會(huì)計(jì)學(xué)原理英文教學(xué)課件_第1頁
會(huì)計(jì)學(xué)原理英文教學(xué)課件_第2頁
會(huì)計(jì)學(xué)原理英文教學(xué)課件_第3頁
會(huì)計(jì)學(xué)原理英文教學(xué)課件_第4頁
會(huì)計(jì)學(xué)原理英文教學(xué)課件_第5頁
已閱讀5頁,還剩67頁未讀 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡(jiǎn)介

1、Prepared byCoby HarmonUniversity of California, Santa BarbaraWestmont CollegeWILEYIFRS EDITION第1頁,共72頁。PREVIEW OF CHAPTER 7Financial AccountingIFRS 3rd EditionWeygandt Kimmel Kieso 第2頁,共72頁。7LEARNING OBJECTIVESAfter studying this chapter, you should be able to:Define fraud and internal control.Ident

2、ify the principles of internal control activities.Explain the applications of internal control principles to cash receipts.Explain the applications of internal control principles to cash disbursements. Describe the operation of a petty cash fund.Indicate the control features of a bank account.Prepar

3、e a bank reconciliation.Explain the reporting of cash.CHAPTERFraud, Internal Control, and Cash第3頁,共72頁。Dishonest act by an employee that results in personal benefit to the employee at a cost to the employer.Three factors that contribute to fraudulent activity.Illustration 7-1Fraud triangleFraudLO 1

4、Fraud and Internal ControlLearning Objective 1 Define fraud and internal control.第4頁,共72頁。Methods and measures adopted to:Safeguard assets. Enhance accuracy and reliability of accounting records. Increase efficiency of operations.Ensure compliance with laws and regulations.Internal ControlLO 1 第5頁,共

5、72頁。QuestionInternal control is used in a business to enhance the accuracy and reliability of its accounting records and to:safeguard its assets.prevent duce correct financial statements.deter employee dishonesty.LO 1Internal Control第6頁,共72頁。Five Primary Components:Control environment. Risk

6、 assessment. Control activities.Information and communication.Monitoring.Internal ControlLO 1 第7頁,共72頁。PEOPLE, PLANET, AND PROFIT INSIGHTAnd the Controls AreInternal controls are important for an effective financial reporting system. The same is true for sustainability reporting. An effective system

7、 of internal controls for sustainability reporting will help in the following ways: (1) prevent the unauthorized use of data; (2) provide reasonable assurance that the information is accurate, valid, and complete; and (3) report information that is consistent with overall sustainability accounting p

8、olicies. With these types of controls, users will have the confidence that they can use the sustainability information effectively. Some regulators are calling for even more assurance through audits of this information. Companies that potentially can cause environmental damage through greenhouse gas

9、es, as well as companies in the mining and extractive industries, are subject to reporting requirements. And, as demand for more information in the sustainability area expands, the need for audits of this information will grow.LO 1 第8頁,共72頁。Control is most effective when only one person is responsib

10、le for a given task.Establishing responsibility often requires limiting access only to authorized personnel, and then identifying those personnel.LO 2ESTABLISHMENT OF RESPONSIBILITYPrinciples of Internal Control ActivitiesLearning Objective 2 Identify the principles of internal control activities.第9

11、頁,共72頁。SEGREGATION OF DUTIESDifferent individuals should be responsible for related activities.The responsibility for record-keeping for an asset should be separate from the physical custody of that asset.LO 2Principles of Internal Control Activities第10頁,共72頁。Companies should use prenumbered documen

12、ts, and all documents should be accounted for.Employees should promptly forward source documents for accounting entries to the accounting department.LO 2DOCUMENTATION PROCEDURESPrinciples of Internal Control Activities第11頁,共72頁。PHYSICAL CONTROLSPrinciples of Internal Control ActivitiesIllustration 7

13、-2Physical controlsLO 2第12頁,共72頁。Records periodically verified by an employee who is independent.Discrepancies reported to management.INDEPENDENT INTERNAL VERIFICATIONIllustration 7-3Comparison of segregation of duties principle withindependent internal verification principleLO 2Principles of Intern

14、al Control Activities第13頁,共72頁。HUMAN RESOURCE CONTROLSBond employees who handle cash.Rotate employees duties and require vacations.Conduct background checks.LO 2Principles of Internal Control Activities第14頁,共72頁。QuestionThe principles of internal control do not include:establishment of responsibilit

15、y.documentation procedures.management responsibility.independent internal verification.LO 2Principles of Internal Control Activities第15頁,共72頁。The Missing ControlEstablishment of responsibility. The healthcare company did not adequately restrict the responsibility for authorizing and approving claims

16、 transactions. The training supervisor should not have been authorized to create claims in the companys “l(fā)ive” system.Total take: $11 millionANATOMY OF A FRAUDMaureen Frugali was a training supervisor for claims processing at Colossal Healthcare. As a standard part of the claims processing training

17、program, Maureen created fictitious claims for use by trainees. These fictitious claims were then sent to the accounts payable department. After the training claims had been processed, she was to notify Accounts Payable of all fictitious claims, so that they would not be paid. However, she did not i

18、nform Accounts Payable about every fictitious claim. She created some fictitious claims for entities that she controlled (that is, she would receive the payment), and she let Accounts Payable pay her.LO 2第16頁,共72頁。The Missing ControlSegregation of duties. The university had not properly segregated r

19、elated purchasing activities. Lawrence was ordering items, receiving the items, and receiving the invoice. By receiving the invoice, he had control over the documents that were used to account for the purchase and thus was able to substitute a fake invoice.Total take: $475,000ANATOMY OF A FRAUDLawre

20、nce Fairbanks, the assistant vice-chancellor of communications at Aesop University, was allowed to make purchases of under $2,500 for his department without external approval. Unfortunately, he also sometimes bought items for himself, such as expensive antiques and other collectibles. How did he do

21、it? He replaced the vendor invoices he received with fake vendor invoices that he created. The fake invoices had descriptions that were more consistent with the communications departments purchases. He submitted these fake invoices to the accounting department as the basis for their journal entries

22、and to the accounts payable department as the basis for payment.LO 2第17頁,共72頁。The Missing ControlSegregation of duties. Aggasiz Construction Company did not properly segregate record-keeping from physical custody. Angela had physical custody of the blank checks, which essentially was control of the

23、cash. She also had record-keeping responsibility because she prepared the bank reconciliation.Total take: $570,000ANATOMY OF A FRAUDAngela Bauer was an accounts payable clerk for Aggasiz Construction Company. She prepared and issued checks to vendors and reconciled bank statements. She perpetrated a

24、 fraud in this way: She wrote checks for costs that the company had not actually incurred (e.g., fake taxes). A supervisor then approved and signed the checks. Before issuing the check, though, she would “white-out” the payee line on the check and change it to personal accounts that she controlled.

25、She was able to conceal the theft because she also reconciled the bank account. That is, nobody else ever saw that the checks had been altered.LO 2第18頁,共72頁。The Missing ControlDocumentation procedures. Mod Fashions should require the original, detailed receipt. It should not accept photocopies, and

26、it should not accept credit card statements. In addition, documentation procedures could be further improved by requiring the use of a corporate credit card (rather than a personal credit card) for all business expenses.Total take: $75,000ANATOMY OF A FRAUDTo support their reimbursement requests for

27、 travel costs incurred, employees at Mod Fashions Corporations design center were required to submit receipts. The receipts could include the detailed bill provided for a meal, or the credit card receipt provided when the credit card payment is made, or a copy of the employees monthly credit card bi

28、ll that listed the item. A number of the designers who frequently traveled together came up with a fraud scheme: They submitted claims for the same expenses. For example, if they had a meal together that cost $200, one person submitted the detailed meal bill, another submitted the credit card receip

29、t, and a third submitted a monthly credit card bill showing the meal as a line item. Thus, all three received a $200 reimbursement.LO 2第19頁,共72頁。The Missing ControlTotal take: $240,000ANATOMY OF A FRAUDAt Centerstone Health, a large insurance company, the mailroom each day received insurance applica

30、tions from prospective customers. Mailroom employees scanned the applications into electronic documents before the applications were processed. Once the applications are scanned they can be accessed online by authorized employees. Insurance agents at Centerstone Health earn commissions based upon su

31、ccessful applications. The sales agents name is listed on the application. However, roughly 15% of the applications are from customers who did not work with a sales agent. Two friendsAlex, an employee in record keeping, and Parviz, a sales agentthought up a way to perpetrate a fraud. Alex identified

32、 scanned applications that did not list a sales agent. After business hours, he entered the mailroom and found the hardcopy applications that did not show a sales agent. He wrote in Parvizs name as the sales agent and then rescanned the application for processing. Parviz received the commission, whi

33、ch the friends then split.LO 2第20頁,共72頁。The Missing ControlPhysical controls. Centerstone Health lacked two basic physical controls that could have prevented this fraud. First, the mailroom should have been locked during nonbusiness hours, and access during business hours should have been tightly co

34、ntrolled. Second, the scanned applications supposedly could be accessed only by authorized employees using their passwords. However, the password for each employee was the same as the employees user ID. Since employee user-ID numbers were available to all other employees, all employees knew all othe

35、r employees passwords. Unauthorized employees could access the scanned applications. Thus, Alex could enter the system using another employees password and access the scanned applications.Total take: $240,000LO 2第21頁,共72頁。The Missing ControlIndependent internal verification. Bobbi Jeans boss should

36、have verified her expense reports. When asked what he thought her expenses were, the boss said about $10,000. At $115,000 per year, her actual expenses were more than ten times what would have been expected. However, because he was “too busy” to verify her expense reports or to review the budget, he

37、 never noticed.Total take: $275,000ANATOMY OF A FRAUDBobbi Jean Donnelly, the office manager for Mod Fashions Corporations design center, was responsible for preparing the design center budget and reviewing expense reports submitted by design center employees. Her desire to upgrade her wardrobe got

38、the better of her, and she enacted a fraud that involved filing expense-reimbursement requests for her own personal clothing purchases. She was able to conceal the fraud because she was responsible for reviewing all expense reports, including her own. In addition, she sometimes was given ultimate re

39、sponsibility for signing off on the expense reports when her boss was “too busy.” Also, because she controlled the budget, when she submitted her expenses, she coded them to budget items that she knew were running under budget, so that they would not catch anyones attention.LO 2第22頁,共72頁。The Missing

40、 ControlHuman resource controls. Ellen, the desk manager, had been fired by a previous employer. If the Excelsior Inn had conducted a background check, it would not have hired her. The fraud was detected when Ellen missed work due to illness. A system of mandatory vacations and rotating days off wou

41、ld have increased the chances of detecting the fraud before it became so large.Total take: $95,000ANATOMY OF A FRAUDEllen Lowry was the desk manager and Josephine Rodriquez was the head of housekeeping at the Excelsior Inn, a luxury hotel. The two best friends were so dedicated to their jobs that th

42、ey never took vacations, and they frequently filled in for other employees. In fact, Ms. Rodriquez, whose job as head of housekeeping did not include cleaning rooms, often cleaned rooms herself, “just to help the staff keep up.” Ellen, the desk manager, provided significant discounts to guests who p

43、aid with cash. She kept the cash and did not register the guest in the hotels computerized system. Instead, she took the room out of circulation “due to routine maintenance.” Because the room did not show up as being used, it did not receive a normal housekeeping assignment. Instead, Josephine, the

44、head of housekeeping, cleaned the rooms during the guests stay.LO 2第23頁,共72頁。Internal Control and the Role of Human ResourcesCompanies needs to keep track of employees degrees and certifications to ensure that employees continue to meet the specified requirements of a job. Also, to ensure proper emp

45、loyee supervision and proper separation of duties, companies must develop and monitor an organizational chart. When one corporation went through this exercise it found that out of 17,000 employees, there were 400 people who did not report to anyone. The corporation had 35 people who reported to each

46、 other. In addition, if an employee complains of an unfair firing and mentions financial issues at the company, the human resources department must refer the case to the company audit committee and possibly to its legal counsel.LO 2ACCOUNTING ACROSS THE ORGANIZATION第24頁,共72頁。Costs should not exceed

