Examlex
Information technology controls can be classified as physical, technical or administrative.Consider each independent situation below; suggest one control from the indicated classification that would address (prevent/detect/correct) the risk.a) A bank's customer database is hacked.Administrative: _____________________________________________
b) A careless employee spills coffee on a network server.Physical: _____________________________________________
c) A corporation's sales data are manipulated by a member of the sales staff.Technical: _____________________________________________
d) A former employee introduces a logic bomb to a company's payroll system.Administrative: _____________________________________________
e) A political candidate's web site is defaced.Technical: _____________________________________________
f) A senior citizen sends money to a fake religious organization based on a fraudulent e-mail.Administrative: _____________________________________________
g) A waitress steals a customer's credit card number.Physical: _____________________________________________
h) An employee uses work time to shop online using the company's computer.Administrative: _____________________________________________
i) Corporate spies steal research and development information.Technical: _____________________________________________
j) Fake compromising photos of a corporate CEO are posted to a social networking site.Technical: _____________________________________________
External Attribution
The process of attributing the cause of one's own or others' behavior to external factors or situations beyond one's control.
Incentives
Rewards or motivations provided to encourage specific behaviors or outcomes.
Simplify
No clear definition since "simplify" refers to the process of making something easier to understand or less complicated.
Performance Deficiencies
The gap between actual and desired performance levels in any task or job, indicating areas that need improvement.
Q2: Following the model presented in the text,
Q8: George received an e-mail that threatened to
Q11: XBRL creates certain benefits for both accountants
Q16: From an accountant's perspective, one of the
Q19: Please refer to the data flow diagram
Q20: Consider the following short case as you
Q27: Knowledge:<br>A)Is an element of financial statements.<br>B)Should be
Q36: Lenise laid out three potential responses for
Q45: The terms "adverse" and "disclaimer" are most
Q45: Consider the table below as you respond