Preview

Input Controls

Better Essays
Open Document
Open Document
1244 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Input Controls
The objective of input design is to ensure the quality, accuracy, completeness, and timeliness of input data during its conversion from its original source into computer data, or entry into a computer application. Data can be entered into a computer application from either manual online input or by scheduled automated processing. Input controls will ensure that data is accurately processed through the application and that no data is added, lost, or altered during processing (Shu, unk). No matter how data enter and information system, the quality of the output is only as good as the quality of the input. There are several key input controls for an input design such as, data processing control, source document controls, validation controls, and user interface. Input control includes the necessary measures to ensure that input data is correct, complete, and secure (Rosenblatt, 2012).
In computer science, data validation is the process of ensuring that a program operates on clean, correct and useful data. Validation rules or check routines are used to check for correctness, meaningfulness, and security of data that are input to the system. The rules may be implemented through the automated facilities of a data dictionary, or through software application program validation logic. Data that does not conform to these rules will negatively affect company process execution. Therefore, data validation should start with business process definition and set of business rules within this process because incorrect data validation can lead to data corruption or security vulnerability (Shu, unk).
Source Document Control are techniques used to prevent source document fraud. Documentation should exist explaining the workflow through the application. Some examples would be narratives on the application processes, flowcharts, and an explanation of system or error messages (Rosenblatt, 2012). A processing and audit logs should generated and be available to be reviewed for unusual or



References: Anthony D. Andre, P. C. (1995). User Interface Design. Retrieved February 10, 2012, from Usernomics: http://www.usernomics.com/user-interface-design.html Lo, P. (2004). User Interface, Input and Output Design. Unk: Peter Lo. Rosenblatt, G. B. (2012). System Analysis and Design, 9th Edition. Mason: Cengage Learning. Shu, L. (unk). Computer Assisted Audit Toolsand Techniques. Retrieved February 10, 2012, from Schribd.: http://www.scribd.com/doc/48033121/Input-controls

You May Also Find These Documents Helpful

  • Good Essays

    Information technology and financial audits primary objectives are to ensure data integrity, safety, secure and operational effectiveness for Kudler’s business processes. Internal audit will provide an opinion on the accuracy and fairness of the financial statements. “This fairness evaluation is conducted in the context of generally accepted accounting principles (GAAP) and requires application of generalized auditing standards” (Bargranoff, 2008).…

    • 986 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Before any strategy takes place, an auditor must determine the end result desired from the Information Technology being used as well as the type of technology being dealt with. The most important thing is security thus it is vital to know this technology in and out to be able to determine its strengths and weaknesses. This allows for proper compensation to combat such attacks whether they are fraudulent or accidental in nature. It is necessary to be familiar with different types of proven viable internal control setups to properly test and gage an IT’s internal control system. There are three different strategies use when testing internal controls. First includes assessing the controls using user control information. In this strategy, an auditor would gather computer-generated reports and compare those to all documentation on specific transactions. This process is also known as auditing around the computer because it deals with more hard copy documents. The next strategy entails using application controls to determine the level of risk…

    • 627 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Computer Assisted Audit Tools or CAATs is one way to significantly streamline this process. CAATs are standard financial accounting software that performs audit functions that were formerly performed manually. Depending on the size shape and scope of the company modifications will be made to CAATs to fit the needs of the company in question. Generally, much of the same information is requested and analyzed as in a traditional audit. Once verified using computer techniques, data is retained so it can be used in other areas of the audit including error identification and segregation of transactions within accounts. Customized reports are generated by computer and a standard audit trail is maintained.…

    • 1023 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    References: AU 9504. AICPA Statement on Auditing Standards. Retrieved on March 13, 2013 from: http://www.aicpa.org/research/standards/auditattest/pages/sas.aspx…

    • 326 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Document data quality requirements and define rules for measuring quality. Create a reference for success, and targets to keep the project in check along the way. Set statistical checks on the data, and set a standard of quality control and completeness.…

    • 522 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Controls for Outflows

    • 571 Words
    • 3 Pages

    Louwers, T. J., Ramsay, R. J., Sinason, D. H., & & Strawser, J. R. (2007). Auditing and…

    • 571 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Input Controls

    • 1029 Words
    • 5 Pages

    This paper will discuss input controls and their various functions. An input control includes the necessary measures to ensure that data is correct, complete, and secure (Shelly & Rosenblatt, 2012). Input controls as it relate to user interface, includes audit trails, password security, data security, and encryption (Shelly & Rosenblatt, 2012). It is vital a company should take all needed measures to protect its data, which include customer, employees, and suppliers. Most assets have a value, but corporate data is priceless, because without safe, secure, accurate data, a company cannot function. (Shelly & Rosenblatt, 2012).…

    • 1029 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Hunton, J. E. (2004). Core concepts of Information Technology auditing. In (Ed.), Information Technology auditing (pp. 341-372). Retrieved from University of Phoenix eBook Collection Database.…

    • 2536 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    Computer assisted audit tools and techniques (CAATS) are software’s that increase the productivity of auditors during an audit, the software’s can extract data from the system that has to be analyzed. CAATS are also techniques that increase the efficiency and effectiveness of the function of the auditors (Bagranoff, 2008). CAATS can be use for the following purposes to validate the integrity of applications and validate the integrity of data.…

    • 1253 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Excel Evaluation

    • 921 Words
    • 4 Pages

    Data validation is a tool on excel which makes it possible to control the values input into a given cell. I used this tool to prevent negative numbers entering into the duration column of my COST worksheet. I think I used this tool effectively because if negative number is input, an error alert message appears informing the user of their mistake, therefore increasing the reliability of the data. This is shown in the image below.…

    • 921 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Modern data processing systems pose new, risk-laden challenges to the traditional audit process. Whereas it was once possible to conduct a financial statement audit by assessing and monitoring the controls over paper-based transaction and accounting systems, businesses have increasingly turned to electronic transaction and accounting systems. SAS 94 offers guidance on collecting sufficient, competent evidence in an electronic processing environment. It pays particular attention to identifying circumstances when the system of control over electronic processing must be accessed.…

    • 2188 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Usability Plan

    • 2428 Words
    • 10 Pages

    This information was developed by Usability & Technical Documentation, Xerox Corporation, and was compiled for the UPA Conference, July 1995 Page 1…

    • 2428 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Hci Website Design

    • 5259 Words
    • 22 Pages

    Bibliography: • Jeffries, R., Miller, J. R., Wharton, C., and Uyeda, K. M. 1991. User interface evaluation in the real world: A comparison of four techniques. Proceedings ACM CHI '91 Conference (New Orleans, LA, April 28-May 2), 119-124.…

    • 5259 Words
    • 22 Pages
    Good Essays
  • Better Essays

    Within this initial literature review I have looked at a number of books and websites that I feel would help me in findings definitions for all usability features. I also looked at what applications use Virtual Reality, Human Computer Interaction and Graphical User Interface.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Input and Output Devices

    • 2370 Words
    • 10 Pages

    Note that the designation of a device as either input or output depends on the perspective. Mouse and keyboards take as input physical movement that the human user outputs and convert it into signals that a computer can understand. The output from these devices is input for the computer. Similarly, printers and monitors take as input signals that a computer outputs. They then convert these signals into representations that human users can see or read. For a human user the process of reading or seeing these representations is receiving input. These interactions between computers and humans is studied in a field called human–computer interaction.…

    • 2370 Words
    • 10 Pages
    Powerful Essays