ACC 321 Flashcards
Value system level model
Vendors, distributors, retailers, customers (supply chain partners)
Value chain model
Processes and their systems within a company
REA Model (business porocess model)
Rea model for sub-system
Flowchart (task level model)
Specific tasks performed by specific individuals within sub-systems
Business process
A set of activities that takes one or more inputs and creates an output that is of value to the customer
Value chain
Is a purposeful network of business processes that asemble the individual compnents into a final product that has value to the customer
Core business processes
Revenue cycle, expenditure cycle, production cycle, payroll cycle, finanacing cycle
Four major steps in data processing
Data input, data storage, data processing, info output
Master file
Stores cumulatice info about an organizations entities
Transaction file
Contains records of individual events that occur dirinf a fiscal period
Three main types of outputs
Documents reports queries
Documents
Records of transactions or other company data printed or stored
Reports
Documents that are used by employees to control operational activities and make decisions
Queries
User request for specific pieces of information
Different types of business enterprise risk
Economy, industry, enterprise, business process, accounting info systme
Economic risk
Industry, economy, competitor, legal, regulatory, change, treasury, credit, trading
Industry risk
Competitive, customers needs/wants, revolutionary product development
Enterprise risk
Reputation, stragegic focus, parent company support, patent protection, employee turnover, training
Operational risk
Operational and compliance
Accounting information system risks
Financial, operational, and technology
Enterprise risk management
Identifyinf, assessing and mitigating riaks for better business performance
Sas #99
Auditors responsibility to detect fraud
Sox
Ceo and cfo must certify quarterly and annual financial statements. Have to have internal control report
The fraud triangle
Three conditions that are present when fraud occurs. Pressure, opportunity, and rationalization
Fraud tree
Corruption, asset misappropriation, and financial statement fraud
Frequency of fraud
Asset misappropriation happens the most then corruption then financial statement
Financial loss associated with fraud
Financial statement highest, then corruption then asset
Initial detection of fraud
Tip is the most way we find out
Three objectives of coso
Operations, reporting, and compliance
Four compnay units of coso
Entity, division, operating unit, function
Five risk and control components
Control enviornment, risk assesment, control activities, info and comminication, monitoring activities
Control enviornment
Demonstrates commitment to integrity and ethical values, exercises oversight responsibily, establishes structure authority abd responsibility demonstrates commitment to competence enforces accountablilty
Risk assesment
Specifies relevant objectives, identifies and analyses risk, assesses fraud risk, identifies and analyzes significant change
Likelihood
The probablility that the threat will occur
Exposure (impact)
The potential dollar loss
What happens if either likelihood or impact increases?
The materiality of the event and the need to protect against it rises
Four risk reponses
Reduce, avoid, share, accept
Reduce
Implement an effective system of internal controls
Avoid
Do not engage in any activities that produce risk
Share
Transfer some of the risk to others via insurance
Accept
Do not avoid reduce or share
Inherent risk
The risk that exsist before management takes any response
Residual risk
The risk that remains after management implements internal controls or some other risk response
Control activities
Selects and develops control activities, selects and develops general controls over technology, develops through policies and procedures
Information and communication
Uses relevant info, comminicated internally, communicates externally
Monitoring
Conducts ongoing and separate evaluations, evaluates and comminicated deficienties. Must be monitored on ongoing basis and change when needed
Cybersecurity information sharing act of 2015
Companies must let everyone know when there has been a breach
Organized crime motive
Immediate financial gain, collect info for future gain