Uploaded by Danny Cheek

Accounting Information systems Notes

advertisement
Accounting 345 Notes
Chapter 1: AIS Overview
Data vs Information
Data : set of unorganized facts
information : organized - useful for decision making
IPO Model ( Input ← Data → Processed ← Information → Output)
REA Model (Resources, Events, Agents) - to collect and organize data
Resources (goods/services → cash), Events ( give ← → get), Agents (customers, suppliers,
investors)
Integrated information system
Value of information
Benefit – Cost
7 characteristics of useful information:
- Relevant - reduces uncertainty, improves decision making
- Reliable - free from error or bias
- Complete - doesn’t omit important aspects of the event
- Timely - provided in time for decision makers to make decisions
- Understandable - presented in a useful and intelligent format
- Verifiable - two independent, knowledgeable people produce the same information
- Accessible - available to users when they need it and in a format they can use
Business processes
5 transaction cycles
- Revenue cycle (Give goods – Get cash) → customers
- Expenditure cycle (Give cash – Get goods/raw materials) → suppliers
- Production or conversion cycle (Give labor, Give raw materials – Get finished goods) →
- Human resource/payroll cycle ( Give cash – Get labor) → employees
- Financing cycle ( Give cash – Get cash) → investors/creditors
Production cycle - finished goods → revenue cycle
Expenditure cycle - purchased goods → revenue cycle
Revenue cycle - cash → financing cycle
Financing cycle - cash → expenditure cycle
Expenditure cycle - raw materials → production cycle
Financing cycle - cash → HR/payroll cycle
HR/payroll cycle - labor → production cycle
General Ledger & Reporting (DATA from all cycles)
Chapter 2: Overview of transaction processing & Enterprise Resource Planning Systems
Data processing cycles : data input → data processing & data storage → information output
Data input quality control
Why? GIGO - Garbage in Garbage out
What?
- IA - Input Accuracy
- IV - Input Validity (real transaction?, follows policies or laws and regulations)
- IC - Input Completeness
How?
- Data source automation (bar code, RFID) ← IA
- PVE - numbered documents ← IC
- Turn around document ← IA
Computer based data storage - database → (tables/files/entities) → attributes,records,field
Master file/data vs. Transaction file/data
Master file/data: permanent (customer, inventory, employee)
Transaction file/data: temporary (sales, purchases, payroll)
Car Dealership:
- MSRP - Master
- List Price - Master
- Proposed Price - Transaction
- Actual Price - Transaction
Data processing:
- Online real time Transaction → (update real time) transaction file → (update real
time) master file
- Online batch Transaction → (update real time) transaction file → (update batch (lag))
master file
- Batch Transaction → (update batch) transaction file → (update batch) master file
ERP Systems
Enterprise Resource Planning
Advantages of ERP:
- Centralized
- No duplication of data input
- Real time
- Share information
Disadvantages of ERP:
- Costly - customized
- Training
Chapter 4 - relational database - represents conceptual - and external level schemas as if data
is stored in two dimensional tables
1. Query
Q-1
1. Visualized output
2. Data source
Database Design
3 types of attributes
-
-
<i> Primary key (PK) - an attribute or a combination of attributes that uniquely
identifies a record
<ii> Foreign Key (FK) - an attribute in one table is a PK of another table
- <iii> Non-key attributes (NK) - neither primary key nor foreign key
4 Basic Requirements of a relational database
<i> Primary key cannot be invalid ← Entity Integrity Rule
<ii> Foreign key can be invalid, but if it is not invalid, it should be corresponding to a
value of the primary key in another table
<iii> A Non-key attribute should describe a characteristic of the entity
<iv> Single value rule
How to design a database?
Step 1 - Identify tables using REA model
Step 2 - Identify Primary keys
Step 3 - Identify Non-key attributes
Step 4 - Identify/Create Foreign keys
3 types of anomalies:
<i> Update anomaly - data values are not correctly updated
<ii> Insert anomaly - there is no way to store information about a customer until they make a
purchase
<iii> Delete anomaly - deleting a row has unintended consequences.
