{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T03:56:29Z","timestamp":1760586989778,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,28]],"date-time":"2019-08-28T00:00:00Z","timestamp":1566950400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,28]]},"DOI":"10.1145\/3358505.3358513","type":"proceedings-article","created":{"date-parts":[[2019,10,15]],"date-time":"2019-10-15T17:00:05Z","timestamp":1571158805000},"page":"100-105","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Accounting Information Systems and System of Systems"],"prefix":"10.1145","author":[{"given":"Pythagoras","family":"Petratos","sequence":"first","affiliation":[{"name":"Blavatnik School of Government, University of Oxford, Oxford, UK"}]},{"given":"Alessio","family":"Faccia","sequence":"additional","affiliation":[{"name":"Coventry University, Priory St., Coventry, UK"}]}],"member":"320","published-online":{"date-parts":[[2019,8,28]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"https:\/\/www.dhs.gov\/cisa\/critical-infrastructure-sectors  https:\/\/www.dhs.gov\/cisa\/critical-infrastructure-sectors"},{"key":"e_1_3_2_1_2_1","unstructured":"https:\/\/www.accaglobal.com\/ie\/en\/student\/sa\/features\/cyber.html  https:\/\/www.accaglobal.com\/ie\/en\/student\/sa\/features\/cyber.html"},{"key":"e_1_3_2_1_3_1","series-title":"Vol. 1","volume-title":"Managing cybersecurity resources: a cost-benefit analysis","author":"Gordon L. A.","year":"2006","unstructured":"Gordon , L. A. , & Loeb , M. P. ( 2006 ). Managing cybersecurity resources: a cost-benefit analysis ( Vol. 1 ) . New York : McGraw-Hill . Gordon, L. A., & Loeb, M. P. (2006). Managing cybersecurity resources: a cost-benefit analysis (Vol. 1). New York: McGraw-Hill."},{"key":"e_1_3_2_1_4_1","unstructured":"https:\/\/www.icaew.com\/about-icaew\/news\/press-release-archive\/2017-press-releases\/regions-2017\/tv-cyber-attack  https:\/\/www.icaew.com\/about-icaew\/news\/press-release-archive\/2017-press-releases\/regions-2017\/tv-cyber-attack"},{"key":"e_1_3_2_1_5_1","first-page":"27","article-title":"Cybersecurity strategy: A primer for policy makers and those on the front line","volume":"4","author":"Chabinsky S. R.","year":"2010","unstructured":"Chabinsky , S. R. ( 2010 ). Cybersecurity strategy: A primer for policy makers and those on the front line . J. Nat'l Sec. L. & Pol'y , 4 , 27 . Chabinsky, S. R. (2010). Cybersecurity strategy: A primer for policy makers and those on the front line. J. Nat'l Sec. L. & Pol'y, 4, 27.","journal-title":"J. Nat'l Sec. L. & Pol'y"},{"key":"e_1_3_2_1_6_1","unstructured":"https:\/\/www.ft.com\/content\/f52f6fee-ccf4-11e6-864f-20dcb35cede2  https:\/\/www.ft.com\/content\/f52f6fee-ccf4-11e6-864f-20dcb35cede2"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jaccpubpol.2003.09.001"},{"issue":"3","key":"e_1_3_2_1_8_1","first-page":"1","article-title":"2005 CSI\/FBI computer crime and security survey","volume":"21","author":"Gordon L. A.","year":"2005","unstructured":"Gordon , L. A. , Loeb , M. P. , Lucyshyn , W. , & Richardson , R. ( 2005 ). 2005 CSI\/FBI computer crime and security survey . Computer Security Journal , 21 ( 3 ), 1 . Gordon, L. A., Loeb, M. P., Lucyshyn, W., & Richardson, R. (2005). 2005 CSI\/FBI computer crime and security survey. Computer Security Journal, 21(3), 1.","journal-title":"Computer Security Journal"},{"key":"e_1_3_2_1_9_1","unstructured":"https:\/\/www.bloomberg.com\/news\/articles\/2019-05-11\/a-massive-accounting-hack-kept-clients-offline-and-in-the-dark  https:\/\/www.bloomberg.com\/news\/articles\/2019-05-11\/a-massive-accounting-hack-kept-clients-offline-and-in-the-dark"},{"key":"e_1_3_2_1_10_1","volume-title":"International journal of information management, 33(5), 726--733.","author":"Brender N.","year":"2013","unstructured":"Brender , N. , & Markov , I. ( 2013 ). Risk perception and risk management in cloud computing: Results from a case study of Swiss companies . International journal of information management, 33(5), 726--733. Brender, N., & Markov, I. (2013). Risk perception and risk management in cloud computing: Results from a case study of Swiss companies. International journal of information management, 33(5), 726--733."