School of Accountancy
Permanent URI for this community
This Department was known as the Department of Accounting until 27 June 2013.
Browse
Browsing School of Accountancy by browse.metadata.advisor "Boshoff, W. H."
Now showing 1 - 10 of 10
Results Per Page
Sort Options
- ItemAddressing the incremental risks associated with adopting a Bring Your Own Device program by using the COBIT 5 framework to identify keycontrols(Stellenbosch : Stellenbosch University, 2014-04) Weber, Lyle; Smit, Sybil; Boshoff, W. H.; Stellenbosch University. Faculty of Economic and Management Sciences. School of Accountancy.ENGLISH ABSTRACT: Bring Your Own Device (BYOD) is a technological trend which individuals of all ages are embracing. BYOD involves an employee of an organisation using their own mobile devices to access their organisations network. Several incremental risks will arise as a result of adoption of a BYOD program by an organisation. The research aims to assist organisations to identify what incremental risks they could potentially encounter if they adopt a BYOD program and how they can use a framework like COBIT 5 in order to reduce the incremental risks to an acceptable level. By means of an extensive literature review the study revealed 50 incremental risks which arise as a result of the adoption of a BYOD program. COBIT 5 was identified as the most appropriate framework which could be used to map the incremental risks against. Possible safeguards were identified from the mapping process which would reduce the incremental risks to an acceptable level. It was identified that 13 of the 37 COBIT 5 processes were applicable for the study.
- ItemApplying COBIT in an ERP environment, with specific reference to Qmuzik(Stellenbosch : University of Stellenbosch, 2006-12) Kieviet, Freda; Boshoff, W. H.; University of Stellenbosch. Faculty of Economic and Management Sciences. Dept. of Accountancy.ERP applications have evolved into enterprise-wide applications, which are generally acknowledged today as a critical component in an organisation’s information strategy. When implementing an ERP application, the control and governance of all IT processes are critical to ensure that value is delivered, risks are managed and that the investment in IT (ERP) delivers a reasonable return. It should, therefore, be important to focus on mitigating IT process risks that have an impact on the ERP environment, so that the level of residual risk is acceptable and aligned with the business objectives. This assignment focuses on using the generally accepted IT framework, COBIT (Control Objectives for Information and related Technology), as governance and control model. The criticality of each COBIT control objective (IT process) is evaluated by applying the COBIT control objectives in an ERP environment. Specific reference is also made to Qmuzik as an ERP application. By applying COBIT in an ERP environment, the most critical IT processes applicable to ERP are identified, in order to ensure that the minimum process controls for these IT processes are designed and implemented.
- ItemApplying PRINCE2 project management disciplines to address key risks in ERP System Implementation Projects(Stellenbosch : University of Stellenbosch, 2007-03) Plotnikova, Svetlana; Boshoff, W. H.; University of Stellenbosch. Faculty of Economic and Management Sciences. Dept. of Accountancy.The successful implementation of an Enterprise Resource Planning (ERP) System can help an organisation to redefine its business processes and enhance its competitive advantage. An ERP System Implementation is a transformation project, which changes the way an organisation thinks and acts about its business. An ERP System implementation is also a complex endeavour, and as such, it requires rigorous risk management. The understanding and management of risks relevant to ERP System Implementation Projects are critical in order to ensure that the project delivers on its objectives within the specified budget and timelines, and eventually realises the envisaged business benefits. The purpose of this study is to discuss how key risks relevant to ERP System Implementation Projects could be addressed by applying project management disciplines derived from the PRINCE2 (PRojects IN Controlled Environment) project management methodology. This methodology was developed by the Office of Government Commerce in the United Kingdom. This study also provides a framework that could be applied at the outset and during an ERP System Implementation Project by business management, to understand the risks (“what could go wrong?”) and project management disciplines that should be applied to address these risks (“what must go right?”). This framework was derived by: • Identifying key risks relevant to ERP System Implementation Projects; • Mapping these key risks onto SAP Implementation phases to highlight where these risks could materialise in the SAP Implementation process; • Then mapping these key risks across PRINCE2 project management processes and SAP Implementation phases by creating the SAP Implementation Key Risks Map; and finally • Providing a detailed description of how to apply PRINCE2 project management disciplines to address each risk in the SAP Implementation Key Risks Map.
- ItemB2B and the supplier : preventing repudiation of orders in an open account system(Stellenbosch : University of Stellenbosch, 2003-12) Butler, Rika; Boshoff, W. H.; University of Stellenbosch. Faculty of Economic and Management Sciences. Dept. of Accountancy.
- ItemA framework for the integration of information technology in the education of professional accountants at South African universities(Stellenbosch : University of Stellenbosch, 2006-12) Wessels, Philippus Lodewikus; Boshoff, W. H.; University of Stellenbosch. Faculty of Economic and Management Sciences. Dept. of Accountancy.ENGLISH ABSTRACT: The accountancy profession operates within an environment that is changing at a rapid pace. It is the responsibility of the profession to ensure that all its members (including future members) meet the expectations placed on them by the users of their services. Professional accountants need to stay relevant in this changing environment that may require them to change or adapt the services they offer to their clients. It is the responsibility of professional accountancy bodies to strategically plan for these changes to ensure that members that join the profession posses the required knowledge and skills to be relevant and to stay relevant within the environment they operate in. One of the key drivers of change in the environment has been identified as the advances in information and communication technologies. Information and communication technologies have an impact on the role that accountants play in the environment (i.e. what they do) as well as on how they perform their role (i.e. how they do it). The main aim of this research was to determine if, and to what extent, students, that have completed their formal education and enter the profession as trainee accountants, possess the knowledge and skills to enable them to interact with and use information technology to be regarded as competent accountants within the South African business environment. Accountants are educated in South Africa at universities that offer programmes that have been accredited by a professional accountancy body as well as through practical training offered by training organisations. During this education process, accountants are imparted with the knowledge and skills as prescribed by the professional accountancy body so that they can join the profession as competent accountants. This research showed that there are serious shortcomings in the formal education of students regarding information technology that results in students entering the profession as trainee accountants not being competent in using information technology. The reasons for students not being competent in information technology are: • the lack of clear guidance on the IT skills required of students completing their formal education because of professional accountancy bodies setting IT syllabi that are too vague and/or concise; • ignorance of the demands on trainee accountants as to the IT skills they require to be competent in the South African business environment; and • the lack of proper IT training offered by South African universities that deliver trainee accountants that possess a limited range of IT skills that may not be relevant to the environment students will function in. Through a survey the perceptions of role-players at South African universities on the strategies that universities would have to employ to ensure that the students they deliver to profession, acquire the relevant IT skills to be competent in the use of information technology, were determined.
- ItemGovernance of virtual private networks using COBIT as framework(Stellenbosch : University of Stellenbosch, 2007-04) Sherry, Zaida; Boshoff, W. H.; University of Stellenbosch. Faculty of Economic and Management Sciences. Dept. of Accountancy.The purpose of this assignment is to ascertain whether the COBIT framework is an adequate framework to assist in the governance of virtual private networks. The assignment focuses on whether the framework can ensure the identification of virtual private network-related risks and address IT compliance with policies and statutory regulations. A brief summary of the risks and issues pertaining to the pre-implementation, implementation and post-implementation phases of virtual private networks is included in the assignment. These risks and issues are then individually mapped onto a relevant COBIT control objective. The scope of the assignment does not include the intricacies of how these networks operate, the different types of network topologies or the different technologies used in virtual private networks. It was found that the COBIT framework can be implemented to manage and/or mitigate virtual private network risks.
- ItemAn information technology governance framework for the public sector(Stellenbosch : Stellenbosch University, 2011-12) Terblanche, Judith; Boshoff, W. H.; Butler, R.; Stellenbosch University. Faculty of Economic and Management Sciences. Dept. of Accountancy.ENGLISH ABSTRACT: Information technology (IT) has an impact on the accomplishments of the entity (Kaselowski, 2008:83). Traditionally, public sector entities struggle to gain any value from the IT environment and regularly overspend on IT projects. In South Africa the Third King Report on Corporate Governance (King III) introduced ‘The governance of IT’ (IODSA, 2009) applicable to both private and public sector entities. Although generic IT frameworks such as ITIL and COBIT exist and are used by private and public entities to govern the IT environment, public sector entities require a specific IT governance framework suited to the unique characteristics and business processes of the public sector entity. Taking into account the unique nature of the public sector entity, the purpose of this study was to assist public sector entities in their IT governance efforts through the development of a framework to be used to govern IT effectively, since sufficient guidance for the public sector does not exist. Leopoldi (2005) specifically pointed out that a top-bottom framework could be limiting for entities operating in a diverse field and having complicated organisational structures, both characteristics integral to the public sector environment. Since a topbottom and a bottom-top approach fulfil different purposes, both are needed for IT governance in the public sector entity. By combining the two approaches and focusing on the unique environment of the public sector entity, a governance framework can be established. This will ensure that insight has been gained into the IT environment and the business processes and that true alignment between the business and the IT environment for the public sector entity has been achieved. This framework developed will assist the public sector entity in governing the IT environment unique to this industry and will equip public sector management with a framework to govern IT more effectively, while under pressure of public scrutiny.
- ItemMapping the Information Technology (IT) governance requirements contained in the King III Report to the IT domains and processes of the Control Objectives for Information and Related Technology (COBIT) framework(Stellenbosch : University of Stellenbosch, 2009-12) Steenkamp, Gretha; Boshoff, W. H.; Butler, Rika; University of Stellenbosch. Faculty of Economic and Management Sciences. Dept. of Accountancy.ENGLISH ABSTRACT: Due to the integration of IT into all aspects of modern-day businesses, it is vital that the risks associated with IT are governed as an integral element of enterprise-wide corporate governance. The Third King Report on Corporate Governance (King III) was issued by the South African Chapter of the Institute of Directors in September 2009 and becomes operational on 1 March 2010. This marks the first time that the King Report has specifically addressed IT governance. King III will apply to all corporate entities. Such entities could benefit from applying an IT governance framework to ensure that they adequately address all aspects of IT governance, as required by King III. One of the comprehensive frameworks available is COBIT (Control Objectives for Information and Related Technology) issued by ISACA (previously known as the Information Systems Audit and Control Association). King III mentions the fact that COBIT could be used to assess and implement IT governance within an entity. The aim of this research is to determine whether the use of COBIT ensures compliance with King III’s requirements relating to IT governance. It was found that the main requirements in King III relating to IT governance and the processes of COBIT are well aligned, and, as a result, COBIT could be used effectively to ensure compliance with King III in relation to IT governance. However, an entity would still have to pay attention to certain King III-specific requirements. Furthermore, it was found that the application of the principles in COBIT could further strengthen the IT governance of an entity, as COBIT also addresses the more detailed activities, such as the implementation and operation of the IT system, which is not specifically addressed by King III.
- ItemA structured technique for applying Risk Based Internal Auditing in information technology environments (with specific reference to IIA RBIA, King Report and CobiT)(Stellenbosch : University of Stellenbosch, 2005-03) Wheeler, Sonya; Boshoff, W. H.; University of Stellenbosch. Faculty of Economic and Management Sciences. Dept. of Accountancy.ENGLISH ABSTRACT: A technique that may be used to incorporate Risk Based Internal Auditing (RBIA) in the IT environment is to follow annual audit planning methodology steps. The IT infrastructure elements are linked to the business processes which they support. Their ranking are based on the risk assessments of the business process, the business process priority, the dependency of the business process on IT and the IT infrastructure element’s own risk assessment. CobiT is used as an auditing method, i.e. best practice guidance to audit against.
- ItemUser considerations when applying machine learning technology to accounting tasks(Stellenbosch : Stellenbosch University, 2018-12) Smith, Liezl; Boshoff, W. H.; Lamprecht, C.; Stellenbosch University. Faculty of Economic and Management Sciences. School of Accountancy.ENGLISH SUMMARY : Machine learning is a strategic technology that can have an important effect on business, as it is able to perform tasks efficiently that were previously only performed by humans. When implementing this technology in the relevant business processes and utilising it effectively, users have to understand both it as well as other aspects have to be considered. It was found that one area that is well suited to the adoption of machine learning, is accounting. In addition, prior research has shown a need for accounting users to be educated in machine learning as part of their professional training. Therefore, the aim of this study was to enhance users’ understanding of machine learning technology specifically in the performance of accounting processes. A grounded theory methodology was employed to identifying the accounting tasks machine learning could perform, to describe how machine learning functions and to identify the risks, benefits and limitations associated with the technology. Finally, steps and considerations when implementing machine learning technology in the accounting process were provided. The findings of this research are that the user has a key role to play when using machine learning technology in the accounting processes and thus has to understand the technology, the risks and limitations, as well as the benefits of the technology. The risks discussed relate not only to machine learning technology but also to all the components that enable the functioning of the technology to ensure alignment with the accounting process goals. Based on these findings, this research presents the user considerations and steps to take when implementing machine learning in selected accounting processes. These can be used to identify areas that may require attention when a business is adopting machine learning. One important consideration is the implementation of adequate data governance. This is because most of the risks identified for machine learning technology are data risks. Further research could therefore be directed at developing a data governance framework for machine learning technologies.