Question

In: Accounting

Nurmazilah emphasised: “Electronic bank confirmations will eliminate duplications and provide authentication and authorisation procedures to detect...

Nurmazilah emphasised: “Electronic bank confirmations will eliminate duplications and provide authentication and authorisation procedures to detect fraud and deter fraudsters. This is a progressive step in auditing that will not only save time and resources and but Malaysia up-to-speed with developments in leading markets.” 6 The e-Bank confirmation is just an example of many more ongoing collaborative engagement between MIA and its stakeholders in embedding digitalization and automation into practice. To engage with members at large, MIA conduct technology adoption surveys for accounting profession once in every two-year period. From the survey, MIA noted that one of the items that the practitioners want to improve is on their data analytic skills. MIA also has been consistently pushing for more tax incentive for service and technological industries in budget memorandum act for MOF. Nurmazilah saw the potential of exporting services to neighboring countries and work closely with MITI to find potential market for Malaysian accountants.

In your opion, does Nurmazilah has performed her leadership role ethically in pushing for MIA’s digital strategy and the digitalization of the accountancy profession.

Solutions

Expert Solution

Yes, Nurmazilah did perform her leadership roles ethically by emphasizing on using digital strategy for the process of accounting and auditing.

Using digital process for auditing and accounting process makes the working authentic and accurate . Also it protects from any type of misstatements being created. It helps in keeping more proper records of transactions and possibly lead to reliable auditing.

Promoting the digital use fur suditing us a great step taken by her. But she should also make sure to have a proper protective system to safeguard the data shuch are very crucial. This is the biggest threat with digital platforms.

This will make the organization perform its accounting and auditing works with accuracy as well as it will save the time of employees which nie they can give to other activities. In thus era where everyone ys well aware with the distal functioning, it will make the organization compete with others and have a pace .

Thus it is good to use these digital platforms but we should make sure that there is no threat to data security which may lead to leak of data or misusing of that dara.

So, technology must be employed but with safety

Thus, it can be said that Nurmazilah has performed her roles ethically well.


Related Solutions

Auditors send bank confirmations for most active bank accounts. Are Bank confirmations required under AICPA or...
Auditors send bank confirmations for most active bank accounts. Are Bank confirmations required under AICPA or PCAOB auditing standards? How does this compare to the requirements for confirmation of accounts receivable?
Auditors send bank confirmations for most active bank accounts. Are bank confirmations required under ISA (NZ)...
Auditors send bank confirmations for most active bank accounts. Are bank confirmations required under ISA (NZ) auditing standards? How does this compare to the requirements for confirmations of accounts receivable under AICPA standards in the US (see AU-C 505 standard)? Why do you suppose these differences exist?
Auditors send bank confirmations for most active bank accounts. Are bank confirmations required under ISA (NZ)...
Auditors send bank confirmations for most active bank accounts. Are bank confirmations required under ISA (NZ) auditing standards? How does this compare to the requirements for confirmations of accounts receivable under AICPA standards in the US (see AU-C 505 standard)? Why do you suppose these differences exist?
What alternative procedures should be applied to accounts that do not return confirmations?
What alternative procedures should be applied to accounts that do not return confirmations?
1. How does TLS provide authentication? Does it provide mutual authentication (both client and server-side)? Is...
1. How does TLS provide authentication? Does it provide mutual authentication (both client and server-side)? Is that required? 2.What is the purpose of padding, Message Authentication Code (MAC), handshake protocol, change cyber suite (CCS) protocol? 3.How does TLS provide: confidentiality, availability, integrity, non-repudiation?
Internal control consists of the policies and procedures established to prevent or detect errors or fraud....
Internal control consists of the policies and procedures established to prevent or detect errors or fraud. The internal control structure is the cornerstone to good financial practices. Review the Management Antifraud Programs and Controls (14-step program) and select one of the steps to discuss. Be sure to share your thoughts on how this step helps to enhance the reliability of financial reporting. Please provide a reference
Does a digital signature by itself provide authentication? Explain why or why not.
Does a digital signature by itself provide authentication? Explain why or why not.
This is for CYBER SECURITY 1)What are the 3 factors of Authentication and provide at least...
This is for CYBER SECURITY 1)What are the 3 factors of Authentication and provide at least 3 examples for each? 2) Please compare and contrast the following 4 Access Control Models and let me know how they work and give me an example of each. 1. Discretionary Access Control 2. Mandatory Access Control 3. Rule Based Access Controls 4. Role Based Access Controls
4. Define 'subsequent activities'. Describe the audit procedures that the auditor would perform to detect subsequent...
4. Define 'subsequent activities'. Describe the audit procedures that the auditor would perform to detect subsequent events. Explain Type 1 and Type 2 events. 5. Distinguish between the securities act of 1933 and the securities exchange act of 1934. Why is it easier for a Plantiff to sue an auditor under the securities act of 1933?
Identify the internal control procedures classified per (SAS78/COSO) that could prevent or detect this fraud.
Identify the internal control procedures classified per (SAS78/COSO) that could prevent or detect this fraud.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT