The purpose of this study is to investigate the relationship between the use of business intelligence applications in accounting, particularly in invoice handling, and the resultant disruption and technical challenges. Traditionally a manual process, accounting has fundamentally changed with the incorporation of BI technology that automates processes and allows for sophisticated data analysis. This study addresses the lack of understanding about the strategic implications and nuances of implementation. Data was collected from 467 accounting stakeholder surveys and analyzed quantitatively using correlational analysis. Multiple regression was utilized to investigate the effect of BI adoption, technical sophistication on operational and organizational performance enhancements. The results show a weak association between the use of BI tools and operational enhancements, indicating that the time for processing invoices has decreased. Challenges due to information privacy and bias were significant and negative on both operational and organizational performance. This study suggests that a successful implementation of a BI technology requires an integrated plan that focuses on strategic management, organizational learning, and sound policies This paper informs practitioners of how accounting is being transformed in the digital age, motivating accountants and policy makers to better understand accounting as it evolves with technology and for businesses to invest in concomitant advances.
An unprecedented demand for accurate information and action moved the industry toward RegTech where computing, big data, and social and mobile technologies could help achieve the demand. With the introduction and adoption of RegTech, regulatory changes were introduced in some countries. Enhanced regulatory changes to ease the barriers to market entry, data protection, and payment systems were also introduced to ensure a smooth transition into RegTech. However, regulatory changes fell short of comprehensiveness to address all the issues related to RegTech’s operation. This article is an attempt to devise a Privacy Model for RegTech so industries and regulators can protect the interests of various stakeholders. This model comprises four variables, and each variable consists of many items. The four variables are data protection, accountability, transparency, and organizational design. It is expected that the adoption of this Privacy Model will help industries and regulators embrace standards while being innovative in the development and use of RegTech.
A smart city focuses on enhancing and interconnecting facilities and services through digital technology to offer convenient services for both people and businesses. The basic infrastructure of smart cities consists of modern technologies such as the Internet of Things (IoT), cloud computing and artificial intelligence. These urban areas utilize different networks, such as the Internet and IoT, to share real-time information, improving convenience for the inhabitants. However, the reliance of smart cities on modern technologies exposes them to a range of organized, diverse, and sophisticated cyber threats. Therefore, prioritizing cybersecurity awareness and implementing appropriate measures and solutions are essential to protect the privacy and security of citizens. This study aims to identify cyber threats and their impact on smart cities, as well as the methods and measures required for key areas such as smart government, smart healthcare, smart mobility, smart environment, smart economy, smart living, and smart people. Furthermore, this study seeks to evaluate previous research in this field, establish necessary policies to mitigate these threats, and propose an appropriate model for the infrastructure associated with IT networks in smart cities.
Personal information is a vital productive commodity in the digital economy, and its processing has seen unparalleled transformations in both breadth and depth. This article proposes to enhance the legal remedies for personal information rights in contemporary China. Research has revealed multiple practical challenges in China’s judicial practices, such as hesitance to prosecute owing to an absence of substantial legal foundation, improper distribution of the burden of proof, and inadequate integration of criminal-civil judicial safeguards for personal information. This paper advocates for China to elucidate the definition of personal information rights via legislation, enable the litigation of personal information infringement cases, and establish explicit criteria for their acceptance into judicial proceedings. Furthermore, China must develop an appropriate structure for distributing the burden of evidence. It must also use discretionary judgment to properly tackle the problems related to evaluating damages in instances of personal information violations.
In today’s digital education landscape, safeguarding the privacy and security of educational data, particularly the distribution of grades, is paramount. This research presents the “secure grade distribution scheme (SGDS)”, a comprehensive solution designed to address critical aspects of key management, encryption, secure communication, and data privacy. The scheme’s heart lies in its careful key management strategy, offering a structured approach to key generation, rotation, and secure storage. Hardware security modules (HSMs) are central to fortifying encryption keys and ensuring the highest security standards. The advanced encryption standard (AES) is employed to encrypt graded data, guaranteeing the confidentiality and integrity of information during transmission and storage. The scheme integrates the Diffie-Hellman key exchange protocol to establish secure communication, enabling users to securely exchange encryption keys without vulnerability to eavesdropping or interception. Secure communication channels further fortify graded data protection, ensuring data integrity in transit. The research findings underscore the SGDS’s efficacy in achieving the goals of secure grade distribution and data privacy. The scheme provides a holistic approach to safeguarding educational data, ensuring the confidentiality of sensitive information, and protecting against unauthorized access. Future research opportunities may centre on enhancing the scheme’s robustness and scalability in diverse educational settings.
This study investigates the public’s perceptions of digital innovations in pharmacy, with a focus on health informatics and medication management. Despite the rapid development of these technologies, a comprehensive understanding of how various demographics perceive and interact with them is lacking hence, this research aims to bridge this gap by offering insights into public attitudes and the factors influencing the adoption of digital tools in pharmacy practice, as KSA population and healthcare professionals after Covid-19 has observed the significant potential of digital health. A cross-sectional survey involving 1132 participants was conducted, employing SPSS for data analysis to ensure precise and reliable results. The findings indicate general optimism about the potential of digital innovations to enhance healthcare outcomes but concerns about data privacy and usability significantly affect user acceptance. The researchers recommended tailored educational programs and user-centered design to facilitate the adoption of digital pharmacy innovations. Key contributions include the identification of ‘Ease of Use’ and ‘Data Security and Privacy’ as predominant factors in the adoption of digital health tools.
Copyright © by EnPress Publisher. All rights reserved.