the Indonesian Direct Selling Association (APLI), as
quoted from APLI (2018), the value of direct sales
and multi-level marketing transactions in Indonesia
in 2014 reached IDR 12.6 trillion. The value of
transactions in this industry continues to increase,
and in 2016 reached IDR 15.75 trillion (Cahyani,
2018).
Multi-level marketing companies are very
dependent on the reliability of information
technology used, because with this information
technology, multi-level marketing distributors can
rely on information related to the development of
networks that have been built and maintained, as
well as revenues in the form of commissions and
bonuses that have been or will be obtained. Thus, the
level of trust of multi-level marketing distributors
towards companies will continue to increase. The
problem is as a user, we do not know the reliability
of the system used. System reliability depends on the
quality of the controls applied. Therefor this study
will evaluate the information technology control of
Pinnacle software at PT X, a multi-level marketing
company in Indonesia.
2 THEORETICAL FRAMEWORK
The definition of internal control used in this thesis
is the definition conveyed by COSO (1992), which
is a process influenced by the board of directors,
management, and other organizational personnel,
designed to provide adequate guarantees regarding
the achievement of several objectives, namely
effectiveness and efficiency operations, reliability of
financial reporting, and compliance with applicable
laws and regulations.
Bae & Ashcroft (2004) stated that traditional
controls cannot detect risks arising from
adjustments, reengineering processes, software and
incompatibilities during the process of implementing
Enterprise Resource Planning (ERP). Therefore,
information technology control is needed.
Information technology control is a separate part of
the overall internal control system. Understanding
information technology control / IT control
according to GTAG (2005) is an internal control
process that guarantees information and information
services and helps reduce risks associated with the
use of technology by organizations.
According to GTAG (2005), information
technology controls are generally classified into two
categories, which are general control and application
control. General control guarantees that all
application controls can work effectively, because
effective general controls will reduce identified risks
beyond application control.
Chan & Lao (2009) stated in their study that
information technology general control (ITGC) is
the basis of controls embedded in information
technology infrastructure services and applications
such as operating systems, databases/ databases and
networks, and ensures that they are sufficient
enough to provide reasonable guarantees and
support for information technology business
processes and applications. Arens, et al (2013: 394-
398) classify general controls in six categories,
including:
1. Administration of the information technology
function.
Some evaluation points that can be used to
assess whether the administration of
information technology functions of a company
have been well controlled, including:
(1) The views of the board of directors and
senior management about information
technology used by the company.
(2) Policy of resource allocation provided by
the board of directors and senior
management for information technology
used by the company.
(3) The participation of the board of directors
and senior management in making core
decisions on the use of company
information technology.
(4) A present of periodic report on the
utilization of company information
technology from the company's senior
management of the information technology
(IT) division.
2. Separation of information technology duties.
Examples of the separation of duties that are
ideal for information technology functions of a
company according to Arens, et al (2013: 398-
399): IT management, both Chief Information
Officer (CIO) or Information Technology
Manager, Security administrators, System
analyst, Programmers, Computer operators,
Librarians, Network administrators, Input/
output data control personnel.
3. System development.
Some evaluation points that can be used to
assess whether system development of
information technology in a company have
been well controlled, including:
(1) Involvement of IT and non IT staff to make
decisions on the company's information
technology needs.
(2) Implementation of new systems’ testing,
and good procedures for switching from the
old system to the new system.