[HTML][HTML] From cobit to iso 42001: Evaluating cybersecurity frameworks for opportunities, risks, and regulatory compliance in commercializing large language models

TR McIntosh, T Susnjak, T Liu, P Watters, D Xu… - Computers & …, 2024 - Elsevier
This study investigated the integration readiness of four predominant cybersecurity
Governance, Risk and Compliance (GRC) frameworks–NIST CSF 2.0, COBIT 2019, ISO …

The ISO/IEC 27001 information security management standard: how to extract value from data in the IT sector

F Kitsios, E Chatzidimitriou, M Kamariotou - Sustainability, 2023 - mdpi.com
In order to handle their regulatory and legal responsibilities and to retain trustworthy
strategic partnerships, enterprises need to be dedicated to guaranteeing the privacy …

Exploring the adoption of the international information security management system standard ISO/IEC 27001: a web mining-based analysis

M Mirtsch, J Kinne, K Blind - IEEE Transactions on Engineering …, 2020 - ieeexplore.ieee.org
In the light of digitalization and recent EU policy initiatives, information is an important asset
that organizations of all sizes and from all sectors should secure. However, in order to …

Information security and value creation: The performance implications of ISO/IEC 27001

M Podrecca, G Culot, G Nassimbeni, M Sartor - Computers in Industry, 2022 - Elsevier
Although protecting information is the key challenge in a business environment
characterized by increasing digitalization and connectivity, the impact of firms' investments in …

Develo** a risk analysis strategy framework for impact assessment in information security management systems: A case study in it consulting industry

F Kitsios, E Chatzidimitriou, M Kamariotou - Sustainability, 2022 - mdpi.com
Organizations must be committed to ensuring the confidentiality, availability, and integrity of
the information in their possession to manage legal and regulatory obligations and to …

Information security management in ICT and non-ICT sector companies: A preventive innovation perspective

M Mirtsch, K Blind, C Koch, G Dudek - Computers & security, 2021 - Elsevier
Despite the growing dependence of companies on information technology and the
increasingly negative impact of security incidents worldwide, there is little research on the …

Security first, security by design, or security pragmatism–strategic roles of IT security in digitalization projects

F Guggenmos, B Häckel, P Ollig, B Stahl - Computers & Security, 2022 - Elsevier
Although digital transformation is geared to achieving strategic goals such as efficiency or
competitive advantages, it involves digital threats. IT security is an overarching task for …

The impact of audit firms' characteristics on audit fees following information security breaches

JC Yen, JH Lim, T Wang, C Hsu - Journal of Accounting and Public Policy, 2018 - Elsevier
Given the importance of auditors' assessing business risks and evaluating internal controls,
we investigate whether an audit firm's industry expertise, tenure, and size can help its …

Weathering the storm: examining how organisations navigate the sea of cybersecurity regulations

JG Proudfoot, WA Cram, S Madnick - European Journal of …, 2024 - Taylor & Francis
Governments around the world routinely regulate the activities of private enterprises to guide
the behaviour of individuals and organisations towards acceptable norms. This holds true in …

Does cybersecurity maturity level assurance improve cybersecurity risk management in supply chains?

JM Song, T Wang, JC Yen, YH Chen - International Journal of Accounting …, 2024 - Elsevier
This study uses analytical models to investigate whether requiring cybersecurity assurance
or a particular maturity level for vendors or contractors will help them improve their …