Professional Documents
Culture Documents
17 Ais 004
17 Ais 004
AIS 4203
Accounting & Information Systems
Submitted To
Md. Asiqur Rahman
Assistant Professor
Dept. of Accounting and Information Systems
University of Barishal
Submitted by
Abdul Ahad
17 AIS 004
Dept. of Accounting and Information Systems
University of Barishal
1|Page
Page
Sl No Topic’s Name
No
01 Introduction 3
02 Internal Control 3
Table of Contents
2|Page
Introduction
Society has increasingly relied on accounting information systems, which have developed increasingly
complex to meet the increasing need for information. In line with the increase in system complexity and
dependence on the system, companies face an increased risk of the system being negotiated. In most
years, more than 60% of organizations experience a major failure in controlling the security and integrity
of their computer systems. Reasons for the failures include the following:
Internal Control
Internal control is the process implemented by the board of directors, management, and those under their
direction to provide reasonable assurance that the following control objectives are achieved:
3|Page
Internal control is a process that permeates and organization’s activities and provides reasonable, rather
than absolute, assurance. Internal control systems are susceptible to errors, poor decisions, and override;
and internal control objectives are often at odds with each other, e.g., controls to safeguard assets may
also reduce operational efficiency.
Internal controls perform three important functions:
1. Preventive controls deter problems before they arise.
2. Detective controls discover problems that are not prevented.
3. Corrective controls identify and correct problems as well as correct and recover from the
resulting errors.
Robert Simons, a Harvard business professor, has espoused four levers of control to help management
reconcile the conflict between creativity and controls.
1. Belief system - System that describes how a company creates value, helps employees understand
management’s vision, communicates company core values, and inspires employees to live by
those values.
2. Boundary system - System that helps employees act ethically by setting boundaries on employee
behavior.
3. Diagnostic control system - System that measures, monitors, and compares actual company
progress to budgets and performance goals.
4. Interactive control system - System that helps managers to focus subordinates’ attention on key
strategic issues and to be more involved in their decisions.
4|Page
The Foreign Corrupt Practices and Sarbanes - Oxley Acts
In 1977, the Foreign Corrupt Practices Act (FCPA) was passed to prevent companies from bribing foreign
officials to obtain business; also requires all publicly owned corporations maintain a system of internal
accounting controls. In the late 1990s and early 2000s, a series of multi-million-dollar accounting frauds
Such as Enron, WorldCom, Xerox, Tyco, Global Crossing, Adelphia, and other companies made
headlines. Congress responded with passage of the Sarbanes-Oxley Act of 2002(SOX). SOX applies to
publicly held companies and their auditors and was designed to prevent financial statement fraud, make
financial reports more transparent, protect investors, strengthen internal controls, and punish executives
who perpetrate fraud.
Important aspects of SOX include:
1. creation of the Public Company Accounting Oversight Board (PCAOB) to oversee the
auditing profession
2. new rules for auditors, audit committees, and management
3. new roles for audit committees
4. New internal control requirements, including Section 404 requirements that companies issue a
report accompanying the financial statements stating management’s responsibility for
establishing and maintaining an adequate internal control system.
5|Page
COBIT Framework
A security and control framework that allows (1) management to benchmark the security and control
practices of IT environments (2) users of IT services to be assured that adequate security and control
exist, (3) auditors to substantiate their internal control opinions and advise on IT security and control
matters.
COBIT 5 is based on the following five key principles of IT governance and management. These
principles help organizations build an effective governance and management framework that protects
stakeholders’ investments and produces the best possible information system.
1. The first principle is meeting the stakeholders’ needs. This principle is about identifying the key
stakeholders, their needs and how value is created for enterprises by addressing those needs
through the cascading of goals. Covering the enterprise end-to-end.
2. The second principle is covering the enterprise end-to-end. This principle is about covering all the
functions and processes wherever information is processed in the enterprise.
3. The third principle is applying a single integrated framework. This principle is about having a
single and integrated framework that consists of the various established frameworks and
standards required for the governance and management of enterprise IT.
4. The fourth principle is enabling a holistic approach. This principle is about using a set of enablers
for an all-inclusive or holistic approach to support the governance and management of enterprise
IT.
5. The fifth principle is separating governance from management. This principle is about
differentiating between the governance and management roles, activities and responsibilities.
6|Page
Above Figure is the COBIT 5 process reference model. The model identifies the five governance
processes (referred to as evaluate, direct and monitor—or EDM) and 32 management processes. The 32
management processes are broken down into the following four domains:
1. Align, plan, and organize (APO)
2. Build, acquire, and implement (BAI)
3. Deliver, service, and support (DSS)
4. Monitor, evaluate, and assess (MEA)
7|Page
COSO’s Internal Control Framework
Committee of Sponsoring Organizations (COSO) is a private sector group consisting of the American
Accounting Association, the AICPA, the Institute of Internal Auditors, the Institute of Management
Accountants, and the Financial Executives Institute. In 1992, COSO issued Internal Control - Integrated
Framework (IC), which is a framework that defines internal controls and provides guidance for evaluating
and enhancing internal control systems. The five components and 17 principles of the updated IC
framework are summarized in the table below
8|Page
COSO’s Enterprise Risk Management Framework
To improve the risk management process, COSO developed a second control framework called Enterprise
Risk Management—Integrated Framework (ERM). ERM is a framework that improves the risk
management process by expanding (adds three additional elements) COSO’s Internal Control - Integrated.
