Using information system audit documentation from 60 clients of a Big 4 firm, we extend Kizirian (2004) by examining whether management security control consciousness (i.e., the “tone at the top”) influences (1) security control activities performed by the client, and (2) the auditor’s firm-wide (i.e., global) assessment of security control. Findings suggest that management control consciousness results in the employment of security controls. The auditor’s assessment of the strength of management control consciousness can also affect the auditor’s assessment of the client’s global security control. While our data pre-dates the Sarbanes-Oxley Act, our findings speak to the importance of assessing an organization's tone at the top, and thu...
In this study we examine the complementary monitoring activity that takes place via the Sarbanes-Oxl...
This paper analyzes the economic consequences of the new internal control reporting (ICR) requiremen...
IT security policies play an important role in outlining employees’ secure behavior that supports or...
This study uses archival information technology (IT) audit documentation from 60 auditees of a Big 4...
The Sarbanes-Oxley Act of 2002 was passed in order to restore investor confidence to the market afte...
Publicly held firms and the assurance services industry are currently struggling with the implementa...
The Sarbanes-Oxley Act of 2002 mandates senior management to certify under oath that information con...
Congress responded in similar ways to 2001\u27s major national crises: bolstering internal controls ...
In this paper, we investigate the association between the strength of information technology control...
The theory underlying US securities laws is that investors are helpless without reliable information...
This thesis examines in detail the Sarbanes-Oxley Act of 2002, including the historical events leadi...
Purpose – The purpose of this paper is to examine the determinants of internal control weakness reme...
In this article, the association between the strength of information technology controls over manage...
In 2002, Congress passed the Sarbanes-Oxley Act, which requires firms to assess internal controls an...
A quality internal control system has been seen as a remedy for various corporate governance issues....
In this study we examine the complementary monitoring activity that takes place via the Sarbanes-Oxl...
This paper analyzes the economic consequences of the new internal control reporting (ICR) requiremen...
IT security policies play an important role in outlining employees’ secure behavior that supports or...
This study uses archival information technology (IT) audit documentation from 60 auditees of a Big 4...
The Sarbanes-Oxley Act of 2002 was passed in order to restore investor confidence to the market afte...
Publicly held firms and the assurance services industry are currently struggling with the implementa...
The Sarbanes-Oxley Act of 2002 mandates senior management to certify under oath that information con...
Congress responded in similar ways to 2001\u27s major national crises: bolstering internal controls ...
In this paper, we investigate the association between the strength of information technology control...
The theory underlying US securities laws is that investors are helpless without reliable information...
This thesis examines in detail the Sarbanes-Oxley Act of 2002, including the historical events leadi...
Purpose – The purpose of this paper is to examine the determinants of internal control weakness reme...
In this article, the association between the strength of information technology controls over manage...
In 2002, Congress passed the Sarbanes-Oxley Act, which requires firms to assess internal controls an...
A quality internal control system has been seen as a remedy for various corporate governance issues....
In this study we examine the complementary monitoring activity that takes place via the Sarbanes-Oxl...
This paper analyzes the economic consequences of the new internal control reporting (ICR) requiremen...
IT security policies play an important role in outlining employees’ secure behavior that supports or...