Accounting Information System
Accounting Information System
Explain the decisions an organization makes and the information needed to make them.
Identify the information that passes between internal and external parties and an AIS.
Explain what an accounting information system (AIS) is and describe its basic functions.
System
A set of two or more
interrelated components
interacting to achieve a
goal
Goal Conflict
Occurs when components
act in their own interest
without regard for overall
goal
Goal Congruence
Occurs when components
acting in their own interest
contribute toward overall
goal
Information is processed
data used in decision
making.
Too much information
however, will make it
more, not less, difficult to Information
make decisions. This is
known as Information
Overload.
Benefits Costs
Reduce Uncertainty Time & Resources
Improve Decisions
Produce Information
Improve Planning Distribute Information
Improve Scheduling
Benefit $’s > Cost $’s
Necessary characteristics:
Relevant
“The capacity of information to make a difference in a
decision by helping users to form predictions about the
outcomes of past, present, and future events or to
confirm or correct prior expectations.”
Reliable
“The quality of information that assures that information is
reasonably free from error and bias and faithfully
represents what it purports to represent.”
Complete
“The inclusion in reported information of everything
material that is necessary for faithful representation of the
relevant phenomena.”
Timely
“Having information available to a decision maker before
it loses its capacity to influence decisions.”
Understandable
“The quality of information that enables users to perceive
its significance.”
Verifiable
“The ability through consensus among measurers to
ensure that information represents what it purports to
represent or that the chosen method of measurement
has been used without error or bias.”
Accessible
Available when needed (see Timely) and in a useful
format (see Understandable).
Human
Expenditure
Resources
Production
Revenue
Expenditure
Production
Human Resources
Financing
Give–Get exchanges
Accounting = AIS
Data
Software
Improve Efficiency
Reduce uncertainty.
Firm
Infrastructure Technology
Human Purchasing
Resources
Organizations need to
understand:
IT developments
Business strategy
Organizational culture
Turnaround
Usually paper-based
Are sent from
organization to customer
Same document is
returned by customer to
organization
Turnaround Document
General
Infrequent or specialized transactions
Specialized
Repetitive transactions
E.g., sales transactions
Sequence
Digit Position Meaning
Items numbered consecutively
1–2 Product Line, size,
Block and so on
Specific range of numbers are
associated with a category 3 Color
10000–199999 = Electric Range
4–5 Year of
Group Manufacture
Positioning of digits in code provide
meaning 6–7 Optional Features
1241000 12 = Dishwasher
Mnemonic
Letters and numbers 4 = White
Easy to memorize 10 = 2010
Code derived from description of item 00 = No Options
Chart of accounts
Type of block coding
Transaction
Contains records of a
business from a specific
period of time
Master
Permanent records
Updated by transaction
with the transaction file
Database
Set of interrelated files
Soft copy
Displayed on a screen
Hard copy
Printed on paper
ERP modules:
Financial
Human resources and payroll
Order to cash
Purchase to pay
Manufacturing
Project management
Customer relationship management
System tools
Cost
Time-consuming to implement
Complex
Resistance to change
Data Store
or
Context
Highest level (most general)
Purpose: show inputs and outputs into system
Characteristics: one process symbol only, no data stores
Level-0
Purpose: show all major activity steps of a system
Characteristics: processes are labeled 1.0, 2.0, and so on
Input/Output
Processing
Storage
Miscellaneous
(cont’d)
Document
Illustrates the flow of documents through an organization
Useful for analyzing internal control procedures
System
Logical representation of system inputs, processes, and
outputs
Useful in systems analysis and design
Program
Represent the logical sequence of program logic
Misappropriation of assets
Theft of a companies assets.
Largest factors for theft of assets:
Absence of internal control system
Failure to enforce internal control system
Pressure
Opportunity
Rationalization
• Motivation or incentive to
commit fraud
•Types:
1. Employee
• Financial
• Emotional
• Lifestyle
2. Financial
• Industry conditions
• Management
characteristics
2. Many go undetected
Processor Fraud
Unauthorized system use
Data Fraud
Illegally using, copying, browsing, searching, or harming company data
Output Fraud
Stealing, copying, or misusing computer printouts or displayed
information
Hacking
Unauthorized access, modification, or use of a computer
system or other electronic device
Social Engineering
Techniques, usually psychological tricks, to gain access to
sensitive data or information
Used to gain access to secure systems or locations
Malware
Any software which can be used to do harm
Botnet—Robot Network
Network of hijacked computers
Hijacked computers carry out processes without users
knowledge
Zombie—hijacked computer
Spoofing
Making an electronic communication look as if it comes
from a trusted official source to lure the recipient into
providing information
IP address DNS
Forged IP address to Intercepting a request for a
conceal identity of sender of Web service and sending
data over the Internet or to the request to a false service
impersonate another
computer system
Buffer Overflow
Data is sent that exceeds computer capacity causing
program instructions to be lost and replaced with attacker
instructions.
