SlideShare a Scribd company logo
1 of 49
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Accounting Information Systems, 8e
James A. Hall
Chapter 15
IT Controls Part I:
Sarbanes-Oxley &
IT Governance
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Objectives for Chapter 15
 Understand the key features of Sections 302 and 404
of the Sarbanes-Oxley Act.
 Understand management and auditor responsibilities
under Sections 302 and 404.
 Understand the risks of incompatible functions and
how to structure the IT function.
 Be familiar with the controls and precautions required
to ensure the security of an organization’s computer
facilities.
 Understand the key elements of a disaster recovery
plan.
 Be familiar with the benefits, risks and audit issues
related to IT Outsourcing.
2
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Sarbanes-Oxley Act
 The 2002 Sarbanes-Oxley (SOX) Act
established new corporate governance rules
 Created company accounting oversight board
 Increased accountability for company officers
and board of directors
 Increased white collar crime penalties
 Prohibits a company’s external audit firms from
designing and implementing financial
information systems
3
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
SOX Section 302
 Section 302—in quarterly and annual financial
statements, management must:
 certify the internal controls (IC) over financial
reporting
 state responsibility for IC design
 provide reasonable assurance as to the reliability
of the financial reporting process
 disclose any recent material changes in IC
4
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
SOX Section 404
 Section 404—in the annual report on IC
effectiveness, management must:
 state responsibility for establishing and
maintaining adequate financial reporting IC
 assess IC effectiveness
 reference the external auditors’ attestation report
on management’s IC assessment
 provide explicit conclusions on the effectiveness of
financial reporting IC
 identify the framework management used to
conduct their IC assessment, e.g., COBIT
5
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
IT Controls & Financial Reporting
 Modern financial reporting is driven
by information technology (IT)
 IT initiates, authorizes, records, and
reports the effects of financial
transactions.
 Financial reporting IC are
inextricably integrated to IT.
6
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
IT Controls & Financial Reporting
 COSO identifies two groups of IT
controls:
 application controls – apply to specific
applications and programs, and ensure
data validity, completeness and accuracy
 general controls – apply to all systems
and address IT governance and
infrastructure, security of operating
systems and databases, and application
and program acquisition and
development
7
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Sales CGS AP CashInventory
Significant
Financial
Accounts
Order Entry
Application Controls
Cash Disbursements
Application Controls
Purchases
Application Controls
Related
Application
Controls
Systems Development and Program Change Control
Database Access Controls
Operating System Controls
Supporting
General
Controls
Controls
for
Review
IT Controls & Financial Reporting
8
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
SOX Audit Implications
 Pre-SOX, audits did not require IC tests.
 Only required to be familiar with client’s IC
 Audit consisted primarily of substantive tests
 SOX – radically expanded scope of audit
 Issue new audit opinion on management’s IC
assessment
 Required to test IC affecting financial
information, especially IC to prevent fraud
 Collect documentation of management’s IC
tests and interview management on IC
changes 9
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Computer Fraud Schemes
 Theft, misuse, or misappropriation of assets by
altering computer-readable records and files
 Theft, misuse, or misappropriation of assets by
altering logic of computer software
 Theft or illegal use of computer-readable
information
 Theft, corruption, illegal copying or intentional
destruction of software
 Theft, misuse, or misappropriation of computer
hardware
10
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Using the general IS model,
explain how fraud can occur at the different
stages of information processing?
11
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Data Collection Fraud
 This aspect of the system is the most
vulnerable because it is relatively easy to
change data as it is being entered into the
system.
 Also, the GIGO (garbage in, garbage out)
principle reminds us that if the input data is
inaccurate, processing will result in inaccurate
output.
12
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Data Processing Fraud
Program Frauds
 altering programs to allow illegal access to
and/or manipulation of data files
 destroying programs with a virus
Operations Frauds
 misuse of company computer resources, such
as using the computer for personal business
13
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Database Management Fraud
 Altering, deleting, corrupting, destroying, or
stealing an organization’s data
 Oftentimes conducted by disgruntled or ex-
employee
14
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Information Generation Fraud
Stealing, misdirecting, or misusing computer
output
Scavenging
 searching through the trash cans on the
computer center for discarded output (the
output should be shredded, but frequently is
not)
15
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Organizational Structure IC
 Audit objective – verify that individuals in
incompatible areas are segregated to
minimize risk while promoting operational
efficiency
 IC, especially segregation of duties,
affected by which of two organizational
structures applies:
 Centralized model
 Distributed model
16
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
17
Organizational Chart of a Centralized
Information Technology Function
Figure 15-3
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
18
Distributed Organization with Corporate
Information Technology Function
Figure 15-5
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Segregation of Duties
 Transaction authorization is separate
from transaction processing.
 Asset custody is separate from record-
keeping responsibilities.
 The tasks needed to process the
transactions are subdivided so that fraud
requires collusion.
19
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Authorization
Authorization
Journals
Processing
Custody Recording
Subsidiary Ledgers General Ledger
Segregation of Duties Objectives
Nested Control Objectives for Transactions
Control
Objective 1
Control
Objective 2
Control
Objective 3
20
TRANSACTION
Figure 3-4
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Centralized IT Structure
 Critical to segregate:
 systems development from computer
operations
 database administrator (DBA) from other
computer service functions
• DBA’s authorizing and systems
development’s processing
• DBA authorizes access
 maintenance from new systems
development
 data library from operations
21
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Distributed IT Structure
 Despite its many advantages, important
IC implications are present:
 incompatible software among the
various work centers
 data redundancy may result
 consolidation of incompatible tasks
 difficulty hiring qualified professionals
 lack of standards
22
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Organizational Structure IC
 A corporate IT function alleviates
potential problems associated with
distributed IT organizations by
providing:
 central testing of commercial hardware
and software
 a user services staff
 a standard-setting body
 reviewing technical credentials of
prospective systems professionals
23
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Audit Procedures
 Review the corporate policy on computer
security
 Verify that the security policy is communicated
to employees
 Review documentation to determine if
individuals or groups are performing
incompatible functions
 Review systems documentation and
maintenance records
 Verify that maintenance programmers are not
also design programmers
24
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Audit Procedures
 Observe if segregation policies are followed in
practice.
 E.g., check operations room access logs to
determine if programmers enter for reasons
other than system failures
 Review user rights and privileges
 Verify that programmers have access
privileges consistent with their job descriptions
25
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Computer Center IC
Audit objectives:
 physical security IC protects the computer
center from physical exposures
 insurance coverage compensates the
organization for damage to the computer
center
 operator documentation addresses routine
operations as well as system failures
26
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Computer Center IC
Considerations:
 man-made threats and natural hazards
 underground utility and communications lines
 air conditioning and air filtration systems
 access limited to operators and computer center
workers; others required to sign in and out
 fire suppression systems installed
 fault tolerance
 redundant disks and other system components
 backup power supplies
27
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Audit Procedures
 Review insurance coverage on hardware,
software, and physical facility
 Review operator documentation, run
manuals, for completeness and accuracy
 Verify that operational details of a
system’s internal logic are not in the
operator’s documentation
28
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Disaster Recovery Planning
 Disaster recovery plans (DRP) identify:
 actions before, during, and after the
disaster
 disaster recovery team
 priorities for restoring critical applications
 Audit objective – verify that DRP is
adequate and feasible for dealing with
disasters
29
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Disaster Recovery Planning
 Major IC concerns:
 second-site backups
 critical applications and databases
• including supplies and documentation
 back-up and off-site storage procedures
 disaster recovery team
 testing the DRP regularly
30
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Second-Site Backups
 Empty shell - involves two or more user
organizations that buy or lease a building
and remodel it into a computer site, but
without computer equipment
 Recovery operations center - a
completely equipped site; very costly and
typically shared among many companies
 Internally provided backup - companies
with multiple data processing centers may
create internal excess capacity
31
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
DRP Audit Procedures
 Evaluate adequacy of second-site
backup arrangements
 Review list of critical applications for
completeness and currency
 Verify that procedures are in place for
storing off-site copies of applications
and data
 Check currency back-ups and copies
32
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
DRP Audit Procedures
 Verify that documentation, supplies, etc.,
are stored off-site
 Verify that the disaster recovery team
knows its responsibilities
 Check frequency of testing the DRP
33
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Benefits of IT Outsourcing
 Improved core business processes
 Improved IT performance
 Reduced IT costs
34
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Risks of IT Outsourcing
 Failure to perform
 Vendor exploitation
 Costs exceed benefits
 Reduced security
 Loss of strategic advantage
35
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Audit Implications of IT
Outsourcing
 Management retains SOX responsibilities
 SAS No. 70 report or audit of vendor will be
required
36
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Accounting Information Systems, 8e
James A. Hall
Audit
Background
Material
From Appendix
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
External (Financial) Audits
 An independent attestation by a
professional (CPA) regarding the faithful
representation of the financial statements
 Three phases of a financial audit:
 familiarization with client firm
 evaluation and testing of internal controls
 assessment of reliability of financial data
38
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Attestation versus Assurance
 Attestation:
 practitioner is engaged to issue a written
communication that expresses a conclusion
about the reliability of a written assertion that
is the responsibility of another party.
 Assurance:
 professional services that are designed to
improve the quality of information, both
financial and non-financial, used by decision-
makers
 includes, but is not limited to attestation
39
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Attest and Assurance Services
40
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
External versus Internal Auditing
 External auditors – represent the
interests of third party stakeholders
 Internal auditors – serve an independent
appraisal function within the organization
 Often perform tasks which can reduce
external audit fees and help to achieve
audit efficiency
41
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Generally Accepted Auditing
Standards (GAAS)
42
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Auditing Management’s Assertions
43
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Audit Risk is...
the probability the auditor will issue an
unqualified (clean) opinion when in
fact the financial statements are
materially misstated.
44
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Three Components of Audit Risk
 Inherent risk – associated with the unique
characteristics of the business or industry of
the client
 Control risk – the likelihood that the control
structure is flawed because controls are either
absent or inadequate to prevent or detect
errors in the accounts
 Detection risk – the risk that errors not
detected or prevented by the control structure
will also not be detected by the auditor
45
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Types of Audit Tests
 Tests of controls – tests to determine
if appropriate IC are in place and
functioning effectively
 Substantive testing – detailed
examination of account balances and
transactions
46
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
What is an IT Audit?
Since most information systems employ IT,
the IT audit is a critical component of all
external and internal audits.
 IT audits:
 focus on the computer-based aspects of an
organization’s information system
 assess the proper implementation, operation,
and control of computer resources
47
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Elements of an IT Audit
 Systematic procedures are used
 Evidence is obtained
 tests of internal controls
 substantive tests
 Determination of materiality for
weaknesses found
 Prepare audit report & audit opinion
48
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Phases of an IT Audit
49
Figure 15-9

