You are on page 1of 22

The Information System: An organization, is reflected in its accounts and is General ledger/financial reporting system

measured in monetary terms. (GL/FRS) takes information from the TPS


Accountant’s Perspective and other input and:
A nonfinancial transaction is an event that
Terms: doesn’t meet the definition of a financial • Updates general ledger control accounts.
Information is a business resource. transaction.
• Handles nondiscretionary reporting
Operations management directly responsible for Accounting information system (AIS) requirements.
controlling day-to-day operations. processes financial and some nonfinancial
Management reporting system (MRS)
transactions. Three subsections:
Middle management accountable for short-term provides the internal
planning and coordinating activities to 1. Transaction processing system (TPS)
information needed to manage a business and
accomplish organizational objectives. which supports daily business operations.
handles discretionary reporting.
Top management responsible for longer-term 2. General ledger/financial reporting system
A General Model for AIS
planning and setting organizational objectives (GL/FRS) which produces reports.
End users fall into two groups:
Information Objectives: 3. Management reporting system (MRS)
which provides information for decision • External users include creditors,
The goal of an information system is to support: making. stockholders, government agencies, suppliers
• The firm’s day to day operations and customers.
Management information system (MIS)
• Management decision making processes nonfinancial transactions not • Internal users include management and
processed by the AIS. operations personnel.
• The stewardship function of management.
AIS SUBSYSTEM Distributes essential financial information to
An Information Systems Framework support operations.
Transaction Processing System (TPS)
The information system is the set of formal Data are facts which may or may not be
procedures by which data are collected, • Converts economic events into financial
processed and have no direct effect on a user’s
processed into information, and distributed to transactions.
actions.
users. • Records financial transactions in the
Information causes a user to take an action that
A transaction is an event that affects or is of accounting records
would otherwise not have been taken.
interest to the organization and is processed by • Distributes essential financial information to
its information system as a unit of work. Data sources are financial transactions that
support operations.
enter the information system for internal or
A financial transaction is an economic event external sources.
that affect the assets and equities of the
The levels in the data hierarchy: Regardless of physical form, useful information • Summarization
has:
Data Attribute is the most elemental piece of Unreliable information has no value.
potentially useful data in the database. Relevance: Content must serve a purpose.
Information reliability requires accounting
Record is a complete set of attributes for a Reliability: When it gives same repeated result independence.
single occurrence within an entity class.
Timeliness: No older than time frame of Accounting activities must be separate and
File (or table) is a complete set of records of an supported action. independent of the functional areas maintaining
identical class. custody of resources.
Accuracy: Free from material errors.
Database management involves three Accounting supports these functions with
Completeness: All essential information is
fundamental tasks: storage, retrieval and information but does not participate in the
present.
deletion. physical activities.
Summarization: Aggregated for the user’s
Operational Stages in the Information
needs.
System: Information Technology
Feedback is a form of output sent back to the
• Data collection Systems Development is the process
system as a source of data.
organizations use to acquire information
• First operational stage in the information
The Accounting Function systems. It can be purchased or built from
system. The objective is to ensure data are
scratch.
valid, complete and free from material errors. Accounting manages the financial resource of
the firm: Commercial software available for general
• Only relevant data should be captured.
accounting and industry specific applications.
• Captures and records transactions
• Efficient collection procedures designed to Sometimes called turnkey systems because can
collect data only once. • Distributes transaction information to be implemented with little modification.
operations personnel.
• Data processing tasks range from simple to Custom software is developed through a
complex. Value of information is determined by its formal process called the system development
life cycle. Requires an in-house team of
The organization’s database is its physical • Relevance qualified individuals.
repository for financial and nonfinancial data.
• Reliability Systems maintenance may be trivial or
(Term could apply to a filing cabinet or significant. Between 80% - 90% of system’s
computer disk.) • Timeliness
total cost may be incurred because of
• Information generation is the process of • Accuracy maintenance activities.
compiling, arranging, formatting, and • Completeness
presenting information to users.
The Role of Accountants in AIS valuation, actuarial, and internal audit Para computer ethics involves taking an interest
outsourcing. in computer ethics cases and acquiring some
IT professionals determine the most economical
level of skill and knowledge in the field.
and effective technologies for the physical • Management or human resources, broker or
system, including data storage. dealer, investment adviser, or investment Issues of concern include:
banking services.
Accountants play a prominent role on system • Privacy and ownership in the personal
development teams as domain experts, • Legal services and expert services unrelated to information industry.
responsible for many aspects of the the audit.
• Security involving accuracy and
conceptual system including specifying rules,
• Any other service that the Board determines, confidentiality.
reporting requirements and internal control
by regulation, is impermissible.
objectives. • What can an individual or organization own?
Internal auditing is an independent appraisal
Types of Audits in AIS • Equity of access issues related to economic
function within an organization to examine and
status, culture and safety.
External audit is an independent attestation evaluate activities. External auditors represent
and opinion (audit report) regarding financial outsiders and internal auditors represent the • Environmental issues, artificial intelligence,
statement presentation. interests of the organization. unemployment and displacement and computer
misuse.
Requires auditors (independent CPAs) to test Fraud audits have increased in popularity as a
internal controls and perform substantive tests corporate governance tool. Sarbanes-Oxley Act (SOX) Section 406
of data. requires public companies to disclose to the
It may be initiated by managers to investigate
SEC if they have a code of ethics that applies to
Critical element is auditor independence, employees or the board to investigate
the CEO, CFO and controller.
which means the auditor is free from factors management.
that might influence the audit report. If a company does not have a code, it must
Audit Committees serves an independent
explain why.
Prior to SOX, accounting firms were permitted “check and balance” for internal audit functions
to provide both advisory and attest services to and a liaison with external auditors. Usually Compliance with 406 requires a code of
clients. three people, one of which must be a “financial ethics that addresses:
expert”.
SOX legislation restricts non-audit services that • Procedures for dealing with conflicts of
auditors may provide and prohibits auditors Ethical Issues in Business interest.
from providing these services:
Computer ethics analyzes the social impact of • Full and fair disclosures to ensure candid,
• Other accounting services including computer technology and formulation and open, truthful disclosures
bookkeeping, financial information systems justification of policies for the ethical use of
design and implementation, appraisal or technology. • Requiring employees to follow applicable
laws, rules and regulations.
• A mechanism to permit prompt internal Promote efficiency of the firm’s operations. cost-effective than detecting and correcting
reporting of ethical violations. Measure compliance with management’s them.
prescribed policies and procedures.
• Taking appropriate actions when code Detective controls are designed to identify
violations occur. Modifying Assumptions to the Internal undesirable events that elude preventive
Control Objectives: controls.
Fraud and Accountants
Management Responsibility Corrective controls are actions taken to reverse
The Fraud Triangle factors that contribute to
the effects of errors detected.
fraud: The establishment and maintenance of a system
of internal control is the responsibility of Public company management responsibilities
• Situational pressures that coerce an individual
management. are codified in Sections 302 and 404 of SOX:
to act dishonestly.
Reasonable Assurance Section 302 requires management to certify
• Opportunity through direct access to assets.
organization’s internal controls on a quarterly
Cost of achieving objectives should not
• Rationalization (Ethics) which relate to one’s and annual basis.
outweigh the benefits.
character and moral compass.
Section 404 requires management to assess
Methods of Data Processing
Fraud losses equal 5% of revenue. Actual cost internal control effectiveness.
difficult to quantify and do not include indirect Control techniques vary with different types of
The control environment sets the tone for the
losses. technology.
organization and influences control awareness.
Most frauds are committed by employees than Limitations
COSO internal control framework five
managers, the losses are much higher for
These include (1) possibility of error, (2) components:
managers and owners.
circumvention, (3) management override and
Organizations must perform a risk assessment
Collusion in the commission of a fraud is (4) changing conditions.
to identify, analyze and manage financial
difficult to prevent and detect.
The absence or weakness of a control is an reporting risks.
Internal Control Concept and Techniques exposure:
The quality of information the AIS generates
The internal control system consists of May result in asset destruction or theft and impacts management’s ability to take actions
policies, practices and procedures to achieve corruption or disruption of the information and make decisions.
four broad objectives: system.
An effective system records all valid
Safeguard assets of the firm. Preventive controls are passive techniques transactions and provides timely and accurate
designed to reduce undesirable events by information.
Ensure accuracy and reliability of accounting
forcing compliance with prescribed or desired
records and information.
actions. Preventing errors and fraud is more
Monitoring is the process by which the quality * Check digit is a control digit(s) that is added • Batch controls manage the flow of high-
of internal control design and operations can be to the data code when originally assigned. volume transactions and reconcile system
assessed. Allows integrity to be established during output with original input.
processing and helps prevent two common
Control activities are policies and procedures • Run-to-run controls monitor batch from one
errors
to ensure appropriate actions are taken to deal process to another.
with identified risks. *Transcription errors occur when (1) extra
• Output controls are procedures to ensure
digits are added to a code, (2) a digit is omitted
IT controls relate to the computer environment: output is not lost, misdirected or corrupted and
from a code, or (3) a digit is recorded
that privacy is not violated. This can cause
• General control pertains to entity-wide IT incorrectly.
disruption, financial loss and litigation.
concerns.
* Transposition errors occur when digits are
* Controlling hard-copy output:
• Application controls ensure the integrity of reversed.
specific systems. **Output data can become backlogged
* Missing data check identifies blank or
(spooling) requiring an intermediate output file
Physical controls relate to human activities: incomplete input fields.
in the printing process.
• Transaction authorization is to ensure all * Numeric-alphabetic check identifies data in
**Proper access and backup procedures must be
material transactions processed are valid. the wrong form.
in place to protect these files.
• Segregation of duties controls are designed to * Limit checks identify fields that exceed
* Print programs controls should be designed to
minimize incompatible functions including authorized limits.
prevent unauthorized copies and employee
separating: (1) transaction authorization and
* Range checks verify that all amounts fall browsing of sensitive data.
processing and (2) asset custody and record-
within an acceptable range.
keeping. Successful fraud must require * Sensitive computer waste should be shredded
collusion. * Reasonableness checks verify that amounts for protection.
that have based limit and range checks are
• Supervision is a compensating control in * Report distribution must be controlled.
reasonable.
organizations too small for sufficient
* End-user should examine reports for
segregation of duties. * Validity checks compare actual fields against
correctness, report errors and maintain report
acceptable values.
Discussion on IT Application Controls: security
• Processing controls are programmed
IT application controls are associated with
procedures to ensure an application’s logic is
applications.
functioning properly.
• Input control (edits) perform tests on
transactions to ensure they are free from errors.
Discussions on Physical Controls GFS (grandfather-father-son) backup is used
with systems that use sequential master files.
Physical controls relate to human activities:
The destructive update approach leaves no
• Accounting records consist of source
backup copy and requires a special recovery
documents, journals and ledgers which capture
program if data is destroyed or corrupted.
economic essence and provide an audit trail.
Real-time systems schedule backups at
• Access controls ensure that only authorized
specified daily intervals
personnel have access to firm assets.
• Independent verification procedures are
checks to identify errors and misrepresentations.
Management can assess (1) individual
performance, (2) system integrity and (3) data
correctness. Includes:
* Reconciling batch totals during transaction
processing.
* Comparing physical assets with accounting
records.
* Reconciling subsidiary accounts with control
accounts.
* Reviewing
Audit trail controls ensure every transaction
can be traced through each stage to processing
from source to financial statements.
Every transaction the system processes,
including automatic ones, should be recorded
on a transaction log.
Master file backup controls may be viewed as
either a general control or an application
control.
Introduction to Transaction Expenditure Cycle Examples of fixed assets include land,
buildings, furniture, machinery, and motor
Processing Business activities begin with the acquisition of
vehicles.
materials, property, and labor in exchange for
What is Transaction Processing? cash Conversion Cycle
An economic event that affects the assets and Purchase/ Accounts Payable System This includes determining raw material
equities of the firm, is reflected in its accounts, requirements, authorizing the work to be
and is measured in monetary terms. This system recognizes the need to acquire
performed and the release of raw materials into
physical inventory (such as raw materials) and
Is an activity consisting of three major production, and directing the movement of the
places an order with the vendor. When the
subsystems called cycles: the revenue cycle, the work-in-process through its various stages of
goods are received, the purchases system
expenditure cycle, and the conversion cycle. manufacturing
records the event by increasing inventory and
Example includes… establishing an account payable to be paid at a Production System
later date.
• Sales of goods or services Involves the planning, scheduling, and
Cash Disbursement System control of the physical product through the
• Purchases of inventory manufacturing process
When the obligation created in the purchases
• Discharge of Financial Obligations system is due, the cash disbursements system Cost Accounting System
• Receipts of cash authorizes the payment, disburses the funds to
Monitors the flow of cost information related to
the vendor, and records the transaction by
• Depreciation of PPE, Application of Labor, production.
reducing the cash and accounts payable
Raw Material, overhead to the Production accounts. Revenue Cycle
Process and Transfer of inventory from one
department to another Payroll System Firms sell their finished goods to customers.

Transaction Cycles Collects labor usage data for each employee, Sales Order Processing
computes the payroll, and disburses paychecks
1. incurs expenditures in exchange for resources to the employees. The majority of business sales are made on
(expenditure cycle), credit and involve tasks such as preparing sales
Fixed Asset orders, granting credit, shipping products (or
2. provides value added through its products or rendering of a service) to the customer, billing
services (conversion cycle), and These are relatively permanent items that
customers, and recording the transaction in the
collectively often represent the organization’s
3. receives revenue from outside sources accounts (accounts receivable, inventory,
largest financial investment.
(revenue cycle) expenses, and sales).
Accounting Records
Manual System chronological order. Documents are the primary Summarizes the activity for each of the
source of data for journals. organization’s accounts. The general ledger
This section describes the purpose of each type
department updates these records journal
of accounting record used in transaction cycles. Special Journals
vouchers prepared from special and other
We begin with traditional records used in
Are used to record specific classes of sources located throughout the organization
manual systems (documents, journals, and
transactions that occur in high volume. Such
ledgers) and then examine their magnetic Subsidiary Ledgers
transactions can be grouped together in a special
counterparts in computer-based systems
journal and processed more efficiently than a Kept in various accounting departments of the
Documents general journal permits. firm, including inventory, accounts payable,
payroll, and accounts receivable. This
A document provides evidence of an economic Register
separation provides better control and support
event and may be used to initiate transaction
Used to denote certain types of special journals. of operations.
processing. Some documents are a result of
For example, the payroll journal is often called
transaction processing. In this section, we discu Audit Trail
the payroll register
ss three types of documents: source documents,
For tracing transactions from source documents
product documents, and turnaround documents. General Journal
to the financial statements. Of the many
Product Documents Firms use the general journal to record purposes of the audit trail, most important to
nonrecurring, infrequent, and dissimilar accountants is the year-end audit.
Are the result of transaction processing rather
transactions. For example, we usually record
than the triggering mechanism for the process. Computer Based System
periodic depreciation and closing entries in the
For example, a payroll check to an employee is
general journal. Types of Files - Audit trails in computer-based
a product document of the payroll system.
systems are less observable than in traditional
manual systems, but they still exist. Accounting
records in computer-based systems are
Turnaround Documents
represented by four different types of magnetic
Ledger files: master files, transaction files, reference
Are product documents of one system that
become source documents for another system. Book of accounts that reflects the financial files, and archive files.
effects of the firm’s transactions after they are Transaction File
Journal
posted from the various journals. A ledger
A record of a chronological entry. At some indicates the increases, decreases, and current Is a temporary file of transaction records used to
point in the transaction process, when all balance of each account. change or update data in a master file. Sales
relevant facts about the transaction are known, orders, inventory receipts, and cash receipts are
General Ledger examples of transaction files.
the event is recorded in a journal in
Reference File
Stores data that are used as standards for The old saying that a picture is worth a • The clerk sends Copy 1 of the sales order to
processing transactions. For example, the thousand words is very applicable when it the credit department for approval. The other
payroll program may refer to a tax table to comes to documenting systems. A written three copies and the original customer order are
calculate the proper amount of withholding description of a system can be wordy and filed temporarily, pending credit approval.
taxes for payroll transactions. difficult to follow.