Extended amount = P * Q
Total amount = sum of extended amount
Normalization:
Unnormalized data - no PK
First Normal Form (1NF) - PK, but PD (partial dependency) : a NK depends on a part of PK
(example TA4-2 pg.118)
Second Normal Form (2NF) - PK, no PD, but TD (transitive dependency) : a NK depends on
another NK (example TA4-5 pg. 120)
Third Normal Form (3NF) - PK, no PD, no TD
Exam 2:
Chapter 3 (System Documentation Techniques):
1. Data flow diagrams (DFD)
<i> 4 symbols
a. Input (source) /output (destination)
b. Process
c. Data storage
d. Flow line
<ii> two levels of DFD
- (highest level) Context diagram - one process and no storage. Focus: sources &
destinations. (F3-5 pg. 54)
- Level 0 DFD (F3-6 pg. 56)
<iii> develop DFD
- Context
- Level 0
a. Identify data/information processing activities
b. Group activities
Compare DFD (Data Flow Diagram) with DF (Document Flow Chart)
<i> changes in physical characteristics of business processes.
DFD - No or little impact
DF - Significant impact
<ii> show areas of responsibilities?
DFD - No
DF - Yes (test segregation of duties)
Chapter 7. Control and AIS
Internal Controls (IC) - processes implemented to provide reasonable assurance that control
objectives are achieved
Overview of control concepts
1. Control objectives
- Security of assets
- Reliability of reporting
- Efficiency and effectiveness of operation
- Compliance (laws and regulations)
2. Limitation
- Human error
- Fraud: ex - management override or collusion
- Cost vs benefit
3. Classification
- Preventive
- Detective
- Corrective
General controls → applicable to multiple business processes
Application controls → embedded into software application
Business process control → pertain to one business process
SOX (2002) Sarbanes - Oxley Act examples (Enron and WorldCom)
5 key provisions of SOX
1. Auditing Committee
<i> 100% independent ← Outsiders
<ii> at least one financial expert
<iii> hire and fire auditors
2.
3.
4.
5.
External Auditors - prohibited from performing certain non-audit services
Public Company Accounting Oversight Board (PCAOB) - Auditors auditor
Management - certify financial reporting
SOX 404 requirements - internal control financial reporting (ICFR) (1) Management self
assessment. (2) auditor attest to assessment
Committee of Sponsoring Organizations (COSO), Internal Control - Integrated Framework (IC),
Enterprise Risk Management - Integrated Framework (ERM)
1. Compare COSO IC with COSO ERM
<i> Used by external auditors → IC (Yes), ERM (No)
<ii> Major components → IC (5), ERM (8)
<iii> Strategic objective → IC (No), ERM (Yes)
<iv> IC (Control Based), ERM (Risk Based)
2. Internal/Control Environment (tone at the top)
<i> Management’s philosophy, operating style, risk appetite
<ii> Commitment to integrity, ethical values, and competence
<iii> Internal control oversight by the board of directors
<iv> Organizational structure
<v> Methods of assigning authority and responsibility
<vi> Human resource standards that attract, develop, and retain competent individuals
<vii> External influences
3. Risk Assessment & Risk Response
<i> Inherent Risk: Pre - IC
<ii> Residual Risk: Post - IC
Economic impact * Likelihood
4 risk responses
<i> reduce (risk) implement IC
<ii> accept risk
<iii> share risk
<iv> avoid risk
4. Control activities (detailed policies and procedures)
<i> segregation of duties
<ii> proper authorization
<iii> sufficient documentation
<iv> independent review
<v> HR policies: job rotation, mandatory vacation
5. Segregation of duties (recording, custody, authorization) pg. 214 figure 7-5
Chapter 5 Fraud
1. What is fraud? Deliberate act to obtain unfair or unlawful gains.
Two forms: 1 (misappropriation of assets), 2 (fraudulent reporting)
2. Who commits fraud? Perpetrators are most likely insiders.
3. Why do people commit fraud? Fraud triangle pg. 134 figure 5-1 (pressures, opportunity,
rationalization)
Opportunity 3 C’s (commit, conceal, conversion)
Pressures (Financial, Emotional, Lifestyle)
Rationalization (justification, attitude, lack of personal integrity)
HW pg. 150-151 Q 2-3
4. How do people commit fraud? (prevent, detect, correct)
<i> prevent: HR - background checking, ethics training, code of conduct.
- Set realistic goals, proper compensation plans.
- Strengthen ICs
<ii> detect: HR - mandatory vacation/job rotation.
- Independent review.
- Data analytics.
