• <abbr id="ck0wi"><source id="ck0wi"></source></abbr>
    <li id="ck0wi"></li>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li><button id="ck0wi"><input id="ck0wi"></input></button>
  • <abbr id="ck0wi"></abbr>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li>
  • Home >

    Characteristics Of Accounting Fraud Under IT Environment

    2010/12/14 17:24:00 45

    Information Technology Accounting Fraud Under IT Environment

    The explosive development of information technology has changed the structure and operation mode of economy, society and culture. IT, which is the core of software, hardware, network, communication and so on, has penetrated into all fields of social life rapidly, and the role of information resources has been brought into full play.

    However,

    information technology

    It is a double-edged sword.

    IT environment

    ,

    accounting fraud

    It is also more concealed, intelligent, subject pluralistic, complicated and harmful to society.


    (1) concealment


    Concealment should be a common feature of fraud, but fraud in the IT field is more subtle.

    The object of accounting fraud under the IT environment is electronic data and application stored in magnetic media. Whether accounting fraud happens or not, does not cause any damage to the computer information system, and the appearance of the electronic data carrier will not change in the slightest. It is difficult to detect by visual observation alone.

    The violation of computer information system is not based on physical proximity, which means that the operator can manipulate through the internal network or even the Internet without the need of a near system.


    (two) intelligence


    In the process of game, fraud and anti fraud challenge each other's intelligence.

    Under the IT environment, accounting fraud has used a lot of computer, database, network and other professional knowledge and skills, so that its intelligence is very prominent.

    Some experts believe that having a certain degree, a wide range of knowledge, studying information technology, and familiarity with business processes have become a necessary condition for IT fraud to some extent (Dong Sheng Sheng, 2006).


    (three) subject diversification


    From the inside of the unit, the main body of accounting fraud under the IT environment is the leader's encouragement and guidance, and the two is the action of a single member or some members.

    Because of the popularization and application of network technology, the main body of IT accounting fraud has expanded from the inside of the unit to the outside.

    In forensic accounting appraisal process, we must pay more attention to the prevention of external infringement.


    (four) complexity


    The complexity of accounting fraud under IT environment is the result of the combination of concealment, intelligence and subject diversification.

    The combination of concealment and intelligence makes IT accounting fraud more use of the illegal functions of the information system; under the condition of subject diversification, the fraud of the combination of concealment and intelligence is more complex because of the participation of the external personnel, even the collusion between the internal staff and the external staff.


    (five) social harmfulness


    Because the information system is a nerve center of a unit, its data integrity and safety are very important, and the loss is difficult to recover. It involves a wide range of areas and industries, and the amount of loss is huge. Therefore, accounting fraud under IT environment has more serious social harm.

    • Related reading

    Classification Principle Of Financial Assets

    Accounting teller
    |
    2010/12/14 11:11:00
    32

    Income Tax Expenses And Taxes Payable

    Accounting teller
    |
    2010/12/14 11:05:00
    137

    Time Value Of Capital

    Accounting teller
    |
    2010/12/14 11:04:00
    33

    Book Balance, Book Value And Book Value

    Accounting teller
    |
    2010/12/14 11:02:00
    25

    Characteristics Of Investment Real Estate

    Accounting teller
    |
    2010/12/14 10:59:00
    30
    Read the next article

    Why Is "Made In China" Cheaper Outside China?

    A pair of Nike or Adidas's Chinese made shoes, regular price products at seven hundred or eight hundred or even thousands. The shoes of the same style only cost US $thirty or forty in some big stores in the United States, which is equivalent to RMB two hundred or three hundred yuan.

    主站蜘蛛池模板: 欧美日本一道高清免费3区| 两个人看的日本高清电影| 亚洲综合色区中文字幕| 欧美猛交xxxx免费看| 国内揄拍国内精品| 亚洲精品高清国产一久久| 99久热只有精品视频免费看| 狠狠夜色午夜久久综合热91| 天堂久久久久久中文字幕| 亚洲综合色丁香麻豆| 88aa四虎影成人精品| 欧美日韩亚洲一区二区三区| 国产精品哟哟视频| 亚洲av永久青草无码精品| 成人黄色免费网站| 美女性生活电影| 成av免费大片黄在线观看| 免费高清av一区二区三区| nanana最新在线视频免费观看网| 裴远之的原型人物是谁| 无码精品日韩中文字幕| 台湾一级淫片完整版视频播放| 久热香蕉精品视频在线播放| 香蕉视频网页版| 无码精品久久久天天影视| 又爽又刺激的视频| 久久不见久久见免费影院www日本 久久不见久久见免费影院www日本 | 黄色a级片在线| 日韩AV高清无码| 国产91精品久久久久久| 久久亚洲精品中文字幕| 美女被羞羞吸乳动漫视频| 好吊妞视频免费观看va| 亚洲精品你懂的| AV无码久久久久不卡蜜桃| 欧美激情一区二区三区| 在线精品免费视频无码的| 亚洲国产精品福利片在线观看| 五月天丁香在线| 无码精品人妻一区二区三区av| 免费无码又爽又刺激高潮的视频 |