeasures and its short-and long-term impact on firm value. MIS Quarterly, 43(1).
5.Buckman, J., Bockstedt, J., Hashim, M. J., & Woutersen, T. (2017, June). Do organizations learn from a data breach. In Workshop on the Economics of Information Security (WEIS) (pp. 1-22).
6.D’Arcy, J., Adjerid, I., Angst, C. M., & Glavas, A. (2020). Too good to be true: firm social performance and the risk of data breach. Information Systems Research, 31(4), 1200-1223.
7.Deane, J. K., Goldberg, D. M., Rakes, T. R., & Rees, L. P. (2019). The effect of information security certification announcements on the market value of the firm. Information Technology and Management, 20, 107-121.
8.Goel, S., Williams, K., & Dincelli, E. (2017). Got phished? Internet security and human vulnerability. Journal of the Association for Information Systems, 18(1), 2.
9.Gwebu, K. L., Wang, J., & Wang, L. (2018). The role of corporate reputation and crisis response strategies in data breach management. Journal of Management Information Systems, 35(2), 683-714.
10.Hovav, A., Han, J., & Kim, J. (2017). Market reaction to security breach announcements: Evidence from South Korea. ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 48(1), 11-52.
11.Ishiguro, M., Tanaka, H., Matsuura, K., & Murase, I. (2006, August). The effect of information security incidents on corporate values in the Japanese stock market. In International Workshop on the Economics of Securing the Information Infrastructure (WESII) (Vol. 14).
12.Jeong, C. Y., Lee, S. Y. T., & Lim, J. H. (2019). Information security breaches and IT security investments: Impacts on competitors. Information & Management, 56(5), 681-695.
13.Lee, I. (2021). Cybersecurity: Risk management framework and investment cost analysis. Business Horizons, 64(5), 659-671.
14.Li, H., Yoo, S., & Kettinger, W. J. (2021). The roles of IT strategies and security investments in reducing organizational security breaches. Journal of Management Information Systems, 38(1), 222-245.
15.Park, J., Jung, W. J., & Kim, B. (2016). The effect of information security certification announcement on the market value of firms. Journal of Information Technology Services, 15(3), 51-69.
16.Masuch, K., Greve, M., Trang, S., & Kolbe, L. M. (2022). Apologize or justify? Examining the impact of data breach response actions on stock value of affected companies? Computers & Security, 112, 102502.
17.Mookerjee, V.; Mookerjee, R.; Bensoussan, A.; and Yue, W.T. When hackers talk: Managing information security under variable attack rates and knowledge dissemination. Information Systems Research, 22, 3 (2011), 606–623.
18.Schlackl, F., Link, N., & Hoehle, H. (2022). Antecedents and consequences of data breaches: A systematic review. Information & Management, 59(4), 103638.
19.SlashNext (2023) WormGPT – The Generative AI Tool Cybercriminals Are Using to Launch Business Email Compromise Attacks
https://slashnext.com/blog/wormgpt-the-generative-ai-tool-cybercriminals-are-using-to-launch-business-email-compromise-attacks/
20.TEJ (2024) TESG永續資料集。TEJ。
https://www.tejwin.com/news/tesg%E6%B0%B8%E7%BA%8C%E8%B3%87%E6%96%99%E9%9B%86/
21.Tripathi, M., & Mukhopadhyay, A. (2022). Does privacy breach affect firm performance? An analysis incorporating event-induced changes and event clustering. Information & Management, 59(8), 103707.
22.Wolke, T. (2017). Risk management. Walter de Gruyter GmbH & Co KG.
23.曾立行 (2022) 。結合 FAIR 與 NIST 資安框架分析資安風險: 以金融業為例。國立中央大學土木工程學系碩士論文,桃園市。取自https://hdl.handle.net/11296/yahaj824.潘嘉澤 (2023) 。從資安事件看企業資安文化的形塑關鍵。南臺科技大學資訊管理系碩士論文,台南市。取自https://hdl.handle.net/11296/a23qwe25.簡宏偉 (2021) 。政府資安治理模式之研究。東吳大學法學院法律學系碩士論文,台北市。取自https://hdl.handle.net/11296/87hjfw26.高煜凱 (2016)。資料洩露事件對公司短期及長期市場價值之影響。元智大學財務金融暨會計碩士論文,桃園市。取自https://hdl.handle.net/11296/ydp29d27.顏淑貞 (2020) 。資訊安全對於銀行股價異常報酬之研究:個案研究。國立高雄科技大學金融系碩士論文,高雄市。取自https://hdl.handle.net/11296/t9wy8h28.楊昕 (2012) 。ISO27001對組織市場價值之影響-以台灣市場為例。國立台灣大學資訊管理研究所碩士論文,台北。取自https://hdl.handle.net/11296/7b8vmy29.張博竣 (2023) 。資訊安全事件之市場反應及董事會特性之影響。國立彰化師範大學會計學系碩士論文,彰化縣。取自https://hdl.handle.net/11296/2nz3ym30.王宏仁 (2024)。【iThome 2024資安大調查系列1】2024企業最需警戒的資安風險。iThome。
https://www.ithome.com.tw/article/162252