{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T14:34:18Z","timestamp":1726410858687},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030021306"},{"type":"electronic","value":"9783030021313"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-02131-3_28","type":"book-chapter","created":{"date-parts":[[2018,10,11]],"date-time":"2018-10-11T12:58:46Z","timestamp":1539262726000},"page":"315-324","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Artificial Intelligence and Reliability of Accounting Information"],"prefix":"10.1007","author":[{"given":"Saeed","family":"Askary","sequence":"first","affiliation":[]},{"given":"Nasser","family":"Abu-Ghazaleh","sequence":"additional","affiliation":[]},{"given":"Yasean A.","family":"Tahat","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,12]]},"reference":[{"key":"28_CR1","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/j.cose.2017.09.011","volume":"74","author":"M AlAli","year":"2018","unstructured":"AlAli, M., Almogren, A., Hassan, M.M., Rassan, A.B.: Improving risk assessment model of cyber security using fuzzy logic inference system. Comput. Secur. 74, 323\u2013339 (2018)","journal-title":"Comput. Secur."},{"key":"28_CR2","unstructured":"Bataller, C., Harris, J.: Turning Artificial Intelligence into Business Value. Today: Accenture Emerging Technology Group (2018)"},{"issue":"3","key":"28_CR3","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/j.omega.2003.11.003","volume":"32","author":"MJ Beynon","year":"2004","unstructured":"Beynon, M.J., Peel, J.P., Tang, Y.-C.: The application of fuzzy decision tree analysis in an exposition of the antecedents of audit fees. Omega 32(3), 231\u2013244 (2004)","journal-title":"Omega"},{"issue":"5","key":"28_CR4","first-page":"21","volume":"32","author":"PA Bizarro","year":"2017","unstructured":"Bizarro, P.A., Dorian, M.: Artificial intelligence: the future of auditing. Intern. Audit. 32(5), 21\u201326 (2017)","journal-title":"Intern. Audit."},{"key":"28_CR5","unstructured":"Brown, C.E., Coakley, J., Phllip, M.E.: Neural networks enter the world of management accounting. Manag. Account., 51\u201357, May 1995"},{"issue":"1","key":"28_CR6","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1108\/18347640910967753","volume":"17","author":"J Canada","year":"2009","unstructured":"Canada, J., Sutton, S.G., Kuhn, J.R.: The pervasive nature of IT controls. Int. J. Account. Inf. Manag. 17(1), 106\u2013119 (2009)","journal-title":"Int. J. Account. Inf. Manag."},{"issue":"4","key":"28_CR7","first-page":"215","volume":"4","author":"J\u00c1F Canelas","year":"2013","unstructured":"Canelas, J.\u00c1.F., Mart\u00edn, Q.M., Rodriguez, J.M.C.: Argumentative SOX compliant and quality decision support intelligent expert system over the purchase orders approval process. Appl. Math. Comput. Sci. 4(4), 215\u2013268 (2013)","journal-title":"Appl. Math. Comput. Sci."},{"issue":"3","key":"28_CR8","doi-asserted-by":"publisher","first-page":"1053","DOI":"10.1016\/j.eswa.2007.08.057","volume":"35","author":"She-I Chang","year":"2008","unstructured":"Chang, S., Tsai, C.F., Shih, D.-H., Hwang, C.L.: The development of audit detection risk assessment system: using the fuzzy theory and audit risk model. Expert Syst. Appl. 35(3), 1053\u20131067 (2008)","journal-title":"Expert Systems with Applications"},{"issue":"2","key":"28_CR9","doi-asserted-by":"publisher","first-page":"159","DOI":"10.7903\/cmr.3044","volume":"6","author":"JJ Cheh","year":"2010","unstructured":"Cheh, J.J., Lee, J., Kim, I.: Determinants of internal control weaknesses. Contemp. Manag. Res. 6(2), 159\u2013176 (2010)","journal-title":"Contemp. Manag. Res."},{"issue":"4","key":"28_CR10","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1016\/j.jengtecman.2007.09.005","volume":"24","author":"T Dereli","year":"2007","unstructured":"Dereli, T., Baykaso\u011flu, A., Sena Da\u015f, G.: Fuzzy quality-team formation for value added auditing: a case study. J. Eng. Tech. Manage. 24(4), 366\u2013394 (2007)","journal-title":"J. Eng. Tech. Manage."},{"key":"28_CR11","doi-asserted-by":"crossref","unstructured":"Doyle, J., Ge, W., McVay, S.: Determinants of weaknesses in internal control over financial reporting and the implications for earnings quality. Working paper, University of Utah, University of Michigan, and New York University (2005)","DOI":"10.2139\/ssrn.677622"},{"issue":"2","key":"28_CR12","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1057\/jdg.2008.32","volume":"6","author":"MA Elbannan","year":"2009","unstructured":"Elbannan, M.A.: Quality of internal control over financial reporting, corporate governance and credit ratings. Int. J. Discl. Gov. 6(2), 127\u2013149 (2009)","journal-title":"Int. J. Discl. Gov."},{"issue":"3","key":"28_CR13","first-page":"318","volume":"33","author":"A Gramling","year":"2018","unstructured":"Gramling, A., Schneider, A.: Effects of reporting relationship and type of internal control deficiency on internal auditors\u2019 internal control evaluations. Int. J. Discl. Gov. 33(3), 318\u2013335 (2018)","journal-title":"Int. J. Discl. Gov."