External Auditors' Assessments of Cyber-Security Risks

被引:0
|
作者
Ngo, Tran Nguen Bao [1 ]
Tick, Andrea [2 ]
机构
[1] Univ Danang, VN UK Inst Res & Execut Educ, Danang, Vietnam
[2] Obuda Univ, Inst Enterprise Management, Keleti Fac Business & Management, Budapest, Hungary
关键词
Audit fees; Cybersecurity risks; OLS model; INFORMATION;
D O I
10.1109/SAMI50585.2021.9378638
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The mushrooming occurrences of cyber criminals in the recent years have provoked an alarm about the drawback of technological growth and the increasing dependence of human beings on technology. The severity of this situation in the business world is even greater and greater than other fields, which leads many people raise a question about the response of external auditors - the ones who are responsible for detecting any accounting faults - towards cybersecurity-attacked companies - the ones which can try their best to hide their difficulties from their investors and stakeholders. Hence, this study investigates whether external auditors pay more attention to cybersecurity-attacked companies by applying higher audit fee charges. Using a sample of 100 global small, medium and large companies, the study has found out that there is a positive relationship between audit fees and breach, which means that external auditors find more risks and exert more efforts when auditing the cybersecurity-attacked companies.
引用
收藏
页码:323 / 328
页数:6
相关论文
共 50 条
  • [1] CYBER-SECURITY RISKS ASSESSMENT BY EXTERNAL AUDITORS
    Tran Nguen Bao Ngo
    Tick, Andrea
    [J]. INTERDISCIPLINARY DESCRIPTION OF COMPLEX SYSTEMS, 2021, 19 (03) : 375 - 390
  • [2] CYBER-SECURITY RISKS OF FEDWIRE
    Bilger, Mark J.
    [J]. JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2019, 14 (04)
  • [3] Mitigating Cyber-Security Risks using MILS
    Liguori, Angelo
    Benedetto, Francesco
    Liguori, Marco
    [J]. 2017 40TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2017, : 1 - 7
  • [4] Social Cyber-Security
    Carley, Kathleen M.
    Cervone, Guido
    Agarwal, Nitin
    Liu, Huan
    [J]. SOCIAL, CULTURAL, AND BEHAVIORAL MODELING, SBP-BRIMS 2018, 2018, 10899 : 389 - 394
  • [5] Mitigating Hardware Cyber-Security Risks in Error Correcting Decoders
    Hemati, Saied
    [J]. 2016 9TH INTERNATIONAL SYMPOSIUM ON TURBO CODES AND ITERATIVE INFORMATION PROCESSING (ISTC), 2016, : 181 - 185
  • [6] REGULATING CYBER-SECURITY
    Sales, Nathan Alexander
    [J]. NORTHWESTERN UNIVERSITY LAW REVIEW, 2013, 107 (04) : 1503 - 1568
  • [7] Cyber-security threat
    Klebba, Jesse
    [J]. CHEMISTRY & INDUSTRY, 2017, 81 (10) : 9 - 9
  • [8] Cyber-Security and Privacy
    Lopez, Javier
    Martinelli, Fabio
    Samarati, Pierangela
    [J]. ERCIM NEWS, 2015, (100): : 10 - 11
  • [9] Balancing Cyber-Security and Privacy
    Patakyova, Maria T.
    [J]. BRATISLAVA LAW REVIEW, 2020, 4 (01): : 181 - 183
  • [10] Challenging confidence in cyber-security
    [J]. Strand, Chris, 1600, Elsevier Ltd (2014):