Accounting Information Systems
11th Edition
ISBN: 9780357156032
Author: Ulric J. Gelinas; Richard B. Dull; Patrick Wheeler
Publisher: Cengage Limited
expand_more
expand_more
format_list_bulleted
Question
Chapter 14, Problem 3SP
Summary Introduction
To match: The process failures with the control plans.
Introduction:
Human resource (HR) management and Payroll process:
Human resource management is about the basic human management functions in an organization and its associated activities. It also speaks about the relationship between human resource management activities and the payroll process. It also depicts the importance of HR activities in the decision making of the top management.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
The following is a list of six control plans.These are followed by a list of five system failures that have control implications. Match the five system failures with a control plan that would best prevent the system failure from occurring. Also, give a brief (one or two sentences) explanation of your choice. A letter should be used only once, with one letter left over.
Control Plans
Program change controls
Independent validation of vendor invoices
Access control software
Batch control plans
Compare input data with master data (e.g., vendor master data)
Match invoice, PO, and receipt
System Failures
Vendor Invoices are received at Samuel Company via an EDI feed over the Internet. Some of these are fraudulent invoices from bogus vendors.
Vendor invoices are sent to clerks in the AP department at Seneca, Inc., where they are entered once each day to create a file of invoice data that is then processed by the accounts payable program each evening. Several errors have been found in the…
Following is a list of eight generic control goals (A-H), followed by eight descriptions of either process failures (i.e., control goals not met) or instances of successful control plans (i.e., plans that helped to achieve controls goals).
List the numbers 1 through 8 in the table below. Each number represents one of the described situations on the page below. In the table, next to each number, place the capital letter of the control goal that best matches the situation described.
Hint: Some letters may be used more than once in each situation. Conversely, some letters may not be used at all.
Control goals:
Ensure effectiveness of operations
Ensure efficient employment of resources
Ensure security of resources
Ensure input validity
Ensure input completeness
Ensure input accuracy
Ensure update completeness
Ensure update accuracy
Situations:
Instead of preparing deposit slips by hand, Kaley Company has them generated by the computer. The company does so to speed up the deposit…
The following is a list of 12 control plans from Chapter 8. These are followed by a list of 10 B/AR/CR business process controls or deficiencies. Match the 10 B/AR/CR business process control plans with a pervasive control plan from Chapter 8 that could prevent the deficiencies noted in the preceding list or have an impact on the successful execution of the business process control. Explain the impact that the pervasive control could have.
Control Plans from Chapter 8
Access control software (i.e., assignment of access rights to employees)
Selection, hiring, and supervision of billing clerks to ensure that they can and do carry out their assigned responsibilities
Physical controls for perimeter, building, and computer facilities to prevent loss or destruction of the computer resources
Preventive maintenance of computer hardware to ensure reliability and availability
Systems development life cycle (SDLC), including testing and approval before implementation of new or revised programs…
Chapter 14 Solutions
Accounting Information Systems
Ch. 14 - What is human capital management (HCM)?Ch. 14 - What does human capital include?Ch. 14 - What is the human resources management process?...Ch. 14 - Prob. 4RQCh. 14 - Prob. 5RQCh. 14 - What role does each HR manager listed in Figure...Ch. 14 - What key decisions do the HR managers shown in...Ch. 14 - Prob. 8RQCh. 14 - Prob. 9RQCh. 14 - Prob. 10RQ
Ch. 14 - Prob. 11RQCh. 14 - Prob. 12RQCh. 14 - Prob. 13RQCh. 14 - Prob. 14RQCh. 14 - Prob. 15RQCh. 14 - Prob. 16RQCh. 14 - Prob. 17RQCh. 14 - Prob. 1DQCh. 14 - Prob. 2DQCh. 14 - Discuss the role unions and government agencies...Ch. 14 - Prob. 4DQCh. 14 - Prob. 5DQCh. 14 - In this chapter, we stated that many organizations...Ch. 14 - Prob. 3SPCh. 14 - Prob. 4SPCh. 14 - Prob. 5SPCh. 14 - Prob. 6SPCh. 14 - Prob. 6PCh. 14 - Prob. 7P
Knowledge Booster
Similar questions
- The following is a list of 12 control plans from Chapter 8. These are followed by a list of 10 B/AR/CR business process controls or deficiencies. Match the 10 B/AR/CR business process control plans with a pervasive control plan from Chapter 8 that could prevent the deficiencies noted in the preceding list or have an impact on the successful execution of the business process control. Explain the impact that the pervasive control could have. Control Plans from Chapter 8 Access control software (i.e., assignment of access rights to employees) Selection, hiring, and supervision of billing clerks to ensure that they can and do carry out their assigned responsibilities Physical controls for perimeter, building, and computer facilities to prevent loss or destruction of the computer resources Preventive maintenance of computer hardware to ensure reliability and availability Systems development life cycle (SDLC), including testing and approval before implementation of new or revised programs…arrow_forwardListed here are 20 control plans discussed in the chapter. On the blank line to the left of each control plan, insert a P (preventive), D (detective), or C (corrective) to classify that control most accurately. If you think that more than one code could apply to a particular plan, insert all appropriate codes and briefly explain your answer:arrow_forwardImagine that you realize that the firm you are working for does not have good documentation for its current AIS. You recommend that some system documentation be prepared to assist in developing the AS-IS model of the current system. Of the various documentation techniques covered this week, which ones do you recommend and which would you not recommend? Why?arrow_forward
