FuzzBones/Shutterstock Stephen VanHorn/Shutterstock Ppbig/123RF Accounting Information Systems This page intentionally left blank Ppbig/123RF Accounting Information Systems Stephen VanHorn/Shutterstock FIFTEENTH EDITION GLOBAL EDITION Marshall B. Romney Professor Emeritus, Brigham Young University Paul John Steinbart Professor Emeritus, Arizona State University Scott L. Summers FuzzBones/Shutterstock Brigham Young University David A. Wood Brigham Young University Harlow, England • London • New York • Boston • San Francisco • Toronto • Sydney • Dubai • Singapore • Hong Kong Tokyo • Seoul • Taipei • New Delhi • Cape Town • Sao Paulo • Mexico City • Madrid • Amsterdam • Munich • Paris • Milan A01_ROMN3364_15_GE_FM.indd 3 17/07/20 1:44 PM Please contact https://support.pearson.com/getsupport/s/contactsupport with any queries on this content. Microsoft and/or its repective suppliers make no representations about the suitability of the information contained in the documents and related graphics published as part of the services for any purpose. All such documents and related graphics are provided “as is” without warranty of any kind. Microsoft and/or its respective suppliers hereby disclaim all warranties and conditions with regard to this information, including all warranties and conditions of merchantability, whether express, implied or statutory, fitness for a particular purpose, title and non-infringement. In no event shall Microsoft and/or its respective suppliers be liable for any special, indirect or consequential damages or any damages whatsoever resulting from loss of use, data or profits, whether in an action of contract, negligence or other tortious action, arising out of or in connection with the use or performance of information available from the services. The documents and related graphics contained herein could include technical inaccuracies or typographical errors. Changes are periodically added to the information herein. Microsoft and/or its respective suppliers may make improvements and/ or changes in the product(s) and/or the program(s) described herein at any time. Partial screen shots may be viewed in full within the software version specified. Microsoft® and Windows® are registered trademarks of the Microsoft Corporation in the U.S.A. and other countries. This book is not sponsored or endorsed by or affiliated with the Microsoft Corporation. Acknowledgments of third-party content appear on the appropriate page within the text. PEARSON, ALWAYS LEARNING, and Revel are exclusive trademarks owned by Pearson Education, Inc. or its affiliates in the U.S. and/or other countries. Pearson Education Limited KAO Two KAO Park Hockham Way Harlow Essex CM17 9SR United Kingdom and Associated Companies throughout the world Visit us on the World Wide Web at: www.pearsonglobaleditions.com © Pearson Education Limited 2021 The rights of Marshall B. Romney, Paul John Steinbart, Scott L. Summers, and David A. Wood, to be identified as the authors of this work, have been asserted by them in accordance with the Copyright, Designs and Patents Act 1988. Authorized adaptation from the United States edition, entitled Accounting Information Systems, 15th Edition, ISBN 978-0-13-557283-2 by Marshall B. Romney, Paul John Steinbart, Scott L. Summers, and David A. Wood, published by Pearson Education © 2021. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without either the prior written permission of the publisher or a license permitting restricted copying in the United Kingdom issued by the Copyright Licensing Agency Ltd, Saffron House, 6–10 Kirby Street, London EC1N 8TS. This publication is protected by copyright, and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise. For information regarding permissions, request forms, and the appropriate contacts within the Pearson Education Global Rights and Permissions department, please visit www.pearsoned.com/permissions/. All trademarks used herein are the property of their respective owners. The use of any trademark in this text does not vest in the author or publisher any trademark ownership rights in such trademarks, nor does the use of such trademarks imply any affiliation with or endorsement of this book by such owners. This eBook is a standalone product and may or may not include all assets that were part of the print version. It also does not provide access to other Pearson digital products like Revel, MyLab, and Mastering. The publisher reserves the right to remove any material in this eBook at any time. ISBN 10: 1-292-35336-8 ISBN 13: 978-1-292-35336-4 eBook ISBN 13: 978-1-292-35328-9 British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library Typeset by Integra Software Services Brief Contents Preface PART I 19 Conceptual Foundations of Accounting Information Systems 27 CHAPTER 1 Accounting Information Systems: An Overview 28 CHAPTER 2 Overview of Transaction Processing and Enterprise Resource Planning Systems 56 CHAPTER 3 Systems Documentation Techniques PART II Data Analytics 84 117 CHAPTER 4 Relational Databases 118 CHAPTER 5 Introduction to Data Analytics in Accounting 162 CHAPTER 6 Transforming Data 188 CHAPTER 7 Data Analysis and Presentation 214 PART III Control of Accounting Information Systems CHAPTER 8 Fraud and Errors 247 248 CHAPTER 9 Computer Fraud and Abuse Techniques 282 CHAPTER 10 Control and Accounting Information Systems 322 CHAPTER 11 Controls for Information Security 360 CHAPTER 12 Confidentiality and Privacy Controls 394 CHAPTER 13 Processing Integrity and Availability Controls 422 PART IV Accounting Information Systems Applications 451 CHAPTER 14 The Revenue Cycle: Sales to Cash Collections 452 CHAPTER 15 The Expenditure Cycle: Purchasing to Cash Disbursements 494 CHAPTER 16 The Production Cycle 532 5 6 BRIEF CONTENTS CHAPTER 17 The Human Resources Management and Payroll Cycle 562 CHAPTER 18 General Ledger and Reporting System PART V The REA Data Model 592 625 CHAPTER 19 Database Design Using the REA Data Model 626 CHAPTER 20 Implementing an REA Model in a Relational Database 660 CHAPTER 21 Special Topics in REA Modeling 684 PART VI The Systems Development Process 717 CHAPTER 22 Introduction to Systems Development and Systems Analysis 718 CHAPTER 23 AIS Development Strategies 754 CHAPTER 24 Systems Design, Implementation, and Operation 784 Glossary Index 812 829 Contents Preface PART I 19 Conceptual Foundations of Accounting Information Systems 27 CHAPTER 1 Accounting Information Systems: An Overview Introduction 29 Information Needs and Business Processes 28 31 Information Needs 32 Business Processes 33 Accounting Information Systems 36 How an AIS Can Add Value to an Organization 37 An AIS Can Use Artificial Intelligence and Data Analytics to Improve Decision Making 38 The AIS and Blockchain 40 Cloud Computing, Virtualization, and the Internet of Things The AIS and Corporate Strategy 44 The Role of the AIS in the Value Chain 45 Summary and Case Conclusion 46 ■ Key Terms 47 AIS IN ACTION: Chapter Quiz 47 ■ Discussion Questions 44 48 ■ Problems 49 ■ AIS IN ACTION SOLUTIONS: Quiz Key 54 CHAPTER 2 Overview of Transaction Processing and Enterprise Resource Planning Systems 56 Introduction 57 Transaction Processing: The Data Processing Cycle 58 Data Input 58 Data Storage 59 Data Processing 65 Information Output 65 Transaction Processing: Blockchain 67 Enterprise Resource Planning (ERP) Systems Summary and Case Conclusion AIS IN ACTION: Chapter Quiz 71 Key Terms 68 71 71 ■ Discussion Questions CASE 2-1 Bar Harbor Blueberry Farm CASE 2-2 SDC ■ 72 ■ Problems 73 79 80 AIS IN ACTION SOLUTIONS: Quiz Key 81 7 8 CONTENTS CHAPTER 3 Systems Documentation Techniques Introduction 85 Business Process Diagrams Flowcharts 89 84 86 Types of Flowcharts 91 Program Flowcharts 94 Data Flow Diagrams 95 Subdividing the DFD 97 Summary and Case Conclusion 100 ■ Key Terms 100 AIS IN ACTION: Chapter Quiz 101 ■ Comprehensive Problem 102 ■ Discussion Questions 102 ■ Problems 102 CASE 3-1 Dub 5 107 AIS IN ACTION SOLUTIONS: Quiz Key 108 ■ Comprehensive Problem Solution 110 PART II Data Analytics 117 CHAPTER 4 Relational Databases 118 Introduction 118 Databases and Files 119 Using Data Warehouses for Data Analytics 121 The Advantages of Database Systems 121 The Importance of Good Data 122 Database Systems 122 Logical and Physical Views of Data Schemas 123 The Data Dictionary 124 DBMS Languages 126 Relational Databases 122 126 Types of Attributes 127 Designing a Relational Database for S&S, Inc. 127 Basic Requirements of a Relational Database 129 Two Approaches to Database Design 131 Creating Relational Database Queries 131 Query 1 131 Query 2 134 Query 3 137 Query 4 137 Query 5 139 Database Systems and the Future of Accounting 140 Summary and Case Conclusion 142 ■ Key Terms 142 AIS IN ACTION: Chapter Quiz 142 ■ Comprehensive Problem 143 ■ Discussion Questions 144 ■ Problems 145 CASE 4-1 Research Project 153 AIS IN ACTION SOLUTIONS: Quiz Key 154 ■ Comprehensive Problem Solution 155 Appendix: Data Normalization 158 ■ Summary 161 CHAPTER 5 Introduction to Data Analytics in Accounting Introduction 163 Ask the Right Questions 165 Extract, Transform, and Load Relevant Data Extracting Data 166 Transforming Data 169 Loading Data 170 165 162 CONTENTS Apply Appropriate Data Analytic Techniques 171 Interpret and Share the Results with Stakeholders 172 Interpreting Results 172 Sharing Results 173 Additional Data Analytics Considerations 174 Automation 174 Data Analytics Is Not Always the Right Tool 176 Summary and Case Conclusion 176 ■ Key Terms 176 AIS IN ACTION: Chapter Quiz 177 ■ Discussion Questions 178 ■ Problems 178 CASE 5-1 Robotic Process Automation—Wood’s Amazing Woods Inc. 183 AIS IN ACTION SOLUTIONS: Quiz Key 185 CHAPTER 6 Transforming Data 188 Introduction 189 Attributes of High-Quality Data 190 Data Structuring 191 Aggregate Data 191 Data Joining 192 Data Pivoting 192 Data Standardization 193 Data Parsing and Data Concatenation 193 Cryptic Data Values 195 Misfielded Data Values 196 Data Formatting and Data Consistency 196 Data Cleaning 198 Data De-Duplication 198 Data Filtering 198 Data Contradiction Errors 199 Data Threshold Violations 199 Violated Attribute Dependencies 200 Data Entry Errors 200 Data Validation 200 Visual Inspection 201 Basic Statistical Tests 201 Audit a Sample 201 Advanced Testing Techniques 202 Summary and Case Conclusion 202 ■ Key Terms AIS IN ACTION: Chapter Quiz 202 203 ■ Discussion Questions 204 ■ Problems 204 CASE 6-1 Hotel Data Cleaning Case 209 AIS IN ACTION SOLUTIONS: Quiz Key 210 CHAPTER 7 Data Analysis and Presentation 214 Introduction 215 Data Analysis 215 Descriptive Analytics 215 Diagnostic Analytics 217 Predictive Analytics 219 Prescriptive Analytics 220 Common Problems with Data Analytics Data Presentation 220 222 Choosing the Right Visualization 222 Designing High-Quality Visualizations 225 Summary and Case Conclusion 235 ■ Key Terms 235 9 10 CONTENTS AIS IN ACTION: Chapter Quiz 236 ■ Discussion Questions 237 ■ Problems 237 CASE 7-1 Analyzing Gamified Training 241 CASE 7-1 Appendix 242 ANALYTICS MINDSET Gamification 243 AIS IN ACTION SOLUTIONS: Quiz Key 244 PART III Control of Accounting Information Systems CHAPTER 8 Fraud and Errors 247 248 Introduction 249 AIS Threats 249 Natural and Political Disasters 249 Software Errors and Equipment Malfunctions Unintentional Errors 251 Intentional Acts 252 Introduction to Fraud 251 253 Misappropriation of Assets 254 Fraudulent Financial Reporting 255 SAS No. 99 (AU-C Section 240): The Auditor’s Responsibility to Detect Fraud Who Perpetrates Fraud and Why The Fraud Triangle Computer Fraud 256 256 261 The Rise in Computer Fraud 261 Computer Fraud Classifications 262 Preventing and Detecting Fraud and Abuse 264 Using Data Analytics to Prevent and Detect Fraud 266 Summary and Case Conclusion 268 ■ Key Terms 269 AIS IN ACTION: Chapter Quiz 269 ■ Discussion Questions 270 ■ Problems 271 CASE 8-1 David L. Miller: Portrait of a White-Collar Criminal 276 CASE 8-2 Heirloom Photo Plans 277 AIS IN ACTION SOLUTIONS: Quiz Key 279 CHAPTER 9 Computer Fraud and Abuse Techniques Introduction 282 Computer Attacks and Abuse Social Engineering 292 Malware 296 Summary and Case Conclusion 282 283 305 ■ Key Terms 306 AIS IN ACTION: Chapter Quiz 306 ■ Discussion Questions 307 ■ Problems 308 CASE 9-1 Shadowcrew 318 AIS IN ACTION SOLUTIONS: Quiz Key 319 CHAPTER 10 Control and Accounting Information Systems 322 Introduction 323 Why Threats to Accounting Information Systems Are Increasing Overview of Control Concepts The Foreign Corrupt Practices and Sarbanes–Oxley Acts Control Frameworks 323 324 325 326 COBIT Framework 326 COSO’S Internal Control Framework The Control Environment 328 330 Management’s Philosophy, Operating Style, and Risk Appetite 331 Commitment to Integrity, Ethical Values, and Competence 331 Internal Control Oversight by the Board of Directors 332 255 CONTENTS Organizational Structure 332 Methods of Assigning Authority and Responsibility 332 Human Resources Standards That Attract, Develop, and Retain Competent Individuals 333 External Influences 334 Risk Assessment and Risk Response 335 Estimate Likelihood and Impact 335 Identify Controls 335 Estimate Costs and Benefits 335 Determine Cost/Benefit Effectiveness 336 Implement Control or Accept, Share, or Avoid the Risk 337 Control Activities 337 Proper Authorization of Transactions and Activities 337 Segregation of Duties 338 Project Development and Acquisition Controls 341 Change Management Controls 342 Design and Use of Documents and Records 342 Safeguard Assets, Records, and Data 342 Independent Checks on Performance 343 Communicate Information and Monitor Control Processes 344 Information and Communication 344 Monitoring 345 Summary and Case Conclusion 347 ■ Key Terms AIS IN ACTION: Chapter Quiz 348 348 ■ Discussion Questions 350 ■ Problems 350 CASE 10-1 The Greater Providence Deposit & Trust Embezzlement 356 AIS IN ACTION SOLUTIONS: Quiz Key 357 CHAPTER 11 Controls for Information Security 360 Introduction 361 Three Fundamental Information Security Concepts 362 1. Security Is a Management Issue, Not Just a Technology Issue 2. People: The Critical Factor 364 3. The Time-Based Model of Information Security 365 Protecting Information Resources 367 Physical Security: Access Controls 367 Process: User Access Controls 368 IT Solutions: Antimalware Controls 372 IT Solutions: Network Access Controls 372 IT Solutions: Device and Software Hardening Controls IT Solutions: Encryption 379 Detecting Attacks 377 379 Log Analysis 379 Intrusion Detection Systems 380 Honeypots 380 Continuous Monitoring 380 Responding to Attacks 381 Computer Incident Response Team (CIRT) 381 Chief Information Security Officer (CISO) 381 Monitor and Revise Security Solutions Penetration Testing 382 Change Controls and Change Management 382 382 Security Implications of Virtualization, Cloud Computing, and the Internet of Things 383 Summary and Case Conclusion 384 ■ Key Terms 384 362 11 12 CONTENTS AIS IN ACTION: Chapter Quiz 385 ■ Discussion Questions 386 ■ Problems 386 CASE 11-1 Assessing Change Control and Change Management 391 CASE 11-2 Research Project 391 AIS IN ACTION SOLUTIONS: Quiz Key 391 CHAPTER 12 Confidentiality and Privacy Controls Introduction 395 Protecting Confidentiality and Privacy 394 395 Identify and Classify Information to Be Protected 396 Protecting Sensitive Information with Encryption 396 Controlling Access to Sensitive Information 396 Training 398 Privacy Regulations and Generally Accepted Privacy Principles The EU’s GDPR and U.S. Laws 398 Generally Accepted Privacy Principles Encryption 399 402 Factors That Influence Encryption Strength Types of Encryption Systems 403 Virtual Private Networks (VPNs) 405 Hashing 398 403 406 Digital Signatures 407 Digital Certificates and Public Key Infrastructure 408 Blockchain 409 Summary and Case Conclusion 412 ■ Key Terms 412 AIS IN ACTION: Chapter Quiz 412 ■ Discussion Questions 414 ■ Problems 414 CASE 12-1 Protecting Privacy of Tax Returns 418 CASE 12-2 Generally Accepted Privacy Principles 419 AIS IN ACTION SOLUTIONS: Quiz Key 419 CHAPTER 13 Processing Integrity and Availability Controls Introduction 422 Processing Integrity 422 423 Input Controls 423 Processing Controls 425 Output Controls 426 Illustrative Example: Credit Sales Processing 427 Processing Integrity Controls in Spreadsheets 429 Availability 429 Minimizing Risk of System Downtime 429 Recovery and Resumption of Normal Operations 430 Summary and Case Conclusion 435 ■ Key Terms 436 AIS IN ACTION: Chapter Quiz 436 ■ Discussion Questions 437 ■ Problems 438 CASE 13-1 Ensuring Systems Availability 447 CASE 13-2 Ensuring Process Integrity in Spreadsheets 447 AIS IN ACTION SOLUTIONS: Quiz Key 448 PART IV Accounting Information Systems Applications 451 CHAPTER 14 The Revenue Cycle: Sales to Cash Collections 452 Introduction 454 Revenue Cycle Information System Process 456 Threats and Controls 456 456 CONTENTS Sales Order Entry 459 Taking Customer Orders 460 Credit Approval 462 Checking Inventory Availability 464 Responding to Customer Inquiries 465 Shipping 467 Pick and Pack the Order Ship the Order 469 467 Billing 471 Invoicing 472 Maintain Accounts Receivable 474 Cash Collections 477 Process 477 Threats and Controls 478 Summary and Case Conclusion AIS IN ACTION: Chapter Quiz 480 ■ Key Terms 481 481 ■ Discussion Questions 482 ■ Problems 482 CASE 14-1 Research Project: The Use of RFID in Retail 491 AIS IN ACTION SOLUTIONS: Quiz Key 491 CHAPTER 15 The Expenditure Cycle: Purchasing to Cash Disbursements 494 Introduction 495 Expenditure Cycle Information System Process 496 Threats and Controls 496 499 Ordering Materials, Supplies, and Services 503 Identifying What, When, and How Much to Purchase Choosing Suppliers 505 Receiving 503 509 Process 510 Threats and Controls 511 Approving Supplier Invoices Process 512 Threats and Controls Cash Disbursements 515 515 Process 515 Threats and Controls 515 Summary and Case Conclusion AIS IN ACTION: Chapter Quiz 512 518 ■ Key Terms 519 519 ■ Discussion Questions 520 ■ Problems 520 CASE 15-1 Group Case Analysis: School District Expenditure Fraud 529 CASE 15-2 Anatomy of a Multi-Million Dollar Embezzlement at ING Bank 529 AIS IN ACTION SOLUTIONS: Quiz Key 530 CHAPTER 16 The Production Cycle 532 Introduction 533 Production Cycle Information System Process 536 Threats and Controls 536 Product Design 537 Process 537 Threats and Controls 539 Planning and Scheduling 539 Production Planning Methods 539 535 13 14 CONTENTS Key Documents and Forms 539 Threats and Controls 543 Production Operations Threats and Controls Cost Accounting 544 544 546 Process 546 Threats and Controls 547 Summary and Case Conclusion 552 ■ Key Terms 553 AIS IN ACTION: Chapter Quiz 553 ■ Discussion Questions 554 ■ Problems 555 CASE 16-1 The Accountant and CIM 559 AIS IN ACTION SOLUTIONS: Quiz Key 559 CHAPTER 17 The Human Resources Management and Payroll Cycle 562 Introduction 563 HRM/Payroll Cycle Information System 564 Overview of HRM Process and Information Needs Threats and Controls 566 Payroll Cycle Activities 564 569 Update Payroll Master Database 570 Validate Time and Attendance Data 571 Prepare Payroll 573 Disburse Payroll 577 Calculate and Disburse Employer-Paid Benefits, Taxes, and Voluntary Employee Deductions 579 Outsourcing Options: Payroll Service Bureaus and Professional Employer Organizations 579 Summary and Case Conclusion 580 ■ Key Terms 581 AIS IN ACTION: Chapter Quiz 581 ■ Discussion Questions 582 ■ Problems 583 CASE 17-1 Excel Project: Sorting and Grouping Data 589 AIS IN ACTION SOLUTIONS: Quiz Key 589 CHAPTER 18 General Ledger and Reporting System Introduction 593 General Ledger and Reporting System Process 595 Threats and Controls Post Adjusting Entries Process 601 Threats and Controls 597 598 600 602 Prepare Financial Statements Process 602 Threats and Controls 594 595 Update General Ledger Process 597 Threats and Controls 592 602 609 Produce Managerial Reports Process 610 Threats and Controls 610 Summary and Case Conclusion 610 614 ■ Key Terms 614 AIS IN ACTION: Chapter Quiz 615 ■ Discussion Questions 616 ■ Problems 616 CASE 18-1 Exploring iXBRL Viewers 621 CASE 18-2 Evaluating a General Ledger Package 621 AIS IN ACTION SOLUTIONS: Quiz Key 622 CONTENTS PART V The REA Data Model 625 CHAPTER 19 Database Design Using the REA Data Model 626 Introduction 626 Database Design Process 627 Entity-Relationship Diagrams 628 The REA Data Model 629 Three Basic Types of Entities 630 Structuring Relationships: The Basic REA Template Developing an REA Diagram 630 633 Step 1: Identify Relevant Events 633 Step 2: Identify Resources and Agents 635 Step 3: Determine Cardinalities of Relationships 636 What an REA Diagram Reveals About an Organization Business Meaning of Cardinalities 640 Uniqueness of REA Diagrams 641 Summary and Case Conclusion 642 ■ Key Terms 640 643 AIS IN ACTION: Chapter Quiz 643 ■ Comprehensive Problem 646 ■ Discussion Questions 646 ■ Problems 647 CASE 19-1 REA Data Modeling Extension 651 AIS IN ACTION SOLUTIONS: Quiz Key 652 ■ Comprehensive Problem Solution 656 CHAPTER 20 Implementing an REA Model in a Relational Database 660 Introduction 661 Integrating REA Diagrams Across Cycles 661 Merging Redundant Resource Entities 664 Merging Redundant Event Entities 665 Validating the Accuracy of Integrated REA Diagrams 666 Implementing an REA Diagram in a Relational Database 666 Step 1: Create Tables for Each Distinct Entity and M:N Relationship 666 Step 2: Assign Attributes to Each Table 668 Step 3: Use Foreign Keys to Implement 1:1 and 1:N Relationships 669 Completeness Check 670 Using REA Diagrams to Retrieve Information from a Database Creating Journals and Ledgers 671 Generating Financial Statements 672 Creating Managerial Reports 673 Summary and Case Conclusion 673 ■ Key Term 671 674 AIS IN ACTION: Chapter Quiz 674 ■ Comprehensive Problem 675 ■ Discussion Questions 675 ■ Problems 676 CASE 20-1 Practical Database Design 678 AIS IN ACTION SOLUTIONS: Quiz Key 679 ■ Comprehensive Problem Solution 681 CHAPTER 21 Special Topics in REA Modeling 684 Introduction 685 Additional Revenue and Expenditure Cycle Modeling Topics Additional Revenue Cycle Events and Attribute Placement 685 Additional Expenditure Cycle Events and Attribute Placement 687 Sale of Services 690 Acquisition of Intangible Services 690 Digital Assets 691 Rental Transactions 691 685 15 16 CONTENTS Additional REA Features 693 Employee Roles 693 M:N Agent–Event Relationships 693 Locations 693 Relationships Between Resources and Agents Production Cycle REA Model 694 Additional Entities—Intellectual Property Production Cycle Events 696 New REA Feature 696 Combined HR/Payroll Data Model HR Cycle Entities 697 Tracking Employees’ Time 693 694 697 698 Financing Activities Data Model Summary and Case Conclusion 699 700 AIS IN ACTION: Chapter Quiz 703 ■ Discussion Questions 704 ■ Problems 705 CASE 21-1 Practical Database Assignment 710 AIS IN ACTION SOLUTIONS: Quiz Key 710 Appendix: Extending the REA Model to Include Information About Policies 714 PART VI The Systems Development Process 717 CHAPTER 22 Introduction to Systems Development and Systems Analysis 718 Introduction 719 Systems Development 721 The Systems Development Life Cycle The Players 722 Planning Systems Development Planning Techniques 721 723 725 Feasibility Analysis 725 Capital Budgeting: Calculating Economic Feasibility Behavioral Aspects of Change 726 727 Why Behavioral Problems Occur 728 How People Resist Change 728 Preventing Behavioral Problems 729 Systems Analysis 730 Initial Investigation 730 Systems Survey 732 Feasibility Study 733 Information Needs and Systems Requirements 733 Systems Analysis Report 735 Summary and Case Conclusion 736 ■ Key Terms 737 AIS IN ACTION: Chapter Quiz 738 ■ Comprehensive Problem 739 ■ Discussion Questions 739 ■ Problems 740 CASE 22-1 Audio Visual Corporation 749 AIS IN ACTION SOLUTIONS: Quiz Key 750 ■ Comprehensive Problem Solution 752 CHAPTER 23 AIS Development Strategies Introduction 755 Purchasing Software Selecting a Vendor 755 756 754 CONTENTS Acquiring Hardware and Software 756 Evaluating Proposals and Selecting a System 757 Development by In-House Information Systems Departments End-User-Developed Software 759 Advantages and Disadvantages of End-User Computing Managing and Controlling End-User Computing 761 759 760 Outsourcing the System 762 Advantages and Disadvantages of Outsourcing 762 Methods for Improving Systems Development Business Process Management 764 Prototyping 765 Agile Methodologies 767 Computer-Aided Software Engineering 770 Summary and Case Conclusion 771 ■ Key Terms 763 771 AIS IN ACTION: Chapter Quiz 772 ■ Comprehensive Problem 773 ■ Discussion Questions 773 ■ Problems 774 CASE 23-1 Wong Engineering Corp. 778 AIS IN ACTION SOLUTIONS: Quiz Key 779 ■ Comprehensive Problem Solution 782 CHAPTER 24 Systems Design, Implementation, and Operation 784 Introduction 785 Conceptual Systems Design 785 Evaluate Design Alternatives 785 Prepare Design Specifications and Reports Physical Systems Design Output Design 788 File and Database Design 788 Input Design 789 Program Design 790 Procedures and Controls Design Systems Implementation 787 787 791 792 Implementation Planning and Site Preparation Selecting and Training Personnel 793 Complete Documentation 794 Testing the System 794 Systems Conversion 795 Operation and Maintenance Summary and Case Conclusion 792 796 797 ■ Key Terms 798 AIS IN ACTION: Chapter Quiz 798 ■ Comprehensive Problem 799 ■ Discussion Questions 800 ■ Problems 801 CASE 24-1 Citizen’s Gas Company 807 AIS IN ACTION SOLUTIONS: Quiz Key 807 ■ Comprehensive Problem Solution 809 Glossary Index 812 829 17 This page intentionally left blank Preface New to This Edition INTRODUCING TWO NEW CO-AUTHORS Scott L. Summers and David A. Wood, both from Brigham Young University, joined as new co-authors. Scott and David created the new section on data analytics (Part II), consisting of four chapters. The first chapter is an update of Chapter 4 that discusses relational databases not only as the basis for transaction processing systems, but also as one of the sources of Big Data and Analytics. The next three chapters (Chapters 5–7) discuss the Extract, Transfer, and Load (ETL) process and various data analytic techniques. This new content covers an extremely important topic that affects all aspects of designing, using, managing, and auditing an AIS. ENHANCEMENTS IN THE FIFTEENTH EDITION We made extensive revisions to the content of the material to incorporate recent developments while retaining the features that have made prior editions easy to use. Every chapter has been revised to include up-to-date examples of important concepts. Specific changes include the following: 1. Introduced several new topics in Chapter 1. The chapter discusses how an AIS can use artificial intelligence and data analytics to improve decision making, how the AIS is affected by blockchain technology, and the use of cloud computing, virtualization, and the internet of things. 2. Shortened and simplified the discussion of computer fraud and abuse techniques by eliminating many of the less frequently used techniques. 3. Simplified the discussion of control and the AIS by using the COSO Internal Control framework instead of the COSO Enterprise Risk Management framework as the structure for discussing controls. 4. Updated the discussion of information security countermeasures. 5. Updated the discussion of transaction processing and encryption to include blockchain technology. 6. Updated the discussion of privacy to include the EU’s General Data Privacy Regulation (GDPR). 7. Updated the end-of-chapter discussion questions and problems, including Excel exercises that are based on articles from the Journal of Accountancy so that students can develop the specific skills used by practitioners. Most chapters also include a problem that consists of multiple-choice questions we have used in our exams to provide students with an additional chance to check how well they understand the chapter material. 8. Moved the topic of auditing (Chapter 11 in the fourteenth edition) to a web-only appendix because most of that material is covered in other courses. 19 20 PREFACE Solving Learning and Teaching Challenges STRUCTURED LEARNING KEY LEARNING OBJECTIVES When you finish reading this text, you should understand the following key concepts: ● ● ● ● ● ● ● ● ● ● ● ● ● Basic activities performed in major business cycles. What data needs to be collected to enable managers to plan, evaluate, and control an organization’s business activities. How to extract, transfer, and load (ETL) data from both the organization’s AIS and other sources into a common repository that can be used for data analytics. How IT developments can improve the efficiency and effectiveness of business processes. How to design an AIS to provide the information needed to make key decisions in each business cycle. Risk of fraud and motives and techniques used to perpetrate fraud. COSO’s models (Internal Control and ERM) for internal control and risk management as well as specific controls used to achieve these objectives. Control Objectives for Information and Related Technology (COBIT) framework for the effective governance and control of information systems and how IT affects the implementation of internal controls. AICPA’s Trust Services framework for ensuring systems reliability by developing procedures to protect the confidentiality of proprietary information, maintain the privacy of personally identifying information collected from customers, assure the availability of information resources, and provide for information processing integrity. Fundamentals of information security. Fundamental concepts of database technology and data modeling and their effect on an AIS. Tools for documenting AIS work, such as REA diagrams, business processing diagrams, data flow diagrams, and flowcharts. Basic steps in the system development process to design and improve an AIS. FEATURES TO FACILITATE LEARNING To help students understand these concepts, the text includes the following features: 1. Each chapter begins with an integrated case that introduces key chapter concepts and topics and identifies several key issues or problems that students should be able to solve after mastering the material presented in that chapter. The case is referenced throughout the chapter, and the chapter summary presents solutions to the problems and issues raised in the case. 2. Focus boxes and real-world examples to help students understand how companies use the latest IT developments to improve their AIS. 3. Hands-on Excel exercises in many chapters to help students hone their computer skills. Many of these exercises are based on “how-to” tutorials that appeared in recent issues of the Journal of Accountancy. Some of those articles discuss older versions of Excel, thereby giving students practice in developing the important life-long learning skill of adapting older instructions to updated versions of software. 