Quantum Computing and Cybersecurity in Accounting and Finance in the Post-Quantum World: Challenges and Opportunities for Securing Accounting and Finance Systems
Abstract
1. An Introduction: Quantum Computing and Accounting and Finance System Cybersecurity Challenges
1.1. Background of the Study
1.2. Motivation and Relevance
1.3. Research Aim, Research Questions and Research Objectives
1.3.1. Research Aim
1.3.2. Research Question
- Primary Question:
- b.
- Secondary Research Questions:
1.3.3. Research Objectives
- Objective 1:
- b.
- Objective 2:
- c.
- Objective 3:
1.4. Significance of the Study
2. Literature Review and Theoretical Foundations
2.1. Overview of Cybersecurity in Accounting and Finance
Cybersecurity
2.2. Quantum Computing
2.3. Cryptography
Strategies for Cryptography
2.4. Prior Year Research
2.4.1. Cybersecurity in Accounting Research
2.4.2. Innovative Accounting Methodology for Ensuring the Interaction of Economic and Cybersecurity Enterprises
2.4.3. Cybersecurity and Prevention in the Quantum Era
2.4.4. Quantum Computing for Finance: Overview and Prospects
2.5. Limitations of the Existing Literature Reviews
2.6. Cybersecurity Frameworks and Quantum Threat Landscape
2.6.1. Classical Cybersecurity Frameworks in Accounting and Finance
- NIST Cybersecurity Framework (CSF): Widely used for risk-based cybersecurity management across sectors, including finance.
- ISO/IEC 27001: International standard for information security management systems [30].
- COBIT and COSO: Control-oriented frameworks are often used in internal auditing and financial reporting governance.
2.6.2. Quantum Threat Landscape
- Grover’s concept:
- b.
- Peter Shor’s concept:
- c.
- Grover vs. Peter Shor’s Algorithm and Accounting and Finance:
2.7. Critical Integration of Literature and Research Propositions
3. Conceptual Framework and Research Propositions
3.1. Justification for the Theoretical Lens
3.2. Integrated Conceptual Framework of Finance and Accounting System Leveraging Quantum Computing-Based Cybersecurity Strategies
3.2.1. User-Level Constructs: Technology Adoption Models (TAMs)
- Job Fit/Job Performance:
- b.
- Complexity:
- c.
- Perceived Consequences:
- d.
- Affect Towards Use:
- e.
- Relationship/Social Factor:
- f.
- Culture:
3.2.2. Organisational Constructs: IS/Contingency Theory Foundations
- Task Interdependence:
- b.
- Technology:
- c.
- Environment:
- d.
- Structure:
- e.
- Goals:
- f.
- People:
3.2.3. Quantum-Specific Constructs: Emergent from Empirical Synthesis
- Quantum Resistance of Accounting (QRA) Algorithms:
- b.
- Quantum Key Distribution Integration (QKDI):
- c.
- Organisational quantum readiness (OQR):
- d.
- Stakeholder interdependence:
3.2.4. Framework Simplification and Accessibility
- User-Level Factors—adoption-related variables, such as job fit, perceived complexity, affect toward use, perceived consequences, relationship, and cybersecurity culture.
- Organisational Factors—structural and contextual dimensions, including task interdependence, organisational structure, technological capability, environmental pressures, strategic goals, and people.
- Quantum-Specific Factors—constructs unique to the post-quantum era, including the QRAA, QKDI, OQR, and SI.
3.3. Mapping the Integrated Conceptual Framework Factors to Research Objectives and Questions
Practical Implications
- Technological Layer: Adoption of Post-Quantum Cryptography (PQC) and quantum key distribution (QKD) is not optional but necessary. For example, audit trail authentication and digital signatures used in external reporting must transition to quantum-safe standards to prevent future breaches.
- Organisational Readiness Layer: Firms must develop quantum readiness strategies, including staff training, infrastructure investment, and risk assessments. Without organisational alignment, even the best technological solutions will face resistance or fail to be implemented effectively.
- Stakeholder Interdependence Layer: The resilience of accounting systems depends on collaboration between regulators, auditors, IT providers, and financial institutions. Clear policy roadmaps and cross-industry cooperation will be essential to ensure smooth migration to quantum-secure practices.
3.4. Research Propositions
3.4.1. Proposition 1
3.4.2. Proposition 2
3.4.3. Proposition 3
3.4.4. Proposition 4
4. Research Methodology
4.1. Introduction
4.1.1. Systematic Review
4.1.2. Meta-Analysis
4.2. Research Methodology Adopted
PSALSAR Research Methodology
- Step 1_Protocol:
- Step 2_Search:
- For Web of Science, the search was performed using the following:
- For Scopus, the search was performed using the following:
- Step 3_Appraisal:
- Step 3.1_Coding and Thematic Categorisation:
- i.
- Post-Quantum Cryptography (PQC) in Finance;
- ii.
- Quantum Key Distribution (QKD);
- iii.
- Blockchain Vulnerabilities and Quantum Threats;
- iv.
- Integration and Implementation Challenges.
- Step 4_Synthesis:
- Step 5_Analysis:
5. Findings and Discussion
5.1. Results and Findings—Testing of Propositions
5.1.1. Proposition 1
- Job Fit/Job Performance: Articles by [27,71] emphasise that quantum-secure encryption tools, such as lattice-based post-quantum cryptography (PQC) and quantum key distribution (QKD), align well with key accounting functions, including audit trail protection, ledger verification, and secure interdepartmental financial reporting. Job relevance is established in scenarios like post-quantum audit verification and secure cloud bookkeeping.
- Complexity: Over time, quantum computing could bring quantum-resistant encryption into the mainstream, allowing accountants to learn how to apply it, and new tools will make it easier to use. Hybrid models are emerging, combining classical encryption for ease of use with quantum protocols for secure key distribution, suggesting increasing accessibility [73,74]. It has been noted that quantum encryption introduces higher mathematical complexity and infrastructure burden. While secure, implementation requires specialised skills, posing adoption barriers in mid-size accounting firms.
- Perceived Consequences: More crucial is the role of quantum computing in providing much more effective encryption regimes, such as Shor’s algorithm, which can rapidly crack any existing classical encryption scheme. It enhances the effectiveness of quantum encryption in securing accounting systems. Quantum computing enables cryptographic protocols (e.g., QKD) that are provably secure and resistant to computational attacks, making them highly suitable for protecting accounting data [35].
- Attitude Toward Use: However, as organisations become more aware of the threat of quantum-capable cyberattacks, positive attitudes towards quantum-based encryption emerge. Increasing awareness of quantum threats fosters proactive attitudes towards adopting quantum cryptographic methods [75].
- Behavioural Intention to Use: Quantum encryption technologies are becoming firmly entrenched in accounting firms as the threat of future quantum hacking turns from fiction to fact. Institutional momentum is building toward post-quantum transition, with initiatives already launched in the financial and defence sectors rising [76].
- Relationship/Social Factors: [26] Highlight regulatory pressure (e.g., NIST PQC call) driving social and professional urgency to adopt quantum-ready security. Peer pressure within the finance industry is also on the rise.
- Technology Characteristics: Quantum key distribution (QKD) offers unbreakable encryption secured by the laws of physics, unlike classical encryption, which relies on computational difficulty [50]. Shor’s algorithm can break RSA and ECC, underscoring the need to transition to post-quantum and quantum-native encryption protocols [73]. Several studies, including [8], demonstrate that technologies such as CRYSTALS-Kyber and quantum entropy-based encryption outperform classical methods in resisting decryption. These represent critical innovations for accounting systems vulnerable to replay and ledger modification attacks.
- Organisational Structure: Governments, academic research institutions, and software companies collaborating to provide resources and facilitate the adoption of technology would best serve the development of quantum encryption. Global collaboration across academia, governments, and tech companies is accelerating the research and deployment of quantum-secure systems [77]. Accounting firms must revise their protocols and approval chains to support decentralised, quantum-resistant verification systems [78].
- People: Not only do accountants recognise cybersecurity’s importance to confidential accounting data, but firms that innovate by following technology trends also turn to quantum-resistant encryption. Adoption is driven by a sense of urgency across institutions aware of the quantum threat, with early adopters (e.g., financial institutions) expected to set industry norms [35]. A lack of post-quantum cybersecurity skills remains a bottleneck. Most accounting personnel lack awareness of PQC constructs, such as NTRUEncrypt or CRYSTALS-Kyber [79].
- Strategic Goals: Across studies, organisational goals include fraud prevention, data sovereignty, and reduced forensic costs. Quantum-secure encryption aligns better with these goals than classical encryption due to its provable security guarantees under quantum threat models [26].
- Quantum Resistance of Accounting Algorithms: This factor emphasises the need to develop and subsequently use quantum-resistant algorithms designed specifically for accounting systems. These algorithms shield against potential quantum cyberattacks, as no quantum computer surpasses them and falls prey to a malicious agent. Multiple studies confirm that classical algorithms are vulnerable to quantum attacks, necessitating the development of quantum-resistant upgrades for financial systems [35]. The study of [80] confirms that quantum computers can break RSA, ECC, and SHA-256. Studies promote lattice-based schemes (e.g., Kyber, Dilithium) as replacements. There is a strong consensus that quantum-resilient cryptography must replace classical algorithms in financial systems.
- Quantum Key Distribution (QKD) Integration: QKD offers an unbreakable, secure, essential exchange that is also secure against quantum computers. It considerably increases the security of accounting systems. QKD ensures secure key exchange and prevents eavesdropping, even from quantum-enabled attackers [50]. Quantum computing brings new kinds of robustness to the efficacy of encryption against cyberattacks. Quantum-resistant algorithms are designed to resist both classical and quantum computers when executing cryptanalysis. Undeniably [81], quantum computing becomes more promising with the effort being dedicated by world governments and the comprehensiveness of quantum-resistant cryptographic solutions. We do not envision the quantum revolution outpacing the development of quantum-resistant cryptography, but the end of our current era is likely to occur sooner rather than later [27]. QKD ensures secure key exchange over quantum channels, even in adversarial settings. QKD supports end-to-end confidentiality for interbank reconciliations and decentralised ledgers.
- Organisational Digital Readiness: Empirical studies [23] confirm that firms with advanced cloud systems and in-house IT security are significantly more prepared to adopt post-quantum tools, including PQC and QKD deployment.
- Stakeholder Interdependence: As finance increasingly involves coordination among accountants, auditors, tax consultants, and regulators, QKD enables secure multi-party transactions and real-time signature verification [11].
5.1.2. Proposition 2
- People: For example, accountants and IT professionals may need to upskill and reskill to work with quantum computing technologies. Quantum computing has security implications in cybersecurity processes. Integrating quantum computing into practice settings introduces tensions and challenges to accounting and cybersecurity professionals. Professionals in accounting and IT must upskill in quantum concepts to safely adopt these technologies. Quantum computing integration causes interdisciplinary tension but opens pathways for secure innovation in financial data handling [49].
- Quantum Key Distribution (QKD) Integration: In addition, integrating QKD into the accounting systems ensures that the encryption keys used to protect financial information are shared via a secure channel that cannot be transmitted to a third party (hider or eavesdropper), which means that an attack has occurred, but the information remains safe. Thus, accounting systems that integrate quantum computing are less vulnerable to attack via malicious programs or human intervention, making financial data more secure. In conclusion, [81] integrates QKD into accounting systems, offering secure communication channels that are accountable, traceable, and security-based in financial transactions. Quantum cryptography and QKD are already being applied in high-security sectors to ensure data integrity and detect eavesdropping, thereby securing accounting systems [82].
- Perceived Usefulness: Implementing quantum algorithms, such as Grover’s algorithm, is significantly more secure than all currently available encryption methods and serves as a vital safeguard against infiltration approaches, offering both enhanced security and speed. Quantum key distribution (QKD) is precisely what accounting jobs require to secure financial data from ever-evolving cyber threats. It significantly enhances the applicability of quantum computing to accounting and cybersecurity jobs. Studies show that Grover’s algorithm and QKD outperform classical encryption and key distribution methods. These are mission-critical safeguards against cyberattacks in data-rich sectors, such as accounting [83].
- Complexity: The software’s technical complexity could be a barrier. However, once user-friendly platforms and interfaces are developed, perceived ease of use likely decreases the accountants’ learning curve. Researchers acknowledge that technical barriers currently exist. However, trends point to ongoing simplification through standards, platform development, and guided frameworks for integration [49].
- Relationship: Sophisticated new cyberattacks prompt significant industry bodies and financial regulators to endorse the use of quantum technologies to mitigate risks. Quantum encryption techniques, which are based on quantum mechanics, may initially seem intimidating. However, their capacity to enhance security could simplify the administration of cyber threats, making covert attacks more difficult. The global rise in cybercrime, combined with regulations such as GDPR and financial data mandates, drives organisations to seek quantum-secure methods, as seen in parallel sectors like healthcare [82].
- Environment: Cooperation between quantum computing researchers and accounting software vendors can facilitate the integration of quantum solutions. Enhanced data security through quantum encryption can increase stakeholders’ confidence in the security of accounting systems. There is documented cooperation between research bodies, accounting scholars, and quantum technologists to create frameworks for quantum-resistant integration into business practices [49].
- Attitude Towards Use: The continuously evolving, sophisticated techniques hackers employ create a positive attitude toward using quantum solutions. Accounting professionals should be open to adopting quantum encryption if they are aware of its benefits. So, the result is a boost in confidence that quantum technology is more secure than classical techniques. The increasing recognition of quantum computing’s potential to counter sophisticated cyber threats drives positive perceptions among tech-savvy accounting professionals [84].
- Culture: A culture that prizes innovation and security hastens the diffusion of quantum encryption methods; accountants who see cyber threats are likely to act pre-emptively. A proactive culture of innovation and compliance in financial firms accelerates the adoption of secure, traceable, and quantum-safe methods for financial record keeping [85].
- Organisational Structure: If accounting firms have suffered a breach or learned of other firms’ deployment of quantum-safe practices, their intention to use quantum-based systems escalates. Integrating quantum computing creates a new interdependency between accountants and IT professionals, who work together to ensure encryption technologies are in place. Historical breach cases and regulatory trends suggest that firms exposed to quantum-safe use cases or targeted by cyberattacks move swiftly toward integration [82].
- Quantum Accounting Algorithms—Quantum Resistance: A quantum-resistant algorithm secures the integrity and secrecy of accounting activities, protecting accounting records against potential damage from future quantum threats. Quantum-resistant algorithms safeguard financial data in preparation for the era of quantum computers, making the concept of quantum encryption particularly promising for accounting applications.
5.1.3. Proposition 3
- Technology Implementation: Adopting quantum computing necessitates a profound overhaul of existing cybersecurity measures. Businesses and governments must complete various tasks, including establishing new quantum-safe encryption standards, upgrading IT infrastructure, and training personnel to utilise quantum technologies. Researchers argue for the industry-wide deployment of quantum-safe cryptography, such as lattice-based systems and post-quantum RSA alternatives [86]. Quantum computing introduces disruptive encryption capabilities requiring firms to redefine cybersecurity architectures—from network protocols to data storage systems. Overhauls include new cryptographic standards, hardware upgrades, and skilled personnel capable of handling post-quantum algorithms [87].
- Task Interdependence: How financial information is processed and protected also changes. Quantum computing opens up new possibilities for encryption, storage, and data transmission, which must be integrated into accounting workflows to enhance efficiency. Quantum-enhanced systems redefine financial information workflows, especially where encryption, storage, and verification intersect. New protocols require deeper integration with AI-driven anomaly detection and quantum key distribution (QKD)-based communications [88].
- Quantum Resistance of Accounting Algorithms: This is one of the reasons why we need to develop quantum-proof accounting algorithms. These algorithms would necessitate changes to cybersecurity implementations, resulting in superior protection of a business’s financial data on the Internet. Security is enhanced when classical accounting systems are integrated with quantum-resistant encryption, which strengthens protection against future quantum attacks [49].
- Perceived usefulness: Even though we need new protocols to make quantum-safe accounting viable, quantum computing adds enhanced security against cyberattacks and breaches, so accounting wants to use it. So, it would seem sensible for accounting to invest in new, radically secure options, such as quantum computing, to continue fulfilling its roles. Quantum computing enhances the fit for accounting roles by helping the profession move toward enhanced, quantum-safe security, which addresses problems more effectively. Studies affirm that QML, QKD, and lattice-based cryptography offer more secure, traceable, and unbreakable encryption for financial data, making quantum adoption highly attractive for accounting professionals [88].
- Complexity: Implementing it initially feels somewhat challenging, as it involves training and upgrading cybersecurity infrastructure, which is likely to be less than smooth. However, the benefits can be long term and obvious once in place. Combining quantum technologies can be complicated, but the initial technical work can be completed once the learning curve is overcome. Although initial integration is complex, frameworks and standards are emerging to help firms adopt quantum security protocols with minimal disruption [49].
- Organisational Digital Readiness: Establishing government policies and corporate investment in quantum computing research and development (RD) helps facilitate the transition to quantum-based cybersecurity. IT and accounting professionals must work more closely together on each task, hopefully establishing closer working relationships. Multiple papers advocate for interdisciplinary collaboration between quantum scientists, IT departments, and financial regulators to enable successful cybersecurity transformation [89]. Joint efforts across public–private partnerships support the shift toward quantum cybersecurity [90].
- Attitude toward Use: Over time, with proper training, many accountants have come to embrace these new technologies, which provide an effective layer of protection for their data storage. Perspectives may initially start as either scepticism or fear. Positive attitudes toward quantum cybersecurity are increasing, particularly among firms that experience firsthand the benefits or recognise quantum threats as imminent [91]. Firms that adopt quantum-enhanced protocols report greater confidence in the protection of their financial data [91,92].
- Quantum-resistant algorithms: Accounting systems must upgrade their interfaces and incorporate quantum-resistant algorithms into these new protocols, thereby making financial data resistant to quantum attacks [93]. Integrating QKD and post-quantum algorithms creates accounting systems that are both mathematically and physically hacker-proof, significantly reducing the probability of breaches [86,93]. Adoption ensures reduced breach risks and accelerates the uptake of quantum technology [35,80].
- Integration of Quantum Key Distribution (QKD): QKD provides secure communication channels essential for future accounting cybersecurity. Integrating quantum key distribution is crucial in developing future cybersecurity protocols, as it provides secure communication channels for accounting systems. Ensuring secure communication channels by integrating quantum key distribution (QKD) methods reduces the overall risk of these systems. QKD also require changes in the communication protocol being used, supporting progress in the evolving nature of more secure accounting systems. Quantum key distribution is key to building next-generation accounting communication protocols that are verifiably secure and cannot be eavesdropped upon [86].
- Relationship Factors: Quantum cybersecurity calls for increased cooperation between accountants and information technology experts [87]. Joint responsibility in encryption facilitates interdisciplinary collaboration [88]. Past cases of breaches call attention to the importance of synergistic cybersecurity governance [82].
5.1.4. Proposition 4
- Environmental Context: Firstly, the cost and complexity of quantum computing, not to mention the paucity of skilled professionals, are severe impediments to using quantum computing in accounting’s usual ways. However, as the technologies concerned mature and become more accessible, is it safe to assume that security gains drive their use despite initial obstacles? Quantum adoption is hindered by high financial costs, lack of talent, and limited infrastructure, especially in developing markets [96]. However, security and computational advantages drive widespread uptake as technologies mature [97].
- Organisational Characteristics: Firms must conduct a cost–benefit analysis when considering whether to invest in quantum computing, should it become available soon [90,98]. The capital outlay can be significant, but the longer-term benefits of enhanced security—or, more accurately, compliance with forthcoming regulatory standards—are considerably more critical than the initial outlay. Firms are advised to weigh short-term cost hurdles against long-term benefits in terms of compliance, accuracy, and risk mitigation [98]. Adoption is considered a strategic investment, not just a technological one [90].
- Quantum Key Distribution (QKD) Integration: As QKD becomes more reliable and its costs decline, investment in new accounting technology and human resources training ensures that its superior security is widely adopted, thereby overcoming the initial barriers. QKD is initially costly and complex, but it ultimately enables secure, quantum-resilient communication channels, which are critical for sensitive financial systems [99].
- Perceived Usefulness: Though the short-term difficulties are substantial, there ultimately are longer-term benefits in terms of security, which effectively outweigh the inertia headache for quantum computing. In the short term, due to the skills gap, there is an increased likelihood that job fit will worsen; i.e., jobs did not sufficiently provide individuals with the required skills to utilise the technology according to its needs. In the long term, as the role catches up to the apps used in accounting, the job fit typically becomes obsolete again. While current implementation is challenging, long-term cybersecurity and performance gains in finance and accounting are well established [54].
- Perceived Ease of Use: Today, quantum systems are relatively complex to understand, which requires highly skilled workers to operate them, and these skills are also in short supply. These are all barriers, but they decrease over time as quantum tools become available and workers’ literacy in quantum matters improves. Complexity presents a notable obstacle to initial adoption, as it is challenging for firms to determine how to integrate quantum technologies into their operations. High initial complexity is one of the most significant barriers to adoption [94]. User-friendly platforms and training programs are needed to lower the entry threshold over time [95].
- Environment: Commercial adopters in the financial and accounting professions, followed by their peers, cascade, reducing the cost of adoption by mitigating the resistance quotient and demonstrating quantifiable value. Resistance to adoption is driven by an aversion to change and fear of complexity [92]. Adoption is slow initially, but peer pressure, industry leadership, and regulatory mandates likely accelerate acceptance and standard setting [92].
- Technology Adoption: Governments and educational institutions must provide access to quantum computing skills by offering laboratories and study materials and provide further incentives (beyond expected market forces) to drive adoption and help realise the potential benefits. Studies highlight the need for government-led initiatives in quantum education and infrastructure to reduce friction and democratise access [96].
- Attitude Towards Use: Security requirements progressively overcome the entrenched resistance to the costs and complexity of quantum computing. As organisations begin to observe the successes of quantum-enhanced security, resistance to the costs and complexities is reduced, fostering optimism [100].
- Organisational Quantum Readiness: The adoption of quantum computing in accounting increases as firms realise its apparent security benefits and gain a competitive advantage despite resistance to these quantum computing applications due to concerns about costs and complexity. Evident resistance due to costs and complexity may initially be present (or, perhaps more realistically, apathy), but the positive outcomes of early adopters can boost industry confidence and enthusiasm. Companies are already preparing for adoption by investing in research pilots and quantum readiness audits [98].
- People: Accountants and IT specialists need to develop a basic understanding of quantum mechanics. Cross-discipline cooperation and upskilling solutions are needed to close this skills gap and enable safe implementation [49]
- Culture: An innovation- and cybercrime-aware culture supports the active uptake of quantum technology in pioneering companies. Tech-savvy and compliance-oriented accounting organisations will be most open to uptake [85].
5.2. Applied Illustration: Practical Scenarios of Quantum Cybersecurity in Accounting
5.2.1. Case Illustration—Big Four Accounting Firms
5.2.2. Banking and Regulatory Example—QKD Pilots
5.2.3. Simulation Scenario—Post-Quantum Audit Trails
5.3. Discussion—Answers to Research Questions
5.3.1. Research Question 1
5.3.2. Research Question 2
5.3.3. Research Question 3
5.3.4. Research Question 4
5.4. Findings Discussions
5.4.1. Quantum Resilience in Financial Systems
- Post-quantum cryptography (PQC) is becoming increasingly vital for the financial sector as RSA and ECC encryption are vulnerable to quantum attacks.
- NIST’s PQC Standards are paving the way for quantum-safe algorithms, with final recommendations expected in the coming years.
- Early adoption of quantum-safe cryptography is critical to securing financial transactions and protecting sensitive data.
5.4.2. Quantum Key Distribution (QKD) in Financial Systems
- QKD has shown promising results for secure communication channels, offering quantum resilience by ensuring data protection against quantum threats.
- Implementing QKD in financial systems could provide secure key exchange protocols, safeguarding against potential quantum computing disruptions.
5.4.3. Blockchain and Quantum Threats
- Blockchain technology, widely used in financial applications like cryptocurrencies and smart contracts, is vulnerable to quantum computing due to weaknesses in current cryptographic protocols.
- The application of quantum-resistant hash functions and quantum-safe cryptographic systems is necessary for maintaining blockchain security in the quantum era.
5.4.4. Challenges and Future Directions
- Despite the progress in quantum-safe solutions, the implementation of these technologies in real-world financial systems remains a challenge due to high computational costs and the integration complexity of existing systems.
- There is a need for further research into practical deployment strategies and regulatory standards to ensure the widespread adoption of quantum-resilient systems in finance.
5.4.5. Four Key Themes
- Theme 1: Post-Quantum Cryptography (PQC)
- Theme 2: Quantum Key Distribution (QKD)
- Theme 3: Risks Associated with Blockchain
- Theme 4: Integration and Implementation Challenges
6. Contributions of the Study
6.1. Academic Contributions
6.2. Methodological Contributions (Use of PSALSAR)
6.3. Policy Contributions to Technology Regulations in Accounting
7. Future Research and Conclusion
7.1. Future Research
7.2. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Arute, F.; Arya, K.; Babbush, R.; Bacon, D.; Bardin, J.C.; Barends, R.; Boixo, S.; Brandao, F.G.S.L.; Buell, D.A.; Burkett, B.; et al. Quantum supremacy using a programmable superconducting processor. Nature 2019, 574, 505–510. [Google Scholar] [CrossRef]
- Alagic, G.; Apon, D.; Cooper, D.A.; Dang, Q.H.; Dang, T.; Kelsey, J.M.; Lichtinger, J.; Liu, Y.K.; Miller, C.A.; Moody, D.; et al. Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardisation Process; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2022.
- Mamun, A.A.; Abrar, A.; Rahman, M.; Salek, M.S.; Chowdhury, M. Enhancing Transportation Cyber-Physical Systems Security: A Shift to Post-Quantum Cryptography. arXiv 2024, arXiv:2411.13023. [Google Scholar]
- Settlements, B.F.I. Quantum-Readiness for the Financial System: A Roadmap. BIS Publications. 2025. Available online: https://www.bis.org/publ/bppdf/bispap158.pdf (accessed on 25 May 2025).
- Tikk, E.; Brunner, M. Cybersecurity in the financial sector and the quantum-safe cryptography transition. Int. Cybersecur. Law. Rev. 2025, 6, 42–57. [Google Scholar] [CrossRef]
- Haapamäki, E.; Sihvonen, J. Cybersecurity in Accounting Research; Routledge: Abingdon, UK, 2022; pp. 182–214. [Google Scholar]
- Shor, P.W. Algorithms for quantum computation: Discrete logarithms and factoring. In Proceedings of the 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, 20–22 November 1994; IEEE: New York, NY, USA, 1994; pp. 124–134. [Google Scholar]
- Orús, R.; Mugel, S.; Lizaso, E. Quantum computing for finance: Overview and prospects. Rev. Phys. 2019, 4, 100028. (In English) [Google Scholar] [CrossRef]
- Dwivedi, A.; Saini, G.K.; Musa, U.I. Cybersecurity and Prevention in the Quantum Era. In Proceedings of the 2023 2nd International Conference for Innovation in Technology (INOCON), Bangalore, India, 3–5 March 2023; Institute of Electrical and Electronics Engineers Inc.: New York, NY, USA. Available online: https://ieeexplore.ieee.org/document/10101186 (accessed on 10 May 2025). [CrossRef]
- KPMG. Quantum Is Coming—And Bringing New Cybersecurity Threats with it. 2024. Available online: https://kpmg.com/xx/en/our-insights/ai-and-technology/quantum-and-cybersecurity.html#:~:text=KPMG%20in%20Germany%20conducted%20research,5 (accessed on 3 May 2025).
- Saeed, S.; Altamimi, S.A.; Alkayyal, N.A.; Alshehri, E.; Alabbad, D.A. Digital transformation and cybersecurity challenges for businesses resilience: Issues and recommendations. Sensors 2023, 23, 6666. [Google Scholar] [CrossRef] [PubMed]
- Möller, D.P. Cybersecurity in digital transformation. In Guide to Cybersecurity in Digital Transformation: Trends, Methods, Technologies, Applications and Best Practices; Springer: Berlin/Heidelberg, Germany, 2023; pp. 1–70. [Google Scholar]
- Matt, C.; Hess, T.; Benlian, A. Digital transformation strategies. Bus. Inf. Syst. Eng. 2015, 57, 339–343. [Google Scholar] [CrossRef]
- Bokhari, S.; Hamrioui, S.; Aider, M. Cybersecurity strategy under uncertainties for an IoE environment. J. Netw. Comput. Appl. 2022, 205, 103426. [Google Scholar] [CrossRef]
- Gonchar, V. The transformation of entrepreneurial activity in the conditions of the development of the digital economy and a methodology of assessing its digital security. In Digital Technologies in the Contemporary Economy; Collective Monograph/editor Žaneta Simanavičienė; Mykolo Romerio Universitetas: Vilnius, Lithuania, 2022; ISBN 9786094880506. [Google Scholar]
- Sandhu, K. Advancing Cybersecurity for Digital Transformation: Opportunities and Challenges. In Handbook of Research on Advancing Cybersecurity for Digital Transformation; IGI Global: Hershey, PA, USA, 2021; pp. 1–17. [Google Scholar]
- Azizi, N.; Haass, O. Cybersecurity issues and challenges. In Handbook of Research on Cybersecurity Issues and Challenges for Business and FinTech Applications; IGI Global: Hershey, PA, USA, 2023; pp. 21–48. [Google Scholar]
- Vaishnavi, A.; Pillai, S. Cybersecurity in the Quantum Era-A Study of Perceived Risks in Conventional Cryptography and Discussion on Post Quantum Methods. J. Phys. Conf. Ser. 2021, 1964, 042002. [Google Scholar] [CrossRef]
- Denker, K.; Javaid, A.Y. Quantum Computing as a Threat to Modern Cryptography Techniques. In Proceedings of the International Conference on Foundations of Computer Science (FCS), Las Vegas, NV, USA, 29 July–1 August 2019; The Steering Committee of The World Congress in Computer Science, Computer: Las Vegas, NV, USA, 2019; pp. 3–8. [Google Scholar]
- Bernhardt, C. Quantum Computing for Everyone; MIT Press: Cambridge, MA, USA, 2020. [Google Scholar]
- Rubinstein-Salzedo, S. Cryptography; Springer: Berlin/Heidelberg, Germany, 2018. [Google Scholar]
- Abood, O.G.; Guirguis, S.K. A survey on cryptography algorithms. Int. J. Sci. Res. Publ. 2018, 8, 495–516. [Google Scholar] [CrossRef]
- Zadorozhnyi, Z.-M.; Muravskyi, M.; Shevchuk, O.; Bryk, M. Innovative Accounting Methodology of Ensuring the Interaction of Economic and Cybersecurity of Enterprises. Mark. I Menedžment Innovacij 2021, 2021, 36–46. [Google Scholar] [CrossRef]
- Parthasarathy, A. Quantum Supremacy: Here Now, or Hype? CSIR-NIScPR: New Delhi, India, 2019; Available online: https://nopr.niscpr.res.in/bitstream/123456789/52697/3/SR%2056(12)%2014-18.pdf (accessed on 29 April 2025).
- Shor, P.W. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. SIAM Rev. 1999, 41, 303–332. [Google Scholar] [CrossRef]
- Rahul, R.; Geetha, S.; Priyatharsini, S.; Mehata, K.; Sundaresan Perumal, T.; Ethiraj, N.; Sendilvelan, S. Cybersecurity Issues and Challenges in Quantum Computing. In Topics in Artificial Intelligence Applied to Industry 4.0; Wiley: Hoboken, NJ, USA, 2024; pp. 203–221. [Google Scholar]
- Alluhaibi, R. Quantum Machine Learning for Advanced Threat Detection in Cybersecurity. Int. J. Saf. Secur. Eng. 2024, 14, 875–883. (In English) [Google Scholar] [CrossRef]
- AL-Refaey, M.R.; Tyagi, A.K.; AL-Ghamdi, A.S.A.-M.; Kukreja, S. Topics in Artificial Intelligence Applied to Industry 4.0.; John Wiley & Sons: Hoboken, NJ, USA, 2024. [Google Scholar]
- Beato, C.M.F. How Pioneering Public-Private Collaboration in the Financial Sector Can Help Secure Its Quantum Future. World Economic Forum, 13 November 2024. Available online: https://www.weforum.org/stories/2024/11/pioneering-public-private-collaboration-financial-sector-secure-quantum-future/ (accessed on 1 March 2025).
- ISO/IEC 27001; International Standard for Information Security Management Systems. ISO and International Electrotechnical Commission: Geneva, Switzerland, 2022.
- Easttom, C. Quantum computing and cryptography. In Modern Cryptography: Applied Mathematics for Encryption and Information Security; Springer: Berlin/Heidelberg, Germany, 2022; pp. 397–407. [Google Scholar]
- Figgatt, C.; Maslov, D.; Landsman, K.A.; Linke, N.M.; Debnath, S.; Monroe, C. Complete 3-qubit Grover search on a programmable quantum computer. Nat. Commun. 2017, 8, 1918. [Google Scholar] [CrossRef]
- Brennan, D. Quantum computational supremacy: Security and vulnerability in a new paradigm. Ir. Commun. Rev. 2018, 16, 10. [Google Scholar]
- Mosca, M. Cybersecurity in an Era with Quantum Computers: Will We Be Ready? IEEE Secur. Priv. 2018, 16, 38–41. [Google Scholar] [CrossRef]
- Ajala, O.A.; Arinze, C.A.; Ofodile, O.C.; Okoye, C.C.; Daraojimba, A.I. Exploring and reviewing the potential of quantum computing in enhancing cybersecurity encryption methods. Magna Sci. Adv. Res. Rev. 2024, 10, 321–329. [Google Scholar] [CrossRef]
- Thombre, R.; Jajodia, B. Experimental Analysis of Attacks on RSA & Rabin Cryptosystems using Quantum Shor’s Algorithm. In Proceedings of the International Conference on Women Researchers in Electronics and Computing, Online, 22–24 April 2021. [Google Scholar] [CrossRef]
- Bunescu, L.; Vârtei, A.M. Modern finance through quantum computing-A systematic literature review. PLoS ONE 2024, 19, e0304317. (In English) [Google Scholar] [CrossRef] [PubMed]
- Thompson, R.L.; Higgins, C.A.; Howell, J.M. Personal computing: Toward a conceptual model of utilization. MIS Q. 1991, 15, 125–143. [Google Scholar] [CrossRef]
- Delone, W.H.; McLean, E.R. The DeLone and McLean Model of Information Systems Success: A Ten-Year Update. J. Manag. Inform. Syst. 1992, 19, 9–30. [Google Scholar] [CrossRef]
- Burke, W.W.; Litwin, G.H. A Causal Model of Organizational Performance and Change. J. Manag. 1992, 18, 523–545. [Google Scholar] [CrossRef]
- Grover, P.; Kar, A.K.; Dwivedi, Y.K. Understanding artificial intelligence adoption in operations management: Insights from the review of academic literature and social media discussions. Ann. Oper. Res. 2020, 308, 177–213. [Google Scholar] [CrossRef]
- Venkatesh, V.; Morris, M.G.; Davis, G.B.; Davis, F.D. User Acceptance of Information Technology: Toward a Unified View. MIS Q. 2003, 27, 425–478. [Google Scholar] [CrossRef]
- Venkatesh, V.; Bala, H. Technology Acceptance Model 3 and a Research Agenda on Interventions. Decis. Sci. 2008, 39, 273–315. [Google Scholar] [CrossRef]
