The design of procedures to prevent fraudulent transactions within an enterprise resource planning (ERP) system should be based on: