End-user Computing Applications Implications for Intemal Auditors and Managers
نویسنده
چکیده
B usinesses today rely on the work being done by staff using personal computers. The proliferation of personal computers has led to widespread implementation of end-user computing applications. As their name implies, end-user applications are designed, implemented, and controlled by users rather than by IT professionals. End-user applications can be risky for organizations, both with respect to management decision making and to financial reporting. For public companies, the risk involved in the.se applications has been increased by the requirements of the Sarbane.s-Oxley Act of 2002 (SOX), which call for management to document end-to-end financial operations and intemal control structures. Following is a review of the reasons for the prevalence of end-user applicatiiins and their inherent problems, as well as strategies for the intemal coiiu-ol of these applications for various-sized businesses.
منابع مشابه
A Prototyping and Evaluation of Hospital Dashboard through End-User Computing Satisfaction Model (EUCS)
In today's competitive environment, one of the new tools in the field ofinformation technology is business or organizational dashboards that are as abackup in the process of strategic management of organizations. The aim ofthis study is building a prototype of a hospital dashboard on the principles andguidelines of dashboards and evaluating it based on End UserComputing Satisfaction (EUCS). The...
متن کاملInvestigating the use of Software Agents to Reduce The Risk of Undetected Errors in Strategic Spreadsheet Applications
There is an overlooked iceberg of problems in end-user computing. Spreadsheets are developed by people who are very skilled in their main job function, be it finance, procurement, or production planning, but often have had no formal training in spreadsheet use. IT auditors focus on mainstream information systems but regard spreadsheets as user problems, outside their concerns. Internal auditors...
متن کاملTask Scheduling Algorithm Using Covariance Matrix Adaptation Evolution Strategy (CMA-ES) in Cloud Computing
The cloud computing is considered as a computational model which provides the uses requests with resources upon any demand and needs.The need for planning the scheduling of the user's jobs has emerged as an important challenge in the field of cloud computing. It is mainly due to several reasons, including ever-increasing advancements of information technology and an increase of applications and...
متن کاملThe importance of usability in the establishment of organizational software standards for end user computing
The rapid introduction of microcomputers into organizations throughout the last decade gave new importance to the analysis of how technology impacts organizations. In particular, research on usability has sought to become central to the design and selection of technology for large organizations. However, definitions and methods are not yet standardized. Data gathered from semi-structured interv...
متن کاملA Novel Trust Computation Method Based on User Ratings to Improve the Recommendation
Today, the trust has turned into one of the most beneficial solutions to improve recommender systems, especially in the collaborative filtering method. However, trust statements suffer from a number of shortcomings, including the trust statements sparsity, users' inability to express explicit trust for other users in most of the existing applications, etc. Thus to overcome these problems, this ...
متن کامل