Threats to Accounting Information System THREATS Natural and political disasters EXAMPLES Fire of excessive heat Floods Earthquakes High wind War sion errors Software errors and equipment malfunctions Hardware failures Sofware errors or bugs Operating system crashes Power outages and fluctuation Unintentional acts Undetected data transmis Accidents caused by human carelessness, failure to follow established procedures, and poorly trained or supervised personnel Innocent erorrs or omissions Lost or misplaced data Logic erorrs Systems that do not meet company need or are incapable of handling their intended tasks Intertional acts/computer crimes Sabotage Computer fraud Emblezzlement AIS [ Romney, 2003, Page 191 ] Five Interrelated Components of COSO’s Control Model COMPONENT DESCRIPTION Control environment The core of any business is its people-their individual attributes, including integrity, ethical values, and competence-and the environment in which they operate. They are the engine that drive the organization and the foundation on which everything rests. Control activities Control policies and procedures must be established and executed to help ensure that the actions identified by managements as necessary to address risk to achivement of the organization’s objectives are efecctively carried out. Risk assessment The organization must be aware of and deal with the risk it faces. It must set objective, integrated with the sales , production, marketing, financial, and other activities so that the organization is operating in concert. It must also establish mechanism to identify, analyze, and manage the related risk. Information and communication Surrounding the control activities are information and communication system. They enable the organization’s people to capture and exchange the information needed to conduct, manage, and control its operations Monitoring The entire process must be monitored, and modifications made as necessary. In this way the system can react dynamically, changing as conditions warrant. AIS [ Romney, 2003, Page 197 ] Separation of duties Prevents employees from falsifying records in order to conceal theft of assets entrusted to them CUTODIAL FUNCTION • • • • RECORDING FUNCTION Handling cash Habdling inventories, tools, or fixed assets Writing checks Receiving checks in mail • • • • Preparing source documents Maintaining journals, ledgers, or other files Preparing reconciliations Preparing performance reports AUTHORIZATION FUNCTIONS • Prevents authorization of a fictitious or inaccurate transaction as a means of concealing asset thefts AIS [Romney, 2003, Page 203 ] Authorization of transaction Prevents an employee from falsifying record to cover up a inaccurate or false transaction that was inappropriately authrized Determine threats thst confront company Estimate the risk,or probably,of each threat occuring Estimate the exposure, or potential loss,from each threat Identify set of controls to guard againts threat Estimate costs and benefits from instituting controls NO Is it cost benefical to protect system from threat YES Implement set of controls to guard againts threat AIS [ Romney, 2003, Page 208 ] General Reliability Controls THREAT/RISK CONTROL Is does not support business strategies, poor resource use, information need not met or can’t be paid for Multiyer strategic plan that is periodically evaluated, research and development group to asess emerging technologies impact on business operations, budgets to support plan. Developing a system reliability plan Inability to reliability system Assign plan responsibilty to toplevel manager;continuosly review and update plan; identify, document, and test user reliability requirements and performance objectives, policies, and standards; identify and review all new or changed legal requirements; log user request for change; document, analyze, dan reports system reliability problems; determine ownership, custody, access, and maintenance responsibility of information resources; develop security awarenes programm and communicate it to all existing employess; require new employee to sign security agreement; perform risk assessment for all changes to system environment. Documentation Ineffective design, operation, review, audit, and modification of systems Administrative documentation [standards and procedures for data processing, analisis, design, programming, file handling and strorage], system documentation [ application inputs,processing steps, outputs, error handling ], operating documentation [equipment configuration, programs, files, setup and execution procedures, corrective actions]. CONTROL CATEGORY Strategic budgeting planning dan AIS [ Romney, 2003, Page 227 ] Availability Controls ensure CONTROL CATEGORY THREATS/RISK CONTROLS Minimizing system downtime System outages or failure that interrupts critical business operations, loss or destruction of data Policies and procedures to handle outages, erorrs, los or destruction of data, and other problems; disaster and business interruption insurance; regular preventive maintenance on key components; uninterrupted power system; fault tolerance. Disaster recovery plan Prolonged interruption of data processing and business operating due to fire , natural disarter, sabotage, or vandalism Coordinator’s responsibility is to implement a plan, determine recovery priorities assign responbility for recovery activities, document and test plan, countinuosly review and revise plan; remote storage of backup data and program files [electronic vaulting, grandfather-father-son], procedures for recovering lost or destroyed files [ checpoint and roll-back] insurance, coverage, backup computer and telecommunications facilities [reciprocal agreements, hot and cold sites, duplicate hardware, sofware, and data strorage devices] AIS [ Romney, 2003, Page 230 ] Key Security Control CONTROL CATEGORY THREATS/RISK CONTROLS Computer fraud Clearly divide authority and responsibility among system administration, network, management,security management, change management, users, systems analiyst, programmer, computer operators, information systems librarian, and the data control group. Physical access controls Damage to computers and files; authorized access to confidential data Put computers in locked rooms; restrict access to authorized personnel; maintain a few securely locked and carefully