SlideShare uma empresa Scribd logo
1 de 18
 Aims of a computerised accounting
information systems
 General and application controls
 Limitations of controls
 Threats to internal controls

Internal Controls (Part II)
Accounting System
Design and Development
 Identify 3 advantages of computerised
application controls.

 Proper authorisation such as authoring valid
transaction
 Proper record such as input and output
accuracy
 Completeness
 Timeliness

 Consistent execution, authorisation, and
application
 Enforce Completeness
 More difficult to avoid
 More timely and efficient to execute
 More timely reporting and feedback!!
 …etc

 Some risks apply across a number of areas of the
organisation. To address these risks we have GENERAL
CONTROLS.
 General controls effect the overall information system.
 General controls are established with the aim of providing
reasonable assurance that the internal control objectives are
achieved.
 These controls effect all applications
 Seen as pervasive – these controls will apply across almost all
of the information systems in an organisation.
 Support the effective operation of application controls

 General Control
◦ Policies/procedures relating to many applications
◦ Support the effective operation of application controls
 Application Control
◦ Manual or automated
◦ Operate within a business process / application
◦ Relate to the initiation, recording, reporting and processing
of events
◦ Deal with the aims of occurrence, authorisation,
completeness and accuracy

custody of ◦ Access to systems
◦ Policies and procedures ◦ Data protection
Telecommunications
 Access encryption techniques
 To data files ◦ Disaster recovery
 Hardware
 Physical controls
 Segregation of duties
 User access
 System development procedures
 User awareness of risks
 Data storage procedures

 Organisational  Systems Development
◦ Separation of duties ◦ User involvement
 Design, programming, ◦ Authorisation
operations, data entry, ◦ Documentation
documentation software restricted
 Recruitment
 Termination ◦ Transmission /
 To computer facilities  Other
 Authorised users ◦ Backup/Off site storage
◦ Monitor and detect
failures

processed, and use system output.
information needs and then design an information
analysts and creates an information system by
company’s computer. They ensure that data is
right output is produced.
corporate databases and files.
 Systems administration – ensure that the different
parts of an information system operate smoothly
and efficiently.
 Network management – ensure that all applicable
devices are linked to the organisation’s internal
and external networks and that the networks
operate continuously and properly.
 Change management – manage all changes to an
organisation’s information system to ensure they
are made smoothly and efficiently and to prevent
errors and fraud.
 Users – record transactions, authorize data to be
 Systems analysis – helps users determine their
system to meet those needs.
 Programming – take the design provided by system
writing the computer programs.
 Computer operations – run the software on the
input properly and correctly processed and the
 Database administration – maintain and manage
◦ Virtual private networks
◦ Electronic eavesdropping
◦ Message acknowledgement procedures
◦ What unique risks do microcomputers present to an
 Wireless technology
 Wired Networks
◦ Routing verification procedures
 Microcomputers
organisation?
 Location of computing facility
 Restrict employee access
 The use of Biometrics

 Change management – the person (usually a
developer) who makes the IS change should
be different from the person who makes the
change available to users – the process of
making changes available to all users is
usually called “migration into production”
 Why do we need to segregate these
functions?

 Fault tolerant / Built in redundancies
 Disk mirroring
 Backups
◦ Hierarchically performed
◦ Where to store backup data?
◦ How often to backup?
 Uninterruptible power supply

 Separation of duties
◦ Accounting from other sub-systems
◦ Responsibilities within IT
 Programming
 Data management
 Design / Analysis
 Testing
◦ Within a process
 Authorisation, Execution, Custody, Recording
 Computer accounts / Logins / Access controls

 DRP Considers:
◦ Natural disasters
◦ Deliberate malicious acts
◦ Accidental destructive acts…
 DRP Usually covers:
◦ Staff
 Employees
 Customers
 Suppliers
 Other Stakeholders…
◦ Physical resources
 Buildings
 Equipments
 Cash…
◦ Information resources
 Data
 Information…

 DRP refers to the strategy an organisation
will put into action in the event of a disaster
that disrupts normal operations. The aim is
business continuity, i.e. to resume
operations as soon as possible with minimal
loss or disruption to data and information.
 This plan describes procedures to be
followed in the case of an emergency as
well as the role of each member of the
disaster recovery team.

 Controls over specific systems/business
processes
◦ Relate to the initiation, recording, reporting and
processing of events
 Provide reasonable assurance that the events
occurring in a system/process are
authorised
and recorded, and are processed completely,
accurately and on a timely basis and that
resources in that system are protected.
 Examples of systems/processes in an
organisation:
◦ Sales system, Accounts receivable system, Purchases
system, Payments system, Payroll, Financial
Reporting, Inventory…

 Temporary Site
◦ Hot site
◦ Cold site
 Staffing
◦ Evacuating threatened staff
◦ Enabling staff to operate in DRP mode
 Staff need to know their roles
 Restore relationships
◦ As organisations become integrated the
information asset is increasing in importance

required by the needs of the business process?
 Classification based on the stage in the
process at which the control occurs
◦ Input controls
 Designed to ensure data entering the system is valid,
complete and accurate
◦ Process controls
 Detect errors and irregularities in the processing of
data
◦ Output controls
 Protect the outputs of a system

 Authorisation
◦ Is the person authorised to execute the transaction?
 Eg: Approvals for a large sale to proceed
 Recording
◦ Input Validity
 Is the data of the correct format/type?
 Does the data represent a valid event?
◦ Input Accuracy
 Is all data entered correct?
 Completeness
◦ Has all data about an event been recorded?
 Transaction level
◦ Have all events been recorded?
 Business process level
 Timeliness
◦ Is data captured, processed, stored and available as

 Edit Tests
◦ Check validity and accuracy after data has been input
 Test of content
 Numeric, Alphabetic, Alphanumeric
 Test of reasonableness
 Is the input within a specified range of values
 Eg Hours worked per week is between 0 and 60
 Test of sign (+ive, -ive)
 Test of completeness
 Test of sequence
 Has every document been input? Eg Cheques
 Requires pre-numbered source documents
 Test of consistency
 Check digit calculation
 Eg: Credit Card – calculate security number from card number
 Card Number 1234 5678 9012 3456
 Security Number: 687

 Observation, Recording and Transcription
◦ Feedback mechanism
 Eg: Customer reviews and signs sales form
◦ Dual observation
 Eg: Approval from a supervisor, more than one employee in
execution of sale
◦ Pre-designed forms
 Pre-numbered
 Layout of forms
 How does a pre-designed form help?

Invoice 001
Invoice 002
Invoice 007
Invoice 002
Invoice 003
Invoice 004
numbered documents
missing documents
SALES DEPT DATA ENTRY CLERK COMPUTER
Invoice 001
Sale occurs and
invoice prepared Invoices Missing
entered Invoice
006
Invoice 003 Invoice 005
Invoice 004 Invoice 007
Invoice 005
Checks for gaps in the
Invoice 006 sequence of pre-
The sequence check and alerts Clerk of
has identified that
Invoice 006 has not been
entered – we do not have
completeness. 
 Controls for the manipulation of data once it
has been input.
◦ Batch control totals
◦ Record counts
◦ Sequence checks
◦ Run to run totals
 Which aims do they achieve?
◦ Reliable financial reporting
 Accuracy of data processing / updates
 Completeness of data processing / updates

SALES PERSON COMPUTER
Sales
Order
Order
Details
Capture sales
Calculate
A/R check total
Credit
Update Accts Sales
Receivable
Compare
totals

 The computer takes the daily credit sales data
and updates the accounts receivable master
balances.
 The new balance for the accounts receivable
should equal the opening balance + credit
sales

30
They include:
 Financial control total
 Hash total
 Record count

 Judgement error
 Unexpected transaction
 Collusion
 Management override
 Weak internal controls
 Conflicting signals

 Validation of process results
◦ Activity listings
 Distribution and Use
◦ Who is able to access the outputs?
◦ Where are the outputs printed to?
◦ Has the relevant user got all of the output

 Blair, B and Boyce, G, 2006 (Eds), Accounting Information
Systems with Social and Organisational Perspectives, John
Wiley, Milton
 Turner, L. & Weickgenannt, A. (2009) Accounting Information
Systems: Controls and Processes, Wiley
I wish to acknowledge Dr. Chadi Aoun’s input and material that were
incorporated into the lecture slides as well as the supplementary
material and sources provided by John Wiley publishers.

 Management incompetence
 External factors such as natural disasters
 Fraud
 Regulatory environment
 Information technology such as viruses, email
attacks

For more details on Assignment Help/ Homework Help/
Online Tuitions visit our website at
http://www.helpwithassignment.com
Thank You

Mais conteúdo relacionado

Mais procurados

Auditing In Computer Environment Presentation
Auditing In Computer Environment PresentationAuditing In Computer Environment Presentation
Auditing In Computer Environment PresentationEMAC Consulting Group
 
Information System audit
Information System auditInformation System audit
Information System auditPratapchandra
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems Jeffrey Paulette
 
Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Sharah Ayumi
 
ITGC audit of ERPs
ITGC audit of ERPsITGC audit of ERPs
ITGC audit of ERPsJayesh Daga
 
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)Rikesh Chaurasia
 
Computer Audit an Introductory
Computer Audit an IntroductoryComputer Audit an Introductory
Computer Audit an IntroductoryMNorazizi HM
 
ICPAS Breakfast Talk Series - Maximising IT Audit 13 Mar 2013
ICPAS Breakfast Talk Series - Maximising IT Audit 13 Mar 2013ICPAS Breakfast Talk Series - Maximising IT Audit 13 Mar 2013
ICPAS Breakfast Talk Series - Maximising IT Audit 13 Mar 2013Barun Kumar
 
Introduction to Transaction Processing Chapter No. 2
Introduction to Transaction Processing   Chapter No. 2Introduction to Transaction Processing   Chapter No. 2
Introduction to Transaction Processing Chapter No. 2Qamar Farooq
 
Information systems and its components ii
Information systems and its components   iiInformation systems and its components   ii
Information systems and its components iiAshish Desai
 
Internal Control And Fraud 11-19-10
Internal Control And Fraud 11-19-10Internal Control And Fraud 11-19-10
Internal Control And Fraud 11-19-10Ed Tobias
 
Computer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and TechniquesComputer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and Techniques_supriadi
 
Information systems audit and control
Information systems audit and controlInformation systems audit and control
Information systems audit and controlKashif Rana ACCA
 
Computerised accounting plus_one_chap_12_15_2
Computerised  accounting plus_one_chap_12_15_2Computerised  accounting plus_one_chap_12_15_2
Computerised accounting plus_one_chap_12_15_2Prasad Melattur
 
Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Sreekanth Narendran
 
Computerised Accounting System
Computerised Accounting SystemComputerised Accounting System
Computerised Accounting SystemTuhin Garai
 
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDITComputer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDITShahzeb Pirzada
 
Computerised Accounting System
Computerised Accounting SystemComputerised Accounting System
Computerised Accounting Systemengineer sood
 

Mais procurados (20)

Auditing In Computer Environment Presentation
Auditing In Computer Environment PresentationAuditing In Computer Environment Presentation
Auditing In Computer Environment Presentation
 
Information System audit
Information System auditInformation System audit
Information System audit
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems
 
Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6
 
ITGC audit of ERPs
ITGC audit of ERPsITGC audit of ERPs
ITGC audit of ERPs
 
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
 
Computer Audit an Introductory
Computer Audit an IntroductoryComputer Audit an Introductory
Computer Audit an Introductory
 
