• Chapter 15: The Human Resources Management and Payroll CycleChapter 15: The Human Resources Management and Payroll Cycle

    Describe the major business activities and related information processing operations performed in the human resources management (HRM)/payroll cycle. Discuss the key decisions to be made in the HRM/payroll cycle and identify the information needed to make those decisions. Identify the major threats in the HRM/payroll cycle and evaluate the adequa...

    pptx17 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 914 | Lượt tải: 0

  • Chapter 14: The Production CycleChapter 14: The Production Cycle

    Describe the major business activities and related information processing operations performed in the production cycle. Identify major threats in the production cycle and evaluate the adequacy of various control procedures for dealing with those threats. Explain how a company’s cost accounting system can help it achieve its manufacturing goals. ...

    pptx16 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 848 | Lượt tải: 0

  • Chapter 13: The Expenditure Cycle: Purchasing to Cash DisbursementsChapter 13: The Expenditure Cycle: Purchasing to Cash Disbursements

    Explain the basic business activities and related information processing operations performed in the expenditure cycle. Discuss the key decisions to be made in the expenditure cycle, and identify the information needed to make those decisions. Identify major threats in the expenditure cycle, and evaluate the adequacy of various control procedures...

    pptx20 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 944 | Lượt tải: 0

  • Chapter 12: The Revenue Cycle: Sales to Cash CollectionsChapter 12: The Revenue Cycle: Sales to Cash Collections

    Describe the basic business activities and related information processing operations performed in the revenue cycle. Discuss the key decisions that need to be made in the revenue cycle, and identify the information needed to make those decisions. Identify major threats in the revenue cycle, and evaluate the adequacy of various control procedures ...

    pptx18 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 903 | Lượt tải: 0

  • Chapter 11: Auditing Computer-Based Information SystemsChapter 11: Auditing Computer-Based Information Systems

    Describe the scope and objectives of audit work, and identify the major steps in the audit process. Identify the objectives of an information system audit, and describe the four-step approach necessary for meeting these objectives. Design a plan for the study and evaluation of internal control in an AIS. Describe computer audit software, and exp...

    pptx17 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 933 | Lượt tải: 0

  • Chapter 10: Information Systems Controls for System Reliability—Part 3: Processing Integrity and AvailabilityChapter 10: Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability

    Security (Chapter 8) Access to the system and its data is controlled and restricted to legitimate users. Confidentiality (Chapter 8) Sensitive organizational information (e.g., marketing plans, trade secrets) is protected from unauthorized disclosure. Privacy (Chapter 9) Personal information about customers is collected, used, disclosed, and m...

    pptx14 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 904 | Lượt tải: 0

  • Chapter 9: Information Systems Controls for System Reliability— Part 2: Confidentiality and PrivacyChapter 9: Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy

    Learning Objectives Identify and explain controls designed to protect the confidentiality of sensitive corporate information. Identify and explain controls designed to protect the privacy of customers’ personal information. Explain how the two basic types of encryption systems work.

    pptx16 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 846 | Lượt tải: 0

  • Chapter 8: Information Systems Controls for System Reliability— Part 1: Information SecurityChapter 8: Information Systems Controls for System Reliability— Part 1: Information Security

    Discuss how the COBIT framework can be used to develop sound internal control over an organization’s information systems. Explain the factors that influence information systems reliability. Describe how a combination of preventive, detective, and corrective controls can be employed to provide reasonable assurance about information security.

    pptx23 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 865 | Lượt tải: 0

  • Chapter 7: Control and AISChapter 7: Control and AIS

    Learning Objectives Explain basic control concepts and explain why computer control and security are important. Compare and contrast the COBIT, COSO, and ERM control frameworks. Describe the major elements in the internal environment of a company Describe the four types of control objectives that companies need to set. Describe the events that...

    pptx20 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 853 | Lượt tải: 0

  • Chapter 6: Computer Fraud and Abuse TechniquesChapter 6: Computer Fraud and Abuse Techniques

    Learning Objectives Compare and contrast computer attack and abuse tactics. Explain how social engineering techniques are used to gain physical or logical access to computer resources. Describe the different types of malware used to harm computers.

    pptx13 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 1236 | Lượt tải: 0