Uploaded by Thảo Nguyễn Thạch

file giáo trình tiếng anh

advertisement
FuzzBones/Shutterstock
Stephen VanHorn/Shutterstock
Ppbig/123RF
Accounting
Information
Systems
This page intentionally left blank
Ppbig/123RF
Accounting
Information
Systems
Stephen VanHorn/Shutterstock
FIFTEENTH EDITION
GLOBAL EDITION
Marshall B. Romney
Professor Emeritus, Brigham Young University
Paul John Steinbart
Professor Emeritus, Arizona State University
Scott L. Summers
FuzzBones/Shutterstock
Brigham Young University
David A. Wood
Brigham Young University
Harlow, England • London • New York • Boston • San Francisco • Toronto • Sydney • Dubai • Singapore • Hong Kong
Tokyo • Seoul • Taipei • New Delhi • Cape Town • Sao Paulo • Mexico City • Madrid • Amsterdam • Munich • Paris • Milan
A01_ROMN3364_15_GE_FM.indd 3
17/07/20 1:44 PM
Please contact https://support.pearson.com/getsupport/s/contactsupport with any queries on this content.
Microsoft and/or its repective suppliers make no representations about the suitability of the information contained in the
documents and related graphics published as part of the services for any purpose. All such documents and related graphics
are provided “as is” without warranty of any kind. Microsoft and/or its respective suppliers hereby disclaim all warranties
and conditions with regard to this information, including all warranties and conditions of merchantability, whether express,
implied or statutory, fitness for a particular purpose, title and non-infringement. In no event shall Microsoft and/or its
respective suppliers be liable for any special, indirect or consequential damages or any damages whatsoever resulting from
loss of use, data or profits, whether in an action of contract, negligence or other tortious action, arising out of or in connection with the use or performance of information available from the services.
The documents and related graphics contained herein could include technical inaccuracies or typographical errors. Changes
are periodically added to the information herein. Microsoft and/or its respective suppliers may make improvements and/
or changes in the product(s) and/or the program(s) described herein at any time. Partial screen shots may be viewed in full
within the software version specified.
Microsoft® and Windows® are registered trademarks of the Microsoft Corporation in the U.S.A. and other countries. This
book is not sponsored or endorsed by or affiliated with the Microsoft Corporation.
Acknowledgments of third-party content appear on the appropriate page within the text.
PEARSON, ALWAYS LEARNING, and Revel are exclusive trademarks owned by Pearson Education, Inc. or its affiliates
in the U.S. and/or other countries.
Pearson Education Limited
KAO Two
KAO Park
Hockham Way
Harlow
Essex
CM17 9SR
United Kingdom
and Associated Companies throughout the world
Visit us on the World Wide Web at: www.pearsonglobaleditions.com
© Pearson Education Limited 2021
The rights of Marshall B. Romney, Paul John Steinbart, Scott L. Summers, and David A. Wood, to be identified as the authors
of this work, have been asserted by them in accordance with the Copyright, Designs and Patents Act 1988.
Authorized adaptation from the United States edition, entitled Accounting Information Systems, 15th Edition, ISBN
978-0-13-557283-2 by Marshall B. Romney, Paul John Steinbart, Scott L. Summers, and David A. Wood, published
by Pearson Education © 2021.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form
or by any means, electronic, mechanical, photocopying, recording or otherwise, without either the prior written permission
of the publisher or a license permitting restricted copying in the United Kingdom issued by the Copyright Licensing Agency
Ltd, Saffron House, 6–10 Kirby Street, London EC1N 8TS. This publication is protected by copyright, and permission
should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in
any form or by any means, electronic, mechanical, photocopying, recording, or otherwise. For information regarding permissions, request forms, and the appropriate contacts within the Pearson Education Global Rights and Permissions department,
please visit www.pearsoned.com/permissions/.
All trademarks used herein are the property of their respective owners. The use of any trademark in this text does not vest in
the author or publisher any trademark ownership rights in such trademarks, nor does the use of such trademarks imply any
affiliation with or endorsement of this book by such owners.
This eBook is a standalone product and may or may not include all assets that were part of the print version. It also does
not provide access to other Pearson digital products like Revel, MyLab, and Mastering. The publisher reserves the right to
remove any material in this eBook at any time.
ISBN 10: 1-292-35336-8
ISBN 13: 978-1-292-35336-4
eBook ISBN 13: 978-1-292-35328-9
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library
Typeset by Integra Software Services
Brief Contents
Preface
PART I
19
Conceptual Foundations of Accounting
Information Systems 27
CHAPTER 1 Accounting Information Systems: An Overview
28
CHAPTER 2 Overview of Transaction Processing and Enterprise
Resource Planning Systems 56
CHAPTER 3 Systems Documentation Techniques
PART II Data Analytics
84
117
CHAPTER 4 Relational Databases
118
CHAPTER 5 Introduction to Data Analytics in Accounting
162
CHAPTER 6 Transforming Data 188
CHAPTER 7 Data Analysis and Presentation
214
PART III Control of Accounting Information Systems
CHAPTER 8 Fraud and Errors
247
248
CHAPTER 9 Computer Fraud and Abuse Techniques
282
CHAPTER 10 Control and Accounting Information Systems 322
CHAPTER 11 Controls for Information Security 360
CHAPTER 12 Confidentiality and Privacy Controls
394
CHAPTER 13 Processing Integrity and Availability Controls
422
PART IV Accounting Information Systems Applications
451
CHAPTER 14 The Revenue Cycle: Sales to Cash Collections
452
CHAPTER 15 The Expenditure Cycle: Purchasing to Cash
Disbursements 494
CHAPTER 16 The Production Cycle 532
5
6
BRIEF CONTENTS
CHAPTER 17 The Human Resources Management and Payroll
Cycle 562
CHAPTER 18 General Ledger and Reporting System
PART V The REA Data Model
592
625
CHAPTER 19 Database Design Using the REA Data Model 626
CHAPTER 20 Implementing an REA Model in a Relational Database 660
CHAPTER 21 Special Topics in REA Modeling
684
PART VI The Systems Development Process
717
CHAPTER 22 Introduction to Systems Development and Systems
Analysis 718
CHAPTER 23 AIS Development Strategies
754
CHAPTER 24 Systems Design, Implementation, and Operation 784
Glossary
Index
812
829
Contents
Preface
PART I
19
Conceptual Foundations of Accounting Information
Systems 27
CHAPTER 1 Accounting Information Systems: An Overview
Introduction 29
Information Needs and Business Processes
28
31
Information Needs 32
Business Processes 33
Accounting Information Systems
36
How an AIS Can Add Value to an Organization 37
An AIS Can Use Artificial Intelligence and Data Analytics
to Improve Decision Making 38
The AIS and Blockchain 40
Cloud Computing, Virtualization, and the Internet of Things
The AIS and Corporate Strategy 44
The Role of the AIS in the Value Chain 45
Summary and Case Conclusion 46 ■ Key Terms 47
AIS IN ACTION: Chapter Quiz
47 ■ Discussion Questions
44
48 ■ Problems 49 ■
AIS IN ACTION SOLUTIONS: Quiz Key 54
CHAPTER 2 Overview of Transaction Processing and Enterprise
Resource Planning Systems 56
Introduction 57
Transaction Processing: The Data Processing Cycle
58
Data Input 58
Data Storage 59
Data Processing 65
Information Output 65
Transaction Processing: Blockchain 67
Enterprise Resource Planning (ERP) Systems
Summary and Case Conclusion
AIS IN ACTION: Chapter Quiz
71
Key Terms
68
71
71 ■ Discussion Questions
CASE 2-1 Bar Harbor Blueberry Farm
CASE 2-2 SDC
■
72 ■ Problems 73
79
80
AIS IN ACTION SOLUTIONS: Quiz Key 81
7
8
CONTENTS
CHAPTER 3 Systems Documentation Techniques
Introduction 85
Business Process Diagrams
Flowcharts 89
84
86
Types of Flowcharts 91
Program Flowcharts 94
Data Flow Diagrams
95
Subdividing the DFD 97
Summary and Case Conclusion
100
■
Key Terms
100
AIS IN ACTION: Chapter Quiz 101 ■ Comprehensive Problem 102 ■
Discussion Questions 102 ■ Problems 102
CASE 3-1 Dub 5
107
AIS IN ACTION SOLUTIONS: Quiz Key 108 ■ Comprehensive Problem Solution 110
PART II Data Analytics
117
CHAPTER 4 Relational Databases 118
Introduction 118
Databases and Files
119
Using Data Warehouses for Data Analytics 121
The Advantages of Database Systems 121
The Importance of Good Data 122
Database Systems
122
Logical and Physical Views of Data
Schemas 123
The Data Dictionary 124
DBMS Languages 126
Relational Databases
122
126
Types of Attributes 127
Designing a Relational Database for S&S, Inc. 127
Basic Requirements of a Relational Database 129
Two Approaches to Database Design 131
Creating Relational Database Queries 131
Query 1 131
Query 2 134
Query 3 137
Query 4 137
Query 5 139
Database Systems and the Future of Accounting 140
Summary and Case Conclusion 142 ■ Key Terms 142
AIS IN ACTION: Chapter Quiz 142 ■ Comprehensive Problem 143 ■
Discussion Questions 144 ■ Problems 145
CASE 4-1 Research Project 153
AIS IN ACTION SOLUTIONS: Quiz Key 154 ■ Comprehensive Problem Solution 155
Appendix: Data Normalization 158 ■ Summary 161
CHAPTER 5 Introduction to Data Analytics in Accounting
Introduction 163
Ask the Right Questions 165
Extract, Transform, and Load Relevant Data
Extracting Data 166
Transforming Data 169
Loading Data 170
165
162
CONTENTS
Apply Appropriate Data Analytic Techniques 171
Interpret and Share the Results with Stakeholders
172
Interpreting Results 172
Sharing Results 173
Additional Data Analytics Considerations
174
Automation 174
Data Analytics Is Not Always the Right Tool 176
Summary and Case Conclusion 176 ■ Key Terms 176
AIS IN ACTION: Chapter Quiz
177 ■ Discussion Questions
178 ■ Problems 178
CASE 5-1 Robotic Process Automation—Wood’s Amazing Woods Inc. 183
AIS IN ACTION SOLUTIONS: Quiz Key 185
CHAPTER 6 Transforming Data 188
Introduction 189
Attributes of High-Quality Data
190
Data Structuring 191
Aggregate Data 191
Data Joining 192
Data Pivoting 192
Data Standardization
193
Data Parsing and Data Concatenation 193
Cryptic Data Values 195
Misfielded Data Values 196
Data Formatting and Data Consistency 196
Data Cleaning 198
Data De-Duplication 198
Data Filtering 198
Data Contradiction Errors 199
Data Threshold Violations 199
Violated Attribute Dependencies 200
Data Entry Errors 200
Data Validation 200
Visual Inspection 201
Basic Statistical Tests 201
Audit a Sample 201
Advanced Testing Techniques 202
Summary and Case Conclusion 202 ■ Key Terms
AIS IN ACTION: Chapter Quiz
202
203 ■ Discussion Questions
204 ■ Problems 204
CASE 6-1 Hotel Data Cleaning Case 209
AIS IN ACTION SOLUTIONS: Quiz Key 210
CHAPTER 7 Data Analysis and Presentation
214
Introduction 215
Data Analysis 215
Descriptive Analytics 215
Diagnostic Analytics 217
Predictive Analytics 219
Prescriptive Analytics 220
Common Problems with Data Analytics
Data Presentation
220
222
Choosing the Right Visualization 222
Designing High-Quality Visualizations 225
Summary and Case Conclusion 235 ■ Key Terms
235
9
10
CONTENTS
AIS IN ACTION: Chapter Quiz 236 ■ Discussion Questions 237 ■ Problems 237
CASE 7-1 Analyzing Gamified Training 241
CASE 7-1 Appendix 242
ANALYTICS MINDSET Gamification 243
AIS IN ACTION SOLUTIONS: Quiz Key 244
PART III Control of Accounting Information Systems
CHAPTER 8 Fraud and Errors
247
248
Introduction 249
AIS Threats 249
Natural and Political Disasters 249
Software Errors and Equipment Malfunctions
Unintentional Errors 251
Intentional Acts 252
Introduction to Fraud
251
253
Misappropriation of Assets 254
Fraudulent Financial Reporting 255
SAS No. 99 (AU-C Section 240): The Auditor’s Responsibility to Detect Fraud
Who Perpetrates Fraud and Why
The Fraud Triangle
Computer Fraud
256
256
261
The Rise in Computer Fraud 261
Computer Fraud Classifications 262
Preventing and Detecting Fraud and Abuse
264
Using Data Analytics to Prevent and Detect Fraud 266
Summary and Case Conclusion 268 ■ Key Terms 269
AIS IN ACTION: Chapter Quiz 269 ■ Discussion Questions
270 ■ Problems 271
CASE 8-1 David L. Miller: Portrait of a White-Collar Criminal 276
CASE 8-2 Heirloom Photo Plans 277
AIS IN ACTION SOLUTIONS: Quiz Key 279
CHAPTER 9 Computer Fraud and Abuse Techniques
Introduction 282
Computer Attacks and Abuse
Social Engineering 292
Malware 296
Summary and Case Conclusion
282
283
305
■
Key Terms
306
AIS IN ACTION: Chapter Quiz 306 ■ Discussion Questions
307 ■ Problems 308
CASE 9-1 Shadowcrew 318
AIS IN ACTION SOLUTIONS: Quiz Key 319
CHAPTER 10 Control and Accounting Information Systems 322
Introduction
323
Why Threats to Accounting Information Systems Are Increasing
Overview of Control Concepts
The Foreign Corrupt Practices and Sarbanes–Oxley Acts
Control Frameworks
323
324
325
326
COBIT Framework 326
COSO’S Internal Control Framework
The Control Environment
328
330
Management’s Philosophy, Operating Style, and Risk Appetite 331
Commitment to Integrity, Ethical Values, and Competence 331
Internal Control Oversight by the Board of Directors 332
255
CONTENTS
Organizational Structure 332
Methods of Assigning Authority and Responsibility 332
Human Resources Standards That Attract, Develop, and Retain Competent Individuals 333
External Influences 334
Risk Assessment and Risk Response
335
Estimate Likelihood and Impact 335
Identify Controls 335
Estimate Costs and Benefits 335
Determine Cost/Benefit Effectiveness 336
Implement Control or Accept, Share, or Avoid the Risk
337
Control Activities 337
Proper Authorization of Transactions and Activities 337
Segregation of Duties 338
Project Development and Acquisition Controls 341
Change Management Controls 342
Design and Use of Documents and Records 342
Safeguard Assets, Records, and Data 342
Independent Checks on Performance 343
Communicate Information and Monitor Control
Processes 344
Information and Communication 344
Monitoring 345
Summary and Case Conclusion 347 ■ Key Terms
AIS IN ACTION: Chapter Quiz
348
348 ■ Discussion Questions
350 ■ Problems 350
CASE 10-1 The Greater Providence Deposit & Trust Embezzlement 356
AIS IN ACTION SOLUTIONS: Quiz Key 357
CHAPTER 11 Controls for Information Security 360
Introduction 361
Three Fundamental Information Security Concepts
362
1. Security Is a Management Issue, Not Just a Technology Issue
2. People: The Critical Factor 364
3. The Time-Based Model of Information Security 365
Protecting Information Resources
367
Physical Security: Access Controls 367
Process: User Access Controls 368
IT Solutions: Antimalware Controls 372
IT Solutions: Network Access Controls 372
IT Solutions: Device and Software Hardening Controls
IT Solutions: Encryption 379
Detecting Attacks
377
379
Log Analysis 379
Intrusion Detection Systems 380
Honeypots 380
Continuous Monitoring 380
Responding to Attacks
381
Computer Incident Response Team (CIRT) 381
Chief Information Security Officer (CISO) 381
Monitor and Revise Security Solutions
Penetration Testing 382
Change Controls and Change Management
382
382
Security Implications of Virtualization, Cloud Computing,
and the Internet of Things 383
Summary and Case Conclusion
384
■
Key Terms
384
362
11
12
CONTENTS
AIS IN ACTION: Chapter Quiz 385 ■ Discussion Questions 386 ■ Problems 386
CASE 11-1 Assessing Change Control and Change Management 391
CASE 11-2 Research Project 391
AIS IN ACTION SOLUTIONS: Quiz Key 391
CHAPTER 12 Confidentiality and Privacy Controls
Introduction 395
Protecting Confidentiality and Privacy
394
395
Identify and Classify Information to Be Protected 396
Protecting Sensitive Information with Encryption 396
Controlling Access to Sensitive Information 396
Training 398
Privacy Regulations and Generally Accepted Privacy Principles
The EU’s GDPR and U.S. Laws 398
Generally Accepted Privacy Principles
Encryption
399
402
Factors That Influence Encryption Strength
Types of Encryption Systems 403
Virtual Private Networks (VPNs) 405
Hashing
398
403
406
Digital Signatures 407
Digital Certificates and Public Key Infrastructure 408
Blockchain 409
Summary and Case Conclusion 412 ■ Key Terms 412
AIS IN ACTION: Chapter Quiz 412 ■ Discussion Questions 414 ■ Problems 414
CASE 12-1 Protecting Privacy of Tax Returns 418
CASE 12-2 Generally Accepted Privacy Principles 419
AIS IN ACTION SOLUTIONS: Quiz Key 419
CHAPTER 13 Processing Integrity and Availability Controls
Introduction 422
Processing Integrity
422
423
Input Controls 423
Processing Controls 425
Output Controls 426
Illustrative Example: Credit Sales Processing 427
Processing Integrity Controls in Spreadsheets 429
Availability
429
Minimizing Risk of System Downtime 429
Recovery and Resumption of Normal Operations 430
Summary and Case Conclusion 435 ■ Key Terms 436
AIS IN ACTION: Chapter Quiz 436 ■ Discussion Questions 437 ■ Problems 438
CASE 13-1 Ensuring Systems Availability 447
CASE 13-2 Ensuring Process Integrity in Spreadsheets 447
AIS IN ACTION SOLUTIONS: Quiz Key 448
PART IV Accounting Information Systems Applications
451
CHAPTER 14 The Revenue Cycle: Sales to Cash Collections
452
Introduction 454
Revenue Cycle Information System
Process 456
Threats and Controls
456
456
CONTENTS
Sales Order Entry
459
Taking Customer Orders 460
Credit Approval 462
Checking Inventory Availability 464
Responding to Customer Inquiries 465
Shipping
467
Pick and Pack the Order
Ship the Order 469
467
Billing 471
Invoicing 472
Maintain Accounts Receivable 474
Cash Collections 477
Process 477
Threats and Controls 478
Summary and Case Conclusion
AIS IN ACTION: Chapter Quiz
480
■
Key Terms
481
481 ■ Discussion Questions
482 ■ Problems 482
CASE 14-1 Research Project: The Use of RFID in Retail 491
AIS IN ACTION SOLUTIONS: Quiz Key 491
CHAPTER 15 The Expenditure Cycle: Purchasing to Cash
Disbursements 494
Introduction 495
Expenditure Cycle Information System
Process 496
Threats and Controls
496
499
Ordering Materials, Supplies, and Services
503
Identifying What, When, and How Much to Purchase
Choosing Suppliers 505
Receiving
503
509
Process 510
Threats and Controls
511
Approving Supplier Invoices
Process 512
Threats and Controls
Cash Disbursements
515
515
Process 515
Threats and Controls 515
Summary and Case Conclusion
AIS IN ACTION: Chapter Quiz
512
518
■
Key Terms
519
519 ■ Discussion Questions 520 ■ Problems 520
CASE 15-1 Group Case Analysis: School District Expenditure Fraud 529
CASE 15-2 Anatomy of a Multi-Million Dollar Embezzlement at ING Bank 529
AIS IN ACTION SOLUTIONS: Quiz Key 530
CHAPTER 16 The Production Cycle 532
Introduction 533
Production Cycle Information System
Process 536
Threats and Controls
536
Product Design 537
Process 537
Threats and Controls
539
Planning and Scheduling
539
Production Planning Methods
539
535
13
14
CONTENTS
Key Documents and Forms 539
Threats and Controls 543
Production Operations
Threats and Controls
Cost Accounting
544
544
546
Process 546
Threats and Controls 547
Summary and Case Conclusion
552
■
Key Terms
553
AIS IN ACTION: Chapter Quiz 553 ■ Discussion Questions 554 ■ Problems 555
CASE 16-1 The Accountant and CIM 559
AIS IN ACTION SOLUTIONS: Quiz Key 559
CHAPTER 17 The Human Resources Management and Payroll
Cycle 562
Introduction 563
HRM/Payroll Cycle Information System
564
Overview of HRM Process and Information Needs
Threats and Controls 566
Payroll Cycle Activities
564
569
Update Payroll Master Database 570
Validate Time and Attendance Data 571
Prepare Payroll 573
Disburse Payroll 577
Calculate and Disburse Employer-Paid Benefits, Taxes, and Voluntary Employee
Deductions 579
Outsourcing Options: Payroll Service Bureaus and Professional Employer
Organizations 579
Summary and Case Conclusion
580
■
Key Terms
581
AIS IN ACTION: Chapter Quiz 581 ■ Discussion Questions 582 ■ Problems 583
CASE 17-1 Excel Project: Sorting and Grouping Data 589
AIS IN ACTION SOLUTIONS: Quiz Key 589
CHAPTER 18 General Ledger and Reporting System
Introduction 593
General Ledger and Reporting System
Process 595
Threats and Controls
Post Adjusting Entries
Process 601
Threats and Controls
597
598
600
602
Prepare Financial Statements
Process 602
Threats and Controls
594
595
Update General Ledger
Process 597
Threats and Controls
592
602
609
Produce Managerial Reports
Process 610
Threats and Controls 610
Summary and Case Conclusion
610
614
■
Key Terms
614
AIS IN ACTION: Chapter Quiz 615 ■ Discussion Questions 616 ■ Problems 616
CASE 18-1 Exploring iXBRL Viewers 621
CASE 18-2 Evaluating a General Ledger Package 621
AIS IN ACTION SOLUTIONS: Quiz Key 622
CONTENTS
PART V The REA Data Model
625
CHAPTER 19 Database Design Using the REA Data Model 626
Introduction 626
Database Design Process 627
Entity-Relationship Diagrams 628
The REA Data Model 629
Three Basic Types of Entities 630
Structuring Relationships: The Basic REA Template
Developing an REA Diagram
630
633
Step 1: Identify Relevant Events 633
Step 2: Identify Resources and Agents 635
Step 3: Determine Cardinalities of Relationships
636
What an REA Diagram Reveals About an Organization
Business Meaning of Cardinalities 640
Uniqueness of REA Diagrams 641
Summary and Case Conclusion 642 ■ Key Terms
640
643
AIS IN ACTION: Chapter Quiz 643 ■ Comprehensive Problem 646 ■
Discussion Questions 646 ■ Problems 647
CASE 19-1 REA Data Modeling Extension 651
AIS IN ACTION SOLUTIONS: Quiz Key 652 ■ Comprehensive Problem Solution 656
CHAPTER 20 Implementing an REA Model in a Relational
Database 660
Introduction 661
Integrating REA Diagrams Across Cycles
661
Merging Redundant Resource Entities 664
Merging Redundant Event Entities 665
Validating the Accuracy of Integrated REA Diagrams
666
Implementing an REA Diagram in a Relational Database
666
Step 1: Create Tables for Each Distinct Entity and M:N Relationship 666
Step 2: Assign Attributes to Each Table 668
Step 3: Use Foreign Keys to Implement 1:1 and 1:N Relationships 669
Completeness Check 670
Using REA Diagrams to Retrieve Information from a Database
Creating Journals and Ledgers 671
Generating Financial Statements 672
Creating Managerial Reports 673
Summary and Case Conclusion 673 ■ Key Term
671
674
AIS IN ACTION: Chapter Quiz 674 ■ Comprehensive Problem 675 ■
Discussion Questions 675 ■ Problems 676
CASE 20-1 Practical Database Design 678
AIS IN ACTION SOLUTIONS: Quiz Key 679 ■ Comprehensive Problem Solution 681
CHAPTER 21 Special Topics in REA Modeling
684
Introduction 685
Additional Revenue and Expenditure Cycle Modeling Topics
Additional Revenue Cycle Events and Attribute Placement 685
Additional Expenditure Cycle Events and Attribute Placement 687
Sale of Services 690
Acquisition of Intangible Services 690
Digital Assets 691
Rental Transactions 691
685
15
16
CONTENTS
Additional REA Features
693
Employee Roles 693
M:N Agent–Event Relationships 693
Locations 693
Relationships Between Resources and Agents
Production Cycle REA Model
694
Additional Entities—Intellectual Property
Production Cycle Events 696
New REA Feature 696
Combined HR/Payroll Data Model
HR Cycle Entities 697
Tracking Employees’ Time
693
694
697
698
Financing Activities Data Model
Summary and Case Conclusion
699
700
AIS IN ACTION: Chapter Quiz 703 ■ Discussion Questions 704 ■ Problems 705
CASE 21-1 Practical Database Assignment 710
AIS IN ACTION SOLUTIONS: Quiz Key 710
Appendix: Extending the REA Model to Include Information About Policies 714
PART VI The Systems Development Process
717
CHAPTER 22 Introduction to Systems Development and
Systems Analysis 718
Introduction 719
Systems Development
721
The Systems Development Life Cycle
The Players 722
Planning Systems Development
Planning Techniques
721
723
725
Feasibility Analysis
725
Capital Budgeting: Calculating Economic Feasibility
Behavioral Aspects of Change
726
727
Why Behavioral Problems Occur 728
How People Resist Change 728
Preventing Behavioral Problems 729
Systems Analysis
730
Initial Investigation 730
Systems Survey 732
Feasibility Study 733
Information Needs and Systems Requirements 733
Systems Analysis Report 735
Summary and Case Conclusion 736 ■ Key Terms 737
AIS IN ACTION: Chapter Quiz 738 ■ Comprehensive Problem 739 ■
Discussion Questions 739 ■ Problems 740
CASE 22-1 Audio Visual Corporation 749
AIS IN ACTION SOLUTIONS: Quiz Key 750 ■ Comprehensive Problem Solution 752
CHAPTER 23 AIS Development Strategies
Introduction 755
Purchasing Software
Selecting a Vendor
755
756
754
CONTENTS
Acquiring Hardware and Software 756
Evaluating Proposals and Selecting a System
757
Development by In-House Information Systems Departments
End-User-Developed Software 759
Advantages and Disadvantages of End-User Computing
Managing and Controlling End-User Computing 761
759
760
Outsourcing the System 762
Advantages and Disadvantages of Outsourcing
762
Methods for Improving Systems Development
Business Process Management 764
Prototyping 765
Agile Methodologies 767
Computer-Aided Software Engineering 770
Summary and Case Conclusion 771 ■ Key Terms
763
771
AIS IN ACTION: Chapter Quiz 772 ■ Comprehensive Problem 773 ■
Discussion Questions 773 ■ Problems 774
CASE 23-1 Wong Engineering Corp. 778
AIS IN ACTION SOLUTIONS: Quiz Key 779 ■ Comprehensive Problem Solution 782
CHAPTER 24 Systems Design, Implementation, and Operation 784
Introduction 785
Conceptual Systems Design
785
Evaluate Design Alternatives 785
Prepare Design Specifications and Reports
Physical Systems Design
Output Design 788
File and Database Design 788
Input Design 789
Program Design 790
Procedures and Controls Design
Systems Implementation
787
787
791
792
Implementation Planning and Site Preparation
Selecting and Training Personnel 793
Complete Documentation 794
Testing the System 794
Systems Conversion 795
Operation and Maintenance
Summary and Case Conclusion
792
796
797
■
Key Terms
798
AIS IN ACTION: Chapter Quiz 798 ■ Comprehensive Problem 799 ■
Discussion Questions 800 ■ Problems 801
CASE 24-1 Citizen’s Gas Company
807
AIS IN ACTION SOLUTIONS: Quiz Key 807 ■ Comprehensive Problem Solution 809
Glossary
Index
812
829
17
This page intentionally left blank
Preface
New to This Edition
INTRODUCING TWO NEW CO-AUTHORS
Scott L. Summers and David A. Wood, both from Brigham Young University, joined as new
co-authors. Scott and David created the new section on data analytics (Part II), consisting of
four chapters. The first chapter is an update of Chapter 4 that discusses relational databases not
only as the basis for transaction processing systems, but also as one of the sources of Big Data
and Analytics. The next three chapters (Chapters 5–7) discuss the Extract, Transfer, and Load
(ETL) process and various data analytic techniques. This new content covers an extremely
important topic that affects all aspects of designing, using, managing, and auditing an AIS.
ENHANCEMENTS IN THE FIFTEENTH EDITION
We made extensive revisions to the content of the material to incorporate recent developments
while retaining the features that have made prior editions easy to use. Every chapter has been
revised to include up-to-date examples of important concepts. Specific changes include the
following:
1. Introduced several new topics in Chapter 1. The chapter discusses how an AIS can use
artificial intelligence and data analytics to improve decision making, how the AIS is affected by blockchain technology, and the use of cloud computing, virtualization, and the
internet of things.
2. Shortened and simplified the discussion of computer fraud and abuse techniques by eliminating many of the less frequently used techniques.
3. Simplified the discussion of control and the AIS by using the COSO Internal Control
framework instead of the COSO Enterprise Risk Management framework as the structure
for discussing controls.
4. Updated the discussion of information security countermeasures.
5. Updated the discussion of transaction processing and encryption to include blockchain
technology.
6. Updated the discussion of privacy to include the EU’s General Data Privacy Regulation
(GDPR).
7. Updated the end-of-chapter discussion questions and problems, including Excel exercises
that are based on articles from the Journal of Accountancy so that students can develop
the specific skills used by practitioners. Most chapters also include a problem that consists of multiple-choice questions we have used in our exams to provide students with an
additional chance to check how well they understand the chapter material.
8. Moved the topic of auditing (Chapter 11 in the fourteenth edition) to a web-only appendix
because most of that material is covered in other courses.
19
20
PREFACE
Solving Learning and Teaching Challenges
STRUCTURED LEARNING
KEY LEARNING OBJECTIVES When you finish reading this text, you should understand the
following key concepts:
●
●
●
●
●
●
●
●
●
●
●
●
●
Basic activities performed in major business cycles.
What data needs to be collected to enable managers to plan, evaluate, and control an organization’s business activities.
How to extract, transfer, and load (ETL) data from both the organization’s AIS and other
sources into a common repository that can be used for data analytics.
How IT developments can improve the efficiency and effectiveness of business processes.
How to design an AIS to provide the information needed to make key decisions in each
business cycle.
Risk of fraud and motives and techniques used to perpetrate fraud.
COSO’s models (Internal Control and ERM) for internal control and risk management as
well as specific controls used to achieve these objectives.
Control Objectives for Information and Related Technology (COBIT) framework for the
effective governance and control of information systems and how IT affects the implementation of internal controls.
AICPA’s Trust Services framework for ensuring systems reliability by developing procedures to protect the confidentiality of proprietary information, maintain the privacy of
personally identifying information collected from customers, assure the availability of
information resources, and provide for information processing integrity.
Fundamentals of information security.
Fundamental concepts of database technology and data modeling and their effect on
an AIS.
Tools for documenting AIS work, such as REA diagrams, business processing diagrams,
data flow diagrams, and flowcharts.
Basic steps in the system development process to design and improve an AIS.
FEATURES TO FACILITATE LEARNING To help students understand these concepts, the text
includes the following features:
1. Each chapter begins with an integrated case that introduces key chapter concepts
and topics and identifies several key issues or problems that students should be able
to solve after mastering the material presented in that chapter. The case is referenced
throughout the chapter, and the chapter summary presents solutions to the problems and
issues raised in the case.
2. Focus boxes and real-world examples to help students understand how companies use
the latest IT developments to improve their AIS.
3. Hands-on Excel exercises in many chapters to help students hone their computer skills.
Many of these exercises are based on “how-to” tutorials that appeared in recent issues
of the Journal of Accountancy. Some of those articles discuss older versions of Excel,
thereby giving students practice in developing the important life-long learning skill of
adapting older instructions to updated versions of software.
4. Numerous discussion questions and problems in every chapter provide additional opportunities for students to demonstrate mastery of key concepts. Many problems were
developed from reports in current periodicals. Other problems were selected from various professional examinations, including the CPA, CMA, CIA, and SMAC exams. One
problem in every chapter consists of a set of multiple-choice questions to provide practice
in answering exam-style questions. One or more problems where students are asked to
match terms with their definitions to help students learn the terminology introduced in
that chapter. Each chapter also has one or more cases that require more extensive exploration of specific topics.
PREFACE
5. Quizzes at the end of each chapter enable students to self-assess their understanding of
the material. We also provide detailed explanations about the correct answer to each quiz
question.
6. A number of chapters have a comprehensive problem in the AIS in Action section at the
end of the chapter with the solution to the problem provided after quiz question solutions
and explanations at the very end of the chapter.
7. Extensive use of full-color graphics. The text contains hundreds of figures, diagrams, flowcharts, and tables that illustrate chapter concepts, and color is used to highlight key points.
8. Definitions of key terms are repeated in the glossary margins in each chapter. In addition, a comprehensive glossary located at the back of the book makes it easy to look up
the definition of the various technical terms used in the text.
CONTENT AND ORGANIZATION
Part I: Conceptual Foundations of Accounting Information Systems Part I consists of three
chapters that present the underlying concepts fundamental to an understanding of AIS.
Chapter 1 introduces basic terminology and provides an overview of AIS topics. It discusses how an AIS can add value to an organization and how it can be used to help organizations implement corporate strategy. It also discusses the types of information companies
need to successfully operate and introduces the basic business processes that produce that
information. It concludes by describing the role of the AIS in an organization’s value chain. It
also introduces several new topics in the text: artificial intelligence, data analytics, blockchain,
virtualization, cloud computing, and the Internet of Things.
Chapter 2 introduces transaction processing in automated systems and presents basic information about input/output, processing, and data storage concepts as well as the wide range
of data that must be collected by the AIS. This information helps students understand what
an AIS does; throughout the remainder of the book, we discuss advances in IT and how it affects the manner in which those functions are performed. The chapter discusses the impact of
blockchain on transaction processing. Chapter 2 also introduces Enterprise Resource Planning
(ERP) systems and their importance and uses in modern business.
Chapter 3 covers three of the most important tools and techniques used to understand,
evaluate, design, and document information systems: business process diagrams, flowcharts,
and data flow diagrams. Students will learn how to read, critique, and create systems documentation using these tools.
Part II: Data Analytics Part II consists of four chapters about relational databases, the ETL
process, and various data analytics techniques.
Chapter 4 describes the principles of relational database design and how to use SQL to
analyze the data. It also discusses how an organization’s relational database used for transaction processing provides one important source of data for advanced data analytics.
Chapter 5 introduces the topic of data analysis and begins by stressing the importance of
formulating and asking the right questions to obtain useful insights. It then explains the basic
steps of extracting, transforming, and loading (ETL) data to be used for analytics. Next, it
discusses how to choose appropriate analytic techniques and how to interpret and share the
results. A discussion about the potential for automating analytics and a word of caution about
the limits of what analytics can and cannot do concludes the chapter.
Chapter 6 delves into more detail about the different steps in the ETL process, focusing on how to transform data. It begins by describing the attributes that make data useful for
analytics and then discusses techniques for structuring data, standardizing data being consolidated from multiple sources, cleaning data, and validating data.
Chapter 7 discusses the differences between descriptive, diagnostic, predictive, and prescriptive analytic techniques. It also describes how to choose the right visualization tools to
aid in analysis and presents best practices for designing high-quality visualizations.
Part III: Control of Accounting Information Systems The six chapters in Part III focus on
threats to the reliability of the AIS and applicable controls for addressing and mitigating the
risks associated with those threats.
21
22
PREFACE
Chapter 8 introduces students to the different kinds of threats faced by information systems, primarily focusing on the threats of fraud and errors. The chapter describes the different
types of fraud and explains how fraud is perpetrated, who perpetrates it, and why it occurs.
Chapter 9 discusses computer fraud and abuse techniques. Three major types of computer
fraud are discussed: computer attacks and abuse, social engineering, and malware. The chapter
explains the dozens of ways computer fraud and abuse can be perpetrated.
Chapter 10 uses the COSO Internal Control framework, to discuss the basic concepts of
internal control. It introduces the expanded enterprise risk management (COSO-ERM) model
and compares it with the COSO Internal Control framework. It also introduces the COBIT
framework which applies those concepts to IT, thereby providing a foundation for effective
governance and control of information systems.
Chapter 11 focuses on information security. It introduces the fundamental concepts of
defense-in-depth and the time-based approach to security. The chapter provides a broad survey of a variety of security topics, including access controls, firewalls, encryption, and incident
detection and response.
Chapter 12 discusses the many specific computer controls used in business organizations
to achieve the objectives of ensuring privacy and confidentiality and discusses the implications
of new regulations such as the EU’s General Data Privacy Regulation (GDPR) and similar laws
enacted by California and other states. The chapter also provides a detailed discussion of blockchain technology.
Chapter 13 addresses the controls necessary to achieve the objectives of accurate processing of information and ensuring that information is available to managers whenever and
wherever they need it. It also discusses how virtualization and cloud technology are changing
the methods used for backup and recovery.
Part IV: Accounting Information Systems Applications Part IV focuses on how a company’s
AIS provides critical support for its fundamental business processes. Most large and many
medium-sized organizations use enterprise resource planning (ERP) systems to collect, process, and store data about their business processes as well as to provide information reports
designed to enable managers and external parties to assess the organization’s efficiency and
effectiveness. To make it easier to understand how an ERP system functions, Part III consists
of five chapters, each focusing on a particular business process.
Chapter 14 covers the revenue cycle (also referred to as the sales-to-cash business process), describing all the activities involved in taking customer orders, fulfilling those orders,
and collecting cash.
Chapter 15 examines the expenditure cycle (also referred to as the purchase-to-pay business
process), describing all the activities involved in ordering, receiving, and paying for merchandise,
supplies, and services.
Chapter 16 reviews the production (manufacturing) cycle, with a special focus on the
implications of recent cost accounting developments, such as activity-based costing, for the
design of the production cycle information system.
Chapter 17 explains the human resources management/payroll cycle, focusing primarily
on the activities involved in processing payroll.
Chapter 18 explores the general ledger and reporting activities in an organization, discussing topics such as XBRL, the balanced scorecard, and the switch from GAAP to IFRS.
Each of these five chapters explains the three basic functions performed by the AIS: efficient
transaction processing, provision of adequate internal controls to safeguard assets (including data),
and preparation of information useful for effective decision making.
Part V: The REA Data Model Part V consists of three chapters that focus on the REA data
model, which provides a conceptual tool for designing and understanding the database underlying an AIS.
Chapter 19 introduces the REA data model and how it can be used to design an AIS
database. The chapter focuses on modeling the revenue and expenditure cycles. It also
demonstrates how the REA model can be used to develop an AIS that can not only generate traditional financial statements and reports but can also more fully meet the information needs of management.
PREFACE
Chapter 20 explains how to implement an REA data model in a relational database system. It also shows how to query a relational database to produce various financial statements
and management reports.
Chapter 21 explains how to develop REA data models of the production, HR/payroll, and
financing cycles. It also discusses a number of advanced modeling issues such as the acquisition and sale of intangible products and services and rental transactions.
Part VI: The Systems Development Process Part VI consists of three chapters that cover various aspects of the systems development process.
Chapter 22 introduces the systems development life cycle and discusses the introductory
steps of this process (systems analysis, feasibility, and planning). Particular emphasis is placed
on the behavioral ramifications of change.
Chapter 23 discusses an organization’s many options for acquiring or developing an AIS
(e.g., purchasing software, writing software, end-user-developed software, and outsourcing)
and for speeding up or improving the development process (business process management,
prototyping, agile methodologies, and computer-assisted software engineering).
Chapter 24 covers the remaining stages of the systems development life cycle (conceptual
design, physical design, implementation, and operation and maintenance) and emphasizes the
interrelationships among the phases.
SUPPLEMENTAL RESOURCES For more information and resources, visit www.pearsonglobaleditions.com.
TECHNOLOGY-REINFORCED LEARNING
Revel™
Educational Technology Designed for the Way Today’s Students Read, Think, and
Learn When students are engaged deeply, they learn more effectively and perform better in
their courses. This simple fact inspired the creation of Revel: an interactive learning environment designed for the way today’s students read, think, and learn.
Revel enlivens course content with media interactives and assessments—integrated directly within the authors’ narrative—that provide opportunities for students to read, practice,
and study in one continuous experience. This immersive educational technology replaces the
print textbook and is designed to measurably boost students’ understanding, retention, and
preparedness. Learn more about Revel http://www.pearsonhighered.com/revel/
EXCEL HOMEWORK PROBLEMS Accountants need to become proficient with Excel because
it is a useful tool for tasks related to every business process. That is why each of the chapters in
the business process section contains several homework problems designed to teach new Excel
skills in a context related to one of the business processes discussed in the chapter.
As with any software, Microsoft regularly releases updates to Microsoft Office, but
not everyone always immediately switches. During your career you will periodically move
to a newer version of Excel. When you do, you will find that sometimes you need to make
only minor changes to existing spreadsheets, but other times you may have to make more
significant changes because the newer version of Excel now incorporates different features
and functions.
So how do you keep abreast of changes? And how can you learn new Excel skills “on the
job” to simplify tasks that you now find yourself doing repeatedly? You could pay to take a
course, but that can be costly, time-consuming and not always timely. Alternatively, you can
develop life-long learning skills to continuously update your knowledge. One important way
to do this is to begin now to save copies of two types of articles that regularly appear in the
Journal of Accountancy. The first is the monthly column, “Technology Q&A,” which often
contains answers to questions about how do you do something in a newer version of Excel
that you know how to do in an older version. The second type of article is a complete tutorial
about a powerful way to use one or more Excel functions to automate a recurring task. Often,
this second type of article has an online spreadsheet file that you can download and use to follow along with the example and thereby teach yourself a new skill.
23
24
PREFACE
The Journal of Accountancy website maintains an archive of these articles that you can
search to see if there is one that addresses a task that is new for you. Even if the article explains how to do something (such as create a pivot table) in an older version of Excel, in most
cases you will find that many of the steps have not changed. For those that have, if you read
the old way to do it as described in the article, you can then use Excel’s built-in help feature to
see how to do the same task in the newer version that you are now using.
The ability to learn how to use new versions of software on your own is an important
lifelong learning skill. Indeed, recruiters are looking for evidence that a job candidate not only
has acquired a body of knowledge but also knows how to research and learn new versions of
existing software tools. The various Excel homework problems in this text help you learn how
to do this.
From the Authors
TO THE INSTRUCTOR
This book is intended for use in a one-semester course in accounting information systems at
either the undergraduate or graduate level. Introductory financial and managerial accounting
courses are suggested prerequisites, and an introductory information systems course that covers a computer language or software package is helpful, but not necessary.
The book can also be used as the main text in graduate or advanced undergraduate management information systems courses.
The topics covered in this text provide information systems students with a solid understanding of transaction processing systems that they can then build on as they pursue more
in-depth study of specific topics such as databases, data analytics, networks, systems analysis and design, cloud computing, virtualization, blockchain, artificial intelligence, Internet of
Things, computer security, and information system controls.
TO THE STUDENT
As in previous editions, the fifteenth edition of Accounting Information Systems is designed
to prepare you for a successful accounting career whether you enter public practice, industry, or government. All of you will be users of accounting information systems. In addition
to being users, some of you will become managers. Others will become internal and external auditors, and some of you will become consultants. Regardless of your role, you will
need to understand how accounting information systems work in order to effectively measure how cost-effectively they perform, to assess their reliability and that of the information
produced, or to lead the redesign and implementation of new and better systems. Mastering
the material presented in this text will give you the foundational knowledge you need to
excel at all those tasks.
This text discusses important new IT developments, such as blockchain and data analytics, because such developments affect business processes and often cause organizations to
redesign their accounting systems to take advantage of new capabilities. The focus, however,
is not on IT for the sake of IT, but on how IT affects business processes and controls. Indeed,
new IT developments not only bring new capabilities, but also often create new threats and
affect the overall level of risk. This text will help you understand these issues so that you can
properly determine how to modify accounting systems controls to effectively address those
new threats and accurately assess the adequacy of controls in those redesigned systems. We
also discuss the effect of recent regulatory developments, such as the EU’s General Data Privacy Regulation (GDPR) and similar legislation in California and other states, on the design
and operation of accounting systems.
In addition to technology- and regulatory-driven changes, companies are responding to
the increasingly competitive business environment by reexamining every internal activity to
reap the most value at the least cost. As a result, accountants are asked to do more than
simply report the results of past activities. They must take a more proactive role in both
providing and interpreting financial and nonfinancial information about the organization’s
PREFACE
activities. Therefore, throughout this text, we discuss how accountants can improve the design and functioning of the accounting information system (AIS) so that it truly adds value
to the organization by providing management with the information needed to effectively run
an organization.
Acknowledgments
We wish to express our appreciation to all supplements authors for preparing the various supplements that accompany this edition. We thank Martha M. Eining of the University of Utah
and Carol F. Venable of San Diego State University for preparing the comprehensive cases included on our website. We are also grateful to Iris Vessey for her contributions to the problem
material. We thank Bill Heninger of Brigham Young University for allowing us to use portions
of his database normalization tutorial to create the appendix to Chapter 4.
Perhaps most importantly, we are indebted to the numerous faculty members throughout
the world who have adopted the earlier editions of this book and who have been generous
with their suggestions for improvement. We are especially grateful to the following faculty
who participated in reviewing the fifteenth edition throughout various stages of the revision
process:
A. Faye Borthick, Georgia State University
Gerald Childs, Waukesha County Technical College
Steven Johnson, Minnesota State University, Mankato
Stanley X Lewis, Troy University
Andrew B. Nyaboga, William Paterson University
Magdy Roufaiel, Empire State College
Milton Shen, University of Alabama - Huntsville
Jennifer Tseng, Mission College
Thomas L. Zeller, Loyola University Chicago
We are grateful for permission received from four professional accounting organizations
to use problems and unofficial solutions from their past professional examinations in this
book. Thanks are extended to the American Institute of Certified Public Accountants for use
of CPA Examination materials, to the Institute of Certified Management Accountants for use
of CMA Examination materials, to the Institute of Internal Auditors for use of CIA Examination materials, and to the Society of Management Accountants of Canada for use of SMAC
Examination materials. We also wish to thank Netsuite, Inc., for providing permission to use
screenshots of their software throughout the text.
Of course, any errors in this book remain our responsibility. We welcome your comments
and suggestions for further improvement.
Finally, we want to thank our wives and families for their love, support, and encouragement. We also want to thank God for giving us the ability to start and complete this book.
—Marshall B. Romney
Springville, Utah
—Paul John Steinbart
Apache Junction, Arizona
—Scott L. Summers
Provo, Utah
—David A. Wood
Provo, Utah
25
26
PREFACE
Global Edition Acknowledgments
CONTRIBUTOR
Lynette Barnard, University of Cape Town
REVIEWERS
My Lan Lu, University of Gronigen
Richard Bruce, University of Sheffield
Conceptual Foundations
of Accounting
Information Systems
PA R T
I
CHAPTER 1
Accounting Information
Systems: An Overview
CHAPTER 2
Overview of Transaction
Processing and Enterprise
Resource Planning Systems
Kheng Guan Toh/Shutterstock
CHAPTER 3
Systems Documentation
Techniques
27
CHAPTER
1
Accounting Information
Systems: An Overview
LEARNING OBJECTIVES
After studying this chapter, you should be able to:
1. Distinguish data from information, discuss the characteristics of useful
information, and explain how to determine the value of information.
2. Explain the decisions an organization makes, the information needed to
make them, and the major business processes present in most companies.
3. Explain how an accounting information system (AIS) adds value to an
organization, how it affects and is affected by corporate strategy, and
its role in a value chain.
I N TEGRATIV E C ASE
S&S
After working for years as a regional manager for a retail organization, Scott Parry opened his
own business with Susan Gonzalez, one of his district managers, as his partner. They formed
S&S to sell appliances and consumer electronics. Scott and Susan pursued a “clicks and bricks”
strategy by renting a building in a busy part of town and adding an electronic storefront.
Scott and Susan invested enough money to see them through the first six months. They
will hire 15 employees within the next two weeks—three to stock the shelves, four sales representatives, six checkout clerks, and two to develop and maintain the electronic storefront.
Scott and Susan will host S&S’s grand opening in five weeks. To meet that deadline, they
have to address the following important issues:
1. What decisions do they need to make to be successful and profitable? For example:
a. How should they price products to be competitive yet earn a profit?
b. Should they extend credit, and, if so, on what terms? How can they accurately
track what customers owe and pay?
c. How should they hire, train, and supervise employees? What compensation and
benefits package should they offer? How should they process payroll?
d. How can they track cash inflows and outflows to avoid a cash squeeze?
e. What is the appropriate product mix? What inventory quantities should they
carry, given their limited showroom space?
28
Ndul/123RF
2. What information do Scott and Susan need to make those decisions?
a. What information do the external entities they interact with need?
b. What information do management and other employees need?
c. How can they gather, store, and disseminate that information?
3. What business processes are needed, and how should they be carried out?
4. What functionality should be provided on the website?
Although Scott and Susan could use an educated guess or “gut feeling” to make these
decisions, they know they can make better decisions if they obtain additional information. A
well-designed AIS can solve these issues and provide the information they need to make any
remaining decisions.
Introduction
We begin this chapter by explaining important terms and discussing the kinds of information
organizations need and the business processes used to produce that information. We continue
with an exploration of what an accounting information system (AIS) is, how an AIS adds
value to an organization, how an AIS and corporate strategy affect each other, and the role of
the AIS in the value chain.
A system is a set of detailed methods, procedures, and routines that carry out specific
activities, perform a duty, achieve goals or objectives, or solve one or more problems. Most
systems are composed of smaller subsystems that support the larger system. For example,
a college of business is a system composed of various departments, each of which is a
subsystem. Moreover, the college itself is a subsystem of the university.
Each subsystem is designed to achieve one or more organizational goals. Changes in subsystems cannot be made without considering the effect on other subsystems and on the system as a
whole. Goal conflict occurs when a subsystem’s goals are inconsistent with the goals of another
subsystem or with the system as a whole. Goal congruence occurs when a subsystem achieves
its goals while contributing to the organization’s overall goal. The larger the organization and the
more complicated the system, the more difficult it is to achieve goal congruence.
Data are facts that are collected, recorded, stored, and processed by an information system. Businesses need to collect several kinds of data such as the activities that take place, the
resources affected by the activities, and the people who participate in the activity. For example,
the business needs to collect data about a sale (date, total amount), the resource sold (good or
service, quantity sold, unit price), and the people who participated (customer, salesperson).
Information is data that have been organized and processed to provide meaning and context that can improve the decision-making process. As a rule, users make better decisions as
the quantity and quality of information increase. Table 1-1 presents 14 characteristics that
make information useful and meaningful.
system - Detailed methods, procedures, and routines that carry
out activities, perform a duty,
achieve goals or objectives, or
solve problems.
goal conflict - When a subsystem’s goals are inconsistent with
the goals of another subsystem
or the system as a whole.
goal congruence - When a subsystem achieves its goals while
contributing to the organization’s overall goal.
data - Facts that are collected,
recorded, stored, and processed
by an information system.
information - Data that have
been organized and processed
to provide meaning and improve decision making.
29
30
PART I
ConCEPTuAl FounDATIonS oF ACCounTIng InFoRmATIon SySTEmS
TABLE 1-1
machine-readable - Data in a
format that can be processed
by a computer.
●●
●●
●●
●●
information technology (IT) The computers and other
electronic devices used to store,
retrieve, transmit, and manipulate data.
value of information - The benefit provided by information
minus the cost of producing it.
Access restricted
Able to limit access to authorized parties
Accurate
Correct; free of error; accurately represents events and activities
Available
Available to users when needed; in a format that can be easily and quickly
used
Reputable
Perceived as true and credible due to highly regarded source or content
Complete
Does not omit aspects of events or activities; of enough breadth and depth
Concise
Clear, succinct; appropriate volume presented briefly but comprehensively
Consistent
Presented in same format over time
Current
Includes event and activity data up to the present date and time
Objective
Unbiased; unprejudiced; impartial
Relevant
Reduces uncertainty; improves decision making; applicable and helpful
Timely
Provided in time for decision makers to make decisions
Useable
Easy to use for different tasks; human and machine readable
Understandable
Presented in a useful and intelligible format; easily comprehended and
interpreted
Verifiable
Same information produced by two independent, knowledgeable people
Data is most useful when it is in a machine-readable format that can be read and processed by a computer. This processing may involve data collection, recording, storage, updating, and data dissemination. For example, public companies are now required to code their
financial statements using XBRL (eXtensible Business Reporting Language)—a programming language designed specifically to facilitate the communication of financial and other
business information. Without XBRL, electronic documents are digital versions of paper reports. Humans can read the data, but computers cannot automatically process the data until a
person manually enters it in the appropriate format. XBRL changes that by encoding information about what a particular data item means so that other computer programs can understand
what to do with it. XBRL is discussed more fully in Chapter 16.
Using machine readable formats like XBRL improves many of the other 14 characteristics that make information useful. For example, XBRL improves:
●●
information overload - Exceeding the amount of information
a human mind can absorb and
process, resulting in a decline in
decision-making quality and an
increase in the cost of providing
information.
Characteristics of Useful Information
Reliability by reducing human error and using standard taxonomies.
Relevance by assigning relevant meaning to data so it can be compared to similar data
from other organizations.
Accessibility by enabling the automatic importing of data into decision models and other
computer systems.
Understandability and usability by making the data readable to both humans and computers.
Timeliness by reducing the time needed to import, produce, and distribute information.
Machine readable data also facilitates newer technologies such as artificial intelligence
and data analytics, which are discussed later in the chapter.
However, there are limits to the amount of information the human mind can absorb and
process. Information overload occurs when those limits are passed, resulting in a decline in
decision-making quality and an increase in the cost of providing that information. Information
system designers use information technology (IT) to help decision makers more effectively
filter and condense information. For example, Walmart has invested heavily in IT so that every
day it can collect and process almost 50 petabytes of transaction data and mine more than
200 internal and external databases to produce valuable information.
The value of information is the benefit produced by the information minus the cost
of producing it. Benefits of information include reduced uncertainty, improved decisions,
and improved ability to plan and schedule activities. The costs include the time and resources spent to produce and distribute the information. Information costs and benefits can
CHAPTER 1
ACCounTIng InFoRmATIon SySTEmS: An ovERvIEW
31
be difficult to quantify, and it is difficult to determine the value of information before it has
been produced and utilized. Nevertheless, the expected value of information should be calculated as effectively as possible so that the costs of producing the information do not exceed
its benefits.
To illustrate the value of information, consider the case of 7-Eleven. When a Japanese
company licensed the very successful 7-Eleven name from Southland Corporation, it invested
heavily in IT. However, the U.S. stores did not. Each 7-Eleven store in Japan was given a
computer that:
●●
●●
●●
●●
●●
Keeps track of the 3,000 items sold in each store and determines what products are moving, at what time of day, and under what weather conditions.
Keeps track of what and when customers buy to make sure it has in stock the products
most frequently purchased.
Orders sandwiches and rice dishes from suppliers automatically. Orders are placed and
filled three times a day so that stores always have fresh food. In addition, suppliers can
access 7-Eleven sales data electronically so that they can forecast demand.
Coordinates deliveries with suppliers. This reduces deliveries from 34 to 12 a day, resulting in less clerical receiving time.
Prepares a color graphic display that indicates which store areas contribute the most to
sales and profits.
Average daily sales of 7-Eleven Japan were 30% higher and its operating margins almost
double those of its closest competitor. What happened to Southland and its 7-Eleven stores
in the United States? Profits declined, and Southland eventually had to file for bankruptcy.
7-Eleven Japan came to the company’s rescue and purchased 64% of Southland.
As shown in Figure 1-1, an information system is the combination of the people and
the technologies in an organization that collect, record, store, and process data to produce the
information needed to make informed decisions.
information system - The
people and technologies in
an organization that produce
information.
Information Needs and Business Processes
All organizations need information in order to make effective decisions. In addition, all
organizations have certain business processes in which they are continuously engaged. A
business process is a set of related, coordinated, and structured activities and tasks that
are performed by a person, a computer, or a machine, and that help accomplish a specific
organizational goal.
To make effective decisions, organizations must decide what decisions they need to make,
what information they need to make the decisions, and how to gather and process the data
needed to produce the information. This data gathering and processing is often tied to the
business process - A set of
related, coordinated, and
structured activities and tasks,
performed by a person, a computer, or a machine, that helps
accomplish a specific organizational goal.
FIGURE 1-1
The Components of an
Information System
People
IS
Organization
Technology
32
PART I
ConCEPTuAl FounDATIonS oF ACCounTIng InFoRmATIon SySTEmS
basic business processes in an organization. To illustrate the process of identifying information needs and business processes, let’s return to our S&S case study.
INFORMATION NEEDS
Scott and Susan decide they must understand how S&S functions before they can identify the
information they need to manage S&S effectively. Then they can determine the types of data
and procedures they will need to collect and produce that information. They created Table 1-2
TABLE 1-2
Overview of S&S’s Business Processes, Key Decisions, and Information Needs
Business Processes
Key Decisions
Information Needs
Acquire capital
How much
Cash flow projections
Find investors or borrow funds
Pro forma financial statements
If borrowing, how to obtain best terms
Loan amortization schedule
Size of building
Capacity needs
Amount of equipment
Building and equipment prices
Rent or buy
Market study
Location
Tax tables and depreciation regulations
Acquire building and equipment
How to depreciate
Hire and train employees
Experience requirements
Job descriptions
How to assess integrity and competence of applicants Applicant job history and skills
How to train employees
Acquire inventory
What models to carry
Market analyses
Optimal level of inventory to carry
Sales and inventory turnover forecasts
How much to purchase
Inventory status reports
How to manage inventory (store, control, etc.)
Vendor performance
Which vendors; best quality, prices
Advertising and marketing
Sell merchandise
Which media
Cost analyses
Content
Market coverage
What is optimal price for each product
Product costs; desired margins
How to customize products for customers
Customer needs and preferences
How to deliver products to customer
Customer delivery preferences
Offer in-house credit; determine credit limits
Credit card costs; company policies
Which credit cards to accept
Customer credit status
Collect payments from customers If offering credit, what terms
How to effectively handle cash receipts
Customer account status
Accounts receivable aging report
Accounts receivable records
Pay employees
Amount to pay
Sales (for commissions)
Deductions and withholdings
Time worked (hourly employees)
Process payroll in-house or use outside service
W-4 forms
Costs of external payroll service
Pay taxes
Payroll tax requirements
Government regulations
Sales tax requirements
Total wage expense
Total sales
Pay vendors
Whom to pay
Vendor invoices
When to pay
Accounts payable records
How much to pay
Payment terms
CHAPTER 1
ACCounTIng InFoRmATIon SySTEmS: An ovERvIEW
to summarize part of their analysis. It lists S&S’s basic business processes, some key
decisions that need to be made for each process, and information they need to make the
decisions.
Scott and Susan realize that the list is not exhaustive, but they are satisfied that it provides
a good overview of S&S. They also recognize that not all the information needs listed in the
right-hand column will be produced internally by S&S. Information about payment terms for
merchandise purchases, for example, will be provided by vendors. Thus, S&S must effectively
integrate external data with internally generated data so that Scott and Susan can use both
types of information to run S&S.
S&S will interact with many external parties, such as customers, vendors, and governmental agencies, as well as with internal parties such as management and employees.
To get a better handle on the more important interactions with these parties, they prepared
Figure 1-2.
BUSINESS PROCESSES
Scott decides to reorganize the business processes listed in Table 1-2 into groups of related
transactions. A transaction is an agreement between two entities to exchange goods or services or any other event that can be measured in economic terms by an organization. Examples
include selling goods to customers, buying inventory from suppliers, and paying employees.
The process that begins with capturing transaction data and ends with informational output,
such as the financial statements, is called transaction processing. Transaction processing is
covered in more depth in Chapter 2.
Many business activities are pairs of events involved in a give-get exchange. Most organizations engage in a small number of give-get exchanges, but each type of exchange happens
many times. For example, S&S will have thousands of sales to customers every year in exchange for cash. Likewise, S&S will continuously buy inventory from suppliers in exchange
for cash.
These exchanges can be grouped into five major business processes or transaction
cycles:
●●
The revenue cycle, where goods and services are sold for cash or a future promise to receive cash. This cycle is discussed in Chapter 14.
Vendors
Purchase Orders
Customer Orders
Goods & Services
Goods & Services
Vendor Invoices
Customer Invoices
Vendor Payments
Customer Payments
Invest Funds
Investors
Financial Statements
Loans
Creditors
Banks
Labor & Services
Dividends
Accounting
Information
System
at S&S
Wages, Salaries
& Commissions
Financial Statements
Financial Statements
Budgets &
Accounting Entries
Deposits
Regulations & Tax Forms
Withdrawals
Taxes & Reports
Bank Statements
Employees
Managerial Reports &
Loan Payments
transaction - An agreement between two entities to exchange
goods or services, such as selling inventory in exchange for
cash; any other event that can
be measured in economic terms
by an organization.
transaction processing - Process
of capturing transaction data,
processing it, storing it for later
use, and producing information
output, such as a managerial
report or a financial statement.
give-get exchange - Transactions
that happen a great many times,
such as giving up cash to get
inventory from a supplier and
giving employees a paycheck in
exchange for their labor.
business processes or transaction cycles - The major give-get
exchanges that occur frequently
in most companies.
revenue cycle - Activities associated with selling goods and services in exchange for cash or a
future promise to receive cash.
FIGURE 1-2
Customers
Management
Government
Agencies
33
Interactions between
S&S and External and
Internal Parties
34
PART I
ConCEPTuAl FounDATIonS oF ACCounTIng InFoRmATIon SySTEmS
expenditure cycle - Activities associated with purchasing inventory for resale or raw materials
in exchange for cash or a future
promise to pay cash.
production cycle - Activities associated with using labor, raw
materials, and equipment to
produce finished goods. Also
called conversion cycle.
human resources/payroll
cycle - Activities associated with
hiring, training, compensating,
evaluating, promoting, and terminating employees.
financing cycle - Activities associated with raising money by
selling shares in the company to
investors and borrowing money
as well as paying dividends and
interest.
●●
●●
●●
●●
The expenditure cycle, where companies purchase inventory for resale or raw materials
to use in producing products in exchange for cash or a future promise to pay cash. This
cycle is discussed in Chapter 15.
The production cycle, or conversion cycle, where raw materials are transformed into
finished goods. This cycle is discussed in Chapter 16.
The human resources/payroll cycle, where employees are hired, trained, compensated,
evaluated, promoted, and terminated. This cycle is discussed in Chapter 17.
The financing cycle, where companies sell shares in the company to investors and borrow money, and where investors are paid dividends and interest is paid on loans.
These cycles process a few related transactions repeatedly. For example, most revenue cycle
transactions are either selling goods or services to customers or collecting cash for those sales.
Figure 1-3 shows the main transaction cycles and the give-get exchange inherent in each cycle.
These basic give-get exchanges are supported by a number of other business activities.
For example, S&S may need to answer a number of customer inquiries and check inventory
levels before it can make a sale. Likewise, it may have to check customer credit before a credit
sale is made. Accounts receivable will have to be increased each time a credit sale is made
and decreased each time a customer payment is received. Table 1-3 lists the major activities in
each transaction cycle.
Financing Cycle
Give
Cash
Funds
Get
Cash
Funds
Funds
Expenditure Cycle
Human Resources/Payroll Cycle
Give
Cash
Get Goods/
Raw
Materials
Give
Cash
Get
Labor
Data
General Ledger & Reporting System
Data
Data
Labor
Get
Finished
Goods
Give
Raw
Materials
Finished
Goods
Revenue Cycle
FIGURE 1-3
The AIS and Its
Subsystems
Give
Goods
Raw
Materials
Production Cycle
Give
Labor
Get
Cash
Purchased
Goods
Data
Data
Information
for Both
Internal
and
External
Users
CHAPTER 1
ACCounTIng InFoRmATIon SySTEmS: An ovERvIEW
Notice that the last activity listed in Table 1-3 for each transaction cycle is “Send appropriate information to the other cycles.” Figure 1-3 shows how these various transaction cycles
relate to one another and interface with the general ledger and reporting system, which is
used to generate information for both management and external parties. The general ledger
and reporting system is discussed in more depth in Chapter 18.
In many accounting software packages, the various transaction cycles are implemented
as separate modules. Not every organization needs to implement every module. Retail stores
like S&S, for example, do not have a production cycle and would not implement that module. Moreover, some organizations have unique requirements. Financial institutions, for example, have demand deposit and installment-loan cycles that relate to transactions involving
customer accounts and loans. In addition, the nature of a given transaction cycle differs across
different types of organizations. For example, the expenditure cycle of a service company,
TABLE 1-3
Common Cycle Activities
Transaction Cycle
Major Activities in the Cycle
Revenue
Receive and answer customer inquiries
Take customer orders and enter them into the AIS
Approve credit sales
Check inventory availability
Initiate back orders for goods out of stock
Pick and pack customer orders
Ship goods to customers or perform services
Bill customers for goods shipped or services performed
Update (increase) sales and accounts receivable
Receive customer payments and deposit them in the bank
Update (reduce) accounts receivable
Handle sales returns, discounts, allowances, and bad debts
Prepare management reports
Send appropriate information to the other cycles
Expenditure
Request goods and services be purchased
Prepare, approve, and send purchase orders to vendors
Receive goods and services and complete a receiving report
Store goods
Receive vendor invoices
Update (increase) accounts payable
Approve vendor invoices for payment
Pay vendors for goods and services
Update (reduce) accounts payable
Handle purchase returns, discounts, and allowances
Prepare management reports
Send appropriate information to the other cycles
Human Resources/Payroll Recruit, hire, and train new employees
Evaluate employee performance and promote employees
Discharge employees
Update payroll records
Collect and validate time, attendance, and commission data
Prepare and disburse payroll
Calculate and disburse taxes and benefit payments
35
general ledger and reporting
system - Information-processing
operations involved in updating
the general ledger and preparing reports for both management and external parties.
36
PART I
ConCEPTuAl FounDATIonS oF ACCounTIng InFoRmATIon SySTEmS
TABLE 1-3 Continued
Transaction Cycle
Major Activities in the Cycle
Human Resources/Payroll
Prepare employee and management reports
Send appropriate information to the other cycles
Production
Design products
Forecast, plan, and schedule production
Request raw materials for production
Manufacture products
Store finished products
Accumulate costs for products manufactured
Prepare management reports
Send appropriate information to the other cycles
Financing
Forecast cash needs
Sell stock/securities to investors
Borrow money from lenders
Pay dividends to investors and interest to lenders
Retire debt
Prepare management reports
Send appropriate information to the other cycles
such as a public accounting or a law firm, does not normally involve processing transactions
related to the purchase, receipt, and payment for merchandise that will be resold to customers.
Each transaction cycle can include many different business processes or activities. Each
business process can be relatively simple or quite complex.
After preparing Tables 1-2 and 1-3 and Figures 1-2 and 1-3, Scott and Susan believe they
understand S&S well enough to begin shopping for an information system. Susan recalled a
previous employer that had several separate information systems because its software was not
designed to accommodate the information needs of all managers. She also vividly recalled attending one meeting where she witnessed the negative effects of having multiple systems. The
head of marketing had one report on year-to-date sales by product, the production manager had a
different report that contained different sales figures, and the controller’s report, which was produced by the general ledger system, had yet a third version of year-to-date sales. Over an hour
was wasted trying to reconcile those different reports! Susan vowed to ensure that S&S did not
ever find itself in such a mess. She would make sure that any system selected would have the capability to integrate both financial and nonfinancial data about S&S’s various business processes
so that everyone could pull information from the same system.
accounting information system
(AIS) - A system that collects,
records, stores, and processes
data to produce information
for decision makers. It includes
people, procedures and instructions, data, software, information technology infrastructure,
and internal controls and security measures.
accounting - The systematic and
comprehensive recording of an
organization’s financial transactions, including summarizing,
analyzing, and reporting these
transactions to all users.
Accounting Information Systems
It has often been said that accounting is the language of business. If that is the case, then
an accounting information system (AIS) is the intelligence—the information-providing
vehicle—of that language.
Accounting is the systematic and comprehensive recording of an organization’s financial transactions. It also includes summarizing, analyzing, and reporting these transactions
to management, owners/investors, oversight agencies, and tax collection entities. That means
accounting is a data identification, collection, and storage process as well as an information
development, measurement, and communication process. By definition, accounting is an information system, since an AIS collects, records, stores, and processes accounting and other
data to produce information for decision makers. This is illustrated in Figure 1-4.
An AIS can be a paper-and-pencil manual system, a complex system using the latest in
IT, or something in between. Regardless of the approach taken, the process is the same. The
CHAPTER 1
ACCounTIng InFoRmATIon SySTEmS: An ovERvIEW
FIGURE 1-4
AIS
Data
37
AIS
Decision
Information
User
AIS must collect, enter, process, store, and report data and information. The paper and pencil
or the computer hardware and software are merely the tools used to produce the information.
This text does not distinguish an AIS from other information systems. Instead, our viewpoint is that the AIS can and should be the organization’s primary information system and that
it provides users with the information they need to perform their jobs.
There are six components of an AIS:
1.
2.
3.
4.
5.
The people who use the system.
The procedures and instructions used to collect, process, and store data.
The data about the organization and its business activities.
The software used to process the data.
The information technology infrastructure, including the computers, peripheral devices,
and network communications devices used in the AIS.
6. The internal controls and security measures that safeguard AIS data.
These six components enable an AIS to fulfill three important business functions:
1. Collect and store data about organizational activities, resources, and personnel. Organizations have a number of business processes, such as making a sale or purchasing raw
materials, which are repeated frequently.
2. Transform data into information so management can plan, execute, control, and evaluate
activities, resources, and personnel. Decision making is discussed in detail later in this
chapter.
3. Provide adequate controls to safeguard the organization’s assets and data. Control concepts are discussed in detail in Chapters 8–13.
Since accounting data comes from an AIS, AIS knowledge and skills are critical
to an accountant’s career success. Interacting with an AIS is one of the most important
activities accountants perform. Other important AIS-related activities include designing information systems and business process improvements, as discussed in Chapters
22 to 24. Focus 1-1 explains a specialty to designate that certain CPAs (Certified Public
Accountants) have an in-depth knowledge of AIS topics.
HOW AN AIS CAN ADD VALUE TO AN ORGANIZATION
A well-designed AIS can add value to an organization by:
1. Improving the quality and reducing the costs of products or services. For example, an
AIS can monitor machinery so operators are notified immediately when performance falls
outside acceptable quality limits. This helps maintain product quality, reduces waste, and
lowers costs.
2. Improving efficiency. For example, timely information makes a just-in-time manufacturing approach possible, as it requires constant, accurate, up-to-date information about raw
materials inventories and their locations.
3. Sharing knowledge. Sharing knowledge and expertise can improve operations and provide a competitive advantage. For example, CPA firms use their information systems
to share best practices and to support communication between offices. Employees can
search the corporate database to identify experts to provide assistance for a particular
client; thus, a CPA firm’s international expertise can be made available to any local
client.
4. Improving the efficiency and effectiveness of its supply chain. For example, allowing
customers to directly access inventory and sales order entry systems can reduce sales and
marketing costs, thereby increasing customer retention rates.
An AIS Processes Data
to Produce Information
for Decision Makers
38
PART I
FOCUS 1-1
ConCEPTuAl FounDATIonS oF ACCounTIng InFoRmATIon SySTEmS
CITP—An IT Specialty Designation for CPAs
The American Institute of Certified Public Accountants
(AICPA) offers several specialty designations for CPAs.
The CITP (Certified Information Technology Professional) designation reflects the AICPA’s recognition of
the importance of IT and its interrelationship with accounting. A CITP possesses a broad range of business,
managerial, and technological knowledge, making it
possible for the CITP to understand how organizations
use IT to achieve their business objectives. To obtain a
CITP certification, a person must demonstrate a mastery of the following topics: information system management, business intelligence, fraud, risk assessment,
internal control concepts, and how to test and evaluate
an information system.
There are many reasons to earn the CITP certification:
• Because only CPAs can be CITPs, this certification further differentiates you from others in the marketplace.
• It affirms your value as an IT specialist and increases
your value to your employer or clients.
• It is a great “calling card” for IT people who want to
be leaders in industry, public practice, government,
or academia.
• It opens the doors to new technology-related roles
and opportunities.
• Automatic membership in the IT Section, which allows
you to meet, share best practices, network, and communicate with other CITPs. You can also receive CITP newsletters and other communications, attend CITP Webinars,
receive CITP member discounts, and access exclusive
CITP resources and content on the CITP website.
To qualify for the CITP designation, you must:
• Be a CPA and a member of the AICPA
• Pass the CITP exam
• In the five years preceding your application, meet the
1,000-hour experience and the 75-hour continuing
professional education requirements
Based on information from http://www.aicpa.org.
5. Improving the internal control structure. An AIS with the proper internal control structure can help protect systems from fraud, errors, system failures, and disasters.
6. Improving decision making. Improved decision making is vitally important and is discussed below in more detail.
AN AIS CAN USE ARTIFICIAL INTELLIGENCE AND DATA ANALYTICS
TO IMPROVE DECISION MAKING
artificial intelligence (AI) - The
use of computer systems to
simulate human intelligence
processes such as learning, reasoning, and self-improvement.
Decision making is a complex, multistep activity that involves identifying a problem, collecting and interpreting data, evaluating ways to solve the problem, selecting a solution methodology, and determining and implementing the solution. An AIS can help in the decision-making
process by providing the information to reduce uncertainty, providing feedback about the effectiveness of prior decisions, providing information in a timely manner, and identifying situations that require management action.
Artificial intelligence and data analytics tools can be used in each of these decisionmaking activities to help improve decision making.
Artificial intelligence (AI) uses computer systems to simulate human intelligence processes such as learning (acquiring information and rules for using it), reasoning (interpreting data and using its rules to arrive at conclusions), and self-improvement (learning from
the information and past experiences to improve its rules).
The AI field draws from many disciplines, including computer science, information engineering, linguistics, mathematics, philosophy, and psychology. Some popular
AI applications include expert systems, intelligent routing of delivery vehicles, machine
vision (used in self-driving cars), and speech recognition. Some popular AI cloud offerings include Amazon AI, Google AI, IBM Watson, and Microsoft Cognitive Services.
Here are a few examples of the fields where AI is used:
●●
Business. AI-driven robots now perform many highly repetitive tasks, especially in
manufacturing. AI algorithms determine how to better serve customers. Website chatbots
provide immediate customer service.
CHAPTER 1
●●
●●
●●
ACCounTIng InFoRmATIon SySTEmS: An ovERvIEW
Education. AI software automatically grades student work, assesses student performance and progress, and provides additional support as needed.
Finance. Robo-based stock picking algorithms give advice on what stocks to buy and
sell. Software executes most stock market trades. Personal finance applications use AI to
advise their users and keep track of their finances.
Healthcare. AI can make better and faster diagnoses than humans, thereby improving patient outcomes and reducing costs. For example, doctors can use IBM Watson to
mine patient data, evaluate their symptoms, access external databases, communicate a
diagnosis and how confident Watson is in the diagnosis, and receive and answer doctor
questions.
Data analytics is the use of software and algorithms to discover, describe, interpret, communicate, and apply meaningful patterns in data to improve business performance. Data analytics
tools draw from many disciplines, including computer programming, mathematics, operations
research, and statistics. Companies have long analyzed their past performance. Data analytics
is a more recent development and is designed to focus on the future and answer questions such
as why something happened, what will happen next, and how performance can be improved.
Analytics tools are most efficient when there are abundant computational resources and there
is a large quantity of data from multiple internal or external databases.
An essential part of most analytic tools is a data dashboard that displays important data
points, metrics, and key performance indicators in the form of line or bar charts, tables, or
gauges. A dashboard provides a central location for businesses to monitor performance. The
dashboard is connected to internal and external data sources, analyzes the data, and displays
it visually in an easy-to-understand format. Dashboards are usually customized to meet the
specific needs of a business process, department, or the entire company.
There are many different types of analytics, including predictive, prescriptive, descriptive, and cognitive. Some analytics are named after their usage such as retail, supply chain,
store optimization, sales force optimization, marketing optimization, call center optimization,
web, social media, speech, credit risk, and fraud analytics. Analytics are also categorized by
their use and characteristics such as actionable, visual, embedded, automated, and operational
analytics.
Analytics can help improve decision making in many ways. At the most basic level, analytics can identify a problem or issue for management to resolve. At an intermediate level,
analytics can also collect the data needed to solve the problem, analyze it, and make recommendations to management on how to resolve it. At an advanced level, actionable insights can
be integrated into the systems used to make decisions. That is, the analytics can be embedded
into AIS components, such as databases, applications, and devices, and operationalized to automatically resolve problems that occur and communicate solutions to management.
The data analytics market is estimated to exceed $50 billion and is growing rapidly. Businesses use analytics to increase sales, create products and services to meet new customer
needs, reduce costs, and improve decision making. Here are just a few ways data analytics
are used:
●●
●●
●●
●●
39
Cargill has developed an analytics platform that allows dairy farmers to use a tablet or
computer to analyze large quantities of data about their cows’ living conditions, diet, and
milk productivity. When cows are happier and more comfortable, they produce more
milk.
Under Armour uses data from MapMyFitness to determine popular running routes and
times so it knows when to advertise sneakers, energy drinks, and other products. Research
shows that when an advertiser sells repeat-purchase products, ads sent at the right time to
consumers will generate up to 16 times more sales than when sent at other times.
Most web-based retailers such as Amazon use their sales database to suggest additional
products and services for its customers to purchase.
A technician at a support center uses key words from a caller, as well as a database of
past problems and solutions, to quickly solve technical issues. In time, when the data and
analytics are robust enough, the process will be automated; customers will visit the company’s website and diagnose most problems themselves, with the most complex issues
handed off to a human technician.
data analytics - use of software
and algorithms to find and solve
problems and improve business
performance.
data dashboard - A display of
important data points, metrics,
and key performance indicators
in easily understood line or bar
charts, tables, or gauges.
40
PART I
ConCEPTuAl FounDATIonS oF ACCounTIng InFoRmATIon SySTEmS
●●
An airline embeds sensors in all important airplane components, continuously monitors
them, automatically schedules preventive maintenance, and provides a detailed list of
what needs to be done.
Focus 1-2 explains how Walmart uses data analytics to improve their business.
FOCUS 1-2
Data Analytics at Walmart
Walmart, the world’s biggest retailer, has more than 245
million customers who shop at more than 20,000 stores
in 28 countries. Walmart tracks individual customers,
gathering data on what customers like and what they
buy. Every hour, more than 1 million customers purchase something, which generates 2.5 petabytes (a quadrillion bytes) of unstructured data. The 2.5 petabytes
are roughly 167 times the books contained in America’s
Library of Congress.
To make use of this data, Walmart spent considerable
resources to become a leader in big data analytics. In fact,
Walmart’s data analytics efforts started before the term
big data became popular. Walmart’s analytics systems
analyze millions of products and hundreds of millions of
customers using data gathered from many different internal and external data sources.
Data analytics support several Walmart goals. First,
they optimize and personalize customers’ shopping experiences, whether they are in a store, shopping online via a
computer or a mobile device, or browsing Walmart’s website. They analyze customer data and buying behaviors to
better anticipate customer needs. Walmart also uses analytics to improve the store checkout experience.
Second, data analytics optimize operational efficiency, including increasing sales and profits, facilitating better and quicker decision making, improving store
and employee efficiency, improving product assortment,
managing the supply chain, and locating distribution
centers and stores. Analytics helped Walmart (1) develop
smarter stocking, pricing, merchandising, and marketing
solutions in real time and (2) make its pharmacies more
efficient.
Walmart analyzed sales before and after big data analytics were used to change their e-commerce strategy and
found that online sales increased 10% to 15%, resulting in
$1 billion in incremental revenue.
The data analytics team at Walmart Labs monitors
Walmart.com and analyzes every clickable action to
determine what consumers buy online and how to improve their online experience. The Lab also monitors what
is trending on Twitter, local events such as sports activities and concerts that affect sales, and local weather deviations to determine how they affect buying patterns.
Walmart’s predictive data analytics software contains machine learning technologies that continuously improve the
accuracy of analytics algorithms.
Walmart built the world’s biggest private cloud to
facilitate its data analytics processes. At its headquarters, Walmart also created a Data Café (Collaborative
Analytics Facilities for Enterprise) to model, manipulate, and visualize data to create solutions. The Café
uses Walmart’s transaction data as well as data from 200
other data sources such as economic, gasoline, local
events, social media, telecommunications, television,
and weather data to predict outcomes and resolve issues to make Walmart stores more efficient, responsive,
and profitable.
Employees are encouraged to submit their problems
to Data Café experts for a solution usually produced in
minutes rather than weeks and displayed on the Café’s
touchscreen smartboards. These real-time solutions
help correct errors instantly, gain sales and marketing
insights, and track customer trends and competitor
strategies.
Here are two examples of Walmart’s use of the Data
Café. A grocery team could not figure out why sales in
a product category had suddenly declined and used the
Café to drill down into the data. They found that a pricing
miscalculation resulted in the product being priced higher
than it should have been in some stores. In a second example, Walmart data mining algorithms found that a specific cookie was popular at all Walmart stores except one.
An investigation showed that a simple stocking oversight
resulted in the cookies not being stocked on the store
shelves. Ordering and stocking the cookies prevented the
further loss of sales.
THE AIS AND BLOCKCHAIN
In 2008, Satoshi Nakamoto invented the blockchain to digitally record cryptocurrency transactions such as Bitcoin. Since then, blockchain technology has been adapted so that virtually everything of value can be recorded, and private blockchains have been developed for business use.
CHAPTER 1
ACCounTIng InFoRmATIon SySTEmS: An ovERvIEW
Just as people do not have to know exactly how the Internet or an automobile works,
they do not need to know the technical details of how the blockchain works to use it.
However, a basic knowledge of blockchain technology helps users make better use of the
technology.
Blockchain got its name from its structure, which is individual digital records, called
blocks, linked together using cryptography in a single list, called a chain. The blockchain isn’t
stored in a single location—it is a distributed ledger that functions as a decentralized database.
Each computer in the distributed peer-to-peer network maintains a copy of the ledger to prevent a single point of failure. Since the blockchain is managed by a network that follows protocols for inter-node communication and validating new blocks, there is no need for a central
authority that controls everything. The information recorded in the blockchain is made public,
so everyone on the blockchain’s peer-to-peer network has a copy of the blockchain and all
transactions are accessible to everyone.
Here is a brief, high-level view of how the blockchain works; that is, how a transaction is added to a block and how a block is added to a chain. Blockchains are explained
in more detail in Chapter 11.
1. Initiate transaction. Two parties, such as a buyer and a seller, decide to exchange something of value and request that a transaction be initiated. Instead of using actual buyer or
seller names, a unique digital signature or identifier is used. This is analogous to using a
part number for a product or a username for a person.
2. Validate transaction. The transaction is sent to the peer-to-peer network nodes who
use algorithms to simultaneously validate transaction details, including its time, dollar amount, and participants. To achieve a consensus, a simple majority of 51% of the
nodes must validate the block. The number of computers in the peer-to-peer networks
can be as large as desired; the Bitcoin blockchain has millions, each with a copy of its
blockchain ledger. In a public, permission-less blockchain platform like Bitcoin, every network node can record transactions and participate in the consensus process. In
a private, permissioned chain, participation in the consensus process is restricted to approved nodes.
3. Create a block. Since each block in a chain can store up to 1 MB of data, the verified
transactions are combined with hundreds or thousands of similar transactions to create
a new block for the ledger. The transaction’s dollar amount and the digital signatures of
both parties are stored in the block.
4. Calculate and insert a hash. Each block is given two unique codes, or pieces, of identifying information called a hash, which distinguishes it from other blocks. Hash codes use
a mathematical algorithm to turn digital information into a string of numbers and letters.
One hash is that of the current block and the second is the hash of the block that precedes
it in the chain. When a new block is added to the chain, it is linked to the previous block by
storing a cryptographic hash generated from the contents of the previous block. The second
hash ensures that the chain is never broken and that each block is recorded in a permanent
and unalterable way. The second hash makes the block tamper resistant and secure; that
is, it adds a high level of assurance that the prior block contents have not been changed. If
the data on a block is edited in any way, that block’s hash code changes, and the codes of
all subsequent blocks change. This discrepancy makes it extremely difficult for information on the blockchain to be changed without notice. How a hash is created is discussed in
Chapter 11.
5. Complete transaction. The block is added to the blockchain, and all the other computers
storing the blockchain are updated automatically. This completes the transaction recording process, and the right of ownership of the item of value is passed from the seller to
the buyer.
Blockchain has several significant advantages, including the following:
●●
Accuracy. Transactions are verified by many thousands of networked computers instead
of error-prone humans. Even if a computer makes a computational mistake, the error
would not spread to the rest of the blockchain unless at least 51% of the network’s computers validated the mistake.
41
blockchain - Individual digital
records, called blocks, linked
together using cryptography in
a single list, called a chain.
42
PART I
ConCEPTuAl FounDATIonS oF ACCounTIng InFoRmATIon SySTEmS
●●
●●
●●
●●
●●
●●
●●
●●
●●
●●
●●
Transparency. Blockchain data are transparent. That is, all transaction details, including
participant user names, transaction amount, transaction date and time, and who entered
the transaction, are open for everyone on the blockchain to see. This includes authorized
regulators, auditors, etc.
Data consistency. In older legacy systems, data are often located in multiple databases and
finding data can be complex. The data can also be inconsistent among databases, with some
of them updated and others not. With blockchain, data are stored in one location only.
Trust. To ensure that blockchain networks can be trusted, computers that want to join
the blockchain are tested. That is, new users are required to prove themselves before
they can be a part of a blockchain network. For example, in Bitcoin’s proof of work test,
a system must expend significant computer power and energy to solve a complex math
problem before they can add a block to the blockchain. While Bitcoin’s proof of work
does not make a hack impossible, the cost of organizing an attack would almost always
outweigh the benefits that could be achieved from the attack.
No need for third parties. The consensus process of all nodes in the network agreeing
on the blockchain’s content allows mutually distrustful parties to enter into transactions
safely without trusted third parties.
Single set of books. As both sides of a transaction are stored in a single source, that
eliminates some of the need for a set of books for the buyer and for the seller. One set of
books provides a trust level not present in current legacy systems.
Cost. Blockchain eliminates the costs of human third-party verification and many transaction processing costs.
Decentralization. By storing the blockchain on all network computers, the risks of data
held centrally is eliminated. For example, if a copy of the blockchain is hacked or compromised, only that copy is affected. This reduces or eliminates the traditional requirement for file and database backups.
Efficiency. Blockchain works all day, every day—and transactions can be finalized within
minutes and considered secure in no more than a few hours. Contrast that with limited business hours and waiting days for transactions to clear and for money to be available.
Privacy. Although many blockchains are public databases, where users can view transaction information, users are unable to access confidential data that identify those engaging
in the transactions.
Security. A blockchain is difficult to corrupt. There is no single point of failure; if one
node goes down, there is a copy of the ledger on all the other nodes. Information is
shared and continually reconciled by thousands of computers. New blocks are always
added chronologically to the end of the blockchain. It is very difficult to go back and
change a block’s contents because each block contains its own hash and the hash of the
previous block. If information is changed, the hashes for the previous and subsequent
blocks also change and this disrupts the ledger’s shared state. When other network computers become aware that the change has caused a problem, consensus is no longer possible. Until the problem is solved, no new blocks are added to the blockchain. In most
cases, the block that caused the error is discarded and the nodes again attempt to achieve
consensus. This process ensures that no single system or user can tamper with the transaction records or add invalid blocks to the blockchain.
Provenance. Provenance is the history of ownership of something of value. The data collected by Blockchain shows who did what, when they did it, and the history of the item
since it was entered in the blockchain. That history is transparent, verified by all network
participants, and frequently reconciled.
While blockchain has many important advantages, there are significant challenges to its adoption, including political and regulatory issues. These challenges include the following:
●●
Cost. Cost is a blockchain advantage because transaction fees are less, but it is also
a disadvantage because the technology needed to operate a blockchain is expensive.
So are the thousands of hours expended to produce the custom software and backend processes needed to insert blockchain technologies into current business systems.
There are also the utility costs required to run the computers that process and store the
blockchain.
CHAPTER 1
ACCounTIng InFoRmATIon SySTEmS: An ovERvIEW
Loss of privacy and confidentiality. Since blockchain users are unable to identify those
engaging in transactions, dishonest users can use blockchain networks like Bitcoin to
make illegal purchases. To prevent this, some countries like the United States prohibit
full anonymity by requiring online exchanges to collect customer information, verify
their identity, and confirm that they are not on any list of known or suspected terrorists.
●● Susceptibility. A 51% attack is difficult to execute due to the computational power required to gain majority control of a blockchain network. That might change as technology costs decrease and hackers are able to affordably rent computational power rather
than buying it. In addition, these attacks are more difficult as the number of nodes in the
blockchain network increases.
In summary, a blockchain is a public, global, cryptographically secure ledger that automatically records and verifies large volumes of digital transactions. The combination of blocks that
cannot be changed, blocks linked together in a chain, and cryptography to secure everything
creates a transaction recording system that can be trusted for transactions among untrusted
partners.
Focus 1-3 briefly discusses some of the many blockchain applications in use today.
●●
FOCUS 1-3
Current and Planned Uses of Blockchain
Blockchain was first used for digital currencies but has
spread to many industries because it is a secure and costeffective way to manage all types of digital transactions.
Recent startups developed their business processes using
newer technologies, so they are much more likely to use
blockchain. As time passes, some of these blockchaininspired startups become what some people call emerging disruptors as they begin displacing older and larger
companies.
Established companies with older legacy information
systems find it more challenging to use blockchain. They
often discover that to achieve blockchain’s advantages,
they must change the way they do business.
Deloitte surveyed executives at 1,000 established
companies about their blockchain experience and found
74% of respondents see compelling reasons to use it,
though only 34% currently do. Some 41% expected to begin using blockchain, and almost 40% will invest at least
$5 million in blockchain applications. Deloitte believes
blockchain adoption is higher than their survey indicates
because emerging disruptors were not included in the
survey.
Here are just a few of the more prominent uses of
blockchain:
• Banks only open during business hours and deposits take up to 3 days to clear. Blockchain is always
open, and deposits can be seen in 10 minutes. It is
estimated that blockchain could save banks $20 billion
by eliminating money in-transit costs and consumers
$16 billion in banking and insurance fees.
• Currently, healthcare data is stored by different institutions using different formats and standards, making
it hard for doctors to understand a patient’s medical
history. Using blockchain technology, patient information can be signed, time-stamped, and stored securely
on a distributed ledger. Doctors and patients can go
to a single source to access a patient’s health information, and patients have more control over their own
health data. Blockchain could also help solve the problem of counterfeit drugs in the medical supply chain.
• Recording property rights occurs when a deed is delivered to the local recording office and manually entered in the county’s database and public index. The
process is costly, inefficient, time-consuming, error
prone, and susceptible to fraud. Disputed property
claims are difficult to reconcile. Blockchain can eliminate scanning documents and finding paper files in a
recording office. Property owners can trust that their
deed is accurate and permanent if its ownership is
stored and verified on the blockchain.
• In 2016, Overstock.com was one of the first publicly
traded company to use blockchain to sell and distribute company shares. Without blockchain, selling
stock involves brokers, clearing houses, and custodians. The money and shares involved in the trade are
frozen for up to 3 days. With blockchain peer-to-peer
trading, there is no need for intermediaries, and the
shares exchange hands within minutes. Companies
are also developing a blockchain application for
proxy voting.
• Manufacturing companies are developing applications
to track the flow of materials, information, and payments as they move through their supply chains.
Source of Survey data: https://www2.deloitte.com/us/en/pages/
consulting/articles/innovation-blockchain-survey.html
43
44
PART I
ConCEPTuAl FounDATIonS oF ACCounTIng InFoRmATIon SySTEmS
CLOUD COMPUTING, VIRTUALIZATION, AND THE INTERNET OF THINGS
virtualization - Running multiple
systems simultaneously on one
physical computer.
cloud computing - using a
browser to remotely access
software, data storage,
hardware, and applications.
Internet of Things (IoT) Embedding sensors in devices
so they can connect to the
Internet.
Recently, many organizations have embraced virtualization, cloud computing, and the Internet
of things to enhance both efficiency and effectiveness. Virtualization takes advantage of the
power and speed of modern computers to run multiple systems simultaneously on one physical computer. This cuts hardware costs because fewer computers need to be purchased. Fewer
machines means lower maintenance costs. Data center costs also fall because less space needs
to be rented, which also reduces utility costs.
Cloud computing takes advantage of the high bandwidth of the modern global telecommunication network to enable employees to use a browser to remotely access software
(software as a service), hardware (infrastructure as a service), and entire application environments (platform as a service). The arrangement is referred to as a “private,” “public,” or
“hybrid” cloud, depending on whether the remotely accessed resources are entirely owned
by the organization, a third party, or a mix of the two. Table 1-4 compares the different levels of service provided in the cloud to eating pizza. You can either make and bake a pizza
in house, buy a frozen pizza and bake it, have a pizza delivered to your home, or go out to
eat a pizza. As the table shows, you can do the same with computer services (the items in
blue are done in house, and the items in red are done by a cloud provider).
Cloud computing can potentially generate significant cost savings. For example, instead of purchasing, installing, and maintaining separate copies of software for each end
user, an organization can purchase one copy, install it on a central server, and pay for the
right for a specified number of employees to simultaneously use a browser to remotely
access and use that software. Public clouds eliminate the need for making major capital
investments in IT, with organizations purchasing (and expensing) their use of computing
resources on a pay-for-use or subscription basis. In addition to reducing costs, the centralization of computing resources with cloud computing (whether public, private, or hybrid)
makes it easier to change software and hardware, thereby improving flexibility. The term
Internet of Things (IoT) refers to the embedding of sensors in a multitude of devices
(lights, heating and air conditioning, appliances, etc.) so that those devices can now connect to the Internet. The IoT has significant implications for information security.
THE AIS AND CORPORATE STRATEGY
Since most organizations have limited resources, it is important to identify the AIS improvements likely to yield the greatest return. Making a wise decision requires an understanding of
the organization’s overall business strategy. To illustrate, consider the results of a CIO magazine survey of 500 Chief Information Officers. Asked to identify the three most important skill
sets for a CIO, more than 75% put strategic thinking and planning on their list.
Figure 1-5 shows three factors that influence the design of an AIS: developments in IT,
business strategy, and organizational culture. It is also important to recognize that the design
of the AIS can also influence the organization’s culture by controlling the flow of information
within the organization. For example, an AIS that makes information easily accessible and
widely available is likely to increase pressures for more decentralization and autonomy.
TABLE 1-4
Comparing Cloud Services to Eating Pizza
Traditional (make pizza
from scratch in house)
Dining table
Soda
Electricity and gas
Oven
Dough
Toppings
IaaS: Infrastructure
as a Service (take
and bake)
PaaS: Platform as
a Service (pizza
delivered)
SaaS: Software as a
Service (dine out)
CHAPTER 1
ACCounTIng InFoRmATIon SySTEmS: An ovERvIEW
Business
Strategy
Organizational
Culture
45
FIGURE 1-5
Factors Influencing
Design of the AIS
AIS
Information
Technology
IT developments can affect business strategy. For example, the Internet has profoundly
affected the way many activities are performed, significantly affecting both strategy and
strategic positioning. The Internet dramatically cuts costs, thereby helping companies to
implement a low-cost strategy. If every company used the Internet to adopt a low-cost strategy, then the effects might be problematic. Indeed, one possible outcome may be intense
price competition among firms, with the likely result that most of the cost savings provided
by the Internet get passed on to the industry’s customers, rather than being retained in the
form of higher profits. Moreover, because every company can use the Internet to streamline
its activities, a company is unlikely to gain a sustainable long-term competitive advantage.
An organization’s AIS plays an important role in helping it adopt and maintain a strategic
position. Achieving a close fit among activities requires that data are collected about each
activity. It is also important that the information system collects and integrates both financial
and nonfinancial data about the organization’s activities.
THE ROLE OF THE AIS IN THE VALUE CHAIN
To provide value to their customers, most organizations perform a number of different activities. Figure 1-6 shows that those activities can be conceptualized as forming a value chain
consisting of five primary activities that directly provide value to customers:
1. Inbound logistics consists of receiving, storing, and distributing the materials an organization uses to create the services and products it sells. For example, an automobile manufacturer receives, handles, and stores steel, glass, and rubber.
2. Operations activities transform inputs into final products or services. For example,
assembly line activities convert raw materials into a finished car and retailers remove
goods from packing boxes and place the individual items on shelves for customers to
purchase.
3. Outbound logistics activities distribute finished products or services to customers. An
example is shipping automobiles to car dealers.
Inbound
Logistics
The Value Chain
Secondary Activities
Operations
Marketing
and Sales
Service
primary activities - value chain
activities that produce, market, and deliver products and
services to customers and provide post-delivery service and
support.
FIGURE 1-6
Primary Activities
Outbound
Logistics
value chain - linking all primary
and support activities in a business. value is added as a product passes through the chain.
Firm Infrastructure
Human Resources
Technology
Purchasing
46
PART I
ConCEPTuAl FounDATIonS oF ACCounTIng InFoRmATIon SySTEmS
4. Marketing and sales activities help customers buy the organization’s products or services. Advertising is an example of a marketing and sales activity.
5. Service activities provide post-sale support to customers. Examples include repair and
maintenance services.
support activities - value chain
activities such as firm infrastructure, technology, purchasing,
and human resources that
enable primary activities to
be performed efficiently and
effectively.
supply chain - An extended
system that includes an organization’s value chain as well as
its suppliers, distributors, and
customers.
Raw Materials
Supplier
Manufacturer
Distributor
Retailer
Support activities allow the five primary activities to be performed efficiently and effectively. They are grouped into four categories:
1. Firm infrastructure is the accounting, finance, legal, and general administration activities that allow an organization to function. The AIS is part of the firm infrastructure.
2. Human resources activities include recruiting, hiring, training, and compensating
employees.
3. Technology activities improve a product or service. Examples include research and development, investments in IT, and product design.
4. Purchasing activities procure raw materials, supplies, machinery, and the buildings used
to carry out the primary activities.
Using IT to redesign supply chain systems yields tremendous benefits and cost savings.
For example, Tennessee Valley Authority, a power generator, reengineered its supply chain
and created an enterprise-wide system that provides up-to-the-minute information, rather than
the “current once a day” system that it replaced. The new system replaced 20 smaller and incompatible systems, reduced head count by 89 people, and saved $270 million in its first five
years.
An organization’s value chain is a part of a larger system called a supply chain. As shown
in Figure 1-7, a manufacturing organization interacts with its suppliers and distributors. By
paying attention to its supply chain, a company can improve its performance by helping the
others in the supply chain to improve their performance. For example, S&S can improve its
purchasing and inbound logistics activities by implementing a more efficient just-in-time inventory management system that reduces its costs and minimizes the capital tied up in inventory. S&S can reap additional benefits if it links its new systems with its suppliers so they can
perform their primary value chain activities more efficiently. For example, by providing more
detailed and timely information about its inventory needs, S&S suppliers can more efficiently
plan their production schedules. Part of the resultant cost reduction can be passed on to S&S
in the form of lower product costs.
The problems created by an ineffective supply chain are illustrated by Limited
Brands. Limited experienced explosive growth, including acquisitions of other retail
companies such as Victoria’s Secret and Abercrombie & Fitch. These acquisitions left
Limited with a tangled web of more than 60 incompatible information systems. The problems came to a head one night when 400 trailers converged on a distribution center parking lot that could fit only 150 trailers. The trailers blocked traffic along all the highways
around the distribution center and caused countless traffic and community problems. No
one from Limited knew where all the trailers came from, what the merchandise was, or
where it was to be sent. Chaos reigned until the merchandise could be routed to stores
and other distribution centers. Limited solved many of its problems by installing a new,
integrated system that greatly improved its supply chain processes and technologies. Developing the new system was not easy. Limited has more than 1,000 suppliers and sells
its merchandise using various platforms, including retail stores, the Internet, catalogs,
and third-party retailers.
Summary and Case Conclusion
Consumer
FIGURE 1-7
The Supply Chain
Susan and Scott reflected on what they had done to try and understand what decisions S&S
would need to make and the information needed to make them. They began by obtaining an
understanding of S&S’s basic business processes and key decisions that must be made to operate the business effectively. They followed that with an analysis of the internal and external
parties that the AIS would have to interact with and the information the AIS would have to
provide them.
CHAPTER 1
ACCounTIng InFoRmATIon SySTEmS: An ovERvIEW
Since S&S is a retail merchandising company, its business processes could be described
in terms of four basic transaction cycles:
1. The revenue cycle encompasses all transactions involving sales to customers and the collection of cash receipts for those sales.
2. The expenditure cycle encompasses all transactions involving the purchase and payment of
merchandise sold by S&S as well as other services it consumes such as rent and utilities.
3. The human resources/payroll cycle encompasses all the transactions involving the hiring,
training, and payment of employees.
4. The financing cycle encompasses all transactions involving the investment of capital in
the company, borrowing money, payment of interest, and loan repayments.
These four cycles interface with the general ledger and reporting system, which consists
of all activities related to the preparation of financial statements and other managerial reports.
Scott and Susan will need a well-designed AIS to provide the information they need to
effectively plan, manage, and control their business. Their AIS must be able to process data
about sales and cash receipts, purchasing and paying for merchandise and services, payroll
and tax-related transactions, and acquiring and paying for fixed assets. The company’s AIS
must also provide the information needed to prepare financial statements.
Fortunately, many computer-based accounting packages are available for the retail industry. As they begin looking at various software packages, however, Scott and Susan quickly
learn that considerable accounting knowledge is required to choose the one that will best fit
their business. Because neither has an accounting background, Scott and Susan decide that
their next task will be to hire an accountant.
KEY TERMS
system 29
goal conflict 29
goal congruence 29
data 29
information 29
machine-readable 30
information overload 30
information technology (IT)
30
value of information 30
information system 31
business process 31
transaction 33
transaction processing 33
give-get exchange 33
business processes or
transaction cycles 33
revenue cycle 33
expenditure cycle 34
production cycle or
conversion cycle 34
human resources/payroll
cycle 34
financing cycle 34
general ledger and reporting
system 35
accounting information
system (AIS) 36
accounting 36
artificial intelligence (AI) 38
data analytics 39
data dashboard 39
blockchain 41
virtualization 44
cloud computing 44
Internet of Things (IoT) 44
value chain 45
primary activities 45
support activities 46
supply chain 46
AIS in Action
CHAPTER QUIZ
1. Data differ from information in which way?
a. Data are output, and information is input.
b. Information is output, and data are input.
c. Data are meaningful bits of information.
d. There is no difference.
2. The business process that includes goods storage, receiving vendor invoices, and updating
payable accounts is called
a. the expenditure cycle.
c. the production or conversion cycle.
b. the revenue cycle.
d. the financing cycle.
47
48
PART I
ConCEPTuAl FounDATIonS oF ACCounTIng InFoRmATIon SySTEmS
3. Which of the following is a primary activity in the value chain?
a. purchasing
c. post-sales service
b. accounting
d. human resource management
4. Which transaction cycle includes interactions between an organization and its
suppliers?
a. revenue cycle
c. human resources/payroll cycle
b. expenditure cycle
d. general ledger and reporting system
5. Which of the following is NOT a means by which information improves decision making?
a. increases information overload
b. reduces uncertainty
c. provides feedback about the effectiveness of prior decisions
d. identifies situations requiring management action
6. In the value chain concept, upgrading IT is considered what kind of activity?
a. primary activity
c. service activity
b. support activity
d. structured activity
7. When a subsystem’s goals are inconsistent with the goals of another subsystem or with
the system as a whole, it is called
a. goal conflict.
c. neither of these.
b. goal congruence.
8. Which of the following is a function of an AIS?
a. reducing the need to identify a strategy and strategic position
b. transforming data into useful information
c. allocating organizational resources
d. automating all decision making
9. A firm, its suppliers, and its customers collectively form which of the following?
a. supply chain
c. ERP system
b. value chain
d. AIS
10. A performance report about all approved vendors during the previous 12 months is information MOST needed in which business process?
a. paying vendors
c. selling merchandise
b. acquiring inventory
d. paying employees
DISCUSSION QUESTIONS
1.1
Discuss the concept of a system and the issues of goal conflict and goal congruence.
1.2
Give an example of how an AIS can improve decision making and describe the multistep activities involved in the process.
1.3
A software company in Munich is organizing a competition, inviting business ideas that
promote the use of smartphone technology to conduct business. You enter your business plan, an initiative to involve unemployed teenagers and young adults from local
communities to generate business and employment, and it was so well received that you
were awarded a special prize of €5,000. You plan on using your prize money to implement your idea.
a. Identify key decisions you need to make, the information you require to make these
key decisions, and the five major business processes you need to engage in.
b. Identify the external parties with whom you would need to exchange information
and specify the information you will receive from these parties and the information
that you will send to these parties.
1.4
How do an organization’s business processes and lines of business affect the design of
its AIS? Give several examples of how differences among organizations are reflected in
their AIS.
CHAPTER 1
ACCounTIng InFoRmATIon SySTEmS: An ovERvIEW
1.5
Figure 1-5 shows that organizational culture and the design of an AIS influence one another. What does this imply about the degree to which an innovative system developed
by one company can be transferred to another company?
1.6
Why are accounting software packages designed with separate transaction
modules?
1.7
Apply the value chain concept to S&S. Explain how it would perform the various primary and support activities.
1.8
IT enables organizations to easily collect large amounts of information about employees. Discuss the following issues:
a. To what extent should management monitor employees’ e-mail?
b. To what extent should management monitor which websites employees visit?
c. To what extent should management monitor employee performance by, for example,
using software to track keystrokes per hour or some other unit of time? If such information is collected, how should it be used?
d. Should companies use software to electronically “shred” all traces of e-mail?
e. Under what circumstances and to whom is it appropriate for a company to distribute
information it collects about the people who visit its website?
PROBLEMS
1.1
IT is changing the nature of accounting and the role of accountants. Write a two-page report
describing what you think will be the nature and the value of the accounting function in a
large company in the future.
1.2
The annual report is considered by some to be the single most important printed document that companies produce. In recent years, annual reports have become large documents. They now include such sections as letters to the stockholders, descriptions of the
business, operating highlights, financial review, management discussion and analysis, a
discussion of company internal controls, segment reporting, inflation data, and the basic financial statements. The expansion has been due in part to a general increase in the
degree of sophistication and complexity in accounting standards and disclosure requirements for financial reporting.
The expansion also is reflective of the change in the composition and level of sophistication of users. Current users include not only stockholders but also financial and
securities analysts, potential investors, lending institutions, stockbrokers, customers,
employees, and—whether the reporting company likes it or not—competitors. Thus,
a report originally designed as a device for communicating basic financial information
now attempts to meet the diverse needs of an ever-expanding audience.
Users hold conflicting views on the value of annual reports. Some argue that they fail to
provide enough information, whereas others believe disclosures in annual reports have expanded to the point where they create information overload. Others argue that the future of
most companies depends on acceptance by the investing public and by its customers; therefore,
companies should take this opportunity to communicate well-defined corporate strategies.
REQUIRED
a. Identify and discuss the basic factors of communication that must be considered in
the presentation of the annual report.
b. Discuss the communication problems a corporation faces in preparing the annual
report that result from the diversity of the users.
c. Select two types of information found in an annual report, other than the financial
statements and accompanying footnotes, and describe how they are helpful to the
users of annual reports.
d. Discuss at least two advantages and two disadvantages of stating well-defined corporate strategies in the annual report.
49
50
PART I
ConCEPTuAl FounDATIonS oF ACCounTIng InFoRmATIon SySTEmS
e. Evaluate the effectiveness of annual reports in fulfilling the information needs of the
following current and potential users: shareholders, creditors, employees, customers,
and financial analysts.
f. Annual reports are public and accessible to anyone, including competitors. Discuss
how this affects decisions about what information should be provided in annual reports. (CMA Examination, adapted)
1.3
Alexander Forbes, a diversified financial services organization, is one of the major financial services organizations in Africa, providing financial solutions to individual and
corporate customers. Their services include retirement planning, asset and wealth management, medical insurance, and consulting. Headquartered in Johannesburg, South
Africa, the company has operations in eight regions across sub-Saharan Africa and the
Channel Islands, employing over 3,000 people. It reported operating income of ZAR
3,647 million (South African rand) for the year 2017–18.
In recent years, Alexander Forbes has embarked on simplifying the company structure to enable better collaboration across divisions. One of the structural changes was
the separation of the technology function from the operations function to create an information technology (IT) function as a revenue-generating cluster.
The IT function is responsible for modernizing systems to provide, among other
services, a single customer view. This made it possible for Alexander Forbes to use IT
as a strategic tool. One of the ways in which this is being achieved is the company’s
health insurance services.
The company keeps track of its customers in an integrated database so that customer care representatives are able to handle queries and transactions for customers
across all healthcare products.
The database tracks all claims submitted by their customers, including visits made
by healthcare professionals, medication, procedures, and treatments. In case of prescriptions for which cheaper options, often in the form of generic alternatives, are available,
customers are immediately informed via text message to their mobile phones. However,
it is often found that customers prefer the more expensive medication rather than the generic alternative. A record of co-payment is maintained on the database for such customers since the company does not cover the full cost of relatively expensive medication.
All claims submitted by customers are digitized and can be easily retrieved if any queries arise. Customers can also access their historical records through the company’s website.
Customers can install the company’s mobile application to submit claims and
check their status.
REQUIRED
a. Why should Alexander Forbes collect data on the drugs that are prescribed? What
could the company do with this data?
b. Although customers are informed of cheaper generic alternatives to expensive medication, many customers opt for the more latter even though they have to make a
co-payment. How can Alexander Forbes use its AIS to persuade pharmacies to encourage customers to opt for the more affordable generic alternatives?
c. How does digitizing the claims add value to the organization?
d. How does the mobile application add value to the organization?
e. Use the Internet to find other IT improvements that Alexander Forbes has introduced
outside of their healthcare division. Write a short paragraph on each new application
or other newsworthy item you find.
1.4.
Match the description listed in the right column with the correct information characteristic listed in the left column.
___ 1. Access
restricted
___ 2. Accurate
a. A report was carefully designed so that its data was easily comprehended by the reader.
b. A manager working on the weekend needed information
about a customer’s production requests and found it on
the company’s network.
CHAPTER 1
___ 3. Available
___ 4. Reputable
___ 5. Complete
___ 6. Concise
___ 7. Consistent
___ 8. Current
___ 9. Objective
___ 10.
Relevant
___ 11. Timely
___ 12.
Useable
___ 13.
Understandable
___ 14. Verifiable
1.5.
ACCounTIng InFoRmATIon SySTEmS: An ovERvIEW
c. Before production reports are accepted, two clerks
working independently must produce the same
information.
d. An accounts receivable aging report included all customer accounts.
e. A report was checked by three different people to make
sure it was correct.
f. An accounts receivable aging report is used in creditgranting decisions.
g. An accounts receivable aging report was received before the credit manager had to decide whether to extend
credit to a customer.
h. Needing help with a decision, a manager sought the
opinion of a highly regarded expert.
i. To protect intellectual property, a company encrypted the
data, stored it in a very secure facility, and limited its use to
five people.
j. Tired of keying supplier prices into a database, a purchasing manager insisted the data be sent in machine
readable form.
k. After a lengthy, rambling presentation, a CEO insisted
future presentations contain only pertinent facts and last
no more than 30 minutes.
l. A new manager insisted that monthly reports look the
same so she could compare a new month’s results to
previous months.
m. After making a decision based on outdated data, a new
CFO required all analysis to be conducted with up-todate data.
n. Reluctant to rely on his personal feelings about a decision, a manager sought the opinion of an outside expert.
EC Coaches is a privately held, medium-sized company that operates a fleet of luxury coaches, semi-luxury and commuter buses, and a variety of luxury and standard
vehicles. Ranging from five to 60 seaters, these vehicles are leased to tour operators,
universities, schools, charitable organizations, and other businesses. To protect their investment in their vehicles and ensure that they provide their customers with vehicles
in immaculate condition, EC Coaches has a maintenance facility where they do basic
repairs and maintenance on their vehicles. Scheduled vehicle services are handled by
agents according to the maintenance plans agreed at the time of purchase of the vehicle.
You were recently hired by EC Coaches and you are eager to demonstrate your
worth to the company. Your supervisor asked you to prepare an accounts payable aging
report as of the end of the year for use in the upcoming audit of the company’s financial
statements.
REQUIRED
a. What is an accounts payable aging report?
b. Why is an accounts payable aging report needed for an audit?
c. What is an accounts payable aging report used for in normal company operations?
d. What data will you need to prepare the report?
e. Where will you collect the data you need to prepare the report?
f. How will you collect the necessary data for the report?
51
52
PART I
ConCEPTuAl FounDATIonS oF ACCounTIng InFoRmATIon SySTEmS
g. What will the report look like (i.e., how will you organize the data collected to create
the information your supervisor needs for the audit)? Prepare an accounts payable
aging report template in Excel or another spreadsheet software.
h. How will you distribute the report? How many copies will you make? Who should
receive the copies? What security features will you implement?
1.6.
Albert Heijn (or AH) is arguably the largest retail chain in Europe, owning supermarkets,
convenience stores, and online shopping services in food and other goods. AH prides itself
on establishing the first modern supermarkets. Founded in 1887 in Oostzaan, the Netherlands, Albert Heijn grew from a humble grocery store to a chain of supermarkets. Its first
supermarket was established in 1952 and, over the decades, AH has been the shopping
destination of choice for the majority of the people living in the Netherlands, Belgium, and
other European countries. The chain comprises more than 850 stores, including more than
200 franchisees.
AH is known for being an early adopter of information technology and has been
one of the first supermarkets to take on a loyalty-card program. Customers can avail of
a discount with a card called ‘Bonuskaart’ in Dutch. It is issued to them after their personal information is entered into a database.
This provides AH with a mine of information about its customers. It utilizes this
information to expand its business and push sales.
REQUIRED
a. What kind of information do you think AH gathers?
b. How do you think the AH has motivated its customers to sign up for the bonus card
program?
c. What can the AH accomplish with the data it collects? Think in terms of strategy and
competitive advantage.
d. What could be some of the disadvantages of the card program?
1.7.
Match each of the following terms with its definition.
___ 1. Accounting
information system
___ 2. Artificial
intelligence
___ 3. Blockchain
___ 4.
Business processes
___ 5.
Data
___ 6. Data analytics
___ 7.
Data dashboard
___ 8.
Expenditure cycle
___ 9.
General ledger and
reporting system
___ 10. Give-get exchange
a. Exceeding the amount of information a human
mind can absorb and process
b. Use of software and algorithms to find and solve
problems and improve business performance
c. The benefit provided by information minus the
cost of producing it
d. A set of activities and tasks that help accomplish a
specific organizational goal
e. An agreement to exchange goods or services in
exchange for cash
f. Process of capturing, processing, and storing
transaction data for later use and for producing
information output
g. Frequent exchanges such as surrendering cash for
inventory and paying employees for labor
h. Activities associated with selling goods and services
in exchange for cash or a future promise of cash
i. Value chain activities that produce, market, and
deliver products to customers and provide postdelivery support
j. A system that collects, records, stores, and processes
data to produce information for decision makers
CHAPTER 1
___ 11.
Goal congruence
___ 12.
Information
___ 13. Machine-readable
___ 14.
Primary activities
___ 15. Production cycle
___ 16. Revenue cycle
___ 17. Supply chain
___ 18.
Support activities
___ 19.
System
___ 20. Transaction
___ 21. Value chain
___ 22. Value of
information
ACCounTIng InFoRmATIon SySTEmS: An ovERvIEW
k. Linking all the primary and support activities in a
business
l. Activities such as firm infrastructure and technology that enable main activities to be performed
efficiently and effectively
m. An organization’s value chain as well as its vendors, distributors, and customers
n. Activities associated with purchasing inventory for
resale for cash or a promise to pay cash
o. Data in a format that can be processed by a computer
p. Computer systems that simulate human
intelligence processes such as learning, reasoning,
and self-improvement
q. Procedures and routines that carry out specific activities, achieve objectives, or solve problems
r. Facts collected, recorded, stored, and processed
by an information system
s. Activities associated with using labor, raw materials, and equipment to produce finished goods
t. Organized and processed data that provide meaning and improve decision making
u. Display of data points and performance indicators
in easily understood charts, tables, or gauges
v. Activities associated with hiring, compensating,
promoting, and terminating employees
w. Major give-get exchanges that occur frequently in
most companies
x. Information-processing operations involved in
preparing reports for internal and external parties
y. Individual digital records linked using cryptography in a single list called a chain
z. A subsystem achieves its goals while contributing
to the overall goal
1.8.
Classify each of the following items as belonging in the revenue, expenditure, human
resources/payroll, production, or financing cycle.
a. Pay pay-as-you-earn (PAYE) payroll taxes
b. Send material requisition to inventory
c. Issue stock to investors
d. Borrow money from the bank to purchase a new factory
e. Complete receiving report
f. Appoint replacement purchasing clerk
g. Measure employee performance using a performance management system
h. Choose suitable supplier of raw materials
i. Ensure employees are up to date with the latest tax provision
j. Record personal and tax information for new employees
k. Determine labor needs for the next production run
l. Create purchase requisition
m. Transfer employee contribution to medical aid
n. Update work-in-progress file to accumulate cost data
o. Process sales returns
p. Prepare a bill of materials
53
54
PART I
ConCEPTuAl FounDATIonS oF ACCounTIng InFoRmATIon SySTEmS
q. Extract sold goods from the warehouse
r. Approve payment after receiving all inventory on receiving report
s. Manage dividend payments
t. Confirm hours worked on automated timekeeping system
u. Send unsettled customer accounts to collection agency
v. Pay interest on loan required to buy new factory
w. Prepare a purchase order
AIS in Action Solutions
QUIZ KEY
1. Data differ from information in which way?
a. Data are output, and information is input. [Incorrect. Data are facts and figures that,
once organized, can become information. Therefore, data are inputs, and information
is output.]
▶ b. Information is output, and data are input. [Correct.]
c. Data are meaningful bits of information. [Incorrect. Information is organized and processed data that provide meaning.]
d. There is no difference. [Incorrect. There is a difference. Data are unorganized facts and
figures. Information is meaningful, organized, and processed data.]
2. The business process that includes goods storage, receiving vendor invoices, and updating
payable accounts is called
a. the expenditure cycle. [Incorrect. The expenditure cycle involves interactions between
an organization and its suppliers.]
▶ b. the revenue cycle. [Correct. The revenue cycle involves interactions between an organization and its customers, such as shipping them goods.]
c. the production or conversion cycle. [Incorrect. The production cycle involves the transformation of raw materials into finished goods.]
d. the financing cycle. [Incorrect. The financing cycle deals with interactions between an
organization and its lenders and owners.]
3. Which of the following is a primary activity in the value chain?
a. purchasing [Incorrect. This is a support activity.]
b. accounting [Incorrect. This is a firm infrastructure support activity.]
▶ c. post-sales service [Correct. Service is a primary activity.]
d. human resource management [Incorrect. This is a support activity.]
4. Which transaction cycle includes interactions between an organization and its suppliers?
a. revenue cycle [Incorrect. The revenue cycle involves interactions between an organization and its customers.]
▶ b. expenditure [Correct.]
c. human resources/payroll cycle [Incorrect. The human resources/payroll cycle involves
interactions between an organization and its employees, government, and potential
hires.]
d. general ledger and reporting system [Incorrect. The general ledger and reporting system receives summary information from all cycles.]
5. Which of the following is NOT a means by which information improves decision making?
▶ a. increases information overload [Correct. Decision makers receiving too much information have difficulty incorporating all of the information into their decision framework, and, as a result, decision quality can be reduced rather than improved.]
b. reduces uncertainty [Incorrect. More reliable information leads to less uncertainty and
thus better decisions.]
c. provides feedback about the effectiveness of prior decisions [Incorrect. Knowledge of
effective and ineffective decisions can lead to better decisions in the future.]
CHAPTER 1
ACCounTIng InFoRmATIon SySTEmS: An ovERvIEW
d. identifies situations requiring management action [Incorrect. Identifying the need for
management action can lead to improved decision making.]
6. In the value chain concept, upgrading IT is considered what kind of activity?
a. primary activity [Incorrect. Investing in IT is a support activity.]
▶ b. support activity [Correct. Technology activities, including investing in IT, are considered a support activity.]
c. service activity [Incorrect. The value chain includes only primary and support activities. A service activity is a type of primary activity.]
d. structured activity [Incorrect. The value chain includes only primary and support activities. A structured activity is neither a primary nor a secondary activity.]
7. When a subsystem’s goals are inconsistent with the goals of another subsystem, or with
the system as a whole, it is called
▶ a. goal conflict. [Correct. When a subsystem’s goals are inconsistent with the goals of
another subsystem or the system as a whole.]
b. goal congruence. [Incorrect. When a subsystem achieves its goals while contributing
to the organization’s overall goal.]
c. neither of these. [Incorrect.]
8. Which of the following is a function of an AIS?
a. reducing the need to identify a strategy and strategic position [Incorrect. An AIS does
not reduce the need to identify a strategy. It provides information to executives for the
purpose of making strategic decisions.]
▶ b. transforming data into useful information [Correct. This is one of the primary functions of an AIS.]
c. allocating organizational resources [Incorrect. Decision makers allocate resources, and
the purpose of the AIS is to provide information to the decision makers so that they can
make the allocation.]
d. automating all decision making [Incorrect. The AIS provides information to decision
makers; it is not designed to automate all decision making.]
9. A firm, its suppliers, and its customers collectively form which of the following?
▶ a. supply chain [Correct. The supply chain is made up of the firm, its suppliers, and
customers.]
b. value chain [Incorrect. The value chain is made up of primary and support activities
within the firm.]
c. ERP system [Incorrect. An ERP system integrates all aspects of an organization’s activities into one system.]
d. AIS [Incorrect. The AIS is made up of the human and capital resources within an organization that are responsible for collecting and processing transactions and preparing
financial information.]
10. A performance report about all approved vendors during the previous 12 months is information MOST needed in which business process?
a. paying vendors [Incorrect. To pay a vendor, a company needs to know whether merchandise ordered was received in good condition. They do not need a 12-month history
of vendor performance.]
▶ b. acquiring inventory [Correct. Companies want to acquire inventory from companies
that have performed well in the past. A vendor performance report would disclose
whether the vendor shipped inventory on time, whether the inventory was of the requested quality, whether the prices were as agreed upon, etc.]
c. selling merchandise [Incorrect. A 12-month history of vendor performance is usually
not very helpful in trying to sell products to customers. More important would be customer tastes and preferences, customer credit status, etc.]
d. paying employees [Incorrect. It is very rare for an employee’s pay to be based on a
12-month history of vendor performance. More important are hours worked, annual
salary, sales figures to calculate commissions, etc.]
