Internal Control Essays (Examples)

Studyspark

Study Document Study Document

Twitter External Internal Analysis Report To CEO

Pages: 15 (4857 words) Sources: 1 Document Type:Essay Document #:23822356

...Internal control Appendix
External Analysis
1. PESTEL Analysis
1.1. Political
1.1.1.Global leaders use of social media impacts the political landscape and is able to influence operations. (C-142)
1.1.2. Several high-profile world leaders utilize social media platforms to address their followers, the most notable being U.S. President Donald Trump who tweets regularly to announce global interactions with other political leaders. They also have high interactions and reach with the global community: U.S President Donald Trump had 30.13 million twitter followers as at May 2017 and former U.S. President Barack Obama had 103 million followers as at June 2018 (C-142)
1.1.3. Depending on the political climate in various countries, governments may censor content and access to social media platforms.
1.2. Economics
1.2.1. Generated revenues through advertising, data licensing and other products. products. In 2017, total revenue generated was $2,443, 299, 000 (C-142)
1.2.2. Fluctuating exchange rates and inflation rates can affect overall profit-margins. (C-147)……

References

References

Thompson, Arthur A.,. (2015). Crafting and Executing Strategy: Concepts and Readings..New York: McGraw-Hill Education, (pp. 138-148)

Studyspark

Study Document Study Document

Cyber Crime IT Security Auditing

Pages: 11 (3165 words) Sources: 7 Document Type:Research Paper Document #:36684821

… and critical infrastructures and operations it supports. Despite developments in information security, numerous information systems continue to display susceptibility to both external and internal breaches (Suduc, Bîzoi & Filip, 2010). internal information security auditing enhances the likelihood of implementation of suitable security measures for averting such breaches and reducing their adverse impacts.
Security risks
… typhoons, among others, terror attacks, vandalism, fire outbreak, illegal tampering, power surges, and break-ins. Vlad and Lenghel (2017) put forward a collection of control defending information systems from such physical threats.
The control include different kinds of locks, hardware insurance coverage, and coverage of information recreation costs, having processes in place for everyday data and information … access and purposeful or inadvertent modification or destruction of information or the whole information system. Such threats may be reduced using logical security control, limiting user system accessibility, and averting unauthorized system access. All of the precautions……

References

References

Almatari, O. and Helal, I., and Mazen, S., and El Hennawy, S. (2018). \\\\\\"Cybersecurity Tools for IS Auditing.\\\\\\" The 6th International Conference on Enterprise Systems, At Limassol, Cyprus 10.1109/ES.2018.00040.

Davis, W. S., & Yen, D. C. (Eds.). (2019). The information system consultant\\\\\\'s handbook: Systems analysis and design. CRC press.

Diamantopoulou, V., Tsohou, A., & Karyda, M. (2019). From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. In Computer Security (pp. 238-257). Springer, Cham.

Khan, M. (2017). Computer security in the human life. International Journal of Computer Science and Engineering (IJCSE), 6(1), 35-42.

Lenghel, R. D., & Vlad, M. P. (2017). INFORMATION SYSTEMS AUDITING. Quaestus, (11), 178.

Manaseer, S., & Alawneh, A. (2019). ON CYBERSECURITY AUDITING AWARENESS: CASE OF INFORMATION AND COMMUNICATION TECHNOLOGY SECTOR. International Journal of Computer Science and Information Security (IJCSIS), 17(7).

Suduc, A. M., Bîzoi, M., & Filip, F. G. (2010). Audit for information systems security. Informatica Economica, 14(1), 43.

Studyspark

Study Document Study Document

White Collar Criminal

Pages: 5 (1593 words) Sources: 3 Document Type:Essay Document #:32631423

… amount to an expense account.
The elements of the Opportunity Triangle (commit, conceal, convert) present in Miller’s case that allowed him to circumvent control when embezzling funds from Associated Communications consisted of the fact that he could get around the requirement for two signatures on checks by … will continue to happen in the future. Failure to report is the problem that they suffer from through and through: they lack the internal control for preventing fraud from occurring and they lack the audit team to catch bad reporting from lower down in the company. They do ……

References

References

Association of Certified Fraud Examiners. (2010). Who is Most Likely to Commit Fraud at Your Company? Retrieved from  https://www.acfe.com/press-release.aspx?id=1677 

Friedrichs, D. (2009). Trusted Criminals: White Collar Crime In Contemporary Society. Cengage Learning.

