Chapter 7
Chapter 7
CHAPTER 7
Control and
Accounting Information Systems
1
2020-04-24
SECTION BREAK
INTRODUCTION
Insert the title of your subtitle Here
Increasing ✓ Customers and suppliers have ❖ Many companies have not realized
that data security is crucial to their
access to one another’s systems
and data survival.
2
2020-04-24
LIKELIHOOD
The potential dollar loss
should a particular
threat become a reality.
The probability that
the threat will
happen .
An Exposure –
The Absence Or
Weakness Of A Control
3
2020-04-24
SECTION BREAKOF
OVERVIEW
Insert the title of your subtitle Here
CONTROL CONCEPTS
Safeguard assets
Maintain sufficient records 01
02
Comply with laws and
Provide accurate and reliable regulations
information 03 07
4
2020-04-24
3 Functions 01
Preventive
Deter problems before they arise: anticipate the
controls
problem.
02
Preventive
Detective
Detective controls Discover problems as soon as they arise.
Corrective
03
10
5
2020-04-24
2 Categories
General Application
Controls Controls
11
4 Levers of Control
01 02
Belief System Boundary System
Communicates company core values to Helps employees act ethically by setting limits
employees and inspires them to live by them on employee behavior
03 04
Diagnostic Control System Interactive Control System
Measures company progress by comparing Helps top-level managers with high-level
actual performance to planned performance activities that demand frequent and regular
(budget) attention
12
6
2020-04-24
4 Levers of Control
Belief System
1 Communicates company core values
to employees and inspires them to
live by them
Boundary System
2 Helps employees act ethically by
setting limits on employee behavior
4 Levers
Diagnostic Control System
3 Measures company progress by
comparing actual performance to
planned performance (budget)
4 Interactive Control System
Helps top-level managers with high-
level activities that demand frequent
and regular attention
13
Prevent companies
Requires all publicly owned
from bribing foreign
corporations to maintain a system
officials to obtain
of internal accounting controls
business
14
7
2020-04-24
Sarbanes–Oxley Acts
(SOX) (2002)
Applies to publicly held
companies and their
auditors to
✓Prevent financial statement
fraud
✓Financial report transparent
✓Protect investors
✓Strengthen internal controls
✓Punish executives who
perpetrate fraud
15
Sarbanes–Oxley Acts
(SOX) (2002)
Some of the important
aspects of The Sarbanes
-Oxley Act are:
❖ Public Company Accounting
Oversight Board (PCAOB)
❖ New rules for auditors
❖ New roles for audit
committees
❖ New rules for management
❖ New internal control
requirements
16
8
2020-04-24
17
A B C D
18
9
2020-04-24
SECTION BREAK
CONTROL
Insert the title of your subtitle Here
FRAMEWORKS
19
Committee of Sponsoring
Organizations (COSO)
20
10
2020-04-24
COBIT Framework
COBIT is a framework of generally applicable
information systems security and controls 5 PRINCIPLES
practices of Information Technology control.
Separating
Meeting governance from
stakeholder management
needs
Covering the
enterprise end-to-
Management to It provides Allows auditors end Enabling a holistic
benchmark assurances that to substantiate approach
their IT security and their internal
environments controls exist control Applying a single,
and compare it opinions integrated
framework
to other
organizations
21
22
11
2020-04-24
COSO’s COSO’s
Internal ERM
Control Model
Model
TABLE 7-1
23
A B C D
24
12
2020-04-24
A B C D
25
SECTION BREAK
THE INTERNAL
Insert the title of your subtitle Here
ENVIRONMENT
26
13
2020-04-24
Internal Environment
27
Management’s philosophy,
operating style, and risk Organizational structure
appetite
Methods of assigning
authority and
Commitment to integrity, responsibility
ethical values, and
competence
Human resource standards
that attract, develop, and
Internal control oversight by retain competent
the board of directors (e.g., individuals
audit committee)
External influences
28
14
2020-04-24
29
30
15
2020-04-24
31
Organizational Structure
How allocation of
Centralization or
responsibility affects
decentralization of authority Provides the
information requirements
overall
framework for
planning, Organization of
Direct or matrix accounting, auditing and
reporting relationships directing,
IS functions
executing,
controlling,
Organization by industry, and
monitoring its Size and nature of
product, geographic location,
operations company activities
marketing network
32
16
2020-04-24
Authority and
Management should responsibility are
make sure assigned through:
33
Confidentiality
Agreements
Hiring Training Discharging And Fidelity
Bond
Insurance
2 4 6 8
34
17
2020-04-24
External Influences
FASB 01
02 PCAOB
SEC 03
04 Insurance Companies
35
A B C D
36
18
2020-04-24
A B C D
37
SECTION
OBJECTIVEBREAK
SETTING &
Insert the title of your subtitle Here
EVENT IDENTIFICATION
38
19
2020-04-24
Objective Setting
39
4 Types Of Objectives
High-level goals that are aligned with and Deal with effectiveness and efficiency of
support the company’s mission company operations, determine how to allocate
resources
Help ensure the accuracy, completeness, and Help the company comply with all applicable
reliability company reports; Improve decision-making laws and regulations
and monitor company activities and performance
Reporting Objectives Compliance Objectives
C D
40
20
2020-04-24
A B C D
41
Event Identification
42
21
2020-04-24
04
Conduct workshops and 05 Perform data mining and
interviews analysis
43
SECTION BREAK
RISK ASSESSMENT
Insert the title of your subtitle Here
44
22
2020-04-24
45
Reduce It Share It
Reduce the likelihood and impact of Share or transfer some of it to
risk by implementing an effective others by buying insurance,
system of internal controls outsourcing, or hedging
Avoid It
Accept It Avoid risk by not engaging in
the activity that produces the
Accept the likelihood and impact
risk
of risk
46
23
2020-04-24
Event identification
◦ The first step in risk assessment and
response strategy is event identification,
which we have already discussed.
47
48
24
2020-04-24
Identify controls
◦ Management must identify one or more controls
that will protect the company from each event.
◦ In evaluating benefits of each control procedure,
consider effectiveness and timing.
◦ A preventive control is better than a detective
one.
◦ However, if preventive controls fail, detective
controls are needed to discover the problem, and
corrective controls are needed to recover.
◦ Consequently, the three complement each other,
and a good internal control system should have
all three.
49
50
25
2020-04-24
51
52
26
2020-04-24
53
SECTION BREAK
CONTROL ACTIVITIES
Insert the title of your subtitle Here
54
27
2020-04-24
Control Activities
❖ It is management’s responsibility to
develop a secure and adequately
controlled system and establish a set of
procedures to ensure control compliance
and enforcement
55
Proper authorization of
transactions and activities
Independent checks on 1
performance
7 2
Segregation of duties
56
28
2020-04-24
57
58
29
2020-04-24
CONTROL ACTIVITIES
59
CONTROL ACTIVITIES
60
30
2020-04-24
CONTROL ACTIVITIES
Ledger
$1,000
61
CONTROL ACTIVITIES
Ledger
$1,000
62
31
2020-04-24
CONTROL ACTIVITIES
Ledger
$1,000
63
CONTROL ACTIVITIES
Ledger
$900
64
32
2020-04-24
CONTROL ACTIVITIES
Ledger
$900
65
CONTROL ACTIVITIES
66
33
2020-04-24
CONTROL ACTIVITIES
Ledger
$1,000
67
CONTROL ACTIVITIES
Ledger
$1,000
68
34
2020-04-24
CONTROL ACTIVITIES
Ledger
$1,000
69
CONTROL ACTIVITIES
Ledger
$1,000
If this happens . . .
70
35
2020-04-24
CONTROL ACTIVITIES
Ledger
$1,000
71
Employee/Vendor Employee/Customer
Collusion is when Collusions Collusions
two or more people
• Billing at inflated prices • Unauthorized loans or
are working • Performing substandard insurance payments
together to override work and receiving full • Receipt of assets or
the preventive payment services at
• Payment for non- unauthorized discount
aspect of the performance prices
internal control • Duplicate billings • Forgiveness of
system • Improperly funnelling more amounts owed
work to or purchasing more • Unauthorized
goods from a colluding extension of due dates
company
72
36
2020-04-24
2b. Segregation Of 09
Systems Duties 08 Information
Systems
Computer Library
Operations
05
In a highly integrated
03 Users 04
information system, procedures
once performed by separate Security 06 Change
Management
individuals are combined Management Systems
Analysts
Therefore, anyone who has
unrestricted access to the 10 07
computer, its programs, and
live data could have the
Data
Control
Programming 02
opportunity to perpetrate and Network
conceal fraud Management
73
3. Project Development
Strategic
Master and Acquisition
Steering
Plan
Committee Controls
Project
Development
Data
Plan
Processing
Schedule
System Post-
Performance implementation
Measurements Review
74
37
2020-04-24
75
76
38
2020-04-24
77
7. Independent
Checks on
Performance
78
39
2020-04-24
CONTROL ACTIVITIES
Ledger
$1,000
79
CONTROL ACTIVITIES
Ledger
$1,000
80
40
2020-04-24
CONTROL ACTIVITIES
Ledger
$1,000
81
A B C D
82
41
2020-04-24
COMMUNICATION
SECTION BREAK
INFORMATION & MONITOR
Insert the title of your subtitle Here
CONTROL PROCESSES
83
84
42
2020-04-24
85
Monitoring
86
43
2020-04-24
Engage Forensic
Specialists
Use Responsibility
Accounting Systems
87
Perform Internal
Control Evaluation
88
44
2020-04-24
• Involves:
✓ Training and assisting employees; Implement Effective
✓ Monitoring their performance; Supervision
89
90
45
2020-04-24
91
92
46
2020-04-24
Conduct Periodic
Audits
93
Employ A Computer
Security Officer &
A Chief Compliance
Officer
94
47
2020-04-24
95
Install Fraud
Detection Software • People who commit fraud tend to follow
certain patterns and leave clues behind that
can be discovered by fraud detection software
• Some companies employ neural networks
(programs that mimic the brain and have
learning capabilities), which are very accurate
in identifying suspected fraud.
96
48
2020-04-24
Implement A
Fraud Hotline
97
Thank you
End of Chapter 7
98
49