Muutke küpsiste eelistusi

E-raamat: Accounting Information Systems: Controls and Processes

, (Northern Kentucky University), (Northern Kentucky University)
  • Formaat: EPUB+DRM
  • Ilmumisaeg: 28-Nov-2019
  • Kirjastus: John Wiley & Sons Inc
  • Keel: eng
  • ISBN-13: 9781119577812
Teised raamatud teemal:
  • Formaat - EPUB+DRM
  • Hind: 50,57 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: EPUB+DRM
  • Ilmumisaeg: 28-Nov-2019
  • Kirjastus: John Wiley & Sons Inc
  • Keel: eng
  • ISBN-13: 9781119577812
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Accounting Information Systems provides a comprehensive knowledgebase of the systems that generate, evaluate, summarize, and report accounting information. Balancing technical concepts and student comprehension, this textbook introduces only the most-necessary technology in a clear and accessible style. The text focuses on business processes and accounting and IT controls, and includes discussion of relevant aspects of ethics and corporate governance. Relatable real-world examples and abundant end-of-chapter resources reinforce Accounting Information Systems (AIS) concepts and their use in day-to-day operation.

Now in its fourth edition, this popular textbook explains IT controls using the AICPA Trust Services Principles framework—a comprehensive yet easy-to-understand framework of IT controls—and allows for incorporating hands-on learning to complement theoretical concepts. A full set of pedagogical features enables students to easily comprehend the material, understand data flow diagrams and document flowcharts, discuss case studies and examples, and successfully answer end-of-chapter questions. The book’s focus on ease of use, and its straightforward presentation of business processes and related controls, make it an ideal primary text for business or accounting students in AIS courses. 

About the Authors v
Preface vii
Acknowledgments xi
To the Students xiii
A List of Real-World Examples in This Textbook xv
Module 1 Introduction: Defines business processes, AIS, and all foundational concepts. This module provides the knowledge building blocks to support the remaining chapters.
1 Introduction to MS
1(32)
Overview of Business Processes (Study Objective 1)
1(3)
Overview of an Accounting Information System (Study Objective 2)
4(1)
Business Process Linkage Throughout the Supply Chain (Study Objective 3)
5(2)
IT Enablement of Business Processes (Study Objective 4)
7(3)
Basic Computer and IT Concepts (Study Objective 5)
10(6)
Basic Computer Data Structures
10(1)
File Access and Processing Modes
11(2)
Data Warehouse and Data Mining
13(1)
Structured, Unstructured, and Big Data
13(1)
Networks and the Internet
14(2)
Examples of IT Enablement (Study Objective 6)
16(3)
E-Business
16(1)
Electronic Data Interchange
16(1)
Point of Sale System
16(1)
Automated Matching
17(1)
Evaluated Receipt Settlement
17(1)
E-Payables and Electronic Invoice Presentment and Payment
17(1)
Enterprise Resource Planning Systems
17(1)
Blockchain Technology
18(1)
The Internal Control Structure of Organizations (Study Objective 7)
19(5)
Enterprise Risk Management
20(2)
A Code of Ethics
22(1)
COSO Accounting Internal Control Structure
22(1)
IT Controls
22(1)
Corporate Governance
23(1)
IT Governance
23(1)
The Importance of Accounting Information Systems to Accountants (Study Objective 8)
24(1)
Users of the AIS
24(1)
Design or Implementation Team
24(1)
Auditors of the AIS
24(1)
The Relation of Ethics to Accounting Information Systems (Study Objective 9)
25(1)
Summary of Study Objectives
26(1)
Key Terms
27(1)
End of
Chapter Material
28(3)
Concept Check
28(1)
Discussion Questions
28(1)
Brief Exercises
29(1)
Problems
29(2)
Cases
31(1)
Solutions to Concept Check
31(2)
2 Foundational Concepts of the MS
33(36)
Interrelationships of Business Processes and the AIS (Study Objective 1)
34(2)
Types of Accounting Information Systems (Study Objective 2)
36(4)
Manual Systems
37(1)
Legacy Systems
38(2)
Modern Integrated Systems
40(1)
Client-Server Computing (Study Objective 3)
40(1)
Cloud Computing (Study Objective 4)
41(4)
Accounting Software Market Segments (Study Objective 5)
45(3)
Input Methods Used in Business Processes (Study Objective 6)
48(2)
Source Documents and Keying
48(1)
Bar Codes
49(1)
Point of Sale Systems
49(1)
Electronic Data Interchange
50(1)
E-Business and E-Commerce
50(1)
Processing Accounting Data (Study Objective 7)
50(2)
Batch Processing
50(2)
Online and Real-Time Processing
52(1)
Outputs from the AIS Related to Business Processes (Study Objective 8)
52(1)
Documenting Processes and Systems (Study Objective 9)
53(8)
Process Maps
53(1)
System Flowcharts
54(1)
Document Flowcharts
55(2)
Data Flow Diagrams
57(1)
Entity Relationship Diagrams
57(4)
Ethical Considerations at the Foundation of Accounting Information Systems (Study Objective 10)
61(1)
Summary of Study Objectives
62(1)
Key Terms
63(1)
End of
Chapter Material
64(4)
Concept Check
64(1)
Discussion Questions
65(1)
Brief Exercises
65(1)
Problems
66(1)
Cases
67(1)
Solutions to Concept Check
68(1)
Module 2 Control Environment: Describes the proper control environment to oversee and control processes.
3 Fraud, Ethics, and Internal Control
69(38)
Introduction to the Need for a Code of Ethics and Internal Controls (Study Objective 1)
69(3)
Accounting-Related Fraud (Study Objective 2)
72(3)
Categories of Accounting-Related Fraud
74(1)
The Nature of Management Fraud (Study Objective 3)
75(1)
The Nature of Employee Fraud (Study Objective 4)
76(2)
The Nature of Customer Fraud (Study Objective 5)
78(1)
The Nature of Vendor Fraud (Study Objective 6)
78(1)
The Nature of Computer Fraud (Study Objective 7)
78(4)
Internal Sources of Computer Fraud
79(1)
External Sources of Computer Fraud
80(2)
Policies to Assist in the Avoidance of Fraud and Errors (Study Objective 8)
82(1)
Maintenance of a Code of Ethics (Study Objective 9)
82(1)
Maintenance of Accounting Internal Controls (Study Objective 10)
83(11)
The Details of the COSO Report
85(8)
Reasonable Assurance of Internal Controls
93(1)
Maintenance of Information Technology Controls (Study Objective 11)
94(2)
The Sarbanes-Oxley Act of 2002 (Study Objective 12)
96(2)
Section 404-Management Assessment of Internal Controls
97(1)
Section 406-Code of Ethics for Senior Financial Officers
97(1)
Summary of Study Objectives
98(1)
Key Terms
99(1)
End of
Chapter Material
100(5)
Concept Check
100(1)
Discussion Questions
101(1)
Brief Exercises
101(1)
Problems
102(1)
Cases
103(2)
Solutions to Concept Check
105(2)
4 Internal Controls and Risks in IT Systems
107(46)
An Overview of Internal Controls for IT Systems (Study Objective 1)
107(3)
General Controls for IT Systems (Study Objective 2)
110(10)
Authentication of Users and Limiting Unauthorized Users
110(3)
Hacking and Other Network Break-Ins
113(3)
Organizational Structure
116(1)
Physical Environment and Security
117(2)
Business Continuity
119(1)
General Controls from an AICPA Trust Services Criteria Perspective (Study Objective 3)
120(5)
Risks in Not Limiting Unauthorized Users
122(1)
Risks from Hacking or Other Network Break-Ins
123(1)
