<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.2 20190208//EN"
                  "JATS-archivearticle1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML"
  xmlns:xlink="http://www.w3.org/1999/xlink" dtd-version="1.2" article-type="other">
  <front>
        <journal-meta>
            <journal-id journal-id-type="issn">2829-8896</journal-id>
            <journal-title-group>
                <journal-title>Jurnal Ekonomi dan Bisnis Digital (MINISTAL)</journal-title>
                <abbrev-journal-title>Jurnal Ekonomi dan Bisnis Digital (MINISTAL)</abbrev-journal-title>
            </journal-title-group>
            <issn pub-type="epub">2829-8896</issn>
            <issn pub-type="ppub">2829-8896</issn>
            <publisher>
                <publisher-name>Formosa Publisher</publisher-name>
                <publisher-loc>Jl. Sutomo Ujung No.28 D, Durian, Kecamatan Medan Timur, Kota Medan, Sumatera Utara 20235, Indonesia.</publisher-loc>
            </publisher>
        </journal-meta>
        <article-meta>
            <article-id pub-id-type="doi">10.55927/ministal.v4i3.14519</article-id>
            <article-categories/>

            <title-group>
                <article-title>Artificial  Intelligence  and  Cloud-Based  Accounting  Information Systems: Enhancing Financial Reporting Reliability and Cybersecurity in the Digital Era</article-title>
            </title-group>
            <contrib-group>
                <contrib contrib-type="author">
                    <name>
                        <given-names>Putri Nur</given-names>
                        <surname>Aisyah</surname>
                    </name>
                    <address>
                        <email>putrinura82@gmail.com</email>
                    </address>
                    <xref ref-type="corresp" rid="cor-0"/>
                </contrib>

                <contrib contrib-type="author">
                    <name>
                        <given-names>Rina</given-names>
                        <surname>Tjandrakirana DP</surname>
                    </name>
                </contrib>
            </contrib-group>

            <author-notes>
                <corresp id="cor-0">
                    <bold>Corresponding author: Putri Nur Aisyah</bold>
                    Email:<email>putrinura82@gmail.com</email>
                </corresp>
            </author-notes>

