Preface |
|
xix | |
Part I Conceptual Foundations of Accounting Information Systems |
|
1 | (124) |
|
Chapter 1 Accounting Information Systems: An Overview |
|
|
2 | (22) |
|
|
3 | (1) |
|
Information Needs and Business Processes |
|
|
4 | (6) |
|
|
5 | (1) |
|
|
6 | (4) |
|
Accounting Information Systems |
|
|
10 | (5) |
|
How an AIS Can Add Value to an Organization |
|
|
11 | (2) |
|
The AIS and Corporate Strategy |
|
|
13 | (1) |
|
The Role of the AIS in the Value Chain |
|
|
13 | (2) |
|
Summary and Case Conclusion |
|
|
15 | (1) |
|
|
16 | (1) |
|
AIS In Action: Chapter Quiz |
|
|
16 | (1) |
|
|
17 | (1) |
|
|
18 | (3) |
|
Case 1-1 Ackoff's Management Misinformation Systems |
|
|
21 | (1) |
|
AIS In Action Solutions: Quiz Key |
|
|
22 | (2) |
|
Chapter 2 Overview of Transaction Processing and Enterprise Resource Planning Systems |
|
|
24 | (26) |
|
|
25 | (1) |
|
Transaction Processing: The Data Processing Cycle |
|
|
26 | (9) |
|
|
26 | (1) |
|
|
27 | (6) |
|
|
33 | (1) |
|
|
33 | (2) |
|
Enterprise Resource Planning (ERP) Systems |
|
|
35 | (3) |
|
Summary and Case Conclusion |
|
|
38 | (1) |
|
|
38 | (1) |
|
AIS In Action: Chapter Quiz |
|
|
38 | (1) |
|
|
39 | (1) |
|
|
40 | (6) |
|
Case 2-1 Bar Harbor Blueberry Farm |
|
|
46 | (1) |
|
AIS In Action Solutions: Quiz Key |
|
|
47 | (3) |
|
Chapter 3 Systems Documentation Techniques |
|
|
50 | (34) |
|
|
51 | (1) |
|
|
52 | (6) |
|
|
54 | (4) |
|
|
58 | (5) |
|
|
58 | (5) |
|
|
63 | (1) |
|
Business Process Diagrams |
|
|
63 | (2) |
|
Summary and Case Conclusion |
|
|
65 | (1) |
|
|
66 | (1) |
|
AIS In Action: Chapter Quiz |
|
|
66 | (1) |
|
|
67 | (1) |
|
|
67 | (1) |
|
|
68 | (7) |
|
|
75 | (1) |
|
AIS In Action Solutions: Quiz Key |
|
|
76 | (2) |
|
Comprehensive Problem Solution |
|
|
78 | (6) |
|
Chapter 4 Relational Databases |
|
|
84 | (41) |
|
|
84 | (1) |
|
|
85 | (3) |
|
Using Data Warehouses for Business Intelligence |
|
|
86 | (1) |
|
The Advantages of Database Systems |
|
|
87 | (1) |
|
The Importance of Good Data |
|
|
87 | (1) |
|
|
88 | (2) |
|
Logical and Physical Views of Data |
|
|
88 | (1) |
|
|
88 | (2) |
|
|
90 | (1) |
|
|
90 | (1) |
|
|
90 | (13) |
|
|
90 | (2) |
|
Designing a Relational Database for S&S, Inc. |
|
|
92 | (2) |
|
Basic Requirements of a Relational Database |
|
|
94 | (1) |
|
Two Approaches to Database Design |
|
|
95 | (1) |
|
Creating Relational Database Queries |
|
|
95 | (2) |
|
|
97 | (2) |
|
|
99 | (1) |
|
|
100 | (1) |
|
|
100 | (2) |
|
|
102 | (1) |
|
Database Systems and the Future of Accounting |
|
|
102 | (1) |
|
Summary and Case Conclusion |
|
|
103 | (1) |
|
|
104 | (1) |
|
AIS In Action: Chapter Quiz |
|
|
104 | (1) |
|
|
105 | (1) |
|
|
106 | (1) |
|
|
106 | (7) |
|
Case 4-1 Research Project |
|
|
113 | (1) |
|
AIS In Action Solutions: Quiz Key |
|
|
114 | (1) |
|
Comprehensive Problem Solution |
|
|
115 | (3) |
|
Appendix: Data Normalization |
|
|
118 | (3) |
|
|
121 | (1) |
|
Second Normalization Example |
|
|
121 | (4) |
Part II Control and Audit of Accounting Information Systems |
|
