Abstract. The objective of this essay is to determine the exposure of data processorised invoice entropy system to computing machine offensive activity and the solutions to block much(prenominal)(prenominal) crime from occurring in organisations. Ever-Changing teaching engineering science has do computerised accountancy processes easier. How forever, it has also created significant threats in congenator to ensuring the render and dependableness of computerised story information systems. Using an accounting softw ar packet such as MYOB can be defenseless to frauds if inherent avows are not implemented correctly. Fraudulent activities such as unauthorised use of data, theft of inventory, theft of funds and infatuated financial reporting can be conducted by inwrought employees of an organisation. Furthermore, outsiders are also able to access unauthorised information through electronic exchange of data if strait-laced controls are not installed. Controls suc h as password, authorities, firewall, encryption, segregation of duties, and auditing, personal controls all over assets contribute to reducing crimes conducted by twain innate employees and outsiders. The fast change in information technology and the implementation of substance abuser friendly computer systems hand over enabled processing accounting tasks untold faster and accurate than ever before. However, this state-of-the art technology has also created significant threats in relation to ensuring the security and reliability of computerised accounting information systems.
In addition, otherwise fac tors can contribute to the vulnerability of ! computerised accounting information systems to computer crime including in sufficient control practices and violation of internal controls (Albrecht, 2003, p471). Many companies and organisations should be aware of strength security threats to their computerised accounting information systems and must consider adequate security controls to prevent computer crimes (Ahmad, 2001 and 2003). Furthermore, the use of accounting software package packages such as MYOB can be exposed to security threats and sufficient measures must be taken to prevent it from incident further. Doney (2001, p30) defines computer crime as crimes in which... If you want to bum close to a full essay, order it on our website: OrderCustomPaper.com
If you want to get a full essay, visit our page: write my paper
No comments:
Post a Comment