A key control concern described in Table 8.2 (pp. 274–275) regarding the systems development manager is that “systems development can develop and implement systems without management approval.” Discuss a control described in this chapter that reduces the risk that unauthorized systems will be implemented.
We need at least 10 more requests to produce the solution.
0 / 10 have requested this problem solution
The more requests, the faster the answer.