Preview

computerising accounting information systems (AIS) and telecommunicating accounting information over the web enhances the accounting functions in business organisations operating globally.

Better Essays
Open Document
Open Document
1518 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
computerising accounting information systems (AIS) and telecommunicating accounting information over the web enhances the accounting functions in business organisations operating globally.
It is often claimed that the process of computerising accounting information systems (AIS) and telecommunicating accounting information over the web enhances the accounting functions in business organisations operating globally. Yet, the counter-claim is that the breaching of the security of such systems will be a great risk that needs to be properly managed in various ways.

An accounting information system (AIS) is “ a collection of resources, such as people and equipment, designed to transform financial and other data into information.” (Khaled Abdala, 2012, p391). AIS systems are used across all the functions of accounting such as, recording, classifying, summarising, analysis and communication. It is argued by many that AIS enhances the functions of accounting.
In terms of recording this can definitely be seen as the case. Recording accounts entails taking notes of every incoming or outgoing to the business. This means keeping a log in a journal, until the introduction of computer-based systems such as Pulse or Sage software, the journal was hand written. Software such as these however enables an accountant to keep track of all purchases and revenues without this paperwork. This can be seen as “enhancing the recording function as it reduces paperwork and as a result saves time.” (D.Beard & H.J Wen, 2007, p34). As recording only entails recording entries in an orderly manner, I believe this does not encounter such a large security threat as other functions. However, if somebody did wish to gain access to software such as Pulse or Sage, they would only have to get past one password and username combination. This does not make the system very secure, it could be hacked easily by a computer expert. This is a key problem across many accounting systems but can be fixed by increasing the amount of security on the software. This could be by asking for more information to gain access to the system.

Another security threat that is common amongst AIS systems is



Bibliography: Pearson, Financial Accounting & Information Technology, Compiled by Khaled Abdala, 2012. The CPA Journal, Deborah Beard & H. Joseph Wen, 2007. http://quizlet.com/5955831/ais-computer-fraud-and-abuse-techniques-flash-cards/ maecortes on June 28, 2011 http://www.financialforce.com/resources/research/online-accounting/benefits-of-cloud-accounting/ http://www.ehow.com/how_8638439_use-access-accounting.html Bonnie Conrad, 2012. Review of Social, Economic & Business Studies, Vol.2, 45-64. Ilhan Dalchi & Veyis Naki Tanis, 2011.

You May Also Find These Documents Helpful

  • Better Essays

    Kudler Fine Foods

    • 971 Words
    • 4 Pages

    Core Concepts of Accounting Information System Author: Nancy A. Bagranoff copyright © 2008 John Wiley & Sons, Inc.…

    • 971 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Case Study

    • 625 Words
    • 3 Pages

    Accountants often have different views when it comes to using technology in accounting and the methods that are used in the process of preparing financial statements. Some accountants are less willing to change the way they conduct their accounting processes because they have always completed tasks in a similar manner and it worked for them. Accountant A, in this case, would be the accountant that is not as willing to embrace the technological advances that are available in the accounting field and use those advances to his advantage. Accountant B, on the other hand, would rather develop and maintain a system that provides a timely and accurate inventory for the company. Accountant A is pleased with how the audit of the inventory turned out, while Accountant B was quite displeased with the findings. Accountant A is happy with how the audit turned out because it shows that the way he does his job still works. He does not seem to worry about the decisions the company has made due to the error in the computer system. Accountant B is unhappy with the findings because she realizes…

    • 625 Words
    • 3 Pages
    Good Essays
  • Best Essays

    This essay briefly introduces the perceived threats of Computerized Accounting Information System and provides suggestions on how to prevent the occurrence of these potential dangers. Though the computer technology makes the accounting operation more accurate and faster, this still involves several threats in terms of the security and reliability of the accounting information. Fraudulent activities, management cheats, virus infection, costs and so forth, are all need precaution from the operation of the organization. However, proper selection of software, execution of internal control and other precaution measures may help relieve from the threats.…

    • 1788 Words
    • 6 Pages
    Best Essays
  • Satisfactory Essays

    New technology in information systems have bought significant changes in accounting profession, practices and processes. It has increased the efficiency and accuracy in accounting and has speed up the process for manual accounting tasks, but also improved security of accounting data and increased transparency. Large organizations and multinationals are changing over to this new information systems and technologies to carry out their accounting tasks on global basis. This information system has led to standardization not only among the different divisions, locations and offices of a single organization, but also on a global basis.…

    • 427 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Accounting information systems is a computer based database that stores, collects, and processes the financial data of the organization. The AIS system is then backed up by the organizations centralized database. When the AIS system is attacked by outside sources the responsibility falls to the organization if the proper controls are not in place but if the proper controls are in place the fault should fall on the shoulders of the criminal committing the attack or failures of the organization to put in place an effective accounting information system that is not prone to failure.…

    • 851 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Corporate accountants now have a great advantage with the development and advancement in technology. Accountants can now retain more information and can retrieve various information within its organization. There are numerous internal software that help individuals access company financial records, balance sheets and various personal information, also known as the intranet. The new technology helps companies’ project revenue and company performance.…

    • 850 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The argument in favor of the contention is that the accounting information system not only processes financial transactions to provide internal reports to managers but also does external reporting to outside parties such as stockowners, government and lenders. Since, it is essential that the accounting information system should be accessed by outsiders the system is particularly vulnerable to outside attacks (1). Still the onus of the security of its accounting information system clearly lies with the company and…

    • 838 Words
    • 4 Pages
    Good Essays
  • Good Essays

    There are a variety of sources that threaten accounting information systems and if they are ignored then this can destroy the relevance and reliability of the financial information. [ (Wen, 2007) ] It is very important to establish security controls during the data collection process. During this process the transaction or event should be valid, complete and free from material errors. (Wen, 2007) An unauthorized user can pretend to be an authorized user, which is called masquerading. Another activity that hackers use during data collection is called piggybacking, which is tapping into the telecommunications lines. Companies need to establish security controls during this process so hackers can’t get into their accounting information system. Threats during the data processing phase can also occur. A few threats that can occur during this phase would include: creating illegal programs, accessing or deleting files, destroying or corrupting a program’s logic through viruses, or altering a program’s logic to cause the application to process data incorrectly. [ (Wen, 2007) ] Unauthorized access to database management could cause threats by altering, deleting, corrupting, destroying or stealing data. [ (Wen, 2007) ] A devastating loss of data could occur if the files aren’t properly backed up. An organization could damage their competitiveness or reputation during the information generation and reporting phase because theft, misdirection or misuse of the computer output. [ (Wen,…

    • 815 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The new implemented accounting information system is only as good as the information entered into the database as per company requirements. While the primary purpose of the new system was to reduce time and money, the implementation of the new system, however ended up in an avoidable lapse in judgment by the management and the employees. All financial transactions have three main requirements to ensure proper accounting of business operations: timeliness, accuracy, and validity. If these transactions failed to meet these guidelines, information entered into the software* will lead to improperly prepared reports and a total system failure.…

    • 1287 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Villani Mentor Role

    • 530 Words
    • 3 Pages

    Dunne and Villani shed great insight on four roles of a mentor. The roles a mentor may take are as a collegial guide, consultant, seasoned teacher, and coach. When a mentor takes the role as a collegial guide they assist their mentee with learning about the ‘behind the scene’ of the job. A collegial guide role as a mentor provides mentees with guidelines related to the school and district. Teaches mentee about the history of the school while assuring he/or she is becoming acquainted in their new work space.…

    • 530 Words
    • 3 Pages
    Good Essays
  • Good Essays

    New developments in information systems have bought significant changes in accounting profession, practices and processes. It has not only increased the efficiency and accuracy in accounting and has speed up the process for cumbersome and long accounting tasks, but also improved security of accounting data and increased transparency. Large organizations and multinationals are making increasing use of new information systems and technologies to carry out their accounting tasks on global basis. These information systems has led to a great degree of standardization not only among the different divisions, locations and offices of a single organization, but also on a global basis.…

    • 555 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Accounting is all about financial information —capturing it, recording it, configuring it, analyzing it, and reporting it to persons who use it.…

    • 346 Words
    • 2 Pages
    Good Essays
  • Better Essays

    corporate leaders, forty years later. Today’s corporate leaders have a more rapidly changing environment as Accounting Information Systems (AIS) are constantly being upgraded while leading end users to more reliance as AIS holds the key to several aspects of a business. Improper assumptions can very easily be made as the thoroughness of AIS would breed a certain amount of confidence. The human factor, the design of decision aids, and the complexity of user-friendliness are three improper assumptions that could be made by corporate leaders about AIS (Vasarhelyi, 2012).…

    • 1755 Words
    • 5 Pages
    Better Essays
  • Good Essays

    The accounting profession has been around in one way or another for as long as people have traded goods and services. As the transactions between people have become more frequent and complex the accounting profession has become more and more essential and the tools used to perform its functions have become increasingly advanced. For the most part, the days of writing every transaction in a journal and charting and adding accounts on manual charts is gone, replaced by integrated computer systems that often enter transactions into accounts with little or no user interface. These technological advances have…

    • 762 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Many of the things that we have talked about in class were illustrated for me in…

    • 1845 Words
    • 8 Pages
    Good Essays