The objective of this essay is to determine the vulnerability of computerised accounting information system to computer crime and the solutions to prevent such crime from occurring in organisations. Ever-Changing information technology has made computerised accounting processes easier. However, it has also created significant threats in relation to ensuring the security and reliability of computerised accounting information systems. Using an accounting software package such as MYOB can be vulnerable to frauds if internal controls are not implemented correctly. Fraudulent activities such as unauthorised use of data, theft of inventory, theft of funds and incorrect financial reporting can be conducted by internal employees of an organisation. Furthermore, outsiders are also able to access unauthorized information through electronic exchange of data if proper controls are not installed. Controls such as password, authorities, firewall, encryption, segregation of duties, and auditing, physical controls over assets contribute to reducing crimes conducted by both internal employees and outsiders.
The rapid change in information technology and the implementation of user friendly computer systems have enabled processing accounting tasks much faster and accurate than ever before. However, this state-of-the art technology has also created significant threats in relation to ensuring the security and reliability of computerised accounting information systems. In addition, other factors can contribute to the vulnerability of computerised accounting information systems to computer crime including inadequate control practices and violation of internal controls (Albrecht, 2003, p471). Many companies and organisations should be aware of potential security threats to their computerised accounting information systems and must consider adequate security controls to prevent computer crimes (Ahmad, 2001 and 2003). Furthermore, the use of accounting software packages such as
Bibliography: Ahmed, A. (2001), Evaluating the Security of Computerised Accounting Information Systems: An Empirical Study of Egyptian Banking Industry, PhD. Thesis, Aberdeen University, UK. Ahmed, A. (2003), The perceived threat of security of computerized accounting information systems, The journal of American Academy of Business, Cambridge, USA, Vol 3, No. 1, September, pp. 9-20. Alberecht, W. (2003), Fraud Examination, Thomson Learning, USA. Casey, E. (2000), Digital Evidence and Computer Crime, Academic Press, London. Considine, B., Razeed, A., Lee, M. & Collier, P. (2005), Accounting Information Systems: understanding business processes, John Wiley & Sons Australia, Qld. Davia, H., Coggins, P., Wideman, J. & Kastantin J. (2000), Accountant 's Guide to Fraud Detection and Control, (2nd Edn), John Wiley & Sons, Canada. Davis, C. (1996), An Assessment of Accounting Information Security, The CPA Journal, (Vol 28), p.2. Davis, C. (1996), Perceived Security Threats to Today 's Accounting Information Systems: A Survey of CISAs, IS Audit Control Journal, (Vol 3), pp.28-33. Doney, L. (2001), Nonprofits Aren 't Immune to Computer Crime, Nonprofit World, (Vol 19, No 2), p.31. Satzinger, J., Jackson, R. & Burd, S., (2002), Systems Analysis and Design: in a changing world, (2nd edn), Thomson Learning, Canada. Shaw, E., Ruby, K & Post, J. (1998), The Insider Threat to Information Systems, Security Awareness Bulletin, (Vol 2-98).