How can we help?

You can also find more resources in our Help Center.

Study sets matching "accounting information systems chapter 9"

Study sets
Classes
Users

Study sets matching "accounting information systems chapter 9"

27 terms
Accounting Information Systems Chapter 9
Four Components of Protecting Confiden…
Information Rights Management (IRM)
Data Loss Prevention (DLP)
Digital Watermark
1. Identify & Classify Information ... 2. Encryption ... 3. Access…
Software that offers the capability not only to limited acces…
Software which works likes antivirus programs in reverse, blo…
Code embedded in documents that enables an organization to id…
Four Components of Protecting Confiden…
1. Identify & Classify Information ... 2. Encryption ... 3. Access…
Information Rights Management (IRM)
Software that offers the capability not only to limited acces…
24 terms
Accounting Information Systems Chapter 9
Information Rights Management (IRM)
Data Loss Prevention DLP)
Digital Watermark
Data masking
Software that offers capability not only to limit access to s…
Software which works like antivirus programs in reverse, bloc…
Code embedded in documents that enables an organization to id…
A program that protects privacy by replacing customers person…
Information Rights Management (IRM)
Software that offers capability not only to limit access to s…
Data Loss Prevention DLP)
Software which works like antivirus programs in reverse, bloc…
27 terms
Accounting Information Systems Chapter 9
Four Components of Protecting Confiden…
Information Rights Management (IRM)
Data Loss Prevention (DLP)
Digital Watermark
1. Identify & Classify Information ... 2. Encryption ... 3. Access…
Software that offers the capability not only to limited acces…
Software which works likes antivirus programs in reverse, blo…
Code embedded in documents that enables an organization to id…
Four Components of Protecting Confiden…
1. Identify & Classify Information ... 2. Encryption ... 3. Access…
Information Rights Management (IRM)
Software that offers the capability not only to limited acces…
24 terms
Accounting Information Systems (Chapter 9)
Information Rights Management (IRM)
Data Loss Prevention (DLP)
Digital Watermark
Data Masking
software that offers the capability not only to limit access…
software which works like antivirus programs in reverse, bloc…
code embedded in documents that enables an organization to id…
a program that protects privacy by replacing personal informa…
Information Rights Management (IRM)
software that offers the capability not only to limit access…
Data Loss Prevention (DLP)
software which works like antivirus programs in reverse, bloc…
26 terms
Accounting Information Systems Chapter 9
Four Components of Protecting Confiden…
Information Rights Management (IRM)
Data Loss Prevention (DLP)
Digital Watermark
1. Identify & Classify Information ... 2. Encryption ... 3. Access…
Software that offers the capability not only to limited acces…
Software which works likes antivirus programs in reverse, blo…
Code embedded in documents that enables an organization to id…
Four Components of Protecting Confiden…
1. Identify & Classify Information ... 2. Encryption ... 3. Access…
Information Rights Management (IRM)
Software that offers the capability not only to limited acces…
14 terms
Accounting Information Systems Chapter 9
Assurance
Business Intelligence
Data mart
Data mining
independent, professional opinions that reduce the risk of ha…
A computer based technique for accumulating and analyzing dat…
A subset of the information from the data warehouse to serve…
A process of using sophisticated statistical techniques to ex…
Assurance
independent, professional opinions that reduce the risk of ha…
Business Intelligence
A computer based technique for accumulating and analyzing dat…
24 terms
Accounting Information Systems Chapter 9
Information Rights Management (IRM)
Data Loss Prevention DLP)
Digital Watermark
Data masking
Software that offers capability not only to limit access to s…
Software which works like antivirus programs in reverse, bloc…
Code embedded in documents that enables an organization to id…
A program that protects privacy by replacing customers person…
Information Rights Management (IRM)
Software that offers capability not only to limit access to s…
Data Loss Prevention DLP)
Software which works like antivirus programs in reverse, bloc…
16 terms
Accounting Information Systems Chapter 9
Control Matrix
Exception and Summary Report
Batch Control Plans
Document/Record Counts
tool designed to assist in analyzing the effectiveness of con…