            <pub-date-not-available/>
            <volume>4</volume>
            <issue>3</issue>
            <issue-title>Artificial  Intelligence  and  Cloud-Based  Accounting  Information Systems: Enhancing Financial Reporting Reliability and Cybersecurity in the Digital Era</issue-title>
            <fpage></fpage>
            <lpage></lpage>
            <history>
                <date date-type="received" iso-8601-date="2025-7-17">
                    <day>17</day>
                    <month>7</month>
                    <year>2025</year>
                </date>
                <date date-type="rev-recd" iso-8601-date="2025-7-31">
                    <day>31</day>
                    <month>7</month>
                    <year>2025</year>
                </date>
                <date date-type="accepted" iso-8601-date="2025-8-21">
                    <day>21</day>
                    <month>8</month>
                    <year>2025</year>
                </date>
            </history>
            <permissions>
                <copyright-statement>Copyright© 2025 Formosa Publisher</copyright-statement>
                <copyright-holder>Formosa Publisher</copyright-holder>
                <license>
                    <ali:license_ref xmlns:ali="http://www.niso.org/schemas/ali/1.0/">https://creativecommons.org/licenses/by/4.0/</ali:license_ref>
                    <license-p>This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
                </license>
            </permissions>
            <self-uri xlink:href="https://journal.formosapublisher.org/index.php/ministal" xlink:title="Artificial  Intelligence  and  Cloud-Based  Accounting  Information Systems: Enhancing Financial Reporting Reliability and Cybersecurity in the Digital Era">Artificial  Intelligence  and  Cloud-Based  Accounting  Information Systems: Enhancing Financial Reporting Reliability and Cybersecurity in the Digital Era</self-uri>
            <abstract>
                <p>This study aims to examine how the integration of 
                Artificial Intelligence (AI) and Cloud-Based 
                Accounting Information Systems (CAIS) enhances 
                the reliability of financial reporting and 
                strengthens cybersecurity. Using a qualitative 
                Systematic Literature Review (SLR) and guided by 
                Sociotechnical Systems Theory, the research 
                synthesizes 28 academic sources. Results show that 
                AI  and  CAIS  improve  accuracy,  fraud  detection, 
                and real-time reporting while mitigating cyber 
                threats through encryption and automated 
                monitoring. However, challenges include 
                algorithmic bias, regulatory complexity, and 
                organizational misalignment. The study concludes 
                that joint optimization of technical and social 
                systems is essential for achieving secure, 
                transparent, and resilient digital financial reporting 
                environments.</p>
            </abstract>
            <kwd-group>
                <kwd>Digital Accounting</kwd>
                <kwd>Artificial Intelligence (AI)</kwd>
                <kwd>Cloud-Based Accounting Information Systems (CAIS)</kwd>
                <kwd>Financial Reporting Reliability</kwd>
                <kwd>Cybersecurity</kwd>
            </kwd-group>
            <custom-meta-group>
                <custom-meta>
                    <meta-name>File created by JATS Editor</meta-name>
                    <meta-value>
                        <ext-link ext-link-type="uri" xlink:href="https://jatseditor.com" xlink:title="JATS Editor">JATS Editor</ext-link>
                    </meta-value>
                </custom-meta>
                <custom-meta>
                    <meta-name>issue-created-year</meta-name>
                    <meta-value>2025</meta-value>
                </custom-meta>
            </custom-meta-group>
        </article-meta>
  </front>
  <body>
    <sec id="introduction">
      <title>INTRODUCTION</title>
      <p>In the era of rapid digital transformation, the integrity and
  security of financial information have become increasingly dependent
  on the integration of advanced technologies. Artificial Intelligence
  (AI) and Cloud-Based Accounting Information Systems (CAIS) are at the
  forefront of this transformation, promising to revolutionize financial
  reporting processes through automation, real-time analytics, and
  enhanced cybersecurity (Alkan, 2022; Artene et al., 2024; Kuaiber et
  al., 2024). However, alongside their potential, these technologies
  introduce a series of complex challenges that threaten data
  reliability, organizational transparency, and regulatory compliance
  (Kuaiber et al., 2024; Matchuk et al., 2024).</p>
      <p>Symptoms of the problem are becoming evident in the form of
  frequent cyberattacks targeting financial databases, inconsistencies
  in automated financial statements, and ethical concerns arising from
  algorithmic bias and opaque AI decision-making processes (Bocean &amp;
  Vărzaru, 2022; Moreira et al., 2025; Shchyrba et al., 2025). Despite
  the proliferation of AI and cloud solutions in the accounting field,
  many organizations still struggle to achieve reliable, secure, and
  accountable financial reporting due to misalignments between
  technological capabilities and human or institutional readiness
  (Rodriguez-Barboza et al., 2024; Türegün, 2025).</p>
        <p>This study is formulated to address the following research
    question: <italic>How can the integration of AI and CAIS improve the
    reliability of financial reporting and mitigate cybersecurity risks,
    particularly when analyzed through the lens of Sociotechnical
    Systems (STS) Theory?</italic> The objective is to explore how the
    interplay between technological advancements and organizational,
    ethical, and regulatory factors influences the performance and
    resilience of digital accounting systems (Gopalsamy &amp; Karthick, 2019; Ding, 2024; Mustafa et al.,
    2024).</p>
      <p>The novelty of this research lies in its application of STS Theory
  as a comprehensive analytical framework, offering a dual focus on the
  technical and social dimensions of AI-CAIS integration—an area often
  overlooked in prior literature, which tends to focus narrowly on
  technical performance (Troyer, 2016; Gonzalez et al., 2025). Moreover,
  this study bridges the gap between existing research that either
  champions the benefits of AI and cloud computing in accounting or
  critiques their associated risks, but rarely integrates both views
  within a sociotechnical perspective (Kuaiber et al., 2024; Zhang et
  al., 2023).</p>
      <p>The key contribution of this research is its systematic synthesis
  of current literature to uncover patterns of success and failure in AI
  and CAIS implementation. By identifying both enablers and barriers to
  effective digital financial reporting, this study offers actionable
  insights for practitioners, policymakers, and academics. It proposes a
  path forward that balances innovation with accountability, reinforcing
  the need for joint optimization of technological infrastructures and
  social systems to build trustworthy and future- ready financial
  ecosystems (Awad et al., 2025; Choudhary et al., 2023; Ali et al.,
  2024).</p>
    </sec>
    <sec id="literature-review">
      <title>LITERATURE REVIEW</title>
      <sec id="sociotechnical-systems-theory">
        <title>Sociotechnical Systems Theory</title>
        <p>Recent studies have increasingly emphasized the transformative
    role of Artificial Intelligence (AI) and Cloud-Based Accounting
    Information Systems (AIS) in enhancing the reliability of financial
    reporting and strengthening cybersecurity in the digital era.
    Sociotechnical Systems Theory (STS) serves as a foundational lens
    for understanding the integration of these technologies, advocating
    for the joint optimization of both social (human, organizational)
    and technical (AI, cloud) subsystems (Twyford &amp; Abbas, 2023).
    From a technical standpoint, AI enhances reliability by automating
    repetitive tasks, detecting fraud, and facilitating real-time
    decision-making based on big data analytics (Yan &amp; Ji, 2024).
    Cloud-based AIS further supports this by enabling remote access,
    scalability, and collaborative financial reporting, which
    contributes to increased transparency and consistency (Vo Van et
    al., 2024; Wahhab et al., 2024). However, technical advancement
    alone is insufficient.</p>
        <p>STS highlights the need for participatory system design, user
    training, and ethical governance to ensure effective adoption and
    minimize risks such as algorithmic bias, system misuse, or
    organizational resistance (Lacmanovic &amp; Skare, 2025; Ruissalo et
    al., 2022). In terms of cybersecurity, the literature indicates that
    AI-driven fraud detection systems and secure cloud infrastructures
    improve resilience against cyber threats, but their effectiveness
    depends heavily on organizational maturity, governance policies, and
    the implementation of sociotechnical safeguards (Abu-Dabaseh et al.,
    2025; Mauri &amp; Damiani, 2022). Thus, aligning the technological
    capabilities of AI and cloud systems with ethical, behavioral, and
    regulatory dimensions is essential to achieving reliable and secure
    accounting practices in the digital landscape.</p>
      </sec>
      <sec id="artificial-intelligence">
        <title>Artificial Intelligence</title>
        <p>Artificial Intelligence (AI) is a field of computer science
    focused on creating systems that perform tasks requiring human
    intelligence, such as learning, reasoning, and problem-solving
    (Darda &amp; Pendse, 2025; L. Zhang et al., 2021). Key technologies
    include machine learning, deep learning, natural language
    processing, computer vision, and robotics, enabling AI to analyze
    data, interact with language, and operate autonomously (Akpabio et
    al., 2024; Gehlot &amp; Rana, 2024). AI is widely used in
    healthcare, education, transportation, industry, and online
    services, improving efficiency, accuracy, and personalization
    (Desmal et al., 2023; Jindal et al., 2021). However, AI also raises
    ethical concerns like bias, privacy, and job displacement, prompting
    the need for transparent and responsible use (Kamila &amp; Jasrotia,
    2025; Sethy et al., 2023). As AI evolves, especially with
    integration into emerging technologies and the pursuit of Artificial
    General Intelligence (AGI), its relevance across sectors will
    continue to grow, demanding careful attention to its societal
    impacts (Jagatheesaperumal et al., 2022; Meher, 2024).</p>
      </sec>
      <sec id="cloud-based-accounting-information-systems-ais">
        <title>Cloud-Based Accounting Information Systems (AIS)</title>
        <p>Cloud-based accounting information systems (AIS) use cloud
    computing to improve the efficiency, scalability, and security of
    financial processes (Ding, 2024; Gade &amp; Rao, 2022). These systems reduce infrastructure
    costs by eliminating the need for physical servers and allow
    real-time data access for faster decision-making (Thaher, 2024).
    They offer flexibility, enabling businesses to scale operations and
    support remote access for enhanced collaboration (Asatiani &amp;
    Penttinen, 2015; Lutfi, 2022). Advanced encryption and regular
    updates provided by service providers also strengthen data security
    and reliability (Ding, 2024; Yalamati, 2024). For small and
    medium-sized enterprises (SMEs), cloud-based AIS reduce the need for
    external auditors and support better financial control (Vo Van et
    al., 2024; Zebua &amp; Widuri, 2023). However, implementing
    cloud-based AIS requires careful planning, system integration, and
    staff training to avoid data migration issues (Khoruzhy et al.,
    2023; Thaher, 2024). Businesses must also ensure compliance with
    financial regulations and secure sensitive data (Chen &amp; Xu,
    2024; Yalamati, 2024). The integration of technologies such as
    blockchain and artificial intelligence further enhances these
    systems by automating processes and improving financial accuracy
    (Alkan, 2022; Ionescu, 2021). Going forward, making cloud-based AIS
    more accessible to SMEs will be key to fostering financial
    efficiency and sustainable growth (Noordin et al., 2024; Vo Van et
    al., 2024).</p>
      </sec>
      <sec id="financial-reporting-reliability">
        <title>Financial Reporting Reliability</title>
        <p>Financial reporting reliability refers to the accuracy and
    trustworthiness of financial information, ensuring it reflects the
    true financial position of an entity (Maines &amp; Wahlen, 2006).
    This reliability is essential for stakeholders who depend on
    financial reports for decision-making (Al-Ramahi &amp; Binsaddig,
    2024). The adoption of IFRS improves transparency and comparability
    but may initially reduce accrual reliability due to implementation
    challenges (Lai et al., 2013; Quoc et al., 2024). High audit
    quality, effective audit committees, and strong internal controls
    enhance reporting reliability by minimizing errors and manipulation
    (Ibrahim et al., 2024; Lustrilanang et al., 2023; Xi et al., 2019).
    Regulatory frameworks, like anti-money laundering measures, also
    support financial integrity (Abdulkareem Al yasiri et al., 2024).
    However, subjectivity in estimates and changes in accounting
    standards may still create inconsistencies (Erb &amp; Pelger, 2015;
    Lugovskу &amp; Kuter, 2020). Overall, reliable reporting is vital
    for investor confidence, market stability, and regulatory
    compliance.</p>
      </sec>
      <sec id="cybersecurity">
        <title>Cybersecurity</title>
        <p>Cybersecurity is the practice of protecting systems, networks,
    and data from unauthorized access and cyberattacks, ensuring
    confidentiality, integrity, and availability (Firmansyah, 2024;
    Tiwari et al., 2023). Key concepts include authentication,
    encryption, access control, and threat detection (Firmansyah, 2024;
    Tiwari et al., 2023). It is vital for safeguarding sensitive
    information, preventing data breaches, and maintaining
    organizational trust (Kapoor et al., 2024; Paliwal, 2023). Common
    threats include malware, phishing, ransomware, DDoS attacks, and
    insider threats (Kumar &amp; Mandoria, 2024; Shinde et al., 2024).
    To mitigate these, organizations use tools like IDS/IPS, endpoint
    protection, and incident response plans, supported by user education
    (Malasowe et al., 2024; Tiwari et al., 2023). Emerging challenges
    include quantum computing, regulatory compliance, and the need for skilled professionals, while AI and
    machine learning are increasingly used for proactive defense
    (Bhosale et al., 2023; Chandre et al., 2024; Ullah et al., 2024).
    Continuous innovation and awareness are essential to ensuring
    cybersecurity resilience (Kumar Jain et al., 2024).</p>
      </sec>
      <sec id="previous-research">
        <title>Previous Research</title>
        <p>The Systematic Literature Review (SLR) method in this study
    refers to the PRISMA guide which broadly provides stages of research
    selection, starting from the initial discovery of articles through
    the Scopus database. The following are the filtering stages carried
    out to obtain a collection of sources according to the criteria of
    this study.</p>
        <p>Table 1. Inclusion and Exclusion Criteria in Source Selection</p>
        <table-wrap>
          <label>Table 1. Inclusion and Exclusion Criteria in Source Selection</label>
          <table>
            <colgroup>
              <col width="17%" />
              <col width="41%" />
              <col width="41%" />
            </colgroup>
            <thead>
              <tr>
                <th>
                  <p specific-use="wrapper">
                    <disp-quote>
                      <p>Criteria</p>
                    </disp-quote>
                  </p>
                </th>
                <th>
                  <p specific-use="wrapper">
                    <disp-quote>
                      <p>Inclusion</p>
                    </disp-quote>
                  </p>
                </th>
                <th>
                  <p specific-use="wrapper">
                    <disp-quote>
                      <p>Exclusion</p>
                    </disp-quote>
                  </p>
                </th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td>
                  <p specific-use="wrapper">
                    <disp-quote>
                      <p>Publication Type</p>
                    </disp-quote>
                  </p>
                </td>
                <td>
                  <p specific-use="wrapper">
                    <disp-quote>
                      <p>Scientific articles, peer- reviewed journals,
                academic</p>
                      <p>books</p>
                    </disp-quote>
                  </p>
                </td>
                <td>
                  <p specific-use="wrapper">
                    <disp-quote>
                      <p>Popular media articles, blog posts, opinion pieces,
                non-</p>
                      <p>academic reports</p>
                    </disp-quote>
                  </p>
                </td>
              </tr>
              <tr>
                <td>
                  <p specific-use="wrapper">
                    <disp-quote>
                      <p>Publication</p>
                      <p>Year</p>
                    </disp-quote>
                  </p>
                </td>
                <td>
                  <p specific-use="wrapper">
                    <disp-quote>
                      <p>2018–2025</p>
                    </disp-quote>
                  </p>
                </td>
                <td>
                  <p specific-use="wrapper">
                    <disp-quote>
                      <p>Before 2018</p>
                    </disp-quote>
                  </p>
                </td>
              </tr>
              <tr>
                <td>
                  <p specific-use="wrapper">
                    <disp-quote>
                      <p>Research Topic</p>
                    </disp-quote>
                  </p>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p specific-use="wrapper">
                        <disp-quote>
                          <p>Integration of Artificial Intelligence in
                    Accounting Information Systems</p>
                        </disp-quote>
                      </p>
                    </list-item>
                    <list-item>
                      <p specific-use="wrapper">
                        <disp-quote>
                          <p>Cloud-based AIS for financial reporting</p>
                        </disp-quote>
                      </p>
                    </list-item>
                  </list>
                  <p specific-use="wrapper">
                    <disp-quote>
                      <p>reliability and cybersecurity</p>
                    </disp-quote>
                  </p>
                  <list list-type="bullet">
                    <list-item>
                      <p specific-use="wrapper">
                        <disp-quote>
                          <p>Sociotechnical</p>
                        </disp-quote>
                      </p>
                    </list-item>
                  </list>
                  <p specific-use="wrapper">
                    <disp-quote>
                      <p>perspectives in digital accounting systems</p>
                    </disp-quote>
                  </p>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p specific-use="wrapper">
                        <disp-quote>
                          <p>Non-AI or non-cloud AIS topics</p>
                        </disp-quote>
                      </p>
                    </list-item>
                    <list-item>
                      <p specific-use="wrapper">
                        <disp-quote>
                          <p>Studies not addressing financial reporting or
                    cybersecurity</p>
                        </disp-quote>
                      </p>
                    </list-item>
                    <list-item>
                      <p specific-use="wrapper">
                        <disp-quote>
                          <p>Irrelevant technological or sectoral focus</p>
                        </disp-quote>
                      </p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr>
                <td>
                  <p specific-use="wrapper">
                    <disp-quote>
                      <p>Journal Index</p>
                    </disp-quote>
                  </p>
                </td>
                <td>
                  <p specific-use="wrapper">
                    <disp-quote>
                      <p>Scopus Q1–Q4, Taylor &amp;</p>
                      <p>Francis, SpringerLink, IEEE, Elsevier</p>
                    </disp-quote>
                  </p>
                </td>
                <td>
                  <p specific-use="wrapper">
                    <disp-quote>
                      <p>Journals not indexed in</p>
                      <p>Scopus or other recognized academic databases</p>
                    </disp-quote>
                  </p>
                </td>
              </tr>
              <tr>
                <td>
                  <p specific-use="wrapper">
                    <disp-quote>
                      <p>Source Content</p>
                    </disp-quote>
                  </p>
                </td>
                <td>
                  <p specific-use="wrapper">
                    <disp-quote>
                      <p>Ensures consistency between abstract, discussion, and
                conclusion</p>
                    </disp-quote>
                  </p>
                </td>
                <td>
                  <p specific-use="wrapper">
                    <disp-quote>
                      <p>Inconsistencies or</p>
                      <p>contradictions between abstract, discussion, and</p>
                      <p>conclusion</p>
                    </disp-quote>
                  </p>
                </td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <p>From the criteria that have been determined, it is continued with
        the stage of selecting the number of sources that have been obtained
        by the provisions of the criteria that have been mentioned in the
        table so that they become samples in this study. These stages can be
        described through the following PRISMA diagram.</p>
        <fig id="figure-hyumg5">
            <label>Figure 1. PRISMA diagram</label>
            <graphic xlink:href="Figure 1. PRISMA diagram..png" mimetype="image"
                mime-subtype="png">
                <alt-text>Image</alt-text>
            </graphic>
        </fig>
        <p>Figure 1. PRISMA diagram.</p>
        <p>The majority of studies (61%) emphasized the beneficial impact of
    integrating AI and cloud technologies into accounting information
    systems. These positive impacts were primarily centered around three
    domains. First, the implementation of AI significantly improved the
    reliability of financial reporting by reducing human error and
    automating complex tasks such as real-time reconciliation, fraud
    detection, and predictive analysis. Second, AI-enhanced cloud
    systems strengthened cybersecurity through tools such as real-time
    threat detection, encryption algorithms, and blockchain integration.
    Third, operational efficiency was improved as cloud-based
    infrastructures enabled system scalability, regulatory compliance,
    and cost savings through centralized maintenance and updates. These
    findings align well with Sociotechnical Systems Theory, which
    highlights the importance of harmonizing human and technological
    subsystems to achieve optimal performance. Organizations that
    succeeded in this integration reaped benefits not only in system
    functionality but also in trust and transparency in financial
    reporting.</p>
        <p>However, 11 studies (39%) pointed to notable challenges and risks
    associated with these technologies. Cybersecurity vulnerabilities
    were a recurring theme, particularly the risk of adversarial attacks
    and reliance on third- party platforms that may not be fully secure.
    Ethical concerns such as data privacy, algorithmic bias, and lack of
    transparency in AI decision-making were also prevalent.
    Additionally, technical and human resource barriers such as
    integration difficulties with legacy systems and resistance from
    users due to limited AI literacy were cited as major obstacles.
    These negative findings illustrate the sociotechnical misalignments
    that can occur when technological systems outpace organizational
    readiness or regulatory frameworks.</p>
        <p>In conclusion, the PRISMA diagram validates the methodological
    robustness of this literature review and reflects a well-balanced
    spectrum of findings. While the integration of AI and cloud-based
    AIS offers transformative potential for enhancing financial
    reporting reliability and cybersecurity, it also introduces complex
    risks that must be addressed through ethical oversight, technical
    adaptability, and human-centered design. This underscores the
    necessity of applying a sociotechnical lens to the ongoing digital
    transformation of accounting practices, ensuring that technological
    advancement is matched by institutional preparedness and stakeholder
    engagement.</p>
        <p>Table 2. Previous research on Artificial Intelligence &amp; Cloud-Based Accounting Information Systems</p>
        <table-wrap id="T1">
          <label>Table 2. Previous research on Artificial Intelligence &amp; Cloud-Based Accounting Information Systems</label>
          <caption>
            <title></title>
          </caption>
          <table frame="hsides" rules="groups">
            <thead>
              <tr>
                <th>Variable</th>
                <th>Index</th>
                <th>Author</th>
                <th>Research Results</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td rowspan="4">Artificial Intelligence and Cloud-Based Accounting Information Systems</td>
                <td>Q1</td>
                <td>Ali et al. (2024), Kuaiber et al. (2024), Felix et al. (2024), Zadorozhnyi et al. (2021)</td>
                <td>(+)</td>
              </tr>
              <tr>
                <td>Q2</td>
                <td>Askary et al. (2018), Al-Sammarraee &amp; Alshareeda (2021), Cazazian (2022), Ionescu (2022)</td>
                <td></td>
              </tr>
              <tr>
                <td>Q3</td>
                <td>Awad et al. (2025), Shchyryba et al. (2025)</td>
                <td></td>
              </tr>
              <tr>
                <td>Q4</td>
                <td>Rahahleh et al. (2021), Shakdwipee et al. (2023), Gopalsamy &amp; Karthick (2019), Ding (2024), Qureshi et al. (2024), Kim et al. (2019)</td>
                <td></td>
              </tr>
              <tr>
                <td rowspan="5">Taylor and Francis</td>
                <td colspan="2">Clerkin &amp; McConville (2022)</td>
                <td></td>
              </tr>
              <tr>
                <td>Q1</td>
                <td>Bani Ahmad (2024a), Zhang et al. (2023)</td>
                <td>(-)</td>
              </tr>
              <tr>
                <td>Q2</td>
                <td>Bani Ahmad (2024), Moreira et al. (2025), Türegün (2025)</td>
                <td></td>
              </tr>
              <tr>
                <td>Q3</td>
                <td>Al-Nsour et al. (2021), Bertolini (2024)</td>
                <td></td>
              </tr>
              <tr>
                <td>Q4</td>
                <td>Minz (2024), Yadav et al. (2023), Mustafa et al. (2024), Rodriguez-Barboza et al. (2024)</td>
                <td></td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <p>(+) has a positive effect, (-) has a negative effect</p>
          </table-wrap-foot>
        </table-wrap>
      </sec>
    </sec>
    <sec id="methodology">
      <title>METHODOLOGY</title>
      <p>This study employs a qualitative research approach using the
      Systematic Literature Review (SLR) method. This method involves the
      systematic collection, evaluation, and synthesis of prior academic
      studies that specifically examine the integration of Artificial
      Intelligence (AI) and Cloud-Based Accounting Information Systems
      (CAIS) in enhancing the reliability of financial reporting and
      strengthening cybersecurity. The primary objective of this research is
      to analyze the development, application, and implications of
      AI-integrated CAIS through the lens of Sociotechnical Systems Theory,
      while also identifying potential vulnerabilities and strategic
      mitigation measures.</p>
      <p>The qualitative approach is adopted to allow an in-depth and
      contextual understanding of complex interactions between technological
      advancements (AI and cloud computing), organizational processes, and
      human factors within digital accounting systems. Given the rapidly
      evolving nature of both AI and cybersecurity threats, qualitative
      synthesis is particularly valuable in capturing the nuanced,
      interdisciplinary insights from diverse sources. This method
      facilitates the identification of patterns, themes, and conceptual
      frameworks that may not be evident through quantitative methods alone,
      thus providing a comprehensive foundation for future empirical
      investigation and policy recommendations.</p>
    </sec>
    <sec id="research-result">
      <title>RESEARCH RESULT</title>
      <p>The findings confirm that integrating Artificial Intelligence (AI)
  with Cloud-Based Accounting Information Systems (CAIS) enhances
  financial reporting reliability by improving accuracy, timeliness, and
  fraud detection through automation and real-time analytics (Awad et
  al., 2025; Askary et al., 2018). Cloud platforms add scalability and
  data accessibility, fostering transparency and collaboration (Ionescu,
  2022; Alkan, 2022). However, consistent with Sociotechnical Systems
  (STS) Theory, these technological benefits depend on the human
  subsystem skilled professionals who interpret AI outputs and ensure
  ethical governance (Al-Sammarraee &amp; Alshareeda, 2021; Troyer,
  2016).</p>
      <p>Similarly, AI and CAIS strengthen cybersecurity with advanced
  encryption, real-time threat detection, and blockchain, but their
  effectiveness requires robust organizational policies, user training,
  and regulatory compliance (Felix et al., 2024; Moreira et al., 2025).
  The research highlights that misalignment such as algorithmic bias,
  transparency issues, and resistance to change can undermine system
  reliability if social factors are neglected (Kuaiber et al., 2024;
  Minz, 2024).</p>
      <p>This study bridges the gap in literature by integrating technical,
  ethical, and organizational dimensions, emphasizing that successful
  AI-CAIS adoption requires joint optimization of technology and human
  elements. Ultimately, balanced sociotechnical integration is essential
  for building resilient, transparent, and trustworthy financial
  reporting systems in the digital era.</p>
    </sec>
    <sec id="discussion">
      <title>DISCUSSION</title>
      <sec id="how-ai-and-cloud-based-accounting-information-systems-improve-the-reliability-of-financial-reporting">
        <title>How AI and Cloud-Based Accounting Information Systems Improve
    the Reliability of Financial Reporting?</title>
        <p>The integration of Artificial Intelligence (AI) and cloud-based
    Accounting Information Systems (AIS) has transformed financial
    reporting, improving its reliability and adaptability in the digital
    age. From the lens of Sociotechnical Systems Theory (STS), this
    advancement must be viewed not only through technological innovation
    but also in terms of how these tools interact with human,
    organizational, and regulatory components.</p>
        <p>AI technologies such as machine learning, natural language
    processing, and robotic process automation reduce manual errors,
    enhance data processing consistency, and improve fraud detection
    (Awad et al., 2025; Kuaiber et al., 2024). From a technical
    subsystem perspective, these capabilities significantly enhance the
    efficiency and accuracy of information flows, which is critical for
    financial reporting. However, STS emphasizes that technology alone
    cannot ensure reliability; it must be harmonized with the human
    (social) subsystem, including accountants, managers, and auditors,
    whose trust in AI systems and ability to interpret AI outputs are
    vital (Rahahleh et al., 2021; Askary et al., 2018).</p>
        <p>AI also facilitates predictive analytics and strategic
    forecasting, offering powerful decision-support capabilities
    (Shakdwipee et al., 2023; Türegün, 2025). Yet, in line with STS, the
    full value of these tools is realized only when the organizational
    culture and skills of professionals are aligned with these
    innovations. Effective training, cross-functional collaboration, and
    a shared understanding of how AI works are necessary to bridge the
    gap between technical potential and actual organizational impact
    (Al-Sammarraee &amp; Alshareeda, 2021).</p>
        <p>Cloud-based AIS, on the other hand, represent the technical
    infrastructure that enables real-time data processing and global
    access, boosting the timeliness and transparency of financial
    reports (Alkan, 2022; Ionescu, 2022). STS suggests that such systems
    must be embedded within a broader organizational workflow that
    supports flexible work environments, decentralization, and
    responsive decision-making. This is especially important for SMEs,
    where cloud systems can democratize access to high-quality reporting
    tools (Cazazian, 2022). However, social subsystems must evolve as
    well adopting new governance models, data stewardship roles, and
    trust mechanisms to manage the shared nature of cloud
    environments.</p>
        <p>Moreover, when integrated with blockchain and encryption
    technologies, cloud-based AIS enhance data security and integrity
    (Alkan, 2022). In STS terms, these technologies form part of the
    technical subsystem that supports risk management, but their
    effectiveness also depends on how well users adhere to protocols,
    understand security risks, and collaborate to maintain system
    resilience.</p>
        <p>The synergy between AI and cloud-based AIS creates a dynamic
    sociotechnical ecosystem where advanced analytics and automation
    co-exist with human judgment and governance. This alignment
    strengthens financial reporting reliability by balancing technical
    performance (e.g., automation, speed, accuracy) with social values
    (e.g., accountability, transparency, adaptability) (Ali et al.,
    2024).</p>
        <p>However, STS highlights that misalignment between subsystems can
    introduce new risks. For instance, AI systems may introduce
    algorithmic bias or opacity, leading to ethical and interpretability
    concerns if not matched with appropriate human oversight and
    regulation (Kuaiber et al., 2024; Shakdwipee et al., 2023).
    Similarly, cloud migration can create dependency on third-party
    vendors, requiring new roles and policies to ensure continuity and
    compliance.</p>
        <p>Implementing these systems also demands significant
    organizational change, including restructuring job roles, retraining
    staff, and redefining workflows. STS stresses that ignoring the
    social impacts—such as employee resistance, ethical dilemmas, or
    loss of human oversight can undermine the very reliability these
    technologies aim to enhance (Clerkin &amp; McConville, 2022; Minz,
    2024).</p>
        <p>Ethical challenges such as data privacy, transparency in AI
    decision-making, and the displacement of accounting roles must be
    addressed through inclusive governance frameworks that emphasize
    explainability, fairness, and social accountability (Bani Ahmad,
    2024; Yadav et al., 2023). These concerns reflect STS's central
    principle that technical systems are embedded in broader social
    contexts, and their success depends on how well they are integrated
    into those contexts.</p>
        <p>Ultimately, from the Sociotechnical Systems Theory perspective,
    the integration of AI and cloud-based AIS enhances the reliability
    of financial reporting not merely through technological superiority
    but through the balanced co-evolution of social and technical
    subsystems. Achieving trustworthy, transparent, and sustainable
    financial practices in the digital era requires socio-
    organizational readiness, ethical stewardship, and continuous
    adaptation not just advanced tools.</p>
      </sec>
      <sec id="what-role-do-cloud-based-accounting-information-systems-play-in-mitigating-cyber-threats-specific-to-financial-data-protection">
        <title>What Role Do Cloud-Based Accounting Information Systems Play
    in Mitigating Cyber Threats Specific to Financial Data
    Protection?</title>
        <p>Cloud-based accounting information systems (CAIS) play a critical
    role in safeguarding financial data against an evolving landscape of
    cyber threats. In today’s digitized financial environment, their
    function extends beyond storage and processing to encompass dynamic,
    adaptive security frameworks. Equipped with advanced encryption
    protocols such as RSA and AES, CAIS ensure that financial data
    remains secure both in transit and at rest (Gopalsamy &amp;
    Karthick, 2019; Shchyrba et al., 2025). Multi-factor authentication
    and role-based access controls further fortify system security by
    limiting access to authorized users only (Shchyrba et al.,
    2025).</p>
        <p>From the perspective of Sociotechnical Systems (STS) Theory,
    which views organizations as composed of interacting social and
    technical subsystems, the security effectiveness of CAIS is
    contingent not just on the technological safeguards in place, but
    also on the social context in which these systems are embedded.
    While encryption, intrusion detection systems (IDS), and AI-powered
    monitoring tools represent the technical subsystem, their success
    relies heavily on human behavior, organizational policies, and
    regulatory alignment—the social subsystem.</p>
        <p>CAIS platforms are increasingly developed in alignment with
    global cybersecurity regulations, such as those enforced by the
    Financial Conduct Authority (FCA) and the Monetary Authority of
    Singapore (MAS), to ensure robust data protection (Shchyrba et al.,
    2025). This regulatory compliance strengthens institutional trust
    and reinforces an organizational culture that values cybersecurity
    as a shared responsibility. According to STS theory, this reflects the principle of joint optimization, where both technical capabilities and social structures must be designed in
    harmony to achieve optimal performance. Operationally, CAIS reduce
    overhead costs by centralizing updates and security maintenance in
    the cloud (Ding, 2024; Qureshi et al., 2024). However, these
    efficiencies can only be realized if the workforce is adequately
    trained to engage with new access protocols, interpret system
    alerts, and respond to cyber incidents. For example, AI-powered
    anomaly detection is only valuable when users are trained to act
    upon alerts quickly and effectively. This interdependence reflects
    the STS emphasis on mutual adaptation, where human roles evolve alongside technological changes.</p>
        <p>In addition, CAIS’s integration with real-time threat detection
    tools and automated monitoring systems enables organizations to
    detect cyber anomalies early and mitigate breaches before they
    escalate (Kim et al., 2019; Felix et al., 2024). Yet, STS theory
    warns that over-reliance on automation without human oversight can
    create blind spots. Ethical and procedural challenges arise when
    AI-based systems make opaque decisions, emphasizing the need for
    explainability and governance within the social subsystem to ensure
    accountability.</p>
        <p>Emerging solutions such as the integration of blockchain
    technology further enhance CAIS security by offering immutable,
    transparent records of financial transactions (Zadorozhnyi et al.,
    2021). When implemented within a sociotechnical framework,
    blockchain strengthens both the technical infrastructure and the
    institutional trust mechanisms that underlie financial reporting.
    For instance, blockchain can secure transaction integrity, but only
    if organizational practices and auditor roles are adjusted to
    interpret and validate these new forms of digital records.</p>
        <p>Despite their potential, CAIS are not without vulnerabilities.
    Issues such as unauthorized access, insider threats, and
    misconfigured cloud settings often result from gaps in the social
    subsystem including poor governance, insufficient training, or
    unclear responsibility for cybersecurity roles (Al-Nsour et al.,
    2021). STS theory emphasizes that mitigating these risks requires
    continuous alignment of technical advancements with human
    capabilities, ethical norms, and institutional structures.</p>
        <p>In conclusion, cloud-based AIS contribute significantly to the
    protection of financial data through advanced technological defenses
    and compliance frameworks. However, from a Sociotechnical Systems
    Theory perspective, their true effectiveness depends on the
    harmonious integration of secure technologies with competent,
    well-trained users, robust organizational policies, and a strong
    culture of accountability. Only through the joint optimization of
    both technical tools and social practices can CAIS fulfill their
    potential as secure, resilient pillars of financial data protection
    in the digital era.</p>
      </sec>
      <sec id="potential-vulnerabilities-of-ai-integrated-cloud-accounting-information-systems-ais-and-mitigation-strategies">
        <title>Potential Vulnerabilities of AI-Integrated Cloud Accounting
    Information Systems (AIS) and Mitigation Strategies</title>
        <p>The integration of Artificial Intelligence (AI) into cloud-based
    Accounting Information Systems (AIS) has significantly advanced the
    efficiency and accuracy of financial reporting. However, this
    integration also introduces a range of vulnerabilities particularly in cybersecurity, data privacy,
    algorithmic bias, and legal compliance that must be critically
    examined through the lens of Sociotechnical Systems (STS)
    Theory.</p>
        <p></p>
        <p>From a technical standpoint, AI-integrated AIS are susceptible to
    sophisticated cyber threats, including adversarial attacks that
    manipulate AI inputs to generate false outputs or unauthorized
    access (Bani Ahmad, 2024). Their reliance on interconnected
    platforms, including third-party APIs, introduces additional attack
    vectors that can compromise data integrity (Mustafa et al., 2024).
    These technical vulnerabilities cannot be fully addressed in
    isolation. STS theory asserts that system reliability depends on the
    interdependence of both technical tools and the social systems that
    govern their use. For example, while advanced encryption and
    multi-factor authentication are necessary defenses, their
    effectiveness depends on user compliance and awareness, reflecting
    the critical role of the human subsystem.</p>
        <p>AI also introduces ethical and privacy concerns, especially when
    trained on large, heterogeneous datasets that can lead to
    unauthorized disclosures of sensitive information or perpetuate
    algorithmic bias (Rodriguez-Barboza et al., 2024). STS theory
    emphasizes the importance of ethical alignment between technology
    and organizational values. If the social structures such as ethics
    guidelines, data governance policies, or user training are
    underdeveloped, even the most advanced AI can generate biased or
    non-transparent outputs that undermine trust and accountability
    (Zhang et al., 2023; Moreira et al., 2025).</p>
        <p>The issue of explainability highlights another STS principle:
    joint optimization. Many AI models embedded in AIS operate as “black
    boxes,” making their decision-making processes opaque to users and
    regulators. This lack of transparency undermines the auditing and
    regulatory oversight functions essential to financial systems.
    Technical solutions such as explainable AI (XAI) must be matched by
    social practices such as revised audit methodologies, regulatory
    literacy, and stakeholder engagement to foster understanding and
    accountability across the system.</p>
        <p>Legal and regulatory frameworks, including the European Union's
    Artificial Intelligence Act (AIA), are also placing increased
    pressure on organizations to ensure compliance in AI usage
    (Bertolini, 2024). STS theory suggests that organizational responses
    must go beyond adopting compliant technologies. They must cultivate
    adaptive social subsystems that include trained legal teams,
    compliance officers, and culturally embedded accountability
    structures to navigate rapidly evolving regulations.</p>
        <p>From a systems integration perspective, challenges such as data
    inconsistency, legacy infrastructure incompatibility, and lack of
    interoperability are not purely technical barriers they are also
    symptoms of inadequate communication and coordination across
    departments (Türegün, 2025). STS theory identifies this as a
    misalignment between social workflows and technical system design,
    which can lead to breakdowns in system performance, delayed
    financial reporting, or increased error rates.</p>
        <p>To mitigate these multidimensional vulnerabilities, organizations
    must adopt strategies that reflect the sociotechnical complexity of
    AI-integrated AIS.</p>
        <p>Technological safeguards including end-to-end encryption, anomaly
    detection, blockchain-based audit trails, and AI-driven threat
    detection should be accompanied by robust social practices. These
    include regular ethics training, reskilling programs, transparent
    data governance policies, and inclusive stakeholder dialogue
    (Choudhary et al., 2023; Mathai &amp; Mathew, 2024).</p>
        <p>Moreover, adopting continuous monitoring through both technical
    means (e.g., automated security updates, real-time audits) and human
    oversight (e.g., independent third-party audits, ethical review
    boards) ensures system adaptability and resilience. This dual
    oversight aligns with the STS principle of equifinality, which
    allows organizations to achieve the same goal system security
    through multiple coordinated pathways.</p>
        <p>To summarize, the vulnerabilities posed by AI-integrated cloud
    AIS are not merely technical in nature but stem from the complex
    interplay between people, technology, and organizational systems.
    Applying Sociotechnical Systems Theory reveals that achieving
    trustworthy, secure, and efficient financial reporting requires
    joint optimization of both technological tools and human- centered
    practices. Effective mitigation strategies must integrate
    cybersecurity infrastructure, legal compliance, ethical governance,
    and workforce engagement to build resilient, transparent, and
    accountable financial ecosystems in the digital era.</p>
      </sec>
    </sec>
    <sec id="conclusion-and-recommendation">
      <title>CONCLUSION AND RECOMMENDATION</title>
      <p>This study systematically examined the integration of Artificial
  Intelligence (AI) and Cloud-Based Accounting Information Systems
  (CAIS) in enhancing financial reporting reliability and cybersecurity,
  framed within the Sociotechnical Systems (STS) Theory. The findings
  underscore that the synergy between advanced AI capabilities and cloud
  infrastructures significantly improves the accuracy, timeliness, and
  security of financial reports by automating routine tasks, enabling
  real-time analytics, and strengthening fraud detection mechanisms.
  However, these technological benefits are fully realized only when
  aligned with organizational readiness, ethical governance, and
  regulatory compliance, reflecting the core STS principle of joint
  optimization between social and technical subsystems.</p>
      <p>The research revealed that while AI and CAIS enhance financial
  reporting reliability through predictive analytics and data integrity,
  they also introduce new vulnerabilities such as algorithmic bias,
  privacy concerns, cybersecurity threats, and system integration
  challenges that must be managed through comprehensive sociotechnical
  strategies. Moreover, the human dimension comprising trained
  personnel, ethical oversight, and adaptive governance structures is
  critical for mitigating risks and fostering trust in AI-driven
  accounting environments.</p>
      <p>Despite these insights, the study acknowledges several limitations.
  The reliance on secondary data from existing literature constrains the
  ability to capture emerging, real-time technological developments and
  nuanced organizational dynamics. Additionally, the rapid evolution of
  AI and cloud technologies means that current findings may quickly
  become outdated, necessitating continual reassessment. The qualitative
  nature of the review limits empirical validation of proposed frameworks, highlighting a need
  for primary data collection to deepen understanding.</p>
    </sec>
    <sec id="advanced-research">
      <title>ADVANCED RESEARCH</title>
      <p>Future research should focus on longitudinal and mixed-method
  studies that explore the practical implementation of AI-integrated
  CAIS across diverse organizational contexts, particularly SMEs and
  emerging markets. Investigating user experiences, resistance factors,
  and the socio-cultural aspects of technology adoption can enrich the
  sociotechnical perspective. Furthermore, there is a pressing need to
  develop standardized ethical guidelines and regulatory frameworks that
  specifically address AI transparency, fairness, and accountability in
  financial reporting. Experimental research on explainable AI (XAI) and
  blockchain applications within cloud AIS would provide valuable
  evidence for optimizing both technical and social components.</p>
      <p>In conclusion, this study contributes to bridging the gap between
  technology-centric and human-centric approaches to digital accounting
  transformation. It recommends a balanced, integrative approach that
  advances financial reporting reliability and cybersecurity not merely
  through technological innovation but through sustained organizational
  learning, ethical stewardship, and proactive policy engagement.
  Embracing this sociotechnical outlook will be essential for
  organizations aiming to harness AI and cloud technologies responsibly
  and effectively in the digital era.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <title>References</title>

      <ref id="R1">
        <element-citation publication-type="journal">
          <person-group person-group-type="author">
            <name><surname>Al yasiri</surname><given-names>H. A.</given-names></name>
            <name><surname>Samimi</surname><given-names>A. J.</given-names></name>
            <name><surname>Tehranchian</surname><given-names>A. M.</given-names></name>
          </person-group>
          <year>2024</year>
          <article-title>The Impact of Anti-Money laundering Policies of Iraq Central Bank on the Quality of Financial Reports of Private Iraqi Banks</article-title>
          <source>Pakistan Journal of Life and Social Sciences</source>
          <volume>22</volume>
          <issue>1</issue>
          <fpage>6481</fpage>
          <lpage>6508</lpage>
          <pub-id pub-id-type="doi">10.57239/PJLSS-2024-22.1.00476</pub-id>
        </element-citation>
      </ref>

      <ref id="R2">
        <element-citation publication-type="journal">
          <person-group person-group-type="author">
            <name><surname>Abu-Dabaseh</surname><given-names>F.</given-names></name>
            <name><surname>Khtatbeh</surname><given-names>M. M.</given-names></name>
            <name><surname>Al’ararah</surname><given-names>K.</given-names></name>
            <name><surname>Alassuli</surname><given-names>A.</given-names></name>
          </person-group>
          <year>2025</year>
          <article-title>Exploring the Role of Digital Transformation in Mitigating Accounting Fraud: A Cybersecurity Perspective</article-title>
          <source>International Review of Management and Marketing</source>
          <volume>15</volume>
          <issue>3</issue>
          <fpage>398</fpage>
          <lpage>405</lpage>
          <pub-id pub-id-type="doi">10.32479/irmm.18490</pub-id>
        </element-citation>
      </ref>

      <ref id="R3">
        <element-citation publication-type="confproc">
          <person-group person-group-type="author">
            <name><surname>Akpabio</surname><given-names>E.</given-names></name>
            <name><surname>Narad</surname><given-names>S.</given-names></name>
            <name><surname>Ulhe</surname><given-names>P.</given-names></name>
          </person-group>
          <year>2024</year>
          <article-title>The Evolution and Impact of Artificial Intelligence its Applications, Challenges, and Future Directions: A Review</article-title>
          <source>2024 International Conference on Artificial Intelligence and Quantum Computation-Based Sensor Applications, ICAIQSA 2024 - Proceedings</source>
          <pub-id pub-id-type="doi">10.1109/ICAIQSA64000.2024.10882203</pub-id>
        </element-citation>
      </ref>

      <ref id="R4">
        <element-citation publication-type="journal">
          <person-group person-group-type="author">
            <name><surname>Al-Nsour</surname><given-names>E.</given-names></name>
            <name><surname>Weshah</surname><given-names>S.</given-names></name>
            <name><surname>Dahiyat</surname><given-names>A.</given-names></name>
          </person-group>
          <year>2021</year>
          <article-title>Cloud accounting information systems: Threats and advantages</article-title>
          <source>Accounting</source>
          <volume>7</volume>
          <issue>4</issue>
          <fpage>875</fpage>
          <lpage>882</lpage>
          <pub-id pub-id-type="doi">10.5267/j.ac.2021.1.021</pub-id>
        </element-citation>
      </ref>

      <ref id="R5">
        <element-citation publication-type="journal">
          <person-group person-group-type="author">
            <name><surname>Al-Ramahi</surname><given-names>N.</given-names></name>
            <name><surname>Binsaddig</surname><given-names>R.</given-names></name>
          </person-group>
          <year>2024</year>
          <article-title>The Impact of the Quality of Financial Reports of Jordanian Public Shareholding Companies on Investors’ Decisions</article-title>
          <source>International Journal of Economics and Finance Studies</source>
          <volume>16</volume>
          <issue>2</issue>
          <fpage>409</fpage>
          <lpage>442</lpage>
          <pub-id pub-id-type="doi">10.34109/ijefs.202416220</pub-id>
        </element-citation>
      </ref>

      <ref id="R6">
        <element-citation publication-type="journal">
          <person-group person-group-type="author">
            <name><surname>Al-Sammarraee</surname><given-names>A.</given-names></name>
            <name><surname>Alshareeda</surname><given-names>N.</given-names></name>
          </person-group>
          <year>2021</year>
          <article-title>The role of artificial intelligence by using automatic accounting information system in supporting the quality of financial statement</article-title>
          <source>Information Sciences Letters</source>
          <volume>10</volume>
          <issue>2</issue>
          <fpage>223</fpage>
          <lpage>254</lpage>
          <pub-id pub-id-type="doi">10.18576/isl/100208</pub-id>
        </element-citation>
      </ref>

      <ref id="R7">
        <element-citation publication-type="confproc">
          <person-group person-group-type="author">
            <name><surname>Ali</surname><given-names>S. A. M.</given-names></name>
            <name><surname>Metwally</surname><given-names>A. B. M.</given-names></name>
            <name><surname>Mohamed</surname><given-names>A. T. I.</given-names></name>
          </person-group>
          <year>2024</year>
          <article-title>Enhancing AIS Reliability: Suggested Framework for the Role of Trust Service and Artificial Intelligence</article-title>
          <source>2024 ASU International Conference in Emerging Technologies for Sustainability and Intelligent Systems, ICETSIS 2024</source>
          <fpage>520</fpage>
          <lpage>525</lpage>
          <pub-id pub-id-type="doi">10.1109/ICETSIS61505.2024.10459587</pub-id>
        </element-citation>
      </ref>

