Question

In: Accounting

Action Items Read the article below: Information Systems and Internal Control. Write: Develop a bulleted list...

Action Items

  1. Read the article below: Information Systems and Internal Control.
  2. Write: Develop a bulleted list of 2 issues or best practices that you identified based on your reading of this article and how it may impact you while performing in an accounting position.

Information Systems and Internal Control.:

G1.02 Key Risk Factors

Key risk factors for Information Systems and Internal Control include the following:

  • Controls may be designed for processes that are later changed though the introduction of new systems, resulting in the subsequent failure of those controls.
  • Automated controls may be turned off in an effort to reduce manual intervention, resulting in erroneous transactions being processed by the system.
  • Business process owners and upper management may fail to take action to mitigate technology risks because such risks are not presented in a nontechnical business context.
  • Auditors may fail to uncover critical control weaknesses due to a lack of understanding of the technologies used and the inherent risks associated with them.
  • Laws and regulations may be unknowingly violated because of a lack of knowledge of how certain customer data is subject to a higher standard of protection.

G1.03 Background

The evolution of computer technology is remarkable. It is common today for office workers to have networked computers on their desks, mobile devices in their pockets, notebook computers to take with them on business trips, wireless connectivity to the office, and Internet and e-mail functionality built into all of these devices. The lower cost of hardware and the convenience of the technology have created an insatiable demand for computing solutions to fit the needs of business.

The rapid pace of change within the IS industry complicates the task of auditing information systems. New technologies often introduce new risks. Today's innovations can become obsolete tomorrow. For this reason, this chapter focuses on broad concepts of internal control within the IS environment. Although certain products are discussed here, internal auditors should gain a solid understanding of the IS environment within their company.

Internal audit departments have always had a chronic shortage of IS auditors, and this is unlikely to change anytime soon. Generally, IS professionals have not gravitated toward the internal audit profession because more challenging and financially rewarding opportunities exist in systems development, systems security, and database management. Due to supply and demand issues and limitations on the number of IS professionals who are well versed in control concepts like COSO and COBIT, internal audit departments cannot always attract sufficient talent. Because of this reality, chief audit executives must develop alternative means to ensure an appropriate level of IS audit coverage.

As the auditing profession continues to try to do more with less, technological advances may overwhelm those audit departments that have not prepared adequately. Computer viruses and other malicious code are being introduced on a weekly basis. Hackers now gain access to computer systems that were thought to be impervious. Million-dollar transactions are routinely carried out via the Internet. Companies are betrayed by employees who sabotage the systems they were entrusted to develop. Despite this gloomy assessment, chief audit executives have tools they can use to address the risks of the new technology.

The foundation for adequate audit coverage of IS risks is technological competence. If the audit department does not have such competence, or does not anticipate recruiting it in the near term, other alternatives must be considered. The chief audit executive may need to recruit from the company's existing IS expertise, such as a rotational assignment on specific audit engagements. By tapping the company's internal IS resources, the chief audit executive may be able to meet short-term audit requirements. Another alternative is to retain the services of an outside service provider, such as one of the Big Four accounting firms or a specialized professional services firm that does not perform financial statement audits. The latter can offer certain cost advantages as well as avoiding conflict of interest and independence issues. The cost of any such outsourcing, sometimes referred to as co-sourcing, will need to be balanced against the risks of the computing environment in question. Although the fees charged by such organizations may at first glance appear prohibitively expensive, given the high cost of training and retaining professionals with hard-to-find skills that must be continuously maintained, it is often cheaper to co-source specific with third party providers than cultivate and maintain these skills internally. Audit departments can also better leverage the cost of bringing in these outside consultants by assigning an internal auditor as a liaison. The assigned internal auditor can expedite the gathering of evidence, thereby reducing the level of effort for the higher-paid consultant, while shadowing these specialists to learn how to perform these technical audits internally.

Practitioner's Tip: Buying Computers

For prospective purchasers of desktop or notebook computers, making the right choice has generally come down to two decision points. The first is whether to buy a top-of-the-line brand name or one that is known more for its economical pricing. When making such a decision, one should carefully weigh the total cost of ownership (TCO). You may save money on the initial purchase, but support issues also factor into the cost equation. If you are a large shop and will require dozens if not hundreds of computers, then support can become a very significant issue, especially when you consider productivity losses when auditors cannot access the data on their desktop or notebook computers. Compatibility between devices can also become more problematic when dealing with lesser known second-tier machines. The second factor to consider is whether to lease or buy. More and more, organizations are choosing to lease computers in order to remain technologically up to date. This is not just a matter of wanting to have cutting-edge equipment. There are also many practical reasons for periodically refreshing equipment. As new business systems and client software are rolled out, incompatibilities with older equipment can result in serious performance issues, including system response time and stability. It is usually asking for trouble to load just-released software on a four- to five-year-old machine. Again, this is where TCO comes into play. If you try to squeeze an extra two years of life out of that three-year-old machine, you will pay several times that amount in loss of productivity and increased support costs.

Solutions

Expert Solution

Hello Buddy,

After reading the above given para's, the 2 practices or issues that I personally feel will have an impact on me as an accountant, are the following -

1) The Inherent risks associated while using such systems that are heavily dependent on IT systems or technology in general, are such that they may have an unexpected or surprising impact on the work of the accountant, causing loss of time and resources for one. Examples of such risks that exist are a) Access by unauthorized personnel, which can actually wreak havoc, b) Data getting lost or becoming corrupt or inaccessible.

Some inherent risks can be addressed, such as taking backup of data can reduce the risk of data loss or inaccessibility. However these risks, like all other risks, cannot be completely eliminated but only reduced to an acceptable and therefore the use of technologically oriented system, though make the work of an auditor easy, also increase the risks he is required to take, along with all other risks that were already associated with the auditing process.

2) The second practice that is very very important in my understanding is the term 'Technological Competence'. The role of accountant in business during the last years has changed and transformed from manual accounting to computerized accounting. The extensive use of IS in business has create the term “knowledge – worker” in order to describe the worker that operates within an IT environment as well as the competences possessed. These possession of appropriate skills will allow the creation of an environment where the IS technology will operate at an optimum resulting to the advantage of the entire business operation.

IT competences considered imperative for accountants in order to perform their tasks. The determination of these competences is essential for accountants but this involves, first, the determination of the roles of a modern accountant in business and second, the definition of term competences. The determination of the role of the modern accountant in business is important as it sets the framework within which an accountant operates and hence this affect the IT/IS tools it is required.

I hope the above solution is what you were looking for. For any further queries or doubts in the solution, please feel free to drop a comment. Please do leave a positive feedback, Thank you :)


Related Solutions

Action Items Read the article below: Information Systems and Internal Control. Write: Develop a bulleted list...
Action Items Read the article below: Information Systems and Internal Control. Write: Develop a bulleted list of five to seven (5-7) issues or best practices that you identified based on your reading of this article and how it may impact you while performing in an accounting position. Information Systems and Internal Control.: G1.05 Functions That Benefit from IS Functions that benefit from IS have increased remarkably from the simple military and government uses in the early years. Computers are used...
Action Items Read the article below: Information Systems and Internal Control. Write: Develop a bulleted list...
Action Items Read the article below: Information Systems and Internal Control. Write: Develop a bulleted list of 1 issue or best practice that you identified based on your reading of this article and how it may impact you while performing in an accounting position. ;;;;;;;;;;;;;;;;;;;;;;;; Information Systems and Internal Control G1.01 Definitions The term “information systems” (IS) refers to the hardware, software, facilities, people, and processes used by a company to gather, process, store, retrieve, and transmit information of importance...
Locate and read Section 385 of the Internal Revenue Code and develop a comprehensive list of...
Locate and read Section 385 of the Internal Revenue Code and develop a comprehensive list of factors that indicate legitimate debt. What is the status of the regulations that are to expand on this Code section?
Please read the Bloomberg article below, and use the information in the article to answer this...
Please read the Bloomberg article below, and use the information in the article to answer this question. U.S. Gasoline Use Rising to Record This Summer on Low Prices by Mark Shenk U.S. Gasoline Use Rising to Record This Summer on Low Prices by Mark Shenk June 7, 2016, 12:23 PM EDTJune 8, 2016, 12:01 AM EDT Gasoline consumption to average 9.5 million barrels a day: EIA WTI crude seen averaging $42.83/bbl in 2016, $51.82 in 2017 Oil Producers Respond to...
List the principles of internal control.
List the principles of internal control.
List the components of the framework commonly used in corporations when analyzing their internal control systems:...
List the components of the framework commonly used in corporations when analyzing their internal control systems: 1.) 2.) 3.) 4.) 5.) List the five common principles of Internal Control and give an explanation and example of each 1.) 2.) 3.) 4.) 5.) What are the two basic reasons that a company’s cash records do not balance to the bank statement? 1.) 2.)
Write summary about the article in the link provided below.   Please read the article and summarize...
Write summary about the article in the link provided below.   Please read the article and summarize it. This summary must be three-fourths to one page long. https://www.cpajournal.com/2017/11/22/improving-income-statement-reporting-debt-extinguishments/
Write an HTML file for a web page that contains the items below. Use an internal...
Write an HTML file for a web page that contains the items below. Use an internal style sheet to specify all fonts, sizes, colors, and any other aspects of the presentation. Your page should contain the following items: 1) A header with white text on dark green background (just for the header, not the entire page), in Impact font, bold, and centered. 2) Two paragraphs of text, each with dark gray text in Tahoma font, on a light blue background,...
For this week's Brief, read the attached article (below) from The Economist magazine and write a...
For this week's Brief, read the attached article (below) from The Economist magazine and write a one page summary of it. Bucks 114--Economist Article--VR.docx Your objective is to produce an easy-to-read document that allows your reader to understand the article without having to read it in its entirety. There is no word count requirement for this assignment, but you must make sure that you include the vital information from the article (while necessarily eliminating noncritical information). There are two specific...
PLEASE ANSWER AS A TEXT. DON'T WRITE ON A PAPER. Read the article below and answer...
PLEASE ANSWER AS A TEXT. DON'T WRITE ON A PAPER. Read the article below and answer the questions.  Your answers should be written to address the question in a report format not questions and answers format. The rubrics for assessment is given  below. Andrew Rehder, manager of 3M Co.’s respirator mask factoryin Aberdeen, S.D., got the call from headquarters on Tuesday, Jan. 21. He gathered about 20 managers and supervisors into a conference room, where they sat, unworried, less than 6 feet...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT