Accounting Information Systems
11th Edition
ISBN: 9781337552127
Author: Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 14, Problem 3SP
Summary Introduction
To match: The process failures with the control plans.
Introduction:
Human resource (HR) management and Payroll process:
Human resource management is about the basic human management functions in an organization and its associated activities. It also speaks about the relationship between human resource management activities and the payroll process. It also depicts the importance of HR activities in the decision making of the top management.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
The following is a list of 12 control plans from Chapter 8. These are followed by a list of 10 B/AR/CR business process controls or deficiencies. Match the 10 B/AR/CR business process control plans with a pervasive control plan from Chapter 8 that could prevent the deficiencies noted in the preceding list or have an impact on the successful execution of the business process control. Explain the impact that the pervasive control could have.
Control Plans from Chapter 8
Access control software (i.e., assignment of access rights to employees)
Selection, hiring, and supervision of billing clerks to ensure that they can and do carry out their assigned responsibilities
Physical controls for perimeter, building, and computer facilities to prevent loss or destruction of the computer resources
Preventive maintenance of computer hardware to ensure reliability and availability
Systems development life cycle (SDLC), including testing and approval before implementation of new or revised programs…
Listed here are four scenarios. For each scenario, discuss the potential consequences and give a prevention technique. a) A company has recently installed a new computer network. The operating philosophy adopted by the new network administrator was to establish an open system that would foster work group date to the network users. To accomplish this objective, the data administrator assigned employee access privileges to data based on department and functional affiliation rather than specific tasks. b) Sara is a system programmer who was told she would be terminated in three weeks due to poor performance and was asked to conclude all of her projects during the three-week period. Two weeks later Sara created a logic bomb designed to get activated three months after her departure. Subsequently, the bomb destroyed hundreds of records in her previous employer’s accounts receivable invoice file. c) Matt discovered a new sensitivity analysis public-domain program on the Internet. He…
Describe ways that system theory can help you implement an OD intervention.
Assume an organization wants to give more power or decision-making authority to lower level employees. Describe one intervention that might be useful for achieving the objective.
Assume an organization conducted a workshop on customer service. The goal was to improve the customers experience. Describe one way you might be able to evaluate the intervention
Chapter 14 Solutions
Accounting Information Systems
Ch. 14 - What is human capital management (HCM)?Ch. 14 - What does human capital include?Ch. 14 - What is the human resources management process?...Ch. 14 - Prob. 4RQCh. 14 - Prob. 5RQCh. 14 - What role does each HR manager listed in Figure...Ch. 14 - What key decisions do the HR managers shown in...Ch. 14 - Prob. 8RQCh. 14 - Prob. 9RQCh. 14 - Prob. 10RQ
Ch. 14 - Prob. 11RQCh. 14 - Prob. 12RQCh. 14 - Prob. 13RQCh. 14 - Prob. 14RQCh. 14 - Prob. 15RQCh. 14 - Prob. 16RQCh. 14 - Prob. 17RQCh. 14 - Prob. 1DQCh. 14 - Prob. 2DQCh. 14 - Discuss the role unions and government agencies...Ch. 14 - Prob. 4DQCh. 14 - Prob. 5DQCh. 14 - In this chapter, we stated that many organizations...Ch. 14 - Prob. 3SPCh. 14 - Prob. 4SPCh. 14 - Prob. 5SPCh. 14 - Prob. 6SPCh. 14 - Prob. 6PCh. 14 - Prob. 7P
Knowledge Booster
Similar questions
- Listed here are 20 control plans discussed in the chapter. On the blank line to the left of each control plan, insert a P (preventive), D (detective), or C (corrective) to classify that control most accurately. If you think that more than one code could apply to a particular plan, insert all appropriate codes and briefly explain your answer:arrow_forwardImplementing the closure process includes several wrap-up activities. Many organizations develop lengthy lists for closing projects as they gain experience. These are very helpful and ensure nothing is overlooked. Implementing closedown includes the following six major activities: Getting delivery acceptance from the customer. Shutting down resources and releasing to new uses. Reassigning project team members. Closing accounts and seeing all bills are paid. Delivering the project to the customer. Creating a final report. Group of answer choices True Falsearrow_forwardConsider the following dialogue between a systems professional, Joe Pugh, and a manager of a department tar- geted for a new information system, Lars Meyer:Pugh: The way to go about the analysis is to first examine the old system, such as reviewing key documents and observing the workers performing their tasks. Then we can determine which aspects are working well and which should be preserved. Meyer: We have been through these types of projects before and what always ends up happening is that we do not get the new system we are promised; we get a modified version of the old system.Pugh: Well, I can assure you that will not happen this time. We just want a thorough understanding of what is working well and what is not.Meyer: I would feel much more comfortable if we first started with a list of our requirements. We should spend some time up front determining exactly what we want the system to do for my department. Then, you systems people can come in and determine what portions to…arrow_forward
- The senior management accountant is interested in implementing a new accounting information for the manufacturing department. Before doing so, he has tasked you with the job of identifying the flow of information within the system. He has asked that you provide a visual representation of the flow of information, specifically, using a data flow diagram.He requires the following information and has split the team into the following tasks:Student numbers ending in an odd number (1,3,5,7,9), you are required to detail the flow of information regarding the payroll system.Student numbers ending in an even number (0,2,4,6,8), you are required to detail the flow of information regarding the Goods ordering system.arrow_forwardAs the client support supervisor for FarFar construction, you noticed that some site workers are clocking on for friends who are not present. Discuss controls you could implement to address this concern.arrow_forwardAnalyze the change control process for the retail project's software configuration management. Your discussion must include examples of activities and techniques (300-400 words).arrow_forward
- Which statement about flowcharts is correct? a. They list internal control activities that are present or missing and are easy to understand and use for identifying control weaknesses in the typical processes. b. They visually represent the activities in a business process and are used to easily understand the process using standard notations. c. They show many details of a process in a single diagram that can be used to capture controls via decision points and the manual and automated processes. d. They are simple diagrams showing the sources of data, processes, and data storage that can be used to focus on the data separate from the who processes data.arrow_forwardConsider the following dialogue between a system professional, Jim Festin, and a manager of adepartment targeted for a new information system, Charles Puno:Festin: The way to go about the analysis is to first examine the old system, such as reviewing keydocuments and observing the workers perform their tasks. Then we can determine which aspects areworking well and which should be preserved.Puno: We have been through these types of projects before and what always ends up happening isthat we do not get the new system we are promised; we get a modified version of the old system.Festin: Well, I can assure you that will not happen this time. We just want a thorough understanding ofwhat is working well and what is not.Puno: I would feel much more comfortable if we first started with a list of our requirements. We shouldspend some time up-front determining exactly what we want the system to do for my department. Thenyou systems people can come in and determine what portions to salvage if you…arrow_forwardWhich preventive, detective, and/or corrective controls would best mitigate the following threat, and why? (d) An employee received an email purporting to be from her boss informing her of an important new attendance policy. When she clicked on a link embedded in the email to view the new policy, she infected her laptop.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE LExcel Applications for Accounting PrinciplesAccountingISBN:9781111581565Author:Gaylord N. SmithPublisher:Cengage Learning
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Excel Applications for Accounting Principles
Accounting
ISBN:9781111581565
Author:Gaylord N. Smith
Publisher:Cengage Learning