Which of the following user profiles should be of MOST concern to an IS auditor when performing an audit of an EFT system?