The financial Information Is presented to the public on the Internet usually In a static format such as PDF or HTML the CYBER technology offers a way to have dynamic financial information. CYBER can support both financial and non- financial data contexts, which distinguishes CYBER from traditional financial documents (Deference et al. , 2005). The use of standard tags in CYBER documents allows for the specific identification, automatic exchange, and reliable extraction of uncial Information across deferent software applications.

The use of CYBER also eliminates the need for redundant data, facilitates the comparison, the transfer and information. The users of financial information including investors, analysts, auditors, financial institutions and regulators, can receive, browse, compare and analysis data quickly and efficiently whether it is in CYBER format. It is only 15 years from Girl’s appearance in 1998, but a lot of developed countries have developed a mandatory filing program in CYBER format, including Korea, Singapore, the U. S. And so on. And any other countries are also actively promoting and researching CYBER.

All of above shows that the importance of CYBER has got more widespread attention. During this period, the researches mainly focus on four aspects: the production bases of CYBER, the effect of CYBER, the classification criteria formulation of CYBER and the auditing assurance of financial reports based on CYBER. This paper will tease out and discusses the literature researches of CYBER from these four aspects as well as other two aspects: the implementation of CYBER in different countries and some researches about CYBER in China. . Literature Review 2. . Research about the production basic of CYBER Sorter (1969) proposed the idea of “The Events Approach” on accounting, but because of the limitations of information technology, it is very difficult to achieve, so the idea was Just stopping at the prospect level. Elliot (1992, 1994) and Hellman (1995, 1996, 1997) first studied the impact of new technologies on the company’s financial reporting such as network and so on.

Best services for writing your paper according to Trustpilot

Premium Partner
From $18.00 per page
4,8 / 5
4,80
Writers Experience
4,80
Delivery
4,90
Support
4,70
Price
Recommended Service
From $13.90 per page
4,6 / 5
4,70
Writers Experience
4,70
Delivery
4,60
Support
4,60
Price
From $20.00 per page
4,5 / 5
4,80
Writers Experience
4,50
Delivery
4,40
Support
4,10
Price
* All Partners were chosen among 50+ writing services by our Customer Satisfaction Team

Elliot believes that information technology has profoundly changed the business model, so the company’s financial reports must also be changes. However, Hellman believes that companies should use information technology to increase the frequency of corporate information disclosure for making more details public. He pointed out that in 1997 the financial reporting model is a “black-white mode” that ignores a lot of useful information, and he thinks financial reports should focus on investor decision-making.

The research of Elliot and Hellman makes the idea Accounting’s “Matters Act” proposed by Sorter (1969) backing to life. Under the guidance of this idea from Sorter, Goethe (1939) proposed the “accounting data” suggested that all economic activities of corporate should be torte in basic unit of information has got attention of industry, and enterprise should open all non-processed data to information users so that information users could access information what they want.

Limited to the prevailing level of information technology, this idea has not been applied in practice at the time. With the development of “Matters Act” thought and database technology, McCarthy (1979,1982,1997) proposed and the established “AREA accounting report mode” that based on “ERE” (Entity-Relation, entity – the entity) model, in order to make it more with operational, Peter overshadows (2003) proposed that applied object-oriented data del into the organization’s financial data.

All these financial reporting model theory have stressed to the user of information and rely on computer technology, database technology, networking technology, considered the financial and non-financial information, disclosure accounting information flexible and timely. But the models are Just a lot of pattern presentation ideas or concepts that did not involve a specific model or methods, in fact there is no time, companies submitted financial reporting after processed and filtered, the way they submitted are mainly in paper, WORD, EXCEL and PDF electronic document.

In late 1998 by Deference and Gray (1999), their study indicated that of the fifteen largest corporations in each of the I-J, Germany and France (45 in total), each of which already had a web site by that point, only ten provided their audit report online in any form. Not one firm linked their audit report to the relevant auditors’ web site. Nor did any site provide any kind of signature on the document, even an image of the signature. Only four web sites had hyperlinks between the report and other parts of the financial information displayed on their site.

This indicates that the reparations did not place a high degree of emphasis on the role offered by these reports as value bearing documents. Thus Replant & L. Morocco (1992), Booth & Rupert (1994), o. Leary & Darnel E (1995), George avails & Michaels Glass (1999), Sylvia Constantine (2004), K. Verdigris & Structure & A . Trial (2008) and other scholars along the idea of enterprise business reengineering theory from Hammer, and research accounting business process reengineering in depth.

However, BPR theory emphasizes the rethinking, completely re-election, the best reference model and business process redesign in fundamental. Because of dealing with the problem too radical, some scholars hold different views, such as J. Prepared & P. Rowland (2003). Gerald, T (2007) through the study of the submitted way pointing out that financial reporting under preliminary studies way will result in the multiplication of the spreadsheet, which reduces the ability to control and management reporting systems.

The appearing of XML technology had a significant impact on mathematics, E-commerce, chemistry and economics: In mathematics, there is a mathematical formulas related symbols Math production. In the field of electronic commerce, here is an bezel standard production. In the chemical field, there are com, cab, adapt etc production. So how to apply XML technology in the field of corporate financial reporting has got attention of accounting attracted, so the direction of financial reporting disclosures for research has turned to the study of CYBER.

Farewell et al (2010) find that the design of CYBER is fine-tuned to meet the particular needs of accounting and related disclosures. And CYBER provides an important foundation for the automated transfer of accounting information and associated metadata. 2. 2. Research about the effect of CYBER CYBER, as a business reporting language which is popular all over the world in Just ten years, must have unique charm, CYBER as bridges in general, is the frame through the accounting information and network.

Regardless of corporate governance and investors access to information are of great help. 2. 2. 1 Standardization strand teal (2001) CIA (2003) Jones & Willis (2003) Pinker (2003) Consider in the study that CYBER, under the premise of has no need to change existing accounting rules, allows the user to markup and send a variety of financial data in different formats by cross-platform standardization, directly exchange and analyzes he existing accounting processes can achieve the bigger timely and efficient process of accounting data.

While E. Bonbons, V. Cortile & T. Cobras think that different countries use different accounting principles(about this section, we will discuss in the fifth part), thus affecting the standardization of information, comparability and re- use, they recommended the establishment of CYBER-based International Financial Reporting Standards; If world created CYBER-based international financial reporting, CYBER would have helped to promote international convergence of accounting standards and even equivalent. . 2. 2 Spread Accuracy CYBER provides, for example, the ability to create a Balance Sheet containing not just a presentation of the numbers and their titles, but all the details that Join those numbers together to form a Balance Sheet produced using a specific GAP. This marking up of data process, once undertaken, enables information to flow between computing applications in a seamless fashion.

An example of such flow is from a public corporate report on the Web to a database maintained by an information intermediary. (Andrew Elmer, 2003) For companies, interactive information can improve the company’s reputation, and establish the integrity of the overall image in he market; for investors, this will give them the right investment guidance, enhance investor confidence and capital intensity. So speed accuracy, for the two sides of the company and investors, has more advantages than disadvantages.

Deference et al (2001) argue, CYBER is commonly used which means human and intelligent software agents allow the network to generate financial reports spread of high accuracy and reliability, and pointed out that new research content and research directions for the use and development of CYBER technology, such as classification standards, forensic and intelligence agents of the financial statements. Using the experimental method in the context of stock option compensate disclosure cognitive.

Farewell et al (2010)suggest a framework linking the Resource-Event-Agent (AREA) model and extensible Business Reporting Language Global Ledger (CYBER GAL.) as a way to extend the generalized CYBER GAL. taxonomy. And the framework can provide uniform access to information and more reporting and query permutations, thereby facilitating more comprehensive and timely business reporting. 2. 2. 3 Accounting Transparency Accounting transparency is the most important part of spread accuracy, so we take UT separately to research it.

Information transparency mainly relies on the company integrity and auditing standards, CYBER in the reporting language from has great extent to ensure the implementation of certain accounting transparency. Our team also conducted in-depth inquiry on transparency. Manic] Pickpocket et al (2009) investigate the transparency of CYBER, and they confirm the positive effect on financial report that transparency support. They think that could help disclosure information of financial report and avoid cheat and the active such as earning manipulate.

Hodge t al (2004) research the advantages of CYBER, noting that CYBER technology helps investors better access and integrate potential information, and improve corporate the method of empirical research, Pressures et al (2008) examine whether early voluntary reporting of financial information in CYBER format with respect to companies which does not use CYBER have better corporate governance and business performance. The results show that the decision to voluntary yearly disclose financial information in CYBER format and the corporate governance structure are significant positive correlation.

