SlideShare a Scribd company logo
Computers are often used to make work easier. However,
sometimes computers can make work more difficult especially
with poorly implementation. SOX is an important example of a
poorly implemented database that has encountered. A database
should have its specific intentions as much as data organization
and management always exist as general functions. The SOX
database implemented in 2011 was put in place to combat fraud
by coming up with efficient accounting audit and management
of financial records. I think the developers failed to include
technical aspects of fraud control into the system. They instead
targeted the visible crimes leaving very many holes for
exploiting the SOX system (Anand et al., 2014).
The database seems vague from IT perspective. The
database constitutes only two sections of codes relating to IT.
These two sections merely meet the standards for testing IT
sufficient auditing compliance by organizations. The database
seems to be far off the role of fostering sufficient auditing
process for these organizations. Since inception, most audit
companies struggle to figure out the IT protective aspects of the
database. It seems that the developers mainly focused on the
guidelines in using financial systems in preventing frauds but
rather forgot the IT aspect if reducing the vulnerability of the
system. For so many years, the database has failed to meet the
technical roles of a database in system management and
accounting regulation which are the critical reason why it was
created. The SOX guidelines seem to forget about pertinent
technical aspects of the system function (Cinarkaya et al.,
2017).
The solutions to the mistake that was done are
conducting technical analysis and installing appropriate fixing.
Ideally, the database should target electronic management and
safety of data rather than physical data management. This
mistake of poorly implemented gave a false impression of
database management in many companies that adopted the type
of database in early days. From physical outlook, one could see
that things are alright yet some technical rot was brewing within
the system. It is clear that the developers of the SOX database
missed some point while deriving and implementing the
database and this should be fixed to enhance the computer-
based operations (Anand et al., 2014).
References
Anand, T. S., Wikle, G. K., Lindsay, M. P., Schubert, R. N.,
Lettington, D. T., & Ludwig, J. P. (2014). U.S. Patent No.
5,832,496. Washington, DC: U.S. Patent and Trademark Office.
Cinarkaya, B., Tamm, S., Sureshchandra, J., Warshavsky, A.,
Bulumulla, I. U., Fry, B., ... & Brooks, D. (2017). U.S. Patent
No. 9,825,965. Washington, DC: U.S. Patent and Trademark
Office.

More Related Content

PDF
Data Breaches
DOCX
There are regulatory rules that must be met as well as organizatio.docx
PDF
Sub Material Fraud Risk White Paper
PDF
SOX- IT Perspective
PDF
BRG_TAP_IG_20150826_WEB
PDF
auditing-190520092523.pdf
PPTX
Information Systems Audit - Ron Weber chapter 1
PDF
Data Quality Management With Semantic Technologies 1st Edition Christian Frbe...
Data Breaches
There are regulatory rules that must be met as well as organizatio.docx
Sub Material Fraud Risk White Paper
SOX- IT Perspective
BRG_TAP_IG_20150826_WEB
auditing-190520092523.pdf
Information Systems Audit - Ron Weber chapter 1
Data Quality Management With Semantic Technologies 1st Edition Christian Frbe...

Similar to Computers are often used to make work easier. However, sometimes c.docx (20)

