(Ais) Reviewer 2
(Ais) Reviewer 2
CONTEXT DIAGRAM the least detailed picture of a system that defines the process being documented
and shows the data flows into and out of the process to external entities
PHYSICAL DATA FLOW DIAGRAM a graphical representation of a system that shows the system ’ s
internal and external entities and the flows of data into and out of these entities
LOGICAL DATA FLOW DIAGRAM a graphical representation of a system that shows the system ’ s
processes (as bubbles), data stores, and the flows of data into and out of the processes and data stores.
PREPARING DATA FLOW DIAGRAM – Data flow diagrams are drawn to document an existing system or
one that is created from scratch when developing a new system. It uses defined symbols like rectangles,
circles, arrows, etc.
PREPARING SYSTEMS FLOWCHARTS - Systems flowcharts are drawn to visually display the sequence of
activities in a process and who is responsible for those activities. (a) To simplify and clarify a narrative (b)
To better analyze and understand a system (c) to portray a system’s logic and implementation
accurately, there can be many correct solutions.
An enterprise system facilitates the streamlining of business processes, the replacement of paper
reports with online “ electronic reports, ” and the automation of manual processes
APPLICATIONS APPROACH - concentrates on the process being performed. In this case, data
play a secondary or supportive role to the programs that run in each application system. Each
application user collects and manages its own data, generally in dedicated, separate, physically
distinguishable files for each application.
CENTRALIZED DATABASE APPROACH - data are stored in relational database tables instead of
separate files, solves many of the problems caused by data redundancy.
DATABASE MANAGEMENT SYSTEM
A database management system (DBMS) is a set of integrated programs designed to simplify the tasks of
creating, accessing, and managing a centralized database
Functions of DBMS
Define
Construct
Manipulate
Share
SCHEMA
A complete description of the configuration of record types, data items, and the relationships
among them. The schema defines the logical structure of the database. The schema, therefore,
defines the organizational view of the data.
SUBSCHEMA
DBMS LANGUAGES
DATA DEFINITION LANGUAGE (DDL) - It describes the structure of the database,i.e. tables
(attributes, domain, key) and constraints.
DATA MODIFICATION LANGUAGE (DML) - It manipulates data in the table (or) selects data from
the table.
TRANSACTION CONTROL LANGUAGE (TCL) - They are used for controlling transactions.
DATA INDEPENDENCE - Defined as a property of DBMS that helps to change the database schema at
one level of a database system without requiring to change the schema at the next higher level.
THREE-TIER ARCHITECTURE - There is no direct communication between client and server. Used for
large applications on the web. The features are data backup, recovery, security, and concurrency
control.
1. HIERARCHICAL
organized in a pyramid structure
records at or near the top of the structure contains records below them
parent records include the lower-level child records
2. NETWORK
a child record can have more than one parent record
adopted by organizations that had been frustrated by the limitations of hierarchical DBMSs
3. RELATIONAL
logically organized in two-dimensional tables
each individual fact or type of information is stored in its own table
4. OBJECT-ORIENTED
both simple and complex objects can be stored
includes abstract data types that allow users to define characteristics of the data
solves the anomalies in first normal form by reducing the redundancy of data.
2nd step: place each of the non-key attributes that are dependent on a part of composite key
1. COMMUNICATION-DRIVEN
2. DATA-DRIVEN
3. DOCUMENT-DRIVEN
4. KNOWLEDGE-DRIVEN
5. MODEL-DRIVEN
NEURAL NETWORKS (NNs) are computer hardware and software systems that mimic the human brain’s
ability to recognize patterns or predict outcomes using less-than-complete information.
INTELLIGENT AGENT - a software program that may be integrated into DSS or other software tools (such
as word processing, spreadsheet, or database packages)
DATA - the raw bits and pieces of information with no context, By itself, data is not that useful. To be
useful, it needs to be given context. Once we have put our data into context, aggregated and analyzed it,
we can use it to make decisions for our organization
DATA WAREHOUSES - the use of information systems facilities to focus on the collection, organization,
integration, and long-term storage of entity-wide data. Its purpose is to provide users with easy access
to large quantities of varied data from across the organization for the sole purpose of improving
decision-making capabilities
DATA MINING - the exploration, aggregation, and analysis of large quantities of varied data from across
the organization. Data mining is used to better understand an organization ’ s business processes, trends
within these processes, and potential opportunities to improve the effectiveness and efficiency of the
organization
KNOWLEDGE MANAGEMENT SYSTEM - the process of capturing, storing, retrieving, and distributing the
knowledge of the individuals in an organization for use by others in the organization to improve the
quality and efficiency of decision making across the firm
DASHBOARDS Business dashboards (or simply dashboards) can be defined applying the input-process-
output approach: The inputs to dashboards are the key information for decisions; the processes of
dashboards are the various forms of graphical presentations (e.g., bar charts, pie charts, and
infographics) and user interactivities (e.g., slider bar, drilldown button, and dropdown list); and the
outputs from the dashboards are the decisions made by managers which may improve organizations ’
performance.
Provides analytical and reporting capability to enable the analysis of data warehouses and to
help managers make the best possible decisions for their companies.
Natural extension of enterprise systems.
BUSINESS ANALYTICS
2. Predictive analytics - similar to the “precrime” predicting tool where agents can use it to visualize
future murder cases.
Group 2 AIS
Chapter 6
Relational Databases and SQL
As we go on with the topic we will realize that BI a natural extension of enterprise systems and
not as a completely new development because BI is often installed into an existing ERP as an
additional module. Also, with the use of spreadsheets, BI can improve internal controls within a
company.
For example, if data of an enterprise system is transferred into a spreadsheet that is not an
integrated part of the enterprise system there is a possibility that they will face numerous errors
in that spreadsheet so By increasing spreadsheet use within the system BI increases the
available control a company can exert over spreadsheet use, which in turn increases its
compliance with the Sarbanes-Oxley Act (Section 404).
REA Modeling
Relational Databases
Relational Database Concepts
Mapping an REA Model to a Relational DBMS
—--------------------------------------------------------
2. Human Resources
Service businesses also are interested in tracking employee work activities as part of the
human resources process.
The human resources process includes payroll activities, employee education and
development, and other activities.
o REA terms the HR business process is identified (Fig. 2) as a special case of the
acquisition/payment cycle, consisting of four key business events; labor
requisition, labor schedule, labor acquisition and cash disbursement [7].
Two Additional Entities:
o RELEASE_TIME and TRAINING_COMPLETED, which are added to the model
that also includes the previously identified agent entity EMPLOYEE and event
entity WORK_COMPLETED.
These four entities enable the database to aggregate the information it needs to
determine the employee's pay rate, hours worked, hours spent in training, and hours of
sick time and vacation time used.
o The human resources department needs information about employee education
and development so it can monitor training activities and ensure that the
employee is receiving enough continuing education to comply with state licensing
requirements and the firm’s policies.
o Human resources also will monitor the percentage of billable hours the
employee has accumulated as a measure of job performance.
To accomplish these activities, human resources must be able to link data about
completed work activities and training programs to specific employees. This information
can be drawn from the agent entity EMPLOYEE, the event entity
TRAINING_COMPLETED, and the event entity WORK_COMPLETED.
Human resources can use this information to accumulate a given employee’s training
record and calculate that employee’s percentage of hours worked that were billable
hours.
REA data model will continue to expand through an explosion of entities and relationships.
Many organizations have moved toward the integration of all data across the organization.
Use of the REA approach can yield:
More efficient operations by helping identify non-value-added activities, by storing
financial and nonfinancial data in the same central database, and greater support for
management decisions;
increased productivity through the elimination of non-value-added activities;
competitive advantages.
Relational Databases
Legacy Systems
Systems that have existed in an organization over a long period of time and were
developed using an organization’s previous computer hardware and software platforms.
o Legacy system is software that was created many years ago, but it continues to
work on older technologies pretty well.
o They are implemented on old technologies and platforms.
o Outdated development, design, and architecture approaches are used.
o No unit and integration tests.
o The system is difficult to make changes to.
o The system breaks down unexpectedly.
o Bad unreadable code that calls into question the operation of the entire system.
o Routine operations are not automated, which periodically leads to the same type
of errors and increases the bus factor, which is the level of specific knowledge
that certain team members have. The higher this factor, the more difficult it
becomes to continue developing the project after those team members are
replaced by others.
o System and infrastructure not properly documented.
HOW SYSTEMS BECOME LEGACY
o Since the launch of the system, many new innovations have been created, but
the system continues to work on older technologies and platforms.
o The team that created the system did not cope with the task due to low technical
competence, and now the project is dead weight.
o As in the previous case, the system was created without a proper technical
knowledge base, but it was launched, and in general, it works.
Referential integrity
Specifies that for every attribute value in one relation that has been specified to allow
reference to another relation, the tuple being referenced must remain intact.
o To ensure that data is always accurate and accessible, relational databases
follow certain integrity rules. For example, an integrity rule can specify that
duplicate rows are not allowed in a table in order to eliminate the potential for
erroneous information entering the database.
o Relational model and data consistency
The relational model is the best at maintaining data consistency across
applications and database copies (called instances). For example, when
a customer deposits money at an ATM and then looks at the account
balance on a mobile phone, the customer expects to see that deposit
reflected immediately in an updated account balance. Relational
databases excel at this kind of data consistency, ensuring that multiple
instances of a database have the same data all the time.
The simple yet powerful relational model is used by organizations of all types and sizes for a
broad variety of information needs. Relational databases are used to track inventories, process
e-commerce transactions, manage huge amounts of mission-critical customer information, and
much more.
—-------------------------------
SQL is a powerful database language that can be used to define database systems, query the
database for information, generate reports from the database, and access databases from
within programs using embedded SQL commands.
It has become the de facto standard database language—evidenced by continual efforts by the
industry to provide standardization guidelines for vendors and the number of variations of the
language that exist in databases from supercomputers to personal computers.
CREATE command - used to create the relations that form the database structure.
Alphanumeric types
Most notably, we need to make sure that the primary key values are not left empty (i.e., null);
otherwise, there will be no key value by which to identify and pull the tuple’s record from the
database. We may want to require that other attributes be assigned some value rather than
having the option of being null. In each of these cases, we can assign a value of NOT NULL as
the constraint.
The INSERT command in its simplest form only requires the user to specify the SQL table and
the values to be inserted for each attribute if a value is provided for every attribute.
The DELETE command requires specification of the table name and inclusion of a WHERE
condition, which is used to identify the unique tuple(s) for deletion.
3. UPDATE - used when we want to change one or more attribute values for one or more tuples
in a table.
To accomplish a change of an attribute value, the UPDATE command must be able to identify
the table with the value to be updated, the new values to be placed in the database, and the
conditions for identifying the correct tuple for UPDATE.
To make the change, we identify the tuple using the WHERE condition we just used for deletion,
and we change the existing values by using a SET command to set the new values for the
database.
SELECT
SELECT commands retrieve the values for a list of attributes from the tuples of a single
relation.
SELECT commands allow us to join data across multiple tables to link specific pieces of
information that are of interest
1. a list of attributes that we want to SELECT from the database (SELECT)
2. a list of tables where these attributes can be found (FROM)
3. a WHERE clause that sets the conditions under which attribute values are to be
retrieved. (WHERE)
Chapter 7
Controlling Information Systems: Introduction to Enterprise Risk Management and
Internal Control
Organizational Governance
Objective setting includes defining mission, vision, purpose, and strategies to establish
relationships.
Internal control and monitoring activities are implemented to review performance and provide
feedback to provide a reasonable assurance that objectives are being achieved.
A process, effected by an entity’s board of directors, management, and other personnel, applied
in strategy settings and across the enterprise, designed to identify potential events that may
affect the entity, and manage risk to be within its risk appetite, to provide reasonable assurance
regarding the achievement of entity objectives.
Risks - events that would have a negative impact on the organization’s objectives –
require assessment and response
4. Risk assessment: Risks are analyzed, considering likelihood and impact, as a basis for
determining how they should be managed. Likelihood is the possibility that an event will
occur, and impact is the effect of an event’s occurrence. Risks are assessed on an
inherent and a residual basis.
5. Risk response: Management selects risk responses from the four response types:
avoiding, accepting, reducing, or sharing risk—developing a set of actions to align risks
with the entity’s risk tolerances and risk appetite.
We can avoid a risk by leaving the activity that is giving rise to the risk.
We can reduce a risk by taking actions that reduce the likelihood of an event or
reduce the impact
We can share a risk by, for example, buying insurance or outsourcing the activity.
We can accept a risk by taking no action
6. Control activities: Policies and procedures are established and implemented to help
ensure the risk responses are effectively carried out.
7. Information and communication: Relevant information is identified, captured, and
communicated in a form and time frame that enable people to carry out their
responsibilities. Effective communication requires that appropriate, timely, and quality
information from internal and external sources flows down, up, and across the entity to
facilitate risk management and intelligent decision making.
8. Monitoring: The entirety of ERM is monitored, and modifications are made as
necessary. Monitoring is accomplished through ongoing management activities,
separate evaluations, or both.
A U.S. law passed on July 30, 2002 to protect investors from corporate accounting fraud
by improving financial reporting and auditing standards
Bill Sponsors: Sen. Paul S. Sarbanes and Rep. Michael G. Oxley
Enacted primarily due to financial statement fraud that was occurring in the early 2000s
(Enron, WorldCom, Tyco, Sunbeam)
Emphasis placed on need for effective internal controls
OUTLINE OF SOX
Section 101: establishes the Public Company Accounting Oversight Board (PCAOB), an
independent board to oversee public company audits.
Section 107: assigns oversight and enforcement authority over the board to the Securities and
Exchange Commission (SEC).
Section 201: prohibits a CPA firm that audits a public company from engaging in certain
nonaudit services with the same client. Most relevant to AIS is the prohibition of providing
financial information systems design and implementation services to audit clients.
Section 203: requires audit partner rotation in their fifth, sixth, or seventh year, depending on
the partner’s role in the audit.
Section 206: states that a company’s chief executive officer (CEO), chief financial officer
(CFO), controller, or chief accountant cannot have been employed by the company’s audit firm
and participated in an audit of that company during the prior one-year period.
Section 302: requires a company’s CEO and CFO to certify quarterly and annual reports. They
are certifying that they reviewed the reports; the reports are not materially untruthful or
misleading; the financial statements fairly reflect in all material respects the financial position of
the company; and they are responsible for establishing, maintaining, and reporting on the
effectiveness of internal controls, including significant deficiencies, frauds, or changes in internal
controls.
Section 404: requires each annual report filed with the SEC to include an internal control report.
The report shall state the responsibility of management for establishing and maintaining an
adequate internal control structure and procedures for financial reporting. The report must also
contain management’s assessment, as of the end of the company’s fiscal year, of the
effectiveness of the internal control structure and procedures of the company for financial
reporting.
Section 406: requires that companies disclose whether or not they have adopted a code of
ethics for senior financial officers.
Section 407: requires that companies disclose whether or not their audit committee contains at
least one member who is a financial expert.
Section 409: requires that companies disclose information on material changes in their financial
condition or operations on a rapid and current basis.
Requires financial analysts to properly disclose in research reports any conflicts of interest they
might hold with the companies they recommend.
Section 602: authorizes the SEC to censure or deny any person the privilege of appearing or
practicing before the SEC if that person is deemed to be unqualified, have acted in an unethical
manner, or have aided and abetted in the violation of federal securities laws.
Authorizes the Government Accountability Office (GAO) to study the consolidation of public
accounting firms since 1989 and offer solutions to any recognized problems.
Section 802: makes it a felony to knowingly destroy, alter, or create records or documents with
the intent to impede, obstruct, or influence an ongoing or contemplated federal investigation.
Section 806: offers legal protection to whistleblowers who provide evidence of fraud.
Section 807: provides criminal penalties of fines and up to 25 years’ imprisonment for those
who knowingly execute, or attempt to execute, securities fraud.
Section 1001: conveys a “sense of the Senate” that the corporate federal income tax returns
are signed by the CEO.
Section 1102: provides for fines and imprisonment of up to 20 years for individuals who
corruptly alter, destroy, mutilate, or conceal documents with the intent to impair the documents’
integrity or availability for use in an official proceeding, or to otherwise obstruct, influence, or
impede any official proceeding.
Section 1105: authorizes the SEC to prohibit anyone from serving as an officer or director if the
person has committed securities fraud.
Requires each annual report to contain an “internal control report”, which must include:
INTERNAL CONTROL
• Effectiveness (the degree to which an objective is accomplished) and efficiency (the ability to
accomplish an objective with minimal waste of resources) of operations
• Control environment: Sets the tone of an organization, influencing the control consciousness of
its people. It is the foundation for all other components of internal control, providing discipline
and structure.
• Risk assessment: The entity’s identification and analysis of relevant risks to the achievement
of its objectives, forming a basis for determining how the risks should be managed.
• Control activities: The policies and procedures that help ensure that management directives
are carried out.
• Monitoring activities: A process that assesses the quality of internal control performance over
time.
Control Environment
3. Management establishes, with board oversight, structures, reporting lines, and appropriate
authorities and responsibilities in the pursuit of objectives.
5. The organization holds individuals accountable for their internal control responsibilities in the
pursuit of objectives.
Risk Assessment
6. The organization specifies objectives with sufficient clarity to enable the identification and
assessment of risks relating to objectives.
7. The organization identifies risks to the achievement of its objectives across the entity and
analyzes risks as a basis for determining how the risks should be managed.
8. The organization considers the potential for fraud in assessing risks to the achievement of
objectives.
9. The organization identifies and assesses changes that could significantly impact the system
of internal control
Control Activities
10. The organization selects and develops control activities that contribute to the mitigation of
risks to the achievement of objectives to acceptable levels.
11. The organization selects and develops general control activities over technology to support
the achievement of objectives.
12. The organization deploys control activities through policies that establish what is expected
and procedures that put policies into action.
13. The organization obtains or generates and uses relevant, quality information to support the
functioning of internal control.
15. The organization communicates with external parties regarding matters affecting the
functioning of internal control
Monitoring Activities
16. The organization selects, develops, and performs ongoing and/or separate evaluations to
ascertain whether the components of internal control are present and functioning.
17. The organization evaluates and communicates internal control deficiencies in a timely
manner to those parties responsible for taking corrective action, including senior management
and the board of directors, as appropriate.
FRAUD AND ITS RELATIONSHIP TO CONTROL
By its meaning, fraud is an intentional act or deception meant for unethical or unlawful gain.
Fraud always entails manipulating information for criminal purposes. Foreign Corrupt Practices
Act is the law that is implied to prevent irregularities and states that “a fundamental aspect of
management’s stewardship responsibility is to provide shareholders with reasonable assurance
that the business is adequately controlled”.
The act was made because they want to prevent fraud in the company by doing research and
brainstorming ideas to evaluate the risk of misstatement to consider the valuation of the entity to
the fraudulent activity. The person assigned is the auditor who should take into account the
results of his or her assessment.
The PwC report also indicates that fraud is a worldwide problem that is on a rising trend,
particularly during recessions. Both reports show that the losses are significant. Furthermore,
both reports concur that internal controls and audits are insufficient for detecting fraud. To
address the risk, fraud-prevention programs and detection measures, such as hotlines, are
required.
There are now more prospects for criminal infiltration thanks to the widespread use of
computers in commercial settings and their interconnection with one another and the Internet.
Numerous crimes, including identity theft, fraud, larceny, and embezzlement, have been
committed using computers. Computer fraud, computer abuse, or computer crime are common
terms used to describe crimes using computers. When an organization conducts E-business,
certain of these frauds become more common. For instance, if a transaction is fraudulent, the
company that accepts payment by credit card and when the credit card is not physically present
during the transaction (such as sales made over the phone or online) must suffer the loss.
Computer Crime
Computer crime refers to any crime in which a computer is the intended victim or the means by
which the crime is carried out. The majority of computer crimes fall into these two basic types
where:
The computer is used as a tool for the criminal to accomplish the illegal act. For
example, are those criminals who are using computers to hack an account in the bank.
In the Philippines where E-wallets like G-Cash and Paypal become rampant when it
becomes to paying, these applications are still weak when it comes to internal control
because there are a lot of users that are having problems like their money in the account
missing or being hacked.
The computer or the information stored in it is the target of the criminal. Computer
viruses fall into this category.
Ethical behavior and managerial integrity are outcomes of "corporate culture," which includes
ethical and behavioral standards, how they are communicated, and how they are reinforced in
practice. Official policies specify what management desires to occur. What actually happens
and which rules are followed, bent, or ignored are determined by corporate culture.
Management is in charge of internal control and can respond to this requirement either legally or
by creating a "control environment." In other words, management can either follow the "letter of
the law" (by form) or respond substantively to the need for control. The control environment
reflects the organization's general awareness of and commitment to the importance of control
throughout the organization (primarily the board of directors and management). In other words,
management can make an organization's control conscious by leading by example and
addressing the need for control at the top of the organization.
In this chapter's final major section, we begin our presentation of a framework for assessing the
design of an internal control system, including defining control goals and control plans. We are
still using a matrix to help us with our analysis. This type of matrix is known as a control matrix,
and it is a tool designed to help you evaluate the potential effectiveness of controls in a
business process by matching control goals with relevant control plans. If you remember the
Suprina system flowchart tackled in chapter 4 of the book and now let’s use this process to
understand how internal controls are working. But before that, place yourself as a manager,
what are your concern objectives and the related risks? There are concerns we want to know
as:
We want all of the orders to be entered in a timely manner, but orders might be lost,
stolen, or delayed.
We want all of the orders to be recorded correctly, but we might miss some orders,
record orders we didn’t get from a customer, or record order amounts incorrectly.
We want all inventory changes to be recorded correctly.
We want to accomplish all this with a minimum of resources
A constant theme throughout this text has been that an organization defines goals, assesses
risks, and then implements processes and controls to provide reasonable assurance that those
goals are met. The topic also wants to be consistent to know the purpose of internal control
where the purpose is to provide reasonable assurance of achieving objectives in 3 categories
such as operations, reporting, and compliance with applicable laws and regulations. For our
control framework, we convert those three categories into control goals for two categories,
operations process control goals and information process control goals.
Input validity: Input data are appropriately authorized and represent actual
economic events and objects.
Input completeness: All valid events or objects are captured and entered into a
system once and only once.
Input accuracy: All valid events must be correctly captured and entered into a
system.
Update completeness: All events entered into a system must be reflected in the
respective master data once and only once.
Update accuracy: Data entered into a system must be reflected correctly in the
respective master data
Types of Error
Programming Error - logical or technical errors may exist in the program software
Operational Error - This may happen if input data are used for more than one
application, and we fail to use the inputs for all of the intended processes.
Control Plans
- reflect information-processing policies and procedures that assist in accomplishing control
goals.
Aspects:
Organizational design involves the creation of roles, processes, and formal reporting
relationships in an organization. One aspect of organizational design includes establishing departmental
relationships, including the degree of centralization in the organization. Another aspect involves
personnel reporting structures such as chain of command and approval levels. An example of
organizational design has the upper management of a company reporting to the board of directors.
Another example is separation of operating units such as sales, production from accounting units.
Additionally, we must also bear in mind that organizational design is a key component of a company’s
internal control structure.
The figure as shown on your screen summarizes a general model of the segregation of duties
control plan. As I have mentioned a while ago, segregation of duties is an internal control built for the
purpose of preventing fraud and error in financial transactions. Accordingly, it applies not only to classic
accounting transactions, such as a cash disbursement or credit sale, but also to other events and
activities, such as planning a company dinner or implementing a new general ledger system. In the
simplest way possible, segregation of duties only implies that no matter what the event, for proper
control, more than one person must be involved and functions must be separated.
Illustration of Segregation of Duties
The top half of the table defines the four basic functions. Controls to prevent unauthorized
execution of events help prevent fraud by ensuring that only valid events are recorded. Therefore,
Function 1, authorizing events, takes on particular significance in our segregation of duties model.
Control plans for authorizing or approving events empower individuals or computers to initiate events
and to approve actions taken subsequently in executing and recording events. Meanwhile, the bottom
half of the table extends the coverage of segregation of duties by illustrating the processing of a credit
sales event.
Segregation of duties is a key internal control intended to minimize the occurrence of errors or
fraud by ensuring that no employee has the ability to both perpetrate and conceal errors or fraud in the
normal course of their duties. That being said, an organization must be large enough to support at least
four independent units to implement segregation of duties effectively. For example, the customer
service department might be responsible for accepting customer orders and completing sales orders.
The credit department might be responsible for determining the existence of customers and approving
their creditworthiness. The warehouse might be responsible for safeguarding inventory while it is being
stored. The shipping department might be responsible for protecting inventory while it is awaiting
shipment and for executing the shipment.
Personnel Policy Control Plans consist of the Selection and Hiring Control Plans, Retention
Control Plans, Personnel Development Control Plans, Personnel Management Control Plans, and
Personnel Termination Control Plans, and we are going to discuss it one by one but before that, let us
first define what is policy.
WHAT IS POLICY?
A policy is a plan or process put in place to guide actions and thus achieve goals. The term policy
applies to company activities in a variety of areas.
A policy is a plan or process put in place to guide actions and thus achieve goals. The term policy
applies to company activities in a variety of areas. Accordingly, law can compel behaviors and enforce
penalties for noncompliance such as a law requiring the payment of taxes, policies guide behavior
toward the actions that are most likely to achieve desired goals. One major policy area that significantly
affects internal control in an organization is the area of personnel policies. While all departments within
a company should implement personnel policies, rigorous application of these policies is particularly
important to both fields related to Accounting Information systems.
The figure above are just some of the multitude of control plans that exist for selection and
hiring as well as the number of personnel control plans aimed at mitigating the effects of these types of
risks.
Companies develop policies to provide creative and challenging work opportunities in which the
significance of Retention Control Plans comes along. Apparently, Retention plans are aimed at keeping
qualified personnel. Interviewing, hiring and training employees is costly, thus once an appropriate
employee has been hired, organizations want to retain them.
Personnel planning control plans identify the skill requirements needed in employees to
accomplish the firm’s goals; management controls plans are also put in place to forecast the number of
employees needed in each position, taking potential turnover into consideration, and develop a strategy
for filling necessary positions; job description control plans lay out the responsibilities for each position
on an organization chart and identify the resources to be used in performing those responsibilities; and
supervision control plans involve the processes of approving, monitoring, and observing the work of
others. Personnel security control plans help prevent the organization’s own personnel from committing
acts of fraud or theft of assets. In a nutshell, A personnel management plan is a portion of a business
plan that details how a new business intends to hire, compensate, and utilize its potential employees.
IT Governance - is a process that ensures that the enterprise’s IT supports the organization’s strategies
and objectives as well as protects the organization's assets.
A system having multiple connections among the IT resources within and outside
the organization.
In Hypothetical Systems, IT resources are typically configured with some, or all of the elements
in this figure. This computer system consists of one or more servers clustered together and housed in a
computer room within the organization’s headquarters. This computer is connected to printers, external
storage devices, and PCs, usually called clients, located within the building, and to PCs located in the
organization’s other facilities. All of these connections are via networks, often referred to as local area
networks (LANs) or wide area networks (WANs). Finally, computer facilities operated by other
organizations are connected, perhaps via the Internet and through firewalls, to the internal servers, PCs,
and other equipment.
The IT department is crucial to provide the technology required for a modern company to
support organizational objectives and to provide an environment in which business process control plans
can be effective. The structure of the department helps protect the company from data loss, data theft,
and other misuse, whether intentional or unintentional, from inside and outside the organization. An IT
department makes sure that technology is working for every member of the team so that there are
minimal interruptions to company workflow. The IT department is what keeps a business continuity
strong. They are the ones who make sure the road is paved so the employees can drive their cars on it.
The figure depicts a hypothetical IT department and their hierarchy, and their duties will be
discussed extensively in the next slides. As in any organization, the titles or reporting structures may vary
from company to company as it depends on the size and geographical locations of the company.
However, it is important to be familiar with the functionality of the positions that should exist in most IT
departments.
Segregation of Duties within the IT Department
The figure shows the segregation of duties in the IT department. While users oversee
transaction processing. The IT department is in charge of making the applications work to the
satisfaction of the users through application, data, and control processes. Thus, the IT department is
responsible for implementing and updating programs based on authorized user requests
(implementation), protecting data and computer equipment (security), and accurately and completely
processing data for users (operations). When considering the IT department's responsibilities, keep in
mind the four basic functions of events namely: authorizing events, executing events, recording events,
and safeguarding resources. These responsibilities are treated as events within the IT department and
must be appropriately divided. Programmers, for example, should not be able to authorize a program
change, write the code to change the program, test their own changes, run a program, or have unlimited
data access. Since if they could, a programmer might authorize a change to the payroll program to
double his salary each pay period, execute that change into the computer program code, run the
program, and hide the overpayment by changing the data
IT Organization Function
There are various control issues that are faced by each position within the IT
Department. Hence, the reason why companies implement IT general Controls.
The top of the Organization chart is the CEO of the company. The CEO sets the tone of the
company. Her job would be to set the strategic vision for the company. IT control plans implemented by
the CEO include ensuring that an IT steering committee exists, hiring a qualified CIO, and making sure
that the CIO puts in place an appropriate IT organization and technology infrastructure.
Also, at the top of the Organization chart, we see the IT Steering Committee. The steering
committee guides the IT organization in establishing and meeting user information requirements and in
ensuring the effective and efficient use of its resources. The key control concern of the committee is that
IT is not able to support the organization's objectives. High level interface of executives is an IT control
plan to help keep the committee in touch with organizational objectives. Another IT control process used
by the committee is the IT strategic planning process. As part of the planning process, the IT steering
committee matches the organizational and IT strategic plans and reviews and approves the strategic IT
plan. The strategic plan is then used to set the direction for the IT projects and authorizes the use of
company resources. As part of the planning process, the IT steering committee must also investigate a
competitor’s use of IT and be willing to take advantage of emerging technologies. The strategic IT plan
should not be a static document. Rather, the committee must meet regularly to keep the IT strategic
plan up to date to accommodate changes in organizational objectives and to leverage opportunities to
apply information technology for the strategic advantage of the organization. As you saw in Table 8.2,
the steering committee and the CIO are the main authorizing bodies for the IT department.
The CIO is the most senior executive in an organization responsible for the information
technology that supports the organization’s goals. If any part of the information system suffers a control
failure the CIO is ultimately held responsible. The CIOs responsibilities include: designing the IT
organization, hiring people into the organization, controlling the IT budget, working with vendors, and
responding to IT issues. And as mentioned earlier, the CIO must properly design the IT department to
ensure that IT services are delivered in an efficient and effective manner. IT budget control is also
important as CIO’s must justify IT expenditures compared to IT performance and risks. We previously
discussed the pervasive control of monitoring. The CIO is responsible for ensuring monitoring the
performance of IT services and controls.
Under the CIO is Implementation Supervisor, Security Supervisor, and Operation Supervisor. The
main task of the Implementation Supervisor is to identify, develop or acquire, and implement IT
solutions. He must ensure that projects are undertaken in order of importance, completed on time, and
completed within budget. Projects include both new systems implementations and changes to existing
systems Implementation of software changes is often referred to as the systems development life cycle
(SDLC). The SDLC covers the progression of an information system through the systems development
process, through implementation, to ongoing use and modification. The key control issue in this position
is systems changed or implemented without management approval; systems not implemented on a
timely basis; systems that fail to meet user needs; and systems that cost more than budgeted. Should
unauthorized or untested changes be made to such systems, the results could be disastrous.
The first control plan that must occur in implementation of IT relates to the three analyst
positions which will be discussed thoroughly by our next reporter. But why do we need to have three
analysts? We need three analysts to ensure the segregation of duties within the implementation
process. Having three analysts helps ensure that the system will meet user needs and be implemented
without fraud. Another key control is establishing and using a project-management framework to ensure
that project selection is in line with plans and budgets and that the framework is applied to each project
undertaken. Activities within the project management framework include ensuring impact assessment,
program change controls, release and distribution policies, and methods to ensure that the project
management framework is being utilized. Program change controls provide assurance that all
modifications to programs are authorized and documented and that the changes are completed, tested,
and properly implemented. Changes in documentation should mirror the changes made to the related
programs. As we discussed earlier, improper segregation of duties and improper change controls could
allow a programmer to change a program for her own benefit.
BUSINESS ANALYST
The role of the Business Analyst within the system implementation function is to ensure that the
system meets user needs. The key control risk for the analyst, then, is that a system is developed that
does not meet user needs. The Business Analyst defines information and processing requirements
including inputs, outputs, processes, and data. To ensure that applications will satisfy users’ IT
requirements, the specifications should be developed with system users and be approved by
management and user departments.
SERVICE-LEVEL AGREEMENTS
If a third party is involved in the solution, a service-level agreement must be prepared and
approved. Service-level agreements include such items as the vendor’s responsibility with respect to
system availability, reliability, performance, capacity for growth, levels of user support, disaster
recovery, security, minimal system functionality, and service charges. Even if a third party is not involved
in the system, service-level agreements can be used to communicate IT department responsibilities and
capabilities to the organization’s various business units.
CONTROL PROCEDURE
Another control procedure important in testing is the documentation of defects. We keep
metrics on the number, types and sources of defects. Type refers to where the defect occurred: input
screen, processing step, output report, data storage. Source refers to the analyst responsible for the
system or part of the system. If there is a consistent pattern of defects, then remediation may be
required in the Systems Analyst position or a database design flaw may exist.
APPLICATION DOCUMENTATION
Systems documentation: Provides an overall description of the application, including the system’s
purpose; an overview of system procedures; and sample source documents, outputs, and reports.
Program documentation: Provides a description of an application program and usually includes the
following: The program’s purpose; program flowcharts; source code listings; descriptions of inputs, data,
and outputs; program test data and test results; and a history of program changes and approvals of such
changes.
Operations run manual: Gives detailed instructions to computer operators and to data control about
a particular application. These manuals typically specify input source, form, and when received; output
form and distribution; and computer operation instructions, including setup, required data, restart
procedures, and error messages.
User manual: Describes user procedures for an application. These instructions, which assist users in
preparing inputs and using outputs, include a description of the application, procedures for completing
source documents, instructions on how to input data to the computer, descriptions of manual files and
computerized data, instructions on how to perform manual and automated processing, explanations of
controls and procedures for distributing and using normal outputs.
USER TRAINING
The final step in a new system implementation is user training. Either the Business Analyst or the
Testing Quality Assurance Analyst generally performs user training. Alternatively, if the new system is
provided by a vendor, the vendor might provide user training. User training is important to help users
learn their jobs and perform consistently in those jobs. User training has consistently been found to be a
key factor in any new system’s success.
CONVERSION
Conversion to the new system is the last step in system implementation. At some scheduled
point in time, the old system will be removed and users will start processing in the new system.
MODEL DEVELOPED BY THE BUSINESS CONTINUITY
INSTITUTE
1. Define the scope of the BCP and assign the BCP team responsibilities under the
direction of the Disaster Recovery Manager. The BCP team should be ready to respond in an
emergency.
2. Prioritize the activities and processes and specify the order and the time frame in which
they need to be restored if they are interrupted.
The Access Control Software for online resources has 4 parts. The first one is Identification and
Authentication. Surely, we all know what user IDs and passwords work but one concern about this is
that passwords are notoriously a weak method for authenticating user identifications since a lot of users
just create simple passwords for easier use or recollections. There even exists free software that can
decode simple word passwords in seconds. Companies combat this through applying a password
policy which requires longer passwords and use of random characters. They also train employees not
to write down and divulge or leak their passwords. However, these methods can only do so much. The
best way to mitigate aforementioned password risks is through the second part of the first step:
Authentication.
Authentication combines physical and logical identification control plans to verify a user’s identity. Best
example is a physical control plan where you combine something you are which is a biological part of
you that cannot be taken by anybody else like fingerprints and facial recognition with something you can
possess like a smartcard or token with unique IDs and passwords.
Although the access control software itself is already reliable, most companies employ another method
of protection called Firewall. It is a program or hardware device that filters the information coming
through the Internet connection. It acts like a literal wall blocking unwanted or unknown information
from coming into a private network or computer system.
The last part of the access control software is the Intrusion-detection system which logs and monitors
who is on or trying to access the network. Typical user behavior is accumulated in user profiles.
Subsequently, when usage patterns differ from the normal profile, the exceptional activity is flagged and
reported. Organizations who do not want to wait until an unauthorized activity has occurred might
employ an intrusion-prevention system (IPS) to actively block unauthorized traffic using rules specified
by the organization.
typical user
behavior
Another option to protect data is Data encryption which takes plaintext and translates it to a coded text
form or ciphertext which cannot be read or is unintelligible until it is decrypted. Thus, if the access
control software, firewall, IDS, IPS, and data librarian all fail, unauthorized users still cannot read the
data.
The following are two types of encryption:
- The key used both by the sender to encrypt and by the receiver to decrypt the message is
the same. The drawback to having a single key is that it has to be transmitted by secure
channels. If the key is not kept secret, the security of the entire system is compromised
since anyone who knows the key may access it. To avoid this, companies use the second
type:
- This employs a pair of matched keys for each system user, one private (i.e., known only to the
party who possesses it) and one public. The public and private keys are not the same but the
public key corresponds to the user’s public key.
Another job in the security function is preventing unauthorized break-ins to information systems, usually
referred to as hacking or cracking.
Hacker Cracker
has a malicious
breaks into a computer intent
system but does not
hold malicious intent (e.g., theft of data)
Technique
Name What the Hacker Does
Shoulder Surfing Watches users type in
passwords or user IDs or listens
as they give account
information over the phone.
Dumpster Diving
Password
Cracking Uses software to decode passwords.
Programs match an encrypted version
Phishing
Sends out an e-mail pretending to be a
legitimate business asking for information
about the user’s account.
The table above provides examples of hacking techniques wherein some are called technical
hacking. An example is phishing which would send an email probably containing a link that will
download a malware to your device. Throughout this topic, we will be introduced to hypothetical job
positions which will help us see which control risks and plans positions like theirs are responsible for.
The first one deals with defeating these kinds of technical hacking. To do that, the company’s Security
Supervisor implements an Antivirus software. It is a program designed to detect and remove
viruses and other kinds of malicious software from your computer or laptop.
Aside from the given techniques of hacking, there is a non-technical one called social engineering
relies on tricking people into breaking normal security procedures which is harder to give a concrete
solution or prevention to. In fact, one of the biggest business security risks lists is careless or uninformed
employees. The control solution to social engineering risks is to conduct training and enact security
policies (e.g., password policy, shredding documents policy, clear desk and locked office policies).
Another threat described as a “final serious” one that can affect the ability of Internet-based businesses
is a DoS. In a DoS attack, malicious connection requests are sent from just one compromised device
meaning the attack is coming from one location only. As compared to one of its variants called a DDos
which uses multiple compromised devices to attack. This is the more effective way of attacking because
each computer has its own IP address, meaning it is more difficult to detect that an attack is taking place
than it would be if all the messages were coming from one address.
DOS are attacks that start with fake consumer engagements to cause traffic to the website, therefore
not letting it perform its normal activities which usually are of service to their customers, hence its name
Denial of Service. Its primary goal is not to steal information but to slow down or eventually take down
the website. It is said that the reason hackers do this are diverse; it could be simple fun, financial gain, or
even an ideology or message they want to get across.
Operations Supervisor
To deliver services efficiently and effectively means that computer equipment is functional and in place,
that required data is entered correctly and accurately and is available to users, and that users know how
to operate their systems or can get technical help as needed.
Cloud Computing
Main control concerns:
- Support and overall control of the cloud computing services are largely in the hands of the third-
party cloud service provider. There is typically no 24/7 on-call support, with one-hour response
time common
- Much of the cloud communication occurs over the Internet. Unless a secure network
connection or encrypted line is used, the communication is in clear text with associated security
risks.
- Cloud users commonly use browsers, including older versions that have known security
vulnerabilities.
- Cloud service providers’ employees might have loosely controlled access to sensitive data
stored on their servers.
- Cloud services have been known to go down for up to an hour, and some startup cloud vendors
have even failed.
Database Administrator
Database administrators define data elements, configure data relationships, make sure the database is
normalized, modify the database structure, as necessary for new applications, produce entity
relationship and data flow diagrams, and generate various reports as needed by querying the database.
The Database Administrator and the Access Control Officer must work closely together to ensure
appropriate access to the data in the database. In fact, in some organizations these jobs are joined
together.
The IT control document known as COBIT has had five major releases since its inception in 1996. Each
version of COBIT has taken a more encompassing view of the control of information technology. The
broadening of COBIT model has was released in June 2012 and finalized in June 2013
Thus, COBIT has shifted the center of focus from “IT” to “governance” and is more inclusive than
previous or other competing IT management models. COBIT 5 uses what it calls a “holistic” approach.
This is a complete, comprehensive approach that an enterprise tailors to its own specific needs, putting
IT control within the larger context of enterprise-wide governance and management. occurred as a
result of the increasing importance of IT in organizations.
Meeting Stakeholder Needs. Since enterprises exist to create value for their stakeholders, it makes
sense that THE key objective of governance and management should be value creation. In turn, value
creation has three objectives or components: benefits realization, risk optimization, and resource
optimization.
Principle 2: Covering the Enterprise End-to-End. COBIT 5’s holistic and enterprise orientations
make integrating GEIT into overall enterprise governance a top priority. COBIT 5 is not “IT focused” but
instead takes an enterprise-wide view. It covers all functions and processes in the enterprise and views
all IT governance and management enablers to apply to the entire enterprise—end to end.
Principle 3: Applying a Single, Integrated Framework. COBIT 5 can align with any IT standard,
practice, and guidance procedures available to enterprises at a high level and thereby provide an
enterprise with a single, integrated, overarching framework for IT governance and management. This
overall framework is context and principles based, allowing for flexibility and dealing with open-ended
situations.
Enabling a Holistic Approach. Enablers are the means to achieving COBIT 5’s governance objectives
for the enterprise. Specifically, enablers support the implementation in an enterprise of an all-inclusive
governance and management structure for IT. The COBIT 5 framework specifies seven categories of
enablers as seen on this figure:
PPF applied to (the three above) which are concerned with the organizations’ framework and
Governance: ensures that stakeholder needs, conditions and options are evaluated to determine
balanced, agreed-on enterprise objectives to be achieved; setting directions through prioritization and
decision making; and monitoring performance and compliance against agreed-on direction and
objectives.
Management: plans, builds, runs, and monitors activities in alignment with the direction set by the
governance body to achieve the enterprise objectives.
Differentiation between a process and a domain. A process is a set of procedures and practices,
whereas a domain is a set of processes. COBIT has 5 domains and 37 high-level practices.
5 domains:
Is the domain that assesses the company’s needs. It also observes and evaluates the current
IT system if it is still in line with the company objectives.
CHAPTER 9: Controlling Information Systems: Business Process and Application
Controls
Learning Objectives
● Describe the steps required to build a control matrix.
● Prepare a control matrix.
● Write explanations that describe how the business process and application controls introduced
in this chapter accomplish control goals.
● Describe the importance of business process and application controls to organizations with
enterprise systems including those engaging in E-business.
The control matrix provides a means to document, explain, and analyze the controls that have
been annotated on a systems flowchart. The intention here in Figure 9.1 is to demonstrate the process
which provides us with an overview of the control matrix elements and how they relate to each other,
and walk us through the steps in preparing the matrix.
1. Identify present control plans and annotate them on the systems flowchart.
2. Evaluate present control plans.
3. Identify and evaluate missing control plans (M-1, M-2, through M-n).
a. Examine the control matrix
b. Analyze the systems flowchart for further risk exposures
P-1: Enter data close to the location where the customer order is prepared.
Data entry, as the first step in processing information, is also the phase where most errors are
introduced. Since it mostly requires manual entries that only humans can enter, mistakes are inevitable
when doing so. There are two methods for processing input data which is either through manual and
automated data entry and data entry with batches of input data.
Improvements that have been made to address the errors and inefficiencies of the data entry process:
● The data entry process is frequently automated to reduce or eliminate manual keying
● Business events done via the Internet or electronic data interchange (EDI)
● Multiple steps in a business process may be tightly integrated, as in an enterprise system
The first one is the automation of the data entry process itself with its aim to reduce or fully
eliminate manual keying. The second improvement involves business events processing via the internet
or electronic data interchange wherein buyers and sellers discuss their terms through the internet and
there is no need for manual keying of data. The third improvement is the integration of multiple steps in
an enterprise system as a reduced or even a single step.
The right side of the flowchart indicates the automated data entry process which roughly
parallels the manual entry by the data entry clerk, with a few exceptions. The first data entry is not
through a data entry clerk but through the customer’s computer system and is submitted via the
Internet to the seller’s computer. The signature is needed for verifying that the order is from a legitimate
customer. Then we proceed to compare the input data to the master data. If all automated entries pass
the edits, a message will be sent back to the business partner or customer through the web server
indicating that the input has been accepted for processing.
The sample control matrix included only one effectiveness goal which is to ensure timely input of a
specific event data. The recommended control plans are listed in the first column and the Update
Completeness and Update Accuracy control goals of the information process in the last two columns
have been shaded to emphasize that they do not apply to this analysis because there is no update of any
master data based on the flowchart presented.
Written approvals ensure that the data input arises from a valid business event and that appropriate
authorizations have been obtained by taking the form of signature or initials on a document to indicate
that someone has authorized the transaction. Electronic approvals also exist. The P-2 control number is
under security of resources and input validity.
The third control plan is preformatted screens which control the entry of data by defining the acceptable
format of each data field. Looking at the matrix, the P-3 control number is under effectiveness goal A,
efficient employment of resources and input accuracy because it reduces the number of keystrokes
required, making data entry quicker and more efficient.
Next control plan is for online prompting wherein the system requests user input or asks questions that
the user must answer. For example, after entering all the input data for a particular customer order, you
might be presented with three options: “Accept” the completed screen, “Edit” the completed screen, or
“Reject” the completed screen. On the matrix, the P-4 control number is under effectiveness goal A,
efficient employment of resources and Input accuracy.
5. Populate input screens with master data - by entering an identification code, the system
automatically provides data from the master data
6. Compare input data with master data - manual and automated input of data to determine
its accuracy and validity a. Input/master data match
b. Input/master data dependency checks
c. Input/master data validity and accuracy checks
For the fifth control plan, the system automatically provides data from the master data because with
fewer keystrokes and using the existing data, fewer keying mistakes are expected. It is present under
four cells which are Effectiveness goal A, efficient employment of resources, input validity and input
accuracy.
Next, when the master data is prompted to appear on the screen, it advises the user to determine the
manual data’s accuracy and validity. Under this plan, we have three comparisons: first is Input/master
data match (to test whether the code manually entered will display the existing information about the
same customer). Second is Input/master data dependency checks (to test whether the contents of two
or more data elements of the event have the correct logical relationship). Last type of comparison is
Input/master data validity and accuracy checks (to test whether master data supports the validity and
accuracy of the input). On the matrix, the
P-6 control number is under the same control goals as the fifth plan since it is interrelated.
7. Procedures for rejected inputs - to ensure that erroneous data are corrected and
resubmitted for processing.
8. Programmed edit checks - Erroneous data may be highlighted on the input screen to allow
the operator to take corrective action immediately a. Limit checks
b. Document/record hash totals
c. Mathematical accuracy checks
d. Check digits
Procedures for rejected inputs are designed in case an error was found and that it should be
resubmitted for processing. To make sure that the corrected input does not contain errors anymore, the
corrected input data should undergo all routines through which the input was processed originally. P-7 is
placed under input completeness and input accuracy.
Programmed edit checks is an automated action by the system for immediate rechecking of data input.
The most common types of programmed edit checks are limit checks in which the data contents must
fall within the predetermined limit (for example, the value should only be between the range of 1 and
100). Next is document/record hash totals pertaining to a summary of any numeric data field within the
input document or record. Third is Mathematical accuracy checks used to compare whether the manual
computations tally those automated calculations. Last is Check digits, that refers to an extra digit added
to the identification number of entities, such as a customer number or vendor number calculated
originally by applying a formula to an identification number; the check digit then is appended to the
identification number. P-8 control number is under effectiveness goal A, efficient employment of
resources and input accuracy.
9. Confirm input acceptance - causes the data entry program to inform the user that the input
has been accepted for processing
10. Automated data entry - use of fewer human resources and capture more data in a period of
time than is possible with manual entry.
Confirming input acceptance causes the data entry program to inform the user that the input has been
accepted for processing. By advising the user that input has been accepted, this confirmation helps
ensure input completeness where P-9 is placed in the control matrix.
Automated data entry falls under Effectiveness goal A, efficient employment of resources and input
accuracy.
11. Enter data close to the originating source - strategy for the capture and entry of event-
related data close to the place and time that an event occurs
12. Digital signatures - confirms the identity of the sender and the integrity of an electronic
message to reduce the risk that a communication was sent by an unauthorized user or system
Entering data close to the originating source focuses on real time entries intended for risk free transport
of data since the data is close to the place and time that an event occurs. Input can be more accurate
because the data entry person may be in a position to recognize and immediately correct input errors.
Digital signatures make it possible to confirm the identity of the sender and the integrity of an electronic
message to reduce the probability that a communication was sent by an unauthorized user or system. It
also validates that the communication was not intercepted nor modified in transit. This falls under
security of resources along with input validity and input accuracy.
continuous working is not possible because decreases work time but is more complex to
humans operate this develop
needs trained and well-skilled staff to yield requires more maintenance; thus, it is costly
effective results
Similarities:
1. Minimize risks
2. Improve data and outputs
3. Ensure accuracy and validity
Systems that are commonly used today incorporate immediate mode wherein data is simultaneously
entered into a system as a business event happens. There are still systems that collect data in groups or
batches and then once ready in a subsequent time, is processed.
Manual Controls → those that depend on the ability, training, and diligence of the data entry
personnel. Basically, it needs human interaction or intervention to be able to be effective. That is why
training and knowledge is important among data entry clerks, since they must be familiar with the
technicalities and the concepts towards data entry.
For example, written approvals will only be effective if the clerk is informed of the validity and approval
of documents to be inputted, further, they must know when there are errors between the master data
and the inputs formerly recorded and then fix the said differences.
Automated controls → everything that is performed by the computer system which depends on
general controls or ITGCs. Thus, the company must ensure that these automated controls work well as
planned or as designed, considering that these are prone to technical issues, as
Automated control example is an ERP system three-way matching where the ERP system automatically
reconciles the purchase invoice to the underlying purchase order and goods receipt. Other examples
include electronic approvals, comparing inputs with master data, digital signatures, and so on.
In conclusion, Manual needs human actions, whereas in Automated, it works on computerized actions.
Above is an example of a batch processing system. The procedure of the batch processing system is
reflected in the flowchart. From the left side, in the first column, the shipping department receives the
picking tickets from the warehouse together with the goods bound for shipment. Then this is where
batches come into action. Upon receiving the tickets, an employee combines these into groups of 25, for
example and then calculate the batch totals. Batch total, to reiterate, is the sum of a particular field in a
collection of items used as a control total to ensure that all data has been entered into the computer.
Then, the batch of documents is scanned. Along with the recording of the batch, the program calculates
totals for the batch and then displays that to the shipping clerk. The inputs and outputs are then
reconciled by the clerk, if there are errors, an error-correcting routine is done. The process repeats on a
daily basis, whenever picking tickets are released.
On a periodic basis, the computer receives shipment data for processing. The program records the
inputs on the sales journal and updates the accounts receivable master data to create a new open
receivable. Invoices are printed and sent to the customer along with the packing slips sent to the
shipping department before the goods are delivered to the customer.
In this type of system, an output usually produced is what we call an exception and summary report
which shows the events that happened in a detailed or summarized form, or can be both in which the
data accepted or rejected by the system are also reflected.
Shown above is the Application of the Control Framework to the system previously discussed. In this
table, a complete control matrix is shown for flowchart provided earlier. It shows the location where the
recommended control plans must be placed in the system. You can see the codes P-1, P-2 and so on the
screen, and the other codes there, M-1 and M-2, are controls assumed to be missing that the process
description failed to specify.
Batch Control Plans - regulate information processing. For it
to be effective, the following must be ensured:
Each of the recommended control plans shown earlier in the matrix has its own use. To define Batch
control plans, these are those that regulate the processing of information by calculating control totals
at various points in a processing run and then after, the totals will be compared. Batch totals must be
reconciled manually or digitally.
There are various types of batch totals, and each one is used more appropriately than the other in
certain situations. First one is the Document/Record counts, wherein simple counts of the number
of documents are entered into the system. It shows the minimum level required to be able to control
input completeness but since only one document is used, accuracy, validity, and completeness cannot
be effectively satisfied. Second is the Item or Line count which are counts of the number of items or
lines of data entered, for example, the different items on a sales document. Though it improves the
three, it does not guarantee absolute accuracy because of human error in entering a line. Next one is
Dollar totals that serve as summation of the dollar value of items in the batch, this reduces the
possibility of several errors, thus improves the three criteria earlier. Lastly, Hash totals are the
summation of any number data existing for all documents in the batch. This can determine if inputs have
been altered, added, duplicated or deleted.
Control Plans:
1. Turnaround documents - Turnaround documents are used to be able to capture and input a
subsequent event. Examples of this include picking tickets, inventory count sheets and remittance
advice stubs that are attached with the customer invoices. It is used for the input of individual items
more than batches.
2. Key Verification - Key verification is when input documents are keyed by one individual and then
rekeyed by another one. This is done to compare the keystrokes done by the first clerk, with that,
differences can be identified and errors are assumed to be done by the other person.
3. Sequence Checks - Sequence checks are done when documents are numbered sequentially when
prepared or received from an external source or the input document is prenumbered. This is applied
to determine that all the documents have been processed, no extras, and duplicates.
4. Manual Reconciliation of Batch totals - operates in such a manner where one or more of , it
operates in such a manner where one or more of the batch totals are established manually, then
individual event descriptions are entered. The computer produces reports at the end of the process
and then the batch totals are reconciled by determining why the totals do not coincide while making
corrections to the input data.
7. Tickler File (Review Tickler file) - It is a manual file of documents containing business event data
that is pending for further action.
8. One-for-one checking - It is a detailed comparison of the individual elements of two or more data
sources to determine that they agree.