ANALYSIS OF INFORMATION TECHNOLOGY IMPLEMENTATION AND INFORMATION SECURITY AWARENESS (ISA) REGARDING FINANCIAL REPORTING (OVERVIEW WITH THE DATA PROTECTION LAWS BY THE EUROPEAN UNION'S GENERAL DATA PROTECTION REGULATION (GDPR)

Main Article Content

MAF’UL TAUFIQ, MUHAMMAD IHSAN RANGKUTI, ISKANDAR MUDA

Abstract

In this research, explaining and explaining the implementation of Information Technology and Information Security and its impact on Financial Reporting, the researcher conducted a theoretical study and previous literature review where the theory used was Theory Technology Acceptance Models (TAM) which concerns and explains the role of technology in providing convenience. and benefits for users. Where the theory used will help in explaining the impact of the application of Information Technology and Information Security in the process of preparing and reporting quality financial reports. This research will also examine previous research which provides an overview regarding the Implementation of Information Technology and Information Security and its impact on the Quality of Financial Reports. This research uses a qualitative descriptive approach by conducting theoretical studies and literature reviews by conducting literature studies and collecting journals via websites and the internet. The research methodology used is purely through analysis of existing literature and theoretical studies related to the topics discussed in the research, then the researcher conducts discussions and provides conclusions through theoretical analysis and research results that support to obtain good theoretical research results related to themes discussed in the research. Through the results of theoretical studies and literature reviews, results were found with the conclusion that the implementation of Information Technology and Information Security is able to have an impact and influence on the reporting process and preparation of quality financial reports. The use of computer-based technology makes it easier in the process of collecting and storing data containing financial information in a company. And implementing an information security system will provide protection for the data needed to help and optimize the company's financial performance.

Article Details

Section
Articles

References

Ali, U. D., Handayani, L., Mulyanto, S., & Anggraini, L. (2023). Workshop Peningkatan Profit dan Penyusunan Laporan Keuangan Usaha Akuaponik Pada Program Pembinaan Mahasiswa Wirausaha (P2MW). 3(1), 341–349.

Ardianto. (2019). Pengaruh Penerapan Standar Akuntansi Pemerintah, Pemanfaatan Teknologi Informasi, Kompetensi Sumber Daya Manusia, Penerapan Sistem Pengendalian Intern Pemerintah, Dan Sistem Akuntansi Keuangan Daerah Terhadap Kualitas Laporan Keuangan Pemerintah Daerah. Jurnal Bina Akuntansi, 6(1), 95–136. https://doi.org/10.52859/jba.v6i1.44

Bahri, Syaiful. 2016. Pengantar Akuntansi. Cetakan Pertama. Yogyakarta: CV. Andi Offset.

Balozian, P., and Leidner, D. (2017) “Review of IS Security Policy Compliance: Toward the Building Blocks of an IS Security Theory,”

Calder, A. (2017). Nine Steps to Success: An ISO 27001 Implementation Overview. IT Governance Ltd. https://doi.org/10.2307/j.ctt1wn0skw

Dao, T. K., Tapanainen, T. J., Nguyen, H. T. T., Nguyen, T. H., & Nguyen, N. D. (2017). Information Safety, Corporate Image, and Intention to Use Online Services: Evidence from Travel Industry in Vietnam. In 23rd Americas Conference on Information Systems (AMCIS 2017): A Tradition of Innovation (pp. 147-156). Association for Information Systems

de Villiers, Charl and Dimes, Ruth, Determinants, Mechanisms and Consequences of Corporate Governance Reporting: A Research Framework (2020). Journal of Management and Governance, Forthcoming, The University of Auckland Business School Research Paper, Available at SSRN: https://ssrn.com/abstract=3750447

Hall, James A. 2011. Accounting Information Systems. 3th edition. Cincinnati: ShoutWestern College Publishing.

Hamzah, A. (2009). Evaluasi Kesesuaian Model Keperilakuan dalam Penggunaan Teknologi System Informasi di Indonesia. SNATI 2009: Yogyakarta.

Han, J., Kim, Y. J., & Kim, H. (2017). An Integrative Model of Information Security Policy Compliance with Psychological Contract: Examining a Bilateral Perspective. Computers & Security, 66, 52-65. https://doi.org/10.1016/j.cose.2016.12.016

Hanafi, Mamduh M., Halim, Abdul (2016). Analisis Laporan Keuangan Edisi ke-5. Yogyakarta: UPP STIM YKPN

Hans Kartikahadi., dkk. 2016. Akuntansi Keuangan Menengah Berbasis SAKBerbasis IFRS Buku 1. Jakarta.

Hung, W. H., Chang, I. C., Chen, Y., & Ho, Y. L. (2019). Aligning 4C strategy with Social Network Applications for CRM Performance. Journal of Global Information Management (JGIM), 27, 93-110. https://doi.org/10.4018/JGIM.2019010105

Johnson, Brad C. 2008. Information Security Basics.

Laudon, K.C., Jane P. Laudon. 2004. Management Information Systems. 8th edition. New Jersey : Prentice- Hall, Inc

Lele, Q., & Lihua, K. (2016). Technical Framework Design of Safety Production Information Management Platform for Chemical Industrial Parks Based on Cloud Computing and the Internet of Things. International Journal of Grid and Distributed Computing, 9, 299-314. https://doi.org/10.14257/ijgdc.2016.9.6.28

Lubis, A.; Rustam. (2021). Enterprise Resource Planning (ERP) User Acceptance Model with Easy to Use as Intervening Variable. Proceedings of the 2nd Economics and Business International Conference - EBIC, ISBN 978-989-758-498-5, pages 9-14. https://doi.org/10.5220/0009197500090014

Martin, E.W. , CW Brown, D.W. DeHayes, J.A. Hoffer, dan W.C Perkins. 2002. Managing Information Technology. New Jersey : Prentice- Hall, Inc.

Meixner, F., & Buettner, R. (2012). Trust as an Integral Part for Success of Cloud Computing. In ICIW 2012 Proceedings (pp. 207-214)

Moghe, P., Gehani, N., & Smith, P. T. (2014). Enterprise Information Asset Protection through Insider Attack Specification, Monitoring and Mitigation. US8880893B2.

Mukundan, N., & Sai, L. P. (2014). Perceived Information Security of Internal Users in Indian IT Services Industry. Information Technology and Management, 15, 1-8. https://doi.org/10.1007/s10799-013-0156-y

Mulyadi. 2016. Sistem Akuntansi. Jakarta: Salemba Empat.

Neubauer, T., Ekelhart, A., & Fenz, S. (2008). Interactive Selection of ISO 27001 Controls under Multiple Objectives. In IFIP International Information Security Conference (pp. 477-491).

Peng, J., Quan, J., & Peng, L. (2019). It Application Maturity, Management Institutional Capability and Process Management Capability. Journal of Organizational and End User Computing (JOEUC), 31, 61-85. https://doi.org/10.4018/JOEUC.2019010104.

Reid, L. C., Carcello, J. V., Li, C. et al. (2019). Impact of Auditor Report Changes on Financial Reporting Quality and Audit Costs: Evidence from the United Kingdom. Contemporary Accounting Research, 36, 1501-1539. https://doi.org/10.1111/1911-3846.12486

Rivai Akbar, Suroso Jarot, and Pangemanan Firman, ICIMTech 2020: proceedings of 2020 International Conference on Information Management and Technology (ICIMTech : 13-14 August 2020, Indonesia. 2020.

Roy, S., Salve, A. R., Shah, J. A., Kadam, S., & Dash, M. (2022, December). Artificial Intelligence Based Rural E-Commerce Boosting Using Big Data. In 2022 5th International Conference on Contemporary Computing and Informatics (IC3I) (pp. 2087-2093). IEEE. https://ieeexplore.ieee.org/abstract/document/10073248/

Shulha O, Yanenkova I, Kuzub M, Nazarenko V. (2022). Banking Information Resource Cybersecurity System Modeling. Journal of Open Innovation: Technology, Market, and Complexity. 8(2):80. https://doi.org/10.3390/joitmc8020080

S. Amraoui, M. Elmaallam, H. Bensaid, and A. Kriouile, “Information Systems Risk Management: Litterature Review,” Computer and Information Science, vol. 12, no. 3, p. 1, Jun. 2019, doi: 10.5539/cis.v12n3p1.

Salazar, Vima. 2006. Management of Information Security Good Practice Note

Sandanafu, Sally Paulina dan Situmeang, M. F. (2018). Pengaruh kapasitas sdm, komitmen organisasi, pemanfaatan teknologi informasi dan pengendalian intern akuntansi terhadap nilai informasi pelaporan Keuangan Pemerintah Daerah. Jurnal Maneksi, 7(2).

Savira, M., Mukofi, A., & Andika, S. (2021). Pengaruh keperilakuan organisasi dan implementasi sistem akuntansi terhadap keuangan daerah (studi pada pemerintah Desa Tlekung Kota Batu). E-Jurnal Perspektif Ekonomi Dan Pembangunan Daerah, 10(1). Doi: 10.22437/Pdpd.V10i1.12526

Setiawan, W. (2017). Era Digital dan Tantangannya. Seminar Nasional Pendidikan, 1–9.

Sholeh, M. (2017). Pengaruh Kompetensi Akuntansi Pegawai dan Teknologi Informasi Terhadap Kualitas Laporan KEUANGAN ( Studi Kasus Pada Badan Layanan Umum Politeknik Negeri Malang ). Jurnal Bisnis dan Ekonomi, 8(1), 1–26.

Siponen, M., Willison, R., 2009. Information security management standards: problems and solutions. Inf. Manag. 46 (5), 267–270. doi:10.1016/j.im.2008.12.007.

Spilnyk, I., Brukhanskyi, R., & Yaroshchuk, O. (2020). Accounting and Financial Reporting System in the Digital Economy. Paper presented at the 2020 10th International Conference on Advanced Computer Information Technologies (ACIT). doi: https://doi.org/10.1109/ACIT49673.2020.9208976

Sugiyono. 2018. Metode Penelitian Kuantitatif, Kualitatif, dan R&D, penerbit Alfabeta, Bandung.

Suwardjono. (2016). Teori akuntansi perekayasaan laporan keuangan edisi3. Yogyakarta: BPFE.

Syafrina, Annisa, Eka. & Irwansyah, (2018)“Ancaman Privasi Dalam Big Data Privacy Threats In Big Data”, Jurnal Penelitian Komunikasi dan Opini Publik Vol. 22 No. 2, Desember 2018 :132-143

Tambunan, B., Sihombing, H., Doloksaribu, A., (2018). The effect of security transactions, easy of use, and the risk perception of interest online buying on the e-commerce tokopedia site (Study on Tokopedia. id site users in Medan city). In IOP Conference Series: Materials Science and Engineering. Vol. 420, No.1, 012118. IOP Publishing. http://iopscience.iop.org/article/10.1088/1757-899X/420/1/012118/meta

Wu, C. H., & Tsai, S. B. (2018). Using DEMATEL-Based ANP Model to Measure the Successful Factors of E-Commerce. In Intelligent Systems: Concepts, Methodologies, Tools, and Applications (pp. 1122-1138). IGI Global.

Yuniatin, N. Y., Achsani, N. A., & Sasongko, H. (2018). Pengaruh Perubahan Status, Employee Engagement, Dan Pemanfaatan Teknologi Informasi Terhadap Kualitas Pelaporan Keuangan. EKUITAS (Jurnal Ekonomi Dan Keuangan)