Get premium membership and access questions with answers, video lessons as well as revision papers.
(i) These employees perform the following jobs.
Senior systems Analysts – he is the head of system analysts. These employees analyze the existing
system with a view to their computerization. They design systems and oversee their
implementation and review. They are actively involved in the upgrading of the system.
Database administrators – they ensure that the data in the database meets the information needs
of the organization involved in retrieving data and structuring reports, which are appropriate to
the organization.
Systems security managers – they are involved in ensuring the security of the system is not
compromised. They ensure that no outsiders or unauthorized persons access the information..
From the above information, it can be seen that these employees access valuable information and
if they are compromised then the firm can suffer. The following measures are put in place to curb
this.
1. Administrative controls – they include.
(a) Policies – policies outlining and requiring each employee to do certain things and not
others. Things not authorized to be done are threats to security.
(b) Administrative procedures – put by an organization to ensure that users only do what
they are authorized to.
(c) Legal provision – this serve as security controls by laying down legal penalties which
may be suffered in case of breaches in security.
(d) Ethics – a strict code of conduct by the organization to be followed by the employees
can boost security.
2. Logical security controls – these are measures incorporated within the system to provide for
security against the employee. This include the need of passwords to access any
information.
3. Physical controls – this include lockups. The offices should be locked at the end of the day
and no employee should access the others office. It also encompasses employing security
guards to prevent unauthorized access.
4. Rotation and Compulsory Leave – an employee should not be allowed to stay in one place
for long but should be rotated. Due to this threats of fraud are discovered in advance.
Compulsory leave should be given and work reviewed in case of any perceived threat on
security.
5. Good Remuneration – the employees should be paid well to guard against compromising.
(ii) Every individual in an organization can commit fraud. The potential of an employee
committing fraud depends on the following: -
1. Security – inadequate security and loopholes in the security system can be a potential
motivator to an individual to commit fraud. An employee who knows that he can commit
fraud without being found out would be greatly motivated.
2. Remuneration – individuals who are poorly paid are highly susceptible to committing fraud
to make their ends meet.
3. Company policies – if employees are aware that the organization policies are not stringent
then they are likely to be involved in fraud. Absence of policies like rotation of employees
or compulsory leave will be a driving factors as chances of being caught are low.
4. Ethics – the code of conduct of a company also play a major role. In organizations where
there is laxity then the chances are high that employees will engage in fraud.
5. Legal provision – where no legal sanctions are imposed, on the employees if found guilty of
fraud, they could engage in fraudulent activities.
gregorymasila answered the question on November 24, 2017 at 04:46
- Describe any three features of information needed for strategic planning(Solved)
Describe any three features of information needed for strategic planning.
Date posted: November 23, 2017. Answers (1)
- What risks do you see in using information communications technology (ICT) as a strategic resource and what actions should be taken to make ICT a...(Solved)
What risks do you see in using information communications technology (ICT) as a strategic resource and what actions should be taken to make ICT a viable strategic resource?
Date posted: November 23, 2017. Answers (1)
- Electronic point of sale (EPOS) and Automatic Teller Machines (ATMs) are the dominant terminals currently being used in business.Briefly explain three summary reports that are...(Solved)
Electronic point of sale (EPOS) and Automatic Teller Machines (ATMs) are the dominant terminals currently being used in business.
Briefly explain three summary reports that are likely to be generated by each terminal.
Date posted: November 23, 2017. Answers (1)
- In modern economies, the volume of trade transacted by enterprises over the internet is rapidly increasing that transacted through the traditional channels. Discuss how any two...(Solved)
In modern economies, the volume of trade transacted by enterprises over the internet is rapidly increasing that transacted through the traditional channels.
Discuss how any two traditional functions of doing business have moved to the internet and the benefits this movement has brought to enterprises.
Date posted: November 23, 2017. Answers (1)
- Most governments are embracing information communication technology through the implementation of e-governance initiatives. Describe what is meant by e-governance and give four areas in which e-governance...(Solved)
Most governments are embracing information communication technology through the implementation of e-governance initiatives.
Describe what is meant by e-governance and give four areas in which e-governance is beneficial to the public.
Date posted: November 23, 2017. Answers (1)
- Networks are increasingly being managed remotely. Name three security implications of remote network management and three mechanisms that are needed for remote network management..(Solved)
Networks are increasingly being managed remotely. Name three security implications of remote network management and three mechanisms that are needed
for remote network management.
Examine some of the challenges facing the convergence of networks in business
organizations.
Date posted: November 23, 2017. Answers (1)
- Examine two disadvantages of using direct access storage devices(Solved)
Examine two disadvantages of using direct access storage devices.
Date posted: November 23, 2017. Answers (1)
- Human intelligence can be defined as a person‘s ability to solve problems, utilize logic and think critically. Discuss the major differences between human intelligence and artificial...(Solved)
Human intelligence can be defined as a person‘s ability to solve problems, utilize logic and think critically.
Discuss the major differences between human intelligence and artificial intelligence.
Date posted: November 23, 2017. Answers (1)
- Give four examples of industries and business organizations that are currently using computer networking(Solved)
Give four examples of industries and business organizations that are currently using
computer networking.
Date posted: November 23, 2017. Answers (1)
- Briefly describe the following two elements of software quality and explain howeach element can be measured:(i.) Functional correctness of the software. (ii.) Reliability of...(Solved)
Briefly describe the following two elements of software quality and explain how each element can be measured:
(i.) Functional correctness of the software.
(ii.) Reliability of the software.
Date posted: November 23, 2017. Answers (1)
- (i) Networks are increasingly being managed remotely. Name three security implications of remote network management and three mechanisms that are needed for remote network management(Solved)
(i) Networks are increasingly being managed remotely. Name three security
implications of remote network management and three mechanisms that are needed
for remote network management.
(ii) Examine some of the challenges facing the convergence of networks in business
organizations.
Date posted: November 23, 2017. Answers (1)
- Who should be involved in a requirement review? Suggest their role in the requirement review(Solved)
Who should be involved in a requirement review? Suggest their role in the requirement review.
Date posted: November 23, 2017. Answers (1)
- Differentiate between the following terms:(i.) Hardware and software;(ii.) Application software and system software;(iii.) Bit and byte; (iv.) RAM and ROM;...(Solved)
Differentiate between the following terms:
(i.) Hardware and software;
(ii.) Application software and system software;
(iii.) Bit and byte;
(iv.) RAM and ROM;
(v.) Data and information.
Date posted: November 23, 2017. Answers (1)
- Describe three major factors that affect the performance of a computer operation.For each factor, state one example of measurement.(Solved)
Describe three major factors that affect the performance of a computer operation.
For each factor, state one example of measurement.
Date posted: November 23, 2017. Answers (1)
- Examine the issues to be considered when planning for information systems training(Solved)
Examine the issues to be considered when planning for information systems training.
Date posted: November 23, 2017. Answers (1)
- Explain the following database security features: (i) Authorization (ii) Authentication(Solved)
Explain the following database security features:
(i) Authorization
(ii) Authentication
Date posted: November 23, 2017. Answers (1)
- Describe the functional components of a typical computer system(Solved)
Describe the functional components of a typical computer system.
Date posted: November 23, 2017. Answers (1)
- Describe how a software developer can make use of the internet. (Solved)
Describe how a software developer can make use of the internet.
Date posted: November 23, 2017. Answers (1)
- Kenfin Ltd is a medium size commercial bank having branches in major towns in Kenya. The bank provides over the counter services and is planning...(Solved)
Kenfin Ltd is a medium size commercial bank having branches in major towns in Kenya. The bank provides over the counter services and is planning to introduce online banking services. The online banking services will enable the bank to centralize some information processing systems while decentralizing others. You are the project manager overseeing the implementation of the online banking services project.
(i.) What information systems services would you recommend to be centralized or
decentralized? Justify your answer citing any assumptions made.
(ii.) Describe three key risks that may affect the duration and/or cost of the project.
Date posted: November 23, 2017. Answers (1)
- Computerized accounting/financial systems still need internal controls to enhance the integrity of such systems. Explain four internal control procedures that need to be put in place...(Solved)
Computerized accounting/financial systems still need internal controls to enhance the integrity of such systems. Explain four internal control procedures that need to be put in place to guarantee the integrity of such systems.
Date posted: November 23, 2017. Answers (1)