©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-1 Accounting Information Systems 9 th Edition Marshall.

Slides:



Advertisements
Similar presentations
Bodnar/Hopwood AIS 7th Ed1 Chapter 5 u TRANSACTION PROCESSING AND INTERNAL CONTROL PROCESS.
Advertisements

Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
Chapter 10 Accounting Information Systems and Internal Controls
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Control and Accounting Information Systems
Control and Accounting Information Systems
Accounting Information Systems 9th Edition
Auditing Concepts.
©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 10-1 Accounting Information Systems 9 th Edition Marshall.
Auditing Computer-Based Information Systems
Internal Control.
Auditing Computer Systems
Auditing Computer-Based Information Systems
1 INTERNAL CONTROLS A PRACTICAL GUIDE TO HELP ENSURE FINANCIAL INTEGRITY.
The Islamic University of Gaza
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Internal Control Structure. Learning Objectives l To understand the components of an organization’s internal control structure l To know the objectives.
Standar Pekerjaan Lapangan: Pemahaman Memadai atas Pengendalian Intern Pertemuan 5.
Internal Control Concepts A Guide for Deans, Directors, and Department Chairs.
©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 18-1 Accounting Information Systems 9 th Edition Marshall.
Internal Control. COSO’s Framework Committee of Sponsoring Organizations 1992 issued a white paper on internal control Since this time, this framework.
Internal Control. COSO’s Framework Committee of Sponsoring Organizations 1992 issued a white paper on internal control Since this time, this framework.
Sarbanes-Oxley Project Summary of COSO Framework Presented by Larry Dillehay & Scott Reitan Parkfield Group LLC.
INTERNAL CONTROL OVER FINANCIAL REPORTING
Chapter 4 Internal Controls McGraw-Hill/Irwin
Control and Accounting Information Systems
An Educational Computer Based Training Program CBTCBT.
Chapter 8 Introduction to Internal Control Systems
Chapter 9: Introduction to Internal Control Systems
ACCOUNTING INFORMATION SYSTEMS
Transaction Processing and the Internal Control Process Small Business Information Systems Professor Barry Floyd.
Chapter 07 Internal Control McGraw-Hill/IrwinCopyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.
Introduction to Internal Control Systems
INTERNAL CONTROL OVER FINANCIAL REPORTING
Chapter Three IT Risks and Controls.
INTRODUCTION Why AIS threats are increasing
Information Systems Controls Lecture 5 (Chapter 6, 7 & 8)
Chapter 5 Internal Control over Financial Reporting
Considering Internal Control
 2004 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, by Bodnar/Hopwood 4 – 1 Transaction Processing and the Internal Control.
9 - 1 ©2003 Prentice Hall Business Publishing, Essentials of Auditing 1/e, Arens/Elder/Beasley Internal Control and Control Risk Chapter 9.
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Internal Control and Control Risk Chapter 10.
Accounting Information Systems 9 th Edition Marshall B. Romney Paul John Steinbart.
Chapter 7 Internal Control and Cash
Learning Objectives LO5 Illustrate how business risk analysis is used to assess the risk of material misstatement at the financial statement level and.
Chapter 7 Control and AIS. Threats to AIS Natural disasters –DSM flood (p. 249) Political disasters –Terrorism Cyber crime (as opposed to general terrorism)
Evaluation of Internal Control System
Understanding the IT environment of the entity. Session objectives Defining contours of financial accounting in an IT environment and its characteristics.
©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-1 Accounting Information Systems 9 th Edition Marshall.
S4: Understanding the IT environment of the entity.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.1 Internal.
CHAPTER 5 INTERNAL CONTROL OVER FINANCIAL REPORTING.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
Chapter 9: Introduction to Internal Control Systems
Auditing Internal Control Studies & Risk Assessment Chapter 9 Internal Control Studies & Risk Assessment Chapter 9.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
©2012 Prentice Hall Business Publishing, Auditing 14/e, Arens/Elder/Beasley Section 404 Audits of Internal Control and Control Risk Chapter.
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart1 of 315 C HAPTER 6 Control and Accounting Information Systems.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. Chapter
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
©2005 Prentice Hall Business Publishing, Auditing and Assurance Services 10/e, Arens/Elder/Beasley Internal Control and Control Risk Chapter 10.
Internal Control Chapter 7. McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, Inc., All Rights Reserved. 7-2 Summary of Internal Control Definition.
Risk Management Dr. Clive Vlieland-Boddy. Managements Responsibilities Strategy – Hopefully sustainable! Control – Hopefully maximising profits! Risk.
Modern Auditing: Assurance Services and the Integrity of Financial Reporting, 8th Edition William C. Boynton California Polytechnic State University at.
Auditing Concepts.
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Presentation transcript:

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-1 Accounting Information Systems 9 th Edition Marshall B. Romney Paul John Steinbart

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-2 Computer-Based Information Systems Controls Chapter 7

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-3 Learning Objectives 1. Describe the threats to an AIS and discuss why these threats are growing. 2. Explain the basic concepts of control as applied to business organizations. 3. Describe the major elements in the control environment of a business organization.

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-4 Learning Objectives, continued 4. Describe control policies and procedures commonly used in business organizations. 5. Evaluate a system of internal accounting control, identify its deficiencies, and prescribe modifications to remedy those deficiencies. 6. Conduct a cost-benefit analysis for particular threats, exposures, risks, and controls.

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-5 Introduction Jason Scott has been hired as an internal auditor for Northwest Industries, a diversified forest products company. He is assigned to audit Springer’s Lumber & Supply, Northwest’s building materials outlet in Montana.

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-6 Introduction His supervisor, Maria Pilier, has asked him to trace a sample of purchase transactions to verify that proper control procedures were followed. Jason becomes frustrated with this task. Why is Jason frustrated? The purchasing system is poorly documented. He keeps finding transactions that have not been processed as Ed Yates, the accounts payable manager, said they should be.

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-7 Introduction Jason’s frustrations, continued Some vendor invoices have been paid without supporting documents. Purchase requisitions are missing for several items that had been authorized by Bill Springer, purchasing v.p. Prices charged for some items seem unusually high. Springer’s is the largest supplier in the area and has a near monopoly. Management authority is concentrated in the company president, Joe Springer, and his sons Bill, the purchasing v.p., and Ted, the controller. Maria feels that Ted may have engaged in “creative accounting.”

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-8 Introduction Jason ponders the following issues: Should he describe the unusual transactions in his report? Is a violation of proper control procedures acceptable if it has been authorized by management? Regarding Jason’s assignment, does he have a professional or ethical responsibility to get involved?

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-9 Introduction This chapter discusses the types of threats a company faces. It also presents the five interrelated components of the Committee of Sponsoring Organizations (COSO’s) internal control model.

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-10 Learning Objective 1 Describe the threats to an AIS and discuss why these threats are growing.

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-11 Threats to Accounting Information Systems What are examples of natural and political disasters? – fire or excessive heat – floods – earthquakes – high winds – war

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-12 Threats to Accounting Information Systems What are examples of software errors and equipment malfunctions? – hardware failures – power outages and fluctuations – undetected data transmission errors

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-13 Threats to Accounting Information Systems What are examples of unintentional acts? – accidents caused by human carelessness – innocent errors of omissions – lost or misplaced data – logic errors – systems that do not meet company needs

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-14 Threats to Accounting Information Systems What are examples of intentional acts? – sabotage – computer fraud – embezzlement

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-15 Why are AIS Threats Increasing? Increasing numbers of client/server systems mean that information is available to an unprecedented number of workers. Because LANs and client/server systems distribute data to many users, they are harder to control than centralized mainframe systems. WANs are giving customers and suppliers access to each other’s systems and data, making confidentiality a concern.

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-16 Learning Objective 2 Explain the basic concepts of control as applied to business organizations.

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-17 Overview of Control Concepts What is the traditional definition of internal control? Internal control is the plan of organization and the methods a business uses to safeguard assets, provide accurate and reliable information, promote and improve operational efficiency, and encourage adherence to prescribed managerial policies.

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-18 Overview of Control Concepts What is management control? Management control encompasses the following three features: 1 It is an integral part of management responsibilities. 2 It is designed to reduce errors, irregularities, and achieve organizational goals. 3 It is personnel-oriented and seeks to help employees attain company goals.

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-19 Internal Control Classifications The specific control procedures used in the internal control and management control systems may be classified using the following four internal control classifications: 1 Preventive, detective, and corrective controls 2 General and application controls 3 Administrative and accounting controls 4 Input, processing, and output controls

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-20 The Foreign Corrupt Practices Act In 1977, Congress incorporated language from an AICPA pronouncement into the Foreign Corrupt Practices Act. The primary purpose of the act was to prevent the bribery of foreign officials in order to obtain business. A significant effect of the act was to require corporations to maintain good systems of internal accounting control.

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-21 Committee of Sponsoring Organizations The Committee of Sponsoring Organizations (COSO) is a private sector group consisting of five organizations: 1 American Accounting Association 2 American Institute of Certified Public Accountants 3 Institute of Internal Auditors 4 Institute of Management Accountants 5 Financial Executives Institute

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-22 Committee of Sponsoring Organizations In 1992, COSO issued the results of a study to develop a definition of internal controls and to provide guidance for evaluating internal control systems. The report has been widely accepted as the authority on internal controls.

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-23 Committee of Sponsoring Organizations The COSO study defines internal control as the process implemented by the board of directors, management, and those under their direction to provide reasonable assurance that control objectives are achieved with regard to: – effectiveness and efficiency of operations – reliability of financial reporting – compliance with applicable laws and regulations

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-24 Committee of Sponsoring Organizations COSO’s internal control model has five crucial components: 1 Control environment 2 Control activities 3 Risk assessment 4 Information and communication 5 Monitoring

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-25 Information Systems Audit and Control Foundation The Information Systems Audit and Control Foundation (ISACF) recently developed the Control Objectives for Information and related Technology (COBIT). COBIT consolidates standards from 36 different sources into a single framework. The framework addresses the issue of control from three vantage points, or dimensions:

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-26 Information Systems Audit and Control Foundation 1 Information: needs to conform to certain criteria that COBIT refers to as business requirements for information 2 IT resources: people, application systems, technology, facilities, and data 3 IT processes: planning and organization, acquisition and implementation, delivery and support, and monitoring

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-27 Learning Objective 3 Describe the major elements in the control environment of a business organization.

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-28 The Control Environment The first component of COSO’s internal control model is the control environment. The control environment consists of many factors, including the following: 1 Commitment to integrity and ethical values 2 Management’s philosophy and operating style 3 Organizational structure

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-29 The Control Environment 4 The audit committee of the board of directors 5 Methods of assigning authority and responsibility 6 Human resources policies and practices 7 External influences

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-30 Learning Objective 4 Describe control policies and procedures commonly used in business organizations.

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-31 Control Activities The second component of COSO’s internal control model is control activities. Generally, control procedures fall into one of five categories: 1 Proper authorization of transactions and activities 2 Segregation of duties

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-32 Control Activities 3 Design and use of adequate documents and records 4 Adequate safeguards of assets and records 5 Independent checks on performance

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-33 Proper Authorization of Transactions and Activities Authorization is the empowerment management gives employees to perform activities and make decisions. Digital signature or fingerprint is a means of signing a document with a piece of data that cannot be forged. Specific authorization is the granting of authorization by management for certain activities or transactions.

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-34 Segregation of Duties Good internal control demands that no single employee be given too much responsibility. An employee should not be in a position to perpetrate and conceal fraud or unintentional errors.

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-35 Segregation of Duties Recording Functions Preparing source documents Maintaining journals Preparing reconciliations Preparing performance reports Custodial Functions Handling cash Handling assets Writing checks Receiving checks in mail Authorization Functions Authorization of transactions

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-36 Segregation of Duties If two of these three functions are the responsibility of a single person, problems can arise. Segregation of duties prevents employees from falsifying records in order to conceal theft of assets entrusted to them. Prevent authorization of a fictitious or inaccurate transaction as a means of concealing asset thefts.

