Professional Documents
Culture Documents
Transaction Cycles Collects labor usage data for each employee, Sales Order Processing
computes the payroll, and disburses paychecks
1. incurs expenditures in exchange for resources to the employees. The majority of business sales are made on
(expenditure cycle), credit and involve tasks such as preparing sales
Fixed Asset orders, granting credit, shipping products (or
2. provides value added through its products or rendering of a service) to the customer, billing
services (conversion cycle), and These are relatively permanent items that
customers, and recording the transaction in the
collectively often represent the organization’s
3. receives revenue from outside sources accounts (accounts receivable, inventory,
largest financial investment.
(revenue cycle) expenses, and sales).
Accounting Records
Manual System chronological order. Documents are the primary Summarizes the activity for each of the
source of data for journals. organization’s accounts. The general ledger
This section describes the purpose of each type
department updates these records journal
of accounting record used in transaction cycles. Special Journals
vouchers prepared from special and other
We begin with traditional records used in
Are used to record specific classes of sources located throughout the organization
manual systems (documents, journals, and
transactions that occur in high volume. Such
ledgers) and then examine their magnetic Subsidiary Ledgers
transactions can be grouped together in a special
counterparts in computer-based systems
journal and processed more efficiently than a Kept in various accounting departments of the
Documents general journal permits. firm, including inventory, accounts payable,
payroll, and accounts receivable. This
A document provides evidence of an economic Register
separation provides better control and support
event and may be used to initiate transaction
Used to denote certain types of special journals. of operations.
processing. Some documents are a result of
For example, the payroll journal is often called
transaction processing. In this section, we discu Audit Trail
the payroll register
ss three types of documents: source documents,
For tracing transactions from source documents
product documents, and turnaround documents. General Journal
to the financial statements. Of the many
Product Documents Firms use the general journal to record purposes of the audit trail, most important to
nonrecurring, infrequent, and dissimilar accountants is the year-end audit.
Are the result of transaction processing rather
transactions. For example, we usually record
than the triggering mechanism for the process. Computer Based System
periodic depreciation and closing entries in the
For example, a payroll check to an employee is
general journal. Types of Files - Audit trails in computer-based
a product document of the payroll system.
systems are less observable than in traditional
manual systems, but they still exist. Accounting
records in computer-based systems are
Turnaround Documents
represented by four different types of magnetic
Ledger files: master files, transaction files, reference
Are product documents of one system that
become source documents for another system. Book of accounts that reflects the financial files, and archive files.
effects of the firm’s transactions after they are Transaction File
Journal
posted from the various journals. A ledger
A record of a chronological entry. At some indicates the increases, decreases, and current Is a temporary file of transaction records used to
point in the transaction process, when all balance of each account. change or update data in a master file. Sales
relevant facts about the transaction are known, orders, inventory receipts, and cash receipts are
General Ledger examples of transaction files.
the event is recorded in a journal in
Reference File
Stores data that are used as standards for The old saying that a picture is worth a • The clerk sends Copy 1 of the sales order to
processing transactions. For example, the thousand words is very applicable when it the credit department for approval. The other
payroll program may refer to a tax table to comes to documenting systems. A written three copies and the original customer order are
calculate the proper amount of withholding description of a system can be wordy and filed temporarily, pending credit approval.
taxes for payroll transactions. difficult to follow.
•The credit department clerk validates the
Archive File Data Flow Diagram customer’s order against hard-copy credit
records kept in the credit department. The clerk
Contains records of past transactions that are Uses symbols to represent the entities,
signs Copy 1 to signify approval and returns it
retained for future reference. These transactions processes, data flows, and data stores that
to the sales clerk.
form an important part of the audit trail. pertain to a system.
Archive files include journals, prior period • When the sales clerk receives credit approval,
Entity Relationship Diagram
payroll information, lists of former employees, he or she files Copy 1 and the customer order in
records of accounts written off, and prior-period Is a documentation technique used to represent the department. The clerk sends Copy 2 to the
ledgers. the relationship between entities. Entities are warehouse and Copies 3 and 4 to the shipping
physical resources (automobiles, cash, or department
Digital Audit Trail
inventory), events (ordering inventory,
• The warehouse clerk picks the products from
1. Compare the accounts receivable balance in receiving cash, shipping goods), and agents
the shelves, records the transfer in the hardcopy
the balance sheet with the master file AR (salesperson, customer, or vendor) about which
stock records, and sends the products and Copy
control account balance. the organization wishes to capture data.
2 to the shipping department.
2. Reconcile the AR control figure with the AR System Flowchart
•The shipping department receives Copy 2 and
subsidiary account total.
Is the graphical representation of the physical the goods from the warehouse, attaches Copy 2
3. Select a sample of update entries made to relationships among key elements of a system. as a packing slip, and ships the goods to the
accounts in the AR subsidiary ledger and trace These elements may include organizational customer. Finally, the clerk files Copies 3 and 4
these transactions in the sales journal (archive departments, manual activities, computer in the shipping department.
file). programs, hard-copy accounting records
Rules to be Observed
(documents, journals, ledgers, and files), and
4. From these journal entries, identify specific
digital records (reference files, transaction files, • The flowchart should be labeled to clearly
source documents that can be pulled from their
archive files, and master files). identify the system that it represents.
files and verified. If necessary, the auditor can
confirm the accuracy and propriety of these Flowcharting Manual Activities • The correct symbols should be used to
source documents by contacting the customers represent the various entities in the system.
•A clerk in the sales department receives a hard-
in question.
copy customer order by mail and manually • All symbols on the flowchart should be
Documentation Techniques prepares four hard copies of a sales order. labeled.
•Lines should have arrowheads to clearly show Mnemonic Codes are alphabetic characters in
the process flow and sequence of events. the form of acronyms and other combinations
that convey meaning.
•If complex processes need additional
explanation for clarity, a text description should
be included on the flowchart or in an attached
document referenced by the flowchart
Batch Processing
Permits the efficient management of a large
volume of transactions. A batch is a group of
similar transactions (such as sales orders) that
are accumulated over time and then processed
together.
Difference between Batch and Real-Time
System
Batch systems assemble transactions into
groups for processing.
Real-time systems process transactions
individually at the moment the event occurs
Numeric and Alphabetic Coding Scheme
Sequential Codes represent items in some
sequential order (ascending or descending).
Numeric Block Codes represent whole classes
of items by restricting each class to a specific
range within the coding scheme.
Alphabetic Codes may be assigned
sequentially (in alphabetic order) or may be
used in block and group coding techniques.
Ethics, Fraud, and Internal Making Ethical Decisions Whistle-Blowing
Control • Proportionality. The benefit of the decisions Honesty
must outweigh the risks. Furthermore, there
Ethical issues in Business Employee and Management Conflicts of
must be no alternative decision that provides the
Interest
•Ethical standards –derived from social mores same or greater benefit with less risk.
and deep-rooted personal beliefs about issues of Security of Organization Data and Records
• Justice. The benefits of the decisions should
right and wrong that are not universally agreed be distributed fairly to those who share risks. Misleading Advertising
upon. Those who do not benefit should not carry the
burden of risk. Questionable Business Practices in Foreign
Business Ethics
Countries
• Why should we be concerned about ethics in • Minimize risk. Even if judged acceptable by
the principles, the decision should be Accurate Reporting of Shareholder Interests
the business world?
implemented so as to minimize all of the risk Exercise of Corporate Power
• Ethics – the principles of conduct that and avoid any unnecessary risks.
individual use in making choices and guiding Political Action Committees
their behavior in situations that involve the Four Main Areas of Business Ethics
Workplace Safety
concept of right and wrong. Ethical Issues in Business
Product Safety
• Ethics are needed when conflicts arise—the Equity
need to choose Environmental Issues
Executive Salaries
• In business, conflicts may arise between Divestment of Interests
Comparable Worth
• Employees Corporate Political Contributions
Product Pricing
• Management Downsizing and Plant Closures
Rights
• Stakeholders Computer Ethics
Corporate Due Process
• Litigation • the analysis of the nature and social impact of
Employee Health Screening computer technology and the corresponding
•Business ethics involves finding the answers to
formulation and justification of policies for the
two questions: •How do managers decide on Employee Privacy
ethical use of such technology.
what is right in conducting their business? •
Sexual Harassment
Once managers have recognized what is right, • concerns the social impact of computer
how do they achieve it? Diversity technology (hardware, software, and
telecommunications).
Equal Employment Opportunity
What are the main computer ethics issues? financial statements that it submits to the SEC • Employee fraud –generally designed to
and to the public. directly convert cash or other assets to the
• Privacy
employee’s personal benefit.
• Legal Compliance. Codes of ethics should
• Security—accuracy and confidentiality
require employees to follow applicable • Committed by non-management personnel
• Ownership of property governmental laws, rules, and regulations.
• Usually consists of: an employee taking cash
• Equity in access • Internal Reporting of Code Violations. The or other assets for personal gain by
code of ethics must provide a mechanism to circumventing a company’s system of internal
• Environmental issues permit prompt internal reporting of ethics controls
• Artificial intelligence violations.
• Involves three steps: stealing something of
• Unemployment and displacement • Accountability. An effective ethics program value (an asset), converting the asset to a usable
must take appropriate action when code form (cash), and concealing the crime to avoid
• Misuse of computer violations occur. detection.
Sarbanes – Oxley Act and Ethical Issues Fixed Assets • Management fraud –more insidious than
• Sarbanes-Oxley Act (SOX), is the most employee fraud because it often escapes
• Fraud –denotes a false representation of a
significant securities law since the Security and detection until the organization has suffered
material fact made by one party to another party
Exchange Commission (SEC) Acts of 1933 and irreparable damage or loss.
with the intent to deceive and induce the other
1934. SOX has many provisions designed to party to justifiably rely on the fact to his or her • Perpetrated at levels of management above the
deal with specific problems relating to capital detriment. one to which internal control structure relates
markets, corporate governance, and the auditing
profession. • False representation – false statement or • Frequently involves using financial statements
disclosure to create an illusion that an entity is more
Section 406 – Code of Ethics for Senior healthy and prosperous than it actually is
Financial Officers • Material fact – a fact must be substantial in
including someone to act • Involves misappropriation of assets, it
• Conflict of Interest. The company’s code of frequently is shrouded in a maze of complex
ethics should outline procedures for dealing • Intent to deceive must exist
business transactions
with actual or apparent conflicts of interest • The misrepresentation must have resulted
between personal and professional relationship. The Fraud Triangle
in justifiable reliance upon information, which
• Full and Fair Disclosures. This provisions caused someone to act • Consists of three factors that contribute to are
states that the organization should provide full, associated with management and employee
• The misrepresentation must have
fair, accurate, timely, and understandable fraud:
caused injury or loss
disclosure in the documents, reports, and
Auditor encounter fraud at two levels:
• Situational pressure – includes personal or • WorldCom transferred transmission line costs • May also be related to management bonus
job-related stresses that could coerce an from current expense accounts to capital packages being tied to financial statements
individual to act dishonestly. accounts
B. Corruption
• Opportunity – involves direct access to assets Sarbanes – Oxley Act of 2002
• Examples:
and/or access to information that controls assets.
• Its principal reforms pertain to:
• Bribery
• Ethics – pertains to one’s character and degree
• Creation of the Public Company Accounting
of moral opposition to acts of dishonesty • Illegal gratuities
Oversight Board (PCAOB)
Enron, Worldcom, Adelphia Underlying • Conflicts of interest
• Auditor independence –more separation
Problems
between a firm’s attestation and non-auditing • Economic extortion
• Lack of Auditor Independence: auditing firms activities
also engaged by their clients to perform • Foreign Corrupt Practice Act of 1997:
• Corporate governance and responsibility –
nonaccounting activities
audit committee members must be independent • Indicative of corruption in business world
• Lack of Director Independence: directors who and the audit committee must oversee the • Impacted accounting by requiring accurate
serve on the boards of other companies, have a external auditors records and internal controls
business trading relationship, have a financial
• Disclosure requirements –increase issuer and C. Asset misappropriation
relationship, have as stockholders or have
management disclosure
received personal loans, or have an operational •Most common type of fraud and often occurs
relationship as employees • New federal crimes for the destruction of or as employee fraud
tampering with documents, securities fraud, and
• Questionable Executive Compensation •Examples:
actions against whistleblowers
Schemes: short-term stock options as
compensation result in short-term strategies Fraud Schemes •Making charges to expense accounts to cover
aimed at driving up stock prices at the expense theft of asset (especially cash)
of the firm’s long-term health •Three categories of fraud schemes according to
the Association of Certified Fraud Examiners: •Lapping: using customer’s check from one
• Inappropriate Accounting Practices: a account to cover theft from a different account
characteristic common to many financial A. Fraudulent statements
•Transaction fraud: deleting, altering, or adding
statement fraud schemes. • Misstating the financial statements to make false transactions to steal assets
• Enron made elaborate use of special purpose the copy appear better than it is
• Skimming. Involves stealing cash from an
entities • Usually occurs as management fraud organization before it is recorded on the
• May be tied to focus on short-term financial organization’s books and records.
measures for success
• Cash Larceny. Involves schemes in which • Theft, corruption, illegal copying or Internal Control Objectives According to
cash receipts are stolen from an organization intentional destruction of software AICPA SAS
after they have been recorded in the
• Theft, misuse, or misappropriation of 1. Safeguard assets of the firm
organization’s book and records.
computer hardware
2. Ensure accuracy and reliability of accounting
• Billing Schemes. Also known as vendor fraud,
Data Collection Fraud records and information
are perpetrated by employees who causes their
employer to issue a payment to a false supplier •This aspect of the system is the most 3. Promote efficiency of the firm’s operations
or vendor by submitting invoices for fictitious vulnerable because it is relatively easy to
good or services, inflated invoices, or invoice 4. Measure compliance with management’s
change data as it is being entered into the
for personal purchases. prescribes policies and procedures
system.
• Check tampering. involves forging or Information Generation Fraud
•Also, the GIGO (garbage in, garbage out)
changing in some material way a check that the principle reminds us that if the input data is Stealing, misdirecting, or misusing computer
organization has written to a legitimate payee. inaccurate, processing will result in inaccurate output
output.
• Pay roll fraud. is the distribution of fraudulent •Scavenging
paychecks to existent and/ or nonexistent Data Processing Fraud
employees. • Searching through the trash cans on the
•Program Frauds computer canter for discarded output (the output
• Expense reimbursement frauds. are schemes in should be shredded, but frequently in not)
which an employee makes a claim for •Altering programs to allow illegal access to
reimbursement of fictitious or inflated business and/or manipulation of data files Modifying Assumptions to the Internal
Control Objectives
expense. •Destroying programs with a virus
• Thefts of cash. Are schemes that involve the • Management Responsibility The establishment
•Operations Frauds
direct theft of cash on hand in o14rganization. and maintenance of a system of internal control
•Misuse of company computer resources, such is the responsibility of management.
Computer Fraud Schemes as using the computer for personal business
• Reasonable Assurance the cost of achieving
• Theft, misuse, or misappropriation of assets by Data Management Fraud the objectives of internal control should not
altering computerreadable records and files outweigh its benefits.
•Altering, deleting, corrupting, destroying, or
• Theft, misuse, or misappropriation of assets by stealing an organization’s data • Methods of Data Processing The techniques of
altering logic of computer software achieving the objectives will vary with different
•Oftentimes conducted by disgruntled or ex-
• Theft of illegal use of computer-readable types of technology
employee
information Limitations of Internal Controls
•Possibility of honest errors • Corrective Controls. Are action taken reverse • Policies and practices managing human
the effects of errors detected in the previous resources
•Circumvention via collusion
step. There is an important distinction between
2. Risk assessment
•Management override detective and corrective controls.
• Identify, analyze and manage risks relevant to
•Changing conditions—especially in companies SAS 78/ COSO
financial reporting:
with high growth
Describes the relationship between the firm’s
• changes in external environment
Exposure of Weak Internal Control (Risk)
• internal control structure,
• risky foreign markets
•Destruction of an asset
• auditor’s assessment of risk, and
• significant and rapid growth that strain
•Theft of an asset
• the planning of audit procedures internal controls • new product lines
•Corruption of information
How do these three interrelate? • restructuring, downsizing
•Disruption of the information system
The weaker the internal control structure, the • changes in accounting policies
Computer-based System higher the assessed level of risk; the higher the
3. Information and communication
risk, the more auditor procedures applied in the
Types of Files - Audit trails in computer-based audit. •The AIS should produce high quality
systems are less observable than in traditional
information which:
manual systems, but they still exist. Accounting
records in computer-based systems are •identifies and records all valid transactions
Five Internal Control Components: SAS
represented by four different types of magnetic
78/COSO • provides timely information on appropriate
files: master files, transaction files, reference fil
detail to permit proper classification and
es, and archive files. 1. Control environment
financial reporting
The Preventive-Detective-Corrective Internal • Integrity and ethics of management
• accurately measures the financial value of
Control
• Organizational structure transactions
• Preventive Controls. Prevention is the first line
• Role of the board of directors and the audit • accurately records transactions in the time
of defense in the control structure. Are passive
committee period in which they occurred
techniques designed to reduce the frequency or
occurrence of undesirable events. • Management’s policies and philosophy • Auditors must obtain sufficient knowledge of
the IS to understand:
• Detective Controls. These are devices, • Delegation of responsibility and authority
techniques, and procedures designed to identify • the classes of transactions that are material
