Accounting Information Systems
10th Edition
ISBN: 9781337619202
Author: Hall, James A.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Question
Chapter 14, Problem 8P
a.
To determine
Provide an action plan for Company ABC which ensures proper control over the software, data, hardware, people, procedure, and documentation.
b.
To determine
Explain the risks that the company can face if the devised plan is not implemented.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
The ABC Company is switching from its legacy centralizedsystem to a fully distributed system. Underthe new model, all employees will work from PCsconnected to a local area network.
a. Outline a plan of action to ensure that the propercontrols over hardware, software, data, people,procedures, and documentation are in place.b. Discuss any risks the company may face if thedevised plan is not implemented.
XYZ Company hired you as an internal control officer to help the company in developing the internal control system which is
consists of policies and procedures to protect assets, ensure reliable accounting, promote efficient operations, and uphold
company policies. As well as the system will prevent avoidable losses and help managers both plan operations and monitor
company and human performance.
list any five good principles of internal control that you need to consider when developing the system.
Essay
Toolbar navigation
BIUS
A
!!!
四
Explain how internal control can be enhanced through the proper installation of Information Technology
Identify the risks for accounting systems that rely heavily on IT functions.
Distinguish between general controls and application controls and give examples at least five
Which duties should be segregated in a computer department?
Describe the typical duties of computer personnel.
What aspects of documentation, file security and retention control procedures are unique to computer systems?
What are the responsibilities of the database administrator (DBA) function?
Compare the risks associated with network environment to those associated with centralized IT functions.
Chapter 14 Solutions
Accounting Information Systems
Ch. 14 - Prob. 1RQCh. 14 - Prob. 2RQCh. 14 - Prob. 3RQCh. 14 - Prob. 4RQCh. 14 - Prob. 5RQCh. 14 - Prob. 6RQCh. 14 - Prob. 7RQCh. 14 - Prob. 8RQCh. 14 - Prob. 9RQCh. 14 - Prob. 10RQ
Ch. 14 - What are the three primary IT functions that must...Ch. 14 - Prob. 12RQCh. 14 - Prob. 13RQCh. 14 - What are the primary reasons for separating...Ch. 14 - Prob. 15RQCh. 14 - Prob. 16RQCh. 14 - Prob. 17RQCh. 14 - Prob. 18RQCh. 14 - Prob. 19RQCh. 14 - Prob. 20RQCh. 14 - Prob. 21RQCh. 14 - Prob. 22RQCh. 14 - Prob. 23RQCh. 14 - Prob. 24RQCh. 14 - Prob. 25RQCh. 14 - Prob. 26RQCh. 14 - Prob. 27RQCh. 14 - Prob. 28RQCh. 14 - Prob. 29RQCh. 14 - Prob. 30RQCh. 14 - Prob. 31RQCh. 14 - Prob. 32RQCh. 14 - Distinguish between errors and irregularities....Ch. 14 - Prob. 34RQCh. 14 - Prob. 35RQCh. 14 - Prob. 36RQCh. 14 - Prob. 37RQCh. 14 - Prob. 38RQCh. 14 - Prob. 39RQCh. 14 - Define commodity IT asset.Ch. 14 - Prob. 41RQCh. 14 - Prob. 42RQCh. 14 - Prob. 1DQCh. 14 - Prob. 2DQCh. 14 - Prob. 3DQCh. 14 - Prob. 4DQCh. 14 - Prob. 5DQCh. 14 - Prob. 6DQCh. 14 - Prob. 7DQCh. 14 - Prob. 8DQCh. 14 - Prob. 9DQCh. 14 - Prob. 10DQCh. 14 - Prob. 11DQCh. 14 - Who should determine and prioritize the critical...Ch. 14 - Prob. 13DQCh. 14 - Define the management assertions of existence or...Ch. 14 - Prob. 15DQCh. 14 - Prob. 16DQCh. 14 - Prob. 17DQCh. 14 - Prob. 18DQCh. 14 - Prob. 19DQCh. 14 - Prob. 20DQCh. 14 - Prob. 21DQCh. 14 - Prob. 22DQCh. 14 - Prob. 23DQCh. 14 - Explain how IT outsourcing can lead to loss of...Ch. 14 - Prob. 25DQCh. 14 - Prob. 26DQCh. 14 - Prob. 27DQCh. 14 - Prob. 1MCQCh. 14 - Prob. 2MCQCh. 14 - Prob. 3MCQCh. 14 - Prob. 4MCQCh. 14 - Prob. 5MCQCh. 14 - Prob. 6MCQCh. 14 - Prob. 7MCQCh. 14 - Prob. 8MCQCh. 14 - Prob. 9MCQCh. 14 - Prob. 10MCQCh. 14 - Prob. 1PCh. 14 - Prob. 2PCh. 14 - Prob. 3PCh. 14 - Prob. 4PCh. 14 - Prob. 5PCh. 14 - Prob. 6PCh. 14 - DISASTER RECOVERY PLAN Hexagon is an online...Ch. 14 - Prob. 8PCh. 14 - Prob. 9PCh. 14 - Prob. 10PCh. 14 - Prob. 11PCh. 14 - Prob. 12PCh. 14 - Prob. 13P
Knowledge Booster
Similar questions
- Question #66: Lamar LLC is in the process of updating its revenues and receivables systems with the implementation of new accounting software. James Loden, Inc. is an independent information technology consultant who is assisting Tamar with the project. James has developed the following checklist containing internal control points that the company should consider in this new implementation: Will all data entry clerks and accounting personnel have their own PCs with log‐in IDs and password protection? Will different system access levels for different users be incorporated? Will customer orders be received via the Internet? Has the company identified an off‐site alternative computer processing location? Does the project budget include line items for an upgraded, uninterrupted power source and firewall? Required: In a two (2) page response, describe the control purpose for each point presented in the case.arrow_forwardMatch the following elements of internal control: Question 4 options: information and communication control environment risk assessment monitoring control procedures 1. provides reasonable assurance that business goals will be achieved 2. used by management for guiding operations and ensuring compliance with requirements 3. overall attitude of management and employees 4. used to locate weaknesses and improve controls 5. identify, analyze and assess likeliness of vulnerabilitiesarrow_forwarda. Allows multiple users to access the system at the same time. b. Enables the tracking of all transactions. Enterprise resource planning systems Identifies suspicious transactions or likely mistakes such as wrong account numbers or duplicate transactions. Audit trail Network-compatible Entry-level software Large-scale computer systems that integrate all aspects of the organization including accounting, sales, human resource management, and manufacturing. d. Internal control System for companies with revenues of less than $5 million and up to 20 employees. e. > >arrow_forward
- Which of the following would strengthen organizational control over a large-scale data processing center?a. Requiring the user departments to specify the general control standards necessary for processing transactions.b. Requiring that requests and instructions for data processing services be submitted directly to the computer operator in the data center.c. Having the database administrator report to the manager of computer operations.d. Assigning maintenance responsibility to the original system designer who best knows its logic.e. None of the above.arrow_forwardBetter Business Company (BBC) is in the process of planning a more advanced computer-based information system. Slavish, Moore, LLP, BBCs consulting firm, has recently been provided with an overview of their proposed plan: To ensure that the system functions as needed, the BBC Information System (BBCIS) will be created with input from its employees. System construction will begin with prototyping, computer-aided software engineering technology, and Gantt charts. From this point, IT professionals and a systems administrator, who are full-time employees of BBC, will create data models of the business process, define conceptual user views, design database tables, and specify system controls. Users in each department will submit written descriptions of their information needs and business problems to the IT professionals, who will then perform feasibility studies. Each aspect of the system will be documented in accordance with best practices and standards. The systems administrator will determine access privileges and maintain access control lists and database authorization tables. The administrator will have sole access to the transaction log, which will be used to record all changes made to database tables. A role of the administrator is to detect unauthorized access, reconstruct events, and promote personal accountability. The systems administrator will also be responsible for ensuring that virus protection software is current. Another important task of the administrator is to ensure that adequate backup to databases and applications occur and that disks and tapes are stored in a secure off-site location. Each employee requiring computer access will be assigned a user ID and password that will be entered when logging onto the system. If a computer terminal is left idle for more than five minutes, the system will close out the session and the user will need to log on again. Furthermore, users will be required to change their passwords once every year. Hardware will be purchased from Bell Computer Company with the advice of in-house systems developers. With the exception of basic applications, user departments will be allowed to purchase additional software that they need, which will be added to the system. BBCIS will run on a central server in the computer center located in the companys administration building. Two security guards will be assigned to the entrance to the computer room. To access the computer center, employees will swipe their ID cards on the lock to the main entrance door. The system will record the times of each entry and departure from the center. The data center will employ an advanced air-conditioning and air filtration system to eliminate dust and pollens. There will also be a sprinkler system to minimize damages in case of a fire. Required Based on BBCs plans for the implementation of a new computer system, describe the potential risks and needed controls. Classify these according to the relevant areas of the COSO framework.arrow_forwardInternal Control Cases UTICA LIGHTING COMPANY (CENTRALIZED SYSTEM WITH DISTRIBUTED TERMINALS) Utica Lighting Company (ULC) is a manufacturer of outdoor lighting systems for patios, walkways, and public areas. It markets its product to landscaping companies and local municipalities. ULC employs a centralized computer system with distributed terminals in the various departments. Recently the company has been having manufacturing delays and cost overruns. ULC has hired your auditing firm to assess its operations and internal control procedures. ULCs conversion cycle is triggered by a report from the finished goods warehouse. The warehouse clerk periodically reviews the inventory records in a search for low-stock items. When the quantity on hand of an inventory item in the finished goods warehouse falls below its pre-established minimum, the warehouse clerk sends a digital inventory status report from the warehouse terminal to production planning and control advising them to schedule a production batch run for the item in question. Upon receipt of the report the production planning and control department clerk accesses the digital bill of materials and the routing sheet files for the items to be produced and adds the production details to the digital production schedule. The system automatically adds a record to the open work order file and sends a digital work order to the work center supervisors terminal and to the cost accounting clerks terminal. The work center supervisor accesses the work order from his terminal and prints hard-copy move tickets and material requisitions for each stage in the production process. Production employees take the materials requisitions to the storekeeper and secure the components, subassemblies, and raw materials needed to perform their production tasks. If excess materials beyond the standard amount are needed, the supervisor prepares additional materials requisitions. The employees also complete job time tickets after each stage in the process to reflect the time spent on the job. When the employees complete their tasks, they send the move tickets and time tickets to the cost accounting department. The storekeeper receives the materials requisitions and releases the materials into production. He then updates the raw material inventory records and sends the requisition to cost accounting. When inventories of component parts and raw materials fall to their reorder points, the storekeeper prepares purchase orders and sends them to the respective vendors. Vendors deliver raw material inventories directly to the storeroom, at which time the storeroom clerk inspects them and updates the digital raw materials subsidiary ledger. Each day the storekeeper prepares a journal voucher and posts to the general ledger raw material control account. The cost accounting clerk receives the digital work order and initiates a new WEP account for the batch. During the production process, the clerk receives hard-copy move tickets, materials requisitions, and job tickets from the work centers, which the clerk uses to update WIP account. When production is complete, the clerk closes the WIP account for the batch and transfers it to the finished good inventory subsidiary ledger. At the days end, the cost accounting clerk prepares a digital journal voucher reflecting the WIP status and any transfers from WIP to finished goods inventory. The clerk then posts the journal voucher to the WEP and FG general ledger control accounts. Required a. Prepare a data flow diagram of the current system. b. Prepare a system flowchart of the existing system. c. Describe the internal control weaknesses.arrow_forward
- ANNOUNCING A NEW INFORMATION SYSTEM The AJAX Company is considering implementing a new accounting system, which will automate sales processing, cash receipts, accounts payable, and cash disbursement procedures. Roger Moore, AJAXs CIO sent an announcement letter to the AJAX community. In the letter, Moore said: I have contracted with Spartan Consulting Group to do the needs analysis, system selection, and design work. The programming and implementation will be performed in-house using existing IT department staff. The development process will be unobtrusive to user departments because Spartan knows what needs to be done. They will work independently, in the background, and will not disrupt departmental and internal audit work How with time-consuming interviews, surveys, and questionnaires. This promises to be an efficient process that will produce a system that will be appreciated by all users. Required Draft a memo from George Jones, Director of Internal Audits, in response to Moores letter.arrow_forwardEven though technology has improved the internal control structure of a company, a supervisor cannot depend totally on technology. Discuss other internal controls a supervisor needs to implement to ensure a strong structure.arrow_forwardThe information technology departments of all companies have significant and important roles in the internal control systems. Discuss them and their importance.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Business/Professional Ethics Directors/Executives...AccountingISBN:9781337485913Author:BROOKSPublisher:CengagePrinciples of Accounting Volume 1AccountingISBN:9781947172685Author:OpenStaxPublisher:OpenStax College
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningPkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE L
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Business/Professional Ethics Directors/Executives...
Accounting
ISBN:9781337485913
Author:BROOKS
Publisher:Cengage
Principles of Accounting Volume 1
Accounting
ISBN:9781947172685
Author:OpenStax
Publisher:OpenStax College
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L