Accounting Information Systems
Accounting Information Systems
9th Edition
ISBN: 9781133934400
Author: James A. Hall
Publisher: Cengage Learning
Question
Book Icon
Chapter 16, Problem 10DQ
To determine

Explain the reason for creating user sub-schemas and assignment of access authority to users. Also, explain the unethical technique used by the programmers who are not allowed to assign access authority to users.

Blurred answer
Students have asked these similar questions
Management and auditor are concerned about segregation of duties in computer based systems? Why? How to mitigate this concern?
What is meant by data mining, and why must technical analysts be careful not to engage in it?
Why does scope creep create risk in independence? Select all that apply   It can create an unfair advantage in the marketplace.   It can decrease costs.   It can lead to unintentionally providing a prohibited service to a restricted entity.   It can cause non-compliance with KPMG policies on independence.

Chapter 16 Solutions

Accounting Information Systems

Knowledge Booster
Background pattern image
Recommended textbooks for you
Text book image
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Text book image
Business Its Legal Ethical & Global Environment
Accounting
ISBN:9781305224414
Author:JENNINGS
Publisher:Cengage