Accounting Information Systems
Accounting Information Systems
10th Edition
ISBN: 9781337619202
Author: Hall, James A.
Publisher: Cengage Learning,
Question
Book Icon
Chapter 15, Problem 10DQ
To determine

Explain the reason for creating user sub-schemas and assignment of access authority to users. Also, explain the unethical technique used by the programmers who are not allowed to assign access authority to users.

Blurred answer
Students have asked these similar questions
When an ERP implementation fails, who is to blame? Is it the software manufacturer, the client firm, or the implementation strategy? Explain.
Management and auditor are concerned about segregation of duties in computer based systems? Why? How to mitigate this concern?
Why does scope creep create risk in independence? Select all that apply   It can create an unfair advantage in the marketplace.   It can decrease costs.   It can lead to unintentionally providing a prohibited service to a restricted entity.   It can cause non-compliance with KPMG policies on independence.

Chapter 15 Solutions

Accounting Information Systems

Knowledge Booster
Background pattern image
Recommended textbooks for you
Text book image
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Text book image
Contemporary Auditing
Accounting
ISBN:9781337650380
Author:KNAPP
Publisher:Cengage
Text book image
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Text book image
Business/Professional Ethics Directors/Executives...
Accounting
ISBN:9781337485913
Author:BROOKS
Publisher:Cengage
Text book image
Business Its Legal Ethical & Global Environment
Accounting
ISBN:9781305224414
Author:JENNINGS
Publisher:Cengage
Text book image
Cornerstones of Cost Management (Cornerstones Ser...
Accounting
ISBN:9781305970663
Author:Don R. Hansen, Maryanne M. Mowen
Publisher:Cengage Learning