Objectives of Control The objectives of control are:  To ensure that all data are processed  To preserve the integrity of maintained data  To detect,

Slides:



Advertisements
Similar presentations
Chapter 6 Computer Assisted Audit Tools and Techniques
Advertisements

©G. Millbery 2003Data, Information, Knowledge and Processing Slide 1 Validation  Making sure that the data value entered is sensible and reasonable 
2.2 Validation & Verification
Commercial Data Processing Lesson 2: The Data Processing Cycle.
Commercial Data Processing Lesson 3: Data Validation.
3.1 Data and Information –The rapid development of technology exposes us to a lot of facts and figures every day. –Some of these facts are not very meaningful.
Chapter 14 System Controls. A Quote “The factory of the future will have only two employees, a man and a dog. The man will be there to feed the dog. The.
Chapter 8 USING ACCOUNTING APPLICATIONS. Organization of Accounting Applications.
Processing Integrity and Availability Controls
PowerPoint Presentation by Charlie Cook Copyright © 2004 South-Western. All rights reserved. Chapter 9 Controlling Information Systems: Process Controls.
Validation and Verification Today will look at: The difference between accuracy and validity Explaining sources of errors and how they could be overcome.
Database Design IST 7-10 Presented by Miss Egan and Miss Richards.
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
Processing Integrity and Availability Controls
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
TRANSACTION PROCESSING SYSTEM (TPS)
TRANSACTION PROCESSING SYSTEM Liew Woei Song Muhammad Hofiz Achoson.
Validation and Verification
Today’s Lecture application controls audit methodology.
RNJ 10/02/091 3 Computing System Fundamentals 3.6 Errors Prevention and Detection.
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
Overview of Transaction Processing and Enterprise Resource Planning Systems Chapter 2.
Encoding, Validation and Verification Chapter 1. Introduction This presentation covers the following: – Data encoding – Data validation – Data verification.
What is Validation Understanding Validation (Different from Verification)
Chapter 16 Designing Effective Output. E – 2 Before H000 Produce Hardware Investment Report HI000 Produce Hardware Investment Lines H100 Read Hardware.
GCSE ICT Checking data. Why do errors happen? Computers do not make mistakes. However if incorrect data is put in errors happen. In ICT this is called.
3.2 Data Checking.
Navigation Sequences Proper navigation Poor navigation Poor Navigation.
Copyright © 2007 Pearson Education Canada 1 Chapter 13: Audit of the Sales and Collection Cycle: Tests of Controls.
CDP Standard Grade1 Commercial Data Processing Standard Grade Computing Studies.
Data entry: Validation
Checking data GCSE ICT.
Checking data Chapter 7 Prepared by:Sir Mazhar Javed.
Information Processing and Presentation by Rico Yu.
System Analysis and Design
Manipulating data Data management: validation and verification.
System Development Lifecycle Verification and Validation.
Information Processing Content covered  Data and information  Information Qualities  Data/Information Processing  Commercial Information Processing.
Principles of Database Design, Conclusions AIMS 2710 R. Nakatsu.
Chapter 9 Controlling Information Systems: Application Controls.
AS computing Validation and verification. Introduction It is important to maintain the integrity of any database of information. Any data item must always.
CIT PowerPoint presentation Group 4. Unit 1, Chapter 2 Basic Concept on Data DATA AND INFORMATION What is data? Data consists of all sorts of unorganised.
Principles of Database Design, Conclusions MBAA 609 R. Nakatsu.
Topic: Sir Naseem Ahmed Khan Dow Vocational & Technical Training Centre.
Week 1 Theory 2 B usiness I nformation S ystems Batch Processing Assignment 6 - Batch Processing 1 Batch Processing Method.
Verification & Validation. Batch processing In a batch processing system, documents such as sales orders are collected into batches of typically 50 documents.
Review of Data Capture. Input Devices What input devices are suitable for data entry? Keyboard Voice Bar Code MICR OMR Smart Cards / Magnetic Stripe cards.
1 3 Computing System Fundamentals 3.6 Errors Prevention and Recovery.
Data Collection. Data Capture This is the first stage involved in getting data into a computer Various input devices are used when getting data to the.
Data Verification and Validation
1 AQA ICT AS Level © Nelson Thornes 2008 Good quality data and information Data terms.
Chapter 3 Data Control Ensure the Accurate and Complete data is entering into the data processing system.
CH. 6 SELF CHECK QUIZ ARE YOU PREPARED FOR THE TEST?
Validation & Verification Today will look at: The difference between accuracy and validity Explaining sources of errors and how they could be overcome.
The Big Picture Things to think about What different ways are there to collect information automatically? What are the advantages and disadvantages of.
Input, Output and Processing.. What data needs to be input into the system? Identify the sources – i.e. where does the data come from? What is the volume.
 At the end of the class students should:  distinguish between data and information.  explain the characteristics and forms of Information Processing.
Data Capture Forms What are they?. Example 1 Example 2.
Validation and verification 1.2
DATA COLLECTION Data Collection Data Verification and Validation.
Journalizing Transactions
Processing Integrity and Availability Controls
Validation Bury College.
Databases.
How can errors in data occur when using an ICT system?
DATA RECORDS & FILES By Sinkala.
Verification and Validation
Presentation transcript:

Objectives of Control The objectives of control are:  To ensure that all data are processed  To preserve the integrity of maintained data  To detect, correct and re-process all errors  To prevent and detect fraud

Types of Controls The different controls can be grouped under five headings:  Manual controls  Data protection controls  Validation checks  Batch controls  Other controls

Types of Error System designers must guard against the following types of error:  Missing source documents  Source documents on which entries are omitted, illegible or dubious  Transcription errors  Data preparation errors  Program faults  Machine Hardware faults

Manual Checks Even in advanced systems checking of source documents is necessary. Checks may include:  Scrutiny to detect:  Missing entries  Illegible entries  Illogical or unlikely entries  Reference of the document to stored data to verify entries  Re-calculating to check calculations made on the document

Data Collection Controls  The collection of data for processing involves transcribing it into a form suitable for machine processing.  There is a real possibility of error at this stage.  Controls must be imposed to prevent or detect errors at this stage.  The type of control depends on the method of data collection used:

Data Collection Controls 2  On-line systems. These depend on the data displayed on a VDU or printed being checked by the operator before being processed.  Character recognition. With these techniques, accuracy depends on the character reader detecting any doubtful character or mark.

Validation Checks 1  A computer can’t notice errors in data being processed in the same way that a human operator can.  Validation checks are an attempt to build into computer programs the ability to detect and report incorrect data items  Checks can be made at two stages:  Input – when data is entered  Updating – after processing

Validation Checks 2 The main types of validation check used are:  Presence. Data are checked to ensure that all necessary fields are present e.g. A payroll program must have complete employee and national insurance fields.  Size. Fields are checked to ensure they contain the correct number of characters e.g. Student_Id should contain 6 characters i.e. G01234  Range. Numbers or codes are checked to ensure that fall within a permissible range e.g. DOB in a school database should fall between 1982 and 1989.

Validation Checks 3  Character. Fields are checked to ensure that they contain only characters of the correct type e.g. there are no letters in a number field.  Format. Also called a picture check. Fields are checked to ensure that the format is correct e.g. that a code contains the correct number of letters and numbers AND they are in the correct sequence.  Reasonableness. Quantities are checked to ensure that they are not abnormally high or low.  Check Digits. See next slide.

Check Digits  Use of a check digit allows a number to be self- checking.  It is calculated using a mathematical formula and then becomes part of the number itself.  When the number is input into the computer the validation program uses the same mathematical formula to check the number and ensure that the number is correct i.e no digits have been transposed.  The modulus 11 algorithm is used to create check digits for ISBN numbers.

Modulus 11  Assign each digit a weight. The right hand digit (the least significant) is given a weight of 2, the next digit to the left 3 and so on  Multiply each digit by its weight and add the products together  Divide the total by 11 and find the remainder Number2546 Weight5432 Products Total54

Modulus  54 divided by 11 = 4 remainder 10.  Subtract the remainder from 11 to find the check digit. 11 – 10 =1  The new number is  Now try this. The ISBN number of Pat Heathcote’s book is What is the check digit?  Why is it presented in this format?

Batch Processing 1 Batch controls are fundamental to most computer based accounting systems. The main stages of batch control are:  Batching. Documents are arranged in batches by being placed in a wallet or clipped together. A batch cover note (see next slide) is attached to the batch.  Numbering. Each batch is allocated a unique number, which is entered on the batch cover note.  Batch Registers. Each department responsible for processing the batch records its receipt and dispatch in a register. It is then possible to check that all batches have been dealt with and trace any batch that gets lost or delayed.

Batch Processing 2  Batch Totals. Control totals are obtained for each batch. The control totals comprise:  The total number of documents in the batch  Totals of the fields that are required to control e.g. total value of invoices  Hash Totals. A hash total is a sum of values calculated solely for validation purposes e.g. adding all the employee numbers together.The computer should be able to perform the same calculation and report any discrepancy.  All of the above is recorded on the batch cover note so that the results of processing can be checked against manually calculated values.

Verification  Verification is the process of entering data twice.  The second entry is compared to the first to ensure that it is accurate.  It is commonly used in batch processing where a second data entry clerk will key in each batch to verify it.  You will have come across this technique when changing a password and you are asked to re- confirm your new password.

Validity vs. Accuracy  It is possible to to ensure that data is valid.  It can never be guaranteed to give us correct information as the following examples show:  “A student’s DOB is 02/01/87”. The data falls within a valid range and is entered in the correct format. However, her actual DOB is 02/10/87!  “The market research questionnaire data we collected shows that 95% of the population eats soup twice a day”. However, this research was carried out outside a soup kitchen!  Remember valid data can lead to inaccurate information.

Further Reading  Paper  Heathcote – pages 127 – 131  De Watteville – page 164  Mott – pages 66 – 68  Web  (Bar codes and Mod10 explained)  (Modulus 11 explained)