Risk factors of enterprise internal control under the internet of things governance: A qualitative research approach

被引:25
作者
Chang, She-, I [1 ]
Chang, Li-Min [1 ]
Liao, Jhan-Cyun [1 ]
机构
[1] Natl Chung Cheng Univ, Dept Accounting & Informat Technol, 168 Univ Rd, Chiayi 62102, Taiwan
关键词
Internet of things (IoT); Risk factors; Enterprise internal control; Qualitative research; IT governance; MANAGING RISKS; ACCESS-CONTROL; DELPHI METHOD; COBIT; 5; MANAGEMENT; SECURITY; CHALLENGES; IOT; FRAMEWORK; BUSINESS;
D O I
10.1016/j.im.2020.103335
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This study aims to (1) define the critical risk factors that influence the governance of enterprise internal control in an IoT environment, and (2) classify the risk factors and study their importance in such an environment. The study uses Gowin's Vee knowledge map as a research strategy to mitigate the limitations of qualitative research through a set of strict research procedures. In addition, the Delphi method is used to test and provide feedback to justify and revise the critical risk factors. Finally, 83 items were obtained and categorized into eight different types of critical risk factors. For emphasizing how the risk factors of enterprise internal control involve diverse stakeholders, the critical risk factors are further classified based on the three-layer DCM architecture for mapping with various perceptions. The results of this research can be used as a reference in managing risk factors under the IoT environment. In the new generation of IoT governance practice, the related factors can also be regarded as the essential measurement items for enterprises in conducing effective internal control and auditing.
引用
收藏
页数:18
相关论文
共 118 条
[91]  
Ratnasingham P., 1998, Information Management & Computer Security, V6, P33, DOI 10.1108/09685229810207434
[92]  
Roche Nicolas, 2014, Ann Am Thorac Soc, V11 Suppl 2, pS99, DOI 10.1513/AnnalsATS.201309-300RM
[93]  
Rochette M., 2009, Journal of Risk Management in Financial Institutions, V2, P394
[94]   On the features and challenges of security and privacy in distributed internet of things [J].
Roman, Rodrigo ;
Zhou, Jianying ;
Lopez, Javier .
COMPUTER NETWORKS, 2013, 57 (10) :2266-2279
[95]  
Rudner L.M., 2000, RES EVALUAT, V1, P2002
[96]  
Saleh MohamedS., 2011, Applied Computing and Informatics, V9, P107, DOI [DOI 10.1016/J.ACI.2011.05.002, 10.1016/j.aci.2011.05.002]
[97]   Case selection techniques in case study research - A menu of qualitative and quantitative options [J].
Seawright, Jason ;
Gerring, John .
POLITICAL RESEARCH QUARTERLY, 2008, 61 (02) :294-308
[98]   Internet of Things: Architectures, Protocols, and Applications [J].
Sethi P. ;
Sarangi S.R. .
Journal of Electrical and Computer Engineering, 2017, 2017
[99]   Security, privacy and trust in Internet of Things: The road ahead [J].
Sicari, S. ;
Rizzardi, A. ;
Grieco, L. A. ;
Coen-Porisini, A. .
COMPUTER NETWORKS, 2015, 76 :146-164
[100]   A multidimensional approach to information security risk management using FMEA and fuzzy theory [J].
Silva, Maisa Mendonca ;
Henriques de Gusmao, Ana Paula ;
Poleto, Thiago ;
Camara e Silva, Lucio ;
Cabral Seixas Costa, Ana Paula .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2014, 34 (06) :733-740