A beneficial. ( 2011 ), “ Advice shelter and you may sarbanes-oxley conformity: an exploratory investigation ”, Journal of information Assistance , Vol

A beneficial. ( 2011 ), “ Advice shelter and you may sarbanes-oxley conformity: an exploratory investigation ”, Journal of information Assistance , Vol

Smith , T. , Higgs , J.L. and you can Pinsker , Roentgen. ( 2018 ), “ Create auditors rates breach chance in their review costs? ”, Record of information Possibilities , in force .

Spanos , G. and you can Angelis , L. ( 2016 ), “ The brand new feeling of data safety occurrences toward stock market: a scientific literature comment ”, Machines and Shelter , Vol. 58 , pp. 216 – 229 .

Stafford , T. , Deitz , G. and you can Li , Y. ( 2018 ), “ This new part regarding interior review and affiliate education information safety coverage compliance ”, Managerial Auditing Diary , Vol. 33 No. cuatro , pp. 410 – 424 .

Steinbart , P.J. , Raschke , R. , Girl , G.F. and you may Dilla , W.Letter. ( 2012 ), “ The relationship anywhere between inner review and you will advice shelter: an enthusiastic exploratory analysis ”, Around the world Journal away from Accounting Recommendations Options , Vol. thirteen Zero. step three , pp. 228 – 243 .

Steinbart , P.J. , Raschke , Roentgen. , Gal , G.F. and you can Dilla , W.Letter. ( 2013 ), “ Advice safeguards professionals’ thinking about the matchmaking amongst the recommendations defense and you may inner review features ”, Log of data Options , Vol. 27 Zero. 2 , pp. 65 – 86 .

Steinbart , P.J. , Raschke , R.L. , Girl , G. and you will Dilla , W.N. ( 2016 ), “ SECURQUAL: something having contrasting the potency of firm suggestions safety applications ”, Journal of data Possibilities , Vol. 30 Zero. step one , pp. 71 – ninety five .

Tanaka , H. , Matsuura , K. and you may Sudoh , O. ( 2005 ), “ Susceptability and pointers safety capital: an empirical analysis off E-local government from inside the The japanese ”, Record out of Accounting and you will Public Plan , Vol. twenty four No. 1 , pp. 37 – 59 .

Von Solms , Roentgen. and you can van Niekerk , J. ( 2013 ), “ Out of advice shelter to cyber protection ”, Servers and you can Security , Vol. 38 , pp. 97 – 102 .

Wang , Y. , Kannan , K. and you can Ulmer , J. ( 2013 ), “ The fresh new relationship amongst the disclosure as well as the summation of information cover risk points ”, Guidance Assistance Look , Vol. twenty four Zero. dos , pp. 201 – 218 .

Webster , J. and you may Watson , R. ( 2002 ), “ Examining during the last to set up money for hard times: creating a literary works review ”, MIS Quarterly , Vol. 26 No. dos , pp. xiii – xxiii .

Weidenmier , M. and you may Ramamoorti , S. ( 2006 ), “ Search options from inside the i . t and inner auditing ”, Log of data Expertise , Vol. 20 Zero. step 1 , pp. 205 – 219 .

Yapa , P.W.S. , Ukwatte Jalathge , S.L. and you can Siriwardhane , P. ( 2017 ), “ The fresh new professionalisation off auditing inside quicker build places: the truth of Sri Lanka ”, Managerial Auditing Record , Vol. 32 Nos 4/5 , pp. 500 – 523 .

After that learning

Massaro , Yards. , Du ), “ To the shoulders of creatures: carrying out an organized literary works comment during the bookkeeping ”, Bookkeeping, Auditing and you may Responsibility Record , Vol. 30 Zero. 5 , pp. 767 – 801 .

N. ( 2018 ), “ The fresh determine of a good dating between your internal review and you may guidance protection qualities into pointers defense consequences ”, Bookkeeping, Teams and you may Neighborhood , inside push

Which books synthesis keeps around three no. 1 objectives. The first is to add an intensive post on the current academic knowledge to the cybersecurity in the bookkeeping and auditing research and to bring a couple of categories with the hence this research fit. The following objective is to try to select key subjects and you may conditions that possess appeared in the last books. Eventually, the 3rd objective should be to pick openings about literature and you will recommend fruitful coming research solutions. So it books analysis enjoys extreme effects to have lookup and exercise of the explaining, particularly, the advantages of and you will obstacles to help you suggestions revealing. It synthesis along with highlights the necessity of the fresh model to own advice-cover (cybersecurity) opportunities by the Gordon and Loeb (2002). Its model has had a significant amount of notice about books that is known as the Gordon–Loeb Design. Giving a financial design one to decides the optimal amount to spend money on protecting a given selection of guidance, they results in medical browse and practice.

Overall, they debated your recommendations articles of information-safety activities is actually high in a few industries than in other people. Agencies during the areas such banks, providers services, insurance policies, telecommunications, economic features, transportation and you can health care appear to be a whole lot more proactive in the taking volunteer revelation away from cover-associated situations (Gordon et al. At exactly the same time, Gordon and you may Loeb (2006) ideal direction for the productive management of cybersecurity. Their cost-work for studies compared the expenses away from a task using its masters, and article writers contended one provided the key benefits of an additional information-shelter pastime exceed its can cost you, it is worthwhile to engage in that craft. After that, they mentioned that if you are significantly more cybersecurity cannot usually work with a keen providers, cyber-periods are one of the main dangers that organizations must handle (Amir mais aussi al.

Just after considering the new documents, a couple of kinds towards the hence these types of 39 education fit you can expect to end up being constructed. And this, these groups is the consequence of a life threatening and you will constructive studies of the degree not as much as comment courtesy conclusion, research and research. To explain, which synthesis recognized four browse streams that are about cybersecurity. Also, it is vital to categorize the research channels connected with cybersecurity regarding bookkeeping career to include investigation for the amount of craft inside the a specific look occupation, making it possible for the outcome for use to evaluate the fresh efficiency of lookup streams, scientists and you can journals. Methodologically, this research generates towards the earlier in the day books so you can deepen the newest knowledge from cybersecurity search. To help you explain, this article is not directed at a certain cybersecurity-related question or material or restricted to a certain geography.

Hausken (2007) noticed two firms that is actually at the mercy of cyber-episodes. The businesses guard by themselves by revealing guidance together and you can investing in protection. For each and every firm decides to located information about the other firm’s safeguards breaches. Hausken (2007) assessed the fresh new bonuses so you can voluntarily offer recommendations to another agency and you will the newest exchange-offs that each corporation makes anywhere between discussing guidance and you will investing cover. An identical browse introduced the fresh vintage free-rider state to describe as to why recommendations sharing will doesn’t are present, and just have highlighted that vintage 100 % free-driver was also acquiesced by Gordon ainsi que al. (2003). Hausken (2007, p. 674) indicated that “suggestions sharing develops linearly about interdependence anywhere between companies, that’s no with negative or no interdependence.” To close out, Hausken (2007, p. 647) ideal one to “it is the interdependence anywhere between businesses that is the vital thing determinator of data discussing and not new competition.” Towards an associated notice, Gordon ainsi que al. (2015a) suggested you to academics, bodies officials and you will business managers has actually recommended suggestions revealing associated with cybersecurity, explaining you to:

And that, using a pattern research strategy, Rahimian ainsi que al. (2016) developed the Functional, Personal image, Legal (OPL) multidimensional risk specs design in order to quantitatively imagine the latest share away from security control in position while the control insufficiency exposure as from forgotten regulation. They contributed to the fresh new literature from the indicating the OPL model can be used to carry out an in depth chance testing of edarling discount code all of the corporate investigation. It searching for is actually important because this has been burdensome for the interior review means (IAF) to assess control lack chance (CDR) in the field of recommendations shelter.

Author

Consultoria

Leave a comment

O seu endereço de e-mail não será publicado. Campos obrigatórios são marcados com *