{"title":"成为专家:应对备受瞩目的网络安全漏洞的批判性思维方法","authors":"Scott R. Boss, Joy Gray, Diane J. Janvrin","doi":"10.2308/issues-2021-094","DOIUrl":null,"url":null,"abstract":"ABSTRACT This case examines three high-profile cybersecurity breaches to illustrate how organizations respond to these situations. Students explore breaches involving Capital One, Equifax, and Target and apply critical thinking to examine attack details, breach prevention, and breach responses by assuming the roles of security consultants, chief information officers, and internal auditors. The case objectives include (1) summarizing how organizations respond to cybersecurity breaches, (2) evaluating threats to organizations’ cybersecurity infrastructure, and (3) justifying how accountants and auditors may respond to cybersecurity breaches. This case is designed for undergraduate- or graduate-level accounting information systems, auditing, information technology (IT) auditing, internal auditing, and fraud examination classes and can be extended for intermediate or advanced financial accounting courses. This case provides instructor flexibility, as the class can be split into three groups with each group assigned as the expert on one breach or one or more breaches can be assigned to all students.","PeriodicalId":1,"journal":{"name":"Accounts of Chemical Research","volume":null,"pages":null},"PeriodicalIF":16.4000,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Be an Expert: A Critical Thinking Approach to Responding to High-Profile Cybersecurity Breaches\",\"authors\":\"Scott R. Boss, Joy Gray, Diane J. Janvrin\",\"doi\":\"10.2308/issues-2021-094\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"ABSTRACT This case examines three high-profile cybersecurity breaches to illustrate how organizations respond to these situations. Students explore breaches involving Capital One, Equifax, and Target and apply critical thinking to examine attack details, breach prevention, and breach responses by assuming the roles of security consultants, chief information officers, and internal auditors. The case objectives include (1) summarizing how organizations respond to cybersecurity breaches, (2) evaluating threats to organizations’ cybersecurity infrastructure, and (3) justifying how accountants and auditors may respond to cybersecurity breaches. This case is designed for undergraduate- or graduate-level accounting information systems, auditing, information technology (IT) auditing, internal auditing, and fraud examination classes and can be extended for intermediate or advanced financial accounting courses. This case provides instructor flexibility, as the class can be split into three groups with each group assigned as the expert on one breach or one or more breaches can be assigned to all students.\",\"PeriodicalId\":1,\"journal\":{\"name\":\"Accounts of Chemical Research\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":16.4000,\"publicationDate\":\"2023-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Accounts of Chemical Research\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.2308/issues-2021-094\",\"RegionNum\":1,\"RegionCategory\":\"化学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"CHEMISTRY, MULTIDISCIPLINARY\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Accounts of Chemical Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2308/issues-2021-094","RegionNum":1,"RegionCategory":"化学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"CHEMISTRY, MULTIDISCIPLINARY","Score":null,"Total":0}
Be an Expert: A Critical Thinking Approach to Responding to High-Profile Cybersecurity Breaches
ABSTRACT This case examines three high-profile cybersecurity breaches to illustrate how organizations respond to these situations. Students explore breaches involving Capital One, Equifax, and Target and apply critical thinking to examine attack details, breach prevention, and breach responses by assuming the roles of security consultants, chief information officers, and internal auditors. The case objectives include (1) summarizing how organizations respond to cybersecurity breaches, (2) evaluating threats to organizations’ cybersecurity infrastructure, and (3) justifying how accountants and auditors may respond to cybersecurity breaches. This case is designed for undergraduate- or graduate-level accounting information systems, auditing, information technology (IT) auditing, internal auditing, and fraud examination classes and can be extended for intermediate or advanced financial accounting courses. This case provides instructor flexibility, as the class can be split into three groups with each group assigned as the expert on one breach or one or more breaches can be assigned to all students.
期刊介绍:
Accounts of Chemical Research presents short, concise and critical articles offering easy-to-read overviews of basic research and applications in all areas of chemistry and biochemistry. These short reviews focus on research from the author’s own laboratory and are designed to teach the reader about a research project. In addition, Accounts of Chemical Research publishes commentaries that give an informed opinion on a current research problem. Special Issues online are devoted to a single topic of unusual activity and significance.
Accounts of Chemical Research replaces the traditional article abstract with an article "Conspectus." These entries synopsize the research affording the reader a closer look at the content and significance of an article. Through this provision of a more detailed description of the article contents, the Conspectus enhances the article's discoverability by search engines and the exposure for the research.