/*! This file is auto-generated */ .wp-block-button__link{color:#fff;background-color:#32373c;border-radius:9999px;box-shadow:none;text-decoration:none;padding:calc(.667em + 2px) calc(1.333em + 2px);font-size:1.125em}.wp-block-file__button{background:#32373c;color:#fff;text-decoration:none} Problem 5 The COSO framework identifies fi... [FREE SOLUTION] | 91Ó°ÊÓ

91Ó°ÊÓ

The COSO framework identifies five internal control components Which of the following is not L02 one of the five components: a. segregation of duties b. risk assessment c. monitoring activities d. control activities

Short Answer

Expert verified
a. Segregation of duties

Step by step solution

01

Read and Understand the Question

The question asks us to identify which of the given options is not one of the five internal control components identified in the COSO framework. We need to review these components to pick the option that doesn't belong.
02

Recall the COSO Framework Components

The COSO framework's five internal control components are: Control Environment, Risk Assessment, Control Activities, Information & Communication, and Monitoring Activities.
03

Compare List of Options to COSO Components

We need to compare each option with the COSO components: - (a) Segregation of duties - (b) Risk assessment - (c) Monitoring activities - (d) Control activities. Risk assessment and control activities match directly with COSO components. Monitoring activities also match. However, segregation of duties is a practice within control activities, not a component itself.
04

Identify the Correct Answer

From Step 3, we identify that 'segregation of duties' is not a standalone component of the COSO framework itself. It is rather an aspect of control activities. Thus, it doesn't belong to the list of five main components.

Unlock Step-by-Step Solutions & Ace Your Exams!

  • Full Textbook Solutions

    Get detailed explanations and key concepts

  • Unlimited Al creation

    Al flashcards, explanations, exams and more...

  • Ads-free access

    To over 500 millions flashcards

  • Money-back guarantee

    We refund you if you fail your exam.

Over 30 million students worldwide already upgrade their learning with 91Ó°ÊÓ!

Key Concepts

These are the key concepts you need to understand to accurately answer the question.

Internal Control Components
The Committee of Sponsoring Organizations of the Treadway Commission (COSO) Framework is a widely used model designed to help organizations develop and maintain effective internal controls. These controls are essential for ensuring financial integrity and operational efficiency. The COSO Framework identifies five main internal control components that serve as the backbone of any sound internal control system. These components are:
  • Control Environment
  • Risk Assessment
  • Control Activities
  • Information and Communication
  • Monitoring Activities
Each of these components plays a crucial role in ensuring that an organization's operations are efficient, risk is managed effectively, and the objectives are achieved. Understanding these components helps organizations not only prevent fraud and errors but also enhance business performance by providing reliable data.
Risk Assessment
Risk Assessment is one of the key components of the COSO Framework. It involves a dynamic and iterative process for identifying and evaluating risks that might affect an organization’s ability to achieve its objectives. The essence of risk assessment is about understanding the uncertainties an organization faces and forming strategies to mitigate them.

Some crucial aspects of effective risk assessment include:
  • Identifying and analyzing potential risks across different areas of the organization.
  • Evaluating the likelihood and impact of these risks.
  • Developing control measures to manage risk exposure.
It's important for organizations to regularly update their risk assessments to adapt to the changing internal and external environments. This continuous evaluation ensures the organization stays ahead of potential risks that could hinder its performance.
Control Activities
Control Activities are the actions and measures that are implemented to address the risks identified during the risk assessment process. These activities are designed to ensure that management’s directives are carried out and strategies are executed effectively.

Examples of control activities include:
  • Segregation of duties to reduce the risk of errors or fraud.
  • Authorization and approval procedures to control decisions.
  • Physical controls, such as locks and security systems, to protect assets.
  • Documentation and records maintenance to ensure transparency and accountability.
By integrating these activities into their daily operations, organizations can develop a structured approach to risk management and promote an accountable workplace culture. Control activities function as direct actions to ensure that the organization’s objectives are achieved effectively.
Monitoring Activities
Monitoring Activities are crucial as they ensure that internal controls are functioning as intended and the organization's objectives are being met. These activities involve ongoing evaluations and separate evaluations. They help in assessing the quality of the system's performance over time.

Monitoring activities include:
  • Regular internal and external audits to evaluate controls.
  • Conducting performance reviews to assess the effectiveness of controls.
  • Utilizing feedback loops to continuously refine controls.
Effective monitoring activities help organizations adjust and strengthen their internal control systems. This ongoing process ensures that any deficiencies are identified and corrected promptly, thereby supporting the organization in achieving its objectives and maintaining compliance with regulatory requirements.

One App. One Place for Learning.

All the tools & learning materials you need for study success - in one app.

