1. AICPA/CICA.
2009.
Records management: Integrating privacy using generally accepted privacy principles.
Available at: https://www.aicpa.org/content/dam/aicpa/interestareas/informationtechnology/resources/privacy/downloadabledocuments/10252-346-records-management-pro.pdf
2. Alicke,
M. D.
2000.
Culpable control and the psychology of blame.
Psychological Bulletin126 (
4):
556–
574.
https://doi.org/10.1037/0033-2909.126.4.556
3. American Management Association.
2019.
The latest on workplace monitoring and surveillance.
Available at: https://www.amanet.org/articles/the-latest-on-workplace-monitoring-and-surveillance/
4. Appelbaum,
D.
2016.
Securing Big Data provenance for auditors: The Big Data provenance black box as reliable evidence.
Journal of Emerging Technologies in Accounting13 (
1):
17–
36.
https://doi.org/10.2308/jeta-51473
5. Asare,
S.,
and
WrightA.
2003.
A note on the interdependence between hypothesis generation and information search in conducting analytical procedures.
Contemporary Accounting Research20 (
2):
235–
251.
https://doi.org/10.1506/7KBW-BKCU-TTAR-164L