Search results

1 – 4 of 4
Article
Publication date: 13 July 2020

Issam Tlemsani, Farhi Marir and Munir Majdalawieh

This paper revolves around the usage of data analytics in the Qur’an and Hadith through a new text mining technique to answer the main research question of whether the activities…

Abstract

Purpose

This paper revolves around the usage of data analytics in the Qur’an and Hadith through a new text mining technique to answer the main research question of whether the activities and the data flows of the Murabaha financing contract is compatible with Sharia law. The purpose of this paper is to provide a thorough and comprehensive database that will be used to examine existing practices in Islamic banks’ and improve compliancy with Islamic financial law (Sharia).

Design/methodology/approach

To design a Sharia-compliant Murabaha business process originated on text mining, the authors start by identifying the factors deemed necessary in their text mining techniques of both texts; using a four-step strategy to analyze those text mining analytics; then, they list the three basic approaches in text mining used for new knowledge discovery in databases: the co-occurrence approach based on the recursive co-occurrence algorithm; the machine learning or statistical-based; and the knowledge-based. They identify any variation and association between the Murabaha business processes produced using text mining against the one developed through data collection.

Findings

The main finding attained in this paper is to confirm the compatibility of all activities and the data flows in the Murabaha financing contract produced using data analytics of the Quran and Hadith texts against the Murabaha business process that was developed based on data collection. Another key finding is revealing some shortcomings regarding Islamic banks business process compliance with Sharia law.

Practical implications

Given Murabaha as the most popular mode of Islamic financing with more than 75% in total transactions, this research has managed to touch-base on an area that is interesting to the vast majority of those dealing with Islamic finance instruments. By reaching findings that could improve the existing Islamic Murabaha business process and concluding on Sharia compliance of the existing Murabaha business process, this research is quite relevant and could be used in practice as well as in influencing public policy. In fact, Islamic Sharia law experts, Islamic finance professionals and Islamic banks may find the results of this study very useful in improving at least one aspect of the Islamic finance transactions.

Originality/value

By using a novel, fresh text mining methods built on recursive occurrence of synonym words from the Qur’an and Hadith to enrich Islamic finance, this research study can claim to have been the first of its kind in using machine learning to mine the Quran, Hadith and in extracting valuable knowledge to support and consolidate the Islamic financial business processes and make them more compliant with the i.

Details

Journal of Islamic Accounting and Business Research, vol. 11 no. 10
Type: Research Article
ISSN: 1759-0817

Keywords

Article
Publication date: 14 November 2016

Osama El-Temtamy, Munir Majdalawieh and Lela Pumphrey

This purpose of this paper is to assess information technology (IT) disaster recovery plans (DRPs) in publicly listed companies on Abu Dhabi securities exchange (ADX) in the…

Abstract

Purpose

This purpose of this paper is to assess information technology (IT) disaster recovery plans (DRPs) in publicly listed companies on Abu Dhabi securities exchange (ADX) in the United Arab Emirates. The authors assessed, among other things, DRP preparedness, documentation, employees’ preparedness and awareness and the most significant physical and logical risks that pose the most threads to drive the development of the DRP, etc.

Design/methodology/approach

The authors surveyed publicly listed companies on the ADX using a questionnaire adapted from past research papers as well as from audit programs published by the Information Systems Audit and Control Association. The surveys were completed through interviews with middle and senior management familiar with their firm’s IT practices.

Findings

The majority of the respondents reported having a DRP, and a significant number of the respondents reported that their top management were extremely committed to their DRP. Employees were generally aware of their role and the existence of the DRP. The greatest risk/threat to their organization’s IT system was logical risk followed closely by power and network connectivity loss as the second highest physical risk. The most highly ranked consequence of an IT disaster was loss of confidence in the organization.

Research limitations/implications

Because this paper only examined publicly listed companies on ADX, the research results may lack generality. Therefore, further research is needed in this area for determining the extent of the deployment of the DRP in the region.

Practical implications

Results of this paper could be used for IT DRP planning bench-marking purposes.

Originality/value

This paper adds value to research by investigating the current IT DRP practices by public companies listed on ADX.

Details

Information & Computer Security, vol. 24 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 17 April 2009

Munir Majdalawieh and Issam Zaghloul

This paper seeks to identify change factors within the various elements of the IS audit universe aiming to give practitioners and management insight about the state of the IS…

2597

Abstract

Purpose

This paper seeks to identify change factors within the various elements of the IS audit universe aiming to give practitioners and management insight about the state of the IS audit profession and its future directions, especially within the United Arab Emirates (UAE) context.

Design/methodology/approach

Potential change factors that are taking place in IS audit were initially identified based on a literature review and the experience of the authors within the field. These changes were then categorized within one of the elements of the IS audit universe. To validate the IS audit change factors, a questionnaire was chosen as a data collection tool. The survey was sent to relevant practitioners in the subject matter within the UAE and was completed by 62 respondents.

Findings

The study concluded that the role of IS auditors in lessening in applications and infrastructures audits and is strengthening in the arena of IT management audits.

Practical implications

The implication of study for IS audit practitioners is that they need to be better equipped to conduct IT management audits and to contribute value to their organization as part of IT governance endeavors rather than focusing on infrastructure and application audits. On the other hand, the implication for management is that they should be aware of the capabilities of IS audit and set their biggest value expectations in the area of IT management assurance and governance.

Originality/value

The paper makes a contribution by identifying change factors within the various elements of the IS audit universe aiming to give practitioners insight about the state of the profession and its future directions.

Details

Managerial Auditing Journal, vol. 24 no. 4
Type: Research Article
ISSN: 0268-6902

Keywords

Article
Publication date: 13 April 2012

Munir Majdalawieh, Sofiane Sahraoui and Reza Barkhi

The pressure is on organizations to go beyond automating their internal audit activities and develop and integrate internal auditing into business processes of the enterprise…

1944

Abstract

Purpose

The pressure is on organizations to go beyond automating their internal audit activities and develop and integrate internal auditing into business processes of the enterprise. This paper aims to propose a “full power” continuous auditing (CA) model with three key components: electronic audit evidence functions; intra‐process auditing; and inter‐process auditing.

Design/methodology/approach

This paper follows a design science approach by identifying relevant problems from the current literature, defining the objectives of the study, designing and developing the “full power” CA model, and evaluating the model. The model supports business process‐centric auditing and enhances the business monitoring capacities of organizations enabling the fulfillment of increasingly stringent compliance requirements with internal policies as well as external regulations.

Findings

This work has attempted to fill the gap between the enterprise solutions offered by enterprise system providers and a structured approach to auditing within enterprise environments by proposing the IIPCA model which combines the automated controls inherent in the systems with continuous audits based on electronic audit evidence. The approach provides for auditing both within and between processes ensuring comprehensiveness of the audit process.

Originality/value

The paper makes a contribution by proposing a “full power” continuous auditing model on the principle of continuous monitoring and with predefined building block components; facilitating the integration of continuous auditing within business information processing in an enterprise using different building blocks; and giving practitioners insight on the adoption of the CA in the enterprise and how it will enhance their audit effectiveness, and audit efficiency.

Details

Business Process Management Journal, vol. 18 no. 2
Type: Research Article
ISSN: 1463-7154

Keywords

1 – 4 of 4