SYSTEMS ANALYSIS Pertemuan 7 s.d 12 Matakuliah

advertisement
Matakuliah
Tahun
: A0554/Analisa dan Perancangan Sistem Informasi Akuntansi
: 2006
SYSTEMS ANALYSIS
Pertemuan 7 s.d 12
1
Models and Techniques
• Systems analysis
– Workflow table
– Activity diagram
– Use case diagram
– Use case description
– Risks analysis
– Types of internal control
2
The UML Activity Diagram
The UML activity diagram plays the role of a
‘map’ in understanding business process
by showing the sequence of activities in
the process.
3
Overview & Detailed Activity
Diagrams
• The overview diagram presents a high
level view of the business process by
documenting the key events, the
sequence of these events & the
information flows among these events.
• The detailed diagram is similar to a map
of a city or town. It provides a more
detailed representation of the activities
associated with one or two events shown
on the overview diagram.
4
Preparing Overview Activity
Diagrams
Preliminary steps:
• Read the narrative & identify key events
• Annotate the narrative to clearly show event
boundaries & event names
Steps for preparing the activity diagram:
• Represent agents participating in the business
process using swimlanes
• Diagram each event. Show the sequence of these
events
• Draw documents created & used in the business
process draw tables (files) created & used in the
business process
5
Preparing Detailed Activity
Diagrams
Steps for preparing overview activity diagrams:
• Annotate narrative to show activities
• Prepare a workflow table
• Identify necessary detailed diagrams
• For each detailed diagram, perform the following
substeps:
– Set up swimlanes for the agents participating in the
event or events represent in the detailed diagram
– Add a rounded rectangle for each activity in the
events) being documented in that detailed diagram
– Use continuous lines to show the sequence of the
activities
6
– Set up any documents created or used by the
activities in that diagram
– Use dotted lines to connect activities &
documents
– Document any tables created, modified or
used by the activities in the diagram in the
computer column
– Use dotted lines to connect activities & tables
7
WORKFLOW TABLE
• The actors performing specific activities
are listed in the column on the left.
• The corresponding activities are listed on
the right. The activities have been listed
using verbs in active voice (e.g., arrives,
records, etc).
8
USE CASE DIAGRAM
A use case is a sequence of steps that occur
when an ‘actor’ is interacting with the
system for a particular purpose.
Use case diagram is A list of use cases that
occur in an application and that indicate
the actor responsible for each use case.
9
USE CASE DESCRIPTION
• A description of a use case, typically
represented as a sequence of numbered
steps.
• Use case descriptions may also be used
for documenting internal control.
10
RISKS ANALYSIS
• Risk assessment is the identification &
analysis of risks that interfere with the
accomplishment of internal control
objectives.
• Control activities are the policies &
procedures developed by the organization
to address the risks to the achievement of
the organization’s objectives.
11
RISK TYPE
• Execution risks
• Information system risks
12
EXECUTION RISK
Execution risks : Risks that transaction
will not be executed properly.
Five steps are useful in understanding
& assessing execution risk:
• Achieve an understanding of the
organization’s processes.
• Identify the goods or services
provided & cash received that are at
risk.
13
• Restate each generic risk to describe the
execution risk more precisely for the
particular process under study. Exclude
any risks that are irrelevant or obviously
immaterial.
• Assess the significance of the remaining
risks.
• For significant risks, identify factors that
contribute to the risk. The events in the
process can be used to systematically
identify these factors.
14
INFORMATION SYSTEM RISKS
IS Risks : Risks of improper recording,
updating, or reporting of data in an
information system.
2 categories of IS Risks :
- Recording risks
- Update risks
15
RECORDING RISKS
Recording risks : Risks that event information is
not captured accurately in an organization’s IS.
3 steps are useful in identifying recording risks :
• Achieve an understanding of the process under
study. Identify the events.
• Review the events, and identify instances where
data are recorded in a source document or in a
transaction file.
• For each event where data are recorded in a
source document or transaction record, consider
the preceding generic recording risks.
16
UPDATE RISKS
Update risks : Risks that summary fields in
master records are not properly updated.
3 steps are useful in identifying update risks:
• Identify recording risks.
• Identify the events that include update
activity. Identify the summary fields in
master files that are updated.
• For each event where a master file is
updated, consider the preceding generic
update risks.
17
TYPES OF INTERNAL CONTROL
Types of control activities:
• Workflow controls
• Input controls
• General controls
• Performance reviews
18
WORKFLOW CONTROLS
• Controls that help manage a process at it
moves from one event to the next.
• Include : segregation of duties, required
sequence of events, prenumbered
documents, reconciliation of records with
assets, and others.
19
INPUT CONTROL
• Used to control the input of data into
computer systems.
• Include : drop down or look up menus,
format checks to limit data, validation
rules, confirmation of data, and others.
20
GENERAL CONTROLS
• Broader controls that apply to multiple
processes.
• Include : IS planning, organizing the IT
function, and others.
21
PERFORMANCE REVIEW
• Activities involving analysis of
performance including the comparison of
actual results with budgets, forecasts,
standards and prior period data.
22
Download