47、benefit.Human element.Size of the business. HELPFUL HINTControls may vary with the risk level of the activity. For example, management may consider cash to be high risk and maintaining inventories in the stockroom as lower risk. Thus, management would have stricter controls for cash.Limitations of I

48、nternal ControlLO 2第25頁,共72頁。Identify which control activity is violated in each of the following situations.The person with primary responsibility for reconciling the bank account and making all bank deposits is also the companys accountant. Wellstone Companys treasurer received an award for distin

49、guished service because he had not taken a vacation in 30 years. In order to save money on order slips and to reduce time spent keeping track of order slips, a local bar/restaurant does not buy prenumbered order slips.Segregation of dutiesHuman resource controlsDocumentation proceduresSOLUTIONLO 2DO

50、 IT!第26頁,共72頁。Cash Receipt ControlsLO 3Illustration 7-4Application of internal controlprinciples to cash receiptsCash ControlsLearning Objective 3 Explain the applications of internal control principles to cash receipts.第27頁,共72頁。Cash Receipt ControlsIllustration 7-4Application of internal controlpr

51、inciples to cash receiptsLO 3第28頁,共72頁。Important internal control principlesegregation of record-keeping from physical custody.OVER-THE-COUNTER RECEIPTSCash Receipt ControlsIllustration 7-5Control of over-the-counterreceiptsLO 3第29頁,共72頁。MAIL RECEIPTSMail receipts should be opened by two people, a l

52、ist prepared, and each check endorsed “For Deposit Only.” Each mail clerk signs the list to establish responsibility for the data. Original copy of the list, along with the checks, is sent to the cashiers department. Copy of the list is sent to the accounting department for recording. Clerks also ke

53、ep a copy.Cash Receipt ControlsLO 3第30頁,共72頁。QuestionPermitting only designated personnel such as cashiers to handle cash receipts is an application of the principle of:segregation of duties.establishment of responsibility.independent internal verification.human resource controls.LO 3Cash Receipt Co

54、ntrols第31頁,共72頁。Generally, internal control over cash disbursements is more effective when companies pay by check or electronic funds transfer (EFT) rather than by cash.Applications:Voucher System ControlsPetty Cash FundCash Disbursement ControlsLO 4Learning Objective 4 Explain the applications of i

55、nternal control principles to cash disbursements.第32頁,共72頁。Cash Disbursement ControlsIllustration 7-6Application of internal controlprinciples to cash disbursementsLO 4第33頁,共72頁。Illustration 7-6Application of internal controlprinciples to cash disbursementsLO 4Cash Disbursement Controls第34頁,共72頁。Que

56、stionThe use of prenumbered checks in disbursing cash is an application of the principle of:establishment of responsibility.segregation of duties.physical controls.documentation procedures.Cash Disbursement ControlsLO 4第35頁,共72頁。VOUCHER SYSTEM CONTROLS A network of approvals by authorized individual

57、s, acting independently, to ensure all disbursements by check are proper.A voucher is an authorization form prepared for each expenditure in a voucher system.Cash Disbursement ControlsLO 4第36頁,共72頁。Petty Cash Fund - Used to pay small amounts.Involves:establishing the fund, making payments from the f

58、und, and replenishing the fund.Petty Cash Fund ControlsLO 5Learning Objective 5Describe the operation of a petty cash fund.第37頁,共72頁。Illustration: If Zhu Ltd. decides to establish a NT$3,000 fund on March 1, the journal entry is:Petty Cash3,000Mar. 1Cash 3,000ESTABLISHING THE PETTY CASH FUNDLO 5第38頁

59、,共72頁。Management usually limits the size of expenditures.Does not permit use of the fund for certain types of transactions.Payments are documented on a prenumbered receipt. Signatures of both the custodian and the individual receiving payment are required on the receipt. Supporting documents should

60、be attached to the receipt.Custodian keeps the receipts in the petty cash box until the fund is replenished. Sum of the receipts and money in the fund should equal the established total at all times.MAKING PAYMENTS FROM PETTY CASHLO 5第39頁,共72頁。Illustration: Assume that on March 15 Zhus petty cash cu

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

評(píng)論

0/150

提交評(píng)論