Abstract:
General Background: The rise of digital financial systems has increased banking institutions' exposure to cyber threats, particularly security system breaches, posing risks to data integrity and audit operations. Specific Background: Iraqi commercial banks have experienced frequent cyber attacks on accounting information systems, raising concerns about audit accuracy, data manipulation, and access delays. However, research on these threats' direct consequences for auditing remains scarce. Knowledge Gap: Prior studies emphasize cybersecurity measures but overlook how cyber attacks disrupt audit processes, transparency, and efficiency. Aims: This study evaluates security breaches' effects on auditing, assesses data manipulation risks, examines delays in financial access, and explores cyber incident investigations' role in mitigating threats. Results: Findings reveal that hacking compromises audit accuracy, causes operational delays, and threatens financial security, emphasizing the need for advanced cybersecurity measures. Novelty: This study bridges cybersecurity and auditing, providing empirical evidence on cyber threats’ disruption of audit performance. Implications: Strengthening cybersecurity frameworks is essential for maintaining audit reliability and financial sector stability.
Highlights:
- Cyber attacks compromise audit efficiency, data integrity, and financial security.
- Hacking, data manipulation, and delays weaken audit accuracy and transparency.
- Strengthening cybersecurity enhances audit reliability and banking sector stability.
Keywords: Cybersecurity, Audit, Cyberattacks, Accounting Information Systems
References
M. G. Alles and G. L. Gray, "The Role of Big Data in Fraud Detection: A Survey of Financial Statement Auditors," J. Account. Lit., vol. 36, pp. 27-46, 2016.
R. Anderson and T. Moore, "The Economics of Information Security," Science, vol. 314, no. 5799, pp. 610-613, 2007.
M. Bishop, Computer Security: Art and Science, 2nd ed. Boston, MA, USA: Addison-Wesley, 2018.
A. Calder and S. Watkins, IT Governance: An International Guide to Data Security and ISO 27001/ISO 27002, 6th ed. London, U.K.: Kogan Page, 2024.
P. H. Gregory, CISSP Guide to Security Essentials, New York, NY, USA: McGraw-Hill Education, 2015.
A. Hovav and J. D'Arcy, "Applying an Extended Model of Deterrence Across Cultures: An Investigation of Information Systems Misuse in the U.S. and South Korea," Inf. Manage., vol. 49, no. 2, pp. 99-110, 2012.
M. Jouini, L. B. A. Rabai, and A. B. Aissa, "Classification of Security Threats in Information Systems," Procedia Comput. Sci., vol. 32, pp. 489-496, 2014.
A. Kaplan and M. Haenlein, "Siri, Siri, in My Hand: Who’s the Fairest in the Land? On the Interpretations, Illustrations, and Implications of Artificial Intelligence," Bus. Horiz., vol. 62, no. 1, pp. 15-25, 2019.
W. F. Messier, S. M. Glover, and D. F. Prawitt, Auditing and Assurance Services: A Systematic Approach, 11th ed. New York, NY, USA: McGraw-Hill Education, 2019.
S. Posthumus and R. von Solms, "A Framework for the Governance of Information Security," Comput. Secur., vol. 23, no. 8, pp. 638-646, 2004.
M. B. Romney and P. J. Steinbart, Accounting Information Systems, 15th ed. Boston, MA, USA: Pearson, 2020.
P. Weill and J. W. Ross, IT Governance: How Top Performers Manage IT Decision Rights for Superior Results, Boston, MA, USA: Harvard Business School Press, 2004.
S. A. Zbar, "Requirements to Support a Management Information System to Confront the Cyber Threat in the Iraqi Trade Bank," Russ. Law J., vol. 11, no. 3, pp. 736-759, 2023.
K. H. Shihan and M. J. Radif, "Internal and External Factors to Adopt a Cyber Security Strategy in Iraqi Organisations," Webology, vol. 19, no. 1, pp. 5181-5198, 2022.
I. A. Hamidi and K. S. Hussein, "The Impact of Cyber Risk Management on the Strategy for Protecting Financial Assets: Descriptive and Analytical Research of the Opinions of a Sample of Employees in the Trade Bank of Iraq," Conf. Lit. Humanit. Nat. Sci., 2024.
M. F. Hasan and N. S. Al-Ramadan, "Cyber-Attacks and Cyber Security Readiness: Iraqi Private Banks Case," Soc. Sci. Humanit. J. (SSHJ), pp. 2312-2323, 2021.
P. Rikhardsson, C. Rohde, L. Christensen, and C. E. Batt, "Management Controls and Crisis: Evidence from the Banking Sector," Account. Audit. Accountab. J., vol. 34, no. 4, pp. 757-785, 2021.
K. A. McEwan, "Cyber-Threats as Political Risk: Increased Risk for the Oil and Gas Industry," Ph.D. dissertation, Stellenbosch Univ., Stellenbosch, South Africa, 2020.
M. A. Saada and Y. Turan, "Intelligent System for Measurement and Appreciate a Country Power, Capabilities," J. Inf. Sci. Eng., vol. 37, no. 6, 2021.
A. Calder and S. Watkins, IT Governance: An International Guide to Data Security and ISO 27001/ISO 27002, 5th ed. London, U.K.: Kogan Page, 2015.
W. N. Wan-Hussin, H. Fitri, and B. Salim, "Audit Committee Chair Overlap, Chair Expertise, and Internal Auditing Practices: Evidence from Malaysia," J. Int. Account. Audit. Taxation, vol. 44, p. 100413, 2021.