ch02 - Chapter 2: Computer Operations STRUCTURING THE IT...

Info iconThis preview shows pages 1–11. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 2: Computer Operations
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 STRUCTURING THE IT FUNCTION Centralized data processing [see Figure 2-1] Organizational chart [see Figure 2-2] Database administrator Data processing manager/dept. Data control Data preparation/conversion Computer operations Data library
Background image of page 2
3 Segregation of incompatible IT functions Participants End users IS professionals Auditors Other stakeholders STRUCTURING THE IT FUNCTION
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4 Segregation of incompatible IT functions Objectives: Segregate transaction authorization from transaction processing Segregate record keeping from asset custody Divide transaction processing steps among individuals to force collusion to perpetrate fraud STRUCTURING THE IT FUNCTION
Background image of page 4
5 Segregation of incompatible IT functions Separating systems development from computer operations [see Figure 2-2] STRUCTURING THE IT FUNCTION
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6 Segregation of incompatible IT functions Separating DBA from other functions DBA is responsible for several critical tasks: Database security Creating database schema and user views Assigning database access authority to users Monitoring database usage Planning for future changes STRUCTURING THE IT FUNCTION
Background image of page 6
7 STRUCTURING THE IT FUNCTION Segregation of incompatible IT functions Alternative 1: segregate systems analysis from programming [see Figure 2-3] Two types of control problems from this approach: Inadequate documentation Is a chronic problem. Why? Not interesting Lack of documentation provides job security Assistance : Use of CASE tools Potential for fraud Example: Salami slicing, trap doors
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
8 Segregation of incompatible IT functions Alternative 2: segregate systems development from maintenance [see Figure 2-2] Two types of improvements from this approach: 1. Better documentation standards Necessary for transfer of responsibility 2. Deters fraud Possibility of being discovered STRUCTURING THE IT FUNCTION
Background image of page 8
9 Segregation of incompatible IT functions Segregate data library from operations Physical security of off-line data files Implications of modern systems on use of data library: Real-time/online vs. batch processing Volume of tape files is insufficient to justify full-time librarian Alternative: rotate on ad hoc basis Custody of on site data backups Custody of original commercial software and licenses STRUCTURING THE IT FUNCTION
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
10 Segregation of incompatible IT functions
Background image of page 10
Image of page 11
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/04/2011 for the course ACCT 5230 taught by Professor Szendi during the Spring '10 term at Kean.

Page1 / 45

ch02 - Chapter 2: Computer Operations STRUCTURING THE IT...

This preview shows document pages 1 - 11. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online