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-37 Segregation of Duties Segregation of duties prevents an employee from falsifying records to cover up an inaccurate or false transaction that was inappropriately authorized.

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-38 Design and Use of Adequate Documents and Records The proper design and use of documents and records helps ensure the accurate and complete recording of all relevant transaction data. Documents that initiate a transaction should contain a space for authorization.

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-39 Design and Use of Adequate Documents and Records The following procedures safeguard assets from theft, unauthorized use, and vandalism: – effectively supervising and segregating duties – maintaining accurate records of assets, including information – restricting physical access to cash and paper assets – having restricted storage areas

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-40 Adequate Safeguards of Assets and Records What can be used to safeguard assets? – cash registers – safes, lockboxes – safety deposit boxes – restricted and fireproof storage areas – controlling the environment – restricted access to computer rooms, computer files, and information

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-41 Independent Checks on Performance Independent checks ensure that transactions are processed accurately are another important control element.

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-42 Independent Checks on Performance What are various types of independent checks? – reconciliation of two independently maintained sets of records – comparison of actual quantities with recorded amounts – double-entry accounting – batch totals

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-43 Independent Checks on Performance Five batch totals are used in computer systems: 1 A financial total is the sum of a dollar field. 2 A hash total is the sum of a field that would usually not be added.

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-44 Independent Checks on Performance 3 A record count is the number of documents processed. 4 A line count is the number of lines of data entered. 5 A cross-footing balance test compares the grand total of all the rows with the grand total of all the columns to check that they are equal.

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-45 Learning Objective 5 Evaluate a system of internal accounting control, identify its deficiencies, and prescribe modifications to remedy those deficiencies.

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-46 Risk Assessment The third component of COSO’s internal control model is risk assessment. Companies must identify the threats they face: – strategic — doing the wrong thing – financial — having financial resources lost, wasted, or stolen – information — faulty or irrelevant information, or unreliable systems

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-47 Risk Assessment Companies that implement electronic data interchange (EDI) must identify the threats the system will face, such as: 1 Choosing an inappropriate technology 2 Unauthorized system access 3 Tapping into data transmissions 4 Loss of data integrity

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-48 Risk Assessment 5 Incomplete transactions 6 System failures 7 Incompatible systems

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-49 Risk Assessment Some threats pose a greater risk because the probability of their occurrence is more likely. For example: A company is more likely to be the victim of a computer fraud rather than a terrorist attack. Risk and exposure must be considered together.

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-50 Learning Objective 6 Conduct a cost-benefit analysis for particular threats, exposures, risks, and controls.

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-51 Estimate Cost and Benefits No internal control system can provide foolproof protection against all internal control threats. The cost of a foolproof system would be prohibitively high. One way to calculate benefits involves calculating expected loss.

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-52 Expected loss = risk × exposure Estimate Cost and Benefits The benefit of a control procedure is the difference between the expected loss with the control procedure(s) and the expected loss without it.

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-53 Information and Communication The fourth component of COSO’s internal control model is information and communication.

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-54 Information and Communication Accountants must understand the following: 1 How transactions are initiated 2 How data are captured in machine-readable form or converted from source documents 3 How computer files are accessed and updated 4 How data are processed to prepare information 5 How information is reported 6 How transactions are initiated

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-55 Information and Communication All of these items make it possible for the system to have an audit trail. An audit trail exists when individual company transactions can be traced through the system.

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-56 Monitoring Performance The fifth component of COSO’s internal control model is monitoring. What are the key methods of monitoring performance? – effective supervision – responsibility accounting – internal auditing

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-57 Case Conclusion What happened to Jason’s report? A high-level internal audit team was dispatched to Montana. The team discovered that the problems identified by Jason occurred almost exclusively in transactions with three large vendors from whom Springer’s had purchased several million dollars of inventory.

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-58 Case Conclusion One of the Springers held a significant ownership interest in each of these three companies. They also found evidence that several of Springer’s employees were paid for more hours than documented by timekeeping, and that inventories were overstated. Northwest settled the case with the Springers.

©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 7-59 End of Chapter 7