•The credit department clerk validates the
Archive File Data Flow Diagram customer’s order against hard-copy credit
records kept in the credit department. The clerk
Contains records of past transactions that are Uses symbols to represent the entities,
signs Copy 1 to signify approval and returns it
retained for future reference. These transactions processes, data flows, and data stores that
to the sales clerk.
form an important part of the audit trail. pertain to a system.
Archive files include journals, prior period • When the sales clerk receives credit approval,
Entity Relationship Diagram
payroll information, lists of former employees, he or she files Copy 1 and the customer order in
records of accounts written off, and prior-period Is a documentation technique used to represent the department. The clerk sends Copy 2 to the
ledgers. the relationship between entities. Entities are warehouse and Copies 3 and 4 to the shipping
physical resources (automobiles, cash, or department
Digital Audit Trail
inventory), events (ordering inventory,
• The warehouse clerk picks the products from
1. Compare the accounts receivable balance in receiving cash, shipping goods), and agents
the shelves, records the transfer in the hardcopy
the balance sheet with the master file AR (salesperson, customer, or vendor) about which
stock records, and sends the products and Copy
control account balance. the organization wishes to capture data.
2 to the shipping department.
2. Reconcile the AR control figure with the AR System Flowchart
•The shipping department receives Copy 2 and
subsidiary account total.
Is the graphical representation of the physical the goods from the warehouse, attaches Copy 2
3. Select a sample of update entries made to relationships among key elements of a system. as a packing slip, and ships the goods to the
accounts in the AR subsidiary ledger and trace These elements may include organizational customer. Finally, the clerk files Copies 3 and 4
these transactions in the sales journal (archive departments, manual activities, computer in the shipping department.
file). programs, hard-copy accounting records
Rules to be Observed
(documents, journals, ledgers, and files), and
4. From these journal entries, identify specific
digital records (reference files, transaction files, • The flowchart should be labeled to clearly
source documents that can be pulled from their
archive files, and master files). identify the system that it represents.
files and verified. If necessary, the auditor can
confirm the accuracy and propriety of these Flowcharting Manual Activities • The correct symbols should be used to
source documents by contacting the customers represent the various entities in the system.
•A clerk in the sales department receives a hard-
in question.
copy customer order by mail and manually • All symbols on the flowchart should be
Documentation Techniques prepares four hard copies of a sales order. labeled.
•Lines should have arrowheads to clearly show Mnemonic Codes are alphabetic characters in
the process flow and sequence of events. the form of acronyms and other combinations
that convey meaning.
•If complex processes need additional
explanation for clarity, a text description should
be included on the flowchart or in an attached
document referenced by the flowchart
Batch Processing
Permits the efficient management of a large
volume of transactions. A batch is a group of
similar transactions (such as sales orders) that
are accumulated over time and then processed
together.
Difference between Batch and Real-Time
System
Batch systems assemble transactions into
groups for processing.
Real-time systems process transactions
individually at the moment the event occurs
Numeric and Alphabetic Coding Scheme
Sequential Codes represent items in some
sequential order (ascending or descending).
Numeric Block Codes represent whole classes
of items by restricting each class to a specific
range within the coding scheme.
Alphabetic Codes may be assigned
sequentially (in alphabetic order) or may be
used in block and group coding techniques.
Ethics, Fraud, and Internal Making Ethical Decisions Whistle-Blowing
Control • Proportionality. The benefit of the decisions Honesty
must outweigh the risks. Furthermore, there
Ethical issues in Business Employee and Management Conflicts of
must be no alternative decision that provides the
Interest
•Ethical standards –derived from social mores same or greater benefit with less risk.
and deep-rooted personal beliefs about issues of Security of Organization Data and Records
• Justice. The benefits of the decisions should
right and wrong that are not universally agreed be distributed fairly to those who share risks. Misleading Advertising
upon. Those who do not benefit should not carry the
burden of risk. Questionable Business Practices in Foreign
Business Ethics
Countries
• Why should we be concerned about ethics in • Minimize risk. Even if judged acceptable by
the principles, the decision should be Accurate Reporting of Shareholder Interests
the business world?
implemented so as to minimize all of the risk Exercise of Corporate Power
• Ethics – the principles of conduct that and avoid any unnecessary risks.
individual use in making choices and guiding Political Action Committees
their behavior in situations that involve the Four Main Areas of Business Ethics
Workplace Safety
concept of right and wrong. Ethical Issues in Business
Product Safety
• Ethics are needed when conflicts arise—the Equity
need to choose Environmental Issues
Executive Salaries
• In business, conflicts may arise between Divestment of Interests
Comparable Worth
• Employees Corporate Political Contributions
Product Pricing
• Management Downsizing and Plant Closures
Rights
• Stakeholders Computer Ethics
Corporate Due Process
• Litigation • the analysis of the nature and social impact of
Employee Health Screening computer technology and the corresponding
•Business ethics involves finding the answers to
formulation and justification of policies for the
two questions: •How do managers decide on Employee Privacy
ethical use of such technology.
what is right in conducting their business? •
Sexual Harassment
Once managers have recognized what is right, • concerns the social impact of computer
how do they achieve it? Diversity technology (hardware, software, and
telecommunications).
Equal Employment Opportunity
What are the main computer ethics issues? financial statements that it submits to the SEC • Employee fraud –generally designed to
and to the public. directly convert cash or other assets to the
• Privacy
employee’s personal benefit.
• Legal Compliance. Codes of ethics should
• Security—accuracy and confidentiality
require employees to follow applicable • Committed by non-management personnel
• Ownership of property governmental laws, rules, and regulations.
• Usually consists of: an employee taking cash
• Equity in access • Internal Reporting of Code Violations. The or other assets for personal gain by
code of ethics must provide a mechanism to circumventing a company’s system of internal
• Environmental issues permit prompt internal reporting of ethics controls
• Artificial intelligence violations.
• Involves three steps: stealing something of
• Unemployment and displacement • Accountability. An effective ethics program value (an asset), converting the asset to a usable
must take appropriate action when code form (cash), and concealing the crime to avoid
• Misuse of computer violations occur. detection.
Sarbanes – Oxley Act and Ethical Issues Fixed Assets • Management fraud –more insidious than
• Sarbanes-Oxley Act (SOX), is the most employee fraud because it often escapes
• Fraud –denotes a false representation of a
significant securities law since the Security and detection until the organization has suffered
material fact made by one party to another party
Exchange Commission (SEC) Acts of 1933 and irreparable damage or loss.
with the intent to deceive and induce the other
1934. SOX has many provisions designed to party to justifiably rely on the fact to his or her • Perpetrated at levels of management above the
deal with specific problems relating to capital detriment. one to which internal control structure relates
markets, corporate governance, and the auditing
profession. • False representation – false statement or • Frequently involves using financial statements
disclosure to create an illusion that an entity is more
Section 406 – Code of Ethics for Senior healthy and prosperous than it actually is
Financial Officers • Material fact – a fact must be substantial in
including someone to act • Involves misappropriation of assets, it
• Conflict of Interest. The company’s code of frequently is shrouded in a maze of complex
ethics should outline procedures for dealing • Intent to deceive must exist
business transactions
with actual or apparent conflicts of interest • The misrepresentation must have resulted
between personal and professional relationship. The Fraud Triangle
in justifiable reliance upon information, which
• Full and Fair Disclosures. This provisions caused someone to act • Consists of three factors that contribute to are
states that the organization should provide full, associated with management and employee
• The misrepresentation must have
fair, accurate, timely, and understandable fraud:
caused injury or loss
disclosure in the documents, reports, and
Auditor encounter fraud at two levels:
• Situational pressure – includes personal or • WorldCom transferred transmission line costs • May also be related to management bonus
job-related stresses that could coerce an from current expense accounts to capital packages being tied to financial statements
individual to act dishonestly. accounts
B. Corruption
• Opportunity – involves direct access to assets Sarbanes – Oxley Act of 2002
• Examples:
and/or access to information that controls assets.
• Its principal reforms pertain to:
• Bribery
• Ethics – pertains to one’s character and degree
• Creation of the Public Company Accounting
of moral opposition to acts of dishonesty • Illegal gratuities
Oversight Board (PCAOB)
Enron, Worldcom, Adelphia Underlying • Conflicts of interest
• Auditor independence –more separation
Problems
between a firm’s attestation and non-auditing • Economic extortion
• Lack of Auditor Independence: auditing firms activities
also engaged by their clients to perform • Foreign Corrupt Practice Act of 1997:
• Corporate governance and responsibility –
nonaccounting activities
audit committee members must be independent • Indicative of corruption in business world
• Lack of Director Independence: directors who and the audit committee must oversee the • Impacted accounting by requiring accurate
serve on the boards of other companies, have a external auditors records and internal controls
business trading relationship, have a financial
• Disclosure requirements –increase issuer and C. Asset misappropriation
relationship, have as stockholders or have
management disclosure
received personal loans, or have an operational •Most common type of fraud and often occurs
relationship as employees • New federal crimes for the destruction of or as employee fraud
tampering with documents, securities fraud, and
• Questionable Executive Compensation •Examples:
actions against whistleblowers
Schemes: short-term stock options as
compensation result in short-term strategies Fraud Schemes •Making charges to expense accounts to cover
aimed at driving up stock prices at the expense theft of asset (especially cash)
of the firm’s long-term health •Three categories of fraud schemes according to
the Association of Certified Fraud Examiners: •Lapping: using customer’s check from one
• Inappropriate Accounting Practices: a account to cover theft from a different account
characteristic common to many financial A. Fraudulent statements
•Transaction fraud: deleting, altering, or adding
statement fraud schemes. • Misstating the financial statements to make false transactions to steal assets
• Enron made elaborate use of special purpose the copy appear better than it is
• Skimming. Involves stealing cash from an
entities • Usually occurs as management fraud organization before it is recorded on the
• May be tied to focus on short-term financial organization’s books and records.
measures for success
• Cash Larceny. Involves schemes in which • Theft, corruption, illegal copying or Internal Control Objectives According to
cash receipts are stolen from an organization intentional destruction of software AICPA SAS
after they have been recorded in the
• Theft, misuse, or misappropriation of 1. Safeguard assets of the firm
organization’s book and records.
computer hardware
2. Ensure accuracy and reliability of accounting
• Billing Schemes. Also known as vendor fraud,
Data Collection Fraud records and information
are perpetrated by employees who causes their
employer to issue a payment to a false supplier •This aspect of the system is the most 3. Promote efficiency of the firm’s operations
or vendor by submitting invoices for fictitious vulnerable because it is relatively easy to
good or services, inflated invoices, or invoice 4. Measure compliance with management’s
change data as it is being entered into the
for personal purchases. prescribes policies and procedures
system.
