AIS Attacks and Failures: Who to Blame - Research Paper Example

Only on StudentShare

Extract of sample
AIS Attacks and Failures: Who to Blame

It provides various benefits for the managers and owners requiring financial transactions, including improving the workflow, improving the processes, increasing flexibility, and providing assistance in decision-making (Romney and Steinbart, 2011). However, AIS has disadvantages, including difficulties in learning the system, re-evaluation, and loss of information. Loss of information either through failure of intentional attacks posses the greatest threat for AIS and the organizations that adopt them. AIS threats emanate from different sources. If ignored, they may affect reliability and relevance of financial information, resulting to poor decision making by the stakeholders. All firms are responsible for any losses resulting from attacks on their AIS, thus they should and must be held liable. The AIS is a firm’s initiative, and thus its responsibility. Any failures, attacks, or problems that may result from the system are fully liable to the firm. The most common sources of AIS are can be prevented to a certain degree. Consider the attacks made to AIS during data collection. The firm is liable in ensuring that security measures are in control for secure transactions that are complete, valid, and free from any form of error (Lin and Huang, 2011). ...Show more

Summary

AIS Attacks and Failures Name Institution Question One The process of accounting has been a controversial issue to scholars, researchers, and accountants. As depicted by Hall (2011), accounting marks the center of interest in every organization, and arguably the backbone…
Author : miles31
AIS Attacks and Failures: Who to Blame essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the research paper on your topic
"AIS Attacks and Failures: Who to Blame"
with a personal 20% discount.
Grab the best paper

Related Essays

Intelligence Success and Failures of Terrorist Attacks of 9/11
Therefore, the topic enhances or evaluates the existence of various things related with policy making, internal politics, programs of security agencies and administrative procedures of the nation. The disaster has brought considerable changes in the relationship between terrorism threats and crime, U.S citizens and their policies against terrorism.
6 pages (1500 words) Research Paper
Improving Transactional Processing in AIS
Compliance checking systems are usually designed to ensure that compliance checks are carried out in the best way possible so as to achieve the best possible results. Compliance checks can be governed by local ordinances that stipulate standards for carrying out checks, agencies or people responsible for carrying out the checks and appropriate penalties for employees, departments, vendors, servers or suppliers who fail to meet set standards or they can be voluntarily implemented by licensing or law enforcement authorities.
6 pages (1500 words) Research Paper
Replacing a Legacy AIS Application Case Study
Implementation of Accounting Information System (AIS) helps in the collection of transaction data of an organization and then processing them to form useful financial information which could be utilized in a more effective way by its users. The users include any of the stakeholders of a company (Kieso, Weygandt, and Warfield 80).
6 pages (1500 words) Research Paper
Cryptography Attacks
Cryptography is a science of secure communication using unique codes to disguise the information thereby making it inaccessible by third parties. Presumably, the American government has a several enemies all of which will do anything to access some of the information in the government databases (Oded, 2001).
5 pages (1250 words) Research Paper
Cyber attacks
The critical infrastructure of any country consists of extremely composite, self-governing and cyber based resources which is vital for the
10 pages (2500 words) Research Paper
Structural failures in buildings
ld Collapse, in Willow Island, West Virginia in April 1978, where premature loading of cast-in-place concrete resulted in loss of life for 51 construction workers and the Rosemont Horizon Arena, Chicago in august 1979, where Glue-laminated timber roof arches spanning 89 metres
5 pages (1250 words) Research Paper
AIS Attacks and Failures: Who to Blame
ormation System links the analysis and application of accounting with the arrangement, putting into operation, and examining the systems of information. The information systems use current information technology elements with conventional accounting management and techniques to
3 pages (750 words) Research Paper
Improving Transactional Processing in AIS
Compliance checks can be governed by local ordinances that stipulate standards for carrying out checks, agencies or people responsible for carrying out the checks and appropriate penalties for employees, departments, vendors,
6 pages (1500 words) Research Paper
Injection attacks
(2014) define SQL injection as a code injection attack involving the insertion of malicious SQL statements into an entry field for subsequent execution so as to attack the database and perform varied forms of database operations, interactions and functions without the
3 pages (750 words) Research Paper
Accounting Information Systems - Fraud in the AIS
The fraud in Koss Corporation entailed two major accounting system misappropriations, namely fraudulent wire transfer and the insertion of fraudulent account entries in the company financial books and
10 pages (2500 words) Research Paper
Get a custom paper written
by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT