13 A S :

advertisement
62006_JonesRama_CH13.qxd
5/23/2002
13
12:55 PM
Page 635
ACCOUNTING SYSTEMS:
MANAGING THE
IT ENVIRONMENT
LEARNING OBJECTIVES
After completing this chapter, you should understand:
U1. IT architectures for multi-user systems.
U2. General controls.
U3. Information systems planning—IT strategy, IT
architecture, IT function, and systems development process.
U4. The organization of the IT function—location of
the IT function, segregation of duties for IT
functions, and personnel controls.
U5. Systems development methodology, program
development and testing, and documentation.
U6. Accounting systems—techniques for controlling access and ensuring the continuity of IT
operations.
After completing this chapter, you should be able to:
P1. Identify key components of an IS plan.
P2. Develop an access control matrix for an application.
Chapter 12 presented a framework for studying an AIS in the larger context of
business strategy and the IT environment. As noted in Chapter 12, this broader
framework can help you better understand and apply AIS knowledge in the current
professional environment. Our focus in Chapters 1–11 was on two of the boxes in
Figure 13.1—business process and AIS applications—and the related risks and controls. Two additional components are shown in Figure 13.1—business strategy and
information technology (IT) environment.
Figure 13.1
A Framework for
Studying an AIS
Business Strategy
Business Process
IT Environment
AIS Applications
In Chapter 12, we defined the IT environment in terms of the four elements in
Exhibit 13.1.
635
62006_JonesRama_CH13.qxd
5/23/2002
12:55 PM
Page 639
Accounting Systems: Managing the IT Environment
Figure 13.2
IT Architecture
Chapter 13
639
A. Centralized
B. Centralized with
Distributed Data Entry
Computer
Computer
User
User
T or TE*
T or TE
User
User
D. Distributed
C. Decentralized
Computer
Computer
User
User
Computer
Computer
Computer
User
User
*T ⫽ dumb terminal; TE ⫽ computer using terminal emulation software
Focus on Problem Solving 13.a
IT Architectures (U1)
Required: Consider the alternative processes for registering for classes. Indicate which of the four
IT configurations apply to the following examples.
1. The student visits the chairperson of each department to register for just the classes taught in that
department. The chairperson registers the student for classes taught in that department using the
department’s computer.
2. The student must go the registrar’s office in the administration building. A clerk in the registrar’s
office registers students. Chairpersons or faculty are unable to do any registering for students.
3. The student visits the chairperson of the department for his or her major. The chairperson uses a
personal computer to review the graduation requirements stored in a spreadsheet. The computer
is connected to the mainframe enabling the chairperson to register the student in all of the classes
that the student will take.
4. The chairperson uses a terminal connected to the mainframe to register the student.
The solution to this Focus on Problem Solving box appears on page 661. Check your answer and make sure you understand
the solution before reading further.
It should be noted that a single company may use all four of the configurations
for different functions. For example, payroll duties may be centralized to limit access
62006_JonesRama_CH13.qxd
5/23/2002
12:55 PM
Page 647
Accounting Systems: Managing the IT Environment
Chapter 13
647
Locate the IT Function Appropriately
The location of the IT function should be appropriate, given business goals and needs.
If information systems are of strategic importance to an organization’s current or future operations, the organization should have a separate IT function. The IT function
should not be under any user department (e.g., marketing manager or controller) to
ensure that the IT staff are independent and support the needs of all user groups.
Furthermore, the IT function should be located high in the organizational hierarchy. Figure 13.3 shows a typical organization for the IT function with traditional centralized systems. As seen from this figure, the IT function is under the
authority of a vice president of Computer Services. Another possible title is chief
information officer (CIO). The VP of Computer Services could report to the CEO
along with the other key players (e.g., VP of Production and VP of Marketing).
If information systems are not that crucial to an organization’s operations, the
function could be under a user group. The organization may not even have an IT
function; the responsibilities may be distributed to user groups. Or the IT function
may be under the control of a single user group such as the controller’s staff.
Segregate Incompatible Functions
Review Figure 13.3 to see the way in which responsibilities are allocated to various groups under the VP of Computer Services. The actual job titles and exact organization will vary from organization to organization.
Figure 13.3
Organization of IT Function for Centralized Systems
Vice President
Computer Services
Manager
Technical Services
Manager
Systems Development
Systems
Analysis
Systems
Design
Programming
Networks &
Telecommunications
Data Control
Database
Administration
Manager
Data Processing
Data Entry
Computer
Operations
Data
Library
Quality Control
The purpose of our discussion is to help you understand the basic principles
used to segregate duties in the IT function. We now identify four opportunities for
implementing the segregation of duties involving users, computer operations, systems development, and systems maintenance.
Separating Users from Computer Operations. Recall that the idea behind
segregation of duties is to separate responsibilities for (1) authorization, (2) execution, (3) recording, and (4) custody of assets. In a computerized AIS, the IT function should only be responsible for the third step. User departments are responsible
62006_JonesRama_CH13.qxd
5/23/2002
654
Exhibit 13.4
Concluded
12:55 PM
Part IV
Page 654
Managing Information Technology and Systems Development
Prepare tax returns (E3)
The information is entered9 into Mega-Tax, a tax software product used at the
company. The recording and storage of tax information is handled by the MegaTax software and is separate from the rest of the revenue cycle. The company is
not planning to integrate the tax preparation software with the rest of the revenue
cycle. Thus, in this case, you can disregard the recording, updating, and processing
of detailed tax return information.
Bill client (E4)
As soon as the tax return is finished, the accountant gives10 the Service Request
Form, client information sheet, and tax return to the secretary. The secretary immediately enters11 the services provided into the computer system. If the client is
new, a client record is first set12 up in the computer system. As each service code
is entered, the computer looks13 up the description and price. The system computes14 and displays the total amount at the bottom. A record is created15 in the
Invoice Table, and the status is set to “open.” The services provided are recorded16
in the Invoice_Detail Table. The secretary then prints17 the invoice. The secretary
selects18 the “Post the invoice to master tables” option. The customer’s balance is
then increased.19 The Year-to-Date_Revenues amount for each service provided is
also updated.20 She then notifies21 the client that the return is ready.
Collect cash (E5)
When the customer arrives to pick up the returns, he gives22 a check to the secretary. The secretary enters23 the Invoice#, Check#, Date, and Amount_Paid. The secretary selects24 the “Post the invoice to master tables” option. The computer then
reduces25 the customer balance to reflect the amount of the payment. The status of
the invoice is set26 to “closed.”
Figure 13.4
Revenue Cycle Menu
for H & J Tax
Preparation Service
Revenue Cycle Menu
A. Maintain
1. Clients
2. Services
B. Record Event
1. Prepare invoice
2. Record payment
C. Process Data
D. Display/Print Reports
Event Reports
1. Invoice
2. Services provided
3. Services provided by Service#
4. Services provided by Service# (Summary)
Reference Lists
5. Services reference list
Summary and Detailed Status Reports
6. Detailed client status report
7. Summary client status report
8. Single client status report
E. Exit
62006_JonesRama_CH13.qxd
5/23/2002
12:55 PM
Page 657
Accounting Systems: Managing the IT Environment
Chapter 13
657
Figure 13.5
Security Screen from
Great Plains
Dynamics
Figure 13.6 shows the screen used in Peachtree Complete Accounting to limit
access. As the screen indicates, the user has full access for maintaining customers
in the sales module. The user can also enter transactions (Tasks) and read reports.
Figure 13.6
Peachtree Complete
Accounting Screen
for Password
Protection
Limiting access to computers and computer data is one way to avoid computer
downtime that could result from errors by unqualified users and deliberate fraud
or destruction of data. However, the integrity of the data could also be damaged
by hard disk failures and accidents. The next section discusses techniques for minimizing breaks in the continuity of IT operations.
Ensure Continuity of Service
During operation of an AIS, ensuring continuous service is an important objective.
The unavailability of the system for even a short time may cause significant losses
62006_JonesRama_CH13.qxd
5/23/2002
12:55 PM
Page 657
Accounting Systems: Managing the IT Environment
Chapter 13
657
Figure 13.5
Security Screen from
Great Plains
Dynamics
Figure 13.6 shows the screen used in Peachtree Complete Accounting to limit
access. As the screen indicates, the user has full access for maintaining customers
in the sales module. The user can also enter transactions (Tasks) and read reports.
Figure 13.6
Peachtree Complete
Accounting Screen
for Password
Protection
Limiting access to computers and computer data is one way to avoid computer
downtime that could result from errors by unqualified users and deliberate fraud
or destruction of data. However, the integrity of the data could also be damaged
by hard disk failures and accidents. The next section discusses techniques for minimizing breaks in the continuity of IT operations.
Ensure Continuity of Service
During operation of an AIS, ensuring continuous service is an important objective.
The unavailability of the system for even a short time may cause significant losses
Download