Podcast
Questions and Answers
Which of the following describes segregation of duties in a manual system?
Which of the following describes segregation of duties in a manual system?
- Separating authorization from processing a transaction. (correct)
- Limitations on access to an asset.
- Allowing a single person to handle all aspects of a transaction.
- Combining processing and recordkeeping of the same asset.
Which is NOT a type of physical control?
Which is NOT a type of physical control?
- Approval processes (correct)
- Access controls
- Supervision
- Accounting records
What is the purpose of independent verification in control activities?
What is the purpose of independent verification in control activities?
- To isolate incompatible tasks in program development.
- To review the accuracy of data processing. (correct)
- To enforce strict data access.
- To approve all transactions before processing.
In a computerized system, what is essential regarding segregation of duties?
In a computerized system, what is essential regarding segregation of duties?
What is a major challenge in supervision within a computerized internal control environment?
What is a major challenge in supervision within a computerized internal control environment?
Which control activity helps ensure that only authorized transactions are executed?
Which control activity helps ensure that only authorized transactions are executed?
How do accounting records function as a control activity?
How do accounting records function as a control activity?
What overarching risk is associated with inadequate access control in a computerized system?
What overarching risk is associated with inadequate access control in a computerized system?
What is a potential limitation of internal controls?
What is a potential limitation of internal controls?
Which of the following is NOT one of the five internal control components?
Which of the following is NOT one of the five internal control components?
What does effective risk assessment in internal controls include?
What does effective risk assessment in internal controls include?
Which aspect is crucial for the control environment within internal controls?
Which aspect is crucial for the control environment within internal controls?
What is a common exposure due to weak internal controls?
What is a common exposure due to weak internal controls?
The effectiveness of internal controls can be monitored through which method?
The effectiveness of internal controls can be monitored through which method?
Which of the following best describes the purpose of control activities?
Which of the following best describes the purpose of control activities?
What effect does a stronger internal control structure have on the assessed level of risk?
What effect does a stronger internal control structure have on the assessed level of risk?
Which factor is NOT considered when assessing the control environment?
Which factor is NOT considered when assessing the control environment?
What type of internal control helps identify and record all valid transactions?
What type of internal control helps identify and record all valid transactions?
What is the primary risk during the data collection phase of a system?
What is the primary risk during the data collection phase of a system?
What does the term 'GIGO' stand for in the context of information processing?
What does the term 'GIGO' stand for in the context of information processing?
What type of fraud involves altering programs to manipulate data files?
What type of fraud involves altering programs to manipulate data files?
What is often a motivation behind database management fraud?
What is often a motivation behind database management fraud?
Which of the following is an objective of internal control?
Which of the following is an objective of internal control?
How should management balance the objectives of internal control with its costs?
How should management balance the objectives of internal control with its costs?
What type of fraud involves stealing or misusing computer output?
What type of fraud involves stealing or misusing computer output?
What is a common method of scamming listed in the content?
What is a common method of scamming listed in the content?
Flashcards
Segregation of Duties
Segregation of Duties
Separation of duties aims to prevent fraud and errors by splitting tasks across different individuals, so that no single person has complete control over a transaction or process.
Authorization Controls
Authorization Controls
Authorization controls ensure that only legitimate transactions are processed. General authorization covers everyday procedures; specific authorization is required for non-routine transactions.
Physical Controls
Physical Controls
Physical controls aim to protect assets by restricting access and safeguarding resources. These controls include physical security measures and environmental controls.
Accounting Records
Accounting Records
Signup and view all the flashcards
Independent Verification
Independent Verification
Signup and view all the flashcards
Access Control
Access Control
Signup and view all the flashcards
Supervision
Supervision
Signup and view all the flashcards
Transaction Authorization in CBIS
Transaction Authorization in CBIS
Signup and view all the flashcards
Control Environment
Control Environment
Signup and view all the flashcards
Risk Assessment
Risk Assessment
Signup and view all the flashcards
Information and Communication
Information and Communication
Signup and view all the flashcards
Monitoring
Monitoring
Signup and view all the flashcards
Control Activities
Control Activities
Signup and view all the flashcards
Possibility of Honest Errors
Possibility of Honest Errors
Signup and view all the flashcards
Circumvention via Collusion
Circumvention via Collusion
Signup and view all the flashcards
Management Override
Management Override
Signup and view all the flashcards
Exposures of Weak Internal Controls (Risk)
Exposures of Weak Internal Controls (Risk)
Signup and view all the flashcards
The Internal Controls Shield
The Internal Controls Shield
Signup and view all the flashcards
Computer Fraud
Computer Fraud
Signup and view all the flashcards
Data Collection Fraud
Data Collection Fraud
Signup and view all the flashcards
Program Fraud
Program Fraud
Signup and view all the flashcards
Operations Fraud
Operations Fraud
Signup and view all the flashcards
Database Management Fraud
Database Management Fraud
Signup and view all the flashcards
Information Generation Fraud
Information Generation Fraud
Signup and view all the flashcards
Scavenging
Scavenging
Signup and view all the flashcards
Internal Control Objectives
Internal Control Objectives
Signup and view all the flashcards
Study Notes
Ethics, Fraud, and Internal Control
- Ethics in business are needed when conflicts arise, requiring choices.
- Conflicts in business arise between management and stakeholders, as well as employees.
- Litigation can result from ethical conflicts
- Business ethics can be categorized into four main areas: equity, rights, honesty, and corporate power.
- Executive salaries, comparable worth, product pricing, corporate due process, employee health screening, and sexual harassment fall under these categories.
- Other issues include diversity, equal employment opportunity, whistle-blowing, and conflicts of interest.
- Key elements of fraud include false representation, material fact, intent to deceive, justifiable reliance, and injury or loss.
- Studying fraud reveals that in 2002, fraud losses were estimated at 6% of revenue, approximately $600 billion.
- Fraud loss percentages vary by position in a company, with higher losses among managers and more experienced employees.
- Types of fraud include financial statement fraud, misappropriation of assets, concealment of material facts, illegal acts, bribery, conflicts of interest, and breach of fiduciary duty.
- Employee fraud typically involves non-management personnel taking company assets for personal gain.
- Management fraud involves higher levels of management using financial statements to mislead on the health and prosperity of an entity.
Moral Development
- Ethical principle orientation, social contract orientation, and authority orientation are key stages of moral development.
- Stages of behavioural moral development exhibit different behaviours in response to moral situations.
Computer Ethics
- Computer ethics concerns the social impact of computer technology including hardware, software, and telecommunications.
- Key computer ethics issues include privacy, security and accuracy, ownership of property, environmental issues, equity in access, artificial intelligence, unemployment and displacement, and computer misuse.
Internal Control Objectives
- Safeguarding assets, ensuring accuracy and reliability of accounting records, promoting efficiency of operations, and measuring compliance with policies are key internal control objectives.
Modifying Assumptions
- Management is responsible for establishing and maintaining a system of internal control.
- The cost of achieving internal control objectives should not outweigh the benefits.
- Internal control methods vary with different types of technology
Limitations of Internal Controls
- Internal controls are not foolproof because of honest errors, collusion, management overrides, and changing conditions.
- Colluding employees can bypass even the most robust controls.
- Cost-benefit analyses are often crucial in establishing internal controls.
Exposures of Weak Internal Controls (Risk)
- Weaknesses in internal controls expose organizations to risks such as destruction of assets, theft of assets, information corruption, and system disruption.
Weak Internal Controls Increasing Risk
- System breakdowns, erroneous management decisions, fraud, embezzlement, legal violations, substantial costs (higher expenses), and asset loss can arise from weak internal controls.
Internal Control Shield
- Internal control is a shield against undesirable events, including access, fraud, errors, and mischief.
Preventive, Detective, and Corrective Controls
- Internal controls operate on multiple levels: preventive, detective, and corrective, to minimize undesirable outcomes.
Auditing Standards
- Auditors adhere to Philippine Standards on Auditing (PSAs).
Relationship Between Internal Control, Auditor's Assessment, and Audit Procedures
- The internal control structure significantly influences the auditor's assessment of risk and, subsequently, the design of audit procedures.
- A weaker internal control structure results in a higher level of assessed risk, leading to increased audit procedures.
Five Internal Control Components
- The five components of internal control are: control environment, risk assessment, information and communication, monitoring, and control activities.
Control Environment
- Integrity and ethical values of management, organizational structure, role of the board of directors and audit committee, management policies, delegation of responsibilities, performance evaluation, external influences, and human resource policies and practices are key elements of the control environment.
Risk Assessment
- Identifying, analyzing, and managing risks relevant to financial reporting is vital. This includes changes in the external environment, risky foreign markets, significant growth, new product lines, restructuring, downsizing, and accounting policy changes.
Information and Communication
- The AIS produces high-quality information by identifying and recording valid transactions, providing timely information, classifying transactions properly, and measuring financial transaction value accurately.
Monitoring
- The process of assessing the quality of internal control design, feedback on quality, and separate procedures for internal auditors to test controls are necessary actions.
Control Activities
- Policies and procedures for appropriate actions in response to identified risks include performance reviews, information processing (general and application controls), segregation of duties, and physical controls.
Segregation of Duties
- Segregation is fundamental for both manual and computerized systems, preventing single-point failures and reducing fraud opportunities.
Physical Controls
- Physical controls like authorization, supervision, accounting records, access controls, and independent verification are crucial security protocols.
Internal Controls in CBIS
- Transaction authorization, segregation of duties, supervision, and accounting records are critical aspects of internal controls implemented in Computer-Based Information Systems (CBIS).
- Access controls are essential in environments with extensive data consolidation.
- Effective internal controls are not only about preventing but also about detecting and correcting any irregularities in a computer-based system.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on internal control systems, including segregation of duties, physical controls, and risk assessment. This quiz covers key concepts and challenges associated with both manual and computerized internal control environments. Perfect for students and professionals interested in accounting and auditing practices.