We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

AIS Attacks and Failures: Who to Blame - Research Paper Example

Comments (0) Cite this document
AIS Attacks and Failures Name Institution Question One The process of accounting has been a controversial issue to scholars, researchers, and accountants. As depicted by Hall (2011), accounting marks the center of interest in every organization, and arguably the backbone…
Download paper
AIS Attacks and Failures: Who to Blame
Read TextPreview

Extract of sample
AIS Attacks and Failures: Who to Blame

It provides various benefits for the managers and owners requiring financial transactions, including improving the workflow, improving the processes, increasing flexibility, and providing assistance in decision-making (Romney and Steinbart, 2011). However, AIS has disadvantages, including difficulties in learning the system, re-evaluation, and loss of information. Loss of information either through failure of intentional attacks posses the greatest threat for AIS and the organizations that adopt them. AIS threats emanate from different sources. If ignored, they may affect reliability and relevance of financial information, resulting to poor decision making by the stakeholders. All firms are responsible for any losses resulting from attacks on their AIS, thus they should and must be held liable. The AIS is a firm’s initiative, and thus its responsibility. Any failures, attacks, or problems that may result from the system are fully liable to the firm. The most common sources of AIS are can be prevented to a certain degree. Consider the attacks made to AIS during data collection. The firm is liable in ensuring that security measures are in control for secure transactions that are complete, valid, and free from any form of error (Lin and Huang, 2011). The firm should also prevent other hacker activities like piggybacking and masquerading. There are attacks that occur during the processing stage of data. Such attacks include deleting or accessing files, creating illegal programs, and destroying, or altering the logic of a program through viruses, causing the application to processes data incorrectly. The first fact that justifies the liability of the firm for AIS attacks is the ability of the firm to prevent such occurrences through several control procedures. Secondly, the Sarbanes-Oxley Act of 2002 formulation of standard accounting practices by the Public Company Accounting Oversight Board (PCAOB). Part 2 of the PCAOB Audit Standards delegates full responsibility to firms for internal controls and financial reporting (Gelinas, Dull, and Wheeler, 2010). Question Two With the current advancements in internet and computer technology, information systems provide a potential platform for conducting business. However, the same advancement advantages present critical threats to accounting information systems. AIS carry vital financial information of a company, and any form of failure or attack places the company at risk of losses. Organizations that have operational AIS use them primarily for financial transactions and reporting, which means that an attack will destroy their financial transaction and reporting (Hall, 2011). In this regard therefore, the federal government should design and enforce regulations and laws concerning AIS attacks. The fact that AIS attack is a form of cyber crime justifies federal government intervention (Lin and Huang, 2011). Currently, the US criminal justice system lacks adequate policies to protect or deter cybercrimes of all forms. However, there are several federal statutes in the US, including 18 USC 1831 that prohibits stealing trade secrets, 18 USC 2510-11 that prohibits electronic communication interception, and 18 USC 2314 that prohibits transportation of converted, fraudulently, and stolen material, including computer data files (Hall, 2011). Three facts support the federal intervention, design, and enforcement of AIS attacks. First, ... Read More
Cite this document
  • APA
  • MLA
(“AIS Attacks and Failures: Who to Blame Research Paper”, n.d.)
Retrieved from https://studentshare.net/finance-accounting/57562-ais-attacks-and-failures-who-to-blame
(AIS Attacks and Failures: Who to Blame Research Paper)
“AIS Attacks and Failures: Who to Blame Research Paper”, n.d. https://studentshare.net/finance-accounting/57562-ais-attacks-and-failures-who-to-blame.
  • Cited: 0 times
Comments (0)
Click to create a comment
Intelligence Success and Failures of Terrorist Attacks of 9/11
Therefore, the topic enhances or evaluates the existence of various things related with policy making, internal politics, programs of security agencies and administrative procedures of the nation. The disaster has brought considerable changes in the relationship between terrorism threats and crime, U.S citizens and their policies against terrorism.
6 Pages(1500 words)Research Paper
Improving Transactional Processing in AIS
Compliance checking systems are usually designed to ensure that compliance checks are carried out in the best way possible so as to achieve the best possible results. Compliance checks can be governed by local ordinances that stipulate standards for carrying out checks, agencies or people responsible for carrying out the checks and appropriate penalties for employees, departments, vendors, servers or suppliers who fail to meet set standards or they can be voluntarily implemented by licensing or law enforcement authorities.
6 Pages(1500 words)Research Paper
Replacing a Legacy AIS Application Case Study
Implementation of Accounting Information System (AIS) helps in the collection of transaction data of an organization and then processing them to form useful financial information which could be utilized in a more effective way by its users. The users include any of the stakeholders of a company (Kieso, Weygandt, and Warfield 80).
6 Pages(1500 words)Research Paper
Cryptography Attacks
Cryptography is a science of secure communication using unique codes to disguise the information thereby making it inaccessible by third parties. Presumably, the American government has a several enemies all of which will do anything to access some of the information in the government databases (Oded, 2001).
5 Pages(1250 words)Research Paper
Cyber attacks
The critical infrastructure of any country consists of extremely composite, self-governing and cyber based resources which is vital for the
10 Pages(2500 words)Research Paper
Structural failures in buildings
ld Collapse, in Willow Island, West Virginia in April 1978, where premature loading of cast-in-place concrete resulted in loss of life for 51 construction workers and the Rosemont Horizon Arena, Chicago in august 1979, where Glue-laminated timber roof arches spanning 89 metres
5 Pages(1250 words)Research Paper
AIS Attacks and Failures: Who to Blame
ormation System links the analysis and application of accounting with the arrangement, putting into operation, and examining the systems of information. The information systems use current information technology elements with conventional accounting management and techniques to
3 Pages(750 words)Research Paper
Improving Transactional Processing in AIS
Compliance checks can be governed by local ordinances that stipulate standards for carrying out checks, agencies or people responsible for carrying out the checks and appropriate penalties for employees, departments, vendors,
6 Pages(1500 words)Research Paper
Injection attacks
(2014) define SQL injection as a code injection attack involving the insertion of malicious SQL statements into an entry field for subsequent execution so as to attack the database and perform varied forms of database operations, interactions and functions without the
3 Pages(750 words)Research Paper
Who is to blame
According to Nelson (2001), the way Genetically Modified Organisms will be adopted will go in one of the three ways. For enthusiasts, Genetically Modified Organisms are a source of food security. This is because of a number of reasons. For instance, GMOs can
5 Pages(1250 words)Essay
Let us find you another Research Paper on topic AIS Attacks and Failures: Who to Blame for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us