Skip to main content
Article
Cyber Supply Chain Risk Management: Toward an Understanding of the Antecedents to Demand for Assurance
Journal of Information Systems
  • Clark Hampton, University of South Carolina
  • Steve G. Sutton, Norwegian School of Economics and Business Administration
  • Vicky Arnold, Norwegian School of Economics and Business Administration
  • Deepak Khazanchi, University of Nebraska at Omaha
Author ORCID Identifier

Steve G. Sutton: https://orcid.org/0000-0002-7096-7394

Deepak Khazanchi: https://orcid.org/0000-0002-2675-2871

Document Type
Article
Publication Date
10-7-2020
Disciplines
Abstract

Recognizing the need for effective cyber risk management processes across the supply chain, the AICPA issued a new SOC in March 2020 for assuring cyber supply chain risk management (C-SCRM) processes. This study examines supply chain relationship factors and cyber risk issues to better understand the demand for C-SCRM assurance. Resource-Advantage Theory of Competition provides the conceptual foundation for assessing the dual drivers of relationship building and cyber risk management on demand for assurance. We use a field survey to collect data from 205 professionals enabling evaluation of the complex relationships in the theoretical model. Results support all hypotheses, provide satisfactory model fit, and support the underlying theory. Trust and cyber supply chain risk both positively influence demand for assurance over C-SCRM processes. This study expands the literature on cyber assurance by auditors and elaborates on overall supply chain processes that help drive value from auditors providing such assurance.

Comments

This is an Accepted Manuscript of an article published by American Accounting Association in Journal of Information Systems on October 7, 2020, available online: https://doi.org/10.2308/ISYS-19-050

Citation Information
Hampton, C., Sutton, S. G., Arnold, V., & Khazanchi, D. (2021). Cyber supply chain risk management: Toward an understanding of the antecedents to demand for assurance. Journal of Information Systems, 35(2): 37-60. https://doi.org/10.2308/ISYS-19-050