The threats of using computerized accounting information systems in the banking industry

: The adoption and over dependence on IT in performing banking operations during the past decades are well-recognised. The use of information systems in performing accounting tasks has been credited with many accolades nonetheless, threats to the systems have become inevitable for most firms in the changing business environment. In this study, the extents to which CAIS in the banking industry in Ghana are susceptible to vulnerability are explored by means of descriptive survey. The study investigated the sources and causes of risks that threaten CAIS in financial firms and the preventive measures available to mitigate their occurrence. The study reveals that the most worrying sources of threats to CAIS include power outages, risks posed by employees, viruses, and threats from outsiders. With regards to the causes of risks to CAIS, the findings indicate that accidental entry of bad data, unauthorized copying of the system’s output, lack of frequent back-ups, infrequently updates on system security software, access to data by unauthorized personnel, weakness in internal controls, and lack of written policies are the major causes of threats to CAIS. Generally, the findings indicate high level of perceived sources and causes of risks among financial firms in Ghana. However, effective measures to secure CAIS are lacking. It is therefore recommended that attention is given to these issues before they become unbearable.

The threats of using computerized accounting information systems in the banking industry

Introduction
Financial firms are established for purposes such as mobilizing savings as well as providing credit services and facilities to customers.The customer (s) may be an individual, group of individuals or organizations.As the population increases and people develop savings and investment habit, the use of the traditional system of handling transactions by financial institutions makes it difficult to serve the needs of the numerous customers effectively and efficiently.Again, the provision and presentation of reliable information to serve the need and interest of the various user groups becomes difficult to achieve because of the huge data base that are made available from operations.As a result of these, many companies have taken advantage of the development in information technology (IT) and availability of user friendly accounting software applications to computerize their accounting information system.Similarly, increased competitions in the financial sector have compelled many institutions within the sector to computerize their systems in order to remain competitive.
The growing use and over dependence on information and communication technologies (ICT) in the financial sector during the past decades are well-noticed and unquestionable reality.Different groups of financial service providers have obtained very unique results in relation to the expected increase in productivity and in business performance due to large investments in information technology.This new trend has made it easier to handle the more difficult tasks that were cumbersome to perform through the traditional system (manual system).Its wider use in the performance of the various tasks in accounting has given opportunity to companies to move toward a paperless era.That is to say that, with the adoption of IT in business operations, the manual system of handling data is gradually being substituted.IT has now become the reason behind the growth of most organizations around the globe.It has been considered as the tool for knowledge since the search for relevant and reliable information for an effective decision is facilitated by its wider use in all fields of life.
The introduction of technology in accounting started in the early 20 th century with the introduction of the first operational business computer (Fadzil et al., 2005).Since then, a number of accounting software packages have been developed by software manufacturers to make accounting tasks less complex and more accurate.These software packages have made it easier for accounting tasks to be run on a computer system hence the name Computerized Accounting Information System (CAIS).Information provided by CAIS has been described with attributes such as reliable, adequate, and relevant.Nevertheless, threats to CAIS have become inevitable for most organizations in the changing business environment.According to the National Institute of Standards and Technology (2003), organizations that are using IT in their operations are more vulnerable to threats which could in effect result in damages that may lead to significant financial loss.Stonebumer et al. (2002) categorized sources of these threats into natural threats, human based threats and environmental threats.The use of a computerized accounting information system in organizations in general and financial institutions in particular has been characterized with some of these challenges and security issues that threaten the safety of the system and the efficiency of its use.