ICPAS Breakfast Talk Series - Maximising IT Audit 13 Mar 2013
ICPAS Breakfast Talk Series - Maximising IT Audit 13 Mar 2013ICPAS Breakfast Talk Series - Maximising IT Audit 13 Mar 2013
ICPAS Breakfast Talk Series - Maximising IT Audit 13 Mar 2013
 
Introduction to Transaction Processing Chapter No. 2
Introduction to Transaction Processing   Chapter No. 2Introduction to Transaction Processing   Chapter No. 2
Introduction to Transaction Processing Chapter No. 2
 
Information systems and its components ii
Information systems and its components   iiInformation systems and its components   ii
Information systems and its components ii
 
Internal Control And Fraud 11-19-10
Internal Control And Fraud 11-19-10Internal Control And Fraud 11-19-10
Internal Control And Fraud 11-19-10
 
Computer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and TechniquesComputer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and Techniques
 
008.itsecurity bcp v1
008.itsecurity bcp v1008.itsecurity bcp v1
008.itsecurity bcp v1
 
Information systems audit and control
Information systems audit and controlInformation systems audit and control
Information systems audit and control
 
Computerised accounting plus_one_chap_12_15_2
Computerised  accounting plus_one_chap_12_15_2Computerised  accounting plus_one_chap_12_15_2
Computerised accounting plus_one_chap_12_15_2
 
Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1
 
Computerised Accounting System
Computerised Accounting SystemComputerised Accounting System
Computerised Accounting System
 
Audit and Assurance
Audit and AssuranceAudit and Assurance
Audit and Assurance
 
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDITComputer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
 
Computerised Accounting System
Computerised Accounting SystemComputerised Accounting System
Computerised Accounting System
 

Destaque

Writingagooddissertation helpwithassignment
Writingagooddissertation helpwithassignmentWritingagooddissertation helpwithassignment
Writingagooddissertation helpwithassignmentHelpWithAssignment.com
 
Introduction to Microsystems for Bio Applications
Introduction to Microsystems for Bio ApplicationsIntroduction to Microsystems for Bio Applications
Introduction to Microsystems for Bio ApplicationsHelpWithAssignment.com
 
International Accounting:Reporting and Disclosure
International Accounting:Reporting and DisclosureInternational Accounting:Reporting and Disclosure
International Accounting:Reporting and DisclosureHelpWithAssignment.com
 
Tools of finance help withassignment.com
Tools of finance help withassignment.comTools of finance help withassignment.com
Tools of finance help withassignment.comHelpWithAssignment.com
 
Measures of association - Biostatistics
Measures of association - BiostatisticsMeasures of association - Biostatistics
Measures of association - BiostatisticsHelpWithAssignment.com
 
Performance Appraisal in Human Resources from HelpWithAssignment.com
Performance Appraisal in Human Resources from HelpWithAssignment.comPerformance Appraisal in Human Resources from HelpWithAssignment.com
Performance Appraisal in Human Resources from HelpWithAssignment.comHelpWithAssignment.com
 
Chicago Referencing Style HelpWIthAssignment.com
Chicago Referencing Style HelpWIthAssignment.comChicago Referencing Style HelpWIthAssignment.com
Chicago Referencing Style HelpWIthAssignment.comHelpWithAssignment.com
 
Microsystems Technologies- Thin-Film Processing
Microsystems Technologies-  Thin-Film ProcessingMicrosystems Technologies-  Thin-Film Processing
Microsystems Technologies- Thin-Film ProcessingHelpWithAssignment.com
 
Tools of finance help withassignment.com
Tools of finance help withassignment.comTools of finance help withassignment.com
Tools of finance help withassignment.comHelpWithAssignment.com
 

Destaque (16)

Business Law - Consumer Protection
Business Law - Consumer ProtectionBusiness Law - Consumer Protection
Business Law - Consumer Protection
 
Writingagooddissertation helpwithassignment
Writingagooddissertation helpwithassignmentWritingagooddissertation helpwithassignment
Writingagooddissertation helpwithassignment
 
