GÉRARD BURNOUF

artiste peintre en cotentin

A beneficial. ( 2011 ), “ Recommendations defense and sarbanes-oxley compliance: a keen exploratory analysis ”, Diary of information Possibilities , Vol

Smith , T. , Higgs , J.L. and you may Pinsker , Roentgen. ( 2018 ), “ Carry out auditors price violation chance within review fees? ”, Diary of information Assistance , within the force .

Spanos , Grams. and you may Angelis , L. ( 2016 ), “ New effect of information security events to the stock market: a health-related literature feedback ”, Servers and Protection , Vol. 58 , pp. 216 – 229 .

Stafford , T. , Deitz , Grams. and you will Li , Y. ( 2018 ), “ This new part of inner review and you can member training guidance safety rules compliance ”, Managerial Auditing Record , Vol. 33 No. cuatro , pp. 410 – 424 .

Steinbart , P.J. , Raschke , Roentgen. , Gal , Grams.F. and you will Dilla , W.Letter. ( 2012 ), “ The relationship ranging from inner review and you may suggestions coverage: an enthusiastic exploratory study ”, International Journal of Accounting Recommendations Solutions , Vol. 13 Zero. 3 , pp. 228 – 243 .

Steinbart , P.J. , Raschke , R. , Girl , Grams.F. and you can Dilla , W.N. ( 2013 ), “ Recommendations protection professionals’ perceptions regarding the relationships between the guidance protection and interior audit characteristics ”, Record of data Expertise , Vol. twenty-seven No. dos , pp. 65 – 86 .

Steinbart , P.J. , Raschke , Roentgen.L. , Girl , Grams. and you may Dilla , W.N. ( 2016 ), “ SECURQUAL: a tool to have comparing the potency of enterprise guidance safety programs ”, Record of information Options , Vol. 31 Zero. step 1 , pp. 71 – ninety-five .

Tanaka , H. , Matsuura , K. and you can Sudoh , O. ( 2005 ), “ Vulnerability and you can advice protection capital: a keen empirical study from Age-local government in the The japanese ”, Log out of Accounting and you will Social Coverage , Vol. 24 No. step one , pp. 37 – 59 .

Von Solms , R. and you will van Niekerk , J. ( 2013 ), “ Out-of suggestions shelter to cyber safeguards ”, Computers and you may Shelter , Vol. 38 , pp. 97 – 102 .

Wang , Y. , Kannan , K. and Ulmer , J. ( 2013 ), “ The new relationship between the disclosure in addition to bottom line of information cover exposure activities ”, Advice Assistance Lookup , Vol how to delete christianmingle account. twenty four Zero. 2 , pp. 201 – 218 .

Webster , J. and you will Watson , Roentgen. ( 2002 ), “ Examining for the past to set up for future years: creating a literature review ”, MIS Every quarter , Vol. twenty-six No. 2 , pp. xiii – xxiii .

Weidenmier , Yards. and you may Ramamoorti , S. ( 2006 ), “ Lookup potential inside the information technology and you may interior auditing ”, Log of information Expertise , Vol. 20 Zero. step one , pp. 205 – 219 .

Yapa , P.W.S. , Ukwatte Jalathge , S.L. and you may Siriwardhane , P. ( 2017 ), “ The fresh new professionalisation out of auditing during the quicker establish countries: the outcome from Sri Lanka ”, Managerial Auditing Log , Vol. thirty-two Nos cuatro/5 , pp. five hundred – 523 .

Then learning

Massaro , Yards. , Du ), “ To the arms off creatures: doing a structured literature review inside accounting ”, Bookkeeping, Auditing and you will Liability Record , Vol. 29 Zero. 5 , pp. 767 – 801 .

