Summary: The Accounting Information System

Superior Essays
Based on the information you researched, evaluate the level of responsibility of the company in terms of the effectiveness of the response to the security breach. Provide support for your rationale.
The accounting field has over past few decades witnessed a number of changes mostly due to increased advancement in technology level. There has been an improvement from paper-based journal and ledgers to a new level of accounting system that is completely automated (The WritePass Journal, 2012). The Accounting Information System commonly referred to as AIS is an automated system that is computer based is mostly used for tracking most of the accounting activities in relation to information technology resources. Most of these activities revolve around
…show more content…
The automated system carries with it some confidential data and information, which may be compromised if proper protection measures are not adhered to. These threats and risks are associated with both internal and external forces. However, in most instances this threats and risks have been greatly been linked with internal sources and mainly due to human doings rather than natural forces. A small mistake such as bad or accidental entry made by the employees may be attributed to causing enormous losses to the organization. In some other cases, this risks may be caused intentionally, where an employee knowingly inputs bad data with malicious and fraudulent motives of sabotaging the organization. Some of these threats can nevertheless be easily monitored, but the worst danger, in this case, may be the risk of system hacking. The consequences of hacking can be devastating, as it creates havoc in the accounting system and department raising the question on accuracy and the reliability of the …show more content…
The internal controls are very imperative when it comes to matters of safeguarding the privacy of information system. Putting in place internal controls is so important, and it is for this reason that application controls to safeguard accounting system as well as physical assets to prevent unauthorized access. There is the need to ensure that the accounting information is recorded or documented against the source document, and it must then be verified externally in case there are discrepancies. Through the sequence of discrepancies, the responsible team can be able to predict any cases of potential

Related Documents

  • Improved Essays

    Introduction: The complete computer is made up of CPU (Central Processing Unit), Memory and Related Electronics, All the peripheral devices connected to it and its operating system. Computer Systems will fall into 2 categories: Clients and Servers. Any computer system needs both hardware and software components to work together to help the computer system to work. Hardware - Is a physical component that contributes to the build of a computer system. For example… Processor, Main memory, Secondary Memory, Input Devices, Output Devices Software - Is computer programmes and data that help provide the BIOS instructions for telling the hardware what to do and how to do it.…

    • 1393 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    The reality of it is that human being are not always trust worthy, even in management positions. Some humans make honest errors that can be and may have been caught later, but still have proven that the system failed. Other humans intentionally do dishonorable acts. There are many employee within a company that has access to data and if they get the chance will misrepresent and manipulate financial data to steal money. Some crooked managers have the power to override the system of internal control and therefore find a way around the system to commit these dishonorable acts.…

    • 992 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Ethics In Workplace

    • 1705 Words
    • 7 Pages

    These ramifications could be seriously detrimental to an organization. These repercussions can not only be devastating to the company, but it could also be costly to the individual employee that was demonstrating the lack of ethics. The individual can be reprimanded and have a permanent blemish on their record, their employment could be terminated, or the legal penalties could be leveled on the individual instead of the company. If any of these punishments were levied against someone, their future could be in serious jeopardy. It could be difficult for that individual to find work within their chosen profession.…

    • 1705 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    However, unlike a traditional phishing attack, a spear phishing attack takes place through racketeering which is an organized crime and is targeted towards a few individuals or an organization. The effect of phishing scams can be rapid, resulting in identity theft, the loss of a huge amount of money, reputational damage etc. Organizations can suffer theft of sensitive information which can give away the trade secrets, information about suppliers, research and development results or customer information. Because of this the company may no longer be able to have a competitive advantage over other businesses. If the perpetrator is trying to harm the image of the business, he may sabotage the company’s files and operations in order to delay or disrupt the process.…

    • 953 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    This can be one of the hardest steps because it can be difficult thinking about vulnerabilities the system might have. Today’s technology is advancing at a rapid rate, which makes it difficult to keep up with the new threats, viruses, and vulnerabilities that come with it. A few examples for Wells Fargo can be; poorly trained employees, disgruntle employee, power outage, breach on the servers, misconfigurations, natural disasters, and many others. If someone where able to breach any server, irreparable damage could be caused as well as confidential information stolen. A poorly trained employee could be one of the biggest risk imaginable.…

    • 720 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Second Question Finding and Answer Toxic employees can be a problem not just because of their poor performance, contagious behavior and influence on a coworker. Nevertheless, the repercussions of their misbehavior can be costly to an organization. Thus is why, finding the answer to the second question was so important. The report revealed an unforeseen cost of a toxic employee. Toxic employees are very taxing on a coworker and negatively contribute to a coworker’s decision to quit.…

    • 1533 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Unethical Legal Issues

    • 786 Words
    • 4 Pages

    When acting unethical in a business there is a number of things that can go wrong. One result could be legal issues depending on how the action was commenced and the effect it had on the people around it. Legal issues on social media these days is really bad for business and will most certainly have a negative effect on your company. There are also fines in place if the government was to find out that there is such legal issue going on inside your company. Another effect is how such act makes the company looks towards to public.…

    • 786 Words
    • 4 Pages
    Decent Essays
  • Improved Essays

    Action is not allowed simply because of the terrorists lack of morality however; it is only done because of the effect it has on others. Yet, the law also has a right to imprison certain hacktivists because of their effect on others. One could us the release of bystanders’ personal information (Vamosi, “How Hacktivism Affects Us All”) as a reason to go after similar hacktivists, due to the damage that they caused to other people. Unfortunately, some hacktivists infringe on others right of politics (Vamosi, “How Hactivisism Affects Us All”) when they seek to have a voice and encourage human rights and politics (Dahan, “Hacking for the Homeland”). Not only is this hypocritical, it also goes against Utilitarianism since Mill states that free speech is a right as long as it is not “…a positive instigation to some mischievous act” (Hansson…

    • 1010 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Despite all of their potential benefits, IT outsourcing entails risks that could lead to undesirable results opposite of the expected advantages (Bouchaib Bahli, Suzanne Rivard). capabilities in the long run since there is too much dependency on external sourcing. The major risks related to IT outsourcing are described below: 1. Security and Confidentiality risks: The vendor can access all the confidential information and any other privacy resources that the organization usually regards as classified and personnel. This is a huge risk issue since it touches the security and the staff rights of the company.…

    • 1224 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Misuse of your employer’s assets is unethical. Lying on reports or falsifying records is unethical. Ethics is needed in the workplace. You are responsible for policing…

    • 1036 Words
    • 4 Pages
    Improved Essays