Vulnerability Of Computerised Accounting Information Systems To Computer Crime.

1597 words - 6 pages

AbstractWith the information technology development day-by-day, Computerised Accounting Information System (CAIS) plays an increasingly significant role in the successful operation of today's business. Computerised Accounting Information System has been used more and more broadly and had as much impact on organisations, but the computer crime is also an important issue related to computerised accounting information system. As the expenditures of computer spending on computer control and securities are increasing in recently years, as well as the larger proportion of companies suffers computer related losses, therefore, we can believe that the growing dependence on information technologies is making computerised accounting information systems more vulnerable to the computer crime.IntroductionAccounting, as everyone knows, plays a very important role in every organisation. In the recent times the role of accounting has gone to a much more complex level with the increase in the technology. Audit professionals have been forced to re-evaluate the approaches employed in a financial statement audit, with the traditional means fast becoming irrelevant and ineffective as computer and the automation of information systems emerge in business designs.The information systems has developed such softwares for accounting that it's just not entering the transactions but processing it to give organisations a different direction as well. With the increasing dependence of accounting on the information systems, it has exposed it to the computer crime. Computer crime can be defined as an criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of another, manipulation or theft of stored or on-line data, or sabotage of equipment and data (http://www.answers.com/topic/computer-crime).Using an accounting software package such as MYOB can be vulnerable to frauds if internal controls are not implemented correctly. Fraudulent activities such as unauthorised use of data, theft of inventory, theft of funds and incorrect financial reporting can be conducted by internal employees of an organisation. The consequences of security deficiencies are lost business, damaged reputation, lost assets and possibly lost trade secrets.In today's world, the organisations are spending huge amounts to keep their data secured and avoid important information of their accounts to get into wrong hands as previously companies have suffered huge losses due to computer crime. According to one of the articles on Computer Crime at http://www.answers.com/topic/computer-crime, one report, made available in 1987 by the accounting firm of Ernst and Whinney, estimated that computer abuse caused between $3 billion and $5 billion in losses in the United States annually. Another survey conducted by The American Bar Association in 1987 revealed that of 300 corporations and government agencies, 72 claimed to have been the victim of...

Find Another Essay On Vulnerability of computerised accounting information systems to computer crime.

Office Automation Paper: Computer Information Systems.

636 words - 3 pages and provide basic account information. The type of software that we use in the organization varies. We just bought new Hewlett Packard computers for our office and the software package that was installed was Windows XP Professional. The PACE system is what we use in the trust and investment accounting system. PACE provides immediate access to account and customer information on fiduciary accounts. Account opening, maintenance and inquiry are

Discussion of Internal Controls that are placed in an Accounting information Systems

2160 words - 9 pages the system my the company's own management and directors. Today more and more companies are moving from the manual accounting systems to computerized accounting information systems. The advantages of a computerized system are increases in the speed and accuracy of processing accounting information.However, as systems become computerized, the internal controls for that system has to be adapted accordingly. This is because computerized systems

Computer Crime, on the increase in many areas: hackers, hardware theft, software piracy and the information highway.

1334 words - 5 pages Great Paper Excellent essayComputer Crimeby: Manik SainiAdvances in telecommunications and in computer technology have brought us to the information revolution. The rapid advancement of the telephone, cable, satellite and computer networks, combined with the help of technological breakthroughs in computer processing speed, and information storage, has lead us to the latest revolution, and also the newest style of crime, 'computer crime'. The

Feasibility report. A feasibility study of the feasibility of implementing a computerised information system to a stock broking busines

2189 words - 9 pages catalogues / leaflet delivery service.It is however believed that these manually run activities, can be done far more efficiently by implementing a new information technology system to handle them.Description of Proposed New System.If we want to be able to keep up with the competition from other stockbroking companies, we will have to embrace and keep up with technology and the rapidly advances of today. By implementing new systems, such as a website

Intorduction to Computer Systems

3056 words - 12 pages systems are designed to be convenient, others to be efficient and some combination of the two (From Silberschatz and Gagne et al., 2010). Operating system can be found on almost on any device that contains a computer – from cellular phones and video game consoles to supercomputers and servers. Examples of modern operating systems include Android, iOS, Linux, Microsoft windows, Windows Phone and IBM z/OS. All these, except windows, windows phone and

