Advantages of ERP: Disadvantages of ERP: Benefits of ERP:
1. Data input is captured or keyed 1. Higher cost in purchasing the Internal: once, rather than multiple times, software, not only that it has 1. Common data information as it entered in different system. higher cost in training the 2. A real time system Downloading data from one software because we need to 3. Increased in productivity system to another is no longer pay the expert in this software. 4. Reducing operating cost needed. 2. Amount of time is required, it External: 2. The organization gains better take years to select and success control. An ERP can implement the ERP system into 1. Improved customer service and consolidate multiple permission the business. As a result, the order fulfillment and security model in one single ERP implementation is very 2. Improved in communication data access structure. high risk of project failure. with supplier and customer 3. Enhanced competitive position 3. Customer service 3. Complexity, this comes 4. Increased in sale and profit improve because from integrating many How does ERP works: employees can quickly different business access orders, activities and system. First is purchasing materials. Second is inventory, shipping buying a raw materials information and past Major reason for adopting where they need to check customer transaction details. ERP: the availability of the 1. Integrate financial information. product, and put some 4. Manufacturing plant receive 2. Integrate order information. request. If the product is new order in real time, and the 3. Standardize and speed up the not in stock they have to start with the automation of manufacturing operation process. production, then finish in the processes can leads to increased 4. Reduce inventory. production then delivered to the productivity. 5. Standardize Human Resource warehouse. And they now can start information. check the availability. COMPUTER FRAUD Types of Fraud: Common threats to AIS Treadway (Mitigate) Commission 1. Input Fraud – The simplest recommended 4 and common way to commit 1. Natural and political disaster – actions to reduce the computer fraud is to alter or fire or excessive heat, war or fraud: falsify the computer input. It attack by the terrorist. requires little skill and need 1. Establish only understand how the system 2. Software error and equipment an organizational environment operates so they can cover their malfunctions – hardware or that contributes the integrity the tracks. software failure, software error financial reporting process 2. Processor Fraud – include the or bugs. unauthorized system use, 2. Identify and understand the including the theft of computer 3. Unintentional act (human error) factors that lead to fraudulent time and services. – innocent errors or omission or financial reporting 3. Computer Instruction Fraud – system that do not meet the include tempering the company company need or cannot handle 3. Access the risk of fraudulent software, copying software intended task. financial reporting illegally, using software in an unauthorized manner and 4. Intentional act (computer 4. Design and implement the developing software to carry out crimes) – corruption or internal control and provide unauthorized activity. sabotage. reasonable assurance preventing 4. Data Fraud – Illegally using, fraudulent financial reporting copying, searching, browsing and harming the company data constitutes data fraud. 5. Output Fraud – stealing, copying or misusing computer to printout or displayed information. The Fraud Triangle Fraud occurs when people have Information Systems Controls for high pressure, an opportunity to System Reliability commit, conceal or to convert Trust Services Framework and the ability to rationalize away their personal integrity, 1. Security – Access to the system less likely to occur when people and its data controlled and have few pressure, little restricted to legitimate users. opportunity and have high 2. Confidentiality – Sensitive personal integrity. organizational information is protected from unauthorized 1. Pressure – is the person’s incentive or motivation for Fraud can be prevented by disclosure. eliminating or minimizing one 3. Privacy – Personal information committing fraud, 3 types: or more fraud triangle elements. about the customer is collected, Financial pressure often Although, company can reduce used, disclosed and maintain motivate or minimize their pressure and compliance with internal misappropriation fraud nationalization, the greatest policies and external regulatory by employee opportunity to prevent lies in requirement and it’s protected Emotional pressure minimizing or reducing from unauthorized disclosure. Person’s lifestyle 4. Processing Integrity – Data is opportunity by implementing a pressure process accurately, completely, good system in internal control. 2. Opportunity – is the condition in a timely manner and only or situation for a people or with proper authorization. organization to do this 3 things : 5. Availability – Systems and its Commit the fraud information is available to meet Conceal the fraud the operational and contractual Convert the theft or obligations. misrepresentation to personal gain 3. Rationalization – it occurs when the company justify their illegal behavior. 2. Accurate inventory records are Revenue Cycle important to prevent both Sales Order Entry Threat and Control stockouts and excess inventory cause it may result in lost sales 1. Inaccurate and invalid master if customer are not willing to data. [CONTROL]: Use various wait and instead purchase from processing integrity control, and other source. [CONTROL]: it is important to restrict access Sales forecast are another tool to that data and configure the to help companies better predict system so that only authorized inventory needs and thereby employees can make changes to reduce the risk of stockouts or master data. carrying excess inventory. Accountants can also prepare reports that enable sales manager to identify the need to adjust those forecast. Threat and Control during the sales order entry: 3. Loss of Customer. 1. Sales order entry is that [CONTROL]: Customer service important data about the order is important that many will be either missing or companies use special software inaccurate and may be packages called Customer negatively affect the customer Relationship Management perceptions and affect future (CRM) to support the process sales. [CONTROL]: Using ERP and help the organize detailed system can ensure that all information about customer. required data, such as shipping, billing and address are entered. Control & Accounting Information Transaction Process System Important Function in Internal Source Document Objective of internal control to Control: Most business use to collect data about implement in providing reasonable 1. Preventive Control – Deter their business activities. assurance: problem before they arise, Source Data Automation 1. Maintains records in sufficient EXAMPLE: hiring qualified details to report company assets personnel or segregating Devices capture transaction data in accurately and fairly employee duties. machine-readable form at the time and 2. Provide accurately and reliable place of their origin. information 2. Detective Control – Discover 3. Promote and improve problem that are not prevented, Turnaround Document operational efficiency EXAMPLE: duplicated Company output sent to an external 4. Comply with applicable laws checking of calculation or party, who often adds data to the and regulations. preparing bank reconciliation. document, and then are returned to the company as an input document. 3. Corrective Control – Identify and correct problem as well as correct and recover from Well-designed source documents and resulting error, screen improve accuracy and EXAMPLE: maintaining completeness by providing backup copies of file or instructions or prompt about what correcting data entry error. data to collect, using checkoff boxes to present the available options.