Hacking and Network Break-Ins Related to Blockchain
124(1)
Risks from Environmental Factors
124(1)
Physical Access Risks
125(1)
Business Continuity Risks
125(1)
Hardware and Software Exposures in IT Systems (Study Objective 4)
125(10)
The Operating System
127(1)
The Database
128(1)
The Database Management System
129(1)
LANs and WANs
130(1)
Wireless Networks
130(1)
The Internet and World Wide Web
131(1)
Telecommuting Workers and Mobile Workers
132(1)
Electronic Data Interchange
132(1)
Cloud Computing
133(2)
Application Software and Application Controls (Study Objective 5)
135(8)
Input Controls
136(6)
Processing Controls
142(1)
Output Controls
142(1)
Ethical Issues in IT Systems (Study Objective 6)
143(1)
Summary of Study Objectives
144(1)
Key Terms
145(1)
End of
Chapter Material
146(4)
Concept Check
146(1)
Discussion Questions
147(1)
Brief Exercises
147(1)
Problems
148(1)
Cases
149(1)
Solutions to Concept Check
150(3)
5 IT Governance
153(34)
Introduction to IT Governance (Study Objective 1)
153(4)
An Overview of the SDLC (Study Objective 2)
157(3)
The Phases of the SDLC
160(1)
Elements of the Systems Planning Phase of the SDLC (Study Objective 3)
160(3)
The Match of IT Systems to Strategic Objectives
161(1)
Feasibility Study
161(2)
Planning and Oversight of the Proposed Changes
163(1)
Elements of the Systems Analysis Phase of the SDLC (Study Objective 4)
163(4)
Preliminary Investigation
163(1)
System Survey: The Study of the Current System
163(2)
Determination of User Requirements
165(1)
Analysis of the System Survey
166(1)
Systems Analysis Report
166(1)
Elements of the Systems Design Phase of the SDLC (Study Objective 5)
167(7)
The Purchase of Software
168(1)
In-House Design
169(1)
Conceptual Design
169(1)
Evaluation and Selection
170(2)
Cloud Computing as a Conceptual Design
172(1)
Detailed Design
172(2)
Elements of the Systems Implementation Phase of the SDLC (Study Objective 6)
174(3)
Software Programming
175(1)
Training Employees
175(1)
Software Testing
176(1)
Documenting the System
176(1)
Data Conversion
176(1)
System Conversion
176(1)
User Acceptance
177(1)
Post-Implementation Review
177(1)
Elements of the Operation and Maintenance Phase of the SDLC (Study Objective 7)
177(1)
The Critical Importance of IT Governance in an Organization (Study Objective 8)
178(1)
SDLC as Part of Strategic Management
178(1)
SDLC as an Internal Control
178(1)
Ethical Considerations Related to IT Governance (Study Objective 9)
179(2)
Ethical Considerations for Management
179(1)
Ethical Considerations for Employees
180(1)
Ethical Considerations for Consultants
180(1)
Summary of Study Objectives
181(2)
Key Terms
183(1)
End of
Chapter Material
183(3)
Concept Check
183(1)
Discussion Questions
184(1)
Brief Exercises
184(1)
Problems
184(1)
Cases
185(1)
Solutions to Concept Check
186(1)
6 Enterprise Resource Planning (ERP) Systems
187(31)
Overview of ERP Systems (Study Objective 1)
187(5)
History of ERP Systems (Study Objective 2)
192(2)
Current ERP System Characteristics (Study Objective 3)
194(1)
ERP Modules (Study Objective 4)
195(2)
Financials
196(1)
Human Resources
196(1)
Procurement and Logistics
196(1)
Product Development and Manufacturing
196(1)
Sales and Services
196(1)
Analytics
196(1)
Supply Chain Management (SCM)
197(1)
Customer Relationship Management (CRM)
197(1)
ERP Market Segments, Cloud Computing and Digital Transformation (Study Objective 5)
197(4)
Tier One Software
198(1)
Tier Two Software
199(1)
Cloud-Based ERR
199(2)
Implementation of ERP Systems (Study Objective 6)
201(6)
Hiring a Consulting Firm
201(1)
