As signals of internal control weaknesses, cyber security incidents can represent significant risk factors to the quality of financial reporting. We empirically assess the audit quality implications of data breaches for a large sample of US firms. Using a difference-in-difference approach based on a matched sample of breached and non-breached firms, we find no evidence that cyber-security incidents result in a decline in audit quality. Instead, we observe positive shifts in four widely-used proxies for audit quality. We document that breached firms (i) experience a decrease in abnormal accruals, (ii) are less likely to report small profits or small earnings increases, (iii) are more likely to be issued a going concern report, and (iv...
Corporate reputation represents a core asset of companies and research has shown that better reputat...
The goal of this dissertation is to investigate the impact of the American Institute of Certified Pu...
In this paper, the authors examine how different types offraudin most Information Technology (IT) en...
As signals of internal control weaknesses, cyber security incidents can represent significant risk ...
As signals of internal control weaknesses, cyber security incidents can represent significant risk f...
This study investigates the impact of cyber-security incidents on audit fees. Using a sample of 5,68...
This study investigates the impact of cyber-security incidents on audit fees. Using a sample of 5,68...
The rise in cybercriminal activities in recent years has sparked concern about the costs of technolo...
Abstract Nowadays, businesses are building bottomless real-time connections with their customers, su...
With the increase in digital automation of financial statements and computer-based audit evidence, I...
This research provides insights into how audit clients and investors respond to a breach of confiden...
This study investigates whether cyber risk has an impact on corporate governance. Specifically, it s...
In this in-progress study we explore whether aspects of a prior data security breach, along with pri...
In this paper, we examine whether and how firms’ brand capital is hurt by cybersecurity breaches. O...
Given the increasing financial impact of cybercrime, it has become critical for companies to manage ...
Corporate reputation represents a core asset of companies and research has shown that better reputat...
The goal of this dissertation is to investigate the impact of the American Institute of Certified Pu...
In this paper, the authors examine how different types offraudin most Information Technology (IT) en...
As signals of internal control weaknesses, cyber security incidents can represent significant risk ...
As signals of internal control weaknesses, cyber security incidents can represent significant risk f...
This study investigates the impact of cyber-security incidents on audit fees. Using a sample of 5,68...
This study investigates the impact of cyber-security incidents on audit fees. Using a sample of 5,68...
The rise in cybercriminal activities in recent years has sparked concern about the costs of technolo...
Abstract Nowadays, businesses are building bottomless real-time connections with their customers, su...
With the increase in digital automation of financial statements and computer-based audit evidence, I...
This research provides insights into how audit clients and investors respond to a breach of confiden...
This study investigates whether cyber risk has an impact on corporate governance. Specifically, it s...
In this in-progress study we explore whether aspects of a prior data security breach, along with pri...
In this paper, we examine whether and how firms’ brand capital is hurt by cybersecurity breaches. O...
Given the increasing financial impact of cybercrime, it has become critical for companies to manage ...
Corporate reputation represents a core asset of companies and research has shown that better reputat...
The goal of this dissertation is to investigate the impact of the American Institute of Certified Pu...
In this paper, the authors examine how different types offraudin most Information Technology (IT) en...