Uploaded by btsgalleryofboe01

Group 2 AIS

advertisement
Group 2 AIS
Chapter 6
Relational Databases and SQL
Business Intelligence (BI)
Provides analytical and reporting capability to enable the analysis of data warehouses and to
help managers make the best possible decisions for their companies because it is designed
to support managers in making tactical, strategic and data driven decisions. Unlike
enterprise systems, which was discussed in the previous chapter that primarily focus on
assisting companies on their day-to-day operations and transactions, BI parses all of the
data of the business and presents reports that are easy to digest, performance measures,
and trends that inform management decisions.
As we go on with the topic we will realize that BI a natural extension of enterprise systems
and not as a completely new development because BI is often installed into an existing ERP
as an additional module. Also, with the use of spreadsheets, BI can improve internal controls
within a company.
For example, if data of an enterprise system is transferred into a spreadsheet that is not an
integrated part of the enterprise system there is a possibility that they will face numerous
errors in that spreadsheet so By increasing spreadsheet use within the system BI increases
the available control a company can exert over spreadsheet use, which in turn increases its
compliance with the Sarbanes-Oxley Act (Section 404).
BI in the Era of Big Data
In the era of big data Business analytics were developed which is a set of disciplines and
technologies for solving business problems using data analysis, statistical models and other
quantitative methods. It is also used to detect fraud occurrences in near real time.
Furthermore, advanced business analytics can actually predict future occurrences of
fraud. There are two major revolutions of BI in the era of big data are real-time analytics and
predictive analytics. Real-time analytics encompasses the technology and processes that
quickly enables users to leverage data the second it enters the database because it uses
real-time in-memory databases. Example, companies use real-time data analytics to prevent
hackers by using the analytics to monitor the way data is accessed and spot unusual or
suspicious activities, then shut hackers and data thieves down before data is lost or security
concerns fester. Predictive analytics on the other hand is similar to the “precrime”
predicting tool in the movie Minority Report, where agents can use it to visualize future
murder cases. In simple words it is the use of data to predict future trends and events and
historical data to forecast potential scenarios that can help drive strategic decisions. For
example, a hotel uses predictive analytics by developing multiple regression models that
consider several factors to determine the number of staff needed in a specific time to avoid
overstaffing or understaffing because overstaffing may cause too much cost while
understaffing could cause a bad customer experience, overworked employees, and costly
mistakes.
Health Care Fraud
Last 2009, health care fraud in the United States cost an estimated $125–$175 billion
annually, being the second largest component in healthcare spendings. However, currently
only 3 to 5 percent of healthcare fraud is detected, making only a small fraction of the lost
money recovered. Healthcare organizations and government agencies must take advantage
of the capabilities of big data and business analytics can be used to review large amounts of
healthcare claims and related billing information to find the indicators of healthcare fraud by
the use of pattern tracking, anomaly detection, and correlation analysis for fraud detection
that can be done in real time and near-real time.
REA Modeling
●
●
●
Entities and Attributes
Entity in an accounting system can be classified as (REA) resources which have
economic value to the organization like merchandise inventory, equipment, and cash;
events or business activities like order sales and purchases; or agents which are the
people and the organization such as customers and employees; which the data is
collected. Instance of an entity is one specific thing of the type defined by the entity.
For example, Andrew and Kathy are employees, they are the instances of the
Employee entity, another is Manila and Quezon city, examples of instances of the
entity City. Data models describe entities by capturing their essential characteristics.
used to identify user requirements for data in a database.
Attribute is an item of data that characterises an entity or relationship. Example
Employee = Name, Address, Birthdate (Age), Salary. Key attribute is the attribute
whose value is unique for every entity that will ever appear in the database and is the
most meaningful way of identifying each entity.
(Pic of Attribute hierarchy for the Entity CLIENT)
(Pic of Symbols Used in E-R and REA Diagrams)
Relationships
Relationships are the associations between entities. Entities from the database
must be able to logically present the relationships that exist within them in order to
make the data stored in them available to users who want to reconstruct descriptions
of various business events through the use of relationship mapping.
*go back to the previous slide (Pic of Symbols Used in E-R and REA Diagrams)
Three-step strategy:
1. Identify users’ existing and desired information requirements to
determine whether relationships in the data model can fulfil those
requirements.
2. Evaluate each of the entities in pairs to determine which entity in the pair
provides a better location to include an attribute.
3. Evaluate each entity to determine if there would be any need for two
occurrences of the same entity type to be linked.
(Pic of Relationship Types in the REA Model of the Client-Billing Business Process)
The relationship Supervises is called a recursive relationship which occurs
between two different instances of an entity.
Model Constraints
In model constraints we explore different relationships and identify the constraints
used to specify relationships.
Three relationship types:
1. 1:N (one-to-many),
2. M:N (many-to-many),
●
3. 1:1 (one-to-one)
Cardinality is the most common constraint specified in E-R diagrams. The
participation constraint specifies the degree of minimum participation of one entity
in the relationship with the other entity. This constraint is either 1 or 0, meaning that a
relationship between the two entities is either mandatory (1) or optional (0).
(Pic of Relationship Constraints in the Client Billing Business Process)
REA Data Models and E-R Diagrams
Relational Databases
● Relational Database Concepts
● Mapping an REA Model to a Relational DBMS
—--------------------------------------------------------
REA Data Models and E-R Diagrams
REA Model Components
●
The data included in the exchange.
○ Resources are the assets of a business.
■ They are scarce economic resources and are within the control of
the entity concerned. Examples of economic resources are cash
and cash equivalents, properties, plants, and equipment.
However, for the REA model, accounts receivable are not regarded as
resources.
○ Events are activities that influence changes in economic resources.
■ They are the result of production, exchange, consumption, and
distribution.
■ For example, when a sale is made, it changes the economic
resources of the entity. Sales mean an increase in revenue on one
hand and an increase in cash and cash equivalents on the other hand.
Therefore, economic events are the critical aspect of the REA model.
○ Agents are people that are involved in an economic event.
■ Economic agents have the power to use or dispose of economic
resources.
■ These agents can be within or outside an organization.
■ Examples of agents include sales clerks, production workers, shipping
clerks, customers, and vendors.
RECAP: Resources, Events, Agents (REA) Models
● The REA data model was developed specifically for use in designing
accounting information systems.
○ It is still more of a theoretical model than practical as most accounting
information systems maintain the classical accounting style such as double
entry and ledger.
■ The use of debits and credits are not the focus and are not required.
○ The data are collected and stored in a database that can then be used to
provide reports and financial statements.
■
●
●
●
How? Since REA databases do not employ journals and ledgers, how
can they support financial statement reporting?
■ Journals, ledgers, and double-entry bookkeeping are the traditional
mechanisms for formatting and transmitting accounting data, but they
are not essential elements of an accounting database.
■ REA systems capture the essence of what accountants account for by
modeling the underlying economic phenomena directly.
■ Organizations employing REA can thus produce financial statements,
journals. ledgers, and double-entry accounting reports directly from
event database tables via user views.
○ For financial events / transactions.
It focuses on business semantics underlying an organization's value chain
activities.
○ A value chain is a step-by-step business model for transforming a product or
service from idea to reality.
○ Value chains help increase a business's efficiency so the business can deliver
the most value for the least possible cost.
○ The end goal of a value chain is to create a competitive advantage for a
company by increasing productivity while keeping costs reasonable.
○ The value-chain theory analyzes a firm's five primary activities and four
support activities.
It provides guidance for identifying the entities to be included in a database
and structuring the relationships among the entities.
A fundamental requirement for moving toward an event-driven model, such as REA,
is the complete integration of data related to an organization’s business events.
Entity Relationship (ER) Diagrams
● A graphical representation that depicts relationships among people, objects,
places, concepts, or events within an information technology (IT) system.
● A model of how an accounting system can be re-engineered for the computer age.
○ Entity relationship diagrams provide a visual starting point for database
design that can also be used to help determine information system
requirements throughout an organization.
○ For example, an ERD representing the information system for a company's
sales department might start with graphical representations of entities such as
the sales representative, the customer, the customer's address, the
customer's order, the product and the warehouse.
○ Then lines or other symbols can be used to represent the relationship
between entities, and text can be used to label the relationships.
Main Objectives in the Development of Resources, Events, Agents (REA) Models
1. To identify the data required by managers and other users to perform effectively and;
a. Easily incorporate financial and non-financial data, and accounting and
non-accounting data.
2. To integrate the data in a way that allows those users to efficiently access the
information needed.
INTEGRATION OF TWO BUSINESS PROCESSES
1. Client Billing
○ For service organizations such as public accounting or consultancy firms.
i.
Track the person-hours spent by each employee.
ii.
Record each employee’s work for a specific client.
iii.
Capture data about all employees who provided client services.
iv.
The database must aggregate each employee’s time worked, each
employee’s billing rate, and sufficient information about the client to deliver the
billing statement.
○ Three entities are involved in the billing process:
i.
the agent EMPLOYEE,
ii.
the agent CLIENT, and
iii.
the event WORK_COMPLETED.
○ The process here is that when a customer place order, the sales clerk checks
for the availability of the product, prepares sales order and many other bills,
updates different accounts, ships the product and they receive cash. In REA
diagram, it should not be showing all the accounting details, hence only the
important activities are shown.
○ • The important activities which should be recorded are Customer places
order to sales clerk, Warehouse Employee ships the product to Customer and
Customer makes the payment (by checks) to Cash Receipts Clerk.
○ • The Resources are Computer Inventory and Cash. (Though customers can
pay by credit card, online payment, or checks, it can consider all as one
entity)
○ • Events are Place Order, Ship Product, and Receive Payment.
○ • Agents are Customer, Sales Clerk, Warehouse Employee, and Cash
Receipts Clerk.
2. Human Resources
● Service businesses also are interested in tracking employee work activities as part of
the human resources process.
● The human resources process includes payroll activities, employee education and
development, and other activities.
○ REA terms the HR business process is identified (Fig. 2) as a special case of
the acquisition/payment cycle, consisting of four key business events; labor
requisition, labor schedule, labor acquisition and cash disbursement [7].
● Two Additional Entities:
○ RELEASE_TIME and TRAINING_COMPLETED, which are added to the
model that also includes the previously identified agent entity EMPLOYEE
and event entity WORK_COMPLETED.
● These four entities enable the database to aggregate the information it needs to
determine the employee's pay rate, hours worked, hours spent in training, and hours
of sick time and vacation time used.
○ The human resources department needs information about employee
education and development so it can monitor training activities and ensure
that the employee is receiving enough continuing education to comply with
state licensing requirements and the firm’s policies.
○
●
●
Human resources also will monitor the percentage of billable hours the
employee has accumulated as a measure of job performance.
To accomplish these activities, human resources must be able to link data about
completed work activities and training programs to specific employees. This
information can be drawn from the agent entity EMPLOYEE, the event entity
TRAINING_COMPLETED, and the event entity WORK_COMPLETED.
Human resources can use this information to accumulate a given employee’s training
record and calculate that employee’s percentage of hours worked that were billable
hours.
REA data model will continue to expand through an explosion of entities and relationships.
Many organizations have moved toward the integration of all data across the organization.
● Use of the REA approach can yield:
● More efficient operations by helping identify non-value-added activities, by storing
financial and nonfinancial data in the same central database, and greater support for
management decisions;
● increased productivity through the elimination of non-value-added activities;
● competitive advantages.
Relational Databases
Legacy Systems
● Systems that have existed in an organization over a long period of time and were
developed using an organization’s previous computer hardware and software
platforms.
○ Legacy system is software that was created many years ago, but it continues
to work on older technologies pretty well.
○ They are implemented on old technologies and platforms.
○ Outdated development, design, and architecture approaches are used.
○ No unit and integration tests.
○ The system is difficult to make changes to.
○ The system breaks down unexpectedly.
○ Bad unreadable code that calls into question the operation of the entire
system.
○ Routine operations are not automated, which periodically leads to the same
type of errors and increases the bus factor, which is the level of specific
knowledge that certain team members have. The higher this factor, the more
difficult it becomes to continue developing the project after those team
members are replaced by others.
○ System and infrastructure not properly documented.
● HOW SYSTEMS BECOME LEGACY
○ Since the launch of the system, many new innovations have been created,
but the system continues to work on older technologies and platforms.
○ The team that created the system did not cope with the task due to low
technical competence, and now the project is dead weight.
○ As in the previous case, the system was created without a proper technical
knowledge base, but it was launched, and in general, it works.
Relational Database Concepts
● Relational databases often are perceived by users as a collection of tables.
● A relation is a collection of data representing multiple occurrences of a resource,
event, or agent.
● A tuple is a set of data that describes a single instance of the entity represented by a
relation (e.g., one employee is an instance of the EMPLOYEE relation).
○ To identify a tuple uniquely, each tuple must be distinct from all other tuples.
This means that each tuple in a relation must be identified uniquely by a
single attribute or some combination of multiple attributes.
● A relational database is a type of database that stores and provides access to data
points that are related to one another. Relational databases are based on the
relational model, an intuitive, straightforward way of representing data in tables. In a
relational database, each row in the table is a record with a unique ID called the key.
The columns of the table hold attributes of the data, and each record usually has a
value for each attribute, making it easy to establish the relationships among data
points.
Referential integrity
● Specifies that for every attribute value in one relation that has been specified to allow
reference to another relation, the tuple being referenced must remain intact.
○ To ensure that data is always accurate and accessible, relational databases
follow certain integrity rules. For example, an integrity rule can specify that
duplicate rows are not allowed in a table in order to eliminate the potential for
erroneous information entering the database.
○ Relational model and data consistency
■ The relational model is the best at maintaining data consistency
across applications and database copies (called instances). For
example, when a customer deposits money at an ATM and then looks
at the account balance on a mobile phone, the customer expects to
see that deposit reflected immediately in an updated account balance.
Relational databases excel at this kind of data consistency, ensuring
that multiple instances of a database have the same data all the time.
Mapping a REA Model to a Relational DBMS
● Put these two concepts together.
● Mapping the REA model onto a logical database model.
1. Create a separate relational table for each entity.
a. First, specify the database schema.
2. Determine the primary key for each of the relations.
a. The primary key must uniquely identify any row within the table.
3. Determine the attributes for each of the entities.
a. The key attribute specified in the REA model is matched to the corresponding
attribute in the relation.
4. Implement the relationships among the entities.
a. The mapping of the relationships in the model to the relationships in the
relational schema is straightforward.
i.
One-to-many (1:N or N:1) relationships
1. Sales (many) and Cash Receipts
2. One to many relationship is a type of cardinality that refers to a
relationship between two entities in an entity relational diagram
(between two tables in a database).
3. A simple example would be a binding between the entities
person and birth_certificate. Each person must have their own
birth certificate.
ii.
One-to-one (1:1) relationships
1. Sales and Cash Receipts
2. One to many relationship is a type of cardinality that refers to a
relationship between two entities in an entity relational diagram
(between two tables in a database).
3. A simple example would be a binding between the entities
order and item. Each order may have multiple items, but a
product (e.g., a TV) may be delivered within a single order.
iii.
Many-to-many (M:N) relationships
1. Sales (many) and CR (many)
2. Many-to-many relationship is a type of cardinality that refers to
a relationship between two entities in an entity relational
diagram (between two tables in a database). A simple example
would be a relationship between the entities student and
course. Each student can have multiple courses and each
course is for multiple students.
5. Determine the attributes, if any, for each of the relationship tables.
Benefits of relational database management system
The simple yet powerful relational model is used by organizations of all types and sizes for a
broad variety of information needs. Relational databases are used to track inventories,
process e-commerce transactions, manage huge amounts of mission-critical customer
information, and much more.
—------------------------------SQL: A Relational Database Query Language
SQL is a powerful database language that can be used to define database systems, query
the database for information, generate reports from the database, and access databases
from within programs using embedded SQL commands.
It has become the de facto standard database language—evidenced by continual efforts by
the industry to provide standardization guidelines for vendors and the number of variations of
the language that exist in databases from supercomputers to personal computers.
Constructing Relational Databases
CREATE command - used to create the relations that form the database structure.
1. Assign the relation a name
2. Assign each attribute a name.
3. Specify the data type for each attribute.
Data type descriptions - combination of alphanumeric or numeric values.
Alphanumeric types
·
CHAR (for fixed-length strings)
·
VAR-CHAR (for varying length alphanumeric strings).
Numeric data types
·
INTEGER
·
FLOAT (which has a floating decimal point).
4. Specify constraints, when appropriate, on the attributes.
Most notably, we need to make sure that the primary key values are not left empty (i.e., null);
otherwise, there will be no key value by which to identify and pull the tuple’s record from the
database. We may want to require that other attributes be assigned some value rather than
having the option of being null. In each of these cases, we can assign a value of NOT NULL
as the constraint.
Populating the Database
Data can be changed in the database in three ways:
1. INSERT – used to add a single tuple to an existing relation.
The INSERT command in its simplest form only requires the user to specify the SQL table
and the values to be inserted for each attribute if a value is provided for every attribute.
2. DELETE - method by which we delete a tuple from a relation.
The DELETE command requires specification of the table name and inclusion of a WHERE
condition, which is used to identify the unique tuple(s) for deletion.
3. UPDATE - used when we want to change one or more attribute values for one or more
tuples in a table.
To accomplish a change of an attribute value, the UPDATE command must be able to
identify the table with the value to be updated, the new values to be placed in the database,
and the conditions for identifying the correct tuple for UPDATE.
To make the change, we identify the tuple using the WHERE condition we just used for
deletion, and we change the existing values by using a SET command to set the new values
for the database.
Basic Querying Commands
SELECT
●
●
SELECT commands retrieve the values for a list of attributes from the tuples of a
single relation.
SELECT commands allow us to join data across multiple tables to link specific
pieces of information that are of interest
1. a list of attributes that we want to SELECT from the database (SELECT)
2. a list of tables where these attributes can be found (FROM)
3. a WHERE clause that sets the conditions under which attribute values are to be
retrieved. (WHERE)
Chapter 7
Controlling Information Systems: Introduction to Enterprise Risk Management and
Internal Control
Organizational Governance
A process by which organizations select objectives, establish processes to achieve
objectives, and monitor performances.
Objective setting includes defining mission, vision, purpose, and strategies to establish
relationships.
Internal control and monitoring activities are implemented to review performance and provide
feedback to provide a reasonable assurance that objectives are being achieved.
Enterprise Risk Management
A framework that has proven to be an effective process for organizational governance.
A process, effected by an entity’s board of directors, management, and other personnel,
applied in strategy settings and across the enterprise, designed to identify potential events
that may affect the entity, and manage risk to be within its risk appetite, to provide
reasonable assurance regarding the achievement of entity objectives.
The ERM framework addresses four categories of management objectives:
●
●
●
Strategic: High-level goals aligned with and supporting its mission.
Operations: Effective and efficient use of its resources.
Reporting: Reliability of reporting.
●
Compliance: Compliance with applicable laws and regulations.
Components of Enterprise Risk Management
The ERM process starts with the first component, the
1. Internal environment: The internal environment encompasses the tone of an
organization and sets the basis for how risk is viewed and addressed by an entity’s
people, including risk management philosophy and risk appetite, integrity and ethical
values, and the environment in which they operate.
2. Objective setting: Objectives such as mentioned a while ago, the strategic and
related objectives, must exist before management can identify potential events
affecting their achievement. ERM ensures that management has a process in place
to set objectives and that the chosen objectives support and align with the entity’s
mission and are consistent with its risk appetite.
3. Event identification: Internal and external events affecting achievement of an
entity’s objectives must be identified, distinguishing between risks and opportunities.
Risks - events that would have a negative impact on the organization’s objectives –
require assessment and response
Opportunities - events that would have a positive impact on organization’s objectives
– channeled back to the strategy-setting process
4. Risk assessment: Risks are analyzed, considering likelihood and impact, as a basis
for determining how they should be managed. Likelihood is the possibility that an
event will occur, and impact is the effect of an event’s occurrence. Risks are
assessed on an inherent and a residual basis.
5. Risk response: Management selects risk responses from the four response types:
avoiding, accepting, reducing, or sharing risk—developing a set of actions to align
risks with the entity’s risk tolerances and risk appetite.
● We can avoid a risk by leaving the activity that is giving rise to the risk.
● We can reduce a risk by taking actions that reduce the likelihood of an event
or reduce the impact
● We can share a risk by, for example, buying insurance or outsourcing the
activity.
● We can accept a risk by taking no action
6. Control activities: Policies and procedures are established and implemented to help
ensure the risk responses are effectively carried out.
7. Information and communication: Relevant information is identified, captured, and
communicated in a form and time frame that enable people to carry out their
responsibilities. Effective communication requires that appropriate, timely, and quality
information from internal and external sources flows down, up, and across the entity
to facilitate risk management and intelligent decision making.
8. Monitoring: The entirety of ERM is monitored, and modifications are made as
necessary. Monitoring is accomplished through ongoing management activities,
separate evaluations, or both.
●
The Sarbanes-Oxley Act of 2002
THE SARBANES OXLEY ACT
●
●
●
●
A U.S. law passed on July 30, 2002 to protect investors from corporate accounting
fraud by improving financial reporting and auditing standards
Bill Sponsors: Sen. Paul S. Sarbanes and Rep. Michael G. Oxley
Enacted primarily due to financial statement fraud that was occurring in the early
2000s (Enron, WorldCom, Tyco, Sunbeam)
Emphasis placed on need for effective internal controls
KEY PROVISIONS OF SOX
●
●
●
●
●
●
Created a new accounting oversight board (Public Company Accounting Oversight
Board or PCAOB)
Strengthened auditor independence rules
Increased accountability of company officers and directors
Mandated upper management to take responsibility for the company’s internal control
structure
Enhanced the quality of financial reporting
Put teeth into white-collar crime penalties
OUTLINE OF SOX
Title I—Public Company Accounting Oversight Board:
Section 101: establishes the Public Company Accounting Oversight Board (PCAOB), an
independent board to oversee public company audits.
Section 107: assigns oversight and enforcement authority over the board to the Securities
and Exchange Commission (SEC).
Title II—Auditor Independence:
Section 201: prohibits a CPA firm that audits a public company from engaging in certain
nonaudit services with the same client. Most relevant to AIS is the prohibition of providing
financial information systems design and implementation services to audit clients.
Section 203: requires audit partner rotation in their fifth, sixth, or seventh year, depending on
the partner’s role in the audit.
Section 206: states that a company’s chief executive officer (CEO), chief financial officer
(CFO), controller, or chief accountant cannot have been employed by the company’s audit
firm and participated in an audit of that company during the prior one-year period.
Title III—Corporate Responsibility:
Section 302: requires a company’s CEO and CFO to certify quarterly and annual reports.
They are certifying that they reviewed the reports; the reports are not materially untruthful or
misleading; the financial statements fairly reflect in all material respects the financial position
of the company; and they are responsible for establishing, maintaining, and reporting on the
effectiveness of internal controls, including significant deficiencies, frauds, or changes in
internal controls.
Title IV—Enhanced Financial Disclosures:
Section 404: requires each annual report filed with the SEC to include an internal control
report. The report shall state the responsibility of management for establishing and
maintaining an adequate internal control structure and procedures for financial reporting.
The report must also contain management’s assessment, as of the end of the company’s
fiscal year, of the effectiveness of the internal control structure and procedures of the
company for financial reporting.
Section 406: requires that companies disclose whether or not they have adopted a code of
ethics for senior financial officers.
Section 407: requires that companies disclose whether or not their audit committee contains
at least one member who is a financial expert.
Section 409: requires that companies disclose information on material changes in their
financial condition or operations on a rapid and current basis.
Title V—Analysts’ Conflicts of Interests:
Requires financial analysts to properly disclose in research reports any conflicts of interest
they might hold with the companies they recommend.
Title VI—Commission Resources and Authority:
Section 602: authorizes the SEC to censure or deny any person the privilege of appearing
or practicing before the SEC if that person is deemed to be unqualified, have acted in an
unethical manner, or have aided and abetted in the violation of federal securities laws.
Title VII—Studies and Reports:
Authorizes the Government Accountability Office (GAO) to study the consolidation of public
accounting firms since 1989 and offer solutions to any recognized problems.
Title VIII—Corporate and Criminal Fraud Accountability:
Section 802: makes it a felony to knowingly destroy, alter, or create records or documents
with the intent to impede, obstruct, or influence an ongoing or contemplated federal
investigation.
Section 806: offers legal protection to whistleblowers who provide evidence of fraud.
Section 807: provides criminal penalties of fines and up to 25 years’ imprisonment for those
who knowingly execute, or attempt to execute, securities fraud.
Title IX—White-Collar Crime Penalty Enhancements:
Section 906: requires that CEOs and CFOs certify that information contained in periodic
reports fairly presents, in all material respects, the financial condition and results of the
company’s operations. The section sets forth criminal penalties applicable to CEOs and
CFOs of up to $5 million and up to 20 years in prison if they knowingly or willfully falsely so
certify
Title X—Corporate Tax Returns:
Section 1001: conveys a “sense of the Senate” that the corporate federal income tax returns
are signed by the CEO.
Title XI—Corporate Fraud and Accountability:
Section 1102: provides for fines and imprisonment of up to 20 years for individuals who
corruptly alter, destroy, mutilate, or conceal documents with the intent to impair the
documents’ integrity or availability for use in an official proceeding, or to otherwise obstruct,
influence, or impede any official proceeding.
Section 1105: authorizes the SEC to prohibit anyone from serving as an officer or director if
the person has committed securities fraud.
Section 404: Management Assessment of Internal Controls
Requires each annual report to contain an “internal control report”, which must include:
●
●
●
●
Statement of management’s responsibility for establishing and maintaining adequate
internal control for financial reporting
Statement identifying the framework by management to evaluate the effectiveness of
the internal control over financial reporting
Management’s assessment of the effectiveness of the company’s internal control
over financial reporting as of the end of the company’s most recent fiscal year
Statement that the external auditor has issued an attestation report
Defining Internal Control
● The COSO Definition of Internal Control
INTERNAL CONTROL
In 1992, the COSO organization introduced a framework, Internal Control—Integrated
Framework, which itself became known as COSO. The definition of internal control
contained in COSO 1992 has become widely accepted and is the basis for definitions of
control adopted for other international control frameworks:
Internal control is a process—effected by an entity’s board of directors, management,
and other personnel—designed to provide reasonable assurance regarding the
achievement of objectives in the following categories:
• Effectiveness (the degree to which an objective is accomplished) and efficiency (the ability
to accomplish an objective with minimal waste of resources) of operations
• Reliability of financial reporting
• Compliance with applicable laws and regulations
COMPONENTS OF INTERNAL CONTROL
• Control environment: Sets the tone of an organization, influencing the control
consciousness of its people. It is the foundation for all other components of internal control,
providing discipline and structure.
• Risk assessment: The entity’s identification and analysis of relevant risks to the
achievement of its objectives, forming a basis for determining how the risks should be
managed.
• Control activities: The policies and procedures that help ensure that management
directives are carried out.
• Information and communication: The identification, capture, and exchange of information in
a form and time frame that enables people to carry out their responsibilities.
• Monitoring activities: A process that assesses the quality of internal control performance
over time.
17 PRINCIPLES OF INTERNAL CONTROL
Control Environment
1. The organization demonstrates a commitment to integrity and ethical values.
2. The board of directors demonstrates independence from management and exercises
oversight of the development and performance of internal control.
3. Management establishes, with board oversight, structures, reporting lines, and
appropriate authorities and responsibilities in the pursuit of objectives.
4. The organization demonstrates a commitment to attract, develop, and retain competent
individuals in alignment with objectives.
5. The organization holds individuals accountable for their internal control responsibilities in
the pursuit of objectives.
Risk Assessment
6. The organization specifies objectives with sufficient clarity to enable the identification and
assessment of risks relating to objectives.
7. The organization identifies risks to the achievement of its objectives across the entity and
analyzes risks as a basis for determining how the risks should be managed.
8. The organization considers the potential for fraud in assessing risks to the achievement of
objectives.
9. The organization identifies and assesses changes that could significantly impact the
system of internal control
Control Activities
10. The organization selects and develops control activities that contribute to the mitigation
of risks to the achievement of objectives to acceptable levels.
11. The organization selects and develops general control activities over technology to
support the achievement of objectives.
12. The organization deploys control activities through policies that establish what is
expected and procedures that put policies into action.
Information and Communication
13. The organization obtains or generates and uses relevant, quality information to support
the functioning of internal control.
14. The organization internally communicates information, including objectives and
responsibilities for internal control, necessary to support the functioning of internal control.
15. The organization communicates with external parties regarding matters affecting the
functioning of internal control
Monitoring Activities
16. The organization selects, develops, and performs ongoing and/or separate evaluations
to ascertain whether the components of internal control are present and functioning.
17. The organization evaluates and communicates internal control deficiencies in a timely
manner to those parties responsible for taking corrective action, including senior
management and the board of directors, as appropriate.
FRAUD AND ITS RELATIONSHIP TO CONTROL
By its meaning, fraud is an intentional act or deception meant for unethical or unlawful gain.
Fraud always entails manipulating information for criminal purposes. Foreign Corrupt
Practices Act is the law that is implied to prevent irregularities and states that “a fundamental
aspect of management’s stewardship responsibility is to provide shareholders with
reasonable assurance that the business is adequately controlled”.
Title XI of the Sarbanes-Oxley Act
Based on the Title XI of the Sarbanes-Oxley Act
Title eleven is also known as the "Corporate Fraud Accountability Act of 2002" and reviews
additional guidelines regarding the rules and punishments concerned with fraudulent
corporate activities. This title gives the commission authority to freeze the funds of a
company suspected of committing violations of securities laws. The funds can be held in an
interest bearing escrow account until a full investigation is able to be completed. This title
also grants the Commission the authority of prohibiting a person from serving as a director or
officer of a securities issuer if a cease-and-desist proceeding is filed concerning the
violations of securities law. The Commission may bar a person from such activities as long
as "the conduct of that person demonstrates unfitness to serve as an officer or director of
any such issuer."
The act was made because they want to prevent fraud in the company by doing research
and brainstorming ideas to evaluate the risk of misstatement to consider the valuation of the
entity to the fraudulent activity. The person assigned is the auditor who should take into
account the results of his or her assessment.
The PwC report also indicates that fraud is a worldwide problem that is on a rising trend,
particularly during recessions. Both reports show that the losses are significant.
Furthermore, both reports concur that internal controls and audits are insufficient for
detecting fraud. To address the risk, fraud-prevention programs and detection measures,
such as hotlines, are required.
2012 ACFE REPORT TO THE NATION ON OCCUPATIONAL FRAUD AND ABUSE
Between October and December 2011, the Association of Certified Fraud Examiners (ACFE)
gathered data from Certified Fraud Examiners (CFEs) from 96 countries reporting fraud
cases they had personally investigated. Over half of the cases or 57.2% were from the
United States alone, an increase of 39% from 2010. The CFEs reported 1,388 cases of
fraud, with a median loss of $140,000. Almost one-fifth of these cases resulted in losses of
at least $1 million. We learn the following from the report summarizing these frauds:
● When projected to the entire global economy, respondents indicated that fraud costs
the average business 5% of its annual sales, amounting to a total loss of $3.5 trillion.
● Frauds were more likely to be detected by tips (e.g., through hotlines such as those
required by SOX) than through audits or internal controls.
● 77% of the frauds were committed by individuals in accounting, operations, sales,
executive/upper management, customer service, or purchasing.
● Most fraudsters were first-time offenders with previously clean employment records.
● The most common red flags displayed by fraud perpetrators were living beyond their
means (44 percent of cases) and experiencing financial difficulties (30 percent of
cases).
● Small businesses (less than 100 employees) were disproportionately victimized by
fraud (32 percent of cases) due to relatively weak anti-fraud controls.
IMPLICATIONS OF COMPUTER FRAUD AND ABUSE
There are now more prospects for criminal infiltration thanks to the widespread use of
computers in commercial settings and their interconnection with one another and the
Internet. Numerous crimes, including identity theft, fraud, larceny, and embezzlement, have
been committed using computers. Computer fraud, computer abuse, or computer crime are
common terms used to describe crimes using computers. When an organization conducts
E-business, certain of these frauds become more common. For instance, if a transaction is
fraudulent, the company that accepts payment by credit card and when the credit card is not
physically present during the transaction (such as sales made over the phone or online)
must suffer the loss.
Computer Crime
Computer crime refers to any crime in which a computer is the intended victim or the means
by which the crime is carried out. The majority of computer crimes fall into these two basic
types where:
●
●
The computer is used as a tool for the criminal to accomplish the illegal act. For
example, are those criminals who are using computers to hack an account in the
bank. In the Philippines where E-wallets like G-Cash and Paypal become rampant
when it becomes to paying, these applications are still weak when it comes to
internal control because there are a lot of users that are having problems like their
money in the account missing or being hacked.
The computer or the information stored in it is the target of the criminal. Computer
viruses fall into this category.
Malware- designed specifically to damage or disrupt a computer system
● Salami Slicing- computer crime refers to any crime in which a computer is the
intended victim or the means by which the crime is carried out.
● Back Door- A backdoor refers to any method by which authorized and unauthorized
users are able to get around normal security measures and gain high-level user
access (aka root access) on a computer system, network, or software application.
● Trojan Horse- Trojan Horse (Trojan) is a type of malware that disguises itself as
legitimate code or software. Once inside the network, attackers are able to carry out
any action that a legitimate user could perform, such as exporting files, modifying
data, deleting files, or otherwise altering the contents of the device.
● Logic Bomb- A logic bomb is a set of instructions in a program carrying a malicious
payload that can attack an operating system, program, or network. It only goes off
after certain conditions are met. A simple example of these conditions is a specific
date or time.
● Worm- A computer worm is a subset of the Trojan horse malware that can propagate
or self-replicate from one computer to another without human activation after
breaching a system. Typically, a worm spreads across a network through your
Internet or LAN (Local Area Network) connection.
● Zombie- A zombie a malicious program that is installed on a device that transforms it
into a “zombie” that attacks other systems. A computer or other device transformed
by zombie malware is first infected by a virus or Trojan.
Before we proceed into the ethical consideration and the control environment, I want
you all to know what a computer virus is. A computer virus is a piece of program
code that can attach itself to other programs and "infect" them. Viruses can replicate
themselves in the same way that biological viruses do. When you run an infected
program, open an infected document, or boot a computer from an infected disk,
viruses are activated. Computer viruses modify their "host" programs, destroy data,
or make computer resources inaccessible.
ETHICAL CONSIDERATIONS AND THE CONTROL ENVIRONMENT
Ethical behavior and managerial integrity are outcomes of "corporate culture," which
includes ethical and behavioral standards, how they are communicated, and how they are
reinforced in practice. Official policies specify what management desires to occur. What
actually happens and which rules are followed, bent, or ignored are determined by corporate
culture. Management is in charge of internal control and can respond to this requirement
either legally or by creating a "control environment." In other words, management can either
follow the "letter of the law" (by form) or respond substantively to the need for control. The
control environment reflects the organization's general awareness of and commitment to the
importance of control throughout the organization (primarily the board of directors and
management). In other words, management can make an organization's control conscious
by leading by example and addressing the need for control at the top of the organization.
A FRAMEWORK FOR ASSESSING THE DESIGN OF A SYSTEM OF INTERNAL
CONTROL
In this chapter's final major section, we begin our presentation of a framework for assessing
the design of an internal control system, including defining control goals and control plans.
We are still using a matrix to help us with our analysis. This type of matrix is known as a
control matrix, and it is a tool designed to help you evaluate the potential effectiveness of
controls in a business process by matching control goals with relevant control plans. If you
remember the Suprina system flowchart tackled in chapter 4 of the book and now let’s use
this process to understand how internal controls are working. But before that, place yourself
as a manager, what are your concern objectives and the related risks? There are concerns
we want to know as:
● We want all of the orders to be entered in a timely manner, but orders might be lost,
stolen, or delayed.
● We want all of the orders to be recorded correctly, but we might miss some orders,
record orders we didn’t get from a customer, or record order amounts incorrectly.
● We want all inventory changes to be recorded correctly.
● We want to accomplish all this with a minimum of resources
A constant theme throughout this text has been that an organization defines goals, assesses
risks, and then implements processes and controls to provide reasonable assurance that
those goals are met. The topic also wants to be consistent to know the purpose of internal
control where the purpose is to provide reasonable assurance of achieving objectives in 3
categories such as operations, reporting, and compliance with applicable laws and
regulations. For our control framework, we convert those three categories into control goals
for two categories, operations process control goals and information process control
goals.
(Pic of Suprina Systems Flowchart)
Control Goals of Operations Processes
- business process objectives that relate to guaranteeing efficiency and effectiveness
of operations
1. Ensure effectiveness of operations - aims to ensure that a given
operational process is fulfilling the purpose for which it was created.
Effectiveness: A measure of success in meeting one or more goals for the
operations process.
2. Ensure efficient employment of resources - This refers to efficient
utilisation of business resources to meet business goals.
Efficiency: A measure of the productivity of the resources applied to achieve
a set of goals
3. Ensure security of resources
Security of resources: Protecting an organisation’s resources from loss,
destruction, disclosure, copying, sale, or other misuse.
Control Goals of Information Processes
- business process objectives for reliable reporting
1. Ensure Input Validity
Input validity: Input data are appropriately authorized and represent actual
economic events and objects.
2. Ensure Input Completeness
Input completeness: All valid events or objects are captured and entered
into a system once and only once.
3. Ensure Input Accuracy
Input accuracy: All valid events must be correctly captured and entered into
a system.
4. Ensure Update Completeness
Update completeness: All events entered into a system must be reflected in
the respective master data once and only once.
5. Ensure update accuracy
Update accuracy: Data entered into a system must be reflected correctly in
the respective master data
Types of Error
Programming Error - logical or technical errors may exist in the program software
Operational Error - This may happen if input data are used for more than one
application, and we fail to use the inputs for all of the intended processes.
Control Plans
- reflect information-processing policies and procedures that assist in accomplishing
control goals.
Control Plans classified:
based on Control Hierarchy:
1. Control Environment
2. Pervasive Control Plans
3. Business Process Control Plans
In Relation to to the Timing of their Occurrence:
1. Preventive Control Plans
2. Detective Control Plans
3. Corrective Control Plans
Download