a. Consider the five generic elements of most accounting information systems. For each element, suggest one way it could be compromised via computer crime.
b. Read “Protect Small Business” by Joseph T. Wells in the March 2003 issue of Journal of Accountancy; consider the case presented in the opening paragraphs of the article (Denise, a bookkeeper for a small trucking firm). Work with a group of students and / or interview a forensic accountant / certified fraud examiner to suggest a series of steps you could use to investigate the fraud. Document your steps using one of the techniques described in Part Two of the text.
c. Explain how the use of XBRL helps organizations respond to CoBIT’s seven information criteria.
d. This chapter provided a three-part taxonomy for IT controls; earlier in the text, you learned that internal controls have four broad purposes. Fill in the table below with appropriate examples; be prepared to explain your reasoning.

  • CreatedAugust 06, 2015
  • Files Included
Post your question