2019
DOI: 10.1108/maj-09-2018-2004
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity in accounting research

Abstract: Purpose This paper aims to update the cybersecurity-related accounting literature by synthesizing 39 recent theoretical and empirical studies on the topic. Furthermore, the paper provides a set of categories into which the studies fit. Design/methodology/approach This is a synthesis paper that summarizes the research literature on cybersecurity, introducing knowledge from the extant research and revealing areas requiring further examination. Findings This synthesis identifies a research framework that cons… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
25
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 58 publications
(25 citation statements)
references
References 54 publications
0
25
0
Order By: Relevance
“…Based on the study results, the authors conclude that the degree of security/cybersecurity audit is significantly and in direct proportion related to the competence of the internal audit function in relation to risk management and control. Study [18] is considered a generalizing study on cybersecurity. The article examines cybersecurity and information exchange, investment in cybersecurity, internal audit and the control related to cybersecurity, disclosure of cybersecurity activities and threats, and security breaches.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…Based on the study results, the authors conclude that the degree of security/cybersecurity audit is significantly and in direct proportion related to the competence of the internal audit function in relation to risk management and control. Study [18] is considered a generalizing study on cybersecurity. The article examines cybersecurity and information exchange, investment in cybersecurity, internal audit and the control related to cybersecurity, disclosure of cybersecurity activities and threats, and security breaches.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…This directive has served as a model for similar laws passed in foreign countries and the 2018 California Consumer Privacy Act (CCPA) that took effect on January 1, 1 Research on cybersecurity has mainly focused on information sharing, investments in cybersecurity, the role of internal audit, disclosure of cybersecurity activities, and effects of security breaches. Please refer to Haapama¨ki and Sihvonen (2019), Richardson et al (2019), Walton et al (2021), and Wilkin and Chenhall (2020) 2020, in the U.S. Similar to the GDPR, the CCPA's main focus is to allow California residents more control over the collection and disclosure of personal information and requires businesses to disclose security breaches related to stolen personal information (Becerra 2020).…”
Section: Background On Data Privacy and Cybersecuritymentioning
confidence: 99%
“…To date, cyber-attacks continue to increase and the success of governing bodies in addressing cybersecurity risks and security breaches is relatively unknown. 1 Although there are studies related to cybersecurity that provide research summaries in the areas of (1) cybersecurity disclosures, (2) cybersecurity investment, (3) economic consequences to cybersecurity incidents, and (4) manager and auditor responses to cybersecurity risks (Haapama¨ki and Sihvonen 2019;Richardson, Smith, and Weidenmier Watson 2019;Walton, Wheeler, Zhang, and Zhao 2021;Wilkin and Chenhall 2020), the role of IT as a governance tool to combat cyber-attacks has not been fully explored. With the aim of understanding the current and future role of governance mechanisms in managing cybersecurity risks, this paper reviews the existing cybersecurity guidelines and regulations, and summarizes the empirical research related to corporate governance, security breaches, and IT expertise in overseeing cyber risks, using a combination of words to search for relevant studies published in top peer-reviewed journals.…”
Section: Introductionmentioning
confidence: 99%
“…It can be noted that cybersecurity involves the required technologies, processes and controls that are designed in order to protect the systems, networks and data from cyber at-tacks and incidents. The effective cybersecurity program is the one that reduces the risk of cyber attacks and incidents and protects everyone from the misuse or unauthorized use of the related systems, networks and technologies (Haapama ki & Sihvonen, 2019).…”
Section: Background On Cybersecuritymentioning
confidence: 99%