Accounting Information Systems
10th Edition
ISBN: 9781337619202
Author: Hall, James A.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Question
Chapter 15, Problem 2P
a.
To determine
Explain the operating risk associated with Company A.
b.
To determine
Explain the control measures required to mitigate the risk.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
what is the potential consequences and give each of the question a prevention technique.
1)A company has recently installed a new computer network. The operating philosophy adopted by the new network administrator was to establish an open system that would foster work group date to the network users. To accomplish this objective, the data administrator assigned employee access privileges to data based on department and functional affiliation rather than specific tasks.
2)Sara is a system programmer who was told she would be terminated in three weeks due to poor performance and was asked to conclude all of her projects during the three-week period. Two weeks later Sara created a logic bomb designed to get activated three months after her departure. Subsequently, the bomb destroyed hundreds of records in her previous employer’s accounts receivable invoice file.
3)Matt discovered a new sensitivity analysis public-domain program on the Internet. He downloaded the software to his laptop at…
An online virus-scan service provider, Whispering, is expanding its offerings to include an optimizing service to users-it can scan the
consumer's hard drive for duplicate files, suggest more efficient ways to save or archive photos and movies, and much more. The
problem is that the company's own cost information has been lost-not due to a virus but due to human error. Charlee, the office
manager, is trying to recreate some of the information to use in pricing Whispering's newest optimizing service. Here is what she was
able to dig up:
Known Information for Virus-ScanService
Selling price
$30 per scan
Gross margin %
50 %
Costs of Optimizing Service
Labor cost
$5 per scan
MOH cost (includes software, utilities, etc.)
$25 per scan
(a)
For Whispering's virus-scan service, calculate the current cost-plus markup percentage (based on service cost rather than full
cost, since the selling and administrative expense information has been lost). (Round answer to O decimal places, e.g. 15%.)…
Ascendex Sdn Bhd is an online company that supplies a range of IT products. Its product line includes IT hardware and software. Their main customers are government agencies and private company. The company employs a combination of manual procedures and a networked accounting system with distributed terminals in several departments. After years of satisfactory performance, however, Ascendex Sdn Bhd is now experiencing operational inefficiencies and accounting errors. Your firm has been hired to evaluate Ascendex’s business processes and internal controls. Ascendex’s expenditure cycle is described in the following paragraphs.
PURCHASE SYSTEM PROCEDURES
Ascendex’s transactions are initiated when the purchasing department clerk reviews the inventory file for items that need to be replenished. The clerk selects a vendor, adds a record to the digital purchase order (PO) File, and prints four hard copies of the PO. One copy is filed in the department; the second copy is sent to the receiving…
Chapter 15 Solutions
Accounting Information Systems
Ch. 15 - Prob. 1RQCh. 15 - Prob. 2RQCh. 15 - Prob. 3RQCh. 15 - Prob. 4RQCh. 15 - Prob. 5RQCh. 15 - Explain discretionary access privileges.Ch. 15 - Prob. 7RQCh. 15 - Prob. 8RQCh. 15 - What is a vaccine, and what are its limitations?Ch. 15 - Prob. 10RQ
Ch. 15 - Prob. 11RQCh. 15 - What are the risks from equipment failure?Ch. 15 - Prob. 13RQCh. 15 - Prob. 14RQCh. 15 - Prob. 15RQCh. 15 - Prob. 16RQCh. 15 - Prob. 17RQCh. 15 - Prob. 18RQCh. 15 - Prob. 19RQCh. 15 - Prob. 20RQCh. 15 - Prob. 21RQCh. 15 - Prob. 22RQCh. 15 - Prob. 1DQCh. 15 - Prob. 2DQCh. 15 - Prob. 3DQCh. 15 - Prob. 4DQCh. 15 - Prob. 5DQCh. 15 - Prob. 6DQCh. 15 - Prob. 7DQCh. 15 - Prob. 8DQCh. 15 - Prob. 9DQCh. 15 - Prob. 10DQCh. 15 - Prob. 11DQCh. 15 - Prob. 12DQCh. 15 - Prob. 13DQCh. 15 - End-user computing has become extremely popular in...Ch. 15 - Prob. 15DQCh. 15 - Prob. 16DQCh. 15 - Prob. 17DQCh. 15 - Prob. 18DQCh. 15 - Prob. 19DQCh. 15 - Prob. 20DQCh. 15 - Prob. 21DQCh. 15 - Prob. 22DQCh. 15 - Prob. 23DQCh. 15 - Prob. 24DQCh. 15 - Prob. 25DQCh. 15 - Describe a digest within the context of a digital...Ch. 15 - What is a digital envelope?Ch. 15 - Prob. 28DQCh. 15 - Prob. 29DQCh. 15 - Prob. 30DQCh. 15 - Prob. 31DQCh. 15 - Discuss the unique control problems EDI creates.Ch. 15 - Prob. 33DQCh. 15 - Prob. 34DQCh. 15 - Prob. 1MCQCh. 15 - Prob. 2MCQCh. 15 - Prob. 3MCQCh. 15 - Prob. 4MCQCh. 15 - Prob. 5MCQCh. 15 - Prob. 6MCQCh. 15 - Prob. 7MCQCh. 15 - Prob. 8MCQCh. 15 - Prob. 9MCQCh. 15 - Prob. 10MCQCh. 15 - Prob. 1PCh. 15 - Prob. 2PCh. 15 - Prob. 3PCh. 15 - Prob. 4PCh. 15 - Prob. 5PCh. 15 - Prob. 6PCh. 15 - Prob. 7PCh. 15 - Prob. 8PCh. 15 - Better Business Company (BBC) is in the process of...Ch. 15 - Prob. 10PCh. 15 - Prob. 11PCh. 15 - Prob. 12PCh. 15 - Prob. 13P
Knowledge Booster
Similar questions
- Listed here are four scenarios. For each scenario, discuss the potential consequences and give a prevention technique. a) A company has recently installed a new computer network. The operating philosophy adopted by the new network administrator was to establish an open system that would foster work group date to the network users. To accomplish this objective, the data administrator assigned employee access privileges to data based on department and functional affiliation rather than specific tasks. b) Sara is a system programmer who was told she would be terminated in three weeks due to poor performance and was asked to conclude all of her projects during the three-week period. Two weeks later Sara created a logic bomb designed to get activated three months after her departure. Subsequently, the bomb destroyed hundreds of records in her previous employer’s accounts receivable invoice file. c) Matt discovered a new sensitivity analysis public-domain program on the Internet. He…arrow_forwardA new system development project is being planned for Consti Corporation. The invoicing, cash receipts, and accounts payable modules are all going to be updated. You are the controller of ConstiCorporation, and you are a little anxious about the aforementioned project. The last systems development project that affected your department was not very successful, and the employees in the accounting department did not accept the new system very well at first. You feel that the systemspersonnel did not interact sufficiently with the users of the systems in the accounting department. Required: Prepare a memo that you will send to Anna Marie, the head of the information systems department. In the memo, provide some suggestions about the new project, including your concernabout the accounting personnel in the systems development project. Give persuasive arguments why prototyping would be helpful to the workers in the accounting department.arrow_forwardInnovative Marketing, Inc. (IMI), sold “scareware”—computer security software. IMI’s Internet ads redirected consumers to sites where they were told that a scan of their computers had detected dangerous files—viruses, spyware, and “illegal” pornography. In fact, no scans were conducted. Kristy Ross, an IMI co-founder and vice president, reviewed and edited the ads, and was aware of the many com- plaints that consumers had made about them. An individual can be held liable under the Federal Trade Commission Act’s prohibition of deceptive acts or practices if the person (1) participated directly in the deceptive practices or had the authority to control them and (2) had or should have had knowledge of them. Were IMI’s ads deceptive? If so, can Ross be held liable? Explain..arrow_forward
- The internal auditor of a small company has recommended to the CEO that it invest in a disaster recovery plan (DRP) because of several identified vulnerabilities. Traditional in-house DRP approaches are, however, not a viable option because the company lacks the necessary IT resources to implement and manage these tasks. The auditor has suggested that outsourcing disaster recovery to a cloud-based service provider may be a reasonable alternative. The CEO has no experience with cloud computing and has asked the internal auditor to provide him with more information. Required: Prepare a report outlining cloud computing. Your report should address the following: List the key features of cloud computingarrow_forwardThe internal auditor of a small company has recommended to the CEO that it invest in a disaster recovery plan (DRP) because of several identified vulnerabilities. Traditional in-house DRP approaches are, however, not a viable option because the company lacks the necessary IT resources to implement and manage these tasks. The auditor has suggested that outsourcing disaster recovery to a cloud-based service provider may be a reasonable alternative. The CEO has no experience with cloud computing and has asked the internal auditor to provide him with more information. Required: Prepare a report outlining cloud computing. Your report should address the following: Describe how the services provided under cloud computing relate to disaster recovery planning. Outline the risks associated with this technologyarrow_forwardA new systems development project is being planned for Reindeer Christmas Supplies Company. The invoicing, cash receipts, and accounts payable modules are all going to be updated. The controller, Kris K. Ringle, is a little anxious about this project. The last systems development project that affected his department was not very successful, and the employees in the accounting department did not accept the new system very well at first. He feels that the systems personnel did not interact sufficiently with the users of the systems in the accounting department.Prepare a memo from Ringle to the head of the information systems department, Sandy Klaus. In this memo, provide some suggestions for including the accounting personnel in the systems development project. Give persuasive arguments as to why prototyping would be helpful to the workers in the accounting department.arrow_forward
- What is a good response to? A DoS attack is when legitimate users cannot access information systems or services because of the actions of a malicious actor who floods the targeted system with excessive traffic, rendering it unresponsive (CISA, 2021). These attacks are a danger to online retailers because they disrupt operations and lead to substantial financial and reputational damage (Crumbley & Fenton, 2021). For high-priority applications, revenue losses can reach upwards of $67,651 per hour during downtime. Employee productivity declines when critical business applications are offline, and remediation efforts incur extra costs, such as overtime pay and external consulting fees. Such disruptions can tarnish brand reputation, driving customers to competitors and causing long-term market share loss. Some attacks come with ransom demands, adding further financial strain (Sansone, 2024).arrow_forwardAfter finishing your accounting degree, you joined an accounting firm. This is a medium-size accountingfirm with a reasonable range of clients. You are in an engagement meeting with one of your clients, andyour client's management raises some concerns. In particular, the management is concerned that theaudit tests that you perform will disrupt operations. Your client has recently implemented a datawarehouse. The management suggests that you draw the data for analytical reviews and substantivetesting from the data warehouse instead of the operational database. Further, the management pointsout that operational data are copied weekly into the data warehouse, and all data you need are containedthere.Required: Based on the given scenario, outline your response to the management's proposal and mentionany concerns you might have.arrow_forwardLamar LLC is in the process of updating its revenues and receivables systems with the implementation of new accounting software. James Loden, Inc. is an independent information technology consultant who is assisting Tamar with the project. James has developed the following checklist containing internal control points that the company should consider in this new implementation: Will customer orders be received via the Internet? Are all collections from customers received in the form of checks? Are product quantities monitored regularly?arrow_forward
- You are an independent consultant hired by Penmen Groceries, and they are exploring options to modernize their accounting information system (AIS). They are looking for an audit company to help them, so your manager has requested a client letter explaining how vulnerabilities can impact an organization's AIS and why an IT environment is crucial to financial reporting. Specifically, your manager is focused on phishing, malware, and ransomware, as your manager has been reading a lot in the news about these vulnerabilities causing problems for organizations. This milestone will help you with Project One, where you will be required to determine the specific risks and efficiencies of an updated computerized accounting information system. Directions In this assignment, you will write a client letter that explains the impact of vulnerabilities on an organization 's AIS and the importance of strong technology controls in the IT environment. Specifically, you must address the following rubric…arrow_forwardMunabhaiarrow_forwardSelect the correct answer(s) for the following multiple-choice questions. Note that there may be more than one correct answer. The number of incidents and the total dollar losses from computer fraud are increasing rapidly for several reasons: a. Many instances of computer fraud go undetected and many frauds are not reported. b. Many companies are moving to cloud services where there are few data security controls. c. Internet sites offer step-by-step instructions on how to perpetrate computer fraud and abuse. d. Law enforcement is not interested in preventing or prosecuting computer fraud. e. There are no laws against computer fraud so prosecution is difficultarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,