Investigation of Information Systems

2125 words - 9 pages devices. iv. Output capability allows the system to produce output in a variety of forms, such as: a. Hard copy (eg. reports, documents, messages) b. Soft copy (eg. displays on monitor screens) c. Control output (eg. instructions to industrialised robots, or automated processes) 3. Manual vs Computer-based Information Systems The definition above implies that information systems are

Role of Information Systems

1005 words - 4 pages In today's high-paced job market, having the right technology to get the job done more efficiently is of high demand. That is why having the correct blend of information systems to assist in this process is imperative. Information systems include many different resources and not just one thing. They include computers, the instructions to operate the computers, people to operate the system, and procedures for the people to follow (Nickerson, 2001

Strategic use of Information Systems

3972 words - 16 pages .[8][16]The three general types of information systems that are developed and in general use are financial systems, operational systems, and strategic systems. These categories are not mutually exclusive and, in fact, they always overlap to some. Well-directed financial systems and operational systems may well become the strategic systems for a particular organization.Financial systems are the basic computerization of the accounting, budgeting

Types and Defences of Computer Crime

1561 words - 6 pages technologically skilled individuals accessing a company's computer system increases the system's vulnerability to attack from within and without.After the using computerized accounting information systems in both large and small businesses, higher efficiency and accuracy have brought to businesses. However, by misusing vulnerabilities through the accounting information systems for criminal purposes will make businesses suffer great losses and

Biometrics Introduction to Information Systems Security

622 words - 2 pages gathering information on people's travel patterns.Biometric devices and applications have been growing worldwide. They are expected to be the way for accessing personal computer systems. According to research it is expected that biometric expenditure will reach $300 million in 2008. Biometrics works on the principle that everyone in the world is different. A variety of factors are taken into consideration when implementing a biometric system. Each

Is Ethical Hacking the Answer to Ensuring the Safety of Company’s Computer Systems?

1445 words - 6 pages password down, allowing it to get in the wrong hands, or to use ‘password’ as their password, and it provides easy opportunities for Black Hats to cause harm to a company’s computer system. Those against ethical hacking say that exposing security flaws should not be encouraged and not every company can afford to maintain current versions of their system software (Spafford 1992). Although useful for identifying vulnerability in computer systems Ethical

Similar Essays

The Vulnerability Of Computerised Accounting Information Systems To Computer Crime.

1509 words - 6 pages on Computerised Accounting Information System increase the vulnerability of CAIS to suffer computer crime, for example, hacking.In addition, the Internet makes computer viruses spread easy from one system to another. If an organistaion's Computerised Accounting Information System infected computer virus, it may result in the whole system paralyse, for example, Trojan horse. It is also possible to destroy data and lost a lot of valuable

The Vulnerability Of Computerised Accounting Information Systems To Computer Crime

1916 words - 8 pages The vulnerability of computerised accounting information systems to computer crimeAbstractWith the information technology development day-by-day, Computerised Accounting Information System (CAIS) plays an increasingly significant role in the successful operation of today's business. CAIS has been used more and more broadly and had as much impact on organisations, however the computer crime is also an important issue related to CAIS. As the

Accounting Information Systems Essay

1067 words - 4 pages accounting has focused on periodic, historical, and aggregated data, primarily in the form of financial statements. It has been limited largely to financial transactions. Accounting systems are self-contained and standardized. Accounting information is restricted to stewardship and analysis decisions that use the financial accounting model. Emphasis is on objectivity and reliability of information. Accounting is separated from other business functions

Computer Based Career Information Systems Essay

1772 words - 7 pages Computer-Based Career Information Systems The adage "information is power" can certainly be applied to the marriage of career information with computers. In an era that is characterized by a rapidly changing employment and occupational outlook, the ability to access computerized career information has been empowering to both youth and adults (Bloch 1989; Tice and Gill 1991). Defined as "all that people need to know to make choices and take