Question: a. Consider the five generic elements of most accounting information systems. For each element, suggest one way it could be compromised via computer crime. b.
b. Read €œProtect Small Business€ by Joseph T. Wells in the March 2003 issue of Journal of Accountancy; consider the case presented in the opening paragraphs of the article (Denise, a bookkeeper for a small trucking firm). Work with a group of students and / or interview a forensic accountant / certified fraud examiner to suggest a series of steps you could use to investigate the fraud. Document your steps using one of the techniques described in Part Two of the text.
c. Explain how the use of XBRL helps organizations respond to CoBIT€™s seven information criteria.
d. This chapter provided a three-part taxonomy for IT controls; earlier in the text, you learned that internal controls have four broad purposes. Fill in the table below with appropriate examples; be prepared to explain your reasoning.
.png)
Internal Control Purpose Administrative Physical Controls Technical Controls Controls Safeguard assets Ensure financial statement reliability Promote operating efficiency Encourage compliance with management directives
Step by Step Solution
3.45 Rating (174 Votes )
There are 3 Steps involved in it
a Inputs such as source documents could be electronically altered falsified The AIS processing function could be compromised in myriad ways including ... View full answer
Get step-by-step solutions from verified subject matter experts
Document Format (1 attachment)
506-B-A-I-S (7305).docx
120 KBs Word File
