BibTex RIS Kaynak Göster

SECURITY THREATS OF COMPUTERIZED BANKING SYSTEMS (CBS): THE MANAGERS’ PERCEPTION IN MALAYSIA

Yıl 2012, Cilt: 4 Sayı: 1, 21 - 30, 01.06.2012

Öz

Internal control system is an important pillar in an organisation. Considering the
evidence from major accounting fraud cases that occurred consequence to weak
internal control, such as Enron, it could also occur in a financial institution.
Hence, the objective of this study is to investigate the bank managers’ opinion on
the likelihood of security threats in the computerised banking systems (CBS) in
Malaysia. Since most major financial institutions operate in the capital city of
Kuala Lumpur, questionnaires were sent to selected bank branches in Kuala
Lumpur. The findings are expected to provide a platform for bank managers to
share their threats’ experience. Secondly, to assist them in designing and
formulating a sound and effective internal control system that will provide
reasonable assurance for achieving the bank’s mission. Findings are also expected
to provide general insights of internal control system, as most information is very
remote and confidential, thus generate a platform for promoting an efficient and
effective internal control practice in financial institutions.

Kaynakça

  • Abu-Musa, Ahmad A. (2006b), “Exploring Perceived Threats of CAIS in Developing Countries: The Case of Saudi Arabia”, Managerial Auditing Journal, UK, Vol. 21, No. 4, pp. 487- 407.
  • Abu-Musa, Ahmad A. (2006a), "Evaluating the Security Controls of CAIS in Saudi organizations: The Case of Saudi Arabia", The International Journal of Digital Accounting Research., Vol. 6, No. 11, pp. 25- 64.
  • Bierstaker, J. L; R. G. Brody; and C. Pacini, (2006) “Accountants' Perceptions Regarding Fraud Detection and Prevention Methods” Managerial Auditing Journal, UK, Vol. 21, No. 5, pp. 520 -535.
  • Casolaro, L. and Gobbi, G. (2004). Information technology and productivity changes in the Italian banking industry. Report Published by Bank of Italy Economic Research Department, pp. 1-26
  • Chang S. and Jan D. (2010). SOX 404-compliant ERP system internal control framework: The preliminary outcome. Business and policy research, pp. 282 – 295.
  • Davis C. E. (1996). Perceived security threats to today’s accounting information system: A survey of CISA, Information system audit control journal, Vol. 3, pp. 38-41
  • Gupta A. and Hammond R. (2005). Information systems security issues and decisions for small and business: An empirical examination. Information management & computer security, Vol. 13, No. 2, pp. 297-310.
  • Jackson C., (2000) “Discussion of Information Technology-Related Activities of Internal Auditors”, Journal of Information Systems, Vol. 14, No. 1, pp. 55-56.
  • Kankanhalli, A., Teo, H., Tan, B. and Wei, K. (2003). An integrative study of information systems security effectiveness. International Journal of Information Management, Vol. 23, No. 2, pp.139-148
  • Kreicberg L. (2010). Internal threats to information security; countermeasures and human factor within SME. Master’s thesis, Lulea University of technology
  • Loch, Karen D., Houston H. Carr and Merrill E. Warkentin (1992). Threats to information systems: Today’s reality, yesterday’s understanding. MIS Quarterly, pp. 173 - 186. Salehi M., (2010). Usefulness of accounting information system in emerging
  • economy: Empirical evidence of Iran. Economics and Finance, Vol. 2, No. 2, pp. 186-195.
  • Strong, J. M., Portz K. and Busta B (2006). A First look at the accounting information systems emphasis at one University: An Exploratory Analysis. The Review of Business Information Systems, Vol. 10, No. 2, pp. 235-256.
Yıl 2012, Cilt: 4 Sayı: 1, 21 - 30, 01.06.2012

Öz

Kaynakça

  • Abu-Musa, Ahmad A. (2006b), “Exploring Perceived Threats of CAIS in Developing Countries: The Case of Saudi Arabia”, Managerial Auditing Journal, UK, Vol. 21, No. 4, pp. 487- 407.
  • Abu-Musa, Ahmad A. (2006a), "Evaluating the Security Controls of CAIS in Saudi organizations: The Case of Saudi Arabia", The International Journal of Digital Accounting Research., Vol. 6, No. 11, pp. 25- 64.
  • Bierstaker, J. L; R. G. Brody; and C. Pacini, (2006) “Accountants' Perceptions Regarding Fraud Detection and Prevention Methods” Managerial Auditing Journal, UK, Vol. 21, No. 5, pp. 520 -535.
  • Casolaro, L. and Gobbi, G. (2004). Information technology and productivity changes in the Italian banking industry. Report Published by Bank of Italy Economic Research Department, pp. 1-26
  • Chang S. and Jan D. (2010). SOX 404-compliant ERP system internal control framework: The preliminary outcome. Business and policy research, pp. 282 – 295.
  • Davis C. E. (1996). Perceived security threats to today’s accounting information system: A survey of CISA, Information system audit control journal, Vol. 3, pp. 38-41
  • Gupta A. and Hammond R. (2005). Information systems security issues and decisions for small and business: An empirical examination. Information management & computer security, Vol. 13, No. 2, pp. 297-310.
  • Jackson C., (2000) “Discussion of Information Technology-Related Activities of Internal Auditors”, Journal of Information Systems, Vol. 14, No. 1, pp. 55-56.
  • Kankanhalli, A., Teo, H., Tan, B. and Wei, K. (2003). An integrative study of information systems security effectiveness. International Journal of Information Management, Vol. 23, No. 2, pp.139-148
  • Kreicberg L. (2010). Internal threats to information security; countermeasures and human factor within SME. Master’s thesis, Lulea University of technology
  • Loch, Karen D., Houston H. Carr and Merrill E. Warkentin (1992). Threats to information systems: Today’s reality, yesterday’s understanding. MIS Quarterly, pp. 173 - 186. Salehi M., (2010). Usefulness of accounting information system in emerging
  • economy: Empirical evidence of Iran. Economics and Finance, Vol. 2, No. 2, pp. 186-195.
  • Strong, J. M., Portz K. and Busta B (2006). A First look at the accounting information systems emphasis at one University: An Exploratory Analysis. The Review of Business Information Systems, Vol. 10, No. 2, pp. 235-256.
Toplam 13 adet kaynakça vardır.

Ayrıntılar

Diğer ID JA23CH83ND
Bölüm Makaleler
Yazarlar

Abu Bakar Malami Bu kişi benim

Zaini Zainol Bu kişi benim

Sherliza Puat Nelson Bu kişi benim

Yayımlanma Tarihi 1 Haziran 2012
Yayımlandığı Sayı Yıl 2012 Cilt: 4 Sayı: 1

Kaynak Göster

APA Malami, A. B., Zainol, Z., & Nelson, S. P. (2012). SECURITY THREATS OF COMPUTERIZED BANKING SYSTEMS (CBS): THE MANAGERS’ PERCEPTION IN MALAYSIA. International Journal of Economics and Finance Studies, 4(1), 21-30.
AMA Malami AB, Zainol Z, Nelson SP. SECURITY THREATS OF COMPUTERIZED BANKING SYSTEMS (CBS): THE MANAGERS’ PERCEPTION IN MALAYSIA. IJEFS. Haziran 2012;4(1):21-30.
Chicago Malami, Abu Bakar, Zaini Zainol, ve Sherliza Puat Nelson. “SECURITY THREATS OF COMPUTERIZED BANKING SYSTEMS (CBS): THE MANAGERS’ PERCEPTION IN MALAYSIA”. International Journal of Economics and Finance Studies 4, sy. 1 (Haziran 2012): 21-30.
EndNote Malami AB, Zainol Z, Nelson SP (01 Haziran 2012) SECURITY THREATS OF COMPUTERIZED BANKING SYSTEMS (CBS): THE MANAGERS’ PERCEPTION IN MALAYSIA. International Journal of Economics and Finance Studies 4 1 21–30.
IEEE A. B. Malami, Z. Zainol, ve S. P. Nelson, “SECURITY THREATS OF COMPUTERIZED BANKING SYSTEMS (CBS): THE MANAGERS’ PERCEPTION IN MALAYSIA”, IJEFS, c. 4, sy. 1, ss. 21–30, 2012.
ISNAD Malami, Abu Bakar vd. “SECURITY THREATS OF COMPUTERIZED BANKING SYSTEMS (CBS): THE MANAGERS’ PERCEPTION IN MALAYSIA”. International Journal of Economics and Finance Studies 4/1 (Haziran 2012), 21-30.
JAMA Malami AB, Zainol Z, Nelson SP. SECURITY THREATS OF COMPUTERIZED BANKING SYSTEMS (CBS): THE MANAGERS’ PERCEPTION IN MALAYSIA. IJEFS. 2012;4:21–30.
MLA Malami, Abu Bakar vd. “SECURITY THREATS OF COMPUTERIZED BANKING SYSTEMS (CBS): THE MANAGERS’ PERCEPTION IN MALAYSIA”. International Journal of Economics and Finance Studies, c. 4, sy. 1, 2012, ss. 21-30.
Vancouver Malami AB, Zainol Z, Nelson SP. SECURITY THREATS OF COMPUTERIZED BANKING SYSTEMS (CBS): THE MANAGERS’ PERCEPTION IN MALAYSIA. IJEFS. 2012;4(1):21-30.