• <abbr id="ck0wi"><source id="ck0wi"></source></abbr>
    <li id="ck0wi"></li>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li><button id="ck0wi"><input id="ck0wi"></input></button>
  • <abbr id="ck0wi"></abbr>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li>
  • Home >

    Characteristics Of Accounting Fraud Under IT Environment

    2010/12/14 17:24:00 45

    Information Technology Accounting Fraud Under IT Environment

    The explosive development of information technology has changed the structure and operation mode of economy, society and culture. IT, which is the core of software, hardware, network, communication and so on, has penetrated into all fields of social life rapidly, and the role of information resources has been brought into full play.

    However,

    information technology

    It is a double-edged sword.

    IT environment

    ,

    accounting fraud

    It is also more concealed, intelligent, subject pluralistic, complicated and harmful to society.


    (1) concealment


    Concealment should be a common feature of fraud, but fraud in the IT field is more subtle.

    The object of accounting fraud under the IT environment is electronic data and application stored in magnetic media. Whether accounting fraud happens or not, does not cause any damage to the computer information system, and the appearance of the electronic data carrier will not change in the slightest. It is difficult to detect by visual observation alone.

    The violation of computer information system is not based on physical proximity, which means that the operator can manipulate through the internal network or even the Internet without the need of a near system.


    (two) intelligence


    In the process of game, fraud and anti fraud challenge each other's intelligence.

    Under the IT environment, accounting fraud has used a lot of computer, database, network and other professional knowledge and skills, so that its intelligence is very prominent.

    Some experts believe that having a certain degree, a wide range of knowledge, studying information technology, and familiarity with business processes have become a necessary condition for IT fraud to some extent (Dong Sheng Sheng, 2006).


    (three) subject diversification


    From the inside of the unit, the main body of accounting fraud under the IT environment is the leader's encouragement and guidance, and the two is the action of a single member or some members.

    Because of the popularization and application of network technology, the main body of IT accounting fraud has expanded from the inside of the unit to the outside.

    In forensic accounting appraisal process, we must pay more attention to the prevention of external infringement.


    (four) complexity


    The complexity of accounting fraud under IT environment is the result of the combination of concealment, intelligence and subject diversification.

    The combination of concealment and intelligence makes IT accounting fraud more use of the illegal functions of the information system; under the condition of subject diversification, the fraud of the combination of concealment and intelligence is more complex because of the participation of the external personnel, even the collusion between the internal staff and the external staff.


    (five) social harmfulness


    Because the information system is a nerve center of a unit, its data integrity and safety are very important, and the loss is difficult to recover. It involves a wide range of areas and industries, and the amount of loss is huge. Therefore, accounting fraud under IT environment has more serious social harm.

    • Related reading

    Classification Principle Of Financial Assets

    Accounting teller
    |
    2010/12/14 11:11:00
    32

    Income Tax Expenses And Taxes Payable

    Accounting teller
    |
    2010/12/14 11:05:00
    137

    Time Value Of Capital

    Accounting teller
    |
    2010/12/14 11:04:00
    33

    Book Balance, Book Value And Book Value

    Accounting teller
    |
    2010/12/14 11:02:00
    25

    Characteristics Of Investment Real Estate

    Accounting teller
    |
    2010/12/14 10:59:00
    30
    Read the next article

    Why Is "Made In China" Cheaper Outside China?

    A pair of Nike or Adidas's Chinese made shoes, regular price products at seven hundred or eight hundred or even thousands. The shoes of the same style only cost US $thirty or forty in some big stores in the United States, which is equivalent to RMB two hundred or three hundred yuan.

    主站蜘蛛池模板: 国产成人福利在线视频播放尤物 | 冬月枫在线观看| 一个人看的www日本高清视频| 男女午夜免费视频| 在线播放国产一区二区三区 | R级无码视频在线观看| 欧美成人四级剧情在线播放| 国产成人精品免费视频大全五级| 久久久久波多野结衣高潮| 精品国产一区二区二三区在线观看| 在线视频你懂的国产福利| 亚洲伊人色欲综合网| 野花直播免费观看日本更新最新| 性欧美videofree另类超大| 亚洲精品偷拍无码不卡av| 精品福利视频导航| 成人3d动漫网址在线观看| 亚洲欧美精品一中文字幕| 黄色a级片网站| 学校触犯×ofthedead | 日韩精品福利在线| 再深点灬舒服灬太大了添网站 | 中文字幕亚洲欧美日韩不卡| 热久久国产精品| 国产婷婷成人久久av免费高清| 丁香六月综合网| 欧美大香线蕉线伊人图片| 国产99久久九九精品无码| 97碰在线视频| 日本在线观看中文| 亚洲精品美女久久久久| 骚视频在线观看| 天天澡天天摸天天爽免费| 五级黄18以上免费看| 精品国产不卡一区二区三区| 国产精品久久久久乳精品爆| 中文字幕亚洲乱码熟女一区二区 | 天堂网在线资源www最新版| 亚洲av日韩综合一区久热| 精品卡2卡3卡4卡免费| 国产福利在线观看你懂的|