- Liu, Y.J.; Zhang, R.; Zhou, Y.B. Predicate encryption against master-key tampering attacks. Cybersecurity 2019, 2, 22. (In English) [Google Scholar] [CrossRef]
- Kaneko, K.; Miyamoto, K.; Takeda, N.; Yoshino, K. Quantum pricing with a smile: Implementation of local volatility model on quantum computer. EPJ Quantum Technol. 2022, 9, 7. (In English) [Google Scholar] [CrossRef]
- Chang, Y.J.; Wang, W.T.; Chen, H.Y.; Liao, S.W.; Chang, C.R. A novel approach for quantum financial simulation and quantum state preparation. Quant. Mach. Intell. 2024, 6, 24. (In English) [Google Scholar] [CrossRef]
- Dri, E.; Aita, A.; Giusto, E.; Ricossa, D.; Corbelletto, D.; Montrucchio, B.; Ugoccioni, R. A More General Quantum Credit Risk Analysis Framework. Entropy 2023, 25, 593. (In English) [Google Scholar] [CrossRef]
- Chen, Y.J.; Lin, T.W.; Kuo, C.W.; Tsai, K.Y. An Approach of Privacy-Preserved PQC-based Cyber-threat Intelligence System. In Proceedings of the 2024 8th International Conference on Cryptography, Security and Privacy, CSP 2024, Osaka, Japan, 20–22 April 2024; Institute of Electrical and Electronics Engineers Inc.: New York, NY, USA, 2024; pp. 1–4. Available online: https://ieeexplore.ieee.org/abstract/document/10600647 (accessed on 16 May 2025). [CrossRef]
- Lazirko, M. Quantum Computing Standards & Accounting Information Systems. arXiv 2023, arXiv:2311.11925. [Google Scholar] [CrossRef]
- Nath, A.; Maity, S.; Banerjee, S.; Roy, R. Quantum Key Distribution (QKD) for Symmetric Key Transfer. Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol. 2024, 10, 270–280. [Google Scholar] [CrossRef]
- Teitsma, M.; Ahmed, I.; van Velzen, J. Quantum Organisational Readiness Levels. arXiv 2025, arXiv:2502.16489. [Google Scholar] [CrossRef]
- Gidney, C.; Ekerå, M. How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits. Quantum 2021, 5, 433. [Google Scholar] [CrossRef]
- Umbrello, S.; Seskir, Z.; Vermaas, P.E. Communities of quantum technologies: Stakeholder identification, legitimation, and interaction. Int. J. Quantum Inf. 2024, 22, 2450012. [Google Scholar] [CrossRef]
- Adegbola, M.D.; Adegbola, A.E.; Amajuoyi, P.; Benjamin, L.B.; Adeusi, K.B. Quantum computing and financial risk management: A theoretical review and implications. Comput. Sci. Amp IT Res. J. 2024, 5, 1210–1220. [Google Scholar] [CrossRef]
- “The PRISMA Statement for Reporting Systematic Reviews and Meta-Analyses of Studies That Evaluate Health Care Interventions: Explanation and Elaboration. Ann. Intern. Med. 2009, 151, W-65–W-94. [CrossRef]
- Antman, E.M.; Lau, J.; Kupelnick, B.; Mosteller, F.; Chalmers, T.C. A comparison of results of meta-analyses of randomized control trials and recommendations of clinical experts: Treatments for myocardial infarction. JAMA 1992, 268, 240–248. [Google Scholar] [CrossRef]
- Oxman, A.D.; Guyatt, G.H. The science of reviewing research a. Ann. N. Y. Acad. Sci. USA 1993, 703, 125–134. [Google Scholar] [CrossRef] [PubMed]
- Lame, G. Systematic Literature Reviews: An Introduction. Proc. Des. Soc. Int. Conf. Eng. Des. 2019, 1, 1633–1642. [Google Scholar] [CrossRef]
- Barn, B.; Barat, S.; Clark, T. Conducting systematic literature reviews and systematic mapping studies. In Proceedings of the 10th Innovations in Software Engineering Conference, Jaipur, India, 5–7 February 2017; pp. 212–213. [Google Scholar]
- Ramey, J.; Rao, P.G. The systematic literature review as a research genre. In Proceedings of the 2011 IEEE International Professional Communication Conference, Cincinnati, OH, USA, 17–19 October 2011; IEEE: New York, NY, USA, 2011; pp. 1–7. [Google Scholar]
- Sarkis-Onofre, R.; Catalá-López, F. Aromataris, and C. Lockwood. How to properly use the PRISMA Statement. Syst. Rev. 2021, 10, 117. [Google Scholar] [CrossRef] [PubMed]
- Oláh, J.; Krisán, E.; Kiss, A.; Lakner, Z.; Popp, J. PRISMA-S: An extension to the PRISMA Statement for Reporting Literature Searches in Systematic Reviews. Syst. Rev. 2021, 10, 39. [Google Scholar] [CrossRef]
- Pollock, A.; Berge, E. How to do a systematic review. Int. J. Stroke 2018, 13, 138–156. [Google Scholar] [CrossRef] [PubMed]
- Shuster, J.J. Cochrane Handbook for Systematic Reviews for Interventions, Version 5.1.0; Higgins, J.P.T., Green, S., Eds.; Wiley Online Library: Hoboken, NJ, USA, 2011. [Google Scholar]
- Institute, J.B. Joanna Briggs Institute Reviewers’ Manual, 2014th ed.; The Joanna Briggs Institute: Adelaide, Australia, 2014; pp. 88–91. [Google Scholar]
- Wong, G.; Greenhalgh, T.; Westhorp, G.; Pawson, R. Development of methodological guidance, publication standards and training materials for realist and meta-narrative reviews: The RAMESES (Realist And Meta-narrative Evidence Syntheses–Evolving Standards) project. Health Serv. Deliv. Res. 2014, 2. Available online: https://njl-admin.nihr.ac.uk/document/download/2003227 (accessed on 15 March 2025). [CrossRef]
- Mengist, W.; Soromessa, T.; Legese, G. Method for conducting systematic literature review and meta-analysis for environmental science research. MethodsX 2020, 7, 100777. [Google Scholar] [CrossRef]
- Grant, M.J.; Booth, A. A typology of reviews: An analysis of 14 review types and associated methodologies. Health Inf. Libr. J. 2009, 26, 91–108. [Google Scholar] [CrossRef]
- Del Amo, I.F.; Erkoyuncu, J.A.; Roy, R. Palmarini, and D. Onoufriou. A systematic review of Augmented Reality content-related techniques for knowledge transfer in maintenance applications. Comput. Ind. 2018, 103, 47–71. [Google Scholar] [CrossRef]
- Page, M.J.; McKenzie, J.E.; Bossuyt, P.M.; Boutron, I.; Hoffmann, T.C.; Mulrow, C.D.; Shamseer, L.; Tetzlaff, J.M.; Akl, E.A.; Brennan, S.E.; et al. The PRISMA 2020 statement: An updated guideline for reporting systematic reviews. Syst. Rev. 2021, 10, 1–11. [Google Scholar] [CrossRef]
- Iyer, R.; Bakshi, A. Artificial Intelligence and Quantum Computing Techniques for Stock Market Predictions. In Deep Learning Tools for Predicting Stock Market Movements; Wiley: Hoboken, NJ, USA, 2024; pp. 123–146. [Google Scholar]
- Shelby, L.B.; Vaske, J.J. Understanding Meta-Analysis: A Review of the Methodological Literature. Leis. Sci. 2008, 30, 96–110. [Google Scholar] [CrossRef]
- Cyriac, R.; Eswaran, S. Selvarajan. Quantum Computing in Cryptographic Systems. Int. J. Adv. IT Res. Dev. 2024, 1, 18–25. [Google Scholar] [CrossRef]
- Ren, X. Advantages, classic models, applications and future trends of machine learning in financial industry. In Exploring the Financial Landscape in the Digital Age—Proceedings of the International Conference on Financial Management and the Digital Economy, ICFMDE 2023; Maurer, T.A., Ed.; CRC Press/Balkema: Boca Raton, FL, USA, 2024; pp. 762–767. Available online: https://www.taylorfrancis.com/chapters/edit/10.1201/9781003508816-110/advantages-classic-models-applications-future-trends-machine-learning-financial-industry-xiang-ren (accessed on 15 March 2025). [CrossRef]