125 | (226) |
|
|
126 | (30) |
|
|
127 | (1) |
|
|
128 | (2) |
|
|
130 | (3) |
|
Misappropriation of Assets |
|
|
131 | (1) |
|
Fraudulent Financial Reporting |
|
|
132 | (1) |
|
SAS No. 99 (AU-C Section 240): The Auditor's Responsibility to Detect Fraud |
|
|
133 | (1) |
|
Who Perpetrates Fraud and Why |
|
|
133 | (5) |
|
|
134 | (4) |
|
|
138 | (4) |
|
The Rise in Computer Fraud |
|
|
138 | (2) |
|
Computer Fraud Classifications |
|
|
140 | (2) |
|
Preventing and Detecting Fraud and Abuse |
|
|
142 | (1) |
|
Summary and Case Conclusion |
|
|
143 | (1) |
|
|
144 | (1) |
|
AIS In Action: Chapter Quiz |
|
|
144 | (1) |
|
|
145 | (1) |
|
|
146 | (4) |
|
Case 5-1 David L Miller: Portrait of a White-Collar Criminal |
|
|
150 | (2) |
|
Case 5-2 Heirloom Photo Plans |
|
|
152 | (1) |
|
AIS In Action Solutions: Quiz Key |
|
|
153 | (3) |
|
Chapter 6 Computer Fraud and Abuse Techniques |
|
|
156 | (40) |
|
|
156 | (1) |
|
Computer Attacks and Abuse |
|
|
157 | (8) |
|
|
165 | (5) |
|
|
170 | (9) |
|
Summary and Case Conclusion |
|
|
179 | (1) |
|
|
180 | (1) |
|
AIS In Action: Chapter Quiz |
|
|
181 | (1) |
|
|
182 | (1) |
|
|
182 | (10) |
|
|
192 | (1) |
|
AIS In Action Solutions: Quiz Key |
|
|
193 | (3) |
|
Chapter 7 Control and Accounting Information Systems |
|
|
196 | (40) |
|
|
197 | (1) |
|
Why Threats to Accounting Information Systems are Increasing |
|
|
197 | (1) |
|
Overview of Control Concepts |
|
|
198 | (2) |
|
The Foreign Corrupt Practices and Sarbanes-Oxley Acts |
|
|
199 | (1) |
|
|
200 | (4) |
|
|
200 | (2) |
|
COSO'S Internal Control Framework |
|
|
202 | (1) |
|
COSO'S Enterprise Risk Management Framework |
|
|
202 | (2) |
|
The Enterprise Risk Management Framework Versus the Internal Control Framework |
|
|
204 | (1) |
|
|
204 | (4) |
|
Management's Philosophy, Operating Style, and Risk Appetite |
|
|
205 | (1) |
|
Commitment to Integrity, Ethical Values, and Competence |
|
|
205 | (1) |
|
Internal Control Oversight by the Board of Directors |
|
|
206 | (1) |
|
|
206 | (1) |
|
Methods of Assigning Authority and Responsibility |
|
|
206 | (1) |
|
Human Resources Standards that Attract, Develop, and Retain Competent Individuals |
|
|
206 | (2) |
|
|
208 | (1) |
|
Objective Setting and Event Identification |
|
|
208 | (1) |
|
|
208 | (1) |
|
|
209 | (1) |
|
Risk Assessment and Risk Response |
|
|
209 | (3) |
|
Estimate Likelihood and Impact |
|
|
210 | (1) |
|
|
211 | (1) |
|
Estimate Costs and Benefits |
|
|
211 | (1) |
|
Determine Cost/Benefit Effectiveness |
|
|
211 | (1) |
|
Implement Control or Accept, Share, or Avoid the Risk |
|
|
211 | (1) |
|
|
212 | (6) |
|
Proper Authorization of Transactions and Activities |
|
|
212 | (1) |
|
|
213 | (2) |
|
Project Development and Acquisition Controls |
|
|
215 | (1) |
|
Change Management Controls |
|
|
216 | (1) |
|
Design and Use of Documents and Records |
|
|
216 | (1) |
|
Safeguard Assets, Records, and Data |
|
|
216 | (1) |
|
Independent Checks on Performance |
|
|
217 | (1) |
|
Communicate Information and Monitor Control Processes |
|
|
218 | (3) |
