Claudine Perez
ACC 340 Final Examination
1. The essential steps in performing a systems study are (in order of occurrence):
a) Analysis, design, implementation and initial operation, follow‑up
b) Design, planning, follow‑up, analysis, and implementation
c) Planning, system specification, analysis, production, implementation
d) Planning, analysis, design, implementation, and follow‑up
2. Which of the following is intended to solve the problem that financial data used in one application is not easily transferable to other applications? a) XMP b) ERP c) XBRL d) XMLP
3. Information systems auditors are:
a) Auditors who are concerned with analyzing risks associated with
…show more content…
Which of the following is not a concern of the financing process?
a) Effective cash management
b) Optimizing an organization’s cost of capital
c) Minimizing an organization’s borrowings
d) Projecting cash flows
14. Business process reengineering efforts sometimes fail because:
a. Management gets too involved in the process
e) Management is too optimistic regarding its expectations from its implementation
b. Management support can never overcome employee resistance
c. Employees will never accept change
15. Which of the following technologies are now used in conjunction with automated production process systems to increase efficiencies?
a) Radio frequency technology
b) Bar code scanners
c) RF IDs and advanced electronic tags
d) all of the above
e) none of the above
16. According to the chapter, which of these statements is most accurate?
a) Most computer abuse is performed as retaliation against employers
b) Very little computer crime is committed for personal gain
c) Some computer abuse is performed simply to meet a challenge
d) We catch most computer abusers with good accounting controls
17.Which of the following is probably the primary reason accountants should be concerned about computer crime and abuse?
a) They might lose their job if they don’t detect computer crime or abuse in their organization
b) They might lose their professional credibility and license if computer crime or abuse continues for a long time in their organization and they do not detect it
equipment be purchased. Which of the following would be of greatest concern to the auditor?
They need to have mechanisms to obtain information during or after a data breach to be able to understand the damage. Furthermore, having an incident response team that is trained and ready for the scenario of a violation. Just as your children at school do fire simulation, you should simulate violations, so if you do, you already know that one person is going to be in charge, another is going to give statements to the
According to the Tuscaloosa case study, an employee named Brody was working at a normal pace until he received a pop-up message that showed that the organization has been breached by a cyber-threat. When Brody contacted technical support, another pop-up message shows that the organization was hacked by traffic coming from other parts of the corporation. This time from four other branches. He realized that those cyber threats were different
24) Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that
If the employee is dissatisfied, the ability to access the organization’s resources can be highly damaging. The security policy should elect specific IT team members to screen and control user accounts prudently, which would avoid any illegal action from occurring.
This control checks all pre numbered documents, such as receipts and checks, are properly authorized. This decreases the possibility of unauthorized transactions from entering IMS’s records.
“In countless offices, employers can monitor telephone calls, peruse email messages, and even retrieve supposedly ‘deleted’ files without an employee’s knowledge” (Brin 56). There is nothing the employees can do about this if they never know it is even happening.
In the risk management operations, some firms do not consider that the data breaches as not so important even though it causes the cost and frequency breaches. The probability of an information break in the current business scene has expanded in the course of the last few years, with organizations of all sizes experiencing these sorts of security and oversight issues. Aftermath from an inner burglary or digital assault can be sweeping in the venture environment, yet over the long haul, the cost of these attacks is expanding. For firms that don’t take the perfect measure of time or put enough exertion into their information break Security, such a debacle could be much more disastrous. Regardless of these dangers, numerous organizations stay in unstable positions with respect to their security and oversight conventions. Agreeing to business pioneers feel there 's a need to protect themselves against dangers inside and outside the association, yet those beneath such positions aren 't as worried about these issues. The firm as of late directed a study that confirmed more than three-fourths of big business administrators are stressed over halting invasions and their capacity to do in this way, while just 45 percent of base faculty impart these concerns. An alternate issue connected with this absence of lower-level work force sympathy toward information rupture security is the way that the scale of digital assaults is developing. Indeed in little business situations, the
Systems can enable new manufacturing processes and products based on the most efficient uses of equipment and energy.
In addition, with this in mind all person’s identification numbers and passwords are being recorded, every time that you log onto the computers and input your identification number and password will be displayed to the computer analysis. And once the report is in it will be sent to me at the end of the day, and you will be notified at the end of your shift. This is established by you signing off on the report, this states that you are consenting to using the computer at such time and day. Once it is established that your identification number is being used for improper usage of the computers, there will no longer be a formal warning. You will automatically receive a suspension without pay until such event is resolved, and you will have to take a mandatory class on the policies of the department before
Accounting skills are useful for companies and individuals who are trying to maximize their profits and maintain a competitive advantage, but forensic accounting can help bring justice and peace of mind for many others by illuminating financial processes that can help explain criminal actions and behaviors. The purpose of this essay is to describe the five most important skills a forensic accountant may possess in order to become successful. This essay will describe each one of these traits and describe its application to business operations. Next the essay will describe the role of the forensic accountant within a courtroom environment and then also discuss the legal responsibilities that these professionals have to obey in the course of their work. Finally this essay will highlight two real world cases where forensic accounting provided vital evidence in a legal court case.
Employing the appropriate IT controls will ensure access to various functions and sensitive data are limited. Based on the company’s policy, management must decide the type of information that should be available to the HR department. Caterinicchia (2005) stated that management should screen the HR personnel and anyone else who will be given access to personal employee information to ensure they always portray good code of ethics. A proxy system should also be implemented to ensure every employee trying to assess data within the system is authorized and has the right privileges before gaining access into the system. Policies should be created to prompt users to change their passwords periodically; this way, if an employee’s password has been maliciously learned probably by shoulder surfing, the password would not work the next time the malicious personnel tries to access the system.
Monitoring user accounts and groups by administrations can prevent or detect when a system has been compromised. When a hacker gains access to a system, they can create an account to have administrator privileges and exploit a network. Inside exploits of an organization can also occur by disgruntle employees and can cause malicious activity on a system to gain unauthorized access or elevate their privileges. In addition a user’s activity can be digitally monitored, reports can be created that provide a definitive record of an employee’s digital behavior which can provide an organization with the ability to see the context of a user’s action. Monitoring of an employee’s activity can include:
Programmers, managers, clerks, and consultants can often be responsible for committing computer crimes as a result of the fact that they are determined to harm their employers through any means possible. Company computers are in many cases used for blackmail, theft, and sabotage and employers are in many cases left with little to no power but to close their eyes. "The most common source of computer crime is a disgruntled employee or former employees. Employees with an average age of 29, holding managerial or professional positions, commit up to 75% of computer crimes." (Bidgoli 327) This means that companies are often the target of employees wanting to take advantage of their position and knowledge.
|b) to identify the strengths and weaknesses of accounting system and to recommend necessary improvements or