},{"key":"e_1_3_2_1_11_1","volume-title":"Is cloud computing really ready for prime time?. Computer, (1), 15--20","author":"Leavitt N.","year":"2009","unstructured":"Leavitt , N. ( 2009 ). Is cloud computing really ready for prime time?. Computer, (1), 15--20 . Leavitt, N. (2009). Is cloud computing really ready for prime time?. Computer, (1), 15--20."},{"key":"e_1_3_2_1_12_1","volume-title":"Cloud Computing Characteristics and Services: A Brief Review","author":"Rashid A.","year":"2019","unstructured":"Rashid , A. , & Chaturvedi , A. ( 2019 ). Cloud Computing Characteristics and Services: A Brief Review . Rashid, A., & Chaturvedi, A. (2019). Cloud Computing Characteristics and Services: A Brief Review."},{"key":"e_1_3_2_1_13_1","volume-title":"Predictive Intelligence Using Big Data and the Internet of Things(pp. 128--143). IGI Global.","author":"Singh M.","year":"2019","unstructured":"Singh , M. , Kant , U. , Gupta , P. K. , & Srivastava , V. M. ( 2019 ). Cloud-Based Predictive Intelligence and Its Security Model . In Predictive Intelligence Using Big Data and the Internet of Things(pp. 128--143). IGI Global. Singh, M., Kant, U., Gupta, P. K., & Srivastava, V. M. (2019). Cloud-Based Predictive Intelligence and Its Security Model. In Predictive Intelligence Using Big Data and the Internet of Things(pp. 128--143). IGI Global."},{"key":"e_1_3_2_1_14_1","volume-title":"Accounting information systems. Cengage Learning","author":"Hall J. A.","year":"2012","unstructured":"Hall , J. A. ( 2012 ). Accounting information systems. Cengage Learning . Hall, J. A. (2012). Accounting information systems. Cengage Learning."},{"key":"e_1_3_2_1_15_1","series-title":"Vol. 2","volume-title":"Accounting information systems","author":"Romney M. B.","year":"2000","unstructured":"Romney , M. B. , Steinbart , P. J. , & Cushing , B. E. ( 2000 ). Accounting information systems ( Vol. 2 ) . Upper Saddle River, NJ : Prentice Hall . Romney, M. B., Steinbart, P. J., & Cushing, B. E. (2000). Accounting information systems (Vol. 2). Upper Saddle River, NJ: Prentice Hall."},{"key":"e_1_3_2_1_16_1","volume-title":"The Big Four: The Curious Past and Perilous Future of the Global Accounting Monopoly","author":"Simunic D. A.","year":"2019","unstructured":"Simunic , D. A. , & Biddle , G. C. ( 2019 ). The Big Four: The Curious Past and Perilous Future of the Global Accounting Monopoly . Simunic, D. A., & Biddle, G. C. (2019). The Big Four: The Curious Past and Perilous Future of the Global Accounting Monopoly."},{"issue":"2","key":"e_1_3_2_1_17_1","first-page":"96","article-title":"The impact of the risks of the input of accounting information systems on managerial control, accounting control and internal control in commercial banks in Jordan","volume":"13","author":"Mohammed A. L.","year":"2018","unstructured":"Mohammed , A. L. , Al-Hosban , A. , & Thnaibat , H. ( 2018 ). The impact of the risks of the input of accounting information systems on managerial control, accounting control and internal control in commercial banks in Jordan . International Journal of Business and Management , 13 ( 2 ), 96 -- 107 . Mohammed, A. L., Al-Hosban, A., & Thnaibat, H. (2018). The impact of the risks of the input of accounting information systems on managerial control, accounting control and internal control in commercial banks in Jordan. International Journal of Business and Management, 13(2), 96--107.","journal-title":"International Journal of Business and Management"},{"key":"e_1_3_2_1_18_1","volume-title":"Accounting fundamentals and systematic risk: Corporate failure over the business cycle. Chicago Booth Research Paper, (14--31), 14--37","author":"Ogneva M.","year":"2018","unstructured":"Ogneva , M. , Piotroski , J. D. , & Zakolyukina , A. A. ( 2018 ). Accounting fundamentals and systematic risk: Corporate failure over the business cycle. Chicago Booth Research Paper, (14--31), 14--37 . Ogneva, M., Piotroski, J. D., & Zakolyukina, A. A. (2018). Accounting fundamentals and systematic risk: Corporate failure over the business cycle. Chicago Booth Research Paper, (14--31), 14--37."},{"issue":"1","key":"e_1_3_2_1_19_1","first-page":"32","article-title":"Pane in the Glass: A Review of the Accounting Cycle","volume":"34","author":"Jones J. P.","year":"2019","unstructured":"Jones , J. P. , Long , J. H. , & Stanley , J. D. ( 2019 ). Pane in the Glass: A Review of the Accounting Cycle . Issues in Accounting Education Teaching Notes , 34 ( 1 ), 32 -- 53 . Jones, J. P., Long, J. H., & Stanley, J. D. (2019). Pane in the Glass: A Review of the Accounting Cycle. Issues in Accounting Education Teaching Notes, 34(1), 32--53.","journal-title":"Issues in Accounting Education Teaching Notes"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1093\/rfs\/hhy099"},{"key":"e_1_3_2_1_21_1","volume-title":"Corporate Life Cycle in Accounting & Finance: A Review of the Literature","author":"Habib A.","year":"2018","unstructured":"Habib , A. , & Hasan , M. M. ( 2018 ). Corporate Life Cycle in Accounting & Finance: A Review of the Literature . Habib, A., & Hasan, M. M. (2018). Corporate Life Cycle in Accounting & Finance: A Review of the Literature."},{"key":"e_1_3_2_1_22_1","volume-title":"Financial reporting: profitability ratios in the different stages of life cycle. Archives of Business Research, 6(11)","author":"Laitinen E. K.","year":"2018","unstructured":"Laitinen , E. K. , & Laitinen , T. ( 2018 ). Financial reporting: profitability ratios in the different stages of life cycle. Archives of Business Research, 6(11) . Laitinen, E. K., & Laitinen, T. (2018). Financial reporting: profitability ratios in the different stages of life cycle. Archives of Business Research, 6(11)."},{"key":"e_1_3_2_1_23_1","unstructured":"Yongjun W. (2007). Expenditure Cycle: the Logical Beginning Point for the Construction of Government Budgetary Accounting Framework-Concurrently Nuclear Proposition and Strategic Sequence about Government Accounting Reform in China [J]. Accounting Research 5.  Yongjun W. (2007). Expenditure Cycle: the Logical Beginning Point for the Construction of Government Budgetary Accounting Framework-Concurrently Nuclear Proposition and Strategic Sequence about Government Accounting Reform in China [J]. Accounting Research 5."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.2308\/iace.2010.25.1.179"},{"key":"e_1_3_2_1_25_1","volume-title":"Accounting lnformation Systems","author":"Bodnar G. H.","year":"2001","unstructured":"Bodnar , G. H. , & Hopwood , W. S. ( 2001 ). Accounting lnformation Systems . Bodnar, G. H., & Hopwood, W. S. (2001). Accounting lnformation Systems."},{"issue":"1","key":"e_1_3_2_1_26_1","first-page":"32","article-title":"Pane in the Glass: A Review of the Accounting Cycle","volume":"34","author":"Jones J. P.","year":"2019","unstructured":"Jones , J. P. , Long , J. H. , & Stanley , J. D. ( 2019 ). Pane in the Glass: A Review of the Accounting Cycle . Issues in Accounting Education Teaching Notes , 34 ( 1 ), 32 -- 53 . Jones, J. P., Long, J. H., & Stanley, J. D. (2019). Pane in the Glass: A Review of the Accounting Cycle. Issues in Accounting Education Teaching Notes, 34(1), 32--53.","journal-title":"Issues in Accounting Education Teaching Notes"},{"key":"e_1_3_2_1_27_1","volume-title":"Corporate financial accounting. Cengage Learning","author":"Warren C.","year":"2018","unstructured":"Warren , C. , & Jones , J. ( 2018 ). Corporate financial accounting. Cengage Learning . Warren, C., & Jones, J. (2018). Corporate financial accounting. Cengage Learning."