More Related Content

What's hot

Chapter 1 - The Information System: An Accountant's Perspective
Chapter 1 - The Information System: An Accountant's PerspectiveChapter 1 - The Information System: An Accountant's Perspective
Chapter 1 - The Information System: An Accountant's Perspectiveermin08
 
Oracle hfm beginner's guide part i
Oracle hfm beginner's guide  part iOracle hfm beginner's guide  part i
Oracle hfm beginner's guide part iAmit Sharma
 
GAFFEYAutomatedClaimsStatusWhitepaper
GAFFEYAutomatedClaimsStatusWhitepaperGAFFEYAutomatedClaimsStatusWhitepaper
GAFFEYAutomatedClaimsStatusWhitepaperDerek Morkel
 
Strengthen your Foundations
Strengthen your FoundationsStrengthen your Foundations
Strengthen your FoundationsRay Février
 
Jeffery Leu | Asset Management - Conserve Cash as well as Boost Productivity
Jeffery Leu | Asset Management - Conserve Cash as well as Boost ProductivityJeffery Leu | Asset Management - Conserve Cash as well as Boost Productivity
Jeffery Leu | Asset Management - Conserve Cash as well as Boost ProductivityJefferyLeu
 
Identify and monitoring multi-platform and cross-platform access control
Identify and monitoring multi-platform and cross-platform access controlIdentify and monitoring multi-platform and cross-platform access control
Identify and monitoring multi-platform and cross-platform access controlAlice Cantu
 
Managing Assets for Maximum Performance and Value
Managing Assets for Maximum Performance and ValueManaging Assets for Maximum Performance and Value
Managing Assets for Maximum Performance and ValueEMC
 

What's hot (13)

Pp 16-new
Pp 16-newPp 16-new
Pp 16-new
 
Pp 05-new
Pp 05-newPp 05-new
Pp 05-new
 
Pp 02-new
Pp 02-newPp 02-new
Pp 02-new
 
Chapter 1 - The Information System: An Accountant's Perspective
Chapter 1 - The Information System: An Accountant's PerspectiveChapter 1 - The Information System: An Accountant's Perspective
Chapter 1 - The Information System: An Accountant's Perspective
 
Pp 06-new
Pp 06-newPp 06-new
Pp 06-new
 
Pp 08-new
Pp 08-newPp 08-new
Pp 08-new
 
Oracle hfm beginner's guide part i
Oracle hfm beginner's guide  part iOracle hfm beginner's guide  part i
Oracle hfm beginner's guide part i
 
Pp 03-new
Pp 03-newPp 03-new
Pp 03-new
 
GAFFEYAutomatedClaimsStatusWhitepaper
GAFFEYAutomatedClaimsStatusWhitepaperGAFFEYAutomatedClaimsStatusWhitepaper
GAFFEYAutomatedClaimsStatusWhitepaper
 
Strengthen your Foundations
Strengthen your FoundationsStrengthen your Foundations
Strengthen your Foundations
 
Jeffery Leu | Asset Management - Conserve Cash as well as Boost Productivity
Jeffery Leu | Asset Management - Conserve Cash as well as Boost ProductivityJeffery Leu | Asset Management - Conserve Cash as well as Boost Productivity
Jeffery Leu | Asset Management - Conserve Cash as well as Boost Productivity
 
Identify and monitoring multi-platform and cross-platform access control
Identify and monitoring multi-platform and cross-platform access controlIdentify and monitoring multi-platform and cross-platform access control
Identify and monitoring multi-platform and cross-platform access control
 
Managing Assets for Maximum Performance and Value
Managing Assets for Maximum Performance and ValueManaging Assets for Maximum Performance and Value
Managing Assets for Maximum Performance and Value
 

Similar to Pp 15-new

Pp 04-new revised by hall
Pp 04-new revised by hallPp 04-new revised by hall
Pp 04-new revised by hallRoshini Balan
 
Ch-01 accounting information system .pptx
Ch-01 accounting information system .pptxCh-01 accounting information system .pptx
Ch-01 accounting information system .pptxNafeesReza1
 
Hall asia edition pp ch01
Hall asia edition pp ch01Hall asia edition pp ch01
Hall asia edition pp ch01Nia Pratiwi
 
ETHICS FRAUD AND INTERNAL CONTROL AND AUDITING COMPUTERIZED FINANCIAL SYSSTEM...
ETHICS FRAUD AND INTERNAL CONTROL AND AUDITING COMPUTERIZED FINANCIAL SYSSTEM...ETHICS FRAUD AND INTERNAL CONTROL AND AUDITING COMPUTERIZED FINANCIAL SYSSTEM...
ETHICS FRAUD AND INTERNAL CONTROL AND AUDITING COMPUTERIZED FINANCIAL SYSSTEM...PascalOtieno
 
Accounting Information System Financial Reporting Design
Accounting Information System  Financial Reporting DesignAccounting Information System  Financial Reporting Design
Accounting Information System Financial Reporting DesignCharlie Congdon
 
B009 2010-iaasb-handbook-iaps-1013
B009 2010-iaasb-handbook-iaps-1013B009 2010-iaasb-handbook-iaps-1013
B009 2010-iaasb-handbook-iaps-1013RS NAVARRO
 
Chapter 9Effective and Efficient Business FunctionsPre.docx
Chapter 9Effective and Efficient Business FunctionsPre.docxChapter 9Effective and Efficient Business FunctionsPre.docx
Chapter 9Effective and Efficient Business FunctionsPre.docxchristinemaritza
 
Madura13e_Ch01.pptx
Madura13e_Ch01.pptxMadura13e_Ch01.pptx
Madura13e_Ch01.pptxRoni Sumitro
 
Ch01_Introduction to AIS v 5.pptx
Ch01_Introduction to AIS v 5.pptxCh01_Introduction to AIS v 5.pptx
Ch01_Introduction to AIS v 5.pptxNurulSyakirin2
 
Oracle hfm beginner's guide part i
Oracle hfm beginner's guide  part iOracle hfm beginner's guide  part i
Oracle hfm beginner's guide part iAmit Sharma
 

Similar to Pp 15-new (20)

Pp 01-AIS CHP 1
Pp 01-AIS CHP 1Pp 01-AIS CHP 1
Pp 01-AIS CHP 1
 
Pp 01-new
Pp 01-newPp 01-new
Pp 01-new
 
Pp 03-new
Pp 03-newPp 03-new
Pp 03-new
 
Pp 04-new revised by hall
Pp 04-new revised by hallPp 04-new revised by hall
Pp 04-new revised by hall
 
Pp 04-new revised by hall
Pp 04-new revised by hallPp 04-new revised by hall
Pp 04-new revised by hall
 
Ch-01 accounting information system .pptx
Ch-01 accounting information system .pptxCh-01 accounting information system .pptx
Ch-01 accounting information system .pptx
 
Pp 05-new
Pp 05-newPp 05-new
Pp 05-new
 
Pp 02-new
Pp 02-newPp 02-new
Pp 02-new
 
Pp 06-new
Pp 06-newPp 06-new
Pp 06-new
 
Pp 08-new
Pp 08-newPp 08-new
Pp 08-new
 
Hall asia edition pp ch01
Hall asia edition pp ch01Hall asia edition pp ch01
Hall asia edition pp ch01
 
ETHICS FRAUD AND INTERNAL CONTROL AND AUDITING COMPUTERIZED FINANCIAL SYSSTEM...
ETHICS FRAUD AND INTERNAL CONTROL AND AUDITING COMPUTERIZED FINANCIAL SYSSTEM...ETHICS FRAUD AND INTERNAL CONTROL AND AUDITING COMPUTERIZED FINANCIAL SYSSTEM...
ETHICS FRAUD AND INTERNAL CONTROL AND AUDITING COMPUTERIZED FINANCIAL SYSSTEM...
 
IPO Readiness SOX Sod
IPO Readiness SOX SodIPO Readiness SOX Sod
IPO Readiness SOX Sod
 
Accounting Information System Financial Reporting Design
Accounting Information System  Financial Reporting DesignAccounting Information System  Financial Reporting Design
Accounting Information System Financial Reporting Design
 
B009 2010-iaasb-handbook-iaps-1013
B009 2010-iaasb-handbook-iaps-1013B009 2010-iaasb-handbook-iaps-1013
B009 2010-iaasb-handbook-iaps-1013
 
Chapter 9Effective and Efficient Business FunctionsPre.docx
Chapter 9Effective and Efficient Business FunctionsPre.docxChapter 9Effective and Efficient Business FunctionsPre.docx
Chapter 9Effective and Efficient Business FunctionsPre.docx
 
Lecture 15
Lecture 15Lecture 15
Lecture 15
 
Madura13e_Ch01.pptx
Madura13e_Ch01.pptxMadura13e_Ch01.pptx
Madura13e_Ch01.pptx
 
Ch01_Introduction to AIS v 5.pptx
Ch01_Introduction to AIS v 5.pptxCh01_Introduction to AIS v 5.pptx
Ch01_Introduction to AIS v 5.pptx
 
Oracle hfm beginner's guide part i
Oracle hfm beginner's guide  part iOracle hfm beginner's guide  part i
Oracle hfm beginner's guide part i
 

More from Sri Apriyanti Husain

7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...Sri Apriyanti Husain
 
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...Sri Apriyanti Husain
 
15 ma aksya_tafakkur ke 1_sri apriyanti husain
15 ma aksya_tafakkur ke 1_sri apriyanti husain15 ma aksya_tafakkur ke 1_sri apriyanti husain
15 ma aksya_tafakkur ke 1_sri apriyanti husainSri Apriyanti Husain
 
15 ma aksya_tafakkur ke 1_sri apriyanti husain
15 ma aksya_tafakkur ke 1_sri apriyanti husain15 ma aksya_tafakkur ke 1_sri apriyanti husain
15 ma aksya_tafakkur ke 1_sri apriyanti husainSri Apriyanti Husain
 
Formulir pendaftaran-s3 p ps feb ub
Formulir pendaftaran-s3 p ps feb ubFormulir pendaftaran-s3 p ps feb ub
Formulir pendaftaran-s3 p ps feb ubSri Apriyanti Husain
 
Informasi pendaftaran pasca s2 & s3
Informasi pendaftaran  pasca s2 & s3Informasi pendaftaran  pasca s2 & s3
Informasi pendaftaran pasca s2 & s3Sri Apriyanti Husain
 
Informasi pendaftaran pasca s2 & s3
Informasi pendaftaran  pasca s2 & s3Informasi pendaftaran  pasca s2 & s3
Informasi pendaftaran pasca s2 & s3Sri Apriyanti Husain
 
146020300111009 sri apriyanti husain review jurnal_metode penelitian non posi...
146020300111009 sri apriyanti husain review jurnal_metode penelitian non posi...146020300111009 sri apriyanti husain review jurnal_metode penelitian non posi...
146020300111009 sri apriyanti husain review jurnal_metode penelitian non posi...Sri Apriyanti Husain
 
Review jurnal akuntansi forensik uas pp_ak kelas malam
Review jurnal akuntansi forensik uas pp_ak kelas malamReview jurnal akuntansi forensik uas pp_ak kelas malam
Review jurnal akuntansi forensik uas pp_ak kelas malamSri Apriyanti Husain
 
Review jurnal akuntansi forensik uas pp_ak kelas malam angkatan 24
Review jurnal akuntansi forensik uas pp_ak kelas malam angkatan 24Review jurnal akuntansi forensik uas pp_ak kelas malam angkatan 24
Review jurnal akuntansi forensik uas pp_ak kelas malam angkatan 24Sri Apriyanti Husain
 
Profit over people; neoliberalism, global order 1888363894
Profit over people; neoliberalism, global order 1888363894Profit over people; neoliberalism, global order 1888363894
Profit over people; neoliberalism, global order 1888363894Sri Apriyanti Husain
 
Review disertasi pak bambang haryadi
Review disertasi pak bambang haryadiReview disertasi pak bambang haryadi
Review disertasi pak bambang haryadiSri Apriyanti Husain
 
Review disertasi pak bambang haryadi
Review disertasi pak bambang haryadiReview disertasi pak bambang haryadi
Review disertasi pak bambang haryadiSri Apriyanti Husain
 
Psak 65-laporan-keuangan-konsolidasian-ifrs-10-consolidated-fs-22012014
Psak 65-laporan-keuangan-konsolidasian-ifrs-10-consolidated-fs-22012014Psak 65-laporan-keuangan-konsolidasian-ifrs-10-consolidated-fs-22012014
Psak 65-laporan-keuangan-konsolidasian-ifrs-10-consolidated-fs-22012014Sri Apriyanti Husain
 
Psak 58-aset-tidak-lancar-yang-dimiliki-untuk-dijual-dan-operasi-yang-dihenti...
Psak 58-aset-tidak-lancar-yang-dimiliki-untuk-dijual-dan-operasi-yang-dihenti...Psak 58-aset-tidak-lancar-yang-dimiliki-untuk-dijual-dan-operasi-yang-dihenti...
Psak 58-aset-tidak-lancar-yang-dimiliki-untuk-dijual-dan-operasi-yang-dihenti...Sri Apriyanti Husain
 
Psak 55-pengakuan-instrumen-keuangan-ias-39-18122013-pokok
Psak 55-pengakuan-instrumen-keuangan-ias-39-18122013-pokokPsak 55-pengakuan-instrumen-keuangan-ias-39-18122013-pokok
Psak 55-pengakuan-instrumen-keuangan-ias-39-18122013-pokokSri Apriyanti Husain
 

More from Sri Apriyanti Husain (20)

7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
 
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
 
15 ma aksya_tafakkur ke 1_sri apriyanti husain
15 ma aksya_tafakkur ke 1_sri apriyanti husain15 ma aksya_tafakkur ke 1_sri apriyanti husain
15 ma aksya_tafakkur ke 1_sri apriyanti husain
 
15 ma aksya_tafakkur ke 1_sri apriyanti husain
15 ma aksya_tafakkur ke 1_sri apriyanti husain15 ma aksya_tafakkur ke 1_sri apriyanti husain
15 ma aksya_tafakkur ke 1_sri apriyanti husain
 
Formulir pendaftaran-s3 p ps feb ub
Formulir pendaftaran-s3 p ps feb ubFormulir pendaftaran-s3 p ps feb ub
Formulir pendaftaran-s3 p ps feb ub
 
Informasi pendaftaran pasca s2 & s3
Informasi pendaftaran  pasca s2 & s3Informasi pendaftaran  pasca s2 & s3
Informasi pendaftaran pasca s2 & s3
 
Informasi pendaftaran pasca s2 & s3
Informasi pendaftaran  pasca s2 & s3Informasi pendaftaran  pasca s2 & s3
Informasi pendaftaran pasca s2 & s3
 
Tugas regresi berganda
Tugas regresi bergandaTugas regresi berganda
Tugas regresi berganda
 
Alfamart
AlfamartAlfamart
Alfamart
 
146020300111009 sri apriyanti husain review jurnal_metode penelitian non posi...
146020300111009 sri apriyanti husain review jurnal_metode penelitian non posi...146020300111009 sri apriyanti husain review jurnal_metode penelitian non posi...
146020300111009 sri apriyanti husain review jurnal_metode penelitian non posi...
 
Review jurnal akuntansi forensik uas pp_ak kelas malam
Review jurnal akuntansi forensik uas pp_ak kelas malamReview jurnal akuntansi forensik uas pp_ak kelas malam
Review jurnal akuntansi forensik uas pp_ak kelas malam
 
Review jurnal akuntansi forensik uas pp_ak kelas malam angkatan 24
Review jurnal akuntansi forensik uas pp_ak kelas malam angkatan 24Review jurnal akuntansi forensik uas pp_ak kelas malam angkatan 24
Review jurnal akuntansi forensik uas pp_ak kelas malam angkatan 24
 
Profit over people; neoliberalism, global order 1888363894
Profit over people; neoliberalism, global order 1888363894Profit over people; neoliberalism, global order 1888363894
Profit over people; neoliberalism, global order 1888363894
 
Review disertasi pak bambang haryadi
Review disertasi pak bambang haryadiReview disertasi pak bambang haryadi
Review disertasi pak bambang haryadi
 
Review disertasi full
Review disertasi fullReview disertasi full
Review disertasi full
 
Review disertasi pak bambang haryadi
Review disertasi pak bambang haryadiReview disertasi pak bambang haryadi
Review disertasi pak bambang haryadi
 
Psak 65-laporan-keuangan-konsolidasian-ifrs-10-consolidated-fs-22012014
Psak 65-laporan-keuangan-konsolidasian-ifrs-10-consolidated-fs-22012014Psak 65-laporan-keuangan-konsolidasian-ifrs-10-consolidated-fs-22012014
Psak 65-laporan-keuangan-konsolidasian-ifrs-10-consolidated-fs-22012014
 
Psak 62-kontrak-asuransi-140212
Psak 62-kontrak-asuransi-140212Psak 62-kontrak-asuransi-140212
Psak 62-kontrak-asuransi-140212
 
Psak 58-aset-tidak-lancar-yang-dimiliki-untuk-dijual-dan-operasi-yang-dihenti...
Psak 58-aset-tidak-lancar-yang-dimiliki-untuk-dijual-dan-operasi-yang-dihenti...Psak 58-aset-tidak-lancar-yang-dimiliki-untuk-dijual-dan-operasi-yang-dihenti...
Psak 58-aset-tidak-lancar-yang-dimiliki-untuk-dijual-dan-operasi-yang-dihenti...
 
Psak 55-pengakuan-instrumen-keuangan-ias-39-18122013-pokok
Psak 55-pengakuan-instrumen-keuangan-ias-39-18122013-pokokPsak 55-pengakuan-instrumen-keuangan-ias-39-18122013-pokok
Psak 55-pengakuan-instrumen-keuangan-ias-39-18122013-pokok
 

Recently uploaded

Q1 2024 Conference Call Presentation vF.pdf
Q1 2024 Conference Call Presentation vF.pdfQ1 2024 Conference Call Presentation vF.pdf
Q1 2024 Conference Call Presentation vF.pdfAdnet Communications
 
Technology industry / Finnish economic outlook
Technology industry / Finnish economic outlookTechnology industry / Finnish economic outlook
Technology industry / Finnish economic outlookTechFinland
 
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...dipikadinghjn ( Why You Choose Us? ) Escorts
 
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...dipikadinghjn ( Why You Choose Us? ) Escorts
 
Kopar Khairane Russian Call Girls Number-9833754194-Navi Mumbai Fantastic Unl...
Kopar Khairane Russian Call Girls Number-9833754194-Navi Mumbai Fantastic Unl...Kopar Khairane Russian Call Girls Number-9833754194-Navi Mumbai Fantastic Unl...
Kopar Khairane Russian Call Girls Number-9833754194-Navi Mumbai Fantastic Unl...priyasharma62062
 
7 tips trading Deriv Accumulator Options
7 tips trading Deriv Accumulator Options7 tips trading Deriv Accumulator Options
7 tips trading Deriv Accumulator OptionsVince Stanzione
 
Airport Road Best Experience Call Girls Number-📞📞9833754194 Santacruz MOst Es...
Airport Road Best Experience Call Girls Number-📞📞9833754194 Santacruz MOst Es...Airport Road Best Experience Call Girls Number-📞📞9833754194 Santacruz MOst Es...
Airport Road Best Experience Call Girls Number-📞📞9833754194 Santacruz MOst Es...priyasharma62062
 
Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...amitlee9823
 
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...dipikadinghjn ( Why You Choose Us? ) Escorts
 
Navi Mumbai Cooperetive Housewife Call Girls-9833754194-Natural Panvel Enjoye...
Navi Mumbai Cooperetive Housewife Call Girls-9833754194-Natural Panvel Enjoye...Navi Mumbai Cooperetive Housewife Call Girls-9833754194-Natural Panvel Enjoye...
Navi Mumbai Cooperetive Housewife Call Girls-9833754194-Natural Panvel Enjoye...priyasharma62062
 
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
VIP Kalyan Call Girls 🌐 9920725232 🌐 Make Your Dreams Come True With Mumbai E...
VIP Kalyan Call Girls 🌐 9920725232 🌐 Make Your Dreams Come True With Mumbai E...VIP Kalyan Call Girls 🌐 9920725232 🌐 Make Your Dreams Come True With Mumbai E...
VIP Kalyan Call Girls 🌐 9920725232 🌐 Make Your Dreams Come True With Mumbai E...roshnidevijkn ( Why You Choose Us? ) Escorts
 
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...dipikadinghjn ( Why You Choose Us? ) Escorts
 
Call Girls Service Pune ₹7.5k Pick Up & Drop With Cash Payment 9352852248 Cal...
Call Girls Service Pune ₹7.5k Pick Up & Drop With Cash Payment 9352852248 Cal...Call Girls Service Pune ₹7.5k Pick Up & Drop With Cash Payment 9352852248 Cal...
Call Girls Service Pune ₹7.5k Pick Up & Drop With Cash Payment 9352852248 Cal...roshnidevijkn ( Why You Choose Us? ) Escorts
 
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...dipikadinghjn ( Why You Choose Us? ) Escorts
 
CBD Belapur Expensive Housewife Call Girls Number-📞📞9833754194 No 1 Vipp HIgh...
CBD Belapur Expensive Housewife Call Girls Number-📞📞9833754194 No 1 Vipp HIgh...CBD Belapur Expensive Housewife Call Girls Number-📞📞9833754194 No 1 Vipp HIgh...
CBD Belapur Expensive Housewife Call Girls Number-📞📞9833754194 No 1 Vipp HIgh...priyasharma62062
 
Vasai-Virar High Profile Model Call Girls📞9833754194-Nalasopara Satisfy Call ...
Vasai-Virar High Profile Model Call Girls📞9833754194-Nalasopara Satisfy Call ...Vasai-Virar High Profile Model Call Girls📞9833754194-Nalasopara Satisfy Call ...
Vasai-Virar High Profile Model Call Girls📞9833754194-Nalasopara Satisfy Call ...priyasharma62062
 
VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...dipikadinghjn ( Why You Choose Us? ) Escorts
 

Recently uploaded (20)

Q1 2024 Conference Call Presentation vF.pdf
Q1 2024 Conference Call Presentation vF.pdfQ1 2024 Conference Call Presentation vF.pdf
Q1 2024 Conference Call Presentation vF.pdf
 
Technology industry / Finnish economic outlook
Technology industry / Finnish economic outlookTechnology industry / Finnish economic outlook
Technology industry / Finnish economic outlook
 
From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...
From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...
From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...
 
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
 
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
 
Kopar Khairane Russian Call Girls Number-9833754194-Navi Mumbai Fantastic Unl...
Kopar Khairane Russian Call Girls Number-9833754194-Navi Mumbai Fantastic Unl...Kopar Khairane Russian Call Girls Number-9833754194-Navi Mumbai Fantastic Unl...
Kopar Khairane Russian Call Girls Number-9833754194-Navi Mumbai Fantastic Unl...
 
7 tips trading Deriv Accumulator Options
7 tips trading Deriv Accumulator Options7 tips trading Deriv Accumulator Options
7 tips trading Deriv Accumulator Options
 
Airport Road Best Experience Call Girls Number-📞📞9833754194 Santacruz MOst Es...
Airport Road Best Experience Call Girls Number-📞📞9833754194 Santacruz MOst Es...Airport Road Best Experience Call Girls Number-📞📞9833754194 Santacruz MOst Es...
Airport Road Best Experience Call Girls Number-📞📞9833754194 Santacruz MOst Es...
 
Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
 
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
 
Navi Mumbai Cooperetive Housewife Call Girls-9833754194-Natural Panvel Enjoye...
Navi Mumbai Cooperetive Housewife Call Girls-9833754194-Natural Panvel Enjoye...Navi Mumbai Cooperetive Housewife Call Girls-9833754194-Natural Panvel Enjoye...
Navi Mumbai Cooperetive Housewife Call Girls-9833754194-Natural Panvel Enjoye...
 
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
 
VIP Kalyan Call Girls 🌐 9920725232 🌐 Make Your Dreams Come True With Mumbai E...
VIP Kalyan Call Girls 🌐 9920725232 🌐 Make Your Dreams Come True With Mumbai E...VIP Kalyan Call Girls 🌐 9920725232 🌐 Make Your Dreams Come True With Mumbai E...
VIP Kalyan Call Girls 🌐 9920725232 🌐 Make Your Dreams Come True With Mumbai E...
 
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
 
(INDIRA) Call Girl Srinagar Call Now 8617697112 Srinagar Escorts 24x7
(INDIRA) Call Girl Srinagar Call Now 8617697112 Srinagar Escorts 24x7(INDIRA) Call Girl Srinagar Call Now 8617697112 Srinagar Escorts 24x7
(INDIRA) Call Girl Srinagar Call Now 8617697112 Srinagar Escorts 24x7
 
Call Girls Service Pune ₹7.5k Pick Up & Drop With Cash Payment 9352852248 Cal...
Call Girls Service Pune ₹7.5k Pick Up & Drop With Cash Payment 9352852248 Cal...Call Girls Service Pune ₹7.5k Pick Up & Drop With Cash Payment 9352852248 Cal...
Call Girls Service Pune ₹7.5k Pick Up & Drop With Cash Payment 9352852248 Cal...
 
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...
 
CBD Belapur Expensive Housewife Call Girls Number-📞📞9833754194 No 1 Vipp HIgh...
CBD Belapur Expensive Housewife Call Girls Number-📞📞9833754194 No 1 Vipp HIgh...CBD Belapur Expensive Housewife Call Girls Number-📞📞9833754194 No 1 Vipp HIgh...
CBD Belapur Expensive Housewife Call Girls Number-📞📞9833754194 No 1 Vipp HIgh...
 
Vasai-Virar High Profile Model Call Girls📞9833754194-Nalasopara Satisfy Call ...
Vasai-Virar High Profile Model Call Girls📞9833754194-Nalasopara Satisfy Call ...Vasai-Virar High Profile Model Call Girls📞9833754194-Nalasopara Satisfy Call ...
Vasai-Virar High Profile Model Call Girls📞9833754194-Nalasopara Satisfy Call ...
 
VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
 

Pp 15-new

  • 1. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Accounting Information Systems, 8e James A. Hall Chapter 15 IT Controls Part I: Sarbanes-Oxley & IT Governance
  • 2. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Objectives for Chapter 15  Understand the key features of Sections 302 and 404 of the Sarbanes-Oxley Act.  Understand management and auditor responsibilities under Sections 302 and 404.  Understand the risks of incompatible functions and how to structure the IT function.  Be familiar with the controls and precautions required to ensure the security of an organization’s computer facilities.  Understand the key elements of a disaster recovery plan.  Be familiar with the benefits, risks and audit issues related to IT Outsourcing. 2
  • 3. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Sarbanes-Oxley Act  The 2002 Sarbanes-Oxley (SOX) Act established new corporate governance rules  Created company accounting oversight board  Increased accountability for company officers and board of directors  Increased white collar crime penalties  Prohibits a company’s external audit firms from designing and implementing financial information systems 3
  • 4. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. SOX Section 302  Section 302—in quarterly and annual financial statements, management must:  certify the internal controls (IC) over financial reporting  state responsibility for IC design  provide reasonable assurance as to the reliability of the financial reporting process  disclose any recent material changes in IC 4
  • 5. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. SOX Section 404  Section 404—in the annual report on IC effectiveness, management must:  state responsibility for establishing and maintaining adequate financial reporting IC  assess IC effectiveness  reference the external auditors’ attestation report on management’s IC assessment  provide explicit conclusions on the effectiveness of financial reporting IC  identify the framework management used to conduct their IC assessment, e.g., COBIT 5
  • 6. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. IT Controls & Financial Reporting  Modern financial reporting is driven by information technology (IT)  IT initiates, authorizes, records, and reports the effects of financial transactions.  Financial reporting IC are inextricably integrated to IT. 6
  • 7. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. IT Controls & Financial Reporting  COSO identifies two groups of IT controls:  application controls – apply to specific applications and programs, and ensure data validity, completeness and accuracy  general controls – apply to all systems and address IT governance and infrastructure, security of operating systems and databases, and application and program acquisition and development 7
  • 8. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Sales CGS AP CashInventory Significant Financial Accounts Order Entry Application Controls Cash Disbursements Application Controls Purchases Application Controls Related Application Controls Systems Development and Program Change Control Database Access Controls Operating System Controls Supporting General Controls Controls for Review IT Controls & Financial Reporting 8
  • 9. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. SOX Audit Implications  Pre-SOX, audits did not require IC tests.  Only required to be familiar with client’s IC  Audit consisted primarily of substantive tests  SOX – radically expanded scope of audit  Issue new audit opinion on management’s IC assessment  Required to test IC affecting financial information, especially IC to prevent fraud  Collect documentation of management’s IC tests and interview management on IC changes 9
  • 10. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Computer Fraud Schemes  Theft, misuse, or misappropriation of assets by altering computer-readable records and files  Theft, misuse, or misappropriation of assets by altering logic of computer software  Theft or illegal use of computer-readable information  Theft, corruption, illegal copying or intentional destruction of software  Theft, misuse, or misappropriation of computer hardware 10
  • 11. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Using the general IS model, explain how fraud can occur at the different stages of information processing? 11
  • 12. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Data Collection Fraud  This aspect of the system is the most vulnerable because it is relatively easy to change data as it is being entered into the system.  Also, the GIGO (garbage in, garbage out) principle reminds us that if the input data is inaccurate, processing will result in inaccurate output. 12
  • 13. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Data Processing Fraud Program Frauds  altering programs to allow illegal access to and/or manipulation of data files  destroying programs with a virus Operations Frauds  misuse of company computer resources, such as using the computer for personal business 13
  • 14. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Database Management Fraud  Altering, deleting, corrupting, destroying, or stealing an organization’s data  Oftentimes conducted by disgruntled or ex- employee 14
  • 15. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Information Generation Fraud Stealing, misdirecting, or misusing computer output Scavenging  searching through the trash cans on the computer center for discarded output (the output should be shredded, but frequently is not) 15
  • 16. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Organizational Structure IC  Audit objective – verify that individuals in incompatible areas are segregated to minimize risk while promoting operational efficiency  IC, especially segregation of duties, affected by which of two organizational structures applies:  Centralized model  Distributed model 16
  • 17. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. 17 Organizational Chart of a Centralized Information Technology Function Figure 15-3
  • 18. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. 18 Distributed Organization with Corporate Information Technology Function Figure 15-5
  • 19. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Segregation of Duties  Transaction authorization is separate from transaction processing.  Asset custody is separate from record- keeping responsibilities.  The tasks needed to process the transactions are subdivided so that fraud requires collusion. 19
  • 20. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Authorization Authorization Journals Processing Custody Recording Subsidiary Ledgers General Ledger Segregation of Duties Objectives Nested Control Objectives for Transactions Control Objective 1 Control Objective 2 Control Objective 3 20 TRANSACTION Figure 3-4
  • 21. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Centralized IT Structure  Critical to segregate:  systems development from computer operations  database administrator (DBA) from other computer service functions • DBA’s authorizing and systems development’s processing • DBA authorizes access  maintenance from new systems development  data library from operations 21
  • 22. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Distributed IT Structure  Despite its many advantages, important IC implications are present:  incompatible software among the various work centers  data redundancy may result  consolidation of incompatible tasks  difficulty hiring qualified professionals  lack of standards 22
  • 23. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Organizational Structure IC  A corporate IT function alleviates potential problems associated with distributed IT organizations by providing:  central testing of commercial hardware and software  a user services staff  a standard-setting body  reviewing technical credentials of prospective systems professionals 23
  • 24. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Audit Procedures  Review the corporate policy on computer security  Verify that the security policy is communicated to employees  Review documentation to determine if individuals or groups are performing incompatible functions  Review systems documentation and maintenance records  Verify that maintenance programmers are not also design programmers 24
  • 25. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Audit Procedures  Observe if segregation policies are followed in practice.  E.g., check operations room access logs to determine if programmers enter for reasons other than system failures  Review user rights and privileges  Verify that programmers have access privileges consistent with their job descriptions 25
  • 26. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Computer Center IC Audit objectives:  physical security IC protects the computer center from physical exposures  insurance coverage compensates the organization for damage to the computer center  operator documentation addresses routine operations as well as system failures 26
  • 27. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Computer Center IC Considerations:  man-made threats and natural hazards  underground utility and communications lines  air conditioning and air filtration systems  access limited to operators and computer center workers; others required to sign in and out  fire suppression systems installed  fault tolerance  redundant disks and other system components  backup power supplies 27
  • 28. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Audit Procedures  Review insurance coverage on hardware, software, and physical facility  Review operator documentation, run manuals, for completeness and accuracy  Verify that operational details of a system’s internal logic are not in the operator’s documentation 28
  • 29. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Disaster Recovery Planning  Disaster recovery plans (DRP) identify:  actions before, during, and after the disaster  disaster recovery team  priorities for restoring critical applications  Audit objective – verify that DRP is adequate and feasible for dealing with disasters 29
  • 30. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Disaster Recovery Planning  Major IC concerns:  second-site backups  critical applications and databases • including supplies and documentation  back-up and off-site storage procedures  disaster recovery team  testing the DRP regularly 30
  • 31. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Second-Site Backups  Empty shell - involves two or more user organizations that buy or lease a building and remodel it into a computer site, but without computer equipment  Recovery operations center - a completely equipped site; very costly and typically shared among many companies  Internally provided backup - companies with multiple data processing centers may create internal excess capacity 31
  • 32. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. DRP Audit Procedures  Evaluate adequacy of second-site backup arrangements  Review list of critical applications for completeness and currency  Verify that procedures are in place for storing off-site copies of applications and data  Check currency back-ups and copies 32
  • 33. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. DRP Audit Procedures  Verify that documentation, supplies, etc., are stored off-site  Verify that the disaster recovery team knows its responsibilities  Check frequency of testing the DRP 33
  • 34. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Benefits of IT Outsourcing  Improved core business processes  Improved IT performance  Reduced IT costs 34
  • 35. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Risks of IT Outsourcing  Failure to perform  Vendor exploitation  Costs exceed benefits  Reduced security  Loss of strategic advantage 35
  • 36. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Audit Implications of IT Outsourcing  Management retains SOX responsibilities  SAS No. 70 report or audit of vendor will be required 36
  • 37. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Accounting Information Systems, 8e James A. Hall Audit Background Material From Appendix
  • 38. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. External (Financial) Audits  An independent attestation by a professional (CPA) regarding the faithful representation of the financial statements  Three phases of a financial audit:  familiarization with client firm  evaluation and testing of internal controls  assessment of reliability of financial data 38
  • 39. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Attestation versus Assurance  Attestation:  practitioner is engaged to issue a written communication that expresses a conclusion about the reliability of a written assertion that is the responsibility of another party.  Assurance:  professional services that are designed to improve the quality of information, both financial and non-financial, used by decision- makers  includes, but is not limited to attestation 39
  • 40. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Attest and Assurance Services 40
  • 41. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. External versus Internal Auditing  External auditors – represent the interests of third party stakeholders  Internal auditors – serve an independent appraisal function within the organization  Often perform tasks which can reduce external audit fees and help to achieve audit efficiency 41
  • 42. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Generally Accepted Auditing Standards (GAAS) 42
  • 43. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Auditing Management’s Assertions 43
  • 44. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Audit Risk is... the probability the auditor will issue an unqualified (clean) opinion when in fact the financial statements are materially misstated. 44
  • 45. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Three Components of Audit Risk  Inherent risk – associated with the unique characteristics of the business or industry of the client  Control risk – the likelihood that the control structure is flawed because controls are either absent or inadequate to prevent or detect errors in the accounts  Detection risk – the risk that errors not detected or prevented by the control structure will also not be detected by the auditor 45
  • 46. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Types of Audit Tests  Tests of controls – tests to determine if appropriate IC are in place and functioning effectively  Substantive testing – detailed examination of account balances and transactions 46
  • 47. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. What is an IT Audit? Since most information systems employ IT, the IT audit is a critical component of all external and internal audits.  IT audits:  focus on the computer-based aspects of an organization’s information system  assess the proper implementation, operation, and control of computer resources 47
  • 48. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Elements of an IT Audit  Systematic procedures are used  Evidence is obtained  tests of internal controls  substantive tests  Determination of materiality for weaknesses found  Prepare audit report & audit opinion 48
  • 49. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Phases of an IT Audit 49 Figure 15-9