A beneficial. ( 2011 ), “ Suggestions defense and sarbanes-oxley compliance: a keen exploratory study ”, Journal of data Expertise , Vol

A beneficial. ( 2011 ), “ Suggestions defense and sarbanes-oxley compliance: a keen exploratory study ”, Journal of data Expertise , Vol

Smith , T. , Higgs , J.L. and Pinsker , R. ( 2018 ), “ Create auditors rates infraction risk inside their review costs? ”, Log of information Possibilities , in drive .

Spanos , G. and you may Angelis , L. ( 2016 ), “ The new feeling of data safety events for the stock exchange: a medical books review ”, Hosts and you can Protection , Vol. 58 , pp. 216 – 229 .

Stafford , T. , Deitz , Grams. and you will Li , Y. ( 2018 ), “ New role out of internal review and you can user training recommendations defense policy compliance ”, Managerial Auditing Record , Vol. 33 Zero. cuatro , pp. 410 – 424 .

Steinbart , P.J. , Raschke , Roentgen. , Girl , Grams.F. and you may Dilla , W.N. ( 2012 ), “ The relationship ranging from interior review and you may pointers security: an exploratory analysis ”, Globally Diary of Bookkeeping Suggestions Assistance , Vol. 13 Zero. 3 , pp. 228 – 243 .

Steinbart , P.J. , Raschke , R. , Girl , G.F. and Dilla , W.N. ( 2013 ), “ Advice safeguards professionals’ thinking in regards to the relationship between the advice security and you may inner audit features ”, Record of data Solutions , Vol. 27 Zero. 2 , pp. 65 – 86 .

Steinbart , P.J. , https://datingranking.net/her-dating-review/ Raschke , R.L. , Girl , G. and you can Dilla , W.Letter. ( 2016 ), “ SECURQUAL: something to own contrasting the effectiveness of corporation pointers protection apps ”, Record of data Systems , Vol. 31 No. 1 , pp. 71 – 92 .

Tanaka , H. , Matsuura , K. and Sudoh , O. ( 2005 ), “ Susceptability and you may guidance coverage funding: an enthusiastic empirical investigation out of Age-state inside the Japan ”, Log from Accounting and you can Social Policy , Vol. twenty four Zero. step one , pp. 37 – 59 .

Von Solms , R. and you can van Niekerk , J. ( 2013 ), “ From suggestions defense to help you cyber safeguards ”, Computers and you may Coverage , Vol. 38 , pp. 97 – 102 .

Wang , Y. , Kannan , K. and you will Ulmer , J. ( 2013 ), “ The fresh association involving the revelation and the summary of information protection risk circumstances ”, Guidance Systems Research , Vol. 24 No. 2 , pp. 201 – 218 .

Webster , J. and you can Watson , R. ( 2002 ), “ Examining for the last to prepare money for hard times: writing a books opinion ”, MIS Every quarter , Vol. 26 Zero. dos , pp. xiii – xxiii .

Weidenmier , M. and you will Ramamoorti , S. ( 2006 ), “ Lookup ventures from inside the information technology and you may inner auditing ”, Record of data Expertise , Vol. 20 Zero. step 1 , pp. 205 – 219 .

Yapa , P.W.S. , Ukwatte Jalathge , S.L. and you will Siriwardhane , P. ( 2017 ), “ This new professionalisation out-of auditing for the quicker put up nations: your situation of Sri Lanka ”, Managerial Auditing Diary , Vol. thirty-two Nos 4/5 , pp. five-hundred – 523 .

Then training

Massaro , Meters. , Du ), “ Into shoulders out-of beasts: starting an organized books feedback in bookkeeping ”, Accounting, Auditing and you may Accountability Diary , Vol. 30 No. 5 , pp. 767 – 801 .

N. ( 2018 ), “ The latest determine a good relationships within inner audit and you will guidance protection properties with the pointers security effects ”, Accounting, Organizations and you will Society , from inside the drive

It literary works synthesis provides about three no. 1 objectives. The foremost is to incorporate an intensive report on the modern academic knowledge on the cybersecurity within the accounting and you may auditing research also to offer some classes into and this this research complement. Next purpose should be to pick key subjects and you can problems that features starred in the prior books. Ultimately, the next purpose is to try to identify gaps about literary works and you will strongly recommend fruitful coming browse potential. So it books investigation possess extreme ramifications having search and practice of the discussing, such as for example, the advantages of and barriers so you can pointers discussing. So it synthesis and features the necessity of this new design getting pointers-safety (cybersecurity) opportunities because of the Gordon and you may Loeb (2002). Its design has experienced a lot of attract about literature and that’s referred to as Gordon–Loeb Design. By providing a monetary design you to identifies the suitable add up to invest in securing confirmed group of pointers, it results in medical browse and exercise.

Full, they argued that the suggestions blogs of data-defense factors is large in some marketplaces compared to other people. Providers into the marketplace such as for instance finance companies, organization attributes, insurance, communications, economic qualities, transportation and you may health care seem to be more hands-on when you look at the bringing volunteer disclosure off coverage-related issues (Gordon et al. On the other hand, Gordon and you will Loeb (2006) advised guidelines to the productive handling of cybersecurity. The costs-benefit research opposed the expenses from a task featuring its experts, while the experts debated that for as long as the advantages of a supplementary pointers-protection activity exceed their will cost you, it is worthwhile to take part in one hobby. Next, it asserted that while you are alot more cybersecurity doesn’t constantly work for an enthusiastic company, cyber-symptoms are one of the fundamental risks you to communities have to control (Amir mais aussi al.

Just after considering the brand new documents, a collection of kinds with the which these 39 education complement you will definitely end up being built. And that, this type of classes is the result of a life threatening and you will useful research of degree under comment as a consequence of realization, investigation and you can comparison. In order to explain, it synthesis identified five search channels that are related to cybersecurity. Also, it is essential to identify the research streams regarding cybersecurity about bookkeeping field to incorporate studies to the number of hobby for the a certain lookup occupation, allowing the outcome for use to test the new show out-of lookup streams, boffins and you will journals. Methodologically, this study makes into early in the day literature to deepen the brand new understanding of cybersecurity browse. So you can clarify, this article is not directed at a specific cybersecurity-relevant question otherwise issue otherwise limited by a certain geography.

Hausken (2007) considered a few firms that was susceptible to cyber-periods. The businesses defend by themselves of the sharing guidance collectively and investing security. For every enterprise chooses to receive facts about additional company’s shelter breaches. Hausken (2007) reviewed the newest bonuses so you can willingly give pointers to some other firm and you can the trading-offs that each and every corporation renders ranging from revealing advice and you can committing to safety. A similar lookup put the fresh classic free-driver disease to explain as to the reasons guidance revealing often doesn’t can be found, and get highlighted your vintage 100 % free-rider has also been identified by Gordon et al. (2003). Hausken (2007, p. 674) revealed that “guidance sharing grows linearly on the interdependence ranging from providers, that’s zero with bad or no interdependence.” To summarize, Hausken (2007, p. 647) ideal one to “this is the interdependence ranging from businesses that is the vital thing determinator of data revealing and not this new competition.” Into the an associated notice, Gordon et al. (2015a) advised you to academics, government officials and corporate executives has recommended recommendations revealing pertaining to cybersecurity, describing you to:

And this, playing with a design research strategy, Rahimian mais aussi al. (2016) created the Working, Societal photo, Legal (OPL) multidimensional chance requirements design to quantitatively estimate new contribution regarding safety regulation in position and the handle insufficiency risk while the out-of lost control. It triggered the new literary works by the indicating that the OPL model are often used to carry out reveal risk comparison of all corporate analysis. So it selecting are important because it has been problematic for the brand new internal review mode (IAF) to evaluate control lack risk (CDR) in the field of guidance coverage.

Trả lời

Email của bạn sẽ không được hiển thị công khai. Các trường bắt buộc được đánh dấu *

Nhắn tin qua Facebook Zalo:0982669299