Next Article in Journal
Large Language Models for Nowcasting Cryptocurrency Market Conditions
Previous Article in Journal
Multiscale Stochastic Models for Bitcoin: Fractional Brownian Motion and Duration-Based Approaches
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Quantum Computing and Cybersecurity in Accounting and Finance in the Post-Quantum World: Challenges and Opportunities for Securing Accounting and Finance Systems

by
Huma Habib Shadan
* and
Sardar M. N. Islam
Institute for Sustainable Industries & Liveable Cities (ISILC), Victoria University, Melbourne, VIC 3000, Australia
*
Author to whom correspondence should be addressed.
FinTech 2025, 4(4), 52; https://doi.org/10.3390/fintech4040052
Submission received: 25 June 2025 / Revised: 11 September 2025 / Accepted: 13 September 2025 / Published: 25 September 2025

Abstract

Quantum technology is significantly transforming businesses, organisations, and information systems. It will have a significant impact on accounting and finance, particularly in the context of cybersecurity. It presents both opportunities and risks in maintaining confidentiality and protecting financial data. This study aims to demonstrate the application of quantum technologies in accounting cybersecurity, utilising quantum algorithms and QKD to overcome the limitations of classical computing. The literature review emphasises the vulnerabilities of current accounting cybersecurity to quantum attacks and highlights the necessity for quantum-resistant cryptographic mechanisms. It discusses the risks related to traditional encryption methods within the context of quantum capabilities. This research enhances understanding of how quantum computing can revolutionise accounting cybersecurity by advancing quantum-resistant algorithms and implementing QKD in accounting systems. This study employs the PSALSAR systematic review methodology to ensure thoroughness and rigour. The analysis shows that quantum computing pushes encryption techniques beyond classical limits. Using quantum technologies in accounting reduces data breaches and unauthorised access. This study concludes that quantum-resistant algorithms and quantum key distribution (QKD) are crucial for securing the future of accounting and finance systems.

1. An Introduction: Quantum Computing and Accounting and Finance System Cybersecurity Challenges

1.1. Background of the Study

Quantum computing is reshaping digital trust in accounting and finance, creating both significant threats and opportunities for cybersecurity. Cybersecurity has become a crucial component of modern accounting and finance systems, driven by the growing sophistication of cyber threats. Traditional cryptographic techniques, such as RSA and Elliptic Curve Cryptography (ECC), face new vulnerabilities as financial data and transactions become increasingly digitalised, particularly with advancements in quantum computing [1]. Financial organisations are particularly vulnerable to attacks from adversaries utilising quantum technology, as they primarily depend on public-key cryptography protocols. Quantum computing has the potential to revolutionise current cybersecurity systems, making the accounting and finance industries particularly vulnerable to significant changes. By examining the relationship between quantum computing and the protection of financial systems, it becomes evident that this new technology is both a powerful ally and a formidable challenge. This study aims to elucidate the complexities of how quantum computing can enhance the cybersecurity of financial and accounting systems. Transitioning from classical to quantum paradigms involves significant risks as well as opportunities for stronger data protection and transaction security.
In our ongoing commitment to advance our understanding of the intersection between quantum computing and cybersecurity in accounting processes, we conducted a comprehensive literature review. The findings indicate significant advancements in encryption methods, with quantum computing providing enhanced defences against online attacks. However, the journey toward integrating quantum technology is not without challenges, as it requires substantial modifications to current cybersecurity strategies. The investigation underscores the pressing need to develop quantum-resistant algorithms and implement quantum key distribution (QKD) to secure financial data in the long term. As we navigate this technological transition, our goal remains to create more reliable and secure accounting systems, ensuring the accuracy and privacy of financial information in an increasingly digital world. The urgency of transitioning to quantum-resistant cryptography has been underscored by the National Institute of Standards and Technology (NIST), which has set a timeline for the post-quantum migration. In 2022, Ref. [2] NIST began the process of standardising cryptographic algorithms that can withstand the capabilities of quantum computers. By 2024, NIST plans to finalise standards for quantum-resistant algorithms, which will provide the foundation for organisations to transition to quantum-secure systems in the coming years [2]. This timeline highlights the urgent need for industries, including finance and accounting, to start preparing for the quantum revolution.
The financial services sector is currently undergoing a substantial acceleration in digitisation. This transformation presents various challenges associated with the use of traditional cryptographic methods, such as RSA and ECC. These methods are becoming increasingly susceptible to the advancements in quantum computing, particularly with the emergence of algorithms like Shor’s algorithm. Global financial regulators have acknowledged that the capabilities of quantum computers may soon render existing encryption protocols obsolete, thereby posing significant risks to confidentiality, data integrity, and operational stability [3].
In response to the imminent threat, financial institutions are thoroughly exploring various strategies to enhance their resilience. This includes the adoption of cryptographic agility, the implementation of post-quantum algorithms, and the deployment of quantum key distribution (QKD) technologies [4]. Furthermore, in regulatory environments such as the European Union’s Digital Operational Resilience Act (DORA), there is a growing emphasis on the early adoption of quantum-safe cryptography as a precautionary measure [5].
This evolving landscape, characterised by the convergence of policy, technology, and risk management, serves as the foundation for our study. The objective of our research is to develop and evaluate a conceptual framework that effectively integrates user-level, organisational, and quantum-specific constructs. This framework is designed to guide the implementation of these measures within accounting and finance environments.

1.2. Motivation and Relevance

The convergence of quantum computing (QC) and cybersecurity (CS) marks a pivotal turning point in the evolution of accounting and financial systems. With the increasing digitisation of financial operations, cybersecurity has become fundamental in protecting sensitive accounting data, client records, and strategic financial information [6]. However, existing cryptographic frameworks, such as RSA and Elliptic Curve Cryptography (ECC), which form the backbone of current cybersecurity protocols, are highly susceptible to quantum algorithms—namely, Shor’s algorithm for integer factorisation and Grover’s algorithm for search—which could render these methods obsolete [7]. Concurrently, quantum computing offers transformative computational advantages, enabling the high-speed resolution of complex financial problems, such as portfolio optimisation, risk modelling, and credit scoring [8]. However, the same computational power introduces new cybersecurity challenges, threatening the integrity of encrypted systems [9]. This balance of risks and opportunities makes the topic both timely and urgent. It presents the possibility of conceptualising and implementing quantum-resilient cybersecurity architectures within accounting frameworks, thereby facilitating the development of financial infrastructures that are resilient for the future.
The banking sector is encountering significant vulnerabilities due to advancements in quantum computing. Traditional encryption protocols, such as RSA and ECC, are increasingly inadequate against quantum algorithms. Financial institutions depend on these cryptographic techniques to secure transactions, digital audit trails, and sensitive client data, all of which are at risk of compromise. Digital audit trails, crucial for maintaining the integrity of financial records, are also vulnerable to quantum attacks that can dismantle existing verification protocols. Furthermore, the reliance on blockchain technologies complicates the landscape, as blockchain systems, which support cryptocurrencies and smart contracts, use secure hash functions that may be susceptible to quantum-based exploits. If quantum computers become capable of executing Shor’s or Grover’s algorithms, blockchain security could be severely compromised, resulting in significant consequences for the stability of global financial systems.

1.3. Research Aim, Research Questions and Research Objectives

1.3.1. Research Aim

The primary aim of this study is to explore and develop a comprehensive understanding of how quantum computing technologies can be applied to enhance the cybersecurity of accounting systems. This study aims to scrutinise the potential of quantum computing to strengthen cybersecurity measures in accounting, focusing on how quantum algorithms and technologies can address the limitations of classical computing in safeguarding sensitive financial data and ensuring secure transactions. It involves analysing the potential of quantum-resistant algorithms and quantum key distribution (QKD) in safeguarding financial data against emerging cyber threats, thereby providing the integrity, confidentiality, and reliability of accounting processes in the quantum era.

1.3.2. Research Question

  • Primary Question:
The primary question that needs to be considered in this study is as follows:
“How can quantum computing enhance CS in accounting and finance within an organisation?”
It also compares the effectiveness of quantum-resistant algorithms in safeguarding accounting data through quantum-enabled attacks with classical cryptographic methods. This research also explores the response to how the conceptual model, based on the Thompson model [6], can be adapted to incorporate QC Technologies for enhanced customer satisfaction (CS) in accounting. Further research identifies the main challenges an organisation faces in adopting QC Technologies for improved cybersecurity in accounting and suggests ways to resolve them.
b.
Secondary Research Questions:
RQ1: 
What are the critical computing threats in current accounting systems that quantum computing can address?
RQ2: 
What are the most promising quantum algorithms for securing financial data in accounting?
RQ3: 
How can quantum computation be integrated into current accounting systems without disrupting operations?
These research aims, objectives, and questions are designed to guide the exploration and analysis of quantum computing’s role in transforming the cybersecurity landscape for accounting systems, ultimately contributing to the development of more secure and resilient financial infrastructures.

1.3.3. Research Objectives

This study clarifies the role of quantum computing as both a threat and a tool in accounting cybersecurity, responding to the aforementioned research questions. The objectives aligned with these questions include the following:
  • Objective 1:
Identify and analyse the major cybersecurity threats facing contemporary accounting and finance systems. Determine which threats could be mitigated or neutralised by quantum computing capabilities, which will be addressed through responding to Research Question 1.
b.
Objective 2:
Investigate and evaluate quantum computing algorithms and techniques (such as quantum cryptography and quantum-resistant algorithms) that show promise for protecting financial data. Assess their applicability and effectiveness in accounting contexts, which is addressed by responding to Research Question 2.
c.
Objective 3:
Develop a framework or guidelines for integrating quantum computing-based security measures into existing accounting information systems. The goal is to implement these measures to minimise disruption to business operations, which is addressed by responding to Research Question 3. It includes considering the organisational, technical, and regulatory factors that influence successful implementation.

1.4. Significance of the Study

This research is significant for both academia and industry, as it uniquely bridges the fields of quantum computing and accounting cybersecurity—an area that has received little scholarly attention. Adopting this research article academically bridges a gap between the domains of quantum computing and accounting information systems security, two fields that are rarely considered. It contributes to the theoretical understanding of how emerging technologies can transform cybersecurity practices in specific contexts (here, financial and accounting systems). Practically, the findings will help organisations in the financial sector prepare for the quantum revolution. For instance, a recent industry survey found that over 70% of large U.S. firms expect quantum computers to break current encryption by 2030 and are “extremely concerned” about this threat [10]. However, many firms have not started planning adequate defences [10]. By providing insight into quantum-resilient security measures and integration strategies, this study offers timely guidance to practitioners (CISOs, IT managers, auditors, and accountants) on strengthening their systems before quantum attacks become a reality.
This study makes a significant transdisciplinary contribution to cybersecurity, financial systems engineering, and quantum information science. Establishing a comprehensive framework for the assessment and implementation of quantum cybersecurity techniques enhances the existing knowledge base in this domain. This framework equips financial organizations with critical insights necessary for fortifying their data systems against potential post-quantum threats. Furthermore, the research addresses significant policy-level implications, underscoring the pressing need for industry leaders and regulatory bodies to prioritize investments in quantum-secure infrastructures and to facilitate the upskilling of the cybersecurity workforce. Recent studies have highlighted the growing need for quantum-resilient encryption in various sectors, yet quantum resilience in accounting systems remains largely underexplored. For example, the adoption of quantum-resistant algorithms in financial data encryption has been explored, but their application to accounting systems has not been fully developed. Moreover, although QKD offers provably secure key exchange against quantum threats, its integration into accounting systems remains limited. This gap highlights the need for tailored implementation strategies in finance-specific infrastructures. This gap underscores the novelty of the present study, which seeks to bridge these gaps by proposing a conceptual framework that applies quantum resilience to accounting systems.

2. Literature Review and Theoretical Foundations

2.1. Overview of Cybersecurity in Accounting and Finance

Digital transformation [8] in accounting and finance has reshaped traditional practices, enabling greater efficiency, accessibility, and analytical capability. Digitalising accounting records, electronic transactions, and cloud-based storage systems has expanded the cyber-attack surface for malicious actors. The researcher in [11] emphasises the importance of comprehending cybersecurity risks fully when implementing digital transformation (DT) to prevent disruptions caused by malicious activity or unauthorised access by attackers seeking to modify, destroy, or extract sensitive data from users. Cybersecurity is essential to DT, providing security against online threats. To mitigate cybersecurity risks during digital transformation (DT) implementation, the research aims to investigate the impact of cybersecurity and digital transformation on business resilience. Prioritising cybersecurity measures and ensuring systems are safe from potential threats are essential for organisations that utilise digital transformation (DT) [12,13]. The author adopted the PRISMA methodology and the systematic literature review approach, focusing on various sectors, including finance, healthcare, government, and industry, to discuss the unique challenges and solutions each faces in cybersecurity. Because business organisations are so diverse, the researcher explained in his article that their technology systems are also diverse. Therefore, organisations can enhance cybersecurity using contemporary technologies, such as the Internet of Everything [14,15]. They presented theoretical and practical suggestions for improving economic security in the digital economy. When organisational procedures are converted into IT solutions, data transformation (DT) occurs. It can have a significant impact on various areas of a company.
However, as explained in Ref. [11], emerging technologies such as blockchain, cloud computing, big data analytics, and artificial intelligence pose cybersecurity risks. While new technologies improve efficiency and competitiveness, they also introduce new cybersecurity threats [13]. Appropriate security measures should also be in place to protect technology infrastructures from cyberattacks [16]. Organisations can defend themselves against recurring cyberattacks by implementing a basic security plan [17]. The review necessitates proactive cybersecurity measures and research from a global perspective across various regions. It also suggests that organisations analyse cybersecurity investments to determine where frameworks could be developed.

Cybersecurity

The researcher in this article [18] discusses cybersecurity, clarifying that it involves maintaining integrity, availability, and confidentiality. It also requires full authentication and non-repudiation to prevent harm to electronic communication systems and services. CISCO has explained cybersecurity and deployed several levels of security across networks and systems to thwart attacks on confidential data or commercial processes.
Ref. [19] The researcher explains in his article how quantum computers are going to have an impact on cybersecurity concerns. The researcher discusses the study of cybersecurity in their article, considering it a dynamic field since attackers are constantly devising new ways to compromise equipment. Even if many new attacks are released daily, there will be more to come. Recent findings have demonstrated that the concept of a quantum computer has advanced from theory to a working technological system. Although they are still in the research and development stage, quantum computers are expected to surpass current supercomputers in performance. Furthermore, they note that programmers can soon fully implement quantum algorithms, which have the potential to crack all current forms of cryptography.

2.2. Quantum Computing

The researcher [20] explains the concept of quantum computing and discusses the concepts of entanglement and superposition, which originate from quantum mechanics and are utilised in quantum computing, a novel form of processing that enables data to be processed in ways that conventional computers cannot. Classical bits can only be 0 or 1, while quantum bits, or qubits, can exist simultaneously in several states. Thanks to this capability, quantum computers can complete complex calculations more rapidly. This capability has great potential for addressing problems that conventional computers cannot, such as simulation and optimisation tasks. Quantum computing is based on manipulating measurable and controllable quantum states. In some instances, quantum computers can outperform traditional methods, as demonstrated by the development of quantum algorithms such as Grover’s algorithm for searching through unsorted databases and Shor’s algorithm for factoring large numbers. The finance sector sees quantum computing as a revolutionary technology that can enhance risk analysis, financial modelling, and optimisation processes.

