Context for Sarbines -Oxley Sarbines-Oxley makes executives and officers of all public corporations listed on any American stock exchange take personal.

Slides:



Advertisements
Similar presentations
Accident and Incident Investigation
Advertisements

The Firm and Its Goals The Firm The Goal of the Firm Do Companies Maximize Profits? Maximizing the Wealth of Stockholders Economic Profits.
© 2006 Morrison & Foerster LLP All Rights Reserved AN OVERVIEW OF CROSS BORDER MERGERS AND ACQUISITIONS Bruce Mann October 17, 2006.
Auditing, Assurance and Governance in Local Government
STRATEGIC PLANNING FOR Post-Clearance Audit (PCA)
Corporate Governance and Administration Conference Jury’s Hotel, Ballsbridge 30 March 2004.
© QinetiQ North America, Inc QinetiQ North America, Inc. 1 Implementing an Enterprise Security Framework – Safeguarding Your Most.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
A plan to deploy Ontology mediation information flow architecture for US Customs and Border Protection Presentation by OntologyStream Inc Paul Stephen.
Today’s Strategic Imperative: E-Business Annika Burton Matt Richardson Shantell Howard.
Positions of electronic commerce taxation 1. No activities 2. No taxes 3. New taxes 4. Changes in rules but not principles 5. Changes in electronic commerce.
INDIA.
Total Information Awareness with Informational Transparency in Secure Channels March 16, 2005 Core Ontology safeguarding national security Ontology Tutorial.
4.01B Marketing Information Management. A system that analyzes and assesses marketing information, gathered continuously from sources inside and outside.
ES INC: Economic and discounted cash flow techniques: a comparison with respect to the Requirements of the Management Control System.
CEO - Chief Ethics Officer?
1. 2 CVM’s OBJECTIVES u to stimulate the creation of savings and their investment in securities; u to promote the expansion and regular and efficient.
Meaningful Learning in an Information Age
Introduction to Money and Banking Chapter One. Copyright © Houghton Mifflin Company. All rights reserved.1 | 2 Money flows through the modern world with.
PricewaterhouseCoopers LLP Page 1 Canadian Association of MoversDecember 2007 Buying A Business Damian Peluso Director PricewaterhouseCoopers Transaction.
CME Group and Informa Economics May 16, 2013 Pan American Grain and Oilseed Conference.
By: Dr. Mohammed Alojail College of Computer Sciences & Information Technology 1.
Internal Auditing and Outsourcing
State Bank of Pakistan Various Departments
Copyright © 2008 McGraw-Hill Ryerson Ltd.1 Chapter Twelve Corporate Governance Canadian Business and Society: Ethics & Responsibilities.
Planning an Audit The Audit Process consists of the following phases:
1-1Copyright 2000 Prentice Hall Chapter 1 Welcome to the World of Marketing.
1 Table of Content 1.Business Diagnostic - Establishing a case for change –Changes in demand –New opportunities –Emerging threats 2.Vision Creation - Defining.
© 2013 Cengage Learning. All Rights Reserved. 1 Part Four: Implementing Business Ethics in a Global Economy Chapter 9: Managing and Controlling Ethics.
04. Internal Control Over Transactions Pertemuan Matakuliah: Manajemen Kinerja Sistem Komputer Tahun: Feb
Environmental auditing
Board of Directors and Governance
Participation activity: form of ownership research/discussion buying an existing business (1) sole proprietorship (2) partnership (3) corporation (4) dealerships.
Compliance with IOSCO requirements AMEDA Leadership Forum Alexandria Egypt Monday 27 th April 2009 by Dr. Ashraf EL Sharkawy Senior Advisor to the CMA.
An Integrated Control Framework & Control Objectives for Information Technology – An IT Governance Framework COSO and COBIT 4.0.
Implementing Strategies: Marketing, Finance/Accounting, R&D, and MIS Issues Chapter 6.
Enterprise Risk Management Chapter One Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
Module 14 Cost Behavior, Activity Analysis, and Cost Estimation.
External Auditing in Difficult Settings John F S Muwanga FCCA, CPA(U) Auditor General, Uganda Regional Workshop Towards Auditing Effectiveness May
TAX ISSUES The various ways in which taxes may play a role in mergers and acquisitions. It was seen that the tax impact of a transaction is a function.
A Guide for Management. Overview Benefits of entity-level controls Nature of entity-level controls Types of entity-level controls, control objectives,
1 Pertemuan 1 Background Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.
Slide 1 Federation des Experts Comptables Méditerranéens 4 th FCM Conference Capri, 3-4 May 2004 The Globalisation of Small and Medium-sized Enterprises.
International Accounting Standards An older set of standards stating how particular types of transactions and other events should be reflected in financial.
Analyzing Financial Statements 12.3 in textbook.  Income Statement- Summarizes the items of revenue and expense and shows the net income (revenue > expense)
IMS 554 INFORMATION MARKETING for INFORMATION SYSTEMS DEPARTMENT CHAPTER 2 PRINCIPLES of MARKETING Pn Hasnah Hashim Lecturer Faculty of Information Management.
Consumer and Organizational Buyer Behavior
Organizations of all types and sizes face a range of risks that can affect the achievement of their objectives. Organization's activities Strategic initiatives.
Knowledge Sharing and Networking Session IAOP Australian Chapter Business improvement and cost reduction through transformational outsourcing presented.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Presentation on Mechanisms for Reducing Corruption through Private Sector Monitoring and Enforcement by Essa Faal / Thomas F. McInerney General Counsel.
Build an Enterprise IT Security Training Program
Internal Control Principles
ACC 573 Course Experience Tradition / acc573assist.com
ACC 573 Possible Is Everything/snaptutorial.com
ACC 573Competitive Success/tutorialrank.com
ACC 573 NERD Lessons in Excellence-- acc573nerd.com.
ACC 573 Education for Service tutorialrank.com. ACC 573 Final Exam Guide For more course tutorials visit To calculate a company's.
ACC 573 NERD Education for Service-- acc573nerd.com.
Governance Assistant for Office365
Our new quality framework and methodology:
Board of Directors Roles and Responsibilities
Chapter 9 Banking and the Management of Financial Institutions
Healthcare Privacy: The Perspective of a Privacy Advocate
THE SUPERVISOR AS A FINANCIAL MANAGER
Stakeholder Involvement in Nuclear issues Workshop: Milestones for Nuclear Power Infrastructure Development November 5-9, 2007 Why Stakeholders are.
Web Information Systems Engineering (WISE)
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Presentation transcript:

Context for Sarbines -Oxley Sarbines-Oxley makes executives and officers of all public corporations listed on any American stock exchange take personal responsibility for the maintenance of a company’s records. This assignment of responsibility has led to a substantial increase in the amount of due diligence done during a transaction and has affected public companies’ choices of advisors on transactions. During the due diligence process public company acquirers are demanding unrestricted access to financial and operational information and the buyers’ senior managers are taking a more active role in the evaluation of an acquisition to identify potential risks. The selection of an advisor who can advise on a particular due diligence issue, such as the adequacy of the MIS system, has become more selective, since the acquirers’ auditors can no longer fill the role. Sarbines-Oxley has made both the divestiture and acquisition process more complex and highlights the benefit that an experienced financial advisor can bring to a transaction. From: Ontology Tutorial 3, copyright, Paul S Prueitt 2005

Observation: Sarbines-Oxley anticipate a radical advance in reporting mechanisms. To elaborate on this observation: Standard IT development processes do not adequately support the development of clear, consistent, and complete reports. However, the semantic architecture that Stephenson and Prueitt are soon to demonstrate will provide a tool that when used will produce far greater transparency in reporting, not only about cyber risks but about risks as a general proposition Due diligence seeks to identify potential risks. In many cases, long term risks are difficult to identify because information is not clear, complete and consistent. The diagram on the left is one shown at a recent DHS conference on the technology problems related to proper government inter-departmental reporting. Easy Difficult Short termLong term

Semantic Web mismatch issues have kept a revolution in-waiting Because the SW issues are not well known, business decisions focuses on short term simple minded problems, where perceived risk are minimal. Mismatch between low risk decisions and true problems create process that can not be rationalized. The dysfunction can be ignored in an business environment where marketing and public relations often disguises the absence of progress and the presence of risks. However, if a semantic technology breakthrough occurs; this disguise may be lifted. Short termLong term Easy Difficult

The identification of by-pass Many problems that are critical are in fact mis-classified as long term and difficult when a simplification is being fielded by the markets. Short termLong term Easy Difficult

Many problems that are critical are in fact classified as long term and difficult Using semantic technology, a by-pass around a number of long term difficult problems can be seen. The by-pass moves the problem Report in a clear, complete and consistent fashion to the easy and short term category. Today, business practices often re-enforce what is perceived to be minimization of professional risk, and thus these practices closes off an open discussion that might mediate these risks. With a semantic technology capability, these discussions will more easily surface; leading to a clearer accountability to legal authority since as Sarbines-Oxley, where the government lawmakers are attempting to enforce protections against unethical business practices. Short termLong term Easy Difficult

Many problems that are critical are in fact mis-classified as being long term and difficult Example of by-pass Problem: Write 1/3 into a computer. This problem is considered to be unsolvable since in base 10 we have 1/3 = Where the three dots means repeat to infinity. But 1/3 in base ten is also the same as 1/3 in base 6. In base 6, 1/3 = 0.2 So where did the intractable problem go?

Total Information Awareness with Informational Transparency in Secure Channels March 16, 2005 Core Ontology safeguarding national security