We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

MBA Information Technology Preventing and Detecting Operational Risk Caused by Employees - Essay Example

Comments (0)
Answer. IT security and internal fraud therein has gained tremendous relevance in recent decades and lack of it has caused unfathomable losses to the organisations. The following four major components in IT security against operational risk from employees can have direct bearing on the various frauds committed by the employees intentionally or unintentionally:
Download full paper

Extract of sample
MBA Information Technology Preventing and Detecting Operational Risk Caused by Employees

Download file to see previous pages... It has become imperative for the senior management to forcefully implement the appropriate measures to detect and prevent operational risk from employees in their organisations. Most of the measures, including security, need to be followed top down. An employee who sees an upright senior is less likely to engage in fraudulent behaviour.
Security Policies and Training. The next step is to develop security policies and provide training to ensure that everyone is aware of, understands them and also follows them in right spirit. The greater the understanding of how security issues directly impact production levels, customer and supplier relationships, revenue streams, and management's liability, the more security will be incorporated into business projects and proposals.
Most critical is an Acceptable Use policy (AUP) that informs users of their responsibilities. An AUP serves two main purposes: (1) It helps to prevent misuse of information and computer resources and (2) it reduces exposure to legal liability.
Security Procedures and Enforcement. The next step is to implement procedures, training, and enforcement of the AUP. Businesses cannot afford to ignore security risks nor can they afford the infinite cost of perfect security.
Security Tools: Hardware and Software. ...
Keep in mind that security is an ongoing, multilayered process and not a problem that can be solved with hardware or software tools. Hardware and software security defenses cannot protect against irresponsible business practices.

2. What events triggered the strong measures to prevent and detect internal fraud Name three laws that have antifraud measures.

Answer. Fraud Prevention and Detection. Internal audits and internal controls (cover later in the chapter) are critical to the prevention and detection of occupational frauds. Some high-profile examples of occupational fraud that were executed because of the lack of internal audits and controls leading to implementation of strong measures to prevent and detect internal fraud include:
NEC. In 2006, NEC had to restate its earnings for five prior years after discovering that a 50-year-old manager/engineer had been fabricating business deals. The bogus deals inflated sales by 36.3 billion yen ($311 million). The false transactions enabled the manager to embezzle tens of millions of yen, which he spent on entertainment.
Adelphia. A year after the public learned of the $600 million Enron scandal, the Rigases made Enron's fraud look like penny-change. The SEC uncovered the misappropriation and theft of tens of billions of dollars. In addition to the $2.3 billion the family stole from the company for their personal use, they caused losses investors of more than $60 billion.
Global Crossing. Corporate insiders knowingly sold more than $1.5 billion of artificially inflated company stock. In April 2005, the SEC filed a settled action for civil penalties against Global Crossing's former CEO, CFO, and VP of Finance for aiding and abetting the fraud. Each executive agreed to pay a $100,000 ...Download file to see next pagesRead More
Comments (0)
Click to create a comment
Operational Risk Management of xx company
man Brothers Company began in 1850 through predecessor entities. From establishing the New York Cotton Exchange, it became the fourth largest investment bank in 1868 with a network of offices in Europe, North America, the Middle East, Latin America and the Asia Pacific region.
12 Pages(3000 words)Essay
Information Technology
This essay intends to develop a problem along with a purpose statement about the evaluation of technology integration within The International Business Machines Corporation (IBM). In addition, the essay will represent a particular model, which can be utilized by the organization to integrate technology.
8 Pages(2000 words)Essay
Operational Risk management
Preparation within the background of IT projects is careful with orientation to growth models and hard and soft system methodologies. Then criticisms of methodologies are provided in family member to the novel IT age. If we analyzed then we come to know that what is operational risk Operational risk is a definable multiplicative association flanked by contact and intrinsic hazard.
8 Pages(2000 words)Essay
Information Technology
Gray & Larson (2006) explains the major Benefits of the Information System are described in following bullet points to understand the importance of Information System and why this is essential in today's corporate infrastructure: IS provides automated template for introducing new business process with affecting legacy system.
9 Pages(2250 words)Essay
Analysing operational risk failure of Barings bank
The bank's net liabilities worth 1.3 billion was nearly twice that of its investment capital, a figure large enough to capsize its entire assets, cause job losses to over 1200 employees and subsequently, being overtaken by Dutch giant ING for a measly sum of 1, and exposing the risky environment in which equity corporations scale catastrophic limits in order to make a quick profit.
10 Pages(2500 words)Essay
Operational Risk
The control of operational risk has been the object of much attention in recent years, for example in the 2004 Basle Two accord concerning the capital adequacy of banks and in the Turnbull Report in the UK. It has also led to changes in the regulation of financial institutions and the requirements for the listing of public companies.
7 Pages(1750 words)Essay
Operational Management of Risk
Risk management is very important for every organization aiming for serious long term business and implementation of all the necessary processes, development and maintenance of KPIs and PIs are important to align all hierarchical organization that helps in reducing complexities in the work flow, conflicts in the roles and responsibilities.
16 Pages(4000 words)Essay
Information system of operational management
For that matter, “infomeneja” IS becomes a very crucial product for the company since is intended to help in collection, management, store and disseminate information within the organization and even with the environment. The main beneficiaries of the system would
2 Pages(500 words)Essay
Detecting preventing or mitigating DoS or Distributed DoS attacks
worldwide web, which makes it possible for them to access resources on their target, exhaust them and launch a DDoS attack against them (Glen, 2013; Nagesh, Kordcal, & Sekaran, 2007). The resources targeted by the attacker are their target`s bandwidth, data structure of their
8 Pages(2000 words)Research Paper
Information Technology
his scenario, business intelligence tools, enterprise resource planning systems and customer relationship management systems are some of the well-known examples of these modern technologies. This part of the assignment is aimed at analyzing the role of an enterprise resource
11 Pages(2750 words)Essay
Let us find you another Essay on topic MBA Information Technology Preventing and Detecting Operational Risk Caused by Employees for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us