PDF
Data Quality Management With Semantic Technologies 1st Edition Christian Frbe...
PDF
C RITICAL A SSESSMENT OF A UDITING C ONTRIBUTIONS T O E FFECTIVE AND E FF...
DOCX
IT 650 Principles of Database DesignProject Milestone – 5.docx
DOCX
Write a scholarly post on the following topic and reply given 4 po.docx
DOCX
Database security
DOCX
Final Project RequirementsSubmit your final project topic here. .docx
PPTX
Data Management - NA CACS 2009
PDF
A Database System Security Framework
PDF
A DATABASE SYSTEM SECURITY FRAMEWORK
DOCX
Discussion 1Knowledge-centric organizations have incorporated mo
DOCX
1Running head BIG DATA6BIG DATAMIT 681 MSIT.docx
DOCX
Running head MOBILE APPLICATION SECURITY .docx
DOCX
BBA 3551, Information Systems Management 1 Course Lea.docx
PDF
A1802030104
PPTX
Data Governance without AI Course Week 2.pptx
PDF
Information Security It's All About Compliance
DOCX
Running Head SECURITY AWARENESSSecurity Awareness .docx
PPTX
Going local with a world-class data infrastructure: Enabling SDMX for researc...
PPTX
Logs in Security and Compliance flare
PDF
Week-2_LectureA1_701.pdf
Data Quality Management With Semantic Technologies 1st Edition Christian Frbe...
C RITICAL A SSESSMENT OF A UDITING C ONTRIBUTIONS T O E FFECTIVE AND E FF...
IT 650 Principles of Database DesignProject Milestone – 5.docx
Write a scholarly post on the following topic and reply given 4 po.docx
Database security
Final Project RequirementsSubmit your final project topic here. .docx
Data Management - NA CACS 2009
A Database System Security Framework
A DATABASE SYSTEM SECURITY FRAMEWORK
Discussion 1Knowledge-centric organizations have incorporated mo
1Running head BIG DATA6BIG DATAMIT 681 MSIT.docx
Running head MOBILE APPLICATION SECURITY .docx
BBA 3551, Information Systems Management 1 Course Lea.docx
A1802030104
Data Governance without AI Course Week 2.pptx
Information Security It's All About Compliance
Running Head SECURITY AWARENESSSecurity Awareness .docx
Going local with a world-class data infrastructure: Enabling SDMX for researc...
Logs in Security and Compliance flare
Week-2_LectureA1_701.pdf
Ad

More from patricke8 (20)

DOCX
Concept of collection. Assume that An agency has focused its sys.docx
DOCX
Concept of AestheticsOVERVIEWAesthetics is defined as an appre.docx
DOCX
Concept mapping, mind mapping and argumentmapping what are .docx
DOCX
CONCEPT MAPPINGMid Term Assignment (Concept Mapping).docx
DOCX
Concept A            The first concept that I appreciated in the.docx
DOCX
Concept Analysis (1,000 words). Deadline 1300, 11 March 2021. .docx
DOCX
Concentration in the mobile operating systemsmarketMauri.docx
DOCX
Concentric Literary and Cultural Studies 33.1 March 2007 7.docx
DOCX
Con Should the United States government have bailed out the a.docx
DOCX
COMS 101Persuasive Speech InstructionsThis course requires you.docx
DOCX
COMS 040 AssignmentStudent Congress Bill Choose an argument a.docx
DOCX
computerweekly.com 10-16 September 2019 21Industry experts.docx
DOCX
Computers in Human Behavior 39 (2014) 387–392Contents lists .docx
DOCX
Computers in Human Behavior xxx (2012) xxx–xxxContents lists.docx
DOCX
Computers can be used symbolically to intimidate, deceive or defraud.docx
DOCX
Computers are part of our everyday lives. You are likely reading thi.docx
DOCX
Computerized Operating Systems (OS) are almost everywhere. We encoun.docx
DOCX
Computerized Operating Systems (OS) are almost everywhere. We en.docx
DOCX
Computer technology ▪ Information systems ▪ Data analytics supply c.docx
DOCX
Computer Security Incident Handling Guide Recommendati.docx
Concept of collection. Assume that An agency has focused its sys.docx
Concept of AestheticsOVERVIEWAesthetics is defined as an appre.docx
Concept mapping, mind mapping and argumentmapping what are .docx
CONCEPT MAPPINGMid Term Assignment (Concept Mapping).docx
Concept A            The first concept that I appreciated in the.docx
Concept Analysis (1,000 words). Deadline 1300, 11 March 2021. .docx
Concentration in the mobile operating systemsmarketMauri.docx
Concentric Literary and Cultural Studies 33.1 March 2007 7.docx
Con Should the United States government have bailed out the a.docx
COMS 101Persuasive Speech InstructionsThis course requires you.docx
COMS 040 AssignmentStudent Congress Bill Choose an argument a.docx
computerweekly.com 10-16 September 2019 21Industry experts.docx
Computers in Human Behavior 39 (2014) 387–392Contents lists .docx
Computers in Human Behavior xxx (2012) xxx–xxxContents lists.docx
Computers can be used symbolically to intimidate, deceive or defraud.docx
Computers are part of our everyday lives. You are likely reading thi.docx
Computerized Operating Systems (OS) are almost everywhere. We encoun.docx
Computerized Operating Systems (OS) are almost everywhere. We en.docx
Computer technology ▪ Information systems ▪ Data analytics supply c.docx
Computer Security Incident Handling Guide Recommendati.docx
Ad

