Purpose The purpose of this study is to analyze the cybersecurity assurance approaches to determine the key issues and weaknesses within the internal audit and risk management perspective. Organizations increasingly rely on digital data to drive their growth and they are interconnected in a complex web to a multitude of stakeholders. Design/methodology/approach In this paper, cybersecurity is defined, and cybersecurity assurance model is explained based on the relevant literature. In addition, the role of internal auditing is introduced within this new business landscape. Finally, recommendations are made to provide best practices for stakeholders. Findings There are four major cyber-focused standards and frameworks in the current literature, namely, Control Objectives for Information and Related Technology, International Organization for Standardization, The American Institute of Certified Public Accountants and National Institute of Standards and Technology. In addition, there are many mechanisms in existence and operation currently which support cybersecurity assurance to prevent major threats. These include risk assessment, risk treatment, risk management, security assurance and auditing. Research limitations/implications Cyber risk is not something that can be avoided; instead, it must be managed. Hence, it is very important to maintain formal documentation on related cyber controls. Internal audit should be an integral part of cybersecurity assurance process, as internal audit have a unique position to look across organizations. The contribution of internal audit also provides comfort to the Board and Audit Committee. Practical implications A model is introduced how the internal audit and information security functions could work together to support organizations accomplish a cost-effective level of information security. The key issues and approaches are explained for how to become a trusted cybersecurity advisor and a sample cybersecurity awareness program checklist is provided at Appendix 1. Social implications Considering cybersecurity threats grow with speed, complexity, and impact, organizations are no longer satisfied with an answer to a question like “are we secure?” instead, they need the answer for such a question like “how to give a reasonable assurance that our business will be secure enough?”. In that respect, the role of internal audit is discussed based on the relevant literature and the current condition of the business environment. Originality/value A model is introduced how the internal audit and information security functions could work together to support organizations accomplish a cost-effective level of information security. The key issues and approaches are explained for how to become a trusted cybersecurity advisor and a sample cybersecurity awareness program checklist is provided at Appendix 1.
Purpose: This paper aims to investigate the impact of government effectiveness on trade and financial openness in 35 selected countries around the globe. Design/methodology/approach: A quantitative research approach was applied in the study using the generalized quantile panel regression approach to analyze the impact of identified variables in these selected countries. Panel quantile models with high estimation performance are preferred in the presence of excessive deviations and in cases where the normal distribution is invalid. Findings/results: The empirical findings indicate that selected countries with above-average governmental effectiveness, that is, with a well-established state bureaucracy and a historically strong state tradition, will further increase their activities toward international integration through financial and trade openness. Practical implications: This study aims to provide valuable information that governments and regulatory authorities can benefit from in their decision-making processes. Originality/value: In this study, it is preferred to use the trade openness of countries as the share of exports in total world exports and financial openness as the ratio of capital flows to world flows. In this way, these variables will provide new information to analyze the influence of government effectiveness. Implementing the generalized quantile panel regression technique can also be expressed as an innovation in this field of literature.
In this study, the effects of artificial intelligence applications, which have gained importance recently, on internal audit and risk assessment are analyzed. Internal audit and risk assessment are critical for the early detection of risks that arise in the processes of businesses that are becoming more complex and exposed to external factors due to digitalization. With the internet of things that are generally accepted all over the world, there are significant differences in the way businesses do business. This situation also forces companies to differentiate internal audit and risk assessment, which is a strategic and integral element of management processes. In this context, this study focuses on the challenges and opportunities faced by internal audit and risk assessment because of digitalization, big data analysis and artificial intelligence applications depending on the rapidly developing digital work environments. Accordingly, the study includes in-depth analysis to contribute to the particularly relevant literature and to develop policy recommendations for audit and risk management professionals.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.