Please use this identifier to cite or link to this item: http://studentrepo.iium.edu.my/handle/123456789/3667
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMalami, Abubakaren_US
dc.date.accessioned2020-08-20T10:51:11Z-
dc.date.available2020-08-20T10:51:11Z-
dc.date.issued2012-
dc.identifier.urihttp://studentrepo.iium.edu.my/jspui/handle/123456789/3667-
dc.description.abstractThe rapid development and use of technology in the dissemination of information has embraced new dimensions among individuals, organizations, and government establishments. The banking industry is not an exception. As service orientated institutions, banks need information in executing their business activities. The proliferation of innovative-technological services by banks - use of mobile banking, etransfer funds, internet banking, automated teller machine (ATM) among othersresulted into the increased use of sophisticated technologies in disseminating information or to information system (IS). Given that no system can be made absolutely secure, executing adequate security controls over organizations’ information systems and other organizations’ assets become necessary. It is against this background that this study attempted to examine threats and the existence security control procedures in the Malaysian computerized banking system (MCBS). The study specifically targeted banks operating in Kuala Lumpur. Data was collected through postal mail questionnaires. The findings show that the respondents perceived the likelihood prevalence of threats in their respective banks in a range of areas. It also revealed that there is significant difference among the Malaysian computerized banks’ branches regarding the extent of security control implementation in control activities, risks assessment and monitoring control procedures. However, the results on the existence of threats show non-significance difference in all the threats variables. Moreover, the study found that there is reasonable level of security control implementation in the observed banks’ branches. Therefore, the research concluded that there were adequate rate of implementation of security control procedures in the Malaysian computerized banking system. Moreover, the study suggested that the banks should consider continuous improvement in some of their security control procedures.en_US
dc.language.isoenen_US
dc.publisherKuala Lumpur: International Islamic University Malaysia, 2012en_US
dc.rightsCopyright International Islamic University Malaysia
dc.subject.lcshBanks and banking -- Security measures -- Malaysiaen_US
dc.subject.lcshFinancial institutions -- Security measures -- Malaysiaen_US
dc.subject.lcshBanks and banking -- Automation -- Malaysiaen_US
dc.titleThreats and the existence of security control procedures in computerized banking system: evidance from Malaysiaen_US
dc.typeMaster Thesisen_US
dc.identifier.urlhttps://lib.iium.edu.my/mom/services/mom/document/getFile/sQJeFUozTcVdfMcAaXPSsM0ubUih6zE020131129153350441-
dc.description.identityt00011269799AbubakarMalamien_US
dc.description.identifierThesis : Threats and the existence of security control procedures in computerized banking system: evidance from Malaysia /by Abubakar Malamien_US
dc.description.kulliyahKulliyyah of Economics and Management Sciencesen_US
dc.description.programmeMaster of Science in Accountingen_US
dc.description.degreelevelMasteren_US
dc.description.callnumbert HG 1616 S37 M236T 2012en_US
dc.description.notesThesis (MSACC)--International Islamic University Malaysia, 2012en_US
dc.description.physicaldescriptionxv, 146 leaves : ill. ; 30cm.en_US
item.openairetypeMaster Thesis-
item.grantfulltextopen-
item.fulltextWith Fulltext-
item.languageiso639-1en-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.cerifentitytypePublications-
Appears in Collections:KENMS Thesis
Files in This Item:
File Description SizeFormat 
t00011269799AbubakarMalami_SEC_24.pdf24 pages file578.17 kBAdobe PDFView/Open
t00011269799AbubakarMalami_SEC.pdf
  Restricted Access
Full text secured file1.03 MBAdobe PDFView/Open    Request a copy
Show simple item record

Page view(s)

16
checked on May 18, 2021

Download(s)

14
checked on May 18, 2021

Google ScholarTM

Check


Items in this repository are protected by copyright, with all rights reserved, unless otherwise indicated. Please give due acknowledgement and credits to the original authors and IIUM where applicable. No items shall be used for commercialization purposes except with written consent from the author.