Smith , T. , Higgs , J.L. and you may Pinsker , R. ( 2018 ), “ Carry out auditors rates violation risk within their review charges? ”, Diary of data Assistance , inside the push .
Spanos , Grams. and you will Angelis , L. ( 2016 ), “ The new impression of information shelter situations on the stock-exchange: a health-related literature review ”, Servers and you can Security , Vol. 58 , pp. 216 – 229 .
Stafford , T. , Deitz , Grams. and you may Li , Y. ( 2018 ), “ The character regarding internal review and you can representative studies pointers safeguards policy conformity ”, Managerial Auditing Diary , Vol. 33 No. cuatro , pp. 410 – 424 .
Steinbart , P.J. , Raschke , Roentgen. , Girl , Grams.F. and Dilla , W.Letter. ( 2012 ), “ The relationship anywhere between inner review and you will guidance cover: a keen exploratory analysis ”, Global Diary regarding Bookkeeping Recommendations Possibilities , Vol. thirteen Zero. step 3 , pp. 228 – 243 .
Steinbart , P.J. , Raschke , Roentgen. , Gal , G.F. and you can Dilla , W.Letter. ( 2013 ), “ Recommendations defense professionals’ perceptions concerning relationship within advice security and you will internal audit services ”, Log of information Expertise , Vol. 27 No. dos , pp. 65 – 86 .
Steinbart , P.J. , Raschke , R.L. , Gal , Grams. and you can Dilla , W.N. ( 2016 ), “ SECURQUAL: a device having contrasting the potency of corporation recommendations cover programs ”, Diary of data Systems , Vol. 29 No. 1 , pp. 71 – ninety-five .
Tanaka , H. , Matsuura , K. and you will Sudoh , O. ( 2005 ), “ Vulnerability and you may pointers security capital: an enthusiastic empirical investigation out-of Elizabeth-local government during the The japanese ”, Journal out of Bookkeeping and you can Public Rules , Vol. twenty-four Zero. 1 , pp. 37 – 59 .
Von Solms , R. and you can van Niekerk , J. ( 2013 ), “ Of guidance defense in order to cyber security ”, Machines and you will Shelter , Vol. 38 , pp. 97 – 102 .
Wang , Y. , Kannan , K. and Ulmer , J. ( 2013 ), “ New connection within disclosure together with conclusion of information shelter chance circumstances ”, Advice Options Lookup , Vol. 24 Zero. dos , pp. 201 – 218 .
Webster , J. and you will Watson , R. ( 2002 ), “ Analysing the past to arrange money for hard times: creating a literature opinion ”, MIS Every quarter , Vol. twenty-six No. 2 , pp. xiii – xxiii .
Weidenmier , Meters. and you may Ramamoorti , S. ( 2006 ), “ Lookup options in i . t and you will internal auditing ”, Record of data Systems , Vol. 20 No. step 1 , pp. 205 – 219 .
Yapa , P.W.S. , Ukwatte Jalathge , S.L. and you may Siriwardhane , P. ( 2017 ), “ The professionalisation out of auditing in smaller arranged regions: possible regarding Sri Lanka ”, Managerial Auditing Record , Vol. thirty two Nos 4/5 , pp. five-hundred – 523 .
Further reading
Massaro , Yards. , Du ), “ To your shoulders from giants: carrying out a structured literature review when you look at the bookkeeping ”, Bookkeeping, Auditing and you will Accountability Log , Vol. 30 Zero. 5 , pp. 767 – 801 .
N. ( 2018 ), “ The dictate a good dating within internal audit and you will suggestions defense qualities for the information coverage outcomes ”, Accounting, Organizations and you may Area , inside the force
This literature synthesis possess around three top objectives. The first is to include a comprehensive overview of the current academic knowledge towards the cybersecurity into the accounting and you will auditing look and also to give a set of categories on and this these studies fit. The second purpose is to try to pick key subject areas and you will conditions that has actually starred in the previous literary works. Ultimately, the next purpose is to try to select holes on the books and you can strongly recommend fruitful upcoming browse solutions. It literature investigation keeps significant implications having lookup and exercise by the outlining, such as for instance, the benefits of and you can barriers in order to pointers revealing. This synthesis plus shows the significance of the newest model getting information-shelter (cybersecurity) financial investments because of the Gordon and Loeb (2002). The design has received way too much desire in the literary works that is referred to as Gordon–Loeb Design. By giving an economic model one find the optimal amount to invest in securing confirmed selection of guidance, it causes scientific browse and exercise.
Complete, they debated your pointers posts of information-shelter circumstances is highest in certain industries compared to others. Businesses when you look at the marketplaces such as for example banking institutions, organization qualities, insurance policies, interaction, financial services, transportation and healthcare seem to be a lot more hands-on inside getting volunteer revelation out-of protection-related situations (Gordon et al. While doing so, Gordon and you may Loeb (2006) recommended direction to your effective management of cybersecurity. Its prices-work with studies compared the expense of a task using its benefits, therefore the experts debated that as long as the key benefits of a supplementary guidance-shelter interest exceed their can cost you, it is beneficial to engage in you to craft. Subsequent, it said that if you’re alot more cybersecurity will not constantly work with an team, cyber-periods are among the fundamental risks you to teams must control (Amir mais aussi al.
Just after examining the new records, a collection of categories to the and that these types guyspy tips of 39 studies fit you’ll become created. And this, this type of kinds may be the results of a life threatening and you will constructive study of your own training under opinion compliment of realization, analysis and you may assessment. So you’re able to clarify, which synthesis recognized five search streams that will be connected with cybersecurity. Additionally, you should categorize the research channels linked to cybersecurity regarding the accounting field to add analysis toward quantity of pastime inside the a certain look profession, allowing the outcomes for use to test brand new efficiency out of lookup streams, researchers and you can journals. Methodologically, this research yields into earlier literary works so you’re able to deepen the information regarding cybersecurity browse. So you can clarify, this article isn’t geared towards a specific cybersecurity-related question otherwise matter otherwise simply for a specific topography.
Hausken (2007) sensed several companies that is actually susceptible to cyber-episodes. The businesses safeguard themselves by the discussing pointers together and committing to defense. For each and every business decides to discovered information about others company’s safety breaches. Hausken (2007) analyzed the newest bonuses in order to willingly give pointers to some other agency and you can new exchange-offs that each firm renders between discussing guidance and you can investing protection. A similar research introduced brand new vintage 100 % free-driver problem to describe as to why suggestions sharing commonly does not exist, and have showcased that vintage free-driver was also acquiesced by Gordon et al. (2003). Hausken (2007, p. 674) showed that “pointers revealing develops linearly on interdependence anywhere between companies, and that’s zero with bad or no interdependence.” To close out, Hausken (2007, p. 647) advised that “it’s the interdependence between companies that is the vital thing determinator of data sharing rather than new competitiveness.” Into a connected mention, Gordon mais aussi al. (2015a) recommended one academics, bodies authorities and you will business executives has actually needed pointers revealing related to cybersecurity, discussing you to definitely:
And that, using a design science means, Rahimian ainsi que al. (2016) developed the Functional, Societal picture, Judge (OPL) multidimensional exposure specification model to quantitatively imagine the brand new contribution of safety control in place as well as the handle insufficiency exposure as away from forgotten regulation. They resulted in the fresh new books from the demonstrating the OPL model can be used to carry out a detailed risk research of the many corporate study. Which looking are important because it was problematic for the latest internal audit mode (IAF) to evaluate control insufficiency risk (CDR) in the field of suggestions shelter.