Preview

Expenditure Cyle

Good Essays
Open Document
Open Document
1409 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Expenditure Cyle
The Expenditure Cycle is a recurring set of business activities and related information processing operations associated with the purchase of and payment for goods and services.
The primary external exchange of information is with suppliers (Vendors).
Information about the need to purchase goods and material flows to the expenditure cycle from the revenue and production cycles, inventory control, and various departments.
Once the goods and materials arrive, notification of their receipt flows back to those sources from the expenditure cycle.
The primary objective in the expenditure cycle is to minimize the total cost of acquiring and maintaining inventories, supplies, and the various services the organization needs to function.
6 decisions to accomplish this objective (PAGE 216)
To answer these decisions 4 basic expenditure cycle activities 1. Ordering material, supplies and services 2. Receiving materials, supplies and services 3. Approving supplier invoices 4. Cash disbursements
Expenditure Cycle Information System
Process
Most large organizations use an (ERP) enterprise resource planning system.
Threats and Controls
All expenditure cycle activities depends on the integrated database that contains information about suppliers, inventory, and purchasing activities.
The first general threat is inaccurate or invalid master data. One way to mitigate this threat or inaccurate or invalid master data is to employ data processing integrity controls. 1. Restrict access to expenditure master data
The second general threat in the expenditure cycle is unauthorized disclosure of sensitive information, such as banking information about suppliers and special pricing discounts offered by preferred suppliers. One way to mitigate the risk of this threat is to configure the system to employ strong access controls that limit who can view such information.
The third general threat in the expenditure cycle concerns the loss or destruction of master

You May Also Find These Documents Helpful

  • Good Essays

    The accounting cycle is a series of procedures that allow a company to record their transactions and prepare their financial statements in the most accurate way possible. Every cycle starts with a single transaction and ends with the books being closed out for a specific time period. There are nine steps in all.…

    • 549 Words
    • 3 Pages
    Good Essays
  • Better Essays

    “The first function is processing of purchase orders. This includes purchase requisitions, quotations from suppliers, and purchase orders” (Arens, Elder, & Beasley, 2012, p. 683). The second function is receipt of purchased materials. This includes the receiving report. The third function is storage of materials or inventory. This includes the materials requisition form. The fourth function is processing raw materials. This includes the job cost sheet, and process cost sheets. The fifth function is storage of finished goods. This includes the sales invoice, and the sales order form. The final function is shipping finished goods. This includes the shipping form and…

    • 2435 Words
    • 10 Pages
    Better Essays
  • Powerful Essays

    Final Acc 340

    • 1422 Words
    • 4 Pages

    The steps of accounting cycles are revenues, expenditures, conversion/ production, financing, fixed assets, and financial reporting. Revenues most often occur as the result of the selling of a service or product. These transactions are recorded in the form of cash receipts and sales orders. Expenditures are a result of the materials and labor need to generate revenues. For example a dry cleaning business would need certain chemicals, bags and hangers for cleaned clothes, and employees to operate the business. Conversion represents the production or the good or service sold by the company. In other terms the time/ cost to produce and market the good or service. Financing is also known as and outstanding debt, such as stocks or any outstanding bonds. The fixed asset details the purchase, disposition, and depreciation of company assets. Once all journal entries have been posted and all accounts closed a trial balance is prepared and is used to identify errors and eventually prepare the financial reporting for the company. Accounting systems have become more automated and the need for human intervention is becoming more limited. Automation of these systems does allow for increased efficiency and accuracy and has allowed manual accounting task to be performed more quickly. Human intervention is necessary though to ensure the data being entered is correct. Human intervention can also help to identify errors that may have been made in the initial inputting of information. As technology evolves it is…

    • 1422 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    There are five accounting cycles that a business can use. Each cycle reveals different types of business activities. The cycles are revenue, expenditure, conversion, financing, and fixed asset. Revenues includes sales and cash receipts. Sales is all revenue earned from products sold to their customers. Cash receipts is all cash that is brought in. Expenditures is what the company spends to keep the company profitable. This would include the money spent on supplies, or paying their employees to work. The conversion cycle which is also considered the production cycle is an account of all production in a business. It allocates the costs to the production and makes sure everything is accurately expensed. The financing cycle accounts for all stock, bonds, debts, and dividend transactions. Lastly, the fixed asset cycle is accounting for all fixed assets of the business. This will include purchasing, selling, and depreciation of all major assets.…

    • 401 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    o Explain how you would integrate this part of the accounting cycle into an enterprise-wide accounting information system.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Information that is stored in an organisation has to follow the security and confidentiality procedures. For example finances, customer’s and employee’s details should be secured and only certain members of staff should be able to access physical and electronic data unless you have been given authorisation. If information gets into the wrong hands it could have serious consequences and might lead to legal action.…

    • 777 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Learning Check

    • 4183 Words
    • 17 Pages

    The classes of transactions in this cycle for a merchandising company are sales, sales adjustments, and cash receipts. The primary accounts affected by these transactions are sales, accounts receivable, cost of sales, inventory, cash, sales discounts, sales returns and allowances, bad debts expense, and allowance for uncollectable accounts…

    • 4183 Words
    • 17 Pages
    Good Essays
  • Good Essays

    | Describe ways to protect hardware, software and data and minimise security riskThere are steps to prevent threats to system and information: access to information sources should be allowed with Username and password/PIN selection. The system set up on password strength; how and when to change passwords (monthly); online identity/profile; Real name, pseudonym; what personal information to include, who can see the information; Respect confidentiality, avoid inappropriate disclosure of…

    • 793 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Week 4 Team Reflection

    • 394 Words
    • 2 Pages

    Purchase orders for the products and goods used through the normal course of business operations…

    • 394 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Two key components of maintaining confidentiality are the integrity of information and its security. Integrity is achieved by the accuracy and completeness of information using proper processing methods. Security measures are needed to protect information from a wide variety of threats.…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Many businesses are concerned with information technology risks. Many organizations are concerned with different types of risk and attempt to control risk as they are assessed. In order to control risk, organizations must create control environments that set the tone of employee awareness and promote operational efficiency. One attempt to control risk is through risk assessment. The purpose of risk assessment is to identify organizational risks and evaluate additional or specific control procedures. The purpose of this paper is to analyze and assess the risks within the flow charts of accounts payable, accounts receivable, inventory, and payroll recommended by learning team E for Kudler Fine Foods, design internal controls to mitigate risks to the system, evaluate the application of internal controls to the system and discuss other controls outside the system that Kudler Foods may need.…

    • 1217 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Proper procedures insure that a system is not compromised or destroyed based on a simple mistake or miss management of access.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The objectives of the first role of the cycle, Statisticians, economists, other social scientist and accountants, is to identify the need for programs, collect and analyze budgetary and other financial information, and perform a cost-benefit analysis. The objective for the second role, policy makers, is to selective among alternative programs and establish policies and goals. The objectives of role three are to evaluate the efficiency and effectiveness of programs and report to policy makers. The objectives for the forth and final role are to administer the programs and prepare financial statements and other reports. Once these objectives have been met the cycle repeats itself to ensure the success of the programs.…

    • 615 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Social Care

    • 1031 Words
    • 6 Pages

    All personal data must be secured at all time. Appropriate technical and organisational measures must be taken against unauthorised or unlawful processing of personal data and against accidental lost, destruction or damage.…

    • 1031 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Quiz 9

    • 445 Words
    • 2 Pages

    ____ refers to protecting against unauthorized data disclosure and ensuring the authenticity of the data source.…

    • 445 Words
    • 2 Pages
    Satisfactory Essays