{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:00:38Z","timestamp":1767319238525,"version":"3.48.0"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032107275","type":"print"},{"value":"9783032107282","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-10728-2_4","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T01:58:30Z","timestamp":1767319110000},"page":"34-47","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Integrating Cybersecurity into Accounting Systems: Evidence from Portuguese SMEs"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1292-6201","authenticated-orcid":false,"given":"Isabel","family":"Maldonado","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8366-9863","authenticated-orcid":false,"given":"Am\u00e9lia","family":"Silva","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7422-4555","authenticated-orcid":false,"given":"Carlos","family":"Pinho","sequence":"additional","affiliation":[]},{"given":"Gon\u00e7alo","family":"Santos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"4_CR1","doi-asserted-by":"publisher","unstructured":"Alahmari, A.A., Duncan, R.A.: Investigating potential barriers to cybersecurity risk management investment in SMEs. Proceedings of the 13th International Conference on Electronics, Computers and Artificial Intelligence, ECAI 2021 (2021). https:\/\/doi.org\/10.1109\/ECAI52376.2021.9515166","DOI":"10.1109\/ECAI52376.2021.9515166"},{"issue":"3","key":"4_CR2","first-page":"62","volume":"11","author":"AY Algrari","year":"2019","unstructured":"Algrari, A.Y., Ahmed, M.R.M.: The impact of accounting information systems\u2019 quality on accounting information quality. Journal of Information Technology Management 11(3), 62\u201380 (2019)","journal-title":"Journal of Information Technology Management"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Anderson, C.L., Agarwal, R. Practicing safe computing: A multimethod empirical examination of home computer. In Source: MIS Quarterly 34(3) (2010).","DOI":"10.2307\/25750694"},{"key":"4_CR4","doi-asserted-by":"publisher","unstructured":"Baskerville, R., Rowe, F., Wolff, F.C.: Integration of information systems and cybersecurity countermeasures: An exposure to risk perspective. Integration of Information Systems and Cybersecurity Countermeasures. ACM SIGMIS Database: The DATABASE for Advances in Information Systems. 49(1), 33\u201352 (2018). https:\/\/doi.org\/10.1145\/3184444.3184448","DOI":"10.1145\/3184444.3184448"},{"issue":"3","key":"4_CR5","doi-asserted-by":"publisher","first-page":"73","DOI":"10.2308\/ISSUES-2021-001","volume":"37","author":"SR Boss","year":"2022","unstructured":"Boss, S.R., Gray, J., Janvrin, D.J.: Accountants, cybersecurity isn\u2019t just for \u201ctechies\u201d: incorporating cybersecurity into the accounting curriculum. Issues in Accounting Education 37(3), 73\u201389 (2022)","journal-title":"Issues in Accounting Education"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Qjarterly special issue information security policy compliance: An empirical study of rationality-based beliefs and information security awareness1. In Source: MIS Quarterly (Vol. 34, Issue 3).","DOI":"10.2307\/25750690"},{"key":"4_CR7","doi-asserted-by":"publisher","unstructured":"Catota, F.E., Granger Morgan, M., Sicker, D.C. Cybersecurity incident response capabilities in the Ecuadorian financial sector. J. Cybersecur. 4(1) (2018). https:\/\/doi.org\/10.1093\/cybsec\/tyy002","DOI":"10.1093\/cybsec\/tyy002"},{"key":"4_CR8","unstructured":"Centro Nacional de Ciberseguran\u00e7a. (2023). Relat\u00f3rio Ciberseguran\u00e7a em Portugal - Riscos e Conflitos."