MIHALACHE, Arsenie-Samoil (2011): Risk Analysis of Accounting Information System Infrastructure.
Preview |
PDF
MPRA_paper_28874.pdf Download (1MB) | Preview |
Abstract
National economy and security are fully dependent on information technology and infrastructure. At the core of the information infrastructure society relies on, we have the Internet, a system designed initially as a scientists’ forum for unclassified research. The use of communication networks and systems may lead to hazardous situations that generate undesirable effects such as communication systems breakdown, loss of data or taking the wrong decisions. The paper studies the risk analysis of the accounting information system in modern corporations from the viewpoint of modernising accounting against the background of implementing new information technologies aimed at carrying out the objectives of integration and globalisation construed as phenomena specific to information society and knowledge.
Item Type: | MPRA Paper |
---|---|
Commentary on: | MIHALACHE, Arsenie-Samoil (2011): Risk Analysis of Accounting Information System Infrastructure. |
Original Title: | Risk Analysis of Accounting Information System Infrastructure |
English Title: | Risk Analysis of Accounting Information System Infrastructure |
Language: | English |
Keywords: | attackers, threats, vulnerability, security, risk analysis |
Subjects: | H - Public Economics > H8 - Miscellaneous Issues P - Economic Systems > P5 - Comparative Economic Systems D - Microeconomics > D5 - General Equilibrium and Disequilibrium L - Industrial Organization > L6 - Industry Studies: Manufacturing L - Industrial Organization > L8 - Industry Studies: Services > L86 - Information and Internet Services ; Computer Software M - Business Administration and Business Economics ; Marketing ; Accounting ; Personnel Economics > M4 - Accounting and Auditing C - Mathematical and Quantitative Methods > C8 - Data Collection and Data Estimation Methodology ; Computer Programs |
Item ID: | 28874 |
Depositing User: | ARSENIE SAMOIL MIHALACHE |
Date Deposited: | 21 Mar 2011 12:33 |
Last Modified: | 27 Sep 2019 01:28 |
References: | Aanestad, M., Monteiro, E., Nielsen. P., (2007). Information Infrastructures and Public Goods: Analytical and Practical Implications for Spatial Data Infrastructures. Information Technology for Development, 13(1), 07-25. Adams, J., and Thompson, M., (2002). Taking account of societal concerns about risk: framing the problem, Health and Safety Executive, Research Report 035. Amor, D., (2001). The E-Business (R)evolution: Living and Working in an Interconnected World (2nd Edition). Prentice Hall. Andone, I., Dologite, D., Mockler, R., Tugui, A., (2001). Dezvoltarea sistemelor inteligente în economie. Metodologie si studii de caz, Ed. Economica, Bucuresti. Andone, I., Pavaloaia, D., Bâcâin, I., Genete, L.D., (2004). Modelarea cunoasterii în organizatii. Metodologie obiectuala pentru solutii inteligente, Ed. Tehnopress, Iasi. Andone, I., Pavaloaia, D., (2010). Modelarea afacerii. Întreprindere-procese-reguli, Ed. TIPO, Iasi. Andone, I., Georgescu, I., Toma, C., (2010). Cercetarea avansata in contabilitate, Editura Wolters-Kluwer, Bucuresti. Andone., I., Tabara, N., (2006). Contabilitate, tehnologie si competitivitate, Editura Academiei Române. Andone, I., Vergara, M., Pavaloaia, D., (2010). Modelarea afacerii. Întreprindere – procese – reguli, Ed. TipoMoldova, 2010 Austin, R. and Darby, C., (2003). The myth of secure computing. Harvard Business Review, 81(6): 120-126. Berryman, P. (2002). Risk Assessment: The Basics. Bishop, M., (1999). Vulnerabilities Analysis. In Proceedings of the Second RAID Conference. Blakley, B., McDermott, E. and Geer, D. (2002). Information security is information risk management. In Proceedings of NSPW, Cloudcroft, New Mexico, USA. Bontchev, V.V., (1998). Methodology of Computer Anti-Virus Research, PhD thesis. University of Hamburg, Germany. Buffam, W.J., (2000). The Fundamentals of Internet Security, Unisys. Castano, S., Fugini, M., Martella, G. & Samarati, P. (1995). Database Security. Addison-Wesley. Cohen, F., Phillips, C., Swiler, L.P., Gaylor, T., Leary, P., Rupley, F., Isler, R. and Dart, E. (1998). A Preliminary Classification Scheme for Information System Threats, Attacks, and Defenses: A Cause and Effect Model and Some Analysis Based on That Model, Sandia National Laboratories. D’Arcy, S.P., (2001). Enterprise Risk Management. Journal of Risk Management of Korea, 12 (1). Frisch, Æ., (1995). Essential System Administration, Second Edition. O’Reilly & Associates, Inc., CA, USA. Jacobson R.V. (1996). CORA Cost-of-Risk Analysis. In Proceedings of IFIP’96 WG11.2. Samos, Greece. Kabay, M. E. (1996). Enterprise Security: Protecting Information Assets. McGraw-Hill. Kankanhalli, A., Teo, H.H., Tan, B.C.Y., Wei, K.K. (2003). An integrative study of information systems security effectiveness. International Journal of Information Management 23: 139-154. Landwehr, C.E., (2001). Computer security. International Journal of Information Security, 1: 3 –13. Loscocco, P.A., Smalley, S.D., Muckelbauer, P.A., Taylor, R.C., Turner, S.J. & Farrell, J.F. (1998). The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environment. In Proceedings of the 21st National Information Systems Security Conference. Neumann, P.G. (1995). Computer related risks. ACM Press. Oprea, D., (2007) Protecţia şi securitatea informaţiilor, Editura Polirom, Iasi. Ozier, W., (1999). A Framework for an Automated Risk Assessment Tool, The Institute of Internal Auditors. Panko, R.R., (2004). Corporate computer and network security. New Jersey: Prentice Hall. Pfleeger, C.P., (1997). Security in Computing. Addison Wesley. Schneier, B., (2000). Secrets and Lies: Digital Security in a Networked World. Wiley: New York. Siponen, M.T., (2000). A conceptual foundation for organizational information security awareness. Information Management & Computer Security, 8/1: 31-41. Stallman, R.M., (1984). Letter to ACM Forum. Communication of the ACM, 27 (1), January: 8-9. Stoneburner, G., Goguen, A., and Feringa, A., (2001). Risk Management Guide for Information Technology Systems, National Institute of Standards and Technology. Straub, D.W., şi Welke, R.J., (1998). Coping with systems risk: security planning models for management decision making. MIS Quarterly, 22, 4 : 441-64. Summers, R.C., (1997). Secure Computing: Threats and Safeguards. McGraw-Hill. Vasiu, L., and Vasiu, I., (2004). Dissecting Computer Fraud: From Definitional Issues to a Taxonomy. In Proceedings of the 37th Hawaii International Conference on System Sciences, Hawaii, USA. IEEE Computer. Vasiu, L., and Vasiu, I., (2004a). A Taxonomy of Malware Use in the Perpetration of Computer-related Fraud. In U.E. Gattiker (Ed.), EICAR 2004 Conference CD-rom: Best Paper Proceedings. Copenhagen: EICAR e.V. Vasiu, I., and Vasiu, L., (2001). Totul despre hackeri. Editura Nemira: Bucureşti. Wilsher, R.G., şi Kurth, H., (1996). Security assurance in information systems. In Sokratis K. Katsikas şi Dimitris Gritzalis (Eds.) (1996). Information Systems Security: Facing the information society of the 21st century. Chapman & Hall. |
URI: | https://mpra.ub.uni-muenchen.de/id/eprint/28874 |
Commentary/Response Threads
- MIHALACHE, Arsenie-Samoil Risk Analysis of Accounting Information System Infrastructure. (deposited 21 Mar 2011 12:33) [Currently Displayed]