|
Information and Communication |
|
|
218 | (1) |
|
|
218 | (3) |
|
Summary and Case Conclusion |
|
|
221 | (1) |
|
|
222 | (1) |
|
AIS In Action: Chapter Quiz |
|
|
222 | (2) |
|
|
224 | (1) |
|
|
224 | (8) |
|
Case 7-1 The Greater Providence Deposit & Trust Embezzlement |
|
|
232 | (1) |
|
AIS In Action Solutions: Quiz Key |
|
|
233 | (3) |
|
Chapter 8 Controls for Information Security |
|
|
236 | (34) |
|
|
237 | (1) |
|
Two Fundamental Information Security Concepts |
|
|
238 | (2) |
|
Security Is a Management Issue, Not Just a Technology Issue |
|
|
238 | (1) |
|
The Time-Based Model of Information Security |
|
|
239 | (1) |
|
Understanding Targeted Attacks |
|
|
240 | (1) |
|
Protecting Information Resources |
|
|
241 | (14) |
|
People: Creation of a "Security-Conscious' Culture |
|
|
242 | (1) |
|
|
242 | (1) |
|
Process: User Access Controls |
|
|
243 | (3) |
|
Process: Penetration Testing |
|
|
246 | (1) |
|
Process: Change Controls and Change Management |
|
|
247 | (1) |
|
IT Solutions: Antimalware Controls |
|
|
247 | (1) |
|
IT Solutions: Network Access Controls |
|
|
247 | (4) |
|
IT Solutions: Device and Software Hardening Controls |
|
|
251 | (3) |
|
|
254 | (1) |
|
Physical Security: Access Controls |
|
|
254 | (1) |
|
|
255 | (2) |
|
|
255 | (1) |
|
Intrusion Detection Systems |
|
|
256 | (1) |
|
|
256 | (1) |
|
|
257 | (1) |
|
Computer Incident Response Team (CIRT) |
|
|
257 | (1) |
|
Chief Information Security Officer (CISO) |
|
|
257 | (1) |
|
Security Implications of Virtualization, Cloud Computing, and the Internet of Things |
|
|
258 | (1) |
|
Summary and Case Conclusion |
|
|
259 | (1) |
|
|
260 | (1) |
|
AIS In Action: Chapter Quiz |
|
|
260 | (1) |
|
|
261 | (1) |
|
|
262 | (4) |
|
Case 8-1 Assessing Change Control and Change Management |
|
|
266 | (1) |
|
Case 8-2 Research Project |
|
|
267 | (1) |
|
AIS In Action Solutions: Quiz Key |
|
|
267 | (3) |
|
Chapter 9 Confidentiality and Privacy Controls |
|
|
270 | (26) |
|
|
271 | (1) |
|
Preserving Confidentiality |
|
|
271 | (3) |
|
Identify and Classify Information to Be Protected |
|
|
272 | (1) |
|
Protecting Confidentiality with Encryption |
|
|
272 | (1) |
|
Controlling Access to Sensitive Information |
|
|
272 | (2) |
|
|
274 | (1) |
|
|
274 | (4) |
|
|
274 | (1) |
|
|
275 | (2) |
|
Privacy Regulations and Generally Accepted Privacy Principles |
|
|
277 | (1) |
|
|
278 | (7) |
|
Factors That Influence Encryption Strength |
|
|
279 | (1) |
|
Types of Encryption Systems |
|
|
280 | (2) |
|
|
282 | (1) |
|
|
282 | (2) |
|
Digital Certificates and Public Key Infrastructure |
|
|
284 | (1) |
|
Virtual Private Networks (VPNS) |
|
|
285 | (1) |
|
Summary and Case Conclusion |
|
|
285 | (1) |
|
|
286 | (1) |
|
AIS In Action: Chapter Quiz |
|
|
286 | (2) |
|
|
288 | (1) |
|
|
288 | (4) |
|
Case 9-1 Protecting Privacy of Tax Returns |
|
|
292 | (1) |
|
Case 9-2 Generally Accepted Privacy Principles |
|
|
293 | (1) |
|
AIS In Action Solutions: Quiz Key |
|
|
293 | (3) |
|
Chapter 10 Processing Integrity and Availability Controls |
|
|
296 | (26) |
|
|
296 | (1) |
|
|
297 | (6) |
|
|
297 | (2) |
|
|
299 | (1) |
|
|
300 | (1) |
|
Illustrative Example: Credit Sales Processing |
|
|
301 | (1) |
|
Processing Integrity Controls in Spreadsheets |
|
|
302 | (1) |
|
|
303 | (5) |
|
Minimizing Risk of System Downtime |
|
|
303 | (1) |
|
Recovery and Resumption of Normal Operations |
|
|
304 | (4) |
|
Summary and Case Conclusion |
|
|
308 | (1) |
|
|
309 | (1) |
|
AIS In Action: Chapter Quiz |
|
|
309 | (1) |
|
|
310 | (1) |
|
|
311 | (7) |
|
Case 10-1 Ensuring Systems Availability |
|
|
318 | (1) |
|
Case 10-2 Ensuring Process Integrity in Spreadsheets |
|
|
319 | (1) |
|
AIS In Action Solutions: Quiz Key |
|
|
320 | (2) |
|
Chapter 11 Auditing Computer-Based Information Systems |
|
|
322 | (29) |
|
|
323 | (1) |
|
|
324 | (3) |
|
Overview of the Audit Process |
|
|
324 | (2) |
|
The Risk-Based Audit Approach |
|
|
326 | (1) |
|
Information Systems Audits |
|
|
327 | (9) |
|
Objective 1: Overall Security |
|
|
327 | (2) |
|
Objective 2: Program Development and Acquisition |
|
|
329 | (1) |
|
Objective 3: Program Modification |
|
|
330 | (1) |
|
Objective 4: Computer Processing |
|
|
331 | (3) |
|
|
334 | (1) |
|
|
335 | (1) |
|
|
336 | (2) |
|
Operational Audits of an AIS |
|
|
338 | (1) |
|
Summary and Case Conclusion |
|
|
338 | (1) |
|
|
339 | (1) |
|
AIS In Action: Chapter Quiz |
|
|
339 | (1) |
|
|
340 | (1) |
|
|
341 | (7) |
|
Case 11-1 Preston Manufacturing |
|
|
348 | (1) |
|
AIS In Action Solutions: Quiz Key |
|
|
348 | (3) |
Part III Accounting Information Systems Applications |
|
351 | (174) |
|
Chapter 12 The Revenue Cycle: Sales to Cash Collections |
|
|
352 | (42) |
|
|
354 | (2) |
|
Revenue Cycle Information System |
|
|
356 | (3) |
|
|
356 | (1) |
|
|
356 | (3) |
|
|
359 | (7) |
|
|
359 | (3) |
|
|
362 | (2) |
|
Checking Inventory Availability |
|
|
364 | (1) |
|
Responding to Customer Inquiries |
|
|
365 | (1) |
|
|
366 | (5) |
|
|
367 | (1) |
|
|
368 | (3) |
|
|
371 | (6) |
|
|
371 | (2) |
|
Maintain Accounts Receivable |
|
|
373 | (4) |
|
|
377 | (3) |
|
|
377 | (1) |
|
|
378 | (2) |
|
Summary and Case Conclusion |
|
|
380 | (1) |
|
|
381 | (1) |
|
AIS In Action: Chapter Quiz |
|
|
381 | (1) |
|
|
382 | (1) |
|
|
382 | (9) |
|
Case 12-1 Research Project: How CPA Firms Are Leveraging New Developments in IT |
|
|
391 | (1) |
|
AIS In Action Solutions: Quiz Key |
|
|
391 | (3) |
|
Chapter 13 The Expenditure Cycle: Purchasing to Cash Disbursements |
|
|
394 | (38) |
|
|
395 | (1) |
|
Expenditure Cycle Information System |
|
|
396 | (6) |
|
|
396 | (3) |
|
|
399 | (3) |
|
Ordering Materials, Supplies, and Services |
|
|
402 | (7) |
|
Identifying What, When, and How Much to Purchase |
|
|
402 | (3) |
|
|
405 | (4) |
|
|
409 | (2) |
|
|
409 | (1) |
|
|
410 | (1) |
|
Approving Supplier Invoices |
|
|
411 | (4) |
|
|
411 | (2) |
|
|
413 | (2) |
|
|
415 | (2) |
|
|
415 | (1) |
|
|
415 | (2) |
|
Summary and Case Conclusion |
|
|
417 | (1) |
|
|
418 | (1) |
|
AIS In Action: Chapter Quiz |
|
|
418 | (1) |
|
|
419 | (1) |
|
|
420 | (9) |
|
Case 13-1 Research Project: Impact of Information Technology on Expenditure Cycle Activities, Threats, and Controls |
|
|
429 | (1) |
|
AIS In Action Solutions: Quiz Key |
|
|
429 | (3) |
|
Chapter 14 The Production Cycle |
|
|
432 | (30) |
|
|
433 | (2) |
|
Production Cycle Information System |
|
|
435 | (2) |
|
|
436 | (1) |
|
|
436 | (1) |
|
|
437 | (2) |
|
|
437 | (2) |
|
|
439 | (1) |
|
|
439 | (5) |
|
Production Planning Methods |
|
|
439 | (1) |
|
|
439 | (4) |
|
|
443 | (1) |
|
|
444 | (2) |
|
|
444 | (2) |
|
|
446 | (6) |
|
|
446 | (1) |
|
|
447 | (5) |
|
Summary and Case Conclusion |
|
|
452 | (1) |
|
|
453 | (1) |
|
AIS In Action: Chapter Quiz |
|
|
453 | (1) |
|
|
454 | (1) |
|
|
455 | (4) |
|
Case 14-1 The Accountant and CIM |
|
|
459 | (1) |
|
AIS In Action Solutions: Quiz Key |
|
|
459 | (3) |
|
Chapter 15 The Human Resources Management and Payroll Cycle |
|
|
462 | (30) |
|
|
463 | (1) |
|
HRM/Payroll Cycle Information System |
|
|
464 | (5) |
|
Overview of HRM Process and Information Needs |
|
|
464 | (2) |
|
|
466 | (3) |
|
|
469 | (10) |
|
Update Payroll Master Database |
|
|
470 | (1) |
|
Validate Time and Attendance Data |
|
|
471 | (3) |
|
|
474 | (3) |
|
|
477 | (2) |
|
Calculate and Disburse Employer-Paid Benefits, Taxes, and Voluntary Employee Deductions |
|
|
479 | (1) |
|
Outsourcing Options: Payroll Service Bureaus and Professional Employer Organizations |
|
|
479 | (1) |
|
Summary and Case Conclusion |
|
|
480 | (1) |
|
|
481 | (1) |
|
AIS In Action: Chapter Quiz |
|
|
481 | (1) |
|
|
482 | (1) |
|
|
483 | (6) |
|
Case 15-1 Research Report: HRM/Payroll Opportunities for CPAs |
|
|
489 | (1) |
|
AIS In Action Solutions: Quiz Key |
|
|
489 | (3) |
|
Chapter 16 General Ledger and Reporting System |
|
|
492 | (33) |
|
|
493 | (1) |
|
General Ledger and Reporting System |
|
|
494 | (3) |
|
|
495 | (1) |
|
|
495 | (2) |
|
|
497 | (4) |
|
|
497 | (1) |
|
|
497 | (4) |
|
|
501 | (1) |
|
|
501 | (1) |
|
|
502 | (1) |
|
Prepare Financial Statements |
|
|
502 | (6) |
|
|
502 | (5) |
|
|
507 | (1) |
|
Produce Managerial Reports |
|
|
508 | (5) |
|
|
508 | (1) |
|
|
508 | (5) |
|
Summary and Case Conclusion |
|
|
513 | (1) |
|
|
514 | (1) |
|
AIS In Action: Chapter Quiz |
|
|
514 | (1) |
|
|
515 | (1) |
|
|
515 | (5) |
|
Case 16-1 Exploring XBRL Tools |
|
|
520 | (1) |
|
Case 16-2 Evaluating a General Ledger Package |
|
|
521 | (1) |
|
Case 16-3 Visualization Tools for Big Data |
|
|
521 | (1) |
|
AIS In Action Solutions: Quiz Key |
|
|
521 | (4) |
Part IV The REA Data Model |
|
525 | (92) |
|
Chapter 17 Database Design Using the REA Data Model |
|
|
526 | (34) |
|
|
526 | (1) |
|
|
527 | (1) |
|
Entity-Relationship Diagrams |
|
|
528 | (1) |
|
|
529 | (4) |
|
Three Basic Types of Entities |
|
|
530 | (1) |
|
Structuring Relationships: The Basic REA Template |
|
|
530 | (3) |
|
Developing an REA Diagram |
|
|
533 | (7) |
|
Step 1: Identify Relevant Events |
|
|
533 | (2) |
|
Step 2: Identify Resources and Agents |
|
|
535 | (1) |
|
Step 3: Determine Cardinalities of Relationships |
|
|
536 | (4) |
|
What an REA Diagram Reveals About an Organization |
|
|
540 | (2) |
|
Business Meaning of Cardinalities |
|
|
540 | (1) |
|
Uniqueness of REA Diagrams |
|
|
541 | (1) |
|
Summary and Case Conclusion |
|
|
542 | (1) |
|
|
543 | (1) |
|
AIS In Action: Chapter Quiz |
|
|
543 | (3) |
|
|
546 | (1) |
|
|
546 | (1) |
|
|
547 | (4) |
|
Case 17-1 REA Data Modeling Extension |
|
|
551 | (1) |
|
AIS In Action Solutions: Quiz Key |
|
|
552 | (4) |
|
Comprehensive Problem Solution |
|
|
556 | (4) |
|
Chapter 18 Implementing an REA Model in a Relational Database |
|
|
560 | (24) |
|
|
561 | (1) |
|
Integrating REA Diagrams Across Cycles |
|
|
561 | (5) |
|
Merging Redundant Resource Entities |
|
|
564 | (1) |
|
Merging Redundant Event Entities |
|
|
565 | (1) |
|
Validating the Accuracy of Integrated REA Diagrams |
|
|
566 | (1) |
|
Implementing an REA Diagram in a Relational Database |
|
|
566 | (5) |
|
Step 1: Create Tables for Each Distinct Entity and M:N Relationship |
|
|
566 | (2) |
|
Step 2: Assign Attributes to Each Table |
|
|
568 | (1) |
|
Step 3: Use Foreign Keys to Implement 1:1 and 1:N Relationships |
|
|
569 | (1) |
|
|
570 | (1) |
|
Using REA Diagrams to Retrieve Information from a Database |
|
|
571 | (2) |
|
Creating Journals and Ledgers |
|
|
571 | (1) |
|
Generating Financial Statements |
|
|
572 | (1) |
|
Creating Managerial Reports |
|
|
573 | (1) |
|
Summary and Case Conclusion |
|
|
573 | (1) |
|
|
574 | (1) |
|
AIS In Action: Chapter Quiz |
|
|
574 | (1) |
|
|
575 | (1) |
|
|
575 | (1) |
|
|
576 | (2) |
|
Case 18-1 Practical Database Design |
|
|
578 | (1) |
|
AIS In Action Solutions: Quiz Key |
|
|
579 | (2) |
|
Comprehensive Problem Solution |
|
|
581 | (3) |
|
Chapter 19 Special Topics in REA Modeling |
|
|
584 | (33) |
|
|
585 | (1) |
|
Additional Revenue and Expenditure Cycle Modeling Topics |
|
|
585 | (8) |
|
Additional Revenue Cycle Events and Attribute Placement |
|
|
585 | (2) |
|
Additional Expenditure Cycle Events and Attribute Placement |
|
|
587 | (3) |
|
|
590 | (1) |
|
Acquisition of Intangible Services |
|
|
590 | (1) |
|
|
591 | (1) |
|
|
591 | (2) |
|
|
593 | (1) |
|
|
593 | (1) |
|
M:N Agent-Event Relationships |
|
|
593 | (1) |
|
|
593 | (1) |
|
Relationships Between Resources and Agents |
|
|
593 | (1) |
|
Production Cycle REA Model |
|
|
594 | (1) |
|
Additional Entities-Intellectual Property |
|
|
594 | (3) |
|
|
596 | (1) |
|
|
596 | (1) |
|
Combined HR/Payroll Data Model |
|
|
597 | (2) |
|
|
597 | (1) |
|
|
598 | (1) |
|
Financing Activities Data Model |
|
|
599 | (1) |
|
Summary and Case Conclusion |
|
|
600 | (3) |
|
AIS In Action: Chapter Quiz |
|
|
603 | (1) |
|
|
604 | (1) |
|
|
605 | (5) |
|
Case 19-1 Practical Database Assignment |
|
|
610 | (1) |
|
AIS In Action Solutions: Quiz Key |
|
|
610 | (4) |
|
Appendix: Extending the REA Model to Include Information About Policies |
|
|
614 | (3) |
Part V The Systems Development Process |
|
617 | (91) |
|
Chapter 20 Introduction to Systems Development and Systems Analysis |
|
|
618 | (36) |
|
|
619 | (2) |
|
|
621 | (2) |
|
The Systems Development Life Cycle |
|
|
621 | (1) |
|
|
622 | (1) |
|
Planning Systems Development |
|
|
623 | (2) |
|
|
623 | (2) |
|
|
625 | (3) |
|
Capital Budgeting: Calculating Economic Feasibility |
|
|
626 | (2) |
|
Behavioral Aspects of Change |
|
|
628 | (2) |
|
Why Behavioral Problems Occur |
|
|
628 | (1) |
|
|
628 | (1) |
|
Preventing Behavioral Problems |
|
|
629 | (1) |
|
|
630 | (6) |
|
|
630 | (1) |
|
|
631 | (2) |
|
|
633 | (1) |
|
Information Needs and Systems Requirements |
|
|
633 | (2) |
|
|
635 | (1) |
|
Summary and Case Conclusion |
|
|
636 | (1) |
|
|
637 | (1) |
|
AIS In Action: Chapter Quiz |
|
|
638 | (1) |
|
|
639 | (1) |
|
|
639 | (1) |
|
|
640 | (8) |
|
Case 20-1 Audio Visual Corporation |
|
|
648 | (1) |
|
AIS In Action Solutions: Quiz Key |
|
|
649 | (3) |
|
Comprehensive Problem Solution |
|
|
652 | (2) |
|
Chapter 21 AIS Development Strategies |
|
|
654 | (28) |
|
|
655 | (1) |
|
|
655 | (4) |
|
|
656 | (1) |
|
Acquiring Hardware and Software |
|
|
656 | (1) |
|
Evaluating Proposals and Selecting a System |
|
|
657 | (2) |
|
Development by In-House Information Systems Departments |
|
|
659 | (3) |
|
End-User-Developed Software |
|
|
659 | (1) |
|
Advantages and Disadvantages of End-User Computing |
|
|
660 | (1) |
|
Managing and Controlling End-User Computing |
|
|
661 | (1) |
|
|
662 | (1) |
|
Advantages and Disadvantages of Outsourcing |
|
|
662 | (1) |
|
Methods for Improving Systems Development |
|
|
663 | (8) |
|
Business Process Management |
|
|
664 | (1) |
|
|
665 | (2) |
|
|
667 | (3) |
|
Computer-Aided Software Engineering |
|
|
670 | (1) |
|
Summary and Case Conclusion |
|
|
671 | (1) |
|
|
671 | (1) |
|
AIS In Action: Chapter Quiz |
|
|
672 | (1) |
|
Comprehensive Problem Freedom from Telemarketers-the Do Not Call List |
|
|
673 | (1) |
|
|
673 | (1) |
|
|
674 | (4) |
|
Case 21-1 Wong Engineering Corp. |
|
|
678 | (1) |
|
AIS In Action Solutions: Quiz Key |
|
|
679 | (2) |
|
Comprehensive Problem Solution |
|
|
681 | (1) |
|
Chapter 22 Systems Design, Implementation, and Operation |
|
|
682 | (26) |
|
|
683 | (1) |
|
Conceptual Systems Design |
|
|
683 | (2) |
|
Evaluate Design Alternatives |
|
|
683 | (2) |
|
Prepare Design Specifications and Reports |
|
|
685 | (1) |
|
|
685 | (5) |
|
|
686 | (1) |
|
|
686 | (1) |
|
|
687 | (1) |
|
|
688 | (1) |
|
Procedures and Controls Design |
|
|
689 | (1) |
|
|
690 | (3) |
|
Implementation Planning and Site Preparation |
|
|
690 | (1) |
|
Selecting and Training Personnel |
|
|
691 | (1) |
|
|
692 | (1) |
|
|
692 | (1) |
|
|
693 | (1) |
|
Operation and Maintenance |
|
|
694 | (1) |
|
Summary and Case Conclusion |
|
|
695 | (1) |
|
|
696 | (1) |
|
AIS In Action: Chapter Quiz |
|
|
696 | (1) |
|
Comprehensive Problem Hershey's Big Bang ERP |
|
|
697 | (1) |
|
|
698 | (1) |
|
|
699 | (5) |
|
Case 22-1 Citizen's Gas Company |
|
|
704 | (1) |
|
AIS In Action Solutions: Quiz Key |
|
|
705 | (2) |
|
Comprehensive Problem Solution |
|
|
707 | (1) |
Glossary |
|
708 | (21) |
Index |
|
729 | |