Cyberaccounting for the Leaders of the Future

Cyberaccounting for the Leaders of the Future

Alina Stanciu, Marius Petrescu, Anca Gabriela Petrescu, Florentina Raluca Bîlcan
DOI: 10.4018/978-1-7998-1005-6.ch005
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The new volatile, uncertain, complex and ambiguous economic context generates the evolution of a global, integrated, and permanently connected world, in which territoriality and temporality have almost disappeared. Fluctuations and changes in economic power poles, past financial crises, but also signs of new recession periods, rising capital, multiplying variables, and cause-effect factors outline the current economic environment. Simultaneity and interconnection of Industrial Revolution 4.0, Globalization 4.0, Artificial Intelligence, Internet of Things, Data Revolution, and Digital Enterprise have determined the emergence of new concepts such as: Digital Ecosystems, Cyber counting, Cybersecurity, Platform Architecture for Financial, Digital Interface, concepts directly related to business performance in the new economic environment: Digital Economy.
Chapter Preview
Top

Background

The complete digitization of economic environment changes the way that leaders of the future relate with their business (McQuade, 2006; Yang, Wu, & Wang, 2014). Leading technologies, Artificial Intelligence (AI), Internet of Things (IoT) involve all the levels of the business, all the functions and all the stakeholders, transforming “the structures of economic interaction: the twin trends of digitization and virtualization are creating an economy of near-unlimited mobility in which cyberspace is home to all data” (Chen, Ge, & Xie, 2015), including indicators, accounting and global financial data. Reports, Charts, Technical Indicators, Trend Analysis, Research, Cloud Computing and Mobile Application, today all are interconnected, vertical integrated “creating smart systems that are not just analytical but also predictive and prescriptive” (Hiller, & Russel, 2013) in cross-country surveys with all stakeholders linked.

Key Terms in this Chapter

Risk Management: The implementation and updating of methods and tools to minimize risks associated with the information system of an organization, such as the Information Security policies, procedures and practices associated formalized and adopted other means in order to bring these risks to acceptable levels.

Threats: The possibility of accidental or deliberate compromise of information security, the loss of confidentiality, integrity or availability or impaired functions that provide authenticity and non-repudiation of information.

Integrity: The prohibition amendment - by deleting or adding - or the unauthorized destruction of information; integrity refers to confidence in the data and resources of a system by which to manage information.

Availability: Ensuring the conditions necessary for easy retrieval and use of information and system resources, whenever necessary, with strict conditions of confidentiality and integrity.

Cyber Physical Systems: They are being set up by the internet of things that are machines, employees, products and products facilities being digitally interconnected by the internet.

Prevention: Implementation of mechanisms that users not be able to counteract and are implemented correctly, unaltered, so the attacker cannot alter them.

Complete Chapter List

Search this Book:
Reset