55
Overview of Transaction
Processing and Enterprise
Resource Planning
Systems
CHAPTER
2
LEARNING OBJECTIVES
After studying this chapter, you should be able to:
1. Describe the data processing cycle used to process transactions, including how data is input, stored, and processed and how information is
output.
2. Discuss how organizations use enterprise resource planning (ERP) systems
to process transactions and provide information.
I N TEGRATIV E C ASE
S&S
The grand opening of S&S is two weeks away. Scott Parry and Susan Gonzalez are working
long hours to make the final arrangements for the store opening. Most of the employees
have already been hired; training is scheduled for next week.
Susan has ordered inventory for the first month. The store is being remodeled and
will have a bright, cheery decor. All seems to be in order—all, that is, except the accounting
records.
Like many entrepreneurs, Scott and Susan have not given as much thought to their
accounting records as they have to other parts of their business. Recognizing they need
qualified accounting help, they hired a full-time accountant, Ashton Fleming. Scott and
Susan think Ashton is perfect for the job because of his three years of experience with
a national CPA (Certified Public Accountants) firm. Ashton is looking forward to working
for S&S because he has always wanted to be involved in building a company from the
ground up.
During Ashton’s first day on the job, Susan gives him the invoices for the inventory she
purchased and a folder with their bank loan documentation, with the first payment due after
the grand opening. She also hands him a folder containing information on rental payments,
utilities, and other expenses. Susan tells Ashton that she and Scott know little about accounting and he will run the accounting end of S&S. She adds that the only thing they have
done so far is to open a checking account for S&S and that they have kept the check register
updated to monitor their cash flow.
56
Designdepot_ltd/Shutterstock
Scott explains that the sales staff is paid a fixed salary and commissions and that all
other employees are paid hourly rates. Employees are paid every two weeks, with their first
paychecks due next week. Ashton asks Scott what accounting software the company is using. Scott replies that he and Susan have not had time to tackle that aspect yet. Scott and
Susan looked at some of the popular packages but quickly realized that they did not know
enough about accounting to make an intelligent choice. Scott then tells Ashton that his first
task should be to purchase whatever accounting software he thinks will be best for S&S.
After Scott leaves, Ashton feels both excited and a little nervous about his responsibility
for creating an accounting information system (AIS) for S&S. Although Ashton has audited
many companies, he has never organized a company’s books and is unsure how to go about
it. A million questions run through his head. Here are just a few of them:
1. How should I organize the accounting records so that financial statements can be
easily produced?
2. How am I going to collect and process data about all of S&S’s transactions?
3. How do I organize all the data that will be collected?
4. How should I design the AIS so that the information provided is reliable and
accurate?
5. How can I design procedures to ensure that they meet all government obligations,
such as remitting sales, income, and payroll taxes?
Introduction
This chapter is divided into two major sections. The first section discusses the data processing cycle and its role in organizing business activities and providing information to users. It
explains how organizations capture and enter data about business activities into their accounting information system (AIS) and how companies process data and transform it into useful
information. It also discusses basic data storage concepts, showing how data are stored for
further use. Finally, information output is discussed, including the different ways information
is provided to users.
The second section discusses the role of the information system in modern organizations
and introduces the concept of an enterprise resource planning (ERP) system. An ERP can
help integrate all aspects of a company’s operations with its traditional AIS. This section also
describes the significant advantages of an ERP as well as significant challenges that must be
overcome to implement an ERP system.
57
58
PART I
CONCEPTUAL FOUNDATIONS OF ACCOUNTING INFORMATION SYSTEMS
Transaction Processing: The Data Processing Cycle
data processing cycle - The four
operations (data input, data
storage, data processing, and
information output) performed
on data to generate meaningful
and relevant information.
Accountants and other system users play a significant role in the data processing cycle. For
example, they interact with systems analysts to help answer questions such as these: What
data should be entered and stored by the organization, and who should have access to them?
How should data be organized, updated, stored, accessed, and retrieved? How can scheduled
and unanticipated information needs be met? To answer these and related questions, the data
processing concepts explained in this chapter must be understood.
One important AIS function is to process company transactions efficiently and effectively.
In manual (non-computer-based) systems, data are entered into journals and ledgers maintained on paper. In computer-based systems, data are entered into computers and stored in files
and databases. The operations performed on data to generate meaningful and relevant information are referred to collectively as the data processing cycle. As shown in Figure 2-1, this process consists of four steps: data input, data storage, data processing, and information output.
DATA INPUT
The first step in processing input is to capture transaction data and enter them into the system.
The data capture process is usually triggered by a business activity. Data must be collected
about three facets of each business activity:
1. Each activity of interest
2. The resource(s) affected by each activity
3. The people who participate in each activity
For example, the most frequent revenue cycle transaction is a sale, either for cash or on
credit. S&S may find it useful to collect the following data about a sales transaction:
●●
●●
●●
●●
●●
●●
●●
●●
source documents - Documents
used to capture transaction
data at its source – when the
transaction takes place. Examples include sales orders,
purchase orders, and employee
time cards.
turnaround documents - Records
of company data sent to an external party and then returned to
the system as input. Turnaround
documents are in machinereadable form to facilitate their
subsequent processing as input
records. An example is a
utility bill.
●●
Date and time the sale occurred.
Employee who made the sale and the checkout clerk who processed the sale.
Checkout register where the sale was processed.
Item(s) sold.
Quantity of each item sold.
List price and actual price of each item sold.
Total amount of the sale.
Delivery instructions.
For credit sales: customer name, customer bill-to and ship-to addresses.
Historically, most businesses used paper source documents to collect data about their
business activities. They later transferred that data into the computer. When data are entered
using computer screens, they often retain the same name and basic format as the paper source
document. Table 2-1 lists some common transaction cycle activities and the source document
or form used to capture data about that event. Examples of many of these documents can be
found in Chapters 14 through 18. For example, a purchase order, used to request merchandise
from suppliers, is shown in Chapter 15.
Turnaround documents are company output sent to an external party, who often adds
data to the document, and then are returned to the company as an input document. They are in
machine-readable form to facilitate their subsequent processing as input records. An example
is a utility bill sent to the customer, returned with the customer’s payment, and read by a special scanning device when it is returned.
FIGURE 2-1
Data Storage
The Data Processing
Cycle
Data Input
Data
Processing
Information
Output
CHAPTER 2
TABLE 2-1
OVERVIEW OF TRANSACTION PROCESSING AND ERP SYSTEMS
59
Common Business Activities and Source Documents
Business Activity
Revenue Cycle
Take customer order
Deliver or ship order
Receive cash
Deposit cash receipts
Adjust customer account
Expenditure Cycle
Request items
Order items
Receive items
Pay for items
Human Resources Cycle
Collect employee withholding data
Record time worked by employees
Record time spent on specific jobs
Source Document
Sales order
Delivery ticket or bill of lading
Remittance advice or remittance list
Deposit slip
Credit memo
Purchase requisition
Purchase order
Receiving report
Check or electronic funds transfer
W-4 form
Time cards
Job time tickets or time sheet
Source data automation devices capture transaction data in machine-readable form at
the time and place of their origin. Examples include ATMs used by banks, point-of-sale (POS)
scanners used in retail stores, and bar code scanners used in warehouses. Another good example of source data automation is the use of XBRL. Before XBRL, financial reports were
submitted electronically to the SEC and others who wanted to use the information had to enter
it into their system. With XBRL, financial data is encoded to make it machine readable, allowing other computers to use and analyze the information. This saves time, reduces errors,
and makes much more information available for analytics. XBRL is discussed in more depth
in Chapter 18.
The second step in processing input is to make sure captured data are accurate and complete. One way to do this is to use source data automation or well-designed turnaround documents and data entry screens. Well-designed documents and screens improve accuracy and
completeness by providing instructions or prompts about what data to collect, grouping logically related pieces of information close together, using checkoff boxes or pull-down menus
to present the available options, and using appropriate shading and borders to clearly separate
data items. Data input screens usually list all the data the user needs to enter. Sometimes these
screens resemble source documents, and users fill out the screen the same way they would a
paper source document.
Users can improve control either by using prenumbered source documents or by having the
system automatically assign a sequential number to each new transaction. Prenumbering simplifies verifying that all transactions have been recorded and that none of the documents have
been misplaced. (Imagine trying to balance a checkbook if the checks were not prenumbered.)
The third step in processing input is to make sure company policies are followed, such as
approving or verifying a transaction. For example, S&S would not want to sell goods to a customer who was not paying his bills or to sell an item for immediate delivery that was out of
stock. These problems are prevented by programming the system to check a customer’s credit
limit and payment history, as well as inventory status, before confirming a customer sale.
DATA STORAGE
A company’s data are one of its most important resources. However, the mere existence of relevant data does not guarantee that they are useful. To function properly, an organization must
have ready and easy access to its data. Therefore, accountants need to understand how data are
organized and stored in an AIS and how they can be accessed. In essence, they need to know
how to manage data for maximum corporate use.
Imagine how difficult it would be to read a textbook if it were not organized into chapters,
sections, paragraphs, and sentences. Now imagine how hard it would be for S&S to find an
invoice if all documents were randomly dumped into file cabinets. Fortunately, information
source data automation - The
collection of transaction data in
machine-readable form at the
time and place of origin. Examples are point-of-sale terminals
and ATMs.
60
PART I
CONCEPTUAL FOUNDATIONS OF ACCOUNTING INFORMATION SYSTEMS
general ledger - A ledger that
contains summary-level data
for every asset, liability, equity,
revenue, and expense account
of the organization.
subsidiary ledger - A ledger
used to record detailed data for
a general ledger account with
many individual subaccounts,
such as accounts receivable, inventory, and accounts payable.
control account - A title given
to a general ledger account that
summarizes the total amounts
recorded in a subsidiary ledger.
For example, the accounts
receivable control account in
the general ledger represents
the total amount owed by
all customers. The balances
in the accounts receivable
subsidiary ledger indicate the
amount owed by each specific
customer.
in an AIS is organized for easy and efficient access. This section explains basic data storage
concepts and definitions.
LEDGERS Cumulative accounting information is stored in general and subsidiary ledgers. A general ledger contains summary-level data for every asset, liability, equity, revenue, and expense
account. A subsidiary ledger contains detailed data for any general ledger account with many
individual subaccounts. For example, the general ledger has an accounts receivable account that
summarizes the total amount owed to the company by all customers. The subsidiary accounts
receivable ledger has a separate record for each individual customer, with detailed information
such as name, address, purchases, payments, account balance, and credit limit. Subsidiary ledgers are often used for accounts receivable, inventory, fixed assets, and accounts payable.
The general ledger account corresponding to a subsidiary ledger is called a control account.
The relationship between the general ledger control account and the total of individual subsidiary ledger account balances helps maintain the accuracy of AIS data. Specifically, the sum of all
subsidiary ledger account balances should equal the amount in the corresponding general ledger
control account. Any discrepancy between them indicates that a recording error has occurred.
CODING TECHNIQUES Data in ledgers is organized logically using coding techniques. Coding is the systematic assignment of numbers or letters to items to classify and organize them.
●●
coding - The systematic assignment of numbers or letters to
items to classify and organize
them.
●●
sequence codes - Items are
numbered consecutively so that
gaps in the sequence code indicate missing items that should
be investigated. Examples
include prenumbered checks,
invoices, and purchase orders.
block code - Blocks of numbers
reserved for specific categories
of data, thereby helping to organize the data. An example is
a chart of accounts.
group codes - Two or more subgroups of digits used to code
an item. A group code is often
used in conjunction with a block
code.
Product Code
1000000–1999999
2000000–2999999
3000000–3999999
4000000–4999999
●
●●
●
mnemonic codes - Letters and
numbers interspersed to
identify an item. The mnemonic
code is derived from the
description of the item and is
usually easy to memorize.
With sequence codes, items are numbered consecutively to account for all items. Any
missing items cause a gap in the numerical sequence. Examples include prenumbered
checks, invoices, and purchase orders.
With a block code, blocks of numbers are reserved for specific categories of data. For
example, S&S reserved the following numbers for major product categories:
●●
Product Type
Electric range
Refrigerator
Washer
Dryer
Users can identify an item’s type and model using the code numbers. Other examples include ledger account numbers (blocked by account type), employee numbers (blocked by
department), and customer numbers (blocked by region).
Group codes, which are two or more subgroups of digits used to code items, are often
used in conjunction with block codes. If S&S uses a seven-digit product code number,
the group coding technique might be applied as follows.
Digit Position
Meaning
1–2
3
4–5
6–7
Product line, size, style
Color
Year of manufacture
Optional features
There are four subcodes in the product code, each with a different meaning. Users can
sort, summarize, and retrieve information using one or more subcodes. This technique is
often applied to general ledger account numbers.
With mnemonic codes, letters and numbers are interspersed to identify an item. The
mnemonic code is derived from the description of the item and is usually easy to memorize. For example, Dry300W05 could represent a low end (300), white (W) dryer (Dry)
made by Sears (05).
The following guidelines result in a better coding system. The code should:
●●
●●
Be consistent with its intended use, which requires that the code designer determine desired system outputs prior to selecting the code.
Allow for growth. For example, don’t use a three-digit employee code for a fast-growing
company with 950 employees.
CHAPTER 2
●●
●●
OVERVIEW OF TRANSACTION PROCESSING AND ERP SYSTEMS
61
Be as simple as possible to minimize costs, facilitate memorization and interpretation,
and ensure employee acceptance.
Be consistent with the company’s organizational structure and across the company’s
divisions.
CHART OF ACCOUNTS A great example of coding is the chart of accounts, which is a list of
the numbers assigned to each general ledger account. These account numbers allow transaction data to be coded, classified, and entered into the proper accounts. They also facilitate the
preparation of financial statements and reports because data stored in individual accounts can
easily be summed for presentation.
However, data stored in summary accounts cannot be easily analyzed and reported in
more detail. Consequently, it is important that the chart of accounts contain sufficient detail
to meet an organization’s information needs. To illustrate, consider the consequences if S&S
were to use only one general ledger account for all sales transactions. It would be easy to produce reports showing the total amount of sales for a given time period, but it would be very
difficult to prepare reports separating cash and credit sales. Indeed, the only way to produce
these latter reports would be to go back to original sales records to identify the nature of each
sales transaction. If S&S used separate general ledger accounts for cash and credit sales, then
reports showing both types of sales could be easily produced. Total sales could also be easily
reported by summing each type of sale.
Table 2-2 shows the chart of accounts Ashton developed for S&S. Each account number
is three digits long. The first digit represents the major account category and indicates where
TABLE 2-2
Sample Chart of Accounts for S&S
Account
Code
Account Name
100–199
101
102
103
120
125
130
150
160
170
180
chart of accounts - A listing of
all the numbers assigned to balance sheet and income statement accounts. The account
numbers allow transaction
data to be coded, classified,
and entered into the proper
accounts. They also facilitate
financial statement and report
preparation.
Account
Code
Account Name
Current Assets
Checking Account
Savings Account
Petty Cash
Accounts Receivable
Allowance for Doubtful Accounts
Notes Receivable
Inventory
Supplies
Prepaid Rent
Prepaid Insurance
400–499
400
410
Equity Accounts
Common Stock
Retained Earnings
500–599
501
502
510
511
520
530
Revenues
Cash Sales
Credit Sales
Sales Returns & Allowances
Sales Discounts
Interest Revenue
Miscellaneous Revenue
200–299
200
210
215
230
235
240
245
250
Noncurrent Assets
Land
Buildings
Accumulated Depreciation—Buildings
Equipment
Accumulated Depreciation—Equipment
Furniture & Fixtures
Accumulated Depreciation—Furniture & Fixtures
Other Assets
300–399
300
310
321
322
323
324
330
360
Liabilities
Accounts Payable
Wages Payable
Employee Income Tax Payable
FICA Tax Payable
Federal Unemployment Tax Payable
State Unemployment Tax Payable
Accrued Interest Payable
Other Liabilities
600–799
600
611
612
613
620
630
640
650
701
702
703
710
Expenses
Cost of Goods Sold
Wages Expense
Commissions Expense
Payroll Tax Expense
Rent Expense
Insurance Expense
Supplies Expense
Bad Debt Expense
Depreciation Expense—Buildings
Depreciation Expense—Equipment
Depreciation Expense—Furniture & Fixtures
Income Tax Expense
900–999
910
Summary Accounts
Income Summary
62
PART I
CONCEPTUAL FOUNDATIONS OF ACCOUNTING INFORMATION SYSTEMS
it appears on S&S’s financial statements. Thus, all current assets are numbered in the 100s,
noncurrent assets are numbered in the 200s, and so on.
The second digit represents the primary financial subaccounts within each category.
Again, the accounts are assigned numbers to match the order of their appearance in financial
statements (in order of decreasing liquidity). Thus, account 120 represents accounts receivable, and account 150 represents inventory.
The third digit identifies the specific account to which the transaction data will be posted.
For example, account 501 represents cash sales, and account 502 represents credit sales. Similarly, accounts 101 through 103 represent the various cash accounts used by S&S.
A chart of accounts is tailored to the nature and purpose of an organization. For example,
the chart of accounts for S&S indicates that the company is a corporation. In contrast, a partnership would include separate capital and drawing accounts for each partner, instead of common stock and retained earnings. Likewise, because S&S is a retail organization, it has only
one type of general ledger inventory account. A manufacturing company, in contrast, would
have separate general ledger accounts for raw materials, work in process, and finished goods
inventories.
Ashton left gaps in S&S’s chart of accounts to allow for additional accounts. For example, when S&S has excess cash to invest in marketable securities, a new general ledger
account can be created and assigned the number 110. When S&S opens stores in the future, he
will add three digits to the chart of accounts to represent each store in the chain, so that S&S
can track items in each store.
Subsidiary ledger accounts often have longer account codes than general ledger accounts.
At S&S, each account receivable will have a seven-digit code. The first three digits are 120, the
code for accounts receivable. The next four digits identify up to 10,000 individual customers.
general journal - A journal used
to record infrequent or nonroutine transactions, such as loan
payments and end-of-period
adjusting and closing entries.
specialized journal - A journal
used to record a large number of repetitive transactions
such as credit sales, cash
receipts, purchases, and cash
disbursements.
TABLE 2-3
JOURNALS Transaction data are often recorded in a journal before they are entered into a
ledger. A journal entry shows the accounts and amounts to be debited and credited. A general
journal is used to record infrequent or nonroutine transactions, such as loan payments and
end-of-period adjusting and closing entries. A specialized journal records large numbers of
repetitive transactions such as sales, cash receipts, and cash disbursements.
Table 2-3 is a sample sales journal. All transaction information is recorded in one line,
with every entry a debit to accounts receivable and a credit to sales. There is no need to write
an explanation of each entry, as is the case with general journal entries. Given the high number of daily sales transactions, the time saved by recording these transactions in a sales journal, rather than in the general journal, is considerable.
The Post Ref column indicates when transactions are posted to the appropriate ledger. In
a manual system, ledgers are books; hence, the phrase “keeping the books” refers to the process of maintaining the ledgers.
Figure 2-2 shows how to journalize and post sales transactions. First, each credit sale
is recorded in the sales journal. Then each sales journal entry is posted to the appropriate
customer account in the accounts receivable subsidiary ledger (note the arrow linking the
$1,876.50 sale to KDR Builders in the sales journal to the debit for $1,876.50 in the accounts
Sample Sales Journal
Sales Journal
Date
Oct. 15
15
15
15
15
15
Invoice Number
151
152
153
154
155
156
Account Debited
Brown Hospital Supply
Greenshadows Hotel Suites
Heathrow Apartments
LMS Construction
Gardenview Apartments
KDR Builders
TOTAL
Page 5
Account Number
120–035
120–122
120–057
120–173
120–084
120–135
120/502
Post Ref
✓
✓
✓
✓
✓
✓
Amount
798.00
1,267.00
5,967.00
2,312.50
3,290.00
1,876.50
15,511.00
CHAPTER 2
OVERVIEW OF TRANSACTION PROCESSING AND ERP SYSTEMS
FIGURE 2-2
Sales Journal (SJ)
Page 5
SALES JOURNAL
Invoice Account
Date Number Debited
151
152
153
154
155
156
Oct. 15
15
15
15
15
15
63
Brown Hospital Supply
Greenshadows Hotel Suites
Heathrow Apartments
LMS Construction
Gardenview Apartments
KDR Builders
TOTAL
Recording and Posting a
Credit Sale
Pg. 5
Account
Number
Post
Ref
120–035
120–122
120–057
120–173
120–084
120–135
120/502
✔
✔
✔
✔
✔
✔
Amount
798.00
1,267.00
5,967.00
2,312.50
3,290.00
1,876.50
15,511.00
GENERAL LEDGER
Account: Accounts Receivable Account Number: 120
Debit
Date Description Post Ref
Oct. 14
14 Sales
12,432.00
SJ4
14 Collections
CR6
15 Sales
15,511.00
SJ5
Credit
22,162.00
Balance
67,285.00
79,717.00
57,555.00
73,066.00
15,511.00
Total Sales
Oct. 15
GENERAL LEDGER
Account: Credit Sales Account Number: 502
Date
Oct. 14
14
15
Description
Post Ref
Sales
Sales
Debit
SJ4
SJ5
Credit
12,432.00
15,511.00
Balance
267,762.00
280,194.00
295,705.00
ACCOUNTS RECEIVABLE SUBSIDIARY LEDGER
Name: KDR Builders
Account Number: 120–135
Date
1,876.50
Amount of
INDIVIDUAL SALE
Description
Sept. 12 Sales
Oct. 1
Payment
Oct. 15 Sales
Address: 6867 Stornaway
Memphis, TN 38119-1234
Post Ref
Debit
SJ1
CR4
SJ5
3,682.00
1,876.50
Credit
Balance
3,682.00
3,682.00
0.00
1,876.50
receivable subsidiary ledger). Periodically, the total of all sales journal entries is posted to the
general ledger (note the arrow showing the daily sales journal total of $15,511.00 posted to
both the Accounts Receivable and the Credit Sales general ledger accounts).
AUDIT TRAIL Figure 2-2 shows how the posting references and document numbers provide
an audit trail. An audit trail is a traceable path of a transaction through a data processing
system from point of origin to final output, or backward from final output to point of origin.
It is used to check the accuracy and validity of ledger postings. Observe that the SJ5 posting
reference for the $15,511 credit to the sales account in the general ledger refers to page 5 of
the sales journal. By checking page 5 of the sales journal, it is possible to verify that $15,511
represents the total credit sales recorded on October 15. Similarly, the posting reference for
the $1,876.50 debit to the KDR Builders’ account in the subsidiary accounts receivable ledger
also refers to page 5 of the sales journal as the source of that entry. Furthermore, note that the
sales journal lists the invoice numbers for each individual entry. This provides the means for
audit trail - A path that allows
a transaction to be traced
through a data processing system from point of origin to output or backwards from output
to point of origin. It is used to
check the accuracy and validity of ledger postings and to
trace changes in general ledger
accounts from their beginning
balance to their ending balance.
64
PART I
CONCEPTUAL FOUNDATIONS OF ACCOUNTING INFORMATION SYSTEMS
FIGURE 2-3
Attributes
Data Storage Elements
Customer
Number
Three Entities
Three Records
entity - The item about which
information is stored in a record. Examples include an employee, an inventory item, and
a customer.
attributes - The properties,
identifying numbers, and characteristics of interest of an entity
stored in a database. Examples
are employee number, pay rate,
name, and address.
field - The portion of a data
record where the data value for
a particular attribute is stored.
For example, in a spreadsheet,
each row might represent a
customer and each column an
attribute of the customer. Each
cell in a spreadsheet is a field.
record - A set of fields whose
data values describe specific attributes of an entity, such as all
payroll data relating to a single
employee. An example is a row
in a spreadsheet.
data value - The actual value
stored in a field. It describes a particular attribute of an entity. For
example, the customer name field
would contain “ZYX Company” if
that company were a customer.
file - A set of logically related
records, such as the payroll
records of all employees.
master file - A permanent file of
records that stores cumulative
data about an organization. As
transactions take place, individual
records within a master file are
updated to keep them current.
transaction file - A file that
contains the individual business
transactions that occur during a
specific fiscal period. A transaction file is conceptually similar
to a journal in a manual AIS.
database - A set of interrelated,
centrally controlled data files
stored with as little data redundancy as possible. A database
consolidates records previously
stored in separate files into a
common pool and serves a variety of users and data processing applications.
Customer
Name
Address
Credit
Limit
Balance
19283
XYZ Company
P.O. Box 7
30,000
24,750
35794
ABC Company
233 Lotus Ave.
45,000
12,000
56987
QRS Company
356 Book Road
25,000
24,900
Data
Values
Individual Fields
This accounts receivable file stores information about three separate entities: XYZ Company,
ABC Company, and QRS Company. As a result, there are three records in the file. Five separate attributes are used to describe each customer: customer number, customer name, address, credit limit,
and balance. There are, therefore, five separate fields in each record. Each field contains a data
value that describes an attribute of a particular entity (customer). For example, the data value
19283 is the customer number for the XYZ Company.
locating and examining the appropriate source documents in order to verify that the transaction occurred and it was recorded accurately.
