IT security auditing: A performance evaluation decision model

被引:12
|
作者
Herath, Hemantha S. B. [1 ]
Herath, Tejaswini C. [2 ]
机构
[1] Goodman Sch Business, Dept Accounting, St Catharines, ON L2S 3A1, Canada
[2] Goodman Sch Business, Dept Finance Operat & Informat Syst, St Catharines, ON L2S 3A1, Canada
关键词
Information technology management; Information technology audit; Information systems audit; Information security audit; Audit decision; Agency model; SARBANES-OXLEY; SYSTEMS;
D O I
10.1016/j.dss.2013.07.010
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Compliance with ever-increasing privacy laws, accounting and banking regulations, and standards is a top priority for most organizations. Information security and systems audits for assessing the effectiveness of IT controls are important for proving compliance. Information security and systems audits, however, are not mandatory to all organizations. Given the various costs, including opportunity costs, the problem of deciding when to undertake a security audit and the design of managerial incentives becomes an important part of an organization's control process. In view of these considerations, this paper develops an IT security performance evaluation decision model for whether or not to conduct an IT security audit. A Bayesian extension investigates the impact of new information regarding the security environment on the decision. Since security managers may act in an opportunistic manner, the model also incorporates agency costs to determine the incentive payments for managers to conduct an audit. Cases in which the agency model suggests that it is optimal not to conduct an IT security audit are also discussed. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:54 / 63
页数:10
相关论文
共 50 条
  • [31] PERFORMANCE AUDITING
    STALLWORTHY, EA
    CHEMICAL ENGINEER-LONDON, 1989, (462): : 51 - 51
  • [32] The Balanced Scorecard: Measures That Drive Performance Evaluation in Auditing Firms
    Hegazy, Mohamed
    Hegazy, Karim
    Eldeeb, Mohamed
    JOURNAL OF ACCOUNTING AUDITING AND FINANCE, 2022, 37 (04): : 902 - 927
  • [33] Renaissance System Model Improving Security and Third Party Auditing in Cloud Computing
    Loheswaran, K.
    Premalatha, J.
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 90 (02) : 1051 - 1066
  • [34] Renaissance System Model Improving Security and Third Party Auditing in Cloud Computing
    K. Loheswaran
    J. Premalatha
    Wireless Personal Communications, 2016, 90 : 1051 - 1066
  • [35] On the evaluation of the decision performance of an incomplete decision table
    Qian, Yuhua
    Dang, Chuangyin
    Liang, Jiye
    Zhang, Haiyun
    Ma, Jianmin
    DATA & KNOWLEDGE ENGINEERING, 2008, 65 (03) : 373 - 400
  • [36] Information security: Auditing the behaviour of the employee
    Vroom, C
    von Solms, R
    SECURITY AND PRIVACY IN THE AGE OF UNCERTAINTY, 2003, 122 : 401 - 404
  • [37] An auditing mechanism for the security of service in grid
    Liu, Zhusong
    Li, Zhike
    Sun, Sheng
    Li, Yunfa
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (08): : 2041 - 2053
  • [38] Security Patterns for Automated Continuous Auditing
    Kearney, Bob
    Tryfonas, Theodore
    INFORMATION SECURITY JOURNAL, 2008, 17 (01): : 13 - 25
  • [39] Auditing Code for Security Vulnerabilities with CodeSonar
    Vitek, David
    2016 IEEE CYBERSECURITY DEVELOPMENT (IEEE SECDEV 2016), 2016, : 154 - 154
  • [40] A Security Framework for Database Auditing System
    Wang Huijie
    2017 10TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL. 1, 2017, : 350 - 353