Professional Documents
Culture Documents
ACC200 Lecture Notes Sem 3 2019
ACC200 Lecture Notes Sem 3 2019
Information Systems
Sem 3 2019
Topic 1- Introduction to
Accounting Information
Systems
1-1
Learning Objectives
1. Explain what an accounting information
system (AIS) is and describe the basic
functions it performs.
2. Discuss why studying the design and
management of an AIS is important.
3. Discuss ways that the AIS can add value to a
business.
1-2
What Is Accounting?
It is the principal way of organizing and reporting
financial information. It has been called the “language
of business.”
Accounting and information systems comprise the
functional area of business responsible for providing
information to the other areas to enable them to do
their jobs and for reporting the results to interested
parties.
To that end, an accounting system is used to identify,
analyze, measure, record, summarize, and
communicate relevant economic information to
interested parties.
1-3
Information and
Decision Making
What is information?
The term data refers to any and all of
the facts that are collected, stored,
and processed by an information
system.
Information is data that has been
organized and processed so that it is
meaningful.
1-4
Information and Decisions
Top-Level
Management
Strategic
Summarization
Middle and Filtration
Management Tactical
Lower-Level Operational
Management
Transaction Oriented
1-5
Information and Decision
Making
Characteristics of Useful Information
Relevant Timely
Reliable Understandable
Complete Verifiable
1-6
Ten Most Important Activities
Performed By Accountants
1. Accounting systems 6. Financial and
and financial reporting economic analyses
2. Long-term strategic 7. Process improvement
planning 8. Computer systems
3. Managing the and operations
accounting and 9. Performance
finance function evaluation
4. Internal Consulting 10. Customer and product
5. Short-term budgeting profitability analyses
1-7
What Is an Information
System?
An Information system is a framework in which data on a
companies business processes is collected, processed,
controlled and managed through stages in order to provide
information to users
It can be a manual or computerized system
Firms depend on information systems in order to survive and
stay competitive
1-8
What Is the function of an
AIS?
What important functions does the
AIS perform in an organization?
1 It collects and stores data about
activities and transactions.
2 It processes data into information that
is useful for making decisions.
3 It provides adequate controls to
safeguard the organization’s assets.
1-9
The Three Basic Functions
Performed by an AIS
1 To collect and store data about the
organization’s business activities and
transactions efficiently and effectively:
Capture transaction data on source documents.
Record transaction data in journals, which present
a chronological record of what occurred.
Post data from journals to ledgers, which sort data
by account type.
1-10
The Three Basic Functions
Performed by an AIS
2 To provide management with
information useful for decision
making:
In manual systems, this information is
provided in the form of reports that fall
into two main categories:
– financial statements
– managerial reports
1-11
The Three Basic Functions
Performed by an AIS
3 To provide adequate internal controls:
Ensure that the information produced
by the system is reliable.
Ensure that business activities are
performed efficiently and in
accordance with management’s
objectives.
Safeguard organizational assets.
1-12
Why Study AIS?
To understand how the accounting
system works.
How to collect data about an organization’s
activities and transactions
How to transform that data into information
that management can use to run the
organization
How to ensure the availability, reliability, and
accuracy of that information
1-13
Why Study AIS?
1-14
Steps in Transforming Data
into Information
Data collection - capturing, recording,
validating and editing data for completeness
and accuracy
Data Maintenance/Processing - classifying,
sorting, calculating data
Data Management - storing, maintaining and
retrieving data
Data Control - safeguarding and securing
data and ensuring the accuracy and
completeness of the same
Information Generation - interpreting,
reporting, and communicating information
1-15
Information Systems
1-16
What Is An Accounting
Information System (AIS)?
1-17
Information System -Basic Stages
Data
storage
1-18
Capturing Inputs
Manual keying
Scanning through barcode technology
Scanning through image scanners
Magnetic ink character recognition [MICR]
Voice recognition
Optical mark readers
1-19
Processes
Examples:
o Performing calculations
o Validity checks
o Hash checks
1-20
Outputs
Outputs refer to what is obtained from a
system, or the result of what the system does
Examples:
oReceipts
oInvoices
1-21
Resources Required for an
AIS
Processor(s): Manual or Computerized
Data Base(s): Data Repositories
Procedures: Manual or Computerized
Input/Output Devices
Miscellaneous Resources
1-22
Roles of Accountants
With Respect to an AIS
1-23
Financial Reporting
Balance Sheet
Income Statement
The primary
Statement of Cash Flows
financial
statements.
1-24
Accounting Information
Systems
1-25
Roles of Accountants
With Respect to an AIS
Auditors - evaluate controls and attest to the fairness
of the financial statements.
Accounting managers - control all accounting
activities of a firm.
Tax specialists - develop information that reflects tax
obligations of the firm.
Consultants - devise specifications for the AIS.
1-26
How An AIS Can Add Value
To An Organization
– An AIS adds value by:
– improving the quality and reducing the costs of
products or services.
– improving efficiency.
– Improving decision making capabilities.
– increasing the sharing of knowledge.
1-27
The Supply Chain
Raw Materials
Supplier
Manufacturer
Distributor
Retailer
Consumer
1-28
The Value Chain
1-29
The Value Chain
1-30
The Value Chain
Primary Activities
Inbound Outbound
Operations
Logistics Logistics
Marketing
Service
and Sales
1-31
The Value Chain
1-32
The Value Chain
Support Activities
Infrastructure Technology
Human
Purchasing
Resources
1-33
The Value System
1-34
Gains from Computerised AIS
for Accountants
Faster processing of transactions and other data
Greater accuracy in computations of and comparisons
with data
Lower cost of processing each transaction
More timely preparation of reports and other outputs
More concise storage of data, with greater accessibility
when needed
Wider range of choices for entering data and providing
outputs
Higher productivity for employees and managers, who
learn to use computers effectively in their routine and
decision-making responsibilities
1-35
End of Lecture 1
ACC200 - Accounting Information
Systems
Sem 3 2019
2-2
Functional Business Model
3
Information Flow
Marketing
Information Flow
Sales
Information Flow
Manufacturing
Top Management
4 Information Flow
Logistics
Information and material flows in a functional business model
Functional Business Model
Information Flow
2-5
The Functional Perspective of the
Organisation (Cont)
Benefits
o Control and coordination: provides sound organisational
control
o Specificity: highly defined and specified tasks exist
2-7
Business Process Model
Customers
Procurement Manufacturing Logistics
Suppliers
Information Flow
9
Business Processes
Operations Marketing/Sales
Service
1-10 2-10
Business Processes
Technology
Procurement
Development
Human Firm
Resources Infrastructure
2-11
Functional vs Process
Functional Process
perspective perspective
Focus What is done How it is done
2-13
Basic Subsystems in the AIS
4. The production cycle: involves activities
converting raw materials and labor into
finished goods.
5. Inventory cycle: involves the receipt and
issue of stock items
2-14
Basic Subsystems in the AIS
Inventory Expenditure Human
Cycle Cycle Resource Cycle
Production Revenue
Cycle Cycle
2-15
The Expenditure Cycle
Activities and information processing related to:
Purchasing and payment of
• Goods and services
Primary objective:
Minimize the total cost of acquiring and
maintaining inventories, supplies, and the
various services the organization needs to
function
2-16
Expenditure Cycle Activities
1. Ordering materials,
supplies, and services
2. Receiving materials,
supplies, and services
3. Approving supplier
invoices
4. Cash disbursements
2-17
The Revenue Cycle
Provides goods and services to customers
Collects cash in payment for those sales
Primary Objective:
Provide the right product
In the right place
At the right time for the right price
2-18
Revenue Cycle Activities
1. Sales order entry
2. Shipping
3. Billing
4. Cash collections
2-19
General Ledger and Reporting Activities
2-20
The Data Processing Cycle
The data processing cycle consists of
four steps:
1. Data input
2. Data storage
3. Data processing
4. Information Output
2-21
Four Stages of the Data
Processing Cycle
Data
storage
2-22
Data Input
The first step in the data processing cycle
is data input.
During the data input stage, transaction
data are captured and converted to
machine-processible form.
Traditionally, transaction data has been
captured on preprinted source
documents.
What are some source documents?
2-23
Data Input
– purchase requisitions
– checks and remittances from customers
2-24
Data Input
How can data input accuracy and
efficiency be improved?
Have a well-designed computer screen
resembling that of source documents.
Have the system prompt the user to input
all necessary data.
Use scanning devices instead of keying.
2-25
Data Processing Cycle:
Data Input
Historically, most businesses used paper
source documents to collect data and
then transferred that data into a
computer.
Today, most data are recorded directly
through data entry screens.
2-26
Data Processing Cycle:
Data Input
Control over data collection is improved
by:
pre-numbering each source document
and using turnaround documents
having the system automatically assign a
sequential number to each new
transaction
employing source data automation
2-27
Data Processing Cycle:
Data Input
A number of actions can be taken to
improve the accuracy and efficiency of
data input:
Turnaround documents
• EXAMPLE: The stub on your telephone bill that you tear off and return with
your check when you pay the bill.
• The customer account number is coded on the document, usually in machine-
readable form, which reduces the probability of human error in applying the
check to the correct account.
2-28
Data Processing Cycle:
Data Input
A number of actions can be taken to
improve the accuracy and efficiency of
data input:
Turnaround documents
Source data automation
2-29
Common Source
Documents and Functions
REVENUE CYCLE
Source Document Function
2-32
Common Source Documents
and Functions
GENERAL LEDGER AND
REPORTING SYSTEM
Source Document Function
Journal voucher Record entry posted to
general ledger.
2-33
Data Storage
A company’s data is one of its most
important resources.
An organization must have ready and
easy access to its data in order to
function properly.
Accountants need to know how to
manage data for maximum corporate use.
2-34
DATA STORAGE
Data needs to be organized for easy and
efficient access.
Let’s start with some vocabulary terms
with respect to data storage.
2-35
DATA STORAGE
Ledger
2-36
DATA STORAGE
Ledger
Following is an example of a ledger
account for accounts receivable:
GENERAL LEDGER
2-38
DATA STORAGE
Ledger
General ledger
Subsidiary ledger
Subsidiary ledger
2-41
DATA STORAGE
Ledger
General ledger
Subsidiary ledger
Coding techniques
2-42
DATA STORAGE
Ledger
General ledger
Subsidiary ledger
Coding techniques
2-43
DATA STORAGE
Ledger
General ledger
Subsidiary ledger
Coding techniques
• When block codes are used, blocks of numbers within a numerical sequence are reserved for a
particular category. (pg 27 Sunrise Pharmaceuticals)
• EXAMPLE: The first digit represents the major account category (eg . 1000 series are assets.
Thee 2nd represent current or fixed asset, & 3rd and 4th digit represents the specific asset.
-1000-1999 Assets
- 2000-2999 Liabilities
- 3000-3999 Equity
2-44
DATA STORAGE
Ledger
General ledger
Subsidiary ledger
Coding techniques
• When group codes are used, two or more subgroups of digits are used
to code an item.
• EXAMPLE: Product item codes:
– Digits 1-2 Type of Stock (RM, FG, WIP)
– Digit 3 Colour
– Digits 4-7 Year of manufacture
– Digits 8-9 Location in warehouse 2-45
DATA STORAGE
Ledger
General ledger
• Group coding schemes are often used in assigning general ledger
Subsidiary ledger
account numbers. The following guidelines should be observed:
– The code should be consistent with its intended use, so make sure you
Coding techniques
know what users need.
– Provide enough digits to allow room for growth.
– Keep it simple in order to:
• Minimize costs
• Facilitate memorization
• Ensure employee acceptance
– Make sure it’s consistent with:
• The company’s organization structure
• Other divisions of the organization
2-46
• The chart of accounts is a list of all general ledger accounts an organization uses.
• Group coding is often used for these numbers, e.g.:
– The first section identifies the major account categories, such as asset, liability, revenue,
DATA STORAGE etc.
– The second section identifies the primary sub-account, such as current asset or long-
term investment.
Ledger
– The third section identifies the specific account, such as accounts receivable or
inventory.
General ledger
– The fourth section identifies the subsidiary account, e.g., the specific customer code for
Subsidiary ledger an account receivable.
• The structure of this chart is an important AIS issue, as it must contain sufficient detail to
Coding techniques meet the organization’s needs.
Chart of accounts
2-47
DATA STORAGE
• In manual systems and some accounting packages, the first place that
Ledger
transactions are entered is the journal.
– A general
General ledger
journal is used to record:
• Non-routine transactions, such as loan payments
Subsidiary ledger
• Summaries of routine transactions
• Adjusting entries
Coding techniques
• Closing entries
– A special journal is used to record routine transactions. The most common special
Chart of accounts
journals are:
• Cash receipts
• Cash disbursements
• Credit sales
• Credit purchases
Journals
2-48
Fundamental Data Storage
Concepts and Definitions
What is an entity?
An entity is something about which
information is stored.
What are some examples of entities?
– employees
– inventory items
– customers
– suppliers
2-49
Fundamental Data Storage
Concepts and Definitions
What are attributes?
Each entity has attributes, or
characteristics of interest, which need to
be stored.
What are some examples?
– customer addresses
2-50
Fundamental Data Storage
Concepts and Definitions
Computers store data by organizing
smaller units of data into large, more
meaningful ones.
A field is the smallest element of data
storage.
A number of fields are grouped together
to form a record, which is a collection of
data values that describe specific
attributes of one entity.
2-51
Fundamental Data Storage
Concepts and Definitions
Related records are grouped together to
form a file.
What is an example of a file?
2-52
Fundamental Data Storage
Concepts and Definitions
Data base
File
Record
Field 2-53
Fundamental Data Storage
Concepts and Definitions
Accounts Receivable File
Attributes
Customer Customer Address Credit Balance
Number name limit
2 Entities 2 Data
Individual fields values
Records
2-54
Types of Files
Two basic types of files are used to store
data.
1 The master file, which is conceptually
similar to a ledger in a manual system.
(eg customer addresses, general ledger)
2 The transaction file, which is conceptually
similar to a journal in a manual system.
(eg journals,sales invoices, purchase
invoices)
2-55
The Data Processing Cycle
The trigger for data input is usually
business activity. Data must be
collected about:
1. Each event of interest
2. The resources affected by each event
3. The agents who participate in each
event
2-56
Data Processing
2-57
Data Processing
The most common data processing activity is
data maintenance.
Data maintenance is the periodic processing
of transactions to update stored data.
What are some commonly used types of data
maintenance?
2-58
Data Processing Cycle:
Data Processing Methods
Batch processing is the periodic updating
of the data stored about resources and
agents
On-line, real-time processing is the
immediate updating as each transaction
occurs
2-59
Batch Processing
Batch processing is updating master files
periodically to reflect all transactions that
occurred during a given time period.
The master file is updated at set times or
whenever a manageable number of
transactions are gathered.
Transaction data can either be entered as
a batch or as each transaction occurs.
2-60
Batch Processing
Group source documents into batches.
Master
file
2-61
On-line, Real-Time Processing
In on-line, real-time processing, the
computer captures data electronically,...
– edits it for accuracy and completeness,
and...
– immediately processes it.
2-62
On-line, Real-Time Processing
Enter transactions into system as they occur.
Master
file
2-63
Advantages of Each Method
The main advantage of batch processing
was efficiency in processing.
On-line data entry is more accurate than
periodic batch input because the system
can refuse incomplete of erroneous
entries.
Real-time processing ensures that the
information in master files is always
current.
2-64
Information Output
The final step in the data processing
cycle is information output.
2-65
Forms of Information Output
Information is presented in three forms:
1 Documents
2 Reports
3 Responses to a query
2-66
Purpose of Information Output
External users:
Financial statements are produced to
meet stewardship requirements.
Income tax returns and filings with the
Securities Commission are produced to
comply with legal requirements.
2-67
Purpose of Information Output
Internal users:
Budgets, sales forecasts, and projected
cash flow statements are prepared for
planning purposes.
Production and delivery schedules, open
purchase orders, and inventory stock
status reports are prepared to help
effectively manage day-to-day operations.
2-68
What is an Audit Trail?
2-69
End of Lecture
ACC200 - Accounting
Information Systems
Sem 3 2019
3-2
What is the current system?
Need to understand the information needs of the
company more clearly.
1 What types of tools and techniques should a Co
use to document its existing system so it is easy
to understand and evaluate?
2 What development tools and techniques should a
Co use to design its new computer-based
information system?
3-3
Introduction
3-4
Overview
3-5
Documentation Tools
3-6
Learning Objective 1
3-7
Data Flow Diagrams
3-8
Data-Flow Diagrams
A data-flow diagram shows the physical and
logical flows of data through a transaction
processing system without regard to the time
period when each occurs
Physical devices that transform data are not
used in the logical diagrams
Because of the simplified focus, only
four symbols are needed
3-9
Data Flow Diagrams
3-10
Data Flow Diagram Symbols
Data Flows
Transformation Processes
Data Stores
3-11
Data Flow Diagram Symbols
A data source or data destination symbol on the
DFD represents an organization or individual that
sends or receives data that they system uses or
produces.
A data flow represents the flow of data between
processes, data stores and data sources and
destinations.
A transformation process represents the
transformations of data.
A data store is a temporary or permanent repository
of data.
A data dictionary contains description of all the
elements, stores, and flows in a system.
3-12
Guidelines for
Drawing a DFD
1. Understand the system.
2. Ignore certain aspects of the system.
3. Determine system boundaries.
4. Develop a context diagram.
5. Identify data flows.
6. Group data flows.
7. Identify transformation processes.
8. Group transformation processes.
3-13
Guidelines for
Drawing a DFD, continued
9. Identify all files or data stores.
10. Identify all data sources and destinations.
11. Name all DFD elements.
12. Subdivide the DFD.
13. Give each process a sequential number.
14. Repeat the process.
15. Prepare a final copy.
3-14
The Hierarchy of Data-Flow
Diagrams
Context Diagram
Level 1 diagram(s)
3-15
Context Diagram
3-16
Level 0 & Level 1 DFDs
3-18
DFD - Level 0
3-19
DFD- Level1
3-20
Learning Objective 2
.
Draw flowcharts to understand,
evaluate, and design information
systems.
3-21
Flowcharts
Describe an information system showing:
Inputs and Outputs
Information activities (processing data)
Data storage
Data flows
Decision steps
3-22
Types of Flowcharts
Document: shows the flow of documents and
data for a process, useful in evaluating
internal controls
System: depicts the data processing cycle
for a process
Program/Process Map: illustrates the
sequence of logic in the system process
3-23
Flowcharts Symbols
3-24
Document Flowcharts
3-26
A Sample Document
Flowchart
Requesting Department Central Supplies Department
12 A
Goods Requisition
Form
1
Goods Requisition
Form
File
3-27
A Sample Document
Flowchart
Purchase Purchase
Purchase Requisition Requisition
Requisition 1 1
2
2
Purchase
To Vendor Purchase Order
Order 3
1
2
Purchase 3 Purchase
Order 4 Order
5 4
5
3-28
What are System
Flowcharts?
System flowcharts depict the
relationship among the input,
processing, and output of an AIS.
A system flowchart begins by
identifying both the inputs that enter
the system and their origins.
The input is followed by the
processing portion of the flowchart.
3-29
What are Computer
System Flowcharts?
The resulting new information is the
output component.
System flowcharts are an important
tool of system analysis, design, and
evaluation.
3-30
What are Computer
System Flowcharts?
Input
Storage Process
Output
3-31
Systems Flowchart Example: Automated
Batch Sales
3-32
Differences Between
DFDs and Flowcharts
DFDs emphasize the flow of data and
what is happening in a system,
whereas a flowchart emphasizes the
flow of documents or records
containing data.
A DFD represents the logical flow of
data, whereas a flowchart represents
the physical flow of data.
3-33
Differences Between
DFDs and Flowcharts
Flowcharts are used primarily to
document existing systems.
DFDs, in contrast, are primarily used
in the design of new systems and do
not concern themselves with the
physical devices used to process,
store, and transform data.
3-34
Differences Between
DFDs and Flowcharts
DFDs make use of only four symbols.
Flowcharts use many symbols and
thus can show more detail.
3-35
Program/Process Maps
A program or process
map is a simple
graphical representation
of a business process
3-36
Process Map Basic Symbols
3-37
Rules for Reading Process
Maps
3-39
Rules for Reading Process Maps (Cont)
3-40
Process Map
3-41
End of Lecture
ACC200 - Accounting
Information Systems
Sem 3 2019
4-3
Expenditure Cycle:
Main Objective
The expenditure cycle is a recurring set of
business activities and related data
processing operations associated with the
purchase of and payment for goods and
services.
The primary objective of the expenditure
cycle is to minimize the total cost of
acquiring and maintaining inventories,
supplies, and the various services
necessary for the organization to function.
4-4
Learning Objective 2
4-5
Expenditure Cycle:
Key Decisions
What is the optimal level of inventory and
supplies to carry?
Which suppliers provide the best quality and
service at the best prices?
Where should inventories and supplies be
held?
How can the organization consolidate
purchases across units to obtain optimal
prices?
4-6
Expenditure Cycle:
Key Decisions
How can information technology be used to
improve both the efficiency and accuracy of
the inbound logistics function?
Is sufficient cash available to take
advantage of any discounts suppliers offer?
How can payments to vendors be managed
to maximize cash flow?
4-7
Information Needs
4-8
EXPENDITURE CYCLE
INFORMATION NEEDS
Information is needed for the following
operational tasks in the expenditure cycle,
including:
Deciding when and how much inventory to order
Deciding on appropriate suppliers
Determining if vendor invoices are accurate
Deciding whether to take purchase discounts
Determining whether adequate cash is available to
meet current obligations
4-9
EXPENDITURE CYCLE
INFORMATION NEEDS
Information is also needed for the following
performance evaluation & strategic decisions:
Setting prices for products/services
Establishing policies on returns and warranties
Deciding on credit terms
Determining short-term borrowing needs
Planning new marketing campaigns
4-10
EXPENDITURE CYCLE
INFORMATION NEEDS
The AIS needs to provide information to
evaluate the following:
Purchasing efficiency and effectiveness
Supplier performance
Time taken to move goods from receiving to
production
Percent of purchase discounts taken
Both financial and operating information are
needed to manage and evaluate these activities.
Both external and internal information are
needed.
4-11
EXPENDITURE CYCLE
INFORMATION NEEDS
When the AIS integrates information from the
various cycles, sources, and types, the reports
that can be generated are unlimited. They
include reports on:
Supplier performance
Outstanding invoices
Performance of expenditure cycle employees
Number of POs processed by purchasing agent
Number of invoices processed by A/P clerk
Number of deliveries handled by receiving clerk
4-12
EXPENDITURE CYCLE
INFORMATION NEEDS
Number of inventory moves by warehouse worker
Inventory turnover
Classification of inventory based on contribution to
profitability
Accountants should continually refine and
improve these performance reports.
4-13
Learning Objective 3
4-14
Expenditure Cycle:
Business Activities
What are the three basic business
activities in the expenditure cycle?
1. Ordering goods, supplies and
services
2. Receiving and storing goods,
supplies and services
3. Paying for goods, supplies and
services
4-15
Expenditure Cycle:
Business Activities
4-17
ORDERING GOODS,
SUPPLIES, AND SERVICES
Key decisions in this process involve
identifying what, when, and how much to
purchase and from whom.
Weaknesses in inventory control can create
significant problems with this process:
Inaccurate records cause shortages.
One of the key factors affecting this process
is the inventory control method to be used.
4-18
ORDERING GOODS,
SUPPLIES, AND SERVICES
Alternate inventory control methods
We will consider three alternate approaches to
inventory control:
• Economic Order Quantity (EOQ)
• Just in Time Inventory (JIT)
• Materials Requirements Planning (MRP)
4-19
ORDERING GOODS,
SUPPLIES, AND SERVICES
Alternate inventory control methods
We will consider three alternate approaches to
inventory control:
• Economic Order Quantity (EOQ)
• Materials Requirements Planning (MRP)
• Just in Time Inventory (JIT)
4-20
ORDERING GOODS,
SUPPLIES, AND SERVICES
EOQ is the traditional approach to managing
inventory.
Goal: Maintain enough stock so that production doesn’t get
interrupted.
Under this approach, an optimal order size is calculated by
minimizing the sum of several costs:
• Ordering costs
• Carrying costs
• Stockout costs
The EOQ formula is also used to calculate reorder point, i.e., the
inventory level at which a new order should be placed.
Other, more recent approaches try to minimize or eliminate the amount
of inventory carried. 4-21
ORDERING GOODS,
SUPPLIES, AND SERVICES
Alternate inventory control methods
We will consider three alternate approaches to
inventory control:
• Economic Order Quantity (EOQ)
• Materials Requirements Planning (MRP)
• Just in Time Inventory (JIT)
4-22
ORDERING GOODS,
SUPPLIES, AND SERVICES
MRP seeks to reduce inventory levels by
improving the accuracy of forecasting
techniques and carefully scheduling
production and purchasing around that
forecast.
Forecast Production Qty = Forecast Sales –
Opening Stocks + Forecast Closing Stocks
4-23
ORDERING GOODS,
SUPPLIES, AND SERVICES
4-24
ORDERING GOODS,
SUPPLIES, AND SERVICES
JIT systems attempt to minimize or eliminate
inventory by purchasing or producing only in
response to actual (as opposed to forecasted) sales.
These systems have frequent, small deliveries of
materials, parts, and supplies directly to the location
where production will occur.
A factory with a JIT system will have multiple
receiving docks for their various work centers.
4-25
ORDERING GOODS,
SUPPLIES, AND SERVICES
Similarities and differences between MRP
and JIT:
Scheduling production and inventory
accumulation.
• MRP schedules production to meet estimated sales and
creates a stock of finished goods inventory to be available
for those sales.
• JIT schedules production in response to actual sales and
virtually eliminates finished goods inventory, because
goods are sold before they’re made.
4-26
ORDERING GOODS,
SUPPLIES, AND SERVICES
Similarities and differences between MRP
and JIT:
Scheduling production and inventory
accumulation
Nature of products
• MRP systems are better suited for products that have
predictable demand, such as consumer staples.
• JIT systems are particularly suited for products with
relatively short life cycles (e.g., fashion items) and for
which demand is difficult to predict (e.g., toys associated
with movies).
4-27
ORDERING GOODS,
SUPPLIES, AND SERVICES
Similarities and differences between MRP
and JIT:
Scheduling production and inventory
accumulation
Nature of products
Costs and efficiency
• Both can reduce costs and improve efficiency over
traditional EOQ approaches.
4-28
ORDERING GOODS,
SUPPLIES, AND SERVICES
Similarities and differences between MRP
and JIT:
Scheduling production and inventory
accumulation
Nature of products
Costs and efficiency
Too much or too little
• In either case, you must be able to:
– Quickly accelerate production if there is unanticipated
demand.
– Quickly stop production if too much inventory is
accumulating. 4-29
ORDERING GOODS,
SUPPLIES, AND SERVICES
Whatever the inventory control system, the order
processing typically begins with a purchase request
followed by the generation of a purchase order.
A request to purchase goods or supplies is triggered
by either:
The inventory control function; or
An employee noticing a shortage.
Advanced inventory control systems automatically
initiate purchase requests when quantity falls below
the reorder point.
4-30
Source Documents
1. Purchase requisition
3. Vendor list
4-31
Source Documents (Cont)
5. Remittance advice
6. Supplier Statement 4-32
Ordering Goods, Supplies
And Services
Documents and procedures:
The purchase requisition is a
document that identifies the following:
– requisitioner and item number
– specifies the delivery location and
date needed
– specifies descriptions, quantity, and
price of each item requested
– may suggest a vendor
4-33
Expenditure Cycle
Reorder point
Request
Various Goods Inventory
departments (Purchase requisition) control
Order goods
4-34
Purchase Requisition -
Example
4-35
Expenditure Cycle
Back Orders
Revenue
Order goods cycle
Purchase
order Needs
4-36
Ordering Goods, Supplies
And Services
Documents and procedures:
The purchase order is a document that
formally requests a vendor to sell and
deliver specified products at designated
prices.
It is also a promise to pay and becomes a
contract once it is accepted by the vendor.
Frequently, several purchase orders are
generated to fill one purchase requisition.
4-37
Ordering Goods, Supplies
And Services
What is a key decision?
– determine vendor
What factors should be considered?
– price
– quality of materials
– dependability in making deliveries
(How fast?)
4-38
Purchase Order - Example
4-39
Receiving and Storing Goods,
Supplies and Services
The second major business activity
involves the receipt and storage of
ordered items.
Key decisions and information needs:
Packing Slip/
Purchase Order
Delivery Note
Verify order,
A count, and
inspect
4-41
Receiving and Storing Goods,
Supplies and Services
Documents and procedures:
The receiving report (Goods
Received Note) documents details
about each delivery, including the
date received, shipper, vendor, and
purchase order number.
For each item received, it shows the
item number, description, unit of
measure, and count of the quantity
received.
4-42
Receiving Report / Goods
Received Note (GRN)
4-43
Example - Picking/Packing
List
5-44
Pay for Goods and Services:
Approve Vendor Invoices
The third activity entails approving
vendor invoices for payments.
The accounts payable department
approves vendor invoices for payment
The cashier is responsible for making
the payment
4-45
PAYING FOR GOODS AND
SERVICES
There are two basic sub-processes
involved in the payment process:
Approval of vendor invoices
Actual payment of the invoices
4-46
PAYING FOR GOODS AND
SERVICES
There are two basic sub-processes
involved in the payment process:
Approval of vendor invoices
Actual payment of the invoices
4-47
PAYING FOR GOODS AND
SERVICES
Approval of vendor invoices is done by
the accounts payable department,
which reports to the controller.
The legal obligation to pay arises when
goods are received.
But most companies pay only after
receiving and approving the invoice.
This timing difference may necessitate
adjusting entries at the end of a fiscal
period.
4-48
PAYING FOR GOODS AND
SERVICES
Objective of accounts payable:
Authorizepayment only for goods and
services that were ordered and actually
received.
Requires information from:
Purchasing—about existence of valid
purchase order
Receiving—for receiving report indicating
goods were received
4-49
Expenditure Cycle
ACCOUNTS PAYABLE
Purchase Receiving
Invoice order report
Compare, review,
verify N
accuracy
4-50
Expenditure Cycle
Cashier
From A/P A
Batch totals
Invoice
Receiving
report Compare and
Purchase reconcile
order
Disbursement Review and
voucher compute Batch
batch total total
4-51
Pay for Goods and Services:
Approve Vendor Invoices
The objective of accounts payable is
to authorize payment only for goods
and services that were ordered and
actually received.
There are two ways to process
vendor invoices:
1. Non-voucher system
2. Voucher system
4-52
PAYING FOR GOODS AND
SERVICES
Thereare two basic approaches to
processing vendor invoices:
Non-voucher system
• Each invoice is stored in an open invoice file.
• When a check is written, the invoice is marked “paid” and
then stored in a paid invoice file.
4-53
PAYING FOR GOODS AND
SERVICES
Thereare two basic approaches to
processing vendor invoices:
Non-vouchersystem
Voucher system
• A disbursement voucher is prepared which lists:
– Outstanding invoices for the supplier
– Net amount to be paid after discounts and allowances
• The disbursement voucher effectively shows which
accounts will be debited and credited, along with the
account numbers.
4-54
PAYING FOR GOODS AND
SERVICES
Thereare two basic approaches to
processing vendor invoices:
Non-vouchersystem
Voucher system
• Advantages of a voucher system:
– Several invoices may be paid at once, which reduces
number of checks written
– Vouchers can be pre-numbered which simplifies the audit
trail for payables
– Invoice approval is separated from invoice payment, which
makes it easier to schedule both to maximize efficiency
4-55
Pay for Goods and Services:
Improving Accounts Payable
Processing efficiency can be improved
by:
Requiring suppliers to submit invoices
electronically, either by EDI or via the
Internet
Eliminating vendor invoices. This
“invoiceless” approach is called
evaluated receipt settlement (ERS).
4-56
Evaluated receipt settlement
(ERS).
4-58
Disbursement / Payment
Voucher - Example
4-59
Learning Objective 4
4-60
Control Objectives,
Threats, and Procedures
The second function of a well-designed AIS
is to provide adequate controls to ensure
that the following objectives are met:
Transactions are properly authorized.
Recorded transactions are valid.
Valid, authorized transactions are recorded.
Transactions are recorded accurately.
12-61
Control Objectives,
Threats, and Procedures
Assets (cash, inventory, and data) are
safeguarded from loss or theft.
Business activities are performed
efficiently and effectively.
12-62
Control Objectives,
Threats, and Procedures
What are some threats?
– stockouts
– purchasing too many or unnecessary
goods
– purchasing goods at inflated prices
– purchasing goods of inferior quality
– purchasing from unauthorized vendors
– kickbacks
12-63
Control Objectives,
Threats, and Procedures
– receiving unordered goods
– errors in counting goods
– theft of inventory
– failure to take available purchasing
discounts
– errors in recording and posting
purchases and payments
– loss of data
12-64
Control Objectives,
Threats, and Procedures
What are some exposures?
– production delays and lost sales
– increased inventory costs
– cost overruns
– inferior quality of purchased goods
– inflated prices
– violation of laws or import quotas
– payment for items not received
12-65
Control Objectives,
Threats, and Procedures
– inaccurate inventory records
– loss of assets
– cash flow problems
– overstated expenses
– incorrect data for decision
making
12-66
Control Objectives,
Threats, and Procedures
What are some control procedures?
– inventory control system-MRP, EOQ, JIT
– vendor performance analysis
– approved purchase requisitions
– restricted access to blank purchase
requisitions
– price list consultation
– budgetary controls
12-67
Control Objectives,
Threats, and Procedures
– use of approved vendor lists
– approval of purchase orders
– prenumbered purchase orders
– prohibition of gifts from vendors
– incentives to count all deliveries
– physical access control
– recheck of invoice accuracy
– cancellation of voucher package
12-68
End of Lecture
4-69
ACC200 - Accounting
Information Systems
Sem 3 2019
Topic 5 :The Revenue Cycle:
Sales and Cash Collections
Learning Objectives
1. Describe the basic business activities and
related data processing operations performed
in the revenue cycle.
2. Discuss the key decisions that need to be
made in the revenue cycle and identify the
information needed to make those decisions.
3. Document your understanding of the revenue
cycle
4. Identify major threats in the revenue cycle and
evaluate the adequacy of various control
procedures for dealing with those threats..
5-2
Learning Objective 1
5-3
Revenue Cycle
Business Activities
The revenue cycle is a recurring set of
business activities and related
information processing operations
associated with providing goods and
services to customers and collecting
cash in payment for those sales.
5-4
Revenue Cycle
Business Activities
What are the five basic revenue cycle
business activities?
1 Sales Order Entry
2 Shipping/Delivery
3 Billing - Accounts Receivable & GL
4 Cash collections
5 Other Adjustments -Dr & Cr Note,
Provisions for Bad Debts
5-5
Overview of the Revenue
Cycle
5-6
The Revenue Cycle
5-7
Revenue Cycle Business Activities:
Sales Order Entry
Sales order
5-8
Revenue Cycle Business Activities:
Shipping
5-9
Revenue Cycle Business Activities:
Billing and Accounts Receivable
5-10
Revenue Cycle Business Activities:
Cash Collections
5-11
Learning Objective 2
5-12
Revenue Cycle –
Key Decisions
The revenue cycle’s primary objective is
to provide the right product in the right
place at the right time for the right price.
How does a company accomplish this
objective?
• To accomplish the revenue cycle’s primary
objective, management must make the
following key decisions:
5-13
Revenue Cycle –
Key Decisions
To what extent can and should products be
customized to individual customers’ needs
and desires?
How much inventory should be carried, and
where should that inventory be located?
How should merchandise be delivered to
customers? Should the company perform
the shipping function itself or outsource it to
a third party that specializes in logistics?
5-14
Revenue Cycle –
Key Decisions
Key decisions, continued
Should credit be extended to customers?
How much credit should be given to
individual customers?
What credit terms should be offered?
How can customer payments be processed
to maximize cash flow?
5-15
Learning Objective 3
5-16
Revenue Cycle- Functions
5-17
Revenue Cycle- Functions
– Shipping/deliver of goods
– billing
– accounts receivable
– general ledger
5-18
Sales Order Entry (Activity 1)
5-19
Sales Order Entry (Activity 1)
5-20
Information Needs
and Procedures
The AIS should provide the operational
information needed to perform the following
functions:
Respond to customer inquires about account
balances and order status.
Decide whether to extend credit to a customer.
Decide what types of credit terms to offer.
Set prices for products and services.
Set policies regarding sales returns and
warranties. 5-21
Sales Order Entry (Activity 1)
Next, the system checks whether the inventory
is sufficient to fill accepted orders.
- Determine inventory availability.
- Select methods for delivering merchandise.
Internally generated documents produced by
sales order entry:
– Sales order
– Packing slip
– Picking ticket/Delivery Note
5-22
Shipping (Activity 2)
5-23
Shipping (Activity 2)
5-24
Billing and Accounts
Receivable (Activity 3)
Two activities are performed at this stage
of the revenue cycle:
1 Invoicing customers
2 Maintaining customer accounts
Key decisions and information needs:
• Accurate billing is crucial and requires
information identifying the items and
quantities shipped, prices, and special sales
terms.
5-25
Billing and Accounts
Receivable (Activity 3)
The sales invoice notifies customers of the
amount to be paid and where to send
payment.
A monthly statement summarizes
transactions that occurred and informs
customers of their current account balance.
A credit memo authorizes the billing
department to credit a customer’s account.
5-26
Billing and Accounts
Receivable (Activity 3)
Types of billing systems:
In a postbilling system, invoices are
prepared after confirmation that the items
were shipped.
In a prebilling system, invoices are prepared
(but not sent) as soon as the order is
approved.
The inventory, accounts receivable, and
general ledger files are updated at this time.
5-27
Billing and Accounts
Receivable (Activity 3)
Methods for maintaining accounts receivable:
– open invoice method (Payments are applied
against a client’s individual invoices)
– balance-forward method (Payments are applied
against a client’s total outstanding balance).
5-29
Cash Collections (Activity 4)
Documents, records, and procedures:
Checks are received and deposited.
The accounts receivable function must be able
to identify the source of any remittances and the
applicable invoices that should be credited.
A remittance advice is prepared and entered
on-line showing the customer, invoice number,
and the amount of each payment.
The system performs a number of on-line edit
checks to verify the accuracy of data entry.
5-30
Information Needs
and Procedures
What are examples of additional information
the AIS should provide?
– response time to customer inquires
– time required to fill and deliver orders
– percentage of sales that require back orders
– customer satisfaction
– analysis of market share and trends
– profitability analyses by product, customer,
and sales region
5-31
Source Documents
1. Customer order
2. Order acknowledgement
3. Credit application
4. Sales order
6. Bill of lading
7. Shipping notice
8. Sales invoice
9. Remittance advice
5-34
Sales Order Document -
Example
5-35
Delivery Note/Order -
Example
5-36
Invoice - Example
5-37
Example - Picking/Packing
List
5-38
Bill of Lading/Delivery Note -
Example
5-39
Example - Remittance
Advice
5-40
Example - Official Receipt
5-41
Example - Debtors Statement
5-42
Example - Credit Note
5-43
Learning Objective 4
5-44
Control Objectives,
Threats, and Procedures
The second function of a well-
designed AIS is to provide adequate
controls to ensure that the following
objectives are met:
Transactions are properly authorized.
Recorded transactions are valid.
Valid, authorized transactions are
recorded.
Transactions are recorded accurately.
11-45
Control Objectives,
Threats, and Procedures
Assets (cash, inventory, and data) are
safeguarded from loss or theft.
Business activities are performed
efficiently and effectively.
11-46
Control Objectives,
Threats, and Procedures
What are some threats?
– credit sales to customers with poor
credit
– shipping errors
– theft of cash and inventory
– failure to bill customers
– billing errors
– loss of data
11-47
Control Objectives,
Threats, and Procedures
What are some exposures?
– uncollectible sales and losses due to
bad debts
– customer dissatisfaction
– loss of assets and overstated assets
– loss of revenue and inventory
– incorrect records and poor decision
making
– loss of confidential information
11-48
Control Objectives,
Threats, and Procedures
What are some control procedures?
– credit approval by credit manager and sales
function
– reconciliation of sales order with picking
ticket and packing slip
– restriction of access to inventory and data
– lockbox arrangement
– segregation of duties
11-49
Control: Objectives,
Threats, and Procedures
The second function of a well-
designed AIS is to provide adequate
controls to ensure that the following
objectives are met:
Transactions are properly authorized.
Recorded transactions are valid.
5-50
Control: Objectives,
Threats, and Procedures
Objectives, continued
Valid, authorized transactions are
recorded.
Transactions are recorded accurately.
Assets (cash, inventory, and data) are
safeguarded from loss or theft.
Business activities are performed
efficiently and effectively.
5-51
Other Computer Controls
need to develop (or update) a security policy
orders - how do you authenticate the customer? /
require registration and login with password.
customers with credit - they need to secure
passwords / if they wish to use the service,
security / confidentiality of orders (including
transmission of credit card details) / use
encrypted secure method (eg SSL).
verification of credit card data and authorisation of
credit card payment / need link to credit card
companies and record their authorisation code for
each transaction.
5-52
Other Computer Control
need to keep all new customer data secure /
physical security and logical security including
encryption of passwords.
need to keep customers' credit card data secure /
separate server with restricted access by limited
number of own staff and encryption should be
used.
need to keep web site secure / firewall, secure
architecture, and intrusion detection system, keep
all system software versions up to date, consider
also vulnerability testing.
need to keep servers free of any virus/ firewall,
virus protection software and virus definitions
continuously kept up to date.
5-53
End of Lecture
5-54
ACC200 - Accounting
Information Systems
Sem 3 2019
Topic 6 : General
Ledger Reporting
System
Learning Objectives
1. Describe the information processing operations required to
update the general ledger and to produce other reports for
internal and external users.
2. Describe how the business processes provide data required
for general ledger (GL) updates.
3. Understand how the GL and business reporting capabilities
support an organization’s external and internal reporting
functions.
4. Understand the threats and controls to the GL Reporting
system
5. Appreciate the technologies underpinning the GL & Financial
Reporting Cycle
6-2
Introduction
6-3
The Accounting Cycle
Make end-of-
Journalize month/year
transactions. Post entries to the Prepare trial
adjustments.
ledger accounts. balance.
