Why information security law has been ineffective in addressing security vulnerabilities: Evidence from California data breach notifications and relevant court and government records
Author
Abstract
Suggested Citation
DOI: 10.1016/j.irle.2019.03.007
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Willison , Robert, 2006. "Understanding the Perpetration of Employee Computer Crime in the Organisational Context," Working Papers 2006-4, Copenhagen Business School, Department of Informatics.
- Marshall Van Alstyne & Erik Brynjolfsson, 2005. "Global Village or Cyber-Balkans? Modeling and Measuring the Integration of Electronic Communities," Management Science, INFORMS, vol. 51(6), pages 851-868, June.
- Rosenberg, D. & Shavell, S., 1985. "A model in which suits are brought for their nuisance value," International Review of Law and Economics, Elsevier, vol. 5(1), pages 3-13, June.
- Kraakman, Reinier & Armour, John & Davies, Paul & Enriques, Luca & Hansmann, Henry & Hertig, Gerard & Hopt, Klaus & Kanda, Hideki & Pargendler, Mariana & Ringe, Wolf-Georg & Rock, Edward, 2017. "The Anatomy of Corporate Law: A Comparative and Functional Approach," OUP Catalogue, Oxford University Press, edition 3, number 9780198724315.
- Shavell, Steven, 1993. "The Optimal Structure of Law Enforcement," Journal of Law and Economics, University of Chicago Press, vol. 36(1), pages 255-287, April.
- Sasha Romanosky & David Hoffman & Alessandro Acquisti, 2014. "Empirical Analysis of Data Breach Litigation," Journal of Empirical Legal Studies, John Wiley & Sons, vol. 11(1), pages 74-104, March.
- Alessandro Acquisti & Leslie K. John & George Loewenstein, 2013. "What Is Privacy Worth?," The Journal of Legal Studies, University of Chicago Press, vol. 42(2), pages 249-274.
- Bebchuk, Lucian Arye, 1996. "A New Theory Concerning the Credibility and Success of Threats to Sue," The Journal of Legal Studies, University of Chicago Press, vol. 25(1), pages 1-25, January.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Ben Krishna & Satish Krishnan & M. P. Sebastian, 2023. "Examining the Relationship between National Cybersecurity Commitment, Culture, and Digital Payment Usage: An Institutional Trust Theory Perspective," Information Systems Frontiers, Springer, vol. 25(5), pages 1713-1741, October.
- Muhammad Zia Hydari & Yangfan Liang & Rahul Telang, 2024. "Sound and Fury, Signifying Nothing? Impact of Data Breach Disclosure Laws," Papers 2406.15215, arXiv.org.
- Jens Foerderer & Sebastian W. Schuetz, 2022. "Data Breach Announcements and Stock Market Reactions: A Matter of Timing?," Management Science, INFORMS, vol. 68(10), pages 7298-7322, October.
- Igor Okhrimenko & Valery Stepenko & Olga Chernova & Elena Zatsarinnaya, 2023. "The impact of information sphere in the economic security of the country: case of Russian realities," Journal of Innovation and Entrepreneurship, Springer, vol. 12(1), pages 1-18, December.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Giuseppe Dari-Mattiacci & Bruno Deffains, 2007.
"Uncertainty of Law and the Legal Process,"
Journal of Institutional and Theoretical Economics (JITE), Mohr Siebeck, Tübingen, vol. 163(4), pages 627-656, December.
- Bruno Deffains & Giuseppe Dari-Mattiacci, 2005. "Uncertainty of Law and the Legal Process," Post-Print hal-00279241, HAL.
- Giuseppe Dari-Mattiacci & Bruno Deffains, 2006. "Uncertainty of Law and the Legal Process," Working Papers of BETA 2006-11, Bureau d'Economie Théorique et Appliquée, UDS, Strasbourg.
- Guiseppe Dari-Mattiacci & Bruno Deffains, 2006. "Uncertainty of Law and the Legal Process," Tinbergen Institute Discussion Papers 06-071/1, Tinbergen Institute.
- Oren Bar-Gill & Omri Ben-Shahar, 2004. "The Law of Duress and the Economics of Credible Threats," The Journal of Legal Studies, University of Chicago Press, vol. 33(2), pages 391-430, June.
- Farmer, Amy & Pecorino, Paul, 1998. "A reputation for being a nuisance: frivolous lawsuits and fee shifting in a repeated play game," International Review of Law and Economics, Elsevier, vol. 18(2), pages 147-157, June.
- Lucian Arye Bebchuk, 1998. "Negative Expected Value Suits," NBER Working Papers 6474, National Bureau of Economic Research, Inc.
- Kim, Iljoong & Kim, Jaehong, 2015. "Frivolous Suits In The Infinitely-Repeated Litigation Game With Uncertainty," Hitotsubashi Journal of Economics, Hitotsubashi University, vol. 56(1), pages 21-33, June.
