Perceived Threats Of Computerized Accounting Information System And Provides Suggestions On How To Prevent The Occurrence Of These Potential Dangers

1978 words - 8 pages

AbstractThis essay briefly introduces the perceived threats of Computerized Accounting Information System and provides suggestions on how to prevent the occurrence of these potential dangers. Though the computer technology makes the accounting operation more accurate and faster, this still involves several threats in terms of the security and reliability of the accounting information. Fraudulent activities, management cheats, virus infection, costs and so forth, are all need precaution from the operation of the organization. However, proper selection of software, execution of internal control and other precaution measures may help relieve from the threats.IntroductionWith rapid development ...view middle of the document...

Though these problems have been emerged since the manual accounting information system, the new computer-based accounting information system makes it easier for the internal personnel to cheat. Because the computer has a speed that is unprecedentedly fast and can process complex information which facilitate the fraudulent activities.One of the most common types of the fraudulent activities is unauthorized access of the accounting information system, which means that people without proper authorization access to the data stored in the accounting information for illegal purposes, such as copy the key information for the competitors of the organization or saving the value information for personal use. According to the Computer Misuse Act, the following aspects of unauthorized access are illegal, "unauthorized Access to Computer Material, unauthorized Access to Computer systems with intent to commit another offense and unauthorized Modification of Computer Material" (Tricia Ellis-Christensen, 2010) These offenders may be the employee who in charge of the information system or the program designer with advanced technology to access the information system. These employee may encouraged by the financial gain by the outsiders or just want to revenge to the company after certain unpleasant affairs with the organization. To prevent this occur, "make sure a password has been set on computer. Default passwords such as password, root, admin or no password will allow easy access to your computer or your Internet account." (Computer hope, 2010) this means passwords and relevant authorization are suggested to prohibit the outsides accessing the information system. In addition, read only access also ensure the safety of the data stored in the information system.Another typical fraudulent activity is to distort the information for personal gain. For example, the inventory on hand is accounted at the end of the period and may be different from the real amount due to the loss or damage. Thus the related internal employee may collude to understate the amount of the inventory and illegally sell or take up certain amount of inventory. The means to prevent such threat involve the division of work and staff rotating. On one hand, assigning specific job to different employees can reduce the possibility of stealing inventory as supervision staff can monitor the operation of the employee designate to the inventory transaction. On the other hand, staff rotating makes it difficult for the internal employee to fraud due to the familiarity with the certain procedures and with the relevant employee who are in charge of the operation such as inventory transactions.Besides the threat that comes from the personnel, the computerized accounting information system also gave the top management a handle to fraud in order to withhold the information from the investors to increase or sustain stock price. To demonstrate this threat we need look no further than the Enron Scandal, which...

Other Essays Like Perceived Threats Of Computerized Accounting Information System And Provides Suggestions On How To Prevent The Occurrence Of These Potential Dangers

Potential Benefit and Implications of the Software to the College

1206 words - 5 pages Potential Benefit and implications of the software to the college Introduction: In this document I will be explaining the potential benefits and the implications of the software to the college. When the college installs a new piece of software there will be a lot of advantages and disadvantages once the piece of software is installed. The software that has been installed on to the computer in the college will be enabling the college students

Users Of Accounting Information Essay

2060 words - 9 pages Revenue: National Board of Revenue uses the company’s financial reports to know whether the company is operating within prescribed rules or not. They also want to know the accounting information for preparation and execution of plans. Financial Advisors: Financial advisors seek for the accounting information with a view to make effective and successful opinion and suggestions about the financial condition. Government: Various types of

What Threats Have Industrialization and Urbanization Posed to the Cohesion and Stability of the Modern State?

1590 words - 7 pages state, it refers to the condition of a system which is the condition of Nigeria as a whole. In this essay, the threats on the cohesion and stability of Nigeria induced by industrialization and urbanization are assessed in threefold: health threats, criminal threat and threat regarding food insecurity. The aforementioned threats to be analyzed are intertwined with the concept of urbanization and industrialization and the repercussions of food

The "Information Superhighway" Provides Educational And Economical Benefits, But Also Poses A Threat To Teachers And Students

708 words - 3 pages The "Information Superhighway" provides educational and economical benefits, but also poses a threat to teachers and students. One of the many report's written by the United States Council on the National Information Infrastructure called "The Information Superhighway Will Offer Many Benefits," is filled with a good amount of information on how students and teachers benefit from the Internet. The council also emphasizes on how our economy can

Ethical Risks and Threats in the Accounting Profession

2316 words - 10 pages arose (Bowman 2005). This disregard for the lack of time spent on audits resulted in a lack of attention to catching creative and fraudulent accounting. Since the major accounting scandals, new reforms, regulations, and calls for increased higher education have been introduced to combat the dangers of unethical behavior. Accounting education is viewed as one potential remedy to address the profession’s ethical crisis (Humphrey 2005). Has

The Dangers Of Drinking And Driving

2281 words - 10 pages This article talks about the statistic and the affects Drinking and driving have on the community. It shows that traffic crashes which had fatalities were more likely to be as a result of alcohol especially in young people. The amount of money and time spent on these efforts to decrease this number is a result of congress passing a bill authorizing more than 17 billion dollars in effort to fight this drinking and driving problem. Some of

Qualities of Effective Accounting Information

600 words - 3 pages representation of what occurred by seeking to provide complete and neutral information, free of errors (FASB, 2010, p. 17). These fundamental qualities assist a decision maker in determining which alternative provides the most useful information for decision-making purposes. Secondary Qualities The secondary qualities that make accounting information useful are comparability and consistency. As stated in the FASB Concepts Statement Number 8

"The Dangers of Cults"

527 words - 3 pages psychopathology of the leader, not his charisma, that causes the systematic abuse and exploitation typically found in cults.The two most notable tragedies involving these groups' members are the Branch Davidians and the People's Temple. The Branch Davidians were led by David Koresh. Due to his alleged statutory rape and polygamy advocacy, on February 28, 1993 the ATF raided the compound, Mount Carmel. The fifty-one-day siege ended when the FBI, who

How Do Airports and Airlines Address the Future Threats to the Aviation Industry?

2147 words - 9 pages SC 1205 ASSIGNMENT 2 How do Airports and Airlines address the future threats to the Aviation Industry? INTRODUCTION As the aviation industry is a multi-billion dollar business and is fast growing, the threats it is facing are also increasing on a fast pace. The airports and airlines have been discovering and developing measures to combat these threats. Through the years, security procedures evolved and it has been observed that most of

Partial Introduction of Computerized Es

1521 words - 7 pages involved in the growth of the technology. Hence, this research focuses on how this computerized enrollment system help the present and hopefully the future administration of the said organization. It is not only for the institution itself but also for its other beneficiaries. 1.2 Statement of the Problem This project is intended to support the efficiency of the created system and provide further analysis for the chosen institution, La Purisima

In Both the Uk and the Us, the Prison System Is Being Increasingly Contracted Out to the Private Sector, Often Public Corporations. (the Largest of These Is the Corrections Corporation of America, a...

2059 words - 9 pages  contributed  equally  to  this  report.       In  both  the  UK  and  the  US,  the  prison  system  is  being  increasingly  contracted   out   to   the   private   sector,   often   public   corporations.   (The   largest   of   these   is   the   Corrections   Corporation   of   America,   a   NYSE   listed

Related Papers

Computerized Accounting System Threats In Malaysian Public Services

3723 words - 15 pages Malaysia, this research may provide an insight of perceive information system threats especially in computerized accounting environment. This may benefited the regulators and service providers on the threats issues and may trigger the awareness to improve their system security. Through 19 computerised accounting threats listed for evaluation in the survey question, the findings reveal that most of CAS security threats are originated by the internal

Information System About Accounting Essay

1127 words - 5 pages Information system about accounting Accounting Information Systems (AISs) combine the study and practice of accounting with the design, implementation, and monitoring of information systems. Such systems use modern information technology resources together with traditional accounting controls and methods to provide users the financial information necessary to manage their organizations. AISs cover all business functions from backbone

Accounting Information System Report

2045 words - 9 pages REPORT ON REDUCING COMPUTER FRAUD Name: ZHAOJUN HU Student NO: 20137098 Class: TACC403 Accounting information system Submission date: September 20, 2013 TABLE OF CONTENTS EXECUTIVE SUMMARY i INTRODUCTION 1 IS SOFTWARE LICENSING ANTISOCIAL?..................................................................2 COMPUTER SECURITY MEASURES 3 WOULD THE REMOVAL OF COMPUTER SECURITY MASURES REDUCE THE INCIDENCE OF

Evaluate The Opportunities And Threats Faced By Companies Marketing To Children. In Your Answer Provide Examples Of How Firms Are Responding To These Challenges And Opportunities In Their Marketing...

2223 words - 9 pages society as a whole and there are expectations that companies will strive to be greener, to reduce carbon footprints and to be involved with fair trade. Children in particular have an interest and a stake in protecting the environment. Examples of how the external factors can affect companies as both opportunities and threats are discussed below: Opportunities There is no doubt that children make up an attractive and valuable market segment