2017
DOI: 10.2308/jeta-10539
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity and Continuous Assurance

Abstract: The evolution of the double entry accounting model (Pacioli 1494;Sangster 2016) was based on the business practices of Venetian traders at the time, and focused on physical assets as well as debt including credit. The operations of many businesses were run on transaction records and accounting to secondary owners using those records. In the United States, the Great Depression motivated the Securities Exchange Act of 1934, which requires publicly traded companies to file their financial reports based on General… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 33 publications
(6 citation statements)
references
References 23 publications
0
6
0
Order By: Relevance
“…Additionally, the integration of several audit analytic tools would be necessary to meet vested parties' demands for more timely audit reporting and transparency (Romero et al, 2012;No and Vasarhelyi, 2017). As a result, although these audit analytic tools could be uploaded to the cloud by the auditor and made publicly available to vested parties, saving the results of audit procedures to the cloud on a close to real-time basis could prove to be an onerous audit task.…”
Section: Evolving Auditing With Blockchain and Smart Contractsmentioning
confidence: 99%
“…Additionally, the integration of several audit analytic tools would be necessary to meet vested parties' demands for more timely audit reporting and transparency (Romero et al, 2012;No and Vasarhelyi, 2017). As a result, although these audit analytic tools could be uploaded to the cloud by the auditor and made publicly available to vested parties, saving the results of audit procedures to the cloud on a close to real-time basis could prove to be an onerous audit task.…”
Section: Evolving Auditing With Blockchain and Smart Contractsmentioning
confidence: 99%
“…Subsequent publications discuss the disruptive nature of blockchains and adoption challenges even in accounting such as scalability, cybersecurity (No and Vasarhelyi, 2017; Sinha, 2020), flexibility, and architecture (KwiljDski, 2019; Gaur, 2019; Prewett et al , 2020). Fuller and Markelevich (2020) and Lin and Liao (2017) discuss the privacy and security aspects of blockchains in accounting information systems.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Cybersecurity is often used as a synonym term for information security (No & Vasarhelyi, 2017). According to the definition set be Craigen et al (2014: 17), "Cybersecurity is the organization and collection of resources, processes, and structures used to protect cyberspace and cyberspace-enabled systems from occurrences that misalign de jure from de facto property rights".…”
Section: Background On Cybersecuritymentioning
confidence: 99%