Font Size: a A A

Research On The Internal Control Of The SWB Logistics System

Posted on:2014-08-27Degree:MasterType:Thesis
Country:ChinaCandidate:M Z LiFull Text:PDF
GTID:2269330425472945Subject:Business Administration
Abstract/Summary:PDF Full Text Request
General Office logistics system of SWB logistics system (hereinafter referred to as the " logistics system ") is to assist the leadership of the provincial Party committee of provincial Party committee Comrade processing daily work mechanism, is fiscal budget units, is also needed by strengthening internal control system to achieve the effective risk management tasks.This paper based on enterprise internal control and internal control theory of government, enterprises and the advanced ideas and experiences into the administrative institution of administrative units, identify risk oriented internal control system construction and operation rules, so as to better promote the administrative institutions internal control construction, carry out internal control work. This paper adopts normative research method, and combined with the literature research method, targeted design and how to construct the construction of HN Provincial Office of the internal control system, and put forward some relevant security measures to the operation of the system.And then,on the basis of this,the author provide some methods suggested to evaluate the internal control system. Through the logistics system of internal control system construction, the author draw three conclusions:1, the internal control system construction must according to the organization of the existing problems in the construction of a specific.2, the operation of the internal control system must rely on the relevant human, material safeguard measures.3, the implementation of the internal control process, constantly carry on the evaluation, found the problem, and to optimize the system is to ensure that the system long-term effective approach to.
Keywords/Search Tags:SWB logistics system-internal control framework, Securityimplementation
PDF Full Text Request
Related items