Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 1 2 . 1 . What does intelligence mean? Do you accept the use of the word in businessintelligence software tools, or do you

Question 12.1. What does intelligence mean? Do you accept the use of the word in businessintelligence software tools, or do you think the use of this word is exaggerated comparedwith what these tools provide?Question 12.2. You are an executive for a large retail chain. Your IT professionals usedatamining software. They tell you of the following relationship the software found: middle-aged single men tend to purchase personal grooming products and light bulbs together.Should you assign employees to research the reason for this? How will you use thisinformation?Question 12.3. Employee knowledge network software keeps tabs on much of whatemployees create on their computers and all the emails they send. As an employee, would yoube comfortable with such software? Why or why not?Question 12.4. IT professionals have used the term business intelligence to mean manydifferent things. What might be the reason for this?Question 12.5. Can businesses use free search engines, such as those provided by Google, Bing,and Yahoo! to efficiently gather useful knowledge for better decision-making?Question 12.6. Recall the discussion of expert systems in Chapter 10, Decision Support andExpert Systems. In what sense are employee knowledge networks similar to expert systems,and in what sense are they different?Question 12.7. Companies would like to have systems that would allow them to store all thebusiness-related knowledge that their employees have accumulated. Do you expect that suchsystems will exist in your lifetime? Why or why not?Question 12.8. Mary Scott has a masters degree in computer science and experience as anetwork engineer. However, for the past two years, she has worked for Hoffman Inc. as anaccounts payable clerk. She did not disclose her technology background on her resume whenshe applied for the clerk position. Mary established a reputation as a hard-working,enthusiastic, and reliable employee early on. She often works late and is dedicated to doingan excellent job. Her late-night presence in the company became a common occurrence thatwas at first appreciated by her boss and then virtually went unnoticed.While working late, Mary used her computer skills to install a sniffer program on the intranetto capture employee IDs and passwords. With the information she collected, Mary was ableto play many roles and establish herself as a vendor, receiving clerk, cash disbursement clerk,and general ledger clerk. With this authority and her legitimate role as AP clerk, Maryimplemented a vendor fraud scheme, which she has been perpetrating for over a year at thecost of $250,000 to Hoffman Inc.Required: Describe the controls that could have prevented Mary from perpetrating this fraud.Question 12.9. For many organisations, the security threat from external penetration issignificant; however, many fraud threats are internal. These include (1) data input alteration,(2) program alteration, (3) file alteration, (4) data theft, and (5) sabotage.Required: Explain how each of these five types of fraud is committed. Also, identify a methodof protection against each without using the same protection method for more than one typeof fraud. Use the following format.Type of Fraud Explanation Description of Protection Methodsa.b.c.d.e.Note: The above answers only provide the guidelines to attempt these questions. Please a

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions