CHAPTER 3 - Ethics, Fraud and Internal Control
CHAPTER 3 - Ethics, Fraud and Internal Control
CHAPTER 3 - Ethics, Fraud and Internal Control
Ethics, Fraud,
and Internal
Control
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 2
Ethical Issues in Business
• Ethical standards are derived from societal mores and
deep-rooted personal beliefs about issues of right and
wrong that are not universally agreed upon.
• Often, we confuse ethical issues with legal issues.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 3
BUSINESS ETHICS
• Ethics are the principles of conduct that individuals use in
making choices that guide their behavior in situations
involving the concepts of right and wrong.
• Business ethics pertains to the principles of conduct that
individuals use in making choices and guiding their
behavior in situations that involve the concepts of right
and wrong.
• Making Ethical Decisions
• Ethical responsibility is the responsibility of organization
managers to seek a balance between the risks and benefits to
their constituents that result from their decisions.
• PROPORTIONALITY
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 4
BUSINESS ETHICS
• Making Ethical Decisions
• PROPORTIONALITY
• The benefit from a decision must outweigh the risks.
• There must be no alternative decision that provides the same or greater
benefit with less risk.
– JUSTICE.
• The benefit of the decision should be distributed fairly to those
who share the risks.
• Those who do not benefit should not carry the burden risk.
– MINIMIZE RISK.
• Even if judged acceptable by principles, the decision should be
implemented so as to minimize all of the risks and avoid any
unnecessary risks.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 5
Ethical Issues in Business
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 6
Ethical Issues in Business
Additional slides and texts provided by
J.J. Dorega, CPA, LPT, MBA
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 7
Ethical Issues in Business
Additional slides and texts provided by
J.J. Dorega, CPA, LPT, MBA
1) ENRON CASE
• Whistleblower is Sherron Watkins
2) WORLDCOM CASE
• Whistleblower is Cynthia Cooper
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 8
COMPUTER ETHICS
• Computer ethics is the analysis of the nature and social
impact of computer technology and the corresponding
formulation and justification of policies for the ethical use
of such technology. This includes details about software
as well as hardware and concerns about networks
connecting computers as well as computers themselves.
• A new problem or just a new twist on an old problem?
• Privacy
• Privacy is full control of what and how much information about
an individual is available to others and to whom it is available.
• Ownership is the state or fact of exclusive rights and control
over property, which may be an object, land/real estate,
intellectual property, or some other kind of property.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 9
COMPUTER ETHICS (continued)
• Security (Accuracy and Confidentiality)
• Ownership of Property
• Equity in Access
• Environmental Issues
• Artificial Intelligence
• Unemployment and Displacement
• Misuse of Computers
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 10
COMPUTER ETHICS (continued)
• Security (Accuracy and Confidentiality)
• Computer security is an attempt to avoid such undesirable
events as a loss of confidentiality or data integrity.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 11
COMPUTER ETHICS (continued)
Additional texts provided by
J.J. Dorega, CPA, LPT, MBA
• Security (Accuracy and Confidentiality)
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 12
COMPUTER ETHICS (continued)
Additional texts provided by
J.J. Dorega, CPA, LPT, MBA
• Ownership of Property
• Related to intellectual property rights – the software
• Copyright laws have been invoked in an attempt to protect
those who developed from having it copied.
• The intention is to promote the progress of science and the useful arts.
• The best interest of computer users is served when industry standards
emerge; copyright laws work against this.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 13
COMPUTER ETHICS (continued)
Additional texts provided by
J.J. Dorega, CPA, LPT, MBA
• Equity in Access
• Some barriers to access are intrinsic to the technology of
information systems, but some are avoidable through careful
system design.
• The economic status of the individual or the affluence of an
organization will determine the ability to obtain IT.
• Culture limits the access – prepared in one language and poor
translation
• Safety features, or the lack thereof, have limited access to
pregnant women
• Consideration for differences in physical and cognitive skills
should be considered in its design.
