ACCOUNTING INFORMATION SYSTEMS Controls and Processes SECOND EDITION <s> LESLIE TURIHIER WILEY
MODULE 1 Introduction to AIS INTRODUCTION Defines business processes, AIS, and all foundational concepts. This module provides the knowledge building blocks to support the remaining chapters. Overview of Business Processes 2 Overview of an Accounting Information System 4 Business Process Linkage Throughout the Supply Chain 6 IT Enablement of Business Processes 8 Basic Computer and IT Concepts 10 BASIC COMPUTER DATA STRUCTURES 10 ' FILE ACCESS AND PROCESSING MODES 11 DATA WAREHOUSE AND DATA MINING 12 NETWORKS AND THE INTERNET 13 Examples of IT Enablement 14 E-BUSINESS 15 ELECTRONIC DATA INTERCHANGE 15 POINT OF SALE SYSTEM 15 AUTOMATED MATCHING 15 EVALUATED RECEIPT SETTLEMENT 16 E-PAYABLES AND ELECTRONIC INVOICE PRESENTMENT AND PAYMENT 16 ENTERPRISE RESOURCE PLANNING SYSTEMS 16 The Internal Control Structure of Organizations 17 ENTERPRISE RISK MANAGEMENT 18 A CODE OF ETHICS 20 COSO ACCOUNTING INTERNAL CONTROL STRUCTURE 20 IT CONTROLS 20 CORPORATE GOVERNANCE 20 IT GOVERNANCE 21 The Importance of Accounting Information Systems to Accountants USERS OF THE AIS 22 DESIGN OR IMPLEMENTATION TEAM 22 AN AUDITOR OF THE AIS 22 The Relation of Ethics to Accounting Information Systems 5 CONCEPT CHECK 26 DISCUSSION QUESTIONS 27 BRIEF EXERCISES 28 PROBLEMS 29 CASES 30 CONTINUING CASE: ROBATELU'S PIZZERIA SOLUTIONS TO CONCEPT CHECK 37 Foundational Concepts of the AIS Interrelationships of Business Processes and the AIS Types of Accounting Information Systems MANUAL SYSTEMS 43 LEGACY SYSTEMS 45 MODERN, INTEGRATED SYSTEMS 47 Client-Server Computing Cloud Computing Accounting Software Market Segments Input Methods Used in Business Processes SOURCE DOCUMENTS AND KEYING BAR CODES 55 54 32 22 22 24 25 26 39 41 43 47 48 52 54
xx O Contents POINT OF SALE SYSTEMS 56 ELECTRONIC DATA INTERCHANGE E-BUSINESS AND E-COMMERCE 56 56 Processing Accounting Data 57 BATCH PROCESSING 57 ONLINE AND REAL-TIME PROCESSING 58 Outputs from the AIS Related to Business Processes 59 Documenting Processes and Systems 60 PROCESS MAPS 60 SYSTEM'FLOWCHARTS 62 DOCUMENT FLOWCHARTS 64 DATA Fl!0W DIAGRAMS 65 ENTITY RELATIONSHIP DIAGRAMS 67 Ethical Considerations at the Foundation of Accounting Information Systems 69 3,7O 71 Appendix: Resources Events Agents (REA) in Accounting Information Systems 72 74 CONCEPT CHECK 74 DISCUSSION QUESTIONS 76 BRIEF EXERCISES 77 PROBLEMS 78 CASES 79 79 SOLUTIONS TO CONCEPT CHECK 80 The Nature of Computer Fraud INTERNAL SOURCES OF COMPUTER FRAUD 93 EXTERNAL SOURCES OF COMPUTER FRAUD 94 Policies to Assist in the Avoidance of Fraud and Errors Maintenance of a Code of Ethics Maintenance of Accounting Internal'Controls THE DETAILS OF THE COSO REPORT 99 MONITORING 107 REASONABLE ASSURANCE OF INTERNAL CONTROLS 108 Maintenance of Information Technology Controls Appendix A: Recent History of Internal Control Standards Appendix B: Control Objectives for Information Technology (COBIT) CONCEPT CHECK 115 DISCUSSION QUESTIONS 117 BRIEF EXERCISES 118 PROBLEMS 119 CASES 121 124 SOLUTIONS TO CONCEPT CHECK 124 93 96 96 97 109 111 112 113 114 115 MODULE 2 CONTROL ENVIRONMENT Describes the proper control environment to oversee and control processes. Internal Controls and Risks in IT Systems 127 An Overview of Internal Controls for IT Systems 128 Fraud, Ethics, and Internal Control 83 Introduction to the Need for a Code of Ethics and Internal Controls 84 General Controls for IT Systems 130 AUTHENTICATION OF USERS AND LIMITING UNAUTHORIZED USERS 130 HACKING AND OTHER NETWORK BREAK-INS.133 ORGANIZATIONAL STRUCTURE 136 PHYSICAL ENVIRONMENT AND SECURITY 137 BUSINESS CONTINUITY 139 Accounting-Related Fraud CATEGORIES OF ACCOUNTING-RELATED FRAUD The Nature of Management Fraud The Nature of Employee Fraud The Nature of Customer Fraud The Nature of Vendor Fraud 89 86 89 91 92 93 General Controls from an AICPA Trust Services Principles Perspective 140 RISKS IN NOT LIMITING UNAUTHORIZED USERS 141 RISKS FROM HACKING OR OTHER NETWORK BREAK-INS 144 RISKS FROM ENVIRONMENTAL FACTORS - 144 PHYSICAL ACCESS RISKS 145 BUSINESS CONTINUITY RISKS 145
Contents O xxi Hardware and Software Exposures in IT Systems 145 THE OPERATING SYSTEM 147 THE DATABASE 149 THE DATABASE MANAGEMENT SYSTEM 150 LANS AND WANS 151 WIRELESS NETWORKS 151 THE INTERNET AND WORLD WIDE WEB 152 TELECOMMUTING WORKERS AND MOBILE WORKERS 152 ELECTRONIC DATA INTERCHANGE 153 CLOUD COMPUTING 154 Application Software and Application Controls 156 INPUT CONTROLS 156 PROCESSING CONTROLS 163 OUTPUT CONTROLS 164 Ethical Issues in IT Systems *.* CONCEPT CHECK 167 DISCUSSION QUESTIONS BRIEF EXERCISES 170 PROBLEMS 172 CASES 173 169 SOLUTIONS TO CONCEPT CHECK 175 J 175 164 165 166 167 Corporate Governance and the Sarbanes-Oxley Act 179 An Overview of Corporate Governance 180 Participants in the Corporate Governance Process 181 Functions within the Corporate Governance Process 185 MANAGEMENT OVERSIGHT 185 INTERNAL CONTROLS AND COMPLIANCE 186 FINANCIAL STEWARDSHIP 188 ETHICAL CONDUCT 189 The History of Corporate Governance 189 The Sarbanes-Oxley Act of 2002 190 The Impact of the Sarbanes-Oxley Act on Corporate Governance 196 The Importance of Corporate Governance in the Study of Accounting Information Systems 199 Ethics and Corporate Governance 200 202 203 204 CONCEPT CHECK. 204 DISCUSSION QUESTIONS' 206 BRIEF EXERCISES 207 PROBLEMS 207 CASES 208 208 SOLUTIONS TO CONCEPT CHECK 208 IT Governance 211 Introduction to IT Governance 212 An Overview of the SDLC 216 THE PHASES OF THE SDLC 219 Elements of the Systems Planning Phase of the SDLC 219 THE MATCH OF IT SYSTEMS TO STRATEGIC OBJECTIVES 220. FEASIBILITY STUDY 221 PLANNING AND OVERSIGHT OF THE PROPOSED CHANGES 222 Elements of the Systems Analysis Phase of the SDLC 222 PRELIMINARY INVESTIGATION 222 SYSTEM SURVEY: THE STUDY OF THE CURRENT SYSTEM 223 DETERMINATION OF USER REQUIREMENTS 224 ANALYSIS OF THE SYSTEM SURVEY 225 SYSTEMS ANALYSIS REPORT 226 Elements of the Systems Design Phase of the SDLC 226 THE PURCHASE OF SOFTWARE 226 IN-HOUSE DESIGN 228 CONCEPTUAL DESIGN 229 EVALUATION AND'SELECTION 230 CLOUD COMPUTING AS A CONCEPTUAL DESIGN 232 DETAILED DESIGN 233 Elements of the Systems Implementation Phase of the SDLC 235 SOFTWARE PROGRAMMING 236 TRAINING EMPLOYEES 236 SOFTWARE TESTING 236 DOCUMENTING THE SYSTEM 236 DATA CONVERSION 236 SYSTEM CONVERSION 237 USER ACCEPTANCE 237 POST-IMPLEMENTATION REVIEW 238 Elements of the Operation and Maintenance Phase of the SDLC 238
XXII Contents The Critical Importance of IT Governance in an Organization SDLC AS PART OF STRATEGIC MANAGEMENT 239 SDLC AS AN INTERNAL CONTROL 239 Ethical Considerations Related to IT Governance ETHICAL CONSIDERATIONS FOR MANAGEMENT 240 ETHICAL CONSIDERATIONS FOR EMPLOYEES 241 ETHICAL CONSIDERATIONS FOR CONSULTANTS 242 CONCEPT CHECK 245 DISCUSSION QUESTIONS 246 BRIEF EXERCISES 247 PROBLEMS 248 CASES 249 SOLUTIONS TO CONCEPT.CHECK 250 249 238 240 243 244 245 Auditing Information Technology-Based Processes 253 Introduction to Auditing IT Processes 254 Types of Audits and Auditors 254 Information Risk and IT-Enhanced Internal Control 256 Authoritative Literature Used in Auditing 257 Management Assertions and Audit Objectives 259 Phases of an IT Audit 261 AUDIT PLANNING 261 Use of Computers in Audits 264 Tests of Controls 265 GENERAL CONTROLS 265 APPLICATION CONTROLS 269 Tests of Transactions and Tests of Balances 274 Audit Completion/Reporting 276 Other Audit Considerations 277 DIFFERENT IT ENVIRONMENTS 277 CHANGES IN A CLIENT'S IT ENVIRONMENT 280 SAMPLING 281 Ethical Issues Related to Auditing 281 285 286 287 CONCEPT CHECK 287 DISCUSSION QUESTIONS 291 BRIEF EXERCISES 292 PROBLEMS 293 CASES 294 SOLUTIONS TO CONCEPT CHECK 295 MODULE 3 295 BUSINESS PROCESSES The sets of business processes and the internal controls in organizations. With process maps, document flowcharts, and data flow diagrams, the core business processes are described and the necessary controls to manage risk are discussed. Revenue and Cash Collection Processes and Controls 299 Introduction to Revenue Processes 300 Sales Processes 303 Risks and Controls in Sales Processes 308 AUTHORIZATION OF TRANSACTIONS 309 SEGREGATION OF DUTIES 309 ADEQUATE RECORDS AND DOCUMENTS 309 SECURITY OF ASSETS AND DOCUMENTS 310 INDEPENDENT CHECKS AND RECONCILIATION 310 COST-BENEFIT CONSIDERATIONS 310 Sales Return Processes 313 Risks and Controls in Sales Return Processes 313 AUTHORIZATION OF TRANSACTIONS 313 SEGREGATION OF DUTIES 315 ADEQUATE RECORDS AND DOCUMENTS 315 SECURITY OF ASSETS AND DOCUMENTS 316 INDEPENDENT CHECKS AND RECONCILIATION 316 COST-BENEFIT CONSIDERATIONS 316 Cash Collection Processes 318 Risks and Controls in the Cash Collection Processes 322 AUTHORIZATION OF TRANSACTIONS 322 SEGREGATION OF DUTIES 322 ADEQUATE RECORDS AND DOCUMENTS 323 SECURITY OF ASSETS AND DOCUMENTS 323 INDEPENDENT CHECKS AND RECONCILIATION 323 COST-BENEFIT CONSIDERATIONS 324 IT-Enabled Systems of Revenue and Cash Collection Processes 325
Contents O xxiii E-Business Systems and the Related Risks and Controls SECURITY AND CONFIDENTIALITY RISKS 330 PROCESSING INTEGRITY RISKS 330 AVAILABILITY RISKS 331 Electronic Data Interchange (EDI) Systems and the Risks and Controls Po t int of Sale (POS) Systems and the Related Risks and Controls Ethical Issues Related to Revenue Processes Corporate Governance in Revenue Processes CONCEPT CHECK 341 DISCUSSION QUESTIONS BRIEF EXERCISES 345 PROBLEMS 346 CASES 352 CASH RECEIPTS 358 SALES 358 BANK DEPOSITS 359 344 SOLUTIONS TO CONCEPT CHECK 360 359 331 335 337 339 339 341 341 Expenditures Processes and Controls Purchases 363 Introduction to Expenditures Processes Purchasing Processes Risks and Controls in the Purchasing Process AUTHORIZATION OF TRANSACTIONS SEGREGATION OF DUTIES 373 373 ' ADEQUATE RECORDS AND. DOCUMENTS 374 SECURITY OF ASSETS AND DOCUMENTS 374 INDEPENDENT CHECKS AND RECONCILIATION 374 COST-BENEFIT CONSIDERATIONS 375 Purchase Return Process Risks and Controls in the Purchase Return Processes AUTHORIZATION OF TRANSACTIONS 381 SEGREGATION OF DUTIES 381 ADEQUATE RECORDS AND DOCUMENTS 381 SECURITY OF ASSETS AND idocuments 381 INDEPENDENT CHECKS AND RECONCILIATION 381 COST-BENEFIT CONSIDERATIONS 382 364 367 373 376 381 Cash Disbursement Processes 383 Risks and Controls in the Cash Disbursement Processes 388 AUTHORIZATION OF TRANSACTIONS 388 SEGREGATION OF DUTIES 389 ADEQUATE RECORDS AND DOCUMENTS 389 SECURITY OF ASSETS AND DOCUMENTS 389 INDEPENDENT CHECKS AND RECONCILIATION 390 COST-BENEFIT CONSIDERATIONS 390 IT Systems of Expenditures and Cash Disbursement Processes 391 Computer-Based Matching 393 Risks and Controls in Computer-Based Matching 394 SECURITY AND CONFIDENTIALITY RISKS 394 PROCESSING INTEGRITY RISKS 395 AVAILABILITY RISKS 395 Evaluated Receipt Settlement 395 Risks and Controls in Evaluated Receipt Settlement 397 SECURITY AND CONFIDENTIALITY 397 PROCESSING INTEGRITY AVAILABILITY 397 397 ' E-Business and Electronic Data Interchange (EDI) 398 Risks and Controls in E-Business and EDI 398 SECURITY AND CONFIDENTIALITY 399 PROCESSING INTEGRITY 399 AVAILABILITY 400 E-Payables 400 Procurement Cards 401 Ethical Issues Related to Expenditures Processes 401 Corporate Governance in Expenditure Processes 403 CONCEPT CHECK 407 DISCUSSION QUESTIONS 410 BRIEF EXERCISES 411 PROBLEMS 411 CASES 415 420 SOLUTIONS TO CONCEPT CHECK 421 U UU Expenditures Processes and Controls- Payroll and Fixed Assets Introduction to Payroll and Fixed Asset Processes Pavroll Processes 404 406 407 425 426 429
xxiv O Contents Risks and Controls in the Payroll Processes AUTHORIZATION OF TRANSACTIONS 437 SEGREGATION OF DUTIES 437 ADEQUATE RECORDS AND DOCUMENTS 438 SECURITY OF ASSETS AND DOCUMENTS 438 INDEPENDENT CHECKS AND RECONCILIATION 439 COST-BENEFIT CONSIDERATIONS 440 IT Systems of Payroll Processes Fixed Assets Processes FIXED ASSET ACQUISITIONS 442 FIXED ASSETS CONTINUANCE 446 FIXED ASSETS DISPOSALS 447 Risks and Controls in Fixed Assets Processes AUTHORIZATION OF TRANSACTIONS 450 SEGREGATION OF DUTIES 451 ADEQUATE RECORDS AND DOCUMENTS 451 SECURITY OF ASSETS AND DOCUMENTS 451 INDEPENDENT CHECKS AND RECONCILIATION 451 COST-BENEFIT CONSIDERATIONS 453 IT Systems of Fixed Assets Processes Ethical Issues Related to Payroll and Fixed Assets Processes Corporate Governance in Payroll and Fixed Assets Processes CONCEPT CHECK 460 DISCUSSION QUESTIONS BRIEF EXERCISES 464 PROBLEMS 465 CASES 467 463 SOLUTIONS TO CONCEPT CHECK 471 469 437 440 442 450 453 455 457 459 460 460 11- Conversion Processes and Controls 473 Basic Features of Conversion Processes Components of the Logistics Function PLANNING 476' RESOURCE MANAGEMENT 479 OPERATIONS 481 Cost Accounting Reports Generated by Conversion Processes 474 476 485 Risks and Controls in Conversion Processes AUTHORIZATION OF TRANSACTIONS SEGREGATION OF DUTIES 486 486 ADEQUATE RECORDS AND DOCUMENTS 487 SECURITY OF ASSETS AND DOCUMENTS 487 INDEPENDENT CHECKS AND RECONCILIATION 487 COST-BENEFIT CONSIDERATIONS 488 IT Systems of Conversion Processes Ethical Issues Related to Conversion Processes Corporate Governance in Conversion Processes CONCEPT CHECK 496 DISCUSSION QUESTIONS 498 BRIEF EXERCISES 499 PROBLEMS 501 CASES 502 SOLUTIONS TO CONCEPT CHECK 506 506 486 489 493 494 494 495 496 Administrative Processes and Controls 509 Introduction to Administrative Processes 511 Source of Capital Processes 513 Investment Processes 514 Risks and Controls in Capital and Investment Processes 516 General Ledger Processes 516 Risks and Controls in General Ledger Processes 520 AUTHORIZATION OF TRANSACTIONS 520. SEGREGATION OF DUTIES 522 ADEQUATE RECORDS AND DOCUMENTS 525 ~ T ~ SECURITY OF THE GENERAL LEDGER AND DOCUMENTS 525 INDEPENDENT CHECKS AND RECONCILIATION 525 Reporting as an Output of the General Ledger Processes ' 526 EXTERNAL REPORTING 527 INTERNAL REPORTING 527
Contents O xxv Ethical Issues Related to Administrative Processes and Reporting 528 UNETHICAL MANAGEMENT BEHAVIOR IN CAPITAL SOURCES AND INVESTING 529 INTERNAL REPORTING OF ETHICAL ISSUES 530 Corporate Governance in Administrative Processes and Reporting 531 532 533 End of.chapter Material. 534 CONCEPT CHECK 534 DISCUSSION QUESTIONS 535 BRIEF EXERCISES 536 PROBLEMS 537 CASE 538 538 SOLUTIONS TO CONCEPT CHECK 539. &.., MODULE 4 IT INFRASTRUCTURE TO ENABLE PROCESSES The hardware, software, and systems that support business processes. r Data and Databases 541 The Need for Data Collection and Storage Storing and Accessing Data DATA STORAGE TERMINOLOGY 544 DATA STORAGE MEDIA 544 Data Processing Techniques Databases THE HISTORY OF DATABASES 549 The Need for Normalized Data TRADE-OFFS IN DATABASE STORAGE 554 Use of a Data Warehouse to Analyze Data BUILD THE DATA WAREHOUSE IDENTIFY THE DATA 555 STANDARDIZE THE DATA 556 555 ' CLEANSE, OR SCRUB, THE DATA 556 UPLOAD THE DATA 556 Data Analysis Tools DATA MINING 557 OLAP 558 Distributed Data Processing DDPANDDDB 560 Cloud-Based Databases IT Controls for Data and Databases 542 544 546 547 551 554 556 559 561 562 Ethical Issues Related to Data Collection and Storage ETHICAL RESPONSIBILITIES OF THE COMPANY 564 ETHICAL RESPONSIBILITIES OF EMPLOYEES 566 ETHICAL RESPONSIBILITIES OF CUSTOMERS CONCEPT CHECK 569 DISCUSSION QUESTIONS 571 BRIEF EXERCISES 572 PROBLEMS 573 CASES 573. SOLUTIONS TO CONCEPT CHECK 575 566 575 563 567 568 569 E-Commerce and E-Business 577 Introduction to E-Commerce and E-Business 578 The History of the Internet 579 The Physical Structure and Standards of the Internet 582 THE NETWORK 582 THE COMMON STANDARDS OF THE INTERNET 583 E-Commerce and Its Benefits 586 BENEFITS AND DISADVANTAGES OF E-COMMERCE FOR THE CUSTOMER 587 BENEFITS AND DISADVANTAGES OF E-COMMERCE FOR THE BUSINESS 588 THE COMBINATION OF E-COMMERCE AND TRADITIONAL COMMERCE 589 Privacy Expectations in E-Commerce 590 E-Business and IT Enablement 592 B2B: APARTOF"E-BUSINESS 594 E-Business Enablement Examples 596 Intranets and Extranets to Enable, E-Business 598 Internal Controls for the Internet, Intranets, and Extranets 599 XML and XBRL as Tools to Enable E-Business 601 XML IN INTERNET EDI 601 XBRL FOR FINANCIAL STATEMENT REPORTING 603 Ethical Issues Related to E-Business and E-Commerce 604