6-5
Update The General Ledger
(Activity 1)
The first activity in the general ledger system is
to update the general ledger.
Updating consists of posting journal entries
that originated from two sources:
1. Accounting sub-systems (revenue, expenditure,
production, payroll cycle)
2. The treasurer (purchase or sale of investments)
6-6
Update The General Ledger
(Activity 1)
6-7
The Ledger
Accounts are individual
Fixed Assets records showing increases
Inventory, Cash and decreases.
Accounts Receivable
Cash
Accounts
Payable, Loans
The entire group of accounts
is kept together in an
accounting record called a
ledger.
Share Capital &
Long Term
Liabilities
6-8
What is the
Chart of Accounts?
The chart of accounts is a list of all
general ledger accounts used by an
organization.
It is important that the chart of
accounts contains sufficient detail to
meet the information needs of the
organization.
6-9
Example of Chart of
Accounts
The design of the structure of the chart of
accounts is of crucial importance in AIS
because it affects and information content and
presentation of the financial statements.
6-10
Forms of Business
Organizations
Sole
Proprietorship Partnership Companies
6-11
Specimen Chart of Accounts
- Trading Co
6-12
Specimen Chart of Accounts -
Partnership
6-13
IS Functions of the General
Ledger System
All general ledgers should (must):
collect transaction data promptly and accurately
Input
classify/code data and accounts
validate collected transactions/ maintain
accounting controls (e.g., equal debits and credits)
Process
process transaction data
• post transactions to proper accounts
• update general ledger accounts and transaction files
Output
• record adjustments to accounts
store transaction data
generate timely financial reports 6-14
Record Transaction Data
in Journals
After transaction data have been
captured on source documents, the
next step is to record the data in a
journal.
A journal entry is made for each
transaction showing the accounts and
amounts to be debited and credited.
6-15
Record Transaction Data
in Journals
The general journal records infrequent
or non-routine transactions (eg
depreciation).
Specialized journals simplify the
process of recording large numbers of
repetitive transactions ( eg sales
invoices, purchases, bank payments
& receipts).
What are the four most common types
6-16
of transactions?
Record Transaction Data
in Special Journals
1 Credit sales
2 Cash receipts
3 Purchases on account
4 Cash disbursements
6-17
The General Journal
GENERAL JOURNAL
GENERAL JOURNAL
6-19
Sales Journal/Sales Day
Book
Date Particulars Inv No Amount
June 1 Jake Sparks 0001 3,000
June 1 Heather Jacobs 0002 7,000
Transferred to Sales A/C 10,000
6-20
Post Transactions to
Ledgers
Types of Ledgers
6-21
Post Transactions to
Ledgers
A subsidiary ledger records all the
detailed data for any general ledger
account that has many individual sub-
accounts.
What are some commonly used
subsidiary ledgers?
– accounts receivable
– inventory
– accounts payable
6-22
Subsidiary Ledgers: A
Source of Needed Details
General Ledger
Controlling Account Accounts Receivable
Date Debit Credit Balance
2001
June 1 10,000 10,000
15 3,000 7,000
Subsidiary Ledger
Jake Sparks
Date Debit Credit Balance
2001
June 1 3,000 3,000
15 1,000 2,000
Subsidiary Ledger
Heather Jacobs
Date Debit Credit Balance
2001
June 1 7,000 7,000 6-23
15 2,000 5,000
Post Transactions to
Ledgers
Ledgers are used to summarize the
financial status, including the current
balance, of individual accounts.
The general ledger contains
summary-level data for every asset,
liability, equity, revenue, and expense
account of an organization.
6-24
Post Transactions to
Ledgers
What is the general ledger account
corresponding to a subsidiary ledger
called?
– Control account
A control account contains the total
amount for all individual accounts in
the subsidiary ledger.
6-25
Subsidiary Ledgers: A
Source of Needed Details
General Ledger
Credit Sales
Date Debit Credit Balance
2001
June 1 10,000.00 10,000
6-26
Controlling Account in Unit of Organization Within the
the General Ledger Subsidiary Ledger
Inventory Each type of product offered for
sale
Plant assets Each asset (or group ofsimilar
assets)
Accounts payable Each creditor
Capital stock Each stockholder
Sales Each department, branch
location, or product line
Cost of goods sold Same organization as the sales
ledger
Many expense accounts Each department incurring these
types of expenses
6-27
Payroll expenses Each employee
Post Adjusting Entries
(Activity 2)
6-28
Post Adjusting Entries
(Activity 2)
Journal Post adjusting
voucher entries
6-30
Entries to Apportion
Unrecorded Costs
$2,400 Insurance Policy Coverage for
12 Months
Jan. 1 Dec. 31
GENERAL JOURNAL
GENERAL JOURNAL
6-35
Financial Statements
X
6-36
Introduction to Financial
Statements
Describes where the
Balance Sheet enterprise stands at a
specific date.
Income Statement
6-37
Introduction to Financial
Statements
Balance Sheet
6-38
Relationships Among
Financial Statements
Beginning of End of
period period
Time
Balance Balance
Sheet Sheet
Income Statement
Statement of Cash Flows
6-39
Introduction to Financial
Statements
Balance Sheet
6-40
Introduction to Financial
Statements
Balance Sheet
Income Statement
6-41
Produce Managerial Reports
(Activity 4)
The final activity in the general
ledger and reporting system involves
the production of various managerial
reports.
What are the two main categories of
managerial reports?
1. General ledger control reports
2. Budgets
6-42
Produce Managerial Reports
(Activity 4)
What are examples of control reports?
– lists of journal vouchers by numerical
sequence, account number, or date
– listing of general ledger account
balances
What are examples of budgets?
– operating budget
– capital expenditures budget
6-43
Produce Managerial Reports
(Activity 4)
Budgets and performance reports
should be developed on the basis of
responsibility accounting.
What is responsibility accounting?
It involves reporting financial results
on the basis of managerial
responsibilities within an organization.
6-44
Learning Objective 4
6-45
Control: Objectives,
Threats, and Procedures
What are the control objectives in
the general ledger and reporting
system?
1. Updates to the general ledger are
properly authorized.
2. Recorded general ledger
transactions are valid.
3. Valid, authorized general ledger
transactions are recorded.
6-46
Control: Objectives,
Threats, and Procedures
6-47
Technologies Underpinning the
GL & Financial Reporting Cycle
Online banking
Legacy
Data Warehouse Systems
ERP System
Customers Suppliers
Core Functions [On-Line Transaction Processing (OLTP)]
Sales
Business Shop Floor
& Logistics
Planning Control
Distribution
Operational Database
Customers, Production,
Vendor, Inventory, etc.
6-50
XBRL: REVOLUTIONIZING THE
REPORTING PROCESS
Although financial statements appear
electronically in a variety of formats, until
recently disseminating this information was
cumbersome and inefficient.
Recipients (SEC, IRS, etc.) required the information
in a variety of formats which was time-consuming.
Also conducive to errors, because re-entry of the
information was often necessary.
Underlying problem: Lack of standards for
identifying the content of data.
6-51
XBRL: REVOLUTIONIZING THE
REPORTING PROCESS
Solution: Extensible Business Reporting
Language (XBRL)
A variant of XML designed specifically to communicate
the contents of financial data.
Creates tags for each data item much like HTML tags.
• Tag names specify line items in financial statements.
• Other fields in the tag provide information such as the year,
units of measure, etc.
Major software vendors are developing tools to
automatically generate XBRL codes so
accountants won’t need to write code.
6-52
XBRL: REVOLUTIONIZING THE
REPORTING PROCESS
XBRL provides two major benefits:
Organizations can publish their financial
statements on time in a format that anyone
can use.
Recipients will no longer need to manually re-
enter data they acquired electronically so that
decision support tools can analyze them.
• Means search for data on the Internet will be more
efficient and accurate.
6-53
End of Chapter 6
ACC200 - Accounting
Information Systems
Sem 3 2019
7-1
Learning Objectives
7-3
Overview of Control
Concepts
What is the traditional definition of internal
control?
Internal control is the plan of organization
and the methods a business uses to
safeguard assets, provide accurate and
reliable information, promote and improve
operational efficiency, and encourage
adherence to prescribed managerial policies.
7-4
Overview of Control
Concepts
What is management control?
Management control encompasses the
following three features:
1 It is an integral part of management
responsibilities.
2 It is designed to reduce errors, irregularities,
and achieve organizational goals.
3 It is personnel-oriented and seeks to help
employees attain company goals.
7-5
Internal Control Classifications
7-6
AIS Controls
7-7
Committee of Sponsoring
Organizations
The Committee of Sponsoring
Organizations (COSO) is a private sector
group consisting of five organizations:
1 American Accounting Association
2 American Institute of Certified Public
Accountants
3 Institute of Internal Auditors
4 Institute of Management Accountants
5 Financial Executives Institute
7-8
Committee of Sponsoring
Organizations
In 1992, COSO issued the results of a study to
develop a definition of internal controls and to
provide guidance for evaluating internal control
systems.
The report has been widely accepted as the
authority on internal controls.
7-9
Committee of Sponsoring
Organizations
The COSO study defines internal control as
the process implemented by the board of
directors, management, and those under their
direction to provide reasonable assurance
that control objectives are achieved with
regard to:
– effectiveness and efficiency of operations
– reliability of financial reporting
– compliance with applicable laws and
regulations
7-10
Computer Processing
and Exposures
What are some aspects of computer
processing that can increase the risk
and/or potential dollar loss of exposures?
– Mechanical/electronic processing of data
– mechanical/electronic data storage
– complexity of processing
7-11
Committee of Sponsoring
Organizations
COSO’s internal control model has
five crucial components:
1. Control environment
2. Control activities
3. Risk assessment
4. Information and communication
5. Monitoring
7-12
Describe the major
elements in the control
environment of a
business organization.
7-13
COSO 1- The Control
Environment
The first component of COSO’s internal control
model is the control environment.
The control environment consists of many
factors, including the following:
1 Commitment to integrity and ethical
values
2 Management’s philosophy and operating
style
3 Organizational structure
7-14
COSO 1 - The Control
Environment
4 The audit committee of the board of directors
5 Methods of assigning authority and
responsibility
6 Human resources policies and practices
7 External influences
7-15
External Influences
Concerning an Entity and
Internal Control
• make and keep books, records, and accounts,
which in reasonable detail, accurately and fairly
reflect the transactions and dispositions of the
assets of the issuer;
• devise and maintain a system of internal
accounting controls sufficient to provide
reasonable assurance that :-
7-16
External Influences
Concerning an Entity and
Internal Control
1 transactions are executed in accordance
with management’s authorization;
2 transactions are recorded as necessary-
validity;
3 access to assets is permitted only in
accordance with management’s
authorization- custody;
4 the recorded accountability for assets is
compared with the existing assets -
completeness.
7-17
COSO 2- Control Activities
7-18
COSO 2 - Control Activities
7-19
COSO 2-Proper Authorization
of Transactions and Activities
Authorization is the empowerment
management gives employees to
perform activities and make decisions.
Digital signature or fingerprint is a
means of signing a document with a
piece of data that cannot be forged.
Specific authorization is the granting
of authorization by management for
certain activities or transactions.
7-20
COSO 2 - Control Activities
7-21
COSO 2 - Segregation of
Duties
Good internal control demands that no
single employee be given too much
responsibility.
An employee should not be in a
position to perpetrate and conceal
fraud or unintentional errors.
7-22
COSO 2- Segregation of
Duties
Custodial Functions
Handling cash
Handling assets
Writing checks
Receiving checks in mail Authorization Functions
Authorization of
Recording Functions transactions
Preparing source documents
Maintaining journals
Preparing reconciliations
Preparing performance reports
7-23
COSO 2 - Segregation of
Duties
If two of these three functions are the
responsibility of a single person,
problems can arise.
Segregation of duties prevents employees
from falsifying records in order to conceal
theft of assets entrusted to them.
Prevent authorization of a fictitious or
inaccurate transaction as a means of
concealing asset thefts.
7-24
COSO 2 - Segregation of
Duties
Segregation of duties prevents an
employee from falsifying records to
cover up an inaccurate or false
transaction that was inappropriately
authorized.
7-25
COSO 2 - Design and Use
of Adequate Documents and
Records
The proper design and use of documents
and records helps ensure the accurate and
complete recording of all relevant
transaction data.
Documents that initiate a transaction should
contain a space for authorization.
7-26
7-27
COSO 2 - Adequate Safeguards
of Assets and Records
What can be used to safeguard assets?
– cash registers
– safes, lockboxes
– safety deposit boxes
– restricted and fireproof storage areas
– controlling the environment
– restricted access to computer rooms,
computer files, and information
7-28
COSO 2 - Adequate Safeguards of
Assets and Records
The following procedures safeguard assets
from theft, unauthorized use, and
vandalism:
– effectively supervising and segregating
duties
– maintaining accurate records of assets,
including information
– restricting physical access to cash and paper
assets
– having restricted storage areas
7-29
COSO 2 - Independent
Checks on Performance
Independent checks ensure that
transactions are processed accurately are
another important control element.
7-30
COSO 2 - Independent
Checks on Performance
What are various types of
independent checks?
– reconciliation of two independently
maintained sets of records
– comparison of actual quantities with
recorded amounts (i.e. stock-take)
– double-entry accounting
– batch totals
7-31
COSO 2 - Independent
Checks on Performance
Five batch totals are used in computer
systems:
1 A financial total is the sum of a dollar
field.
2 A hash total is the sum of a field that
would usually not be added.
7-32
COSO 2 - Independent
Checks on Performance
3 A record count is the number of
documents processed.
4 A line count is the number of lines of
data entered.
5 A cross-footing balance test compares
the grand total of all the rows with the
grand total of all the columns to check
that they are equal.
7-33
COSO 3 - Risk Assessment
7-34
COSO Enterprise Risk
Management – 8 components
1. Internal Environment - the overall culture, atmosphere,
and tone of the organization.
2. Objective Setting - management's process for setting
objectives in a way that is consistent with their tolerance
for risk.
3. Event identification - the process of identifying internal
and external events that affect the entity's opportunities
and risks as they relate to achieving management
objectives.
4. Risk assessment - the process of analyzing risks, the
likelihood of identified events, and their potential impact.
7-35
COSO Enterprise Risk
Management
5. Risk response - the process of responding to risks and
identified events.
6. Control activities - the policies and procedures that are
implemented to effect risk responses.
7. Information and communication - the overall flow of
information as it's applied to managing risks in support of
the other ERM components.
8. Monitoring - the process of monitoring the entire ERM
process.
7-36
COSO 3 - Risk Assessment
7-37
COSO 3 - Risk Assessment
5 Incomplete transactions
6 System failures
7 Incompatible systems
7-38
COSO 3 - Risk Assessment
7-39
COSO 3 - Risk Assessment
Some threats pose a greater risk because the
probability of their occurrence is more likely.
For example:
A company is more likely to be the victim of a
computer fraud rather than a terrorist attack.
Risk and exposure must be considered
together.
7-40
COSO 3 - Components of
the Internal Control Process
Responsibility has to do with management
and the board of directors being
responsible for establishing and maintaining
the internal control process.
Reasonable assurance has to do with the
relative costs and benefits of controls.
7-41
COSO 3 - Estimate Cost
and Benefits
No internal control system can provide
foolproof protection against all internal
control threats.
The cost of a foolproof system would be
prohibitively high.
One way to calculate benefits involves
calculating expected loss.
7-42
COSO 3 - Estimate Cost
and Benefits
The benefit of a control procedure is the
difference between the expected loss with
the control procedure(s) and the expected
loss without it.
7-43
Risk Management
Strategies
Once risks have been identified and assessed, all
techniques to manage the risk fall into one or more
of these four major categories:
Avoidance (eliminate, withdraw from or not
become involved)
Reduction (optimize – mitigate)
7-44
COSO 4 - Information and
Communication
The fourth component of COSO’s internal control
model is information and communication.
Accountants must understand the following:
1 How transactions are initiated
2 How data are captured in machine-readable
form or converted from source documents
7-45
COSO 4 - Information and
Communication
3 How computer files are accessed and
updated
4 How data is processed to prepare
information
5 How information is reported
6 How transactions are initiated
All of these items make it possible for the system to
have an audit trail.
An audit trail exists when individual company
transactions can be traced through the system7-4.6
COSO 4 - Information and
Communication
Information refers to the organization’s
accounting system.
The accounting system consists of the
methods and records established to identify,
assemble, analyze, classify, record, and
report the organization’s transactions...
7-47
COSO 4 - Information and
Communication
– and to maintain accountability for the
related assets and liabilities.
What is an audit trail?
7-48
COSO 4 - Information and
Communication
Communication relates to providing a
clear understanding regarding all
policies and procedures relating to
controls.
Good communication requires
effective oral communication,
adequate procedure manuals, policy
manuals, and other types of
documentation.
7-49
COSO 5 - Monitoring
Performance
The fifth component of COSO’s internal
control model is monitoring.
What are the key methods of monitoring
performance?
– effective supervision
– responsibility accounting
– internal auditing
7-50
COSO 5 - Monitoring
Performance
It involves the ongoing process of
assessing the quality of internal
controls over time and taking
corrective actions when necessary.
Monitoring is accomplished through
ongoing activities and separate
evaluations.
7-51
Computer Controls and
Security
7-52
COBIT
7-55
COBIT Benefits
7-56
Introduction to Controls
Controls may relate to manual AIS’s, to computer-
based AIS’s, or both
Controls may be grouped into
General controls,
Application controls, and
Security measures
Controls may also be grouped in terms of risk
aversion: Corrective, Preventive, and Detective
Controls
These categories are intertwined and an appropriate
balance is needed for an effective internal control
structure 7-57
General vs Application
Controls
A company designs general controls
to ensure that its overall computer
system is stable and well managed.
7-58
General Controls
7-59
General Controls
7-61
General Controls
7-62
Developing a Security Plan
7-66
Data Storage Controls
7-67
Minimizing System
Downtime
Significant financial losses can be
incurred if hardware or software
malfunctions cause an AIS to fail.
What are some methods used to
minimize system downtime?
– preventive maintenance
7-68
Disaster Recovery Plan
7-70
Disaster Recovery Plan
3 Specific assignments
4 Complete documentation
5 Backup computer and telecommunications
facilities
reciprocal agreements
hot and cold sites
7-71
Protection of PCs
7-72
Protection of PCs
7-74
IT Governance
IT governance is concerned with whether IT is
being used within the organisation in the
manner intended
– processing
– output
7-76
Input Controls
Aims to ensure data is correctly and accurately input
oReconciliations
oBatch totals
oSequence checks
oHash totals
Processing Controls
Data Matching
Multiple data values must match before processing occurs.
File Labels
Ensure correct and most current file is being updated.
Batch Total Recalculation
Compare calculated batch total after processing to input totals.
Cross-Footing and Zero Balance Tests
Compute totals using multiple methods to ensure the same
results.
Write Protection
Eliminate possibility of overwriting or erasing existing data.
Concurrent Update
Locking records or fields when they are being updated so
multiple users are not updating at the same time.
7-80
Output Controls
User Review
Verify reasonableness, completeness, and routed to intended
individual
Reconciliation
Data Transmission Controls
Check sums
• Hash of file transmitted, comparison made of hash before
and after transmission
Parity checking
• Bit added to each character transmitted, the characters can
then be verified for accuracy
7-81
Application Controls
7-82
Preventive Control
Training
User access controls (authentication
and authorization)
Physical access controls (locks,
guards, etc.)
Network access controls (firewalls,
intrusion prevention systems, etc.)
Device and software hardening
controls (configuration options) 7-83
Preventive Controls
Another control is installing a firewall
(hardware and software) that control
communications between a company’s
internal network (trusted network) and an
external network.
The firewall is a barrier between the
networks that does not allow information to
flow into and out of the trusted network.
7-84
PREVENTIVE CONTROLS
Users can be authenticated by verifying:
Something they know, such as passwords or
PINs.
Something they have, such as smart cards or
ID badges.
Some physical characteristic (biometric
identifier), such as fingerprints or voice.
7-85
PREVENTIVE CONTROLS
Passwords are probably the most commonly
used authentication method and also the
most controversial.
An effective password must satisfy a number
of requirements:
• Length
Longer is better.
Should be at least 8 characters.
7-86
PREVENTIVE CONTROLS
Passwords are probably the most commonly
used authentication method and also the
most controversial.
An effective password must satisfy a number
of requirements:
• Length
• Multiple character types
Use a mix of upper-and lower-case
alphabetic, numeric, and special
characters.
7-87
PREVENTIVE CONTROLS
Passwords are probably the most commonly
used authentication method and also the
• Passwords should not be words found in the
most controversial.
dictionary or dictionary words preceded or followed
by a number such as 4dog or dog4.
An ef fective password must satisfy a number
• Should not be related to the employee’s personal
of requirements:
interests or hobbies, because special-purpose,
• Lengthpassword-cracking dictionaries can be found on the
Internet containing the most common passwords
• Multiplerelated
character types
to various topics.
• Random
7-88
PREVENTIVE CONTROLS
Passwords are probably the most commonly
used authentication method and also the
most controversial.
An effective password must satisfy a number
of requirements:
• Length
• • Thecharacter
Multiple types
most important requirement.
• • A password must be kept secret to be effective.
Random
• Secret
7-89
PREVENTIVE CONTROLS
A password that meets the preceding criteria is
typically difficult to memorize—exacerbated by
the typical requirement that the password be
changed every 90 days.
So most people either:
Select passwords that can be easily guessed but can
be memorized; or
Select passwords that meet the criteria for a strong
password but write them down.
When the password is written down, it changes from
something the employee knows to something the
employee has, which can be stolen and used.
7-90
PREVENTIVE CONTROLS
Authorization controls are implemented by
creating an access control matrix.
Specifies what part of the IS a user can
access and what actions they are permitted to
perform.
When an employee tries to access a
particular resource, the system performs a
compatibility test that matches the user’s
authentication credentials against the matrix
to determine if the action should be allowed.
7-91
PREVENTIVE CONT ROLS
Who has
User Identification Files Programs
Code the
Number Password A B C 1 2 3 4 authority
12345 ABC 0 0 1 0 0 0 0 to delete
12346 DEF 0 2 0 0 0 0 0
12354 KLM 1 1 1 0 0 0 0 Program
12359 NOP 3 0 0 0 0 0 0 2?
12389 RST 0 1 0 0 3 0 0
12567 XYZ 1 1 1 1 1 1 1
Log Analysis
Process of examining logs to identify evidence
of possible attacks
Intrusion Detection
Sensors and a central monitoring unit that
create logs of network traffic that was
permitted to pass the firewall and then analyze
those logs for signs of attempted or successful
intrusions
Managerial Reports
7-93
Security Testing
Firewall
7-94
Corrective Controls
Computer Incident Response Team
Chief Information Security Officer (CISO)
Independent responsibility for information security
assigned to someone at an appropriate senior
level
Patch Management
Fix known vulnerabilities by installing the latest
updates
• Security programs
• Operating systems 7-95
• Applications programs
Describe the techniques
used to analyze internal
control systems.
7-96
Analysis of Internal Control
Processes
The analysis of an internal control
process requires an understanding of
the process both as it is designed and
as it actually operates.
Internal control processes routinely
collect information concerning the
following:
– fulfillment of duties
– transfer of authority
7-97
Analysis of Internal Control
Processes
– approval
– verification
This documentation of internal control
duties must be examined to evaluate
the reliability of the system’s
operations.
Reliability is dependent on the people
who administer internal control
procedures.
7-98
Analytical Techniques
7-100
End of Lecture
7-101
ACC200 - Accounting
Information Systems
Sem 3 2019
8-4
COMPUTER ETHICAL ISSUES
1. Privacy:
Ownership of personal information
Policies
2. Security:
have potential to disseminate inaccurate info to authorized users.
Systems attempt to prevent fraud and abuse of computer systems,
furthering the legitimate interests of firm
Shared databases
6. Environmental Issues:
Should firms limit non-essential hard copies?
What is non-essential?
Disposal of equipment and supplies (toner)
7. Artificial Intelligence:
Who is responsible for faulty decisions from an Expert
System? 8-7
What is the extent of AI/ES in decision-making processes?
COMPUTER ETHICAL ISSUES
8. Unemployment & Displacement:
Computers and technology sometimes replace jobs
(catch-22, productivity)
Some people unable to change with IT, get displaced a
find it difficult to obtain new job
9. Misuse of Computer:
Copying proprietary software
Using a firm’s computers for personal benefit
Snooping through firm’s files
8-8
COMPUTER ETHICAL ISSUES
10. Internal Control Responsibility:
Unreliable information leads to bad decision, possible
financial distress
Management must establish and maintain a system of
appropriate internal controls to ensure integrity and
reliability of data (antithetical)
IS professionals and accountants are central to adequate
internal controls
8-9
What is Fraud?
Statement of Auditing Standards - use of deception to obtain an unjust
or illegal financial advantage and intentional misrepresentation
affecting the financial statements by one or more individuals among
management, employees or 3rd parties. Fraud may involve:-
• falsification or alteration of accounting records or documents
• misappropriation of assets or theft
• suppression or omission of the effects of transactions from records or
documents
• intentional misapplication of accounting policies
• wilful misrepresentation of transactions or the entity’s state of affairs
• recording transactions without substance – eg sale did no8t-1t0akeplace
Common Exposures
Excessive Deficient
Costs Revenue
EXPOSURES
Loss of Inaccurate
Assets Accounting
8-11
Common Exposures
Business Statutory
Interruption Sanctions
EXPOSURES
8-13
FRAUD SCHEMES
Asset misappropriation
Charges to expense accounts
Lapping
Kiting
Transaction fraud
8-14
EMPLOYEE FRAUD
Employee Theft
1) Theft of asset
2) Conversion of asset (to cash, to
fraudster)
3) Concealment of fraud
8-15
Red Flags in Cash/Accounts
Receivable
Abnormal number of expense items,
supplies, or reimbursement to the employee
Presence of employee checks in the petty
cash for the employee in charge of petty cash
Excessive or unjustified cash transactions
Large number of write-offs of accounts
Bank accounts that are not reconciled on a
timely basis
Common Types of Fraud
8-19
Management Fraud Red
Flags
Reluctance to provide information to auditors
Managers engage in frequent disputes with
auditors
Management decisions are dominated by an
individual or small group
Managers display significant disrespect for
regulatory bodies
There is a weak internal control environment
Accounting personnel are lax or inexperienced in
their duties
Decentralization without adequate monitoring
Management Red Flags
8-22
Why Fraud Occurs
8-23
Why Fraud Occurs
8-24
Fraud Triangle
Pressure
Co Circumstances Making
Fraud Easier
Among the several opportune situations, in which fraud
is easier to commit and detection is less likely, the
following three are very important.
• Weak or non-existent internal accounting controls.
•Accounting estimates requiring significant judgment
by company management.
• Unusual or complex transactions.
• Poor hiring and firing practices
8-26
Organisational structure and
its effect on internal controls
Centralisation or decentralisation of authority
Assignment or responsibility for specific tasks
Whether there is direct reporting relationship or more of
a matrix structure
Organisation by industry, product line, geographical
location, or by a particular distribution or marketing
network
The way responsibility allocation affects management’s
information requirements
The organisations of the accounting and information
system functions
8-27
The size and nature of company activities.
Compare and contrast the
fraud schemes and
techniques that are used to
commit computer fraud.
8-28
Fraud Schemes
8-29
Fraudulent Statements
8-31
Asset Misappropriation
Most common type of fraud and often occurs
as employee fraud.
Examples:
making charges to expense accounts to cover
theft of asset (especially cash)
lapping: using customer’s check from one
account to cover theft from a different account
transaction fraud: deleting, altering, or adding
false transactions to steal assets
8-32
Asset Misappropriation-The
Process
Most frauds involve three steps.
The theft of
something
The conversion
to cash
The
concealment
8-33
Asset Misappropriation - The
Fraud Process
What is a common way to hide a theft?
– to charge the stolen item to an expense
account
What is a payroll example?
– to add a fictitious name to the company’s
payroll
8-34
Asset Misappropriation - The
Fraud Process
What is lapping?
In a lapping scheme, the perpetrator
steals cash received from customer A
to pay its accounts receivable.
Funds received at a later date from
customer B are used to pay off
customer A’s balance, etc.
8-35
Asset Misappropriation -The
Fraud Process
What is kiting?
In a kiting scheme, the perpetrator
covers up a theft by creating cash
through the transfer of money
between banks.
The perpetrator deposits a check from
bank A to bank B and then withdraws
the money.
8-36
Asset Misappropriation -The
Fraud Process
Since there are insufficient funds in bank A
to cover the check, the perpetrator deposits
a check from bank C to bank A before his
check to bank B clears.
Since bank C also has insufficient funds,
money must be deposited to bank C before
the check to bank A clears.
The scheme continues to keep checks from
bouncing.
8-37
Computer Fraud
8-38
Computer Fraud/Abuse
Theft, misuse, or misappropriation of assets by
altering computer data
Theft, misuse, or misappropriation of assets by
altering software programming
Theft or illegal use of computer data/information
Theft, corruption, illegal copying or destruction of
software or hardware
Theft, misuse, or misappropriation of computer
hardware
8-39
The Rise in Computer Fraud
8-40
The Rise in Computer Fraud
8-41
Computer Fraud
Classifications
Data fraud
Input Output
fraud Processor fraud fraud
Computer
instruction fraud 8-42
Individuals Posing a Threat
to the Information System
A successful attack on an information
system requires access to hardware,
sensitive data file, or critical programs.
Three groups of individuals could be
involved in an information system’s
attack:
1 Information systems personnel
2 Users
3 Intruders 8-43
Individuals Posing a Threat
to the Information System
Information systems personnel
include the following:
– computer maintenance persons
– programmers
– network operators
– information systems administrative
personnel
– data control clerks
8-44
Individuals Posing a Threat
to the Information System
Users are composed of
heterogeneous groups of people and
can be distinguished from the others
because their functional area does not
lie in data processing.
An intruder is anyone who accesses
equipment, electronic data, or files
without proper authorization.
Who are hackers?
8-45
Individuals Posing a Threat
to the Information System
A hacker is an intruder who attacks a
system for fun and challenge.
What are other types of intruders?
– unnoticed intruders
– wiretappers
– piggybackers
– impersonating intruders
– eavesdroppers
8-46
Data Collection Fraud
This phase of the system is most vulnerable
because it is very easy to change data as it
is being entered into the system.
Also, GIGO (garbage in, garbage out)
reminds us that if the input data is
inaccurate, processing will result in
inaccurate output.
8-47
Data Processing Fraud
Program Frauds
altering programs to allow illegal access
to and/or manipulation of data files
destroying programs with a virus
Operations Frauds
misuse of company computer resources,
such as using the computer for personal
business
8-48
Database Management
Fraud
Altering, deleting, corrupting, destroying,
or stealing an organization’s data
Oftentimes conducted by disgruntled
or ex-employee
8-49
Information Generation
Fraud
Stealing, misdirecting, or misusing computer output
Scavenging
- searching through the trash cans on the computer
center for discarded output (the output should be
shredded, but frequently is not)
8-50
Examples of Computer
Crime - Cybercrime
Cybercrime: a crime committed using a computer
and/or the internet
8-57
Company Policies to prevent
and detect Computer &
Employee Fraud
8-60
Company Policies to prevent
and detect Computer &
Employee Fraud
4 Reduce fraud losses.- Corrective
Maintain adequate insurance.
Store backup copies of programs and
data files in a secure, off-site location.
Develop a contingency plan for fraud
occurrences.
Use software to monitor system
activity and recover from fraud.
8-61
Company Policies to prevent
and detect Computer &
Employee Fraud
5 Encourage integrity, ethical values and
competence through its managerial
practices. - Preventive
Through organisational culture that stresses integrity and
commitment to both ethical values and competence.
Through the examples set by the CEO and other members of
the management because company employees tend to adopt
top management’s attitudes about risks and controls.
By endorsing integrity as basic operating principle by actively
teaching and requiring it such as placing priorities for an
honest report than favourable ones.
8-62
Company Policies to prevent
and detect Computer &
Employee Fraud
5 (Continued)
By avoiding unrealistic expectations, incentives, or temptations
that motivate employees to engage in dishonest, illegal or
unethical acts such as implying the acquisition of revenues at
any price, overly aggressive sales practices and unfair or
unethical negotiations tactics
Through consistent rewards and encouragement of honesty
By developing clearly stated policies that explicitly describe
honest and dishonest behaviours, in the form of a written code of
conduct, and communicate them to employees.
By requiring employees to report any incident of dishonest, illegal
or unethical acts and discipline employees who knowingly fail to
report violations.
8-63
Forensic Accounting
8-64
End of Lecture
8-65
ACC200 - Accounting
Information Systems
Sem 3 2019
9-2
Data Bases
File # 2
Item B Application
Item D program #2
Item E 9-6
Deficiencies of the File-
Oriented Approach
Files and data elements used in more than one application
must be duplicated, which results in data redundancy
As a result of redundancy, the characteristics of data
elements and their values are likely to be inconsistent
Outputs usually consist of preprogrammed reports instead of
ad-hoc queries provided upon request. This results in
inaccessibility of data
Changes to current file-oriented applications cannot be made
easily, nor can new developments be quickly realized, which
results in inflexibility
It is difficult to represent complex objects using file processing
systems.
9-7
Data Bases
The data base approach views data
as an organizational resource that
should be used by, and managed for,
the entire organization, not just the
originating department or function.
Its focus is data integration and data
sharing.
Integration is achieved by combining
master files into larger pools of data
that can be accessed by many
application programs. 9-8
Data Base Approach
9-14
Logical and Physical
Views of Data
What is the physical view?
It refers to how and where the data
are physically arranged and stored on
disk, tape, CD-ROM, or other
media.
The DBMS controls the data base so
that users can access, query, or
update it without reference to how or
where the data are physically stored.
9-15
Logical and Physical
Views of Data
Logical View User A Logical View User B
Past Due Accounts
Name Balance Days Sales by Region
Jones 2100 50
Perez 1000 60
Data
Operating base
DBMS system 9-16
Logical and Physical
Views of Data
What is program-data independence?
It is the separation of the logical and
physical views of data.
9-17
Identify the three levels of
database architecture.
9-18
Database Management Systems
and Their Architecture
Database contents
Uses of database
Conceptual Desired reports
Level Information to be reviewed
9-19
Database Management Systems
and Their Architecture
eg Debtors reports,Creditors
reports
9-20
Database Management Systems
and Their Architecture
Access methods:
•Sequential
Physical •Indexed-sequential
Level •Direct
9-21
Documenting Data in Data-
Base Systems
The Conceptual Data Model is the logical
grouping of data on entities
Two common Conceptual Data Modeling
techniques are:
The Data Dictionary
Entity-Relationship Diagrams
9-22
Data Dictionary
A data dictionary is a computer file that maintains
descriptive information about the items in a
database It contains information about the structure
of the data base.
For each data element/field stored in the data base,
such as the customer number, there is a
corresponding record in the data dictionary
describing it. Examples of information that might be
stored in a data dictionary are source document(s)
used to create the data item, programs that update
the data item and classification information about
the item’s length and data type 9-23
The Data Dictionary
9-26
Data Dictionary
9-27
Logical Data Structures
9-28
Schemas
1 Conceptual-level schema
2 External-level schema
3 Internal-level schema
9-29
Schemas
Cash receipt
9-33
DDL Language
9-34
Eg - Data Definition
Language (DDL) Command
9-35
DML Language
9-36
Eg- Data Manipulation
Language (DML)
9-37
DQL Language
9-38
Eg - Data Query Language
(DQL) Command
9-39
Query a Relational Data
Base
Operations available to the user of a relational DBMS are:
1-40
RELATIONAL DATABASES
There are two basic ways to design well-
structured relational databases.
Normalization
Semantic data modeling
9-41
RELATIONAL DATABASES
Normalization
Starts with the assumption that everything is
initially stored in one large table (aka
relations).
A set of rules is followed to decompose that
initial table into a set of normalized tables.
Objective is to produce a set of tables in third-
normal form (3NF) because such tables are
free of update, insert, and delete anomalies.
Approach is beyond the scope of this book
but can be found in any database textbook.
9-42
RELATIONAL DATABASES
Semantic data modeling
Database designer uses knowledge about
how business processes typically work and
the information needs associated with
transaction processing to draw a graphical
picture of what should be included in the
database. (ER & REA Diagrams)
The resulting graphic is used to create a set
of relational tables that are in 3NF.
9-43
RELATIONAL DATABASES
The relational data model represents
everything in the database as being stored in
the forms of tables (aka, relations).
9-44
STUDENTS
Last First Phone
Stu dent ID Name Name No.
333-3 3-3333 Relation
Simpson Alice 333-3333
111-11-1111 Sanders Ned 444-4444
123-45-6789 Moore Artie 555-5555
COURSES
Course ID Course Section Day Time
1234 ACCT-3603 1 MWF 8:30
1235 ACCT-3603 2 TR 9:30
1236 MGMT-2103 1 MW 8:30
STUDENT x COURSE
SCID Student ID Course
333333333-1234 333-33-3333 1234
333333333-1236 333-33-3333 1236
111111111-1235 111-11-1111 1235
111111111-1236 111-11-1111 1235 9-45
RELATIONAL DATABASES
This model only describes how the data
appear in the conceptual- and external-level
schemas.
The data are physically stored according to
the description in the internal-level schema.
9-46
STUDENTS Each row is called
Last First Phone a tuple, which
Stu dent ID Name Name No. rhymes with
333-3 3-3333 Simpson Alice 333-3333 “couple.”
111-11-1111 Sanders Ned 444-4444
123-45-6789 Moore Artie 555-5555
COURSES
Course ID Course Section Day Time
1234 ACCT-3603 1 MWF 8:30
1235 ACCT-3603 2 TR 9:30
1236 MGMT-2103 1 MW 8:30
STUDENT x COURSE
SCID
333333333-1234
333333333-1236
111111111-1235
111111111-1236 9-47
Each row
STUDENTS
contains data
Last First Phone
about a specific
Stu dent ID Name Name No.
333-3 3-3333 occurrence of the
Simpson Alice 333-3333
type of entity in
111-11-1111 Sanders Ned 444-4444
the table.
123-45-6789 Moore Artie 555-5555
COURSES
Course ID Course Section Day Time
1234 ACCT-3603 1 MWF 8:30
1235 ACCT-3603 2 TR 9:30
1236 MGMT-2103 1 MW 8:30
STUDENT x COURSE
SCID
333333333-1234
333333333-1236
111111111-1235
111111111-1236 9-48
STUDENTS Each column in a
Last First Phone table contains
Stu dent ID Name Name No. information about
333-3 3-3333 Simpson Alice 333-3333 a specific attribute
111-11-1111 Sanders Ned 444-4444 of the entity.
123-45-6789 Moore Artie 555-5555
COURSES
Course ID Course Section Day Time
1234 ACCT-3603 1 MWF 8:30
1235 ACCT-3603 2 TR 9:30
1236 MGMT-2103 1 MW 8:30
STUDENT x COURSE
SCID
333333333-1234
333333333-1236
111111111-1235
111111111-1236 9-49
STUDENTS
Last First Phone
Stu dent ID Name Name No.
333-3 3-3333 Simpson Alice 333-3333
111-11-1111 Sanders Ned 444-4444
123-45-6789 Moore Artie 555-5555
COURSES
Course ID Course Section Day Time
1234 ACCT-3603 1 MWF 8:30
1235 ACCT-3603 2 TR 9:30
1236 MGMT-2103 1 MW 8:30
STUDENT x COURSE
A primary key is the
SCID attribute or combination of
333333333-1234 attributes that uniquely
333333333-1236 identifies a specific row in
111111111-1235 a table.
111111111-1236 9-50
STUDENTS
Last First Phone
Stu dent ID Name Name No.
333-3 3-3333 Simpson Alice 333-3333
111-11-1111 Sanders Ned 444-4444
123-45-6789 Moore Artie 555-5555
COURSES
Course ID Course Section Day Time
1234 ACCT-3603 1 MWF 8:30
1235 ACCT-3603 2 TR 9:30
1236 MGMT-2103 1 MW 8:30
STUDENT x COURSE
SCID
333333333-1234 In some tables, two or more attributes
333333333-1236 may be joined to form the primary key.
111111111-1235
111111111-1236 9-51
STUDENTS
First Advisor
Student ID Last Name Name Phone No. No.
333-33-3333 Simpson Alice 333-3333 1418
111-11-1111 Sanders Ned 444-4444 1418
123-45-6789 Moore Artie 555-5555 1503
ADVISORS
Advisor No. Last Name First Name Office No.
1418 Howard Glen 420
1419 Melton Amy 316
1503 Zhang Xi 202
1506 Radowski J.D. 203
9-52
STUDENTS
First Advisor
Student ID Last Name Name Phone No. No.
333-33-3333 Simpson Alice 333-3333 1418
111-11-1111 Sanders Ned 444-4444 1418
123-45-6789 Moore Artie 555-5555 1503
ADVISORS
Advisor No. Last Name First Name Office No.
1418 Howard Glen 420
1419 Melton Amy 316
1503 Zhang Xi 202
1506 Radowski J.D. 203
9-53
STUDENTS
First Advisor
Student ID Last Name Name Phone No. No.
333-33-3333 Simpson Alice 333-3333 1418
111-11-1111 Sanders Ned 444-4444 1418
123-45-6789 Moore Artie 555-5555 1503
ADVISORS
Advisor No. Last Name First Name Office No.
1418 Howard Glen 420
1419 Melton Amy 316
1503 Zhang Xi 202
1506 Radowski J.D. 203
9-55
Last First Sectio
Student I D Name Name Phone No. Course No. n Day Time
333-33-3333 Simpson Alice 333-3333 ACCT-3603 1 M 9:00 AM
333-33-3333 Simpson Alice 333-3333 FIN-3213 3 Th 11:00 AM
333-33-3333 Simpson Alice 333-3333 MGMT-3021 11 TH 12:00 PM
111-11-1111 Sanders Ned 444-4444 ACCT-3433 2 T 10:00 AM
111-11-1111 Sanders Ned 444-4444 MGMT-3021 5 W 8:00 AM
111-11-1111 Sanders Ned 444-4444 ANSI-1422 7 F 9:00 AM
123-45-6789 Moore Artie 555-5555 ACCT-3433 2 T 10:00 AM
123-45-6789 Moore Artie 555-5555 FIN-3213 3 Th 11:00 AM
9-56
Last First
Student I D Name Name Phone No. Course No. Sect. Day Time
333-33-3333 Simpson Alice 333-3333 ACCT-3603 1 M 9:00 AM
333-33-3333 Simpson Alice 333-3333 FIN-3213 3 Th 11:00 AM
333-33-3333 Simpson Alice 333-3333 MGMT-3021 11 TH 12:00 PM
111-11-1111 Sanders Ned 444-4444 ACCT-3433 2 T 10:00 AM
111-11-1111 Sanders Ned 444-4444 MGMT-3021 5 W 8:00 AM
111-11-1111 Sanders Ned 444-4444 ANSI-1422 7 F 9:00 AM
123-45-6789 Moore Artie 555-5555 ACCT-3433 2 T 10:00 AM
123-45-6789 Moore Artie 555-5555 FIN-3213 3 Th 11:00 AM
• Suppose Alice Simpson changes her phone number. You need to make
the change in three places. If you fail to change it in all three places or
change it incorrectly in one place, then the records for Alice will be
inconsistent.
