Evaluation of The Effectiveness of Control Systems in Computerized Accounting Information Systems: An Empirical Research Applied on Jordanian Banking Sector
暂无分享,去创建一个
[1] Bijoy Bordoloi,et al. Evaluating security threats in mainframe and client/server environments , 1997, Inf. Manag..
[2] Peter M. Chisnall,et al. Questionnaire Design, Interviewing and Attitude Measurement , 1993 .
[3] Mark L. Berenson,et al. Basic Business Statistics : Concepts and Applications , 2007 .
[4] Martin J. Coe. Trust Services: A Better Way to Evaluate I.T. Controls: Fulfilling the Requirements of Section 404 , 2005 .
[5] Susan Greener,et al. Business Research Methods , 2008 .
[6] W. Zikmund. Business Research Methods , 1984 .
[7] Catherine Hardy,et al. A study of the internal control structure for electronic data interchange systems using the analytic hierarchy process , 2000 .
[8] Uday S. Murthy. An Analysis of the Effects of Continuous Monitoring Controls on e-Commerce System Performance , 2004, J. Inf. Syst..
[9] A. Faye Borthick,et al. Evaluation of Internal Control from a Control Objective Narrative , 1999, J. Inf. Syst..
[10] W. Robert Knechel,et al. An Empirical Investigation of the Relationship between the Computerization of Accounting Systems and the Incidence and Size of Audit Differences , 1998 .
[11] Ingoo Han,et al. CRAS‐CBR: Internal control risk assessment system using case‐based reasoning , 2004, Expert Syst. J. Knowl. Eng..
[12] J. Lainhart. COBIT™: A Methodology for Managing and Controlling Information and Information Technology Risks and Vulnerabilities , 2000 .
[13] R. Wallace,et al. Nonresponse bias in mail accounting surveys: A pedagogical note , 1988 .
[14] J. Efrim Boritz,et al. IS practitioners' views on core concepts of information integrity , 2005, Int. J. Account. Inf. Syst..
[15] David H. Li,et al. Accounting information systems: Transaction processing and controls , 1991 .
[16] IV JohnW.Lainhart. COBIT™: A Methodology for Managing and Controlling Information and Information Technology Risks and Vulnerabilities , 2000, J. Inf. Syst..
[17] Ahmad A. Abu-Musa. Investigating the security controls of CAIS in an emerging economy , 2004 .
[18] T. A. Lee. The Historical Development of Internal Control from the Earliest Times to the End of the Seventeenth Century , 1971 .
[19] Slemo Warigon. Data warehouse control & security , 1998 .
[20] Mario Piattini,et al. Designing secure databases , 2005, Inf. Softw. Technol..