Accounting Information Systems Term Paper by Quality Writers

Accounting Information Systems
A look at the reduction of threats for accounting information systems.
# 104450 | 1,932 words | 7 sources | MLA | 2008 | US
Published on Jun 15, 2008 in Business (Accounting) , Computer and Technology (General) , Accounting (General)

$19.95 Buy and instantly download this paper now


This paper looks at how sophisticated computer systems are a necessary cost that corporations are finding themselves faced with in order to maintain control and reliability of their computer systems. Without them accountants will be unable to appropriately balance and file reports. The paper discusses how, in order to reduce this, some corporations have put account managers in place to police their customers when checks are received and bills issued. This puts an additional level of checks and balances in place to try to eliminate inaccurate postings. The paper concludes that, although mistakes will occur even with data analysis systems and security protocols in place, the fact is that the best companies can hope for is to reduce inaccuracies.

Fraud or Inaccuracies
In the Name of Sarbanes-Oxley
Technological Advances
Enterprise System
Security Reduce Threats

From the Paper:

"In today's market place data is being channeled into networks through user screens that are more than likely customers' computers. They submit their orders via their own computer systems while inadvertently place security responsibilities to others. With the Internet, online ordering is putting the customer in control of what he needs and when he needs it. This puts additional pressures on companies to not only protect the data that they currently have within the walls of their servers but to also maintain some degree or order in the process flow of data from a customer. While doing this it must also be realized that customer computers must be preserved from receiving corrupt or virus laden files from the company systems when they are attached to the corporate website or host providers. "

Sample of Sources Used:

  • Alles, Michael, Alexander Kogan and Miklos Vasarhelyi. "Accounting in 2015." The CPA Journal. 3 June 2007. <>
  • Gold, Liz. "Forensic Accounting: CPA Gumshoes: Accounting Veterans and new grads alike join forensics crusade.(certified public accountants)." Accounting Today 21.8 (May 7, 2007): 1. InfoTrac OneFile. Thomson Gale. CML. 2 June 2007 < ITOF&docId= A163540287&source=gale&srcprod= ITOF&userGroupName=cmlweb&version=1.0>.
  • Friedlos, David. "Retailers stock up on theft analysis tools." Computing (May 10, 2007): 15. InfoTrac OneFile. Thomson Gale. CML. 2 June 2007 < A163228677&source=gale&srcprod=ITOF&userGroupName=cmlweb&version=1.0>.
  • Hickey, Andres. "Network downtimes prove costly." Networking News. (March 14, 2007) 3 June 2007.,289142,sid7_gci1247369,00.html
  • "Information You Can Manage." Oracle. 3 June 2007.

Cite this Term Paper:

APA Format

Accounting Information Systems (2008, June 15) Retrieved December 13, 2019, from

MLA Format

"Accounting Information Systems" 15 June 2008. Web. 13 December. 2019. <>