4. Numerous discussion questions and problems in every chapter provide additional opportunities for students to demonstrate mastery of key concepts. Many problems were developed from reports in current periodicals. Other problems were selected from various professional examinations, including the CPA, CMA, CIA, and SMAC exams. One problem in every chapter consists of a set of multiple-choice questions to provide practice in answering exam-style questions. One or more problems where students are asked to match terms with their definitions to help students learn the terminology introduced in that chapter. Each chapter also has one or more cases that require more extensive exploration of specific topics. PREFACE 5. Quizzes at the end of each chapter enable students to self-assess their understanding of the material. We also provide detailed explanations about the correct answer to each quiz question. 6. A number of chapters have a comprehensive problem in the AIS in Action section at the end of the chapter with the solution to the problem provided after quiz question solutions and explanations at the very end of the chapter. 7. Extensive use of full-color graphics. The text contains hundreds of figures, diagrams, flowcharts, and tables that illustrate chapter concepts, and color is used to highlight key points. 8. Definitions of key terms are repeated in the glossary margins in each chapter. In addition, a comprehensive glossary located at the back of the book makes it easy to look up the definition of the various technical terms used in the text. CONTENT AND ORGANIZATION Part I: Conceptual Foundations of Accounting Information Systems Part I consists of three chapters that present the underlying concepts fundamental to an understanding of AIS. Chapter 1 introduces basic terminology and provides an overview of AIS topics. It discusses how an AIS can add value to an organization and how it can be used to help organizations implement corporate strategy. It also discusses the types of information companies need to successfully operate and introduces the basic business processes that produce that information. It concludes by describing the role of the AIS in an organization’s value chain. It also introduces several new topics in the text: artificial intelligence, data analytics, blockchain, virtualization, cloud computing, and the Internet of Things. Chapter 2 introduces transaction processing in automated systems and presents basic information about input/output, processing, and data storage concepts as well as the wide range of data that must be collected by the AIS. This information helps students understand what an AIS does; throughout the remainder of the book, we discuss advances in IT and how it affects the manner in which those functions are performed. The chapter discusses the impact of blockchain on transaction processing. Chapter 2 also introduces Enterprise Resource Planning (ERP) systems and their importance and uses in modern business. Chapter 3 covers three of the most important tools and techniques used to understand, evaluate, design, and document information systems: business process diagrams, flowcharts, and data flow diagrams. Students will learn how to read, critique, and create systems documentation using these tools. Part II: Data Analytics Part II consists of four chapters about relational databases, the ETL process, and various data analytics techniques. Chapter 4 describes the principles of relational database design and how to use SQL to analyze the data. It also discusses how an organization’s relational database used for transaction processing provides one important source of data for advanced data analytics. Chapter 5 introduces the topic of data analysis and begins by stressing the importance of formulating and asking the right questions to obtain useful insights. It then explains the basic steps of extracting, transforming, and loading (ETL) data to be used for analytics. Next, it discusses how to choose appropriate analytic techniques and how to interpret and share the results. A discussion about the potential for automating analytics and a word of caution about the limits of what analytics can and cannot do concludes the chapter. Chapter 6 delves into more detail about the different steps in the ETL process, focusing on how to transform data. It begins by describing the attributes that make data useful for analytics and then discusses techniques for structuring data, standardizing data being consolidated from multiple sources, cleaning data, and validating data. Chapter 7 discusses the differences between descriptive, diagnostic, predictive, and prescriptive analytic techniques. It also describes how to choose the right visualization tools to aid in analysis and presents best practices for designing high-quality visualizations. Part III: Control of Accounting Information Systems The six chapters in Part III focus on threats to the reliability of the AIS and applicable controls for addressing and mitigating the risks associated with those threats. 21 22 PREFACE Chapter 8 introduces students to the different kinds of threats faced by information systems, primarily focusing on the threats of fraud and errors. The chapter describes the different types of fraud and explains how fraud is perpetrated, who perpetrates it, and why it occurs. Chapter 9 discusses computer fraud and abuse techniques. Three major types of computer fraud are discussed: computer attacks and abuse, social engineering, and malware. The chapter explains the dozens of ways computer fraud and abuse can be perpetrated. Chapter 10 uses the COSO Internal Control framework, to discuss the basic concepts of internal control. It introduces the expanded enterprise risk management (COSO-ERM) model and compares it with the COSO Internal Control framework. It also introduces the COBIT framework which applies those concepts to IT, thereby providing a foundation for effective governance and control of information systems. Chapter 11 focuses on information security. It introduces the fundamental concepts of defense-in-depth and the time-based approach to security. The chapter provides a broad survey of a variety of security topics, including access controls, firewalls, encryption, and incident detection and response. Chapter 12 discusses the many specific computer controls used in business organizations to achieve the objectives of ensuring privacy and confidentiality and discusses the implications of new regulations such as the EU’s General Data Privacy Regulation (GDPR) and similar laws enacted by California and other states. The chapter also provides a detailed discussion of blockchain technology. Chapter 13 addresses the controls necessary to achieve the objectives of accurate processing of information and ensuring that information is available to managers whenever and wherever they need it. It also discusses how virtualization and cloud technology are changing the methods used for backup and recovery. Part IV: Accounting Information Systems Applications Part IV focuses on how a company’s AIS provides critical support for its fundamental business processes. Most large and many medium-sized organizations use enterprise resource planning (ERP) systems to collect, process, and store data about their business processes as well as to provide information reports designed to enable managers and external parties to assess the organization’s efficiency and effectiveness. To make it easier to understand how an ERP system functions, Part III consists of five chapters, each focusing on a particular business process. Chapter 14 covers the revenue cycle (also referred to as the sales-to-cash business process), describing all the activities involved in taking customer orders, fulfilling those orders, and collecting cash. Chapter 15 examines the expenditure cycle (also referred to as the purchase-to-pay business process), describing all the activities involved in ordering, receiving, and paying for merchandise, supplies, and services. Chapter 16 reviews the production (manufacturing) cycle, with a special focus on the implications of recent cost accounting developments, such as activity-based costing, for the design of the production cycle information system. Chapter 17 explains the human resources management/payroll cycle, focusing primarily on the activities involved in processing payroll. Chapter 18 explores the general ledger and reporting activities in an organization, discussing topics such as XBRL, the balanced scorecard, and the switch from GAAP to IFRS. Each of these five chapters explains the three basic functions performed by the AIS: efficient transaction processing, provision of adequate internal controls to safeguard assets (including data), and preparation of information useful for effective decision making. Part V: The REA Data Model Part V consists of three chapters that focus on the REA data model, which provides a conceptual tool for designing and understanding the database underlying an AIS. Chapter 19 introduces the REA data model and how it can be used to design an AIS database. The chapter focuses on modeling the revenue and expenditure cycles. It also demonstrates how the REA model can be used to develop an AIS that can not only generate traditional financial statements and reports but can also more fully meet the information needs of management. PREFACE Chapter 20 explains how to implement an REA data model in a relational database system. It also shows how to query a relational database to produce various financial statements and management reports. Chapter 21 explains how to develop REA data models of the production, HR/payroll, and financing cycles. It also discusses a number of advanced modeling issues such as the acquisition and sale of intangible products and services and rental transactions. Part VI: The Systems Development Process Part VI consists of three chapters that cover various aspects of the systems development process. Chapter 22 introduces the systems development life cycle and discusses the introductory steps of this process (systems analysis, feasibility, and planning). Particular emphasis is placed on the behavioral ramifications of change. Chapter 23 discusses an organization’s many options for acquiring or developing an AIS (e.g., purchasing software, writing software, end-user-developed software, and outsourcing) and for speeding up or improving the development process (business process management, prototyping, agile methodologies, and computer-assisted software engineering). Chapter 24 covers the remaining stages of the systems development life cycle (conceptual design, physical design, implementation, and operation and maintenance) and emphasizes the interrelationships among the phases. SUPPLEMENTAL RESOURCES For more information and resources, visit www.pearsonglobaleditions.com. TECHNOLOGY-REINFORCED LEARNING Revel™ Educational Technology Designed for the Way Today’s Students Read, Think, and Learn When students are engaged deeply, they learn more effectively and perform better in their courses. This simple fact inspired the creation of Revel: an interactive learning environment designed for the way today’s students read, think, and learn. Revel enlivens course content with media interactives and assessments—integrated directly within the authors’ narrative—that provide opportunities for students to read, practice, and study in one continuous experience. This immersive educational technology replaces the print textbook and is designed to measurably boost students’ understanding, retention, and preparedness. Learn more about Revel http://www.pearsonhighered.com/revel/ EXCEL HOMEWORK PROBLEMS Accountants need to become proficient with Excel because it is a useful tool for tasks related to every business process. That is why each of the chapters in the business process section contains several homework problems designed to teach new Excel skills in a context related to one of the business processes discussed in the chapter. As with any software, Microsoft regularly releases updates to Microsoft Office, but not everyone always immediately switches. During your career you will periodically move to a newer version of Excel. When you do, you will find that sometimes you need to make only minor changes to existing spreadsheets, but other times you may have to make more significant changes because the newer version of Excel now incorporates different features and functions. So how do you keep abreast of changes? And how can you learn new Excel skills “on the job” to simplify tasks that you now find yourself doing repeatedly? You could pay to take a course, but that can be costly, time-consuming and not always timely. Alternatively, you can develop life-long learning skills to continuously update your knowledge. One important way to do this is to begin now to save copies of two types of articles that regularly appear in the Journal of Accountancy. The first is the monthly column, “Technology Q&A,” which often contains answers to questions about how do you do something in a newer version of Excel that you know how to do in an older version. The second type of article is a complete tutorial about a powerful way to use one or more Excel functions to automate a recurring task. Often, this second type of article has an online spreadsheet file that you can download and use to follow along with the example and thereby teach yourself a new skill. 23 24 PREFACE The Journal of Accountancy website maintains an archive of these articles that you can search to see if there is one that addresses a task that is new for you. Even if the article explains how to do something (such as create a pivot table) in an older version of Excel, in most cases you will find that many of the steps have not changed. For those that have, if you read the old way to do it as described in the article, you can then use Excel’s built-in help feature to see how to do the same task in the newer version that you are now using. The ability to learn how to use new versions of software on your own is an important lifelong learning skill. Indeed, recruiters are looking for evidence that a job candidate not only has acquired a body of knowledge but also knows how to research and learn new versions of existing software tools. The various Excel homework problems in this text help you learn how to do this. From the Authors TO THE INSTRUCTOR This book is intended for use in a one-semester course in accounting information systems at either the undergraduate or graduate level. Introductory financial and managerial accounting courses are suggested prerequisites, and an introductory information systems course that covers a computer language or software package is helpful, but not necessary. The book can also be used as the main text in graduate or advanced undergraduate management information systems courses. The topics covered in this text provide information systems students with a solid understanding of transaction processing systems that they can then build on as they pursue more in-depth study of specific topics such as databases, data analytics, networks, systems analysis and design, cloud computing, virtualization, blockchain, artificial intelligence, Internet of Things, computer security, and information system controls. TO THE STUDENT As in previous editions, the fifteenth edition of Accounting Information Systems is designed to prepare you for a successful accounting career whether you enter public practice, industry, or government. All of you will be users of accounting information systems. In addition to being users, some of you will become managers. Others will become internal and external auditors, and some of you will become consultants. Regardless of your role, you will need to understand how accounting information systems work in order to effectively measure how cost-effectively they perform, to assess their reliability and that of the information produced, or to lead the redesign and implementation of new and better systems. Mastering the material presented in this text will give you the foundational knowledge you need to excel at all those tasks. This text discusses important new IT developments, such as blockchain and data analytics, because such developments affect business processes and often cause organizations to redesign their accounting systems to take advantage of new capabilities. The focus, however, is not on IT for the sake of IT, but on how IT affects business processes and controls. Indeed, new IT developments not only bring new capabilities, but also often create new threats and affect the overall level of risk. This text will help you understand these issues so that you can properly determine how to modify accounting systems controls to effectively address those new threats and accurately assess the adequacy of controls in those redesigned systems. We also discuss the effect of recent regulatory developments, such as the EU’s General Data Privacy Regulation (GDPR) and similar legislation in California and other states, on the design and operation of accounting systems. In addition to technology- and regulatory-driven changes, companies are responding to the increasingly competitive business environment by reexamining every internal activity to reap the most value at the least cost. As a result, accountants are asked to do more than simply report the results of past activities. They must take a more proactive role in both providing and interpreting financial and nonfinancial information about the organization’s PREFACE activities. Therefore, throughout this text, we discuss how accountants can improve the design and functioning of the accounting information system (AIS) so that it truly adds value to the organization by providing management with the information needed to effectively run an organization. Acknowledgments We wish to express our appreciation to all supplements authors for preparing the various supplements that accompany this edition. We thank Martha M. Eining of the University of Utah and Carol F. Venable of San Diego State University for preparing the comprehensive cases included on our website. We are also grateful to Iris Vessey for her contributions to the problem material. We thank Bill Heninger of Brigham Young University for allowing us to use portions of his database normalization tutorial to create the appendix to Chapter 4. Perhaps most importantly, we are indebted to the numerous faculty members throughout the world who have adopted the earlier editions of this book and who have been generous with their suggestions for improvement. We are especially grateful to the following faculty who participated in reviewing the fifteenth edition throughout various stages of the revision process: A. Faye Borthick, Georgia State University Gerald Childs, Waukesha County Technical College Steven Johnson, Minnesota State University, Mankato Stanley X Lewis, Troy University Andrew B. Nyaboga, William Paterson University Magdy Roufaiel, Empire State College Milton Shen, University of Alabama - Huntsville Jennifer Tseng, Mission College Thomas L. Zeller, Loyola University Chicago We are grateful for permission received from four professional accounting organizations to use problems and unofficial solutions from their past professional examinations in this book. Thanks are extended to the American Institute of Certified Public Accountants for use of CPA Examination materials, to the Institute of Certified Management Accountants for use of CMA Examination materials, to the Institute of Internal Auditors for use of CIA Examination materials, and to the Society of Management Accountants of Canada for use of SMAC Examination materials. We also wish to thank Netsuite, Inc., for providing permission to use screenshots of their software throughout the text. Of course, any errors in this book remain our responsibility. We welcome your comments and suggestions for further improvement. Finally, we want to thank our wives and families for their love, support, and encouragement. We also want to thank God for giving us the ability to start and complete this book. —Marshall B. Romney Springville, Utah —Paul John Steinbart Apache Junction, Arizona —Scott L. Summers Provo, Utah —David A. Wood Provo, Utah 25 26 PREFACE Global Edition Acknowledgments CONTRIBUTOR Lynette Barnard, University of Cape Town REVIEWERS My Lan Lu, University of Gronigen Richard Bruce, University of Sheffield Conceptual Foundations of Accounting Information Systems PA R T I CHAPTER 1 Accounting Information Systems: An Overview CHAPTER 2 Overview of Transaction Processing and Enterprise Resource Planning Systems Kheng Guan Toh/Shutterstock CHAPTER 3 Systems Documentation Techniques 27 CHAPTER 1 Accounting Information Systems: An Overview LEARNING OBJECTIVES After studying this chapter, you should be able to: 1. Distinguish data from information, discuss the characteristics of useful information, and explain how to determine the value of information. 2. Explain the decisions an organization makes, the information needed to make them, and the major business processes present in most companies. 3. Explain how an accounting information system (AIS) adds value to an organization, how it affects and is affected by corporate strategy, and its role in a value chain. I N TEGRATIV E C ASE S&S After working for years as a regional manager for a retail organization, Scott Parry opened his own business with Susan Gonzalez, one of his district managers, as his partner. They formed S&S to sell appliances and consumer electronics. Scott and Susan pursued a “clicks and bricks” strategy by renting a building in a busy part of town and adding an electronic storefront. Scott and Susan invested enough money to see them through the first six months. They will hire 15 employees within the next two weeks—three to stock the shelves, four sales representatives, six checkout clerks, and two to develop and maintain the electronic storefront. Scott and Susan will host S&S’s grand opening in five weeks. To meet that deadline, they have to address the following important issues: 1. What decisions do they need to make to be successful and profitable? For example: a. How should they price products to be competitive yet earn a profit? b. Should they extend credit, and, if so, on what terms? How can they accurately track what customers owe and pay? c. How should they hire, train, and supervise employees? What compensation and benefits package should they offer? How should they process payroll? d. How can they track cash inflows and outflows to avoid a cash squeeze? e. What is the appropriate product mix? What inventory quantities should they carry, given their limited showroom space? 28 Ndul/123RF 2. What information do Scott and Susan need to make those decisions? a. What information do the external entities they interact with need? b. What information do management and other employees need? c. How can they gather, store, and disseminate that information? 3. What business processes are needed, and how should they be carried out? 4. What functionality should be provided on the website? Although Scott and Susan could use an educated guess or “gut feeling” to make these decisions, they know they can make better decisions if they obtain additional information. A well-designed AIS can solve these issues and provide the information they need to make any remaining decisions. Introduction We begin this chapter by explaining important terms and discussing the kinds of information organizations need and the business processes used to produce that information. We continue with an exploration of what an accounting information system (AIS) is, how an AIS adds value to an organization, how an AIS and corporate strategy affect each other, and the role of the AIS in the value chain. A system is a set of detailed methods, procedures, and routines that carry out specific activities, perform a duty, achieve goals or objectives, or solve one or more problems. Most systems are composed of smaller subsystems that support the larger system. For example, a college of business is a system composed of various departments, each of which is a subsystem. Moreover, the college itself is a subsystem of the university. Each subsystem is designed to achieve one or more organizational goals. Changes in subsystems cannot be made without considering the effect on other subsystems and on the system as a whole. Goal conflict occurs when a subsystem’s goals are inconsistent with the goals of another subsystem or with the system as a whole. Goal congruence occurs when a subsystem achieves its goals while contributing to the organization’s overall goal. The larger the organization and the more complicated the system, the more difficult it is to achieve goal congruence. Data are facts that are collected, recorded, stored, and processed by an information system. Businesses need to collect several kinds of data such as the activities that take place, the resources affected by the activities, and the people who participate in the activity. For example, the business needs to collect data about a sale (date, total amount), the resource sold (good or service, quantity sold, unit price), and the people who participated (customer, salesperson). Information is data that have been organized and processed to provide meaning and context that can improve the decision-making process. As a rule, users make better decisions as the quantity and quality of information increase. Table 1-1 presents 14 characteristics that make information useful and meaningful. system - Detailed methods, procedures, and routines that carry out activities, perform a duty, achieve goals or objectives, or solve problems. goal conflict - When a subsystem’s goals are inconsistent with the goals of another subsystem or the system as a whole. goal congruence - When a subsystem achieves its goals while contributing to the organization’s overall goal. data - Facts that are collected, recorded, stored, and processed by an information system. information - Data that have been organized and processed to provide meaning and improve decision making. 29 30 PART I ConCEPTuAl FounDATIonS oF ACCounTIng InFoRmATIon SySTEmS TABLE 1-1 machine-readable - Data in a format that can be processed by a computer. ●● ●● ●● ●● information technology (IT) The computers and other electronic devices used to store, retrieve, transmit, and manipulate data. value of information - The benefit provided by information minus the cost of producing it. Access restricted Able to limit access to authorized parties Accurate Correct; free of error; accurately represents events and activities Available Available to users when needed; in a format that can be easily and quickly used Reputable Perceived as true and credible due to highly regarded source or content Complete Does not omit aspects of events or activities; of enough breadth and depth Concise Clear, succinct; appropriate volume presented briefly but comprehensively Consistent Presented in same format over time Current Includes event and activity data up to the present date and time Objective Unbiased; unprejudiced; impartial Relevant Reduces uncertainty; improves decision making; applicable and helpful Timely Provided in time for decision makers to make decisions Useable Easy to use for different tasks; human and machine readable Understandable Presented in a useful and intelligible format; easily comprehended and interpreted Verifiable Same information produced by two independent, knowledgeable people Data is most useful when it is in a machine-readable format that can be read and processed by a computer. This processing may involve data collection, recording, storage, updating, and data dissemination. For example, public companies are now required to code their financial statements using XBRL (eXtensible Business Reporting Language)—a programming language designed specifically to facilitate the communication of financial and other business information. Without XBRL, electronic documents are digital versions of paper reports. Humans can read the data, but computers cannot automatically process the data until a person manually enters it in the appropriate format. XBRL changes that by encoding information about what a particular data item means so that other computer programs can understand what to do with it. XBRL is discussed more fully in Chapter 16. Using machine readable formats like XBRL improves many of the other 14 characteristics that make information useful. For example, XBRL improves: ●● information overload - Exceeding the amount of information a human mind can absorb and process, resulting in a decline in decision-making quality and an increase in the cost of providing information. Characteristics of Useful Information Reliability by reducing human error and using standard taxonomies. Relevance by assigning relevant meaning to data so it can be compared to similar data from other organizations. Accessibility by enabling the automatic importing of data into decision models and other computer systems. Understandability and usability by making the data readable to both humans and computers. Timeliness by reducing the time needed to import, produce, and distribute information. Machine readable data also facilitates newer technologies such as artificial intelligence and data analytics, which are discussed later in the chapter. However, there are limits to the amount of information the human mind can absorb and process. Information overload occurs when those limits are passed, resulting in a decline in decision-making quality and an increase in the cost of providing that information. Information system designers use information technology (IT) to help decision makers more effectively filter and condense information. For example, Walmart has invested heavily in IT so that every day it can collect and process almost 50 petabytes of transaction data and mine more than 200 internal and external databases to produce valuable information. The value of information is the benefit produced by the information minus the cost of producing it. Benefits of information include reduced uncertainty, improved decisions, and improved ability to plan and schedule activities. The costs include the time and resources spent to produce and distribute the information. Information costs and benefits can CHAPTER 1 ACCounTIng InFoRmATIon SySTEmS: An ovERvIEW 31 be difficult to quantify, and it is difficult to determine the value of information before it has been produced and utilized. Nevertheless, the expected value of information should be calculated as effectively as possible so that the costs of producing the information do not exceed its benefits. To illustrate the value of information, consider the case of 7-Eleven. When a Japanese company licensed the very successful 7-Eleven name from Southland Corporation, it invested heavily in IT. However, the U.S. stores did not. Each 7-Eleven store in Japan was given a computer that: ●● ●● ●● ●● ●● Keeps track of the 3,000 items sold in each store and determines what products are moving, at what time of day, and under what weather conditions. Keeps track of what and when customers buy to make sure it has in stock the products most frequently purchased. Orders sandwiches and rice dishes from suppliers automatically. Orders are placed and filled three times a day so that stores always have fresh food. In addition, suppliers can access 7-Eleven sales data electronically so that they can forecast demand. Coordinates deliveries with suppliers. This reduces deliveries from 34 to 12 a day, resulting in less clerical receiving time. Prepares a color graphic display that indicates which store areas contribute the most to sales and profits. Average daily sales of 7-Eleven Japan were 30% higher and its operating margins almost double those of its closest competitor. What happened to Southland and its 7-Eleven stores in the United States? Profits declined, and Southland eventually had to file for bankruptcy. 7-Eleven Japan came to the company’s rescue and purchased 64% of Southland. As shown in Figure 1-1, an information system is the combination of the people and the technologies in an organization that collect, record, store, and process data to produce the information needed to make informed decisions. information system - The people and technologies in an organization that produce information. Information Needs and Business Processes All organizations need information in order to make effective decisions. In addition, all organizations have certain business processes in which they are continuously engaged. A business process is a set of related, coordinated, and structured activities and tasks that are performed by a person, a computer, or a machine, and that help accomplish a specific organizational goal. To make effective decisions, organizations must decide what decisions they need to make, what information they need to make the decisions, and how to gather and process the data needed to produce the information. This data gathering and processing is often tied to the business process - A set of related, coordinated, and structured activities and tasks, performed by a person, a computer, or a machine, that helps accomplish a specific organizational goal. FIGURE 1-1 The Components of an Information System People IS Organization Technology 32 PART I ConCEPTuAl FounDATIonS oF ACCounTIng InFoRmATIon SySTEmS basic business processes in an organization. To illustrate the process of identifying information needs and business processes, let’s return to our S&S case study. INFORMATION NEEDS Scott and Susan decide they must understand how S&S functions before they can identify the information they need to manage S&S effectively. Then they can determine the types of data and procedures they will need to collect and produce that information. They created Table 1-2 TABLE 1-2 Overview of S&S’s Business Processes, Key Decisions, and Information Needs Business Processes Key Decisions Information Needs Acquire capital How much Cash flow projections Find investors or borrow funds Pro forma financial statements If borrowing, how to obtain best terms Loan amortization schedule Size of building Capacity needs Amount of equipment Building and equipment prices Rent or buy Market study Location Tax tables and depreciation regulations Acquire building and equipment How to depreciate Hire and train employees Experience requirements Job descriptions How to assess integrity and competence of applicants Applicant job history and skills How to train employees Acquire inventory What models to carry Market analyses Optimal level of inventory to carry Sales and inventory turnover forecasts How much to purchase Inventory status reports How to manage inventory (store, control, etc.) Vendor performance Which vendors; best quality, prices Advertising and marketing Sell merchandise Which media Cost analyses Content Market coverage What is optimal price for each product Product costs; desired margins How to customize products for customers Customer needs and preferences How to deliver products to customer Customer delivery preferences Offer in-house credit; determine credit limits Credit card costs; company policies Which credit cards to accept Customer credit status Collect payments from customers If offering credit, what terms How to effectively handle cash receipts Customer account status Accounts receivable aging report Accounts receivable records Pay employees Amount to pay Sales (for commissions) Deductions and withholdings Time worked (hourly employees) Process payroll in-house or use outside service W-4 forms Costs of external payroll service Pay taxes Payroll tax requirements Government regulations Sales tax requirements Total wage expense Total sales Pay vendors Whom to pay Vendor invoices When to pay Accounts payable records How much to pay Payment terms CHAPTER 1 ACCounTIng InFoRmATIon SySTEmS: An ovERvIEW to summarize part of their analysis. It lists S&S’s basic business processes, some key decisions that need to be made for each process, and information they need to make the decisions. Scott and Susan realize that the list is not exhaustive, but they are satisfied that it provides a good overview of S&S. They also recognize that not all the information needs listed in the right-hand column will be produced internally by S&S. Information about payment terms for merchandise purchases, for example, will be provided by vendors. Thus, S&S must effectively integrate external data with internally generated data so that Scott and Susan can use both types of information to run S&S. S&S will interact with many external parties, such as customers, vendors, and governmental agencies, as well as with internal parties such as management and employees. To get a better handle on the more important interactions with these parties, they prepared Figure 1-2. BUSINESS PROCESSES Scott decides to reorganize the business processes listed in Table 1-2 into groups of related transactions. A transaction is an agreement between two entities to exchange goods or services or any other event that can be measured in economic terms by an organization. Examples include selling goods to customers, buying inventory from suppliers, and paying employees. The process that begins with capturing transaction data and ends with informational output, such as the financial statements, is called transaction processing. Transaction processing is covered in more depth in Chapter 2. Many business activities are pairs of events involved in a give-get exchange. Most organizations engage in a small number of give-get exchanges, but each type of exchange happens many times. For example, S&S will have thousands of sales to customers every year in exchange for cash. Likewise, S&S will continuously buy inventory from suppliers in exchange for cash. These exchanges can be grouped into five major business processes or transaction cycles: ●● The revenue cycle, where goods and services are sold for cash or a future promise to receive cash. This cycle is discussed in Chapter 14. Vendors Purchase Orders Customer Orders Goods & Services Goods & Services Vendor Invoices Customer Invoices Vendor Payments Customer Payments Invest Funds Investors Financial Statements Loans Creditors Banks Labor & Services Dividends Accounting Information System at S&S Wages, Salaries & Commissions Financial Statements Financial Statements Budgets & Accounting Entries Deposits Regulations & Tax Forms Withdrawals Taxes & Reports Bank Statements Employees Managerial Reports & Loan Payments transaction - An agreement between two entities to exchange goods or services, such as selling inventory in exchange for cash; any other event that can be measured in economic terms by an organization. transaction processing - Process of capturing transaction data, processing it, storing it for later use, and producing information output, such as a managerial report or a financial statement. give-get exchange - Transactions that happen a great many times, such as giving up cash to get inventory from a supplier and giving employees a paycheck in exchange for their labor. business processes or transaction cycles - The major give-get exchanges that occur frequently in most companies. revenue cycle - Activities associated with selling goods and services in exchange for cash or a future promise to receive cash. FIGURE 1-2 Customers Management Government Agencies 33 Interactions between S&S and External and Internal Parties 34 PART I ConCEPTuAl FounDATIonS oF ACCounTIng InFoRmATIon SySTEmS expenditure cycle - Activities associated with purchasing inventory for resale or raw materials in exchange for cash or a future promise to pay cash. production cycle - Activities associated with using labor, raw materials, and equipment to produce finished goods. Also called conversion cycle. human resources/payroll cycle - Activities associated with hiring, training, compensating, evaluating, promoting, and terminating employees. financing cycle - Activities associated with raising money by selling shares in the company to investors and borrowing money as well as paying dividends and interest. ●● ●● ●● ●● The expenditure cycle, where companies purchase inventory for resale or raw materials to use in producing products in exchange for cash or a future promise to pay cash. This cycle is discussed in Chapter 15. The production cycle, or conversion cycle, where raw materials are transformed into finished goods. This cycle is discussed in Chapter 16. The human resources/payroll cycle, where employees are hired, trained, compensated, evaluated, promoted, and terminated. This cycle is discussed in Chapter 17. The financing cycle, where companies sell shares in the company to investors and borrow money, and where investors are paid dividends and interest is paid on loans. These cycles process a few related transactions repeatedly. For example, most revenue cycle transactions are either selling goods or services to customers or collecting cash for those sales. Figure 1-3 shows the main transaction cycles and the give-get exchange inherent in each cycle. These basic give-get exchanges are supported by a number of other business activities. For example, S&S may need to answer a number of customer inquiries and check inventory levels before it can make a sale. Likewise, it may have to check customer credit before a credit sale is made. Accounts receivable will have to be increased each time a credit sale is made and decreased each time a customer payment is received. Table 1-3 lists the major activities in each transaction cycle. Financing Cycle Give Cash Funds Get Cash Funds Funds Expenditure Cycle Human Resources/Payroll Cycle Give Cash Get Goods/ Raw Materials Give Cash Get Labor Data General Ledger & Reporting System Data Data Labor Get Finished Goods Give Raw Materials Finished Goods Revenue Cycle FIGURE 1-3 The AIS and Its Subsystems Give Goods Raw Materials Production Cycle Give Labor Get Cash Purchased Goods Data Data Information for Both Internal and External Users CHAPTER 1 ACCounTIng InFoRmATIon SySTEmS: An ovERvIEW Notice that the last activity listed in Table 1-3 for each transaction cycle is “Send appropriate information to the other cycles.” Figure 1-3 shows how these various transaction cycles relate to one another and interface with the general ledger and reporting system, which is used to generate information for both management and external parties. The general ledger and reporting system is discussed in more depth in Chapter 18. In many accounting software packages, the various transaction cycles are implemented as separate modules. Not every organization needs to implement every module. Retail stores like S&S, for example, do not have a production cycle and would not implement that module. Moreover, some organizations have unique requirements. Financial institutions, for example, have demand deposit and installment-loan cycles that relate to transactions involving customer accounts and loans. In addition, the nature of a given transaction cycle differs across different types of organizations. For example, the expenditure cycle of a service company, TABLE 1-3 Common Cycle Activities Transaction Cycle Major Activities in the Cycle Revenue Receive and answer customer inquiries Take customer orders and enter them into the AIS Approve credit sales Check inventory availability Initiate back orders for goods out of stock Pick and pack customer orders Ship goods to customers or perform services Bill customers for goods shipped or services performed Update (increase) sales and accounts receivable Receive customer payments and deposit them in the bank Update (reduce) accounts receivable Handle sales returns, discounts, allowances, and bad debts Prepare management reports Send appropriate information to the other cycles Expenditure Request goods and services be purchased Prepare, approve, and send purchase orders to vendors Receive goods and services and complete a receiving report Store goods Receive vendor invoices Update (increase) accounts payable Approve vendor invoices for payment Pay vendors for goods and services Update (reduce) accounts payable Handle purchase returns, discounts, and allowances Prepare management reports Send appropriate information to the other cycles Human Resources/Payroll Recruit, hire, and train new employees Evaluate employee performance and promote employees Discharge employees Update payroll records Collect and validate time, attendance, and commission data Prepare and disburse payroll Calculate and disburse taxes and benefit payments 35 general ledger and reporting system - Information-processing operations involved in updating the general ledger and preparing reports for both management and external parties. 36 PART I ConCEPTuAl FounDATIonS oF ACCounTIng InFoRmATIon SySTEmS TABLE 1-3 Continued Transaction Cycle Major Activities in the Cycle Human Resources/Payroll Prepare employee and management reports Send appropriate information to the other cycles Production Design products Forecast, plan, and schedule production Request raw materials for production Manufacture products Store finished products Accumulate costs for products manufactured Prepare management reports Send appropriate information to the other cycles Financing Forecast cash needs Sell stock/securities to investors Borrow money from lenders Pay dividends to investors and interest to lenders Retire debt Prepare management reports Send appropriate information to the other cycles such as a public accounting or a law firm, does not normally involve processing transactions related to the purchase, receipt, and payment for merchandise that will be resold to customers. Each transaction cycle can include many different business processes or activities. Each business process can be relatively simple or quite complex. After preparing Tables 1-2 and 1-3 and Figures 1-2 and 1-3, Scott and Susan believe they understand S&S well enough to begin shopping for an information system. Susan recalled a previous employer that had several separate information systems because its software was not designed to accommodate the information needs of all managers. She also vividly recalled attending one meeting where she witnessed the negative effects of having multiple systems. The head of marketing had one report on year-to-date sales by product, the production manager had a different report that contained different sales figures, and the controller’s report, which was produced by the general ledger system, had yet a third version of year-to-date sales. Over an hour was wasted trying to reconcile those different reports! Susan vowed to ensure that S&S did not ever find itself in such a mess. She would make sure that any system selected would have the capability to integrate both financial and nonfinancial data about S&S’s various business processes so that everyone could pull information from the same system. accounting information system (AIS) - A system that collects, records, stores, and processes data to produce information for decision makers. It includes people, procedures and instructions, data, software, information technology infrastructure, and internal controls and security measures. accounting - The systematic and comprehensive recording of an organization’s financial transactions, including summarizing, analyzing, and reporting these transactions to all users. Accounting Information Systems It has often been said that accounting is the language of business. If that is the case, then an accounting information system (AIS) is the intelligence—the information-providing vehicle—of that language. Accounting is the systematic and comprehensive recording of an organization’s financial transactions. It also includes summarizing, analyzing, and reporting these transactions to management, owners/investors, oversight agencies, and tax collection entities. That means accounting is a data identification, collection, and storage process as well as an information development, measurement, and communication process. By definition, accounting is an information system, since an AIS collects, records, stores, and processes accounting and other data to produce information for decision makers. This is illustrated in Figure 1-4. An AIS can be a paper-and-pencil manual system, a complex system using the latest in IT, or something in between. Regardless of the approach taken, the process is the same. The CHAPTER 1 ACCounTIng InFoRmATIon SySTEmS: An ovERvIEW FIGURE 1-4 AIS Data 37 AIS Decision Information User AIS must collect, enter, process, store, and report data and information. The paper and pencil or the computer hardware and software are merely the tools used to produce the information. This text does not distinguish an AIS from other information systems. Instead, our viewpoint is that the AIS can and should be the organization’s primary information system and that it provides users with the information they need to perform their jobs. There are six components of an AIS: 1. 2. 3. 4. 5. The people who use the system. The procedures and instructions used to collect, process, and store data. The data about the organization and its business activities. The software used to process the data. The information technology infrastructure, including the computers, peripheral devices, and network communications devices used in the AIS. 6. The internal controls and security measures that safeguard AIS data. These six components enable an AIS to fulfill three important business functions: 1. Collect and store data about organizational activities, resources, and personnel. Organizations have a number of business processes, such as making a sale or purchasing raw materials, which are repeated frequently. 2. Transform data into information so management can plan, execute, control, and evaluate activities, resources, and personnel. Decision making is discussed in detail later in this chapter. 3. Provide adequate controls to safeguard the organization’s assets and data. Control concepts are discussed in detail in Chapters 8–13. Since accounting data comes from an AIS, AIS knowledge and skills are critical to an accountant’s career success. Interacting with an AIS is one of the most important activities accountants perform. Other important AIS-related activities include designing information systems and business process improvements, as discussed in Chapters 22 to 24. Focus 1-1 explains a specialty to designate that certain CPAs (Certified Public Accountants) have an in-depth knowledge of AIS topics. HOW AN AIS CAN ADD VALUE TO AN ORGANIZATION A well-designed AIS can add value to an organization by: 1. Improving the quality and reducing the costs of products or services. For example, an AIS can monitor machinery so operators are notified immediately when performance falls outside acceptable quality limits. This helps maintain product quality, reduces waste, and lowers costs. 2. Improving efficiency. For example, timely information makes a just-in-time manufacturing approach possible, as it requires constant, accurate, up-to-date information about raw materials inventories and their locations. 3. Sharing knowledge. Sharing knowledge and expertise can improve operations and provide a competitive advantage. For example, CPA firms use their information systems to share best practices and to support communication between offices. Employees can search the corporate database to identify experts to provide assistance for a particular client; thus, a CPA firm’s international expertise can be made available to any local client. 4. Improving the efficiency and effectiveness of its supply chain. For example, allowing customers to directly access inventory and sales order entry systems can reduce sales and marketing costs, thereby increasing customer retention rates. An AIS Processes Data to Produce Information for Decision Makers 38 PART I FOCUS 1-1 ConCEPTuAl FounDATIonS oF ACCounTIng InFoRmATIon SySTEmS CITP—An IT Specialty Designation for CPAs The American Institute of Certified Public Accountants (AICPA) offers several specialty designations for CPAs. The CITP (Certified Information Technology Professional) designation reflects the AICPA’s recognition of the importance of IT and its interrelationship with accounting. A CITP possesses a broad range of business, managerial, and technological knowledge, making it possible for the CITP to understand how organizations use IT to achieve their business objectives. To obtain a CITP certification, a person must demonstrate a mastery of the following topics: information system management, business intelligence, fraud, risk assessment, internal control concepts, and how to test and evaluate an information system. There are many reasons to earn the CITP certification: • Because only CPAs can be CITPs, this certification further differentiates you from others in the marketplace. • It affirms your value as an IT specialist and increases your value to your employer or clients. • It is a great “calling card” for IT people who want to be leaders in industry, public practice, government, or academia. • It opens the doors to new technology-related roles and opportunities. • Automatic membership in the IT Section, which allows you to meet, share best practices, network, and communicate with other CITPs. You can also receive CITP newsletters and other communications, attend CITP Webinars, receive CITP member discounts, and access exclusive CITP resources and content on the CITP website. To qualify for the CITP designation, you must: • Be a CPA and a member of the AICPA • Pass the CITP exam • In the five years preceding your application, meet the 1,000-hour experience and the 75-hour continuing professional education requirements Based on information from http://www.aicpa.org. 5. Improving the internal control structure. An AIS with the proper internal control structure can help protect systems from fraud, errors, system failures, and disasters. 6. Improving decision making. Improved decision making is vitally important and is discussed below in more detail. AN AIS CAN USE ARTIFICIAL INTELLIGENCE AND DATA ANALYTICS TO IMPROVE DECISION MAKING artificial intelligence (AI) - The use of computer systems to simulate human intelligence processes such as learning, reasoning, and self-improvement. Decision making is a complex, multistep activity that involves identifying a problem, collecting and interpreting data, evaluating ways to solve the problem, selecting a solution methodology, and determining and implementing the solution. An AIS can help in the decision-making process by providing the information to reduce uncertainty, providing feedback about the effectiveness of prior decisions, providing information in a timely manner, and identifying situations that require management action. Artificial intelligence and data analytics tools can be used in each of these decisionmaking activities to help improve decision making. Artificial intelligence (AI) uses computer systems to simulate human intelligence processes such as learning (acquiring information and rules for using it), reasoning (interpreting data and using its rules to arrive at conclusions), and self-improvement (learning from the information and past experiences to improve its rules). The AI field draws from many disciplines, including computer science, information engineering, linguistics, mathematics, philosophy, and psychology. Some popular AI applications include expert systems, intelligent routing of delivery vehicles, machine vision (used in self-driving cars), and speech recognition. Some popular AI cloud offerings include Amazon AI, Google AI, IBM Watson, and Microsoft Cognitive Services. Here are a few examples of the fields where AI is used: ●● Business. AI-driven robots now perform many highly repetitive tasks, especially in manufacturing. AI algorithms determine how to better serve customers. Website chatbots provide immediate customer service. CHAPTER 1 ●● ●● ●● ACCounTIng InFoRmATIon SySTEmS: An ovERvIEW Education. AI software automatically grades student work, assesses student performance and progress, and provides additional support as needed. Finance. Robo-based stock picking algorithms give advice on what stocks to buy and sell. Software executes most stock market trades. Personal finance applications use AI to advise their users and keep track of their finances. Healthcare. AI can make better and faster diagnoses than humans, thereby improving patient outcomes and reducing costs. For example, doctors can use IBM Watson to mine patient data, evaluate their symptoms, access external databases, communicate a diagnosis and how confident Watson is in the diagnosis, and receive and answer doctor questions. Data analytics is the use of software and algorithms to discover, describe, interpret, communicate, and apply meaningful patterns in data to improve business performance. Data analytics tools draw from many disciplines, including computer programming, mathematics, operations research, and statistics. Companies have long analyzed their past performance. Data analytics is a more recent development and is designed to focus on the future and answer questions such as why something happened, what will happen next, and how performance can be improved. Analytics tools are most efficient when there are abundant computational resources and there is a large quantity of data from multiple internal or external databases. An essential part of most analytic tools is a data dashboard that displays important data points, metrics, and key performance indicators in the form of line or bar charts, tables, or gauges. A dashboard provides a central location for businesses to monitor performance. The dashboard is connected to internal and external data sources, analyzes the data, and displays it visually in an easy-to-understand format. Dashboards are usually customized to meet the specific needs of a business process, department, or the entire company. There are many different types of analytics, including predictive, prescriptive, descriptive, and cognitive. Some analytics are named after their usage such as retail, supply chain, store optimization, sales force optimization, marketing optimization, call center optimization, web, social media, speech, credit risk, and fraud analytics. Analytics are also categorized by their use and characteristics such as actionable, visual, embedded, automated, and operational analytics. Analytics can help improve decision making in many ways. At the most basic level, analytics can identify a problem or issue for management to resolve. At an intermediate level, analytics can also collect the data needed to solve the problem, analyze it, and make recommendations to management on how to resolve it. At an advanced level, actionable insights can be integrated into the systems used to make decisions. That is, the analytics can be embedded into AIS components, such as databases, applications, and devices, and operationalized to automatically resolve problems that occur and communicate solutions to management. The data analytics market is estimated to exceed $50 billion and is growing rapidly. Businesses use analytics to increase sales, create products and services to meet new customer needs, reduce costs, and improve decision making. Here are just a few ways data analytics are used: ●● ●● ●● ●● 39 Cargill has developed an analytics platform that allows dairy farmers to use a tablet or computer to analyze large quantities of data about their cows’ living conditions, diet, and milk productivity. When cows are happier and more comfortable, they produce more milk. Under Armour uses data from MapMyFitness to determine popular running routes and times so it knows when to advertise sneakers, energy drinks, and other products. Research shows that when an advertiser sells repeat-purchase products, ads sent at the right time to consumers will generate up to 16 times more sales than when sent at other times. Most web-based retailers such as Amazon use their sales database to suggest additional products and services for its customers to purchase. A technician at a support center uses key words from a caller, as well as a database of past problems and solutions, to quickly solve technical issues. In time, when the data and analytics are robust enough, the process will be automated; customers will visit the company’s website and diagnose most problems themselves, with the most complex issues handed off to a human technician. data analytics - use of software and algorithms to find and solve problems and improve business performance. data dashboard - A display of important data points, metrics, and key performance indicators in easily understood line or bar charts, tables, or gauges. 40 PART I ConCEPTuAl FounDATIonS oF ACCounTIng InFoRmATIon SySTEmS ●● An airline embeds sensors in all important airplane components, continuously monitors them, automatically schedules preventive maintenance, and provides a detailed list of what needs to be done. Focus 1-2 explains how Walmart uses data analytics to improve their business. FOCUS 1-2 Data Analytics at Walmart Walmart, the world’s biggest retailer, has more than 245 million customers who shop at more than 20,000 stores in 28 countries. Walmart tracks individual customers, gathering data on what customers like and what they buy. Every hour, more than 1 million customers purchase something, which generates 2.5 petabytes (a quadrillion bytes) of unstructured data. The 2.5 petabytes are roughly 167 times the books contained in America’s Library of Congress. To make use of this data, Walmart spent considerable resources to become a leader in big data analytics. In fact, Walmart’s data analytics efforts started before the term big data became popular. Walmart’s analytics systems analyze millions of products and hundreds of millions of customers using data gathered from many different internal and external data sources. Data analytics support several Walmart goals. First, they optimize and personalize customers’ shopping experiences, whether they are in a store, shopping online via a computer or a mobile device, or browsing Walmart’s website. They analyze customer data and buying behaviors to better anticipate customer needs. Walmart also uses analytics to improve the store checkout experience. Second, data analytics optimize operational efficiency, including increasing sales and profits, facilitating better and quicker decision making, improving store and employee efficiency, improving product assortment, managing the supply chain, and locating distribution centers and stores. Analytics helped Walmart (1) develop smarter stocking, pricing, merchandising, and marketing solutions in real time and (2) make its pharmacies more efficient. Walmart analyzed sales before and after big data analytics were used to change their e-commerce strategy and found that online sales increased 10% to 15%, resulting in $1 billion in incremental revenue. The data analytics team at Walmart Labs monitors Walmart.com and analyzes every clickable action to determine what consumers buy online and how to improve their online experience. The Lab also monitors what is trending on Twitter, local events such as sports activities and concerts that affect sales, and local weather deviations to determine how they affect buying patterns. Walmart’s predictive data analytics software contains machine learning technologies that continuously improve the accuracy of analytics algorithms. Walmart built the world’s biggest private cloud to facilitate its data analytics processes. At its headquarters, Walmart also created a Data Café (Collaborative Analytics Facilities for Enterprise) to model, manipulate, and visualize data to create solutions. The Café uses Walmart’s transaction data as well as data from 200 other data sources such as economic, gasoline, local events, social media, telecommunications, television, and weather data to predict outcomes and resolve issues to make Walmart stores more efficient, responsive, and profitable. Employees are encouraged to submit their problems to Data Café experts for a solution usually produced in minutes rather than weeks and displayed on the Café’s touchscreen smartboards. These real-time solutions help correct errors instantly, gain sales and marketing insights, and track customer trends and competitor strategies. Here are two examples of Walmart’s use of the Data Café. A grocery team could not figure out why sales in a product category had suddenly declined and used the Café to drill down into the data. They found that a pricing miscalculation resulted in the product being priced higher than it should have been in some stores. In a second example, Walmart data mining algorithms found that a specific cookie was popular at all Walmart stores except one. An investigation showed that a simple stocking oversight resulted in the cookies not being stocked on the store shelves. Ordering and stocking the cookies prevented the further loss of sales. THE AIS AND BLOCKCHAIN In 2008, Satoshi Nakamoto invented the blockchain to digitally record cryptocurrency transactions such as Bitcoin. Since then, blockchain technology has been adapted so that virtually everything of value can be recorded, and private blockchains have been developed for business use. CHAPTER 1 ACCounTIng InFoRmATIon SySTEmS: An ovERvIEW Just as people do not have to know exactly how the Internet or an automobile works, they do not need to know the technical details of how the blockchain works to use it. However, a basic knowledge of blockchain technology helps users make better use of the technology. Blockchain got its name from its structure, which is individual digital records, called blocks, linked together using cryptography in a single list, called a chain. The blockchain isn’t stored in a single location—it is a distributed ledger that functions as a decentralized database. Each computer in the distributed peer-to-peer network maintains a copy of the ledger to prevent a single point of failure. Since the blockchain is managed by a network that follows protocols for inter-node communication and validating new blocks, there is no need for a central authority that controls everything. The information recorded in the blockchain is made public, so everyone on the blockchain’s peer-to-peer network has a copy of the blockchain and all transactions are accessible to everyone. Here is a brief, high-level view of how the blockchain works; that is, how a transaction is added to a block and how a block is added to a chain. Blockchains are explained in more detail in Chapter 11. 1. Initiate transaction. Two parties, such as a buyer and a seller, decide to exchange something of value and request that a transaction be initiated. Instead of using actual buyer or seller names, a unique digital signature or identifier is used. This is analogous to using a part number for a product or a username for a person. 2. Validate transaction. The transaction is sent to the peer-to-peer network nodes who use algorithms to simultaneously validate transaction details, including its time, dollar amount, and participants. To achieve a consensus, a simple majority of 51% of the nodes must validate the block. The number of computers in the peer-to-peer networks can be as large as desired; the Bitcoin blockchain has millions, each with a copy of its blockchain ledger. In a public, permission-less blockchain platform like Bitcoin, every network node can record transactions and participate in the consensus process. In a private, permissioned chain, participation in the consensus process is restricted to approved nodes. 3. Create a block. Since each block in a chain can store up to 1 MB of data, the verified transactions are combined with hundreds or thousands of similar transactions to create a new block for the ledger. The transaction’s dollar amount and the digital signatures of both parties are stored in the block. 4. Calculate and insert a hash. Each block is given two unique codes, or pieces, of identifying information called a hash, which distinguishes it from other blocks. Hash codes use a mathematical algorithm to turn digital information into a string of numbers and letters. One hash is that of the current block and the second is the hash of the block that precedes it in the chain. When a new block is added to the chain, it is linked to the previous block by storing a cryptographic hash generated from the contents of the previous block. The second hash ensures that the chain is never broken and that each block is recorded in a permanent and unalterable way. The second hash makes the block tamper resistant and secure; that is, it adds a high level of assurance that the prior block contents have not been changed. If the data on a block is edited in any way, that block’s hash code changes, and the codes of all subsequent blocks change. This discrepancy makes it extremely difficult for information on the blockchain to be changed without notice. How a hash is created is discussed in Chapter 11. 5. Complete transaction. The block is added to the blockchain, and all the other computers storing the blockchain are updated automatically. This completes the transaction recording process, and the right of ownership of the item of value is passed from the seller to the buyer. Blockchain has several significant advantages, including the following: ●● Accuracy. Transactions are verified by many thousands of networked computers instead of error-prone humans. Even if a computer makes a computational mistake, the error would not spread to the rest of the blockchain unless at least 51% of the network’s computers validated the mistake. 41 blockchain - Individual digital records, called blocks, linked together using cryptography in a single list, called a chain. 42 PART I ConCEPTuAl FounDATIonS oF ACCounTIng InFoRmATIon SySTEmS ●● ●● ●● ●● ●● ●● ●● ●● ●● ●● ●● Transparency. Blockchain data are transparent. That is, all transaction details, including participant user names, transaction amount, transaction date and time, and who entered the transaction, are open for everyone on the blockchain to see. This includes authorized regulators, auditors, etc. Data consistency. In older legacy systems, data are often located in multiple databases and finding data can be complex. The data can also be inconsistent among databases, with some of them updated and others not. With blockchain, data are stored in one location only. Trust. To ensure that blockchain networks can be trusted, computers that want to join the blockchain are tested. That is, new users are required to prove themselves before they can be a part of a blockchain network. For example, in Bitcoin’s proof of work test, a system must expend significant computer power and energy to solve a complex math problem before they can add a block to the blockchain. While Bitcoin’s proof of work does not make a hack impossible, the cost of organizing an attack would almost always outweigh the benefits that could be achieved from the attack. No need for third parties. The consensus process of all nodes in the network agreeing on the blockchain’s content allows mutually distrustful parties to enter into transactions safely without trusted third parties. Single set of books. As both sides of a transaction are stored in a single source, that eliminates some of the need for a set of books for the buyer and for the seller. One set of books provides a trust level not present in current legacy systems. Cost. Blockchain eliminates the costs of human third-party verification and many transaction processing costs. Decentralization. By storing the blockchain on all network computers, the risks of data held centrally is eliminated. For example, if a copy of the blockchain is hacked or compromised, only that copy is affected. This reduces or eliminates the traditional requirement for file and database backups. Efficiency. Blockchain works all day, every day—and transactions can be finalized within minutes and considered secure in no more than a few hours. Contrast that with limited business hours and waiting days for transactions to clear and for money to be available. Privacy. Although many blockchains are public databases, where users can view transaction information, users are unable to access confidential data that identify those engaging in the transactions. Security. A blockchain is difficult to corrupt. There is no single point of failure; if one node goes down, there is a copy of the ledger on all the other nodes. Information is shared and continually reconciled by thousands of computers. New blocks are always added chronologically to the end of the blockchain. It is very difficult to go back and change a block’s contents because each block contains its own hash and the hash of the previous block. If information is changed, the hashes for the previous and subsequent blocks also change and this disrupts the ledger’s shared state. When other network computers become aware that the change has caused a problem, consensus is no longer possible. Until the problem is solved, no new blocks are added to the blockchain. In most cases, the block that caused the error is discarded and the nodes again attempt to achieve consensus. This process ensures that no single system or user can tamper with the transaction records or add invalid blocks to the blockchain. Provenance. Provenance is the history of ownership of something of value. The data collected by Blockchain shows who did what, when they did it, and the history of the item since it was entered in the blockchain. That history is transparent, verified by all network participants, and frequently reconciled. While blockchain has many important advantages, there are significant challenges to its adoption, including political and regulatory issues. These challenges include the following: ●● Cost. Cost is a blockchain advantage because transaction fees are less, but it is also a disadvantage because the technology needed to operate a blockchain is expensive. So are the thousands of hours expended to produce the custom software and backend processes needed to insert blockchain technologies into current business systems. There are also the utility costs required to run the computers that process and store the blockchain. CHAPTER 1 ACCounTIng InFoRmATIon SySTEmS: An ovERvIEW Loss of privacy and confidentiality. Since blockchain users are unable to identify those engaging in transactions, dishonest users can use blockchain networks like Bitcoin to make illegal purchases. To prevent this, some countries like the United States prohibit full anonymity by requiring online exchanges to collect customer information, verify their identity, and confirm that they are not on any list of known or suspected terrorists. ●● Susceptibility. A 51% attack is difficult to execute due to the computational power required to gain majority control of a blockchain network. That might change as technology costs decrease and hackers are able to affordably rent computational power rather than buying it. In addition, these attacks are more difficult as the number of nodes in the blockchain network increases. In summary, a blockchain is a public, global, cryptographically secure ledger that automatically records and verifies large volumes of digital transactions. The combination of blocks that cannot be changed, blocks linked together in a chain, and cryptography to secure everything creates a transaction recording system that can be trusted for transactions among untrusted partners. Focus 1-3 briefly discusses some of the many blockchain applications in use today. ●● FOCUS 1-3 Current and Planned Uses of Blockchain Blockchain was first used for digital currencies but has spread to many industries because it is a secure and costeffective way to manage all types of digital transactions. Recent startups developed their business processes using newer technologies, so they are much more likely to use blockchain. As time passes, some of these blockchaininspired startups become what some people call emerging disruptors as they begin displacing older and larger companies. Established companies with older legacy information systems find it more challenging to use blockchain. They often discover that to achieve blockchain’s advantages, they must change the way they do business. Deloitte surveyed executives at 1,000 established companies about their blockchain experience and found 74% of respondents see compelling reasons to use it, though only 34% currently do. Some 41% expected to begin using blockchain, and almost 40% will invest at least $5 million in blockchain applications. Deloitte believes blockchain adoption is higher than their survey indicates because emerging disruptors were not included in the survey. Here are just a few of the more prominent uses of blockchain: • Banks only open during business hours and deposits take up to 3 days to clear. Blockchain is always open, and deposits can be seen in 10 minutes. It is estimated that blockchain could save banks $20 billion by eliminating money in-transit costs and consumers $16 billion in banking and insurance fees. • Currently, healthcare data is stored by different institutions using different formats and standards, making it hard for doctors to understand a patient’s medical history. Using blockchain technology, patient information can be signed, time-stamped, and stored securely on a distributed ledger. Doctors and patients can go to a single source to access a patient’s health information, and patients have more control over their own health data. Blockchain could also help solve the problem of counterfeit drugs in the medical supply chain. • Recording property rights occurs when a deed is delivered to the local recording office and manually entered in the county’s database and public index. The process is costly, inefficient, time-consuming, error prone, and susceptible to fraud. Disputed property claims are difficult to reconcile. Blockchain can eliminate scanning documents and finding paper files in a recording office. Property owners can trust that their deed is accurate and permanent if its ownership is stored and verified on the blockchain. • In 2016, Overstock.com was one of the first publicly traded company to use blockchain to sell and distribute company shares. Without blockchain, selling stock involves brokers, clearing houses, and custodians. The money and shares involved in the trade are frozen for up to 3 days. With blockchain peer-to-peer trading, there is no need for intermediaries, and the shares exchange hands within minutes. Companies are also developing a blockchain application for proxy voting. • Manufacturing companies are developing applications to track the flow of materials, information, and payments as they move through their supply chains. Source of Survey data: https://www2.deloitte.com/us/en/pages/ consulting/articles/innovation-blockchain-survey.html 43 44 PART I ConCEPTuAl FounDATIonS oF ACCounTIng InFoRmATIon SySTEmS CLOUD COMPUTING, VIRTUALIZATION, AND THE INTERNET OF THINGS virtualization - Running multiple systems simultaneously on one physical computer. cloud computing - using a browser to remotely access software, data storage, hardware, and applications. Internet of Things (IoT) Embedding sensors in devices so they can connect to the Internet. Recently, many organizations have embraced virtualization, cloud computing, and the Internet of things to enhance both efficiency and effectiveness. Virtualization takes advantage of the power and speed of modern computers to run multiple systems simultaneously on one physical computer. This cuts hardware costs because fewer computers need to be purchased. Fewer machines means lower maintenance costs. Data center costs also fall because less space needs to be rented, which also reduces utility costs. Cloud computing takes advantage of the high bandwidth of the modern global telecommunication network to enable employees to use a browser to remotely access software (software as a service), hardware (infrastructure as a service), and entire application environments (platform as a service). The arrangement is referred to as a “private,” “public,” or “hybrid” cloud, depending on whether the remotely accessed resources are entirely owned by the organization, a third party, or a mix of the two. Table 1-4 compares the different levels of service provided in the cloud to eating pizza. You can either make and bake a pizza in house, buy a frozen pizza and bake it, have a pizza delivered to your home, or go out to eat a pizza. As the table shows, you can do the same with computer services (the items in blue are done in house, and the items in red are done by a cloud provider). Cloud computing can potentially generate significant cost savings. For example, instead of purchasing, installing, and maintaining separate copies of software for each end user, an organization can purchase one copy, install it on a central server, and pay for the right for a specified number of employees to simultaneously use a browser to remotely access and use that software. Public clouds eliminate the need for making major capital investments in IT, with organizations purchasing (and expensing) their use of computing resources on a pay-for-use or subscription basis. In addition to reducing costs, the centralization of computing resources with cloud computing (whether public, private, or hybrid) makes it easier to change software and hardware, thereby improving flexibility. The term Internet of Things (IoT) refers to the embedding of sensors in a multitude of devices (lights, heating and air conditioning, appliances, etc.) so that those devices can now connect to the Internet. The IoT has significant implications for information security. THE AIS AND CORPORATE STRATEGY Since most organizations have limited resources, it is important to identify the AIS improvements likely to yield the greatest return. Making a wise decision requires an understanding of the organization’s overall business strategy. To illustrate, consider the results of a CIO magazine survey of 500 Chief Information Officers. Asked to identify the three most important skill sets for a CIO, more than 75% put strategic thinking and planning on their list. Figure 1-5 shows three factors that influence the design of an AIS: developments in IT, business strategy, and organizational culture. It is also important to recognize that the design of the AIS can also influence the organization’s culture by controlling the flow of information within the organization. For example, an AIS that makes information easily accessible and widely available is likely to increase pressures for more decentralization and autonomy. TABLE 1-4 Comparing Cloud Services to Eating Pizza Traditional (make pizza from scratch in house) Dining table Soda Electricity and gas Oven Dough Toppings IaaS: Infrastructure as a Service (take and bake) PaaS: Platform as a Service (pizza delivered) SaaS: Software as a Service (dine out) CHAPTER 1 ACCounTIng InFoRmATIon SySTEmS: An ovERvIEW Business Strategy Organizational Culture 45 FIGURE 1-5 Factors Influencing Design of the AIS AIS Information Technology IT developments can affect business strategy. For example, the Internet has profoundly affected the way many activities are performed, significantly affecting both strategy and strategic positioning. The Internet dramatically cuts costs, thereby helping companies to implement a low-cost strategy. If every company used the Internet to adopt a low-cost strategy, then the effects might be problematic. Indeed, one possible outcome may be intense price competition among firms, with the likely result that most of the cost savings provided by the Internet get passed on to the industry’s customers, rather than being retained in the form of higher profits. Moreover, because every company can use the Internet to streamline its activities, a company is unlikely to gain a sustainable long-term competitive advantage. An organization’s AIS plays an important role in helping it adopt and maintain a strategic position. Achieving a close fit among activities requires that data are collected about each activity. It is also important that the information system collects and integrates both financial and nonfinancial data about the organization’s activities. THE ROLE OF THE AIS IN THE VALUE CHAIN To provide value to their customers, most organizations perform a number of different activities. Figure 1-6 shows that those activities can be conceptualized as forming a value chain consisting of five primary activities that directly provide value to customers: 1. Inbound logistics consists of receiving, storing, and distributing the materials an organization uses to create the services and products it sells. For example, an automobile manufacturer receives, handles, and stores steel, glass, and rubber. 2. Operations activities transform inputs into final products or services. For example, assembly line activities convert raw materials into a finished car and retailers remove goods from packing boxes and place the individual items on shelves for customers to purchase. 3. Outbound logistics activities distribute finished products or services to customers. An example is shipping automobiles to car dealers. Inbound Logistics The Value Chain Secondary Activities Operations Marketing and Sales Service primary activities - value chain activities that produce, market, and deliver products and services to customers and provide post-delivery service and support. FIGURE 1-6 Primary Activities Outbound Logistics value chain - linking all primary and support activities in a business. value is added as a product passes through the chain. Firm Infrastructure Human Resources Technology Purchasing 46 PART I ConCEPTuAl FounDATIonS oF ACCounTIng InFoRmATIon SySTEmS 4. Marketing and sales activities help customers buy the organization’s products or services. Advertising is an example of a marketing and sales activity. 5. Service activities provide post-sale support to customers. Examples include repair and maintenance services. support activities - value chain activities such as firm infrastructure, technology, purchasing, and human resources that enable primary activities to be performed efficiently and effectively. supply chain - An extended system that includes an organization’s value chain as well as its suppliers, distributors, and customers. Raw Materials Supplier Manufacturer Distributor Retailer Support activities allow the five primary activities to be performed efficiently and effectively. They are grouped into four categories: 1. Firm infrastructure is the accounting, finance, legal, and general administration activities that allow an organization to function. The AIS is part of the firm infrastructure. 2. Human resources activities include recruiting, hiring, training, and compensating employees. 3. Technology activities improve a product or service. Examples include research and development, investments in IT, and product design. 4. Purchasing activities procure raw materials, supplies, machinery, and the buildings used to carry out the primary activities. Using IT to redesign supply chain systems yields tremendous benefits and cost savings. For example, Tennessee Valley Authority, a power generator, reengineered its supply chain and created an enterprise-wide system that provides up-to-the-minute information, rather than the “current once a day” system that it replaced. The new system replaced 20 smaller and incompatible systems, reduced head count by 89 people, and saved $270 million in its first five years. An organization’s value chain is a part of a larger system called a supply chain. As shown in Figure 1-7, a manufacturing organization interacts with its suppliers and distributors. By paying attention to its supply chain, a company can improve its performance by helping the others in the supply chain to improve their performance. For example, S&S can improve its purchasing and inbound logistics activities by implementing a more efficient just-in-time inventory management system that reduces its costs and minimizes the capital tied up in inventory. S&S can reap additional benefits if it links its new systems with its suppliers so they can perform their primary value chain activities more efficiently. For example, by providing more detailed and timely information about its inventory needs, S&S suppliers can more efficiently plan their production schedules. Part of the resultant cost reduction can be passed on to S&S in the form of lower product costs. The problems created by an ineffective supply chain are illustrated by Limited Brands. Limited experienced explosive growth, including acquisitions of other retail companies such as Victoria’s Secret and Abercrombie & Fitch. These acquisitions left Limited with a tangled web of more than 60 incompatible information systems. The problems came to a head one night when 400 trailers converged on a distribution center parking lot that could fit only 150 trailers. The trailers blocked traffic along all the highways around the distribution center and caused countless traffic and community problems. No one from Limited knew where all the trailers came from, what the merchandise was, or where it was to be sent. Chaos reigned until the merchandise could be routed to stores and other distribution centers. Limited solved many of its problems by installing a new, integrated system that greatly improved its supply chain processes and technologies. Developing the new system was not easy. Limited has more than 1,000 suppliers and sells its merchandise using various platforms, including retail stores, the Internet, catalogs, and third-party retailers. Summary and Case Conclusion Consumer FIGURE 1-7 The Supply Chain Susan and Scott reflected on what they had done to try and understand what decisions S&S would need to make and the information needed to make them. They began by obtaining an understanding of S&S’s basic business processes and key decisions that must be made to operate the business effectively. They followed that with an analysis of the internal and external parties that the AIS would have to interact with and the information the AIS would have to provide them. CHAPTER 1 ACCounTIng InFoRmATIon SySTEmS: An ovERvIEW Since S&S is a retail merchandising company, its business processes could be described in terms of four basic transaction cycles: 1. The revenue cycle encompasses all transactions involving sales to customers and the collection of cash receipts for those sales. 2. The expenditure cycle encompasses all transactions involving the purchase and payment of merchandise sold by S&S as well as other services it consumes such as rent and utilities. 3. The human resources/payroll cycle encompasses all the transactions involving the hiring, training, and payment of employees. 4. The financing cycle encompasses all transactions involving the investment of capital in the company, borrowing money, payment of interest, and loan repayments. These four cycles interface with the general ledger and reporting system, which consists of all activities related to the preparation of financial statements and other managerial reports. Scott and Susan will need a well-designed AIS to provide the information they need to effectively plan, manage, and control their business. Their AIS must be able to process data about sales and cash receipts, purchasing and paying for merchandise and services, payroll and tax-related transactions, and acquiring and paying for fixed assets. The company’s AIS must also provide the information needed to prepare financial statements. Fortunately, many computer-based accounting packages are available for the retail industry. As they begin looking at various software packages, however, Scott and Susan quickly learn that considerable accounting knowledge is required to choose the one that will best fit their business. Because neither has an accounting background, Scott and Susan decide that their next task will be to hire an accountant. KEY TERMS system 29 goal conflict 29 goal congruence 29 data 29 information 29 machine-readable 30 information overload 30 information technology (IT) 30 value of information 30 information system 31 business process 31 transaction 33 transaction processing 33 give-get exchange 33 business processes or transaction cycles 33 revenue cycle 33 expenditure cycle 34 production cycle or conversion cycle 34 human resources/payroll cycle 34 financing cycle 34 general ledger and reporting system 35 accounting information system (AIS) 36 accounting 36 artificial intelligence (AI) 38 data analytics 39 data dashboard 39 blockchain 41 virtualization 44 cloud computing 44 Internet of Things (IoT) 44 value chain 45 primary activities 45 support activities 46 supply chain 46 AIS in Action CHAPTER QUIZ 1. Data differ from information in which way? a. Data are output, and information is input. b. Information is output, and data are input. c. Data are meaningful bits of information. d. There is no difference. 2. The business process that includes goods storage, receiving vendor invoices, and updating payable accounts is called a. the expenditure cycle. c. the production or conversion cycle. b. the revenue cycle. d. the financing cycle. 47 48 PART I ConCEPTuAl FounDATIonS oF ACCounTIng InFoRmATIon SySTEmS 3. Which of the following is a primary activity in the value chain? a. purchasing c. post-sales service b. accounting d. human resource management 4. Which transaction cycle includes interactions between an organization and its suppliers? a. revenue cycle c. human resources/payroll cycle b. expenditure cycle d. general ledger and reporting system 5. Which of the following is NOT a means by which information improves decision making? a. increases information overload b. reduces uncertainty c. provides feedback about the effectiveness of prior decisions d. identifies situations requiring management action 6. In the value chain concept, upgrading IT is considered what kind of activity? a. primary activity c. service activity b. support activity d. structured activity 7. When a subsystem’s goals are inconsistent with the goals of another subsystem or with the system as a whole, it is called a. goal conflict. c. neither of these. b. goal congruence. 8. Which of the following is a function of an AIS? a. reducing the need to identify a strategy and strategic position b. transforming data into useful information c. allocating organizational resources d. automating all decision making 9. A firm, its suppliers, and its customers collectively form which of the following? a. supply chain c. ERP system b. value chain d. AIS 10. A performance report about all approved vendors during the previous 12 months is information MOST needed in which business process? a. paying vendors c. selling merchandise b. acquiring inventory d. paying employees DISCUSSION QUESTIONS 1.1 Discuss the concept of a system and the issues of goal conflict and goal congruence. 1.2 Give an example of how an AIS can improve decision making and describe the multistep activities involved in the process. 1.3 A software company in Munich is organizing a competition, inviting business ideas that promote the use of smartphone technology to conduct business. You enter your business plan, an initiative to involve unemployed teenagers and young adults from local communities to generate business and employment, and it was so well received that you were awarded a special prize of €5,000. You plan on using your prize money to implement your idea. a. Identify key decisions you need to make, the information you require to make these key decisions, and the five major business processes you need to engage in. b. Identify the external parties with whom you would need to exchange information and specify the information you will receive from these parties and the information that you will send to these parties. 1.4 How do an organization’s business processes and lines of business affect the design of its AIS? Give several examples of how differences among organizations are reflected in their AIS. CHAPTER 1 ACCounTIng InFoRmATIon SySTEmS: An ovERvIEW 1.5 Figure 1-5 shows that organizational culture and the design of an AIS influence one another. What does this imply about the degree to which an innovative system developed by one company can be transferred to another company? 1.6 Why are accounting software packages designed with separate transaction modules? 1.7 Apply the value chain concept to S&S. Explain how it would perform the various primary and support activities. 1.8 IT enables organizations to easily collect large amounts of information about employees. Discuss the following issues: a. To what extent should management monitor employees’ e-mail? b. To what extent should management monitor which websites employees visit? c. To what extent should management monitor employee performance by, for example, using software to track keystrokes per hour or some other unit of time? If such information is collected, how should it be used? d. Should companies use software to electronically “shred” all traces of e-mail? e. Under what circumstances and to whom is it appropriate for a company to distribute information it collects about the people who visit its website? PROBLEMS 1.1 IT is changing the nature of accounting and the role of accountants. Write a two-page report describing what you think will be the nature and the value of the accounting function in a large company in the future. 1.2 The annual report is considered by some to be the single most important printed document that companies produce. In recent years, annual reports have become large documents. They now include such sections as letters to the stockholders, descriptions of the business, operating highlights, financial review, management discussion and analysis, a discussion of company internal controls, segment reporting, inflation data, and the basic financial statements. The expansion has been due in part to a general increase in the degree of sophistication and complexity in accounting standards and disclosure requirements for financial reporting. The expansion also is reflective of the change in the composition and level of sophistication of users. Current users include not only stockholders but also financial and securities analysts, potential investors, lending institutions, stockbrokers, customers, employees, and—whether the reporting company likes it or not—competitors. Thus, a report originally designed as a device for communicating basic financial information now attempts to meet the diverse needs of an ever-expanding audience. Users hold conflicting views on the value of annual reports. Some argue that they fail to provide enough information, whereas others believe disclosures in annual reports have expanded to the point where they create information overload. Others argue that the future of most companies depends on acceptance by the investing public and by its customers; therefore, companies should take this opportunity to communicate well-defined corporate strategies. REQUIRED a. Identify and discuss the basic factors of communication that must be considered in the presentation of the annual report. b. Discuss the communication problems a corporation faces in preparing the annual report that result from the diversity of the users. c. Select two types of information found in an annual report, other than the financial statements and accompanying footnotes, and describe how they are helpful to the users of annual reports. d. Discuss at least two advantages and two disadvantages of stating well-defined corporate strategies in the annual report. 49 50 PART I ConCEPTuAl FounDATIonS oF ACCounTIng InFoRmATIon SySTEmS e. Evaluate the effectiveness of annual reports in fulfilling the information needs of the following current and potential users: shareholders, creditors, employees, customers, and financial analysts. f. Annual reports are public and accessible to anyone, including competitors. Discuss how this affects decisions about what information should be provided in annual reports. (CMA Examination, adapted) 1.3 Alexander Forbes, a diversified financial services organization, is one of the major financial services organizations in Africa, providing financial solutions to individual and corporate customers. Their services include retirement planning, asset and wealth management, medical insurance, and consulting. Headquartered in Johannesburg, South Africa, the company has operations in eight regions across sub-Saharan Africa and the Channel Islands, employing over 3,000 people. It reported operating income of ZAR 3,647 million (South African rand) for the year 2017–18. In recent years, Alexander Forbes has embarked on simplifying the company structure to enable better collaboration across divisions. One of the structural changes was the separation of the technology function from the operations function to create an information technology (IT) function as a revenue-generating cluster. The IT function is responsible for modernizing systems to provide, among other services, a single customer view. This made it possible for Alexander Forbes to use IT as a strategic tool. One of the ways in which this is being achieved is the company’s health insurance services. The company keeps track of its customers in an integrated database so that customer care representatives are able to handle queries and transactions for customers across all healthcare products. The database tracks all claims submitted by their customers, including visits made by healthcare professionals, medication, procedures, and treatments. In case of prescriptions for which cheaper options, often in the form of generic alternatives, are available, customers are immediately informed via text message to their mobile phones. However, it is often found that customers prefer the more expensive medication rather than the generic alternative. A record of co-payment is maintained on the database for such customers since the company does not cover the full cost of relatively expensive medication. All claims submitted by customers are digitized and can be easily retrieved if any queries arise. Customers can also access their historical records through the company’s website. Customers can install the company’s mobile application to submit claims and check their status. REQUIRED a. Why should Alexander Forbes collect data on the drugs that are prescribed? What could the company do with this data? b. Although customers are informed of cheaper generic alternatives to expensive medication, many customers opt for the more latter even though they have to make a co-payment. How can Alexander Forbes use its AIS to persuade pharmacies to encourage customers to opt for the more affordable generic alternatives? c. How does digitizing the claims add value to the organization? d. How does the mobile application add value to the organization? e. Use the Internet to find other IT improvements that Alexander Forbes has introduced outside of their healthcare division. Write a short paragraph on each new application or other newsworthy item you find. 1.4. Match the description listed in the right column with the correct information characteristic listed in the left column. ___ 1. Access restricted ___ 2. Accurate a. A report was carefully designed so that its data was easily comprehended by the reader. b. A manager working on the weekend needed information about a customer’s production requests and found it on the company’s network. CHAPTER 1 ___ 3. Available ___ 4. Reputable ___ 5. Complete ___ 6. Concise ___ 7. Consistent ___ 8. Current ___ 9. Objective ___ 10. Relevant ___ 11. Timely ___ 12. Useable ___ 13. Understandable ___ 14. Verifiable 1.5. ACCounTIng InFoRmATIon SySTEmS: An ovERvIEW c. Before production reports are accepted, two clerks working independently must produce the same information. d. An accounts receivable aging report included all customer accounts. e. A report was checked by three different people to make sure it was correct. f. An accounts receivable aging report is used in creditgranting decisions. g. An accounts receivable aging report was received before the credit manager had to decide whether to extend credit to a customer. h. Needing help with a decision, a manager sought the opinion of a highly regarded expert. i. To protect intellectual property, a company encrypted the data, stored it in a very secure facility, and limited its use to five people. j. Tired of keying supplier prices into a database, a purchasing manager insisted the data be sent in machine readable form. k. After a lengthy, rambling presentation, a CEO insisted future presentations contain only pertinent facts and last no more than 30 minutes. l. A new manager insisted that monthly reports look the same so she could compare a new month’s results to previous months. m. After making a decision based on outdated data, a new CFO required all analysis to be conducted with up-todate data. n. Reluctant to rely on his personal feelings about a decision, a manager sought the opinion of an outside expert. EC Coaches is a privately held, medium-sized company that operates a fleet of luxury coaches, semi-luxury and commuter buses, and a variety of luxury and standard vehicles. Ranging from five to 60 seaters, these vehicles are leased to tour operators, universities, schools, charitable organizations, and other businesses. To protect their investment in their vehicles and ensure that they provide their customers with vehicles in immaculate condition, EC Coaches has a maintenance facility where they do basic repairs and maintenance on their vehicles. Scheduled vehicle services are handled by agents according to the maintenance plans agreed at the time of purchase of the vehicle. You were recently hired by EC Coaches and you are eager to demonstrate your worth to the company. Your supervisor asked you to prepare an accounts payable aging report as of the end of the year for use in the upcoming audit of the company’s financial statements. REQUIRED a. What is an accounts payable aging report? b. Why is an accounts payable aging report needed for an audit? c. What is an accounts payable aging report used for in normal company operations? d. What data will you need to prepare the report? e. Where will you collect the data you need to prepare the report? f. How will you collect the necessary data for the report? 51 52 PART I ConCEPTuAl FounDATIonS oF ACCounTIng InFoRmATIon SySTEmS g. What will the report look like (i.e., how will you organize the data collected to create the information your supervisor needs for the audit)? Prepare an accounts payable aging report template in Excel or another spreadsheet software. h. How will you distribute the report? How many copies will you make? Who should receive the copies? What security features will you implement? 1.6. Albert Heijn (or AH) is arguably the largest retail chain in Europe, owning supermarkets, convenience stores, and online shopping services in food and other goods. AH prides itself on establishing the first modern supermarkets. Founded in 1887 in Oostzaan, the Netherlands, Albert Heijn grew from a humble grocery store to a chain of supermarkets. Its first supermarket was established in 1952 and, over the decades, AH has been the shopping destination of choice for the majority of the people living in the Netherlands, Belgium, and other European countries. The chain comprises more than 850 stores, including more than 200 franchisees. AH is known for being an early adopter of information technology and has been one of the first supermarkets to take on a loyalty-card program. Customers can avail of a discount with a card called ‘Bonuskaart’ in Dutch. It is issued to them after their personal information is entered into a database. This provides AH with a mine of information about its customers. It utilizes this information to expand its business and push sales. REQUIRED a. What kind of information do you think AH gathers? b. How do you think the AH has motivated its customers to sign up for the bonus card program? c. What can the AH accomplish with the data it collects? Think in terms of strategy and competitive advantage. d. What could be some of the disadvantages of the card program? 1.7. Match each of the following terms with its definition. ___ 1. Accounting information system ___ 2. Artificial intelligence ___ 3. Blockchain ___ 4. Business processes ___ 5. Data ___ 6. Data analytics ___ 7. Data dashboard ___ 8. Expenditure cycle ___ 9. General ledger and reporting system ___ 10. Give-get exchange a. Exceeding the amount of information a human mind can absorb and process b. Use of software and algorithms to find and solve problems and improve business performance c. The benefit provided by information minus the cost of producing it d. A set of activities and tasks that help accomplish a specific organizational goal e. An agreement to exchange goods or services in exchange for cash f. Process of capturing, processing, and storing transaction data for later use and for producing information output g. Frequent exchanges such as surrendering cash for inventory and paying employees for labor h. Activities associated with selling goods and services in exchange for cash or a future promise of cash i. Value chain activities that produce, market, and deliver products to customers and provide postdelivery support j. A system that collects, records, stores, and processes data to produce information for decision makers CHAPTER 1 ___ 11. Goal congruence ___ 12. Information ___ 13. Machine-readable ___ 14. Primary activities ___ 15. Production cycle ___ 16. Revenue cycle ___ 17. Supply chain ___ 18. Support activities ___ 19. System ___ 20. Transaction ___ 21. Value chain ___ 22. Value of information ACCounTIng InFoRmATIon SySTEmS: An ovERvIEW k. Linking all the primary and support activities in a business l. Activities such as firm infrastructure and technology that enable main activities to be performed efficiently and effectively m. An organization’s value chain as well as its vendors, distributors, and customers n. Activities associated with purchasing inventory for resale for cash or a promise to pay cash o. Data in a format that can be processed by a computer p. Computer systems that simulate human intelligence processes such as learning, reasoning, and self-improvement q. Procedures and routines that carry out specific activities, achieve objectives, or solve problems r. Facts collected, recorded, stored, and processed by an information system s. Activities associated with using labor, raw materials, and equipment to produce finished goods t. Organized and processed data that provide meaning and improve decision making u. Display of data points and performance indicators in easily understood charts, tables, or gauges v. Activities associated with hiring, compensating, promoting, and terminating employees w. Major give-get exchanges that occur frequently in most companies x. Information-processing operations involved in preparing reports for internal and external parties y. Individual digital records linked using cryptography in a single list called a chain z. A subsystem achieves its goals while contributing to the overall goal 1.8. Classify each of the following items as belonging in the revenue, expenditure, human resources/payroll, production, or financing cycle. a. Pay pay-as-you-earn (PAYE) payroll taxes b. Send material requisition to inventory c. Issue stock to investors d. Borrow money from the bank to purchase a new factory e. Complete receiving report f. Appoint replacement purchasing clerk g. Measure employee performance using a performance management system h. Choose suitable supplier of raw materials i. Ensure employees are up to date with the latest tax provision j. Record personal and tax information for new employees k. Determine labor needs for the next production run l. Create purchase requisition m. Transfer employee contribution to medical aid n. Update work-in-progress file to accumulate cost data o. Process sales returns p. Prepare a bill of materials 53 54 PART I ConCEPTuAl FounDATIonS oF ACCounTIng InFoRmATIon SySTEmS q. Extract sold goods from the warehouse r. Approve payment after receiving all inventory on receiving report s. Manage dividend payments t. Confirm hours worked on automated timekeeping system u. Send unsettled customer accounts to collection agency v. Pay interest on loan required to buy new factory w. Prepare a purchase order AIS in Action Solutions QUIZ KEY 1. Data differ from information in which way? a. Data are output, and information is input. [Incorrect. Data are facts and figures that, once organized, can become information. Therefore, data are inputs, and information is output.] ▶ b. Information is output, and data are input. [Correct.] c. Data are meaningful bits of information. [Incorrect. Information is organized and processed data that provide meaning.] d. There is no difference. [Incorrect. There is a difference. Data are unorganized facts and figures. Information is meaningful, organized, and processed data.] 2. The business process that includes goods storage, receiving vendor invoices, and updating payable accounts is called a. the expenditure cycle. [Incorrect. The expenditure cycle involves interactions between an organization and its suppliers.] ▶ b. the revenue cycle. [Correct. The revenue cycle involves interactions between an organization and its customers, such as shipping them goods.] c. the production or conversion cycle. [Incorrect. The production cycle involves the transformation of raw materials into finished goods.] d. the financing cycle. [Incorrect. The financing cycle deals with interactions between an organization and its lenders and owners.] 3. Which of the following is a primary activity in the value chain? a. purchasing [Incorrect. This is a support activity.] b. accounting [Incorrect. This is a firm infrastructure support activity.] ▶ c. post-sales service [Correct. Service is a primary activity.] d. human resource management [Incorrect. This is a support activity.] 4. Which transaction cycle includes interactions between an organization and its suppliers? a. revenue cycle [Incorrect. The revenue cycle involves interactions between an organization and its customers.] ▶ b. expenditure [Correct.] c. human resources/payroll cycle [Incorrect. The human resources/payroll cycle involves interactions between an organization and its employees, government, and potential hires.] d. general ledger and reporting system [Incorrect. The general ledger and reporting system receives summary information from all cycles.] 5. Which of the following is NOT a means by which information improves decision making? ▶ a. increases information overload [Correct. Decision makers receiving too much information have difficulty incorporating all of the information into their decision framework, and, as a result, decision quality can be reduced rather than improved.] b. reduces uncertainty [Incorrect. More reliable information leads to less uncertainty and thus better decisions.] c. provides feedback about the effectiveness of prior decisions [Incorrect. Knowledge of effective and ineffective decisions can lead to better decisions in the future.] CHAPTER 1 ACCounTIng InFoRmATIon SySTEmS: An ovERvIEW d. identifies situations requiring management action [Incorrect. Identifying the need for management action can lead to improved decision making.] 6. In the value chain concept, upgrading IT is considered what kind of activity? a. primary activity [Incorrect. Investing in IT is a support activity.] ▶ b. support activity [Correct. Technology activities, including investing in IT, are considered a support activity.] c. service activity [Incorrect. The value chain includes only primary and support activities. A service activity is a type of primary activity.] d. structured activity [Incorrect. The value chain includes only primary and support activities. A structured activity is neither a primary nor a secondary activity.] 7. When a subsystem’s goals are inconsistent with the goals of another subsystem, or with the system as a whole, it is called ▶ a. goal conflict. [Correct. When a subsystem’s goals are inconsistent with the goals of another subsystem or the system as a whole.] b. goal congruence. [Incorrect. When a subsystem achieves its goals while contributing to the organization’s overall goal.] c. neither of these. [Incorrect.] 8. Which of the following is a function of an AIS? a. reducing the need to identify a strategy and strategic position [Incorrect. An AIS does not reduce the need to identify a strategy. It provides information to executives for the purpose of making strategic decisions.] ▶ b. transforming data into useful information [Correct. This is one of the primary functions of an AIS.] c. allocating organizational resources [Incorrect. Decision makers allocate resources, and the purpose of the AIS is to provide information to the decision makers so that they can make the allocation.] d. automating all decision making [Incorrect. The AIS provides information to decision makers; it is not designed to automate all decision making.] 9. A firm, its suppliers, and its customers collectively form which of the following? ▶ a. supply chain [Correct. The supply chain is made up of the firm, its suppliers, and customers.] b. value chain [Incorrect. The value chain is made up of primary and support activities within the firm.] c. ERP system [Incorrect. An ERP system integrates all aspects of an organization’s activities into one system.] d. AIS [Incorrect. The AIS is made up of the human and capital resources within an organization that are responsible for collecting and processing transactions and preparing financial information.] 10. A performance report about all approved vendors during the previous 12 months is information MOST needed in which business process? a. paying vendors [Incorrect. To pay a vendor, a company needs to know whether merchandise ordered was received in good condition. They do not need a 12-month history of vendor performance.] ▶ b. acquiring inventory [Correct. Companies want to acquire inventory from companies that have performed well in the past. A vendor performance report would disclose whether the vendor shipped inventory on time, whether the inventory was of the requested quality, whether the prices were as agreed upon, etc.] c. selling merchandise [Incorrect. A 12-month history of vendor performance is usually not very helpful in trying to sell products to customers. More important would be customer tastes and preferences, customer credit status, etc.] d. paying employees [Incorrect. It is very rare for an employee’s pay to be based on a 12-month history of vendor performance. More important are hours worked, annual salary, sales figures to calculate commissions, etc.] 55 Overview of Transaction Processing and Enterprise Resource Planning Systems CHAPTER 2 LEARNING OBJECTIVES After studying this chapter, you should be able to: 1. Describe the data processing cycle used to process transactions, including how data is input, stored, and processed and how information is output. 2. Discuss how organizations use enterprise resource planning (ERP) systems to process transactions and provide information. I N TEGRATIV E C ASE S&S The grand opening of S&S is two weeks away. Scott Parry and Susan Gonzalez are working long hours to make the final arrangements for the store opening. Most of the employees have already been hired; training is scheduled for next week. Susan has ordered inventory for the first month. The store is being remodeled and will have a bright, cheery decor. All seems to be in order—all, that is, except the accounting records. Like many entrepreneurs, Scott and Susan have not given as much thought to their accounting records as they have to other parts of their business. Recognizing they need qualified accounting help, they hired a full-time accountant, Ashton Fleming. Scott and Susan think Ashton is perfect for the job because of his three years of experience with a national CPA (Certified Public Accountants) firm. Ashton is looking forward to working for S&S because he has always wanted to be involved in building a company from the ground up. During Ashton’s first day on the job, Susan gives him the invoices for the inventory she purchased and a folder with their bank loan documentation, with the first payment due after the grand opening. She also hands him a folder containing information on rental payments, utilities, and other expenses. Susan tells Ashton that she and Scott know little about accounting and he will run the accounting end of S&S. She adds that the only thing they have done so far is to open a checking account for S&S and that they have kept the check register updated to monitor their cash flow. 56 Designdepot_ltd/Shutterstock Scott explains that the sales staff is paid a fixed salary and commissions and that all other employees are paid hourly rates. Employees are paid every two weeks, with their first paychecks due next week. Ashton asks Scott what accounting software the company is using. Scott replies that he and Susan have not had time to tackle that aspect yet. Scott and Susan looked at some of the popular packages but quickly realized that they did not know enough about accounting to make an intelligent choice. Scott then tells Ashton that his first task should be to purchase whatever accounting software he thinks will be best for S&S. After Scott leaves, Ashton feels both excited and a little nervous about his responsibility for creating an accounting information system (AIS) for S&S. Although Ashton has audited many companies, he has never organized a company’s books and is unsure how to go about it. A million questions run through his head. Here are just a few of them: 1. How should I organize the accounting records so that financial statements can be easily produced? 2. How am I going to collect and process data about all of S&S’s transactions? 3. How do I organize all the data that will be collected? 4. How should I design the AIS so that the information provided is reliable and accurate? 5. How can I design procedures to ensure that they meet all government obligations, such as remitting sales, income, and payroll taxes? Introduction This chapter is divided into two major sections. The first section discusses the data processing cycle and its role in organizing business activities and providing information to users. It explains how organizations capture and enter data about business activities into their accounting information system (AIS) and how companies process data and transform it into useful information. It also discusses basic data storage concepts, showing how data are stored for further use. Finally, information output is discussed, including the different ways information is provided to users. The second section discusses the role of the information system in modern organizations and introduces the concept of an enterprise resource planning (ERP) system. An ERP can help integrate all aspects of a company’s operations with its traditional AIS. This section also describes the significant advantages of an ERP as well as significant challenges that must be overcome to implement an ERP system. 57 58 PART I CONCEPTUAL FOUNDATIONS OF ACCOUNTING INFORMATION SYSTEMS Transaction Processing: The Data Processing Cycle data processing cycle - The four operations (data input, data storage, data processing, and information output) performed on data to generate meaningful and relevant information. Accountants and other system users play a significant role in the data processing cycle. For example, they interact with systems analysts to help answer questions such as these: What data should be entered and stored by the organization, and who should have access to them? How should data be organized, updated, stored, accessed, and retrieved? How can scheduled and unanticipated information needs be met? To answer these and related questions, the data processing concepts explained in this chapter must be understood. One important AIS function is to process company transactions efficiently and effectively. In manual (non-computer-based) systems, data are entered into journals and ledgers maintained on paper. In computer-based systems, data are entered into computers and stored in files and databases. The operations performed on data to generate meaningful and relevant information are referred to collectively as the data processing cycle. As shown in Figure 2-1, this process consists of four steps: data input, data storage, data processing, and information output. DATA INPUT The first step in processing input is to capture transaction data and enter them into the system. The data capture process is usually triggered by a business activity. Data must be collected about three facets of each business activity: 1. Each activity of interest 2. The resource(s) affected by each activity 3. The people who participate in each activity For example, the most frequent revenue cycle transaction is a sale, either for cash or on credit. S&S may find it useful to collect the following data about a sales transaction: ●● ●● ●● ●● ●● ●● ●● ●● source documents - Documents used to capture transaction data at its source – when the transaction takes place. Examples include sales orders, purchase orders, and employee time cards. turnaround documents - Records of company data sent to an external party and then returned to the system as input. Turnaround documents are in machinereadable form to facilitate their subsequent processing as input records. An example is a utility bill. ●● Date and time the sale occurred. Employee who made the sale and the checkout clerk who processed the sale. Checkout register where the sale was processed. Item(s) sold. Quantity of each item sold. List price and actual price of each item sold. Total amount of the sale. Delivery instructions. For credit sales: customer name, customer bill-to and ship-to addresses. Historically, most businesses used paper source documents to collect data about their business activities. They later transferred that data into the computer. When data are entered using computer screens, they often retain the same name and basic format as the paper source document. Table 2-1 lists some common transaction cycle activities and the source document or form used to capture data about that event. Examples of many of these documents can be found in Chapters 14 through 18. For example, a purchase order, used to request merchandise from suppliers, is shown in Chapter 15. Turnaround documents are company output sent to an external party, who often adds data to the document, and then are returned to the company as an input document. They are in machine-readable form to facilitate their subsequent processing as input records. An example is a utility bill sent to the customer, returned with the customer’s payment, and read by a special scanning device when it is returned. FIGURE 2-1 Data Storage The Data Processing Cycle Data Input Data Processing Information Output CHAPTER 2 TABLE 2-1 OVERVIEW OF TRANSACTION PROCESSING AND ERP SYSTEMS 59 Common Business Activities and Source Documents Business Activity Revenue Cycle Take customer order Deliver or ship order Receive cash Deposit cash receipts Adjust customer account Expenditure Cycle Request items Order items Receive items Pay for items Human Resources Cycle Collect employee withholding data Record time worked by employees Record time spent on specific jobs Source Document Sales order Delivery ticket or bill of lading Remittance advice or remittance list Deposit slip Credit memo Purchase requisition Purchase order Receiving report Check or electronic funds transfer W-4 form Time cards Job time tickets or time sheet Source data automation devices capture transaction data in machine-readable form at the time and place of their origin. Examples include ATMs used by banks, point-of-sale (POS) scanners used in retail stores, and bar code scanners used in warehouses. Another good example of source data automation is the use of XBRL. Before XBRL, financial reports were submitted electronically to the SEC and others who wanted to use the information had to enter it into their system. With XBRL, financial data is encoded to make it machine readable, allowing other computers to use and analyze the information. This saves time, reduces errors, and makes much more information available for analytics. XBRL is discussed in more depth in Chapter 18. The second step in processing input is to make sure captured data are accurate and complete. One way to do this is to use source data automation or well-designed turnaround documents and data entry screens. Well-designed documents and screens improve accuracy and completeness by providing instructions or prompts about what data to collect, grouping logically related pieces of information close together, using checkoff boxes or pull-down menus to present the available options, and using appropriate shading and borders to clearly separate data items. Data input screens usually list all the data the user needs to enter. Sometimes these screens resemble source documents, and users fill out the screen the same way they would a paper source document. Users can improve control either by using prenumbered source documents or by having the system automatically assign a sequential number to each new transaction. Prenumbering simplifies verifying that all transactions have been recorded and that none of the documents have been misplaced. (Imagine trying to balance a checkbook if the checks were not prenumbered.) The third step in processing input is to make sure company policies are followed, such as approving or verifying a transaction. For example, S&S would not want to sell goods to a customer who was not paying his bills or to sell an item for immediate delivery that was out of stock. These problems are prevented by programming the system to check a customer’s credit limit and payment history, as well as inventory status, before confirming a customer sale. DATA STORAGE A company’s data are one of its most important resources. However, the mere existence of relevant data does not guarantee that they are useful. To function properly, an organization must have ready and easy access to its data. Therefore, accountants need to understand how data are organized and stored in an AIS and how they can be accessed. In essence, they need to know how to manage data for maximum corporate use. Imagine how difficult it would be to read a textbook if it were not organized into chapters, sections, paragraphs, and sentences. Now imagine how hard it would be for S&S to find an invoice if all documents were randomly dumped into file cabinets. Fortunately, information source data automation - The collection of transaction data in machine-readable form at the time and place of origin. Examples are point-of-sale terminals and ATMs. 60 PART I CONCEPTUAL FOUNDATIONS OF ACCOUNTING INFORMATION SYSTEMS general ledger - A ledger that contains summary-level data for every asset, liability, equity, revenue, and expense account of the organization. subsidiary ledger - A ledger used to record detailed data for a general ledger account with many individual subaccounts, such as accounts receivable, inventory, and accounts payable. control account - A title given to a general ledger account that summarizes the total amounts recorded in a subsidiary ledger. For example, the accounts receivable control account in the general ledger represents the total amount owed by all customers. The balances in the accounts receivable subsidiary ledger indicate the amount owed by each specific customer. in an AIS is organized for easy and efficient access. This section explains basic data storage concepts and definitions. LEDGERS Cumulative accounting information is stored in general and subsidiary ledgers. A general ledger contains summary-level data for every asset, liability, equity, revenue, and expense account. A subsidiary ledger contains detailed data for any general ledger account with many individual subaccounts. For example, the general ledger has an accounts receivable account that summarizes the total amount owed to the company by all customers. The subsidiary accounts receivable ledger has a separate record for each individual customer, with detailed information such as name, address, purchases, payments, account balance, and credit limit. Subsidiary ledgers are often used for accounts receivable, inventory, fixed assets, and accounts payable. The general ledger account corresponding to a subsidiary ledger is called a control account. The relationship between the general ledger control account and the total of individual subsidiary ledger account balances helps maintain the accuracy of AIS data. Specifically, the sum of all subsidiary ledger account balances should equal the amount in the corresponding general ledger control account. Any discrepancy between them indicates that a recording error has occurred. CODING TECHNIQUES Data in ledgers is organized logically using coding techniques. Coding is the systematic assignment of numbers or letters to items to classify and organize them. ●● coding - The systematic assignment of numbers or letters to items to classify and organize them. ●● sequence codes - Items are numbered consecutively so that gaps in the sequence code indicate missing items that should be investigated. Examples include prenumbered checks, invoices, and purchase orders. block code - Blocks of numbers reserved for specific categories of data, thereby helping to organize the data. An example is a chart of accounts. group codes - Two or more subgroups of digits used to code an item. A group code is often used in conjunction with a block code. Product Code 1000000–1999999 2000000–2999999 3000000–3999999 4000000–4999999 ● ●● ● mnemonic codes - Letters and numbers interspersed to identify an item. The mnemonic code is derived from the description of the item and is usually easy to memorize. With sequence codes, items are numbered consecutively to account for all items. Any missing items cause a gap in the numerical sequence. Examples include prenumbered checks, invoices, and purchase orders. With a block code, blocks of numbers are reserved for specific categories of data. For example, S&S reserved the following numbers for major product categories: ●● Product Type Electric range Refrigerator Washer Dryer Users can identify an item’s type and model using the code numbers. Other examples include ledger account numbers (blocked by account type), employee numbers (blocked by department), and customer numbers (blocked by region). Group codes, which are two or more subgroups of digits used to code items, are often used in conjunction with block codes. If S&S uses a seven-digit product code number, the group coding technique might be applied as follows. Digit Position Meaning 1–2 3 4–5 6–7 Product line, size, style Color Year of manufacture Optional features There are four subcodes in the product code, each with a different meaning. Users can sort, summarize, and retrieve information using one or more subcodes. This technique is often applied to general ledger account numbers. With mnemonic codes, letters and numbers are interspersed to identify an item. The mnemonic code is derived from the description of the item and is usually easy to memorize. For example, Dry300W05 could represent a low end (300), white (W) dryer (Dry) made by Sears (05). The following guidelines result in a better coding system. The code should: ●● ●● Be consistent with its intended use, which requires that the code designer determine desired system outputs prior to selecting the code. Allow for growth. For example, don’t use a three-digit employee code for a fast-growing company with 950 employees. CHAPTER 2 ●● ●● OVERVIEW OF TRANSACTION PROCESSING AND ERP SYSTEMS 61 Be as simple as possible to minimize costs, facilitate memorization and interpretation, and ensure employee acceptance. Be consistent with the company’s organizational structure and across the company’s divisions. CHART OF ACCOUNTS A great example of coding is the chart of accounts, which is a list of the numbers assigned to each general ledger account. These account numbers allow transaction data to be coded, classified, and entered into the proper accounts. They also facilitate the preparation of financial statements and reports because data stored in individual accounts can easily be summed for presentation. However, data stored in summary accounts cannot be easily analyzed and reported in more detail. Consequently, it is important that the chart of accounts contain sufficient detail to meet an organization’s information needs. To illustrate, consider the consequences if S&S were to use only one general ledger account for all sales transactions. It would be easy to produce reports showing the total amount of sales for a given time period, but it would be very difficult to prepare reports separating cash and credit sales. Indeed, the only way to produce these latter reports would be to go back to original sales records to identify the nature of each sales transaction. If S&S used separate general ledger accounts for cash and credit sales, then reports showing both types of sales could be easily produced. Total sales could also be easily reported by summing each type of sale. Table 2-2 shows the chart of accounts Ashton developed for S&S. Each account number is three digits long. The first digit represents the major account category and indicates where TABLE 2-2 Sample Chart of Accounts for S&S Account Code Account Name 100–199 101 102 103 120 125 130 150 160 170 180 chart of accounts - A listing of all the numbers assigned to balance sheet and income statement accounts. The account numbers allow transaction data to be coded, classified, and entered into the proper accounts. They also facilitate financial statement and report preparation. Account Code Account Name Current Assets Checking Account Savings Account Petty Cash Accounts Receivable Allowance for Doubtful Accounts Notes Receivable Inventory Supplies Prepaid Rent Prepaid Insurance 400–499 400 410 Equity Accounts Common Stock Retained Earnings 500–599 501 502 510 511 520 530 Revenues Cash Sales Credit Sales Sales Returns & Allowances Sales Discounts Interest Revenue Miscellaneous Revenue 200–299 200 210 215 230 235 240 245 250 Noncurrent Assets Land Buildings Accumulated Depreciation—Buildings Equipment Accumulated Depreciation—Equipment Furniture & Fixtures Accumulated Depreciation—Furniture & Fixtures Other Assets 300–399 300 310 321 322 323 324 330 360 Liabilities Accounts Payable Wages Payable Employee Income Tax Payable FICA Tax Payable Federal Unemployment Tax Payable State Unemployment Tax Payable Accrued Interest Payable Other Liabilities 600–799 600 611 612 613 620 630 640 650 701 702 703 710 Expenses Cost of Goods Sold Wages Expense Commissions Expense Payroll Tax Expense Rent Expense Insurance Expense Supplies Expense Bad Debt Expense Depreciation Expense—Buildings Depreciation Expense—Equipment Depreciation Expense—Furniture & Fixtures Income Tax Expense 900–999 910 Summary Accounts Income Summary 62 PART I CONCEPTUAL FOUNDATIONS OF ACCOUNTING INFORMATION SYSTEMS it appears on S&S’s financial statements. Thus, all current assets are numbered in the 100s, noncurrent assets are numbered in the 200s, and so on. The second digit represents the primary financial subaccounts within each category. Again, the accounts are assigned numbers to match the order of their appearance in financial statements (in order of decreasing liquidity). Thus, account 120 represents accounts receivable, and account 150 represents inventory. The third digit identifies the specific account to which the transaction data will be posted. For example, account 501 represents cash sales, and account 502 represents credit sales. Similarly, accounts 101 through 103 represent the various cash accounts used by S&S. A chart of accounts is tailored to the nature and purpose of an organization. For example, the chart of accounts for S&S indicates that the company is a corporation. In contrast, a partnership would include separate capital and drawing accounts for each partner, instead of common stock and retained earnings. Likewise, because S&S is a retail organization, it has only one type of general ledger inventory account. A manufacturing company, in contrast, would have separate general ledger accounts for raw materials, work in process, and finished goods inventories. Ashton left gaps in S&S’s chart of accounts to allow for additional accounts. For example, when S&S has excess cash to invest in marketable securities, a new general ledger account can be created and assigned the number 110. When S&S opens stores in the future, he will add three digits to the chart of accounts to represent each store in the chain, so that S&S can track items in each store. Subsidiary ledger accounts often have longer account codes than general ledger accounts. At S&S, each account receivable will have a seven-digit code. The first three digits are 120, the code for accounts receivable. The next four digits identify up to 10,000 individual customers. general journal - A journal used to record infrequent or nonroutine transactions, such as loan payments and end-of-period adjusting and closing entries. specialized journal - A journal used to record a large number of repetitive transactions such as credit sales, cash receipts, purchases, and cash disbursements. TABLE 2-3 JOURNALS Transaction data are often recorded in a journal before they are entered into a ledger. A journal entry shows the accounts and amounts to be debited and credited. A general journal is used to record infrequent or nonroutine transactions, such as loan payments and end-of-period adjusting and closing entries. A specialized journal records large numbers of repetitive transactions such as sales, cash receipts, and cash disbursements. Table 2-3 is a sample sales journal. All transaction information is recorded in one line, with every entry a debit to accounts receivable and a credit to sales. There is no need to write an explanation of each entry, as is the case with general journal entries. Given the high number of daily sales transactions, the time saved by recording these transactions in a sales journal, rather than in the general journal, is considerable. The Post Ref column indicates when transactions are posted to the appropriate ledger. In a manual system, ledgers are books; hence, the phrase “keeping the books” refers to the process of maintaining the ledgers. Figure 2-2 shows how to journalize and post sales transactions. First, each credit sale is recorded in the sales journal. Then each sales journal entry is posted to the appropriate customer account in the accounts receivable subsidiary ledger (note the arrow linking the $1,876.50 sale to KDR Builders in the sales journal to the debit for $1,876.50 in the accounts Sample Sales Journal Sales Journal Date Oct. 15 15 15 15 15 15 Invoice Number 151 152 153 154 155 156 Account Debited Brown Hospital Supply Greenshadows Hotel Suites Heathrow Apartments LMS Construction Gardenview Apartments KDR Builders TOTAL Page 5 Account Number 120–035 120–122 120–057 120–173 120–084 120–135 120/502 Post Ref ✓ ✓ ✓ ✓ ✓ ✓ Amount 798.00 1,267.00 5,967.00 2,312.50 3,290.00 1,876.50 15,511.00 CHAPTER 2 OVERVIEW OF TRANSACTION PROCESSING AND ERP SYSTEMS FIGURE 2-2 Sales Journal (SJ) Page 5 SALES JOURNAL Invoice Account Date Number Debited 151 152 153 154 155 156 Oct. 15 15 15 15 15 15 63 Brown Hospital Supply Greenshadows Hotel Suites Heathrow Apartments LMS Construction Gardenview Apartments KDR Builders TOTAL Recording and Posting a Credit Sale Pg. 5 Account Number Post Ref 120–035 120–122 120–057 120–173 120–084 120–135 120/502 ✔ ✔ ✔ ✔ ✔ ✔ Amount 798.00 1,267.00 5,967.00 2,312.50 3,290.00 1,876.50 15,511.00 GENERAL LEDGER Account: Accounts Receivable Account Number: 120 Debit Date Description Post Ref Oct. 14 14 Sales 12,432.00 SJ4 14 Collections CR6 15 Sales 15,511.00 SJ5 Credit 22,162.00 Balance 67,285.00 79,717.00 57,555.00 73,066.00 15,511.00 Total Sales Oct. 15 GENERAL LEDGER Account: Credit Sales Account Number: 502 Date Oct. 14 14 15 Description Post Ref Sales Sales Debit SJ4 SJ5 Credit 12,432.00 15,511.00 Balance 267,762.00 280,194.00 295,705.00 ACCOUNTS RECEIVABLE SUBSIDIARY LEDGER Name: KDR Builders Account Number: 120–135 Date 1,876.50 Amount of INDIVIDUAL SALE Description Sept. 12 Sales Oct. 1 Payment Oct. 15 Sales Address: 6867 Stornaway Memphis, TN 38119-1234 Post Ref Debit SJ1 CR4 SJ5 3,682.00 1,876.50 Credit Balance 3,682.00 3,682.00 0.00 1,876.50 receivable subsidiary ledger). Periodically, the total of all sales journal entries is posted to the general ledger (note the arrow showing the daily sales journal total of $15,511.00 posted to both the Accounts Receivable and the Credit Sales general ledger accounts). AUDIT TRAIL Figure 2-2 shows how the posting references and document numbers provide an audit trail. An audit trail is a traceable path of a transaction through a data processing system from point of origin to final output, or backward from final output to point of origin. It is used to check the accuracy and validity of ledger postings. Observe that the SJ5 posting reference for the $15,511 credit to the sales account in the general ledger refers to page 5 of the sales journal. By checking page 5 of the sales journal, it is possible to verify that $15,511 represents the total credit sales recorded on October 15. Similarly, the posting reference for the $1,876.50 debit to the KDR Builders’ account in the subsidiary accounts receivable ledger also refers to page 5 of the sales journal as the source of that entry. Furthermore, note that the sales journal lists the invoice numbers for each individual entry. This provides the means for audit trail - A path that allows a transaction to be traced through a data processing system from point of origin to output or backwards from output to point of origin. It is used to check the accuracy and validity of ledger postings and to trace changes in general ledger accounts from their beginning balance to their ending balance. 64 PART I CONCEPTUAL FOUNDATIONS OF ACCOUNTING INFORMATION SYSTEMS FIGURE 2-3 Attributes Data Storage Elements Customer Number Three Entities Three Records entity - The item about which information is stored in a record. Examples include an employee, an inventory item, and a customer. attributes - The properties, identifying numbers, and characteristics of interest of an entity stored in a database. Examples are employee number, pay rate, name, and address. field - The portion of a data record where the data value for a particular attribute is stored. For example, in a spreadsheet, each row might represent a customer and each column an attribute of the customer. Each cell in a spreadsheet is a field. record - A set of fields whose data values describe specific attributes of an entity, such as all payroll data relating to a single employee. An example is a row in a spreadsheet. data value - The actual value stored in a field. It describes a particular attribute of an entity. For example, the customer name field would contain “ZYX Company” if that company were a customer. file - A set of logically related records, such as the payroll records of all employees. master file - A permanent file of records that stores cumulative data about an organization. As transactions take place, individual records within a master file are updated to keep them current. transaction file - A file that contains the individual business transactions that occur during a specific fiscal period. A transaction file is conceptually similar to a journal in a manual AIS. database - A set of interrelated, centrally controlled data files stored with as little data redundancy as possible. A database consolidates records previously stored in separate files into a common pool and serves a variety of users and data processing applications. Customer Name Address Credit Limit Balance 19283 XYZ Company P.O. Box 7 30,000 24,750 35794 ABC Company 233 Lotus Ave. 45,000 12,000 56987 QRS Company 356 Book Road 25,000 24,900 Data Values Individual Fields This accounts receivable file stores information about three separate entities: XYZ Company, ABC Company, and QRS Company. As a result, there are three records in the file. Five separate attributes are used to describe each customer: customer number, customer name, address, credit limit, and balance. There are, therefore, five separate fields in each record. Each field contains a data value that describes an attribute of a particular entity (customer). For example, the data value 19283 is the customer number for the XYZ Company. locating and examining the appropriate source documents in order to verify that the transaction occurred and it was recorded accurately. COMPUTER-BASED STORAGE CONCEPTS An entity is something about which information is stored, such as employees, inventory items, and customers. Each entity has attributes, or characteristics of interest, that are stored, such as a pay rate and address. Each type of entity possesses the same set of attributes. For example, all employees possess an employee number, pay rate, and home address. The specific values for those attributes will differ. For example, one employee’s pay rate might be $12.00 an hour, whereas another’s might be $12.25. Figure 2-3 shows that computers store data in a field. The fields containing data about entity attributes constitute a record. In Figure 2-3, each row represents a different record, and each column represents an attribute. Each intersecting row and column in Figure 2-3 is a field within a record, the contents of which are called a data value. A file is a group of related records. A master file, like a ledger in a manual AIS, stores cumulative information about an organization. The inventory and equipment master files store information about important organizational resources. The customer, supplier, and employee master files store information about important agents with whom the organization interacts. Master files are permanent; they exist across fiscal periods. However, individual master file records may change frequently. For example, individual customer accounts balances are updated to reflect new sales transactions and payments received. Periodically, new records are added to or removed from a master file, for example, when a new customer is added or a former customer deleted. A transaction file contains records of individual business transactions that occur during a specific time. It is similar to a journal in a manual AIS. For example, S&S will have a daily sales transaction file and a cash receipts file. Both files will update individual customer account balances in the customer master file. Transaction files are not permanent and may not be needed beyond the current fiscal period. However, they are usually maintained for a specified period for backup purposes. A set of interrelated, centrally coordinated files is referred to as a database. For example, the accounts receivable file might be combined with customer, sales analysis, and related files to form a customer database. Chapter 4 discusses database technology. CHAPTER 2 OVERVIEW OF TRANSACTION PROCESSING AND ERP SYSTEMS 65 DATA PROCESSING Once business activity data have been entered into the system, they must be processed to keep the databases current. The four different types of data processing activities, referred to as CRUD, are as follows: 1. Creating new data records, such as adding a newly hired employee to the payroll database. 