Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Blockchain technology in the future of business cyber security and accounting
This study looks into the current, and potential uses of Blockchain technology in business,
specifically in Accounting and in cybersecurity. We relate Blockchain uses to current …
specifically in Accounting and in cybersecurity. We relate Blockchain uses to current …
Economic valuation for information security investment: a systematic literature review
D Schatz, R Bashroush - Information Systems Frontiers, 2017 - Springer
Research on technological aspects of information security risk is a well-established area
and familiar territory for most information security professionals. The same cannot be said …
and familiar territory for most information security professionals. The same cannot be said …
Cybersecurity in accounting research
The increasing use of digital technologies among companies has emphasised the
importance and role of cybersecurity as a new risk management dimension, not least …
importance and role of cybersecurity as a new risk management dimension, not least …
Board characteristics and cybersecurity disclosure: evidence from the UK
The purpose of this study is to explore the influence of board of directors characteristics on
the cybersecurity disclosure (CSD) of firms listed on the London Stock Exchange. The …
the cybersecurity disclosure (CSD) of firms listed on the London Stock Exchange. The …
Audit firm assessments of cyber-security risk: evidence from audit fees and SEC comment letters
This study investigates the impact of cyber-security incidents on audit fees. Using a sample
of 5,687 firms, we find that (i) breached firms are charged 12% higher audit fees, and (ii) …
of 5,687 firms, we find that (i) breached firms are charged 12% higher audit fees, and (ii) …
The impact of audit firms' characteristics on audit fees following information security breaches
Given the importance of auditors' assessing business risks and evaluating internal controls,
we investigate whether an audit firm's industry expertise, tenure, and size can help its …
we investigate whether an audit firm's industry expertise, tenure, and size can help its …
[HTML][HTML] A cybersecurity risk quantification and classification framework for informed risk mitigation decisions
Data breaches have been causing havoc for many years and continue to rise, demanding a
more comprehensive framework to assess their severity. This study proposes a …
more comprehensive framework to assess their severity. This study proposes a …
Institutional isomorphism in organizational cybersecurity: A text analytics approach
This research examines how organizational cybersecurity responses become isomorphic
over time. Drawing on institutional theory, this study theorizes that mimetic pressures …
over time. Drawing on institutional theory, this study theorizes that mimetic pressures …
Does CIO risk appetite matter? Evidence from information security breach incidents
After a series of recent high-profile information security breach incidents, practitioners have
engaged in heated debates about the role of the chief information officer (CIO), particularly …
engaged in heated debates about the role of the chief information officer (CIO), particularly …
Nexus among blockchain technology adoption and firm performance: perspective from mediating and moderating effects
Purpose This study aims to examine the relationship between blockchain technology (BCT)
adoption and firm performance (FIP) mediated by cyber-security risk management (CSRM) …
adoption and firm performance (FIP) mediated by cyber-security risk management (CSRM) …