Emergence of Cyber Security Audit: How Cybersecurity Audit Will Be Helpful For Business in the Age of Digital Transformation

Authors

  • Vishnu P. K. Junior Research Fellow, Sree Narayana College, Kannur
  • Anil P. V. Assistant Professor, Pazhassi Raja NSS College, Mattannur

DOI:

https://doi.org/10.33516/maj.v56i9.62-64p

Keywords:

No Keywords.

Abstract

Cybersecurity has become one of the serious challenges faced by every type of organization and society. A cybersecurity audit is a complete evaluation and analysis of the IT infrastructure of a business organization. In protecting businesses in the ongoing battle against cyber threats, the cybersecurity audit plays a vital role. This article explores the new buzzword “cybersecurity audit†and we also attempt to answer how cybersecurity audit will be helpful for business firms in the age of digital transformation.

Downloads

Download data is not yet available.

Published

2021-09-30

How to Cite

P. K., V., & P. V., A. (2021). Emergence of Cyber Security Audit: How Cybersecurity Audit Will Be Helpful For Business in the Age of Digital Transformation. The Management Accountant Journal, 56(9), 62–64. https://doi.org/10.33516/maj.v56i9.62-64p

Issue

Section

Cover Story

References

Agrafiotis, I., Nurse, J. R. C., Goldsmith, M., Creese, S., & Upton, D. (2018). A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. Journal of Cybersecurity, 4(1), 1–15. https://doi.org/10.1093/cybsec/tyy006

Cybersecurity risk management reporting factsheet. (2018). American Institute of Certified Public Accountants (AICPA).

Amir, E., Levi, S., & Livne, T. (2018). Do firms underreport information on cyber-attacks? Evidence from capital markets. Review of Accounting Studies, 23(3), 1177–1206. https://doi.org/10.1007/s11142-018-9452-4

Gordon, L. A. (2005). Managing Cybersecurity Resources: A CostBenefit Analysis. McGraw-Hill Education.

Haapamäki, E., & Sihvonen, J. (2019). Cybersecurity in accounting research. Managerial Auditing Journal, 34(7), 808–834. https://doi.org/10.1108/ maj-09-2018-2004

Jaccard, J. J., & Nepal, S. (2014).

A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences, 80(5), 973–993. https://doi.org/10.1016/j.jcss.2014.02.005

Kamiya, S., Kang, J. K., Kim, J., Milidonis, A., & Stulz, R. M. (2018). What is the impact of successful cyberattacks on target firms? National Bureau of Economic Research, Working Paper No. 24409. Published.

Li, H., No, W. G., & Wang, T. (2018). SEC’s cybersecurity disclosure guidance and disclosed cybersecurity risk factors. International Journal of Accounting Information Systems, 30, 40–55. https://doi.org/10.1016/j.accinf.2018.06.003

Specops (2020), “ The countries experiencing the most ‘significant’ cyber-attacksâ€, available at https://specopssoft.com/ blog/countrieexperiencingsignificantcyber-attacks/

Solms, R. V., & Niekerk, J. V (2013). From information security to cyber security. Computers & Security, 38, 97–102. https://doi.org/10.1016/j.cose.2013.04.004

Similar Articles

<< < 43 44 45 46 47 48 49 50 > >> 

You may also start an advanced similarity search for this article.