Stock market reactions to favorable and unfavorable information security events: A systematic literature review

SEA Ali, FW Lai, PDD Dominic, NJ Brown… - Computers & …, 2021 - Elsevier
The rapid digital transformations across every industry sector, accelerated partly due to the
COVID-19 pandemic, have increased organizations' use of information systems for …

Who do you think you are? A review of the complex interplay between information systems, identification and identity

EA Whitley, U Gal, A Kjaergaard - European Journal of Information …, 2014 - Taylor & Francis
This paper introduces the special issue on information systems, identity and identification. In
addition to introducing the papers in the special issue, it provides a state-of-the-art review of …

The importance of the internal information environment for tax avoidance

J Gallemore, E Labro - Journal of Accounting and Economics, 2015 - Elsevier
We show that firms׳ ability to avoid taxes is affected by the quality of their internal information
environment, with lower effective tax rates (ETRs) for firms that have high internal …

Information technology governance and cybersecurity at the board level

AMAM Al-Sartawi - International Journal of Critical …, 2020 - inderscienceonline.com
Security breaches are very costly in the USA, followed very closely by the Middle East.
Shareholders and investors demand that their firms mitigate all kinds of risks, and it is the …

Does ineffective internal control over financial reporting affect a firm's operations? Evidence from firms' inventory management

M Feng, C Li, SE McVay, H Skaife - The Accounting Review, 2015 - publications.aaahq.org
We investigate whether ineffective internal control over financial reporting has implications
for firm operations by examining the association between inventory-related material …

Cybersecurity in accounting research

E Haapamäki, J Sihvonen - Artificial Intelligence in Accounting, 2022 - api.taylorfrancis.com
The increasing use of digital technologies among companies has emphasised the
importance and role of cybersecurity as a new risk management dimension, not least …

Explaining IT governance disclosure through the constructs of IT governance maturity and IT strategic role

A Joshi, L Bollen, H Hassink, S De Haes… - Information & …, 2018 - Elsevier
This study investigates the relation between the maturity of IT governance processes and the
IT governance disclosure of firms. Furthermore, it examines whether the strategic role of IT in …

LINKING EXPLOITS FROM THE DARK WEB TO KNOWN VULNERABILITIES FOR PROACTIVE CYBER THREAT INTELLIGENCE: AN ATTENTION-BASED DEEP …

S Samtani, Y Chai, H Chen - MIS quarterly, 2022 - par.nsf.gov
Black hat hackers use malicious exploits to circumvent security controls and take advantage
of system vulnerabilities worldwide, costing the global economy over $450 billion annually …

The effect of enterprise systems implementation on the firm information environment

CA Dorantes, C Li, GF Peters… - Contemporary …, 2013 - Wiley Online Library
This study uses an archival research design to assess the impact of enterprise systems on a
firm's internal information environment as reflected in the production of management …

Factors associated with security/cybersecurity audit by internal audit function: An international study

MS Islam, N Farah, TF Stafford - Managerial Auditing Journal, 2018 - emerald.com
Purpose The purpose of the study is to explore the factors associated with the extent of
security/cybersecurity audit by the internal audit function (IAF) of the firm. Specifically, the …