Get started for free

Most popular questions from this chapter

The Fraud Triangle Each of the following is part of the fraud triangle except: a. pressure. b. opportunity. c. concealment. d. rationalization. L01

Explain why supervision is an important internal control.

Internal Control The Mountain amusement ride has the following system of intemal control over cash receipts. All persons pay the same price for a ride. A person taking the ride pays cash to the cashier and receives a prenumbered ticket. The tickets are issued in strict number sequence. The individual then walks to the ride site, hands the ticket to a ticket-taker (who controls the number of people getting on each ride), and passes through a tumstile. At the end of each day, the beginning ticket number is subtracted from the ending ticket number to determine the number of tickets sold. The cash is counted and compared with the number of tickets sold. The turnstile records how many people pass through it. At the end of each day, the beginning turnstile count is subtracted from the ending count to determine the number of riders that day. The number of riders is compared with the number of tickets sold. Required Which internal control feature would reveal each of the following irregularities? a. The ticket-taker lets her friends on the ride without tickets. b. The cashier gives his friends tickets without receiving cash from them. c. The cashier gives too much change. d. The ticket-taker returns the tickets she has collected to the cashier. The cashier then resells these tickets and splits the proceeds with the ticket- taker. e. A person sneaks into the ride line without paying the cashier.

Internal Control Each of the following lettered paragraphs briefly describes an independent situa- L02, 4 tion involving some aspect of internal control. Required Answer the questions at the end of each paragraph or numbered section. a. Robert Flynn is the office manager of Oakwood Company, a small wholesaling company. Flynn opens all incoming mail, makes bank deposits, and maintains both the general ledger and the accounts receivable subsidiary ledger. An assistant records transactions in the credit sales journal and the cash receipts journal. The assistant also prepares a monthly statement for each customer and mails the statements to the customers. These statements list the beginning balance, credit sales, cash receipts, adjustments, and ending balance for the month. 1\. If Flynn stole Customer A's \(200 check (payment in full) and made no effort to conceal his embezzlement in the ledgers, how would the misappropriation be discovered? 2\. What routine accounting procedure would disclose Flynn's \)200 embezzlement in part (1), even if Flynn destroyed Customer A's subsidiary ledger account? 3\. What circumstances might disclose Flynn's theft if he posted a payment to Customer A's account in the accounts receivable subsidiary ledger and set up a $200 account for a fictitious customer? 4\. In part (3), why might Flynn be anxious to open the mail himself each morning? 5\. In part (3), why might Flynn want to have the authority to write off accounts considered uncollectible? b. A bagel shop uses a cash register that produces a printed receipt for each sale. The register also prints each transaction on a paper tape that is locked inside the cash register. Only the supervisor has access to the cash-register tape. A prominently displayed sign promises a free bagel to any customer who is not given a cash-register receipt with his or her purchase. How is this procedure an internal control device for the bagel shop? c. Jason Philber, a swindler, sent several businesses invoices requesting payment for office supplies that had never been ordered or delivered to the businesses. A 5 percent discount was offered for prompt payment. What internal control procedures should prevent this swindle from being successful? d. The cashier for Downtown Cafeteria is located at the end of the food line. After customers have selected their food items, the cashier rings up the prices of the food and the customer pays the bill. The customer line frequently stalls while the person paying searches for the correct amount of cash. To speed things up, the cashier often collects money from the next customer or two who have the correct change without ringing up their food on the register. After the first customer finally pays, the cashier rings up the amounts for the customers who have already paid. What is the internal control weakness in this procedure? How might the internal control over the collection of cash from the cafeteria customers be strengthened?

Internal Control Listed below are (a) four potential errors or problems that could occur in the processing of cash transactions and (b) internal control principles. For each error or problem, identify an internal control principle that could reduce the chance of the error or problem occurring. You may also cite more than one principle if more than one applies, or write none if none of the principles will correct the error or problem. 1\. Three cashiers use one cash register and the cash in the drawer is often short of the recorded balance. 2\. The same employee is responsible for opening the mail, listing any checks received, preparing the deposit receipt, and recording to the accounts receivable journal. Several customers have complained that their balances are incorrect. 3\. In an effort to save printing costs, generic receipts without numbers are used for customer sales. 4\. Because things have been hectic, no budgets were prepared this year. One department seems to be doing less volume in revenue, but cost of goods sold appear to be high relative to sales. Internal control principles: a. Establish clear lines of authority and responsibility. b. Segregation of duties. c. Hire competent personnel. d. Use control numbers on all business documents. e. Develop plans and budgets. f. Maintain adequate accounting records. g. Provide physical and electronic controls. h. Conduct internal audits.

See all solutions

Recommended explanations on Math Textbooks

View all explanations

What do you think about this solution?

We value your feedback to improve our textbook solutions.

Study anywhere. Anytime. Across all devices.