StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

MBA Information Technology Preventing and Detecting Operational Risk Caused by Employees - Essay Example

Cite this document
Summary
Answer. IT security and internal fraud therein has gained tremendous relevance in recent decades and lack of it has caused unfathomable losses to the organisations. The following four major components in IT security against operational risk from employees can have direct bearing on the various frauds committed by the employees intentionally or unintentionally:
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.9% of users find it useful
MBA Information Technology Preventing and Detecting Operational Risk Caused by Employees
Read Text Preview

Extract of sample "MBA Information Technology Preventing and Detecting Operational Risk Caused by Employees"

Download file to see previous pages

It has become imperative for the senior management to forcefully implement the appropriate measures to detect and prevent operational risk from employees in their organisations. Most of the measures, including security, need to be followed top down. An employee who sees an upright senior is less likely to engage in fraudulent behaviour. Security Policies and Training. The next step is to develop security policies and provide training to ensure that everyone is aware of, understands them and also follows them in right spirit.

The greater the understanding of how security issues directly impact production levels, customer and supplier relationships, revenue streams, and management's liability, the more security will be incorporated into business projects and proposals. Most critical is an Acceptable Use policy (AUP) that informs users of their responsibilities. An AUP serves two main purposes: (1) It helps to prevent misuse of information and computer resources and (2) it reduces exposure to legal liability. Security Procedures and Enforcement.

The next step is to implement procedures, training, and enforcement of the AUP. Businesses cannot afford to ignore security risks nor can they afford the infinite cost of perfect security. Security Tools: Hardware and Software. . Keep in mind that security is an ongoing, multilayered process and not a problem that can be solved with hardware or software tools. Hardware and software security defenses cannot protect against irresponsible business practices. 2. What events triggered the strong measures to prevent and detect internal fraud Name three laws that have antifraud measures.Answer. Fraud Prevention and Detection.

Internal audits and internal controls (cover later in the chapter) are critical to the prevention and detection of occupational frauds. Some high-profile examples of occupational fraud that were executed because of the lack of internal audits and controls leading to implementation of strong measures to prevent and detect internal fraud include:NEC. In 2006, NEC had to restate its earnings for five prior years after discovering that a 50-year-old manager/engineer had been fabricating business deals.

The bogus deals inflated sales by 36.3 billion yen ($311 million). The false transactions enabled the manager to embezzle tens of millions of yen, which he spent on entertainment. Adelphia. A year after the public learned of the $600 million Enron scandal, the Rigases made Enron's fraud look like penny-change. The SEC uncovered the misappropriation and theft of tens of billions of dollars. In addition to the $2.3 billion the family stole from the company for their personal use, they caused losses investors of more than $60 billion.

Global Crossing. Corporate insiders knowingly sold more than $1.5 billion of artificially inflated company stock. In April 2005, the SEC filed a settled action for civil penalties against Global Crossing's former CEO, CFO, and VP of Finance for aiding and abetting the fraud. Each executive agreed to pay a $100,000

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“MBA Information Technology Preventing and Detecting Operational Risk Essay”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1504027-mba-information-technology-preventing-and-detecting-operational-risk-caused-by-employees
(MBA Information Technology Preventing and Detecting Operational Risk Essay)
https://studentshare.org/miscellaneous/1504027-mba-information-technology-preventing-and-detecting-operational-risk-caused-by-employees.
“MBA Information Technology Preventing and Detecting Operational Risk Essay”, n.d. https://studentshare.org/miscellaneous/1504027-mba-information-technology-preventing-and-detecting-operational-risk-caused-by-employees.
  • Cited: 0 times

CHECK THESE SAMPLES OF MBA Information Technology Preventing and Detecting Operational Risk Caused by Employees

Internal accounts and accouting systems-chic paints limited

In this context, information and relevant concepts are obtained from academic and online journals, books and other corporate websites.... The research explores an in-depth understanding and of the accounting practices and standards of Chic Paints Limited and analyze the organization's internal controlling mechanism....
20 Pages (5000 words) Assignment

Relationship of Management and Leadership

b) what caused other efforts to fail?... d) what is the organization's risk profile?... In this paper, among the several elements of the organizational governance, there are three that could be characterized as the most important ones due to their role in the firm's overall performance and survival in its market....
20 Pages (5000 words) Term Paper

The Role of Capacity and Demand in a Public Service

The author of the paper will attempt to discuss the thesis that public services are capacity, not demand led.... The paper draws on and uses examples from the police service in the UK in order to evaluate the role of capacity and demand in public service.... hellip; The conclusion from this assignment states that the basic job of police service has always been to provide security and to earn the trust of the community at large....
15 Pages (3750 words) Assignment

Knowledge Management Plan for Dell Inc

hellip; Human capital is undoubtedly one of the most valuable and powerful assets in an organization and therefore recruiting, selecting, training and retaining skilled, experienced and knowledgeable employees have become the main focus of Human Resource Management.... The KM is a recent development and new interdisciplinary approach to the Human Resource Management and it involves people, process and technology in an organization.... Many businesses are rich in information or are able to create sufficient knowledge, but they fail to effectively share it with others or to utilize it for the overall benefits of the organization....
14 Pages (3500 words) Case Study

Strategic Human Resource Management

This report will present information and an evaluation regarding the new language used by organizations and human resource departments and how this new language impacts employees.... Key statistics and data show the median age of the workforce currently is 40 (employees are aging out of the workforce); close to 40 percent of new job applicants will lack the reading, writing, and math skills when applying for a job they are seeking; skill demands have changed; the economy is primarily focused on service industries rather than manufacturing; knowledge is much more valuable and is considered an asset; population growth is slowing in some areas....
21 Pages (5250 words) Coursework

Promoting Information Security in Banking Solutions Inc

Skipping some item processing facilities poses an information security risk to both customers and the institution.... Skipping some item processing facilities poses an information security risk to both customers and the institution.... This case study "Promoting information Security in Banking Solutions Inc" focuses on the major information security issue faced by Bank Solutions Inc.... ther failures contributing to information security issues include problems regarding critical systems, business processes, alternative processing facility address as well as directions, notification listing, and procedures for public relations management....
5 Pages (1250 words) Case Study

Citi-Bank E-Business Strategy

This is ‘e-commerce' in which the reliability and strength of convention information technology coordinate with Web.... Harvard Business School Press, Boston, 2001)New delicate combination of Web with information technology model mingles the simplicity; standards and connectivity of core processes with Internet are the foundation of business.... Businesses commenced to accomplish real value of business as they integrate Internet technology in the hub of their processes....
16 Pages (4000 words) Coursework

Database Administration Aspects

The company wants to come up with a new IT system to allow effective sharing of information among the different branches.... … HIGHER COLLEGES OF TECHNOLOGYABU DHABI WOMEN'S COLLEGEAssessment Cover SheetOctober 30, 2019Course Code and Name:ITEC N312 –Database Administration Time Allowed:3 WeeksAssessment Number:AT1 –Take home assignmentLO/Goals Covered: LO 01 Special HIGHER COLLEGES OF TECHNOLOGYABU DHABI WOMEN'S COLLEGEAssessment Cover SheetOctober 30, 2019Course Code and Name:ITEC N312 –Database Administration Time Allowed:3 WeeksAssessment Number:AT1 –Take home assignmentLO/Goals Covered: LO 01 Special Instructions:The project is to be completed in a group of maximum three students....
10 Pages (2500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us