Preview

Ajax Bhd

Better Essays
Open Document
Open Document
1442 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ajax Bhd
a. Identify each weakness in the internal controls in the new computerized system and each weakness or inefficiency in the procedures for processing and controlling delivery orders and sales invoices.
Weaknesses in Internal Controls
The first weakness in internal controls is related to the computerized function which included shipping, billing and accounts receivable are permanently assigned to a specific computer operator. Such arrangement showed the poor data center and network operations controls. As there is only one specific computer operator is assigned for a lot of major functions, he or she may potentially involved in personal error or mistakes. Besides, the computer operator is responsible for making program changes, running the program, and reconciling the computer log. Hence, there will be lack of monitoring due to self review by the computer operator.
Second weakness in internal controls is in which each computer programmer allowed access to the computer room by using magnetic card and a digital code that is different for each card. Eventually, such access would hinder the access security controls due to the fact that computer programmer can make unauthorized modifications to system and application programs and engage in fictitious transactions.
Other than that, the responsibility for custody and control of magnetic tapes and system documentation randomly rotated among computer operators would be another weakness for internal controls. Random rotation among computer operators could obstruct physical controls, access security controls and monitoring as each computer operator could obtain opportunity to control those documentation. Therefore, it would be potentially result in loss of data and information through theft or unauthorized used, fire and water damage, electrical problems and sabotage.
According to the case, the new computerized system is lacking the policies and procedures related to planning, acquisition and implementation of a new

You May Also Find These Documents Helpful

  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    • Technical controls (such as smart cards, audit trails or access logs, intrusion detection, alarm systems, and biometrics)…

    • 650 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Complete Problems 8-1A, 8-3A, and 8-4A (including the Analysis Component) on pp. 338-339. When responding to the cases in 8-1A, be sure to think critically about each case. Identify the principles of internal control that has been violated, and give an explanation of why you think that principle has been violated. Identify the consequences of the actions described in the cases. Make a recommendation for what the business should do to ensure adherence to principles of internal control.…

    • 149 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    In recent years, board members and staff of the Midsouth Chamber of Commerce (MSCC) have been trying to update their information system. Their information has steadily required more capabilities and in pursuit of better more efficient capabilities they have made several missteps that have cost them a very large sum of money. They have had personnel acquire information systems that did not meet the requirements of MSCC. The cost of these nonfunctioning systems has been in excess of $277,000.00 dollars. MSCC is now on their third person to manage the acquisition of an information system that will meet all the current and foreseeable future needs of MSCC. They need to ensure that the person in charge of the acquisition of new information systems takes prudent steps to ensure that the information system that they acquire has been given a test run and it is able to complete all required tasks with a minimum of training required by the personnel who will be using the new system. MSCC needs to ensure that they start with a sound grasp of what the information system needs to collect, manage, retrieve and report to meet the requirements of supporting the business activities performed by MSCC. Failure to ensure that these steps are followed will result in the same types of problems experienced in the past by MSCC. MSCC must ensure that the language in the contract with the vendor has enough teeth that if the vendor fails to provide an information system that meets the needs of MSCC, they have viable repercussive actions to take against the vendor.…

    • 1832 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Cis 850 Study Guid

    • 499 Words
    • 2 Pages

    * Briefly describe some common information system controls that need to be implemented by business managers, not IS professionals.…

    • 499 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Townsend & Townsend

    • 577 Words
    • 3 Pages

    There is also another issue, the segregation of duties within the IT department as this is a great concern as it can create a high possibility of unauthorized changes, therefore reducing the integrity of the data and a lack of accountibility among the IT employees. We would recommend that you clearly define the duties and restrictions among the IT staff and monitor these…

    • 577 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    During the initial analysis of the company we noticed that there is no Information Technology Police in place. This has led to several computer systems with different software and hardware that is not compatible with one another. This is currently making the work more difficult for the employees and the staff due to the computer systems and software programs being out of date. The second analysis we conducted was a look…

    • 5638 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    Cu2479

    • 439 Words
    • 2 Pages

    2.1 Information storage systems should/could be locked filling cabinets, locked filling room and password protected file/computer.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Bsbm504b Review Report

    • 3822 Words
    • 16 Pages

    It is a big problem Staff at the lack of recognition or understanding of the new system because they do not know how to use it correctly. It makes the task that was not great quality.…

    • 3822 Words
    • 16 Pages
    Powerful Essays
  • Better Essays

    Internal controls are important to a business. The internal controls provide a safeguard against errors in the accounting system as well as the detection and prevention of fraud. With the inflows of the company come many risks that need to be considered. The ways in which cash, sales, accounts receivable, inventory, and production are handled within the company are different for each division. The internal controls may vary from department to department, but the end result is to protect the company from the risks that can arise.…

    • 2082 Words
    • 9 Pages
    Better Essays
  • Powerful Essays

    The IT department controls the electronic documents. Internal and external controls must be put in place for the entire organization and the IT department when it comes to managing records. There must be some time of procedures put into place.…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Internal Control Systems (2006). Encyclopedia of Business and Finance. Ed. Allison McClintic Marion. Gale Cengage, 2001. Retrieved June 25, 2011 from http://www.enotes.com/business-finance-encyclopedia/…

    • 538 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Security Controls

    • 467 Words
    • 2 Pages

    Technical Controls are logical and/or software related controls designed to restrict access to the network infrastructure, components, and data. Controls such as discretionary, mandatory access controls, rule- and role-based access controls, and passwords are all examples of technical controls. Physical controls are used to prevent physical access to the physical components; whereas technical controls are implemented to prevent digital/logical access if physical access is achieved. Some physical hardware can also fall under the technical control category because they contain the software utilized to prevent…

    • 467 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Practice Quiz 2

    • 464 Words
    • 4 Pages

    1. ASA 315.A51 (ISA 315.A51) Identifying and Assessing the Risks of Material Misstatement through Understanding the Entity and its Environment includes all of the following as components of internal control except:…

    • 464 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    1. Identify any internal control weaknesses for the five areas mentioned by the Finance Committee. Discuss any weakness and explain how to improve each situation.…

    • 517 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Physical Security

    • 724 Words
    • 3 Pages

    The article discusses the fact that because computers of all types are susceptible to a physical attack, there should always be some measure of security in place that physically restricts access to the computers. When there is physical access to the computer, there is no limit to the damage that can be done, either intentionally or unintentionally. Lack of physical security can allow top secret information to be downloaded, access to the computers hard drives, allows someone to set up a way for an unauthorized person to enter the system, in addition to allowing “passwords to be reset, server software-based security can be easily bypassed, and user passwords can be cracked and stolen.” (Bogue, 2003) I was amazed at all the problems that can occur when there is a lack of physical security within an organization.…

    • 724 Words
    • 3 Pages
    Good Essays