Будь ласка, використовуйте цей ідентифікатор, щоб цитувати або посилатися на цей матеріал:
https://dspace.mnau.edu.ua/jspui/handle/123456789/18553
Повний запис метаданих
Поле DC | Значення | Мова |
---|---|---|
dc.contributor.author | Akimova, Olena | - |
dc.contributor.author | Zhydovska, Nataliya | - |
dc.contributor.author | Кучмійова, Тетяна Сергіївна | - |
dc.contributor.author | Kuchmiiova, Tetiana | - |
dc.contributor.author | Kozitska, Natalia | - |
dc.contributor.author | Buriak, Ievgen | - |
dc.date.accessioned | 2024-08-15T06:09:28Z | - |
dc.date.available | 2024-08-15T06:09:28Z | - |
dc.date.issued | 2024 | - |
dc.identifier.citation | Akimova, O., Zhydovska, N., Kuchmiiova, T., Kozitska, N., & Buriak, I. (2024). Cyber protection of financial data in accounting: Implementation and use of cryptographic techniques. Economic Affairs, 69(2). https://doi.org/10.46852/0424-2513.3.2024.27 | uk_UA |
dc.identifier.uri | https://dspace.mnau.edu.ua/jspui/handle/123456789/18553 | - |
dc.description.abstract | The primary objective of this study is to explore the effectiveness of cryptographic techniques in enhancing the cyber protection of financial data within accounting practices. As the digital landscape evolves, the security of financial information becomes increasingly critical. This research aims to assess the effectiveness of cryptographic methods and understand their impact on various facets of accounting systems. The study employs a two-pronged analytical approach: matrix analysis and Structural Equation Modeling (SEM). Through matrix analysis, focusing on substitution cyphers like the Hill cypher, the research provides a technical evaluation of encryption techniques. This analysis highlights the effectiveness of cryptographic methods in ensuring data confidentiality and integrity. The SEM analysis further reveals significant findings: Cryptographic techniques notably enhance perceived security (with a path coefficient β of 0.2 and a p-value of 0.03) and regulatory compliance (β = 0.5, p < 0.01). A positive impact on user satisfaction (β = 0.25, p = 0.04) is observed, albeit with challenges in implementation, particularly in training and technological infrastructure. The study concludes that cryptographic techniques are essential in safeguarding financial data in accounting. However, their effectiveness centres on strategic implementation, which includes considerations for user-centric design and adherence to evolving regulatory standards. The research highlights the importance of a balanced approach to cybersecurity, integrating advanced cryptographic methods with practical considerations for their implementation. This study contributes both qualitative insights and quantitative evidence, offering valuable guidance for practitioners, IT security experts, and policymakers in developing robust cyber protection strategies in the accounting sector. | uk_UA |
dc.language.iso | en | uk_UA |
dc.subject | Accounting Practices | uk_UA |
dc.subject | Cryptographic | uk_UA |
dc.subject | Cybersecurity | uk_UA |
dc.subject | Digital Security | uk_UA |
dc.subject | Financial Data Protection | uk_UA |
dc.subject | Matrix Analysis | uk_UA |
dc.subject | Regulatory Compliance | uk_UA |
dc.subject | Goal 10: Reduce inequality within and among countries | uk_UA |
dc.subject | Data Privacy | uk_UA |
dc.subject | Health Care | uk_UA |
dc.subject | Blockchain | uk_UA |
dc.title | Cyber Protection of Financial Data in Accounting: Implementation and Use of Cryptographic Techniques | uk_UA |
dc.type | Article | uk_UA |
Розташовується у зібраннях: | Публікації науково-педагогічних працівників МНАУ у БД Scopus Статті (Факультет менеджменту) |
Файли цього матеріалу:
Файл | Опис | Розмір | Формат | |
---|---|---|---|---|
EAv69n3z1.pdf | 492,46 kB | Adobe PDF | Переглянути/Відкрити |
Усі матеріали в архіві електронних ресурсів захищені авторським правом, всі права збережені.