مشخصات مقاله | |
انتشار | مقاله سال 2018 |
تعداد صفحات مقاله انگلیسی | 15 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
منتشر شده در | نشریه الزویر |
نوع نگارش مقاله | مقاله پژوهشی (Research Article) |
مقاله بیس | این مقاله بیس میباشد |
نمایه (index) | Scopus – Master Journal List – JCR |
نوع مقاله | ISI |
شاخص Quartile (چارک) | Q1 |
ایمپکت فاکتور(IF) |
2.077 در سال 2017 |
شاخص H_index | 110 در سال 2019 |
شاخص SJR | 1.771 در سال 2019 |
عنوان انگلیسی مقاله | The influence of a good relationship between the internal audit and information security functions on information security outcomes |
ترجمه عنوان مقاله | تاثیر یک رابطه خوب بین حسابرسی داخلی و عملکرد امنیت اطلاعات بر پیامدهای امنیت اطلاعات |
فرمت مقاله انگلیسی | |
رشته های مرتبط | حسابداری، مدیریت |
گرایش های مرتبط | حسابرسی، مدیریت فناوری اطلاعات |
مجله | حسابداری، سازمان ها و جامعه – Accounting – Organizations and Society |
دانشگاه | W.P. Carey School of Business Arizona State University – USA |
کلمات کلیدی | امنیت اطلاعات، حسابرسی داخلی، حسابرسی IT، حکومت، مدیریت ریسک ، معیارهای امنیتی |
کلمات کلیدی انگلیسی | Information security, Internal audit, IT audit, Governance, Risk management, Security metrics |
کد محصول | E7809 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
بخشی از متن مقاله: |
1. Introduction
Cybercrime can have a significant, direct economic impact on organizations through asset misappropriation, theft of sensitive private information, disruption of online operations, and legal costs to settle consumer claims about harm (Hong, 2016; ISACA, 2016; Minaya, 2015; PWC, 2016a, 2016b). It can also have an indirect economic effect, given that the disclosure of information security risk factors, governance policies, and information security breaches can significantly impact firm value (Gordon, Loeb, & Sohail, 2010; Higgs, Pinsker, Smith, & Young, 2016; Wang, Kannan, & Ulmer, 2013). In addition, cybercrime poses “a different focal point of concern [and] a different ‘subject’ of risk”, (Power, 2013, p. 538), because perpetrators are often unknown agents outside the organization. This is in contrast to asset theft and financial disclosure risks, where the focus is typically on the actions of identifiable individuals within the organization. Hence, it is not surprising that information security ranks as one of the top concerns for both accounting professionals (Drew, 2015; Hill, 2015) and senior management (Luftman & Ben-Zvi, 2010). Who should be responsible for managing information security risks? The obvious answer would seem to be a dedicated group within the IT function. An ISACA (2011) report, however, suggests that information security risk management is the responsibility of not just a dedicated group within the information technology (IT) function, but also should involve other functions within organizations, including the internal audit function (IAF). The problem of information security risk management therefore provides an important context for research on internal audit as a governance and risk management mechanism. Sarens (2009) argues “… the IAF can have a positive impact on the quality of risk management and internal control processes” (p. 4). Indeed, top management expects the IAF to compensate for the loss of control that comes through increased organizational complexity by both “providing independent assurance” and by “actively contributing to improving of processes and internal controls” (Sarens & De Beedle, 2006, p. 238). Similarly, the practice literature indicates that two of the most important responsibilities of the IAF are to provide assurance about process effectiveness and insights about how to improve performance (Seago, 2017). Despite this consensus among academics, managers, and internal audit professionals that an effective IAF should improve governance and risk management, there is little research that addresses whether the IAF actually does improve governance and risk management outcomes (Carcello, Hermanson, & Ye, 2011; Eden & Moriah, 1996; Gramling, Maletta, Schneider, & Church, 2004). Instead, prior research has tended to focus on respondents’ perceptions of the efficacy of the IAF in improving risk management processes, without reporting objective data on the outcomes from these processes (e.g., Arena, Arnaboldi, & Azzone, 2010; Carcello, Eulerich, Masli, & Wood, 2017; de Zwaan, Stewart, & Subramaniam, 2011; Ma’ayan & Carmeli, 2016; Paape & Spekle, 2013 ). This study addresses the aforementioned gap in the literature. We use a unique data set obtained through the cooperation of the Information Management and Technology Assurance (IMTA) section of the AICPA that provides objective measures of leading and lagging information security outcomes. The leading measures are the number of internal control weaknesses related to information security and the number of IT-related noncompliance issues that were material enough to be brought to the attention to executive management or the Board of Directors. |