Internal Control Weakness in Bell Studio's Accounting System
VerifiedAdded on 2023/03/17
|11
|3047
|65
AI Summary
This report discusses the internal control weakness in the accounting system of Bell Studio, a supplier of art materials. It examines the weaknesses in the purchasing, cash disbursement, and payroll systems, and identifies the associated risks. Mitigation strategies are also discussed.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: STRATEGIC INFORMATION SYSTEMS
Strategic Information Systems
Name of Student-
Name of University-
Author’s Note-
Strategic Information Systems
Name of Student-
Name of University-
Author’s Note-
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1STRATEGIC INFORMATION SYSTEMS
Executive Summary
This below discussed report consists of the working accounting process of the Bell
Studio. The Bell Studio consist of three different system that are explained in this
report related to the accounting system in the organization. Each of the processes
are explained in this report and states the internal control weakness that each of the
system processes in the organization. The internal control weakness of all the
systems are described in this system describing their mitigation process in the
system. All the mitigation processes are explained in this report.
Executive Summary
This below discussed report consists of the working accounting process of the Bell
Studio. The Bell Studio consist of three different system that are explained in this
report related to the accounting system in the organization. Each of the processes
are explained in this report and states the internal control weakness that each of the
system processes in the organization. The internal control weakness of all the
systems are described in this system describing their mitigation process in the
system. All the mitigation processes are explained in this report.
2STRATEGIC INFORMATION SYSTEMS
Table of Contents
Introduction...................................................................................................................3
Data flow Diagram of Purchase and Cash Disbursement System...............................3
Data flow Diagram of Payroll System...........................................................................3
System Flowchart of System........................................................................................3
System Flowchart of Cash Disbursement system........................................................3
System Flowchart of Payroll System............................................................................3
Internal Control Weakness and Risks Associated.......................................................3
Conclusion....................................................................................................................3
Table of Contents
Introduction...................................................................................................................3
Data flow Diagram of Purchase and Cash Disbursement System...............................3
Data flow Diagram of Payroll System...........................................................................3
System Flowchart of System........................................................................................3
System Flowchart of Cash Disbursement system........................................................3
System Flowchart of Payroll System............................................................................3
Internal Control Weakness and Risks Associated.......................................................3
Conclusion....................................................................................................................3
3STRATEGIC INFORMATION SYSTEMS
Introduction
The background of the Bell Studio is taken in this report as case study. This
studio deals as a supplier of art materials. For conducting its processes, Bell Studio
has transaction cycles in which the vendors and the suppliers of the company are
paid for their supplies. The organization is an Adelaide based company of art
supplies. The manufacturers of the company are from different locations.
The company mainly has an accounting system that is centralized at all the
location of Bell Studio. The expenditure of the Bell Studio has different procedures
such as purchasing system, Cash disbursement system, and Payroll System. This
report describes different transaction cycles of the Bell Studio, the financial; reporting
system carried out in Bell Studio and the management system of the organization.
As the system of the Bell studio is based on the computer-based system, there is a
need to include many control processes that are to be included to overcome the
weakness of the current ERP system in the organization. This report defines all such
internal weakness of the system and states the steps that are to be taken to
overcome those problems.
Data flow Diagram of Purchase and Cash Disbursement System
Figure 1: Data Flow Diagram
(Source: Created By author)
Introduction
The background of the Bell Studio is taken in this report as case study. This
studio deals as a supplier of art materials. For conducting its processes, Bell Studio
has transaction cycles in which the vendors and the suppliers of the company are
paid for their supplies. The organization is an Adelaide based company of art
supplies. The manufacturers of the company are from different locations.
The company mainly has an accounting system that is centralized at all the
location of Bell Studio. The expenditure of the Bell Studio has different procedures
such as purchasing system, Cash disbursement system, and Payroll System. This
report describes different transaction cycles of the Bell Studio, the financial; reporting
system carried out in Bell Studio and the management system of the organization.