this report reflects the events - either in detail, summary o…
regulate processing by calculating control totals at various…
simple count of the number of documents entered
Control Matrix
tool designed to assist in analyzing the effectiveness of con…
Exception and Summary Report
this report reflects the events - either in detail, summary o…
22 terms
Accounting Information Systems Chapter 9
Human Resources Management/payroll cycle
Purchasing of inventory for training
Knowledge management systems
Knowledge management systems
the recurring set of business activities and related data pro…
which of the following is not a task of the HRM/Payroll cycle…
Software that stores and organizes expertise possessed by ind…
What type of software helps consulting firms keep track of pr…
Human Resources Management/payroll cycle
the recurring set of business activities and related data pro…
Purchasing of inventory for training
which of the following is not a task of the HRM/Payroll cycle…
20 terms
Accounting Information Systems - Chapter 9
1. Identify and classify information t…
Information Rights Management (IRM)
Data Loss Prevention (DLP)
Digital Watermark
Components of Protecting Confidentiality and Privacy
Software that offers the capability not only to limit access…
software which works like antivirus programs in reverse, bloc…
code embedded in documents that enable an organization to ide…
1. Identify and classify information t…
Components of Protecting Confidentiality and Privacy
Information Rights Management (IRM)
Software that offers the capability not only to limit access…
13 terms
Accounting Information Systems: Chapter 9
approved vendor list
attribute rating
blind count
built-up voucher system
list of vendors approved for use by the purchasing function
approach to vendor selection that identifies, lists, and eval…
counters in receiving do not have access to quantities shown…
accumulation of several invoices from the same vendor and the…
approved vendor list
list of vendors approved for use by the purchasing function
attribute rating
approach to vendor selection that identifies, lists, and eval…
24 terms
Accounting Information Systems - Chapter 9
1. Identify and classify information t…
Information Rights Management (IRM)
Data Loss Prevention (DLP)
Digital Watermark
Components of Protecting Confidentiality and Privacy
Software that offers the capability not only to limit access…
software which works like antivirus programs in reverse, bloc…
code embedded in documents that enable an organization to ide…
1. Identify and classify information t…
Components of Protecting Confidentiality and Privacy
Information Rights Management (IRM)
Software that offers the capability not only to limit access…
27 terms
Accounting Information Systems Chapter 9
Four Components of Protecting Confiden…
Information Rights Management (IRM)
Data Loss Prevention (DLP)
Digital Watermark
1. Identify & Classify Information ... 2. Encryption ... 3. Access…
Software that offers the capability not only to limited acces…
Software which works likes antivirus programs in reverse, blo…
Code embedded in documents that enables an organization to id…
Four Components of Protecting Confiden…
1. Identify & Classify Information ... 2. Encryption ... 3. Access…
Information Rights Management (IRM)
Software that offers the capability not only to limited acces…
20 terms
Accounting Information Systems Chapter 9
data modeling
objective of data modeling
entity-relationship (E-R) diagram
entity
Defining a database so that it faithfully represents all key…
To explicitly capture and store data about every business act…
A graphical depiction of a database's contents showing the va…
Anthing about which the organization wants to collect and sto…
data modeling
Defining a database so that it faithfully represents all key…
objective of data modeling
To explicitly capture and store data about every business act…
24 terms
Accounting Information Systems Chapter 9
Information Rights Management (IRM)
Data Loss Prevention (DLP)
Digital Watermark
Data masking
Software that offers capability not only to limit access to s…
Software which works like antivirus programs in reverse, bloc…
Code embedded in documents that enables an organization to id…
A program that protects privacy by replacing customers person…
Information Rights Management (IRM)
Software that offers capability not only to limit access to s…
Data Loss Prevention (DLP)
Software which works like antivirus programs in reverse, bloc…
32 terms
Accounting Information Systems II; Chapter 9
