Horizonal
Horizonal
Data Sources
• Data sources are financial transactions that enter the information system from
internal and external sources.
o External financial transactions are the most common sources of data
for most organizations
o E.g., sale of goods and services, purchase of inventory, receipt of cash,
and disbursement of cash (including payroll)
o Internal financial transactions involve the exchange of movements of
resources within organization.
o E.g., movement of raw materials into work-in-process (WIP), application
of labor and overhead to WIP, tranfer of WIP into finished goods
inventory, and depreciation of equipment.
Transforming the Data into Information
• Functions for transforming data into information according to the general AIS
model:
1. Data Collection
o Capturing transaction data
o Recording data on forms
o Validating and editing the data
2. Data Processing
o Classifying
o Transcribing
o Sorting
o Batching
o Merging
o Calculating
o Summarizing
o Comparing
3. Data Management
o Storing
o Retrieving
o Deleting
4. Information Generation
o Compiling
o Arranging
o Formatting
o Presenting
Characteristics of Useful Information
• Regardless of physical form or technology, useful information has the following
characteristics:
o Relevance: serves a purpose
o Timeliness: no older than the time period of the action it supports
o Accuracy: free from material errors
o Completeness: all information
essential to a decision or task is
present
o Summarization: aggregated in
accordance with the user’s needs
Information System Objectives in a Business
Context
• The goal of an information system is to
support
o The stewardship function of management
o Management decision
making
o The firm’s day-to-day
operations
Organization Structure
• The structure of an organization
helps to allocate
o Responsibility
o Authority
o Accountability
• Segmenting by business function is a very common method of organizing.
Function Areas
• Inventory/Materials Management
o Purchasing, receiving, and stores
• Production
o Production planning, quality control and maintenance
• Marketing
• Distribution
• Personnel
• Finance
• Accounting
• Computer Services
Accounting Independence
• Information reliability requires accounting independence
o Accounting activities must be separate and independent of the functional
areas maintaining resources .
o Accounting supprots these functions with information but does not actively
participate.
o Decisions makers in these functions requires that such vital information be
supplied by an idependent source
Potential Advantages of DDP
• Cost reductions in hardware and data
entry tasks
• Improved cost control responsibility
• Improved user satisfaction since control is
closer to the user level
• Backup of data can be improved
through the use of multiple data storage
sites
Potential Disadvantages of DDP
• Loss of control
• Mismanagement of company resources
• Hardware and software incompatibilities
• Redundant tasks and data
• Consolidating tasks usually segregated
• Difficulty attracting qualified personnel
• Lack of standard
Manual Process Model
• Transaction processing, information
processing and accounting are
physically performed by people, usually
using paper documents.
• Useful to study because:
o Helps link AIS courses to the other accounting courses
o Often easier to understand business processes when not surrounded in
technology
o Facilitates understanding internal controls
Data Redundancy Problems
• Data Storage – excessive storage cost pf
paper documents and/ or magnetic form
• Data Updating – changes or additions
must be performed multiple times
• Currency of Information – potential
problem of failing to update all affected
files
• Task-Data Dependency – user’s inability to obtain additional information as
needs change
• Data Integration – separate files are difficult to integrate across multiple users.
REA Model
• The REA model is an accounting
framework for modeling an organization’s
o Economic resources; e.g., assets
o economic events; i.e., affect
changes in resources
o economic agents; i.e., individuals
and departments that participate in
an economic event
o interrelationship among resources,
events and agents
• Entity-relationship diagrams (ERD) are
often used to model these relationship.
Accounting as Information Systems User
• Accountants must be able to clearly
convey their needs to the systems professionals who design the system.
• The accountant should actively participate in systems development projects to
ensure appropriate systems design.
Accountants as System Designer
• The accounting function is responsible for the conceptual system, while the
computer functions is responsible for the physical system.
• The conceptual system determines the nature of the information requires, its
sources, its destination, and the accounting rules that must be applied.
Accountants as System Auditors
• External Auditors
o Attest to fairness of financial statements
o Assurance service: broader in scope than traditional attestation audit
• IT Auditors
o Evaluate IT, often as part of external audit
• Internal Auditors
o In-house IS and IT appraisal services
CHAPTER 2 INTRODUCTION TO TRANSACTION PROCESSING
A Financial Transaction is...
• an economic event that affects the assets and equities of the firm, is reflected in
its accounts, and is measured in monetary terms.
• similar types of transactions are grouped together into three transaction cycles:
o the expenditure cycle
o the conversion cycle
o the revenue cycle
Each Cycle has Two Primary Subsystems
• Expenditure Cycle: time lag between the two due to credit relations with
suppliers:
o physical component (acquisition of goods)
o financial component (cash disbursements to the supplier)
• Conversion Cycle :
o the production system (planning, scheduling, and control of the physical
product through the manufacturing process)
o the cost accounting system (monitors the flow of cost information related
to production)
• Revenue Cycle: time lag between the two due to credit relations with
customers :
o physical component (sales order processing)
o financial component (cash receipts)
Manual System Accounting Records
• Source Documents - used to capture and formalize transaction data needed for
transaction processing
• Product Documents - the result of transaction processing
• Turnaround Documents - a product document of one system that becomes a
source document for another system
• Journals - a record of chronological entry
o special journals - specific classes of transactions that occur in high
frequency
o general journal - nonrecurring, infrequent, and dissimilar transactions
• Ledger - a book of financial accounts
o general ledger - shows activity for each account listed on the chart of
accounts
o subsidiary ledger - shows activity by detail for each account type
Computer-Based Systems
• The audit trail is less observable in
computerbased systems than traditional
manual systems.
• The data entry and computer programs
are the physical trail.
• The data are stored in magnetic files.
Computer Files
• Master File - generally contains account
data (e.g., general ledger and subsidiary
file)
• Transaction File - a temporary file containing transactions since the last update
• Reference File - contains relatively constant information used in processing (e.g.,
tax tables, customer addresses)
• Archive File - contains past transactions for reference purposes.
Documentation Techniques
• Documentation in a CB environment is necessary for many reasons.
• Five common documentation techniques:
o Entity Relationship Diagram
o Data Flow Diagrams
o Document Flowcharts
o System Flowcharts
o Program Flowcharts
System Flowcharts…
• are used to represent the relationship between the key elements--input sources,
programs, and output products--of computer systems
• depict the type of media being used (paper, magnetic tape, magnetic disks,
and terminals)
• in practice, not much difference between document and system flowcharts
Modern Systems versus Legacy Systems
• Modern systems characteristics:
o client-server based and process transactions in real time
o use relational database tables
o have high degree of process integration and data sharing
o some are mainframe based and use batch processing
• Some firms employ legacy systems for certain aspects of their data processing.
o Accountants need to understand legacy systems.
• Legacy systems characteristics:
o mainframe-based applications
o batch oriented
o early legacy systems use flat files for data storage
o later legacy systems use hierarchical and network databases
o data storage systems promote a single-user environment that
discourages information integration
Alphabetic Codes
• Used for many of the same purposes as numeric codes
• Can be assigned sequentially or used in block and group coding techniques
• May be used to represent large numbers of items
o Segregation of duties
▪ Manual processes that normally require segregation
of duties are often eliminated
▪ User role: predefined user roles limit a user’s access
to certain functions and data
o Supervision
▪ Supervisors need to acquire a technical and
operational understanding of the new system
▪ Employee-empowered philosophy should not
eliminate supervision
o Accounting records
▪ Corrupted data may be passed from external sources
and from legacy systems
▪ Loss of paper audit trail
o Access control
▪ Critical concern with confidentiality of information
▪ Who should have access to what?
o Access to data warehouse
▪ Data warehouse often involve sharing information
with suppliers and customers
o Contingency planning
▪ Keeping a business going in case of disaster
▪ Key role of servers requires backup plans: redundant
servers or shared servers
o Independent verification
▪ Traditional verifications are meaningless
▪ Need to shift from transaction level to overall
performance level
CHAPTER 13: MANAGING THE SYSTEMS DEVELOPMENT LIFE CYCLE
❖ THE SYSTEMS DEVELOPMENT LIFE CYCLE (SDLC)
o A logical sequence of activities used to:
▪ Identify new systems needs
▪ Develop new systems to support those needs
o A model for reducing risk through planning, execution, control,
and documentation
o The SDLC model may be shown in five stages
OVERVIEW OF PHASE 1 AND 2
❖ Phase 1 – Systems Strategy
o Understand the strategic needs of the organization
o Examine the organization’s mission statement
o Analyze competitive pressures on the firm
o Examine current and anticipated market conditions
o Consider the information system’s implications pertaining to
legacy systems
o Consider concerns registered through user feedback
o Produce a strategic plan for meeting these various and complex
needs
o Produce a timetable for implementation
❖ Phase 2 – Project Initiation
o Assess systems proposals for consistency with the strategic
systems plan
o Evaluate feasibility and cost-benefit characteristics of proposals
o Consider alternative conceptual designs
o Select a design to enter the construct phase of the SDLC
o Examine whether the proposal will require in-house
development, a commercial package, or both
❖ Systems Development Participants
o Systems Professionals – analyze problems in current systems
and formulate solutions
▪ Systems analysis
▪ Systems designers
▪ Programmers
o End Users – primary users of the system
▪ Addressing their needs is critical to success
o Stakeholders – individuals who have an interest in the system
but are not end users
❖ Systems Steering Committee
o Usually includes the CEO, CFO, CIO, senior management from
user areas, and computer services, and internal auditors
o Typical responsibilities
▪ Provide guidance
▪ Resolve conflicts
▪ Review projects and assigning priorities
▪ Budget and allocate funds
▪ Review the status of projects
▪ Determine whether projects should be continued
PHASE 1 – SYSTEMS STRATEGY
❖ Assessing Strategic Information Needs
o Strategic systems planning involves the allocation of resources
at the macro level
▪ Usually a time frame of three to five years
o Key inputs in developing a sounds systems strategy include:
▪ Strategic business needs of the organization
▪ Situations involving legacy systems
▪ End user feedback
❖ Strategic Business Needs
o Vision and Mission
▪ System strategy requires an understanding of top
management’s vision, which has shaped the organization’s
business strategy
o Industry and Competency Analysis
▪ Industry analysis: the driving forces that affect the industry
and their organization’s performance, such as important
trends, significant risks, and potential opportunities
▪ Competency analysis: a complete picture of the
organization’s effectiveness as seen via four strategic
filters: resource, infrastructure, products/services, and
customers
Legacy Systems – use legacy components to help develop an architecture
description
➢ Business Benefits from Architecture Description
o Efficient IT operation
▪ Lower software development, support, and maintenance
costs
▪ Increased portability of applications
▪ Improved interoperability and easier systems and network
management
o Ability to address critical enterprise-wide issues
▪ Easier upgrade and exchange of system components
▪ Better return on existing investment, reduced risk for
future investment
▪ Reduced complexity in IT infrastructure
▪ Maximum return on investment in existing IT infrastructure
▪ The flexibility to make, buy, or outsource IT solutions
▪ Reduced risk overall in new investment and the costs of IT
ownership
o Improved procurement
▪ Buying decisions are simpler, because the information
governing procurement is readily available in a coherent
plan
▪ The procurement process is faster, maximizing
procurement speed and flexibility without sacrificing
architectural coherence
END USER FEEDBACK
▪ Identifying user needs is fundamental to everything else
▪ During phase 1, pertains to substantial perceived problems rather
than minor systems modifications
▪ Has five key phases at this point in the SDLC:
o Recognize problems
o Define problems
o Specify systems objectives
o Determine feasibility and contributions of projects
▪ May entail prioritizing individual projects
o Preparing a formal project proposal
END USER FEEDBACK: RECOGNIZING THE PROBLEM
▪ The need for a new, improved information system is manifested
through various symptoms
o Symptoms may seem vague and innocuous or go unrecognized
initially
▪ The point at which the problem is recognized is often a function of
management’s philosophy
o Reactive management: responds to problems only when they
reach a crisis state
o Proactive management: alert to subtle signs of problems and
aggressively looks for ways to improve
END USER FEEDBACK: DEFINING THE PROBLEM
▪ Managers and end users should
o Avoid leaping to a single definition of a problem
o Keep an open mind and gather facts before deciding
o Learn to intelligently interact with systems professionals
▪ An interactive process between managers/end users and systems
professionals is necessary to arrive at an accurate problem definition
o The next three stages of the end user feedback process involve
this interactive process
END USER FEEDBACK: SPECIFYING SYSTEM OBJECTIVES
▪ The strategic objective of the firm and the operational objectives of
the information systems must be compatible
▪ At this point, the objectives only need to be defined in general terms
END USER FEEDBACK: PRELIMINARY PROJECT FEASIBILITY – TELOS
▪ Technical feasibility: is the technology necessary available
▪ Economic feasibility: are the funds available and appropriate for the
systems
▪ Legal feasibility: does the system fall within legal boundaries?
▪ Operational feasibility: can procedural changes be made to make
the system work?
▪ Schedule feasibility: can the project be completed by an acceptable
time period?
END USER FEEDBACK: PREPARING A FORMAL PROJECT PROPOSAL
▪ A systems project proposal provides management with a basis for
deciding whether or not to proceed with the project
▪ It summarizes the findings of the study and makes a general
recommendation
▪ It outlines the linkage between the objectives of the proposed
system and business objectives of the firm
❖ Strategic Systems Plan
o After collecting input, the steering committee and systems
professionals evaluate the pros and cons of each proposal
o Assessing each potential project’s:
▪ Benefits
▪ Costs
▪ Strategic impact
o Development will proceed on proposals with the greatest
potential for supporting the organization’s business objectives
at the lowest cost
Gantt Chart
Structured Design Approach
▪ A disciplined way of designing systems from the top down
▪ Starts with the “big picture” of the proposed system and gradually
decomposes it into greater detail so that it may be fully understood
▪ Utilizes data flow diagrams (DFDs) and structure diagrams
Object-Oriented Design Approach
▪ It builds information systems from reusable standard components or
objects.
▪ Once created, standard modules can be used in other systems with
similar needs.
▪ A library of modules can be created for future use.
Elements of the Object-Oriented Approach
▪ Objects: equivalent to nouns
▪ vendors, customers, inventory, etc.
▪ Attributes: equivalent to adjectives
▪ part number, quantity on hand, etc.
▪ Operations: equivalent to verbs
▪ review quantity on hand, reorder item
Characteristics of an Inventory Object
Inheritance
▪ Inheritance means that each object instance inherits the attributes
and operations of the class to which it belongs.
▪ Object classes may also inherit from other object classes.
Systems Design
▪ Follows a logical sequence of events:
▪ model the business process and design conceptual views
▪ design normalized database tables
▪ design physical user views (output and input views)
▪ develop process modules
▪ specify system controls
▪ perform system walkthroughs
Data Modeling
▪ Formalizes the data requirements of the business process as a
conceptual model
▪ Entity-relationship diagram (ERD)
▪ the primary tool for data modeling
▪ used to depict the entities or data objects in the system
▪ Each entity in an ERD is a candidate for a conceptual user view that
must be supported by the database.
Normalization
▪ User views in the data model must be supported by normalized
database tables.
▪ Normalization of database tables:
▪ A process of organizing tables so that entities are represented
unambiguously
▪ Eliminates data redundancies and associated anomalies
▪ Depends on the extent to which the data requirements of all
users have been properly specified in the data model
▪ REA modeling facilitates normalization by identifying entities at
their most fundamental levels
▪ The resulting databases will support multiple user views
Physical User Views:
Output Views
▪ Output is the information produced by the system to support user
tasks and decisions.
▪ Output attributes:
-relevance
-summarization
-exception orientation
Output Reporting Techniques
▪ Different users prefer different styles of output…
▪ tables, matrices, charts, and graphs
▪ …and modes of output.
▪ hard copy vs. display screen.
▪ Systems designers must identify these styles and provide output in
the desired style.
Physical User Views:
Input Views
▪ Input views are used to capture the relevant facts in business
processes and transactions (e.g., via REA model):
▪ Resources
▪ Events
▪ Agents
▪ Input may be either hard copy input documents or electronic input.
Designing Hard Copy Input
▪ Items to Consider:
▪ How will the document be handled?
▪ How long will the form be stored and in what type of
environment?
▪ How many copies are required?
▪ What size form is necessary?
Non-standard form can cause printing and storage problems.
Designing Electronic Input
Input may be from either hardcopy or electronic
➢ Sarbanes-Oxley Act
o The 2002 Sarbanes-Oxley (SOX) Act established new corporate
governance rules
▪ Created company accounting oversight board
▪ Increased accountability for company officers and board of
directors
▪ Increased white collar crime penalties
▪ Prohibits a company’s external audit firms from designing and
implementing financial information systems
➢ SOX Section 302
o Section 302—in quarterly and annual financial statements,
management must:
▪ certify the internal controls (IC) over financial reporting
▪ state responsibility for IC design
▪ provide reasonable assurance as to the reliability of the
financial reporting process
▪ disclose any recent material changes in IC
➢ SOX Section 404
o Section 404 – in the annual report on IC effectiveness, management
must:
▪ state responsibility for establishing and maintaining adequate
financial reporting IC
▪ assess IC effectiveness
▪ reference the external auditors’ attestation report on
management’s IC assessment
▪ provide explicit conclusions on the effectiveness of financial
reporting IC
▪ identify the framework management used to conduct their IC
assessment, e.g., COBIT
➢ IT Controls & Financial Reporting
o Modern financial reporting is driven by information technology (IT)
o IT initiates, authorizes, records, and reports the effects of financial
transactions.
▪ Financial reporting IC are inextricably integrated to IT.
o COSO identifies two groups of IT controls:
▪ application controls – apply to specific applications and
programs, and ensure data validity, completeness and
accuracy
▪ general controls – apply to all systems and address IT
governance and infrastructure, security of operating systems
and databases, and application and program acquisition and
development
➢ Centralized IT Structure
o Critical to segregate:
▪ systems development from computer operations
▪ database administrator (DBA) from other computer service
functions
• DBA’s authorizing and systems development’s processing
• DBA authorizes access
▪ maintenance from new systems development
▪ data library from operations
➢ Distributed IT Structure
o Despite its many advantages, important IC implications are present:
▪ incompatible software among the various work centers
▪ data redundancy may result
▪ consolidation of incompatible tasks
▪ difficulty hiring qualified professionals
▪ lack of standards
➢ Organizational Structure IC
o A corporate IT function alleviates potential problems associated with
distributed IT organizations by providing:
▪ central testing of commercial hardware and software
▪ a user services staff
▪ a standard-setting body
▪ reviewing technical credentials of prospective systems
professionals
➢ Audit Procedures
o Review the corporate policy on computer security
▪ Verify that the security policy is communicated to employees
o Review documentation to determine if individuals or groups are
performing incompatible functions
o Review systems documentation and maintenance records
▪ Verify that maintenance programmers are not also design
programmers
o Observe if segregation policies are followed in practice.
▪ E.g., check operations room access logs to determine if
programmers enter for reasons other than system failures
o Review user rights and privileges
▪ Verify that programmers have access privileges consistent with
their job descriptions
➢ Computer Center IC
o Audit objectives:
▪ physical security IC protects the computer center from physical
exposures
▪ insurance coverage compensates the organization for
damage to the computer center
▪ operator documentation addresses routine operations as well
as system failures
o Considerations:
▪ man-made threats and natural hazards
▪ underground utility and communications lines
▪ air conditioning and air filtration systems
▪ access limited to operators and computer center workers;
others required to sign in and out
▪ fire suppression systems installed
▪ fault tolerance
• redundant disks and other system components
• backup power supplies
➢ Audit Procedures
o Review insurance coverage on hardware, software, and physical
facility
o Review operator documentation, run manuals, for completeness
and accuracy
o Verify that operational details of a system’s internal logic are not in
the operator’s documentation
➢ Disaster Recovery Planning
o Disaster recovery plans (DRP) identify:
▪ actions before, during, and after the disaster
▪ disaster recovery team
▪ priorities for restoring critical applications
o Audit objective – verify that DRP is adequate and feasible for
dealing with disasters
o Major IC concerns:
▪ second-site backups
▪ critical applications and databases
• including supplies and documentation
▪ back-up and off-site storage procedures
▪ disaster recovery team
▪ testing the DRP regularly
➢ Second-Site Backups
o Empty shell - involves two or more user organizations that buy or
lease a building and remodel it into a computer site, but without
computer equipment
o Recovery operations center - a completely equipped site; very costly
and typically shared among many companies
o Internally provided backup - companies with multiple data
processing centers may create internal excess capacity
➢ DRP Audit Procedures
o Evaluate adequacy of second-site backup arrangements
o Review list of critical applications for completeness and currency
o Verify that procedures are in place for storing off-site copies of
applications and data
▪ Check currency back-ups and copies
o Verify that documentation, supplies, etc., are stored off-site
o Verify that the disaster recovery team knows its responsibilities
▪ Check frequency of testing the DRP
➢ Benefits of IT Outsourcing
o Improved core business processes
o Improved IT performance
o Reduced IT costs
➢ Risks of IT Outsourcing
o Failure to perform
o Vendor exploitation
o Costs exceed benefits
o Reduced security
o Loss of strategic advantage
➢ Audit Implications of IT Outsourcing
o Management retains SOX responsibilities
o SAS No. 70 report or audit of vendor will be required