Introduction to Microsystems for Bio Applications
Introduction to Microsystems for Bio ApplicationsIntroduction to Microsystems for Bio Applications
Introduction to Microsystems for Bio Applications
 
Allowable Deduction
Allowable DeductionAllowable Deduction
Allowable Deduction
 
Introduction to Accounting System
Introduction to Accounting SystemIntroduction to Accounting System
Introduction to Accounting System
 
Microsystems |Technologies
Microsystems |TechnologiesMicrosystems |Technologies
Microsystems |Technologies
 
International Accounting:Reporting and Disclosure
International Accounting:Reporting and DisclosureInternational Accounting:Reporting and Disclosure
International Accounting:Reporting and Disclosure
 
Tools of finance help withassignment.com
Tools of finance help withassignment.comTools of finance help withassignment.com
Tools of finance help withassignment.com
 
Tax Offsets and Trading Stock
Tax Offsets and Trading StockTax Offsets and Trading Stock
Tax Offsets and Trading Stock
 
Measures of association - Biostatistics
Measures of association - BiostatisticsMeasures of association - Biostatistics
Measures of association - Biostatistics
 
Brand Equity Assignment help
Brand Equity Assignment helpBrand Equity Assignment help
Brand Equity Assignment help
 
Performance Appraisal in Human Resources from HelpWithAssignment.com
Performance Appraisal in Human Resources from HelpWithAssignment.comPerformance Appraisal in Human Resources from HelpWithAssignment.com
Performance Appraisal in Human Resources from HelpWithAssignment.com
 
Chicago Referencing Style HelpWIthAssignment.com
Chicago Referencing Style HelpWIthAssignment.comChicago Referencing Style HelpWIthAssignment.com
Chicago Referencing Style HelpWIthAssignment.com
 
Microsystems Technologies- Thin-Film Processing
Microsystems Technologies-  Thin-Film ProcessingMicrosystems Technologies-  Thin-Film Processing
Microsystems Technologies- Thin-Film Processing
 
Tools of finance help withassignment.com
Tools of finance help withassignment.comTools of finance help withassignment.com
Tools of finance help withassignment.com
 
Hypothesis - Biostatistics
Hypothesis - BiostatisticsHypothesis - Biostatistics
Hypothesis - Biostatistics
 

Semelhante a Accounting System Design and Development-Internal Controls

CONTROL AND AUDIT
CONTROL AND AUDITCONTROL AND AUDIT
CONTROL AND AUDITRos Dina
 
Core Areas of a CA- Interlinked with computers
Core Areas of a CA- Interlinked with computersCore Areas of a CA- Interlinked with computers
Core Areas of a CA- Interlinked with computersShikha Gupta
 
Topic 3 Accounting System And Control
Topic 3 Accounting System And ControlTopic 3 Accounting System And Control
Topic 3 Accounting System And Controlguest441011
 
Auditing information systems
Auditing information systemsAuditing information systems
Auditing information systemsKenya Allmond
 
Topic 3 Accounting System And Control
Topic 3 Accounting System And ControlTopic 3 Accounting System And Control
Topic 3 Accounting System And Controlmandalina landy
 
It 302 computerized accounting (week 1) - sharifah
It 302   computerized accounting (week 1) - sharifahIt 302   computerized accounting (week 1) - sharifah
It 302 computerized accounting (week 1) - sharifahalish sha
 
Information systems and its components iii
Information systems and its components   iiiInformation systems and its components   iii
Information systems and its components iiiAshish Desai
 
Overview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptxOverview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptxJoshJaro
 
Transaction processing systems
Transaction processing systemsTransaction processing systems
Transaction processing systemsVidhu Arora
 
IT in BUSINESS
IT in BUSINESSIT in BUSINESS
IT in BUSINESSLibcorpio
 
Sushant edp
Sushant edpSushant edp
Sushant edpzalak007
 
Chapter-2-Control-Audit-Security-ioenotes.pptx
Chapter-2-Control-Audit-Security-ioenotes.pptxChapter-2-Control-Audit-Security-ioenotes.pptx
Chapter-2-Control-Audit-Security-ioenotes.pptxToxicHawk
 
2010 06 gartner avoiding audit fatigue in nine steps 1d
2010 06 gartner   avoiding audit fatigue in nine steps 1d2010 06 gartner   avoiding audit fatigue in nine steps 1d
2010 06 gartner avoiding audit fatigue in nine steps 1dGene Kim
 
controlling information system
controlling information systemcontrolling information system
controlling information systemonearbaein
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Net at Work
 
CISA_WK_4.pptx
CISA_WK_4.pptxCISA_WK_4.pptx
CISA_WK_4.pptxdotco
 

Semelhante a Accounting System Design and Development-Internal Controls (20)

CONTROL AND AUDIT
CONTROL AND AUDITCONTROL AND AUDIT
CONTROL AND AUDIT
 
Core Areas of a CA- Interlinked with computers
Core Areas of a CA- Interlinked with computersCore Areas of a CA- Interlinked with computers
Core Areas of a CA- Interlinked with computers
 
Topic 3 Accounting System And Control
Topic 3 Accounting System And ControlTopic 3 Accounting System And Control
Topic 3 Accounting System And Control
 
Auditing information systems
Auditing information systemsAuditing information systems
Auditing information systems
 
Topic 3 Accounting System And Control
Topic 3 Accounting System And ControlTopic 3 Accounting System And Control
Topic 3 Accounting System And Control
 
It 302 computerized accounting (week 1) - sharifah
It 302   computerized accounting (week 1) - sharifahIt 302   computerized accounting (week 1) - sharifah
It 302 computerized accounting (week 1) - sharifah
 
Information systems and its components iii
Information systems and its components   iiiInformation systems and its components   iii
Information systems and its components iii
 
Overview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptxOverview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptx
 
Transaction processing systems
Transaction processing systemsTransaction processing systems
Transaction processing systems
 
IT in BUSINESS
IT in BUSINESSIT in BUSINESS
IT in BUSINESS
 
Sushant edp
Sushant edpSushant edp
Sushant edp
 
Chapter-2-Control-Audit-Security-ioenotes.pptx
Chapter-2-Control-Audit-Security-ioenotes.pptxChapter-2-Control-Audit-Security-ioenotes.pptx
Chapter-2-Control-Audit-Security-ioenotes.pptx
 
IT System & Security Audit
IT System & Security AuditIT System & Security Audit
IT System & Security Audit
 
Bankauditin it env
Bankauditin it envBankauditin it env
Bankauditin it env
 
bankauditinITEnv
bankauditinITEnvbankauditinITEnv
bankauditinITEnv
 
bankauditinITEnv
bankauditinITEnvbankauditinITEnv
bankauditinITEnv
 
2010 06 gartner avoiding audit fatigue in nine steps 1d
2010 06 gartner   avoiding audit fatigue in nine steps 1d2010 06 gartner   avoiding audit fatigue in nine steps 1d
2010 06 gartner avoiding audit fatigue in nine steps 1d
 
controlling information system
controlling information systemcontrolling information system
controlling information system
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!
 
CISA_WK_4.pptx
CISA_WK_4.pptxCISA_WK_4.pptx
CISA_WK_4.pptx
 

Último

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Último (20)

