Professional Documents
Culture Documents
Accounting Information Systems, 6: Edition James A. Hall
Accounting Information Systems, 6: Edition James A. Hall
edition
James A. Hall
COPYRIGHT 2009 South-Western, a division of Cengage Learning. Cengage Learning and South-Western
are trademarks used herein under license
ERP
systems
ERP configurations--servers, databases, and
bolt-on software
Data warehouses as strategic tools and issues
with their design, maintenance, and operation
Risks associated with ERP implementation
Key
considerations
related
to
ERP
implementation
Internal control and auditing implications of
ERPs
the company
reengineering
Traditional IS Model:
Closed
Database
Similar in concept
to flat-file approach
data remains the property of the application
Architecture
fragmentation limits communications
Existence of numerous distinct and
independent databases
redundancy and anomaly problems
Paper-based
requires multiple entry of data
status of information unknown at key points
Traditional IS Model:
Closed Database Architecture
Business Enterprise
Products
Customer
Materials
Orders
Order Entry
System
Customer
Sales
Account Rec
Customer Database
Manufacturing
and
Distribution
System
Production
Scheduling
Shipping
Manufacturing
Database
Procurement
System
Purchases
Vendor
Accts Pay
Inventory
Procurement
Database
Supplier
ERP System
Business Enterprise
Legacy
Systems
Data Warehouse
ERP System
On-Line Analytical Processing
(OLAP)
Bolt-On Applications
(Industry Specific Functions)
Suppliers
Customers
Core Functions [On-Line Transaction Processing (OLTP)]
Sales
&
Distribution
Business
Planning
Shop Floor
Control
Operational Database
Customers, Production,
Vendor, Inventory, etc.
Logistics
of the business
support mission-critical tasks through simple
queries of operational databases
include sales and distribution, business
planning, production planning, shop floor
control, and logistics modules
OLAP
Supports management-critical tasks
of data.
Drill-down allows the user to see data in
selective increasing levels of detail.
Slicing and Dicing enables the user to
examine data from different viewpoints to
uncover trends and patterns.
ERP System
Configurations:
Client-Server
Network Topology
Two-tier
common server handles both
First Tier
User
Presentation
Layer
Second Tier
Application
and Database
Layer
Applications
Server
Server
Database
ERP System
Configurations:
Three-tier
Client-Server
Network Topology
client links to the application server
User
Presentation
Layer
First Tier
Second Tier
Third Tier
Applications
Database
Application
Server
Database
Server
Application
Layer
Database Layer
ERP with OLTP and OLAP Client Server using Data Warehouse
User
Presentation
Layer
First Tier
Second Tier
Third Tier
OLTP
Applications
Operations
Database
OLTP
Server
OLAP
Server
OLAP
Applications
Operations
Database
Server
Data
Warehouse
Server
Data
Warehouse
Application
Layer
Database
Layer
ERP System
Configurations:
Database Configuration
selection of database
tables
in the thousands
Databases
and
Bolt-Ons
setting the switches in the system
Bolt-on Software
third-party vendors provide specialized
functionality software
Supply Chain Management (SCM) links
vendors, carriers, logistics companies, and IS
providers
What is a Data
Warehouse?
A multi-dimensional database often using
3.
4.
5.
database
Data warehouses must be created &
efficiency
integration of legacy systems
consolidation of global data
VSAM Files
Hierarchical DB
Network DB
ERP
System
s
io u
v
e
Pr
ars
Ye
s
iou s
v
Pre arter
Qu
s
iou
v
Pre eks
We
Operations
Database
Data Cleansing
Process
iv
rch
ve
o
d
e
im
T
r
Applications of Data
Mining
Opposition to change
user reluctance and inertia
need of upper management support
all industries
scalability: systems ability to grow
Disruptions to operations
ERP implementations usually involve business
process reengineering (BPR)
Segregation of duties
Manual processes that normally require
segregation of duties are often eliminated.
User role: predefined user roles limit a users
access to certain functions and data.
Accounting records
Corrupted data may be passed from external
sources and from legacy systems.
loss of paper audit trail
Access controls
information
Who should have access to what?
Independent verification
traditional verifications are meaningless
need to shift from transaction level to
overall performance level