How to cite this paper
Gunawan, B., Ratmono, B., Kurniasih, D & Setyoko, P. (2023). Cybersecurity effectiveness: The role of internal auditor certification, risk assessment and senior management.International Journal of Data and Network Science, 7(4), 1805-1814.
Refrences
AlDaajeh, S., Saleous, H., Alrabaee, S., Barka, E., Breitinger, F., & Choo, K. K. R. (2022). The role of national cybersecu-rity strategies on the improvement of cybersecurity education. Computers & Security, 119, 102754.
Arpaci, I., & Aslan, O. (2023). Development of a scale to measure cybercrime-awareness on social media. Journal of Computer Information Systems, 63(3), 695-705.
Chaudhary, S., Gkioulos, V., & Katsikas, S. (2022). Developing metrics to assess the effectiveness of cybersecurity awareness program. Journal of Cybersecurity, 8(1), tyac006.
Creemers, R. (2023). Cybersecurity Law and Regulation in China: Securing the Smart State. China Law and Society Re-view, 6(2), 111-145.
Eboibi, F. E., & Ogorugba, O. M. (2023). Cybercrime Regulation and Nigerian Youths Increasing Involvement in Internet Fraud: Attacking the Roots Rather than the Symptoms. Journal of Legal Ethical & Regular Isses, 26, 1.
Hair, J. F., Sarstedt, M., Ringle, C. M., & Mena, J. A. (2012). An assessment of the use of partial least squares structural equation modeling in marketing research. Journal of the academy of marketing science, 40, 414-433.
Kemp, S. (2023). Exploring public cybercrime prevention campaigns and victimization of businesses: A Bayesian model averaging approach. Computers & Security, 127, 103089.
Kurniawan, Y., & Mulyawan, A. N. (2023). The Role of External Auditors in Improving Cybersecurity of the Companies through Internal Control in Financial Reporting. Journal of System and Management Sciences, 13(1), 485-510.
Khan, N. F., Ikram, N., Murtaza, H., & Javed, M. (2023). Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick's Model. Computers & Security, 125, 103049.
Kumar, G., Pandey, S. K., Varshney, N., Kumar, A., Kumar, M., & Singh, K. U. (2023, April). Cybersecurity Education: Understanding the knowledge gaps based on cybersecurity policy, challenge, and knowledge. In 2023 IEEE 12th Inter-national Conference on Communication Systems and Network Technologies (CSNT) (pp. 735-741). IEEE.
Li, Y., Goel, S., & Williams, K. J. (2023). Exploring Antecedents of Professional Skepticism on Accounting Students’ Performance in Cybersecurity. Journal of Emerging Technologies in Accounting, 20(1), 147-168.
Lim, A., Brewer, N., & Young, R. L. (2023). Revisiting the relationship between cybercrime, autistic traits, and autism. Journal of Autism and Developmental Disorders, 53(4), 1319-1330.
Masoud, N., & Al-Utaibi, G. (2022). The determinants of cybersecurity risk disclosure in firms’ financial reporting: Em-pirical evidence. Research in Economics, 76(2), 131-140.
Mijwil, M., & Aljanabi, M. (2023). Towards artificial intelligence-based cybersecurity: the practices and ChatGPT gener-ated ways to combat cybercrime. Iraqi Journal For Computer Science and Mathematics, 4(1), 65-70.
Nobles, C. (2022). Stress, burnout, and security fatigue in cybersecurity: A human factors problem. HOLISTICA–Journal of Business and Public Administration, 13(1), 49-72.
Nwankpa, J. K., & Datta, P. M. (2023). Remote vigilance: The roles of cyber awareness and cybersecurity policies among remote workers. Computers & Security, 130, 103266.
Nyre-Yu, M., Morris, E., Moss, B. C., Smutz, C., & Smith, M. (2022, April). Explainable AI in Cybersecurity Operations: Lessons Learned from xAI Tool Deployment. In Proceedings of the Usable Security and Privacy (USEC) Symposium, San Diego, CA, USA (Vol. 28).
Shillair, R., Esteve-González, P., Dutton, W. H., Creese, S., Nagyfejeo, E., & von Solms, B. (2022). Cybersecurity educa-tion, awareness raising, and training initiatives: National level evidence-based results, challenges, and promise. Com-puters & Security, 119, 102756.
Steinmetz, K. F., Schaefer, B. P., Brewer, C. G., & Kurtz, D. L. (2023). The Role of Computer Technologies in Structuring Evidence Gathering in Cybercrime Investigations: A Qualitative Analysis. Criminal Justice Review, 07340168231161091.
Oumaima, C., Abdeslam, R., Yassine, S., & Abderrazek, F. (2022). Experimental study on the effectiveness of machine learning methods in web intrusion detection. In Advances in Information, Communication and Cybersecurity: Proceed-ings of ICI2C’21 (pp. 486-494). Springer International Publishing.
Parker, S., Wu, Z., & Christofides, P. D. (2023). Cybersecurity in process control, operations, and supply chain. Comput-ers & Chemical Engineering, 108169.
Purwanto, A., Purba, J.T., Bernarto, I., Sijabat, R. (2023).Investigating the role digital transformation and human resource management on the performance of the universities. International Journal of Data and Network Science, 7(4). DOI: 10.5267/j.ijdns.2023.6.01128.
Pratiwi, H. A., & Wulandari, L. (2021). Evaluasi Tingkat Kesiapan Keamanan Informasi Menggunakan Indeks Keamanan Informasi (Indeks KAMI) Versi 4.0 pada Dinas Komunikasi dan Informatika Kota Bogor. Journal of Industrial Engi-neering & Management Research, 2(5), 146 - 163. https://doi.org/10.7777/jiemar.v2i5.196
Sam, M. F. M., Ismail, A. F. M. F., Bakar, K. A., Ahamat, A., & Qureshi, M. I. (2022). The Effectiveness of IoT Based Wearable Devices and Potential Cybersecurity Risks: A Systematic Literature Review from the Last Decade. Interna-tional journal of online and biomedical engineering, 18(9), 56-73.
Slapničar, S., Vuko, T., Čular, M., & Drašček, M. (2022). Effectiveness of cybersecurity audit. International Journal of Accounting Information Systems, 44, 100548.
Selimoglu, S. K., & Saldi, M. H. (2023). Blockchain Technology for Internal Audit in Cybersecurity Governance of Bank-ing Sector in Turkey: A SWOT Analysis. In Contemporary Studies of Risks in Emerging Technology, Part B (pp. 23-55). Emerald Publishing Limited.
Utomo, H. J. N., Irwantoro, I., Wasesa, S., Purwati, T., Sembiring, R., & Purwanto, A. (2023). Investigating The Role of Innovative Work Behavior, Organizational Trust, Perceived Organizational Support: An Empirical Study on SMEs Performance. Journal of Law and Sustainable Development, 11(2), e417. https://doi.org/10.55908/sdgs.v11i2.417
Valiyev, A., oglu Rustamov, F. V., Huseynova, R. A., Orujova, M. S., & Musayeva, S. N. (2022). The digitalization effec-tiveness as an innovative factor development of the agriculture in Azerbaijan. Journal of Eastern European and Cen-tral Asian Research (JEECAR), 9(2), 194-205.
Victory, C. O., Promise, E., & Mike, C. N. (2022). Impact of Cyber-Security on Fraud Prevention in Nigerian Commercial Banks. Jurnal Akuntansi, Keuangan, dan Manajemen, 4(1), 15-27.
Yusif, S., & Hafeez-Baig, A. (2023). Cybersecurity Policy Compliance in Higher Education: A Theoretical Framework. Journal of Applied Security Research, 18(2), 267-288.
Wissink, I. B., Standaert, J. C., Stams, G. J. J., Asscher, J. J., & Assink, M. (2023). Risk factors for juvenile cybercrime: A meta-analytic review. Aggression and Violent Behavior, 101836.
Wu, L., Peng, Q., & Lembke, M. (2023). Research Trends in Cybercrime and Cybersecurity: A Review Based on Web of Science Core Collection Database. International Journal of Cybersecurity Intelligence & Cybercrime, 6(1), 5-28.
