BA 378: Accounting Information Systems Instructor: Dr. James R. Coakley.

Slides:



Advertisements
Similar presentations
Information Systems Systems Development Chapter 6.
Advertisements

Systems Development Environment
Information Systems in Business
International Academy Design and Technology Technology Classes.
Control and Accounting Information Systems
Control and Accounting Information Systems
Accounting Information Systems: Definitions and Characteristics.
Auditing Computer-Based Information Systems
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
Auditing Computer Systems
Chapter 1 Assuming the Role of the Systems Analyst
Acquiring Information Systems and Applications
Chapter 21 Successfully Implementing The Information System
An Introduction to Information Systems in Organizations
Accounting Information Systems Chapter Outlines
Effective systems development requires a team effort from stakeholders, users, managers, systems development specialists, and various support personnel,
Lecture 13 Revision IMS Systems Analysis and Design.
Learning Outcome Management System This is a Windows application that interacts with a database to manage learning outcomes for College of Business courses.
Computers: Tools for an Information Age
COSO Framework A company should include IT in all five COSO components: –Control Environment –Risk Assessment –Control activities –Information and communication.
© Prentice Hall, © Prentice Hall, ObjectivesObjectives 1.An understanding of the relationship between data and information 2.Insights.
Principles of Information Systems, Sixth Edition 1 Systems Investigation and Analysis Chapter 12.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Investigation and Analysis Chapter 12.
SDLC. Information Systems Development Terms SDLC - the development method used by most organizations today for large, complex systems Systems Analysts.
6-1 Managerial Decision Making and Information Technology Copyright © 2006 by South-Western, a division of Thomson Learning. All rights reserved. Chapter.
Acquiring Information Systems and Applications
Chapter 17 Acquiring and Implementing Accounting Information Systems
Acquiring Information Systems and Applications
Spreadsheet Management. Sarbanes-Oxley Act (SOX, 2002) Requires “an effective system of internal control” for financial reporting in publicly- held companies.
Copyright 2001 Prentice-Hall, Inc. Essentials of Systems Analysis and Design Joseph S. Valacich Joey F. George Jeffrey A. Hoffer Chapter 1 The Systems.
Systems Analysis and Design: The Big Picture
Chapter 9 Elements of Systems Design
Foundations of Information Systems in Business
Fundamentals of Information Systems, Second Edition 1 Information Systems in Organizations.
1 Systems Analysis and Design in a Changing World, Fourth Edition.
Update from Business Week Number of Net Fraud Complaints – 2002 – 48,252 – 2004 – 207,449.
© 2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Copyright 2002 Prentice-Hall, Inc. Chapter 1 The Systems Development Environment 1.1 Modern Systems Analysis and Design.
Introduction to Information Systems Class Agenda Instructor Introductions –Instructor –Class Objectives Competitive Advantages will be a key area Very.
Chapter 13: Developing and Implementing Effective Accounting Information Systems
Acquiring Information Systems and Applications
Acquiring Information Systems and Applications
What is a Business Analyst? A Business Analyst is someone who works as a liaison among stakeholders in order to elicit, analyze, communicate and validate.
CISB113 Fundamentals of Information Systems Revision.
Acquiring Information Systems and Applications
Copyright 2002 Prentice-Hall, Inc. 1.1 Modern Systems Analysis and Design Jeffrey A. Hoffer Joey F. George Joseph S. Valacich Chapter 1 The Systems Development.
1 ISA&D29-Oct ISA&D29-Oct-13 Systems Analyst: problem solver IT and Strategic Planning.
CHAPTER 13 Acquiring Information Systems and Applications.
Principles of Information Systems, Sixth Edition Systems Investigation and Analysis Chapter 12.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Foundations of Information Systems in Business. System ® System  A system is an interrelated set of business procedures used within one business unit.
IS2210: Systems Analysis and Systems Design and Change Twitter:
ACC 542 Entire Course For more classes visit ACC 542 Week 1 Individual Assignment Computer Information System Brief ACC 542 Week.
MGT 498EDU The learning interface/mgt498edudotcom.
Accounting systems design & evaluation 9434SB 18 March 2002.
Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.
Fundamentals of Information Systems, Sixth Edition
Fundamentals of Information Systems, Sixth Edition
CIS 333Competitive Success/tutorialrank.com
INF 220 RANK Knowledge is divine-- inf220rank.com.
CIS 333 Education for Service-- tutorialrank.com.
CIS 333 RANK Education for Service-- cis333rank.com.
Introduction to Systems Analysis and Design Stefano Moshi Memorial University College System Analysis & Design BIT
System Analysis and Design
System Analysis and Design
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Chapter 21 Successfully Implementing The Information System
Presentation transcript:

BA 378: Accounting Information Systems Instructor: Dr. James R. Coakley

Learning Outcomes College of Business Specific Learning Outcomes – Each student must understand and be able to use team building, collaborative behaviors and project management in the accomplishment of group tasks. – Each student shall demonstrate information technology skills as they apply to today’s business environment – Each student shall have an appreciation of ethical issues in economic competition, managing organizations and participating in the community.

Learning Outcomes Accounting Option Specific Learning Outcomes – Each student shall be able to apply accounting concepts, principles, standards, and processes. – Each student shall demonstrate information technology skills as they apply to today’s business environment to solve business problems and to communicate those solutions. – Each student must demonstrate analytical skills through finding, organizing, assessing and, analyzing data appropriate to a given situation. – Each student shall be able to impart the knowledge and skills listed above to provide insightful advisory judgments and recommendations regarding the accounting for and the business implications of events, conditions, circumstances, and transactions that give rise to business opportunities or problems. – Each student must demonstrate strong organizational skills and a capacity for responsive and timely work.

Internal Control Process Bridge, Mike and Ian Moss. “COSO back in the limelight”

Apply Risk Assessment Framework What is threat? What is likelihood that threat will occur? What is potential damage from threat? What controls can be used to minimize damage? – Prevent – Detect – Correct What is the cost of implementing the control?

Information and Communication Need to understand: – How transactions are initiated – How data are captured in machine-readable form (or converted from source documents into machine-readable form) – How computer files are accessed and updated – How data are processed – How information is reported to internal and external users

Monitoring Effective Supervision Responsibility Accounting Monitor System Activities – Review computer and network security – Detect illegal entry – Test for weaknesses and vulnerabilities – Monitor for viruses, spyware, span, pop-ups, etc. – Track purchased software

Course Topics What is an information system (Chp 1) – Major types of computer-based information systems – Major components in a transaction processing cycle – What is internal control, and why is it an important part of an information system – What are the advantages and disadvantages of End- User Computing

Course Topics – cont’d Data Management Concepts (Chp 12) – Distinguish the traditional file approach from the database approach. What are the primary differences in terms of how they store data? – What are the advantages and disadvantages of the following types of database models: hierarchical, network, and relational? – What alternative file-access methods are available to implement a database at the physical level? What factors should you consider when choosing among these alternative methods? – What is a DBMS and what are some of the key components of a DBMS

Course Topics – cont’d Internal Control – Chp 4 – What are the common exposures within a computer-based information system? How would you ascertain the likelihood that a given exposure will exist? – How do you determine whether the impact of an exposure will be material? – What is the COSO framework? Discuss the extent to which each layer within the COSO framework is implemented within the Coffee Roasting Company. – Which of the General and Application Transaction Processing Controls should be applied to the AOPS of the Coffee Roasting Company? Develop an Application Controls Matrix (similar to Fig 4.9, pg 133)

Course Topics – cont’d Telecommunications – Chp 3 – What are the components of a telecommunications system? – What is the difference between an “analog” signal and a “digital” signal? – What are the advantages and disadvantages of the different types of communication media? – What does the term “bandwidth” mean? What are the implications of greater bandwidth for telecommunications? – What are some of the common options in telecommunications services? – What is a LAN? What is a network topology? – What is a WAN? How is a WAN different from a LAN and why are WANs used? – What is the role of telecommunications protocols?

Course Topics – cont’d Telecommunications – Chp 3 – cont’d – What is the internet? How does the internet work? How did the Internet evolve? – What is the difference between the internet and the World Wide Web (WWW)? How does the WWW work? – Regarding the Intranet: What is an "intranet"? How is an intranet different from the Internet? Why benefits do intranets offer organizations? What types of "traditional" networking problems may be overcome through the use of an intranet? – Regarding Extranets: What is an "extranet"? Provide an example. How is an extranet different from the Internet? Why are benefits do extranets offer organizations? – What are the primary classifications for e-commerce? Provide examples of each type of e-commerce site.

Course Topics – cont’d Security – Chp 5 – What are the threats that affect information security? For each threat, identify controls that can be used to mitigate risks. – What are the security risks associated with the Internet, intranet, extranet? – Contrast public-key encryption with secret-key encryption. What are the advantages and risks of encryption? – Explain and contrast digital certificates, digital cash, and virtual cash

The Traditional SDLC A waterfall approach (1) Systems Investigation (2) Systems Analysis (3) Systems Design (4) Programming (5) Testing (6) Implementation (7) Operation (8) Maintenance Go Back to a previous Stage or Stop An eight-stage systems development life cycle (SDLC)

Course Topics – cont’d Systems Development Life Cycle – Chps 10 & 11 – Understand the major phases of the Systems Development Life Cycle What is prototyping? How does prototyping affect the SDLC What is outsourcing? How does outsourcing affect the SDLC? What are the advantages and risks associated with outsourcing? Why do companies purchase software applications? How does the decision to purchase a software application affect the SDLC? What are the advantages and risks associated with purchasing applications? What is an application service provider (ASP)? How does the use of an ASP differ from purchasing a software application? What are the advantages and risks associated with using an ASP? What is end-user application development? What are the risks and advantages of end-user development?

Course Topics – cont’d IT Audit – Chp 13 – Distinguish between Auditing with, through and around the computer – What techniques are commonly used to audit around the computer? What techniques are commonly used to audit through the computer?

Course Topics Design a database system to capture business transactions – Tables, Referential Integrity, Validation Controls – Forms and Reports Describe how transactions affect an AIS within a company

Projects Project 1: Team Assignment – Database Design and Normalization Project 2: Individual Assignment – Database Development in Access Project 3: Individual Assignment – Incorporate Internal Controls in Access Project 4: Team Assignment – Control Matrix