2. Reading, retrieving, or viewing existing data. 3. Updating previously stored data. Figure 2-4 depicts the steps required to update an accounts receivable record with a sales transaction. The two records are matched using the account number. The sale amount ($360) is added to the account balance ($1,500) to get a new current balance ($1,860). 4. Deleting data, such as purging the vendor master file of all vendors the company no longer does business with. Updating done periodically, such as daily, is referred to as batch processing. Although batch processing is cheaper and more efficient, the data are current and accurate only immediately after processing. For that reason, batch processing is used only for applications, such as payroll, that do not need frequent updating and that naturally occur or are processed at fixed time periods. Most companies update each transaction as it occurs, referred to as real-time processing because it ensures that stored information is always current, thereby increasing its decisionmaking usefulness. It is also more accurate because data input errors can be corrected in real time or refused. It also provides significant competitive advantages. For example, FedEx updated its mission statement to include the phrase “Positive control of each package will be maintained by utilizing real-time electronic tracking and tracing systems.” With FedEx’s system, employees and customers can track the exact location of each package and estimate its arrival time. A combination of the two approaches is online batch processing, where transaction data are entered and edited as they occur and stored for later processing. Batch processing and real-time processing are summarized in Figure 2-5. batch processing - Accumulating transaction records into groups or batches for processing at a regular interval such as daily or weekly. The records are usually sorted into some sequence (such as numerically or alphabetically) before processing. real-time processing - The computer system processes data immediately after capture and provides updated information to users on a timely basis. INFORMATION OUTPUT The final step in the data processing cycle is information output. When displayed on a monitor, output is referred to as “soft copy.” When printed on paper, it is referred to as “hard copy.” Information is usually presented in one of three forms: a document, a report, or a query response. Documents are records of transaction or other company data. Some, such as checks and invoices, are transmitted to external parties. Others, such as receiving reports and purchase TRANSACTION DATA Account Number 0123 MASTER FILE RECORD Account Number 0123 Credit Limit Previous Balance Current Balance $2,000.00 $1,000.00 $1,500.00 FIGURE 2-4 Transaction Transaction Document Transaction Type Amount Date Number Sale 09/19/13 9876 $360.00 File update process • Verify data accuracy • Match primary key (account number) • Add transaction amount to current balance • Compare new balance to credit limit • Repeat for all transactions • Print summary reports UPDATED MASTER FILE RECORD Account Number 0123 Credit Limit Previous Balance documents - Records of transaction or other company data. Examples include checks, invoices, receiving reports, and purchase requisitions. Current Balance $2,000.00 $1,500.00 $1,860.00 The Accounts Receivable File Update Process 66 PART I CONCEPTUAL FOUNDATIONS OF ACCOUNTING INFORMATION SYSTEMS FIGURE 2-5 Batch Processing Master File Batch and Real-time Processing Group source documents into batches. Generate control totals. Enter batches at predetermined times or batch sizes. Sort file and edit data as appropriate. Store data in temporary file. Online Batch Processing Enter transactions into system as they occur. Enter transactions into system as they occur. reports - System output organized in a meaningful fashion used by employees to control operational activities, by managers to make decisions and design strategies, and by investors and creditors to understand a company’s business activities. Print or electronically display desired output. Also print or display error reports, transaction reports, control total reports. Master File Store data in temporary file. Real-time Processing Process all batches. Update old master files with transaction data, creating new master file. Process temporary file at predetermined time. Update old master files with transaction data, creating new master file. Print or electronically display desired output. Master File Process transactions as they occur. Update master file with transaction data. Print or electronically display desired output. requisitions, are used internally. Documents can be printed out, or they can be stored as electronic images in a computer. For example, Toys ‘R’ Us uses electronic data interchange to communicate with its suppliers. Every year it processes over half a million invoices electronically, thereby eliminating paper documents and dramatically reducing costs and errors. This has resulted in higher profits and more accurate information. Reports are used by employees to control operational activities and by managers to make decisions and to formulate business strategies. External users need reports to evaluate company profitability, judge creditworthiness, or comply with regulatory requirements. Some CHAPTER 2 OVERVIEW OF TRANSACTION PROCESSING AND ERP SYSTEMS reports, such as financial statements and sales analyses, are produced on a regular basis. Others are produced on an exception basis to call attention to unusual conditions. For example, S&S could have its system produce a report to indicate when product returns exceed a certain percentage of sales. Reports can also be produced on demand. For example, Susan could produce a report to identify the salesperson who sold the most items during a specific promotional period. The need for reports should be periodically assessed because they are often prepared long after they are needed, wasting time, money, and resources. For example, NCR Corporation reduced the number of reports from 1,200 to just over 100. Another company eliminated 6 million pages of reports, a stack four times higher than its 41-story headquarters building. One 25-page report took five days to prepare and sat unread. A database query is used to provide the information needed to deal with problems and questions that need rapid action or answers. A user enters a request for a specific piece of information; it is retrieved, displayed, or analyzed as requested. Repetitive queries are often developed by information systems specialists. One-time queries are often developed by users. Some companies, such as Walmart, allow suppliers to access their databases to help them better serve Walmart’s needs. Suppliers can gauge how well a product is selling in every Walmart store in the world and maximize sales by stocking and promoting items that are selling well. Additional information about system output is contained in Chapters 14–18. Transaction Processing: Blockchain People have been engaging in business transactions for thousands of years. Originally, people kept track of, or accounted for, these transactions using a single-entry accounting system. We eventually graduated to the double entry bookkeeping system with the journals and ledgers and paper-based financial reports that have been used for hundreds of years. When computers were invented, we digitized the journals and ledgers and created transaction files and master files that did the job of paper-based journals and ledgers. When the number of master files proliferated with its attendant data redundancies and inaccuracies, we combined multiple files into databases, which have grown larger and more complex over time. Each company involved in the transaction had its own way of capturing transaction data and storing transactions, often in centralized databases that provided better control and security. Customers and vendors must periodically reconcile its records to the other party in the transaction. With computers also came a large variety of software programs to capture, store, process, and report accounting data. But these programs often did not capture non-financial data very well. Over time, accounting software has improved significantly. We now have intelligent or automated accounting products that provide automatic transaction recording, on demand accounting functions, and the automatic distribution of data, thereby doing away with many of the bookkeeping functions of old. These systems, which have machine learning and artificial intelligence embedded in them, store the data in the cloud. They also use smart portals for clients to transfer data and information back and forth. When the parties to a transaction do not trust each other, a third-party steps in to hold the items of value being exchanged until both parties complete their side of the transaction. For example, when you buy a house, you use realtors and a title company to make sure a clear title is passed and to ensure the house conveys to the buyer and the money to pay for the house conveys to the seller. The titles are then recorded by county governments, creating a public record of what is owned by whom. The advent of the Internet has had a tremendous impact on people and businesses. The Internet has many uses, including the ability to share information with large groups of people. There are many people-to-people interactions such as social media. There are also many business-to-consumer applications such as online shopping. Business-to-business transactions are also facilitated by the Internet. Many Internet transactions are processed and stored by older, traditional legacy systems. 67 query - A request for the database to provide the information needed to deal with a problem or answer a question. The information is retrieved, displayed or printed, and/or analyzed as requested. 68 PART I CONCEPTUAL FOUNDATIONS OF ACCOUNTING INFORMATION SYSTEMS smart contract - A regular contract with the terms and agreed upon details built into the blockchain. Rules govern the blockchain’s interaction with users. A smart contract can be automated and executed based on external triggers. With the advent of cryptocurrencies, a new technology called blockchain is changing the way financial transactions as well as many other types of transactions are recorded, processed, and stored. While the Internet is a network of information, a blockchain is a network of value and of trust. That is, items of value can be exchanged in a secure and trusted manner. Blockchain is more than a database; it is a new way to process, store, share, and search information. Blockchain, and how it works, is discussed in Chapters 1 and 11. One use that was not profiled in Focus 1-3 is smart contracts. They are discussed briefly here as they are relevant to transaction processing. A smart contract is a regular contract with the terms and agreed upon details built into a blockchain. The organizations using the blockchain can establish the rules that govern the blockchain’s interaction with its users. Among those rules would be who is authorized to review, mine, analyze, and audit the blockchain transaction details. These interactions can be automated and presented to users in data dashboards. An organization can automate the execution of a smart contract based on external triggers. For example, sensors in a warehouse could recognize when ordered goods are delivered and the system could then trigger the payment of the agreed upon transaction amount. These transactions could also have the advantages described in Chapter 1 such as transparency, immutability, security, trust, and the elimination of third-party verification. Enterprise Resource Planning (ERP) Systems enterprise resource planning (ERP) systems - Systems that integrate all aspects of an organization’s activities—such as accounting, finance, marketing, human resources, manufacturing, inventory management— into one system. An ERP system is modularized; companies can purchase the individual modules that meet their specific needs. An ERP facilitates information flow among the company’s various business functions and manages communications with outside stakeholders. Traditionally, the AIS has been referred to as a transaction processing system because its only concern was financial data and accounting transactions. For example, when a sale took place, the AIS would record a journal entry showing only the date of the sale, a debit to either cash or accounts receivable, and a credit to sales. Other potentially useful nonfinancial information about the sale, such as the time of day that it occurred, would traditionally be collected and processed outside the AIS. Consequently, many organizations developed additional information systems to collect, process, store, and report information not contained in the AIS. Unfortunately, the existence of multiple systems creates numerous problems and inefficiencies. Often the same data must be captured and stored by more than one system, which not only results in redundancy across systems but also can lead to discrepancies if data are changed in one system but not in others. In addition, it is difficult to integrate data from the various systems. Enterprise resource planning (ERP) systems overcome these problems as they integrate all aspects of a company’s operations with a traditional AIS. Most large and many mediumsized organizations use ERP systems to coordinate and manage their data, business processes, and resources. The ERP system collects, processes, and stores data and provides the information managers and external parties need to assess the company. As shown in Figure 2-6, a properly configured ERP system uses a centralized database to share information across business processes and coordinate activities. This is important because an activity that is part of one business process often triggers a complex series of activities throughout many different parts of the organization. For example, a customer order may necessitate scheduling additional production to meet the increased demand. This may trigger an order to purchase more raw materials. It may also be necessary to schedule overtime or hire temporary help. Well-designed ERP systems provide management with easy access to up-to-date information about all of these activities in order to plan, control, and evaluate the organization’s business processes more effectively. ERP systems are modular, with each module using best business practices to automate a standard business process. This modular design allows businesses to add or delete modules as needed. Typical ERP modules include: ●● Financial (general ledger and reporting system)—general ledger, accounts receivable, accounts payable, fixed assets, budgeting, cash management, and preparation of managerial reports and financial statements CHAPTER 2 OVERVIEW OF TRANSACTION PROCESSING AND ERP SYSTEMS 69 FIGURE 2-6 Revenue Cycle Expenditure Cycle (Chapter 14) (Chapter 15) Sell Goods and Services Receive Payment Buy Goods and Services Make Payment Integrated ERP Database HR/Payroll Cycle (Chapter 17) Get Employee Time Production Cycle Pay Employees (Chapter 16) Use Employee Time Use Raw Materials Use Machines ●● ●● ●● ●● ●● ●● ●● Make Finished Product General Ledger and Reporting System (Chapter 18) Produce Reports and Financial Statements Human resources and payroll—human resources, payroll, employee benefits, training, time and attendance, benefits, and government reporting. Order to cash (revenue cycle)—sales order entry, shipping, inventory, cash receipts, commission calculation. Purchase to pay (disbursement cycle)—purchasing, receipt and inspection of inventory, inventory and warehouse management, and cash disbursements. Manufacturing (production cycle)—engineering, production scheduling, bill of materials, work-in-process, workflow management, quality control, cost management, and manufacturing processes and projects. Project management—costing, billing, time and expense, performance units, activity management. Customer relationship management—sales and marketing, commissions, service, customer contact, and call center support. System tools—tools for establishing master file data, specifying flow of information, access controls, and so on. An ERP system, with its centralized database, provides significant advantages: ●● ●● An ERP provides an integrated, enterprise-wide, single view of the organization’s data and financial situation. Storing all corporate information in a single database breaks down barriers between departments and streamlines the flow of information. Data input is captured or keyed once, rather than multiple times, as it is entered into different systems. Downloading data from one system to another is no longer needed. Integrated ERP System 70 PART I CONCEPTUAL FOUNDATIONS OF ACCOUNTING INFORMATION SYSTEMS ●● ●● ●● ●● ●● Management gains greater visibility into every area of the enterprise and greater monitoring capabilities. Employees are more productive and efficient because they can quickly gather data from both inside and outside their own department. The organization gains better access control. An ERP can consolidate multiple permissions and security models into a single data access structure. Procedures and reports are standardized across business units. This standardization can be especially valuable with mergers and acquisitions because an ERP system can replace the different systems with a single, unified system. Customer service improves because employees can quickly access orders, available inventory, shipping information, and past customer transaction details. Manufacturing plants receive new orders in real time, and the automation of manufacturing processes leads to increased productivity. ERP systems also have significant disadvantages: ●● ●● ●● ●● ●● Cost. ERP hardware, software, and consulting costs range from $50 to $500 million for a Fortune 500 company and upgrades can cost $50 million to $100 million. Midsized companies spend between $10 and $20 million. Amount of time required. It can take years to select and fully implement an ERP system, depending on business size, number of modules to be implemented, degree of customization, the scope of the change, and how well the customer takes ownership of the project. As a result, ERP implementations have a very high risk of project failure. Changes to business processes. Unless a company wants to spend time and money customizing modules, they must adapt to standardized business processes as opposed to adapting the ERP package to existing company processes. The failure to map current business processes to existing ERP software is a main cause of ERP project failures. Complexity. This comes from integrating many different business activities and systems, each having different processes, business rules, data semantics, authorization hierarchies, and decision centers. Resistance. Organizations that have multiple departments with separate resources, missions, profit and loss, and chains of command may believe that a single system has few benefits. It also takes considerable training and experience to use an ERP system effectively, and employee resistance is a major reason why many ERP implementations do not succeed. It is not easy to convince employees to change how they do their jobs, train them in new procedures, master the new system, and persuade them to share sensitive information. Resistance, and the blurring of company boundaries, can cause problems with employee morale, accountability, and lines of responsibility. Reaping the potential benefits of ERP systems and mitigating their disadvantages requires conscious effort and involvement by top management. Top management’s commitment to and support for the necessary changes greatly increase the chances of success. Because ERP systems are complex and expensive, choosing one is not an easy task. In doing so, you must take great care to ensure that the ERP system has a module for every critical company process and that you are not paying for software modules that you do not need. One way to choose a suitable system is to select a package designed for your industry. Although cost is a huge concern, buying too cheaply can cost more in the long run if the system does not meet your needs because modification costs can be quite high. You can minimize the risk of buying the wrong package by researching the best ERP vendors. There are many ERP vendors, the two largest being SAP and Oracle. Other leading vendors are The Sage Group, Microsoft, and Infor. Because it is too difficult for most companies to implement ERP software by themselves, they often hire an ERP vendor or a consulting company to do it for them. These firms usually provide three types of services: consulting, customization, and support. For most midsized companies, implementation costs range from the list price of the ERP user licenses to twice that amount. Large companies with multiple sites often spend three to five times the cost of the user license. Because many processes automatically trigger additional actions in other modules, proper configuration is essential. This requires a sound understanding of all major business processes CHAPTER 2 OVERVIEW OF TRANSACTION PROCESSING AND ERP SYSTEMS 71 and their interactions so they can be defined. Examples include setting up cost/profit centers, credit approval policies, and purchase approval rules. In the configuration process, companies balance the way they want the system to operate with the way it lets them operate. If the way an ERP module operates is unacceptable, the company can modify the module. Alternatively, it can use an existing system and build interfaces between it and the ERP system. Both options are time consuming, costly, and result in fewer system integration benefits. In addition, the more customized a system becomes, the more difficult it is to communicate with suppliers and customers. To make configuration easier, ERP vendors are developing built-in “configuration” tools to address most customers’ needs for system changes. The importance of sound internal controls in an ERP cannot be overstated. The integrated nature of ERP systems means that unless every data item is validated and checked for accuracy at the time of initial entry, errors will automatically propagate throughout the system. Thus, data entry controls and access controls are essential. Most managers and employees see and have access to only a small portion of the system. This segregation of duties provides sound internal control. It is important to separate responsibility for custody of assets, authorization of activities that affect those assets, and recording information about activities and the status of organizational assets. Summary and Case Conclusion Ashton is aware that Scott and Susan plan to open additional stores in the near future and want to develop a website to conduct business over the Internet. Based on this information, Ashton will select an accounting package that will satisfy S&S’s current and anticipated future needs. The software should be able to take care of all data processing and data storage tasks. Ashton will also make sure the software can interface with the source data automation devices he wants to use to capture most data input. The software must be capable of producing a full set of financial reports and be flexible enough to produce other useful information the company will need to be successful. Finally, Ashton realized his next step would be to select the software and produce some documentation of how the system worked. KEY TERMS data processing cycle 58 source documents 58 turnaround documents 58 source data automation 59 general ledger 60 subsidiary ledger 60 control account 60 coding 60 sequence codes 60 block code 60 group codes 60 mnemonic codes 60 chart of accounts 61 general journal 62 specialized journal 62 audit trail 63 entity 64 attributes 64 field 64 record 64 data value 64 file 64 master file 64 transaction file 64 database 64 batch processing 65 real-time processing 65 documents 65 reports 66 query 67 smart contract 68 enterprise resource planning (ERP) systems 68 AIS in Action CHAPTER QUIZ 1. Which of the following is not an appropriate guideline for coding systems? a. Ensure codes used are as simple as c. Provide for flexibility across divisions when designpossible ing codes b. Ensure consistency with the intended d. Provide for growth to ensure there will be sufficient use of codes codes available 72 PART I CONCEPTUAL FOUNDATIONS OF ACCOUNTING INFORMATION SYSTEMS 2. Which of the following is true of a chart of accounts? a. tailored to the needs and purpose of c. list of numbers assigned to subsidiary the organization ledger accounts b. account listing of trial balance d. all count numbers are of the same accounts length 3. A code where items are all accounted for by being numbered consecutively and missing items cause a gap is a a. sequence code. c. group code. b. block code. d. mnemonic code. 4. Which of the following will not be a subsidiary ledger? a. accounts receivable c. fixed assets b. accounts payable d. petty cash 5. Which of the following documents is most likely to be used in the revenue cycle? a. purchase order c. deposit slip b. receiving report d. time sheet 6. The portion of a data record where the value for a particular attribute is stored is called a. an entity. c. a field. b. an attribute. d. a record. 7. How does the chart of accounts list general ledger accounts? a. alphabetical order d. the order in which they appear in b. chronological order financial statements c. size order 8. Which of the following is NOT an advantage of an ERP system? a. better access control c. improved monitoring capabilities b. standardization of procedures and reports d. simplicity and reduced costs 9. Records of company data sent to an external party and then returned to the system as input are called a. turnaround documents c. source documents b. source data automation documents d. external input documents 10. What kind of processing involves entering transaction data and editing them as they occur? a. batch processing c. online real-time processing b. online batch processing DISCUSSION QUESTIONS 2.1 Table 2-1 lists some of the documents used in the revenue, expenditure, and human resources cycle. What kinds of input or output documents or forms would you find in the production (also referred to as the conversion) cycle? 2.2 Give three examples each of the advantages and the disadvantages of an ERP system with a centralized database. How you can increase the change of a successful ERP implementation? 2.3 What is the purpose of turnaround documents? Give examples of how companies use turnaround documents. 2.4 Discuss the guidelines for a better coding system. Explain why these guidelines are important, and what would happen if they are not met. 2.5 Some accounting students believe that they do not need to study information systems to be good accountants. What are the disadvantages of this point of view? What are the advantages of accountants being involved in designing and preparing reports that measure more than just financial performance? CHAPTER 2 OVERVIEW OF TRANSACTION PROCESSING AND ERP SYSTEMS PROBLEMS 2.1 The chart of accounts must be tailored to an organization’s specific needs. Discuss how the chart of accounts for the following organizations would differ from the one presented for S&S in Table 2-2. a. university b. bank c. government unit (city or state) d. manufacturing company e. expansion of S&S to a chain of two stores 2.2 Steven Young is the controller of Seoul-based DMCA, a company that designs and manufactures specialized equipment. The company has five major operating divisions, mechanical design, electrical design, machine manufacturing, part manufacturing, and installation. The sales from each of the divisions ranged between 750,000 and 5 million (South Korean won) in the previous financial year. Each of the divisions is independent, both physically and managerially, except for the continuous surveillance of the company’s founder, Xolani Ncube. The AIS for each division evolved according to the needs and the abilities of its accounting staff. Young is the first controller to have responsibility for overall financial management. As Young will be retiring in five years, Ncube wants Young to improve the AIS so that it will be easier to monitor the performance of each division. Young decided to include the following features in the financial reporting system: • Managers should receive uniform, timely, and accurate reports of all business activities in each division. The uniform monthly reports across divisions should be completed by the fifth day of the following month to provide sufficient time for corrective action (if required) to affect the performance of the next month. Companywide financial reports should be available at the same time. • Reports should provide a basis for measuring the return on investment for each division. In addition to revenue and expense accounts, reports should therefore also show assets assigned to each division. • Meaningful budget data, required for planning and decision-making purposes, should also be generated. Budgets should reflect managerial responsibility and it should show costs for the major product groups. • Young believes that a new chart of accounts would be required to incorporate the newly included features. He wants to divide financial statement accounts into major categories, such as assets, liabilities, revenue, and equity. He foresees a need for a maximum of 15 control accounts within each of the categories. From his observations to date, he estimates that 75 subsidiary accounts will be more than adequate for each control account. • Each division has a maximum of five major product groups. A minimum of ten cost centers within any product group is required, including both the operating and nonoperating groups. Young views general divisional costs as a non-revenue-producing product group. According to Young’s estimation, 40 expense accounts and nine specific variance accounts would be adequate. REQUIRED Design a chart of accounts for DMCA. Explain how you structured the chart of accounts to meet the needs of the company and the company’s operating characteristics. Keep total account code length to a minimum, while still satisfying Young’s requirements. 