STRATEGI CYBERSECURITY UNTUK PERLINDUNGAN DATA AKUNTANSI: KAJIAN LITERATUR SISTEMATIS 2021-2025
DOI:
https://doi.org/10.47491/landjournal.v7i1.4535Abstract
The rapid digitalization of business processes has positioned accounting data as a strategic asset that is highly vulnerable to cyber threats such as ransomware, malware, and social engineering. Protecting this data is crucial not only to ensure operational continuity but also to maintain public trust and organizational accountability. This study aims to provide an in-depth review of relevant cybersecurity strategies for safeguarding accounting data, focusing on recent practices and technologies from 2021 to 2025. The research employed a Systematic Literature Review (SLR) approach by examining academic databases such as Scopus, Google Scholar, and SINTA, followed by content analysis and synthesized through a narrative synthesis method. The findings reveal that effective protection strategies emphasize a holistic and multilayered approach, including data encryption, role-based access control, multi-factor authentication, real-time system monitoring, and security audits. Beyond technical measures, employee training and awareness play a critical role in minimizing internal risks. In conclusion, the integration of advanced technologies with human factors and organizational policies significantly enhances the security of accounting data, ensuring data integrity while strengthening business resilience and sustainability in the digital era.
References
Almadadha, R. (2024). Blockchain Technology in Financial Accounting: Enhancing Transparency, Security, and ESG Reporting. Blockchains, 2(3), 312–333. https://doi.org/10.3390/blockchains2030015
Amos Nyombi, Wycliff Nagalila, Babrah Happy, Mark Sekinobe, & Jimmy Ampe. (2024). Enhancing cybersecurity protocols in tax accounting practices: Strategies for protecting taxpayer information. World Journal of Advanced Research and Reviews, 23(3), 1788–1798. https://doi.org/10.30574/wjarr.2024.23.3.2838
Ashraf, M., & Puccia, J. (2023). Should Accountants Upskill? Evidence from Demand for Auditors with Cybersecurity Expertise. https://doi.org/https://acis.pamplin.vt.edu/content/dam/acis_pamplin_vt_edu/research/2023/Ashr af.pdf
Boell, Sebastian K, & Cecez-Kecmanovic, Dubravka. (2015). On being ‘Systematic’ in Literature Reviews in IS. Journal of Information Technology, 30(2), 161–173. https://doi.org/10.1057/jit.2014.26
Chotia, V., Khoualdi, K., Broccardo, L., & Yaqub, M. Z. (2025). The role of cyber security and digital transformation in gaining competitive advantage through Strategic Management Accounting. Technology in Society, 81, 102851. https://doi.org/https://doi.org/10.1016/j.techsoc.2025.102851
Dewi, A. K., Sibarani, B. K., Saputra, E., Norazlina, N., Susanti, S., Syafira, Y., & munakalla, Y. (2025). Strategi Efektif Pengendalian Internal dalam Keamanan Sistem Informasi Akuntansi untuk Perlindungan Data Keuangan. Jurnal Ilmiah Raflesia Akuntansi, 11(1), 138–148. https://doi.org/10.53494/jira.v11i1.838
Hasan, L., Hossain, M. Z., Johora, F. T., & Hasan, M. H. (2024a). Cybersecurity in Accounting: Protecting Financial Data in the Digital Age. European Journal of Applied Science, Engineering and Technology, 2(6), 64–80. https://doi.org/10.59324/ejaset.2024.2(6).06
Hasan, L., Hossain, M. Z., Johora, F. T., & Hasan, M. H. (2024b). Cybersecurity in Accounting: Protecting Financial Data in the Digital Age. European Journal of Applied Science, Engineering and Technology, 2(6), 64–80. https://doi.org/10.59324/ejaset.2024.2(6).06
Jesson, J., Matheson, L., & Lacey, F. M. (2011). Doing Your Literature Review: Traditional and Systematic Techniques. SAGE Publications. https://books.google.co.id/books?id=NAYrLb8qsd4C
Jin, X., Cui, H., Liu, F., Hu, Z., & Cai, Y. (2025). Does cybersecurity regulation promote digital transformation? Evidence from the Cyber Security Law in China. Finance Research Letters, 76, 107041. https://doi.org/https://doi.org/10.1016/j.frl.2025.107041
Juanda, J. (2025). A Comprehensive Literature Review on the Impact of Cyberattacks on Accounting Practices and Security Measures. Fairness, 01(1), 64–80. https://doi.org/https://doi.org/10.70764/gdpu-fr.2025.1(1)-05
Mauliza, A. Y. I., Machmudi, R. D. S., & Indrarini, R. (2022). PENGARUH PERLINDUNGAN DATA DAN CYBER SECURITY TERHADAP TINGKAT KEPERCAYAAN MENGGUNAKAN FINTECH MASYARAKAT DI SURABAYA. SIBATIK JOURNAL: Jurnal Ilmiah Bidang Sosial,
Ekonomi, Budaya, Teknologi, Dan Pendidikan, 1(11), 2497–2516. https://doi.org/10.54443/sibatik.v1i11.395
Meurs, T., Cartwright, E., Cartwright, A., Junger, M., & Abhishta, A. (2024). Deception in double extortion ransomware attacks: An analysis of profitability and credibility. Computers & Security, 138, 103670. https://doi.org/https://doi.org/10.1016/j.cose.2023.103670
Morshed, A., & Khrais, L. T. (2025). Cybersecurity in Digital Accounting Systems: Challenges and Solutions in the Arab Gulf Region. Journal of Risk and Financial Management, 18(1). https://doi.org/10.3390/jrfm18010041
Nurwanah, A. (2024). Cybersecurity in Accounting Information Systems: Challenges and Solutions. Advances in Applied Accounting Research, 2(3), 157–168. https://doi.org/10.60079/aaar.v2i3.336
Putritama, A., Warsono, S., Ali, S., & Handayani, W. (2024). The Impact of Blockchain Technology on Accounting: A Literature Review. Complex Systems Informatics and Modeling Quarterly, 2024(41), 40–54. https://doi.org/10.7250/csimq.2024-41.03
Schreyer, M., Sattarov, T., & Borth, D. (2022). Federated and privacy-preserving learning of accounting data in financial statement audits. Proceedings of the Third ACM International Conference on AI in Finance, 105–113. https://doi.org/https://doi.org/10.48550/arXiv.2208.12708
Slapni?ar, S., Vuko, T., ?ular, M., & Draš?ek, M. (2022). Effectiveness of cybersecurity audit. International Journal of Accounting Information Systems, 44, 100548. https://doi.org/https://doi.org/10.1016/j.accinf.2021.100548
Snyder, H. (2019). Literature review as a research methodology: An overview and guidelines. Journal of Business Research, 104, 333–339. https://doi.org/https://doi.org/10.1016/j.jbusres.2019.07.039
Songa, A. V., & Karri, G. R. (2024). An integrated SDN framework for early detection of DDoS attacks in cloud computing. Journal of Cloud Computing, 13(1), 64. https://doi.org/10.1186/s13677-024- 00625-9
Surya Guritno, D., Setiawan, D., Anni Aryani, Y., & Arifin, T. (2024). CYBERATTACKS ON THE ACCOUNTING PROFESSION : A LITERATUR REVIEW. Media Riset Akuntansi, Auditing & Informasi, 24(2), 1411–8831. https://doi.org/10.25105/mraai.v24i2.19953










