Preview

Expenditure Cyle

Good Essays
Open Document
Open Document
1409 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Expenditure Cyle
The Expenditure Cycle is a recurring set of business activities and related information processing operations associated with the purchase of and payment for goods and services.
The primary external exchange of information is with suppliers (Vendors).
Information about the need to purchase goods and material flows to the expenditure cycle from the revenue and production cycles, inventory control, and various departments.
Once the goods and materials arrive, notification of their receipt flows back to those sources from the expenditure cycle.
The primary objective in the expenditure cycle is to minimize the total cost of acquiring and maintaining inventories, supplies, and the various services the organization needs to function.
6 decisions to accomplish this objective (PAGE 216)
To answer these decisions 4 basic expenditure cycle activities 1. Ordering material, supplies and services 2. Receiving materials, supplies and services 3. Approving supplier invoices 4. Cash disbursements
Expenditure Cycle Information System
Process
Most large organizations use an (ERP) enterprise resource planning system.
Threats and Controls
All expenditure cycle activities depends on the integrated database that contains information about suppliers, inventory, and purchasing activities.
The first general threat is inaccurate or invalid master data. One way to mitigate this threat or inaccurate or invalid master data is to employ data processing integrity controls. 1. Restrict access to expenditure master data
The second general threat in the expenditure cycle is unauthorized disclosure of sensitive information, such as banking information about suppliers and special pricing discounts offered by preferred suppliers. One way to mitigate the risk of this threat is to configure the system to employ strong access controls that limit who can view such information.
The third general threat in the expenditure cycle concerns the loss or destruction of master

You May Also Find These Documents Helpful

  • Better Essays

    “The first function is processing of purchase orders. This includes purchase requisitions, quotations from suppliers, and purchase orders” (Arens, Elder, & Beasley, 2012, p. 683). The second function is receipt of purchased materials. This includes the receiving report. The third function is storage of materials or inventory. This includes the materials requisition form. The fourth function is processing raw materials. This includes the job cost sheet, and process cost sheets. The fifth function is storage of finished goods. This includes the sales invoice, and the sales order form. The final function is shipping finished goods. This includes the shipping form and…

    • 2435 Words
    • 10 Pages
    Better Essays
  • Powerful Essays

    TBChap008

    • 18739 Words
    • 154 Pages

    Acquisition and expenditure activities include (1) purchasing goods and services, (2) receiving the goods or services, (3) recording the asset or expense and related liability, and (4) depreciating assets purchased.…

    • 18739 Words
    • 154 Pages
    Powerful Essays
  • Satisfactory Essays

    There are five accounting cycles that a business can use. Each cycle reveals different types of business activities. The cycles are revenue, expenditure, conversion, financing, and fixed asset. Revenues includes sales and cash receipts. Sales is all revenue earned from products sold to their customers. Cash receipts is all cash that is brought in. Expenditures is what the company spends to keep the company profitable. This would include the money spent on supplies, or paying their employees to work. The conversion cycle which is also considered the production cycle is an account of all production in a business. It allocates the costs to the production and makes sure everything is accurately expensed. The financing cycle accounts for all stock, bonds, debts, and dividend transactions. Lastly, the fixed asset cycle is accounting for all fixed assets of the business. This will include purchasing, selling, and depreciation of all major assets.…

    • 401 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    With that in mind, George orders inventory based on demand and utilizes past reports on trends. When business is slow, he decreases his inventory so he is not tying up his capital. When he sells an item, he makes sure that the replacement is ordered before the shelf is empty. This ensure maximum cash flow in his business. Managing working capital is the operational side of budgeting. When businesses put a budget together, they anticipate future cash flow and the timing of that cash flow. This planning is critical, especially in small businesses and practices (Kelly, 2014).…

    • 796 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Information that is stored in an organisation has to follow the security and confidentiality procedures. For example finances, customer’s and employee’s details should be secured and only certain members of staff should be able to access physical and electronic data unless you have been given authorisation. If information gets into the wrong hands it could have serious consequences and might lead to legal action.…