and expose undesirable events that elude • Performance evaluation measures
• how these transactions are initiated [input]
preventive controls. • External influences—regulatory agencies
• the associated accounting records and • Fall into two distinct categories: Physical Control
accounts used in processing [input]
•IT controls – relate specifically to the computer •Transaction Authorization
• the transaction processing steps involved from environment
• used to ensure that employees are carrying out
the initiation of a transaction to its inclusion in
•Physical controls – primarily pertain to human only authorized transactions
the financial statements [process]
activities
• general (everyday procedures) or specific
• the financial reporting process used to compile
Two Types of IT Controls (non-routine transactions authorizations
financial statements, disclosures, and
estimated [output] • General controls –pertain to the entity wide • Segregation of Duties
computer environment
[red shows relationship to the general AIS •In manual systems, separation between:
model] • Examples: controls over the data center,
• authorizing and processing a transaction
organization databases, systems development,
4. Monitoring
and program maintenance • custody and recordkeeping of the asset
• The process for assessing the quality of
• Application controls –ensure the integrity of • subtasks
internal control design and operation
specific systems
[this is the feedback in the general AIS model] •In computerized systems, separation between:
• Examples: controls over sales order
• Separate procedures – test of controls by processing, accounts payable, and payroll • program coding
internal auditors applications • program processing
• Ongoing monitoring: Six Types of Physical Control • program maintenance
• computer modules integrated into routine •Transaction Authorization •Supervision
operations
•Segregation of Duties •a compensation for lack of segregation; some
• Management reports which highlight trends may be built into computer systems
•Supervision
and exceptions from normal performance
•Accounting Records •Accounting Records
[red shows relationship to the general AIS
model] •Access Control •provide an audit trail
• Policies and procedures to ensure that the •Help to safeguard assets by restricting physical
appropriate actions are taken in response to access to them
identified risks
• Independent Verification •Independent Verification
•Reviewing batch totals or reconciling •When tasks are performed by the computer
subsidiary accounts with control accounts rather than manually, the need for an
independent check is not necessary
Physical Control in IT Contexts
•However, the programs themselves are
•Transaction Authorization
checked.
•The rules are often embedded within computer
programs
•EDI/JIT: automated re-ordering of inventory
without human intervention
•Segregation of Duties
•A computer may perform many tasks that are
deemed incompatible.
•Thus the crucial need to separate program
development, program operations, and program
maintenance.
•Accounting Records
•Ledger accounts and sometimes source
documents are kept magnetically
•No audit trail is readily apparent
•Supervision
•The ability to asses competent employees
becomes more challenging due to the greater
technical knowledge required.
•Access Control
•Data consolidation exposes the organization to
computer fraud and excessive losses from
disaster.
The Revenue Cycle • Sales information is released to: Manual Cash Receipts Processes
Revenue Cycle Database •Billing • Customer checks and remittance advices are
received in the Mail Room.
• Master files •Warehouse (stock release or picking ticket)
• A mail room clerk prepares a cash prelist
• customer master file • Shipping (packing slip and shipping notice)
and sends the prelist and the checks to Cash
• accounts receivable master file • The merchandise is picked from the Receipts.
Warehouse and sent to Shipping.
• merchandise inventory master file • The cash prelist is also sent to A/R and the
• Stock records are adjusted. Controller.
• Transaction and Open Document Files
• The merchandise, packing slip, and bill of • Cash Receipts:
• sales order transaction file
lading are prepared by Shipping and sent to the
• verifies the accuracy and completeness of
• open sales order transaction file customer.
the checks
• sales invoice transaction file • Shipping reconciles the merchandise
• updates the cash receipts journal
received from the Warehouse with the sales
• cash receipts transaction file information on the packing slip. • prepares a deposit slip
• Other Files • Shipping information is sent to Billing. Billing • prepares a journal voucher to send to G/L
– shipping and price data reference file compiles and reconciles the relevant facts and
•A/R posts from the remittance advices to the
issues an invoice to the customer and updates
– credit reference file (may not be needed) the sales journal. Information is transferred to:
accounts receivable subsidiary ledger.
2. Asset custody should be separate from asset • pre-numbered source documents •Authorizations and data access can be
record-keeping. performed through computer screens.
•special journals
3. The organization should be so structured that •There is a decrease in the amount of paper.
•subsidiary ledgers
the perpetration of a fraud requires collusion •The manual journals and ledgers are changed
between two or more individuals. •general ledger to disk or tape transaction and master files.
Segregation of Functions •files
•Input is still typically from a hard copy •Manual procedures and physical documents are •Machines are open the envelopes, scan
document and goes through one or more replaced by interactive computer terminals. remittance advices and checks, and separate the
computerized processes. checks.
•Real time input and output occurs, with some
•Processes store data in electronic files (the tape master files still being updated using batches. •Artificial intelligence may be used to read
or disk) or prepare data in the form of a handwriting, such as remittance amounts and
•Real-time - entry of customer order, printout
hardcopy report. signatures.
of stock release, packing slip and bill of lading;
•Revenue cycle programs can include: update of credit file, inventory file, and open Point-of-Sales Systems
sales orders file
•formatted screens for collecting data •Point of sale systems are used extensively in
•Batch – printout of invoice, update of closed retail establishments.
• edit checks on the data entered
sales order (journal), accounts receivable and
•Customers pick the inventory from the
•instructions for processing and storing the general ledger control account
shelves and take them to a cashier.
data
Advantages of Real-Time Processing
•The clerk scans the universal product code
•security procedures (passwords or user IDs)
•Shortens the cash cycle of the firm by reducing (UPC). The POS system is connected to an
•steps for generating and displaying output the time between the order date and billing date inventory file, where the price and description
are retrieved.
•To understand files, you must consider the •Better inventory management which can lead
record design and layout. to a competitive advantage •The inventory levels are updated and reorder
needs can immediately be detected.
•The documents and the files used as input •Fewer clerical errors, reducing incorrect items
sources must contain the data necessary to being shipped and bill discrepancies •The system computes the amount due.
generate the output reports. Payment is either cash, check, ATM or credit
•Reduces the amount of expensive paper
card in most cases.
Computer-based accounting system documents and their storage costs
•No accounts receivables
•CBAS technology can be viewed as a Reengineered Cash Receipt
continuum with two extremes: •If checks, ATM or credit cards are used, an on-
•The mail room is a frequent target for
line link to receive approval is necessary.
•automation - use technology to improve reengineering.
efficiency and effectiveness •At the end of the day or a cashier’s shift, the
•Companies send their customers preprinted
money and receipts in the drawer are reconciled
•reengineering – use technology to restructure envelopes and remittance advices.
to the internal cash register tape or a printout
business processes and firm organization from the computer’s database.
•Upon receipt, these envelopes are scanned to
Reengineering Sales Order Processing Using provides a control procedure against theft.
•Cash over and under must be recorded
Real-Time Technology
Reengineering Using EDI •Segregation of Functions - consolidation of
tasks by the computer is common
• EDI helps to expedite transactions.
•Protect the computer programs
• The customer’s computer:
•Coding, processing, and maintenance should
• determines that inventory is needed
be separated.
• selects a supplier with whom the business
• Supervision - in POS systems, the cash
has a formal business agreement
register’s internal tape or database is an added
• dials the supplier’s computer and places the form of supervision
PC-Based Accounting System
order
•Access Control - magnetic records are
• Used by small firms and some large
• The exchange is completely automated. vulnerable to both authorized and unauthorized
exposure and should be protected decentralized firms
• No human intervention or management
•Must have limited file accessibility • Allow one or few individuals to perform entire
Reengineering Using the Internet accounting function
•Must safeguard and monitor computer
•Typically, no formal business agreements exist programs • Most systems are divided into modules
as they do in EDI. controlled by a menu-driven program:
• Accounting Records - rest on reliability and
•Most orders are made with credit cards. security of stored digitalized data • general ledger
•Mainly done with e-mail systems, and thus a • Accountants should be skeptical about the • inventory control
turnaround time is necessary accuracy of hard-copy printouts. • payroll
•Intelligent agents are needed to eliminate this • Backups - the system needs to ensure that • cash disbursements
time lag. backups of all files are continuously kept
• purchases and accounts payable
• Security and control over data is a concern • Independent Verification – consolidating
with Internet transactions. accounting tasks under one computer program • cash receipts
CBAS Control Considerations can remove traditional independent verification • sales order
controls. To counter this problem:
•Authorization - in real-time systems,
authorizations are automated • perform batch control balancing after each run
•Programmed decision rules must be closely • produce management reports and summaries
monitored. for end users to review
PC Control Issues
• Segregation of Duties - tend to be inadequate
and should be compensated for with increased
supervision, detailed management reports, and
frequent independent verification
• Access Control - access controls to the data
stored on the computer tends to be weak;
methods such as encryption and disk locking
devices should be used
• Accounting Records - computer disk failures
cause data losses; external backup methods
need to be implemented to allow data recovery