Internal Control Weakness in Bell Studio's Accounting System
Verified
Added on  2023/03/17
|11
|3047
|65
AI Summary
This report discusses the internal control weakness in the accounting system of Bell Studio, a supplier of art materials. It examines the weaknesses in the purchasing, cash disbursement, and payroll systems, and identifies the associated risks. Mitigation strategies are also discussed.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: STRATEGIC INFORMATION SYSTEMS Strategic Information Systems Name of Student- Name of University- Author’s Note-
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1STRATEGIC INFORMATION SYSTEMS Executive Summary This below discussed report consists of the working accounting process of the Bell Studio. The Bell Studio consist of three different system that are explained in this report related to the accounting system in the organization. Each of the processes are explained in this report and states the internal control weakness that each of the system processes in the organization. The internal control weakness of all the systems are described in this system describing their mitigation process in the system.All the mitigation processes are explained in this report.
2STRATEGIC INFORMATION SYSTEMS Table of Contents Introduction...................................................................................................................3 Data flow Diagram of Purchase and Cash Disbursement System...............................3 Data flow Diagram of Payroll System...........................................................................3 System Flowchart of System........................................................................................3 System Flowchart of Cash Disbursement system........................................................3 System Flowchart of Payroll System............................................................................3 Internal Control Weakness and Risks Associated.......................................................3 Conclusion....................................................................................................................3
3STRATEGIC INFORMATION SYSTEMS Introduction The background of the Bell Studio is taken in this report as case study. This studio deals as a supplier of art materials. For conducting its processes, Bell Studio has transaction cycles in which the vendors and the suppliers of the company are paid for their supplies. The organization is an Adelaide based company of art supplies. The manufacturers of the company are from different locations. The company mainly has an accounting system that is centralized at all the location of Bell Studio. The expenditure of the Bell Studio has different procedures such as purchasing system, Cash disbursement system, and Payroll System. This report describes different transaction cycles of the Bell Studio, the financial; reporting system carried out in Bell Studio and the management system of the organization. As the system of the Bell studio is based on the computer-based system, there is a need to include many control processes that are to be included to overcome the weakness of the current ERP system in the organization. This report defines all such internal weakness of the system and states the steps that are to be taken to overcome those problems. Data flow Diagram of Purchase and Cash Disbursement System Figure 1: Data Flow Diagram (Source: Created By author)
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4STRATEGIC INFORMATION SYSTEMS Data flow Diagram of Payroll System Figure 2: Data Flow Diagram (Source: Created By author) Description: The DFDs shown above are the purchasing system of Bell Studio about how they purchases materials from the different manufacturers. The data flow of the cash disbursement is also shown in this report that show the disbursement of cash to the vendors and the third system whose data flow is sown in the report is the payroll system by which the employees are paid. In the purchasing system and the cash disbursement system, there are processes,databasestoreandtheinput/outputprocessesthatdescribesthe purchasing system and the cash disbursement system of the Bell Studio. According to the diagram, the clerk responsible for purchasing first checks the inventory and if the inventory needs to be refilled, the clerk picks up a supplier from the supplier database and place the order through mail. Again when the materials comes from the supplier at the receiving center. The receiving clerk checks the supplier invoice and the purchasing receipt and forwards the receipt to the cash disbursement department for paying the cheque to the supplier. Theseconds diagram showstheworkingprocess ofthepayrollsystem carried out in Bell Studio. The working process of the purchasing system starts with the checking the time card of the employees and when the time card is checked, the time is entered in the record book and cheque is forwarded to the supervisors for the distribution. The cheque is also forwarded to the bank with the total amount of payroll
5STRATEGIC INFORMATION SYSTEMS thatistobegiventotheemployees.Thechequethatissenttotheledger department for their sign and is then sent to the bank in their imperest account. System Flowchart of Purchasing System Figure 3: System Flowchart (Source: Created By author) System Flowchart of Cash Disbursement system Figure 4: System Flowchart (Source: Created By author)
6STRATEGIC INFORMATION SYSTEMS System Flowchart of Payroll System Figure 5: System Flowchart (Source: Created By author) Description: The flowchart of the systems are shown in the diagram above. The system flowchart includes three systems of the Bell Studio that is carried out in the account system. Figure 3 shows the system flowchart of the purchasing system, figure 4 shows the system flowchart of the cash disbursement system and the figure 5 shows the system flowchart of the payroll system. The purchasing system is shown by the procedure of the system and the decision is shown in a decision box in the diagram. In the purchasing system, decision is taken whether to place an order with the suppliers. If the inventory is empty, then only the system will proceed. All the details of the procedures of the purchasing system are shown in diagram. The cash disbursement shows all the procedures that are taken to make payment to the suppliers of the system. The payment is made through cheque and are sent to the suppliers through email. The thirds diagram in this report depicts the payroll system about how the employees are being paid from the company. The system states the payroll system about the procedure that is undertaken to pay the employees associated with the operation of the business. The employees are also paid through cheques after verifying their time cards which shows their working hours in office. The payroll system includes sending the payroll cheque to the bank’s imperest account so that the employees are able to withdraw their salary from the bank.The treasurer of account payable department signs the cheque and sends to the bank. Internal Control Weakness and Risks Associated Internal control Weakness of Purchasing department: 1.The first weakness of the purchasing department is occurring of data breach in the system (Wellin 2016). When the purchasing system is being carried out in the system, all the related data are stored in the centralized system. There
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7STRATEGIC INFORMATION SYSTEMS is a risk of getting data breach in the system when the data is uploaded in the cloud. 2.All the data are stored in the computer centralized system and that is an internal flow in the system. There might be problem of dealing with the computers in the system. 3.While recording the data in the centralized system, the information or the data uploadedmightbeincorrectinformation.Theclerkmightuploadthe information mistakenly in the system. Risks Associated with purchasing system: 1.Potential Fraud: The first risk that is associated with the purchasing system is thepotentialfraudrisks.Thecentralizedsystemisdependentonthe computers and that might lead to large problems in Bell Studio. Storing all the data on the cloud of the accounting centralized system, there is a risk of hacking the financial data of the system. 2.TechnicalRisks:theremightbeseveralissueswhiledealingwiththe computer systems. While uploading the purchasing receipt or the invoice in the system, there might be power outage in the organization (Quirke 2017). There might be computer virus and computer might stop working because of the virus. 3.Incorrect information: There might be a risk of uploading incorrect information in the system as there is clerk has the responsibility to all those works. It is human error and human error might occur accidently in the system. Internal control Weakness of Cash disbursement system: 1.The weakness of the cash disbursement department is occurring of data breach in the system. When the cash disbursement department is being carried out in the system, all the related data are stored in the centralized system (Woerkomet al.2016). There is a risk of getting data breach in the system when the data is uploaded in the cloud. 2.All the data are stored in the computer centralized system and that is an internal flow in the system. There might be problem of dealing with the computers in the system. 3.While recording the data in the centralized system, the information or the data uploadedmightbeincorrectinformation.Theclerkmightuploadthe information mistakenly in the system. Risks Associated with cash disbursement system: 1.System Crash: The first risk that is associated with the cash disbursement system is the potential fraud risks (Upward and Jones 2016). The centralized system is dependent on the computers and that might lead to large problems in Bell Studio. Storing all the data on the cloud of the accounting centralized system, there is a risk of hacking the financial data of the system. 2.MaliciousHacks:theremightbeseveralissueswhiledealingwiththe computer systems (Thompson 2017). While uploading the purchasing receipt or the invoice in the system, there might be power outage in the organization. There might be computer virus and computer might stop working because of the virus. 3.Reducingphysicalaudits:Theremightbeariskofuploadingincorrect information in the system as there is clerk has the responsibility to all those
8STRATEGIC INFORMATION SYSTEMS works. It is human error and human error might occur accidently in the system (Safari, Faraji and Majidian 2016). Internal control Weakness of payroll system: 1.The weakness of the payroll system is that the management is based on the maintained records that are related to the financial as well as cost accounting system. 2.All the data are stored in the computer centralized system and that is an internal flow in the system (Quirke 2017). There might be problem of dealing with the computers in the system. 3.While recording the data in the centralized system, the information or the data uploaded might be incorrect information (Luftman, Lyytinen and Zvi, 2017). The clerk might upload the information mistakenly in the system. Risks Associated with payroll system: 1.Biased Interpretation: The risk that is associated with the payroll system is the potentialfraudrisks(KorablevaandKalimullina,2016).Thecentralized system is dependent on the computers and that might lead to large problems in Bell Studio. Storing all the data on the cloud of the accounting centralized system, there is a risk of hacking the financial data of the system. 2.Maintains record manually: there might be several issues while dealing with the computer systems. While uploading the purchasing receipt or the invoice in the system, there might be power outage in the organization. There might be computer virus and computer might stop working because of the virus. 3.Having different skills: There might be a risk of uploading incorrect information in the system as there is clerk has the responsibility to all those works (Haynes 2015). It is human error and human error might occur accidently in the system. Conclusion Centralized based computing system is the particular type of architecture in which all the working process is being performed by only one central server. The centralized system mainly enables to have computing resource, the management system, and the and-ministration system in the central server of the organization. The responsibility of the central server is mainly responsible for delivering the application logic, provides the computing resources and includes the processing in the system. The centralized system that is used by the Bell Studio mainly includes the client and server architecture where all the computer systems at different locations are connected with the central server. The working system of the Bell Studio is discussed in the report above. The system consists of the transaction system, the management system, and reporting the financial system of the organizations. The networks of the systems are connected to a network to a particular central server that helps the organization to process the computations. As all the nodes are primarily dependent on central server for accessing the application, computing, internet storage, security and storage within the system, there are many pitfalls in the system. The systems on the Bell Studio are to investigate those issues and find out
9STRATEGIC INFORMATION SYSTEMS proper mitigation techniques to improve their accounting information system. The operation of the organization is explained in the report. All the weakness of the above stated three system are explained in this report defining the mitigation process of the system. References Duncan, R.A.K. and Whittington, M., 2016. Enhancing cloud security and privacy: the power and the weakness of the audit trail.CLOUD COMPUTING 2016. Gallemore,J. andLabro, E.,2015. The importanceof theinternalinformation environment for tax avoidance.Journal of Accounting and Economics,60(1), pp.149- 167. Haislip,J.Z.,Masli,A.,Richardson,V.J.andSanchez,J.M.,2015.Repairing organizational legitimacy following information technology (IT) material weaknesses: Executive turnover, IT expertise, and IT system upgrades.Journal of Information Systems,30(1), pp.41-70. Haynes, P., 2015.Managing complexity in the public services. Routledge. Heeks, R., 2017. Information technology, information systems and public sector accountability. In Information Technology in Context: Studies from the Perspective of Developing Countries (pp. 201-219). Routledge. Hockerts,K.,2015.Howhybridorganizationsturnantagonisticassetsinto complementarities.California Management Review,57(3), pp.83-106. Ji, X.D., Lu, W. and Qu, W., 2017. Voluntary disclosure of internal control weakness andearningsquality:EvidencefromChina.TheInternationalJournalof Accounting,52(1), pp.27-44. Kanodia,C.andSapra,H.,2016.Arealeffectsperspectivetoaccounting measurement and disclosure: Implications and insights for future research.Journal of Accounting Research,54(2), pp.623-676. Khan, T. and Gray, R., 2016. Accounting, identity, autopoiesis+ sustainability: A comment, development and expansion on Lawrence, Botes, Collins and Roper (2013).Meditari Accountancy Research,24(1), pp.36-55. Korableva, O.N. and Kalimullina, O.V., 2016, September. Strategic approach to the optimization of organization based on BSC-SWOT matrix. In2016 IEEE International Conference on Knowledge Engineering and Applications (ICKEA)(pp. 212-215). IEEE. Luftman,J.,Lyytinen,K.andZvi,T.B.,2017.Enhancingthemeasurementof informationtechnology(IT)businessalignmentanditsinfluenceoncompany performance.Journal of Information Technology,32(1), pp.26-46. Quirke, B., 2017.Making the connections: using internal communication to turn strategy into action. Routledge. Rao, Y., Guo, K.H. and Chen, Y., 2015. Information systems maturity, knowledge sharing, and firm performance.International Journal of Accounting & Information Management,23(2), pp.106-127.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10STRATEGIC INFORMATION SYSTEMS Safari, H., Faraji, Z. and Majidian, S., 2016. Identifying and evaluating enterprise architecturerisksusingFMEAandfuzzyVIKOR.JournalofIntelligent Manufacturing,27(2), pp.475-486.7 Salterio, S.E., 2015. Barriers to knowledge creation in management accounting research.Journal of Management Accounting Research,27(1), pp.151-170. Sun, Y., 2016. Internal control weakness disclosure and firm investment.Journal of Accounting, Auditing & Finance,31(2), pp.277-307. Thompson,J.D.,2017.Organizationsinaction:Socialsciencebasesof administrative theory. Routledge. Upward, A. and Jones, P., 2016. An ontology for strongly sustainable business models:Defininganenterpriseframeworkcompatiblewithnaturalandsocial science.Organization & Environment,29(1), pp.97-123. Van Woerkom, M., Mostert, K., Els, C., Bakker, A.B., De Beer, L. and Rothmann Jr, S., 2016. Strengths use and deficit correction in organizations: Development and validationofaquestionnaire.EuropeanJournalofWorkandOrganizational Psychology,25(6), pp.960-975. Wellin, M., 2016.Managing the psychological contract: Using the personal deal to increase business performance. Routledge. Zimmermann, S., Rentrop, C. and Felden, C., 2016. A multiple case study on the nature and management of shadow information technology.Journal of Information Systems,31(1), pp.79-101.