J. Efrim Boritz

Orcid: 0000-0002-9752-5131

According to our database1, J. Efrim Boritz authored at least 26 papers between 2000 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
AI and the Accounting Profession: Views from Industry and Academia.
J. Inf. Syst., October, 2023

<i>Journal of Information Systems</i> Workshop on Data Value Creation: Views from Industry and Academia.
J. Inf. Syst., March, 2023

2022
Factors Affecting Employees' Susceptibility to Cyber-Attacks.
J. Inf. Syst., September, 2022

<i>JIS</i> Workshop on Robotic Process Automation (RPA) Research: Views from RPA Industry Leaders and AIS Researchers.
J. Inf. Syst., 2022

2021
Classifying Restatements: An Application of Machine Learning and Textual Analytics.
J. Inf. Syst., 2021

2020
How Significant are the Differences in Financial Data Provided by Key Data Sources? A Comparison of XBRL, Compustat, Yahoo! Finance, and Google Finance.
J. Inf. Syst., 2020

How understandable are SOX 404 auditors reports?
Int. J. Account. Inf. Syst., 2020

2018
The Impact of Senior Management Competencies on the Voluntary Adoption of an Innovative Technology.
J. Inf. Syst., 2018

2016
Ad hoc reviewers.
Int. J. Account. Inf. Syst., 2016

Procedures for requesting and evaluating papers for the 2015 Research Symposium on Information Integrity & Information Systems Assurance.
Int. J. Account. Inf. Syst., 2016

Foreword.
Int. J. Account. Inf. Syst., 2016

2015
Firm-Specific Characteristics of the Participants in the SEC's XBRL Voluntary Filing Program.
J. Inf. Syst., 2015

2014
Business Modeling to Improve Auditor Risk Assessment: An Investigation of Alternative Representations.
J. Inf. Syst., 2014

The Impact of Executive Team Competencies on XBRL Aoption.
Proceedings of the International Conference on Information Systems, 2014

2013
A content analysis of auditors' reports on IT internal control weaknesses: The comparative advantages of an automated approach to control weakness identification.
Int. J. Account. Inf. Syst., 2013

2012
On IT Control Weaknesses in Auditors' Reports on Internal Control.
Proceedings of the 18th Americas Conference on Information Systems, 2012

2011
E-Commerce and Privacy: Exploring What We Know and Opportunities for Future Discovery.
J. Inf. Syst., 2011

2009
Assurance on XBRL‐Related Documents: The Case of United Technologies Corporation.
J. Inf. Syst., 2009

2008
Internet Privacy in E-Commerce: Framework, Review, and Opportunities for Future Research.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

2007
Impact of Top Management's IT Knowledge and IT Governance Mechanisms on Financial Performance.
Proceedings of the International Conference on Information Systems, 2007

2006
Editorial.
Int. J. Account. Inf. Syst., 2006

Adaptive Fraud Detection Using Benford's Law.
Proceedings of the Advances in Artificial Intelligence, 2006

2005
IS practitioners' views on core concepts of information integrity.
Int. J. Account. Inf. Syst., 2005

Detecting Fraud in Health Insurance Data: Learning to Model Incomplete Benford's Law Distributions.
Proceedings of the Machine Learning: ECML 2005, 2005

2002
Reply to Discussions of Investigating the Impact of Auditor-Provided Systems Reliability Assurance on Potential Service Recipients.
J. Inf. Syst., 2002

2000
1999 Symposium on IS Assurance Panel Discussion on SysTrust.
J. Inf. Syst., 2000


  Loading...