Connect Access Card for Principles of Auditing & Other Assurance Services
21st Edition
ISBN: 9781260299366
Author: Ray Whittington, Kurt Pany
Publisher: McGraw-Hill Education
expand_more
expand_more
format_list_bulleted
Textbook Question
Chapter 20, Problem 29LOQ
The assurance services that address user and preparer needs regarding issues of security, availability, processing integrity, confidentiality, and privacy within e-commerce and other systems are referred to as:
- (1) PrimePlus Services.
- (2) XBRL Services.
- (3) Risk Advisory Services.
- (4) Trust Services.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Discuss some of the security issues related to E-business and recommend control activities.
Audit concerns and implications on risk assessment are two important factorsthat must be addressed in a computer information system enviroment.Discuss the above statement.
IT auditing provides a means to gain independent and objective assurance that risks related to the use and deployment of IT assets are appropriately managed. These IT-related risks can include [SELECT ALL THAT APPLY]:
a) Confidentiality – Sensitive information (e.g., personally identifiable information, intellectual property) is protected from unauthorized access and disclosure.
b) Availability – Information is available when required to meet business objectives.
c) Compliance – Information complies with those laws, regulations, contractual arrangements to which the business is subject.
d) Integrity – Information is accurate and complete as well as valid in accordance with business rules and expectations.
Chapter 20 Solutions
Connect Access Card for Principles of Auditing & Other Assurance Services
Ch. 20 - Prob. 1RQCh. 20 - Prob. 2RQCh. 20 - Prob. 3RQCh. 20 - Prob. 4RQCh. 20 - Prob. 5RQCh. 20 - Prob. 6RQCh. 20 - Prob. 7RQCh. 20 - Prob. 8RQCh. 20 - Prob. 9RQCh. 20 - Prob. 10RQ
Ch. 20 - Prob. 11RQCh. 20 - Prob. 12RQCh. 20 - Prob. 13RQCh. 20 - Prob. 14RQCh. 20 - Prob. 15RQCh. 20 - Prob. 16RQCh. 20 - Prob. 17RQCh. 20 - Prob. 18RQCh. 20 - Prob. 19RQCh. 20 - Prob. 20RQCh. 20 - Prob. 21RQCh. 20 - Prob. 22RQCh. 20 - Prob. 23RQCh. 20 - Prob. 24QRACh. 20 - Prob. 25QRACh. 20 - Prob. 26QRACh. 20 - Prob. 27QRACh. 20 - Prob. 28QRACh. 20 - Prob. 29AOQCh. 20 - Prob. 29BOQCh. 20 - Prob. 29COQCh. 20 - Prob. 29DOQCh. 20 - Prob. 29EOQCh. 20 - Prob. 29FOQCh. 20 - Prob. 29GOQCh. 20 - Prob. 29HOQCh. 20 - Prob. 29IOQCh. 20 - Prob. 29JOQCh. 20 - Prob. 29KOQCh. 20 - The assurance services that address user and...Ch. 20 - Prob. 30OQCh. 20 - Prob. 31OQCh. 20 - Prob. 32OQCh. 20 - Prob. 33OQCh. 20 - Prob. 34PCh. 20 - Prob. 35PCh. 20 - Prob. 36ITCCh. 20 - Prob. 37RDC
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, accounting and related others by exploring similar questions and additional content below.Similar questions
- You are the administrator of a web server to configure the level of access for users. Then need to be authenticated first before having access to some web pages. What criteria of information security has been addressed in this configuration? Choose one of the below options and justify your answer. - integrity - scalability - availability - confidentialityarrow_forwardHow can organizations ensure the seamless integration of computerized accounting systems with other business processes, and what measures should be implemented to enhance the security and confidentiality of financial data within these systems?arrow_forwardWhat controls should be employed to avoid breaches into an accountijg information system.arrow_forward
- Discuss some of the security issues related to e-business and recommend control activities. Why should the product and financial stability of the companies that are on your short list pf AIS be investigated?arrow_forwardAudit concerns and implications on risk assessment are two important factorsthat must be addressed in a computer information system environment.Discuss the above statement. dear tutor, kindly assist me to solve this questionarrow_forward(ANSWER IN PARAGRAPH FORM) What are the most significant challenges that auditors face when assessing the effectiveness of Internal Control Information Technology General Controls (ITGC), and how can these challenges be overcome in order to ensure the reliability and integrity of IT systems and processes in a CIS environment?arrow_forward
- Computer accounting control procedures are referred to as general or application controls. The primary objective of application controls in a computer environment is toa. ensure that the computer system operates efficiently.b. ensure the validity, completeness, and accuracy of financial transactions.c. provide controls over the electronic functioning of the hardware.d. plan for the protection of the facilities and backup for the systems.arrow_forwardDescribe how the audit team assesses control risk in an IT environment.arrow_forwardThe two principal hurdles which stand in the way of facilitating electronic commerceand electronic governance are the requirements as to writing and signature for legalrecognition.” In the light of this statement explain the terms “e-commerce” and “egovernance”. Also describe how digital signature and electronic signature facilitates ecommerce and e-governance?arrow_forward
- Which of the following categories of e-business would an EDI (electronic data interchange) system usually be classified within?arrow_forwardIT auditing provides a means to gain independent and objective assurance that risks related to the use and deployment of IT assets are appropriately managed. As discussed in week 1, these IT-related risks can include [SELECT ALL THAT APPLY]: a) Confidentiality – Sensitive information (e.g., personally identifiable information, intellectual property) is protected from unauthorized access and disclosure. b) Availability – Information is available when required to meet business objectives. c) Compliance – Information complies with those laws, regulations, contractual arrangements to which the business is subject. d) Integrity – Information is accurate and complete as well as valid in accordance with business rules and expectations.arrow_forwardWhat are the computer ethical issues regarding security?arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Computer Fraud; Author: Mitch Wenger (Accounting Systems & Tech);https://www.youtube.com/watch?v=-s82SCuMaTI;License: Standard Youtube License