IT security auditing: A performance evaluation decision model

被引:12
|
作者
Herath, Hemantha S. B. [1 ]
Herath, Tejaswini C. [2 ]
机构
[1] Goodman Sch Business, Dept Accounting, St Catharines, ON L2S 3A1, Canada
[2] Goodman Sch Business, Dept Finance Operat & Informat Syst, St Catharines, ON L2S 3A1, Canada
关键词
Information technology management; Information technology audit; Information systems audit; Information security audit; Audit decision; Agency model; SARBANES-OXLEY; SYSTEMS;
D O I
10.1016/j.dss.2013.07.010
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Compliance with ever-increasing privacy laws, accounting and banking regulations, and standards is a top priority for most organizations. Information security and systems audits for assessing the effectiveness of IT controls are important for proving compliance. Information security and systems audits, however, are not mandatory to all organizations. Given the various costs, including opportunity costs, the problem of deciding when to undertake a security audit and the design of managerial incentives becomes an important part of an organization's control process. In view of these considerations, this paper develops an IT security performance evaluation decision model for whether or not to conduct an IT security audit. A Bayesian extension investigates the impact of new information regarding the security environment on the decision. Since security managers may act in an opportunistic manner, the model also incorporates agency costs to determine the incentive payments for managers to conduct an audit. Cases in which the agency model suggests that it is optimal not to conduct an IT security audit are also discussed. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:54 / 63
页数:10
相关论文
共 50 条
  • [41] The Evaluation Model for Network Security
    Lu, Zhiyong
    Zhou, Yunyan
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 690 - 694
  • [42] Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation
    Bernik, Igor
    Prislan, Kaja
    PLOS ONE, 2016, 11 (09):
  • [43] Hygiene performance rating-An auditing scheme for evaluation of slaughter hygiene
    Rotterud, O. J.
    Gravning, G. E. N.
    Hauge, S. J.
    Alvseike, O.
    METHODSX, 2020, 7
  • [44] A performance evaluation of web services security
    Tang, Kezhe
    Chen, Shiping
    Levy, David
    Zic, John
    Yan, Bo
    10TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, PROCEEDINGS, 2006, : 67 - 74
  • [45] Performance and Information Security Evaluation with Firewalls
    Hayajneh, Thaier
    Mohd, Bassam J.
    Itradat, Awni
    Quttoum, Ahmad Nahar
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (06): : 355 - 372
  • [46] Identity-and-data privacy forward security public auditing protocol in the standard model
    Zhang, Jianhong
    Jiang, Zhengtao
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (15)
  • [47] Performance evaluation of INDECT security architecture
    Machnik, Petr
    Niemiec, Marcin
    Uruena, Manuel
    Stoianov, Nikolai
    REVISTA ITECKNE, 2018, 15 (01): : 34 - 42
  • [48] AUDITING BMJ DECISION-MAKING
    SMITH, R
    BRITISH MEDICAL JOURNAL, 1993, 306 (6869): : 3 - 4
  • [49] Performance Evaluation and Attribution of Security Portfolios
    Bagri, Kishor
    FINANCIAL ANALYSTS JOURNAL, 2014, 70 (06) : 57 - 58
  • [50] The security performance evaluation of digital watermarking
    Zhang, Xinhong
    Li, Shejiao
    Zhang, Fan
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 762 - 763