Accounting Information Systems
10th Edition
ISBN: 9781337619202
Author: Hall, James A.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Question
Chapter 15, Problem 2P
a.
To determine
Explain the operating risk associated with Company A.
b.
To determine
Explain the control measures required to mitigate the risk.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
Ascendex Sdn Bhd is an online company that supplies a range of IT products. Its product line includes IT hardware and software. Their main customers are government agencies and private company. The company employs a combination of manual procedures and a networked accounting system with distributed terminals in several departments. After years of satisfactory performance, however, Ascendex Sdn Bhd is now experiencing operational inefficiencies and accounting errors. Your firm has been hired to evaluate Ascendex’s business processes and internal controls. Ascendex’s expenditure cycle is described in the following paragraphs.
PURCHASE SYSTEM PROCEDURES
Ascendex’s transactions are initiated when the purchasing department clerk reviews the inventory file for items that need to be replenished. The clerk selects a vendor, adds a record to the digital purchase order (PO) File, and prints four hard copies of the PO. One copy is filed in the department; the second copy is sent to the receiving…
Listed here are four scenarios. For each scenario, discuss the potential consequences and give a prevention technique. a) A company has recently installed a new computer network. The operating philosophy adopted by the new network administrator was to establish an open system that would foster work group date to the network users. To accomplish this objective, the data administrator assigned employee access privileges to data based on department and functional affiliation rather than specific tasks. b) Sara is a system programmer who was told she would be terminated in three weeks due to poor performance and was asked to conclude all of her projects during the three-week period. Two weeks later Sara created a logic bomb designed to get activated three months after her departure. Subsequently, the bomb destroyed hundreds of records in her previous employer’s accounts receivable invoice file. c) Matt discovered a new sensitivity analysis public-domain program on the Internet. He…
Lamar LLC is in the process of updating its revenues and receivables systems with the implementation of new accounting software. James Loden, Inc. is an independent information technology consultant who is assisting Tamar with the project. James has developed the following checklist containing internal control points that the company should consider in this new implementation: Has the company identified an off‐site alternative computer processing location?
Chapter 15 Solutions
Accounting Information Systems
Ch. 15 - Prob. 1RQCh. 15 - Prob. 2RQCh. 15 - Prob. 3RQCh. 15 - Prob. 4RQCh. 15 - Prob. 5RQCh. 15 - Explain discretionary access privileges.Ch. 15 - Prob. 7RQCh. 15 - Prob. 8RQCh. 15 - What is a vaccine, and what are its limitations?Ch. 15 - Prob. 10RQ
Ch. 15 - Prob. 11RQCh. 15 - What are the risks from equipment failure?Ch. 15 - Prob. 13RQCh. 15 - Prob. 14RQCh. 15 - Prob. 15RQCh. 15 - Prob. 16RQCh. 15 - Prob. 17RQCh. 15 - Prob. 18RQCh. 15 - Prob. 19RQCh. 15 - Prob. 20RQCh. 15 - Prob. 21RQCh. 15 - Prob. 22RQCh. 15 - Prob. 1DQCh. 15 - Prob. 2DQCh. 15 - Prob. 3DQCh. 15 - Prob. 4DQCh. 15 - Prob. 5DQCh. 15 - Prob. 6DQCh. 15 - Prob. 7DQCh. 15 - Prob. 8DQCh. 15 - Prob. 9DQCh. 15 - Prob. 10DQCh. 15 - Prob. 11DQCh. 15 - Prob. 12DQCh. 15 - Prob. 13DQCh. 15 - End-user computing has become extremely popular in...Ch. 15 - Prob. 15DQCh. 15 - Prob. 16DQCh. 15 - Prob. 17DQCh. 15 - Prob. 18DQCh. 15 - Prob. 19DQCh. 15 - Prob. 20DQCh. 15 - Prob. 21DQCh. 15 - Prob. 22DQCh. 15 - Prob. 23DQCh. 15 - Prob. 24DQCh. 15 - Prob. 25DQCh. 15 - Describe a digest within the context of a digital...Ch. 15 - What is a digital envelope?Ch. 15 - Prob. 28DQCh. 15 - Prob. 29DQCh. 15 - Prob. 30DQCh. 15 - Prob. 31DQCh. 15 - Discuss the unique control problems EDI creates.Ch. 15 - Prob. 33DQCh. 15 - Prob. 34DQCh. 15 - Prob. 1MCQCh. 15 - Prob. 2MCQCh. 15 - Prob. 3MCQCh. 15 - Prob. 4MCQCh. 15 - Prob. 5MCQCh. 15 - Prob. 6MCQCh. 15 - Prob. 7MCQCh. 15 - Prob. 8MCQCh. 15 - Prob. 9MCQCh. 15 - Prob. 10MCQCh. 15 - Prob. 1PCh. 15 - Prob. 2PCh. 15 - Prob. 3PCh. 15 - Prob. 4PCh. 15 - Prob. 5PCh. 15 - Prob. 6PCh. 15 - Prob. 7PCh. 15 - Prob. 8PCh. 15 - Better Business Company (BBC) is in the process of...Ch. 15 - Prob. 10PCh. 15 - Prob. 11PCh. 15 - Prob. 12PCh. 15 - Prob. 13P
Knowledge Booster
Similar questions
- A new system development project is being planned for Consti Corporation. The invoicing, cash receipts, and accounts payable modules are all going to be updated. You are the controller of ConstiCorporation, and you are a little anxious about the aforementioned project. The last systems development project that affected your department was not very successful, and the employees in the accounting department did not accept the new system very well at first. You feel that the systemspersonnel did not interact sufficiently with the users of the systems in the accounting department. Required: Prepare a memo that you will send to Anna Marie, the head of the information systems department. In the memo, provide some suggestions about the new project, including your concernabout the accounting personnel in the systems development project. Give persuasive arguments why prototyping would be helpful to the workers in the accounting department.arrow_forwardIs the following a potential control weakness? A computer network and personal computers support Marco accounting and inventory management systems. Personal computers are located in the offices and warehouse and a central server handles all accounting and inventory files. Printers are located in areas where employees need printed documents and other records routinely. The computer is used to control and process most transactions, to print documents, prepare accounting records, and prepare periodic financial statements. Marco uses commercial software recommended by their auditor. To date, they have had only the usual startup problems. They have used it for two years and have upgraded it once. Briefly explain the potential mistatement and recommended correction.arrow_forwardwhat is the potential consequences and give each of the question a prevention technique. 1)A company has recently installed a new computer network. The operating philosophy adopted by the new network administrator was to establish an open system that would foster work group date to the network users. To accomplish this objective, the data administrator assigned employee access privileges to data based on department and functional affiliation rather than specific tasks. 2)Sara is a system programmer who was told she would be terminated in three weeks due to poor performance and was asked to conclude all of her projects during the three-week period. Two weeks later Sara created a logic bomb designed to get activated three months after her departure. Subsequently, the bomb destroyed hundreds of records in her previous employer’s accounts receivable invoice file. 3)Matt discovered a new sensitivity analysis public-domain program on the Internet. He downloaded the software to his laptop at…arrow_forward
- The internal auditor of a small company has recommended to the CEO that it invest in a disaster recovery plan (DRP) because of several identified vulnerabilities. Traditional in-house DRP approaches are, however, not a viable option because the company lacks the necessary IT resources to implement and manage these tasks. The auditor has suggested that outsourcing disaster recovery to a cloud-based service provider may be a reasonable alternative. The CEO has no experience with cloud computing and has asked the internal auditor to provide him with more information. Required: Prepare a report outlining cloud computing. Your report should address the following: Describe how the services provided under cloud computing relate to disaster recovery planning. Outline the risks associated with this technologyarrow_forwardThe internal auditor of a small company has recommended to the CEO that it invest in a disaster recovery plan (DRP) because of several identified vulnerabilities. Traditional in-house DRP approaches are, however, not a viable option because the company lacks the necessary IT resources to implement and manage these tasks. The auditor has suggested that outsourcing disaster recovery to a cloud-based service provider may be a reasonable alternative. The CEO has no experience with cloud computing and has asked the internal auditor to provide him with more information. Required: Prepare a report outlining cloud computing. Your report should address the following: List the key features of cloud computingarrow_forwardThe Chief Information Officer (CIO) and the Managing Director (MD) of Illustrious Limited recently had the following conversation regarding thedevelopment of a new information system for the company: CIO: The way to go about the analysis is to first examine the old system, such as reviewing key documents and observing the workers performing their tasks. Then we can determine which aspects are working well and which should be preserved. MD: We have been through these types of projects before, and what always ends up happening is that we do not get the new system we are promised. Instead we get a modified version of the old system. CIO: I can assure you that will not happen this time. My team just want a thorough understanding of what is working well and what is not. MD: I would feel much more comfortable if we first started with a list of our requirements. We should spend more time in determining what exactly we want the system to do upfront. Then your team can come in and determine…arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,