Академический Документы
Профессиональный Документы
Культура Документы
System
Lecture 6 -Chapter 16
Threats Controls
1. Inaccurate updating of 1 a. Data entry processing
general ledger integrity controls
2. Unauthorized journal entries b. Reconciliations of accounts
from subsidiary journals to
general ledger accounts
(e.g., Accounts payable)
c. Audit trail
2 a. Access controls
b. Reconciliations and control
reports
Copyright © Pearson Education Limited 2015. c. Audit trail 16-5
Adjusting Entries
• Accruals
▫ Made at end of accounting period to reflect events that have
occurred but are not in the financial statements (e.g., wages
payable)
• Deferrals
▫ Made at end of accounting period to reflect exchange of
cash prior to performance of related event (e.g., rent)
• Estimates
▫ Portion of expenses expected to occur over a number of
accounting periods (e.g., depreciation)
• Revaluations
▫ Entries made to reflect differences between actual and
recorded value of an asset or change in accounting principle
• Corrections
▫ Entries made to counteract effects of errors found in the
general ledger
Copyright © Pearson Education Limited 2015.
16-6
Post Adjusting Entries
Threats Controls
1. Inaccurate adjusting entries 1 a. Data entry processing
2. Unauthorized adjusting integrity controls
entries b. Spreadsheet error protection
controls
c. Standard adjusting entries
2 a. Access controls
b. Reconciliations and control
reports
c. Audit trail creation and
review
Copyright © Pearson Education Limited 2015. 16-7
Prepare Financial Statements
Produce Managerial Reports
Threats Controls
1. Inaccurate financial 1 a. Processing integrity controls
statements b. Use of packaged software
2. Fraudulent financial c. Training and audits
reporting 2 a. Audits
3. Poorly designed reports and 3 a. Responsibility accounting
graphs b. Balanced scorecard
c. Training on proper graph
design