EIM and it’s main types Lecture 5 Wurood H.
1 / 1

EIM and it’s main types Lecture 5 Wurood H.

Author : celsa-spraggs | Published Date : 2025-05-28

Description: EIM and its main types Lecture 5 Wurood H Albayati Enterprise Risk Management ERM Enterprise Risk Management ERM may be defined as a process effected by a Board of Directors management and other personnel applied in strategy

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "EIM and it’s main types Lecture 5 Wurood H." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Transcript:EIM and it’s main types Lecture 5 Wurood H.:
EIM and it’s main types Lecture 5 Wurood H. Albayati Enterprise Risk Management (ERM) Enterprise Risk Management (ERM) may be defined as a process, effected by a Board of Directors, management and other personnel, applied in strategy setting and across the enterprise, designed to identify potential events that may affect the Enterprise, to provide reasonable assurance regarding the achievement of Enterprise objectives. BPA gives substantial benefits to enterprises. However, it should be noted that it does have some inherent risks which should be understood. The risks are classified below: Input & Access: All input transaction data may not be accurate, complete and authorized. File & Data Transmission: All files and data transmitted may not be processed accurately and completely, due to network error. Data: Master data and transaction data may be changed by unauthorized personnel due to weak access control. Processing: Valid input data may not have been processed accurately and completely due to program error or bugs. Output: Is not complete and accurate due to program error or bugs and is distributed to unauthorized personnel due to weak access control. Infrastructure: All data & programs could be lost if there is no proper backup in the event of a disaster and the business could come to a standstill. Financial & accounting system Every accounting systems stores data in two ways: Master Data and Non-Master Data (or Transaction Data) as shown in the Fig. Master Data: Relatively permanent data not expected to change frequently ( e.g. employee name, account no., …etc). Non-Master Data: Non-permanent data and expected to change frequently( the amount of money, student degree, quantity of a material in store, …etc.). Front End & Back End These two words are used by software people again and again. Let us understand these two words in a simple language. Front End – It is part of the overall software which actually interacts with the user who is using the software. Back End – It is a part of the overall software which does not directly interact with the user, but interact with Front End only. A Non-Integrated System is a system of maintaining data in a decentralized way. Each department in an enterprise shall maintain its own data separately and not in an integrated way. This is the major problem with non-integrated systems. The problems that could occurs in non integrated system are: Communication Gaps Mismatched Data Communication between different

Download Document

Here is the link to download the presentation.
"EIM and it’s main types Lecture 5 Wurood H."The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Presentations

Effective Inventory Management Inc Effective Replenishment ParametersBy Jon SchreibfederEffective Invento EIM Help Entering Field ReplicatesVersion 1.3August 2013Field replicat Packet PWE3 – Efficient for IP/MPLS (CPA) figures.  EIM’s cost-effective insurance renewal Clinches Silver Prize at the BES 9 EIM environmental information management PROFORMA܄OR܂EIMBURSEMENT܃F܌TIPEND EIM Help Bacteria Too Numerous to Count (TNTC)Version 1.0November 2013 EIM Turkey Identify the four main types of abuse EIM and it s main types EIM Dr. Wurood Albayati Business process quality