Using the KU library, find an article that discusses the use of accounting software in the managerial decision-making process. Please make sure your sources are noted in APA format. 2- Based on this week’s discussion surrounding receivables and uncollectible accounts, in what ways could computerized accounting software or spreadsheets continue an ongoing fraud scheme relating to receivables? Using the KU library, research fraud schemes that involve receivables and share your findings.

Question 1

Some years ago, only big companies with many resources were in a position to incorporate technology to foresee their systems of information and help in the detection of fraud as well as other anomalies. But with the discovery of both software and hardware proliferation, companies of all kinds have configured software as well as other equipment at their disposal in order to put in practice continuous strategies of assessment (Trompeter et al., 2012). The advantages of constant assessment are not limited to detection of fraud, for instance, foreseeing the delay in payment may come across a training obstacle that must be addressed with an immediate effect. Foreseeing returns on sales may bring up important issues that can solve earlier, which will save both consumer loyalty as well as money.

Question 2

Security settings permit users the authority to access information concerning system accounting that is not vital to their career. With such authority, the system frequently gives the user the chance to do fraud without the necessity of collusion. Via the thoughtful implementation of security installation, one can allow the system to foresee and curb access to a process that is not authorized that permits fraudster the opportunity to steal and hide his or her tricks. Most accounting nowadays simplifies this preventive foreseeing and makes them much easy, for instance, by having responsibilities that are predefined (Aleia et al., 2009). The QuickBooks allows assigned responsibilities as well as changes to activities and places that may take place within a role and give the control of the level to access (such as changing consumer information, deleting and printing). For instance, one can monitor the access of workers who may require not only to view but also to change a consumer borrowing limit.

 

References

Trompeter, G. M., Carpenter, T. D., Desai, N., Jones, K. L., & Riley Jr, R. A. (2012). A

Synthesis of fraud-related research. Auditing: A Journal of Practice & Theory32(sp1),

287-321.

Aleia, A. L., Pierce Jr, D. R., Busque, K. J., & Bouchard, R. S. (2009). U.S. Patent No.

5,991,733. Washington, DC: U.S. Patent and Trademark Office.

 

Still stressed from student homework?
Get quality assistance from academic writers!