preview

Accounting Information System Security

Good Essays

Since the society has become progressively dependent on networks for business, the management of company’s information online has developed into an issue to be concerned. AIS, which is short for Accounting Information System, is not merely related to accounting information management as the business develops around the world. In the various explanations of AIS in the Lecture 1, p12130 Accounting Information System, presented at the University of Nottingham Ningbo by Trevor Bayley, Vaassen (2002) defined AIS as provides information for decision-making and accountability to internal and external stakeholders providing the right conditions for decision making and ensures that no assets illegitimately exit the organisation. In terms of …show more content…

Besides, the IT department should update its technology support timely and constantly. In views of how the network can be attacked by hackers, the process of the constructing a network of a company should be reviewed. First of all, when a website is being designed, the developer should ensure the script of the website is perfectly planned and repeatedly tested, not leaving any type of loop-hole for hackers to obtain confidential information of the company. In the second place, the users of network should carefully handle their crucial information. Raines (2008) claimed that majority of cybercrimes are caused by the reason of users giving their information to unverified websites. To consolidate the precaution of users about cybercrime, an awareness may better be established that computer virus can guide itself into a computer with great ability without being discovered (ibid).

Pay attention to all aspects of computer security, insider threats to information occupies a significant place. Although outsiders, for example, hackers, are generally regarded as a big threat to a company, the company staffs are actually putting a greater risk for security of company information. In the perspective of Shaw et al (n.d.), increasing dependence on information technology enhance the reliance on technology workers who are involved with design, maintenance and operation of network

Get Access