An integrative review and analysis of cybersecurity research: Current state and future directions
S Walton, PR Wheeler, Y Zhang… - Journal of Information …, 2021 - publications.aaahq.org
Advances in information technology have greatly changed communications and business
transactions between firms and their customers and suppliers. As a result, cybersecurity risk …
transactions between firms and their customers and suppliers. As a result, cybersecurity risk …
Emerging technologies' contribution to the digital transformation in accountancy firms
Digitalization becomes a key strategy for the success of businesses, which in today's critical
times, are under remarkable pressures and diffused uncertainty. The rapid pace of …
times, are under remarkable pressures and diffused uncertainty. The rapid pace of …
Cybersecurity in accounting research
The increasing use of digital technologies among companies has emphasised the
importance and role of cybersecurity as a new risk management dimension, not least …
importance and role of cybersecurity as a new risk management dimension, not least …
Cybersecurity awareness and market valuations
This paper introduces a measure of firm-specific cybersecurity awareness that can be used
in empirical research exploring cyber-related issues facing corporations. It extends and …
in empirical research exploring cyber-related issues facing corporations. It extends and …
Correlates of the internal audit function's use of data analytics in the big data era: Global evidence
In the big data era, internal audit functions (IAFs) should innovate their techniques so as to
add value to their organizations. The use of data analytics (DA) increases IAFs' ability to …
add value to their organizations. The use of data analytics (DA) increases IAFs' ability to …
[HTML][HTML] Effectiveness of cybersecurity audit
The aim of this paper is to analyze the effectiveness of internal audit of cybersecurity. We
developed a Cybersecurity Audit Index composed of three dimensions–planning, performing …
developed a Cybersecurity Audit Index composed of three dimensions–planning, performing …
Quantifying the evolution of it audit and control practices: A bibliometric approach
This research conducts a comprehensive review spanning nine years of literature on IT audit
and control practices. Utilizing bibliometric and content analyses, it examines 88 articles …
and control practices. Utilizing bibliometric and content analyses, it examines 88 articles …
Information technology governance: Reflections on the past and future directions
CL Wilkin, RH Chenhall - Journal of Information Systems, 2020 - publications.aaahq.org
This study investigates the extant literature concerned with Information Technology
Governance (ITG), published in leading accounting and management information systems …
Governance (ITG), published in leading accounting and management information systems …
Impact of the assertive and advisory role of internal auditing on proactive measures to enhance cybersecurity: Evidence from GCC
Purpose This paper aims to examine the impact of the assurance and advisory role of
internal audit (ADRIA) on organisational, human and technical proactive measures to …
internal audit (ADRIA) on organisational, human and technical proactive measures to …
Internal auditing and cyber security: audit role and procedural contribution
Businesses operate in a dynamic environment that is constantly changing and in which they
are undermined by various risks. One in particular, is that of cyber security. Internal auditors …
are undermined by various risks. One in particular, is that of cyber security. Internal auditors …