},{"key":"e_1_3_2_1_28_1","volume-title":"Gleam Lighting: A Collaborative Experiential Payroll Fraud Case. Management Teaching Review, 2379298118811149","author":"Maynard-Patrick S.","year":"2018","unstructured":"Maynard-Patrick , S. , & Higgins , L. N. ( 2018 ). Gleam Lighting: A Collaborative Experiential Payroll Fraud Case. Management Teaching Review, 2379298118811149 Maynard-Patrick, S., & Higgins, L. N. (2018). Gleam Lighting: A Collaborative Experiential Payroll Fraud Case. Management Teaching Review, 2379298118811149"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.9770\/jesi.2018.6.1(13)"},{"key":"e_1_3_2_1_30_1","volume-title":"International journal of project management, 15(6), 335--344.","author":"Woodward D. G.","year":"1997","unstructured":"Woodward , D. G. ( 1997 ). Life cycle costing---theory, information acquisition and application . International journal of project management, 15(6), 335--344. Woodward, D. G. (1997). Life cycle costing---theory, information acquisition and application. International journal of project management, 15(6), 335--344."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/1984844"},{"key":"e_1_3_2_1_32_1","volume-title":"Introduction to Financial Accounting. Valley Educational Services Limited","author":"Annand D.","year":"2018","unstructured":"Annand , D. , & Dauderis , H. ( 2018 ). Introduction to Financial Accounting. Valley Educational Services Limited . Annand, D., & Dauderis, H. (2018). Introduction to Financial Accounting. Valley Educational Services Limited."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.4236\/me.2018.97076"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-646X.00078"},{"volume-title":"International Conference on Computational Science and Its Applications (pp. 382--394)","author":"Budiarto D. S.","key":"e_1_3_2_1_35_1","unstructured":"Budiarto , D. S. , Prabowo , M. A. , Djajanto , L. , Widodo , K. P. , & Herawan , T. (2018, May ). Accounting Information System (AIS) Alignment and Non-financial Performance in Small Firm: A Contingency Perspective . In International Conference on Computational Science and Its Applications (pp. 382--394) . Springer , Cham . Budiarto, D. S., Prabowo, M. A., Djajanto, L., Widodo, K. P., & Herawan, T. (2018, May). Accounting Information System (AIS) Alignment and Non-financial Performance in Small Firm: A Contingency Perspective. In International Conference on Computational Science and Its Applications (pp. 382--394). Springer, Cham."},{"key":"e_1_3_2_1_36_1","volume-title":"Crime Report","author":"FBI","year":"2018","unstructured":"FBI , Internet Crime Report 2018 . FBI, Internet Crime Report 2018."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/532719"},{"key":"e_1_3_2_1_38_1","volume-title":"A second wind for ERP. The McKinsey Quarterly, 100--100","author":"James D.","year":"2000","unstructured":"James , D. , & Wolf , M. L. ( 2000 ). A second wind for ERP. The McKinsey Quarterly, 100--100 James, D., & Wolf, M. L. (2000). A second wind for ERP. The McKinsey Quarterly, 100--100"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1057\/jors.1984.101"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SYSOSE.2006.1652284"},{"key":"e_1_3_2_1_41_1","volume-title":"An approach to measuring a system's attack surface(No. CMU-CS-07-146). CARNEGIE-MELLON UNIV PITTSBURGH PA SCHOOL OF COMPUTER SCIENCE","author":"Manadhata P. K.","year":"2007","unstructured":"Manadhata , P. K. , Tan , K. M. , Maxion , R. A. , & Wing , J. M. ( 2007 ). An approach to measuring a system's attack surface(No. CMU-CS-07-146). CARNEGIE-MELLON UNIV PITTSBURGH PA SCHOOL OF COMPUTER SCIENCE . Manadhata, P. K., Tan, K. M., Maxion, R. A., & Wing, J. M. (2007). An approach to measuring a system's attack surface(No. CMU-CS-07-146). CARNEGIE-MELLON UNIV PITTSBURGH PA SCHOOL OF COMPUTER SCIENCE."},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation (pp. 29--32)","author":"Sun K.","year":"2014","unstructured":"Sun , K. , & Jajodia , S. ( 2014 , November). Protecting enterprise networks through attack surface expansion . In Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation (pp. 29--32) . ACM. Sun, K., & Jajodia, S. (2014, November). Protecting enterprise networks through attack surface expansion. In Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation (pp. 29--32). ACM."