Machine learning and artificial intelligence techniques adopted for IT audit

被引:0
作者
Pycka, Marcin [1 ]
Zastempowski, Maciej [2 ]
机构
[1] Nicolaus Copernicus Univ, Doctoral Sch Social Sci, Torun, Poland
[2] Nicolaus Copernicus Univ, Fac Econ Sci & Management, Dept Enterprise Management, Gagarina 13A, PL-87100 Torun, Poland
来源
MANAGEMENT-POLAND | 2025年 / 29卷 / 01期
关键词
IT security; artificial intelligence; machine learning; IT audit; cyber-security; ANOMALY DETECTION; PERSISTENT; CYBERSECURITY; METHODOLOGY; MANAGEMENT; INTERNET; THINGS;
D O I
10.58691/man/200768
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
Research background and purpose: The rapid advancement of artificial intelligence (AI) and machine learning (ML) is reshaping IT audit practices by enhancing cybersecurity through improved risk management, technological integration, and data-driven strategies. Despite these advancements, there is a lack of comprehensive frameworks that fully integrate AI and ML into IT auditing, particularly for addressing complex threats like Advanced Persistent Threats (APTs). This study aims to explore these technologies' potential to transform IT audits. Design/methodology/approach: A Systematic Literature Review (SLR) was conducted, analyzing studies from Scopus and Web of Science to identify trends and gaps in applying AI and ML in IT audits. Key areas of focus included risk management frameworks, cybersecurity methodologies, and emerging AI-driven audit techniques. Findings: The review underscores AI and ML's pivotal roles in predictive analytics, anomaly detection, and real-time risk assessment. Frameworks like Transfer, Accept, Reduce, Avoid (TARA) and methodologies such as the Experimental Framework for Detecting Cyber-Attacks (ECAD) illustrate practical AI applications. The research also highlights the integration of blockchain, cloud computing, and game theory in enhancing cybersecurity audits. Nonetheless, challenges such as data quality and ethicalconsiderations remain significant. Value added and limitations: This study contributes to IT auditing literature by providing a structured analysis of AI and ML applications, highlighting emerging trends, and suggesting future research directions. Limitations include reliance on existing studies and the evolving nature of AI technologies. Future work should focus on empirical validation of AI-driven audit models and developing standardized frameworks to ensure robustness and reliability in IT audits.
引用
收藏
页码:65 / 87
页数:23
相关论文
共 64 条
[1]   A Cyber Kill Chain Approach for Detecting Advanced Persistent Threats [J].
Ahmed, Yussuf ;
Asyhari, A. Taufiq ;
Rahman, Md Arafatur .
CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 67 (02) :2497-2513
[2]   Machine Learning for APT Detection [J].
AL-Aamri, Abdullah Said ;
Abdulghafor, Rawad ;
Turaev, Sherzod ;
Al-Shaikhli, Imad ;
Zeki, Akram ;
Talib, Shuhaili .
SUSTAINABILITY, 2023, 15 (18)
[3]   Risk-Management Framework and Information-Security Systems for Small and Medium Enterprises (SMEs): A Meta-Analysis Approach [J].
AL-Dosari, Khalifa ;
Fetais, Noora .
ELECTRONICS, 2023, 12 (17)
[4]   HealthLock: Blockchain-Based Privacy Preservation Using Homomorphic Encryption in Internet of Things Healthcare Applications [J].
Ali, Aitizaz ;
Al-rimy, Bander Ali Saleh ;
Alsubaei, Faisal S. ;
Almazroi, Abdulwahab Ali ;
Almazroi, Abdulaleem Ali .
SENSORS, 2023, 23 (15)
[5]  
Alsanad A, 2022, INT J ADV COMPUT SC, V13, P640
[6]  
Appelbaum D., 2017, **DATA OBJECT**, DOI 10.7282/T3R49TQ2
[7]   Dynamic security management driven by situations: An exploratory analysis of logs for the identification of security situations [J].
Benzekri, Abdelmalek ;
Laborde, Romain ;
Oglaza, Arnaud ;
Rammal, Darine ;
Barrere, Francois .
2019 3RD CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2019,
[8]   GRAVITAS: Graphical Reticulated Attack Vectors for Internet-of-Things Aggregate Security [J].
Brown, Jacob ;
Saha, Tanujay ;
Jha, Niraj K. .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2022, 10 (03) :1331-1348
[9]   The information audit: Theory versus practice [J].
Buchanan, Steven ;
Gibb, Forbes .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2008, 28 (03) :150-160
[10]  
Calderon T.G., 2002, International Journal of Accounting Information Systems, V3, P203, DOI DOI 10.1016/S1467-0895(02)00068-4