<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "https://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <article-meta>
      <title-group>
        <article-title>Digital transformation and its role in enhancing the security of accounting information An analytical study of the opinions of a sample of accountants from private banks in Baghdad Governorate</article-title>
        <subtitle>Transformasi digital dan perannya dalam meningkatkan keamanan informasi akuntansi Studi analitis mengenai pandangan sekelompok akuntan dari bank-bank swasta di Provinsi Baghdad</subtitle>
      </title-group>
      <contrib-group content-type="author">
        <contrib contrib-type="person">
          <name>
            <surname>Yaseen</surname>
            <given-names>Lecturer.Dr. Jasim Mohammed</given-names>
          </name>
          <email>jasim.mohamad65@yahoo.com</email>
          <xref ref-type="aff" rid="aff-1"/>
        </contrib>
        <contrib contrib-type="person">
          <name>
            <surname>Al-Zubaidi</surname>
            <given-names>Alaa Abd Al-hussen Omran</given-names>
          </name>
          <email>alaaommran@yahoo.com</email>
          <xref ref-type="aff" rid="aff-2"/>
        </contrib>
        <contrib contrib-type="person">
          <name>
            <surname>A. Alrawi</surname>
            <given-names>Prof. Dr. Hikmat</given-names>
          </name>
          <email>alaaommran@yahoo.com</email>
          <xref ref-type="aff" rid="aff-3"/>
        </contrib>
      </contrib-group>
      <aff id="aff-1">
        <institution>Al-Turath University , Baghdad</institution>
        <country>Iraq</country>
      </aff>
      <aff id="aff-2">
        <institution>Al-Turath University , Baghdad</institution>
        <country>Iraq</country>
      </aff>
      <aff id="aff-3">
        <institution>Al-Turath University , Baghdad</institution>
        <country>Iraq</country>
      </aff>
      <history>
        <date date-type="received" iso-8601-date="2026-04-08">
          <day>08</day>
          <month>04</month>
          <year>2026</year>
        </date>
      </history>
    <pub-date pub-type="epub"><day>07</day><month>04</month><year>2026</year></pub-date></article-meta>
  </front>
  <body>
    <p>
      <bold>Digital transformation and its role in enhancing the security of accounting information</bold>
    </p>
    <p>
      <bold>An analytical study of the opinions of a sample of accountants from private banks in Baghdad Governorate</bold>
    </p>
    <p>
      <bold>
        <italic>Lecturer.</italic>
      </bold>
      <bold>
        <italic>Dr</italic>
      </bold>
      <bold>.</bold>
      <bold>
        <italic> Jasim Mohammed Yaseen</italic>
      </bold>
      <bold>
        <italic>
          <sup>1</sup>
        </italic>
      </bold>
    </p>
    <p>
      <ext-link xlink:href="mailto:jasim.mohamad65@yahoo.com">jasim.mohamad65@yahoo.com</ext-link>
    </p>
    <p>
      <bold>Alaa Abd Al-hussen Omran Al-Zubaidi </bold>
      <bold>
        <sup>2</sup>
      </bold>
    </p>
    <p>
      <ext-link xlink:href="mailto:alaaommran@yahoo.com">alaaommran@yahoo.com</ext-link>
    </p>
    <p>
      <bold>Prof. Dr. Hikmat A. Alrawi</bold>
      <bold>
        <sup>3</sup>
      </bold>
    </p>
    <p>
      <ext-link xlink:href="mailto:Hikmatalrawi12@yahoo.com">Hikmatalrawi12@yahoo.com</ext-link>
    </p>
    <p><sup>1,2,3</sup> <bold>Al-Turath University</bold><bold> ,</bold><bold> Baghdad, Iraq</bold></p>
    <p>
      <bold>Abstract</bold>
    </p>
    <p>This study explores the relationship between two main variables: digital transformation (with its dimensions of digital strategy, digital organizational culture, and digital leadership) and accounting information security. This was achieved through a survey of a sample of accountants from private banks in Baghdad Governorate, namely: Gulf Commercial Bank, National Islamic Bank, Middle East Iraqi Investment Bank, Regional Commercial Bank, and Al Rajhi Islamic Bank. The researcher used a random sampling method, and a questionnaire was the primary data collection tool. The questionnaire was distributed to 170 accountants from the study population, and after verification, 164 questionnaires were deemed valid for statistical analysis. The data were analyzed statistically using SPSS and AMOS software. The results showed a statistically significant impact and correlation between digital transformation and enhancing accounting information security. The findings of this study represent an attempt to bridge the knowledge gap between the variables of digital transformation and accounting information security. The study recommends that the management of private banks in Baghdad Governorate, under investigation, invest in developing specialized training programs for their leaders, focusing on enhancing their skills in digital organizational culture and digital strategy.</p>
    <p><bold>Key terms:</bold> Digital transformation, accounting information security, private banks in Baghdad Governorate.</p>
    <p>
      <bold>Introduction</bold>
    </p>
    <p>The world is going through a big transformation as it moves toward full digitization. Digital transformation is now a strategic necessity for using technology across all facets of an institution's operations to maintain a competitive edge and ensure company continuity amid fast change. Ismail (2022) believes that this transformation is "the process of companies moving towards business models that rely on digital technologies to innovate products and provide marketing channels that increase the value of their outputs." This implies that banks need to build flexible plans that use both cutting-edge leadership and cutting-edge infrastructure to save money and keep things running smoothly [1].</p>
    <p>"Accounting information security" must be a major priority during this change to keep financial data safe from hacking and other threats. Khamis (2021) believes that we need to "make big changes to the way we work to better and faster serve beneficiaries." It doesn't only mean changing records into digital files; it also requires building a digital control system that makes sure processing is done well and accounting outputs are right in a paperless environment [2]. Slimi and Bushi (2019) argue that IDC's idea of digital transformation is "an ongoing process of adapting to market demands by leveraging digital capabilities to create business models that seamlessly blend digital and manual operations." This study aims to investigate the influence of the dimensions of digital transformation—strategy, culture, and leadership—on the improvement of accounting information security in private banks in Baghdad, with the objective of creating a robust banking environment that protects its information assets and guarantees financial stability in a dynamic technological context [3].</p>
    <p>In this context, the researcher delineated the problem of the current study by examining previous research and suggesting a framework of terms that clarify the relationship between the two variables under investigation: digital transformation and accounting information security. This study has prompted numerous inquiries concerning the nature of the association between the study variables inside private banks in the Baghdad Governorate. In response to these inquiries, the current study delineated certain objectives, which it seeks to achieve by the application of a particular collection of data and facts, and to determine the nature of the relationship among the components being examined. The statistical analysis facilitated the current study in drawing conclusions that clarify the relationship among the examined variables and in developing a set of recommendations.</p>
    <list list-type="order">
      <list-item>
        <p>
          <bold>Methodology of the study. </bold>
        </p>
        <list list-type="bullet">
          <list-item>
            <p>
              <bold>Research problem:</bold>
            </p>
          </list-item>
          <list-item>
            <p>
              <bold>Importance of the study:</bold>
            </p>
          </list-item>
          <list-item>
            <p>
              <bold>Study Objectives:</bold>
            </p>
          </list-item>
          <list-item>
            <p>
              <bold>Study Hypotheses</bold>
            </p>
          </list-item>
          <list-item>
            <p>Sub-hypothesis 1: There is no statistically significant relationship between digital strategy and enhancing accounting information security.</p>
          </list-item>
          <list-item>
            <p>Sub-hypothesis 2: There is no statistically significant relationship between digital organizational culture and enhancing accounting information security.</p>
          </list-item>
          <list-item>
            <p>Sub-hypothesis 3: There is no statistically significant relationship between digital leadership and enhancing accounting information security.</p>
          </list-item>
          <list-item>
            <p>
              <bold>The study's hypothetical framework: </bold>
            </p>
          </list-item>
          <list-item>
            <p>
              <bold> Methodology and approach of the study</bold>
            </p>
          </list-item>
          <list-item>
            <p>
              <bold>A description of the study population and sample</bold>
            </p>
          </list-item>
          <list-item>
            <p>Gender Variable: The male category had the highest value, with a frequency of 112 and a percentage of 68.3%. The female category had the lowest value, with a frequency of 52 and a percentage of 31.7%. This shows what the private banking sector's workforce is like. Men are more likely to be in these jobs.</p>
          </list-item>
          <list-item>
            <p> Age Variable: Most of the sample groups are in the professional maturity stage. The 46-55 age group had the highest value at 38.4%, while the 25-35 age group had the lowest value at 15.2%. This shows that private banks depend on skilled workers to handle accounting and security data. </p>
          </list-item>
          <list-item>
            <p>Educational Attainment Variable: The bachelor's degree made up the most part of the sample's academic descriptors, with 87 instances and 53.0% of the total. The diploma category had the lowest value, at 11.0%. This shows that the banks are serious about hiring college graduates with the right skills for the challenges of digital transformation and information security. </p>
          </list-item>
          <list-item>
            <p>Years of experience variable: The data shows that the cumulative experience is good, with the (5-10 years) experience category having the highest value at 35.4% and the (less than 5 years) experience category having the lowest value at 18.9%. This means that the sample responses are very reliable because they are from the same time period as the stages of technological development in the banking system.</p>
          </list-item>
          <list-item>
            <p>
              <bold> Checking to see if the study instrument is valid</bold>
            </p>
          </list-item>
          <list-item>
            <p>
              <bold>Study Limitations</bold>
            </p>
          </list-item>
          <list-item>
            <p>The Concept of Digital Transformation</p>
          </list-item>
          <list-item>
            <p>
              <bold> Objectives of Digital Transformation.</bold>
            </p>
          </list-item>
          <list-item>
            <p>
              <bold> Aspects of Digital Transformation. </bold>
            </p>
          </list-item>
          <list-item>
            <p>
              <bold>The concept of information security</bold>
            </p>
          </list-item>
          <list-item>
            <p>
              <bold>Elements of Information Security</bold>
            </p>
          </list-item>
          <list-item>
            <p>Must evolve the digital strategy of private banks in accordance with international information security standards They must create an "accounting security policy" that is specific and feeds into their vision. This provides a legal and technical basis to keep financial data secure from future breaches.</p>
          </list-item>
          <list-item>
            <p>Companies can also conduct continuous awareness programs from time to time enabling employees towards digital literacy that will help bring the gap of digital divide in a way. Finally, all accountants need to be educated about the potential for human error to undermine the accounting system and so it is vital that they understand how social engineering works and why they must maintain confidentiality over database information.</p>
          </list-item>
          <list-item>
            <p>Enabling Digital Leadership by less on things and more on connecting Slalom, empowering technically gifted accountants to drive new thinking. The information technology must function with a proliferation of strong encryption systems and surveillance so that electronic access can be tracked in real-time and around the clock, to avoid repeating mistakes from years gone past. D. Provide specialized training in courses like "Accounting Information Security" and electronic auditing. And connect employees’ digital and security skills to their career paths and promotion prospects. This will ensure their swift and efficient deployment of vital technologies.</p>
          </list-item>
          <list-item>
            <p>Adopt electronic signature and encryption technologies, and keep your accounting software up to date. In addition, to ensure the accuracy and tamper-proof nature of financial reports in the paperless digital world, create real-time electronic internal control system that automatically checks and audits accounts.</p>
          </list-item>
        </list>
      </list-item>
    </list>
    <p>The research problem lies in the growing gap between the accelerating trend of private banks towards digital transformation and the complex security challenges facing accounting systems. Theoretically, there is a need for a conceptual framework that links the dimensions of digital transformation to mechanisms for enhancing the security of accounting information in paperless environments. Practically, the problem stems from the varying levels of leadership and organizational culture responsiveness to the cyber risks threatening the financial data of banks in Baghdad. This could weaken the effectiveness of internal control systems and threaten the reliability of accounting reports for stakeholders. Therefore, it is necessary to determine the extent to which the adopted digital strategies contribute to safeguarding this information and ensuring its continuity.</p>
    <p>Based on the research problem we have formulated (theoretical and applied) and the preceding introduction, the main research question can be formulated in a precise scientific manner that combines the independent and dependent variables of the study as follows:</p>
    <p>"What is the role of the dimensions of digital transformation (digital strategy, digital organizational culture, and digital leadership) in enhancing the security of accounting information in private banks operating in Baghdad Governorate, and to what extent are these dimensions effective in mitigating the technical risks facing accounting systems from the perspective of a sample of accountants?"</p>
    <p>The theoretical significance of the research is manifested in its enhancement of the accounting and administrative library by offering a contemporary intellectual framework that integrates the philosophy of digital transformation with the security of accounting information, thereby addressing the knowledge deficit regarding the protection of financial systems within the Iraqi business context. In terms of practical importance, it is emphasized by giving decision-makers in private banks in Baghdad a guide on how to use the dimensions of digital transformation to improve the quality of internal control and keep data safe from breaches. This builds trust and credibility in banking financial reports and helps these institutions deal with quickly changing cyber threats with high efficiency.</p>
    <list list-type="order"/>
    <list list-type="bullet">
      <list-item>
        <p>To determine the level of digital transformation (digital organizational culture, digital strategy, and digital leadership) from the perspective of accountants in private banks in Baghdad Governorate.</p>
      </list-item>
      <list-item>
        <p>To measure the level of accounting information security from the perspective of accountants in private banks in Baghdad Governorate.</p>
      </list-item>
      <list-item>
        <p>To analyze the relationship between digital transformation and accounting information security from the perspective of accountants in private banks in Baghdad Governorate.</p>
      </list-item>
      <list-item>
        <p>To provide practical recommendations to private banks in Baghdad Governorate to enhance accounting information security through digital transformation.</p>
      </list-item>
    </list>
    <list list-type="order"/>
    <p>Based on the theoretical assumptions that will address the study variables (digital transformation and accounting information security), and in order to achieve the objectives and answer the research questions, the following hypotheses were developed:</p>
    <p>
      <bold>Main Hypothesis: There is no statistically significant relationship between digital transformation and enhancing accounting information security. From this main hypothesis, the following sub-hypotheses emerge:</bold>
    </p>
    <list list-type="bullet"/>
    <p>“Based on the study's problem, its importance, and its objectives, the study's hypothetical framework was designed. This framework illustrates the relationships between the study variables: digital transformation as the independent variable, represented by two paths (digital strategy, digital organizational culture, and digital leadership), and accounting information security as the dependent variable. Figure (1) illustrates the study's hypothetical framework”.</p>
    <fig id="fig1">
      <graphic mimetype="image" mime-subtype="png" xlink:href="image1.png"/>
    </fig>
    <p>Figure ( ) The hypothetical model of the study</p>
    <p>Prepared by the researcher based on the literature</p>
    <p>The researcher employed the descriptive analytical method to complete the theoretical and field frameworks of the study. This method aims for precision in identifying the problem, followed by analysis to uncover the influencing relationships among its variables, facilitating interpretation and conclusions that aid in diagnosing the reality, while aligning with the scientific method and the study's objectives.</p>
    <list list-type="order"/>
    <p> One of the most important things that makes sure the results are accurate and true and that the study hypotheses are tested is choosing the right study location and population. Consequently, a selection of commercial banks examined in Baghdad Governorate will be made (Gulf Commercial Bank, National Islamic Bank, Middle East Iraqi Investment Bank, Regional Commercial Bank, Al Rajhi Islamic Bank). Nonetheless, not all employees are directly associated with the study variables and objectives. Consequently, the researcher may choose a target subgroup, which Saunders et al. (2016, p. 275) refer to as a subgroup of the population known as the target population. The researcher delineated the target group as accountants employed solely by the aforementioned banks, as they represent the most appropriate subjects for the study variables, totaling 275 accountants [4].</p>
    <p>In order to determine the appropriate sample size, the following equation was used, which was mentioned by (Steven K. Thompson, 2012) for determining the sample size [5],</p>
    <fig id="fig2">
      <graphic mimetype="image" mime-subtype="png" xlink:href="image2.png"/>
    </fig>
    <p>This suggested that a minimum of sixteen hundred and sixty-one accountants would be an ideal sample size. Hence, a random sample was given 170 questionnaires. After 166 questionnaires were returned, it was determined that a total of 164 questionnaires were valid for statistical analysis. This is more than the required number to accurately represent the community.</p>
    <p>     The demographic data for the study sample included four (4) elements as control variables to measure their degree of influence on the dependent variable, in addition to the influence of the independent variable. The dependent variables are: gender, educational qualification, age, and years of work experience, as shown in the table below.</p>
    <p>Table (1) Analysis of the Demographic Data for the Study Sample*</p>
    <table-wrap id="tbl1">
      <table>
        <tr>
          <td>Description</td>
          <td>Category</td>
          <td>repetition</td>
          <td>%</td>
        </tr>
        <tr>
          <td rowspan="14">Gender</td>
          <td>Males</td>
          <td>
            <bold>112</bold>
          </td>
          <td>
            <bold>68.3%</bold>
          </td>
        </tr>
        <tr>
          <td/>
          <td>Females</td>
          <td>
            <bold>52</bold>
          </td>
          <td>
            <bold>31.7%</bold>
          </td>
        </tr>
        <tr>
          <td rowspan="12">Age Group</td>
          <td>25-35</td>
          <td>
            <bold>25</bold>
          </td>
          <td>
            <bold>15.2%</bold>
          </td>
        </tr>
        <tr>
          <td/>
          <td>36-45</td>
          <td>
            <bold>48</bold>
          </td>
          <td>
            <bold>29.3%</bold>
          </td>
        </tr>
        <tr>
          <td/>
          <td>46-55</td>
          <td>
            <bold>63</bold>
          </td>
          <td>
            <bold>38.4%</bold>
          </td>
        </tr>
        <tr>
          <td/>
          <td>56 and above</td>
          <td>
            <bold>28</bold>
          </td>
          <td>
            <bold>17.1%</bold>
          </td>
        </tr>
        <tr>
          <td rowspan="8">Certification</td>
          <td>Diploma</td>
          <td>
            <bold>18</bold>
          </td>
          <td>
            <bold>11.0%</bold>
          </td>
        </tr>
        <tr>
          <td/>
          <td>Bachelor's</td>
          <td>
            <bold>87</bold>
          </td>
          <td>
            <bold>53.0%</bold>
          </td>
        </tr>
        <tr>
          <td/>
          <td>Master's</td>
          <td>
            <bold>32</bold>
          </td>
          <td>
            <bold>19.5%</bold>
          </td>
        </tr>
        <tr>
          <td/>
          <td>PhD</td>
          <td>
            <bold>27</bold>
          </td>
          <td>
            <bold>16.5%</bold>
          </td>
        </tr>
        <tr>
          <td rowspan="4">Years of Experience</td>
          <td>Less than 5 years</td>
          <td>
            <bold>31</bold>
          </td>
          <td>
            <bold>18.9%</bold>
          </td>
        </tr>
        <tr>
          <td/>
          <td>5-10 years</td>
          <td>
            <bold>58</bold>
          </td>
          <td>
            <bold>35.4%</bold>
          </td>
        </tr>
        <tr>
          <td/>
          <td>11-15 years</td>
          <td>
            <bold>43</bold>
          </td>
          <td>
            <bold>26.2%</bold>
          </td>
        </tr>
        <tr>
          <td/>
          <td>16 years and above</td>
          <td>
            <bold>32</bold>
          </td>
          <td>
            <bold>19.5%</bold>
          </td>
        </tr>
        <tr>
          <td colspan="2">the total</td>
          <td>
            <bold>164</bold>
          </td>
          <td>
            <bold>100.0%</bold>
          </td>
        </tr>
      </table>
    </table-wrap>
    <p>“Source: Prepared by the researcher based on data from the field study” (2026).</p>
    <p>The table above shows the following:</p>
    <list list-type="order"/>
    <p> A measurement instrument's validity is its capacity to accurately measure what it was meant to measure. The notion of proper measurement says that perfect validity means that the instrument has no measurement mistakes at all, whether they are random or systematic. The study used the following standards to make sure that the measurement tool was valid: </p>
    <p>Second, Instrument Reliability: The validity of an instrument shows how well it can measure what it is supposed to measure, including how well it covers all the relevant parts and how clear its items are. To guarantee this, the researcher executed a pilot study with 40 questionnaires, employing Cronbach's alpha to assess the internal consistency of the data. Cronbach's alpha can be anywhere from 0 to 1, and the closer the value is to 1, the more consistent the results are. Some sources, like Hair et al. (2010), say that a value higher than 0.70 is better, but Bowling (2009) and Nonnally (1967) say that values of 0.50 and higher are appropriate during the early stages of fundamental research [6]. </p>
    <p>The pilot sample's Cronbach's alpha test findings are shown in Table (2).</p>
    <table-wrap id="tbl2">
      <table>
        <tr>
          <td>
            <bold>Independent and dependent variables</bold>
          </td>
          <td>Components of the variables</td>
          <td>
            <bold>Number of paragraphs</bold>
          </td>
          <td>
            <bold>Cronbach's alpha coefficient value</bold>
          </td>
          <td>
            <bold>Validity coefficient value</bold>
          </td>
        </tr>
        <tr>
          <td rowspan="3">digital transformation</td>
          <td>Digital strategy</td>
          <td>5</td>
          <td>87.7%</td>
          <td>93.6%</td>
        </tr>
        <tr>
          <td/>
          <td>Digital organizational culture</td>
          <td>5</td>
          <td>90.4%</td>
          <td>95.1%</td>
        </tr>
        <tr>
          <td/>
          <td>Digital leadership</td>
          <td>5</td>
          <td>89.2%</td>
          <td>94.4%</td>
        </tr>
        <tr>
          <td colspan="2">Accounting Information Security</td>
          <td>10</td>
          <td>87.9%</td>
          <td>93.8%</td>
        </tr>
        <tr>
          <td colspan="2">Questionnaire</td>
          <td>25</td>
          <td>88.8%</td>
          <td>94.2%</td>
        </tr>
      </table>
    </table-wrap>
    <p>“The researcher used SPSS software to make the source.”</p>
    <p>“The table above shows that they all fell within acceptable limits”.</p>
    <list list-type="order"/>
    <p>
      <bold>The study limitations are as follows:</bold>
    </p>
    <list list-type="bullet">
      <list-item>
        <p>Knowledge Limitations: The study's knowledge limits are defined by the main variables, namely (digital transformation and accounting information security) and their sub-dimensions.</p>
      </list-item>
      <list-item>
        <p>Time Limitations: The study's time limit is the year 2026.</p>
      </list-item>
      <list-item>
        <p>Spatial Limitations: The spatial limitation is defined by the research field chosen to test the study's hypotheses and answer its questions. This field is defined as (private banks in Baghdad Governorate), namely (Gulf Commercial Bank, National Islamic Bank, Middle East Iraqi Investment Bank, Regional Commercial Bank, and Al Rajhi Islamic Bank).</p>
      </list-item>
      <list-item>
        <p>Human Limitations: The study's human limitation is defined by the accountants of the commercial banks studied in Baghdad.</p>
      </list-item>
    </list>
    <p>A paradigm shift is also essential for the successful implementation of digital technologies across all aspects of organizational operations. To achieve this, one needs to cultivate a digital culture that emphasizes agility, innovation, and collaboration. A culture deeply rooted in digital practices can help companies adapt quickly to changing market conditions, adopt emerging technologies, and foster a lifelong learning and development mindset.</p>
    <p>Ismail (2022) defined digital transformation as "the process by which companies move to business models based on digital technologies to support the development and innovation of their products and services, and to provide new marketing channels and job opportunities that increase the value of their products, whether goods or services [1]." Khamis (2021: 18) defined it as the change associated with the application of digital technology to bring about a radical change in the way they work and to serve beneficiaries faster and better [2]. IDC defined digital transformation as "the continuous process by which organizations adapt to the requirements of their customers and markets (the external ecosystem) by employing digital capabilities to create new business models, products, and services that seamlessly blend digital and manual work and customer experiences while simultaneously improving operational efficiency and organizational performance" [3]. Therefore, digital transformation does not simply mean shifting towards the use of technology within the company's boundaries, but is a comprehensive program that encompasses the entire company, fundamentally in terms of internal and external work methods and in terms of providing services to the target audience to deliver services easily and quickly. Consequently, digital transformation drives companies to change their models. Its operations and adaptation to the new market reality [1].</p>
