{"id":130,"date":"2015-01-05T23:19:23","date_gmt":"2015-01-06T04:19:23","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5208sp2015\/?page_id=130"},"modified":"2019-01-15T22:10:53","modified_gmt":"2019-01-16T03:10:53","slug":"week-4-cybersecurity-and-fraud","status":"publish","type":"page","link":"https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/acl\/week-4-cybersecurity-and-fraud\/","title":{"rendered":"ACL Fundamentals"},"content":{"rendered":"<h3><strong>Required Reading(s)\/Viewing(s)<\/strong><\/h3>\n<ol>\n<li>Albrecht, Zimbelman Ch 5 \u2013 Recognizing the Symptoms of Fraud<\/li>\n<li><a href=\"http:\/\/www.xbrlsite.com\/2013\/Samples\/DetectingAccountingAnomalies.pdf\">Hoffman, C. (2013). Detecting Accounting Anomalies Using Structured Information. In: Digital Financial Reporting (XBRLSITE.COM)<\/a>.<\/li>\n<li><a href=\"http:\/\/community.mis.temple.edu\/mis5208sp18\/files\/2018\/01\/DetectingAccountingAnomalies.pdf\">Detecting Accounting Anomalies (Local Copy)<\/a><\/li>\n<li>Coderre Ch 6<\/li>\n<\/ol>\n<h3>Optional Reading(s)\/Viewing(s)<\/h3>\n<ol>\n<li>Video:\u00a0Iv, Kieng. (2015). <a href=\"https:\/\/www.youtube.com\/watch?v=CBtmxxLwusg\">Introduction to ACL Analytics \u2013 Module 1 (What is ACL?)<\/a><\/li>\n<li>Video:\u00a0Iv, Kieng. (2015). <a href=\"https:\/\/www.youtube.com\/watch?v=LQrxs6Hfp_8\">Introduction to ACL Analytics \u2013 Module 2 (Importing Data)<\/a><\/li>\n<li>Video:\u00a0Iv, Kieng. (2015). <a href=\"https:\/\/www.youtube.com\/watch?v=Fr76gj8In0k\">Introduction to ACL Analytics \u2013 Module 1 (Classifying and Summarizing Data)<\/a><\/li>\n<\/ol>\n<p>This is a services of 8 videos. All of the videos can be found <a href=\"https:\/\/www.youtube.com\/watch?v=CBtmxxLwusg&amp;list=PLjrXzkmqZGHJeeBy6JuGcS3MYWXgGcOZY\">HERE<\/a>. \u00a0These are for version 11 a later version of the software, however, they are useful.<\/p>\n<ol>\n<li>Infographic: <a href=\"http:\/\/www.aba.com\/Press\/PublishingImages\/CyberSecurity14_Infographic.jpg\">Banks and Cyber Security<\/a><\/li>\n<li>Monograph: Ferrara, Edward. (2014).\u00a0<a href=\"http:\/\/community.mis.temple.edu\/mis5208sp2016\/files\/2015\/01\/Detecting_Cyberthreats_Wi.pdf\">Detecting Cyberthreats With Fraud-Based Advanced Analytics Technology<\/a>.\u00a0Forrester Research.<\/li>\n<li>Presentation: Beierly, Ingrid. (2008). <a href=\"http:\/\/community.mis.temple.edu\/mis5208sp2016\/files\/2015\/01\/Cyber-Security_August-2008_final_sanitized.pdf\">Cyber Security_August 2008<\/a>. VISA.<\/li>\n<li>Video: (2013). <a href=\"https:\/\/www.youtube.com\/watch?v=rBbcep1rYEk\">The Lifecycle of Cybercrime<\/a>. RSA Conference<\/li>\n<\/ol>\n<h3>Optional Reading\/Viewing<\/h3>\n<ol>\n<li>Infographic: American Bankers Association. (2014).<a href=\"http:\/\/www.aba.com\/Press\/PublishingImages\/CyberSecurity14_Infographic.jpg\"> Cybersecurity Infographic<\/a>. American Bankers Association.<\/li>\n<li>Website:\u00a0The Credit Line. (2014). <a href=\"http:\/\/www.thecreditline.com\/issue\/banking-on-secure-data\/#consumer-views\" target=\"_blank\" rel=\"noopener\">Banking on Secure Data<\/a>. The Credit Line.<\/li>\n<li>Website: United States Federal Bureau of Investigation. (2016). <a href=\"http:\/\/www.fbi.gov\/wanted\/cyber\" target=\"_blank\" rel=\"noopener\">Wanted by The FBI: Cyber&#8217;s Most Wanted<\/a>. United States Federal Bureau of Investigation.<\/li>\n<\/ol>\n<h3>Lecture Notes<\/h3>\n<h4>PDF<\/h4>\n<p><a href=\"http:\/\/community.mis.temple.edu\/mis5208sp18\/files\/2015\/01\/MIS-5208-LA04a-Data-Aquisition.pdf\">MIS 5208 &#8211; LA04a &#8211; Data Acquisition<\/a><\/p>\n<p><a href=\"http:\/\/community.mis.temple.edu\/mis5208sp18\/files\/2015\/01\/MIS-5208-LA04b-Working-with-Data.pdf\">MIS 5208 &#8211; LA04b &#8211; Working with Data<\/a><\/p>\n<p><a href=\"http:\/\/community.mis.temple.edu\/mis5208sp18\/files\/2015\/01\/MIS-5208-LA04c-Fundamentals.pdf\">MIS 5208 &#8211; LA04c &#8211; Fundamentals<\/a><\/p>\n<p><a href=\"http:\/\/community.mis.temple.edu\/mis5208sp18\/files\/2015\/01\/MIS-5208-LE05-Fraud-Symptoms.pdf\">MIS 5208 &#8211; LE05 &#8211; Fraud Symptoms<\/a><\/p>\n<h3>WebEx<\/h3>\n<p>Available on Google Drive:<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Required Reading(s)\/Viewing(s) Albrecht, Zimbelman Ch 5 \u2013 Recognizing the Symptoms of Fraud Hoffman, C. (2013). Detecting Accounting Anomalies Using Structured Information. In: Digital Financial Reporting (XBRLSITE.COM). Detecting Accounting Anomalies (Local Copy) Coderre Ch 6 Optional Reading(s)\/Viewing(s) Video:\u00a0Iv, Kieng. (2015). Introduction to ACL Analytics \u2013 Module 1 (What is ACL?) Video:\u00a0Iv, Kieng. (2015). Introduction to ACL [&hellip;]<\/p>\n","protected":false},"author":21825,"featured_media":0,"parent":2085,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"full-width-content","footnotes":""},"class_list":{"0":"post-130","1":"page","2":"type-page","3":"status-publish","5":"entry"},"_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/wp-json\/wp\/v2\/pages\/130","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/wp-json\/wp\/v2\/users\/21825"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/wp-json\/wp\/v2\/comments?post=130"}],"version-history":[{"count":2,"href":"https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/wp-json\/wp\/v2\/pages\/130\/revisions"}],"predecessor-version":[{"id":4479,"href":"https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/wp-json\/wp\/v2\/pages\/130\/revisions\/4479"}],"up":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/wp-json\/wp\/v2\/pages\/2085"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/wp-json\/wp\/v2\/media?parent=130"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}