- Cedomir GLIGORIC & Milos PAVLOVIC & Jana CVIJIC RODIC & Sanja DONCIC & Nikola VUJANOVIC, 2023. "Some Aspects of Economic Analysis of Out-of-court Settlement in the Dispute of Negative Expected Value – Case of Republic of Serbia," Business & Management Compass, University of Economics Varna, issue 1, pages 80-95.
- Farmer Amy & Pecorino Paul, 2014. "Litigation with Default Judgments," Review of Law & Economics, De Gruyter, vol. 10(2), pages 117-136, July.
- Guha, Brishti, 2016.
"Malicious litigation,"
International Review of Law and Economics, Elsevier, vol. 47(C), pages 24-32.
- Guha, Brishti, 2016. "Malicious Litigation," MPRA Paper 69544, University Library of Munich, Germany.
- Margherita Saraceno, 2018. "Justice: Greater Access, Lower Costs," Italian Economic Journal: A Continuation of Rivista Italiana degli Economisti and Giornale degli Economisti, Springer;Società Italiana degli Economisti (Italian Economic Association), vol. 4(2), pages 283-312, July.
- Klement, Alon, 2003. "Threats to sue and cost divisibility under asymmetric information," International Review of Law and Economics, Elsevier, vol. 23(3), pages 261-272, September.
- Jack Hirshleifer & Evan Osborne, 1999. "Truth and the Legal Battle," UCLA Economics Working Papers 790, UCLA Department of Economics.
- Antill, Samuel & Grenadier, Steven R., 2023. "Financing the litigation arms race," Journal of Financial Economics, Elsevier, vol. 149(2), pages 218-234.
- Cary Deck & Paul Pecorino & Michael Solomon, 2024.
"Litigation with negative expected value suits: An experimental analysis,"
Journal of Empirical Legal Studies, John Wiley & Sons, vol. 21(2), pages 244-278, June.
- Cary Deck & Paul Pecorino & Michael Solomon, 2022. "Litigation with Negative Expected Value Suits: An Experimental Analysis," Working Papers 22-17, Chapman University, Economic Science Institute.
- Miceli, Thomas J. & Stone, Michael P., 2014.
"“Piggyback” lawsuits and deterrence: Can frivolous litigation improve welfare?,"
International Review of Law and Economics, Elsevier, vol. 39(C), pages 49-57.
- Thomas J. Miceli & Michael P. Stone, 2013. "“Piggyback” Lawsuits and Deterrence: Can Frivolous Litigation Improve Welfare?," Working papers 2013-16, University of Connecticut, Department of Economics.
- Schaufele, Brandon, 2022. "Chilling Effects from Anti-SLAPP Laws," MPRA Paper 113740, University Library of Munich, Germany.
- repec:hit:hitjcm:v:56:y:2015:i:1:p:21-33 is not listed on IDEAS
- Jorge Padilla, 2020. "Big Tech “banks”, financial stability and regulation," Revista de Estabilidad Financiera, Banco de España, issue Spring.
- Aneta Napieralska & Przemys{l}aw Kk{e}pczy'nski, 2024. "Redefining Accountability: Navigating Legal Challenges of Participant Liability in Decentralized Autonomous Organizations," Papers 2408.04717, arXiv.org.
- Shaheer, Noman Ahmed & Li, Sali, 2020. "The CAGE around cyberspace? How digital innovations internationalize in a virtual world," Journal of Business Venturing, Elsevier, vol. 35(1).
- Forman, Chris & van Zeebroeck, Nicolas, 2019.
"Digital technology adoption and knowledge flows within firms: Can the Internet overcome geographic and technological distance?,"
Research Policy, Elsevier, vol. 48(8), pages 1-1.
- Chris CM Forman & Nicolas van Zeebroeck, 2019. "Digital technology adoption and knowledge flows within firms: Can the Internet overcome geographic and technological distance?," ULB Institutional Repository 2013/277616, ULB -- Universite Libre de Bruxelles.
- Jeong-Yoo Kim, 2010. "Credible plea bargaining," European Journal of Law and Economics, Springer, vol. 29(3), pages 279-293, June.
More about this item
Keywords
Information security law; Cybersecurity law; Data breach litigation; Data breach notification; Data protection; Article III standing; Public and private enforcement; Class action;All these keywords.
JEL classification:
- K24 - Law and Economics - - Regulation and Business Law - - - Cyber Law
- K42 - Law and Economics - - Legal Procedure, the Legal System, and Illegal Behavior - - - Illegal Behavior and the Enforcement of Law
- L86 - Industrial Organization - - Industry Studies: Services - - - Information and Internet Services; Computer Software
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:irlaec:v:58:y:2019:i:c:p:132-145. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.elsevier.com/locate/irle .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.