The accounting field has over past few decades witnessed a number of changes mostly due to increased advancement in technology level. There has been an improvement from paper-based journal and ledgers to a new level of accounting system that is completely automated (The WritePass Journal, 2012). The Accounting Information System commonly referred to as AIS is an automated system that is computer based is mostly used for tracking most of the accounting activities in relation to information technology resources. Most of these activities revolve around …show more content…
The automated system carries with it some confidential data and information, which may be compromised if proper protection measures are not adhered to. These threats and risks are associated with both internal and external forces. However, in most instances this threats and risks have been greatly been linked with internal sources and mainly due to human doings rather than natural forces. A small mistake such as bad or accidental entry made by the employees may be attributed to causing enormous losses to the organization. In some other cases, this risks may be caused intentionally, where an employee knowingly inputs bad data with malicious and fraudulent motives of sabotaging the organization. Some of these threats can nevertheless be easily monitored, but the worst danger, in this case, may be the risk of system hacking. The consequences of hacking can be devastating, as it creates havoc in the accounting system and department raising the question on accuracy and the reliability of the …show more content…
The internal controls are very imperative when it comes to matters of safeguarding the privacy of information system. Putting in place internal controls is so important, and it is for this reason that application controls to safeguard accounting system as well as physical assets to prevent unauthorized access. There is the need to ensure that the accounting information is recorded or documented against the source document, and it must then be verified externally in case there are discrepancies. Through the sequence of discrepancies, the responsible team can be able to predict any cases of potential