The rapid advancement in information technology, the wide spread of user-friendly software applications and the over reliance on information system by organizations to perform their operations have increased security threats to the information system which in turn have affected business activities (Kankanhalli et al., 2003;Abu-Musa, 2006;Salehi, 2010).Precisely, the growing reliant on the CAIS by financial institutions in executing its business activities have made it difficult to separate information technology (IT) from the business activities of these institutions.
It is clear that there are greater possibilities of threats to CAIS.These types of threats are common not only to the developed countries but also to the developing countries as well.As a result, adopting appropriate security control measures over the CAIS of an organization and its related peripherals has become an issue of concern to many organizations (Abu-Musa, 2004).Ghanaian companies cannot be left out of these security challenges.It is therefore anticipated that these challenges to computerized accounting information systems are prevalent in Ghanaian companies as well, therefore, the need for this study to critically evaluate the extent to which such risks manifest and the measures firms within the industry are currently putting in place to minimize their occurrence and effects.This present study is therefore centred on such challenges, hereafter referred to as 'risks', their perceived prevalence and threats to CAIS in the Ghanaian banking industry.
Although empirical studies on threats of CAIS have been studied in some part of the world (Abu-Musa, 2005, 2006;Hanini 2012), such studies have been limited to the causes of risks and security controls available to mitigate these risks.Analysis of existing literature shows that no study has explored the sources of risks that threaten CAIS.This paper seeks to bridge that gap and to bring knowledge of CAIS to the rest of the world, whilst providing findings that will provide immense assistance to Information system (IS) developers, security consultants, IT users and practitioners, and Managers of financial institutions to develop better understanding of the sources of threats to their systems and how best they will be able to secure their CAIS in a suitable manner to achieve their objectives successfully.
The position of the Ghanaian economy in the world of business, and the need to develop its accounting information systems, make Ghana a perfect location for this study.The Ghanaian experience is importance to the rest of the world and non- The threats of using computerized accounting information systems in the banking industry Ghanaian readers for a number of reasons.First, computerization of noncommercial banks started in 2010 and currently, almost all financial institutions operating in Ghana are mechanized, making them more susceptible to cyber security theft.The spread of cybercrimes in Africa and Ghana in particular is on the ascendency.The news that Ghana is ranked among countries prone to cyber threats gives reason for a holistic approach aimed at combating unauthorized intrusions into financial information hereafter increasing the confidence of investors and other customers that their information will be secured, irrespective of how it is accessed.
To place Ghana's story in the context, it is necessary to examine the state of CAIS in the financial service industry especially non-commercial banks in the years leading up to the discovery of oil and expansions in businesses over the years.With the growing concerns that fraud within the financial service sector is on the rise, there is the need to assess the threats if any to the computerized systems and the pragmatic policy measures instituted to mitigate cyber incidences and crimes.
Ironically, with all the security apparatus, the nation has fallen victim to cyber fraud in the past.Important national webpages like the National Communication Authority (NCA), the National Information Technology Agency (NITA), and the webpage of the vice president of Ghana have all been hacked in recent times (Ministry of Communications, 2014).A study by 3T Solutions Consulting titled "2017 West Africa Cyber Security Indexing and Readiness Assessment" gives evidence that even though some financial institutions in Ghana have security strategies targeted at mitigating cyber threat, others are still at risk.The information offered through this study will provide the prospect of using CAIS to improving performance.
Second, it is also important to create awareness of security threats and develop methodologies and strategies that will help lessen the risks associated with CAIS.
In line with the assumptions outlined earlier on, this study seeks to examine the sources and the perceived causes of risks that subject CAIS to vulnerability and the preventive measure currently in place to protect CAIS by financial firms.

