Abstract
understand accounting information systems infrastructures and the programs that access our valuable data. Systems that we believe are secure and protecting our data may be opening themselves to various risks caused by the very components that we have added for security purposes. The thousands of lines of code and additional processes we add to create a more secure environment may be leading us down a road of security vulnerabilities because of the added complexity to these systems. Accountants, auditors and business professionals in general should take steps to ensure that their data is secure; not only from the typical computer security risks such as hackers, viruses, natural disasters and theft, but from the risks arising from the system itself where the data resides. With this study, I hope to encourage a more strenuous approach to information security through the prospect of also looking at the implementation of components and complexity as causing flaws in accounting information system applications.
Publisher
The Center for Promoting Education and Research (CPER)
Reference21 articles.
1. Berson, J. (2005) ZoneAlarm: Creating Usable Security Products for Consumers. In Security and Usability. Cranor, L & Garfinkel, S (Eds.)
2. Courtois, P.,&Parnas, D. (1993) Documentation for Safety Critical Software. Proceedings of the 15th international conference on Software Engineering. IEEE.
3. Doyle, J. Ge, W., &McVay, S. (2007) Determinants of Weakness in internal control over financial reporting. Journal of Accounting and Economics.doi:10.1016/j.jacceco.2006.10.003
4. Forward, A.,& Lethbridge, T. (2002) The Relevance of Software Documentation, Tools and Technologies: A Survey. DocEng ’02 McLean, Virginia ACM.
5. Gordon, L.,& Loeb, M. (2002) The Economics of Information Security Investment. ACM Transactions on Information and System Security, Vol. 5. No 4. pp 438-457.