dc.contributor.author |
Janczewski, Lech |
en |
dc.contributor.author |
Tai, V |
en |
dc.contributor.editor |
Khosrow-Pour, M |
en |
dc.coverage.spatial |
Washington, DC, USA |
en |
dc.date.accessioned |
2012-04-13T02:42:09Z |
en |
dc.date.issued |
2006 |
en |
dc.identifier.citation |
merging Trends and Challenges in Information Technology. Idea Group Inc.. 269-272. 2006 |
en |
dc.identifier.isbn |
978-1599040196 |
en |
dc.identifier.uri |
http://hdl.handle.net/2292/17174 |
en |
dc.description.abstract |
Accountants are the custodians of many peoples’ or businesses’ financial information. This information is clearly sensitive and therefore it is important for accountants to ensure that it is accuracy and complete while protecting them against lost, corruption or leaking to unauthorized third parties. This paper reports on a research on the security status of the industry of medium-sized accounting firms in New Zealand. Through interviews a number of deficiencies in information security management have been identified and a recommended security model was proposed to address those deficiencies. |
en |
dc.publisher |
Idea Group Inc. |
en |
dc.relation.ispartof |
IRMA 2006 Annual Conference |
en |
dc.relation.ispartofseries |
Emerging Trends and Challenges in Information Technology |
en |
dc.rights |
Items in ResearchSpace are protected by copyright, with all rights reserved, unless otherwise indicated. Previously published items are made available in accordance with the copyright policy of the publisher. |
en |
dc.rights.uri |
https://researchspace.auckland.ac.nz/docs/uoa-docs/rights.htm |
en |
dc.title |
Security Status and Security Model for Mid-Size Accounting Firms in New Zealand |
en |
dc.type |
Conference Item |
en |
dc.identifier.doi |
10.4018/978-1-59904-019-6.ch065 |
en |
pubs.begin-page |
269 |
en |
dc.rights.holder |
Copyright: Idea Group Inc. |
en |
pubs.author-url |
http://www.irma-international.org/proceeding/emerging-trends-challenges-information-technology/31509/ |
en |
pubs.end-page |
272 |
en |
pubs.finish-date |
2006-05-24 |
en |
pubs.start-date |
2006-05-21 |
en |
dc.rights.accessrights |
http://purl.org/eprint/accessRights/RestrictedAccess |
en |
pubs.subtype |
Conference Paper |
en |
pubs.elements-id |
202141 |
en |
pubs.org-id |
Business and Economics |
en |
pubs.org-id |
Info Systems & Operations Mgmt |
en |
pubs.record-created-at-source-date |
2011-01-27 |
en |