2012
DOI: 10.1016/j.accinf.2012.06.007
|View full text |Cite
|
Sign up to set email alerts
|

The relationship between internal audit and information security: An exploratory investigation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

4
34
0
9

Year Published

2012
2012
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 66 publications
(47 citation statements)
references
References 17 publications
4
34
0
9
Order By: Relevance
“…The authors examined three dimensions of information technology material weaknesses: data processing integrity, system access and security and system structure and usage. The authors find that the association with forecast accuracy appears to be strongest for IT control weaknesses most directly related to data processing integrity Steinbart et al, 2012 The relationship between internal audit and information security Exploratory study. Steinbart et al, stated that the internal audit and information-security functions should co-operate synergistically (continued) Kahyaoglu and Caliyurt, 2018 Cyber security assurance process from the internal audit perspective Conceptual study.…”
Section: Methodsmentioning
confidence: 99%
“…The authors examined three dimensions of information technology material weaknesses: data processing integrity, system access and security and system structure and usage. The authors find that the association with forecast accuracy appears to be strongest for IT control weaknesses most directly related to data processing integrity Steinbart et al, 2012 The relationship between internal audit and information security Exploratory study. Steinbart et al, stated that the internal audit and information-security functions should co-operate synergistically (continued) Kahyaoglu and Caliyurt, 2018 Cyber security assurance process from the internal audit perspective Conceptual study.…”
Section: Methodsmentioning
confidence: 99%
“…Recent research has increasingly focused on human factors influencing the outcome of IS security and risk management processes. Previous research focuses on behavioral theories [1], describing the entire IS security and risk management process, security awareness [20,11], behavior [6], communication [7] and the positive impact of audits [22] and standardization efforts [12].…”
Section: Related Workmentioning
confidence: 99%
“…Дослідженнями різних аспектів інформаційного за-безпечення управління, в тому числі контролю, займа-лись як вітчизняні, так і зарубіжні автори наукових праць [1][2][3][4][5][6][7] бардаш с. в., патраманська л. Ю.…”
Section: аналіз літературних даних та постановка проблемиunclassified
“…У дослідженні [7] розкрито взаємозв'язок інформацій-ної безпеки та внутрішнього аудиту, що є особливо актуаль-ним для підприємств електронної комерції, діяльність яких супроводжуються новими інформаційними ризиками.…”
Section: Issn 2226-3780unclassified