Accounting Information Systems
9th Edition
ISBN: 9781133934400
Author: James A. Hall
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 16, Problem 7P
a.
To determine
Explain the potential consequences and prevention techniques for the given scenario.
b.
To determine
Explain the potential consequences and prevention techniques for the given scenario.
c.
To determine
Explain the potential consequences and prevention techniques for the given scenario.
d.
To determine
Explain the potential consequences and prevention techniques for the given scenario.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
The ABC Company is switching from its legacy centralizedsystem to a fully distributed system. Underthe new model, all employees will work from PCsconnected to a local area network.
a. Outline a plan of action to ensure that the propercontrols over hardware, software, data, people,procedures, and documentation are in place.b. Discuss any risks the company may face if thedevised plan is not implemented.
Describe ways that system theory can help you implement an OD intervention.
Assume an organization wants to give more power or decision-making authority to lower level employees. Describe one intervention that might be useful for achieving the objective.
Assume an organization conducted a workshop on customer service. The goal was to improve the customers experience. Describe one way you might be able to evaluate the intervention
Listed here are four scenarios. For each scenario, discuss the potential consequences and give a prevention technique. a) A company has recently installed a new computer network. The operating philosophy adopted by the new network administrator was to establish an open system that would foster work group date to the network users. To accomplish this objective, the data administrator assigned employee access privileges to data based on department and functional affiliation rather than specific tasks. b) Sara is a system programmer who was told she would be terminated in three weeks due to poor performance and was asked to conclude all of her projects during the three-week period. Two weeks later Sara created a logic bomb designed to get activated three months after her departure. Subsequently, the bomb destroyed hundreds of records in her previous employer’s accounts receivable invoice file. c) Matt discovered a new sensitivity analysis public-domain program on the Internet. He…
Chapter 16 Solutions
Accounting Information Systems
Ch. 16 - Prob. 1RQCh. 16 - Prob. 2RQCh. 16 - Prob. 3RQCh. 16 - Prob. 4RQCh. 16 - Prob. 5RQCh. 16 - Explain discretionary access privileges.Ch. 16 - Prob. 7RQCh. 16 - Prob. 8RQCh. 16 - What is a vaccine, and what are its limitations?Ch. 16 - Prob. 10RQ
Ch. 16 - Prob. 11RQCh. 16 - What are the risks from equipment failure?Ch. 16 - Prob. 13RQCh. 16 - Prob. 14RQCh. 16 - Prob. 15RQCh. 16 - Prob. 16RQCh. 16 - Prob. 17RQCh. 16 - Prob. 18RQCh. 16 - Prob. 19RQCh. 16 - Prob. 20RQCh. 16 - Prob. 21RQCh. 16 - Prob. 22RQCh. 16 - Prob. 1DQCh. 16 - Prob. 2DQCh. 16 - Prob. 3DQCh. 16 - Prob. 4DQCh. 16 - Prob. 5DQCh. 16 - Prob. 6DQCh. 16 - Prob. 7DQCh. 16 - Prob. 8DQCh. 16 - Prob. 9DQCh. 16 - Prob. 10DQCh. 16 - Prob. 11DQCh. 16 - Prob. 12DQCh. 16 - Prob. 13DQCh. 16 - End-user computing has become extremely popular in...Ch. 16 - Prob. 15DQCh. 16 - Prob. 16DQCh. 16 - Prob. 17DQCh. 16 - Prob. 18DQCh. 16 - Prob. 19DQCh. 16 - Prob. 20DQCh. 16 - Prob. 21DQCh. 16 - Prob. 22DQCh. 16 - Prob. 23DQCh. 16 - Prob. 24DQCh. 16 - Prob. 25DQCh. 16 - Describe a digest within the context of a digital...Ch. 16 - What is a digital envelope?Ch. 16 - Prob. 28DQCh. 16 - Prob. 29DQCh. 16 - Prob. 30DQCh. 16 - Prob. 31DQCh. 16 - Discuss the unique control problems EDI creates.Ch. 16 - Prob. 33DQCh. 16 - Prob. 34DQCh. 16 - Prob. 1MCQCh. 16 - Prob. 2MCQCh. 16 - Prob. 3MCQCh. 16 - Prob. 4MCQCh. 16 - Prob. 5MCQCh. 16 - Prob. 6MCQCh. 16 - Prob. 7MCQCh. 16 - Prob. 8MCQCh. 16 - Prob. 9MCQCh. 16 - Prob. 10MCQCh. 16 - Prob. 1PCh. 16 - Prob. 2PCh. 16 - Prob. 3PCh. 16 - Prob. 4PCh. 16 - Prob. 5PCh. 16 - Prob. 6PCh. 16 - Prob. 7PCh. 16 - Prob. 8PCh. 16 - Better Business Company (BBC) is in the process of...Ch. 16 - Prob. 10PCh. 16 - Prob. 11PCh. 16 - Prob. 12PCh. 16 - Prob. 13P
Knowledge Booster
Similar questions
- Which preventive, detective, and/or corrective controls would best mitigate the following threat, and why? (d) An employee received an email purporting to be from her boss informing her of an important new attendance policy. When she clicked on a link embedded in the email to view the new policy, she infected her laptop.arrow_forwardConsider the following dialogue between a systems professional, Joe Pugh, and a manager of a department tar- geted for a new information system, Lars Meyer:Pugh: The way to go about the analysis is to first examine the old system, such as reviewing key documents and observing the workers performing their tasks. Then we can determine which aspects are working well and which should be preserved. Meyer: We have been through these types of projects before and what always ends up happening is that we do not get the new system we are promised; we get a modified version of the old system.Pugh: Well, I can assure you that will not happen this time. We just want a thorough understanding of what is working well and what is not.Meyer: I would feel much more comfortable if we first started with a list of our requirements. We should spend some time up front determining exactly what we want the system to do for my department. Then, you systems people can come in and determine what portions to…arrow_forwardYou are the CEO of a large organization that implemented a data warehouse for internal analysis of corporate data. The operations manager has written you a memo advocating opening the data warehouse to your suppliers and customers. Explain any merit to this proposal. What are the control issues, if any?arrow_forward
