ACCOUNTING INFORMATION SYSTEMS



Similar documents
CORE CONCEPTS OF. Thirteenth Edition. Mark G. Simkin, PhD. Professor Department of Information Systems University of Nevada

ELEVENTH EDITION. Brigham Young University. Arizona State University. Pearson Education International

Certified Information Systems Auditor (CISA)

Australia Brazil Japan Korea Mexico Singapore Spain United Kingdom United States

Marshall B. Romney liri^ham YounI nivcrsitv. Paul John Steinbart. \ri:oiid Statt' l 'nivcrsitv PEARSON

How to set up a people based. accounting system that makes your. small business work for you. Thomas G. Post. Certified Public Accountant

i) Question Type The following are guidelines on the type of questions and their approximate weightings:

Generic Business Process (1) Expenditure Cycle & Revenue Cycle

AUD105-2nd Edition. Auditor s Guide to IT - 20 hours. Objectives

ACS Final Exam Topic Outline. Functional Area Information Systems. V. Enterprise Information Systems

i. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis

Table of Contents. Auditor's Guide to Information Systems Auditing Richard E. Cascarino Copyright 2007, John Wiley & Sons, Inc.

Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors

Licensed to: ichapters User

Accounting Information Systems, 4th. Ed. CHAPTER 4 THE REVENUE CYCLE

Brief Contents. Part Three: Decisions and Strategies. Part One: Information Technology Infrastructure. Part Four: Organizing Businesses and Systems

Executive - Salary Guide

MEMORANDUM INTERNAL CONTROL REQUIREMENTS FOR NON-PROFITS

Community Development and Training Centre Semester IT 245 Management Information Systems

CISA TIMETABLE (4 DAYS)

ELECTRONIC COMMERCE SYSTEMS

ACS 2916 Business Application Systems

Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister

Appendix A. Specific Learning Objectives by Course

THE EXPENDITURE CYCLE Part I

Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget

Proposed Syllabus by C.S.J.M.University,Kanpur. Bachelors of Computer Application

IT Audit- Hospital Risks, Controls and Audit. AHIA Conference. Grant Thornton LLP. All rights reserved.

CHAPTER 12: INFORMATION SYSTEMS IN BUSINESS

One source. One amazing service. Procurement Process and the Sarbanes-Oxley Act

Competences: Specific Outcomes and Embedded Knowledge

Learning Outcome 1 The learner will: Understand the functions and operating modes of different business information systems. Indicative Content

Accounting information systems and business process : part 1

The Masters of Science in Information Systems & Technology

Course Description Bachelor in Management Information Systems

ก ก ก ก ก (3-0-6) ก ก ก (Introduction to Business) (Principles of Marketing)

Integrating Payables and Receivables to Unlock Working Capital

Enterprise Systems: From Supply Chains to ERP to CRM

Chapter 13. The Expenditure Cycle. Because this cycle involves the outflow of cash, it is the counterpoint to the revenue cycle

Financial Accounting. John J. Wild. Sixth Edition. McGraw-Hill/Irwin. Copyright 2013 by The McGraw-Hill Companies, Inc. All rights reserved.

Table of Contents: Chapter 2 Internal Control

Continuous auditing: the audit of the future

Learning Objectives. Supply Chains & SCM Defined. Learning Objectives con t. Components of a Supply Chain for a Manufacturer

INFORMATION SYSTEM AUDITING AND ASSURANCE

Internal Control Deliverables. For. System Development Projects

Introduction to Business Information Systems

Internal Controls. A short presentation from Your Internal Audit Department

Understanding SOC Reports for Effective Vendor Management. Jason T. Clinton January 26, 2016

IT Components of Interest to Accountants. Importance of IT and Computer Networks to Accountants

Accounts Payable Outsourcing Audit April 2014

CORPORATE LIQUIDITY. AVANTGARD epayment Services Leaving the check behind with an integrated payments service

tku.edu.tw/myday/ , 26 1

CIMA'S Official Learning System

Learning Objective 1. The Impact of Information Technology on the Audit Process. Describe how IT improves internal control.

Executive Summary Background Objectives and Approach Issues Matrix Observations and Considerations...

INTERNAL CONTROL POLICIES

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

Corporate Property Automated Information System CPAIS. Privacy Impact Assessment

Product Brief. Intacct Financials & Accounting. Intacct General Ledger

Accelerating Your Cash Flow

IT Governance and Control: An Analysis of CobIT 4.1. Prepared by: Mark Longo

Developing Effective Internal Controls Using the COSO Model

Third Party Risk Management 12 April 2012

Easy Flow-Based Reporting Procure to Pay, Order to Cash etc.

General Guidelines for the Development of Government Payment Programs

SUBSIDIARY LEDGER MANAGEMENT AND INTERNAL CONTROLS

Contents. xv xvii xxi. Case Studies Preface Acknowledgments

Abila. MIP Fund Accounting. Solutions overview. Accounts payable. Accounts receivable reporting, billing, and sales order entry

Web Based Point of Sale System

CIO-SP3 Service areas NIH Chief Information Officers-Solutions & Partners

INFORMATION TECHNOLOGY CONTROLS

Basic Concepts of Accounting Subsidiary Subsidiary Special Special Inform Infor a m tion Ledgers Ledger Journals Jour Systems

SECURITY AND EXTERNAL SERVICE PROVIDERS

Chapter 15 Auditing the Expenditure Cycle

contents CHAPTER 1 CHAPTER 2 Strategic Decision Making 32 Information Systems in Business 1 Opening Case: Revving Up Sales at Harley-Davidson 33

LEGAL SERVICES CORPORATION OFFICE OF INSPECTOR GENERAL FINAL REPORT ON SELECTED INTERNAL CONTROLS RHODE ISLAND LEGAL SERVICES, INC.

ENTERPRISE RESOURCE PLANNING SYSTEMS

AN AUDIT OF INTERNAL CONTROL OVER FINANCIAL REPORTING THAT IS INTEGRATED WITH AN AUDIT OF FINANCIAL STATEMENTS:

FRAUD RISK ASSESSMENT

Connecting the dots: IT to Business

Answer Question No. 1 which is compulsory and any five from the rest. a) What are the various components of electronic commerce applications?

Module 6. Business Application Software Audit

United Computer Group, Inc. Enterprise Management Software Questionnaire

Application Programming Interface (API)

NONPROFIT FINANCIAL MANAGEMENT SELF ASSESSMENT TOOL

P-Card Fraud Controls. Introduction

Accounts Payable. A Guide to Running an Efficient Department. 2nd Edition

THE USE OF THE ERP-CRM-CIM SYSTEMS WITHIN THE MASTER S DEGREE PROGRAMMES

Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare

Enterprise-Wide Information Systems in the Modern Organization

Chapter 9 The Study of Internal Control and Assessment of Control Risk

MANAGEMENT AUDIT REPORT ACCOUNTS PAYABLE

Abila. MIP Fund Accounting. Solution module overview

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

Governance, Risk & Compliance for Public Sector

Antifraud program and controls assessment grid*

LOCAL GOVERNMENT MANAGEMENT ASSESSMENT OVERVIEW AND QUESTIONNAIRE

Transcription:

ACCOUNTING INFORMATION SYSTEMS Controls and Processes SECOND EDITION <s> LESLIE TURIHIER WILEY

MODULE 1 Introduction to AIS INTRODUCTION Defines business processes, AIS, and all foundational concepts. This module provides the knowledge building blocks to support the remaining chapters. Overview of Business Processes 2 Overview of an Accounting Information System 4 Business Process Linkage Throughout the Supply Chain 6 IT Enablement of Business Processes 8 Basic Computer and IT Concepts 10 BASIC COMPUTER DATA STRUCTURES 10 ' FILE ACCESS AND PROCESSING MODES 11 DATA WAREHOUSE AND DATA MINING 12 NETWORKS AND THE INTERNET 13 Examples of IT Enablement 14 E-BUSINESS 15 ELECTRONIC DATA INTERCHANGE 15 POINT OF SALE SYSTEM 15 AUTOMATED MATCHING 15 EVALUATED RECEIPT SETTLEMENT 16 E-PAYABLES AND ELECTRONIC INVOICE PRESENTMENT AND PAYMENT 16 ENTERPRISE RESOURCE PLANNING SYSTEMS 16 The Internal Control Structure of Organizations 17 ENTERPRISE RISK MANAGEMENT 18 A CODE OF ETHICS 20 COSO ACCOUNTING INTERNAL CONTROL STRUCTURE 20 IT CONTROLS 20 CORPORATE GOVERNANCE 20 IT GOVERNANCE 21 The Importance of Accounting Information Systems to Accountants USERS OF THE AIS 22 DESIGN OR IMPLEMENTATION TEAM 22 AN AUDITOR OF THE AIS 22 The Relation of Ethics to Accounting Information Systems 5 CONCEPT CHECK 26 DISCUSSION QUESTIONS 27 BRIEF EXERCISES 28 PROBLEMS 29 CASES 30 CONTINUING CASE: ROBATELU'S PIZZERIA SOLUTIONS TO CONCEPT CHECK 37 Foundational Concepts of the AIS Interrelationships of Business Processes and the AIS Types of Accounting Information Systems MANUAL SYSTEMS 43 LEGACY SYSTEMS 45 MODERN, INTEGRATED SYSTEMS 47 Client-Server Computing Cloud Computing Accounting Software Market Segments Input Methods Used in Business Processes SOURCE DOCUMENTS AND KEYING BAR CODES 55 54 32 22 22 24 25 26 39 41 43 47 48 52 54

xx O Contents POINT OF SALE SYSTEMS 56 ELECTRONIC DATA INTERCHANGE E-BUSINESS AND E-COMMERCE 56 56 Processing Accounting Data 57 BATCH PROCESSING 57 ONLINE AND REAL-TIME PROCESSING 58 Outputs from the AIS Related to Business Processes 59 Documenting Processes and Systems 60 PROCESS MAPS 60 SYSTEM'FLOWCHARTS 62 DOCUMENT FLOWCHARTS 64 DATA Fl!0W DIAGRAMS 65 ENTITY RELATIONSHIP DIAGRAMS 67 Ethical Considerations at the Foundation of Accounting Information Systems 69 3,7O 71 Appendix: Resources Events Agents (REA) in Accounting Information Systems 72 74 CONCEPT CHECK 74 DISCUSSION QUESTIONS 76 BRIEF EXERCISES 77 PROBLEMS 78 CASES 79 79 SOLUTIONS TO CONCEPT CHECK 80 The Nature of Computer Fraud INTERNAL SOURCES OF COMPUTER FRAUD 93 EXTERNAL SOURCES OF COMPUTER FRAUD 94 Policies to Assist in the Avoidance of Fraud and Errors Maintenance of a Code of Ethics Maintenance of Accounting Internal'Controls THE DETAILS OF THE COSO REPORT 99 MONITORING 107 REASONABLE ASSURANCE OF INTERNAL CONTROLS 108 Maintenance of Information Technology Controls Appendix A: Recent History of Internal Control Standards Appendix B: Control Objectives for Information Technology (COBIT) CONCEPT CHECK 115 DISCUSSION QUESTIONS 117 BRIEF EXERCISES 118 PROBLEMS 119 CASES 121 124 SOLUTIONS TO CONCEPT CHECK 124 93 96 96 97 109 111 112 113 114 115 MODULE 2 CONTROL ENVIRONMENT Describes the proper control environment to oversee and control processes. Internal Controls and Risks in IT Systems 127 An Overview of Internal Controls for IT Systems 128 Fraud, Ethics, and Internal Control 83 Introduction to the Need for a Code of Ethics and Internal Controls 84 General Controls for IT Systems 130 AUTHENTICATION OF USERS AND LIMITING UNAUTHORIZED USERS 130 HACKING AND OTHER NETWORK BREAK-INS.133 ORGANIZATIONAL STRUCTURE 136 PHYSICAL ENVIRONMENT AND SECURITY 137 BUSINESS CONTINUITY 139 Accounting-Related Fraud CATEGORIES OF ACCOUNTING-RELATED FRAUD The Nature of Management Fraud The Nature of Employee Fraud The Nature of Customer Fraud The Nature of Vendor Fraud 89 86 89 91 92 93 General Controls from an AICPA Trust Services Principles Perspective 140 RISKS IN NOT LIMITING UNAUTHORIZED USERS 141 RISKS FROM HACKING OR OTHER NETWORK BREAK-INS 144 RISKS FROM ENVIRONMENTAL FACTORS - 144 PHYSICAL ACCESS RISKS 145 BUSINESS CONTINUITY RISKS 145

Contents O xxi Hardware and Software Exposures in IT Systems 145 THE OPERATING SYSTEM 147 THE DATABASE 149 THE DATABASE MANAGEMENT SYSTEM 150 LANS AND WANS 151 WIRELESS NETWORKS 151 THE INTERNET AND WORLD WIDE WEB 152 TELECOMMUTING WORKERS AND MOBILE WORKERS 152 ELECTRONIC DATA INTERCHANGE 153 CLOUD COMPUTING 154 Application Software and Application Controls 156 INPUT CONTROLS 156 PROCESSING CONTROLS 163 OUTPUT CONTROLS 164 Ethical Issues in IT Systems *.* CONCEPT CHECK 167 DISCUSSION QUESTIONS BRIEF EXERCISES 170 PROBLEMS 172 CASES 173 169 SOLUTIONS TO CONCEPT CHECK 175 J 175 164 165 166 167 Corporate Governance and the Sarbanes-Oxley Act 179 An Overview of Corporate Governance 180 Participants in the Corporate Governance Process 181 Functions within the Corporate Governance Process 185 MANAGEMENT OVERSIGHT 185 INTERNAL CONTROLS AND COMPLIANCE 186 FINANCIAL STEWARDSHIP 188 ETHICAL CONDUCT 189 The History of Corporate Governance 189 The Sarbanes-Oxley Act of 2002 190 The Impact of the Sarbanes-Oxley Act on Corporate Governance 196 The Importance of Corporate Governance in the Study of Accounting Information Systems 199 Ethics and Corporate Governance 200 202 203 204 CONCEPT CHECK. 204 DISCUSSION QUESTIONS' 206 BRIEF EXERCISES 207 PROBLEMS 207 CASES 208 208 SOLUTIONS TO CONCEPT CHECK 208 IT Governance 211 Introduction to IT Governance 212 An Overview of the SDLC 216 THE PHASES OF THE SDLC 219 Elements of the Systems Planning Phase of the SDLC 219 THE MATCH OF IT SYSTEMS TO STRATEGIC OBJECTIVES 220. FEASIBILITY STUDY 221 PLANNING AND OVERSIGHT OF THE PROPOSED CHANGES 222 Elements of the Systems Analysis Phase of the SDLC 222 PRELIMINARY INVESTIGATION 222 SYSTEM SURVEY: THE STUDY OF THE CURRENT SYSTEM 223 DETERMINATION OF USER REQUIREMENTS 224 ANALYSIS OF THE SYSTEM SURVEY 225 SYSTEMS ANALYSIS REPORT 226 Elements of the Systems Design Phase of the SDLC 226 THE PURCHASE OF SOFTWARE 226 IN-HOUSE DESIGN 228 CONCEPTUAL DESIGN 229 EVALUATION AND'SELECTION 230 CLOUD COMPUTING AS A CONCEPTUAL DESIGN 232 DETAILED DESIGN 233 Elements of the Systems Implementation Phase of the SDLC 235 SOFTWARE PROGRAMMING 236 TRAINING EMPLOYEES 236 SOFTWARE TESTING 236 DOCUMENTING THE SYSTEM 236 DATA CONVERSION 236 SYSTEM CONVERSION 237 USER ACCEPTANCE 237 POST-IMPLEMENTATION REVIEW 238 Elements of the Operation and Maintenance Phase of the SDLC 238

XXII Contents The Critical Importance of IT Governance in an Organization SDLC AS PART OF STRATEGIC MANAGEMENT 239 SDLC AS AN INTERNAL CONTROL 239 Ethical Considerations Related to IT Governance ETHICAL CONSIDERATIONS FOR MANAGEMENT 240 ETHICAL CONSIDERATIONS FOR EMPLOYEES 241 ETHICAL CONSIDERATIONS FOR CONSULTANTS 242 CONCEPT CHECK 245 DISCUSSION QUESTIONS 246 BRIEF EXERCISES 247 PROBLEMS 248 CASES 249 SOLUTIONS TO CONCEPT.CHECK 250 249 238 240 243 244 245 Auditing Information Technology-Based Processes 253 Introduction to Auditing IT Processes 254 Types of Audits and Auditors 254 Information Risk and IT-Enhanced Internal Control 256 Authoritative Literature Used in Auditing 257 Management Assertions and Audit Objectives 259 Phases of an IT Audit 261 AUDIT PLANNING 261 Use of Computers in Audits 264 Tests of Controls 265 GENERAL CONTROLS 265 APPLICATION CONTROLS 269 Tests of Transactions and Tests of Balances 274 Audit Completion/Reporting 276 Other Audit Considerations 277 DIFFERENT IT ENVIRONMENTS 277 CHANGES IN A CLIENT'S IT ENVIRONMENT 280 SAMPLING 281 Ethical Issues Related to Auditing 281 285 286 287 CONCEPT CHECK 287 DISCUSSION QUESTIONS 291 BRIEF EXERCISES 292 PROBLEMS 293 CASES 294 SOLUTIONS TO CONCEPT CHECK 295 MODULE 3 295 BUSINESS PROCESSES The sets of business processes and the internal controls in organizations. With process maps, document flowcharts, and data flow diagrams, the core business processes are described and the necessary controls to manage risk are discussed. Revenue and Cash Collection Processes and Controls 299 Introduction to Revenue Processes 300 Sales Processes 303 Risks and Controls in Sales Processes 308 AUTHORIZATION OF TRANSACTIONS 309 SEGREGATION OF DUTIES 309 ADEQUATE RECORDS AND DOCUMENTS 309 SECURITY OF ASSETS AND DOCUMENTS 310 INDEPENDENT CHECKS AND RECONCILIATION 310 COST-BENEFIT CONSIDERATIONS 310 Sales Return Processes 313 Risks and Controls in Sales Return Processes 313 AUTHORIZATION OF TRANSACTIONS 313 SEGREGATION OF DUTIES 315 ADEQUATE RECORDS AND DOCUMENTS 315 SECURITY OF ASSETS AND DOCUMENTS 316 INDEPENDENT CHECKS AND RECONCILIATION 316 COST-BENEFIT CONSIDERATIONS 316 Cash Collection Processes 318 Risks and Controls in the Cash Collection Processes 322 AUTHORIZATION OF TRANSACTIONS 322 SEGREGATION OF DUTIES 322 ADEQUATE RECORDS AND DOCUMENTS 323 SECURITY OF ASSETS AND DOCUMENTS 323 INDEPENDENT CHECKS AND RECONCILIATION 323 COST-BENEFIT CONSIDERATIONS 324 IT-Enabled Systems of Revenue and Cash Collection Processes 325

Contents O xxiii E-Business Systems and the Related Risks and Controls SECURITY AND CONFIDENTIALITY RISKS 330 PROCESSING INTEGRITY RISKS 330 AVAILABILITY RISKS 331 Electronic Data Interchange (EDI) Systems and the Risks and Controls Po t int of Sale (POS) Systems and the Related Risks and Controls Ethical Issues Related to Revenue Processes Corporate Governance in Revenue Processes CONCEPT CHECK 341 DISCUSSION QUESTIONS BRIEF EXERCISES 345 PROBLEMS 346 CASES 352 CASH RECEIPTS 358 SALES 358 BANK DEPOSITS 359 344 SOLUTIONS TO CONCEPT CHECK 360 359 331 335 337 339 339 341 341 Expenditures Processes and Controls Purchases 363 Introduction to Expenditures Processes Purchasing Processes Risks and Controls in the Purchasing Process AUTHORIZATION OF TRANSACTIONS SEGREGATION OF DUTIES 373 373 ' ADEQUATE RECORDS AND. DOCUMENTS 374 SECURITY OF ASSETS AND DOCUMENTS 374 INDEPENDENT CHECKS AND RECONCILIATION 374 COST-BENEFIT CONSIDERATIONS 375 Purchase Return Process Risks and Controls in the Purchase Return Processes AUTHORIZATION OF TRANSACTIONS 381 SEGREGATION OF DUTIES 381 ADEQUATE RECORDS AND DOCUMENTS 381 SECURITY OF ASSETS AND idocuments 381 INDEPENDENT CHECKS AND RECONCILIATION 381 COST-BENEFIT CONSIDERATIONS 382 364 367 373 376 381 Cash Disbursement Processes 383 Risks and Controls in the Cash Disbursement Processes 388 AUTHORIZATION OF TRANSACTIONS 388 SEGREGATION OF DUTIES 389 ADEQUATE RECORDS AND DOCUMENTS 389 SECURITY OF ASSETS AND DOCUMENTS 389 INDEPENDENT CHECKS AND RECONCILIATION 390 COST-BENEFIT CONSIDERATIONS 390 IT Systems of Expenditures and Cash Disbursement Processes 391 Computer-Based Matching 393 Risks and Controls in Computer-Based Matching 394 SECURITY AND CONFIDENTIALITY RISKS 394 PROCESSING INTEGRITY RISKS 395 AVAILABILITY RISKS 395 Evaluated Receipt Settlement 395 Risks and Controls in Evaluated Receipt Settlement 397 SECURITY AND CONFIDENTIALITY 397 PROCESSING INTEGRITY AVAILABILITY 397 397 ' E-Business and Electronic Data Interchange (EDI) 398 Risks and Controls in E-Business and EDI 398 SECURITY AND CONFIDENTIALITY 399 PROCESSING INTEGRITY 399 AVAILABILITY 400 E-Payables 400 Procurement Cards 401 Ethical Issues Related to Expenditures Processes 401 Corporate Governance in Expenditure Processes 403 CONCEPT CHECK 407 DISCUSSION QUESTIONS 410 BRIEF EXERCISES 411 PROBLEMS 411 CASES 415 420 SOLUTIONS TO CONCEPT CHECK 421 U UU Expenditures Processes and Controls- Payroll and Fixed Assets Introduction to Payroll and Fixed Asset Processes Pavroll Processes 404 406 407 425 426 429

xxiv O Contents Risks and Controls in the Payroll Processes AUTHORIZATION OF TRANSACTIONS 437 SEGREGATION OF DUTIES 437 ADEQUATE RECORDS AND DOCUMENTS 438 SECURITY OF ASSETS AND DOCUMENTS 438 INDEPENDENT CHECKS AND RECONCILIATION 439 COST-BENEFIT CONSIDERATIONS 440 IT Systems of Payroll Processes Fixed Assets Processes FIXED ASSET ACQUISITIONS 442 FIXED ASSETS CONTINUANCE 446 FIXED ASSETS DISPOSALS 447 Risks and Controls in Fixed Assets Processes AUTHORIZATION OF TRANSACTIONS 450 SEGREGATION OF DUTIES 451 ADEQUATE RECORDS AND DOCUMENTS 451 SECURITY OF ASSETS AND DOCUMENTS 451 INDEPENDENT CHECKS AND RECONCILIATION 451 COST-BENEFIT CONSIDERATIONS 453 IT Systems of Fixed Assets Processes Ethical Issues Related to Payroll and Fixed Assets Processes Corporate Governance in Payroll and Fixed Assets Processes CONCEPT CHECK 460 DISCUSSION QUESTIONS BRIEF EXERCISES 464 PROBLEMS 465 CASES 467 463 SOLUTIONS TO CONCEPT CHECK 471 469 437 440 442 450 453 455 457 459 460 460 11- Conversion Processes and Controls 473 Basic Features of Conversion Processes Components of the Logistics Function PLANNING 476' RESOURCE MANAGEMENT 479 OPERATIONS 481 Cost Accounting Reports Generated by Conversion Processes 474 476 485 Risks and Controls in Conversion Processes AUTHORIZATION OF TRANSACTIONS SEGREGATION OF DUTIES 486 486 ADEQUATE RECORDS AND DOCUMENTS 487 SECURITY OF ASSETS AND DOCUMENTS 487 INDEPENDENT CHECKS AND RECONCILIATION 487 COST-BENEFIT CONSIDERATIONS 488 IT Systems of Conversion Processes Ethical Issues Related to Conversion Processes Corporate Governance in Conversion Processes CONCEPT CHECK 496 DISCUSSION QUESTIONS 498 BRIEF EXERCISES 499 PROBLEMS 501 CASES 502 SOLUTIONS TO CONCEPT CHECK 506 506 486 489 493 494 494 495 496 Administrative Processes and Controls 509 Introduction to Administrative Processes 511 Source of Capital Processes 513 Investment Processes 514 Risks and Controls in Capital and Investment Processes 516 General Ledger Processes 516 Risks and Controls in General Ledger Processes 520 AUTHORIZATION OF TRANSACTIONS 520. SEGREGATION OF DUTIES 522 ADEQUATE RECORDS AND DOCUMENTS 525 ~ T ~ SECURITY OF THE GENERAL LEDGER AND DOCUMENTS 525 INDEPENDENT CHECKS AND RECONCILIATION 525 Reporting as an Output of the General Ledger Processes ' 526 EXTERNAL REPORTING 527 INTERNAL REPORTING 527

Contents O xxv Ethical Issues Related to Administrative Processes and Reporting 528 UNETHICAL MANAGEMENT BEHAVIOR IN CAPITAL SOURCES AND INVESTING 529 INTERNAL REPORTING OF ETHICAL ISSUES 530 Corporate Governance in Administrative Processes and Reporting 531 532 533 End of.chapter Material. 534 CONCEPT CHECK 534 DISCUSSION QUESTIONS 535 BRIEF EXERCISES 536 PROBLEMS 537 CASE 538 538 SOLUTIONS TO CONCEPT CHECK 539. &.., MODULE 4 IT INFRASTRUCTURE TO ENABLE PROCESSES The hardware, software, and systems that support business processes. r Data and Databases 541 The Need for Data Collection and Storage Storing and Accessing Data DATA STORAGE TERMINOLOGY 544 DATA STORAGE MEDIA 544 Data Processing Techniques Databases THE HISTORY OF DATABASES 549 The Need for Normalized Data TRADE-OFFS IN DATABASE STORAGE 554 Use of a Data Warehouse to Analyze Data BUILD THE DATA WAREHOUSE IDENTIFY THE DATA 555 STANDARDIZE THE DATA 556 555 ' CLEANSE, OR SCRUB, THE DATA 556 UPLOAD THE DATA 556 Data Analysis Tools DATA MINING 557 OLAP 558 Distributed Data Processing DDPANDDDB 560 Cloud-Based Databases IT Controls for Data and Databases 542 544 546 547 551 554 556 559 561 562 Ethical Issues Related to Data Collection and Storage ETHICAL RESPONSIBILITIES OF THE COMPANY 564 ETHICAL RESPONSIBILITIES OF EMPLOYEES 566 ETHICAL RESPONSIBILITIES OF CUSTOMERS CONCEPT CHECK 569 DISCUSSION QUESTIONS 571 BRIEF EXERCISES 572 PROBLEMS 573 CASES 573. SOLUTIONS TO CONCEPT CHECK 575 566 575 563 567 568 569 E-Commerce and E-Business 577 Introduction to E-Commerce and E-Business 578 The History of the Internet 579 The Physical Structure and Standards of the Internet 582 THE NETWORK 582 THE COMMON STANDARDS OF THE INTERNET 583 E-Commerce and Its Benefits 586 BENEFITS AND DISADVANTAGES OF E-COMMERCE FOR THE CUSTOMER 587 BENEFITS AND DISADVANTAGES OF E-COMMERCE FOR THE BUSINESS 588 THE COMBINATION OF E-COMMERCE AND TRADITIONAL COMMERCE 589 Privacy Expectations in E-Commerce 590 E-Business and IT Enablement 592 B2B: APARTOF"E-BUSINESS 594 E-Business Enablement Examples 596 Intranets and Extranets to Enable, E-Business 598 Internal Controls for the Internet, Intranets, and Extranets 599 XML and XBRL as Tools to Enable E-Business 601 XML IN INTERNET EDI 601 XBRL FOR FINANCIAL STATEMENT REPORTING 603 Ethical Issues Related to E-Business and E-Commerce 604