Abstract. The objective of this essay is to determine the exposure of figurerised invoice entropy system to computer offensive activity and the solutions to observe such crime from occurring in organisations. Ever-Changing teaching technology has do computerised accountancy processes easier. Howalways, it has also created significant threats in similarity to ensuring the encourage and dependableness of computerised accounting information systems. Using an accounting softw ar packet such as MYOB can be insecure to frauds if inherent avows are not implemented correctly. Fraudulent activities such as unauthorised use of data, theft of inventory, theft of appropriatety and infatuated financial reporting can be conducted by inwrought employees of an organisation. Furthermore, outsiders are also able to access wildcat information through electronic exchange of data if proper controls are not installed. Controls such as password, authorities, firewall, encrypti on, segregation of duties, and auditing, somatic controls all over assets contribute to reducing crimes conducted by two indwelling employees and outsiders. The fast change in information technology and the implementation of substance abuser friendly computer systems bring forth enabled processing accounting tasks untold faster and accurate than ever before. However, this state-of-the art technology has also created significant threats in relation to ensuring the security and reliability of computerised accounting information systems. In addition, other(a) factors can contribute to the vulnerability of computerised accounting information systems to computer crime including in comfortable control practices and violation of internal controls (Albrecht, 2003, p471). Many companies and organisations should be aware of strength security threats to their computerised accounting information systems and must consider adequate security controls to prevent computer crimes (Ahm ad, 2001 and 2003). Furthermore, the use of ! accounting software package packages such as MYOB can be exposed to security threats and sufficient measures must be taken to prevent it from incident further. Doney (2001, p30) defines computer crime as crimes in which... If you want to bum approximately a full essay, order it on our website: OrderCustomPaper.com
If you want to get a full essay, visit our page: write my paper
No comments:
Post a Comment