COMPUTERIZED ACCOUNTING INFORMATION SYSTEMS

DATA SECURITY, ACCURACY AND PRIVACY CONTROLS FOR DETECTING AND PREVENTING MICROCOMPUTER MISUSES THROUGH ELECTRONIC DATA PROCESSING (EDP) AUDITING.

Research output: Contribution to conferencePaper

Abstract

Studies have shown that no matter what an organization does to protect its data, risk cannot be entirely eliminated. Much information has been written on microcomputers, but the areas of auditing and security have been overlooked. The privacy of an organization's records is in constant jeopardy of being exposed and as a result, policy guidelines regarding privacy are addressed in this paper as well as the cost associated with such controls.

Original languageEnglish (US)
Pages108-111
Number of pages4
StatePublished - Dec 1 1984

Fingerprint

Data privacy
Security of data
Microcomputers
Information systems
Costs

ASJC Scopus subject areas

  • Engineering(all)

Cite this

@conference{6d2b3ec093034314a4e5c409ec46dfe4,
title = "COMPUTERIZED ACCOUNTING INFORMATION SYSTEMS: DATA SECURITY, ACCURACY AND PRIVACY CONTROLS FOR DETECTING AND PREVENTING MICROCOMPUTER MISUSES THROUGH ELECTRONIC DATA PROCESSING (EDP) AUDITING.",
abstract = "Studies have shown that no matter what an organization does to protect its data, risk cannot be entirely eliminated. Much information has been written on microcomputers, but the areas of auditing and security have been overlooked. The privacy of an organization's records is in constant jeopardy of being exposed and as a result, policy guidelines regarding privacy are addressed in this paper as well as the cost associated with such controls.",
author = "Avi Rushinek and Sara Rushinek",
year = "1984",
month = "12",
day = "1",
language = "English (US)",
pages = "108--111",

}

TY - CONF

T1 - COMPUTERIZED ACCOUNTING INFORMATION SYSTEMS

T2 - DATA SECURITY, ACCURACY AND PRIVACY CONTROLS FOR DETECTING AND PREVENTING MICROCOMPUTER MISUSES THROUGH ELECTRONIC DATA PROCESSING (EDP) AUDITING.

AU - Rushinek, Avi

AU - Rushinek, Sara

PY - 1984/12/1

Y1 - 1984/12/1

N2 - Studies have shown that no matter what an organization does to protect its data, risk cannot be entirely eliminated. Much information has been written on microcomputers, but the areas of auditing and security have been overlooked. The privacy of an organization's records is in constant jeopardy of being exposed and as a result, policy guidelines regarding privacy are addressed in this paper as well as the cost associated with such controls.

AB - Studies have shown that no matter what an organization does to protect its data, risk cannot be entirely eliminated. Much information has been written on microcomputers, but the areas of auditing and security have been overlooked. The privacy of an organization's records is in constant jeopardy of being exposed and as a result, policy guidelines regarding privacy are addressed in this paper as well as the cost associated with such controls.

UR - http://www.scopus.com/inward/record.url?scp=0021724139&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0021724139&partnerID=8YFLogxK

M3 - Paper

SP - 108

EP - 111

ER -