EFFECT OF BLOCKCHAIN ON ACCOUNTING INFORMATION SECURITY
Main Article Content
Abstract
Applying the online technology to the accounting work has been carried out continuously and has been seen more clearly. When the online technology such as Cloud Technology is used and applied with the accounting system, it has made the accounting work fast. Preparing financial statement consists of statements of financial position, statements of comprehensive income, statements of changes in shareholders' equity, statements of cash flow and notes to financial statements. Applying the online technology to the accounting work is necessary and create benefits such as conducting and saving the financial transaction in real time, increasing the work performance and reducing the back office overhead cost. However the drawback of using cloud technology with accounting work is that the accounting data is public and can be used by a person whose intention is not good. It can create damage to the company. Blockchain technology is the technology which creates the data security. Conducting the online transaction can be completed conveniently and fast. Blockchain technology is the database management system and is linked to the accounting work including user authentication, financial transaction preparation and asset ownership recording. Account data security is important. Applying the blockchain technology to the cloud technology helps creating the confidence to the user that the accounting data will be kept confidential and safe. It will create credibility, transparency, accuracy, auditing system, global auditing network, reduced auditing time, less data error, zero risk for document forging and reduced corruption with the data being undeletable or unmodifiable in order to create the confidence to the financial statement users, especially the investors who will use such information to make the investing decision.
Article Details
References
Johnson, D. et al. (2017). The Elliptic Curve Digital Signature Algorithm (ecdsa). International Journal of Information Security, 1(1), 36–63.
Kosba, A. et al. (2019). Hawk:The blockchain Model of Cryptography and Privacy - Preserving Smar Contracts. In Proceedings of IEEE Symposium on Security and Privacy(SP). Proceedings of the IEEE.
Kwon, J. (2018). Tendermint: Consensus without mining. Retrieved March 28, 2020, from https://tendermint.com/static/docs/tendermint.pdf
Lamport, L. et al. (2018). The Byzantine Generals Problem. ACM Transactions on Programming Languages and Systems (TOPLAS), 4(3), 382–401.
MacKenzie, G. (2018). A New World Ahead: International Challenges for Information Management. Informational Management Journal, 33(2), 24-34.
Mazieres, D. (2018). The Stellar Consensus Protocol: A Federated Model for Internet-Level Consensus. Retrieved March 28, 2020, from http://www.scs. stanford.edu/17au-cs244b/notes/scp.pdf
Miguel, C. & Barbara, L. (2017). Practical byzantine fault tolerance. Retrieved March 28, 2020, from http://pmg.csail.mit.edu/papers/osdi99.pdf
Schwartz, D. et al. (2019). The Ripple Protocol Consensus Algorithm. Retrieved March 28, 2020, from https://ripple.com/files/ripple_consensus _white paper.pdf
Sharples, M. & Domingue, J. (2018). The Blockchain and Kudos: A Distributed System for Educational Record, Reputation and Reward. Retrieved March 28, 2020, from http://oro.open.ac.uk/46663/