Accounting Information Systems
10th Edition
ISBN: 9781337619202
Author: Hall, James A.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Question
Chapter 15, Problem 7P
a.
To determine
Explain the potential consequences and prevention techniques for the given scenario.
b.
To determine
Explain the potential consequences and prevention techniques for the given scenario.
c.
To determine
Explain the potential consequences and prevention techniques for the given scenario.
d.
To determine
Explain the potential consequences and prevention techniques for the given scenario.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
Listed here are four scenarios. For each scenario, discuss the potential consequences and give a prevention technique. a) A company has recently installed a new computer network. The operating philosophy adopted by the new network administrator was to establish an open system that would foster work group date to the network users. To accomplish this objective, the data administrator assigned employee access privileges to data based on department and functional affiliation rather than specific tasks. b) Sara is a system programmer who was told she would be terminated in three weeks due to poor performance and was asked to conclude all of her projects during the three-week period. Two weeks later Sara created a logic bomb designed to get activated three months after her departure. Subsequently, the bomb destroyed hundreds of records in her previous employer’s accounts receivable invoice file. c) Matt discovered a new sensitivity analysis public-domain program on the Internet. He…
what is the potential consequences and give each of the question a prevention technique.
1)A company has recently installed a new computer network. The operating philosophy adopted by the new network administrator was to establish an open system that would foster work group date to the network users. To accomplish this objective, the data administrator assigned employee access privileges to data based on department and functional affiliation rather than specific tasks.
2)Sara is a system programmer who was told she would be terminated in three weeks due to poor performance and was asked to conclude all of her projects during the three-week period. Two weeks later Sara created a logic bomb designed to get activated three months after her departure. Subsequently, the bomb destroyed hundreds of records in her previous employer’s accounts receivable invoice file.
3)Matt discovered a new sensitivity analysis public-domain program on the Internet. He downloaded the software to his laptop at…
The ABC Company is switching from its legacy centralizedsystem to a fully distributed system. Underthe new model, all employees will work from PCsconnected to a local area network.
a. Outline a plan of action to ensure that the propercontrols over hardware, software, data, people,procedures, and documentation are in place.b. Discuss any risks the company may face if thedevised plan is not implemented.
Chapter 15 Solutions
Accounting Information Systems
Ch. 15 - Prob. 1RQCh. 15 - Prob. 2RQCh. 15 - Prob. 3RQCh. 15 - Prob. 4RQCh. 15 - Prob. 5RQCh. 15 - Explain discretionary access privileges.Ch. 15 - Prob. 7RQCh. 15 - Prob. 8RQCh. 15 - What is a vaccine, and what are its limitations?Ch. 15 - Prob. 10RQ
Ch. 15 - Prob. 11RQCh. 15 - What are the risks from equipment failure?Ch. 15 - Prob. 13RQCh. 15 - Prob. 14RQCh. 15 - Prob. 15RQCh. 15 - Prob. 16RQCh. 15 - Prob. 17RQCh. 15 - Prob. 18RQCh. 15 - Prob. 19RQCh. 15 - Prob. 20RQCh. 15 - Prob. 21RQCh. 15 - Prob. 22RQCh. 15 - Prob. 1DQCh. 15 - Prob. 2DQCh. 15 - Prob. 3DQCh. 15 - Prob. 4DQCh. 15 - Prob. 5DQCh. 15 - Prob. 6DQCh. 15 - Prob. 7DQCh. 15 - Prob. 8DQCh. 15 - Prob. 9DQCh. 15 - Prob. 10DQCh. 15 - Prob. 11DQCh. 15 - Prob. 12DQCh. 15 - Prob. 13DQCh. 15 - End-user computing has become extremely popular in...Ch. 15 - Prob. 15DQCh. 15 - Prob. 16DQCh. 15 - Prob. 17DQCh. 15 - Prob. 18DQCh. 15 - Prob. 19DQCh. 15 - Prob. 20DQCh. 15 - Prob. 21DQCh. 15 - Prob. 22DQCh. 15 - Prob. 23DQCh. 15 - Prob. 24DQCh. 15 - Prob. 25DQCh. 15 - Describe a digest within the context of a digital...Ch. 15 - What is a digital envelope?Ch. 15 - Prob. 28DQCh. 15 - Prob. 29DQCh. 15 - Prob. 30DQCh. 15 - Prob. 31DQCh. 15 - Discuss the unique control problems EDI creates.Ch. 15 - Prob. 33DQCh. 15 - Prob. 34DQCh. 15 - Prob. 1MCQCh. 15 - Prob. 2MCQCh. 15 - Prob. 3MCQCh. 15 - Prob. 4MCQCh. 15 - Prob. 5MCQCh. 15 - Prob. 6MCQCh. 15 - Prob. 7MCQCh. 15 - Prob. 8MCQCh. 15 - Prob. 9MCQCh. 15 - Prob. 10MCQCh. 15 - Prob. 1PCh. 15 - Prob. 2PCh. 15 - Prob. 3PCh. 15 - Prob. 4PCh. 15 - Prob. 5PCh. 15 - Prob. 6PCh. 15 - Prob. 7PCh. 15 - Prob. 8PCh. 15 - Better Business Company (BBC) is in the process of...Ch. 15 - Prob. 10PCh. 15 - Prob. 11PCh. 15 - Prob. 12PCh. 15 - Prob. 13P
Knowledge Booster
Similar questions
- Describe ways that system theory can help you implement an OD intervention. Assume an organization wants to give more power or decision-making authority to lower level employees. Describe one intervention that might be useful for achieving the objective. Assume an organization conducted a workshop on customer service. The goal was to improve the customers experience. Describe one way you might be able to evaluate the interventionarrow_forwardWhich preventive, detective, and/or corrective controls would best mitigate the following threat, and why? (d) An employee received an email purporting to be from her boss informing her of an important new attendance policy. When she clicked on a link embedded in the email to view the new policy, she infected her laptop.arrow_forwardConsider the following dialogue between a systems professional, Joe Pugh, and a manager of a department tar- geted for a new information system, Lars Meyer:Pugh: The way to go about the analysis is to first examine the old system, such as reviewing key documents and observing the workers performing their tasks. Then we can determine which aspects are working well and which should be preserved. Meyer: We have been through these types of projects before and what always ends up happening is that we do not get the new system we are promised; we get a modified version of the old system.Pugh: Well, I can assure you that will not happen this time. We just want a thorough understanding of what is working well and what is not.Meyer: I would feel much more comfortable if we first started with a list of our requirements. We should spend some time up front determining exactly what we want the system to do for my department. Then, you systems people can come in and determine what portions to…arrow_forward
- Explain how internal control can be enhanced through the proper installation of Information Technology Identify the risks for accounting systems that rely heavily on IT functions. Distinguish between general controls and application controls and give examples at least five Which duties should be segregated in a computer department? Describe the typical duties of computer personnel. What aspects of documentation, file security and retention control procedures are unique to computer systems? What are the responsibilities of the database administrator (DBA) function? Compare the risks associated with network environment to those associated with centralized IT functions.arrow_forwardAs the client support supervisor for FarFar construction, you noticed that some site workers are clocking on for friends who are not present. Discuss controls you could implement to address this concern.arrow_forwardConsider the following dialogue between a system professional, Jim Festin, and a manager of adepartment targeted for a new information system, Charles Puno:Festin: The way to go about the analysis is to first examine the old system, such as reviewing keydocuments and observing the workers perform their tasks. Then we can determine which aspects areworking well and which should be preserved.Puno: We have been through these types of projects before and what always ends up happening isthat we do not get the new system we are promised; we get a modified version of the old system.Festin: Well, I can assure you that will not happen this time. We just want a thorough understanding ofwhat is working well and what is not.Puno: I would feel much more comfortable if we first started with a list of our requirements. We shouldspend some time up-front determining exactly what we want the system to do for my department. Thenyou systems people can come in and determine what portions to salvage if you…arrow_forward
- Which preventive, detective, and/or corrective controls would best mitigate the following threat, and why? (i)To facilitate working from home, an employee installed a modem on his office workstation. An attacker successfully penetrated the company’s system by dialing into that modem.arrow_forwardWhich of the following would strengthen organizational control over a large-scale data processing center?a. Requiring the user departments to specify the general control standards necessary for processing transactions.b. Requiring that requests and instructions for data processing services be submitted directly to the computer operator in the data center.c. Having the database administrator report to the manager of computer operations.d. Assigning maintenance responsibility to the original system designer who best knows its logic.e. None of the above.arrow_forwardSystems Analysis Consider the following dialogue between a systems professional, Joe Pugh, and a manager of a department targeted for a new information system, Lars Meyer: Pugh: The way to go about the analysis is to first examine the old system, such as reviewing key documents and observing the workers perform their tasks. Then we can determine which aspects are working well and which should be preserved. Meyer: We have been through these types of projects before and what always ends up happening is that we do not get the new system we are promised; we get a modified version of the old system. Pugh: Well, I can assure you that will not happen this time. We just want a thorough understanding of what is working well and what is not. Meyer: I would feel much more comfortable if we first started with a list of our requirements. We should spend some time up-front determining exactly what we want the system to do for my department. Then you systems people can come in and determine what…arrow_forward
- Please answer 1, 2 and 3.arrow_forwardGeneral Controls. Indicate the benefits of each of the following examples of general controls. a. Echo checks are designed and built into the computer by the manufacturer.b. The company schedules regular maintenance on its computer hardware.c. The company involves users in its design of programs and selection of prepackaged software and programs.d. New programs are tested and validated prior to being implemented.e. Documentation is required prior to modifying existing programs using “emergency”change orders.f. The duties of system analysts, programmers, and computer operators are appropriatelyseparated.g. Appropriate backup and data retention policies are implemented.h. The access rights granted to employees are periodically reviewed and evaluated, giving consideration to known changes resulting from promotions and transfers within the company.arrow_forwardThe Chief Information Officer (CIO) and the Managing Director (MD) of Illustrious Limited recently hadthe following conversation regarding the development of a new information system for the company:CIO: The way to go about the analysis is to first examine the old system, such as reviewing keydocuments and observing the workers performing their tasks. Then we can determine which aspectsare working well and which should be preserved.MD: We have been through these types of projects before, and what always ends up happening is thatwe do not get the new system we are promised. Instead we get a modified version of the old system.CIO: I can assure you that will not happen this time. My team just want a thorough understanding ofwhat is working well and what is not.MD: I would feel much more comfortable if we first started with a list of our requirements. We shouldspend more time in determining what exactly we want the system to do upfront. Then your team cancome in and determine what portions…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE L
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L