[
Abad-Segura, E., Infante-Moro, A., González-Zamar, M. D., & López-Meneses, E. (2024). Influential Factors For A Secure Perception Of Accounting Management With Blockchain Technology. Journal of Open Innovation: Technology, Market, and Complexity, 100264. https://doi.org/10.1016/j.joitmc.2024.100264
]Search in Google Scholar
[
Abdelhalim, A. M. (2024). How management accounting practices integrate with big data analytics and its impact on corporate sustainability. Journal of Financial Reporting and Accounting, 22(2), 416-432. https://doi.org/10.1108/JFRA-01-2023-0053
]Search in Google Scholar
[
Abu Huson, Y., Sierra-García, L., & Garcia-Benau, M. A. (2024). A bibliometric review of information technology, artificial intelligence, and blockchain on auditing. Total Quality Management & Business Excellence, 35(1-2), 91-113. https://doi.org/10.1080/14783363.2023.2256260
]Search in Google Scholar
[
Adeyeri, T. B. (2024). Automating Accounting Processes: How AI is Streamlining Financial Reporting. Journal of Artificial Intelligence Research, 4(1), 72-90. https://thesciencebrigade.com/JAIR/article/view/166
]Search in Google Scholar
[
Ahmad, A. Y. B. (2024). Firm Determinants that Influences Implementation of Accounting Technologies in Business Organizations. WSEAS Transactions on Business and Economics, 21, 1-11. https://doi.org/10.37394/23207.2024.21.1
]Search in Google Scholar
[
Ahmad, A., El-Dalahmeh, S., Al-Shakri, K., Alkhawaldeh, B., & Alsmadi, L. (2024). The link between management accounting information systems and firm competitiveness: The mediating role of innovation capabilities. Uncertain Supply Chain Management, 12(3), 1781-1790. https://doi.org/10.5267/j.uscm.2024.3.004
]Search in Google Scholar
[
Akter, M., Kummer, T. F., & Yigitbasioglu, O. (2024). Looking beyond the hype: The challenges of blockchain adoption in accounting. International Journal of Accounting Information Systems, 53, 100681. https://doi.org/10.1016/j.accinf.2024.100681
]Search in Google Scholar
[
Akter, S., Uddin, M. R., Sajib, S., Lee, W. J. T., Michael, K., & Hossain, M. A. (2022). Reconceptualizing cybersecurity awareness capability in the data-driven digital economy. Annals of operations research, 1-26. https://doi.org/10.1007/s10479-022-04844-8
]Search in Google Scholar
[
Albrecht, J. P. (2016). How the GDPR will change the world. European Data Protection Law Review, 2, 287. https://doi.org/10.21552/EDPL/2016/3/4
]Search in Google Scholar
[
Alghizzawi, M., Ezmigna, I., Ezmigna, A. A. R., Alhawamdeh, Z. M., Hammouri, M. A., Alawneh, E., & Al-Gasawneh, J. A. (2024). The Big Data Analysis and Digital Marketing. In Opportunities and Risks in AI for Business Development: Volume 2, 1-10. Cham: Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-65207-3_1
]Search in Google Scholar
[
Alhanatleh, H., Alghizzawi, M., Habes, M., Tahat, K., & Tahat, D. N. (2023, November). The Impact of Digital Marketing Through the TikTok Application on Purchase Intent. In 2023 Tenth International Conference on Social Networks Analysis, Management and Security (SNAMS), 1-6. IEEE. https://doi.org/10.1109/SNAMS60348.2023.10375451
]Search in Google Scholar
[
Alhanatleh, H., Khaddam, A., & Abousweilem, F. (2022). Mobile government public value model for assessing the public institution’s services: evidence through the context of Jordan. International Journal of Data and Network Science, 6(4), 1295-1308. https://doi.org/10.5267/j.ijdns.2022.6.005
]Search in Google Scholar
[
Alhanatleh, H., Khaddam, A., Abudabaseh, F., Alghizzawi, M., & Alzghoul, A. (2024). Enhancing the public value of mobile fintech services through cybersecurity awareness antecedents: A novel framework in Jordan. Investment Management and Financial Innovations, 21(1), 417-430. https://doi.org/10.21511/imfi.21(1).2024.32
]Search in Google Scholar
[
Alharasis, E. E., & Alkhwaldi, A. F. (2024, June). The Implementation of Advanced AIS and the Accounting Data Quality: The Case of Jordanian SMEs. In International Conference on Human-Computer Interaction, 149-173. Cham: Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-61318-0_11
]Search in Google Scholar
[
Al-Hattami, H. M., & Kabra, J. D. (2024). The influence of accounting information system on management control effectiveness: The perspective of SMEs in Yemen. Information Development, 40(1), 75-93. https://doi.org/10.1177/02666669221087184
]Search in Google Scholar
[
Al-Hattami, H. M., Senan, N. A. M., Al-Hakimi, M. A., & Azharuddin, S. (2024). An empirical examination of AIS success at the organizational level in the era of COVID-19 pandemic. Global Knowledge, Memory and Communication, 73(3), 312-330. https://doi.org/10.1108/GKMC-04-2022-0094
]Search in Google Scholar
[
Almaqtari, F. A. (2024). The Role of IT Governance in the Integration of AI in Accounting and Auditing Operations. Economies, 12(8), 199. https://doi.org/10.3390/economies12080199
]Search in Google Scholar
[
Almaqtari, F. A., Farhan, N. H., Al-Hattami, H. M., Elsheikh, T., & Al-dalaien, B. O. A. (2024). The impact of artificial intelligence on information audit usage: Evidence from developing countries. Journal of Open Innovation: Technology, Market, and Complexity, 10(2), 100298. https://doi.org/10.1016/j.joitmc.2024.100298
]Search in Google Scholar
[
Al-Okaily, M. (2024). Assessing the effectiveness of accounting information systems in the era of COVID-19 pandemic. VINE Journal of Information and Knowledge Management Systems, 54(1), 157-175. https://doi.org/10.1108/VJIKMS-08-2021-0148
]Search in Google Scholar
[
Alrfai, M. M., Alqudah, H., Lutfi, A., Al-Kofahi, M., Alrawad, M., & Almaiah, M. A. (2023). The influence of artificial intelligence on the AISs efficiency: Moderating effect of the cyber security. Cogent Social Sciences, 9(2), 2243719. https://doi.org/10.1080/23311886.2023.2243719
]Search in Google Scholar
[
Alshirah, M., Lutfi, A., Alshirah, A., Saad, M., Ibrahim, N. M. E. S., & Mohammed, F. (2021). Influences of the environmental factors on the intention to adopt cloud based accounting information system among SMEs in Jordan. Accounting, 7(3), 645-654. https://doi.org/10.5267/j.ac.2020.12.013
]Search in Google Scholar
[
Alzghoul, A., Alhanatleh, H., Alnajdawi, S., Alghizzawi, M., & mohammad Al Htibat, A. (2024, December). Actual Role of Cybersecurity Awareness and Knowledge to Drive Digital Technology Adoption for Enhance Sustainable Development: Engineering Industry Setting. In 2024 International Conference on Decision Aid Sciences and Applications (DASA), 1-5. IEEE. https://doi.org/10.1109/DASA63652.2024.10836494
]Search in Google Scholar
[
Anyanwu, A., Olorunsogo, T., Abrahams, T. O., Akindote, O. J., & Reis, O. (2024). Data confidentiality and integrity: a review of accounting and cybersecurity controls in superannuation organizations. Computer Science & IT Research Journal, 5(1), 237-253. https://doi.org/10.51594/csitrj.v5i1.735
]Search in Google Scholar
[
Appiah, G., Amankwah-Amoah, J., & Liu, Y. L. (2020). Organizational architecture, resilience, and cyberattacks. IEEE Transactions on Engineering Management, 69(5), 2218-2233. https://doi.org/10.1109/TEM.2020.3004610
]Search in Google Scholar
[
AlFraihat, S. F. A., Ali, A. M., Hodaifa, G., & Alghizzawi, M. (2025). The Impact of Digital Content Marketing on Brand Defence: The Mediating Role of Behavioural Engagement and Brand Attachment. Administrative Sciences, 15(4), 124. https://doi.org/10.3390/admsci15040124
]Search in Google Scholar
[
Awang, P. (2018). Pendekatan Mudah SEM (Structural Equation Modeling). MPWS Rich Resources. http://eprints.unisza.edu.my/id/eprint/3865
]Search in Google Scholar
[
Azaan, S., & Elsa, J. (2024). The Rise of Automated Accounting: Navigating the Digital Landscape, No. 12113. EasyChair. https://easychair.org/publications/preprint/G7b5
]Search in Google Scholar
[
Ballantine, J., & Galliers, R. D. (2017). New developments in information technology: A call for action. In The Routledge Companion to Accounting Information Systems. 292-301. Routledge. https://doi.org/10.4324/9781315647210
]Search in Google Scholar
[
Berkman, H., Jona, J., Lee, G., & Soderstrom, N. (2018). Cybersecurity awareness and market valuations. Journal of Accounting and Public Policy, 37(6), 508-526. https://doi.org/10.1016/j.jaccpubpol.2018.10.003
]Search in Google Scholar
[
Bosanac, K., Ivančić, I., & Dragičević, D. (2025). Contemporary needs of animation programmes in business tourism. Oeconomica Jadertina, 15(1), 55–68. https://doi.org/10.15291/oec.4562
]Search in Google Scholar
[
Brown, T. A. (2015). Confirmatory factor analysis for applied research. Guilford publications. https://www.guilford.com/books/Confirmatory-Factor-Analysis-for-Applied-Research/Timothy-Brown/9781462515363
]Search in Google Scholar
[
Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS quarterly, 523-548. https://www.jstor.org/stable/25750690
]Search in Google Scholar
[
Cram, W. A., Wang, T., & Yuan, J. (2023). Cybersecurity research in accounting information systems: A review and framework. Journal of Emerging Technologies in Accounting, 20(1), 15-38. https://doi.org/10.2308/JETA-2020-081
]Search in Google Scholar
[
Curtis, S. R., Carre, J. R., & Jones, D. N. (2018). Consumer security behaviors and trust following a data breach. Managerial Auditing Journal, 33(4), 425-435. https://doi.org/10.1108/MAJ-11-2017-1692
]Search in Google Scholar
[
Dijkstra, T. K., & Henseler, J. (2015). Consistent partial least squares path modeling. MIS Quarterly, 39(2), 297–316. https://www.jstor.org/stable/26628355
]Search in Google Scholar
[
Dora, M., Kumar, M., Van Goubergen, D., Molnar, A., & Gellynck, X. (2013). Operational performance and critical success factors of lean manufacturing in European food processing SMEs. Trends in food science & technology, 31(2), 156-164. https://doi.org/10.1016/j.tifs.2013.03.002
]Search in Google Scholar
[
Ekelund, S., & Iskoujina, Z. (2019). Cybersecurity economics–balancing operational security spending. Information Technology & People, 32(5), 1318-1342. https://doi.org/10.1108/ITP-05-2018-0252
]Search in Google Scholar
[
Elmaasrawy, H. E., & Tawfik, O. I. (2024). The impact of using the Internet of Things on the development of the accounting information system in the health sector. In Artificial Intelligence, Big Data, Blockchain and 5G for the Digital Transformation of the Healthcare Industry, 253-270. Academic Press. https://doi.org/10.1016/B978-0-443-21598-8.00006-3
]Search in Google Scholar
[
Hamza, R. A. E. M., Ahmed, N. H., Mohamed, A. M. E., Bennaceur, M. Y., Elhefni, A. H. M., & Elshaabany, M. M. (2024). The Impact of Artificial Intelligence (AI) on the Accounting System of Saudi Companies. WSEAS Transactions on Business and Economics, 21(January), 499-511. https://doi.org/10.37394/23207.2024.21.42
]Search in Google Scholar
[
Hasan, S., Ali, M., Kurnia, S., & Thurasamy, R. (2021). Evaluating the cyber security readiness of organizations and its influence on performance. Journal of Information Security and Applications, 58, 102726. https://doi.org/10.1016/j.jisa.2020.102726
]Search in Google Scholar
[
Hasani, T., O’Reilly, N., Dehghantanha, A., Rezania, D., & Levallet, N. (2023). Evaluating the adoption of cybersecurity and its influence on organizational performance. SN Business & Economics, 3(5), 97. https://doi.org/10.1007/s43546-023-00477-6
