Published
2024-11-29
Section
Research Articles
License
The journal adopts the Attribution-NonCommercial 4.0 International (CC BY-NC 4.0), which means that anyone can reuse and redistribute the materials for non-commercial purposes as long as you follow the license terms and the original source is properly cited.
Author(s) shall retain the copyright of their work and grant the Journal/Publisher rights for the first publication with the work concurrently licensed since 2023 Vol.8 No.2.
Under this license, author(s) will allow third parties to download, reuse, reprint, modify, distribute and/or copy the content under the condition that the authors are given credit. No permission is required from the authors or the publisher.
This broad license intends to facilitate free access, as well as the unrestricted use of original works of all types. This ensures that the published work is freely and openly available in perpetuity.
By providing open access, the following benefits are brought about:
- Higher Visibility, Availability and Citations-free and unlimited accessibility of the publication over the internet without any restrictions increases citation of the article.
- Ease of search-publications are easily searchable in search engines and indexing databases.
- Rapid Publication – accepted papers are immediately published online.
- Available for free download immediately after publication at https://esp.as-pub.com/index.php/ESP
Copyright Statement
1.The authors certify that the submitted manuscripts are original works, do not infringe the rights of others, are free from academic misconduct and confidentiality issues, and that there are no disputes over the authorship scheme of the collaborative articles. In case of infringement, academic misconduct and confidentiality issues, as well as disputes over the authorship scheme, all responsibilities will be borne by the authors.
2. The author agrees to grant the Editorial Office of Environment and Social Psychology a licence to use the reproduction right, distribution right, information network dissemination right, performance right, translation right, and compilation right of the submitted manuscript, including the work as a whole, as well as the diagrams, tables, abstracts, and any other parts that can be extracted from the work and used in accordance with the characteristics of the journal. The Editorial Board of Environment and Social Psychology has the right to use and sub-licence the above mentioned works for wide dissemination in print, electronic and online versions, and, in accordance with the characteristics of the periodical, for the period of legal protection of the property right of the copyright in the work, and for the territorial scope of the work throughout the world.
3. The authors are entitled to the copyright of their works under the relevant laws of Singapore, provided that they do not exercise their rights in a manner prejudicial to the interests of the Journal.
About Licence
Environment and Social Psychology is an open access journal and all published work is available under the Creative Commons Licence, Authors shall retain copyright of their work and grant the journal/publisher the right of first publication, and their work shall be licensed under the Attribution-NonCommercial 4.0 International (CC BY-NC 4.0).
Under this licence, the author grants permission to third parties to download, reuse, reprint, modify, distribute and/or copy the content with attribution to the author. No permission from the author or publisher is required.
This broad licence is intended to facilitate free access to and unrestricted use of original works of all kinds. This ensures that published works remain free and accessible in perpetuity. Submitted manuscripts, once accepted, are immediately available to the public and permanently accessible free of charge on the journal’s official website (https://esp.as-pub.com/index.php/ESP). Allowing users to read, download, copy, print, search for or link to the full text of the article, or use it for other legal purposes. However, the use of the work must retain the author's signature, be limited to non-commercial purposes, and not be interpretative.
Click to download <Agreement on the Licence for the Use of Copyright on Environmental and Social Psychology>.
How to Cite
Psychological explanations for analysts' herding behavior: A study on the impact of information cascades and reputational concerns
Senran Zhou
University of Illinois at Chicago, 60484, USA
DOI: https://doi.org/10.59429/esp.v9i11.3162
Keywords: information cascades, reputational concerns, herding behavior, financial analysts, market efficiency, behavioral finance, decision-making under uncertainty, career concerns, social influence, market volatility
Abstract
This study investigates the influence of information cascades and reputational concerns on analysts' herding behavior in financial markets. Using a mixed-methods approach combining archival data analysis and surveys of 5,237 financial analysts covering S&P 500 companies from 2014 to 2023, we examine the interplay between these psychological factors. Our findings reveal that both information cascades and reputational concerns significantly impact herding behavior, with a notable synergistic effect when combined. Structural equation modeling demonstrates that information cascade strength positively correlates with herding behavior (β = 0.43, p < .001), partially mediated by perceived market consensus. Reputational concerns also show a strong positive association with herding (β = 0.51,
p < .001), moderated by career stage. Importantly, the interaction between information cascades and reputational concerns (β = 0.24, p < .001) suggests that their combined effect is greater than the sum of their individual impacts. This effect varies across analyst characteristics and market conditions, with stronger influences observed in small-cap stocks and high-volatility periods. Time-series analysis reveals dynamic fluctuations in these effects over time, responding to significant market events. These results contribute to the theoretical understanding of financial market behavior by integrating social influence and career concern perspectives, offering insights for both scholars and practitioners in an increasingly complex market landscape.
References
[1]. Ali, S.E.A., Lai, F.-W., & Hassan, R. (2020). Socio-Economic Factors On Sector-Wide Systematic Risk Of Information Security Breaches: Conceptual Framework. In Proceedings of the International Economics and Business Management Conference (pp. 502–512).
[2]. Ali, S.E.A., Lai, F.-W., Hassan, R., & Shad, M.K. (2021). The Long-Run Impact of Information Security Breach Announcements on Investors' Confidence: The Context of Efficient Market Hypothesis. Sustainability, 13, 1066.
