This paper examines the existence and adequacy of implemented Computerized Accounting Information Systems (CAIS) security controls to prevent, detect and correct security breaches in Saudi organizations. An empirical survey, using a self-administered questionnaire, was carried out to achieve this purpose. Five hundred questionnaires were distributed on a random sample of Saudi organizations. Two hundred and seventy five valid, usable questionnaires were collected and analyzed. The results of the study highlight a number of inadequately implemented CAIS security controls, and some suggestions and recommendations are introduced to strengthen the weak points and to close the loopholes in the present CAIS security controls in Saudi organization...
The objective of this study is to investigate perceived security threats of Computerized Accounting ...
The adoption and over dependence on IT in performing banking operations during the past decades are ...
This paper presents a comparative analysis of the perspectives of IT workers and end-users on the si...
This paper examines the existence and adequacy of implemented Computerized Accounting Information Sy...
Abstract. This paper examines the existence and adequacy of implemented Computerized Accounting Info...
AbstractThis paper examines the existence and adequacy of implemented Computerized Accounting Inform...
This paper examines the existence and adequacy of implemented Computerized Accounting Information Sy...
The objective of this paper is to investigate the significant perceived security threats of computer...
AbstractThe objective of this paper is to investigate the significant perceived security threats of ...
The rapid development of IT, availability of user friendly accounting software and the increased com...
The rapid development of IT, availability of user friendly accounting software and the increased com...
Information has become one of the most valuable corporate assets, which should be protected with car...
Information has become one of the most valuable corporate assets, which should be protected with car...
In organisations, the use of technology and its advancement solutions has become more necessary than...
The following paper explores and evaluates the existence, efficiency and adequacy ofinformation syst...
The objective of this study is to investigate perceived security threats of Computerized Accounting ...
The adoption and over dependence on IT in performing banking operations during the past decades are ...
This paper presents a comparative analysis of the perspectives of IT workers and end-users on the si...
This paper examines the existence and adequacy of implemented Computerized Accounting Information Sy...
Abstract. This paper examines the existence and adequacy of implemented Computerized Accounting Info...
AbstractThis paper examines the existence and adequacy of implemented Computerized Accounting Inform...
This paper examines the existence and adequacy of implemented Computerized Accounting Information Sy...
The objective of this paper is to investigate the significant perceived security threats of computer...
AbstractThe objective of this paper is to investigate the significant perceived security threats of ...
The rapid development of IT, availability of user friendly accounting software and the increased com...
The rapid development of IT, availability of user friendly accounting software and the increased com...
Information has become one of the most valuable corporate assets, which should be protected with car...
Information has become one of the most valuable corporate assets, which should be protected with car...
In organisations, the use of technology and its advancement solutions has become more necessary than...
The following paper explores and evaluates the existence, efficiency and adequacy ofinformation syst...
The objective of this study is to investigate perceived security threats of Computerized Accounting ...
The adoption and over dependence on IT in performing banking operations during the past decades are ...
This paper presents a comparative analysis of the perspectives of IT workers and end-users on the si...