Documente Academic
Documente Profesional
Documente Cultură
REV 02
REV 02
REV 02
REV 02
REV 02
REV 02
REV 02
REV 02
n rgi Ma
tr o ppuS s e ti v t c A i i
Purchasing / Procurement Service Inbound Operati Outboun Marketi logistics Repair d ng & ons logistics Sales Maintenan Receiving
& Storing Materials Manufactu Distributio Advertisin ring Repackagi n Shipping g Selling ng ce
Ma rg in
Primary Activities
DDW 2283 ACCOUNTING INFORMATION SYSTEM 9
REV 02
REV 02
AIS can add value to an organization by providing accurate and timely information so that the five primary value chain activities can be performed more effectively and efficiently. A well designed AIS can do this by:
1. Improving quality and reducing the costs of products or services 2. Improving efficiency of operations by providing more timely information. 3. Improved decision making by providing accurate information in a timely manner. 4. Sharing of knowledge, perhaps thereby improving operations and even providing a competitive advantage.
DDW 2283 ACCOUNTING INFORMATION SYSTEM 11
REV 02
12
REV 02
REV 02
REV 02
15
REV 02
REV 02
REV 02
18
REV 02
19
REV 02
REV 02
21
REV 02
22
REV 02
THREATS 1. Nature and political disaster 2. Software errors and equipment malfunctions 3. Unintentional acts
4. Intentional acts
EXAMPLES 1. Fire, floods, earthquake and wars. 2. Hardware failures, software errors or bug, power outages and fluctuation. 3. Innocent errors or omissions, misplace data. 4. sabotage, computer fraud and crime.
23
REV 02
REV 02
25
REV 02
Control Activities Generally, control procedures fall into one of the following five categories:
1. Proper authorization of transaction and activities 2. Segregation of duties 3. Design and use of adequate documents and records 4. Adequate safeguards of assets and records 5. Independent checks on performance
DDW 2283 ACCOUNTING INFORMATION SYSTEM
REV 02
27
REV 02
REV 02
REV 02
30
REV 02
Controls Related to More Than One Reliability Principles 1. Strategic Planning and Budgeting 2. Developing a System Reliability Plan 3. Documentation
31
REV 02
REV 02
Availability
To ensure information system availability, organizations need to minimize system downtime and develop disaster recovery plans. Minimizing system downtime among the methods are policies and procedures, appropriate insurance, preventive maintenance, uninterrupted power system and fault tolerance.
33
REV 02
Availability
Disaster recovery plan its objectives include:
1. Minimize the extent of disruption, damage and loss 2. Temporarily establish an alternative means of processing information 3. Resume normal operations as soon as possible 4. Train and familiarize personnel with emergency2283 ACCOUNTING INFORMATION SYSTEM DDW operations
34
REV 02
Availability
A sound disaster recovery plan should contain the following elements: 1. Priorities for recovery process 2. Insurance 3. Backup data and program files 4. Specific assignments 5. Backup computer and telecommunications facilities 6. Periodic testing and revision 7. Complete documentation
DDW 2283 ACCOUNTING INFORMATION SYSTEM 35
REV 02
36
REV 02
37
REV 02
Fraud Process
Common & effective way to hide a theft 1. Charge stolen item to an expense. 2. Lapping scheme. 3. Kiting scheme. Why Fraud Occurs? 1. Pressure 2. Opportunities 3. Rationalization
DDW 2283 ACCOUNTING INFORMATION SYSTEM 38
REV 02
Computer Fraud
Any illegal act for which knowledge of computer technology is essential for its perpetration, investigation, or prosecution. Computer fraud includes the following: Unauthorized theft, use, access, modification, copying, and destruction of software or data. Theft of money by altering computer records or the theft of computer time
39
REV 02
Computer Fraud
Theft or destruction of computer hardware. Use or the conspiracy to use computer resources to commit a felony. Intent to illegally obtain information or tangible property through the use of computers.
40
REV 02
Computer Fraud
Computer fraud classifications:
Input The simplest and common way to commit a fraud is to alter computer input. Processor Computer fraud can be committed through unauthorized system use, including the theft of computer time and services. Computer Instructions Computer fraud can be accomplished by tampering with the software that processes company data.
DDW 2283 ACCOUNTING INFORMATION SYSTEM 41
REV 02
Computer Fraud
Data Computer fraud can be perpetrated by altering or damaging a companys data files or by copying, using or searching them without authorization. Output Computer fraud can be carried out by stealing or misusing system output.
DDW 2283 ACCOUNTING INFORMATION SYSTEM 42
REV 02
Computer Fraud
Preventing and Detecting Computer Fraud 1. Make fraud less likely to occur. 2. Increase the difficulty of committing fraud. 3. Improve detection methods. 4. Reduce fraud losses. 5. Prosecute and Incarcerate fraud perpetrators.