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

Accounting System Design and Development-Internal Controls

  • 1.  Aims of a computerised accounting information systems  General and application controls  Limitations of controls  Threats to internal controls  Internal Controls (Part II) Accounting System Design and Development
  • 2.  Identify 3 advantages of computerised application controls. 
  • 3.  Proper authorisation such as authoring valid transaction  Proper record such as input and output accuracy  Completeness  Timeliness   Consistent execution, authorisation, and application  Enforce Completeness  More difficult to avoid  More timely and efficient to execute  More timely reporting and feedback!!  …etc 
  • 4.  Some risks apply across a number of areas of the organisation. To address these risks we have GENERAL CONTROLS.  General controls effect the overall information system.  General controls are established with the aim of providing reasonable assurance that the internal control objectives are achieved.  These controls effect all applications  Seen as pervasive – these controls will apply across almost all of the information systems in an organisation.  Support the effective operation of application controls   General Control ◦ Policies/procedures relating to many applications ◦ Support the effective operation of application controls  Application Control ◦ Manual or automated ◦ Operate within a business process / application ◦ Relate to the initiation, recording, reporting and processing of events ◦ Deal with the aims of occurrence, authorisation, completeness and accuracy 
  • 5. custody of ◦ Access to systems ◦ Policies and procedures ◦ Data protection Telecommunications  Access encryption techniques  To data files ◦ Disaster recovery  Hardware  Physical controls  Segregation of duties  User access  System development procedures  User awareness of risks  Data storage procedures   Organisational  Systems Development ◦ Separation of duties ◦ User involvement  Design, programming, ◦ Authorisation operations, data entry, ◦ Documentation documentation software restricted  Recruitment  Termination ◦ Transmission /  To computer facilities  Other  Authorised users ◦ Backup/Off site storage ◦ Monitor and detect failures 
  • 6. processed, and use system output. information needs and then design an information analysts and creates an information system by company’s computer. They ensure that data is right output is produced. corporate databases and files.  Systems administration – ensure that the different parts of an information system operate smoothly and efficiently.  Network management – ensure that all applicable devices are linked to the organisation’s internal and external networks and that the networks operate continuously and properly.  Change management – manage all changes to an organisation’s information system to ensure they are made smoothly and efficiently and to prevent errors and fraud.  Users – record transactions, authorize data to be  Systems analysis – helps users determine their system to meet those needs.  Programming – take the design provided by system writing the computer programs.  Computer operations – run the software on the input properly and correctly processed and the  Database administration – maintain and manage
  • 7. ◦ Virtual private networks ◦ Electronic eavesdropping ◦ Message acknowledgement procedures ◦ What unique risks do microcomputers present to an  Wireless technology  Wired Networks ◦ Routing verification procedures  Microcomputers organisation?  Location of computing facility  Restrict employee access  The use of Biometrics   Change management – the person (usually a developer) who makes the IS change should be different from the person who makes the change available to users – the process of making changes available to all users is usually called “migration into production”  Why do we need to segregate these functions? 
  • 8.  Fault tolerant / Built in redundancies  Disk mirroring  Backups ◦ Hierarchically performed ◦ Where to store backup data? ◦ How often to backup?  Uninterruptible power supply   Separation of duties ◦ Accounting from other sub-systems ◦ Responsibilities within IT  Programming  Data management  Design / Analysis  Testing ◦ Within a process  Authorisation, Execution, Custody, Recording  Computer accounts / Logins / Access controls 
  • 9.  DRP Considers: ◦ Natural disasters ◦ Deliberate malicious acts ◦ Accidental destructive acts…  DRP Usually covers: ◦ Staff  Employees  Customers  Suppliers  Other Stakeholders… ◦ Physical resources  Buildings  Equipments  Cash… ◦ Information resources  Data  Information…   DRP refers to the strategy an organisation will put into action in the event of a disaster that disrupts normal operations. The aim is business continuity, i.e. to resume operations as soon as possible with minimal loss or disruption to data and information.  This plan describes procedures to be followed in the case of an emergency as well as the role of each member of the disaster recovery team. 
  • 10.  Controls over specific systems/business processes ◦ Relate to the initiation, recording, reporting and processing of events  Provide reasonable assurance that the events occurring in a system/process are authorised and recorded, and are processed completely, accurately and on a timely basis and that resources in that system are protected.  Examples of systems/processes in an organisation: ◦ Sales system, Accounts receivable system, Purchases system, Payments system, Payroll, Financial Reporting, Inventory…   Temporary Site ◦ Hot site ◦ Cold site  Staffing ◦ Evacuating threatened staff ◦ Enabling staff to operate in DRP mode  Staff need to know their roles  Restore relationships ◦ As organisations become integrated the information asset is increasing in importance 
  • 11. required by the needs of the business process?  Classification based on the stage in the process at which the control occurs ◦ Input controls  Designed to ensure data entering the system is valid, complete and accurate ◦ Process controls  Detect errors and irregularities in the processing of data ◦ Output controls  Protect the outputs of a system   Authorisation ◦ Is the person authorised to execute the transaction?  Eg: Approvals for a large sale to proceed  Recording ◦ Input Validity  Is the data of the correct format/type?  Does the data represent a valid event? ◦ Input Accuracy  Is all data entered correct?  Completeness ◦ Has all data about an event been recorded?  Transaction level ◦ Have all events been recorded?  Business process level  Timeliness ◦ Is data captured, processed, stored and available as 
  • 12.  Edit Tests ◦ Check validity and accuracy after data has been input  Test of content  Numeric, Alphabetic, Alphanumeric  Test of reasonableness  Is the input within a specified range of values  Eg Hours worked per week is between 0 and 60  Test of sign (+ive, -ive)  Test of completeness  Test of sequence  Has every document been input? Eg Cheques  Requires pre-numbered source documents  Test of consistency  Check digit calculation  Eg: Credit Card – calculate security number from card number  Card Number 1234 5678 9012 3456  Security Number: 687   Observation, Recording and Transcription ◦ Feedback mechanism  Eg: Customer reviews and signs sales form ◦ Dual observation  Eg: Approval from a supervisor, more than one employee in execution of sale ◦ Pre-designed forms  Pre-numbered  Layout of forms  How does a pre-designed form help? 
  • 13. Invoice 001 Invoice 002 Invoice 007 Invoice 002 Invoice 003 Invoice 004 numbered documents missing documents SALES DEPT DATA ENTRY CLERK COMPUTER Invoice 001 Sale occurs and invoice prepared Invoices Missing entered Invoice 006 Invoice 003 Invoice 005 Invoice 004 Invoice 007 Invoice 005 Checks for gaps in the Invoice 006 sequence of pre- The sequence check and alerts Clerk of has identified that Invoice 006 has not been entered – we do not have completeness.   Controls for the manipulation of data once it has been input. ◦ Batch control totals ◦ Record counts ◦ Sequence checks ◦ Run to run totals  Which aims do they achieve? ◦ Reliable financial reporting  Accuracy of data processing / updates  Completeness of data processing / updates 
  • 14. SALES PERSON COMPUTER Sales Order Order Details Capture sales Calculate A/R check total Credit Update Accts Sales Receivable Compare totals   The computer takes the daily credit sales data and updates the accounts receivable master balances.  The new balance for the accounts receivable should equal the opening balance + credit sales 
  • 15. 30 They include:  Financial control total  Hash total  Record count 
  • 16.  Judgement error  Unexpected transaction  Collusion  Management override  Weak internal controls  Conflicting signals   Validation of process results ◦ Activity listings  Distribution and Use ◦ Who is able to access the outputs? ◦ Where are the outputs printed to? ◦ Has the relevant user got all of the output 
  • 17.  Blair, B and Boyce, G, 2006 (Eds), Accounting Information Systems with Social and Organisational Perspectives, John Wiley, Milton  Turner, L. & Weickgenannt, A. (2009) Accounting Information Systems: Controls and Processes, Wiley I wish to acknowledge Dr. Chadi Aoun’s input and material that were incorporated into the lecture slides as well as the supplementary material and sources provided by John Wiley publishers.   Management incompetence  External factors such as natural disasters  Fraud  Regulatory environment  Information technology such as viruses, email attacks 
  • 18. For more details on Assignment Help/ Homework Help/ Online Tuitions visit our website at http://www.helpwithassignment.com Thank You