{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:16:37Z","timestamp":1750220197738,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,18]],"date-time":"2022-08-18T00:00:00Z","timestamp":1660780800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,18]]},"DOI":"10.1145\/3555962.3555969","type":"proceedings-article","created":{"date-parts":[[2022,10,18]],"date-time":"2022-10-18T20:59:41Z","timestamp":1666126781000},"page":"37-41","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Unstructured Over Structured, Big Data Analytics and Applications In Accounting and Management"],"prefix":"10.1145","author":[{"given":"Alessio","family":"Faccia","sequence":"first","affiliation":[{"name":"University of Birmingham Dubai, UAE and \rUniversity College London, UK"}]},{"given":"Luigi Pio Leonardo","family":"Cavaliere","sequence":"additional","affiliation":[{"name":"Universita di Foggia, Italy"}]},{"given":"Pythagoras","family":"Petratos","sequence":"additional","affiliation":[{"name":"Coventry University, UK"}]},{"given":"Narcisa Roxana","family":"Mosteanu","sequence":"additional","affiliation":[{"name":"American University in Malta, Malta"}]}],"member":"320","published-online":{"date-parts":[[2022,10,18]]},"reference":[{"volume-title":"2013 International Conference on Research and Innovation in Information Systems (ICRIIS)\u00a0(pp. 151-155)","author":"Abdullah M.F.","key":"e_1_3_2_1_1_1","unstructured":"Abdullah , M.F. and Ahmad , K ., 2013, November. The mapping process of unstructured data to structured data . 2013 International Conference on Research and Innovation in Information Systems (ICRIIS)\u00a0(pp. 151-155) . IEEE. Abdullah, M.F. and Ahmad, K., 2013, November. The mapping process of unstructured data to structured data. 2013 International Conference on Research and Innovation in Information Systems (ICRIIS)\u00a0(pp. 151-155). IEEE."},{"volume-title":"In\u00a02013 11th RoEduNet International Conference\u00a0(pp. 1-4). IEEE.","author":"Rusu O.","key":"e_1_3_2_1_2_1","unstructured":"Rusu , O. , Halcu , I. , Grigoriu , O. , Neculoiu , G. , Sandulescu , V. , Marinescu , M. and Marinescu , V ., 2013, January. Converting unstructured and semi-structured data into knowledge . In\u00a02013 11th RoEduNet International Conference\u00a0(pp. 1-4). IEEE. Rusu, O., Halcu, I., Grigoriu, O., Neculoiu, G., Sandulescu, V., Marinescu, M. and Marinescu, V., 2013, January. Converting unstructured and semi-structured data into knowledge. In\u00a02013 11th RoEduNet International Conference\u00a0(pp. 1-4). IEEE."},{"key":"e_1_3_2_1_3_1","unstructured":"Teradata 2022 What is semi-structured data. Available at: https:\/\/www.teradata.com\/Glossary\/What-is-Semi-Structured-Data#:\u223c:text=Semi%2Dstructured%20data%20refers%20to not%20have%20a%20fixed%20schema. (accessed on 19.06.2022)  Teradata 2022 What is semi-structured data. Available at: https:\/\/www.teradata.com\/Glossary\/What-is-Semi-Structured-Data#:\u223c:text=Semi%2Dstructured%20data%20refers%20to not%20have%20a%20fixed%20schema. (accessed on 19.06.2022)"},{"key":"e_1_3_2_1_4_1","unstructured":"Mosteanu N.R. and Faccia A. 2020. Digital systems and new challenges of financial management\u2013FinTech XBRL Blockchain and cryptocurrencies.\u00a0Quality-Access to Success Journal \u00a021(174) pp.159-166.  Mosteanu N.R. and Faccia A. 2020. Digital systems and new challenges of financial management\u2013FinTech XBRL Blockchain and cryptocurrencies.\u00a0Quality-Access to Success Journal \u00a021(174) pp.159-166."},{"volume-title":"In\u00a0Proceedings of the 2019 3rd International Conference on Cloud and Big Data Computing\u00a0(pp. 31-37)","author":"Faccia A.","key":"e_1_3_2_1_5_1","unstructured":"Faccia , A. , Al Naqbi , M.Y.K. and Lootah , S.A ., 2019, August. Integrated cloud financial accounting cycle: how artificial intelligence, Blockchain, and XBRL will change the accounting, fiscal and auditing practices . In\u00a0Proceedings of the 2019 3rd International Conference on Cloud and Big Data Computing\u00a0(pp. 31-37) . Faccia, A., Al Naqbi, M.Y.K. and Lootah, S.A., 2019, August. Integrated cloud financial accounting cycle: how artificial intelligence, Blockchain, and XBRL will change the accounting, fiscal and auditing practices. In\u00a0Proceedings of the 2019 3rd International Conference on Cloud and Big Data Computing\u00a0(pp. 31-37)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Faccia A. Manni F. and Capitanio F. 2021. Mandatory ESG Reporting and XBRL Taxonomies Combination: ESG Ratings and Income Statement a Sustainable Value-Added Disclosure.\u00a0Sustainability \u00a013(16) p.8876.  Faccia A. Manni F. and Capitanio F. 2021. Mandatory ESG Reporting and XBRL Taxonomies Combination: ESG Ratings and Income Statement a Sustainable Value-Added Disclosure.\u00a0Sustainability \u00a013(16) p.8876.","DOI":"10.3390\/su13168876"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Feldman R. 1999 August. Mining unstructured data. In\u00a0Tutorial notes of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining\u00a0(pp. 182-236).  Feldman R. 1999 August. Mining unstructured data. In\u00a0Tutorial notes of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining\u00a0(pp. 182-236).","DOI":"10.1145\/312179.312192"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Li W. and Lang B. 2010. A tetrahedral data model for unstructured data management.\u00a0Science China Information Sciences \u00a053(8) pp.1497-1510.  Li W. and Lang B. 2010. A tetrahedral data model for unstructured data management.\u00a0Science China Information Sciences \u00a053(8) pp.1497-1510.","DOI":"10.1007\/s11432-010-4030-9"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Satish L. and Yusof N. 2017. A review: big data analytics for enhanced customer experiences with crowd sourcing. Procedia computer science 116 pp.274-283.  Satish L. and Yusof N. 2017. A review: big data analytics for enhanced customer experiences with crowd sourcing. Procedia computer science 116 pp.274-283.","DOI":"10.1016\/j.procs.2017.10.058"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Feldman R. and Sanger J. 2007. The text mining handbook: advanced approaches in analysing unstructured data. Cambridge university press.  Feldman R. and Sanger J. 2007. The text mining handbook: advanced approaches in analysing unstructured data. Cambridge university press.","DOI":"10.1017\/CBO9780511546914"},{"volume-title":"2017 IEEE 2nd International Conference on Big Data Analysis (ICBDA) (pp. 89-93)","author":"Kalid S.","key":"e_1_3_2_1_11_1","unstructured":"Kalid , S. , Syed , A. , Mohammad , A. and Halgamuge , M.N. , 2017, March . Big-data NoSQL databases: A comparison and analysis of \u201cBig-Table \u201d,\u201cDynamoDB\u201d, and \u201cCassandra\u201d. In 2017 IEEE 2nd International Conference on Big Data Analysis (ICBDA) (pp. 89-93) . IEEE. Kalid, S., Syed, A., Mohammad, A. and Halgamuge, M.N., 2017, March. Big-data NoSQL databases: A comparison and analysis of \u201cBig-Table\u201d,\u201cDynamoDB\u201d, and \u201cCassandra\u201d. In 2017 IEEE 2nd International Conference on Big Data Analysis (ICBDA) (pp. 89-93). IEEE."