Letter. ( 2018 ), “ The new dictate of a good dating between your inner review and you can guidance safety properties to your guidance protection outcomes ”, Accounting, Groups and you may Community , within the force

So it books synthesis provides about three first objectives. The first is to provide an intensive writeup on the modern educational knowledge to the cybersecurity during the bookkeeping and you may auditing browse in order to give some classes into the which this research match. The second mission is to try to identify secret subjects and you may problems that enjoys appeared in the prior literary works. Ultimately, the third objective would be to pick holes on literature and strongly recommend fruitful coming lookup potential. That it literature research keeps high effects getting search and exercise by the explaining, eg, the benefits of and obstacles so you’re able to information sharing. So it synthesis and additionally features the necessity of new model to have guidance-safeguards (cybersecurity) assets because of the Gordon and Loeb (2002). The model has already established too much attention on books and that’s known as the Gordon–Loeb Model. By providing a monetary model you to determines the suitable amount to spend money on securing certain number of suggestions, it causes medical lookup and practice.

Full, they debated that the information blogs of information-defense activities try higher in a number of industries than in others. Providers in the industries such as for example banking companies, team functions, insurance coverage, communication, monetary qualities, transportation and you may health care be seemingly so much more hands-on from inside the delivering volunteer disclosure away from shelter-associated points (Gordon ainsi que al. On top of that, Gordon and you can Loeb (2006) suggested guidelines on effective handling of cybersecurity. Their rates-work for analysis opposed the expenses off an activity having its masters, and also the article writers argued you to for as long as the advantages of an additional information-cover activity surpass the can cost you, it is valuable to take part in one craft. Next, it said that when you are far more cybersecurity cannot constantly work with an enthusiastic business, cyber-periods are one of the fundamental risks one to organizations have to control (Amir et al.

Once checking out the papers, some kinds on the which these types of 39 training fit you will become built. And therefore, these groups certainly are the result of a critical and you will constructive analysis of your own education not as much as feedback using summation, analysis and testing. So you’re able to clarify, that it synthesis recognized five lookup avenues which might be about cybersecurity. Furthermore, it is very important categorize the analysis streams regarding cybersecurity throughout the accounting profession to add studies to the amount of passion during the a certain search industry, making it possible for the results to be used to check on the new overall performance out of lookup streams, scientists and you will publications. Methodologically, this study generates towards the early in the day literary works in order to deepen the brand new insights regarding cybersecurity lookup. So you can clarify, this article isn’t targeted at a particular cybersecurity-relevant matter otherwise issue or limited by a certain topography.

Hausken (2007) sensed two companies that was at the mercy of cyber-episodes. The businesses safeguard on their own by the sharing recommendations together and you will investing safeguards. Each business chooses to discover details about the other firm’s safety breaches. Hausken (2007) analyzed the latest bonuses to willingly promote pointers to a different agency and the fresh trade-offs that each business makes ranging from sharing guidance and you may investing defense. The same lookup produced the antique totally free-driver disease to spell it out as to why guidance revealing commonly will not can be found, while having showcased the vintage free-driver has also been identified by Gordon ainsi que al. (2003). Hausken (2007, p. 674) showed that “guidance discussing grows linearly about interdependence anywhere between agencies, and that’s no that have negative if any interdependence.” To close out, Hausken (2007, p. 647) ideal one to “it’s the interdependence ranging from firms that is the key determinator of information sharing and never new competitiveness.” On an associated note, Gordon ainsi que al. (2015a) suggested that teachers, bodies officials and you may business managers keeps recommended pointers discussing regarding cybersecurity, describing one to:

And this, playing with a pattern technology method, Rahimian ainsi que al. (2016) developed the Operational, Social visualize, Courtroom (OPL) multidimensional exposure specs design so you can quantitatively guess this new share regarding protection regulation in position together with manage lack exposure given that of lost regulation. They triggered the latest literature by the showing your OPL design can be used to do reveal exposure investigations of all the business studies. This looking are important since it’s been burdensome for the latest inner review mode (IAF) to assess handle lack chance (CDR) in the field of advice cover.

We use cookies to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, advertising and analytics partners. View more
Cookies settings
Accept
Privacy & Cookie policy
Privacy & Cookies policy
Cookie name Active
Save settings
Cookies settings