KnE Social Sciences

ISSN: 2518-668X

The latest conference proceedings on humanities, arts and social sciences.

Securing Accounting Information Systems (AIS)

Published date: Aug 29 2024

Journal Title: KnE Social Sciences

Issue title: Annual Symposium on Applied Business Economics and Communication (ASABEC) 2023

Pages: 55–70

DOI: 10.18502/kss.v9i25.16952

Authors:

Ali Masjono Muchtarali.masjonomuchtar@akuntansi.pnj.ac.idAccounting Department, Politeknik Negeri Jakarta, Jakarta

Rahmanita Vidya SariAccounting Department, Politeknik Negeri Jakarta, Jakarta

Stefanus Heru SantosoKAP Stefanus Heru Santoso, Jakarta

Abstract:

Top management needs to ensure that the company’s operations run well and without interruption, but on the other hand, achieving the company’s vision is a priority for top management, so that for operational matters, it is handed over to sub-management, for example, one of them is the responsibility of the information system security. Ideally, the company has a function to secure information systems, then the company can focus on the security. Top management will periodically receive reports on information system security. This ideal situation is difficult for some companies to implement, generally, these companies focus on operations, security issues are not yet a top priority, if information system security disturbances occur, for example, password theft by hackers, then they realize that information system security is very important. This research aims to design a security model and convert it to an instrument to determine the level of information system security. Top management is not only given a security report but also knows the level of security of the information system used. Whether the level is very secure, secure, relatively secure, unsecure, or totally not secure. The results of this study are normative measuring model and instrument. The company can regularly evaluate its information security condition by using this instrument and then taking action to anticipate the result.

Keywords: top management, information security, operational management, instruments, models

References:

[1] Fajarlie NI. Kompas. 2023. 15 Juta Data Bank Syariah Indonesia Diduga Diretas, Direktur Utama: Perlu Pembuktian. Available from: www.kompas.tv/article/406513/15-juta-data-bank-syariah-indonesia-diduga-diretasdirektur- utama-perlu-pembuktian?page=all

[2] Hamapu A. Detik.com. 2023. 4 Karyawan Bank di Batam Bobol Rekening Nasabah, Berhasil Gasak Rp 25,6 M.

[3] Hermantoro B. Optimizing financial technology literacy in minimizing phishing threats (Case Study of Indonesian Sharia Bank Customers). In: Proceeding of International Conference on Islamic Philantrophy. 2023. p. 38–52.

[4] Theintactone. heintactone.com. 2019. Evaluation of information system,. Available from: theintactone.com/2022/03/06/evaluation-of-information-systems/.

[5] Whitman ME, Mattord HJ. Principles of information security. Thomson Course Technology Boston, MA; 2009.

[6] HF Tipton MKN. Information security management handbook. CRC Press; Taylor and Francis Group. 2012;

[7] Romney PJ. Accounting information system. Pearson. 2017.

[8] Petrov II. Information systems reliability in traditional entropy and novel hierarchy. Cybernetics and Information Technologies. 2022;22(3):3–17.

[9] Tworek K. Reliability of information systems in organization in the context of banking sector: Empirical study from Poland. Cogent Business & Management. 2018;5(1):1522752.

[10] N. Sevim EEH. Consumer trust impact on online shoping. Internet Application and Management. 2014;5(2).

[11] Kłos R. Measurement system reliability assessment. Polish Hyperbaric Research. 2015;51(2):31–40.

[12] Al-Matari OMM, Helal IMA, Mazen SA, Elhennawy S. Adopting security maturity model to the organizations’ capability model. Egyptian Informatics Journal. 2021;22(2):193–9.

[13] Chia T. security.blogoverflow.com. 2016 [cited 2022 Feb 4]. IT Security Community Block. Available from: security.blogoverflow.com

[14] Apotheon. echRepublic. 2008 [cited 2022 Apr 6]. The CIA Triad. Available from: www.techrepublic.com/article/the-cia-triad

[15] Weber R. Information, NJ 07458: Prentice Hall, 1999.

Download
HTML
Cite
Share
statistics

28 Abstract Views

47 PDF Downloads