Table of contents
Assurance for service organisations: contextualising accountability and trust
Charika ChannuntapipatA number of organisations outsource their information systems and information technology infrastructure to a type of organisation called a “service organisation”. In the current…
Cyber security assurance process from the internal audit perspective
Sezer Bozkus Kahyaoglu, Kiymet CaliyurtThe purpose of this study is to analyze the cybersecurity assurance approaches to determine the key issues and weaknesses within the internal audit and risk management…
Factors associated with security/cybersecurity audit by internal audit function: An international study
Md. Shariful Islam, Nusrat Farah, Thomas F. StaffordThe purpose of the study is to explore the factors associated with the extent of security/cybersecurity audit by the internal audit function (IAF) of the firm. Specifically, the…
The role of internal audit and user training in information security policy compliance
Thomas Stafford, George Deitz, Yaojie LiThe purpose of the study is to investigate the role of information security policy compliance and the role of information systems auditing in identifying non-compliance in the…
Consumer security behaviors and trust following a data breach
Shelby R. Curtis, Jessica Rose Carre, Daniel Nelson JonesThe purpose of this study was to determine how security statement certainty (overconfident, underconfident and realistic) and behavioral intentions of potential consumers impact…
Ascribing responsibility for online security and data breaches
Jessica Rose Carre, Shelby R. Curtis, Daniel Nelson JonesThe purpose of this paper is to understand consumer reactions to security breaches and the best approach for companies to minimize the reputational damage that is done.
ISSN:
0268-6902e-ISSN:
1758-7735ISSN-L:
0268-6902Online date, start – end:
1986Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Professor Jie Zhou