Accounting Information Systems
10th Edition
ISBN: 9781337619202
Author: Hall, James A.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Question
Chapter 15, Problem 8P
a.
To determine
Determine the database authorization table for master file and payroll file.
b.
To determine
Describe the potential risk if the right controls are not in place or if Bo and Ba collude.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
In an automated payroll processing environment, a department manager substituted the time card for a terminated employee with a time card for a fictitious employee. The fictitious employee had the same pay rate and hours worked as the terminated employee. The best control technique to detect this action using employee identification numbers would be aa. batch total.b. record count.c. hash total.d. subsequent check.e. financial total.
Given the information below,
Marco only issues accounts and passwords to employees with jobs requiring computer data entry or access to file information and reports. Passwords are required to enter the system. Access is limited such that employees only have access to the information they need to perform their duties. Access is also limited in nature such that some employees who do not have the authority to enter data have read-only access while those whose jobs require data entry have both read and write access. Normal access to the files takes place via the software, which subjects any input to various logical and numerical tests.
What is the: a) potential control strength and (b) potential mistatement detected or corrected.
Which preventive, detective, and/or corrective controls would best mitigate the following threat, and why?
(b) A salesperson successfully logged into the payroll system by guessing the payroll supervisor’s password.
Chapter 15 Solutions
Accounting Information Systems
Ch. 15 - Prob. 1RQCh. 15 - Prob. 2RQCh. 15 - Prob. 3RQCh. 15 - Prob. 4RQCh. 15 - Prob. 5RQCh. 15 - Explain discretionary access privileges.Ch. 15 - Prob. 7RQCh. 15 - Prob. 8RQCh. 15 - What is a vaccine, and what are its limitations?Ch. 15 - Prob. 10RQ
Ch. 15 - Prob. 11RQCh. 15 - What are the risks from equipment failure?Ch. 15 - Prob. 13RQCh. 15 - Prob. 14RQCh. 15 - Prob. 15RQCh. 15 - Prob. 16RQCh. 15 - Prob. 17RQCh. 15 - Prob. 18RQCh. 15 - Prob. 19RQCh. 15 - Prob. 20RQCh. 15 - Prob. 21RQCh. 15 - Prob. 22RQCh. 15 - Prob. 1DQCh. 15 - Prob. 2DQCh. 15 - Prob. 3DQCh. 15 - Prob. 4DQCh. 15 - Prob. 5DQCh. 15 - Prob. 6DQCh. 15 - Prob. 7DQCh. 15 - Prob. 8DQCh. 15 - Prob. 9DQCh. 15 - Prob. 10DQCh. 15 - Prob. 11DQCh. 15 - Prob. 12DQCh. 15 - Prob. 13DQCh. 15 - End-user computing has become extremely popular in...Ch. 15 - Prob. 15DQCh. 15 - Prob. 16DQCh. 15 - Prob. 17DQCh. 15 - Prob. 18DQCh. 15 - Prob. 19DQCh. 15 - Prob. 20DQCh. 15 - Prob. 21DQCh. 15 - Prob. 22DQCh. 15 - Prob. 23DQCh. 15 - Prob. 24DQCh. 15 - Prob. 25DQCh. 15 - Describe a digest within the context of a digital...Ch. 15 - What is a digital envelope?Ch. 15 - Prob. 28DQCh. 15 - Prob. 29DQCh. 15 - Prob. 30DQCh. 15 - Prob. 31DQCh. 15 - Discuss the unique control problems EDI creates.Ch. 15 - Prob. 33DQCh. 15 - Prob. 34DQCh. 15 - Prob. 1MCQCh. 15 - Prob. 2MCQCh. 15 - Prob. 3MCQCh. 15 - Prob. 4MCQCh. 15 - Prob. 5MCQCh. 15 - Prob. 6MCQCh. 15 - Prob. 7MCQCh. 15 - Prob. 8MCQCh. 15 - Prob. 9MCQCh. 15 - Prob. 10MCQCh. 15 - Prob. 1PCh. 15 - Prob. 2PCh. 15 - Prob. 3PCh. 15 - Prob. 4PCh. 15 - Prob. 5PCh. 15 - Prob. 6PCh. 15 - Prob. 7PCh. 15 - Prob. 8PCh. 15 - Better Business Company (BBC) is in the process of...Ch. 15 - Prob. 10PCh. 15 - Prob. 11PCh. 15 - Prob. 12PCh. 15 - Prob. 13P
Knowledge Booster
Similar questions
- What is the purpose of the following control procedures (i.e., what threats is it designed to mitigate)? h. Encryption of payroll data both when it is electronically sent to a payroll service bureau and while at rest in the HR/payroll database.arrow_forwardWhich of the following is least likely to be an attribute of an employee table in a normalized database?a. employee nameb. employee addressc. employee numberd. employee supervisor’s namee. all of these would be attributes of the employee table in a normalized database.arrow_forwardCase Study. In an automated payroll processing environment, a department manager substituted the time card for a terminated employee with a time card for a fictitious employee. The fictitious employee had the same pay rate and hours worked as the terminated employee. The best control technique to detect this action using employee identification numbers would be______________. Explain your answer.arrow_forward
- Explain in detail how the following relate to Advanced Technology Payroll Systems: Human Resources, Cost Accounting, Employee Timekeeping, Data Processing. Explain the following: Time and Attendance File, Biometric Time Clock, Magnetic Swipe ID Cards, Proximity Cards, Mobile Remote Devices. What are the payroll systems risks and internal controls?arrow_forwardMatch the four functions of payroll activities with their related internal controls: a. An independent employee should sign and distribute the prenumbered checks. select a function Hiring EmployeesPaying the PayrollPreparing the PayrollTimekeeping b. Supervisors should monitor hours worked through time reports. select a function Hiring EmployeesPaying the PayrollPreparing the PayrollTimekeeping c. Human Resources department should authorize employment. select a function Hiring EmployeesPaying the PayrollPreparing the PayrollTimekeeping d. Two or more employees should verify payroll amounts. select a functionarrow_forwardWhich of the following is NOT an example of application control?* a. Pre-filled forms are already sent to users to minimize input errors b. After processing, the daily sales summary are reconciled with the individual sales invoices processed c. Reasonableness tests on acceptable working hours are embedded in the payroll software d. An equipment failure causes an error message on the monitorarrow_forward
- Using the flowchart structure presented in Figure 2- in the text, prepare a system flowchart of the pro- cess outlined in Problem 3. Assume the following: Hard-copy timesheets are submitted by employees to department management. Managers submit the time sheet data digitally from their department terminals to the automated payroll application located in the data center. The automated system posts the transactions to the digital payroll file. The system also prepares and distributes hard- copy checks and cost center reports to employees and management respectively. Managers review the reports and file them in their departmentsarrow_forwardAn IT auditor is conducting data analysis procedures on an employee expense report file and notices several expenses for $24.99 from the same individual. The company’s policy requires that any expenses that are under $25.00 do not require a receipt. The IT auditor should: [SELECT ALL THAT APPLY a) Maintain professional skepticism and investigate these transactions further b) Pass on investigating these items further, focusing on higher dollar amounts c) Evaluate the business process approval controls, and related procedures d) Discuss fraud awareness and detection programs with management to gain an understanding of management’s commitment to fraud prevention and related entity-level anti-fraud controls.arrow_forwardAn audit client has engaged a third-party service organization tohost its payroll software package on servers located at the service organization. What optionsdo you have to obtain assurance about the controls embedded in the payroll application?arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Business Its Legal Ethical & Global EnvironmentAccountingISBN:9781305224414Author:JENNINGSPublisher:CengageAuditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
- Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE L
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Business Its Legal Ethical & Global Environment
Accounting
ISBN:9781305224414
Author:JENNINGS
Publisher:Cengage
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L