The basic principles behind ERM are as follows:
Companies are formed to create value for their owners.
Management must decide how much uncertainty it will accept as it creates value.
Uncertainty results in risk, which is the possibility that something negatively affects the
company’s ability to create or preserve value.
Uncertainty results in opportunity, which is the possibility that something positively affects the
company’s ability to create or preserve value.
The ERM framework can manage uncertainty as well as create and preserve value.
Internal Environment
internal environment is the company culture that is the foundation for all other ERM components as it
influences how organizations establish strategies and objectives; structure business activities; and
identify, assess, and respond to risk. It is the foundation for all other ERM components.
An internal environment consists of the following:
1. Risk Management Philosophy: This is a set of shared attitudes and beliefs that will tend to
characterize how the enterprise considers risk in everything it does. While often not just the type
of message published in a code of conduct, a risk management philosophy is the kind of attitude
that will allow managers and others at all levels to respond to some high-risk proposal. An
enterprise might respond to similar situation differently based on business philosophy but it
should try to develop a consistent philosophy and attitude to how it accepts risky ventures.
9|Page
2. Risk Appetite: A concept or expression unfamiliar to many managers, risk appetite is the amount
of risk an enterprise is willing to accept in the pursuit of its objectives. This appetite for risk can
be measured in quantitative or qualitative terms, but all levels of management should have a
general understanding of this concept as well as the overall enterprise’s risk appetite. The term
appetite is often not used, but the term represents an overall philosophy.
3. Board of Directors’ Attitudes: The board of directors has a very important role in overseeing
and guiding an enterprise’s risk environment. The independent, outside directors in particular
should closely review management actions, ask appropriate questions, and serve as a check and
balance control for the enterprise.
4. Integrity and Ethical Values: This important ERM internal environment element requires much
more than a published code of conduct and includes strong integrity and standards of behavior for
members of the enterprise. There should be a strong corporate culture here that guides the
enterprise at all levels in helping to make risk-based decisions.
5. Commitment to Competence: Competence refers to the knowledge and skills necessary to
perform assigned tasks. Management decides how these critical assigned tasks will be
accomplished through developing appropriate strategies and assigning the proper people to
perform these often-strategic tasks.
6. Organizational Structure: While every enterprise will develop an enterprise structure that meets
its current needs and often satisfies its heritage, that same enterprise structure should have clear
lines of authority and responsibility along with appropriate lines of reporting. A poorly
constructed enterprise structure makes it difficult to plan, execute, control, and monitor activities.
7. Assignments of Authority and Responsibility: The assignment of authority refers to the extent
or degree to which authority and responsibility is assigned or delegated in an enterprise. The
trend in many enterprises today is to push such matters as levels of approval authorities down the
enterprise structure, giving more front-line employees’ greater authorization and approval
authority.
8. Human Resource Standards: An enterprise’s practices regarding employee hiring, training,
compensating, promoting, disciplining, and all other actions send messages to all members of the
enterprise regarding what is favored, tolerated, or forbidden. When management winks at or
ignores some ‘‘gray area’’ activities rather than taking a strong stand, that message is often
quickly communicated to others throughout an enterprise. A strong set of standards are needed
that are both communicated to all stakeholders and are enforced.
10 | P a g e
Objective Settings
Objective setting is the second ERM component. Management determines what the company hopes to
achieve, often referred to as the corporate vision or mission. Management sets objectives at the corporate
level and then subdivides them into more specific objectives for company subunits. The company
determines what must go right to achieve the objectives and establishes performance measures to
determine whether they are met.
Different types of objectives are
1. Strategic objectives
2. Operations objectives
3. Reporting objectives
4. Compliance objectives
Event Identification
COSO defines an event as “an incident or occurrence emanating from internal or external sources that
affects implementation of strategy or achievement of objectives. Events may have positive or negative
impacts or both.” An event represents uncertainty; it may or may not occur. If it does occur, it is hard to
know when. Management must try to anticipate all possible positive or negative events, determine which
are most and least likely to occur, and understand the interrelationship of events.
11 | P a g e
Risk Assessment Approach to Designing Internal Controls
Control Activities
Control activities are policies, procedures, and rules that provide reasonable assurance that control
objectives are met and risk responses are carried out. It is management’s responsibility to develop a
secure and adequately controlled system. Management must make sure that:
1. Controls are selected and developed to help reduce risks to an acceptable level.
2. Appropriate general controls are selected and developed over technology.
3. Control activities are implemented and followed as specified in company policies and procedures.
Control procedures fall into the following categories:
1. Proper authorization of transactions and activities
2. Segregation of duties
3. Project development and acquisition controls
4. Change management controls
5. Design and use of documents and records
6. Safeguarding assets, records, and data
7. Independent checks on performance
12 | P a g e
Information and Communication
Information and communication systems should capture and exchange the information needed to conduct,
manage, and control the organization’s operations. The primary purpose of an accounting information
system (AIS) is to gather, record, process, store, summarize, and communicate information about an
organization. This includes understanding how transactions are initiated, data are captured, files are
accessed and updated, data are processed, and information is reported.
Monitoring
The internal control system that is selected or developed must be continuously monitored, evaluated,
and modified as needed. Any deficiencies must be reported to senior management and
the board of directors.
13 | P a g e