COMPUTER-BASED STORAGE CONCEPTS An entity is something about which information
is stored, such as employees, inventory items, and customers. Each entity has attributes, or
characteristics of interest, that are stored, such as a pay rate and address. Each type of entity
possesses the same set of attributes. For example, all employees possess an employee number,
pay rate, and home address. The specific values for those attributes will differ. For example,
one employee’s pay rate might be $12.00 an hour, whereas another’s might be $12.25.
Figure 2-3 shows that computers store data in a field. The fields containing data about
entity attributes constitute a record. In Figure 2-3, each row represents a different record, and
each column represents an attribute. Each intersecting row and column in Figure 2-3 is a field
within a record, the contents of which are called a data value.
A file is a group of related records. A master file, like a ledger in a manual AIS, stores
cumulative information about an organization. The inventory and equipment master files store
information about important organizational resources. The customer, supplier, and employee
master files store information about important agents with whom the organization interacts.
Master files are permanent; they exist across fiscal periods. However, individual master
file records may change frequently. For example, individual customer accounts balances are
updated to reflect new sales transactions and payments received. Periodically, new records
are added to or removed from a master file, for example, when a new customer is added or a
former customer deleted.
A transaction file contains records of individual business transactions that occur during
a specific time. It is similar to a journal in a manual AIS. For example, S&S will have a daily
sales transaction file and a cash receipts file. Both files will update individual customer account balances in the customer master file. Transaction files are not permanent and may not be
needed beyond the current fiscal period. However, they are usually maintained for a specified
period for backup purposes.
A set of interrelated, centrally coordinated files is referred to as a database. For example,
the accounts receivable file might be combined with customer, sales analysis, and related files
to form a customer database. Chapter 4 discusses database technology.
CHAPTER 2
OVERVIEW OF TRANSACTION PROCESSING AND ERP SYSTEMS
65
DATA PROCESSING
Once business activity data have been entered into the system, they must be processed to
keep the databases current. The four different types of data processing activities, referred to as
CRUD, are as follows:
1. Creating new data records, such as adding a newly hired employee to the payroll database.
2. Reading, retrieving, or viewing existing data.
3. Updating previously stored data. Figure 2-4 depicts the steps required to update an accounts receivable record with a sales transaction. The two records are matched using the
account number. The sale amount ($360) is added to the account balance ($1,500) to get a
new current balance ($1,860).
4. Deleting data, such as purging the vendor master file of all vendors the company no longer does business with.
Updating done periodically, such as daily, is referred to as batch processing. Although batch
processing is cheaper and more efficient, the data are current and accurate only immediately
after processing. For that reason, batch processing is used only for applications, such as payroll, that do not need frequent updating and that naturally occur or are processed at fixed time
periods.
Most companies update each transaction as it occurs, referred to as real-time processing
because it ensures that stored information is always current, thereby increasing its decisionmaking usefulness. It is also more accurate because data input errors can be corrected in real
time or refused. It also provides significant competitive advantages. For example, FedEx updated its mission statement to include the phrase “Positive control of each package will be
maintained by utilizing real-time electronic tracking and tracing systems.” With FedEx’s system, employees and customers can track the exact location of each package and estimate its
arrival time.
A combination of the two approaches is online batch processing, where transaction data are
entered and edited as they occur and stored for later processing. Batch processing and real-time
processing are summarized in Figure 2-5.
batch processing - Accumulating transaction records into
groups or batches for processing at a regular interval such
as daily or weekly. The records
are usually sorted into some
sequence (such as numerically or alphabetically) before
processing.
real-time processing - The computer system processes data
immediately after capture and
provides updated information
to users on a timely basis.
INFORMATION OUTPUT
The final step in the data processing cycle is information output. When displayed on a monitor, output is referred to as “soft copy.” When printed on paper, it is referred to as “hard
copy.” Information is usually presented in one of three forms: a document, a report, or a query
response.
Documents are records of transaction or other company data. Some, such as checks and
invoices, are transmitted to external parties. Others, such as receiving reports and purchase
TRANSACTION DATA
Account
Number
0123
MASTER FILE RECORD
Account
Number
0123
Credit
Limit
Previous
Balance
Current
Balance
$2,000.00 $1,000.00 $1,500.00
FIGURE 2-4
Transaction Transaction Document Transaction
Type
Amount
Date
Number
Sale
09/19/13
9876
$360.00
File update process
• Verify data accuracy
• Match primary key (account number)
• Add transaction amount to current balance
• Compare new balance to credit limit
• Repeat for all transactions
• Print summary reports
UPDATED MASTER FILE RECORD
Account
Number
0123
Credit
Limit
Previous
Balance
documents - Records of transaction or other company data. Examples include checks, invoices,
receiving reports, and purchase
requisitions.
Current
Balance
$2,000.00 $1,500.00 $1,860.00
The Accounts
Receivable File Update
Process
66
PART I
CONCEPTUAL FOUNDATIONS OF ACCOUNTING INFORMATION SYSTEMS
FIGURE 2-5
Batch Processing
Master
File
Batch and Real-time
Processing
Group source
documents
into batches.
Generate
control totals.
Enter batches at
predetermined
times or batch
sizes. Sort file
and edit data
as appropriate.
Store data
in temporary
file.
Online Batch Processing
Enter
transactions
into system
as they occur.
Enter
transactions
into system
as they occur.
reports - System output organized in a meaningful fashion
used by employees to control
operational activities, by managers to make decisions and
design strategies, and by investors and creditors to understand
a company’s business activities.
Print or electronically
display desired output.
Also print or display
error reports,
transaction reports,
control total reports.
Master
File
Store data
in temporary
file.
Real-time
Processing
Process all
batches. Update
old master files
with transaction
data, creating
new master file.
Process
temporary file at
predetermined
time. Update
old master files
with transaction
data, creating
new master file.
Print or electronically
display desired output.
Master
File
Process
transactions as
they occur. Update
master file with
transaction data.
Print or electronically
display desired output.
requisitions, are used internally. Documents can be printed out, or they can be stored as
electronic images in a computer. For example, Toys ‘R’ Us uses electronic data interchange
to communicate with its suppliers. Every year it processes over half a million invoices
electronically, thereby eliminating paper documents and dramatically reducing costs and
errors. This has resulted in higher profits and more accurate information.
Reports are used by employees to control operational activities and by managers to make
decisions and to formulate business strategies. External users need reports to evaluate company profitability, judge creditworthiness, or comply with regulatory requirements. Some
CHAPTER 2
OVERVIEW OF TRANSACTION PROCESSING AND ERP SYSTEMS
reports, such as financial statements and sales analyses, are produced on a regular basis. Others are produced on an exception basis to call attention to unusual conditions. For example,
S&S could have its system produce a report to indicate when product returns exceed a certain
percentage of sales. Reports can also be produced on demand. For example, Susan could produce a report to identify the salesperson who sold the most items during a specific promotional period.
The need for reports should be periodically assessed because they are often prepared
long after they are needed, wasting time, money, and resources. For example, NCR Corporation reduced the number of reports from 1,200 to just over 100. Another company eliminated
6 million pages of reports, a stack four times higher than its 41-story headquarters building.
One 25-page report took five days to prepare and sat unread.
A database query is used to provide the information needed to deal with problems and
questions that need rapid action or answers. A user enters a request for a specific piece of
information; it is retrieved, displayed, or analyzed as requested. Repetitive queries are often
developed by information systems specialists. One-time queries are often developed by users. Some companies, such as Walmart, allow suppliers to access their databases to help them
better serve Walmart’s needs. Suppliers can gauge how well a product is selling in every
Walmart store in the world and maximize sales by stocking and promoting items that are
selling well.
Additional information about system output is contained in Chapters 14–18.
Transaction Processing: Blockchain
People have been engaging in business transactions for thousands of years. Originally, people
kept track of, or accounted for, these transactions using a single-entry accounting system. We
eventually graduated to the double entry bookkeeping system with the journals and ledgers
and paper-based financial reports that have been used for hundreds of years. When computers
were invented, we digitized the journals and ledgers and created transaction files and master
files that did the job of paper-based journals and ledgers.
When the number of master files proliferated with its attendant data redundancies and
inaccuracies, we combined multiple files into databases, which have grown larger and more
complex over time. Each company involved in the transaction had its own way of capturing
transaction data and storing transactions, often in centralized databases that provided better
control and security. Customers and vendors must periodically reconcile its records to the
other party in the transaction.
With computers also came a large variety of software programs to capture, store, process,
and report accounting data. But these programs often did not capture non-financial data very
well. Over time, accounting software has improved significantly. We now have intelligent or
automated accounting products that provide automatic transaction recording, on demand accounting functions, and the automatic distribution of data, thereby doing away with many of
the bookkeeping functions of old. These systems, which have machine learning and artificial
intelligence embedded in them, store the data in the cloud. They also use smart portals for
clients to transfer data and information back and forth.
When the parties to a transaction do not trust each other, a third-party steps in to hold the
items of value being exchanged until both parties complete their side of the transaction. For
example, when you buy a house, you use realtors and a title company to make sure a clear title
is passed and to ensure the house conveys to the buyer and the money to pay for the house
conveys to the seller. The titles are then recorded by county governments, creating a public
record of what is owned by whom.
The advent of the Internet has had a tremendous impact on people and businesses. The
Internet has many uses, including the ability to share information with large groups of people. There are many people-to-people interactions such as social media. There are also many
business-to-consumer applications such as online shopping. Business-to-business transactions
are also facilitated by the Internet. Many Internet transactions are processed and stored by
older, traditional legacy systems.
67
query - A request for the
database to provide the
information needed to deal
with a problem or answer a
question. The information is
retrieved, displayed or printed,
and/or analyzed as requested.
68
PART I
CONCEPTUAL FOUNDATIONS OF ACCOUNTING INFORMATION SYSTEMS
smart contract - A regular
contract with the terms and
agreed upon details built into
the blockchain. Rules govern
the blockchain’s interaction with
users. A smart contract can be
automated and executed based
on external triggers.
With the advent of cryptocurrencies, a new technology called blockchain is changing
the way financial transactions as well as many other types of transactions are recorded,
processed, and stored. While the Internet is a network of information, a blockchain is a
network of value and of trust. That is, items of value can be exchanged in a secure and
trusted manner. Blockchain is more than a database; it is a new way to process, store,
share, and search information. Blockchain, and how it works, is discussed in Chapters 1
and 11.
One use that was not profiled in Focus 1-3 is smart contracts. They are discussed briefly
here as they are relevant to transaction processing. A smart contract is a regular contract
with the terms and agreed upon details built into a blockchain. The organizations using the
blockchain can establish the rules that govern the blockchain’s interaction with its users.
Among those rules would be who is authorized to review, mine, analyze, and audit the blockchain transaction details. These interactions can be automated and presented to users in data
dashboards.
An organization can automate the execution of a smart contract based on external triggers. For example, sensors in a warehouse could recognize when ordered goods are delivered
and the system could then trigger the payment of the agreed upon transaction amount. These
transactions could also have the advantages described in Chapter 1 such as transparency,
immutability, security, trust, and the elimination of third-party verification.
Enterprise Resource Planning (ERP) Systems
enterprise resource planning
(ERP) systems - Systems that
integrate all aspects of an organization’s activities—such as
accounting, finance, marketing,
human resources, manufacturing, inventory management—
into one system. An ERP system
is modularized; companies can
purchase the individual modules
that meet their specific needs.
An ERP facilitates information
flow among the company’s
various business functions and
manages communications with
outside stakeholders.
Traditionally, the AIS has been referred to as a transaction processing system because its only
concern was financial data and accounting transactions. For example, when a sale took place,
the AIS would record a journal entry showing only the date of the sale, a debit to either cash
or accounts receivable, and a credit to sales. Other potentially useful nonfinancial information
about the sale, such as the time of day that it occurred, would traditionally be collected and
processed outside the AIS. Consequently, many organizations developed additional information systems to collect, process, store, and report information not contained in the AIS. Unfortunately, the existence of multiple systems creates numerous problems and inefficiencies.
Often the same data must be captured and stored by more than one system, which not only
results in redundancy across systems but also can lead to discrepancies if data are changed
in one system but not in others. In addition, it is difficult to integrate data from the various
systems.
Enterprise resource planning (ERP) systems overcome these problems as they integrate
all aspects of a company’s operations with a traditional AIS. Most large and many mediumsized organizations use ERP systems to coordinate and manage their data, business processes,
and resources. The ERP system collects, processes, and stores data and provides the information managers and external parties need to assess the company.
As shown in Figure 2-6, a properly configured ERP system uses a centralized database
to share information across business processes and coordinate activities. This is important because an activity that is part of one business process often triggers a complex series of activities throughout many different parts of the organization. For example, a customer order may
necessitate scheduling additional production to meet the increased demand. This may trigger
an order to purchase more raw materials. It may also be necessary to schedule overtime or
hire temporary help. Well-designed ERP systems provide management with easy access to
up-to-date information about all of these activities in order to plan, control, and evaluate the
organization’s business processes more effectively.
ERP systems are modular, with each module using best business practices to automate a
standard business process. This modular design allows businesses to add or delete modules as
needed. Typical ERP modules include:
●●
Financial (general ledger and reporting system)—general ledger, accounts receivable, accounts payable, fixed assets, budgeting, cash management, and preparation of managerial
reports and financial statements
CHAPTER 2
OVERVIEW OF TRANSACTION PROCESSING AND ERP SYSTEMS
69
FIGURE 2-6
Revenue Cycle
Expenditure Cycle
(Chapter 14)
(Chapter 15)
Sell Goods
and Services
Receive
Payment
Buy Goods
and Services
Make
Payment
Integrated ERP
Database
HR/Payroll Cycle
(Chapter 17)
Get
Employee
Time
Production Cycle
Pay
Employees
(Chapter 16)
Use
Employee
Time
Use
Raw
Materials
Use
Machines
●●
●●
●●
●●
●●
●●
●●
Make
Finished
Product
General Ledger and
Reporting System
(Chapter 18)
Produce Reports
and Financial
Statements
Human resources and payroll—human resources, payroll, employee benefits, training,
time and attendance, benefits, and government reporting.
Order to cash (revenue cycle)—sales order entry, shipping, inventory, cash receipts, commission calculation.
Purchase to pay (disbursement cycle)—purchasing, receipt and inspection of inventory,
inventory and warehouse management, and cash disbursements.
Manufacturing (production cycle)—engineering, production scheduling, bill of materials,
work-in-process, workflow management, quality control, cost management, and manufacturing processes and projects.
Project management—costing, billing, time and expense, performance units, activity
management.
Customer relationship management—sales and marketing, commissions, service, customer contact, and call center support.
System tools—tools for establishing master file data, specifying flow of information,
access controls, and so on.
An ERP system, with its centralized database, provides significant advantages:
●●
●●
An ERP provides an integrated, enterprise-wide, single view of the organization’s data
and financial situation. Storing all corporate information in a single database breaks
down barriers between departments and streamlines the flow of information.
Data input is captured or keyed once, rather than multiple times, as it is entered into different systems. Downloading data from one system to another is no longer needed.
Integrated ERP System
70
PART I
CONCEPTUAL FOUNDATIONS OF ACCOUNTING INFORMATION SYSTEMS
●●
●●
●●
●●
●●
Management gains greater visibility into every area of the enterprise and greater monitoring capabilities. Employees are more productive and efficient because they can
quickly gather data from both inside and outside their own department.
The organization gains better access control. An ERP can consolidate multiple permissions and security models into a single data access structure.
Procedures and reports are standardized across business units. This standardization can
be especially valuable with mergers and acquisitions because an ERP system can replace
the different systems with a single, unified system.
Customer service improves because employees can quickly access orders, available inventory, shipping information, and past customer transaction details.
Manufacturing plants receive new orders in real time, and the automation of manufacturing processes leads to increased productivity.
ERP systems also have significant disadvantages:
●●
●●
●●
●●
●●
Cost. ERP hardware, software, and consulting costs range from $50 to $500 million for a
Fortune 500 company and upgrades can cost $50 million to $100 million. Midsized companies spend between $10 and $20 million.
Amount of time required. It can take years to select and fully implement an ERP system,
depending on business size, number of modules to be implemented, degree of customization, the scope of the change, and how well the customer takes ownership of the project.
As a result, ERP implementations have a very high risk of project failure.
Changes to business processes. Unless a company wants to spend time and money customizing modules, they must adapt to standardized business processes as opposed to
adapting the ERP package to existing company processes. The failure to map current
business processes to existing ERP software is a main cause of ERP project failures.
Complexity. This comes from integrating many different business activities and systems,
each having different processes, business rules, data semantics, authorization hierarchies,
and decision centers.
Resistance. Organizations that have multiple departments with separate resources, missions, profit and loss, and chains of command may believe that a single system has few
benefits. It also takes considerable training and experience to use an ERP system effectively, and employee resistance is a major reason why many ERP implementations do
not succeed. It is not easy to convince employees to change how they do their jobs, train
them in new procedures, master the new system, and persuade them to share sensitive information. Resistance, and the blurring of company boundaries, can cause problems with
employee morale, accountability, and lines of responsibility.
Reaping the potential benefits of ERP systems and mitigating their disadvantages requires
conscious effort and involvement by top management. Top management’s commitment to and
support for the necessary changes greatly increase the chances of success.
Because ERP systems are complex and expensive, choosing one is not an easy task. In
doing so, you must take great care to ensure that the ERP system has a module for every critical company process and that you are not paying for software modules that you do not need.
One way to choose a suitable system is to select a package designed for your industry. Although cost is a huge concern, buying too cheaply can cost more in the long run if the system
does not meet your needs because modification costs can be quite high. You can minimize the
risk of buying the wrong package by researching the best ERP vendors. There are many ERP
vendors, the two largest being SAP and Oracle. Other leading vendors are The Sage Group,
Microsoft, and Infor.
Because it is too difficult for most companies to implement ERP software by themselves,
they often hire an ERP vendor or a consulting company to do it for them. These firms usually
provide three types of services: consulting, customization, and support. For most midsized
companies, implementation costs range from the list price of the ERP user licenses to twice
that amount. Large companies with multiple sites often spend three to five times the cost of
the user license.
Because many processes automatically trigger additional actions in other modules, proper
configuration is essential. This requires a sound understanding of all major business processes
CHAPTER 2
OVERVIEW OF TRANSACTION PROCESSING AND ERP SYSTEMS
71
and their interactions so they can be defined. Examples include setting up cost/profit centers,
credit approval policies, and purchase approval rules. In the configuration process, companies
balance the way they want the system to operate with the way it lets them operate. If the way
an ERP module operates is unacceptable, the company can modify the module. Alternatively,
it can use an existing system and build interfaces between it and the ERP system. Both options
are time consuming, costly, and result in fewer system integration benefits. In addition, the
more customized a system becomes, the more difficult it is to communicate with suppliers and
customers. To make configuration easier, ERP vendors are developing built-in “configuration”
tools to address most customers’ needs for system changes.
The importance of sound internal controls in an ERP cannot be overstated. The integrated
nature of ERP systems means that unless every data item is validated and checked for accuracy at the time of initial entry, errors will automatically propagate throughout the system.
Thus, data entry controls and access controls are essential. Most managers and employees
see and have access to only a small portion of the system. This segregation of duties provides
sound internal control. It is important to separate responsibility for custody of assets, authorization of activities that affect those assets, and recording information about activities and the
status of organizational assets.
Summary and Case Conclusion
Ashton is aware that Scott and Susan plan to open additional stores in the near future and want
to develop a website to conduct business over the Internet. Based on this information, Ashton
will select an accounting package that will satisfy S&S’s current and anticipated future needs.
The software should be able to take care of all data processing and data storage tasks. Ashton
will also make sure the software can interface with the source data automation devices he
wants to use to capture most data input. The software must be capable of producing a full set
of financial reports and be flexible enough to produce other useful information the company
will need to be successful. Finally, Ashton realized his next step would be to select the software and produce some documentation of how the system worked.
KEY TERMS
data processing cycle 58
source documents 58
turnaround documents 58
source data automation 59
general ledger 60
subsidiary ledger 60
control account 60
coding 60
sequence codes 60
block code 60
group codes 60
mnemonic codes 60
chart of accounts 61
general journal 62
specialized journal 62
audit trail 63
entity 64
attributes 64
field 64
record 64
data value 64
file 64
master file 64
transaction file 64
database 64
batch processing 65
real-time processing 65
documents 65
reports 66
query 67
smart contract 68
enterprise resource planning
(ERP) systems 68
AIS in Action
CHAPTER QUIZ
1. Which of the following is not an appropriate guideline for coding systems?
a. Ensure codes used are as simple as
c. Provide for flexibility across divisions when designpossible
ing codes
b. Ensure consistency with the intended
d. Provide for growth to ensure there will be sufficient
use of codes
codes available
72
PART I
CONCEPTUAL FOUNDATIONS OF ACCOUNTING INFORMATION SYSTEMS
2. Which of the following is true of a chart of accounts?
a. tailored to the needs and purpose of
c. list of numbers assigned to subsidiary
the organization
ledger accounts
b. account listing of trial balance
d. all count numbers are of the same
accounts
length
3. A code where items are all accounted for by being numbered consecutively and missing
items cause a gap is a
a. sequence code.
c. group code.
b. block code.
d. mnemonic code.
4. Which of the following will not be a subsidiary ledger?
a. accounts receivable
c. fixed assets
b. accounts payable
d. petty cash
5. Which of the following documents is most likely to be used in the revenue cycle?
a. purchase order
c. deposit slip
b. receiving report
d. time sheet
6. The portion of a data record where the value for a particular attribute is stored is called
a. an entity.
c. a field.
b. an attribute.
d. a record.
7. How does the chart of accounts list general ledger accounts?
a. alphabetical order
d. the order in which they appear in
b. chronological order
financial statements
c. size order
8. Which of the following is NOT an advantage of an ERP system?
a. better access control
c. improved monitoring capabilities
b. standardization of procedures and reports
d. simplicity and reduced costs
9. Records of company data sent to an external party and then returned to the system as input are called
a. turnaround documents
c. source documents
b. source data automation documents
d. external input documents
10. What kind of processing involves entering transaction data and editing them as they
occur?
a. batch processing
c. online real-time processing
b. online batch processing
DISCUSSION QUESTIONS
2.1
Table 2-1 lists some of the documents used in the revenue, expenditure, and human resources cycle. What kinds of input or output documents or forms would you find in the
production (also referred to as the conversion) cycle?
2.2
Give three examples each of the advantages and the disadvantages of an ERP system
with a centralized database. How you can increase the change of a successful ERP
implementation?
2.3
What is the purpose of turnaround documents? Give examples of how companies use
turnaround documents.
2.4
Discuss the guidelines for a better coding system. Explain why these guidelines are important, and what would happen if they are not met.
2.5
Some accounting students believe that they do not need to study information systems
to be good accountants. What are the disadvantages of this point of view? What are the
advantages of accountants being involved in designing and preparing reports that measure more than just financial performance?
CHAPTER 2
OVERVIEW OF TRANSACTION PROCESSING AND ERP SYSTEMS
PROBLEMS
2.1
The chart of accounts must be tailored to an organization’s specific needs. Discuss how
the chart of accounts for the following organizations would differ from the one presented for S&S in Table 2-2.
a. university
b. bank
c. government unit (city or state)
d. manufacturing company
e. expansion of S&S to a chain of two stores
2.2
Steven Young is the controller of Seoul-based DMCA, a company that designs and
manufactures specialized equipment. The company has five major operating divisions,
mechanical design, electrical design, machine manufacturing, part manufacturing,
and installation. The sales from each of the divisions ranged between 750,000 and
5 million (South Korean won) in the previous financial year. Each of the divisions is
independent, both physically and managerially, except for the continuous surveillance
of the company’s founder, Xolani Ncube.
The AIS for each division evolved according to the needs and the abilities of its
accounting staff. Young is the first controller to have responsibility for overall financial
management. As Young will be retiring in five years, Ncube wants Young to improve
the AIS so that it will be easier to monitor the performance of each division. Young decided to include the following features in the financial reporting system:
• Managers should receive uniform, timely, and accurate reports of all business activities in each division. The uniform monthly reports across divisions should be
completed by the fifth day of the following month to provide sufficient time for corrective action (if required) to affect the performance of the next month. Companywide financial reports should be available at the same time.
• Reports should provide a basis for measuring the return on investment for each division. In addition to revenue and expense accounts, reports should therefore also
show assets assigned to each division.
• Meaningful budget data, required for planning and decision-making purposes,
should also be generated. Budgets should reflect managerial responsibility and it
should show costs for the major product groups.
• Young believes that a new chart of accounts would be required to incorporate the
newly included features. He wants to divide financial statement accounts into major
categories, such as assets, liabilities, revenue, and equity. He foresees a need for a
maximum of 15 control accounts within each of the categories. From his observations to date, he estimates that 75 subsidiary accounts will be more than adequate for
each control account.
• Each division has a maximum of five major product groups. A minimum of ten cost
centers within any product group is required, including both the operating and nonoperating groups. Young views general divisional costs as a non-revenue-producing
product group. According to Young’s estimation, 40 expense accounts and nine specific variance accounts would be adequate.
REQUIRED
Design a chart of accounts for DMCA. Explain how you structured the chart of accounts
to meet the needs of the company and the company’s operating characteristics. Keep total account code length to a minimum, while still satisfying Young’s requirements.
2.3
The purpose of an audit trail is to be able to trace a transaction from its origin through
source documents to the final output or backwards from the final output to the original
73
74
PART I
CONCEPTUAL FOUNDATIONS OF ACCOUNTING INFORMATION SYSTEMS
source documents to prove the accuracy and validity of ledger postings. Describe in
detail the audit trail for the following in a manufacturing business:
a. Shipping an order to a customer
b. Customer returns defective goods
c. Employee payroll for employee wages (using time cards or time sheets)
2.4
Your IT company deals in laptops, desktops, and servers. You also sell computer parts
like hard drives and motherboards. Design a coding scheme for your company.
2.5
Match the following terms with their definitions.
Term
1.
attribute
2.
audit trail
3.
batch processing
4.
block code
5.
chart of accounts
6.
coding
7.
8.
control account
data processing cycle
9.
data value
10.
database
11.
entity
l2.
field
13. general journal
14. general ledger
15. group code
16. master file
Definition
a. Contains summary-level data for every
asset, liability, equity, revenue, and expense account
b. Items numbered consecutively to account for all items; missing items cause
a gap in the numerical sequence
c. Path of a transaction through a data
processing system from point of origin
to final output, or backward from final
output to point of origin
d. List of general ledger account numbers;
allows transaction data to be coded,
classified, and entered into proper accounts; facilitates preparation of financial statements and reports
e. Contents of a specific field, such as
“George” in a name field
f. Portion of a data record that contains
the data value for a particular attribute,
like a cell in a spreadsheet
g. Company data sent to an external party
and then returned to the system as input
h. Used to record infrequent or nonroutine
transactions
i. Characteristics of interest that need to
be stored
j. Steps a company must follow to efficiently and effectively process data
about its transactions
k. Something about which information is
stored
l. Stores cumulative information about an
organization; like a ledger in a manual
AIS
m. Contains detailed data for any general
ledger account with many individual
subaccounts
n. Contains records of individual business
transactions that occur during a specific
time period
o. Updating each transaction as it occurs
p. Devices that capture transaction data in
machine-readable form at the time and
place of their origin
CHAPTER 2
17. mnemonic code
18. real-time processing
19. record
20. sequence code
21. source data automation
22. source documents
23. specialized journal
24. subsidiary ledger
25. transaction file
26. turnaround documents
OVERVIEW OF TRANSACTION PROCESSING AND ERP SYSTEMS
q. Used to record large numbers of repetitive transactions
r. Set of interrelated, centrally coordinated files
s. Two or more subgroups of digits used
to code items
t. Updating done periodically, such as
daily
u. Systematic assignment of numbers or
letters to items to classify and organize
them
v. Letters and numbers, derived from the
item description, interspersed to identify items; usually easy to memorize
w. Initial record of a transaction that takes
place; usually recorded on preprinted
forms or formatted screens
x. Fields containing data about entity attributes, like a row in a spreadsheet
y. Sets of numbers reserved for specific
categories of data
z. The general ledger account corresponding to a subsidiary ledger, where the
sum of all subsidiary ledger entries
should equal the amount in the general
ledger account
2.6
Identify which data processing method (batch or real-time) would be required for the
following scenarios:
a. Prepare weekly payroll checks
b. Purchase goods from an online (e-commerce) store
c. Prepare daily bank deposits
d. Prepare municipality bills for water and electricity
e. Make a cash withdrawal at an ATM
f. Purchase bus tickets online
g. Transfer money to your mother via money transfer at the local grocery store
h. Purchase clothing from your favorite retail outlet at the local mall
2.7
On their websites, you will find several online demonstrations for the SAP and Oracle
ERP systems. Visit these websites and explore their content by doing the following:
a. Search the SAP site for corporate videos, and watch two of them. Explore the industries, services, solutions, and platforms that SAP offers. Read several of the articles,
such as the ones about customer successes.
b. Explore the Oracle website just as you explored the SAP site.
REQUIRED
After viewing the websites, and based on your reading of the chapter, write a two-page
paper that describes how an ERP can connect and integrate the revenue, expenditure,
human resources/payroll, and financing cycles of a business.
2.8
Which of the following actions update a master file and which would be stored as a
record in a transaction file?
a. Add a new customer
b. Record purchases of raw materials
c. Change the tax percentage on taxable goods
d. Update supplier payment terms
e. Record sales
75
76
PART I
CONCEPTUAL FOUNDATIONS OF ACCOUNTING INFORMATION SYSTEMS
f.
g.
h.
i.
j.
k.
l.
2.9
Record employee commission on sales
Update accounts receivable balance
Update unit prices of selected stock items
Record cash receipts
Update customer balance
Update customer contact details
Record payroll checks
You were hired to assist Ashton Fleming in designing an accounting system for S&S.
Ashton has developed a list of the journals, ledgers, reports, and documents that he
thinks S&S needs (see Table 2-4). He asks you to complete the following tasks:
a. Specify what data you think should be collected on each of the following four documents: sales invoice, purchase order, receiving report, employee time card.
b. Design a report to manage inventory.
c. Design a report to assist in managing credit sales and cash collections.
d. Visit a local office supply store and identify what types of journals, ledgers, and
blank forms for various documents (sales invoices, purchase orders, etc.) are available. Describe how easily they could be adapted to meet S&S’s needs.
2.10 Answer the following 10 multiple choice questions.
1. Which of the following statements is (are) true?
a. Well-designed documents and screens improve accuracy and completeness by
providing instructions or prompts about what data to collect.
b. Online batch processing is where transaction data are entered, edited, and processed as they occur.
TABLE 2-4
Documents, Journals, and Ledgers for S&S
Title
Documents
Sales Invoice
Service Invoice
Delivery Ticket
Monthly Statement
Credit Memo
Purpose
Time Card
Record cash and credit sales of merchandise
Record sales of repair services
Record delivery of merchandise to customers
Inform customers of outstanding account balances
Support adjustments to customer accounts for sales returns and allowances and sales discounts;
also support write-off of uncollectible accounts
Order merchandise from vendors
Record receipt of merchandise from vendors, indicating both quantity and condition of items
received
Record time worked by employees
Specialized Journals
Sales
Cash Receipts
Purchases
Cash Disbursements
Record all credit sales
Record cash sales, payments from customers, and other cash receipts
Record all purchases from vendors
Record all cash disbursements
General Journal
Record infrequent, nonroutine transactions; also record adjusting and closing entries
Subsidiary Ledgers
Accounts Receivable
Accounts Payable
Inventory
Fixed Assets
Maintain details about amounts due from customers
Maintain details about amounts due to vendors
Maintain details about each inventory item
Maintain details about each piece of equipment and other fixed assets
General Ledger
Maintain details about all major asset, liability, equity, revenue, and expense accounts
Purchase Order
Receiving Report
CHAPTER 2
OVERVIEW OF TRANSACTION PROCESSING AND ERP SYSTEMS
c. ERP implementation costs for large companies with multiple sites are usually
about half the cost of the ERP user license.
d. In an ERP system, data entry controls such as validating data items and checking
them for accuracy at the time of initial entry are not needed.
e. Data in ledgers is organized logically using coding techniques that assign numbers or letters to items to classify and organize them.
2. Which of the following statements is (are) true?
a. With sequence codes, items are numbered consecutively to account for all items,
and missing items cause a gap in the numerical sequence.
b. The data capture or input process is usually triggered by a top management decision.
c. Updating done periodically, such as daily or weekly, is referred to as batch
processing.
d. Cumulative accounting information is stored in general and subsidiary journals.
e. Computers store data in a field; the fields containing data about entity attributes
constitute a record.
3. Which of the following statements is (are) true?
a. A chart of accounts facilitates preparing financial statements because data stored
in individual accounts can easily be summed for presentation.
b. Repetitive and frequently used database queries are usually developed by users;
one-time queries are usually developed by information systems specialists.
c. A database query can provide the information needed to deal with problems and
questions that need rapid action or answers.
d. A journal entry shows the accounts and amounts to be debited and credited.
e. Transaction files are permanent and must be maintained for several years for
backup purposes.
4. Which of the following statements is (are) true?
a. A group code is derived from the description of the item and is usually easy to
memorize.
b. Using source data automation or well-designed turnaround documents and data
entry screens helps ensure captured data are accurate and complete.
c. It is usually best to let a user determine what data to input rather than have data
input screens list the data the user needs to enter.
d. If the sum of all subsidiary ledger account balances does not equal its general
ledger control account balance, a recording error has occurred.
e. Real-time processing updates transactions as they occur, helping ensure stored
information is current and useful in making decisions.
5. Which of the following statements is (are) true?
a. With mnemonic codes, blocks of numbers are reserved for specific categories of
data.
b. Input controls are improved by using pre-numbered source documents or by the
system automatically assigning a sequential number to each transaction.
c. In an integrated ERP system, undetected data entry errors can automatically propagate throughout the system.
d. As ERP modules do not automatically trigger additional actions in other modules, it is less important to understand business processes and their interactions.
e. A purchase to pay ERP module facilitates production scheduling, work-in-process, quality control, cost management, and manufacturing processes.
6. Which of the following statements is (are) true?
a. Data is one of a company’s most important resources but to function properly
most organizations do not have to have the data readily and easily accessible.
b. Turnaround documents are company output sent to an external party and returned
as an input document.
c. Each type of entity possesses the same set of attributes or characteristics of interest that are stored, but the specific data values for those attributes will differ
depending on the entity.
77
78
PART I
CONCEPTUAL FOUNDATIONS OF ACCOUNTING INFORMATION SYSTEMS
d. Reaping the potential benefits of ERP systems and mitigating their disadvantages
requires conscious effort and involvement by top management.
e. Real-time data processing is almost always cheaper and more efficient than batch
processing.
7. Which of the following statements is (are) true?
a. Source data automation devices capture transaction data in paper form at the time
and place of their origin.
b. Master files are permanent and exist across fiscal periods; individual master file
records may change frequently.
c. General ledgers are often used for accounts receivable, inventory, fixed assets, and
accounts payable.
d. If an ERP system does not meet your needs, it can almost always be inexpensively modified to meet your unique needs.
e. When choosing an ERP system, make sure it has a module for every critical company process and you are not paying for modules you do not need.
8. Which of the following statements is (are) true?
a. Documents are records of transaction or other company data that can be printed
out or stored as electronic images in a computer.
b. Transaction data are almost always recorded in a ledger before they are entered
into a journal.
c. Since batch processing data are current and accurate only immediately after processing, it is used for applications that do not need frequent updating.
d. ERP systems are not effective in integrating non-financial company operations
with a traditional accounting system.
e. Well-designed screens improve accuracy and completeness by using checkoff
boxes or pull-down menus to present the available options.
9. Which of the following statements is (are) true?
a. A transaction file contains records of individual business transactions and is similar to a general ledger in a manual AIS.
b. To ensure credit sales policies are followed, the system can be programmed to
check a customer’s credit limit and payment history.
c. Use of pre-numbered documents makes it harder to verify that all transactions
have been recorded and that none has been misplaced.
d. An ERP system uses a centralized database to share information across business
processes and coordinate activities.
e. It is difficult for an ERP system to provide management with the up-to-date information needed to plan, control, and evaluate an organization’s business.
10. Which of the following statements is (are) true?
a. The need for reports should be periodically assessed because they are often prepared long after they are needed—wasting time, money, and resources.
b. An audit trail is a transaction path through a data processing system from point of
origin to final output, but not backward from final output to point of origin.
c. Accountants and systems developers do not need to understand how data are captured, organized, stored, processed, or accessed.
d. An AIS has traditionally been referred to as a transaction processing system because its only concern was financial data and accounting transactions.
e. A master file, like a ledger in a manual AIS, stores cumulative information about
an organization.
CHAPTER 2
OVERVIEW OF TRANSACTION PROCESSING AND ERP SYSTEMS
CASE 2-1 Bar Harbor Blueberry Farm
The Bar Harbor Blueberry Farm is a family-owned,
200-acre farm that grows and sells blueberries to
grocery stores, blueberry wholesalers, and small
roadside stands. Bar Harbor has 25 full-time employees and hires 150 to 200 seasonal workers for
the harvest.
For the past six summers, you have picked berries
for Bar Harbor. When you graduated, you were hired
as the full-time accountant/office manager. Until now,
Bar Harbor kept most of its accounting records in a big
file box. Jack Phillips, the owner, would like a more
organized approach to the farm’s accounting records.
He has asked you to establish a proper set of books.
You decide to start by establishing appropriate journals
and ledgers for these transactions.
Presented below are a set of vendor invoices and a
few partially completed journals and ledgers. Your job
is to record these transactions and update the appropriate ledgers. Be sure to leave a proper audit trail. You
may also use Excel, Great Plains, Peachtree, QuickBooks, or another accounting software package of your
choosing to complete this problem.
VENDOR INVOICES
DATE
SUPPLIER INVOICE
SUPPLIER NAME
SUPPLIER ADDRESS
AMOUNT
March 7
AJ34
Bud’s Soil Prep
PO Box 34
$2,067.85
March 11
14568
Osto Farmers Supply
45 Main
March 14
893V
Whalers Fertilizer
Route 34
$5,000.00
March 21
14699
Osto Farmers Supply
45 Main
$3,450.37
March 21
10102
IFM Wholesale
587 Longview
$4,005.00
March 24
10145
IFM Wholesale
587 Longview
$ 267.88
ACCOUNT NUMBER
$ 67.50
PURCHASES JOURNAL
PAGE 1
DATE
SUPPLIER
SUPPLIER INVOICE
March 7
Bud’s Soil Prep
AJ34
POST REF
AMOUNT
$2,067.85
GENERAL LEDGER
ACCOUNTS PAYABLE
DATE
DESCRIPTION
March 1
Balance Forward
ACCOUNT NUMBER: 300
POST REF
DEBIT
CREDIT
BALANCE
$18,735.55
GENERAL LEDGER
PURCHASES
ACCOUNT NUMBER: 605
DATE
DESCRIPTION
March 1
Balance Forward
POST REF
DEBIT
CREDIT
BALANCE
$54,688.49
79
80
PART I
CONCEPTUAL FOUNDATIONS OF ACCOUNTING INFORMATION SYSTEMS
ACCOUNTS PAYABLE SUBSIDIARY LEDGER
ACCOUNT NO: 23
DATE
ACCOUNT NO: 24
DATE
ACCOUNT NO: 36
DATE
ACCOUNT NO: 38
DATE
BUD’S SOIL PREP
DESCRIPTION
PO BOX 34
DEBIT
OSTO FARMERS SUPPLY
DESCRIPTION
45 MAIN
ROUTE 34
BALANCE
TERMS: 2/10, NET 30
CREDIT
587 LONGVIEW
DEBIT
BALANCE
TERMS: 2/10, NET 30
CREDIT
DEBIT
IFM WHOLESALE
DESCRIPTION
CREDIT
DEBIT
WHALERS FERTILIZER
DESCRIPTION
TERMS: 2/10, NET 30
BALANCE
TERMS: 2/10, NET 30
CREDIT
BALANCE
CASE 2-2 SDC
Ollie Mace is the controller of SDC, an automotive parts
manufacturing firm. Its four major operating divisions
are heat treating, extruding, small parts stamping, and
machining. Last year’s sales from each division ranged
from $150,000 to $3 million. Each division is physically
and managerially independent, except for the constant
surveillance of Sam Dilley, the firm’s founder.
The AIS for each division evolved according to the
needs and abilities of its accounting staff. Mace is the
first controller to have responsibility for overall financial management. Dilley wants Mace to improve the
AIS before he retires in a few years so that it will be
easier to monitor division performance. Mace decides
to redesign the financial reporting system to include the
following features:
• It should give managers uniform, timely, and accurate reports of business activity. Monthly reports
should be uniform across divisions and be completed
by the fifth day of the following month to provide
enough time to take corrective actions to affect the
next month’s performance. Company-wide financial
reports should be available at the same time.
• Reports should provide a basis for measuring the return on investment for each division. Thus, in addition to revenue and expense accounts, reports should
show assets assigned to each division.
• The system should generate meaningful budget data
for planning and decision-making purposes. Budgets should reflect managerial responsibility and
show costs for major product groups.
CHAPTER 2
OVERVIEW OF TRANSACTION PROCESSING AND ERP SYSTEMS
M a c e b e li ev e s t h a t a n ew c h a r t o f a c counts is required to accomplish these goals. He
wants to divide financial statement accounts into
major categories, such as assets, liabilities, and equity.
He does not foresee a need for more than 10 control accounts within each of these categories. From his observations to date, 100 subsidiary accounts are more than
adequate for each control account.
No division has more than five major product
groups. Mace foresees a maximum of six cost centers
within any product group, including both the operating
and nonoperating groups. He views general divisional
costs as a non-revenue-producing product group. Mace
estimates that 44 expense accounts plus 12 specific
variance accounts would be adequate.
REQUIRED
Design a chart of accounts for SDC. Explain how you
structured the chart of accounts to meet the company’s
needs and operating characteristics. Keep total account
code length to a minimum, while still satisfying all of
Mace’s desires. (CMA Examination, adapted)
AIS in Action Solutions
QUIZ KEY
1. Which of the following is not an appropriate guideline for coding systems?
a. Ensure codes used are as simple as possible [Incorrect. Simple codes minimizes costs
and enable staff to memorize and easily interpret the codes; this also supports employee acceptance of the coding system used.]
b. Ensure consistency with the intended use of codes [Incorrect. People determining the
codes need to consider what the codes will be used for in terms of system output, thus
the codes should be used consistently throughout the organization.]
▶ c. Provide for flexibility across divisions when designing codes [Correct. There should
be consistency in terms of the codes used – across the organization and across the different divisions; each division should not be allowed to create their own codes.]
d. Provide for growth to ensure there will be sufficient codes available [Incorrect. Allow
for growth. If a fast-growing company has 90 employees already, do not use a twodigit staff code.]
2. Which of the following is true of a chart of accounts?
▶ a. tailored to the needs and purpose of the organization [Correct. Chart of accounts set up
according to the nature and purpose of the organization.]
b. account listing of trial balance accounts [Incorrect. Account listing of income statement and balance sheet accounts.]
c. list of numbers assigned to subsidiary ledger accounts [Incorrect. List of numbers assigned to all general ledger accounts.]
d. all count numbers are of the same length [Incorrect. A field represents a data storage space. For example, a student majoring in Accounting would have “Accounting”
stored in the major field.]
3. A code where items are accounted for by being numbered consecutively and the missing
items cause a gap is called a
▶ a. sequence code. [Correct. Items are numbered consecutively to account for all of them,
and the missing items cause a gap in the sequence.]
b. block code. [Incorrect. Blocks of numbers are reserved for specific categories of data.]
c. group code. [Incorrect. Two or more subgroups of digits used to code items, are often
used in conjunction with block codes.]
d. mnemonic code. [Incorrect. Letters and numbers are interspersed to identify an item.]
81
82
PART I
CONCEPTUAL FOUNDATIONS OF ACCOUNTING INFORMATION SYSTEMS
4. Which of the following will not be a subsidiary ledger?
a. accounts receivable [Incorrect. This is the subsidiary ledger containing information on
all individual customers, with detailed information regarding the customer, including
name, address, purchases, payments, account balance, and credit limit.]
b. accounts payable [Incorrect. This is the subsidiary ledger containing information on
everything owed to specific suppliers, with detailed information regarding the supplier,
including name, address, purchases from the supplier, payments made to the supplier,
and account balance.]
c. fixed assets [Incorrect. This is the subsidiary ledger containing all information on fixed
assets, including acquisition date, price, and depreciation method.]
▶ d. petty cash [Correct. Petty cash is a single account and does not require a subsidiary
ledger.]
5. Which of the following documents is most likely to be used in the revenue cycle?
a. purchase order [Incorrect. Expenditure cycle document indicating products ordered,
their quantities, and prices.]
b. receiving report [Incorrect. Expenditure cycle document containing information on
products/services that had been delivered, such as date and time, name, quantity, and
related purchase order.]
▶ c. deposit slip [Correct. Revenue cycle document indicating information on deposits
made, including date, and amount.]
d. time sheet [Incorrect. Expenditure cycle document indicating the employee and hours
worked.]
6. The portion of a data record where the value for a particular attribute is stored is called
a. an entity. [Incorrect. An entity is an item about which information is stored.]
b. an attribute. [Incorrect. Each entity has attributes, or characteristics of interest.]
▶ c. a field. [Correct. The portion of a data record where the data value for a particular attribute is stored.]
d. a record. [Incorrect. The fields containing data about entity attributes constitute a
record.]
7. How does the chart of accounts list general ledger accounts?
a. alphabetical order [Incorrect. General ledger accounts are listed in the order in which
they appear in the financial statements, not in alphabetical order.]
b. chronological order [Incorrect. General ledger accounts are listed in the order in which
they appear in the financial statements, not according to the date they were created.]
c. size order [Incorrect. General ledger accounts are listed in the order in which they appear in the financial statements, not according to their size.]
▶ d. the order in which they appear in financial statements [Correct.]
8. Which of the following is NOT an advantage of an ERP system?
a. better access control [Incorrect. Better access control is an advantage because an ERP
can consolidate multiple permissions and security models into a single data access
structure.]
b. standardization of procedures and reports [Incorrect. Standardization of procedures
and reports is an advantage because procedures and reports can be standardized across
business units, and in mergers and acquisitions they can replace the different systems
with a single, unified system.]
c. improved monitoring capabilities [Incorrect. Improved monitoring capabilities are an
advantage because management gains greater visibility into every area of the enterprise that allows them to better monitor the organization.]
▶ d. simplicity and reduced costs [Correct. ERP systems are quite complex and costly; they
do not offer the advantages of simplicity and reduced costs.]
CHAPTER 2
OVERVIEW OF TRANSACTION PROCESSING AND ERP SYSTEMS
9. Records of company data sent to an external party and then returned to the system as in.
put are called
▶ a. turnaround documents [Correct. For example, a utility bill is sent to a customer, who
then returns the bill with payment.]
b. source data automation documents [Incorrect. Source data automation is the capturing
of input data in machine-readable form.]
c. source documents [Incorrect. Source documents collect data about business activities.]
d. external input documents [Incorrect. These documents originate from external
sources.]
10. What kind of processing involves entering transaction data and editing them as they
occur?
a. batch processing [Incorrect. Updating performed periodically, such as daily, is referred
to as batch processing.]
▶ b. online batch processing [Correct. Entering transaction data and editing them as they
occur.]
c. online real-time processing [Incorrect. Most companies update each transaction as it
occurs; this is referred to as online, real-time processing because it ensures that stored
information is always current, thereby increasing its decision-making usefulness.]
83
CHAPTER
3
Systems Documentation
Techniques
LEARNING OBJECTIVES
After studying this chapter, you should be able to:
1. Prepare and use business process diagrams to understand, evaluate, and
document information systems.
2. Prepare and use flowcharts to understand, evaluate, and document
information systems.
3. Prepare and use data flow diagrams to understand, evaluate, and
document information systems.
I N TEGRATIV E C ASE
S&S
What a hectic few months it has been for Ashton Fleming! He helped S&S get started, helped
get S&S through its weeklong grand opening, and was swamped with processing all the
transactions from the highly successful grand opening. Because of its rapid growth, S&S has
outgrown the initial rudimentary accounting information system (AIS) that Ashton selected.
Lacking time and expertise, Ashton has engaged Computer Applications (CA), a systems
consulting firm, to help S&S select and install a new and more powerful AIS.
During Ashton’s first meeting with Kimberly Sierra, CA’s manager, she asked about S&S’s
system requirements and management’s expectations. Ashton had yet to think through
these issues, so he could not answer her specifically. When she asked how S&S’s system
worked, Ashton plunged into a discussion about the use of various company documents, but
Kimberly seemed unable to absorb his detailed explanations. Ashton thought that part of his
discussion was helpful, but overall it was irrelevant to the issue at hand.
Ashton came away impressed by CA and Kimberly. He also realized the need to
understand S&S’s information requirements more clearly. From his days as an auditor,
Ashton knew the value of good system documentation in helping unfamiliar users both
understand and evaluate a system. Good system documentation would be a big help to
him and Kimberly, as well as to Scott and Susan as they evaluate the current and proposed
systems.
After sharing his conclusions with Susan and Scott, they enthusiastically approved
84
Ashton’s plan to document the current and proposed systems. They supported his taking a
Download