This essay briefly introduces the perceived threats of Computerized Accounting Information System and provides suggestions on how to prevent the occurrence of these potential dangers. Though the computer technology makes the accounting operation more accurate and faster, this still involves several threats in terms of the security and reliability of the accounting information. Fraudulent activities, management cheats, virus infection, costs and so forth, are all need precaution from the operation of the organization. However, proper selection of software, execution of internal control and other precaution measures may help relieve from the threats.
Introduction
With rapid development of the information technology, computerized accounting information system plays an increasingly crucial role in the operation of organization regardless large, medium or small enterprises. This can be contributed to the merits of the marriage of accounting and the computer science technology, which dramatically improve the accuracy and speed of the process of information system. However, along with the advantages of the computerized accounting information system, there emerge several deadly deficiencies which, if not appropriately deal with, can be greatly detrimental to the interests of the organization and, even worse, may lead to collapse of the company. This essay mainly focuses on several important aspects of the deficiency of the computerized accounting information system and then provides feasible solutions to prevent the negative influence derived from these threats.
To begin with, fraudulent activities are the most significant threat to the organization after the accounting information system has been computerized. Both internal personnel and the top management may commit fraud in different ways. For instance, the most common fraudulent activities are unauthorized access of the company accounting information system, theft of resources of the company and
Bibliography: Tricia Ellis-Christensen (2010), [Online] What is the Computer Misuse Act of 1990? Wise GEEK Available from: http://www.wisegeek.com/what-is-the-computer-misuse-act-of-1990.htm [Accessed 20 April 2010] Computer hope (1010), [Online] How to prevent unauthorized computer access, Computer hope, Available from: http://www.computerhope.com/issues/ch000464.htm [Accessed 20 April 2010] Enron Corporation (2001), Enron Annual Report 2000, Houston, Financial department, 2001, p3 Chris Uba (2009), [Online] Fraudulent Accounting Practice, Businessworld, Available from: http://businessworldng.com/web/articles/940/1/Fraudulent-Accounting-Practice/Page1.html [Accessed 20 April 2010] Oracle (2009), [Online] Accounting software and corporate fraud, AME Info FZ LLC, Available from: http://www.ameinfo.com/16726.html [Accessed 20 April 2010] Wikipedia (2010), [Online] internal control, Wikipedia, Available from: http://en.wikipedia.org/wiki/Internal_control [Accessed 20 April 2010]