AIS CHAP 3 notes
AIS CHAP 3 notes
constituents.
Ethical standards are derived from
societal mores and deep-rooted personal For example, implementing a new
beliefs about issues of right and wrong computer information system within an
that are not universally agreed upon. organization may cause some employees
to lose their jobs, while those who remain
BUSINESS ETHICS
enjoy the benefit of improved working
Ethics - principles of conduct that conditions. Seeking a balance between
individuals use in making choices and these consequences is the managers’
guiding their behavior in situations that ethical responsibility.
involve the concepts of right and wrong.
ETHICAL PRINCIPLES
Business Ethics answers to two
PROPORTIONALITY
questions
The benefit from a decision must
(1)How do managers decide what is outweigh the risks.
right in conducting There must be no alternative
(2)Once managers have recognized decision that provides the same or
what is right, how do they achieve greater benefit with less risk.
it? JUSTICE
The benefits of the decision should
4 AREAS OF ETHICAL ISSUES IN
be distributed fairly to those who
BUSINESS
share the risks.
1. Equity Those who do not benefit should not
2. Rights carry the burden of risk.
3. Honesty MINIMIZE RISK
4. Exercise of corporate power Even if judged acceptable by the
principles, the decision should be
implemented so as
to minimize all of the risks and avoid
any unnecessary risks.
COMPUTER ETHICS
FRAUD SCHEMES
3 broad categories of fraud schemes
1. Fraudulent statements
2. Corruption
3. Asset misappropriation
I. FRAUDULENT STATEMENTS
Associated with management fraud.
While all fraud involves some form of
financial misstatement, to meet the
definition under this class of fraud
scheme, the financial statement
misrepresentation must itself bring direct
or indirect financial benefit to the
CONCLUSION TO BE DRAWN perpetrator.
Position. Individuals in the highest
positions within an organization are Misstating the cash account balance to
beyond the internal control structure cover the theft of cash is not financial
and have the greatest access to statement fraud. Understating liabilities
company funds and assets. to present a more favorable financial
Gender. Women are not picture of the organization, to drive up
fundamentally more honest than stock prices.
4. Inappropriate Accounting
Practices
THE UNDERLYING PROBLEMS
Using of special-purpose entities to
The series of events symbolized by the hide liabilities through off-balance-
Enron, WorldCom, and Adelphia debacles sheet accounting
caused many to question whether our Ex. When a company sold a contract
existing federal securities laws were (providing gas for a period of 2 years),
adequate to ensure full and fair financial the company would recognize all the
disclosures by public companies. future revenue in the period when the
contract was sold.
1. Lack of Auditor Independence.
Auditing firms that are also engaged
SARBANES-OXLEY ACT AND FRAUD
by their clients to perform
This landmark legislation was
nonaccounting activities, such as
written to deal with problems
actuarial services, internal audit
related to capital markets,
outsourcing services, and consulting,
corporate governance, and the
lack independence.
auditing profession.
The firms audit their own work and the
Framework to modernize and reform
risk is that as auditors they will not
the oversight and regulation of
bring to management’s attention the
public company auditing. Its
detected problems that may affect
principal reforms pertain to:
their consulting fees.
1. The creation of an accounting
Ex. Internal auditors are also the
oversight board;
management consultants.
2. auditor independence;
3. corporate governance and
2. Lack of Director Independence.
responsibility;
Directors who have personal
4. disclosure requirements; and
relationships by serving on the boards
5. penalties for fraud and other
of other directors of companies
violations
Business trading relationship – key
customers/suppliers. Provisions
Financial relationship – primary
1. Accounting Oversight Board.
stockholders/received personal loans
SOX created a Public Company
from the company
Accounting Oversight Board.
Operational relationship – employee of
PCAOB is empowered to set
the company
auditing, quality control, and ethics
standards; to inspect registered
3. Questionable Executive
accounting firms; conduct
Compensation Schemes.
investigations; and take disciplinary
Excessive use of short-term stock
actions.
options to compensate directors and
executives may result in short-term
2. Auditor Independence
thinking and strategies aimed at
addresses auditor independence by
driving up stock prices at the expense
creating more separation between a
of the firm’s long-term health.
firm’s attestation and non-auditing
activities.
intended to specify categories of new corporate disclosure
services that a public accounting requirements:
firm cannot perform for its client a. Public companies must report
all off-balance-sheet
transactions.
9 functions: b. Annual reports filed with the
a. Bookkeeping or other services SEC must include a statement
related to the accounting records by management asserting that
or financial statements it is responsible for creating and
b. Financial information systems maintaining adequate internal
design and implementation controls and asserting to the
c. Appraisal or valuation services, effectiveness of those controls.
fairness opinions, or contribution- c. Officers must certify that the
in-kind reports company’s accounts “fairly
d. Actuarial services present” the firm’s financial
e. Internal audit outsourcing services condition and results of
f. Management functions or human operations.
resources d. Knowingly filing a false
g. Broker or dealer, investment certification is a criminal
adviser, or investment banking offense.
services
h. Legal services and expert services 5. Fraud and Criminal Penalties
unrelated to the audit Creates new federal crimes relating to
i. Any other service that the PCAOB the destruction of documents or audit
determines is impermissible work papers, securities fraud,
tampering with documents to be used
3. Corporate Governance and in an official proceeding, and actions
Responsibility against whistle-blowers.
requires all audit committee
members to be independent and II. CORRUPTION
requires the audit committee to Involves an executive, manager, or
hire and oversee the external employee of the organization in collusion
auditors. with an outsider.
Two other significant provisions of four principal types of corruption:
the act relating to corporate bribery, illegal gratuities, conflicts of
governance are: interest, and economic extortion.
o public companies are prohibited
from making loans to executive BRIBERY
officers and directors, Giving, offering, soliciting, or receiving
o the act requires attorneys to things of value to influence an official in
report evidence of a material the performance of his or her lawful
violation of securities laws or duties.
breaches of fiduciary duty to
the CEO, CFO, or the PCAOB. ILLEGAL GRATUITIES
Giving, receiving, offering, or soliciting
4. Issuer and Management something of value because of an official
Disclosure. act that has been taken. This is similar to
a bribe, but the transaction occurs period from Customer C. are then applied
after the fact. to the account of Customer B, and so on.
Form a second line of defense, identify Section 302 requires that corporate
anomalies and draw attention to them management (including the CEO) certify
the organization’s internal controls on a
Devices, techniques, and procedures quarterly and annual basis.
designed to identify and expose risks
that have eluded preventive controls. Section 404 requires the management of
Detective controls reveal specific types of public companies to assess the
errors by comparing actual occurrences effectiveness of the organization’s
to preestablished standards. internal controls. This entails providing
an annual report addressing the following
When the detective control identifies a points:
departure from standard, it sounds an (1)a statement of management’s
alarm to focus attention on the problem. responsibility for establishing and
maintaining adequate internal
CORRECTIVE CONTROLS control,
(2)an assessment of the effectiveness
Actions taken to reverse the effects of of the company’s internal controls
errors over financial reporting,
detected in the previous step. (3)a statement that the organization’s
external auditors have issued an
Corrective controls actually fix the attestation report on management’s
problem. For any detected error, assessment of the company’s
however, there may be more than one internal controls,
feasible corrective action, and the best (4)an explicit written conclusion as to
course of action may not always be the effectiveness of internal control
obvious. over financial reporting, and
(5)a statement identifying the
The PDC control model is conceptually framework used in the assessment
complete but offers little practical of internal controls.
guidance for designing specific controls.
For this, we need a more precise COSO INTERNAL CONTROL
framework. The current authoritative FRAMEWORK
document for specifying internal control COSO framework consists of five
objectives and techniques is Statement components: the control environment,
on Auditing Standards (SAS) No. 109,19 risk assessment, information and
which is based on the COSO framework. communication, monitoring, and control
activities.
THE CONTROL ENVIRONMENT
The foundation for the other four control Risks can arise or change from the
components. The control environment following circumstances:
sets the tone for the organization and Changes in the operating
influences the control awareness of its environment that impose new or
management and employees. changed competitive pressures on
Elements: the firm.
The integrity and ethical values of New personnel who have a different
management. or inadequate understanding of
The structure of the organization. internal control.
The participation of the New or reengineered information
organization’s board of directors and systems that affect transaction
the audit committee, if one exists. processing.
Management’s philosophy and Significant and rapid growth that
operating style. strains existing internal controls.
The procedures for delegating The implementation of new
responsibility and authority. technology into the production
Management’s methods for process or information system that
assessing performance. impacts transaction processing.
External influences, such as The introduction of new product lines
examinations by regulatory agencies. or activities with which the
The organization’s policies and organization has little experience.
practices for managing its human Organizational restructuring resulting
resources. in the reduction and/or reallocation
of personnel such that business
SAS 109 requires that auditors obtain operations and transaction
sufficient knowledge to assess the processing are affected.
attitude and awareness Entering into foreign markets that
of the organization’s management, board may impact operations (i.e., the risks
of directors, and owners regarding associated with foreign currency
internal control. transactions).
Adoption of a new accounting
Guidelines that represent best practices principle that impacts the
Sepearate CEO and chairman preparation of financial statements.
Set ethical standards
Establish and independent audit
committee INFORMATION AND COMMUNICATION
Compensation committees
The accounting information system
Nominating committees
consists of the records and methods used
Access to outside professionals
to initiate, identify, analyze, classify, and
record the organization’s transactions
RISK ASSESSMENT
and to account for the related assets and
liabilities.
Organizations must perform a risk
assessment to identify, analyze, and The quality of information the accounting
manage risks relevant to financial information system generates impacts
reporting. management’s ability to take actions and
make decisions in connection with the separate procedures or by ongoing
organization’s operations and to prepare activities.
reliable financial statements.
CONTROL ACTIVITIES
Policies and procedures used to ensure
An effective accounting information that appropriate actions are taken to deal
system will: with the organization’s identified risks. 2
categories of control activities:
Identify and record all valid financial
transactions. Information Technology (IT) controls
Provide timely information about Physical controls
transactions in sufficient detail to
IT CONTROLS
permit proper classification and
financial reporting. 2 broad groups:
Accurately measure the financial
General Controls - entity-wide IT
value of transactions so their effects
concerns such as controls over the data
can be recorded in financial
center, organization databases, network
statements.
security, systems development, and
Accurately record transactions in the
program maintenance.
time period in which they occurred.
Application controls - ensure the
SAS 109 requires that auditors obtain
integrity of specific computer systems
sufficient knowledge of the organization’s
such as sales order processing, accounts
information system to understand:
payable, and payroll applications.
The classes of transactions that are
PHYSICAL CONTROLS
material to the financial statements
and how those transactions are Relates to the human activities employed
initiated. in accounting systems. These activities
The accounting records and accounts may be purely manual, such as the
that are used in the processing of physical custody of assets, or they may
material transactions. involve the physical use of computers to
The transaction processing steps record transactions or update accounts.
involved from the initiation of a
transaction to its inclusion in the Physical controls do not relate to the
financial statements. computer logic that actually performs
The financial reporting process used accounting tasks. They relate to the
to prepare financial statements, human activities that trigger those tasks
disclosures, and accounting or utilize the results of those tasks.
estimates. In other words, physical controls focus on
people but are not restricted to an
MONITORING environment in which clerks update
paper accounts with pen and ink.
Process by which the quality of internal
control design and operation can be six categories of physical control
assessed. This may be accomplished by activities:
1. transaction authorization
2. segregation of duties 2. Responsibility for the custody of
3. supervision assets should be separate from the
4. accounting records record-keeping responsibility.
5. access control 3. The organization should be
6. independent verification. structured so that a successful
fraud requires collusion between
two or more individuals with
incompatible responsibilities.
SUPERVISION
Implementing adequate segregation of
duties requires that a firm employ a
sufficiently large number of employees.
Achieving adequate segregation of duties
TRANSACTION AUTHORIZATION often presents difficulties for small
The purpose of transaction authorization organizations.
is to ensure that all material transactions it is impossible to separate five
processed by the information system are incompatible tasksamong three
valid and in accordance with employees. Therefore, in small
management’s objectives. Authorizations organizations or in functional areas that
may be general or specific. lack sufficient personnel, management
General authority - is granted to must compensate for the absence of
operations personnel to perform day-to- segregation controls with close
day operations. supervision.
OUTPUT SPOOLING.
In large-scale data processing operations,
output devices such as line printers can
become backlogged with many programs
simultaneously demanding limited
resources. This can cause a bottleneck
and adversely affect system throughput.
To ease this burden, applications are
often designed to direct their output to a
magnetic disk file rather than print it
OUTPUT CONTROLS directly. This is called spooling. Later,
when printer resources become
Output controls are a combination of
available, the output files are printed.
programmed routines and other
procedures to ensure that system output The creation of an output file as an
is not lost, misdirected, or corrupted and intermediate step in the printing process
that privacy is not violated. Exposures of presents an added exposure. A computer
this sort can cause serious disruptions to criminal may use this opportunity to:
operations and may result in financial
losses to a firm. If the privacy of certain
1. Access the output file and change Computer output waste is a potential
critical data values (e.g., dollar source of exposure. Aborted reports and
amounts on checks). The printer the carbon copies from multipart paper
program will then print the fallacious need to be disposed of properly.
output as if the system produced it. Computer criminals disguised as
2. Access the file and change the janitorial staff have been known to sift
number of copies of output to be through trash cans searching for
printed. The extra copies may then carelessly discarded output that is
be removed without notice during presumed to be of no value.
the printing stage.
From such trash, computer criminals may
3. Make a copy of the output file to
obtain information about a firm’s market
produce illegal output reports.
research, credit ratings of its customers,
4. Destroy the output file before output
or even trade secrets, which they can sell
printing takes place.
to a competitor. Computer waste is also a
source of passwords that a perpetrator
PRINT PROGRAMS may use to access the firm’s computer
system.
When a printer becomes available, the
print run program produces hardcopy To control against this threat, all sensitive
output from the output file. Print computer output should be passed
programs are often complex systems that through a paper shredder.
require operator intervention.
Four common types of operator
REPORT DISTRIBUTION
actions are:
The primary risks associated with the
1. Pausing the print program to load
distribution of sensitive reports include
the correct type of output
their being lost, stolen, or misdirected in
documents (check stocks, invoices,
transit to the user. The following control
or other special forms).
techniques can be used:
2. Entering parameters that the print
run needs, such as the number of 1. The reports may be placed in a
copies to be printed. secure mailbox to which only the
3. Restarting the print run at a user has the key.
prescribed checkpoint after a 2. The user may be required to
printer malfunction. appear in person at the distribution
4. Removing printed output from the center and sign for the report.
printer for review and distribution. 3. A security officer or special courier
may deliver the report to the user.
Print program controls should be
designed to deal with two types of END-USER CONTROLS
exposures present in this environment:
Once in the hands of the user, output
(1) the production of unauthorized
reports should be examined for
copies of output and (2) employee
correctness. Errors the user detects
browsing of sensitive data.
should be reported to the appropriate IT
management.
WASTE
Such errors may be symptoms of an
improper systems design, incorrect
procedures, errors accidentally inserted
during systems maintenance, or
unauthorized access to data files or
programs.
Once a report has served its purpose, it
should be stored in a secure location until
its retention period has expired and then
it should be shredded.