},{"issue":"1","key":"28_CR14","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1057\/palgrave.jdg.2050047","volume":"4","author":"PP Gupta","year":"2007","unstructured":"Gupta, P.P., Nayar, N.: Information content of control deficiency disclosures under the sarbanes-oxley act: an empirical investigation. Int. J. Discl. Gov. 4(1), 3\u201323 (2007)","journal-title":"Int. J. Discl. Gov."},{"key":"28_CR15","unstructured":"ICAEW: Artificial Intelligence and the Future of Accountancy. ICAEW IT Faculty, Chartered Accountant\u2019s Hall. Moorgate Place. London, UK (2017)"},{"issue":"4","key":"28_CR16","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1108\/17410391111148594","volume":"24","author":"C Kahraman","year":"2011","unstructured":"Kahraman, C., Kaya, I., \u00c7evikcan, E.: Intelligence decision systems in enterprise information management. J. Enterp. Inf. Manag. 24(4), 360\u2013379 (2011)","journal-title":"J. Enterp. Inf. Manag."},{"issue":"4","key":"28_CR17","first-page":"35","volume":"28","author":"K Kinkela","year":"2013","unstructured":"Kinkela, K., Harris, P.: COSO updates practice framework. Intern. Audit. 28(4), 35\u201340 (2013)","journal-title":"Intern. Audit."},{"issue":"3","key":"28_CR18","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1108\/02686900410524436","volume":"19","author":"HC Koh","year":"2004","unstructured":"Koh, H.C., Low, C.K.: Going concern prediction using data mining techniques. Manag. Audit. J. 19(3), 462\u2013476 (2004)","journal-title":"Manag. Audit. J."},{"issue":"1","key":"28_CR19","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1108\/MAJ-08-2013-0910","volume":"31","author":"A L\u00e4nsiluoto","year":"2016","unstructured":"L\u00e4nsiluoto, A., Jokipii, A., Eklund, T.: Internal control effectiveness - a clustering approach. Manag. Audit. J. 31(1), 5\u201334 (2016)","journal-title":"Manag. Audit. J."},{"key":"28_CR20","unstructured":"Ling, L.: Research on enterprise internal control financial assessment system based on artificial intelligence. Revista Ib\u00e9rica De Sistemas e Tecnologias De Informa\u00e7\u00e3o (16), 224\u2013234 (2015)"},{"issue":"2","key":"28_CR21","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1007\/s11036-017-0932-8","volume":"23","author":"H Lu","year":"2018","unstructured":"Lu, H., Li, Y., Chen, M., Kim, H., Serikawa, S.: Brain intelligence: go beyond artificial intelligence. Mob. Netw. Appl. 23(2), 368\u2013375 (2018)","journal-title":"Mob. Netw. Appl."},{"issue":"4","key":"28_CR22","doi-asserted-by":"publisher","first-page":"399","DOI":"10.2308\/acch.2006.20.4.399","volume":"20","author":"LA Maines","year":"2006","unstructured":"Maines, L.A., Wahlen, J.M.: The nature of accounting information reliability: inferences from archival and experimental research. Account. Horiz. 20(4), 399\u2013425 (2006)","journal-title":"Account. Horiz."},{"issue":"2","key":"28_CR23","first-page":"7","volume":"13","author":"S Moudud-Ul-Huq","year":"2014","unstructured":"Moudud-Ul-Huq, S.: The role of artificial intelligence in the development of accounting systems: a review. IUP J. Account. Res. Audit. Pract. 13(2), 7\u201319 (2014)","journal-title":"IUP J. Account. Res. Audit. Pract."},{"key":"28_CR24","unstructured":"Novac, C.: Artificial intelligence system for decision -making process. Civil Eng. 1(2), 261\u2013266 (2000). \u201cOvidius\u201d University Annals Constantza"},{"key":"28_CR25","unstructured":"Segars, S.: AI Today, Ai tomorrow. In: N. R. P. Ltd (ed.) Global Artificial Intelligence Survey. ARM Northstar, UK (2017)"},{"issue":"1","key":"28_CR26","first-page":"27","volume":"13","author":"D Todoroi","year":"2013","unstructured":"Todoroi, D.: How to create adaptable ROBO-intelligences? Acad. Econ. Studies Econ. Inform. 13(1), 27\u201339 (2013)","journal-title":"Acad. Econ. Studies Econ. Inform."},{"key":"28_CR27","unstructured":"US Securities and Exchange Commission: Management\u2019s Reports on Internal Control Over Financial Reporting and Certification of Disclosure in Exchange Act Periodic Reports - Frequently Asked Questions, Washington DC, 6 Oct 2004"},{"key":"28_CR28","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.ijpe.2006.11.006","volume":"109","author":"Q Wang","year":"2007","unstructured":"Wang, Q.: Artificial neural network as cost engineering methods in a collaborative manufacturing environment. Int. J. Prod. Econ. 109, 53\u201364 (2007)","journal-title":"Int. J. Prod. Econ."}],"container-title":["Lecture Notes in Computer Science","Challenges and Opportunities in the Digital Era"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-02131-3_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T16:54:18Z","timestamp":1710262458000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-02131-3_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030021306","9783030021313"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-02131-3_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"12 October 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"I3E","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Conference on e-Business, e-Services and e-Society","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kuwait City","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kuwait","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"i3e2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ifip.gust.edu.kw\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}