Uploaded by Cervantes, Brecs Kent

A20

advertisement
A20
Business Process
CHAPTER 1
-set of related, coordinated, and structured
System
activities performed by a person, computer, or a
-A set of two or more interrelated components
machine to accomplish a specific organizational
interacting to achieve a goal
goal
Goal Conflict
Transactions-agreement between 2 entities
-Occurs when components act in their own
Transaction Processing-process of capturing
interest without regard for overall goal
transaction data, processing it, and storing it for
Goal Congruence
later use
-Occurs when components acting in their own
Give-Get Exchange- transactions that always
interest contribute toward overall goal
occur
Data
5 Major Business Processes/Transaction
-Are facts that are recorded and stored.
Cycles
*Insufficient for decision making.
1. Revenue Cycle
Information
2. Expenditure Cycle
-Is processed data used in decision making.
3. Production or Conversion Cycle
*Information Overload
4. Human Resources/Payroll Cycle
Value of Information
5. Financing Cycle
-benefit provided by the information less cost
ACCOUNTING INFORMATION SYSTEMS
of producing it
-A system that collects, records, stores, and
Information Technology
processes data to produce information for
-computers and other electronic devices used to
decision makers
store, retrieve, transmit, and manipulate data
6 Components of an AIS
1. The people who use the system
2. The procedures and instructions used to
collect, process, and store data
3. The data about the organization and its
business activities
4. The software used to process the data
5. The information technology infrastructure,
What Makes Information Useful?
including the computers, peripheral devices, and
1. Relevant- can affect decision-making
network communications devices used in the AIS
2. Reliable- free from error and bias
6. The internal controls and security measures
3. Complete- faithful representation
that safeguard AIS data
4. Timely- available when needed
3 Important Business Function
5. Understandable- understand significance;
useful format
6. Verifiable- through consensus
7. Accessible- both timely and
understandable
1. Collect and store data
2. Transform data into information
3. Provide adequate controls
A well-designed AIS can add value to an
organization by:
1. Improving the quality and reducing the costs
*An organization’s value chain is a part of a
of products or services.
larger system called a supply chain.
2. Improving efficiency.
3. Sharing knowledge.
CHAPTER 2
4. Improving the efficiency and effectiveness of
Data Processing Cycle
its supply chain.
-The four operations
Predictive Analysis- uses data warehouses and
1.data input
complex algorithms to forecast future events,
2.data storage
based on historical trends and calculated
3.data processing
probabilities.
4.information output
Value Chain- linking together all the primary and
-performed on data to generate meaningful and
support activities in a business.
relevant information.
5 Primary Activities
1. DATA INPUT
1. Inbound logistics consists of receiving,
First step in processing input is to capture
storing, and distributing the materials an
transaction data and enter them into the
organization uses to create the services and
system.
products it sells.
The data capture process is usually triggered by
2. Operations activities transform inputs into
a business activity. Data must be collected
final products or services.
about three facets of each business activity:
3. Outbound logistics activities distribute
1. Each activity of interest
finished products or services to customers.
2. The resource(s) affected by each activity
4. Marketing and sales activities help
3. The people who participate in each activity
customers buy the organization’s products or
Source Documents
services.
-Documents used to capture transaction data at
5. Service activities provide post-sale support
its source
to customers.
Turnaround Documents
4 Support Activities
-Records of company data sent to an external
1. Firm infrastructure is the accounting, finance,
party and then returned to the system as input.
legal, and general administration activities that
allow an organization to function. The AIS is
part of the firm infrastructure.
2. Human resources activities include recruiting,
hiring, training, and compensating
employees.
3. Technology activities improve a product or
Source Data Automation
service.
-The collection of transaction data in
4. Purchasing activities procure raw materials,
machine-readable form at the time and place of
supplies, machinery, and the buildings used
origin.
to carry out the primary activities.
2. DATA STORAGE
A company’s data is one of its most important
resources. To function properly, an organization
must have ready and easy access to its data.
LEDGERS- Cumulative accounting information is
stored in general and subsidiary ledgers.
a. General ledger- contains summary-level
data for every asset, liability, equity,
revenue, and expense account.
b. Subsidiary ledger- contains detailed
Audit Trail- A path that allows a transaction to
data for any general ledger account with
be traced through a data processing system
many individual sub-accounts.
from point of origin to output or backwards from
Control account - A title given to a general
output to point of origin.
ledger account that summarizes the total
Entity - The item about which information is
amounts recorded in a subsidiary ledger.
stored in a record.
Coding- systematic assignment of numbers or
Attributes - The properties,identifying numbers,
letters to items to classify and organize them.
and characteristics of interest of an entity that
Sequence Codes - Items are numbered
is stored in a database
consecutively so that gaps in the sequence code
Field- The portion of a data record where the
indicate missing items that should be
data value for a particular attribute is stored.
investigated.
Record- A set of fields whose data values
Block Codes - Blocks of numbers that are
describe specific attributes of an entity, such as
reserved for specific categories of data,
all payroll data relating to a single employee.
thereby helping to organize the data.
Data Value - The actual value stored in a field.
Group Codes - Two or more sub-groups of digits
It describes a particular attribute of an entity.
that are used to code an item. A group code is
File- A set of logically related records, such as
often used in conjunction with a block code.
the payroll records of all employees.
Mnemonic Code - Letters and numbers that are
Master File - A permanent file of
interspersed to identify an item.
records that stores cumulative
Chart of Accounts - A listing of all the numbers
data about an organization.
assigned to balance sheet and income statement
Transaction File - A file that contains the
accounts.
individual business transactions that occur
General Journal - A journal used to record
during a specific fiscal period.
infrequent or nonroutine transactions, such as
Database - A set of interrelated, centrally
loan payments and end-of-period
controlled data files that are stored with as
adjusting and closing entries.
little data redundancy as possible.
Specialized Journal - A journal used to record a
3. DATA PROCESSING
large number of repetitive transactions such as
Once business activity data have been entered
credit sales, cash receipts, purchases, and cash
into the system, they must be processed to
disbursements.
keep the databases current.
CRUD, are as follows:
1. Creating new data records, such as adding a
CHAPTER 3
newly hired employee to the payroll database.
Documentation - Narratives, flowcharts,
2. Reading, retrieving, or viewing existing
diagrams, and other written materials that
data.
explain how a system works. (read, evaluate,
3. Updating previously stored data.
prepare)
4. Deleting data, such as purging the vendor
Narrative description - Written, step-by-step
master file of all vendors the company no lon-
explanation of system components and how they
ger does business with.
interact.
Batch processing - Accumulating transaction
1. Data flow diagram (DFD), a graphical
records into groups or batches for processing at
description of data sources, data flows,
a regular interval such as daily or weekly. The
transformation processes, data storage, and
records are usually sorted into some sequence
data destinations
before processing.
2. Flowchart, which is a graphical description of
Online, real-time processing - The computer
a system. There are several types of flow
system processes data immediately after
charts, including:
capture and provides updated information to
users on a timely basis.
4. INFORMATION OUTPUT
The final step in the data processing cycle is
a. Document flowchart, which shows the
flow of documents and information between
departments or areas of responsibility
b. System flowchart, which shows the
information output. When displayed on a
relationship among the input, processing, and
monitor, output is referred to as “soft copy.”
output in an information system
When printed on paper, it is referred to as
c. Program flowchart, which shows the
“hard copy.”
sequence of logical operations a computer per-
Document- A record of a transaction or other
forms as it executes a program.
company data.
3. Business Process diagrams, which are
Reports -used by employees to control
graphical descriptions of the business processes
operational activities and by managers to make
used by a company
decisions and to formulate business strategies.
DATA FLOW DIAGRAM
Query - A request for the database to provide
the information needed to deal with a problem or
answer a question.
Enterprise resource planning
(ERP) system - A system that integrates all
aspects of an organization’s activities—such as
accounting, finance, marketing, human resources,
manufacturing, inventory management—into one
system.
Data source - The entity that produces or
sends the data that is entered into a system.
Data destination - The entity that receives data
produced by a system.
Data flow - The movement of data among
processes, stores, sources, and destinations.
Process - The action that transforms data into
other data or information.
Data store - The place or medium where system
data is stored.
Context diagram - Highest-level DFD; a
summary-level view of a system, showing the
data processing system, its input(s) and
output(s), and their sources and destinations.
FLOWCHARTS
-An analytical technique that uses a standard set
of symbols to describe pictorially some aspect
of an IS in a clear, concise, and logical manner.
4 Categories
1. Input/output symbols show input to or output
from a system.
2. Processing symbols show data processing,
either electronically or by hand.
3. Storage symbols show where data is stored.
4. Flow and miscellaneous symbols indicate the
flow of data, where flowcharts begin or end,
where decisions are made, and how to add
explanatory notes to flowcharts.
TYPES OF FLOW CHART
1. Document flow charts were developed to
Database administrator (DBA) - The person
responsible for coordinating, controlling, and
illustrate the flow of documents and data
managing the database. data warehouse - Very
among areas of responsibility within an
large databases containing detailed and
organization.
summarized data for a number of years that are
Internal control flowchart
used for analysis rather than transaction
-Used to describe, analyze, and evaluate internal
processing.
controls, including identifying system strengths,
Business intelligence - Analyzing large amounts
weaknesses, and inefficiencies.
of data for strategic decision making.
2. System flowchart depicts the
Online analytical processing (OLAP) - Using
relationships among system input,
queries to investigate hypothesized relationships
processing, storage, and output.
among data.
3. A program flowchart illustrates the
Data mining - Using sophisticated statistical
sequence of logical operations performed
analysis to “discover” not hypothesized
by a computer in executing a program.
relationships in the data.
THE ADVANTAGES OF DATABASE SYSTEMS
CHAPTER 4
1.Data Integration
-Files are logically combined and made accessible
to various systems.
2.Data Sharing
-With data in one place it is more easily
accessed by authorized users.
3.Minimizing Data Redundancy and Data
Inconsistency
-Eliminates the same data being stored in
Field- Attributes about an entity
multiple files, thus reducing inconsistency in
Record- Related group of fields
multiple versions of the same data.
File- Related group of records
4.Data Independence
Database - A set of interrelated, centrally
-Data is separate from the programs that access
coordinated data files that are stored with as
it. Changes can be made to the data without
little data redundancy as possible.
necessitating a change in the programs and vice
versa.
Database Management System
5.Cross-Functional Analysis
(DBMS) - The program that manages and
-Relationships between data from various
controls the data and the interfaces between
organizational departments can be more easily
the data and the application pro-
combined.
grams that use the data stored in the database.
DATABASE TERMINOLOGIES
Database System - The database, the DBMS,
Database Management System (DBMS)
and the application programs that access the
-Interface between software applications and
database through the DBMS.
the data in files.
Database Administrator (DBA)
Data manipulation language (DML) - DBMS
-Person responsible for maintaining the database
language that changes database content,
Data Dictionary
including data element creations, updates,
-Information about the structure of the
insertions, and deletions.
database
Data query language (DQL) -High-level,
-field names, descriptions, uses
English-like, DBMS language that contains
LOGICAL AND PHYSICAL VIEWS OF DATA
powerful, easy-to-use commands that enable
Programmers must know the physical
location and layout of records.
users to retrieve, sort, order, and display data
RELATIONAL DATABASES
Record Layout - Document that shows the items
Relational data model represents the
stored in a file, including the order and length of
conceptual and external level schemas as if data
the data fields and the type of data stored.
are stored in tables.
Logical view - How people conceptually organize,
Table
view, and understand the relationships among
-Each row, a tuple, contains data about one
data items.
instance of an entity.
Physical view - The way data is physically
-This is equivalent to a record
arranged and stored in the computer system.
-Each column contains data about one attribute
Schema - A description of the data elements in
of an entity.
a database, the relationships among them,
-This is equivalent to a field
and the logical model used to organize and
Attributes
describe the data.
a.Primary Key
a. conceptual-level schema - The
-An attribute or combination of attributes that
organization-wide view of the entire
can be used to uniquely identify a specific row
database that lists all data elements and
(record) in a table.
the relationships between them.
b.Foreign Key
b. external-level schema - An individual
-An attribute in one table that is a primary key
user’s view of portions of a database; also
in another table.
called a subschema.
-Used to link the two tables
c. subschema - A subset of the schema; the
Anomaly
way the user defines the data and the
1.Update anomaly - where a non-primary key
data relationships.
item is stored multiple times; updating the item
d. internal-level schema - A low-level view
in one location and not the others causes data
of the entire database describing how
inconsistencies.
the data are actually stored and
2.Insert anomaly - results in the inability to add
accessed.
records to a database
Data definition language (DDL) - DBMS
3.Delete anomaly - Removing a record also
language that builds the data dictionary, creates
removes unintended data from the database.
the database, describes logical views, and
Design Requirements for Relational Database
specifies record or field security constraints.
1. Every column must be single valued.
2. Primary keys must contain data (not null).
3. Foreign keys must contain the same data as
Fraud- is gaining an unfair advantage over
the primary key in another table.
another person. Legally, for an act to be
4. All other attributes must identify a
fraudulent there must be:
characteristic of the table identified by the
1. A false statement, representation, or
primary key.
disclosure
Entity integrity rule - A non-null primary key
2. A material fact, which is something that
ensures that every row in a table represents
induces a person to act
something and that it can be identified.
3. An intent to deceive
Referential integrity rule - Foreign keys which
4. A justifiable reliance; that is, the person
link rows in one table to rows in another table
relies on the misrepresentation to take an action
must have values that correspond to the value of
5. An injury or loss suffered by the victim
a primary key in another table.
White-collar criminals - Typically,
DATABASE SYSTEMS AND THE FUTURE OF
businesspeople who commit fraud. White-collar
ACCOUNTING
criminals usually resort to trickery or cun-
Database systems have the potential to
ning, and their crimes usually involve a violation
alter external reporting significantly. A
of trust or confidence.
significant advantage of database systems is the
Corruption - Dishonest conduct by those in
ability to create ad hoc queries to provide the
power which often involves actions that are
information needed for decision making.
illegitimate, immoral, or incompatible with
ethical standards.
CHAPTER 5
Investment fraud - Misrepresenting or leaving
Common Threats to AIS
out facts in order to promote an investment that
1.Natural Disasters and Terrorist Threats
promises fantastic profits with little or no risk.
-such as fires, floods, earthquakes, hurricanes
Forms of Fraud
2.Software Errors and/or Equipment
1.Misappropriation of assets -Theft of
Malfunction
company assets by employees
-operating system crashes, hardware failures,
Largest factors for theft of assets:
power outages and fluctuations, and undetected
a.Absence of internal control system
data transmission errors
b.Failure to enforce internal control system
3.Unintentional Acts (Human Error)
2.Fraudulent financial reporting
-accidents or innocent errors and omissions
-“intentional or reckless conduct, whether by act
4.Intentional Acts (Computer Crimes)
or omission, that results in materially misleading
-a computer crime, a fraud, or sabotage
financial statements” (The Treadway
Sabotage- An intentional act where the intent is
Commission).
to destroy a system or some of its components.
Reasons for Fraudulent Financial Statements
Cookie - A text file created by a website and
1. Deceive investors or creditors
stored on a visitor’s hard drive. Cookies store
2. Increase a company’s stock price
information about who the user is and what the
3. Meet cash flow needs
user has done on the site.
4. Hide company losses or other problems
Treadway Commission Actions to Reduce Fraud
1. Establish an environment which supports the
1.Pressures- a pressure is a person’s incentive
integrity of the financial reporting process.
or motivation for committing fraud
2. Identification of factors that lead to fraud.
2.Opportunity- is the condition or situation,
3. Assess the risk of fraud within the company.
including one’s personal abilities, that allows a
4. Design and implement internal controls to
perpetrator to do three things:
provide assurance that fraud is being prevented.
1.Commit the fraud
SAS #99
2.Conceal the fraud
Auditor's responsibility to detect fraud
a.Lapping- concealing the theft of cash by means
-Understand fraud
of a series of delays in posting collections to
-how and why it is committed
accounts receivable.
Discuss risks of material fraudulent
b.Kiting- Creating cash using the lag between the
statements
time a check is deposited and the time it clears
-Among members of audit team
the bank.
Obtain information
3.Convert the theft or misrepresentation to
-Look for fraud risk factors
personal gain
Identify, assess, and respond to risk
Rationalizations
-evaluating carefully the risk of-the management
-The excuse that fraud perpetrators use to
overriding internal controls
justify their illegal behavior.
Evaluate the results of audit tests
Computer Fraud - Any type of fraud that
-Determine impact of fraud on financial
requires computer technology to perpetrate.
statements
Rise of Computer Fraud
Document and communicate findings
1. Definition is not agreed on
-to management and the audit committee
2. Many go undetected
Incorporate a technological focus
3. High percentage is not reported
the impact technology has on
4. Lack of network security
-fraud risks and provides commentary and
5. Step-by-step guides are easily available
examples recognizing this impact
6. Law enforcement is overburdened
7. Difficulty calculating loss
Computer Fraud Classifications
Input Fraud
-Alteration or falsifying input
Processor Fraud
-Unauthorized system use
Computer Instructions Fraud
-Modifying software, illegal copying of software,
using software in an unauthorized manner,
creating software to undergo unauthorized
activities
Data Fraud
-Illegally using, copying, browsing, searching, or
3.Spoofing- Making an electronic communication
harming company data
look as if it comes from a trusted official source
Output Fraud
to lure the recipient into providing information
-Stealing, copying, or misusing computer
printouts or displayed information
E-mail
-E-mail sender appears as if it comes from a
different source
CHAPTER 6
Hacking - Unauthorized access, modification, or
Caller-ID
-Incorrect number is displayed
use of an electronic device or some element of a
IP address
computer system.
-Forged IP address to conceal identity of sender
Social Engineering
of data over the Internet or to impersonate
-Techniques, usually psychological tricks, to gain
another computer system
access to sensitive data or information
Address Resolution Protocol (ARP)
-Used to gain access to secure systems or
-Allows a computer on a LAN to intercept
locations
traffic meant for any other computer on the
Malware
LAN
-Any software which can be used to do harm
SMS
Types of Computer Attacks
-Incorrect number or name appears, similar to
1.Botnet—Robot Network
caller-ID but for text messaging
-Network of hijacked computer
Hijacking - Gaining control of someone
Web page
-Phishing
else’s computer to carry out illicit activities
Botnet - A network of powerful and
DNS
-Intercepting a request for a Web service and
dangerous hijacked computers that are used to
sending the request to a false service
attack systems or spread malware.
Hacking Attacks
Zombie - A hijacked computer, typically
part of a botnet
Bot herder - The person who creates a
1.Cross-Site Scripting (XSS)
-Unwanted code is sent via dynamic Web pages
disguised as user input.
botnet by installing software on PCs that
2.Buffer Overflow
responds to the bot herder’s electronic
-When the amount of data entered into a
instructions.
program is greater than the amount of the input
2.Denial-of-service (DoS) attack - A computer
buffer.
attack in which the attacker sends so many
3.SQL Injection (Insertion)
e-mail bombs or web page requests
-Malicious code is inserted in the place of a
Spamming - Simultaneously sending the
same unsolicited message to many people
Splog - Spam blogs created to
increase a website’s Google
PageRank
query to a database system.
4.Man-in-the-Middle
-Hacker places themselves between client and
host.
Masquerading/impersonation - Gaining
4.Internet Terrorism
access to a system by pretending to be an
-Act of disrupting electronic commerce and
authorized user.
harming computers and communications.
Piggybacking:
5.Internet Misinformation
1. The clandestine use of a neighbor’s Wi-Fi
- Using the Internet to spread false or
network
misleading information
2. Tapping into a communications line and
Hacking for Fraud
electronically latching onto a legitimate user
Internet Misinformation
before the user enters a secure system
Internet Misinformation
3. An unauthorized person following an
- Using the Internet to spread false or
authorized person through a secure door
misleading information
Additional Hacking Attacks
Internet Auction
1.Password Cracking
-Using an Internet auction site to defraud
-Penetrating system security to steal passwords
another person
2.War Dialing
Unfairly drive up bidding
-Computer automatically dials phone numbers
-Seller delivers inferior merchandise or fails to
looking for modems.
deliver at all
3.Phreaking
-Buyer fails to make payment
-Attacks on phone systems to obtain free phone
Internet Pump-and-Dump
service.
Using the Internet to pump up the price of a
4.Data Diddling
stock and then selling it
-Making changes to data before, during, or after
it is entered into a system.
5.Data Leakage
-Unauthorized copying of company data.
Social Engineering
Social engineering refers to techniques
or psychological tricks used to get people to
comply with the perpetrator’s wishes in order to
Hacking Embezzlement Schemes
gain physical or logical access to a building, com-
1.Salami Technique
puter, server, or network.
-Taking small amounts from many different
Social Engineering techniques
accounts.
1.Identity Theft
Round-down fraud - Instructing the
-Assuming someone else’s identity
computer to round down all interest calculations
2.Pretexting
to two decimal places
-Inventing a scenario that will lull someone into
2.Economic Espionage
divulging sensitive information
-Theft of information, trade secrets, and
3.Posing
intellectual property.
-Using a fake business to acquire sensitive
3.Cyber-Bullying
information
-Internet, cell phones, or other communication
4.Phishing
technologies to support deliberate, repeated,
and hostile behavior
-Posing as a legitimate company asking for
3.Trojan Horse
verification type information: passwords,
-Malicious computer instructions in an
accounts, usernames
authorized and otherwise properly functioning
5.Pharming
program
-Redirecting Web site traffic to a
-Time bombs/logic bombs; Idle until triggered
spoofed Website.
by a specified date or time, by a change in the
6.Typosquatting
system, by a message sent to the system, or by
-Typographical errors when entering a Website
an event that does not occur
name cause an invalid site to be accessed
More Malware
7.Tabnapping
Trap door/back door - A set of computer
-Changing an already open browser tab
instructions that allows a user to bypass the
8.Scavenging
system’s normal controls.
-Looking for sensitive information in items
Packet sniffers - Programs that capture data
thrown away
from information packets as they travel over the
9.Shoulder Surfing
Internet or company networks.
-Snooping over someone’s shoulder for sensitive
Superzapping- Unauthorized use of special
information
system programs to bypass regular system
More Social Engineering:
controls and perform illegal acts, all without
Lebanese Loping -Capturing ATM pin and card
leaving an audit trail
numbers
Skimming -Double-swiping a credit card
CHAPTER 7
Chipping -Planting a device to read credit card
Audit committee
information in a credit card reader
-The outside, independent board of director
Eavesdropping- Listening to private
members responsible for financial reporting,
communications
regulatory compliance, internal control, and
hiring and overseeing internal and external
Type of Malware
auditors.
1.Spyware
Internal Control
-Secretly monitors and collects personal
-System to provide reasonable assurance that
information about users and sends it to someone
objectives are met such as:
else
●
Safeguard assets.
-Adware; pops banner ads on a monitor, collects
●
Maintain records in sufficient detail to
information about the user’s Web-surfing, and
report company assets accurately and
spending habits, and forward it to the adware
fairly.
creator
●
Provide accurate and reliable information.
2.Key logging
●
Prepare financial reports in accordance
-Records computer activity, such as a user’s
keystrokes, e-mails sent and received, Web sites
visited, and chat session participation
with established criteria.
●
Promote and improve operational
efficiency.
●
●
Encourage adherence to prescribed
Public Company Accounting Oversight Board
managerial policies.
(PCAOB)
Comply with applicable laws and
-Oversight of auditing profession
regulations.
-established by Sarbanes Oxley
Threat/event - Any potential adverse
-sets up auditing, quality control, ethics,
occurrence or unwanted event that could injure
independence, and other auditing standards
the AIS or the organization.
-5 members appointed by SEC
Exposure/impact - The potential dollar loss
-auditing partners must rotate periodically to
should a particular threat become a reality.
avoid familiarity threat
New Auditing Rules
Functions of IC
1. Preventive
-Deter problems
2. Detective
-Discover problems
3. Corrective
-Correct problems
a.Partners must rotate periodically
b.Prohibited from performing certain non-audit
services
New Roles for Audit Committee
-Be part of board of directors and be
independent
-One member must be a financial expert
Categories of IC
-Oversees external auditors
1. General
New Rules for Management
-Overall IC system and
-Financial statements and disclosures are fairly
Processes
presented, were reviewed by management, and
-Controls designed to make sure an
are not misleading.
organization’s information system and control
-The auditors were told about all material
environment is stable and well managed.
internal control weaknesses and fraud.
2. Application
New Internal Control Requirements
-Transactions are processed correctly
-Management is responsible for establishing and
-more specific
maintaining an adequate internal control system.
-Controls that prevent, detect, and cor-
SOX Management Rules
rect transaction errors and fraud in application
-Base evaluation of internal control on a
programs.
recognized framework.
-Disclose all material internal control
Sarbanes Oxley (2002)
weaknesses.
-Designed to prevent financial statement fraud,
-Conclude a company does not have effective
make financial reports more transparent,
financial reporting internal controls of material
protect investors, strengthen internal controls,
weaknesses.
and punish executives who perpetrate fraud
Foreign Corrupt Practices Act (FCPA)
Internal Control Frameworks
-Legislation passed to prevent companies from
Control Objectives for Information and
bribing foreign officials to obtain business
Related Technology (COBIT)
-Business objectives
-IT resources
-Complete and reliable
-IT processes
-Improve decision making
Committee of Sponsoring Organizations
d.Compliance
(COSO)
-Laws and regulations are followed
Internal control—integrated framework
ERM—Event Identification
-Control environment
-“...an incident or occurrence emanating from
-Control activities
internal or external sources that affects
-Risk assessment
implementation of strategy or achievement of
-Information and communication
objectives.”
-Monitoring
●
Positive or negative impacts (or both)
Internal Control
●
Events may trigger other events
-Enterprise Risk Management Model
●
All events should be anticipated
-Risk-based vs. control-based
-COSO elements
Risk Assessment
-Setting objectives
Identify Risk
-Event identification
-Identify likelihood of risk
-Risk assessment
-Identify positive or negative impact
Can be controlled but also
Types of Risk
●
Accepted
1.Inherent
●
Diversified
-Risk that exists before any plans are made to
●
Shared
control it
●
Transferred
2.Residual
Control Environment
-Remaining risk after controls are in place to
-Management’s philosophy, operating style, and
reduce it
risk appetite
Risk appetite - The amount of risk a company is
-The board of directors
willing to accept to achieve its goals and
-Commitment to integrity, ethical values, and
objectives.
competence
ERM—Risk Response
-Organizational structure
1. Reduce- implement effective IC
-Methods of assigning authority and
2. Accept- accept likelihood of risk
responsibility
3. Share- buy insurance/oursource/hedge
-Human resource standards
4. Avoid- not engaging in activity that
-External influences
produces risk
Control Activities
ERM—Objective Setting
Policies and procedures to provide reasonable
a.Strategic
assurance that control objectives are met
-High-level goals aligned with corporate mission
a.Proper authorization of transactions and
b.Operational
activities
-Effectiveness and efficiency of operations
-Signature or code on document to signal
c.Reporting
authority over a process
b.Segregation of duties
Primary purpose of an AIS
c.Project development and acquisition controls
●
Gather
d.Change management controls
●
Record
e.Design and use of documents and records
●
Process
f.Safeguarding assets, records, and data
●
Summarize
g.Independent checks on performance
●
Communicate
Segregation of System Duties
-Like accounting system duties should also be
separated
These duties include:
Expected loss - The mathematical product of
the potential dollar loss that would occur should
a threat become a reality
*Expected loss = Impact x Likelihood
Segregation of Accounting Duties
-No one employee should be given too much
responsibility
Segregate:
1. Authorization- approval of transactions
2. Recording- preparing source documents
3. Custody-handling cash/writing checks
●
System administration
●
Network management
●
Security management
●
Change management
●
Users
●
Systems analysts
●
Programmers
●
Computer operators
●
Information system librarian
●
Data control
Download