2.3. Cryptography

We are going to split the word cryptography, first considering the word prefix “crypt”, which means “hidden,” and the suffix “graph”, which means “writing.” The researcher [21] explained it as the study of secure, protected, and confidential transmission or communication techniques between two computers or parties. Researchers compare this mechanism with people’s desire to communicate confidentially and privately with themselves. They take steps and measures to prevent third-party invasion and read their messages. The researcher in [19] explains that nearly every encryption method used today is influenced by quantum theory. It uses mathematical algorithms and the algebraic structure of various protocols. Cryptography refers to the practice of securing information against potential adversaries, preventing unauthorised access to confidential data through the mathematical guarantees provided by cryptographic systems.

Strategies for Cryptography

In the modern era of computers, cryptography is frequently associated with converting plain text to ciphertext—text formatted in a way that only the intended authorised recipient can decode—a process known as encryption. Decryption is the process of converting encrypted text back to plain text. Cryptography secures data and communications by restricting access to authorised recipients. The process involved prevents illegal access or invasion of data during the process. Considering the cryptographic technique, we can interpret it as safeguarding data, information, or communication using codes so that only approved and authorised recipients can access it [22]. Figure 1 briefs the symmetric and asymmetric algorithm classification.

2.4. Prior Year Research

2.4.1. Cybersecurity in Accounting Research

The authors in [6] elaborated on the vital role of cybersecurity in safeguarding financial data in the accounting industry, which is examined in this study paper. With the development of digital technology, accounting businesses must implement robust cybersecurity measures due to the increasing potential for cyberattacks. This research provided a comprehensive analysis of the role of cybersecurity in protecting financial data within the accounting profession. This study thoroughly examines how top accounting firms, such as Deloitte, PwC, and EY, have incorporated cutting-edge cybersecurity technologies, including advanced encryption, blockchain, and artificial intelligence, into their daily operations. For instance, Deloitte has implemented advanced encryption methods to protect sensitive financial data, while PwC has integrated blockchain technology for secure and transparent transactions. The efficacy of multi-layered cybersecurity solutions in enhancing data security, mitigating breaches, and strengthening fraud detection capabilities is underscored by significant findings. Nonetheless, issues such as exorbitant operating expenses and the rapid development of cyber threats persist.

2.4.2. Innovative Accounting Methodology for Ensuring the Interaction of Economic and Cybersecurity Enterprises

In one article [23], the researcher aims to position accounting as a novel, multifaceted system that facilitates the interplay between economics and cybersecurity in businesses. In addressing the growing cyber threats that impact economic security, the study highlights the vital role that accounting plays in mitigating these risks. Mitigating the financial impact of cyber threats requires modifying accounting standards, enhancing the accuracy of accounting data, and ensuring that reputation management and communication are effective. The gap identified by the authors is based on the previous literature, where a separate study explored the intersection of economic security and cybersecurity. Research needs to be conducted to identify accounting as the bridge between them. This study utilises various global datasets, including the Global Cybersecurity Index (2018), Global Innovation Index (2018), and World Digital Competitiveness Ranking (2018), to analyse the cybersecurity level of relationships between digital competitiveness across different countries and their economic security. Future research, as identified by the researcher, emphasises the necessity of continuing studies into how accounting techniques can be constantly modified to counteract the ever-changing nature of cyber threats. The researcher suggests that one approach to this is to develop adaptable and responsive accounting procedures that can quickly adjust to emerging cyber threats. The researcher also noted the most significant losses, which are hardest to calculate, at the highest reputation level. Therefore, further research is necessary to accurately assess the financial impact of cyber threats.

2.4.3. Cybersecurity and Prevention in the Quantum Era

The author [9], in his article regarding the implications of quantum computing on cybersecurity, explained that among several industries, cybersecurity could be revolutionised through the progress and development of quantum computing at the 2nd International Conference for Innovation in Technology. Because quantum computers can execute a wide range of calculations far more quickly than classical computers, they may be able to crack many currently thought-to-be-safe cryptography schemes. As a result, the development of quantum computers has sparked concerns regarding the security of current cybersecurity systems and the need to create new, quantum-resistant cryptography algorithms [24].
Cybersecurity risks come in various forms, including ransomware, phishing, malware, and denial-of-service attacks. Hackers, cybercriminals, and nation-state actors are the factors creating the danger. Quantum cryptanalysis, which analyses and potentially breaks classical cryptography systems by exploiting quantum states and measurements, is one possible application of quantum computers in cyberattacks. It could involve attacks against conventional cryptography protocols, quantum key distribution (QKD), and other quantum cryptographic protocols (IV).
Additionally, hackers may utilise quantum computers to carry out various types of cyberattacks, such as machine learning assaults, in which they train a quantum machine learning model to perform a specific function, like speech or image recognition. The author describes the quantum threat by considering two quantum machine learning algorithms: Shor’s method and Grover’s method. Shor’s method is a quantum computing technique that factors large integers in polynomial time. It could undermine public-key encryption schemes, such as RSA, which rely on the idea that factoring large numbers is computationally impractical, whereas “Grover’s quantum search algorithm is a quantum algorithm that can search for an unsorted database with N items in O(√N) time, which is faster than the O(N) time required by classical algorithms.”

2.4.4. Quantum Computing for Finance: Overview and Prospects

The study [8] evaluates existing methods and explores future possibilities, discussing the potential applications of quantum computing in finance, including risk analysis, credit rating, and portfolio optimisation. It would have been interesting to examine how quantum technologies can be relevant to blockchain and cryptocurrencies. Alternatively, Ref. [8] discusses quantum finance, quantum money, the impact of quantum cryptography on the security of financial transactions, and the applications of quantum simulators in finance. The study [8] focuses on the application of quantum computing in risk analysis, credit rating, and portfolio optimisation in the banking industry. Quantum computation offers the possibility of highly efficient algorithms that could provide exponential speed-ups for some technologically significant tasks compared to classical information processing [25].
The study [8] claims that quantum annealers can optimise portfolios, uncover arbitrage opportunities, and evaluate credit. Quantum amplitude estimation offers a quantum mechanical approach to accelerating Monte Carlo sampling. The [8] study highlights quantum computing’s potential in finance—particularly risk analysis, credit rating, and portfolio optimisation—while emphasising the need for further research before fault-tolerant processors are developed.
Additionally, they propose [8] that imperfect quantum computers could have exciting applications before fault-tolerant quantum computing is achieved. The authors claim that quantum computing has the potential to transform the financial industry. They encourage scholars to explore the potential applications of quantum computing in the financial sector. The authors assert that quantum computing can revolutionise the field of finance. They urge researchers to explore the potential applications of quantum computing within the financial industry.
Table 1 summarises the consolidated and reviewed literature, where the research gaps are mapped to primary and secondary research questions (RQ1–RQ4) and article research propositions (P1–P4) to ensure relevant coverage of the study objectives. The table provides further direction for the study by demonstrating that the existing literature, to date, is insufficient in addressing numerous aspects related to quantum computing, cybersecurity, and accounting systems, including, but not limited to, vulnerabilities, quantum-resilient integration strategies, and institutional preparedness for financial quantum computing.

2.5. Limitations of the Existing Literature Reviews

A key limitation of existing literature reviews is the failure to identify the intersection of quantum computing and cybersecurity in the context of accounting and finance. Currently, no reviews integrate these two domains and outline the unique implications, vulnerabilities, and opportunities for securing accounting and finance systems in the quantum era. It was pointed out that [26] lacks literature addressing the practicality of seamlessly integrating quantum computing technology with existing accounting and finance systems without disrupting ongoing operations. The transition from current systems to quantum-resistant alternatives has not been thoroughly planned or considered, and this process is expected to be quite complex. It was discussed [27] that, despite being considered a promising field of study for enhancing data security, the literature does not identify and evaluate the most promising quantum algorithms for securing financial data. It has left an important question unanswered: which quantum algorithms are the best suited to achieving cybersecurity in the financial sector? The author [28] points out that the lack of common standards for comparing and assessing quantum systems is a significant drawback, making it difficult to evaluate the potential and progress of quantum computing platforms unbiasedly. This lack of standardisation also challenges the development of widely accepted quantum-resistant security measures. As noted in various studies, transitioning from current systems to post-quantum cryptography often requires substantial computational resources and a deep understanding of quantum technology. Additionally, the uncertain timeline for the arrival of large-scale quantum computers further complicates this transition. While theoretical advancements in quantum cryptography and quantum key distribution (QKD) are well documented, few practical experiments and applications demonstrate how effectively these technologies can secure accounting and financial systems [28].
Financial data are heavily regulated (by laws such as GDPR for privacy, SOX for financial reporting integrity, etc.), and these regulations often mandate specific security controls. Regulators are beginning to recognise quantum threats; for example, government advisories in some countries have started recommending quantum-safe encryption for long-term sensitive data [29]. However, clear guidelines for integrating quantum technologies in standard compliance frameworks are still emerging. It creates a knowledge gap that academic research can help fill by providing frameworks and evidence on the practical viability of quantum cybersecurity.

2.6. Cybersecurity Frameworks and Quantum Threat Landscape

2.6.1. Classical Cybersecurity Frameworks in Accounting and Finance

Financial systems rely on well-established cybersecurity frameworks to ensure the confidentiality, integrity, and availability (CIA triad) of digital information. Commonly adopted frameworks include the following:
  • NIST Cybersecurity Framework (CSF): Widely used for risk-based cybersecurity management across sectors, including finance.
  • ISO/IEC 27001: International standard for information security management systems [30].
  • COBIT and COSO: Control-oriented frameworks are often used in internal auditing and financial reporting governance.
These frameworks integrate encryption protocols, identity access management, firewalls, and incident response procedures to protect financial data [31]. However, these models largely depend on classical cryptographic algorithms such as RSA, Diffie–Hellman, and Elliptic Curve Cryptography (ECC). These rely on the computational difficulty of problems such as integer factorisation and discrete logarithms, assumptions that quantum computing can potentially break [7,31].

2.6.2. Quantum Threat Landscape

The advent of quantum computing fundamentally alters the security assumptions underpinning modern financial systems. Two primary quantum algorithms introduce new risks:
  • Grover’s concept:
Ref. [32] Searching an extensive database is a problem of paramount importance, with applications in a wide range of fields. Since the Grover search algorithm offers a quadratic speedup in the number of database queries compared to classical computers, quantum algorithms can search a database significantly faster than classical computers. The Grover search algorithm is the optimal search quantum algorithm and may be used as a subroutine for other quantum algorithms. Searches with two qubits have been demonstrated on various platforms and proposed for others, but larger search spaces have only been demonstrated on a non-scalable NMR system. Grover’s algorithm enables faster database searches, significantly reducing the time required compared to classical methods.
b.
Peter Shor’s concept:
The researcher [31] highlights that Peter Shor created the algorithm known as Shor’s. He demonstrated that a quantum computer can factor in an integer N in polynomial time. According to [25], the precise real-time complexity is O(log N), where N represents the number of factors. The researcher [31] explains the significance of the algorithms, pointing out that they are significantly faster than the sub-exponentially fast, most efficient known classical factoring approach. Shor’s method can potentially break RSA, the widely used public key encryption scheme on the Internet, in hours or days on a functional 100-bit quantum computer. When RSA public key encryption is scaled up to Quantum Kilo Bytes, it utterly fails. The researcher [33] explains that quantum technologies pose a significant threat to information security as they currently exist.
The author [31] notes that asymmetric or public key algorithms have become outdated and ineffective over time due to the advent of quantum computing, as it has been demonstrated that they can overcome the fundamental challenges of asymmetric cryptography. Further, he [31] explains that some network authentication protocols, digital certificates, VPN key exchanges, and all e-commerce systems can no longer use secure cryptography and secure Internet communication using TLS, commonly used to protect email, voice-over IP, and Web traffic, be possible. Anyone involved in cybersecurity must be aware of the issue and stay up to date on the developments leading up to a solution, even though these cybersecurity risks are not immediately apparent, as quantum computing is not yet a practical reality.
c.
Grover vs. Peter Shor’s Algorithm and Accounting and Finance:
Shor’s algorithm represents the most immediate and critical threat to financial cybersecurity, as it undermines the foundations of classical cryptographic systems such as RSA and ECC, which secure digital signatures, financial reporting, and audit trail authentication [27,34]. Multiple scholars [35,36] have highlighted that once scalable quantum computers become available, attackers could exploit these vulnerabilities to compromise cloud-based accounting systems, falsify audit records, or manipulate sensitive financial data. Such breaches would not only disrupt company operations but also erode public trust in financial institutions. In addition to traditional encryption, blockchain technologies—widely adopted in audit verification and transaction recording—are also at risk. Research shows that the cryptographic hash functions used to ensure immutability in blockchain could be broken by quantum algorithms, making financial records susceptible to unauthorised alteration [37]. This exposes a systemic vulnerability that goes beyond isolated applications and threatens the integrity of entire financial ecosystems.
These findings underscore a consistent theme across the literature: the urgent need for quantum-resistant cryptographic systems. Emerging approaches such as lattice-based cryptography and quantum key distribution (QKD) have been proposed as viable alternatives [27]. However, most studies remain technical in focus, with limited integration into accounting-specific contexts. This gap justifies our proposition that financial and accounting systems must adopt post-quantum security frameworks that combine PQC algorithms with QKD protocols. By critically examining the limitations of current systems and the trajectory of quantum threats, we propose that preparing accounting infrastructures for quantum resilience is not optional but essential for safeguarding the confidentiality, integrity, and immutability of financial information.

2.7. Critical Integration of Literature and Research Propositions

The reviewed literature highlights three unresolved tensions: (i) the descriptive but fragmented treatment of quantum principles in accounting research; (ii) the lack of sector-specific analysis of post-quantum cryptography; and (iii) insufficient examination of organisational readiness for quantum adoption. These gaps directly informed our research design. For instance, the vulnerability of RSA and ECC to Shor’s algorithm motivates Proposition 1, addressing the need for quantum-resistant cryptography. Similarly, prior studies on digital transformation in accounting stress cybersecurity without addressing QKD integration, a gap discussed in Proposition 2. Organisational-level adoption barriers, such as complexity and cultural resistance, emerge across IS adoption models but remain underexplored in quantum contexts, thereby motivating Propositions 3 and 4.

3. Conceptual Framework and Research Propositions

3.1. Justification for the Theoretical Lens

This study employs a multifaceted theoretical framework to examine the adoption of quantum-secure cybersecurity measures within accounting and finance systems. The selection of theories is driven by the necessity to approach technology adoption from individual, organisational, and domain-specific perspectives. At the personal level, the study references [38] Thompson et al.’s (1991) Model of Personal Computing Utilisation as a foundational framework for assessing user adoption of digital innovations. Six constructs adapted from information systems and contingency theory examine structural and cultural readiness within institutions, including task interdependence, technology, environment, structure, goals, and people [39,40]. Additionally, considering quantum computing’s unique characteristics, the study introduces four quantum-specific constructs, two of which are original to this research: Quantum Resistance of Accounting Algorithms and Quantum Key Distribution (QKD) Integration. This layered framework offers theoretical comprehensiveness by linking established information systems adoption models with emerging quantum security considerations pertinent to financial systems.

3.2. Integrated Conceptual Framework of Finance and Accounting System Leveraging Quantum Computing-Based Cybersecurity Strategies

The integrated conceptual framework encompasses three dimensions: (1) user-level constructs from [38] Thompson et al. (1991), (2) organisational-level constructs based on contingency theory, and (3) quantum-specific cybersecurity constructs. This design aims to comprehensively understand how quantum tools impact cybersecurity adoption in accounting settings. The framework has been refined through a systematic literature review following the PSALSAR methodology and visually depicts the dynamic relationships among these constructs. Each proposition in this study is assessed based on factors that ensure thematic alignment and theoretical relevance, grounded in theoretical precedent and empirical necessity.

3.2.1. User-Level Constructs: Technology Adoption Models (TAMs)

These constructs are grounded in [38] Thompson et al.’s (1991) Model of Personal Computing Utilisation, which has been widely validated in information systems (IS) research to understand individual attitudes and behaviour toward emerging technologies [41]. This adaptation explores how quantum computing can enhance data security, protect sensitive financial information, and improve system integrity and confidentiality. This model comprises six key factors, but we focus on more relevant perceptions: job fit, complexity, perceived consequences, and the effect on use. These constructs were later extended into models such as the Unified Theory of Acceptance and Use of Technology (UTAUT) [42] and TAM 3 [43], which also prioritise user-centric adoption factors. In the context of accounting, user acceptance among auditors, accountants, and finance controllers is a critical prerequisite for the successful implementation of any cybersecurity framework. These factors are crucial in understanding how an organisation’s operations work and how its processes integrate AI into its system. The conceptual model for personal computing utilisation was proposed by [38], of which we have mentioned the initial four factors. Now, we discuss the last two new factors integrated into this conceptual model: the first is the relationship, and the next is the culture. After integrating quantum computing into the cybersecurity systems of accounting and finance, these factors are critical to analysing the organisational impact, concerns, and shifts due to cultural changes.
  • Job Fit/Job Performance:
Job fit, for instance, involves assessing how quantum computing can enhance job performance and decision-making processes within an organisation. In his article, the researcher [38] defined job fit as a scale that measures an organisation’s acceptance of introducing new technology, thereby enhancing job performance. We consider the same application for our quantum computing research in cybersecurity, specifically in the fields of accounting and finance. We need to consider quantum algorithms to analyse the job-fit factor. Financial information is central to accounting, and these algorithms can significantly improve its precision and efficiency. Accountants can apply quantum computing tools to optimise complex financial models, reduce errors, and streamline operations, thus improving job performance and lowering operational costs. Accountants and auditors may find these quantum tools more aligned with their job needs, particularly in big data environments, resulting in enhanced productivity and effectiveness.
b.
Complexity:
Complexity, as the word describes, encompasses the perceived difficulty in understanding, applying, and managing innovations related to quantum computing, particularly when applied to big data and diversified information, much like the application of new technology, as explained by the researcher [38]. Quantum computing must perform complex computations due to the quantum algorithms we have discussed previously; therefore, they are complex and require sophisticated mathematical foundations.
c.
Perceived Consequences:
According to [38], perceived consequences involve the belief that utilising a particular technology leads to beneficial outcomes, such as increased job satisfaction or efficiency. In the context of quantum computing, the perceived consequences in accounting cybersecurity include enhanced protection of financial data against future quantum attacks, reduced risk of breaches, and compliance with emerging regulatory requirements. Implementing quantum-resistant algorithms ensures long-term security, while quantum key distribution (QKD) provides secure communication channels, thereby enhancing the overall perceived benefits of adopting quantum technologies in accounting systems. Perceived consequences would focus on the potential outcomes and benefits of integrating quantum computing into operations management, such as improved efficiency and decision-making speed.
d.
Affect Towards Use:
The researcher’s [38] conceptual model factor, “Affects towards use,” measures emotional responses to technology, including trust, satisfaction, and frustration. The integration of quantum computing into cybersecurity for accounting is likely to generate positive emotions among users due to its potential to provide unprecedented levels of security. For instance, quantum-resistant algorithms can offer a robust defence against even the most sophisticated cyber threats, instilling a sense of trust and reliability in the system.
e.
Relationship/Social Factor:
As discussed by [44], the relationship factor involves the interactions among rational decision makers, as analysed using game theory. In accounting cybersecurity, this could model the relationships between financial institutions, auditors, and regulators, where the potential benefits of quantum security measures influence each player’s strategy.
f.
Culture:
Culture encompasses an organisation’s collective values, beliefs, and traditions that influence the adoption of technology. A culture prioritising cybersecurity and innovation is more receptive to integrating quantum computing technologies. Organisations that foster a security-conscious culture are more likely to embrace quantum-resistant algorithms, recognising their importance in protecting financial data against emerging threats. Promoting a culture of quantum awareness and continuous learning is crucial in ensuring that the full benefits of these advanced technologies are realised.

3.2.2. Organisational Constructs: IS/Contingency Theory Foundations

To expand from individual acceptance to organisational readiness, the model incorporates six constructs frequently applied in IS security adoption literature and Contingency Theory [40]:
  • Task Interdependence:
Quantum computing allows for faster and more accurate processing of complex tasks in accounting and finance. For instance, quantum algorithms can significantly accelerate Monte Carlo simulations, which are essential for pricing derivatives. This process relies heavily on large amounts of interconnected financial data [45,46].
b.
Technology:
Quantum algorithms, particularly those for amplitude estimation and quantum walks, can solve critical financial problems that are intractable in classical computing, including enhanced financial modelling, risk assessment, and simulation capabilities [45].
c.
Environment:
This quick and efficient data analysis can also be applied in the financial world to enhance risk and uncertainty prediction, providing valuable insights into market fluctuations. Modelling financial uncertainties as quantum states leads to a more nuanced understanding of market dynamics (placing quantum finance on the agenda may also help to convince those wary of quantum technologies that there is more to gain from the metaphysical aspects of the quantum than they might otherwise think) [45].
d.
Structure:
Financial institutions’ organisational processes likely need to change and incorporate new components, including new data pipelines and an end-to-end digital twin, to assess how these quantum models are performed, enabling more efficient and secure banking services [47].
e.
Goals:
The driving force behind quantum computing in finance is the promise of enhanced data security and computational efficiency. Quantum computing can enhance financial data security through quantum-resistant cryptographic techniques. Additionally, Ref. [47] can enhance other computational tasks, such as credit risk computations and economic forecasts.
f.
People:
Humans successfully oversee the use of quantum computing harnesses. Quantum technologies and cybersecurity must be applied and taught to finance professionals so they can use them correctly and effectively. Researchers, financial institutions, and regulators must exchange ideas and expertise closely to ensure the appropriate deployment of emerging quantum technologies.

3.2.3. Quantum-Specific Constructs: Emergent from Empirical Synthesis

The third layer, quantum-specific cybersecurity constructs, was first developed based on identified gaps in existing IS adoption models (which do not cover quantum cryptography or QKD), and secondly, through a systematic literature review (via PSALSAR) of Q1 cybersecurity and quantum computing journals. Another basis is the empirical propositions grounded in studies like [48].
This dimension is novel and essential for this article because traditional IS frameworks do not account for post-quantum security implications, directly impacting encryption durability, audit trails, and financial compliance systems. These constructs include the following:
  • Quantum Resistance of Accounting (QRA) Algorithms:
The researcher [49] explains that quantum resistance refers to the robustness of cryptographic algorithms against quantum attacks, also known as post-quantum cryptography. As traditional encryption methods become less effective, quantum computers gain more power in accounting systems and may be vulnerable to being broken by quantum algorithms, such as Shor’s. Integrating quantum-resistant algorithms, such as lattice-based or hash-based cryptography, into accounting systems is crucial for maintaining the security of financial data. This factor emphasises the importance of forward-looking cybersecurity strategies that can withstand the potential threats posed by quantum computing.
In this study, we conceptualise this construct as Quantum-Resistant Accounting Algorithms (QRAAs). QRAAs highlight the application of post-quantum cryptographic methods tailored explicitly to accounting systems, emphasising their role in protecting audit trails, financial data, and reporting processes from quantum-enabled attacks.
b.
Quantum Key Distribution Integration (QKDI):
The researcher [50] is considering QKD technology, which utilises quantum mechanics to securely distribute cryptographic keys between parties. This method is unique in its ability to detect eavesdropping attempts, making it a highly secure means of communication. In accounting, integrating QKD into cybersecurity protocols can ensure that cryptographic keys protecting financial information remain secure, even in the face of quantum-enabled threats. This factor highlights the transformative potential of quantum technologies in enhancing the security infrastructure of accounting systems, making them more resilient against future cyber threats.
In this study, we denote this construct as Quantum Key Distribution Integration (QKDI). QKDI refers to the incorporation of QKD protocols into accounting systems to ensure secure cryptographic key exchange, even in adversarial quantum-enabled environments.
c.
Organisational quantum readiness (OQR):
The authors of [51] describe the degree to which institutions possess the infrastructure, digital literacy, and strategy alignment to pilot or scale quantum technologies [52] and the preparedness of the institution in terms of digital infrastructure, leadership support, and financial capacity to pilot or adopt quantum systems.
We conceptualise this construct as Organisational Quantum Readiness (OQR). OQR captures the extent to which financial institutions and accounting organisations possess the infrastructure, digital literacy, leadership commitment, and resource alignment to adopt or scale quantum-secure technologies.
d.
Stakeholder interdependence:
Ref. [53] It highlights the necessity of coordination across finance teams, IT security units, vendors, and auditors to ensure policy compliance and the secure deployment of quantum tools [54]. Accounting cybersecurity depends on interaction among internal and external actors (CFOs, auditors, compliance, regulators, and IT vendors). We refer to this construct as stakeholder interdependence (SI). SI highlights the interconnected roles of accountants, auditors, regulators, IT teams, and technology vendors in implementing and maintaining quantum-secure cybersecurity frameworks in accounting.
The modelling framework in this study incorporates user-level factors from [38] Thompson et al. (1991), organisational-level constructs from the IS adoption literature, and newly identified quantum-specific constructs. These 16 dimensions provide a framework for assessing the readiness, alignment, and impact of quantum-secure cybersecurity on accounting and finance systems. The model, as illustrated in Figure 2, shows how individual beliefs influence adoption and how institutional goals, team interdependencies, and stakeholder interactions facilitate or hinder technological transformation. Quantum-specific constructs (QKD, post-quantum algorithm resistance) introduce new urgency to this sector’s cybersecurity strategy.

3.2.4. Framework Simplification and Accessibility

To enhance accessibility, the proposed conceptual framework is explained in simplified terms. The framework integrates three distinct but interdependent levels:
  • User-Level Factors—adoption-related variables, such as job fit, perceived complexity, affect toward use, perceived consequences, relationship, and cybersecurity culture.
  • Organisational Factors—structural and contextual dimensions, including task interdependence, organisational structure, technological capability, environmental pressures, strategic goals, and people.
  • Quantum-Specific Factors—constructs unique to the post-quantum era, including the QRAA, QKDI, OQR, and SI.
These dimensions collectively influence the outcomes of cybersecurity adoption in accounting systems. Figure 2 illustrates how user-level, organisational, and quantum-specific constructs interact to shape cybersecure accounting outcomes, such as resilience, compliance, trust, transparency, and long-term future proofing.
Figure 2. Integrated conceptual quantum-resilient cybersecurity (QRCS) model.
Figure 2. Integrated conceptual quantum-resilient cybersecurity (QRCS) model.
Fintech 04 00052 g002

3.3. Mapping the Integrated Conceptual Framework Factors to Research Objectives and Questions

This study’s research questions and propositions are grounded in the integrated framework outlined above. Research Question 1, which investigates the relative security benefits of quantum computing over classical systems, draws upon the constructions of quantum resistance (QR), job fit, and technological goals. Research Question 2, focused on unauthorised access prevention, is analysed through the lens of QKDI, task interdependence, and structure. Research Question 3 addresses organisational adaptation and cultural shifts informed by the concepts of complexity, people, and culture. Finally, Research Question 4 examines adoption barriers and long-term values, evaluating them using the environment, digital readiness, and perceived consequences constructs.
This framework integrates classical information systems constructs with emerging quantum-specific considerations. It illustrates how technological dimensions (e.g., Post-Quantum Cryptography, quantum key distribution), organisational readiness (e.g., governance, investment, training), and stakeholder interdependencies (e.g., regulators, auditors, IT providers) interact to determine the resilience of accounting and financial systems against quantum threats.

Practical Implications

In addition to the theoretical integration, the framework highlights several practical implications for accounting and finance systems:
  • Technological Layer: Adoption of Post-Quantum Cryptography (PQC) and quantum key distribution (QKD) is not optional but necessary. For example, audit trail authentication and digital signatures used in external reporting must transition to quantum-safe standards to prevent future breaches.
  • Organisational Readiness Layer: Firms must develop quantum readiness strategies, including staff training, infrastructure investment, and risk assessments. Without organisational alignment, even the best technological solutions will face resistance or fail to be implemented effectively.
  • Stakeholder Interdependence Layer: The resilience of accounting systems depends on collaboration between regulators, auditors, IT providers, and financial institutions. Clear policy roadmaps and cross-industry cooperation will be essential to ensure smooth migration to quantum-secure practices.

3.4. Research Propositions

Based on the integrated conceptual framework presented in this study, four research propositions have been formulated to explore the implications of quantum computing on cybersecurity within accounting and finance systems. These propositions are grounded in theoretical constructs and thematic insights from the systematic literature review and conceptual synthesis. Each proposition reflects a distinct but interrelated domain of inquiry within the study’s overarching objective.

3.4.1. Proposition 1

Quantum computing provides stronger encryption and security than classical systems in the fields of accounting and finance. This proposition examines the hypothesis that quantum technologies, particularly lattice-based post-quantum cryptography, can mitigate vulnerabilities inherent in traditional encryption protocols, such as RSA and ECC, which are widely used in financial record keeping and audit trails.

3.4.2. Proposition 2

Quantum-secure cybersecurity frameworks will prevent unauthorised access and protect sensitive financial and accounting data from cyberattacks. This includes using quantum key distribution (QKD) to establish mathematically secure, tamper-evident communication between stakeholders in accounting ecosystems.

3.4.3. Proposition 3

Adopting quantum-secure cybersecurity frameworks will necessitate significant adjustments to security protocols, professional training, and organisational culture. This proposition addresses the institutional and human capital challenges of transitioning to quantum-secure infrastructures.

3.4.4. Proposition 4

Challenges such as high costs, the need for specialised skills, and the complexity of quantum computing will initially hinder its widespread adoption in the accounting sector. However, the enhanced security benefits will eventually outweigh these challenges, especially as regulatory environments evolve and digital readiness improves.

4. Research Methodology

4.1. Introduction

4.1.1. Systematic Review

The author [55] explained that a systematic review gathers all empirical data that satisfy predetermined qualifying requirements to address a particular research topic. It employs precise, methodical techniques to reduce bias, resulting in trustworthy results from which judgements and conclusions can be reached [56,57]. According to the researcher [58], a systematic review is a straightforward and reliable technique for synthesising scientific data to address a specific research question. Their objective is to consider all published data currently available on the subject and assess the quality of the material. The researcher [59] emphasises the review protocol, which must be created, pertinent databases must be found, suitable search words must be developed, inclusion and exclusion criteria must be established, data must be analysed, and conclusions must be synthesised. These are just a few crucial elements in the process [60].

4.1.2. Meta-Analysis

The researcher explains [55] that the meta-analysis integrates and condenses the findings of included studies through statistical methods. It is present in many, but not all, systematic reviews. By combining data from all the relevant studies, meta-analyses can yield more accurate estimates of the effects of the research data than individual research included in a review.
Ref. [55] In their research article, twenty-nine review writers, methodologists, doctors, medical editors, and consumers collaborated to develop the PRISMA Statement. The author in this study [55] provides an evidence-based minimum set of guidelines; the PRISMA Statement and its expansions seek to promote complete and transparent reporting of social return [61]. Other researchers [62] refer to the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) Statement, the most widely used reporting standard for systematic reviews [55], which covers the literature search component.

4.2. Research Methodology Adopted

The researchers [63] emphasise that the essential elements of systematic reviews include the use of exact and repeatable methods for selecting primary research publications, as well as the critical assessment and synthesis of studies that meet the eligibility criteria [64,65,66]. The research methodology to be adopted for performing this research is the same as explained in this study by Grover [41]. Grover chose to use the systematic literature review to answer his research questions. This study employs the same methodology to address the research questions regarding accounting-related cybersecurity based on quantum computing. A conceptual and theoretical inquiry was chosen to explore the emerging field where empirical data are limited, but theoretical foundations can still be rigorously constructed.

PSALSAR Research Methodology

This systematic literature review in quantum accounting is being conducted using PSALSAR [67]. This methodology was created in 2020, as detailed in this article. The researcher [67], in his scholarly article, mentioned that the framework for Search, Appraisal, Synthesis, and Analysis (SALSA) is a methodology that ensures methodological precision, systematisation, exhaustiveness, and repeatability in determining the search protocols that the systematic literature review (SLR) should adhere to. According to Grant and Booth [68], two steps are added to the standard SALSA technique to create the new PSALSAR method, which employs six phases to conduct systematic literature reviews. Research Protocol (P) and Reporting Results (R) are the latest phases. The PSALSAR methodology is straightforward, portable, and repeatable.
Table 2, sourced from [67,69], outlines the procedures employed in this literature review on cybersecurity for accounting. This systematic study aims to provide an extensive overview of the field of quantum accounting. The review framework is based on the PSALSAR model, which provides a structured process across planning, searching, appraisal, synthesis, analysis, and reporting stages.
Using the conceptual framework, we respond to the abovementioned research questions through this process. We follow all three steps, as outlined in Figure 3.
  • Step 1_Protocol:
As shown in Table 3, sourced from [70,71], the PICOC tool was used to complete the search procedure.
  • Step 2_Search:
This stage includes the delivery and search strategy. To gather pertinent documents, the search strategy helps define a suitable search string and identify relevant databases [69]. The researchers further explained in their article that using the search phrase to access the chosen databases and gather relevant literature is part of the search delivery stage.
The search used two reputable and well-known databases: Web of Science and Scopus.
  • For Web of Science, the search was performed using the following:
QUANTUM (All Fields) and COMPUTING (All Fields) and ACCOUNTING (All Fields) and FINANCE (All Fields) or CYBERSECURITY (All Fields) and INFORMATION (All Fields) and Enriched Cited References and 2024 or 2023 or 2022 or 2021 or 2020 or 2019 or 2018 or 2017 or 2016 or 2015 (Publication Years).
  • For Scopus, the search was performed using the following:
(TITLE-ABS-KEY (quantum) AND TITLE-ABS-KEY (computing) AND TITLE-ABS-KEY (accounting) OR TITLE-ABS-KEY (finance) OR TITLE-ABS-KEY (financial AND reporting) OR TITLE-ABS-KEY (cybersecurity)) AND PUBYEAR > 2014 AND PUBYEAR < 2025.
The words were chosen to encompass as much scientific literature as possible on quantum computing, cybersecurity, accounting, and finance. Initially, the years of publication for both Web of Science and Scopus were considered for the last ten years, from 2014.
  • Step 3_Appraisal:
The researcher [67] is considering the appraisal phase; the chosen articles were assessed following the goals of the review process. Screening the chosen literature to find pertinent papers for the review process was part of the research selection process. The two main phases are quality assessment and the selection of studies based on inclusion criteria. The studies were selected by applying the inclusion and exclusion criteria, as shown in Table 4, sourced from [67]. The papers underwent thorough screening to select the relevant articles for the review as part of the quality assessment process. Initially, the titles and abstracts of the detected records were reviewed, and papers that did not meet the inclusion criteria were excluded. Subsequently, the full texts of the remaining records were assessed for eligibility.
  • Step 3.1_Coding and Thematic Categorisation:
Each study was coded according to the main issues it addressed. This process generated four key themes:
  i.
Post-Quantum Cryptography (PQC) in Finance;
 ii.
Quantum Key Distribution (QKD);
iii.
Blockchain Vulnerabilities and Quantum Threats;
iv.
Integration and Implementation Challenges.
  • Step 4_Synthesis:
Furthermore, the researcher [67] is considering the synthesis process, which involves extracting and classifying pertinent data from selected papers to develop information and conclusions. Extracting data from the selected articles entails identifying relevant information.
Two research databases were chosen: Web of Science and Scopus. From Web of Science, 2334 documents were utilised, and 672 from Scopus, so a total of 3006 documents were selected through the keywords described in step 2. Papers were extracted for further review. Further, 57 duplicated papers were removed through website screening. Twelve documents in a language other than English were removed. Furthermore, 353 published journals were excluded according to the inclusion/exclusion criteria, and the remaining articles were retained for further review. The next step we took was to limit our articles to the last three years for publication; articles from the prior year were excluded, resulting in 212 completed articles. Publications that were articles were considered, eliminating the remaining publications by 1024.
We also considered keeping articles with research areas in Computer Science and Business while excluding other research areas, which resulted in 894 more articles being dropped from the final list. The total number of articles remaining is 454, which can now be assessed by screening the title. Titles without “Quantum” plus those not able to be retrieved will be excluded from the selection, resulting in 54 articles remaining as selected. It has been detailed as Figure 3.
Figure 3. Prisma flow diagram [70].
Figure 3. Prisma flow diagram [70].
Fintech 04 00052 g003
  • Step 5_Analysis:
The researcher’s consideration [67] is the analytical step, which includes assessing the combined data, identifying significant material, and drawing conclusions from the chosen articles. The researcher’s [72] study goal, the analyst’s assessments, and the researcher’s understanding of the research’s level all influence analysis and result reporting. The Microsoft Excel spreadsheet was used for data extraction and analysis.

5. Findings and Discussion

This study posits that quantum computing holds transformative potential for the accounting and finance sector, particularly when analysed through our adapted version of Thompson’s Conceptual Model [38]. The model’s core dimensions—task interdependence, technological advancement, environmental adaptability, and organisational structure—are all positively influenced by emerging quantum technologies. Rather than treating quantum computing as a mere technological novelty, it should be viewed as a strategic enabler capable of reshaping decision-making frameworks, enhancing process efficiency, and securing financial data systems. When strategically implemented, quantum tools can improve the alignment between organisational operations and long-term financial objectives. As evidenced in the following analysis of the four propositions, quantum computing supports the reconfiguration of internal processes, enhances adaptability to regulatory and market environments, and facilitates strategic outcomes in accounting and finance. This positions quantum computing as a critical lever for advancing resilience, precision, and agility in financial decision-making and information systems.

5.1. Results and Findings—Testing of Propositions

We adopt an integrated conceptual model. The hybrid theoretical framework synthesises multiple scholarly foundations to examine the four core propositions outlined in this study: Quantum Computing and Cybersecurity in Accounting and Finance: Current and Future Challenges and Opportunities for Securing Accounting and Finance Systems. Each proposition is evaluated through a targeted combination of these variables, selected based on thematic alignment and conceptual relevance. This multidimensional approach enables a rigorous and context-specific analysis of how quantum computing is poised to impact cybersecurity practices within accounting and finance systems.

5.1.1. Proposition 1

Quantum computing offers significant advancements in encryption methods, enabling more effective prevention of cyberattacks on accounting systems compared to classical computing.
  • Job Fit/Job Performance: Articles by [27,71] emphasise that quantum-secure encryption tools, such as lattice-based post-quantum cryptography (PQC) and quantum key distribution (QKD), align well with key accounting functions, including audit trail protection, ledger verification, and secure interdepartmental financial reporting. Job relevance is established in scenarios like post-quantum audit verification and secure cloud bookkeeping.
  • Complexity: Over time, quantum computing could bring quantum-resistant encryption into the mainstream, allowing accountants to learn how to apply it, and new tools will make it easier to use. Hybrid models are emerging, combining classical encryption for ease of use with quantum protocols for secure key distribution, suggesting increasing accessibility [73,74]. It has been noted that quantum encryption introduces higher mathematical complexity and infrastructure burden. While secure, implementation requires specialised skills, posing adoption barriers in mid-size accounting firms.
  • Perceived Consequences: More crucial is the role of quantum computing in providing much more effective encryption regimes, such as Shor’s algorithm, which can rapidly crack any existing classical encryption scheme. It enhances the effectiveness of quantum encryption in securing accounting systems. Quantum computing enables cryptographic protocols (e.g., QKD) that are provably secure and resistant to computational attacks, making them highly suitable for protecting accounting data [35].
  • Attitude Toward Use: However, as organisations become more aware of the threat of quantum-capable cyberattacks, positive attitudes towards quantum-based encryption emerge. Increasing awareness of quantum threats fosters proactive attitudes towards adopting quantum cryptographic methods [75].
  • Behavioural Intention to Use: Quantum encryption technologies are becoming firmly entrenched in accounting firms as the threat of future quantum hacking turns from fiction to fact. Institutional momentum is building toward post-quantum transition, with initiatives already launched in the financial and defence sectors rising [76].
  • Relationship/Social Factors: [26] Highlight regulatory pressure (e.g., NIST PQC call) driving social and professional urgency to adopt quantum-ready security. Peer pressure within the finance industry is also on the rise.
  • Technology Characteristics: Quantum key distribution (QKD) offers unbreakable encryption secured by the laws of physics, unlike classical encryption, which relies on computational difficulty [50]. Shor’s algorithm can break RSA and ECC, underscoring the need to transition to post-quantum and quantum-native encryption protocols [73]. Several studies, including [8], demonstrate that technologies such as CRYSTALS-Kyber and quantum entropy-based encryption outperform classical methods in resisting decryption. These represent critical innovations for accounting systems vulnerable to replay and ledger modification attacks.
  • Organisational Structure: Governments, academic research institutions, and software companies collaborating to provide resources and facilitate the adoption of technology would best serve the development of quantum encryption. Global collaboration across academia, governments, and tech companies is accelerating the research and deployment of quantum-secure systems [77]. Accounting firms must revise their protocols and approval chains to support decentralised, quantum-resistant verification systems [78].
  • People: Not only do accountants recognise cybersecurity’s importance to confidential accounting data, but firms that innovate by following technology trends also turn to quantum-resistant encryption. Adoption is driven by a sense of urgency across institutions aware of the quantum threat, with early adopters (e.g., financial institutions) expected to set industry norms [35]. A lack of post-quantum cybersecurity skills remains a bottleneck. Most accounting personnel lack awareness of PQC constructs, such as NTRUEncrypt or CRYSTALS-Kyber [79].
  • Strategic Goals: Across studies, organisational goals include fraud prevention, data sovereignty, and reduced forensic costs. Quantum-secure encryption aligns better with these goals than classical encryption due to its provable security guarantees under quantum threat models [26].
  • Quantum Resistance of Accounting Algorithms: This factor emphasises the need to develop and subsequently use quantum-resistant algorithms designed specifically for accounting systems. These algorithms shield against potential quantum cyberattacks, as no quantum computer surpasses them and falls prey to a malicious agent. Multiple studies confirm that classical algorithms are vulnerable to quantum attacks, necessitating the development of quantum-resistant upgrades for financial systems [35]. The study of [80] confirms that quantum computers can break RSA, ECC, and SHA-256. Studies promote lattice-based schemes (e.g., Kyber, Dilithium) as replacements. There is a strong consensus that quantum-resilient cryptography must replace classical algorithms in financial systems.
  • Quantum Key Distribution (QKD) Integration: QKD offers an unbreakable, secure, essential exchange that is also secure against quantum computers. It considerably increases the security of accounting systems. QKD ensures secure key exchange and prevents eavesdropping, even from quantum-enabled attackers [50]. Quantum computing brings new kinds of robustness to the efficacy of encryption against cyberattacks. Quantum-resistant algorithms are designed to resist both classical and quantum computers when executing cryptanalysis. Undeniably [81], quantum computing becomes more promising with the effort being dedicated by world governments and the comprehensiveness of quantum-resistant cryptographic solutions. We do not envision the quantum revolution outpacing the development of quantum-resistant cryptography, but the end of our current era is likely to occur sooner rather than later [27]. QKD ensures secure key exchange over quantum channels, even in adversarial settings. QKD supports end-to-end confidentiality for interbank reconciliations and decentralised ledgers.
  • Organisational Digital Readiness: Empirical studies [23] confirm that firms with advanced cloud systems and in-house IT security are significantly more prepared to adopt post-quantum tools, including PQC and QKD deployment.
  • Stakeholder Interdependence: As finance increasingly involves coordination among accountants, auditors, tax consultants, and regulators, QKD enables secure multi-party transactions and real-time signature verification [11].

5.1.2. Proposition 2

Integrating quantum computing into accounting practices mitigates risks associated with data breaches and unauthorised access to financial information.
  • People: For example, accountants and IT professionals may need to upskill and reskill to work with quantum computing technologies. Quantum computing has security implications in cybersecurity processes. Integrating quantum computing into practice settings introduces tensions and challenges to accounting and cybersecurity professionals. Professionals in accounting and IT must upskill in quantum concepts to safely adopt these technologies. Quantum computing integration causes interdisciplinary tension but opens pathways for secure innovation in financial data handling [49].
  • Quantum Key Distribution (QKD) Integration: In addition, integrating QKD into the accounting systems ensures that the encryption keys used to protect financial information are shared via a secure channel that cannot be transmitted to a third party (hider or eavesdropper), which means that an attack has occurred, but the information remains safe. Thus, accounting systems that integrate quantum computing are less vulnerable to attack via malicious programs or human intervention, making financial data more secure. In conclusion, [81] integrates QKD into accounting systems, offering secure communication channels that are accountable, traceable, and security-based in financial transactions. Quantum cryptography and QKD are already being applied in high-security sectors to ensure data integrity and detect eavesdropping, thereby securing accounting systems [82].
  • Perceived Usefulness: Implementing quantum algorithms, such as Grover’s algorithm, is significantly more secure than all currently available encryption methods and serves as a vital safeguard against infiltration approaches, offering both enhanced security and speed. Quantum key distribution (QKD) is precisely what accounting jobs require to secure financial data from ever-evolving cyber threats. It significantly enhances the applicability of quantum computing to accounting and cybersecurity jobs. Studies show that Grover’s algorithm and QKD outperform classical encryption and key distribution methods. These are mission-critical safeguards against cyberattacks in data-rich sectors, such as accounting [83].
  • Complexity: The software’s technical complexity could be a barrier. However, once user-friendly platforms and interfaces are developed, perceived ease of use likely decreases the accountants’ learning curve. Researchers acknowledge that technical barriers currently exist. However, trends point to ongoing simplification through standards, platform development, and guided frameworks for integration [49].
  • Relationship: Sophisticated new cyberattacks prompt significant industry bodies and financial regulators to endorse the use of quantum technologies to mitigate risks. Quantum encryption techniques, which are based on quantum mechanics, may initially seem intimidating. However, their capacity to enhance security could simplify the administration of cyber threats, making covert attacks more difficult. The global rise in cybercrime, combined with regulations such as GDPR and financial data mandates, drives organisations to seek quantum-secure methods, as seen in parallel sectors like healthcare [82].
  • Environment: Cooperation between quantum computing researchers and accounting software vendors can facilitate the integration of quantum solutions. Enhanced data security through quantum encryption can increase stakeholders’ confidence in the security of accounting systems. There is documented cooperation between research bodies, accounting scholars, and quantum technologists to create frameworks for quantum-resistant integration into business practices [49].
  • Attitude Towards Use: The continuously evolving, sophisticated techniques hackers employ create a positive attitude toward using quantum solutions. Accounting professionals should be open to adopting quantum encryption if they are aware of its benefits. So, the result is a boost in confidence that quantum technology is more secure than classical techniques. The increasing recognition of quantum computing’s potential to counter sophisticated cyber threats drives positive perceptions among tech-savvy accounting professionals [84].
  • Culture: A culture that prizes innovation and security hastens the diffusion of quantum encryption methods; accountants who see cyber threats are likely to act pre-emptively. A proactive culture of innovation and compliance in financial firms accelerates the adoption of secure, traceable, and quantum-safe methods for financial record keeping [85].
  • Organisational Structure: If accounting firms have suffered a breach or learned of other firms’ deployment of quantum-safe practices, their intention to use quantum-based systems escalates. Integrating quantum computing creates a new interdependency between accountants and IT professionals, who work together to ensure encryption technologies are in place. Historical breach cases and regulatory trends suggest that firms exposed to quantum-safe use cases or targeted by cyberattacks move swiftly toward integration [82].
  • Perceived Consequences: Studies such as [9,11,18] emphasise the financial and reputational damage resulting from data breaches in accounting systems.
  • Quantum Accounting Algorithms—Quantum Resistance: A quantum-resistant algorithm secures the integrity and secrecy of accounting activities, protecting accounting records against potential damage from future quantum threats. Quantum-resistant algorithms safeguard financial data in preparation for the era of quantum computers, making the concept of quantum encryption particularly promising for accounting applications.

5.1.3. Proposition 3

Adopting quantum computing in accounting requires substantial changes in cybersecurity protocols but leads to superior financial data protection:
  • Technology Implementation: Adopting quantum computing necessitates a profound overhaul of existing cybersecurity measures. Businesses and governments must complete various tasks, including establishing new quantum-safe encryption standards, upgrading IT infrastructure, and training personnel to utilise quantum technologies. Researchers argue for the industry-wide deployment of quantum-safe cryptography, such as lattice-based systems and post-quantum RSA alternatives [86]. Quantum computing introduces disruptive encryption capabilities requiring firms to redefine cybersecurity architectures—from network protocols to data storage systems. Overhauls include new cryptographic standards, hardware upgrades, and skilled personnel capable of handling post-quantum algorithms [87].
  • Task Interdependence: How financial information is processed and protected also changes. Quantum computing opens up new possibilities for encryption, storage, and data transmission, which must be integrated into accounting workflows to enhance efficiency. Quantum-enhanced systems redefine financial information workflows, especially where encryption, storage, and verification intersect. New protocols require deeper integration with AI-driven anomaly detection and quantum key distribution (QKD)-based communications [88].
  • Quantum Resistance of Accounting Algorithms: This is one of the reasons why we need to develop quantum-proof accounting algorithms. These algorithms would necessitate changes to cybersecurity implementations, resulting in superior protection of a business’s financial data on the Internet. Security is enhanced when classical accounting systems are integrated with quantum-resistant encryption, which strengthens protection against future quantum attacks [49].
  • Perceived usefulness: Even though we need new protocols to make quantum-safe accounting viable, quantum computing adds enhanced security against cyberattacks and breaches, so accounting wants to use it. So, it would seem sensible for accounting to invest in new, radically secure options, such as quantum computing, to continue fulfilling its roles. Quantum computing enhances the fit for accounting roles by helping the profession move toward enhanced, quantum-safe security, which addresses problems more effectively. Studies affirm that QML, QKD, and lattice-based cryptography offer more secure, traceable, and unbreakable encryption for financial data, making quantum adoption highly attractive for accounting professionals [88].
  • Complexity: Implementing it initially feels somewhat challenging, as it involves training and upgrading cybersecurity infrastructure, which is likely to be less than smooth. However, the benefits can be long term and obvious once in place. Combining quantum technologies can be complicated, but the initial technical work can be completed once the learning curve is overcome. Although initial integration is complex, frameworks and standards are emerging to help firms adopt quantum security protocols with minimal disruption [49].
  • Organisational Digital Readiness: Establishing government policies and corporate investment in quantum computing research and development (RD) helps facilitate the transition to quantum-based cybersecurity. IT and accounting professionals must work more closely together on each task, hopefully establishing closer working relationships. Multiple papers advocate for interdisciplinary collaboration between quantum scientists, IT departments, and financial regulators to enable successful cybersecurity transformation [89]. Joint efforts across public–private partnerships support the shift toward quantum cybersecurity [90].
  • Attitude toward Use: Over time, with proper training, many accountants have come to embrace these new technologies, which provide an effective layer of protection for their data storage. Perspectives may initially start as either scepticism or fear. Positive attitudes toward quantum cybersecurity are increasing, particularly among firms that experience firsthand the benefits or recognise quantum threats as imminent [91]. Firms that adopt quantum-enhanced protocols report greater confidence in the protection of their financial data [91,92].
  • Quantum-resistant algorithms: Accounting systems must upgrade their interfaces and incorporate quantum-resistant algorithms into these new protocols, thereby making financial data resistant to quantum attacks [93]. Integrating QKD and post-quantum algorithms creates accounting systems that are both mathematically and physically hacker-proof, significantly reducing the probability of breaches [86,93]. Adoption ensures reduced breach risks and accelerates the uptake of quantum technology [35,80].
  • Integration of Quantum Key Distribution (QKD): QKD provides secure communication channels essential for future accounting cybersecurity. Integrating quantum key distribution is crucial in developing future cybersecurity protocols, as it provides secure communication channels for accounting systems. Ensuring secure communication channels by integrating quantum key distribution (QKD) methods reduces the overall risk of these systems. QKD also require changes in the communication protocol being used, supporting progress in the evolving nature of more secure accounting systems. Quantum key distribution is key to building next-generation accounting communication protocols that are verifiably secure and cannot be eavesdropped upon [86].
  • Relationship Factors: Quantum cybersecurity calls for increased cooperation between accountants and information technology experts [87]. Joint responsibility in encryption facilitates interdisciplinary collaboration [88]. Past cases of breaches call attention to the importance of synergistic cybersecurity governance [82].

5.1.4. Proposition 4

Challenges such as high costs, the need for specialised skills, and the complexity of quantum computing initially hinder its widespread adoption in the accounting sector. However, the enhanced security benefits eventually outweigh these challenges.
  • Job Fit: Currently, the skills mismatch between accountants and quantum computing results in a job mismatch [94]. Over time, quantum capabilities will be increasingly embedded in accounting tools, enhancing job fit and performance [95].
  • Environmental Context: Firstly, the cost and complexity of quantum computing, not to mention the paucity of skilled professionals, are severe impediments to using quantum computing in accounting’s usual ways. However, as the technologies concerned mature and become more accessible, is it safe to assume that security gains drive their use despite initial obstacles? Quantum adoption is hindered by high financial costs, lack of talent, and limited infrastructure, especially in developing markets [96]. However, security and computational advantages drive widespread uptake as technologies mature [97].
  • Organisational Characteristics: Firms must conduct a cost–benefit analysis when considering whether to invest in quantum computing, should it become available soon [90,98]. The capital outlay can be significant, but the longer-term benefits of enhanced security—or, more accurately, compliance with forthcoming regulatory standards—are considerably more critical than the initial outlay. Firms are advised to weigh short-term cost hurdles against long-term benefits in terms of compliance, accuracy, and risk mitigation [98]. Adoption is considered a strategic investment, not just a technological one [90].
  • Quantum Key Distribution (QKD) Integration: As QKD becomes more reliable and its costs decline, investment in new accounting technology and human resources training ensures that its superior security is widely adopted, thereby overcoming the initial barriers. QKD is initially costly and complex, but it ultimately enables secure, quantum-resilient communication channels, which are critical for sensitive financial systems [99].
  • Perceived Usefulness: Though the short-term difficulties are substantial, there ultimately are longer-term benefits in terms of security, which effectively outweigh the inertia headache for quantum computing. In the short term, due to the skills gap, there is an increased likelihood that job fit will worsen; i.e., jobs did not sufficiently provide individuals with the required skills to utilise the technology according to its needs. In the long term, as the role catches up to the apps used in accounting, the job fit typically becomes obsolete again. While current implementation is challenging, long-term cybersecurity and performance gains in finance and accounting are well established [54].
  • Perceived Ease of Use: Today, quantum systems are relatively complex to understand, which requires highly skilled workers to operate them, and these skills are also in short supply. These are all barriers, but they decrease over time as quantum tools become available and workers’ literacy in quantum matters improves. Complexity presents a notable obstacle to initial adoption, as it is challenging for firms to determine how to integrate quantum technologies into their operations. High initial complexity is one of the most significant barriers to adoption [94]. User-friendly platforms and training programs are needed to lower the entry threshold over time [95].
  • Environment: Commercial adopters in the financial and accounting professions, followed by their peers, cascade, reducing the cost of adoption by mitigating the resistance quotient and demonstrating quantifiable value. Resistance to adoption is driven by an aversion to change and fear of complexity [92]. Adoption is slow initially, but peer pressure, industry leadership, and regulatory mandates likely accelerate acceptance and standard setting [92].
  • Technology Adoption: Governments and educational institutions must provide access to quantum computing skills by offering laboratories and study materials and provide further incentives (beyond expected market forces) to drive adoption and help realise the potential benefits. Studies highlight the need for government-led initiatives in quantum education and infrastructure to reduce friction and democratise access [96].
  • Attitude Towards Use: Security requirements progressively overcome the entrenched resistance to the costs and complexity of quantum computing. As organisations begin to observe the successes of quantum-enhanced security, resistance to the costs and complexities is reduced, fostering optimism [100].
  • Organisational Quantum Readiness: The adoption of quantum computing in accounting increases as firms realise its apparent security benefits and gain a competitive advantage despite resistance to these quantum computing applications due to concerns about costs and complexity. Evident resistance due to costs and complexity may initially be present (or, perhaps more realistically, apathy), but the positive outcomes of early adopters can boost industry confidence and enthusiasm. Companies are already preparing for adoption by investing in research pilots and quantum readiness audits [98].
  • People: Accountants and IT specialists need to develop a basic understanding of quantum mechanics. Cross-discipline cooperation and upskilling solutions are needed to close this skills gap and enable safe implementation [49]
  • Culture: An innovation- and cybercrime-aware culture supports the active uptake of quantum technology in pioneering companies. Tech-savvy and compliance-oriented accounting organisations will be most open to uptake [85].

5.2. Applied Illustration: Practical Scenarios of Quantum Cybersecurity in Accounting

To strengthen the conceptual framework and enhance its practical significance, this section provides applied illustrations of how quantum cybersecurity can be implemented in accounting and finance systems. These examples, drawn from both industry practice and hypothetical simulations, demonstrate the relevance of the research propositions to real-world scenarios.

5.2.1. Case Illustration—Big Four Accounting Firms

Leading professional services firms, such as Deloitte, PwC, and EY, have already incorporated blockchain, advanced encryption, and artificial intelligence into their cybersecurity offerings for audit and assurance [101,102]. Extending these initiatives into the quantum era, firms could integrate lattice-based post-quantum cryptographic algorithms, such as CRYSTALS-Kyber and Dilithium, now standardised by NIST [2], into audit trail protection and auditor–client communication channels. It would mitigate vulnerabilities to Shor’s algorithm, which threatens RSA and ECC encryption [7].

5.2.2. Banking and Regulatory Example—QKD Pilots

Financial institutions are actively experimenting with quantum key distribution (QKD). For example, JPMorgan Chase, Toshiba, and Ciena jointly tested QKD in blockchain-based transactions to secure interbank settlement systems [103]. At the regulatory level, the U.S. National Institute of Standards and Technology (NIST) announced draft standards for post-quantum cryptography in 2022, urging critical infrastructure and financial institutions to begin migrating toward quantum-safe algorithms [104]. These pilots and regulatory efforts highlight clear pathways for integrating QKD and PQC into accounting workflows, such as securing electronic auditor confirmations or tax filings.

5.2.3. Simulation Scenario—Post-Quantum Audit Trails

Consider a multinational firm whose audit trail is protected by 2048-bit RSA encryption. A sufficiently large quantum computer implementing Shor’s algorithm could decrypt these records within hours [34], exposing highly confidential accounting data. In contrast, when the duplicate records are secured with lattice-based algorithms such as CRYSTALS-Kyber, the system remains resistant [104]. This hypothetical simulation highlights the importance of transitioning accounting systems to quantum-resilient cryptography, aligning directly with Proposition 1 (quantum resistance) and Proposition 2 (QKD integration).
These illustrations ground the theoretical model in practice and demonstrate how accounting organisations, auditors, and regulators can anticipate and prepare for quantum threats. They also serve as a bridge between conceptual propositions and the emerging policy discourse, demonstrating that the proactive adoption of quantum-secure technologies is not only feasible but also necessary to ensure the integrity, confidentiality, and trustworthiness of accounting systems in the post-quantum era.

5.3. Discussion—Answers to Research Questions

The findings are summarised from the proposition-based analysis and extensive literature-based theme review, directly answering the study’s research questions. The findings reflect how quantum computing and its technologies are shaping the present and future cybersecurity status of accounting and finance systems, in relation to the theoretical constructs developed in Section 3.

5.3.1. Research Question 1

How can quantum computing improve cybersecurity in accounting systems (compared to the classical cryptographic methods)? Quantum computing facilitates quantum-safe cryptographic protocols (lattice-based encryption, QKD) with unbreakable encryption assurance [50,99]. Shor’s algorithm’s vulnerability affects classical RSA and ECC algorithms; however, lattice-based cryptography (Kyber, Dilithium) resists and protects accounting records and audit logs [9,80]. QKD ensures secure key exchange, thereby avoiding man-in-the-middle attacks in accounting data exchanges. Grover’s algorithm facilitates faster and more secure searching and verification techniques, enhancing audit procedures [83]. Implementation of these protocols preserves financial integrity, long-term confidentiality, and non-repudiation in sensitive accounting systems [35].

5.3.2. Research Question 2

How secure can quantum-secure cybersecurity frameworks prevent unauthorised access to sensitive financial and accounting information? QKD offers provable eavesdrop resistance even in the presence of quantum attackers. Advanced quantum cryptographic systems provide secure multi-party accounting communication layers [11]. Grover’s algorithm supports secure authentication and authorisation systems as a means of preventing illegal access [83]. Deploying immutable audit trails via QKD and blockchain systems ensures the integrity of accounting records [26]. Empirical evidence suggests that accounting systems with integrated QKD are more effective in detecting illegal intervention than classical models [86].

5.3.3. Research Question 3

What changes must be made in the accounting and finance departments regarding the organisational and structural dimensions to implement quantum cybersecurity systems? Firms need to redefine their cybersecurity governance structures to incorporate quantum-safe protocols [87]. Cross-functional teams must be established, consisting of accounting, IT security, and compliance professionals [95]. Accounting personnel need specific training in quantum cryptography principles and quantum-resistant audit procedures [49]. Business workflows need to be rearchitected to include QKD key management procedures, quantum-safe signature verification, and advanced anomaly detection [88]. A culture of continuous innovation and compliance in cybersecurity will be necessary to build readiness [85]. The implementation of quantum technologies must align with strategic objectives and regulatory mandates [98].

5.3.4. Research Question 4

What are the critical adoption barriers to quantum cybersecurity in accounting, and can these be overcome with long-term security gains? Primary obstacles include high upfront costs, a shortage of trained specialists, and technical complexity [96,97]. The digital readiness of organisations varies greatly; companies with high cloud and IT sophistication overcome these challenges most effectively [23]. Subjective norms and cultural resistance initially hinder adoption, but success stories from pioneering users [98] and social influence [92] ultimately propel widespread industry adoption in the long run. Long-term advantages encompass increased security, compliance with regulations, and a competitive edge [54]. Government initiatives and standardisation activities (e.g., NIST PQC, ISO) contribute significantly to reducing obstacles [89]. Costs of QKD will come down, and easy-to-use quantum cybersecurity platforms will help bridge the skills gap [99].

5.4. Findings Discussions

The systematic literature review revealed several important insights about quantum resilience in financial systems. The following key findings emerged:

5.4.1. Quantum Resilience in Financial Systems

  • Post-quantum cryptography (PQC) is becoming increasingly vital for the financial sector as RSA and ECC encryption are vulnerable to quantum attacks.
  • NIST’s PQC Standards are paving the way for quantum-safe algorithms, with final recommendations expected in the coming years.
  • Early adoption of quantum-safe cryptography is critical to securing financial transactions and protecting sensitive data.

5.4.2. Quantum Key Distribution (QKD) in Financial Systems

  • QKD has shown promising results for secure communication channels, offering quantum resilience by ensuring data protection against quantum threats.
  • Implementing QKD in financial systems could provide secure key exchange protocols, safeguarding against potential quantum computing disruptions.

5.4.3. Blockchain and Quantum Threats

  • Blockchain technology, widely used in financial applications like cryptocurrencies and smart contracts, is vulnerable to quantum computing due to weaknesses in current cryptographic protocols.
  • The application of quantum-resistant hash functions and quantum-safe cryptographic systems is necessary for maintaining blockchain security in the quantum era.

5.4.4. Challenges and Future Directions

  • Despite the progress in quantum-safe solutions, the implementation of these technologies in real-world financial systems remains a challenge due to high computational costs and the integration complexity of existing systems.
  • There is a need for further research into practical deployment strategies and regulatory standards to ensure the widespread adoption of quantum-resilient systems in finance.

5.4.5. Four Key Themes

The current state of research on quantum resilience in accounting and financial systems was found in the systematic literature review. For clarity and conciseness, the findings are presented thematically, with bullet points emphasising the primary contributions under each theme. The results are compiled in a summary table that follows.
  • Theme 1: Post-Quantum Cryptography (PQC)
Existing cryptographic standards, such as RSA and Elliptic Curve Cryptography (ECC), are highly vulnerable to quantum algorithms, particularly Shor’s algorithm. The significance of NIST’s post-quantum cryptography (PQC) initiative, which is working to standardise quantum-safe algorithms, has been underlined in a number of studies. In the quantum era, early PQC adoption is thought to be essential for protecting financial transactions and accounting data integrity.
  • Theme 2: Quantum Key Distribution (QKD)
A popular method for safe key exchange that is naturally impervious to quantum attacks is QKD. Examples from real-world situations demonstrate how QKD can improve the security of digital audit trails and guarantee the privacy of private financial correspondence. However, its widespread adoption is still constrained by issues with cost, scalability, and infrastructure needs.
  • Theme 3: Risks Associated with Blockchain
Research revealed that quantum computing poses a threat to blockchain protocols, which serve as the foundation for smart contracts and cryptocurrencies. The cryptographic foundations of blockchain, particularly its hashing and digital signature systems, could be compromised by quantum algorithms such as Shor’s and Grover’s. Hybrid cryptographic models and quantum-resistant hashing techniques are two suggested countermeasures to improve blockchain resilience.
  • Theme 4: Integration and Implementation Challenges
Despite advancements in theory, numerous obstacles remain to be overcome before quantum-resilient systems can be effectively integrated into financial infrastructures. The lack of clear regulatory standards, complicated deployment requirements, and high computational costs were noted as the main obstacles. Scholars emphasise the urgent need for policy guidelines, industry roadmaps, and standardisation efforts to support the practical adoption of quantum-safe solutions.

6. Contributions of the Study

6.1. Academic Contributions

This study contributes to the academic understanding of integrating quantum computing in cybersecurity within the context of accounting and finance. It helps bridge the knowledge gap on how quantum computing can be leveraged to enhance data security in accounting and finance, as conventional cybersecurity measures become increasingly vulnerable to quantum-based attacks. In addition, this study enhanced the information system model proposed by Thompson et al. [38] to include quantum computing-based cybersecurity, providing accountancy scholars with new conceptual models to base their research on. This integration of quantum computing technologies in accounting systems aims to maintain confidentiality and system integrity. Adapting the information system model is relevant to academics seeking to identify the opportunities and threats of quantum computing to accounting and finance services, where confidentiality and system integrity are highly required.
While empirical validation is reserved for future studies, the applied illustrations presented (QKD adoption in banking, post-quantum algorithms in audit systems, simulation of Shor’s vulnerability) demonstrate the direct pathways by which our conceptual propositions can guide accounting practitioners and regulators in preparing for the post-quantum era.

6.2. Methodological Contributions (Use of PSALSAR)

This study adopted a systematic literature review methodology (PSALSAR), ensuring methodological rigour and repeatability [67]. The PSALSAR methodology, which includes phases such as Research Protocol and Reporting of Results, ensured that the study could synthesise and analyse existing research without bias. This study, therefore, contributes to the methodology of conducting systematic studies. This research demonstrates that PSALSAR can be utilised to investigate emerging technologies, including quantum computing and cybersecurity. This study can provide a benchmark for future studies in emerging interdisciplinary fields, developing a structured approach to synthesising and analysing the literature.
Post-Quantum Cryptography (PQC) in Finance: NIST is developing quantum-safe algorithms to replace vulnerable cryptographic systems in the financial sector.
Quantum Key Distribution (QKD) for Secure Communication: QKD is emerging as a solution for secure key exchange in financial transactions.
Blockchain Security and Quantum Risks: Current blockchain encryption methods are vulnerable to quantum threats.
Integration and Deployment Challenges: Quantum-safe solutions face challenges in terms of cost and integration complexity.

6.3. Policy Contributions to Technology Regulations in Accounting

This study contributed to the development of policy regarding technology regulations in accounting. The study explains how quantum technologies pose regulatory challenges and how existing regulatory frameworks should evolve to accommodate these technologies, thereby enabling their responsible and secure implementation in accounting and finance. Policymakers can utilise the findings from this study to develop guidelines and standards that ensure the regulated and secure adoption of quantum computing in accounting and finance. This study also recommends that policymakers collaborate with financial institutions and researchers to establish regulatory frameworks for quantum technologies that promote innovation and security. The collaborative approach to regulating quantum technologies will facilitate the development of a secure financial infrastructure in the quantum era.

7. Future Research and Conclusion

7.1. Future Research

Although several post-quantum cryptographic algorithms are available, few are designed explicitly to handle accounting functions such as audits, ledger reconciliation, or compliance. Future work should focus on designing and testing quantum-resistant algorithms tailored to accounting workflows. Output would include open-source algorithmic frameworks that conform to international cryptographic standards. Integrating quantum technologies into legacy ERP and accounting systems is a challenging task. Work should aim to create interoperability solutions, such as middleware layers that enable hybrid encryption in legacy environments. That affords practical on-ramping roadmaps for real-world implementation. The successful adoption of quantum computing in accounting involves accountants, IT experts, quantum engineers and compliance professionals. Research should propose socio-technical frameworks that apply UTAUT models and organisational change theory to assess quantum readiness. An organisation’s quantum readiness toolkit is the expected output. Given the cost concern highlighted in Proposition 4, a financial analysis is necessary to compare the investment in quantum cybersecurity to the risk cost of future breaches. It may involve modelling different scenarios for firms of various sizes. The output may include an executive-level decision-support model for accounting and finance professionals. Few studies simulate real quantum threats, such as Shor’s or Grover’s algorithm, against financial systems. Work must use quantum simulators to simulate these scenarios and test current defences. Resultant deliverables include a threat simulation framework for financial institutions and auditors. As quantum technologies impact transparency and traceability, their effect on accounting standards warrants further study. Future work should analyse how quantum methods intersect with GAAP, IFRS and SOX compliance. The output includes guidelines for the ethical deployment of quantum tools in regulated environments. A composite index that considers infrastructure, regulatory environment, education and market exposure is needed to benchmark international readiness. The goal is to establish a global Quantum Security Index (QSI) for the finance and accounting sectors.
Future studies should build upon this framework by incorporating empirical validation, such as case studies, interviews, or pilot implementations of quantum-secure accounting systems. Comparative studies across industries could identify sector-specific nuances and best practices. Quantitative assessments of adoption costs, regulatory compliance outcomes, and performance improvements post-QKD or PQC implementation would further enrich this field. Researchers are also encouraged to explore the impact of quantum security on real-time auditing, blockchain integration, and cross-border financial governance.

7.2. Conclusions

In summary, quantum computing enhances the security of accounting practices by providing more robust encryption methods, improving risk management, enabling advanced anomaly detection, and facilitating efficient data processing. Collectively, these capabilities offer a more secure and resilient framework for protecting sensitive financial information than traditional computing methods.
Quantum computing can fundamentally change the parameters applied for AI-based decision making in OM. It could redefine how to utilise AI based on new parameters regarding the decision search space, size of the alternative set, interpretation of process and outcomes, speed of decision making, and replicability of processes. More specifically, quantum computing may lead to new decision-making processes in operations management (OM).
An integrated conceptual framework combining user-level, organisational, and quantum-specific constructs was developed and used to evaluate four key propositions. The analysis revealed that quantum computing offers measurable advantages in encryption strength, data integrity, and regulatory compliance but faces adoption challenges related to cost, complexity, and cultural readiness.
This study examined the intersection of quantum computing, cybersecurity, and financial information systems through a systematic literature review.
The findings were organised into four key themes, which inform the following conclusions:
Post-Quantum Cryptography (PQC): Results confirm that current encryption protocols (RSA, ECC) are vulnerable to quantum attacks, underscoring the urgency of transitioning to PQC standards. The conclusion emphasises that financial institutions should initiate migration planning now, in alignment with NIST’s PQC initiative [2].
Quantum Key Distribution (QKD): Findings indicate that QKD is a promising solution for secure communication; however, its high cost and limited scalability hinder its adoption. Studies [99,104] emphasise both the potential and the challenges of deploying QKD in real-world financial infrastructures.
Blockchain Vulnerabilities: Evidence suggests that quantum algorithms, such as [7], pose a threat to blockchain-based accounting and financial applications. The conclusion stresses the importance of developing and implementing quantum-resistant hash functions and hybrid encryption approaches [34,105].
Integration Challenges: Results consistently identified barriers of cost, technical complexity, and lack of regulatory guidance. Scholars [52] highlight the urgency of establishing policy frameworks and roadmaps to facilitate the adoption of quantum-safe technologies in finance.
Beyond its theoretical contribution, this study also provides applied illustrations—ranging from QKD pilot projects in finance to simulations contrasting Shor’s algorithm with post-quantum cryptography—that demonstrate how the proposed framework can be operationalised in practice. These examples reinforce this study’s originality and practical significance, offering actionable insights for auditors, accountants, and regulators preparing for the post-quantum era.
Quantum computing represents both a disruptive threat and a transformative opportunity for the accounting profession. As data-driven decision making becomes increasingly central to financial reporting and control, ensuring the security and resilience of systems becomes paramount. This study emphasises the need for proactive strategic planning, robust training programs, and regulatory foresight to ensure that the benefits of quantum cybersecurity are realised while mitigating associated risks. The integrated framework and research propositions presented here offer a foundation for both scholarly inquiry and practical transformation in the quantum era of accounting.

Author Contributions

Conceptualization, H.H.S. and S.M.N.I.; methodology, H.H.S.; validation, H.H.S. and S.M.N.I.; formal analysis, H.H.S.; investigation, H.H.S.; resources, H.H.S.; data curation, H.H.S.; writing—original draft preparation, H.H.S.; writing—review and editing, H.H.S. and S.M.N.I.; visualization, H.H.S.; supervision, S.M.N.I.; project administration, S.M.N.I. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not Applicable.

Informed Consent Statement

Not Applicable.

Data Availability Statement

No new data were created. The study is based on secondary data from bibliographic databases (Scopus, Elsevier; Web of Science, Clarivate), which are accessible through subscription.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Arute, F.; Arya, K.; Babbush, R.; Bacon, D.; Bardin, J.C.; Barends, R.; Boixo, S.; Brandao, F.G.S.L.; Buell, D.A.; Burkett, B.; et al. Quantum supremacy using a programmable superconducting processor. Nature 2019, 574, 505–510. [Google Scholar] [CrossRef]
  2. Alagic, G.; Apon, D.; Cooper, D.A.; Dang, Q.H.; Dang, T.; Kelsey, J.M.; Lichtinger, J.; Liu, Y.K.; Miller, C.A.; Moody, D.; et al. Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardisation Process; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2022.
  3. Mamun, A.A.; Abrar, A.; Rahman, M.; Salek, M.S.; Chowdhury, M. Enhancing Transportation Cyber-Physical Systems Security: A Shift to Post-Quantum Cryptography. arXiv 2024, arXiv:2411.13023. [Google Scholar]
  4. Settlements, B.F.I. Quantum-Readiness for the Financial System: A Roadmap. BIS Publications. 2025. Available online: https://www.bis.org/publ/bppdf/bispap158.pdf (accessed on 25 May 2025).
  5. Tikk, E.; Brunner, M. Cybersecurity in the financial sector and the quantum-safe cryptography transition. Int. Cybersecur. Law. Rev. 2025, 6, 42–57. [Google Scholar] [CrossRef]
  6. Haapamäki, E.; Sihvonen, J. Cybersecurity in Accounting Research; Routledge: Abingdon, UK, 2022; pp. 182–214. [Google Scholar]
  7. Shor, P.W. Algorithms for quantum computation: Discrete logarithms and factoring. In Proceedings of the 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, 20–22 November 1994; IEEE: New York, NY, USA, 1994; pp. 124–134. [Google Scholar]
  8. Orús, R.; Mugel, S.; Lizaso, E. Quantum computing for finance: Overview and prospects. Rev. Phys. 2019, 4, 100028. (In English) [Google Scholar] [CrossRef]
  9. Dwivedi, A.; Saini, G.K.; Musa, U.I. Cybersecurity and Prevention in the Quantum Era. In Proceedings of the 2023 2nd International Conference for Innovation in Technology (INOCON), Bangalore, India, 3–5 March 2023; Institute of Electrical and Electronics Engineers Inc.: New York, NY, USA. Available online: https://ieeexplore.ieee.org/document/10101186 (accessed on 10 May 2025). [CrossRef]
  10. KPMG. Quantum Is Coming—And Bringing New Cybersecurity Threats with it. 2024. Available online: https://kpmg.com/xx/en/our-insights/ai-and-technology/quantum-and-cybersecurity.html#:~:text=KPMG%20in%20Germany%20conducted%20research,5 (accessed on 3 May 2025).
  11. Saeed, S.; Altamimi, S.A.; Alkayyal, N.A.; Alshehri, E.; Alabbad, D.A. Digital transformation and cybersecurity challenges for businesses resilience: Issues and recommendations. Sensors 2023, 23, 6666. [Google Scholar] [CrossRef] [PubMed]
  12. Möller, D.P. Cybersecurity in digital transformation. In Guide to Cybersecurity in Digital Transformation: Trends, Methods, Technologies, Applications and Best Practices; Springer: Berlin/Heidelberg, Germany, 2023; pp. 1–70. [Google Scholar]
  13. Matt, C.; Hess, T.; Benlian, A. Digital transformation strategies. Bus. Inf. Syst. Eng. 2015, 57, 339–343. [Google Scholar] [CrossRef]
  14. Bokhari, S.; Hamrioui, S.; Aider, M. Cybersecurity strategy under uncertainties for an IoE environment. J. Netw. Comput. Appl. 2022, 205, 103426. [Google Scholar] [CrossRef]
  15. Gonchar, V. The transformation of entrepreneurial activity in the conditions of the development of the digital economy and a methodology of assessing its digital security. In Digital Technologies in the Contemporary Economy; Collective Monograph/editor Žaneta Simanavičienė; Mykolo Romerio Universitetas: Vilnius, Lithuania, 2022; ISBN 9786094880506. [Google Scholar]
  16. Sandhu, K. Advancing Cybersecurity for Digital Transformation: Opportunities and Challenges. In Handbook of Research on Advancing Cybersecurity for Digital Transformation; IGI Global: Hershey, PA, USA, 2021; pp. 1–17. [Google Scholar]
  17. Azizi, N.; Haass, O. Cybersecurity issues and challenges. In Handbook of Research on Cybersecurity Issues and Challenges for Business and FinTech Applications; IGI Global: Hershey, PA, USA, 2023; pp. 21–48. [Google Scholar]
  18. Vaishnavi, A.; Pillai, S. Cybersecurity in the Quantum Era-A Study of Perceived Risks in Conventional Cryptography and Discussion on Post Quantum Methods. J. Phys. Conf. Ser. 2021, 1964, 042002. [Google Scholar] [CrossRef]
  19. Denker, K.; Javaid, A.Y. Quantum Computing as a Threat to Modern Cryptography Techniques. In Proceedings of the International Conference on Foundations of Computer Science (FCS), Las Vegas, NV, USA, 29 July–1 August 2019; The Steering Committee of The World Congress in Computer Science, Computer: Las Vegas, NV, USA, 2019; pp. 3–8. [Google Scholar]
  20. Bernhardt, C. Quantum Computing for Everyone; MIT Press: Cambridge, MA, USA, 2020. [Google Scholar]
  21. Rubinstein-Salzedo, S. Cryptography; Springer: Berlin/Heidelberg, Germany, 2018. [Google Scholar]
  22. Abood, O.G.; Guirguis, S.K. A survey on cryptography algorithms. Int. J. Sci. Res. Publ. 2018, 8, 495–516. [Google Scholar] [CrossRef]
  23. Zadorozhnyi, Z.-M.; Muravskyi, M.; Shevchuk, O.; Bryk, M. Innovative Accounting Methodology of Ensuring the Interaction of Economic and Cybersecurity of Enterprises. Mark. I Menedžment Innovacij 2021, 2021, 36–46. [Google Scholar] [CrossRef]
  24. Parthasarathy, A. Quantum Supremacy: Here Now, or Hype? CSIR-NIScPR: New Delhi, India, 2019; Available online: https://nopr.niscpr.res.in/bitstream/123456789/52697/3/SR%2056(12)%2014-18.pdf (accessed on 29 April 2025).
  25. Shor, P.W. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. SIAM Rev. 1999, 41, 303–332. [Google Scholar] [CrossRef]
  26. Rahul, R.; Geetha, S.; Priyatharsini, S.; Mehata, K.; Sundaresan Perumal, T.; Ethiraj, N.; Sendilvelan, S. Cybersecurity Issues and Challenges in Quantum Computing. In Topics in Artificial Intelligence Applied to Industry 4.0; Wiley: Hoboken, NJ, USA, 2024; pp. 203–221. [Google Scholar]
  27. Alluhaibi, R. Quantum Machine Learning for Advanced Threat Detection in Cybersecurity. Int. J. Saf. Secur. Eng. 2024, 14, 875–883. (In English) [Google Scholar] [CrossRef]
  28. AL-Refaey, M.R.; Tyagi, A.K.; AL-Ghamdi, A.S.A.-M.; Kukreja, S. Topics in Artificial Intelligence Applied to Industry 4.0.; John Wiley & Sons: Hoboken, NJ, USA, 2024. [Google Scholar]
  29. Beato, C.M.F. How Pioneering Public-Private Collaboration in the Financial Sector Can Help Secure Its Quantum Future. World Economic Forum, 13 November 2024. Available online: https://www.weforum.org/stories/2024/11/pioneering-public-private-collaboration-financial-sector-secure-quantum-future/ (accessed on 1 March 2025).
  30. ISO/IEC 27001; International Standard for Information Security Management Systems. ISO and International Electrotechnical Commission: Geneva, Switzerland, 2022.
  31. Easttom, C. Quantum computing and cryptography. In Modern Cryptography: Applied Mathematics for Encryption and Information Security; Springer: Berlin/Heidelberg, Germany, 2022; pp. 397–407. [Google Scholar]
  32. Figgatt, C.; Maslov, D.; Landsman, K.A.; Linke, N.M.; Debnath, S.; Monroe, C. Complete 3-qubit Grover search on a programmable quantum computer. Nat. Commun. 2017, 8, 1918. [Google Scholar] [CrossRef]
  33. Brennan, D. Quantum computational supremacy: Security and vulnerability in a new paradigm. Ir. Commun. Rev. 2018, 16, 10. [Google Scholar]
  34. Mosca, M. Cybersecurity in an Era with Quantum Computers: Will We Be Ready? IEEE Secur. Priv. 2018, 16, 38–41. [Google Scholar] [CrossRef]
  35. Ajala, O.A.; Arinze, C.A.; Ofodile, O.C.; Okoye, C.C.; Daraojimba, A.I. Exploring and reviewing the potential of quantum computing in enhancing cybersecurity encryption methods. Magna Sci. Adv. Res. Rev. 2024, 10, 321–329. [Google Scholar] [CrossRef]
  36. Thombre, R.; Jajodia, B. Experimental Analysis of Attacks on RSA & Rabin Cryptosystems using Quantum Shor’s Algorithm. In Proceedings of the International Conference on Women Researchers in Electronics and Computing, Online, 22–24 April 2021. [Google Scholar] [CrossRef]
  37. Bunescu, L.; Vârtei, A.M. Modern finance through quantum computing-A systematic literature review. PLoS ONE 2024, 19, e0304317. (In English) [Google Scholar] [CrossRef] [PubMed]
  38. Thompson, R.L.; Higgins, C.A.; Howell, J.M. Personal computing: Toward a conceptual model of utilization. MIS Q. 1991, 15, 125–143. [Google Scholar] [CrossRef]
  39. Delone, W.H.; McLean, E.R. The DeLone and McLean Model of Information Systems Success: A Ten-Year Update. J. Manag. Inform. Syst. 1992, 19, 9–30. [Google Scholar] [CrossRef]
  40. Burke, W.W.; Litwin, G.H. A Causal Model of Organizational Performance and Change. J. Manag. 1992, 18, 523–545. [Google Scholar] [CrossRef]
  41. Grover, P.; Kar, A.K.; Dwivedi, Y.K. Understanding artificial intelligence adoption in operations management: Insights from the review of academic literature and social media discussions. Ann. Oper. Res. 2020, 308, 177–213. [Google Scholar] [CrossRef]
  42. Venkatesh, V.; Morris, M.G.; Davis, G.B.; Davis, F.D. User Acceptance of Information Technology: Toward a Unified View. MIS Q. 2003, 27, 425–478. [Google Scholar] [CrossRef]
  43. Venkatesh, V.; Bala, H. Technology Acceptance Model 3 and a Research Agenda on Interventions. Decis. Sci. 2008, 39, 273–315. [Google Scholar] [CrossRef]
  44. Liu, Y.J.; Zhang, R.; Zhou, Y.B. Predicate encryption against master-key tampering attacks. Cybersecurity 2019, 2, 22. (In English) [Google Scholar] [CrossRef]
  45. Kaneko, K.; Miyamoto, K.; Takeda, N.; Yoshino, K. Quantum pricing with a smile: Implementation of local volatility model on quantum computer. EPJ Quantum Technol. 2022, 9, 7. (In English) [Google Scholar] [CrossRef]
  46. Chang, Y.J.; Wang, W.T.; Chen, H.Y.; Liao, S.W.; Chang, C.R. A novel approach for quantum financial simulation and quantum state preparation. Quant. Mach. Intell. 2024, 6, 24. (In English) [Google Scholar] [CrossRef]
  47. Dri, E.; Aita, A.; Giusto, E.; Ricossa, D.; Corbelletto, D.; Montrucchio, B.; Ugoccioni, R. A More General Quantum Credit Risk Analysis Framework. Entropy 2023, 25, 593. (In English) [Google Scholar] [CrossRef]
  48. Chen, Y.J.; Lin, T.W.; Kuo, C.W.; Tsai, K.Y. An Approach of Privacy-Preserved PQC-based Cyber-threat Intelligence System. In Proceedings of the 2024 8th International Conference on Cryptography, Security and Privacy, CSP 2024, Osaka, Japan, 20–22 April 2024; Institute of Electrical and Electronics Engineers Inc.: New York, NY, USA, 2024; pp. 1–4. Available online: https://ieeexplore.ieee.org/abstract/document/10600647 (accessed on 16 May 2025). [CrossRef]
  49. Lazirko, M. Quantum Computing Standards & Accounting Information Systems. arXiv 2023, arXiv:2311.11925. [Google Scholar] [CrossRef]
  50. Nath, A.; Maity, S.; Banerjee, S.; Roy, R. Quantum Key Distribution (QKD) for Symmetric Key Transfer. Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol. 2024, 10, 270–280. [Google Scholar] [CrossRef]
  51. Teitsma, M.; Ahmed, I.; van Velzen, J. Quantum Organisational Readiness Levels. arXiv 2025, arXiv:2502.16489. [Google Scholar] [CrossRef]
  52. Gidney, C.; Ekerå, M. How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits. Quantum 2021, 5, 433. [Google Scholar] [CrossRef]
  53. Umbrello, S.; Seskir, Z.; Vermaas, P.E. Communities of quantum technologies: Stakeholder identification, legitimation, and interaction. Int. J. Quantum Inf. 2024, 22, 2450012. [Google Scholar] [CrossRef]
  54. Adegbola, M.D.; Adegbola, A.E.; Amajuoyi, P.; Benjamin, L.B.; Adeusi, K.B. Quantum computing and financial risk management: A theoretical review and implications. Comput. Sci. Amp IT Res. J. 2024, 5, 1210–1220. [Google Scholar] [CrossRef]
  55. “The PRISMA Statement for Reporting Systematic Reviews and Meta-Analyses of Studies That Evaluate Health Care Interventions: Explanation and Elaboration. Ann. Intern. Med. 2009, 151, W-65–W-94. [CrossRef]
  56. Antman, E.M.; Lau, J.; Kupelnick, B.; Mosteller, F.; Chalmers, T.C. A comparison of results of meta-analyses of randomized control trials and recommendations of clinical experts: Treatments for myocardial infarction. JAMA 1992, 268, 240–248. [Google Scholar] [CrossRef]
  57. Oxman, A.D.; Guyatt, G.H. The science of reviewing research a. Ann. N. Y. Acad. Sci. USA 1993, 703, 125–134. [Google Scholar] [CrossRef] [PubMed]
  58. Lame, G. Systematic Literature Reviews: An Introduction. Proc. Des. Soc. Int. Conf. Eng. Des. 2019, 1, 1633–1642. [Google Scholar] [CrossRef]
  59. Barn, B.; Barat, S.; Clark, T. Conducting systematic literature reviews and systematic mapping studies. In Proceedings of the 10th Innovations in Software Engineering Conference, Jaipur, India, 5–7 February 2017; pp. 212–213. [Google Scholar]
  60. Ramey, J.; Rao, P.G. The systematic literature review as a research genre. In Proceedings of the 2011 IEEE International Professional Communication Conference, Cincinnati, OH, USA, 17–19 October 2011; IEEE: New York, NY, USA, 2011; pp. 1–7. [Google Scholar]
  61. Sarkis-Onofre, R.; Catalá-López, F. Aromataris, and C. Lockwood. How to properly use the PRISMA Statement. Syst. Rev. 2021, 10, 117. [Google Scholar] [CrossRef] [PubMed]
  62. Oláh, J.; Krisán, E.; Kiss, A.; Lakner, Z.; Popp, J. PRISMA-S: An extension to the PRISMA Statement for Reporting Literature Searches in Systematic Reviews. Syst. Rev. 2021, 10, 39. [Google Scholar] [CrossRef]
  63. Pollock, A.; Berge, E. How to do a systematic review. Int. J. Stroke 2018, 13, 138–156. [Google Scholar] [CrossRef] [PubMed]
  64. Shuster, J.J. Cochrane Handbook for Systematic Reviews for Interventions, Version 5.1.0; Higgins, J.P.T., Green, S., Eds.; Wiley Online Library: Hoboken, NJ, USA, 2011. [Google Scholar]
  65. Institute, J.B. Joanna Briggs Institute Reviewers’ Manual, 2014th ed.; The Joanna Briggs Institute: Adelaide, Australia, 2014; pp. 88–91. [Google Scholar]
  66. Wong, G.; Greenhalgh, T.; Westhorp, G.; Pawson, R. Development of methodological guidance, publication standards and training materials for realist and meta-narrative reviews: The RAMESES (Realist And Meta-narrative Evidence Syntheses–Evolving Standards) project. Health Serv. Deliv. Res. 2014, 2. Available online: https://njl-admin.nihr.ac.uk/document/download/2003227 (accessed on 15 March 2025). [CrossRef]
  67. Mengist, W.; Soromessa, T.; Legese, G. Method for conducting systematic literature review and meta-analysis for environmental science research. MethodsX 2020, 7, 100777. [Google Scholar] [CrossRef]
  68. Grant, M.J.; Booth, A. A typology of reviews: An analysis of 14 review types and associated methodologies. Health Inf. Libr. J. 2009, 26, 91–108. [Google Scholar] [CrossRef]
  69. Del Amo, I.F.; Erkoyuncu, J.A.; Roy, R. Palmarini, and D. Onoufriou. A systematic review of Augmented Reality content-related techniques for knowledge transfer in maintenance applications. Comput. Ind. 2018, 103, 47–71. [Google Scholar] [CrossRef]
  70. Page, M.J.; McKenzie, J.E.; Bossuyt, P.M.; Boutron, I.; Hoffmann, T.C.; Mulrow, C.D.; Shamseer, L.; Tetzlaff, J.M.; Akl, E.A.; Brennan, S.E.; et al. The PRISMA 2020 statement: An updated guideline for reporting systematic reviews. Syst. Rev. 2021, 10, 1–11. [Google Scholar] [CrossRef]
  71. Iyer, R.; Bakshi, A. Artificial Intelligence and Quantum Computing Techniques for Stock Market Predictions. In Deep Learning Tools for Predicting Stock Market Movements; Wiley: Hoboken, NJ, USA, 2024; pp. 123–146. [Google Scholar]
