You are on page 1of 12

Three Themes 1.

Technology - Your ability to plan and manage


business operations depends partly on your
1. Enterprise Systems
knowledge of the technology available.
2. E-Business
Technology provides the foundation on which
3. Internal Control
AIS and business operations rest, and
CHAPTER 1 – UNDERSTANDING INFORMATION knowledge of technology is critically important
SYSTEMS to your understanding of the AIS discipline.
2. Databases - The full accounting cycle, however,
includes data collection and storage, and these
LEGAL ISSUES IMPACTING ACCOUNTANTS aspects must become part of your knowledge
base. To perform analysis, to prepare
The Sarbanes-Oxley Act of 2002 information for management decision making,
Section 404 – changes for both auditors and the and to audit a firm’s financial records, an
companies that they audit. accountant must be able to access and use data
from public and private databases.
Management must identify, document, and evaluate 3. Reporting - To design reports generated by an
significant internal controls. information system, the accountant must know
what outputs are required or are desirable.
Auditors must, as part of an integrated audit of financial
4. Control - You must develop an understanding of
statements, report on the effectiveness of the
control that is specific to the situation at hand
organization’s system of internal control.
yet is adaptable for the future. Control—the
means by which we make sure the intended
actually happens.
Section 409 – disclosure to the public on a “rapid and
current basis” of material changes in an organization’s Business Processes:
financial condition.
5. Business Operations - Many AIS inputs are
Compliance with this section requires the application of prepared by operating departments—the action
legal, financial, and technical expertise to ensure that or work centers of the organization— and many
the organization’s AIS is able to produce financial data AIS outputs are used to manage these
in a timely and accurate manner. operations. Therefore, we must analyze and
manage an AIS in light of the work being
performed by the organization.
COMPONENTS OF THE STUDY OF AIS 6. Events Processing - As organizations undertake
their business operations, events, such as sales
and purchases, occur. To design and use the
AIS, an accountant must know what event data
are processed and how they are processed.
7. Management Decision Making - The
information used for a decision must be tailored
to the type of decision under consideration.
Furthermore, the information is more useful if it
recognizes the personal management styles and
preferences of the decision maker.
8. Systems Development and Operation - The
information systems that process business
events and provide information for
management decision making must be
designed, implemented, and effectively
operated.
9. Communications - To present the results of elements, such as a database for storage, and can use
their endeavors effectively, accountants must decision models to present output information for
possess strong oral and written communication decision making.
skills.
Accounting Information System (AIS)
10. Accounting and Auditing Principles - To design
and operate the accounting system, an collect, process, and report information related to the
accountant must know the proper accounting financial aspects of business events.
procedures and must understand the audits to
which the accounting information will be
subjected. LOGICAL COMPONENTS OF A BUSINESS PROCESS

1. Information Process
ACCOUNTING INFORMATION SYSTEM 2. Operations Process - a system consisting of the
people, equipment, organization, policies, and
Systems and Subsystems procedures whose objective is to accomplish
the work of the organization.
System - a set of interdependent elements that
3. Management Process - a system consisting of
together accomplish specific objectives. A system must
the people, authority, organization, policies,
have organization, interrelationships, integration, and
and procedures whose objective is to plan and
central objectives.
control the operations of the organization.
central objectives: natural, biological, or man-
made

Subsystem – each part of a system. Within limits, any


subsystem can be further divided into its component
parts or subsystems.

Information System (IS) or Management Information


System (MIS)

a man-made system that generally consists of an


integrated set of computer-based components and
manual components established to collect, store, and
manage data and to provide output information to
users.

The information process facilitates operations by


maintaining inventory and customer data and by
providing electronic signals and paper documents with
which to execute business events.

The information process provides the means by which


management monitors the operations process.

Operations-related processes and accounting-related


processes are integrated.
The IS facilitates these operational functions and
Management designs the operations and information
supports management decision making by providing
processes and implements these processes by providing
information that managers can use to plan and control
people, equipment, other physical components, and
the activities of the firm. The IS may have advanced
policies.
Information process users include operations personnel,
management, and people outside the organization, such
as the customer.

MANAGEMENT USES OF INFORMATION

An IS serves two important functions within an


organization:

1. the IS assists daily operations. It can be used as


“leverage” to improve operational effectiveness
and efficiency.
2. to support managerial activities, including
management decision making.

Data vs. Information Simultaneously achieving a maximum level for all the
qualities of information is virtually impossible. In fact,
Information - data presented in a form that is useful in a
for some of the qualities, an increased level of one
decision-making activity. It has value to the decision
generally requires a reduced level of another.
maker because it reduces uncertainty and increases
knowledge about a particular area of concern. Management Decision Making

Data - facts or figures in raw form. Data represent the Decision making is the process of making choices, which
measurements or observations of objects and events. is the central activity of all management. Managers
make decisions or choices that include what products to
To become useful to a decision maker, data must be
sell, in which markets to sell those products, what
transformed into information.
organizational structure to use, and how to direct and
motivate employees.

Three-step process:

1. Intelligence. Searching the environment for


conditions calling for a decision.
2. Design. Inventing, developing, and analyzing
possible courses of action.
3. Choice. Selecting a course of action.
Qualities of Information
Operations and information flows are both horizontal efficiency and effectiveness, and participate in
and vertical and that there are several levels of the system design process. To be effective, the
management. At the level of operations and business auditor must have knowledge of systems
events processing, the flows are horizontal, as the development techniques, of controls, of the
information moves through operational units technology used in the IS, and of the design and
operation of the AIS

CHAPTER 2 - ENTERPRISE SYSTEMS


Structure is the degree of repetition and routine in the
decision. Structure implies that you have seen this very Enterprise Systems (Enterprise-Wide Information
decision before and have developed procedures for systems and Enterprise information systems) -
making the decision. You can use the degree of Integrates the business process functionality and
structure inherent in each decision-making step to information from all of an organization’s functional
categorize the decisions as structured or unstructured.
 marketing and sales
Structured decisions are those for which all three  cash receipts
decision phases (intelligence, design, and choice) are  purchasing
relatively routine or repetitive.  cash disbursements
 human resources
Unstructured decision, one for which none of the
 production and logistics
decision phases (intelligence, design, or choice) are
routine or repetitive.  and business reporting

Enterprise Resource Planning (ERP) Systems - software


packages that can be used for the core systems
necessary to support enterprise systems.

ERP products are designed to offer integration of


virtually all of an organization’s major business
functions.

1. Customer Relationship Management (CRM)


software - build and maintain an organization’s
customer-related database.
THE ACCOUNTANT’S ROLE IN THE CURRENT BUSINESS
ENVIRONMENT Supports identification, acquisition and
retention of customer to do business with the
Regarding the AIS, the accountant can assume three organization and to make customer feel that
roles: designer, user, and auditor. they are dealing with one unified organization
1. Designer - the accountant brings knowledge of 2. Customer Self-Service (CSS) software - often an
accounting principles, auditing principles, IS extension of CRM software.
techniques, and systems development
methods. Allows a customer to inquire, perform a task
2. User - Accountants perform a number of (including make a purchase), or troubleshoot
functions within organizations. In all cases, problems without the help of the organization’s
accountants use the AIS to perform their humans (employees).
functions. Their effectiveness depends on how
3. Sales Force Automation (SFA) software -
well they know the AIS and the technology used
automates sales tasks such as order processing,
to implement it.
contact management, inventory monitoring,
3. Auditor - Auditors are interested in the
order tracking, and employee performance
reliability of the accounting data and of the
evaluation.
reports produced by the system. They may test
4. Supply Chain Management (SCM) software -
the system’s controls, assess the system’s
helps enable the steps in an organization’s
supply chain, including demand planning; common in modern applications built with
acquiring inventory; and manufacturing, microservices.
distributing, and selling the product.
SAP NetWeaver - a Web Services platform from SAP
5. Product life-cycle management (PLM) software
used to build applications that integrate business
- manages product data during a product’s life,
processes and databases from a number of sources
beginning with the design of the product,
within and between organization
continuing through manufacture, and ending in
the disposal of the product at the end of its life. Business Process Management (BPM) - a concept much
larger than systems integration that provides a
PLM software integrates data across many areas of an
comprehensive method for integrating manual and
organization, such as engineering, logistics, and
automated internal processes, applications, and
marketing, and data from partner organizations, such as
systems, as well as integration to external partners and
vendors, contract manufacturers, and distributors.
services.
6. Supplier Relationship Management (SRM)
takes into account modeling, automating, managing,
software - manages the interactions with the
and optimizing business processes
organizations that supply the goods and
services to an enterprise just as CRM software Value Chain – a chain of activities performed by the
streamlines the processes between the organization to transform inputs into outputs valued by
enterprise and its customers. customers
SRM functionality includes procurement and 1. Organization’s Value Chain (Primary: Sales;
contract management. Secondary: Support/Back Team)
The goal of SRM is to reduce product costs and 2. Organization’s Value System
production costs and to enhance product
quality.  Supplier Value Chain
 Organizations Value Chain
7. Other third-party modules extract data from  Customer/Buyer Value Chain
ERP systems and from legacy systems that may
still exist within an organization (or subsidiary of Enterprise Systems Support for Organizational
the organization). Processes

Best-of-Breed Approach - combines modules from 1. Capturing Data During Business Events
various vendors to create an information system that 4 W’s = who, what, when, where
better meets an organization’s needs than a standard
ERP system. 2. Enterprise Systems Data Facilitate Functioning of the
Organization’s Operations
Application Program Interface (API) - which is a means
for connecting to a system or application provided by Basic Type of Data
the developer of that application. (a type of
 Master Data (Entity Type Data)
middleware)
 Business Event Data (Event Type Data)
Middleware - a software product that connects two or
Hierarchy of Data
more separate applications or software modules.
 Character – basic unit of data
 Field – collection of related characters that
Enterprise application integration (EAI) is a chain of comprise and attribute
activities performed by the organization to transform  Record – collection of related data fields
inputs into outputs valued by the customer.  Table – collection of related records

Event-Driven Architecture - uses events to trigger and Major ERP Modules


communicate between decoupled services and is
 Sales and Distribution
 Materials Management Batch Processing - is the aggregation of several business
 Financial Accounting events over some period of time with the subsequent
 Controlling and Profitability Analysis processing of these data as a group by the information
 Human Resource system.

Enterprise Systems Support for Major Business Event Periodic Mode - is the processing mode in which a delay
Processes exists between the various data processing step.

Order-to-Cash - includes the events surrounding the Immediate mode - the data processing mode in which
sale of goods to a customer, the recognition of the little or no delay occurs between any two data
revenue, and the collection of the customer payment. processing steps.

Purchase-to-Pay - includes the events surrounding the


purchase of goods from a vendor, the recognition of the
Online Transaction Entry (OLTE)- Use of data entry
cost of those goods, and the payment to the vendor.
devices allows business event data to be entered
CHAPTER 3: ELECTRONIC BUSINESS SYSTEMS directly into the information system at the time and
place that the business occurs.
E-Business – Application of electronic networks to
undertake business process between individuals and Online Real-Time (OLRT) Systems- Gathers business
organizations event data at the time of occurrence, update the master
data essentially instantaneously, and provide the results
Changing World of Business Processing arising from the business event within a very short
 Exponential growth in business processing amount of time - real-time.
 Evolution of business with Internet

Automated Accounting System Commerce through E-Mail


Business event data store - known as transaction file is Electronic mail (e-mail) is the electronic transmission of
a book of original entry used for recording business nonstandardized messages between two individuals
events. Business events comprise the activities of the who are linked via a communications network (usually
organization, such as purchase of goods, sales, an intranet or the Internet). E-mail represents a weak
collection, etc. form for E-business because the message format is
Master data - Repositories of relatively permanent data nonstandardized.
maintained over an extended period of time. Electronic document management (EDM)
Information processing - includes data Electronic document management (EDM) is the
processing functions related to economic events capture, storage, management, and control of
such as accounting events, internal operations electronic document images for the purpose of
such as manufacturing and FS preparation and supporting management decision making and
adjusting entry. facilitating business event data processing.
Data Maintenance - Includes activities related Electronic Data Interchange (EDI)
to adding, deleting, or replacing the standing
data portions of master data. EDM also is becoming an increasingly important
component of electronic data interchange (EDI), the
Standing data include relatively permanent computer-to-computer exchange of business data (i.e.,
portions of master data, such as the credit limit documents) in structured formats that allow direct
for a customer within the customer master data processing of those electronic documents by the
or the selling price of an item for an inventory receiving computer system.
item within the inventory master data.

Automating AIS
CHAPTER 4: DOCUMENTING INFORMATION SYSTEMS

READING SYSTEMS DOCUMENTATION

1. Reading Data Flow Diagrams

Data Flow Diagram (DFD) is a graphical representation


of a process. It is developed to provide a top-down look
at a process and improve the efficiency and
effectiveness of implementation of the process.

 Bubble symbol - depicts an entity or a process


within which incoming data flows are
transformed into outgoing data flows. (can be
either an entity on a physical data flow diagram
or a process on a logical data flow diagram.)
 Data flow symbol – pathway for data
 External entity symbol – portrays source or a
destination of data outside the system
Internet EDI (IEDI) is the use of secure, structured
 Data store symbol – place where the data are
messages over the Internet to execute business
stored. (may represent a view—a portion—of a
transactions. The main difference between traditional
larger enterprise database)
and Internet EDI is the use of a VAN for the traditional
method. Context Diagram - the least detailed picture of a system
that defines the process being documented and shows
Web Services is a software application that supports
the data flows into and out of the process to external
direct interactions with software objects over an
entities – entities outside the system that send data to,
intranet or the Internet.
or receive data from, the system.
Service-oriented architecture (SOA) refers to well-
defined, independent functions (or applications) that
can be distributed over a network via Web Services.

Internet commerce is the computer-to-computer


exchange of business event data in structured (such as
IEDI) or semistructured formats via Internet
communication that allows the initiation and
consummation of business events. Physical Data Flow Diagram – a graphical
Network providers are companies that provide a link to representation of a system that shows the system’s
the Internet by making their directly connected internal and external entities and the flows of data into
networks available for access by fee-paying customers. and out of these entities. An internal entity is an entity
within the system that transforms data.
Internet assurance is a service provided for a fee to
vendors to provide limited assurance to users of the Physical DFDs specify where, how, and by whom a
vendor’s Web site that the site is in fact reliable and system’s activities are accomplished. A physical DFD
event data security is reasonable. does not tell us what activities are being accomplished.

The physical DFD’s bubbles are labeled with nouns and


that the data flows are labeled to indicate how data are
transmitted between bubbles.
Systems flowchart - a graphical representation of a
business process, including information processes
(inputs, data processing, data storage, and outputs), as
well as the related operations processes (people,
equipment, organization, and work activities).

These flowcharts depict the sequence of activities


performed as the business events flow through the
process from beginning to end.

Containing both manual and computer activities, the


systems flowchart presents a logical and physical
rendering of the who, what, how, and where of
information and operations processes.
Logical Data Flow Diagram – a graphical representation
In addition, the systems flowchart includes the
of a system that shows the system’s processes, data
operations process and personnel involved in a process.
stores, and the flows of data into and out of the
processes and data stores. Systems flowcharts are used to understand a system
and to analyze a system’s controls.
Logical DFDs are used to document systems because we
can represent the logical nature of a system—what
activities the system is performing—without having to
specify how, where, or by whom the activities are
accomplished.

