This website uses cookies to ensure you have the best experience. Learn more

The Vulnerability Of Computerised Accounting Information Systems To Computer Crime

1916 words - 8 pages

The vulnerability of computerised accounting information systems to computer crimeAbstractWith the information technology development day-by-day, Computerised Accounting Information System (CAIS) plays an increasingly significant role in the successful operation of today's business. CAIS has been used more and more broadly and had as much impact on organisations, however the computer crime is also an important issue related to CAIS. As the expenditures of computer spending on control and securities are increasing in recently years, as well as the larger proportion of companies suffers computer related losses (Bagranoff & Moscove & Simkin 2003). Therefore, we can believe that the connection between growing dependence on information technologies and computer crime is positive correlated. The main objectives of this essay are to explain what computer crime is and look at the connections between vulnerabilities of Computerised Accounting Information System and computer crime.E-crime presents have become one of the major challenges of the future to Australasian law enforcement (Barbara 2001.p2.).Using accounting software can pose significant vulnerability to computer crime. There are several risks when using finance data files software such as authorized access to data and program, undetected changes to file and processing of unauthorized transactions by outsiders and internal employeesAn internal employee is able to deceive their employer by taking company assets (Rabinovitch 2001). For instance, A rogue trader at Société Générale, Jérôme Kerviel, began making unauthorized transactions beginning in 2005, and lapses in the internal controls allowed the trades to go undiscovered until January 2008, according to a preliminary report released(http://www.nytimes.com/2008/02/21/business/worldbusiness/21bank.html?_r=2&oref=slogin&oref=slogins 2008). In this case, in CAIS, an employee establishes fake company's accounts and has the accounts to pay for goods that are not actually delivered. The inspection is not conducted by a third party; funds from the fake companies come straight to an employee's pocket.As well as employees, management can manipulate financial statements in software to gain a bonus or to gain interest. The company consists of an automated payroll system. The payroll system could be venerable to fraud if adequate internal controls are not implemented (Craig, S.H. 1995). For example, if an employee leaves the company, the payroll officer is able to delay the termination order and changes the mailing address. A payroll officer also has the opportunity to input fake names into the system without independent confirmation.CAIS such as MYOB has an automated bank reconciliation system. It is vulnerable to fraud as it involves reconciling cash resources. Reconciliation should be conducted by separate employees to prevent fraud as it opens the door for covering up discrepancies...

Find Another Essay On The vulnerability of computerised accounting information systems to computer crime

Computer-Based Career Information Systems Essay

1772 words - 7 pages Computer-Based Career Information Systems The adage "information is power" can certainly be applied to the marriage of career information with computers. In an era that is characterized by a rapidly changing employment and occupational outlook, the ability to access computerized career information has been empowering to both youth and adults (Bloch 1989; Tice and Gill 1991). Defined as "all that people need to know to make choices and take

Office Automation Paper: Computer Information Systems

636 words - 3 pages and provide basic account information. The type of software that we use in the organization varies. We just bought new Hewlett Packard computers for our office and the software package that was installed was Windows XP Professional. The PACE system is what we use in the trust and investment accounting system. PACE provides immediate access to account and customer information on fiduciary accounts. Account opening, maintenance and inquiry are

Discussion of Internal Controls that are placed in an Accounting information Systems

2160 words - 9 pages the system my the company's own management and directors. Today more and more companies are moving from the manual accounting systems to computerized accounting information systems. The advantages of a computerized system are increases in the speed and accuracy of processing accounting information.However, as systems become computerized, the internal controls for that system has to be adapted accordingly. This is because computerized systems

Computer Crime, on the increase in many areas: hackers, hardware theft, software piracy and the information highway

1334 words - 5 pages Great Paper Excellent essayComputer Crimeby: Manik SainiAdvances in telecommunications and in computer technology have brought us to the information revolution. The rapid advancement of the telephone, cable, satellite and computer networks, combined with the help of technological breakthroughs in computer processing speed, and information storage, has lead us to the latest revolution, and also the newest style of crime, 'computer crime'. The

Feasibility report. A feasibility study of the feasibility of implementing a computerised information system to a stock broking busines

2189 words - 9 pages catalogues / leaflet delivery service.It is however believed that these manually run activities, can be done far more efficiently by implementing a new information technology system to handle them.Description of Proposed New System.If we want to be able to keep up with the competition from other stockbroking companies, we will have to embrace and keep up with technology and the rapidly advances of today. By implementing new systems, such as a website

Introduction to Computer Crime

2785 words - 12 pages businesses, government companies and the military started relying more on computers over the years. With the lack of law or security with computers and networks in the past, it welcomes computer criminals to join in the flow and use computers for their illegal activities. In the past, computer crimes such as hacking were done to gain more information about computer systems or hackers competing against each other to be the strongest. This affected

The Growing Threat of Computer Crime

3335 words - 13 pages Crime Do you think your company’s computer systems are secure? Think again. Billions of dollars in losses have already been discovered due to computer crimes. Billions more have gone undetected. Trillions more will be stolen, most without detection, by the emerging master criminal of the twenty first century --The computer crime offender. What’s worse yet is that anyone with a computer can become a computer criminal. Crimes such as

Intorduction to Computer Systems

3056 words - 12 pages systems are designed to be convenient, others to be efficient and some combination of the two (From Silberschatz and Gagne et al., 2010). Operating system can be found on almost on any device that contains a computer – from cellular phones and video game consoles to supercomputers and servers. Examples of modern operating systems include Android, iOS, Linux, Microsoft windows, Windows Phone and IBM z/OS. All these, except windows, windows phone and

The Future of Computer Crime in America

840 words - 3 pages about the others who use their skills and and knowledge to gain their 'own'personal and illegal access to these vast depositories of information? These individualspopularized and demonized by the media are often referred to as 'Hackers' or 'One whoobtains unauthorized if not illegal, access to computer data systems and or networks.' orthe media definition 'maladjusted losers forming 'high-tech street gangs that aredangerous to society' (Chicago

Is Ethical Hacking the Answer to Ensuring the Safety of Company’s Computer Systems?

1445 words - 6 pages password down, allowing it to get in the wrong hands, or to use ‘password’ as their password, and it provides easy opportunities for Black Hats to cause harm to a company’s computer system. Those against ethical hacking say that exposing security flaws should not be encouraged and not every company can afford to maintain current versions of their system software (Spafford 1992). Although useful for identifying vulnerability in computer systems Ethical

The Use of Information Technology in Accounting

3368 words - 13 pages Intro In this day and age, it is almost unthinkable to perform accounting functions without the help of information technology (IT). Accounting dates back to 3600 BC when the oldest business event was recorded and there is evidence accounting systems were utilized in ancient Greece, China, and Rome (Knežević, Stanković, & Tepavac, 2012). Managerial accounting is a relatively new function of accounting and provides information such as capital

Similar Essays

The Vulnerability Of Computerised Accounting Information Systems To Computer Crime

1509 words - 6 pages on Computerised Accounting Information System increase the vulnerability of CAIS to suffer computer crime, for example, hacking.In addition, the Internet makes computer viruses spread easy from one system to another. If an organistaion's Computerised Accounting Information System infected computer virus, it may result in the whole system paralyse, for example, Trojan horse. It is also possible to destroy data and lost a lot of valuable

Vulnerability Of Computerised Accounting Information Systems To Computer Crime

1597 words - 6 pages AbstractWith the information technology development day-by-day, Computerised Accounting Information System (CAIS) plays an increasingly significant role in the successful operation of today's business. Computerised Accounting Information System has been used more and more broadly and had as much impact on organisations, but the computer crime is also an important issue related to computerised accounting information system. As the expenditures of

Accounting Information Systems Essay

1067 words - 4 pages accounting has focused on periodic, historical, and aggregated data, primarily in the form of financial statements. It has been limited largely to financial transactions. Accounting systems are self-contained and standardized. Accounting information is restricted to stewardship and analysis decisions that use the financial accounting model. Emphasis is on objectivity and reliability of information. Accounting is separated from other business functions

Accounting Information Systems Essay

963 words - 4 pages Naila Hemani Prof. Constable Date: 16 April 2014 Financial Accounting writing Assignment Accounting systems is very important tool for any type business such as corporation, Partnership, and Sole proprietorship. Accounting systems is also referred to as Accounting Information system. Accounting Information systems is process of collecting and processing transaction data and communicating with decision makers. Every business should have