2018
DOI: 10.1108/maj-07-2017-1595
|View full text |Cite
|
Sign up to set email alerts
|

Factors associated with security/cybersecurity audit by internal audit function

Abstract: Purpose The purpose of the study is to explore the factors associated with the extent of security/cybersecurity audit by the internal audit function (IAF) of the firm. Specifically, the authors focused on whether IAF/CAE (certified audit executive [CAE]) characteristics, board involvement related to governance, role of the audit committee (or equivalent) and the chief risk officer (CRO) and IAF tasked with enterprise risk management (ERM) are associated with the extent to which the firm engages in security/cyb… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
32
0
3

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 50 publications
(36 citation statements)
references
References 71 publications
1
32
0
3
Order By: Relevance
“…Similarly, why synthesize studies related to cybersecurity in the accounting and auditing field? The number and severity of cyber threats have been unprecedented in recent years, and successful cyber-attacks have been reported regularly (Islam et al, 2018). Moreover, the costs of cyber-attacks are tremendous; therefore, cybersecurity risk management is argued MAJ 34,7 to be extremely important for organizations (Islam et al, 2018).…”
Section: Motivationmentioning
confidence: 99%
See 3 more Smart Citations
“…Similarly, why synthesize studies related to cybersecurity in the accounting and auditing field? The number and severity of cyber threats have been unprecedented in recent years, and successful cyber-attacks have been reported regularly (Islam et al, 2018). Moreover, the costs of cyber-attacks are tremendous; therefore, cybersecurity risk management is argued MAJ 34,7 to be extremely important for organizations (Islam et al, 2018).…”
Section: Motivationmentioning
confidence: 99%
“…Similarly, Islam et al (2018) stated that cybersecurity auditing is a relatively new dimension of security practice intended to support the protection of critical information assets. The authors added that an auditing process will seek to obtain evidence of organizational cybersecurity policies and their efficacy for the protection of asset integrity, data confidentiality and data access and availability.…”
Section: Cybersecuritymentioning
confidence: 99%
See 2 more Smart Citations
“…Then the research from Guo [3] which began with the failure of IS / IT management by pharmaceutical companies which caused narcotic type drugs to be purchased freely, because this was prevented by using the COBIT and COSO methods. Then another research from Islam [4] is related to information security using CBOK 2015 which aims to prevent the loss of important information and data by an organization.…”
Section: Introductionmentioning
confidence: 99%