Preview

Perceived Threats of Computerized Accounting Information System and Provides Suggestions on How to Prevent the Occurrence of these Potential Dangers

Best Essays
Open Document
Open Document
1788 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Perceived Threats of Computerized Accounting Information System and Provides Suggestions on How to Prevent the Occurrence of these Potential Dangers
Abstract

This essay briefly introduces the perceived threats of Computerized Accounting Information System and provides suggestions on how to prevent the occurrence of these potential dangers. Though the computer technology makes the accounting operation more accurate and faster, this still involves several threats in terms of the security and reliability of the accounting information. Fraudulent activities, management cheats, virus infection, costs and so forth, are all need precaution from the operation of the organization. However, proper selection of software, execution of internal control and other precaution measures may help relieve from the threats.

Introduction

With rapid development of the information technology, computerized accounting information system plays an increasingly crucial role in the operation of organization regardless large, medium or small enterprises. This can be contributed to the merits of the marriage of accounting and the computer science technology, which dramatically improve the accuracy and speed of the process of information system. However, along with the advantages of the computerized accounting information system, there emerge several deadly deficiencies which, if not appropriately deal with, can be greatly detrimental to the interests of the organization and, even worse, may lead to collapse of the company. This essay mainly focuses on several important aspects of the deficiency of the computerized accounting information system and then provides feasible solutions to prevent the negative influence derived from these threats.

To begin with, fraudulent activities are the most significant threat to the organization after the accounting information system has been computerized. Both internal personnel and the top management may commit fraud in different ways. For instance, the most common fraudulent activities are unauthorized access of the company accounting information system, theft of resources of the company and



Bibliography: Tricia Ellis-Christensen (2010), [Online] What is the Computer Misuse Act of 1990? Wise GEEK Available from: http://www.wisegeek.com/what-is-the-computer-misuse-act-of-1990.htm [Accessed 20 April 2010] Computer hope (1010), [Online] How to prevent unauthorized computer access, Computer hope, Available from: http://www.computerhope.com/issues/ch000464.htm [Accessed 20 April 2010] Enron Corporation (2001), Enron Annual Report 2000, Houston, Financial department, 2001, p3 Chris Uba (2009), [Online] Fraudulent Accounting Practice, Businessworld, Available from: http://businessworldng.com/web/articles/940/1/Fraudulent-Accounting-Practice/Page1.html [Accessed 20 April 2010] Oracle (2009), [Online] Accounting software and corporate fraud, AME Info FZ LLC, Available from: http://www.ameinfo.com/16726.html [Accessed 20 April 2010] Wikipedia (2010), [Online] internal control, Wikipedia, Available from: http://en.wikipedia.org/wiki/Internal_control [Accessed 20 April 2010]

You May Also Find These Documents Helpful

  • Good Essays

    Case Study

    • 625 Words
    • 3 Pages

    References: Beard, Deborah & Wen (2007). Reducing the Threat Levels for Accounting Information Systems. The CPA Journal Online. Retrieved from http://www.nysscpa.org/cpajournal/2007/507/essentials/p34.htm…

    • 625 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Identify and discuss fraud factors in each of the scenarios Audited by Watson & Watson, LLP for past 13 years Suggest specific steps that should be taken to investigate if misappropriation or fraud is occurring Collected $89m in gross operating revenue last year Overview Scenario 1 Scenario 2 Scenario 3 Scenario 4 Scenario 5 Past Fraud Cases Overview Scenario 1 Scenario 2 Scenario 3 Scenario 4 Scenario 5 5 Past Fraud Cases 6 Scenario 1 – Accounts Payable Process Case Facts Nora & Bob (A/P clerks) check each other’s documents for accuracy daily Scenario 1 Accounts Payable Process Each Tuesday, Libby (Chief Accountant) - collects invoices to be paid for that week - prepares documentation so that checks can be drawn and mechanically signed Overview Scenario 1 Scenario 2 Scenario 3 Scenario 4 Scenario 5 Past Fraud Cases 1 11/10/2012 8 7 Scenario 1 – Accounts Payable Process Case Facts Scenario 1 – Accounts Payable Process Case Facts Every Wednesday morning, Libby…