- Vadisetty, R. The Effects of Cyber Security Attacks on Data Integrity in AI. In Proceedings of the 2024 International Conference on Intelligent Computing and Emerging Communication Technologies (ICEC), Guntur, India, 23–25 November 2024; pp. 1–6. [Google Scholar] [CrossRef]
- Hasan, M. Quantum Cryptography for Secure Communications and the Enhancement of U.S. Cybersecurity in the Quantum Age. Adv. Soc. Sci. Res. J. 2024, 11, 313–320. [Google Scholar] [CrossRef]
- Seiler, G. Quantum Computing and the Future of Encryption. Scholarly Review (Online). 2024. Available online: https://www.scholarlyreview.org/article/127168-quantum-computing-and-the-future-of-encryption (accessed on 10 May 2025). [CrossRef]
- Gupta, S.; Sharma, V. Effects of Quantum computing on Businesses. In Proceedings of the 4th International Conference on Intelligent Engineering and Management (ICIEM), London, UK, 9–11 May 2023; Institute of Electrical and Electronics Engineers Inc.: New York, NY, USA, 2023. Available online: https://ieeexplore.ieee.org/document/10166880 (accessed on 3 April 2025). [CrossRef]
- Fortin, A.; Héroux, S. Limited usefulness of firm-provided cybersecurity information in institutional investors’ investment analysis. Inf. Comput. Secur. 2023, 31, 108–123. (In English) [Google Scholar] [CrossRef]
- Mamatha, G.; Dimri, N.; Sinha, R. Post-Quantum Cryptography: Securing Digital Communication in the Quantum Era. arXiv 2024, arXiv:2403.11741. [Google Scholar] [CrossRef]
- Hadi, H.J.; Cao, Y.; Alshara, M.A.; Ahmad, N.; Riaz, M.S.; Li, J. Quantum Computing Challenges and Impact on Cyber Security. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; Goel, S., de Souza, P.N., Eds.; LNICST: Springer Science and Business Media Deutschland GmbH: Berlin/Heidelberg, Germany, 2024; Volume 571, pp. 333–343. Available online: https://link.springer.com/chapter/10.1007/978-3-031-56583-0_22 (accessed on 19 May 2022). [CrossRef]
- Basha, C.; Murugan, K.; Suresh, T.; SrirengaNachiyar, V.; Athimoolam, S.; Pappa, C.K. Enhancing Healthcare Data Security Using Quantum Cryptography for Efficient and Robust Encryption. J. Electr. Syst. 2024, 20, 2070–2077. [Google Scholar] [CrossRef]
- Uppaluri, P. Quantum Computing For Financial Systems. Int. J. Adv. Eng. Manag. 2025, 7, 482–491. [Google Scholar] [CrossRef]
- Bhosale, K.; Ambre, S.; Valkova-Jarvis, Z.; Singh, A.; Nenova, M. Quantum Technology: Unleashing the Power and Shaping the Future of Cybersecurity. In Proceedings of the 2023 Eight Junior Conference on Lighting (Lighting 2023), Sozopol, Bulgaria, 23–25 September 2023; IEEE: Sozopol, Bulgaria, 2023; pp. 1–4, ISBN 979-8-3503-2830-1. Online ISBN 979-8-3503-2829-5. [Google Scholar] [CrossRef]
- Demski, J.; FitzGerald, S.; Ijiri, Y.; Ijiri, Y.; Lin, H. Quantum information and accounting information: Their salient features and conceptual applications. J. Account. Public Policy 2006, 25, 435–464. [Google Scholar] [CrossRef]
- SaberiKamarposhti, M.; Ng, K.W.; Chua, F.F.; Abdullah, J.; Yadollahi, M.; Moradi, M.; Ahmadpour, S. Post-quantum healthcare: A roadmap for cybersecurity resilience in medical data. Heliyon 2024, 10, e31406. [Google Scholar] [CrossRef] [PubMed]
- Michael, C.I.; Campbell, T.-A.; Idoko, I.P.; Bemologi, O.U.; Anyebe, A.P.; Odeh, I.I. Enhancing Cybersecurity Protocols in Financial Networks through Reinforcement Learning. Int. J. Sci. Res. Mod. Technol. (IJSRMT) 2024. [Google Scholar] [CrossRef]
- Ganapathy, V. Quantum Machine Learning for Anomaly Detection in Cyber Security Audits. Shodh Sari-An Int. Multidiscip. J. 2025. [Google Scholar] [CrossRef]
- ABishwas, K.; Sen, M. Strategic Roadmap for Quantum- Resistant Security: A Framework for Preparing Industries for the Quantum Threat. arXiv 2024, arXiv:2411.09995. [Google Scholar] [CrossRef]
- Bhasin, A.; Tripathi, M. Quantum Computing at an Inflection Point: Are we Ready for a New Paradigm. IEEE Trans. Eng. Manag. 2021, 70, 2546–2557. [Google Scholar] [CrossRef]
- Shaleh, M. The Transformative Implications of Technology on Accounting Practices. Adv. Manag. Financ. Report. 2024. [Google Scholar] [CrossRef]
- How, M.-L.; Cheah, S.-M. Business Renaissance: Opportunities and Challenges at the Dawn of the Quantum Computing Era. Businesses 2023, 3, 585–605. [Google Scholar] [CrossRef]
- Osundare, O.S.; Ike, C.S.; Fakeyede, O.G.; Ige, A.B. Blockchain and quantum cryptography: Future of secure telecommunications in banking. Eng. Sci. Technol. J. 2022. [Google Scholar] [CrossRef]
- Mousa, N.; Shirazi, F. A survey analysis of quantum computing adoption and the paradigm of privacy engineering. Secur. Priv. 2024, 7. [Google Scholar] [CrossRef]
- Martens, J.; Kumara, I.; Di Nucci, D.; Pecorelli, F.; Monsieur, G.; Tamburri, D.A.; Van Den Heuvel, W.J. Acceptance and Development of Quantum Computing in the Netherlands and Germany: Barriers and Remedies From a Multistakeholder Perspective. IEEE Trans. Eng. Manag. 2025, 72, 62–77. [Google Scholar] [CrossRef]
- Dung, N.T.P.; Lien, N.T.H. Factors affecting the stages of management accounting evolution: The developing market research. J. Gov. Regul. 2024, 3, 452–464. [Google Scholar] [CrossRef]
- Chang, Y.J.; Sie, M.F.; Liao, S.W.; Chang, C.R. The Prospects of Quantum Computing for Quantitative Finance and Beyond. IEEE Nanotechnol. Mag. 2023, 17, 31–37. (In English) [Google Scholar] [CrossRef]
- Islam, M.A.; Hasan, S.K.; Priya, S.A.; Asha, A.I.; Islam, N.M. The Impact of Quantum Computing on Financial Risk Management: A Business Perspective. Int. J. Multidiscip. Res. 2024, 7. [Google Scholar] [CrossRef]
- Shaikh, F.; Sangole, M.; Pareek, V.; Patil, P.A.; Takale, D.; Gupta, S. Quantum Cryptographic Algorithms for Securing Financial Transactions. Comput. Fraud. Secur. 2024. [Google Scholar] [CrossRef]
- Mehta, B.; Tuscai, B.; Wang, T.R.; Mahady, K. Responsible Quantum Readiness: A Perspective from Financial Services Organisation. In Proceedings of the 2024 IEEE International Conference on Quantum Computing and Engineering (QCE), Montreal, QC, Canada, 15–20 September 2024; Volume 2, pp. 71–76. [Google Scholar] [CrossRef]
- Deloitte. Quantum-Cyber Readiness: Preparing for a Quantum-Secure Future. In Deloitte Global Insights; Deloitte Touche Tohmatsu Limited: New York, NY, USA, 2024; Available online: https://www.deloitte.com/us/en/what-we-do/capabilities/quantum/services/quantum-cyber-readiness.html (accessed on 30 March 2025).
- PwC. Securing Data in the Post-Quantum Age. In PwC Publications; PwC Global: London, UK, 2025. [Google Scholar]
- JPMorgan Chase; Toshiba; Ciena. JPMorgan Chase, Toshiba and Ciena Build the First Quantum Key Distribution Network Used to Secure Mission-Critical Blockchain Application. Press release; New York, NY & Hanover, MD, USA, 17 February 2022. Available online: https://www.jpmorganchase.com/newsroom/press-releases/2022/jpmc-toshiba-ciena-build-first-quantum-key-distribution-network (accessed on 23 April 2025).
- Yan, R.; Wang, Y.; Dai, J.; Xu, Y.; Liu, A.Q. Quantum-Key-Distribution-Based Microgrid Control for Cybersecurity Enhancement. IEEE Trans. Ind. Appl. 2022, 58, 3076–3086. (In English) [Google Scholar] [CrossRef]
- Aggarwal, D.; Brennen, G.K.; Lee, T.; Santha, M.; Tomamichel, M. Quantum attacks on Bitcoin, and how to protect against them. arXiv 2017, arXiv:1710.10377. [Google Scholar] [CrossRef]
Article Title | Research Question | Propositions | Identified Research Gap |
---|---|---|---|
Cybersecurity and Prevention in the Quantum Era (Dwivedi et al., 2023) [9] | RQ1, RQ2 | Propositions 1 and 2 | This article identifies the critical gap in the transition from classical to quantum-secure encryption infrastructure in finance and accounting systems. It highlights vulnerabilities in current systems exposed by Shor’s and Grover’s algorithms, showing that classical encryption (e.g., RSA, AES, ECC) will become obsolete. However, it lacks specific implementation frameworks or models for integrating post-quantum cryptography into organisational systems. |
Cybersecurity in Accounting Research (Haapamäki & Sihvonen, 2022) [6] | RQ1, RQ3 | Propositions 3 and 4 | The article synthesises literature but reveals a lack of research addressing how accounting systems can be adapted to withstand quantum-era threats. Specifically, there is minimal attention given to integration challenges, protocol transitions, or organisational readiness for quantum-secure frameworks in accounting systems. |
Innovative Accounting Methodology for Ensuring the Interaction of Economic and Cybersecurity of Enterprises (Zadorozhnyi, Muravskyi, Shevchuk, & Bryk, 2021) [23] | RQ3 | Propositions 3 and 4 | This work underscores the impact of cyber threats on accounting quality but lacks a direct analysis of how quantum computing or quantum-safe measures can be incorporated into existing enterprise accounting methodologies. There is an evident absence of quantum-specific adaptation models or training frameworks for accounting personnel. |
Quantum Computing for Finance: Overview and Prospects (Orús et al., 2019) [8] | RQ2, RQ3 | Propositions 1 and 4 | While offering technical insight into quantum optimisation, machine learning, and amplitude estimation, this article does not bridge the gap into accounting-specific use cases. It lacks practical blueprints for integrating these algorithms into financial recordkeeping, audit trails, or encryption frameworks used in accounting systems. |
Steps | Outcome | Methods |
---|---|---|
Protocol | Define study scope | Research question and PICOC framework to be considered |
Search | Define the search strategy | Search strings |
Search studies | Search databases | |
Appraisal | Select studies | Defining inclusion and exclusion criteria |
Quality assessment of studies | Quality criteria | |
Synthesis | Extract data | Extraction template |
Categorise the data | Categorise the data based on the iterative definition, and prepare it for further analysis work | |
Analysis | Data analysis | Quantitative categories, description, and narrative analysis of the organised data |
Results and discussion | Based on the analysis, show the trends, identify gaps, and compare results | |
Conclusion | Deriving conclusions and recommendations | |
Report | Report writing | PRISMA methodology |
Journal article production | Summarising the results for the wider public |
Concept | Definition | SLR Application |
---|---|---|
Population | The research work dealing with cybersecurity for accounting based on quantum computing. | Scientific research work on dealing with the cybersecurity for accounting based on quantum computing, Research studies, academic papers, and technical reports focused on the application of quantum computing to enhance cybersecurity in accounting. |
Intervention | Existing techniques utilised to address the problem identified. | Incorporating quantum computing in the accounting field. Current cybersecurity techniques in accounting, such as encryption methods, and how they can be enhanced or replaced by quantum computing. |
Comparison | Performing SWOT analysis. | Identifying the strengths, weaknesses, opportunities and threats of adopting the quantum computing in accounting for cybersecurity. Comparing quantum computing methods with classical computing techniques in terms of effectiveness, scalability, and practicality for cybersecurity in accounting. |
Outcome(s) | Measure to assess the knowledge and gaps mentioned in the selected publications related to quantum-based accounting. | Identification of gaps in current research regarding the integration of quantum computing in cybersecurity for accounting and proposing areas for future study. |
Context | The particular settings or areas of the population. | Trends in cybersecurity for accounting based on quantum computing research, as well as related challenges and gaps. The specific contexts within accounting (e.g., financial data protection, auditing, fraud detection) where quantum computing could be applied to improve cybersecurity. |
Criteria | Decision |
---|---|
When the keywords exist in title, keywords, or abstract section of the paper. | Inclusion |
The paper published in a scientific peer-reviewed journal or article. | Inclusion |
The paper should be written in the English language. | Inclusion |
Papers contain concepts relevant to objective of the research. | Inclusion |
Provides information on CS or quantum theory related to accounting. | Inclusion |
Papers that are duplicated within the search documents. | Exclusion |
Papers that are not accessible, review papers and meta-data. | Exclusion |
Papers that are not primary/original research. | Exclusion |
Papers written in languages other than English. | Exclusion |
Grey literature, chapters, editorials, notes, letters, new items, surveys. | Exclusion |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Shadan, H.H.; Islam, S.M.N. Quantum Computing and Cybersecurity in Accounting and Finance in the Post-Quantum World: Challenges and Opportunities for Securing Accounting and Finance Systems. FinTech 2025, 4, 52. https://doi.org/10.3390/fintech4040052
Shadan HH, Islam SMN. Quantum Computing and Cybersecurity in Accounting and Finance in the Post-Quantum World: Challenges and Opportunities for Securing Accounting and Finance Systems. FinTech. 2025; 4(4):52. https://doi.org/10.3390/fintech4040052
Chicago/Turabian StyleShadan, Huma Habib, and Sardar M. N. Islam. 2025. "Quantum Computing and Cybersecurity in Accounting and Finance in the Post-Quantum World: Challenges and Opportunities for Securing Accounting and Finance Systems" FinTech 4, no. 4: 52. https://doi.org/10.3390/fintech4040052
APA StyleShadan, H. H., & Islam, S. M. N. (2025). Quantum Computing and Cybersecurity in Accounting and Finance in the Post-Quantum World: Challenges and Opportunities for Securing Accounting and Finance Systems. FinTech, 4(4), 52. https://doi.org/10.3390/fintech4040052