Man-in-the-Middle
Hacker places themselves between client and host.
Password Cracking
Penetrating system security to steal passwords
War Dialing
Computer automatically dials phone numbers looking for
modems.
Phreaking
Attacks on phone systems to obtain free phone service.
Data Diddling
Making changes to data before, during, or after it is entered
into a system.
Data Leakage
Unauthorized copying of company data.
Economic Espionage
Theft of information, trade secrets, and intellectual property.
Cyber-Bullying
Internet, cell phones, or other communication technologies to
support deliberate, repeated, and hostile behavior that
torments, threatens, harasses, humiliates, embarrasses, or
otherwise harms another person.
Internet Terrorism
Act of disrupting electronic commerce and harming computers
and communications.
Internet Misinformation
Internet Misinformation
Using the Internet to spread false or misleading information
Internet Auction
Using an Internet auction site to defraud another person
Unfairly drive up bidding
Seller delivers inferior merchandise or fails to deliver at all
Buyer fails to make payment
Internet Pump-and-Dump
Using the Internet to pump up the price of a stock and then
selling it
Pharming
Redirecting Web site traffic to a
spoofed Web site.
Lebanese Loping
Capturing ATM pin and card numbers
Skimming
Double-swiping a credit card
Chipping
Planting a device to read credit card information in a credit
card reader
Eavesdropping
Listening to private communications
Key logging
Records computer activity, such as a user’s keystrokes, e-mails sent and
received, Web sites visited, and chat session participation
Trojan Horse
Malicious computer instructions in an authorized and otherwise properly
functioning program
Time bombs/logic bombs
Idle until triggered by a specified date or time, by a change in the
system, by a message sent to the system, or by an event that does
not occur
Packet Sniffers
Capture data from information packets as they travel over
networks
Rootkit
Used to hide the presence of trap doors, sniffers, and key
loggers; conceal software that originates a denial-of-service
or an e-mail spam attack; and access user names and log-in
information
Superzapping
Unauthorized use of special system programs to bypass regular
system controls and perform illegal acts, all without leaving an
audit trail
Compare and contrast the COBIT, COSO, and ERM control frameworks.
Describe the four types of control objectives that companies need to set.
Describe the events that affect uncertainty and the techniques used to identify
them.
Explain how to assess and respond to risk using the Enterprise Risk Management
(ERM) model.
Functions Categories
Preventive General
Deter problems Overall IC system and
processes
Detective
Discover problems Application
Transactions are
Corrective processed correctly
Correct problems
Organizational structure
External influences
Strategic
High-level goals aligned with corporate mission
Operational
Effectiveness and efficiency of operations
Reporting
Complete and reliable
Improve decision making
Compliance
Laws and regulations are followed
Identify Risk
Identify likelihood of risk
Identify positive or negative impact
Types of Risk
Inherent
Risk that exists before any plans are made to control it
Residual
Remaining risk after controls are in place to reduce it
Reduce
Implement effective internal control
Accept
Do nothing, accept likelihood of risk
Share
Buy insurance, outsource, hedge
Avoid
Do not engage in activity that produces risk
Separate:
Authorization
Approving transactions and decisions
Recording
Preparing source documents
Entering data into an AIS
Maintaining accounting records
Custody
Handling cash, inventory, fixed assets
Receiving incoming checks
Writing checks
Effective supervision.
Efficiency Compliance
Information must be produced Controls must ensure
in a cost-effective manner. compliance with internal
policies and with external
Confidentiality legal and regulatory
requirements.
Sensitive information must be
protected from unauthorized
disclosure. Reliability
Management must have
Integrity access to appropriate
information needed to
Information must be accurate, conduct daily activities and to
complete, and valid. exercise its fiduciary and
governance responsibilities.
Information
Criteria
Confidentiality
Sensitive organizational information (e.g., marketing plans, trade secrets) is
protected from unauthorized disclosure.
Privacy
Personal information about customers is collected, used, disclosed, and
maintained only in compliance with internal policies and external regulatory
requirements and is protected from unauthorized disclosure.
Processing Integrity
Data are processed accurately, completely, in a timely manner, and only with
proper authorization.
Availability
The system and its information are available to meet operational and
contractual obligations.
