Questions from Accounting Information Systems


Q: The controller of a small business received the following e-mail

The controller of a small business received the following e-mail with an authentic-looking e-mail address and logo: From: Big Bank [[email protected]] To: Justin Lewis, Controller, Small Busine...

See Answer

Q: From the viewpoint of the customer, what are the advantages and

From the viewpoint of the customer, what are the advantages and disadvantages to the opt-in versus the opt-out approaches to collecting personal information? From the viewpoint of the organization des...

See Answer

Q: What are the advantages and disadvantages of the three types of authentication

What are the advantages and disadvantages of the three types of authentication credentials (something you know, something you have, and something you are)?

See Answer

Q: Match the description in the right column with the information characteristic in

Match the description in the right column with the information characteristic in the left column.

See Answer

Q: At 9:00., Andrew Mantovani, cofounder of the group

At 9:00., Andrew Mantovani, cofounder of the group Shadowcrew, received a knock at his door while chatting on his computer. For Mantovani and 27 others, that knock marked the end of Shadowcrew, which...

See Answer

Q: : You are the systems analyst for the Wee Willie Williams Widget

You are the systems analyst for the Wee Willie Williams Widget Works (also known as Dub 5, which is a shortened version of 5 Ws). Dub 5 produces computer keyboard components. It has been producing ke...

See Answer

Q: What privacy concerns might arise from the use of biometric authentication techniques

What privacy concerns might arise from the use of biometric authentication techniques? What about the embedding of RFID tags in products such as clothing? What other technologies might create privacy...

See Answer

Q: Effective segregation of duties is sometimes not economically feasible in a small

Effective segregation of duties is sometimes not economically feasible in a small business. What internal control elements do you think can help compensate for this threat?

See Answer

Q: Do you agree that the most effective way to obtain adequate system

Do you agree that the most effective way to obtain adequate system security is to rely on the integrity of company employees? Why or why not? Does this seem ironic? What should a company do to ensure...

See Answer

Q: How do an organization’s business processes and lines of business affect the

How do an organization’s business processes and lines of business affect the design of its AIS? Give several examples of how differences among organizations are reflected in their AIS.

See Answer