Wylde, V., Rawindaran, N., Lawrence, J., Balasubramanian, R., Prakash, E., Jayal, A., ... & Platts, J. (2022). Cybersecuri-ty, data privacy and blockchain: a review. SN Computer Science, 3(2), 127.
Arpaci, I., & Aslan, O. (2023). Development of a scale to measure cybercrime-awareness on social media. Journal of Computer Information Systems, 63(3), 695-705.
Chaudhary, S., Gkioulos, V., & Katsikas, S. (2022). Developing metrics to assess the effectiveness of cybersecurity awareness program. Journal of Cybersecurity, 8(1), tyac006.
Creemers, R. (2023). Cybersecurity Law and Regulation in China: Securing the Smart State. China Law and Society Re-view, 6(2), 111-145.
Eboibi, F. E., & Ogorugba, O. M. (2023). Cybercrime Regulation and Nigerian Youths Increasing Involvement in Internet Fraud: Attacking the Roots Rather than the Symptoms. Journal of Legal Ethical & Regular Isses, 26, 1.
Hair, J. F., Sarstedt, M., Ringle, C. M., & Mena, J. A. (2012). An assessment of the use of partial least squares structural equation modeling in marketing research. Journal of the academy of marketing science, 40, 414-433.
Kemp, S. (2023). Exploring public cybercrime prevention campaigns and victimization of businesses: A Bayesian model averaging approach. Computers & Security, 127, 103089.
Kurniawan, Y., & Mulyawan, A. N. (2023). The Role of External Auditors in Improving Cybersecurity of the Companies through Internal Control in Financial Reporting. Journal of System and Management Sciences, 13(1), 485-510.
Khan, N. F., Ikram, N., Murtaza, H., & Javed, M. (2023). Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick's Model. Computers & Security, 125, 103049.
Kumar, G., Pandey, S. K., Varshney, N., Kumar, A., Kumar, M., & Singh, K. U. (2023, April). Cybersecurity Education: Understanding the knowledge gaps based on cybersecurity policy, challenge, and knowledge. In 2023 IEEE 12th Inter-national Conference on Communication Systems and Network Technologies (CSNT) (pp. 735-741). IEEE.
Li, Y., Goel, S., & Williams, K. J. (2023). Exploring Antecedents of Professional Skepticism on Accounting Students’ Performance in Cybersecurity. Journal of Emerging Technologies in Accounting, 20(1), 147-168.
Lim, A., Brewer, N., & Young, R. L. (2023). Revisiting the relationship between cybercrime, autistic traits, and autism. Journal of Autism and Developmental Disorders, 53(4), 1319-1330.
Masoud, N., & Al-Utaibi, G. (2022). The determinants of cybersecurity risk disclosure in firms’ financial reporting: Em-pirical evidence. Research in Economics, 76(2), 131-140.
Mijwil, M., & Aljanabi, M. (2023). Towards artificial intelligence-based cybersecurity: the practices and ChatGPT gener-ated ways to combat cybercrime. Iraqi Journal For Computer Science and Mathematics, 4(1), 65-70.
Nobles, C. (2022). Stress, burnout, and security fatigue in cybersecurity: A human factors problem. HOLISTICA–Journal of Business and Public Administration, 13(1), 49-72.
Nwankpa, J. K., & Datta, P. M. (2023). Remote vigilance: The roles of cyber awareness and cybersecurity policies among remote workers. Computers & Security, 130, 103266.
Nyre-Yu, M., Morris, E., Moss, B. C., Smutz, C., & Smith, M. (2022, April). Explainable AI in Cybersecurity Operations: Lessons Learned from xAI Tool Deployment. In Proceedings of the Usable Security and Privacy (USEC) Symposium, San Diego, CA, USA (Vol. 28).
Shillair, R., Esteve-González, P., Dutton, W. H., Creese, S., Nagyfejeo, E., & von Solms, B. (2022). Cybersecurity educa-tion, awareness raising, and training initiatives: National level evidence-based results, challenges, and promise. Com-puters & Security, 119, 102756.
Steinmetz, K. F., Schaefer, B. P., Brewer, C. G., & Kurtz, D. L. (2023). The Role of Computer Technologies in Structuring Evidence Gathering in Cybercrime Investigations: A Qualitative Analysis. Criminal Justice Review, 07340168231161091.
Oumaima, C., Abdeslam, R., Yassine, S., & Abderrazek, F. (2022). Experimental study on the effectiveness of machine learning methods in web intrusion detection. In Advances in Information, Communication and Cybersecurity: Proceed-ings of ICI2C’21 (pp. 486-494). Springer International Publishing.
Parker, S., Wu, Z., & Christofides, P. D. (2023). Cybersecurity in process control, operations, and supply chain. Comput-ers & Chemical Engineering, 108169.
Purwanto, A., Purba, J.T., Bernarto, I., Sijabat, R. (2023).Investigating the role digital transformation and human resource management on the performance of the universities. International Journal of Data and Network Science, 7(4). DOI: 10.5267/j.ijdns.2023.6.01128.
Pratiwi, H. A., & Wulandari, L. (2021). Evaluasi Tingkat Kesiapan Keamanan Informasi Menggunakan Indeks Keamanan Informasi (Indeks KAMI) Versi 4.0 pada Dinas Komunikasi dan Informatika Kota Bogor. Journal of Industrial Engi-neering & Management Research, 2(5), 146 - 163. https://doi.org/10.7777/jiemar.v2i5.196
Sam, M. F. M., Ismail, A. F. M. F., Bakar, K. A., Ahamat, A., & Qureshi, M. I. (2022). The Effectiveness of IoT Based Wearable Devices and Potential Cybersecurity Risks: A Systematic Literature Review from the Last Decade. Interna-tional journal of online and biomedical engineering, 18(9), 56-73.
Slapničar, S., Vuko, T., Čular, M., & Drašček, M. (2022). Effectiveness of cybersecurity audit. International Journal of Accounting Information Systems, 44, 100548.
Selimoglu, S. K., & Saldi, M. H. (2023). Blockchain Technology for Internal Audit in Cybersecurity Governance of Bank-ing Sector in Turkey: A SWOT Analysis. In Contemporary Studies of Risks in Emerging Technology, Part B (pp. 23-55). Emerald Publishing Limited.
Utomo, H. J. N., Irwantoro, I., Wasesa, S., Purwati, T., Sembiring, R., & Purwanto, A. (2023). Investigating The Role of Innovative Work Behavior, Organizational Trust, Perceived Organizational Support: An Empirical Study on SMEs Performance. Journal of Law and Sustainable Development, 11(2), e417. https://doi.org/10.55908/sdgs.v11i2.417
Valiyev, A., oglu Rustamov, F. V., Huseynova, R. A., Orujova, M. S., & Musayeva, S. N. (2022). The digitalization effec-tiveness as an innovative factor development of the agriculture in Azerbaijan. Journal of Eastern European and Cen-tral Asian Research (JEECAR), 9(2), 194-205.
Victory, C. O., Promise, E., & Mike, C. N. (2022). Impact of Cyber-Security on Fraud Prevention in Nigerian Commercial Banks. Jurnal Akuntansi, Keuangan, dan Manajemen, 4(1), 15-27.
Yusif, S., & Hafeez-Baig, A. (2023). Cybersecurity Policy Compliance in Higher Education: A Theoretical Framework. Journal of Applied Security Research, 18(2), 267-288.
Wissink, I. B., Standaert, J. C., Stams, G. J. J., Asscher, J. J., & Assink, M. (2023). Risk factors for juvenile cybercrime: A meta-analytic review. Aggression and Violent Behavior, 101836.
Wu, L., Peng, Q., & Lembke, M. (2023). Research Trends in Cybercrime and Cybersecurity: A Review Based on Web of Science Core Collection Database. International Journal of Cybersecurity Intelligence & Cybercrime, 6(1), 5-28.
Wylde, V., Rawindaran, N., Lawrence, J., Balasubramanian, R., Prakash, E., Jayal, A., ... & Platts, J. (2022). Cybersecuri-ty, data privacy and blockchain: a review. SN Computer Science, 3(2), 127.