• Cost of providing equity in access
• Groups of society – access of priority
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 14
COMPUTER ETHICS (continued)
Additional texts provided by
J.J. Dorega, CPA, LPT, MBA
• Environmental Issues
• Printers – require papers
• Papers come from trees (a
precious natural resource that
ends up in landfills if not properly
recycled)
(65) Pinterest
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 15
COMPUTER ETHICS (continued)
Additional texts provided by
J.J. Dorega, CPA, LPT, MBA
• Artificial Intelligence
• Expert system as decision makers or replacement for experts
• Both knowledge engineers (program writer) and domain
experts (provider of knowledge about the task being
automated) must be concerned about their RESPONSIBILITY
for:
• Faulty decisions
• Incomplete or inaccurate knowledge bases
• The role given to computers in the decision-making process
• Expert systems attempt to clone a manager’s decision-making
style, an individual’s prejudices may implicitly or explicitly be
included in the knowledge base.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 16
COMPUTER ETHICS (continued)
Additional texts provided by
J.J. Dorega, CPA, LPT, MBA
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 17
COMPUTER ETHICS (continued)
Additional texts provided by
• Misuse of Computers J.J. Dorega, CPA, LPT, MBA
• Copying proprietary software (except for personal backup) -
ILLEGAL
• Using a company’s computer for personal benefit
• Snooping through other people’s files
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 18
COMPUTER ETHICS (continued)
Additional texts provided by
• Misuse of Computers J.J. Dorega, CPA, LPT, MBA
Software piracy in PHL worsens to 70%, $338M in unlicensed programs — global study (gmanetwork.com)
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 19
SARBANES-OXLEY ACT AND ETHICAL ISSUES
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 20
SARBANES-OXLEY ACT AND ETHICAL ISSUES
Additional texts provided by
J.J. Dorega, CPA, LPT, MBA
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 21
SARBANES-OXLEY ACT AND ETHICAL ISSUES
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 22
SARBANES-OXLEY ACT AND ETHICAL ISSUES
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 23
SARBANES-OXLEY ACT AND ETHICAL ISSUES
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 24
SARBANES-OXLEY ACT AND ETHICAL ISSUES
Additional texts provided by
J.J. Dorega, CPA, LPT, MBA
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 27
DEFINITIONS OF FRAUD
Additional texts provided by
J.J. Dorega, CPA, LPT, MBA
• FRAUD
• Involves all deceptive ways in which one individual obtains an
advantage over another by false representation.
• Always involves confidence and trickery.
• It is different than robbery where force is used.
Source: Forensic Accounting 4th Edition by Zimbelman and Albrecht
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 28
DEFINITIONS OF FRAUD
Additional texts provided by
J.J. Dorega, CPA, LPT, MBA
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 29
DEFINITIONS OF FRAUD
• Employee fraud is the performance fraud by
nonmanagement employee generally designed to directly
convert cash or other assets to the employee’s personal
benefit.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 30
DEFINITIONS OF FRAUD
• Management fraud is the performance fraud that often
uses deceptive practices to inflate earnings or to forestall
the recognition of either insolvency or a decline in
earnings.
Additional texts provided by
J.J. Dorega, CPA, LPT, MBA
• Management fraud
• Often escapes detection until the organization has suffered
irreparable damage or loss.
• Usually not involve direct theft of assets.
• Involves management in fraudulent activities it drive up the
market price of the company’s stock to meet investors’
expectations or to take advantage of stock options which is
part of manager’s compensation package.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 31
DEFINITIONS OF FRAUD
Additional texts provided by
J.J. Dorega, CPA, LPT, MBA
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 32
DEFINITIONS OF FRAUD
Additional texts provided by
J.J. Dorega, CPA, LPT, MBA
• Three defining characteristics of management fraud
1) Perpetrated at levels of management above the one to
which internal control structures generally relate.
2) Involves using the financial statements to create an
illusion that an entity is healthier and more prosperous
than, in fact, it is. (See next slide – WorldCom Case)
3) Frequently involves misappropriation of assets
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 33
DEFINITIONS OF FRAUD
Additional texts provided by
J.J. Dorega, CPA, LPT, MBA
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 34
THE FRAUD TRIANGLE
• The fraud triangle is a triad of factors associated with
management and employee fraud: situational pressure
(includes personal or job-related stresses that could
coerce an individual to act dishonestly); opportunity
(involves direct access to assets and/ or access to
information that controls assets); and ethics (pertains to
one’s character and degree of moral opposition to acts of
dishonesty).
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 35
Fraud Triangle
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 36
THE FRAUD TRIANGLE
Additional image provided by
J.J. Dorega, CPA, LPT, MBA
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 39
THE PERPETRATORS OF FRAUDS
• Fraud Losses by Position within the Organization
• Individuals in the highest positions within an organization are
beyond the internal control structure and have the greatest
access to company funds and assets.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 40
THE PERPETRATORS OF FRAUDS
• Fraud Losses and the Collusion Effect
• One reason for segregating occupational duties is to deny
potential perpetrators the opportunity they need to commit
fraud. When individuals in critical positions collude, they create
opportunities to control or gain access to assets that otherwise
would not exist.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 41
THE PERPETRATORS OF FRAUDS
• Fraud Losses by Gender
• Women are not fundamentally more honest than men, but men
occupy high corporate positions in greater numbers than
women. This affords men greater access to assets.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 42
THE PERPETRATORS OF FRAUDS
(continued)
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 43
THE PERPETRATORS OF FRAUDS
(continued)
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 44
THE PERPETRATORS OF FRAUDS
(continued)
• Conclusions to Be Drawn
• Opportunity is the factor that actually facilitates the act.
• Fraud perpetrators:
1) Individual with highest positions have the greatest access to company
funds and assets.
2) Men that occupy high corporate positions have greater access to
assets.
3) Older employees since they have greater access to company assets.
4) Those with more education generally occupy higher position that will
lead to have greater access to company funds and other assets.
5) When positions in critical positions collude, they create opportunities
to control or gain access to assets that otherwise would not exists.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 45
FRAUD SCHEMES
Additional image provided by
J.J. Dorega, CPA, LPT, MBA
• Fraudulent Statements
• Corruption
1) Corruption
2) Bribery
3) Illegal gratuity
4) Conflict of interest
5) Economic
6) Economic distortion
• Asset misappropriation
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 46
Losses from Fraud by Scheme Type
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 47
FRAUD SCHEMES
• Fraudulent Statements
• Fraudulent statements are statements associated with
management fraud. In this class of fraud scheme, the financial
statement misrepresentation must itself bring direct or indirect
financial benefit to the perpetrator.
• THE UNDERLYING PROBLEMS
• SARBANES-OXLEY ACT AND FRAUD
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 48
FRAUD SCHEMES
• Fraudulent Statements
• THE UNDERLYING PROBLEMS
1) Lack of auditor independence
Auditing firms are also engaged by their
clients to perform nonaccounting
activities such as actuarial services,
internal audit outsourcing services, and
consulting.
The firms are essentially auditing their
own work.
The firm will not bring to management’s
attention the detected problems that
may adversely affect their consulting
fees
2) Lack of director independence
3) Questionable executive compensation
Arthur Andersen - Ms. Cuttle's Classes
scheme (google.com)
4) Inappropriate accounting practices
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 49
FRAUD SCHEMES
• Fraudulent Statements
• THE UNDERLYING PROBLEMS
1) Lack of auditor independence
2) Lack of director independence
• BOD composed of individuals who are not independent.
• Directors who have a personal relationship by serving on the
boards of other director’s companies
• Having a business trading relationship as key customers or
suppliers of the company
• Having a financial relationship as primary stockholder or have
received personal loans from the company
• Having an operational relationship as employees of the company
3) Questionable executive compensation scheme
4) Inappropriate accounting practices
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 50
FRAUD SCHEMES
• Fraudulent Statements
• THE UNDERLYING PROBLEMS
1) Lack of auditor independence
2) Lack of director independence
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 51
FRAUD SCHEMES
• Fraudulent Statements
• THE UNDERLYING PROBLEMS
1) Lack of auditor independence
2) Lack of director independence
3) Questionable executive compensation scheme
Abuse of stock-based compensation scheme
Excessive
May result in short-term thinking and strategies aimed at driving
up stock prices at the expense of the firm’s long-term health.
4) Inappropriate accounting practices
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 52
FRAUD SCHEMES
• Fraudulent Statements
• THE UNDERLYING PROBLEMS
1) Lack of auditor independence
2) Lack of director independence
3) Questionable executive compensation scheme
4) Inappropriate accounting practices
– The characteristic common to many financial statement fraud
schemes.
– ENRON made elaborate use of special purpose vehicle to hide
liabilities through off-balance sheet accounting; employed income
inflating techniques.
– WORLDCOM decided to transfer transmission line costs from current
expense accounts to capital accounts.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 53
FRAUD SCHEMES
• Fraudulent Statements
1) Inappropriate accounting practices
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 54
FRAUD SCHEMES
• Fraudulent Statements
• SARBANES-OXLEY ACT AND FRAUD:
• SOX ACT establishes a framework to modernize and reform the
oversight and regulation of public company auditing.
– Its principal reforms pertain to:
1) Accounting Oversight Board
2) Auditor Independence
3) Corporate Governance and Responsibility
4) Issuer and Management Disclosure
5) Fraud and Criminal Penalties
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 55
FRAUD SCHEMES
• Fraudulent Statements
• SARBANES-OXLEY ACT AND FRAUD:
• SOX ACT establishes a framework to modernize and reform the
oversight and regulation of public company auditing.
– Its principal reforms pertain to:
1) Accounting Oversight Board
– Public Company Accounting Oversight Board (PCAOB)
– It is the federal organization empowered to set auditing, quality
control, and ethics standards; to inspect registered accounting
firms; to conduct investigations; and to take disciplinary actions.
2) Auditor Independence
3) Corporate Governance and Responsibility
4) Issuer and Management Disclosure
5) Fraud and Criminal Penalties
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 56
FRAUD SCHEMES
• Fraudulent Statements
• SARBANES-OXLEY ACT AND FRAUD:
1) Accounting Oversight Board
2) Auditor Independence
– Creating more separation between a firm’s attestation and non-
auditing activities
• Bookkeeping or other services related to the accounting records or
financial statements
• Financial information systems design and implementation
• Appraisal or valuation services, fairness opinions, or contribution-in-kind
reports
• Actuarial services
• Internal audit outsourcing services
• Management functions or human resources
• Broker or dealer, investment adviser, or investment banking services
• Legal services and expert services unrelated to the audit
• Any other service that the PCAOB determines is impermissible
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 57
FRAUD SCHEMES
• Fraudulent Statements
• SARBANES-OXLEY ACT AND FRAUD:
• SOX ACT establishes a framework to modernize and reform the
oversight and regulation of public company auditing.
– Its principal reforms pertain to:
1) Accounting Oversight Board
2) Auditor Independence
3) Corporate Governance and Responsibility
– The act requires all audit committee members to be
independent and requires the audit committee to hire and
oversee the external auditors.
– This provision is consistent with many investors who consider
the board composition to be a critical investment factor
4) Issuer and Management Disclosure
5) Fraud and Criminal Penalties
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 58
FRAUD SCHEMES
• Fraudulent Statements
• SARBANES-OXLEY ACT AND FRAUD:
1) Accounting Oversight Board
2) Auditor Independence
3) Corporate Governance and Responsibility
4) Issuer and Management Disclosure
– Imposition of new corporate disclosure requirements:
a) Public companies must report all off-balance-sheet transactions.
b) Annual reports filed with the SEC must include a statement by
management asserting that it is responsible for creating and
maintaining adequate internal controls and asserting to the
effectiveness of those controls.
c) Officers must certify that the company’s accounts ‘‘fairly present’’
the firm’s financial condition and results of operations.
d) Knowingly filing a false certification is a criminal offense
5) Fraud and Criminal Penalties
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 59
FRAUD SCHEMES
• Fraudulent Statements
• SARBANES-OXLEY ACT AND FRAUD:
1) Accounting Oversight Board
2) Auditor Independence
3) Corporate Governance and Responsibility
4) Issuer and Management Disclosure
5) Fraud and Criminal Penalties
1) SOX imposes a range of new criminal penalties for fraud and
other wrongful acts.