},{"issue":"3","key":"4_CR9","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1080\/08874417.2015.11645767","volume":"55","author":"Y Chen","year":"2015","unstructured":"Chen, Y., Ramamurthy, K., Wen, K.W.: Impacts of comprehensive information security programs on information security culture. Journal of Computer Information Systems 55(3), 11\u201319 (2015). https:\/\/doi.org\/10.1080\/08874417.2015.11645767","journal-title":"Journal of Computer Information Systems"},{"issue":"1","key":"4_CR10","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1287\/isre.1070.0160","volume":"20","author":"J D\u2019Arcy","year":"2009","unstructured":"D\u2019Arcy, J., Hovav, A., Galletta, D.: User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research 20(1), 79\u201398 (2009). https:\/\/doi.org\/10.1287\/isre.1070.0160","journal-title":"Information Systems Research"},{"issue":"2","key":"4_CR11","doi-asserted-by":"publisher","first-page":"C1","DOI":"10.2308\/ciia-52419","volume":"13","author":"TV Eaton","year":"2019","unstructured":"Eaton, T.V., Grenier, J.H., Layman, D.: Accounting and cybersecurity risk management. Current Issues in Auditing 13(2), C1\u2013C9 (2019)","journal-title":"Current Issues in Auditing"},{"issue":"1","key":"4_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.6084\/m9.figshare.24189921.v1","volume":"3","author":"T Fadziso","year":"2023","unstructured":"Fadziso, T., Koteswara, V., Ballamudi, R., Desamsetti, H.: Evolution of the cyber security threat: An overview of the scale of cyber threat. Digitalization & Sustainability Review 3(1), 1\u201312 (2023). https:\/\/doi.org\/10.6084\/m9.figshare.24189921.v1","journal-title":"Digitalization & Sustainability Review"},{"key":"4_CR13","doi-asserted-by":"publisher","unstructured":"Haapam\u00e4ki, E., Sihvonen, J. Cybersecurity in accounting research. In Artificial Intelligence in Accounting. 182\u2013214s (2022). Routledge. https:\/\/doi.org\/10.4324\/9781003198123","DOI":"10.4324\/9781003198123"},{"key":"4_CR14","doi-asserted-by":"publisher","unstructured":"Hassani, H., Huang, X., Silva, E.: Banking with blockchain-ed big data. J. Manage. Anal. 5(4), 256\u2013275) (2018). https:\/\/doi.org\/10.1080\/23270012.2018.1528900","DOI":"10.1080\/23270012.2018.1528900"},{"issue":"4","key":"4_CR15","doi-asserted-by":"publisher","first-page":"67","DOI":"10.2308\/HORIZONS-2020-101","volume":"36","author":"DJ Janvrin","year":"2022","unstructured":"Janvrin, D.J., Wang, T.: Linking cybersecurity and accounting: An event, impact, response framework. Accounting Horizons 36(4), 67\u2013112 (2022)","journal-title":"Accounting Horizons"},{"key":"4_CR16","doi-asserted-by":"publisher","first-page":"758","DOI":"10.1109\/ICAIS50930.2021.9395831","volume":"2021","author":"S Merugula","year":"2021","unstructured":"Merugula, S., Dinesh, G., Kathiravan, M., Das, G., Nandankar, P., Karanam, S.R.: Study of blockchain technology in empowering the SME. Proceedings - International Conference on Artificial Intelligence and Smart Systems, ICAIS 2021, 758\u2013765 (2021). https:\/\/doi.org\/10.1109\/ICAIS50930.2021.9395831","journal-title":"Proceedings - International Conference on Artificial Intelligence and Smart Systems, ICAIS"},{"key":"4_CR17","doi-asserted-by":"publisher","unstructured":"Mishra, S.: Exploring the impact of AI-based cyber security financial sector management. Applied Sciences (Switzerland). 13(10) (2023). https:\/\/doi.org\/10.3390\/app13105875","DOI":"10.3390\/app13105875"},{"issue":"3","key":"4_CR18","doi-asserted-by":"publisher","first-page":"75","DOI":"10.5539\/mas.v14n3p75","volume":"14","author":"OA Moniem Ali","year":"2020","unstructured":"Moniem Ali, O.A., Matarneh, A.J., Almalkawi, A., Alhawamdeh, H.M.: The impact of cyber governance in reducing the risk of cloud accounting in Jordanian commercial banks - from the perspective of Jordanian auditing firms. Modern Applied Science 14(3), 75 (2020). https:\/\/doi.org\/10.5539\/mas.v14n3p75","journal-title":"Modern Applied Science"},{"key":"4_CR19","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.cose.2017.01.004","volume":"66","author":"K Parsons","year":"2017","unstructured":"Parsons, K., Calic, D., Pattinson, M., Butavicius, M., McCormac, A., Zwaans, T.: The Human aspects of information security questionnaire (HAIS-Q): Two further validation studies. Computers and Security 66, 40\u201351 (2017). https:\/\/doi.org\/10.1016\/j.cose.2017.01.004","journal-title":"Computers and Security"},{"key":"4_CR20","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.cose.2013.12.003","volume":"42","author":"K Parsons","year":"2014","unstructured":"Parsons, K., McCormac, A., Butavicius, M., Pattinson, M., Jerram, C.: Determining employee awareness using the human aspects of information security questionnaire (HAIS-Q). Computers and Security 42, 165\u2013176 (2014). https:\/\/doi.org\/10.1016\/j.cose.2013.12.003","journal-title":"Computers and Security"},{"key":"4_CR21","doi-asserted-by":"publisher","unstructured":"Pendley, J.A.: Finance and accounting professionals and cybersecurity awareness. J. Corp. Acc. Financ. 29(1), 53\u201358 (2018) John Wiley and Sons Inc. https:\/\/doi.org\/10.1002\/jcaf.22291","DOI":"10.1002\/jcaf.22291"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Puhakainen, P., Siponen, M.: Improving employees\u2019 compliance through information systems security training: An Action. In Source: MIS Quarterly 34(4) (2010). http:\/\/www.jstor.org\/stable\/25750704, http:\/\/www.jstor.org\/stable\/25750704","DOI":"10.2307\/25750704"},{"issue":"2","key":"4_CR23","first-page":"226","volume":"30","author":"A Rai","year":"2006","unstructured":"Rai, A., Patnayakuni, R., Seth, N.: Firm performance impacts of digitally enabled supply chain integration capabilities. Managerial MIS Quarterly 30(2), 226\u2013246 (2006)","journal-title":"Managerial MIS Quarterly"},{"key":"4_CR24","doi-asserted-by":"publisher","unstructured":"Saravanan, A., Bama, S.S.: A review on cyber security and the fifth generation cyberattacks. Orient. J. Comput. Sci. Technol. 12(2), 50\u201356 (2019). https:\/\/doi.org\/10.13005\/ojcst12.02.04","DOI":"10.13005\/ojcst12.02.04"},{"key":"4_CR25","doi-asserted-by":"publisher","unstructured":"Smith, S.S.: Emerging technologies and implications for financial cybersecurity. Int. J. Econ. Financ. Issues. 27\u201332 (2020). https:\/\/doi.org\/10.32479\/ijefi.8844","DOI":"10.32479\/ijefi.8844"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Straub, D.W., Welke, R.J.: Coping with systems risk: Security planning models for management decision making. In Source: MIS Quarterly 22(4) (1998). http:\/\/www.jstor.orgStable, http:\/\/www.jstor.org\/stable\/249551","DOI":"10.2307\/249551"},{"issue":"2","key":"4_CR27","doi-asserted-by":"publisher","first-page":"41","DOI":"10.2753\/MIS0742-1222230203","volume":"23","author":"ETG Wang","year":"2006","unstructured":"Wang, E.T.G., Tai, J.C.F., Wei, H.L.: A virtual integration theory of improved supply-chain performance. Journal of Management Information Systems 23(2), 41\u201364 (2006). https:\/\/doi.org\/10.2753\/MIS0742-1222230203","journal-title":"Journal of Management Information Systems"},{"issue":"3","key":"4_CR28","doi-asserted-by":"publisher","first-page":"1127","DOI":"10.1007\/s11135-018-0806-6","volume":"53","author":"R Wang","year":"2019","unstructured":"Wang, R., Lin, Z., Luo, H.: Blockchain, bank credit and SME financing. Quality and Quantity 53(3), 1127\u20131140 (2019). https:\/\/doi.org\/10.1007\/s11135-018-0806-6","journal-title":"Quality and Quantity"},{"key":"4_CR29","doi-asserted-by":"publisher","unstructured":"Zhao, L., Huo, B., Sun, L., Zhao, X.: The impact of supply chain risk on supply chain integration and company performance: a global investigation. Supply Chain Management: An International Journal. 18(2), 115\u2013131 (2013). https:\/\/doi.org\/10.1108\/13598541311318773","DOI":"10.1108\/13598541311318773"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of 20th Iberian Conference on Information Systems and Technologies (CISTI 2025)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-10728-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T01:58:32Z","timestamp":1767319112000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-10728-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032107275","9783032107282"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-10728-2_4","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CISTI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Iberian Conference on Information Systems and Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lisbon","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisti2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/cisti.eu\/index.php\/en\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}