Abstract

Computerized accounting information systems (CAIS) are becoming more readily available to all types and sizes of business. The increased growth in real‐time and online data processing in CAIS has made access to these systems more available and easier for many users. Therefore, implementing adequate security controls over organisations, CAIS and their related facilities has become a necessity. The main objective of this article is to investigate the adequacy security controls implemented in the Egyptian banking industry (EBI) to preserve the confidentiality, integrity and availability of the banks' data and their CAIS through a proposed security controls check‐list. The security controls check‐list of CAIS was developed based on the available literature and the empirical results of previous studies. It includes many security counter‐measures that are empirically tested here for the first time. The entire population of the EBI has been surveyed in this research. The significant differences between the two respondent groups had been investigated. The statistical results revealed that the vast majority of Egyptian banks had adequate CAIS security controls in place. The results also revealed that the heads of computer departments (HoCD) paid relatively more attention to technical problems of CAIS security controls. This study has provided invaluable empirical results regarding inadequacies of implemented CAIS security controls in the EBI. Accordingly some recommendations were suggested to strengthen the security controls in the Egyptian banking sector.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.