...Issues in Public Law: Challenges and Perspectives, Faculty of Law, Universiti Teknologi MARA (UiTM), 13th to 14 December 2011, Shah Alam, Malaysia. ABSTRACT In Newton v Birmingham Small Arms Co (1906), the English court made it clear that the rights of auditors cannot be abridged nor restricted by any regulations of the company. This is to ensure that the auditors’ rights are secured. The rights are unqualified and this will enable auditors to discharge their role and duties effectively. Additionally, the Companies Act 1965 (CA) gives substantive powers to enable auditors to carry out their duties effectively. This is because if their hands are tied, they will not be able to uncover any wrongdoings by the company’s management. In fact, any one who obstructs their duties, is in breach of the CA. Auditors have a right of access at all reasonable times to the accounting records and other records, including registers of the company. Moreover, the CA provides that auditors enjoy qualified privilege in certain circumstances. Thus, this study investigates imperative issues on the office of auditors concerning rights, powers and privilege. This is to strengthen the role and duties of auditors to bring about a more meaningful existence of auditors. In doing so, this study will explore the necessary reforms that should be made on the issues concerning the office of auditors. Auditors’ office and powers should not be taken lightly. Nevertheless, the provisions in ‘the Companies Act’...
Words: 5159 - Pages: 21
...HULT International Business School EMBA Carlo Giorgis HULT International Business School Executive MBA CHANGE MANAGEMENT The reorganization of the Group Internal Audit Department FINAL assignment: Carlo Giorgis Change Management 1 HULT International Business School EMBA Carlo Giorgis EXECUTIVE SUMMARY UniCredit is one of the largest European financial groups, operating in 22 European countries with around 160.000 employees worldwide and 9.500 branches. In 2005, following the merger with HVB and the appointment of a new Head of Department, the Internal Audit Department (IAD) was reorganized. The expected results were obtained later than planned, with large resistances, process and relationships disruptions and bureaucracy increase. Main reasons were due to a simplistic approach to change, an inadequate leadership style, lack of compelling vision and insufficient communication. The IAD restructure could have been managed more effectively with a different approach in terms of: Organization metaphor: IAD has aspects of both Machine and Organism (Morgan, 1986); Model of change: William Bridges’s Model (Managing the transition, 1991) and Kotter Eight Steps (1995); People’s management, keeping into account the Behavioral (Pavlov, 1928 – Skinner, 1953) and Psychodynamic (Kubler-Ross, 1969 – Satir et al, 1991) approaches; Team’s management, building a project team taking into account the personal traits of team members (Belbin, 1981), involving external...
Words: 3072 - Pages: 13
...Adodis Technologies: Tracking Structural Evolution of a Web-Startup A report submitted to tejas@iimb This report captures the insights derived from the study of internal and external factors of Adodis Technologies along with the interaction between the two and role played in determining structure. This report aims at applying classroom concepts to tackle real life situations in an organization. 1 Table of Contents Abstract 1 Introduction 2 Strategy & Other factors affecting Structure 2.1 Strategy 2.2 Environment 2.3 Stage in the Life Cycle 3 Evolution of Structure 3.1 Problems in the Current Structure 4 Culture and Control 4.1 Preliminary Observations 4.2 Survey Analysis Results 4.3 Team Wise Trends 5 Structural Recommendations 6 Conclusion Author Details Appendix References 2 2 3 3 4 4 5 5 5 5 6 6 6 7 7 8 13 2 Abstract This article contains the brief analysis of the evolution of structure and culture of a rapidly growing entrepreneurial venture-Adodis Technologies, founded in 2008. The vision and mission perceived by the CEO has helped this web technology start-up to quickly carve a niche for itself in the market and to go international within only 3 years of its inception. Low start-up and operational costs for companies operating in the web development area have created an extremely competitive market, in which Adodis is still a new player. Thus, although its primary role and image in the market is still that of a low-cost player, the CEO has been taking several...
Words: 3144 - Pages: 13
...TABLE OF CONTENTS Pages 1. Executive Summary 3 2. Main Issues 4 3. Ethics Policy and its Development 5 3.1. Proposed Ethics Policy 5 3.2. Rationale of Ethics Policy 6 3.3. Policy Development 6 3.3.1. Virtue Ethic 7 3.3.2. Utilitarianism Ethic 7 3.3.3. Kantianism Ethic 8 3.4. Corporate Social Responsibility 8 4. Implementation, Effectiveness, and Limitations 9 4.1. Implementation of Ethics Policy 9 4.2. Effectiveness of Ethics Policy 10 4.3. Limitations of Ethics Policy 11 5. Conclusion 12 6. Reference List 14 1) Executive Summary The Coca-Cola Company was founded in 1892. The company, till date, offers a wide range of products to meet different demands of customers all over the world. Coca-Cola not only produces and sells soft drink and non-carbonated beverages; they also distribute bottled waters around the world. Increasing shareholder values would be any major company’s target, likewise Coca-Cola’s, having to keep costs low but yet selling the customers their trusted quality products. Coca-Cola operates in a very competitive environment being in the beverages industry. In 1893, Coca-Cola’s greatest competitor, Pepsi-Cola, came into the market, and rivalry has been going on from then till now. Competition leads...
Words: 2851 - Pages: 12
...PP. 70 – 82 European Journal of Business and Social Sciences, Vol. 1, No. 5, pp 70-82, August 2012. URL: http://www.ejbss.com/recent.aspx ISSN: 2235 -767X IMPACT OF EMPLOYEES SAFETY CULTURE ON ORGANISATIONAL PERFORMANCE IN SHELL BONNY TERMINAL INTEGRATED PROJECT (BTIP) Dr. M.O. Agwu, MNIM, MNISP Department of Business Administration, Niger Delta University, Wilberforce Island, Bayelsa State ABSTRACT he paper focuses on the impact of employees’ safety culture on organizational performance (improved management/employees safety practices, enhanced productivity, increased profitability and reduced accident/ incident rate) in shell bonny terminal integrated project. It defines employees’ safety culture as a product of individual and group values, attitudes, perceptions, competencies, and patterns of behavior that determine the level of commitment, style and proficiency of an organization’s safety management system. It assumes that inculcation of employees’ safety culture on the workforce at the task level using behavior-based safety culture approach (enforcement and education) has an influence on employees’ safety performance as well as on company performance: enhancement of productivity, profitability and loss control through reduction of accident/incident rate. The paper posits that: if construction companies in Shell Bonny terminal integrated project (BTIP) inculcate safety culture in their workforce through changing employees’ attitude to safety, there...
Words: 5343 - Pages: 22
...Syllabus Certified General Accountants Association of Canada 100 – 4200 North Fraser Way Burnaby, British Columbia Canada V5J 5K7 www.cga-canada.org © CGA-Canada, 2013 All rights reserved. These materials or parts thereof may not be reproduced or used in any manner without the prior written permission of the Certified General Accountants Association of Canada. Printed in Canada ISBN for an individual volume: 978-1-55219-599-4 About CGA-CANADA _________________________________________ CGA-Canada today The CGA designation focuses on integrity, ethics, and the highest education requirements. Recognized as the country’s accounting business leaders, CGAs provide strategic counsel, financial leadership, and overall direction to all sectors of the Canadian economy. The Certified General Accountants Association of Canada — CGA-Canada — sets standards, develops education programs, publishes professional materials, advocates on public policy issues, and represents CGAs nationally and internationally. The Association represents 75,000 CGAs and students in Canada, Bermuda, the Caribbean, Hong Kong, and China. Mission CGA-Canada advances the interests of its members and the public through national and international representation and the establishment of professional standards, practices, and services. A proud history CGA-Canada was founded in Montréal in 1908 under the leadership of John Leslie, vicepresident of the Canadian Pacific Railway. From the beginning, its objective...
Words: 39811 - Pages: 160
... PART 3—IMPROPER BUSINESS PRACTICES AND PERSONAL CONFLICTS OF INTEREST 3.1 Safeguards 3.2 Contractor Gratuities to Government Personnel 3.3 Reports of Suspected Antitrust Violations 3.4 Contingent Fees 3.5 Other Improper Business Practices 3.6 Contracts with Government Employees or Organizations Owned or Controlled by Them 3.7 Voiding and Rescinding Contracts 3.8 Limitations on the Payment of Funds to Influence Federal Transactions 3.9 Whistleblower Protections for Contractor Employees 3.10 Contractor Code of Business Ethics and Conduct 3.11 Preventing Personal Conflicts of Interest for Contractor Employees Performing Acquisition Functions PART 4—ADMINISTRATIVE MATTERS 4.1 Contract Execution 4.2 Contract Distribution 4.3 Paper Documents 4.4 Safeguarding Classified Information Within Industry 4.5 Electronic Commerce in Contracting 4.6 Contract Reporting 4.7 Contractor Records Retention 4.8 Government Contract Files 4.9 Taxpayer Identification Number Information 4.10 Contract Line Items 4.11 Central Contractor Registration 4.12 Representations and Certifications 4.13 Personal Identity Verification 4.14 Reporting Executive Compensation and First-Tier Subcontract Awards 4.15 American Recovery and Reinvestment Act—Reporting Requirements 4.16 Unique Procurement Instrument Identifiers FAC 2005–54 DECEMBER 2, 2011 STRUCTURE FEDERAL ACQUISITION REGULATION ii SUBCHAPTER B—COMPETITION AND ACQUISITION...
Words: 2367 - Pages: 10
...Cultural and Critical Approaches: An Application on the Table of Contents Cover Page……………………………………………………………1 List of Tables and Graphs…………………………………………...2 Executive Summary………………………………………………….3 1. Introduction………………………………………………………..4 2.1 Purpose & Scope……………………………………………4 2.2 Method………………………………………………………..4 2.3 Limitations……………………………………………………4 2.4 Assumptions…………………………………………………5 2.5 Background…………………………………………………..5 2. Findings……………………………………………………………7 3.6 Cultural Approach…………………………………………...7 3.7 Critical Approach…………………………………………….7 3. Discussion…………………………………………………………7 4.8 Cultural Approach…………………………………………...7 4.9 Critical Approach…………………………………………….9 4. Conclusion..……………………………………………………….11 5. Recommendations and Implementation……………………….11 ------------------------------------------------- Tables and References………………………………………………12 ------------------------------------------------- List of tables and graphs Table 1: Operational Structure Table 2: Executive Structure Table 3: Corporate Governance Structure Table 4: Staff by age and gender Executive Summary The Northern Territory Government (NTG) consists of 22 agencies. It is responsible for a wide range of functions, including but not limited to budgeting, finance, housing, taxation, etc. Department of Business and Employment (DBE) is one of the agencies under the NTG. Its main responsibilities are to deliver corporate...
Words: 2960 - Pages: 12
...IS416 Securing Windows Platforms and Applications FINAL EXAMINATION 1. Scope This exam covers all Units and is based on the content from the textbook. 2. Answer Key |Question Number |Correct Answer |Course Objective(s)|Reference | | | |Tested | | |1. |c |1.1 |Security Strategies in Windows Platforms and Applications, Pages 22–23 | |2. |b |1.2 |Security Strategies in Windows Platforms and Applications, Page 27 | |3. |d |1.3 |Security Strategies in Windows Platforms and Applications, Page 31 | |4. |c |1.4 |Security Strategies in Windows Platforms and Applications, Page 32 | |5. |a |1.5 |Security Strategies in Windows Platforms and Applications, Page 32 | |6. |c |2.1 |Security Strategies in Windows Platforms and Applications, Page 42 | |7. |a |2.2 |Security Strategies in Windows Platforms and Applications, Page 44 | |8. ...
Words: 2305 - Pages: 10
...flow and new bookings. For the fourth quarter, revenues before reimbursements (“net revenues”) were $6.8 billion, an increase of 2 percent in U.S. dollars and 9 percent in local currency compared with the fourth quarter of fiscal 2011. Diluted earnings per share were $0.88. Operating margin was 13.8 percent. Operating cash flow was $1.7 billion and free cash flow was $1.6 billion. New bookings were $9.2 billion, the company’s highest quarterly bookings ever. For the full fiscal year, net revenues were $27.9 billion, an increase of 9 percent in U.S. dollars and 11 percent in local currency compared with fiscal 2011. Diluted earnings per share were $3.84, an increase of 13 percent. Operating margin was 13.9 percent. Operating cash flow was $4.3 billion and free cash flow was $3.9 billion, which exceeded the top end of the company’s guided range by nearly $400 million. New bookings were...
Words: 6051 - Pages: 25
...An Internship Report On Audit Procedure of UHY Syful Shamsul Alam & Co. and A Comparative Analysis on IFRS (IAS) and AAOIFI on Financial Reporting Issues Department of Finance Faculty of Business Studies University of Dhaka An Internship Report On Audit Procedure of UHY Syful Shamsul Alam & Co. and A Comparative Analysis on IFRS (IAS) and AAOIFI on Financial Reporting Issues (As partial fulfillment of BBA Program) Submitted To Department of Finance University of Dhaka Supervised By Taher Jamil Lecturer Department of Finance University of Dhaka Submitted By Md. Rased Mosarraf ID: 16-062 Department of Finance University of Dhaka Date of Submission: May 22, 2014. Letter of Transmittal May 22, 2014. Taher Jamil Lecturer Department of Finance University of Dhaka Subject: Submission of internship report. Dear Sir, I have the pleasure to submit an Internship Report after completing a successful three month Internship attachment at a CA firm named “UHY Syful Shamsul Alam & Co.” on “Audit Procedure of UHY Syful Shamsul Alam& Co. and A Comparative Analysis on IFRS (IAS) and AAOIFI on Financial Reporting Issues”. I have concentrated my best effort to achieve the objectives of the report and hope that my endeavor will serve the purpose. The practical knowledge and experience gathered during report preparation will immeasurably help in my future professional life. I will be obliged if you kindly approved this endeavor...
Words: 13877 - Pages: 56
...1.Construct a 1988 Statement of Cash Flows for MiniScribe. MiniScribe Statement of Cash Flows | (millions of dollars) | | 1988 | | 1987 | | | | | Cash Flows from Operating Activities | | | | | | | | Net Income | 26 | | 31 | | | | | Non-Cash Adjustments | | | | Depreciation Expense | 6 | | 11 | | | | | Changes in Assets and Liabilities Related to Operations | | | | Accounts Receivable | -116 | | -17 | Inventory | -56 | | -39 | Accounts Payable | 143 | | 23 | Accruals | 6 | | 4 | | | | | Net Cash Flow from Operating Activities | 9 | | 13 | | | | | | | | | Cash Flows from Investing Activities | | | | | | | | Purchase of PPE | -9 | | -49 | Purchase of Other Asset | | | -9 | Net Cash Flow from Investing Activities | -9 | | -58 | | | | | | | | | Cash Flows from Financing Activities | | | | | | | | Long term debt | 1 | | 75 | Issuance of Common Stock | | | 4 | Net Cash Flow from Financing Activities | 1 | | 79 | | | | | | | | | Net Change In Cash and Cash Equivalents | 1 | | 34 | | | | | | | | | Cash at Beginning of Period | 50 | | 16 | | | | | | | | | Cash at End of Period | 51 | | 50 | 2.Perform a ratio analysis using the case Appendix to identify red flags for potential fraud at MiniScribe. Emerging Fraud Models Ratios | 1988 | 1987 | 1986 | 1. Quality of Earnings | | | | OCF | 9 | 13 | 8 | NI | 26 | 31 | 23 | OCF/NI...
Words: 3993 - Pages: 16
...com/journal-detail.php?id=5007 INNOVATIONS IN ACADEMIC PERFORMANCE AUDIT (APA) TO EMPOWER TEACHING & LEARNING: THE UNITEN EXPERIENCE Zainal Ariffin Ahmad Graduate Business School, College of Graduate Studies, UNITEN, Kajang Malaysia Norsalwati Binti Mohd Razalli Quality Management Centre,UNITEN, Kajang Malaysia ABSTRACT Institutional audit is an integral part of the quality assurance process in the Malaysian higher education to determine whether the institution is achieving its mission and goals, to identify strengths and areas of concern, and to enhance quality. One form of institutional audit is the periodic academic performance audit to determine the continuation or maintenance of programme accreditation status. In 2011, UNITEN conducted an institutional audit (Academic Performance Audit) exercise to prepare for SETARA 2012 or the Rating System for Higher Education Institutions in Malaysia. UNITEN was conferred SETARA Tier 5 - Excellent in 2012 compared to Tier 4 in 2009. Based on action science approach, this paper discusses the lessons learned during the Academic Performance Audit (APA) conducted in 2011 and how they empowered the teachinglearning environment at UNITEN. It will also highlight the three innovations introduced in the APA process. Keywords:Academic Performance Audit (APA), Rating system (SETARA), Action science, teaching-learning, Innovation. 1. INTRODUCTION Institutional audit is an integral part of the quality assurance process in the Malaysian...
Words: 4780 - Pages: 20
...SSCP Study Notes 1. Access Controls 2. Administration 3. Audit and Monitoring 4. Risk, Response, and Recovery 5. Cryptography 6. Data Communications 7. Malicious Code Modified version of original study guide by Vijayanand Banahatti (SSCP) Table of Content 1.0 ACCESS CONTROLS…………………………………………………………...... 03 2.0 ADMINISTRATION ……………………………………………………………... 07 3.0 AUDIT AND MONITORING…………………………………………………...... 13 4.0 RISK, RESPONSE, AND RECOVERY………………………………………....... 18 5.0 CRYPTOGRAPHY……………………………………………………………....... 21 6.0 DATA COMMUNICATIONS…………………………………………………...... 25 7.0 MALICIOUS CODE……………………………………………………………..... 31 REFERENCES………………………………………………………………………........ 33 1.0 ACCESS CONTROLS Access control objects: Any objects that need controlled access can be considered an access control object. Access control subjects: Any users, programs, and processes that request permission to objects are access control subjects. It is these access control subjects that must be identified, authenticated and authorized. Access control systems: Interface between access control objects and access control subjects. 1.1 Identification, Authentication, Authorization, Accounting 1.1.1 Identification and Authentication Techniques Identification works with authentication, and is defined as a process through which the identity of an object is ascertained. Identification takes place by using some form of authentication. Authentication Types Example Something you know...
Words: 17808 - Pages: 72
...Department of Defense INSTRUCTION NUMBER 8510.01 November 28, 2007 ASD(NII)/DoD CIO SUBJECT: References: DoD Information Assurance Certification and Accreditation Process (DIACAP) (a) Subchapter III of Chapter 35 of title 44, United States Code, “Federal Information Security Management Act (FISMA) of 2002” (b) DoD Directive 8500.01E, “Information Assurance (IA),” October 24, 2002 (c) DoD Directive 8100.1, “Global Information Grid (GIG) Overarching Policy,” September 19, 2002 (d) DoD Instruction 8500.2, “Information Assurance (IA) Implementation,” February 6, 2003 (e) through (ab), see Enclosure 1 1. PURPOSE This Instruction: 1.1. Implements References (a), (b), (c), and (d) by establishing the DIACAP for authorizing the operation of DoD Information Systems (ISs). 1.2. Cancels DoD Instruction (DoDI) 5200.40; DoD 8510.1-M; and ASD(NII)/DoD CIO memorandum, “Interim Department of Defense (DoD) Information Assurance (IA) Certification and Accreditation (C&A) Process Guidance” (References (e), (f), and (g)). 1.3. Establishes or continues the following positions, panels, and working groups to implement the DIACAP: the Senior Information Assurance Officer (SIAO), the Principal Accrediting Authority (PAA), the Defense Information Systems Network (DISN)/Global Information Grid (GIG) Flag Panel, the IA Senior Leadership (IASL), the Defense (previously DISN) IA Security Accreditation Working Group (DSAWG), and the DIACAP Technical Advisory Group (TAG). 1.4. Establishes a C&A process...
Words: 16882 - Pages: 68