References
- Agranovich, B. (2017). Technology innovation: Enabling risk management through utilization of new digital technology. https://fievy.com/browse/document/digital-transformation-strategy-2249 (accessed on 18th January 2017).
- Ammar, A. (2020) Audit risk model: inherent risk, control risk & detection risk https://accounting-simplified.com/audit/risk-assessment/audit-risk/ (accessed on 5/11/2020).
- Appelbaum, D., & Nehmer, R. A. (2020). Auditing cloud-based blockchain accounting systems. Journal of Information Systems, 34(2), 5–21. https://doi.org/10.2308/isys-52660
- Bucena, I., & Kirikova, M. (2017). Simplifying the DevOps adoption process. In BIR Workshops (pp. 1–15). SBSI'20: XVI Brazilian Symposium on Information Systems. https://doi.org/10.1145/3411564.3411608
- Buchanan, I. & Clayton E. (2014). Doing Business Where Governance Is Weak - Eight principles for succeeding in markets prone to ethical and legal risks. Retrieved December 3, 2020, from http://www.strategy-business.com/article/00265?
- Carvalho, A. V., & Esteban-Navarro, M. (2016). Intelligence audit: Planning and assessment of organizational intelligence systems. Journal of Librarianship and Information Science, 48(1), 47–59. https://doi.org/10.1177/0961000614536198
- Cerbone, D., & Maroun, W. (2020). Materiality in an integrated reporting setting: Insights using an institutional logics framework. The British Accounting Review, 52(3), 100876. https://doi.org/10.1016/j.bar.2019.100876
- Cicchiello, A. F. (2020). Digital transformation in South Africa: Opportunities and challenges during Covid-19 pandemic. Information Technology Innovations in Economics, Finance, Accounting, and Law, 1(7). Retrieved June 1, 2021, from http://www.alexpander.it/09-DigitalTransformation.pdf
- Cooke, I. (2019). IS audit basics: auditing cybersecurity, Isaca Journal. https://www.isaca.org/resources/isaca-journal/issues/2019/volume-2/is-audit-basics-auditing-cybersecurity#:~:text=%20ISACA%20JOURNAL%20%201%20Determine%20Audit%20Subject.,planning%20and%20scoping%20process%20should%20identify…%20More%20 (accessed on 15 November 2020).
- COSO (2016). Fraud risk management guide, https://www.coso.org/Documents/COSO-Fraud-Risk-Management-Guide-Executive-Summary.pdf (accessed on 24/09/17).
- DeFond, M., & Zhang, J. (2014). A review of archival auditing research. Journal of Accounting and Economics, 275–326. https://doi.org/10.1016/j.jacceco.2014.09.002
- Delta Risk LLC, (2016). Cybersecurity and the board of directors. http://www.delta-risk.net/, (accessed on 30 January 2017).
- Dikmen, I., Birgonul, M. T., Anac, C., Tah, J. H. M., & Aouad, G. (2008). Learning from risks: A tool for post-project risk assessment. Automation in Construction, 18(1), 42–50. https://doi.org/10.1016/j.autcon.2008.04.008
- Ernst & Young (2013). Ten key IT considerations for internal audit Effective IT risk assessment and audit planning; http://www.ey.com/Publication/vwLUAssets/Ten_key_IT_considerations_for_internal_audit/$FILE/Ten_key_IT_considerations_for_internal_audit.pdf. (accessed on 14 November 2016).
- Esparza, D. E. I., Díaz, F. J., Egas, M. B. R., Sinchiguano, F. A. C., & Misacango, R. A. L. (2020, June). Evaluation model of computer audit methodologies based on inherent risk. In 2020 15th Iberian Conference on Information Systems and Technologies (CISTI) (pp. 1–7). Seville, Spain: IEEE.
- Flood, J. M. (2016). AU‐C 315 Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement. Wiley Practitioner's Guide to GAAS 2015: Covering all SASs, SSAEs, SSARSs, PCAOB Auditing Standards, and Interpretations.
- Geerts, G. L., Graham, L. E., Mauldin, E. G., McCarthy, W. E., & Richardson, V. J. (2013). Integrating information technology into accounting research and practice. Accounting Horizons, 27(4), 815–840. https://doi.org/10.2308/acch-50573
- Gregor, S., & Hevner, A. R. (2013). Positioning and presenting design science research for maximum impact. MIS Quarterly, 37(2), 337–355. https://doi.org/10.25300/MISQ/2013/37.2.01
- Heflo IBM. 2020. Digital transformation maturity model: What is the digital maturity of your company? (Accessed on the 08 of November 2020) https://www.heflo.com/blog/business-transformation/digital-transformation-maturity-model/
- Hevner, A. R. (2007). A Three Cycle View of Design Science Research. Scandinavian Journal of Information Systems, 19(2), 87–92. Retrieved June 1, 2021, from http://aisel.aisnet.org/sjis/vol19/iss2/4
- Huck, V. (2016). King IV report on corporate governance released; http://www.theaccountant-online.com/news/king-iv-report-on-corporate-governance-released-5654840/. (accessed on the 3rd of November 2016).
- IBM (2020). DevSecOps, https://www.ibm.com/cloud/learn/devsecops#toc-benefits-o-xSQ5W2ma (accessed on 8 November 2020).
- ISACA (2020). Securing the Cloud for a competitive edge. https://www.isaca.org/resources/news-and-trends/newsletters/atisaca/2020/volume-23/securing-the-cloud-for-competitive-edge?cid=edmi_2005682&Appeal=EDMi♠rid=MTE4MTI5NzIyNDE5S0♠mid=32758915&spMailingID=32758915&spUserID=MTE4MTI5NzIyNDE5S0&spJobID=1823469519&spReportId=MTgyMzQ2OTUxOQS2 (accessed on 11/ 11/2020)
- i-Scoop. (2020). Digital transformation: Online guide to digital business transformation. https://www.i-scoop.eu/digital-transformation/ (accessed on November 1, 2020).
- Kahorongo, T. C., Reddy, N., & Karodia, A. M. (2015). The adoption of information technology in the governance system of the bank of Namibia. Business and Management Studies, 1(2), 77–96.
- Karagiorgos, T., Drogalas, G., Pazarskis, M., & Christodoulou, P. (2007). Internal auditing as a main tool for efficient risk assessment. In 2007 Management of International Business & Economic Systems (MIBES) Conference.University of Macedonia, MIBES 2007.
- Koo, T. K., & Li, M. Y. (2016). A guideline of selecting and reporting intraclass correlation coefficients for reliability res OPearch. Journal of Chiropractic Medicine, 15(2), 155–163. https://doi.org/10.1016/j.jcm.2016.02.012
- Li, H. J., Chang, S. I., & Yen, D. C. (2017). Investigating CSFs for the life cycle of an ERP system from the perspective of IT governance. Computer Standards & Interfaces, 50, 269–279. https://doi.org/10.1016/j.csi.2016.10.013
- Lohse, S. (2017). Pragmatism, ontology and philosophy of the social sciences in practice, philosophy of the social sciences 2017. 47(1), 3–27. https://journals.sagepub.com/doi/full/10.1177/0048393116654869
- Majdalawieh, M., & Zaghloul, I. (2009). Paradigm shift in information systems auditing. Managerial Auditing Journal, 24(4), 352–367. https://doi.org/10.1108/02686900910948198
- Marr, B. (2020). How The COVID-19 pandemic is fast-tracking digital transformation In Companies.https://www.forbes.com/sites/bernardmarr/2020/03/17/how-the-covid-19-pandemic-is-fast-tracking-digital-transformation-in-companies/?sh=532181d6a8ee (accessed on 02/ 11/2020).
- Merhout, J. W., & Havelka, D. (2008). Information technology auditing: A value-added IT governance partnership between IT management and audit. Communications of the Association for Information Systems, 23(1), 26. https://doi.org/10.17705/1CAIS.02326
- Mrsic, L., Petracic, S., & Balkovic, M. (2019, October). Application of advanced data analytics in the audit process. In International Conference on Intelligent Computing & Optimization (pp. 521–530). Springer, Cham.
- Mun, J. (2020). Risk-based ROI, Capital budgeting, and portfolio optimization in the department of defense. Defense AR Journal, 27(1), 61–107.
- Parker, J. (2012). Calculating ROI on Information Technology Projects. https://enfocussolutions.com/calculating-roi-on-information-technology-projects/ (accessed on 12/ 11/2020).
- Persico, F. (2016). How Technology is Transforming Audit. Retrieved December 13, 2020, from http://www.accountingtoday.com/accounting-technology/?
- Radovanović, D., Radojević, T., Lučić, D., & Šarac, M. (2010). IT audit in accordance with COBIT standard. In MIPRO, 2010 Proceedings of the 33rd International Convention (pp. 1137–1141). Opatija, Croatia: IEEE.
- Reis, J., Amorim, M., Melão, N., & Matos, P. (2018, March). Digital transformation: A literature review and guidelines for future research. In World conference on information systems and technologies (pp. 411–421). Springer, Cham.
- Riungu-Kalliosaari, L., Mäkinen, S., Lwakatare, L. E., Tiihonen, J., & Männistö, T. (2016, November). DevOps adoption benefits and challenges in practice: A case study. In International Conference on Product-Focused Software Process Improvement (pp. 590–597). Springer, Cham.
- Roth, S., Dahms, H. F., Welz, F., & Cattacin, S. (2019). Print theories of computer societies. Introduction to the digital transformation of social theory. Technological Forecasting and Social Change, 149, 119778. https://doi.org/10.1016/j.techfore.2019.119778
- Santos, R., Abreu, A., Dias, A., Calado, J. M., Anes, V., & Soares, J. (2020). A framework for risk assessment in collaborative networks to promote sustainable systems in innovation ecosystems. Sustainability, 12(15), 6218. https://doi.org/10.3390/su12156218
- Sayana, S. A. (2002). The IS audit process. Information Systems Control Journal, 1, 20–22.
- Shahid, A. (2014). Strategic Planning Using COBIT 5, Volume 2, April 2014, http://www.isaca.org/knowledge-center/COBIT/documents/cf-vol-2-2014-strategic-planning-using-COBIT-5_nlt_eng_0414.pdf (accessed on 14 September 2015).
- Singleton, T. (2014). IS audit basics: Beyond the IT in IT Audit (Part 2). ISACA Journal, 4. Guest Editorial: Why Everyone Dislikes the IT Auditor and How to Change It (isaca.org) (accessed on 01/06/2021).
- Sparapani, J., & Pratt, M. K. (2020). Digital Transformation. https://searchcio.techtarget.com/definition/digitaltransformation?_ga=2.241031939.1258322713.1603209225-1944047263.1603209225 ( Accessed on the 20th of October 2020).
- Svata, V. (2011). IS audit considerations in respect of current economic environment? Journal of Systems Integration, 2(1), 12–20. https://doi.org/10.20470/jsi.v2i1.79
- Tanimoto, S., Yamada, S., Iwashita, M., Kobayashi, T., Sato, H., & Kanai, A. (2016). Risk assessment of BYOD: Bring your own device. In Consumer Electronics, IEEE 5th Global Conference on (pp. 1-4). Kyoto, Japan: IEEE.
- Thuan, N. H., Drechsler, A., & Antunes, P. (2019). Construction of design science research questions. Communications of the Association for Information Systems, 44(1), 20.
- Trad, A., & Kalpic, D. (2020). The business transformation framework on Knowledge and Intelligence-Driven Development (KIDD). In Encyclopedia of Organizational Knowledge, Administration, and Technology (pp. 373–391). IGI Global.
- Tucci, L. (2020). Ultimate guide to artificial intelligence in the enterprise. https://searchenterpriseai.techtarget.com/Ultimate-guide-to-artificial-intelligence-in-the-enterprise (accessed on 5/11/2020).
- Van Aken, J. E. (2005). Management research as a design science: Articulating the research products of mode 2 knowledge production in management. British Journal of Management, 16(1), 19–36.
- Wescott, R. E. (2014), Using COBIT 5 as an Audit tool, http://www.isaca.org/Knowledge-Center (accessed on 26 July 2015).
- Westerman, G., Bonnet, D., & McAfee, A. (2014). The Nine Elements of Digital Transformation. https://sloanreview.mit.edu/article/the-nine-elements-of-digital-transformation/?gclid=CjwKCAjwz6_8BRBkEiwA3p02VVQmG33S9g7Sh3CnGjKFlwdWLFPtE1zzsObWxU6IOge_zmKrMAGEoBoCOMgQAvD_BwE (accessed 27/ 10/2020).