1. Introduction
In recent years, global and multidisciplinary interest in Blockchain (BC) technology has grown exponentially since the Bitcoin cryptocurrency adopted it in 2008 [1]. In effect, BC refers to chained blocks of information, that is, pages of a book accounting system digitally signed in the internet environment that supports digital payment transactions made with cryptocurrencies [2].
In its most primary context, BC refers to an open information and accounting system, which allows the control and validation of payment transactions with the particularity of being decentralized, avoiding duplication or digital multiplication of currencies. It has a great potential for diffusion and adaptation, its costs are low and its easy accessibility and high security are revolutionizing the way of recording private transactions [3,4].
Beyond cryptocurrencies, its study as a tool in multiple fields has been developed with multiple applications, such as decentralized document registration, medical records, property registration, monitoring of production processes, customs control, voting systems, or digital identity [5,6,7,8].
In BC, each record (transactions or economic events) is kept in all the nodes of a network permanently and unalterable, with a chronological order and using cryptographic techniques to protect the data. These registers are inserted in a block with a protocol that entails their verification and the consensus of all the users of the network. To do this, a series of checks are carried out, such as the absence of duplication and it is chained with the preceding blocks. Therefore, a distributed and replicated database is created in multiple nodes of the network, where each block confirms and links the previous one. Hence, the traceability of the transaction can be tracked with the entire history since its creation, with the assurance that the data could not be altered or modified. To manipulate the data, the consensus of the entire network would be required. Any node can verify that the transaction or event has taken place on the indicated date [9].
In 2005, researcher Ian Grigg developed what can be considered the first application of BC in accounting [10]. In this study, he proposes triple-entry accounting based on distributed ledger technology (DLT), that is, it incorporates value units (tokens) in a third information entry that is registered on the network through the encrypted BC [11]. These tokens can represent cryptocurrencies or with any accounting fact, good, right or obligation. In this way, if accounting can be implemented using BC technology, the accounting model can be extended to a greater scope of information, faster access to it, more security and for the public administration, it would be an instrument towards transparency.
The registration in distributed, irrevocable, and verified databases on the network, with a cryptographic digital signature, makes the BC allow the authenticity of the facts and the accounting information more reliable and transparent. This circumstance has notable importance in the audit of the annual accounts since the execution of smart contracts allows automating processes [12].
In the digitization of accounting, BC and artificial intelligence represent a transformative impulse in accounting processes and in aspects of control and verification. The accounting system is based on control mechanisms carried out manually at times, which requires duplicate efforts, such as reconciliation [13,14]. In short, with the distributed ledger, control and reconciliation actions between the companies are eliminated and, in addition, with the elimination of intermediaries, the results translate into a reduction in time and costs, with an improvement in the efficiency of the system.
The motivation of this work is to identify the main thematic axes that have been developed and detect emerging ones in the research of BC technology for secure accounting management.
Accordingly, the main objective is to examine the current and emerging lines of research at an international level on BC technology for secure accounting management, between 2016 and 2020, that is, from the publication of the first article (2016) until the last full year (2020). To infer adequate judgments and conclusions, mathematical and statistical techniques were applied to a sample composed of 1130 articles selected from Elsevier’s Scopus database. The importance of these mathematical methods and statistical analysis is since these make it possible to obtain reliable indicators, associated with quality. It involves obtaining information from the documents published by the driving agents, that is, with greater scientific productivity of a certain research topic.
The contribution of this work to the field of knowledge on BC technology for secure accounting management consists in that the findings achieved are useful for the actors working on this research topic, since they require an analysis of past research and an approach to the emerging, such as academics, researchers, research institutions, universities, investment planners, or BC developers.
The rest of the study is structured as follows. Section 2 presents the relevant literature. Section 3 shows the inclusion/exclusion process of the sample data and the applied methodology. Section 4 includes the evolution of scientific production, the analysis of the research lines and the description of future thematic axes, all discussed in a broad context. Finally, Section 5 presents the conclusions.
2. Literature Review
Section 2 is the result of an initial analysis of the scientific literature on BC technology for secure accounting management, while its purpose is to show a guide and conceptual framework for global research, which will allow the interpretation of the results. Hence, to consolidate the purpose of this research, the correspondence between the variables that conceptualize this field of knowledge is exposed. After reviewing the literature and identifying the study variables, the research questions are presented.
Table 1 shows the 15 main articles selected after reviewing the literature, establishing a theoretical framework and terminology on the research topic. The analysis of these has allowed determining the problem, the purpose, and the objective of the research, as well as to obtain the key terms (BC, accounting, and management) to apply the methodology specified in the following Section 3. For each of the articles, the following are indicated: reference, year of publication, title, author or authors, journal where they were published, thematic areas of the journal according to the Scopus database, and the key terms that allow defining the objective of the research.
As can be seen in Table 1, during the analyzed period, the selected records have been analyzing the study variables and the journals where they have been published, they considered that the articles related to this topic are linked both to Engineering; Mathematics and Computer Science as with Social Sciences; Business, Management and Accounting; Economics, Econometrics and Finance; Decision Sciences; Arts and Humanities. This varied classification allows to promote discipline, causes synergies, and contributes to the training of academics and researchers.
The previous review provided definitions of the basic concepts/variables on this research topic. Reflections on the terms used in the context of this research are included, which have shaped this field of study. Moreover, with the intention of avoiding different interpretations, the basic concepts that will be used in the development of the study are defined.
2.1. Blockchain Technology
BC is a database shared and distributed among different participants, decentralized, cryptographically protected (it cannot be altered) and organized into blocks of mathematically related transactions [16,30]. In this sense, BC is a system that works like a book for the recording of transactions and allows elements that do not trust each other to maintain a consensus on the existence, status, and evolution of shared factors. This consensus is the key to BC, because it allows all participants to trust the information that is registered in this database. In this way, BC is based on trust and consensus, that is, it does not need a central entity to supervise or validate the processes that are carried out, and it is built from a global network of computers that manage a huge database of data [31,32,33]. This can be (i) public: open to the participation of anyone who wishes (e.g., Bitcoin or Ethereum); or (ii) private: limited to some participants (e.g., Hyperledger, R3 or Ripple).
This digital transfer system is based on the distribution of information (digital data) in a multitude of independent nodes (participants, user computers or miners), which collectively register, validate, and date the information (token) anonymously, excluding intermediaries and preventing the information from being deleted. BC systems use public key cryptography (asymmetric cryptography) to create a time-stamped, immutable, stub-only content chain. Copies of the BC are distributed to each participating node on the network [16,34,35].
In 2009, BC was popularized with Satoshi Nakamoto’s paper titled “Bitcoin: A Peer-to-Peer Electronic Cash System” [36], where a BC data structure as a ledger to securely store transaction history of Bitcoin was proposed. The idea behind BC goes back to a document by Haber and Stornetta in 1991, titled “How to Time-Stamp a Digital Document” [37], where a method for the secure time-stamping of digital documents was proposed, instead of a digital money scheme, to give an approximate idea of when a document was created. With time stamping, the document creation order is accurately reflected.
BCs oriented to cash transactions were made possible by distribution, no one is in control themselves, and this distribution was made possible through consensus algorithms, and a noise reduction mechanism. Thereby, according to [36], to gain the right to propose to other nodes a new piece of information that will be saved in the chain, a computationally complex and expensive puzzle (hash puzzle) must be solved and the proof of that is resolved. This information is then validated by each node on the network based on the rules of a consensus protocol and all nodes that follow the same protocol will eventually store the piece of information and build the same chain.
Although initially BC technology was created for digital currency trading, technologists understood that there are other ways to employ it. BC draws attention due to its unalterable nature to the benefits associated with security and privacy, that is, its media impact is based on the elimination of third factions (decentralization), increased transparency and security [26]. For this reason, BC is a concept that raises an enormous revolution in the economy and in other areas, and its implementation provides practical solutions for functional business problems.
2.2. Secure Accounting Management
In Accounting, it is key to both maximize security management and reduce risk [38,39]. Computer accounting systems are the main targets due to the value of the information of the companies that they handle, such as, financial records, email addresses, addresses, telephone numbers, bank accounts or credit card information [40,41]. A maxim among corporate accounting professionals is to avoid hacker attacks, since computer accounting systems are packed with information that attackers covet. A good deal of business accounting software products is designed to be secure, and it is critical that security data are protected by a strong password. The principle of BC is decentralized accounting, through which the participants in the network approve, validate, and record the transactions, instead of the responsibility being reincorporated in a single entity.
Likewise, accounting departments archive their documents online for speed, efficiency, and convenience, but the difference with other data is that accountants have confidential customer data. Certain common practices are highly insecure, such as downloading, local storage, or shared internally and with customers via email, exposing sensitive data and allowing hackers to easily steal it. Accountants should share documents with their clients from a secure and encrypted warehouse, rather than using email, and be wary of spear phishing and phishing attacks. When the login credentials of a company’s employees are stored in a password manager, they are less likely to fall for a phishing scam, thus logging in with only the hidden URL and passwords [42,43].
With companies increasing BYOD (bring your own device) policies and the introduction of smartphones and tablets, companies must ensure that an employee’s use of their mobile device does not weaken their cybersecurity posture. Accounting firms should never access or store sensitive information on a mobile device unless it is protected by two-factor authentication [44,45].
Telecommuting has increased dramatically across all industries, especially since the COVID-19 pandemic [46], by expecting employees to work from any location, creating opportunities for data breaches. Accountants should not use public WiFi (Wireless Fidelity) to access or exchange confidential information, as hackers easily access public data streams and intercept data exchanged in plain text format [47]. The most reliable use of using a public computer is with VPN (Virtual Private Network) software, for end-to-end encryption [48,49].
In this tidal wave of insecurity and fraud is where BC arises, a digital information record that is assimilated to an accounting ledger, so that the data that are entered are permanent, that is, once a transaction is written, it is not it can be deleted or modified [17]. This is achieved by replicating the information record on several computers, so that any alteration requires modifying the accounting book of each of the network participants. Hence, with BC, accessible, fast, secure and interconnected public records are created that people can use in different sectors (finance, insurance, citizen participation, judicial or commerce). This BC technology allows overcoming the barriers built by mistrust [50,51].
2.3. Research Questions
The literature reviewed contains various studies that propose and evaluate this purpose, so that the research questions (RQi, where i = 1,2,3) that arise are:
- RQ1:
What has been the evolution of scientific production in this field of knowledge between 2016 and 2020?
- RQ2:
What were the main lines of research studied in the 2016–2020 period?
- RQ3:
What are the emerging research directions on this topic?
These RQ are the formalized expression of the problems or concerns that the research aims to solve. Likewise, the formulation of the RQ are based on the research framework due to their feasibility, interest, novelty and relevance [52].
3. Data and Methods
Section 3 describes (i) the statistical techniques and mathematics used in this research; (ii) the data inclusion/exclusion criteria to determine the sample of articles analyzed; and (iii) the data processing linked to the objective of this study.
3.1. Data Collection
In this analysis of the scientific literature, mathematical and statistical techniques are applied to examine the evolution of its activity. Hence, the objective of this methodology is to search, identify, and analyze trends in a field of study [53]. Bibliometrics has made it possible to review scientific knowledge from numerous scientific fields [54,55,56]. The motivation was to show a vision of the development of research related to BC technology for secure accounting management.
Currently, bibliographic databases provide the quality and validity of an analysis of any scientific field. Numerous works, to analyze the most appropriate scientific database, in terms of comparison and stability of the statistics, to be used in bibliometric studies, have focused on Web of Science (WoS) and Scopus. The conclusions of these studies indicate the use of a database will depend fundamentally on the (i) focus of the analysis; (ii) discipline; and (iii) the time horizon of the study [57]. The two databases were studied and considering the same study variables, the volume of records in WoS (Core Collection) (190) was lower than in Scopus (1130); therefore, Elsevier’s Scopus database was used.
Figure 1 shows the process followed in the collection (inclusion–exclusion) of the sample, in relation to the “Preferred Reporting Items for Systematic Reviews and Meta-Analyses” (PRISMA) [58]:
Phase 1 (Identification): 24,011 records were detected, considering, for each of the search terms (BC, accounting, and management), obtained from the analysis of the records in Table 1, “all fields”, “all types of documents” and “ all data published in the data range (all years–May 2021)”.
Phase 2 (Screening): The option “article title, abstract and keywords” was chosen in the field of each search term. In total, 18,981 records were excluded, and 5030 were included.
Phase 3 (Eligibility): Only “articles” were selected as the type of document, to guarantee the quality of the peer-review process; and, furthermore, in order not to distort the sample, the search was also limited to the subject areas: computer science; business, management and accounting; economics, econometrics and finance; and mathematics. In total, 3552 records were excluded, and 1478 were included.
Phase 4 (Included): The data referring to the period “every year–2020” were selected, that is, from the first article published on the research topic (2016) to the last full year (2020). In total, 348 records were excluded. Hence, the final sample included 1130 articles (open and non-open access).
3.2. Data Processing
In the context of bibliometrics, data processing is about collecting data and translating it into actionable information. This procedure will be done in detail, so as not to affect the results obtained. In the field of research, the analyzed variables of the articles are: (i) year of publication; and (ii) keywords that identify it [59].
As a bibliometric indicator of relationship (collaboration at the structural level), the co-occurrence method was used, which offers a visual display of the relationships of the concepts represented in the documents. The occurrence attribute shows the number of articles that contain a certain keyword. This method detects the main axes of research, current and future, from the analysis of the key terms, since the articles are reduced to all the joint occurrences between the words that compose them [60,61].
In relation to the co-occurrence analysis, the VOSviewer computer program (version 1.6.16, Leiden University, Leiden, The Netherlands) was used. This software (i) provides data on the evaluation of the content of the records, to determine the research activities of the network; and (ii) recognizes research trends based on the use of certain keywords that identify scientific articles [62].
3.3. Key-Terms Co-Occurrence Analysis
In the analysis of co-occurrences of key terms that define the scientific articles in the sample, to identify current and future research lines on BC technology for secure accounting management, the following terminology from the VOSviewer tool was used [62,63]:
Link: Co-occurrence connection between terms.
Total link strength: Intensity of each link, denoted by a positive numerical value. For concurrent links, indicate the number of articles in which two terms appear together.
Occurrence: Attribute that shows the number of articles that contain a keyword.
Network map: Set of terms and links.
Cluster: Set of terms included in a network map. Clusters do not need to comprehensively cover all the components of a network map.
Weight: Attribute used to describe the term, denoted by numerical value.
Weight of a term: Significance of the term in the field of research analyzed.
Link weight: Number of links of a term with other terms.
Link strength weight: Total strength of the links of a term with other terms.
Score: Attribute that allows classifying by relevance the key terms of the titles and summaries of the analyzed articles.
To calculate the relevance score of each keyword, it is assumed that the highest-scoring terms provide a better prediction to identify a future line of research [62]. Consequently, starting with the term x in research field a, which in turn is part of research field b, the relevance score of term x in research area a is calculated as follows (see Equation (1)) [63,64]:
(1)
-
nax: Number of elements in the areas a in which the term x occurs.
-
nbx: Number of elements in the areas b in which the term x occurs.
-
c: This parameter determines the compensation between the following considerations: (i) the frequency of occurrence of term x in area a relative to the frequency of occurrence of term x in area b can be considered as an indication of the relevance of the term x for area a; and (ii) the absolute frequency of occurrence of term x in area a can also be considered as an indication of the relevance of term x.
3.4. Research Limitations
The application of this methodology in the development of the study has had some limitations that, on the other hand, could be the basis for future research:
Characteristics of bibliometric analysis, which is a method mainly focused on quantitative analysis, ignoring certain qualitative aspects.
The methodology of this research could be extended with other quantitative or qualitative tools, such as Google Scholar, meta-analysis, or data mining (which uses methods of artificial intelligence (AI), machine learning (ML), statistics and data systems). databases), which would provide a different perspective on the results.
The research sample only contains articles published in scientific journals, due to the reliability of the review system by parts; For future research, it would be interesting to include other types of documents, such as books or conference documents, to analyze the variation in the findings.
Delve into different fields of this discipline, for more specific research on some of the topics related to these topics.
4. Results and Discussion
4.1. Temporal Evolution of Scientific Production (2016–2020)
This section seeks to provide an answer to RQ1: What has been the evolution of scientific production in this field of knowledge between 2016 and 2020? Figure 2 shows how the number of articles published between 2016 and 2020 about BC technology for secure accounting management has evolved worldwide. The trend in the publication of documents is polynomial of order 2, it follows a mathematical function of the form: y = 48.714x2 − 196.452x + 2 × 108. The trend line indicates that the number of articles on this topic is increasing faster over time. Furthermore, this line shows its goodness of fit with a coefficient of determination, R2, equal to 0.9995, which denotes the proportion of the variance in the dependent variable (number of articles) that is predictable from the independent variable (year of publication).
Of the 1130 documents published between 2016 and 2020, 640 were in 2020, which represents 56.64%. In 2019, 340 articles were published (30.09%), that is, in the last two years, they accumulate 86.73% of the total, which indicates the incipient development of this topic worldwide, in addition to the recent interest on the part of the scientific and academic community.
Since the development of the digital cryptocurrency, Bitcoin, digital ledger technology has evolved and generated new applications that make up the history of BC [65]. In this sense, research has been increasing in parallel with innovation, since it is necessary to document and examine the utilities of these BC applications, beyond BC, such as the voting system [7], supply chains [66], automated security [67], smart contracts [24], digital identities [68], data registration and verification [69], or cloud storage [70]. Since the launch of Ethereum BC in 2015, research on technology and management for accounting security has a polynomial trend. During this period (2016–2020), governments and private companies finance innovation and applications, since the wide use of this technology in supply management, in the cloud computing business, or the development of the Internet of Things (IoT) was noted.
4.2. Keyword Analysis: Identification of Current Lines of Research
This section seeks to respond to RQ2: What were the main lines of research studied in the 2016–2020 period? In the 1130 scientific articles analyzed (2016–2020), 23,017 keywords were identified, highlighting: Blockchain (in 942 documents), information management (174), Internet of Things (171), supply chain management (108), digital storage (107), network security (99), smart contract (98), data privacy (72), security (71); or access control (66). These keywords are linked to search terms or research variables, which were identified in the initial literature review (see Table 1). The variable “Blockchain” refers to the chain of blocks that contain encoded information of a transaction on the network; “Accounting” to the discipline of economics that functions as a control/recording system of expenses/income and other economic operations carried out by an entity; and “Management” to the action of administering, organizing, and making a certain economic activity function.
Table 2 shows the 15 top keywords in the years 2016, 2017 and 2018. For each term the links, the total link strength, and the occurrences are provided. These are ordered by the number of occurrences.
In 2016, the main keywords (according to the number of occurrences) that are associated with the study variables were: BC (privacy, 2; access control, 1; authenticity, 1; computer security, 1; confidentiality, 1); Accounting (Bitcoin, 1; electronic money, 1; reliability, 1; risk, 1; privacy risk, 1); Management (authorization management, 1; information dissemination, 1; information processing, 1; risk management, 1; copyright, 1). In the first year analyzed, the publications aimed at defining and conceptualizing the subject, such as exploring the types of fraud and malicious activities that can be prevented with BC technology [17], or analyzing how this cryptographic transfer process has made it possible to improve the efficiency of international transactions. of securities subject to legal uncertainty [71].
In 2017: BC (cloud computing, 4; Internet of Things, 4; data privacy, 3; cyber security, 2; distributed computer systems, 2); Accounting (Bitcoin, 4; electronic money, 4; smart contract, 3; Ethereum, 2; accounting blockchain, 1); Management (supply chains, 4; information management, 3; intelligent systems, 3; commerce, 2; identity and access managements, 2). Hence, in 2017, research began to assess BC’s roles in strengthening security on the IoT, where it was observed that the decentralized nature of BC resulted in a low susceptibility to tampering/spoofing by malicious participants [72]; or examining key regulatory challenges affecting BCs, innovative distributed technologies, in the European Union (EU) and the US [73].
In 2018: BC (Internet of Things, 19; digital storage, 15; network security, 12; cryptography, 11; data privacy, 11); Accounting (smart contracts, 11; Bitcoin, 8; electronic money, 7; cryptocurrency 6; Ethereum, 4); and Management (information management, 25; commerce, 8; access control, 7; risk management, 6). In this year, progress was made in research on the subject of study, so that the application of BC in mobile services was examined, as a decentralized data management framework, estimating that to facilitate BC applications in future mobile IoT systems, the solution focuses on multi-access mobile edge computing to solve proof-of-work puzzles for mobile users [74]. Likewise, BC also studied the potential to affect the accounting and auditing fields, as a disruptive emerging technology, and determine the applicability of this technology to support business information systems and continuous monitoring systems [22].
Table 3 shows the 15 top keywords in the years 2019 and 2020, and the full period, 2016–2020. Equally, for each term the links, the total link strength, and the occurrences are provided.
In 2019: BC (Internet of Things, 54; digital storage, 34; data privacy, 27; network security, 27; cryptography, 15); Accounting (smart contract, 32; Ethereum, 20; Big Data, 14; bitcoin, 13; distributed ledger, 13); and Management (information management 49; supply chain management, 30; access control, 19; commerce 19; transparency 10). Hence, the research focused, among other lines, on empirically examining the role of big data, BC and AI in cloud-based accounting information systems [25]. Furthermore, for example, during this year the most traditional databases, Google Sheets and BC, to store and share data on the network, and their applicability to meet the business needs of an accounting entity, in relation to how an accounting organization addresses data governance and this influences business decision making [26].
In 2020: BC (Internet of Things, 93; digital storage, 58; network security 58; authentication, 43; cryptography, 36); Accounting (smart contract 56; distributed ledger, 19; distributed ledger technology, 18; Big Data, 14; costs, 14); and Management (information management 97; supply chain management, 74; access control, 38; decision making, 25; industry 4.0, 21). In this year, research advanced the configuration of BC as a disruptive force in currency, supply chain, information-sharing practices in a variety of industries, in financial reporting and assurance [27,29,75].
In summary, in the period (2016–2020) analyzed: BC (Internet of Things, 171; digital storage, 107; network security, 99); Accounting (smart contract, 98; Ethereum, 40; distributed ledger, 37); and Management (information management, 174; supply chain management; 108; decision making, 31).
Co-occurrence analysis of the keywords that identify the articles in the sample on the study topic was performed. Figure 3 represents the network display of these keywords. The analysis allowed us to detect that the keywords were classified in seven clusters with homogeneous characteristics. The color of the nodes (keywords) allows differentiating the clusters based on the number of co-occurrences, while the size refers to the number of occurrences. Likewise, the size of each cluster refers to the importance of the keywords that make up the group, and, to show the link in the map display, the thickness of the joining lines between two keywords will be greater the stronger the link between these.
Based on the criterion of density and centrality, the clusters are associated with themes developed during the 2016–2020 period. Cluster 1 (pink), which accumulates 29% of the keywords and presents a high centrality and density, contains the most developed and main topic, that is, it analyzes the general revision aspects of the field of study (blockchain technology). Clusters 2 (green, 18%) and 3 (red, 13%), high density and low centrality, define specialized topics (network security and information management). Cluster 4 (yellow, 12%), low density and high centrality, defines emerging themes (such as digital storage or electronic document exchange). Finally, clusters 5 (cyan, 11%), 6 (purple, 9%) and 7 (orange, 8%), with low density and centrality, define less developed topics (edge computing, commerce, or the link with the IoT).
This analysis of co-occurrences allowed us to recognize the lines of research during the 2016–2020 period and developed by the main driving agents of this research field. Table 4, Table 5, Table 6, Table 7, Table 8, Table 9 and Table 10 show the seven clusters identified by the VOSviewer software. The header of each table indicates the color with which each cluster is identified (see Figure 3) and the percentage of keywords over the total. The 10 most prominent keywords are displayed in each cluster, ordered by the number of occurrences. The keyword with the most occurrences defines the component name. For each keyword, the links and the total link strength are also provided. Hence, the lines of research identified were: “Blockchain”, “Network Security”, “Information Management”, “Digital Storage”, “Edge Computing”, “Commerce” and “Internet of Things”.
The first line of research has developed the general aspects of BC technology, which allows value transactions between users without the intervention of intermediaries in the process, that is, it decentralizes the management of transactions and presents all its participants the same registry book or decentralized database (distributed ledger) [76,77].
This thematic axis is directly related to terms such as Supply Chain, Supply Chain Management [78], Artificial Intelligence [79], Distributed Ledger [80], Decision Making [81], Big Data [82], Cryptocurrency [83] and Industry 4.0 [84], among others, giving an overall sense to the subject of study. In this sense, transactions can be monetary (cryptocurrencies) or of another nature (goods, information, services, etc.) [85] and take place on platforms whose nodes communicate through peer-to-peer networks (P2P1) through Internet connections [86,87]. Likewise, BC offers a dynamic and unalterable representation or record of these transactions over time that replaces trusted intermediaries and centralized authorities that support transactions due to the digital trust that users have placed in this technology [88]. In this context, an analysis of the cryptocurrency market and the drivers of the price of Bitcoin in a speculative environment was carried out [89].
The second line of research has developed the concept of network security, which consists of the policies and practices adopted to prevent and monitor unauthorized access, improper use, modification or denial of a computer network and its accessible resources. This involves the authorization of access to data on the network, which is controlled by the network administrator. Furthermore, it is the users who choose (or are assigned) an identification and password (or other authentication information), which allows them to access information and programs within their authorizations [90,91].
In this context, it (i) covers a variety of computer networks, public and private, that are used in everyday jobs, such as conducting transactions and communications between companies, government agencies and individuals; and (ii) protects the network, in addition to protecting and supervising the operations that are carried out [92,93]. This line is linked to concepts such as data privacy, trust management, identity management, security analysis, vehicular ad hoc networks, or mobile telecommunication systems.
The third line of research carried out on this topic has focused on Information Management (IM), which refers to (i) an organizational activity cycle and (ii) development, simulation or modeling of information systems, which are applicable to management areas in organizations to acquire information from one or more sources, the custody and distribution of this to those who need it, and its final disposal through archiving or deletion [94,95].
The cycle of organizational involvement with information involves a variety of stakeholders, including (i) those responsible for ensuring the quality, accessibility, and usefulness of the information acquired; (ii) those responsible for safe storage and disposal; and (iii) those who make decisions with it. Likewise, the interested parties may have the right to originate, change, distribute or eliminate information in accordance with the organizational information management policies [95,96].
IM includes the generic concepts of management (planning, organizing, structuring, processing, controlling, evaluating, and reporting information activities), necessary to meet the needs of those with information-dependent organizational roles or functions. On the other hand, IM is related to the management of data, systems, technology, processes and strategy [49]. This thematic axis is associated with concepts such as smart contract, access control, proposed architectures, trusted third parties, embedded systems, or crime.
The fourth axis of knowledge has developed the concept of digital storage, which refers to the ability to store data or any type of information by a computational storage device. This term arises as a necessity from the development of the new Information and Communication Technologies (ICT). Digital storage has undergone several transformations in its history, motivated by the expansion of the limits of the content that can be created digitally, to save, export, share and download information [97,98].
The progress of storage has passed, among others, from punch cards (960 bytes), Magnetic tapes (5 to 10 Mb), Floppy disks (5.35 and 3.5), CDs, ZIP Disks (between 100 and 750 Mb), USB or flash drives, portable hard drives, even the cloud. In this context, BC is considered a distributed information storage technique, and allows to verify, validate, track and store all kinds of information (from digital certificates, democratic voting systems, logistics/courier services, smart contracts, money and transactions financial) [99,100]. This line is linked to concepts such as cryptography, data sharing, distributed ledger technology, trusted computing, privacy-preserving, public key cryptography, or electronic document exchange.
This fifth line of research has mainly developed the concept of edge computing, which refers to the distributed computing paradigm that brings computing and data storage to the location where it is needed to improve response times and reserve bandwidth. Its origin is content distribution network (CDN), which was created in the late 1990s to serve web and video content while being deployed close to users [101,102].
Later, in the early 2000s, this evolved to host applications and application components on servers at the edge of networks, from which emerged the first edge computing services of hosted applications (dealer locators, shopping carts, real-time data aggregators and ad insertion engines). Edge computing has expanded this approach through virtualization technology, which makes it easier to deploy and run a broader range of applications on edge servers [103,104]. In this period, the volatility of Bitcoin was modeled through key variables of the financial environment [105].
The sixth line of research has studied the influence of BC technology on trade transactions, due to its potential for the industry. BC eliminates intermediaries in a transaction, normally of a financial nature, thus giving relevance to the groups that execute said operation. These transactions are continuously intertwined, creating a massive, unalterable, and permanent accounting book, allowing greater speed, lower costs and more security in transactions [8,106].
Therefore, these characteristics have been of interest in recent years in the field of BC trade. In this way, this thematic axis has analyzed how BC technology is applied in foreign trade and its relationship with smart contracts, that is, computer code that generates the automatic fulfillment of a contract, establishing bank payment commitment clauses, to eliminate doubts about defaults and therefore contribute to the internationalization of companies [107,108]. In addition, during this period, in relation to Fintech, a cryptocurrency was analyzed using an artificial financial market [109].
The seventh line of research detected has developed BC’s link with the IoT concept, proposed in 1999 by Kevin Ashton at the MIT Auto-ID Center. IoT, as is known, allows connecting any physical device (home, business resources, smart devices, among others) designed to work through the transfer of data through wired/wireless networks over the Internet. IoT is designed to collect any information and exchange it with each other [110,111].
Nowadays, many connected devices use BC technology as a safe and fast means of communication, providing security and privacy. This technology has meant promoting the use of the IoT at a global level. In this context, the main lines of development of BC in IoT seek, among others, to integrate systems to lead to the automation of production lines, or to apply to storage and distribution systems of manufactured products and raw materials, that is, Industry 4.0, which needs automation and tokenization from BC [112,113]. The link between IoT and BC applied in homes and community systems has also been developed.
4.3. Future Directions of Research
This section seeks to respond to RQ3: What are the emerging research directions on this topic? After reviewing the literature (Section 2) and an analysis of the keywords that allowed to identify current trends (Section 4.2), the main future/emerging directions of this research field were identified.
International research on BC for secure accounting management evolves adding new concepts and approaches that establish new lines of research. As indicated in Section 3.3, the last terms associated with this research were identified, which allows them to be associated with emerging research directions.
Cluster analysis is an effective process for uncovering emerging trends/problems in a scientific discipline. This consisted of (i) dividing the analysis units into groups of similar elements; (ii) determine the newest terms from the relevance score; and (iii) the terms would be assimilable to emerging thematic lines in this field of research. Table 11 shows the future research directions detected by the relevance score, of which a detailed description is provided later.
4.3.1. Credit Value Evaluation Mechanism
BC is redefining the banking industry, from centralized reliance on the infrastructure of the global banking and financial industry [56]. The disintermediation of centralized trust comes from the characteristics of BC technology, such as the ability to provide global transactions between equals, the immutable ownership of wealth, and instant and open access to financial services, among others.
Banks and financial companies must become value platforms from the traditional platforms of need, that is, for access to credit, custody of wealth and transfers of value. Hence, financial institutions must take advantage of BC solutions to add greater value to their consumer experiences, and gain access to a broader range of new customers wanting financial services [9,114].
Along these lines, BC-based credit reports with their distributed database are more secure than traditional credit reports based on centralized servers, so that they can allow companies to take non-traditional factors into account when calculating credit scores [115].
4.3.2. Enabled Payment Gateway
A payment gateway is a form of payment with which the payments of a company’s clients are processed and authorized. For the sale of a product/service, payment gateways facilitate receiving money quickly and safely. In this sense, payment gateways are the form of payment implemented by all digital businesses, whose function is to make it easier for customers to pay through the web. Its advantages include both the increase in the conversion rate and the results in customer loyalty [116,117].
This payment system has enabled many businesses to expand their activity due to online sales. Therefore, for eCommerce, it is key to integrate payment options that add value to the shopping experience, since a satisfied customer finds the payment method that best suits their needs. The keys to any payment option are to convey confidence, simplicity, and clarity to the user. In this way, eCommerce integrates gateways that allow payment with immediacy, ease and security [118].
4.3.3. Unstructured Supplementary Service Data Message
Unstructured Supplementary Service Data (USSD) is a data sending protocol used, among others, in information services based on interactive menus. BC technology tries to solve its limitations to get it applied to real problems. Hence, BC systems that use public key cryptography should be applied to create an immutable, time-stamped, stub-only content chain, so that copies of the BC are distributed to each participating node in the network. The key to this is that BC systems are theoretically ideal for storing highly sensitive information [116,119].
4.3.4. Consolidated Identity Management
This line of research will study how BC allows people to store data on a chain of blocks, instead of hacked servers. Information is cryptographically protected, once stored, on a and cannot be altered or deleted, making massive data breaches difficult [120].
Among the strategies to be analyzed are (i) eliminating the need for intermediaries by allowing people to store their identities and data directly on a chain of blocks that a user takes with them everywhere online, since, with the digital identities of the users stored cryptographically directly on a chain of blocks within an Internet browser, users theoretically would not need to provide confidential data to any third party; and (ii) allow users to encrypt their personal data in a BC that can be accessed by third parties, although it does not completely eliminate the need for intermediaries, but rather eliminates the need for intermediaries to store sensitive personal data directly on their servers [68,121].
4.3.5. Hyperledger Sawtooth
Hyperledger Sawtooth is an enterprise solution for building, implementing, and running BCs, providing an extremely modular and flexible platform for implementing transaction-based updates to the shared state between untrusted parties coordinated by consensus algorithms. This is a project belonging to the Umbrella organization, focused on ledgers designed to support global business transactions, including major technology, financial, and supply chain giants, with the aim of improving many aspects of performance and reliability, started in 2015 by the Linux Foundation. The project’s objectives include (i) joining several independent efforts to develop open standards and protocols, and (ii) providing a modular framework that supports different components for different uses [122,123].
4.3.6. Hierarchical Lightweight High Throughput Blockchain
In recent years, numerous studies have addressed the possibility of using BC and smart contracts to disrupt the IoT architecture for its security and decentralization guarantees [23,124,125]. This next-generation BC architecture is not scalable enough to meet the requirements of massive data traffic in the IoT environment, because it is necessary to choose the consensus compromise between dealing with high performance or many nodes. So, this situation has impeded the applicability of BC for IoT use cases [126].
In this sense, the research should propose scalable hierarchical BC architectures for IoT, in addition to implementing multiple instances to deal with many nodes, and the scalability of the architecture with the aggregation and prioritization of requests. The based architecture must store and process IoT data securely with custom BC technology, through security and performance analysis [127,128].
4.3.7. BGP Security Infrastructure
Border Gateway Protocol (BGP) is a protocol used on the Internet to exchange routing information between networks, that is, it is the language that allows determining how packets can be sent from one router to another to reach their destination [129]. On the other hand, BGP does not include security mechanisms directly and relies heavily on the trust between network operators that they will protect their systems correctly and will not send incorrect data. In this regard, the problems that can arise if malicious attackers try to affect the routing tables used by BGP should be analyzed. Network operators must understand certain information to protect their routers and to ensure the security and resilience of the overall Internet routing infrastructure [130,131].
4.3.8. Global Supply Chain Risk Analysis
The impact of technology on supply chains and the logistics sector promises to be truly revolutionary. BC will increase (i) the transparency of the supply chain, drastically reducing costs, mainly onerous and complex bureaucracy; and (ii) understanding the global flow of trade, tracking specific items at each stage of its journey and the associated risks, allowing better management and mitigation of these risks [132,133].
BC is key in the daily activities of logistics companies. The application of this technology to documentation and information exchange helps logistics companies. Today, technology and information move the load. Obtaining more data and extracting better analysis from this information can improve efficiencies in supply chains and the logistics process. For all this, it will be analyzed how BC provides a more effective and definitive mechanism to track data in complex supply chains, in addition to increasing efficiency, reducing human errors, and resolving responsibilities and obligations throughout the chain [134].
4.3.9. Extensible Permissioned Blockchain Platform
BC platforms generate a transparent and unalterable chain of information. These features could provide an opportunity for intellectual property (IP) offices to transform the registration of IP rights to make the process more cost-effective, faster, more accurate and more secure. In addition, this technology offers the potential to transform the efficiency and transparency of rights management information [135].
Authorized BCs are an additional BC security system, as they maintain a layer of access control to allow certain actions to be performed only by certain identifiable participants. In this sense, future studies should analyze how BC technology can improve the efficiency of the registration process for drawings and marks by shortening some of these processes and procedures. Likewise, BC technology can also help create a record of unregistered IP rights, such as copyright and unregistered design rights, as it can easily provide proof about the time of creation, information on the management of rights and jurisdictional requirements [136,137].
4.3.10. Centralized Authentication Authorization Auditing
This line of work will develop the centralized authentication authorization audit. To migrate many online services, obstacles arise both related to the ability to secure data and to verify the identity of users. The computer network authentication protocol provides secure communication over the Internet, for client–server applications, that facilitates mutual authentication by which the client and the server can guarantee the authenticity of the other. Currently, online authentication is based on a password and the use of two-factor authentication [138,139].
The problem with these methods is that the passwords are insecure, and the two-factor authentication relies on sending a code via SMS (Short Messaging Service) or a third-party service. Consequently, BC emerges as a potential solution since its cryptographic principles could be applied to authentication. BC can offer this approach by decentralizing ownership of credentials and availability on an immutable chain of data. These are stored in a shared workbook, rather than being stored by an application.
This shared ledger is downloaded by each individual user, reflecting a record of each transaction performed. That is, by distributing a ledger among all members of the network, BC authentication eliminates the power to perversely modify the ledger. Therefore, each time a transaction is added to the chain, most of the network must verify its validity, thus guaranteeing its integrity. This system still has drawbacks and insecurities, so it is key to analyze this technology in detail [140]. In this sense, the feasibility of using public key encryption to send credentials with security will be studied, so that the recipient can verify the shipment against an immutable BC entry, providing security and reliability to identity verification.
5. Conclusions
The main objective is to examine the current and emerging lines of research at an international level on BC technology for secure accounting management, between 2016 and 2020. Mathematical and statistical techniques were applied to a sample of 1130 scientific articles selected from Elsevier’s Scopus database. Basically, the main current and future lines of research on this topic were identified. In relation to the incipient thematic, a polynomial trend is observed in the global publication, with 60% of the total sample in 2020, confirming the interest of the academic and scientific community.
This field of knowledge was developed from the seven main lines of investigation detected: “Blockchain”, “Network security”, “Information management”, “Digital storage”, “Edge Computing”, “Commerce” and “Internet of Things”.
BC technology, as the underlying accounting system, is revolutionizing the process of registration, verification, transparency, and reliability of the accounting information system. The research during the analyzed period has focused on highlighting the benefits that BC represents for business activity and accounting, since all the records in the blockchain are distributed on the network and cryptographically sealed, making it impossible to falsify, modify or delete them. In this sense, the emergence of BC in the process of preparing the accounting information has made it possible to advance from a double-entry system to a triple entry system, so that BC technology is the basis that sustains this third ledger of DLT transactions.
Likewise, due to the evolution of this field of research, new concepts and approaches are added, which institute new lines of work. In this context, ten emerging research lines were detected: (i) Credit Value Evaluation Mechanism; (ii) Enabled Payment Gateway; (iii) Unstructured Supplementary Service Data Message; (iv) Consolidated Identity Management; (v) Hyperledger Sawtooth; (vi) Hierarchical Lightweight High Throughput Blockchain; (vii) BGP Security Infrastructure; (viii) Global Supply Chain Risk Analysis; (ix) Extensible Permissioned Blockchain Platform; and (x) Centralized Authentication Authorization Auditing.
This research contributes to the detection and analysis of additional qualitative knowledge, which plays the role of prelude to future debates by presenting a broad vision of the research carried out in the 2016–2020 period, and from which emerging lines of interest were identified. Consequently, these future research directions should allow academics and researchers to guide their next work and funding entities to envision the objectives to be analyzed.
On the other hand, this study has an aggregate of limitations, among which the following stand out: (i) the terms selected to obtain the article sample, since another review of the literature could have led to the detection of other search terms or basic concepts; (ii) the date range, 2016–2020, since the investigation period could have been shortened by years; (iii) the Scopus database from which the sample of articles was obtained, since new publications included in other databases, such as WoS or Google Scholar, could be included; (iv) (ii) the statistical and mathematical techniques applied, since a qualitative analysis could have been included; or (vi) the VOSviewer software used to view the network maps, since another tool may have identified different clusters and emerging lines. In future work, data mining techniques may be used to study large databases and thus find patterns that allow their behavior to be interpreted.
The main novelty or contribution of this work is the identification of the research lines that have been developed so far, based on the grouping of keywords through the analysis of co-occurrences, to build a map of the work carried out by the driving agents of the theme. Furthermore, based on the methodology developed by the researchers, Ludo Waltman and Nees Jan van Eck, from the Center for Science and Technology Studies (Leiden University, The Netherlands), the ten most relevant emerging lines of research on the link between the BC technology and the secure accounting management, to open new avenues to develop.
In this sense, during the last few years, several bibliometric studies have been published on BC linked to different disciplines, such as health [141], Bitcoin [142], applications in power systems [143], Industry 4.0 [144], among others, or the connecting link with financial transactions [56], in addition to other studies with a more general vision [145,146]. For this reason, this work is a novelty since it has not deepened in the detection of research trends of a technological paradigm.
Conclusively, it is determined that the global research on BC technology for secure accounting management presents an upward trend in the number of articles and schools of thought so far and emerging. This indicates the worldwide interest of the academic/scientific community to advance in the solutions to the new problems that arise derived from a subject in constant evolution. The research is carried out in optimal conditions and with a global interest in the issuance of publications to contribute to the knowledge of BC’s link with the accounting discipline. The findings of this study, mainly, should guide the members of the academic and scientific communities that develop and analyze the research field on the link between BC and accounting, in addition to the funding agencies of future research projects on this subject.
Author Contributions
Conceptualization, methodology, software, formal analysis, resources, data curation and writing—original draft preparation, E.A.-S. and M.-D.G.-Z.; investigation, validation, writing—review and editing, visualization, supervision, project administration, E.A.-S., M.-D.G.-Z., E.L.-M. and A.I.-M.; funding acquisition, E.L.-M. and A.I.-M. All authors have read and agreed to the published version of the manuscript.
Funding
This research received no external funding.
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
The data were obtained from Elsevier’s Scopus database (
Conflicts of Interest
The authors declare no conflict of interest.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Figures and Tables
Table 1Main articles used to define the objective and variables of the study.
R | Year | Article Title | Author(s) | Journal | SA | AT |
---|---|---|---|---|---|---|
[15] | 2016 | Blockchains and Smart Contracts for the Internet of Things | Christidis, K.; Devetsikiotis, M. | IEEE Access | E-CS | B-A-M |
[16] | 2016 | Trusting Records: Is Blockchain Technology the Answer? | Lemieux, V.L. | Records Management Journal | SS-BMA | B |
[17] | 2016 | Fraud detections for online businesses: a perspective from blockchain technology | Cai, Y.; Zhu, D. | Financial Innovation | EEF-BMA | B-A-M |
[18] | 2017 | Automated Execution of Financial Contracts on Blockchains | Egelund-Müller, B.; Elsman, M.; Henglein, F.; Ross, O. | Business and Information Systems Engineering | CS | B-A |
[19] | 2017 | Toward blockchain-based accounting and assurance | Dai, J.; Vasarhelyi, M.A. | Journal of Information Systems | BMA | B-A |
[20] | 2017 | Can Blockchains Serve an Accounting Purpose? | Coyne, J.G.; McMickle, P.L. | Journal of Emerging Technologies in Accounting | BMA-CS | B-A |
[21] | 2018 | Accounting for Bitcoin and Other Cryptocurrencies under IFRS: A Comparison and Assessment of Competing Models | Procházka, D. | International Journal of Digital Accounting Research | EEF-DS-BMA | B-A |
[22] | 2018 | Designing confidentiality-preserving Blockchain-based transaction processing systems | Wang, Y.; Kogan, A. | International Journal of Accounting Information Systems | EEF-BMA-DS | B-M |
[23] | 2018 | Money, Credit, and Digital Payment 1971/2014: From the Credit Card to Apple Pay. | Gießmann, S. | Administration and Society | SS-BMA | B-A-M |
[24] | 2019 | From Old to New: From Internet to Smart Contracts and from People to Smart Contracts | de Graaf, T.J. | Computer Law and Security Review | SS-BMA-CS | B-A-M |
[25] | 2019 | Big Data, Blockchain, and Artificial Intelligence in Cloud-Based Accounting Information Systems | Ionescu, L. | Analysis and Metaphysics | AH | B-A |
[26] | 2019 | Blockchain: Business’ next New “It” Technology—a Comparison of Blockchain, Relational Databases, and Google Sheets | McAliney, P.J.; Ang, B. | International Journal of Disclosure and Governance | EEF-BMA | B-A-M |
[27] | 2020 | Blockchain and accounting governance: emerging issues and considerations for accounting and assurance professionals | Smith, S.S.; Castonguay, J.J. | Journal of Emerging Technologies in Accounting | BMA-CS | B-A |
[28] | 2020 | Digital systems and new challenges of financial management—fintech, XBRL, blockchain and cryptocurrencies | Mosteanu, N.R.; Faccia, A. | Quality—Access to Success | BMA | B-A-M |
[29] | 2020 | Blockchain Technology in the Future of Business Cyber Security and Accounting. | Demirkan, S.; Demirkan, I.; McKee, A. | Journal of Management Analytics | BMA-M-DS | B-A |
R: [Reference]; Year: Year of publication; SA: Subject Areas (Scopus database); E: Engineering, CS: Computer Science; SS: Social Sciences; BMA: Business, Management and Accounting; EEF: Economics, Econometrics and Finance; DS: Decision Sciences; AH: Arts and Humanities; M: Mathematics; AT: Associated Terms; B: Blockchain; A: Accounting; M: Management.
Table 2Top 15 keywords per period (2016, 2017 and 2018).
R | 2016 | 2017 | 2018 | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Keyword | L | TLS | O | % | Keyword | L | TLS | O | % | Keyword | L | TLS | O | % | |
1 | Blockchain | 36 | 37 | 3 | 75% | Blockchain | 197 | 245 | 22 | 84.62% | Blockchain | 860 | 1185 | 94 | 78.33% |
2 | Privacy | 31 | 32 | 2 | 50% | Bitcoin | 35 | 41 | 4 | 15.38% | Information Management | 355 | 434 | 25 | 20.83% |
3 | Access Control | 14 | 14 | 1 | 25% | Cloud Computing | 52 | 64 | 4 | 15.38% | Internet of Things | 217 | 284 | 19 | 15.83% |
4 | Authenticity | 5 | 5 | 1 | 25% | Electronic Money | 51 | 55 | 4 | 15.38% | Digital Storage | 223 | 279 | 15 | 12.50% |
5 | Authorization Management | 14 | 14 | 1 | 25% | Internet Of Things | 61 | 81 | 4 | 15.38% | Network Security | 166 | 211 | 12 | 10.00% |
6 | Bitcoin | 14 | 14 | 1 | 25% | Supply Chains | 57 | 72 | 4 | 15.38% | Cryptography | 149 | 170 | 11 | 9.17% |
7 | Computer Security | 18 | 18 | 1 | 25% | Data Privacy | 57 | 61 | 3 | 11.54% | Data Privacy | 140 | 178 | 11 | 9.17% |
8 | Confidentiality | 18 | 18 | 1 | 25% | Information Management | 46 | 47 | 3 | 11.54% | Smart Contracts | 135 | 156 | 11 | 9.17% |
9 | Copyrights | 14 | 14 | 1 | 25% | Intelligent Systems | 50 | 59 | 3 | 11.54% | Authentication | 136 | 164 | 10 | 8.33% |
10 | Data Privacy | 14 | 14 | 1 | 25% | Security | 43 | 46 | 3 | 11.54% | Bitcoin | 60 | 68 | 8 | 6.67% |
11 | Decentralized Access Control | 14 | 14 | 1 | 25% | Commerce | 31 | 32 | 2 | 7.69% | Commerce | 112 | 127 | 8 | 6.67% |
12 | Digital Preservation | 5 | 5 | 1 | 25% | Computation Theory | 25 | 27 | 2 | 7.69% | Access Control | 98 | 111 | 7 | 5.83% |
13 | Electronic Money | 14 | 14 | 1 | 25% | Cybersecurity | 25 | 35 | 2 | 7.69% | Electronic Money | 76 | 88 | 7 | 5.83% |
14 | Indicator-Centric Schema | 18 | 18 | 1 | 25% | Distributed Computer Systems | 31 | 33 | 2 | 7.69% | Privacy | 112 | 129 | 7 | 5.83% |
15 | Information Dissemination | 18 | 18 | 1 | 25% | Distributed Ledger | 6 | 7 | 2 | 7.69% | Cloud Computing | 91 | 113 | 6 | 5.00% |
R: Rank, L: Links, TLS: Total link strength, O: Occurrences; %: Percentage of occurrences over the total.
Table 3Top 15 keywords per period (2019, 2020 and 2016–2020).
R | 2019 | 2020 | 2016–2020 | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Keyword | L | TLS | O | % | Keyword | L | TLS | O | % | Keyword | L | TLS | O | % | |
1 | Blockchain | 1885 | 3122 | 267 | 78.53% | Blockchain | 4120 | 7501 | 556 | 86.88% | Blockchain | 5748 | 12090 | 942 | 83.36% |
2 | Internet of Things | 547 | 789 | 54 | 15.88% | Information Management | 1160 | 1703 | 97 | 15.16% | Information Management | 1798 | 2944 | 174 | 15.40% |
3 | Information Management | 550 | 760 | 49 | 14.41% | Internet of Things | 952 | 1453 | 93 | 14.53% | Internet of Things | 1506 | 2621 | 171 | 15.13% |
4 | Digital Storage | 407 | 552 | 34 | 10.00% | Supply Chain Management | 757 | 1101 | 74 | 11.56% | Supply Chain Management | 947 | 1465 | 108 | 9.56% |
5 | Smart Contract | 307 | 409 | 32 | 9.41% | Digital Storage | 714 | 1061 | 58 | 9.06% | Digital Storage | 1140 | 1892 | 107 | 9.47% |
6 | Supply Chain Management | 251 | 315 | 30 | 8.82% | Network Security | 718 | 1042 | 58 | 9.06% | Network Security | 1055 | 1739 | 99 | 8.76% |
7 | Smart Contracts | 262 | 339 | 29 | 8.53% | Smart Contract | 577 | 724 | 56 | 8.75% | Smart Contract | 910 | 1268 | 98 | 8.67% |
8 | Data Privacy | 314 | 441 | 27 | 7.94% | Authentication | 455 | 630 | 43 | 6.72% | Data Privacy | 744 | 1218 | 72 | 6.37% |
9 | Network Security | 328 | 440 | 27 | 7.94% | Security | 494 | 684 | 41 | 6.41% | Security | 698 | 1081 | 71 | 6.28% |
10 | Ethereum | 187 | 237 | 20 | 5.88% | Access Control | 429 | 617 | 38 | 5.94% | Access Control | 623 | 1025 | 66 | 5.84% |
11 | Security | 187 | 238 | 20 | 5.88% | Supply Chains | 461 | 621 | 37 | 5.78% | Authentication | 639 | 956 | 65 | 5.75% |
12 | Access Control | 201 | 273 | 19 | 5.59% | Cryptography | 454 | 619 | 36 | 5.63% | Cryptography | 690 | 1043 | 63 | 5.58% |
13 | Commerce | 266 | 331 | 19 | 5.59% | Data Sharing | 416 | 558 | 32 | 5.00% | Supply Chains | 685 | 987 | 59 | 5.22% |
14 | Cryptography | 171 | 228 | 15 | 4.41% | Data Privacy | 386 | 524 | 30 | 4.69% | Privacy | 500 | 753 | 49 | 4.34% |
15 | Big Data | 140 | 173 | 14 | 4.12% | Network Architecture | 384 | 524 | 30 | 4.69% | Commerce | 615 | 823 | 47 | 4.16% |
R: Rank, L: Links, TLS: Total link strength, O: Occurrences; %: Percentage of occurrences over the total.
Table 4Cluster 1 (2016–2020).
Cluster 1 (Pink, 29%) | ||||
---|---|---|---|---|
Rank | Keyword | Weight Links | Weight Total Link Strength | Weight Occurrences |
1 | Blockchain (*) | 511 | 5077 | 942 |
2 | Supply Chain Management | 206 | 591 | 108 |
3 | Supply Chains | 196 | 437 | 59 |
4 | Artificial Intelligence | 117 | 191 | 37 |
5 | Distributed Ledger | 108 | 185 | 37 |
6 | Decision Making | 126 | 221 | 31 |
7 | Big Data | 131 | 212 | 30 |
8 | Cryptocurrency | 70 | 128 | 28 |
9 | Trust | 106 | 189 | 28 |
10 | Industry 4.0 | 114 | 216 | 26 |
(*) Keyword that gives name to the cluster.
Table 5Cluster 2 (2016–2020).
Cluster 2 (Green, 18%) | ||||
---|---|---|---|---|
Rank | Keyword | Weight Links | Weight Total Link Strength | Weight Occurrences |
1 | Network Security (*) | 294 | 886 | 99 |
2 | Data Privacy | 226 | 623 | 72 |
3 | Security | 229 | 545 | 71 |
4 | Authentication | 198 | 464 | 65 |
5 | Security and Privacy | 156 | 316 | 33 |
6 | Trust Management | 113 | 208 | 28 |
7 | Identity Management | 76 | 136 | 25 |
8 | Security Analysis | 116 | 204 | 21 |
9 | Vehicular ad hoc Networks | 86 | 190 | 21 |
10 | Mobile Telecommunication Systems | 103 | 156 | 19 |
(*) Keyword that gives name to the cluster.
Table 6Cluster 3 (2016–2020).
Cluster 3 (Red, 13%) | ||||
---|---|---|---|---|
Rank | Keyword | Weight Links | Weight Total Link Strength | Weight Occurrences |
1 | Information Management (*) | 378 | 1338 | 174 |
2 | Smart Contract | 259 | 577 | 98 |
3 | Access Control | 190 | 516 | 66 |
4 | Ethereum | 115 | 227 | 40 |
5 | Proposed Architectures | 93 | 157 | 19 |
6 | Trusted Third Parties | 83 | 134 | 17 |
7 | Embedded Systems | 90 | 140 | 15 |
8 | Management | 29 | 45 | 15 |
9 | Hyperledger Fabric | 38 | 62 | 14 |
10 | Crime | 55 | 87 | 12 |
(*) Keyword that gives name to the cluster.
Table 7Cluster 4 (2016–2020).
Cluster 4 (Yellow, 12%) | ||||
---|---|---|---|---|
Rank | Keyword | Weight Links | Weight Total Link Strength | Weight Occurrences |
1 | Digital Storage (*) | 306 | 924 | 107 |
2 | Cryptography | 197 | 490 | 63 |
3 | Privacy | 174 | 374 | 49 |
4 | Data Sharing | 145 | 294 | 37 |
5 | Distributed Ledger Technology | 89 | 138 | 29 |
6 | Trusted Computing | 114 | 210 | 25 |
7 | Privacy Preserving | 108 | 191 | 23 |
8 | Public Key Cryptography | 95 | 157 | 22 |
9 | Records Management | 72 | 138 | 21 |
10 | Electronic Document Exchange | 69 | 121 | 15 |
(*) Keyword that gives name to the cluster.
Table 8Cluster 5 (2016–2020).
Cluster 5 (Cyan, 11%) | ||||
---|---|---|---|---|
Rank | Keyword | Weight Links | Weight Total Link Strength | Weight Occurrences |
1 | Edge Computing (*) | 151 | 303 | 36 |
2 | Bitcoin | 93 | 167 | 34 |
3 | Cloud Computing | 141 | 283 | 33 |
4 | Decentralization | 97 | 162 | 26 |
5 | Distributed Computer Systems | 139 | 242 | 26 |
6 | Fog Computing | 97 | 192 | 26 |
7 | Electronic Money | 113 | 185 | 25 |
8 | Costs | 108 | 194 | 22 |
9 | Game Theory | 87 | 155 | 18 |
10 | Deep Learning | 71 | 108 | 17 |
(*) Keyword that gives name to the cluster.
Table 9Cluster 6 (2016–2020).
Cluster 6 (Purple, 9%) | ||||
---|---|---|---|---|
Rank | Keyword | Weight Links | Weight Total Link Strength | Weight Occurrences |
1 | Commerce (*) | 166 | 343 | 47 |
2 | Peer to Peer Networks | 146 | 256 | 34 |
3 | Power Markets | 98 | 205 | 23 |
4 | Smart City | 128 | 210 | 23 |
5 | Fintech | 76 | 119 | 19 |
6 | Smart Grid | 90 | 153 | 16 |
7 | Smart Power Grids | 85 | 155 | 14 |
8 | Microgrids | 54 | 78 | 10 |
9 | Security Systems | 61 | 82 | 9 |
10 | Personal Computing | 58 | 77 | 8 |
(*) Keyword that gives name to the cluster.
Table 10Cluster 7 (2016–2020).
Cluster 7 (Orange, 8%) | ||||
---|---|---|---|---|
Rank | Keyword | Weight Links | Weight Total Link Strength | Weight Occurrences |
1 | Internet of Things (*) | 352 | 1202 | 171 |
2 | Network Architecture | 191 | 410 | 44 |
3 | Security of Data | 103 | 181 | 26 |
4 | Consensus Algorithms | 117 | 173 | 22 |
5 | Automation | 67 | 113 | 16 |
6 | Consortium Blockchain | 75 | 106 | 13 |
7 | Internet Protocols | 71 | 103 | 12 |
8 | Accounting | 15 | 25 | 10 |
9 | Data Transfer | 54 | 86 | 10 |
10 | Centralized Management | 52 | 67 | 9 |
(*) Keyword that gives name to the cluster.
Table 11Top 10 Future Directions of Research according to Relevance Score.
Rank | Future Direction of Research | Relevance Score (*) |
---|---|---|
1 | Credit Value Evaluation Mechanism | 21.833 |
2 | Enabled Payment Gateway | 20.191 |
3 | Unstructured Supplementary Service Data Message | 20.191 |
4 | Consolidated Identity Management | 20.027 |
5 | Hyperledger Sawtooth | 19.425 |
6 | Hierarchical Lightweight High Throughput Blockchain | 19.215 |
7 | BGP Security Infrastructure | 18.502 |
8 | Global Supply Chain Risk Analysis | 17.201 |
9 | Extensible Permissioned Blockchain Platform | 17.101 |
10 | Centralized Authentication Authorization Auditing | 12.217 |
(*) Calculated according to “3.3. Key-terms Co-occurrence Analysis”.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2021 by the authors.
Abstract
The scope of blockchain technology, initially associated with the cryptocurrency Bitcoin, is greater due to the multiple applications in various disciplines. Its use in accounting lies mainly in the fact that it reduces risks and the eventuality of fraud, eliminates human error, promotes efficiency, and increases transparency and reliability. This means that different economic sectors assume it as a recording and management instrument. The aim is to examine current and emerging research lines at a global level on blockchain technology for secure accounting management. The evolution of the publication of the number of articles between 2016 and 2020 was analyzed. Statistical and mathematical techniques were applied to a sample of 1130 records from the Scopus database. The data uncovered a polynomial trend in this period. The seven main lines of work were identified: blockchain, network security, information management, digital storage, edge computing, commerce, and the Internet of Things. The ten most outstanding emerging research lines are detected. This study provides the past and future thematic axes on this incipient field of knowledge, which is a tool for decision-making by academics, researchers, and directors of research investment programs.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details




1 Department of Economics and Business, University of Almeria, 04120 Almeria, Spain
2 Department of Financial Economics, Accounting and Operations Management, University of Huelva, 21071 Huelva, Spain;
3 Department of Education, University of Almeria, 04120 Almeria, Spain
4 Department of Education and Social Psychology, Pablo de Olavide University, 41013 Sevilla, Spain;