    • 777 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Learning Check

    • 4183 Words
    • 17 Pages

    The classes of transactions in this cycle for a merchandising company are sales, sales adjustments, and cash receipts. The primary accounts affected by these transactions are sales, accounts receivable, cost of sales, inventory, cash, sales discounts, sales returns and allowances, bad debts expense, and allowance for uncollectable accounts…

    • 4183 Words
    • 17 Pages
    Good Essays
  • Good Essays

    | Describe ways to protect hardware, software and data and minimise security riskThere are steps to prevent threats to system and information: access to information sources should be allowed with Username and password/PIN selection. The system set up on password strength; how and when to change passwords (monthly); online identity/profile; Real name, pseudonym; what personal information to include, who can see the information; Respect confidentiality, avoid inappropriate disclosure of…

    • 793 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Week 4 Team Reflection

    • 394 Words
    • 2 Pages

    Purchase orders for the products and goods used through the normal course of business operations…

    • 394 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Two key components of maintaining confidentiality are the integrity of information and its security. Integrity is achieved by the accuracy and completeness of information using proper processing methods. Security measures are needed to protect information from a wide variety of threats.…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Many businesses are concerned with information technology risks. Many organizations are concerned with different types of risk and attempt to control risk as they are assessed. In order to control risk, organizations must create control environments that set the tone of employee awareness and promote operational efficiency. One attempt to control risk is through risk assessment. The purpose of risk assessment is to identify organizational risks and evaluate additional or specific control procedures. The purpose of this paper is to analyze and assess the risks within the flow charts of accounts payable, accounts receivable, inventory, and payroll recommended by learning team E for Kudler Fine Foods, design internal controls to mitigate risks to the system, evaluate the application of internal controls to the system and discuss other controls outside the system that Kudler Foods may need.…

    • 1217 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Proper procedures insure that a system is not compromised or destroyed based on a simple mistake or miss management of access.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Critique of Sap System

    • 991 Words
    • 4 Pages

    The expenditure cycle is composed of purchase system and accounts payable system. The creation of material master records and vendor master records makes the purchase system more efficient. While traditional information system has three databases include customer sales A/R (customer database), production scheduling shipping (Manufacturing database) and vendor A/P inventory (Procurement database). SAP systems a common operational database (customer, production, vendor, and inventory). The problem with traditional system is the lack of effective communication between systems is often the result of a fragmented systems design process. On the other hand, SAP systems use a common operational database that supports communications and present the data in a way that meets all user needs. The material master is the main source of material specific data. It is used by all components in the logistics system. By using the master record, we can avoid data redundancy, and use the data in many other functions other than purchasing data for ordering. Those include posting goods movements, managing physical inventory, inventory valuation, and material requirements planning. Also material master is divided into three levels: client level, plant level and storage…

    • 991 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The objectives of the first role of the cycle, Statisticians, economists, other social scientist and accountants, is to identify the need for programs, collect and analyze budgetary and other financial information, and perform a cost-benefit analysis. The objective for the second role, policy makers, is to selective among alternative programs and establish policies and goals. The objectives of role three are to evaluate the efficiency and effectiveness of programs and report to policy makers. The objectives for the forth and final role are to administer the programs and prepare financial statements and other reports. Once these objectives have been met the cycle repeats itself to ensure the success of the programs.…

    • 615 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Social Care

    • 1031 Words
    • 6 Pages

    All personal data must be secured at all time. Appropriate technical and organisational measures must be taken against unauthorised or unlawful processing of personal data and against accidental lost, destruction or damage.…

    • 1031 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Quiz 9

    • 445 Words
    • 2 Pages

    ____ refers to protecting against unauthorized data disclosure and ensuring the authenticity of the data source.…

    • 445 Words
    • 2 Pages
    Satisfactory Essays