MANAGEMENT INFORMATION SYSTEMS: MANAGING
MANAGEMENT INFORMATION SYSTEMS: MANAGING
16th Edition
ISBN: 9780135790939
Author: LAUDON
Publisher: PEARSON
Expert Solution & Answer
Book Icon
Chapter 8, Problem 3RQ

Explanation of Solution

 General Controls:

  • The general controls govern the security, design, computer program usage and data file security throughout Information Technology (IT) infrastructure of organization.
  • It applies to all applications that are computerized, it consist of combination of software, hardware as well as manual procedures.
  • It creates an overall environment of control.

Types of general control:

  • Software controls:
    • It monitors usage of system software.
    • It prevents unauthorized access and usage of system software, software programs and computer programs.
  • Hardware controls:
    • It ensures physical security for computer hardware.
    • It checks for any malfunction in equipment.
    • It makes provision for back up as well as continued operation for maintaining constant service...

Explanation of Solution

Application Controls:

  • Application controls denote specific controls that are exclusive to each application.
  • It includes both manual as well as automated procedures.
  • It ensures that authorized data is been processed by application.

Types of application control:

  • Input controls:
    • It checks data for correctness as well as completeness while they go in system...

Explanation of Solution

Risk assessment function:

  • A risk assessment would determine risk level to firm if an explicit activity is not controlled properly.
  • The information assets value, vulnerability point, likely problem frequency and damage potential can be determined by business managers.
  • Controls could be added or adjusted to focus on greater risk areas.
  • Security risk analysis would involve determination of what is needed to be protected and the manner to protect.
  • It denotes an examining process for risks of firm and ranking for those risks by severity level...

Explanation of Solution

Security policy, Acceptable use policy and Identity management:

  • A security policy denotes ranking of information risks, identification of acceptable goals of security as well as identification of mechanism to achieve goals.
    • It drives policies that determine acceptable information resource usage of firm.
    • It determines access details of company’s information assets.
  • An acceptable use policy denotes acceptable uses of resources of firm and equipment for computing.
    • It includes desktop, laptop, wireless devices, Internet and telephones.
    • It clarifies privacy, responsibility of user as well as personal usage for company equipment policies...

Explanation of Solution

Information systems audit promoting control and security:

  • Information system auditing determines effectiveness of information system security as well as control.
  • A Management Information System (MIS) audit would ident...

Blurred answer
Students have asked these similar questions
I would like to get help to resolve the following case
Last Chance Securities The IT director opened the department staff meeting today by saying, "I've got some good news and some bad news. The good news is that management approved the payroll system project this morning. The new system will reduce clerical time and errors, improve morale in the payroll department, and avoid possible fines and penalties for noncompliance. The bad news is that the system must be installed by January 1st in order to meet new federal reporting rules, all expenses from now on must be approved in advance, the system should have a modular design if possible, and the vice president of finance would like to announce the new system in a year-end report if it is ready by mid-December." Tasks 1. Why is it important to define the project scope? How would you define the scope of the payroll project in this case? 2. Review each constraint and identify its characteristics: present versus future, internal versus exter- nal, and mandatory versus desirable. 3. What…
2. Signed Integers Unsigned binary numbers work for natural numbers, but many calculations use negative numbers as well. To deal with this, a number of different methods have been used to represent signed numbers, but we will focus on two's complement, as it is the standard solution for representing signed integers. 2.1 Two's complement • Most significant bit has a negative value, all others are positive. So, the value of an n-digit -2 two's complement number can be written as: Σ2 2¹ di 2n-1 dn • Otherwise exactly the same as unsigned integers. i=0 - • A neat trick for flipping the sign of a two's complement number: flip all the bits (0 becomes 1, or 1 becomes 0) and then add 1 to the least significant bit. • Addition is exactly the same as with an unsigned number. 2.2 Exercises For questions 1-3, answer each one for the case of a two's complement number and an unsigned number, indicating if it cannot be answered with a specific representation. 1. (15 pts) What is the largest integer…
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education