Sunday 29 July 2012

TERM IN ACCOUNTING INFORMATION SYSTEM

1.Fixed IP Address Vs Dynamic IP Address


 Fixed IP Address
 Dynamic IP Address
 Generally necessary for users whose computers are connected to the Internet 24 hours per day or necessary for very long periods of time.
  Which one temporarily to a user while he or she is accessing the internet.


2.Intranet Vs Extranets

 Intranet
 Extranets
 Appear to be part of the Internet.That it,employees of the organization may access the company's repositories of information in the same way they access similar resources anywhere on the Internet.The only difference is that the entire  intranet may be completely invisible or unavailable to outsiders.Alternatively,all or part of the intranet may be available to outsiders only after they are properly authenticated.
 An extranet is a private network that uses Internet technology and the public telecommunication system to securely share part of a business's information or operations with suppliers,vendors,partners,customers, or other businesses.An extranet can be viewed as part of a company's intranet that is extended to users outside the company.It has also been described as a "state of mind" in which the Internet is perceived as a way to do business with other companies as well as to sell products to customers.


3.Server Vs Client

 Server
 Client
 A robot type-type program that constantly runs on some computer and exchange information with users who request it.Servers can deal with hundreds of user(clients) at one time and servers also can be accessed at any time of day,anywhere in the world,with no per-minute communication charges.
 User's programs that access and exchange information with servers.A great many of business transactions that occur on the Internet take place in client-server environment.

4.Encrytion

-Involves using a password or digital key to scramble a readable (plaintext) message into an unreadable (ciphertext) message.The intended recipient of the message then uses the same or another digital key (depending on the encrytion method) to convert the cipertext message back into plaintext.For encrytion has three types :-
                      i)Secret-Key Encryption
                          -uses of secret password.
                     ii)Public-Key Encryption
                           -uses of two keys in association with each encrypted message.
                    iii)Digital Envelopes
                            -uses both public-key and secret-key encryption with some procedure.

5.Control Vs Exposures

 Control
 Exposures
 Needed to reduce exposures.An organization is subject to a variety of exposures that can have an adverse adverse effect on its operations or even its very existences as a viable going concern.It's used to save company from being exposed or to avoid data or financial of the company from being stolen.
 Consist of  the potential financial effect of an event multiplied by its probability of occurrence.The term risk is synonymous with probability of occurrence.Thus an exposures is a risk times its financial consequences.  



6.White Collar Case In Malaysia

- Abusement of authority

KUALA LUMPUR, Oct 28 - White-collar crime outstrips conventional crime as it affects the financial performance of commercial organisations in the country.

As such, issues related to financial crime, fraud and corruption were a major concern to the government, said Deputy Inspector-General of Police Tan Sri Ismail Omar.

He said white-collar crime, or economic crime, could take different forms, including bribery, cyber crime, asset misappropriation, cheque and credit card fraud, identity theft, insurance fraud, money laundering and counterfeiting.

“The other main contributing offences are criminal breach of trust, cheating, forgery and illegal money lending,” he told reporters after opening a Seminar on Forensic Accounting and Financial Criminology at the Securities Commission here today.

Between January and August this year, Ismail said the Commercial Crime Investigation Department (CCID) estimated the loss from various economic crimes at RM546,114,099.

For the whole of last year, the loss was reported at RM1,988,959,883, while the previous year saw the loss as RM833,453,263.

He added that Pricewaterhouse Coopers Global Economic Crime Survey 2007 revealed that 48 per cent of Malaysian companies were subjected to economic crime during the past two years.

“In fact, this has doubled as compared to the 2005 survey. According to the same survey, fraud remains one of the most problematic issues for businesses worldwide, no matter what a company’s country of operation, industry sector or size,” he said.

The deputy inspector-general of police said, over the years, capitalists, corporate executives and even criminologists argued that white-collar crime took a back seat to a strong national focus on more conventional crimes, especifically violent ones.

However, with changing times, Malaysians were now much more aware of the seriousness of economic crime, he said.

“Those who are engaged in financial transaction are also at risk from banking, insurance and credit card fraud, as well as identity theft which is generally a precursor to the aforementioned cases of fraud.

“Demand for the expertise of forensic accountants these days is higher as there are now signs that economic crime is affecting other economic sectors such as manufacturing, tourism and property,” added Ismail.

He said coalitions of private and public groups, and an international approach was needed to work together to combat financial and economic crime. - Bernama












No comments:

Post a Comment