Preview

Input Controls

Better Essays
Open Document
Open Document
1244 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Input Controls
The objective of input design is to ensure the quality, accuracy, completeness, and timeliness of input data during its conversion from its original source into computer data, or entry into a computer application. Data can be entered into a computer application from either manual online input or by scheduled automated processing. Input controls will ensure that data is accurately processed through the application and that no data is added, lost, or altered during processing (Shu, unk). No matter how data enter and information system, the quality of the output is only as good as the quality of the input. There are several key input controls for an input design such as, data processing control, source document controls, validation controls, and user interface. Input control includes the necessary measures to ensure that input data is correct, complete, and secure (Rosenblatt, 2012).
In computer science, data validation is the process of ensuring that a program operates on clean, correct and useful data. Validation rules or check routines are used to check for correctness, meaningfulness, and security of data that are input to the system. The rules may be implemented through the automated facilities of a data dictionary, or through software application program validation logic. Data that does not conform to these rules will negatively affect company process execution. Therefore, data validation should start with business process definition and set of business rules within this process because incorrect data validation can lead to data corruption or security vulnerability (Shu, unk).
Source Document Control are techniques used to prevent source document fraud. Documentation should exist explaining the workflow through the application. Some examples would be narratives on the application processes, flowcharts, and an explanation of system or error messages (Rosenblatt, 2012). A processing and audit logs should generated and be available to be reviewed for unusual or



References: Anthony D. Andre, P. C. (1995). User Interface Design. Retrieved February 10, 2012, from Usernomics: http://www.usernomics.com/user-interface-design.html Lo, P. (2004). User Interface, Input and Output Design. Unk: Peter Lo. Rosenblatt, G. B. (2012). System Analysis and Design, 9th Edition. Mason: Cengage Learning. Shu, L. (unk). Computer Assisted Audit Toolsand Techniques. Retrieved February 10, 2012, from Schribd.: http://www.scribd.com/doc/48033121/Input-controls

You May Also Find These Documents Helpful

  • Good Essays

    Kudler Fine Food has expanded business and updated their computer systems to meet demands. As IT information is adopted within the organization, automation control processes has become more virtualized. To ensure that Kudler’s computerize systems function properly an audit must be performed on an annual basis. Management at Kudler Fine Foods wants to see the proposed audit schedules for all systems. Management wants to know the types of audit and how they will be conducted. In addition, management would like to know about events that might prevent reliance on auditing through the computer.…

    • 986 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Before any strategy takes place, an auditor must determine the end result desired from the Information Technology being used as well as the type of technology being dealt with. The most important thing is security thus it is vital to know this technology in and out to be able to determine its strengths and weaknesses. This allows for proper compensation to combat such attacks whether they are fraudulent or accidental in nature. It is necessary to be familiar with different types of proven viable internal control setups to properly test and gage an IT’s internal control system. There are three different strategies use when testing internal controls. First includes assessing the controls using user control information. In this strategy, an auditor would gather computer-generated reports and compare those to all documentation on specific transactions. This process is also known as auditing around the computer because it deals with more hard copy documents. The next strategy entails using application controls to determine the level of risk…

    • 627 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    References: AU 9504. AICPA Statement on Auditing Standards. Retrieved on March 13, 2013 from: http://www.aicpa.org/research/standards/auditattest/pages/sas.aspx…

    • 326 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Create a strategy. Outline a plan for your data quality that supports ongoing operations and data management. Identify the data sets that meet your quality standard, and the data sets that need to be cleaned. Identify possible solutions with a plan for implementation. Your general…

    • 522 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Controls for Outflows

    • 571 Words
    • 3 Pages

    Louwers, T. J., Ramsay, R. J., Sinason, D. H., & & Strawser, J. R. (2007). Auditing and…

    • 571 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Input Controls

    • 1029 Words
    • 5 Pages

    This paper will discuss input controls and their various functions. An input control includes the necessary measures to ensure that data is correct, complete, and secure (Shelly & Rosenblatt, 2012). Input controls as it relate to user interface, includes audit trails, password security, data security, and encryption (Shelly & Rosenblatt, 2012). It is vital a company should take all needed measures to protect its data, which include customer, employees, and suppliers. Most assets have a value, but corporate data is priceless, because without safe, secure, accurate data, a company cannot function. (Shelly & Rosenblatt, 2012).…

    • 1029 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Hunton, J. E. (2004). Core concepts of Information Technology auditing. In (Ed.), Information Technology auditing (pp. 341-372). Retrieved from University of Phoenix eBook Collection Database.…

    • 2536 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    U23 A2

    • 742 Words
    • 2 Pages

    Human computer interaction can be very influential on our society, economy and culture. However for this to happen it has to be of an adequate level, a level capable of making an impact. To achieve this, developers of HCI platforms ensure that they stick to the fundamental principles of HCI design. In the first part of this report I will be illustrating the fundamental principles of design.…

    • 742 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Input Controls

    • 1669 Words
    • 7 Pages

    There are many kinds of input controls. Write a 4-5 page paper in which you:…

    • 1669 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Excel Evaluation

    • 921 Words
    • 4 Pages

    Data validation is a tool on excel which makes it possible to control the values input into a given cell. I used this tool to prevent negative numbers entering into the duration column of my COST worksheet. I think I used this tool effectively because if negative number is input, an error alert message appears informing the user of their mistake, therefore increasing the reliability of the data. This is shown in the image below.…

    • 921 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Modern data processing systems pose new, risk-laden challenges to the traditional audit process. Whereas it was once possible to conduct a financial statement audit by assessing and monitoring the controls over paper-based transaction and accounting systems, businesses have increasingly turned to electronic transaction and accounting systems. SAS 94 offers guidance on collecting sufficient, competent evidence in an electronic processing environment. It pays particular attention to identifying circumstances when the system of control over electronic processing must be accessed.…

    • 2188 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Usability Plan

    • 2428 Words
    • 10 Pages

    This information was developed by Usability & Technical Documentation, Xerox Corporation, and was compiled for the UPA Conference, July 1995 Page 1…

    • 2428 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Hci Website Design

    • 5259 Words
    • 22 Pages

    Bibliography: • Jeffries, R., Miller, J. R., Wharton, C., and Uyeda, K. M. 1991. User interface evaluation in the real world: A comparison of four techniques. Proceedings ACM CHI '91 Conference (New Orleans, LA, April 28-May 2), 119-124.…

    • 5259 Words
    • 22 Pages
    Good Essays
  • Better Essays

    Within this initial literature review I have looked at a number of books and websites that I feel would help me in findings definitions for all usability features. I also looked at what applications use Virtual Reality, Human Computer Interaction and Graphical User Interface.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Input and Output Devices

    • 2370 Words
    • 10 Pages

    Note that the designation of a device as either input or output depends on the perspective. Mouse and keyboards take as input physical movement that the human user outputs and convert it into signals that a computer can understand. The output from these devices is input for the computer. Similarly, printers and monitors take as input signals that a computer outputs. They then convert these signals into representations that human users can see or read. For a human user the process of reading or seeing these representations is receiving input. These interactions between computers and humans is studied in a field called human–computer interaction.…

    • 2370 Words
    • 10 Pages
    Powerful Essays