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.58"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2926751"},{"volume-title":"2015 4th International Conference on Reliability, Infocom Technologies and Optimisation (ICRITO)(Trends and Future Directions) (pp. 1-6). IEEE.","author":"Tanwar M.","key":"e_1_3_2_1_14_1","unstructured":"Tanwar , M. , Duggal , R. and Khatri , S.K ., 2015, September. Unravelling unstructured data: A wealth of information in big data . In 2015 4th International Conference on Reliability, Infocom Technologies and Optimisation (ICRITO)(Trends and Future Directions) (pp. 1-6). IEEE. Tanwar, M., Duggal, R. and Khatri, S.K., 2015, September. Unravelling unstructured data: A wealth of information in big data. In 2015 4th International Conference on Reliability, Infocom Technologies and Optimisation (ICRITO)(Trends and Future Directions) (pp. 1-6). IEEE."},{"volume-title":"Proceedings of the 4th ACM workshop on Scientific cloud computing (pp. 13-20)","author":"Dede E.","key":"e_1_3_2_1_15_1","unstructured":"Dede , E. , Govindaraju , M. , Gunter , D. , Canon , RS and Ramakrishnan , L ., 2013, June. Performance evaluation of a mongodb and hadoop platform for scientific data analysis . In Proceedings of the 4th ACM workshop on Scientific cloud computing (pp. 13-20) . Dede, E., Govindaraju, M., Gunter, D., Canon, RS and Ramakrishnan, L., 2013, June. Performance evaluation of a mongodb and hadoop platform for scientific data analysis. In Proceedings of the 4th ACM workshop on Scientific cloud computing (pp. 13-20)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Azad P. Navimipour N.J. Rahmani A.M. and Sharifi A. 2020. The role of structured and unstructured data managing mechanisms in the Internet of things. Cluster computing 23(2) pp.1185-1198.  Azad P. Navimipour N.J. Rahmani A.M. and Sharifi A. 2020. The role of structured and unstructured data managing mechanisms in the Internet of things. Cluster computing 23(2) pp.1185-1198.","DOI":"10.1007\/s10586-019-02986-2"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1232"},{"volume-title":"The economics of artificial intelligence: An agenda (pp. 61-87)","author":"Taddy M.","key":"e_1_3_2_1_18_1","unstructured":"Taddy , M. , 2018. The technological elements of artificial intelligence . In The economics of artificial intelligence: An agenda (pp. 61-87) . University of Chicago Press. Taddy, M., 2018. The technological elements of artificial intelligence. In The economics of artificial intelligence: An agenda (pp. 61-87). University of Chicago Press."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2020.11.001"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1017\/S1351324916000383"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10243079"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.35940\/ijrte.B1074.0882S819"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"G\u00e4rtner B. and Hiebl M.R. 2017. Issues with big data. In The Routledge companion to accounting information systems (pp. 161-172). Routledge.  G\u00e4rtner B. and Hiebl M.R. 2017. Issues with big data. In The Routledge companion to accounting information systems (pp. 161-172). Routledge.","DOI":"10.4324\/9781315647210-13"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-019-0254-8"},{"issue":"6","key":"e_1_3_2_1_25_1","first-page":"2446","article-title":"The future revolution on big data","volume":"2","author":"Syed A.","year":"2013","unstructured":"Syed , A. , Gillela , K. and Venugopal , C. , 2013 . The future revolution on big data . Future , 2 ( 6 ), pp. 2446 - 2451 . Syed, A., Gillela, K. and Venugopal, C., 2013. The future revolution on big data. Future, 2(6), pp.2446-2451.","journal-title":"Future"},{"issue":"4","key":"e_1_3_2_1_26_1","first-page":"15","article-title":"Structured and unstructured search in enterprises","volume":"24","author":"Raghavan P.","year":"2001","unstructured":"Raghavan , P. , 2001 . Structured and unstructured search in enterprises . IEEE Data Eng. Bull. , 24 ( 4 ), pp. 15 - 18 . Raghavan, P., 2001. Structured and unstructured search in enterprises. IEEE Data Eng. Bull., 24(4), pp.15-18.","journal-title":"IEEE Data Eng. Bull."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2014.2346659"},{"key":"e_1_3_2_1_28_1","first-page":"293","volume-title":"Big data: Dimensions, evolution, impacts, and challenges. Business horizons, 60(3)","author":"Lee I.","unstructured":"Lee , I. , 2017. Big data: Dimensions, evolution, impacts, and challenges. Business horizons, 60(3) , pp. 293 - 303 . Lee, I., 2017. Big data: Dimensions, evolution, impacts, and challenges. Business horizons, 60(3), pp.293-303."},{"volume-title":"2016 International Conference on Computing, Communication and Automation (ICCCA) (pp. 60-64)","author":"Chaudhari N.","key":"e_1_3_2_1_29_1","unstructured":"Chaudhari , N. and Srivastava , S ., 2016, April. Big data security issues and challenges . In 2016 International Conference on Computing, Communication and Automation (ICCCA) (pp. 60-64) . IEEE. Chaudhari, N. and Srivastava, S., 2016, April. Big data security issues and challenges. In 2016 International Conference on Computing, Communication and Automation (ICCCA) (pp. 60-64). IEEE."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Negash S. and Gray P. 2008. Business intelligence. In Handbook on decision support systems 2 (pp. 175-193). Springer Berlin Heidelberg.  Negash S. and Gray P. 2008. Business intelligence. In Handbook on decision support systems 2 (pp. 175-193). Springer Berlin Heidelberg.","DOI":"10.1007\/978-3-540-48716-6_9"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Stevens L. and Wrenn C. 2013. Exploratory (qualitative) research. Concise encyclopedia of church and religious organisation marketing 53.  Stevens L. and Wrenn C. 2013. Exploratory (qualitative) research. Concise encyclopedia of church and religious organisation marketing 53.","DOI":"10.4324\/9780203725443"},{"volume-title":"Impacts of big data on accounting","author":"Herath","key":"e_1_3_2_1_32_1","unstructured":"Herath , Siriyama Kanthi, and Destiny Woods . \u201c Impacts of big data on accounting .\u201d e-Business & Administration Review 12, no. 2 (2021): 186-193. Herath, Siriyama Kanthi, and Destiny Woods. \u201cImpacts of big data on accounting.\u201d e-Business & Administration Review 12, no. 2 (2021): 186-193."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Fang B. and Zhang P. 2016. Big data in finance. In Big data concepts theories and applications (pp. 391-412). Springer Cham.  Fang B. and Zhang P. 2016. Big data in finance. In Big data concepts theories and applications (pp. 391-412). Springer Cham.","DOI":"10.1007\/978-3-319-27763-9_11"},{"volume-title":"2013 Sixth international conference on contemporary computing (IC3) (pp. 404-409)","author":"Katal A.","key":"e_1_3_2_1_34_1","unstructured":"Katal , A. , Wazid , M. and Goudar , R.H ., 2013, August. Big data: issues, challenges, tools and good practices . In 2013 Sixth international conference on contemporary computing (IC3) (pp. 404-409) . IEEE. Katal, A., Wazid, M. and Goudar, R.H., 2013, August. Big data: issues, challenges, tools and good practices. In 2013 Sixth international conference on contemporary computing (IC3) (pp. 404-409). IEEE."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Vassakis K. Petrakis E. and Kopanakis I. 2018. Big data analytics: applications prospects and challenges. Mobile big data pp.3-20.  Vassakis K. Petrakis E. and Kopanakis I. 2018. Big data analytics: applications prospects and challenges. Mobile big data pp.3-20.","DOI":"10.1007\/978-3-319-67925-9_1"},{"key":"e_1_3_2_1_36_1","first-page":"29","volume-title":"From unstructured data to actionable intelligence.\u00a0IT professional,\u00a05(6)","author":"Rao R.","unstructured":"Rao , R. , 2003. From unstructured data to actionable intelligence.\u00a0IT professional,\u00a05(6) , pp. 29 - 35 . Rao, R., 2003. From unstructured data to actionable intelligence.\u00a0IT professional,\u00a05(6), pp.29-35."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Chernyakov M. and Chernyakova M. 2018. Technological risks of the digital economy.\u00a0Corporate Finance \u00a012(4) pp.99-109.  Chernyakov M. and Chernyakova M. 2018. Technological risks of the digital economy.\u00a0Corporate Finance \u00a012(4) pp.99-109.","DOI":"10.17323\/j.jcfr.2073-0438.12.4.2018.99-109"},{"key":"e_1_3_2_1_38_1","first-page":"598","volume-title":"Data science for building energy management: A review.\u00a0Renewable and Sustainable Energy Reviews,\u00a070","author":"Molina-Solana M.","unstructured":"Molina-Solana , M. , Ros , M. , Ruiz , M.D. , G\u00f3mez-Romero , J. and Mart\u00edn-Bautista , M.J. , 2017. Data science for building energy management: A review.\u00a0Renewable and Sustainable Energy Reviews,\u00a070 , pp. 598 - 609 . Molina-Solana, M., Ros, M., Ruiz, M.D., G\u00f3mez-Romero, J. and Mart\u00edn-Bautista, M.J., 2017. Data science for building energy management: A review.\u00a0Renewable and Sustainable Energy Reviews,\u00a070, pp.598-609."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Nguyen G. Dlugolinsky S. Bob\u00e1k M. Tran V. L\u00f3pez Garc\u00eda \u00c1. Heredia I. Mal\u00edk P. and Hluch\u00fd L. 2019. Machine learning and deep learning frameworks and libraries for large-scale data mining: a survey.\u00a0Artificial Intelligence Review \u00a052(1) pp.77-124.  Nguyen G. Dlugolinsky S. Bob\u00e1k M. Tran V. L\u00f3pez Garc\u00eda \u00c1. Heredia I. Mal\u00edk P. and Hluch\u00fd L. 2019. Machine learning and deep learning frameworks and libraries for large-scale data mining: a survey.\u00a0Artificial Intelligence Review \u00a052(1) pp.77-124.","DOI":"10.1007\/s10462-018-09679-z"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Dikaiakos M.D. Katsaros D. Mehra P. Pallis G. and Vakali A. 2009. Cloud computing: Distributed internet computing for IT and scientific research.\u00a0IEEE Internet computing \u00a013(5) pp.10-13.  Dikaiakos M.D. Katsaros D. Mehra P. Pallis G. and Vakali A. 2009. Cloud computing: Distributed internet computing for IT and scientific research.\u00a0IEEE Internet computing \u00a013(5) pp.10-13.","DOI":"10.1109\/MIC.2009.103"},{"issue":"1","key":"e_1_3_2_1_41_1","first-page":"46","article-title":"Unstructured data: How to implement an early warning system for hidden risks","volume":"217","author":"Beach C.S.","year":"2014","unstructured":"Beach , C.S. and Schiefelbein , W.R. , 2014 . Unstructured data: How to implement an early warning system for hidden risks . Journal of Accountancy , 217 ( 1 ), pp. 46 - 51 . Available at: https:\/\/www.journalofaccountancy.com\/issues\/2014\/jan\/20126972.html (accessed on 19.06.2022) Beach, C.S. and Schiefelbein, W.R., 2014. Unstructured data: How to implement an early warning system for hidden risks. Journal of Accountancy, 217(1), pp.46-51. Available at: https:\/\/www.journalofaccountancy.com\/issues\/2014\/jan\/20126972.html (accessed on 19.06.2022)","journal-title":"Journal of Accountancy"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Avallone F. Ramassa P. and Roncagliolo E. 2016. XBRL Extension to the Financial Statement Notes: Field-based Evidence on Unlisted Companies.\u00a0International Journal of Digital Accounting Research \u00a016.  Avallone F. Ramassa P. and Roncagliolo E. 2016. XBRL Extension to the Financial Statement Notes: Field-based Evidence on Unlisted Companies.\u00a0International Journal of Digital Accounting Research \u00a016.","DOI":"10.4192\/1577-8517-v16_3"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Lesabe R.A.F. and Nkosi J. 2007. A qualitative exploration of employees\u2019 views on organisational commitment.\u00a0SA journal of human resource management \u00a05(1) pp.35-44.  Lesabe R.A.F. and Nkosi J. 2007. A qualitative exploration of employees\u2019 views on organisational commitment.\u00a0SA journal of human resource management \u00a05(1) pp.35-44.","DOI":"10.4102\/sajhrm.v5i1.106"},{"key":"e_1_3_2_1_44_1","unstructured":"Veeranjaneyulu N. Bhat M.N. and Raghunath A. 2014. Approaches for managing and analysing unstructured data.\u00a0International Journal on Computer Science and Engineering \u00a06(1) p.19.  Veeranjaneyulu N. Bhat M.N. and Raghunath A. 2014. Approaches for managing and analysing unstructured data.\u00a0International Journal on Computer Science and Engineering \u00a06(1) p.19."},{"volume-title":"In\u00a036th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the\u00a0(pp. 10-pp). IEEE.","author":"Searcy D.","key":"e_1_3_2_1_45_1","unstructured":"Searcy , D. , Woodroof , J. and Behn , B ., 2003, January. Continuous audit: the motivations, benefits, problems, and challenges identified by partners of a Big 4 accounting firm . In\u00a036th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the\u00a0(pp. 10-pp). IEEE. Searcy, D., Woodroof, J. and Behn, B., 2003, January. Continuous audit: the motivations, benefits, problems, and challenges identified by partners of a Big 4 accounting firm. In\u00a036th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the\u00a0(pp. 10-pp). IEEE."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Mackevi\u010dius J. and Kazlauskien\u0117 L. 2009. The fraud tree and its investigation in audit.\u00a0Ekonomika \u00a085 pp.90-101.  Mackevi\u010dius J. and Kazlauskien\u0117 L. 2009. The fraud tree and its investigation in audit.\u00a0Ekonomika \u00a085 pp.90-101.","DOI":"10.15388\/Ekon.2009.0.5118"},{"key":"e_1_3_2_1_47_1","volume-title":"Panama Papers: How Data Science fought corruption.\u00a0Available at SSRN 3644821.","author":"Mukhopadhyay M.","year":"2020","unstructured":"Mukhopadhyay , M. and Ghosh , K. , 2020 . Panama Papers: How Data Science fought corruption.\u00a0Available at SSRN 3644821. Mukhopadhyay, M. and Ghosh, K., 2020. Panama Papers: How Data Science fought corruption.\u00a0Available at SSRN 3644821."},{"key":"e_1_3_2_1_48_1","first-page":"753","volume-title":"Data mining for statistical analysis of money laundering transactions.\u00a0Journal of Money Laundering Control,\u00a022(4)","author":"Lokanan M.E.","unstructured":"Lokanan , M.E. , 2019. Data mining for statistical analysis of money laundering transactions.\u00a0Journal of Money Laundering Control,\u00a022(4) , pp. 753 - 763 . Lokanan, M.E., 2019. Data mining for statistical analysis of money laundering transactions.\u00a0Journal of Money Laundering Control,\u00a022(4), pp.753-763."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Tang J. and Karim K.E. 2018. Financial fraud detection and big data analytics\u2013implications on auditors\u2019 use of fraud brainstorming session.\u00a0Managerial Auditing Journal.  Tang J. and Karim K.E. 2018. Financial fraud detection and big data analytics\u2013implications on auditors\u2019 use of fraud brainstorming session.\u00a0Managerial Auditing Journal.","DOI":"10.1108\/MAJ-01-2018-1767"},{"key":"e_1_3_2_1_50_1","first-page":"1079","volume-title":"Online Classroom: Using Video Analytics and Machine Learning to Understand the Consumption of Video Courseware.\u00a0Journal of Marketing Research,\u00a058(6)","author":"Zhou M.","year":"2021","unstructured":"Zhou , M. , Chen , G.H. , Ferreira , P. and Smith , M.D. , 2021 . Consumer Behavior in the Online Classroom: Using Video Analytics and Machine Learning to Understand the Consumption of Video Courseware.\u00a0Journal of Marketing Research,\u00a058(6) , pp. 1079 - 1100 . Zhou, M., Chen, G.H., Ferreira, P. and Smith, M.D., 2021. Consumer Behavior in the Online Classroom: Using Video Analytics and Machine Learning to Understand the Consumption of Video Courseware.\u00a0Journal of Marketing Research,\u00a058(6), pp.1079-1100."},{"issue":"2","key":"e_1_3_2_1_51_1","first-page":"1","article-title":"AIS in an Age of Big Data.\u00a0J","volume":"27","author":"Moffitt K.C.","year":"2013","unstructured":"Moffitt , K.C. and Vasarhelyi , M.A. , 2013 . AIS in an Age of Big Data.\u00a0J . Inf. Syst.,\u00a0 27 ( 2 ), pp. 1 - 19 . Moffitt, K.C. and Vasarhelyi, M.A., 2013. AIS in an Age of Big Data.\u00a0J. Inf. Syst.,\u00a027(2), pp.1-19.","journal-title":"Inf. Syst.,\u00a0"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","unstructured":"Dong W. Liao S. and Zhang Z. 2018. Leveraging financial social media data for corporate fraud detection.\u00a0Journal of Management Information Systems \u00a035(2) pp.461-487.  Dong W. Liao S. and Zhang Z. 2018. Leveraging financial social media data for corporate fraud detection.\u00a0Journal of Management Information Systems \u00a035(2) pp.461-487.","DOI":"10.1080\/07421222.2018.1451954"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"crossref","unstructured":"Gupta R. and Gill N.S. 2012. Financial statement fraud detection using text mining.\u00a0International Journal of Advanced Computer Science and Applications \u00a03(12).  Gupta R. and Gill N.S. 2012. Financial statement fraud detection using text mining.\u00a0International Journal of Advanced Computer Science and Applications \u00a03(12).","DOI":"10.14569\/IJACSA.2012.031230"},{"volume-title":"December. Securing Energy Networks: Blockchain and Accounting Systems. In\u00a02021 International Conference on Electrical, Computer and Energy Technologies (ICECET)\u00a0(pp. 1-5). IEEE.","author":"Petratos P.","key":"e_1_3_2_1_54_1","unstructured":"Petratos , P. and Faccia , A ., 2021 , December. Securing Energy Networks: Blockchain and Accounting Systems. In\u00a02021 International Conference on Electrical, Computer and Energy Technologies (ICECET)\u00a0(pp. 1-5). IEEE. Petratos, P. and Faccia, A., 2021, December. Securing Energy Networks: Blockchain and Accounting Systems. In\u00a02021 International Conference on Electrical, Computer and Energy Technologies (ICECET)\u00a0(pp. 1-5). IEEE."},{"volume-title":"In\u00a0Proceedings of the 2019 3rd International Conference on Cloud and Big Data Computing\u00a0(pp. 100-105)","author":"Petratos P.","key":"e_1_3_2_1_55_1","unstructured":"Petratos , P. and Faccia , A ., 2019, August. Accounting information systems and systems: Assessing security with attack surface methodology . In\u00a0Proceedings of the 2019 3rd International Conference on Cloud and Big Data Computing\u00a0(pp. 100-105) . Petratos, P. and Faccia, A., 2019, August. Accounting information systems and systems: Assessing security with attack surface methodology. In\u00a0Proceedings of the 2019 3rd International Conference on Cloud and Big Data Computing\u00a0(pp. 100-105)."},{"volume-title":"January. Unstructured Data for Cybersecurity and Internal Control. In\u00a0Proceedings of the 53rd Hawaii International Conference on System Sciences.","author":"Canel\u00f3n J.","key":"e_1_3_2_1_56_1","unstructured":"Canel\u00f3n , J. , Huerta , E. , Leal , N. and Ryan , T ., 2020 , January. Unstructured Data for Cybersecurity and Internal Control. In\u00a0Proceedings of the 53rd Hawaii International Conference on System Sciences. Canel\u00f3n, J., Huerta, E., Leal, N. and Ryan, T., 2020, January. Unstructured Data for Cybersecurity and Internal Control. In\u00a0Proceedings of the 53rd Hawaii International Conference on System Sciences."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"crossref","unstructured":"Ignaczak L. Goldschmidt G. Costa C.A.D. and Righi R.D.R. 2021. Text mining in cybersecurity: A systematic literature review.\u00a0ACM Computing Surveys (CSUR) \u00a054(7) pp.1-36.  Ignaczak L. Goldschmidt G. Costa C.A.D. and Righi R.D.R. 2021. Text mining in cybersecurity: A systematic literature review.\u00a0ACM Computing Surveys (CSUR) \u00a054(7) pp.1-36.","DOI":"10.1145\/3462477"},{"key":"e_1_3_2_1_58_1","unstructured":"PAN G. and SEOW PS 2015. From Data Analysis to Intelligent Accounting: Impact of Analytics on Accounting Function.  PAN G. and SEOW PS 2015. From Data Analysis to Intelligent Accounting: Impact of Analytics on Accounting Function."},{"key":"e_1_3_2_1_59_1","unstructured":"Aldy J.E. and Gianfrate G. 2019. Future-proof your climate strategy.\u00a0Harvard Business Review \u00a04 pp.16-86.  Aldy J.E. and Gianfrate G. 2019. Future-proof your climate strategy.\u00a0Harvard Business Review \u00a04 pp.16-86."},{"key":"e_1_3_2_1_60_1","volume-title":"\u201cData loss prevention by using MRSH-v2 algorithm.\u201d\u00a0International Journal of Electrical & Computer Engineering (2088-8708)\u00a010, no. 4","author":"Ali","year":"2020","unstructured":"Ali , Basheer Husham, Ahmed Adeeb Jalal , and Wasseem N. Ibrahem Al-Obaydy . \u201cData loss prevention by using MRSH-v2 algorithm.\u201d\u00a0International Journal of Electrical & Computer Engineering (2088-8708)\u00a010, no. 4 ( 2020 ). Ali, Basheer Husham, Ahmed Adeeb Jalal, and Wasseem N. Ibrahem Al-Obaydy. \u201cData loss prevention by using MRSH-v2 algorithm.\u201d\u00a0International Journal of Electrical & Computer Engineering (2088-8708)\u00a010, no. 4 (2020)."},{"key":"e_1_3_2_1_61_1","unstructured":"Thirtyseven4 Endpoint Security 7.6. 2022. Available at: http:\/\/updates.thirtyseven4.com\/builds\/2017\/eps7.6\/manual.pdf (accessed on 19.06.2022)  Thirtyseven4 Endpoint Security 7.6. 2022. Available at: http:\/\/updates.thirtyseven4.com\/builds\/2017\/eps7.6\/manual.pdf (accessed on 19.06.2022)"}],"event":{"name":"ICCBDC 2022: 2022 6th International Conference on Cloud and Big Data Computing","acronym":"ICCBDC 2022","location":"Birmingham United Kingdom"},"container-title":["Proceedings of the 2022 6th International Conference on Cloud and Big Data Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3555962.3555969","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3555962.3555969","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:41Z","timestamp":1750186961000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3555962.3555969"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,18]]},"references-count":61,"alternative-id":["10.1145\/3555962.3555969","10.1145\/3555962"],"URL":"https:\/\/doi.org\/10.1145\/3555962.3555969","relation":{},"subject":[],"published":{"date-parts":[[2022,8,18]]},"assertion":[{"value":"2022-10-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}