monitored entrances; require proper empoyee ID; require visitors to sign along as they enter and leave the site; use a security alarm system; restrict acess to private, secured telephone lines, authorized terminals, and PC’s; install lock on PC’s and other computer devices; restrict access to offline programs, data, dan equipment; locate, critical system components away from hazardous materials; install fire and smoke detectors and fire extinguishers. Logical access controls Unauthorized access to systems software, applicatian programs, data files, and other system resources Data security classifications [no restrictions, employees only, owners and top management only,etc], determine access privilleges of emloyees and outsider, review activities of those who can read, add, delete, and change data. Recognize users by what they know [pasword, pin, answer to personal questions], or possess [ ID card, active badge ], or by personal CONTROL CATEGORY THREATS/RISK CONTROLS Segregation of systems function duties in characteristics [figureprints, voice patterns, retina prints, facial patterns, signature dynamics, and keyboarding patterns], compatibility checks, access control matrix. Protection computers network Internet controls and of personal andclient/server Damage to the computer files and equipment; unautorized access to confidential data; users who are not security conscious Inventory PC’s and uses, tailor security to risk and exposure, train users in PC’ control, lock disk drives, label with unremovable tags,limit data stored, or downloaded, prohibit personal software or copying company software for personal uses, keep sensitive data in secure environtment, automatically shut down idle network PC’s, back up hard drives reguraly , encrypt or password protect file, wipe disks clean with utility program, place protective walls around operating system, boot PC’s within a security system, use multilevel passsword conrol,employe specialists or security programs to detect holes in a network, audit and record security breaches. e-commerce Damage to data files and equipment; unauthorized access to confindential data Passwords, encryption,routing vertification virus detection software fairwalls, tunneling,electronic envelopes, deny employees access to the internet, and internet servers not connected to other company computers. AIS [Romney, 2003, Page 236 ] Key Maintainability Controls CONTROL CATEGORY Project development acquisition controls and Change management controls AIS [ Romney, 2003, Page 247 ] Key Integrity Control THREATS/RISK CONTROL System development projects consume exercessive resource Long-range strategic master plan, data processing schedules, assignment of each project to a manager and team, project development plan, project milestones, performance evaluations, system performance measurements/throughput, utilization, response time, and post-implementation reviews System development projects consume excessive resources, unauthorized systems change Change management control policies and procedures, periodic review of all systems for needed changes, standardized format for change, long and review change requests, assess impact of change on system reliability, categorize and rank all changes, procedures to handle urgent matters, communicate changes to management and users, management approval of changes, assign specific responsibilities while maintaining adequate segregation of duties, control system access rights, make sure change go through all appropriate steps, test all changes, develop plan for backing out of mission-critical system change, implement a quality assurance function, and update documentation and procedures. CONTROLS CONTROL CATEGORY THREATS/RISK Source data controls Invalid, incomplete, inaccurate source data input or Forms design; sequentially,prenumberd forms; turnaround documents; cancelation and storage of documents; reviews for appropiate authorization; segregation of duties; visual scanning;check-digit vertification; and key vertification Input validation routines Invalid or inaccurate data in computer-processed transaction files As transaction file are processed edit programs check key data field using these edit checks; sequence, field, sign, validity, limit, range, reasonableness, redundant data, and capacity checks. Enter exceptions in an erorr log; investigate, correct, and resubmit them on a timely basist; re-edit them; and prepare a summary error report. On-line data entry controls Invalid or inaccurate transaction input entered through on-line terminals Field, limit, range, reasonableness, sign, validity, and redundant data checks; user ID’s and passwords; compatibility tests; automatic system data entry; promting operators during data entry; preformatting; completeness test; closed-loop vertification; a transaction log maintained by the system; clear error massages; and data retention sufficient to satisfy legal requirement. Data processing and storage controls Inaccurate or incomplete data in computer- processed master files Policies and procedures [governing the activities of data processing and storage personnel; data security and confidentiality, audit agreements]; monitoring and expiditing data entry by data control personal; reconciliation of system updates with control accounts or reports; reconsiliation of database totals with externally maintened totals; exception reporting, data currency CONTROL CATEGORY THREATS/ RISK CONTROL check,default values, data matching, data security [data library and librarian, back up copy of data files stored at a secure off-site location, protection againts condition that could harm stored data]; use of file label and write protection mechanisms, data base protection mechanisms [ data base administrator, data dictionaries, and cocurrent update control ]; and data conversion controls. Output controls Inaccurate or incompletes computer output Procedures to ensure that system outputs conform to the oeganization’s integrity objectives, policies, and standard; visual review of computer output; reconciliation of batch total; proper distribution of output; confidential outputs being delivered are protected from unauthorized access, modification, and misrouting; sensitive or confidential output stored in a secure,area; users review computer output for compelteness and accuracy; shred confidential output no longer