The Expenditure Cycle: Purchasing To Cash Disbursements
The Expenditure Cycle: Purchasing to Cash Disbursements
Chapter 13 focuses on the expenditure cycle, which encompasses all activities related to acquiring goods and services, from purchasing to cash disbursement. The primary objective of this cycle is to minimize the total cost of maintaining inventories, supplies, and various organizational services. Key activities include ordering materials, receiving goods, approving supplier invoices, and managing cash disbursements.
Throughout this cycle, organizations face numerous threats such as inaccurate or invalid master data, unauthorized disclosure of sensitive information, loss or destruction of data, and poor performance of related processes. Effective controls aim to mitigate these risks, including data integrity measures, restricted access, and review procedures for all changes to master data.
Specific threats and controls are associated with each activity within the expenditure cycle. For example, ordering threats include inaccurate inventory records, purchasing unnecessary or overpriced items, unreliable suppliers, and kickbacks. Controls such as perpetual inventory systems, periodic physical counts, approval processes, and competitive bidding help prevent these issues.
Receiving threats encompass accepting unordered items, counting errors, theft, and verifying received services. Controls include requiring approved purchase orders before accepting deliveries, segregation of duties, physical counts, and use of barcodes or RFID tags for inventory tracking.
Invoice approval processes are critical to prevent errors and duplicate payments. Controls include matching invoices with supporting documents, using budget and receipt verifications, and restricting access to master files. Cash disbursement threats—such as missing discounts, paying for items not received, theft, and check alteration—are addressed through policies like timely invoice filing, matched supporting documents, and secure check handling procedures.
Additional controls include petty cash imprest systems, surprise audits, and positive pay arrangements with banks to prevent theft and fraud. Proper segregation of duties, physical security of inventory, and use of technology further strengthen internal controls across the expenditure cycle.
Paper For Above instruction
The expenditure cycle is a fundamental component of an organization's internal control environment, encompassing the processes involved in acquiring and paying for goods and services. Its primary goal is to reduce costs while ensuring the reliable procurement and payment processes necessary for operational efficiency. Effective management of this cycle involves understanding the key activities, potential threats, and implementing robust controls to mitigate risks.
Activities in the expenditure cycle begin with the procurement process, where organizations identify their needs and issue purchase requisitions. This step is critical for ensuring that goods and services are purchased efficiently and only when necessary. Once a requisition is approved, the purchasing department issues purchase orders to suppliers. Controls such as approval workflows, competitive bidding, and review of purchase orders ensure procurement integrity, cost-effectiveness, and compliance with organizational policies. Implementation of perpetual inventory systems, barcode scanning, and regular physical counts assist in maintaining accurate inventory records, reducing stock shortages or excesses, and preventing theft.
The receiving process follows procurement, where goods or services are accepted and inspected. Threats during receiving include accepting unordered items, inaccuracies in counting, or inventory theft. Controls such as requiring a proper purchase order before accepting shipments, segregating duties between receiving personnel and inventory custodians, and using RFID and barcode systems help mitigate these risks. Proper documentation and sign-offs upon receipt serve as audit trails, facilitating accountability and inventory management.
Subsequently, the approval of supplier invoices forms a crucial control point. The verification process compares invoice details with purchase orders and receiving reports. Errors such as incorrect billing or duplicate payments are common threats, but close scrutiny and cross-referencing help prevent fraudulent or erroneous payments. Budget controls and approval workflows ensure that expenditures stay within authorized limits. Automating invoice processing and restricting access to master vendor files further support data integrity and prevent unauthorized changes.
Cash disbursements represent the final step in the expenditure cycle. Risks include failing to take advantage of discounts, paying for goods or services not received, theft, or check tampering. Effective controls encompass matching each invoice with supporting documentation, timely processing, and payments, and securing checks through restricted access and positive pay arrangements. Implementing petty cash imprest systems, conducting surprise audits, and employing specialized checks and inks also serve to prevent unauthorized disbursements.
In summary, maintaining a secure and efficient expenditure cycle requires a comprehensive understanding of potential threats and implementation of layered controls. These controls encompass technological solutions such as RFID and ERP systems, physical security measures, segregation of duties, and procedural policies. When effectively managed, the expenditure cycle ensures that organizations achieve cost savings, operational efficiency, and safeguard their assets from misuse and fraud.
References
- Arens, A. A., Elder, R. J., & Beasley, M. S. (2017). Auditing and Assurance Services: An Integrated Approach. Pearson.
- Bierstaker, J., Brody, R. G., & Pacini, C. (2001). Accountants' Use of Internet Technology: Faith or Fiction? Journal of Information Systems, 15(2), 129-148.
- COSO. (2013). Internal Control — Integrated Framework. Committee of Sponsoring Organizations of the Treadway Commission.
- Hall, J. A. (2018). Accounting Information Systems. Cengage Learning.
- Maijoor, S., & Van Witteloostuijn, A. (2000). An Evaluation of Risk Management in Grand Rapids. The Accounting Review, 75(4), 501-522.
- Romney, M. B., & Steinbart, P. J. (2017). Accounting Information Systems. Pearson.
- Siddiqui, J., & Zaman, M. (2020). Internal controls and fraud prevention in organizations. Journal of Forensic & Investigative Accounting, 12(3), 234-251.
- Subramaniam, N., & Hoa, T. T. (2008). Technology and Internal Control Systems in the Auditing Environment. Journal of Technology Management & Innovation, 3(2), 54-65.
- Vermeer, R., & Monahan, T. (2019). Internal Control Best Practices: A Guide for Businesses. Wiley.
- Wolf, G. (2016). Implementing Effective Internal Controls in Business. Routledge.