Exam 10: Cybercrime, Fraud, and Ethics
Exam 1: Accounting Information Systems and the Accountant87 Questions
Exam 2: Accounting on the Internet124 Questions
Exam 3: Information Technology and Aiss128 Questions
Exam 4: Accounting and Data Analytics43 Questions
Exam 5: Integrated Accounting and Enterprise Software102 Questions
Exam 6: Introduction to Internal Control Systems and Risk Management73 Questions
Exam 7: Computer Controls for Organizations and Accounting Information Systems96 Questions
Exam 8: Accounting Information Systems and Business Processes: Part I51 Questions
Exam 9: Accounting Information Systems and Business Processes: Part II50 Questions
Exam 10: Cybercrime, Fraud, and Ethics75 Questions
Exam 11: Information Technology Auditing67 Questions
Exam 12: Documenting Accounting Information Systems68 Questions
Exam 13: Developing and Implementing Effective Accounting Information Systems128 Questions
Exam 14: Database Design112 Questions
Exam 15: Organizing and Manipulating the Data in Databases79 Questions
Exam 16: Database Forms and Reports61 Questions
Select questions type
Most computer abuse that we have caught so far has been because of good accounting controls.
(True/False)
4.9/5
(38)
Thwarting computer abuse can be enhanced by all of the following except:
(Multiple Choice)
4.8/5
(37)
Most computer criminals are individuals of questionable background, little education, and no morals.
(True/False)
4.8/5
(40)
Most computer criminals we have been fortunate enough to catch have had long, criminal backgrounds.
(True/False)
4.9/5
(26)
Much of what has been termed cybercrime has merely involved the computer but probably would be more accurately classified as other types of crimes.A notable exception to this involves:
(Multiple Choice)
4.8/5
(40)
Experts suggest that policies on computer abuse are ineffective, and therefore should not be used to help educate employees about computer abuse.
(True/False)
4.9/5
(35)
According to most security professionals, most computer criminals are discovered because of
(Multiple Choice)
4.9/5
(40)
Automated accounting information systems are a particularly important potential target of cybercrime.
(True/False)
4.8/5
(31)
Probably the most important federal legislation governing activities involving computers is:
(Multiple Choice)
4.9/5
(44)
Examples of pressures that motivate the fraudster to act include financial difficulties and unobtainable sales / bonus goals.
(True/False)
4.8/5
(34)
A small computer program that is stored on a web server and designed to run in conjunction with browser software is called a(n):
(Multiple Choice)
4.8/5
(34)
Today's accountants have no responsibility for designing or implementing control procedures that protect AISs from cybercrime and fraud.
(True/False)
4.9/5
(40)
According to the chapter, which of these statements is most accurate?
(Multiple Choice)
4.9/5
(32)
Acts such as dumpster diving, phishing, and smishing are all conducted to:
(Multiple Choice)
4.9/5
(39)
According to the chapter, a computer virus is an example of a type of cybercrime called "denial of service."
(True/False)
4.8/5
(40)
Showing 21 - 40 of 75
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)