Module 1: Accounting Systems, Transaction Processing and Internal Control
Module 1: Accounting Systems, Transaction Processing, and Internal Control
Drivers of Business and Information System Change
- Globalization
- Deregulation
- Advances in technology
- Metcalfe's Law: Value of a network doubles with each new connection.
- Moore's Law: Chip density doubles every 18 months.
- Outsourcing and downsizing
What is a System?
- Definition: A system is a set of two or more interrelated components interacting to achieve a goal.
- Goal Conflict: Occurs when components act in their own interest without regard for the overall goal.
- Goal Congruence: Occurs when components acting in their own interest contribute toward the overall goal.
Data vs Information
- Data:
- Facts that are collected, recorded, stored, and processed.
- Insufficient for decision making alone.
- Information:
- Processed data used for decision making.
- Too much information can lead to data overload, making decision-making harder.
Value of Information
Benefits
- Reduces uncertainty
- Improves decisions
- Enhances planning
- Improves scheduling
- Time and resources considerations
- Produces and distributes information
Costs
- Information is valuable when benefits outweigh costs (Benefits $s > Costs $s).
Characteristics of Useful Information
- Relevant: Reduces uncertainty, improves decision making or confirms correct prior expectations.
- Reliable: Free from error or bias; accurately represents organization events or activities.
- Existence: Relevant data pertaining to transactions, assets, obligations, and equity must exist.
- Valid: Only authorized transactions and reports should be processed.
- Complete: Does not omit important aspects of events or activities it measures.
- Timely: Provided in time for decision-makers to make decisions.
- Measurable: Must be measurable transactions, assets, liabilities, and equities accurately processed.
- Understandable: Presented in a useful and intelligible format.
- Verifiable: Can be independently produced by knowledgeable people.
- Accessible: Available to users when needed in a usable format.
Business Transactions
- Definition: A transaction is an agreement between two entities to exchange goods or services, or any event that can be measured in economic terms by an organization.
- It affects the financial position of the business and can be reliably recorded.
- Involves give-get exchanges between two entities.
View of the Firm - Nexus of Contracts
- The firm acts as a nexus of contracts connecting suppliers and customers, engaged in various exchange transactions that direct production.
- Stakeholders interact with the Accounting Information System (AIS) and include vendors, customers, investors, creditors, employees, government agencies, and banks.
Accounting Information System’s Role
- Collect, process, and store data, and report information.
- AIS is the information providing vehicle for an organization, linking various business functions and enabling managerial reports and financial statements.
Business Processes: Activities of Revenue and Expenditure Cycles
Revenue Cycle:
- Prepare management reports.
- Handle sales returns, discounts, allowances, and bad debts.
- Update receivables and deposit payments.
- Receive and answer customer inquiries.
- Take customer orders and enter them into the AIS.
- Invoice customers for goods shipped or services performed.
- Ship goods and perform services.
- Check inventory availability and initiate back orders for goods out of stock.
Expenditure Cycle:
- Prepare, approve, and send purchase orders to vendors.
- Handle purchase returns, discounts, and allowances.
- Update accounts payable and pay vendors for goods and services.
- Receive goods and services and complete the receiving report.
- Store goods and manage vendor invoices.
Accounting Information Systems (AIS) Components
- People: Users of the system.
- Processes and Procedures: For collecting, processing, and storing data.
- Data: Relevant organization information stored and processed.
- Software: Programs to process data.
- IT Infrastructure: Includes computers, peripherals, network, etc.
- Internal Control and Security: Safeguard system and data.
AIS and Business Functions
- Collect and store data about organizational activities, resources, and personnel.
- Transform data into information enabling management to plan, execute, control, and evaluate business functions.
- Facilitate the safeguarding of assets and data.
Value Added by AIS
- Improves quality and reduces costs.
- Enhances efficiency and effectiveness.
- Improves internal control and decision-making capabilities.
- Identifies situations requiring action sooner.
- Reduces uncertainty and provides alternative choices (e.g., what-if analysis).
- Provides accurate and timely information.
AIS and Corporate Strategy
- Organizations have limited resources, thus investments in AIS require a focus on maximizing ROI.
- Understanding of IT developments, business strategy, organizational culture essential for effective AIS implementation.
Value Chain Activities
- Primary Activities:
- Inbound Logistics: Receiving materials and inventory.
- Operations: Converting inputs into finished products.
- Outbound Logistics: Distributing final products to customers.
- Marketing/Sales: Promoting and selling products/services.
- Service: Supporting customers post-sale.
- Support Activities:
- Firm Infrastructure: Organizational structure, management.
- Human Resource Management: Recruiting and training employees.
- Technology Development: Innovations to enhance production and processes.
- Procurement: Acquiring goods and services needed.
Data Processing Cycle
- Stages:
- Data Input: Collection at source, involving documents, forms, etc.
- Data Processing: Storing and organizing the data.
- Information Output: Reports, summaries generated from processed data.
- Determines data entering, who has access, organization, and retrieval protocols.
Data Input Collection and Automation
- Capture data on three facets of each business activity:
- Activity of interest.
- Resources affected by the activity.
- People participating in the activity.
- Utilization of source documents (e.g., Sales order form, Purchase requisition).
- Source data automation: Collect data in machine-readable form at the time of business activity (e.g., ATMs, Point of Sale systems).
Data Accuracy and Control in Input
- Well-designed source documents ensure proper data capture.
- Includes instructions, prompts, and check fields.
- Internal controls with prenumbered documents, mandatory fields support accuracy.
Types of AIS Data Storage
- Paper-based: Ledgers, journals.
- Computer-based:
- General Ledger: Summary-level data for assets, liabilities, revenue, and expenses.
- Subsidiary Ledger: Detailed data for control accounts (Accounts receivable, payable).
Database Structure: Data Model
- Entity: Individual items (people, places, things).
- Attributes: Facts about entities.
- Fields: Storage locations for attributes.
- Records: Grouping related attributes about an entity.
- Files: Group of related records; can be transaction or master files.
- Database comprises interrelated files (transaction files update master files).
File Update Process
- Transaction data includes:
- Account number
- Transaction type
- Transaction date
- Document number
- Transaction amount
- Master file records include:
- Account number
- Credit limit
- Previous balance
- Current balance
- Process consists of verifying data accuracy, matching primary key (account number), updating balances, and printing reports.
Enterprise Resource Planning (ERP)
- Integrates an organization's information into one comprehensive AIS.
ERP Modules:
- Financial
- Human Resources and Payroll
- Order to Cash
- Purchase to Pay
- Manufacturing
- Project Management
- Customer Relationship Management
ERP Advantages:
- Integration of organizational data.
- Data is captured once.
- Improved management visibility and access controls.
- Standardized operating procedures.
- Enhanced customer service.
- Increased manufacturing efficiency.
ERP Disadvantages:
- High costs and time-consuming implementations.
- Potential disruption of existing business processes.
- Complexity and resistance to change.
- Standardization may jeopardize competitive advantage.
Documentation in System Development
- What is Documentation?: A collection of documents and models including narratives, data flow models, and flowcharts describing systems.
- Importance: Understanding various documentation formats is crucial for evaluating internal controls and system functionality.
- Sarbanes-Oxley Act mandates documentation of internal control systems.
Business Process Diagrams
- Visual representations of business activities enhancing user understanding.
- Guidelines for drawing include understanding processes, determining detail levels, organizing diagrams clearly, and refining sketches.
Flowcharts in System Representation
- Use symbols to depict transaction processing and data flow logically, aiding understanding compared to detailed narratives.
- Key elements include inputs and outputs, processing activities, data storage, and decision steps.
- Flowchart symbol categories encompass:
- Input/Output Symbols: Represent documents, displays, etc.
- Processing Symbols: Indicate computer or manual operations.
- Storage Symbols: Depict storage media.
- Flow and Miscellaneous Symbols: Illustrate data and document flows.
Creating Data Flow Diagrams (DFD)
- Graphically represents data flow within systems through basic elements:
- Entity, data flow, data store, process.
- Levels of DFD include context level, level 0, and level 1, each conveying different granularity and activity detail.
- Guidelines include identifying system boundaries, grouping flows, and labelling elements effectively.
Common Threats to AIS
Threat Categories:
- Natural Disasters: Tsunamis, fires, floods, etc.
- Software Errors: Hardware malfunctions, operating system crashes.
- Unintentional Acts: Errors due to carelessness.
- Intentional Acts: Computer crimes, fraud.
- Average of 60,000 malware pieces detected daily.
Forms of Fraud
- Misappropriation of Assets: Theft of a company's assets.
- Fraudulent Financial Reporting: Intentional misrepresentation of financial statements.
Corporate Frauds**
Examples include:
- Price fixing, financial management issues, accounting errors, fraudulent reporting, and cases like Enron and Harris Scarfe leading to public outcry for improved controls.
Fraud Triangle
Components:
- Opportunity: Conditions that allow fraud to occur.
- Pressure: Motivation to commit fraud, driven by various factors including financial and emotional pressures.
- Rationalization: Justifications used by individuals to validate their fraudulent actions.
Computer Fraud and Abuse Techniques
Types of Attacks:
- Hacking: Unauthorized access/modification.
- Social Engineering: Psychological manipulation for unauthorized access.
- Malware: Software designed to cause harm.
- Phishing and Spoofing: Techniques to manipulate victims into divulging sensitive information.
Prevention Strategies:
- Enhancing internal controls, training employees, deploying regular audits, and implementing detection systems.
Social Engineering Techniques
- Techniques like Identity Theft, Pretexting, Pharming, and Shoulder Surfing to gain unauthorized access to confidential information.
Minimizing Threats of Social Engineering
- Strategies include vigilance around unauthorized access, not sharing sensitive information, and securing login information.
Malware Definitions
- Definition of various malware types including viruses, worms, ransomware, and spyware detailing their characteristics and impacts on data integrity and security.
This study guide encapsulates nearly all the information presented in the original transcript, delineating in clear, detailed terms various components of accounting systems, transaction processes, internal controls, fraud, and their implications for organizations.