Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Question 1 2 . 1 . What does intelligence mean? Do you accept the use of the word in businessintelligence software tools, or do you
Question What does intelligence mean? Do you accept the use of the word in businessintelligence software tools, or do you think the use of this word is exaggerated comparedwith what these tools provide?Question You are an executive for a large retail chain. Your IT professionals usedatamining software. They tell you of the following relationship the software found: middleaged single men tend to purchase personal grooming products and light bulbs together.Should you assign employees to research the reason for this? How will you use thisinformation?Question Employee knowledge network software keeps tabs on much of whatemployees create on their computers and all the emails they send. As an employee, would yoube comfortable with such software? Why or why not?Question IT professionals have used the term business intelligence to mean manydifferent things. What might be the reason for this?Question Can businesses use free search engines, such as those provided by Google, Bing,and Yahoo! to efficiently gather useful knowledge for better decisionmaking?Question Recall the discussion of expert systems in Chapter Decision Support andExpert Systems. In what sense are employee knowledge networks similar to expert systems,and in what sense are they different?Question Companies would like to have systems that would allow them to store all thebusinessrelated knowledge that their employees have accumulated. Do you expect that suchsystems will exist in your lifetime? Why or why not?Question Mary Scott has a masters degree in computer science and experience as anetwork engineer. However, for the past two years, she has worked for Hoffman Inc. as anaccounts payable clerk. She did not disclose her technology background on her resume whenshe applied for the clerk position. Mary established a reputation as a hardworking,enthusiastic, and reliable employee early on She often works late and is dedicated to doingan excellent job. Her latenight presence in the company became a common occurrence thatwas at first appreciated by her boss and then virtually went unnoticed.While working late, Mary used her computer skills to install a sniffer program on the intranetto capture employee IDs and passwords. With the information she collected, Mary was ableto play many roles and establish herself as a vendor, receiving clerk, cash disbursement clerk,and general ledger clerk. With this authority and her legitimate role as AP clerk, Maryimplemented a vendor fraud scheme, which she has been perpetrating for over a year at thecost of $ to Hoffman Inc.Required: Describe the controls that could have prevented Mary from perpetrating this fraud.Question For many organisations, the security threat from external penetration issignificant; however, many fraud threats are internal. These include data input alteration, program alteration, file alteration, data theft, and sabotage.Required: Explain how each of these five types of fraud is committed. Also, identify a methodof protection against each without using the same protection method for more than one typeof fraud. Use the following format.Type of Fraud Explanation Description of Protection Methodsa.bcdeNote: The above answers only provide the guidelines to attempt these questions. Please a
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started