CYBER-SECURITY RISKS ASSESSMENT BY EXTERNAL AUDITORS

被引:1
|
作者
Tran Nguen Bao Ngo [1 ]
Tick, Andrea [2 ]
机构
[1] Univ Danang, Danang, Vietnam
[2] Obuda Univ, Tavaszmezo St 15-17, H-1084 Budapest, Hungary
关键词
audit fees; Cybersecurity risks; OLS model;
D O I
10.7906/indecs.19.3.3
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
The rise in cybercriminal activities in recent years has sparked concern about the costs of technological advancement and the growing reliance of humans on technology. The seriousness of this situation in the business world is indeed more noteworthy and more prominent than other areas, prompting many people to wonder how external auditors - who are responsible for identifying any accounting flaws - will respond to cybersecurity-affected businesses - the ones which can make an honest effort to mask and conceal their difficulties and challenges from their investors and stakeholders. Consequently, the aim of this study is to search whether external auditors focus harder on cybersecurity-attacked firms and businesses by charging higher audit fees. The study found a positive correlation between audit fees and breach employing a sample of 100 global small-, medium-sized, and large businesses. This indicates that external auditors find more risks and spend more effort while auditing cybersecurity-attacked businesses.
引用
收藏
页码:375 / 390
页数:16
相关论文
共 50 条
  • [1] External Auditors' Assessments of Cyber-Security Risks
    Ngo, Tran Nguen Bao
    Tick, Andrea
    [J]. 2021 IEEE 19TH WORLD SYMPOSIUM ON APPLIED MACHINE INTELLIGENCE AND INFORMATICS (SAMI 2021), 2021, : 323 - 328
  • [2] CYBER-SECURITY RISKS OF FEDWIRE
    Bilger, Mark J.
    [J]. JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2019, 14 (04)
  • [3] Mitigating Cyber-Security Risks using MILS
    Liguori, Angelo
    Benedetto, Francesco
    Liguori, Marco
    [J]. 2017 40TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2017, : 1 - 7
  • [4] Social Cyber-Security
    Carley, Kathleen M.
    Cervone, Guido
    Agarwal, Nitin
    Liu, Huan
    [J]. SOCIAL, CULTURAL, AND BEHAVIORAL MODELING, SBP-BRIMS 2018, 2018, 10899 : 389 - 394
  • [5] Mitigating Hardware Cyber-Security Risks in Error Correcting Decoders
    Hemati, Saied
    [J]. 2016 9TH INTERNATIONAL SYMPOSIUM ON TURBO CODES AND ITERATIVE INFORMATION PROCESSING (ISTC), 2016, : 181 - 185
  • [6] REGULATING CYBER-SECURITY
    Sales, Nathan Alexander
    [J]. NORTHWESTERN UNIVERSITY LAW REVIEW, 2013, 107 (04) : 1503 - 1568
  • [7] Cyber-security threat
    Klebba, Jesse
    [J]. CHEMISTRY & INDUSTRY, 2017, 81 (10) : 9 - 9
  • [8] Cyber-Security and Privacy
    Lopez, Javier
    Martinelli, Fabio
    Samarati, Pierangela
    [J]. ERCIM NEWS, 2015, (100): : 10 - 11
  • [9] Cyber-Security Risk Assessment Framework for Critical Infrastructures
    Baig, Zubair
    Zeadally, Sherali
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2019, 25 (01): : 121 - 129
  • [10] Balancing Cyber-Security and Privacy
    Patakyova, Maria T.
    [J]. BRATISLAVA LAW REVIEW, 2020, 4 (01): : 181 - 183