Вы находитесь на странице: 1из 12

Chapter 3: Ethics, Fraud, and Internal Control Seeking a balance between these consequences is the

managers’ ethical responsibility

Proportionality – benefit from decision must outweight


Ethical standards – derived from societal mores and
the risks
deep-rooted personal beliefs about issues of right and
wrong that are not universally agreed upon  Must be no alternative decision that provides
the same or greater benefit with less risk
Enron’s Chief Financial Officer (CFO) Andy Fastow – a. Justice – benefits of decision should be
managed to improve his personal wealth by distributed fairly to those who share risks
approximately $40 million  Those who do not benefit should not carry the
Dennis Kozowski of Tyco, Richard Scrushy of Health- burden of rippsk
b. Minimize risk – decision should be
South, and Bernie Ebbers of WorldCom – became
implemented so as to minimize all of risks
wealthy beyond imagination while driving their
and avoid any unnecessary risks
companies into the ground
Computer ethics – analysis of nature and social impact
1999 – May 2002, executives of 25 companies extracted
of computer technology and the corresponding
$25 billion worth of special compensation, stock
formulation and justification of policies for the ethical
options, and private loans from their organizations
use of such technology
while their companies’ stock plummeted 75% more
 Includes concern about software as well as
Ethics – principles of conduct that individuals use in
hardware and concerns about networks
making choices and guiding their behavior in situations
connecting computers and computer
that involve the concepts of right and wrong
themselves
Business ethics – involves finding answers to two
THREE LEVELS:
questions:
1. Pop – exposure to stories and reports found in
1. How do managers decide what is right in
popular media regarding the good or bad
conducting their business?
2. Once managers have considered what is right, ramifications of computer technology
how do they achieve it? Note: society at large needs to be aware as
FOUR ARES: computer viruses and computer systems designed
to aid handicapped persons
a. Equity
b. Rights 2. Para – taking a real interest in computer ethics
c. Honesty cases and acquiring some level of competency
d. Exercise of corporate power so they can do their jobs effectively
3. Theoretical – interest to multidisciplinary
Making Ethical Decisions
researchers who apply the theories of
Every major decision has consequences that philosophy, sociology, and psychology to
potentially harm or benefit these constituents. computer science with goal of bringing some
new understanding to the field
Ex. Implementing a new computer information system
within an organization may cause some employees to A New Problem or Just a New Twist on an Old Problem?
lose their jobs, while those who remain enjoy benefit of
All pertinent ethical issues have already been
improved working conditions
examined in some other domain.

1
Ex. Issue of property rights has been explored and Misuse of computers: copying of proprietary software,
resulted in copyright, trade secret, & patent laws using a company’s computer for personal benefit, and
snooping other people’s files
Privacy – people desire to be in full control of what and
how much information about themselves is available to SARBANES-OXLEY ACT AND ETHICAL ISSUES
others, and to whom it is available
Sarbanes-Oxley Act – wide-sweeping legislation
Ownership – creation and maintenance of huge, shared
 Most significant securities law since the SEC
databases make it necessary to protect people from the
Acts of 1993 and 1934
potential misuse of data
 - has many provisions designed to deal with
Computer security – attempt to avoid such undesirable specific problems relating to capital markets,
events as a loss of confidentiality or data integrity corporate governance, and auditing profession

Security systems – attempt to prevent fraud and other Section 406 – Code of Ethics for Senior Financial Officers
misuse of computer systems
 Requires public companies to disclose to SEC
 They act to protect and further the legitimate whether they have adopted a code of ethics
interests of the system’s constituencies that applies to organization’s chief executive
officer (CEO), CFO, controller, or persons
Ethical issues involving security arise from emergence of
performing similar actions
shared, computerized databases that have potential to
cause irreparable harm to individuals by disseminating Applies specifically to executive and financial
inaccurate information to authorized user, through officers of company, company’s code of ethics
incorrect credit reporting should apply equally to all employees.

Ownership of Property  Top management’s attitude toward ethics sets


the tone for business practice, but it also
Intellectual property = software
responsibility of lower-level managers and non-
Copyright laws – have been invoked in an attempt to managers to uphold a firm’s ethical standards.
protect those who develop software from having it
A public company may disclose its code of ethics in
copied
several ways:
 Cause more harm than good
1. By including the code as an exhibit to its annual
Best interest of computer users is served when industry report
standards emerge 2. By posting the code to the company website
3. By agreeing to provide copies of code upon
Knowledge engineers – those who write the programs request
Domain experts – those who provide knowledge about ETHICAL ISSUES:
the task being automated
1. Conflicts of interest – the issue here is in dealing
Both must be concerned about their responsibility for with conflicts of interest, not prohibiting them
faulty decisions, incomplete or inaccurate knowledge  Avoidance is not the best policy, sometimes
bases, and role given to computers in decision-making conflicts are unavoidable
process. 2. Full and fair disclosures – objective is to ensure
that future disclosures are candid, open,
truthful, and void of such deceptions

2
3. Legal compliance – code of ethics should 1. False representation – false statement or
require employees to follow applicable nondisclosure
government laws, rules, and regulations 2. Material fact – fact must be substantial factor in
 To accomplish, organization must provide inducing someone to act
employees with training and guidance 3. Intent – intent to deceive or knowledge one’s
4. Internal reporting of code violations – code of statement is false
ethics must provide mechanism to permit 4. Justifiable reliance – misrepresentation must
prompt internal reporting of ethics violations have been substantial factor on which injured
 Similar to section 301 & 806 (designed to party relied
encourage and protect whistle-blowers 5. Injury or loss – deception must have caused
5. Accountability – section 301 (directs injury or loss to victim of fraud
organization’s audit committee to establish
Two levels of fraud:
procedures for receiving, retaining, and treating
1. Employee fraud – designed to directly convert
such complaints about accounting procedures
cash or other assets to employee’s personal
and internal control violations
benefit.
FRAUD AND ACCOUNTANTS If company has effective internal control,
defalcations or embezzlements can usually be
U.S. financial reporting system – object of scrutiny prevented or detected.
Statement on Auditing Standards (SAS) No. 99, Three steps:
Consideration of Fraud in a Financial Statement Audit –
objective is to seamlessly blend auditor’s consideration  Stealing something of value (asset)
of fraud into all phases of audit process.  Converting asset to usable form (cash)
 Concealing the crime to avoid detection
 Requires auditor to perform new steps such as
brainstorming during audit planning to assess
2. Management fraud – more insidious and often
potential risk of material misstatement of
escapes detection until organization suffered
financial statements from fraud schemes
irreparable damage or loss.
Fraud: Bankruptcies and business failures – fraud is Top management – fraudulent activities to drive up
result of poor management decisions or adverse market price of company’s stocks (involves deceptive
business conditions practices to inflate earnings or to forestall recognition of
either insolvency or decline in earnings
Fraud: business environment – intentional deception,
Lower-level management – involves materially
misappropriation of assets, or manipulation of
misstating financial data and internal reports to gain
company’s financial data to advantage of perpetrator.
additional compensation, to garner promotion, or to
Fraud: accounting literature – also known as white- escape penalty for poor performance.
collar crime, defalcation, embezzlement, irregularities
Three characteristics:
Fraud – denotes false representation of material fact
1. Fraud is perpetrated at levels of management
made by one party to another party with intent to
above one to which internal control structures
deceive and induce other party to justifiably rely on fact
generally relate
to his or her detriment.
2. Fraud frequently involves using financial
Fraudulent act must meet ff. conditions: statements to create illusion that entity is
healthier and more prosperous than it is

