The Emerald Research Register for this journal is available at www.emeraldinsight.com/researchregister The current issue and full text archive of this journal is available at www.emeraldinsight.com/0268-6902.htm Anatomy of computer accounting frauds A. Seetharaman, M. Senthilvelmurugan and Rajan Periyanayagam Faculty of Management, Multimedia University, Malaysia Keywords Fraud, Corruption, Financial reporting, Whistleblowing, Internal control, Corporate governance Abstract This paper introduces
Words: 8560 - Pages: 35
environments to maintains security, by monitoring employees and to deter theft. There are laws set in place to also protect the privacy tof employee’s personnel records, including personal data, medical information and health status, social security numbers, background screenings information, financial and everything else that could invade a persons privacy. Is Herman's need to know whether his salespersons are honest a sufficient ground for utilizing electronic surveillance? The answer
Words: 4553 - Pages: 19
Production Supervisor: Graphic Design: Production & Layout: Patricia M. Trainor, J.D. Susan E. Prince, J.D. Elaine V. Quayle Isabelle B. Smith Catherine A. Downie Sherry Newcomb This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If legal advice or other expert assistance is required, the services of
Words: 23795 - Pages: 96
workers| ANS: d PTS: 1 REF: p. 7 BLM: Remember 3. Which of the following is an example of an employer’s responsibility under OH&S legislation? a.|providing financial support for injured workers | b.|cleaning up the workplace before an inspection | c.|conducting research on health and safety issues| d.|preparing a written occupational health and safety policy | ANS: d PTS: 1 REF: p. 12 BLM: Remember 4. According to the text, what was the primary reason that supervisors on construction
Words: 2411 - Pages: 10
Heidegger: Firstly and most of the time we are not scientists. Science only starts when the equipment breaks down. Consequence: Technology precedes science. Both historically and logically. Don Ihde: ”All science is technoscience” ”No instruments, no science” 20 Heidegger: Die Frage nach der Technik Another iconic contribution to the philosophy of technology. Most often as a punching bag. Many criticize Heidegger’s attempt to talk about the ”Technik” in singular. But when connected
Words: 5229 - Pages: 21
in the Workplace. In this modern world is difficult to determine where our private life begins and ends and where our work life start, through the years we have seen how employees sometimes take advantage of the resources available to them in their workplace and use them for personal gain, this has led the company to have better control of the activities performed during employee work hours, such as phone calls and internet use. Employees are accustomed to using the technology made available
Words: 1248 - Pages: 5
Your family is your greatest treasure and your home your safest citadel from the unwanted influences of the world. That's why monitoring software to track and log internet and computer use is a necessity. It lets you block and filter a host of influential content that could prove harmful to your children's development and the overall peace of your home. Just knowing that monitoring software is installed on your computer can keep users honest. Everything from pornography to explicit gore, violent
Words: 5031 - Pages: 21
Coombs Eastern Illinois University Previous research based on Situational Crisis Communication Theory (SCCT) suggests that an organization’s past crises history affects the reputational threat posed by a current crisis when that crisis results from intentional acts by the organization. The study reported on in this article provides a wider test of crisis history to better assess its role in crisis communication. Results from the present investigation showed that a history of similar crises intensified
Words: 11305 - Pages: 46
creates a race between the major manufacturers. A connected watch got several elements differentiating it from other existing watches. As its name indicates, it is connected to the web or a smartphone. Generally, the watch uses Bluetooth or Wi-Fi technology to allow the connection with your phone, or a
Words: 2344 - Pages: 10
on Mercy Corps (INGO) By Hazar Jaber Supervisor Dr. Sami Abou-Al-Ross A dissertation plan submitted in partial fulfillment of the requirements for the degree of Master of Business Administration Dec 2014 * Introduction Many research studies have shown that leaders have a strong effect on their subordinates’ behavior and attitudes (Van Dam, Oreg & Schyns, 2008). This relationship is often referred to as the Leader-Member Exchange (LMX) relationship, which demonstrates the
Words: 2367 - Pages: 10