Preview

Paper About Accounting

Good Essays
Open Document
Open Document
769 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Paper About Accounting
Chapter 1 Problem # 1 a. The purpose of transaction authorization is to ensure that all material transactions processed by the information system are valid and in accordance with management’s objectives. No transaction shall occur unless it is authorized. Authorizations may be general or specific. General authority is granted to operations personnel to perform day-to-day activities. It rules specified in advance. Specific Authorizations deal with case by case decisions associated with nonroutine transactions. However, in IT environment authorization may be imbedded in the coded program logic in a module and take place without visibility. Unauthorized transactions may not be noticed until well after the fact. b. In segregation of duties, authorization must be separated from transaction processing. Some certain duties that are deemed incompatible in a manual system may be combined in an IT environment. Due to automation, incompatible “duties” may all reside in a single computer program or application. Computer has no motivation to circumvent controls and does not make mistakes due to human weaknesses. Humans do the circumventing and make the mistakes. In IT environment, must “separate” humans that create programs which do authorizing from humans that run the programs that do processing. c. In accounting records, the source documents, journals, and ledgers that capture the economic essence of transactions and provide audit trail of economic events. Organizations must maintain audit trails for two reasons. First, this information is needed for conducting day to day operations. Second, the audit trail plays an essential role in the financial audit of the firm. Allow auditors to trace transactions from original sources to financial statements. In IT environment, no physical source documents – data in digital form. Audit trail consists of pointers, hashing, indexes, embedded keys, etc. in database tables. Logs recording processing are essential. d.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    a) Authorization is the process of determining whether an entity, once authenticated, is permitted to access a specific asset.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    3220 final review

    • 655 Words
    • 4 Pages

    7. Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of what? 9…

    • 655 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Accounting Chapter 1

    • 521 Words
    • 3 Pages

    An association of two or more persons to carry on as co-owners of a business for profit.…

    • 521 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Kudler Security Report

    • 8349 Words
    • 34 Pages

    8. Access control: Focuses on business requirement for access control, user access management, user responsibilities, network access control, operating system access control, application and information access control, and mobile computing and teleworking…

    • 8349 Words
    • 34 Pages
    Powerful Essays
  • Satisfactory Essays

    -Subpart B. Unauthorized use. Users must abide by the security restrictions on all systems and information to which access is authorized.…

    • 477 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The purpose of this paper is to review, compare, and show the contrast between the two accounting standard boards; Governmental Accounting Standards Board (GASB), and the Financial Accounting Standards Board (FASB). The objectives of both Boards will be discussed as well as similarities and differences with each. The topic will then review modified accrual basis of accounting and how it differs from full accrual accounting.…

    • 704 Words
    • 3 Pages
    Good Essays
  • Good Essays

    John Petersen’s article, “Accounting 101 For The 21 ST Century: A Liberal Arts Education in Carbon,” brought out some prevalent points in regards to the way society has forgotten to properly educate young adults in the area of finance. I agree, “Recent graduates have a lot to learn about budgeting when they leave college” (Petersen 475). College students have to be responsible and learn to only purchase the things that they need instead of buying the things they want. Most students are just getting out on their own, and making financial decisions, but they should be learning how to balance a checkbook. Instead, many of them open credit card accounts, except student loans and find themselves in the negative.…

    • 341 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Describe how and why discretionary access control will be used. Include an explanation of how the principle of least privilege applies to assure…

    • 838 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Input Controls

    • 1029 Words
    • 5 Pages

    Audit trail keeps a record of every piece of data item and when it entered the system. In addition to recording the original the source, an audit trail must show how and when data is accessed or changed, and by whom (Shelly & Rosenblatt, 2012). Companies will benefit having an audit trail as it provide documentation of all documents received and pass between departments. The following will give examples of audit trails input controls:…

    • 1029 Words
    • 5 Pages
    Better Essays
  • Good Essays

    McBride Financial Services in its effort to control data access must emphasize on the need for all networking administrators to carefully restrict employee’s data access privilege, based on the role each employee is assigned within the organization. It is essential for the company to outline in its Business Requirement Document (BRD) the need for each employee to be assigned specific separating duties, and that a Networking Requirements Document (NRD) is used to capture and define the names, department, privileges and roles to be assigned to each employee (user).…

    • 1172 Words
    • 4 Pages
    Good Essays
  • Better Essays

    At the same time separations of duty limitations have been composed into an information system, users are looking for ways around the access authorizations because of pressure. In large organizations it is the role of the auditor to detect these intervals of control but often this is an unattainable assignment. Whenever it is difficult to segregate, other devices such as monitoring of activities, audit trails should be anticipated. It is important that security audit stays impartial.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    In order to attract and retain younger generations, employers must increase flexible work arrangements and work-at-home options. The profession must continue to support and enhance programs that build awareness of the CPA profession to young audiences.…

    • 718 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    If one is investing in a particular company he or she definitely wants to see a return on their investments. Asset turnover or return on assets is the net income divided by the average assets of a company in this case it is Landry’s restaurant. In the equation that was done it was determined there was a sharp increase in asset turnover from the years 2002 to 2003.…

    • 1165 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    As you all know we recently started a new business, and here are some of the obstacles and challenges we encountered. The theme of this year’s annual report, “Bold Moves, Great Future,” could also accurately describe our future. The Pump Up brand of energy drinks continued to gain market share up to date, and continues to exceed the growth in sales of the energy drink category. The energy drink category itself has continued to grow at an extremely high rate. Gross sales of all of our products and the percentage of total gross sales, grew and continues to grow.…

    • 942 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Give examples of confidentiality, integrity, and availability requirements associated with the system and, in each case, indicate the degree of importance of the requirement..…

    • 790 Words
    • 4 Pages
    Good Essays