As for how to determine the degree of accounting transparency, classified by many literature review, we group confirm the following Accounting ratios for the degree of accounting transparency Ratios Calculation Accruals Ratio I net income-cash flows from operating activities I / asset Return on Sales net income / sales Cash flow Ratio cash flows from operating activities / sales Debt to Equity Ratio liabilities / equities the Change in Accounts Receivables (accounts receivables-prior year-accounts receivables) ‘(sales-prior year-sales) the Change in Gross Profit (sales-prior year-sales)/(gross profit-prior year-gross profit)

Through this ratio test, accounting transparency can be fully discriminated and analyzed. The paper can achieve qualitative research on the impact of accounting transparency from CYBER 2. 3. Classification criteria formulation research of CYBER 2. 3. 1 Historical Data Above (2005) consider the classification standards is a difficult process, Above noted the importance of the development, evaluation and improvement of existing CYBER classification methods, and suggest using empirical methods to evaluate and improve the CYBER taxonomy, by evaluating historical data classification criteria, to prove the facial need for classification criteria. . 3. 2 Global Accounting Standard E. Boonsön et al (2008) argue that the increase of CYBER classification criteria will lead to the presence of risks about goal standard, comparability and risibility of information. From the perspective of increasing the comparability of financial information between different countries, he notes the development of global accounting standards is the premise to establish CYBER taxonomy and provide assessment of the effectiveness of FIRS-GAP classification and the proposed direction 2. 3. Notes to Financial Statement By using standard research methods in CYBER financial reports on the SEC EDGAR (Electronic Data Gathering, Analysis and Retrieval) system, from the perspective of critique and evaluation study, Deference et al (2005) focus on the following areas: the role of CYBER in financial reporting, classification criteria of CYBER, the impact of CYBER technology on the SEC filing program. Research indicates that the classification quality of CYBER financial reporting disclosed in the notes is not easy to be guaranteed.

Farewell et al (2010) point out that the accuracy of mapping financial statement line items to the U. S. GAP taxonomy is of fundamental importance. Mapping errors may be as simple as mapping to an incorrect taxonomy concept, which should be discovered during review. Ineffective mapping may lead to unnecessary extensions, which hinders comparability. Deference et al (2010) study the impact of how the navigation method used to locate financial statement line items within the U. S. GAP Taxonomy impacts the effectiveness and efficiency of the mapping task. . 3. 4 CYBER future development of classification – CYBER multidimensional model With the development of CYBER, classification standards are maturing, so in the last stage, he need for deepening research of CYBER is becoming intense. And GarГinning mentioned in the paper, the Committee of European Banking Supervisors (ACES) requires Member States adopt CYBER, CYBER which is addressed as the De facto standard of business reporting should introduce greater efficiency, speed and integrity which will make the European financial markets more competitive.

Both taxonomies build up not only on the basic CYBER specification but also on CYBER Dimensional Taxonomies (EXT) specification allowing multidimensional modeling of reported data. Classification CHEEP and FINNIER allow packets multidimensional data del, Simultaneously, in order to be a response of tool vendors to the demands of analysts, there is the need for multi-dimensional modeling of CYBER. But CYBER multidimensional model must be related to other areas like database security, temporal issues, query optimization, and translation theological/physical level methodologies, or Just studying modeling problems at conceptual level.

Furthermore, the definition of multidimensional views should also be studied in order to support symmetric usage of factual and dimensional data as well as ad-hoc hierarchies. 2. 4. Research about financial reports auditing assurance based on CYBER Auditors are consumers of financial information as much as other participants in the supply chain reporting. Using software based on CYBER the auditor could analysis and compare the financial information with a few clicks. And Most of the authors agree that CYBER could play an important role in financial audit and continuous audit.

Woodrow (2001) pointed out that the implementation of continuous auditing is more flexible with the appearance of CYBER. In the debt covenant compliance field, he designs and proves the implementation of continuous auditing by the digital agent o monitor the actual value of the parameter so that it meets the agreement standards in the he customer debt covenants. And Murphy and Groomer (2004) developed the mode of continuous auditing based on the web service for the accounting system based on XML.

The mode has laid a foundation for the creating real-time CYBER instance document online. The Extensible Assurance Reporting Language (CARL) enables providers to ensure the integrity of the financial report scattered on the Internet. The establishment of the CARL makes the continuous real- time audit possible. Borzoi et al (2005) point out form the view of the security Achaeans CYBER and CARL can’t play their role completely, if there is absence of a good security mechanism. What’s more, peer-to-peer network security mechanism has certain defects in the current.

A number of papers highlight specific issues of concern in relation to the audit of Internet financial reporting. Deference and Gray (1999) discuss the following issues: ; Is the audit opinion safe from change by the client or other party? ; Should the web-based auditor’s report reside at the auditor’s or the client’s web site? ; What weight should be given to an auditor’s report date when documents on the web can be changed? Should the auditor allow hyperlinks to, and/or from, the auditor’s report? ; The look and feel of the auditor’s report. The expression of authority of audit statements. Most of these issues are still current and have not been addressed. So they have made a point that the service security mechanism of the web financial statement can provide favorable conditions for the auditing assurance of the financial statement. CYBER enables continuous auditing by placing financial data in a format which is not proprietary to any specific software application, allowing any future continuous auditing system access to data on any software platform, running any software (which uses CYBER), in any country (Flowerbed, 2006). N the paper “CYBER: Benefits for FRR and Auditing” , Bizarre& Garcia (2010) mention the benefits of CYBER for auditors: Improving data analysis, better risk assessment, and accelerated implementation of continuous auditing, improved internal controls, reducing spread sheet proliferation and enhanced audit trails. But regrettably, CPA does not provide a set of the comprehensive management statement about the completeness, accuracy and consistency of the CYBER tag data under the SEC requirements.

Regard &Alexander, 2010)Because the assurance of the SOP 09- 1 file based on CYBER exists some non- system defects. The assurance program does not have high efficiency and effectiveness. In order to ensure consistency, persistence and systematic of the audit assurance, it is necessary to establish a framework of the audit assurance based on CYBER. CYBER applications could assist auditors with some of the meticulous aspects of their work, such as research, processing and analyzing large amounts of information.

These applications could be fit for certain types of analysis, such as comparing data from industry and trends. More importantly the current procedures for data mining analysis can be replaced by several analyses more timely, accurate and complete (Lucian Christian EN, 2012). Pickpocket teal (2010) find that almost one quarter of the voluntary CYBER filings did have errors. The half of errors is made up of the so-called debit/credit reversals. An additional quarter of the errors were where one or more members of a calculation relationship were either missing or extraneous.

Auditors of instance documents. 2. 5. Research about the implementation of CYBER in different countries A successful implementation of a large-scale complex information technology/ yester project usually requires strong management support, so does CYBER. The literature on management information systems emphasizes the role of top management support. Top management support is able to address resistance to change accompanying the introduction of new information technology and can provide the needed resources for implementation.

Here we document 5 countries’ implementation of CYBER, including Korea, the Netherlands, Australia, Singapore and the U. S. 2. 5. 1. Korea Korea is one of the leading countries that have developed a mandatory filing program in CYBER format. This policy has been in effect in Korea since October 2007. Korea is a leader in adopting and deploying CYBER in financial reporting, ahead of the U. S. , Japan, and the ELI, by having a mandatory filing program in CYBER format. All publicly-held firms in Korea have been required to report financial statements in CYBER format since October 1, 2007 (FUSS (Financial Supervisory Service), 2007).

The companies listed in the KOPI (Korea Composite Stock Price Index) and the KIDDOS (Korean Securities Dealers Automated Quotations) must file their financial reports, including annual, semi-annual, and quarterly reports, to the DART system using CYBER format Hymnbook Yon, 2011). 2. 5. 2. The Netherlands The Netherlands’ effort to implement CYBER is arguably one of the first implementations conducted on a national scale. The Netherlands began its comprehensive national taxonomy project with CYBER as the default taxonomy. The open-source platform and its supporting international community were two main reasons for selection of CYBER.

The CYBER implementation in the Netherlands went through two main phases. The first four years of implementation from 2005 to the end of 2008 focused on building the CYBER-based taxonomy (The Dutch Taxonomy Project, 2008). It has narrowed standards and harmonize data elements and received recognition from the Dutch government for filing business and financial information. In early 2009, the Dutch Taxonomy Project became the Standard Business Reporting program; it better reflects the overall mission of reducing the business reporting burden and increasing government efficiency.

This SUB program was assigned to the “Central Government Reform Program” (Standard Business Reporting ML (HINT), 2009). 2. 5. 3. Australia The Australian Standard Business Reporting (SUB) using CYBER as the default standard Egan in 2006 and received broad-based support. The primary reason Australia’s SUB chose CYBER was because it could minimize the regulatory reporting burden on regulation (Y. -C. Chem., 2012). Australia’s SUB/CYBER implementation has developed a taxonomy and built processes and tools for standardization. This CYBER implementation impacts approximately 2. Million businesses in Australia on the reporting side (Madden, 2009, p. 9). Over 100,000 accountants and more than 240 software developers are also affected by the implementation. The use of the CYBER format is voluntary for regulatory reporting purposes. The benefits of standardization via CYBER, as the Australian government argues, should help persuade businesses to adopt it. 2. 5. 4. Singapore The primary motivation for Singapore adoption of CYBER is to improve the efficiency, transparency, and accuracy of financial and business information reporting. Efficiency lies in the implementation of a one-stop portal for businesses.

Such implementation also enhances the transparency of financial activities in Singapore, and in turn promotes an environment conducive for business. Accuracy is also an important goal. CYBER was the standard of choice due to its nature platform ND strong support from both the software development community and other stakeholders (Mejia & Kook, 2008). 2. 5. 5. U. S. Securities and Exchange Commission (SEC) The primary motivations for the SEC to leverage CYBER include increasing efficiency of financial data gathering, improving data quality, and achieving transparency.

The interactive data project highlights the importance of transparency in achieving the SEC’s larger mission of providing timely and quality financial information to investors. The SEC’s CYBER implementation has evolved over time, shifting from the voluntary to he mandatory use of the CYBER format. Initially, the SEC took a non-mandatory approach when launching its voluntary program in April 2005. Participation was rather limited. Less than 2% of the companies covered by SEC rules and mostly large ones Joined the voluntary program (Effendi, Smith, & Wong, 2009).

In mid 2008, the SEC considered a proposed mandatory rule and made the final decision to transition to the mandatory approach in December 2008. Year 2009 marked the first year of SEC implementation in which companies of market capitalization of $5 billion or more were included. Year two brings all other large accelerated filers, and year three requires all remaining filers. The transparency brought by CYBER reporting combined with the Interactive Data Initiative is likely to become increasingly enhanced as more companies participate in CYBER reporting and as more analytical tools are developed to take advantage of CYBER financial information.

The United States, as the one of countries which take the lead in carrying out implementation of CYBER, is also the birthplace of CYBER, we will be U. S. Securities and Exchange Commission (SEC) as a research background. And GarГinning (2009) documented that the CYBER-enabled reporting process seeks to minimize the ambiguity in the meaning of information presented in a variety of performance and compliance reports. But they concentrated only on the core financial statements.

Much of the value of the CYBER mandate comes in its second year, when the notes and additional disclosures are tagged. Research is reporting notes and additional disclosures. Potentially, as tagged notes and additional disclosures are introduced in the filing, the increase in the level of complexity introduced in filings can increase exponentially. Research is also accessory on the quality of filings (broadly) and extensions (more narrowly) made by the second and third groups of filers, as compared with the large accelerated filers that are the subject of this study. 2. 6.

Research about CYBER in China October 2010, the Ministry of Finance and the National Standardization Management Committee respectively issued a general CYBER taxonomy based on the enterprise accounting standards and the national standards about CYBER technical specifications. And they require companies to follow the general taxonomy to preparation their 2011 annual financial reporting based OXBLOOD, submitted within the specified time. This is an important step on our path towards internationalization of accounting. Scholars also increased attention to the study of the CYBER.

GAO Jinn Ping (2007) constructs a CYBER financial reporting classification standard theoretical, based on ontology, information elements, the company reporting practices and accounting, disclosure rules and CYBER technical specifications. And she determines the coverage of the classification criteria information on the theoretical foundation. She also enacts a reasonable classification system framework. Then she further classified information about each basic classification module in the lactation’s system to complete the definition of information elements.

In the meantime, she creates our national CYBER financial reporting classification criteria. The industries and enterprises can be further expanded on this standard to suit the special feature of these industries and enterprises. Yang Chou Nan, GHz Joining , Changing J et al ( 2010 ) use third-party non-profit organization theory , ontology, software architecture and software maturity model theory as the theoretical basis, combined with CYBER taxonomy certified content, attempted to establish the CYBER taxonomy certification methodology system.

They also elaborate the relationship between the elements of the methodology system. Quo Gallons , Jackson Huh ( 2010 ) considered CYBER is an important part of our accounting information construction and development in the coming period. It appears to put forward new accounting personnel training requirements. They classify the accounting professionals into three types (design and development personnel, operation and maintenance personnel and use of personnel information). For the status quo of China’s accounting personnel training, they propose countermeasures about the training of proficiency CYBER accounting personnel.

x

Hi!
I'm Niki!

Would you like to get a custom essay? How about receiving a customized one?

Check it out