<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1d1 20130915//EN" "http://jats.nlm.nih.gov/publishing/1.1d1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" article-type="research-article" xml:lang="en">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">SAJEMS</journal-id>
<journal-title-group>
<journal-title>South African Journal of Economic and Management Sciences</journal-title>
</journal-title-group>
<issn pub-type="ppub">1015-8812</issn>
<issn pub-type="epub">2222-3436</issn>
<publisher>
<publisher-name>AOSIS</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">SAJEMS-29-6133</article-id>
<article-id pub-id-type="doi">10.4102/sajems.v29i1.6133</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Original Research</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Exploring cybersecurity disclosure in South Africa</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-9961-4560</contrib-id>
<name>
<surname>Putter</surname>
<given-names>Laura F.</given-names>
</name>
<xref ref-type="aff" rid="AF0001">1</xref>
</contrib>
<contrib contrib-type="author" corresp="yes">
<contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-9679-4869</contrib-id>
<name>
<surname>Johnson</surname>
<given-names>Ruth</given-names>
</name>
<xref ref-type="aff" rid="AF0001">1</xref>
</contrib>
<contrib contrib-type="author">
<contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-7585-8579</contrib-id>
<name>
<surname>Mans-Kemp</surname>
<given-names>Nadia</given-names>
</name>
<xref ref-type="aff" rid="AF0001">1</xref>
</contrib>
<aff id="AF0001"><label>1</label>Department of Business Management, Faculty of Economic and Management Sciences, Stellenbosch University, Stellenbosch, South Africa</aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><bold>Corresponding author:</bold> Ruth Johnson, <email xlink:href="rsolomons@sun.ac.za">rsolomons@sun.ac.za</email></corresp>
</author-notes>
<pub-date pub-type="epub"><day>12</day><month>01</month><year>2026</year></pub-date>
<pub-date pub-type="collection"><year>2026</year></pub-date>
<volume>29</volume>
<issue>1</issue>
<elocation-id>6133</elocation-id>
<history>
<date date-type="received"><day>18</day><month>02</month><year>2025</year></date>
<date date-type="accepted"><day>31</day><month>10</month><year>2025</year></date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2026. The Authors</copyright-statement>
<copyright-year>2026</copyright-year>
<license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>Licensee: AOSIS. This work is licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.</license-p>
</license>
</permissions>
<abstract>
<sec id="st1">
<title>Background</title>
<p>The coronavirus disease 2019 (COVID-19) pandemic resulted in the increased use of technology by companies. As such, corporate leaders started giving due attention to escalating cybersecurity concerns and disclosing such information to stakeholders in integrated reports to enhance legitimacy.</p>
</sec>
<sec id="st2">
<title>Aim</title>
<p>The authors investigated cybersecurity disclosures by selected South African companies that were most vulnerable to cyber threats before and during the COVID-19 pandemic.</p>
</sec>
<sec id="st3">
<title>Setting</title>
<p>Disclosures by selected Banking, Health care, Technology and Retail companies that were listed on the Johannesburg Stock Exchange (JSE) were analysed between 2017 and 2022.</p>
</sec>
<sec id="st4">
<title>Method</title>
<p>Content analysis was conducted on integrated reports. Three cybersecurity disclosure metrics were computed, namely disclosure presence (the number of keyword occurrences), disclosure level (coverage scores based on the unique keywords used relative to the total number of keywords) and disclosure volume (number of paragraphs comprising cybersecurity information). Significant differences for the three disclosure metrics were assessed for the overall period and between the considered years by conducting sequential analysis of variance (ANOVA) and Fisher&#x2019;s least significant difference (LSD) analyses, respectively.</p>
</sec>
<sec id="st5">
<title>Results</title>
<p>The disclosure presence, level and volume of cybersecurity by sampled companies improved noticeably. Statistically significant differences were observed for the overall period for all three disclosure metrics. Most of the annual differences for cybersecurity disclosures were significant.</p>
</sec>
<sec id="st6">
<title>Conclusion</title>
<p>The sampled companies rapidly adopted and adapted their cyber-related practices and disclosures since 2020. The companies disclosed on key cybersecurity threats and the management thereof in their integrated reports to enhance their legitimacy.</p>
</sec>
<sec id="st7">
<title>Contribution</title>
<p>This study shows which cybersecurity matters received the most attention by the sampled JSE-listed companies in their integrated reports.</p>
</sec>
</abstract>
<kwd-group>
<kwd>cybersecurity</kwd>
<kwd>disclosure presence</kwd>
<kwd>disclosure level</kwd>
<kwd>disclosure volume</kwd>
<kwd>content analysis</kwd>
</kwd-group>
<funding-group>
<funding-statement><bold>Funding information</bold> This research received no specific grant from any funding agency in the public, commercial, or not-for-profit sectors.</funding-statement>
</funding-group>
</article-meta>
</front>
<body>
<sec id="s0001">
<title>Introduction</title>
<p>Although companies globally and in South Africa are increasingly reaping the benefits associated with cybertechnology, numerous financial losses and reputational damages because of cybercrime were also reported (PricewaterhouseCoopers [PwC] <xref ref-type="bibr" rid="CIT0039">2022</xref>). Companies require appropriate cybersecurity frameworks and systems to withstand such attacks (Eling &#x0026; Schnell <xref ref-type="bibr" rid="CIT0019">2016</xref>). Since the advent of the coronavirus disease 2019 (COVID-19) pandemic, cyber risks, threats and attacks, and by implication the need for enhanced cybersecurity, have become even more prevalent (Accenture <xref ref-type="bibr" rid="CIT0001">2021a</xref>).</p>
<p>Cybersecurity refers to technologies, processes and organisational structures that protect a company&#x2019;s information technology (IT) networks and systems from security flaws, breaches and infringements on intellectual property rights (Craigen, Diakun-Thibault &#x0026; Purse <xref ref-type="bibr" rid="CIT0015">2014</xref>). Cybersecurity structures and systems thus guard companies against various types of potential cyber risks, threats and attacks (Zwilling <xref ref-type="bibr" rid="CIT0052">2022</xref>).</p>
<p>The World Economic Forum (<xref ref-type="bibr" rid="CIT0051">2022</xref>) confirmed that cyber risks challenge corporate leaders globally. As such, risk management is an essential corporate governance matter to ensure that cybersecurity concerns are sufficiently addressed. Yet several corporate leaders view cybersecurity as an IT consideration rather than a pertinent corporate governance issue (Clinton <xref ref-type="bibr" rid="CIT0013">2022</xref>).</p>
<p>In light of the substantial increase in cybercrime, researchers, shareholders and regulators are increasingly expecting companies to disclose information on cybersecurity matters (Bravo <xref ref-type="bibr" rid="CIT0010">2017</xref>; Institute of Directors in South Africa [IoDSA] <xref ref-type="bibr" rid="CIT0023">2016</xref>; Radu &#x0026; Smaili <xref ref-type="bibr" rid="CIT0040">2021</xref>). To enhance their legitimacy, companies attempt to disclose sufficient details on material matters, such as their cyber risk exposure and the management thereof to key stakeholders in integrated reports (Mazumder &#x0026; Hossain <xref ref-type="bibr" rid="CIT0032">2023</xref>). On the other hand, reporters should concurrently caution against disclosing critical information that could be exploited by cybercriminals (Peng &#x0026; Krivacek <xref ref-type="bibr" rid="CIT0036">2020</xref>).</p>
<p>Limited research has been conducted on cybersecurity disclosure internationally (Gao, Calderon &#x0026; Tang <xref ref-type="bibr" rid="CIT0020">2020</xref>; H&#x00E9;roux &#x0026; Fortin <xref ref-type="bibr" rid="CIT0022">2020</xref>; Sari et al. <xref ref-type="bibr" rid="CIT0044">2024</xref>). Given that South Africa has been identified as the most targeted African country (Interpol <xref ref-type="bibr" rid="CIT0026">2021</xref>), this exploratory study was conducted to investigate cybersecurity disclosure by selected companies listed on the Johannesburg Stock Exchange (JSE) that are most vulnerable to cyber threats. Cybersecurity disclosures by companies that were listed in the health care and Technology industries, and Retail and Banking sectors of the JSE between 2017 and 2022 were analysed. These industries and sectors are mainly affected by cyberattacks (Pieterse <xref ref-type="bibr" rid="CIT0038">2021</xref>). The sampled companies&#x2019; cybersecurity disclosures were investigated pre- and during the COVID-19 pandemic to explore significant changes. Content analysis was conducted on their integrated reports based on the six-step approach outlined by Babbie (<xref ref-type="bibr" rid="CIT0006">2021</xref>). Three cybersecurity disclosure metrics, namely disclosure presence, level and volume were considered. This study thereby makes a unique contribution by enabling corporate stakeholders to reflect on key cybersecurity matters in highly targeted South African industries and sectors based on disclosure presence (number of keyword occurrences), disclosure level (reflecting the variety of unique cybersecurity matters that were disclosed) and disclosure volume (paragraphs devoted to cybersecurity considerations). By identifying prominent issues on which highly targeted companies focused, policies and practices can be developed and refined to enhance cybersecurity. This is a key corporate governance consideration as technology, in particular artificial intelligence (AI), is developing at an unprecedented rate.</p>
<p>Since the advent of the COVID-19 pandemic, the sampled companies considerably enhanced their reporting on cyber-related information. Current and prospective shareholders can reflect on such disclosures to identify investee companies that have improved their cybersecurity, thereby arguably enhancing their legitimacy.</p>
<p>Cybersecurity considerations and relevant regulation are discussed next. Details are also provided on cybersecurity disclosure in the context of the legitimacy theory. Thereafter, the methodology is outlined, followed by a discussion on trends and significant differences for the three cybersecurity measures for the overall period and per annum. Lastly, conclusions and recommendations are offered for several corporate stakeholders.</p>
</sec>
<sec id="s0002">
<title>Cybersecurity considerations, regulation and disclosure</title>
<p>Cyber risk refers to the possibility of disruption, reputational damage and monetary loss if IT systems fail (Aldasoro et al. <xref ref-type="bibr" rid="CIT0003">2022</xref>). Issues related to the use of information and communication technology (ICT) might further cause business disruption and infrastructure failure (Eling &#x0026; Schnell <xref ref-type="bibr" rid="CIT0019">2016</xref>).</p>
<p>Given the rise of such cybersecurity concerns, cyber resilience is gaining prominence among corporate leaders and IT officials, as it reflects a company&#x2019;s capacity to plan for, react to and recover from cyber risks and attacks (Accenture <xref ref-type="bibr" rid="CIT0002">2021b</xref>). The changing workplace settings of employees who worked remotely when the COVID-19 pandemic occurred negatively impacted the cyber resilience of several companies globally (Soni, Kukreja &#x0026; Sharma <xref ref-type="bibr" rid="CIT0047">2020</xref>).</p>
<p>Corporate leaders should thus ensure that cybersecurity and risk management are sufficiently integrated in corporate strategic objectives (Accenture <xref ref-type="bibr" rid="CIT0002">2021b</xref>; Maynard, Onibere &#x0026; Ahmad <xref ref-type="bibr" rid="CIT0031">2018</xref>). Sound cyber risk management substantially enhances corporate capacity to identify, investigate, implement and monitor cyber risks (IT Governance <xref ref-type="bibr" rid="CIT0028">2022</xref>).</p>
<p>To assist them with cyber risk management, the boards of directors increasingly appoint a chief information security officer (CISO). The CISO&#x2019;s key role is to focus on technological developments and the related cybersecurity implications (Eling &#x0026; Schnell <xref ref-type="bibr" rid="CIT0019">2016</xref>). Companies also appoint chief information officers (CIOs) and chief technology officers (CTOs) to assist them in accounting for internal and emerging technologies, respectively (McKinsey &#x0026; Company <xref ref-type="bibr" rid="CIT0033">2023</xref>). These individuals would then regularly engage with the board and IT governance committee on key cybersecurity matters and the latest technological developments, in particular AI (Board Portal <xref ref-type="bibr" rid="CIT0008">2023</xref>). Focus is placed on prominent cyber risks and regulation in South Africa in the next section, given the scope of this study.</p>
<sec id="s20003">
<title>Prominent cyber risks and regulation in South Africa</title>
<p>South Africa is an attractive target for cybercriminals (Census and Economic Information Center Data <xref ref-type="bibr" rid="CIT0011">2022</xref>; Interpol <xref ref-type="bibr" rid="CIT0026">2021</xref>). The most prevalent cyber risks in the country include phishing, data leaks, ransomware, distributed denial-of-service (DDoS) attacks and compromised websites (Pieterse <xref ref-type="bibr" rid="CIT0038">2021</xref>; Van Niekerk <xref ref-type="bibr" rid="CIT0050">2017</xref>).</p>
<p>Phishing entails that malware is installed to give a hacker access to sensitive information by luring employees to click on a malicious link (Zwilling <xref ref-type="bibr" rid="CIT0052">2022</xref>). This type of cyber threat often occurs in Banking and Health Care. Another costly cyber risk is data leaks. Client trust is broken, and legal action can be taken should sensitive data be exposed (Shekokar et al. <xref ref-type="bibr" rid="CIT0046">2022</xref>).</p>
<p>Ransomwarae is another prevalent cyber risk in the local context that can be used to encrypt confidential data. A ransom is then typically demanded from the victim company to regain access to the encrypted data (Institute of Chartered Accountants in England and Wales [ICAEW] <xref ref-type="bibr" rid="CIT0023">2016</xref>). Furthermore, a target&#x2019;s server can be flooded with internet traffic during a DDoS attack. Access to online services is then prevented and business operations come to a halt. Lastly, a website can become compromised if a hacker alters the code, thereby negatively affecting its availability, integrity and confidentiality (Pieterse <xref ref-type="bibr" rid="CIT0038">2021</xref>).</p>
<p>South Africa&#x2019;s public sector is particularly vulnerable to cyberattacks (Pieterse <xref ref-type="bibr" rid="CIT0038">2021</xref>). The amendment of the <italic>Protection of Personal Information (POPI) Act</italic> (<italic>No. 4 of 2013</italic>) makes provision for the impact of cybercrime on the personal information of South African citizens (Republic of South Africa <xref ref-type="bibr" rid="CIT0042">2022</xref>). This Act outlines that institutions that are in possession of personal data will be held liable for data breaches.</p>
<p>Furthermore, the <italic>Cybercrimes Act</italic> (<italic>No. 19 of 2020</italic>) came into effect in 2021 to establish a comprehensive cybersecurity legislative framework to deal with cybersecurity issues in the country. This Act outlines cyber-related legal offences, including unlawful access to and the interception of data, hacking and the use of ransomware. Cybercrime offenses can as such result in fines and imprisonment (Republic of South Africa <xref ref-type="bibr" rid="CIT0041">2021</xref>).</p>
<p>Given the rise in cyberattacks and the apparent weaknesses in IT security systems, the South African Reserve Bank&#x2019;s (SARB) Prudential Authority and the Financial Sector Conduct Authority (FSCA) released a joint draft standard on cybersecurity and cyber resilience requirements following the arrival of the COVID-19 pandemic. This joint standard was finalised in 2024 to ensure that local financial institutions have proper cybersecurity and cyber resilience procedures and systems (SARB <xref ref-type="bibr" rid="CIT0048">2024</xref>).</p>
<p>Furthermore, the King IV Report on corporate governance recommends that companies should disclose their cyber-, IT- and ICT management processes (IoDSA <xref ref-type="bibr" rid="CIT0024">2016</xref>). Principle 12 offers specific guidance on how to disclose information relating to IT: &#x2018;The governing body should govern Technology and information in a way that supports the organisation setting and achieving its strategic objectives&#x2019; (IoDSA <xref ref-type="bibr" rid="CIT0024">2016</xref>). Details on cybersecurity should be disclosed to stakeholders in integrated reports.</p>
</sec>
<sec id="s20004">
<title>Linking cybersecurity disclosure to the legitimacy theory</title>
<p>Cybersecurity disclosure specifically centres on a company&#x2019;s cyber risk exposure and the management thereof (Mazumder &#x0026; Hossain <xref ref-type="bibr" rid="CIT0032">2023</xref>). Investors and other key stakeholders require sufficient disclosure on material matters, including cyber risks and related corporate actions to make informed decisions. Yet report preparers should be cognisant that cybersecurity disclosures that are too detailed might result in exploitation by cybercriminals (Peng &#x0026; Krivacek <xref ref-type="bibr" rid="CIT0036">2020</xref>).</p>
<p>Internationally, limited research has been conducted on cybersecurity disclosure (Chen, Henry &#x0026; Jiang, <xref ref-type="bibr" rid="CIT0012">2023</xref>; Gao et al. <xref ref-type="bibr" rid="CIT0020">2020</xref>; H&#x00E9;roux &#x0026; Fortin <xref ref-type="bibr" rid="CIT0022">2020</xref>; Kurnia &#x0026; Ardianto <xref ref-type="bibr" rid="CIT0030">2024</xref>; Sari et al. <xref ref-type="bibr" rid="CIT0044">2024</xref>). Most of these studies were conducted pre-2020. H&#x00E9;roux and Fortin (<xref ref-type="bibr" rid="CIT0022">2020</xref>) conducted content analysis for Canadian companies between 2017 and 2018 and found that cybersecurity disclosure was low. Gao et al. (<xref ref-type="bibr" rid="CIT0020">2020</xref>) further examined the content and linguistic characteristics of cybersecurity risk disclosures of listed companies in the United States between 2007 and 2018 and found that their risk disclosures became lengthy and increasingly difficult to read. Kurnia and Ardianto (<xref ref-type="bibr" rid="CIT0030">2024</xref>) investigated the cybersecurity disclosures of banks in Indonesia. They compiled a cybersecurity disclosure score by conducting content analysis and largely ascribed the observed increase in cybersecurity disclosure to regulation.</p>
<p>Furthermore, Amir, Levi and Livne (<xref ref-type="bibr" rid="CIT0005">2018</xref>) reported a negative link between cyberattacks and cybersecurity disclosure, as companies tend to limit reporting on such attacks. Yet Chen et al. (<xref ref-type="bibr" rid="CIT0012">2023</xref>) noticed that cybersecurity risk disclosure only increased after a severe data breach. In addition, these authors recorded a significant negative market reaction if breached companies decreased their cybersecurity disclosures. The implication is that the market anticipates increased disclosure following a data breach.</p>
<p>Given the significance of cybersecurity disclosures as outlined by previous research, reporters should hence be transparent and provide verifiable cybersecurity disclosures. These disclosures have a considerable influence on stakeholders&#x2019; attitudes towards and trust in reporting companies (Bansal &#x0026; Axelton <xref ref-type="bibr" rid="CIT0007">2023</xref>). Furthermore, the perceived benefits of voluntary assurance on cyber disclosure, particularly if cybersecurity breaches occurred, significantly influence investors&#x2019; judgements of the impacted companies (Navarro &#x0026; Sutton <xref ref-type="bibr" rid="CIT0034">2024</xref>).</p>
<p>Investors often consult disclosures in integrated reports to reflect on key matters, such as cybersecurity. Such analyses of corporate disclosures are typically based on the legitimacy theory (Harymawan et al. <xref ref-type="bibr" rid="CIT0021">2020</xref>; Nuber &#x0026; Velte <xref ref-type="bibr" rid="CIT0035">2021</xref>; Radu &#x0026; Smaili <xref ref-type="bibr" rid="CIT0040">2021</xref>). Dowling and Pfeffer (<xref ref-type="bibr" rid="CIT0018">1975</xref>) explained that corporate behaviour is substantively influenced by the views of stakeholders in the environment in which companies operate. To be perceived as legitimate a company&#x2019;s activities and the behaviour of its directors should be congruent with the values and beliefs of society. As South Africa is very vulnerable to cyberattacks, it is argued that corporate stakeholders will perceive companies that give more attention to cybersecurity as more legitimate than their counterparts that give less attention to this pressing matter.</p>
<p>Prior scholars outlined different types of legitimacy. Pragmatic legitimacy might specifically be gained through corporate disclosures (Suchman <xref ref-type="bibr" rid="CIT0049">1995</xref>). A company might obtain pragmatic legitimacy if it has the capacity to convince key stakeholders of its usefulness, inter alia, to protect their personal information (Bowen <xref ref-type="bibr" rid="CIT0009">2019</xref>).</p>
<p>Pragmatic legitimacy includes dispositional and exchange legitimacy. Dispositional legitimacy is acquired when companies are considered trustworthy and perceived to have their stakeholders&#x2019; best interests at heart, given the assumptions that companies are autonomous and morally responsible actors (Suchman <xref ref-type="bibr" rid="CIT0049">1995</xref>). Similarly, exchange legitimacy refers to stakeholders supporting companies based on expected or realised benefits (Suchman <xref ref-type="bibr" rid="CIT0049">1995</xref>), such as the protection of their interests through enhancing cybersecurity. It is thus important that stakeholders gain a clear understanding of related corporate actions and implications through disclosures in integrated reports (Shehata <xref ref-type="bibr" rid="CIT0045">2014</xref>).</p>
</sec>
</sec>
<sec id="s0005">
<title>Methods</title>
<p>An exploratory study was conducted to investigate the cybersecurity disclosures of selected JSE-listed companies that are most vulnerable to cyberattacks by conducting content analysis. Qualitative information reported in the sampled companies&#x2019; integrated reports were coded to analyse their cybersecurity disclosures. The sample was selected based on the following judgement criteria: a company had to operate in a sector or industry recognised for being exposed to cyberattacks and related risks; a company should have been listed on the JSE for at least 2 years from 2017 to 2022; and a company had to publish integrated reports while being listed.</p>
<p>Pieterse (<xref ref-type="bibr" rid="CIT0038">2021</xref>), Reva (<xref ref-type="bibr" rid="CIT0043">2021</xref>) and Van Niekerk (<xref ref-type="bibr" rid="CIT0050">2017</xref>) found that Banking, Health Care and Retail companies were largely affected by cyberattacks. The Technology industry was furthermore selected as the use of technology, and consequently, cybercrime rose substantially during the recent pandemic (Dolley <xref ref-type="bibr" rid="CIT0017">2021</xref>; KPMG <xref ref-type="bibr" rid="CIT0029">2022</xref>). The research period hence covered the COVID-19 period (2020&#x2013;2022) and the preceding 3 years (2017&#x2013;2019). The sample comprised of 7 Banking, 8 Health Care, 23 Retail and 16 Technology companies.</p>
<p>Content analysis was conducted on the sampled companies integrated reports by adopting the six-step approach outlined by Babbie (<xref ref-type="bibr" rid="CIT0006">2021</xref>). During Step 1, the operational definitions of the cybersecurity metrics were developed. The number of cybersecurity keyword occurrences were determined (denoted as disclosure presence). The number of unique cybersecurity keywords that were mentioned relative to the total number of unique keywords identified in Step 3 was then computed and converted to a percentage resulting in a coverage score (denoted as disclosure level). Lastly, the number of cybersecurity paragraphs per integrated report was determined (denoted as disclosure volume).</p>
<p>During Step 2, the researchers decided on the type of text media that they would observe, namely published integrated reports. Step 3 then entailed identifying applicable keywords during two phases. Firstly, the literature review resulted in the identification of unique cybersecurity keywords, mainly based on Mazumder and Hossain (<xref ref-type="bibr" rid="CIT0032">2023</xref>), Pieterse (<xref ref-type="bibr" rid="CIT0038">2021</xref>), Radu and Smaili (<xref ref-type="bibr" rid="CIT0040">2021</xref>) and Van Niekerk (<xref ref-type="bibr" rid="CIT0050">2017</xref>). Secondly, a pilot study was conducted to determine cybersecurity keywords that were specific to the local context, and the considered industries and sectors. As a result, 62 cybersecurity keywords were identified, as shown in <xref ref-type="app" rid="app001">Appendix 1</xref>. Keyword variations in terms of spelling and the usage of plural versus singular form as well as abbreviations versus words written in full also were considered.</p>
<p>During Steps 4 and 5, the required qualitative data were collected by conducting content analysis and coded by using AutoIt. This scripting program for Microsoft Windows utilises a Beginner&#x2019;s All-purpose Symbolic Instruction Code scripting language. AutoIt was used to convert the considered integrated reports into text files, similar to the method employed by Allini, Rossi and Hussainey (<xref ref-type="bibr" rid="CIT0004">2016</xref>). The program mined 1 644 166 lines of text for the 62 cybersecurity keywords and their grammatical variations, as outlined in Step 3.</p>
<p>The program was furthermore scripted to determine &#x2018;false positives&#x2019;, that is, results that suggest the potential disclosure presence of cybersecurity keywords while they were used in other contexts, such as &#x2018;defend&#x2019; in the context of unrelated risks. The outlined process resulted in the extraction of 10 821 data points along with their metadata, including the position of each cybersecurity keyword hit, and the surrounding text. The data were then imported in Google sheets where after the primary researcher checked that there were no remaining &#x2018;false positives&#x2019;. The three cybersecurity measures indicated in Step 1 were then computed and captured in Microsoft Excel, whereafter the data were analysed and reported (Step 6).</p>
<p>Given that the research period included the COVID-19 pandemic, the researchers determined significant differences in the three cybersecurity disclosure metrics. A sequential analysis of variance (ANOVA) was used to explore significant differences over the entire research period while Fisher&#x2019;s least significant difference (LSD) test showed significant differences per year.</p>
<p>Pertaining to validity, the data were sourced from the audited integrated reports of the sampled companies. In terms of reliability, the six-step content analysis approach was outlined in detail and can be used by future researchers to conduct comparative studies.</p>
<sec id="s20006">
<title>Ethical considerations</title>
<p>Ethical clearance (exemption) was obtained from the relevant Departmental Ethics Screening Committee of Stellenbosch University before collecting the data. This article followed all ethical standards for research without direct contact with human or animal subjects.</p>
</sec>
</sec>
<sec id="s0007">
<title>Results and discussion</title>
<p>The outcomes of the content analysis in terms of disclosure presence, level and volume of cybersecurity will now be reported. Descriptive trends will be discussed first, followed by the outcomes of the difference tests.</p>
<sec id="s20008">
<title>Descriptive results</title>
<p>The disclosure presence is shown in <xref ref-type="fig" rid="F0001">Figure 1</xref>. The number of cybersecurity keyword occurrences increased noticeably post-2020, from 20 mean keyword occurrences in 2019 to 28 mean keyword occurrences in 2022. The maximum number of keyword occurrences was 109 in 2020 for a company that was a victim of a cyberattack. This attack resulted in the noticeable spike in disclosure presence of cybersecurity. Yet some sampled companies only disclosed 1 keyword, as indicated by the minimum value in <xref ref-type="fig" rid="F0001">Figure 1</xref>.</p>
<fig id="F0001">
<label>FIGURE 1</label>
<caption><p>Disclosure presence of cybersecurity.</p></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="SAJEMS-29-6133-g001.tif"/>
</fig>
<p>The sampled companies focused on specific keywords, thereby highlighting the most prominent cybersecurity matters. The most disclosed keywords for the overall sample were cybersecurity, IT and IT governance. Given the rise in cybercrime in South Africa, these keywords reflect noticeable awareness of the importance of cybersecurity. The extensive use of IT governance furthermore alludes to IT- and cyber-engagement from various of the sampled companies&#x2019; boards, in line with Principle 12 of King IV (IoDSA <xref ref-type="bibr" rid="CIT0024">2016</xref>). Various of the companies, however, mentioned the keyword &#x2018;cyber&#x2019; when disclosing details on security procedures and test breaches, instead of using the more nuanced &#x2018;cyber resilience&#x2019;. <xref ref-type="table" rid="T0001">Table 1</xref> indicates the top 15 keywords used by the sampled companies per year.</p>
<table-wrap id="T0001">
<label>TABLE 1</label>
<caption><p>Top 15 disclosed keywords per annum based on the number of keyword occurrences (<italic>n</italic>).</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left" rowspan="2">Position</th>
<th valign="top" align="center" colspan="2">2017<hr/></th>
<th valign="top" align="center" colspan="2">2018<hr/></th>
<th valign="top" align="center" colspan="2">2019<hr/></th>
<th valign="top" align="center" colspan="2">2020<hr/></th>
<th valign="top" align="center" colspan="2">2021<hr/></th>
<th valign="top" align="center" colspan="2">2022<hr/></th>
</tr>
<tr>
<th valign="top" align="left">Keywords</th>
<th valign="top" align="center"><italic>n</italic></th>
<th valign="top" align="left">Keywords</th>
<th valign="top" align="center"><italic>n</italic></th>
<th valign="top" align="left">Keywords</th>
<th valign="top" align="center"><italic>n</italic></th>
<th valign="top" align="left">Keywords</th>
<th valign="top" align="center"><italic>n</italic></th>
<th valign="top" align="left">Keywords</th>
<th valign="top" align="center"><italic>n</italic></th>
<th valign="top" align="left">Keywords</th>
<th valign="top" align="center"><italic>n</italic></th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">1</td>
<td align="left">Information technology</td>
<td align="center">134</td>
<td align="left">Information technology</td>
<td align="center">101</td>
<td align="left">Information technology</td>
<td align="center">128</td>
<td align="left">Cybersecurity</td>
<td align="center">223</td>
<td align="left">Cybersecurity</td>
<td align="center">307</td>
<td align="left">Cybersecurity</td>
<td align="center">307</td>
</tr>
<tr>
<td align="left">2</td>
<td align="left">IT governance</td>
<td align="center">93</td>
<td align="left">Cybersecurity</td>
<td align="center">93</td>
<td align="left">Cybersecurity</td>
<td align="center">121</td>
<td align="left">Information technology</td>
<td align="center">136</td>
<td align="left">Information technology</td>
<td align="center">121</td>
<td align="left">Information technology</td>
<td align="center">135</td>
</tr>
<tr>
<td align="left">3</td>
<td align="left">Cybersecurity</td>
<td align="center">70</td>
<td align="left">IT governance</td>
<td align="center">90</td>
<td align="left">IT governance</td>
<td align="center">91</td>
<td align="left">IT governance</td>
<td align="center">106</td>
<td align="left">IT governance</td>
<td align="center">100</td>
<td align="left">IT governance</td>
<td align="center">94</td>
</tr>
<tr>
<td align="left">4</td>
<td align="left">ICT</td>
<td align="center">69</td>
<td align="left">ICT</td>
<td align="center">72</td>
<td align="left">Information security</td>
<td align="center">76</td>
<td align="left">Cyber</td>
<td align="center">69</td>
<td align="left">Information security</td>
<td align="center">84</td>
<td align="left">Intellectual capital</td>
<td align="center">80</td>
</tr>
<tr>
<td align="left">5</td>
<td align="left">Cybercrime</td>
<td align="center">42</td>
<td align="left">Information security</td>
<td align="center">59</td>
<td align="left">ICT</td>
<td align="center">71</td>
<td align="left">Information security</td>
<td align="center">66</td>
<td align="left">Protection of personal information</td>
<td align="center">66</td>
<td align="left">Information security</td>
<td align="center">79</td>
</tr>
<tr>
<td align="left">6</td>
<td align="left">Information security</td>
<td align="center">36</td>
<td align="left">IT risk</td>
<td align="center">55</td>
<td align="left">IT risk</td>
<td align="center">52</td>
<td align="left">Intellectual capital</td>
<td align="center">56</td>
<td align="left">Intellectual capital</td>
<td align="center">62</td>
<td align="left">Cyber</td>
<td align="center">76</td>
</tr>
<tr>
<td align="left">7</td>
<td align="left">Information management</td>
<td align="center">30</td>
<td align="left">Intellectual capital</td>
<td align="center">41</td>
<td align="left">Intellectual capital</td>
<td align="center">50</td>
<td align="left">Protection of personal information</td>
<td align="center">51</td>
<td align="left">ICT</td>
<td align="center">60</td>
<td align="left">Cyber risk</td>
<td align="center">60</td>
</tr>
<tr>
<td align="left">8</td>
<td align="left">Intellectual capital</td>
<td align="center">28</td>
<td align="left">Cybercrime</td>
<td align="center">37</td>
<td align="left">Cyber risk</td>
<td align="center">43</td>
<td align="left">Cyberattack</td>
<td align="center">50</td>
<td align="left">Cyber</td>
<td align="center">59</td>
<td align="left">Protection of personal information</td>
<td align="center">59</td>
</tr>
<tr>
<td align="left">9</td>
<td align="left">Cyber</td>
<td align="center">27</td>
<td align="left">Protection of personal information</td>
<td align="center">36</td>
<td align="left">Information management</td>
<td align="center">42</td>
<td align="left">ICT</td>
<td align="center">47</td>
<td align="left">IT risk</td>
<td align="center">52</td>
<td align="left">Data security</td>
<td align="center">50</td>
</tr>
<tr>
<td align="left">10</td>
<td align="left">IT security</td>
<td align="center">27</td>
<td align="left">Information management</td>
<td align="center">33</td>
<td align="left">Protection of personal information</td>
<td align="center">38</td>
<td align="left">Data security</td>
<td align="center">47</td>
<td align="left">Data security</td>
<td align="center">51</td>
<td align="left">Cyber resilience</td>
<td align="center">40</td>
</tr>
<tr>
<td align="left">11</td>
<td align="left">IT risk</td>
<td align="center">26</td>
<td align="left">Cyber</td>
<td align="center">29</td>
<td align="left">Cybercrime</td>
<td align="center">37</td>
<td align="left">IT risk</td>
<td align="center">46</td>
<td align="left">Cyber risk</td>
<td align="center">49</td>
<td align="left">Cybercrime</td>
<td align="center">40</td>
</tr>
<tr>
<td align="left">12</td>
<td align="left">Protection of personal information</td>
<td align="center">25</td>
<td align="left">IT security</td>
<td align="center">27</td>
<td align="left">Cyber</td>
<td align="center">35</td>
<td align="left">Information management</td>
<td align="center">39</td>
<td align="left">Cyberattack</td>
<td align="center">40</td>
<td align="left">ICT</td>
<td align="center">39</td>
</tr>
<tr>
<td align="left">13</td>
<td align="left">Cyber risk</td>
<td align="center">25</td>
<td align="left">Cyber risk</td>
<td align="center">26</td>
<td align="left">IT security</td>
<td align="center">33</td>
<td align="left">Cybercrime</td>
<td align="center">35</td>
<td align="left">Information management</td>
<td align="center">37</td>
<td align="left">Cyberattack</td>
<td align="center">39</td>
</tr>
<tr>
<td align="left">14</td>
<td align="left">Data security</td>
<td align="center">17</td>
<td align="left">Data security</td>
<td align="center">16</td>
<td align="left">Data security</td>
<td align="center">19</td>
<td align="left">Attack</td>
<td align="center">35</td>
<td align="left">Cyber threat</td>
<td align="center">35</td>
<td align="left">IT security</td>
<td align="center">32</td>
</tr>
<tr>
<td align="left">15</td>
<td align="left">Disruption</td>
<td align="center">17</td>
<td align="left">Cyberattack</td>
<td align="center">15</td>
<td align="left">Disruption</td>
<td align="center">17</td>
<td align="left">Cyber risk</td>
<td align="center">31</td>
<td align="left">Cybercrime</td>
<td align="center">32</td>
<td align="left">Phishing</td>
<td align="center">27</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn><p>IT, information technology; ICT, information and communication technology.</p></fn>
</table-wrap-foot>
</table-wrap>
<p>A notable switch occurred in 2020 between the two most used keywords. A possible explanation for the prominent use of the keyword &#x2018;cybersecurity&#x2019; could be the advent of the COVID-19 pandemic which triggered an unbridled level of cybercrime (Dolley <xref ref-type="bibr" rid="CIT0017">2021</xref>; Interpol <xref ref-type="bibr" rid="CIT0026">2021</xref>; KPMG <xref ref-type="bibr" rid="CIT0029">2022</xref>). The considered companies increasingly focused on cybersecurity as a top priority during the latter part of the study period. Information Technology or IT received substantial attention pre- and post-2020.</p>
<p>A possible reason for this trend could be the continuous introduction of new technologies (C&#x00F4;rte-Real et al. <xref ref-type="bibr" rid="CIT0014">2020</xref>), in particular AI which could provide competitive advantages that should be properly managed and reported on. Further, corporates must adapt their practices to reflect on the ever-changing cyberspace and IT environment to ensure survival. Consequently, IT governance remained in third position from 2018 to 2022. In 2017, King IV came into effect and, among others, promoted the importance of IT governance in Principle 12 (IoDSA <xref ref-type="bibr" rid="CIT0024">2016</xref>). The popularity of this keyword could thus be partly linked to the sampled companies&#x2019; attempts to adhere to this principle.</p>
<p>Integrated reporting should provide risk and opportunity-related disclosures in the context of divergent capitals, including intellectual capital (International Financial Reporting Standards <xref ref-type="bibr" rid="CIT0025">2021</xref>). References to intellectual capital in cybersecurity disclosures gradually gained prominence in the analysed integrated reports. This keyword moved to the fourth position in 2022, as shown in <xref ref-type="table" rid="T0001">Table 1</xref>. The increased use of the term intellectual capital could indicate that the sampled companies gradually broadened their focus of this capital given rapid technological developments.</p>
<p>Cyber resilience only appeared in the list of top 15 keywords in 2022. This development shows that the considered companies became more aware of the need for cyber resilience following the advent of the COVID-19 pandemic and the discussed increase in legislation. Peter (<xref ref-type="bibr" rid="CIT0037">2017</xref>) likewise suggested that cyber resilience is crucial to fully realise e-commerce and to ensure corporate continuity. <xref ref-type="table" rid="T0002">Table 2</xref> shows the top 15 keywords per industry or sector for the overall period.</p>
<table-wrap id="T0002">
<label>TABLE 2</label>
<caption><p>Top 15 disclosed keywords per industry/sector based on the number of keyword occurrences (<italic>n</italic>).</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left" rowspan="2">Position</th>
<th valign="top" align="center" colspan="2">Banking sector<hr/></th>
<th valign="top" align="center" colspan="2">Health Care industry<hr/></th>
<th valign="top" align="center" colspan="2">Retail sector<hr/></th>
<th valign="top" align="center" colspan="2">Technology industry<hr/></th>
</tr>
<tr>
<th valign="top" align="left">Keywords</th>
<th valign="top" align="center"><italic>n</italic></th>
<th valign="top" align="left">Keywords</th>
<th valign="top" align="center"><italic>n</italic></th>
<th valign="top" align="left">Keywords</th>
<th valign="top" align="center"><italic>n</italic></th>
<th valign="top" align="left">Keywords</th>
<th valign="top" align="center"><italic>n</italic></th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">1</td>
<td align="left">Cybersecurity</td>
<td align="center">246</td>
<td align="left">Cybersecurity</td>
<td align="center">229</td>
<td align="left">Information technology</td>
<td align="center">364</td>
<td align="left">Cybersecurity</td>
<td align="center">454</td>
</tr>
<tr>
<td align="left">2</td>
<td align="left">Information technology</td>
<td align="center">216</td>
<td align="left">ICT</td>
<td align="center">210</td>
<td align="left">IT governance</td>
<td align="center">336</td>
<td align="left">Information technology</td>
<td align="center">104</td>
</tr>
<tr>
<td align="left">3</td>
<td align="left">IT risk</td>
<td align="center">160</td>
<td align="left">Information security</td>
<td align="center">130</td>
<td align="left">Cybersecurity</td>
<td align="center">214</td>
<td align="left">ICT</td>
<td align="center">102</td>
</tr>
<tr>
<td align="left">4</td>
<td align="left">Cyber risk</td>
<td align="center">136</td>
<td align="left">IT governance</td>
<td align="center">102</td>
<td align="left">Intellectual capital</td>
<td align="center">105</td>
<td align="left">Cyber</td>
<td align="center">95</td>
</tr>
<tr>
<td align="left">5</td>
<td align="left">Cybercrime</td>
<td align="center">134</td>
<td align="left">Information technology</td>
<td align="center">94</td>
<td align="left">Protection of personal information</td>
<td align="center">97</td>
<td align="left">IT governance</td>
<td align="center">90</td>
</tr>
<tr>
<td align="left">6</td>
<td align="left">Cyber</td>
<td align="center">134</td>
<td align="left">Intellectual capital</td>
<td align="center">85</td>
<td align="left">Information security</td>
<td align="center">93</td>
<td align="left">Data security</td>
<td align="center">78</td>
</tr>
<tr>
<td align="left">7</td>
<td align="left">Information security</td>
<td align="center">106</td>
<td align="left">Information management</td>
<td align="center">71</td>
<td align="left">Information management</td>
<td align="center">75</td>
<td align="left">Information security</td>
<td align="center">75</td>
</tr>
<tr>
<td align="left">8</td>
<td align="left">Protection of personal information</td>
<td align="center">64</td>
<td align="left">Cybercrime</td>
<td align="center">67</td>
<td align="left">Cyber risk</td>
<td align="center">72</td>
<td align="left">Intellectual capital</td>
<td align="center">71</td>
</tr>
<tr>
<td align="left">9</td>
<td align="left">Intellectual capital</td>
<td align="center">65</td>
<td align="left">Protection of personal information</td>
<td align="center">47</td>
<td align="left">Cyberattack</td>
<td align="center">64</td>
<td align="left">Protection of personal information</td>
<td align="center">71</td>
</tr>
<tr>
<td align="left">10</td>
<td align="left">Technology risk</td>
<td align="center">56</td>
<td align="left">Cyberattack</td>
<td align="center">46</td>
<td align="left">Data security</td>
<td align="center">60</td>
<td align="left">IT security</td>
<td align="center">61</td>
</tr>
<tr>
<td align="left">11</td>
<td align="left">Disruption</td>
<td align="center">52</td>
<td align="left">IT security</td>
<td align="center">44</td>
<td align="left">IT security</td>
<td align="center">58</td>
<td align="left">Cyber resilience</td>
<td align="center">50</td>
</tr>
<tr>
<td align="left">12</td>
<td align="left">IT governance</td>
<td align="center">47</td>
<td align="left">Data security</td>
<td align="center">44</td>
<td align="left">Cyber</td>
<td align="center">41</td>
<td align="left">Information management</td>
<td align="center">49</td>
</tr>
<tr>
<td align="left">13</td>
<td align="left">Attack</td>
<td align="center">40</td>
<td align="left">Cyber</td>
<td align="center">42</td>
<td align="left">IT risk</td>
<td align="center">40</td>
<td align="left">IT risk</td>
<td align="center">45</td>
</tr>
<tr>
<td align="left">14</td>
<td align="left">Digital fraud</td>
<td align="center">34</td>
<td align="left">Attack</td>
<td align="center">20</td>
<td align="left">Cyber threat</td>
<td align="center">38</td>
<td align="left">ICT security</td>
<td align="center">44</td>
</tr>
<tr>
<td align="left">15</td>
<td align="left">Disruptive technologies</td>
<td align="center">31</td>
<td align="left">Cyber threat</td>
<td align="center">20</td>
<td align="left">Disruption</td>
<td align="center">38</td>
<td align="left">Phishing</td>
<td align="center">44</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn><p>IT, information technology; ICT, information and communication technology.</p></fn>
</table-wrap-foot>
</table-wrap>
<p>As depicted in <xref ref-type="table" rid="T0002">Table 2</xref>, cybersecurity was an overarching concern for all considered industries and sectors. The Banking sector had a particularly strong focus on cybercrime, IT and cyber risks. Given that the South African Banking sector predominantly operates in cyberspace, their focus on possible cyber risks and crimes was expected. A cyberattack and breach of a bank&#x2019;s security could result in substantial financial losses for several stakeholders. The draft joint standard on cybersecurity and cyber resilience that is applicable to this sector most likely also contributed to their focus on cyber risk, fraud and disruption (SARB <xref ref-type="bibr" rid="CIT0048">2024</xref>).</p>
<p>The considered Health Care companies placed substantial emphasis on information security and related governance considerations. Four commonly used keywords contained the word security, namely cybersecurity, information security, IT security and data security. The focus on information security could be largely ascribed to their collection and sharing of confidential patient information online and across networks. Furthermore, the need to access patient data at any time, especially in emergency situations, implies that hospitals should have a very reliable cybersecurity framework (Cyber Security Institute <xref ref-type="bibr" rid="CIT0016">2023</xref>).</p>
<p>The Retail sector also had a strong focus on information security and the protection of personal information. Retailers often have loyalty card systems in place, as well as credit facilities. Thus, many retailers regularly collect private information from customers. A breach in a retailer&#x2019;s IT systems could not only result in the loss or theft of customer data but also the loss of customer trust and loyalty (Interpol <xref ref-type="bibr" rid="CIT0027">2023</xref>).</p>
<p>Notably, the Technology industry was the only industry that had cyber resilience in its top 15 keywords. Furthermore, the top five keywords for this industry were systems-orientated, as the keywords cybersecurity, IT, ICT, cyber and IT governance strongly relate to cyber-systems, frameworks and infrastructure. This industry&#x2019;s strong links to the recent developments in cyberspace contributed to this disclosure focus. <xref ref-type="fig" rid="F0002">Figure 2</xref> shows the descriptive results for the disclosure level of cybersecurity, based on the number of disclosed keywords as a percentage of the considered 62 keywords (coverage scores).</p>
<fig id="F0002">
<label>FIGURE 2</label>
<caption><p>Disclosure level of cybersecurity.</p></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="SAJEMS-29-6133-g002.tif"/>
</fig>
<p>Based on the 2017 mean of 10.85&#x0025;, the sampled companies used on average between six and seven different cybersecurity-related keywords when reporting on cyber matters. In contrast, by 2022 they used about 10 keywords, as shown by the mean of 16.38&#x0025; in <xref ref-type="fig" rid="F0002">Figure 2</xref>. The company that used 24 different cybersecurity-related keywords in their integrated report (as indicated by the maximum score of 38.71&#x0025; in 2021) emphasised cyber resilience.</p>
<p>Yet the minimum value of 1.61&#x0025; indicates that a sampled company only used one cybersecurity-related keyword in their integrated reports. This company briefly referred to &#x2018;cybersecurity&#x2019; but did not mention any of the other keywords. <xref ref-type="fig" rid="F0003">Figure 3</xref> provides the descriptive statistics for the disclosure volume, based on the number of paragraphs containing cybersecurity keywords.</p>
<fig id="F0003">
<label>FIGURE 3</label>
<caption><p>Disclosure volume of cybersecurity.</p></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="SAJEMS-29-6133-g003.tif"/>
</fig>
<p>An increase is also observed in the mean number of paragraphs comprising cybersecurity keywords over the duration of the research period, as shown in <xref ref-type="fig" rid="F0003">Figure 3</xref>. Yet there was substantial deviation in the number of paragraphs, as seen by the maximum and minimum values. Given that South Africa is a prime target for cyberattacks, the need for cybersecurity is heightened (Interpol <xref ref-type="bibr" rid="CIT0026">2021</xref>).</p>
<p>The King IV Report (IoDSA <xref ref-type="bibr" rid="CIT0024">2016</xref>) furthermore guides JSE-listed companies in terms of cybersecurity disclosures, thereby possibly contributing to the observed increase in disclosure volume of cybersecurity since its publication in 2017. By 2022, the average number of paragraphs were 13 versus 8 in 2017. In contrast, Radu and Smaili (<xref ref-type="bibr" rid="CIT0040">2021</xref>) reported that Canadian firms had approximately five cybersecurity-related paragraphs per analysed integrated report pre-2020.</p>
<p>The Technology industry showed the largest increase in the number of cybersecurity-related paragraphs. As Technology companies are primary users and providers of IT and cyberspace services, the considered Technology companies arguably enhanced their disclosures given the rapidly developing cyber-related risks and security concerns post-2020.</p>
</sec>
<sec id="s20009">
<title>Outcomes of the difference tests</title>
<p>The outcomes of the sequential ANOVA and the Fisher&#x2019;s LSD tests show the significance of the observed trends for disclosure presence over the entire period and per annum in <xref ref-type="table" rid="T0003">Table 3</xref> and <xref ref-type="table" rid="T0004">Table 4</xref>, respectively.</p>
<table-wrap id="T0003">
<label>TABLE 3</label>
<caption><p>Difference test for disclosure presence (overall period): ANOVA (mean number of keyword occurrences for the overall period).</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left" rowspan="2">Effect</th>
<th valign="top" align="center" colspan="4">ANOVA (mean number of keyword occurrences during the overall period)<hr/></th>
</tr>
<tr>
<th valign="top" align="center">Numerator degrees of freedom</th>
<th valign="top" align="center">Denominator degrees of freedom</th>
<th valign="top" align="center"><italic>F</italic>-value</th>
<th valign="top" align="center"><italic>p</italic>-value</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">(Intercept)</td>
<td align="center">1</td>
<td align="center">250</td>
<td align="center">105.18<xref ref-type="table-fn" rid="TFN0001">&#x002A;&#x002A;&#x002A;</xref></td>
<td align="center">0.01</td>
</tr>
<tr>
<td align="left">Year</td>
<td align="center">5</td>
<td align="center">250</td>
<td align="center">4.51<xref ref-type="table-fn" rid="TFN0001">&#x002A;&#x002A;&#x002A;</xref></td>
<td align="center">0.00</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn><p>ANOVA, analysis of variance.</p></fn>
<fn id="TFN0001"><label>&#x002A;&#x002A;&#x002A;</label><p>, significant at the 1&#x0025; level.</p></fn>
</table-wrap-foot>
</table-wrap>
<table-wrap id="T0004">
<label>TABLE 4</label>
<caption><p>Difference test for disclosure presence (annual differences).</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left" rowspan="2">Year</th>
<th valign="top" align="center" colspan="5">Fisher&#x2019;s LSD (mean number of keyword occurrences per year)<hr/></th>
</tr>
<tr>
<th valign="top" align="center">2018</th>
<th valign="top" align="center">2019</th>
<th valign="top" align="center">2020</th>
<th valign="top" align="center">2021</th>
<th valign="top" align="center">2022</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">2017</td>
<td align="center">0.16</td>
<td align="center">0.03<xref ref-type="table-fn" rid="TFN0003">&#x002A;&#x002A;</xref></td>
<td align="center">0.00<xref ref-type="table-fn" rid="TFN0004">&#x002A;&#x002A;&#x002A;</xref></td>
<td align="center">0.00<xref ref-type="table-fn" rid="TFN0004">&#x002A;&#x002A;&#x002A;</xref></td>
<td align="center">0.00<xref ref-type="table-fn" rid="TFN0004">&#x002A;&#x002A;&#x002A;</xref></td>
</tr>
<tr>
<td align="left">2018</td>
<td align="center">-</td>
<td align="center">0.19</td>
<td align="center">0.00<xref ref-type="table-fn" rid="TFN0004">&#x002A;&#x002A;&#x002A;</xref></td>
<td align="center">0.00<xref ref-type="table-fn" rid="TFN0004">&#x002A;&#x002A;&#x002A;</xref></td>
<td align="center">0.00<xref ref-type="table-fn" rid="TFN0004">&#x002A;&#x002A;&#x002A;</xref></td>
</tr>
<tr>
<td align="left">2019</td>
<td align="center">-</td>
<td align="center">-</td>
<td align="center">0.02<xref ref-type="table-fn" rid="TFN0003">&#x002A;&#x002A;</xref></td>
<td align="center">0.00<xref ref-type="table-fn" rid="TFN0004">&#x002A;&#x002A;&#x002A;</xref></td>
<td align="center">0.01<xref ref-type="table-fn" rid="TFN0004">&#x002A;&#x002A;&#x002A;</xref></td>
</tr>
<tr>
<td align="left">2020</td>
<td align="center">-</td>
<td align="center">-</td>
<td align="center">-</td>
<td align="center">0.09<xref ref-type="table-fn" rid="TFN0002">&#x002A;</xref></td>
<td align="center">0.21</td>
</tr>
<tr>
<td align="left">2021</td>
<td align="center">-</td>
<td align="center">-</td>
<td align="center">-</td>
<td align="center">-</td>
<td align="center">0.94</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn><p>LSD, least significant difference.</p></fn>
<fn id="TFN0002"><label>&#x002A;</label><p>, significant at the 10&#x0025; level;</p></fn>
<fn id="TFN0003"><label>&#x002A;&#x002A;</label><p>, significant at the 5&#x0025; level;</p></fn>
<fn id="TFN0004"><label>&#x002A;&#x002A;&#x002A;</label><p>, significant at the 1&#x0025; level.</p></fn>
</table-wrap-foot>
</table-wrap>
<p>As seen in <xref ref-type="table" rid="T0003">Table 3</xref>, the mean number of cybersecurity keyword occurrences in the analysed integrated reports differed significantly over the entire research period (<italic>F</italic>-value: 4.51; <italic>p</italic>-value: 0.00). No significant differences occurred in the average number of cybersecurity-related keyword occurrences before the onset of the COVID-19 pandemic, as shown by the <italic>p</italic>-value of 0.16 for the difference between 2017 and 2018, and the <italic>p</italic>-value of 0.19 for the difference between 2018 and 2019 in <xref ref-type="table" rid="T0004">Table 4</xref>. Yet post-2020, most of the annual differences were significant. Further investigation showed that these significant differences were ascribed to increases of three or more cybersecurity-related keyword occurrences per annum.</p>
