Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Antecedents and consequences of data breaches: A systematic review
Research on data breaches is scattered across disciplines and methodologies. To help
consolidate it, we review 43 articles on data breaches' antecedents and 83 on their …
consolidate it, we review 43 articles on data breaches' antecedents and 83 on their …
Information security management needs more holistic approach: A literature review
Abstract Information technology has dramatically increased online business opportunities;
however these opportunities have also created serious risks in relation to information …
however these opportunities have also created serious risks in relation to information …
Evaluating the cyber security readiness of organizations and its influence on performance
The acceleration of cyber-attacks in recent years has negatively impacted the overall
performance of organizations around the world. Organizations face the challenge of …
performance of organizations around the world. Organizations face the challenge of …
The impact of executives' IT expertise on reported data security breaches
Data security breaches (DSBs) are increasing investor and regulator pressure on firms to
improve their IT governance (ITG) in an effort to mitigate the related risk. Drawing on upper …
improve their IT governance (ITG) in an effort to mitigate the related risk. Drawing on upper …
Operational IT failures, IT value destruction, and board-level IT governance changes
This paper presents an empirical study of changes that firms implement in their board-level
IT governance (ITG) upon experiencing operational IT failures. Consistent with the …
IT governance (ITG) upon experiencing operational IT failures. Consistent with the …
The influence of a good relationship between the internal audit and information security functions on information security outcomes
Given the increasing financial impact of cybercrime, it has become critical for companies to
manage information security risk. The practitioner literature has long argued that the internal …
manage information security risk. The practitioner literature has long argued that the internal …
Cybersecurity in accounting research
The increasing use of digital technologies among companies has emphasised the
importance and role of cybersecurity as a new risk management dimension, not least …
importance and role of cybersecurity as a new risk management dimension, not least …
The relationship between board-level technology committees and reported security breaches
After several high-profile data security breaches (eg, Target Corporation, Michaels Stores,
Inc., The Home Depot), corporate boards are prioritizing the oversight of Information …
Inc., The Home Depot), corporate boards are prioritizing the oversight of Information …
Information security breaches and IT security investments: Impacts on competitors
In current business climate, a firm's information systems security is no longer independent
from the industry's broader security environment. A question arises, then, whether stock …
from the industry's broader security environment. A question arises, then, whether stock …
SEC's cybersecurity disclosure guidance and disclosed cybersecurity risk factors
Cybersecurity risk disclosure has received great attention in the past several years,
especially after the passage of the Securities and Exchange Commission's (SEC's) …
especially after the passage of the Securities and Exchange Commission's (SEC's) …