Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Volatility clustering in data breach counts

Full metadata record
DC Field Value Language
dc.contributor.authorShim, Hyunoo-
dc.contributor.authorKim, Changki-
dc.contributor.authorChoi, Yang Ho-
dc.date.accessioned2023-10-12T12:06:19Z-
dc.date.available2023-10-12T12:06:19Z-
dc.date.created2021-01-21-
dc.date.issued2020-07-
dc.identifier.issn2287-7843-
dc.identifier.urihttps://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/192041-
dc.description.abstractInsurers face increasing demands for cyber liability; entailed in part by a variety of new forms of risk of data breaches. As data breach occurrences develop, our understanding of the volatility in data breach counts has also become important as well as its expected occurrences. Volatility clustering, the tendency of large changes in a random variable to cluster together in time, are frequently observed in many financial asset prices, asset returns, and it is questioned whether the volatility of data breach occurrences are also clustered in time. We now present volatility analysis based on INGARCH models, i.e., integer-valued generalized autoregressive conditional heteroskedasticity time series model for frequency counts due to data breaches. Using the INGARCH(1, 1) model with data breach samples, we show evidence of temporal volatility clustering for data breaches. In addition, we present that the firms' volatilities are correlated between some they belong to and that such a clustering effect remains even after excluding the effect of financial covariates such as the VIX and the stock return of S&P500 that have their own volatility clustering.-
dc.language영어-
dc.language.isoen-
dc.publisher한국통계학회-
dc.titleVolatility clustering in data breach counts-
dc.typeArticle-
dc.contributor.affiliatedAuthorShim, Hyunoo-
dc.contributor.affiliatedAuthorChoi, Yang Ho-
dc.identifier.doi10.29220/CSAM.2020.27.4.487-
dc.identifier.scopusid2-s2.0-85090553293-
dc.identifier.wosid000563708000007-
dc.identifier.bibliographicCitationCommunications for Statistical Applications and Methods, v.27, no.4, pp.487 - 500-
dc.relation.isPartOfCommunications for Statistical Applications and Methods-
dc.citation.titleCommunications for Statistical Applications and Methods-
dc.citation.volume27-
dc.citation.number4-
dc.citation.startPage487-
dc.citation.endPage500-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.identifier.kciidART002613129-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscopus-
dc.description.journalRegisteredClasskci-
dc.relation.journalResearchAreaMathematics-
dc.relation.journalWebOfScienceCategoryStatistics & Probability-
dc.subject.keywordPlusCYBER-RISK-
dc.subject.keywordPlusINSURABILITY-
dc.subject.keywordPlusINFORMATION-
dc.subject.keywordPlusDECISION-
dc.subject.keywordPlusMODELS-
dc.subject.keywordAuthordata breach-
dc.subject.keywordAuthorcyber risk-
dc.subject.keywordAuthorvolatility clustering-
dc.subject.keywordAuthorINGARCH-
dc.subject.keywordAuthorcovariate-
dc.identifier.urlhttp://www.csam.or.kr/journal/view.html?doi=10.29220/CSAM.2020.27.4.487-
Files in This Item
Go to Link
Appears in
Collections
ETC > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE