Presentation is loading. Please wait.

Presentation is loading. Please wait.

Accounting Information Systems, 1st Edition

Similar presentations


Presentation on theme: "Accounting Information Systems, 1st Edition"— Presentation transcript:

1

2 Accounting Information Systems, 1st Edition
Introduction to AIS Accounting Information Systems, 1st Edition

3 Study Objectives An overview of business processes
An overview of an accounting information system The business process linkage throughout the supply chain The IT enablement of business processes Basic computer and IT concepts Examples of IT enablement The internal control structure of organizations The importance of accounting information systems to accountants The relation of ethics to accounting information systems 1. On the topic, “Challenges Facing Financial Accounting,” what did the AICPA Special Committee on Financial Reporting suggest should be included in future financial statements? Non-financial Measurements (customer satisfaction indexes, backlog information, and reject rates on goods purchases). Forward-looking Information Soft Assets (a company’s know-how, market dominance, marketing setup, well-trained employees, and brand image). Timeliness (no real time financial information)

4 An Introduction To Business Processes
Accounting Information System must identify Transactions to record, Capture all details, Properly process into correct accounts, and Provide reports externally and internally. SO 1 An overview of business processes

5 An Introduction To Business Processes
Business Process - a sequence of work steps performed in order to produce a desired result. Examples: Completing a sale Purchasing raw materials Paying employees Paying vendors SO 1 An overview of business processes

6 An Introduction To Business Processes
Four general types of business processes: 1. Revenue Processes (Chapter 8) a. Sales b. Sales return c. Cash collection SO 1 An overview of business processes

7 An Introduction To Business Processes
Four general types of business processes: 2. Expenditure Processes (Chapters 9 and 10) a. Purchase b. Purchase return c. Cash disbursement d. Payroll e. Fixed asset SO 1 An overview of business processes

8 An Introduction To Business Processes
Four general types of business processes: 3. Conversion Processes (Chapter 11) a. Planning b. Resource management c. Logistics SO 1 An overview of business processes

9 An Introduction To Business Processes
Four general types of business processes: 4. Administrative Processes (Chapter 12) a. Capital b. Investment c. General ledger SO 1 An overview of business processes

10 An Introduction To Business Processes
Internal controls are the set of procedures and policies adopted to: safeguard assets, check accuracy and reliability of data, promote operational efficiency, and encourage adherence to prescribed managerial practices. SO 1 An overview of business processes

11 An Introduction To Business Processes
Quick Review When a customer returns goods that were purchased, the business process to accept the return would most likely be a(n) administrative process b. conversion process 1. Revenue Processes a. Sales b. Sales return c. Cash collection c. expenditure process d. revenue process SO 1 An overview of business processes

12 The Accounting Information System
Various Business Processes Exhibit 1-1 SO 2 An overview of an accounting information system

13 The Accounting Information System
Quick Review Which of the following is least likely to be an output of the accounting information system? a check b. a report c. an invoice A bar code is usually an input to the accounting information system. d. a bar code SO 2 An overview of an accounting information system

14 Business Processes Throughout The Supply Chain
Supply Chain - processes and information flows that involve the movement of materials, funds, and related information through the full logistics process, from the acquisition of raw materials to the delivery of finished products to the end user. The supply chain includes all: Vendors Service providers Customers Intermediaries SO 3 The business process linkage throughout the supply chain

15 Business Processes Throughout The Supply Chain
A simplified Supply Chain for McDonald’s Exhibit 1-2 SO 3 The business process linkage throughout the supply chain

16 Business Processes Throughout The Supply Chain
Quick Review Which of the following is not true of the supply chain? The supply chain includes vendors. b. The supply chain excludes customers. c. The supply chain includes information flows. d. The supply chain includes secondary suppliers. SO 3 The business process linkage throughout the supply chain

17 IT Enablement of Processes and the AIS
Information Technology - Computers, ancillary equipment, software, services, and related resources as applied to support business processes. IT Enablement - Using IT systems to enhance efficiency and effectiveness of internal or supply chain processes. SO 4 The IT enablement of business processes

18 IT Enablement of Processes and the AIS
IT usage accomplishes one or more of the following objectives: Increased efficiency of business processes Reduced cost of business processes Increased accuracy of the data related to business processes Business Process Reengineering (BPR) is the purposeful and organized changing of business processes to make them more efficient. SO 4 The IT enablement of business processes

19 IT Enablement of Processes and the AIS
Quick Review Which of the following is not an objective of IT enablement? increased accuracy of data b. reduced cost c. reduced security problems d. increased efficiency SO 4 The IT enablement of business processes

