Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask HR Management Expert

Problem 1

Segregation of duties in the personal computing environment:

What role should the HR organization play in this space? Also, what about the culture of the organization and its role in ensuring compliance?

Problem 2

Provide examples (include citations) of how control activities (access control, segregation of duties, transaction authority, supervision, accounting records, for example) have been implemented along with how they have helped or failed to mitigate risks within an organization.

Problem 3

Look at the specifics in the changes made between SAS 70 and SSAE 16. Select a specific change and share your thoughts on whether the change makes an improvement or not. Support your assertion.

Problem 4

Reply to the reading below:

• What is the purpose behind segregation of duties in the personal computing environment?

Special considerations should be taken when auditing the personal computer environment. The challenge arises from the mobility or fluidity attributed to personal computing and the lack of internal control features usually found in larger, enterprise-wide systems. In this context, the general purpose behind segregation of duties (SoD) is to prevent unauthorized access or modification to the operating system(s), applications, or data found in a multi-user computer system by a single individual or party. For example, management can employ different techniques to prevent unauthorized access to a specific resource including the use of hidden files or secret file names, and employing passwords and cryptography (Gupta, 2005). In particular, these controls can be specifically divided into preventive, detective, and corrective. As aforementioned, preventive controls include aspects such as usernames (IDs) and passwords used by all modern operating systems prior to granting access to a particular user. Additional preventive controls may inhibit the same individual from being in charge of developing, maintaining, and running a specific financial software. Detective controls can be achieved by restricting access via physical security measures as well as logical approaches such as detecting inaccurate data being uploaded to a financial application. Corrective controls can be achieved via audit trails and exception reports. If any control weaknesses are found in the SoD process, direct supervision and work reviews should be enforced to counteract the deficiencies.

• Why is inadequate segregation of duties a problem in the personal computing environment?

Without proper SoD, unauthorized access to data and applications can occur in a variety of ways. For example, there is an inherent risk in having a single individual in charge of data processing also possess the ability to change program files. This increases the chances of errors going undetected or, in the worst cases, the potential for concealment and fraud. An employee may also have access to multiple applications that process incompatible transactions. For example, a single individual may be responsible for entering all transaction data, including sales orders, cash receipts, invoices, and disbursements. This degree of authority would be similar, in a manual system, to assigning accounts receivable, accounts payable, cash receipts, cash disbursement, and general ledger responsibility to the same person (Hall, 2011).

Problems 5

Reply to the reading below:

What is the purpose behind segregation of duties in the personal computing environment?

The personal computer (PC) is intended to be used by a single user. The user has individual applications, files, and access to the computer. However, a company could have general PCs available to all employees with applications that store and manipulate customer data, keep inventory, handle accounting functions, access on-line applications, and surf the internet. Separation of duties is a key internal control concept. (Hall, 2011) The purpose of segregation of duties is to minimize incompatible functions. No single person should have control over an entire transaction. For example, the secretary should not have access to accounting information. The accountant shouldn't have access to inventory and customer information. The duties of authorization, custody of assets and record-keeping should be the responsibility of three different people - each trained in that particular duty. Duties are considered to be incompatible if one person can get into the system and hide irregularities while performing day-to-day activities without detection.

Why is inadequate segregation of duties a problem in the personal computing environment?

Many small companies may have access to multiple applications that perform incompatible tasks. For example, one person may be in charge of entering employee and customer information, invoices, payments, and other such transactions. If all of these transactions are performed on a general company PC, the other employees could access the applications and manipulate the data. Also, other employees that are not trained in the applications could inadvertently change information and data on the PC. Without individualized password protection on the PC itself and each application, there is no way to tell who is responsible for any errors that occur.

HR Management, Management Studies

  • Category:- HR Management
  • Reference No.:- M9132326
  • Price:- $25

Priced at Now at $25, Verified Solution

Have any Question?


Related Questions in HR Management

Question 1 do you think that individuals or groups are

Question: 1. Do you think that individuals or groups are better decision makers? Justify your choice. 2. How are the Abilene paradox and groupthink similar? How are they different? The response must be typed, single spac ...

A well-written resume and cover letter along with an

A well-written resume and cover letter, along with an excellent impression can help land your dream interview and ultimately your dream job! ASSIGNMENT: Submit your current resume and cover letter. Think about where you' ...

1 how can a contemporary perspective on conflict make me

1. How can a contemporary perspective on conflict make me more effectie at school, work and home? 2. How can organizations benefit from performing a political risk analysis? 3. In this thread, we will discuss Global Lead ...

Health care and human resources legislation presentation

Health Care and Human Resources Legislation Presentation Select a piece of legislation or regulation (passed within the past 3 years) that directly affects an organization from the human resources aspect (e.g., Americans ...

Question starbucks1select one diagnostic model ie 6-box 7s

Question: Starbucks 1. Select one diagnostic model (i.e., 6-box, 7S, congruence, or one of the others) to apply to the chosen companies. Choose the model that you and your team feel best identifies and measures the relev ...

1 give an example where the best technology did not

1) Give an example where the best technology did not dominate a network effects-driven market and why? Please make sure your example is unique and not something that has already been discussed on this particular forum. 2 ...

1 what are the procedural law steps from the time a person

1. What are the procedural law steps from the time a person is arrested until they are sentenced. 2. Prepare a report on order winning criteria described by Terry Hill. 3. What is the impact of the internet on internatio ...

Assignment 1 strengths weaknesses opportunities and threats

Assignment 1: Strengths, Weaknesses, Opportunities, and Threats (SWOT) Analysis The assigned readings for Module 2 on strengths, weaknesses, opportunities, and threats (SWOT) analysis highlighted the importance of such a ...

Question many people have argued that the skills needed to

Question: Many people have argued that the skills needed to be successful in today's workforce have changed. What skills do you feel an individual needs to be successful in a job today? Why do you feel these skills are m ...

Question what happens once a proposal is submitted how are

Question: What happens once a proposal is submitted? How are funded proposals selected? Funders apply a variety of strategies to select the proposals they are going to fund, including using scoring matrices, internal rev ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As