skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 67397 Find in a Library
Title: SEGREGATION OF FUNCTIONS IN EFTS (ELECTRONIC FUNDS TRANSFER SYSTEMS) - THE INCREASING USE OF EFTS (ELECTRONIC FUNDS TRANSFER SYSTEMS) WILL BRING A HOST OF CONTROL PROBLEMS FOR THE AUDITOR
Journal: JOURNAL OF ACCOUNTANCY  Volume:146  Issue:4  Dated:(OCTOBER 1978)  Pages:89-92
Author(s): N R LYONS
Date Published: 1978
Page Count: 4
Format: Article
Language: English
Country: United States of America
Annotation: INTERNAL SAFEGUARDS FOR ELECTRONIC FUNDS TRANSFER SYSTEMS (EFTS) ARE DESCRIBED.
Abstract: THE DEVELOPMENT OF SAFEGUARDS FOR ON LINE EFT SYSTEMS MAINLY INVOLVES THE EXTENSION OF FAMILIAR AUDITING AND CONTROL CONCEPTS TO DEAL WITH THE EFT ENVIRONMENT. ONE ASPECT IS TO SEPARATE THE FUNCTIONS OF PERSONNEL IN THE DESIGN AND CODING PHASE OF THE SYSTEM DEVELOPMENT PROCESS, SO THAT ONE EMPLOYEE DOES NOT HAVE THE OPPORTUNITY IN REGULAR JOB FUNCTIONS TO INITIATE AND COVER UP FRAUD. A DATA BASE ADMINISTRATOR SHOULD CONTROL ALL PROGRAMS ADDED TO THE SYSTEM LIBRARY. SUCH PROGRAMS SHOULD BE DESK CHECKED AND TESTED FOR CORRECTNESS BEFORE THEY ARE ADDED. MINIMUM DOCUMENTATION STANDARDS SHOULD BE ESTABLISHED FOR ALL APPLICATIONS CODES. THIS DOCUMENTATION SHOULD INCLUDE SUCH ITEMS AS INPUTS REQUIRED, OUTPUT PRODUCED, STANDARDS FOR OPERATION OF THE PROGRAM, SIZE OF THE PROGRAM, AND LISTING OF THE SOURCE CODE. ANY EXTERNAL REFERENCES SHOULD BE INCLUDED, ALONG WITH A BOUNDS CHECK ON ANY RUNNING PROGRAM. A VARIETY OF AUTOMATIC CONTROLS SHOULD BE BUILT INTO THE SYSTEM, INCLUDING 'REASONABLENESS' CHECKS ON TRANSACTION SIZE OR NUMBER OF TRANSACTIONS AND EXCEPTION REPORTS ON ACCOUNTS THAT SUDDENLY BECOME ACTIVE. THOROUGH INVESTIGATIONS SHOULD BE MADE ON ALL PERSONS WHO SET UP ACCOUNTS TO COLLECT FUNDS. AN INDEPENDENT REVIEW OF APPLICATIONS SOFTWARE AND ITS ASSOCIATED DOCUMENTATION SHOULD ALSO BE CONDUCTED. ENSURING THE TOTAL CORRECTNESS OF THE SYSTEM IS NOT THE FUNCTION OF THE SOFTWARE AUDITORS. THE SOFTWARE AUDITOR SHOULD REVIEW THE CODE AND PROVIDE RECOMMENDATIONS TO STRENGTHEN WEAK SPOTS IN THE INTERNAL DOCUMENTATION AND STRUCTURE OF THE PROGRAM. (AUTHOR ABSTRACT MODIFIED --RCB)
Index Term(s): Audits; Computer related crime; Crime specific countermeasures; Electronic funds transfer; Planning
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=67397

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.