2) In particular, the act creates new federal crimes relating to the
destruction of documents or audit work papers, securities
fraud, tampering with documents to be used in an official
proceeding, and actions against whistle-blowers.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 60
FRAUD SCHEMES (continued)
• Corruption
• Corruption involves an executive, a manager, or an employee
of the organization in collusion with an outsider.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 62
FRAUD SCHEMES (continued)
• Asset Misappropriation
• The most common fraud scheme in various forms
• Assets are either directly or indirectly diverted to the
perpetrator’s benefit.
• 90% of the frauds fall in this general category (ACFE)
1) Skimming
2) Cash larceny
3) Billing schemes
4) Check tampering
5) Payroll fraud
6) Expense reimbursements
7) Thefts of cash
8) Noncash misappropriation
9) Computer fraud
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 63
Losses from Asset Misappropriation Schemes
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 64
FRAUD SCHEMES (continued)
• Skimming
• Skimming involves stealing cash from an organization before
it is recorded on the organization’s books and records.
• Another example is mail room fraud, in which an employee
opening the mail steals a customer’s check and destroys the
associated remittance advice.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 65
FRAUD SCHEMES (continued)
• Skimming
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 67
FRAUD SCHEMES (continued)
• Billing Schemes (continued)
• A shell company is establishing a false vendor on the company’s
books, and then making false purchase orders, receiving reports,
and invoices in the name of the vendor and submitting them to the
accounting system, creating the illusion of a legitimate
transaction. The system ultimately issues a check to the false
vendor.
• A pass-through fraud is similar to shell company fraud except
that a transaction actually takes place. The perpetrator creates a
false vendor and issues purchase orders to it for inventory or
supplies. The false vendor purchases the needed inventory from
a legitimate vendor, charges the victim company a much higher
than market price for the items, and pockets the difference.
• A pay-and-return is a scheme under which a clerk with check
writing authority pays a vendor twice for the same products
(inventory or supplies) received and then intercepts and cashes
the overpayment returned by the vendor.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 68
FRAUD SCHEMES (continued)
• Check Tampering
• Check tampering involves forging, or changing in some
material way, a check that was written to a legitimate payee.
• Payroll Fraud
• Payroll fraud is the distribution of fraudulent paychecks to
existent and/or nonexistent employees.
• Expense Reimbursements
• Expense reimbursement fraud involves claiming
reimbursement of fictitious or inflated business expenses.
• Thefts of Cash
• Thefts of cash is the direct theft of cash on hand in the
organization.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 69
FRAUD SCHEMES (continued)
• Noncash Misappropriations
• Noncash fraud is the theft or misuse of non-cash assets (e.g.,
inventory, confidential information).
• Computer Fraud
• Computer fraud involves theft, misuse, or misappropriation of
assets by altering computer-readable records and files, or by
altering the logic of computer software; the illegal use of
computer-readable information; or the intentional destruction of
computer software or hardware.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 70
Internal Control Concepts and Techniques
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 71
Internal Control Concepts and Techniques
• Modifying Assumptions
• Management responsibility is the concept under which the
responsibility for the establishment and maintenance of a
system of internal control falls to management.
• Reasonable assurance is an assurance provided by the
internal control system that the four broad objectives of internal
control are met in a cost-effective manner.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 72
Internal Control Concepts and Techniques
• Modifying Assumptions
• METHODS OF DATA PROCESSING
• Internal controls should achieve the four broad objectives regardless of
the data processing method used.
• The control techniques used to achieve these objectives vary with
different type of technologies.
• LIMITATIONS ON EFFECTIVENESS
1) The possibility of error – no system is perfect
2) Circumvention – through collusion or other means.
3) Management override – by distorting transactions or by directing a
subordinate to do so
4) Changing conditions – conditions may change overtime and render
existing controls ineffective
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 73
Internal Control Concepts and Techniques
(continued)
• The higher the risk, the higher the possibility that the financial
statements are materially misstated (fraudulent financial
statements)
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 74
Internal Control Concepts and Techniques
(continued)
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 76
Internal Control Shield
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 77
Preventive, Detective, and Corrective Controls
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 78
Internal Control Concepts and Techniques
(continued)
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 79
COSO INTERNAL CONTROL FRAMEWORK
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 80
COSO INTERNAL CONTROL FRAMEWORK
• Risk Assessment
• Risk assessment is the identification, analysis, and
management of risks relevant to financial reporting.
• Risk can arise or change from the following circumstances:
• Changes in the operating environment that impose new or changed competitive
pressures on the firm.
• New personnel who have a different or inadequate understanding of internal control.
• New or reengineered information systems that affect transaction processing.
• Significant and rapid growth that strains existing internal controls.
• The implementation of new technology into the production process or information
system that impacts transaction processing.
• The introduction of new product lines or activities with which the organization has little
experience.
• Organizational restructuring resulting in the reduction and/or reallocation of personnel
such that business operations and transaction processing are affected.
• Entering into foreign markets that may impact operations (that is, the risks associated
with foreign currency transactions).
• Adoption of a new accounting principle that impacts the preparation of financial
statements.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 81
COSO INTERNAL CONTROL FRAMEWORK
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 82
COSO INTERNAL CONTROL FRAMEWORK
• Monitoring
• Monitoring is the process by which the quality of internal
control design and operation can be assessed.
• An organization’s internal auditors may monitor the entity’s
activities in separate procedures.
• Gather evidence of control adequacy by testing controls and then
communicate control strengths and weaknesses to management.
• Make specific recommendations for improvements to controls
• Ongoing monitoring techniques:
1) Integrate special computer modules into the information system that
capture key data and/or permit tests of controls to be conducted as
part of routine operations.
2) Judicious use of management reports
1) Highlight the trends
2) Identify exceptions from normal performance
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 83
COSO INTERNAL CONTROL FRAMEWORK
(continued)
• Control Activities
• Control activities are the policies and procedures to ensure
that appropriate actions are taken to deal with the
organization’s risks.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 84
COSO INTERNAL CONTROL FRAMEWORK
(continued)
• Control Activities
• IT CONTROLS:
1. General controls are controls that pertain to entity-wide concerns
such as
a) controls over the data center,
b) organization databases,
c) systems development, and
d) program maintenance.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 85
COSO INTERNAL CONTROL FRAMEWORK
(continued)
• Control Activities
• PHYSICAL CONTROLS
1. Transaction authorization is a procedure to ensure that employees
process only valid transactions within the scope of their authority.
2. Segregation of duties is the separation of employee duties to
minimize incompatible functions. (Authorization, Recording,
Custodianship)
3. Supervision is a control activity involving the critical oversight of
employees.
4. The accounting records of an organization consist of documents,
journals, or ledgers used in transaction cycles.
5. Access controls are controls that ensure that only authorized
personnel have access to the firm’s assets.
6. Independent verification. Verification procedures are independent
checks of the accounting system to identify errors and
misrepresentations; timing depends on technology employed and the
task under review. (Reconcile, Compare, Review)
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 86
Segregation of Duties Objectives
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 87
COSO INTERNAL CONTROL FRAMEWORK
(continued)
The 2013 COSO Framework and the Audit Committee - Risk & Compliance Journal - WSJ
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 88
IT APPLICATION CONTROLS
• Input Controls
• Input controls are programmed procedures, often called edits,
that perform tests on transaction data to ensure that they are
free from errors.
1) CHECK DIGIT
2) MISSING DATA CHECK
3) NUMERIC-ALPHABETIC CHECK
4) LIMIT CHECK
5) RANGE CHECK
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 89
IT APPLICATION CONTROLS
• Input Controls
1) CHECK DIGIT:
1) Transcription errors are the type of errors that can corrupt a data
code and cause processing errors.
2) Transposition errors are errors that occur when digits are
transposed.
3) A check digit is a method for detecting data coding errors in which a
control digit is added to the code when it is originally designed to allow
the integrity of the code to be established during subsequent
processing.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 90
IT APPLICATION CONTROLS
• Input Controls
2) MISSING DATA CHECK
• The edit identifies blank or incomplete input fields that should
contain data are required to process the transactions.
3) NUMERIC-ALPHABETIC CHECK
• The edit identifies when data in a particular field are in the wrong
form.
• Example: Customer’s account balance should not contain
alphabetic data.
4) LIMIT CHECK
• Used to identify field values that exceed an authorized limit.
• Example: Maximum employee work per week is 44 hours
5) RANGE CHECK
• Having an upper and lower limit to their acceptable values
• Example: Monthly salary is between P 10,000 to 11,000, a certain
deduction will be P 500.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 91
IT APPLICATION CONTROLS (continued)
• Input Controls (continued)
6. REASONABLENESS CHECK
• Error is detected by a test that determines if a value in one field,
which has already passed a limit check and a range check, is
reasonable when considered in other fields of the record.
• Example: An employee’s pay rate of P 100 per hour falls within an
acceptable range. If excessive when compared to employee’s job
skill code of 143. Employees in this skill class should not earn more
than P 80 per hour.
7. VALIDITY CHECK
• Compares actual field values against known acceptable values.
• The control is used to verify such things as transactions codes,
state abbreviations, or employee job skill codes. If the value does
not match one of the acceptable values, the record is flagged as an
error.
• Frequently used in cash disbursements system – nonexistent
vendor from the list of valid vendors.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 92
IT APPLICATION CONTROLS (continued)
• Processing Controls
• Batch controls
• Run-to-run controls
• Hash total
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 93
IT APPLICATION CONTROLS (continued)
• Processing Controls
• Batch controls is an effective method of managing high
volumes of transaction data through a system.
• It ensures:
1) All records in the batch are processed.
2) No records are processed more than once.
3) An audit trail of transactions is created from input through
processing to the output stage of the system.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 94
IT APPLICATION CONTROLS (continued)
• Processing Controls
• Run-to-run controls
are controls that use
batch figures to monitor
the batch as it moves
from one programmed
procedure to another.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 95
IT APPLICATION CONTROLS (continued)
• Processing Controls
• Hash total is a control
technique that uses
nonfinancial data to keep
track of the records in a
batch.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 96
IT APPLICATION CONTROLS (continued)
• Audit Trail Controls
• Audit trail controls ensures that every transaction can be
traced through each stage of processing from its economic
source to its presentation in financial statements.
• Examples:
1) TRANSACTION LOGS
– Every transaction the system successfully processes should be recorded on a
transaction log, which serves as a journal.
a permanent record of transactions, although the input transaction
•
file is typically a temporary file.
• not all of the records in the input file may be successfully
processed.
2) LOG OF AUTOMATIC TRANSACTIONS
– The system triggers some transactions internally.
– To maintain an audit trail of these activities, all internally generated
transactions must be placed in a transaction log
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 97
Transaction Log to Preserve the Audit Trail
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 98
IT APPLICATION CONTROLS (continued)
• Master File Backup Controls
• The procedures may depend on the type of system in place.
• This can be viewed either as (a) a general control, or (b) an
application control.
• In database environment:
• It is a general control because database supports all corporate users
and database backup procedures apply to all.
• In a flat-file environment:
• It is an application control because corporate users do not share data
files, therefore, individual backup procedures need to be designed
specifically for each user’s application.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 99
GFS BACKUP TECHNIQUE
• For batch processing using sequential files
• The grandfather-father-son (GFS) is a back-up technique employed
by systems that use sequential master files (whether tape or disk).
– It is an integral part of the master file update process.
– The systems designer determines the number of backup master files
needed for each application.
– Two factors influence this decision:
(1) the financial significance of the system and
(2) the degree of file activity.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 100
Grandfather-Father-Son Approach
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 101
BACKUP PROCESS IN BATCH SYSTEM USING
DIRECT ACCESS FILES
• Each record in a direct access file is assigned a unique
disk location or address that is determined by its primary
key value.
• The destructive update approach leaves no backup copy
of the original master file.
• Only the current value is available to the user.
• To back-up the master prior to each scheduled update run:
1) Copy the master file being updated to create a back up version.
2) Should the original master file be destroyed or corrupted, reconstruct
the master file by either of the following ways:
a) A special recovery program uses the back-up master file to
reconstruct a new master file.
b) The file update process is repeated using the previous batch of
transactions to restore the master to current status.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 102
Destructive Update Approach
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 103
Backup Procedures for Batch Systems Using Direct
Access Files
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 104
BACKUP OF MASTER FILES IN A REAL-TIME
SYSTEM
• Real-time systems pose a more difficult problem because
transactions are being processed continuously.
• Backup procedures are therefore scheduled at
prespecified intervals throughout the day (e.g., every 15
minutes).
• If the current version of the master file is destroyed through a
disk failure or corrupted by a program error, it can be
reconstructed from the most current backup file.
• The transactions processed since the last backup, however,
need to be reprocessed to bring the master file to current
status.
• These records are retrieved from the transaction log, which is created
continuously in real-time.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 105
Backup Procedures for Real-Time Processing
System
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 106
OUTPUT CONTROLS
• OUTPUT CONTROLS
• A combination of programmed routines and other procedures
to ensure that system output is not lost, misdirected, or
corrupted and that the privacy is not violated.
• Example: If the checks that a firm’s cash disbursements
system produces are lost, misdirected, or destroyed, trade
accounts payable and other bills may go unpaid (could
damage firm’s credit rating).
• Controlling Hard-Copy Output (Common to batch system)
• OUTPUT SPOOLING
• PRINT PROGRAMS
• WASTE
• REPORT DISTRIBUTION
• END-USER CONTROLS
• Controlling Digital Output
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 107
OUTPUT CONTROLS
• Controlling Hard-Copy Output
• OUTPUT SPOOLING:
• Spooling is directing an application’s output to a magnetic disk file
rather than to the printer directly.
– Later, when printer resources become available, the output files are
printed.
– The creation of output file as an intermediate step in the printing
process presents an added exposure (risks).
• Access the output file and change critical data values.
• Access the file and change the number of copies to be printed.
• Make copy of the output file to produce illegal output reports,
• Destroy the output file before output printing takes place.
– The management and auditors need to be aware of these potential
exposures and ensure that proper backup procedures are in place to
protect output files.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 108
OUTPUT CONTROLS
• Controlling Hard-Copy Output
• PRINT PROGRAMS
• The print run program produces hard-copy output from the output file.
• Print program controls deal with two types of exposures present in this
environment:
1) the production of unauthorized copies of output and
2) employee browsing of sensitive data
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 110
OUTPUT CONTROLS
• Controlling Hard-Copy Output
• REPORT DISTRIBUTION
• Risks: being stolen, lost, or misdirected in transit
to the user.
• Control techniques:
1) The reports may be placed in a secure
mailbox to which only the user has the key.
2) The user may be required to appear in
person at the distribution center and sign for
the report.
3) A security officer or special courier may
deliver the report to the user.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 111
OUTPUT CONTROLS
• Controlling Hard-Copy Output
• END-USER CONTROLS
• Recipient-user of the report should examine the output reports for error.
• Errors the user detects should be reported to the appropriate IT
management.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 112
OUTPUT CONTROLS
• Controlling Digital Output
• Digital output can be directed to the user’s computer screen or
printer.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 113
Stages in the Output Process
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 114