Identify the weaknesses in the edi reporting system

Assignment Help Management Information Sys
Reference no: EM131787375

Assignment 1

This assessment is based on the case study, "Virtually There Technologies: A Case Study of Earnings Management and Fraud" by DiGregoria, Stallworth, and Braun (attached). Evaluate the implementation of the EDI system of the company in this case. Your goal is to demonstrate the methods to identify, measure, interpret, and control certain types of exposures and risks for selected business systems.

Examine the implementation of the EDI system in detail to become familiar with all aspects of the case.
Identify the weaknesses in the EDI reporting system.
Design the appropriate report or reports to effectively manage their revenue cycle activities.
Describe how to apply specific recommendations for improving control procedures for the Web site.
Present appropriate recommendations for new information technology implementation. Support your evaluation and recommendations using relevant scholarly sources.

Additional Requirements
APA formatting: Your writing should be formatted according to APA style.
Length: Submit between 2-3 pages.

Assignment 2

For this assessment, refer to the "Virtually There Technologies" case study (attached). Your goal in this assessment is to demonstrate the methods to identify, measure, interpret, and control certain types of exposures and risks for selected business systems.

Case Study Analysis

Complete the following analysis and evaluation of IS systems controls and auditing as they apply to department of taxation needs:

Analyze the direct data inquiry capabilities related to data input, data processing, data inquiries, and output processing.
Evaluate the impact of potential problems in these aspects of virtually there technologies (VTT) system controls.
Provide a recommendation for each identified problem area.
Analyze the direct data inquiry capabilities related to processing integrity.
Evaluate the impact of potential problems in the processing integrity of a VIT.
Provide a recommendation for each identified problem area.
Analyze the direct data inquiry capabilities related to availability and business continuity planning.
Evaluate the impact of potential problems in the availability and business continuity planning of a VIT.
Provide a recommendation for each identified problem in this area.

Attachment:- Case-Virtually-There-Technoogies.rar

Reference no: EM131787375

Questions Cloud

Strategic moves to strengthen its generic strategy : Using 300 words with citation describe how did Subway executed optimal strategic moves to strengthen its generic strategy
What is the degree of combined leverage : Sinclair Manufacturing and Boswell Brothers Inc. are both involved in the production of brick for the homebuilding industry.
Find the standard deviation rounding to the nearest tenth : According to a survey, people in the 20th century had an average age of 80 years. How does the mean age of these prime ministers compare to that?
Savings and loan association will receive : a. What is the amount of the payment that the savings and loan association will receive?
Identify the weaknesses in the edi reporting system : Identify the weaknesses in the EDI reporting system. Design the appropriate report or reports to effectively manage their revenue cycle activities.
Prepare a trial balance at march on a worksheet : Laura Eddy opened Eddy's Carpet Cleaners on March 1. Prepare a trial balance at March 31 on a worksheet
Calculate the degree of operating leverage : Calculate the degree of operating leverage, the degree of financial leverage, and the degree of combined leverage before expansion.
Agreement and an option on an interest rate : What is the relationship between an interest-rate agreement and an option on an interest rate?
Find the standard deviation of horsepower : The standard deviation of the next five cars was 162.07. Did the first five cars tend to have more or less variation than the other five cars?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Analyze internet security issues-available countermeasures

Your task is to identify the fundamental concepts of network security and security policy according to various viewpoints and try to systematize them in a succinct and yet comprehensive contribution. You may discuss typical attacks and how they af..

  Describe the purpose and goals of a mobile self-service

Describe the Purpose and goals of a mobile self-service. Target segment (audience). Audience needs and wants. Resources necessary to achieve the desired outcome. Design of the Website for mobile devices and Interfaces applicable to mobile devices.

  How might this policy differ from you file backups policy

Our lecture includes a reference design for an email system. With about that level of detail as a guide, research and find several more reference designs, comparable or simpler or more complex. Give a reference to what you find (e.g. a web link ..

  Which is not primary characteristics ofcommunication

According to Bevan and Sole, which of the following is not one of the five primary characteristics ofcommunication?

  How a consumer could benefit from asymmetric information

How a consumer could benefit from asymmetric information - Prepare an original example to illustrate how a consumer could benefit from asymmetric information

  Explain the system''s function and value

Describe an information system - Use the concepts of input, processing, output, and feedback to describe the system's function and value.

  Summarize the challenges faced and how they were worked out

This problem belongs to Management and it is about IT project of office automation for a company with 30000 employees. The challenges in the project and their solutions have been explained in the PowerPoint presentation

  Determine your decision-making approach for this project

Determine the approach you would use to handle the documentation needs for the project identified in Part 1 of this discussion.

  Briefly explain the evolution of e-business

Conduct research concerning the evolution of e-business as it relates to supply chain management using the listed resources. Prepare a 700- to 1,050-word paper based on your research in which you cover the following points: Briefly explain the evo..

  What were the goals of the web site

Create at least four web pages that will link to one another. Each web page should include at least one or more items from directions below. What were the goals of the web site

  Why is the study of information systems important

Why is the study of information systems important to you? What do you hope to learn from this course that will make it worthwhile for you?

  Identify how cultural values affect cyber ethics norms

Identify examples of how cultural values affect moral legitimacy and cyber ethics norms. Cyber Espionage and the Theft of U.S. Intellectual Property and Technology [2013 - video / transcripts of Congressional hearing].

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd