ACCTN578 Test 2 Flashcards
(212 cards)
Why are threats to AIS increasing?
More than 60% of organisations expect a major failure in controlling the security and integrity of their computer systems because:
- information is available to unprecedented # of workers
- information on distributed computer networks is hard to control. Each system and each employee = potential control vulnerability point.
- Customers & suppliers have access to eachothers systems and data = confidentiality issues.
Why have organisations not adequately protected data?
- Some companies view the loss of critical info as a distant, unlikely threat
- control implications of moving from centralised computer systems to internet-based systems not fully understood
- many companies don’t realise info is a strategic resource & protecting it must be a strategic requirement
- productivity and cost pressures motivate management to forgo the time consuming control measures.
What is a threat/event?
Any potential adverse occurrence or unwanted event that could injure the AIS or organisation.
What is exposure/impact?
Potential dollar loss should a particular threat become a reality.
What is liklihood/risk?
The probability that a threat will come to pass.
What are internal controls?
The processes & procedures implemented to provide reasonable assurance that control objectives are met.
IC is a process b/c they permeate an organisation’s operational activities and are an integral part of management activities.
IC is one of the three basic functions of an AIS.
Internal control is essential to fraud prevention.
What are the control objectives?
- to safeguard assets -prevent or detect unauthorised acquisition, use or disposition
- maintain records in sufficient detail to report company assets accurately and fairly
- provide accurate and reliable information
- prepare financial reports in accordance with established criteria
- promote and improve operational efficiency
- encourage adherence to prescribed managerial policies
- comply w applicable laws & regulations
Why only reasonable assurance?
Absolute assurance is difficult to achieve and prohibitively expensive.
What are the inherent limitations of IC sytems?
- susceptibility to simple errors/mistakes
- faulty judgements and decision making
- management overrides
- collusion
What does the development of IC system requirements need?
A thorough understanding of IT capabilities and risks, how to use IT to achieve an organisation’s control objectives.
How do accountants & system developers help management achieve control objectives?
- by designing effective control systems, that take a proactive approach to eliminating system threats and that detect, correct & recover from threats when they occur.
- making it easier to build controls into a system at the initial design phase, rather than adding them after the fact.
What are the 3 important functions/purposes of internal controls?
- Preventative Controls
- Detective Controls
- Corrective Controls
What are preventative controls?
- deter problems before they arise.
- eg hire qualified personnel, segregation of duties, control physical access to assets and information.
- eg check digit verification (eg employee numbers contain secret code that employees not aware of. Fake # = instantly blocked from using payroll)
What are detective controls?
- discover problems not prevented.
- eg duplicate checking of calculations, preparing bank reconciliations, monthly trial balances.
What are corrective controls?
- identify and correct problems as well as correct and recover from resulting errors
- eg maintaining back ups, correcting data entry errors, resubmitting transactions for subsequent processing.
What two categories/scope are IC’s often segregated into?
- General Controls
- Application Controls
What are general controls?
Make sure an organisation’s control environment is stable & well managed
eg security, IT infrastructure, software acquisition, development and maintenance controls.
What are application controls?
Prevent, detect and correct transaction errors and fraud in application programs.
Concerned with accuracy, completeness, validity and authorisation of data captured, entered, processed, transmitted to tother systems, and reported.
What are Robert Simon’s 4 levers of control?
Help management reconcile the conflict between creativity and controls.
- Belief System
- Boundary System
- Diagnostic Control System
- Interactive Control System
Describe what the “belief system” lever of control is…
- Belief System - how a company creates value, helps employees understand management’s vision. Communicates company’s core values and inspires employees to live by those values.
Describe what the “boundary system” lever of control is….
- Boundary System - helps employees act ethically by setting boundaries on employee behaviour. Not directly told what to do, rather encouraged to creatively solve problems whilst meeting customer needs and min. performance standards. Shunning of bad behaviour.
Describe what the “diagnostic control system” lever of control is….
- Diagnostic Control System - measures, monitors and compares actual company progress to budgets & performance goals. Feedback helps mgmt adjust & fine tune inputs & processes so future outputs more closely match goals.
Describe what the “interactive control system” lever of control is….
- Interactive Control System - helps managers to focus subordinate’s attention on key strategic issues and be more involved in their decisions.
Interactive system data are interpreted & discussed at face to face meetings.
What is the FCPA?
The Foreign Corrupt Practises Act (1977)
- passed to prevent companies from bribing foreign officials to obtain business; required all publically owned corporations to maintain a system of internal acc. controls.
- the FCPA was not sufficient. 1990’s and 2000’s saw huge accounting fraud. World.Com, Enron - biggest bankruptcy in history
- Arthur Anderson, once the largest CPA firm, collapsed.