-
Yulun Song posted a new activity comment 8 years, 1 month ago
2. Which portion of the Order to Cash (OTC) process do they see as the most vulnerable to theft, fraud or failure of some kind? Explain.
I think the most vulnerable to theft, fraud or failure is the customer payments. Amazon will cancel the order if the payment authorization does not succeed and/or in cases of fraud, meaning once Amazon sees…[Read more]
-
Yulun Song posted a new activity comment 8 years, 1 month ago
1. As customers we experience various company’s order to cash process (OTC) whenever we buy something. Which company do you believe has a ‘great’ OTC process? Why?
As a loyal customer of Amazon, I think it has a great OTC process based on my 4+ years’ experience. For example, when I add a product to my shopping cart and check out, Amazon…[Read more]
-
Yulun Song's profile was updated 8 years, 1 month ago
-
Yulun Song changed their profile picture 8 years, 1 month ago
-
Yulun Song's profile was updated 8 years, 1 month ago
-
Yulun Song created the site Yulun Song 8 years, 1 month ago
-
Yulun Song commented on the post, Week 3 Questions, on the site 8 years, 1 month ago
Totally agreed! And good explanations for each term listed above. Completeness is the most important than other terms because first thing you have to do is to make sure that all information and data recorded appropriately.
-
Yulun Song commented on the post, Week 3 Questions, on the site 8 years, 1 month ago
Ming, Thank you for mentioning the case of WorldCom in your discussion. They cooked the book by removing data from income statements, leading huge influence and fraudulence.
-
Yulun Song commented on the post, Week 3 Questions, on the site 8 years, 1 month ago
thank you for your sharing Weng Ting,it is so true that management should provide accurate assertion first to avoid further auditing or other related works.
-
Yulun Song commented on the post, Week 3 Questions, on the site 8 years, 1 month ago
Yu Ming, Thank you for your sharing. In my opinion, completeness is more important than accuracy in this topic. a business or an organization needs to record all events first and make sure the completeness of all information or data related to the event. and then other terms can be involved. if a business illegally deleted some important data,…[Read more]
-
Yulun Song commented on the post, Week 3 Questions, on the site 8 years, 1 month ago
more and source from: http://www.zdnet.com/article/the-top-ten-most-common-database-security-vulnerabilities/
-
Yulun Song posted a new activity comment 8 years, 1 month ago
3. List risks associated with database management systems (DBMS)
1) Data leaks
2) Stolen database backups-internal steals
3) lack of consistency
4) deployment failures-lack of due care
5) lack of segregation-segregation duties -
Yulun Song posted a new activity comment 8 years, 1 month ago
2. Key benefits of relational databases vs traditional file system?
The benefits of relational database are:
Relational database has multiple tables and allows these tables to work together. The relationships between table data can be collated, merged and displayed in database forms. When search queries in relational database, it makes work…[Read more] -
Yulun Song posted a new activity comment 8 years, 1 month ago
1. What are key characters of relational database management systems?
The key characters of relational database are: relational term, derived relvar, tuple, attribute, SQL equivalent, table, view, query result, result set, row, column
A relation is defined as a set of tuples that have the same attributes. A tuple usually represents an object…[Read more] -
Yulun Song commented on the post, Week 3 Questions, on the site 8 years, 1 month ago
Wengting, thank you for your story. On the side of personnel, most of people would like to reduce their tax liabilities. and they also know that is illegal. plus, there are lots of companies that use legal ways to do illegal things, for example, reducing tax liabilities, avoid tickets, or other law issues. It is hard to avoid because the law can…[Read more]
-
Yulun Song posted a new activity comment 8 years, 1 month ago
In addition, Temple requires everyone to re-set his password every 6 month(I guess). and the requirement for that is:
Your password must contain:One uppercase letter
One lowercase letter
One number
8 to 15 characters longso the example will be TUowlsr#1
-
Yulun Song posted a new activity comment 8 years, 1 month ago
The article I read this week was titled “Amazon Implements Password Reset after Credentials Leaked Online.” This articled talked about that recently, a couple websites leaked customer email addresses and passwords online. So Amazon sent to Amazon customers emails to let them reset their passwords. The reason is that password re-use is rampant, and…[Read more]
-
Yulun Song posted a new activity comment 8 years, 1 month ago
What is an information risk profile? How is it used? Why is it critical to the success of an organization’s risk management strategies and activities?
An information risk profile records different kinds of information risks based on their types, amounts and priority, which measures the amount of risk that an organization wants to accept. The e…[Read more]
-
Yulun Song posted a new activity comment 8 years, 1 month ago
4. Which portion / step of the Procure to Pay process do they see as the most vulnerable to theft, fraud or failure of some kind? Explain
Based on http://blog.procurify.com/2013/04/03/the-complete-procure-to-pay-cycle/
The typical procure to pay cycle as below:
Identification of Requirement
Authorization of Purchase Request
Final Appro…[Read more] -
Yulun Song posted a new activity comment 8 years, 1 month ago
3. Have you ever:
– Been victim of Fraud?
– Had evidence of, suspicions of fraud occurring?
– Been pressured (e.g. by an employer) to commit an act that was morally or legally questionable?
ExplainI have not been victim of Fraud because I am always being careful of these kind of things to prevent happening. I am careful to use credi…[Read more]
- Load More