<p>Scholars and practitioners confirm that cybercrime increased drastically given the increased use of cyberspace in business operations since 2020 (Dolley <xref ref-type="bibr" rid="CIT0017">2021</xref>; KPMG <xref ref-type="bibr" rid="CIT0029">2022</xref>). The COVID-19 pandemic practically forced companies to accelerate their adoption of Technology and cyberspace in their day-to-day business activities (Soni et al. <xref ref-type="bibr" rid="CIT0047">2020</xref>).</p>
<p>A growing number of the sampled companies evidently enhanced their disclosures on prevalent and material cyber risks, and the security-related implications post-2020 to ultimately enhance their legitimacy (Suchman <xref ref-type="bibr" rid="CIT0049">1995</xref>). Such companies showcased to their stakeholders that they have given due consideration to cybersecurity matters, thereby protecting private information and enhancing data security.</p>
<p>The outcomes of the ANOVA and Fisher&#x2019;s LSD analyses for disclosure level (mean coverage scores) for the overall period and annual differences are provided in <xref ref-type="table" rid="T0005">Table 5</xref> and <xref ref-type="table" rid="T0006">Table 6</xref>, respectively.</p>
<table-wrap id="T0005">
<label>TABLE 5</label>
<caption><p>Difference test for disclosure level (entire research period).</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left" rowspan="2">Effect</th>
<th valign="top" align="center" colspan="4">ANOVA (conducted on the mean coverage score for the overall period)<hr/></th>
</tr>
<tr>
<th valign="top" align="center">Numerator degrees of freedom</th>
<th valign="top" align="center">Denominator degrees of freedom</th>
<th valign="top" align="center"><italic>F</italic>-value</th>
<th valign="top" align="center"><italic>p</italic>-value</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">(Intercept)</td>
<td align="center">1</td>
<td align="center">250</td>
<td align="center">223.26<xref ref-type="table-fn" rid="TFN0005">&#x002A;&#x002A;&#x002A;</xref></td>
<td align="center">&#x003C; 0.01</td>
</tr>
<tr>
<td align="left">Year</td>
<td align="center">5</td>
<td align="center">250</td>
<td align="center">5.96<xref ref-type="table-fn" rid="TFN0005">&#x002A;&#x002A;&#x002A;</xref></td>
<td align="center">&#x003C; 0.01</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn><p>ANOVA, analysis of variance.</p></fn>
<fn id="TFN0005"><label>&#x002A;&#x002A;&#x002A;</label><p>, significant at the 1&#x0025; level.</p></fn>
</table-wrap-foot>
</table-wrap>
<table-wrap id="T0006">
<label>TABLE 6</label>
<caption><p>Difference test for disclosure level (yearly differences).</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left" rowspan="2">Year</th>
<th valign="top" align="center" colspan="5">Fisher&#x2019;s LSD (mean coverage scores per annum)<hr/></th>
</tr>
<tr>
<th valign="top" align="center">2018</th>
<th valign="top" align="center">2019</th>
<th valign="top" align="center">2020</th>
<th valign="top" align="center">2021</th>
<th valign="top" align="center">2022</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">2017</td>
<td align="center">&#x003C; 0.01<xref ref-type="table-fn" rid="TFN0008">&#x002A;&#x002A;&#x002A;</xref></td>
<td align="center">0.03<xref ref-type="table-fn" rid="TFN0007">&#x002A;&#x002A;</xref></td>
<td align="center">&#x003C; 0.01<xref ref-type="table-fn" rid="TFN0008">&#x002A;&#x002A;&#x002A;</xref></td>
<td align="center">&#x003C; 0.01<xref ref-type="table-fn" rid="TFN0008">&#x002A;&#x002A;&#x002A;</xref></td>
<td align="center">&#x003C; 0.01<xref ref-type="table-fn" rid="TFN0008">&#x002A;&#x002A;&#x002A;</xref></td>
</tr>
<tr>
<td align="left">2018</td>
<td align="center">-</td>
<td align="center">0.79</td>
<td align="center">0.06<xref ref-type="table-fn" rid="TFN0006">&#x002A;</xref></td>
<td align="center">&#x003C; 0.01<xref ref-type="table-fn" rid="TFN0008">&#x002A;&#x002A;&#x002A;</xref></td>
<td align="center">&#x003C; 0.01<xref ref-type="table-fn" rid="TFN0008">&#x002A;&#x002A;&#x002A;</xref></td>
</tr>
<tr>
<td align="left">2019</td>
<td align="center">-</td>
<td align="center">-</td>
<td align="center">0.03<xref ref-type="table-fn" rid="TFN0007">&#x002A;&#x002A;</xref></td>
<td align="center">&#x003C; 0.01<xref ref-type="table-fn" rid="TFN0008">&#x002A;&#x002A;&#x002A;</xref></td>
<td align="center">&#x003C; 0.01<xref ref-type="table-fn" rid="TFN0008">&#x002A;&#x002A;&#x002A;</xref></td>
</tr>
<tr>
<td align="left">2020</td>
<td align="center">-</td>
<td align="center">-</td>
<td align="center">-</td>
<td align="center">&#x003C; 0.01<xref ref-type="table-fn" rid="TFN0008">&#x002A;&#x002A;&#x002A;</xref></td>
<td align="center">0.07<xref ref-type="table-fn" rid="TFN0006">&#x002A;</xref></td>
</tr>
<tr>
<td align="left">2021</td>
<td align="center">-</td>
<td align="center">-</td>
<td align="center">-</td>
<td align="center">-</td>
<td align="center">0.80</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn><p>LSD, least significant difference.</p></fn>
<fn id="TFN0006"><label>&#x002A;</label><p>, significant at the 10&#x0025; level;</p></fn>
<fn id="TFN0007"><label>&#x002A;&#x002A;</label><p>, significant at the 5&#x0025; level;</p></fn>
<fn id="TFN0008"><label>&#x002A;&#x002A;&#x002A;</label><p>, significant at the 1&#x0025; level.</p></fn>
</table-wrap-foot>
</table-wrap>
<p>The disclosure level of cybersecurity also differed significantly over the entire research period (<italic>F</italic>-value: 5.96; <italic>p</italic>-value: &#x003C; 0.01) as shown in <xref ref-type="table" rid="T0005">Table 5</xref>, similar to the results reported for disclosure presence in <xref ref-type="table" rid="T0003">Table 3</xref>. Furthermore, most of the yearly differences in the coverage score were statistically significant, as indicated in <xref ref-type="table" rid="T0006">Table 6</xref>. When the COVID-19 pandemic emerged, many companies lacked appropriate cybersecurity systems to facilitate safe and effective remote working. Several companies consequently fell prey to cyberattacks and cybercrimes. Unique cyber risks also became more prevalent (PwC <xref ref-type="bibr" rid="CIT0039">2022</xref>). Post-2020, the sampled companies consequently expanded their reporting on unique cybersecurity matters, as shown by the significant differences in their coverage scores in <xref ref-type="table" rid="T0006">Table 6</xref>.</p>
<p>The non-significant differences between 2018 and 2019 (<italic>p</italic>-value: 0.79) and 2021 and 2022 (<italic>p</italic>-value: 0.80) are ascribed to the minimal changes in the mean coverage scores during these years. The descriptive outcomes show that the mean coverage score only increased with 0.17&#x0025; between 2018 and 2019, while there was only a 0.01&#x0025; increase in the mean coverage score from 2021 to 2022. The outcomes of the difference tests for disclosure volume of cybersecurity are provided in <xref ref-type="table" rid="T0007">Table 7</xref> and <xref ref-type="table" rid="T0008">Table 8</xref> for the overall period and per annum, respectively.</p>
<table-wrap id="T0007">
<label>TABLE 7</label>
<caption><p>Difference test for disclosure volume (overall period).</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left" rowspan="2">Effect</th>
<th valign="top" align="center" colspan="4">ANOVA (mean number of paragraphs for the overall period)<hr/></th>
</tr>
<tr>
<th valign="top" align="center">Numerator degrees of freedom</th>
<th valign="top" align="center">Denominator degrees of freedom</th>
<th valign="top" align="center"><italic>F</italic>-value</th>
<th valign="top" align="center"><italic>p</italic>-value</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">(Intercept)</td>
<td align="center">1</td>
<td align="center">250</td>
<td align="center">81.67<xref ref-type="table-fn" rid="TFN0009">&#x002A;&#x002A;&#x002A;</xref></td>
<td align="center">0.01</td>
</tr>
<tr>
<td align="left">Year</td>
<td align="center">5</td>
<td align="center">250</td>
<td align="center">3.24<xref ref-type="table-fn" rid="TFN0009">&#x002A;&#x002A;&#x002A;</xref></td>
<td align="center">0.01</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn><p>ANOVA, analysis of variance.</p></fn>
<fn id="TFN0009"><label>&#x002A;&#x002A;&#x002A;</label><p>, significant at the 1&#x0025; level.</p></fn>
</table-wrap-foot>
</table-wrap>
<table-wrap id="T0008">
<label>TABLE 8</label>
<caption><p>Difference test for disclosure volume (yearly differences).</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left" rowspan="2">Year</th>
<th valign="top" align="center" colspan="5">Fisher&#x2019;s LSD (mean number of paragraphs per annum)<hr/></th>
</tr>
<tr>
<th valign="top" align="center">2018</th>
<th valign="top" align="center">2019</th>
<th valign="top" align="center">2020</th>
<th valign="top" align="center">2021</th>
<th valign="top" align="center">2022</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">2017</td>
<td align="center">0.23</td>
<td align="center">0.05<xref ref-type="table-fn" rid="TFN0010">&#x002A;&#x002A;</xref></td>
<td align="center">0.00<xref ref-type="table-fn" rid="TFN0011">&#x002A;&#x002A;&#x002A;</xref></td>
<td align="center">0.00<xref ref-type="table-fn" rid="TFN0011">&#x002A;&#x002A;&#x002A;</xref></td>
<td align="center">0.00<xref ref-type="table-fn" rid="TFN0011">&#x002A;&#x002A;&#x002A;</xref></td>
</tr>
<tr>
<td align="left">2018</td>
<td align="center">-</td>
<td align="center">0.18</td>
<td align="center">0.00<xref ref-type="table-fn" rid="TFN0011">&#x002A;&#x002A;&#x002A;</xref></td>
<td align="center">0.00<xref ref-type="table-fn" rid="TFN0011">&#x002A;&#x002A;&#x002A;</xref></td>
<td align="center">0.01<xref ref-type="table-fn" rid="TFN0011">&#x002A;&#x002A;&#x002A;</xref></td>
</tr>
<tr>
<td align="left">2019</td>
<td align="center">-</td>
<td align="center">-</td>
<td align="center">0.00<xref ref-type="table-fn" rid="TFN0011">&#x002A;&#x002A;&#x002A;</xref></td>
<td align="center">0.01<xref ref-type="table-fn" rid="TFN0011">&#x002A;&#x002A;&#x002A;</xref></td>
<td align="center">0.05<xref ref-type="table-fn" rid="TFN0010">&#x002A;&#x002A;</xref></td>
</tr>
<tr>
<td align="left">2020</td>
<td align="center">-</td>
<td align="center">-</td>
<td align="center">-</td>
<td align="center">0.65</td>
<td align="center">0.96</td>
</tr>
<tr>
<td align="left">2021</td>
<td align="center">-</td>
<td align="center">-</td>
<td align="center">-</td>
<td align="center">-</td>
<td align="center">0.70</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn><p>LSD, least significant difference.</p></fn>
<fn id="TFN0010"><label>&#x002A;&#x002A;</label><p>, significant at the 5&#x0025; level;</p></fn>
<fn id="TFN0011"><label>&#x002A;&#x002A;&#x002A;</label><p>, significant at the 1&#x0025; level.</p></fn>
</table-wrap-foot>
</table-wrap>
<p>Perusal of <xref ref-type="table" rid="T0007">Table 7</xref> shows that the average number of paragraphs containing cybersecurity keywords also increased noticeably over the entire period under review (<italic>F</italic>-value: 3.24; <italic>p</italic>-value: 0.01). Given the escalation in cybercrime following the onset of the COVID-19 pandemic (Dolley <xref ref-type="bibr" rid="CIT0017">2021</xref>; Interpol <xref ref-type="bibr" rid="CIT0026">2021</xref>; KPMG <xref ref-type="bibr" rid="CIT0029">2022</xref>), the significant difference from 2019 to 2020 (<italic>p</italic>-value: 0.00) in <xref ref-type="table" rid="T0008">Table 8</xref> was not unexpected. <xref ref-type="fig" rid="F0003">Figure 3</xref> shows that the mean disclosure volume increased substantially between 2019 (10 paragraphs) and 2020 (13 paragraphs covering cybersecurity content).</p>
<p>Yet the average number of paragraphs then remained at 13 in 2021 and 2022, as shown in <xref ref-type="fig" rid="F0003">Figure 3</xref>. As such, no significant differences were observed between 2020 and 2021 (<italic>p</italic>-value: 0.65), and 2021 and 2022 (<italic>p</italic>-value: 0.70) in <xref ref-type="table" rid="T0008">Table 8</xref>. Based on these results, stakeholders&#x2019; reporting demands were arguably already met in terms of disclosure volume in 2020, thereby enhancing the sampled companies&#x2019; pragmatic legitimacy (Suchman <xref ref-type="bibr" rid="CIT0049">1995</xref>). Post-2020, the sampled companies then expanded their focus to ensure that unique cybersecurity matters receive sufficient attention, as shown by the significant annual differences in the coverage scores in <xref ref-type="table" rid="T0006">Table 6</xref>.</p>
</sec>
</sec>
<sec id="s0010">
<title>Conclusion and recommendations</title>
<p>The rise in cyberattacks and crimes resulted in increased corporate focus on cybersecurity worldwide. The effects of poor cybersecurity in South Africa carry dire and far-reaching consequences for companies and their stakeholders. Corporate leaders should hence duly account for the integration of cybersecurity within their strategies.</p>
<p>The <italic>Cybercrimes Act</italic> (<italic>No. 10 of 2020</italic>) was introduced to improve cyber resilience in South Africa. The King IV Report furthermore provides recommendations on Technology and information matters to corporate leaders. Given that corporate strategies are developed by boards of directors, sound corporate governance imply that boards have considered the impact of cybersecurity risks. They should further ensure that sufficient information is disclosed to stakeholders in line with the legitimacy theory.</p>
<p>This study was conducted to explore the disclosure presence, level and volume of cybersecurity disclosure by selected JSE-listed companies that were most likely to be targeted over the period 2017 to 2022. Content analysis was conducted on the sampled companies&#x2019; integrated reports based on 62 keywords. Sequential ANOVA and Fisher&#x2019;s LSD tests were conducted to determine significant differences over the entire research period and per annum, respectively.</p>
<p>The descriptive results indicated that the sampled companies increasingly focused on cybersecurity matters. Cybersecurity disclosure increased noticeably in 2020, given the external shock of the COVID-19 pandemic and the resultant rise in cybercrime. KPMG (<xref ref-type="bibr" rid="CIT0029">2022</xref>) confirmed that companies rapidly adopted and adapted cyber practices when the pandemic occurred.</p>
<p>The disclosure level of cybersecurity revealed noticeable variations in the reporting habits and related focus areas of the sampled companies. The most disclosed keywords included cybersecurity and IT governance. Towards the end of the research period, more nuanced cybersecurity-related keywords were used, including cyber resilience. Pertaining to the disclosure volume of cybersecurity, the mean number of paragraphs increased from 8 in 2017 to 13 paragraphs in 2020, whereafter it remained stagnant.</p>
<p>Statistically significant differences were observed for the disclosure presence, level and volume of cybersecurity over the entire research period. Given the disconcerting risk of being targeted by cybercriminals in South Africa, companies that significantly enhanced their cybersecurity disclosures are likely to improve their legitimacy if they evidently focused on the protection of private information and data security. Most of the annual differences in the disclosure presence of cybersecurity were statistically significant. Yet the differences in the disclosure volume of cybersecurity in 2020, 2021 and 2022 were non-significant as the average number of cybersecurity-related paragraphs plateaued from 2020 onwards. The sampled companies focused on enhancing their coverage post-2020 by reporting on a broader range of unique cybersecurity matters than during 2017&#x2013;2019.</p>
<p>Based on the reported results, it is recommended that the IoDSA provide more in-depth guidelines for cybersecurity risk management. Directors should constantly explore emerging cyber risks as Technology continues to develop at an unprecedented rate. Directors are further encouraged to regularly attend cybersecurity seminars and utilise training opportunities to stay abreast of potential solutions for threats. If directors within the considered industries and sectors do not give sufficient attention to prominent cyber risks and security concerns as outlined in this study, it could be deemed an infringement of their duty of care.</p>
<p>Pertaining to the limitations of this research, the sample only included a limited number of companies from selected JSE industries and sectors that were largely affected by cybercrime. The sample further largely comprised Retail companies. The findings are hence not generalisable to the entire JSE. Future researchers could conduct a similar study by including more industries over a longer time frame for a range of emerging markets. The metrics (disclosure presence, level, volume) are furthermore descriptive proxies. While content analysis was conducted for the purpose of this study, interviews could hence be conducted with directors and IT officials to explore the quality and nuance of corporate cybersecurity disclosures.</p>
</sec>
</body>
<back>
<ack>
<title>Acknowledgements</title>
<p>This article is based on research originally conducted as part of Laura F. Putter&#x2019;s master&#x2019;s thesis titled &#x2018;The relationship between board gender diversity and cybersecurity disclosure: An emerging market perspective&#x2019;, submitted to the Economic and Management Sciences, Department of Business Management, Stellenbosch University in 2023. The thesis is currently unpublished and not publicly available. The thesis was supervised by Mrs Ruth Johnson and Prof. Nadia Mans-Kemp. The manuscript has been revised and adapted for journal publication. The author confirms that the content has not been previously published or disseminated and complies with ethical standards for original publication.</p>
<sec id="s20011" sec-type="COI-statement">
<title>Competing interests</title>
<p>The authors declare that they have no financial or personal relationships that may have inappropriately influenced them in writing this article.</p>
</sec>
<sec id="s20012">
<title>CRediT authorship contribution</title>
<p>Laura F. Putter: Conceptualisation, Methodology, Investigation, Writing &#x2013; original draft, Software, Writing &#x2013; review &#x0026; editing. Ruth Johnson: Conceptualisation, Writing &#x2013; original draft, Writing &#x2013; review &#x0026; editing, Supervision. Nadia Mans-Kemp: Conceptualisation, Writing &#x2013; original draft, Writing &#x2013; review &#x0026; editing, Supervision. All authors reviewed the article, contributed to the discussion of results, approved the final version for submission and publication, and take responsibility for the integrity of its findings.</p>
</sec>
<sec id="s20013" sec-type="data-availability">
<title>Data availability</title>
<p>The authors declare that all data that support this research article and findings are available in the article and its references.</p>
</sec>
<sec id="s20014">
<title>Disclaimer</title>
<p>The views and opinions expressed in this article are those of the authors and are the product of professional research. It does not necessarily reflect the official policy or position of any affiliated institution, funder, agency, or that of the publisher. The authors are responsible for this article&#x2019;s findings, and content.</p>
</sec>
</ack>
<ref-list id="references">
<title>References</title>
<ref id="CIT0001"><mixed-citation publication-type="journal"><person-group person-group-type="author"><collab>Accenture</collab></person-group>, <year>2021a</year>, <source><italic>2021 cyber threat intelligence report</italic></source>, <comment>viewed 16 February 2025, from <ext-link ext-link-type="uri" xlink:href="https://www.accenture.com/content/dam/accenture/final/a-com-migration/pdf/pdf-172/accenture-2021-cyber-threat-intelligence-report.pdf">https://www.accenture.com/content/dam/accenture/final/a-com-migration/pdf/pdf-172/accenture-2021-cyber-threat-intelligence-report.pdf</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0002"><mixed-citation publication-type="journal"><person-group person-group-type="author"><collab>Accenture</collab></person-group>, <year>2021b</year>, <source><italic>State of cybersecurity resilience 2021: How aligning security and the business creates cyber resilience</italic></source>, <comment>viewed 16 February 2025, <ext-link ext-link-type="uri" xlink:href="https://www.accenture.com/content/dam/accenture/final/a-com-migration/pdf/pdf-165/accenture-state-of-cybersecurity-2021.pdf">https://www.accenture.com/content/dam/accenture/final/a-com-migration/pdf/pdf-165/accenture-state-of-cybersecurity-2021.pdf</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0003"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Aldasoro</surname>, <given-names>I</given-names></string-name>., <string-name><surname>Gambacorta</surname>, <given-names>L</given-names></string-name>., <string-name><surname>Giudici</surname>, <given-names>P</given-names></string-name>. &#x0026; <string-name><surname>Leach</surname>, <given-names>T</given-names></string-name></person-group>., <year>2022</year>, &#x2018;<article-title>The drivers of cyber risk</article-title>&#x2019;, <source><italic>Journal of Financial Stability</italic></source> <volume>60</volume>, <fpage>1</fpage>&#x2013;<lpage>13</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.jfs.2022.100989">https://doi.org/10.1016/j.jfs.2022.100989</ext-link></comment></mixed-citation></ref>
<ref id="CIT0004"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Allini</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Rossi</surname>, <given-names>F.M</given-names></string-name>. &#x0026; <string-name><surname>Hussainey</surname>, <given-names>K</given-names></string-name></person-group>., <year>2016</year>, &#x2018;<article-title>The board&#x2019;s role in risk disclosure: An exploratory study of Italian listed state-owned enterprises</article-title>&#x2019;, <source><italic>Public Money and Management</italic></source> <volume>36</volume>(<issue>2</issue>), <fpage>113</fpage>&#x2013;<lpage>120</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/09540962.2016.1118935">https://doi.org/10.1080/09540962.2016.1118935</ext-link></comment></mixed-citation></ref>
<ref id="CIT0005"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Amir</surname>, <given-names>E</given-names></string-name>., <string-name><surname>Levi</surname>, <given-names>S</given-names></string-name>. &#x0026; <string-name><surname>Livne</surname>, <given-names>T</given-names></string-name></person-group>., <year>2018</year>, &#x2018;<article-title>Do firms underreport information on cyber-attacks? Evidence from capital markets</article-title>&#x2019;, <source><italic>Review of Accounting Studies</italic></source> <volume>23</volume>(<issue>3</issue>), <fpage>1177</fpage>&#x2013;<lpage>1206</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/s11142-018-9452-4">https://doi.org/10.1007/s11142-018-9452-4</ext-link></comment></mixed-citation></ref>
<ref id="CIT0006"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Babbie</surname>, <given-names>E.R</given-names></string-name></person-group>., <year>2021</year>, <source><italic>The practice of social research</italic></source>, <edition>15th</edition> edn., <publisher-name>Cengage Learning</publisher-name>, <publisher-loc>Boston, MA</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0007"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Bansal</surname>, <given-names>G</given-names></string-name>. &#x0026; <string-name><surname>Axelton</surname>, <given-names>Z</given-names></string-name></person-group>., <year>2023</year>, &#x2018;<article-title>Impact of cybersecurity disclosures on stakeholder intentions</article-title>&#x2019;, <source><italic>Journal of Computer Information Systems</italic></source> <volume>64</volume>(<issue>1</issue>), <fpage>78</fpage>&#x2013;<lpage>91</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/08874417.2023.2180785">https://doi.org/10.1080/08874417.2023.2180785</ext-link></comment></mixed-citation></ref>
<ref id="CIT0008"><mixed-citation publication-type="journal"><person-group person-group-type="author"><collab>Board Portal</collab></person-group>, <year>2023</year>, <source><italic>Understanding the IT governance board: Composition, responsibilities, and best practices</italic></source>, <comment>viewed 10 October 2023, from <ext-link ext-link-type="uri" xlink:href="https://board-room.org/blog/it-governance-board/">https://board-room.org/blog/it-governance-board/</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0009"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Bowen</surname>, <given-names>F</given-names></string-name></person-group>., <year>2019</year>, &#x2018;<article-title>Marking their own homework: The pragmatic and moral legitimacy of industry self-regulation</article-title>&#x2019;, <source><italic>Journal of Business Ethics</italic></source> <volume>156</volume>(<issue>1</issue>), <fpage>257</fpage>&#x2013;<lpage>272</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/s10551-017-3635-y">https://doi.org/10.1007/s10551-017-3635-y</ext-link></comment></mixed-citation></ref>
<ref id="CIT0010"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Bravo</surname>, <given-names>F</given-names></string-name></person-group>., <year>2017</year>, &#x2018;<article-title>Are risk disclosures an effective tool to increase firm value?</article-title>&#x2019;, <source><italic>Managerial and Decision Economics</italic></source> <volume>38</volume>(<issue>8</issue>), <fpage>1116</fpage>&#x2013;<lpage>1124</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1002/mde.2850">https://doi.org/10.1002/mde.2850</ext-link></comment></mixed-citation></ref>
<ref id="CIT0011"><mixed-citation publication-type="journal"><person-group person-group-type="author"><collab>Census and Economic Information Center Data</collab></person-group>, <year>2022</year>, <source><italic>South Africa market capitalisation</italic></source>, <comment>viewed 09 September 2022, from <ext-link ext-link-type="uri" xlink:href="https://www.ceicdata.com/en/indicator/south-africa/market-capitalization">https://www.ceicdata.com/en/indicator/south-africa/market-capitalization</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0012"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Chen</surname>, <given-names>J</given-names></string-name>., <string-name><surname>Henry</surname>, <given-names>E</given-names></string-name>. &#x0026; <string-name><surname>Jiang</surname>, <given-names>X</given-names></string-name></person-group>., <year>2023</year>, &#x2018;<article-title>Is cybersecurity risk factor disclosure informative? Evidence from disclosures following a data breach</article-title>&#x2019;, <source><italic>Journal of Business Ethics</italic></source> <volume>187</volume>, <fpage>199</fpage>&#x2013;<lpage>224</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/s10551-022-05107-z">https://doi.org/10.1007/s10551-022-05107-z</ext-link></comment></mixed-citation></ref>
<ref id="CIT0013"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Clinton</surname>, <given-names>L</given-names></string-name></person-group>., <year>2022</year>, <source><italic>Cybersecurity for business organization: Wide strategies to ensure cyber risk is not just an IT issue</italic></source>, <publisher-name>Kogan Page</publisher-name>, <publisher-loc>London</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0014"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>C&#x00F4;rte-Real</surname>, <given-names>N</given-names></string-name>., <string-name><surname>Ruivo</surname>, <given-names>P</given-names></string-name>. &#x0026; <string-name><surname>Oliveira</surname>, <given-names>T</given-names></string-name></person-group>., <year>2020</year>, &#x2018;<article-title>Leveraging Internet of Things and big data analytics initiatives in European and American firms: Is data quality a way to extract business value?</article-title>&#x2019;, <source><italic>Information and Management</italic></source> <volume>57</volume>(<issue>1</issue>), <fpage>1</fpage>&#x2013;<lpage>16</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.im.2019.01.003">https://doi.org/10.1016/j.im.2019.01.003</ext-link></comment></mixed-citation></ref>