• This problem is referred to as an update anomaly.
9-57
Last First
Student I D Name Name Phone No. Course No. Sect. Day Time
333-33-3333 Simpson Alice 333-3333 ACCT-3603 1 M 9:00 AM
333-33-3333 Simpson Alice 333-3333 FIN-3213 3 Th 11:00 AM
333-33-3333 Simpson Alice 333-3333 MGMT-3021 11 TH 12:00 PM
111-11-1111 Sanders Ned 444-4444 ACCT-3433 2 T 10:00 AM
111-11-1111 Sanders Ned 444-4444 MGMT-3021 5 W 8:00 AM
111-11-1111 Sanders Ned 444-4444 ANSI-1422 7 F 9:00 AM
123-45-6789 Moore Artie 555-5555 ACCT-3433 2 T 10:00 AM
123-45-6789 Moore Artie 555-5555 FIN-3213 3 Th 11:00 AM
• What happens if you have a new student to add, but he hasn’t signed
up for any courses yet?
• Or what if there is a new class to add, but there are no students enrolled
in it yet? In either case, the record will be partially blank.
• This problem is referred to as an insert anomaly.
9-58
Last First
Student I D Name Name Phone No. Course No. Sect. Day Time
333-33-3333 Simpson Alice 333-3333 ACCT-3603 1 M 9:00 AM
333-33-3333 Simpson Alice 333-3333 FIN-3213 3 Th 11:00 AM
333-33-3333 Simpson Alice 333-3333 MGMT-3021 11 TH 12:00 PM
111-11-1111 Sanders Ned 444-4444 ACCT-3433 2 T 10:00 AM
111-11-1111 Sanders Ned 444-4444 MGMT-3021 5 W 8:00 AM
111-11-1111 Sanders Ned 444-4444 ANSI-1422 7 F 9:00 AM
123-45-6789 Moore Artie 555-5555 ACCT-3433 2 T 10:00 AM
123-45-6789 Moore Artie 555-5555 FIN-3213 3 Th 11:00 AM
• If Ned withdraws from all his classes and you eliminate all three of his
rows from the table, then you will no longer have a record of Ned. If
Ned is planning to take classes next semester, then you probably didn’t
really want to delete all records of him.
• This problem is referred to as a delete anomaly.
9-59
Record-Key
Record keys: These are data elements within
records that serve as sort keys. e.g., customer-
account number
Two types of keys often used in master and
transaction file records are a primary key and one or
more secondary keys
A Primary key (also called a record key) is the
attribute that uniquely identifies a specific record.
They are usually of numeric or alphanumeric modes,
e.g., customer number
A Secondary key is an attribute other than the
primary key and represents an alternative way to sort
or access records in a file, e.g., customer last name
1-60
Primary & Secondary Keys
1-61
Basic Requirements of the
Relational Data Model
1 Primary keys must be unique – Entity
Integrity Rule
2 Every foreign key must either be null
or have a value corresponding to the
value of a primary key in another
relation- Referential Integrity Rule
3 Each column in a table must describe
a characteristic of the object identified
by the primary key.
9-62
Basic Requirements of the
Relational Data Model
4 Each column in a row must be single-
valued.
5 The value in every row of a specific
column must be of the same data
type.
6 Neither column order nor row order is
significant.
9-63
SCHEMATIC DATA MODELLING :
ENTITY-RELATIONSHIP
DIAGRAMS
Anentity-relationship (E-R)
diagram is a graphical technique for
portraying a database schema.
Showsthe various entities being
modeled and the important relationships
among them.
9-64
SCHEMATIC DATA MODELLING :
ENTITY-RELATIONSHIP
DIAGRAMS
An entity is anything about which the
organization wants to collect and store
information.
Example: Your university collects and stores
information about students, courses, enrollment
activity, etc.
In a relational database, separate tables would
be created to store information about each
distinct entity.
In an object-oriented database, separate classes
would be created for each distinct entity.9-65
ENTITY-RELATIONSHIP
DIAGRAMS
• In an E-R diagram, entities are depicted as rectangles.
• But there are no industry standards for other aspects of
these diagrams.
Enrollment Students
9-66
ENTITY-RELATIONSHIP
DIAGRAMS
Some data modelers, tools, and authors use
diamonds to depict relationships.
Line
Enrollment Items Students
9-67
Possible Entity
Relationships
9-68
The REA Accounting Model
9-69
THE REA DATA MODEL
Can you identify the resources in this diagram?
Customer
Cash Receive
Employee
Accounts Cash
9-70
THE REA DATA MODEL
Can you identify the events in this diagram?
Customer
Cash Receive
Employee
Accounts Cash
9-71
THE REA DATA MODEL
Can you identify the agents in this diagram?
Customer
Cash Receive
Employee
Accounts Cash
9-72
REA: DETERMINE CARDINALITIES
OF RELATIONSHIPS
Sale Customer
9-73
REA: DETERMINE CARDINALITIES
OF RELATIONSHIPS
Sale Customer
9-74
REA: DETERMINE CARDINALITIES
OF RELATIONSHIPS
Sale Customer
Sale Customer
9-76
REA: DETERMINE CARDINALITIES
OF RELATIONSHIPS
Sale Customer
9-77
REA: DETERMINE CARDINALITIES
OF RELATIONSHIPS
Sale Customer
9-78
DATABASE SYSTEMS AND THE
FUTURE OF ACCOUNTING
Database systems may profoundly affect the
fundamental nature of accounting:
May lead to abandonment of double-entry
accounting, because the redundancy of the
double entry is not necessary in computer
data processing.
May also alter the nature of external reporting.
• EXAMPLE: External users could have access to
the company’s database and manipulate the data
to meet their own reporting needs.
9-79
DATABASE SYSTEMS AND THE
FUTURE OF ACCOUNTING
The use of accounting information in decision
making will be enhanced by:
Powerful querying capabilities that
accompany database packages.
The ability to accommodate multiple views of
the same underlying phenomenon.
The ability to integrate financial and
operational data.
9-80
DATABASE SYSTEMS AND THE
FUTURE OF ACCOUNTING
Accountants must become knowledgeable
about databases so they can participate in
developing the AIS of the future.
They must help ensure that adequate
controls are included to safeguard the data
and assure its reliability.
9-81
End of Lecture
ACC200 - Accounting
Information Systems
Sem 3 2019
10-2
Why Update Systems?
10-3
Software Development
Problems
Most software development projects deliver less, cost
more, and take longer than expected.
Standish Group found that:
• 70 percent of software development projects were
late
• 54 percent were over budget
• 66 percent were unsuccessful
• 30 percent were canceled before completion
American Management Systems found that:
• 75 percent of all large systems are not used
• Not used as intended, or
1 0- 4
• Generate meaningless reports or inaccurat e d ata
How to Obtain an AIS
Purchase
Develop in-house
10-5
Purchase Software
10-6
Purchasing Software
and The SDLC
Companies that buy rather than
develop AIS software still go through
the systems development life cycle
(SDLC).
1. Systems analysis
2. Conceptual design
3. Physical design
4. Implementation and conversion
5. Operation and maintenance
10-7
Development by In-House
IS Department
In the past, most organizations had
their information system departments
develop custom software, because
canned software that fit their specific
needs was not available.
Developing custom software is difficult
and error-prone.
It also consumes a great deal of time
and resources.
10-8
Development by In-House
IS Department
Custom software is usually developed and
written in house.
Alternatively, organizations may engage an
outside company to develop a package or
assemble it from their inventory of program
modules.
When contracting with an outside
organization, a company should maintain
control over the development process.
10-9
Development by In-House
IS Department
What guidelines are recommended?
– carefully select a developer
– sign a contract
– plan and monitor each step
– maintain effective communication
– control all costs
10-10
End-User-Developed
Software
End-user computing (EUC) is the hands-on
development, use, and control of computer-
based information systems by users.
When end users began to meet their initial
information needs two things happened:
1) Users realized computers could be used to
meet more and more information needs.
2) Increased access to data created many
new uses and needs for information.
10-11
End-User-Developed
Software
What are some examples of end-user
development uses?
– retrieving information from company
databases to produce simple reports or to
answer one-time queries
– performing “what if” sensitivity or statistical
analyses
– developing applications using prewritten
software (spreadsheet or database system)
10-12
End-User-Developed
Software
Benefits of End-User Computing
User creation, control, and implementation
Systems that meet user needs
Timeliness
Freeing up IS resources
Versatility and ease of use
10-13
End-User-Developed
Software
Risks of End-User Computing
Logic and development errors
Inadequately tested applications
Inefficient systems
Poorly controlled and documented systems
Systems incompatibility
Duplication of systems
Increased costs
10-14
Outsource the System
What is outsourcing?
It is hiring an outside company to
handle all or part of an organization’s
data processing activities.
In a mainframe outsourcing
agreement, the outsourcers buy their
client’s computers and hire all or most
of the client’s employees.
10-15
Outsource the System
In a client/server or PC outsourcing
agreement, an organization
outsources a particular service, a
segment of its business, a particular
function, or PC support.
10-16
Outsource the System
Benefits of Outsourcing
A business solution
Asset utilization
Access to greater expertise and
more advanced technology
Lower costs
Improved development time
Elimination of peaks and valleys usage
Facilitation of downsizing 10-17
Outsource the System
Risks of Outsourcing
Inflexibility
Loss of control
Reduced competitive advantage
Locked-in system
Unfulfilled goals
10-18
Systems Development Life
Cycle (SDLC)
Coming out in
System exam (system
Analysis analysis)
Implementation Physical
& Conversion Design
10-19
SDLC Steps
System Analysis
Information about system needs, costs, and so on are gathered.
Conceptual Design
Gather system/user requirements.
Physical Design
Concepts are translated into detailed specifications.
Implementation and Conversion
New hardware and software are installed and tested.
Employees are hired and trained or existing employees relocated.
Processing procedures are tested and modified.
Standards and controls for the new system are established and
system documentation completed.
Operation and Maintenance
New system is periodically reviewed.
Modifications are made as problems arise or as new needs become
evident. 10-20
Systems Analysis Activities Section B
10-21
People Interacting in SDLC
Management
Accountants
Users
10-22
Planning SDLC
Project Development Plan
Cost/benefit analysis
Developmental and operational requirements (people,
hardware, software, and financial)
Schedule of the activities required to develop and operate
the new application
Master Plan
What the system will consist of
How it will be developed
Who will develop it
How needed resources will be acquired
10-23
Where the AIS is headed
Systems Development
Management Tools
10-24
Planning Technique—PERT
Chart
Program Evaluation and Review Technique
(PERT)
Network of arrows and nodes representing
project activities that require an expenditure of
time and resources and the completion and
initiation of activities
Completion time estimates made
Critical path—the path requiring the greatest
amount of time is determined
10-25
Critical Path Analysis/PERT
Chart
PERT charts
1. ABIJK – 20 days
2. ABFGHJK – 21 days
3. ACDEIJK- 35 days
4. ACDEFGHJK – 41 days (Ans) 10-27
Planning Technique—GANTT Chart
A bar chart with project activities on the left-hand
side and units of time across the top
Graphically shows the entire schedule for a large,
complex project
10-28
Feasibility Analysis
Does it make sense to proceed with new system?
Economic:
Will system benefits justify the time, money, and resources required to
implement it?
Technical:
Can the system be developed and implemented using existing
technology?
Legal:
Does the system comply with all applicable federal and state laws,
administrative agency regulations, and contractual obligations?
Scheduling
Can the system be developed and implemented in the time allotted?
Operational
Does the organization have access to people who can design,
implement, and operate the proposed system? Will people use the
system? 10-29
Capital Budgeting:
Economic Feasibility
Cost-Benefit Analysis Techniques
Benefits and costs are estimated and Payback Period
compared to determine whether the Number of years required for
the net savings to equal the
system is cost beneficial. initial cost of the investment.
Benefits and costs that are not easily Net Present Value (NPV)
quantifiable are estimated and Future benefits are discounted
included. back to the present.
Initial cost is subtracted.
If they cannot be accurately Positive NPV = economically
estimated, they are listed, and their feasible.
likelihood and expected impact on NPV= net cashflow (inflow-
outflow) /(1 + I )
the organization evaluated. Internal Rate of Return (IRR)
The effective interest rate that
results in an NPV of zero.
A project’s IRR is compared
with a minimum acceptable
rate to determine acceptance
or rejection. 10-30
Methods to Develop an AIS
Computer-Aided Software
Engineering (CASE) Tools
10-31
Business Processes
Reengineering
What is business process reengineering
(BPR)?
It is the thorough analysis and complete
redesign of business process and
information systems to achieve
performance improvements.
It is a process that challenges traditional
organizational values and cultures
associated with underperformance.
10-32
Business Processes
Reengineering
BPR reduces a company to its
essential business processes and
focuses on why they are done rather
than on the details of how they are
done.
It completely reshapes organizational
work practices and information flows
to take advantage of technological
advancements.
10-33
Principles of Reengineering
What are the seven principles
of business processing
reengineering?
1) Organize around outcomes,
not tasks.
2) Have output users perform the
process.
3) Have those who produce
information process it.
10-34
Principles of Reengineering
10-35
Prototyping
What is prototyping?
– an approach to systems design in
which a simplified working model of a
system is developed.
A prototype, or “first draft,” is quickly
and inexpensively built and provided
to users for testing.
10-36
Prototyping
10-37
Computer-Aided Software
Engineering (CASE)
CASE is an integrated package of
computer-based tools that automate
important aspects of the software
development process.
CASE tools are used to plan, analyze,
design, program, and maintain an
information system.
CASE software typically has tools for
strategic planning, project and system
management, database design, screen
and report layout, and automatic code
generation.
10-38
Conceptual Systems Design
Systems
analysis
Prepare
Evaluate Prepare
conceptual
design design
systems
alternatives specifications
design report
10-39
Conceptual Systems Design
10-40
Conceptual Systems Design
Prepare design specifications:
Output
How often?
What should reports contain?
What should reports look like?
Should reports be online or hard copy or both?
Data Storage
What data elements must be stored to produce a report?
How they should be stored?
What type of file or database should be used?
Input
Where, when, and how to collect the data?
Processing Procedures and Operations 10-41
Conceptual Systems Design
10-42
Physical Systems Design
Conceptual Physical
systems design systems design
10-43
Physical Systems Design
Output Program
design design
Input Controls
design design
10-44
Physical Systems Design
Output design:
The objective of output design is to
determine the characteristics of
reports, documents, and screen
displays.
Output fits into one of four categories:
1. Scheduled reports
2. Special-purpose analysis
3. Triggered exception reports
4. Demand reports
10-45
Physical Systems Design
10-46
Physical Systems Design
Input design:
When evaluating input design, the
design team must identify the
different types of data input and
optimal input method.
What are the two principal types of
data input?
1. Forms
2. Computer screens
10-47
Physical Systems Design
10-48
Physical Systems Design
Procedures design should answer the
who, what, where, and how questions
related to all AIS activities.
What should procedures cover?
– input preparation
– transaction processing
– error detection and corrections
– control
10-49
Physical Systems Design
Control design:
What are some control design
considerations?
– validity
– authorization
– accuracy
– access
– numerical control
– audit trail
10-50
Physical Systems Design
10-51
Systems Implementation
Physical Implementation
systems design and conversion
10-52
Systems Implementation
Implementation planning
Implementation planning:
An implementation plan consists of
implementation tasks, expected
completion dates, cost estimates,
and the person or persons
responsible for each task.
Planning should include
adjustments to the company’s
organizational structure.
10-54
Systems Implementation
10-55
Systems Implementation
10-56
Systems Implementation
Complete documentation:
Three types of documentation must
be prepared for new systems.
1. Development documentation
2. Operations documentation
3. User documentation
10-58
Types of Documentation
Development Documentation
A system description; copies of output, input, and file
and database layouts; program flowcharts; test results;
and user acceptance forms
Operations Documentation
Includes operating schedules; files and databases
accessed; and equipment, security, and file-retention
requirements
User Documentation
Teaches users how to operate the AIS; it includes a
procedures manual and training materials
10-59
Systems Implementation
Test system:
There are three common forms of
testing.
1. Walk-through
2. Processing of test transactions
3. Acceptance tests
10-60
Types of System Testing
Walk-Through
Step-by-step reviews of procedures or program logic to find
incorrect logic, errors, omissions, or other problems
Processing Test Data
Using both valid transactions and all possible error
conditions
Acceptance Tests
Real transactions (live data) and files rather than
hypothetical ones, users develop the acceptance criteria and
make the final decision whether to accept the AIS
10-61
User Acceptance Testing
Once the hardware and software has been installed it is possible for
the user to undertake formal acceptance of the system. The user
will undertake tests to ensure that:
The software performs as stated in the requirement specification
10-62
Systems Implementation
Conversion:
There are four conversion
approaches.
1. Direct conversion
2. Parallel conversion
3. Phase-in conversion
4. Pilot conversion
10-63
Types of Conversions
Direct
Terminates the old AIS when the new one is introduced
Parallel
Operates the old and new systems simultaneously for a
period
Phase-in/Modular
Gradually replaces elements of the old AIS with the new one
Pilot
Implements a system in one part of the organization, such
as a branch location
Localizes conversion problems and allows training in a live
environment 10-64
Operation and Maintenance
10-65
Post Implementation Review
A post implementation review is held at a certain point after the
system has gone live. In this review the users and developers
have the opportunity to establish:
Does the system meets the intended performance and
functional requirements established at the start of the
project.
Does the system meets the requirements of the users. This
will include both functional requirements and technical
objectives.
Consider how the project was managed and lessons learnt
will be fed back into the project and systems development
processes.
Conclude with a report that summarises the finding1s0-6a6nd
makes recommendations
Operation and Maintenance
10-67
Operation and Maintenance
10-68
Systems Maintenance
10-70
End of Lecture
ACC200 - Accounting
Information Systems
Sem 3 2019
11-2
ERP Overview
11-5
5
Functional Area Information
Systems
6
Functional Area Information
Systems
7
Functional Area Information
Systems
8
Functional Area Information
Systems
9
Customer Relationship
Management
Customer Relationship Management (CRM) helps a company
streamline interactions with customers and make them
consistent
Goal is to provide a “single face to the customer”
Any employee in contact with a customer should have
access to all information on past interactions
Information about a customer should reside in the ERP
system, not with the employee
CRM also provides a company with tools to analyze the vast
quantities of sales data available from the ERP system
10
Core CRM Activities
One-to-One Marketing:
Customers are categorized and products, promotions, and pricing
are tailored accordingly.
Sales may be increased by cross-selling and upselling
Sales Force Automation (SFA):
New customers are automatically routed to the appropriate sales
representative
Customer needs are forecasted based on the customer’s
history and transactions
Sales Campaign Management:
Helps a company organize a marketing campaign and compile its
results.
Core CRM Activities
Marketing Encyclopedias:
Database of promotional literature
Material can be routed to sales
representatives or customers as needed
Accounting
Function
Purchasing
Function
Production
Customer Order Process
Function
Logistics
Process View of Business
11-14
Function
Integration of Business
Functions
Sharing data efficiently and effectively
within and between functional areas
leads to more efficient business
processes
Information systems that share data
between functional areas are called
Integrated Information Systems
11-15
ERP System Business Enterprise
Data Warehouse
ERP System
On-Line Analytical Processing Bolt-On Applications
(OLAP) (Industry Specific Functions)
Customers Suppliers
Core Functions [On-Line Transaction Processing(OLTP)]
Sales
Business Shop Floor
& Logistics
Planning Control
Distribution
Operational Database
Customers, Production,
Vendor, Inventory, etc.
Two Main ERP Applications
Core applications
a.k.a. Online Transaction Processing (OLTP)
transaction processing systems
support the day-to-day operational activities of
the business
support mission-critical tasks through simple
queries of operational databases
include Sales and Distribution, Business
Planning, Production Planning, Shop Floor
Control, and Logistics modules
17
Two Main ERP Applications
Business analysis applications
a.k.a. Online Analytical Processing (OLAP)
decision support tool for management-critical tasks
through analytical investigation of complex data
associations
supplies management with “real-time” information and
permits timely decisions to improve performance and
achieve competitive advantage
includes decision support, modeling, information
retrieval, ad-hoc reporting/analysis, and what-if
analysis
18
Transaction Processing
Systems (TPS)
Transaction processing systems (TPS) are the basic business systems that
serve the operational level of the organization. A transaction processing
system is a computerized system that performs and records the dai1ly1-r1o9utine
transactions necessary to conduct business.
Management Information
Systems (MIS)
11-20
Decision Support
Systems(DSS)
Senior managers use executive support systems (ESS) to help them make
decisions. ESS serve the strategic level of the organization. They address
non-routine decisions requiring judgment, evaluation, and insight because
there is no agreed-on procedure for arriving at a solution. In what business
should we be? What are the competitors doing? What new acquisitions would
protect us from cyclical business swings? Which units should we sell to raise
cash for acquisitions? 11-22
Expert Systems
11-27
ERP - Bolt-On Software
11-28
Why Use Bolt-On Software?
Presentation
Application
Scalability
Database
11-30
Goodness of Fit
Networks
File Server
A network is
a group of Node
computers Node
connected LAN
together that
allow users
to share
information
and
equipment
Node Printer Server
Node
11-33 Printer
Local Area Networks
(LAN)
A grouping of computers located close together (on the
same floor or in the same building) linked together to share
data and hardware
The physical connection of workstations to the LAN is
achieved through a network interface card (NIC) which fits
into a PC’s expansion slot and contains the circuitry necessary
for inter-node communications.
A server is used to store the network operating system,
application programs, and data to be shared.
11-34
Wide Are Network (WAN)
A Wide Area Network, or WAN, is a collection of computers and
other devices, as for a LAN, but one that takes the local
organisation beyond the narrow geographical confines of a LAN
into a wider system. In practice a WAN is typically made up by
creating connections between a number of local LANs.
11-35
Computer Networks
11-36
Client/Server Networks
11-37
Client-Server Topology
Client Client
Data Manipulation Data Manipulation
Capabilities Capabilities Server
Record
Searching
Capabilities
Client
Data Manipulation
Capabilities
Common
Files
Client Client
Data Manipulation
Data Manipulation Capabilities 11-38
Capabilities
Computer Hardware and
Software
Sharing and managing important corporate data became an
even more important issue as PCs became more common
Client-server systems were developed to manage data
sharing. A central computer (server) managed the storage
and sharing of common data
Client-server systems provided scalability. The capacity of
the network could be increased inexpensively by adding a new
server computer to the existing network
Mainframe systems were generally not scalable. Increasing
capacity meant buying a new system
Client-server systems are much more cost effective over the
11-39
long run
Computer Hardware and
Software
A common database is a key component of an ERP system
Relational database systems were introduced in the 1970s
These systems allowed for more efficient storage and
retrieval of data
To support ERP systems, relational databases needed to be
able to find specific data quickly from a large, complex
database
By the 1990s, the hardware, networks and database software
were in place to make large scale ERP systems feasible
11-40
Technology Driven Process
Improvements
4. Cloud Computing
11-43
Electronic Commerce
Background
E-commerce is the conduct of business over the
internet
Most business growth on the Internet has been
business-to-business (B2B) e-commerce, rather
than business-to-consumer (B2C) e-commerce
B2B sales are expected to approach $1 Trillion
in Europe by 2006
B2B e-commerce is transforming the way
companies work with each other—especially for
commodity products 11-44
Categories of E-Business
B2C • Organization-individual
•Smaller dollar value
•One-time or infrequent transactions
•Relatively simple
B2B •Interorganizational
B2G •Larger dollar value
B2E •Established, on-going relationships
•Extension of credit by seller to customer
•More complex
11-45
Information Flows in
Electronic Commerce
1. Inquiries
Buyer Seller
2. Responses
3. Orders
4. Acknowledgment
5. Billing
6. Remittance data
Explanations:
EDI = Steps 1-6 7. Payments
EFT = Step 7
FEDI = Steps 1-7
11-46
E-Business Effects on
Business Processes
Electronic Data Interchange (EDI):
Standard protocol, available since the
1970s, for electronically transferring
information between organizations and
across business processes.
EDI:
Improves accuracy
Cuts costs
11-47
Recent EDI Facilitators
11-48
Recent EDI Facilitators
ebXML:
ebXML stands for Electronic Business
Extensible Markup Language. It is a global
standard for electronic business that enables
anyone, anywhere to do business
transactions with anyone over the Internet.
Defines standards for coding common
business documents.
Eliminates need for complex software to
translate documents created by different
11-49
companies.
Integrated Electronic Data
Interchange (EDI)
Reaping the full benefits of EDI
requires that it be fully integrated with
the company’s AIS.
EDI
Company
Suppliers
Purchase orders AIS
EDI
Customers Customer orders
The trouble with EDI is that it is very expensive and originally it was created for the mainframe 11-50
world. Now ebXML is replacing EDI.
Financial Electronic Data
Interchange (FEDI)
The use of EDI to exchange information is
only part of the buyer-seller relationship in
business-to-business electronic commerce.
Electronic funds transfer (EFT) refers to
making cash payments electronically, rather
than by check.
EFT is usually accomplished through the
banking system’s Automated Clearing House
(ACH) network.
11-51
Financial Electronic Data
Interchange (FEDI)
An ACH credit is an instruction to your bank
to transfer funds from your account to
another account.
An ACH debit is an instruction to your bank to
transfer funds from another account into
yours.
11-52
Financial Electronic Data
Interchange (FEDI)
Company A/Customer Company B/Supplier
Remittance data
and payment
instruction
Company A’s Company B’s
bank bank
Remittance data
and funds
11-53
Why is FinTech important?
Financial technology (FinTech or fintech) is the new technology and
innovation that aims to compete with traditional financial methods in
the delivery of financial services in:
• Borrowing
• Investing
• Foreign currency
• Money transfer
• Credit reports
• Fraud protection
• Payments/e-commerce
• Financial advice
• Insurance
11-54
Why is FinTech important?
11-57
Cloud Computing
Increased trend for data processing capabilities to be
provided as a service via the Internet.
Cloud => Internet
11-58
Cloud Computing
11-59
Block Chain Accounting
Modern financial accounting is based on a double entry
system. In a traditional database, a client can perform four
functions on data: Create, Read, Update, and Delete
11-63
Implications of blockchain
for accountants
Blockchain has the potential to enhance the accounting
profession by:
• Reducing the costs of maintaining and reconciling
ledgers, and providing absolute certainty over the
ownership and history of assets.
• Can help accountants gain clarity over the available
resources and obligations of their organisations
• Free up resources to concentrate on planning and
valuation, rather than recordkeeping.
11-64
Implications of blockchain
for accountants
• Will lead to more and more transactional-level
accounting being done – but not by accountants.
Instead, successful accountants will be those that
work on assessing the economic reality and valuation.
For example, blockchain might make the existence of
a debtor certain, but its recoverable value and
economic worth are still debateable. And an asset’s
ownership might be verifiable by blockchain records,
but its condition, location and true worth will still
need to be assured.
11-65
Implications of blockchain
for accountants
11-66
Implications of blockchain
for auditors
• A blockchain solution, when combined with appropriate data
analytics, could help with the transactional level assertions
involved in an audit, and the auditor’s skills would be better
spent considering higher-level questions. For example, auditing
is not just checking the detail of whom a transaction was
between and the monetary amount, but also how it is recorded
and classified. If a transaction credits cash, is this outflow due to
cost of sales or expenses, or is it paying a creditor, or creating an
asset?
11-67
Radio Frequency Identification