    • 3505 Words
    • 15 Pages
    Powerful Essays
  • Better Essays

    For as long as businesses have existed, so has accounting. With time, it has become more complicated and detailed, but it is still a process of keeping financial accounts in order. Through accounting, or financial reporting, a system is set up to keep track of, maintain and audit the financial proceedings. Because accounting and financial reporting of a business is so important for its accuracy and in general, a lot of ethical, technological and legal concerns are involved. In this paper, we will look identify and explore the concerns of each of these.…

    • 1087 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    New technology in information systems have bought significant changes in accounting profession, practices and processes. It has increased the efficiency and accuracy in accounting and has speed up the process for manual accounting tasks, but also improved security of accounting data and increased transparency. Large organizations and multinationals are changing over to this new information systems and technologies to carry out their accounting tasks on global basis. This information system has led to standardization not only among the different divisions, locations and offices of a single organization, but also on a global basis.…

    • 427 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Accounting fraud is defined as “the intentional misrepresentation or alteration of accounting records regarding sales, revenues and expenses or other factors for a profit motive” (businessdictionary.com, n.d). All companies are susceptible to fraud because their Accounting systems are managed by people, and as I mentioned above, we are fallen creatures with the susceptibility to fail. Examples of accounting fraud are: “merging short and long term debt into one amount to improve the perceived liquidity, failing to disclose risky investments, over recording sales revenue, under…

    • 1175 Words
    • 5 Pages
    Better Essays
  • Good Essays

    There are several different types of threats that can be posed to the accounting information systems of an organization and when ignored can create grave damage to the organization. One threat to the AIS of the organization is the threat of the unauthorized user. Organization needs to have strict controls on who has access to computers that relate to the information system of the organization t prevent loss or to prevent damage. Unauthorized users can also come in the form of hackers that find back doors into the company’s AIS in order to steal sensitive information or to wreak havoc with the information systems. It is essential in the new Information Age for the management is knowledgeable on the AIS and the needed security measures to protect this system.…

    • 851 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Course Summary

    • 1956 Words
    • 8 Pages

    In this course, students are introduced to the conduct of fraud examinations, including a discussion of specific procedures used in forensic accounting examinations and the reasoning behind these procedures. Topics include an overview of fraud and abuse, forensic evidence, substantive procedures for cash outflow irregularities, substantive procedures for asset irregularities, financial statement fraud, and examination reporting. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents:   University policies: You must be logged into the student website to view this document. Instructor policies: This document is posted in the Course Materials forum.…

    • 1956 Words
    • 8 Pages
    Satisfactory Essays
  • Good Essays

    There are a variety of sources that threaten accounting information systems and if they are ignored then this can destroy the relevance and reliability of the financial information. [ (Wen, 2007) ] It is very important to establish security controls during the data collection process. During this process the transaction or event should be valid, complete and free from material errors. (Wen, 2007) An unauthorized user can pretend to be an authorized user, which is called masquerading. Another activity that hackers use during data collection is called piggybacking, which is tapping into the telecommunications lines. Companies need to establish security controls during this process so hackers can’t get into their accounting information system. Threats during the data processing phase can also occur. A few threats that can occur during this phase would include: creating illegal programs, accessing or deleting files, destroying or corrupting a program’s logic through viruses, or altering a program’s logic to cause the application to process data incorrectly. [ (Wen, 2007) ] Unauthorized access to database management could cause threats by altering, deleting, corrupting, destroying or stealing data. [ (Wen, 2007) ] A devastating loss of data could occur if the files aren’t properly backed up. An organization could damage their competitiveness or reputation during the information generation and reporting phase because theft, misdirection or misuse of the computer output. [ (Wen,…