},{"key":"e_1_3_2_1_43_1","volume-title":"Global Perspectives on Accounting Information Systems: Mobile and Cloud Approach Procedia Economics and Finance","author":"Claudiu Brandas Ovidiu Megan","year":"2015","unstructured":"Claudiu Brandas Ovidiu Megan Otniel Didraga ( 2015 ) Global Perspectives on Accounting Information Systems: Mobile and Cloud Approach Procedia Economics and Finance Volume 20 , 2015, Pages 88--93 Claudiu Brandas Ovidiu Megan Otniel Didraga (2015) Global Perspectives on Accounting Information Systems: Mobile and Cloud Approach Procedia Economics and Finance Volume 20, 2015, Pages 88--93"},{"key":"e_1_3_2_1_44_1","volume-title":"Tuttle (2015) Big Data in Accounting: An Overview","author":"Miklos A.","year":"2015","unstructured":"Miklos A. Vasarhelyi , Alexander Kogan, and Brad M . Tuttle (2015) Big Data in Accounting: An Overview . Accounting Horizons : June 2015 , Vol. 29 , No. 2, pp. 381--396. Miklos A. Vasarhelyi, Alexander Kogan, and Brad M. Tuttle (2015) Big Data in Accounting: An Overview. Accounting Horizons: June 2015, Vol. 29, No. 2, pp. 381--396."},{"key":"e_1_3_2_1_45_1","volume-title":"Lee D.T., Shieh S.P., Tygar J.D. (eds) Computer Security in the 21st Century","author":"Howard M.","year":"2005","unstructured":"Howard M. , Pincus J. , Wing J.M. ( 2005 ) Measuring Relative Attack Surfaces . In: Lee D.T., Shieh S.P., Tygar J.D. (eds) Computer Security in the 21st Century . Springer , Boston, MA Howard M., Pincus J., Wing J.M. (2005) Measuring Relative Attack Surfaces. In: Lee D.T., Shieh S.P., Tygar J.D. (eds) Computer Security in the 21st Century. Springer, Boston, MA"},{"key":"e_1_3_2_1_46_1","volume-title":"Quantifying the attack surface of a web application. Sicherheit","author":"Heumann T.","year":"2010","unstructured":"Heumann , T. , Keller , J. , & T\u00fcrpe , S. ( 2010 ). Quantifying the attack surface of a web application. Sicherheit 2010. Sicherheit, Schutz und Zuverl\u00e4ssigkeit . Heumann, T., Keller, J., & T\u00fcrpe, S. (2010). Quantifying the attack surface of a web application. Sicherheit 2010. Sicherheit, Schutz und Zuverl\u00e4ssigkeit."},{"volume-title":"Procedia Technology.","author":"Belfo F.","key":"e_1_3_2_1_47_1","unstructured":"Belfo F. , Trigo A. , 2013 , Accounting Information Systems: Tradition and future directions , Procedia Technology. Vol. 9 Pages 536--546. Belfo F., Trigo A., 2013, Accounting Information Systems: Tradition and future directions, Procedia Technology. Vol. 9 Pages 536--546."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11623-012-0220-5"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00199-4_8"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.5038\/2378-0789.3.2.1060"}],"event":{"name":"ICCBDC 2019: 2019 3rd International Conference on Cloud and Big Data Computing","sponsor":["Brookes Oxford Brookes University"],"location":"Oxford United Kingdom","acronym":"ICCBDC 2019"},"container-title":["Proceedings of the 2019 3rd International Conference on Cloud and Big Data Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3358505.3358513","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3358505.3358513","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:12Z","timestamp":1750202592000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3358505.3358513"}},"subtitle":["Assessing Security with Attack Surface Methodology"],"short-title":[],"issued":{"date-parts":[[2019,8,28]]},"references-count":50,"alternative-id":["10.1145\/3358505.3358513","10.1145\/3358505"],"URL":"https:\/\/doi.org\/10.1145\/3358505.3358513","relation":{},"subject":[],"published":{"date-parts":[[2019,8,28]]},"assertion":[{"value":"2019-08-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}