Accounting Information Systems Essays (Examples)

Studyspark

Study Document Study Document

Optimizing Health Information Systems

Pages: 12 (3717 words) Sources: 16 Document Type:Research Paper Document #:99273225

Optimizing Merged Health information Systems
Although the merger of two comparably sized companies competing in the same industry is a relatively commonplace business strategy, the process is fraught … percentage of merged entities fail outright because of these problems (Murphy, 2019). These types of problems are further compounded when there are sophisticated information systems involved that must also be merged successfully. The purpose of this paper is to explicate the responsibilities involved in implementing a health information system (HIS) that meets current Health information Technology for Economic and Clinical Health (HITECH) Act and the Health Insurance Portability and Accountability Act (HIPAA) Security and Privacy regulatory requirements. To … and the Health Insurance Portability and Accountability Act (HIPAA) Security and Privacy regulatory requirements. To this end, a discussion and analysis of health information systems, a description concerning how a system will affect patient care and documentation and an explanation concerning how……

References

References

Abouzhar, C. & Boerma, T. (2009, August). Health information systems: The foundations of public health. Bulletin of the World Health Organization, 83(8), 578-583.

Cresswell, K. & Aziz, S. (2013, May). Organizational issues in the implementation and adoption of health information technology innovations: An interpretative review. International Journal of Medical Informatics, 87(5), 73-86.

Drazen, E. L. (2006, February). Maximizing the benefits of health care information systems. Journal of Medical Systems, 10(1), 51-56.

Kruse, C. S. & Smith, D. (2017, July). Security techniques for the electronic health records. Journal of Medical Systems, 41(8), 127.

Kumar, V. (2011). Impact of health information systems on organizational health communication and behavior. The Internet Journal of Allied Health Sciences and Practice, 9(2), 37-44.

McGrail, K. M. & Black, C. (2009, August). Access to data in health information systems. Bulletin of the World Health Organization, 83(8), 563-569.

Murphy, M. L. (2019, March). Mastering accounting for business combinations: Mergers and acquisitions present challenges that finance can overcome by staying involved with the deal and preparing in advance of the closing. Journal of Accountancy, 227(3), 24-27.

NAHQ code of ethics for healthcare quality. (2019). National Association for Healthcare Quality. Retrieved from  https://nahq.org/about/code-of-ethics .

Studyspark

Study Document Study Document

The Cost Effectiveness In Cloud Computing Within An Accounting Organization

Pages: 15 (4615 words) Sources: 15 Document Type:Research Paper Document #:23416384

The Cost Effectiveness of Cloud Computing within an accounting Organization
Table of Contents
1 Introduction 4
1.1 Background 4
1.2 Significance of the Topic 4
1.3 Research Problem 5
1.4 Research Questions … and their Significance 16
5 Ethical Issues and Methods to Address 17
6 Conclusion 17
Introduction
Background
Corporations of all sizes in the accounting industry, in addition to other industries such as retail, information technology, insurance, and media industries, capitalize on public cloud services. The steadily advancing features of the cloud, including infinite and unrestricted storage and … public cloud services. The steadily advancing features of the cloud, including infinite and unrestricted storage and powerful analytic tools, system infrastructure software, various accounting applications in addition to enterprise resource management and customer relationship management, play a pivotal role in everyday business operations. Significantly, in the contemporary … management and customer relationship management, play a pivotal role in everyday……

References

References

Bauer, E., & Adams, R. (2015). Reliability and availability of cloud computing. Hoboken: John Wiley & Sons.

Chang, W. Y., Abu-Amara, H., & Sanford, J. F. (2018). Transforming enterprise cloud services. New York: Springer Science & Business Media.

Chang, V. (Ed.). (2015). Delivery and adoption of cloud computing Services in Contemporary Organizations. IGI Global.

Hsien, W. F., Yang, C. C., & Hwang, M. S. (2016). A Survey of Public Auditing for Secure Data Storage in Cloud Computing. IJ Network Security, 18(1), 133-142.

Jamsa, K. (2016). Cloud computing. New York: Jones & Bartlett Publishers.

Maguire, M., & Delahunt, B. (2017). Doing a thematic analysis: A practical, step-by-step guide for learning and teaching scholars. AISHE-J: The All Ireland Journal of Teaching and Learning in Higher Education, 9(3).

Mehmood, R., Katib, S. S. I., & Chlamtac, I. (2020). Smart Infrastructure and Applications. New York: Springer International Publishing.

Prabhu, C. S. R. (2015). E-governance: concepts and case studies. New Delhi: PHI Learning Pvt. Ltd.

Studyspark

Study Document Study Document

Barriers That Prevent Implementation Of IoT Within Small Businesses

Pages: 18 (5252 words) Sources: 37 Document Type:Case Study Document #:25628514

… the IoT.
The use of the UTAUT model is also highly appropriate for the purposes of this study because individual acceptance levels of information technology (IT) have been a key focus of many of the studies concerning new technology implementations to date (Venkatesh, Thong & Xu, 2016). … and Wang (2018), “After the Internet and mobile communication network, the Internet of Things has become an important trend in the development of information technology, greatly promoting the reform of the information industry in the world” (p. 2386). The IoT can be conceptualized graphically as depicted in Figure 1 below.
Figure 1. Representative Internet of … the most important features of IoT applications include the fact that conventional mobile devices such as smartphones, various types of personal computers, video systems and other handheld devices as well as objects that have traditionally not been viewed as being amenable can be incorporation into……

References

References

Ahamed, J., & Rajan, A.V. (2016). Internet of Things (IoT): Application systems and security vulnerabilities. 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), 1-5.

Aishah, S., Sahandi, R., Prakoonwit, S., & Khan, W. (2019). Big data and IoT opportunities for small and medium-sized enterprises (SMEs). In Handbook of Research on Big data and the IoT. doi: 10.4018/978-1-5225-7432-3.ch005

An, N. & Wang, J. (2018, October). Research and practice on innovative methods of ideological and political education for college student. Educational Sciences Theory and Practice, 18(5), 2386-2391.

Banham, R. (2016, July-August). IoT complexity: As the Internet of Things expands, the risks-and questions of liability-become more complicated. Risk Management, 63(6), 39-44.

Bhardwaj, A., Subramanyam, G. V., Avasthi, V. & Sastry, H. (2016). Review of solutions for securing end user data over cloud applications. International Journal of Advanced Computer Research, 6(27), 2277-2291.

Bok, H. (2014, September). An empirical study on factors influencing Internet advertising effects. Advances in Management, 7(9), 6-9.

Business.com. (2018). Disaster preparedness for small businesses. Business.com, September 26. Retrieved from  https://www.business.com/articles/business-disaster-prep/ .

Cass, J. (2019). Internet of Things: What it is, how it works, examples and more. Just Creative. Retrieved from  https://justcreative.com/2018/11/19/internet-of-things-explained/ .

Studyspark

Study Document Study Document

Cyber Crime IT Security Auditing

Pages: 11 (3165 words) Sources: 7 Document Type:Research Paper Document #:36684821

… past, lost much to these crimes and, hence, must come up with plans to prevent such future occurrences. In this paper, the processes information technology security audits entail and how such audits enhance organizational IT security will be dealt with. According to research on the subject, IT … in the form of a methodical analysis by an outside specialist on compliance, for identifying any chinks in the armor of the company's information technology system.
Introduction
ICT advancements have meant the availability of vast quantities of data, which also creates considerable risks to the data itself, … system.
Introduction
ICT advancements have meant the availability of vast quantities of data, which also creates considerable risks to the data itself, computer systems, and critical infrastructures and operations it supports. Despite developments in information security, numerous information systems continue to display susceptibility to both external and internal breaches (Suduc, Bîzoi & Filip,……

References

References

Almatari, O. and Helal, I., and Mazen, S., and El Hennawy, S. (2018). \\\\\\"Cybersecurity Tools for IS Auditing.\\\\\\" The 6th International Conference on Enterprise Systems, At Limassol, Cyprus 10.1109/ES.2018.00040.

Davis, W. S., & Yen, D. C. (Eds.). (2019). The information system consultant\\\\\\'s handbook: Systems analysis and design. CRC press.

Diamantopoulou, V., Tsohou, A., & Karyda, M. (2019). From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. In Computer Security (pp. 238-257). Springer, Cham.

Khan, M. (2017). Computer security in the human life. International Journal of Computer Science and Engineering (IJCSE), 6(1), 35-42.

Lenghel, R. D., & Vlad, M. P. (2017). INFORMATION SYSTEMS AUDITING. Quaestus, (11), 178.

Manaseer, S., & Alawneh, A. (2019). ON CYBERSECURITY AUDITING AWARENESS: CASE OF INFORMATION AND COMMUNICATION TECHNOLOGY SECTOR. International Journal of Computer Science and Information Security (IJCSIS), 17(7).

Suduc, A. M., Bîzoi, M., & Filip, F. G. (2010). Audit for information systems security. Informatica Economica, 14(1), 43.

Studyspark

Study Document Study Document

Challenges In Management Facing Transformational Leaders Service

Pages: 5 (1606 words) Sources: 5 Document Type:Annotated Bibliography Document #:57833590

Annotated bibliography: Management and accounting Challenges facing Transformational Leaders: Service and Technology
Carreiro, H., & Oliveira, T. (2019). Impact of transformational leadership on the diffusion of innovation in … formulating and empirically testing a model based on transformational leadership elements as well as diffusion of innovation model phases, utilizing PLS technique and information from as many as 154 companies, for studying the implementation of novel technology, namely MCC (mobile cloud computing). Factors like corporate vision, supportive … and identifying the personal needs of others (both indications of offering individual support), have been linked strongly to the implementation of a major information systems innovation like MCC. It reveals that understanding the effect of the leadership element individually on innovation dissemination is important, instead of retaining them … comprehensive construct. The authors conclude that empathetic, efficient leadership, right from the vision stage to the stage of institutionalization, proves crucial to adopt information……

References

References

Al Ahmad, S., Easa, N. F., & Mostapha, N. (2019). The Effect of Transformational Leadership on Innovation: Evidence from Lebanese Banks. European Research Studies Journal, 22(4), 215-240.

Aldholay, A. H., Isaac, O., Abdullah, Z., & Ramayah, T. (2018). The role of transformational leadership as a mediating variable in DeLone and McLean information system success model: The context of online learning usage in Yemen. Telematics and Informatics, 35(5), 1421-1437.

Carreiro, H., & Oliveira, T. (2019). Impact of transformational leadership on the diffusion of innovation in firms: Application to mobile cloud computing. Computers in Industry, 107, 104-113.

Zappalà, S., & Toscano, F. (2019). Transformational leadership and innovation adoption: Is there a moderation role of personal initiative and job control?. Psychologica, 119.

Zhang, Y., Zheng, J., & Darko, A. (2018). How does transformational leadership promote innovation in construction? The mediating role of innovation climate and the multilevel moderation role of project requirements. Sustainability, 10(5), 1506.

Studyspark

Study Document Study Document

Walt Disney

Pages: 12 (3606 words) Sources: 1 Document Type:Case Study Document #:25870152

...Accounting information systems Disney Studios and the Online Streaming Wars
1
Disney was at its best when it was not just Eisner but rather the triumvirate of Eisner, Wells and Katzenberg. The three complemented one another well, but individually and on their own they could not recreate the same magic. Thus, strategy formulation and implementation has to start with the question of who is calling the shots and making the decisions at Disney? Who is bringing the vision? What is the vision? This has to be clearly defined and it has to be directional. Once the direction is defined, the parenting strategy has to be defined: this is the “manner in which management coordinates activities, transfers resources, and cultivates capabilities among product lines and business units” (Wheelan, Hunger, Hoffman & Bamford, 2010, p. 5). The strategy has to focus on what the company is doing with its human capital. Intangible assets are human……

References

References

Wheelen, T. L., Hunger, J. D., Hoffman, A. N., & Bamford, C. E. (2010). Strategic management and business policy. Upper Saddle River, NJ: Prentice Hall.

Studyspark

Study Document Study Document

Banking Industry Crimes

Pages: 6 (1933 words) Sources: 6 Document Type:Essay Document #:73861053

… crimes in the said industry.
From a general perspective, financial crimes involving banks could be inclusive of, but they are not limited to; information and identity theft, insider trading, money laundering, electronic crime, and fraud. These could be perpetrated by both employees and their collaborators as well … same fraudulent activity, there are a number of suggestions that I would make. To begin with, I would recommend that the bank implements systems and processes of red-flagging accounts that could have possibly been compromised. The system should ideally cover credit card, savings, as well as checking ……

References

References

Albrecht, W.S., Albrecht, C.C., Albrecht, C.O. & Zimbelman, M.F. (2008). Fraud Examination (3rd ed.). Mason, OH: Cengage Learning.

Dionne, B. (2020). Regions Bank Teller Accused of Stealing Customer Identities Faces Felony Charges. Retrieved  https://www.wbrc.com/2020/01/30/regions-bank-teller-accused-stealing-customer-identities-facing-felony-charges/ 

Golden, T.W., Skalak, S.L. & Clayton, M.M. (2006). A Guide to Forensic Accounting Investigation. Hoboken, NJ: John Wiley & Sons.

Krancher, M., Riley, R. & Wells, T.J. (2010). Forensic Accounting and Fraud Examination. Hoboken, NJ: John Wiley & Sons.

Singleton, T.W., Singleton, A.J. & Bologna, R.J. (2006). Fraud Auditing and Forensic Accounting (3rd ed.). Hoboken, NJ: John Wiley & Sons.

Zagaris, B. (2010). International White Collar Crime: Cases and Materials. New York, NY: Cambridge University Press.

Studyspark

Study Document Study Document

Impact Of Agency Theory

Pages: 8 (2453 words) Sources: 7 Document Type:Essay Document #:36993165

...Accounting information systems Agency Theory
Agency theory refers to the relationship with the principle and the agent, where the principle delegates its financial decision making to the agent. In most cases, the agent is the owner/executive of the company while the principle is the shareholder. Challenging scenario arises as there are two distinct sets of interest which cause decision making problems. Due to this complex and intricate relationship, conflicts of interest arises sometimes where the agent puts his interest before the principle’s causing problems to the principle sometimes. This is known as Principle-Agency Problem. It has long affected the key decisions related to the firm where the agent and principle both have asymmetric interest, causing any one party to suffer at an extreme case.
To remove the problem, the theory states that the goals of managers and the shareholders should be aligned and certain frameworks and practices should be adopted to overlook the……

References

References

Demsetz, R. S. (1997). Agency Problems and Risk Taking at Banks.

Heath, J. (n.d.). Uses and Abuses of Agency Theory. Business Ethics Quarterly.

Kuypers, A. (2011). How is dealt with the agency problem and what is the role of the board of directors in it?

Lumen. (n.d.). Agency and Conflicts of Interests. Lumen. Retrieved from  https://courses.lumenlearning.com/boundless-finance/chapter/agency-and-conflicts-of-interest/ 

Murray, I. (2016, September ). Wells Fargo and the Principle Agent Problem. Competitive Enterprise Institute.

Palia, D. (2007). “Agency Theory in Banking: An Empirical Analysis of Moral Hazard and the Agency Costs of Equity. Banks and Banks System.

Pennsylvania, W. U. (2017, August 08). Wells Fargo: What It Will Take to Clean Up the Mess. Wharton University of Pensylvannia.

Studyspark

Study Document Study Document

Understanding The Factors Affecting The Success Of Credit Risk In

Pages: 11 (3237 words) Sources: 15 Document Type:Research Paper Document #:41178734

...Accounting information systems Introduction
The banking business sector is enormously impacted by the perceptive and imperceptive factors in an intensely competitive environment. In recent times, this competition has stiffened all the more with the advancement of globalization. In each regard of their business operations, banks ought to take effective measures in order to diminish risk by pinpointing the prospective causes based on real-world circumstances. Imperatively, the banking sector is deemed to be a significant source of financing for several companies and entrepreneurs. In the past decade, there have been dramatic changes concerning the management of risk in the banking industry. Progressively more financial institutions and managers have augmented the focus on the significance of risk management. In delineation, risk management encompasses the practice of identifying, assessing and listing of risks followed by organized and cost-effective application of resources to curtail, supervise and control the probability and influence of disastrous events or to capitalize……

References

References

Bhattarai, Y. R. (2016). Effect of credit risk on the performance of Nepalese commercial banks. NRB Economic Review, 28(1), 41-64.

Das, A. and Ghosh, S. (2007). Determinants of Credit Risk in Indian State-owned Banks: An Empirical Investigation. Economic Issues, 12(2): 48-66.

Derelio?lu, G., & Gürgen, F. (2011). Knowledge discovery using neural approach for SME’s credit risk analysis problem in Turkey. Expert Systems with Applications, 38(8), 9313-9318

Garr, D. K. (2013). Determinants of credit risk in the banking industry of Ghana. Developing Country Studies, 3(11), 64-77.

Gizaw, M., Kebede, M., & Selvaraj, S. (2015). The impact of credit risk on profitability performance of commercial banks in Ethiopia. African Journal of Business Management, 9(2), 59-66.

Johnson, B., & Christensen, L. (2008). Educational research: Quantitative, qualitative, and mixed approaches. New York: Sage.

Kithinji, A. M. (2010). Credit risk management and profitability of commercial banks in Kenya. (Doctoral dissertation, University of Nairobi).

Limam, I. (2001). Measuring technical efficiency of Kuwaiti banks. Kuwait: Arab Planning Institute.

Studyspark

Study Document Study Document

Advantages And Disadvantages Of Interrelationships Between Organizational

Pages: 16 (4728 words) Sources: 28 Document Type:Essay Document #:81594345


Organizational Functions
The functions of an organization take into account the different aspects undertaken by the business including production or manufacturing, marketing, sales, accounting as well as research and development. In accordance to Sherman and Thompson (2019), the organizational structure delineates the relationship and interrelations between the … is, if an organization has dissimilar lines of production, the department for every line of production has its own functional groups, for instance, accounting, research and development, and marketing (Jones, 2013). The advantage of this is that every division of the organization has the staff to undertake … adversely impacted by plenty of redundancy or inefficiency. A fitting instance is the aspect of having to manage six different human resources or accounting operations, instead of a single, centralized operation. This implies that there is repetition of functions, systems of management, development of policies and others (Daft, 2015).
Matrix Organizational Structure
The……

References

References

Air India. (2019). Board of Directors. Retrieved from:  http://www.airindia.in/board-of-directors.htm 

Aquinas, P. G. (2008). Organization structure and design. India: Excel Books India.

Burns, T., & Stalker, G. M. (2005). Mechanistic and organic systems. Organizational Behavior, 2, 214-25.

Choo, S., & Bowley, C. (2007). Emerald Article: Using training and development to affect job satisfaction. Journal of Small Business and Enterprise Development, 14(2),339 - 352.

Cichocki, P., & Irwin, C. (2014). Organization design: A guide to building effective organizations. Kogan Page Publishers.

Civil Aviation. (2019). About Us: Organizational Setup. Retrieved from:  http://www.civilaviation.gov.in/en/aboutus/orgsetup 

Cunliffe, A. L. (2008). Organization theory. New York: Sage.

Cunliffe, A. L., & Luhman, J. T. (2012). Key concepts in organization theory. New York: Sage.

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".