• Check tampering. involves forging or Information Generation Fraud
•Also, the GIGO (garbage in, garbage out)
changing in some material way a check that the principle reminds us that if the input data is Stealing, misdirecting, or misusing computer
organization has written to a legitimate payee. inaccurate, processing will result in inaccurate output
output.
• Pay roll fraud. is the distribution of fraudulent •Scavenging
paychecks to existent and/ or nonexistent Data Processing Fraud
employees. • Searching through the trash cans on the
•Program Frauds computer canter for discarded output (the output
• Expense reimbursement frauds. are schemes in should be shredded, but frequently in not)
which an employee makes a claim for •Altering programs to allow illegal access to
reimbursement of fictitious or inflated business and/or manipulation of data files Modifying Assumptions to the Internal
Control Objectives
expense. •Destroying programs with a virus
• Thefts of cash. Are schemes that involve the • Management Responsibility The establishment
•Operations Frauds
direct theft of cash on hand in o14rganization. and maintenance of a system of internal control
•Misuse of company computer resources, such is the responsibility of management.
Computer Fraud Schemes as using the computer for personal business
• Reasonable Assurance the cost of achieving
• Theft, misuse, or misappropriation of assets by Data Management Fraud the objectives of internal control should not
altering computerreadable records and files outweigh its benefits.
•Altering, deleting, corrupting, destroying, or
• Theft, misuse, or misappropriation of assets by stealing an organization’s data • Methods of Data Processing The techniques of
altering logic of computer software achieving the objectives will vary with different
•Oftentimes conducted by disgruntled or ex-
• Theft of illegal use of computer-readable types of technology
employee
information Limitations of Internal Controls
•Possibility of honest errors • Corrective Controls. Are action taken reverse • Policies and practices managing human
the effects of errors detected in the previous resources
•Circumvention via collusion
step. There is an important distinction between
2. Risk assessment
•Management override detective and corrective controls.
• Identify, analyze and manage risks relevant to
•Changing conditions—especially in companies SAS 78/ COSO
financial reporting:
with high growth
Describes the relationship between the firm’s
• changes in external environment
Exposure of Weak Internal Control (Risk)
• internal control structure,
• risky foreign markets
•Destruction of an asset
• auditor’s assessment of risk, and
• significant and rapid growth that strain
•Theft of an asset
• the planning of audit procedures internal controls • new product lines
•Corruption of information
How do these three interrelate? • restructuring, downsizing
•Disruption of the information system
The weaker the internal control structure, the • changes in accounting policies
Computer-based System higher the assessed level of risk; the higher the
3. Information and communication
risk, the more auditor procedures applied in the
Types of Files - Audit trails in computer-based audit. •The AIS should produce high quality
systems are less observable than in traditional
information which:
manual systems, but they still exist. Accounting
records in computer-based systems are •identifies and records all valid transactions
Five Internal Control Components: SAS
represented by four different types of magnetic
78/COSO • provides timely information on appropriate
files: master files, transaction files, reference fil
detail to permit proper classification and
es, and archive files. 1. Control environment
financial reporting
The Preventive-Detective-Corrective Internal • Integrity and ethics of management
• accurately measures the financial value of
Control
• Organizational structure transactions
• Preventive Controls. Prevention is the first line
• Role of the board of directors and the audit • accurately records transactions in the time
of defense in the control structure. Are passive
committee period in which they occurred
techniques designed to reduce the frequency or
occurrence of undesirable events. • Management’s policies and philosophy • Auditors must obtain sufficient knowledge of
the IS to understand:
• Detective Controls. These are devices, • Delegation of responsibility and authority
techniques, and procedures designed to identify • the classes of transactions that are material
and expose undesirable events that elude • Performance evaluation measures
• how these transactions are initiated [input]
preventive controls. • External influences—regulatory agencies
• the associated accounting records and • Fall into two distinct categories: Physical Control
accounts used in processing [input]
•IT controls – relate specifically to the computer •Transaction Authorization
• the transaction processing steps involved from environment
• used to ensure that employees are carrying out
the initiation of a transaction to its inclusion in
•Physical controls – primarily pertain to human only authorized transactions
the financial statements [process]
activities
• general (everyday procedures) or specific
• the financial reporting process used to compile
Two Types of IT Controls (non-routine transactions authorizations
financial statements, disclosures, and
estimated [output] • General controls –pertain to the entity wide • Segregation of Duties
computer environment
[red shows relationship to the general AIS •In manual systems, separation between:
model] • Examples: controls over the data center,
• authorizing and processing a transaction
organization databases, systems development,
4. Monitoring
and program maintenance • custody and recordkeeping of the asset
• The process for assessing the quality of
• Application controls –ensure the integrity of • subtasks
internal control design and operation
specific systems
[this is the feedback in the general AIS model] •In computerized systems, separation between:
• Examples: controls over sales order
• Separate procedures – test of controls by processing, accounts payable, and payroll • program coding
internal auditors applications • program processing
• Ongoing monitoring: Six Types of Physical Control • program maintenance
• computer modules integrated into routine •Transaction Authorization •Supervision
operations
•Segregation of Duties •a compensation for lack of segregation; some
• Management reports which highlight trends may be built into computer systems
•Supervision
and exceptions from normal performance
•Accounting Records •Accounting Records
[red shows relationship to the general AIS
model] •Access Control •provide an audit trail

5. Control activities •Independent Verification • Access Controls

• Policies and procedures to ensure that the •Help to safeguard assets by restricting physical
appropriate actions are taken in response to access to them
identified risks
• Independent Verification •Independent Verification
•Reviewing batch totals or reconciling •When tasks are performed by the computer
subsidiary accounts with control accounts rather than manually, the need for an
independent check is not necessary
Physical Control in IT Contexts
•However, the programs themselves are
•Transaction Authorization
checked.
•The rules are often embedded within computer
programs
•EDI/JIT: automated re-ordering of inventory
without human intervention
•Segregation of Duties
•A computer may perform many tasks that are
deemed incompatible.
•Thus the crucial need to separate program
development, program operations, and program
maintenance.
•Accounting Records
•Ledger accounts and sometimes source
documents are kept magnetically
•No audit trail is readily apparent
•Supervision
•The ability to asses competent employees
becomes more challenging due to the greater
technical knowledge required.
•Access Control
•Data consolidation exposes the organization to
computer fraud and excessive losses from
disaster.
The Revenue Cycle • Sales information is released to: Manual Cash Receipts Processes
Revenue Cycle Database •Billing • Customer checks and remittance advices are
received in the Mail Room.
• Master files •Warehouse (stock release or picking ticket)
• A mail room clerk prepares a cash prelist
• customer master file • Shipping (packing slip and shipping notice)
and sends the prelist and the checks to Cash
• accounts receivable master file • The merchandise is picked from the Receipts.
Warehouse and sent to Shipping.
• merchandise inventory master file • The cash prelist is also sent to A/R and the
• Stock records are adjusted. Controller.
• Transaction and Open Document Files
• The merchandise, packing slip, and bill of • Cash Receipts:
• sales order transaction file
lading are prepared by Shipping and sent to the
• verifies the accuracy and completeness of
• open sales order transaction file customer.
the checks
• sales invoice transaction file • Shipping reconciles the merchandise
• updates the cash receipts journal
received from the Warehouse with the sales
• cash receipts transaction file information on the packing slip. • prepares a deposit slip
• Other Files • Shipping information is sent to Billing. Billing • prepares a journal voucher to send to G/L
– shipping and price data reference file compiles and reconciles the relevant facts and
•A/R posts from the remittance advices to the
issues an invoice to the customer and updates
– credit reference file (may not be needed) the sales journal. Information is transferred to:
accounts receivable subsidiary ledger.

– salesperson file (may be a master file) •Periodically, a summary of the postings is


• Accounts Receivable (A/R)
sent to G/L.
– Sales history file – cash receipts history file • Inventory Control
•G/L department:
– accounts receivable reports file •A/R records the information in the customer’s
•reconciles the journal voucher from Cash
Manual Sales Order Processing account in the accounts receivable subsidiary
Receipts with the summaries from A/R
ledger.
•Begins with a customer placing an order • updates the general ledger control accounts
•Inventory Control adjusts the inventory
•The sales department captures the essential subsidiary ledger. •The Controller reconciles the bank accounts.
details on a sales order form.
•Billing, A/R, and Inventory Control submits Summary of Internal Controls
•The transaction is authorized by obtaining summary information to the General Ledger
credit approval by the credit department. dept., which then reconciles this data and posts
to the control accounts in the G/L.
•Sales Order Processing Access Controls
• credit authorization separate from SO •Access to assets and information (accounting
processing records) should be limited.
•inventory control separate from warehouse •Within the revenue cycle, the assets to protect
are cash and inventories and access to records
• accounts receivable sub-ledger separate from
such as the accounts receivable subsidiary
general ledger control account
ledger and cash journal should be restricted.
•Cash Receipts Processing
Independent Verification
• cash receipts separate from accounting records
Authorization Controls • Physical procedures as well as record-keeping
• accounts receivable sub-ledger separate from should be independently reviewed at various
•Proper authorization of transactions general ledger points in the system to check for accuracy and
(documentation) should occur so that only valid completeness:
transactions get processed. Supervision
• shipping verifies the goods sent from the
•Within the revenue cycle, authorization should •Often used when unable to enact appropriate warehouse are correct in type and quantity
take place when: segregation of duties.