3
3. Fraud involves misappropriation of assets, greater access to company funds and other
frequently shrouded in maze of complex assets.
business transactions, often involving related  Collusion – when individuals in critical positions
third parties collude, they create opportunities to control or
gain access to assets that otherwise would not
FRAUD TRIANGLE exist
Three (3) factors:
1. Situational pressure – personal or job-related FRAUD SCHEMES:
stresses that could coerce an individual to act 1. Fraudulent statements (7.6)
dishonestly 2. Corruption (33.4)
2. Opportunity – direct access to assets and/or 3. Asset misappropriation (86.7)
access to information that control assets
3. Ethics – pertains to one’s character and degree Fraudulent statements – associated with management
of moral opposition of acts of dishonesty fraud. Must itself bring direct or indirect financial
benefit to perpetrator
FIANCIAL LOSSES FROM FRAUD Misstating cash account balance to cover theft of cash is
Association of Certified Fraud Examiners (ACFE) in not financial statement fraud. Understating liabilities to
2010 estimated losses from fraud 5% of annual present favorable picture of organization, to drive up
revenues. stock prices.
THE UNDERLYING PROBLEMS.
Actual cost of fraud, difficult to quantify for a 1. Lack of Auditor Independence – firms essentially
number of reasons: auditing their own work. Risk is that as auditors
1. Not all fraud is detected they will not bring to management’s attention
2. Of that detected, not all is reported the detected problems that may adversely affect
3. In many fraud cases, incomplete information is their consulting fees.
gathered Arthur Andersen – Enron auditors – were also
4. Information is not properly distributed to their internal auditor and management
management or law enforcement authorities consultants.
5. Too often, business organizations decide to take 2. Lack of Director Independence
no civil or criminal action against perpetrators of  directors who have personal relationship by
fraud. serving on boards of other director’s
Indirect cost: reduced productivity, cost of legal action, companies;
increased unemployment, business disruption due to  have business trading relationship as key
investigation of fraud, need to be considered. customers or suppliers of company;
Demographic categories presented in the ACFE study:  have financial relationship as primary
stockholders or have received personal
 Position – beyond internal control structure and loans from company;
have the greatest access to company funds and  have an operational relationship as
assets employees of company
 Gender – affords men greater access to assets Example of corporate inbreeding – Adelphia
 Age – older employees tend to occupy higher- Communications – founded in 1952, went
ranking positions public in 1986. Became sixth largest cable
 Education – with more education occupy higher provider in United States before accounting
positions in organization and therefore have scandal came to light. Founding family (John

4
Rigas – CEO and chairman of the public company auditing. Its principal reforms
board;Timothy Rigas – CFO, chief pertain to:
administrative officer, & chairman of audit 1. Creation of an accounting oversight board
committee; Michael Rigas – vice president of 2. Auditor independence
operation; JP Rigas – vice president for strategic 3. Corporate governance and responsibility
planning) perpetrated the fraud. Between 1998 4. Disclosure requirements
and May 2002, engaged in embezzlement 5. Penalties for fraud and other violations
resulted in loss of more than $60 billion to
shareholders. Public Company Oversight Accounting Board (PCAOB) –
empowered to set auditing, quality control, and ethics
Popular wisdom suggests that healthier board standards to inspect registered accounting firms; to
of directors is one in which majority of directors conduct investigations; to take disciplinary actions.
are independent outsiders, with integrity and
qualifications to understand the company and Auditor Independence is intended to specify categories
objectively plan its course. of services that public accounting firm cannot perform
for its client. these include the ff. nine functions:
3. Questionable Executive Compensation Schemes 1. Bookkeeping or other related services to
– Thomson Financial survey revealed: executives accounting records or financial statement
have abused stock-based compensation. 2. Financial information systems design and
Consensus is that fewer stock options should be implementation
offered than currently is the practice. 3. Appraisal or valuation services, fairness
4. Inappropriate Accounting Practices – use of opinions, or contribution-in-kind reports
inappropriate techniques is characteristic 4. Actuarial services
common to many financial statement fraud 5. Internal auditing outsourcing services
schemes. 6. Management functions or human resources
Special-purpose entities are legal, but their 7. Broker or dealer, investment adviser, or
application in this case was clearly intended to investment banking services
deceive the market. 8. Legal services and expert services unrelated to
audit
WorldCom – April 2001, WorldCom 9. Any other service that PCAOB determines is
management decided to transfer transmission impermissible
line costs from current expense accounts to SOX prohibits auditor from providing these
capital accounts. services to their audit clients, they are not
prohibited from performing such services for
SARBANES-OXLEY ACT AND FRAUD nonaudit clients or privately held companies.
Sarbanes-Oxley – this landmark legislation was written
to deal with problems related to capital markets, Corporate Governance and Responsibility – the act
corporate governance, and auditing profession, and has requires all audit committee members to be
fundamentally changed the way public companies do independent and requires audit committee to hire and
business and how accounting profession performs its oversee the external auditors.
attest function. - This provision is consistent with many investors
- The act establishes a framework to modernize who consider board composition to be critical
and reform the oversight and regulation of investment factor.

5
Thomson Financial survey revealed most been taken. Similar to bribe, but the transaction occurs
institutional investors want corporate boards to after the fact.
be composed of at least 75% independent
directors. Conflict of interest – occurs when an employee acts on
behalf of third party during discharge of his or her
Two other significant provisions: duties or has self-interest in activity being performed
1. Public companies are prohibited from making When employee’s conflict of interest is unknown to
loans to executive officers and directors employer and results in financial loss, fraud has
2. Act requires attorneys to report evidence of occurred.
material violation of securities laws or breaches
of fiduciary duty to CEO, CFO, or PCAOB. Economic extortion – use (or threat) of force (including
economic sanctions) by an individual or organization to
SOX imposes new corporate disclosure requirements, obtain something of value
including:
1. Public companies must report all off balance Asset Misappropriation – assets are either directly or
sheet transaction indirectly diverted to perpetrator’s benefit. Almost 90%
2. Annual reports filed with SEC must include of frauds included in ACFE study fall in this category.
statement by management asserting that it’s Transactions involving:
responsible for creating and maintaining  Cash
adequate internal controls and asserting to  Checking accounts
effectiveness of those controls  Inventory
3. Officers must certify that company’s accounts  Supplies
“fairly present” firm’s financial condition and  Equipment
results of operations  Information
4. Knowingly filing false certification is criminal Are most vulnerable to abuse.
offense
Skimming (14.6%) – stealing cash from organization
Corruption – involves an executive, manager, or before it is recorded on organization’s books and
employee of organization in collusion with an outsider. records.
10% of occupational fraud cases. Ex. Mail room fraud – an employee opening mail steals
Four (4) principal types: customer’s check and destroys the associated
1. Bribery remittance advice
2. Illegal gratuities
3. Conflicts of interest Cash larceny (11%) – schemes in which cash receipts are
4. Economic exertion stolen from an organization after they have been
recorded in organization’s books and records
Bribery – giving, offering, soliciting, or receiving things Ex. Lapping – cash receipts clerk first steals and cashes
of value to influence an official in performance of his or check from customer A, to conceal the payment of
her lawful duties customer B will be credited to A’s account.
- Defrauds the entity of the right to honest and - Employees involved in this sort of fraud often
loyal services from those employed by it. rationalize that they are simply borrowing cash
and plan to repay it at some future date.
Illegal gratuity – giving, receiving, offering, or soliciting
something of value because of an official act that has

6
Billing schemes (vendor fraud) (24.9%) – perpetrated by Non-cash misappropriations (17.2%) – theft or misuse of
employees who cause their employer to issue a victim organization’s non-cash assets.
payment to false supplier by submitting invoices for
Ex. A warehouse clerk who steals inventory from a
fictitious goods or services, inflated invoices, or invoices
warehouse or storeroom. Customer services clerk who
for personal purchases.
sells confidential customer information to third party.
Three (3) examples:
1. Shell company fraud – first requires perpetrator INTERNAL CONTROL CONCEPTS AND TECHNIQUES
to establish false supplier on books of victim
Internal control system – comprises policies, practices,
company.
and procedures employed by organization to achieve
2. Pass through fraud – similar to shell company
four broad objectives:
with exception that a transaction actually takes
place 1. To safeguard assets of firm
3. Pay-and-return fraud – involves clerk with 2. To ensure accuracy and reliability of accounting
check-writing authority who intentionally pays a records and information
vendor twice for the same invoice for purchase 3. To promote efficiency in firm’s operations
on inventory or supplies. 4. To measure compliance with management’s
prescribed policies and procedures
Check tampering (11.9%) – forging or changing in some Internal control system – shield that protects firm’s
material way a check that the organization has written assets from numerous undesirable events that bombard
to legitimate payee. the organization. These include:
Example is an employee who steals an outgoing check
to a vendor, forges the payee signature, and cashes the  Unauthorized access to firm’s assets
 Fraud perpetrated by persons both inside and
check.
outside firm
 Errors due to employee incompetence
Payroll fraud (9.3%) – distribution of fraudulent
 Faulty computer programs and corrupted input
paycheck to existent and/or nonexistent employees.
data
The fraud works best in organizations in which  Mischievous acts (unauthorized access by
supervisor is responsible for distributing computer hackers and threats from computer
paychecks to employees. viruses that destroy programs and databases

Expense reimbursement frauds (14.5%) – employee Four (4) modifying assumptions that guide designers
makes claim for reimbursement of fictitious or inflated and auditors of internal controls:
business expenses. 1. Management responsibility – this concept holds
Ex. A company salesperson files false expense reports that establishment and maintenance of system
that never occurred. of internal control
2. Reasonable assurance – cost-effective manner;
Theft of cash (11.8%) – direct theft of cash on hand in no system of internal control is perfect and cost
organization. of achieving improved control should not
Ex. An employee who makes false entries on outweigh its benefits.
cash register, such as voiding sale, to conceal 3. Methods of data processing
fraudulent removal of cash. An employee who 4. Limitations:
steals cash from the vault.  Possibility of error – no system is
perfect

7
 Circumvention – personnel may - Reveal specific types of errors by comparing
circumvent system through collusion or actual occurrences to pre-established standards
other When detective control identifies a departure
 Management override – management is from standards, it sounds an alarm to attract
in position to override control attention to the problem.
procedure by personally distorting
Corrective controls – actions taken to reverse effects of
transactions or by directing subordinate
error detected in previous step
to do so
 Changing conditions – conditions may - Actually fix the problem
change over time and render existing
Statement on Auditing Standards (SAS) No. 109 –
controls ineffective
current authoritative document for specifying internal
EXPOSURE AND RISK control objectives and techniques which is based on
COSO framework
Exposure – absence or weakness of internal control;
increase firm’s risk to financial loss or injury from Sarbanes-Oxley legislation – requires management of
undesirable events. public companies to implement adequate system of
internal controls over their financial reporting process
1. Destruction of assets
2. Theft of assets - Include controls over transaction processing
3. Corruption of information of information system systems that feed data to financial reporting
4. Disruption of information system
systems
Internal control shield composed of three levels of
Section 302 of SOX – requires that corporate
control:
management certify the organization’s internal controls
1. Preventive controls on quarterly and annual basis
2. Detective controls
3. Corrective controls Section 404 of SOX – requires management of public
companies to assess the effectiveness of organization’s
Prevention – first line of defense in control structure. internal controls. Entails providing annual report
Preventive controls – passive techniques designed to addressing ff. points:
reduce frequency of occurrence of undesirable events 1. Statement of management’s responsibility for
- Force compliance with prescribed or desired establishing and maintaining adequate internal
actions and thus screen out aberrant events control
When designing internal control, ounce of 2. Assessment of effectiveness of company’s
prevention is most certainly worth pound of internal controls over financial reporting
3. Statement that organization’s external auditors
cure. Preventing errors and fraud is far more
have issued attestation report on management’s
cost-effective than detecting and correcting
assessment of company’s internal control
problems after they occur.
4. Explicit written conclusion as to effectiveness of
Ex. Well-designed source document
internal control over financial reporting
Detective controls – devices, techniques, and 5. Statement identifying framework used
procedures designed to identify and expose undesirable assessment of internal control
events that elude preventive controls
Committee of Sponsoring Organizations of the Treadway
- Identify anomalies and draw attention to them Commission (COSO) – basis for SAS 109.