As the system of the Bell studio is based on the computer-based system, there is a
need to include many control processes that are to be included to overcome the
weakness of the current ERP system in the organization. This report defines all such
internal weakness of the system and states the steps that are to be taken to
overcome those problems.
Data flow Diagram of Purchase and Cash Disbursement System
Figure 1: Data Flow Diagram
(Source: Created By author)
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4STRATEGIC INFORMATION SYSTEMS
Data flow Diagram of Payroll System
Figure 2: Data Flow Diagram
(Source: Created By author)
Description: The DFDs shown above are the purchasing system of Bell
Studio about how they purchases materials from the different manufacturers. The
data flow of the cash disbursement is also shown in this report that show the
disbursement of cash to the vendors and the third system whose data flow is sown in
the report is the payroll system by which the employees are paid.
In the purchasing system and the cash disbursement system, there are
processes, database store and the input/output processes that describes the
purchasing system and the cash disbursement system of the Bell Studio. According
to the diagram, the clerk responsible for purchasing first checks the inventory and if
the inventory needs to be refilled, the clerk picks up a supplier from the supplier
database and place the order through mail. Again when the materials comes from
the supplier at the receiving center. The receiving clerk checks the supplier invoice
and the purchasing receipt and forwards the receipt to the cash disbursement
department for paying the cheque to the supplier.
The seconds diagram shows the working process of the payroll system
carried out in Bell Studio. The working process of the purchasing system starts with
the checking the time card of the employees and when the time card is checked, the
time is entered in the record book and cheque is forwarded to the supervisors for the
distribution. The cheque is also forwarded to the bank with the total amount of payroll
Data flow Diagram of Payroll System
Figure 2: Data Flow Diagram
(Source: Created By author)
Description: The DFDs shown above are the purchasing system of Bell
Studio about how they purchases materials from the different manufacturers. The
data flow of the cash disbursement is also shown in this report that show the
disbursement of cash to the vendors and the third system whose data flow is sown in
the report is the payroll system by which the employees are paid.
In the purchasing system and the cash disbursement system, there are
processes, database store and the input/output processes that describes the
purchasing system and the cash disbursement system of the Bell Studio. According
to the diagram, the clerk responsible for purchasing first checks the inventory and if
the inventory needs to be refilled, the clerk picks up a supplier from the supplier
database and place the order through mail. Again when the materials comes from
the supplier at the receiving center. The receiving clerk checks the supplier invoice
and the purchasing receipt and forwards the receipt to the cash disbursement
department for paying the cheque to the supplier.
The seconds diagram shows the working process of the payroll system
carried out in Bell Studio. The working process of the purchasing system starts with
the checking the time card of the employees and when the time card is checked, the
time is entered in the record book and cheque is forwarded to the supervisors for the
distribution. The cheque is also forwarded to the bank with the total amount of payroll
5STRATEGIC INFORMATION SYSTEMS
that is to be given to the employees. The cheque that is sent to the ledger
department for their sign and is then sent to the bank in their imperest account.
System Flowchart of Purchasing System
Figure 3: System Flowchart
(Source: Created By author)
System Flowchart of Cash Disbursement system
Figure 4: System Flowchart
(Source: Created By author)
that is to be given to the employees. The cheque that is sent to the ledger
department for their sign and is then sent to the bank in their imperest account.
System Flowchart of Purchasing System
Figure 3: System Flowchart
(Source: Created By author)
System Flowchart of Cash Disbursement system
Figure 4: System Flowchart
(Source: Created By author)
6STRATEGIC INFORMATION SYSTEMS
System Flowchart of Payroll System
Figure 5: System Flowchart
(Source: Created By author)
Description: The flowchart of the systems are shown in the diagram above.
The system flowchart includes three systems of the Bell Studio that is carried out in
the account system. Figure 3 shows the system flowchart of the purchasing system,
figure 4 shows the system flowchart of the cash disbursement system and the figure
5 shows the system flowchart of the payroll system.
The purchasing system is shown by the procedure of the system and the
decision is shown in a decision box in the diagram. In the purchasing system,
decision is taken whether to place an order with the suppliers. If the inventory is
empty, then only the system will proceed. All the details of the procedures of the
purchasing system are shown in diagram. The cash disbursement shows all the
procedures that are taken to make payment to the suppliers of the system. The
payment is made through cheque and are sent to the suppliers through email. The
thirds diagram in this report depicts the payroll system about how the employees are
being paid from the company. The system states the payroll system about the
procedure that is undertaken to pay the employees associated with the operation of
the business. The employees are also paid through cheques after verifying their time
cards which shows their working hours in office. The payroll system includes sending
the payroll cheque to the bank’s imperest account so that the employees are able to
withdraw their salary from the bank. The treasurer of account payable department
signs the cheque and sends to the bank.
Internal Control Weakness and Risks Associated
Internal control Weakness of Purchasing department:
1. The first weakness of the purchasing department is occurring of data breach
in the system (Wellin 2016). When the purchasing system is being carried out
in the system, all the related data are stored in the centralized system. There
System Flowchart of Payroll System
Figure 5: System Flowchart
(Source: Created By author)
Description: The flowchart of the systems are shown in the diagram above.
The system flowchart includes three systems of the Bell Studio that is carried out in
the account system. Figure 3 shows the system flowchart of the purchasing system,
figure 4 shows the system flowchart of the cash disbursement system and the figure
5 shows the system flowchart of the payroll system.
The purchasing system is shown by the procedure of the system and the
decision is shown in a decision box in the diagram. In the purchasing system,
decision is taken whether to place an order with the suppliers. If the inventory is
empty, then only the system will proceed. All the details of the procedures of the
purchasing system are shown in diagram. The cash disbursement shows all the
procedures that are taken to make payment to the suppliers of the system. The
payment is made through cheque and are sent to the suppliers through email. The
thirds diagram in this report depicts the payroll system about how the employees are
being paid from the company. The system states the payroll system about the
procedure that is undertaken to pay the employees associated with the operation of
the business. The employees are also paid through cheques after verifying their time
cards which shows their working hours in office. The payroll system includes sending
the payroll cheque to the bank’s imperest account so that the employees are able to
withdraw their salary from the bank. The treasurer of account payable department
signs the cheque and sends to the bank.
Internal Control Weakness and Risks Associated
Internal control Weakness of Purchasing department:
1. The first weakness of the purchasing department is occurring of data breach
in the system (Wellin 2016). When the purchasing system is being carried out
in the system, all the related data are stored in the centralized system. There
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7STRATEGIC INFORMATION SYSTEMS
is a risk of getting data breach in the system when the data is uploaded in the
cloud.
2. All the data are stored in the computer centralized system and that is an
internal flow in the system. There might be problem of dealing with the
computers in the system.
3. While recording the data in the centralized system, the information or the data
uploaded might be incorrect information. The clerk might upload the
information mistakenly in the system.
Risks Associated with purchasing system:
1. Potential Fraud: The first risk that is associated with the purchasing system is
the potential fraud risks. The centralized system is dependent on the
computers and that might lead to large problems in Bell Studio. Storing all the
data on the cloud of the accounting centralized system, there is a risk of
hacking the financial data of the system.
2. Technical Risks: there might be several issues while dealing with the
computer systems. While uploading the purchasing receipt or the invoice in
the system, there might be power outage in the organization (Quirke 2017).
There might be computer virus and computer might stop working because of
the virus.
3. Incorrect information: There might be a risk of uploading incorrect information
in the system as there is clerk has the responsibility to all those works. It is
human error and human error might occur accidently in the system.
Internal control Weakness of Cash disbursement system:
1. The weakness of the cash disbursement department is occurring of data
breach in the system. When the cash disbursement department is being
carried out in the system, all the related data are stored in the centralized
system (Woerkom et al. 2016). There is a risk of getting data breach in the
system when the data is uploaded in the cloud.
2. All the data are stored in the computer centralized system and that is an
internal flow in the system. There might be problem of dealing with the
computers in the system.
3. While recording the data in the centralized system, the information or the data
uploaded might be incorrect information. The clerk might upload the
information mistakenly in the system.
Risks Associated with cash disbursement system:
1. System Crash: The first risk that is associated with the cash disbursement
system is the potential fraud risks (Upward and Jones 2016). The centralized
system is dependent on the computers and that might lead to large problems
in Bell Studio. Storing all the data on the cloud of the accounting centralized
system, there is a risk of hacking the financial data of the system.
2. Malicious Hacks: there might be several issues while dealing with the
computer systems (Thompson 2017). While uploading the purchasing receipt
or the invoice in the system, there might be power outage in the organization.
There might be computer virus and computer might stop working because of
the virus.
3. Reducing physical audits: There might be a risk of uploading incorrect
information in the system as there is clerk has the responsibility to all those
is a risk of getting data breach in the system when the data is uploaded in the
cloud.
2. All the data are stored in the computer centralized system and that is an
internal flow in the system. There might be problem of dealing with the
computers in the system.
3. While recording the data in the centralized system, the information or the data
uploaded might be incorrect information. The clerk might upload the
information mistakenly in the system.
Risks Associated with purchasing system:
1. Potential Fraud: The first risk that is associated with the purchasing system is
the potential fraud risks. The centralized system is dependent on the
computers and that might lead to large problems in Bell Studio. Storing all the
data on the cloud of the accounting centralized system, there is a risk of
hacking the financial data of the system.
2. Technical Risks: there might be several issues while dealing with the
computer systems. While uploading the purchasing receipt or the invoice in
the system, there might be power outage in the organization (Quirke 2017).
There might be computer virus and computer might stop working because of
the virus.
3. Incorrect information: There might be a risk of uploading incorrect information
in the system as there is clerk has the responsibility to all those works. It is
human error and human error might occur accidently in the system.
Internal control Weakness of Cash disbursement system:
1. The weakness of the cash disbursement department is occurring of data
breach in the system. When the cash disbursement department is being
carried out in the system, all the related data are stored in the centralized
system (Woerkom et al. 2016). There is a risk of getting data breach in the
system when the data is uploaded in the cloud.
2. All the data are stored in the computer centralized system and that is an
internal flow in the system. There might be problem of dealing with the
computers in the system.
3. While recording the data in the centralized system, the information or the data
uploaded might be incorrect information. The clerk might upload the
information mistakenly in the system.
Risks Associated with cash disbursement system:
1. System Crash: The first risk that is associated with the cash disbursement
system is the potential fraud risks (Upward and Jones 2016). The centralized
system is dependent on the computers and that might lead to large problems
in Bell Studio. Storing all the data on the cloud of the accounting centralized
system, there is a risk of hacking the financial data of the system.
2. Malicious Hacks: there might be several issues while dealing with the
computer systems (Thompson 2017). While uploading the purchasing receipt
or the invoice in the system, there might be power outage in the organization.
There might be computer virus and computer might stop working because of
the virus.
3. Reducing physical audits: There might be a risk of uploading incorrect
information in the system as there is clerk has the responsibility to all those
8STRATEGIC INFORMATION SYSTEMS
works. It is human error and human error might occur accidently in the system
(Safari, Faraji and Majidian 2016).
Internal control Weakness of payroll system:
1. The weakness of the payroll system is that the management is based on the
maintained records that are related to the financial as well as cost accounting
system.
2. All the data are stored in the computer centralized system and that is an
internal flow in the system (Quirke 2017). There might be problem of dealing
with the computers in the system.
3. While recording the data in the centralized system, the information or the data
uploaded might be incorrect information (Luftman, Lyytinen and Zvi, 2017).
The clerk might upload the information mistakenly in the system.
Risks Associated with payroll system:
1. Biased Interpretation: The risk that is associated with the payroll system is the
potential fraud risks (Korableva and Kalimullina, 2016). The centralized
system is dependent on the computers and that might lead to large problems
in Bell Studio. Storing all the data on the cloud of the accounting centralized
system, there is a risk of hacking the financial data of the system.
2. Maintains record manually: there might be several issues while dealing with
the computer systems. While uploading the purchasing receipt or the invoice
in the system, there might be power outage in the organization. There might
be computer virus and computer might stop working because of the virus.
3. Having different skills: There might be a risk of uploading incorrect information
in the system as there is clerk has the responsibility to all those works
(Haynes 2015). It is human error and human error might occur accidently in
the system.
Conclusion
Centralized based computing system is the particular type of architecture in
which all the working process is being performed by only one central server. The
centralized system mainly enables to have computing resource, the management
system, and the and-ministration system in the central server of the organization.
The responsibility of the central server is mainly responsible for delivering the
application logic, provides the computing resources and includes the processing in
the system.
The centralized system that is used by the Bell Studio mainly includes the
client and server architecture where all the computer systems at different locations
are connected with the central server. The working system of the Bell Studio is
discussed in the report above. The system consists of the transaction system, the
management system, and reporting the financial system of the organizations. The
networks of the systems are connected to a network to a particular central server
that helps the organization to process the computations. As all the nodes are
primarily dependent on central server for accessing the application, computing,
internet storage, security and storage within the system, there are many pitfalls in the
system. The systems on the Bell Studio are to investigate those issues and find out
works. It is human error and human error might occur accidently in the system
(Safari, Faraji and Majidian 2016).
Internal control Weakness of payroll system:
1. The weakness of the payroll system is that the management is based on the
maintained records that are related to the financial as well as cost accounting
system.
2. All the data are stored in the computer centralized system and that is an
internal flow in the system (Quirke 2017). There might be problem of dealing
with the computers in the system.
3. While recording the data in the centralized system, the information or the data
uploaded might be incorrect information (Luftman, Lyytinen and Zvi, 2017).
The clerk might upload the information mistakenly in the system.
Risks Associated with payroll system:
1. Biased Interpretation: The risk that is associated with the payroll system is the
potential fraud risks (Korableva and Kalimullina, 2016). The centralized
system is dependent on the computers and that might lead to large problems
in Bell Studio. Storing all the data on the cloud of the accounting centralized
system, there is a risk of hacking the financial data of the system.
2. Maintains record manually: there might be several issues while dealing with
the computer systems. While uploading the purchasing receipt or the invoice
in the system, there might be power outage in the organization. There might
be computer virus and computer might stop working because of the virus.
3. Having different skills: There might be a risk of uploading incorrect information
in the system as there is clerk has the responsibility to all those works
(Haynes 2015). It is human error and human error might occur accidently in
the system.
Conclusion
Centralized based computing system is the particular type of architecture in
which all the working process is being performed by only one central server. The
centralized system mainly enables to have computing resource, the management
system, and the and-ministration system in the central server of the organization.
The responsibility of the central server is mainly responsible for delivering the
application logic, provides the computing resources and includes the processing in
the system.
The centralized system that is used by the Bell Studio mainly includes the
client and server architecture where all the computer systems at different locations
are connected with the central server. The working system of the Bell Studio is
discussed in the report above. The system consists of the transaction system, the
management system, and reporting the financial system of the organizations. The
networks of the systems are connected to a network to a particular central server
that helps the organization to process the computations. As all the nodes are
primarily dependent on central server for accessing the application, computing,
internet storage, security and storage within the system, there are many pitfalls in the
system. The systems on the Bell Studio are to investigate those issues and find out
9STRATEGIC INFORMATION SYSTEMS
proper mitigation techniques to improve their accounting information system. The
operation of the organization is explained in the report. All the weakness of the
above stated three system are explained in this report defining the mitigation process
of the system.
References
Duncan, R.A.K. and Whittington, M., 2016. Enhancing cloud security and privacy: the
power and the weakness of the audit trail. CLOUD COMPUTING 2016.
Gallemore, J. and Labro, E., 2015. The importance of the internal information
environment for tax avoidance. Journal of Accounting and Economics, 60(1), pp.149-
167.
Haislip, J.Z., Masli, A., Richardson, V.J. and Sanchez, J.M., 2015. Repairing
organizational legitimacy following information technology (IT) material weaknesses:
Executive turnover, IT expertise, and IT system upgrades. Journal of Information
Systems, 30(1), pp.41-70.
Haynes, P., 2015. Managing complexity in the public services. Routledge.
Heeks, R., 2017. Information technology, information systems and public sector
accountability. In Information Technology in Context: Studies from the Perspective of
Developing Countries (pp. 201-219). Routledge.
Hockerts, K., 2015. How hybrid organizations turn antagonistic assets into
complementarities. California Management Review, 57(3), pp.83-106.
Ji, X.D., Lu, W. and Qu, W., 2017. Voluntary disclosure of internal control weakness
and earnings quality: Evidence from China. The International Journal of
Accounting, 52(1), pp.27-44.
Kanodia, C. and Sapra, H., 2016. A real effects perspective to accounting
measurement and disclosure: Implications and insights for future research. Journal
of Accounting Research, 54(2), pp.623-676.
Khan, T. and Gray, R., 2016. Accounting, identity, autopoiesis+ sustainability: A
comment, development and expansion on Lawrence, Botes, Collins and Roper
(2013). Meditari Accountancy Research, 24(1), pp.36-55.
Korableva, O.N. and Kalimullina, O.V., 2016, September. Strategic approach to the
optimization of organization based on BSC-SWOT matrix. In 2016 IEEE International
Conference on Knowledge Engineering and Applications (ICKEA) (pp. 212-215).
IEEE.
Luftman, J., Lyytinen, K. and Zvi, T.B., 2017. Enhancing the measurement of
information technology (IT) business alignment and its influence on company
performance. Journal of Information Technology, 32(1), pp.26-46.
Quirke, B., 2017. Making the connections: using internal communication to turn
strategy into action. Routledge.
Rao, Y., Guo, K.H. and Chen, Y., 2015. Information systems maturity, knowledge
sharing, and firm performance. International Journal of Accounting & Information
Management, 23(2), pp.106-127.
proper mitigation techniques to improve their accounting information system. The
operation of the organization is explained in the report. All the weakness of the
above stated three system are explained in this report defining the mitigation process
of the system.
References
Duncan, R.A.K. and Whittington, M., 2016. Enhancing cloud security and privacy: the
power and the weakness of the audit trail. CLOUD COMPUTING 2016.
Gallemore, J. and Labro, E., 2015. The importance of the internal information
environment for tax avoidance. Journal of Accounting and Economics, 60(1), pp.149-
167.
Haislip, J.Z., Masli, A., Richardson, V.J. and Sanchez, J.M., 2015. Repairing
organizational legitimacy following information technology (IT) material weaknesses:
Executive turnover, IT expertise, and IT system upgrades. Journal of Information
Systems, 30(1), pp.41-70.
Haynes, P., 2015. Managing complexity in the public services. Routledge.
Heeks, R., 2017. Information technology, information systems and public sector
accountability. In Information Technology in Context: Studies from the Perspective of
Developing Countries (pp. 201-219). Routledge.
Hockerts, K., 2015. How hybrid organizations turn antagonistic assets into
complementarities. California Management Review, 57(3), pp.83-106.
Ji, X.D., Lu, W. and Qu, W., 2017. Voluntary disclosure of internal control weakness
and earnings quality: Evidence from China. The International Journal of
Accounting, 52(1), pp.27-44.
Kanodia, C. and Sapra, H., 2016. A real effects perspective to accounting
measurement and disclosure: Implications and insights for future research. Journal
of Accounting Research, 54(2), pp.623-676.