US Attorney’s Office. (2019). Attorney Convicted of Embezzling Over $1.5 Million from Virginia Senator, Canadian Business, and Autism Organization. Retrieved from https://www.justice.gov/usao-edva/pr/attorney-convicted-embezzling-over-15-million-virginia-senator-canadian-business-and-0

Studyspark

Study Document Study Document

Banking Industry Crimes

Pages: 6 (1933 words) Sources: 6 Document Type:Essay Document #:73861053

… particular case, affidavits should be presented clearly indicating that the victims did not initiate the transactions in question. In seeking to ensure that internal control are improved so as to prevent an occurrence of the very same fraudulent activity, there are a number of suggestions that I would ……

References

References

Albrecht, W.S., Albrecht, C.C., Albrecht, C.O. & Zimbelman, M.F. (2008). Fraud Examination (3rd ed.). Mason, OH: Cengage Learning.

Dionne, B. (2020). Regions Bank Teller Accused of Stealing Customer Identities Faces Felony Charges. Retrieved  https://www.wbrc.com/2020/01/30/regions-bank-teller-accused-stealing-customer-identities-facing-felony-charges/ 

Golden, T.W., Skalak, S.L. & Clayton, M.M. (2006). A Guide to Forensic Accounting Investigation. Hoboken, NJ: John Wiley & Sons.

Krancher, M., Riley, R. & Wells, T.J. (2010). Forensic Accounting and Fraud Examination. Hoboken, NJ: John Wiley & Sons.

Singleton, T.W., Singleton, A.J. & Bologna, R.J. (2006). Fraud Auditing and Forensic Accounting (3rd ed.). Hoboken, NJ: John Wiley & Sons.

Zagaris, B. (2010). International White Collar Crime: Cases and Materials. New York, NY: Cambridge University Press.

Studyspark

Study Document Study Document

Criminology Sociology And Three Theories Of Crime

Pages: 2 (570 words) Sources: 3 Document Type:Essay Document #:12132142

The key assumptions underlying strain, control, and learning theories of criminal behavior are similar, which is why they are sometimes integrated or at least interrelated in criminological discourse. Strain … experience strain—or psychological distress—resulting from unmet needs, especially when those needs are unmet due to sociological problems such as inequality, injustice, or disparity.
control theories posit a set of internal and external control on individual or even collective behavior. Social institutions are assumed to serve as mechanisms of social control, also influencing individual behaviors via a series of real or perceived constraints. Like strain theories, control theories assume that social cohesion is important for normative behavior, whereas the breakdown of social cohesion leads to the disregard for the institutions … leads to the disregard for the institutions and the norms they uphold. Without institutions or their overarching rules, individuals lack the impetus to control urges and are therefore more likely……

References

References

Crossman, A. (2019). Deviance and strain theory in sociology. Thoughtco. Retrieved from:  https://www.thoughtco.com/structural-strain-theory-3026632 

“Differential Association, Strain and Control Theories,” (n.d.). Retrieved from: julianhermida.com/contbondstrain.htm

Rukus, J., Stogner, J. & Miller, B. (2016). LBGT novel drug use as contextualized through control, strain, and learning theories. Social Science Quarterly. https://www.researchgate.net/profile/Bryan_Miller4/publication/308669239_LGBT_Novel_Drug_Use_as_Contextualized_Through_Control_Strain_and_Learning_Theories_LGBT_Novel_Drug_Use/links/5a579e46aca2726376b66832/LGBT-Novel-Drug-Use-as-Contextualized-Through-Control-Strain-and-Learning-Theories-LGBT-Novel-Drug-Use.pdf

Studyspark

Study Document Study Document

Walt Disney

Pages: 12 (3606 words) Sources: 1 Document Type:Case Study Document #:25870152

… expansion in different cultures should be consistent with measures that will allow it to achieve that ROI. The company thus needs to conduct internal analysis to see how well its resources are being inbounded, how well operations are performing in processing resources into goods or services, how … let the Pixar team do with its films. Disney’s executives should recognize the talent and vision that others bring and not attempt to control their environment. Netflix is very hands off in this way and it should be the same with Disney.
The more latitude Disney gives … it if it just monitors the reaction from fans on social media. That is where customer satisfaction is best read and understood. Output control,……

References

References

Wheelen, T. L., Hunger, J. D., Hoffman, A. N., & Bamford, C. E. (2010). Strategic management and business policy. Upper Saddle River, NJ: Prentice Hall.

Studyspark

Study Document Study Document

Self Regulation Proposal

Pages: 6 (1825 words) Sources: 6 Document Type:Essay Document #:60406308

… our industry: “Given the complexity and global nature of the modern financial market, any government's attempt to regulate it in a purely unilateral command-and-control manner will inevitably encounter the fundamental problem of regulatory arbitrage, whereby financial institutions find new ways to get around government rules, thus creating … a viable alternative. The way it would work is this: instead of complying with external standards, codes and rules, the company complies with internal standards, codes and values that both drive the company’s culture and the company’s performance. The firm must develop its own standards of conduct, … the company’s vision, and the same expectations of behavior inherent in ethical leadership. However, the firm must still be able to monitor activity internal and identify potential abuses or fraudulent activity, both through monitoring and routine internal and…[break]…a system of virtue ethics. Whatever the system is, however, it should be promoted and communicated……

References

References

Arner, D. W., Barberis, J., & Buckey, R. P. (2016). FinTech, RegTech, and the reconceptualization of financial regulation. Nw. J. Int'l L. & Bus., 37, 371.

Arnone, M., & Padoan, P. C. (2008). Anti-money laundering by international institutions: a preliminary assessment. European Journal of Law and Economics, 26(3), 361-386.

Greene, E., & Odorski, C. (2015). SEC enforcement in the financial sector: addressing

Omarova, S. T. (2010). Rethinking the future of self-regulation in the financial industry. Brook. J. Int'l L., 35, 665.post-crisis criticism. Bus. L. Int'l, 16, 5.

Omarova, S. T. (2011). Wall street as community of fate: Toward financial industry self-regulation. University of Pennsylvania Law Review, 159(2), 411-492.

Pritchard, A. C. (2003). Self-regulation and securities markets. Regulation, 26, 32.

Studyspark

Study Document Study Document

Veterans Back Pain Exercise And Therapy

Pages: 10 (3010 words) Sources: 6 Document Type:policy evaluation Document #:22049018

… been reported to help deal with disability caused by low back pain, depression for low back pain patients, and as compared to a control group, the level of pain was significantly lower for those practicing yoga stretches (Groessl et al., 2008; Williams et al., 2009).
Heat/cold therapy ……

References

References

Bagg, M. K., Hübscher, M., Rabey, M., Wand, B. M., O’Hagan, E., Moseley, G. L., ... & O’Connell, N. E. (2017). The RESOLVE Trial for people with chronic low back pain: protocol for a randomized clinical trial. Journal of physiotherapy, 63(1), 47-48.

Chou, R., Deyo, R., Friedly, J., Skelly, A., Hashimoto, R., Weimer, M., ... & Grusing, S. (2017). Nonpharmacologic therapies for low back pain: a systematic review for an American College of Physicians clinical practice guideline. Annals of internal medicine, 166(7), 493-505.

Dehghan, M., & FarahbOD, F. (2014). The efficacy of thermotherapy and cryotherapy on pain relief in patients with acute low back pain, a clinical trial study. Journal of clinical and diagnostic research: JCDR, 8(9), LC01.

Denneson, L. M., Corson, K., & Dobscha, S. K. (2011). Complementary and alternative medicine use among veterans with chronic noncancer pain—Journal of Rehabilitation Research & Development, 48(9).

Guzmán, J., Esmail, R., Karjalainen, K., Malmivaara, A., Irvin, E., & Bombardier, C. (2001). Multidisciplinary rehabilitation for chronic low back pain: systematic review. BMJ, 322(7301), 1511-1516.