    <list list-type="order">
      <list-item>
        <p>
          <bold> Theoretical Framework</bold>
        </p>
      </list-item>
    </list>
    <p>Digital transformation ensures several objectives that companies strive to achieve by generating value through digital ideas and innovations, and by presenting business models in a new way using the fastest and most innovative technologies. This leads to significant speed and growth for the company [7]. Ebert &amp; Duarte (2018:16) identified a set of objectives, which are as follows [8]:</p>
    <list list-type="bullet">
      <list-item>
        <p>Promoting and developing a more creative and collaborative culture within the company and society.</p>
      </list-item>
      <list-item>
        <p>Transforming the education system to provide new skills and future-oriented guidance for employees so they can achieve excellence in digital work and society.</p>
      </list-item>
      <list-item>
        <p>Establishing and maintaining digital communication infrastructure and ensuring its management, accessibility, service quality, and affordability.</p>
      </list-item>
      <list-item>
        <p>Enhancing digital data protection, transparency, independence, and trust.</p>
      </list-item>
      <list-item>
        <p>Improving accessibility and the quality of digital services provided.</p>
      </list-item>
      <list-item>
        <p>Implementing new and innovative business models to achieve the goal.</p>
      </list-item>
      <list-item>
        <p>Working to implement innovative practices and improve the regulatory framework and technical standards.</p>
      </list-item>
    </list>
    <p>Digital transformation has many parts, such as: </p>
    <p>
      <bold>3-2-1-  The Idea of a Digital Strategy </bold>
    </p>
    <p>Digital strategy is the main thing that people in an organization use to bring their ambitions and efforts together. It serves as a focus point, curtailing the dispersion of efforts and steering them directly towards the attainment of specified digital objectives [9]. </p>
    <p>In terms of operations, it is the set of administrative decisions and processes that the organization uses to reach its quality goals. This strategy is responsible for shaping the organization's future and formulating its operational standards, in accordance with the nature of its activity and the competitive tactics it employs in the face of its market counterparts [10]. </p>
    <p>
      <bold>3-2-2- The Idea of Digital Organizational Culture </bold>
    </p>
    <p>Digital organizational culture is the set of values and beliefs that everyone in the organization shares. It operates as a dynamic system that interacts adaptively with human resources, organizational structures, and the internal control systems of the organization [11]. In a similar vein, it is an enduring and universally applicable institutional phenomena, manifested through ongoing social interactions. It is a social model based on common core beliefs that members of the organization come up with to figure out how to deal with problems and adapt to the outside world and integrate with the inside world in the digital age [12].</p>
    <p>
      <bold>3-2-3-  The Idea of Digital Leadership </bold>
    </p>
    <p>Digital leadership is a new idea in management that has come out recently. It is mostly about finding a balance between the need for stability in an organization and the fact that digital transformation is going to happen. Digital leaders are the ones that boost morale and instill values in their employees, which makes them think about how to come up with new ways to solve operational challenges [11]. This kind of leadership needs a lot of flexibility to deal with the changing digital world, which means that the organization has to make sure that its internal circumstances are in line with these outside forces [13]. </p>
    <p>Researchers assert that the efficacy of digital leadership is contingent upon its capacity to elevate employee performance standards, as delineated by Bass (1995) [14]. This entails enhancing individuals' personal values and self-concept to align with elevated levels of professional ambition (Cheung, 2011: 659). These leadership techniques have a direct effect on all of the organization's administrative tasks and general activities (Al-Sudani, 2014: 38). Even if there are many different views on what digital leadership is and how to define its goals, it is still the most important thing for creating digital trends in modern businesses.</p>
    <p>Information security is the process of safeguarding information from risks that threaten or attack it by implementing a set of procedures and preventive measures that are employed in the technical or preventive field to preserve information, devices, and software, as well as procedures that are related to the preservation of workers in this field [15]. It is a collection of preventive measures that are employed in the administrative and technical sectors to safeguard data resources, including devices, software, and data, from violations or illegal interventions that may occur by chance, intentional sequence, or incorrect procedures used by information resource management. Additionally, it includes procedures to address the risks associated with potential natural disasters that may result in the loss of some resources in whole or in part, thereby affecting the quality and level of service provided [16]. Information security is also the field of science that investigates the theories, strategies, and laws that safeguard information from potential hazards. It entails the implementation of the requisite methods, procedures, and means to ensure this protection, confront and surmount risks, and enact strict laws to prevent future occurrences and punish perpetrators. The application of information security from all scientific, practical, and legal perspectives has a substantial effect on the enhancement of confidence in accounting information systems [17].</p>
    <p>It is also defined as the examination of policies and strategies that must be comprehended in order to safeguard information from a variety of threats and attacks [18].</p>
    <list list-type="order"/>
    <p>To protect information from exposure risks, a series of elements must be provided to ensure adequate protection. These elements are divided into [19]:</p>
    <list list-type="bullet">
      <list-item>
        <p><bold>Reliability or Confidentiality: </bold>This means that unauthorized individuals cannot view or disclose the information.</p>
      </list-item>
    </list>
    <p>To achieve this, organizations must employ appropriate security measures in various ways, such as message encryption or preventing the identification of the size or path of the information transmitted.</p>
    <list list-type="bullet">
      <list-item>
        <p><bold>Personal Identity Verification</bold>: This means confirming the identity of the person attempting to use the information and determining if they are the correct user. This is illustrated by the use of a password for each user. There are three methods of identity verification [20]:</p>
      </list-item>
    </list>
    <list list-type="order">
      <list-item>
        <p>Things the person knows, such as passwords.</p>
      </list-item>
      <list-item>
        <p>Things they possess (e.g., a token), which is a code the user enters into the computer to obtain authorization or an electronic certificate.</p>
      </list-item>
      <list-item>
        <p>By the person's physical characteristics, such as fingerprints, network scans, or voice recognition. Each method has its advantages and disadvantages.</p>
      </list-item>
    </list>
    <list list-type="bullet">
      <list-item>
        <p><bold>Content Integrity:</bold> This refers to ensuring the accuracy of the information content and that it will not be altered, corrupted, or tampered with at any stage of processing or exchange, whether the transaction is conducted internally or externally by an unauthorized person. Such incidents are usually the result of illegal intrusions, such as viruses. For example, no one can corrupt a bank's database and change the account balance. Therefore, the organization is responsible for ensuring content security by taking appropriate preventative measures, such as software, antivirus, anti-hacking, or antivirus hardware.</p>
      </list-item>
      <list-item>
        <p><bold>Service or information availability: </bold>This refers to ensuring the continuity of the information system's functions and all its components, as well as the continuous ability to interact with information and provide services to information sites, and ensuring that information users are not exposed to the information they are at. It also involves preventing its illegal use or unauthorized access. Alternatively, it can refer to a method by individuals to disrupt an organization's services through a large number of unsolicited emails on the network [21].</p>
      </list-item>
      <list-item>
        <p><bold>Non-repudiation:</bold> This means ensuring that a person performing a specific action related to information cannot deny this action. Therefore, there must be a way or means to prove any action taken by anyone against the person performing the action. For example, at a specific time, to ensure that goods purchased online reach their owner and to prove that the transfer was an electronic payment, various methods such as electronic signatures and electronic identity verification can be used.</p>
      </list-item>
    </list>
    <list list-type="order">
      <list-item>
        <p>
          <bold>The Research's Practical Framework</bold>
        </p>
      </list-item>
    </list>
    <p>
      <bold>3-1- Descriptive Statistics of the Study Variables </bold>
    </p>
    <p>We found the standard deviation and mean  for each statement and axis in order to look at the study data. The arithmetic mean being higher than the hypothetical mean of 3 showed that people agreed on the items. The table below illustrates the means, standard deviations, and how important each assertion in the study is. In general, standard deviations that are near to 1 show that the answers of the people in the sample are very similar. Moreover, all mathematical means surpassed the hypothetical mean, so affirming the substantial consensus about all claims of the study variables.</p>
    <p>
      <bold>3-1-1- A description of the digital transformation variable through analysis</bold>
    </p>
    <p>The numbers in the table show that the banks surveyed usually had a good opinion of the different aspects of digital transformation. The entire variable had an average of 3.48, which was greater than the imagined average of 3. It had an agreement rate of 69.6% and a standard deviation of 0.751. This shows that the people in the survey sample believe that digital transformation is important and that there is a real trend toward using new technology to improve banking operations and information security. </p>
    <list list-type="bullet">
      <list-item>
        <p>About the digital strategy: The digital strategy got a lot of responses, with a mean of 3.52 and a 70.4% agreement rate. The second question, which was about how well the transformation approach fit with the bank's goal, came in first with a score of 3.65. This shows that private banks in Baghdad have a clear strategic vision for how to use technology to help the institution reach its goals and make sure that the digital transformation goes smoothly and as planned. </p>
      </list-item>
      <list-item>
        <p>Digital Organizational Culture: The results showed a clear interest in creating a digital culture, with a mean score of 3.51. The highest score in this area was 3.76 for item 8, which was about how well employees fit into operational functions. This shows that banks are working to make the workplace more collaborative and use technology in their everyday tasks. However, they still need to improve the skills and talents they need to stay up with fast changes.</p>
      </list-item>
      <list-item>
        <p>Digital Leadership: The digital leadership dimension had a mean score of 3.41 and a percentage of agreement of 68.2%. The item about how employees can help drive the transformation vision came in first with a mean score of 3.63. This shows how important leadership is in getting people to work hard and think creatively, which helps reduce opposition to digital change and make sure that security and accounting regulations are followed correctly.</p>
      </list-item>
    </list>
    <p>Table No. (3) Means and Standard Deviations for the Digital Transformation Variable</p>
    <table-wrap id="tbl3">
      <table>
        <tr>
          <td/>
          <td>ParagraphsAt our bank, the following is disclosed:</td>
          <td>arithmetic mean</td>
          <td>standard deviation</td>
          <td>Agreement %</td>
          <td> C.V</td>
          <td>NO.</td>
        </tr>
        <tr>
          <td/>
          <td>The bank must establish a clear and written vision and mission for the digital transformation process.</td>
          <td>3.46</td>
          <td>0.777</td>
          <td>69.2%</td>
          <td>22.5%</td>
          <td>4</td>
        </tr>
        <tr>
          <td/>
          <td>There must be consistency between the digital transformation strategy and the bank's vision, mission, and objectives.</td>
          <td>3.65</td>
          <td>0.654</td>
          <td>73.0%</td>
          <td>17.9%</td>
          <td>1</td>
        </tr>
        <tr>
          <td/>
          <td>The bank must develop a strategic direction for a complete transition to digital transformation.</td>
          <td>3.61</td>
          <td>0.678</td>
          <td>72.2%</td>
          <td>18.8%</td>
          <td>2</td>
        </tr>
        <tr>
          <td/>
          <td>The bank's policies must be adapted to implement the desired digital transformation strategic plan.</td>
          <td>3.33</td>
          <td>0.874</td>
          <td>66.6%</td>
          <td>26.2%</td>
          <td>5</td>
        </tr>
        <tr>
          <td/>
          <td>The bank's strategy must be periodically reassessed to ensure alignment with the digital transformation process.</td>
          <td>3.56</td>
          <td>0.711</td>
          <td>71.2%</td>
          <td>20.0%</td>
          <td>3</td>
        </tr>
        <tr>
          <td colspan="2">Digital Strategy</td>
          <td>3.52</td>
          <td>0.739</td>
          <td>70.4%</td>
          <td>21.0%</td>
          <td/>
        </tr>
        <tr>
          <td/>
          <td>The bank is committed to expanding employee participation in the digital transformation process.</td>
          <td>3.66</td>
          <td>0.645</td>
          <td>73.2%</td>
          <td>17.6%</td>
          <td>2</td>
        </tr>
        <tr>
          <td/>
          <td>The bank is committed to expanding employee participation in the digital transformation process.</td>
          <td>3.21</td>
          <td>0.869</td>
          <td>64.2%</td>
          <td>27.1%</td>
          <td>5</td>
        </tr>
        <tr>
          <td/>
          <td>The bank integrates employees in operational roles into the digital transformation process.</td>
          <td>3.76</td>
          <td>0.598</td>
          <td>75.2%</td>
          <td>15.9%</td>
          <td>1</td>
        </tr>
        <tr>
          <td/>
          <td>The bank provides the necessary modern technologies to develop the systems and services offered to beneficiaries.</td>
          <td>3.41</td>
          <td>0.793</td>
          <td>68.2%</td>
          <td>23.3%</td>
          <td>4</td>
        </tr>
        <tr>
          <td/>
          <td>The bank is committed to improving the level of services provided.</td>
          <td>3.53</td>
          <td>0.724</td>
          <td>70.6%</td>
          <td>20.5%</td>
          <td>3</td>
        </tr>
        <tr>
          <td colspan="2">Digital Organizational Culture</td>
          <td>3.51</td>
          <td>0.726</td>
          <td>70.3%</td>
          <td>20.7%</td>
          <td/>
        </tr>
        <tr>
          <td/>
          <td>The bank engages employees in driving the digital transformation vision.</td>
          <td>3.63</td>
          <td>0.604</td>
          <td>72.6%</td>
          <td>16.6%</td>
          <td>1</td>
        </tr>
        <tr>
          <td/>
          <td>The management motivates employees to achieve the vision and objectives of the digital transformation process.</td>
          <td>3.11</td>
          <td>0.908</td>
          <td>62.2%</td>
          <td>29.2%</td>
          <td>5</td>
        </tr>
        <tr>
          <td/>
          <td>The bank's senior management encourages intellectual stimulation from employees, fostering openness to new ideas and problem-solving.</td>
          <td>3.52</td>
          <td>0.784</td>
          <td>70.4%</td>
          <td>22.3%</td>
          <td>2</td>
        </tr>
        <tr>
          <td/>
          <td>The bank prioritizes aligning employee capabilities with the digital transformation process.</td>
          <td>3.43</td>
          <td>0.808</td>
          <td>68.6%</td>
          <td>23.6%</td>
          <td>3</td>
        </tr>
        <tr>
          <td/>
          <td>The bank empowers employees to achieve optimal performance.</td>
          <td>3.35</td>
          <td>0.838</td>
          <td>67.0%</td>
          <td>25.0%</td>
          <td>4</td>
        </tr>
        <tr>
          <td colspan="2">Digital Leadership</td>
          <td>3.41</td>
          <td>0.788</td>
          <td>68.2%</td>
          <td>23.1%</td>
          <td/>
        </tr>
        <tr>
          <td> </td>
          <td>Total Digital Transformation</td>
          <td>3.48</td>
          <td>0.751</td>
          <td>69.6%</td>
          <td>21.6%</td>
          <td> </td>
        </tr>
      </table>
    </table-wrap>
    <p>“The researcher used SPSS software to make the source.”</p>
    <p>
      <bold>3-1-2- A descriptive analysis of the variable for accounting information security </bold>
    </p>
    <p>The statistical results for the accounting information security variable demonstrate a substantial positive reaction from the sample. The overall mean is 3.53, which is much higher than the hypothetical mean, and the overall agreement rate is 70.5%. This shows that accountants at private banks in Baghdad are very aware of the rules for digital security. Item 10, which was about improving staff productivity through training courses, came in first with a mean of 3.83. Item 5, which was about the distribution of specializations, came in second with a mean of 3.74. The question about protecting electronic signatures, item 4, got the fewest responses, with a mean of 3.19. The low coefficient of variance of 21.0% shows that the surveyed banks had quite different views on this issue. This shows that they see human resources and administrative control as the first line of defense for protecting accounting data. But in the future, we need to work on making electronic signature protection and encryption technologies better to make the digital security system comprehensive.</p>
    <p>Table No. (4) Means and Standard Deviations for the Accounting Information Security Variable</p>
    <table-wrap id="tbl4">
      <table>
        <tr>
          <td/>
          <td>Paragraphs</td>
          <td>arithmetic mean</td>
          <td>standard deviation</td>
          <td>Agreement %</td>
          <td>C.V</td>
          <td>NO.</td>
        </tr>
        <tr>
          <td/>
          <td>The bank has an integrated information security system.</td>
          <td>3.68</td>
          <td>0.658</td>
          <td>73.6%</td>
          <td>17.9%</td>
          <td>3</td>
        </tr>
        <tr>
          <td/>
          <td>The bank has an encryption and coding system for data and information.</td>
          <td>3.48</td>
          <td>0.803</td>
          <td>69.6%</td>
          <td>23.1%</td>
          <td>7</td>
        </tr>
        <tr>
          <td/>
          <td>An internal control system is necessary to protect the transfer of electronic documents.</td>
          <td>3.59</td>
          <td>0.723</td>
          <td>71.8%</td>
          <td>20.1%</td>
          <td>5</td>
        </tr>
        <tr>
          <td/>
          <td>Oversight is necessary to protect electronic signatures within the bank.</td>
          <td>3.19</td>
          <td>0.904</td>
          <td>63.8%</td>
          <td>28.3%</td>
          <td>10</td>
        </tr>
        <tr>
          <td/>
          <td>Supervision and responsibilities are distributed among the staff at the computer center.</td>
          <td>3.74</td>
          <td>0.621</td>
          <td>74.8%</td>
          <td>16.6%</td>
          <td>2</td>
        </tr>
        <tr>
          <td/>
          <td>Bank employees are involved in password management.</td>
          <td>3.21</td>
          <td>0.865</td>
          <td>64.2%</td>
          <td>26.9%</td>
          <td>9</td>
        </tr>
        <tr>
          <td/>
          <td>There is a malfunction in the computers used when implementing the system.</td>
          <td>3.51</td>
          <td>0.768</td>
          <td>70.2%</td>
          <td>21.9%</td>
          <td>6</td>
        </tr>
        <tr>
          <td/>
          <td>The staff responsible for implementing the system lack the necessary academic qualifications and practical experience to apply the electronic system.</td>
          <td>3.63</td>
          <td>0.701</td>
          <td>72.6%</td>
          <td>19.3%</td>
          <td>4</td>
        </tr>
        <tr>
          <td/>
          <td>The electronic programs are not subject to continuous updates and development.</td>
          <td>3.39</td>
          <td>0.824</td>
          <td>67.8%</td>
          <td>24.3%</td>
          <td>8</td>
        </tr>
        <tr>
          <td/>
          <td>Increase employee efficiency by enrolling them in training courses on using the electronic accounting information system.</td>
          <td>3.83</td>
          <td>0.528</td>
          <td>76.6%</td>
          <td>13.8%</td>
          <td>1</td>
        </tr>
        <tr>
          <td colspan="2">Total accounting information security</td>
          <td>3.53</td>
          <td>0.740</td>
          <td>70.5%</td>
          <td>21.0%</td>
          <td/>
        </tr>
      </table>
    </table-wrap>
    <p>“The researcher used SPSS software to make the source.”</p>
    <p>
      <bold>3-2- </bold>
      <bold> Confirmatory Factor Analysis</bold>
    </p>
    <p>     Confirmatory factor analysis (CFA), a type of structural equation modeling (SEM), was used to check that the factor constructions for the research variables were correct. This approach facilitates the evaluation of the validity of certain measurement models derived from previous theoretical frameworks, in contrast to exploratory factor analysis. The study utilized the maximum likelihood method to estimate parameters with AMOS V26 software. The analysis checks how well the covariance matrix of the variables fits with the model's assumed matrix. It then gives several fit quality indices to see if the proposed model is a good fit for the data.</p>
    <p>The primary criterion for evaluating a model in confirmatory factor analysis is the degree to which the actual covariance matrix of the variables aligns with the expected matrix of the model. This study generates various statistical indicators that demonstrate the quality of this fit. The values of these indicators determine whether the proposed model is approved or rejected. The table below demonstrates how well the structural research model fits by showing the indications.</p>
    <p>Table No. (5) Conformity Quality Indicators for Digital Transformation</p>
    <table-wrap id="tbl5">
      <table>
        <tr>
          <td>Goodness-of-fit Measures</td>
          <td>Acceptable Level</td>
        </tr>
        <tr>
          <td>Chi-squire</td>
          <td>Not statistically significant at 0.05</td>
        </tr>
        <tr>
          <td>P Close</td>
          <td>&gt;0.05</td>
        </tr>
        <tr>
          <td>Adjusted goodness of fit index (AGFI) </td>
          <td> 90</td>
        </tr>
        <tr>
          <td>Tucker-Lewis Index (TLI)</td>
          <td>90</td>
        </tr>
        <tr>
          <td>Goodness of fit index (GFI)</td>
          <td> 90</td>
        </tr>
        <tr>
          <td>Root-mean-squire error of approximation (RMSEA)</td>
          <td>&lt; 0.08</td>
        </tr>
        <tr>
          <td>Normal fit index (NFI)</td>
          <td> 90</td>
        </tr>
        <tr>
          <td>/df</td>
          <td>1 &lt;/df &lt; 5</td>
        </tr>
        <tr>
          <td>Comparative fit index (CFI)</td>
          <td> 90</td>
        </tr>
      </table>
    </table-wrap>
    <p>“The researcher used SPSS software to create the source.” Based on (Hair et al. 2010) [6]</p>
    <p>Table (6) Results of the standardized regression weights for the research variable</p>
    <table-wrap id="tbl6">
      <table>
        <tr>
          <td>
            <bold>Paragraphs</bold>
          </td>
          <td>
            <bold>Paths</bold>
          </td>
          <td>
            <bold>Dimensions</bold>
          </td>
          <td>Estimate</td>
          <td>S.E.</td>
          <td>C.R.</td>
          <td>P</td>
        </tr>
        <tr>
          <td>X11</td>
          <td>&lt;---</td>
          <td rowspan="25">Digital strategy</td>
          <td>.602</td>
          <td>.065</td>
          <td>8.611</td>
          <td>***</td>
        </tr>
        <tr>
          <td>X12</td>
          <td>&lt;---</td>
          <td/>
          <td>.678</td>
          <td>.076</td>
          <td>9.787</td>
          <td>***</td>
        </tr>
        <tr>
          <td>X13</td>
          <td>&lt;---</td>
          <td/>
          <td>.786</td>
          <td>.080</td>
          <td>11.490</td>
          <td>***</td>
        </tr>
        <tr>
          <td>X14</td>
          <td>&lt;---</td>
          <td/>
          <td>.766</td>
          <td/>
          <td/>
          <td/>
        </tr>
        <tr>
          <td>X15</td>
          <td>&lt;---</td>
          <td/>
          <td>.768</td>
          <td>.081</td>
          <td>11.204</td>
          <td>***</td>
        </tr>
        <tr>
          <td>X21</td>
          <td>&lt;---</td>
          <td rowspan="20">Digital organizational culture</td>
          <td>.694</td>
          <td>.113</td>
          <td>7.541</td>
          <td>***</td>
        </tr>
        <tr>
          <td>X22</td>
          <td>&lt;---</td>
          <td/>
          <td>.840</td>
          <td>.127</td>
          <td>8.373</td>
          <td>***</td>
        </tr>
        <tr>
          <td>X23</td>
          <td>&lt;---</td>
          <td/>
          <td>.829</td>
          <td>.134</td>
          <td>8.322</td>
          <td>***</td>
        </tr>
        <tr>
          <td>X24</td>
          <td>&lt;---</td>
          <td/>
          <td>.554</td>
          <td/>
          <td/>
          <td/>
        </tr>
        <tr>
          <td>X25</td>
          <td>&lt;---</td>
          <td/>
          <td>.448</td>
          <td>.109</td>
          <td>5.532</td>
          <td>***</td>
        </tr>
        <tr>
          <td>X31</td>
          <td>&lt;---</td>
          <td rowspan="15">Digital leadership</td>
          <td>.720</td>
          <td>.080</td>
          <td>12.147</td>
          <td>***</td>
        </tr>
        <tr>
          <td>X32</td>
          <td>&lt;---</td>
          <td/>
          <td>.883</td>
          <td>.062</td>
          <td>16.685</td>
          <td>***</td>
        </tr>
        <tr>
          <td>X33</td>
          <td>&lt;---</td>
          <td/>
          <td>.804</td>
          <td>.068</td>
          <td>14.316</td>
          <td>***</td>
        </tr>
        <tr>
          <td>X34</td>
          <td>&lt;---</td>
          <td/>
          <td>.851</td>
          <td>.063</td>
          <td>15.683</td>
          <td>***</td>
        </tr>
        <tr>
          <td>X35</td>
          <td>&lt;---</td>
          <td/>
          <td>.846</td>
          <td/>
          <td/>
          <td/>
        </tr>
        <tr>
          <td>Y1</td>
          <td>&lt;---</td>
          <td rowspan="10">Accounting information security</td>
          <td>.587</td>
          <td/>
          <td/>
          <td/>
        </tr>
        <tr>
          <td>Y2</td>
          <td>&lt;---</td>
          <td/>
          <td>.770</td>
          <td>.141</td>
          <td>8.812</td>
          <td>***</td>
        </tr>
        <tr>
          <td>Y3</td>
          <td>&lt;---</td>
          <td/>
          <td>.745</td>
          <td>.141</td>
          <td>8.622</td>
          <td>***</td>
        </tr>
        <tr>
          <td>Y4</td>
          <td>&lt;---</td>
          <td/>
          <td>.847</td>
          <td>.145</td>
          <td>9.355</td>
          <td>***</td>
        </tr>
        <tr>
          <td>Y5</td>
          <td>&lt;---</td>
          <td/>
          <td>.730</td>
          <td>.133</td>
          <td>8.506</td>
          <td>***</td>
        </tr>
        <tr>
          <td>Y6</td>
          <td>&lt;---</td>
          <td/>
          <td>.642</td>
          <td>.110</td>
          <td>7.781</td>
          <td>***</td>
        </tr>
        <tr>
          <td>Y7</td>
          <td>&lt;---</td>
          <td/>
          <td>.739</td>
          <td>.130</td>
          <td>8.576</td>
          <td>***</td>
        </tr>
        <tr>
          <td>Y8</td>
          <td>&lt;---</td>
          <td/>
          <td>.726</td>
          <td>.148</td>
          <td>8.480</td>
          <td>***</td>
        </tr>
        <tr>
          <td>Y9</td>
          <td>&lt;---</td>
          <td/>
          <td>.702</td>
          <td>.145</td>
          <td>8.283</td>
          <td>***</td>
        </tr>
        <tr>
          <td>Y10</td>
          <td>&lt;---</td>
          <td/>
          <td>.801</td>
          <td>.135</td>
          <td>9.038</td>
          <td>***</td>
        </tr>
      </table>
    </table-wrap>
    <p>“Source: The researcher made this based on the results of the statistical package (AMOS.V.26).”</p>
    <p>The table and figure below show that the model fit indices taken from the AMOS software show a good fit between the proposed model and the actual data. The weighted chi-squared value (CMIN/DF) was 3.490, which is acceptable (less than 5). The comparative and structured fit indices (CFI, TLI, and IFI) likewise had values between 0.963 and 0.969, which is higher than the desired value of 0.90. The RMSEA value of 0.072 was also less than 0.08, which further confirmed that the model fit the data well.</p>
    <p>
      <bold>3-3- Impact Hypotheses</bold>
    </p>
    <p>To analyze the impact relationships between the variables in this study, Structural Equation Modeling (SEM) was used. AMOS V26 software (Afthanorhan et al., 2014) was used to calculate the direct effects between the study variables, namely digital transformation in digital repositories and accounting information security.</p>
    <p><bold>First: Hypothesis (H1): The main hypothesis states: "There is a statistically significant impact of digital transformation on enhancing accounting information security."</bold> In order to substantiate this hypothesis, a structural framework was developed to illustrate the structure of the relationship between digital transformation and accounting information security. The findings of the inference statistics concerning the relationship between digital transformation and enhancing accounting information security show that the standard regression weights recorded values ​​of (S.R.W = 0.632). The value of (R²) indicates that digital transformation explains (46%) of the changes that occur in accounting information security, while the remaining percentage of (54%) is attributed to elements outside the study model. The value of (t) obtained for (S.R.W) for the digital transformation variable was (8.432). This value exceeds the recorded value of t of 1.96, indicating the stability of the S.R.W. value. The S.R.W. value shows that a one-unit increase in digital transformation leads to a 63.2% increase in accounting information security. Therefore, the hypothesis can be accepted: there is a statistically significant effect between digital transformation and enhanced accounting information security.</p>
    <p>Table (7) Regression Model between Digital Transformation and Accounting Information Security</p>
    <table-wrap id="tbl7">
      <table>
        <tr>
          <td rowspan="4">
            <bold>Accounting Information Security</bold>
          </td>
          <td>Independent variable</td>
          <td>Standardized regression weights<bold>S.R.W</bold></td>
          <td>
            <bold>(t)</bold>
          </td>
          <td>
            <bold>R Square</bold>
          </td>
          <td>
            <bold>Sig</bold>
          </td>
        </tr>
        <tr>
          <td/>
          <td>Digital transformation</td>
          <td>
            <bold>0.632</bold>
          </td>
          <td>
            <bold>8.432</bold>
          </td>
          <td>
            <bold>0.46</bold>
          </td>
          <td>
            <bold>0.000</bold>
          </td>
        </tr>
        <tr>
          <td/>
          <td>(t) Tabular decision</td>
          <td colspan="4">
            <bold>1.96</bold>
          </td>
        </tr>
        <tr>
          <td/>
          <td>Independent variable</td>
          <td colspan="4">
            <bold>Accepting the hypothesis</bold>
          </td>
        </tr>
      </table>
    </table-wrap>
    <p>“Source: The researcher made this based on the results of the statistical package (SPSS).”</p>
    <fig id="fig3">
      <graphic mimetype="image" mime-subtype="png" xlink:href="image3.png"/>
    </fig>
    <p>Figure (2) Impact Analysis of Digital Transformation in Accounting Information Security</p>
    <p>“Source: Prepared by the researcher based on the outputs of the statistical package AMOS.V.26”.</p>
    <p>
      <bold>The following sub-hypotheses stem from the main hypothesis:</bold>
    </p>
    <p>The following a multiple regression approach was employed to substantiate these hypotheses: </p>
    <p>The table below shows The findings of the inference statistics concerning the digital strategy in enhancing accounting information security. The standard regression weights recorded values ​​of (S.R.W = 0.345). The model explains (26%) of the value of the variables occurring in the respondent variable, while the remaining percentage, amounting to (74%), is attributed to elements outside the study model. The t-value obtained for (S.R.W) for the digital strategy variable was (7.123). This value exceeds the recorded value of t of 1.96 indicates the stability of the S.R.W. value. This value shows that increasing the digital strategy by one unit leads to a 34.5% increase in accounting information security. Therefore, the hypothesis (that there is a statistically significant effect of digital strategy on enhancing accounting information security) can be accepted. It is clear that putting a strong emphasis on digital strategy, by using advanced technology policies that make sure data flows correctly and accounting systems are updated regularly, as well as providing strong control frameworks that limit access and usage permissions, directly helps to improve the security of accounting information and protect it from technical risks.</p>
    <p>The table below shows The findings of the inference statistics concerning the relationship between digital organizational culture and enhancing accounting information security. The standard regression weights recorded values ​​of (S.R.W = 0.256). The model explains 18% of the values ​​of the variables occurring in the respondent variable, while the remaining 82% are attributed to elements outside the study model. The t-value obtained for the S.R.W. for the digital organizational culture variable was 7.456, This value exceeds the recorded value of t of 1.96. This indicates the stability of the S.R.W.'s significance. The S.R.W. value shows that increasing digital organizational culture by one unit leads to a 25.6% increase in accounting information security. Therefore, the hypothesis can be accepted: there is a statistically significant effect between digital organizational culture and enhancing accounting information security. The above shows that this is a big part of it. The studied banks need to pay more attention to digital organizational culture by getting employees involved in digital operational functions and teaching them how to handle data safely. They also need to create a technological work environment that makes it easy to access and clearly audit accounting information. Directly improves the security of accounting data by lowering the chance of human error and making internal control mechanisms work better.</p>
    <list list-type="bullet">
      <list-item>
        <p> <bold>First Sub-Hypothesis (H1-1): The first sub-hypothesis states: ("There is a statistically significant effect" of the digital strategy in enhancing accounting information security.)</bold></p>
      </list-item>
      <list-item>
        <p>
          <bold>The second sub-hypothesis (H1-2) states: ("There is a statistically significant effect of digital organizational culture on enhancing accounting information security.")</bold>
        </p>
      </list-item>
      <list-item>
        <p>
          <bold>Third Sub-Hypothesis (H1-3): It states: "There is a statistically significant effect of digital leadership in enhancing the security of accounting information."</bold>
        </p>
      </list-item>
    </list>
    <p>The table below shows The findings of the inference statistics concerning digital leadership's impact on enhancing the security of accounting information. The standard regression weights recorded values ​​of (S.R.W = 0.176). The model explains (13%) of the values ​​of the variables occurring in the respondent variable, while the remaining percentage, amounting to (87%), is attributed to elements outside the study model. The t-value obtained for (S.R.W) for the digital leadership variable was (7.654), This value exceeds the recorded value of t of 1.96. This indicates the consistent significance of (S.R.W). It is clear from the value of (S.R.W) that increasing digital leadership by one unit will lead to an increase in the security of accounting information. With a percentage of (17.6%), the above supports the hypothesis that (there is a statistically significant effect between digital leadership and enhancing accounting information security). The above shows that digital leadership is very important in the banks studied. This is because senior management has a clear technological vision that encourages employees to be creative and learn new things, while also giving them the support they need to improve digital control systems and keep access privileges private. The leaders' dedication to properly assigning technical duties and directly overseeing data protection systems helps improve the security of accounting information and make the banking environment strong enough to handle cyber threats with ease and speed.</p>
    <p>Table (8 ) Analysis of the Impact of Digital Transformation Dimensions on Accounting Information Security</p>
    <table-wrap id="tbl8">
      <table>
        <tr>
          <td rowspan="2">
            <bold>Index</bold>
          </td>
          <td colspan="4">
            <bold>dependent variable</bold>
          </td>
        </tr>
        <tr>
          <td/>
          <td>Digital leadership</td>
          <td>Digital organizational culture</td>
          <td>Digital leadership</td>
          <td rowspan="5">
            <bold>Accounting Information Security</bold>
          </td>
        </tr>
        <tr>
          <td>
            <bold>(</bold>
            <bold>S.R.W</bold>
            <bold>)</bold>
          </td>
          <td>
            <bold>0.</bold>
            <bold>345</bold>
          </td>
          <td>
            <bold>0.</bold>
            <bold>256</bold>
          </td>
          <td>
            <bold>0.</bold>
            <bold>176</bold>
          </td>
          <td/>
        </tr>
        <tr>
          <td>
            <bold>(</bold>
            <bold>R</bold>
            <bold>
              <sup>2</sup>
            </bold>
            <bold>)</bold>
          </td>
          <td>
            <bold>0.</bold>
            <bold>26</bold>
          </td>
          <td>
            <bold>0.18</bold>
          </td>
          <td>
            <bold>0.</bold>
            <bold>13</bold>
          </td>
          <td/>
        </tr>
        <tr>
          <td>
            <bold>(t)</bold>
          </td>
          <td>
            <bold>7.</bold>
            <bold>123</bold>
          </td>
          <td>
            <bold>7.</bold>
            <bold>456</bold>
          </td>
          <td>
            <bold>7.</bold>
            <bold>654</bold>
          </td>
          <td/>
        </tr>
        <tr>
          <td>
            <bold>P</bold>
          </td>
          <td>
            <bold>0.000</bold>
          </td>
          <td>
            <bold>0.000</bold>
          </td>
          <td>
            <bold>0.000</bold>
          </td>
          <td/>
        </tr>
        <tr>
          <td>
            <bold>(t) Tabular</bold>
          </td>
          <td colspan="4">1.96</td>
        </tr>
        <tr>
          <td>
            <bold>decision</bold>
          </td>
          <td>Accepting the hypothesis</td>
          <td>Accepting the hypothesis</td>
          <td>
            <bold>Accepting the hypothesis</bold>
          </td>
          <td/>
        </tr>
      </table>
    </table-wrap>
    <p>Source: "SPSS program "</p>
    <list list-type="order">
      <list-item>
        <p>
          <bold>Recommendations and Conclusions</bold>
        </p>
      </list-item>
    </list>
    <p>
      <bold>4-1- </bold>
      <bold>the </bold>
      <bold>conclusions:</bold>
    </p>
    <p>
      <bold>4-2- Recommendations</bold>
    </p>
    <list list-type="order">
      <list-item>
        <p>The investigated private banks have a high level of adoption and implementation of digital transformation, which shows that their management believes that technology is important for improving banking operations. These banks have clear strategic plans that show this tendency. They want to make sure they stay up to date with changes in the global financial sector by incorporating new technologies into their core operations.</p>
      </list-item>
      <list-item>
        <p>The results showed that accounting staff were quite aware of digital security requirements, with a strong focus on the human aspect as the first line of protection. The study finds that banks put a lot of effort into improving their workers' productivity and sharing supervisory duties, even though they need to focus on strictly technical issues like encryption systems and protecting electronic signatures.</p>
      </list-item>
      <list-item>
        <p>The study showed that the digital strategy had a statistically significant positive effect on making accounting information more secure. This is because well-thought-out technical policies help protect financial data. A clear strategic vision and regular system updates provide a strong supervisory environment that limits access rights and lowers the danger of cyber attacks. </p>
      </list-item>
      <list-item>
        <p>The results showed that a digital organizational culture is very important for information security since it lowers the chances of human error caused by a lack of technological knowledge. It concludes that fostering a collaborative workplace that promotes clear and transparent technology use improves the effectiveness of internal control systems and streamlines digital accounting audits.</p>
      </list-item>
      <list-item>
        <p>The study found that digital leadership is the most important factor in the effectiveness of accounting security systems. This is because senior management took an innovative approach and gave the technical support that was needed. It finds that leaders' dedication to actively managing the allocation of technical duties and intellectually stimulating workers generates a resilient banking environment capable of adjusting successfully to emerging security issues.</p>
      </list-item>
    </list>
    <p>
      <bold>Sources and references</bold>
    </p>
    <p>[1] A. F. Bouarar, R. E. Fattah, and R. Ismail, "The Contribution of Intellectual Capital to Achieving Digital Transformation to Improve Social Services for Elderly People with Disabilities," <italic>J. Faculty Social Work Social Stud. Res.</italic>, vol. 27, no. 2, pp. 215-260, 2022.</p>
    <p>[2] A. Khamis and Aser, "The Impact of Digital Transformation on the Job Performance of Employees in Egyptian Commercial Banks," <italic>Sci. J. Financial Commercial Stud. Res.</italic>, vol. 2, no. 2, pp. 997-1044, 2021.</p>
    <p>[3] J. Slaymi, Boushi, and Youssef, "Digital Transformation: Between Necessity and Risks," 2019. [Online]. </p>
    <p>[4] M. Saunders, P. Lewis, and A. Thornhill, <italic>Research Methods for Business Students</italic>, 7th ed. New York, NY, USA: Pearson Education, 2016, p. 275.</p>
    <p>[5] S. K. Thompson, <italic>Sampling</italic>, 3rd ed. Hoboken, NJ, USA: Wiley, 2012, pp. 59-60.</p>
    <p>[6] J. F. Hair Jr., W. C. Black, B. J. Babin, and R. E. Anderson, <italic>Multivariate Data Analysis: A Global Perspective</italic>. London, UK: Pearson, 2010.</p>
    <p>[7] S. Berghaus, <italic>The Fuzzy Front End of Digital Transformation: Activities and Approaches for Initiating Organizational Change Strategies</italic>. St. Gallen: University of St. Gallen, 2018.</p>
    <p>[8] C. Ebert and C. H. C. Duarte, "Digital Transformation," <italic>IEEE Softw.</italic>, vol. 35, no. 4, pp. 16-21, Jul. 2018.</p>
    <p>[9] N. G. A. Al-Anzi, "Arabic language teachers' attitudes towards using modern technologies in teaching Arabic at the primary level in Arar city," <italic>J. Faculty Education (Assiut)</italic>, vol. 37, no. 11, pp. 221-247, 2021.</p>
    <p>[10] E. Magerakis and A. Habib, "Business strategy and environmental inefficiency," <italic>J. Cleaner Production</italic>, vol. 302, p. 127014, 2021.</p>
    <p>[11] M. H. Al-Fatlawi, M. F. Al-Dulaimi, and S. A. Hussein, "Total Quality Management Practices and Their Impact on Sustainable Organizational Performance," <italic>J. Islamic Univ. College</italic>, vol. 1, no. 63, pp. 215-254, 2021.</p>
    <p>[12] K. M. A. Al-Masri, "The Degree of Strategic Planning Practice by Secondary School Accountants in the Gaza Governorates and Its Relationship to the Prevailing Organizational Culture Patterns in Their Schools," Doctoral dissertation, Islamic University of Gaza, Palestine, 2011.</p>
    <p>[13] J. Hunt and M. Fitzgerald, "The relationship between emotional intelligence and transformational leadership: An investigation and review of competing claims in the literature," <italic>Amer. Int. J. Social Sci.</italic>, vol. 2, no. 8, pp. 30-38, 2013.</p>
    <p>[14] B. M. Bass, "Comment: Transformational leadership: Looking at other possible antecedents and consequences," <italic>J. Manage. Inquiry</italic>, vol. 4, no. 3, pp. 293-297, 1995.</p>
    <p>[15] H. Al-Sharif, "Risks of Electronic Accounting Information Systems," Master's thesis, Islamic University, Gaza, Palestine, 2006.</p>
    <p>[16] M. H. Salem, "The Role of Accounting Measurement for Total Quality in Enhancing the Informational Content of Published Financial Reports and Statements," PhD dissertation, Sudan Univ. Sci. Tech., Sudan, 2007.</p>
    <p>[17] S. R. Robinson and L. Volonino, <italic>Principles and Practices of Information Security</italic>. Upper Saddle River, NJ, USA: Pearson/Prentice Hall, 2004.</p>
    <p>[18] A. Khalil, "The Influential Role of Information Security Governance in Reducing the Risks of Electronic Accounting Information Systems," Iraq, 2013. </p>
    <p>[19] I. Abu Shaiba, "Electronic Accounting Information Systems and Their Impact on Internal Auditing," <italic>Peer-Reviewed Semiannual Sci. J.</italic>, Misrata University, Libya, 2018.</p>
    <p>[20] F. Al-Ubaidi, "Risks of Using Computerized Accounting Information Systems and Their Impact on the Effectiveness of the Auditing Process in Jordan," Master's thesis, Middle East University, Jordan, 2012.</p>
    <p>[21] N. Qwaider, "Internal Control Systems and Their Impact on Information Security," <italic>J. Tripoli Univ.</italic>, vol. 2, no. 20, Syria, 2018.</p>
  </body>
  <back/>
</article>