43
REV 02
Data Flow Diagrams (DFD) - describes the flow of data within an organization - composed of 4 basic elements 1. Data sources and destinations 2. Data flows 3. Transformation processes 4. Data stores
DDW 2283 ACCOUNTING INFORMATION SYSTEM 44
REV 02
REV 02
46
REV 02
REV 02
Flowcharts
Flowchart is an analytical technique used to describe some aspect of an information system in a clear, concise, and logical manner. Flowchart symbols: 1. Input/output symbols devices or media that provide input to or record output from processing operations
48
REV 02
Flowcharts
2. Processing symbols either show what type of device is used to process data or indicate when processing is completed manually. 3. Storage symbols represent the device used to store data that the system is not currently using 4. Flow and miscellaneous symbols the flow of data and goods
49
REV 02
Flowcharts
Document Flowchart: Illustrates the flow of documents and information among areas of responsibility within the organization. Flowcharts that describe and evaluate internal controls are often referred to as internal control flowcharts.
50
REV 02
51
REV 02
REV 02
53
REV 02
Objectives
Sales order entry primary objectives are to accurately and efficiently process customer orders, ensure that company gets paid for all credit sales and all sales are legitimate, and to minimize the loss of revenue arising from poor inventory management. Shipping primary objectives are to fill customer orders efficiently and accurately and to safeguard inventory.
DDW 2283 ACCOUNTING INFORMATION SYSTEM 54
REV 02
Objectives
Billing and Accounts receivable primary objectives are to ensure that customers are billed for all sales, invoices are accurate, and customer accounts are accurately maintained Cash collection primary objective is to safeguard customer remittances
55
REV 02
REV 02
Shipping
THREAT Shipping errors CONTROL ROCEDURES Reconciliation of sales order with picking ticket and packing slip; bar code scanner Data entry application controls
Theft of inventory
57
REV 02
THREAT Failure to bill customers Billing errors Posting errors in updating accounts receivable
CONTROL ROCEDURES Separation of shipping and billing functions Data entry edit controls; price list Reconciliation of subsidiary accounts receivable ledger with general ledger; monthly statements to customers
58
REV 02
Cash Collections
THREAT Theft of cash CONTROL ROCEDURES Segregation of duties; minimization of cash handling; lockbox arrangement; prompt endorsement and deposit of all receipts; periodic reconciliation of bank statement with records by someone not involved in cash receipts processing
59
REV 02
Poor performance
60
REV 02
REV 02
62
REV 02
REV 02
Objectives
Order goods primary object is to minimize costs associated with maintaining an adequate supply of all needed materials. Receive and store goods primary objectives are to verify the receipt of ordered inventory and to safeguard it against loss or theft. Approve and pay vendor invoices objective is to ensure that the company pays only for goods or services that were ordered and received and to safeguard cash.
DDW 2283 ACCOUNTING INFORMATION SYSTEM 64
REV 02
Order Goods
THREAT Preventing stock outs and/or excess inventory CONTROL ROCEDURES Inventory control systems; perpetual inventory records
Requesting unnecessary items Accurate perpetual inventory records Purchasing goods at inflated prices Purchasing goods of inferior quality Solicit competitive bids; use of approved suppliers Use of approved vendors; approval purchase orders
65
REV 02
Order Goods
THREAT Purchasing form unauthorized suppliers Kickbacks CONTROL ROCEDURES Approval of purchase orders; restrict access to supplier master files Policies; require purchasing employees to disclose financial interests in suppliers; vendor audits
66
REV 02
Stealing inventory
67
REV 02
Failing to take available purchase Proper filing; cash flow budgets discounts
68
REV 02
Recording and posting errors in Various data entry and accounts payable processing edit controls Misappropriating cash, checks or Restrict access to blank checks; EFTs check signing machine
69
REV 02
REV 02
REV 02
1. 2. 3. 4. 5.
REV 02
Feasibility Analysis
It is prepared during systems analysis and updated as necessary. 5 important aspects of feasibility to be considered: Technical Operational Legal Scheduling Economic
DDW 2283 ACCOUNTING INFORMATION SYSTEM 73
REV 02
Systems Analysis
Five steps in analysis phase: 1. Initial investigation conducted to screen projects 2. Systems survey extensive study of the current AIS 3. Feasibility study conducted to determine projects viability 4. Information needs and system requirements 5. System analysis report
DDW 2283 ACCOUNTING INFORMATION SYSTEM 74
REV 02
INTRODUCTION TO E-BUSINESS
E-Business Models 1. Business to consumer (B2C) 2. Business to business (B2B) 3. Business to government (B2G) 4. Business to education (B2E)
75
REV 02
76
REV 02
Outbound Logistics
77
REV 02
78
REV 02
79
REV 02
80
REV 02
REV 02
REV 02
REV 02
84