Free Essay

Computerized Accounting System Threats in Malaysian Public Services

In:

Submitted By mahlindayu
Words 3709
Pages 15
Computerized Accounting System Threats in Malaysian Public Services

Mahlindayu binti Tarmidi1, Azwan Abdul Rashid2, Mohmad Sakarnor bin Deris3, Rusli Abdul Roni4

1Department of Accounting. College of Business Management and Accounting, Universiti Tenaga Nasional, Bandar Muadzam Shah. 26700 Pahang
4Deprtment of Business and Accounting, College of Foundation and General Studies, Universiti Tenaga Nasional, Bandar Muadzam Shah. 26700 Pahang

[pic]

Abstract Numbers of incidents pertaining data errors, system breach, violation of internal control and manipulation of financial information had raised the organization attention and concern. Organizations are consequently more aware of the security and integrity issues in regards of the computerized accounting system and the need to take appropriate action. This research is to investigate the security threats issues in computerized accounting system in Malaysian public services. Through questionnaires to 500 CAIS user in the Jabatan Akauntan Negara Malaysia (Accountant General Department), the study findings show the users perception of the current state of threats faced by the system. Though most of the listed threats are perceived to be rarely happen, but there are group of people indicates those incidents still taken place. Hence, this empirical evidence may enable the public services department to evaluate their computerized accounting system security, and begin to properly pursue effective strategies to improve quality and lower the risk of incidents.

Keywords Computerised accounting system, system threats, Jabatan Akauntan Negara

[pic]

1. Introduction

The revolution of accounting systems used in Malaysian Public sector begins in early 1969, namely Program Performance Budgeting System (PPBS) for budgeting purposes. As result of difficulties in implementation, in early 19810’s, a new system was introduced (MBS), with the main objective to increase the efficiency in the financial management of government specifically, to increase accountability among controlling officers and program and activities managers. In 1992, the government introduced the Macro Accounting System (MAS), which was designed to facilitate the collection, processing and preparation of the cost information, prepare information on cost efficiently and in a more flexible manner, produce reliable cost information and contribute to the optimization of the use of resources [1]. In 2006, Government Financial Management and Accounting System (GFMAS) was introduced to the Accounting General Department (AGD) of Malaysia. GFMAS helps to smoothen the financial planning, budget control and Government accounts. It combines all the accounting functions such as payment, receipts, managing salaries, Government loans, Loans and Advances to public servants. The GFMAS can record a complete budget planning, flexible to cash and accrued account, and increase the security [2].

The development showed the vital role played by Computerized accounting system (CAS) in providing most appropriate and a clear picture of accounting information’s in a systematic manner. The presence of growing security threats has result in lack of confidentiality, integrity and availability of the information which affects the business activities of many organizations. Recently, CAS involves use of present technological advances. Besides make a revolution in traditional paper methods of accounting. But on the other hand, the rapid changes in technology had created significant risks in ensuring the security and integrity of CAS [3]. Focusing in the computerised accounting environment, number of studies prevail the internal forces which contributed to information security threats. Employees may play a vital role if they are not fully train and enforced the awareness about system security. Among the incident happened as a result of employees weakness are accidental entry of bad data, accidental destruction of data, intentional data destruction, misinterpreted of data, misused of data and improper use of data. ([4], [5], [6] and [7]. [8] supported in his study which proof that the most threats to organisation information system are from insider not outsider. In the context of Malaysia, a study was done by [9]. One of the discussions on security incidents in Malaysia Public Service Organisation, highlighted that 25% of the incidents were originated by insiders, 11% was the combination of internal and external forces. This actually in line with the survey result by [10] and [11], which indicate that most threat to information security are from inside the organisation As reported by [12], the increase in the number of reported cyber incidents imply that the issue of security in computerised accounting system (CAS) is noteworthy. The effect of such incidents could leave the investor wary and lacking faith in the integrity of published financial reports, and to a certain extent, leading to legal liabilities and severe financial damages [13]. According to [4], the AICPA technology division recognised the importance of CAS security to help ensure the integrity of the information in the companies’ financial reports in an attempt to restore investor confidence. While these companies’ faces daunting challenges amid rapid technological changes, there is a growing need to better understand the security threats of CAS. Furthermore, the CAS represents the largest and vital component of management information system (MIS) environment as it provides financial information to the management [14]. This present study is timely in providing the much needed empirical evidence with a view of contributing to better understanding of security threats issues particularly in the Malaysia Public Services CAS environment. Only with a clear understanding of actual threats in CAS, the Malaysia government could define their implementation of security tasks more successfully, which in turn could enhance the integrity of its information. At the same time, this study also serves as a practical reference for the development of the awareness on the subject matter. Therefore, the purpose of this study is to investigate the perception of users on CAS threats faced by the user of GFMAS, in the Accountant General Office in Putrajaya, Malaysia.

