Page 220 - Accounting Information Systems
P. 220

CHAPT E R 4        The Revenue Cycle  191

                       Segregation of Duties
                       PC systems tend to have inadequate segregation of duties. A single employee may be responsible for
                       entering all transaction data, including sales orders, cash receipts, invoices, and disbursements. In a man-
                       ual system, this degree of authority would be similar to assigning accounts receivable, accounts payable,
                       cash receipts, and cash disbursements responsibilities to the same person. The exposure is compounded
                       when the individual is also responsible for programming or tailoring the application he or she runs.
                         Often little can be done in small companies to avoid such conflicts of duties. Controlling the PC envi-
                       ronment requires a high degree of supervision, adequate management reports (such as detailed listings of
                       all transactions), and frequent independent verification. For example, the supervisor should reconcile
                       daily transaction details with the affected subsidiary and control accounts.

                       Access Control
                       PC systems generally provide inadequate control over access to data files. Although some applications
                       achieve modest security through password control to files, accessing data files directly via the operating
                       system can often circumvent this control. Solutions for dealing with the problem include data encryption,
                       disk locks, and physical security devices.

                       Accounting Records
                       Data losses that threaten accounting records and audit trails plague the PC environment. Computer disk
                       failure is the primary cause of data loss. When this happens, recovery of data stored on the disk may be
                       impossible. Formal procedures for creating backup copies of data files and programs can reduce this
                       threat considerably. In the mainframe environment, backup is provided automatically. Backup of PC data
                       files relies on a conscious action by the users, who too often fail to appreciate its importance.







                       Summary


                       This chapter examined conceptually the revenue cycle of a  achieve competitive advantage by improving operational effec-
                       typical merchandising firm and focused on the following areas:  tiveness. We then turned to control issues in the digital envi-
                       (1) the functional areas and the flow of transaction informa-  ronment and found that computer processing consolidates
                       tion that triggers key tasks; (2) the documents, journals, and  many tasks, thus removing some traditional segregation of
                       accounts that support audit trails, decision making, and finan-  duties. The integrity of the computer programs that now per-
                       cial reporting; and (3) the exposure to risks in the revenue  form these tasks becomes a matter of great concern to the
                       cycle and the control techniques that reduce them.  organization. Similarly, organization management must control
                         The chapter examined the operational and control implica-  access to digital accounting files and ensure that adequate
                       tions of different degrees of technology. First, we examined  backup procedures are in place.
                       the manual system depicting people, organizational units, and  Finally, the chapter dealt with the subject of PC accounting
                       physical documents and files. The purpose of this was to help  systems. The modular design of these systems allows users to
                       the reader envision the segregation of duties and independent  tailor the system to their specific needs. This feature has
                       verifications, which are essential to effective internal control  resulted in a tremendous growth in end-user computing that
                       regardless of the technology in place. In the process, we high-  is changing the way many organizations do business. The PC
                       lighted inefficiencies intrinsic to manual systems, which gave  environment poses some unique exposures that accountants
                       rise to modern systems using improved technologies and  must recognize. Three of the most serious exposures are
                       techniques.                                    (1) the lack of properly segregated duties, (2) PC-operating
                         Next we examined automated data processing techniques.  systems that do not have the sophistication of mainframes
                       Even though these systems improve record-keeping efficiency  and expose data to unauthorized access, and (3) computer
                       and effectiveness, they do little to advance an organization’s  failures and inadequate backup procedures that rely too
                       business strategy. We then examined reengineered systems.  heavily on human intervention and thus threaten the security
                       This involves rethinking traditional business approaches to  of accounting records.
   215   216   217   218   219   220   221   222   223   224   225