Friday, May 22, 2020

The Roles of Family in the Philippines - 610 Words

Family plays an important part of everybody’s life. In the Philippines Family comes first among any other priorities in life. A typical Filipino family is composed of father, mother, with children and may also include an extended family of aunt, uncle, cousin or grandparent. The father is head of the family and acts as the breadwinner. He makes major decisions in consultation with his wife. He implements discipline in the family. The treasurer and home keeper in the family is the wife. She takes care of the children and her husband. Children are usually closer to her than to their father. Nowadays, there are also working mothers because of the rising need in the cost of living. The father and the mother work hand in hand, to establish and give the life that their children deserve. The children are taught to respect and obey their parents. The elder sibling, especially the girl, is trained to be her mother’s assistant. She learns to look after her younger siblings and to manage the home. Elder sibling also gets respect from the younger ones. Filipino children are assigned home chores to train them to be responsible. The family molds the child’s character. It is where moral values are first being taught. The parents are the ones responsible in inculcating good manners and right conduct to their children that they will carry on as they grow up. Close family ties is also one of the trademarks in a Filipino family. The strong bond in the family is very prominent in theShow MoreRelatedA Look Into Filipino Culture896 Words   |  4 Pagesperspectives and is heavily rooted in Christianity. The diversity of its people coupled with their ability to adapt and tolerate new ideas has created a fusion of traditional and modern. Filipinos pride themselves in their Sociability, religious belief, and Family oriented lifestyle. Social Aspects Filipino culture focuses heavily on social interaction and although many Filipinos are aware of western social norms and are tolerant of social miscues that would be rather damaging in other conservative culturesRead MoreCulture And Geography Of Philippines1554 Words   |  7 PagesName: Instructor: Course: Date: Culture and Geography of Philippines Introduction The Republic of the Philippines was called Filipinas to honor King Philip the second of Spain in 1543. The Philippine Islands were the name used before independence. Geography and climate have always had very potent effects on culture. Geography often shapes the way people live and interact with each other. Climate, or the prevailing weather patterns over time of a region, also has drastic effects on society and culturesRead MorePhilippines And Indi Hofstedes Cultural Dimensions1442 Words   |  6 PagesPhilippines and India: Hofstede’s Cultural Dimensions According to MindTools.com, psychologist Dr. Geert Hofstede aimed to understand cultures and cultural differences 1970s when he began to decades of research and thousands of interviews. What emerged was is an internationally recognized standard model of cultural dimensions. Hofstede analyzed the results of his research and found clear patterns of similarity and difference amid the responses along these five dimensions. There are five mainRead MoreCultural Characteristics of the Philippines 1429 Words   |  6 Pages Cultural Characteristics Overview The Philippines has a population of about 104 million people. It is located in Southeast Asia in the Western Pacific ocean. It is composed of 7,107 islands with 3 main geographical divisions- Luzon, Visayas, and Mindanao. The different divisions of the Philippines have differences in tradition. The Philippines has a tropical climate and a mountainous terrain; earthquakes and typhoons happen frequently. Both dry and rainy reasons occur, which makes year roundRead MoreMajor Characteristics Of A Philippine Culture1031 Words   |  5 PagesPhilippine Cultural Awareness Culture is the shared patterns of behaviors and interactions, cognitive constructs, and affective understanding that is learned through a process of socialization. These shared patterns, identify the members of a culture group while also distinguishing those of another group. Five major characteristics of a Philippine culture include family, beliefs, customs, food, and language. In this essay geography and military conflict history, weather analysis, and civil considerationsRead MoreCultutral Gender Roles Essay1296 Words   |  6 PagesCultural Gender Roles In most cultures, boys and girls are treated very differently. Despite the differences of gender, upbringing creates gender behavior, including aggression and gentility; societal stereotypes of gender, and most importantly, gender-based discrimination. Throughout history and in all cultures the roles of males and females vary. Relating to the article Girl written by Jamaica Kincaid at a time when womens roles were to work in the home. By examining gender roles, then one mayRead MoreMalnutrition in the Philippines Essay1099 Words   |  5 PagesFor years, the people of the Philippines have been in grave danger of a horrible condition. They are suffering from malnutrition, an unhealthy imbalance in an individual’s diet which may result from a lack of certain nutrients being consumed or starvation (Board). Malnutrition has been an issue there for many years as a result of the country’s overwhelming poverty rates (about 27.9 percent of the populace) depriving its people of food, and raging typhoons (such as Super Storm Haiyan) have only exasperatedRead MorePhilippines Annexation and US Masculinity1258 Words   |  5 PagesAmerican government wanted to prove their superiority among other emerging nations and in doing so chose to colonize and annex nations such as the Philippines. Primary resources indicated that the annexation of the Philippines was indeed motivated by the lack of masculinity that was felt by the American government at the time (Hollitz, 2010). Gender roles in the United States were at a point where their stereotypical reputations were changing and women were gaining more social power. This was unlikeRead MoreCulture Is The Most Natural Or Superior Way Of Understanding The World795 Words   |  4 Pagescountries or regions it might come off as rude or inconsiderate. In different cultures there are things that are more important than other cultures throughout the world and the Filipino people do things a little differently than most. In the Philippines family is the center of the social structure and that will include everyone, manners are taught very young age especially towards the elderly and high-ranking officials and they will typically use â€Å"sir† or â€Å"madam† in basic conversations. In the UnitedRead MoreStudy About Ofw1697 Words   |  7 PagesBurgos, April 18, 2010. He stated that some 18.05 per cent of all Filipino households received cash from abroad in the year 2000, and this rose to 20.72 per cent in 2003 and then to 23.3 per cent in 2006. From the data, the author observed that more families of OFWs were spending less on food and more on health, with the percentage share of expenditures of migrant households on food down slightly from 44.9 per cent in 2000 to 43.3 per cent in 2006, while expenditures on health increased from 2.3 per

Sunday, May 10, 2020

Insurance Law on English Insurance Market - Free Essay Example

Sample details Pages: 5 Words: 1545 Downloads: 10 Date added: 2017/06/26 Category Law Essay Type Argumentative essay Level High school Did you like this example? It is arguable that the categorisation of disputes between insurers and reinsurers has served to more effectively resolve disputes in law. Evaluate this statement in view of the development of the law in this area and state your view in relation to whether disputes are effectively resolved and as to whether they could still be better dealt with. To begin with, it will be necessary to look to provide a review of the development of the law and practice in this area of study that will consist of first looking to reflect upon the development of insurance law regarding its general application[1]. Don’t waste time! Our writers will create an original "Insurance Law on English Insurance Market" essay for you Create order On this basis, Lloydà ¢Ã¢â€š ¬Ã¢â€ž ¢s à ¢Ã¢â€š ¬Ã…“provides the facilities for and is the regulator of an English insurance marketà ¢Ã¢â€š ¬Ã‚ [2] that began in the seventeenth century and now has virtually no limitations. But it must also be recognised that Lloydà ¢Ã¢â€š ¬Ã¢â€ž ¢s is not specifically an underwriter of insurance because it is actually a à ¢Ã¢â€š ¬Ã‹Å"societyà ¢Ã¢â€š ¬Ã¢â€ž ¢ of à ¢Ã¢â€š ¬Ã‹Å"Namesà ¢Ã¢â€š ¬Ã¢â€ž ¢ who underwrite insurance, but do not actively engage in the industry[3], so it is necessary to look to effectively identify the broker to be able to effectively proceed[4]. Recognition of Common Disputes However, more specifically, with regards to the development of the law regarding disputes between insurers and reinsurers, it is important to appreciate disputes have been found to commonly arise in the following circumstances à ¢Ã¢â€š ¬Ã¢â‚¬Å" In relation to issues of disclosure and representation; The binding effect of settlements; and Drafting à ¢Ã¢â€š ¬Ã¢â‚¬Å" with regards to the absence or use of inappropriate or untested wordings. What has this meant for insurers? Contracts of a à ¢Ã¢â€š ¬Ã‹Å"facultativeà ¢Ã¢â€š ¬Ã¢â€ž ¢ nature in this area have commonly been found to be in slip form, but more recently the courts in this country have looked to assist parties to reinsurance agreements. By way of illustration, any form of reinsurance agreement that is considered to fall within a direct life policy, so as to contravene the rules regarding insurable interests found within the provisions of the Life Assurance Act 1774, was effectively saved by the decision in Feasey v. Sun Life Assurance Company of Canada[5]. Therefore, it may be arguable the only reason that the market practice of arranging reinsurance before insurance may be considered somewhat superficial on the basis of the decision in General Accident Fire Life Assurance Corporation Others v. Tanter (The Zephyr)[6]. Moreover, it is also important to appreciate the ambiguity of words that have also been used in such agreements have been considered to be sui table to justify any finding of the fact the party reinsured should still be entitled to some form of indemnity even where they have been found to have acted to the contrary, illustrated by the decision in Re Charter v. Fagan [1996] 3 All ER 46[7] reached by the House of Lords. How can such problems be effectively resolved? (i) Disclosure In particular, it is necessary to consider the idea of full disclosure specifically so they are then considered fully informed of the risks when it comes to insuring and reinsuring the party concerned. But as to what an insurer needs to be informed about has been found to vary substantially from case to case. Therefore, by way of illustration, this may include à ¢Ã¢â€š ¬Ã¢â‚¬Å" (a) that the director of a bank was under investigation[8]; (b) that a professional sportsman had already sustained an injury previously[9]; and (c) also where the subject matter was not what the parties actually insured (e.g. clocks instead of watches)[10]. As a result, th ere is a clear need to make sure information is checked rather than simply passed on, illustrated by Assicurazioni Generali SpA v. Arab Insurance Group[11]. (ii) Settlements Generally, it has been recognised that, where the phrase à ¢Ã¢â€š ¬Ã…“follow the settlementsà ¢Ã¢â€š ¬Ã‚  is used, the reinsured can prove their loss by either being sued to judgment or award, or by entering into a bona fide commercial arrangement, according to Insurance Company of Africa v. Scor (UK) Reinsurance Ltd[12]. Therefore, this may be seen to be in conflict with the à ¢Ã¢â€š ¬Ã‹Å"full reinsuranceà ¢Ã¢â€š ¬Ã¢â€ž ¢ clause in view of the fact that the policy terms of the reinsured are generally perceived to be those of the reinsurer so that this effectively meant they cannot adopt their own wording where it would be found to be in conflict with the understanding of the reinsured[13]. (iii) Wording Finally, it is to be appreciated that the courts will not simply fill in any gaps left open by the mar kets[14] overturning the idea that, according to Phoenix v. Halvanon[15], there were implied terms in certain agreements regarding à ¢Ã¢â€š ¬Ã¢â‚¬Å" (a) keeping records; (b) investigating all claims before liability is accepted; (c) keeping accurate accounts; (d) making sure all amounts owed are paid and collected promptly; and (e) making all documentation available to reinsurers. But the incorporation of terms has also been fraught with difficulty because it does not create à ¢Ã¢â€š ¬Ã‹Å"back-to-backà ¢Ã¢â€š ¬Ã¢â€ž ¢ insurance à ¢Ã¢â€š ¬Ã¢â‚¬Å" even though the courts have sought to achieve this[16] so there has been a need to determine what can be incorporated à ¢Ã¢â€š ¬Ã¢â‚¬Å" mainly (a) provisions directly relating to risk[17]; (b) notice clauses and similar obligations; and (c) dispute resolution clauses expressly included[18]. Moreover, the use of unusual wording (such as à ¢Ã¢â€š ¬Ã‹Å"follow the fortunesà ¢Ã¢â€š ¬Ã¢â€ž ¢ rather than à ¢Ã¢â€š ¬Ã‹Å"follow the settlement sà ¢Ã¢â€š ¬Ã¢â€ž ¢) will also lead to problems because of the fact that it is unclear what the reinsurer is trying to do in such circumstances[19]. Conclusion In conclusion, it is important to appreciate the courts in this country have looked to effectively provide for the resolution of disputes regarding issues of insurance between reinsurers and insurers. This is because, in view of the fact that the courts have looked to recognise where most disputes are likely to arise, the judiciary has been able to develop certain standards in relation to these issues in an effort to resolve disputes quickly and efficiently. However, just because the courts will look to resolve matters amicably does not meant that they will favour the reinsured in all cases where there is a dispute between the insurer and the reinsurer because the judiciary will not look to read terms into any agreement just for the sake of doing so. Therefore, it is arguable that the law is effective at dealing with disputes on this basis. References à ¢Ã¢â€š ¬Ã¢â‚¬Å" Texts, Article Websites M. D. Carodine à ¢Ã¢â€š ¬Ã‹Å"Political Judging: When Due Process Goes Internationalà ¢Ã¢â€š ¬Ã¢â€ž ¢ (2007) 48(4) College of William Mary, Marshall Wythe School of Law 1159 à ¢Ã¢â€š ¬Ã‹Å"Halsburyà ¢Ã¢â€š ¬Ã¢â€ž ¢s Law of Englandà ¢Ã¢â€š ¬Ã¢â€ž ¢ Lexis Nexis, Butterworths (2008) R. W. Hodgin à ¢Ã¢â€š ¬Ã‹Å"Insurance Law: Test Materialsà ¢Ã¢â€š ¬Ã¢â€ž ¢ Routledge Cavendish (2002) Lexis Nexis Professional (2008) (www.lexisnexisprofessional.com) C. H. Peterson à ¢Ã¢â€š ¬Ã‹Å"Choice of Law Forum Clauses the Recognition of Foreign Country Judgments Revisited Through the Lloyds of London Casesà ¢Ã¢â€š ¬Ã¢â€ž ¢ (2000) 60 LA. L. REV. 1259 Westlaw (2008) (www.westlaw.com) Table of Cases American International Marine Agency of New York Inc v. Dandridge [2005] EWHC 829 (Comm) Assicurazioni Generali SpA v. Arab Insurance Group [2002] 2 Lloydà ¢Ã¢â€š ¬Ã¢â€ž ¢s Rep IR 131 Bonner v. Cox [2006] Lloydà ¢Ã¢â€š ¬Ã¢â€ž ¢ s Rep IR 385 Brotherton v. Aseguradora Colsequeros SA (No. 3) [2003] Lloydà ¢Ã¢â€š ¬Ã¢â€ž ¢s Rep IR 774 Department of Trade Industry v. St Christopherà ¢Ã¢â€š ¬Ã¢â€ž ¢s Motorist Association [1974] 1 WLR 99 Feasey v. Sun Life Assurance Company of Canada [2003] Lloydà ¢Ã¢â€š ¬Ã¢â€ž ¢s Rep IR 637 General Accident Fire Life Assurance Corporation Others v. Tanter (The Zephyr) [1984] 1 Lloydà ¢Ã¢â€š ¬Ã¢â€ž ¢s Rep 58 General Accident Fire Life Assurance Corporation Others v. Tanter (The Zephyr) [1985] 2 Lloydà ¢Ã¢â€š ¬Ã¢â€ž ¢s Rep 529 Groupama Navigation v. Catatumbo [2000] 2 Lloydà ¢Ã¢â€š ¬Ã¢â€ž ¢s Rep 350 Insurance Company of Africa v. Scor (UK) Reinsurance Ltd [1985] Lloydà ¢Ã¢â€š ¬Ã¢â€ž ¢s Rep 312 International Insurance Plc v. Astrazeneca Insurance Co Ltd [2006] Lloydà ¢Ã¢â€š ¬Ã¢â€ž ¢s Rep IR 409 King v. Brandywine Reinsurance Company (UK) Ltd [2005] Lloydà ¢Ã¢â€š ¬Ã¢â€ž ¢s Rep IR 509 Phoenix v. Halvanon [1985] 2 Lloydà ¢Ã¢â€š ¬Ã¢â€ž ¢s Rep 599 Prifti v. Musini Sociedad Anonima de Seguros y Reaseguros [2004] Lloydà ¢Ã¢â€š ¬Ã¢â€ž ¢s Rep IR 528 Re Charter v. Fagan [1996] 3 All ER 46 Society of Lloydà ¢Ã¢â€š ¬Ã¢â€ž ¢s v. Ashenden No. 98 C 5335, 1999 WL 284775 WISE Underwriting Agency Ltd v. Grupo Nacional Provincial [2004] Lloydà ¢Ã¢â€š ¬Ã¢â€ž ¢s Rep IR 764 Table of Statutes Life Assurance Act 1774 1 Footnotes [1] See, for example, the decisions in Department of Trade Industry v. St Christopherà ¢Ã¢â€š ¬Ã¢â€ž ¢s Motorist Association [1974] 1 WLR 99 The Good Luck [1990] 1 QB 818. [2] See Society of Lloydà ¢Ã¢â€š ¬Ã¢â€ž ¢s v. Ashenden No. 98 C 5335, 1999 WL 284775 à ¢Ã¢â€š ¬Ã¢â‚¬Å" Peterson. C. H à ¢Ã¢â€š ¬Ã‹Å"Choice of Law Forum Clauses the Recognition of Foreign Country Judgments Revisited Through the Lloyds of London Casesà ¢Ã¢â€š ¬Ã¢â€ž ¢ (2000) 60 LA. L. REV. 1259. [3] Carodine. M. D à ¢Ã¢â€š ¬Ã‹Å"Political Judging: When Due Process Goes Internationalà ¢Ã¢â€š ¬Ã¢â€ž ¢ (2007) 48(4) College of William Mary, Marshall Wythe School of Law 1159. [4] Hodgin. R. W. à ¢Ã¢â€š ¬Ã‹Å"Insurance Law: Test Materialsà ¢Ã¢â€š ¬Ã¢â€ž ¢ Routledge Cavendish (2002). [5] [2003] Lloydà ¢Ã¢â€š ¬Ã¢â€ž ¢s Rep IR 637. [6] [1985] 2 Lloydà ¢Ã¢â€š ¬Ã¢â€ž ¢s Rep 529 see, however, the earlier decision in General Accident Fire Life Assurance Corporation Others v. Tanter (The Zephyr) [1984] 1 Lloydà ¢Ã¢â€š ¬Ã¢â€ž ¢s Rep 58. [7] [1996] 3 All ER 46. [8] See Brotherton v. Aseguradora Colsequeros SA (No. 3) [2003] Lloydà ¢Ã¢â€š ¬Ã¢â€ž ¢s Rep IR 774. [9] See Prifti v. Musini Sociedad Anonima de Seguros y Reaseguros [2004] Lloydà ¢Ã¢â€š ¬Ã¢â€ž ¢s Rep IR 528. [10] See WISE Underwriting Agency Ltd v. Grupo Nacional Provincial [2004] Lloydà ¢Ã¢â€š ¬Ã¢â€ž ¢s Rep IR 764. [11] [2002] 2 Lloydà ¢Ã¢â€š ¬Ã¢â€ž ¢s Rep IR 131. [12] [1985] Lloydà ¢Ã¢â€š ¬Ã¢â€ž ¢s Rep 312 à ¢Ã¢â€š ¬Ã¢â‚¬Å" see, however, King v. Brandywine Reinsurance Company (UK) Ltd [2005] Lloydà ¢Ã¢â€š ¬Ã¢â€ž ¢s Rep IR 509. [13] See Assicurazioni Generali SpA v. Arab Insurance Group [2002] 2 Lloydà ¢Ã¢â€š ¬Ã¢â€ž ¢s Rep IR 131. [14] See Bonner v. Cox [2006] Lloydà ¢Ã¢â€š ¬Ã¢â€ž ¢s Rep IR 385. [15] [1985] 2 Lloydà ¢Ã¢â€š ¬Ã¢â€ž ¢s Rep 599. [16] Groupama Navigation v. Catatumbo [2000] 2 Lloydà ¢Ã¢â€š ¬Ã¢â€ž ¢s Rep 350. [17] See American International Marine Agency of New York Inc v. Dandridge [2005] EWHC 829 (Comm). [18] See Prifti v. Musini Sociedad Anonima de Seguros y Reaseguros [2004] Lloydà ¢Ã¢â€š ¬Ã¢â€ž ¢s Rep IR 528 [19] See International Insurance Plc v. Astrazeneca Insurance Co Ltd [2006] Lloydà ¢Ã¢â€š ¬Ã¢â€ž ¢s Rep IR 409.

Wednesday, May 6, 2020

Advantages and Disadvantages of Accounting information systems (AIS) Free Essays

string(34) " to damage another individual’\." Introduction Accounting information systems (AIS) have experienced vast changes in several decades, improving from paper-based journals and ledgers to completely automated, paperless systems. However, the migration from paper to computer has its risks to the company. It contains the confidential information which becomes compromised if it is unprotected. We will write a custom essay sample on Advantages and Disadvantages of Accounting information systems (AIS) or any similar topic only for you Order Now The unauthorized use of the accounting system can be misused and involved in risking loss of the information, disastrous and bad data input. Security of accounting systems is a priority in many companies. In recent decades, the changing environment has posed a threat to the company. As a system accountant of a large established UK based Retail Company specialising in the sale of household electrical appliances, it is necessary to consider the risks and the security threats that the company would face in today’s business environment. According to Tony Boczko, risk is related to the likelihood of loss, the probability of mischance and the possibility of hazard or harm. Moreover, risk can be defined in several ways such as the chance of bad consequences, the exposure to mischance and the probability of loss. These risks and threats can lead an undesirable impact on both the present and future of the company’s financial activities and stability. Type and nature of both the risks and the security threats Nature of risk The nature and source of the risks can be distinguished into two primary sources of risk which can be categorized as the event/activity-based risk and resource/asset-based risk. By referring to Tony Boczko 2007 (pp. 681), he mentioned that event/activity-based risk is defined as the risk which is associated with the particular event/ activity or the group of activities/ events. The resource/ asset- based risk is the subsidiary primary source which can be defined as the risk which is associated with the possession and use of the resource/ asset or the group of recources/ assets. In addition, Tony Boczko 2007(pp. 681) mentioned that the source of risk can be categorized into four associated secondary sources of risks such as authorized internal employee and external agent-based risk, unauthorized persons-based risk and nature-based risk. The case of the authorized internal employee/ external agent-based risk is the possible loss which can be resulted from the unintentional or deliberate errors. Unauthorized persons-based risk is most likely involved in the risk of possible loss which can be resulted in the possible breaches of security and misappropriation of assets and information. The nature based risk is involved in the risk of possible loss which is resulted from the geographical disaster or meteorological conditions. Type of Risk What are the different types of risksThere a number of differing types of risk that can affect the household electrical appliances company in today’s business environment. One of the risks is unintentional error. Unintentional error is the error which is related to the inadvertent mistake and erroneous actions attributable to the bad judgement in decision making, ignorance and inattention. The unintentional errors that happened through computerized systems are always at of risk power failure of the computer, viruses attack and end up with losing the important information of the company such as financial documents. Furthermore, problems with computerized system could lead to a standstill in usage of the database. When the household electrical appliances company is focus and reliant on the accounting information system, the unintentional error due to the power and computer outage could lead to a work disruption. Work disruption can disable the input of the information of the com pany can access to the stored information. Additionally, if the data is not backed up properly, the company will end up lost its important data. Risk such as deliberate errors can cause the company with the bad and serious implications. According to Tony Boczko 2007(pp. 682), deliberate errors can be explained as the conscious erroneousness and incorrectness whose occurrences are designed to damage, destroy and defraud a person, group of persons and organization. Such errors are intentional and premeditated. What if there is ‘someone’ else hosting its precious and valuable data‘Someone’ refers to the hacker. Hacking is the illegal action which involved in gaining unauthorized access to the company accounting information system to steal and get the data illegally. The big news of the hacking system is NASA’s system. ‘In 2002, Gary McKinnon was arrested by the UK’s national high-tech crime unit, after being accused of hacking into NASA and the US military computer networks.’ (BBC NEWS, 2006) Besides that, the hacker ‘The hacker has also denied that he had made Washingto n’s computer system inoperable, although he did admit he may have deleted some government files by accidentally pressing the wrong key’. (Jo Best, 2005). Deliberate errors brought a serious implication to the company. Besides that, natural disaster is also counted as the serious type of risk in today’s business environment. ‘A natural disaster is the effect of a natural hazard (e.g., flood, tornado, hurricane, volcanic eruption, earthquake, or landslide). It leads to financial, environmental or human losses. The resulting loss depends on the vulnerability of the affected population to resist the hazard, also called their resilience’. (Wikipedia, 2011) As a household electrical appliances company, if it is suffered from the natural disaster such as floods. Floods can destroy drainage computer system and cause the raw sewage to spill with water. Besides that, building and company’s equipments can be also damaged due to the floods. It will lead to the catastrophic effects on the environment as the toxic such as gasoline will be released and caused pollution. Floods can cause a huge amount of money losses to the business. Type of Security Threats In today’s business environment, there are many computer frauds and computer crimes through computerized accounting information systems. Fraud can be defined as ‘deceit, trickery, sharp practice, or breach of confidence, perpetrated for profit or to gain some unfair or dishonest advantage. In the broadest sense, a fraud is an intentional deception made for personal gain or to damage another individual’. You read "Advantages and Disadvantages of Accounting information systems (AIS)" in category "Essay examples" (Wikipedia, 2011) As a household electrical appliances company, the internal employees or managers as well as the shareholders can be also fraud through the computerized accounting information system. The information stored electronically can be manipulated and accessed if proper controls and security measures are not taken place. This will affect the operation of the business. Fraud such as account takeover is a serious activity which always happens in toda y’s business environment. ‘An account takeover can happen when a fraudster poses as a genuine customer, gains control of an account and then makes unauthorized transactions’. (Action fraud) The information of account holders such as credit card can be taken over by those fraudsters. Los Angeles attorney Christopher Painter said: â€Å"If you have an explosive growth on the Internet, you’re going to have this great huge growth in fraudulent conduct and crime committed over the internet.† (BBC NEWS, 1999) From this evidence, we can see that there is a security threat on today’s business through the computerized accounting information system. Fraudster can be sued if they found out by people. For example, ‘Bank of America and two of its former bosses have been charged with fraud for allegedly misleading shareholders during the takeover of Merrill Lynch’. (guardian.co.uk, 2010) There are few types of fraud, such as false billing, financial fraud, advanced fee frauds, identity theft and phishing. In false billing scam, the fraudster will send out a so-called invoice for a particular product or service that are never be ordered, fraudster hope that it will be paid for sure from the victim without any investigation. This activity usually happened in large business organization, it is because large business organization has a billing or payments system which used to pay the invoice of the company, fraudster sends out those fake invoices and hope that this will be unnoticed by the large business organizations. ‘Phishing is a way of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication’. (Wikipedia, 2011) It is dangerous for today’s business operation, it is because instead of stealing the personal and business information, ‘phishers’ can affect the computer with the viruses and convince the victim in order to participate in money laundering. Another security threat is computer crime, according to Tony Boczko 2007 (pp. 691), he mentioned that computer crime can be defined as the deliberate action to gain access to, or steal, damage or destroy the computer data without authorization. Computer crime involves in the activity of dishonest manipulation of computer programs or computer-based data. It also involves in the fraudulent use/abuse of computer access and resources for personal gain. The types of computer crime such as the inappropriate use of corporate information systems, theft of computer and hardware, unauthorized access and information theft or the fraudulent modification of data and programs, system failure and premeditated virus infection and disruptive software. It is hard to define a computer crime; it is because computer crime is always and easily be happened in the business organization. People might think that fraud is also kind of computer crime. It is a wide context in security threats. As a household electrical appliances company, premeditated virus infection such as spyware, it gathers the users and client’s information and relays it to the third party such as advertisers. Spyware can monitor operation of the computer, scan the important information and files, snoop on the private applications such as chat programs. By reading the cookies and change the default web browser, spyware can consistently relaying the information from the database. It is dangerous for the business organization, because if their competitors spy into their programs and get the costs and type of materials of the electrical appliances as well as the client’s contact number, the business organization will be easily defeated by competitors. There is a latest issue about the Sony PlayStation Network which involved in the identity theft. ‘Up to 3 million Britons are believed to be among the 77 million users of Sony’s PlayStation Network, which has been hacked into by criminals who have stolen users’ personal information, possibly including credit card details’. (Charles Arthur and Keith Stuart, 2011) ‘Sony, which shut down the online games, movies and music delivery system last week after it was attacked by hackers, has said that although names, birthdates, e-mail addresses and log-in information were compromised for certain players, it has seen â€Å"no evidence that credit data was taken,† but â€Å"cannot rule out the possibility’. (Richard Newman, 2011) Security Strategies/Measures Due to the vulnerability of the computerized accounting information system, it is easy to be attacked by internal and external people of the business organization. It is necessary to implement some methods to solve the serious issues. According to American Institute of CPAs In order to protect the business organization from the attack of risk and security threats, , TOP Technology Initiatives Task Force, which is a group of the technologically astute members of the CPA profession and other technology professionals, collaborated in the AICPA’s Top Technology Initiatives project, seeking to identify the most important technology initiatives. The first method is enhancing the information security such as upgrade the hardware and software in order to protect the information systems from the security threats. Company should implement and upgrade the level of firewall which blocks the intrusion from the internet. Update the anti-virus programs with the logins of password and username to limit access. Besides that, company should hire the experienced network integrator to check whether it is work properly with the security patches. Additionally, company can have a security audit for the independent confirmation on the company’s financial data and client’s information. Through this process, business organization can be protected. The other method is disaster and business continuity planning. It is an activity which involves in the developing, monitoring and updating of the climate change, accident and other malicious destruction. It can prevent the business organization to loss their important information. It is because having the computerized accounting information system down for few hours or few days due to the natural disaster; could lead a bad impact to the profitability and liquidity of the business organization. So, business organization should plan and design a process to keep the system stable to prevent any losses. Control Procedure According to Tony Boczko 2007(pp. 729), he mentioned that the internal control which comprises the processes or procedures within a business organization designed to provide a reasonable assurance that business objective- primarily the maximization of shareholder wealth which can be achieved and those undesired events can be prevented or corrected. The internal control related to the management control. It can be defined as a diverse range of activities designed to conduct, direct and control business activities and ensure the consistency with corporate business objective. For example auditors, their role is to audit the business organization’s internal control policies, to assure that the control within the departments is under controls and adequate, it can help in control the financial statement to prevent the financial loss in order to achieve the mission of business organization. Furthermore, internal control such as risk assessment is also needed to be taken place in every business organization. It is an effective control procedure helps in protecting company. According to health and safety executive, the risk assessment, instead of creating the huge amounts of paperwork, but rather about identifying sensible measures to control the risks in the business organization. Risk assessment is help to protect people by putting in place measures to control those risks. As a household of electrical appliances company, risk assessment is a good starting point; manager can actually investigate and look for the hazard which may cause harm to the business organization. Furthermore, a critical thinking about how the accident could happen and who will be influenced could help in noticing and monitoring the risk. Once the managers identify the risk, it will be easily to control and put a suitable measure on it. Conclusion As a conclusion, accounting information system brings a lot of disadvantages to the organization in today’s business environment, but accounting information system combines the study and practice of the accounting with the concept of designing, implementing, controlling and monitoring the information systems. It also combines the modern information technology and the traditional accounting system to provide a better financial system to manage and improve the financial performance of the organization. How to cite Advantages and Disadvantages of Accounting information systems (AIS), Essay examples