• warehouse reconciles the stock release
• a sale is made on credit (authorization) •Supervision of employees serves as a deterrent document (picking slip) and packing slip
to dishonest acts and is particularly important in
• a cash refund is requested (authorization) the mailroom. • billing reconciles the shipping notice with the
• posting a cash payment received to a sales invoice
Accounting Records
customer’s account (cash pre-list) • general ledger reconciles journal vouchers
•With a properly maintained audit trail, it is from billing, inventory control, cash receipts,
Segregation of Functions Three Rules possible to track transactions through the and accounts receivable
1. Transaction authorization should be separate systems and to find where and when errors were
from transaction processing. made: Automating the Revenue Cycle

2. Asset custody should be separate from asset • pre-numbered source documents •Authorizations and data access can be
record-keeping. performed through computer screens.
•special journals
3. The organization should be so structured that •There is a decrease in the amount of paper.
•subsidiary ledgers
the perpetration of a fraud requires collusion •The manual journals and ledgers are changed
between two or more individuals. •general ledger to disk or tape transaction and master files.
Segregation of Functions •files
•Input is still typically from a hard copy •Manual procedures and physical documents are •Machines are open the envelopes, scan
document and goes through one or more replaced by interactive computer terminals. remittance advices and checks, and separate the
computerized processes. checks.
•Real time input and output occurs, with some
•Processes store data in electronic files (the tape master files still being updated using batches. •Artificial intelligence may be used to read
or disk) or prepare data in the form of a handwriting, such as remittance amounts and
•Real-time - entry of customer order, printout
hardcopy report. signatures.
of stock release, packing slip and bill of lading;
•Revenue cycle programs can include: update of credit file, inventory file, and open Point-of-Sales Systems
sales orders file
•formatted screens for collecting data •Point of sale systems are used extensively in
•Batch – printout of invoice, update of closed retail establishments.
• edit checks on the data entered
sales order (journal), accounts receivable and
•Customers pick the inventory from the
•instructions for processing and storing the general ledger control account
shelves and take them to a cashier.
data
Advantages of Real-Time Processing
•The clerk scans the universal product code
•security procedures (passwords or user IDs)
•Shortens the cash cycle of the firm by reducing (UPC). The POS system is connected to an
•steps for generating and displaying output the time between the order date and billing date inventory file, where the price and description
are retrieved.
•To understand files, you must consider the •Better inventory management which can lead
record design and layout. to a competitive advantage •The inventory levels are updated and reorder
needs can immediately be detected.
•The documents and the files used as input •Fewer clerical errors, reducing incorrect items
sources must contain the data necessary to being shipped and bill discrepancies •The system computes the amount due.
generate the output reports. Payment is either cash, check, ATM or credit
•Reduces the amount of expensive paper
card in most cases.
Computer-based accounting system documents and their storage costs
•No accounts receivables
•CBAS technology can be viewed as a Reengineered Cash Receipt
continuum with two extremes: •If checks, ATM or credit cards are used, an on-
•The mail room is a frequent target for
line link to receive approval is necessary.
•automation - use technology to improve reengineering.
efficiency and effectiveness •At the end of the day or a cashier’s shift, the
•Companies send their customers preprinted
money and receipts in the drawer are reconciled
•reengineering – use technology to restructure envelopes and remittance advices.
to the internal cash register tape or a printout
business processes and firm organization from the computer’s database.
•Upon receipt, these envelopes are scanned to
Reengineering Sales Order Processing Using provides a control procedure against theft.
•Cash over and under must be recorded
Real-Time Technology
Reengineering Using EDI •Segregation of Functions - consolidation of
tasks by the computer is common
• EDI helps to expedite transactions.
•Protect the computer programs
• The customer’s computer:
•Coding, processing, and maintenance should
• determines that inventory is needed
be separated.
• selects a supplier with whom the business
• Supervision - in POS systems, the cash
has a formal business agreement
register’s internal tape or database is an added
• dials the supplier’s computer and places the form of supervision
PC-Based Accounting System
order
•Access Control - magnetic records are
• Used by small firms and some large
• The exchange is completely automated. vulnerable to both authorized and unauthorized
exposure and should be protected decentralized firms
• No human intervention or management
•Must have limited file accessibility • Allow one or few individuals to perform entire
Reengineering Using the Internet accounting function
•Must safeguard and monitor computer
•Typically, no formal business agreements exist programs • Most systems are divided into modules
as they do in EDI. controlled by a menu-driven program:
• Accounting Records - rest on reliability and
•Most orders are made with credit cards. security of stored digitalized data • general ledger
•Mainly done with e-mail systems, and thus a • Accountants should be skeptical about the • inventory control
turnaround time is necessary accuracy of hard-copy printouts. • payroll
•Intelligent agents are needed to eliminate this • Backups - the system needs to ensure that • cash disbursements
time lag. backups of all files are continuously kept
• purchases and accounts payable
• Security and control over data is a concern • Independent Verification – consolidating
with Internet transactions. accounting tasks under one computer program • cash receipts
CBAS Control Considerations can remove traditional independent verification • sales order
controls. To counter this problem:
•Authorization - in real-time systems,
authorizations are automated • perform batch control balancing after each run

•Programmed decision rules must be closely • produce management reports and summaries
monitored. for end users to review
PC Control Issues
• Segregation of Duties - tend to be inadequate
and should be compensated for with increased
supervision, detailed management reports, and
frequent independent verification
• Access Control - access controls to the data
stored on the computer tends to be weak;
methods such as encryption and disk locking
devices should be used
• Accounting Records - computer disk failures
cause data losses; external backup methods
need to be implemented to allow data recovery

You might also like