Information system management
Data loss prevention
Digital watermark
Data masking
Software that offers the capability not only to limit access…
Software which works like antivirus programs in reverse, bloc…
Code embedded in documents that enables an organization to id…
A program that protects privacy by replacing personal informa…
Information system management
Software that offers the capability not only to limit access…
Data loss prevention
Software which works like antivirus programs in reverse, bloc…
19 terms
Core Concepts of Accounting Information Systems Chapter 9
internal control
Sect. 404
internal control system
1992 COSO Report
describes the policies, plans and procedures implemented by t…
provision within SOX that reaffirms that management is respon…
consists of the various methods and measures designed into an…
established a common definition of internal control for asses…
internal control
describes the policies, plans and procedures implemented by t…
Sect. 404
provision within SOX that reaffirms that management is respon…
34 terms
Accounting Information Systems II; Chapter 9
Information system management
Data loss prevention
Digital watermark
Data masking
Software that offers the capability not only to limit access…
Software which works like antivirus programs in reverse, bloc…
Code embedded in documents that enables an organization to id…
A program that protects privacy by replacing personal informa…
Information system management
Software that offers the capability not only to limit access…
Data loss prevention
Software which works like antivirus programs in reverse, bloc…
28 terms
Core Concepts of Accounting Information Systems Chapter 9
internal control
Sect. 404
internal control system
1992 COSO Report
describes the policies, plans and procedures implemented by t…
provision within SOX that reaffirms that management is respon…
consists of the various methods and measures designed into an…
established a common definition of internal control for asses…
internal control
describes the policies, plans and procedures implemented by t…
Sect. 404
provision within SOX that reaffirms that management is respon…
83 terms
Accounting Information Systems Chapter 6
Hacking
Hijacking
Botnet
Zombie
Unauthorized access, modification, or use of an electronic de…
Gaining control of someone else's computer to carry out illic…
A network of powerful & dangerous hijacked computers that are…
A hijacked computer, typically part of a botnet, that is used…
Hacking
Unauthorized access, modification, or use of an electronic de…
Hijacking
Gaining control of someone else's computer to carry out illic…
106 terms
Accounting Information Systems Chapter 7
Threat/Event
Exposure/Impact
Likelihood
Internal Controls
Any potential adverse occurrence or unwanted event that could…
The potential dollar loss should a particular threat become a…
The probability that a threat will come to pass
The processes & procedures implemented to provide reasonable…
Threat/Event
Any potential adverse occurrence or unwanted event that could…
Exposure/Impact
The potential dollar loss should a particular threat become a…
24 terms
MTSU Dr. B Accounting Information Systems: Chapter 9 terms
Information Rights Management (IRM)
Data Loss Prevention (DLP)
Digital Watermark
Data Masking
Software that offers the capability not only to limit access…
Software which works like antivirus programs in reverse, bloc…
Code embedded in documents that enables an organization to id…
A program that protects privacy by replacing personal informa…
Information Rights Management (IRM)
Software that offers the capability not only to limit access…
Data Loss Prevention (DLP)
Software which works like antivirus programs in reverse, bloc…
24 terms
Accounting Information Systems Chapter 1
System
Goal conflict
Goal congruence
Data
1. two or more interrealted components that interact to achie…
occures when a subsystem is inconsistent with the goals of an…
achieved when a subsystem achieves its goals while contributi…
facts that are collected, recorded, stored, and processed by…
System
1. two or more interrealted components that interact to achie…
Goal conflict
occures when a subsystem is inconsistent with the goals of an…
17 terms
Accounting Information Systems-Chapter 9-Confidentiality and Privacy Controls
How to Preserve Confidentiality and Pr…
What is the most important confidentia…
What are two major privacy-related con…
Data Masking:
-Identify and Classify Information.... -Encryption.... -Training.... -…
Training.
Spam and Identity Theft.
