SPRING 2013
Review quizzes, in class materials, slides, discussion questions, articles, and book 1. Where does IT belong? 2. Business unit leaders perspective? 3. Discuss delivering IT to vs. through business. 4. Innovative vs. enterprise IT 5. Cloud computing 6. Definition? 7. 3 types 8. What is the added value of Cloud Computing, i.e. benefits, to firms? 9. What are some of the issues/concerns regarding Cloud Computing? 10. Explain the 3 auditing related standards: SAS 70 (replaced), PCI DSS, HIPAA 11. SSAE 16? 12. You see the reflections of these principles on firms via their adoption of social media. Can you think of the risks and benefits (3 each)? a. What are some of the concerns from compliance perspective? i. Data privacy, Security breaches, Client favoritism, Transparency 13. How should you tap into social media? 14. Offshoring 15. Offshoring vs. outsourcing 16. Benefits 17. Risks and regulatory concerns 18. How do you decide between in house and offshore decisions 19. Discuss different (4) “Threats to AIS” 20. Consequences of security breaches 21. Legal 22. Regulatory 23. Business reputation, competition, etc. 24. Discuss SOX impact on security issues: What are implications for management and accountants? 25. Define the following: b. Email and IM redirectors c. Web Trojan d. Hostname Lookup e. Pharming f. Proxy Attack 26. What are 3 possible ways security attacks can occur? What is Denial of Service? 27. What were the issues with TJX’s security? 28. What is business-IT misalignment? 29. According to the Sound-Off article, why is it so difficult to align 30. What additional reasons cause misalignment (i.e. that disrupts the IT Maturity Model)? 31. According to the CIO Office article, a) what are some of the new IT implementation trends? b) IT is perceived? c) Any other changes?
------------------------------------------------------
Exam 2 32. Instance documents: 33. Well formed vs. valid 34. UBL instance doc (note: after root, elements vary with respect to the type of UBL) 35. XBRL instance doc (note: after root, there is certain structure until you start listing the facts) 36. Schema What is a schema document? Purpose? 37. Its relation to “valid” rule? 38. Know how to create (via fill in the blanks) a UBL instance document by looking at its schema (vice versa) 39. Be able to map UBL instance document to schema (and vice versa) 40. XBRL instance documents 41. Types of elements that is found in XBRL instance documents 42. E.g. see LAB exercises 43. Know how to create (via fill in the blanks) an XBRL instance document by filling in the blanks for 5 elements…remember context element has multiple nested elements, so don’t get confused. 44. Know the definitions of these