Preview

Risks Associated with Mis

Good Essays
Open Document
Open Document
302 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Risks Associated with Mis
Risks Associated With MIS
Risk reflects the potential, the likelihood, or the expectation of events that could adversely affect earnings or capital. Management uses MIS to help in the assessment of risk within an institution. Management decisions based upon ineffective, inaccurate, or incomplete MIS may increase risk in a number of areas such as credit quality, liquidity, market/pricing, interest rate, or foreign currency. A flawed MIS causes operational risks and can adversely affect an organization's monitoring of its fiduciary, consumer, fair lending, Bank Secrecy
Act, or other compliance-related activities.
Since management requires information to assess and monitor performance at all levels of the organization, MIS risk can extend to all levels of theoperations. Additionally, poorly programmed or non-secure systems in which data can be manipulated and/or systems requiring ongoing repairs can easily disrupt routine work flow and can lead to incorrect decisions or impaired planning. Assessing Vulnerability To MIS Risk
To function effectively as an interacting, interrelated, and interdependent feedback tool for management and staff, MIS must be "useable." The five elements of a useable MIS system are: timeliness, accuracy, consistency, completeness, and relevance. The usefulness of MIS is hindered whenever one or more of these elements is compromised.
Timeliness
To simplify prompt decision making, an institution's MIS should be capable of providing and distributing current information to appropriate users.
Information systems should be designed to expedite reporting of information.
The system should be able to quickly collect and edit data, summarize results, and be able to adjust and correct errors promptly.
Accuracy
A sound system of automated and manual internal controls must exist throughout all information systems processing activities. Information should receive appropriate editing, balancing, and internal control checks. A

You May Also Find These Documents Helpful

  • Better Essays

    Fin 516 Mini Case

    • 1678 Words
    • 7 Pages

    Within business, there will always be operational risks to consider. "Operating risk is the basic…

    • 1678 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    NT2580 Lab 2

    • 385 Words
    • 2 Pages

    2. What is the relationship between risks, threats and vulnerabilities as it pertains to Information Systems Security throughout the seven domains of a typical IT infrastructure?…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Kudler Fine Foods

    • 1110 Words
    • 5 Pages

    The first risk, business risk, includes threats associated with the lack of a company to achieve its goals and objectives (Hunton, Bryant, & Bagranoff, 2004, pg. 48). Some measures to address risks and controls first must take place in the company. This means that the company must have continuity measures in place to address the likelihood of things such as failures in equipment. The company must also contend with the possibility of fraudulant activity occuring on the systems.…

    • 1110 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Identify risks that could lead to an information security breach, Identify vulnerabilities in system security, software operation, network design or employee procedures that could lead to a network failure.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Isc363 Phase 3

    • 1899 Words
    • 8 Pages

    Gibson, D. (2010). Managing Risk in Information Systems. Sudbury, MA. Jones & Bartlett Learning. ISBN: 978-0-7637-9187-2…

    • 1899 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab #2

    • 402 Words
    • 2 Pages

    2. What is the relationship between risks, threats, and vulnerabilities as it pertains to information systems…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Control risk is the risk that a misstatement that could occur in an account balance or class of transactions and that could be material individually or when aggregated with misstatements in other balances or classes, will not be prevented or detected and corrected on a timely basis by the accounting and internal control systems. For example, segregation of duties, the person who requests an order of computer components shouldn’t be the person who authorizes the request.…

    • 298 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    There are quite a few vulnerabilities that can affect organizations productivity. These vulnerabilities can be environmental, utilities & service, criminal behavior, equipment failure, and information security issues. To protect the organization against loss of productivity and data loss we have created an assessment of the potential danger each category of threat presents. We created a worksheet (located on the last page of this document) listing each type of vulnerability and ranked the probability and severity of each of the threats. Using a probability and severity legend that had one…

    • 2036 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Describe potential risks to the information and the related vulnerabilities within the organization. Identify the forces that drive each threat and the related vulnerabilities.…

    • 627 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 4 Definitions  Risk: Probability that an intentional or unintentional act will harm resources  Threat: Any accidental or intentional event that negatively impacts company resources  Vulnerability: Inherent weakness that may enable threats to harm system or networks Risks, threats, and vulnerabilities affect confidentiality, integrity, and availability (CIA). NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    CH01ProblemsCasespg453 455

    • 1827 Words
    • 8 Pages

    Additional Problems and Cases Chapter 1 Extra Problems/Cases 41. What is the difference between a parameter and a decision variable in a mathematical model? 42. Discuss how a spreadsheet can facilitate the development of a model shell and the model itself. 43.…

    • 1827 Words
    • 8 Pages
    Good Essays
  • Satisfactory Essays

    Practice Quiz 2

    • 464 Words
    • 4 Pages

    1. ASA 315.A51 (ISA 315.A51) Identifying and Assessing the Risks of Material Misstatement through Understanding the Entity and its Environment includes all of the following as components of internal control except:…

    • 464 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    MIS questions

    • 449 Words
    • 2 Pages

    The problem presented in the case is the U.S Health Industry feels that the current paper based medical records are inefficient and costly. They believe that implementing an electronic medical record system that contains all information including medical history ,test results , treatments etc.Their goal is to have these in place by 2015.…

    • 449 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Month-End Closing Process

    • 892 Words
    • 4 Pages

    Identify key risks inherent within the processes and procedures that may hinder the successful attainment of the function objectives;…

    • 892 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Risks can come in many different forms including; financial markets, failures with IT or business projects, legal liabilities, credit risk, accidents and mistakes, natural causes and disasters as well as deliberate attacks from an adversary such as hacking.…

    • 2160 Words
    • 9 Pages
    Powerful Essays