Over time, what a system is doing will change less than


how the system is doing it.

The processes are labeled with verbs that indicate the


activities being performed.

Another advantage to the logical data flow diagram,


unlike the physical data flow diagram, is that the
bubbles can be broken down into more detail.

All of the bubbles in Figure 4.4 contain numbers


followed by a decimal point and a zero, this diagram is
often called a “level 0” diagram. When two DFDs—in
this case, the context and the level 0—have equivalent
external data flows, we say that the DFDs are balanced.
Only balanced sets of DFDs (i.e., a context diagram, a Common Systems Flowcharting Routines
logical DFD, and a physical DFD) are correct.

We have “exploded” the context diagram in Figure 4.2


into its top-level components. We have looked inside
the context diagram bubble to see the major
subdivisions of the cash receipts process. The successive
subdividing, or “exploding,” of logical DFDs is called top-
down partitioning, and when properly performed, it
leads to a set of balanced DFDs.

2. Reading Systems Flowcharts


Key verification is a control plan for sensitive data in
which two people key in the exact same inputs to
ensure they are proper and accurate. Key verification
might be used for very large dollar value transactions or
transactions that would impact the entire organization.
 INTEGER
 FLOAT (which has a floating decimal point).

4. Specify constraints, when appropriate, on the


attributes.

Most notably, we need to make sure that the primary


key values are not left empty (i.e., null); otherwise,
there will be no key value by which to identify and pull
the tuple’s record from the database. We may want to
require that other attributes be assigned some value
rather than having the option of being null. In each of
these cases, we can assign a value of NOT NULL as the
PREPARING SYSTEMS DOCUMENTATION constraint.
1. Preparing Data Flow Diagrams

ALTER is SQL’s way of recognizing that we may not


always get the permanent design of a relation right the
first time. In this way, additional attributes can be
SQL: A RELATIONAL DATABASE QUERY LANGUAGE added to a relation in the future. In our case, we are
SQL is a powerful database language that can be used to adding an attribute column for hours worked
define database systems, query the database for Populating the Database
information, generate reports from the database, and
access databases from within programs using Data ca be changed in the database in three ways:
embedded SQL commands. INSERT, DELETE, and UPDATE
It has become the de facto standard database language 1. INSERT – used to add a single tuple to an existing
—evidenced by continual efforts by the industry to relation.
provide standardization guidelines for vendors and the
number of variations of the language that exist in The INSERT command in its simplest form only requires
databases from supercomputers to personal computers. the user to specify the SQL table and the values to be
inserted for each attribute if a value is provided for
Constructing Relational Databases every attribute.
CREATE command - used to create the relations that 2. DELETE - method by which we delete a tuple from a
form the database structure. relation.
1. Assign the relation a name The DELETE command requires specification of the table
2. Assign each attribute a name. name and inclusion of a WHERE condition, which is used
3. Specify the data type for each attribute. to identify the unique tuple(s) for deletion.
Data type descriptions - combination of alphanumeric 3. UPDATE - used when we want to change one or more
or numeric values. attribute values for one or more tuples in a table.
Alphanumeric types To accomplish a change of an attribute value, the
 CHAR (for fixed-length strings) UPDATE command must be able to identify the table
 VAR-CHAR (for varying length alphanumeric with the value to be updated, the new values to be
strings). placed in the database, and the conditions for
identifying the correct tuple for UPDATE.
Numeric data types
To make the change, we identify the tuple using the A process by which organizations select objectives,
WHERE condition we just used for deletion, and we establish processes to achieve objectives, and monitor
change the existing values by using a SET command to performances.
set the new values for the database.
Objective setting includes defining mission, vision,
Basic Querying Commands purpose, and strategies to establish relationships.