Preventive Control
Detective Control
Corrective Control
Training
Firewall
Software or hardware used to filter information
Software Design
Programmers must be trained to treat all input from external
users as untrustworthy and to carefully check it before
performing further actions.
Log Analysis
Process of examining logs to identify evidence of possible
attacks
Intrusion Detection
Sensors and a central monitoring unit that create logs of
network traffic that was permitted to pass the firewall and
then analyze those logs for signs of attempted or successful
intrusions
Managerial Reports
Security Testing
Patch Management
Fix known vulnerabilities by installing the latest updates
Security programs
Operating systems
Applications programs
Recovery
Follow-up
Virtualization Risks
Multiple systems are Increased exposure if
run on one computer breach occurs
Reduced
Cloud Computing authentication
Remotely accessed standards
resources Opportunities
Implementing strong
Software access controls in the
applications cloud or over the server
Data storage that hosts a virtual
network provides good
Hardware security over all the
systems contained
therein
Copyright © 2012 Pearson Education 8-23
Chapter 11
Auditing Computer-Based Information Systems
11-1
Copyright © 2012 Pearson Education
Learning Objectives
Information System
Reviews the controls of an AIS to assess compliance with:
Internal control policies and procedures and effectiveness in
safeguarding assets
Operational
Economical and efficient use of resources and the accomplishment of
established goals and objectives
Compliance
Determines whether entities are complying with:
Applicable laws, regulations, policies, and procedures
Investigative
Incidents of possible fraud, misappropriation of assets, waste and abuse, or
improper governmental activities.
Planning
Collecting Evidence
Evaluating Evidence
Materiality
How significant is the impact of the evidence?
Reasonable Assurance
Some risk remains that the audit conclusion is incorrect.
Purpose:
To review and evaluate the internal controls that protect the
system
Objectives:
1. Overall information security
2. Program development and acquisition
3. Program modification
4. Computer processing
5. Source files
6. Data files
Theft
Controls:
Management and user authorization and approval, thorough
testing, and proper documentation
Reprocessing
Use of source code to re-run program and compare for
discrepancies
Parallel Simulation
Auditor-created program is run and used to compare
against source code
Snapshot Technique
Master files before and after update are stored for specially marked
transactions
Audit Hooks
Notify auditors of questionable transactions
Integrity
Security of data
Primary Objective:
Provide the right product
In the right place
At the right time for the right price
2. Shipping
3. Billing
4. Cash collections
Poor performance
Access controls
Encryption
Managerial reports
1. Take order
Incomplete/inaccurate orders
Invalid orders
Uncollectible accounts
Loss of customers
Theft of inventory
1. Invoicing
Failure to bill
Billing errors
1. Theft of cash
Having two people open all mail likely to contain customer payments
Primary objective:
Minimize the total cost of acquiring and maintaining
inventories, supplies, and the various services the
organization needs to function
4. Cash disbursements
Poor performance
Unreliable suppliers
Kickbacks
Price lists
Competitive bidding
Budgets
Maintaining a list of approved suppliers and configuring the system to permit purchase orders
only to approved suppliers
Supplier audits
Mistakes in counting
Theft of inventory
Non-Voucher
Each approved invoice is posted to individual supplier
records in the accounts payable file and is then stored in an
open-invoice file.
When a check is written to pay for an invoice, the voucher
package is removed from the open-invoice file, the invoice
is marked paid, and then the voucher package is stored in
the paid-invoice file.
Voucher
Disbursement voucher is also created when a supplier
invoice is approved for payment.
Identifies the supplier, lists the outstanding invoices, and
indicates the net amount to be paid after deducting any
applicable discounts and allowances.
Duplicate payments
Theft of cash
Check alteration
1. Product design
2. Planning and
scheduling
3. Production operations
4. Cost accounting
Access controls
Encryption
Over- or underproduction
Theft of inventory
Poor performance
Disruption of operations
Misleading reports
Process Costing
Assigns costs to each process, or work center, in the production cycle,
and then calculates the average cost for all units produced.
If the product or service is similar and produced in mass quantities
Activity-Based Costing
Traces costs to the activities that create them
Uses a greater number of overhead pools
Batch
Product
Organization
Identifies cost drivers
Cause-and-effect relationship
Managing Employees:
Recruiting and hiring new employees
Training
Job assignment
Compensation
Performance evaluation
Discharge of employees due to voluntary or involuntary
termination
3. Prepare payroll
4. Distribute payroll
Access controls
Encryption
Access controls
Biometric authentication
Supervisory review
Prenumbering and periodically accounting for all payroll checks and review of all
EFT direct deposit transactions
Untimely payments
Inaccurate payments
1. Update general
ledger
2. Post adjusting
entries
3. Prepare financial
statements
4. Produce
management
reports
Access controls
Encryption
Access controls
Access controls
Audits
Taxonomy
Set of files defining the various elements and the relationships between them
A schema
Contains the definitions of every element that could appear in an instance document
Linkbases
Describes relationships between elements
Reference
Identifies relevant authoritative pronouncements
Calculation
Specifies how to combine elements
Presentation
How to group elements
Label
Associates human-readable labels with elements
Balanced scorecard
Conceptual Design
Developing the different schemas for the new system at the conceptual,
external, and internal levels
Physical Design
Translating the internal-level schema into the actual database structures that
will be implemented in the new system
New applications are developed
Data models:
Data flow diagrams (Chapter 3)
Flow charts (Chapter 3)
Entity-relationship diagrams (Chapter 17)
Depicts entities
Anything an organization wants to collect information about
Resources
Things that have economic value
Events
Business activities
Management wants to manage and control
Agents
People and organizations that participate in events
One-to-Many:
Many-to-Many:
Technology changes
Conceptual Design
Gather system/user requirements.
Physical Design
Concepts are translated into detailed specifications.
Management
Accountants
Users
Master Plan
What the system will consist of
How it will be developed
Who will develop it
How needed resources will be acquired
Where the AIS is headed
Economic:
Will system benefits justify the time, money, and resources required to implement it?
Technical:
Can the system be developed and implemented using existing technology?
Legal:
Does the system comply with all applicable federal and state laws, administrative
agency regulations, and contractual obligations?
Scheduling
Can the system be developed and implemented in the time allotted?
Operational
Does the organization have access to people who can design, implement, and
operate the proposed system? Will people use the system?
The best system will fail without the support of the people
it serves.
Aggression
Behavior that destroys, cripples, or weakens system
effectiveness, such as increased error rates, disruptions, or
deliberate sabotage
Projection
Blaming the new system for everything that goes wrong
Avoidance
Ignoring a new AIS in the hope that the problem (the
system) will eventually go away
Involve users
Explain how end users develop, use, and control computer- based
information systems.
Describe how prototypes are used to develop an AIS, and discuss the
advantages and disadvantages of doing so.
Turnkey System
Hardware and software sold as a package
Advantages of EUC
User creation, control, and implementation
Users decide whether a system should be developed and what information is
important.
Systems that meet user needs
Users discover flaws that IS people do not catch.
Many of the user-analyst-programmer communication problems in traditional
program development are avoided.
Timeliness
Time-consuming cost-benefit analyses, detailed requirements definitions, and
the delays and red tape of the approval process can be avoided.
Disadvantages to EUC:
Logic and development errors
Inadequately tested applications
Inefficient systems
Poorly controlled systems
Poorly documented systems
Incompatible systems
Redundant data
Wasted resources
Increased costs
Prototyping
Evolved into:
Business Process Management (BPM)
Systematic approach to continuously improving and
optimizing an organization’s business processes
Less costly
Improved control
procedures
Simplified documentation
Developer creates a
general framework for
implementing user
requirements and solving
the problems identified in
the analysis phase.
Evaluating design
alternatives
Preparing design
specifications
Preparing the conceptual
systems design report
Data Storage
What data elements must be stored to produce a report?
How they should be stored?
What type of file or database should be used?
Input
Where, when, and how to collect the data?
Conceptual designs
are translated into
detailed specifications
that are used to code
and test the computer
programs.
Output
File and database
Input
Program
Procedures
Controls
Process of installing
hardware and
software and getting
the AIS up and running
Planning
Prepare site
Train personnel
Complete
documentation
Test system
Conversion
Development Documentation
A system description; copies of output, input, and file and
database layouts; program flowcharts; test results; and user
acceptance forms
Operations Documentation
Includes operating schedules; files and databases
accessed; and equipment, security, and file-retention
requirements
User Documentation
Teaches users how to operate the AIS; it includes a
procedures manual and training materials
Walk-Through
Step-by-step reviews of procedures or program logic to find
incorrect logic, errors, omissions, or other problems
Acceptance Tests
Real transactions and files rather than hypothetical ones,
users develop the acceptance criteria and make the final
decision whether to accept the AIS
Direct
Terminates the old AIS when the new one is introduced
Parallel
Operates the old and new systems simultaneously for a
period
Phase-in
Gradually replaces elements of the old AIS with the new one
Pilot
Implements a system in one part of the organization, such as
a branch location
Localizes conversion problems and allows training in a live
environment
Post-Implementation Review
Determines whether the system meets its planned objectives