[3]. Ali, R.F., Dominic, P., & Ali, K. (2020). Organizational governance, social bonds and information security policy compliance: A perspective towards oil and gas employees. Sustainability, 12, 8576.
[4]. Alfawaz, S., Nelson, K., & Mohannak, K. (2010). Information security culture: A behaviour compliance conceptual framework. In Proceedings of the Eighth Australasian Conference on Information Security-Volume 105 (pp. 47–55).
[5]. Aurigemma, S., & Mattson, T. (2017). Deterrence and punishment experience impacts on ISP compliance attitudes. Information & Computer Security, 25(4), 421–436.
[6]. Bélanger, F., Collignon, S., Enget, K., & Negangard, E. (2017). Determinants of early conformance with information security policies. Information & Management, 54(7), 887–901.
[7]. Bongiovanni, I. (2019). The least secure places in the universe? A systematic literature review on information security management in higher education. Computers & Security, 86, 350–357.
[8]. Boss, S., Galletta, D., Lowry, P.B., Moody, G.D., & Polak, P. (2015). What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Quarterly, 39(4), 837–864.
[9]. Chang, K.-C., & Seow, Y.M. (2019). Protective measures and security policy non-compliance intention: It vision conflict as a moderator. Journal of Organizational and End User Computing, 31(1), 1–21.
[10]. Connolly, L.Y., Lang, M., & Wall, D.S. (2019). Information Security Behavior: A Cross-Cultural Comparison of Irish and US Employees. Information Systems Management, 36(4), 306–322.
[11]. Corradini, I. (2020). Security: Human Nature and Behaviour. In Building a Cybersecurity Culture in Organizations (Vol. 1, pp. 23–47). Springer.
[12]. D'Arcy, J., & Greene, G. (2014). Security culture and the employment relationship as drivers of employees' security compliance. Information Management & Computer Security, 22(5), 474–489.
[13]. D'Arcy, J., & Herath, T. (2011). A review and analysis of deterrence theory in the IS security literature: Making sense of the disparate findings. European Journal of Information Systems, 20(6), 643–658.
[14]. D'Arcy, J., Herath, T., & Shoss, M.K. (2014). Understanding employee responses to stressful information security requirements: A coping perspective. Journal of Management Information Systems, 31(2), 285–318.
[15]. D'Arcy, J., & Lowry, P.B. (2019). Cognitive-affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study. Information Systems Journal, 29(1), 43–69.
[16]. D'Arcy, J., & Teh, P.-L. (2019). Predicting employee information security policy compliance on a daily basis: The interplay of security-related stress, emotions, and neutralization. Information & Management, 56(7), 103–151.
[17]. Dinev, T., Goo, J., Hu, Q., & Nam, K. (2009). User behaviour towards protective information technologies: The role of national cultural differences. Information Systems Journal, 19(4), 391–412.
[18]. Doherty, N.F., & Tajuddin, S.T. (2018). Towards a user-centric theory of value-driven information security compliance. Information Technology & People, 31(2), 348–367.
[19]. Dong, K., Ali, R.F., Dominic, P., & Ali, S.E.A. (2021). The Effect of Organizational Information Security Climate on Information Security Policy Compliance: The Mediating Effect of Social Bonding towards Healthcare Nurses. Sustainability, 13, 2800.
[20]. Harnesk, D., & Lindström, J. (2011). Shaping security behaviour through discipline and agility: Implications for information security management. Information Management & Computer Security, 19(4), 262–276.
[21]. Herath, T., & Rao, H.R. (2009a). Protection motivation and deterrence: A framework for security policy compliance in organisations. European Journal of Information Systems, 18(2), 106–125.
[22]. Herath, T., & Rao, H.R. (2009b). Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems, 47(2), 154–165.
[23]. Hina, S., & Dominic, P.D.D. (2018). Information security policies' compliance: A perspective for higher education institutions. Journal of Computer Information Systems, 60(3), 201–211.
[24]. Hsu, J.S.-C., Shih, S.-P., Hung, Y.W., & Lowry, P.B. (2015). The role of extra-role behaviors and social controls in information security policy effectiveness. Information Systems Research, 26(2), 282–300.
[25]. Hu, Q., Dinev, T., Hart, P., & Cooke, D. (2012). Managing employee compliance with information security policies: The critical role of top management and organizational culture. Decision Sciences, 43(4), 615–660.
[26]. Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security, 31(1), 83–95.
[27]. Jai-Yeol, S. (2011). Out of fear or desire? Toward a better understanding of employees' motivation to follow IS security policies. Information & Management, 48(7), 296–302.
[28]. Kajtazi, M., Cavusoglu, H., Benbasat, I., & Haftor, D. (2018). Escalation of commitment as an antecedent to noncompliance with information security policy. Information & Computer Security, 26(2), 171–193.
[29]. Lankton, N.K., Stivason, C., & Gurung, A. (2019). Information protection behaviors: Morality and organizational criticality. Information & Computer Security, 27(4), 468–488.
[30]. Liu, C., Wang, N., & Liang, H. (2020). Motivating information security policy compliance: The critical role of supervisor-subordinate guanxi and organizational commitment. International Journal of Information Management, 54, 102152.