needed; error and exception reports. Data transmition controls Unauthorized access to data being transmitted or to the system itself; system failures; error in data transmission Monitor nerwork to detect weak points, backup compinents, design network to handle peak processing, multiple communication paths between network components, preventive maintenance, data encryption, routing vertification [ header labels, mutual authentication schemes, callback system ], parity checking, and message acnowledment procedures [echo check, trailer labels, numbered batches]. AIS [ Romney, 2003, Page 252 ] Edit Program Transactions Transaction edit program Error report Valid transactions Correction procedure To file maintenance Reentry Rejected transactions Error corection program Corrected transaction Merge with next batch of transactions AIS [ Romney, 2003, Page 254 ] Control Procedures PROCESSING PROCEDURES CONTROL PROCEDURES Sales order document Step 1 Batch control form Assemble in batchs - Sales order documents Step 2 Deliver to EDPdepartement Batch control forms - Sales order documents Data entry process - Sales order transaction file - A AIS [ Romney, 2003, Page 263 ] Check input for proper authorization Enter record of input receipt in control log Step 3 - Control report Record count of number of sales orders Line count if number of inventory items Hash totals of quantify sold and price Financial total of dollar sales Check digit vertification of account number Check digit vertification of inventory item number Field check on quantity, date, and price Check sequence of sales order numbers Key vertification of all numric fields Reconciliation of batch totals Processing procedures Control Procedures A Contol Roport Sort and edit process Sales order transaction file A/R and inventory master file File update Shipping/ Billing document Control report Review and distribute Shipping/ Billing documents Step 4 - Step 5 - - Reconsiliation of batch totals Review of error identified by edit checks Investigation and correction of erroneous input Distribution of billing and shipping documents Recording of output distribution in control log Return of master files to file library Step 7 - AIS [ Romney, 2003,Page 264 ] Security of master files in file library Protection of master files with file labels Maintenance of backup copies of master files Validity check of costumer account number Validity check of inventory item number Sign check of inventory quanttity on hand Limit check of sale amount versus credit limit Range check on sale price Reasonableness test of quantity ordered Redundant data check on inventory data Step 6 User review Sequence check on accounnt number Limit check on quantity and price Range check on delivery date Completeness test on entire record Roconsiliation of batch totals Review errors identified by edit checks Investigation and correction of erroneous input Visual inspection of output Reconciliation of batch totals Overview of data auditing process AUDIT PLANNING Established scope and objectives Organize audit team Develop knowledge of business operations Review prior audit results Identify risk factors Prepare audit program COLLECTION OF AUDIT EVIDENCE Observation of operating activities Review of documentation Discussions with employees Questionnaires Phycsical examination of assets Confirmation through third parties Reperformance of procedures Vouching of source documents Analystical review Audit sampling EVALUATION OF AUDIT EVIDENCE Asess quality of internal controls Asess reliability of information Asess operating performance Consider need for additional evidence Consider risk factors Consider materiality factors Document audit findings COMMUNICATION OF AUDIT RESULTS Formulate audit conclutions Develop recommendations for management Prepare audit report Present audit result to management AIS [ Romney, 2003, Page 322 ] Objective 1 Overal seciurity Objective 5 source data Source Data Data Entry Objective 2 Program development and acquisition Programs Source Data Processing Files Output Objective 3 Program Modification AIS [ Romney, 2003, Page 326 ] Objective 4 Computer Processing Objective 6 Data Files COMPUTER SECURITY Typest of errors and Fraud • • • • • Theft of or accidental or intentional damage to hardware and files Loss or theft of or unauthorized access to programs,data files,and other system resources Loss or theft of or unauthorized desclosure of confidential data Unauthorized modification or use of programs and data files Interruption of crucial business actifities Control Procedures • • • • • • • • • • • Information security/protection plan Restrictions on physical access to computer equipment Logical acess controls based on password protection and other authentication procedures Data storage and transmission controls such as encryption Virus protection procedures File backup and recovery procedures Fault-tolerant system design Disaster recovery plan Preventive maintenance Firewalls Information system insurance Audit Prosedures; System Review • • • • • • • • • • • • Inspect computer sistes Review the information security/protection plan Interview information system personel about security procedures Review written documentation about physical access policies and procedures Review logical acceess policies and procedures Review file backup and recovery policies and procedures Review data storage and transmission policies and procedures Review procedures employeed to minimize system downtime Review vendor maintenance contracts Examine system access logs Examine disaster recovery plan Examine information system casualty insurance policies Audit Procedures; Test of controls • • • • Observe computer site access procedures Observe the preparation and off-site storage of backup files Review records of password assignment and modification Investigate hoe unauthorized access attempts were dealt with • • • • • • • Verify the exetent and effectiveness of data encryption use Verify the effective use of data transmission controls Verify the effective use of firewalls Verify the effective use of virus protection procedures Verity the use of preventive maintenance and uninterruptible power Verity amounts and limitations on insurance coverage Examine the result of test simulations of disaster recovery plan Compensating Controls • • • Sound personnel policies Effective user controls Segregation of incompatible duties AIS [Romney, 2003, Page 327 ] Program Development Types of Error and Fraud • • Inadvertenr programming errors Unauthorized program code Control Procedures • • • • • • • Review software license agreements Management authorization for program development and appproval of programming specifications Management authirazation of sofware acquisition User approval of programming specification Through testing of new programs User acceptance testing Complete system documentation, including approvals Audit procedures; system Review • • • • • • • • • Independent and concurrent review of the systems development process Review system development/acquisition policies and procedures Review system authorization and approval procedures Review programming evaluation standards Review program documentation standards Review program testing and test approval procedures Review procedures for ensuring all acquired softwari has a proper copyrigh licence agreement Discuss system development procedures with management, system users, and information system personnel Review final application system documentation Audit Procedures; Test of Controls • • • • • Interview users about their involvment in systems acquisition/development and implementation Review minutes of development team meeting for evidence of involvment Verify management and user sign-off at milestone point in the development process Review test specifications, test data, and results of systems tests Review software license agreements Compensating Control • • Strong processing controls Independent processing of test data by auditor AIS [ Romney, 2003, Page 328 ] Program Modification Typest of Errors and Fraud • • Inadvertent programming errors Unauthorized program code Control Procedures • • • • • • • • Listing of program components that are to be modified Management authorization and approval of program modifications User approval of program change specifications Through testing of program change, including user acceptance test Complete program change documentation, including approvals Separate development, test, and production version of program Changes implemented by personnel independent of users and programmers Logical access controls Audit Procedures; system Review • • • • • • • Review program modification policies, standards, and procedures Review documentation standards for program modification Review program modification testing and test approval procedures Discuss program modification policies and procedures with management, system users, and information systems personnel Review final documentation for some typical program modification Review test specification, test data, and results of system tests Review logical access contro policies and procedures Audit Procedures; Test of Controls • • • • • • • Verify user and information system management approval for program changes Verify that program components to be modified are identified and listed Verify that program change test procedures comply with standards Verify that program change documentation compiles with standards Verify that logical access controls are in effect for program changes Observe program change implementation and verify that [1] separate development, test, and production versions are maintained, and [2] change are not implemented by either user or programming personnel To test for unauthorized of erroneus program changes, use [1] source code comparison program, [2[ reproccesing, and [3] parallel simulation Compensating controls • • Independent audit tests for unauthorized of erroneous program changes Strong processing controls AIS [ Romney, 2003, Page 329 ] Computer Processing Controls Types or Error and Fraud • • • • • Failure to detect incorrect, incomplete, or unauthorized input data Failure to properly correct errors flagged by data editing procedures Introduction of error into files or database during updating Improper distribution or disclosure of computer output Intentional or unintentional report inaccuracies Control Procedures • • • • • • • • • Computer data editing routines Proper use of internal and external file labels Reconciliation of batch totals Effective error correction procedures Understandable operating documentation and run manuals Competent supervision of computer operation Effective handling of data input and output by data control personnel File change listings and summaries prepared for user department review Maintenance of proper environmental conditions in computer facility Audit Procedures; Systems Review • • • • • • Review administrative documentation for processing control standards Review systems documentation for data editing and other processing controls Review operating documentation for completeness and clarity Review copies of error listings, batch total reports, and file change lists Observe computer operations and data control functions Discuss processing and output controls with operators and information system supervisory personnel Audit Procedures; Test of Controls • • • • • • • • • • • • Evaluate adequacy of processing control standards and procedures Evaluate adequacy and completeness of data editing controls Verify adherence to processing control procedures by observing computer operations and the data control function Verify that selected application system output is properly distributed Reconcile a sample of batch totals, and follow up on discrepancies Trace dispotition of a sample of errors flagged by data edit routiness to ensure proper handling Verify processing accuracy for a sample of sensitive transactions Verify processing accuracy for selected computer-generated transactions Search for erroneous or unauthorized code via analysis of program logic Check accuracy and complementeness of processing controls using test data Monitor on-line processing systems using concurent audit techniques Recreate selected reports to test for accuracy and completeness Compensating Controls • • Strong user controls Effective source data controls AIS [ Romney, 2003, Page 332 ] Source Data Controls Types of errors and Fraud • • Inaccurate source data Unauthorized source data Control Procedures • • • • • • • • • • Effective handling of source data input by data control personnel User authorization of source data input Preparation and reconciliation of batch control totals Logging of the receipt, movement, and