Accounting Information Systems
10th Edition
ISBN: 9781337619202
Author: Hall, James A.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Question
Chapter 14, Problem 2P
a.
To determine
Explain the risks existing in present that are of the concern to auditors.
b.
To determine
Explain the control features that contribute to the physical security of the computer threats.
c.
To determine
Mention some options which are open to company that may reduce operating cost and provide the security that an auditor seeks.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
Is it an entity inherent risk for the information below?
A computer network and personal computers support Marco Inc's accounting and inventory management systems. Personal computers are located in the offices and warehouse and a central server handles all accounting and inventory files. Printers are located in areas where employees need printed documents and other records routinely. The computer is used to control and process most transactions, to print documents, prepare accounting records, and prepare periodic financial statements. Marco uses commercial software recommended by their auditor. To date, they have had only the usual startup problems. They have used it for two years and have upgraded it once.
If it is an inherent risk, what is the feature of the firm that will possibly affect inherent risk and explain how and why; that is whether it increases or decreases inherent risk. Please address a specific risk to the accuracy of the financial statements with the "how" and whether…
Which preventive, detective, and/or corrective controls would best mitigate the following threat, and why?
(j) An attacker gained access to the company’s internal network by installing a wireless access point in a wiring closet located next to the elevators on the fourth floor of a high-rise office building that the company shared with other companies.
Is the following a potential control weakness?
A computer network and personal computers support Marco accounting and inventory management systems. Personal computers are located in the offices and warehouse and a central server handles all accounting and inventory files. Printers are located in areas where employees need printed documents and other records routinely. The computer is used to control and process most transactions, to print documents, prepare accounting records, and prepare periodic financial statements. Marco uses commercial software recommended by their auditor. To date, they have had only the usual startup problems. They have used it for two years and have upgraded it once.
Briefly explain the potential mistatement and recommended correction.
Chapter 14 Solutions
Accounting Information Systems
Ch. 14 - Prob. 1RQCh. 14 - Prob. 2RQCh. 14 - Prob. 3RQCh. 14 - Prob. 4RQCh. 14 - Prob. 5RQCh. 14 - Prob. 6RQCh. 14 - Prob. 7RQCh. 14 - Prob. 8RQCh. 14 - Prob. 9RQCh. 14 - Prob. 10RQ
Ch. 14 - What are the three primary IT functions that must...Ch. 14 - Prob. 12RQCh. 14 - Prob. 13RQCh. 14 - What are the primary reasons for separating...Ch. 14 - Prob. 15RQCh. 14 - Prob. 16RQCh. 14 - Prob. 17RQCh. 14 - Prob. 18RQCh. 14 - Prob. 19RQCh. 14 - Prob. 20RQCh. 14 - Prob. 21RQCh. 14 - Prob. 22RQCh. 14 - Prob. 23RQCh. 14 - Prob. 24RQCh. 14 - Prob. 25RQCh. 14 - Prob. 26RQCh. 14 - Prob. 27RQCh. 14 - Prob. 28RQCh. 14 - Prob. 29RQCh. 14 - Prob. 30RQCh. 14 - Prob. 31RQCh. 14 - Prob. 32RQCh. 14 - Distinguish between errors and irregularities....Ch. 14 - Prob. 34RQCh. 14 - Prob. 35RQCh. 14 - Prob. 36RQCh. 14 - Prob. 37RQCh. 14 - Prob. 38RQCh. 14 - Prob. 39RQCh. 14 - Define commodity IT asset.Ch. 14 - Prob. 41RQCh. 14 - Prob. 42RQCh. 14 - Prob. 1DQCh. 14 - Prob. 2DQCh. 14 - Prob. 3DQCh. 14 - Prob. 4DQCh. 14 - Prob. 5DQCh. 14 - Prob. 6DQCh. 14 - Prob. 7DQCh. 14 - Prob. 8DQCh. 14 - Prob. 9DQCh. 14 - Prob. 10DQCh. 14 - Prob. 11DQCh. 14 - Who should determine and prioritize the critical...Ch. 14 - Prob. 13DQCh. 14 - Define the management assertions of existence or...Ch. 14 - Prob. 15DQCh. 14 - Prob. 16DQCh. 14 - Prob. 17DQCh. 14 - Prob. 18DQCh. 14 - Prob. 19DQCh. 14 - Prob. 20DQCh. 14 - Prob. 21DQCh. 14 - Prob. 22DQCh. 14 - Prob. 23DQCh. 14 - Explain how IT outsourcing can lead to loss of...Ch. 14 - Prob. 25DQCh. 14 - Prob. 26DQCh. 14 - Prob. 27DQCh. 14 - Prob. 1MCQCh. 14 - Prob. 2MCQCh. 14 - Prob. 3MCQCh. 14 - Prob. 4MCQCh. 14 - Prob. 5MCQCh. 14 - Prob. 6MCQCh. 14 - Prob. 7MCQCh. 14 - Prob. 8MCQCh. 14 - Prob. 9MCQCh. 14 - Prob. 10MCQCh. 14 - Prob. 1PCh. 14 - Prob. 2PCh. 14 - Prob. 3PCh. 14 - Prob. 4PCh. 14 - Prob. 5PCh. 14 - Prob. 6PCh. 14 - DISASTER RECOVERY PLAN Hexagon is an online...Ch. 14 - Prob. 8PCh. 14 - Prob. 9PCh. 14 - Prob. 10PCh. 14 - Prob. 11PCh. 14 - Prob. 12PCh. 14 - Prob. 13P
Knowledge Booster
Similar questions
- Internal Control Considerations in End-User Computing Environments. Because of theuse of personal computers by many businesses, audit teams must know about the potentialinternal control weaknesses inherent in such an environment. This knowledge is crucial ifaudit teams are to make a proper assessment of the related control risk and to plan an effective and efficient audit approach.Required:In the following case study, assume that you are participating in the audit of Chicago Appliance Company and that the background information was obtained during the planning phaseof the engagement. You have been asked to (a) consider the potential internal control weaknesses that exist in this end-user application and (b) assess how those internal control weaknesses could alter the audit plan for the current year.Background InformationChicago Appliance is a wholesale distributor of electric appliances. Its sales in each of thelast two years have been approximately $40 million. All accounting…arrow_forwardThe best way to enact a broad fraud prevention program is toa. Install airtight control systems of checks and supervision.b. Name an “ethics officer” who is responsible for receiving and acting on fraud tips.c. Place dedicated hotline telephones on walls around the workplace with direct communication to the company ethics officer.d. Practice management “of the people and for the people” to help them share personal and professional problems.arrow_forwardWhich preventive, detective, and/or corrective controls would best mitigate the following threat, and why? (g) Attackers broke into the company’s information system through a wireless access point located in one of its retail stores. The wireless access point had been purchased and installed by the store manager without informing central IT or security.arrow_forward
- Identify Control Weaknesses and Recommendations. Georgia Beemster, CPA, is examining the financial statements of the Louisville Sales Corporation, which recently installed acomputerized processing system. The following comments have been extracted from Beemster’s notes on computer operations and the processing and control of shipping notices andcustomer invoices:∙ To minimize inconvenience, Louisville made the conversion to the new accounting information system without changing its existing system. The vendor supervised the conversion andtrained all computer department employees in systems design, operations, and programming.∙ Each computer run is assigned to a specific employee who is responsible for makingprogram changes, running the program, and answering questions. This procedure hasthe advantage of eliminating the need for records of computer operations because eachemployee is responsible for her or his own computer runs.∙ At least one computer department employee remains in the…arrow_forwardComputer Frauds and Missing Control Procedures. The following are brief stories ofactual employee thefts and embezzlements perpetrated in an IT environment.Required:What type of control procedure that might have prevented or detected the fraud was missingor inoperative?a. An accounts payable terminal operator at a subsidiary entity fabricated false invoicesfrom a fictitious vendor and entered them in the parent entity’s central accounts payable/cash disbursement system. Five checks totaling $155,000 were issued to the “vendor.”b. A bank provided custodial and record-keeping services for several mutual funds. Aproof-and-control department employee substituted his own name and account numberfor those of the actual purchasers of some shares. He used the accounting informationsystem to conceal and shift balances from his name and account to names and accountsof the actual investors when he needed to avoid detection because of missing amounts inthe investors’ accounts.c. The university’s…arrow_forwardWhich preventive, detective, and/or corrective controls would best mitigate the following threat, and why? (i)To facilitate working from home, an employee installed a modem on his office workstation. An attacker successfully penetrated the company’s system by dialing into that modem.arrow_forward
- Which preventive, detective, and/or corrective controls would best mitigate the following threat, and why? (c) A criminal remotely accessed a sensitive database using the authentication credentials (user ID and strong password) of an IT manager. At the time the attack occurred, the IT manager was logged into the system at his workstation at company headquarters.arrow_forwardThe following is a list of 10 common security problems. For each problem, describe why it is a problem and choose a control plan from this chapter that would prevent or detect the problem from occurring. Criminals posing as small business owners obtained names, addresses, and social security numbers from an organization whose business is providing such information only to legitimate customers who have a right to the data. An executive of a financial services firm implements a wireless network so that she can work at home from anywhere in her house. After setting up the network, she logs on using the default password. An organization’s top salesman uses a consumer-grade instant messaging (IM) client (e.g., AOL Instant Messaging). Such clients bypass antivirus and spam software, don’t have auditing and logging capabilities, and allow users to choose their IM names. A financial analyst’s laptop was stolen from his car. The laptop contained the names and social security numbers of…arrow_forwardInternal controls are critical for any organization's risk of fraudulent activity. Additionally, new technology assists accountants in minimizing fraud. Demonstrate how an advanced technology transaction processing system may help any organization minimize fraudulent activity.arrow_forward
- MAIL ROOM FRAUD AND INTERNAL CONTROLSarat Sethi, a professional criminal, took a job as a mail room clerk at Benson &Abernathy and Company, a large department store. The mail room was an extremelyhectic work environment consisting of a supervisor and 45 clerks. The clerks wereresponsible for handling promotional mailings, catalogs, and interoffice mail, as wellas receiving and distributing a wide range of outside correspondence to variousinternal departments. One of Sethi’s jobs was to open cash receipts envelopes fromcustomers making payments on their credit card balances. He separated theremittance advices (the bills) and the checks into two piles. He then sent remittanceadvices to the AR department, where the customer accounts were updated to reflectthe payment. He sent the checks to the cash receipts department, where they wererecorded in the cash journal and then deposited in the bank. Batch totals of cashreceived and accounts receivable updated were reconciled each night to…arrow_forwardRisk Identification and Plan of Action Baker Manufacturing uses EAMs in several of its financial systems to capture material transactions. During this year's annual financial audit, the external auditors noticed unusually large gaps in dates of the captured transactions being copied to the audit files. Baker Manufacturing management informed the auditors that the increased transaction processing times caused by the EAMs had forced computer operators to turn off the EAMs to allow the processing of important transactions in a timely fashion. In addition, much maintenance had been performed on key applications during the past year. Required: Outline any potential risks and determine the courses of action the external auditors should follow.arrow_forwardWhen auditing with “fraud awareness,” auditors should especially notice and follow up employee activities under which of these conditions?a. The company always estimates the inventory but never takes a complete physical count.b. The petty cash box is always locked in the desk of the custodian.c. Management has published a company code of ethics and sends frequent communication newsletters about it.d. The board of directors reviews and approves all investment transactions.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning