• <abbr id="ck0wi"><source id="ck0wi"></source></abbr>
    <li id="ck0wi"></li>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li><button id="ck0wi"><input id="ck0wi"></input></button>
  • <abbr id="ck0wi"></abbr>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li>
  • Home >

    Characteristics Of Accounting Fraud Under IT Environment

    2010/12/14 17:24:00 45

    Information Technology Accounting Fraud Under IT Environment

    The explosive development of information technology has changed the structure and operation mode of economy, society and culture. IT, which is the core of software, hardware, network, communication and so on, has penetrated into all fields of social life rapidly, and the role of information resources has been brought into full play.

    However,

    information technology

    It is a double-edged sword.

    IT environment

    ,

    accounting fraud

    It is also more concealed, intelligent, subject pluralistic, complicated and harmful to society.


    (1) concealment


    Concealment should be a common feature of fraud, but fraud in the IT field is more subtle.

    The object of accounting fraud under the IT environment is electronic data and application stored in magnetic media. Whether accounting fraud happens or not, does not cause any damage to the computer information system, and the appearance of the electronic data carrier will not change in the slightest. It is difficult to detect by visual observation alone.

    The violation of computer information system is not based on physical proximity, which means that the operator can manipulate through the internal network or even the Internet without the need of a near system.


    (two) intelligence


    In the process of game, fraud and anti fraud challenge each other's intelligence.

    Under the IT environment, accounting fraud has used a lot of computer, database, network and other professional knowledge and skills, so that its intelligence is very prominent.

    Some experts believe that having a certain degree, a wide range of knowledge, studying information technology, and familiarity with business processes have become a necessary condition for IT fraud to some extent (Dong Sheng Sheng, 2006).


    (three) subject diversification


    From the inside of the unit, the main body of accounting fraud under the IT environment is the leader's encouragement and guidance, and the two is the action of a single member or some members.

    Because of the popularization and application of network technology, the main body of IT accounting fraud has expanded from the inside of the unit to the outside.

    In forensic accounting appraisal process, we must pay more attention to the prevention of external infringement.


    (four) complexity


    The complexity of accounting fraud under IT environment is the result of the combination of concealment, intelligence and subject diversification.

    The combination of concealment and intelligence makes IT accounting fraud more use of the illegal functions of the information system; under the condition of subject diversification, the fraud of the combination of concealment and intelligence is more complex because of the participation of the external personnel, even the collusion between the internal staff and the external staff.


    (five) social harmfulness


    Because the information system is a nerve center of a unit, its data integrity and safety are very important, and the loss is difficult to recover. It involves a wide range of areas and industries, and the amount of loss is huge. Therefore, accounting fraud under IT environment has more serious social harm.

    • Related reading

    Classification Principle Of Financial Assets

    Accounting teller
    |
    2010/12/14 11:11:00
    32

    Income Tax Expenses And Taxes Payable

    Accounting teller
    |
    2010/12/14 11:05:00
    137

    Time Value Of Capital

    Accounting teller
    |
    2010/12/14 11:04:00
    33

    Book Balance, Book Value And Book Value

    Accounting teller
    |
    2010/12/14 11:02:00
    25

    Characteristics Of Investment Real Estate

    Accounting teller
    |
    2010/12/14 10:59:00
    30
    Read the next article

    Why Is "Made In China" Cheaper Outside China?

    A pair of Nike or Adidas's Chinese made shoes, regular price products at seven hundred or eight hundred or even thousands. The shoes of the same style only cost US $thirty or forty in some big stores in the United States, which is equivalent to RMB two hundred or three hundred yuan.

    主站蜘蛛池模板: 天天舔天天操天天干| 99精品久久久久久久婷婷| 麻豆高清免费国产一区| 欧美亚洲综合在线| 国产精品多p对白交换绿帽| 亚洲日韩中文无码久久| 91手机看片国产永久免费| 欧美高清在线精品一区| 国内精品久久久久久无码不卡 | 无码人妻丰满熟妇啪啪网站| 国产又爽又粗又猛的视频| 久久免费福利视频| 蜜桃臀无码内射一区二区三区| 日本免费一区二区三区最新| 国产一区视频在线| 丰满人妻一区二区三区视频53| 老师让我她我爽了好久网站| 成人免费无码大片a毛片软件| 又爽又黄又无遮挡的视频| 一千零一夜电影无删减版在线看| 男男动漫全程肉无删减有什么| 大又大又粗又硬又爽少妇毛片| 亚洲精品免费在线| 18videosex日本vesvvnn| 最近中文字幕mv免费高清视频7| 国产婷婷色一区二区三区深爱网| 久久久久久不卡| 精品精品国产高清a级毛片| 夫妻免费无码V看片| 亚洲永久精品ww47| 亚洲va欧美va| 欧美黑人巨大xxxxx视频| 国产综合视频在线观看一区| 亚洲av日韩aⅴ无码色老头 | 色偷偷亚洲第一综合网| 日韩美女乱淫试看视频软件| 国产又爽又色在线观看 | 午夜a级理论片在线播放| WWW夜片内射视频日韩精品成人| 欧美日韩在线免费观看| 国产成人久久久精品二区三区|