SISTEM REKA BENTUK PENGAJARAN KOLABORATIF
PLanning * Utilizing * Sharing

An excellent. ( 2011 ), “ Recommendations shelter and you will sarbanes-oxley conformity: an enthusiastic exploratory research ”, Diary of information Systems , Vol

An excellent. ( 2011 ), “ Recommendations shelter and you will sarbanes-oxley conformity: an enthusiastic exploratory research ”, Diary of information Systems , Vol

Smith , T. , Higgs , J.L. and you may Pinsker , Roentgen. ( 2018 ), “ Carry out auditors rates infraction chance within audit charges? ”, Record of data Possibilities , from inside the push .

Spanos , G. and Angelis , L. ( 2016 ), “ The fresh effect of data safety events on the stock market: a medical literature opinion ”, Computers and Security , Vol. 58 , pp. 216 – 229 .

Stafford , T. , Deitz , Grams. and Li , Y. ( 2018 ), “ The newest role out-of interior review and affiliate training pointers safeguards plan conformity ”, Managerial Auditing Journal , Vol. 33 Zero. 4 , pp. 410 – 424 .

Steinbart , P.J. , Raschke , Roentgen. , Gal , Grams.F. and Dilla , W.Letter. ( 2012 ), “ The partnership anywhere between internal review and you will advice defense: a keen exploratory data ”, Global Record out of Bookkeeping Advice Options , Vol. 13 Zero. step three , pp. 228 – 243 .

Steinbart , P.J. , Raschke , R. , Gal , Grams.F. and you can Dilla , W.N. ( 2013 ), “ Pointers shelter professionals’ perceptions regarding the relationships involving the recommendations shelter and internal review features ”, Journal of data Options , Vol. 27 Zero. dos , pp. 65 – 86 .

Steinbart , P.J. , Raschke , Roentgen.L. , Gal , Grams. and you may Dilla , W.N. ( 2016 ), “ SECURQUAL: a device to have researching the effectiveness of agency recommendations safety software ”, Diary of information Expertise , Vol. 30 No. 1 , pp. 71 – 92 .

Tanaka , H. , Matsuura , K. and Sudoh , O. ( 2005 ), “ Susceptability and you will recommendations protection resource: an empirical research out of Elizabeth-state when you look at the Japan ”, Log from Bookkeeping and you may Societal Rules , Vol. 24 No. step 1 , pp. 37 – 59 .

Von Solms , R. and you may van Niekerk , J. ( 2013 ), “ Of suggestions defense in order to cyber defense ”, Machines and you can Protection , Vol. 38 , pp. 97 – 102 .

Wang , Y. , Kannan , K. and you will Ulmer , J. ( 2013 ), “ The newest connection within revelation and the realization of information protection risk facts ”, Advice Options Browse , Vol. twenty-four No. dos , pp. 201 – 218 .

Webster , J. and Watson , R. ( 2002 ), “ Examining going back to set up for the future: creating a books review ”, MIS Every quarter , Vol. 26 No. dos , pp. xiii – xxiii .

Weidenmier , M. and you may Ramamoorti , S. ( 2006 ), “ Lookup potential during the information technology and you can internal auditing ”, Log of information Possibilities , Vol. 20 No. step one , pp. 205 – 219 .

Yapa , P.W.S. , Ukwatte Jalathge , S.L. and you will Siriwardhane , P. ( 2017 ), “ The latest professionalisation out of auditing inside faster set-up countries: possible off Sri Lanka ”, Managerial Auditing Journal , Vol. thirty two Nos 4/5 , pp. five hundred – 523 .

Next training

Massaro , Meters. , Du ), “ Into the arms out of creatures: creating an organized literary works review into the accounting ”, Bookkeeping, Auditing and you can Liability Journal , Vol. 31 No. 5 , pp. 767 – 801 .

N. ( 2018 ), “ The new influence of a good relationship between your inner audit and you can recommendations cover attributes towards the pointers defense consequences ”, Accounting, Groups and you will Neighborhood , for the push

So it literary works synthesis keeps around three primary expectations. The very first is to add an intensive writeup on the present day educational degree towards the cybersecurity within the accounting and auditing lookup and also to give a set of categories towards and that these studies complement. The second objective will be to identify trick information and you may issues that enjoys appeared in the prior literature. In the end, the third mission is to try to select openings in the literary works and you can recommend fruitful coming search opportunities. So it books data enjoys significant effects having research and practice by detailing, such as for example, some great benefits of and you will obstacles to help you suggestions sharing. That it synthesis and additionally features the necessity of the model getting pointers-cover (cybersecurity) financial investments by Gordon and you may Loeb (2002). Its design has received excessively focus on the literature which is referred to as Gordon–Loeb Design. By giving a monetary design one to find the optimal amount to spend money on protecting certain selection of advice, they causes scientific look and exercise.

Full, they contended your recommendations posts of information-defense factors is actually higher in a number of marketplaces than in someone else. Firms inside the marketplaces eg banks, business attributes, insurance policies, correspondence, financial properties, transport and you may health care seem to be a lot more hands-on when you look at the delivering volunteer revelation away from cover-associated products (Gordon et al. Simultaneously, Gordon and you can Loeb (2006) advised recommendations toward successful management of cybersecurity. Their rates-work with studies opposed the expense from a task along with its experts, therefore the article authors argued you to definitely provided the advantages of a supplementary pointers-protection pastime meet or exceed its will cost you, it’s worthwhile to engage in that pastime. Then, they said that while you are even more cybersecurity will not constantly work with an enthusiastic team, cyber-episodes are one of the chief risks one to teams need to control (Amir et al.

Immediately following evaluating the documents, a collection of classes on the and this these types of 39 knowledge match you certainly will be developed. Hence, these types of categories will be result of a significant and you may constructive studies of your own training not as much as review thanks to summary, study and you will review. To help you explain, this synthesis recognized four research streams which can be associated with cybersecurity. In addition, it is very important identify the study avenues associated with cybersecurity on accounting profession to include research for the amount of interest in a certain search field, enabling the outcome for use to check on the new efficiency away from lookup avenues, researchers and you may periodicals. Methodologically, this research makes towards previous literary works so you’re able to deepen new expertise away from cybersecurity look. So you can describe, the article isn’t targeted at a specific cybersecurity-associated concern or thing otherwise simply for a specific geography.

Hausken (2007) felt a couple of firms that are at the mercy of cyber-symptoms. The businesses defend by themselves because of the revealing information with each other and investing coverage. For each and every organization decides to discovered facts about another firm’s cover breaches. Hausken (2007) analyzed the fresh new incentives to help you willingly render advice to some other firm and you may the brand new exchange-offs that each agency produces ranging from sharing pointers and you can investing shelter. The same lookup produced the latest classic 100 % free-rider state to describe as to the reasons recommendations discussing usually will not are present, and have now showcased that classic free-rider was also acquiesced by Gordon ainsi que al. (2003). Hausken (2007, p. 674) revealed that “suggestions discussing grows linearly on interdependence between enterprises, that is no with negative if any interdependence.” To summarize, Hausken (2007, p. 647) advised one “it’s the interdependence anywhere between firms that is the key determinator of information discussing and never brand new competitiveness.” To the an associated notice, Gordon et al. (2015a) ideal that academics, government officials and business executives have needed information revealing pertaining to cybersecurity, outlining you to definitely:

Hence, playing with a pattern technology means, Rahimian ainsi que al. (2016) created the Operational, Public picture, Legal (OPL) multidimensional risk specification model so you can quantitatively guess this new contribution off defense control in position and also the handle insufficiency risk since out-of lost controls. It resulted in the literature by the proving your OPL design are often used to perform reveal exposure testing of all of the corporate analysis. So it shopping for is actually important since this has been problematic for the new internal audit setting (IAF) to evaluate control deficit exposure (CDR) in neuro-scientific advice cover.

Leave a Reply

Your email address will not be published. Required fields are marked *