SELECT Internal control and monitoring activities are


implemented to review performance and provide
SELECT commands retrieve the values for a list of
feedback to provide a reasonable assurance that
attributes from the tuples of a single relation.
objectives are being achieved.
SELECT commands allow us to join data across
Enterprise Risk Management
multiple tables to link specific pieces of information
that are of interest A framework that has proven to be an effective process
for organizational governance.
1. a list of attributes that we want to SELECT from the
database (SELECT) A process, effected by an entity’s board of directors,
management, and other personnel, applied in strategy
2. a list of tables where these attributes can be found
settings and across the enterprise, designed to identify
(FROM)
potential events that may affect the entity, and manage
3. a WHERE clause that sets the conditions under which risk to be within its risk appetite, to provide reasonable
attribute values are to be retrieved. (WHERE) assurance regarding the achievement of entity
objectives.
And that’s it for Chapter 6.
The ERM framework addresses four categories of
Now we move on to Chapter 7 where we will be management objectives:
discussing the Controlling Information Systems: an
Introduction to Enterprise Risk Management and Strategic: wherein High-level goals are aligned with
Internal Control and supporting its mission.

After the lesson, we should be able to: Operations: having Effective and efficient use of its
resources.
Learning Objectives:
Reliability of reporting.
 Summarize the eight elements of COSO’s
Enterprise Risk Management—Integrated Compliance with applicable laws and regulations.
Framework.
Components of Enterprise Risk Management
 Understand that management employs internal
control systems as part of organizational and IT The ERM process starts with the first component, the
governance initiatives.
1. Internal environment: The internal environment
 Describe how internal control systems help
encompasses the tone of an organization and
organizations achieve objectives and respond to
sets the basis for how risk is viewed and
risks.
addressed by an entity’s people, including risk
 Describe fraud, computer fraud, and computer
management philosophy and risk appetite,
abuse.
integrity and ethical values, and the
 Enumerate control goals for operations and
environment in which they operate.
information processes.
2. Objective setting: Objectives such as mentioned
 Describe the major categories of control plans
a while ago, the strategic and related objectives,
Organizational Governance must exist before management can identify
potential events affecting their achievement.
ERM ensures that management has a process in
place to set objectives and that the chosen
objectives support and align with the entity’s management activities, separate evaluations, or
mission and are consistent with its risk appetite. both.
3. Event identification: Internal and external
events affecting achievement of an entity’s
objectives must be identified, distinguishing
between risks and opportunities.

Risks - events that would have a negative impact on the


organization’s objectives – require assessment and
response

Opportunities - events that would have a positive


impact on organization’s objectives – channeled back to
the strategy-setting process

Risk assessment: Risks are analyzed, considering


likelihood and impact, as a basis for determining how
they should be managed. Likelihood is the possibility
that an event will occur, and impact is the effect of an
event’s occurrence. Risks are assessed on an inherent
and a residual basis.

Risk response: Management selects risk responses from


the four response types: avoiding, accepting, reducing,
or sharing risk—developing a set of actions to align risks
with the entity’s risk tolerances and risk appetite.

 We can avoid a risk by leaving the activity that


is giving rise to the risk.
 We can reduce a risk by taking actions that
reduce the likelihood of an event or reduce the
impact
 We can share a risk by, for example, buying
insurance or outsourcing the activity.
 We can accept a risk by taking no action at all
4. Control activities: Policies and procedures are
established and implemented to help ensure
the risk responses are effectively carried out.
5. Information and communication: Relevant
information is identified, captured, and
communicated in a form and time frame that
enable people to carry out their responsibilities.
Effective communication requires that
appropriate, timely, and quality information
from internal and external sources flows down,
up, and across the entity to facilitate risk
management and intelligent decision making.
6. Monitoring: The entirety of ERM is monitored,
and modifications are made as necessary.
Monitoring is accomplished through ongoing

You might also like