<ref id="CIT0015"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Craigen</surname>, <given-names>D</given-names></string-name>., <string-name><surname>Diakun-Thibault</surname>, <given-names>N</given-names></string-name>. &#x0026; <string-name><surname>Purse</surname>, <given-names>R</given-names></string-name></person-group>., <year>2014</year>, &#x2018;<article-title>Defining cybersecurity</article-title>&#x2019;, <source><italic>Technology Innovation Management Review</italic></source> <volume>4</volume>(<issue>10</issue>), <fpage>13</fpage>&#x2013;<lpage>21</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.22215/timreview835">https://doi.org/10.22215/timreview835</ext-link></comment></mixed-citation></ref>
<ref id="CIT0016"><mixed-citation publication-type="journal"><person-group person-group-type="author"><collab>Cyber Security Institute</collab></person-group>, <year>2023</year>, <source><italic>Cyber security and the South African Healthcare industry during COVID-19</italic></source>, <comment>viewed 06 September 2023, from <ext-link ext-link-type="uri" xlink:href="https://cybersecurityinstitute.co.za/cyber-security-and-the-south-african-healthcare-industry-during-covid-19/">https://cybersecurityinstitute.co.za/cyber-security-and-the-south-african-healthcare-industry-during-covid-19/</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0017"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Dolley</surname>, <given-names>C</given-names></string-name></person-group>., <year>2021</year>, &#x2018;<article-title>Cyberattacks: South Africa, you&#x2019;ve been hacked</article-title>&#x2019;, <source><italic>Daily Maverick</italic></source>, <comment>06 November, viewed 17 February 2025, from <ext-link ext-link-type="uri" xlink:href="https://www.dailymaverick.co.za/article/2021-11-06-cyberattacks-south-africa-youve-been-hacked/">https://www.dailymaverick.co.za/article/2021-11-06-cyberattacks-south-africa-youve-been-hacked/</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0018"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Dowling</surname>, <given-names>J</given-names></string-name>. &#x0026; <string-name><surname>Pfeffer</surname>, <given-names>J</given-names></string-name></person-group>., <year>1975</year>, &#x2018;<article-title>Organizational legitimacy: Social values and organizational behavior</article-title>&#x2019;, <source><italic>Pacific Sociological Review</italic></source> <volume>18</volume>(<issue>1</issue>), <fpage>122</fpage>&#x2013;<lpage>136</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.2307/1388226">https://doi.org/10.2307/1388226</ext-link></comment></mixed-citation></ref>
<ref id="CIT0019"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Eling</surname>, <given-names>M</given-names></string-name>. &#x0026; <string-name><surname>Schnell</surname>, <given-names>W</given-names></string-name></person-group>., <year>2016</year>, &#x2018;<article-title>What do we know about cyber risk and cyber risk insurance?</article-title>&#x2019;, <source><italic>Journal of Risk Finance</italic></source> <volume>17</volume>(<issue>5</issue>), <fpage>474</fpage>&#x2013;<lpage>491</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/JRF-09-2016-0122">https://doi.org/10.1108/JRF-09-2016-0122</ext-link></comment></mixed-citation></ref>
<ref id="CIT0020"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Gao</surname>, <given-names>L</given-names></string-name>., <string-name><surname>Calderon</surname>, <given-names>T.G</given-names></string-name>. &#x0026; <string-name><surname>Tang</surname>, <given-names>F</given-names></string-name></person-group>., <year>2020</year>, &#x2018;<article-title>Public companies&#x2019; cybersecurity risk disclosures</article-title>&#x2019;, <source><italic>International Journal of Accounting Information Systems</italic></source> <volume>38</volume>, <fpage>100468</fpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.accinf.2020.100468">https://doi.org/10.1016/j.accinf.2020.100468</ext-link></comment></mixed-citation></ref>
<ref id="CIT0021"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Harymawan</surname>, <given-names>I</given-names></string-name>., <string-name><surname>Rahayu</surname>, <given-names>N.K</given-names></string-name>., <string-name><surname>Larasati</surname>, <given-names>D.A</given-names></string-name>., <string-name><surname>Ghofar</surname>, <given-names>A</given-names></string-name>. &#x0026; <string-name><surname>Agustia</surname>, <given-names>D</given-names></string-name></person-group>., <year>2020</year>, &#x2018;<article-title>Insights into research on carbon disclosure</article-title>&#x2019;, <source><italic>Journal of Security and Sustainability Issues</italic></source> <volume>9</volume>(<issue>4</issue>), <fpage>1157</fpage>&#x2013;<lpage>1164</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.9770/jssi.2020.9.4(3)">https://doi.org/10.9770/jssi.2020.9.4(3)</ext-link></comment></mixed-citation></ref>
<ref id="CIT0022"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>H&#x00E9;roux</surname>, <given-names>S</given-names></string-name>. &#x0026; <string-name><surname>Fortin</surname>, <given-names>A</given-names></string-name></person-group>., <year>2020</year>, &#x2018;<article-title>Cybersecurity disclosure by the companies on the S&#x0026;P/TSX 60 index</article-title>&#x2019;, <source><italic>Accounting Perspectives</italic></source> <volume>19</volume>(<issue>2</issue>), <fpage>73</fpage>&#x2013;<lpage>100</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1111/1911-3838.12220">https://doi.org/10.1111/1911-3838.12220</ext-link></comment></mixed-citation></ref>
<ref id="CIT0023"><mixed-citation publication-type="journal"><person-group person-group-type="author"><collab>Institute of Chartered Accountants in England and Wales (ICAEW)</collab></person-group>, <year>2016</year>, <source><italic>Top five cyber risks</italic></source>, <comment>viewed 13 August 2024, from <ext-link ext-link-type="uri" xlink:href="https://www.icaew.com/-/media/corporate/files/technical/business-and-financial-management/smes/bas-files/top-five-cyber-risks.ashx">https://www.icaew.com/-/media/corporate/files/technical/business-and-financial-management/smes/bas-files/top-five-cyber-risks.ashx</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0024"><mixed-citation publication-type="journal"><person-group person-group-type="author"><collab>Institute of Directors South Africa (IoDSA)</collab></person-group>, <year>2016</year>, <source><italic>Report on corporate governance for South Africa 2016</italic></source>, <comment>viewed 19 June 2024, from <ext-link ext-link-type="uri" xlink:href="https://www.adams.africa/wp-content/uploads/2016/11/King-IV-Report.pdf">https://www.adams.africa/wp-content/uploads/2016/11/King-IV-Report.pdf</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0025"><mixed-citation publication-type="journal"><person-group person-group-type="author"><collab>International Financial Reporting Standards</collab></person-group>, <year>2021</year>, <source><italic>International &#x003C;IR&#x003E; framework</italic></source>, <comment>viewed 18 August 2024, from <ext-link ext-link-type="uri" xlink:href="https://integratedreporting.org/wp-content/uploads/2021/01/InternationalIntegratedReportingFramework.pdf">https://integratedreporting.org/wp-content/uploads/2021/01/InternationalIntegratedReportingFramework.pdf</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0026"><mixed-citation publication-type="journal"><person-group person-group-type="author"><collab>Interpol</collab></person-group>, <year>2021</year>, <source><italic>African cyberthreat assessment report</italic></source>, <comment>viewed 17 May 2023, from <ext-link ext-link-type="uri" xlink:href="https://www.interpol.int/content/download/16759/file/AfricanCyberthreatAssessment_ENGLISH.pdf">https://www.interpol.int/content/download/16759/file/AfricanCyberthreatAssessment_ENGLISH.pdf</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0027"><mixed-citation publication-type="journal"><person-group person-group-type="author"><collab>Interpol</collab></person-group>, <year>2023</year>, <source><italic>African cyberthreat assessment report: Cyberthreat trends</italic></source>, <comment>viewed 17 May 2023, from <ext-link ext-link-type="uri" xlink:href="https://www.interpol.int/en/content/download/19174/file/2023_03CYBER_AfricanCyberthreatAssessmentReport2022_EN.pdf">https://www.interpol.int/en/content/download/19174/file/2023_03CYBER_AfricanCyberthreat Assessment Report 2022_EN.pdf</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0028"><mixed-citation publication-type="journal"><person-group person-group-type="author"><collab>IT Governance</collab></person-group>, <year>2022</year>, <source><italic>IT governance&#x2019;s cyber resilience framework</italic></source>, <comment>viewed 20 September 2024, from <ext-link ext-link-type="uri" xlink:href="https://www.itgovernance.co.uk/cyber-resilience-framework">https://www.itgovernance.co.uk/cyber-resilience-framework</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0029"><mixed-citation publication-type="journal"><person-group person-group-type="author"><collab>KPMG</collab></person-group>, <year>2022</year>, <source><italic>Africa cybersecurity outlook 2022 survey</italic></source>, <comment>viewed 20 August 2023, from <ext-link ext-link-type="uri" xlink:href="https://kpmg.com/ke/en/home/insights/2022/09/Africa&#x0025;20Cyber&#x0025;20Outlook&#x0025;20launch.html#:~:text=KPMG&#x0025;20Africa&#x0025;20today&#x0025;20launched&#x0025;20the,adequate&#x0025;20investments&#x0025;20in&#x0025;20protecting&#x0025;20assets">https://kpmg.com/ke/en/home/insights/2022/09/Africa&#x0025;20Cyber&#x0025;20Outlook&#x0025;20launch.html#:~:text=KPMG&#x0025;20Africa&#x0025;20today&#x0025;20launched&#x0025;20the,adequate&#x0025;20investments&#x0025;20in&#x0025;20protecting&#x0025;20assets</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0030"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kurnia</surname>, <given-names>P</given-names></string-name>. &#x0026; <string-name><surname>Ardianto</surname>, <given-names>A</given-names></string-name></person-group>., <year>2024</year>, &#x2018;<article-title>Board gender diversity and cyber security disclosure in the Indonesian banking industry: A two-tier governance context</article-title>&#x2019;, <source><italic>Corporate Governance</italic></source> <volume>24</volume>(<issue>7</issue>), <fpage>1614</fpage>&#x2013;<lpage>1637</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/CG-01-2023-0010">https://doi.org/10.1108/CG-01-2023-0010</ext-link></comment></mixed-citation></ref>
<ref id="CIT0031"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Maynard</surname>, <given-names>S.B</given-names></string-name>., <string-name><surname>Onibere</surname>, <given-names>M</given-names></string-name>. &#x0026; <string-name><surname>Ahmad</surname>, <given-names>A</given-names></string-name></person-group>., <year>2018</year>, &#x2018;<article-title>Defining the strategic role of the chief information security officer</article-title>&#x2019;, <source><italic>Pacific Asia Journal of the Association for Information Systems</italic></source> <volume>10</volume>(<issue>3</issue>), <fpage>61</fpage>&#x2013;<lpage>86</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.17705/1pais.10303">https://doi.org/10.17705/1pais.10303</ext-link></comment></mixed-citation></ref>
<ref id="CIT0032"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Mazumder</surname>, <given-names>M.M.M</given-names></string-name>. &#x0026; <string-name><surname>Hossain</surname>, <given-names>D.M</given-names></string-name></person-group>., <year>2023</year>, &#x2018;<article-title>Voluntary cybersecurity disclosure in the banking industry of Bangladesh: Does board composition matter?</article-title>&#x2019;, <source><italic>Journal of Accounting in Emerging Economies</italic></source> <volume>13</volume>(<issue>2</issue>), <fpage>217</fpage>&#x2013;<lpage>239</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/JAEE-07-2021-0237">https://doi.org/10.1108/JAEE-07-2021-0237</ext-link></comment></mixed-citation></ref>
<ref id="CIT0033"><mixed-citation publication-type="journal"><person-group person-group-type="author"><collab>McKinsey &#x0026; Company</collab></person-group>, <year>2023</year>, <source><italic>What are the responsibilities of a CIO versus a CTO?</italic></source>, <comment>viewed 04 November 2024, from <ext-link ext-link-type="uri" xlink:href="https://www.mckinsey.com/featured-insights/mckinsey-explainers/what-are-the-responsibilities-of-a-cio-versus-a-cto">https://www.mckinsey.com/featured-insights/mckinsey-explainers/what-are-the-responsibilities-of-a-cio-versus-a-cto</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0034"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Navarro</surname>, <given-names>P</given-names></string-name>. &#x0026; <string-name><surname>Sutton</surname>, <given-names>S.G</given-names></string-name></person-group>., <year>2024</year>, &#x2018;<article-title>Leveraging emerging cybersecurity reporting regulations: The effect of industry driven expectations for voluntary assurance</article-title>&#x2019;, <source><italic>Accounting Horizons</italic></source> <volume>39</volume>(<issue>1</issue>), <fpage>1</fpage>&#x2013;<lpage>16</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.2308/HORIZONS-2023-088">https://doi.org/10.2308/HORIZONS-2023-088</ext-link></comment></mixed-citation></ref>
<ref id="CIT0035"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Nuber</surname>, <given-names>C</given-names></string-name>. &#x0026; <string-name><surname>Velte</surname>, <given-names>P</given-names></string-name></person-group>., <year>2021</year>, &#x2018;<article-title>Board gender diversity and carbon emissions: European evidence on curvilinear relationships and critical mass</article-title>&#x2019;, <source><italic>Business Strategy and the Environment</italic></source> <volume>30</volume>(<issue>4</issue>), <fpage>1958</fpage>&#x2013;<lpage>1992</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1002/bse.2727">https://doi.org/10.1002/bse.2727</ext-link></comment></mixed-citation></ref>
