You are on page 1of 5

THE INFORMATION SYSTEM: AN ACCOUNTANT’S

PERSPECTIVE

 Information is a business resource.


 Operations management directly responsible
for controlling day-to-day operations.
 Middle management accountable for short-
term planning and coordinating activities to
accomplish organizational objectives.
 Top management responsible for longer-term
planning and setting organizational objectives.

Information Objectives
 The goal of an information system is to
support
o The firm’s day to day operations.
o Management decision making.
o The stewardship function of AIS Subsystem
management.
 The transaction processing system (TPS)
o Converts economic events into
Information Systems Framework
financial transactions.
 The information system is the set of formal o Records financial transactions in the
procedures by which data are collected, accounting records.
processed into information, and distributed to o Distributes essential financial
users. information to support operations.
 A transaction is an event that affects or is of  The general ledger/financial reporting
interest to the organization and is processed system (GL/FRS) takes information from the
by its information system as a unit of work. TPS and other input and:
 A financial transaction is an economic event o Updates general ledger control
that affect the assets and equities of the accounts.
organization, is reflected in its accounts and is o Handles nondiscretionary reporting
measured in monetary terms. requirements.
 A nonfinancial transaction is an event that  The management reporting system (MRS)
doesn’t meet the definition of a financial provides the internal information needed to
transaction. manage a business and handles discretionary
 Accounting information system (AIS) reporting.
processes financial and some nonfinancial
transactions. Three subsections: General Model for AIS
o The transaction processing system  End users fall into two groups :
(TPS) which supports daily business o External users include creditors,
operations. stockholders, government agencies,
o The general ledger/financial reporting suppliers and customers.
system (GL/FRS) which produces o Internal users include management
reports. and operations personnel.
o The management reporting system  Distributes essential financial information to
(MRS) which provides information for support operations.
decision making.
 Data are facts which may or may not be
 Management information system (MIS) processed and have no direct effect on a
processes nonfinancial transactions not user’s actions.
processed by the AIS.  Information causes a user to take an action
that would otherwise not have been taken.
 Data sources are financial transactions that
enter the information system for internal or
external sources.
 The levels in the data hierarchy:  Information reliability requires accounting
1. The data attribute is the most independence.
elemental piece of potentially useful o Accounting activities must be separate
data in the database. and independent of the functional
2. A record is a complete set of attributes areas maintaining custody of
for a single occurrence within an entity resources.
class. o Accounting supports these functions
3. A file (or table) is a complete set of with information but does not
records of an identical class. participate in the physical activities.
 Database management involves three
fundamental tasks: storage, retrieval and Information Technology
deletion.  Systems development is the process
 Data collection is the first operational stage organizations use to acquire information
in the information system: systems.
o Objective is to ensure data are valid, o Can be purchased or built from
complete and free from material scratch.
errors. o Commercial software available for
o Only relevant data should be captured. general accounting and industry
o Efficient collection procedures specific applications. Sometimes called
designed to collect data only once. turnkey systems because can be
 Data processing tasks range from simple to implemented with little modification.
complex. o Custom software is developed
 The organization’s database is its physical through a formal process called the
repository for financial and nonfinancial data. system development life cycle.
(term could apply to a filing cabinet or Requires an in-house team of qualified
computer disk.) individuals.
 Information generation is the process of o Systems maintenance may be trivial or
compiling, arranging, formatting, and significant. Between 80% - 90% of
presenting information to users. system’s total cost may be incurred
 Regardless of physical form, useful because of maintenance activities.
information has:
o Relevance: Content must serve a The Role of Accountants in AIS
purpose.  Accountants play a prominent role on system
o Timeliness: No older than time frame development teams as domain experts,
of supported action. responsible for many aspects of the
o Accuracy: Free from material errors. conceptual system including specifying rules,
o Completeness: All essential reporting requirements and internal control
information is present. objectives.
o Summarization: Aggregated for the  IT professionals determine the most
user’s needs. economical and effective technologies for the
 Feedback is a form of output sent back to the physical system, including data storage.
system as a source of data.  Accountants perform audits which typically
involve the AIS.
The Accounting Function o External audit is an independent
 Accounting manages the financial resource of attestation and opinion (audit report)
the firm: regarding financial statement
o Captures and records transactions. presentation.
o Distributes transaction information to o Requires auditors (independent CPAs)
operations personnel. to test internal controls and perform
 Value of information is determined by its substantive tests of data.
reliability. o Critical element is auditor
o Relevance, accuracy, completeness, independence, which means the
summarization and timeliness. auditor is free from factors that might
o Unreliable information has no value. influence the audit report.
 Prior to SOX, accounting firms were permitted o Environmental issues, artificial
to provide both advisory and attest services to intelligence, unemployment and
clients. displacement and computer misuse.
 SOX legislation restricts non-audit services  Sarbanes-Oxley Act (SOX) Section 406
that auditors may provide and prohibits requires public companies to disclose to the
auditors from providing these services: SEC if they have a code of ethics that applies to
o Other accounting services including the CEO, CFO and controller.
bookkeeping, financial  If a company does not have a code, it must
information systems design explain why.
and implementation, appraisal or  Compliance with 406 requires a code of ethics
valuation, actuarial, and internal audit that addresses:
outsourcing. o Procedures for dealing with conflicts
o Management or human resources, of interest.
broker or dealer, investment adviser, o Full and fair disclosures to ensure
or investment banking services. candid, open, truthful disclosures.
o Legal services and expert services o Requiring employees to follow
unrelated to the audit. applicable laws, rules and regulations.
o Any other service that the Board o A mechanism to permit prompt
determines, by regulation, is internal reporting of ethical violations.
impermissible. o Taking appropriate actions when code
 Internal auditing is an independent appraisal violations occur.
function within an organization to examine
and evaluate activities. External auditors Fraud and Accountants
represent outsiders and internal auditors  The fraud triangle factors that contribute to
represent the interests of the organization. fraud:
 Fraud audits have increased in popularity as a o Situational pressures that coerce an
corporate governance tool. individual to act dishonestly.
 May be initiated by managers to investigate o Opportunity through direct access to
employees or the board to investigate assets.
management. o Rationalization (Ethics) which relate to
 Audit committees serves an independent one’s character and moral compass.
“check and balance” for internal audit  Fraud losses equal 5% of revenue. Actual cost
functions and a liaison with external auditors. difficult to quantify and do not include indirect
Usually three people, one of which must be a losses.
“financial expert”.  Most frauds are committed by employees than
managers, the losses are much higher for
Ethical Issues in Business managers and owners.
 Computer ethics analyzes the social impact of  Collusion in the commission of a fraud is
computer technology and formulation and difficult to prevent and detect.
justification of policies for the ethical use of
technology. Internal Control Concepts and Techniques
 Para computer ethics involves taking an  The internal control system consists of
interest in computer ethics cases and policies, practices and procedures to achieve
acquiring some level of skill and knowledge in four broad objectives:
the field.  Safeguard assets of the firm.
 Issues of concern include:  Ensure accuracy and reliability of
o Privacy and ownership in the accounting records and information.
personal information industry.  Promote efficiency of the firm’s operations.
o Security involving accuracy and  Measure compliance with management’s
confidentiality. prescribed policies and procedures.
o What can an individual or organization  Modifying Assumptions to the Internal Control
own? Objectives:
o Equity of access issues related to o Management Responsibility
economic status, culture and safety.  The establishment and
maintenance of a system of
internal control is the o Control activities are policies and
responsibility of management. procedures to ensure appropriate
o Reasonable Assurance actions are taken to deal with
 Cost of achieving objectives identified risks.
should not outweigh the  IT controls relate to the computer
benefits. environment:
o Methods of Data Processing o General control pertain to entity-
 Control techniques vary with wide IT concerns.
different types of technology. o Application controls ensure the
o Limitations integrity of specific systems.
 These include (1) possibility of  Physical controls relate to human activities:
error, (2) circumvention, (3) o Transaction authorization is to
management override and (4) ensure all material transactions
changing conditions. processed are valid.
 The absence or weakness of a control is an o Segregation of duties controls are
exposure: designed to minimize incompatible
o May result in asset destruction or theft functions including separating: (1)
and corruption or disruption of the transaction authorization and
information system. processing and (2) asset custody and
 Preventive controls are passive techniques record-keeping. Successful fraud must
designed to reduce undesirable events by require collusion.
forcing compliance with prescribed or desired o Supervision is a compensating
actions. Preventing errors and fraud is more control in organizations too small for
cost-effective than detecting and correcting sufficient segregation of duties.
them. o Accounting records consist of source
 Detective controls are designed to identify documents, journals and ledgers
undesirable events that elude preventive which capture economic essence and
controls. provide an audit trail.
 Corrective controls are actions taken to o Access controls ensure that only
reverse the effects of errors detected. authorized personnel have access to
 Public company management responsibilities firm assets.
are codified in Sections 302 and 404 of SOX: o Independent verification
o Section 302 requires management to procedures are checks to identify
certify organization’s internal controls errors and misrepresentations.
on a quarterly and annual basis. Management can assess (1) individual
o Section 404 requires management to performance, (2) system integrity and
assess internal control effectiveness. (3) data correctness. Includes:
 The control environment sets the tone for  Reconciling batch totals during
the organization and influences control transaction processing.
awareness.  Comparing physical assets
 COSO internal control framework five with accounting records.
components:  Reconciling subsidiary
o Organizations must perform a risk accounts with control
assessment to identify, analyze accounts.
and manage financial reporting risks.  Reviewing management
o The quality of information the AIS reports that summarize
generates impacts management’s business activities.
ability to take actions and make  IT application controls are associated with
decisions. applications.
o An effective system records all valid  Input control (edits) perform tests on
transactions and provides timely transactions to ensure they are free from
and accurate information. errors.
o Monitoring is the process by which o Check digit is a control digit(s) that is
the quality of internal control design added to the data code when originally
and operations can be assessed. assigned. Allows integrity to be
established during processing and o Output data can become backlogged
helps prevent two common errors: (spooling) requiring an intermediate
 Transcription errors occur output file in the printing process.
when (1) extra digits are  Proper access and backup
added to a code, (2) a digit is procedures must be in place to
omitted from a code, or (3) a protect these files.
digit is recorded incorrectly. o Print programs controls should be
 Transposition errors occur designed to prevent unauthorized
when digits are reversed. copies and employee browsing of
o Missing data check identifies blank or sensitive data.
incomplete input fields. o Sensitive computer waste should be
o Numeric-alphabetic check identifies shredded for protection.
data in the wrong form. o Report distribution must be
o Limit checks identify fields that controlled.
exceed authorized limits. o End-user should examine reports for
o Range checks verify that all amounts correctness, report errors and
fall within an acceptable range. maintain report security.
o Reasonableness checks verify that 
amounts that have based limit and
range checks are reasonable.
o Validity checks compare actual fields
against acceptable values.
 Processing controls are programmed
procedures to ensure an application’s logic is
functioning properly.
o Batch controls manage the flow of
high volume transactions and
reconcile system output with original
input .
o Run-to-run controls monitor batch
from one process to another.
 Audit trail controls ensure every transaction
can be traced through each stage to processing
from source to financial statements.
 Every transaction the system processes,
including automatic ones, should be recorded
on a transaction log.
 Master file backup controls may be viewed
as either a general control or an application
control.
o GFS (grandfather-father-son)
backup is used with systems that use
sequential master files.
o The destructive update approach
leaves no backup copy and requires a
special recovery program if data is
destroyed or corrupted.
o Real-time systems schedule backups at
specified daily intervals.
 Output controls are procedures to ensure
output is not lost, misdirected or corrupted
and that privacy is not violated. Can cause
disruption, financial loss and litigation.
 Controlling hard-copy output:

You might also like