The Best-Fit ERP System
202(1)
Which Modules to Implement
202(1)
Best-of-Breed versus ERP Modules
202(1)
Business Process Reengineering
203(1)
Customization of the ERP System
203(1)
The Costs of Hardware and Software
204(1)
Testing of the ERP System
204(1)
Data Conversion
204(1)
Training of Employees
204(1)
The Methods of Conversion to the ERP System
205(2)
Benefits and Risks of ERP Systems (Study Objective 7)
207(1)
Benefits of ERP Systems
207(3)
Risks of ERP Systems
209(1)
ERP Systems and the Sarbanes-Oxley Act (Study Objective 8)
210(2)
Summary of Study Objectives
212(2)
Key Terms
214(1)
End of
Chapter Material
214(3)
Concept Check
214(1)
Discussion Questions
215(1)
Brief Exercises
215(1)
Problems
216(1)
Cases
216(1)
Solutions to Concept Check
217(1)
7 Auditing Information Technology-Based Processes
218(38)
Introduction to Auditing IT Processes (Study Objective 1)
218(1)
Types of Audits and Auditors (Study Objective 2)
219(2)
Information Risk and IT-Enhanced Internal Control (Study Objective 3)
221(1)
Authoritative Literature Used in Auditing (Study Objective 4)
222(2)
Management Assertions and Audit Objectives (Study Objective 5)
224(1)
Phases of an IT Audit (Study Objective 6)
225(4)
Audit Planning
226(3)
Use of Computers in Audits (Study Objective 7)
229(1)
Tests of Controls (Study Objective 8)
230(7)
General Controls
231(2)
Application Controls
233(4)
Tests of Transactions and Tests of Balances (Study Objective 9)
237(2)
Audit Completion/Reporting (Study Objective 10)
239(2)
Other Audit Considerations (Study Objective 11)
241(4)
Different IT Environments
241(3)
Changes in a Client's IT Environment
244(1)
Sampling versus Population Testing
244(1)
Ethical Issues Related to Auditing (Study Objective 12)
245(3)
Summary of Study Objectives
248(1)
Key Terms
249(1)
End of
Chapter Material
250(4)
Concept Check
250(2)
Discussion Questions
252(1)
Brief Exercises
253(1)
Problems
253(1)
Cases
254(1)
Solutions to Concept Check
254(2)
Module 3 Business Processes: The sets of business processes and the internal controls in organizations. With process maps, document flowcharts, and data flow diagrams, the core business processes are described and the necessary controls to manage risk are discussed.
8 Revenue and Cash Collection Processes and Controls
256(58)
Introduction to Revenue Processes (Study Objective 1)
256(5)
Sales Processes (Study Objective 2)
261(7)
Risks and Controls in Sales Processes (Study Objective 2, Continued)
268(4)
Authorization of Transactions
268(1)
Segregation of Duties
268(1)
Adequate Records and Documents
269(1)
Security of Assets and Documents
269(1)
Independent Checks and Reconciliation
270(1)
Cost-Benefit Considerations
270(2)
Sales Return Processes (Study Objective 3)
272(1)
Risks and Controls in the Sales Return Processes (Study Objective 3, Continued)
272(5)
Authorization of Transactions
272(3)
Segregation of Duties
275(1)
Adequate Records and Documents
275(1)
Security of Assets and Documents
276(1)
Independent Checks and Reconciliation
276(1)
Cost-Benefit Considerations
276(1)
Cash Collection Processes (Study Objective 4)
277(1)
Risks and Controls in the Cash Collection Processes (Study Objective 4, Continued)
278(7)
Authorization of Transactions
278(1)
Segregation of Duties
278(4)
Adequate Records and Documents
282(1)
Security of Assets and Documents
282(1)
Independent Checks and Reconciliation
283(1)
Cost-Benefit Considerations
283(2)
IT-Enabled Systems of Revenue and Cash Collection Processes (Study Objective 5)
285(2)
E-Business Systems and the Related Risks and Controls (Study Objective 6)
287(3)
Security and Confidentiality Risks
289(1)
Processing Integrity Risks
289(1)
Availability Risks
290(1)
Electronic Data Interchange (EDI) Systems and the Risks and Controls (Study Objective 7)
290(4)
Point of Sale (POS) Systems and the Related Risks and Controls (Study Objective 8)
294(1)
Ethical Issues Related to Revenue Processes (Study Objective 9)
295(2)
Corporate Governance in Revenue Processes (Study Objective 10)
297(1)
Summary of Study Objectives
298(2)
Key Terms
300(1)
End of
Chapter Material
300(12)
Concept Check
300(1)
Discussion Questions
301(1)
Brief Exercises
302(1)
Problems
303(5)
Cases
308(4)
Solutions to Concept Check
312(2)
9 Expenditures Processes and Controls-Purchases
314(59)
Introduction to Expenditures Processes (Study Objective 1)
314(3)
Purchasing Processes (Study Objective 2)
317(10)
Risks and Controls in the Purchasing Process (Study Objective 2, Continued)
327(4)
Authorization of Transactions
327(1)
Segregation of Duties
327(1)
Adequate Records and Documents
328(1)
Security of Assets and Documents
328(1)
Independent Checks and Reconciliation
329(1)
Cost-Benefit Considerations
329(2)
Purchase Return Process (Study Objective 3)
331(4)
Risks and Controls in the Purchase Return Processes (Study Objective 3, Continued)
335(2)
Authorization of Transactions
335(1)
Segregation of Duties
335(1)
Adequate Records and Documents
335(1)
Security of Assets and Documents
336(1)
Independent Checks and Reconciliation
336(1)
Cost-Benefit Considerations
336(1)
Cash Disbursement Processes (Study Objective 4)
337(6)
Risks and Controls in the Cash Disbursement Processes (Study Objective 4, Continued)
343(3)
Authorization of Transactions
343(1)
Segregation of Duties
344(1)
Adequate Records and Documents
344(1)
Security of Assets and Documents
344(1)
Independent Checks and Reconciliation
344(1)
Cost-Benefit Considerations
345(1)
IT Systems of Expenditures and Cash Disbursement Processes (Study Objective 5)
346(2)
Computer-Based Matching (Study Objective 6)
348(1)
Risks and Controls in Computer-Based Matching (Study Objective 6, Continued)
349(1)
Security and Confidentiality Risks
349(1)
Processing Integrity Risks
350(1)
Availability Risks
350(1)
Evaluated Receipt Settlement (Study Objective 7)
350(1)
Risks and Controls in Evaluated Receipt Settlement (Study Objective 7, Continued)
351(1)
Security and Confidentiality
352(1)
Processing Integrity
352(1)
Availability
352(1)
E-Business and Electronic Data Interchange (EDI) (Study Objective 8)
352(1)
Risks and Controls in E-Business and EDI (Study Objective 8, Continued)
353(2)
Security and Confidentiality
353(1)
Processing Integrity
354(1)
Availability
355(1)
E-Payables (Study Objective 9)
355(1)
Procurement Cards (Study Objective 10)
356(1)
Ethical Issues Related to Expenditures Processes (Study Objective 11)
356(2)
Corporate Governance in Expenditure Processes (Study Objective 12)
358(1)
Summary of Study Objectives
359(2)
Key Terms
361(1)
End of
Chapter Material
362(9)
Concept Check
362(1)
Discussion Questions
363(1)
Brief Exercises
364(1)
Problems
364(3)
Cases
367(4)
Solutions to Concept Check
371(2)
10 Expenditures Processes and Controls-Payroll and Fixed Assets
373(43)
Introduction to Payroll and Fixed Asset Processes (Study Objective 1)
373(4)
Payroll Processes (Study Objective 2)
377(8)
Risks and Controls in the Payroll Processes (Study Objective 3)
385(2)
Authorization of Transactions
385(1)
Segregation of Duties
386(1)
Adequate Records and Documents
386(1)
Security of Assets and Documents
386(1)
Independent Checks and Reconciliation
387(1)
Cost-Benefit Considerations
387(1)
IT Systems of Payroll Processes (Study Objective 4)
387(3)
Fixed Asset Processes (Study Objective 5)
390(8)
Fixed Asset Acquisitions
390(4)
Fixed Asset Continuance
394(1)
Fixed Asset Disposals
395(3)
Risks and Controls in Fixed Asset Processes (Study Objective 6)
398(3)
Authorization of Transactions
398(1)
Segregation of Duties
399(1)
Adequate Records and Documents
399(1)
Security of Assets and Documents
399(1)
Independent Checks and Reconciliation
399(1)
Cost-Benefit Considerations
400(1)
IT Systems of Fixed Asset Processes (Study Objective 7)
401(2)
Ethical Issues Related to Payroll and Fixed Asset Processes (Study Objective 8)
403(2)
Corporate Governance in Payroll and Fixed Asset Processes (Study Objective 9)
405(2)
Summary of Study Objectives
407(1)
Key Terms
408(1)
End of
Chapter Material
408(6)
Concept Check
408(2)
Discussion Questions
410(1)
Brief Exercises
410(1)
Problems
411(1)
Cases
412(2)
Solutions to Concept Check
414(2)
11 Conversion Processes and Controls
416(32)
Basic Features of Conversion Processes (Study Objective 1)
416(3)
Components of the Logistics Function (Study Objective 2)
419(8)
Planning
419(2)
Resource Management
421(2)
Operations
423(4)
Cost Accounting Reports Generated by Conversion Processes (Study Objective 3)
427(1)
Risks and Controls in Conversion Processes (Study Objective 4)
428(3)
Authorization of Transactions
428(1)
Segregation of Duties
428(1)
Adequate Records and Documents
429(1)
Security of Assets and Documents
429(1)
Independent Checks and Reconciliation
429(1)
Cost-Benefit Considerations
430(1)
IT Systems of Conversion Processes (Study Objective 5)
431(4)
The Supply Chain and Enterprise (ERP) Systems (Study Objective 6)
435(2)
Ethical Issues Related to Conversion Processes (Study Objective 7)
437(1)
Corporate Governance in Conversion Processes (Study Objective 8)
438(1)
Summary of Study Objectives
438(1)
Key Terms
439(1)
End of
Chapter Material
440(6)
Concept Check
440(1)
Discussion Questions
441(1)
Brief Exercises
442(1)
Problems
443(1)
Cases
443(3)
Solutions to Concept Check
446(2)
12 Administrative Processes and Controls
448(28)
Introduction to Administrative Processes (Study Objective 1)
448(3)
Financial Capital Processes (Study Objective 2)
451(2)
Investment Processes (Study Objective 3)
453(1)
Risks and Controls in Capital and Investment Processes (Study Objective 4)
454(1)
General Ledger Processes (Study Objective 5)
455(4)
Risks and Controls in General Ledger Processes (Study Objective 6)
459(6)
Authorization of Transactions
459(1)
Segregation of Duties
460(3)
Adequate Records and Documents
463(1)
Security of the General Ledger and Documents
464(1)
Independent Checks and Reconciliation
464(1)
Reporting as an Output of the General Ledger Processes (Study Objective 7)
465(2)
External Reporting
465(1)
Internal Reporting
465(1)
Corporate Performance Management Systems
466(1)
Ethical Issues Related to Administrative Processes and Reporting (Study Objective 8)
467(2)
Unethical Management Behavior in Capital Sources and Investing
468(1)
Internal Reporting of Ethical Issues
469(1)
Corporate Governance in Administrative Processes and Reporting (Study Objective 9)
469(1)
Summary of Study Objectives
470(2)
Key Terms
472(1)
End of
Chapter Material
472(3)
Concept Check
472(1)
Discussion Questions
473(1)
Brief Exercises
473(1)
Problems
474(1)
CASE
474(1)
Solutions to Concept Check
475(1)
Module 4 IT Infrastructure To Enable Processes: The hardware, software, and systems that support business processes.
13 Data and Databases
476(34)
The Need for Data Collection and Storage (Study Objective 1)
476(2)
Storing and Accessing Data (Study Objective 2)
478(2)
Data Storage Terminology
479(1)
Data Storage Media
479(1)
Data Processing Techniques (Study Objective 3)
480(1)
Databases (Study Objective 4)
481(4)
The History of Databases
483(2)
The Need for Normalized Data (Study Objective 5)
485(3)
Trade-Offs in Database Storage
487(1)
Use of a Data Warehouse to Analyze Data (Study Objective 6)
488(3)
Build the Data Warehouse
489(1)
Identify the Data
489(1)
Standardize the Data
489(1)
Cleanse, or Scrub, the Data
490(1)
Upload the Data
491(1)
Data Analysis Tools (Study Objective 7)
491(2)
Data Mining
491(1)
OLAP
492(1)
Distributed Data Processing (Study Objective 8)
493(2)
DDP and DDB
494(1)
Cloud-Based Databases (Study Objective 9)
495(2)
Big Data and Data Analytics (Study Objective 10)
497(2)
Data Visualization
498(1)
IT Controls for Data and Databases (Study Objective 11)
499(1)
Ethical Issues Related to Data Collection and Storage (Study Objective 12)
499(3)
Ethical Responsibilities of the Company
500(1)
Ethical Responsibilities of Employees
501(1)
Ethical Responsibilities of Customers
502(1)
Summary of Study Objectives
502(2)
Key Terms
504(1)
End of
Chapter Material
504(4)
Concept Check
504(1)
Discussion Questions
505(1)
Brief Exercises
506(1)
Problems
507(1)
Cases
507(1)
Solutions to Concept Check
508(2)
14 E-Commerce and E-Business
510
Introduction to E-Commerce and E-Business (Study Objective 1)
510(2)
The History of the Internet (Study Objective 2)
512(2)
The Physical Structure and Standards of the Internet (Study Objective 3)
514(4)
The Network
514(2)
The Common Standards of the Internet
516(2)
E-Commerce and Its Benefits (Study Objective 4)
518(4)
Benefits and Disadvantages of E-Commerce for the Customer
519(1)
Benefits and Disadvantages of E-Commerce for the Business
520(1)
The Combination of E-Commerce and Traditional Commerce
521(1)
Privacy Expectations in E-Commerce (Study Objective 5)
522(1)
E-Business and IT Enablement (Study Objective 6)
523(4)
B2B: A Part of E-Business
526(1)
E-Business Enablement Examples and Digital Transformation (Study Objective 7)
527(3)
Digital Transformation
529(1)
Intranets and Extranets to Enable E-Business (Study Objective 8)
530(2)
Internal Controls for the Internet, Intranets, and Extranets (Study Objective 9)
532(1)
XML and XBRL as Tools to Enable E-Business (Study Objective 10)
533(3)
XML IN INTERNET EDI
533(2)
XBRL for Financial Statement Reporting
535(1)
Ethical Issues Related to E-Business and E-Commerce (Study Objective 11)
536(2)
Summary of Study Objectives
538(2)
Key Terms
540(1)
End of
Chapter Material
540(3)
Concept Check
540(1)
Discussion Questions
541(1)
Brief Exercises
541(1)
Problems
542(1)
Cases
542(1)
Solutions to Concept Check
543
Index I-1