]Search in Google Scholar
[
Hermida, R. (2015). The problem of allowing correlated errors in structural equation modeling: concerns and considerations. Computational Methods in Social Sciences, 3(1), 5-17. https://www.ceeol.com/search/article-detail?id=417198
]Search in Google Scholar
[
Hossain, M. Z., & Johora, F. T. (2024). Cybersecurity in Accounting: Protecting Financial Data in the Digital Age. Available at SSRN 4868132. https://doi.org/10.59324/ejaset.2024.2(6).06
]Search in Google Scholar
[
Idris, M. I., Siam, Y. I. A., & Ahmad, A. L. (2018). The impact of external auditor size on the relationship between audit committee effectiveness and earnings management. Investment Management and Financial Innovations, 15(3), 122-130. http://dx.doi.org/10.21511/imfi.15(3).2018.10
]Search in Google Scholar
[
Jackson, D., & Allen, C. (2024). Enablers, barriers and strategies for adopting new technology in accounting. International Journal of Accounting Information Systems, 52, 100666. https://doi.org/10.1016/j.accinf.2023.100666
]Search in Google Scholar
[
JCI, 2023. https://www.aci.org.jo/Publication_Details.aspx?id=4104 . Accessed by the Internet in (17 March, 2021).
]Search in Google Scholar
[
Jiang, L. (2024). The use of blockchain technology in enterprise financial accounting information sharing. Plos one, 19(2), e0298210. https://doi.org/10.1371/journal.pone.0298210
]Search in Google Scholar
[
Kakizhanova, T., Utepkaliyeva, K., Zeinolla, S., Aben, A., & Ilyashova, G. (2025). Impact of Digitalization, Economic Growth and Birth Rate on Female Labor Force: Evidence from Kazakh-stan. ECONOMICS - Innovative and Economics Research Journal, 13(2), 95–110. https://doi.org/10.2478/eoik-2025-0032
]Search in Google Scholar
[
Khando, K., Gao, S., Islam, S. M., & Salman, A. (2021). Enhancing employees information security awareness in private and public organisations: A systematic literature review. Computers & security, 106, 102267. https://doi.org/10.1016/j.cose.2021.102267
]Search in Google Scholar
[
Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P., & Jones, K. (2015). A survey of cyber security management in industrial control systems. International journal of critical infrastructure protection, 9, 52-80. https://doi.org/10.1016/j.ijcip.2015.02.002
]Search in Google Scholar
[
Kumar, S., Biswas, B., Bhatia, M. S., & Dora, M. (2021). Antecedents for enhanced level of cyber-security in organisations. Journal of Enterprise Information Management, 34(6), 1597-1629. https://doi.org/10.1108/JEIM-06-2020-0240
]Search in Google Scholar
[
Kusumawardhani, F., Ratmono, D., Wibowo, S., Darsono, D., Widyatmoko, S., & Rokhman, N. (2024). The impact of digitalization in accounting systems on information quality, cost reduction and decision making: Evidence from SMEs. International Journal of Data and Network Science, 8(2), 1111-1116. https://doi.org/10.5267/j.ijdns.2023.11.023
]Search in Google Scholar
[
Masa’deh, R. E., Almajali, D. A., & Alsmadi, L. A. (2025). Acceptance of Artificial Intelligence in a Jordanian Firm: An Overview. The Role of Artificial Intelligence Applications in Business, 1-10. https://doi.org/10.1108/978-1-83662-518-620251001
]Search in Google Scholar
[
Magboul, I., Jebreel, M., Shawtri, F., Qabajeh, M., Shanti, A., Alqudah, M., & Abu Huson, Y. (2024). Factors influencing accounting information system usage by oil companies & performance outcomes. Cogent Business & Management, 11(1), 2369211. https://doi.org/10.1080/23311975.2024.2369211
]Search in Google Scholar
[
Masa’deh, R. E., Warrad, L. H., Jahmani, K., Almajali, D., Majali, S. A., & Al-Radaideh, A. T. (2024). Antecedents of adoption blockchain: Empirical study in Jordanian firms.International Journal of Data and Network Science, 8 (2024) 2601–2614. https://doi.org/doi:10.5267/j.ijdns.2024.4.017
]Search in Google Scholar
[
Mirtsch, M., Kinne, J., & Blind, K. (2020). Exploring the adoption of the international information security management system standard ISO/IEC 27001: a web mining-based analysis. IEEE Transactions on Engineering Management, 68(1), 87-100. https://doi.org/10.1109/TEM.2020.2977815
]Search in Google Scholar
[
Moudud-Ul-Huq, S., Asaduzzaman, M., & Biswas, T. (2020). Role of cloud computing in global accounting information systems. The Bottom Line, 33(3), 231-250. https://doi.org/10.1108/BL-01-2020-0010
]Search in Google Scholar
[
Moulton, R., & Coles, R. S. (2003). Applying information security governance. Computers & Security, 22(7), 580-584. https://doi.org/10.1016/S0167-4048(03)00705-3
]Search in Google Scholar
[
Nassani, A. A., Yousaf, Z., Grigorescu, A., Oprisan, O., & Haffar, M. (2023). Accounting information systems as mediator for digital technology and strategic performance interplay. Electronics, 12(8), 1866. https://doi.org/10.3390/electronics12081866
]Search in Google Scholar
[
Nassimbeni, G., Sartor, M., & Dus, D. (2012). Security risks in service offshoring and outsourcing. Industrial Management & Data Systems, 112(3), 405-440. https://doi.org/10.1108/02635571211210059
]Search in Google Scholar
[
Neri, M., Niccolini, F., & Martino, L. (2024). Organizational cybersecurity readiness in the ICT sector: a quanti-qualitative assessment. Information & Computer Security, 32(1), 38-52. https://doi.org/10.1108/ICS-05-2023-0084
]Search in Google Scholar
[
Oroni, C. Z., & Xianping, F. (2023). Structural evaluation of management capability and the mediation role of cybersecurity awareness towards enterprise performance. Journal of Data, Information and Management, 5(4), 345-361. https://doi.org/10.1007/s42488-023-00108-7
]Search in Google Scholar
[
Pereira, C., Castro, B., Gomes, L., & Canha, H. (2024). Firms’ Investment Level and (In) Efficiency: The Role of Accounting Information System Quality. International Journal of Financial Studies, 12(1), 9. https://doi.org/10.3390/ijfs12010009
]Search in Google Scholar
[
Pflueger, D., Kornberger, M., & Mouritsen, J. (2024). What is blockchain accounting? A critical examination in relation to organizing, governance, and trust. European Accounting Review, 33(4), 1139-1164. https://doi.org/10.1080/09638180.2022.2147973
]Search in Google Scholar
[
Pigola, A., Da Costa, P. R., Ferasso, M., & da Silva, L. F. C. (2024). Enhancing cybersecurity capability investments: Evidence from an experiment. Technology in Society, 76, 102449. https://doi.org/10.1016/j.techsoc.2023.102449
]Search in Google Scholar
[
Priambodo, A., Anwar, N., & Suharno, S. (2025). Does Digital Literacy Mediate the Relationship between ICT and Regional Own-Source Revenue? ECONOMICS - Innovative and Economics Research Journal, 13(2), 203–222. https://doi.org/10.2478/eoik-2025-0037
]Search in Google Scholar
[
Rabie, H. (2024). The Mediating Role of Cybersecurity on the Relationship between Internal Control and the Implementation of Cloud-Based Enterprise Resource Planning Systems in Jordanian Commercial Banks. Kurdish Studies, 12(2), 2921-2936. https://pdfs.semanticscholar.org/2968/7110671b863d86b9b6a155537bb702e06ad4.pdf
]Search in Google Scholar
[
Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: a critical review of the literature and recommended remedies. Journal of applied psychology, 88(5), 879.https://doi.org/10.1037/0021-9010.88.5.879
]Search in Google Scholar
[
Ratten, V. (2019). The effect of cybercrime on open innovation policies in technology firms. Information Technology & People, 32(5), 1301-1317. https://doi.org/10.1108/ITP-03-2018-0119
]Search in Google Scholar
[
Rawat, D. B., Doku, R., & Garuba, M. (2019). Cybersecurity in big data era: From securing big data to data-driven security. IEEE Transactions on Services Computing, 14(6), 2055-2072. https://doi.org/10.1109/TSC.2019.2907247
]Search in Google Scholar
[
Raza, I., & Awang, Z. (2021). Knowledge-sharing practices in higher educational institutes of Islamabad, Pakistan: an empirical study based on theory of planned behavior. Journal of Applied Research in Higher Education, 13(2), 466–484. https://doi.org/10.1108/JARHE-03-2020-0068
]Search in Google Scholar
[
Rex B. Kline. (2011). Principles and Practice of Structural Equation Modeling. In The Guilford Press (3nd ed.). The Guilford Press. http://ndl.ethernet.edu.et/bitstream/123456789/74702/1/35.pdf
]Search in Google Scholar
[
Ringle, C. M., Sarstedt, M., Mitchell, R., & Gudergan, S. P. (2020). Partial least squares structural equation modeling in HRM research. The international journal of human resource management, 31(12), 1617-1643. https://doi.org/10.1080/09585192.2017.1416655
]Search in Google Scholar
[
Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change1. The Journal of Psychology, 91(1), 93-114. https://doi.org/10.1080/00223980.1975.9915803
]Search in Google Scholar
[
Roumani, Y., Nwankpa, J. K., & Roumani, Y. F. (2015). Time series modeling of vulnerabilities. Computers & Security, 51, 32-40. https://doi.org/10.1016/j.cose.2015.03.003
]Search in Google Scholar
[
Salehi, A. K. (2024). Critical review of the role of accounting in the decision-making process. Journal of Islamic Accounting and Business Research, 15(2), 244-264. https://doi.org/10.1108/JIABR-12-2021-0310
]Search in Google Scholar
[
Samtani, S., Chinn, R., Chen, H., & Nunamaker Jr, J. F. (2017). Exploring emerging hacker assets and key hackers for proactive cyber threat intelligence. Journal of Management Information Systems, 34(4), 1023-1053. https://doi.org/10.1080/07421222.2017.1394049
]Search in Google Scholar
[
Saputra, K. A. K., & Paranoan, S. (2024). Do Cyber security, Digitalisation and Data Visualisation Affect the Quality of Internal Environmental Audits?. Australasian Accounting, Business and Finance Journal, 18(2), 158-174. https://doi.org/10.14453/aabfj.v18i2.10
]Search in Google Scholar
[
Sarstedt, M., Ringle, C. M., & Hair, J. F. (2021). Partial least squares structural equation modeling. In Handbook of market research, 587-632. Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-57413-4_15
]Search in Google Scholar
[
Shakdwipee, P., Agarwal, K., Kunwar, H., & Singh, S. (2023, August). Artificial Intelligence in Finance and Accounting: Opportunities and Challenges. In International Conference on ICT for Sustainable Development, 165-177. Singapore: Springer Nature Singapore. https://doi.org/10.1007/978-981-99-5652-4_17
]Search in Google Scholar
[
Sipior, J. C., Bierstaker, J., Borchardt, P., & Ward, B. T. (2018). A ransomware case for use in the classroom. Communications of the Association for Information Systems, 43(1), 32. https://doi.org/10.17705/1CAIS.04332
]Search in Google Scholar
[
Skopik, F., Settanni, G., & Fiedler, R. (2016). A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing. Computers & Security, 60, 154-176. https://doi.org/10.1016/j.cose.2016.04.003
]Search in Google Scholar
[
Soomro, R. B., Memon, S. G., Dahri, N. A., Al-Rahmi, W. M., Aldriwish, K., A. Salameh, A., ... & Saleem, A. (2024). The Adoption of Digital Technologies by Small and Medium-Sized Enterprises for Sustainability and Value Creation in Pakistan: The Application of a Two-Staged Hybrid SEM-ANN Approach. Sustainability, 16(17), 7351. https://doi.org/10.3390/su16177351
]Search in Google Scholar
[
