Skip Nav Destination
Close Modal
Update search
Filter
All
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
All
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
All
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
All
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
All
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
All
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Article Type
Issue Section
Date
Availability
1-19 of 19
Keywords: cybersecurity
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
COSO Framework Adoption and Cybersecurity Breaches
Available to Purchase
Journal:
Journal of Information Systems
Journal of Information Systems 1–29.
Published: 24 December 2024
..., particularly relating to a firm’s cybersecurity activities. However, the transition and integration of the new framework into existing control systems could fail to meet the framework’s guiding principles, potentially increasing a firm’s risks. We examine whether COSO 2013 framework adoption is associated...
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2024) 38 (3): 1–5.
Published: 01 November 2024
...Stel Valavanis cybersecurity cybersecurity maturity The author of this article serves as CEO of onShore Security, a CyberMaxx company. The views expressed in this article are those of the author and do not reflect the official position of onShore Security. Stel Valavanis...
Journal Articles
The Informativeness of Sentiment Types in Risk Factor Disclosures: Evidence from Firms with Cybersecurity Breaches
Available to Purchase
Journal:
Journal of Information Systems
Journal of Information Systems (2023) 37 (3): 157–190.
Published: 01 October 2023
... (MDA) disclosures in 10-X reports. In this context, we explore if sentiment types are informative when associated with other material events, namely cybersecurity breaches. Our results support the assertion that sentiment types, beyond positive and negative, are informative at the individual disclosure...
Journal Articles
The Impact of Customer-Reported Cybersecurity Breaches on Key Supplier Innovations and Relationship Disruption
Available to Purchase
Journal:
Journal of Information Systems
Journal of Information Systems (2023) 37 (2): 21–49.
Published: 01 June 2023
...Chris Zhijian He; JiangBo HuangFu; Mark Kohlbeck; Lin Wang ABSTRACT Cybersecurity breaches (CBs) negatively influence the breached firms’ business functions, including their innovative investments. Recent research documents a spillover effect of CBs into supply chain firm performance. We extend...
Journal Articles
Cybersecurity Breach at a Big 4 Accounting Firm: Effects on Auditor Reputation
Available to Purchase
Journal:
Journal of Information Systems
Journal of Information Systems (2023) 37 (2): 77–100.
Published: 01 June 2023
...Barri Litt; Paul Tanyi; Marcia Weidenmier Watson ABSTRACT Public company investors rely on the Big 4 audit firms to provide assurance over internal controls and financial reporting. What, then, would happen if one of these very assurance providers suffered its own cybersecurity breach? We examine...
Journal Articles
The Impact of Audit Committee IT Expertise on Data Breaches
Available to Purchase
Journal:
Journal of Information Systems
Journal of Information Systems (2022) 36 (3): 61–81.
Published: 01 September 2022
... the AC's monitoring ability and oversight of cybersecurity risks. Chu Chen and Caroline Hartmann, Texas A&M University–Commerce, Department of Accounting and Finance, Commerce, TX, USA; Anne Gottfried, The University of Texas at Arlington, Marketing Department, Arlington, TX, USA. Editor's...
Journal Articles
Factors Affecting Employees' Susceptibility to Cyber-Attacks
Available to Purchase
Journal:
Journal of Information Systems
Journal of Information Systems (2022) 36 (3): 27–60.
Published: 01 September 2022
... employees are more susceptible to being phished than professional services firm employees, but within the bank, the employees with professional certificates are less susceptible to phishing attacks than other bank employees. Also, employees with self-reported responsibility for cybersecurity are less likely...
Journal Articles
Prioritizing IT Management Issues and Business Performance
Available to Purchase
Journal:
Journal of Information Systems
Journal of Information Systems (2022) 36 (2): 83–99.
Published: 01 June 2022
... IT management issues during 2014–2017 and their effect on firm profitability. According to the SIM surveys, the top two IT issues management prioritizes are security/cybersecurity/privacy and IT alignment with the business. We find that firms that prioritize these two IT management issues exhibit higher...
Journal Articles
Firm Use of Cybersecurity Risk Disclosures
Available to Purchase
Journal:
Journal of Information Systems
Journal of Information Systems (2022) 36 (1): 151–180.
Published: 01 March 2022
...Wanying Jiang; Joseph Legoria; Kenneth J. Reichelt; Stephanie Walton ABSTRACT Increasingly, firms are subject to rising cybersecurity risks. One way that firms can communicate cybersecurity uncertainty and reduce information asymmetry with external stakeholders is through cybersecurity risk...
Journal Articles
Classifying the Contents of Cybersecurity Risk Disclosure through Textual Analysis and Factor Analysis
Available to Purchase
Journal:
Journal of Information Systems
Journal of Information Systems (2021) 35 (2): 179–194.
Published: 01 June 2021
...Arion Cheong; Kyunghee Yoon; Soohyun Cho; Won Gyun No ABSTRACT Cybersecurity has garnered much attention due to the increasing frequency and cost of cybersecurity incidents and has become a significant concern for organizations and governments. Regulators such as the Securities and Exchange...
Journal Articles
Cybersecurity Breaches and the Role of Information Technology Governance in Audit Committee Charters
Available to Purchase
Journal:
Journal of Information Systems
Journal of Information Systems (2021) 35 (1): 101–119.
Published: 01 March 2021
...Nancy Lankton; Jean B. Price; Mohammad Karim ABSTRACT Cybersecurity is a serious and growing risk for organizations. Firms with board of director involvement in information technology governance (ITG) may be better equipped to deal with this risk. Yet little is known about the audit committee's...
Journal Articles
An Integrative Review and Analysis of Cybersecurity Research: Current State and Future Directions
Available to Purchase
Journal:
Journal of Information Systems
Journal of Information Systems (2021) 35 (1): 155–186.
Published: 01 March 2021
...Stephanie Walton; Patrick R. Wheeler; Yiyang (Ian) Zhang; Xinlei (Ray) Zhao ABSTRACT Advances in information technology have greatly changed communications and business transactions between firms and their customers and suppliers. As a result, cybersecurity risk attracts ever increasing attention...
Journal Articles
Internal Motivators for the Protection of Organizational Data
Available to Purchase
Journal:
Journal of Information Systems
Journal of Information Systems (2020) 34 (3): 199–211.
Published: 01 September 2020
...Nirmalee I. Raddatz; Joshua G. Coyne; Bradley S. Trinkle ABSTRACT The purpose of this paper is to investigate the effect of internal motivators (psychological ownership, perceived control, and self-efficacy) on employees' intention to protect organizational data. The threat of cybersecurity...
Journal Articles
Do Voluntary Disclosures Mitigate the Cybersecurity Breach Contagion Effect?
Available to Purchase
Journal:
Journal of Information Systems
Journal of Information Systems (2020) 34 (3): 133–157.
Published: 01 September 2020
...Andrea Seaton Kelton; Robin R. Pennington ABSTRACT In this study, we investigate the negative impact of a cybersecurity breach on a bystander (i.e., non-breached) firm in the same industry, referred to as investment contagion effects, and whether voluntary cybersecurity disclosures mitigate...
Journal Articles
The Impact of Reported Cybersecurity Breaches on Firm Innovation
Available to Purchase
Journal:
Journal of Information Systems
Journal of Information Systems (2020) 34 (2): 187–209.
Published: 01 June 2020
...Chris Zhijian He; Tracie Frost; Robert E. Pinsker ABSTRACT Many firms cite cyber risk as a primary risk factor due to the increase in cybersecurity breach (CSB) incidents. Existing research focuses on the negative, short-term impacts from CSBs, but the longer-term impact is still unknown. Our...
Journal Articles
Earnings Management in Firms with Data Security Breaches
Available to Purchase
Journal:
Journal of Information Systems
Journal of Information Systems (2019) 33 (3): 267–284.
Published: 01 September 2019
.... Editor's note: Accepted by Tawei (David) Wang. March 2018 April 2019 2019 cybersecurity earnings management security breaches Equifax's recent data security breach (DSB) created the largest individual information loss in recorded U.S. history ( McCrank and Finkle 2018...
Journal Articles
How Disclosing a Prior Cyberattack Influences the Efficacy of Cybersecurity Risk Management Reporting and Independent Assurance
Available to Purchase
Journal:
Journal of Information Systems
Journal of Information Systems (2019) 33 (3): 183–200.
Published: 01 September 2019
...Michele L. Frank; Jonathan H. Grenier; Jonathan S. Pyzoha ABSTRACT This paper provides evidence that the efficacy of voluntary cybersecurity risk management reporting and independent assurance, in terms of enhancing investment attractiveness, depends on whether a company has disclosed a prior...
Journal Articles
Much Ado about Nothing: The (Lack of) Economic Impact of Data Privacy Breaches
Available to Purchase
Journal:
Journal of Information Systems
Journal of Information Systems (2019) 33 (3): 227–265.
Published: 01 September 2019
... conclude by providing a few explanations of why there appears to be an effect at the economy-wide level, but no noticeable effect on individual company performance. Editor's note: Accepted by Tawei (David) Wang. April 2018 November 2018 2019 cybersecurity breaches financial...
Journal Articles
Do Auditors Price Breach Risk in Their Audit Fees?
Available to Purchase
Journal:
Journal of Information Systems
Journal of Information Systems (2019) 33 (2): 177–204.
Published: 01 June 2019
... there is a breach to understand how the financial statements and ICFR may have been affected. 6 Thus, it is an empirical question whether auditors price breach risk into their fees. breach risk audit fees corporate governance cybersecurity High-profile security breaches (Equifax, Target...