A program that protects privacy by replacing personal informa…
How to Preserve Confidentiality and Pr…
-Identify and Classify Information.... -Encryption.... -Training.... -…
What is the most important confidentia…
Training.
Information Systems Chapter 9
Global Information Systems
Transborder Data Flow
Multinational Corporation
Multinational Structure
an information system that works across national borders, fac…
restricts what type of data can be captured and transmitted i…
an organization with assets and operations in at least one co…
production, sales, and marketing are decentralized, and finan…
Global Information Systems
an information system that works across national borders, fac…
Transborder Data Flow
restricts what type of data can be captured and transmitted i…
49 terms
Accounting Information Systems Chapter 8
Five Principles that Jointly Contribut…
Security
Confidentiality
Privacy
1. Security ... 2. Confidentiality ... 3. Privacy ... 4. Process Integ…
Access (both physical & logical) to the system & its data is…
Sensitive organizational information (e.g., marketing plans,…
Personal information about customers, employees, suppliers, o…
Five Principles that Jointly Contribut…
1. Security ... 2. Confidentiality ... 3. Privacy ... 4. Process Integ…
Security
Access (both physical & logical) to the system & its data is…
24 terms
MTSU Dr. B Accounting Information Systems: Chapter 9 terms
Information Rights Management (IRM)
Data Loss Prevention (DLP)
Digital Watermark
Data Masking
Software that offers the capability not only to limit access…
Software which works like antivirus programs in reverse, bloc…
Code embedded in documents that enables an organization to id…
A program that protects privacy by replacing personal informa…
Information Rights Management (IRM)
Software that offers the capability not only to limit access…
Data Loss Prevention (DLP)
Software which works like antivirus programs in reverse, bloc…
21 terms
Information Systems Chapter 9
social engineering
dumpster diving
cyberterrorism
cyberterrorist
Using social skills to get computer users to provide informat…
Going through the trash of an organization to find secret or…
Any premeditated politically motivated attack against informa…
Someone who intimidate or coerces a government or organizatio…
social engineering
Using social skills to get computer users to provide informat…
dumpster diving
Going through the trash of an organization to find secret or…
20 terms
Information Systems Chapter 9
AJAX
blog
collaborative consumption
mashup
a web development technique that allows portions of web pages…
a personal web site in which the site creator expresses his o…
peer to peer sharing or renting
web site that takes different content from a number of other…
AJAX
a web development technique that allows portions of web pages…
blog
a personal web site in which the site creator expresses his o…
29 terms
Information Systems Chapter 9
Business intelligence systems
business intelligence
decision support systems
project management, problem solving, d…
information systems that process operational and other data t…
the patters, relationships, and trends identified by BI syste…
another term for business intelligence
4 ways to use business intelligence systems
Business intelligence systems
information systems that process operational and other data t…
business intelligence
the patters, relationships, and trends identified by BI syste…
32 terms
Chapter 9: Controlling Information Systems
Document Design
Written Approvals
Electronic approvals
Preformatted screens
A control plan in which a source document is designed to make…
These take the form of a signature or initials on a document…
whereby business events are routed, using a computer system's…
Control the entry of data by defining the acceptable format o…
Document Design
A control plan in which a source document is designed to make…
Written Approvals
These take the form of a signature or initials on a document…
8 terms
Managing Information Systems Chapter 9
Global Information Systems (GIS)
Global Structure
International Structure
Multinational Corporation (MNC)
an information system that works across national borders, fac…
uses highly centralized information systems. Subsidiaries hav…
An organization with an _____ operates much like a multinatio…
a private organization with assets and operations in at least…
Global Information Systems (GIS)
an information system that works across national borders, fac…
Global Structure
uses highly centralized information systems. Subsidiaries hav…
13 terms
Geographic Information Systems Chapter 9
Web mapping
server
client
bandwidth
Web mapping is an emerging sub-field of both cartography and…
A computer that receives requests from clients and responds o…
A computer that makes requests of servers and processes the d…
The capacity of a computer network to transmit information
Web mapping
Web mapping is an emerging sub-field of both cartography and…
server
A computer that receives requests from clients and responds o…
29 terms
Information Systems: Chapter 9
airline reservation
global product
regionalize operations
foreign, domestic
What system is considered the first large-scale interactive g…