Financial service sector in Ghana
Financial service delivery has undergone a lot of changes over the past decades.The manual accounting system dominated past banking activities therefore creating long queues and inconvenience in banking halls.Modern banking in Ghana started in the late 19 th century with dominance from Standard Chartered and Barclays bank.The British Bank of West Africa, now the Standard Chartered Bank, was established in Ghana about 122 years ago, followed by Barclays Bank which has been in operation since 1917.These two banks were subsidiaries to their parent banks incorporated in the United Kingdom.
In 1935, farmers' co-operatives and the colonial government established the cooperative bank to finance farming activities especially cocoa buying and facilitating the activities of co-operative societies in the country.Prior to independence, the Bank of the Gold Coast was also established.The Gold Coast Bank which was partly owned by the government managed government activities while providing banking services to farmers and acting as an agent in the floatation of government bonds.After independence in 1957, the Bank of Gold Coast was split into Bank of Ghana and Ghana Commercial Bank.The Bank of Ghana assumed central banking activities whilst the commercial banking activities were supervised by the Ghana Commercial Bank.
The post-independence era saw a lot of banks emerging and providing financial services in Ghana.Currently, the country can boast of about 33 licensed banks of which 16 are locally owned and 17 foreign controlled (PWC, 2017).Included in these banks is ARB Apex Bank, which is the central bank for rural and community banks operating in the various rural communities in Ghana.There are about 140 licensed and registered rural and community banks at the various regions in Ghana.

Computerization of banking activities in Ghana
The earliest Information and Communication Technology devices adopted in the financial service sector in Ghana were telephones, telex and facsimile (Abor, 2004).These devices were used together with the manual system to facilitate banking operations and to ensure accuracy and efficiency in delivering financial services.As banking operations became intensified and competitive, the use of the traditional means of serving customers lost its relevance.With advancement in technology, computers paved way for banks to network their activities thereby enabling computerization of banking and accounting systems.
The most innovatory computerized electronic facility used in Ghana and most part of the world to perform basic banking functions such as issuing cash withdrawals and cash deposits is the Automatic Teller Machine (ATM).Banks with ATM facilities also have their banking operations networked hence making them more useful to their customers.The first universal bank to install ATM in 1995 was the Trust Bank, now a member of the Ecobank group, followed by the Ghana Commercial Bank and Agricultural Development Bank in 2001.Today all banks registered and licensed by the Central bank have their banking operations computerized.This has enabled cheque clearing system which is mainly a computer-based over a Wide Area Network (WAN).
To enhance rural banking through Information Technology, the Ghana Rural Banks Computerization and Interconnectivity Project (GRBCIP) financed by the United The threats of using computerized accounting information systems in the banking industry State government through the Millennium Challenge Account (MCA) was instituted to ensure mechanization of rural and community banks operating under the ambit of the ARB Apex Bank limited.The project commenced in 2010 with over 500 VSAT WAN sites installed all over Ghana with a state-of-the-art data unit.The project saw rural banks migrating unto the Temenos eMerge T24 platform.
In the next section of the paper, general literature on computerized accounting information system is reviewed.This is followed by a description of the method adopted for the study and the discussion of the study's results.In the concluding section of the paper, recommendations are made.

Literature review 4.1 The nature of accounting information system
The accounting system of most organizations is largely linked to the various administrative processes.The system helps in making decisions, performing the administrative functions and raising the levels of performance in order to achieve corporate goals (El-Dalabeeh & Alshebeil, 2012).
Accounting Information System (AIS) has been described by many researchers.In 1966, the American Institute of Certified Public Accountants (AICPA) opined that: "Accounting actually is information system and if we be more precise, accounting is the practice of general theories of information in the field of effective economic activities and consists of a major part of the information which is presented in the quantitative form".Boockholdt (1999) defined accounting information system as systems that collect, process and categorize data and report financial events with the aim of providing relevant information for decision making purposes.
As an important aspect of management information system, accounting information system processes financial data or transactions and provides financial information and reports to managers for planning and controlling current and future activities whilst assisting stakeholders with reliable information for rational decision making.

History of accounting information system
Before 1970 and 1980, the most commonly used accounting information system was the general ledger, thus the manual system.Daily transactions were recorded by hand into a journal and then posted to the general ledger account before financial statements could be prepared.These processes were noted to be slow and inaccurate since mistakes in the process took too long in detecting and correcting (Hous, 2013).
Through the 20 th century, revolution in the Information and Communication Technology (ICT) brought a positive influence on the accounting processes.The first use of the term "computerized accounting information system" became known in the 1920's but Scholars during that period conceded that, the development of CAIS's had even begun earlier.For instance in 1890's, calculating machines, like Hollerith device were invented to meet the needs of cost accountants (Badua & Watkins, 2013).
The introduction of user friendly business software packages changed the processes involved in the accounting cycle.Accounting operations that was performed manually were replaced with computers in most organizations.A countess Ada Lovelace computing device was the first to be developed and used for accounting duties.The IBM 9Pac was one of the earliest business software packages that were developed before the invention of many modern accounting software packages (Novinson, 2013).In 1973, SAP software program was released and updated in 1975 to include features that enabled businesses to do purchasing, inventory management and other accounting related tasks automatically.
During the period of growth and development of information technologies in accounting, the manual system of handling accounting data was substituted for computerized system and these made the work of accountants and businesses less difficult and more productive.Business owners, who had limited knowledge in accounting, could manage their accounting duties with available software packages (Hous, 2013).

The threats of using computerized accounting information systems in the banking industry
According to Tanya et al. (2018), theft of corporate information, unauthorised access by outsiders, employees' misuse of internet access privileges and viruses are common threats to CAIS.Wahab (2003) also attest that computer virus is one of the threats and restrictions of the computerized system.
A lot of studies have used various empirical approaches to investigate threats to CAIS in most part of the world, for instance, in China (Hood & Yang, 1998); Jordan (Zweilf, 2009;Hanini, 2012); Egypt (Abu-Musa, 2005); Nigeria (Muhrtala & Ogudeji, 2013); Kenya (Polo & Dima, 2013).The findings of Hong and Yang (1998) revealed human security threats particularly malicious attack from outsiders as the most significant security threats facing Chinese banking industry.In British, Australian and American firms, Waren (2002) established weakness of technological security procedures as a significant challenge of information systems in British and Australian firms but wrong entry of financial data into the system as the problem among American firms.
The findings of Zweilf (2009) corroborates Abu-Musa ( 2005) that unintentional and intentional entry of bad data, unintentional destruction of data by employees, employees' sharing of passwords, introduction of viruses to the computer system, unauthorized visibility of documents are amongst security threats to CAIS.Other studies suggest that accidental entry of bad data by employees, accidental destruction of data by employees, employees sharing of log-on credentials, introduction of virus into the system, unauthorized access to information and unauthorized documents visibility through display on the screen are the major security threats to computerized accounting information systems (Muhrtala & Ogundeji, 2013).
Criminal activities undertaken through computers and the internet continue to threaten organizations and it is financial institutions that usually fall victims to these increasing threats.Findings from PWC's Global Economic Crime Survey (2016) shows that 54% of organizations in the world have been threatened via fraudulent and other economic crime activities.This crime rate dropped to 49% in 2018 when a similar study was carried out by PWC.It is obvious that some organizations are more vulnerable to these cyber-attacks than others.Studies show that one of the target organizations for cybercrimes is the banks.PWC (2014) ranked cybercrime as the second most common type of economic crime that threatens banks.About 65% of the total fraud cases reported by financial institutions are technology related (PWC, 2015).Cyber-attacks are marshalled through payment cards, debit and credit cards, and technological devices like the ATM's.In India for instance, banks offering online banking services usually become susceptible to computer threats (PWC, 2015).In Zimbabwe, hacking, phishing, identity theft and malware are the major types of cybercrimes in financial institutions (Mugari et al., 2016).
These crimes are targeted at financial institutions and are invariably done for financial gains.In UK, cyber criminals broke into Tesco Bank's CAIS and stole over £2.5 million from the account of about 9000 customers (Raymond & Liisa Lahti, 2017).In 2016, Distributed Denial-of-Service (DDoS) attack threatened the Britain's HSBC, one of the largest banks in the world and brought it operations to a stalemate.This rendered online banking services inaccessible to customers.The Bangladesh Central Bank also suffered cyber threat when the central bank's security system was hacked and the perpetrators transferred $101 million unto another account in other countries (Karim, 2016).Debatably, Asian banks appear as the most vulnerable to these cyber threats.Financial institutions in countries like the Philippines, Japan, Taiwan, Thailand and Vietnam recently became victims to cyber threat (Jones, 2016).In 2016, over 100 organizations in 31 countries in the financial sector had their CAIS threatened (Symantec, 2017).

CAIS and firm's performance
Several studies in different countries have addressed the role of a computerized accounting information system on the performance of the various activities within the organizational set up.In United Arab Emirate (UAE) for instance, computerized accounting information systems have helped companies to develop a better relationship with their clients.Development in computerized system has helped companies to save time in processing transactions (www.ameinfo.com).The adoption of CAIS have brought about development in the financial, administrative performances and an improvement in decision making processes in the financial sector as they provide methods and tools which help in evaluating performance and making productive decisions (Santhanam & Hartono, 2003;Naesa & Khamees, 2009).

Security controls
Security controls refers to tools that provide security services, for example passwords and firewalls.Information systems security control is a means of ensuring business continuity and minimizing business damage by preventing and mitigating the effect of threats to the system (Dhillon, 1995;von Solms, 1998).
Existing literature have identified a number of security control measures necessary to mitigate threats to the CAIS.These control measures have been categorized into physical controls; technical controls and administrative controls.
The threats of using computerized accounting information systems in the banking industry Dougan (1994) suggested the following security controls: minimizing physical dangers in the computer room; maintaining the computer systems and safeguarding the system files.Dougan therefore categorized these security control procedures into Computer room site (physical access); Documentation; Maintenance; and Protection.Qureshi and Siegel (1997)  Although considerable efforts are being made by security agencies to help mitigate the losses from cyber security threats, the security control measures put in place are outpaced by advancement in technology (Mugari et al., 2016).Cybercriminals are continually exploring new ways of attacking computer users.

Research methodology
Descriptive survey design was adopted in this study.The population of the study consisted of financial firms operating in Ghana.The scope of the study was however limited to firms within the Kumasi Metropolis and its environs.These firms included rural banks, savings and loans, and micro-finance institutions.
Though the firms were the unit of analysis, data from each firm was gathered from two groups: the head of IT department and the branch manager.A quota sampling technique was adopted in selecting the banks.
In all, 30 firms were considered for the study.At least five firms from each category of financial institution responded to the survey instrument, with at most two responses each coming from the head of IT and the branch manager.
Data from the target respondents were gathered with the aid of self-administered questionnaires.Based on the study's objectives and materials reviewed for the study, the questionnaire items were mainly close-ended.The nature of the questionnaire items were typically structured using five ( 5) point likert scale, some of which range from 'strongly disagree' to 'strongly agree' and 'not at all' to 'to a greatest extent'.The questionnaire items were presented in four (4) headings: Respondents and firms background information, Sources of risks that threaten CAIS, Causes of risks that threaten CAIS, and Preventive measures.
Quantitative method was employed in analyzing the data gathered.In this regard descriptive analysis techniques were used.Frequencies, percentages, means, and standard deviations became relevant in the analysis.The analyses were also performed with the support of Statistical Package for Social Scientists (SPSS) and Microsoft Excel.

Quality of the study
Quality concerns in empirical investigation tend to be addressed by the concepts of validity and reliability (Bergman & Coxon, 2005)."Reliability and validity are tools of an essentially positivist epistemology."(Watling,as cited in Winter, 2000;Golafshani, 2003).Patton (2002) also asserts that validity and reliability are two The threats of using computerized accounting information systems in the banking industry elements which any qualitative researcher should be particular with while planning a study, analysing results and judging the quality of the study.Joppe (2000) defines reliability as the extent to which the study results are consistent over time and produce an accurate representation of the total population under study.Validity determines the extent to which the research measures that which it was intended to measure (Joppe, 2000).
To improve on the reliability of the data for the study, most of the questionnaire items were in the structured form, making more use of Likert scales.To enhance the validity of the data gathered, the initial data gathering instruments developed were thoroughly examined by IT practitioners.A pilot test was also conducted to ensure that the respondents adequately understand the questionnaire items.Inputs gathered from the pilot study helped in refining the questionnaires to ensure that they gather data for which the study's research questions required.

Ethical considerations
Prior to the study, ethical clearance was obtained from the Managements of the selected financial institutions.Approval relating to the data collection from the respondents was also sought.As a result, two areas of ethical concerns were appreciated during the research.Thus, informed consent and privacy assurance prior to the actual data collection.These concerns were addressed by first writing officially to the Executive Directors of each selected financial institution requesting management consent to undertake the research in the institution and its affiliate branches.
Before the questionnaires were administered to the participants, the respondents were assured that the names of the institutions would remain confidential.Hence the respondents of the various institutions were requested to willingly participate in the study.In this regard, the anonymity of the respondents was assured.

Limitations and delimitations of the study
The main limitation of the study is the sampling technique adopting in selecting the financial institutions.These institutions were sampled based on a quota.A probability sampling technique would have ensured equal chances given to the target respondents.However, for survey studies, since there is a perceived less variability in responses, and for practicality reasons, the quota technique adopted became appropriate.The study is delimited to the participation of three categories of financial firms in Ghana.Financial firms within the universal banking category were not included.
It became difficult making contacts and seeking approvals from the headquarters of most of the financial institutions earmarked for the study.Executive directors of some targeted institutions were reluctant to grant authority to their staff and branch officers to participate in the study.Some management were categorical as it is against their corporate ethics to engage in surveys.Branch officers who have sworn oath of secrecy were also hesitant in contributing to the study.
Due to the busy schedules for banking activities, it became difficult obtaining responses from all the two respondent groups, as a result, the response rate on the part of the managers particularly was smaller.

Results and discussion
The overall responses expected to be received was 60, however, 49 were duly gathered from the various institutions.This represented 81.67% response rate.The breakdown of the firms' and the respondents' demographics is given in table 1.
Table 1.Demographic and firm breakdown

Findings
This subsection provides general statistics and discussions on the variables considered relevant to attaining the objectives of the study.

Sources of risks that threaten CAIS
In this study, six (6) main forms and sources of risks that threaten CAIS were identified to include risks posed by employees, viruses, power outages, natural disasters, intentional disasters, and threat from outsiders.On a scale of 1 to 5, where 1=not at all and 5=to a greatest extent, the respondents were asked to rate the degree to which their systems are believed to be susceptible to these sources of risks.Table 2 shows the results from these evaluations.The mean scores of responses given in table 2 indicate that CAIS in financial firms within the study's scope are more prone to system damages resulting from power outages, followed by viruses, and employees.However, given a mean score greater than 3.00 indicates that, generally, the respondents perceive that all these factors, to some extent could be sources of risks that threaten CAIS in the industry.

Causes of risks that threaten CAIS
For ease of assessment, the specific causes of risk were broadly categorized into three (3) areas: Activities and Actions of Employees, Weakness in System Security and Preventive Measures, and Weakness in Controls and Standards.The results from these assessments are given in tables 3a, 3b, and 3c.

Employee activities and actions
Results given in table 3a generally indicate numerous possible causes of risks that threaten CAIS resulting from employees' activities and actions in the financial firms understudied.This is because, all risk variables identified to cause threats to CAIS have mean values more than 3.00, indicating that the respondents agree to the fact that these are possible causes of threats to their systems.The most cause of vulnerability to CAIS with regards to the activities and actions of employees was found to be bad data entered unintentionally by employees (M=3.87,N=47, SD=.900).This could probably mean that either the people employed in the industry are perceived to be incompetent or lack skills and knowledge on how to man the systems or enter right data onto the system.This is followed by the chances that employees will make unauthorized copies of the system's output (M=3.78,N=49, SD=.896).Notwithstanding this, the respondents also perceive the likelihood of workers intentionally entering bad data (M=3.73,N=48, SD=1.125) onto the system.The reason for this is better associated with the issue of commitment (M=3.65,N=49, SD=.991) which the respondents consider as a potential threats to CAIS in their firms.

Weakness in system security and preventive measures
Risks springing up from weakness in system security and preventive measures were also perceived and found to be several.Causes of these risks include: the prevalence of infrequent file backups (M=3.71,N=48, SD=1.1166), not frequently updating the system's security (M=3.69,N=49, SD=1.122), access by unauthorized personnel (M=3.64,N=49, SD=1.182), the use of inappropriate firewalls and antivirus (M=3.63,N=48, SD=1.044), etc. Per the scale of the respondents' scores, all these were perceived to be causes of risks that threaten CAIS in the industry, given that their means scores were more than 3.00.

Weakness in controls and standards
In relation to controls and standards put in place to minimize risks that threaten CAIS, the responses indicate that, weakness in their internal control structures (M=3.75,N=48, SD=1.082) could be the main possible cause of risks that subjects CAIS to vulnerability.This is believed to be followed by lack of written policies on systems' security issues (M=3.The threats of using computerized accounting information systems in the banking industry risks to CAIS in the industry is observed to be lack of standard protocols for sharing and sending files (M=3.39,N=46, SD=1.064).

Preventive measures followed in safeguarding CAIS
The possible preventive measures that could safeguard CAIS were classified to include: policies, controls and resourcing, and security measures.On a scale of 1 to 5, the respondents were asked to make assessments on the extent to which their firms are currently making efforts on these dimensions in minimizing risks that threaten CAIS.The results given in table 4 indicate that, generally, financial institutions within the study's scope do poorly on measures needed to safeguard CAIS.All the mean scores were below 3.00, indicating some level of disagreement to the availability of these preventive measures required to mitigate the level of risks that threaten CAIS.
In all, the average respondent perceived that the use of common password, inappropriate firewall and antivirus, antivirus not updated frequently, employees lacking competence, lack of training for employees on how to effectively man the system, weak internal controls, ineffective internal auditing practices, infrequent backups of system files, lack of security policies and lack of protocols for sharing and sending files are the challenges to the security of CAIS in the industry under consideration.

Conclusions
There is no argument about the immense contributions and benefits brought into the financial industry following the emergence of CAIS.Today, with the growth and adoption of CAIS there has been enhancement in administrative works, decision making, client satisfactions and increases in overall operations.Notwithstanding these, it is also clear that there are greater possibilities of risks that pose threats to CAIS.Evaluating the nature of such risks and the preventive measures adopted by firms in the financial firms was therefore timely, which occasioned the need for this study.
Findings of the study indicated the existence of perceived high level of risks emerging from employees, frequent power outages in the country, viruses, threats from outsiders, natural disasters, and disasters driven by human activities.Also, with regards to the respondents' perceptions on the specific causes of these risks, it was revealed that the industry's systems are prone to numerous risks factors, some of which includes bad data entered unintentionally by employees, employees making unauthorized additional copies of the system's output, lack of frequent back-ups, infrequently updates on system security software, access to data by unauthorized personnel, weakness in internal controls, and lack of written policies.The finding is in agreement with those of Zweilf (2009), Abu-Musa (2005) and Muhrtala & Ogundeji (2013).In terms of the industry's current efforts made towards securing CAIS, it was found that, less efforts are being made with respect to restricting the use of common share of passwords, putting in place appropriate and updating firewalls and antivirus, recruiting competent employees, training employees frequently, ensuring effective internal controls and audits, backing up system files, adopting appropriate policies and protocols for sharing and sending files.
However, on the basis of the findings and conclusions reached, it is recommended that certain measures need to be implemented to eliminate weaknesses and strengthen security controls against the threats of using CAIS.According to Horan (2017), the utmost defence mechanism against computer threat is education and training.Management should provide continuous security awareness training and education programs for new and existing employees to equip them with the importance of their commitment to control measures concerning the safety and security of the firms systems.This help keep employees awake on security threats The threats of using computerized accounting information systems in the banking industry to the system and to thwart attacks.The requirement to acquire an uninterruptible power supply (UPS) by financial firms to protect their CAIS from frequent power outages is recommended.This emergency power supply has the capacity to provide power for a limited time to allow for effective shutting of computers during a power outage.
In order to keep the CAIS safe there is the need to do more than simply installing an antivirus program once and leaving it alone.It is very essential to update the antivirus software frequently to sure that it has all the information it needs to fight the most recent threats.There is the need to put proper protocols in place to ensure that valuable information which could be stolen, corrupted, deleted by a virus is secured.It must be noted that cyber criminals are always looking for means to create new and more powerful viruses.As a result, if the antivirus software is not updated against the most recent viruses that have been created, then the organization may be exposing itself to attacks.
Hacking is one of the most known forms of computer crime.In this context, it refers to the unauthorized access to another person's information.Hackers hack into company's information systems for financial benefits and to access personal information and files of others.It is recommended that company's remain alert and adopt a comprehensive security measure including file sharing and data management solutions to safeguard information system.The Ghanaian legislative must institute clear legislatures and deterrent penalties regarding cybercrimes to scare people from unauthorised access and intrusion of information systems for which they do not have authority over.Again, sensitive data stored should be encrypted by management of the financial institutions to reduce the chances of unauthorized access or exposure to people who do not have the right to access files.
Advancement in regulations in the financial service sector is necessary to help curb the threats to CAIS among players in the financial service community.With cyber threats now demonstrating to be a major challenge for financial institutions around the world, there is the need for the industry players to seriously raise their defence mechanisms to compensate for the losses and to control the emergence of subsequent threats.Stronger collaboration among banks globally and security agencies can significantly help to effectively counter threats to CAIS.Terrorizations these days are global, refined, and effectually organized.To effectively fight it, the financial community and law enforcement agencies must create open relationships, and develop new ways to effectively share information when threat ensues.
Centre for the Protection of National Infrastructure (CPNI) notified the UK government agencies and industries about the government adoption of the 20 critical security controls.The Commander of the US Cyber Command and Director of NSA said, the adoption of the security controls was a good basis for effective Cyber Security.The Idaho National Laboratory, in June 2012 completed a positive analysis of how the 20 critical security controls applied in the electric sector (SANS Cyber Defence, 2014).
In 2008, the office of the Secretary of Defense in the United State (US) mandated the National Security Agency (NSA) to prioritize a list of security control measures to assist the Department of Defense (DoD) rank its cyber security spending.A consortium led by John Gilligan of Centre for Internet Security (CIS) and Alan Paller of SANS institute also participated in a public-private partnership to provide the same control-prioritization knowledge as provided to the DoD for civilian government agencies.The membership of the consortium was expanded to include the United Kingdom's Communications Electronics Security Group (CESG) and Centre for the Protection of National Infrastructure (CPNI), the DoD Chief Computer Network Architect, Defense Cyber Crime Center, three Department of Energy (DOE) laboratories, and companies like McAfee and Lockheed.The consortium unanimously agreed on 20 critical controls that can address the most prevalent threats found in government agencies and industries.These security controls have since been accepted, adopted and implemented by many organizations and departments in the world.For instance in 2009, the United State Department of State certified the consensus security control measures.In December 2011, the United Kingdom's