Professional Documents
Culture Documents
√
● R - Identify and analyze Risks EOQ)
● E - Attracts, developes, and retains ● 2 SO
S - Annual Sales ¿
OIE - Information and Communication Principles capable individuals (Employees) ● (in units) C
● S - Establishes operating Structure
O - Obtain and use information ● O - Cost per
● I - Internally communicate information
SOAR - Strategy and Objective Setting Principles
Purchase Order
● E - Communicate with External Parties ● S - Evaluates alternative Strategies
● C - Annual Carrying cost per unit
SO D - Monitoring Activities Principles
● O - Formulates business Objectives CALM - Valuing Tangible Assets (stay “CALM”)
● SO - Separate and/or Ongoing
Evaluations ● A - Analyze business context ● C - Cost Method (original cost and
● D - Communications of Deficiencies ● R - Defines Risk appetite potentially adjustments for
CA T P - Existing Control Environment Principles depreciation)
● P - Deploy through Policies and P ● P - Prioritizes risk ● M - Market Value Method (Similar
rocedures ● I - Identifies risk (events) assets in marketplace - replacement
ARTS - Help respond to risk cost and NRV)
● R - Implements Risk Responses
● A - Avoid (high frequency, high severity) MIC - Valuing Intangible Assets (Just ask “MIC”)
● R - Reduce (high frequency, low SIR - Review and Revision Principles
● M - Market Approach (preferred
severity) ● S - Assesses Substantial change approach - actual arms length
● T - Transfer (low frequency, high ● I - Pursues Improvement in Enterprise transaction)
severity) {Share} Risk Management ● I - Income Approach (DCF)
● S - Self-Insure (low frequency, low ● R - Reviews risk and performance ● C - Cost Approach (Replacement cost
severity) {Accept} and reproduction cost are iterations of
COPS - Steps to compile and document the TIP - Information, Communication and Reporting this approach)
internal control assessment (Ongoing) Principles
● O - Overall Assessment - supported by ● T - Leverages information and PIE - Most frequent objectives of cost accounting
complement evaluations Technology systems
● C - Component Evaluation - supported ● I - Communicates risk Information ● P - Product costing (inventory and cost
by principal evaluations ● P - Reports on risk, culture, and of goods manufactured and sold)
● P - Principal Evaluation - The source for performance ● I - Income Determination (profitability)
isolating and defining internal control ● E - Efficiency measurements
deficiencies (comparisons to standards)
● S - Summary of Internal Control
Deficiencies (if any) - Summarized and
impact the overall assessment
CRPI - four financial measures of responsibility WRITEN - Factors that shift demand curves DMAIC - Six Sigma: Existing Product and Business
units (SBUS) (factors other than price) Improvements
● C - Cost SBU (managers held ● W - Changes in Wealth ● D - Define the Problem
responsible for controlling costs) ● R - Changes in the Price of Related ● M - Measure Key Aspects of the Current
● R - Revenue SBU (managers held Goods (substitutes and complements) Process
responsible for generating revenues) ● I - Changes in Consumer Income ● A - Analyze Data
● P - Profit SBU (managers are held ● T - Changes in Consumer Tastes or ● I - Improve or Optimize Current
responsible for producing target profit) Preferences for a Product Processes
● I - Investment SBU (manager held ● E - Changes in Consumer Expectations ● C - Control
responsible for return on assets)
● N - Changes in the Number of Buyers
Served by the Market DMADV - Six Sigma: New Product or Business
FICA- Critical success factors of a balanced Process Development
scorecard ECOST - Factors That Shift Supply Curves
● E - Changes in Price Expectations of ● D - Define Design Goals
● F - Financial
Supplying Firm ● M - Measure CTQ (critical to Quality
● I - Internal business processes Issues)
● C - Changes in Production Costs (Price
● C - Customer Satisfaction of Inputs) ● A - Analyze Design Alternatives
● A - Advancement of innovation and ● O - Changes in the Price or Demand for ● D - Design Optimization
human resource development Other Goods ● V - Verify the Design
APIE - Costs of Quality
● S - Changes in Subsidies or Taxes
● T - Changes in Production Technology BIG - Big Data
● A - Appraisal Costs (conformance cost,
detect before) NOO - % change ● B - Big
● P - Prevention Costs (conformance cost, ● New minus Old divided by Old ● I - Information
prevent) ● G - Generates Opportunities
BRIC - Emerging Economies
● I - Internal failure (nonconformance
costs, cure a defect before customer
● B - Brazil
receives) ● R - Russia
● E - External failure (nonconformance ● I - India IRAC - Written Communication
costs, cure a defect after customer ● C - China ● I - Intro (what’s the problem)
receives) ● R - Rules
IT TA DO - Factors that drive globalization ● A - Analysis
TWICE Government - factors that shift aggregate
demand
● IT - Improvements in Transportation ● C - Conclusion
● T - Taxes
● TA - Technological Advancement
● W - Wealth
● D - Deregulation of International
Financial Markets
● I - Interest Rates
● O - Organizational/Operational Options
● C - Consumer Confidence for International Business
● E - Exchange rates
● G - Government spending FIL JVS
● F - Franchising
GICE - GDP calculated under expenditure approach ● I - International Trade
● G - Government purchases of goods ● L - Licensing
and services +
● JV - Joint Ventures
● I - Gross private domestic Investment +
● S - Global Sourcing
● C - Personal Consumption expenditures
● (& Direct Foreign Investment (DFI) )
+
● E - Net Exports (exports minus imports) PEE - Risk of International Business
CRM system = provide sales force automation and Hardware technician = sets up and configures Secondary key = non-identifying column used to
manage customer contracts, manage sales people, computers find a row in a table Decision Support Systems
forecast sales and sales targets/goals, manage (DSS) = interactive
sales leads and potential sales leads, provide and Data security controls = ensure storage media,
manage online quotes and product specifications subject to auth prior to Cloud computing = virtual servers over the
and pricing, and analyzes sales data internet rather than housing data-on-site, critical
Application programmer =
aspects of data security evaluation include third
AIS type of MIS type of BIS access/change/destruction, code approved
party suppliers, architecture to support users,
changes to a payroll program
cloud of cloud agreements
Business Information System = BIS = collect,
store, transform and distribute data System programmer = work with operating
Electronic data interchange (EDI) = computer to
systems and compliers
computer exchange of business transaction
BIS = hardware, software, network, people, data
Data mining process = looking at large database documents in formats that allow direct processing
Transaction Processing System = TPS = routine, and data sets to derive new information, find of data by the receiving system, having computer
payroll, data input, data storage, data processing. previously unknown info activity logs that show where transactions have
and information output, large numbers of failed is a key component to evaluating the
common business events that are processed in Disaster recovery planning = ensuring able to effectiveness of EDI
predefined highly structured way restore and continue its operations in the event
that its computing systems are shut down or Vertical scalability = adding more memory,
Decision Support System = DSS = interactive destroyed computing power, and resources to the cloud, but
does not relate to data security
Executive Information System = EIS = for senior Program modification controls = controls over the
FARHART IT NOTES:
managers, immediate and easy access to internal modification of programs being used in production
and external information, assist in making non applications, include both controls that attempt to General controls apply to all aspects of IT function
routine decisions (involving analysis of cyclical prevent changes by unauthorized personnel and BEFORE transactions are processed
data, acquisitions, and competitor behavior) also that track program changes so that there is an
exact record of what versions of what programs General controls – 6 catergories
Accounting Information System = AIS = solve 1) admin of the IT function
were running in production at any specific point in
problems with uncertainty and ill-derived report 2) separation of IT duties
time, normally includes a software change
3) system development
req management tool and change request tracking 4) physical and online security
tool 5) backup and contingency planning
Cold site = no actual equipment
6) hardware controls
Biometric control = fingerprint, eye scanner, facial
Warm site = compromise b/w cold&hot
recognition Input controls = designed so that the information entered
is authorized, accurate, and complete
Hot site = fully equipped to take over data
Digital signature = ensure that the sender of a
processing Typical input controls:
message is authentic
1) management authorization
Incremental = only changed since last backup 2) adequate preparation of input source docs
3) competent personnel
Differential – ALL changes since last FULL backup
Real time processing = current status of inventory Typical input controls in IT
PKI = system and process issue and manage can be properly replenished and so that quick 1) input screens with preformatted prompts for
asymmetric keys and digital certificates transaction info
2) online based input controls for e-commerce where
suppliers/customers perform initial part of trans input
3) check digit = verify info on the barcode has been
entered correctly
4) validity check = computer performed validation test of
input accuracy, verify customer number against customer
master file
5) edit checks = automated controls programmed to
prevent invalid or unreasonable (# or text field only)
6) limit test = SS 9 digits, date fields, $ limit over is void
7) pull down menu
8) immediate error correction procedures
9) accumulation of errors follow up by data input person