You are on page 1of 64

Module 5: AIS and Business Processes (e.g.

here can have serious consequences; reporting


revenue cycle, expenditure cycle, general incorrect values can result in poor internal
ledger and financial reporting cycle) decision making, issues with capital markets and
the possibility of regulatory prosecution if
Introduction
corporate laws are breached.
This module examines the application of the
Data flows between the transaction cycles
concepts introduced in the Midterm period to
specific examples of business cycles or processes Learning Outcomes
that operate within a wide range of businesses.
• Appreciate the many ways technology is
These examples of transaction cycles that occur
changing management’s ability to
within a business are central to the business
monitor and control business processes
being able to attain its objectives. Each cycle
across the organization.
operates through a series of activities aimed at
• Know the objectives, inputs, and outputs
achieving a particular goal or solving a particular
of the revenue, expenditure, and
problem within the organization. This module
outlines the particular business process and the general ledger processes.
appropriate systems documentation. • Understand how business strategy
affects the data that are collected in the
The revenue cycle commences when a customer firm’s AIS and how that affects
indicates they want to purchase a product and performance measures
ends after the product has been delivered and
payment received. The level of activity within the Transaction cycle — the revenue cycle
revenue cycle drives the activity levels for all the Revenue cycle overview and key objectives
other business processes. The revenue cycle has
a large number of external interactions with For an organization to prosper it is essential that
customers. the revenue cycle is well managed and
controlled. Marketing, sales and finance are the
The expenditure cycle commences when a organizational units that have primary
section of the organization reports a need for responsibility for the revenue cycle. Sales are the
goods or services to be provided and ends when primary driver of all organizational activity and
the goods or services have been received and the most intensive customer contact point. Sales
paid for. The expenditure cycle has a large are easily lost if consumers are confronted with
number of external interactions with suppliers. an inadequate sales process or improper billing
After the transaction cycles have been practices. Losses are likely if deliveries are not
successfully completed, details are sent to the accurate, timely and well controlled. An
general ledger and financial reporting cycle to inadequate revenue cycle, or failure to collect
enable updating of the general ledger and revenues, can lead to declining sales, cash flow
subsequent financial reporting. The revenue difficulties and, in the worst cases, potential
cycle provides details of invoices raised by the insolvency or cessation of the business.
billing system and payments received from The revenue cycle is conventionally divided into
customers, and the expenditure cycle forwards two major elements. The front end of the cycle is
details of payments established and made. These client facing and is where the sales transaction
data are validated, consolidated, adjusted and takes place. The objective of the sales phase is to
used for reporting and analysis of the effectively conduct, record and monitor sales of
organization’s performance. Any errors made
goods and services, and arrange the prompt The revenue cycle can benefit greatly from
supply of goods and services. Essentially, staff technologies that provide an efficient means of
involved in the sales phase need to make sure data exchange. It is more efficient, timely and
that the organization provides the right product cost effective to transact electronically. Much of
at the right time to the right place. To achieve the paperwork generated by the revenue cycle
this objective, customer orders must be properly (e.g. invoices and shipping documents)
recorded and controlled, sales should only be originates in-house and is sent outwards to
made to creditworthy customers and delivered customers. The ability to transact online not only
goods must meet the customer’s needs. speeds up the revenue transaction cycle, it can
also act to outsource some of the transactional
Following directly on from sales is the accounts
work, and therefore costs, to the customer.
receivable phase, where the objective is to
Technologies such as electronic data
ensure payments for goods and services are
interchange (EDI) (to produce specifically
correctly received, recorded and banked. This
tailored systems for large repeat customers) and
part of the cycle is sometimes referred to as
eXtensible Markup Language (XML) (for online
‘back-office’ or ‘back-end’ processing. The
sales sites) help provide efficient data exchange.
activities in this latter part of the cycle are often
carried out by staff who do not have the same Paper documentation sent into the organization
direct contact with customers as the front-end, as part of the revenue cycle (typically remittance
or client-facing, staff who process sales. In order advices and customer purchase orders) can be
to maintain good client relationships, the handled more efficiently using digital imaging.
linkages between the front-end and back-end Scanning documents speeds up processing by
revenue systems must be well defined. The providing broader immediate access to incoming
accounts receivable phase needs to make sure documentation.
that customers are billed the right amounts for
Improvements in the revenue cycle can be made
the right products, and that those amounts are
by undertaking data mining or trend analysis in
collected at the right time. This involves ensuring
order to improve understanding of markets and
that customer invoices and receipts are prepared
product performance. Providing some form of
and recorded in an accurate and timely manner,
revenue data warehouse is necessary in order to
that cash receipts are protected from fraud and
undertake these activities. Revenue data
misuse, that receivables balances are kept to a
warehouses typically store summarized
minimum level and that the organization collects
historical revenue data arranged along product
amounts owing to it on a timely basis.
or segment lines, allowing data mining to take
Technologies underpinning the revenue cycle place.

Enterprise resource planning (ERP) systems Customer relationship management (CRM)


assist with enabling and integrating the revenue technologies can support revenue cycle activities
cycle. The revenue cycle links into many areas by improving understanding of customers and
within the organization; an ERP system not only their interactions with the organization. CRM
improves the integration of enterprise-wide data technologies typically store historical revenue
but also provides tighter linkages between data arranged by customer, in contrast to data
relevant modules such as marketing, sales, warehouses, which tend to store data arranged
production, shipping, billing, accounts receivable by market segments or chronology.
and general ledger.
Online payment facilities such as BPAY provide • Inventory data – an important data source
a simple and cost-effective way for organizations for the revenue cycle is inventory data,
to receive payments. In addition to providing which is a record of each item stocked or
more timely payments, using customer self- regularly ordered. Inventory data is primarily
service sys-tems such as BPAY helps cut data created by activities within the expenditure
entry costs and reduce error rates. The use of cycle; however, the revenue cycle also
online banking facilities improves transparency updates inventory data by recording
and reconciliation of transactions and involves decreases in stock levels created by
less cash handling, which improves security and shipment of goods. Inventory data related to
cash flows. existing stock levels are also accessed by the
sales process when deciding whether there
Tracking and recording inventory forms a large
is sufficient inventory for a potential sale to
part of the sales process. The efficiency and
occur.
accuracy of inventory-related activities can be
• Accounts receivable data – accounts
improved by the use of barcode scanners.
receivable data are both created and
Barcode scanning not only reduces error levels updated by activities within the revenue
by automating data input, it improves timeliness cycle; invoices created by billing activities
as scanned data is immediately uploaded and are recorded in accounts receivable, as are
available for use details of payments received during the
accounts receivable process. More detailed
Data and decisions in the revenue cycle
information about customer payments is
• Customer data – revenue cycle activities recorded in the cash receipts data. The most
require access to customer data, which detailed data produced by the revenue cycle
contain details of all existing customers, in are sales data, which contain all details of
order to identify authorized customers. each sale made by the organization and the
Customer data is ideally produced by a status of the sale. An additional common
dedicated customer management section of data record is accounts receivable
the organization, which has responsibility for adjustments data, where any bad or
identifying and authorizing new and existing doubtful debts and sales returns are
customers but is not involved in revenue recorded. These data are useful when
cycle activities. This customer management undertaking analysis of revenue cycle
section would also be responsible for performance, in addition to forming part of
assigning and reviewing customer credit financial reports.
limits. The revenue cycle uses customer data Objectives of the Revenue Process
in several different activities; for example,
customer credit data helps to decide if a Revenues result from an organization’s sale of
customer is creditworthy, customer address goods or services. They may also result from
data is used to arrange shipment and donations or gifts, as in the case of charitable
invoicing of goods, data relating to customer organizations. An organization that generates
demographics and order characteristics is revenues but fails to collect these revenues
often collected during revenue cycle regularly may find it cannot pay its bills. Many
activities for use in future marketing people unfamiliar with accounting make the
programs. incorrect assumption that companies with
positive incomes cannot go out of business. The
reality is that bankruptcy results from Example: Hiroshi Ajas needs to purchase books
inadequate cash flow, not from insufficient for his classes this semester. He decides to buy
income. A primary objective in processing the books online. In authorizing the order,
revenues is to achieve timely and efficient cash Textbooks4U.com’s AIS verifies Hiroshi’s credit
collection. To process sales in a timely manner, card and checks its inventory to make sure the
an organization must be able to track all books are available. The company then sends
revenues that customers owe the firm. Once the Hiroshi an email confirmation, verifying the
AIS recognizes these revenues, the system needs transaction. Textbooks4U.com’s AIS notifies its
to monitor the resulting cash inflows. warehouse via email to pack and ship the books.
The warehouse processes the shipment
Maintaining customer records is an important
information and creates a packing slip.
function of the AIS for the revenue process. This
Warehouse personnel then package the packing
includes validating a customer’s bill-paying
slip with the books and send them to Hiroshi. The
ability and payment history, assigning credit
day that Textbooks4U.com ships the books, it
limits and ratings to customers, and tracking all
charges Hiroshi’s credit card.
customers’ outstanding invoices. Processing
revenues includes filling customers’ orders, and The major events in Textbooks4U.com’s sales
this requires an interface with the inventory process are the sales order, the shipment of
control function. The AIS should bill customers goods, and the customer payment. The company
only for products shipped. The sales process will record information about each of these
must also allow for certain exceptions—for events. This information allows them to produce
example, sales returns. a variety of reports—such as book sales by
regions of the country.
Forecasting is another objective of the AIS to
help management in its planning function—a Inputs to the Revenue Process
future focus. Predictive analytics, using big data,
Figure shows a data flow diagram of the sales
is increasingly important information that
process, which identifies the data inputs and
managers need to make these decisions. The AIS
information outputs of the process. As noted in
must support this need by analyzing sales orders,
the example, an AIS typically creates a sales
sales terms, payment histories, and other data.
order at the time a customer contracts for goods
For example, sales orders can predict future
or services. In this example, an accounts
revenues, and the terms of sale provide
receivable clerk uses this sales order to prepare
information about likely dates of collection on
a sales invoice or the customer might generate
accounts.
one herself using the web page of an online
Events in the Revenue Process retailer.

Figure below illustrates an AIS for the sales The sales invoice reflects the product or products
process in a systems flowchart. This view purchased, the price, and the terms of payment.
assumes an online sales order. Notice that emails When the customer makes a payment, a
and electronic images replace many of the paper remittance advice may accompany the payment.
documents. The flowchart also assumes that the When you pay your Visa or MasterCard bill, for
AIS uses a centralized database that integrates example, the portion of the bill you return with
all data files. The following fictitious example your check is a remittance advice.
describes the sales process shown below.
In addition to sales orders, sales invoices, checks,
and remittance advices, shipping notices are
another input to sales processing. When the within a university manage course enrollments,
warehouse releases goods for shipment, the communications, and invoice and payment
warehouse clerk prepares a shipping notice. A processing, and perhaps most importantly help
copy of this notice may serve as a packing slip them stay connected with graduates who will
and would be included in the package with the potentially become donors.
goods. A copy of this document is also sent to the
Outputs of the Revenue Process
accounts receivable department and is used as a
prompt for the department to bill the customer. Processing sales transactions creates several
outputs. An AIS uses some of these outputs to
Debit/credit memoranda are source documents
produce external accounting reports (such as
affecting both the sales and purchasing
financial statements) as well as internal reports
processes. An organization issues these
(such as management reports). Management
memoranda to denote the return of damaged
reports can be in any format and contain any
goods or discrepancies in the amount owed. For
type of information managers need for decision-
example, let’s assume that Hiroshi’s package
making.
with the textbooks arrived, but two of the books
were damaged and two were the wrong One output of the sales process is a customer
textbooks. Hiroshi would return the four books billing statement. This statement summarizes
(worth $400) to Textbooks4U.com. However, outstanding sales invoices for a particular
Hiroshi must wait until the company receives the customer and shows the amount currently
books and processes the return before he will be owed. Other reports generated by the sales
issued a credit to his account (credit card) for the revenue process include aging reports, bad debt
$400. reports, cash receipts forecasts, approved
customer listings, and various sales analysis
If a company finds that it has charged a customer
reports. The aging report shows the accounts
too little for goods sold, the company would
receivable balance broken down into categories
issue a debit memorandum. This debit
based on time outstanding (see Figure 10-9). The
memorandum signifies a debit to the customer’s
bad debt report contains information about
account receivable with the company to reflect
collection follow-up procedures for overdue
the amount not charged originally. The customer
customer accounts. In the event that a
now owes more to the company.
customer’s account is uncollectible, the account
Business organizations use the data they collect is written off to an allowance account for bad
about their customers and sales transactions to debts. A detailed listing of the allowance account
improve customer satisfaction and increase may be another output of the sales process.
profitability. As a result, firms are purchasing or
All of the data gathered from source documents
developing customer relationship management
in processing sales transactions serve as inputs
(CRM) software to gather, maintain, and use
to a cash receipts forecast. Data such as sales
customer data to provide better customer
amounts, terms of sale, prior payment
service and enhance customer loyalty. However,
experience for selected customers, and
think broadly here about potential uses of CRM
information from aging analysis reports and cash
software. For example, many universities are
collection reports are all inputs to this forecast.
now purchasing CRM solutions to help them
better manage their current and potential Recall that maintaining customer records is an
customers (i.e., students). These software important function of the AIS in the sales
packages help various schools and colleges process. The billing or accounts receivable
function should approve new customers, both to that underpin the cycle are discussed and then
ensure that the customers exist and to assess the data produced and consumed during the
their bill-paying ability. This may require cycle activities are identified. Typical business
obtaining a credit report from a reputable credit process decisions are examined, along with
agency. The billing function assigns each new some of the primary considerations related to
customer a credit limit based on credit history. those decisions. An expenditure cycle is fully
From time to time, the AIS produces an approved documented using process maps, data flow
customer listing report. This report is likely to diagrams (DFDs) and flowcharts.
show such information as customer ID numbers
Expenditure cycle overview and key objectives
(for uniquely identifying each customer), contact
name(s), shipping and billing addresses, credit In order to achieve overall business objectives
limits, and billing terms. and remain profitable, the expenditure cycle
needs to be well designed and tightly controlled.
If an AIS captures (or converts) appropriate sales
Poorly controlled expenditure can lead to cash
data electronically, it can also produce various
flow and liquidity problems. An additional
sales analysis reports. These include sales
consideration for the expenditure cycle is the
classified by product line, type of sale (cash,
need to balance the supply and demand for
credit, or debit card), or sales region. However,
products within the organization. The revenue
the sales process can only produce effective
cycle sales phase discussed previously
sales analysis reports if the AIS captures
determines the demand for the goods and
appropriate sales data. A customer relationship
services provided by the company. The primary
management solution can help managers take
responsibility of the expenditure cycle
advantage of this data to maximize revenue and
purchasing phase is to ensure the supply of
to provide better customer service.
goods balances this demand.
Transaction cycle — the expenditure cycle
Similarly to the revenue cycle described
Expenditure-related activities are strategically previously, the expenditure cycle is generally
and operationally important for all thought of as two separate elements. The first of
organizations. The expenditure cycle these is purchasing. This phase interacts
commences when a section of the organization extensively with external suppliers of goods and
signals a need for goods or services to be services; the overall objective is to procure the
provided and ends when the goods or services right goods at the right amount, and to receive
have been paid for. During the cycle, demand for those goods at the right time. In order to achieve
requested goods or services needs to be this outcome, initiated purchases need to be
correctly established and any resulting purchase properly approved and authorized; goods and
orders need to be accurate and appropriately services need to be obtained from authorized or
authorized. Delivered goods must be received in pre-vetted suppliers; all purchase commitments
a timely fashion and both the quality and and obligations need to be recorded accurately;
quantity of goods delivered need to be checked and accepted goods and services must meet
before acceptance. Payments made to suppliers quality and delivery specifications. Errors in the
must be both timely and accurate. purchasing phase can lead to a situation where
goods are not available to meet customer needs
This topic commences with an overview of the
if demand is underestimated, or to the
expenditure cycle and then considers the
organization incurring unnecessary inventory
strategic implications of that cycle. Technologies
holding costs if demand is overestimated.
Following the purchasing phase is the accounts relevant modules such as sales, production,
payable phase, where the objective is to pay the accounts payable, cash budgeting and general
right people the right amount at the right time. ledger. In essence, an ERP system acts to provide
The activities in this phase are typically tighter connections between demand and supply
conducted by back--office staff who will not functions within the organization.
necessarily have had previous contact with the
The expenditure cycle can benefit greatly from
suppliers of the goods. In order to ensure
technologies that provide an efficient means of
ongoing good relationships with suppliers and
data exchange with suppliers of goods and
minimize the risk of improper payments, it is
services. Some of the ‘paperwork’ associated
essential that all relevant information relating to
with the expenditure cycle (e.g. purchase orders,
the purchasing phase is shared with the accounts
purchase requisitions) originates in-house and is
payable phase. Additionally, the quality of the
sent outwards to customers, and the remainder
goods received, although not a data point
is generated externally by suppliers (e.g. price
conventionally thought of as related to
quotes, invoices, delivery dockets). Use of
accounting, is a vital indicator when deciding
technologies such as electronic data
whether a payment should be made to a
interchange (EDI) can provide accurate, timely
supplier. The accounts payable phase needs to
and cost-effective data sharing.
ensure that payments are made by authorized
employees only, and that those payments are The expenditure cycle involves many activities
both accurate and timely, while ensuring that related to the physical handling and movement
favorable settlement terms are used to of goods. Where volumes are sufficiently high to
advantage. In order to ensure the integrity of warrant the use of printed barcodes or radio
financial reporting and financial statements, all frequency identification (RFID) tags, hand-held
accounts payable liabilities must be recorded scanning devices can cut stock handling and
accurately and promptly. recording costs and improve the accuracy and
timeliness of inventory and expenditure data.
Technologies underpinning the expenditure
cycle Specialized supply chain management software
(SCM) can be used to improve both the planning
There are a number of technologies suitable for
(identifying demand for products) and execution
supporting activities within the expenditure
(receiving orders, routing goods) of the supply
cycle and improving the overall functioning of
chain by providing detailed supply chain
the process. A range of inventory management
analytics. SCM can be incorporated as an
tools are available to help improve the ability to
integrated module within an existing ERP
balance supply and demand for goods and
system, or acquired and operated independently
services. Transparency and management of cash
using a best-of-breed supplier such as
payments and cash flows can also be improved
Manhattan Associates or i2 Technologies.
by the use of appropriate technologies.
The ability to make electronic payments provides
Enterprise resource planning (ERP) systems
a fast and comparatively inexpensive way for
assist with enabling and integrating the activities
organizations to settle their accounts with
within the expenditure cycle. The expenditure
suppliers. When using electronic payment
cycle links into many areas within the
facilities such as those provided by the major
organization, and an ERP system can not only
banks it is important to consider the timing and
improve the integration of enterprise-wide data
cash flow implications. A payment made
but also provide tighter linkages between
electronically will take funds from a company received data are also used to verify invoice
bank account immediately, whereas a payment validity during the accounts payable phase.
made via cheque may take up to ten working • Accounts payable data – both created and
days before any funds are withdrawn from the updated by activities within the expenditure
company account. In addition to these payment cycle; invoices received from suppliers are
timing issues, it is vital to consider and recorded in accounts payable, as are details
appropriately design access security over online of payments made during the accounts
payment facilities. payable phase. More detailed information
about payments made is recorded in the
Data and objectives in the expenditure cycle
cash payments data store.
• Inventory data – expenditure cycle activities
Objectives of the Expenditure cycle
require access to data related to inventory to
help identify existing stock levels. In order to Credit transactions create accounts payable.
correctly identify how much to purchase it is Accounts payable processing closely resembles
important to be familiar with both the accounts receivable processing; it is the flip side
current demand for the goods (which comes of the picture. With accounts receivable,
from the sales process) and how much companies keep track of amounts owed to them
inventory is currently available for sale. from their customers. An accounts payable
Expenditure cycle activities ultimately result application tracks the amounts owed by a
in an increase in the amount of inventory on company to vendors. The objective of accounts
hand. Inventory data should ideally be payable processing is to pay vendors at the
updated regularly by expenditure activities optimal time. Companies want to take
to indicate the current status code of goods advantage of cash discounts offered and also
that have been ordered but not yet received. avoid finance charges for late payments.
Inventory data typically include many non-
Maintaining vendor records is as important to
financial indicators, such as quality of the
the purchasing process as maintaining customer
goods received. There are also a number of
records is for the sales process. The purchasing
dates of significance when analyzing
department is responsible for maintaining a list
inventory and supplier performance, such as
of authorized vendors to ensure the authenticity
date ordered, date confirmed, date
of vendors as well as finding reputable vendors
expected, and date delivered.
who offer quality goods and services at
• Supplier data – the expenditure cycle
reasonable prices. Vendor shipping policies,
requires access to data about suppliers,
billing policies, discount terms, and reliability are
including both basic name and address
also important variables in the approval process.
details and information about preferred
Businesses today are strengthening their
suppliers, including past performance.
relationships with their vendors or suppliers,
• Purchase order data – records details of all
recognizing that they are partners in a supply
open (incomplete) purchase orders,
chain. One of the most successful supply chain
including the current status of each of the
management “partnerships” is that of Walmart
items on the order
and Procter & Gamble.
• Goods received data – lists items received
from suppliers and typically updates the The purchase of goods affects inventory control.
inventory status of those goods. Goods The objective of inventory control is to ensure
that an AIS records all goods purchased for and
dispensed from inventory. The inventory control for the goods received. The clerk then enters
component of the purchasing process interfaces information about the receipt (e.g., date, time,
with production departments, the purchasing count, and condition of merchandise) to create
department, the vendor, and the receiving an electronic receiving report. Upon receipt of an
department. electronic vendor invoice and the receiving
report, the accounts payable system remits
A final objective of the purchasing process is
payment to the vendor.
forecasting cash outflows. The addition of
outstanding purchase requisitions, purchase The economic and business events in the
invoices, and receiving reports provides an university’s purchasing process are the purchase
estimate of future cash requirements. With the request, purchase order, receipt of goods, and
forecast of cash receipts produced by the sales payment to the vendor. The university’s AIS
process, this estimate allows an organization to records information about each of these events
prepare a cash budget. and produces a variety of reports. The next two
sections describe the information inputs and
some of the reports associated with the
Events in the expenditure cycle purchasing process.