Hayden, J. A., Van Tulder, M. W., & Tomlinson, G. (2005). Systematic review: strategies for using exercise therapy to improve outcomes in chronic low back pain. Annals of internal medicine, 142(9), 776-785.

Kim, E. J., Choi, Y. D., Lim, C. Y., Kim, K. H., & Lee, S. D. (2015). Effect of heating and cooling combination therapy on patients with chronic low back pain: study protocol for a randomized controlled trial. Trials, 16(1), 285.

Nitsure, P. V., Pathania, T. S., & Bilgi, T. A. (2014). Comparison of elastic resistance band exercises and yoga in physiotherapy students with chronic non-specific low back pain: a randomized clinical trial. Journal of Yoga & Physical Therapy, 5, 180.

Studyspark

Study Document Study Document

Understanding The Factors Affecting The Success Of Credit Risk In

Pages: 11 (3237 words) Sources: 15 Document Type:Research Paper Document #:41178734

… management encompasses the practice of identifying, assessing and listing of risks followed by organized and cost-effective application of resources to curtail, supervise and control the probability and influence of disastrous events or to capitalize in the realization of prospects (Gizaw, Kebede, and Selvaraj, 2015).
The power and … take in significant insight from past experiences. Presently, banks ought to have a profound cognizance of the need to ascertain measure, supervise and control fundamental credit risk factors (Asfaw and Veni, 2015).
In relation to existent literature, scholars have determined that the factors affecting the success of … relation to existent literature, scholars have determined that the factors affecting the success of credit risk can be categorized into two groups including internal factors (micro-economic) and external factors (macro-economic). In accordance to Garr (2013), the different factors that influence credit risk can be classified into macroeconomic ……

References

References

Bhattarai, Y. R. (2016). Effect of credit risk on the performance of Nepalese commercial banks. NRB Economic Review, 28(1), 41-64.

Das, A. and Ghosh, S. (2007). Determinants of Credit Risk in Indian State-owned Banks: An Empirical Investigation. Economic Issues, 12(2): 48-66.

Derelio?lu, G., & Gürgen, F. (2011). Knowledge discovery using neural approach for SME’s credit risk analysis problem in Turkey. Expert Systems with Applications, 38(8), 9313-9318

Garr, D. K. (2013). Determinants of credit risk in the banking industry of Ghana. Developing Country Studies, 3(11), 64-77.

Gizaw, M., Kebede, M., & Selvaraj, S. (2015). The impact of credit risk on profitability performance of commercial banks in Ethiopia. African Journal of Business Management, 9(2), 59-66.

Johnson, B., & Christensen, L. (2008). Educational research: Quantitative, qualitative, and mixed approaches. New York: Sage.

Kithinji, A. M. (2010). Credit risk management and profitability of commercial banks in Kenya. (Doctoral dissertation, University of Nairobi).

Limam, I. (2001). Measuring technical efficiency of Kuwaiti banks. Kuwait: Arab Planning Institute.

Studyspark

Study Document Study Document

Organizational Concepts

Pages: 5 (1484 words) Sources: 6 Document Type:Research Paper Document #:57244011

… a brand identity, communicate the organization’s commitment to social justice or environmental stewardship, and to align itself with strategic partners. When external or internal crises threaten the organization, its worldview can also help……

References

References

Ahmed, A. (2019). Importance of mission vision in organizational strategy. The Chronicle. Retrieved from:  https://smallbusiness.chron.com/importance-mission-vision-organizational-strategy-16000.html 

Daft, R.L. (2013). Organizational theory and design. Boston: Cengage.

Metcalf, T. (n.d.). Contingency theory of organization. The Chronicle. Retrieved from:  https://smallbusiness.chron.com/contingency-theory-organization-73865.html 

Morgan, G. (2006). Images of organization. Thousand Oaks, CA: Sage.

Sire, J.W. (2009). The universe next door. Intervarsity.

Suhomlinova, O. & Currie, G. (2016). Organizational contingencies. The Blackwell Encyclopedia of Sociology. Retrieved from: https://doi.org/10.1002/9781405165518.wbeoso019.pub2

Join thousands of other students and

"spark your studies".