20 Basic Computer and IT Concepts
Basic Computer Data Structures Smallest unit Values = zero or one Data hierarchy: Bit, or binary digit Byte Field Record File Database One character Eight bits One item within record Example - last name Set of related fields Example – employee #, name, pay rate, etc. Set of related records Entire collection of files SO 5 Basic computer and IT concepts

21 Basic Computer and IT Concepts
Quick Review The correct order of the computer data hierarchy is byte, bit, record, field, file, database b. bit, byte, record, field, file, database c. bit, byte, field, record, file, database d. bit, byte, field, record, database, file SO 5 Basic computer and IT concepts

22 Basic Computer and IT Concepts
Relational Database Example - relationship in data of a customer having more than one order. Master File Example - payroll master file maintains the relatively permanent data to process payroll transactions. Example - transaction file is processed against the master file, and year-to-date balances are updated in the master file. Transaction File SO 5 Basic computer and IT concepts

23 Basic Computer and IT Concepts
File Access and Processing Modes Sequential access Random access Indexed Sequential Access Method (ISAM) Batch processing Online processing Real-time processing SO 5 Basic computer and IT concepts

24 Basic Computer and IT Concepts
Data Warehouse and Data Mining Data warehouse Operational database Data mining SO 5 Basic computer and IT concepts

25 Basic Computer and IT Concepts
Quick Review The process of searching for identifiable patterns in data is called sequential processing b. data warehousing c. data mining d. real-time processing SO 5 Basic computer and IT concepts

26 Basic Computer and IT Concepts
Networks and the Internet Network (two or more computers linked together) Types important to accounting: Local Area Network (LAN) Internet Extranet Intranet SO 5 Basic computer and IT concepts

27 Examples of IT Enablement
E-Business Encompasses all forms of: Online electronic trading Consumer-based e-commerce Business-to-business electronic trading Business-to-business process integration Internal use of IT Examples, buying: a book at Amazon.com clothes at Landsend.com SO 6 Examples of IT enablement

28 Examples of IT Enablement
Electronic Data Interchange The intercompany, computer-to-computer transfer of business documents in a standard business format. Example: Transmit purchase orders, invoices, and payments electronically between trading partners. SO 6 Examples of IT enablement

29 Examples of IT Enablement
Point of Sale System A system of hardware and software that captures retail sales transactions by standard bar coding. Example: Customer checks out through the cash register, bar codes are scanned on the items purchased, prices are determined by access to inventory and price list data, sales revenue is recorded, and inventory values are updated. SO 6 Examples of IT enablement

30 Examples of IT Enablement
Automated Matching A computer system in which the software matches an invoice to its related purchase order and receiving report. Example: Ford Motor Company described in text illustrated an automated matching system. SO 6 Examples of IT enablement

31 Examples of IT Enablement
Evaluated Receipt Settlement (ERS) An invoice-less system in which computer software completes an invoice-less match that is a comparison of the purchase order with the goods received. E-Payables and Electronic Invoice Presentment and Payment (EIPP) Web-enabled receipt and payment of vendor invoices. SO 6 Examples of IT enablement

32 Examples of IT Enablement
Enterprise Resource Planning Systems (ERP) Multi-module software system designed to manage all aspects of an enterprise. Usually broken down into modules such as financials, sales, purchasing, inventory management, manufacturing, and human resources. SO 6 Examples of IT enablement

33 Examples of IT Enablement
Quick Review An IT enabled system for purchasing that is an “invoice-less” system is called a(n) automated matching system b. evaluated receipt settlement c. e-payables d. point of sale system SO 6 Examples of IT enablement

34 The Control Environment of Organizations
Risks that impact financial standing: Assets will be stolen or misused Errors in accounting data or information Fraudulent activity Risks inherent in IT systems, such as Erroneous input of data Erroneous processing of data Computer fraud Computer security breaches Hardware or software failure Natural disasters SO 7 The internal control structure of organizations

35 The Control Environment of Organizations
Enterprise Risk Management (ERM) ERM is defined as . . . a process, effected by an entity’s board of directors, management and other personnel, applied in strategy setting and across the enterprise, designed to identify potential events that may affect the entity, and manage risk to be within its risk appetite, to provide reasonable assurance regarding the achievement of entity objectives. SO 7 The internal control structure of organizations