Khan, T. and Gray, R., 2016. Accounting, identity, autopoiesis+ sustainability: A
comment, development and expansion on Lawrence, Botes, Collins and Roper
(2013). Meditari Accountancy Research, 24(1), pp.36-55.
Korableva, O.N. and Kalimullina, O.V., 2016, September. Strategic approach to the
optimization of organization based on BSC-SWOT matrix. In 2016 IEEE International
Conference on Knowledge Engineering and Applications (ICKEA) (pp. 212-215).
IEEE.
Luftman, J., Lyytinen, K. and Zvi, T.B., 2017. Enhancing the measurement of
information technology (IT) business alignment and its influence on company
performance. Journal of Information Technology, 32(1), pp.26-46.
Quirke, B., 2017. Making the connections: using internal communication to turn
strategy into action. Routledge.
Rao, Y., Guo, K.H. and Chen, Y., 2015. Information systems maturity, knowledge
sharing, and firm performance. International Journal of Accounting & Information
Management, 23(2), pp.106-127.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10STRATEGIC INFORMATION SYSTEMS
Safari, H., Faraji, Z. and Majidian, S., 2016. Identifying and evaluating enterprise
architecture risks using FMEA and fuzzy VIKOR. Journal of Intelligent
Manufacturing, 27(2), pp.475-486.7
Salterio, S.E., 2015. Barriers to knowledge creation in management accounting
research. Journal of Management Accounting Research, 27(1), pp.151-170.
Sun, Y., 2016. Internal control weakness disclosure and firm investment. Journal of
Accounting, Auditing & Finance, 31(2), pp.277-307.
Thompson, J.D., 2017. Organizations in action: Social science bases of
administrative theory. Routledge.
Upward, A. and Jones, P., 2016. An ontology for strongly sustainable business
models: Defining an enterprise framework compatible with natural and social
science. Organization & Environment, 29(1), pp.97-123.
Van Woerkom, M., Mostert, K., Els, C., Bakker, A.B., De Beer, L. and Rothmann Jr,
S., 2016. Strengths use and deficit correction in organizations: Development and
validation of a questionnaire. European Journal of Work and Organizational
Psychology, 25(6), pp.960-975.
Wellin, M., 2016. Managing the psychological contract: Using the personal deal to
increase business performance. Routledge.
Zimmermann, S., Rentrop, C. and Felden, C., 2016. A multiple case study on the
nature and management of shadow information technology. Journal of Information
Systems, 31(1), pp.79-101.
Safari, H., Faraji, Z. and Majidian, S., 2016. Identifying and evaluating enterprise
architecture risks using FMEA and fuzzy VIKOR. Journal of Intelligent
Manufacturing, 27(2), pp.475-486.7
Salterio, S.E., 2015. Barriers to knowledge creation in management accounting
research. Journal of Management Accounting Research, 27(1), pp.151-170.
Sun, Y., 2016. Internal control weakness disclosure and firm investment. Journal of
Accounting, Auditing & Finance, 31(2), pp.277-307.
Thompson, J.D., 2017. Organizations in action: Social science bases of
administrative theory. Routledge.
Upward, A. and Jones, P., 2016. An ontology for strongly sustainable business
models: Defining an enterprise framework compatible with natural and social
science. Organization & Environment, 29(1), pp.97-123.
Van Woerkom, M., Mostert, K., Els, C., Bakker, A.B., De Beer, L. and Rothmann Jr,
S., 2016. Strengths use and deficit correction in organizations: Development and
validation of a questionnaire. European Journal of Work and Organizational
Psychology, 25(6), pp.960-975.
Wellin, M., 2016. Managing the psychological contract: Using the personal deal to
increase business performance. Routledge.
Zimmermann, S., Rentrop, C. and Felden, C., 2016. A multiple case study on the
nature and management of shadow information technology. Journal of Information
Systems, 31(1), pp.79-101.
1 out of 11
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.