2. Research methodology

The population of this study was drawn from the user of GFMAS in the Accountant General Department of malaysia located in Putrajaya, Malaysia. The whole user were invited to participate in the surver and out of 500 questionnaires mailed to respondents, 331 were returned and only 323 were used for further analysis. The questionnaire was adapted from the one used by [15] who explored the perceived threats of CAIS in Saudi Arabia. It was divided into two parts, which is the first part inquire on the respondent personal information and the second part, the respondents are required to rate, based on a five-point Likert scale (1= strongly disagree;2= disagree; 3= neutral; 4= agree; 5=strongly agree), the threats in their accounting information system. The female respondent had dominated the group (77%) with most of the respondent were at age 21-30 years old. The respondent is grouped between IT and Non-IT department as the study would try to investigate any correlation between different departments towards CAS threats. But, the users were mostly from Non-IT department which this may contribute to biasness in the result later. There were three groups of job position stated in the survey question, but only two grades were marked. Non of the respondent were JUSA, and 75% were between grade 14-40. This may related to the highest qualification held by them which is in diploma level (42%). Finally, most of the respondent only had served the section for less than 5 years (41%). Table 1 will further display the detail about the respondent background.

3. Result and discussion

Before further analysis is done, it is crucial to test the reliability and consistency of the instrument used. Through reliability test, the Cronbach alpha was at 0.95 and all 19 items of the listed incidents were kept. The threats of accounting system may occur during data input, data processing, database and data output [16]. Hence, the 19 threats adopted were reclassified based on the four areas with human made and natural disaster in its own category, the findings are discussed in the following section. The detail findings on perception of user towards the security threats is display in detail in Table 2.
| |
|Table 1: respondent personal information |
| |Frequency |Percent |
|Gender |Male |73 |22.6 |
| |Female |250 |77.4 |
| |Total |323 |100.0 |
|Age |<20 years |1 |.3 |
| |21 - 30 years |167 |51.7 |
| |31 - 40 years |106 |32.8 |
| |41 - 50 years |25 |7.7 |
| |> 50 years |24 |7.4 |
| |Total |323 |100.0 |
|Department |IT department |46 |14.2 |
| |Non-IT department |277 |85.8 |
| |Total |323 |100.0 |
|Job Position |GRED41- 54 |78 |24.1 |
| |GRED 17- 40 |245 |75.9 |
| |Total |323 |100.0 |
|Educational |Foundation/Certificate |73 |22.6 |
|Background | | | |
| |Diploma |135 |41.8 |
| |Degree and above |115 |35.6 |
| |Total |323 |100.0 |
|Working |<5 years |133 |41.2 |
|Experience | | | |
| |6 - 10 years |105 |32.5 |
| |>10 years |85 |26.3 |
| |Total |323 |100.0 |

3.1 Data input
Two threats were categorize in the group and more almost 50% of the respondent agreed that accident bad data entry is considered as threats but intentional act for the incidents is perceived as not a threats. What is alarming there is still more than 20% did not really sure the perception of those incidents. This may trigger for more awareness training on the secueirt threats of data input among the system user.

3.2 Database
Three items were recognized under the category of database. Password sharing among employees is perceived as the highest threats in the category. But, most of respondent oppose to accept unauthorized access to database both from internal and external is considered as threats. This may reflect their perception towards the vulnerability of password hence may drive them to perceived, access from password sharing is the bigger threats for database.

3.3 Process
For process, five incidents were listed under this category. The most perceived threats is the external virus attack. But 44% form the respondent either disagree or neutral perceiving the incidents as a threat. This may trigger a concern to the management the level of perception of the user towards virus attack. Interception of data during transmission is perceived as the second threats in process. But data destruction by employees both intentionally or by accident were perceived as not a major threat. Not even 30% of the respondents agree on the statement and most of them choose neutral for it.

3.4 Output
Seven incidents were listed to be evaluated as threats to the government CAS. Destruction of output lead the rank as most respondent perceived it as the major threats to CAS. It is followed by theft of data/output and unauthorized copying of output, but still, more than 20% of the respondent did agree with this. More than 40% of respondents agreed that distribution of output to unauthorized and inappropriate recipient are among the threats to CAS. The least threats being perceived for out are unauthorizedly displaying the information on screen and also passing document for shtredding to inappropriate person. Nonetheless, more than 40% were agreed their CAS may face that incidents as threats.

3.5 Other threats
The last two question is regarding the disasters caused both by human and nature. Though most of respondent choose neutral, but more than 40% agreed that these incidents may threats their CAS. Less than 30% disagree on the statement. This may due to their location which rarely involve in any natural disaster such as flood and earth quake. It also indicate that the user perceived other user as trustable and reliable.

3.6 Determinants of perception variations

There are some alarming issues in regards of the earlier findings. There are still some of the users view the listed threats as not a risk to the system. Hence, the study try to further explore the possibility of personal background to influence the respondents perceptions towards CAS threats. This is to test the hypothesis developed:

H1: personal background is the factor for the variations of perceptions of CAS security threats.

Collected earlier there were six categories to represent the personal background of the respondent, namely age, gender, job level, working experience, educational level/background and department, which was group between staff from IT department and staff from non-IT department.

Through Pearson Correlation Coefficient, only educational background have a significant relationship with the perception of threats, r=0.046, p(2-tailed) <0.05. since, there are huge gap between the number of respondent in the category of department, by using the SPSS software, the study had randomly choose 46 respondent from the non-IT department to match with the IT department. The statistical result shows, there is no significant relationship between different department towards the perception of CAS threats (p>0.05).

To further explain the how strong does educational background may explain the variations of perception on threats, the study applied multiple regression analysis. The result shows educational background (β=.11, p<0.05) is the factor for differences on the threats perception. But, it only contributed a small portion of the explaination (R2=1.2%). There are other factors that may be able to explain this variations and it is open for future research. So, the hypothesis is rejected and it is statistically concluded that personal background is not be the major factor of this variation of perceptions.
|Table 3: Model Summary |
|Model |R |R Square |Adjusted R Square |Std. Error of the |
| | | | |Estimate |
|1 |.111 |.012 |.009 |16.46254 |

4. Conclusion And Future Research
The article delivers an exploratory overview of the perceived degree of computerized accounting system security threats in Malaysia particularly in Jabatan Akauntan Negara Malaysia. As there is limited prior academic research on CAS threats in Malaysia, this research may provide an insight of perceive information system threats especially in computerized accounting environment. This may benefited the regulators and service providers on the threats issues and may trigger the awareness to improve their system security.

Through 19 computerised accounting threats listed for evaluation in the survey question, the findings reveal that most of CAS security threats are originated by the internal source which is the employees. In overall, from the dimensions of information system perspective and disasters caused by both human and nature, the respondent perceived them as threats to the CAS. Nonetheless the service provider and the sector should pay more intention about this issue as the highest score on the perception of the threats goes to neutral. A further investigation might be appropriate to evaluate the underlying reason for the perception. Among the possible reason could be the degree of exposure towards the type of threats that might be faced in the computerized system environment, as discussed by [17], which highlights about the lack of training among employees may lead to misunderstand and misuse of the system.

Another point to highlight is the degree of understanding on the seriousness of virus attack as threats. There are still some of the respondent perceived it as not contributing any risk to the system, a extensive exposure about the cost and effect of the attacks may be appropriate. [18]. Highlighted the losses faced as the result of the attack.

Opposing the result gathered by [4], natural and human made disaster was found to be the least threat perceived among the user. Another least threats perceived are also theft of data and intentional entry of bad data of employees.

The study also prevail that personal background is not the factor contributing to the explanation of the variations of perception on CAS threats. Of all six categories, educational background only could explain 1.2% of this variation. Hence, there are still huge room for potential future research to be undertaken. Researchers may be interested to investigate the factors that may influence the user perception on threats in order to contribute better understanding on required training to user. Apart of that, the caused and effect research may be appropriate to measure the effect of the threats perception towards the actual incidents happen. The future findings may produce a sound suggestion on type of security features need to be inculcated in a computerized accounting system.

As this research is only focus on the user of GFMAS in Jabatan Akauntan Negara Malaysia located in Putrajaya, this findings may not reflect the whole user of GFMAS nationally, and the general user of any computerized accounting system in Malaysia. widening the scope of respondent type and location might give a more insight and further support this findings.

ACKNOWLEDGEMENTS THE AUTHORS WOULD LIKE TO WISH A SPECIAL THANKS TO THE STAFFS OF JABATAN AKAUNTAN NEGARA MALAYSIA IN PUTRAJAYA WHO HAD KINDLY PARTICIPATE IN THIS SURVEY. ALSO SPECIAL THANKS TO OUR DEAREST STUDENTS WHO HAD ASSIST US IN THE DATA COLLECTION PROCESS.
[pic]

REFERENCES
1] ZAKARIAH SALLEH.(2007). INTERNATIONAL REVIEW OF BUSINESS RESEARCH, MALAYSIAN GOVERNMENTAL ACCOUNTING: NATIONAL CONTEXT AND USERS ORIENTATION. PAPERS,3 (2),376-384..
2] Jabatan Akauntan Negara Malaysia. Online available at: http://www.anm.gov.my/main
3] Abu-Musa, A.A. (2006). Journal of Information System Perceived security threats of computerized accounting information system in the Egyptian banking industry, 20(1), 187-203.
4] Davis, C.E. (1997), The CPA Journal, New York, An assessment of accounting information security, NY, Vol. 67 No. 3, pp. 28-34

5] Ryan, S.D. and Bordoloi, B. (1997), Information & Management, Evaluating security threats in mainframe and client/server Environments, Vol. 32 No. 3, pp. 137-42.
6] Siponen, M.T. (2000), Information Management & Computer Security, A conceptual foundation for organizational information security awareness, Vol. 8 No. 8, Bradford, pp. 31-44.
7] Dhillon, G. (1999), Information Management & Computer Security, Managing and controlling computer misuse, Vol. 7 No. 4, pp. 171-5
8] Abu-Musa, A.A. (2007), Information Management & Computer Security, Evaluating the security controls of CAIS in developing countries: an empirical investigation, Vol. 15 No. 2, pp. 128-14
9] Dhillon, G. (1999), Information Management & Computer Security, Managing and controlling computer misuse, Vol. 7 No. 4, pp. 171-5
10] Ernst and Young (2004). Ernst and Young Global Information Security Survey 2004. Online available at: http://www.ey.com

11] NISER (2004). NISER ICT Security Survey for Malaysia 2004. Online available at: http://www.niser.org

12] MYCERT incident Statistics, online available at: http://www.mycert.org.my
13] McAdams, A. C. (2004). Information Management Journal, Security and risk management: A fundamental business issue, pp. 36−44
14] Spathis, C. (2004). Business Process Management Journal, Enterprise resource planning systems’ impact on accounting processes, Vol. 10 No 2, pp 234-247.

15] Abu-Musa, A.A. (2006). Managerial Auditing Journal, Exploring perceived threats of CAIS in developing countries: the case of Saudi Arabia. 21(4), 387-407
16] Beard. D and Wen.H.J. (2007). Information Systems. The CPA Journal Reducing the Threat Levels for Accounting, 34
17] Wright, S. and Wright, A. (2002), Journal of Information Systems, Information system assurance for enterprise resource planning systems: implementation and unique risk considerations, Supplement, Vol. 16, pp. 99-113
18] Brynes, C. (2005). The Gartner Group: Information Security Trends 2005–2007. Online available at: http://www.gartner.com

|Table 2: Computerized Accounting system threats |

no |threats |IS Component |source |Mean |Strongly disagree |Disagree |Neutral |Agree |Strongly agree |Std. Dev | | | | | | |Freq |% |Freq |% |Freq |% |Freq |% |Freq |% | | |1 |Accidental entry of bad data by employee |Input |Internal |3.44 |11 |3.4 |45 |13.9 |109 |33.7 |106 |32.8 |52 |16.1 |1.03 | |2 |Intentional entry of bad data by employee |Input |Internal |2.56 |101 |31.3 |64 |19.8 |71 |22.0 |49 |15.2 |38 |11.8 |1.37 | |3 |Employees sharing of password |Database |Internal |3.07 |76 |23.5 |39 |12.1 |54 |16.7 |93 |28.8 |61 |18.9 |1.45 | |4 |Unauthorized access of data or system by outsiders (hackers) |Database |External |2.76 |86 |26.6 |65 |20.1 |64 |19.8 |56 |17.3 |52 |16.1 |1.43 | |5 |Unauthorized access to the data and/ or system by employees |Database |Internal |2.71 |84 |26.0 |71 |22.0 |65 |20.1 |61 |18.9 |42 |13.0 |1.37 | |6 |Introduction (entry) viruses to the computer system |Process |External |3.50 |24 |7.4 |29 |9.0 |89 |27.6 |123 |38.1 |58 |18.0 |1.11 | |7 |Interception of data transmission from remote location |Process |Internal |3.19 |27 |8.4 |47 |14.6 |119 |36.8 |97 |30.0 |33 |10.2 |1.07 | |8 |Creation of fictitious or incorrect output |Process |Internal |3.14 |32 |9.9 |61 |18.9 |100 |31.0 |90 |27.9 |40 |12.4 |1.16 | |9 |Accidental destruction of data by employee |Process |Internal |2.92 |47 |14.6 |68 |21.1 |104 |32.2 |73 |22.6 |31 |9.6 |1.18 | |10 |Intentional destruction of data by employees |Process |Internal |2.67 |88 |27.2 |71 |22.0 |67 |20.7 |54 |16.7 |43 |13.3 |1.38 | |11 |Suppression or destruction of output |Output |Internal |3.24 |27 |8.4 |41 |12.7 |124 |38.4 |91 |28.2 |40 |12.4 |1.09 | |12 |Theft of data or information |Output |External |3.23 |28 |8.7 |55 |17.0 |97 |30.0 |101 |31.3 |42 |13.0 |1.14 | |13 |Unauthorized copying of output |Output |Internal |3.21 |25 |7.7 |58 |18.0 |106 |32.8 |93 |28.8 |41 |12.7 |1.12 | |14 |Printing and distribution of information by unauthorized persons |Output |Internal |3.18 |36 |11.1 |52 |16.1 |100 |31.0 |87 |26.9 |48 |14.9 |1.20 | |15 |Prints and distributed information are directed to people who are not entitled |Output |Internal |3.14 |48 |14.9 |47 |14.6 |88 |27.2 |91 |28.2 |49 |15.2 |1.27 | |16 |Unauthorized document visibility by displaying on monitors or printed on papers |Output |Internal |3.10 |38 |11.8 |69 |21.4 |86 |26.6 |82 |25.4 |48 |14.9 |1.24 | |17 |Sensitive document are handed to non security personnel for shredding |Output |Internal |3.05 |52 |16.1 |46 |14.2 |102 |31.6 |79 |24.5 |44 |13.6 |1.26 | |18 |Natural disasters such as fire or flooding | |External |3.10 |40 |12.4 |39 |12.1 |132 |40.9 |72 |22.3 |40 |12.4 |1.15 | |19 |Human made disasters such as loss of power | |External |3.02 |46 |14.2 |46 |14.2 |125 |38.7 |69 |21.4 |37 |11.5 |1.18 | |