- SOX: hotline, whistleblower protection
<iii> correct: fidelity bonding (insurance)
-
-
Exam 3
Chapter 6 Computer Fraud and Abuse Techniques
Page 177-179 (table 6-1)
15 Terms:
Botnet - a network of hijacking computers. Bot herders use the hijacked computers,
called zombies, in a variety of attacks
DoS - an attack designed to make computer resources unavailable to its users.
Hijacking - gaining control of someone else's computer for illicit activities
Key logger - using spyware to record a user's keystrokes
Phishing - communications that request recipients to disclose confidential information
by responding to an e-mail or visit a website
Dictionary attack - using software to guess company addresses, send employees blank
e-mails, and add unreturned messages to spam e-mail lists.
Hacking - unauthorized access, modification, or use of an electronic device or some
element of a computer system
Malware - software that is used to do harm
Social engineering - techniques that trick a person into disclosing confidential
information
Trap door - a back door into a system that bypasses normal system controls
Trojan horse - unauthorized code in an authorized and properly functioning program
Virus - executable code that attaches itself to software, replicates itself, and spreads to
other systems or files. When triggered, it makes unauthorized alterations to the way a
system operates
Worm - similar to a virus; a program rather than code segment hidden in a host
program, actively transmits itself to other systems. It usually does not live long but is
quite destructive while alive
-
Zero-day attack - attacks between the time a software vulnerability is discovered and a
patch to fix the problem is released
Ransomware - software that encrypts programs and data until a ransom is paid to
remove it
Chapter 8 controls for information security
Page 238 (figure 8-1)
1. Foundation of information reliability
5 principles
- Security
- Confidentiality
- Privacy
- Process integrity
- Availability
Why is information security the foundation?
2. Two fundamental concepts of information security
<i> information security is management issue, not just a technology issue
<ii> time based model
P(Time): higher the time the better
D(Detect): lower the better
R(Respond): lower the better
P > (D + R)
1. Assessment of information security control system
2. IT Budget
3. How to control information security
Page 241 (table 8-1)
Chapter 10 Processing integrity and availability
1. Data input control
<i> IV (input validity)
<ii> IA (input accuracy)
<iii> IC (input completeness)
Form design
<i> pre numbered docs (IC)
<ii> turnaround docs (IA)
2. 10 data entry controls (application controls)
a. Field check - check data type
b. Sign check - (+ or - )
c. Limit check
d. Range check
e. Completeness check
f. Size check (SSN # or Zip Code)
g. Reasonableness check (multiple columns)
h. Validity check (non -existing)
i.
j.
Closed - loop verification
Batch total
Batch total
<i> record count ← weakest
<ii> financial total
<iii> hash total (PK#) ← strongest
Processing Controls
1. Cross-footing tests
2. Zero balances tests
3. Recalculation of batch totals
Pre-processing (batch total #1)
Post-processing (batch total #2)
(patterns of differences infer type of processing errors)
1. Double and existing # (sign error)
2. An existing # (omission error)
3. Single # followed by 0’s (single transcription error)
4. Difference divisible by 9 (Transposition error)
Chapter 12: Revenue Cycle
1. Main Activities
- Sales order entry
- Shipping
- Billing
- Cash collection
2. Data Interactions
Benford Law - frequency distribution of non-zero leading digits of a set of naturally
occurring #’s
Shipping notice (trigger docs)
Trigger docs - immediately start activity
Expected Count: N * log10(1 + 1/y)
y= digit
Z-score: (Actual - Expected
|Z| > z (RED FLAG)
Chapter 13 Expenditure Cycle
1. Main activities
- Purchase Order Entry
- Receiving
- Approve Invoice
- Cash Disbursement
2. Data interactions
Base 0 previous base + (current cutoff - previous cutoff) * previous rate
Information records example:
Vendor #
item # minimum Q
V101
I101
30
V101
I102
30
V102
I101
20
V103
I101
20
Price
$5
$10
$6
$7
shipping term
3 days
3 days
3 days
2 days
Min Q ≤ 50 units AND shipping term ≤
GR/IR: Goods Received/ Invoice Received
Dependability data:
- Right condition (2.1)
- Right item (2.2)
- Right amount (2.2)
- Prompt delivery (2.2)
- Billing accuracy (3.1)
Tax = base + (income - cut off) * rate
Excel Functions:
XLookup(lookup value, lookup array, return array, match mode)
Indirect(“xx”& ___)
Name a cell / range
Download