  72. Shelby, L.B.; Vaske, J.J. Understanding Meta-Analysis: A Review of the Methodological Literature. Leis. Sci. 2008, 30, 96–110. [Google Scholar] [CrossRef]
  73. Cyriac, R.; Eswaran, S. Selvarajan. Quantum Computing in Cryptographic Systems. Int. J. Adv. IT Res. Dev. 2024, 1, 18–25. [Google Scholar] [CrossRef]
  74. Ren, X. Advantages, classic models, applications and future trends of machine learning in financial industry. In Exploring the Financial Landscape in the Digital Age—Proceedings of the International Conference on Financial Management and the Digital Economy, ICFMDE 2023; Maurer, T.A., Ed.; CRC Press/Balkema: Boca Raton, FL, USA, 2024; pp. 762–767. Available online: https://www.taylorfrancis.com/chapters/edit/10.1201/9781003508816-110/advantages-classic-models-applications-future-trends-machine-learning-financial-industry-xiang-ren (accessed on 15 March 2025). [CrossRef]
  75. Vadisetty, R. The Effects of Cyber Security Attacks on Data Integrity in AI. In Proceedings of the 2024 International Conference on Intelligent Computing and Emerging Communication Technologies (ICEC), Guntur, India, 23–25 November 2024; pp. 1–6. [Google Scholar] [CrossRef]
  76. Hasan, M. Quantum Cryptography for Secure Communications and the Enhancement of U.S. Cybersecurity in the Quantum Age. Adv. Soc. Sci. Res. J. 2024, 11, 313–320. [Google Scholar] [CrossRef]
  77. Seiler, G. Quantum Computing and the Future of Encryption. Scholarly Review (Online). 2024. Available online: https://www.scholarlyreview.org/article/127168-quantum-computing-and-the-future-of-encryption (accessed on 10 May 2025). [CrossRef]
  78. Gupta, S.; Sharma, V. Effects of Quantum computing on Businesses. In Proceedings of the 4th International Conference on Intelligent Engineering and Management (ICIEM), London, UK, 9–11 May 2023; Institute of Electrical and Electronics Engineers Inc.: New York, NY, USA, 2023. Available online: https://ieeexplore.ieee.org/document/10166880 (accessed on 3 April 2025). [CrossRef]
  79. Fortin, A.; Héroux, S. Limited usefulness of firm-provided cybersecurity information in institutional investors’ investment analysis. Inf. Comput. Secur. 2023, 31, 108–123. (In English) [Google Scholar] [CrossRef]
  80. Mamatha, G.; Dimri, N.; Sinha, R. Post-Quantum Cryptography: Securing Digital Communication in the Quantum Era. arXiv 2024, arXiv:2403.11741. [Google Scholar] [CrossRef]
  81. Hadi, H.J.; Cao, Y.; Alshara, M.A.; Ahmad, N.; Riaz, M.S.; Li, J. Quantum Computing Challenges and Impact on Cyber Security. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; Goel, S., de Souza, P.N., Eds.; LNICST: Springer Science and Business Media Deutschland GmbH: Berlin/Heidelberg, Germany, 2024; Volume 571, pp. 333–343. Available online: https://link.springer.com/chapter/10.1007/978-3-031-56583-0_22 (accessed on 19 May 2022). [CrossRef]
  82. Basha, C.; Murugan, K.; Suresh, T.; SrirengaNachiyar, V.; Athimoolam, S.; Pappa, C.K. Enhancing Healthcare Data Security Using Quantum Cryptography for Efficient and Robust Encryption. J. Electr. Syst. 2024, 20, 2070–2077. [Google Scholar] [CrossRef]
  83. Uppaluri, P. Quantum Computing For Financial Systems. Int. J. Adv. Eng. Manag. 2025, 7, 482–491. [Google Scholar] [CrossRef]
  84. Bhosale, K.; Ambre, S.; Valkova-Jarvis, Z.; Singh, A.; Nenova, M. Quantum Technology: Unleashing the Power and Shaping the Future of Cybersecurity. In Proceedings of the 2023 Eight Junior Conference on Lighting (Lighting 2023), Sozopol, Bulgaria, 23–25 September 2023; IEEE: Sozopol, Bulgaria, 2023; pp. 1–4, ISBN 979-8-3503-2830-1. Online ISBN 979-8-3503-2829-5. [Google Scholar] [CrossRef]
  85. Demski, J.; FitzGerald, S.; Ijiri, Y.; Ijiri, Y.; Lin, H. Quantum information and accounting information: Their salient features and conceptual applications. J. Account. Public Policy 2006, 25, 435–464. [Google Scholar] [CrossRef]
  86. SaberiKamarposhti, M.; Ng, K.W.; Chua, F.F.; Abdullah, J.; Yadollahi, M.; Moradi, M.; Ahmadpour, S. Post-quantum healthcare: A roadmap for cybersecurity resilience in medical data. Heliyon 2024, 10, e31406. [Google Scholar] [CrossRef] [PubMed]
  87. Michael, C.I.; Campbell, T.-A.; Idoko, I.P.; Bemologi, O.U.; Anyebe, A.P.; Odeh, I.I. Enhancing Cybersecurity Protocols in Financial Networks through Reinforcement Learning. Int. J. Sci. Res. Mod. Technol. (IJSRMT) 2024. [Google Scholar] [CrossRef]
  88. Ganapathy, V. Quantum Machine Learning for Anomaly Detection in Cyber Security Audits. Shodh Sari-An Int. Multidiscip. J. 2025. [Google Scholar] [CrossRef]
  89. ABishwas, K.; Sen, M. Strategic Roadmap for Quantum- Resistant Security: A Framework for Preparing Industries for the Quantum Threat. arXiv 2024, arXiv:2411.09995. [Google Scholar] [CrossRef]
  90. Bhasin, A.; Tripathi, M. Quantum Computing at an Inflection Point: Are we Ready for a New Paradigm. IEEE Trans. Eng. Manag. 2021, 70, 2546–2557. [Google Scholar] [CrossRef]
  91. Shaleh, M. The Transformative Implications of Technology on Accounting Practices. Adv. Manag. Financ. Report. 2024. [Google Scholar] [CrossRef]
  92. How, M.-L.; Cheah, S.-M. Business Renaissance: Opportunities and Challenges at the Dawn of the Quantum Computing Era. Businesses 2023, 3, 585–605. [Google Scholar] [CrossRef]
  93. Osundare, O.S.; Ike, C.S.; Fakeyede, O.G.; Ige, A.B. Blockchain and quantum cryptography: Future of secure telecommunications in banking. Eng. Sci. Technol. J. 2022. [Google Scholar] [CrossRef]
  94. Mousa, N.; Shirazi, F. A survey analysis of quantum computing adoption and the paradigm of privacy engineering. Secur. Priv. 2024, 7. [Google Scholar] [CrossRef]
  95. Martens, J.; Kumara, I.; Di Nucci, D.; Pecorelli, F.; Monsieur, G.; Tamburri, D.A.; Van Den Heuvel, W.J. Acceptance and Development of Quantum Computing in the Netherlands and Germany: Barriers and Remedies From a Multistakeholder Perspective. IEEE Trans. Eng. Manag. 2025, 72, 62–77. [Google Scholar] [CrossRef]
  96. Dung, N.T.P.; Lien, N.T.H. Factors affecting the stages of management accounting evolution: The developing market research. J. Gov. Regul. 2024, 3, 452–464. [Google Scholar] [CrossRef]
  97. Chang, Y.J.; Sie, M.F.; Liao, S.W.; Chang, C.R. The Prospects of Quantum Computing for Quantitative Finance and Beyond. IEEE Nanotechnol. Mag. 2023, 17, 31–37. (In English) [Google Scholar] [CrossRef]
  98. Islam, M.A.; Hasan, S.K.; Priya, S.A.; Asha, A.I.; Islam, N.M. The Impact of Quantum Computing on Financial Risk Management: A Business Perspective. Int. J. Multidiscip. Res. 2024, 7. [Google Scholar] [CrossRef]
  99. Shaikh, F.; Sangole, M.; Pareek, V.; Patil, P.A.; Takale, D.; Gupta, S. Quantum Cryptographic Algorithms for Securing Financial Transactions. Comput. Fraud. Secur. 2024. [Google Scholar] [CrossRef]
  100. Mehta, B.; Tuscai, B.; Wang, T.R.; Mahady, K. Responsible Quantum Readiness: A Perspective from Financial Services Organisation. In Proceedings of the 2024 IEEE International Conference on Quantum Computing and Engineering (QCE), Montreal, QC, Canada, 15–20 September 2024; Volume 2, pp. 71–76. [Google Scholar] [CrossRef]
  101. Deloitte. Quantum-Cyber Readiness: Preparing for a Quantum-Secure Future. In Deloitte Global Insights; Deloitte Touche Tohmatsu Limited: New York, NY, USA, 2024; Available online: https://www.deloitte.com/us/en/what-we-do/capabilities/quantum/services/quantum-cyber-readiness.html (accessed on 30 March 2025).
  102. PwC. Securing Data in the Post-Quantum Age. In PwC Publications; PwC Global: London, UK, 2025. [Google Scholar]
  103. JPMorgan Chase; Toshiba; Ciena. JPMorgan Chase, Toshiba and Ciena Build the First Quantum Key Distribution Network Used to Secure Mission-Critical Blockchain Application. Press release; New York, NY & Hanover, MD, USA, 17 February 2022. Available online: https://www.jpmorganchase.com/newsroom/press-releases/2022/jpmc-toshiba-ciena-build-first-quantum-key-distribution-network (accessed on 23 April 2025).
  104. Yan, R.; Wang, Y.; Dai, J.; Xu, Y.; Liu, A.Q. Quantum-Key-Distribution-Based Microgrid Control for Cybersecurity Enhancement. IEEE Trans. Ind. Appl. 2022, 58, 3076–3086. (In English) [Google Scholar] [CrossRef]
  105. Aggarwal, D.; Brennen, G.K.; Lee, T.; Santha, M.; Tomamichel, M. Quantum attacks on Bitcoin, and how to protect against them. arXiv 2017, arXiv:1710.10377. [Google Scholar] [CrossRef]
Figure 1. Classification of symmetric and asymmetric algorithms [22].
Figure 1. Classification of symmetric and asymmetric algorithms [22].
Fintech 04 00052 g001
Table 1. Identified research gaps mapped to research questions and propositions.
Table 1. Identified research gaps mapped to research questions and propositions.
Article TitleResearch QuestionPropositionsIdentified Research Gap
Cybersecurity and Prevention in the Quantum Era (Dwivedi et al., 2023) [9]RQ1, RQ2Propositions 1 and 2This article identifies the critical gap in the transition from classical to quantum-secure encryption infrastructure in finance and accounting systems. It highlights vulnerabilities in current systems exposed by Shor’s and Grover’s algorithms, showing that classical encryption (e.g., RSA, AES, ECC) will become obsolete. However, it lacks specific implementation frameworks or models for integrating post-quantum cryptography into organisational systems.
Cybersecurity in Accounting Research (Haapamäki & Sihvonen, 2022) [6]RQ1, RQ3Propositions 3 and 4The article synthesises literature but reveals a lack of research addressing how accounting systems can be adapted to withstand quantum-era threats. Specifically, there is minimal attention given to integration challenges, protocol transitions, or organisational readiness for quantum-secure frameworks in accounting systems.
Innovative Accounting Methodology for Ensuring the Interaction of Economic and Cybersecurity of Enterprises (Zadorozhnyi, Muravskyi, Shevchuk, & Bryk, 2021) [23]RQ3Propositions 3 and 4This work underscores the impact of cyber threats on accounting quality but lacks a direct analysis of how quantum computing or quantum-safe measures can be incorporated into existing enterprise accounting methodologies. There is an evident absence of quantum-specific adaptation models or training frameworks for accounting personnel.
Quantum Computing for Finance: Overview and Prospects (Orús et al., 2019) [8]RQ2, RQ3Propositions 1 and 4While offering technical insight into quantum optimisation, machine learning, and amplitude estimation, this article does not bridge the gap into accounting-specific use cases. It lacks practical blueprints for integrating these algorithms into financial recordkeeping, audit trails, or encryption frameworks used in accounting systems.
Table 2. PSALSAR framework for systematic literature reviews.
Table 2. PSALSAR framework for systematic literature reviews.
StepsOutcomeMethods
ProtocolDefine study scopeResearch question and PICOC framework to be considered
SearchDefine the search strategySearch strings
Search studiesSearch databases
AppraisalSelect studiesDefining inclusion and exclusion criteria
Quality assessment of studiesQuality criteria
SynthesisExtract dataExtraction template
Categorise the dataCategorise the data based on the iterative definition, and prepare it for further analysis work
AnalysisData analysisQuantitative categories, description, and narrative analysis of the organised data
Results and discussionBased on the analysis, show the trends, identify gaps, and compare results
ConclusionDeriving conclusions and recommendations
ReportReport writingPRISMA methodology
Journal article productionSummarising the results for the wider public
Table 3. SLR research scope based on the application of the PICOC framework to the determined objectives.
Table 3. SLR research scope based on the application of the PICOC framework to the determined objectives.
ConceptDefinition SLR Application
PopulationThe research work dealing with cybersecurity for accounting based on quantum computing.Scientific research work on dealing with the cybersecurity for accounting based on quantum computing, Research studies, academic papers, and technical reports focused on the application of quantum computing to enhance cybersecurity in accounting.
InterventionExisting techniques utilised to address the problem identified.Incorporating quantum computing in the accounting field. Current cybersecurity techniques in accounting, such as encryption methods, and how they can be enhanced or replaced by quantum computing.
ComparisonPerforming SWOT analysis.Identifying the strengths, weaknesses, opportunities and threats of adopting the quantum computing in accounting for cybersecurity. Comparing quantum computing methods with classical computing techniques in terms of effectiveness, scalability, and practicality for cybersecurity in accounting.
Outcome(s)Measure to assess the knowledge and gaps mentioned in the selected publications related to quantum-based accounting.Identification of gaps in current research regarding the integration of quantum computing in cybersecurity for accounting and proposing areas for future study.
ContextThe particular settings or areas of the population.Trends in cybersecurity for accounting based on quantum computing research, as well as related challenges and gaps. The specific contexts within accounting (e.g., financial data protection, auditing, fraud detection) where quantum computing could be applied to improve cybersecurity.
Table 4. SLR study selection of literature using inclusion and exclusion criteria.
Table 4. SLR study selection of literature using inclusion and exclusion criteria.
CriteriaDecision
When the keywords exist in title, keywords, or abstract section of the paper.Inclusion
The paper published in a scientific peer-reviewed journal or article.Inclusion
The paper should be written in the English language.Inclusion
Papers contain concepts relevant to objective of the research. Inclusion
Provides information on CS or quantum theory related to accounting.Inclusion
Papers that are duplicated within the search documents.Exclusion
Papers that are not accessible, review papers and meta-data.Exclusion
Papers that are not primary/original research.Exclusion
Papers written in languages other than English.Exclusion
Grey literature, chapters, editorials, notes, letters, new items, surveys.Exclusion
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Shadan, H.H.; Islam, S.M.N. Quantum Computing and Cybersecurity in Accounting and Finance in the Post-Quantum World: Challenges and Opportunities for Securing Accounting and Finance Systems. FinTech 2025, 4, 52. https://doi.org/10.3390/fintech4040052

AMA Style

Shadan HH, Islam SMN. Quantum Computing and Cybersecurity in Accounting and Finance in the Post-Quantum World: Challenges and Opportunities for Securing Accounting and Finance Systems. FinTech. 2025; 4(4):52. https://doi.org/10.3390/fintech4040052

Chicago/Turabian Style

Shadan, Huma Habib, and Sardar M. N. Islam. 2025. "Quantum Computing and Cybersecurity in Accounting and Finance in the Post-Quantum World: Challenges and Opportunities for Securing Accounting and Finance Systems" FinTech 4, no. 4: 52. https://doi.org/10.3390/fintech4040052

APA Style

Shadan, H. H., & Islam, S. M. N. (2025). Quantum Computing and Cybersecurity in Accounting and Finance in the Post-Quantum World: Challenges and Opportunities for Securing Accounting and Finance Systems. FinTech, 4(4), 52. https://doi.org/10.3390/fintech4040052

Article Metrics

Back to TopTop