<ref id="CIT0036"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Peng</surname>, <given-names>J</given-names></string-name>. &#x0026; <string-name><surname>Krivacek</surname>, <given-names>G</given-names></string-name></person-group>., <year>2020</year>, &#x2018;<article-title>The growing role of cybersecurity disclosures</article-title>&#x2019;, <source><italic>Information Systems Audit and Control Association Journal</italic></source> <volume>1</volume>, <fpage>1</fpage>&#x2013;<lpage>7</lpage>.</mixed-citation></ref>
<ref id="CIT0037"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Peter</surname>, <given-names>A.S</given-names></string-name></person-group>., <year>2017</year>, &#x2018;<article-title>Cyber resilience preparedness of Africa&#x2019;s top-12 emerging economies</article-title>&#x2019;, <source><italic>International Journal of Critical Infrastructure Protection</italic></source> <volume>17</volume>, <fpage>49</fpage>&#x2013;<lpage>59</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.ijcip.2017.03.002">https://doi.org/10.1016/j.ijcip.2017.03.002</ext-link></comment></mixed-citation></ref>
<ref id="CIT0038"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Pieterse</surname>, <given-names>H</given-names></string-name></person-group>., <year>2021</year>, &#x2018;<article-title>The cyber threat landscape in South Africa: A 10-year review</article-title>&#x2019;, <source><italic>African Journal of Information and Communication</italic></source> <volume>28</volume>(<issue>28</issue>), <fpage>1</fpage>&#x2013;<lpage>21</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.23962/10539/32213">https://doi.org/10.23962/10539/32213</ext-link></comment></mixed-citation></ref>
<ref id="CIT0039"><mixed-citation publication-type="journal"><person-group person-group-type="author"><collab>PricewaterhouseCoopers (PwC)</collab></person-group>, <year>2022</year>, <source><italic>PwC&#x2019;s global economic crime and fraud survey 2022</italic></source>, <comment>viewed 22 September 2024, from <ext-link ext-link-type="uri" xlink:href="http://www.pwc.com/fraudsurvey">www.pwc.com/fraudsurvey</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0040"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Radu</surname>, <given-names>C</given-names></string-name>. &#x0026; <string-name><surname>Smaili</surname>, <given-names>N</given-names></string-name></person-group>., <year>2021</year>, &#x2018;<article-title>Empowering women: The role of emancipative forces in board gender diversity</article-title>&#x2019;, <source><italic>Journal of Business Ethics</italic></source> <volume>177</volume>(<issue>2</issue>), <fpage>351</fpage>&#x2013;<lpage>374</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/s10551-020-04717-9">https://doi.org/10.1007/s10551-020-04717-9</ext-link></comment></mixed-citation></ref>
<ref id="CIT0041"><mixed-citation publication-type="journal"><person-group person-group-type="author"><collab>Republic of South Africa</collab></person-group>, <year>2021</year>, <source><italic>Cybercrimes Act 19 of 2022</italic></source>, <comment>viewed 15 July 2024, from <ext-link ext-link-type="uri" xlink:href="http://www.nsw.gov.au/sites/default/files/Government_Gazette_2_December.pdf#page=15">http://www.nsw.gov.au/sites/default/files/Government_Gazette_2_December.pdf#page=15</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0042"><mixed-citation publication-type="journal"><person-group person-group-type="author"><collab>Republic of South Africa</collab></person-group>, <year>2022</year>, <source><italic>Protection of Personal Information Act (POPI Act)</italic></source>, <comment>viewed 16 September 2024, from <ext-link ext-link-type="uri" xlink:href="https://popia.co.za">https://popia.co.za</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0043"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Reva</surname>, <given-names>D</given-names></string-name></person-group>., <year>2021</year>, <source><italic>Cyber attacks expose the vulnerability of South Africa&#x2019;s ports</italic></source>, <publisher-name>Institute for Security Studies</publisher-name>, <comment>viewed 13 September 2023, from <ext-link ext-link-type="uri" xlink:href="https://issafrica.org/iss-today/cyber-attacks-expose-the-vulnerability-of-south-africas-ports">https://issafrica.org/iss-today/cyber-attacks-expose-the-vulnerability-of-south-africas-ports</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0044"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Sari</surname>, <given-names>L</given-names></string-name>., <string-name><surname>Adam</surname>, <given-names>M</given-names></string-name>., <string-name><surname>Fuadah</surname>, <given-names>L.L</given-names></string-name>. &#x0026; <string-name><surname>Yusnaini&#x200E;</surname>, <given-names>Y</given-names></string-name></person-group>., <year>2024</year>, &#x2018;<article-title>Determinant factors of cyber security disclosure: A systematic literature review</article-title>&#x2019;, <source><italic>KnE Social Sciences</italic></source> <volume>9</volume>(<issue>14</issue>), <fpage>387</fpage>&#x2013;<lpage>398</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.18502/kss.v9i14.16113">https://doi.org/10.18502/kss.v9i14.16113</ext-link></comment></mixed-citation></ref>
<ref id="CIT0045"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Shehata</surname>, <given-names>N.F</given-names></string-name></person-group>., <year>2014</year>, &#x2018;<article-title>Theories and determinants of voluntary disclosure</article-title>&#x2019;, <source><italic>Accounting and Finance Research</italic></source> <volume>3</volume>(<issue>1</issue>), <fpage>18</fpage>&#x2013;<lpage>26</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.5430/afr.v3n1p18">https://doi.org/10.5430/afr.v3n1p18</ext-link></comment></mixed-citation></ref>
<ref id="CIT0046"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Shekokar</surname>, <given-names>N</given-names></string-name>., <string-name><surname>Vasudevan</surname>, <given-names>H</given-names></string-name>., <string-name><surname>Durbha</surname>, <given-names>S</given-names></string-name>., <string-name><surname>Michalas</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Nagarhalli</surname>, <given-names>T</given-names></string-name>., <string-name><surname>Mangrulkar</surname>, <given-names>R</given-names></string-name>. <etal>et al</etal></person-group>., <year>2022</year>, <source><italic>Cyber security threats and challenges facing human life</italic></source>, <publisher-name>CRC Press</publisher-name>, <publisher-loc>Boca Raton, FL</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0047"><mixed-citation publication-type="conference"><person-group person-group-type="author"><string-name><surname>Soni</surname>, <given-names>V</given-names></string-name>., <string-name><surname>Kukreja</surname>, <given-names>D</given-names></string-name>. &#x0026; <string-name><surname>Sharma</surname>, <given-names>D.K</given-names></string-name></person-group>., <year>2020</year>, &#x2018;<article-title>Security vs. flexibility: Striking a balance in the pandemic era</article-title>&#x2019;, in <person-group person-group-type="editor"><string-name><given-names>R.K.</given-names> <surname>Sharma</surname></string-name> (ed.)</person-group>, <conf-name>2020 Institute of Electrical and Electronics Engineers (IEEE) International Conference on advanced networks and telecommunications systems</conf-name>, <conf-loc>New Delhi, IEEE</conf-loc>, pp. <fpage>1</fpage>&#x2013;<lpage>6</lpage>, <conf-date>December 14&#x2013;17th</conf-date>.</mixed-citation></ref>
<ref id="CIT0048"><mixed-citation publication-type="journal"><person-group person-group-type="author"><collab>South African Reserve Bank (SARB)</collab></person-group>, <year>2024</year>, <source><italic>Joint communication 2 of 2024 &#x2013; Publication of the joint standard &#x2013; Cybersecurity and cyber resilience</italic></source>, <comment>viewed 02 November 2024, from <ext-link ext-link-type="uri" xlink:href="https://www.resbank.co.za/en/home/publications/publication-detail-pages/prudential-authority/pa-public-awareness/Communication/2024/Joint-Communication-2-of-2024-Publication-of-the-Joint-Standard-Cybersecurity-and-cyber-resilience">https://www.resbank.co.za/en/home/publications/publication-detail-pages/prudential-authority/pa-public-awareness/Communication/2024/Joint-Communication-2-of-2024-Publication-of-the-Joint-Standard-Cybersecurity-and-cyber-resilience</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0049"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Suchman</surname>, <given-names>M.C</given-names></string-name></person-group>., <year>1995</year>, &#x2018;<article-title>Managing legitimacy: Strategic and institutional approaches</article-title>&#x2019;, <source><italic>Academy of Management Review</italic></source> <volume>20</volume>(<issue>3</issue>), <fpage>571</fpage>&#x2013;<lpage>610</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.5465/amr.1995.9508080331">https://doi.org/10.5465/amr.1995.9508080331</ext-link></comment></mixed-citation></ref>
<ref id="CIT0050"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Van Niekerk</surname>, <given-names>B</given-names></string-name></person-group>., <year>2017</year>, &#x2018;<article-title>An analysis of cyber-incidents in South Africa</article-title>&#x2019;, <source><italic>African Journal of Information and Communication</italic></source> <volume>20</volume>, <fpage>113</fpage>&#x2013;<lpage>132</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.23962/10539/23573">https://doi.org/10.23962/10539/23573</ext-link></comment></mixed-citation></ref>
<ref id="CIT0051"><mixed-citation publication-type="journal"><person-group person-group-type="author"><collab>World Economic Forum</collab></person-group>, <year>2022</year>, <source><italic>The global risks report 2022</italic></source>, <comment>viewed 19 October 2023, from <ext-link ext-link-type="uri" xlink:href="https://www.weforum.org/reports/global-risks-report-2022">https://www.weforum.org/reports/global-risks-report-2022</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0052"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zwilling</surname>, <given-names>M</given-names></string-name></person-group>., <year>2022</year>, &#x2018;<article-title>Trends and challenges regarding cyber risk mitigation by CISOS: A systematic literature and experts&#x2019; opinion review based on text analytics</article-title>&#x2019;, <source><italic>Sustainability</italic></source> <volume>14</volume>(<issue>3</issue>), <fpage>1</fpage>&#x2013;<lpage>29</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/su14031311">https://doi.org/10.3390/su14031311</ext-link></comment></mixed-citation></ref>
</ref-list>
<app-group>
<app id="app001">
<title>Appendix 1</title>
<sec id="s20016">
<title>Cybersecurity keywords</title>
<table-wrap>
<table frame="void" rules="none">
<tbody>
<tr>
<td align="left">Antivirus</td>
<td align="left">Hacking</td>
</tr>
<tr>
<td align="left">Attack</td>
<td align="left">ICT</td>
</tr>
<tr>
<td align="left">best practice technologies</td>
<td align="left">ICT governance</td>
</tr>
<tr>
<td align="left">CISO</td>
<td align="left">ICT risk</td>
</tr>
<tr>
<td align="left">Cyber</td>
<td align="left">ICT security</td>
</tr>
<tr>
<td align="left">cyber incident</td>
<td align="left">information and communication</td>
</tr>
<tr>
<td align="left">cyber insurance</td>
<td align="left">information management</td>
</tr>
<tr>
<td align="left">cyber penetration</td>
<td align="left">information risk</td>
</tr>
<tr>
<td align="left">cyber resilience</td>
<td align="left">information security</td>
</tr>
<tr>
<td align="left">cyber risk</td>
<td align="left">information technology</td>
</tr>
<tr>
<td align="left">cyber threat</td>
<td align="left">insider threat</td>
</tr>
<tr>
<td align="left">Cyberattack</td>
<td align="left">intellectual capital</td>
</tr>
<tr>
<td align="left">Cybercrime</td>
<td align="left">IT governance</td>
</tr>
<tr>
<td align="left">Cybersecurity</td>
<td align="left">IT infrastructure</td>
</tr>
<tr>
<td align="left">cybersecurity attack</td>
<td align="left">IT risk</td>
</tr>
<tr>
<td align="left">data leakage</td>
<td align="left">IT security</td>
</tr>
<tr>
<td align="left">data mismanagement</td>
<td align="left">Malware</td>
</tr>
<tr>
<td align="left">data security</td>
<td align="left">network security</td>
</tr>
<tr>
<td align="left">data theft</td>
<td align="left">online fraud</td>
</tr>
<tr>
<td align="left">Decrypt</td>
<td align="left">online security</td>
</tr>
<tr>
<td align="left">Defend</td>
<td align="left">Penetration</td>
</tr>
<tr>
<td align="left">digital attack</td>
<td align="left">Phishing</td>
</tr>
<tr>
<td align="left">digital fraud</td>
<td align="left">protection of personal information</td>
</tr>
<tr>
<td align="left">digital intervention</td>
<td align="left">Ransomware</td>
</tr>
<tr>
<td align="left">digital security</td>
<td align="left">secure network</td>
</tr>
<tr>
<td align="left">Disruption</td>
<td align="left">security breach</td>
</tr>
<tr>
<td align="left">disruptive technologies</td>
<td align="left">technology disruption</td>
</tr>
<tr>
<td align="left">distributed denial-of-service</td>
<td align="left">technology risk</td>
</tr>
<tr>
<td align="left">Encrypt</td>
<td align="left">technology security</td>
</tr>
<tr>
<td align="left">financial crime risk</td>
<td align="left">threat detection</td>
</tr>
<tr>
<td align="left">Firewall</td>
<td align="left">unauthorised access</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
</app>
</app-group>
<fn-group>
<fn><p><bold>How to cite this article:</bold> Putter, L.F., Johnson, R. &#x0026; Mans-Kemp, N., 2026, &#x2018;Exploring cybersecurity disclosure in South Africa&#x2019;, <italic>South African Journal of Economic and Management Sciences</italic> 29(1), a6133. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.4102/sajems.v29i1.6133">https://doi.org/10.4102/sajems.v29i1.6133</ext-link></p></fn>
</fn-group>
</back>
</article>