- Explain how internal control can be enhanced through the proper installation of Information Technology Identify the risks for accounting systems that rely heavily on IT functions. Distinguish between general controls and application controls and give examples at least five Which duties should be segregated in a computer department? Describe the typical duties of computer personnel. What aspects of documentation, file security and retention control procedures are unique to computer systems? What are the responsibilities of the database administrator (DBA) function? Compare the risks associated with network environment to those associated with centralized IT functions.arrow_forwardAs the client support supervisor for FarFar construction, you noticed that some site workers are clocking on for friends who are not present. Discuss controls you could implement to address this concern.arrow_forwardLamar LLC is in the process of updating its revenues and receivables systems with the implementation of new accounting software. James Loden, Inc. is an independent information technology consultant who is assisting Tamar with the project. James has developed the following checklist containing internal control points that the company should consider in this new implementation: Will different system access levels for different users be incorporated?arrow_forward
- Mr X, head of the accounting department, conducted a meeting with a system professional, Miss Tiffany, to develop a new accounting information system. During this meeting, Miss Tiffany suggested that the best way to start is first to examine the old system, such as reviewing key documents and observing the workers perform their tasks. Then, it can be determined which aspects are working well and which should be preserved. Mr X disagrees with this suggestion. He argues that they have been through these types of projects before and what always ends up happening is that they do not get the new system they are promised; instead they get a modified version of the old system. Miss Tiffany assures him that it will not happen this time. Tiffany is of the view that she just wants a thorough understanding of what is working well and what is not. However, Mr X does not agree with this opinion. His stance is as follows: “I would feel more comfortable if we first started with a list of our…arrow_forwardConsider the following dialogue between a system professional, Jim Festin, and a manager of adepartment targeted for a new information system, Charles Puno:Festin: The way to go about the analysis is to first examine the old system, such as reviewing keydocuments and observing the workers perform their tasks. Then we can determine which aspects areworking well and which should be preserved.Puno: We have been through these types of projects before and what always ends up happening isthat we do not get the new system we are promised; we get a modified version of the old system.Festin: Well, I can assure you that will not happen this time. We just want a thorough understanding ofwhat is working well and what is not.Puno: I would feel much more comfortable if we first started with a list of our requirements. We shouldspend some time up-front determining exactly what we want the system to do for my department. Thenyou systems people can come in and determine what portions to salvage if you…arrow_forwardSystems Analysis Consider the following dialogue between a systems professional, Joe Pugh, and a manager of a department targeted for a new information system, Lars Meyer: Pugh: The way to go about the analysis is to first examine the old system, such as reviewing key documents and observing the workers perform their tasks. Then we can determine which aspects are working well and which should be preserved. Meyer: We have been through these types of projects before and what always ends up happening is that we do not get the new system we are promised; we get a modified version of the old system. Pugh: Well, I can assure you that will not happen this time. We just want a thorough understanding of what is working well and what is not. Meyer: I would feel much more comfortable if we first started with a list of our requirements. We should spend some time up-front determining exactly what we want the system to do for my department. Then you systems people can come in and determine what…arrow_forward
- Which of the following would strengthen organizational control over a large-scale data processing center?a. Requiring the user departments to specify the general control standards necessary for processing transactions.b. Requiring that requests and instructions for data processing services be submitted directly to the computer operator in the data center.c. Having the database administrator report to the manager of computer operations.d. Assigning maintenance responsibility to the original system designer who best knows its logic.e. None of the above.arrow_forwardXYZ Company hired you as an internal control officer to help the company in developing the internal control system which is consists of policies and procedures to protect assets, ensure reliable accounting, promote efficient operations, and uphold company policies. As well as the system will prevent avoidable losses and help managers both plan operations and monitor company and human performance. list any five good principles of internal control that you need to consider when developing the system. Essay Toolbar navigation BIUS A !!! 四arrow_forwardWhich of the following is an advantage of a newly installed Enterprise Resource Planning (ERP) system? Select one: A. As data is entered once only, it becomes easier to detect accuracy and completeness errors B. They typically cost very little to implement C. Accountability and responsibility may be less clear which often improves employee morale D. Information may be accessed across organisational functions assisting with better decision makingarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE L
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L