- i need the answer quicklyarrow_forwardListed here are four scenarios. For each scenario, discuss the potential consequences and give a prevention technique. a) A company has recently installed a new computer network. The operating philosophy adopted by the new network administrator was to establish an open system that would foster work group date to the network users. To accomplish this objective, the data administrator assigned employee access privileges to data based on department and functional affiliation rather than specific tasks. b) Sara is a system programmer who was told she would be terminated in three weeks due to poor performance and was asked to conclude all of her projects during the three-week period. Two weeks later Sara created a logic bomb designed to get activated three months after her departure. Subsequently, the bomb destroyed hundreds of records in her previous employer’s accounts receivable invoice file. c) Matt discovered a new sensitivity analysis public-domain program on the Internet. He…arrow_forwardWhich of the following controls would most effectively minimize the need to correct failures to collect required information in the account opening process? A quality review staff that checks paper applications to ensure all fields are complete An automated account opening platform that required data entry prior to allowing the accoun to be opened Requiring that a manager review and apprive all new account applications Documenting a procedure that sets forth the steps required to open an accountarrow_forward
- Consider the following dialogue between a systems professional, Joe Pugh, and a manager of a department tar- geted for a new information system, Lars Meyer:Pugh: The way to go about the analysis is to first examine the old system, such as reviewing key documents and observing the workers performing their tasks. Then we can determine which aspects are working well and which should be preserved. Meyer: We have been through these types of projects before and what always ends up happening is that we do not get the new system we are promised; we get a modified version of the old system.Pugh: Well, I can assure you that will not happen this time. We just want a thorough understanding of what is working well and what is not.Meyer: I would feel much more comfortable if we first started with a list of our requirements. We should spend some time up front determining exactly what we want the system to do for my department. Then, you systems people can come in and determine what portions to…arrow_forwardMatch the two lists, below, by placing the capital letter from List 1 in each of the cells preceding the five descriptions in List 2 to which they best relate. One description in List 2 can be answered with 2 matches from List 1. Therefore, you should have 2 letters left over from List 1. List 1: Concepts A. Application (i.e., automated) control. B. Corrective control. C. Control environment. D. Input validity. E. Input completeness. F. Input accuracy G. Update completeness. H. Efficient use of resources. List 1: Capital letter List 2: Definitions/Descriptions 1. Insurance policy reimburses a company for losses due to a fire in a warehouse. 2. Shipping notices have a serial number that is tracked to ensure that they are all input. 3. Computer reviews each input to ensure that all the required data are included. 4. Inventory movements are tracked with a scanner to reduce manual counting. 5. Purchase orders are signed to approve the purchase.arrow_forwardWhich of the following is NOT an example of application control?* a. Pre-filled forms are already sent to users to minimize input errors b. After processing, the daily sales summary are reconciled with the individual sales invoices processed c. Reasonableness tests on acceptable working hours are embedded in the payroll software d. An equipment failure causes an error message on the monitorarrow_forward
- Which of the following is a component of general controls? a. processing controls b. output controls c. back-up and contingency planning d. input controls Required: choose the correct answer and Justify your answers in at least 6 sentences.arrow_forwardThe following is a list of six control plans from this chapter or from Chapter 9 and Chapter 10. These are followed by a list of five statements describing either the achievement of a control goal (i.e., a system success) or a system deficiency (i.e., a system failure). Match the five control goals or system deficiencies with a control plan that would best achieve the desired goal or prevent the system deficiency. A letter may be used only once, with one letter left over. Control Plans Review shipped not billed sales orders Turnaround documents Deposit slip file Procedures for rejected inputs Computer agreement of batch totals Document design Control Goals or System Deficiencies The shipping clerk could not read the quantity picked that had been written on the picking ticket by the warehouse clerks. In a periodic/batch environment, helps to ensure the information system control goal of input completeness of the shipping notices. Helps to ensure that…arrow_forwardhas hired you to review its sales order procedures for internal control compliance and to make recommendations for changes. You are required to:a. Create a data flow diagram of the current system. b. Create a system flowchart of the existing system. c. Analyze the internal control weaknesses in the system. ; andd. Prepare a system flowchart of a redesigned computer-based systemarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE LExcel Applications for Accounting PrinciplesAccountingISBN:9781111581565Author:Gaylord N. SmithPublisher:Cengage LearningAuditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Excel Applications for Accounting Principles
Accounting
ISBN:9781111581565
Author:Gaylord N. Smith
Publisher:Cengage Learning
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning