StudentShare solutions
Triangle menu

AIS Attacks and Failures: Who to Blame - Research Paper Example

Nobody downloaded yet

Extract of sample
AIS Attacks and Failures: Who to Blame

It provides various benefits for the managers and owners requiring financial transactions, including improving the workflow, improving the processes, increasing flexibility, and providing assistance in decision-making (Romney and Steinbart, 2011). However, AIS has disadvantages, including difficulties in learning the system, re-evaluation, and loss of information. Loss of information either through failure of intentional attacks posses the greatest threat for AIS and the organizations that adopt them. AIS threats emanate from different sources. If ignored, they may affect reliability and relevance of financial information, resulting to poor decision making by the stakeholders. All firms are responsible for any losses resulting from attacks on their AIS, thus they should and must be held liable. The AIS is a firm’s initiative, and thus its responsibility. Any failures, attacks, or problems that may result from the system are fully liable to the firm. The most common sources of AIS are can be prevented to a certain degree. Consider the attacks made to AIS during data collection. The firm is liable in ensuring that security measures are in control for secure transactions that are complete, valid, and free from any form of error (Lin and Huang, 2011). The firm should also prevent other hacker activities like piggybacking and masquerading. There are attacks that occur during the processing stage of data. Such attacks include deleting or accessing files, creating illegal programs, and destroying, or altering the logic of a program through viruses, causing the application to processes data incorrectly. The first fact that justifies the liability of the firm for AIS attacks is the ability of the firm to prevent such occurrences through several control procedures. Secondly, the Sarbanes-Oxley Act of 2002 formulation of standard accounting practices by the Public Company Accounting Oversight Board (PCAOB). Part 2 of the PCAOB Audit Standards delegates full responsibility to firms for internal controls and financial reporting (Gelinas, Dull, and Wheeler, 2010). Question Two With the current advancements in internet and computer technology, information systems provide a potential platform for conducting business. However, the same advancement advantages present critical threats to accounting information systems. AIS carry vital financial information of a company, and any form of failure or attack places the company at risk of losses. Organizations that have operational AIS use them primarily for financial transactions and reporting, which means that an attack will destroy their financial transaction and reporting (Hall, 2011). In this regard therefore, the federal government should design and enforce regulations and laws concerning AIS attacks. The fact that AIS attack is a form of cyber crime justifies federal government intervention (Lin and Huang, 2011). Currently, the US criminal justice system lacks adequate policies to protect or deter cybercrimes of all forms. However, there are several federal statutes in the US, including 18 USC 1831 that prohibits stealing trade secrets, 18 USC 2510-11 that prohibits electronic communication interception, and 18 USC 2314 that prohibits transportation of converted, fraudulently, and stolen material, including computer data files (Hall, 2011). Three facts support the federal intervention, design, and enforcement of AIS attacks. First, ...Show more

Summary

AIS Attacks and Failures Name Institution Question One The process of accounting has been a controversial issue to scholars, researchers, and accountants. As depicted by Hall (2011), accounting marks the center of interest in every organization, and arguably the backbone…
Author : miles31
AIS Attacks and Failures: Who to Blame essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the research paper on your topic
"AIS Attacks and Failures: Who to Blame"
with a personal 20% discount.
Grab the best paper

Check these samples - they also fit your topic

Intelligence Success and Failures of Terrorist Attacks of 9/11
Therefore, the topic enhances or evaluates the existence of various things related with policy making, internal politics, programs of security agencies and administrative procedures of the nation. The disaster has brought considerable changes in the relationship between terrorism threats and crime, U.S citizens and their policies against terrorism.
6 pages (1500 words) Research Paper
Improving Transactional Processing in AIS
Compliance checking systems are usually designed to ensure that compliance checks are carried out in the best way possible so as to achieve the best possible results. Compliance checks can be governed by local ordinances that stipulate standards for carrying out checks, agencies or people responsible for carrying out the checks and appropriate penalties for employees, departments, vendors, servers or suppliers who fail to meet set standards or they can be voluntarily implemented by licensing or law enforcement authorities.
6 pages (1500 words) Research Paper
Replacing a Legacy AIS Application Case Study
Implementation of Accounting Information System (AIS) helps in the collection of transaction data of an organization and then processing them to form useful financial information which could be utilized in a more effective way by its users. The users include any of the stakeholders of a company (Kieso, Weygandt, and Warfield 80).
6 pages (1500 words) Research Paper
Cryptography Attacks
Cryptography is a science of secure communication using unique codes to disguise the information thereby making it inaccessible by third parties. Presumably, the American government has a several enemies all of which will do anything to access some of the information in the government databases (Oded, 2001).
5 pages (1250 words) Research Paper
Cyber attacks
The critical infrastructure of any country consists of extremely composite, self-governing and cyber based resources which is vital for the
10 pages (2500 words) Research Paper
Structural failures in buildings
ld Collapse, in Willow Island, West Virginia in April 1978, where premature loading of cast-in-place concrete resulted in loss of life for 51 construction workers and the Rosemont Horizon Arena, Chicago in august 1979, where Glue-laminated timber roof arches spanning 89 metres
5 pages (1250 words) Research Paper
AIS Attacks and Failures: Who to Blame
ormation System links the analysis and application of accounting with the arrangement, putting into operation, and examining the systems of information. The information systems use current information technology elements with conventional accounting management and techniques to
3 pages (750 words) Research Paper
Improving Transactional Processing in AIS
Compliance checks can be governed by local ordinances that stipulate standards for carrying out checks, agencies or people responsible for carrying out the checks and appropriate penalties for employees, departments, vendors,
6 pages (1500 words) Research Paper
Injection attacks
(2014) define SQL injection as a code injection attack involving the insertion of malicious SQL statements into an entry field for subsequent execution so as to attack the database and perform varied forms of database operations, interactions and functions without the
3 pages (750 words) Research Paper
Accounting Information Systems - Fraud in the AIS
The fraud in Koss Corporation entailed two major accounting system misappropriations, namely fraudulent wire transfer and the insertion of fraudulent account entries in the company financial books and
10 pages (2500 words) Research Paper
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Comments (0)
Click to create a comment