Verified Document

Error Detection And Prevention In Regards To Essay

¶ … error detection and prevention in regards to regulatory issues and governance issues. With the advent of the internet, the use of spreadsheets and other data manipulation software has become widespread. The use of these forms of software has numerous implications for any business irrespective of size. For one, the ubiquitous nature of spreadsheet modeling allows it to be instantly transferred between end-users without any subsequent recreation of the original document. This allows multiple end-users to have access to the same spreadsheet without recreating it, thus saving time and increasing efficiency. Furthermore, spreadsheets modeling tools provide multiple solutions to multiple problems facing businesses. Excel, for example, can preform data mining tasks, what if analysis, and report generation. All of which provide a means for the end user to make better informed decisions therefore increasing profits and customer satisfaction. Spreadsheets are not without their flaws however. As the article indicates, errors occur constantly in spreadsheet production. In many instances, these areas are transferred to other unsuspecting end users of the model. This compound effect creates widespread errors in the calculations and thus decision making of the end user. Even more prevalent, is the issue of fraud, as individuals will intentionally manipulate spreadsheets to achieve a desired effect. The detection and subsequent prevention of...

A person with desires to locate fraud must first comb though large amounts of information to simply pinpoint one mistake. More troublesome, the individual looking for the mistake may himself overlook aspects hidden within the spreadsheet causing the fraudulent financial information. As such, the prevention of such efforts is quite difficult (1).
This not only has a profound impact on the end user but by all stakeholders involved in the use of the financial information provided by the end user. These stakeholders include, audit firms, management, employees, customers, investors, and the government. In regards to investors, misleading spreadsheet information can have a profound impact on individual investing behavior. As the article stated, 80-95% of all U.S. based companies use spreadsheet financial reporting. Many of these financial statements contain mistakes that, as I mentioned earlier, are very difficult to detect. Therefore, investors are using misleading financial information that will subsequently cause them to make ill advised investing decisions. These decisions further effect the economy as money that could otherwise be used for honest companies is going towards fraudulent companies with misleading financial reporting standards. This will cause the fraudulent company to obtain financing…

Sources used in this document:
References

1) "CIA - The World Factbook." Welcome to the CIA Web Site -- Central Intelligence Agency. Web. 16 Oct. 2010. <https://www.cia.gov/library/publications/the-world-factbook/rankorder/2004rank.html?countryName=China&countryCode=ch®ionCode=eas&rank=128#ch>.

2) Jacobson, Anna-Liisa. "The new Chinese dynasty: how the United States and international intellectual property laws are failing to protect consumers and inventors from counterfeiting. " Richmond Journal of Global Law and Business. 7.1 (Wntr 2008): 45-63. LegalTrac. Gale. Florida International University. 29 Sept. 2010 http://find.galegroup.com/gtx/infomark.do?&contentSet=IAC-Documents&type=retrieve&tabID=T002&prodId=LT&docId=A177087358&source=gale&userGroupName=flstuniv&version=1.0
Cite this Document:
Copy Bibliography Citation

Related Documents

Prevention of Fraud
Words: 2387 Length: 6 Document Type: Essay

1500-Word Artefact Organization: Bank of England Fraud is intentionally deceiving a person such that he or she incurs a loss and the fraudulent person makes a gain. Instances of fraud can include misappropriation of funds or assets, inappropriate expenditures, fraudulent financial reporting etc. (Stephanie, 2008). A recent FBI statistic explores the extent of fraud in non-profit organizations. In its report, the FBI alleged that approximately 2,300 websites that solicited help for victims

Self-Regulation Issues in Children and Adolescents With ADHD, ODD,...
Words: 6305 Length: 20 Document Type: Research Paper

Self-Regulation Issues in Children and Adolescence with ADHD, ODD, and OCD Self-regulation in children and adolescence who suffer from ADHD, ODD, and OCD (Attention Deficit Hyperactive Disorder, Obsessive Compulsive Disorder, and Oppositional Defiant Disorder) is often evident due to several things. A lot of the issues in relation to self-regulation stem from additional anxiety the child/teen may feel from the difficulties experienced from these kinds of mental disorders. OCD is known

Subglottic Secretion Drainage for Preventing Ventilator Associated...
Words: 2946 Length: 8 Document Type: Essay

A study conducted by Ledgerwood et al. (2013) on the effects of tracheotomy tubes that have suction above the cuff established that the tubes have the capability to reduce VAP incidents. The amount of time spent in ICU and on the ventilator was also reduced. This does demonstrate that the patient was accorded the best treatment available to drain pleural effusion. The development of haemothorax/pneumothorax is anticipated in most patients

Countering Fraud for Competitive Advantage: The Case of EU
Words: 2046 Length: 6 Document Type: Essay

EU's Current Anti-Fraud Strategy For some time now, the issue of fraud and corruption in public service has been an issue of concern. This has forced many organizations to establish strategies aimed at detecting and minimizing the occurrence of such fraudulent activities in areas under their jurisdiction. This paper discusses the strategic management concepts in the risk-based policing strategy coupled with the principles and importance involved in the enhancement of organisational

Internal Control and Accounting Analysis of ABC
Words: 4900 Length: 14 Document Type: Essay

Internal Control and Accounting Analysis of ABC Limited: Analysis of Weaknesses and Recommendations The report was prepared to cover the requirements of the AAT ICAS unit. The AAT ICAS refers to an Internal Control and Accounting System where the report serves as investigation of the weakness area of the business control and makes the recommendation to fix this problem. The following report reviews the restaurant business particular in payroll area. The

Computer Forensics for Preventing Email
Words: 4655 Length: 17 Document Type: Capstone Project

i.e. modifying the domain name system. 7. DNS-Based Phishing ("Pharming"): This offense is based on interference in the domain name searching process by modifying the domain name resolution sending the user to a different IP address. 8. Content-Injection Phishing: The phisher introduces fraudulent content into a legitimate website. 9. Data Theft: Malicious code that collects sensitive information stored within the machines in which it is installed. 10. Man-in-the-Middle Phishing: The phisher takes a

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now