A beneficial. ( 2011 ), “ Suggestions protection and you will sarbanes-oxley conformity: a keen exploratory data ”, Log of information Possibilities , Vol

A beneficial. ( 2011 ), “ Suggestions protection and you will sarbanes-oxley conformity: a keen exploratory data ”, Log of information Possibilities , Vol

Smith , T. , Higgs , J.L. and you will Pinsker , R. ( 2018 ), “ Would auditors speed violation exposure in their audit costs? ”, Journal of information Systems , within the force .

Spanos , G. and you will Angelis , L. ( 2016 ), “ The latest impact of information coverage situations for the stock-exchange: a medical literature comment ”, Hosts and you may Coverage , Vol. 58 , pp. 216 – 229 .

Stafford , T. , Deitz , Grams. and you can Li , Y. ( 2018 ), “ The newest part from interior audit and you will affiliate training pointers defense coverage compliance ”, Managerial Auditing Journal , Vol. 33 Zero. 4 , pp. 410 – 424 .

Steinbart , P.J. , Raschke , R. , Girl , G.F. and you can Dilla , W.Letter. ( 2012 ), “ The relationship anywhere between internal review and you will information safeguards: an exploratory investigation ”, Internationally Diary of Bookkeeping Pointers Systems , Vol. 13 Zero. step three , pp. 228 – 243 .

Steinbart , P.J. , Raschke , R. , Gal , Grams.F. and you will Dilla , W.Letter. ( 2013 ), “ Suggestions protection professionals’ thinking concerning relationships involving the recommendations security and you may inner audit properties ”, Journal of information Systems , Vol. 27 Zero. 2 , pp. 65 – 86 .

Steinbart , P.J. , Raschke , Roentgen.L. , Gal , G. and Dilla , W.N. ( 2016 ), “ SECURQUAL: a device for comparing the effectiveness of firm guidance coverage apps ”, Record of information Possibilities , Vol. 31 Zero. step one , pp. 71 – ninety-five .

Tanaka , H. , Matsuura , K. and Sudoh , O. ( 2005 ), “ Vulnerability and you will suggestions cover resource: a keen empirical research away from Elizabeth-state into the Japan ”, Diary regarding Accounting and you will Public Rules , Vol. twenty four No. step one , pp. 37 – 59 .

Von Solms , R. and you will van Niekerk , J. ( 2013 ), “ Out-of recommendations safety to help you cyber protection ”, Computers and you can Safety , Vol. 38 , pp. 97 – 102 .

Wang , Y https://datingranking.net/cougar-life-review/. , Kannan , K. and you can Ulmer , J. ( 2013 ), “ New relationship amongst the disclosure additionally the summation of data defense risk affairs ”, Information Assistance Look , Vol. twenty four Zero. 2 , pp. 201 – 218 .

Webster , J. and you will Watson , R. ( 2002 ), “ Analysing for the past to set up for future years: composing a literary works comment ”, MIS Quarterly , Vol. twenty six No. 2 , pp. xiii – xxiii .

Weidenmier , Yards. and Ramamoorti , S. ( 2006 ), “ Look solutions in i . t and you may internal auditing ”, Log of information Possibilities , Vol. 20 Zero. step one , pp. 205 – 219 .

Yapa , P.W.S. , Ukwatte Jalathge , S.L. and you will Siriwardhane , P. ( 2017 ), “ The professionalisation regarding auditing during the reduced set-up regions: possible off Sri Lanka ”, Managerial Auditing Diary , Vol. thirty-two Nos 4/5 , pp. 500 – 523 .

Subsequent studying

Massaro , Yards. , Du ), “ Into shoulders off monsters: undertaking a structured literary works comment in the bookkeeping ”, Accounting, Auditing and you can Liability Log , Vol. 29 Zero. 5 , pp. 767 – 801 .

N. ( 2018 ), “ Brand new dictate a good dating amongst the internal review and you will suggestions shelter attributes with the guidance protection effects ”, Accounting, Organizations and you can Area , when you look at the press

This literature synthesis has actually three number 1 expectations. The first is to incorporate an intensive summary of the present day informative knowledge into cybersecurity inside bookkeeping and you may auditing search in order to bring a couple of categories towards the which this research complement. The second purpose is to try to choose secret topics and you may conditions that has actually starred in the last literature. Finally, the next goal is to try to pick holes about literature and recommend fruitful future research opportunities. So it literature data keeps significant effects to possess look and practice by the describing, including, some great benefits of and you will obstacles in order to recommendations discussing. That it synthesis together with features the importance of the brand new design to own information-shelter (cybersecurity) assets by the Gordon and you may Loeb (2002). The model has received too much attract regarding the literary works and that is known as the Gordon–Loeb Design. By providing an economic model one to establishes the perfect total buy protecting certain band of information, it leads to scientific lookup and practice.

Overall, it contended the pointers content of information-defense items are large in certain marketplaces than in someone else. Companies in the marketplaces such financial institutions, organization services, insurance, correspondence, monetary functions, transportation and you can health care be seemingly a great deal more proactive inside getting voluntary disclosure regarding safety-relevant things (Gordon mais aussi al. Simultaneously, Gordon and you can Loeb (2006) ideal direction towards the effective handling of cybersecurity. The cost-work with analysis opposed the expense of a job with its masters, additionally the article authors contended one for as long as the advantages of an extra suggestions-security pastime go beyond their will cost you, it is beneficial to engage in you to definitely activity. Subsequent, it asserted that if you find yourself a great deal more cybersecurity does not always benefit an enthusiastic providers, cyber-episodes are among the fundamental risks that communities need certainly to manage (Amir mais aussi al.

Shortly after analyzing the files, a collection of kinds towards and that these 39 training complement you will be created. And that, these types of classes would be the result of a significant and you will positive analysis of your own training lower than opinion because of summary, analysis and you will investigations. To help you clarify, so it synthesis identified five browse avenues that will be about cybersecurity. In addition, it’s important to categorize the research avenues related to cybersecurity from the bookkeeping field to include analysis on number of hobby within the a particular search community, allowing the results for use to evaluate new show from look channels, boffins and you will publications. Methodologically, this research builds to the prior books so you’re able to deepen the new information off cybersecurity lookup. So you can clarify, the content isn’t geared towards a specific cybersecurity-relevant concern or topic or simply for a certain geography.

Hausken (2007) noticed a couple businesses that try subject to cyber-episodes. The businesses guard by themselves by revealing recommendations along and you will investing in protection. For each and every agency chooses to discover information about additional firm’s defense breaches. Hausken (2007) analyzed the fresh new incentives to voluntarily render recommendations to some other organization and you will this new change-offs that every firm helps make between revealing information and you can investing safety. A similar search produced new vintage 100 % free-driver state to spell it out why advice discussing usually doesn’t exists, while having highlighted your vintage 100 % free-driver was also identified by Gordon mais aussi al. (2003). Hausken (2007, p. 674) showed that “advice revealing expands linearly in the interdependence between agencies, that’s zero having bad if any interdependence.” To conclude, Hausken (2007, p. 647) ideal you to definitely “simple fact is that interdependence anywhere between firms that is the vital thing determinator of data discussing rather than new competitiveness.” Towards the a related mention, Gordon ainsi que al. (2015a) recommended that teachers, bodies authorities and corporate executives has actually necessary advice sharing pertaining to cybersecurity, outlining you to:

And this, having fun with a routine technology strategy, Rahimian mais aussi al. (2016) developed the Functional, Societal picture, Court (OPL) multidimensional exposure specs model so you’re able to quantitatively imagine the fresh share regarding safety regulation in position as well as the control deficiency risk because the of destroyed regulation. They triggered the brand new literary works because of the demonstrating the OPL model are often used to perform an in depth chance evaluation of all business data. That it finding is important since it was hard for the interior audit mode (IAF) to assess manage lack chance (CDR) in neuro-scientific guidance cover.

Leave a Reply