internal control system (sistem informasi akuntansi)
TRANSCRIPT
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-1
INTERNAL
CONTROL
SYSTEM
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-2
Learning Objectives
1. Describe the threats to an AIS and
discuss why these threats are
growing.
2. Explain the basic concepts of control
as applied to business organizations.
3. Describe the major elements in the
control environment of a business
organization.
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-3
Learning Objectives, continued
4. Describe control policies and procedures
commonly used in business organizations.
5. Evaluate a system of internal accounting
control, identify its deficiencies, and
prescribe modifications to remedy those
deficiencies.
6. Conduct a cost-benefit analysis for
particular threats, exposures, risks, and
controls.
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-4
Introduction
Jason Scott has been hired as an
internal auditor for Northwest
Industries, a diversified forest
products company.
He is assigned to audit Springer’s
Lumber & Supply, Northwest’s
building materials outlet in Montana.
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-5
Introduction
His supervisor, Maria Pilier, has asked him to trace a sample of purchase transactions to verify that proper control procedures were followed. Jason becomes frustrated with this task.
Why is Jason frustrated?
The purchasing system is poorly documented.
He keeps finding transactions that have not been processed as Ed Yates, the accounts payable manager, said they should be.
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-6
Introduction
Jason’s frustrations, continued
Some vendor invoices have been paid without supporting documents.
Purchase requisitions are missing for several items that had been authorized by Bill Springer, purchasing v.p.
Prices charged for some items seem unusually high.
Springer’s is the largest supplier in the area and has a near monopoly.
Management authority is concentrated in the company president, Joe Springer, and his sons Bill, the purchasing v.p., and Ted, the controller.
Maria feels that Ted may have engaged in “creative accounting.”
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-7
Introduction
Jason ponders the following issues:
Should he describe the unusual transactions in his report?
Is a violation of proper control procedures acceptable if it has been authorized by management?
Regarding Jason’s assignment, does he have a professional or ethical responsibility to get involved?
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-8
Learning Objective
Describe the threats to an AIS and
discuss why these threats are
growing.
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-9
Threats to Accounting
Information Systems
What are examples of natural and
political disasters?
– fire or excessive heat
– floods
– earthquakes
– high winds
– war
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-10
Threats to Accounting
Information Systems
What are examples of unintentional acts?
– accidents caused by human carelessness
– innocent errors of omissions
– lost or misplaced data
– logic errors
– systems that do not meet company needs
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-11
Threats to Accounting
Information Systems
What are examples of software errors
and equipment malfunctions?
– hardware failures
– power outages and fluctuations
– undetected data transmission errors
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-12
Threats to Accounting
Information Systems
What are examples of intentional
acts?
– sabotage
– computer fraud
– embezzlement
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-13
Why are AIS Threats
Increasing?
Increasing numbers of client/server systems mean that information is available to an unprecedented number of workers.
Because LANs and client/server systems distribute data to many users, they are harder to control than centralized mainframe systems.
WANs are giving customers and suppliers access to each other’s systems and data, making confidentiality a concern.
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-14
BASIC CONCEPT -
CONTROL
Explain the basic concepts
of control as applied to
business organizations.
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-15
Overview of Control
Concepts
What is the traditional definition of internal
control?
Internal control is the plan of organization
and the methods a business uses to
safeguard assets, provide accurate and
reliable information, promote and improve
operational efficiency, and encourage
adherence to prescribed managerial
policies.
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-16
Overview of Control
Concepts
What is management control?
Management control encompasses the following three features:
1 It is an integral part of management responsibilities.
2 It is designed to reduce errors, irregularities, and achieve organizational goals.
3 It is personnel-oriented and seeks to help employees attain company goals.
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-17
Internal Control
Classifications
The specific control procedures used in the
internal control and management control
systems may be classified using the
following four internal control classifications:
1 Preventive, detective, and corrective controls
2 General and application controls
3 Administrative and accounting controls
4 Input, processing, and output controls
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-18
The Foreign Corrupt
Practices Act
In 1977, Congress incorporated language
from an AICPA pronouncement into the
Foreign Corrupt Practices Act.
The primary purpose of the act was to
prevent the bribery of foreign officials in
order to obtain business.
A significant effect of the act was to require
corporations to maintain good systems of
internal accounting control.
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-19
Committee of Sponsoring
Organizations
The Committee of Sponsoring
Organizations (COSO) is a private sector
group consisting of five organizations:
1 American Accounting Association
2 American Institute of Certified Public
Accountants
3 Institute of Internal Auditors
4 Institute of Management Accountants
5 Financial Executives Institute
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-20
Committee of Sponsoring
Organizations
In 1992, COSO issued the results of a
study to develop a definition of
internal controls and to provide
guidance for evaluating internal
control systems.
The report has been widely accepted
as the authority on internal controls.
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-21
Committee of Sponsoring
Organizations
The COSO study defines internal control as the process implemented by the board of directors, management, and those under their direction to provide reasonable assurance that control objectives are achieved with regard to:
– effectiveness and efficiency of operations
– reliability of financial reporting
– compliance with applicable laws and regulations
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-22
Committee of Sponsoring
Organizations
COSO’s internal control model has
five crucial components:
1 Control environment
2 Control activities
3 Risk assessment
4 Information and communication
5 Monitoring
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-23
Information Systems Audit
and Control Foundation
The Information Systems Audit and Control
Foundation (ISACF) recently developed the
Control Objectives for Information and
related Technology (COBIT).
COBIT consolidates standards from 36
different sources into a single framework.
The framework addresses the issue of
control from three vantage points, or
dimensions:
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-24
ELEMENT OF INTERNAL
CONTROL
Describe the major
elements in the control
environment of a
business organization.
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-25
The Control Environment
The first component of COSO’s internal
control model is the control environment.
The control environment consists of many
factors, including the following:
1 Commitment to integrity and ethical values
2 Management’s philosophy and operating
style
3 Organizational structure
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-26
The Control Environment
4 The audit committee of the board of
directors
5 Methods of assigning authority and
responsibility
6 Human resources policies and
practices
7 External influences
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-27
Learning Objective 4
Describe control
policies and procedures
commonly used in
business organizations.
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-28
Control Activities
The second component of COSO’s
internal control model is control
activities.
Generally, control procedures fall into
one of five categories:
1 Proper authorization of transactions
and activities
2 Segregation of duties
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-29
Control Activities
3 Design and use of adequate
documents and records
4 Adequate safeguards of assets and
records
5 Independent checks on performance
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-30
Proper Authorization of
Transactions and Activities
Authorization is the empowerment management gives employees to perform activities and make decisions.
Digital signature or fingerprint is a means of signing a document with a piece of data that cannot be forged.
Specific authorization is the granting of authorization by management for certain activities or transactions.
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-31
Segregation of Duties
Good internal control demands that no
single employee be given too much
responsibility.
An employee should not be in a
position to perpetrate and conceal
fraud or unintentional errors.
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-32
Segregation of Duties
Recording Functions
Preparing source documents
Maintaining journals
Preparing reconciliations
Preparing performance reports
Custodial Functions
Handling cash
Handling assets
Writing checks
Receiving checks in mail Authorization Functions
Authorization of
transactions
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-33
Segregation of Duties
If two of these three functions are the
responsibility of a single person, problems
can arise.
Segregation of duties prevents employees
from falsifying records in order to conceal
theft of assets entrusted to them.
Prevent authorization of a fictitious or
inaccurate transaction as a means of
concealing asset thefts.
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-34
Segregation of Duties
Segregation of duties prevents an
employee from falsifying records to
cover up an inaccurate or false
transaction that was inappropriately
authorized.
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-35
Design and Use of Adequate
Documents and Records
The proper design and use of
documents and records helps ensure
the accurate and complete recording
of all relevant transaction data.
Documents that initiate a transaction
should contain a space for
authorization.
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-36
Design and Use of Adequate
Documents and Records
The following procedures safeguard assets from theft, unauthorized use, and vandalism:
– effectively supervising and segregating duties
– maintaining accurate records of assets, including information
– restricting physical access to cash and paper assets
– having restricted storage areas
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-37
Adequate Safeguards of
Assets and Records
What can be used to safeguard assets?
– cash registers
– safes, lockboxes
– safety deposit boxes
– restricted and fireproof storage areas
– controlling the environment
– restricted access to computer rooms, computer files, and information
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-38
Independent Checks
on Performance
Independent checks ensure that
transactions are processed accurately are
another important control element.
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-39
Independent Checks
on Performance
What are various types of
independent checks?
– reconciliation of two independently
maintained sets of records
– comparison of actual quantities with
recorded amounts
– double-entry accounting
– batch totals
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-40
Independent Checks
on Performance
Five batch totals are used in computer
systems:
1 A financial total is the sum of a dollar
field.
2 A hash total is the sum of a field that
would usually not be added.
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-41
Independent Checks
on Performance
3 A record count is the number of
documents processed.
4 A line count is the number of lines of
data entered.
5 A cross-footing balance test compares
the grand total of all the rows with the
grand total of all the columns to check
that they are equal.
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-42
Learning Objective 5
Evaluate a system of
internal accounting
control, identify its
deficiencies, and prescribe
modifications to remedy
those deficiencies.
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-43
Risk Assessment
The third component of COSO’s internal
control model is risk assessment.
Companies must identify the threats they
face:
– strategic — doing the wrong thing
– financial — having financial resources lost,
wasted, or stolen
– information — faulty or irrelevant information,
or unreliable systems
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-44
Risk Assessment
Companies that implement electronic
data interchange (EDI) must identify
the threats the system will face, such
as:
1 Choosing an inappropriate technology
2 Unauthorized system access
3 Tapping into data transmissions
4 Loss of data integrity
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-45
Risk Assessment
5 Incomplete transactions
6 System failures
7 Incompatible systems
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-46
Risk Assessment
Some threats pose a greater risk
because the probability of their
occurrence is more likely. For
example:
A company is more likely to be the
victim of a computer fraud rather than
a terrorist attack.
Risk and exposure must be
considered together.
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-47
Learning Objective 6
Conduct a cost-benefit
analysis for particular
threats, exposures,
risks, and controls.
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-48
Estimate Cost and Benefits
No internal control system can provide
foolproof protection against all internal
control threats.
The cost of a foolproof system would
be prohibitively high.
One way to calculate benefits involves
calculating expected loss.
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-49
Expected loss = risk × exposure
Estimate Cost and Benefits
The benefit of a control procedure is
the difference between the expected
loss with the control procedure(s) and
the expected loss without it.
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-50
Information and
Communication
The fourth component of COSO’s
internal control model is information
and communication.
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-51
Information and
Communication
Accountants must understand the following:
1 How transactions are initiated
2 How data are captured in machine-readable form or converted from source documents
3 How computer files are accessed and updated
4 How data are processed to prepare information
5 How information is reported
6 How transactions are initiated
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-52
Information and
Communication
All of these items make it possible for the system to have an audit trail.
An audit trail exists when individual company transactions can be traced through the system.
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-53
Monitoring Performance
The fifth component of COSO’s
internal control model is monitoring.
What are the key methods of
monitoring performance?
– effective supervision
– responsibility accounting
– internal auditing
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-54
Case Conclusion
What happened to Jason’s report?
A high-level internal audit team was dispatched to Montana.
The team discovered that the problems identified by Jason occurred almost exclusively in transactions with three large vendors from whom Springer’s had purchased several million dollars of inventory.
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart7-55
Case Conclusion
One of the Springers held a significant
ownership interest in each of these three
companies.
They also found evidence that several of
Springer’s employees were paid for more
hours than documented by timekeeping,
and that inventories were overstated.
Northwest settled the case with the
Springers.