Arens AAS18 SM 11
Arens AAS18 SM 11
Concept Checks
P. 379
11-1
© 2023 Pearson Education, Ltd.
An assessment of the effectiveness of the internal control
structure and procedures for financial reporting as of the end of
the company’s fiscal year.
P. 388
The control environment is the broadest of the five and deals primarily with
the way management implements its attitude about internal controls. The
other four components are closely related to the control environment. In the
context of internal controls related to financial reporting, risk assessment is
management’s identification and analysis of risks relevant to the preparation
of financial statements in accordance with accounting standards.
Management implements control activities and creates the accounting
information and communication system in response to risks identified as
part of its risk assessment to meet its objectives for financial reporting.
Finally, management periodically assesses the quality of internal control
performance to determine that controls are operating as intended and that
they are modified as appropriate for changes in conditions (monitoring). All
five components are necessary for effectively designed and implemented
internal control.
11-2
© 2023 Pearson Education, Ltd.
Concept Checks (continued)
P. 398
1. General controls relate to all aspects of the IT function. They have a global
impact on all software applications. General controls include controls related
to system access, system changes, and IT operations management. An
example of an access control is required use of passwords and user IDs
with access limited to authorized users. An example of a system
management control is appropriate testing and approval by users of
system changes. Application controls apply to the processing of
individual transactions. Examples of application controls include a
programmed control that verifies that all time records submitted are for
valid employee ID numbers included in the electronically accessible
employee database; and a control that recomputes net pay from gross pay
and deductions.
Review Questions
11-3 There are eight parts of the planning phase of audits: accept client and
perform initial audit planning, understand the client’s business and industry,
perform preliminary analytical procedures, set preliminary judgment of
materiality and performance materiality, identify significant risks due to fraud or
error, assess inherent risk, understand system of internal control and assess
control risk, and finalize overall audit strategy and audit plan. Understanding
internal control and assessing control risk is therefore part seven of planning.
Only finalizing the audit strategy and audit plan follow understanding internal
control and assessing control risk.
11-5 The COSO Internal Control – Integrated Framework is the most widely
accepted internal control framework in the U.S. The COSO framework,
updated in 2013, describes internal control as consisting of five components
that management designs and implements to provide reasonable assurance
that its control objectives will be met. Each component contains many
controls, but auditors concentrate on those designed to prevent or detect
material misstatements in the financial statements.
11-4
© 2023 Pearson Education, Ltd.
11-7 The five categories of control activities are:
Adequate separation of duties
Example: The following two functions are performed by
different people: processing customer orders and billing of
customers.
Proper authorization of transactions and activities
Example: The granting of credit is authorized before
shipment takes place.
Adequate documents and records
Example: Recording of sales is supported by authorized
shipping documents and approved customer orders.
Physical control over assets and records
Example: A password is required before an entry can be
made into the computerized accounts receivable database.
Independent checks on performance
Example: Bilingl clerk verifies prices and quantities on sales
invoices before they are sent to customers.
11-9 An example of a physical control the client can use to protect each of
the following assets or records is:
1. Computers should be in an area protected by security and should
be protected from extreme temperatures. Access should be
password-protected.
2. Cash received by retail clerks should be entered into a cash
register to record all cash received.
3. Adequate backup copies of computerized accounts receivable
records should be maintained and access to the database files
should be restricted via passwords. Other accounts receivable
records should be stored in a locked, fireproof safe.
4. Raw material inventory should be retained in a locked storeroom
with a reliable and competent employee controlling access.
5. Hand tools should be stored in a locked storeroom under control
of a reliable employee.
6. Manufacturing equipment should be kept in an area protected by
security and fire alarms and kept locked when not in use.
7. Marketable securities should be stored in a safety deposit vault.
11-5
© 2023 Pearson Education, Ltd.
11-10 Independent checks on performance are internal control activities
designed for the continuous internal verification of other controls. Examples of
independent checks include:
Preparation of the monthly bank reconciliation by an individual
with no responsibility for recording transactions or handling cash.
Recomputing inventory extensions for a listing of inventory by
someone who did not originally do the extensions.
The preparation of the sales journal by one person and the
accounts receivable database by a different person, and a
reconciliation of the control account to the database file.
The counting of inventory by two different count teams.
The existence of an effective internal audit staff.
11-11 The most important internal control deficiency that permitted the
embezzlement to occur was the failure to adequately segregate the accounting
responsibility of recording billings in the sales journal from the custodial
responsibility of receiving the cash. Regardless of how trustworthy James
appeared, no employee should be given the combined duties of custody of
assets and accounting for those assets.
11-12 Internal auditors, who report directly to the management, perform risks
assessment:
1. Internal auditors go around the business to check and monitor the
internal controls.
2. They have regular townhall meetings with all staff to share the
future strategic views and the importance of internal controls.
3. As part of employees’ annual appraisals, the importance of
internal control needs to be included as a key performance
indicator.
11-13 The primary focus of the monitoring component of internal control is for
management to conduct ongoing and periodic assessments of the quality of
internal control to determine that controls are operating as intended and they
are modified as appropriate for changes in conditions. Thus, the focus is on the
evaluation of effectiveness of all the components of internal control to deter-
mine if there are deficiencies in internal control that management should
remediate.
11-14 The proper installation of IT can lead to internal control enhancements
by replacing manually performed controls with computer-performed controls. IT-
based accounting systems can handle tremendous volumes of complex
business transactions cost effectively. Computer-performed controls can
reduce the potential for human error by replacing manual controls with
programmed controls that apply checks and balances to each transaction
processed. The systematic nature of IT offers greater potential to reduce the risk
of material misstatements resulting from random, human errors in processing.
11-6
© 2023 Pearson Education, Ltd.
11-14 (continued)
The use of IT-based accounting systems also offers the potential for
improved management decisions by providing more and higher-quality information
on a timelier basis than traditional manual systems. IT-based systems are
usually administered effectively because the complexity requires effective
organization, procedures, and documentation. That in turn enhances internal
control.
11-7
© 2023 Pearson Education, Ltd.
11-16 In most traditional accounting systems, the duties related to authorization
of transactions, recordkeeping, and custody of assets are segregated
across three or more individuals. As accounting systems make greater use of
IT, many of the tasks that were traditionally performed manually are now
performed by the computer. As a result, some of the traditionally segregated
duties, particularly authorization and recordkeeping, fall under the responsibility
of IT personnel. To compensate for the collapsing of duties under the IT
function, key IT tasks related to programming, operation of hardware and soft-
ware, and data control are segregated. Separation of those IT functions
restricts an IT employee’s ability to inappropriately access software and data
files in order to misappropriate assets.
11-17 If general controls are effective, there is an increased likelihood of
placing greater reliance on automated application controls. Stronger general
controls should lead to greater likelihood that automated application
controls operate effectively and data files contain accurate, authorized, and
complete information. If general controls are ineffective, there is a potential
for material misstatement in each computer-based accounting application,
regardless of the quality of automated application controls. If, for example, the
systems development process is not properly controlled, there is a greater risk
that unauthorized and untested modifications to accounting applications software
have occurred that may have affected the automated control.
11-18 Because many companies that operate in a network environment
decentralize their network servers across the organization, there is an increased
risk for a lack of security and lack of overall management of the network
operations. The decentralization may lead to a lack of standardized equipment
and procedures. In many instances responsibility for purchasing equipment and
software, maintenance, administration, and physical security often resides with
key user groups rather than with a centralized IT function. Also, network-related
software often lacks the security features, including segregation of duties,
typically available in traditionally centralized environments because of the ready
access to software and data by multiple users. In database management
systems where many applications share the same data, controls can often be
strengthened as data are more centralized and duplicate files can be
eliminated. However, there are also increased risks in some cases given that
multiple users, including individuals outside accounting, access and update
data files. Without proper database administration and access controls, risks of
unauthorized, inaccurate, and incomplete data files increase. Centralization of
data also increases the need to properly back up data information on a regular
basis.
11-8
© 2023 Pearson Education, Ltd.
11-19 Three risks related to an online sales system that management should
consider:
1. Risk: Large fluctuations
Internal controls: Hedge by purchasing cryptocurrency, so that if it rises
or falls, there will be sufficient cryptocurrency to maintain liquidity.
2. Risk: Exchange rate differences
Internal controls: They could purchase items or make payment for
services using cryptocurrency, so that they will not suffer from the
exchange rate movements between cryptocurrency and fiat currency.
3. Risk: Incorrect entry is made or there is loss on the price between the
fiat and cryptocurrency
Internal control: Internal control could mandate that the customer
chooses the type of currency to make the payment before the transaction
is made to ensure that the correct currency is reflected in the system,
and the exchange differences between cryptocurrency and fiat currency
could also be updated regularly to reflect the movements, so that
customers are aware and the prices are updated accordingly.
11-23
1. a. Control environment
2. c. Control activities
3. d. Information and communication
4. c. Control activities
5. a. Control environment
6. b. Risk assessment
7. e. Monitoring
8. d. Information and communication
9. c. Control activities
10. b. Risk assessment
11-9
© 2023 Pearson Education, Ltd.
11-10
© 2023 Pearson Education, Ltd.
11-24
a. b.
TRANSACTION-
CONTROL RELATED AUDIT
INTERNAL CONTROL ACTIVITY OBJECTIVE(S)
1. Checks are signed by the company Adequate Occurrence
president, who compares the checks with separation of Accuracy
the underlying supporting documents. duties
Independent
checks on
performance
2. Sales invoices are matched with shipping Adequate Occurrence
documents by the computer system and an documents and
exception report is generated. records
3. Receiving reports are prenumbered and Adequate Completeness
accounted for on a daily basis. documents and Timing
records
4. The accounts receivable data file is Independent Posting and
reconciled to the general ledger on a checks on summarization
monthly basis. performance
5. Sales invoices are independently verified Independent Accuracy
before being sent to customers. checks on
performance
6. Payments by check are received in the Adequate Completeness
mail by the receptionist, who lists the separation of
checks and restrictively endorses them. duties
7. Labor hours for payroll are reviewed for Independent Occurrence
reasonableness by the computer system. checks on Accuracy
performance
Proper
authorization of
transactions
8. Unmatched shipping documents are Physical control Completeness
accounted for on a daily basis. over documents Timing
and records
9. The computer system verifies that all Adequate Occurrence
payroll payments have a valid employee separation of
identification number assigned duties
by the human resources department at the
time of hiring.
11-11
© 2023 Pearson Education, Ltd.
11-25
a.
3. Mobile phones were sent to customers before Absence of controls for ensuring that payments
payment was cleared in the bank statement. are cleared before goods are shipped to
customers.
4. Staff obtain a 15% discount on all mobile Absence of controls for monitoring and
phones, so whenever a new product was restricting staff discounts and for accurately
launched, they could keep aside as many recording inventory levels.
mobile phones as they wished. When they kept
the mobile phones aside, they edited the
inventory system.
5. The accounts manager processed payments Absence of proper segregation of duties, such
to his wife by adding a fictitious vendor address as separating the duties of the accounts
to the approved vendor list, and occasionally manager from the duties of the vendor payment
when he felt he needed a bonus, he paid processing.
himself.
6. Pineapple Store also provides services Absence of controls for ensuring that add-ons
through their apps, such as games, and allows are properly billed and recorded.
customers to pay for additional add-ons.
Recently some of their customers have
informed them that they have paid double the
amount for their add-ons.
7. For one of the other apps, Pineapple Store Absence of controls for ensuring the accuracy
was billing customers half the original amount. It of the price of the app and for monitoring and
was only at the end of the month when the reconciling actual revenue to budget.
accounts manager was reviewing the actual
revenue to budget that they realized that the
price of the app was incorrect.
8. The wrong barcode was incorrectly pasted on Absence of proper quality control procedures
a batch of its mobile phones. for ensuring the accuracy of barcodes on
products.
11-12
© 2023 Pearson Education, Ltd.
11-25 (continued)
b.
4. Staff obtain a 15% discount on all mobile The misstatement impacts the accuracy and
phones, so whenever a new product was completeness of inventory records, and the
launched, they could keep aside as many mobile proper calculation of staff discounts.
phones as they wished. When they kept the
mobile phones aside, they edited the inventory
system.
5. The accounts manager processed payments to The misstatement impacts the accuracy and
his wife by adding a fictitious vendor address to completeness of vendor payments and the
the approved vendor list, and occasionally when proper segregation of duties.
he felt he needed a bonus, he paid himself.
6. Pineapple Store also provides services through The misstatement impacts the accuracy and
their apps, such as games, and allows customers completeness of customer billing and the
to pay for additional add-ons. Recently, some of proper recording of add-ons.
their customers have informed them that they
have paid double the amount for their add-ons.
7. For one of the other apps, Pineapple Store has The misstatement impacts the accuracy and
been billing customers half the original amount. It completeness of revenue and the proper
was only at the end of the month when the reconciliation of actual revenue to budget.
accounts manager was reviewing the actual
revenue to budget that they realized that the price
of the app was incorrect.
8. The wrong barcode was incorrectly pasted on The misstatement impacts the accuracy and
a batch of its mobile phones. completeness of product information and the
proper quality control of products.
11-13
© 2023 Pearson Education, Ltd.
11-25 (continued)
c.
11-14
© 2023 Pearson Education, Ltd.
11-25 (continued)
The five components of the Committee of Sponsoring Organizations of the
Treadway Commission (COSO) internal control framework are the following:
● Control environment: This component refers to the tone at the top
and the overall culture of an organization, including management’s
attitude toward internal control, ethics and integrity, and how risks are
managed.
● Risk assessment: This component refers to the ongoing process of
identifying and assessing the risks facing an organization. It includes
identifying the potential impact of these risks and determining the
likelihood of their occurrence.
● Control activities: This component refers to the policies and
procedures put in place to help ensure that the organization’s objectives
are met. Examples of control activities include approvals, authorizations,
verifications, and reconciliation processes.
● Information and communication: This component refers to the flow of
information within an organization and the communication of that
information to those who need it. It includes the accuracy, timeliness, and
completeness of information.
● Monitoring: This component refers to the ongoing assessment of the
internal control system to ensure that it is functioning effectively and to
identify any areas that need improvement. It can be performed by
management, internal audit, or an independent external audit.
11-26 The criteria for dividing duties is to keep all asset custody duties with
one person (Cooper). Document preparation and recording is done by the other
person (Sanchez). Singh will perform independent verification. The two most
important independent verification duties are the bank reconciliation and
reconciling the accounts receivable database file with the control account;
therefore, they are assigned to Singh. The duties should be divided among the
three as follows:
Roberta Sanchez: †2 †
4 †
5 †
7 †
9 †
11 14 16 17
† † † † † †
James Cooper: 1 3 6 8 10 12 13
Mohini Singh: 15 18
11-15
© 2023 Pearson Education, Ltd.
11-27 A schedule showing the pertinent transaction-related management
assertions and application controls for each type of misstatement is below
and on the following page.
a. b.
TRANSACTION- AUTOMATED
MISSTATEMENT RELATED ASSERTION CONTROLS
1. A customer order was Recorded transactions Preprocessing
filled and shipped to a exist (occurrence) authorization
former customer that had Preprocessing review
already filed bankruptcy.
Programmed controls
(e.g., comparison
to customer file)
2. For a sale, a data entry Existing transactions Conversion
operator erroneously are recorded verification (e.g.,
failed to enter the (completeness) key verification)
information for the Programmed controls
salesperson’s (e.g., check field for
department. As a result, completeness)
the salesperson received
no commission for that
sale.
3.A customer number Recorded transactions Key entry verification
on a sales invoice was exist (occurrence) Check digit
transposed and, as a result, Amounts and other
charged to the wrong Reconciliation to
data relating to customer number on
customer. By the time the recorded transactions
error was found, the original purchase order and
and events have been bill of lading
customer was no longer in recorded appropriately
business. (accuracy)
11-16
© 2023 Pearson Education, Ltd.
11-27 (continued)
11-17
© 2023 Pearson Education, Ltd.
11-28
* This solution assumes the data control procedures will serve as a check on
the computer operator and will allocate work across both persons.
11-18
© 2023 Pearson Education, Ltd.
11-29 (continued)
For larger IT functions, programmers are split into subgroups
with some programmers only authorized to address programming
issues for application software (e.g., the sales application) while
other programmers are only authorized to address programming
issues for systems software, such as operating software.
11-19
© 2023 Pearson Education, Ltd.
11-30
a. The strengths of Hardwood Lumber Company’s computerized accounting
system include the following:
Separate departments for systems programming, applications
programming, operations, and data control.
Some employees have READ ONLY capabilities, and others have
CHANGE or RUN capabilities.
The computer room is locked and requires a key-card for access
which enhances security surrounding unauthorized access.
Network operations is responsible for maintaining program files.
Backup copies of program files and data files are maintained.
Programmers are restricted to READ ONLY access to all live
application software program files.
Data control clerks have no access to software program files.
b. Recommendations to improve Hardwood Lumber Company’s
Information Systems function:
The Vice President of Information Systems Technology (VP of IT)
should report on a day-to-day basis to senior management (e.g.,
the president) and should not be under the authority of user
personnel. This ensures that the IT function is not subordinate to
a user function, which might inappropriately allocate IT
resources to that user function’s projects.
The VP of IT should have access to the board of directors and
should be responsible for periodically updating the board on
significant IT projects. Perhaps, the board should create an IT
Steering Committee to oversee IT activities (like the Audit Committee
oversees the financial reporting process).
Operations staff should not have responsibility for maintaining the
operating software security features. This responsibility should be
assigned to a more senior, trusted IT individual, such as the VP
of IT.
Video monitors should be examined continually. The actual monitors
could be viewed on an ongoing basis by building security guards.
Hardwood should consider taping what the cameras are viewing
for subsequent retrieval in the event of a security breach.
Hardwood may consider purchasing a vendor-developed access
security software package to strengthen online security beyond
the features currently provided by the operation software’s security
features.
Restrict programmer access to test copies of software programs
for only those programs that have been authorized for program
change. Access to copies of other programs may not be necessary
when those programs have not been authorized for change.
Grant systems programmers access only to approved test copies
of systems software, and grant application programmers access
only to approved copies of application software.
11-20
© 2023 Pearson Education, Ltd.
11-30 (continued)
11-21
© 2023 Pearson Education, Ltd.
11-31 (continued)
the legitimacy of the sales and related receivables due from the
German Distributor. According to the SEC, the finance personnel
failed to follow-up on issues identified in emails they received and
they appeared to overlook key trends in the accounts receivable
reports and key collection ratios that seemed to indicate that
collection from the German Distributor was unlikely. They also
appeared to overlook the fact that a large volume of sales took
place the last few days of each quarter.
■ Case
11-32 a. Sales
TRANSACTION-RELATED
ASSERTION CONTROL
11-23
© 2023 Pearson Education, Ltd.
11-32 (continued)
TRANSACTION-RELATED
ASSERTION CONTROL
b. Cash Receipts
TRANSACTION-RELATED
AUDIT OBJECTIVE CONTROL
Occurrence Monthly bank reconciliation is prepared.
Accounts receivable clerk compares
electronic copy of the deposit slip from
bank to sales and cash receipts journal.
Cash receipts are prelisted when mail opened.
Completeness Cash register is used for cash sales.
Cash collected on receivables is prelisted.
Only supervisor operates computer cash register.
Supervisor deposits money in a locked box.
Store owner approves all write-offs of accounts
receivable.
All correspondence and complaints are resolved
by the owner.
Accuracy Supervisor recaps credit and cash sales and
compares totals to the daily computer-generated
summary.
Monthly bank reconciliation prepared.
Accounts receivable clerk compares the
electronic deposit slip from bank to cash sales
and cash receipts journal.
Monthly statements are sent to customers.
Computer is used to update records.
An aged trial balance is generated by the
computer weekly and reviewed by the owner.
Classification None listed
Cutoff Cash is deposited daily.
Presentation None listed
11-24
© 2023 Pearson Education, Ltd.
11-32 (continued)
11-25
© 2023 Pearson Education, Ltd.