Research on Application of Computer Technology in Accounting Practice Teaching System

Article Preview

Abstract:

The prevalence and application of IT technology in accounting information system promotes the development of accounting information system in networking aspect. On one hand, the network-based accounting information system promotes the diversification of accounting information processing, transmission and query. But on the other hand, it results in accounting data security issues during accounting information processing, transmission and query process. B/S network model of accounting information system is one kind of network architecture which is raised as network development. The advantage of the B/S network model focuses on the distributed feature of the overall network architecture, which means that a mass of data information are stored in the safety database server. This paper brings forward the risks control model of accounting information system based on B/S network architecture to solve the information security issues during data transmission of accounting information system.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 926-930)

Pages:

4557-4561

Citation:

Online since:

May 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] M. Workman, W. H. Bommer, and D. Straub, Security lapses and the omission of information security measures: A threat control model and empirical test, (2008) Computers in Human Behavior, vol. 24, no. 6, pp.2799-2816.

DOI: 10.1016/j.chb.2008.04.005

Google Scholar

[2] Anita S. Hollander, Morden accounting information system, (1999) PP. 7.

Google Scholar

[3] Yanli Zhang, Kai Zhang and Hongwu Wang, The research on the storage and access of multimedia data in the B/S Network Examination System, Journal of Chongqing technology and business university (2005) PP 169-172.

Google Scholar

[4] Fenz, S. ; Ekelhart, A., Verification, Validation, and Evaluation in Information Security Risk Management, Security & Privacy, IEEE, Volume: 9 (2011) Issue: 2, PP 58-65.

DOI: 10.1109/msp.2010.117

Google Scholar

[5] Chaoqing Yang, Risk and security countermeasure for networking computerized accounting, " Journal of Zunyi normal colleage, (2009) PP 27-29.

Google Scholar