Recently uploaded (20)

PDF
IGGE1 Understanding the Self1234567891011
PDF
Indian roads congress 037 - 2012 Flexible pavement
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
Hazard Identification & Risk Assessment .pdf
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
Classroom Observation Tools for Teachers
PDF
RMMM.pdf make it easy to upload and study
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
IGGE1 Understanding the Self1234567891011
Indian roads congress 037 - 2012 Flexible pavement
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
A systematic review of self-coping strategies used by university students to ...
Hazard Identification & Risk Assessment .pdf
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Orientation - ARALprogram of Deped to the Parents.pptx
Final Presentation General Medicine 03-08-2024.pptx
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Classroom Observation Tools for Teachers
RMMM.pdf make it easy to upload and study
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Supply Chain Operations Speaking Notes -ICLT Program
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape

Computers are often used to make work easier. However, sometimes c.docx

  • 1. Computers are often used to make work easier. However, sometimes computers can make work more difficult especially with poorly implementation. SOX is an important example of a poorly implemented database that has encountered. A database should have its specific intentions as much as data organization and management always exist as general functions. The SOX database implemented in 2011 was put in place to combat fraud by coming up with efficient accounting audit and management of financial records. I think the developers failed to include technical aspects of fraud control into the system. They instead targeted the visible crimes leaving very many holes for exploiting the SOX system (Anand et al., 2014). The database seems vague from IT perspective. The database constitutes only two sections of codes relating to IT. These two sections merely meet the standards for testing IT sufficient auditing compliance by organizations. The database seems to be far off the role of fostering sufficient auditing process for these organizations. Since inception, most audit companies struggle to figure out the IT protective aspects of the database. It seems that the developers mainly focused on the guidelines in using financial systems in preventing frauds but rather forgot the IT aspect if reducing the vulnerability of the system. For so many years, the database has failed to meet the technical roles of a database in system management and accounting regulation which are the critical reason why it was created. The SOX guidelines seem to forget about pertinent technical aspects of the system function (Cinarkaya et al., 2017). The solutions to the mistake that was done are conducting technical analysis and installing appropriate fixing. Ideally, the database should target electronic management and safety of data rather than physical data management. This mistake of poorly implemented gave a false impression of database management in many companies that adopted the type
  • 2. of database in early days. From physical outlook, one could see that things are alright yet some technical rot was brewing within the system. It is clear that the developers of the SOX database missed some point while deriving and implementing the database and this should be fixed to enhance the computer- based operations (Anand et al., 2014). References Anand, T. S., Wikle, G. K., Lindsay, M. P., Schubert, R. N., Lettington, D. T., & Ludwig, J. P. (2014). U.S. Patent No. 5,832,496. Washington, DC: U.S. Patent and Trademark Office. Cinarkaya, B., Tamm, S., Sureshchandra, J., Warshavsky, A., Bulumulla, I. U., Fry, B., ... & Brooks, D. (2017). U.S. Patent No. 9,825,965. Washington, DC: U.S. Patent and Trademark Office.