The library provides access to a range of articles in full text from leading business, finance and management journals. Access to articles is provided to logged-in ICAEW members, ACA students and other entitled users subject to suppliers' terms of use.
If you are unable to access an article, please see our Help and support or contact library@icaew.com
Displaying 1-30 of 115 results
Exclusive
Plugging into artifical intelligence
- Jul 2024
- Chris Gaetano
Article discusses Accounting firms utilising artificial intelligence (AI) to streamline their operations and enhance client communication. AI tools are being used to analyse complex documents, automate repetitive tasks, and generate content such as tax position documents. While some accounting leaders have embraced AI for its time-saving benefits, others have concerns about accuracy, data security, and client trust. Accounting firms are implementing AI for various tasks, but human review remains crucial for accuracy and protecting client data. It is important for accounting professionals to na...
Exclusive
AI: It’s not the tool that determines your success
- Jul 2024
- Gary L Boomer
Article discusses how accounting firms are utilising artificial intelligence (AI) to streamline their operations and enhance client communication. AI tools are being used to analyse complex documents, automate repetitive tasks, and generate content such as tax position documents. While some accounting leaders have embraced AI for its time-saving benefits, others have concerns about accuracy, data security, and client trust. Accounting firms are implementing AI for various tasks, but human review remains crucial for accuracy and protecting client data. It is important for accounting professiona...
Exclusive
Data management trends: privacy, security and AI
- Jul 2024
- Gary L Boomer
This article discusses the importance of data management for accountancy firms, focusing on the trends of privacy, security, and artificial intelligence (AI). It highlights the challenges posed by cyberthreats and regulatory requirements, emphasizing the need to prioritize privacy and security measures. The article suggests strategies such as data encryption, cybersecurity measures, and staff training to enhance data management. It also recommends leveraging AI tools for automation, predictive analytics, and data visualization.
Exclusive
Digital transformation: strategies for small and midsize accounting firms
- Jul 2024
- Brian Trout, Cory Ng
The article focuses on the challenges and opportunities faced by small to medium-sized accounting firms amidst digital transformation. Topics include evolving client expectations for remote access and intuitive digital platforms, strategies for integrating accounting systems with other business tools, and the critical importance of strong data security measures to maintain client trust.
Exclusive
Generative AI for small and midsized firms
- May 2024
- Bill Armstrong
Article discusses how small and midsized accounting firms are beginning to leverage artificial intelligence (AI) technology to streamline their processes. It outlines the three approaches to adopting generative AI: out-of-the-box, custom development, and assembling. Each approach has its own advantages and considerations, such as data security and cost.
Exclusive
Generating risk: New exposures from ChatGPT and other AI tools
- Nov 2023
- Corey McReynolds
The article focuses on the growing integration of generative artificial intelligence (AI) tools like ChatGPT into company workflows, with many employees already using them without clear policies. Topics discussed include the widespread use of ChatGPT by staff, potential risks such as data security concerns, and the need for organizations to develop customized policies, education, and awareness to effectively manage the use of generative AI tools.
Exclusive
The data-driven supply chain raises new governance and security issues
- Sep 2023
- Shawn Muma, David Kappos, Carys Webb
The article highlights the importance of data management and security in today's digital supply chain, where every enterprise is considered a "data enterprise." As companies transition to digitally integrated supply chains, they must prioritize data stewardship, embed data governance and security into their operations, and adapt to changing practices and regulations.
Exclusive
Hackers: we won't let AI get the better of us
- Aug 2023
- Alex Scroxton
The article discusses how artificial intelligence (AI) is impacting ethical hackers' work. It discusses AI can disrupt certain aspects of penetration testing and bug bounty programs; the hacking community believes that AI will never be able to replicate the creative thinking essential for ethical hacking; the use of generative AI by hackers, demographic shifts among hackers; and how the younger generation's different perspective on technology is influencing the cyber landscape.
Exclusive
Getting data sorted
- Jul 2023
- Stephen Pritchard
The article focuses on data classification as a pre-requisite for data protection, security, and compliance, and it explores the tools available for data classification, including offerings from major tech companies as well as open-source options. It mentions these tools use machine learning and artificial intelligence to automate data classification, ensuring accurate data management and governance.
Exclusive
ICO under fire for taking limited action over potentially life-threatening data breaches
- Jul 2023
- Sebastian Klovig Skelton
The article focuses on criticism directed towards Information Commissioner's Office (ICO) for its limited enforcement action against Thames Valley Police (TVP) and the Ministry of Justice (MoJ) regarding serious data protection failures that jeopardized the safety of witnesses and prisoners.
Exclusive
Resiliency and strategic risk management: Protecting strategic value includes a mix of metrics, cybersecurity, reputational risk management, and more
- May 2023
- Mark L.Frigo, Dennis H.Chookaszian
The authors discuss how CFOs and boards can support strategic resiliency and risk management skills as core competencies for creating and protecting long-term value. In a conversation together, they look at tools for long-term value creation, cybersecurity and resiliency, strategic resiliency and risk assessment, reputation risk, skills for business leaders, strategic life-cycle analysis and lessons on resiliency from bank failures.
Exclusive
Generative AI and cybersecurity: advantages and challenges
- Apr 2023
- David Linthicum
Article discusses the fact that most cybersecurity professionals have yet to explore the cybersecurity potential of AI, it explores what generative AI is and how to can succeed with AI-enabled cybersecurity and the challenges involved.
Exclusive
Poirot, Pacioli, and Pedagogy: Using accounting history to build an introductory forensic accounting course
- Dec 2022
- Francisco A.Badua
This article suggests an approach for introducing students to forensic accounting areas such as occupational fraud, corruption, cybercrime, money laundering, the Fraud Triangle, whistle-blowing, and giving testimony. A list of compelling 20th century fraud and cybercrime cases is provided, which can be used to capture students' imaginations and illustrate forensic accounting concepts.
Exclusive
Data classification: what is it and why do you need it
- Nov 2022
- Stephen Pritchard
The article explains why data classification is vital to organisations. Topics discussed include tracking of information based on its sensitivity and confidentiality, key elements of a data classification policy, and compliance with regulations such as the General Data Protection Regulation (GDPR). Also mentioned are the basic principles of data management, namely confidentiality, integrity, and access.
Exclusive
AI vs algorithms
- Oct 2022
- Drew Robb
Article looks at how Artificial Intelligence uses algorithms and specifically their usefulness in IT security and HR
Exclusive
High cybersecurity risks demand a proactive defense
- Oct 2022
- Irene M Walton
The article discusses cybercrime and data breaches, which are considered major threats for accountancy firms. Topics include the increase in incidences of breaches that featured ransomware or extortion since 2018. Some of the major defences that should be considered are also mentioned.
Exclusive
Tips for taking cyber cover
- Jul 2022
- Paul Furtado, Jim Mello
The article offers suggestions for taking cyber security insurance and emphasises that transferring risk to an insurer doesn't mean you are risk-free. You should look carefully at what is not included in your cyber insurance cover.
Exclusive
7 pressing cybersecurity questions
- Apr 2022
- Keri Pearlson, Nelson Novaes Neto
This article offers 7 questions to ask to make sure your board understands how cybersecurity is being managed by your organisation. Asking these questions will also raise awareness of the importance of cybersecurity, and the need to prioritize action.
Exclusive
ICO criticises government-backed campaign to delay end-to-end encryption
- Feb 2022
- Nill Goodwin
The article reports that the Information Commissioner's Office (ICO) has stepped into the debate over end-to-end encryption (E2EE), warning that delaying its introduction leaves everyone at risk – including children. It mentions that the privacy watchdog said end-to-end encryption plays an important role in safeguarding privacy and online safety, protecting children from abusers, and is crucial for business services.
Exclusive
Cybersecurity and forensic accounting join forces to combat criminals
- Jan 2022
- Nathan Fisher, Eric Hines
How the skill sets of cybersecurity and forensic accounting experts can intertwine and be used collaboratively when cybersecurity issues come to light.
Exclusive
Cloud storage compliance pitfalls
- Jan 2022
- Stephen Pritchard
Article outlines post-Brexit cloud storage compliance issues that could be an issue for organisations. These include the Data Protection Act 2018, the Payment Card Industry Data
Security Standard (PCI DSS) and the Network and Information Systems (NIS) Directive.
Exclusive
Cybersecurity and data privacy: The rising expectations within internal audit
- Jan 2022
- Derrick Esplin, Ross Johnston, Cindy Greenman, Liahona R.Hepworth
Internal auditors are increasingly expected to be more involved in ensuring cybersecurity measures will protect company and customer data. To do this, internal auditors will need to build relationships with other departments, acquire new skills and pay particular attention to controls meant to detect risks that make it past initial preventative controls.
Exclusive
The critical first step to data security
- Dec 2021
- Marianne Bradford, Eileen Taylor, Megan Seymore
The article discusses the essential data security strategies that management accountants can use in applying business performance measurement skills in the identification of key performance indicators (KPI) for data security and classification. Topics include the IBM data showing that data breach average cost stood at 4.24 million dollars in 2020, and the importance of data classification as the foundation of data security.
Exclusive
The Security risks of bringing your own device to the office
- Nov 2021
- Nicholas Fearns
The article offers information on the security risks of bringing one's own device to the office post Covid-19 pandemic. It mentions that cyber security implications with many people returning to offices and bringing their mobile devices with them. It discusses the influx of new devices joining corporate networks for the first time will result in major security problems for businesses.
Exclusive
UK data regulations set for 'common sense' changes
- Sep 2021
- Alex Scranton
Article reports on the launch of a major conultaion by the Department for Digital, Culture, Media and Sport (DCMS), centring on proposed changes to the UK’s data protection regime in a post-Brexit environment, alongside reforms to the Information Commissioner’s Office (ICO).
Exclusive
How do SOAR and SIEM fare in a rapidly changing cyber threat landscape
- Sep 2021
- Nicholas Fearn
Article discusses whether SOAR (security orchestration, automation and response) and SIEM (security information and event management) technologies are still effective tools for IT security as cyber threats grow.
Exclusive
How internal audit helps increase cybersecurity transparency for the board
- Jul 2021
- John Brackett, Ken Stasiak
Article discusses how internal audit can help the board see an accurate picture of cyber risk
Exclusive
Best practices for safe printing
- Jun 2021
- Cliff Saran
Article discusses how the humble printer is an often overlooked cyber security risk in any office, offering hackers backdoor access into the corporate network. Best practice recommendations are made.
Exclusive
How to get users to pay heed to security training
- Jun 2021
- Nicolas Fearn
Article discusses how business can get their staff to take growing cyber security risks and the resulting training seriously.
Exclusive
Cybersecurity from within
- May 2021
- Kristine Brands
Article discusses internal IT security threats and how these shouldn't be left to the IT department and should b addressed by an organisation's internal controls.
Displaying 1-30 of 115 results
Terms of use
You are permitted to access articles subject to the terms of use set by our suppliers and any restrictions imposed by individual publishers. Please see individual supplier pages for full terms of use.
Contact the library
Expert help for your enquiries and research.