Premium Essay

Control and Information

In: Business and Management

Submitted By Fionacc
Words 307
Pages 2
1. Flamholtz (1996) article a. summarize the four functions of control (i) Give people motivation to make decisions and take actions consistent with organizational objectives (ii) Integrate efforts of different parts (iii) Provide information of results of organization and people’s performance (iv) Facilitate the implementation of plans b. identify the key components of an organizational control system and the role of each core control system, organizational structure, organizational culture (i) The core control system focuses on any aspect of human behavior which has to do with attainment of organizational objectives (ii)

c. the key components of the core control system
Five organizational process, planning, operations, measurements.

2. MCDONALD’S
This article used financial measurement such as sales figures and net income to measure Mr. Thompson’s leading performance, which turned out to be not satisfying. According to Mr. Smead, Mr. Thompson failed to inspire the franchisees or people around him in the way that they needed to be.
FACEBOOK
This article uses both financial and non-financial measurements to evaluate Facebook’s performance, including daily active Facebook users, advertising revenue and global revenue per user. All these measurements affected Facebook’s decision and its strategy in the future. 3. a. Brooke received the quarterly financial report and found out that The Coffee Pot was still losing money after installing new brewing machine. Besides, there were not enough funds to meet the monthly loan payment. The quarterly report lacked detail. Current manager have not achieved Brooke’s father’s goal. b. Negotiate with the shopping mall about The Coffee Pot’s overpaid lease.
Accept auditing service every year
Strengthen management of working staff and
Feedback
Review control system…...

Similar Documents

Free Essay

Control

...Control- Defined as any process that directs the activities of individuals toward the achievement of organizational goals. Utilizing control effectively is how managers can make sure that activities are going as planned. Control is a means or mechanism for regulating the behavior of organization members. Left on their own, people may act in ways that they perceive to be beneficial for their selves or the organization they work for but that action may actually harm the organization as a whole. In some cases it’s just plain ignorance, individuals just don’t realize the overall costs of their actions. Thus, control is one of the fundamental forces that keep the organization together and heading in the right direction. Purpose- To ensure that activities are completed in ways that lead to accomplishment of organizational goals. * It can provide organizations with indications on how well they are performing * It allows an organization to adjust performance in order to keep moving in the right direction. Set performance standards Every organization has goals: profitability, innovation, satisfaction of customers and employees, and so on. A standard is the level of expected performance for a given goal. So set standards for any and all activities —financial activities, operating activities, legal compliance, charitable contributions, and so on. Measure performance It’s an ongoing process. Performance measures should be valid indicators (e.g. days......

Words: 591 - Pages: 3

Premium Essay

Control for Accounting Information System

...CONTROL AND AIS (Version 1 – Brief, just for the exam) Overview of Control Concepts * Internal Control - plan of organization and the methods a business uses to safeguard assets, provide accurate and reliable information, promote and improve operational efficiency and encourage adherence to prescribed management procedures. * Management Control - broader than internal control 1. Integral part of management responsibilities. 2. Is designed to reduce errors and irregularities and achieve goals 3. Is personnel oriented and seeks to help employees attain company goals by following policies. * Administrative Controls - help ensure operational efficiency and adherence to managerial policies. * Accounting controls - safeguard assets and ensure the reliability of accounting records. * Internal control structure - policies and procedures established to provide reasonable assurance that the organization's specific objectives will be achieved. 1. Control environment 2. Accounting system 3. Control procedures * Internal control classifications 1. Preventive, detective, corrective 2. Feedback, feedforward 3. General, application 4. Input, processing and output COSO - Committee of Sponsoring Organizations * Internal control - process implemented by management, the BOD, and those under their direction to provide reasonable assurance that control objectives are achieved with regard to: ...

Words: 5228 - Pages: 21

Premium Essay

Information on Controls

...Information on Controls Shelise Stevens ACC542 Christy Countryman August 20, 2012 Information on Controls Internal controls are imperative to the success of a company. It is important for Kudler Fine Foods to assess their risks, analyze them, and come up with internal controls and keep them underway. The management of Kudler Fine Foods has reviewed the flowcharts and is requesting information on the controls. The risks involved may hinder the development and work that Kudler Fine Foods does and should be assessed and assigned internal controls to reduce the negative possibilities that associate with the risks. This brief will discuss and analyze the risks from the Accounting Information Systems, identify the risks and controls issued from the flowcharts, design controls to mitigate the risks, evaluate the application of internal control, and discuss other controls. Risks of AIS Team D suggested purchasing industry specific software. Industry specific software is software that comes with a pre-cut software for companies to use that has already been tweaked and fixed malfunctions (Visco, 2005). When Kudler Fine Foods purchases industry specific software they are getting the software that the company and employees can mold to benefit the company (Visco, 2005). However, with every system comes a risk. Kudler Fine Foods is chancing purchasing software that will not fit the companies every need by purchasing pre-made software. Accounting Information Systems contain......

Words: 1100 - Pages: 5

Free Essay

Controls for Information Technology

...Controls for Information Technology Janet Lafountain ACC/544 July 9, 2012 Bret Mann Controls for Information Technology Many types of controls for Information Technology are available for companies to choose, the controls for reporting and evaluation would benefit the company and keep employees and investors informed. Managers and investors need to understand this information to make knowledgeable decisions. One responsibility as a controller is to keeping track of information. Information is vital to the company. Generic tools do not provide optimal protection for the company, unlike document management, and workflow tools. The document management and workflow tools go together with different accounting software. The data provided by these tools assist management by making it straightforward and easy to access the information. Linking separate processes, the examination of instrumental job responsibilities, and the relations to the progress of work are achievable. As the transformation of the company’s business practices become essential after monitoring, updating the risk and controls becomes necessary also. The other tools useful to the company are real-time compliance and data mining. Real-time compliance tools offer data throughout the company via added software. This data is available to make reliable improvements to practices and procedures and any compliance problems are accessible by management at any time. Data mining draws on information......

Words: 255 - Pages: 2

Free Essay

Controls for Information Technology and Reporting and Evaluation

...Controls for Information Technology (IT) and Reporting and Evaluation Jami L. Valek ACC-544 January 28, 2013 Christine Errico Controls for Information Technology (IT) and Reporting and Evaluation Information Technology (IT) controls are activities that are specifically performed to ensure that business objectives are met through the use of people and systems. IT control objectives are related to the business enterprise’s confidentiality, integrity, availability of data, and the overall management of the IT functions. There are two types of IT controls: IT general controls, which are controls over the IT environment, computer operations, access to programs and data, program development and program changes; and IT application controls, which refer to transaction processing controls (“Information Technology Controls”, 2013). IT General Controls are the foundation of a company’s IT control structure. With IT General Controls, data that is generated can be deemed more reliable and assertion that systems are operating as intended is supported. IT General Controls usually include controls that are designed to: * Shape the corporate environment through control environment; * Ensure that changes are authorized and meet business requirements through changes in management procedures; * Protect the integrity of program controls through source code/document version controls procedures; * Ensure effective management of IT projects through software development......

Words: 507 - Pages: 3

Premium Essay

Internal Controls for Information Technology

...Internal Controls for Information Technology ACC 544 September 2, 2013 Miriam Shealy Internal Controls for Information Technology Internal controls for Information Technology are important as they help protect the company’s assets. Internal controls are necessary to comply with the security of the company’s information. Internal controls will be reviewed in this document as well as how can the company review its security over their internal controls. The assets of the company need to be protected. In order to do so, the company needs to review for risks. The company needs to develop a plan for what internal control measures they would want to put into place. Internal controls will help guide how we protect our assets against threats and vulnerabilities. Threats to a company’s assets can be known or unknown. A hacker of the system can bring parts of a system down or lose some data. It also can completely take down the system. A company should have a threat agent that would help identify such a task. The IT team will need to correct and fix this quickly. It is necessary to have firewalls in the system that will help protect against vulnerabilities. Vulnerabilities for the system would be not protecting the system. If there is not a firewall or security agent assigned to the system the information can be stolen and damaged by any type of threat. The company should take steps of system control with monitoring, managing, and having......

Words: 643 - Pages: 3

Premium Essay

It Control

...Types of Information Security Controls Harold F. Tipton Security is generally defined as the freedom from danger or as the condition of safety. Computer security, specifically, is the protection of data in a system against unauthorized disclosure, modification, or destruction and protection of the computer system itself against unauthorized use, modification, or denial of service. Because certain computer security controls inhibit productivity, security is typically a compromise toward which security practitioners, system users, and system operations and administrative personnel work to achieve a satisfactory balance between security and productivity. Controls for providing information security can be physical, technical, or administrative. These three categories of controls can be further classified as either preventive or detective. Preventive controls attempt to avoid the occurrence of unwanted events, whereas detective controls attempt to identify unwanted events after they have occurred. Preventive controls inhibit the free use of computing resources and therefore can be applied only to the degree that the users are willing to accept. Effective security awareness programs can help increase users’ level of tolerance for preventive controls by helping them understand how such controls enable them to trust their computing systems. Common detective controls include audit trails, intrusion detection methods, and checksums. Three other types of controls supplement......

Words: 456 - Pages: 2

Premium Essay

The Role of Accounting and Accounting Information with Regard to Control and Performance Evolution of Modern Organizations

...1. Discuss the role of accounting and accounting information with regard to control and performance evolution of modern organizations. In you discussion you should consider the positive impact and limitations of accounting and accounting information on MCS. The use of accounting information had been started from the traditional cost accounting developments and has undergone many revolutionary attributes such as ROI measure, capital budgeting, agency theory and transaction cost economics. The primary objective of for–profit organizations is to maximize shareholder value. Thus, the results control idea would be to reward each individual employee for doing what s/he does to increase firm value. However, direct measurements of the individual’s contributions to value creation are rarely possible. Therefore, firms have to look for control alternatives. Most firms base their higher managerial level results controls on accounting measures of performance. That is accounting profits and returns and their components. Short-term accounting profit and return measures provide imperfect, surrogate indicators of changes in firm value. Management myopia is an almost inevitable side-effect of the use of financial results control system built on accounting measures of performance. Management myopia can be avoided at top management levels by holding these managers accountable for increasing market valuations. When markets are informed and......

Words: 1047 - Pages: 5

Premium Essay

Controls for Information Technology and Reporting and Evaluation

...Controls for Information Technology and Reporting and Evaluation April Keller ACC/544 Instructor: September 11th, 2009 Controls for Information Technology The success of a business is determined by how effective its managers are in managing risk. Therefore, acquiring effective risk management helps to protect the company from losses because of poor accounting practices as well as fraudulent activities. Using good controls protect managers from liabilities that may arise when certifying financial statements used in annual reports because when these reports are issued, they are also a reflection of the company’s internal controls. The internal control process begins with management and the attitude that management portrays through the company. Manager duties include implementing the policies and procedures used within the company, these policies and procedures are also used to build the structure which is found within the internal control environment. Internal Control Reporting Options An audit report has three general functions used to report a company’s financial statements. These reports indicate whether the financial statements are presented in conformity with generally accepted accounting principles. Auditors use their reports to highlight any unusual aspects of the audit examination, and the reports can be used to communicate useful information to decision makers that may not appear on the face of the financial statements. Internal......

Words: 730 - Pages: 3

Premium Essay

Controls

...2 CONTINGENCY PLAN Control: The organization: a. Develops a contingency plan for the information system that: - Identifies essential missions and business functions and associated contingency requirements; - Provides recovery objectives, restoration priorities, and metrics; - Addresses contingency roles, responsibilities, assigned individuals with contact information; - Addresses maintaining essential missions and business functions despite an information system disruption, compromise, or failure; - Addresses eventual, full information system restoration without deterioration of the security measures originally planned and implemented; and - Is reviewed and approved by designated officials within the organization; b. Distributes copies of the contingency plan to [Assignment: organization-defined list of key contingency personnel (identified by name and/or by role) and organizational elements]; c. Coordinates contingency planning activities with incident handling activities; d. Reviews the contingency plan for the information system [Assignment: organization-defined frequency]; APPENDIX F-CP PAGE F-47 ________________________________________________________________________________________________ cial Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations e. Revises the contingency plan to address changes to the organization, information system, or environment of......

Words: 914 - Pages: 4

Premium Essay

Controls for Information Technology and Reporting and Evaluation

...Controls for Information Technology The success of a business is determined by how effective its managers are in managing risk. Therefore, acquiring effective risk management helps to protect the company from losses because of poor accounting practices as well as fraudulent activities. Using good controls protect managers from liabilities that may arise when certifying financial statements used in annual reports because when these reports are issued, they are also a reflection of the company’s internal controls. The internal control process begins with management and the attitude that management portrays through the company. Manager duties include implementing the policies and procedures used within the company, these policies and procedures are also used to build the structure which is found within the internal control environment. Internal Control Reporting Options An audit report has three general functions used to report a company’s financial statements. These reports indicate whether the financial statements are presented in conformity with generally accepted accounting principles. Auditors use their reports to highlight any unusual aspects of the audit examination, and the reports can be used to communicate useful information to decision makers that may not appear on the face of the financial statements. Internal reporting options are important in keeping regulators, investors, and employees informed, and the format should be understandable for......

Words: 663 - Pages: 3

Premium Essay

Assessing Information Technology General Control Risk: an Instructional Case

... 63–76 Assessing Information Technology General Control Risk: An Instructional Case Carolyn Strand Norman, Mark D. Payne, and Valaria P. Vendrzyk ABSTRACT: Information Technology General Controls (ITGCs), a fundamental category of internal controls, provide an overall foundation for reliance on any information produced by a system. Since the relation between ITGCs and the information produced by an organization’s various application programs is indirect, understanding how ITGCs interact and affect an auditor’s risk assessment is often challenging for students. This case helps students assess overall ITGC risk within an organization’s information systems. Students identify specific strengths and weaknesses within five ITGC areas, provide a risk assessment for each area, and then evaluate an organization’s overall level of ITGC risk within the context of an integrated audit. Keywords: internal controls; general control; ITGC; risk assessment. INTRODUCTION he Sarbanes-Oxley Act (SOX 2002) and the Public Company Accounting Oversight Board (PCAOB) Auditing Standard No. 5 (PCAOB 2007) require that the organization’s chief executive officer (CEO) and chief financial officer (CFO) include an assessment of the operating effectiveness of their internal control structure over financial reporting when issuing the annual report. External auditors must review management’s internal control assessment as part of an annual integrated audit of an organization’s internal controls over financial......

Words: 6299 - Pages: 26

Premium Essay

Control

...that Ms. Benson is ineffective in leading her section * Had lost the respect of the personnel manager and that she can’t control the employees in her section b. Benefits section * Handles employee insurance, life insurance, retirement benefits, educational benefits, and worker compensation claims * It is composed of six (6) employees who have worked together for the past five (5) years and who have become a very close-knit cohesive group (strong task structure) who cooperate well with other city employees * Has an excellent reputation based on the few complaints it receives on how it handles employee benefits c. Sharon Garcia * The informal leader of the benefits section whom other employees look up for advice and assistance * As an informal leader, she has both power and influence, though she has no authority * Told other employees that Ms Benson did not understand the new procedures during the training session on the new procedures for processing health insurance claims * Advised the other employees not to follow Ms. Benson’s instructions d. Other employees of the benefits section * Agreed to Ms Garcia’s advise and ignored the new procedures described by Ms. Benson e. Bill Castro * An employee of the section who complained to the city personnel manager that Ms. Benson could not control the operation of the section * Suggested that Ms. Benson should be removed as supervisor and that the employees wanted......

Words: 2438 - Pages: 10

Free Essay

Information and Management Control

...ST. LOUIS UNIVERSITY NATIONAL SERVICE TRAINING PROGRAM(NSTP)OFFICE SCHOOL OF TEACHER EDUCATION Gonzaga Campus, Gen. Luna Rd., 2600 Baguio City Tel: (074) 4470664/09198807387/09163349807 Email: nstpcoor@slu.edu.ph / slunstp@yahoo.com PARENT’S AUTHORIZATION FOR GUARDIANS OF OWN CHILDREN OTHER THAN THEMSELVES To St. Louis University: This is to authorize_______________________________,of _________________________________ (Name of guardian) (address of guardian) the _______________________________of our child ____________________________who is studying in (relationship of guardian to the child) (Name of child) St Louis University, to act as the guardian of our child; to sign all documents, papers or waivers that require parent’s signature in accordance with SLU policies, and do all other things in connection thereof. We understand that by this authorization, we shall not hold St. Louis University liable for any lapse of diligence committed by the above guardian. Signed: ______________________________ (and/or ) ________________________________ Name and Signature of Father Name and Signature of Mother Date:______________________ Date:______________________ Conforme: __________________________ ________________________________ Name and Signature of Guardian Name and Signature of Child Date:______________________ Date:______________________ NOTE: required attachment –photocopy of two ID’s of......

Words: 448 - Pages: 2

Premium Essay

Information System Controls for Systems Reliability

...CHAPTER 7 INFORMATION SYSTEM CONTROLS for SYSTEMS RELIABILITY SUGGESTED ANSWERS TO DISCUSSION QUESTIONS 7.1 1. Encryption is the final layer of preventative controls in that encrypting data provides a barrier against an intruder who has obtained access to company data. Encryption employing a digital signature and a public key infrastructure (PKI) can also strengthen authentication procedures and helps to ensure and verify the validity of e-business transactions. The digital signature is some sort of identifying information about the signer that is encrypted with the signer’s private key. This identifying information can only be decrypted using the corresponding public key. Since a private key is only known to it’s owner, only the owner can hold both the public and the private key and be the creator of the digital signature. Thus, digital signatures can be used to authenticate a particular party involved in a transaction as being the creator of a document. This provides for non-repudiation: the creator of the digital signature cannot deny having signed a document.. A digital certificate is an electronic document that is digitally signed by a trusted third party that certifies the identity of the owner of a pair of public and private keys. The PKI is a system that is used to process and manage the public and private keys used in digital signatures and digital certificates. An organization that handles digital certificates is called a......

Words: 5091 - Pages: 21