Cyber-Security Incidents and Audit Quality

被引:30
|
作者
Rosati, Pierangelo [1 ]
Gogolin, Fabian [2 ]
Lynn, Theo [1 ]
机构
[1] Dublin City Univ, DCU Business Sch, Irish Inst Digital Business, Collins Ave, Dublin 9, Ireland
[2] Univ Leeds, Business Sch, Leeds, W Yorkshire, England
关键词
Cyber Security; External Audit; Audit Quality; SEC Comment Letters; INTERNAL CONTROL; NONAUDIT SERVICES; INFORMATION-TECHNOLOGY; OPERATIONAL RISK; MARKET VALUE; BREACH ANNOUNCEMENTS; EARNINGS MANAGEMENT; IMPACT; FEES; RESTATEMENTS;
D O I
10.1080/09638180.2020.1856162
中图分类号
F8 [财政、金融];
学科分类号
0202 ;
摘要
As signals of internal control weaknesses, cyber security incidents can represent significant risk factors to the quality of financial reporting. We empirically assess the audit quality implications of data breaches for a large sample of US firms. Using a difference-in-difference approach based on a matched sample of breached and non-breached firms, we find no evidence that cyber-security incidents result in a decline in audit quality. Instead, we observe positive shifts in four widely-used proxies for audit quality. We document that breached firms (i) experience a decrease in abnormal accruals, (ii) are less likely to report small profits or small earnings increases, (iii) are more likely to be issued a going concern report, and (iv) are less likely to restate their financial statements in the two years following a breach. Our results indicate that auditors effectively offset increases in audit risk through additional substantive testing and audit effort. Our evidence supports the view that auditors have increased their audit risk awareness and put in place adequate procedures to deal with the consequences of cyber-security incidents.
引用
收藏
页码:701 / 728
页数:28
相关论文
共 50 条
  • [21] THE IMPORTANCE AND ROLE OF NATO IN CYBER-SECURITY
    Cioaca, Catalin
    15TH INTERNATIONAL CONFERENCE THE KNOWLEDGE-BASED ORGANIZATION: MILITARY SCIENCES. SECURITY AND DEFENSE, CONFERENCE PROCEEDINGS 1, 2009, 1 : 158 - 162
  • [22] Discussion of "Audit Firm Assessments of Cyber-Security Risk: Evidence from Audit Fees and SEC Comment Letters"
    Yoon, Aaron
    INTERNATIONAL JOURNAL OF ACCOUNTING, 2020, 55 (03):
  • [23] Cyber-security fortresses built on quicksand
    Flexera Software, United States
    Netw. Secur., 8 (5-8):
  • [24] WHERE NEXT FOR UK CYBER-SECURITY?
    Neville-Jones, Pauline
    Phillips, Mark
    RUSI JOURNAL, 2012, 157 (06): : 32 - 40
  • [25] AI, Connectivity and Cyber-Security in Avionics
    Gatti, Marc
    Damien, Alienor
    2019 24TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2019, : 35 - 38
  • [26] Cyber-Security Threats Origins and their Analysis
    Cerget, Maros
    Hudec, Jan
    ACTA POLYTECHNICA HUNGARICA, 2023, 20 (09) : 23 - 41
  • [27] Cyber-security in substation automation systems
    Moreira, Naiara
    Molina, Elias
    Lazaro, Jesus
    Jacob, Eduardo
    Astarloa, Armando
    RENEWABLE & SUSTAINABLE ENERGY REVIEWS, 2016, 54 : 1552 - 1562
  • [28] Cultural and psychological factors in cyber-security
    Halevi, Tzipora
    Memon, Nasir
    Lewis, James
    Kumaraguru, Ponnurangam
    Arora, Sumit
    Dagar, Nikita
    Aloul, Fadi
    Chen, Jay
    Journal of Mobile Multimedia, 2017, 13 (1-2): : 43 - 56
  • [29] A genetic epidemiology approach to cyber-security
    Gil, Santiago
    Kott, Alexander
    Barabasi, Albert-Laszlo
    SCIENTIFIC REPORTS, 2014, 4
  • [30] Cyber-Security Training Evaluation Metrics
    Koutsouris, Nikolaos
    Vassilakis, Costas
    Kolokotronis, Nicholas
    PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 192 - 197