Similar Documents

Free Essay

Accounting Information System

...Swan’s Supplies is a wholesaler of sporting goods equipment for retailers in a local metropolitan area. The company buys sporting goods equipment direct from manufacturers and then resells them to individual retail stores in the regional area. The raw data in Figure illustrate some of the information required for the company’s purchase order system. As you can see, this information is characteristic of accounting purchase order systems but is not well organized. In fact, because of the repeating groups in the right-most columns, it cannot even be stored in a computer system. [pic] .:. Requirements Store this data in a spreadsheet to make it easy to manipulate. Then perform each of the following tasks in turn: 1. Reorganize the data in first normal form and print your spreadsheet. Why is your data in first normal form? 2. Reorganize the data from part 1 into second normal form and print your spreadsheet. Why is your data in second normal form? 3. Reorganize the data from part 2 into third normal form and print your spreadsheet. Why is your data in third normal form? SOLUTION: The raw data is as follows: | | | | |Purchase | | | | | | | |Customer | |Phone | |...

Words: 396 - Pages: 2

Premium Essay

Gst Comparison Between Malaysia, Singapore and India

...Overview of GST GST (good and service tax), other words it also known as VAT (value added tax). It have implemented in many countries throughout the world. Currently there are 170 counties in the world that have implemented GST /VAT. NO REGION No of country 1 ASEAN 7 2 Asia 19 3 Europe 53 4 Oceania 7 5 Africa 44 6 South Africa 11 7 Caribbean, Central and North America 19 Table 1: No of countries implement GST/VAT Sources: Ministry of Finance GST is a multi-stage tax system, this is due to its nature which the tax is collected based on the supply of goods and services at each of the supply chain from the supplier to the retailer stage of the distribution. Even though GST is imposed at every stage of the supply chain, but the tax element will be not become a part of the cost of the product, because the GST paid on the business inputs is claimable as input tax. Where the business will pay the GST as output tax and claim for the input tax from the customs. In addition, it does not matter how many stages where a particular goods and services goes through the supply chain because the input tax incurred at the previous stage is always deductible by the businesses at the next in the supply chain. GST consider as a broad based consumption tax, which includes all sectors of the economy. In Malaysia the GST have been establish in a very clear manner, for example all goods and services made in Malaysia including...

Words: 15950 - Pages: 64

Premium Essay

Asdfghjkl

...e-business concepts to a current tourism and hospitality market situation in order to build sustainable competitive advantage. I Introduction Accompanying the technological revolution of the 1990s there are many new opportunities and challenges for the tourism and hospitality industries. Since tourism, global industry information is its life-blood and technology has become fundamental to the ability of the industry to operate effectively and competitively. Poon (1993) suggests that the whole system of information technologies is being rapidly diffused throughout the tourism industry and no player will escape information technologies impacts. The report below gives an insight into the importance of application of information technologies and the use of Internet in tourism and hospitality industries. Two given strategic frameworks provide the analysis of the Internet and its impact on these sectors. This paper also aims to show how technological innovations and information systems can be beneficial for the hotel companies, by using the example of Hilton Hotels Group. II IMPORTANCE OF TECHNOLOGY IN TOURISM AND HOSPITALITY SECTORS Market wisdom today suggests that hospitality companies must embrace technology to compete against traditional competitors, as well as entrants that build their businesses with the latest technology. In this changing environment, new models of distribution must be designed to lead the charge. A strategic information management function should facilitate...

Words: 13798 - Pages: 56

Premium Essay

Strategic Management

...EXECUTIVE SUMMARY Tony Fernandes, as the Chief Executive Officer of AirAsia, decided to pursue his dream to start an airline with the following vision: “To be an airline that flies long-hauls with low fares with a corporate culture that is flexible and functional”. AirAsia has achieved its title as “The World Lowest Cost Airline,” and was also one of the world’s most profitable airlines. This report provides an analysis and evaluation of internal and external of the company. Methods of analysis includes of internal and external assessment and financial analysis. SWOT analysis provided in this report will shows the strengths, weaknesses, opportunities and threats of AirAsia. At last of this report, we have provided the recommendations for AirAsia to increase their performance. 1.0 INTRODUCTION 2.1 Company Background Asia’s leading airline was established with the dream of making flying possible for everyone. Since 2001, Air Asia has swiftly broken travel norms around the globe and has risen to become the world’s best. Air Asia was named the World’s Best Low Cost Airlines in the annual World Airline Survey by Skytrax for five year consecutive years in 2009, 2010, 2011, 2012 and 2013 and has been ranked Top 5 among the most recognized and admired airlines in the Asia Pacific Top 1000 Brands 2008. With a route network that spans through to over 20 countries, Air Asia continues to pave the way for low-cost aviation through our innovative solutions, efficient processes...

Words: 13364 - Pages: 54

Premium Essay

Local Government

...that represent the power whether from federal government or state government, which has limited autonomy in terms of financial and administration, have power to sue and sued by others and have legal property1 Ministry of Housing and Local Government Local Government is infra. Sovereign, Geographic Sub-Division of a Sovereign nation or Quasi Sovereign Nation, exercising the power of jurisdiction in a particular area.2 Dilly M Hill 1 Government of Malaysia, 1970. Report of the Royal Commission of Inquiry to Investigate into the Working of Local Authorities in West Malaysia Kuala Lumpur: Government Printer. 2 Refer to Ministry of Housing and Local Government (MHLG) 1980, Modernization of Local Government System in Malaysia. 1 Local Government as a system of district, territorial unit, which has their own boundary, legal entity, instructional structure, power and task, which is subject to certain act, has a financial...

Words: 22164 - Pages: 89

Free Essay

Paper Fertig

...2008 Systems for Verification of Legality in the Forest Sector, Malaysia: Domestic Timber Production and Timber Imports Adrian Wells (a.wells@odi.org.uk), Thang Hooi Chiew and Chen Hin Keong Contents 1. 2. Executive summary . . . . . . . pg. 3 . . . . . . . pg. 6 3. Law and policy governing forest management . . . . 3.1 Forests under the Federal Constitution . . . . 3.2 Forest management by the States . . . . . 3.3 Key jurisdictional differences between the Peninsula, Sabah and Sarawak . . . . pg. 7 pg. 7 pg. 8 pg. 9 4. Law and policy on wood-based industries and the timber trade . . . pg. 19 5. Responses to illegality in the forest sector . 5.1 Control of domestic timber production . 5.2 Control of timber imports . . . . . . . . . . . pg. 21 pg. 21 pg. 27 6. 7. Institutional structures for legal verification of domestic timber production and imports 6.1 Overview . . . . . . . 6.2 Peninsular Malaysia . . . . . . 6.3 Sabah . . . . . . . . 6.4 Sarawak . . . . . . . . 6.5 Timber imports . . . . . . . . . . . . . pg. 30 pg. 30 pg. 30 pg. 42 pg. 55 pg. 67 The strengths of existing verification systems 7...

Words: 28537 - Pages: 115

Premium Essay

Financial Performance Analysis of Uttara Bank Limited

... "Nourished by the age old heritage of Bengal” [pic] Comilla University An Internship Report On “Financial Performance Analysis of Uttara Bank Limited” An Internship Report submitted in partial fulfilment of the requirements for the degree of Bachelor of Business Administration (BBA) Supervised By Shamem Ara Mili Assistant Professor Department of Accounting & Information Systems Faculty of Business Administration & Management Studies Comilla University . Submitted By Trina Saha Class Roll: 03; Exam Roll: 0806003 Batch: BBA (3rd Batch); Session: 2008-2009 Department of Accounting & Information Systems Comilla University Date of Submission: 10.08.2014 Dedication Letter of Transmittal August 10, 2014 Shamem Ara Mili Assistant Professor, Department of Accounting & Information Systems Comilla University, Comilla. Subject: Submission of the Internship Report. Dear Madam, With due respect, I would like to inform you that, I am Trina Saha bearing student ID: 0806003, a student of Department of Accounting & Information Systems have completed my 3 (Three) month internship at the Uttara Bank Ltd, Maijdee Court Branch under your supervision. It is my great pleasure to inform you that I have the opportunity to submit an internship working report on “Financial Performance Analysis of Uttara Bank Limited”, as a requirement for BBA program. I have tried my best with my knowledge to make...

Words: 22884 - Pages: 92

Premium Essay

Practical Training Report

...Duration of Intern : 13 January till 4 April 2014 2. ACKNOWLEDGEMENT For this opportunity, I would like to thank: MARA Professional College, Seri Iskandar, for giving me opportunity and chances to shine and build up my dream and my ambition as an international business student. I really appreciate for their blood, sweat and tears during teaching me and my friends, motivate us to keep moving forward and keep looking back to repeat our previous history. Probably the best college to learn and worth to strive. Sir Anthony Raj, who is the CEO/Director of SA Kargo and my supervisor. I want to thank him for giving me the opportunity to follow my internship at his company. He had the kindness to accept me in his company and guide me through my internship with advice, feedback and tips despite his busy schedule. Mr. Rajagopal, who is the senior manager (Operation) of SA Kargo, also my previous supervisor before he resigned, thought me a lot of stuff about his work and experience. Mr. Aminuddin, who is my advisor and my lecturer. He helped and coached me during my internship by giving me feedback and tips on how to handle and approach situations. He had always time to answer all my questions concerning my internship. Ms. Syahida, who is working for SA Kargo in Human Resource Department, arranging my internship in her place. I want to thank her for helping me with the process of finding me a suitable department for my internship. Mr. Khairul Hisham, who is my intern...

Words: 6255 - Pages: 26

Free Essay

Strategic Management of Airlines Industry

...Term paper on “The Airline Industry in Bangladesh : A management Colosseum” Faculty of Business Studies Bangladesh University of Professionals (BUP) The Airline Industry in Bangladesh : A management Colosseum Submitted to Major General (Retired ) Professor Alauddin M A Wadud,BP Course Instructor, Strategic Management Faculty of Business Studies Bangladesh University of Professionals (BUP) Submitted by 1. Priodarshine Auvi (EV1202026) 2. Mohammad Abdul Momin (EV1202027) 3. Kazi Kamrul Alam (EV1202029) 4. Mahbubur Rahman (Ev 1202028) 5. Maruf Hossain (Ev 1202014) LETTER OF TRANSMITAL Aug 27, 2013 Major General (Retired ) Professor Alauddin M A Wadud,BP Course Instructor Strategic Management Faculty of Business studies Bangladesh University of Professionals (BUP) Subject: Submission the term paper of “The Airline Industry in Bangladesh: A management Colosseum” Dear Sir, With due respect and humble to inform you that it is my pleasure to submit this report on“The Airline Industry in Bangladesh: A management Colosseum”. As your valuable suggestions and guidance, we have tried my best to prepare the report properly. There may be some shortcomings. We would be grateful if you consider those as excusable points and we like to thank you for your kind cooperation. Despite the limitations, we sincerely believe that you...

Words: 12444 - Pages: 50

Premium Essay

Discrimination of Hindus

...Hindus  in  South  Asia  and  the  Diaspora:   A  Survey  of  Human  Rights   2011               www.HAFsite.org     March  12,  2012                   “All  human  beings  are  born  free  and  equal  in  dignity  and  rights.”   “One  should  never  do  that  to  another  which  one  regards  as  injurious  to   one’s  own  self.    This,  in  brief,  is  the  rule  of  dharma.    Yielding  to  desire  and   acting  differently,  one  becomes  guilty  of  adharma.”   “Thus,  trampling  on  every  privilege  and  everything  in  us  that  works  for   privilege,  let  us  work  for  that  knowledge  which  will  bring  the  feeling  of   sameness  towards  all  mankind.”   Swami  Vivekananda,  “The  Complete  works  of  Swam  Vivekananda,”  Vol  1,  p.  429     Mahabharata  XII:  113,  8     Universal  Declaration  of  Human  Rights,  1948,  Article  1     "All  men  are  brothers;  no  one  is  big,  no  one  is  small.  All  are  equal."   Rig  Veda,  5:60:5       ...

Words: 82692 - Pages: 331

Premium Essay

Human Resource Accounting

...MBA –H4020 Human Resource Accounting HUMAN RESOURCE ACCOUNTING UNIT – I The Non accounting of human resources and the change occurring therein, of an organization may provide a poor picture of the profits and profitability of the organization. Likert Objectives of the Study: This unit aims to provide a basis for the conceptual framework of Human Resource Accounting. An attempt is made to highlight the following aspects. Development of the Concept of HRA An Historical Score Card Meaning and Definition of HRA Importance Objectives of Human Resource Accounting Limitations of Human Resource Accounting HRA for managers & HR Professionals Investment in Human Resources Quality of Work Force and Organizations’ Performance Efficient use of Human Resource Enumerating the Assets Calculating the Market Value of Assets Human Capital. 1 MBA –H4020 Human Resource Accounting INTRODUCTION To ensure growth and development of any orgnisation, the efficiency of people must be augmented in the right perspective. Without human resources, the other resources cannot be operationally effective. The original health of the organization is indicated by the human behaviour variables, like group loyalty, skill, motivation and capacity for effective interaction, communication and decision making. Men, materials, machines, money and methods are the resources required for an organization. These resources are broadly classified into two categories, viz., animate and inanimate (human and physical)...

Words: 55189 - Pages: 221

Premium Essay

Human Resourse Accounting

...HUMAN RESOURCE ACCOUNTING UNIT – I The Non accounting of human resources and the change occurring therein, of an organization may provide a poor picture of the profits and profitability of the organization. Likert Objectives of the Study: This unit aims to provide a basis for the conceptual framework of Human Resource Accounting. An attempt is made to highlight the following aspects.  Development of the Concept of HRA  An Historical Score Card  Meaning and Definition of HRA  Importance  Objectives of Human Resource Accounting  Limitations of Human Resource Accounting  HRA for managers & HR Professionals  Investment in Human Resources  Quality of Work Force and Organizations‟ Performance  Efficient use of Human Resource  Enumerating the Assets  Calculating the Market Value of Assets  Human Capital. INTRODUCTION To ensure growth and development of any orgnisation, the efficiency of people must be augmented in the right perspective. Without human resources, 1 the other resources cannot be operationally effective. The original health of the organization is indicated by the human behaviour variables, like group loyalty, skill, motivation and capacity for effective interaction, communication and decision making. Men, materials, machines, money and methods are the resources required for an organization. These resources are broadly classified into two categories, viz., animate and inanimate (human and physical) resources. Men, otherwise ...

Words: 54154 - Pages: 217

Free Essay

Telco Regulation

...Tenth Anniversary Edition Tenth Anniversary Edition TELECOMMUNICATIONS REGULATION HANDBOOK TELECOMMUNICATIONS REGULATION HANDBOOK The Telecommunications Regulation Handbook is essential reading for anyone involved or concerned by the regulation of information and communications markets. In 2010 the Handbook was fully revised and updated to mark its tenth anniversary, in response to the considerable change in technologies and markets over the past 10 years, including the mobile revolution and web 2.0. The Handbook reflects modern developments in the information and communications technology sector and analyzes the regulatory challenges ahead. Designed to be pragmatic, the Handbook provides a clear analysis of the issues and identifies the best regulatory implementation strategies based on global experience. February 2011 – SKU 32489 Edited by Colin Blackman and Lara Srivastava Tenth Anniversary Edition TELECOMMUNICATIONS REGULATION HANDBOOK Edited by Colin Blackman and Lara Srivastava Telecommunications Regulation Handbook Tenth Anniversary Edition Edited by Colin Blackman and Lara Srivastava ©2011 The International Bank for Reconstruction and Development / The World Bank, InfoDev, and The International Telecommunication Union All rights reserved 1 2 3 4 14 13 12 11 This volume is a product of the staff of the International Bank for Reconstruction and Development / The World Bank, InfoDev, and The International Telecommunication...

Words: 132084 - Pages: 529

Premium Essay

Six Sigma

...Environment; Factors Influencing Consumer Buyer Behavior; Buyer Decision Process; Inputs for Buying Decision Process; Consumer Trends; Market Segmentation Process. Developing Market Strategies and the Offerings Part –I Positioning and Differentiation: Concept, Positioning according to Ries and Trout, Various Tools of Differentiation; Product Decisions and Strategies; Product Mix; Product Life Cycle; Brand Positioning; Brand Identity; Equity and Packaging. Developing Market Strategies and the Offerings - Part II: Introduction to Service Marketing; Differentiating Services; Product and Service Price; Response to Change in Price; Pricing Strategies. Delivering Marketing Programs – Part I Marketing through Channel Partners; Wholesalers and Retailers: Current Trend; Channel Management. Delivering Marketing Programs – Part II Market Communication, Process for Effective Communication; Advertising; Different Advertising Media; Sales Promotion; Public Relations; Direct Marketing; Personal Selling: Concepts and Process; Management of Sales Force Suggested Reading: 1. Marketing Management by Kotler Philip; Publisher: Prentice-Hall of India 2. Marketing Management by Ramaswamy V S and Namakumari; Publisher: S Macmillan India Ltd. 3. Marketing Management by Saxena Rajan; Publisher: Tata McGraw-Hill 4. Marketing in India Cases and Readings by Neelamegham S; Publisher: Vikas...

Words: 96487 - Pages: 386

Premium Essay

Qqqqqq

...organizations and their employees attain their goals. But it faces many challenges along the way. This chapter explores some of these challenges and outlines a strategic human resource management model upon which the rest of this book builds. The Strategic Human Resource Management Model Environmental Analysis Organizational Mission and Goals Analysis Analysis of Organizational Strengths and Culture Analysis of Organizational Strategies Choice and Implementation of Human Resource Strategies Planning Human Resources Attracting Human Resources Human Resource Tactical Plans Placing, Developing, and Evaluating Human Resources Maintaining High Performance Motivating and Rewarding Human Resources Human Resource Systems and Procedures Review and Evaluation of Human Resource Strategies CHAPTER ONE Strategic Importance of Human Resource Management The successful 21st-century organization will not take the loyalty of talented people for granted. It will constantly try to recruit and keep them. … The mutual commitment of an employer and an employee will be one of the most important factors for a 21st-century organization. Subhir Chowdhury1 One CHAPTER OBJECTIVES After studying this chapter, you should be able to: • List challenges facing Canadian organizations in the context of managing their workforce. • Discuss the objectives of human resource management. • Discuss the meaning of strategic human resource management and steps in implementing...

Words: 32978 - Pages: 132