Individual Task – Chapter Summary – Week 5

subject Type Homework Help
subject Pages 2
subject Words 907
subject School GADJAH MADA UNIVERSITY
subject Course AIS

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
CHAPTER 5
Natural and political disasters may disrupt a system of information and lead many
businesses to collapse. The second form of danger is software bugs, crashing the operating
system, hardware glitches, outages and fluctuations in power, as well as undetected data
transfer errors. The third category of danger, incidents, and unintentional mistakes and
failures, is the greatest risk to ICAs that leads to the greatest loss of the dollar. The fourth
category of danger is deliberate acts, such as a cyber-crime, fraud, or sabotage, which
deliberately damage a device. The one that increasingly susceptible to threats are the
information systems. Fraud is unfairly advantageous to anyone else. Any year, the annual
economic damages caused by fraudulent activities are tremendous.
The majority of those responsible for fraud are expert insiders who have the access,
experience and tools necessary to do so. Due to the understanding of the scheme and its
vulnerabilities by staff, they can conduct and hide theft more effectively. Fraud perpetrators
are sometimes referred to as criminals with white collars. Many different kinds of fraud are
committed. Corruption is a misleading behavior by powerful people that sometimes implies
illegal, unethical and ethical-incompatible acts. Investment fraud is misrepresenting or
putting behind evidence to foster an investment that guarantees great returns without or with
no risk. The misappropriation of assets and fraudulent financial reporting are two examples of
page-pf2

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.