Professional Documents
Culture Documents
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Objectives for Chapter 3
MS:
They could charge higher prices for Windows, but
did not, because they want to make it affordable to
all
They invest huge amounts of money in research
and development which benefit society
Is good for consumers because the applications
are compatible and all use the same interface of
menu’s and icons
Competitors fear the power of a single person
in an industry that impacts on our economy
Hall, Introduction to Accounting Information Systems, 7e 15
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Four Main Areas of Business Ethics
Pressure Opportunity
Ethics
Fraud
Hall, Introduction to Accounting Information Systems, 7e Ethics 21
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
2008 ACFE Study of Fraud
Loss due to fraud equal to 7% of revenues—
approximately $994 billion
Loss by position within the company:
Position % of Frauds Loss $
Owner/Executive 23% $834,000
Manager 37% 150,000
Employee 40% 70,000
Figure 3-3
Hall, Introduction to Accounting Information Systems, 7e 36
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
SAS 78 / COSO
Describes the relationship between the firm’s…
internal control structure,
auditor’s assessment of risk, and
the planning of audit procedures
How do these three interrelate?
The weaker the internal control structure, the higher the
assessed level of risk; the higher the risk, the more auditor
procedures applied in the audit.
Transaction Authorization
Segregation of Duties
Supervision
Accounting Records
Access Control
Independent Verification
Access Controls
help to safeguard assets by restricting
physical access to them
Independent Verification
reviewing batch totals or reconciling
subsidiary accounts with control accounts
Control
Objective 1 Authorization Processing
Control
Objective 2 Authorization Custody Recording
Control General
Objective 3
Journals Ta 1 Subsidiary
Ledgers Ledger
Figure 3-4
Hall, Introduction to Accounting Information Systems, 7e 51
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Physical Controls in IT Contexts
Transaction Authorization
The rules are often embedded within
computer programs.
EDI/JIT: automated re-ordering of inventory
without human intervention
Supervision
The ability to assess competent employees
becomes more challenging due to the greater
technical knowledge required.
Accounting Records
ledger accounts and sometimes source documents
are kept magnetically
no audit trail is readily apparent
Access Control
Data consolidation exposes the organization to
computer fraud and excessive losses from disaster.
Independent Verification
When tasks are performed by the computer rather
than manually, the need for an independent check
is not necessary.
However, the programs themselves are checked.