Question
Chapter 3, Problem 5P
Summary Introduction
To develop: A paper on the use of the internet to support EDI.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionAccounting Information Systems
11th Edition
ISBN: 9781337552127
Author: Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher: Cengage Learning
Not helpful? See similar books

Accounting Information Systems
Electronic Business (e-business)
systems. 5P
Chapter 3 Solutions
Accounting Information Systems
Ch. 3 - Prob. 1RQCh. 3 - Prob. 2RQCh. 3 - Prob. 3RQCh. 3 - Prob. 4RQCh. 3 - Prob. 5RQCh. 3 - Prob. 6RQCh. 3 - Prob. 7RQCh. 3 - Prob. 8RQCh. 3 - Prob. 9RQCh. 3 - Prob. 10RQ
Ch. 3 - Prob. 11RQCh. 3 - Prob. 12RQCh. 3 - Prob. 13RQCh. 3 - Prob. 14RQCh. 3 - Prob. 15RQCh. 3 - Prob. 16RQCh. 3 - Prob. 17RQCh. 3 - Prob. 18RQCh. 3 - Prob. 19RQCh. 3 - Prob. 20RQCh. 3 - Prob. 21RQCh. 3 - Prob. 22RQCh. 3 - Prob. 23RQCh. 3 - Prob. 24RQCh. 3 - Prob. 1DQCh. 3 - Prob. 2DQCh. 3 - Prob. 3DQCh. 3 - Prob. 4DQCh. 3 - Prob. 5DQCh. 3 - Prob. 6DQCh. 3 - Prob. 7DQCh. 3 - Prob. 8DQCh. 3 - Prob. 9DQCh. 3 - Prob. 10DQCh. 3 - Prob. 11DQCh. 3 - Prob. 1SPCh. 3 - Prob. 2SPCh. 3 - Prob. 3SPCh. 3 - Prob. 4SPCh. 3 - Prob. 5SPCh. 3 - Prob. 1PCh. 3 - Prob. 2PCh. 3 - Prob. 3PCh. 3 - Prob. 4PCh. 3 - Prob. 5PCh. 3 - Prob. 6PCh. 3 - Prob. 7PCh. 3 - Prob. 8PCh. 3 - Prob. 9PCh. 3 - Prob. 10PCh. 3 - Prob. 11P
Knowledge Booster
Similar questions
To connect with critical customers and suppliers, many large firms employ electronic data interchange (EDI). What are the advantages and risks of using EDI by businesses? Explain how the adoption of EDI affects internal controls and auditor testing in one way.
arrow_forward
Do you think the key to further improve computer security lies in more effective user training or in improvement in the security feature that hardware and software vendors design into their products? Discuss
arrow_forward
The ABC Company is switching from its legacy centralizedsystem to a fully distributed system. Underthe new model, all employees will work from PCsconnected to a local area network.
a. Outline a plan of action to ensure that the propercontrols over hardware, software, data, people,procedures, and documentation are in place.b. Discuss any risks the company may face if thedevised plan is not implemented.
arrow_forward
Discuss some of the security issues related to e-business and recommend control activities.
Why should the product and financial stability of the companies that are on your short list pf AIS be investigated?
arrow_forward
Assume that you produce plastic computer pieces for computer companies. The pieces require very little technology. Where would you like to establish DFI? (The point of this question is to force consideration of various characteristics that are incorporated in a DFI decision.)
arrow_forward
You are the administrator of a web server to configure the level of access for users. Then need to be authenticated first before having access to some web pages. What criteria of information security has been addressed in this configuration? Choose one of the below options and justify your answer.
- integrity
- scalability
- availability
- confidentiality
arrow_forward
Discuss the differences between internal and external users of information and their needs and demands on an information system. Historically, which type of user has firms catered to most?
Why have reengineering efforts been made to integrate AIS and MIS?
arrow_forward
One way ERP vendors help to make the configuration process easier for their customers is to:
All of the above.
develop built-in configuration tools to address most of their customers' needs for system changes.
encourage their customers to use decentralized databases.
train their customers to use an existing system and build interfaces between it and their ERP system.
arrow_forward
uppose your company has an e-commerce Website for selling different types of goods and services. Discuss the followings:i)Ethical concerns associated with storing and analyzing user data?ii) How would you use intrusion detection system to control security threats that face this website?
arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L