Antecedents and consequences of data breaches: A systematic review

F Schlackl, N Link, H Hoehle - Information & Management, 2022 - Elsevier
Research on data breaches is scattered across disciplines and methodologies. To help
consolidate it, we review 43 articles on data breaches' antecedents and 83 on their …

An integrative review and analysis of cybersecurity research: Current state and future directions

S Walton, PR Wheeler, Y Zhang… - Journal of Information …, 2021 - publications.aaahq.org
Advances in information technology have greatly changed communications and business
transactions between firms and their customers and suppliers. As a result, cybersecurity risk …

Cyber risk management: History and future research directions

M Eling, M McShane, T Nguyen - Risk Management and …, 2021 - Wiley Online Library
Cybersecurity research started in the late 1960s and has continuously evolved under
different names such as computer security and information security. This article briefly …

Operational IT failures, IT value destruction, and board-level IT governance changes

M Benaroch, A Chernobai - MIS quarterly, 2017 - JSTOR
This paper presents an empirical study of changes that firms implement in their board-level
IT governance (ITG) upon experiencing operational IT failures. Consistent with the …

The impact of executives' IT expertise on reported data security breaches

J Haislip, JH Lim, R Pinsker - Information Systems Research, 2021 - pubsonline.informs.org
Data security breaches (DSBs) are increasing investor and regulator pressure on firms to
improve their IT governance (ITG) in an effort to mitigate the related risk. Drawing on upper …

Cybersecurity in accounting research

E Haapamäki, J Sihvonen - Artificial Intelligence in Accounting, 2022 - api.taylorfrancis.com
The increasing use of digital technologies among companies has emphasised the
importance and role of cybersecurity as a new risk management dimension, not least …

Information security breaches and IT security investments: Impacts on competitors

CY Jeong, SYT Lee, JH Lim - Information & Management, 2019 - Elsevier
In current business climate, a firm's information systems security is no longer independent
from the industry's broader security environment. A question arises, then, whether stock …

The influence of a good relationship between the internal audit and information security functions on information security outcomes

PJ Steinbart, RL Raschke, G Gal, WN Dilla - Accounting, Organizations and …, 2018 - Elsevier
Given the increasing financial impact of cybercrime, it has become critical for companies to
manage information security risk. The practitioner literature has long argued that the internal …

Cybersecurity awareness and market valuations

H Berkman, J Jona, G Lee, N Soderstrom - Journal of Accounting and …, 2018 - Elsevier
This paper introduces a measure of firm-specific cybersecurity awareness that can be used
in empirical research exploring cyber-related issues facing corporations. It extends and …

Explaining IT governance disclosure through the constructs of IT governance maturity and IT strategic role

A Joshi, L Bollen, H Hassink, S De Haes… - Information & …, 2018 - Elsevier
This study investigates the relation between the maturity of IT governance processes and the
IT governance disclosure of firms. Furthermore, it examines whether the strategic role of IT in …