Figure below shows a systems flowchart that Inputs to the Expenditure cycle
describes the purchasing process. As with the
sales process, the flowchart assumes a
As explained earlier, the purchasing process
centralized database and a mix of paper
often begins with a requisition from a production
documents and electronic images. The following
department for goods or services. Sometimes, an
fictitious example describes the purchasing
AIS triggers purchase orders automatically when
process shown below
inventories fall below prespecified levels. The
purchase requisition shows the item(s)
requested and may show the name of the vendor
Example: Benjamin Controller is an employee at who supplies the goods.
a large state university. He needs to purchase a
new computer, so he pulls up the purchase In above about the events of the expenditure
requisition form on the university’s website and cycle, the accounts payable system matches
fills in the appropriate information. He sends the three source documents before remitting
completed form to his supervisor for approval, payment to the vendor: the purchase order, the
who approves the request and clicks the receiving report, and the purchase invoice. A
“Submit” button to forward the request purchase invoice is a copy of the vendor’s sales
electronically to the purchasing department. A invoice. The purchasing organization receives
purchasing agent creates an electronic purchase this copy as a bill for the goods or services
order based on the information provided. The purchased. The purpose of matching the
agent consults the vendor file to locate an purchase order, receiving report, and purchase
authorized vendor for the requested computer. invoice is to maintain the best possible control
The AIS then sends an electronic version of the over cash payments to vendors. For example, the
order to the receiving department and another absence of one of these documents could signify
copy to the vendor. When the computer arrives a duplicate payment. A computerized AIS can
from the vendor, a receiving clerk consults the search more efficiently for duplicate payments
AIS system to verify that a purchase order exists than a manual system.
For example, auditors can search for intentional merchandise package. This document indicates
(or unintentional) errors by instructing an AIS to the specific quantities and items in the shipment
print a list of duplicate invoice numbers, vendor and any goods that are on back order. The next
checks for like dollar amounts, and similar time you order goods through a catalog or over
control information. the Internet, look for a packing slip.

The purchase requisition initiates the purchase Outputs of the Expenditure cycle
order. Besides the information on the
Typical outputs of the purchasing process are
requisition, the purchase order includes vendor
vendor checks and accompanying check register,
information and payment terms. The purchasing
discrepancy reports, and a cash requirements
department typically prepares several copies (or
forecast. The check register lists all checks issued
images) of the purchase order. In a paper-based
for a particular period. Accounts payable
system, the purchasing clerk sends one copy of
typically processes checks in batches and
the purchase order to the receiving department
produces the check register as a by-product of
to serve as a receiving report or, preferably, to
this processing step. Discrepancy reports are
prompt the receiving department to issue a
necessary to note any differences between
separate receiving report. This copy of the
quantities or amounts on the purchase order,
purchase order is specially coded (or color-
the receiving report, and the purchase invoice.
coded) to distinguish it from other copies of the
purchase order if there is no separate receiving The purpose of a discrepancy report is to ensure
report. The receiving department copy might that no one authorizes a vendor check until the
leave out the quantities ordered that are appropriate manager properly reconciles any
identified in the purchase order. This is done for differences. For example, assume that a
control purposes, so that workers receiving the receiving report indicates the receipt of 12 units
goods must do their own counts, rather than of product, whereas the purchase order shows
simply approving the amounts shown on the that a company ordered 20 units and the
purchase order. purchase invoice bills the company for all 20
units. The accounts payable function records the
Another source document, a bill of lading,
liability for 20 units and notes the situation on a
accompanies the goods sent. The freight carrier
discrepancy report for management. This report
gives the supplier a bill of lading as a receipt,
would trigger an investigation. For example, it is
which means the carrier assumes responsibility
possible that the vendor made two shipments of
for the goods. It may contain information about
merchandise, and one shipment has yet to be
the date shipped, the point of delivery for freight
received. If this is the case, receipt of the second
payment (either shipping point or destination),
shipment clears this discrepancy from the next
the carrier, the route, and the mode of shipment.
report. However, if this is not the case, it is
The customer may receive a copy of the shipping
important for management to determine the
notice with the purchase invoice. This is
cause of the discrepancy as soon as possible.
important to the accounts payable subsystem,
since accounts payable accruals include a liability The purchasing process produces a cash
for goods shipped free on board (FOB) from the requirements forecast in the same manner that
shipping point. Goods shipped this way have left the sales process produces a cash receipts
the vendor, but the customer has not yet forecast. By looking at source documents such as
received them. Another source document, the outstanding purchase orders, unbilled receiving
packing slip, is usually included in the
reports, and vendor invoices, an AIS can predict When reporting and monitoring using variance
future cash payments and their dates. analysis (budget estimates compared to actual
results), it is important to identify the root cause
of any variances observed. As an example, an
Transaction cycle — the general ledger and unfavorable variance between budgeted and
financial reporting cycle actual data may be the result of poor
performance, or it is possible that budget
The general ledger and financial reporting cycle estimates were set at an unrealistic or
summarizes, adjusts and reports on data from all unachievable level. It is necessary to identify
the previous operational cycles. During the which of these circumstances apply, as differing
general ledger and financial reporting cycle, remedial actions are appropriate. An incorrect
budgets are created and agreed upon, and budget estimate should be corrected and
transactional-level data are accumulated, analysis should be undertaken to determine how
summarized, adjusted and, finally, reported to the estimation error occurred in order to prevent
internal and external users. Most decision recurrence. If the budget is realistic but poor
making by managers within the organization is performance is the underlying cause of the
based on data supplied by the financial reporting variance, the poor performance should be
cycle; investors rely on these reports when addressed via performance management of the
making investment decisions; and reports are individual or division involved.
also supplied to external regulators for assessing
compliance with relevant corporate legislation. Once budgets have been finalized, the ongoing
Assuring the timeliness, validity, accuracy and work of extracting transactional data generated
completeness of reported data is critical to during the operational transaction cycles
organizational success. (revenue, expenditure, production and payroll)
and transferring a summarized version of these
General ledger and financial reporting cycle transaction streams into the relevant general
overview and key objectives ledger accounts takes place. This initial set of
The first part of the financial reporting and activities creates a trial balance of the accounts.
general ledger cycle involves creating an It is important to note that this extraction activity
operational budget for the organization. Budgets does not provide any assurance that the original
are usually created on an annual basis and transactions were recorded accurately. If an
updated monthly or more frequently if required. operational process has a control weakness that
The purpose of budgeting is to facilitate results in inaccurate data being recorded at a
organizational planning and control. Creating transactional level, this same flawed data will be
budgets requires careful estimation of future transferred into the general ledger accounts.
activity levels and the associated potential costs At periodic intervals, a bank reconciliation is
and revenues; finalized budgets are then used as performed in order to independently verify the
a control measure to help ascertain and monitor balances of the cash-based general ledger
required organizational and individual accounts. After this reconciliation is successfully
performance levels. In order to motivate completed, adjusting journal entries are
desirable behavior by managers within the prepared and input. These adjusting journals
organization, budgets should be framed so that create an adjusted trial balance, where the
activity targets are achievable but challenging. values contained in the accounts comply with
the requirements for recognizing revenues and
expenses contained in the accounting standards. Technologies underpinning the general ledger
Once the adjusted trial balance has been and financial reporting cycle
finalized, financial reporting can take place.
Enterprise resource planning (ERP) systems
Typically, we divide reports into two major assist with integrating the general ledger into the
categories: management reports, which are operational cycles that precede general ledger
used within the organization, and general and financial reporting processes in the overall
purpose financial statements, which are business transaction cycle. The general ledger
distributed externally. Management reports links back into most areas within the
tend to be far more detailed in terms of content, organization, so an ERP system acts to improve
and are not intended for sharing outside the enterprise data integration and facilitate
organization. General purpose financial stronger controls over the extraction and posting
statements are constructed in accordance with of data from subsidiary ledgers.
the requirements of the relevant accounting
A robust, user-friendly report-generating tool
standards and contain far less detailed
such as Cognos or Crystal Reports is essential for
information, but are freely available to a wider
the production of both ad hoc and standard
range of users.
financial reports. These business intelligence
The objective of the general ledger and financial tools typically provide a simplified user interface
reporting cycle is to synthesize and report data to allow interrogation of the underlying data and
that accurately represents business transactions data dictionary, and the creation of reports using
and activities. In order to achieve this objective, a drag-and-drop-style interface. The deployment
budgets must be accurately and completely of these user-friendly tools is particularly useful
determined and recorded, and transactions in an environment where end-users of financial
extracted and posted must be complete and systems take responsibility for designing and
accurate. In addition, any adjustments that are producing their own financial reports.
required must be made prior to financial
Access to online banking is helpful in terms of
reporting taking place. Any financial report that
being able to monitor and reconcile cash
is based on accrual accounting assumptions can
transactions more easily. Access to online
only be relied upon if it is generated using
banking can also be helpful for organizations that
correctly adjusted data.
wish to automate bank reconciliations. The
An exception is where an operational report (e.g. ability to download files in electronic format
a simple transaction listing) is required by directly from a bank website presents an
management — basic reports can be generated opportunity to compare bank statement and
at any time after a transaction is recorded; it is cash transaction files electronically, improving
not necessary to wait until end-of-period both the timeliness and accuracy of bank
adjustments have been completed. These types reconciliations.
of detailed reports usually extract and report
As described previously, eXtensible Business
data directly from more detailed subsidiary
Reporting Language (XBRL) is a data standard
ledgers (e.g. accounts receivable and cash sales)
used when generating financial reports. The
rather than the summarized general ledger.
importance of this standard is that it allows
semantics, or meaning, to be embedded within
strings of financial data, allowing more in-depth
analysis to be conducted by users or recipients of
the data. This meaning is conveyed by inserting entries. Although small in volume, these
embedded tags that identify where separate adjusting journals can have a huge financial
pieces of data start and end within strings of impact on the financial results subsequently
data. Corporate regulators worldwide are reported. General journal data is typically stored
gradually moving towards mandating XBRL data in a separate journal voucher data store, as well
for corporate filings and reporting. as in the relevant general ledger accounts.

Data in the general ledger and financial Data produced by the general ledger and
reporting cycle financial reporting cycle are used by all levels of
management within the organization and by
Budget data is often initially created based on
investors, analysts and regulators external to the
prior year data, then manually adjusted and
organization. Access to financial data usually
entered into the financial system by finance
occurs by means of paper or electronic reports
personnel and operational managers. Budget
for users within the organization. External
data is held in the general ledger chart of
reporting has traditionally been paper based
accounts, and is used in reporting, largely as a
only, with recent augmentation by electronic
target or benchmark level against which actual
reporting.
results are compared.
General ledger and financial reporting
The general ledger and financial reporting cycle
processes
initially extracts existing transactional data from
subsidiary ledgers. These subsidiary ledgers Each of the business processes of an
include the accounts receivable ledger (which organization feed financial transactional data
contains details of customer invoices raised and into the general ledger. The general ledger
payments received) and the accounts payable provides details for all the accounts within the
ledger (which contains details of supplier chart of accounts. Recall from your accounting
invoices received and payments approved and courses that the general ledger is the entire set
made). The payroll data store provides details of of T‐accounts for the organization. Each set of
salary and wage transactions. The raw materials, processes affects general ledger accounts. For
labor and overheads data stores from the example, sales and sales return processes affect
production cycle provide details of production the accounts receivable, sales, inventory, and
costs incurred. The general ledger uses all this cost of goods sold accounts. For manual
transactional data to create summarized accounting systems, the process in which
transactions in the accounts within the general transactions are posted to the general ledger is
ledger. These general ledger accounts are called the accounting cycle. Figure below is a
conventionally referred to as the chart of summary of the processes in the accounting
accounts for the organization. cycle:

A typical general ledger account code will Business processes in an organization consist of
contain a string of indicators representing items various accounting transactions. When an event
such as the transaction type (e.g. revenue, occurs, the accountant must decide whether the
expense or equity), the division or section of the transaction is a regular, recurring transaction. If
organization the transaction relates to, and the the transaction is regular and recurring, it would
nature of the transaction (e.g. chart of accounts). be recorded in a special journal. Special journals
are established to record specific types of
The only new data created by the general ledger
transactions. For example, a sale to a customer
and financial reporting cycle are general journal
would be recorded in a special journal called the ledger. This ends the accounting cycle for the
sales journal. The sales journal is the appropriate current fiscal period, and the cycle begins anew
place to record all credit sales. A typical sales in the next fiscal period.
journal is formatted with columns to record the
These examples of accounting records focus only
amount of the sale and the corresponding
on sales and receivables. There are similar
receivable. That is, one column exists for sales
special journals and subsidiary ledgers for other
dollar amounts (a credit), and one column for
regular, recurring transactions such as
accounts receivable amounts (a debit). In
purchases, cash receipts, cash disbursements,
addition, regular, recurring transactions are
and payroll. Also, there are other subsidiary
posted to subsidiary ledgers. Subsidiary ledgers
ledgers such as accounts payable, inventory,
maintain the detail information regarding
payroll, and fixed assets. When a transaction
routine transactions, with an account
occurs, the accountant must choose the correct
established for each entity. For example, a credit
set of special journals and subsidiary ledgers in
sale to a customer must be recorded in the
which to record the transaction. In an automated
accounts receivable subsidiary ledger. This
ERP system, when a transaction is entered, the
subsidiary ledger maintains transaction details
appropriate special journals and subsidiary
and balances for each individual customer. At
ledgers are automatically updated.
regular intervals, such as the end of each day or
end of each week, the totals from the special Reporting as an Output of the General ledger
journals are posted to general ledger accounts. and financial reporting processes
Some transactions are not regular, recurring The information in the general ledger accounts
transactions, and thus are not recorded in provides important feedback for both internal
special journals and subsidiary ledgers. The and external parties. External parties such as
transactions in capital and investment processes investors and creditors use summarized
are examples of nonroutine transactions, which accounting data in the general purpose financial
are entered in the general journal and posted to statements to evaluate business performance.
the general ledger. Internal managers need financial and
nonfinancial feedback for proper planning and
At period end, it is important to ensure that all
control of operations. Internal managers need
revenue, expenditure, payroll, payable, and
much more frequent and detailed reports than
receivable transactions have been posted to the
external users. The sections that follow describe
general ledger. After all these transactions are
the external and internal reporting concepts.
recorded for the month, accruals and other
adjusting entries are recorded in the general External Reporting
journal and then posted to the general ledger.
After all transactions are accrued and posted, a The four general purpose financial statements—
trial balance is prepared from the general ledger balance sheet, income statement, statement of
account balances. cash flows, and statement of retained earnings—
are created from general ledger account
The financial statements are prepared from the balances. These financial statements are
adjusted balances in the general ledger. To generated at the end of the accounting cycle.
prepare the general ledger for the next The dollar amounts reported are all derived from
accounting period, and to transfer earnings to general ledger account balances. Usually,
retained earnings, closing entries are recorded in accounts are combined and summarized when
the general journal and posted to the general reported in general purpose financial
statements. External users do not need detailed fall into three categories: the type of
balance information on every existing account in organization, the underlying function managed,
the general ledger. For example, a large and the time horizon.
company may have several general ledger
Type of Organization
accounts for various types of cash and cash
equivalents. These individual cash accounts are Although this may seem obvious, the type of
combined, or “rolled up,” into one dollar amount organization affects the type of reports that are
reported as Cash on the balance sheet. This same needed to manage the organization. For
summary process occurs for all of the line items example, manufacturing firms need different
on the general purpose financial statements. reports than retail firms or service firms.
Sales revenue as reported on the income Manufacturing firms must have internal reports
statement may be a combination of many to help manage the flow of raw materials, work
revenue accounts in the general ledger. There in process, and manufacturing labor. Retail firms
may be a revenue account for each product or do not have these processes. However, both
product line so that managers can track sales of retail and manufacturing firms manage
individual products. However, external users inventories, while service firms do not.
would be overwhelmed by the detail in several Therefore, service firm internal reports are more
revenue accounts. Therefore, the revenue likely to focus on sales and the status of projects.
accounts are rolled up into one or a few lines on Certainly, all three types of firms use revenue
the income statement. and profitability reports. Some organizations,
such as governmental or charitable foundations,
The IT accounting systems are programmed to
are not profit‐oriented, so their internal reports
combine, or roll up, accounts when the system
tend to focus on cash flows, funding sources, and
processes the financial statements. The financial
expenditures.
statements are designed and programmed into
the IT system when the system is implemented. Function Managed
When these financial statement reports are
needed at the end of the period, they may be The type of business function that a manager
printed by the IT system. Prior to the printing and oversees also affects the type of reports needed.
distribution of these reports, the CFO and the An operations manager needs reports about
accounting staff oversee the closing process to operations, such as reports about machine
ensure that the dollar amounts are correct and hours, down time of machines, units produced,
complete, usually by printing various reports in defective units, and material usage. These types
the IT system and reconciling them to ensure of operational reports may not be prepared from
their accuracy. data in the general ledger. However, as
transactions are recorded in the accounting
Internal Reporting processes, financial as well as nonfinancial data
are accumulated. Therefore, the accounting
The internal reports to be provided to managers
system often records both financial and
vary greatly depending on several factors.
operational data that can be used in reports.
Internal reports are usually not general‐purpose
financial statements, but reports that are Managers who direct financial aspects of a
tailored to the specific needs of each business need financial data in reports. For
management level and function. The many example, an accounts receivable manager needs
factors that affect the type of report provided to reports that show aged accounts receivable.
internal users can be summarized so that they Higher‐level managers examine financial reports
regularly to properly manage sales,
expenditures, cash flows, inventories, and many
other financial aspects. These financial reports
are prepared directly from ledgers, journals, and
other accounting records.

Time Horizon

The relevant time horizon impacts the type of


reports needed by management. In day‐to‐day
business activities, managers are likely to use
details such as unit measures, physical counts,
and other non‐financial data. However, as the
time horizon expands, the types of reports that
are useful are likely to involve financial
measures. For example, on a day‐to‐day basis a
purchasing manager is likely to focus on physical
counts such as quantities ordered; yet, as the
time horizon lengthens to a month, financial
data such as purchase price variances become
more useful. Therefore, for time horizons of one
month or longer, reports generated from general
ledger information are likely to be very
important.
Module 6 Internal Controls An internal control system consists of the various
methods implemented within an organization to
Introduction
achieve the following four objectives: (1)
Setting goals and trying to achieve them are the safeguard assets, (2) check the accuracy and
role of a sound corporate governance structure. reliability of accounting data, (3) promote
The corporate governance structure includes the operational efficiency, and (4) enforce
internal control system. There is a range of prescribed managerial policies. An organization
alternatives for how corporate governance and that achieves these four objectives is typically
internal control structures are designed. This one with good corporate governance, which
chapter presents some of the concepts about the means managing an organization in a fair,
structure and operation of such systems. These transparent, and accountable manner to protect
structures and systems allow a business to check the interests of all the stakeholder groups.
whether it is achieving its goals and objectives,
COBIT framework and principles
part of which includes making sure that the right
things are being done within the organization. COBIT was originally an acronym for Control
This chapter also introduces you to the role of Objectives for Information and related
internal controls and how they fit within the Technology. It is now used in the short form:
overall management and governance of the COBIT. COBIT has evolved from a purely audit
organization. The chapter will take you through focus to a framework that integrates IT
the concepts of corporate governance and IT processes and functions to build the business
governance, introduce you to some well-known capability of organizations.
IT governance standards and explain how these
COBIT 5, A business framework for the
standards fit within a framework of sound
governance and management of enterprise IT,
corporate governance. The topic of internal
aligns with the standard ISO/IEC 38500:2015.
controls is introduced through a discussion of the
An important distinction is that ISO/IEC 38500
COSO and ERM frameworks.
takes a behavioral stance, that is, it provides
Definition of Internal Control guidance for IT governance behavior. COBIT 5
takes a process stance, that is, it provides
Internal control describes the policies, plans, and
guidance on processes, suggesting auditable
procedures implemented by management of an
performance metrics.62 COBIT 5 provides a
organization to protect its assets, to ensure
framework for governing and managing
accuracy and completeness of its financial
enterprise (across the organization) IT.
information, and to meet its business objectives.
Usually, the people involved in this effort are the The COBIT 5 framework enables IT to be
entity’s board of directors, the management, governed and managed in a holistic manner for
and other key personnel in the firm. The reason the entire enterprise (organization). COBIT 5
this is important is that these individuals want includes the full end-to-end business and IT
reasonable assurance that the goals and functional areas of responsibility as well as the
objectives of the organization can be achieved IT-related interests of internal and external
(i.e., effectiveness and efficiency of operations, stakeholders.
reliability of financial reporting, protection of
assets, and compliance with applicable laws and
regulations).
COBIT 5 is based on five key principles: manipulates the inputs and produces
outputs (e.g., products, services)’.
Principle 1: Meeting stakeholder needs.
3. Organizational structures. This includes
Organizations have different goals and
the key decision-making entities in an
objectives. COBIT 5 provides the resources to
organization.
support business value creation using IT. COBIT
4. Culture, ethics and behavior. Culture,
5 can be customized to suit each organization’s
ethics and behavior refers to the set of
business, realizing the benefits of IT and
individual and collective behaviors
mitigating the risks. This is important because
within an enterprise.
COBIT 5 is designed for all organizations, so
5. Information. The information enabler
each organization needs to articulate how IT
deals with all information relevant for
will create value for their organization.
enterprises, not only automated
Value creation is a governance value for all information. Information can be
organizations. Realizing benefit value (financial, structured or unstructured, formalized
public service or other) involves realizing or informal.
benefits at an optimal resource cost while
Principle 2: Covering the enterprise end-to-end.
optimizing risk. COBIT 5 recognizes that there
COBIT 5 integrates IT governance of enterprise
are multiple stakeholders. Each of the
IT into enterprise governance (corporate
stakeholders in an organization may have
governance). COBIT 5 does not focus only on
conflicting views on what creating value means.
the ‘IT function’, but treats information and
The questions asked for each decision include:
related technologies as assets that need to be
For whom are the benefits? Who bears the risk?
dealt with just like any other asset by everyone
What resources are required?
in the enterprise. COBIT 5 considers all IT-
Stakeholder needs have to be translated into related governance and management enablers
actions to achieve organizational objectives. to be enterprise-wide. Business processes are
The COBIT 5 goals cascade is the mechanism for considered end-to-end, i.e., inclusive of
translating stakeholder needs into specific, everything and everyone — internal and
actionable and customized organizational goals, external — that are relevant to governance and
IT-related goals and enabler goals. It is management of enterprise information and
important to note that the goals cascade is not related IT. In addition to the governance
prescriptive. objective, the other main elements of the
-governance approach include enablers; scope;
There are five enablers. and roles, activities, and relationships.
1. Principles, policies and frameworks. Governance enablers are the organizational
Principles and policies refer to the resources for governance, such as frameworks,
communication mechanisms put in principles, structures, processes and practices,
place to convey the governing bodies through or towards which action is directed and
and management’s direction and objectives can be attained. Governance can be
instructions. applied to the entire enterprise, an entity, or a
2. Processes. A process is defined as ‘a tangible or intangible asset. A last element is
collection of practices influenced by the governance roles, activities and relationships. It
enterprise’s policies and procedures defines who is involved in governance, how
that takes inputs from a number of they are involved, what they do and how they
sources (including other processes),
interact within the scope of any governance and management framework under the
system. leadership of the CEO.

Principle 3: Applying a single, integrated COSO internal control framework


framework. COBIT 5 provides an overarching
The Committee of Sponsoring Organizations of
framework for governance and management of
the Treadway Commission (COSO) is a joint
IT by integrating with other IT-related standards
initiative of five private sector organizations.
and good -practices. It aligns with other latest
The five organizations are the -American
relevant standards and frameworks, and thus
Accounting Association, American Institute of
allows the enterprise to use COBIT 5 as the
CPAs, Financial Executives International, the
overarching governance and management
Association of Accountants and Financial
framework integrator.
Professionals in Business and the Institute of
Principle 4: Enabling a holistic approach. The Internal Auditors. COSO is dedicated to
COBIT 5 framework defines seven categories of providing thought leadership through the
enablers: principles, policies and frameworks; development of frameworks and guidance on
processes; organizational structures; culture, enterprise risk management, internal control
ethics and behavior; information; services, and fraud deterrence. COSO released their most
infrastructure and applications; and people, current version of the framework Internal
skills and competencies. The seven categories of Control — Integrated Framework in 2013.
enablers are shown below:
The definition of internal control is deliberately
Principle 5: Separating governance from broad and reflects the following fundamental
management. COBIT 5 provides a clear concepts:
distinction between governance and
• Geared towards achieving objectives in
management. COBIT 5 defines governance as
one or more categories: operations,
follows: Governance ensures that stakeholder
reporting and compliance
needs, conditions and options are evaluated to
• A process of ongoing tasks and activities
determine balanced, agreed-on enterprise
objectives to be achieved; setting direction — a means to an end, not an end in
through prioritization and decision making; and itself
monitoring performance and compliance • Effected by people — this is not just
against agreed-on direction and objectives. about policies and procedures but
about people and their actions
Management is defined as: Management plans, • Able to provide reasonable assurance
builds, runs and monitors activities in alignment (not absolute assurance) to the board
with the direction set by the governance body and management
to achieve the enterprise objectives. • Adaptable to the organization’s
Good decisions can only be made when a structure, for the whole organization, a
systematic approach to governance and subsidiary, a division or a business
management of IT is taken. Stakeholder process.
requirements need to be evaluated to ensure The COSO framework outlines three key
they are taken into account. objectives that provide organizations with
The five principles enable the enterprise different perspectives on or aspects of internal
(organization) to build an effective governance control.
• Operations Objectives. The 3. Performance – After an organization
effectiveness and efficiency of the develops its strategy, it then moves on
business operations of the organization to identify and assess risks that could
including operational and performance affect its ability to achieve these goals.
goals and safeguarding against asset This section not only helps guide the
loss. organization’s risk identification and
• Reporting Objectives. The internal and assessment, but also how to prioritize
external financial and non-financial and respond to risks. After all, an
reporting obligations of an organization. organization is only as good as its
This includes reliability, timeliness, performance, which is bigger than just
transparency or any other requirement risk management.
set out by regulators. 4. Review and Revision – At some point
• Compliance Objectives. Adherence to after risks have been prioritized and a
laws and regulations to which the course of action been chosen, the
organization is subject. organization moves into the review and
revision phase where it assesses any
changes that have taken place. This is
COSO New ERM Framework (2017) also the opportunity to understand how
the ERM process in the organization can
The objective of enterprise risk management be improved upon.
(ERM) is to develop a holistic, portfolio view of 5. Information, Communication, and
the most significant risks to the achievement of Reporting – The last component of the
the entity’s most important objectives. COSO ERM framework involves sharing
COSO’s new ERM framework now includes five information from internal and external
components or categories with 20 principles sources throughout the organization.
spread throughout each component. Those Systems are used to capture, process,
components are: manage, and report on the
organization’s risk, culture, and
1. Governance and Culture – Forms the performance.
basis of the other components by
providing guidance on board oversight ERM uses an iterative process. Just because an
responsibilities, operating structures, organization has issued risk reports doesn’t
leadership’s tone, and attracting, mean the work is finished. With information
developing, and retaining the right about risk treatments and processes in hand, a
individuals. review and refinement of governance, strategy,
2. Strategy & Objective-Setting – This and risk management processes can and should
component focuses on strategic take place.
planning and how the organization can Evaluation of Control Activities
understand the effect of internal and
external factors on risk. This section Australian Auditing Standard ASA 315
provides guidance on analyzing Identifying and Assessing the Risks of Material
business context, defining risk appetite, Misstatement through Understanding the Entity
and formulating objectives. and Its Environment3 classifies controls into five
types:
1. Authorization Segregation of duties refers to the concept that
2. performance reviews certain key functions should not be performed
3. information processing controls by the same person. The typical reference point
4. physical controls within a business process is that record keeping
5. segregation of duties. (person who records a transaction), execution
(person who performs a transaction), custody
This perspective on control activities focuses on
(person in possession of the assets involved in a
the risk areas/activities within the organization
transaction) and reconciliation (person
and emphasizes a functionalist perspective —
reconciling transaction data) should be
what happens within the organization and how
separated. Segregation of duties also applies
the controls operate. These control areas
across the IT systems within the organization.
should be remembered, since for each one we
will see different examples of specific control
activities.
Information Processing Controls
Authorization is concerned with the activities
Information processing controls are those that
and procedures put in place to reasonably
are put in place within the organization to work
assure that the transactions and events
towards the accuracy, completeness and
occurring are carried out by those with the
authorization of transactions. Accuracy is the
appropriate authority and that such events have
aim of making sure that all data that enters the
been appropriately approved prior to execution.
system are correct and reflect the actual events
In other words, it aims to set defined roles and
that are being recorded. Completeness refers to
responsibilities for individuals within the
the aim of ensuring that all events that occur
organization as well as having mechanisms for
are recorded within the system. Authorization,
ensuring that these are adhered to. Examples of
as described above, is concerned with whether
authorization procedures in action could include
or not the events that occur are appropriately
checking a customer’s credit limit before
approved before being executed. Information
proceeding with a credit sale, or gaining a
processing controls can be classified as either
manager’s approval before making an unusually
general or application controls.
large purchase or an irregular purchase.
General Controls
Performance reviews are those activities that
involve some form of review or analysis of Any computerized system should aim to ensure
performance, typically looking to compare transactions are properly authorized, recorded
actual outcomes with those that were expected and processed in their entirety in a timely
or planned. The classic accounting example is manner.
the comparison of actual and budgeted figures
and the conduct of variance analysis to General controls are ‘policies and procedures
determine the source of the variance. Other that relate to many applications and support
types of performance reviews could include the effective functioning of application controls.
comparing two sets of data to see if they match General controls operate across the
(e.g., a bank reconciliation, which compares organization and relate to the overall
bank records to business records to ensure environment in which different information
parity between the two). systems are located. Note from the definition
that general controls do not relate to a specific
application or process and, as a result, will not
directly affect the operation of the different Discrete premises that do not attract
information systems that may exist within the attention.
organization. General controls may provide a • Discrete premises can be a
suitable environment in which separation of consideration when choosing the
duties and restricted access to resources can be location for data processing and
applied, but they do not help to control the technology headquarters. Organizations
actual operation of the different computer that do not advertise the location of
systems that the organization uses. As such, their information technology centers
general controls provide the environment are theoretically less exposed to
within which application controls operate. They targeted attacks on the organization’s
include physical controls, segregation of duties, physical resources.
user access, systems development procedures, • Swipe card access. Controlling physical
user awareness of risks, and data storage entry to buildings and office facilities
procedures. through the use of swipe card access
means only those with a swipe card will
1. Physical controls
be able to gain access. Swipe card
Physical controls are concerned with restricting technology also allows for the recording
access to the physical resources of the of data about who enter the premises
organization. At the most obvious level, the and at what time.
concern would be who has physical access to • Biometric access controls. A limitation
the organization’s computing resources. of swipe cards is that the person with
Especially for organizations that have large data the card may not necessarily be the
processing centers that handle all of the person who is meant to have the card,
transactions and information processing since swipe cards may be lost, stolen or
requirements of the organization, the risk of loaned. A way to overcome this is
unauthorized people accessing and damaging through the use of biometric controls,
(accidentally or otherwise) the physical such as fingerprint swipes or retina
infrastructure is one the organization is not scans. The benefit of this technology is
prepared to take. As a result, organizations will that biometric identification, unlike
employ a range of physical controls to restrict swipe cards or passwords, ensures that
physical access, including the following. the person gaining access is actually
authorized to do so.
• Locked computing premises. Locking
• Onsite security. The presence of onsite
facilities and restricting the distribution
security, such as a manned front desk,
of keys to the facility works in two
can be an effective means of restricting
ways. First, locked premises means that
unauthorized people from accessing a
unless you have a key you are unable to
building.
gain access. Second, if the distribution
• Security cameras to record access to
of keys is controlled it is possible to
the premises. The presence of security
narrow down the people who may have
cameras can act as both a preventive
entered the premises at a particular
and a detective access control. From a
time. Locking premises is primarily a
preventive perspective, if people know
preventive control — it stops
cameras are there, they are less likely to
unauthorized access to the premises.
attempt unauthorized access.
Additionally, if the cameras are present, passwords need to consider the following
they can provide a means of detecting aspects of password operation.
unauthorized access.
2. Segregation of duties
Format of the password
When we look at the operation of the different
transaction cycles, we will see that the Increased sophistication in the development of
recording, execution, custody, authorization algorithms and programs designed to break
and reconciliation functions should be passwords means that password strength
performed by different individuals. When becomes an important issue. The strength of
looking at IT systems, separation of duties is the password is related to its length and format.
equally important. Within the IT function, For example, a password that is set as ‘CAT’
separation of duties should exist between the would be much easier to crack than a password
users of IT, the maintainers of the IT systems, that has been set as ‘C@9at12#’. Increasingly,
system designers, system testers and those with online sites that require passwords will provide
access to the data within the systems. The indicators of password strength, with many
rationale behind this is that combining any of advocating a mix of alphanumeric characters-,
these roles creates a conflict for the individual, upper- and lower-case characters and symbols.
places the organization’s resources at risk and
enables an individual to carry out fraud without A step beyond this is to have the system
being detected. For example, if the person automatically generate a password for the user,
designing and testing a new application also has which will ensure that password format
access to the organization’s data resources protocols are adhered to on a consistent basis.
there is the possibility that the live data could The trade-off with this option is that system-
be used in the testing process. This exposes the generated passwords may be more difficult for
data to the risk of damage or corruption if the users to remember, leading to the tendency to
testing does not work as expected. write passwords down and the security risks
Alternatively, if users are also involved in the that presents.
design of programs there is the risk that, Life of the password
because of their intimate knowledge of how the
program was developed, they will be able to Increased security comes from passwords that
work around any controls that may have been are required to be changed on a regular basis,
built into the program. since the more the password is changed the
more the risk of it becoming known is reduced.
3. User access As a result, some systems will require users to
The area of user controls predominantly relates change their password on a regular basis (e.g.,
to the logical access of users to the systems every four weeks). While this has the benefit of
within the organization. The primary example in being dynamic because it changes regularly, it
this area is the use of passwords to restrict can obviously lead to confusion for the user,
system access to authorized user by allocating with the regularly changing password leading to
users a unique identification code that only they the user forgetting or confusing their password.
are aware of, which is one of the most common Other factors linked to difficult-to-remember
access control methods in operation. passwords include the composition of the
Organizations requiring users to have password and the selection method of the
password (did the user choose it or was it logged and the user required to reset their
assigned to them?) password.

Uniqueness of the password Security of the password

A user may have access to several different Given that most system users will have multiple
systems or modules within a system. If each of passwords, the tendency is for these to be
these requires a password, the potential exists written down. From a control perspective, the
for the user to have to remember numerous writing down of passwords should raise
passwords. Again, this may lead to confusion for questions about where the document
the user in trying to remember their various containing the passwords is then stored. For
access codes. The temptation for users may be example, storing the passwords in a notebook
to use the same password for various systems. that is locked in a desk drawer or filing cabinet
For example, you may use the same password is preferable to recording them on a post-it
for your email, eBay, Amazon and YouTube note affixed to the computer screen where
accounts. Ives, Walsh and Schneider cite anyone can access them. Security threats and
research that found that a typical internet user our responses to those threats are evolving, and
may have access to as many as 15 different security advice can become obsolete. For
accounts, each requiring a user identification example, users of information systems are
and password. With so many accounts, it makes encouraged to use long, complex passwords.
sense to use the same password to reduce the However, accounts are compromised regularly
potential for a forgotten password. However, (see, for example, data breaches discussed later
the risk is that, if your password for one account in this section) through password reuse, which
is discovered, it can obviously be used to access is a bigger threat today than password cracking.
multiple accounts. As such, the potential Therefore, the better advice is to use different
consequences of the password breach are passwords for different sites rather than
magnified. creating a complex password, memorizing it and
using it for all the systems you use.
When a login is unsuccessful
CEB’s 2015 Audit Plan Hot Spots lists
If a user forgets their password, they will not be
information security to be a key area because of
able to access their account. A system should be
insecure employee behaviors. For example, 93
configured to log unsuccessful login attempts.
per cent of employees admitted to violating
Keeping a log of unsuccessful login attempts can
information security policies. Importantly, the
be useful for following up on potential attacks.
report notes that organizations that focus on
Analysis may reveal that attempts happen at a
technical controls at the expense of proactively
particular time or through a particular user
managing secure employee behaviors (for
name. This could prompt further investigation.
example, appropriate password protection) can
In addition, some systems may freeze an
lead not only to financial consequences but also
account after a number of consecutive failed
to reputational, operational and legal
login attempts. Typically, after three
consequences. Recent research has suggested
unsuccessful login attempts, an account may be
two ways to deter users (or insiders) from
frozen. This control works to stop systematic
fraudulent behavior. The first is to ensure
attempts at determining a user’s password.
employees understand the risk of detection.
Once an account is frozen, the fact should be
Those employees who believe there is a high
chance of being caught will desist from
committing a fraudulent act. The second is to 6. Data storage procedures
create a fair work environment where
Information is stored on servers about
employees believe they are treated fairly.
customers, staff and intellectual property. If a
competitor was able to access this information
it could cause serious consequences for the
4. System development procedures
organization, both financially and non-
A number of different information systems can financially (for example, reputational damage).
exist in the organization that will require Increasingly, management in organizations need
maintenance and development at various to manage the risks associated with data
points in time. It is important to have in place storage either locally on their premises or in a
set policies and procedures to be followed in data center, or in the cloud. Two major risks are
the design and implementation of new software associated with cloud storage. The first is the
or systems. These should include designated inability to audit and monitor at file level. The
procedures and stages as part of the systems second is the inability to access the internet to
development process as well as restrictions on access data.
who is able to initiate and execute the
Being clear on what data is needed by different
development and installation of new programs
parts of the organization, and setting up access
within the information system. Within an
rights accordingly, is also an important control
organizational network you will see this
step. In addition, where data is of a sensitive
represented, at a simple level, by different user
nature, logs that record when the data is
privileges granted across the organization. For
accessed and who accesses the data can be an
example, the system administrator will have the
important resource used by auditors and
ability to install software, whereas a business
investigators.
user will not have such rights. Restricting users’
ability to install and modify software can be Another dimension that raises control concerns
seen as a preventive control since it provides related to data and technology resources is
reasonable assurance that untested or increased mobility. IT executives and Chief
incompatible software and software that has Information Officers may be reluctant to adopt
not been appropriately reviewed or licensed will cloud services, particularly mobile cloud,
not be placed on the system. because of security and privacy concerns. The
unresolved security issues relating to mobile
5. User awareness of risks
cloud environments include data security,
Another organizational control strategy is to network security, data locality, data integrity,
ensure that management makes their web application security, data segregation, data
employees aware of the various information access, authentication, authorization, data
system risks by investing in security education confidentiality, data breach issues, and various
training and awareness (SETA) programs. This other factors.
can include briefing sessions about password
Accordingly, control procedures relating to the
policies and computer monitoring.
access, duplication and sending of data are an
Management should ensure users of
important aspect of general control policies,
organizational information systems are aware
particularly as more organizations decide to
of the security threats and issues, and
adopt cloud-based services for storing data.
understand organizational security policies and
the policies for detection of fraud.
Examples of such control policies include, but that extra degree of security should something
are not limited to: go wrong at a main site.

• restriction of user privileges — who can Scheduling of backups is also of consideration.


read data only versus who can also copy Traditionally, systems that operated in a batch-
data -processing environment would perform
• encryption of stored data scheduled backups in the evening when the
• encryption of data being sent between system was not performing routine
locations transactions. Of course, once the first
• access logs for the access and alteration transaction of the new day occurs, the backup is
of data out of date. In this instance, the backup
• firewalls to protect data and systems mitigates the loss but does not eliminate it.
from unauthorized external access Movement has been made towards real-time
• regular updates of virus definitions backups, whereby as transactions occur data is
• regular system scans updated on site as well as at the backup site.
• scanning of attachments before This approach effectively synchronizes the
opening/downloading business’s main site with the backup site, with
• policies on attachments that will be processing occurring at both locations and a
accepted by the email system backup existing that is as recent as the last
• password/biometric identification in transaction. The potential downside to this
start-up routines for computing devices approach is that it obviously places a demand
• physical locking of portable computing on communication between the two sites and
devices when left unattended. will be more costly to maintain.

Application controls
Backup policies are also important as backups
may be the only means of recovery in the event Application controls ‘are manual or automated
of destruction or corruption of data. The procedures that typically operate at a business
frequency of backups is an organizational process level and apply to the processing of
decision, based on the extent of data and the transactions by individual applications. As this
extent to which data change on a day-to-day definition indicates, application controls are
basis. However, important aspects to keep in designed around the control objectives of a
mind when developing a backup policy are: specific business process or system (e.g., the
sales process, ordering process, manufacturing
• keeping multiple backups process or cash receipts process) and relate to
• storing backups off site or in the cloud processing within individual applications. That
• keeping multiple versions of backups is, application controls are specific to a
• deciding what and how frequently to particular business process in that they will be
back up. implemented to address the risks and threats
unique to that process. Application controls
Several organizations now offer services such as
operate within the scope of general controls. In
offsite storage and backup facilities, making use
a computerized environment, application
of internet technology as a way of transferring
controls will typically be classified as input,
backup data to remote locations and adding
processing or output.
INPUT controls prenumbering the source documents, a control
is built that helps identify any omitted or
Standardized forms
unrecorded transactions (the assertion of
The use of standardized forms can help ensure completeness) and also provides a control over
completeness. The design of the form that users the source documents.
interact with when entering data into a system
Where the source documents are potentially
is also an important consideration. There is
valuable, for example cheques, it is also useful
benefit in designing the screen to resemble
to keep a record of cancelled source
closely its paper-based equivalent in the real
documents. Cancelled source documents are
world. This makes it easier for users to navigate
those that are removed from circulation by the
the screen and ensure completeness in their
organization. For example, document number
input. Proper form design can also ensure
10 012, which may have been previously
accuracy, since the form will specify the data
identified as missing, could have been cancelled
that is required, the expected length of the data
by the organization because of an error while
(e.g. six boxes for a six-digit customer ID) and
filling out the form or cancellation of the order
any specific instructions for the data provider.
before sending the purchase order. If a record is
Standardized forms can be seen as a preventive
maintained of cancelled source documents,
control (they work towards ensuring all relevant
then reconciling gaps in the sequence of source
data is provided by specifying what must be
documents also becomes easier.
completed, reducing the chance of incomplete
forms) and a detective control (a visual Prenumbering documents can also be a useful
inspection of a completed form will quickly control to address concern about transactions
detect if any key components have not been being classified in the correct reporting period.
filled in or have been filled in inaccurately). As an organization approaches the end of the
financial year it can note the last number of key
Prenumbering documents
source documents, for example, sales invoices,
Prenumbering important documents, such as and set up procedures to make sure that
invoices, purchase orders and cheques, can be a documents after that number are allocated to
simple but effective way of helping ensure the the next period. The use of prenumbering and
objective of completeness. When documents classification filters and ranges within
are prenumbered, any missing or unaccounted accounting software can work towards this goal.
for documents can easily be identified simply by For example, if we know that the first source
looking for a gap in the sequence. For example, document issued in the period was number 299
an organization may prenumber its purchase and that the last one issued at the end of the
order forms. If an examination of the purchase period was 542 then, combining knowledge of
records shows that issued purchase orders on these numbers with the beginning and end
record go from form number 10 011 to 10 013, dates for the financial period, we can filter and
with no record of 10 012, then potentially a sort the documents to check that all documents
purchase order has gone missing. This missing before 299 have been recorded in the previous
document could be explained by honest period and all documents after 542 have been
misplacement, fraudulent use by an employee recorded in subsequent periods. The ability to
or simple cancellation. However, if documents filter transactions in this way is present within
were not prenumbered, this missing document various accounting packages, as well as through
would never have been identified. By
the downloading of data into a spreadsheet and aircraft, because an aircraft will not take off if a
manually sorting the data. passenger has checked in luggage but not
boarded the flight. This presents the issue of
how to best capture the data about which
Sequence checks passengers have boarded the flight. One option
could be to have boarding staff rekey data into
In a computer-based information system, the system as passengers present their boarding
prenumbering can be further enforced through pass. However, this is not the most efficient way
the use of sequence checks. If transactions are — the data have already been captured
entered directly into the system, with no paper elsewhere, so why rekey them? Instead, the
documentation, then the document number airline magnetizes boarding passes that it
can be assigned automatically. This will ensure issues, enabling a computer to read the data
no missing numbers in sequence checks for that were stored when the passenger checked
transactions and reduces the risk of incomplete in. This has several benefits. The obvious
data (i.e. transactions not being entered). It benefit is that staff members do not have to
could also be argued that sequence checks rekey passenger data, meaning that boarding
contribute towards ensuring the correct can be completed in less time. Second, the risk
valuation of assets since, for example, if a sale is of error is reduced since there is no opportunity
not recorded, the associated increase in for human error when rekeying the data. The
accounts receivable will not be recorded. data are accessed electronically from the
Turnaround documents boarding pass, so the risk of inconsistent data
(mismatches between what was captured when
Turnaround documents are documents that the passenger checked in and when the
originate as the output of one system and passenger boards the plane) are reduced. This
become the input for another system. There are increases the chances of input validity.
literally hundreds of examples of turnaround
documents that you would have been exposed The boarding pass is a specific example of a
to. If you have ever flown with a major airline turnaround document. Another example of a
you will have unwittingly been exposed to turnaround document is a remittance advice.
turnaround documents. Think about what When you receive a bill or a credit card
happens when you travel by air. You arrive at statement you will often notice that it has a
the airport and check your baggage in at the detachable slip attached at the bottom. This slip
baggage counter. While there you will also is designed to be returned to the organization
present the relevant identification, including a that originally sent you the bill, accompanied by
passport if travelling overseas. The attendant the payment. Take a closer look at the
will check your baggage in and allocate you to a remittance slip and you will notice that a lot of
seat, and then issue you with a boarding pass. the data are already filled in, for example,
The boarding pass contains details of your customer number, amount owed and due date.
flight, departure gate, boarding time, seat Why prepare remittance slips? When returned
allocation and any other relevant details. When with the payment to the organization, these
you then proceed to the boarding gate you slips allow payments to be linked to customers,
present your boarding pass, which is scanned so the organization knows which customer the
through a machine. What is the benefit of using cash receipts come from. Additionally, the
this document at the boarding point? Airlines details of the cash receipt are on the remittance
need to keep lists of who actually boards slip and just have to be entered by the relevant
person. The benefit is that there is no reliance organizations. In a relational database
on the customer to fill in the slip, reducing the environment, a control of this nature can be
possibility of errors and helping ensure valid established using primary and foreign keys and
and complete inputs are entering the system. through the enforcement of referential
integrity. Validity checks can contribute towards
Use of turnaround documents helps achieve
data accuracy (e.g. does the customer exist in
completeness of data entry, with all required
our customer table?), ensuring data are entered
data contained in the turnaround document.
correctly.
Turnaround documents that contain values or
monetary amounts also help contribute Completeness checks ensure that all required
towards the correct valuation and data are entered. If a user is entering a sale into
measurement of transactions (assertion of the sales system and the sales screen has ten
accuracy). different fields to be completed, then it needs
to be ensured that the user completes all ten
Data entry routines
fields. Failure to do so will lead to incomplete
A computerized information system can also data about the transactions being entered. A
have built-in programs that ensure inputs are completeness check will ensure that all required
valid and in the correct format. Examples of data are entered before the user can advance
such routines are field checks, validity checks, to later screens or move to a new sale. A
completeness checks, limit checks, range practical example of such a check can be found
checks, reasonableness checks and redundant in a lot of website store fronts and web-based
data checks. forms. If you have ever completed an online
form or made an online purchase, you will have
Validity checks take a given input for a field and probably noticed that some of the fields are
ensure that it is an acceptable value. For marked to designate them as required fields. If
example, if a customer number is being entered you try to proceed without putting data into the
when recording a sale, the program may take required fields, the site will return an error
the customer number that is input and check it message and not allow you to go any further
against a master list of customers contained in until the required fields are completed. This is a
the customer table of the database. If the way of trying to enforce input completeness for
customer number appears on the master list online forms and will contribute to the goal of
then the input is valid and the input stage can completeness. Again, this control can contribute
proceed. However, if the customer number to the accuracy of the data that has been
does not appear on the list then an invalid recorded; if necessary data about a transaction
customer number has been entered. Obviously, is not recorded then the details about the
this is not acceptable, so the system will alert transaction cannot be deemed to be accurate.
the user to this error and refuse the input. This
removes the potential for invalid or nonexistent Limit checks will check values input into a field
customer numbers entering the system, helping to make sure they fit within a predetermined
attain existence and occurrence. KPMG’s Fraud, upper limit. For example, there may be a firm
Bribery and Corruption Survey 2012: Australia policy that orders must be a maximum of 50
and New Zealand found that false invoicing was reams of paper at any one time. A limit check
the main fraud category for management, will detect any amount greater than 50 entered
making the issue of being able to validate in the quantity field and reject it. The
transactions an important one for application of limit checks is a technique for
attaining the correct valuation or measurement Automated form completion
of transactions.
A step forward from the validity checks
Range checks function in a manner similar to mentioned above is to automate part of the
limit checks, with the exception that the checks data entry routine. For example, when entering
apply to both upper and lower limits. Returning customer details to record a sale, once the
to the paper ordering example, if store policy is customer number is entered the computer can
that anywhere between 30 and 50 reams of automatically fill in other customer-related data
paper can be ordered at one time, then the fields (customer name, address, phone number
range check will detect any amount outside and so on). This is done by looking up the
these upper and lower limits. Similarly to limit customer number in the customer data table
checks, range checks help reasonably assure the and retrieving all related data. The benefit of
correct valuation or measurement of this control is that it makes data entry more
transactions. efficient, since less time is spent keying in
details. In addition, by reducing the amount of
Reasonableness checks operate to check that
data entry the chances of data entry errors are
the numeric input for a field is within a
reduced (i.e. as long as the customer number is
reasonable numeric range. For example, if a
correct all related data items will be correct). Of
field requires you to enter your number of
course, this assumes that the customer details
hours worked for a week and you key in 400
in the database are up to date.
instead of 40, a reasonableness check should
identify this value as outside reasonable values The input controls mentioned above aim to
for weekly hours and prompt you to correct the provide reasonable assurance about the
value. Once again, this check will contribute accuracy and validity of data that is entered into
towards the aims that relate to the valuation the system. Data entry errors that make it
and measurement of transactions. through the input stage can have costly
consequences.
If data are being entered for a critical event or
important transaction, then a control that can Transaction authorization procedures
be used to help ensure correctness of inputs is a
This control can help to prevent unauthorized
redundant data check. This control operates by
transactions entering the system. Risks
having the data entered twice and then
presented by unauthorized transactions can be
checking the two sets of inputs and making sure
quite large, for example, the National Australia
that they are identical. Ideally, different people
Bank announced a loss of $360 million as a
will perform the two inputs, making the
result of unauthorized foreign currency
system’s comparison of inputs more
transactions executed by staff. The issue of
meaningful. Obviously, this control has the
authorization and access rights has become
disadvantage of being costly to implement,
important for organizations with the increased
since data are required to be entered twice.
emergence of ERP systems. Because of the
Accordingly, a key factor in determining
integrated nature of an ERP system, along with
whether to implement this control will be the
the ‘interconnectivity and automation of
cost–benefit principle. If the cost of having the
processes’, correctly authorizing employees’
data entered twice exceeds the benefits, then
access and privileges is an ongoing, time-
this control would not be applied.
consuming and complex process. Authorization
procedures can also help in the attainment of
the objectives of existence and occurrence, invoices. This overcomes the limitation of the
particularly if a separate person provides the document count approach.
authorization. They can also include the review
Independent reviews
of event data before the execution of the event.
An independent review is a useful monitoring
Batch totals
technique that involves the work of one person
Batch totals are another effective input control. being reviewed by a different person to ensure
In a batch environment, transactions are completeness, accuracy and correctness, and
accumulated and, at some set interval, can potentially make information more
processed. In a sales system, for example, valuable. If the same person performs the work
invoices may be accumulated until the end of and checks the work for errors, the review is of
the day and then processed upon the little value. Consider if students were able to
completion of the day’s trading hours. A mark their own exam papers — there would be
concern in this environment is making sure that a chance that errors would not be detected or
all of the invoices are recorded in the system at that proper marking procedures would not be
the end of the day (completeness). This can be followed. For example, data about banking
helped by the use of batch totals. For example, transactions may be processed into a bank
the sales staff may accumulate their invoices reconciliation report for review by an
and at the end of the day count how many independent person, who then compares it
invoices they have. This batch of invoices, against cash receipts and payments listings and
together with a batch header form detailing bank statements to verify the reliability of the
who prepared the batch and the number of bank reconciliation process.
documents in the batch, could then be sent to
PROCESSING controls
the data entry staff, where they would be
entered in the system. Staff in data entry should Processing controls aim to ensure that data
check to ensure that they received the number within the system is correctly and accurately
of documents indicated in the batch header processed. An example is sales data entered
form, and that all these documents were throughout the day being transferred to
entered. This is an example of a document accounts receivable to update the account
count batch total. It operates to make sure no balances. Controls relate to how the computer
documents are missing, but it has limitations. handles the data in transferring it from one file
While the data entry staff may enter all the to another, and assurance is needed that (1) all
invoices, they may key in details different from sales have been transferred to accounts
those on the invoices, for example, they may receivable and (2) all sales have been correctly
key in sales of $100 instead of $1000. This will transferred to accounts receivable.
not be detected by the batch totals based on
the number of documents. Run-to-run totals

An alternative method to help with both In a computer processing environment, data


completeness and valuation or measurement will be gathered, used in a process and stored at
could be to use total sales dollars for all invoices a destination. The idea is that the total of the
in the batch. The batch process would operate data before the process of updating the data
as described above, but instead would be files should match the total of the data after the
calculated based on the sales value of the update has been performed. If we think of the
sales/accounts receivable discussed in the batch
total example, the closing balance of accounts of two sets of information that should
receivable (after the sales have been theoretically be the same to identify any
transferred) should equal the opening balance inconsistencies. Reconciliations are more
(before transfers) plus sales (ignoring any powerful if the two sets of information are
payments from customers). With this logical prepared by two different people and an
relationship between the opening and closing independent third person performs the review.
data we are able to build in checks to ensure
Batch totals
that updates have been correctly performed. If,
after the computer performs the update, the Batch totals, as explained previously, can also
closing accounts receivable balance is less than be used as a control for data processing, since if
the check total we calculated prior to the data is being shifted from one file to another
update (opening balance plus sales), the the data should not change. As such, the total
possibility exists that (1) not all sales have been of the data (be it number of records or dollar
transferred to accounts receivable or (2) all values) should be the same before and after the
sales have been transferred but they have been processing occurs.
transferred at the wrong amount or to the
wrong account. Run-to-run totals aim to check Sequence checks
that processing of data has taken place Sequence checks, as discussed previously, can
correctly, no errors have been introduced and also be used during the processing of data. At
no data has been lost. Notice how this control the processing stage, these checks can operate
does not prevent the error from happening. to ensure that no data have gone missing during
Rather, it detects that there has been an error processing activities. An example could be in
in processing and alerts the user to the the transferal of cheque payments from the
problem. Run-to-run totals will typically relate cash payments journal to the ledger accounts.
to the accurate processing and updating of data If, in the journal, we are able to identify a
and, as such, can apply to the correct valuation sequence of cheques numbered 1 through to 5
of accounts (e.g. accounts receivable), accuracy but the ledger contains cheques 1, 2, 3 and 5,
of items (have the amounts been correctly the gap in the sequence tells us that
recorded?) and completeness of transactions somewhere in processing the cheque data an
(have all transactions affecting an account been entry has been lost.
included?).
Run-to-run totals
Reconciliations
Run-to-run totals will help identify whether any
You will recall from introductory financial transaction data have gone missing between
accounting units that the purpose of a bank when they were first gathered and after their
reconciliation is to check business records processing, while accuracy is attained by
against those of the bank, enabling any checking totals to ensure that they are the same
inconsistencies between the two to be before and after the processing of data.
identified. This reconciliation process is a
valuable part of an organization’s internal Hash totals
control activities, providing it with a way to Hash totals are batch totals based around
protect its cash resources. Another example is meaningless figures, for example, the sum of all
reconciliations of control and subsidiary ledger customer numbers in a batch. Use of hash totals
accounts. Reconciliations allow the comparison can help to detect any errors that may have
entered the data during processing (e.g. if a location where only those authorized to access
hash total is taken before and after processing), the information have access to the site. For
as well as attain completeness in updates and example, employee appraisal forms would
processing. probably be best printed to a secure printer in
the HR manager’s office rather than to a general
OUTPUT Controls
printer that all staff access for their print needs.
Output controls are built around protecting the Once reports or information have been
outputs of the system. These controls protect generated, it needs to be ensured that there is
access to outputs as well as the format and an entire set of information. So for a multipage
content of outputs. Examples of output controls output that is printed, a simple but extremely
include access privileges and the ability to effective control to ensure completeness of the
generate reports, page numbering of reports output received is to preformat footers to
and end-of-report footers. provide page numbering, for example, ‘Page #
of ##’. With this page numbering system, pages
Within any information system there will collected can be identified as well as the
generally be users with different responsibilities number that there should be in total. So if there
and duties. For the principle of segregation of are six pages and the footer says there should
duties to operate effectively, these different be seven, it is easy to see that this is not the
users should have their access privileges clearly complete report.
defined based on the requirements of their job,
which will be contained in their job Along similar lines, preformatting reports to
descriptions. As an example, for reasons of contain a simple message such as ‘END OF
confidentiality it is not desirable for all REPORT’ at the completion of the report is
employees to be able to access payroll data and another way to ensure that you have the final
reports on annual salary levels and bonuses. page. This, combined with page numbering, can
Only those in the human resources department be an effective way of ensuring that any missing
should be able to access such details. pages of output are quickly identified. Database
Alternatively, the salesperson should not be queries Database queries can also be a powerful
able to update inventory records and the tool for detecting irregularities or anomalies.
inventory manager should not be able to modify For example, if a company suspects that an
or create sales records. These concerns can be employee is posing as a vendor, submitting fake
overcome by correctly establishing user invoices and receiving payment for these
privileges that relate to the data the user can invoices, a quick crosscheck of employee
add, delete or modify, as well as the reports, addresses and vendor addresses could detect
queries, outputs and information the user can this. Alternatively, if it is suspected that
access. In the integrated environment of an ERP accounts staff are keeping cash paid by
system, the correct definition of user access accounts receivable customers and reducing
privileges is especially important. accounts receivable through a sales return or
credit note entry, a query of sales returns by
Another concern about outputs, apart from customers and sales staff could be useful to
who can access them, includes the physical detect irregular levels of returns, which could
control over them once they are generated. then prompt further investigation.
Confidential or privileged information should
not be printed on a printer accessible by all
staff; such output should be printed to a secure
Disaster recovery plans business there are several approaches to
choose from, including the establishment of hot
Another crucial aspect of an organization’s
sites, cold sites and autonomic infrastructure.
control system is its ability to recover from any
An organization that can ill afford downtime
accidents or disasters that may occur and to
due to disaster may consider the establishment
minimize the damage to the organization and
of a hot site. This is a separate facility located
its resources. This aspect of the control system
away from the organization’s usual premises
is encompassed in the disaster recovery plan,
and contains offices and the necessary
which is the strategy that the organization will
equipment (such as IT, telecommunications and
put into action in the event of a disaster that
data) to get the business back up and running in
disrupts normal operations in order to resume
the minimal amount of time after a disaster
operations as soon as possible and recover data
occurs. Essentially, it is a standby site ready to
that relate to its processes. The obvious
be called into immediate action should the
example of a disaster is the terrorist attacks of
organization require it. Many different hot-site
11 September 2001 against the World Trade
subscription services are available, with
Center in New York. As the Twin Towers
organizations able to sign up with, for example,
collapsed, businesses were suddenly confronted
HP, which has 44 such sites around the world
with the prospect of immense losses, both in
for lease, or IBM, for the provision of a hot site.
terms of assets and knowledge lost and
downtime in operations. An alternative to the hot site is a cold site.
Unlike a hot site, a cold site does not have the
As a result of the threats of disaster — whether
necessary equipment and data in place for the
they be a result of terrorism, or natural
organization to immediately continue
disasters such as fire, floods, cyclones or
operations. Rather, it is an available office with
earthquakes — organizations must consider
basic telephone and electricity supplies ready
how they can deal with such threats. Their
for use should they be required. However, the
reaction to the threat of disaster can be
organization using the cold site still has to
preventive or corrective. The main aim for an
arrange for the necessary data, technology and
organization in the event of a disaster that
other resources that are required to resume
disrupts business operations is to limit the time
business operations.
the business is out of operation and minimize
the extent of loss to existing business resources Staffing
— particularly information — so that the
Staffing issues in the event of a disaster can be
business can recommence operating as quickly
divided into two categories: the evacuation of
as possible. The way an organization does this is
staff who are present at the location of the
outlined in the disaster recovery plan, which
disaster, and access to staff after the disaster. In
will include provisions for temporary sites, the
the event of a disaster, obviously staff need to
restoration of business networks, staffing and
be familiar with the appropriate evacuation
preserving business relationships.
procedures. After a disaster, organizations need
Temporary sites to be able to contact key employees who are
part of the recovery plan to ensure that the
In the event of a business’s place of operation
disruption to the business is minimal.
being destroyed it needs to be able to resume
Accordingly, plans should be set out for how key
operation in a new location as soon as possible.
staff members such as the CEO and division
This is the role of the temporary site, and for a
managers can be contacted. After all, even the
best planned disaster recovery procedure is organizations have considered their needs and
useless if nobody is present to implement it. developed suitable arrangements for a disaster
recovery plan, they should then ensure that the
If the recovery plan requires the action of staff,
plan can be put into operation. Much as you
it is critical to ensure that they know what their
used to have fire drills when you were a student
role is and how they fit in to the overall plan.
at school, an organization should conduct
This is why regular drills to ‘practice’ the
disaster recovery drills. These involve a mock
recovery plan is important. Additionally, if part
execution of the disaster recovery plan to
of the plan involves switching to a remote site
ensure that those responsible can perform their
in another city, town, state or country, the
required tasks and that the plan actually works.
organization should ensure that the people who
Just as dangerous as not having a disaster
are to operate that remote site are aware of
recovery plan is the organization having a plan
what they are required to do and ready to put
but not testing that it actually works. The risk in
the plan into action at a moment’s notice. There
this case is that, if something goes wrong, staff
is little point having a fully equipped hot site
will not know how to react, since they have
ready to run in the event of a disaster and not
never experienced a drill of the plan.
having people who can staff the site and keep it
Alternatively, an untested plan will very quickly
going.
become out of date or fail to take into account
Staff responsibilities and roles in the disaster changes in the organization or technology.
recovery process should be clearly documented,
Documenting internal controls
as should lines of responsibility and reporting
relationships. There are several ways that an internal control
system can be documented. At an overall level
Restore business relationships
there is the control matrix, which tells us the
The reality for a business operating in today’s control objectives of a control system, how they
environment is that it will typically be involved would ideally be attained, and whether they
in networks or arrangements with other actually exist within a system.
organizations or individuals. Such networks or
Narrative descriptions A narrative description
arrangements may include extranets that link
of internal controls is probably the simplest
the organization to its customers and suppliers,
method for documenting internal controls. This
as well as other arrangements or deals that may
approach involves a written description of the
be in place with external organizations. This
system’s operation and how the controls are
scenario makes it essential that the organization
carried out within the system. Typically, when
consult with such partners and related bodies
carrying out an evaluation of an organization’s
when developing a disaster recovery plan. It is
internal controls, auditors will use the narrative
easy just to think in terms of the business that
in conjunction with an additional
you are involved in when designing a recovery
documentation technique, such as flowcharts or
plan, but the relationships this business has
checklists. The benefit of this approach is the
with other parties will also be affected and, to
flexibility available to the preparer of the
keep the business’s operations running, it may
documentation; however, this comes at the cost
be essential to plan to keep these relationships
of structure and consistency in format.
operating in the event of a disaster.

However, merely having a hot or cold site in


place should disaster strike is not enough. Once
Questionnaires and checklists where controls are in operation and little detail
about the actual operation of such controls.
Questionnaires and checklists are another
Complementing the systems flowchart is a
common and easy-to-use approach for
control flowchart. The control flowchart is
documenting an organization’s internal control
suggested by Deloitte & Touche LLP as a way of
system. The checklist approach for
documenting the operation of individual
documenting controls would be expected to
internal controls. Deloitte & Touche LLP also
take place periodically within the organization,
suggests that any good documentation of
with a staff member — typically a member of
internal control should identify seven key
the internal audit division — walking through
aspects: (1) the risk that the control is
the organization and examining what controls
addressing, (2) how the control addresses the
are present or absent. A checklist approach is
risk, (3) details of monitoring for the control’s
also commonly employed by external auditors
effectiveness, (4) how the performance of the
when evaluating the adequacy of internal
control is assessed, (5) any problems identified
controls for an information system before the
in the operation of the control, (6)
completion of a financial statement audit. The
improvements for the control’s effectiveness
benefit of this approach is that it is a highly
and (7) a sign-off date from the control’s
structured means of documenting controls;
evaluation.
however, the disadvantage is that it can lead to
a one-size-fits-all approach to documentation as Control matrix
well as to the possibility that controls not listed
A matrix is any grid that combines multiple
on the checklist but in place within the
perspectives or attempts to integrate multiple
organization may go undocumented.
perspectives. Control documentation benefits
Flowcharts from a matrix approach given that there are
many perspectives to controls. We may be
Systems flowcharts, illustrate a system and its
interested in the risks within a process and the
inputs, processes and outputs. This includes the
controls in place to address that risk, in which
documents that are part of the system, the
case a matrix linking the two could be prepared.
processes involved in the system, and the
Alternatively, we may be interested in the
entities involved in the system. The benefit of
execution of the various controls within a
the systems flowchart as a source of control
process, in which case a matrix of controls and
documentation is that it contains these
characteristics could be prepared. This leads to
different aspects about a system. Because of
the possibility of numerous matrix possibilities
the detail in the diagram, who does what tasks
for documenting controls. While research has
can be identified, allowing assessment to be
acknowledged that control matrices can be
made as to whether separation of duties has
time-consuming to prepare, the benefits in
been adequately used. It is also possible to see
terms of the perspective they provide on a
the activities that occur, allowing the
system can be useful to those within the
identification of controls operating within the
organization. Accordingly, preparation of a
system. Additionally, by analysing a systems
control matrix was proposed in the COSO report
flowchart, any control weaknesses that may
and provides a way of linking the operation of
exist can be identified. The systems flowchart
the control activities to the control objectives of
provides an overall view of the operation of a
an information system.
system, for example, the credit sales system.
However, it provides only a general view of
Limitations of and threats to controls

An internal control system is not a rock-solid


guarantee that the organization’s objectives will
be attained or that errors and illegal activity will
not occur in the organization. CPA Australia
identifies five reasons an internal control
system does not provide 100 per cent assurance
that an organization’s objectives will be
achieved. These five reasons are judgement
error, unexpected transactions, collusion,
management override and weak internal
controls.

In addition to the factors identified by CPA


Australia, Rogers et al. identify eight factors that
can pose as threats to internal controls. These
factors are: management incompetence;
employee turnover; external factors; fraud;
complexity of transactions; complexity of
organizational structure; regulatory
environments; and information technology.
Module 7: Developing and implementing • Be familiar with the activities required to
effective AIS implement and maintain a large
information system.
Introduction
THE SYSTEMS DEVELOPMENT LIFE CYCLE
Developing effective accounting information
systems requires the collaboration of a wide Acquiring, implementing, and training people to
range of individuals, including analysts, system use a large AIS is a difficult task. A systems study
designers, and managers. Accountants, both as (also called systems development work) begins
auditors and as general information users, with a formal investigation of an existing
should be part of all IT studies involving accounting information system to identify
accounting information systems. strengths and weaknesses.

Developing effective accounting information Who actually performs a systems study? This
systems requires the collaboration of a wide varies from organization to organization as well
range of individuals, including analysts, system as from project to project. Many large
designers, and managers. Accountants, both as organizations have IT professionals to perform
auditors and as general information users, this work. In contrast, smaller organizations with
should be part of all IT studies involving limited technical expertise as well as larger
accounting information systems. organizations with other priorities are more
likely to hire outside consultants for this work.
Learning Outcomes
(Note: The Sarbanes-Oxley Act of 2002 expressly
• Understand the roles of accountants, forbids a CPA firm from performing such systems
analysis teams, and steering committees work for a client with whom it already has an
in systems studies. audit relationship.) Our discussion assumes that
• Understand why systems analysts must most of the work is performed by a generic
identify the strategic and operational “study team” of experts who may or may not be
goals of an accounting information outside consultants.
system.
Four Stages in the Systems Development Life
• Become familiar with the deliverables in Cycle
systems analysis work, especially the
systems analysis report. Traditionally, we can identify four major steps or
• Be able to help plan and complete the phases of a systems study:
analysis and design phases of a systems
1. Planning and investigation. This step
study.
involves organizing a systems study
• Know what a feasibility evaluation is and
team, performing a preliminary
how to conduct one.
investigation of the existing system, and
• Understand some of the costs, benefits, developing strategic plans for the
tools, and techniques associated with remainder of the study.
systems design work. 2. Analysis. This step involves analyzing the
• Be able to evaluate alternative systems company’s current system to identify
proposals and make a selection or the information needs, strengths, and
choose to outsource. weaknesses of the existing system.
3. Design and acquisition. In this step, an
organization designs changes that
eliminate (or minimize) the current replacing or modifying existing information
system’s weak points while preserving systems. Typically, altering an accounting
its strengths. The organization also information system also affects work flows, data
decides what system is best and how to gathering and recording tasks, employee
acquire it. responsibilities, and even the way an
4. Implementation, follow-up, and organization rewards its managers. Thus, one
maintenance. This phase includes reason why organizations perform systems
installing re- sources for the new system studies is because such studies are part of the
as well as training new or existing greater task of business process reengineering
employees to use it. Companies conduct (BPR)—that is, the task of making major
follow-up studies to determine whether modifications to one of an organization’s core
the new system is successful and, of systems. Because the accommodation involves
course, to identify any new problems so many changes, employee resistance is
with it. Finally, organizations must common and often quite strong—especially
maintain the system, which means that where jobs are at stake. This is also one reason
they correct minor flaws and update the why so many new systems fail.
system as required.
SYSTEMS PLANNING
These four phases are the system development
The first phase of a systems study involves
life cycle (SDLC) of a business information
systems planning and an initial investigation.
system. Logically, the activities in these phases
Think you can skip this phase? Think again. Just
flow from stage to stage in only one direction,
as you would not build a house without first
like water flowing in a stream. This is why earlier
determining what rooms you’d need in that
descriptions of the SDLC referred to it as the
house, organizations are well advised to plan
waterfall model. In practice, there is usually
carefully.
much overlap between phases in the life cycle
and the steps in a systems study don’t Planning for Success
necessarily occur in sequence. Instead, system
developers often perform two or more stages in In large organizations, system redesigns (or new
parallel with each other. development work) typically involve millions of
dollars, making mistakes very costly. In smaller
Systems Studies and Accounting Information organizations, major errors can be catastrophic,
Systems leading a firm to bankruptcy. What else can
happen when organizations do not plan
A systems study looks at all systems in an
carefully? Here are some examples:
organization’s applications portfolio. This
portfolio may include an integrated enterprise • Systems do not meet users’ needs,
resource planning (ERP) system, along with other causing employee frustration,
specialized information systems, or it may resistance, and even sabotage.
consist of many separate systems for functional • Systems are not flexible enough to meet
areas such as accounting, marketing, and human the business needs for which they were
resources. Accounting information systems designed and are ultimately scrapped.
(AISs) are prime targets for systems studies—for • Project expenditures significantly
example, because older ones may not comply overrun what once seemed like very
with new governmental regulations. But in adequate budgets.
general, a systems study means more than just
• The time required to complete the new company’s information system—its members
system vastly exceeds the development must first understand the system’s goals. Of
schedule—often by years. special importance is determining which goals
• Systems solve the wrong problems. are not being achieved under the present system
• Top management does not approve or and why this happens. Organization goals
support the new systems. • Systems are include: (1) general systems goals, (2) top
difficult and costly to maintain. management systems goals, and (3) operating
management systems goals.
Studies of unsuccessful information systems
projects suggest that mistakes made at the General Systems Goals
outset of a systems study are a common reason
General systems goals apply to most
why such projects ultimately fail. Careful systems
organization’s information systems and help an
planning and an initial investigation can avoid
AIS contribute to an efficient and effective
critical missteps that lead to disaster. “Planning
organization. Principles contributing to these
for success” means beginning a systems study
goals are: (1) awareness that the benefits of a
with a focused investigation that: (1) approaches
new system should exceed its costs, (2) concern
specific organizational problems from a broad
that the outputs of the system help managers
point of view, (2) uses an interdisciplinary study
make better decisions, (3) commitment to a
team to evaluate an organization’s information
system that allows optimal access to
systems, and (3) makes sure the company’s
information, and (4) flexibility so that the system
study team works closely with a steering
can accommodate changing informational
committee (described below) and end users in all
needs.
phases of the work.
The study team must determine whether the
SYSTEMS ANALYSIS
current information system helps to achieve
The basic purpose of the systems analysis phase these general systems goals. For example, if an
is to examine a system in depth. The study team AIS has excessive costs associated with using
will familiarize itself with the company’s current traditional paper documents (e.g., purchase
accounting system, identify specific inputs and orders, receiving reports, and vendor invoices),
outputs, identify system strengths and this will violate goal number one (cost
weaknesses, and eventually make awareness), and the study team might
recommendations for supplementary work. recommend that the company use an online
Figure 6-2 shows the logical procedures that the system instead.
team should follow.
Top Management Systems Goals
In performing its work, the study team should
AISs typically play key roles in satisfying top
avoid overanalyzing a company’s system.
management goals. For instance, AISs usually
Instead, the team should try to identify and
provide top managers with long-range budget
understand the organization’s goals for the
planning data so they can make effective
system, perform a systems survey, and prepare
strategic decisions about future product-line
one or more reports that describe its findings.
sales or similar business activities. Similarly,
Understanding Organizational Goals periodic performance reports provide top
management with vital control information
For the study team to do an adequate job—for
about corporate operations— for example, how
example, determine the real problems within a
sales of new product lines are doing. Finally, top
management needs to know about the short- systems study must gain the full cooperation and
range operating performance of its support of those employees who are crucial to
organization’s subsystems—for example, the success of a new system.
summary information about individual
Data Gathering. A systems survey requires the
department operating results and how these
study team to gather data about the existing
results compare with budgetary projections.
system. There are several ways of doing this,
Operating Management Systems Goals including:

Compared to top management, the information • Review existing documentation or create


needs of operating managers (for example, new materials. This documentation includes
department heads) are normally easier to descriptive data such as organizational
determine. This is because the decision-making charts, strategic plans, budgets, policy and
functions of operating managers typically relate procedure manuals, job descriptions, and
to well-defined and narrower organizational charts of accounts, as well as technical
areas. In addition, the majority of operating documentation such as flowcharts, process
managers’ decisions are for the current business maps, and training manuals.
year (in contrast to top management’s long- • Observe the current system in operation.
range decision-making functions). As a result, Visiting various parts of the operation on a
operating managers need information that helps surprise basis and asking employees
them meet daily, weekly, or monthly operating questions about their jobs can help team
targets. members learn whether the system works as
described, the morale of employees, the
Systems Survey Work
amount of down-time, and workload cycles.
The objective of a systems survey is to enable the
study team to obtain a more complete
understanding of the company’s current • Use questionnaires and surveys. These can
operational information system and its be anonymous so that respondents share
environment. Of special importance is their views openly about sensitive issues.
identifying the strengths and weaknesses of the Open-ended questionnaires provide an
current system. The overall objective of any new unstructured free-flow of ideas that may
system is to retain the system’s strengths while bring new issues to light. Close-ended
eliminating the system’s weaknesses, especially questionnaires (figure above), on the other
those weaknesses causing problems in the hand, are efficient and allow for easy
current system. These weaknesses will likely tabulation of results.
relate to specific goals that the current system • Review internal control procedures.
does not now accomplish. Module 6 discusses the importance of
internal control systems. Weaknesses in
Understanding the Human Element and
these procedures can cause major problems
Potential Behavioral Problems. Because the
for a company. The study team should
appearance of a study team on the work scene
identify high risk areas, strengths, and
usually signals change, employees are often
weaknesses of the specific procedures.
resistant to help. Unless the study team deals
• Interview system participants. Face-to-face
directly with this problem at the beginning, there
interviews allow the study team to gather
is a good chance that employees will oppose the
system information in the greatest depth
changes that the team recommends. Thus, a
and can sometimes reveal surprises. For the other steps. For each system alternative, the
example, an interview might reveal that a design team must examine five feasibility areas:
manager’s decisions don’t really require (1) technical feasibility, (2) operational
input from several existing reports. feasibility, (3) schedule feasibility, (4) legal
feasibility, and (5) economic feasibility.
Data Analysis
Technical Feasibility. The technical feasibility of
Once the study team completes its survey work,
any proposed system attempts to answer the
it must analyze the results. Often, this means
question, “What technical resources are
nothing more than creating summary statistics,
required by a particular system?” Hardware and
but it can also involve developing flowcharts
software are obvious components. A proposed
and/or process maps that can highlight
system that can interface with critical existing
bottlenecks in information flows, redundant
software is more desirable than one requiring
reporting, and missing information links.
the organization to buy new software. Computer
Systems analysis work necessarily takes longer experts typically work on this phase of the
than a preliminary investigation, typically feasibility evaluation because a thorough
months. Where required, the study team will understanding of IT is essential.
provide interim reports to the steering
In addition to developing a preliminary hardware
committee about its progress. The most
or software configuration for a proposed system,
important deliverable from the analysis portion
the design team must also determine whether
of the systems study, however, is the final
current employees have the technical skills to
systems analysis report, which signals the end of
use it. If a specific computerized system is too
the analysis phase of the system study. Like
sophisticated for a company’s employees, it is
other reports, the study team submits this report
unlikely that requiring employees to use it in
to the steering committee, which then considers
subsequent daily operations will be very
the report’s findings and debates the
successful.
recommendations it contains.
Operational Feasibility. The operational
As representatives of top management, the
feasibility of a proposed system examines its
steering committee has, within limits, the ability
compatibility with the current operating
to do whatever it wants. It could abandon the
environment. This means determining how
project, ask for additional analyses and a set of
consistent the tasks and procedures required by
revised recommendations, or vote to proceed to
the new system will be with those of the old
the systems design phase of the project.
system. The design team must also analyze the
Evaluating System Feasibility capabilities of current employees to perform the
specific functions required by each proposed
After obtaining a positive response from the system and determine to what extent employees
steering committee, the design team must will require specialized training.
perform a detailed investigation of different
potential systems. Figure 6-4 shows that this Operational-feasibility analysis is mostly a
work involves five major procedures or activities. human relations study because it is strongly
The first of these is a feasibility evaluation in oriented towards “people problems.” For this
which the design team determines the reason, human-relations specialists participate
practicality of alternative proposals. Only after heavily in it. As noted earlier, employees
this step is completed can the design team tackle commonly have negative attitudes toward
changes that can affect their organizational DETAILED SYSTEMS DESIGN AND ACQUISITION
duties. Encouraging employees to attend
Once the steering committee approves the
briefing sessions, suggest changes, and
feasibility of a general system plan (project), the
understand how a new system will enable them
design team can begin work on a detailed
to perform their jobs more easily can help limit
systems design. This involves specifying the
employee resistance.
outputs, processing procedures, and inputs for
Schedule Feasibility. Timeliness is important. the new system. Just as construction blueprints
Schedule feasibility requires the design team to create the detailed plans for building a house,
estimate how long it will take a new or revised the detailed design of a new system becomes the
system to become operational and to specifications for creating or acquiring a new
communicate this information to the steering information system. Figure 6-5 provides
committee. For example, if a design team examples of the detailed requirements that the
projects that it will take 16 months for a design team must create, and these
particular system design to become fully requirements in turn explain specifically what
functional, the steering committee may reject the proposed system must produce.
the proposal in favor of a simpler alternative that
From an accounting standpoint, one of the most
the company can implement in a shorter time
important elements in a new system is its control
frame.
requirements. In this matter, the design team
Legal Feasibility. Are there any conflicts should have a “built- in mentality” when
between a newly proposed system and the designing control procedures for a system. In
organization’s legal obligations? Legal feasibility other words, rather than adding controls after a
requires a new system to comply with applicable system has been developed and installed, the
federal and state statutes about financial team should design cost-effective general and
reporting requirements as well as the company’s application control procedures into the system
contractual obligations. as integrated components.

Economic Feasibility. Economic feasibility seeks Designing System Outputs, Processes, and
assurance that the anticipated benefits of the Inputs
system exceed its projected costs. This requires
Once the design team determines that a system
accountants to perform a cost-benefit analysis.
is feasible and creates a general design, it can
This analysis takes into account all costs,
focus on developing the system’s input,
including indirect costs such as time spent by
processing, and output requirements. When
current employees on implementing the new
performing design tasks, it is perhaps curious
system. It also considers benefits, which are
that the design team first focuses on the
sometimes difficult to foresee or estimate. A
outputs—not the inputs or processing
common mistake is underestimating the costs of
requirements—of the new system.
implementation and continuing operations. The
accountants conducting the analysis need to The reason for this is that the most important
separately identify one-time costs versus objective of an AIS is to satisfy users’ needs.
recurring ones. The point of the economic Preparing output specifications first lets these
feasibility analysis is to get a “best estimate” of requirements dictate the inputs and processing
the worthiness of a project. tasks required to produce them.
During the analysis phase and general system rather than how the system can provide it. After
design, the study team must develop boundaries designing the outputs, their next step is to
for the new system that define the project’s identify the processing procedures required to
scope. Failing to do so causes scope creep—that produce them. This involves deciding which
is, expands the scope of a project and costs application programs are necessary and what
money. Outside consultants often handle these data processing tasks each program should
requests by drafting proposals showing the perform.
additional costs associated with them. These
There are a large number of tools for modeling
costs can include delays in meeting the schedule
computer processes. Among them are the
for delivering the project.
system flowcharts, data flow diagrams, program
System Outputs. The design team will use the flowcharts, process maps, and decision tables
data gathered from the prior systems analysis discussed in Module 4. Another popular tool is
work to help it decide what kinds of outputs are the entity-relationship (E-R) diagram discussed in
needed as well as the for- mats that these Module 2. Common to all these design
outputs should have. Although it is possible for methodologies is the idea of structured, top-
the design team to merely copy the outputs of down design, in which system designers begin at
an older system, this would make little sense— the highest level of abstraction and then “drill
the new system would be just like the old one. down” to lower, more detailed levels until the
Instead, the team will attempt to create better system is completely specified.
outputs—that is, design outputs that will better
Designing System Inputs. Once the design team
satisfy their users’ information needs than did
has specified the outputs and processing
the old system.
procedures for a new project, its members can
Outputs may be classified according to which think about what data the system must collect to
functional area uses them (e.g., marketing, satisfy these output and processing
human resources, accounting, or manufacturing) requirements. Thus, the team must identify and
as well as how frequently they must be produced describe each data element in the systems
(e.g., daily or weekly). Where a specific report is design (e.g., “alphabetic,” “maximum number of
not needed on a regular basis, the system should characters,” and “default value”) as well as
be able to provide it when requested (a demand specify the way data items must be coded. This
report) or triggered when a certain condition is is no easy task, because there are usually a large
met (an exception report). For example, an number of data items in even a small business
accounts receivable report on a specific application. Chapter 7 discusses the subject of
customer’s payment history might be issued on data modeling in detail.
demand or generated automatically when a
After the design team identifies and describes
customer owes more than a specified amount.
the input data, it can determine the source of
Although many organizations still rely heavily on
each data element. For example, customer
hard-copy (printed) reports, systems designers
information such as name, address, and
should also consider the possibility of creating
telephone numbers may be gathered directly
soft-copy (screen) reports as an alternative,
from web screens, while the current date can be
which use less paper and, of course, do not
accessed from the computer system itself.
require a printer for viewing.
Wherever possible, the design team will attempt
Process Design. Until now, the system designers to capture data in computer-readable formats.
have focused on what the system must provide As noted in Chapter 4, this avoids costly, time-
consuming data transcription as well as the vendors to submit bid proposals for such a
errors such transcription typically introduce into complete system, or alternatively, can ask each
the job stream. vendor to provide separate bids for hardware
and software.
The System Specifications Report
Choosing an Accounting Information System
After the design team completes its work of
specifying the inputs, outputs, and processing Because internal project management and
requirements of the new system, the members systems development are beyond the scope of
will summarize their findings in a (typically large) this text, we’ll assume here that the steering
systems specification report. It provides some committee opts to acquire most of its system
representative information in such a report. The resources from outside vendors. This is the most
design team submits this report to the steering common choice today. If the committee takes
committee for review, comment, and approval. this course of action, the systems specifications
report can help them create a request for
The Make or Buy Decision. The project is now at
proposal (RFP) outlining the specific
a critical juncture. If the steering committee
requirements of the desired system. Upon
approves the detailed design work, it now faces
finalizing the systems specifications, the
a make-or-buy decision. In large organizations,
committee (with the help of the design team and
one possibility is to use internal IT staff to
perhaps outside consultants) will send a copy to
develop the system. This choice offers the
appropriate vendors. Typically, the RFP also
tightest control over project development, the
contains a deadline for bidding, the length of
best security over sensitive data, the benefits of
which varies—for example, just a few weeks for
a custom product that has been tailor-made for
hardware, and longer periods of time for systems
the exact requirements of the application, the
requiring custom development tasks.
luxury of replacing the old system piecemeal as
modules become available, and a vote of After the deadline has passed, an evaluation
confidence for the organization’s IT staff. But this committee supervised by the steering
choice also uses valuable employee time and can committee will review vendor submissions and
divert the organization’s resources from its main schedule separate meetings with those vendors
objectives—for example, manufacturing who provide viable system proposals. The
products. participants at each meeting include
representatives from the vendor,
Another possibility is to outsource the project’s
representatives from the steering committee,
development to a contractor. This choice is
and representatives from the evaluation team.
useful when an organization lacks internal
The vendor’s role is to present its proposal and
expertise to do the work or simply wishes to
to answer questions from the other participants.
avoid the headaches of internal project
The evaluation committee’s role is to listen to
development. Finally, the steering committee
the vendor proposals, ask questions, provide
can purchase prewritten software (commonly
input to the steering committee about the pros
called canned software) and perhaps modify it to
and cons of each one, and perhaps make a
suit the organization’s needs. If the organization
recommendation for a preferred provider.
requires both hardware and software, the
committee may also choose to shop for a Selection Criteria. The steering committee’s
complete, “ready-to-go” turnkey system. The responsibility is to make a final selection and is
steering committee can ask the computer not restricted in its choices. It can accept one bid
totally or spread its purchases among two or charge extra for enhanced services.
more providers. Here are five key factors that a Although a vendor’s reputation is relative, a
steering committee might consider, listed in buyer can also check with the Better
order of importance according to a recent survey Business Bureau or speak with some of the
of 160 international financial officers: vendor’s other clients.
4. Costs and benefits of each proposed
1. The functionality and performance
system. The accountants on the design team
capabilities of each proposed system. An
will analyze the costs of every vendor’s
accounting system must be able to process
proposed system in relation to the system’s
an organization’s data and provide users
anticipated performance benefits. They will
with the outputs they need. Examples of
also consider the differences between
performance measures include the types of
purchasing and leasing each vendor’s
normal and customizable information the
system. If the steering committee elects to
system can provide, response time, and
purchase a system, the accountants should
maximal number of simultaneous online
then advise the committee on a realistic
users supported.
depreciation schedule for the new system.
2. Compatibility of each proposed system with
5. Maintainability of each proposed system.
existing systems. The new system must
Maintainability means the ease with which a
interface and work with existing computer
system can be modified. For example, a
hardware, software, and operating
flexible system enables a firm to alter a
procedures. In some instances, this comes
portion of a payroll system to reflect new
down to hardware issues—for example, it
federal tax laws. Because the costs of
may not be possible to run the new software
maintaining large systems are typically five
on the company’s older local area networks,
times as much as the costs of initially
which will consequently have to be
acquiring or developing a system, evaluators
upgraded. But compatibility issues can also
should emphasize this dimension in its
involve the operating system, existing
deliberations for custom-built systems.
application software, or operational
concerns—for example, requiring Making a Final Decision. If a company finds
employees to learn new procedures for several software packages that appear to satisfy
inputting data or generating reports. its needs, how should it decide on the best one?
3. Vendor stability and support. Vendor Two methods for this are (1) point scoring
support includes such things as (1) training analysis and (2) hands-on testing.
classes that familiarize employees with the
Point-Scoring Analysis. Figure below illustrates
operating characteristics of the new system,
an example of a point-scoring analysis for an
(2) help in implementing and testing the new
accounts-payable system. Here, an organization
system, (3) assistance in maintaining the
finds three independent vendors whose
new system through a maintenance
packages appear to satisfy current needs.
contract, (4) backup systems and
Because the cost to lease each vendor’s software
procedures, and (5) telephone assistance for
package is about the same, “cost” is not an issue
answering user questions. The availability of
in this selection process.
“business-hours-only” versus “round-the-
clock” support and the avail- ability of To perform a point-scoring analysis, the
domestic versus offshore customer support evaluation committee first assigns potential
are other considerations. Most vendors points to each of the selection criteria based on
its relative importance. In figure above, for Outsourcing
example, the committee feels that “adequate
An alternative to developing and installing
controls” (10 possible points) is more important
accounting information systems is to out- source
than whether users are satisfied with the
them. Outsourcing occurs when a company hires
software (8 possible points). After developing
an outside organization to handle all or part of
these selection criteria, the evaluation
the operations for a specific business function.
committee proceeds to rate each vendor or
Accounting tasks have long been a target for
package, awarding points as it deems fit. The
outsourcing, including accounts payable,
highest point total determines the winner. In
accounts receivable, payroll, general ledger,
figure above the evaluation indicates that
accounting for fixed assets, and financial
Vendor B’s accounts payable software package
reporting. Even preparing US income tax returns
has the highest total score (106 points) and the
are outsourced, typically to English-speaking
committee should therefore acquire this
countries such as India. Two popular types of
vendor’s system.
outsourcing are business process outsourcing
Although point-scoring analyses can provide an (BPO) and knowledge process outsourcing (KPO).
objective means of selecting a final system, many
Business Process Outsourcing (BPO). Business
experts believe that evaluating software is more
process outsourcing means contracting with
art than science. There are no absolute rules in
outside firms to perform such normal tasks as
the selection process, only guidelines for
preparing payrolls. Companies commonly sign
matching user needs with software capabilities.
such contracts for 5- to 10-year periods. The
This is one reason why user input in the selection
annual costs depend on the amount of
process is so important.
processing work required and range from
Hands-On Testing. Even after selecting a finalist, “thousands” to “millions” of dollars. However,
an organization might still be hesitant to commit. “outsourcing” does not necessarily mean
With hands-on testing, potential buyers “test “offshoring” as much of such business goes to
drive” a software package to further evaluate domestic consultants or data-processing
the system. Figure below provides a list of tests concerns.
that AIS shoppers can use for this purpose. Note
Knowledge Process Outsourcing (KPO).
especially benchmark testing.
Businesses have been outsourcing such
Selecting a Finalist. After each vendor presents processes as sales order processing for years.
its proposal and perhaps additional hands-on With knowledge process outsourcing (KPO), a
testing, the steering committee must make its business contracts with an outside company to
final selection. If a clear winner emerges from perform research or other knowledge-related
these activities, the organization can commence work. Four examples are (1) intellectual property
to the implementation stage. But it is also research related to developing and filing a patent
possible that none of the proposed systems is application, (2) data mining of consumer data,
satisfactory. At this point, the organization’s (3) preparing US tax returns, and (4) research
steering committee can (1) request the design related to medical drugs and biotechnology. The
team to obtain additional systems proposals growth of KPO has been high, with companies in
from other vendors, (2) abandon the project, or countries such as India and Ireland doing much
(3) consider outsourcing needed services. of the work.
IMPLEMENTATION, FOLLOW-UP, AND D. Train personnel. Both the implementation
MAINTENANCE team and computer vendors can help train
company employees to work with the new
Systems implementation is often called the
system, while seminars can acquaint other
“action phase” of a systems study because the
employees with the new system’s advantages
recommended changes from the prior analysis,
and capabilities. Vendors may provide technical
design, and development work are now put into
training for free, or at reduced costs, to
operation. Alternatively, the organization
corporate users as incentives to use their
commits to, and now must implement, a new
products.
system.
E. Acquire and install computer equipment.
Systems implementation can be a stressful time.
After preparing the physical site location for the
As the time draws near for installing the new
new computer system, the company must
software, end users and clerical personnel
acquire computer equipment such as
become nervous about their jobs, middle
microcomputers, web servers, routers, modems,
managers wonder if the new system will deliver
and printers from outside vendors.
the benefits as promised, and top managers
become impatient if installations run longer than F. Establish internal controls. Organizations
anticipated or go over budget. Even if an must install control procedures that safeguard
organization does a perfect job of analyzing, its assets, ensure the accuracy and reliability of
designing, and developing a new system, the accounting data, promote operating efficiency,
entire project can fail if its implementation is and encourage employee compliance with
poor. prescribed managerial policies. Again, these
controls should be built into a system rather than
Implementation Activities
added later.
Implementing a new accounting information
G. Convert data files. When converting to a new
system involves many tasks that will vary in
system, an organization may have to convert its
number and complexity depending on the scale
data files to alternate, more-useful formats. This
of the system and the development approach.
activity is also common when merging two
Some of the steps that may be involved are:
systems—for example, when consolidating
A. Prepare the physical site. An organization formerly separate divisions of a company or
must have physical space for any new hardware merging the systems from two separate
and personnel. companies into one.

B. Determine functional changes. Whenever a H. Acquire computer software. The


company makes changes to a major accounting implementation team must also install the soft-
system, it must also consider the effects of such ware that was acquired or developed for the
changes on its reporting structure and personnel project. The software from independent vendors
relationships. sometimes comes bundled with hardware in
complete turnkey systems. In general, the
C. Select and assign personnel. Because the process of acquiring (and possibly making
design team has developed detailed modifications to) computer software from an
specifications for the new system, the independent vendor takes considerably less time
organization should now have a firm idea about than developing the programs in-house.
the job descriptions of system users.
I. Test computer software. Programs must be sure that it continues to satisfy the three levels
tested regardless of where they came from to of organizational goals discussed at the
ensure day-to-day processing accuracy and beginning of this chapter: (1) general systems
completeness. See again Figure 6-9 for a list of goals, (2) top management systems goals, and
possible tests. (3) operating management systems goals. When
these goals are not adequately satisfied,
J. Convert to the new system. In switching to the
problems normally occur and the system
new system, the firm may choose to make a
requires further modifications.
direct conversion by immediately discontinuing
use of the old system and letting the new system System Maintenance
“sink or swim.” An alternative is parallel
In practice, implementation teams do not
conversion, where the organization operates
normally perform follow-up studies of their
both the new and the old system for some period
company’s new information system. Instead, the
of time. Another choice is modular conversion,
team turns over control of the system to the
where the new system is implemented in stages,
company’s IT department, which then shoulders
one process or module at a time. An example
the responsibility for maintaining it. In effect,
would be first implementing the inventory
system maintenance continues the tasks created
module, then order processing, and so on.
by the initial follow-up study, except that experts
The most difficult issue in implementing a new from the company’s IT subsystem now perform
system is change management. The new system the monitoring and perhaps modifications. For
will bring with it changes to employee job example, when users complain about errors or
descriptions and, in some cases, new jobs and no anomalies in the new system, it becomes the IT
jobs. Members of the implementation team and subsystem’s responsibility to respond to these
steering committee should communicate openly needs, estimate the cost of fixing them, and
with affected workers about how the new (often) perform the necessary modifications—
system will impact them. Organizations should or communicate with the vendor to perform
give those employees whose jobs are either needed modifications. The IT departments of
eliminated or materially altered an opportunity even medium-size companies typically have
to apply for the new jobs and obtain retraining, forms for such requests, policies for prioritizing
if necessary. Similarly, terminated employees maintenance tasks, and formulas for allocating
should receive ample notice to enable them to maintenance costs among the various user
apply for other jobs before their employment departments.
ends. Some companies even set up internal
It is common for business systems to require
outplacement offices for displaced employees or
continuous revisions. Some reasons for this
create early retirement plans for qualified
include competition, new governmental laws or
employees.
regulations, or the changing information needs
Postimplementation Review of top management. Studies show that, over the
life of a typical information system,
Regardless of which conversion method is used,
organizations only spend about 20 to 30 percent
the new system will eventually become the sole
of the total system costs developing or acquiring
system in operation. This brings us to the final,
and implementing it. They spend the remaining
follow-up and maintenance phase of our systems
70 to 80 percent maintaining it, typically on
development life cycle. The purpose of this
further modifications or software updates. In
phase is to monitor the new system and make
other words, although “maintenance” may not
be the most glamorous part of a systems system maintainability, system compatibility
development life cycle, it is almost always the with other systems, and vendor support.
most expensive part. For this reason,
organizations try to develop or acquire scalable ✓ An organization may choose to outsource its IT
systems (that can handle larger volumes of operations, accounting processes, or research-
transactions in the future) as well as ones that related (knowledge) tasks.
are easily modified. Such systems save ✓ Organizations need to follow-up to find out if
businesses money in the long run, even if they new systems are working as planned.
cost more in the short run.

SUMMARY

✓ The four stages in a systems development life


cycle are (1) planning and investigation, (2)
analysis, (3) design and acquisition, and (4)
implementation, follow-up, and maintenance.

✓ Planning requires creating a team to


investigate the current system and make
recommendations to a steering committee.

✓ Systems analysis requires identifying general


systems goals, top management systems goals,
and operating management systems goals.

✓ A systems survey uses a variety of data


gathering techniques to understand and
document the system.

✓ The systems analysis report contains the study


team recommendations.

✓ The components of a feasibility evaluation are


technical, operational, schedule, legal, and
economic feasibility.

✓ Detailed systems design begins with the


design of outputs, and then inputs and
processes. Designers may choose a prototyping
approach to create the new system.

✓ A systems specification report contains


detailed information about the organization and
its desired system.

✓ Choosing a system requires evaluating system


performance capabilities, costs and benefits,
Module 8: Accounting on the Internet section of this chapter discusses these topics in
detail.
Introduction
Learning Outcomes
This chapter describes some accounting
applications of the Internet in detail. The first • Understand some of the basic concepts
section describes Internet components such as of the Internet, such as TCP/IP, URLs,
Internet addresses and software. This section and web page addresses.
also discusses some Internet concepts of special • Appreciate why electronic
importance to accountants (i.e., intranets and communication and social media are
extranets). We also discuss XBRL, a financial important to accountants.
reporting language, in this section. One of the • Know why XBRL is important to financial
most important uses of the Internet is for reporting.
electronic commerce (e-commerce or EC)—the • Understand electronic data interchange
topic of the next section of this chapter. While (EDI) and why it is important to AISs.
the terms e-commerce and e-business are often • Understand some examples of cloud
used interchangeably, some experts prefer to computing.
view them as different concepts. E-commerce • Know the differences between business-
involves buying or selling goods and services to-consumer and B2B e-commerce.
electronically. This activity can be between two • Appreciate the privacy and security
businesses, between a profit- seeking company issues associated with e-commerce.
and a governmental entity, or between a • Know why businesses use firewalls,
business and a customer. In contrast, e-business proxy servers, and encryption
goes beyond e-commerce and deep into the techniques.
processes and cultures of an enterprise. This • Understand digital signatures and digital
could include, for example, email, soliciting time-stamping techniques
vendor bids electronically, making e-payments,
exchanging data electronically (EDI), and a host THE INTERNET AND THE WORLD WIDE WEB
of specialized cloud-computing services. Thus, it
is the powerful business environment that The Internet is a collection of local and wide-area
organizations create when they connect their networks that are connected together via the
critical business systems directly to customers, Internet backbone—i.e., the main electronic
employees, vendors, and business partners using connections of the system. Describing the
Intranets, Extranets, e-commerce technologies, Internet as an “information superhighway”
collaborative applications, and the web.1 We makes sense because over 3 billion people from
discuss some of these topics in the third section around the world now use it, just as a set of
of this chapter. As more organizations conduct at state, interstate, and international highways
least some business on the Internet, it is only connect people physically.2 Almost all univer-
natural that managers increasingly recognize the sities are connected to the Internet, as are most
importance of Internet privacy and security. This businesses, government agencies, and not-for-
includes protecting consumers’ personal privacy, profit organizations. This section of the chapter
protecting proprietary data from hackers, and discusses Internet basics, including Internet
safeguarding information that businesses send addresses and software, intranets and extranets,
to one another over the Internet. The final the World Wide Web, IDEA, groupware,
electronic conferencing, and web logs
3.1. Internet Addresses and Software maps to its correct IP address. In February of
2011, the Internet officially ran out of numbers,
To transmit data over the Internet, computers
and administrators were forced to use
use an Internet address and a forwarding system
workarounds and shared IP addresses to
that works much the same way as the post office
compensate. The new standard is IPv6, which
system. On the Internet, the initial computer
uses 128 bits instead of 32 bits—a version that
transmits a message to other computers along
developers hope will suffice for many years to
the Internet’s backbone, which in turn relay the
come. IP addresses enable Internet computers to
message from site to site until it reaches its final
deliver a specific message to a specific computer
destination. If the message is large, Internet
at a specific computer site—for example, when
computers can divide it into smaller pieces called
you send an email message to a friend at another
data packets and send each of them along
university using the standard Transmission
different routes. The receiving computer then
Control Protocol/ Internet Protocol (TCP/IP). IP
reassembles the packets into a complete
addresses are useful to auditors because they
message at the final destination. An Internet
identify the sender—an important control in e-
address begins as a domain address, which is also
commerce applications.
called a uniform resource locator (URL). This is a
text address such as “www.name.com.uk.” As 3.2. Intranets and Extranets
suggested by this generic example, the lead item
Because Internet software is so convenient to
indicates the World Wide Web. The second entry
use, many companies also create their own
designates the site name, and the third entry
intranets for internal communications purposes.
(“com” for commercial user) is the organization
These computer networks use the same
code. Other organization codes are “edu”
software as the Internet but are internal to the
(education), “gov” (government), “mil”
organization that created them. Thus, outsiders
(military), “net” (network service organization),
cannot access the information on intranet
“org” (miscellaneous organization), and “int”
networks—a convenient security feature. One
(international treaty organization). Finally, a
common use of intranets is to allow users to
domain address can include a country code as
access one or more internal databases.
well—for example, “ca” for Canada, “uk” for the
Advanced search engine technology coupled
United Kingdom, or “nz” for New Zealand. For
with an intranet can deliver user-defined
transmission purposes, Internet computers use
information when needed. Another valuable use
tables of domain names that translate a text-
of an intranet is for gathering and disseminating
based domain address such as www.Wiley.com
information to internal users. Universities offer
into a numeric Internet Protocol (IP) address.
many of the same services to their employees, as
IPv4 is version 4 of this standard and uses 32 bits
well as a similar variety of services and
for this. An example might be 207.142.131.248.
educational opportunities to students. Extranets
The elements in this address contain a
enable selected outside users to access
geographic region (“207”), an organization
corporate intranets. Users connect to internal
number (“142”), a computer group (“131”), and
web servers via the Internet itself using their
a specific computer or web server (“248”). The
assigned passwords. The user can be around the
Internet Corporation for Assigned Names and
corner or around the world.
Numbers (ICANN) maintains the official registry
of domain names, manages the domain name
system (DNS) to ensure that all IP addresses are
unique, and makes sure that each domain name
The World Wide Web, HTML, and Groupware, MSN Messenger, Yahoo Messenger, or Skype to
Electronic Conferencing, and Blogs chat with distant friends. Many of these
packages also support audio, video, and
The multimedia portion of the Internet is
electronic conferencing (enabling several users
commonly called the World Wide Web, or just
to join a discussion instead of just two).
“the web.” As you probably already know, you
Accounting applications include the ability to
view these graphics using a web browser such as
interview job applicants remotely, consult with
Microsoft’s Internet Explorer. A typical entity on
clients about tax or audit problems, discuss
the web is a web page—i.e., a collection of text,
projects from several remote sites, or plan
graphics, and links to other web pages stored on
corporate budgets.
Internet-connected computers.
Large consulting and accounting firms have
HTML
access to a wealth of information within their
Developers typically create web pages in an organizations. Groupware is one of the
editing language such as hypertext markup technologies behind knowledge management
language. Web designers store these that many professional service firms (such as
instructions in one or more files and use the accounting and consulting firms) use to
Internet to transfer these pages from a source distribute expertise within the organization
computer to a recipient computer using a (frequently on its intranet). This information
communications protocol such as hypertext includes descriptions of clients’ best practices,
transfer protocol (HTTP). Your web browser then research findings, links to business websites, and
deciphers the editing language and displays the customized news. An employee with a client
text, graphics, and other items of the web page issue can access the knowledge database to
on your screen. Because HTML is an editing learn how others handled similar issues. Web
language, many of its instructions are simply logs, or blogs, are collaboration tools that allow
pairs of tags that instruct a web browser how to users with web browsers and easy-to-use
display the information bracketed by these tags. software to publish personalized diaries or
similar information online. A number of them are
Groupware, Electronic Conferencing, and Blogs published by accountants.
Groupware allows users to send and receive Social Media and Its Value to Accountants
email, plus perform a wide range of other
document-editing tasks. In addition to email You now probably post comments, pictures, or
support, these network packages allow users to videos using some form of social media—for
collaborate on work tasks, make revisions to the example, Facebook, YouTube, Pinterest, Twitter,
same document, schedule appointments on or Baidu to name a few. At present and around
each other’s calendars, share files and the world, more than 1.5 billion people have
databases, conduct electronic meetings, and some type of social media account. In aggregate,
develop custom applications. Examples of such the postings logged on such sites create massive
software include Exchange (Microsoft), amounts of commentary that businesses can
Groupwise (Novell), Lotus Notes (Lotus also mine for commercial purposes. One use of
Development Corporation), and Outlook social media is to increase organization
(Microsoft). Instant messaging software enables recognition—for example, when a company
remote users to communicate with each other in seeks to attract followers on Facebook and
real time via the Internet. You are probably increase its customer base. This is also useful to
already familiar with such software if you use accounting firms seeking new clients. A second
use is to evaluate customer reactions to new addition, many accounting software packages
goods or services—a use that applies equally are now XBRL-enabled, meaning that they can
well to CPA firms. A third use is for accounting insert appropriate XBRL tags automatically in
teams to use social media to communicate with user financial files. Because of its growing
one another on projects at remote sites. Yet a importance, some authorities now suggest that
fourth use is to identify and perhaps manage XBRL should become an integral part of the
problems caused by corporate actions that anger general accounting curriculum—not just a
consumers—before they go viral. subject for AIS students. XBRL Instance
Documents and Taxonomies XBRL documents
Businesses can also use social media for
are called XBRL instance documents because
recruiting employees—for example, to attract
they are examples (“instances”) of a class of
applicants for new jobs or to screen current
documents defined by a standard or
applicants for undesirable traits. Looking for a
specification.
new job? Employment counselors say that an
online identity is a “must-have.” Benefits and Drawbacks of XBRL

Finally, a company can use social media for Perhaps the most obvious benefit of XBRL is the
monitoring purposes—for example, to gauge ability to transmit financial information in a
the effectiveness of a new ad campaign or to standard format. This facilitates communications
assess customer feelings about the company between suppliers and their buyers, companies
itself. Similarly, when accounting firms offer and their shippers, and even retailers and their
new services, they can now scan social media customers. The same standardization applies to
sites in search of honest reactions to the new financial filings. Another important advantage of
offerings. Organizations can also hire outside XBRL is that it defines data items uniquely.
firms to perform such monitoring for them. In Consider, for example, how a spreadsheet stores
total, experts suggest that businesses are just financial information. The only way we know
beginning to tap the value stored in social that a particular number in a spreadsheet is, say,
media commentary. “net revenue” is because we also see a label that
identifies it as such. Move the number
4. XBRL—FINANCIAL REPORTING ON THE
somewhere else in the spreadsheet and you also
INTERNET
lose its meaning. In contrast, a “net revenue”
While the Internet supports general financial figure remains “net revenue” no matter where it
reporting, exchanging financial information appears in XBRL instance documents as long as it
between trading partners often requires more remains within its tags. It is for this reason that
detailed specifications. XML, or eXtensible some experts predict that some accounting
Markup Language, is similar to HTML in that it systems will begin collecting and storing their
also uses tags to format data. But there are two data in XBRL formats, redefining XBRL as a
important differences between HTML and XML. formatting language as much as a reporting
One is that XML tags are “extensible,” allowing language. XBRL’s standardized tags also make
users to define their own tags. The other searching for items in XBRL financial documents
difference is that the XML tags actually describe relatively easy. If you know the standard tag for
the data rather than simply indicate how to an item of interest, you can unambiguously find
display it. and extract the information from those
documents. In business environments, the term
The XBRL International Consortium creates XBRL semantic meaning refers to the fact that the
standards that anyone can use, license-free. In
financial data are related to one another through perform e-business over the Internet, but
such formulas as “Assets = Liabilities + Equity.” businesses can also use virtual private networks
An additional advantage of XBRL is its ability to (VPNs) or proprietary data trans- mission lines.
express such relationships in formulas, thereby
Some general categories of electronic business
making the data self-checking. This is important
are (1) e-accounting, (2) retail sales, (3) e-
because organizations often need to transmit
payments and e-wallets, (4) electronic data
financial data to others, and XBRL provides a
interchange, and (5) a variety of cloud-
means of internal control.
computing services, each of which we examine
Companies using XBRL-enabled software can briefly in the paragraphs that follow.
save their financial information in standard XBRL
5.1. e-Accounting
format, thus avoiding the errors that may come
from reentering data multiple times from The term e-accounting means performing
multiple sources. Companies can then directly accounting functions on the Internet. This
upload their business information in this format includes normal accounting tasks such as
onto their websites, avoiding costly rekeying processing payroll or accounts receivable data,
costs. Another advantage is that XBRL permits as well as preparing financial reports or
the automatic and reliable exchange of financial completing income tax returns using online
information across all software platforms and software. Often the web server is not even in the
technologies, including the Internet. Thus, same country as the user but in Ireland or India
anyone interested in comparing the cash and instead of the United States or Canada. At the
cash equivalents of several companies can personal level, e-accounting allows users to
search for the data and export it to a perform familiar accounting tasks such as
spreadsheet for analysis purposes. preparing budgets or writing reports that others
can see and modify as desired. The application
XBRL also has several disadvantages. Perhaps the
moves online, allowing users to share files that
most important is the fact that a common
formerly had to be emailed. Hybrid versions of
reporting language requires its users to learn,
such processes are also possible, in which users
and conform to, the standards of that language.
retain complete control of sensitive data, but
Usually, accountants achieve this task by
who use the newest and most robust versions of
acquiring software that can output data in XBRL
online software for processing tasks. An
formats. Another problem is that evolving XBRL
additional accounting use of the Internet is as a
standards require users to conform to changing
medium for publishing accounting documents
specifications—a drawback, for example, that
such as financial statements. Posting financial
may require organizations to update their
information on the web is relatively fast and
accounting software more often. A third concern
inexpensive, compared to printing and mailing
is that, at present, there is no requirement for
them. Such information can also be revised,
auditors to provide assurance on the XBRL filings.
replaced, or deleted easily and quickly.
Finally, the transition to XBRL reporting is not
without costs.

5. ELECTRONIC BUSINESS Many e-accounting applications use software as


a service—for example, when an accountant files
The term electronic business, or e-business,
a tax return using online software tools. Other
refers to conducting business with com- puters
Internet possibilities include online search tools
and data communications. Most companies
for performing accounting research or video clips
for training personnel. Such services enable link, and therefore bill (or cost) the company for
businesses to avoid the costs of acquiring, more referrals than actually occurred.
installing, upgrading, or reformatting the data
Internet sales also provide retailers with a wealth
files required by traditional accounting software.
of data about their customers, raising issues
Backup and disaster recovery also become the
about privacy. For example, you might be
responsibility of the vendor organization instead
concerned about the fact that your web
of the user organization.
purchase also means that a retailer now has (1)
5.2. Retail Sales your email address, which it can use to send
additional, annoying emails or sell to others, (2)
The World Wide Web offers businesses the
your credit card information, which it may or
opportunity to create virtual stores (“shop- ping
may not protect as well as you would like, and (3)
cart applications”) for selling merchandise
sensitive information about your purchase
directly to customers. At the retail level, it is clear
patterns—for example, prescription drugs.
that such websites are really automated AISs
that allow customers to create their own order 5.3. E-Payments, E-Wallets and Virtual Currency
forms, shipping forms, and payment documents.
E-Payments
Testimony to the success of such retail e-
commerce abounds. The number of online Some merchants and auction sites solve these
shoppers has increased steadily over the past problems with electronic payments (e-
decade. More than 90 percent of the US payments), which proponents claim is a faster,
population is now connected to the Internet, easier, and safer way for both customers and
many of whom now purchase items over the sellers to handle online transactions. The e-
Internet on a regular basis. For example, payment service acts as a trusted intermediary
consumers now reserve most of their domestic because it collects payment from a buyer and
airline tickets, rental cars, and hotel rooms over pays that amount to the seller. Businesses are
the Internet. Internet retail sales also introduce not the only entities that can enjoy the
special issues. One problem is that customers convenience of e-payments—many state and
usually cannot determine whether a retail local governments also have websites for e-
website is legitimate. Similarly, consumers must payments.
usually rely on emails to voice their complaints
(rather than speaking to someone in person), E-Wallets
and returns are sometimes problematic. A third Another Internet payment option is an e-wallet.
problem is that online stores frequently rely on E-wallets are software applications that store a
suppliers rather than their own shelves for consumer’s personal information, including
merchandise to satisfy orders, creating the credit card numbers, email addresses, and
potential for stock-out and backorder problems. shipping addresses. Shoppers pay for online
Finally, a growing e-commerce problem is click purchases by providing their e-wallet account
fraud. Many businesses are willing to sign pay- numbers to online vendors that also subscribe to
per-click contracts in which they pay a fee every the system. One advantage of an e-wallet is that
time a customer clicks on a link to its own you can use it whenever you visit subscriber
website from another site (such as a search websites. These systems spare you the trouble of
engine site). Click fraud occurs when dishonest entering your personal information each time
managers or even a company’s own competitors you make an online purchase. Also, because your
inflate the number of clicks on an advertising e-wallet information is usually stored on your
own hard drive, you control it. This maintains reportable to the IRS as “offshore funds.” Finally,
your email privacy as well. E-wallets may be as there is the question of whether the
important for retailers as they are for consumers appreciation in the value of a virtual currency
because many consumers cancel e-commerce qualifies as a long-term asset that is subject to
transactions before they complete them, often capital gains taxes, or a short-term currency
because of frustration with online forms. swing and therefore subject to ordinary income
taxes.
Virtual Currency
5.4. Business-to-Business E-Commerce
Imagine an international currency that
eliminates the need to exchange one type of While there has been tremendous growth in
money for another, involves no extra transaction retail e-commerce, it is dwarfed by business-to-
fees, escapes government scrutiny, and is widely business (or B2B) e-commerce—i.e., businesses
accepted on the Internet. This is the idea behind buying and selling goods and services to each
a virtual currency—a medium of exchange that other over the Internet. Buying materials online
operates beyond the restrictions of a particular shortens the time from purchase to delivery and
country or its monetary policies. An example at also allows businesses to shop from vendors all
the time this book was published is bitcoin, over the world. Like retail consumers, corporate
which allows you set up an e-wallet at purchasing agents using B2B e-commerce tools
www.bitcoin.com. Retailers have several can select items from online catalogs, confirm
reasons why they might accept a virtual currency purchases, track shipments, and pay bills
when selling merchandise online, including (1) electronically. E-commerce software can also
the ability to do more business, (2) the ease with expedite internal paperwork by first sending
which transactions can take place electronically, purchase orders to the appropriate managers for
(3) no need for credit-card middlemen or check approvals and then forwarding them to the
clearing houses, (4) near-instantaneous credit of vendor, thus reducing the costs of processing
transactions to corporate accounts (like debit purchase requisitions.
cards), (5) consumer wallets cannot be frozen,
Further back in the supply chain, the Internet
and (6) no transaction fees charged the retailer.
affects accounting activities just as strongly.
But virtual currencies also operate beyond the
Another feature of B2B e-commerce is the wider
realm of any central bank. This exposes
availability of real-time data that allows
businesses to risks, including (1) the potential
managers to view up-to-the-minute information.
devaluation of the currency in response to
Take, for instance, a distributor whose business
market forces, (2) the fact that transactions are
customers in turn sell products to end users.
not independently auditable, as they would be at
With current data about its customers’ retail
a bank, (3) the observation that all seven earlier
sales, the supplier can quickly increase or
virtual currencies have failed, and (4) the
decrease its operations as required. Similar
unwillingness of others to accept it—the
online information can determine the location of
ultimate test of any currency.
specific trucks (using GPS systems), check the
Virtual currencies also present challenges to estimated arrival date of incoming cargo ships,
accountants. Assets purchased with such or determine the current status of finished
currencies have floating cost bases, for example, products, parts inventories, or even working
and (in the case of bitcoins) no central institution assembly lines. Even vendors of inexpensive
keeps records. At this time, it is also unclear accounting software now include an e-
whether funds held in a virtual currency are commerce interface with their products.
5.5. Electronic Data Interchange (EDI) Internet purchase software as a service (SaaS). In
contrast, web hosting is an example of platform
According to a recent survey, over 80 percent of
as a service (PaaS). Examples of cloud vendors
companies continue to use at least some manual
include Amazon.com (data storage), Oracle
documents—for example, purchase orders,
(database software), and Intuit (both tax and
invoices, payment remittance forms, credit
payroll processing).
memos, bills of lading, or shipping notices.
Electronic Data Interchange (EDI) enables Cloud computing closely resembles other forms
companies to save money by transmitting the of outsourcing and therefore enjoys the same
information contained in such documents advantages. For example, when a hospital
electronically. Thus, EDI automates the exchange contracts with a second company to do its
of business information and permits payroll, it can then focus on its core mission and
organizations to conduct many forms of shift the burden- some details of payroll
commerce electronically. Government agencies processing (e.g., how much taxes to withhold for
also depend heavily on EDI. out-of-state employees) to the contractor. But
cloud computing also differs from traditional
One potential advantage of EDI compared to
forms of outsourcing. For example, the data
Internet e-commerce is that many business
communications in cloud computing takes place
documents are simply faxed over telephone
over the Internet and are therefore
lines, avoiding computers completely. This does
instantaneous. Another important difference is
not mean that EDI documents are not delivered
that transaction volumes are usually charged by
via the Internet. Many businesses now have
the day, hour, or even minute—and are billed
telephone systems that use Internet lines for
accordingly.
both voice and digital transmissions. Another
advantage is that many EDI documents include Cloud computing offers many advantages to
hand- written signatures, providing assurance of companies, which explains why so many
their authenticity. A third advantage is that EDI organizations now contract with cloud vendors.
includes the exchange of graphic and Cloud computing also has several disadvantages.
photographic documents—media that can be Perhaps the most important is the loss of control
scanned and captured electronically. that client firms experience when another
company assumes responsibility for their data
5.6. Cloud Computing
and data processing—a security concern at the
Cloud computing refers to purchasing services very least. Language barriers, quality control,
from vendors over the Internet. The term derives and time differentials are additional potential
its name from the cloudlike symbol often used to concerns when contracting with overseas
depict the Internet in networking diagrams. A vendors. A third concern is that backup service
host of activities fall into this category, including providers typically require large bandwidths, and
web hosting, payroll processing, backup the timing of automatic backups is not always
provisioning, emailing, and even outsourcing convenient to individual subscribers. Finally,
business phone systems. Here, we briefly discuss cloud computing often promises cost savings but
some examples of these services. does not guarantee them.

Processing Services Storage and Backup Services

Companies that access specialized software One of the most important types of cloud
(e.g., tax- preparation applications) on the computing is creating and maintaining copies of
critical data and files for both individuals and greatest weakness—vulnerability. This means
organizations. Vendors include Amazon, that someone who poses as an authorized user
Backblaze, Carbonite, Drop Box, SkyDrive, may be able to access any email, web page, or
JungleDisk, and Mozy. Most of these vendors computer file that an authorized user can access
provide low cost, and even free, backup services on the Internet. This section of the chapter
for individual customers. In commercial, fee-for- discusses Internet privacy and security in detail.
service settings, most backups are synchronized
6.1. Identity Theft and Privacy
and therefore occur at the same time a
computerized system gathers and stores the Identity theft refers to crimes in which someone
original data, thereby creating mirror, off-site uses another person’s personal identification
copies of vital accounting data. Additional, and (credit card, social security card, or similar
usually optional, services for home computing identifier) in some way that involves fraud or
applications include encryption, fixed-time deception (usually for economic benefit). The
backup schedules, expandable storage options, most common complaint related to identity theft
and Mac computer support. is credit card fraud.
Educational Services A related issue is personal privacy. Businesses
need to protect the payroll data they send to
You probably already use such web search
service providers electronically. Online shoppers
engines as Google or Bing to answer personal
want to know that their privacy is protected.
questions of interest. Professional accountants
None of us wants our emails read by hackers. But
do the same thing, using these same engines to
all these needs often conflict with other
answer asset classification, depreciation, or tax
objectives. For example, managers feel they
questions. In addition, the Internet provides a
have the right to view all the email messages of
host of specialized educational services. One
employees who use company computers during
category is “software tutorials.” For example,
working hours, and companies doing business on
you can find explanations and videos explaining
the web are sometimes hard pressed not to use
how to perform a wide variety of spreadsheet
the wealth of data that online shoppers provide
tasks by searching the term “Excel Tutorials.”
them. Most websites accessed by online users
Similar tutorials also explain how to use
collect personal information. What they collect
Microsoft Access, complete specific tax forms, or
and how they use it are dictated by their privacy
create PowerPoint presentations. Another
policies. Because businesses vary widely in the
category of online educational services is
amount of privacy protection for customers, it is
complete degree programs—i.e., institutions of
important to read a company’s policy statements
higher education that offer online courses of
carefully. State governments, prompted by
study leading to accounting degrees. You can
concerns over consumer privacy rights,
earn an associate’s degree, bachelor’s degree,
particularly in the financial and health care
and even a master’s of science degree in
industries, are introducing a variety of privacy
accounting through such “distance-learning”
legislation. Groups such as the Electronic
offerings. A partial listing of them may be found
Frontier Foundation and the Online Privacy
at eLearners.com.
Alliance are also working to protect the privacy
6. PRIVACY AND SECURITY ON THE INTERNET of data transmitted over the Internet.

The most important advantage of the Internet While companies need strong preventive
and World Wide Web—accessibility—is also its controls to help protect customer information,
individuals should also exercise reasonable that provides you physical access to information
caution in protecting their personal information. or a restricted area. Examples are your ATM
Unscrupulous individuals, posing as a company card, debit card, or employee card that gives you
or bank employee, might call or send email access to certain premises.
messages to solicit personal information. To
What you know refers to unique information you
protect yourself, be skeptical. If you are
possess, such as a password or your mother’s
uncertain about the authenticity of a request for
maiden name. You can authenticate who you are
personal information, ask the person to send the
with a unique physical characteristic such as your
request in writing on company letterhead. If you
fingerprint or the pattern of the retina in your
question the authenticity of a particular website,
eye. As you might guess, using security that
do more research on the company before
forces a user to prove who they are is the highest
purchasing goods or services through it—
level of authentication. Two-factor
especially if you must give your credit card
authentication (TFA) systems require a
number. Social media also pose interesting
combination of authentication techniques—for
privacy concerns because what you post online
example, requiring both your debit card and your
is neither private nor retractable. Moreover,
password to withdraw cash from an ATM.
employers often check postings on social
networking sites in search of “red flags”—for 6.3. Spam and Phishing
example, substance abuse, large amounts of
debt, criminal activity, or membership in A current Internet problem is the increasing
fanatical groups. Organizations use all this amount of spam—those annoying, unsolicited
information to help them evaluate employees or email messages that clog your email inbox.
disqualify job applicants. Like it or not, managers However, spam is more than a simple bother—it
regularly screen the postings of their is distracting, often illegal, and increasingly
subordinates, and more than one person has lost costly to organizations. AOL and Microsoft, two
his or her job by accidentally posting candid and of the biggest Internet service providers,
offensive materials that the boss could see. estimate that they each block over 2 billion spam
emails per day.
6.2. Security

Security policies and procedures safeguard an


organization’s electronic resources and limit Although about 35 percent of spam messages
their access to authorized users. For this reason, are harmless advertising, a greater percentage
information security has been a high-ranking contains pornographic solicitations, attempts to
technology in each of the last five years in the steal identities, or fictitious stories asking
AICPA’s survey of the “Top 10 Technologies” recipients for money. Clicking on the
expected to have a powerful influence over “unsubscribe button” in such messages usually
business. accomplishes the exact opposite effect because
it tells the sender that you are a legitimate user
Of special importance to AISs is access security— who actually reads such emails. Spammers sell
for example, restricting access to bona fide lists of such prized, active email accounts to one
users. Access authentication requires individuals another, furthering the problem.
to prove they are who they say they are. The
three types of authentication are based on: (1) Although some spam email contains legitimate
what you have, (2) what you know, and (3) who sales offers, many more are bogus. In some
you are. What you have may be a plastic card cases, the spammers advertise products at “too-
good-to-believe prices,” take credit-card orders, obvious, problem is the ability of a determined
collect the money, and then quickly fold up shop hacker to alter the contents of the access control
before consumers realize they’ve been list itself—a security breach that is especially
victimized. Phishing means tricking users into difficult to overcome. A final problem is that
providing valuable information such as Social most firewalls can only protect against external
Security numbers, debit card PIN numbers, attacks, not internal (authorized) users bent on
passwords, or similar personal information—for mischief.
example, by requesting this information on
6.5. Intrusion and Detection Systems
bogus websites. Other examples are emails that
request personal information for “routine Whereas firewalls simply reject unauthorized
security purposes” or even “because we believe users from access, intrusion detection systems
your account has been compromised.” Phishing (IDSs) create records of such events. Passive IDSs
activity is growing. create logs of potential intrusions and alert
network administrators to them either via
6.4. Firewalls
console messages, alarms, or beepers. Reactive
A firewall guards against unauthorized access to IDSs have the ability to detect potential
sensitive file information from external Internet intrusions dynamically (e.g., by examining traffic
users. On networked systems, firewalls are often flows), log off potentially malicious users, and
stand-alone devices with built-in, protective even reprogram a firewall to block further
software. On mainframe or host systems, messages from the suspected source. Perhaps
firewalls are usually software. The two primary the most important advantage of an IDS is its
methods of firewall protection are by inclusion ability to both prevent unauthorized accesses to
or by exclusion. When firewalls protect internal sensitive information and to alert system
systems by inclusion, the software examines administrators to potential violations. This may
packets of incoming messages and limits entry to also increase the perceived risk of discovery,
authorized (“included”) users. To do this, the dissuading would-be hackers. IDSs may also be
software maintains an access control list (ACL) of able to detect preambles to attacks, fore- stalling
bonafide IP addresses that network their effectiveness. Finally, an IDS is an important
administrators create for this purpose. If the tool for documenting an attack, thereby
software does not recognize the IP address of an generating invaluable information to both
external user, it refuses that user access to the network administrators and investigators.
files he or she requested. When firewalls protect
6.6. Value Added Networks
internal systems by exclusion, the software
compares the incoming packet IP address to a list Message-routing is important to accountants
of known threat addresses, rejecting messages because the security of a data transmission
from these sources but accepting all others. partially rests on the security of all the
intermediate computers along a given
Firewalls are useful Internet security controls,
communications pathway. Thus, the greater the
but (like most security features) are not
distance between the sending station and the
foolproof. One problem is that they cannot
destination computer, the more intermediary
protect against denial-of-service attacks, which
routing computers there are and the more
overwhelm system resources with a volume of
vulnerable a message becomes to interception
service requests. Another problem is spoofing
and abuse. This is one reason why businesses
(i.e., masquerading as an authorized user with a
sometimes prefer to create their own
recognizable IP address). A similar, but less
(proprietary) networks to transmit data But when they attempt to access a web page, the
electronically. initial network server contacts the proxy server
to perform the requested task. One advantage of
Value-Added Networks (VANs) are private,
using a proxy server is the ability to funnel all
point-to-point communication channels that
incoming and outgoing Internet requests
large organizations create for themselves—
through a single server. This can make web
usually for security reasons. When it first
access more efficient because the proxy server is
implements a VAN, the business assigns each
specifically designed to handle requests for
user a unique account code that simultaneously
Internet information. A second advantage is the
identifies the external entity and authenticates
proxy server’s ability to examine all incoming
the organization’s subsequent electronic
requests for information and test them for
transactions. There are at least three ways to
authenticity (i.e., the ability to act as a fire- wall).
create secure networks. One way is to start with
A third advantage is that a proxy server can limit
a blank slate and create everything from
employee Internet access to approved websites
scratch—an approach first used by the military
(i.e., to only those IP addresses contained in an
and later by Wal-Mart. A second way is to lease
access control list). This enables an organization
secure, dedicated transmission lines from
to deny employees access to gambling,
conventional long-distance carriers such as
pornographic, or game-playing websites that are
AT&T—the approach used by IGT’s Megabucks
unlikely to have any productive benefits. A
system. A third alternative is to create a virtual
fourth advantage is the ability to limit the
private network (VPN) on the Internet. As the
information that is stored on the proxy server to
name suggests, a VPN mimics a VAN in many of
information that the company can afford to lose.
its security features, but enjoys the benefit of
If this server fails or is compromised by hackers,
transmitting messages cheaply over existing
the organization is only marginally
Internet connections. A VPN creates secure data
inconvenienced because its main servers remain
transmissions by (1) using “tunneling” security
functional. To recover, the company can simply
protocols embedded in the message frames sent
restart the system and reinitialize the server with
to, and received by, the organization, (2)
backup data. A final advantage of proxy servers
encrypting all transmitted data, and (3)
is the ability to store (“cache”) frequently
authenticating the remote computer, and
accessed web pages on its hard drive—for
perhaps also the individual sender as well,
example, the web pages of preferred vendors.
before permitting further data transmissions.
This enables the server to respond quickly to
Most AIS VANs use this approach.
user requests for information because the web
6.7. Proxy Servers page data are available locally. This feature also
enables managers to obtain some idea of what
Given the large amount of information now information employees need most and perhaps
available on the web, some organizations seek to take steps to provide it internally (rather than
limit the number of sites that employees can through web sources).
access—for example, to ensure that employees
do not use web-access privileges for frivolous or 6.8. Encryption
counterproductive purposes. A proxy server is a
To safeguard transmitted data, businesses often
network server and related software that creates
use data encryption techniques that transform
a transparent gateway to and from the Internet
plaintext messages into unintelligible cyphertext
and controls web access. In a typical application,
ones. The receiving station then decodes the
users log onto their familiar file server as before.
encrypted messages back into plaintext for use. Internet are authentic. Examples include
There are many encryption techniques and purchase orders, bids for contracts, and
standards. The method that computers use to acceptance letters. To authenticate such
transform plaintext into cyphertext is called the documents, a company can transmit a complete
encryption key. This is typically a mathematical document in plaintext and then also include a
function that depends on a large prime number. portion of that same message or some other
standard text in an encrypted format—a digital
The data encryption standard (DES) system used
signature. In 1994, the National Institute of
by the US government to encode documents
Standards and Technology adopted Federal
employs such a system. DES uses a number with
Information Processing Standard 186—the
56 binary digits to encode information, a value
digital signature standard (DSS). The presence of
equal to approximately 72 quadrillion. Thus, to
the digital signature authenticates a document.
crack the code, a hacker must guess which of 72
The reasoning is straightforward: if a company’s
quadrillion values was used to encrypt the
private key decodes a message, then an
message.
authentic sender must have created the
The data encryption method uses a single message. For this reason, some experts consider
cryptographic key that is shared by the two digital signatures even more secure than written
communicating parties and is called secret key signatures (which can be forged). Further, if the
cryptography. This system derives its name from sender includes a complete message in both
the fact that its users must keep the key secret plaintext and cyphertext, the encrypted message
and not share the key with other parties. The pro- vides assurance that no one has altered the
most common encryption methods today use readable copy. If someone has altered the
public key encryption, a technique that requires plaintext, the two copies will not match. Another
each party to use a pair of public/private authentication technique is a digital certificate—
encryption keys. Two examples are Secure an authenticating document issued by an
Socket Layer (SSL) and Secure Hypertext Transfer independent third party called a certificate
Protocol (HTTP). authority (e.g., Thawte or VeriSign). The
certificates themselves are signed documents
To employ public key encryption, the sending with sender names and public key information.
party uses a public key to encode the message Certificates are generally encoded, possibly in a
and the receiving party uses a second, private certificate standard such as the X.509 certificate
key to decode it. A major advantage of public key format. Customers can also use digital
encryption is that the same public key cannot certificates to assure themselves that a website
both encode and decode a message. Data is real.
transmissions using public key encryption are
likely to be secure because the transmitted Many important business documents are time
message itself is scrambled and because neither sensitive. Examples include bidding documents
party knows the other’s key. This is the main that must be submitted by a deadline, deposit
reason why most web applications use public key slips that must be presented to banks before the
encryption systems. close of business, buy orders for stock purchases
that depend on the date and time of issue, and
6.9. Digital Signatures and Digital Time legal documents that must be filed in a timely
Stamping fashion. Then, too, most businesses also want to
Many businesses want proof that the accounting know when customers made particular
documents they transmit or receive over the purchases, when they paid particular bills, or
when specific employees entered or modified reduced capital expenditures (e.g., realized
data items in important databases. Finally, a savings in computer hardware and software).
good way to protect intellectual property such as Experts note that outsourcing also enables
computer software is to clearly establish the clients to reduce in-house labor costs, pay only
date and time it was first created or distributed. for the services they need, and focus on only
What these items have in common is the need their core businesses.
for a time stamp that unambiguously indicates
Perhaps the most commonly cited objection to
the date and time of transmission, filing, or data
outsourcing is a loss of control. In a recent survey
entry. PGP Digital Time Stamping Service and
of over 800 businesses by Accenture, however,
Verisign are two of several digital time-stamping
over 85 percent of the respondents said that
ser- vices (DTSSs) that attach digital time stamps
outsourcing actually gave them more control—
to documents either for a small fee or for free. In
especially in the ability to plan. In addition, over
a typical application, the user sends the
55 percent thought that accounting outsourcing
document to the service’s email address along
enabled them to implement strategic changes
with the Internet address of the final recipient.
faster and at more controlled rates. But the
When the service receives the document, it
biggest benefit of outsourcing may be the
performs its time-stamping task and then
increased business for those accounting
forwards the document as required. Digital time
companies providing these services—yet one
stamping performs the same task electronically
more opportunity made possible by the Internet.
that official seals and other time stamps perform
manually—it authenticates the date, time, and
perhaps place of a business transaction. This can
be important over the Internet. Although most
documents are transmitted almost
instantaneously, time delays can occur when file
servers temporarily falter or power failures
disrupt wide area networks. DTSSs enable
businesses to overcome these problems.

6.10. The Benefits of Online Outsourcing

The advantages of outsourcing such accounting


functions as payroll or tax preparation are well
known, but outsourcing additional accounting
tasks to online providers is a different matter.
Can a cloud provider, perhaps located offshore,
perform general ledger or deprecation
computations as well? A growing number of
businesses say “yes!” The most common reason
why organizations outsource a given business
process is to reduce costs, and this applies to
accounting applications as well. Additional
benefits include faster turnaround, improved
quality, enhanced access to expertise, improved
ability to handle peak processing volumes, and

You might also like