-
Wenlin Zhou commented on the post, Week 5 Questions, on the site 8 years, 1 month ago
The detective controls is to mitigate employees theft and fraud. security cameras and guards at the assembly line. The guards will be responsible to check employee lunch boxes and others bags. This is an effective method to monitor the inventory.
-
Wenlin Zhou commented on the post, Week 5 Questions, on the site 8 years, 1 month ago
I strongly agree with you, the surprise inventory count is an effective way to detect fraud. Your employees cannot prepare the inspection. This way can help you to easily find and control fraud.
-
Wenlin Zhou posted a new activity comment 8 years, 1 month ago
As consumers we encounter (knowingly and unknowingly) inventory controls all the time (e.g. locked jewelry cases). What are 1-2 less obvious inventory control measures used. Are these measures effective?
Don’t get caught with too much inventory. “Afraid of being caught short, it’s easy to spend too much on inventory, which can eat up worki…[Read more]
-
Wenlin Zhou commented on the post, Week 5 Questions, on the site 8 years, 1 month ago
Controls are important in all the OTC processes including shipping. What would be different in the controls of a purely domestic company vs. an international company? Give 1 – 2 specific examples.
The one different area in the international corporation is about the shipment Tracking. The shipment process may be lost the products or product d…[Read more]
-
Wenlin Zhou posted a new activity comment 8 years, 1 month ago
Assume the ‘One Piece at a Time’ video scenario could happen. If you are the operations manager responsible for the assembly line, what 1-2 key controls would you implement? Explain how the control addresses the risk.
To monitor the inventory of supplies, materials and products needs to be accurate in order for your business to run eff…[Read more]
-
Wenlin Zhou posted a new activity comment 8 years, 1 month ago
Using the Fraud Triangle analyze the ‘One Piece at a Time’ video scenario and explain how the environment was favorable to Fraud.
This video is actually a song, One Piece at a Time, the singer,Johnny, worked assembly line in GM at Detroit when he leave home. He went a car, but he cannot buy it. So he decided to steal auto parts every day unt…[Read more]
-
Wenlin Zhou commented on the post, Week 4 & 5 Questions, on the site 8 years, 1 month ago
Absolutely, I agree with you Kshirsagar. The more complex password policy will increase the number of people forgetting their password. This is also a challenge for the help desk service, how to solve it problem. If the password provide some information reminder, it will reduce the frequency of customers to forget their password.
-
Wenlin Zhou commented on the post, Week 4 & 5 Questions, on the site 8 years, 1 month ago
Absolutely, OS software make our user life better and feel more convenient, The Operating System is the heart of your computer, without it your computer can run.
-
Wenlin Zhou commented on the post, Week 4 & 5 Questions, on the site 8 years, 1 month ago
I agree with you, the disaster recovery plan is significant. Business vulnerabilities are ever increasing and every organization is compelled to make appropriate disaster recovery plans and use advanced technology to keep its network secure and stable. Network-reliant companies find it an absolute necessity to frame disaster recovery policies and…[Read more]
-
Wenlin Zhou commented on the post, Week 4 & 5 Questions, on the site 8 years, 1 month ago
absolutely, critical data or central database system can be accessed through the operating system within an organization. It would be catastrophic for a competitor to obtain confidential files. therefore, protecting operation system is significant
-
Wenlin Zhou commented on the post, Week 4 Questions, on the site 8 years, 1 month ago
I strongly agree with Alexandra. The person also need the communication skills. Ability to work effectively in a diverse work group and to achieve results through team efforts. Ability to perform in a high pressure environment and/or crisis situation and render good decisions to resolve the problems, maintain safety and ensure adherence to…[Read more]
-
Wenlin Zhou commented on the post, Week 4 Questions, on the site 8 years, 1 month ago
I agree with you, Apple pay also has its own vulnerabilities. Apply Pay need your credit card information, when you add your new card. Apple Pay can always be hacked, and be targeted. However, Apple Pay is significant to make our process of payment convenient.
-
Wenlin Zhou commented on the post, Week 4 Questions, on the site 8 years, 1 month ago
I strongly agree with you, The quotation and order entry are most vulnerable. The company can use the SAP software to mitigate the risk ,and the company also can use the Point of Sale system to mitigate the risk.
-
Wenlin Zhou commented on the post, Weekly Question #8: Complete by November 2, 2017, on the site 8 years, 1 month ago
Absolutely, I agree with you. The shipping process has higher risk for the serious fraud. From my personal experience, I did not receive my product or I receive others products. I believe log management and analysis can track such delivery problems.
-
Wenlin Zhou posted a new activity comment 8 years, 1 month ago
Article: US Issues Federal Security Guidance on Self-Driving Cars
In its most comprehensive statement yet on autonomous vehicles, the US Department of Transportation has issued a 15-point set of federal safety assessment guidelines covering issues like cybersecurity, black box recordings and how a vehicle would deal with potential ethical…[Read more]
-
Wenlin Zhou posted a new activity comment 8 years, 1 month ago
HDFC Bank is one of the leading private banks of India. This case analysis will focus on the question, what are the security challenges in online banking, and I will provide a recommendation.
Online banking is an electronic payment system that enables customers of a bank or other financial institution to conduct a range of financial t…[Read more] -
Wenlin Zhou posted a new activity comment 8 years, 1 month ago
List common control issues associated with operating systems and remediation strategy/plan.
Blue Screen of Death (BSoD)
Many people think of blue as a calming color; however, when it comes up on your computer screen with a bunch of white text, it probably has the opposite effect. The blue screen of death (BSoD or STOP Error) may appear to be o…[Read more] -
Wenlin Zhou posted a new activity comment 8 years, 1 month ago
Why is so important to protect operating systems?
One of the key aspects of modern computing systems is the ability to allow many users to share the
same facilities. These facilities may be memory, processors, databases, or software such as compilers or subroutines. When diverse users share common items, one is naturally concerned with…[Read more] -
Wenlin Zhou posted a new activity comment 8 years, 1 month ago
How could this happen in the world of Sox and other regulations?
U.S. law requires banks to enforce “Know Your Customer” guidelines, whereby accounts are opened only by “genuine” customers, with documentation that establishes identity and legality of funds.
Just one example of how punishing whistleblowers is against the law: after the Enron…[Read more]
-
Wenlin Zhou posted a new activity comment 8 years, 1 month ago
What key (1-2) competencies does the person responsible in a company for the Order to Cash (OTC) need to have? Why?
Strong interpersonal and leadership skills. Positive, self-motivated and an exceptional desire to win. Superior people skills: team-oriented, fast learner and personable understanding of business requirements and…[Read more]
- Load More