{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T13:07:24Z","timestamp":1770469644993,"version":"3.49.0"},"reference-count":58,"publisher":"American Accounting Association","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6,1]]},"DOI":"10.2308\/isys-10395","type":"journal-article","created":{"date-parts":[[2014,6,13]],"date-time":"2014-06-13T15:16:00Z","timestamp":1402672560000},"page":"1-17","source":"Crossref","is-referenced-by-count":39,"title":["Big Questions in AIS Research: Measurement, Information Processing, Data Analysis, and Reporting"],"prefix":"10.2308","volume":"28","author":[{"given":"Qi","family":"Liu","sequence":"first","affiliation":[{"name":"Rutgers, The State University of New Jersey"}]},{"given":"Miklos A.","family":"Vasarhelyi","sequence":"additional","affiliation":[{"name":"Rutgers, The State University of New Jersey"}]}],"member":"1112","published-online":{"date-parts":[[2014,6,1]]},"reference":[{"key":"2024082915392244200_i1558-7959-28-1-1-Alles1","unstructured":"Alles, M. G., \n            \n              A. Kogan, and M. A. Vasarhelyi. \n          2009. Principles and Problems of Audit Automation as a Precursor for Continuous Auditing. Proceedings of the 6th Biannual Research Symposium, Toronto, Canada."},{"key":"2024082915392244200_i1558-7959-28-1-1-AICPA1","unstructured":"American Institute of Certified Public Accountants (AICPA). 2012. Accounting Services: Harness the Power of the Cloud. White paper. New York, NY: AICPA."},{"issue":"Spring","key":"2024082915392244200_i1558-7959-28-1-1-Arbore1","article-title":"Understanding personal mobile technologies: Decomposing and de-averaging the value of a smartphone","author":"Arbore","year":"2014","journal-title":"Journal of Information Systems"},{"issue":"15","key":"2024082915392244200_i1558-7959-28-1-1-Atzori1","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","article-title":"The Internet of things: A survey","volume":"54","author":"Atzori","year":"2010","journal-title":"Computer Networks"},{"issue":"4","key":"2024082915392244200_i1558-7959-28-1-1-Basu1","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2308\/acch.2008.22.4.425","article-title":"Panel on big unanswered questions in accounting\u2014genesis","volume":"22","author":"Basu","year":"2008","journal-title":"Accounting Horizons"},{"key":"2024082915392244200_i1558-7959-28-1-1-Beaver1","doi-asserted-by":"crossref","DOI":"10.2307\/2490171","article-title":"Financial ratios as predictors of failures","author":"Beaver","year":"1966","journal-title":"Journal of Accounting Research"},{"issue":"Spring","key":"2024082915392244200_i1558-7959-28-1-1-Wheeler1","article-title":"The effect of changes in decision aid bias on learning: Evidence of functional fixation","author":"Beck","year":"2014","journal-title":"Journal of Information Systems"},{"issue":"1","key":"2024082915392244200_i1558-7959-28-1-1-Biggs1","first-page":"148","article-title":"Auditor's use of analytical review in audit program design","volume":"63","author":"Biggs","year":"1988","journal-title":"The Accounting Review"},{"key":"2024082915392244200_i1558-7959-28-1-1-Burg1","unstructured":"Burg, H. J. \n          \n          2007. The Dutch Taxonomy Project: Goals, Experiences and Lessons Learned. SBR\/XBRL International Conference, November 27\u201328."},{"key":"2024082915392244200_i1558-7959-28-1-1-Carr1","article-title":"The Big Switch: Rewiring the World, from Edison to Google","author":"Carr","year":"2013"},{"issue":"2","key":"2024082915392244200_i1558-7959-28-1-1-Chen1","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2008.03.020","article-title":"Using neural networks and data mining techniques for the financial distress prediction model","volume":"36","author":"Chen","year":"2009","journal-title":"Experts Systems with Applications"},{"issue":"Spring","key":"2024082915392244200_i1558-7959-28-1-1-Loraas1","article-title":"Understanding compliance with Bring Your Own Device policies utilizing protection motivation theory: Bridging the intention-behavior gap","author":"Crossler","year":"2014","journal-title":"Journal of Information Systems"},{"key":"2024082915392244200_i1558-7959-28-1-1-Cukier1","unstructured":"Cukier, K. N., and V. Mayer-Schoenberger. \n          2013. The Rise of Big Data. Available at: http:\/\/www.foreignaffairs.com\/articles\/139104\/kenneth-neil-cukier-and-viktor-mayer-schoenberger\/the-rise-of-big-data"},{"issue":"4","key":"2024082915392244200_i1558-7959-28-1-1-Daily1","article-title":"The feasibility of reporting forecasted information","volume":"46","author":"Daily","year":"1971","journal-title":"The Accounting Review"},{"issue":"1","key":"2024082915392244200_i1558-7959-28-1-1-Deakin1","doi-asserted-by":"crossref","first-page":"167","DOI":"10.2307\/2490225","article-title":"A discriminant analysis of predictors of business failure","volume":"10","author":"Deakin","year":"1972","journal-title":"Journal of Accounting Research"},{"key":"2024082915392244200_i1558-7959-28-1-1-Economist1","unstructured":"Economist, The. 2002. The real time economy: How about now? (February 2)."},{"key":"2024082915392244200_i1558-7959-28-1-1-FinancialAccountingStandardsBoardFASB1","unstructured":"Financial Accounting Standards Board (FASB). 1980. Qualitative Characteristics of Accounting Information Systems. Statement of Financial Accounting Concept No. 2. Norwalk, CT: FASB."},{"issue":"1","key":"2024082915392244200_i1558-7959-28-1-1-Gal1","doi-asserted-by":"crossref","first-page":"81","DOI":"10.2308\/jeta.2008.5.1.81","article-title":"Query issues in continuous reporting systems","volume":"5","author":"Gal","year":"2008","journal-title":"Journal of Emerging Technologies in Accounting"},{"issue":"2","key":"2024082915392244200_i1558-7959-28-1-1-Gal2","article-title":"Artificial intelligence and research in accounting information systems: Opportunities and issues","volume":"1","author":"Gal","year":"1987","journal-title":"Journal of Information Systems"},{"issue":"2","key":"2024082915392244200_i1558-7959-28-1-1-Greenstein1","doi-asserted-by":"crossref","first-page":"87","DOI":"10.2308\/jis.2003.17.2.87","article-title":"Extending the accounting brand to privacy services","volume":"17","author":"Greenstein","year":"2003","journal-title":"Journal of Information Systems"},{"issue":"1","key":"2024082915392244200_i1558-7959-28-1-1-Guazzelli1","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1145\/1656274.1656281","article-title":"Efficient deployment of predictive analytics through open standards and cloud computing","volume":"11","author":"Guazzelli","year":"2009","journal-title":"ACM SIGKDD Explorations Newsletter"},{"key":"2024082915392244200_i1558-7959-28-1-1-HFSResearch1","unstructured":"HFS Research. 2013. State of the Outsourcing Industry 2013: Executive Findings. Available at: http:\/\/www.kpmginstitutes.com\/shared-services-outsourcing-institute\/insights\/2013\/pdf\/state-of-outsourcing-2013-exec-findings-hfs.pdf"},{"issue":"Spring","key":"2024082915392244200_i1558-7959-28-1-1-Hong1","article-title":"A survey of privacy-aware supply chain collaboration: From theory to applications","author":"Hong","year":"2014","journal-title":"Journal of Information Systems"},{"key":"2024082915392244200_i1558-7959-28-1-1-Intuit1","unstructured":"Intuit. 2013. The Intuit 2013 Future of Accountancy Report. Available at: https:\/\/blog.accountants.intuit.com\/wp-content\/uploads\/2013\/10\/Intuit-Future-of-Accountancy-Report_11.8.13.pdf"},{"key":"2024082915392244200_i1558-7959-28-1-1-Issa1","unstructured":"Issa, H. A. \n          \n          2013. Exceptional Exceptions. Ph.D. dissertation, Rutgers, The State University of New Jersey."},{"issue":"81","key":"2024082915392244200_i1558-7959-28-1-1-Jans1","first-page":"31","article-title":"Does process mining add to internal auditing? An experience report","author":"Jans","year":"2011","journal-title":"Business Information Processing"},{"issue":"3","key":"2024082915392244200_i1558-7959-28-1-1-Kaplan1","first-page":"390","article-title":"The evolution of management accounting","volume":"59","author":"Kaplan","year":"1984","journal-title":"The Accounting Review"},{"issue":"Spring","key":"2024082915392244200_i1558-7959-28-1-1-Kim1","article-title":"Development of an anomaly detection model for a bank's transitory account system","author":"Kim","year":"2014","journal-title":"Journal of Information Systems"},{"issue":"1","key":"2024082915392244200_i1558-7959-28-1-1-Kinney1","article-title":"ARIMA and regression in analytical review: An empirical test","volume":"53","author":"Kinney","year":"1978","journal-title":"The Accounting Review"},{"issue":"4","key":"2024082915392244200_i1558-7959-28-1-1-Kirkos1","doi-asserted-by":"crossref","first-page":"995","DOI":"10.1016\/j.eswa.2006.02.016","article-title":"Data mining techniques for