ACC2400

0.0(0)
studied byStudied by 1 person
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/100

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

101 Terms

1
New cards

Why is AIS important?

AIS looks at how businesses create sales to generate data that can be used for decision-making and improving operational efficiency. It provides a framework for collecting, processing, and analysing financial data, which aids in strategic planning and enhances overall business performance.

2
New cards

What is an information system?

An information system is a coordinated set of components for collecting, storing, and processing data, enabling the management and dissemination of information to support decision-making in an organisation.

3
New cards

List how data should be portrayed or stored.

  1. Access restricted

  2. Accurate

  3. Available

  4. Reputable

  5. Complete

  6. Concise

  7. Consistent

  8. current

  9. objective

  10. relevant

  11. timely

  12. useable

  13. understandable

  14. verifiable

4
New cards

What is the value of information?

The benefit produced by the information minus the cost of producing it.

5
New cards

What is a business process?

  • A set of activities and tasks that, once completed, will accomplish an organisational goal.

  • It involves the transformation of inputs into outputs to create value.

  • Involves various department working together

6
New cards

How does AIS add value to an organisation?

  • improving quality and reducing cost of goods/ services

  • sharing knowledge

  • improving effectiveness and efficiency of supply chain

  • improving internal control structure

7
New cards

How to improve data control for input data?

  • Using prenumbered source documents

  • Assign a sequential number to each new transaction = prevent misplacement and completeness

  • Approving or verifying a transaction = make sure inventory being sold is not out of stock

  • Checking the customer's credit before making a credit sales

8
New cards

List the type of coding for data storage

Systematic assignment of numbers or letters to items to classify and organise them

  • Sequence codes = numbered consecutively

  • Block code = blocks of numbers are reserved for specific categories of data (example product code)

  • Group codes = two or more subgroup of digits used to code an item

  • Mnemonic codes = derived from description of the item

9
New cards

List the type of data processing activities

  1. Creating new data records

  2. Reading, retrieving or viewing existing data

  3. Updating previously stored data

  4. Deleting data

10
New cards

What is batch processing?

  • Updating done periodically

  • Cheaper and more efficient

  • Only for applications that do not need frequent updates

  • time gap between when the transaction occurs and when it is recorded

11
New cards

What is real time processing?

  • Update as each transaction occurs

  • Information is always current = increase decision making usefulness

  • More accurate = data can be corrected in real time or refused

  • Provide significant competitive advantage

12
New cards

What is online batch?

  • The transaction occurs and is recorded in a temporary file

  • All data in temporary data is used to update master data later

13
New cards

How are information output used?

  • Reports are used by employees to control operational activities and by managers to make decision and to formulate business strategies

  • External users = evaluate company profitability, judge creditworthiness, or comply with regulatory requirements

14
New cards

What are the control objectives?

  • Safeguard assets = prevent or detect unauthorised acquisition, use or disposition

  • Provide accurate and reliable information

  • Prepare financial reports in accordance with established criteria

  • Promote and improve operational efficiency

  • Encourage adherence to managerial policies

  • Comply with applicable laws and regulations

15
New cards

What is master data?

  • permanent accounts that carry across time and are connected to transactions

  • provide detail to support transactions

16
New cards

What are the output type?

  • document = record of transaction

  • report = summary of data

  • query = uses data to answer specific questions

17
New cards

What is an ERP system?

  • Integrate all aspects of an organisation's activities

  • It is modularised which catered to company's specific needs

  • Collects, process and stores data and provides the information managers and external parties need to assess the company

  • Centralised database to share information across business processes and coordinate activities

  • data is captured once and available to the entire organisation

  • data can be shared across organisation

18
New cards

List the advantages and disadvantages of an ERP system

Advantages:

  • Provides an integrated, enterprise-wide, single view of the organisation's data and financial situation

  • Data input is captured or keyed once

  • Management gains greater visibility into every area of the enterprise

  • Better access control

  • Standardised across business units

 

Disadvantages:

  • Cost

  • Amount of time required = high risk of project failure due to the time taken to fully implement an ERP system

  • Changes to business processes

  • Complexity

19
New cards

define COBIT 2019

  • General model for how organisations can manage their technology and think about the risk of technology

  • Internationally used framework

  • Framework for the governance and management of IT

  • Allows management to achieve objectives

  • Managing information technology throughout the entire organisation

20
New cards

What are the function of application control?

  1. Preventive controls deter problems before they arise

  2. Detective controls discover problems that are not prevented

  3. Corrective controls identify and correct problems

21
New cards

Define internal control

processes implemented to provide reasonable assurance that the control objectives will be achieved.

22
New cards

What is general control? list some examples.

  • make sure an organisation’s information system and control environment is well managed

Examples:

  • policies on hiring employees

  • password/ system access control

  • procedure to follow when acquiring / installing new software

  • restricting access to physical IT resources

23
New cards

What is application control?

  • prevent, detect, and correction transaction errors and fraud in application program

24
New cards

What are the focus of application control?

  • authorisation, accuracy, completeness, and validity of data inputs

  • processing data correctly and in a timely way

  • outputs are accurate and complete

  • audit trails to track data through input, process and output stage

25
New cards

What is the aim of time based model?

  • uses a combination of preventive, detective and corrective controls

  • mix of controls should last long enough for timely detection of attack and responses to the attack before information is compromised

P>D+R = larger the gaps = the more effective the control system

  • P = time needed to break through preventive control

  • D = time taken to DETECT an attack

  • R = time taken to response to attack and prevent it

26
New cards

What is system development?

  • Process of defining, designing, testing and implementing a new software application or program

27
New cards

What is goal congruence?

When subsystems achieve its goal while contributing the organisation’s goal

28
New cards

List control frameworks

  • Control objectives for Information and Related Technology (COBIT)

  • Committee of Sponsoring Organisation (COSO)

  • Internal control framework

  • Enterprise Risk Management (ERM)

29
New cards

What does COBIT do?

  1. Allows management to benchmark security and control practices of IT environments.

  2. Allows users to be assured that adequate IT security and control exist

  3. Allows auditors to substantiate their internal control opinions and to advise on security control matters

30
New cards

What are the key principles of COBIT?

  1. Meeting stakeholder needs = create information system that adds value to its stakeholders

  2. Covering the enterprise end-to-end = integrates all IT functions and processes into companywide functions and processes

  3. Applying a single, integrated framework = align at high level with other standards and framework

  4. Enabling a holistic approach = result in effective governance and management of all IT functions

  5. Separating governance from management

31
New cards

Define COSO

  • Defines internal control

  • provides guidance for evaluating and enhancing Internal Control systems

32
New cards

What are the components of COSO?

  1. Control environment

  2. Risk Assessment

  3. Control activities

  4. Information and Communication

  5. Monitoring

33
New cards

What are the components of COSO ERM Cube?

  1. Internal Environment

  2. Objective settings

  3. Event identification

  4. Risk Assessment

  5. Risk response

  6. Control activities

  7. Information and Communication

  8. Monitoring

34
New cards

Explain Internal environment

  • Management philosophy, style, and risk appetite

  • Commitment to integrity, ethical values, and competence

  • Internal oversight by Board of Directors

  • Organisational structure

  • Assign authority and responsibility

  • HR attracts, develops, and retains competent people

  • External influences

It is the idea of:

  • Sending the messages

  • Getting the right people

  • Having the right procedures

  • Up to managers to put these in place

35
New cards

Explain Objective setting

  • The board sets objectives that support organisation strategies and missions

  • Are consistent with risk appetite --> how much risk are we willing to accept

36
New cards

Explain Event identification

  • What internal and external things could impact the achievement of objectives?

  • Consider operational risks inside the business and external factors

37
New cards

Explain Risk assessment and Risk response

  1. Assess inherent risk, develop a response, assess residual risk

  2. Estimate risk likelihood and assess impact

  3. Identify potential control activities for the risk

  4. Calculate the costs and benefits of the control activities

  5. Decide on risk response – Accept, Avoid, Share, Reduce (implement control activity)

  • Controls are in place because we know it could go wrong

  • Expected loss = impact x likelihood

38
New cards

Explain Control activities

  • Policies, procedures and rules that provide reasonable assurance that control objectives are met and risk responses are carried out

  • Having segregation of accounting duties such as authorisation, recording and custody --> different system duties

39
New cards

Explain information and communication

  • Information required to do their job

  • Information available and accurate for management

  • People should know how transactions are performed and recorded

  • Internal and external communications

  • Employees need to understand their responsibilities

40
New cards

Explain monitoring

  • Continuous assessment of internal control system to assess performance and identify and deficiencies

  • Compare performances

  • Potential risks

  • Check if controls are working

41
New cards

What are some of the controls used to protect resources?

  • Physical security

  • Process controls

  • IT solutions

42
New cards

List the physical security that can be implemented

  • Entry points to buildings

  • Restrict access to computer equipment and monitor access attempts

  • Access to networks

  • Physical devices

43
New cards

What are some control user access?

  • Authentication control:

    • The process of verifying the identity of the person attempting to access the system

    Types of credential:

    1. Something the person knows

    2. Something the person has

    3. Some physical or behavioural characteristics

  • Authorisation control:

    The process of restricting access of authenticated users to specific portions of the system and limit what actions they are permitted to perform.

44
New cards

Define user access control

Implement a sets of control that protect sensitive information from unauthorised use and access by employees

45
New cards

What are some IT solutions?

  • Anti-Malware controls

  • Network Access

  • Device and software Hardware controls

  • Encryption

46
New cards

List ways that can be used to detect attacks

Log analysis:

  • The process of examining logs to identify evidence of attack

Intrusion detecting system:

  • Comparing observed traffic to its rulebase

  • Produces warning alerts when it detects a suspicion pattern of network traffic

Honeypots:

  • A decoy system

  • Allow company to monitor and intervene when appropriate

Continuous monitoring:

  • Timely identify potential problems and identify opportunity to improve existing controls

47
New cards

What does penetration testing do?

  • Provides rigorous way to test the effectiveness of the organisation's information security

  • Provides data about the effectiveness of the organisation's ability to detect and response

48
New cards

What is an ethical dilemma?

  • A person must decide the best choice of action

  • Ethic is guided by morals, law and policies

  • How human should live or related to each other

  • Standards used by members to decide the right course of action

  • APESB code of ethics is mandatory for all members of the accounting profession

49
New cards

What are ethical theories?

  • help decide the best course of action

  • Derive into consequentialist and non-consequentialist theories

50
New cards

Define consequentialist theories

  • Focus on the outcome or result of a decision

  • Produces good outcome = can be seen as ethical

  • Utilitarianism = maximise the society as a whole rather than individuals

51
New cards

Define non-consequentialist theories

  • Focus on the means of generating the outcome rather than the outcome itself

  • Right in themselves rather than right in a consequence

  • On the process of achieving the outcome

  • Emphasis on duties, rules and obligations

52
New cards

What are the APES code of conduct?

knowt flashcard image
53
New cards

What is corporate governance framework?

  • the framework of rules, relationships, systems and processes within and by which authority is exercised and controlled within corporations

  • What are they doing to achieve their goals

  • How do they manage risks

  • How do they promote ethical behaviour

54
New cards

What makes up trust service framework?

  • It is made up of confidentiality, privacy, processing integrity and availability.

  • These pillars allow business data or information to be protected from unauthorised access. It also ensures that the data is accurate and complete, available to meet operation and contractual obligations

  • Information security is the foundation of system reliability

  • reliable systems are available to use whenever needed

<ul><li><p>It is made up of confidentiality, privacy, processing integrity and availability.</p></li><li><p>These pillars allow business data or information to be protected from unauthorised access. It also ensures that the data is accurate and complete, available to meet operation and contractual obligations</p></li><li><p>Information security is the foundation of system reliability </p></li><li><p>reliable systems are available to use whenever needed</p></li></ul><p></p>
55
New cards

What is the responsibility of auditor for fraud?

  • To identify and assess the risks of material misstatement of the financial report due to the fraud

  • To obtain sufficient appropriate audit evidence regarding the assessed risks of misstatement due to fraud

  • To respond appropriately to fraud

56
New cards

What are the values of data?

  • Data is key to the business process and can generate value

  • The importance and social impact of personal data places obligations on organisations to protect data

  • Complying with regulations requires a cost-benefit approach

  • Recognise that data breaches impact people and their livelihood

  • Customers and other parties entrust their data to the business

  • There is an ethical and moral obligation to protect the data

57
New cards

What makes up trust services framework and information reliability?

  • Accurate: details of transactions and/or events that are recorded in system reflect what actually happened

  • Complete: All transactions and/or events that are recorded in the information system

  • Valid: Only transactions and/or events that actually happened / assets or liabilities that actually exist should be recorded in the information system

  • Authorised: Transactions and/or events are approved and carried out by people with suitable authority and information is accessed and used in approved ways

58
New cards

List some input controls

  • field check

  • sign check

  • limit check

  • range check

  • size check

  • completeness check

  • validity check

  • reasonableness check

  • check digit verification

59
New cards

List some processing controls

  • Data matching

  • File labels checking

  • recalculating batch totals

  • cross-footing balance test

  • zero balance test

  • write protection mechanisms

  • Concurrent update controls

60
New cards

List some output controls

  • User review of outputs

  • Reconciliation procedures

  • external data reconciliation

  • Data transmission control

61
New cards

What are the type of recovery plan of a business?

  • Disaster recovery plan = outlines procedure to restore an organisation’s IT capability in the event its data centre is destroyed

  • Business Continuity plan = specifies how to resume all business processes in the event of a major calamity

62
New cards

What are the four data analytic techniques?

  • Descriptive analytics

  • Diagnostic analytics

  • predictive analytics

  • prescriptive analytics

63
New cards

Define descriptive analytics

  • information that results from the examination of data to understand the past

  • It uses exploratory data anlysis techniques = explores data without testing formal models or hypothesis

64
New cards

Define Diagnostic analytics

  • Build on descriptive analytics

  • answer the question “why did this happen?”

  • Employ confirmatory data analysis techniques = test a hypothesis and provides statistical measures of the likelihood that the evidence refutes or supports a hypothesis

65
New cards

Define Predictive analytics

  • Information that results from analyse that focus on predicting the future

  • Analysing historical data to manifest themselves in the future

66
New cards

Define Prescriptive analytics

  • Information that results from analyses to provide a recommendation what should happen

  • “what should be done?”

  • Programmed actions a system can take based on predictive analytics results

67
New cards

What are the design principles for high quality visualisations?

  • Simplifying the representation of data

  • Emphasising what is important

  • Representing the data ethically = avoid data deception

68
New cards

What is the importance of documentation?

  • Depicting how the system works

  • Training users

  • Designing new system

  • Controlling system development and maintenance costs

  • Standardising communication with others

  • Auditing AIS

  • Documenting business process

69
New cards

Why do accountants need to understand documentation?

  • Understand how system works

  • Evaluate the strength and weakness of a company's internal control

  • To determine if a proposed system meets the needs of its users

  • Read documentation to  follow audit trail

  • Auditing responsibilities

  • Demonstrate their understanding of a system internal controls

70
New cards

What is a flow chart?

Describe an information system:

  • Inputs and Outputs

  • Information activities (processing data)

  • Data storage

  • Data flows

  • Decision steps

71
New cards

What are the types of flow charts?

  • Document

  • System

  • program

72
New cards

Describe a document flow chart

  • Show the flow of documents and information between departments or areas of responsibility

  • Separation of duties between management

73
New cards

Describe a system flow chart

  • Depicts relationship among system inputs, processing and outputs (data processing cycle for a process)

74
New cards

Describe a program flow chart

Illustrates the sequence of logical operations performed by a computer in executing a program

75
New cards

What is a business process program?

  • Visual way to represent the steps or activities in a business process

  • Easily understood of what takes place in it

  • Interactions between entities and within an entity

76
New cards

What is a data flow diagram?

  • Focuses on data flow for processes, sources and destination of the data, and data storage

  • Describe the logical nature of a system —> what tasks the system are doing

77
New cards

What are the pros and cons of a data flow diagram?

Pros:

  • Promote quick and relatively easy project code development

  • Method is easy to learn

  • Easy to read

 

Cons:

  • DFDs for large systems can become cumbersome difficult to translate and read, and time consuming to construc

78
New cards

What are the types of data flow diagram levels?

Context diagram:

  • Highest level (most general)

  • purpose: show inputs and outputs of the system

Level-0:

  • purpose: shows all major activity steps of a system

  • Characteristics: processes are labeled 1.0,2.0 and so on

Level-1:

  • purpose: show one major activity divided into sub-activities

  • characteristics: processes are labeled 1.1, 1.2 and so on

79
New cards

Possible errors with data flow diagram

  1. Black hole: only input flows

  2. Miracle: only output flows

  3. gray hole: insufficient inputs to produce what is needed

  4. Tardis: number process is wrong

  5. Magic: a file that moves by itself from one data store to another

  6. Break and enter: no direct data flow between 2 sources of destination

  7. Use correct symbols and terminologies

80
New cards

What are the typical logical process?