disposition of source data input Check digit vertication Key vertication Use of turnaround documents Computer data editing routines File change listings and summaries prepared for user department review Effective procedures for correcting and resubmitting errroneous data Audit Procedures; System Review • • • • • • Review documentation about responsibilities of data control function Review administrative documentation for resource data control standards Review methode of authorization and examine authorization signatures Review accounting systems documentation to identify source data content and processing steps and specific source data control used Document accounting source data countrols using an input control matrix Discuss source data control procedures with data control personnel as well as the users and managers of the system Audit Procedures; Test of Controls • • • • • • Observe and evaluate data control department operations and specific data control procedures Verify proper maintenance and use of data control log Evaluate how items recorded in the error log are dealt with Examine samples of accounting source data for proper authorization Reconcile a sample of a sample of batch totals and follow up on discrepancies Trace disposition of a sample of errors flagged by data edit routines Compensating Controls • • Strong user controls Strong processing controls AIS [ Romney, 2003, Page 336 ] Input Controls Matrix AIS [ Romney, 2003, Page 337 ] Regular hours Overtime hours Week ending/date Transaction code Input controls Finance controls Hash total Record counts Cross-footing balance Key vertification Visual inspection Check digit vertification Prenumbered forms Turnaround document Edit program Sequence check Field check Sign check Validity check Limit check Reasonableness test Redundant data check Completeness test Overflow procedure Other Department number Employee Wekkly Time Report Last name Field Names Employee number Record Name - - Comments Yes No - - All fields No No Yes - - - - - - - - - - - - - - - - Data File Controls Typest of Errors and Fraud • • Destruction of stored data due to inadvertent errors, hardware or sofware malfunctions, and intentional acts of sabotage or vandilsm Unauthorized modification or disclosure of stored data Control Procedures • • • • • • • • Secure file library and restrictions on physical access to data files Logical access controls using passwords and access control matrix Proper use of file labels and write-protection mechanisms Concurrent update controls Use of data encryption for highly confidential data Use of virus protection software Maintenance of backup copies of all data files in an off-site location Use of checkpoint and rollback to facilitate system recovery Audit Procedures; System Review • • • • • • Review documentation for functions of file library operation Review logical access policies and procedures Review operating documentation to determine prescribe standard for - Use of file labels and write-protection mechanisms - Use of virus protection software - Use of backup data storage - System recovery; including check point and rollback procedures Review systems documentation to examine prescribed procedures for - Use of concurrent update controls and data encryption - Control of file conversions - Reconciling master file totals with independent control totals Examine disaster recovery plan Discuss data file control procedures with systems managers and operators Audit Procedures; Test of Controls • • • • • • • • • Observe and evaluates file library operations Review record s of password assignment and modification Observe and evaluate file-handling procedures by operations personnel Observe the preparation and off-site storage of backup files Verify the effective use of virus protection procedures Verify the use of concurrent update controls and data encryption Verify completeness, currency, and testing of disaster recovery plan Recouncilee master file totals with separatery maintained controls totals Observe the procedures used to control file convertion Compensating • • • Strong user controls Effective computer security controls Strong processing controls AIS [ Romney, 2003, Page 338 ] Computer Audit Software FUNCTION EXPLANATION EXAMPLES Reformatting Read data in different formats and data structures, and convert to a common format and structure Read inventory records from purchasing database and convert to an inventory file by the GAS program File manipulation Sort records into sequential order; merge files sequenced on the same sort key Sort inventory records by locations; merge customer transaction file with receivables mater file Calculation Perform the flour basic arithmetic operations; add, subtract, multiply, and divide Foot client accounts receivable file; recalculate client inventory valuation; recalculate client depreciation; sum employee payroll by department Data selection Review data files to retrieve records meeting specified criteria Identify customer accounts having a balance exceeding the credit limit; select all purchase transactions in excess of a specified dollar amount Data analysis Examine records for errors or missing values; compare fields in related records for inconsistencies Perform data editing of client files; compare personnel and payroll files to verify consistency File processing Provide programming capability for file cretions; updating, and downloading to a personal computer Use paralel simulation to verify that client gross pay calculations are correct; download sample of client inventory records to personnel computer for further analisys to support inventory test counts Statistics Stratify file records by item valuation; select statistical samples; analyze statistical sampling results Stratify customer accounts by size of account balance and select a stratified sample of accounts for audit confirmation Report generation Format and print reports and documents Prepare analysis of financial statement ratios and trends; prepare accounts receivable aging schedule; prepare audit confirmations AIS [ Romney, 2003, Page 340 ] Threats and Control in the Revenue Cycle PROCESS /ACTIVITY Sales Order Entry Shipping Billing and Accounts Recevable Cash Collection THREAT APPLICABLE CONTROL PROCEDURES inaccurate Data entry edit checks 1. Incomplete or customer order 2. Credit sales to customers with poor credit Credit approval by credit manager, not by sales function; accurate records of customer account balances 3. Legitimacy of orders 4. Stockouts, carrying coasts, and markdowns Signatures on paper documents; digital signatures and digital certificates for e-business Inventory control systems 5. Shipping errors; Wrong merchandise, wrong quatities, wrong address Reconciliation of sales order with picking ticket and packing slip; bar code scanners;data entry application controls 6. Theft of inventory Restrict physical access to inventory; documentation of all internal transfers of inventory; periodic physical counts of inventory and reconciliation of counts to recorded amounts 7. Failure to bill customers Separation of shippng and billing functions; prenumbering of all shipping documents and periodic reconciliation to invoices; roconciliation of picking tickets and bills of lading with sales orders 8. Billing errors Data entry edit controls Price lists 9. Positing errors in updating accounts receivable Reconciliation of subsidiary accounts receivable ledger with general ledger; monthly statements to customers 10. Theft of cash Segregation of duties; minimization of cash handling; lockbox arrangements; prompt endorsement and deposit of all receipts; Periodic reconciliation of bank statement with records by Someone not involved in cash receipts processing General Control Issues AIS [ Romney, 2003, Page 381 ] 11. Loss of data Backup and disaster recovery procedures; access controls/physical and logical 12. Poor performance Preparation and review performance reports of Threat and Controls in the Expenditure Cycle PROCESS/ACTIVITY Order goods Receive and store goods THREAT APPLICABLE CONTROL PROCEDURES 1. Preventing stockouts and/or axcess inventory Inventory control systems; perpetual inventory records; bar code technology; periodic counts of inventory 2. Requesting items unnecessary Accurate perpetual inventory records; approval of purchase requisitions 3. Purchasing goods of inflated prices Solicit competitive bids; use of approved suppliers; approval of purchase orders; budgetary controls 4. Purchasing goods of inferior quality Use of approved vendors; approval of purchase orders; monitor vendor performance; budgetary controls 5. Purchasing from unauthorized suppliers Approval of purchase orders; restrict access to supplier master file 6. Kikcbacks Policies; require purchasing empoyees to disclose financial interests in suppliers; vendor audits 7. Receiving unordered goods Require receiving to verify existence of valid purchase order 8. Making errors in counting Use of bar coding technology; document employee performance; incentives for accurate counts 9. Stealing inventory Physical access controls; periodic count of inventory and reconciliation of physical Approve invoices and pay vendor General control AIS [ Romney, 2003, Page 435 ] 10. Failint to catch errors in vendor invoices Double-check invoice accuracy; training of accounts payable staff; use of ERS 11. Paying for received Only pay invoices supported by original receiving report; use of ERS; budgetary controls goods not 12. Failing to take available purchase discounts Proper filing; cash flow budgets 13. Paying the same invoice twice Only pay invoices supported by original voucher package; cancellation of voucher package upon payment; use of ERS; control acess to supplier master file 14. Recording and posting errors in accounts payable Various data entry processing edit controls 15. Misapproprating checks, or EFTs Restrict access to blank checks; check signing machine, and ETF transfer terminals; segregation of duties of accounts payable and cashier; reconciliation of bank account by someone independent of cash disbursement process; check protection measures including positive pay; regular review of EFT transactions cash, and 16. Losing data Backup and disaster recovery plans; physical and logical access controls 17. Performing poorly Development and periodic review of appropriate performance reports Threats and Controls in the Production Cycle PROCESS/ACTIVITY THREAT APPLICABLE CONTROL PROCEDURES Improved information about the effects of product design on coasts. Detailed data about warranty and repair costs Product design 1. Poor product design Planning and schedulling 2. Overproduction underproduction or Better production systems 3. Suboptimal fixed assets in Review and approval of fixed assets acquisitions; budgetary controls 4. Theft or distruction of inventories and fixed access Restrict physical access to inventories and fixed assets Production operations investment planning Document all movements of inventory through the production process Identification of all fixed assets Periodic physical counts inventory and fixed assets of Proper documentation and review of all transactions involving disposal of fixed assets Adequate insurance Cost accounting 5. Recording and posting errors resulting in inaccurate cost data Data entry edit controls; use of bar code scanning where feasible; reconciliation of record amounts with periodic physical counts General threats 6. Loss of data Backup and disaster recovery planning restricting access to cost data 7. Poor performance Improved and timilier reporting AIS [ Romney, 2003, Page 482 ] Threats and Controls in the Payroll/HRM Cycle PROCESS/ACTIVITY THREAT Hiring and recruiting 1. Hiring unqualified larcenous employees Payroll processing 2. Violation of employement law Through documentation of hiring procedures ; training on current developments in employement law 3. Unauthorized changes payroll master file Segregatiom of duties; HRM versus payroll and paycheck distribution; access controls; review of all changes 4. Inaccurate time data 5. Inaccurate payroll of Batch totals and other application controls; payroll clearing account; review of IRS regulations 6. Theft or fraudulent distribution of paychecks Direct deposit; paycheck distribution of payroll process; investigation of unclaimed pay check; restricted access to blank pay checks; prenumbering and periodic acounting for all paychecks; use of separate payroll checking account;\, maintained as abn imprest fund; reconciliation of payroll bank account by someone not involved in payroll processing 7. Loss or unauthorized disclosure of data Backup procedures; disaster recovery plans; physical and logical access controls; encryption of data General peocessing 8. Poor performance or APPLICABLE CONTROL PROCEDURES Sound hiring procedures; including verification of job applicant’s skills, reference and employment history to Automation of data collection; various edit checks; reconciliation of time card data with job-time ticket data Development and periodic review of appropriate performance metrics; training programs AIS [ Romney, 2003, Page 518 ] Threat and Controls in the General Ledger and Reporting Systems PROCESS/ACTIVITY THREAT APPLICABLE CONTROL PROCEDURES Updating the general ledger 1. Errors Input and processinf controls; reconciliations and control reports; audit traill Access to the general ledger 2. Loss of confidential data and/or concealment of theft Access controls; audit traill Loss or destruction of the general ledger 3. Loss of data and assetss AIS [ Romney, 2003, Page 550 ] Backup and disaster recovery procedures Advantages and Disadvantage of Data Gathering Methods ADVANTAGES DISADVANTAGES Interviews Can answer ‘why’ questions Interview can probe and follow up Questions can be clarified Builds positive ralationships with interviewe Builds acceptance and support for new system Time-consuming Expensive Personal biases ofr self-interest may produce inaccurate information Questionnaires Can be anonymous Not time-consuming Inexpensive Allows more time to think about responses Does not allow in-depth questions or answers Cannot probe or folow up on responses Questions cannot be clarified Impersonal; does not build relationships Difficult to develop Often ignored or completed superficially Observation Can verify how system actually works; rather than how it should work Results in greater understanding of system Time-consuming Expensive Difficult to interpret properly Observed people may alter behavior Systems dicumentation Describes how system should work Written from facilitates review, analysis Time consuming May not be available or easy to find AIS [ Romney, 2003, Page 589 ] AIS Objectives Usefulness Information produced by the system should help management and users in decision making Economy The benefit of system should exceed the costs Reliability The system should process data accurately and completely Availability User should be able to access the system at their convenience Timeliness Crucial information should be produced first and the less important items as time permits Customer service Courteous and efficient customer services should be provided Capacity System capacity should be sufficient to handle periods of peak operation and future growth Ease of use The system should be user-friendly Flexibility The system should accommodate reasonable operating or system requirements changes Tractability The system should be easily understood by users and designers and facilitate problem solving and future systems development Auditability Auditablility should be buit into the system from the beginning of systems development Security Only authorized users should be granted acces or allowed to change system data AIS [ Romney, 2003, Page 593 ] Hardware, Software, and Vendor Evaluation Criteria Hardware evaluation Is the cost of the hardware reasonable, based on its capabilities and features Can the hardware run the desired software Are the CPU’s processing speed and capabilities adequate for the intended use Are the secondary storage capabilities adequate Are the input and output speeds and capabiliites adequate Does the system have adequate comunication capabilities Is the system expandable Is the hardware based on the most recent technology, or on technology that is old or soon to be out of date Is the hardware available now If not, when Is the system under consideration compatible with existing hardware, software, and peripherals How do evaluation of the system’s performance compare with those of its competitors What is the availability and cost of support and maintenace What guarantees and warranties come with the system Are financing arrangements available [ If applicable] Software evaluation Does the package meet all mandatory specifications How well does the package meet desirable specifications Will program modifications be required to meet company needs Does the software contain adequate controls Is the performance [ speed, accuracy, reliability ] adequate How many other companies use the software Are other users satisfied with the package Is the package well documented Is the software compatible with existing corporate software Is the software user-friendly Can the software be demonstrated and test driven Does the software have an adequate warranty Is the software flexible and easily maintained Is on-line inquiry of files and records possible Will the vendor keep the package up-to-date Vendor evaluation AIS [ Romney, 2003, Page 618 ] How long has the vendor been in business How large is the vendor Is the vendor financially stable and secure How much experience does the vendor have with the hardware and software How well does the vendor stand behind its products../ How goods is its guarantee Does the vendor regurarly update its products Does the vendor provide financing Will the vendor put promises in a contract Will the vendor supply a list of customers as references Does the vendor have a reputation for reliability and dependability Does the vendor provide hardware and software support and maintenance Does the vendor provide implementation and installation support Does the vendor have high-quality, and experienced personnel Does the vendor provide training How responsive and timely is vendor support Output Design Considerations CONSIDERATION CONCERN Use Who will use the output, why and when do they need it, and what decisions will they need to make based on it Medium Should output be paper, screen, voice response, diskette, microfilm, or some combination of these Format The format that clearly conveys the most information should be selected [table, narrative, graphic]; for example, large volumes of data can be condensed easily into graphs that are easy to read and interpret Preprinted Should paper output be on a preprinted from, such as a check or purchse order../ Should turnaround documents be used Location Where should AIS output be sent Access Who should have access to hard copy and computer screen output Detail Lengthy output should be preceded by an executive summary and a table of contents Heading and legends organize data and highlight important items Detailed information is placed in an appendix Timeliness AIS [ Romney, 2003, Page 664 ] How often should AIS output be produced File and Database Design Considerations CONSIDERATION CONCERN Medium Should data be stored on hard drive, disk, diskette, CD, tape, or paper Organization and access Should sequential, indexed-sequential, or randomaccess methods be used Processing mode Should manual, batch, or real-time processing be used Mainenance What procedures are needed to maintain data effectively S ize How many records will be stored in the database and how large are they, How fast is the number of records expected to grow Activity level What percentage of the records will be added or deleted each year What percentage will need to be update Input Design Considerations CONSIDERATION CONCERN Medium Should AIS data be entered using a keyboard; an OCR, MIRC, or POS terminal ;EDI; OR voice input Source Where do data originate [ a compiter, customer, remote location, etc], and how does that affect data entry Format What format [source or turnaraound document, screen, source data automation] efficiently captures the data with the least effort and cost Type What is the nature of AIS data CONSISERATIONS CONCERN Volume How much data are to be entered Personnel What are the data entry operators abilities, function, and expertise../ Is additional training necessary Frequency How often does AIS data to be entered Cost How can costs be minimized without adversely affecting efficiency and accuracy Error detection and correction What errors are possible, and how can they be detected and corrected AIS [ Romney, 2003, Page 665 ] Principle of Good Forms Design General Considerations • • • • • • • • Are preprinted data used to the maximum extent possible Are the weight and grade of the paper appropriate for the planned use Are bold type, double-thick lines, and shading used appropriately to highlight different parts of the form Is the form a standard size Is the size of the form consistent with requirements for filing, binding, or mailing If the form will be mailed to external parties, is the address positioned so that the form can be used in a window envelope Are copies of the form printed in different colors to facilitate proper distribution Are this clear instructions on how to complete the form Introductory Section of Form • • • Does the same of the form appear at the top, in bold type Is the form prenumbered consecutively If the form will be distributed to external parties; are the company’s name and address preprinted on the form Main Body of Form • • • Is logically related information [e.g customer name,address] grouped together Is the ordering of data items consistent with the sequence in which those items are most likely to be acquired Are standardized explainations preprinted so that codes or check-offs can be used instead of requiring written user entries Conclution Section of Form • • • • • Is space provide to record the final disposition of the form Is space provide for a signature[s] to indicate final approval of the transaction Is space provide to record the date of final disposition or approval Is space provide for a dollar or other numeric total Is the distribution of each copy of the form clearly indicated AIS [ Romney, 2003, Page 666 ] Control Design Considerations CONSIDERATION Validit Authorization CONCERN Are all system interactions valid. For example, how can the AIS ensure that cash disbursements are made only to legitimate vendors Are input, processing, storage, and output activities authorized by the appropriate managers. For example, how can the AIS ensure that payroll additions have been authorized Accuracy Is input verified to ensure accuracy. What controls are in place to ensure that data passed between processing activities are not lost Security Is the system protected against [a] unauthorized physical and logical access to prevent the improper use, alteration, destruction, or disclosure of information and software and [b] the theft of system resources Numerical control Are documents prenumbered to prevent errors or intentional misuse and to detect when documents are missing or stolen Availability Is the system available for operation and use at times set forth in service-level statements or agreements. Can users enter, update, and retrieve data during the agreed upon times Maintainability Can the system be modified as required without affecting system availability, security, and integrity. Are only authorized, tested, and documented changes made to the system and related data. Are resources available to manage, schedule, document, and communicate the changes to management and authorized users Itegrity Is data processing complete, accurate, timely, and authorized. Is data processing free from unauthorized or inadvertent system manipulation Audit trail Can transaction data be traced from source documents to final output [and vice versa] For example, if a customer calls with a question, can transaction details be easily accessed AIS [ Romney, 2003, Page 670 ] Factors to Investigate During Postimplementation Review FACTORS QUESTIONS Goals and objectives Does the system help in organization meet its goals, objectives, and overall mission Satisfaction Are the users statisfied with the system . What would they like changed or improved Benefit How have users benefited from the system. Where the expected benefit achieved Costs Are actual costs in line with expected costs Reliability Is the system reliable. Has the system failed and, if so, what caused its failure Accuracy Does the sytem produce accurate and complete data Timeliness Does the systen produce information on a timely basis Compatibility Are the hardware, software ,data, and procedures compatible with exsisting Controls and security Is the system safeguarded againts unintentional errors, fraud, and unauthorized intrusion Errors Do error-handling procedures exist, and they adequate Training Are systems personnal and users adequately trained to support and use the system Communications Is the communcation system adequate Organizational changes Are any organizazional change brought about by the system beneficial or harmful. If harnful,how can they be resolved Documentation Is system documentation complete and accurate AIS [ Romney, 2003, Page 677 ]