IT security auditing: A performance evaluation decision model

被引:12
|
作者
Herath, Hemantha S. B. [1 ]
Herath, Tejaswini C. [2 ]
机构
[1] Goodman Sch Business, Dept Accounting, St Catharines, ON L2S 3A1, Canada
[2] Goodman Sch Business, Dept Finance Operat & Informat Syst, St Catharines, ON L2S 3A1, Canada
关键词
Information technology management; Information technology audit; Information systems audit; Information security audit; Audit decision; Agency model; SARBANES-OXLEY; SYSTEMS;
D O I
10.1016/j.dss.2013.07.010
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Compliance with ever-increasing privacy laws, accounting and banking regulations, and standards is a top priority for most organizations. Information security and systems audits for assessing the effectiveness of IT controls are important for proving compliance. Information security and systems audits, however, are not mandatory to all organizations. Given the various costs, including opportunity costs, the problem of deciding when to undertake a security audit and the design of managerial incentives becomes an important part of an organization's control process. In view of these considerations, this paper develops an IT security performance evaluation decision model for whether or not to conduct an IT security audit. A Bayesian extension investigates the impact of new information regarding the security environment on the decision. Since security managers may act in an opportunistic manner, the model also incorporates agency costs to determine the incentive payments for managers to conduct an audit. Cases in which the agency model suggests that it is optimal not to conduct an IT security audit are also discussed. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:54 / 63
页数:10
相关论文
共 50 条
  • [1] A security evaluation framework for cloud security auditing
    Rizvi, Syed
    Ryoo, Jungwoo
    Kissell, John
    Aiken, William
    Liu, Yuhong
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (11): : 5774 - 5796
  • [2] A security evaluation framework for cloud security auditing
    Syed Rizvi
    Jungwoo Ryoo
    John Kissell
    William Aiken
    Yuhong Liu
    The Journal of Supercomputing, 2018, 74 : 5774 - 5796
  • [3] AUDITING FOR PERFORMANCE EVALUATION
    PENNO, M
    ACCOUNTING REVIEW, 1990, 65 (03): : 520 - 536
  • [4] Supplier evaluation model for computer auditing and decision-making analysis
    Shih, Kuang-Hsun
    Hung, Hsu-Feng
    Lin, Binshan
    KYBERNETES, 2009, 38 (09) : 1439 - 1460
  • [5] MASS -: Model for an Auditing Security System
    Liebenberg, A
    Eloff, JHP
    INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 141 - 150
  • [6] A Systematic Review of the Third Party Auditing in Cloud Security: Security Analysis, Computation Overhead and Performance Evaluation
    Babu, T. Kishore
    Guruprakash, C. D.
    PROCEEDINGS OF THE 2019 3RD INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2019), 2019, : 86 - 91
  • [7] Decision Model for the Security and Utility Risk Evaluation (SURE) Framework
    Billard, Angela K.
    PROCEEDINGS OF THE AUSTRALASIAN COMPUTER SCIENCE WEEK MULTICONFERENCE (ACSW 2019), 2019,
  • [8] IoT Security Model and Performance Evaluation: A Blockchain Approach
    Wang, Ziyan
    Dong, Xinghua
    Li, Yi
    Fang, Li
    Chen, Ping
    PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT (IEEE IC-NIDC), 2018, : 260 - 264
  • [9] Security and auditing of VPN
    Boukari, N
    Aljane, A
    THIRD INTERNATIONAL WORKSHOP ON SERVICES IN DISTRIBUTED AND NETWORKED ENVIRONMENTS, PROCEEDINGS, 1996, : 132 - 138
  • [10] Security Auditing in the Fog
    Parkinson, Simon
    Qin, Yongrui
    Khan, Saad
    Vallati, Mauro
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,