Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- COVID-19 (1)
- Contactless (1)
- Coronavirus (1)
- Cyber-Security (1)
- Cybersecurity risk (1)
-
- Derivatives (1)
- Digital economy (1)
- Essential goods (1)
- Harvard Business Law Review (1)
- Health crisis (1)
- Information privacy (1)
- Informed cybertrading (1)
- Insider Trading (1)
- Law (1)
- Lock down (1)
- No contact (1)
- Novel corona virus (1)
- Pandemic (1)
- Public health (1)
- Public threat (1)
- Quarantine (1)
- Securities Fraud (1)
- Securities market (1)
- Sustainable society (1)
- Publication
- Publication Type
Articles 1 - 2 of 2
Full-Text Articles in Privacy Law
Law In The Time Of Covid-19, Katharina Pistor
Law In The Time Of Covid-19, Katharina Pistor
Faculty Books
The COVID-19 crisis has ended and upended lives around the globe. In addition to killing over 160,000 people, more than 35,000 in the United States alone, its secondary effects have been as devastating. These secondary effects pose fundamental challenges to the rules that govern our social, political, and economic lives. These rules are the domain of lawyers. Law in the Time of COVID-19 is the product of a joint effort by members of the faculty of Columbia Law School and several law professors from other schools.
This volume offers guidance for thinking about some the most pressing legal issues the …
Informed Trading And Cybersecurity Breaches, Joshua Mitts, Eric L. Talley
Informed Trading And Cybersecurity Breaches, Joshua Mitts, Eric L. Talley
Faculty Scholarship
Cybersecurity has become a significant concern in corporate and commercial settings, and for good reason: a threatened or realized cybersecurity breach can materially affect firm value for capital investors. This paper explores whether market arbitrageurs appear systematically to exploit advance knowledge of such vulnerabilities. We make use of a novel data set tracking cybersecurity breach announcements among public companies to study trading patterns in the derivatives market preceding the announcement of a breach. Using a matched sample of unaffected control firms, we find significant trading abnormalities for hacked targets, measured in terms of both open interest and volume. Our results …