Cybersecurity Research in Accounting Information Systems: A Review and Framework

被引:4
作者
Cram, W. Alec [1 ]
Wang, Tawei [2 ]
Yuan, Jonathan [1 ]
机构
[1] Univ Waterloo, Sch Accounting & Finance, Waterloo, ON, Canada
[2] DePaul Univ, Driehaus Coll Business, Sch Accountancy & MIS, Chicago, IL USA
关键词
cybersecurity; literature review; controls; data breach; risks; threats; assurance; AIS; SECURITY EVENTS; INTERNAL AUDIT; RISK; IMPACT; MANAGEMENT; PRIVACY; MARKET; MODEL; DETERRENCE; AWARENESS;
D O I
10.2308/JETA-2020-081
中图分类号
F8 [财政、金融];
学科分类号
0202 ;
摘要
The study of cybersecurity issues plays a fundamental role in accounting information systems (AIS) research. However, as the importance of cybersecurity has continued to grow in other disciplines, such as computer science and management information systems, it has become less clear what is distinct about AIS-based cybersecurity research, what unique insights AIS research has contributed to the study of cybersecurity, and what promising directions for AIS research into cybersecurity remain untapped. In order to answer these questions, we perform a literature review covering 56 articles published in 11 AIS-oriented journals. We find four distinct, yet related, categories of research inquiry: cybersecurity risks and threats, cybersecurity controls, cybersecurity-related assurance, and cybersecurity breaches. In highlighting the key insights uncovered from these four areas, we frame "what we know," as well as "what remains to be learned," by outlining a detailed proposal of future research opportunities for AIS researchers.
引用
收藏
页码:15 / 38
页数:24
相关论文
共 113 条
  • [41] Future directions for behavioral information security research
    Crossler, Robert E.
    Johnston, Allen C.
    Lowry, Paul Benjamin
    Hu, Qing
    Warkentin, Merrill
    Baskerville, Richard
    [J]. COMPUTERS & SECURITY, 2013, 32 : 90 - 101
  • [42] InfoSec Process Action Model (IPAM): Targeting Insiders' Weak Password Behavior
    Curry, Michael
    Marshall, Byron
    Correia, John
    Crossler, Robert E.
    [J]. JOURNAL OF INFORMATION SYSTEMS, 2019, 33 (03) : 201 - 225
  • [43] Cognitive-affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study
    D'Arcy, John
    Lowry, Paul Benjamin
    [J]. INFORMATION SYSTEMS JOURNAL, 2019, 29 (01) : 43 - 69
  • [44] User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
    D'Arcy, John
    Hovav, Anat
    Galletta, Dennis
    [J]. INFORMATION SYSTEMS RESEARCH, 2009, 20 (01) : 79 - 98
  • [45] de Korvin A., 2004, International Journal of Intelligent Systems in Accounting, Finance and Management, V12, P139, DOI 10.1002/isaf.249
  • [46] Dutch Ministry of Security and Justice, 2011, NATL CYBER SECURITY
  • [47] Ettredge M. L., 2003, Journal of Information Systems, V17, P71, DOI 10.2308/jis.2003.17.2.71
  • [48] Trade secrets and cyber security breaches
    Ettredge, Michael
    Guo, Feng
    Li, Yijun
    [J]. JOURNAL OF ACCOUNTING AND PUBLIC POLICY, 2018, 37 (06) : 564 - 585
  • [49] European Commission, 2013, CYB STRAT EUR UN OP
  • [50] Does CIO risk appetite matter? Evidence from information security breach incidents
    Feng, Cecilia
    Wang, Tawei
    [J]. INTERNATIONAL JOURNAL OF ACCOUNTING INFORMATION SYSTEMS, 2019, 32 : 59 - 75