Core Concepts of ACCOUNTING INFORMATION SYSTEMS Moscove, Simkin & Bagranoff John Wiley & Sons, Inc. Developed by: Marianne Bradford, Ph.D. Bryant College.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
ACCOUNTING INFORMATION SYSTEMS
Chapter 11: Computer Crime, Fraud, Ethics, and Privacy
Chapter 11: Computer Crime, Fraud, Ethics, and Privacy
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Crime and Security in the Networked Economy Part 4.
Slide F 1. Slide F 2 Appendix F Payroll Accounting Learning Objectives After studying this chapter, you should be able to: 1.Compute and record the payroll.
Lecturer: Fadwa Tlaelan
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 15 Computer Crime and Information Technology Security Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
ACCOUNTING INFORMATION SYSTEMS
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Introduction to Information Technology.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Chapter 101 Information Technology For Management 6 th Edition Turban, Leidner, McLean, Wetherbe Lecture Slides by L. Beaubien, Providence College John.
Schermerhorn- Chapter 61 Management, 6e Schermerhorn Prepared by Cheryl Wyrick California State Polytechnic University Pomona John Wiley & Sons, Inc.
Lesson 19: Configuring Windows Firewall
Chapter 3: Data Modeling
Copyright 2004 John Wiley & Sons, Inc Information Technology: Strategic Decision Making For Managers Henry C. Lucas Jr. John Wiley & Sons, Inc Dinesh.
ACCOUNTING INFORMATION SYSTEMS
12-1 Planning for Information Technology and Systems.
Chapter 16 Prepared by Richard J. Campbell Copyright 2011, Wiley and Sons Topics Beyond the Integrated Audit.
F- 1. F- 2 F PAYROLL ACCOUNTING Accounting, Fifth Edition.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Chapter 7 Computer Crime, Ethics, and Privacy
ACCT341, Chapter 11 Computer Crime, Ethics, and Privacy
Chapter 11 Security and Privacy: Computers and the Internet.
Introduction to Databases Chapter 1: Introducing Data and Data Management.
ACCOUNTING INFORMATION SYSTEMS
“Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Introduction to Information Technology, 2 nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 7-1 Introduction to Information Technology.
ACCOUNTING INFORMATION SYSTEMS
 a crime committed on a computer network, esp. the Internet.
Chapter 2 Information Technology and AISs
John Wiley & Sons, Inc. © 2005 Chapter 2 The Recording Process Prepared by Naomi Karolinski Monroe Community College and and Marianne Bradford Bryant.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Chapter 101 The Design Process Chapter 10 Achieving Quality Through Continual Improvement Claude W. Burrill / Johannes Ledolter Published by John Wiley.
Core Concepts of ACCOUNTING INFORMATION SYSTEMS Moscove, Simkin & Bagranoff John Wiley & Sons, Inc. Developed by: Marianne Bradford, Ph.D. Bryant College.
Core Concepts of ACCOUNTING INFORMATION SYSTEMS Moscove, Simkin & Bagranoff John Wiley & Sons, Inc. Developed by: Marianne Bradford, Ph.D. Bryant College.
13-1 COBOL for the 21 st Century Nancy Stern Hofstra University Robert A. Stern Nassau Community College James P. Ley University of Wisconsin-Stout (Emeritus)
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved
Chapter 16 Information and Operations Management 1e Management 1e - 2 Management 1e Learning Objectives  Explain how managers use controls.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Core Concepts of ACCOUNTING INFORMATION SYSTEMS Moscove, Simkin & Bagranoff John Wiley & Sons, Inc. Developed by: S. Bhattacharya, Ph.D. Florida Atlantic.
Slide 1-1 Chapter 1 Information Systems Overview Introduction to Information Systems Judith C. Simon.
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Slide 2-1 Chapter 2 Information Systems in Organizations Introduction to Information Systems Judith C. Simon.
Topic 5: Basic Security.
Chapter 9: Introduction to Internal Control Systems
H-1. H-2 Accounting in Action Learning Objectives After studying this chapter, you should be able to: [1] Compute and record the payroll for a pay period.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Chapter 31 Information Technology For Management 6 th Edition Turban, Leidner, McLean, Wetherbe Lecture Slides by L. Beaubien, Providence College John.
CONTROLLING INFORMATION SYSTEMS
Slide 1 Systems Analysis and Design With UML 2.0 An Object-Oriented Approach, Second Edition Chapter 2: Introduction to Object-Oriented Systems Analysis.
I- 1 Prepared by Coby Harmon University of California, Santa Barbara Westmont College.
A- 1. A- 2 Appendix B Standards of Ethical Conduct for Management Accountants The Institute of Management Accountants has published and promoted the following.
K-1. K-2 Appendix K Standards of Ethical Conduct for Management Accountants The Institute of Management Accountants has published and promoted the following.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Slide 11-1 Chapter 11 Terms Information Resource Management Strategies Introduction to Information Systems Judith C. Simon.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Core Concepts of ACCOUNTING INFORMATION SYSTEMS Moscove, Simkin & Bagranoff John Wiley & Sons, Inc. Developed by: S. Bhattacharya, Ph.D. Florida Atlantic.
Dinesh Mirchandani University of Missouri – St. Louis
ACCOUNTING INFORMATION SYSTEMS
The Quality System Chapter 13
Computer Ethics.
BCT 2.00 Analyze Technology Issues
ACCOUNTING INFORMATION SYSTEMS
Presentation transcript:

Core Concepts of ACCOUNTING INFORMATION SYSTEMS Moscove, Simkin & Bagranoff John Wiley & Sons, Inc. Developed by: Marianne Bradford, Ph.D. Bryant College

Chapter 9 Computer Crime and Ethics Introduction Computer Crime: An Overview Examples of Computer Crime Cases Thwarting Computer Abuse Computers and Ethical Behavior

Computer Crime Computer crime is using the computer either directly or indirectly in a criminal act. A good definition of computer crime is important because it affects how the statistics are accumulated. It is speculated that a relatively small proportion of computer crime gets detected and an even smaller proportion gets reported.

Legislation Of the federal legislation governing the use of computers, The Computer Fraud and Abuse Act of 1986 is perhaps the most important. This Act may not be powerful enough to prosecute computer abuses of the 21 st century such as types of Internet and telecommunications frauds.

Computer Fraud Computer fraud is any illegal act for which knowledge of computer technology is essential for its perpetration, investigation, or prosecution. Economic espionage, the theft of information and intellectual property, is one type of computer fraud.

The Lack of Computer-Crime Statistics Good statistics on computer crime are mostly unavailable. Three reasons why statistics are unavailable are : (1) private companies handle abuse internally (2) surveys of computer abuse are often ambiguous (3) most computer abuse is probably not discovered.

The Growth of Computer Crime Computer crime is growing because of –Exponential growth in computer resources –Internet pages give step-by-step instructions on how to perpetrate computer crime –Spending on computer controls has grown at a slow rate

Four Representative Computer Crimes Cases Manipulating Computer Files: The Equity Funding Corporation of America Compromising Valuable Information: The TRW Credit Data Case Computer Hacking: The Kevin D. Mitnick Case Computer Viruses: Robert T. Morris and the Internet Virus Case

The Equity Funding Case Landmark case of computer crime. Control procedures extremely lax - company maintained an open shop. Analysis: –Insurance industry learned how easily computers can create bogus insurance policies. –IS personnel learned importance of computer security. –Court litigation taught auditing profession that ineffective audit techniques were not an adequate legal defense against charges of negligence.

The TRW Credit Data Case This valuable information computer crime is well known. The valuable information was computerized credit data. Two key issues: –the propriety of the input information –the protection afforded both consumer and user in the accuracy and use of credit information

The Kevin D. Mitnick Case Hackers are people who break into the computer files of others for fun or personal gain. Shoulder surfing is stealing calling credit numbers at public phones. Password controls can limit computer access to bona fide users. Social engineering is posing as bona fide employees. Lock-out systems disconnect telephone users after a set number of unsuccessful login attempts. Dial-back systems first disconnect all login users, but reconnect legitimate users after checking their passwords against lists of bona fide user codes.

Robert T. Morris and the Internet Virus Created one of the world’s most famous compute viruses. Became first person to be indicted under the Computer Fraud and Abuse Act of This case illustrates vulnerability of networks to virus infections.

Computer Viruses A computer virus is a program that disrupts normal data processing and that can usually replicate itself onto other files, computer systems or networks. Boot-sector viruses hide in the boot sectors of a disk, where the operating system accesses them. Worm viruses replicate themselves until the user runs out of memory or disk space.

Robert T. Morris and the Internet Virus Case Trojan Horse programs reside in legitimate copies of computer programs. Logic Bomb programs remain dormant until the computer system encounters a specific condition. A virus may be stored in an applet, which is a small program stored on a WWW server.

Methods for Thwarting Computer Viruses: Anti-Virus Software Anti-virus software includes computer programs that can: –scan computer disks for virus-like coding; –identify active viruses already lodged in computer systems; –cleanse computer systems already infected; –perform a combination of these activities.

Drawbacks of Anti-Virus Software Programs Anti-virus programs provide less-than- complete protection because –new, more powerful viruses are always being written that can avoid known detection schemes. –anti-virus programs can contained virus routines.

Anti-Virus Procedural Controls Buy shrink-wrapped software from reputable sources Avoid illegal software copying Do not download suspicious Internet files Delete messages from unknown sources before opening them Maintain complete backup files

Organizational Safeguards Against Computer Viruses Educate employees about viruses. Encourage employees to follow virus prevention and detection techniques. Establish policies that discourage the free exchange of computer disks or externally acquired computer programs. Use computer passwords to thwart unauthorized users from accessing the company’s operating systems and files. Use anti-virus filters on LANs and WANs. Have an approved and tested disaster recovery plan.

Methods for Thwarting Computer Abuse Enlist top management support Increase employee awareness and education Implement controls Identify computer criminals –Look at technical backgrounds, morals, and gender and age

Methods for Thwarting Computer Abuse Recognize the symptoms of employee fraud –Accounting irregularities such as forged, altered or destroyed input documents –Internal control weaknesses –Behavioral or lifestyle changes in an employee –Unreasonable anomalies that go unchallenged Employ forensic accountants

Computers and Ethical Behavior Ethics is a set of moral principles or values. Ethical behavior involves making choices and judgments that are morally proper and then acting accordingly. Ethics can govern and organization as well as individuals.

Ethical Issues Honesty Protecting Computer Systems Protecting Confidential Information Social Responsibility Rights of Privacy Acceptable Use of Computer Hardware and Software.

How Organizations Encourage Ethical Behavior Inform employees that ethics are important. Formally expose employees to relevant cases that teach how to act in specific situations. Teach by example, that is, by managers acting responsibly. Use job promotions and other benefits to reward those employees who act responsibly. Encourage employees to join professional organizations with codes of conduct such as Codes of Conduct and Good Practice for Certified Computer Professional.

Copyright Copyright 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make backup copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.

Chapter 9