this is a type of product or service that have been standardi…
this refers to manufacturers moving operations to another cou…
Worldwide purchasing gives suppliers the incentive to conside…
airline reservation
What system is considered the first large-scale interactive g…
global product
this is a type of product or service that have been standardi…
22 terms
Information System - Chapter 9
Intellectual Capital (IC)
Human Capital
Social Capital
Structural Capital
All the intangible assets and resources of an enterprise that…
The competencies and knowledge possessed by the organization'…
The number and quality of all the relationships an organizati…
The knowledge stored as documentation, often electronically,…
Intellectual Capital (IC)
All the intangible assets and resources of an enterprise that…
Human Capital
The competencies and knowledge possessed by the organization'…
57 terms
Chapter 9: The Role of Accountants and Accounting Information
Accounting (accountancy)
Accounting Equation
Accounting Information System (AIS)
Accounts Payable
comprehensive system for collecting, analyzing, and communica…
Assets=Liabilities+Owner's Equity; used by accountants to bal…
organized procedure for identifying, measuring, recording, an…
current liability consisting of bills owed to suppliers, plus…
Accounting (accountancy)
comprehensive system for collecting, analyzing, and communica…
Accounting Equation
Assets=Liabilities+Owner's Equity; used by accountants to bal…
9 terms
Accounting Information Systems Ch 9
From the viewpoint of the customer, wh…
What risks, if any, does offshore outs…
Upon your request (with proper verific…
What privacy concerns might rise from…
For the consumer, opt-out represents many disadvantages becau…
Data security and data protection are rated in the top ten ri…
Upon request, organizations should be required to delete pers…
Many people may view view biometric authentication as invasiv…
From the viewpoint of the customer, wh…
For the consumer, opt-out represents many disadvantages becau…
What risks, if any, does offshore outs…
Data security and data protection are rated in the top ten ri…
28 terms
Information Systems (Chapter 9)
internal control
Sect. 404
internal control system
1992 COSO Report
describes the policies, plans and procedures implemented by t…
provision within SOX that reaffirms that management is respon…
consists of the various methods and measures designed into an…
established a common definition of internal control for asses…
internal control
describes the policies, plans and procedures implemented by t…
Sect. 404
provision within SOX that reaffirms that management is respon…
29 terms
Information Systems Chapter 9
Accessibility
Accuracy
Children's Internet Protection Act of…
Clickstream data
refers to who has access the information systems and the data…
When data is what it is supposed to be. It does not include e…
law that regulates access to offensive content over the Inter…
tracking of online browsing behaviors
Accessibility
refers to who has access the information systems and the data…
Accuracy
When data is what it is supposed to be. It does not include e…
74 terms
Information Systems - Chapter 9
Web. 2.0 is a loose collection of info…
Web 2.0 sites are primarily online pla…
A tag is the way a developer describes…
Geo-tagging refers to tagging informat…
True
False
False
False
Web. 2.0 is a loose collection of info…
True
Web 2.0 sites are primarily online pla…
False
23 terms
Information Systems- Chapter 9
Intellectual Capital (IC)
Human capital
Social capital
Structural capital
All the intangible assets and resources of an enterprise that…
The competencies and knowledge possessed by the organization'…
The number and quality of all the relationships an organizati…
The knowledge stored as documentation, often electronically,…
Intellectual Capital (IC)
All the intangible assets and resources of an enterprise that…
Human capital
The competencies and knowledge possessed by the organization'…
27 terms
Information Systems Chapter 9
Adware
B2B
B2C
Broadband
Software that routinely displays advertising to a computer sy…
Business-to-business refers to businesses distributing, buyin…
Business-to-consumer can be described as when commercial orga…
High data-transmission rate Internet connection
Adware
Software that routinely displays advertising to a computer sy…
B2B
Business-to-business refers to businesses distributing, buyin…
22 terms
Introduction to Information Systems (Rainer/Prince) Chapter 9
Blog (weblog)
Blogosphere
Collaborative Consumption
Mashup
A personal web site, open to the public, in which the site cr…
The term for the millions of blogs on the web
Peer-to-peer sharing or renting
Web site that takes different content from a number of other…
Blog (weblog)
A personal web site, open to the public, in which the site cr…
Blogosphere
The term for the millions of blogs on the web
70 terms
Accounting Information Systems Chapter 7
Threat or Event
Exposure or Impact
Likelihood
Internal Controls
Any potential adverse occurrence or unwanted event that could…
The potential dollar loss should a particular threat become a…
The probability that a threat will come to pass.
The processes and procedures implemented to provide reasonabl…
Threat or Event
Any potential adverse occurrence or unwanted event that could…
Exposure or Impact
The potential dollar loss should a particular threat become a…
42 terms
Accounting Information Systems Chapter 8
Five Principles that Jointly Contribut…
Security
Confidentiality
Privacy
1. Security ... 2. Confidentiality ... 3. Privacy ... 4. Process Integ…
Access (both physical & logical) to the system & its data is…
Sensitive organizational information (e.g., marketing plans,…
Personal information about customers, employees, suppliers, o…
Five Principles that Jointly Contribut…
1. Security ... 2. Confidentiality ... 3. Privacy ... 4. Process Integ…
Security
Access (both physical & logical) to the system & its data is…
25 terms
Accounting Information Systems Chapter 10
Turnaround Document
Header Record
Trailer Record
Transposition Error
a record of company data sent to an external party and then r…
type of internal label that appears at the beginning of each…
type of internal label that appears at the end of a file; in…
an error that results when numbers in 2 adjacent columns are…
Turnaround Document
a record of company data sent to an external party and then r…
Header Record
type of internal label that appears at the beginning of each…
18 terms
Management Information Systems Chapter 9
enterprise software
supply chain
just-in-time
bull whip effect
set of integrated modules for applications such as sales and…
network of organizations and business processes for procuring…
scheduling system for minimizing inventory by having componen…
distortion of information about the demand for a product as i…
enterprise software
set of integrated modules for applications such as sales and…
supply chain
network of organizations and business processes for procuring…
38 terms
management information system in the information age ,chapter 9
internet . under it 4 elements
Personal software-as-a-service (SaaS)
Push technology
F2b2C, Factory-to-business-to-Consumer
1) SaaS... 2- push, not pull... 3) F2b2C... 4) VOIP
delivery model for personal productivity software in which yo…
environment in which businesses come to you with information,…
a consumer communicates through a business on the Internet an…
internet . under it 4 elements
1) SaaS... 2- push, not pull... 3) F2b2C... 4) VOIP
Personal software-as-a-service (SaaS)
delivery model for personal productivity software in which yo…
24 terms
Chapter 9 Clinical Information Systems
Anesthesia information system
Annotation
Backscanning
Barcode
collects information on preoperative, operative, and postoper…
is the ability to alter an image in some way
the process of scanning past medical records into the system…
used to index documents scanned within a document management…
Anesthesia information system
collects information on preoperative, operative, and postoper…
Annotation
is the ability to alter an image in some way
39 terms
Accounting Information Systems Chapter 2
Data Processing Cycle
Source Documents
Turnaround Document
Four Parts of the Data Processing Cycle
The four operations (data input, data storage, data processin…
Documents used to capture transaction data at its source- whe…
Records of company data sent to an external party & then retu…
1. Data Input ... 2. Data Storage ... 3. Data Processing ... 4. Inform…
Data Processing Cycle
The four operations (data input, data storage, data processin…
Source Documents
Documents used to capture transaction data at its source- whe…
1 of 10