Explore BrainMass
Share

Security, Privacy, and Other AIS Issues

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

Security, Privacy, and Other AIS Issues
You've been hired by a growing organization to perform systems consulting work. The CEO has concerns about systems security and the impact of privacy considerations on the organization's AIS. She is also interested in learning more about new and emerging AIS technologies that the organization should consider. You have been asked to provide a report on these areas. Your report will be used as a basis for planning and developing improvements to the AIS.
Prepare a 1,750-2,150-word paper to deliver your findings to the CEO. In your paper, include the following:
a. A disaster recovery/contingency plan that includes the following:
1) Identification and analysis of procedures to detect vulnerabilities and security threats
2) Identification and analysis of risks and risk mitigation measures, including plans for
a) Systems and data recovery
b) Off-site data storage
c) Business continuity
b. An analysis of the impacts of privacy considerations on AIS (i.e., HIPAA)
c. Identification and evaluation of new and emerging AIS technologies and processes, including the following:
1) A summary of the advantages and disadvantages of the changes brought on by using e-business technologies (B2B, B2C, XBRL) in accounting systems
2) A comparison of similarities and differences between batch and real-time transaction processing
3) An explanation of accounting electronic data interchange (EDI) processes
4) An analysis of the potential use of XBRL in the organization
3. Respond to the Discussion Questions posted by your instructor. Post to the

© BrainMass Inc. brainmass.com October 24, 2018, 9:53 pm ad1c9bdddf
https://brainmass.com/business/b2c-and-b2b-marketing/security-privacy-and-other-ais-issues-141143

Solution Summary

The solution discusses security, privacy, and other AIS issues.

$2.19
See Also This Related BrainMass Solution

Security, Privacy, and Other AIS Issues

1. Security, Privacy, and Other AIS Issues
You've been hired by a growing organization to perform systems consulting work. The CEO has concerns about systems security and the impact of privacy considerations on the organization's AIS. She is also interested in learning more about new and emerging AIS technologies that the organization should consider. You have been asked to provide a report on these areas. Your report will be used as a basis for planning and developing improvements to the AIS.

Prepare a paper to deliver your findings to the CEO. In your paper, include the following:

a. A disaster recovery/contingency plan that includes the following:
b. Identification and analysis of procedures to detect vulnerabilities and security threats (i.e., controls)
c. Identification and analysis of risks and risk mitigation measures, including plans for
i. Systems and data recovery
ii. Off-site data storage
iii. Business continuity
c. An analysis of the impacts of privacy considerations on AIS (i.e., HIPAA)

Use at least two academically peer-reviewed sources and/or your text author to support your work or your text authors. Be sure to properly cite any references used in your summary. Format the summary according to APA style.

peer-reviewed sources :

HIPPA engagement help. (2003, April). Practical Accountant, 36(4), 10.

Justices: FERPA does not give student right to sue. (2002, Summer). News Media & the Law, 26(3), 34.

Abu-Musa, A. A. (2002, September). Computer crimes: How can you protect your computerized accounting information system? Journal of American Academy of Business, 2(1), 91.

Abu-Musa, A. A. (2002, September). Security of computerized accounting information systems: A theoretical framework. Journal of American Academy of Business, 2(1), 150.

Blackwell, R. (2002, June 17). With N.D. vote, privacy debate returns to fore. American Banker, 167(115), 1.

Bradbury, D. (2003, October 28). How to stay on the right side of the law. Computer Weekly, 48.

Crane , B. (2003, June 30). Small business and the new HIPPA privacy and security requirements -- what every Utah CEO needs to know. Enterprise/Salt Lake City, 33(1), 3.

Greenblatt, R. E. & Bakker, J. J. (2004, Spring). HIPAA privacy compliance: It''s time to take it seriously. Benefits Law Journal, 17(1), 102.

McCarthy, E. (2004, May). The best-laid plans. Journal of Accountancy, 197(5), 46.

Millman, G. J. (2004, July/August). Keeping data under lock & key. Retrieved on July 16, 2004 from Smartpros.com at http://www.smartpros.com/x44287.xml.

Naumann, J. W. (2004, May). Tap Into XBRL''s power the easy way. Journal of Accountancy, 197(5), 32.

Odell, P. (2003, February). HIPPA changes require close study, DMA exec says. Direct, 15(2), 9.

Parker, R. G. (2003, May). How to profit by safeguarding privacy. Journal of Accountancy, 195(5), 47.

Phelan, S. & Hayes, M. (2003, April). Before the deluge -- and after. Journal of Accountancy, 195(4), 57.

Richards, J. & Tower, G. (2004, March). Progress on XBRL from an Australian perspective. Australian Accounting Review, 14(1), 81.

Stewart, D. L. (2001, June 29). To protect and to serve. Intelligent Enterprise, 4(10), 42.

View Full Posting Details