  • Capture: exists if processing needed to record transaction in a format suitable for internal processing

  • validate: verifying, checking

  • Execute: goods shipped, generate output

81
New cards

Why is the revenue cycle important?

  • Maintain and keep a check on the cash flow of the organisation

  • Useful to maintain a steady stream of income for the business

82
New cards

What is a revenue cycle?

  • A set of exchange transaction contracts between the firm and its customer

  • Providing goods or services

  • Collecting cash payments

  • To provide the right product in the right place at the right time for the right price

83
New cards

How can the objective of revenue cycle be achieved?

  • Effectively conduct, record and monitor sales of goods and services

  • To arrange the prompt supply of goods and services

  • To ensure payments for goods and services are correctly received, recorded and banked

84
New cards

What are the key decision in a revenue cycle?

Operational levels:

  • Respond to customer's request and inquires

  • Calculate inventory availability

  • Select good delivery method

Strategy-level:

  • Price setting

  • Sales return and warranty policies

  • Provision of customer credit facilities

  • Cash collection policies and procedures

85
New cards

What are the business activities in a revenue cycle?

  1. sales order entry

  2. shipping

  3. billing and accounts receivable

  4. cash collection

86
New cards

What are the general threats and controls for revenue cycle?

  1. Inaccurate or invalid master data

  • Data processing integrity controls

  • Restrict access to master data

  • Review of all changes to master data

    2. Unauthorised disclosure of sensitive information

  • Access controls

  • Encryption

  • Tokenization

    1. Loss or destruction of master data

  • Backup and disaster recovery procedure

    1. Poor performance

  • Managerial reports

87
New cards

What is the primary objective of the expenditure cycle?

Minimise the  total cost of acquiring and maintaining inventory, supplies and various of services the organisation needs to function

88
New cards

What kind of business decisions could be made in an expenditure cycle?

Strategic level decision:

  • Made by senior management

  • Include creation of policies about purchasing supplies

 

Operational level decision:

  • Determining the optimal level of inventory and supplies to carry

  • Which supplier provide the best quality and service at the best price

  • Evaluate the performance of suppliers

89
New cards

What are four basic business activities performed in an expenditure cycle?

  • Ordering

  • Receiving

  • approving supplier invoices

  • cash disbursements

90
New cards

What are the general EC threats?

  • Inaccurate or invalid master data

  • Unauthorised disclosure of sensitive information

  • loss or destruction of data

  • poor performance

91
New cards

What are some controls for EC threats?

  • Data processing integrity control

  • Restriction of access to master data

  • Reviewing of all changes to master data

  • Access control

  • Encryption

  • Backup and disaster recovery procedure

  • Managerial reports

92
New cards

What are the key activities of the ordering process?

  • Identify a need for items/ services to be purchased

  • Prepare a request for purchase

  • Select the supplier

  • Send purchase order to supplier

  • Purchase requisition (PR) sent to Purchasing department (PD)

  • PD raises purchase order (PO) (legal contract)

  • Evaluate suppliers and process the purchase order

93
New cards

List some of the threats in ordering process

  • stockout/excess inventory

  • purchasing items not needed

  • purchasing items at inflated price

  • purchasing goods of inferior quality

  • unreliable suppliers

  • purchasing from unauthorised suppliers

94
New cards

List some of the controls in ordering process

  • Use barcode/ RFID tags

  • Review and approve the purchase requisition

  • Review purchase orders

  • Track and monitor product quality

  • Maintain a list of approved suppliers

95
New cards

What are the key activities of a receiving process?

  • Delivery arrives

  • Verify the delivery

  • Record details of the delivery

  • Prepare receiving report

  • Send goods to warehouse

96
New cards

What are the key activities in approving supplier invoice?

  • Supplier invoice arrives

  • Verify invoice is valid

  • Update accounts payable

97
New cards

What are the key activities in cash disbursement?

  • Identifying accounts payable that are due to be paid

  • Prepare payment details

  • Approve payment

  • Make payment

  • Record payment details

98
New cards

What is program evaluation and review technique (PERT)?

  • Depicts all project activities that require time and resource with completion estimates

99
New cards

What is a Gantt chart?

  • bar chart that organises activities on the left hand side and project time schedule with a bar drawn to show the progress to date for a particular activity

100
New cards

What are the types of system testing?

  • Walk-throughs : step by step review

  • Processing test data : test all valid transactions and error conditions

  • Acceptance tests: use copies of real data