Chapter 5: The Expenditure Cycle

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

risks of EDI technology

1) ensuring only valid transactions are processed 2) trading partner will access the accounting records in a way that is unauthorized by the trading partner agreement

objectives of physical systems

1) illustrate AIS functionality and work flow patterns under different levels of technology 2) demonstrate how the internal control profile changes as technology/human mix changes

Primary risks associated with expenditure cycle transactions

1) unauthorized inventory purchase 2) receiving the wrong items, incorrect quantities, or damaged goods 3) inaccurately recording purchases and cash disbursement transactions in journals and accounts 4) misappropriation of cash and inventory 5) unauthorized access to accounting records and confidential records

controls: Risk of misappropriation of cash and inventory

Supervision: inadequate supervision can create and environment conducive to the theft of inventories in transit independent verification: three-way match of the purchasing order, the receiving report, and the supplier's invoice segregation of duties--inventory control from the inventory warehouse: physical custody of inventory must be separate from recording inventory segregation of duties--accounts payable from cash disbursements: writing and recording checks MUST be separate automated three-way match and payment approval: multilevel security: allows multiple individuals to simultaneously access a system but provides segregation of duties to limit access privileges

internal controls: Risk of unauthorized inventory purchases

Transaction authorization: ensure that only valid transactions are processed Automated purchase approval: to prevent unauthorized purchases from unapproved vendors (lists of approved vendors, passwords, encryptions, overrides)

controls: Risk of unauthorized access to accounting records and reports

access control: limiting access to documents that control physical assets segregation of duties: record-keeping tasks such as the subsidiary ledgers, journals, and general journals must be kept separate (collusion must only be possible through two or more individuals in dissimilar responsibilities password control: password control policy multi-level security: limiting access privileges

Risk of unauthorized access to accounting records and reports

accounting information is at risk due to 1) attempts to perpetrate vendor fraud 2) theft of physical inventory: access to inventory records allows the perpetrator to conceal the theft 3) malicious acts such as corrupting or deleting financial data

physical phase

acquisition of the physical resource

check register

also known as the cash disbursements journal

vouchers payable system

an alternative to the AP procedures AP department uses cash disbursement vouchers and maintains a voucher register vouchers provide improved control over cash disbursements and allow firms to consolidate several payments to the same supplier on a single voucher (reducing number of checks written)

standard cost system

carry their inventories at a predetermined standard value regardless of the price actually paid to the vendor

Basic technology: expenditure cycle

computers in the system are independent firm relies on communication through physical documentation, which are key for the audit trail

blind copy

contains no quality or price information about the products being received. The purpose of the blind copy is to force the receiving clerk to count and inspect inventories prior to completing the receiving report important control to reduce risk. many people are so flustered with receiving they neglect to count

supplier invoice

contains the financial information needed to record the action (must recognize as a liability until the invoice arrives)

purpose of physical controls

control the actions of people AASSIT access controls accounting records segregation of duties supervision independent verification transaction authorization

EDI technology

devised to expedite routine transaction processing between manufacturers, wholesalers, and retailers by connecting buyer and seller computers via a private network or the internet implementation of a trading partner agreement to eliminate the discrepancies that require human involvement to solve level of personnel needed decreases

financial phase

disbursement of cash

risk of inaccurately recording transactions in journals and ledgers

examples include: purchases from vendors being incorrectly stated accounts payable go unrecorded or recorded in the incorrect period vendor bills customers for items they did not receive

Risk of receiving incorrect items, quantities or damaged goods

failure to inspect, count large quantities of valuable assets that arrive from vendors places the firm at risk

physical model

how something is accomplished every business has a different _____________ model

purchases procedures

include the tasks involved in identifying inventory needs, placing the order, receiving the inventory, and recognizing the liability (applies both to manufacturing and retailing firms

internal controls: Risk of receiving incorrect items, quantities or damaged goods

independent verification: the receiving clerk receives a blind copy of the PO from purchasing , physical count and inspection of goods supervision: critical to ensure that the clerks are properly carrying out important duties (supervisor must take custody of packing slips and receiving clerks should count and inspect goods) scanner technology: reduce the risk of human error in receiving and storing incorrect products

computer application controls

input controls, processing controls, output controls

advanced technology: expenditure cycle

integrates accounting and other business functions through a common information system: operational performance increases and costs decrease

valid vendor file

name and address of the primary supplier, the economic order quantity, and the standard or expected unit cost of the item allows to deal with routine purchases as efficiently as good control permits and to devote primary efforts to nonroutine problems ensure coming from authorized vendors

Risk of misappropriation of cash and inventory

possibility of fraudulent payments to individuals posing as vendors or erroneous payments for items not ordered or not received

purchase requisition

prepare purchase order function to initiate purchase process

the cash disbursements system

processes the payment of obligations created in the purchases system

supplier's invoice

provides the financial information needed to record the obligation as an accounts payable

AP packet

reconciled AP supporting documents (PO, receiving report, and invoice)

voucher register

reflects the AP liability of the firm: the sum of the unpaid vouchers in the register is the firm's total AP balance

Purchasing order

shows that the purchasing agent ordered only the needed inventories from a valid vendor

receiving report

states the quantity and condition of the inventories proves legitimate obligation to pay four copies: 1) raw materials (physical assets) 2) open/closed PO 3) set up account payable function (AP pending file) 4) receiving report file

objective of expenditure cycle

to convert the organization's cash into the physical materials and human resources it needs to conduct business

objective of cash disbursements system

to ensure that only valid creditors receive payment and that the amounts paid are timely and correct paid early: loses out on interest income paid late: bad credit

objective of internal control

to mitigate the risk from errors and fraud

controls: risk of inaccurately recording transactions in journals and ledgers

transaction authorization: to provide effective control over the flow of cash from the firm, the cash disbursement function should not write checks without this explicit authorization accounting records: to maintain an audit trail adequate for tracing a transaction from its source documents to financial statements independent verification: general ledger function provides an important step in the system because it verifies that the total obligations recorded equal the total inventories received and that the total reductions in AP equal the total disbursement of cash Input data edits: edits that focus on the integrity of transaction data being entered (controls including checks for missing data, check digit control will provide control over accessing the wrong accounts) error messages: mismatched conditions produce error messages automated postings to subsidiary and GL accounts: eliminate human element to reduce likelihood of fraud file backup: to attack against physical loss, corruption or destruction of source documents KEY accounts: AP subsidiary ledger, check register, general ledger

three way match

verifies what is ordered was received and is fairly priced

conceptual model

what needs to be done; is intended to be technology-neutral (can be performed manually or automated via technology) using physical hard copies or digital computer produced documents. businesses may have similar __________ models

Risk of unauthorized inventory purchases

what to buy, when to buy, and whom to buy from excessive inventories tie up cash reserves and stock outs prevent sales and lead to manufacturing delays


Set pelajaran terkait

Psychosocial Mental Health Review Ch. 15-- Leik Content

View Set

Info and Network Security Chapter 14

View Set

Micro Chapter 9 - Quiz and Homework Questions

View Set

POLS 2306 - TX Gov - CH 12 Criminal Justice Policy in Texas

View Set

MCAT - CARS (Critical Analysis & Reasoning Skills)

View Set

A Tale of Two Cities Book the Third Quotes

View Set

J1100 Final Review (tests 1+2 answers)

View Set