Preventing Runaway IT Projects: Protecting Auditors from Entrapment

نویسنده

  • Joan CheneyMann
چکیده

More and more often, accounting professionals are being included on information systems project teams in an oversight role. One aspect of this role is to determine when a project is too dysfunctional to be continued. This study examined whether the accounting education received by students is adequate in this area through the use of an innovative research approach (conjoint analysis) that examines the decision to continue as if it was a consumer purchasing decision. The results show that accounting majors are often entrapped into continuing projects for reasons other than what is best for the organization.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Empirical Evaluation of Predicting Runaway Software Projects Using Bayesian Classification

Since software development projects often fall into runaway situations, detecting signs of runaway status in early stage of development has become important. In this paper, we propose a new scheme for the prediction of runaway projects based on an empirical questionnaire. We first design a questionnaire from five viewpoints within the projects: requirements, estimations, planning, team organiza...

متن کامل

Query Auditing for Protecting Max/Min Values of Sensitive Attributes in Statistical Databases

In this paper, we define a novel setting for query auditing, where instead of detecting or preventing the disclosure of individual sensitive values, we want to detect or prevent the disclosure of aggregate values in the database. More specifically, we study the problem of detecting or preventing the disclosure of the maximum (minimum) value in the database, when the querier is allowed to issue ...

متن کامل

پیش‌بینی فرار دختران با استفاده از مدل پنج عامل بزرگ شخصیت

AbstractObjectives: The aim of this study was to predict girls’ runaway from home using the five factor model of personality. Method: In a retrospective study, 37 runaway girls who were incarcerated and kept by relevant organizations, were selected using convenience sampling. Considering the mean age of the runaway girls, 37 single females residing in middle to low socioeconomic neigh-borhood i...

متن کامل

Protecting Spreadsheets Against Fraud

Previous research on spreadsheet risks has predominantly focussed on errors inadvertently introduced by spreadsheet writers i.e. it focussed on the “end-user aspects” of spreadsheet development. When analyzing a faulty spreadsheet, one might not be able to determine whether a particular error (fault) has been made by mistake or with fraudulent intentions. However, the fences protecting against ...

متن کامل

Explanation vs Performance in Data Mining: A Case Study with Predicting Runaway Projects

Often, the explanatory power of a learned model must be traded off against model performance. In the case of predicting runaway software projects, we show that the twin goals of high performance and good explanatory power are achievable after applying a variety of data mining techniques (discrimination, feature subset selection, rule covering algorithms). This result is a new high water mark in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003