    • 815 Words
    • 4 Pages
    Good Essays
  • Better Essays

    The term bookkeeping is most likely to justify how accounting practice has been changing over the last few decades. However, the global information revolution has a significant impact on all fields of business such as economic, finance and marketing. Thus accounting is not isolated from technology. In order to be well equipped for work environment, accounting students are being taught more computer skills in their courses (Harris,2014). Therefore, some students specialize in accounting information system at universities. Furthermore, for accounting job seekers it can be impossible to find a job with no IT skills, thus the improvement of accounting software can be considered as the most important improvement in accounting history.The purpose of this essay is to discuss and explain how particular software products have improved accounting through the importance of spreadsheet for any accountant, then how the accounting has changed in inventory control, sales including point of sales, and finally, keeping accounting documents.…

    • 1959 Words
    • 6 Pages
    Better Essays
  • Better Essays

    The accounting system is a crucial part of the business operations systems. The current accounting systems, while comprehensive, are lacking some key features that could increase benefits and reduce losses. The accounting information systems are used to gather financial data and provide information for internal and external decisions. These decisions include marketing, purchasing, payroll, investments, sales, and accounts, both payable and receivable. The purpose of a new accounting information system is to take advantage of new key features and core technologies that will help to keep the company agile in its decision making and better prepared to compete in today 's market and economy. The current system is modular in design and made to be scalable so the additions and updates can be made so that a new accounting system could incorporate and build on the existing system.…

    • 1040 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Integrated Cases Chapter 5

    • 1139 Words
    • 5 Pages

    Our society has become increasingly dependent on accounting information system, which have grown increasingly more complex to meet our escalating needs for information. As system complexity and our dependence on system increase, companies face the growing risk of their systems being compromised. Managers should be alert to the possibility that unusual events or transactions could be symptoms of fraud or attempted fraud. Fraud may also be highlighted as a result of specific management checks or be brought to management’s attention by a third party. Fraud takes two forms: misappropriation of assets and fraudulent financial reporting, either the two fraud has a harmful effect in the overall organization. There are three present conditions when fraud occurs. First is pressure that motivates a person to commit fraud. Second is Opportunity that allows a person due to situation to commit and conceal fraud. Third is rationalization that allows perpetrators to justify their illegal behavior. Prevention is the key to make fraud less likely to occur.…

    • 1139 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    In this report we are discussing the importance and the factors which can influence the success and failure of accounting information system.…

    • 1876 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Computerized Accounting

    • 336 Words
    • 2 Pages

    Computerized accounting allows the company to enter data in a variety of ways which makes work a pleasure. Adapting to the specific business needs is possible.…

    • 336 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Why Ais Is Important

    • 1731 Words
    • 7 Pages

    I chose two articles that illustrate the importance of accounting information systems in the modern business world. The first article details the hurdles a user can face when relying on substandard manual accounting information systems. The users in this case; the Mole Valley District Council, paid a significant penalty in the form of extra auditor’s fees for having poorly maintained accounting records. The finance department for the council reportedly made a number of clerical errors including arithmetic errors, incorrect calculations, and an insufficient audit trail. Few internal controls were in place to adequately prevent, detect, and…

    • 1731 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Accounting is the backbone of business. It is the method on which financial information is gathered, processed and summarized into financial statements and reports. It provides information used for decision making. Every business has numerous processes. Some simple, others complex and cumbersome. But as the business grows, acquires new customers, enters new markets and keeps pace with constant changes in statutory regulations the company will need to maintain highly accurate and up-to-date accounting, inventory and statutory records. Credit Cooperative undertakes savings and lending services among its members, the accounting transaction involve in the credit cooperative are complex and vary from one credit coop to the other. There is where accounting and computerized accounting system will find its necessity. Computerized accounting helps simplify, integrate, and streamline all the business processes, cost-effectively and easily. In this generation, computers are being used by industries, companies, schools and cooperatives. Particularly credit cooperative use computers in making their task easier and convenient and to produce more reliable outputs. The usage of Computerized Accounting System (CAS) in business like cooperative are prevalent. Computerized Accounting System is designed to automate and integrate all business operations such as sales, finance, purchases, inventory and manufacturing. It has the ability to handle huge volumes and transaction without compromising on speed or efficiency. Computerization can be the most…

    • 692 Words
    • 3 Pages
    Good Essays