Evaluation of The Effectiveness of Control Systems in Computerized Accounting Information Systems: An Empirical Research Applied on Jordanian Banking Sector

The objective of this study is to evaluate the level of Control Systems effectiveness in Computerized Accounting Information Systems (CAIS) that is implemented in the Jordanian banking sector to preserve confidentiality, integrity and availability of the bank's data and their CAIS. An empirical survey using self-administrated questionnaire has been carried out to achieve the above-mentioned objectives. The study results reveal that Jordanian domestic banks are using effective fraud and error reduction controls. The study also reveals that these banks lack in the application of other Control System dimensions (Physical access, Logical access, Data security, Documentation standard, Disaster Recovery, Internet, communication and E-Control and Output security controls). The study’s main recommendation is for Jordanian domestic banks to increase the CAIS control system strength for all dimensions, in order to avoid any possible threats that could threaten their CAIS.

[1]  Bijoy Bordoloi,et al.  Evaluating security threats in mainframe and client/server environments , 1997, Inf. Manag..

[2]  Peter M. Chisnall,et al.  Questionnaire Design, Interviewing and Attitude Measurement , 1993 .

[3]  Mark L. Berenson,et al.  Basic Business Statistics : Concepts and Applications , 2007 .

[4]  Martin J. Coe Trust Services: A Better Way to Evaluate I.T. Controls: Fulfilling the Requirements of Section 404 , 2005 .

[5]  Susan Greener,et al.  Business Research Methods , 2008 .

[6]  W. Zikmund Business Research Methods , 1984 .

[7]  Catherine Hardy,et al.  A study of the internal control structure for electronic data interchange systems using the analytic hierarchy process , 2000 .

[8]  Uday S. Murthy An Analysis of the Effects of Continuous Monitoring Controls on e-Commerce System Performance , 2004, J. Inf. Syst..

[9]  A. Faye Borthick,et al.  Evaluation of Internal Control from a Control Objective Narrative , 1999, J. Inf. Syst..

[10]  W. Robert Knechel,et al.  An Empirical Investigation of the Relationship between the Computerization of Accounting Systems and the Incidence and Size of Audit Differences , 1998 .

[11]  Ingoo Han,et al.  CRAS‐CBR: Internal control risk assessment system using case‐based reasoning , 2004, Expert Syst. J. Knowl. Eng..

[12]  J. Lainhart COBIT™: A Methodology for Managing and Controlling Information and Information Technology Risks and Vulnerabilities , 2000 .

[13]  R. Wallace,et al.  Nonresponse bias in mail accounting surveys: A pedagogical note , 1988 .

[14]  J. Efrim Boritz,et al.  IS practitioners' views on core concepts of information integrity , 2005, Int. J. Account. Inf. Syst..

[15]  David H. Li,et al.  Accounting information systems: Transaction processing and controls , 1991 .

[16]  IV JohnW.Lainhart COBIT™: A Methodology for Managing and Controlling Information and Information Technology Risks and Vulnerabilities , 2000, J. Inf. Syst..

[17]  Ahmad A. Abu-Musa Investigating the security controls of CAIS in an emerging economy , 2004 .

[18]  T. A. Lee The Historical Development of Internal Control from the Earliest Times to the End of the Seventeenth Century , 1971 .

[19]  Slemo Warigon Data warehouse control & security , 1998 .

[20]  Mario Piattini,et al.  Designing secure databases , 2005, Inf. Softw. Technol..