Stefanska, B., & Al-Dawod, F. L. (2021). The importance of risk awareness in cybersecurity among companies : A perspective on the role of top management (Dissertation). https://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177218
]Search in Google Scholar
[
Sun, Y., Li, J., Lu, M., & Guo, Z. (2024). Study of the Impact of the Big Data Era on Accounting and Auditing. arXiv preprint arXiv:2403.07180. https://doi.org/10.48550/arXiv.2403.07180
]Search in Google Scholar
[
Talwar, S., Dhir, A., Kaur, P., Zafar, N., & Alrasheedy, M. (2019). Why do people share fake news? Associations between the dark side of social media use and fake news sharing behavior. Journal of retailing and consumer services, 51, 72-82. https://doi.org/10.1016/j.jretconser.2019.05.026
]Search in Google Scholar
[
Tan, K. S., Chong, S. C., Lin, B., & Eze, U. C. (2009). Internet-based ICT adoption: Evidence from Malaysian SMEs. Industrial Management and Data Systems, 109(2), 224–244. https://doi.org/10.1108/02635570910930118
]Search in Google Scholar
[
Tao, H., Bhuiyan, M. Z. A., Rahman, M. A., Wang, G., Wang, T., Ahmed, M. M., & Li, J. (2019). Economic perspective analysis of protecting ample data security and privacy. Future Generation Computer Systems, 98, 660-671. https://doi.org/10.1016/j.future.2019.03.042
]Search in Google Scholar
[
Thamae, R., Abdullah, H., & Mujinga, M. (2024, April). Enhancing Cybersecurity Policy Awareness Programs in the Financial Sector: A Comprehensive Framework and Assessment of Effectiveness. In International Conference on Business and Technology, 48-57. Cham: Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-67444-0_5
]Search in Google Scholar
[
Thottoli, M. M. (2024). Leveraging information communication technology (ICT) and artificial intelligence (AI) to enhance auditing practices. Accounting Research Journal, 37(2), 134-150. https://doi.org/10.1108/ARJ-09-2023-0269
]Search in Google Scholar
[
Van der Haar, H., & Von Solms, R. (2003). A model for deriving information security control attribute profiles. Computers & Security, 22(3), 233-244. https://doi.org/10.1016/S0167-4048(03)00311-0
]Search in Google Scholar
[
Vărzaru, A. A., Bocean, C. G., Mangra, M. G., & Simion, D. (2022). Assessing users’ behavior on the adoption of digital technologies in management and accounting information systems. Electronics, 11(21), 3613. https://doi.org/10.3390/electronics11213613
]Search in Google Scholar
[
Vestad, A., & Yang, B. (2023, July). Adoption of Cybersecurity Innovations—A Systematic Literature Review. In The International Conference on Cybersecurity, Situational Awareness and Social Media, 285-304. Singapore: Springer Nature Singapore. https://doi.org/10.1007/978-981-99-6974-6_16
]Search in Google Scholar
[
Xue, B., Xu, F., & Warkentin, M. (2018). Critical role of ethical leadership on information security climate and employee ISP violation behavior. WISP 2018 Proceedings. 16. https://aisel.aisnet.org/wisp2018/16
]Search in Google Scholar
[
Yigit Ozkan, B., & Spruit, M. (2023). Adaptable security maturity assessment and standardization for digital SMEs. Journal of Computer Information Systems, 63(4), 965-987. https://doi.org/10.1080/08874417.2022.2119442
]Search in Google Scholar
[
Yusof, M. M., Kuljis, J., Papazafeiropoulou, A., & Stergioulas, L. K. (2008). An evaluation framework for Health Information Systems: human, organization and technology-fit factors (HOT-fit). International journal of medical informatics, 77(6), 386-398. https://doi.org/10.1016/j.ijmedinf.2007.08.011
]Search in Google Scholar
[
Zhang, C., Li, Z., Xu, J., & Luo, Y. (2024). Accounting information quality, firm ownership and technology innovation: Evidence from China. International Review of Financial Analysis, 93, 103118. https://doi.org/10.1016/j.irfa.2024.103118
]Search in Google Scholar