Control and Accounting Information System - CH 7 Romney

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 21

Control and Accounting Information Systems

Chapter 7

Copyright 2015 Pearson Education, Inc.

7-1

Learning Objectives
Explain basic control concepts and why computer control and security are important.
Compare and contrast the COBIT, COSO, and ERM control frameworks.
Describe the major elements in the internal environment of a company.
Describe the four types of control objectives that companies need to set.
Describe the events that affect uncertainty and the techniques used to identify them.
Explain how to assess and respond to risk using the Enterprise Risk Management model.
Describe control activities commonly used in companies.
Describe how to communicate information and monitor control processes in
organizations.

Copyright 2015 Pearson Education, Inc.

7-2

Why Is Control Needed?


Any potential adverse occurrence or unwanted event
that could be injurious to either the accounting
information system or the organization is referred to
as a threat or an event.
The potential dollar loss should a particular threat
become a reality is referred to as the exposure or
impact of the threat.
The probability that the threat will happen is the
likelihood associated with the threat
Copyright 2015 Pearson Education, Inc.

7-3

A Primary Objective of an AIS


Is to control the organization so the organization
can achieve its objectives
Management expects accountants to:
Take a proactive approach to eliminating system
threats.
Detect, correct, and recover from threats when
they occur.
Copyright 2015 Pearson Education, Inc.

7-4

Internal Controls
Processes implemented to provide assurance
that the following objectives are achieved:

Safeguard assets
Maintain sufficient records
Provide accurate and reliable information
Prepare financial reports according to established
criteria
Promote and improve operational efficiency
Encourage adherence with management policies
Comply with laws and regulations
Copyright 2015 Pearson Education, Inc.

7-5

Functions of Internal Controls


Preventive controls
Deter problems from occurring

Detective controls
Discover problems that are not prevented

Corrective controls
Identify and correct problems; correct and recover
from the problems

Copyright 2015 Pearson Education, Inc.

7-6

Control Frameworks
COBIT
Framework for IT control

COSO
Framework for enterprise internal controls
(control-based approach)

COSO-ERM
Expands COSO framework taking a risk-based
approach

Copyright 2015 Pearson Education, Inc.

7-7

COBIT Framework
Current framework version is COBIT5
Based on the following principles:

Meeting stakeholder needs


Covering the enterprise end-to-end
Applying a single, integrated framework
Enabling a holistic approach
Separating governance from management

Copyright 2015 Pearson Education, Inc.

7-8

COBIT5 Separates Governance from


Management

Copyright 2015 Pearson Education, Inc.

7-9

Components of COSO Frameworks


COSO

Control (internal)
environment
Risk assessment
Control activities
Information and
communication
Monitoring

Copyright 2015 Pearson Education, Inc.

COSO-ERM

Internal environment
Objective setting
Event identification
Risk assessment
Risk response
Control activities
Information and
communication
Monitoring
7-10

Internal Environment
Managements philosophy, operating style, and
risk appetite
Commitment to integrity, ethical values, and
competence
Internal control oversight by Board of Directors
Organizing structure
Methods of assigning authority and
responsibility
Human resource standards
Copyright 2015 Pearson Education, Inc.

7-11

Objective Setting
Strategic objectives
High-level goals

Operations objectives
Effectiveness and efficiency of operations

Reporting objectives
Improve decision making and monitor
performance

Compliance objectives
Compliance with applicable laws and regulations
Copyright 2015 Pearson Education, Inc.

7-12

Event Identification
Identifying incidents both external and internal to
the organization that could affect the achievement
of the organizations objectives
Key Management Questions:
What could go wrong?
How can it go wrong?
What is the potential harm?
What can be done about it?
Copyright 2015 Pearson Education, Inc.

7-13

Risk Assessment
Risk is assessed from two perspectives:
Likelihood
Probability that the event will occur

Impact
Estimate potential loss if event occurs

Types of risk
Inherent
Risk that exists before plans are made to control it

Residual
Risk that is left over after you control it

Copyright 2015 Pearson Education, Inc.

7-14

Risk Response
Reduce
Implement effective internal control

Accept
Do nothing, accept likelihood and impact of risk

Share
Buy insurance, outsource, or hedge

Avoid
Do not engage in the activity
Copyright 2015 Pearson Education, Inc.

7-15

Control Activities
Proper authorization of transactions and
activities
Segregation of duties
Project development and acquisition controls
Change management controls
Design and use of documents and records
Safeguarding assets, records, and data
Independent checks on performance
Copyright 2015 Pearson Education, Inc.

7-16

Segregation of Duties

Copyright 2015 Pearson Education, Inc.

7-17

Monitoring
Perform internal control evaluations (e.g., internal
audit)
Implement effective supervision
Use responsibility accounting systems (e.g., budgets)
Monitor system activities
Track purchased software and mobile devices
Conduct periodic audits (e.g., external, internal,
network security)
Employ computer security officer
Engage forensic specialists
Install fraud detection software
Implement
fraud
hotline
Copyright
2015 Pearson Education,
Inc.

7-18

Key Terms

Threat or Event
Exposure or impact
Likelihood
Internal controls
Preventive controls
Detective controls
Corrective controls
General controls
Application controls
Belief system
Boundary system
Diagnostic control system
Interactive control system
Audit committee

Copyright 2015 Pearson Education, Inc.

Foreign Corrupt Practices Act


(FCPA)
Sarbanes-Oxley Act (SOX)
Public Company Accounting
Oversight Board (PCAOB)
Control Objectives for
Information and Related
Technology (COBIT)
Committee of Sponsoring
Organizations (COSO)
Internal control-integrated
framework (IC)
Enterprise Risk Management
Integrated Framework (ERM)
Internal environment
7-19

Key Terms (continued)

Risk appetite
Policy and procedures manual
Background check
Strategic objectives
Operations objectives
Reporting objectives
Compliance objectives
Event
Inherent risk
Residual risk
Expected loss
Control activities
Authorization
Digital signature

Copyright 2015 Pearson Education, Inc.

Specific authorization
General authorization
Segregation of accounting
duties
Collusion
Segregation of systems duties
Systems administrator
Network manager
Security management
Change management
Users
Systems analysts
Programmers
Computer operators
Information system library
7-20

Key Terms (continued)

Data control group


Steering committee
Strategic master plan
Project development plan
Project milestones
Data processing schedule
System performance
measurements
Throughput
Utilization
Response time

Copyright 2015 Pearson Education, Inc.

Postimplementation review
Systems integrator
Analytical review
Audit trail
Computer security officer
(CSO)
Chief compliance officer (CCO)
Forensic investigators
Computer forensics specialists
Neural networks
Fraud hotline

7-21

You might also like