8
SAS 109 – developed for auditors and describes the (PAGE 118)
complex relationship between firm’s internal controls,
Monitoring – process by which quality of internal
auditor’s assessment of risk, and planning of audit
control design and operation can be assessed
procedures
Ongoing monitoring – may be achieved by integrating
- Requires auditors obtain sufficient knowledge to
special computer modules into information system that
assess attitude and awareness of organization’s
capture key data and/or permit tests of controls to be
management, board of directors, and owners
conducted as part of routine operations
regarding internal control.
(PAGE 117) Embedded modules – allow management and auditors
to maintain constant surveillance over functioning of
COSO INTERNAL CONTROL FRAMEWORK
internal controls
Consist of five components:
PAGE 119 - last paragraph of monitoring
1. Control environment
2. Risk assessment Control activities – policies and procedures used to
3. Information and communication ensure that appropriate actions are taken to deal with
4. Monitoring the organization’s identified risks
5. Control activities
Two categories:
Control environment – foundation; sets the tone for
organization and influences control awareness of its 1. IT controls
2. Physical controls
management and employees
IT controls – relate specifically to computer
Important elements:
environment.
 Integrity and ethical values of
Two groups:
management
 Structure of organization 1. General controls
 Participation of organization’s board of 2. Application controls
directors and audit committee, if one
exist General controls – entity-wide IT concerns such as:
 Management’s philosophy and  Controls over data center
operating style  Organization databases
 External influences (examination by  Network security
regulatory agencies)  Systems development
 Organization’s policies and practices for  Program maintenance
managing its human resources
Application controls – integrity of specific computer
Risk assessment – to identify, analyze, and manage risks systems such as:
relevant to financial reporting
 Sales order processing
(PAGE 118)  Accounts payable
 Payroll applications
Accounting information system – consists of records and
methods used to initiate, identify, analyze, classify, and Physical controls – class of controls relates to human
record organization’s transactions and to account for activities employed in accounting systems
related assets and liabilities
- May be purely manual such as:

9
 Physical custody of assets Accounting records – these records capture the
 May involve physical use of computers economic essence of transactions and provide an audit
to record transactions or update trail of economic events
accounts
- Do not relate to computer logic that actually Organization must maintain audit trail for:
performs accounting tasks 1. Information is needed for conducting day to day
- They relate to human activities that trigger
operations
those tasks or utilize the results of those tasks 2. Audit trail plays essential role in financial audit
Six categories: of the firm

1. Transaction authorization Access control – purpose is to ensure only authorized


2. Segregation of duties personnel have access to firm’s assets.
3. Supervision
- play important role in safeguarding the assets
4. Accounting records
5. Access control Indirect access to assets – achieved by gaining access to
6. Independent verification
records and documents that control the use, ownership,
Transaction authorization – purpose is to ensure that all and disposition of the asset
material transactions processed by information system
- accomplished by controlling use of documents
are valid and in accordance with management’s
and records by segregating duties of those who
objectives.
must access and process these records
General authority – granted to operations personnel to
Verification procedure – independent checks of
perform day-to-day operations
accounting system to identify errors and
Ex. Procedure to authorize purchase of inventories form misrepresentations
designated vendor only when inventory level falls
- takes place after the fact, by an individual who
Programmed procedure – decision rules are specified in is not directly involved with transaction or task
advance, and no additional approvals are required being verified

Specific authority – usually management’s responsibility through independent verification procedures,


management can assess:
- Case-by-case decisions associated with
nonroutine transactions 1. performance of individuals
Ex. Decision to extend particular customer’s 2. integrity of transaction processing system
credit limit beyond normal amount 3. correctness of data contained in accounting
records
Segregation of duties – to minimize incompatible
functions Examples of independent verification:

(page 120) 1. reconciling batch totals @ point during


transaction processing
Supervision (compensating control) – underlying 2. comparing physical assets with accounting
assumption: firm employs competent and trustworthy records
personnel 3. reconciling subsidiary accounts with control
accounts
- Takes place while activity is being performed by 4. reviewing management report that summarizes
supervisor with direct responsibility for the task business activity

10
IT APPLICATION CONTROLS 2.) Missing data check – this edit identifies blank or
incomplete input fields that should contain data that are
Application controls are associated w/ specific
required to process transaction
applications, such as:
3.) Numeric-alphabetic check – identifies when data in
 payroll
particular fields are in wrong form
 purchases
 cash disbursement systems 4.) Limit check – used to identify field values that exceed
and fall into three categories: an authorize limit

1. input controls 5.) Range check – upper and lower limits to their
2. processing controls acceptable values
3. output controls
- purpose is to detect keystroke errors by data entry
Input controls (edits) – programmed procedures which clerks
perform tests on transaction data to ensure they are
6.) Reasonableness check – may be detected by test that
free from errors
determines if value in one field, has already passed a
Edit controls in real-time systems – placed at data limit check and range check, is reasonable when
collection stage to monitor data as they are entered considered along with data in other fields of records
from terminals
7.) Validity check – compares actual field values against
Batch systems – collect data in transaction files, where known acceptable values.
they are temporarily held for subsequent processing
- used to verify such things as transaction codes, state
1) Check digit – control digit that is added to data code abbreviations, or employee job skill codes.
when it is originally assigned. Allows integrity of
Processing controls – programmed procedures to ensure
code to be established during subsequent
that an application’s logic is functioning properly
processing
Batch controls – used to manage flow of high volumes
Simplest form: sum digits in code
of transaction through batch processing systems
Transcription errors:
- objective is to reconcile system output with
1. addition errors – extra digit or character is input originally entered into system
added to code
PAGE 124
2. truncation errors – a digit or character is
removed from end of code Run-to-run controls – use values in batch control record
3. substitution errors – replacement of one digit in to monitor batch as it moves from one programmed
code with another procedure (run) to another
transposition errors: Page 125
1. single transposition – two adjacent digits are Hash total – summation of nonfinancial field to keep
reversed track of the records in batch
2. multiple transposition – nonadjacent digits are
transposed Audit trail controls – ensure that every transaction can
be traced through each stage of processing from its
economic source to its presentation in financial
statements.

11
EXAMPLES:

Transaction logs – permanent record of transactions,


although input transaction file is typically temporary file

- contains only successful transactions


Transaction log and error files combined should
account for all transactions in batch.

Log of automatic transactions – system triggers some


transactions internally

To maintain an audit trail of these activities, all


internally generated transactions must be placed in
transaction log.

Grandfather-father-son (GFS) backup – use sequential


master files (tape or disk) employ a backup technique
which is an integral part of master file update process.

Page 127

Destructive update approach – leaves no backup copy of


original master file. Only current value is available to
user

Output controls – combination of programmed routines


and other procedures to ensure that system output is
not lost, misdirected, or corrupted and that privacy is
not violated

Spooling – applications designed to direct their output


to magnetic disk rather than print it directly

Page 130

Print programs – often complex systems that require


operator intervention

Page 131

Waste – potential source of exposure

- also source of passwords that perpetrator may


use to access firm’s computer system

Report distribution – primary risks include being lost,


stolen, or misdirected in transit to user.

12

Вам также может понравиться