A Privacy-Aware Framework for Financial Auditing in Digitalization Era

Shuhidan S.M., Awang Y.B., Ifada L.M., Taib A.B., Norsuriati Z., Sulistyowati S.

Abstract

Continuous Auditing (CA) is a type of financial audit process system that uses technology in its implementation. Like any other system, data information breaches can occur, and a robust method is needed to handle it. The implementation of technology in this financial audit method potentially produces numerous risks such as increased abuse of authority, mistakes in selecting and utilizing IT and loss due to privacy breaches. The preservation of privacy should be made a priority in a system in order to prevent data information breaches. An awareness of privacy in CA can help auditors and clients to develop information security and privacy controls effectively during the audit process. Adopting the privacy framework provided by Daniel Martinez and Joshua Marks, we then aligned COSO and Privacy Framework to manage privacy and data protection in the Continuous Auditing implementation.

Journal
Lecture Notes in Networks and Systems
Page Range
207-216
Publication date
2022
Total citations
COSO implementation in Lebanese firms: The impact of organisational culture and leadership value competency on perceived internal control efficiency-an exploratory approach

Abdo M., Feghali K.

COSO enterprise risk management implementation in Jordanian commercial banks and its impact on financial performance

Al-Khadash H.A., Embassy-Jordan U., Jireis J.R.

No Title

Dangi M.R.M.

Implementation of internal control by COSO framework on fraud prevention in national health insurance claim on hospitals in Banyumas

Halim N.S.A.

The importance of (COSO-ERM) model implementation in enhancing the effectiveness of internal control systems in the Jordanian commercial banks (field study)

Jabbar Alkubaisi A.A.

Implementation of COSO ERM as security control framework in cloud service provider

Suroso J.S.

No Title

Sagita L., Upy P.M.

A study of information technology risk management of government and business organizations in Thailand using COSO-ERM based on the COBIT 5 framework

Tangprasert S.

A privacy, security, safety, resilience and reliability focused risk assessment methodology for IIoT systems steps to build and use secure IIoT systems. In: 2018 global internet of things summit (GIoTS)

Nakamura E.T., Ribeiro S.L.

Privacy-preserving OLAP: An information-theoretic approach

Zhang N., Zhao W.

Access to Document