Abstract.  The objective of this essay is to determine the  exposure of  data processorised  invoice   entropy system to  computing machine  offensive activity and the solutions to  block   much(prenominal)(prenominal) crime from occurring in organisations. Ever-Changing  teaching  engineering science has  do computerised  accountancy processes easier. How forever, it has  also created significant threats in  congenator to ensuring the   render and  dependableness of computerised  story information systems. Using an accounting softw ar  packet such as MYOB can be  defenseless to frauds if  inherent  avows are not implemented correctly. Fraudulent activities such as unauthorised use of data, theft of inventory, theft of  funds and  infatuated financial reporting can be conducted by  inwrought employees of an organisation. Furthermore, outsiders are also able to access unauthorised information through electronic exchange of data if  strait-laced controls are not installed. Controls suc   h as password, authorities, firewall, encryption, segregation of duties, and auditing,  personal controls  all over assets contribute to reducing crimes conducted by  twain  innate employees and outsiders.       The  fast change in information technology and the implementation of substance abuser friendly computer systems  hand over enabled processing accounting tasks  untold faster and accurate than ever before. However, this state-of-the art technology has also created significant threats in relation to ensuring the security and reliability of computerised accounting information systems.

 In addition,  otherwise fac   tors can contribute to the vulnerability of !   computerised accounting information systems to computer crime including in  sufficient control practices and violation of internal controls (Albrecht, 2003, p471). Many companies and organisations should be aware of  strength security threats to their computerised accounting information systems and must consider adequate security controls to prevent computer crimes (Ahmad, 2001 and 2003). Furthermore, the use of accounting  software package packages such as MYOB can be exposed to security threats and sufficient measures must be taken to prevent it from  incident further.  Doney (2001, p30) defines computer crime as crimes in which...                                        If you want to  bum  close to a full essay, order it on our website: 
OrderCustomPaper.comIf you want to get a full essay, visit our page: 
write my paper   
 
No comments:
Post a Comment