Skip Nav Destination
Close Modal
Update search
Filter
All
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
All
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
All
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
All
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
All
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
All
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Article Type
Issue Section
Date
Availability
1-19 of 19
Keywords: cybersecurity
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems 1–29.
Published: 24 December 2024
..., particularly relating to a firm’s cybersecurity activities. However, the transition and integration of the new framework into existing control systems could fail to meet the framework’s guiding principles, potentially increasing a firm’s risks. We examine whether COSO 2013 framework adoption is associated...
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2024) 38 (3): 1–5.
Published: 01 November 2024
.... Editor’s note: Invited and accepted by Senior Editor Carla L. Wilkin. 03 04 2024 13 05 2024 14 05 2024 2024 cybersecurity cybersecurity maturity The following are typical cybersecurity maturity levels: Risk appetite is the amount of risk, perhaps in dollars...
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2023) 37 (3): 157–190.
Published: 01 October 2023
... (MDA) disclosures in 10-X reports. In this context, we explore if sentiment types are informative when associated with other material events, namely cybersecurity breaches. Our results support the assertion that sentiment types, beyond positive and negative, are informative at the individual disclosure...
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2023) 37 (2): 21–49.
Published: 01 June 2023
...Chris Zhijian He; JiangBo HuangFu; Mark Kohlbeck; Lin Wang ABSTRACT Cybersecurity breaches (CBs) negatively influence the breached firms’ business functions, including their innovative investments. Recent research documents a spillover effect of CBs into supply chain firm performance. We extend...
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2023) 37 (2): 77–100.
Published: 01 June 2023
...Barri Litt; Paul Tanyi; Marcia Weidenmier Watson ABSTRACT Public company investors rely on the Big 4 audit firms to provide assurance over internal controls and financial reporting. What, then, would happen if one of these very assurance providers suffered its own cybersecurity breach? We examine...
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2022) 36 (3): 61–81.
Published: 01 September 2022
... the AC's monitoring ability and oversight of cybersecurity risks. With the average age of board members exceeding 50, directors contend they do not have sufficient knowledge to understand the implications of CIOs' recommendations ( Deloitte 2015 ) or to adequately evaluate whether management is taking...
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2022) 36 (3): 27–60.
Published: 01 September 2022
... employees are more susceptible to being phished than professional services firm employees, but within the bank, the employees with professional certificates are less susceptible to phishing attacks than other bank employees. Also, employees with self-reported responsibility for cybersecurity are less likely...
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2022) 36 (2): 83–99.
Published: 01 June 2022
... IT management issues during 2014–2017 and their effect on firm profitability. According to the SIM surveys, the top two IT issues management prioritizes are security/cybersecurity/privacy and IT alignment with the business. We find that firms that prioritize these two IT management issues exhibit higher...
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2022) 36 (1): 151–180.
Published: 01 March 2022
...Wanying Jiang; Joseph Legoria; Kenneth J. Reichelt; Stephanie Walton ABSTRACT Increasingly, firms are subject to rising cybersecurity risks. One way that firms can communicate cybersecurity uncertainty and reduce information asymmetry with external stakeholders is through cybersecurity risk...
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2021) 35 (2): 179–194.
Published: 01 June 2021
...Arion Cheong; Kyunghee Yoon; Soohyun Cho; Won Gyun No ABSTRACT Cybersecurity has garnered much attention due to the increasing frequency and cost of cybersecurity incidents and has become a significant concern for organizations and governments. Regulators such as the Securities and Exchange...
Journal Articles
Cybersecurity Breaches and the Role of Information Technology Governance in Audit Committee Charters
Journal:
Journal of Information Systems
Journal of Information Systems (2021) 35 (1): 101–119.
Published: 01 March 2021
...Nancy Lankton; Jean B. Price; Mohammad Karim ABSTRACT Cybersecurity is a serious and growing risk for organizations. Firms with board of director involvement in information technology governance (ITG) may be better equipped to deal with this risk. Yet little is known about the audit committee's...
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2021) 35 (1): 155–186.
Published: 01 March 2021
...Stephanie Walton; Patrick R. Wheeler; Yiyang (Ian) Zhang; Xinlei (Ray) Zhao ABSTRACT Advances in information technology have greatly changed communications and business transactions between firms and their customers and suppliers. As a result, cybersecurity risk attracts ever increasing attention...
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2020) 34 (3): 199–211.
Published: 01 September 2020
...Nirmalee I. Raddatz; Joshua G. Coyne; Bradley S. Trinkle ABSTRACT The purpose of this paper is to investigate the effect of internal motivators (psychological ownership, perceived control, and self-efficacy) on employees' intention to protect organizational data. The threat of cybersecurity...
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2020) 34 (3): 133–157.
Published: 01 September 2020
...Andrea Seaton Kelton; Robin R. Pennington ABSTRACT In this study, we investigate the negative impact of a cybersecurity breach on a bystander (i.e., non-breached) firm in the same industry, referred to as investment contagion effects, and whether voluntary cybersecurity disclosures mitigate...
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2020) 34 (2): 187–209.
Published: 01 June 2020
...Chris Zhijian He; Tracie Frost; Robert E. Pinsker ABSTRACT Many firms cite cyber risk as a primary risk factor due to the increase in cybersecurity breach (CSB) incidents. Existing research focuses on the negative, short-term impacts from CSBs, but the longer-term impact is still unknown. Our...
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2019) 33 (3): 267–284.
Published: 01 September 2019
... cited in the text. cybersecurity earnings management security breaches Equifax's recent data security breach (DSB) created the largest individual information loss in recorded U.S. history ( McCrank and Finkle 2018 ). This event brought tremendous public and regulatory attention to DSBs...
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2019) 33 (3): 183–200.
Published: 01 September 2019
...Michele L. Frank; Jonathan H. Grenier; Jonathan S. Pyzoha ABSTRACT This paper provides evidence that the efficacy of voluntary cybersecurity risk management reporting and independent assurance, in terms of enhancing investment attractiveness, depends on whether a company has disclosed a prior...
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2019) 33 (3): 227–265.
Published: 01 September 2019
... conclude by providing a few explanations of why there appears to be an effect at the economy-wide level, but no noticeable effect on individual company performance. Editor's note: Accepted by Tawei (David) Wang. April 2018 November 2018 2019 cybersecurity breaches financial...
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2019) 33 (2): 177–204.
Published: 01 June 2019
... cybersecurity High-profile security breaches (Equifax, Target, Home Depot, Anthem, etc.) have been increasing in frequency and costs. For example, it takes an average of 46 days at an average cost of $21,155 per day to resolve a detected cyberattack ( Ponemon Institute 2015 ). 1 Further...