      <ref id="R8">
        <element-citation publication-type="book">
          <person-group person-group-type="author">
            <name><surname>Alkan</surname><given-names>B.</given-names></name>
          </person-group>
          <year>2022</year>
          <article-title>How Blockchain and Artificial Intelligence Will Effect the Cloud-Based Accounting Information Systems?</article-title>
          <fpage>107</fpage>
          <lpage>119</lpage>
          <pub-id pub-id-type="doi">10.1007/978-981-16-8997-0_6</pub-id>
        </element-citation>
      </ref>

      <ref id="R9">
        <element-citation publication-type="journal">
          <person-group person-group-type="author">
            <name><surname>Asatiani</surname><given-names>A.</given-names></name>
            <name><surname>Penttinen</surname><given-names>E.</given-names></name>
          </person-group>
          <year>2015</year>
          <article-title>Managing the move to the cloud - analyzing the risks and opportunities of cloud-based accounting information systems</article-title>
          <source>Journal of Information Technology Teaching Cases</source>
          <volume>5</volume>
          <issue>1</issue>
          <fpage>27</fpage>
          <lpage>34</lpage>
          <pub-id pub-id-type="doi">10.1057/jittc.2015.5</pub-id>
        </element-citation>
      </ref>

      <ref id="R10">
        <element-citation publication-type="book">
          <person-group person-group-type="author">
            <name><surname>Askary</surname><given-names>S.</given-names></name>
            <name><surname>Abu-Ghazaleh</surname><given-names>N.</given-names></name>
            <name><surname>Tahat</surname><given-names>Y. A.</given-names></name>
          </person-group>
          <year>2018</year>
          <article-title>Artificial intelligence and reliability of accounting information</article-title>
          <source>Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</source>
          <volume>11195</volume>
          <fpage>315</fpage>
          <lpage>324</lpage>
          <publisher-name>Springer Verlag</publisher-name>
          <pub-id pub-id-type="doi">10.1007/978-3-030-02131-3_28</pub-id>
        </element-citation>
      </ref>

      <ref id="R11">
    <element-citation publication-type="journal">
      <person-group person-group-type="author">
        <name><surname>Awad</surname><given-names>A.</given-names></name>
        <name><surname>Akola</surname><given-names>O.</given-names></name>
        <name><surname>Amer</surname><given-names>M.</given-names></name>
        <name><surname>Mousa</surname><given-names>E. K. A.</given-names></name>
      </person-group>
      <year>2025</year>
      <article-title>Artificial intelligence in financial statement preparation: Enhancing accuracy, compliance, and corporate performance</article-title>
      <source>International Journal of Innovative Research and Scientific Studies</source>
      <volume>8</volume>
      <issue>2</issue>
      <fpage>361</fpage>
      <lpage>374</lpage>
      <pub-id pub-id-type="doi">10.53894/ijirss.v8i2.5166</pub-id>
    </element-citation>
  </ref>

  <ref id="R12">
    <element-citation publication-type="confproc">
      <person-group person-group-type="author">
        <name><surname>Bani Ahmad</surname><given-names>A. Y. A.</given-names></name>
      </person-group>
      <year>2024</year>
      <article-title>CS Challenge in Creating AI-Integrated System</article-title>
      <source>2024 4th International Conference on Advance Computing and Innovative Technologies in Engineering, ICACITE 2024</source>
      <fpage>1515</fpage>
      <lpage>1520</lpage>
      <pub-id pub-id-type="doi">10.1109/ICACITE60783.2024.10617153</pub-id>
    </element-citation>
  </ref>

  <ref id="R13">
    <element-citation publication-type="journal">
      <person-group person-group-type="author">
        <name><surname>Bani Ahmad</surname><given-names>A. Y. A.</given-names></name>
      </person-group>
      <year>2024</year>
      <article-title>Ethical implications of artificial intelligence in accounting: A framework for responsible AI adoption in multinational corporations in Jordan</article-title>
      <source>International Journal of Data and Network Science</source>
      <volume>8</volume>
      <issue>1</issue>
      <fpage>401</fpage>
      <lpage>414</lpage>
      <pub-id pub-id-type="doi">10.5267/j.ijdns.2023.9.014</pub-id>
    </element-citation>
  </ref>

  <ref id="R14">
    <element-citation publication-type="book">
      <person-group person-group-type="author">
        <name><surname>Bertolini</surname><given-names>A.</given-names></name>
      </person-group>
      <year>2024</year>
      <article-title>The European framework on the liability arising from the use of Artificial Intelligence systems and its impact on UAS</article-title>
      <source>Civil Regulation of Autonomous Unmanned Aircraft Systems in Europe</source>
      <fpage>64</fpage>
      <lpage>79</lpage>
      <publisher-name>Edward Elgar Publishing Ltd.</publisher-name>
      <pub-id pub-id-type="doi">10.4337/9781035312344.00009</pub-id>
    </element-citation>
  </ref>

  <ref id="R15">
    <element-citation publication-type="confproc">
      <person-group person-group-type="author">
        <name><surname>Bhosale</surname><given-names>K. S.</given-names></name>
        <name><surname>Ambre</surname><given-names>S.</given-names></name>
        <name><surname>Valkova-Jarvis</surname><given-names>Z.</given-names></name>
        <name><surname>Singh</surname><given-names>A.</given-names></name>
        <name><surname>Nenova</surname><given-names>M.</given-names></name>
      </person-group>
      <year>2023</year>
      <article-title>Quantum Technology: Unleashing the Power and Shaping the Future of Cybersecurity</article-title>
      <source>Proceedings of 2023 8th Junior Conference on Lighting, Lighting 2023</source>
      <pub-id pub-id-type="doi">10.1109/Lighting59819.2023.10299447</pub-id>
    </element-citation>
  </ref>

  <ref id="R16">
    <element-citation publication-type="journal">
      <person-group person-group-type="author">
        <name><surname>Cazazian</surname><given-names>R.</given-names></name>
      </person-group>
      <year>2022</year>
      <article-title>Blockchain Technology Adoption in Artificial Intelligence-based Digital Financial Services, Accounting Information Systems, and Audit Quality Control</article-title>
      <source>Review of Contemporary Philosophy</source>
      <volume>21</volume>
      <fpage>55</fpage>
      <lpage>71</lpage>
      <pub-id pub-id-type="doi">10.22381/RCP2120224</pub-id>
    </element-citation>
  </ref>

  <ref id="R17">
    <element-citation publication-type="confproc">
      <person-group person-group-type="author">
        <name><surname>Chandre</surname><given-names>P.</given-names></name>
        <name><surname>Shinde</surname><given-names>M. B.</given-names></name>
        <name><surname>Tilwant</surname><given-names>S. V.</given-names></name>
        <name><surname>Ghandat</surname><given-names>A. B.</given-names></name>
        <name><surname>Shendkar</surname><given-names>B. D.</given-names></name>
        <name><surname>Dhotre</surname><given-names>P.</given-names></name>
      </person-group>
      <year>2024</year>
      <article-title>A Deep Q-Learning Approach to Intrusion Detection and Prevention Systems: Enhancing Cybersecurity through Intelligent Adaptation</article-title>
      <source>2024 IEEE 4th International Conference on ICT in Business Industry and Government, ICTBIG 2024</source>
      <pub-id pub-id-type="doi">10.1109/ICTBIG64922.2024.10911733</pub-id>
    </element-citation>
  </ref>

  <ref id="R18">
    <element-citation publication-type="confproc">
      <person-group person-group-type="author">
        <name><surname>Chen</surname><given-names>Y.</given-names></name>
        <name><surname>Xu</surname><given-names>P.</given-names></name>
      </person-group>
      <year>2024</year>
      <article-title>The Research on Cross-enterprise Collaborative Information System Based on NGIT</article-title>
      <source>ACM International Conference Proceeding Series</source>
      <fpage>329</fpage>
      <lpage>333</lpage>
      <pub-id pub-id-type="doi">10.1145/3671151.3671211</pub-id>
    </element-citation>
  </ref>

  <ref id="R19">
    <element-citation publication-type="book">
      <person-group person-group-type="author">
        <name><surname>Clerkin</surname><given-names>B.</given-names></name>
        <name><surname>McConville</surname><given-names>D.</given-names></name>
      </person-group>
      <year>2022</year>
      <article-title>Integrating AIS and Contemporary Technologies</article-title>
      <source>The Routledge Handbook of Accounting Information Systems, Second Edition</source>
      <fpage>303</fpage>
      <lpage>317</lpage>
      <publisher-name>Taylor and Francis</publisher-name>
      <pub-id pub-id-type="doi">10.4324/9781003132943-24</pub-id>
    </element-citation>
  </ref>

  <ref id="R20">
    <element-citation publication-type="book">
      <person-group person-group-type="author">
        <name><surname>Darda</surname><given-names>P.</given-names></name>
        <name><surname>Pendse</surname><given-names>M. K.</given-names></name>
      </person-group>
      <year>2025</year>
      <article-title>The impact of artificial intelligence (AI) transformation on the financial sector from the trading to security operations</article-title>
      <source>Shaping Cutting-Edge Technologies and Applications for Digital Banking and Financial Services</source>
      <fpage>322</fpage>
      <lpage>339</lpage>
      <publisher-name>Taylor and Francis</publisher-name>
      <pub-id pub-id-type="doi">10.4324/9781003501947-20</pub-id>
    </element-citation>
  </ref>

  <ref id="R21">
    <element-citation publication-type="confproc">
      <person-group person-group-type="author">
        <name><surname>Desmal</surname><given-names>A. J.</given-names></name>
        <name><surname>Alsaeed</surname><given-names>M.</given-names></name>
        <name><surname>Hamid</surname><given-names>S.</given-names></name>
        <name><surname>Zulait</surname><given-names>A. H.</given-names></name>
      </person-group>
      <year iso-8601-date="2023">2023</year>
      <article-title>The Automated Future: How AI and Automation Are Revolutionizing Online Services</article-title>
      <conf-name>International Conference on Engineering Technologies and Applied Sciences: Shaping the Future of Technology through Smart Computing and Engineering (ICETAS 2023)</conf-name>
      <pub-id pub-id-type="doi">10.1109/ICETAS59148.2023.10346472</pub-id>
    </element-citation>
  </ref>

  <ref id="R22">
    <element-citation publication-type="confproc">
      <person-group person-group-type="author">
        <name><surname>Ding</surname><given-names>J.</given-names></name>
      </person-group>
      <year iso-8601-date="2024">2024</year>
      <article-title>Application and Optimization of Cloud Computing in Financial Management Information Systems</article-title>
      <source>Learning and Analytics in Intelligent Systems</source>
      <volume>42</volume>
      <fpage>189</fpage>
      <lpage>198</lpage>
      <pub-id pub-id-type="doi">10.1007/978-3-031-70598-4_18</pub-id>
    </element-citation>
  </ref>

  <ref id="R23">
    <element-citation publication-type="journal">
      <person-group person-group-type="author">
        <name><surname>Erb</surname><given-names>C.</given-names></name>
        <name><surname>Pelger</surname><given-names>C.</given-names></name>
      </person-group>
      <year iso-8601-date="2015">2015</year>
      <article-title>“Twisting words”? A study of the construction and reconstruction of reliability in financial reporting standard-setting</article-title>
      <source>Accounting, Organizations and Society</source>
      <volume>40</volume>
      <fpage>13</fpage>
      <lpage>40</lpage>
      <pub-id pub-id-type="doi">10.1016/j.aos.2014.11.001</pub-id>
    </element-citation>
  </ref>

  <ref id="R24">
    <element-citation publication-type="confproc">
      <person-group person-group-type="author">
        <name><surname>Felix</surname><given-names>A. Y.</given-names></name>
        <name><surname>Sharmila</surname><given-names>V.</given-names></name>
        <name><surname>Devi</surname><given-names>S. N.</given-names></name>
        <name><surname>Deena</surname><given-names>S.</given-names></name>
        <name><surname>Yadav</surname><given-names>A. S.</given-names></name>
        <name><surname>Jeyalakshmi</surname><given-names>K.</given-names></name>
      </person-group>
      <year iso-8601-date="2024">2024</year>
      <article-title>IoT based deep learning approach for online fault diagnosis against cyber attacks</article-title>
      <conf-name>Artificial Intelligence, Blockchain, Computing and Security - Proceedings of the International Conference on Artificial Intelligence, Blockchain, Computing and Security, ICABCS 2023</conf-name>
      <fpage>569</fpage>
      <lpage>573</lpage>
      <pub-id pub-id-type="doi">10.1201/9781003393580-87</pub-id>
    </element-citation>
  </ref>

  <ref id="R25">
    <element-citation publication-type="book">
      <person-group person-group-type="author">
        <name><surname>Firmansyah</surname><given-names>B.</given-names></name>
      </person-group>
      <year iso-8601-date="2024">2024</year>
      <chapter-title>Cybersecurity fundamentals</chapter-title>
      <source>Challenges in Large Language Model Development and AI Ethics</source>
      <fpage>280</fpage>
      <lpage>320</lpage>
      <publisher-name>IGI Global</publisher-name>
      <pub-id pub-id-type="doi">10.4018/979-8-3693-3860-5.ch009</pub-id>
    </element-citation>
  </ref>

  <ref id="R26">
    <element-citation publication-type="confproc">
      <person-group person-group-type="author">
        <name><surname>Gade</surname><given-names>S.</given-names></name>
        <name><surname>Rao</surname><given-names>K. M.</given-names></name>
      </person-group>
      <year iso-8601-date="2022">2022</year>
      <article-title>Adoption of Cloud Computing to Accounting: Benefits and Challenges</article-title>
      <conf-name>7th International Conference on Communication and Electronics Systems (ICCES 2022)</conf-name>
      <fpage>1652</fpage>
      <lpage>1656</lpage>
      <pub-id pub-id-type="doi">10.1109/ICCES54183.2022.9835895</pub-id>
    </element-citation>
  </ref>

  <ref id="R27">
    <element-citation publication-type="book">
      <person-group person-group-type="author">
        <name><surname>Gehlot</surname><given-names>V.</given-names></name>
        <name><surname>Rana</surname><given-names>P. S.</given-names></name>
      </person-group>
      <year iso-8601-date="2024">2024</year>
      <chapter-title>AI in Mechatronics</chapter-title>
      <source>Computational Intelligent Techniques in Mechatronics</source>
      <fpage>1</fpage>
      <lpage>39</lpage>
      <publisher-name>Wiley</publisher-name>
      <pub-id pub-id-type="doi">10.1002/9781394175437.ch1</pub-id>
    </element-citation>
  </ref>

  <ref id="R28">
    <element-citation publication-type="journal">
      <person-group person-group-type="author">
        <name><surname>Gopalsamy</surname><given-names>S.</given-names></name>
        <name><surname>Karthick</surname><given-names>A. V.</given-names></name>
      </person-group>
      <year iso-8601-date="2019">2019</year>
      <article-title>Security enhancement of online accounting data from cyber attacks</article-title>
      <source>International Journal of Recent Technology and Engineering</source>
      <volume>8</volume>
      <issue>2 Special Issue 10</issue>
      <fpage>427</fpage>
      <lpage>431</lpage>
      <pub-id pub-id-type="doi">10.35940/ijrte.B1071.0982S1019</pub-id>
    </element-citation>
  </ref>

  <ref id="R29">
    <element-citation publication-type="journal">
      <person-group person-group-type="author">
        <name><surname>Ibrahim</surname><given-names>M.</given-names></name>
        <name><surname>Arabi</surname><given-names>A. J.</given-names></name>
        <name><surname>Gurama</surname><given-names>Z.</given-names></name>
      </person-group>
      <year iso-8601-date="2024">2024</year>
      <article-title>Corporate attributes, audit committee and financial reporting quality of listed non-financial firms in Nigeria</article-title>
      <source>SN Business and Economics</source>
      <volume>4</volume>
      <issue>11</issue>
      <pub-id pub-id-type="doi">10.1007/s43546-024-00719-1</pub-id>
    </element-citation>
  </ref>

  <ref id="R30">
    <element-citation publication-type="journal">
      <person-group person-group-type="author">
        <name><surname>Ionescu</surname><given-names>L.</given-names></name>
      </person-group>
      <year iso-8601-date="2021">2021</year>
      <article-title>Big Data Analytics Tools and Machine Learning Algorithms in Cloud-based Accounting Information Systems</article-title>
      <source>Analysis and Metaphysics</source>
      <volume>20</volume>
      <fpage>102</fpage>
      <lpage>115</lpage>
      <pub-id pub-id-type="doi">10.22381/am2020217</pub-id>
    </element-citation>
  </ref>

  <ref id="R31">
  <element-citation publication-type="journal">
    <person-group person-group-type="author">
      <name><surname>Ionescu</surname><given-names>L.</given-names></name>
    </person-group>
    <year>2022</year>
    <article-title>Big Data Algorithms and Artificial Intelligence Technologies in Cloud-based Accounting Information Systems</article-title>
    <source>Analysis and Metaphysics</source>
    <volume>21</volume>
    <fpage>42</fpage>
    <lpage>57</lpage>
    <pub-id pub-id-type="doi">10.22381/AM2120223</pub-id>
  </element-citation>
</ref>

<ref id="R32">
  <element-citation publication-type="journal">
    <person-group person-group-type="author">
      <name><surname>Jagatheesaperumal</surname><given-names>S. K.</given-names></name>
      <name><surname>Rahouti</surname><given-names>M.</given-names></name>
      <name><surname>Ahmad</surname><given-names>K.</given-names></name>
      <name><surname>Al-Fuqaha</surname><given-names>A.</given-names></name>
      <name><surname>Guizani</surname><given-names>M.</given-names></name>
    </person-group>
    <year>2022</year>
    <article-title>The Duo of Artificial Intelligence and Big Data for Industry 4.0: Applications, Techniques, Challenges, and Future Research Directions</article-title>
    <source>IEEE Internet of Things Journal</source>
    <volume>9</volume>
    <issue>15</issue>
    <fpage>12861</fpage>
    <lpage>12885</lpage>
    <pub-id pub-id-type="doi">10.1109/JIOT.2021.3139827</pub-id>
  </element-citation>
</ref>

<ref id="R33">
  <element-citation publication-type="confproc">
    <person-group person-group-type="author">
      <name><surname>Jindal</surname><given-names>S.</given-names></name>
      <name><surname>Sharma</surname><given-names>A.</given-names></name>
      <name><surname>Joshi</surname><given-names>A.</given-names></name>
      <name><surname>Gupta</surname><given-names>M.</given-names></name>
    </person-group>
    <year>2021</year>
    <article-title>Artificial intelligence fuelling the health care</article-title>
    <source>Lecture Notes in Networks and Systems</source>
    <volume>140</volume>
    <fpage>501</fpage>
    <lpage>507</lpage>
    <publisher-name>Springer Science and Business Media Deutschland GmbH</publisher-name>
    <pub-id pub-id-type="doi">10.1007/978-981-15-7130-5_40</pub-id>
  </element-citation>
</ref>

<ref id="R34">
  <element-citation publication-type="journal">
    <person-group person-group-type="author">
      <name><surname>Kamila</surname><given-names>M. K.</given-names></name>
      <name><surname>Jasrotia</surname><given-names>S. S.</given-names></name>
    </person-group>
    <year>2025</year>
    <article-title>Ethical issues in the development of artificial intelligence: recognizing the risks</article-title>
    <source>International Journal of Ethics and Systems</source>
    <volume>41</volume>
    <issue>1</issue>
    <fpage>45</fpage>
    <lpage>63</lpage>
    <pub-id pub-id-type="doi">10.1108/IJOES-05-2023-0107</pub-id>
  </element-citation>
</ref>

<ref id="R35">
  <element-citation publication-type="confproc">
    <person-group person-group-type="author">
      <name><surname>Kapoor</surname><given-names>M.</given-names></name>
      <name><surname>Aggarwal</surname><given-names>R.</given-names></name>
      <name><surname>Madan</surname><given-names>S.</given-names></name>
    </person-group>
    <year>2024</year>
    <article-title>Cyber-Security: Critical Analysis on Attacks, Classification, and Issues</article-title>
    <source>Lecture Notes in Networks and Systems</source>
    <volume>1020</volume>
    <fpage>495</fpage>
    <lpage>510</lpage>
    <publisher-name>Springer Science and Business Media Deutschland GmbH</publisher-name>
    <pub-id pub-id-type="doi">10.1007/978-981-97-3588-4_40</pub-id>
  </element-citation>
</ref>

<ref id="R36">
  <element-citation publication-type="book">
    <person-group person-group-type="author">
      <name><surname>Khoruzhy</surname><given-names>L. I.</given-names></name>
      <name><surname>Katkov</surname><given-names>Y. N.</given-names></name>
      <name><surname>Romanova</surname><given-names>A. A.</given-names></name>
    </person-group>
    <year>2023</year>
    <chapter-title>Cloud Technologies in the Accounting Information System of Interorganizational Cooperation</chapter-title>
    <source>Innovation, Technology and Knowledge Management</source>
    <fpage>25</fpage>
    <lpage>37</lpage>
    <publisher-name>Springer</publisher-name>
    <pub-id pub-id-type="doi">10.1007/978-3-031-13913-0_4</pub-id>
  </element-citation>
</ref>

<ref id="R37">
  <element-citation publication-type="journal">
    <person-group person-group-type="author">
      <name><surname>Kim</surname><given-names>K.</given-names></name>
      <name><surname>Park</surname><given-names>C.</given-names></name>
      <name><surname>Lee</surname><given-names>W.</given-names></name>
      <name><surname>Kim</surname><given-names>S.</given-names></name>
      <name><surname>Seok</surname><given-names>W.</given-names></name>
    </person-group>
    <year>2019</year>
    <article-title>Large-scale threat traffic analysis and IDS development using software</article-title>
    <source>International Journal of Innovative Technology and Exploring Engineering</source>
    <volume>8</volume>
    <issue>3</issue>
    <fpage>346</fpage>
    <lpage>350</lpage>
    <pub-id pub-id-type="uri">https://www.scopus.com/inward/record.uri?eid=2-s2.0-85064673367&amp;partnerID=40&amp;md5=30d910deee2719fb4a94898474bec367</pub-id>
  </element-citation>
</ref>

<ref id="R38">
  <element-citation publication-type="confproc">
    <person-group person-group-type="author">
      <name><surname>Kuaiber</surname><given-names>M. Q.</given-names></name>
      <name><surname>Ali</surname><given-names>Z. N.</given-names></name>
      <name><surname>Al-Yasiri</surname><given-names>A. J.</given-names></name>
      <name><surname>Kareem</surname><given-names>A. J.</given-names></name>
      <name><surname>Ali</surname><given-names>M. A.</given-names></name>
      <name><surname>Almagtome</surname><given-names>A.</given-names></name>
    </person-group>
    <year>2024</year>
    <article-title>Automation and the Future of Accounting: A Study of AI Integration in Financial Reporting</article-title>
    <source>2024 International Conference on Knowledge Engineering and Communication Systems (ICKECS 2024)</source>
    <pub-id pub-id-type="doi">10.1109/ICKECS61492.2024.10616967</pub-id>
  </element-citation>
</ref>

<ref id="R39">
  <element-citation publication-type="confproc">
    <person-group person-group-type="author">
      <name><surname>Kumar Jain</surname><given-names>Y.</given-names></name>
      <name><surname>Dhaarna Singh Rathore</surname><given-names>C. A.</given-names></name>
      <name><surname>Johrawanshi</surname><given-names>A.</given-names></name>
      <name><surname>Gupta</surname><given-names>M.</given-names></name>
      <name><surname>Choudhary</surname><given-names>D. K.</given-names></name>
      <name><surname>Pandey</surname><given-names>A.</given-names></name>
    </person-group>
    <year>2024</year>
    <article-title>Cybersecurity Frameworks: A Roadmap for Business Resilience</article-title>
    <source>2024 International Conference on Cybernation and Computation (CYBERCOM 2024)</source>
    <fpage>102</fpage>
    <lpage>108</lpage>
    <pub-id pub-id-type="doi">10.1109/CYBERCOM63683.2024.10803234</pub-id>
  </element-citation>
</ref>

<ref id="R40">
  <element-citation publication-type="confproc">
    <person-group person-group-type="author">
      <name><surname>Kumar</surname><given-names>K.</given-names></name>
      <name><surname>Mandoria</surname><given-names>H. L.</given-names></name>
    </person-group>
    <year>2024</year>
    <article-title>Cybersecurity Threats, Forensics, and Challenges</article-title>
    <source>Lecture Notes in Electrical Engineering</source>
    <volume>1220</volume>
    <fpage>281</fpage>
    <lpage>295</lpage>
    <publisher-name>Springer Science and Business Media Deutschland GmbH</publisher-name>
    <pub-id pub-id-type="doi">10.1007/978-981-97-4650-7_21</pub-id>
  </element-citation>
</ref>

<ref id="R41">
  <element-citation publication-type="journal">
    <person-group person-group-type="author">
      <name><surname>Lacmanovic</surname><given-names>S.</given-names></name>
      <name><surname>Skare</surname><given-names>M.</given-names></name>
    </person-group>
    <year>2025</year>
    <article-title>Artificial intelligence bias auditing – current approaches, challenges and lessons from practice</article-title>
    <source>Review of Accounting and Finance</source>
    <pub-id pub-id-type="doi">10.1108/RAF-01-2025-0006</pub-id>
  </element-citation>
</ref>

<ref id="R42">
  <element-citation publication-type="journal">
    <person-group person-group-type="author">
      <name><surname>Lai</surname><given-names>C. Y.</given-names></name>
      <name><surname>Li</surname><given-names>Y.</given-names></name>
      <name><surname>Shan</surname><given-names>Y.</given-names></name>
      <name><surname>Taylor</surname><given-names>S.</given-names></name>
    </person-group>
    <year>2013</year>
    <article-title>Costs of mandatory international financial reporting standards: Evidence of reduced accrual reliability</article-title>
    <source>Australian Journal of Management</source>
    <volume>38</volume>
    <issue>3</issue>
    <fpage>491</fpage>
    <lpage>521</lpage>
    <pub-id pub-id-type="doi">10.1177/0312896213511089</pub-id>
  </element-citation>
</ref>

<ref id="R43">
  <element-citation publication-type="book">
    <person-group person-group-type="author">
      <name><surname>Lugovsky</surname><given-names>D.</given-names></name>
      <name><surname>Kuter</surname><given-names>M.</given-names></name>
    </person-group>
    <year>2020</year>
    <chapter-title>Accounting Policies, Accounting Estimates and Its Role in the Preparation of Fair Financial Statements in Digital Economy</chapter-title>
    <source>Lecture Notes in Networks and Systems</source>
    <volume>78</volume>
    <fpage>165</fpage>
    <lpage>176</lpage>
    <publisher-name>Springer</publisher-name>
    <pub-id pub-id-type="doi">10.1007/978-3-030-22493-6_15</pub-id>
  </element-citation>
</ref>

<ref id="R44">
  <element-citation publication-type="journal">
    <person-group person-group-type="author">
      <name><surname>Lustrilanang</surname><given-names>P.</given-names></name>
      <name><surname>Arif</surname><given-names>B.</given-names></name>
      <name><surname>Subowo</surname><given-names>H.</given-names></name>
    </person-group>
    <year>2023</year>
    <article-title>The effect of auditing quality and internal control on financial resilience in public sector organizations: Information quality as the mediating factor</article-title>
    <source>International Journal of Data and Network Science</source>
    <volume>7</volume>
    <issue>4</issue>
    <fpage>1573</fpage>
    <lpage>1580</lpage>
    <pub-id pub-id-type="doi">10.5267/j.ijdns.2023.8.006</pub-id>
  </element-citation>
</ref>

<ref id="R45">
  <element-citation publication-type="journal">
    <person-group person-group-type="author">
      <name><surname>Lutfi</surname><given-names>A.</given-names></name>
    </person-group>
    <year>2022</year>
    <article-title>Understanding the Intention to Adopt Cloud-based Accounting Information System in Jordanian SMEs</article-title>
    <source>International Journal of Digital Accounting Research</source>
    <volume>22</volume>
    <fpage>47</fpage>
    <lpage>70</lpage>
    <pub-id pub-id-type="doi">10.4192/1577-8517-v22_2</pub-id>
  </element-citation>
</ref>

<ref id="R46">
  <element-citation publication-type="journal">
    <person-group person-group-type="author">
      <name><surname>Maines</surname><given-names>L. A.</given-names></name>
      <name><surname>Wahlen</surname><given-names>J. M.</given-names></name>
    </person-group>
    <year>2006</year>
    <article-title>The nature of accounting information reliability: Inferences from archival and experimental research</article-title>
    <source>Accounting Horizons</source>
    <volume>20</volume>
    <issue>4</issue>
    <fpage>399</fpage>
    <lpage>425</lpage>
    <pub-id pub-id-type="doi">10.2308/acch.2006.20.4.399</pub-id>
  </element-citation>
</ref>

<ref id="R47">
  <element-citation publication-type="journal">
    <person-group person-group-type="author">
      <name><surname>Malasowe</surname><given-names>B. O.</given-names></name>
      <name><surname>Aghware</surname><given-names>F. O.</given-names></name>
      <name><surname>Okpor</surname><given-names>M. D.</given-names></name>
      <name><surname>Edim</surname><given-names>E. B.</given-names></name>
      <name><surname>Ako</surname><given-names>R. E.</given-names></name>
      <name><surname>Ojugo</surname><given-names>A. A.</given-names></name>
    </person-group>
    <year>2024</year>
    <article-title>Techniques and Best Practices for Handling Cybersecurity Risks in Educational Technology Environment (EdTech)</article-title>
    <source>NIPES - Journal of Science and Technology Research</source>
    <volume>6</volume>
    <issue>2</issue>
    <fpage>293</fpage>
    <lpage>311</lpage>
    <pub-id pub-id-type="doi">10.5281/zenodo.12617068</pub-id>
  </element-citation>
</ref>

<ref id="R48">
  <element-citation publication-type="journal">
    <person-group person-group-type="author">
      <name><surname>Mauri</surname><given-names>L.</given-names></name>
      <name><surname>Damiani</surname><given-names>E.</given-names></name>
    </person-group>
    <year>2022</year>
    <article-title>Modeling Threats to AI-ML Systems Using STRIDE †</article-title>
    <source>Sensors</source>
    <volume>22</volume>
    <issue>17</issue>
    <pub-id pub-id-type="doi">10.3390/s22176662</pub-id>
  </element-citation>
</ref>

<ref id="R49">
  <element-citation publication-type="book">
    <person-group person-group-type="author">
      <name><surname>Meher</surname><given-names>A.</given-names></name>
    </person-group>
    <year>2024</year>
    <chapter-title>Revolution ethics of data science and AI</chapter-title>
    <source>The Ethical Frontier of AI and Data Analysis</source>
    <fpage>245</fpage>
    <lpage>256</lpage>
    <publisher-name>IGI Global</publisher-name>
    <pub-id pub-id-type="doi">10.4018/979-8-3693-2964-1.ch015</pub-id>
  </element-citation>
</ref>

<ref id="R50">
  <element-citation publication-type="book">
    <person-group person-group-type="author">
      <name><surname>Minz</surname><given-names>N. K.</given-names></name>
    </person-group>
    <year>2024</year>
    <chapter-title>Ethical considerations in AI applications in finance: Frameworks, transparency, accountability, and case studies</chapter-title>
    <source>Risks and Challenges of AI-Driven Finance: Bias, Ethics, and Security</source>
    <fpage>277</fpage>
    <lpage>290</lpage>
    <publisher-name>IGI Global</publisher-name>
    <pub-id pub-id-type="doi">10.4018/979-8-3693-2185-0.ch012</pub-id>
  </element-citation>
</ref>

<ref id="R51">
    <element-citation publication-type="book">
      <person-group person-group-type="author">
        <name><surname>Moreira</surname><given-names>N. A.</given-names></name>
        <name><surname>Freitas</surname><given-names>P. M.</given-names></name>
        <name><surname>Novais</surname><given-names>P.</given-names></name>
      </person-group>
      <year iso-8601-date="2025">2025</year>
      <chapter-title>Towards Transparent AI: How will the AI Act Shape the Future?</chapter-title>
      <person-group person-group-type="editor">
        <name><surname>S.</surname><given-names>M.F.</given-names></name>
        <name><surname>M.</surname><given-names>J.</given-names></name>
        <name><surname>N.</surname><given-names>P.</given-names></name>
        <name><surname>C.</surname><given-names>P.</given-names></name>
        <name><surname>M.</surname><given-names>P.M.</given-names></name>
      </person-group>
      <source>Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</source>
      <volume>14967 LNAI</volume>
      <fpage>296</fpage>
      <lpage>307</lpage>
      <publisher-name>Springer Science and Business Media Deutschland GmbH</publisher-name>
      <pub-id pub-id-type="doi">10.1007/978-3-031-73497-7_24</pub-id>
    </element-citation>
  </ref>

  <ref id="R52">
    <element-citation publication-type="journal">
      <person-group person-group-type="author">
        <name><surname>Mustafa</surname><given-names>F. M.</given-names></name>
        <name><surname>Salman</surname><given-names>A. S.</given-names></name>
        <name><surname>Shukur</surname><given-names>M.</given-names></name>
        <name><surname>Al-Nuiami</surname><given-names>S. A. W. A. R.</given-names></name>
      </person-group>
      <year iso-8601-date="2024">2024</year>
      <article-title>Strategies for Strengthening Security in Accounting Information Systems</article-title>
      <source>Journal of Ecohumanism</source>
      <volume>3</volume>
      <issue>5</issue>
      <fpage>293</fpage>
      <lpage>315</lpage>
      <pub-id pub-id-type="doi">10.62754/joe.v3i5.3902</pub-id>
    </element-citation>
  </ref>

  <ref id="R53">
    <element-citation publication-type="book">
      <person-group person-group-type="author">
        <name><surname>Noordin</surname><given-names>N. A.</given-names></name>
        <name><surname>Hayek</surname><given-names>A.</given-names></name>
        <name><surname>Sejdini</surname><given-names>M.</given-names></name>
        <name><surname>Humaid</surname><given-names>A.</given-names></name>
        <name><surname>Sultan</surname><given-names>N.</given-names></name>
        <name><surname>Abdulla</surname><given-names>B.</given-names></name>
        <name><surname>Yousif</surname><given-names>M.</given-names></name>
      </person-group>
      <year iso-8601-date="2024">2024</year>
      <chapter-title>Financial Information Quality: Analysis of Cloud Accounting Adoption on UAE Firms</chapter-title>
      <source>Lecture Notes in Operations Research</source>
      <volume>Part F3798</volume>
      <fpage>325</fpage>
      <lpage>340</lpage>
      <publisher-name>Springer Nature</publisher-name>
      <pub-id pub-id-type="doi">10.1007/978-3-031-61589-4_25</pub-id>
    </element-citation>
  </ref>

  <ref id="R54">
    <element-citation publication-type="book">
      <person-group person-group-type="author">
        <name><surname>Paliwal</surname><given-names>M.</given-names></name>
      </person-group>
      <year iso-8601-date="2023">2023</year>
      <chapter-title>A review on cyber security</chapter-title>
      <person-group person-group-type="editor">
        <name><surname>A.</surname><given-names>R.</given-names></name>
        <name><surname>S.</surname><given-names>R.</given-names></name>
        <name><surname>G.</surname><given-names>T.K.</given-names></name>
        <name><surname>M.</surname><given-names>N.K.</given-names></name>
        <name><surname>T.</surname><given-names>A.</given-names></name>
        <name><surname>A.</surname><given-names>null</given-names></name>
      </person-group>
      <source>AIP Conference Proceedings</source>
      <volume>2427</volume>
      <publisher-name>American Institute of Physics Inc.</publisher-name>
      <pub-id pub-id-type="doi">10.1063/5.0101190</pub-id>
    </element-citation>
  </ref>

  <ref id="R55">
    <element-citation publication-type="journal">
      <person-group person-group-type="author">
        <name><surname>Quoc</surname><given-names>T. N. K.</given-names></name>
        <name><surname>Hong</surname><given-names>V. T.</given-names></name>
        <name><surname>Van</surname><given-names>T. L.</given-names></name>
        <name><surname>Minh</surname><given-names>H. N.</given-names></name>
        <name><surname>Ngoc</surname><given-names>O. N. T.</given-names></name>
      </person-group>
      <year iso-8601-date="2024">2024</year>
      <article-title>Financial Statements’ Reliability Affects Firms’ Performance: A Case of Vietnam</article-title>
      <source>Journal of Eastern European and Central Asian Research</source>
      <volume>11</volume>
      <issue>1</issue>
      <fpage>143</fpage>
      <lpage>155</lpage>
      <pub-id pub-id-type="doi">10.15549/jeecar.v11i1.1432</pub-id>
    </element-citation>
  </ref>

  <ref id="R56">
    <element-citation publication-type="journal">
      <person-group person-group-type="author">
        <name><surname>Qureshi</surname><given-names>K.</given-names></name>
        <name><surname>Sadeq</surname><given-names>S. H.</given-names></name>
        <name><surname>Manuel</surname><given-names>P.</given-names></name>
      </person-group>
      <year iso-8601-date="2024">2024</year>
      <article-title>Analysis of Security Challenges in Cloud Computing Adoption for the Banking Sector</article-title>
      <source>International Journal of Computers and Their Applications</source>
      <volume>31</volume>
      <issue>4</issue>
      <fpage>308</fpage>
      <lpage>320</lpage>
      <ext-link ext-link-type="uri">https://www.scopus.com/inward/record.uri?eid=2-s2.0-85215948301&amp;partnerID=40&amp;md5=ddf11d09d203cac2a4998f711e2ce5b9</ext-link>
    </element-citation>
  </ref>

  <ref id="R57">
    <element-citation publication-type="book">
      <person-group person-group-type="author">
        <name><surname>Rahahleh</surname><given-names>M. H.</given-names></name>
        <name><surname>Hamzah</surname><given-names>A. H. B.</given-names></name>
        <name><surname>Rashid</surname><given-names>N.</given-names></name>
      </person-group>
      <year iso-8601-date="2021">2021</year>
      <chapter-title>The Artificial Intelligence in the Audit on Reliability of Accounting Information and Earnings Manipulation Detection</chapter-title>
      <source>Studies in Computational Intelligence</source>
      <volume>974</volume>
      <fpage>315</fpage>
      <lpage>323</lpage>
      <publisher-name>Springer Science and Business Media Deutschland GmbH</publisher-name>
      <pub-id pub-id-type="doi">10.1007/978-3-030-73057-4_24</pub-id>
    </element-citation>
  </ref>

  <ref id="R58">
    <element-citation publication-type="journal">
      <person-group person-group-type="author">
        <name><surname>Rodriguez-Barboza</surname><given-names>J. R.</given-names></name>
        <name><surname>Carreño-Flores</surname><given-names>O. D.</given-names></name>
        <name><surname>Davila-Zamora</surname><given-names>L. M.</given-names></name>
        <name><surname>Jalixto-Erazo</surname><given-names>H. M.</given-names></name>
        <name><surname>Santos</surname><given-names>M. A. O.</given-names></name>
        <name><surname>Cruces-Torres</surname><given-names>O. J.</given-names></name>
        <name><surname>Ruiz-Villavicencio</surname><given-names>R. E.</given-names></name>
        <name><surname>Villegas-Rivas</surname><given-names>D.</given-names></name>
      </person-group>
      <year iso-8601-date="2024">2024</year>
      <article-title>Posthumanist Technologies in Business: AI and Cloud Computing for Global Optimization and Ethical Challenges</article-title>
      <source>Advance Sustainable Science, Engineering and Technology</source>
      <volume>6</volume>
      <issue>4</issue>
      <pub-id pub-id-type="doi">10.26877/asset.v6i4.1064</pub-id>
    </element-citation>
  </ref>

  <ref id="R59">
    <element-citation publication-type="confproc">
      <person-group person-group-type="author">
        <name><surname>Ruissalo</surname><given-names>J.</given-names></name>
        <name><surname>Penttinen</surname><given-names>E.</given-names></name>
        <name><surname>Asatiani</surname><given-names>A.</given-names></name>
      </person-group>
      <year iso-8601-date="2022">2022</year>
      <article-title>Fluid Socio-Technical (Trans)formation of an AI system</article-title>
      <person-group person-group-type="editor">
        <name><surname>B.</surname><given-names>T.X.</given-names></name>
      </person-group>
      <source>Proceedings of the Annual Hawaii International Conference on System Sciences</source>
      <volume>2022-Janua</volume>
      <fpage>6964</fpage>
      <lpage>6973</lpage>
      <publisher-name>IEEE Computer Society</publisher-name>
      <ext-link ext-link-type="uri">https://www.scopus.com/inward/record.uri?eid=2-s2.0-85152238883&amp;partnerID=40&amp;md5=5a6509a17d8081fe11725a58050d8e8f</ext-link>
    </element-citation>
  </ref>

  <ref id="R60">
    <element-citation publication-type="book">
      <person-group person-group-type="author">
        <name><surname>Sethy</surname><given-names>A.</given-names></name>
        <name><surname>Shaik</surname><given-names>N.</given-names></name>
        <name><surname>Yadavalli</surname><given-names>P. K.</given-names></name>
        <name><surname>Anandaraj</surname><given-names>S. P.</given-names></name>
      </person-group>
      <year iso-8601-date="2023">2023</year>
      <chapter-title>AI: Issues, concerns, and ethical considerations</chapter-title>
      <source>Toward Artificial General Intelligence: Deep Learning, Neural Networks, Generative AI</source>
      <fpage>189</fpage>
      <lpage>211</lpage>
      <publisher-name>De Gruyter</publisher-name>
      <pub-id pub-id-type="doi">10.1515/9783111323749-009</pub-id>
    </element-citation>
  </ref>

  <ref id="R61">
  <element-citation publication-type="book">
    <person-group person-group-type="author">
      <name><surname>Shakdwipee</surname><given-names>P.</given-names></name>
      <name><surname>Agarwal</surname><given-names>K.</given-names></name>
      <name><surname>Kunwar</surname><given-names>H.</given-names></name>
      <name><surname>Singh</surname><given-names>S.</given-names></name>
    </person-group>
    <year>2023</year>
    <chapter-title>Artificial Intelligence in Finance and Accounting: Opportunities and Challenges</chapter-title>
    <editor><surname>T.</surname></editor>
    <editor><surname>A.</surname></editor>
    <editor><surname>J.</surname></editor>
    <source>Lecture Notes in Networks and Systems</source>
    <volume>765 LNNS</volume>
    <fpage>165</fpage>
    <lpage>177</lpage>
    <publisher-name>Springer Science and Business Media Deutschland GmbH</publisher-name>
    <pub-id pub-id-type="doi">10.1007/978-981-99-5652-4_17</pub-id>
  </element-citation>
</ref>

<ref id="R62">
  <element-citation publication-type="journal">
    <person-group person-group-type="author">
      <name><surname>Shchyrba</surname><given-names>I.</given-names></name>
      <name><surname>Lagovska</surname><given-names>O.</given-names></name>
      <name><surname>Demianyshyna</surname><given-names>O.</given-names></name>
      <name><surname>Myronchuk</surname><given-names>Z.</given-names></name>
      <name><surname>Shebeshten</surname><given-names>E.</given-names></name>
    </person-group>
    <year>2025</year>
    <article-title>Regulatory Challenges and Cybersecurity Approaches in Cloud-Based Accounting Systems</article-title>
    <source>Journal of Information Systems Engineering and Management</source>
    <volume>10</volume>
    <fpage>443</fpage>
    <lpage>452</lpage>
  </element-citation>
</ref>

<ref id="R63">
  <element-citation publication-type="confproc">
    <person-group person-group-type="author">
      <name><surname>Shinde</surname><given-names>S. S.</given-names></name>
      <name><surname>Kale</surname><given-names>G. M.</given-names></name>
      <name><surname>Nalbalwar</surname><given-names>S. L.</given-names></name>
      <name><surname>Deosarkar</surname><given-names>S. B.</given-names></name>
    </person-group>
    <year>2024</year>
    <article-title>Navigating the Cyber Battlefield: Understanding Threats and Safeguarding Digital Frontiers</article-title>
    <source>2024 International Conference on Electrical, Electronics and Computing Technologies (ICEECT 2024)</source>
    <pub-id pub-id-type="doi">10.1109/ICEECT61758.2024.10739310</pub-id>
  </element-citation>
</ref>

<ref id="R64">
  <element-citation publication-type="journal">
    <person-group person-group-type="author">
      <name><surname>Thaher</surname><given-names>M. S.</given-names></name>
    </person-group>
    <year>2024</year>
    <article-title>Cloud Computing: Enhancing or Compromising Accounting Data Reliability and Credibility</article-title>
    <source>International Journal of Advanced Computer Science and Applications</source>
    <volume>15</volume>
    <issue>12</issue>
    <fpage>159</fpage>
    <lpage>164</lpage>
    <pub-id pub-id-type="doi">10.14569/IJACSA.2024.0151217</pub-id>
  </element-citation>
</ref>

<ref id="R65">
  <element-citation publication-type="confproc">
    <person-group person-group-type="author">
      <name><surname>Tiwari</surname><given-names>M.</given-names></name>
      <name><surname>Tiwari</surname><given-names>T.</given-names></name>
      <name><surname>Ticku</surname><given-names>A.</given-names></name>
      <name><surname>Dadhwal</surname><given-names>H.</given-names></name>
      <name><surname>Singh</surname><given-names>T.</given-names></name>
    </person-group>
    <year>2023</year>
    <article-title>Methodologies and Challenges of Cybersecurity Techniques in Cloud Computing Environment</article-title>
    <source>ACM International Conference Proceeding Series</source>
    <publisher-name>Association for Computing Machinery</publisher-name>
    <pub-id pub-id-type="doi">10.1145/3647444.3652492</pub-id>
  </element-citation>
</ref>

<ref id="R66">
  <element-citation publication-type="journal">
    <person-group person-group-type="author">
      <name><surname>Türegün</surname><given-names>N.</given-names></name>
    </person-group>
    <year>2025</year>
    <article-title>Challenges and Opportunities: Integrating AI Into Accounting Systems</article-title>
    <source>Journal of Corporate Accounting and Finance</source>
    <pub-id pub-id-type="doi">10.1002/jcaf.22788</pub-id>
  </element-citation>
</ref>

<ref id="R67">
  <element-citation publication-type="journal">
    <person-group person-group-type="author">
      <name><surname>Twyford</surname><given-names>E. J.</given-names></name>
      <name><surname>Abbas</surname><given-names>R.</given-names></name>
    </person-group>
    <year>2023</year>
    <article-title>Broadening the boundaries of accounting: a call for interdisciplinarity in the calculative era</article-title>
    <source>Meditari Accountancy Research</source>
    <volume>31</volume>
    <issue>1</issue>
    <fpage>187</fpage>
    <lpage>211</lpage>
    <pub-id pub-id-type="doi">10.1108/MEDAR-06-2021-1338</pub-id>
  </element-citation>
</ref>

<ref id="R68">
  <element-citation publication-type="journal">
    <person-group person-group-type="author">
      <name><surname>Ullah</surname><given-names>M. W.</given-names></name>
      <name><surname>Alam</surname><given-names>M. T.</given-names></name>
      <name><surname>Sultana</surname><given-names>T.</given-names></name>
      <name><surname>Rahman</surname><given-names>M. M.</given-names></name>
      <name><surname>Faraji</surname><given-names>M. R.</given-names></name>
      <name><surname>Ahmed</surname><given-names>M. F.</given-names></name>
    </person-group>
    <year>2024</year>
    <article-title>A systematic review on information security policies in the USA banking system and global banking: Risks, rewards, and future trends</article-title>
    <source>Edelweiss Applied Science and Technology</source>
    <volume>8</volume>
    <issue>6</issue>
    <fpage>8437</fpage>
    <lpage>8453</lpage>
    <pub-id pub-id-type="doi">10.55214/25768484.v8i6.3816</pub-id>
  </element-citation>
</ref>

<ref id="R69">
  <element-citation publication-type="journal">
    <person-group person-group-type="author">
      <name><surname>Vo Van</surname><given-names>H.</given-names></name>
      <name><surname>Abu Afifa</surname><given-names>M.</given-names></name>
      <name><surname>Saleh</surname><given-names>I.</given-names></name>
    </person-group>
    <year>2024</year>
    <article-title>Accounting information systems and organizational performance in the cloud computing era: evidence from SMEs</article-title>
    <source>Sustainability Accounting, Management and Policy Journal</source>
    <pub-id pub-id-type="doi">10.1108/SAMPJ-01-2024-0044</pub-id>
  </element-citation>
</ref>

<ref id="R70">
  <element-citation publication-type="journal">
    <person-group person-group-type="author">
      <name><surname>Wahhab</surname><given-names>A.</given-names></name>
      <name><surname>Alkhafaji</surname><given-names>B. K. A.</given-names></name>
      <name><surname>Raji</surname><given-names>S. M.</given-names></name>
    </person-group>
    <year>2024</year>
    <article-title>The significance of cloud accounting implementing and its influence on enhancing the quality of financial reporting: Evidence from emerging markets</article-title>
    <source>Financial and Credit Activity: Problems of Theory and Practice</source>
    <volume>1</volume>
    <issue>54</issue>
    <fpage>146</fpage>
    <lpage>159</lpage>
    <pub-id pub-id-type="doi">10.55643/fcaptp.1.54.2024.4293</pub-id>
  </element-citation>
</ref>

<ref id="R80">
  <element-citation publication-type="confproc">
    <person-group person-group-type="author">
      <name>
        <surname>Xi</surname>
        <given-names>S. N.</given-names>
      </name>
      <name>
        <surname>Yee</surname>
        <given-names>T. P.</given-names>
      </name>
      <name>
        <surname>Nair</surname>
        <given-names>R. K.</given-names>
      </name>
    </person-group>
    <year iso-8601-date="2019">2019</year>
    <article-title>Factors affect the audit quality of external auditor at Klang Valley</article-title>
    <source>ACM International Conference Proceeding Series</source>
    <fpage>18</fpage>
    <lpage>23</lpage>
    <pub-id pub-id-type="doi">10.1145/3377817.3377821</pub-id>
  </element-citation>
</ref>

    </ref-list>
  </back>
</article>
