Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
16 Cards in this Set
- Front
- Back
ERM Framework: Internal Environment |
The company culture that influences how organizations establish strategies and objectives, structure business activities, and identify, assess, and respond to risk. |
|
ERM Framework: Objective Setting |
2nd ERM component that management determines what the company hopes to achieve as the corporate vision or mission. |
|
ERM Framework: Event Identification |
An incident or occurrence emanating from internal or external sources that affects implementation of strategy or achievement of objectives. |
|
ERM Framework: Risk Assessment |
To align identified risks with the company's tolerance for risk by likelihood, positive and negative impacts, individually and by category, their effect on other organizational units, and on an inherent and a residual basis. |
|
ERM Framework: Risk Response |
Management can respond to risk by reduce, accept, share, and avoid risk. |
|
ERM Framework: Control Activities |
Policies and procedures that provide reasonable assurance that control objectives are met and risk responses are carried out. |
|
ERM Framework: Information & Communication |
Relates directly to the primary purpose of an AIS, which is to gather, record, process, store, summarize, and communicate information about an organization. |
|
ERM Framework: Monitoring |
Perform ERM evaluations, implement effective supervision, use responsibility accounting systems, and monitor system activities. |
|
Revenue Cycle: Sales Order Entry |
Threats: - Incomplete/inaccurate orders - Invalid orders
Controls: - Restriction of access to master data - Digital signatures or written signatures |
|
Revenue Cycle: Shipping |
Threats: - Picking the wrong items or the wrong quantity - Theft of inventory
Controls: - Bar code and RFID technology - Restriction of physical access to inventory |
|
Revenue Cycle: Billing |
Threats: - Failure to bill - Billing Error
Controls: - Separation of billing and shipping functions - Configuration of system to automatically enter pricing data |
|
Revenue Cycle: Cash Collection |
Threats: - Theft of cash - Cash flow problems
Controls: - Separation of cash handling function from AR and credit functions - Cash flow budget |
|
Expenditure Cycle: Ordering |
Threats: - Inaccurate inventory records - Purchasing items not needed
Controls: - Bar coding or RFID tags - Review and approval of purchases requisitions
|
|
Expenditure Cycle: Receiving |
Threats: - Mistakes in counting - Verifying receipt of services
Controls: - Require receiving employees to sign receiving report - Audits |
|
Expenditure Cycle: Approving Supplier Invoices |
Threats: - Errors in supplier invoices - Mistakes in posting to AP
Controls: - Verification of invoice accuracy - Reconciliation of detailed AP records with the general ledger control account
|
|
Expenditure Cycle: Cash Disbursements |
Threats: - Failure to take advantage of discounts for prompt payment. - Paying for items not received.
Controls: - Filing of invoices by due date for discounts. - Requiring that all supplier invoices be matched to supporting documents that are acknowledged by both receiving and inventory control. |