the detection of fraudulent financial statements","volume":"32","author":"Kirkos","year":"2007","journal-title":"Expert Systems with Applications"},{"key":"2024082915392244200_i1558-7959-28-1-1-Kloptchenko1","unstructured":"Kloptchenko, A., \n            \n              T. Eklund, \n            \n              J. Karisson, \n            \n              B. Back, \n            \n              H. Vanharanta, and A. Visa. \n          2004. Combining Data and Text Mining Techniques for Analyzing Financial Reports. Available at: http:\/\/www.cse.ust.hk\/~leichen\/courses\/comp630p\/collection\/reference-5-19.pdf"},{"key":"2024082915392244200_i1558-7959-28-1-1-Kogan1","unstructured":"Kogan, A., \n            \n              M. G. Alles, \n            \n              M. A. Vasarhelyi, and J. Wu., \n          2013. Design and Evaluation of a Continuous Data Level Auditing System. Working paper, Rutgers, The State University of New Jersey."},{"key":"2024082915392244200_i1558-7959-28-1-1-Kopetz1","doi-asserted-by":"crossref","unstructured":"Kopetz, H. \n          \n          2011. Internet of things. In Real-Time Systems. New York, NY: Springer.","DOI":"10.1007\/978-1-4419-8237-7"},{"key":"2024082915392244200_i1558-7959-28-1-1-Krahel1","unstructured":"Krahel, J. P., \n          \n          2012. On the Formalization of Accounting Standards. Ph.D. dissertation, Rutgers, The State University of New Jersey."},{"key":"2024082915392244200_i1558-7959-28-1-1-Kuenkaikaew1","unstructured":"Kuenkaikaew, S. \n          \n          2013. Predictive Audit. Ph.D. dissertation, Rutgers, The State University of New Jersey."},{"key":"2024082915392244200_i1558-7959-28-1-1-Liu1","unstructured":"Liu, Q. \n          \n          2013. The Application of Exploratory Data Analysis in Auditing. Ph.D. dissertation proposal, Rutgers Business School."},{"issue":"3","key":"2024082915392244200_i1558-7959-28-1-1-McCarthy1","first-page":"554","article-title":"The REA accounting model: A generalized framework for accounting systems in a shared data environment","volume":"57","author":"McCarthy","year":"1982","journal-title":"The Accounting Review"},{"issue":"Fall","key":"2024082915392244200_i1558-7959-28-1-1-Moffitt1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2308\/isys-10372","article-title":"AIS in an age of big data","volume":"27","author":"Moffitt","year":"2013","journal-title":"Journal of Information Systems"},{"issue":"Spring","key":"2024082915392244200_i1558-7959-28-1-1-Dull1","article-title":"Secure information market: A model to support information sharing, data fusion, privacy, and decisions","author":"Morris","year":"2014","journal-title":"Journal of Information Systems"},{"key":"2024082915392244200_i1558-7959-28-1-1-Pacioli1","unstructured":"Pacioli, L. \n          \n          1514. Pacioli on Accounting (Summa de Arithmetica, Geometria, Proportioni e Proportionalita: Distintio Nona\u2014Tractatus XI, Particularis de Computis et Scripturis),translated byBrown, R. G. and K. S. Johnson. New York, NY: McGraw-Hill."},{"issue":"April","key":"2024082915392244200_i1558-7959-28-1-1-Pepe1","article-title":"The evolution of technology for the accounting profession","author":"Pepe","year":"2011","journal-title":"CPA Practice Advisor"},{"key":"2024082915392244200_i1558-7959-28-1-1-Phua1","unstructured":"Phua, C., \n            \n              V. Lee, \n            \n              K. Smith, and R. Gayler. \n          2010. A Comprehensive Survey of Data Mining-Based Fraud Detection Research. Available at: http:\/\/arxiv.org\/abs\/1009.6119"},{"issue":"Spring","key":"2024082915392244200_i1558-7959-28-1-1-Raschke1","article-title":"Understanding the components of information privacy threats for location-based services","author":"Raschke","year":"2014","journal-title":"Journal of Information Systems"},{"key":"2024082915392244200_i1558-7959-28-1-1-Salazar1","doi-asserted-by":"crossref","DOI":"10.1287\/mnsc.15.4.B161","article-title":"A simulation model of capital budgeting under uncertainty","author":"Salazar","year":"1968","journal-title":"Management Science"},{"key":"2024082915392244200_i1558-7959-28-1-1-Shmueli1","doi-asserted-by":"crossref","unstructured":"Shmueli, G., and O. Koppius. \n          2010. Predictive Analytics in Information Systems Research. Available at: http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=1606674","DOI":"10.2139\/ssrn.1606674"},{"key":"2024082915392244200_i1558-7959-28-1-1-Stringer1","doi-asserted-by":"crossref","DOI":"10.2307\/2490471","article-title":"A statistical technique for analytical review","author":"Stringer","year":"1975","journal-title":"Journal of Accounting Research"},{"key":"2024082915392244200_i1558-7959-28-1-1-Sutton1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1108\/S1475-1488(2010)0000013004","article-title":"The Fundamental Role of Technology in Accounting: Researching Reality","volume":"13","author":"Sutton","year":"2010","journal-title":"Advances in Accounting Behavior Research"},{"key":"2024082915392244200_i1558-7959-28-1-1-Teeter1","unstructured":"Teeter, R. \n          \n          2014. Essays on the Enhanced Audit. Ph.D. dissertation, Rutgers, The State University of New Jersey."},{"issue":"July","key":"2024082915392244200_i1558-7959-28-1-1-Thiprungsri1","article-title":"Cluster analysis for anomaly detection in accounting data: An audit approach","author":"Thiprungsri","year":"2011","journal-title":"International Journal of Digital Accounting Research"},{"key":"2024082915392244200_i1558-7959-28-1-1-Tukey1","unstructured":"Tukey, J. W. \n          \n          1977. Exploratory Data Analysis. Reading, MA: Addison-Wesley."},{"issue":"Spring","key":"2024082915392244200_i1558-7959-28-1-1-Vasarhelyi1","article-title":"AIS in a more rapidly evolving era","author":"Vasarhelyi","year":"2012","journal-title":"Journal of Information Systems"},{"issue":"Fall","key":"2024082915392244200_i1558-7959-28-1-1-Vasarhelyi2","article-title":"Financial accounting standards do not matter: It's just a layer","author":"Vasarhelyi","year":"2012","journal-title":"Journal of Information Systems"},{"issue":"Spring","key":"2024082915392244200_i1558-7959-28-1-1-Vasarhelyi3","article-title":"Formalization of standards, automation, robots, and IT governance","author":"Vasarhelyi","year":"2013","journal-title":"Journal of Information Systems"},{"key":"2024082915392244200_i1558-7959-28-1-1-Vasarhelyi4","unstructured":"Vasarhelyi, M. A., \n            \n              M. Alles, and K. Williams. \n          2010. Continuous Assurance for the Now Economy. A Thought Leadership Paper for the Institute of Chartered Accountants in Australia, May. Available at: http:\/\/raw.rutgers.edu\/docs\/previousprojects\/Continuous_Assurance_for_the_Now_Economy_-_2nd_draft%20mav.pdf"},{"issue":"July","key":"2024082915392244200_i1558-7959-28-1-1-Vasarhelyi5","article-title":"Would continuous auditing have prevented the Enron mess?","author":"Vasarhelyi","year":"2002","journal-title":"CPA Journal"},{"key":"2024082915392244200_i1558-7959-28-1-1-Vasarhelyi6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2308\/jeta-50396","article-title":"A measurement theory perspective on business measurement","volume":"9","author":"Vasarhelyi","year":"2012","journal-title":"Journal of Emerging Technologies in Accounting"},{"key":"2024082915392244200_i1558-7959-28-1-1-Verrecchia1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2307\/2674672","article-title":"The use of mathematical models in financial accounting","volume":"20","author":"Verrecchia","year":"1982","journal-title":"Journal of Accounting Research"},{"key":"2024082915392244200_i1558-7959-28-1-1-Weinman1","doi-asserted-by":"crossref","unstructured":"Weinman, J. \n          \n          2012. Cloudonomics: The Business Value of Cloud Computing. Hoboken, NJ: John Wiley & Sons.","DOI":"10.1002\/9781119204732"}],"container-title":["Journal of Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/publications.aaahq.org\/jis\/article-pdf\/28\/1\/1\/12059\/isys-10395.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/publications.aaahq.org\/jis\/article-pdf\/28\/1\/1\/12059\/isys-10395.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T17:31:27Z","timestamp":1724952687000},"score":1,"resource":{"primary":{"URL":"https:\/\/publications.aaahq.org\/jis\/article\/28\/1\/1\/1590\/Big-Questions-in-AIS-Research-Measurement"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,1]]},"references-count":58,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2014,6,1]]},"published-print":{"date-parts":[[2014,6,1]]}},"URL":"https:\/\/doi.org\/10.2308\/isys-10395","relation":{},"ISSN":["1558-7959","0888-7985"],"issn-type":[{"value":"1558-7959","type":"electronic"},{"value":"0888-7985","type":"print"}],"subject":[],"published":{"date-parts":[[2014,6,1]]}}}