UNi Logo
UNi Logo UNi Logo UNi Logo UNi Logo

Über diesen Blog.

Hier schreiben Wissenschaftler*innen der Universität Oldenburg und Gastautor*innen darüber, wie sich Gesellschaften selbst wahrnehmen und thematisieren, sich ihrer jeweiligen Gegenwart vergewissern und dabei in die Zukunft entwerfen.

Wie stehen diese Selbstwahrnehmungen und -entwürfe mit Institutionen, Medien und Techniken zur Gestaltung von Natur, Gesellschaft und Subjektivität in Verbindung? Wie modellieren sie den lebensweltlichen Alltag und halten Menschen zu einem bestimmten Verhalten an? Wie werden diese Interventionen in das Gegebene begründet und legitimiert, aber auch kritisiert, verworfen oder unterlaufen?

Diesen Fragen, deren interdisziplinäre Reflexion eines der zentralen Anliegen des Wissenschaftlichen Zentrums „Genealogie der Gegenwart“ ist, gehen die Blogger aus unterschiedlichen Fachperspektiven und Tätigkeitszusammenhängen mit Blick auf kontrovers verhandelte Themen wie Migration, Ungleichheit, Digitalisierung, Kriminalität, Gesundheit und Ökologie nach.

27.06.2022
Flirt4free review

During the related really works, Kahyaoglu and Caliyurt (2018) checked out the latest cybersecurity assurance processes from the internal audit angle

von Team

The main issues and you may means were said about precisely how being a dependable cybersecurity advisor, and you can a sample cybersecurity good sense program checklist are offered. For example, Kahyaoglu and you will Caliyurt (2018, p. 371) determined that “internal auditors is to build their own It audit potential to add proactive understanding and, similar to this, they could make well worth-additional guidance so you can administration.”

In the long run, Gyun No and Vasarhelyi (2017) talked about whether or not external auditors can be doing work in cybersecurity. Very first, it reported that cybersecurity is obviously dictate the economic health out of an organisation, because the projected average can cost you away from cyber-episodes are very highest. Next, auditor ability within highly tech section of cybersecurity raises further issues. Including, is actually latest auditors taught to take part in cybersecurity facts? Hence, they www.datingranking.net/flirt4free-review stated that auditors might have training in almost every other topic issues that may convergence which have cybersecurity, such valuation, where the auditor depends on professionals to support trick assertions. While some firms render their staff in it audit expertise experiences, more scope off accountant degree precludes this type of event (Gyun Zero and Vasarhelyi, 2017). After that, it contended that when maybe not auditors, after that who will be use the role off integrating economic and you will cyber-chance advice towards the some kind of assurance that may be given in order to investors? In the end, and more than notably, it discussed the risk investigations portion of future audits. They figured substantive scientific studies are expected on the best way to consist of the brand new generally qualitative items of your own threat of cyber visibility with the the conventional audit model.

4.4 Disclosure away from cybersecurity products

The brand new next search theme includes articles exploring the disclosure of cybersecurity issues. As mentioned prior to, Gordon ainsi que al. (2006) highlighted the new impression of your SOX (2002) on the volunteer revelation of information-security points by the firms. They obviously emphasized that the SOX got a confident affect eg revelation. In order to clarify, their findings revealed that the new voluntary revelation of information-safety affairs got increased of the over 100 % due to the fact passage of SOX in comparison with 2 years before the law’s execution. It was an appealing searching for, as the SOX didn’t clearly address the situation of data safeguards. Towards the a related notice, Gordon mais aussi al. (2010) tested voluntary disclosures in regards to the cybersecurity and you will argued you to definitely voluntary disclosures into the the fresh annual writeup on cybersecurity make it a business to provide signals with the markets that “the firm are positively involved with stopping, finding and correcting coverage breaches.” Accordingly, Gordon mais aussi al. recommended it is a proper solutions regardless of if good organization voluntarily chooses to reveal affairs regarding the information defense; it after that said that there is certainly clear proof one to an ever-increasing quantity of communities are willingly revealing advice linked to cybersecurity. Also, Gordon mais aussi al. provided empirical help into the dispute you to volunteer disclosures linked to cybersecurity is actually certainly and you may notably related to the brand new stock rate. Their performance shown generic service on the signaling conflict, and therefore claims you to definitely managers which reveal recommendations voluntarily try in line with expanding corporation value. Most importantly, its efficiency revealed that “voluntary disclosures linked to proactive security features by a strong keeps top influence on the fresh new firm’s , p. 590).

The outcome showed that the fresh new shared risk of security things with chance minimization templates was less likely to become linked to upcoming violation notices

On the other hand, Wang ainsi que al. (2013) checked-out the fresh relationship within revelation as well as the conclusion of data-threat to security and reported that businesses tend to disclose guidance-threat to security items in public areas filings. Wang et al. (2013) contended that the inner cybersecurity information associated with the disclosures is confident otherwise negative. They analyzed the characteristics of your own shared risk of security things, said to represent the fresh company’s internal facts about recommendations safeguards, try of the coming violation announcements advertised about media. This new report merchandise a decision forest model, which categorized the newest occurrence away from upcoming shelter breaches in accordance with the textual items in the fresh revealed security risk situations. Brand new authors’ design been able to representative revelation properties truthfully having infraction announcements doing 77 % of the time. Wang ainsi que al. (2013) along with used text message-mining methods to lead a wealthier interpretation of the efficiency. Their results indicated that the marketplace impulse pursuing the a safety breach statement varies according to character of before revelation. To summarize, the analysis indicated that new text message away from risk of security facts try an acceptable predictor of upcoming said breaches. Much more truthfully, Wang et al. (2013) displayed you to firms that reveal actionable (risk-mitigating) recommendations try less likely to be in the cover incidents. The fresh conclusions indicate that agencies getting proactive action possess an incentive to disclose its posture on guidance protection genuinely.

Diskussion einblenden/ausblenden

Bis jetzt noch keine Kommentare.

Einen Kommentar abgeben