Notes module
Notes module
AIN1501
Unit 6
Big data
1 Introduction
-We are indeed in one of the fastest-changing technology phases in human history.
-Big Data is a term for a collection of data which is so large that it becomes difficult to
store and process using traditional databases and data-processing applications
-It describes data sets so large and varied they are beyond the capability of traditional
data processing -Companies are experiencing a rapid growth in the volume of data.
-This data is sourced from different areas of the business, for example, transactional
data and access to trillions of bytes of information about customers, vendors,
employees, operational and productive process.
-Big Data often also includes more than simply financial information and can involve
other organisational data (both internal and external), which is often unstructured.
-Data that inputs into Big Data systems can include social network traffic, web server
logs, traffic
-As the world is increasingly moving towards digitisation (and especially through the
growth of the internet), almost all information relating to the organisation and its
environment can be stored electronically.
-The amount of data which businesses must store and interrogate has increased at an
exponential rate, requiring new tools and techniques to make the most of them.
- Leveraging this resource for visualisation, structure and support, optimal decision-
making has become a commercialised privilege for many companies.
-Visualisation tools like Power Bi and SAP Lumira have become a well-used tool
amongst companies with substantial data lakes (systems of repository of data stored
in its natural or raw format) that want to sort and visualise it in an easy and
understandable way.
-This includes the amount of personal data available to and used by organisations.
-In this regard, the privacy, sensitivity and security of data are significant
considerations in modern
business.
-In the context of the organisation, privacy refers to all information that is considered
confidential and in need of protection from public disclosure.
-The Protection of Personal Information Act (POPIA) provides for a general prohibition
on the processing of special personal information.
• Volume – this refers to the significant amount of data that the organisation needs to
store and process.
• Variety – Big Data can come from numerous sources. Bv. users’ browser and search
histories, viewing habits and purchase histories.
• Veracity (truthfulness) – it is vital that the organisation gathers data that is accurate.
Failure to do so will make analysis meaningless.
-Big Data comes in two main forms, namely, structured and unstructured.
-Structured data is deliberately produced and collected for a specific purpose and
therefore exhibits a clear, deliberate structure.
-For instance, feedback data when people are requested to rate a service or product.
-Every two years, the volume and variety of computer-generated data double, and
most of it originates from unstructured (because it is raw) data such as e-mails,
Twitter, Facebook, posts, and images.
- Using Big Data enables companies to gain insight into customer preferences and
purchasing behaviour, affording them an enormous advantage when customising
products and services, specific to the respective individual.
-Industrial Big Data uses the same phenomenon as ordinary big data, but data is
generated by
-the principal sources of these two forms of data are classified as follows:
• Human-sourced data – billions of data points are produced every day from social
media, text messages, web browsing, e-mails, and so forth.
Sensors built into all aspects of modern technology, log and upload data constantly.
Home assistants, smart meters, TV boxes and cars are a small selection of items
producing machine-generated data.
• Open data – Publicly available data stemming from sources such as governments,
the public sector, and national statistics agencies.
• Driving innovation by reducing the time taken to answer key business questions,
thus speeding up decision-making.
A recent study by Bain & Co (2013) suggested that, of 400 large companies, those
that had adopted Big Data analytics have gained a significant market advantage.
-Extra challenges arise because of the huge volume of data and information that need
to be protected, the variety of sources, types of information and the speed with which
it is updated.
-Making use of it can be challenging, but also making sure that it is accessible,
trustworthy and private can become very costly
-As mentioned before, one of the difficulties with Big Data is the ability to convert it
touseful information.
- To help with this, several new open-source platforms have emerged to help
organisations make sense of Big Data, such as Hadoop and Cassandra, though these
may be difficult to integrate with existing data warehouses.
-New roles and careers are also emerging in business, such as “data scientists” (data
analysts), whose role is to help the organisation derive meaning from the data it
stores.
-However, due to the rapidly changing nature of Big Data analysis, there is a shortage
of skills and support for these systems.
-It is important to realise that just because something CAN be measured, this does not
mean it should be.
-There is a risk that valuable time and money will be spent measuring relationships
and information that has no value for the organisation.
- The organisation needs to consider how to keep its data secure from viruses and
hackers.
-This stimulates the question of whether the organisation actually owns the data on
individuals it has
collected.
-There may be legal (data protection) and privacy issues if it holds large amounts of
data on potential customers
3 Data analytics
- Various software can be used to conduct analysis of Big Data, which could increase
efficiency in jobs.
-The presence of various advanced technologies like Big Data, 3D printing, drones,
virtual reality, and the Internet of Things can benefit work and people.
- In the pre-technology era when humans worked manually, people gradually started
looking for data, receiving data (inputs), albeit limited and few, and processing them
into information.
-But now, with the existence of the internet where one can connect many objects and
devices, companies can receive large amounts of data (Big Data), and machines do
not require human performance to complete a lot of work in a limited time
-Thus, data analytics is the process of collecting, organising and analysing large sets
of data (Big Data) to discover patterns and other information which an organisation
can use to inform future decisions.
the data analysis process includes the following:
• Organisation of data – Once the data has been captured, it needs to be organised
and stored for future use, often using data warehousing facilities.
-This can be used to improve competitive position and potentially gain competitive
advantage over rivals.
-an organisation can realise the following benefits from effective data analytics:
• Fresh insight and understanding – Seeing underlying patterns through the intelligent
use of data can give insight into how a business operates and reveal issues that
management may not have known existed.
• Market segmentation and customisation – Refining customer groups into ever more
specific segments and understanding the wants and needs of those groups can lead to
increased personalisation and customisation of products and services.
• Innovation – Existing products can be improved from understanding the features and
elements that customers enjoy and use. This can also lead to the development of new
products.
• Risk management – Risk management and control are vital in the effective running
of any organisation. The use of data can enhance all stages of the risk management
process.
-Big Data techniques are not as widely used by professional accountants as in other
related fields.
- In a Big Data environment, the professional accountant has the potential to perform
more advanced
projections analysis
- However, they lacked real influence over business decisions and strategy
-The management accounting role has been researched in several different settings in
the last century.
-The time for bean counters has passed. Management accountants are perceived as a
strategic partner with influence in decision-making. In this regard, the prominent view
of MAs having a binary role as either “bean counter” or “business partner” – in some
cases switching between these two – is ignoring the possibility of incoherent role
development within different contexts .
-MAs’ role in production is evolving – they have different backgrounds, skills and
mindsets. This new form is labelled as an adaptive form, because they no longer
belong to either group, but rather just adapt to different contexts.
-Thus, the role of MAs will eventually look different based on the production
environment (PE).
-They will no longer be labelled according to a binary role, but will rather be defined by
the work they do. MAs in these settings are no longer just conducting analyses; they
are contributing as designers and developers of dashboards.
-This emphasises the effective utilisation of MAs so that they can reach the desired
goal of optimisation and cost reduction
5 Summary
-the amount of data which businesses must store and interrogate has increased at an
exponential rate, requiring new tools and techniques to make the most of them.
-In this regard, understanding the potential value of data and its significance to an
organisation presents a real opportunity to gain unique insight.
- This can be used to improve competitive position and potentially gain competitive
advantage
over rivals.
-Big Data techniques in the accounting profession are not as widely used by
professional accountants as in other related fields.
-Modern engagements in the accounting profession often imply reviewing clients using
Big Data in order to remain competitive and relevant in the market.
-In a Big Data environment, the professional accountant has the potential to perform
more advanced projections analysis.
-Big Data often also entails more than simply financial information and can involve
other organisational data (both internal and external), which is often unstructured.
-various software can be used to conduct analyses of Big Data, which could increase
job efficiency. Advanced technologies (e.g., Big Data, 3D printing, drones, virtual
reality, the Internet of Things) can help the work environment and people in their
activities.
LEARNING UNIT 11
ACCOUNTING IN TECHNOLOGY
1 Introduction
2 Blockchain
4 Enterprise systems
5 SAP
7 Oracle
7.1 Oracle Database
7.5 Pastel
8.1 E-commerce
8.5 Digitalisation
8.10 Solutions
9 Current trends
10 Cryptocurrencies
11 Summary
1 Introduction
-Many would argue that we have left the industrial age behind, and the information
age has taken over
2 Blockchain
-The main benefit of blockchain is security. In the digital era, cybersecurity is a key risk
-This is because traditional systems have been “closed”, and so modifications to data
have been carried out by just one party.
-If the system is hacked, there is little control over such modification to prevent it from
happening
recorded by not just two parties, but instead by all of the parties that make up the
overall chain.
-This can happen because all the records in the blockchain are publicly available and
distributed to everyone that is part of that network.
• When a transaction takes place (e.g., between a buyer and a seller), the details of
that deal are recorded by everyone – the value, the time, the date and the details of
those parties involved.
-All the ledgers that make up the blockchain are updated in the same way, and it
takes the agreement of all participants in the chain to update their ledgers for the
transaction to be accepted.
-If all the computers review the transaction and verify that the details are correct, the
systems of all participants in the blockchain have updated records.
-The computers work together to ensure that each transaction is valid before it is
added to the blockchain.
-This decentralised network of computers ensures that a single system cannot add
new blocks to the chain.
• When a new block is added to a blockchain, it is linked to the previous block using a
cryptographic hash generated from the contents of the previous block.
-This ensures that the chain is never broken and that each block is permanently
recorded.
-It is intentionally difficult to alter past transactions in the blockchain because all the
subsequent blocks must be altered first.
• It is this control aspect of blockchain technology which addresses the main concern
of cybersecurity.
-If anyone should attempt to interfere with a transaction, it will be rejected by those
network parties making up the blockchain whose role it is to verify the transaction.
-If just one party disagrees, the transaction will not be recorded.
1.Transaction is requested.
-For accountants, using blockchain provides clarity over ownership of assets and
existence of obligations and can dramatically improve efficiency. Ultimately,
blockchain provides an unalterable, transparent record of all accountancy-related
data.
-Examples of how blockchain can enhance the accounting profession include the
following :
• Providing absolute certainty over the ownership and history of assets, the existence
of obligations and the measurement of amounts owed to a business and owed by a
business
-The phrase Fourth Industrial Revolution (4IR) is defined as the advent of a “cyber-
physical system” (CPS) involving entirely new capabilities of people and machines.
-While these capabilities are reliant on the technologies and infrastructure of the Third
Industrial Revolution (3IR), 4IR represents entirely new ways in which technology
becomes embedded in societies and even our human bodies.
-Thus, the 4IR is the age that represents revolutionary changes to everything and
describes the phenomenon as it aptly applies to both the technical shift of the Second
Machine Age (2MA) and how people will live in it.
-In the 2MA, the technological progress in digital hardware, software and networks is
about automation of knowledge.
-It is underpinned by
-Therefore, the 4IR can be generalised as ‘‘a rapid and major change in an economy,
driven by a shift in the methods and types of work undertaken’’.
-It is a new phase where the fusion of several technologies is not only automating
production, but also knowledge.
-Thus, the changes that are occurring, are happening now because humans have
finally developed the computing capacity to store massive amounts of data which in
turn enable machine learning.
-The outcome of this is the development of the Cyber-Physical System (CPS), which
emerged in Germany around 2000.
-In 2016, the 4IR officially sounded an alarm that labour costs were about to be
disrupted and the way we live and work would be permanently altered by the
introduction of CPS
-The term “cyber-physical system” was coined in 2006 by the US National Science
Foundation (USNSC), with the hosting of several workshops on artificial intelligence
(AI) and robotics.
-CPSs are physical and engineered systems where operations are monitored,
coordinated, controlled and integrated by a computing and communication core.
-How we live and work is transformed by CPS and other new technologies such as 3D-
printing, the Internet of Things, blockchain and artificial intelligence.
- Just as the internet transformed how humans interact with one another, CPS
transforms how we
-Technologies emerged and are emerging that affect our lives in ways that are
unimaginable
-The First Industrial Revolution (4IR) occurred roughly between 1760 and 1830.
-It entailed a shift from our reliance on animals, human effort and biomass as primary
source of energy to the use of fossil fuels and mechanical power.
-The Second Industrial Revolution (2IR) took place from 1870 to 1914, thus between
the end of the 19th century and the first two decades of the 20th century.
-It was characterised by the division of labour, the generation of electricity, and mass
production.
-Third Industrial Revolution (3IR): It began in the 1950s with the development of digital
systems, communication, and rapid advances in computing power, which have
enabled new ways of generating, processing and sharing information.
- It also emerged with the development of Information Technology (IT) and electronics,
which enabled more efficient production.
- It saw a move from mechanical and analogue technology to the digital technology of
today and is known as the Digital Revolution.
• Fusion – cyber and physical systems will continue to fuse, becoming increasingly
autonomous
• Improved asset management – benefits to the natural world through more efficient
use of natural assets, a shift to renewables, innovations in recycling, coupled with
digitisation, are anticipated to benefit the natural world.
-The most discussed issue is the potential for 4IR to increase unemployment, and thus
drive inequality.
-Many of the new jobs that will exist even ten years from now cannot be predicted or
imagined yet. However, it is predicted that the well-paying jobs are expected to
involve creativity, data analytics and cybersecurity, as there is dearth of talent in this
area.
- What is known is that the skills needed to take full advantage of the automation
economy are different from those that have been emphasised by higher education
(HE) institutions in the past.
- According to the World Economic Forum (WEF) “Future of Jobs” report, the top ten
skills that will be needed in order of priority by employers by 2020 are:
a. complex problem-solving
b. critical thinking
c. creativity
d. people management
f. emotional intelligence
h. service orientation
i. negotiation
j. cognitive flexibility
-Active listening and quality control, which were the skills identified as needed in
2015, are no longer needed and were replaced by cognitive flexibility and emotional
intelligence in 2020. This is because, as work becomes automated, it will also become
much more fluid, needing employees to be agile and able to jump between very
different types of tasks and contexts
• Inequality: The richest 1% of the population now owns half of all household wealth,
according to Credit Suisse’s Global Wealth Report of 2015. Oxfam’s new report
presents an even more dramatic concentration of assets, finding that 62 individuals
controlled more assets than the poorer 3.6 billion people combined, or half of the
world’s population.
-On the eve of the World Economic Forum, Sanders and Price 2018) revealed that
Australia’s richest 1% owned 23% of the country’s wealth. In the previous year, the
figure had risen to 22%, more than the bottom 70% combined.
• Security: Increasing inequality does not only affect production, mental health and
trust, but also creates security concerns for both citizens and states.
-The Forum’s Global Risks Report 2016 highlighted that a hyperconnected world, when
combined with rising inequality, could lead to fragmented segregation and social
unrest (Davis, 2016).
-This mix of factors creates the conditions for violent extremism and other security
threats enabled by power-shifting to non-state actors.
-The combination of a digital world with emerging technologies is creating new “battle
spaces” and expanding access to lethal technologies.
-This makes it harder to govern and negotiate among states to ensure peace.
• Identity, voice and community: As reflected above, 4IR is the first where the tools of
technology can become literally embedded within us and even purposefully change
who we are at the level of our genetic make-up.
-It is important that the emerging technologies of the 4IR increase diversity and the
potential for
-Emerging technologies, particularly in the biological realm, are also raising new
questions about what it means to be human.
a. Today’s learners of all ages are faced with major challenges in demographics,
population (both growing and shrinking), global health, literacy inequality, climate
change, nuclear proliferation and much more.
-Thus, as they leave university, the 4IR world makes significantly different demands on
them than
c.
Everyone is now responsible for lifelong learning and upskilling as the skills that will
carry one through as the content will always be changing.
h. Nearly everyone will work with AI; this means, what one majored in will not
determine one’s job or career. The content and a deep understanding of it matters,
but it is also about what one can do with it.
i. The information transferred through the traditional lecture and test format does not
get the student up very high in cognitive capacity ranks of higher-order thinking.
- Thus far, the change in HE has been considered inadequate, although some
institutions are trying to adapt.
-According to Stablings (2020), accounting and data processing are intertwined, but
the development of concepts that adequately reflect the changing situation is
delayed.
-During the last two decades, institutions have focused on integrated internal data
processing and receiving data from or transference to other institutions using
communication infrastructure. Now, the focus is on uploading data – fixed paper
documents – to computer media without using the keyboard, because this task
requires a lot of staff time and diligence.
-A study conducted by Gómez Méndez and Janampa Acuña (2020), intended to find
whether public accountants are qualified to face the 4IR and analyse the professional
skills of accounting to provide services in the digitalised economic entities in Peru,
reached the following conclusions:
a. Although the 4IR does not replace public accountants, they do require new skills.
-Thus, for chartered accountants (CAs), the arrival of the 4IR poses a dilemma
common to the profession.
c. Accountants (accounting and auditing professionals) are (in reality) not prepared to
take on and not ready to face the challenges of the 4IR.
-They seem to fail in critical thinking, analysis and solving complex problems.
d. Skills that continue to grow in importance towards 2022 include analytical thinking,
innovation, active learning and learning strategies, as well as human skills such as
creativity, originality and initiative.
e. The accounting profession must expand its horizons and open itself to the
internalisation of financial markets and the advances of ICT and big data, which are
required to meet the demands of business organisations and users of information.
-The users of information and big data and users of information topics are covered
comprehensively in learning units 1 and 6, respectively).
4 Enterprise systems
-These are accounting information systems (AIS). According to Klaus, Rosemann and
Gable (2000), enterprise systems are commercial software packages that enable
integration of transactions-oriented data and business process throughout an
organisation.
-They include enterprise resource planning (ERP), software and related packages, such
as advanced planning and scheduling sales force automation, and product
configuration.
-Many organisations prefer to use one computer system that can be used throughout
the organisation by integrating all the functions.
-In this regard, it integrates the data gathering and data processes of departments
and functions into one singIe system of integrated applications. It handles the vital
operations of the entire organisation and often includes some functions of the
strategic and technical level of the organisation as well.
-Examples of an ERP are SAP and Oracle .These will be dealt with below.
- This can involve improved information management through the promotion of access
to information, reducing duplication and improving predictive capabilities.
-One of these benefits is to achieve the financial goals of the company through
productivity gains and efficiency resulting from business process automation.
-AIS are fundamental for the recording of accounting transactions and for the
preparation of financial statements, as required by the legislation governing financial
accounting.
b. Although the application can imply the loss of some basic traditional accounting
skills, the requirements that are set before the accountants, are not reduced in scope
and complexity.
-A large part of routine accounting tasks are done centrally and automatically, while
the coordination and preparation of various operational reports are entrusted to the
ERP.
-Some of the traditional accounting tasks are transferred to other employees in the
enterprise, the most important being the issue of adequate high-quality information
support to management owing to ERP.
-On the basis of advanced technology, the so-called centres of excellence arise, that
is, the teams of specialists who perform more demanding tasks, such as statutory
(financial) and tax reporting, including internal audit.
-With the rise of implementation of ERP at the end of the 20th century and the
beginning of the 21st, public accountants have an imperative to develop new skills
and competencies to manage information systems.
- They must be broadly knowledgeable about digital data and achieve the valid
evaluation of the overdose of digital information.
-Increasingly, their work is becoming more complex. The more demanding role of
accountants implies high analytical ability of data interpretation, a broad knowledge
of the business and information technology, a willingness for teamwork, strategic
thinking, communication and interpersonal skills as well as the ability of ethical
evaluation and decision-making.
-On the other hand, management accountants are required to have a much higher
level of knowledge of multidisciplinary tasks
5 SAP
-As mentioned above in defining what an ERP is, through a single, comprehensive ERP
system, many companies have introduced new systems that help in upgrading and
managing their daily business, reserves, and processes, and linking the sections.
-The most famous such company is SAP, which produced a product that bears its
name (SAP). The SAP program, which began in 1972, was developed initially by three
German programmers working for
-Its main activity is to produce management programs that help enterprises improve
their businesses and connect them into one system.
-The objective was to ensure its coherence and efficiency without having to use
several software systems from different companies, which are expensive and most
often purchased by the largest companies.
-SAP has evolved the software until it has become a comprehensive program for all
sections of a company, whether small, medium or large.
-The applications in SAP are called modules and they are connected, but usually one
can buy one module or more separately according to one’s needs. It is now one of the
latest companies that provide practical business solutions (
-SAP was found to be one of the best, the most popular and the most widely accepted
ERP software in a study conducted in Serbia. However, results showed the following:
a. b. c. The process of implementation of SAP and its initial phases, is complex, and
more attention is devoted to configuring the basic modules.
-In one of enterprises surveyed, the implementation process itself has lasted for more
than 18 months and has still not ended. This resulted in simultaneously using both
SAP and the old software solution. Thus, a longer time necessary for the full
implementation of SAP can be conducted in a subsequent appearance of expected
effects.
-A time gap was identified between the moment of the implementation of the system
and the first positive effects less involved with data entry, thus allowing them to
undertake more analysis – as non-financial information is more extensive.
- A study was done by Malinic and Mirjana (2012), in relation to how management
accounting changed under the influence of ERP in industrial enterprise, given the
intensive application of ERP systems for the companies using SAP.
-It was concluded that SAP reduces the time required for the traditional tasks of
management accounting, while increasing the time required for the activities of data
analysis, performance measurement and subtle strategic reporting.
-Although SAP does impact the management accounting, that impact is relatively
modest in relation to the expectations.
7 Oracle
-Since Oracle database is a popular product, its performance will impact many
applications in information systems.
-Oracle is a relational database, attempting to stay the world leader and maintain the
biggest market share.
-But, in the early days in China, although a large relational database, generally only
large enterprises were able to use it.
-Along with the shared SQL, a multithread server system structure was introduced.
-This greatly reduced Oracle resource usage and increased Oracle compatibility and
processing ability, on a low- grade soft hardware platform with fewer resources to use.
According to Greenwald,
Stackowiak, and Stern (2013), over the past approximately 30 years, Oracle grew from
being one of many vendors that developed and sold a database product to being
widely recognised as the database market leader.
- In Oracle, the term “database” refers to the physical storage of information, and the
term “instance” refers to the software executing on the server that provides access to
information in the database and the resources that software uses.
- Oracle includes many features that make the database easier to manage.
-Although early products were typical of a startup company, the Oracle Database grew
such that its technical capabilities are now often viewed as the most advanced in the
industry.
-Oracle releases new versions of the flagships database every three to five years.
-With each database release, Oracle has improved the scalability, functionality, and
manageability of the database.
-New releases typically follow themes and introduce a significant number of features.
-In recent releases, these themes are indicated in the product version’s naming.
Typically, the terms “Oracle” and “database” are used when describing them. In 2012,
Oracle Database 12c appeared to be used somewhat interchangeably as it included all
the features of previous versions. It was released in 2013 and introduced a number of
deployments. Today, enterprise Manager 12c continues to be a framework used for
managing the database (Greenwald, Stackowiak, and Stern, 2013).
-Manageability and rapid provisions features are especially useful in the private and
public cloud computing environment, where hardware infrastructure and the database
are delivered as a service over a network, building upon capability introduced in
previous releases.
-There are three fundamental types of physical files that make up an Oracle database.
-They are:
• Control file
• Data file
-Oracle also offers an Application Server and Fusion Middleware business intelligence
tools and business applications (the e-business suite, PeopleSoft, JD Edwards, Siebel,
Hyperion and Fusion, among others).
-Oracle database is typically used to store and retrieve data through applications.
-All versions of the Oracle database include language and interfaces that enable
programmers to access and manipulate the data in the database.
- Database programming features usually interest developers who create Oracle-
based applications to be sold commercially, or Information Technology organisations
building applications unique to their business.
- Programs deployed within the database can be written in PL/SQL and Java
-Among the methods to solve the Oracle problem, a method of configuring practice-
based transport layer support (TLS), and existing internet infrastructure have been
proposed. However, these methods have the disadvantage of not supporting privacy
protection for external data, and limitations in configuring the process of a smart
contract based on external data verification for automation.
7.5 Pastel
-Sage Pastel accounting software is the preferred choice for many businesses.
- The accounting payroll ERP and business solutions allow for effortless daily financial
management. This will enable customers to go “beyond accounting” and focus on
business.
-In years to come, we will look at 2020 as the moment that changed everything.
-Nowhere else has such unprecedented and unforeseen growth occurred as in the
digital and e- commerce sectors amid the Covid-19 crisis.
-While most sectors experienced slowing. economic activity, Covid-19 has led to a
surge in e-commerce and accelerated digital transformation.
-As lockdown became the new normal, business and consumers increasingly “went
digital”, providing and purchasing more goods and services online, raising e-
commerce’s share of global retail trade from 14% in 2019 to about 17% in 2020.
-These and other findings are showcased in a new report, Covid-19 and E- commerce:
A Global Review, by UNCTAD and e-Trade, for all partners, reflecting powerful global
and regional industry transformation recorded throughout 2020. At an event to
release the report, UN General Assembly President, Bozkir, said that that the trend
towards e-commerce was likely to continue throughout the recovery from Covid-
-Thus, we need to recognise the challenges and take steps to support governments
and citizens as they continue to embrace new ways of working.
-Since the outbreak of the pandemic, all e-Trade partners have worked together to
raise awareness of the e- commerce opportunities and risks emerging during the
crisis.
-They also identified ways in which businesses in developing countries could overcome
the challenges.
-In this regard, the Covid-19 repository launched in the fall of 2019 and e-commerce
report are the initiatives’ latest collective efforts to build a sustainable digital future
8.1 E-commerce
-The business Van Schaik Bookstore sells textbooks, the product, directly to you, the
Unisa student as customer. bidorbuy (www.bidorbuy.co.za) is another well-known
example, where the sellers are often businesses, but a C2C site as well.
-Organisations can then review the consumer’s requirements and bid on the project.
- Based on the bids, the consumer can then select the organisation that delivers the
product or service.
-South African citizens can enquire about their ID book, passport and permit
application status and can verify their marital and ID status by using the Department
of Home Affairs website
They are:
d. To capture value form digital trade, entrepreneurship must become central focus.
-This requires faster digitalisation for smaller businesses and more attention to digital
entrepreneurship, including reskilling, especially of women.
e. Countries also need better capabilities to capture and harness data and stronger
regulatory frameworks for creating and capturing value in the digital economy
f. The international community needs to find new, bold and smart ways to work with
governments and the private sector to leverage these opportunities.
According to Bozkir, the digital divide which was real long before Covid-19, is a
challenge which can be removed through our collective efforts and international
support
-broad concepts of digital disruption, forms the basis of understanding the concepts of
applying digitalisation and what to consider towards being digitalised, especially post
Covid-19, which is seen as the great accelerator of digitalisation.
-A business model (BM) is a function that maps business enterprise to its customers
and/or stakeholders.
-Anticipating the significance of the interactions among the established BMs in certain
newer BMs for better value to customers, Framework was coined and developed
-As digitalisation is redefining products and BMs worldwide, evidence abound in the
construction industry as a sector that is slow to its adoption.
-On strategy, firms need support from institutions or government on policies that will
cushion the effect of the provisions of resources for transformation
-They established that it is the “great accelerator” in fast-tracking the existing global
trend towards embracing modern emerging technologies, ushering in transformation
in lifestyle, work pattern, and
business strategy.
-Thus, it has evolved to be a “catalyst” for the adoption and increasing use of
digitalisation in work organisations and the office, alongside presenting foreseen and
unforeseen opportunities, challenges and costs, leading to positive feedback.
-Whilst digitalisation may bring new opportunities, the process imparts risks that may
be hard to mitigate or prepare for.
-Despite the importance and effects of digitalisation, coupled with emergent research
on implications
a. Data-enabling healthcare initiatives will increase: With the right privacy links in
place, the resulting massive increase in healthcare data represents an opportunity for
various data and artificial intelligence (AI).
Specialists will develop useful solutions that will help reduce risks of contagion and
relieve consumer anxiety, while also providing reassurance to help them cope with
these difficult times.
As consumers focus much more on their health, testing is the order of the day,
whether for Covid-19 or other medical conditions.
-This might include business diversifying from their core offer to sell data and AI assets
to third parties. For example, supermarkets such as Walmart already sell point-of-sales
data to brands who use
it to ensure adequate stock of products in their warehouse and to promote real- time
availability of their product in grocery stores. Beyond retail, we can expect the digital-
enabled sharing economy to accelerate into B2B much more rapidly as businesses
face urgent pressure to find smart and quick ways to slash costs and monetise
existing assets.
The uptake in e-commerce will become permanent if people remain wary of mingling
in real life and increasingly replace shop visits with online purchases.
Some logistics platforms are already revamping their concepts to match the new
market circumstances by enabling retailers to home-deliver fast.
-Hand in hand with this, we are already seeing a growing demand for digital media
and entertainment, including gaming, social media, news, video- streaming and
books, as people seek to relieve boredom and fill time previously taken up with
travelling and socialising face to face (Ruokonen, 2020). PwC (2020) and Dimelgani
(2021) estimated that AR and VR applications have a potential to
deliver a £1,4 trillion boost to the global economy by 2030.
8.10 Solutions
-In sectors that are less impacted by the pandemic, businesses need to fundamentally
rethink what creates value, what is important right now, and in the future, and what
role digital innovation can play in making new things happen.
-Companies which stay human and customer focused and manage to quickly innovate
new digital businesses to solve problems created by the new condition, are best
placed to seize any nascent opportunities.
-Right now, it is essential for businesses to create and maintain a strong and
pervasive digital culture. As work becomes increasingly remote, leadership styles,
mindsets, habits and ways of working matter now more than ever.
-Winning cultures encompass trust in people, transparency of work, caring for others
as well as continuous learning.
-Nurturing these important values during difficult times will ensure that firms retain
their digital talent, get things done and continue to thrive.
9 Current trends
-Although artificial intelligence techniques such as machine learning are not new, and
the pace of change is fast, widespread adoption in business and accounting is still in.
relatively early stages. Increasingly, we are seeing systems that are producing outputs
that far exceed the accuracy and consistency of those produced by humans. In the
short to medium term, AI brings many opportunities for finance professionals to
improve their efficiency, provide more insight and deliver more value to businesses.
-In the longer term, AI brings opportunities for much more radical change, as systems
increasingly carry out decision-making tasks currently done by humans AI, no doubt,
will contribute to substantial improvements across all areas of accounting, equipping
those in finance with powerful new capabilities, as well as leading to the automation
of many tasks and decisions.
Examples include:
• using machine learning to code accounting entries and improve on the accuracy of
rules-based approaches, enabling greater automation of processes
• improving access to, and analysis of, unstructured data, such as contracts and e-
Mails.
-Despite the opportunities that AI brings, it must be remembered that it does not
replicate human intelligence.
-The strengths and limits of this different form of intelligence must be recognised, and
we need to build an understanding of the best ways for humans and computers to
work together.
-It avoids the needs for software, applications, servers and services stored on physical
computers.
-Instead, it stores these with cloud service providers who store these things on the
internet and
• Store and share data – cloud services can often store more data than traditional,
local physical drives, and the data can be shared more easily (regardless of physical
location).
-A simple example of how cloud and mobile computing might be of use to finance
professionals, can be seen in the budgeting process.
10 Cryptocurrencies
-Blockchain has the potential to deal with some unique sets of requirements like
confidentiality and immutability and can therefore be deployed in many areas other
than cryptocurrency.
-Bitcoin is a digital currency that was introduced in 2009. Other cryptocurrencies exist,
such as Ethereum, Cardano, XRP and Solana.
-There is no physical version of bitcoin; all bitcoin transactions take place over the
internet.
-Unlike traditional currencies, bitcoin is decentralised, meaning it is not controlled by a
single bank or government.
-Instead, bitcoin uses a peer-to-peer (P2P) payment network made up of users with
bitcoin
Accounts.
-As a bitcoin miner solves these complex problems, bitcoins are credited to the miner.
-When a user obtains bitcoins, the balance is stored in a secure “wallet” that is
encrypted using password protection.
-When a bitcoin transaction takes place, the ownership of the bitcoins is updated in
the network on all ledgers, and the balance in the relevant wallets updated
accordingly
11 Summary
-In this learning unit, you learnt that we are living in a digital age, where, among
others, the digital adoption, the new way of living and use of new technologies have
been accelerated by the Covid-19 pandemic.
-We also speculated that things will not be the same and provided you with areas of
technology that are predicted to thrive post the pandemic.
-We thus provided you with the concept of digital r/evolution by creating a better
understanding of concepts such as blockchain, 4IR, enterprise systems, SAP,
Oracle,pastel, e-commerce and digitalisation.
-Other new concepts that are currently trending were also introduced to you, such as
artificial intelligence, cryptocurrencies, cloud and mobile computing.
Unit 12
1 Introduction
-The purpose of a network is to allow users to share resources, data and information,
and to facilitate communication. In this learning unit, we will be looking at why
communication / computer networks are used, as well as the various components of
computer / communication networks that enable communication between the devices
connected to the network
-Communication media or channels enable signals to move from one point to another.
-These communication media or channels are either cables or antennae that transmit
signals from one location to another.
-Communication media can also be split between wired and wireless transmission
-Wires and cabIes are media through which information can move from one network
device
to another.
1. Microwave transmission
-Microwave transmissions are high-frequency signals sent through the air using earth-
based transmitters and receivers.
2. Satellite transmission
-Radio transmissions can be used to transmit voice and data, with both wireless LANs
and cellular phones using radio technology
Infrared transmission
-Signals in the form of light waves are transmitted through the air between devices,
requiring line of sight for transmitting within short distances of less than a few
hundred metres
1.A network interface card (or network adapter) provides a physical connection
between the computer and the network cable or communication medium.
3.A switch or hub is a device that provides a central connection point for cables from
workstations, servers and peripherals.
-Switches are usually active, which means that they electrically amplify the signal as it
moves from one device to another.
4.A router translates information and allows communication from one network to
another.
-Routers choose the best path to transmit a signal, based on the destination address
and origin.
5.Firewalls are the most important part of a network with respect to security.
-With the increase in cyberattacks to steal data, plant viruses, and so on, firewalls play
a very important role in network security.
-As discussed above, a wireless router is a router that includes the functions of a
wireless access point and a network switch.
-Such devices allow access to the internet or a computer network without the need for
a wired connection.
-In this era of digital revolution, and the Internet of Things (IoT), technologies have
removed the digital barriers and accentuate the seamless exchange of data and
information among ubiquitous systems.
-Therefore, the challenge of information theft, privacy, and confidentiality of data and
information on the internet has become a major dilemma for many users of several
online platforms
-The wireless technologies that are used to carry out public and personal
communication are vulnerable to various types of attacks, where attackers can access
signal to listen in or to cause damage on wireless networks
-Network intrusion detection systems are a viable approach to curb the menace of
information theft and other data security threats on the internet
-According to Duan, Wei, Fan, Yu & Hu (2020), Wi-Fi has been widely deployed to
facilitate home, office, or even stadium-scale wireless access to the internet, and will
be an essential part of future wireless networks through being integrated with 5G
cellular networks.
-However, security threats are still a big concern for Wi-Fi due to the open- share
nature of the wireless medium and the easy access to Wi-Fi intrusion tools.
-computer networks are exposed to cyber-related attacks due to common usage of the
internet.
-As hackers become more prevalent and savvier, additional tools to help protect
network environment
are needed.
-A key research issue in securing networks is detecting intrusion. In 2008, Azad Tariq
Bin stated that it helps to recognise unauthorised usage and attack as a measure to
ensure network security.
- Intrusion detection is a strategy that is defined as the ability to monitor and react to
computer misuse.
-Many hardware and software products in the market provide various levels of
intrusion detection.
-Over the years, various works were evaluated on different databases for detecting
illicit or abnormal behaviour using IDS.
- This work was used to develop new and sophisticated detection and prevention
methods based on and managed by combining smart techniques, including machine
learning, data mining, and game theory, using risk analysis and assessment
techniques.
-Their role is thus assisting wireless networks to remain secure and aiding system
administrators to effectively monitor their systems
-As new attacks emerge daily, IDSs play a key role in identifying possible attacks to
the system and giving proper responses
-IDSs should adapt to these new attacks and attack strategies, and continually
improve.
5 Summary
-The next learning unit deals with network configurations, including network
topologies and geographical scope. Distributed processing, client server systems and
cloud computing will also be discussed.
Unit 13
Network Configurations
1 Introduction
3 Distributed Processing
5 Cloud Computing
6 Summary
1 Introduction
-Networks can be classified and configured in various ways depending on the size of
the network, the distance/area of network coverage, as well as the media to be used.
-network topologies and geographical scope and also touch on distributed processing,
client server systems and cloud computing
The five most common types of network topology are the following:
Bus topology:
All devices are connected to a central communication cable, called the bus or
backbone
Ring topology:
All devices are connected to one another in the shape of a circle or a ring, thus each
device is connected directly to two other devices, one on either side.
-Communication signals travel through the ring in the same direction, either clockwise
or anti-clockwise
Star topology:
-Devices communicate across the network by sending data through the switch. This is
the most common type of topology, especially for home networks
Tree topology:
Mesh topology:
-Devices are connected, with many redundant connections between network devices.
- A mesh network in which every device connects to all the others, is called a full
mesh
-Geographical scope refers to the distance or coverage area of the network, as well as
the communication media or channels connecting the whole network together.
- Wired devices usually connect using USB or FireWire connections, while wireless
devices can connect via Bluetooth or Wi-Fi technologies
-A local area network (LAN) is a network that connects different computers and
devices within a relatively small area.
-Examples include small office and home networks confined to one building or closely
positioned buildings
-Organisations connect their computers in local area networks (LANs), enabling them
to share data (for example, via e-mail) and devices (such as printers)
-Wireless LANs (WLAN) are LANs that use wireless technologies instead of wires and
cables to connect computers and devices in the network
-A metropolitan area network (MAN) is a network that is larger than a LAN but smaller
than a WAN, usually spanning a medium-sized area such as a large campus or a city
-A wide area network (WAN) is used to connect LANs, so that computer users in one
location can communicate with computer users in another location
-WANs are a network that covers a large area, such as networks linking across
metropolitan, regional, or international borders.
-The internet is the largest example of a WAN, which is made up of numerous smaller
networks
-Networks are created by using the internet as the medium for communicating data.
-VPNs use encryption and other security systems to ensure that only authorised users
can access the network and that the data is not intercepted
-The geographic scope should be considered, as LANs will probably be used to connect
office computers and devices to a network.
-This will influence the specific topology chosen, as well as the data communication
media or channels.
Security
-Access to the internet may lead to security risks, for example, hackers may access an
organisation’s database; hence, applicable security measures should be implemented.
-The various hardware (including the communication mediums) and software used in
the network should be compatible, enabling all nodes in the network to communicate
with ease
3 Distributed Processing
-In a client or server network architecture, certain powerful computer systems provide
a specific service or perform a specific task.
-Computers, called clients in this setting, which are connected to the network, have
access to the resources provided by the servers.
-Clients then request the services provided by the servers connected to the network.
-These servers have operating system software installed that manages the network
activities.
-As discussed in learning unit 5 that dealt with computer hardware, there are various
types of servers, including database servers, file servers, transaction servers and web
servers
5 Cloud Computing
-These computing resources and services are provided on demand by the applicable
data centre.
-This means that users do not need the required hardware or applications to perform
the specific tasks since the computing is done by the service provider who sends the
required results to the user.
-Therefore, any user with an internet connection can access the cloud and the services
it provides.
-The service provider carries out all the maintenance and development needed to
provide the
-Examples include online backup services, social networking services and web-based
e-mail such as Hotmail and Gmail
-The basic idea and application of cloud computing sees users log in to an account in
order to access, manage and process files and software via remote servers hosted on
the internet.
- This replaces the traditional method of owning and running software locally on a
computer or networked server.
cloud computing has driven the following changes in the structure and working of the
finance function:
1.Collaboration – File sharing and version control issues are minimised. Services such
as a Google drive, for instance, allow multiple collaborators to update documents in
real time.
2.Flexible working – Full access to all files and documents anywhere with an internet
connection has facilitated increased flexibility to work patterns and arrangements.
3.Increased security – Cloud service providers understand and acknowledge that the
security of data, especially financial data, is critical to their success.
5.Easier integration – Cloud-based accounting software can easily link with other
cloud-based software such as customer relationship management (CRM), allowing an
integrated approach to business in a cost-effective way when compared with
traditional software solutions.
ADVANTAGES DISADVANTAGES
6 Summary
Unit 14
1 Introduction
3 Internet Applications
5 Internet of Things
6 Summary
1 Introduction
-The internet is a network that connects millions of networks, big and small, across the
globe.
-The internet includes academic, corporate, government, public and private computer
networks, and is the world's largest network.
-An internet service provider (ISP) is a company that provides access to the internet to
individual people and organisations. Examples include Cell C, MTN, Telkom and
Vodacom.
-The providers are already connected to the internet and provide a path or
connections for individuals to access
-The internet uses the standard Internet Protocol (IP) technology to link different
networks together.
-The Domain Name System (DNS) was developed to allow the use of easier-to-
remember domain names, instead of IP addresses, to locate computers on the
internet.
- Domain names consist of words and letters. Domain names consist of two parts. The
first part names the host computer or organisation that registered the domain name
(also known as the second-level domain or SLD), where the second part identifies the
top-level domain (TLD).
-TLDs identify the type or nature of the organisation using the address. The TLD
includes
• .gov governments
Country code TLDs also exist. They appear to the right of the TLD, and include for
example:
• .au Australia
-A URL consists of the following parts: the scheme name, commonly called
“protocol”,followed by a colon. Depending on the scheme, a domain name or,
alternatively, an IP address follows
3 Internet Applications
-Although many people think the internet and the World Wide Web (WWW) are the
same thing, they are not.
-The WWW, also simply known as the Web, is one of the services that run on the
internet.
-To view a web page on the WWW, oneusually begins by typing the URL of the web
page into a web browser.
-Another way of doing so is to follow a hyperlink to the web page. In this regard, the
web browser
sends a series of communication messages to retrieve and display the web page.
-The web browser translates HTML so that the internet user is able to read the web
page
- E-mail is also one of the services that operate across the internet or other computer
networks.
-Using a computer or mobile device like a cell phone, a person can send text
messages and get immediate answers if the other person is online.
-The advantages of instant messaging are that it is faster if the other person is
available online, and you do not have to click through the same number of steps, as
you need to, with e-mail.
-Using the internet as a research tool.The WWW can be compared to a library to which
users donate documents; however, in the absence of a classification system, it is
difficult to find information.
-Search engines are web search tools that searches the web for keywords.
-Google is one of the most popular internet search engines freely available on the
web.
-An intranet is an internal or private network that is under the control of a single
organisation.
-Intranets use IP standards and tools such as web browsers and file transfer
applications, allowing employees to gain access to the organisation’s information,
making internal communication easier and less expensive.
-Only computers or users connected to the intranet can access the information
available.
-Employees find surfing their organisational intranet easy compared to surfing the
internet
-An extranet is a private network that connects more than one organisation.
-It links selected information and resources on an organisation’s intranet with trusted
customers, suppliers, or business partners.
-The purpose is to increase efficiency and reduce costs. For example, an automobile
manufacturer has hundreds of suppliers for the parts that go into making a car.
-By having access to car production schedules, suppliers can schedule and deliver
parts as they are needed at the assembly plants.
-In this way, operational efficiency is maintained by both the manufacturer and
suppliers
-Secure intranet and extranet access applications usually require the use of firewalls,
user authentication, message encryption and the use of VPNs.
5 Internet of Things
-The Internet of Things (IoT) can be described as the interconnection, via the internet,
of computing devices embedded in everyday objects, enabling them to send and
receive data.
-It is expected that, by 2030, there will be over one trillion “connected” devices, all
with multiple sensors, generating constant data about how devices are used and
performing
- The Internet of Things (IoT) is greatly enhancing the creation of and access to data
and producing ever-increasing transparency
-The Internet of Things is considered a network of smart devices with inbuilt sensors
and internet connectivity.
-They collect and transmit data constantly and are an increasingly significant element
of Big Data.
-The ability to make virtually any asset a business owns and operate a “smart” asset
by building in some relevant sensors and internet connectivity, can lead to some very
useful data.
-It should facilitate better business planning and resource allocation, and will help to
optimise processes, minimise expenditure and give advanced warning of potential
issues
-The growth in the Internet of Things, often termed “smart technology”, is fueled by
improvements in broadband connectivity and the development of 4G communication
networks.
-As governments look to roll out the next-generation 5G networks, connectivity will be
improved further.
-As people and businesses are increasingly comfortable with the idea and operation of
this smart technology, it is anticipated that the Internet of Things will continue grow,
becoming increasingly
central to how we live and work as new and innovative applications for the technology
emerge all the time
6 Summary
-the internet: how it works, as well as various internet applications, including the
WWW and e-mail.
-You were also introduced to concepts such as intranet, extranet, and Internet of
Things.
Unit 15
1 Introduction
8 Controls
11 Privacy
13 Ethics
accountants
14.5 The effect of electronic information technology (IT) systems and the
auditors’ ethics on audit quality
15 Governance
16 Summary
1 Introduction
-The purpose of this learning unit is firstly to create an understanding of the common
risks and threats faced by an information system.
-In the previous learning unit, we looked at internet, intranet, extranet, as well as
Internet of Things.
-it is important to understand that although the terms vulnerability, threat, exposure
and risk are often used interchangeably, they all have different meanings.
-Being aware of the vulnerabilities that could create problems for an organisation is
one thing, but being aware of the implications of the vulnerabilities is also vital.
• Technical deficiencies include issues like defects in the software being used, or not
using appropriate protection (such as encryption) correctly.
• Physical occurrences, where a physical event, like a fire or flood, causes damage to
the information technology system.
-Whatever the reason for the vulnerability, its exploitation can lead to costly problems
for the organisation involved.
-The standard was also developed to provide a model for establishing, implementing,
operating, monitoring, reviewing, maintaining and improving an information security
management system.
-The key principle behind the standard, in line with the American Institute of Certified
Public Accountants (AICPA) approach, is to ensure a proactive rather than reactive
approach to cybersecurity risk management.
-Given the high regard for ISO standards, a lot of larger organisations require B2B
partners to be ISO27001 compliant or to be progressing towards compliance before
they will do business with them; this a is further risk mitigation
Human error – a mistake by an employee could range from being hacked after
clicking on fraudulent links on their work computer, to making inappropriate
comments on social media (either through their personal account, or if they
have access to it, via the company account).
Productivity – while there are clearly positives to be gained from social media, if
employees can access social media at work, it can disrupt their work and reduce
the operational efficiency of the company.
Data protection – regulatory requirements are increasing around how companies
gather, use and store data about their customers. Firms need to make sure they
have secure networks, and they comply with all legislation.
Hacking – as with any computer program, a hacker may try to infiltrate social
media accounts for malicious reasons, or use social media accounts to harvest
data to assist with a social engineering attack, like phishing or a business e-mail
compromise attack.
Reputation – any mistakes a company makes on social media (such as an
inappropriate post made by a staff member), could have a negative impact on
the brand of the organisation and result in lost customers, sales or even
employees.
Inactivity – as maintaining an online presence becomes increasingly important,
not using social media or not keeping existing accounts up to date, could be as
damaging as using it badly.
Costs – in theory, using social media costs nothing, but to use it well, and
control the accompanying risks, could cost a significant amount. Also, any fines
from non-compliance with regulations could also be significant.
• Reliance on the service provider: as with any outsourcing decision, relying on the
cloud service provider means that any failings at the service provider could be more
problematic without backup plans for bringing services back in-house.
-There are not only issues with the trust and security required from the service
provider; it also needs to be considered whether the provider’s services are suitable
for the tasks required;
-whether the service provider can ensure continuity in the light of external events
such as system failure;
• Regulatory risks: data security is often highly regulated in terms of what can be
stored, who can access it, how long it can be stored for, and how it can be used.
-This may become a problem if the service provider is based in a different jurisdiction
with different regulations and rules
• Unauthorised access of business and customer data: this can come in two forms.
-Firstly, the cloud service provider is more likely to be a target of hacking than the
individual small businesses that use it.
-If the service provider is targeted, all users suffer, even if they were not individual
targets themselves. -Secondly, providing business and customer data to an
outsourced service provider means that the data can be accessed by that service
provider’s staff.
- It will also be important that the service provider does not share this data with
unauthorised users such as other users of that service provider’s services
- Various threats may exist in such an environment because of system flaws. For
example, due to human error, revenue may be overstated in an instance where an
invoice amount is captured as R40 000,00 instead of R4 000,00.
-However, the spotlight in this section will fall on potential threats in a computerised
information system rather than a manual information system.
-As explained earlier, threats exist because of certain vulnerabilities. These threats
can be caused by nature, for example natural disasters, the environment, such as
power failures, or human error.
-It might be a deliberate attempt to gain access to an organisation’s systems and files
to obtain
information or to alter data (perhaps fraudulently).
-Once hackers have gained access to the system, there are several damaging options
available to them.
• gain access to the file that holds all the user ID codes, passwords and authorisations
• interfere with the access control system, to provide the hacker with open access to
the system
-“Hackers” is a broad term, but there are different types of hackers, defined according
to their reason for hacking. Regardless of their reason, they all require a certain level
of skill
• Unethical hackers: these are the stereotypical hackers that hack with malicious
intent.
-They typically break into secure systems and networks to steal data, destroy it or
perhaps just modify it.
-They are trying to help the company understand what an unethical hacker may try to
do so it can protect the computer network.
-IP spoofing means to forge the source IP address, thereby concealing the actual IP
address and making it appear to be the IP address of a trusted or authorised source.
-This enables the cybercriminal to remain anonymous while carrying out criminal
activities.
-For example, by using IP spoofing, a criminal can send a fake sales order to an
organisation, which seemingly comes from a legitimate client.
-This organisation might then manufacture and deliver goods that were never ordered,
thereby incurring unnecessary costs.
-Computer forgery takes place when advanced computer technology and programs
are used to forge documents, for example official letterheads, matric certificates,
degrees, and identity documents. -These forged documents are then used to commit
fraud.
- Computer fraud can be defined as any fraudulent activity where a computer,
computer system, or network is used to unlawfully take, alter, or use information or
computer programs.
-Computer-related scams are a subsection of computer fraud and usually offer too-
good-to-be-true deals, requiring sensitive personal information from the victim or
money to be paid into the cybercriminal’s bank account.
-For example, the victim is informed, via e-mail, that he has won a large amount of
money in a foreign lottery and that the money will be paid out after the receipt of an
amount of money for administration fees.
-Malware is the term used for malicious software, regardless of the intended purpose.
-It can do any number of things, ranging from the stealing of credentials, other
information or money to the general wreaking of havoc, or denial of service.
• Botnets are networks of private computers that are infected with a malware and
controlled by a “botnet agent” designed to follow the attacker’sinstructions without
the knowledge of the owner of the computer
• Trojans are named after the Trojan horse in an ancient Greek story where a wooden
horse was allowed into the city as it was deemed harmless, but which concealed
soldiers inside, ready to attack the city.
-This type of malware does a very similar thing: it pretends to be a useful piece of
software whilst secretly releasing malware into the system, usually with the capability
to be controlled by the attacker from a different location (known as a remote-access
Trojan or RAT).
-Once on the system, it can then prevent access to the system (ransomware), infect
the system damaging and destroying files, or act as spyware.
• A worm is also a self-replicating program or program code but differs from a virus in
the sense that it does not need to be attached to an existing program.
-These copies are sent via the computer network to other computers in the network.
• A logic bomb is an intentionally inserted program code that will set off a malicious
function (for example, delete or corrupt data or files) when triggered under certain
conditions.
-A rootkit is a tool that grants an attacker continuous full access to a computer while
hiding its presence.
-A well-written rootkit can rewrite a computer’s login script, which will then accept the
cybercriminal’s login even if the user or administrator tries to change it.
-The spyware program will secretly transmit personal information or web browsing
habits to a cybercriminal.
- The purpose of adware is to generate web traffic and obtain e-mail addresses.
-Identity theft occurs when personal information is acquired and used fraudulently
without the owner’s knowledge or consent, for example, targeting tourists during a
world sport event to steal their identity documents or passports.
-Identity theft is not limited to natural persons but also entails the theft of an
organisation’s identity.
-Identity theft is used to obtain goods and services fraudulently, such as withdrawing
money from the victim’s bank account, blackmail, terrorism, illegal migration, and so
on.
-Other methods used include social engineering, shoulder surfing and phishing.
-Social engineering means to study the user’s social networking profile or chat rooms
to get clues on what the user’s password might be, as people usually use something
familiar as their password, for example, the name of a loved one or a pet, a favourite
musician or writer.
-Shoulder surfing refers to shadowing the targeted user to “accidentally” see or hear
the password.
-Phishing misleads the victim into thinking that electronic correspondence has been
sent by a trustworthy source, for example, a financial institution, thereby luring the
victim to a spoofed (fraudulent) website.
-At this spoofed website, the victim is requested to divulge sensitive personal
information.
-Both the e-mail and the spoofed website usually appear to be those of legitimate
organisations.
-Injection with SQL (Structured Query Language) has become a common issue with
database-driven websites.
-It occurs when the attacker uses an unprotected input box on the company’s website
to execute a SQL query to the database via the input data from the client to server.
- A successful SQL injection can read sensitive data from the company’s database,
modify (insert, update or delete) database data, execute administration operations
(such as shutdown) on the database, recover thecontent of a given file, and, in some
cases, issue commands to the operating system
-Cross-site scripting attacks (XSS attacks) occur when a victim is attacked when
-The attacker uses the third-party web resources to run scripts in the victim’s web
browser or scriptable application.
-Specifically, the attacker injects malicious code (often associated with JavaScript) into
a website’s database.
-When the victim requests a page from the website, the website transmits the page,
with the attacker’s code as part of the HTML body, to the victim’s browser, which
executes the malicious script. -For example, it might send the victim’s cookie to the
attacker’s server, and the attacker can extract it and use it for session hijacking
-Buffer overflow attack – A buffer overflow occurs when a system cannot store as
much information as it has been sent and consequently starts to overwrite existing
content.
- A buffer overflow attack occurs when an attacker sends a malicious program which
deliberately overloads the system and starts to overwrite existing data .
8 Controls
-Controls can be classified using various methods. Two of the most common ways are
according to the type of control, which includes general and application controls, or by
the function of the control, which includes prevention, detection and correction.
Specific system controls should be implemented to ensure reliable data
communication and the safeguarding of assets.
-It is important to take into account that a control can fall into more than one category.
For example, the control of duty segregation can be classified as both a general and
preventive control
-These review the reliability of the data generated by the IT systems and check that
they are operating correctly.
2.Hardware and software configuration – these controls are designed to ensure that
any new IT is tested and installed correctly into the system to minimise the risk of
errors or damage to the systems.
3.Logical access – these controls are designed to prevent unauthorised access to the
organisation’s information systems. These could include password systems.
4. Disaster recovery – these will ensure that the organisation will be able to continue
operating despite adverse conditions. For example, off-site backup may be kept of all
systems.
5.Output controls – these ensure that the outputs from the system are both complete
and secure. This could include controls over whom outputs (such as reports or lists)
are distributed to within the organisation.
6.Technical support – it is important that all the users of the organisation’s IT systems
are competent. Training policies and technical support for workers can be a valuable
control.
General controls
Organisational controls
-Segregation of duties within each task in the transaction cycles should be present.
- By segregation of duties, we mean that one single staff member should not be
responsible for the initiation, authorisation, processing and review of a transaction.
-Only competent staff should be appointed to take responsibility for the transaction
processing system.
development system procedures and human resource policies and practices that
make a commitment to excellence.
-The information centre is the place where all the information system activities take
place. The controls listed below are all examples of restricting access to the computer
or information.
-These controls include fences around the restricted area; locks and keys to restrict
access to the information centre; key staff wearing badges to tell them apart from
intruders, physically inspecting the restricted area and consulting a logging access
report of the area over a specific period.
-It could also include installing biometric access controls, which involve using
computer software to identify fingerprints, handprints, voice patterns, signatures and
retinal scans of individuals authorised to enter the restricted area.
-Access control software firstly controls the identification of users, that is, users need
to identify themselves – usually through user IDs (login IDs) – or unique account
numbers (your bank account number, for example).
-The user is then taken through an authentication process (e.g., entering a password)
to verify the user is the person he/she claims to be.
-After users have been identified and authenticated as authorised users, access
control lists will define the specific programs and data they have access to and what
permissions they have (read,
-For example, only the human resources manager and the divisional manager will
have access to individual staff members’ salaries on the staff system.
-The financial clerk will only have access to totals for the entire division’ salary bill to
enable him/her to process the necessary transactions in the financial system.
-The human resource manager might only have view (read) access of the salary bill in
the financial system while the financial clerk will have processing (write) rights.
-Passwords, usernames and personal identification keys (PIN) are effective ways of
preventing unwanted computer access.
-Individuals should take care when selecting passwords, PINs, or usernames that they
will not be easily identifiable or obvious for intruders.
-Passwords should include numbers, capital letters and special characters and should
not be a word
-Also, never divulge your password, especially not to somebody you do not know very
well.
control.
-Encryption is the conversion of data into a form called ciphertext that cannot be
easily understood by unauthorised people.
-Decryption is the process of converting encrypted data back into its original form, so
that it can be understood.
-Controls against natural elements are very important for preventing or minimising the
impact of disasters, and include the following (disaster planning is discussed in the
next section):
● Smoke detectors, which alert staff and emergency services to the possibility of a
fire.
-Early detection can help to prevent or limit the damage to computer equipment and
save lives.
- The information centre should have sufficient fire extinguishing equipment in order
to prevent the spread of fires in emergencies.
● If the floor in the information centre is raised, it will prevent water damage from
flooding.
-These controls are fully automated and tend to be designed to ensure that the data
input into the system is complete and accurate. These controls will vary from system
to system, but are often designed to ensure:
following:
Application controls
-Input controls The purpose of input controls is to prevent and detect errors when
entering information into the information system in order to ensure validity, timeliness
and accuracy.
-Input edit checks of transaction data, for example, check digits, incorrect dates or
date formats, completeness checks to ensure no blank fields are recorded, and visual
verification to confirm the general reasonability of documentation.
-Data transcription, for example, using a batch control log, batch serial numbers.
- Data observation and recording, using record counts, control totals or other ways to
balance the input totals with the source documents.
-Processing controls
-Processing controls are designed to ensure that all transaction data have been
processed accurately and in time.
-When the processed information is reviewed, the reviewer needs to confirm that no
data were lost, altered, or added during processing.
-Processing controls are also important to ensure that the database and files stay
maintained
1.Physical inspections and checks: These may include reconciliations, checking the
work of another employee, and acknowledgements.
- For example, an input value should not be 0 when there will be a number that
divides it somewhere in a program.
3.Run-to-run totals: To ensure batched data are completely and accurately transferred
between processes, output control totals are calculated and used as input control
totals for the next processing sequence, thereby linking the one process to the next.
4.Audit trails: An audit trail is a set of steps put in place to keep proof of each action
taken to execute a business process, for example, keeping complete original records,
like receipts, of petty cash transactions.
-Output controls
- Output controls ensure the reliability and integrity of output information after the
input and processing phase.
-Other preventive controls include segregation of duties, recruiting and training the
right staff and having an effective control culture
-Preventive controls are the first layer in the internal control shield.
-Preventive controls prevent and discourage adverse events such as fraud, errors,
theft, loss, and so on from occurring.
Backup of data and documentation: It is vital that backup copies of all important
data and documentation are readily available in the event of original data being
destroyed or damaged. Backups of important data should therefore be made
regularly as per a pre-defined backup plan.
For example, most financial system data is backed up daily, weekly, monthly
and yearly. Files should be backed up on a different storage device, which is also
physically removed from the original data storage device, to ensure that the
backup data is not destroyed or damaged in the same adverse event that
damaged the original data, for example a fire.
Backup files must have the same level of protection as the original data and
documents, as they contain the same sensitive information and are open to
cybercrime, corruption and destruction as well.
Backups must be regularly tested to ensure backup files a uncorrupted and that
the relevant data and documents are being backed up
- As soon as a virus is found, the program will “clean” the virus, that is, destroy it.
-It is very important not to ignore a virus warning from antivirus software.
-Antivirus software must also be updated regularly to ensure it protects against the
latest viruses
latest spyware
-If an e-mail is identified as spam, the e-mail is quarantined and not delivered to the
recipient’s e-mail account.
-Recipients are informed of the e-mail and can usually request the mail administrator
to release the
-If no instruction to release the e-mail is received, the e-mail is automatically deleted
after a predetermined time.
-It is important to allow recipients to identify spam e-mail senders and for the mail
administrator to add these spam e-mail addresses to a list of e-mails that are
automatically blocked as spam.
- A recipient must also be able to remove an e-mail address from the possible spam
list so that e-mails from that specific e-mail address will go to the recipient’s e-mail
address directly
-Training of staff: Staff must understand why controls are imposed, what the benefits
of these controls are and how to execute these controls.
-This will ensure staff will not try to circumvent controls and that they know how to
execute controls properly.
-For example, they should know how to make backups or why it is important not to
share your password with colleagues
-Software change and implementation controls: These controls ensure that only
authorised changes are made to existing software programs or that only authorised
new programs are installed on the computer network
-Adequate disposal of used/damaged/redundant equipment: When hardware reaches
the end of its useful life (technological redundancy, damage, etc), a decision regarding
the proper disposal needs to be taken in order to ensure that the confidentiality of
data is maintained and the negative impact on the environment is minimised
-They are designed to pick up errors that have not been prevented.
-These could be exception reports that reveal that controls have been bypassed (e.g.,
large amounts paid without being authorised).
1.Programmed edit tests: These detective controls are automatically performed by the
application software used in the data entry.
-Depending on the software program, errors identified can reflect immediately on the
input screen to allow the input clerk to take corrective steps instantaneously to rectify
the data, or the errors can reflect on an error report created periodically, and the
errors must be corrected at a later stage.
-Some of the programmed edit tests which can be performed include the following:
— Check digit: A check digit is used to verify the accuracy of an entered numeric code
(e.g., bank account number, ID number, inventory bar code). The check digit is usually
the last number of the numeric code and is calculated by applying a mathematical
formula to the basic code (the other numbers in the numeric code). When the numeric
code with the check digit is entered, the computer will automatically recalculate the
check digit. If the check digit is not the same, the computer will indicate that the
numeric code has been entered incorrectly and must be re-entered.
A very simplistic example is the following: An inventory bar code, 756-543-6, is seven
digits in length. The first six numbers are the basic code and the last number is the
check digit. The check digit is calculated as the sum of the first three numbers less
the sum of the last three numbers, that is, 6 [(7+5+6)- (5+4+3)]. If, for example, this
specific inventory bar code is entered as 756-643-6 the computer will recalculate the
check digit and get 5 instead of 6.
- The computer will then flag the inventory bar code as incorrectly entered. In
practice, the
mathematical formulas used to calculate the check digit are very complicated
• Alpha/numeric checks: Data fields can be set to contain only numeric or only
alphabetic characters. The alpha/numeric test will then test if the data entered in that
specific data field were entered in the correct format. For example, if a data field can
only contain numeric characters (1234567) an alphabetic characters (abcde) or
alphanumeric (abcd4567) characters are entered into that specific field, that entry will
be flagged as an error.
• Limit checks: When data are entered, these tests check whether the data fall within
pre-set limits. For example, the quantity sold for a specific item can only be between 0
and 100, the working hours for casual staff can only be between 0 and 15 hours per
week or payment terms must be 30, 60 or
90 days.
Activity logs: Activity logs indicate which users accessed a certain system and at what
time. These logs should be reviewed regularly for atypical activities, that is, users
logging in at unconventional hours, as these activities might indicate fraudulent
activities
-Intrusion detection system (IDS): IDS is software that monitors and logs attempts to
access computer system and networks.
-An intrusion detection alarm is raised if the attempt to access the system falls
outside predetermined activity parameters (unsuccessfully trying to access more than
three times, etc) or falls within the parameters of possible malicious attacks (the
predictable behaviour of a worm).
- An IDS is used to detect attacks from inside as well as outside the organisation
-Hash totals: A hash total is created by adding together all the data for a specified
nonfinancial numeric field (e.g., inventory codes, invoice numbers, supplier and
customer account numbers) in a batch. (A batch is a group of transactions processed
together.)
-The total has no specific value other than as control to ensure the batch is captured
completely and accurately.
-This is done by calculating the hash total for the batch at the start and ensuring that
it agrees with the calculated hash total for the batch at the end
Other examples: Detective controls, discussed earlier in this learning unit, are
• run-to-run totals
• audit trails
• smoke detectors.
-These are controls that address any problems that have occurred.
-So, whenproblems are identified, the controls ensure that they are properly rectified.
-It is more effective to have a control that stops problems occurring rather than
detecting or correcting
- There is always a possibility that it is too late to sort out the problem
-Corrective controls are the last layer in the internal control shield.
- The purpose of corrective controls is to limit and repair the damage caused by the
adverse event
and should bring the organisation back to its normal working operations as effectively
as possible.
-It is important to remember that for each adverse event identified, there can be more
than one corrective control and that the optimum corrective control must be chosen to
rectify each adverse event.
-As with detective controls, corrective controls can have the effect of modifying
existing controls or
-Even with the availability of more advanced technology, the recovery of data is not
certain.
-Backup data restoration: The applicable data backup is restored. This restores the
data and information back to the form it was in at the point the backup was made.
All transactions between the backup date and the date the backup is restored will
therefore be “lost” and must be redone.
-It is, therefore, very important to inform all users before a backup is restored, to
ensure they have a list of transactions that need to be redone.
-The restoration of a backup is the last option, as redoing work is time consuming
-Please remember that it is very important that backups must be tested regularly to
ensure they can be restored.
-An organisation does not want to find out that backups are corrupt and cannot be
restored when it needs to restore the data.
An operating system failure is the most common reason for the need to recover data
and a CD, called a live CD, containing a complete, functioning and operational
operating system, can be used to boot up the computer so that the file system error
can be fixed.
-Data and system backups can also be made regularly for data recovery purposes.
– disaster recovery of complete system (in order to minimise financial loss and
prevent a material impact on the financial reporting process, controls should be in
place that enable a business to resume normal operations as soon as possible after a
disaster has struck the organisation)
- The organisation must safeguard the privacy and security of data as well as ensure
complete and
- There are different privacy and security risks that exist, together with solutions as to
how the organisation can tackle each risk.
• Fire procedures – fire alarms extinguishers, fire doors, staff training and insurance
cover
Viruses – a small program that, once introduced into the system, spreads extensively.
Can affect the whole computer system.
• Antivirus software – should be run and updated regularly to prevent corruptio of the
system by viruses.
• Formal security policy and procedures, for example, employees should only
download files or open attachments from reputed sources.
• User awareness training and a formal security policy so that employees are aware of
the risks that exist and how best to mitigate them.
• Controls ensuring only valid data is input/processed and that all data is processed.
Human resource risk – for example, repetitive strain injury (RSI), headaches and eye
strain from computer screens, tripping over loose wires
-Therefore, part of the cyber risk management process must be to set up business
continuity plans and disaster recovery plans (although the use of these plans is not
limited to recovery from cyberattacks).
2.Disaster recovery planning – is reactive and limited to taking action to restore the
data and applications and acquire new hardware
-Disaster recovery planning takes place in order to recover information systems from
business-critical events after they have happened. It involves:
Hot backup site – this is a building that physically replicates all of the
current data centre/servers, with all systems configured and ready to go
with the latest backup.
Warm backup site – this is a building that has all the critical hardware for
the servers and systems in place, but they will need to be configured and
the most recent backup of the data/information installed before the site
can take over the organisation’s activities.
Cold backup site – this is an area where, should anything go wrong, new
hardware could be set up and a recovery operation could begin. None of
the hardware needed is actually in place, so it would take a significant
amount of time to restore operations. This is the cheapest option. The
location of backup facilities is also an important issue.
If the backup facilities are too close, they may be taken offline along with
the primary site.
If the backup facilities are too far away, that could impact on operations.
-Finding the right balance for an organisation will require significant
consideration.
-There are also third-party providers who maintain sites, which could be
cheaper but could also create problems with ensuing compatibility.
- Third-party providers are likely to have many other commitments to
other clients, and this could impact the availability and accessibility of the
backup in a disaster, particularly as disasters can impact various
organisations at the same time (
11 Privacy
-The amount of personal data available to and used by organisations means that the
privacy, sensitivity and security of this data are very significant considerations in
modern business.
-In the context of the organisation, privacy refers to all information that is considered
confidential and in need of protection from public disclosure.
-Privacy has become an important issue owing to the vast amounts of data being
made available to stakeholders of organisations.
-Individuals must respect the value and ownership of the information they receive and
should not disclose any of its contents without the appropriate authority unless there
is a legal or professional obligation to do so
-On 1 July 2021, the Protection of Personal Information Act (POPIA or the Act), 4 of
2013, came into effect.
-The Act has implications for all research activities that involve the collection,
processing, and storage of personal information.
-It provides for the development of codes of conduct to guide the interpretation of the
Act with respect to a sector or class of information.
-Prior authorisations are required for using unique identifiers of personal information in
data processing activities, and for sharing special personal information or the personal
information of children with countries outside of South Africa that do not have
adequate data protection laws.
-In order to understand and functionally interpret the provisions of POPIA for the
research community in the Republic of South Africa (South Africa), the Academy of
Science of South Africa (ASSAf) is leading a process to develop a code of conduct
(Code) for research under the Act.
- During 2020, ASSAf was approached by scientists in South Africa to consider the
development of a code for research.
-Within the research setting, POPIA regulates the processing of personal information
for research purposes, and the flow of data across South Africa's borders to ensure
that any limitations on the right to privacy are justified and aimed at protecting other
important rights and interests.
-The new regulatory system that POPIA established, functions alongside other
legislation and regulatory structures governing research in South Africa.
-The law which takes precedence will be that which provides the most comprehensive
protections to the rights of individuals in South Africa.
12.2
- POPIA provides for the lawful processing of personal information in South Africa.
It sets out the roles for various parties involved in the processing (including collection,
use, transfer, matching and storage) of personal information.
• the “Data Subject” who is the person whose information is being processed and, in
the case of research, would be the “study/research participant”
-POPIA outlines eight (8) conditions for the lawful processing of personal information,
all of which must be fulfilled for such processing to be lawful.
a.
b. Accountability: the responsible party must ensure that all the conditions for the
lawful processing of personal information laid out in POPIA are complied. with at the
time of the determination of the purpose of processing and during processing (section
8).
-Process limitation: the responsible party must ensure there is a lawful basis for the
processing of personal information; that such processing is necessary for a defined
purpose and could not be achieved without processing such personal information; and
that the information is collected directly from the data subject and with informed
consent (sections 9–12).
-The lawful basis must be determined at the outset of the processing and will
influence the rights of data subjects.
(i) the data subject or a competent person where the data subject is a child consents
to the processing;
(ii)processing is necessary to carry out actions for the conclusion or performance of a
contract to which the data subject is party;
(v)processing is necessary for the proper performance of a public law duty by a public
body; or
(vi) processing is necessary for pursuing the legitimate interests of the responsible
party or of a third party to whom the information is supplied.
-It is not necessary to inform the data subject of the above if their information is being
processed only for research purposes (sections 17–18).
-Any security breaches must be reported to the Information Regulator (sections 19–
22).
h. Data subject participation: the responsible party must ensure that the data subject
is informed of their right to access, correct and delete their personal information and
of the manner in which to do so (sections 23–25).
-If the POPIA is not properly implemented, it can contribute to the violation of
information integrity of the international students partaking in research and cultural
exchange programmes.
- It is also essential for the POPIA to be aligned with international norms and standards
such as GDPR.
13 Ethics
-It is a rule or set of rules that is composed to maintain professionalism and guide
members of their profession to assure the public that a profession will maintain a high
level of performance.
- If the rule is not met, it means that the professional has not achieved the standard,
which can be considered as malpractice
-The King IV Report regards exercise of ethical and effective leadership by the
governing body as corporate governance.
- Ethics plays a critical role in moving from tick-box compliance to genuine application
of corporate governance.
-Thus, ethical organisation made up of ethical individuals will act responsible and
fairly, even when nobody is watching.
-Accounting scandals such as Enron and Worldcom have raised a great deal of
attention on ethics.
-In an information environment, the individual may act unethically for various reasons.
-The test for ethical behaviour is to ask oneself the question: “What is the right thing
to do in this situation?”
Integrity
-Integrity means being straightforward, honest and truthful in all professional and
business relationships.
Objectivity
-Objectivity means not allowing bias, conflict of interest, or the influence of other
people to override your professional judgement.
Confidentiality
- This means respecting the confidential nature of information you acquire through
professional relationships such as past or current employment.
-You should not disclose such information unless you have specific permission or a
legal or professional duty to do so.
-You should also never use confidential information for your or another person’s
advantage.
Professional behaviour
-Public accounting as a professional career, is born from the need to train people in a
technical, professional and ethical way so that they specialise in and are responsible
for the management of the finances of a natural or legal person.
-Thus, a presentation of financial reports with reliable figures in order to improve the
decision-making processes in the management of any organisation is needed
- This was because most corporation managements are still at a physical level, that is,
very egocentric, rather than at a spiritual level, which is “community-centric”,
resulting in the growth of a “capitalist culture” which is the “culture of having”. In this
regard, an important question that may direct ethics purpose as well, needs to be
answered.
-The question relates to who the users of information generated by accountants (both
in financial and audit) are.
-This requires a good audit quality, generally measured by adherence to the audit
process, and standards established and approved by the Indonesian Institute of
Certified Public Accountants.
-Building on the idea that birth cohorts, otherwise known as generations, are useful
proxy for the socio-cultural environments of different time periods, it is believed that
the perceptions of accountants of the millennial age group (young workers and
students born in the 1980s and 1990s, and the so-called “GenMe”) are particularly
important for the future of the accounting profession.
-After all, it is these young people who will become professional accountants or the
accountants’ future clients.
-The growing concern over the ethics of professionals makes it important considering
the perception of the public, students, and accountants of the values of accountants
in the working world.
-Building from the above about the accounting profession, the function that
accountants fulfil in the economic system is dependent on their ability to maintain the
perception of high ethical standards.
-The study by Caglio & Cameran (2017) indicated that there is room for improving
public perceptions of accountants’ ethics through university courses in ethics,
continuing education programs and focused communication strategies by accounting
firms and professional bodies.
-In this regard, prior literature has identified several technical and personal
characteristics and attributes that are desirable in forensic accounts practitioners.
-The understanding of virtue ethics and especially the virtue of practical wisdom will
help forensic accountants maintain public confidence and quality in their service and
provide practical guidance on the exercise of professional judgement.
-Practical implications suggest that the primacy currently given in forensic accounting
literature and practice to a commercial logic technical competence, risks damaging
the professional standing of forensic accountants.
-Over time, it will reduce their ability to exercise professional judgement in complex,
unstructured situations.
-In this regard, virtue ethics can act as a useful counterpoint to these threats.
-Therefore, it was concluded that there are differences in perception between teaching
accountants, accounting students and accountants on the ethics of preparing financial
statements.
In carrying out their duties, auditors are expected to always be guided by the basic
-The effect of electronic information technology (IT) systems and the auditors’ ethics
on audit quality
-The interaction between electronic IT systems and auditor ethics affects the quality of
audit.
-Based on theory, the interaction between electronic IT systems and auditor ethics has
a positive effect on audit quality.
essential.
-Electronic-based information systems (IS) are needed for decision- making oriented to
professional consideration and complexity of the assignment.
15 Governance
-For example, King IV provides the following principles, among others, for a governing
body. It should:
b. govern risk in a way that supports the organisation in setting and achieving its
strategic objectives, among others.
-The regime of corporate failures came on the heels of the global financial crises of
2007 and 2009.
-This emphasised the fact that corporate objectives, goals and priorities had been
compromised by organisational or corporate gatekeepers.
-First, there has been a renewed emphasis on the overhaul and adoption of uniform
International Financial Reporting Standards (IFRS) with an eye on best practices.
-Second, corporate governance principles and practice are emphasised to avert the
misadventures of the past.
-In such situations, the firm operates more responsible and profitably, relations are
enhanced between the firm and all stakeholders – shareholders, policyholders,
employees, suppliers and society at large.
-The aim is to try and prevent company directors from abusing their power, which may
adversely affect these stakeholder groups.
-For example, the directors may pay themselves large salaries and bonuses whilst
claiming they have no money to pay dividends to shareholders.
-Similarly, they may be making large numbers of staff redundant but awarding
themselves a pay rise.
-In response to major scandals (for example, Enron) regulators sought to change the
rules surrounding the governance of companies, particularly publicly owned, ones.
-In the United States (US), the Sabarnes-Oxley Act (2002) introduced a set of rigorous
corporate governance laws.
- It has been cited as the “most effective summary of the best international practice in
corporate governance”.
-Three reports were issued: in 1994 (King I), 2002 (King II) and 2009 (King II), and a
4th revision (King
IV) in 2016.
-The first report (King I), when published, was recognised internationally as the most
comprehensive publication on the subject, embracing the inclusive approach to
corporate governance.
-The Institute of Directors in SA (IoDSA) owns the copyright of the King Report and the
King Code of Corporate Governance.
-Unlike other corporate governance codes, such as Sarbanes-Oxley, the Code is non-
legislative and based on principles and practices.
-It also espouses an apply-or-explain approach unique to the Netherlands, and now
also found in the 2010 Combined Code of the United Kingdom (UK).
-One of the definite fallouts of the Enron saga was a global preoccupation with the
twin challenge of corporate governance and corporate accountability.
-As we learnt in earlier learning units, information, like technology, is a growing source
of competitive advantage for the enhancement of the intellectual capital of an
organisation.
- For serving its customers more effectively, King IV recognises that information and
technology overlap but are also distinct sources of value creation, each of which has
its own risks and opportunity.
-To reinforce this distinction in King IV, the Code now refers to information and
technology instead of information technology.
-Principle 12 provides that the governing body should govern technology and
information in a way that supports the organisation, setting and achieving it strategic
objectives.
-So profound are these effects that many believe they herald the dawn of a Fourth
Industrial Revolution, as they cause significant disruption.
-In line with King IV’s assertion that risk often creates opportunity, organisations
should strengthen the processes that help them anticipate change and respond by
capturing new opportunities and managing emerging risks. The practices assist the
governing body to do so.
-They must keep a governance checklist on the front burners to ensure that the
auditing and accounting tools serve an overall governance in the firm.
-In this regard, the role and responsibilities of accountants can be comprehensively
explained as follows:
b. The responsibilities fall rather heavily on accountants to help the company ensure
full compliance with the requirements of good and effective corporate governance.
-Firms with good corporate governance frameworks are usually fraud resilient.
-In the final analysis, it is part of accountants’ duties to ensure that companies:
(vi) formalise roles and responsibilities of the board, audit committee, management
and staff related to fraud risk management.
c. Ultimately, the role of the accountant is to aid proper corporate planning – setting
achievable standards, establishing reporting, monitoring and evaluation standards,
and crafting an overall vision for the enterprise.
d. Accountants also aid the setting up of proper controls, efficient and effective audit
systems, good fraud risk management, and full, fair and adequate disclosure that
satisfies international standards and best practices
a. Greater transparency
b. Greater accountability
c. Efficiency of operations
16 Summary
- we looked at cyber risks, threats, controls, privacy, and ethics. In summary, you
learnt about many issues.
- These include concepts and an understanding of vulnerability and exposure to
threats and security, risk exposure relating to social media, and risks of cloud and
mobile computing.
-The learning unit emphasised that the amount of personal data available to and used
by organisations necessitates that the privacy, sensitivity and security of this data be
given significant consideration in modern business.
-Hence, you were exposed to the POPIA. You also learnt about information security
management systems.
-In addition, you learnt about the effect of electronic information technology systems
and auditors’ ethics on audit quality.
-Finally, you learnt about good corporate governance and its principles, including the
role of accountants in it, and corporate governance and the financial crisis, including
advantages of a company following such principles