KnE Social Sciences
ISSN: 2518-668X
The latest conference proceedings on humanities, arts and social sciences.
Securing Accounting Information Systems (AIS)
Published date: Aug 29 2024
Journal Title: KnE Social Sciences
Issue title: Annual Symposium on Applied Business Economics and Communication (ASABEC) 2023
Pages: 55–70
Authors:
Abstract:
Top management needs to ensure that the company’s operations run well and without interruption, but on the other hand, achieving the company’s vision is a priority for top management, so that for operational matters, it is handed over to sub-management, for example, one of them is the responsibility of the information system security. Ideally, the company has a function to secure information systems, then the company can focus on the security. Top management will periodically receive reports on information system security. This ideal situation is difficult for some companies to implement, generally, these companies focus on operations, security issues are not yet a top priority, if information system security disturbances occur, for example, password theft by hackers, then they realize that information system security is very important. This research aims to design a security model and convert it to an instrument to determine the level of information system security. Top management is not only given a security report but also knows the level of security of the information system used. Whether the level is very secure, secure, relatively secure, unsecure, or totally not secure. The results of this study are normative measuring model and instrument. The company can regularly evaluate its information security condition by using this instrument and then taking action to anticipate the result.
Keywords: top management, information security, operational management, instruments, models
References:
[1] Fajarlie NI. Kompas. 2023. 15 Juta Data Bank Syariah Indonesia Diduga Diretas, Direktur Utama: Perlu Pembuktian. Available from: www.kompas.tv/article/406513/15-juta-data-bank-syariah-indonesia-diduga-diretasdirektur- utama-perlu-pembuktian?page=all
[2] Hamapu A. Detik.com. 2023. 4 Karyawan Bank di Batam Bobol Rekening Nasabah, Berhasil Gasak Rp 25,6 M.
[3] Hermantoro B. Optimizing financial technology literacy in minimizing phishing threats (Case Study of Indonesian Sharia Bank Customers). In: Proceeding of International Conference on Islamic Philantrophy. 2023. p. 38–52.
[4] Theintactone. heintactone.com. 2019. Evaluation of information system,. Available from: theintactone.com/2022/03/06/evaluation-of-information-systems/.
[5] Whitman ME, Mattord HJ. Principles of information security. Thomson Course Technology Boston, MA; 2009.
[6] HF Tipton MKN. Information security management handbook. CRC Press; Taylor and Francis Group. 2012;
[7] Romney PJ. Accounting information system. Pearson. 2017.
[8] Petrov II. Information systems reliability in traditional entropy and novel hierarchy. Cybernetics and Information Technologies. 2022;22(3):3–17.
[9] Tworek K. Reliability of information systems in organization in the context of banking sector: Empirical study from Poland. Cogent Business & Management. 2018;5(1):1522752.
[10] N. Sevim EEH. Consumer trust impact on online shoping. Internet Application and Management. 2014;5(2).
[11] Kłos R. Measurement system reliability assessment. Polish Hyperbaric Research. 2015;51(2):31–40.
[12] Al-Matari OMM, Helal IMA, Mazen SA, Elhennawy S. Adopting security maturity model to the organizations’ capability model. Egyptian Informatics Journal. 2021;22(2):193–9.
[13] Chia T. security.blogoverflow.com. 2016 [cited 2022 Feb 4]. IT Security Community Block. Available from: security.blogoverflow.com
[14] Apotheon. echRepublic. 2008 [cited 2022 Apr 6]. The CIA Triad. Available from: www.techrepublic.com/article/the-cia-triad
[15] Weber R. Information, NJ 07458: Prentice Hall, 1999.