2.3 The purpose of an audit trail is to be able to trace a transaction from its origin through source documents to the final output or backwards from the final output to the original 73 74 PART I CONCEPTUAL FOUNDATIONS OF ACCOUNTING INFORMATION SYSTEMS source documents to prove the accuracy and validity of ledger postings. Describe in detail the audit trail for the following in a manufacturing business: a. Shipping an order to a customer b. Customer returns defective goods c. Employee payroll for employee wages (using time cards or time sheets) 2.4 Your IT company deals in laptops, desktops, and servers. You also sell computer parts like hard drives and motherboards. Design a coding scheme for your company. 2.5 Match the following terms with their definitions. Term 1. attribute 2. audit trail 3. batch processing 4. block code 5. chart of accounts 6. coding 7. 8. control account data processing cycle 9. data value 10. database 11. entity l2. field 13. general journal 14. general ledger 15. group code 16. master file Definition a. Contains summary-level data for every asset, liability, equity, revenue, and expense account b. Items numbered consecutively to account for all items; missing items cause a gap in the numerical sequence c. Path of a transaction through a data processing system from point of origin to final output, or backward from final output to point of origin d. List of general ledger account numbers; allows transaction data to be coded, classified, and entered into proper accounts; facilitates preparation of financial statements and reports e. Contents of a specific field, such as “George” in a name field f. Portion of a data record that contains the data value for a particular attribute, like a cell in a spreadsheet g. Company data sent to an external party and then returned to the system as input h. Used to record infrequent or nonroutine transactions i. Characteristics of interest that need to be stored j. Steps a company must follow to efficiently and effectively process data about its transactions k. Something about which information is stored l. Stores cumulative information about an organization; like a ledger in a manual AIS m. Contains detailed data for any general ledger account with many individual subaccounts n. Contains records of individual business transactions that occur during a specific time period o. Updating each transaction as it occurs p. Devices that capture transaction data in machine-readable form at the time and place of their origin CHAPTER 2 17. mnemonic code 18. real-time processing 19. record 20. sequence code 21. source data automation 22. source documents 23. specialized journal 24. subsidiary ledger 25. transaction file 26. turnaround documents OVERVIEW OF TRANSACTION PROCESSING AND ERP SYSTEMS q. Used to record large numbers of repetitive transactions r. Set of interrelated, centrally coordinated files s. Two or more subgroups of digits used to code items t. Updating done periodically, such as daily u. Systematic assignment of numbers or letters to items to classify and organize them v. Letters and numbers, derived from the item description, interspersed to identify items; usually easy to memorize w. Initial record of a transaction that takes place; usually recorded on preprinted forms or formatted screens x. Fields containing data about entity attributes, like a row in a spreadsheet y. Sets of numbers reserved for specific categories of data z. The general ledger account corresponding to a subsidiary ledger, where the sum of all subsidiary ledger entries should equal the amount in the general ledger account 2.6 Identify which data processing method (batch or real-time) would be required for the following scenarios: a. Prepare weekly payroll checks b. Purchase goods from an online (e-commerce) store c. Prepare daily bank deposits d. Prepare municipality bills for water and electricity e. Make a cash withdrawal at an ATM f. Purchase bus tickets online g. Transfer money to your mother via money transfer at the local grocery store h. Purchase clothing from your favorite retail outlet at the local mall 2.7 On their websites, you will find several online demonstrations for the SAP and Oracle ERP systems. Visit these websites and explore their content by doing the following: a. Search the SAP site for corporate videos, and watch two of them. Explore the industries, services, solutions, and platforms that SAP offers. Read several of the articles, such as the ones about customer successes. b. Explore the Oracle website just as you explored the SAP site. REQUIRED After viewing the websites, and based on your reading of the chapter, write a two-page paper that describes how an ERP can connect and integrate the revenue, expenditure, human resources/payroll, and financing cycles of a business. 2.8 Which of the following actions update a master file and which would be stored as a record in a transaction file? a. Add a new customer b. Record purchases of raw materials c. Change the tax percentage on taxable goods d. Update supplier payment terms e. Record sales 75 76 PART I CONCEPTUAL FOUNDATIONS OF ACCOUNTING INFORMATION SYSTEMS f. g. h. i. j. k. l. 2.9 Record employee commission on sales Update accounts receivable balance Update unit prices of selected stock items Record cash receipts Update customer balance Update customer contact details Record payroll checks You were hired to assist Ashton Fleming in designing an accounting system for S&S. Ashton has developed a list of the journals, ledgers, reports, and documents that he thinks S&S needs (see Table 2-4). He asks you to complete the following tasks: a. Specify what data you think should be collected on each of the following four documents: sales invoice, purchase order, receiving report, employee time card. b. Design a report to manage inventory. c. Design a report to assist in managing credit sales and cash collections. d. Visit a local office supply store and identify what types of journals, ledgers, and blank forms for various documents (sales invoices, purchase orders, etc.) are available. Describe how easily they could be adapted to meet S&S’s needs. 2.10 Answer the following 10 multiple choice questions. 1. Which of the following statements is (are) true? a. Well-designed documents and screens improve accuracy and completeness by providing instructions or prompts about what data to collect. b. Online batch processing is where transaction data are entered, edited, and processed as they occur. TABLE 2-4 Documents, Journals, and Ledgers for S&S Title Documents Sales Invoice Service Invoice Delivery Ticket Monthly Statement Credit Memo Purpose Time Card Record cash and credit sales of merchandise Record sales of repair services Record delivery of merchandise to customers Inform customers of outstanding account balances Support adjustments to customer accounts for sales returns and allowances and sales discounts; also support write-off of uncollectible accounts Order merchandise from vendors Record receipt of merchandise from vendors, indicating both quantity and condition of items received Record time worked by employees Specialized Journals Sales Cash Receipts Purchases Cash Disbursements Record all credit sales Record cash sales, payments from customers, and other cash receipts Record all purchases from vendors Record all cash disbursements General Journal Record infrequent, nonroutine transactions; also record adjusting and closing entries Subsidiary Ledgers Accounts Receivable Accounts Payable Inventory Fixed Assets Maintain details about amounts due from customers Maintain details about amounts due to vendors Maintain details about each inventory item Maintain details about each piece of equipment and other fixed assets General Ledger Maintain details about all major asset, liability, equity, revenue, and expense accounts Purchase Order Receiving Report CHAPTER 2 OVERVIEW OF TRANSACTION PROCESSING AND ERP SYSTEMS c. ERP implementation costs for large companies with multiple sites are usually about half the cost of the ERP user license. d. In an ERP system, data entry controls such as validating data items and checking them for accuracy at the time of initial entry are not needed. e. Data in ledgers is organized logically using coding techniques that assign numbers or letters to items to classify and organize them. 2. Which of the following statements is (are) true? a. With sequence codes, items are numbered consecutively to account for all items, and missing items cause a gap in the numerical sequence. b. The data capture or input process is usually triggered by a top management decision. c. Updating done periodically, such as daily or weekly, is referred to as batch processing. d. Cumulative accounting information is stored in general and subsidiary journals. e. Computers store data in a field; the fields containing data about entity attributes constitute a record. 3. Which of the following statements is (are) true? a. A chart of accounts facilitates preparing financial statements because data stored in individual accounts can easily be summed for presentation. b. Repetitive and frequently used database queries are usually developed by users; one-time queries are usually developed by information systems specialists. c. A database query can provide the information needed to deal with problems and questions that need rapid action or answers. d. A journal entry shows the accounts and amounts to be debited and credited. e. Transaction files are permanent and must be maintained for several years for backup purposes. 4. Which of the following statements is (are) true? a. A group code is derived from the description of the item and is usually easy to memorize. b. Using source data automation or well-designed turnaround documents and data entry screens helps ensure captured data are accurate and complete. c. It is usually best to let a user determine what data to input rather than have data input screens list the data the user needs to enter. d. If the sum of all subsidiary ledger account balances does not equal its general ledger control account balance, a recording error has occurred. e. Real-time processing updates transactions as they occur, helping ensure stored information is current and useful in making decisions. 5. Which of the following statements is (are) true? a. With mnemonic codes, blocks of numbers are reserved for specific categories of data. b. Input controls are improved by using pre-numbered source documents or by the system automatically assigning a sequential number to each transaction. c. In an integrated ERP system, undetected data entry errors can automatically propagate throughout the system. d. As ERP modules do not automatically trigger additional actions in other modules, it is less important to understand business processes and their interactions. e. A purchase to pay ERP module facilitates production scheduling, work-in-process, quality control, cost management, and manufacturing processes. 6. Which of the following statements is (are) true? a. Data is one of a company’s most important resources but to function properly most organizations do not have to have the data readily and easily accessible. b. Turnaround documents are company output sent to an external party and returned as an input document. c. Each type of entity possesses the same set of attributes or characteristics of interest that are stored, but the specific data values for those attributes will differ depending on the entity. 77 78 PART I CONCEPTUAL FOUNDATIONS OF ACCOUNTING INFORMATION SYSTEMS d. Reaping the potential benefits of ERP systems and mitigating their disadvantages requires conscious effort and involvement by top management. e. Real-time data processing is almost always cheaper and more efficient than batch processing. 7. Which of the following statements is (are) true? a. Source data automation devices capture transaction data in paper form at the time and place of their origin. b. Master files are permanent and exist across fiscal periods; individual master file records may change frequently. c. General ledgers are often used for accounts receivable, inventory, fixed assets, and accounts payable. d. If an ERP system does not meet your needs, it can almost always be inexpensively modified to meet your unique needs. e. When choosing an ERP system, make sure it has a module for every critical company process and you are not paying for modules you do not need. 8. Which of the following statements is (are) true? a. Documents are records of transaction or other company data that can be printed out or stored as electronic images in a computer. b. Transaction data are almost always recorded in a ledger before they are entered into a journal. c. Since batch processing data are current and accurate only immediately after processing, it is used for applications that do not need frequent updating. d. ERP systems are not effective in integrating non-financial company operations with a traditional accounting system. e. Well-designed screens improve accuracy and completeness by using checkoff boxes or pull-down menus to present the available options. 9. Which of the following statements is (are) true? a. A transaction file contains records of individual business transactions and is similar to a general ledger in a manual AIS. b. To ensure credit sales policies are followed, the system can be programmed to check a customer’s credit limit and payment history. c. Use of pre-numbered documents makes it harder to verify that all transactions have been recorded and that none has been misplaced. d. An ERP system uses a centralized database to share information across business processes and coordinate activities. e. It is difficult for an ERP system to provide management with the up-to-date information needed to plan, control, and evaluate an organization’s business. 10. Which of the following statements is (are) true? a. The need for reports should be periodically assessed because they are often prepared long after they are needed—wasting time, money, and resources. b. An audit trail is a transaction path through a data processing system from point of origin to final output, but not backward from final output to point of origin. c. Accountants and systems developers do not need to understand how data are captured, organized, stored, processed, or accessed. d. An AIS has traditionally been referred to as a transaction processing system because its only concern was financial data and accounting transactions. e. A master file, like a ledger in a manual AIS, stores cumulative information about an organization. CHAPTER 2 OVERVIEW OF TRANSACTION PROCESSING AND ERP SYSTEMS CASE 2-1 Bar Harbor Blueberry Farm The Bar Harbor Blueberry Farm is a family-owned, 200-acre farm that grows and sells blueberries to grocery stores, blueberry wholesalers, and small roadside stands. Bar Harbor has 25 full-time employees and hires 150 to 200 seasonal workers for the harvest. For the past six summers, you have picked berries for Bar Harbor. When you graduated, you were hired as the full-time accountant/office manager. Until now, Bar Harbor kept most of its accounting records in a big file box. Jack Phillips, the owner, would like a more organized approach to the farm’s accounting records. He has asked you to establish a proper set of books. You decide to start by establishing appropriate journals and ledgers for these transactions. Presented below are a set of vendor invoices and a few partially completed journals and ledgers. Your job is to record these transactions and update the appropriate ledgers. Be sure to leave a proper audit trail. You may also use Excel, Great Plains, Peachtree, QuickBooks, or another accounting software package of your choosing to complete this problem. VENDOR INVOICES DATE SUPPLIER INVOICE SUPPLIER NAME SUPPLIER ADDRESS AMOUNT March 7 AJ34 Bud’s Soil Prep PO Box 34 $2,067.85 March 11 14568 Osto Farmers Supply 45 Main March 14 893V Whalers Fertilizer Route 34 $5,000.00 March 21 14699 Osto Farmers Supply 45 Main $3,450.37 March 21 10102 IFM Wholesale 587 Longview $4,005.00 March 24 10145 IFM Wholesale 587 Longview $ 267.88 ACCOUNT NUMBER $ 67.50 PURCHASES JOURNAL PAGE 1 DATE SUPPLIER SUPPLIER INVOICE March 7 Bud’s Soil Prep AJ34 POST REF AMOUNT $2,067.85 GENERAL LEDGER ACCOUNTS PAYABLE DATE DESCRIPTION March 1 Balance Forward ACCOUNT NUMBER: 300 POST REF DEBIT CREDIT BALANCE $18,735.55 GENERAL LEDGER PURCHASES ACCOUNT NUMBER: 605 DATE DESCRIPTION March 1 Balance Forward POST REF DEBIT CREDIT BALANCE $54,688.49 79 80 PART I CONCEPTUAL FOUNDATIONS OF ACCOUNTING INFORMATION SYSTEMS ACCOUNTS PAYABLE SUBSIDIARY LEDGER ACCOUNT NO: 23 DATE ACCOUNT NO: 24 DATE ACCOUNT NO: 36 DATE ACCOUNT NO: 38 DATE BUD’S SOIL PREP DESCRIPTION PO BOX 34 DEBIT OSTO FARMERS SUPPLY DESCRIPTION 45 MAIN ROUTE 34 BALANCE TERMS: 2/10, NET 30 CREDIT 587 LONGVIEW DEBIT BALANCE TERMS: 2/10, NET 30 CREDIT DEBIT IFM WHOLESALE DESCRIPTION CREDIT DEBIT WHALERS FERTILIZER DESCRIPTION TERMS: 2/10, NET 30 BALANCE TERMS: 2/10, NET 30 CREDIT BALANCE CASE 2-2 SDC Ollie Mace is the controller of SDC, an automotive parts manufacturing firm. Its four major operating divisions are heat treating, extruding, small parts stamping, and machining. Last year’s sales from each division ranged from $150,000 to $3 million. Each division is physically and managerially independent, except for the constant surveillance of Sam Dilley, the firm’s founder. The AIS for each division evolved according to the needs and abilities of its accounting staff. Mace is the first controller to have responsibility for overall financial management. Dilley wants Mace to improve the AIS before he retires in a few years so that it will be easier to monitor division performance. Mace decides to redesign the financial reporting system to include the following features: • It should give managers uniform, timely, and accurate reports of business activity. Monthly reports should be uniform across divisions and be completed by the fifth day of the following month to provide enough time to take corrective actions to affect the next month’s performance. Company-wide financial reports should be available at the same time. • Reports should provide a basis for measuring the return on investment for each division. Thus, in addition to revenue and expense accounts, reports should show assets assigned to each division. • The system should generate meaningful budget data for planning and decision-making purposes. Budgets should reflect managerial responsibility and show costs for major product groups. CHAPTER 2 OVERVIEW OF TRANSACTION PROCESSING AND ERP SYSTEMS M a c e b e li ev e s t h a t a n ew c h a r t o f a c counts is required to accomplish these goals. He wants to divide financial statement accounts into major categories, such as assets, liabilities, and equity. He does not foresee a need for more than 10 control accounts within each of these categories. From his observations to date, 100 subsidiary accounts are more than adequate for each control account. No division has more than five major product groups. Mace foresees a maximum of six cost centers within any product group, including both the operating and nonoperating groups. He views general divisional costs as a non-revenue-producing product group. Mace estimates that 44 expense accounts plus 12 specific variance accounts would be adequate. REQUIRED Design a chart of accounts for SDC. Explain how you structured the chart of accounts to meet the company’s needs and operating characteristics. Keep total account code length to a minimum, while still satisfying all of Mace’s desires. (CMA Examination, adapted) AIS in Action Solutions QUIZ KEY 1. Which of the following is not an appropriate guideline for coding systems? a. Ensure codes used are as simple as possible [Incorrect. Simple codes minimizes costs and enable staff to memorize and easily interpret the codes; this also supports employee acceptance of the coding system used.] b. Ensure consistency with the intended use of codes [Incorrect. People determining the codes need to consider what the codes will be used for in terms of system output, thus the codes should be used consistently throughout the organization.] ▶ c. Provide for flexibility across divisions when designing codes [Correct. There should be consistency in terms of the codes used – across the organization and across the different divisions; each division should not be allowed to create their own codes.] d. Provide for growth to ensure there will be sufficient codes available [Incorrect. Allow for growth. If a fast-growing company has 90 employees already, do not use a twodigit staff code.] 2. Which of the following is true of a chart of accounts? ▶ a. tailored to the needs and purpose of the organization [Correct. Chart of accounts set up according to the nature and purpose of the organization.] b. account listing of trial balance accounts [Incorrect. Account listing of income statement and balance sheet accounts.] c. list of numbers assigned to subsidiary ledger accounts [Incorrect. List of numbers assigned to all general ledger accounts.] d. all count numbers are of the same length [Incorrect. A field represents a data storage space. For example, a student majoring in Accounting would have “Accounting” stored in the major field.] 3. A code where items are accounted for by being numbered consecutively and the missing items cause a gap is called a ▶ a. sequence code. [Correct. Items are numbered consecutively to account for all of them, and the missing items cause a gap in the sequence.] b. block code. [Incorrect. Blocks of numbers are reserved for specific categories of data.] c. group code. [Incorrect. Two or more subgroups of digits used to code items, are often used in conjunction with block codes.] d. mnemonic code. [Incorrect. Letters and numbers are interspersed to identify an item.] 81 82 PART I CONCEPTUAL FOUNDATIONS OF ACCOUNTING INFORMATION SYSTEMS 4. Which of the following will not be a subsidiary ledger? a. accounts receivable [Incorrect. This is the subsidiary ledger containing information on all individual customers, with detailed information regarding the customer, including name, address, purchases, payments, account balance, and credit limit.] b. accounts payable [Incorrect. This is the subsidiary ledger containing information on everything owed to specific suppliers, with detailed information regarding the supplier, including name, address, purchases from the supplier, payments made to the supplier, and account balance.] c. fixed assets [Incorrect. This is the subsidiary ledger containing all information on fixed assets, including acquisition date, price, and depreciation method.] ▶ d. petty cash [Correct. Petty cash is a single account and does not require a subsidiary ledger.] 5. Which of the following documents is most likely to be used in the revenue cycle? a. purchase order [Incorrect. Expenditure cycle document indicating products ordered, their quantities, and prices.] b. receiving report [Incorrect. Expenditure cycle document containing information on products/services that had been delivered, such as date and time, name, quantity, and related purchase order.] ▶ c. deposit slip [Correct. Revenue cycle document indicating information on deposits made, including date, and amount.] d. time sheet [Incorrect. Expenditure cycle document indicating the employee and hours worked.] 6. The portion of a data record where the value for a particular attribute is stored is called a. an entity. [Incorrect. An entity is an item about which information is stored.] b. an attribute. [Incorrect. Each entity has attributes, or characteristics of interest.] ▶ c. a field. [Correct. The portion of a data record where the data value for a particular attribute is stored.] d. a record. [Incorrect. The fields containing data about entity attributes constitute a record.] 7. How does the chart of accounts list general ledger accounts? a. alphabetical order [Incorrect. General ledger accounts are listed in the order in which they appear in the financial statements, not in alphabetical order.] b. chronological order [Incorrect. General ledger accounts are listed in the order in which they appear in the financial statements, not according to the date they were created.] c. size order [Incorrect. General ledger accounts are listed in the order in which they appear in the financial statements, not according to their size.] ▶ d. the order in which they appear in financial statements [Correct.] 8. Which of the following is NOT an advantage of an ERP system? a. better access control [Incorrect. Better access control is an advantage because an ERP can consolidate multiple permissions and security models into a single data access structure.] b. standardization of procedures and reports [Incorrect. Standardization of procedures and reports is an advantage because procedures and reports can be standardized across business units, and in mergers and acquisitions they can replace the different systems with a single, unified system.] c. improved monitoring capabilities [Incorrect. Improved monitoring capabilities are an advantage because management gains greater visibility into every area of the enterprise that allows them to better monitor the organization.] ▶ d. simplicity and reduced costs [Correct. ERP systems are quite complex and costly; they do not offer the advantages of simplicity and reduced costs.] CHAPTER 2 OVERVIEW OF TRANSACTION PROCESSING AND ERP SYSTEMS 9. Records of company data sent to an external party and then returned to the system as in. put are called ▶ a. turnaround documents [Correct. For example, a utility bill is sent to a customer, who then returns the bill with payment.] b. source data automation documents [Incorrect. Source data automation is the capturing of input data in machine-readable form.] c. source documents [Incorrect. Source documents collect data about business activities.] d. external input documents [Incorrect. These documents originate from external sources.] 10. What kind of processing involves entering transaction data and editing them as they occur? a. batch processing [Incorrect. Updating performed periodically, such as daily, is referred to as batch processing.] ▶ b. online batch processing [Correct. Entering transaction data and editing them as they occur.] c. online real-time processing [Incorrect. Most companies update each transaction as it occurs; this is referred to as online, real-time processing because it ensures that stored information is always current, thereby increasing its decision-making usefulness.] 83 CHAPTER 3 Systems Documentation Techniques LEARNING OBJECTIVES After studying this chapter, you should be able to: 1. Prepare and use business process diagrams to understand, evaluate, and document information systems. 2. Prepare and use flowcharts to understand, evaluate, and document information systems. 3. Prepare and use data flow diagrams to understand, evaluate, and document information systems. I N TEGRATIV E C ASE S&S What a hectic few months it has been for Ashton Fleming! He helped S&S get started, helped get S&S through its weeklong grand opening, and was swamped with processing all the transactions from the highly successful grand opening. Because of its rapid growth, S&S has outgrown the initial rudimentary accounting information system (AIS) that Ashton selected. Lacking time and expertise, Ashton has engaged Computer Applications (CA), a systems consulting firm, to help S&S select and install a new and more powerful AIS. During Ashton’s first meeting with Kimberly Sierra, CA’s manager, she asked about S&S’s system requirements and management’s expectations. Ashton had yet to think through these issues, so he could not answer her specifically. When she asked how S&S’s system worked, Ashton plunged into a discussion about the use of various company documents, but Kimberly seemed unable to absorb his detailed explanations. Ashton thought that part of his discussion was helpful, but overall it was irrelevant to the issue at hand. Ashton came away impressed by CA and Kimberly. He also realized the need to understand S&S’s information requirements more clearly. From his days as an auditor, Ashton knew the value of good system documentation in helping unfamiliar users both understand and evaluate a system. Good system documentation would be a big help to him and Kimberly, as well as to Scott and Susan as they evaluate the current and proposed systems. After sharing his conclusions with Susan and Scott, they enthusiastically approved 84 Ashton’s plan to document the current and proposed systems. They supported his taking a