Continuous auditing, 545
Continuous processing, 306
Control environment, 132–33
Control risk, 694
Controller, 165, 168, 174
Controls, 134–37.See alsoIT controls
access.SeeAccess control
application, 745–65.See alsoApplication
controls
audit trail, 749–50
backup, 710, 712–13, 727–29
batch, 747
for computer-based systems, 188–91
computer center, 677–79
concurrency, 431–32
conversion cycle and, 318–19
corrective, 131
database management systems
(DBMS), 710–13, 727–29
designing system, 625
electronic data interchange (EDI),
722–25
end-user, 752
ERP systems and, 507–12
expenditure cycle and, 228–30, 242–43,
274–75, 279, 281, 286–88
fault tolerance, 678
financial reporting and, 362–64, 366,
666–67
fixed asset system, 286–88
general, 667
general computer, 667
internal.SeeInternal control systems
inventory, 314–16
IT governance, 671–83
operating system, 705–9
organizational structure, 665–77
password, 706–7, 741–42
payroll processing, 274–75, 279, 281
PC-based accounting systems, 190–91
purchases/cash disbursement system,
228–30
revenue cycle, 166–70
risk, 694
run-to-run, 748–49
source program library, 740–45
system audit trails, 708–9
systems development, 738–40
test of IT, 693–94, 705–9
XBRL, 364
Conversion cycle, 43, 305–34
batch processing system and, 307–8,
311–17
controls, 318–19
cost accounting activities and, 317
lean manufacturing and.SeeLean
manufacturing
in relation to other cycles, 306
in traditional manufacturing environ-
ment, 306–17
Cookies, 534–35
Core applications, 491–92
Core competency, 684
Corporate IT function, 675–76
Corrective action, 370
Corrective controls, 131
Corruption, 125
COSO (Committee of Sponsoring Organi-
zations of the Treadway Commission),
131–33
Cost-benefit analysis, 590–95
net present value method, 594
payback, 595
Cost centers, 375, 377
Costs
one-time, 590–91
recurring, 591–92
Coupling, 623
Credit authorization process, 171
Credit card number theft, 534
Credit check, 154, 167
Credit department approval, 178
Credit memo, 162, 174
Credit records file, 169
Currency of information, 398–99
Customer open order file, 154
Customer order, 154
Customer perspective, 582
Cutover, 630–31
D
Data
attributes, 12, 398
check, 746–47
coding schemes, 74–79
collection, 12
collision, 553–55
confidentiality, 545
currency, 428–29
dictionary, 406–7, 625
encryption, 539–40, 711–12, 716–17
flows, 584
integrity, 545–46
mining, 373, 501–2
model, 56
modeling, 615
normalization, 415–19
record, 12–13
redundancy, 398
sources, 11–12, 584
stores, 584
updating, 25, 398–99
vs.information, 11
Database
administration, 12–13, 20
authorization table, 711
backup, 713
backup procedures, 71
centralized, 428–29
conversion, 630
distributed, 427–33
lockout, 429
management, 12–13
navigational, 434
partitioned, 429–31
physical, 407, 423, 426, 477–777
replicated, 431–32
tables, 28, 412
Database accounting systems, 27–28
Database administrator, 404–7, 673
Database management systems (DBMS),
27–28, 397–433
centralized, 428–29
computer fraud and, 670–71
controls, 710–13, 727–29
data structures, 436–38
database environment elements, 401–7
distributed, 427–33
flat-filevs.database approach, 398–401
hierarchical, 433–35
network, 435–36
overview, 401–4
purpose of, 400–401
relational database model, 407–19
Data collection
batch processing from real-time, 71–74
computer fraud and, 669–70
Data definition language (DDL), 402–3
Data encryption standard (DES), 716
Data files, backup, 681
Data flow diagrams (DFDs), 53–54, 56–57,
622–23
context-level, 642
elementary-level, 643–44
intermediate-level, 642–43
model, 642
Data manipulation language (DML), 404
Data processing, 12, 21
alternative approaches, 69–71
centralized, 20–22
computer fraud and, 670
department, 185, 234, 239–41
distributed, 22–24
internal control systems and, 128
Data storage, 25, 398, 681–82
automated storage and retrieval
systems (AS/RS), 324
magnetic disk data, 80–82
magnetic disks, 80–82
magnetic tape, 80
magnetic tape data, 80
optical disk data, 83
virtual storage access method (VSAM),
86–88
Data structures, 83–91, 436–38
defined, 83
direct access, 85
hashing, 88–89
indexed, 85–86
pointer, 89–91
sequential, 84–85
virtual storage access method, 86–88
Data test method, 756–59
Data warehousing, 374, 492, 497–503
cleansing data, 498–500
decisions supported by, 501–2
extracting data, 498
loading data, 501
modeling data for, 497–98
supply chain decisions and, 502–3
transforming data, 500–501
DBMS.SeeDatabase management systems
(DBMS)
DDL (data definition language), 402–3
DDos (distributed denial of service), 536,
538–39, 714
DDP (distributed data processing), 22–24,
427, 674–75
Deadlock phenomenon, 430–31
Decision making
management reporting systems and,
368
types of, 368–70
Deep packet inspection (DPI), 714, 716
Deletion anomaly, 415
Denial of service attack (Dos), 535–36,
538–39, 714–16
INDEX 793