This study investigates the impact of cyber-security incidents on audit fees. Using a sample of 5,687 firms, we find that (i) breached firms are charged 12% higher audit fees, and (ii) firms operating in the same industry of a breached firm are charged 5% higher fees. Finally, using a difference-in-difference regression on a propensity score matched sample, we provide evidence suggesting that auditors do not revise their audit risk assessment following a breach. Overall, these results suggest that the increase in audit fees in the year of a breach is only temporary, and that auditors include cyber-security risk in their audit risk assessment even before an incident occurs. Higher cyber-security risk is ultimately reflected in higher audit f...
In a 2008 survey of 522 computer security professionals, the Computer Security Institute found an av...
This dissertation consists of three essays that examine cybersecurity-related matters. In the first ...
ABSTRACT: Assessing the value of information technology (IT) security is challenging because of the ...
This study investigates the impact of cyber-security incidents on audit fees. Using a sample of 5,68...
This study investigates the impact of cyber-security incidents on audit fees. Using a sample of 5,68...
The rise in cybercriminal activities in recent years has sparked concern about the costs of technolo...
As signals of internal control weaknesses, cyber security incidents can represent significant risk f...
As signals of internal control weaknesses, cyber security incidents can represent significant risk f...
This study investigates whether cyber risk has an impact on corporate governance. Specifically, it s...
Abstract Based on textual analysis and a comparison of cybersecurity risk disclosures...
Following Arthur Andersen’s conviction for obstructing justice, auditors faced a one-time significan...
This research provides insights into how audit clients and investors respond to a breach of confiden...
Severe security breaches can be costly for publicly listed firms. In order to deploy scarce resource...
Additional contributor: Tom Batina (faculty mentor)This research is designed to understand the impac...
Drawing on prior literature on audit fees, client reputation, and corporate governance, we posit tha...
In a 2008 survey of 522 computer security professionals, the Computer Security Institute found an av...
This dissertation consists of three essays that examine cybersecurity-related matters. In the first ...
ABSTRACT: Assessing the value of information technology (IT) security is challenging because of the ...
This study investigates the impact of cyber-security incidents on audit fees. Using a sample of 5,68...
This study investigates the impact of cyber-security incidents on audit fees. Using a sample of 5,68...
The rise in cybercriminal activities in recent years has sparked concern about the costs of technolo...
As signals of internal control weaknesses, cyber security incidents can represent significant risk f...
As signals of internal control weaknesses, cyber security incidents can represent significant risk f...
This study investigates whether cyber risk has an impact on corporate governance. Specifically, it s...
Abstract Based on textual analysis and a comparison of cybersecurity risk disclosures...
Following Arthur Andersen’s conviction for obstructing justice, auditors faced a one-time significan...
This research provides insights into how audit clients and investors respond to a breach of confiden...
Severe security breaches can be costly for publicly listed firms. In order to deploy scarce resource...
Additional contributor: Tom Batina (faculty mentor)This research is designed to understand the impac...
Drawing on prior literature on audit fees, client reputation, and corporate governance, we posit tha...
In a 2008 survey of 522 computer security professionals, the Computer Security Institute found an av...
This dissertation consists of three essays that examine cybersecurity-related matters. In the first ...
ABSTRACT: Assessing the value of information technology (IT) security is challenging because of the ...