The objective of this study is to investigate perceived security threats of Computerized Accounting Information Systems (CAIS) that face Jordanian domestic banks. An empirical survey using self-administrated questionnaire has been carried out to achieve the above-mentioned objective. The study results reveal that accidental entry of “bad " data by employees, accidental destruction of data by employees; intentional entry of "bad ” data by employees and employees ' sharing passwords are the top four security threats that face domestic banks. The paper concludes that most security threats that face domestic banks are internally generated and unintentional
AbstractMalaysia being a unique capital market, practices dual banking system to capture the disaggr...
Abstract: This paper seeks to investigate the mediating effect of adapting to cyber risks on the r...
This study focus on investigating security practices using in Ayeyarwady Bank (AYA BANK) Digital ban...
The objective of this paper is to investigate the significant perceived security threats of computer...
AbstractThe objective of this paper is to investigate the significant perceived security threats of ...
The adoption and over dependence on IT in performing banking operations during the past decades are ...
This paper examines the existence and adequacy of implemented Computerized Accounting Information Sy...
Internal control system is an important pillar in an organisation.Considering theevidence from major...
Abstract. This paper examines the existence and adequacy of implemented Computerized Accounting Info...
Internal control system is an important pillar in an organisation. Considering the evidence from maj...
This paper examines the existence and adequacy of implemented Computerized Accounting Information Sy...
Malaysia being a unique capital market, practices dual banking system to capture the disaggregation ...
Malaysia being a unique capital market, practices dual banking system to capture the disaggregation ...
Information has become one of the most valuable corporate assets, which should be protected with car...
Information has become one of the most valuable corporate assets, which should be protected with car...
AbstractMalaysia being a unique capital market, practices dual banking system to capture the disaggr...
Abstract: This paper seeks to investigate the mediating effect of adapting to cyber risks on the r...
This study focus on investigating security practices using in Ayeyarwady Bank (AYA BANK) Digital ban...
The objective of this paper is to investigate the significant perceived security threats of computer...
AbstractThe objective of this paper is to investigate the significant perceived security threats of ...
The adoption and over dependence on IT in performing banking operations during the past decades are ...
This paper examines the existence and adequacy of implemented Computerized Accounting Information Sy...
Internal control system is an important pillar in an organisation.Considering theevidence from major...
Abstract. This paper examines the existence and adequacy of implemented Computerized Accounting Info...
Internal control system is an important pillar in an organisation. Considering the evidence from maj...
This paper examines the existence and adequacy of implemented Computerized Accounting Information Sy...
Malaysia being a unique capital market, practices dual banking system to capture the disaggregation ...
Malaysia being a unique capital market, practices dual banking system to capture the disaggregation ...
Information has become one of the most valuable corporate assets, which should be protected with car...
Information has become one of the most valuable corporate assets, which should be protected with car...
AbstractMalaysia being a unique capital market, practices dual banking system to capture the disaggr...
Abstract: This paper seeks to investigate the mediating effect of adapting to cyber risks on the r...
This study focus on investigating security practices using in Ayeyarwady Bank (AYA BANK) Digital ban...