You are on page 1of 5

ERP SYSTEM

Advantages of ERP: Disadvantages of ERP: Benefits of ERP:


1. Data input is captured or keyed 1. Higher cost in purchasing the Internal:
once, rather than multiple times, software, not only that it has
1. Common data information
as it entered in different system. higher cost in training the
2. A real time system
Downloading data from one software because we need to
3. Increased in productivity
system to another is no longer pay the expert in this software.
4. Reducing operating cost
needed.
2. Amount of time is required, it External:
2. The organization gains better take years to select and
success control. An ERP can implement the ERP system into 1. Improved customer service and
consolidate multiple permission the business. As a result, the order fulfillment
and security model in one single ERP implementation is very 2. Improved in communication
data access structure. high risk of project failure. with supplier and customer
3. Enhanced competitive position
3. Customer service 3. Complexity, this comes 4. Increased in sale and profit
improve because from integrating many How does ERP works:
employees can quickly different business
access orders, activities and system. First is purchasing materials. Second is
inventory, shipping buying a raw materials
information and past Major reason for adopting where they need to check
customer transaction details. ERP: the availability of the
1. Integrate financial information. product, and put some
4. Manufacturing plant receive 2. Integrate order information. request. If the product is
new order in real time, and the 3. Standardize and speed up the not in stock they have to start with the
automation of manufacturing operation process. production, then finish in the
processes can leads to increased 4. Reduce inventory. production then delivered to the
productivity. 5. Standardize Human Resource warehouse. And they now can start
information. check the availability.
COMPUTER FRAUD Types of Fraud:
Common threats to AIS Treadway (Mitigate) Commission 1. Input Fraud – The simplest
recommended 4 and common way to commit
1. Natural and political disaster –
actions to reduce the computer fraud is to alter or
fire or excessive heat, war or
fraud: falsify the computer input. It
attack by the terrorist.
requires little skill and need
1. Establish
only understand how the system
2. Software error and equipment an organizational environment
operates so they can cover their
malfunctions – hardware or that contributes the integrity the
tracks.
software failure, software error financial reporting process
2. Processor Fraud – include the
or bugs.
unauthorized system use,
2. Identify and understand the
including the theft of computer
3. Unintentional act (human error) factors that lead to fraudulent
time and services.
– innocent errors or omission or financial reporting
3. Computer Instruction Fraud –
system that do not meet the
include tempering the company
company need or cannot handle 3. Access the risk of fraudulent
software, copying software
intended task. financial reporting
illegally, using software in an
unauthorized manner and
4. Intentional act (computer 4. Design and implement the
developing software to carry out
crimes) – corruption or internal control and provide
unauthorized activity.
sabotage. reasonable assurance preventing
4. Data Fraud – Illegally using,
fraudulent financial reporting
copying, searching, browsing
and harming the company data
constitutes data fraud.
5. Output Fraud – stealing,
copying or misusing computer
to printout or displayed
information.
The Fraud Triangle  Fraud occurs when people have Information Systems Controls for
high pressure, an opportunity to System Reliability
commit, conceal or to convert
Trust Services Framework
and the ability to rationalize
away their personal integrity, 1. Security – Access to the system
less likely to occur when people and its data controlled and
have few pressure, little restricted to legitimate users.
opportunity and have high 2. Confidentiality – Sensitive
personal integrity. organizational information is
protected from unauthorized
1. Pressure – is the person’s
incentive or motivation for  Fraud can be prevented by disclosure.
eliminating or minimizing one 3. Privacy – Personal information
committing fraud, 3 types:
or more fraud triangle elements. about the customer is collected,
 Financial pressure often
Although, company can reduce used, disclosed and maintain
motivate
or minimize their pressure and compliance with internal
misappropriation fraud
nationalization, the greatest policies and external regulatory
by employee
opportunity to prevent lies in requirement and it’s protected
 Emotional pressure
minimizing or reducing from unauthorized disclosure.
 Person’s lifestyle 4. Processing Integrity – Data is
opportunity by implementing a
pressure process accurately, completely,
good system in internal control.
2. Opportunity – is the condition in a timely manner and only
or situation for a people or with proper authorization.
organization to do this 3 things : 5. Availability – Systems and its
 Commit the fraud information is available to meet
 Conceal the fraud the operational and contractual
 Convert the theft or obligations.
misrepresentation to
personal gain
3. Rationalization – it occurs when
the company justify their illegal
behavior.
2. Accurate inventory records are Revenue Cycle
important to prevent both
Sales Order Entry Threat and Control
stockouts and excess inventory
cause it may result in lost sales 1. Inaccurate and invalid master
if customer are not willing to data. [CONTROL]: Use various
wait and instead purchase from processing integrity control, and
other source. [CONTROL]: it is important to restrict access
Sales forecast are another tool to that data and configure the
to help companies better predict system so that only authorized
inventory needs and thereby employees can make changes to
reduce the risk of stockouts or master data.
carrying excess inventory.
Accountants can also prepare
reports that enable sales
manager to identify the need to
adjust those forecast.
Threat and Control during the sales
order entry:
3. Loss of Customer.
1. Sales order entry is that [CONTROL]: Customer service
important data about the order is important that many
will be either missing or companies use special software
inaccurate and may be packages called Customer
negatively affect the customer Relationship Management
perceptions and affect future (CRM) to support the process
sales. [CONTROL]: Using ERP and help the organize detailed
system can ensure that all information about customer.
required data, such as shipping,
billing and address are entered.
Control & Accounting Information Transaction Process
System
Important Function in Internal Source Document
Objective of internal control to Control:
Most business use to collect data about
implement in providing reasonable
1. Preventive Control – Deter their business activities.
assurance:
problem before they arise,
Source Data Automation
1. Maintains records in sufficient EXAMPLE: hiring qualified
details to report company assets personnel or segregating Devices capture transaction data in
accurately and fairly employee duties. machine-readable form at the time and
2. Provide accurately and reliable place of their origin.
information 2. Detective Control – Discover
3. Promote and improve problem that are not prevented, Turnaround Document
operational efficiency EXAMPLE: duplicated Company output sent to an external
4. Comply with applicable laws checking of calculation or party, who often adds data to the
and regulations. preparing bank reconciliation. document, and then are returned to the
company as an input document.
3. Corrective Control – Identify
and correct problem as well as
correct and recover from Well-designed source documents and
resulting error, screen improve accuracy and
EXAMPLE: maintaining completeness by providing
backup copies of file or instructions or prompt about what
correcting data entry error. data to collect, using checkoff boxes
to present the available options.

You might also like