Systems Documentation and Internal Controls Analysis Report

Verified

Added on  2019/10/31

|9
|1765
|274
Report
AI Summary
This report provides an analysis of the revenue cycle for Motherboards and More Pty Ltd, focusing on the integration of their ERP system. The study identifies internal control weaknesses, including issues with customer management, delivery errors, delays, and inadequate stock counts. These weaknesses lead to delayed service, decreased customer satisfaction, and poor stock maintenance. The report proposes control strategies such as an Integrated CRM and ERP System and a Stock Management System to address these issues. Additionally, it addresses the threat of ransomware attacks, recommending updates to security functions and the implementation of IDS/IPS for data protection. The report concludes with a discussion on the importance of integrating processes for improved organizational operations and security.
Document Page
Running head: SYSTEMS DOCUMENTATION AND INTERNAL CONTROLS
Systems Documentation and Internal Controls
Name of the Student:
Student ID:
Name of the University:
Author’s note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1SYSTEMS DOCUMENTATION AND INTERNAL CONTROLS
Executive Summary
The report had been developed for analysis of revenue cycle of Motherboards and More Pty Ltd
for forming the improved integration of the ERP system with the functions of the organization.
The internal control weakness of the Revenue Cycle Motherboards and More Pty Ltd were
analyzed to be unable for managing the huge number of customers, wrong delivery of the items
to the customers, delay in deliveries, and lack of physical count of stock. The impact of the
weaknesses of Motherboards and More Pty Ltd were delay in providing services to the customers
of Motherboards and More Pty Ltd, decrease in number of customers due to fall of customer
satisfaction, and No insight on the stock maintenance. The control strategy for the Motherboards
and More Revenue Cycle were developed to be Integrated CRM and ERP System and Stock
Management System. The appropriate controls required for protecting the data and information
of Motherboards and More Pty Ltd from Ransomware Cyber Attack were update of security
functions and implementation of IDS/IPS.
Document Page
2SYSTEMS DOCUMENTATION AND INTERNAL CONTROLS
Table of Contents
Introduction......................................................................................................................................3
1. Overview of Revenue Cycle........................................................................................................3
2. Identification of the Issues and Development of Control Strategies...........................................4
2a. Internal Control Weaknesses of Revenue Cycle of Motherboards and More.......................4
2b. Impact of Weaknesses of Revenue Cycle of Motherboards and More.................................4
2c. Control Strategy for Motherboards and More Revenue Cycle..............................................5
3. Overview of Ransomware Attack................................................................................................5
4. Review of Appropriate Controls..................................................................................................5
Conclusion.......................................................................................................................................6
References........................................................................................................................................7
Document Page
3SYSTEMS DOCUMENTATION AND INTERNAL CONTROLS
Introduction
The development of the organizations had been largely dependent on the implication of
the effective and improved development schemes (Singh, Mindel & Mathiassen, 2016). The
integration of the processes would be formed for forming the development of the operations. The
evaluation of the project would integrate the deployment of the effective and improved analysis
of the processing and development.
The following analysis in the report had formed the evaluation of the Ransomware Cyber
Attack in May 2017 and it would evaluate the development of the some control strategies for
implying the safety and security of the operations and development of the system integration and
development.
1. Overview of Revenue Cycle
The revenue cycle had been deployed for ensuring a cyclic process for integrating the
development of improved operations (Colwell, 2015). The revenue cycle of Motherboards and
More Pty Ltd is developed for forming the improved integration of the ERP system with the
functions of the organization. The sales in the organization are carried on credit and the customer
places their order through the website, email, or by telephone. The orders are collected from the
warehouse and it would result in forming the development of the issues and integration of the
operations for forming the accurate processing of customer’s information. The order is loaded in
the dock by following the customer’s name alphabetically (Ameri, Sadeh & Didehkhani, 2015).
The perpetual inventory is formed for managing the customer’s data and developing the smart
management of the data. The system generates the sales invoice for payment process. The system
is implied for developing the integration of the operations and forming the accurate payment
system (Kilic, Zaim & Delen, 2015). The customers are asked for payment only after the
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4SYSTEMS DOCUMENTATION AND INTERNAL CONTROLS
employees enter correct quantity of materials supplied to the customers. It helps in ensuring that
customers would be billed for the actual items sent to them. The request is stacked in the dock by
following the client's name sequentially. The unending stock is shaped for dealing with the
client's information and building up the brilliant administration of the information. The
framework produces the business receipt for installment process. The framework is suggested for
building up the mix of the operations and shaping the precise installment framework (Carmen &
Marius, 2016). The clients are requested installment simply after the workers enter adjust amount
of materials provided to the clients.
2. Identification of the Issues and Development of Control Strategies
2a. Internal Control Weaknesses of Revenue Cycle of Motherboards and More
The internal control weakness of the Revenue Cycle Motherboards and More Pty Ltd are
unable for managing the huge number of customers, wrong delivery of the items to the
customers, delay in deliveries, and lack of physical count of stock. According to Long et al.
(2013), the management of the warehouse had been largely disrupted and it had resulted in
forming the issues of the operations for Motherboards and More Pty Ltd. The issues have been
raised due to the unsymmetrical and slackness of operations in the organization.
2b. Impact of Weaknesses of Revenue Cycle of Motherboards and More
The impact of the weaknesses of unable for managing the huge number of customers,
wrong delivery of the items to the customers, delay in deliveries, and lack of physical count of
stock are,
a. Delay in Providing Services to the Customers of Motherboards and More Pty Ltd
b. Decrease in number of customers due to fall of customer satisfaction
c. No insight on the stock maintenance
Document Page
5SYSTEMS DOCUMENTATION AND INTERNAL CONTROLS
2c. Control Strategy for Motherboards and More Revenue Cycle
The control strategy for the organization is developed for forming the appropriate solutions
in implying the effective processes. The optimized control strategies for Motherboards and More
Revenue Cycle includes,
a. Integrated CRM and ERP System for management of information
b. Stock Management System for the analysis of the company’s stock
3. Overview of Ransomware Attack
The Ransomware Attack was initiated in April, 2017 and it had affected a huge number
of people and organizations (Titcomb & McGoogan, 2017). The attack was initiated by Shadow
Breakers (a group of hackers and cyber criminals) and it had affected almost whole of the globe.
The attackers have targeted the organizations using Legacy system for impacting their operations
and functions. The attackers had launched a malware named WannaCry for encrypting the data
and information of the computer system. The data and information would become useless for the
users and it would make those unavailable for the users. The hackers have demanded the initial
ransom of the $300 for decrypting the files that had been encrypted (Kettley, 2017). The
organization would have to pay the sum of money for being able to access the information. The
attack was initiated from Europe and later on spread to Russia, China, India, Egypt and many
other countries.
4. Review of Appropriate Controls
The appropriate controls required for protecting the data and information of
Motherboards and More Pty Ltd from Ransomware Cyber Attack are given below,
Document Page
6SYSTEMS DOCUMENTATION AND INTERNAL CONTROLS
Update of Security functions: The update of the security functions like firewall,
authorization, and authentication function in the organization for the operations. The security
functions would be implied for forming the development of the privacy of operations and it
would form the protection of the data from external infiltration.
Implementation of IDS/IPS: The implementation of the IDS/IPS would be developed
for forming the accurate protection of the network from the infiltration and virus attack. The
IDS/IPS would be implemented for the forming the security of the network.
Conclusion
It can be concluded from the assignment that the integration of the processes would be
formed for forming the development of the operations and processes of the organization. The
revenue cycle of Motherboards and More Pty Ltd was developed for forming the improved
integration of the ERP system with the functions of the organization. The internal control
weakness of the Revenue Cycle Motherboards and More Pty Ltd were unable for managing the
huge number of customers, wrong delivery of the items to the customers, delay in deliveries, and
lack of physical count of stock. The attack of Ransomware could be mitigated by using update of
security functions and implementation of IDS/IPS.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7SYSTEMS DOCUMENTATION AND INTERNAL CONTROLS
References
Ameri, M., Sadeh, E., & Didehkhani, H. (2015). Presenting Management Model of Relationship
with Electronic Customer (e-CRM), Customer Satisfaction and Loyalty. Turkish Journal
of Scientific Research. Vol, 2(2), 44-52.
Carmen, R., & Marius, S. (2016). Customer Loyalty Using Customer Relationship
Management. Management Strategies Journal, 31(1), 285-288.
Colwell, J. (2015). Tech tools to aid with revenue cycle management. Medical
economics, 92(23), 54-54.
Kettley, S. (2017). What is ransomware? How the global cyber attack is holding companies
ransom. Express.co.uk. Retrieved 20 September 2017, from
http://www.express.co.uk/life-style/science-technology/822003/ransomware-what-is-
cyber-attack-Petya-virus-Wannacry-UK-Ukraine-WPP
Kilic, H. S., Zaim, S., & Delen, D. (2015). Selecting “The Best” ERP system for SMEs using a
combination of ANP and PROMETHEE methods. Expert Systems with
Applications, 42(5), 2343-2352.
Long, C. S., Khalafinezhad, R., Ismail, W. K. W., & Rasid, S. Z. A. (2013). Impact of CRM
factors on customer satisfaction and loyalty. Asian Social Science, 9(10), 247.
Singh, R., Mindel, V., & Mathiassen, L. (2016, January). IT-Based Revenue Cycle Management:
An Action Research into Relational Coordination. In System Sciences (HICSS), 2016
49th Hawaii International Conference on(pp. 3152-3161). IEEE.
Titcomb, J., & McGoogan, C. (2017). Cyber attack: Latest evidence indicates 'phishing' emails
not to blame for global hack. The Telegraph. Retrieved 20 September 2017, from
Document Page
8SYSTEMS DOCUMENTATION AND INTERNAL CONTROLS
http://www.telegraph.co.uk/technology/2017/05/15/nhs-cyber-attack-latest-authorities-
warn-day-chaos-ransomware/
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]