{"id":"https://openalex.org/W2941563923","doi":"https://doi.org/10.3390/bdcc3020024","title":"Analysis of Information Security News Content and Abnormal Returns of Enterprises","display_name":"Analysis of Information Security News Content and Abnormal Returns of Enterprises","publication_year":2019,"publication_date":"2019-04-27","ids":{"openalex":"https://openalex.org/W2941563923","doi":"https://doi.org/10.3390/bdcc3020024","mag":"2941563923"},"language":"en","primary_location":{"id":"doi:10.3390/bdcc3020024","is_oa":true,"landing_page_url":"https://doi.org/10.3390/bdcc3020024","pdf_url":"https://www.mdpi.com/2504-2289/3/2/24/pdf?version=1556353608","source":{"id":"https://openalex.org/S4210238752","display_name":"Big Data and Cognitive Computing","issn_l":"2504-2289","issn":["2504-2289"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Big Data and Cognitive Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2504-2289/3/2/24/pdf?version=1556353608","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021657087","display_name":"Chia-Ching Hung","orcid":null},"institutions":[{"id":"https://openalex.org/I148099254","display_name":"National Chung Cheng University","ror":"https://ror.org/0028v3876","country_code":"TW","type":"education","lineage":["https://openalex.org/I148099254"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Chia-Ching Hung","raw_affiliation_strings":["Department of Information Management, National Chung Cheng University, Chiayi County 62102, Taiwan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information Management, National Chung Cheng University, Chiayi County 62102, Taiwan","institution_ids":["https://openalex.org/I148099254"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5021657087"],"corresponding_institution_ids":["https://openalex.org/I148099254"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":1.4102,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.86109172,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"3","issue":"2","first_page":"24","last_page":"24"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11891","display_name":"Big Data and Business Intelligence","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.7834697961807251},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.5762227177619934},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.5480228066444397},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5057961940765381},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.47916021943092346},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.44030874967575073},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3905205726623535},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.34991055727005005},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1388079822063446}],"concepts":[{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.7834697961807251},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.5762227177619934},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.5480228066444397},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5057961940765381},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.47916021943092346},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.44030874967575073},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3905205726623535},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.34991055727005005},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1388079822063446}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3390/bdcc3020024","is_oa":true,"landing_page_url":"https://doi.org/10.3390/bdcc3020024","pdf_url":"https://www.mdpi.com/2504-2289/3/2/24/pdf?version=1556353608","source":{"id":"https://openalex.org/S4210238752","display_name":"Big Data and Cognitive Computing","issn_l":"2504-2289","issn":["2504-2289"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Big Data and Cognitive Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:016fe4b38e8c4c03802145ab9c67360a","is_oa":true,"landing_page_url":"https://doaj.org/article/016fe4b38e8c4c03802145ab9c67360a","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Big Data and Cognitive Computing, Vol 3, Iss 2, p 24 (2019)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/2504-2289/3/2/24/","is_oa":true,"landing_page_url":"http://dx.doi.org/10.3390/bdcc3020024","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Big Data and Cognitive Computing","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/bdcc3020024","is_oa":true,"landing_page_url":"https://doi.org/10.3390/bdcc3020024","pdf_url":"https://www.mdpi.com/2504-2289/3/2/24/pdf?version=1556353608","source":{"id":"https://openalex.org/S4210238752","display_name":"Big Data and Cognitive Computing","issn_l":"2504-2289","issn":["2504-2289"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Big Data and Cognitive Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2941563923.pdf","grobid_xml":"https://content.openalex.org/works/W2941563923.grobid-xml"},"referenced_works_count":44,"referenced_works":["https://openalex.org/W17195039","https://openalex.org/W1517565658","https://openalex.org/W1863670505","https://openalex.org/W1966493433","https://openalex.org/W1974529979","https://openalex.org/W1984955803","https://openalex.org/W1986887428","https://openalex.org/W2016342027","https://openalex.org/W2024228866","https://openalex.org/W2028329020","https://openalex.org/W2029056003","https://openalex.org/W2031464770","https://openalex.org/W2033461966","https://openalex.org/W2041313418","https://openalex.org/W2061798849","https://openalex.org/W2066778800","https://openalex.org/W2068987343","https://openalex.org/W2070678618","https://openalex.org/W2072047708","https://openalex.org/W2122224612","https://openalex.org/W2132996843","https://openalex.org/W2151297242","https://openalex.org/W2156565637","https://openalex.org/W2167332641","https://openalex.org/W2251898997","https://openalex.org/W2527999453","https://openalex.org/W2600619235","https://openalex.org/W2605970997","https://openalex.org/W2612029073","https://openalex.org/W2788178137","https://openalex.org/W2790399756","https://openalex.org/W2911964244","https://openalex.org/W3122095378","https://openalex.org/W3122789689","https://openalex.org/W3124238945","https://openalex.org/W3124276089","https://openalex.org/W3125210271","https://openalex.org/W3145342109","https://openalex.org/W4230661391","https://openalex.org/W4239510810","https://openalex.org/W4243626155","https://openalex.org/W6647117474","https://openalex.org/W6657548618","https://openalex.org/W6682971143"],"related_works":["https://openalex.org/W2921504876","https://openalex.org/W2183730421","https://openalex.org/W1982580243","https://openalex.org/W2551868243","https://openalex.org/W2348153269","https://openalex.org/W4205613068","https://openalex.org/W3112956360","https://openalex.org/W2004781009","https://openalex.org/W2392897293","https://openalex.org/W2946162884"],"abstract_inverted_index":{"As":[0],"information":[1,27,32,38,50,104,118],"technologies":[2,28],"and":[3,20,37,58,67,121,133,155],"the":[4,22,54,61,85,91,101,115,140,152,156,162],"Internet":[5],"have":[6,10,164],"rapidly":[7],"evolved,":[8],"businesses":[9],"begun":[11],"to":[12,15,113,138],"use":[13],"them":[14],"improve":[16],"communication":[17],"efficiency":[18],"within":[19],"outside":[21],"organization.":[23],"However,":[24],"applications":[25],"of":[26,49,56,63,77,103,142,158],"are":[29,42],"accompanied":[30],"by":[31],"delivery,":[33],"personal":[34],"data":[35,80],"protection,":[36],"security":[39,105,119],"problems.":[40],"There":[41],"potential":[43],"risks":[44],"inherent":[45],"in":[46,95,110,161],"any":[47],"application":[48],"technologies.":[51],"Moreover,":[52],"with":[53,146],"improvement":[55],"networking":[57],"computing":[59],"capabilities,":[60],"impact":[62,166],"attacks":[64],"from":[65],"hackers":[66],"malicious":[68],"software":[69],"has":[70],"also":[71,89],"increased.":[72],"A":[73],"breach":[74],"or":[75],"leakage":[76],"important":[78],"corporate":[79,122],"may":[81],"not":[82],"only":[83],"damage":[84],"firm\u2019s":[86,92],"image":[87],"but":[88],"sabotage":[90],"operation,":[93],"resulting":[94],"financial":[96],"losses.":[97],"In":[98],"this":[99],"study,":[100],"content":[102],"news":[106,120,143,153,163],"reports":[107],"was":[108],"analyzed":[109],"an":[111,165],"attempt":[112],"clarify":[114],"association":[116],"between":[117],"stock":[123],"prices.":[124],"Methods":[125],"including":[126],"decision":[127],"trees,":[128],"support":[129],"vector":[130],"machines":[131],"(SVMs),":[132],"random":[134],"forests":[135],"were":[136],"used":[137],"explore":[139],"associations":[141],"related":[144],"variables":[145],"abnormal":[147,168],"returns.":[148,169],"Results":[149],"indicate":[150],"that":[151],"source":[154],"presence":[157],"negative":[159],"words":[160],"on":[167]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
