Cybersecurity Research in Accounting Information Systems: A Review and Framework

被引:4
作者
Cram, W. Alec [1 ]
Wang, Tawei [2 ]
Yuan, Jonathan [1 ]
机构
[1] Univ Waterloo, Sch Accounting & Finance, Waterloo, ON, Canada
[2] DePaul Univ, Driehaus Coll Business, Sch Accountancy & MIS, Chicago, IL USA
关键词
cybersecurity; literature review; controls; data breach; risks; threats; assurance; AIS; SECURITY EVENTS; INTERNAL AUDIT; RISK; IMPACT; MANAGEMENT; PRIVACY; MARKET; MODEL; DETERRENCE; AWARENESS;
D O I
10.2308/JETA-2020-081
中图分类号
F8 [财政、金融];
学科分类号
0202 ;
摘要
The study of cybersecurity issues plays a fundamental role in accounting information systems (AIS) research. However, as the importance of cybersecurity has continued to grow in other disciplines, such as computer science and management information systems, it has become less clear what is distinct about AIS-based cybersecurity research, what unique insights AIS research has contributed to the study of cybersecurity, and what promising directions for AIS research into cybersecurity remain untapped. In order to answer these questions, we perform a literature review covering 56 articles published in 11 AIS-oriented journals. We find four distinct, yet related, categories of research inquiry: cybersecurity risks and threats, cybersecurity controls, cybersecurity-related assurance, and cybersecurity breaches. In highlighting the key insights uncovered from these four areas, we frame "what we know," as well as "what remains to be learned," by outlining a detailed proposal of future research opportunities for AIS researchers.
引用
收藏
页码:15 / 38
页数:24
相关论文
共 113 条
  • [51] Fordham D. R., 2009, AIS ED J, V4, P17, DOI [10.3194/aise.2009.4.1.17, DOI 10.3194/AISE.2009.4.1.17]
  • [52] Forrester, 2018, IS YOUR CO PER CRIT
  • [53] How Disclosing a Prior Cyberattack Influences the Efficacy of Cybersecurity Risk Management Reporting and Independent Assurance
    Frank, Michele L.
    Grenier, Jonathan H.
    Pyzoha, Jonathan S.
    [J]. JOURNAL OF INFORMATION SYSTEMS, 2019, 33 (03) : 183 - 200
  • [54] A Content Analysis of the Privacy Policies of Cloud Computing Services
    Gao, Lei
    Brink, Alisa G.
    [J]. JOURNAL OF INFORMATION SYSTEMS, 2019, 33 (03) : 93 - 115
  • [55] Gordon L. A., 2003, J Account Public Policy, V22, P461, DOI [DOI 10.1016/J.JACCPUBPOL.2003.09.001, 10.1016/j.jaccpubpol.2003.09.001]
  • [56] Gordon L.A., 2006, J ACCOUNT PUBLIC POL, V25, P503, DOI 10.1016/j.jaccpubpol.2006.07.005
  • [57] Gray D, 2020, INFOSECURITY MAGAZIN
  • [58] GROOMER S.M., 1989, J INF SYST, V3, P53
  • [59] Cybersecurity in accounting research
    Haapamaki, Elina
    Sihvonen, Jukka
    [J]. MANAGERIAL AUDITING JOURNAL, 2019, 34 (07) : 808 - 834
  • [60] Harper R.M., 1986, Journal of Information Systems, V1, P67