Accounting Information Systems
10th Edition
ISBN: 9781337619202
Author: Hall, James A.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Question
Chapter 14, Problem 8P
a.
To determine
Provide an action plan for Company ABC which ensures proper control over the software, data, hardware, people, procedure, and documentation.
b.
To determine
Explain the risks that the company can face if the devised plan is not implemented.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
The ABC Company is switching from its legacy centralizedsystem to a fully distributed system. Underthe new model, all employees will work from PCsconnected to a local area network.
a. Outline a plan of action to ensure that the propercontrols over hardware, software, data, people,procedures, and documentation are in place.b. Discuss any risks the company may face if thedevised plan is not implemented.
General Controls. Indicate the benefits of each of the following examples of general controls.
a. Echo checks are designed and built into the computer by the manufacturer.b. The company schedules regular maintenance on its computer hardware.c. The company involves users in its design of programs and selection of prepackaged software and programs.d. New programs are tested and validated prior to being implemented.e. Documentation is required prior to modifying existing programs using “emergency”change orders.f. The duties of system analysts, programmers, and computer operators are appropriatelyseparated.g. Appropriate backup and data retention policies are implemented.h. The access rights granted to employees are periodically reviewed and evaluated, giving consideration to known changes resulting from promotions and transfers within the company.
Explain how internal control can be enhanced through the proper installation of Information Technology
Identify the risks for accounting systems that rely heavily on IT functions.
Distinguish between general controls and application controls and give examples at least five
Which duties should be segregated in a computer department?
Describe the typical duties of computer personnel.
What aspects of documentation, file security and retention control procedures are unique to computer systems?
What are the responsibilities of the database administrator (DBA) function?
Compare the risks associated with network environment to those associated with centralized IT functions.
Chapter 14 Solutions
Accounting Information Systems
Ch. 14 - Prob. 1RQCh. 14 - Prob. 2RQCh. 14 - Prob. 3RQCh. 14 - Prob. 4RQCh. 14 - Prob. 5RQCh. 14 - Prob. 6RQCh. 14 - Prob. 7RQCh. 14 - Prob. 8RQCh. 14 - Prob. 9RQCh. 14 - Prob. 10RQ
Ch. 14 - What are the three primary IT functions that must...Ch. 14 - Prob. 12RQCh. 14 - Prob. 13RQCh. 14 - What are the primary reasons for separating...Ch. 14 - Prob. 15RQCh. 14 - Prob. 16RQCh. 14 - Prob. 17RQCh. 14 - Prob. 18RQCh. 14 - Prob. 19RQCh. 14 - Prob. 20RQCh. 14 - Prob. 21RQCh. 14 - Prob. 22RQCh. 14 - Prob. 23RQCh. 14 - Prob. 24RQCh. 14 - Prob. 25RQCh. 14 - Prob. 26RQCh. 14 - Prob. 27RQCh. 14 - Prob. 28RQCh. 14 - Prob. 29RQCh. 14 - Prob. 30RQCh. 14 - Prob. 31RQCh. 14 - Prob. 32RQCh. 14 - Distinguish between errors and irregularities....Ch. 14 - Prob. 34RQCh. 14 - Prob. 35RQCh. 14 - Prob. 36RQCh. 14 - Prob. 37RQCh. 14 - Prob. 38RQCh. 14 - Prob. 39RQCh. 14 - Define commodity IT asset.Ch. 14 - Prob. 41RQCh. 14 - Prob. 42RQCh. 14 - Prob. 1DQCh. 14 - Prob. 2DQCh. 14 - Prob. 3DQCh. 14 - Prob. 4DQCh. 14 - Prob. 5DQCh. 14 - Prob. 6DQCh. 14 - Prob. 7DQCh. 14 - Prob. 8DQCh. 14 - Prob. 9DQCh. 14 - Prob. 10DQCh. 14 - Prob. 11DQCh. 14 - Who should determine and prioritize the critical...Ch. 14 - Prob. 13DQCh. 14 - Define the management assertions of existence or...Ch. 14 - Prob. 15DQCh. 14 - Prob. 16DQCh. 14 - Prob. 17DQCh. 14 - Prob. 18DQCh. 14 - Prob. 19DQCh. 14 - Prob. 20DQCh. 14 - Prob. 21DQCh. 14 - Prob. 22DQCh. 14 - Prob. 23DQCh. 14 - Explain how IT outsourcing can lead to loss of...Ch. 14 - Prob. 25DQCh. 14 - Prob. 26DQCh. 14 - Prob. 27DQCh. 14 - Prob. 1MCQCh. 14 - Prob. 2MCQCh. 14 - Prob. 3MCQCh. 14 - Prob. 4MCQCh. 14 - Prob. 5MCQCh. 14 - Prob. 6MCQCh. 14 - Prob. 7MCQCh. 14 - Prob. 8MCQCh. 14 - Prob. 9MCQCh. 14 - Prob. 10MCQCh. 14 - Prob. 1PCh. 14 - Prob. 2PCh. 14 - Prob. 3PCh. 14 - Prob. 4PCh. 14 - Prob. 5PCh. 14 - Prob. 6PCh. 14 - DISASTER RECOVERY PLAN Hexagon is an online...Ch. 14 - Prob. 8PCh. 14 - Prob. 9PCh. 14 - Prob. 10PCh. 14 - Prob. 11PCh. 14 - Prob. 12PCh. 14 - Prob. 13P
Knowledge Booster
Similar questions
- Internal Control Cases UTICA LIGHTING COMPANY (CENTRALIZED SYSTEM WITH DISTRIBUTED TERMINALS) Utica Lighting Company (ULC) is a manufacturer of outdoor lighting systems for patios, walkways, and public areas. It markets its product to landscaping companies and local municipalities. ULC employs a centralized computer system with distributed terminals in the various departments. Recently the company has been having manufacturing delays and cost overruns. ULC has hired your auditing firm to assess its operations and internal control procedures. ULCs conversion cycle is triggered by a report from the finished goods warehouse. The warehouse clerk periodically reviews the inventory records in a search for low-stock items. When the quantity on hand of an inventory item in the finished goods warehouse falls below its pre-established minimum, the warehouse clerk sends a digital inventory status report from the warehouse terminal to production planning and control advising them to schedule a production batch run for the item in question. Upon receipt of the report the production planning and control department clerk accesses the digital bill of materials and the routing sheet files for the items to be produced and adds the production details to the digital production schedule. The system automatically adds a record to the open work order file and sends a digital work order to the work center supervisors terminal and to the cost accounting clerks terminal. The work center supervisor accesses the work order from his terminal and prints hard-copy move tickets and material requisitions for each stage in the production process. Production employees take the materials requisitions to the storekeeper and secure the components, subassemblies, and raw materials needed to perform their production tasks. If excess materials beyond the standard amount are needed, the supervisor prepares additional materials requisitions. The employees also complete job time tickets after each stage in the process to reflect the time spent on the job. When the employees complete their tasks, they send the move tickets and time tickets to the cost accounting department. The storekeeper receives the materials requisitions and releases the materials into production. He then updates the raw material inventory records and sends the requisition to cost accounting. When inventories of component parts and raw materials fall to their reorder points, the storekeeper prepares purchase orders and sends them to the respective vendors. Vendors deliver raw material inventories directly to the storeroom, at which time the storeroom clerk inspects them and updates the digital raw materials subsidiary ledger. Each day the storekeeper prepares a journal voucher and posts to the general ledger raw material control account. The cost accounting clerk receives the digital work order and initiates a new WEP account for the batch. During the production process, the clerk receives hard-copy move tickets, materials requisitions, and job tickets from the work centers, which the clerk uses to update WIP account. When production is complete, the clerk closes the WIP account for the batch and transfers it to the finished good inventory subsidiary ledger. At the days end, the cost accounting clerk prepares a digital journal voucher reflecting the WIP status and any transfers from WIP to finished goods inventory. The clerk then posts the journal voucher to the WEP and FG general ledger control accounts. Required a. Prepare a data flow diagram of the current system. b. Prepare a system flowchart of the existing system. c. Describe the internal control weaknesses.arrow_forwardANNOUNCING A NEW INFORMATION SYSTEM The AJAX Company is considering implementing a new accounting system, which will automate sales processing, cash receipts, accounts payable, and cash disbursement procedures. Roger Moore, AJAXs CIO sent an announcement letter to the AJAX community. In the letter, Moore said: I have contracted with Spartan Consulting Group to do the needs analysis, system selection, and design work. The programming and implementation will be performed in-house using existing IT department staff. The development process will be unobtrusive to user departments because Spartan knows what needs to be done. They will work independently, in the background, and will not disrupt departmental and internal audit work How with time-consuming interviews, surveys, and questionnaires. This promises to be an efficient process that will produce a system that will be appreciated by all users. Required Draft a memo from George Jones, Director of Internal Audits, in response to Moores letter.arrow_forwardBetter Business Company (BBC) is in the process of planning a more advanced computer-based information system. Slavish, Moore, LLP, BBCs consulting firm, has recently been provided with an overview of their proposed plan: To ensure that the system functions as needed, the BBC Information System (BBCIS) will be created with input from its employees. System construction will begin with prototyping, computer-aided software engineering technology, and Gantt charts. From this point, IT professionals and a systems administrator, who are full-time employees of BBC, will create data models of the business process, define conceptual user views, design database tables, and specify system controls. Users in each department will