IT security auditing: A performance evaluation decision model

被引:12
|
作者
Herath, Hemantha S. B. [1 ]
Herath, Tejaswini C. [2 ]
机构
[1] Goodman Sch Business, Dept Accounting, St Catharines, ON L2S 3A1, Canada
[2] Goodman Sch Business, Dept Finance Operat & Informat Syst, St Catharines, ON L2S 3A1, Canada
关键词
Information technology management; Information technology audit; Information systems audit; Information security audit; Audit decision; Agency model; SARBANES-OXLEY; SYSTEMS;
D O I
10.1016/j.dss.2013.07.010
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Compliance with ever-increasing privacy laws, accounting and banking regulations, and standards is a top priority for most organizations. Information security and systems audits for assessing the effectiveness of IT controls are important for proving compliance. Information security and systems audits, however, are not mandatory to all organizations. Given the various costs, including opportunity costs, the problem of deciding when to undertake a security audit and the design of managerial incentives becomes an important part of an organization's control process. In view of these considerations, this paper develops an IT security performance evaluation decision model for whether or not to conduct an IT security audit. A Bayesian extension investigates the impact of new information regarding the security environment on the decision. Since security managers may act in an opportunistic manner, the model also incorporates agency costs to determine the incentive payments for managers to conduct an audit. Cases in which the agency model suggests that it is optimal not to conduct an IT security audit are also discussed. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:54 / 63
页数:10
相关论文
共 50 条
  • [21] QUEST - A SECURITY AUDITING TOOL
    KAPILOW, SA
    CHEREPOV, M
    AT&T TECHNICAL JOURNAL, 1988, 67 (03): : 65 - 71
  • [22] Security-auditing in a softswitch
    Choudhary, AR
    IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 292 - 293
  • [23] Auditing Security of Information Flows
    Kozlovs, Dmitrijs
    Kirikova, Marite
    PERSPECTIVES IN BUSINESS INFORMATICS RESEARCH, BIR 2016, 2016, 261 : 204 - 219
  • [24] Automation of code auditing for security
    Whittaker, W
    PROCEEDINGS OF THE PERL CONFERENCE 4.0, 2000, : 123 - 126
  • [25] Teaching database security and auditing
    Department of Computer Science and Engineering, University of Tennessee at Chattanooga, Chattanooga, TN 37403, United States
    SIGCSE Bull. Inroads, 2009, 1 (241-245):
  • [26] A security model based on intelligent decision
    Xu, Shiping
    Zhou, Ying
    Guo, Ronghua
    Du, Jiawei
    Liu, Zhe
    2018 INTERNATIONAL SYMPOSIUM ON POWER ELECTRONICS AND CONTROL ENGINEERING (ISPECE 2018), 2019, 1187
  • [27] Mutual Auditing Framework for Service Level Security Auditing in Cloud
    Sasmal, Soumitra
    Pan, Indrajit
    2017 THIRD IEEE INTERNATIONAL CONFERENCE ON RESEARCH IN COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (ICRCICN), 2017, : 297 - 302
  • [28] The application of DEA model in enterprise environmental performance auditing
    Li, F.
    Zhu, L. Y.
    Zhang, J. D.
    Liu, C. Y.
    Qu, Z. G.
    Xiao, M. S.
    INTERNATIONAL CONFERENCE ON ENERGY ENGINEERING AND ENVIRONMENTAL PROTECTION (EEEP2016), 2017, 52
  • [29] Auditing the biochemical evaluation of hypercalcaemia in a model 2 hospital
    Bennett, G.
    Mahmood, W.
    Ryan, M.
    Promod, T.
    Abdalla, A.
    IRISH JOURNAL OF MEDICAL SCIENCE, 2022, 191 (SUPPL 4) : 101 - 101
  • [30] The performance evaluation of the listed security companies in China based on the DEA model
    Zhang, Yan-Liang, 1600, Transport and Telecommunication Institute, Lomonosova street 1, Riga, LV-1019, Latvia (18):