The design and use of management control systems can play a key role in dealing with cybersecurity issues that have arisen in tandem with the emergence of the Internet. Efficient management control systems will reduce a firm's likelihood of suffering significant losses from cybersecurity breaches. Drawing on and extending the extant agency-based capital budgeting literature, this paper demonstrates the relevance of the study of management accounting controls to problems arising in the cybersecurity setting. The main finding is that firms can use an information security audit (which is an integral part of a management control system) along with adjustments to the compensation payments to the agent and the investment decision rules, to mitiga...
As the world advances towards the computing era, security threats keeps on increasing in the form of...
Financial decisions indirectly affect and are affected by the effort towards Information Security. T...
This research examines three types of information security and control procedures for organizations ...
Purpose: This paper aims to update the cybersecurity-related accounting literature by synthesizing 3...
Accelerated development of technologies and their more frequent application within business organiza...
The rapid development of IT, availability of user friendly accounting software and the increased com...
Purpose – To position the preservation and protection of intellectual capital as a cyber security co...
Due to the escalating risk and exposure associated with the cyber world,cybersecurity has emerged as...
Purpose: The purpose of the study is to investigate the role of information security policy complian...
As cybersecurity breaches continue to increase in number and cost, and the demand for cyber-insuranc...
Cybersecurity practitioners working in organisations implement risk controls aiming to improve the s...
Information Systems (IS) research on managerial response to cybersecurity breaches has largely focus...
A model is developed which demonstrates that control systems for investments in information security...
The rapid development of IT, availability of user friendly accounting software and the increased com...
Reprinted from Journal of Accounting and Public Policy, 26 /6, Kjell Hausken, Information sharing am...
As the world advances towards the computing era, security threats keeps on increasing in the form of...
Financial decisions indirectly affect and are affected by the effort towards Information Security. T...
This research examines three types of information security and control procedures for organizations ...
Purpose: This paper aims to update the cybersecurity-related accounting literature by synthesizing 3...
Accelerated development of technologies and their more frequent application within business organiza...
The rapid development of IT, availability of user friendly accounting software and the increased com...
Purpose – To position the preservation and protection of intellectual capital as a cyber security co...
Due to the escalating risk and exposure associated with the cyber world,cybersecurity has emerged as...
Purpose: The purpose of the study is to investigate the role of information security policy complian...
As cybersecurity breaches continue to increase in number and cost, and the demand for cyber-insuranc...
Cybersecurity practitioners working in organisations implement risk controls aiming to improve the s...
Information Systems (IS) research on managerial response to cybersecurity breaches has largely focus...
A model is developed which demonstrates that control systems for investments in information security...
The rapid development of IT, availability of user friendly accounting software and the increased com...
Reprinted from Journal of Accounting and Public Policy, 26 /6, Kjell Hausken, Information sharing am...
As the world advances towards the computing era, security threats keeps on increasing in the form of...
Financial decisions indirectly affect and are affected by the effort towards Information Security. T...
This research examines three types of information security and control procedures for organizations ...