This study examines how the mergers and acquisitions (M&As) of a firm influence its number of data breaches. Drawing from complexity theory and matching theory, we propose that M&As increase data breaches and this effect is contingent on M&A diversity (dissimilarity between the parent and target firms). Based on the 18-year panel data (2004-2021) of 5,072 public firms in the United States, we find that more M&As by a firm lead to more data breaches. Moreover, we reveal that the number of data breaches increases even more when the parent and target firms operate in different business domains. This finding is confirmed when we operationalize M&A diversity as size discrepancy between the parent and target firms or strategic type difference (vertical vs. horizontal M&A). Furthermore, based on routine activity theory, we explore two additional moderating mechanisms through which M&As influence data breaches: M&A media publicity and target vulnerability. Our analyses demonstrate that M&As with higher media publicity experience more data breaches than those with lower media publicity, but counterintuitively, M&As involving a more vulnerable target firm lead to fewer data breaches than those involving a less vulnerable target firm. This study not only confirms the impact of M&As on data breach recurrence but also unveils various underlying mechanisms of this impact, thus contributing to both research and practice in cybersecurity and information systems.
How Mergers and Acquisitions Increase Data Breaches: A Complexity Perspective
In stock
SKU
17703
Publication History
Received: August 10, 2021
Revised: May 5, 2022; November 21, 2022; March 31, 2023; October 21, 2023
Accepted: November 24, 2023
Published Online as Accepted Author Version: July 16, 2024
Published Online as Articles in Advance: Forthcoming
Published Online in Issue: Forthcoming
Abstract
Additional Details
Author | Huigang Liang, Santhosh Srinivas, and Yajiong Xue |
Year | |
Volume | |
Issue | |
Keywords | merger & acquisition, data breach, diversity, complexity theory, matching theory, routine activity theory, media publicity, target vulnerability |
Page Numbers |