submit written descriptions of their information needs and business problems to the IT professionals, who will then perform feasibility studies. Each aspect of the system will be documented in accordance with best practices and standards. The systems administrator will determine access privileges and maintain access control lists and database authorization tables. The administrator will have sole access to the transaction log, which will be used to record all changes made to database tables. A role of the administrator is to detect unauthorized access, reconstruct events, and promote personal accountability. The systems administrator will also be responsible for ensuring that virus protection software is current. Another important task of the administrator is to ensure that adequate backup to databases and applications occur and that disks and tapes are stored in a secure off-site location. Each employee requiring computer access will be assigned a user ID and password that will be entered when logging onto the system. If a computer terminal is left idle for more than five minutes, the system will close out the session and the user will need to log on again. Furthermore, users will be required to change their passwords once every year. Hardware will be purchased from Bell Computer Company with the advice of in-house systems developers. With the exception of basic applications, user departments will be allowed to purchase additional software that they need, which will be added to the system. BBCIS will run on a central server in the computer center located in the companys administration building. Two security guards will be assigned to the entrance to the computer room. To access the computer center, employees will swipe their ID cards on the lock to the main entrance door. The system will record the times of each entry and departure from the center. The data center will employ an advanced air-conditioning and air filtration system to eliminate dust and pollens. There will also be a sprinkler system to minimize damages in case of a fire. Required Based on BBCs plans for the implementation of a new computer system, describe the potential risks and needed controls. Classify these according to the relevant areas of the COSO framework.arrow_forward
- Processing Controls CMA 691 4-2 Unless adequate controls are implemented, the rapid advance of computer technology can reduce a firm’s ability to detect errors and fraud. Therefore, one of the critical responsibilities of the management team in firms where computers are used is the security and control of information service activities. During the design stage of a system, information system controls are planned to ensure the reliability of data. A well- designed system can prevent both intentional and unintentional alteration or destruction of data. These data controls can be classified as (1) input controls, (2) processing controls, and (3) output controls. Required: For each of the three data control categories listed, provide two specific controls and explain how each control contributes to ensuring the reliability of data. Use the following format for your answer. Control Category Specific Control Contribution to Data Reliabilityarrow_forwardIdentify Control Weaknesses and Recommendations. Georgia Beemster, CPA, is examining the financial statements of the Louisville Sales Corporation, which recently installed acomputerized processing system. The following comments have been extracted from Beemster’s notes on computer operations and the processing and control of shipping notices andcustomer invoices:∙ To minimize inconvenience, Louisville made the conversion to the new accounting information system without changing its existing system. The vendor supervised the conversion andtrained all computer department employees in systems design, operations, and programming.∙ Each computer run is assigned to a specific employee who is responsible for makingprogram changes, running the program, and answering questions. This procedure hasthe advantage of eliminating the need for records of computer operations because eachemployee is responsible for her or his own computer runs.∙ At least one computer department employee remains in the…arrow_forwardInternet Exercise: Reporting on Service Organization Controls. Search for a service organization auditor’s report on internal controls on the web. (Hint: You may have to look under the old name “SAS 70 reports.”) If you cannot find an auditor’s report, find a company’s news release describing its auditor’s service organization report. Required:a. Why do you think it is so difficult to find an actual report?b. If you found an auditor’s report, were any deficiencies noted? If so, what were they?c. Why would a service organization publicize the results of its auditor’s report?arrow_forward
- Which of the following would strengthen organizational control over a large-scale data processing center?a. Requiring the user departments to specify the general control standards necessary for processing transactions.b. Requiring that requests and instructions for data processing services be submitted directly to the computer operator in the data center.c. Having the database administrator report to the manager of computer operations.d. Assigning maintenance responsibility to the original system designer who best knows its logic.e. None of the above.arrow_forwardThe following is a list of 12 control plans from Chapter 8. These are followed by a list of 10 B/AR/CR business process controls or deficiencies. Match the 10 B/AR/CR business process control plans with a pervasive control plan from Chapter 8 that could prevent the deficiencies noted in the preceding list or have an impact on the successful execution of the business process control. Explain the impact that the pervasive control could have. Control Plans from Chapter 8 Access control software (i.e., assignment of access rights to employees) Selection, hiring, and supervision of billing clerks to ensure that they can and do carry out their assigned responsibilities Physical controls for perimeter, building, and computer facilities to prevent loss or destruction of the computer resources Preventive maintenance of computer hardware to ensure reliability and availability Systems development life cycle (SDLC), including testing and approval before implementation of new or revised programs…arrow_forwardThe following is a list of 12 control plans from Chapter 8. These are followed by a list of 10 B/AR/CR business process controls or deficiencies. Match the 10 B/AR/CR business process control plans with a pervasive control plan from Chapter 8 that could prevent the deficiencies noted in the preceding list or have an impact on the successful execution of the business process control. Explain the impact that the pervasive control could have. Control Plans from Chapter 8 Access control software (i.e., assignment of access rights to employees) Selection, hiring, and supervision of billing clerks to ensure that they can and do carry out their assigned responsibilities Physical controls for perimeter, building, and computer facilities to prevent loss or destruction of the computer resources Preventive maintenance of computer hardware to ensure reliability and availability Systems development life cycle (SDLC), including testing and approval before implementation of new or revised programs…arrow_forward
- Introduction: ABC Corporation is a manufacturing company that produces and sells consumer electronics. To ensure the effectiveness and efficiency of its expenditure cycle processes, ABC Corporation has enlisted a group of students to conduct an internal control assessment. The students' task is to identify control weaknesses in the expenditure cycle and propose recommendations to address these vulnerabilities. Scenario: ABC Corporation's expenditure cycle encompasses various stages, including requisitioning, purchasing, receiving, and accounts payable. The company utilizes an integrated enterprise resource planning (ERP) system to manage these processes. Question 1: What control weaknesses can you identify in ABC Corporation's receiving and inspection process that may result in incorrect recording of received items, acceptance of damaged goods, or potential theft or misappropriation of inventory?arrow_forwardhas hired you to review its sales order procedures for internal control compliance and to make recommendations for changes. You are required to:a. Create a data flow diagram of the current system. b. Create a system flowchart of the existing system. c. Analyze the internal control weaknesses in the system. ; andd. Prepare a system flowchart of a redesigned computer-based systemarrow_forwardTests of Controls: General Controls. The audit team of Packer Company identified thefollowing general controls in obtaining its overall understanding of Packer’s internal controlover the automated processing of transactions:1. Packer has routine maintenance on its computer equipment and related technology scheduled and performed every six months.2. Packer has formal, written systems development and documentation standards for theimplementation of new programs.3. Prior to implementing modifications to its existing programs, Packer tests and validatesthe program changes to ensure accurate processing.4. Packer has appropriately separated the responsibilities of systems analysts, programmers,and computer operators.5. Packer’s computer files are protected from loss through frequent backups and storage atan off-site location.6. Access to computer files and programs is protected through the use of passwords.7. On a monthly basis, Packer reviews any revisions in the access rights of its…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningPkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE L
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L