36 The Control Environment of Organizations
Enterprise Risk Management (ERM) Requires management set policies and procedures related to: Internal Environment Objective Setting Event Identification Risk Assessment Risk Response Control Activities Information and Communication Monitoring SO 7 The internal control structure of organizations

37 The Control Environment of Organizations
Enterprise Risk Management (ERM) Management should ensure the following types of control structures exist: Code of ethics (Chapter 3) COSO accounting internal control structure (Chapter 3) IT system control structure (Chapter 4) Corporate governance structure (Chapter 5) IT governance structure (Chapter 6) SO 7 The internal control structure of organizations

38 The Control Environment of Organizations
Quick Review The COSO report written for the purpose of assisting managers in the challenge of managing risk in their organizations is entitled “Internal Controls—Integrated Framework” b. “Enterprise Risk Management—Integrated Framework” c. “Corporate Governance” d. “IT Governance” SO 7 The internal control structure of organizations

39 The Accountant’s Role in AIS
Accountants may be users of the AIS, part of the design or implementation team of an AIS, and/or auditors of an AIS. SO 8 The importance of accounting information systems to accountants

40 The Accountant’s Role in AIS
Quick Review Accountants have some form of use of the AIS in all but which role? user b. programmer c. auditor d. designer SO 8 The importance of accounting information systems to accountants

41 Ethics and the AIS Examples of potential unethical behaviors:
Fraudulent financial reporting Revenue inflation Expense account fraud Inflating hours worked for payroll purposes Computer fraud Hacking Browsing confidential data SO 9 The relation of ethics to accounting information systems

42 Quick Review Ethics and the AIS
Which of the following is not true of unethical behavior? The only category of unethical behavior for accountants is inflating revenue. Accountants are often pressured to help commit or cover up unethical behavior. Hacking is an unethical behavior that accountants should be concerned about. An accounting information system can be used to cover up unethical behavior. SO 9 The relation of ethics to accounting information systems

43 Copyright Copyright © 2008 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.

44

45 Accounting Information Systems, 1st Edition
Foundational Concepts of the AIS Accounting Information Systems, 1st Edition

46 Study Objectives The interrelationships of business processes and the AIS Types of accounting information systems Accounting software market segments Input methods used in business processes The processing of accounting data Outputs from the AIS related to business processes Documenting processes and systems Client-server computing Ethical considerations at the foundation of accounting information systems 1. On the topic, “Challenges Facing Financial Accounting,” what did the AICPA Special Committee on Financial Reporting suggest should be included in future financial statements? Non-financial Measurements (customer satisfaction indexes, backlog information, and reject rates on goods purchases). Forward-looking Information Soft Assets (a company’s know-how, market dominance, marketing setup, well-trained employees, and brand image). Timeliness (no real time financial information)

47 Business Processes and the AIS
Accounting Information System - a system that captures, records, processes, and reports accounting information. Business Process - a prescribed sequence of work steps completed in order to produce a desired result. SO 1 The interrelationships of business processes and the AIS

48 Business Processes and the AIS
Exhibit 2-1 Overall View of Transactions, Processes, and Resulting Reports SO 1 The interrelationships of business processes and the AIS

49 Business Processes and the AIS
Concept Check 1. Which of the following statements is not true? a. Accounting information systems must maintain both detail and summary information. b. Business processes may vary from company to company. c. Regardless of the extent of computerization, all accounting information systems must capture data from the transactions within business processes. d. Business processes categorized as expenditure processes are not intended to be processes that serve customers. SO 1 The interrelationships of business processes and the AIS

50 Types of Accounting Information Systems
Three categories of AIS: Manual systems Legacy systems Modern, integrated IT systems SO 2 Types of accounting information systems

51 Types of Accounting Information Systems
Manual Systems Generally used by small organizations. Entirely manual system would require: Source document Turnaround document General ledger General journal Special journals Subsidiary ledgers SO 2 Types of accounting information systems

52 Types of Accounting Information Systems
Legacy Systems Existing system, often based on old technology. Advantages are that legacy systems: Customized to specific needs. Support unique business processes not inherent in generic accounting software. Contain invaluable historical data that may be difficult to integrate into a new system. Well supported and understood by existing personnel. SO 2 Types of accounting information systems

53 Types of Accounting Information Systems
Legacy Systems Disadvantages are that legacy systems: Costly to maintain. Often lack adequate supporting documentation. Hardware needed to maintain may become obsolete. Not usually based on user-friendly interfaces. Tends to use software written in older computer languages. Often difficult to modify to make user friendly. Difficult to integrate when companies merge. SO 2 Types of accounting information systems

54 Types of Accounting Information Systems
Legacy Systems Decision whether to replace or update legacy systems. Screen scrapers Enterprise application integration Complete replacement of legacy systems SO 2 Types of accounting information systems

55 Types of Accounting Information Systems
Modern, Integrated Systems New programs sold by software development companies are more user friendly than legacy accounting systems. Advantages to purchasing accounting software: Lower cost Shorter implementation time Fewer bugs SO 2 Types of accounting information systems

56 Types of Accounting Information Systems
Concept Check 2. In a manual system, an adjusting entry would most likely be initially recorded in a a. special journal. b. subsidiary ledger. c. general journal. d. general ledger. SO 2 Types of accounting information systems

57 Types of Accounting Information Systems
Concept Check 3. Which of the following is not a disadvantage of maintaining legacy systems? a. There are fewer programmers available to support and maintain legacy systems. b. They contain invaluable historical data that may be difficult to integrate into newer systems. c. Hardware or hardware parts may be unavailable for legacy systems. d. It can be difficult to integrate various legacy systems into an integrated whole. SO 2 Types of accounting information systems

58 Types of Accounting Information Systems
Concept Check 4. Which of the following is a disadvantage of purchased accounting software, compared with software developed in-house? a. It is custom designed for that company. b. It is less costly. c. The implementation time is shorter. d. There are fewer bugs. SO 2 Types of accounting information systems

59 Accounting Software Market Segments
Exhibit 2-2 Accounting Software Market Segments SO 3 Accounting software market segments

60 Accounting Software Market Segments
Exhibit 2-3 Popular Accounting Software Programs within the Market Segments SO 3 Accounting software market segments

61 Accounting Software Market Segments
Concept Check 5. Which of the following is not a method of updating legacy systems? a. Enterprise application integration. b. Backoffice ware. c. Screen scraper. d. Complete replacement. SO 3 Accounting software market segments

62 Accounting Software Market Segments
Concept Check 6. When categorizing the accounting software market, a company with revenue of $8 million would most likely purchase software from which segment? a. Small company. b. Midmarket. c. Beginning ERP. d. Tier 1 ERP. SO 3 Accounting software market segments

63 Input Methods for AIS Input methods used in organizations:
Source documents and keying Bar coding Point of sale systems EDI E-business SO 4 Input methods used in business processes

64 Concept Check Input Methods for AIS
7. An IT system that uses touch-screen cash registers as an input method is called a. Electronic data interchange. b. E-business. c. Point of sale system. d. Source documents and keying. SO 4 Input methods used in business processes

65 Processing Methods Batch Processing -Transactions are grouped.
Advantages Efficient for large volumes of like transactions. Audit trail is maintained. Generally use less costly hardware and software. Hardware and software systems are not as complicated as on-line systems. Generally easier to control than other types of computerized systems. Personnel become specialized and efficient in processing routine transactions. SO 5 The processing of accounting data

66 Processing Methods Batch Processing -Transactions are grouped.
Disadvantages Processing can take longer Adding or deleting records takes much computer maintenance time. Some data duplication is likely. Integration across business processes is difficult in legacy systems that are batch oriented. Lag while all transactions in a batch are collected. May require that transaction and master files be sorted in the same sequential order. SO 5 The processing of accounting data

67 Online and Real-Time Processing
Processing Methods Online and Real-Time Processing Advantages System checks for input errors. Information provided on a timely basis. All files are constantly up to date. The business processes are integrated into a single database so that a single system is achieved. SO 5 The processing of accounting data

68 Online and Real-Time Processing
Processing Methods Online and Real-Time Processing Disadvantages Hardware and software are more expensive than a batch systems. A single database that is shared is more susceptible to unauthorized access of data. Real-time systems can be difficult to audit. SO 5 The processing of accounting data

69 b. Real-time processing.
Processing Methods Concept Check 8. When similar transactions are grouped together for a specified time for processing, it is called a. Online processing. b. Real-time processing. c. Batch processing. d. Group processing. SO 5 The processing of accounting data

70 Outputs of the AIS General Categories of Outputs
Trading partner documents such as checks, invoices, and statements Internal documents Internal reports External reports SO 6 Outputs from the AIS related to business processes

71 Documenting Systems Pictorial Representations of processes and systems include: Process maps System flowcharts Document flowcharts Data flow diagrams Entity relationship diagrams (ER diagrams) SO 7 Documenting processes and systems

72 Documenting Systems Process Maps
Pictorial representations of business processes in which the actual flow and sequence of events in the process are presented in diagram form. Exhibit 2-5 Process Map Symbols SO 7 Documenting processes and systems

73 Common System Flowchart Symbols
Exhibit 2-7 Common System Flowchart Symbols Documenting Systems System Flowcharts Intended to depict the entire system, including inputs, manual and computerized processes, and outputs. SO 7 Documenting processes and systems

74 Payroll System Flowchart
Documenting Systems Exhibit 2-8 Payroll System Flowchart Document Flowcharts Flow of documents and information among departments or units within an organization.

75 Restaurant Process Map
Documenting Systems Exhibit 2-9 Restaurant Process Map

76 Restaurant Document Flowchart
Exhibit 2-10 Restaurant Document Flowchart

77 Restaurant Document Flowchart
Exhibit 2-10 Restaurant Document Flowchart

78 Documenting Systems Data Flow Diagrams
Exhibit 2-11 Restaurant Data Flow Diagram Data Flow Diagrams Used to show the logical design of a system.

79 Entity Relationship Diagrams
Documenting Systems Entity Relationship Diagrams Pictorial representations of the logical structure of databases. Entities - items in the accounting system, such as employees, customers, vendors, and inventory items. Each entity has attributes, such as last name, first name, pay rate, and number of withholdings. SO 7 Documenting processes and systems

80 Entity Relationship Diagrams
Documenting Systems Entity Relationship Diagrams Cardinality refers to how many instances of an entity relate to each instance of another entity. One to one: Each employee has one personnel file. One to many: One supervisor has many employees. Many to many: Each vendor can sell many items. SO 7 Documenting processes and systems

81 Entity Relationship Diagrams Entity Relationship Diagrams
Exhibit 2-11 ERD of Internet Sales Documenting Systems Entity Relationship Diagrams Entity Relationship Diagrams SO 7 Documenting processes and systems

82 d. Entity relationship diagram.
Documenting Systems Concept Check 10. In documenting systems, which pictorial method is described as a method that diagrams the actual flow and sequence of events? a. System flowchart. b. Process map. c. Data flow diagram. d. Entity relationship diagram. SO 7 Documenting processes and systems

83 Client–Server Computing
Two types of computers are networked together to accomplish the application processing. Characteristics: Client and server computer are networked together. System appears to users to be one integrated whole. Individual parts of processing are shared between server and client. Client computer participates in processing or data manipulation in some meaningful way. SO 8 Client-server computing

84 Client–Server Computing
Two Levels of Client-Server Computing: Distributed presentation. Distributed applications. SO 8 Client-server computing

85 Client–Server Computing
Concept Check 12. In a client–server system, when the client PC manipulates data for presentation, but does not do any other significant processing, it is called a. Distributed presentation. b. Distributed application. c. Distributed database. d. Distributed processing. SO 8 Client-server computing

86 Ethical Considerations of AIS
Accountants should be aware of opportunities for unethical behaviors within the various business processes. As a company chooses features and options for its accounting information systems, the importance of monitoring those systems should not be overlooked as a factor in decision making. SO 9 Ethical considerations at the foundation of accounting information systems

87 Copyright Copyright © 2008 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.

88

89 Accounting Information Systems, 1st Edition
Fraud, Ethics, and Internal Control Accounting Information Systems, 1st Edition

90 Study Objectives An introduction to the need for a code of ethics and good internal controls The accounting related fraud that can occur when ethics codes and internal controls are weak or not correctly applied The nature of management fraud The nature of employee fraud The nature of customer fraud The nature of vendor fraud The nature of computer fraud The policies that assist in the avoidance of fraud and errors The maintenance of a code of ethics The maintenance of accounting internal controls The maintenance of information technology controls 1. On the topic, “Challenges Facing Financial Accounting,” what did the AICPA Special Committee on Financial Reporting suggest should be included in future financial statements? Non-financial Measurements (customer satisfaction indexes, backlog information, and reject rates on goods purchases). Forward-looking Information Soft Assets (a company’s know-how, market dominance, marketing setup, well-trained employees, and brand image). Timeliness (no real time financial information)

91 Need for a Code of Ethics and Internal Controls
During 2001 and 2002, several companies were named in regards to fraudulent financial reporting. WorldCom (Audit firm) SO 1 An introduction to the need for a code of ethics and good internal controls

92 Need for a Code of Ethics and Internal Controls
When management is unethical, fraud is likely to occur. Management obligations: Stewardship. Provide accurate reports. Maintain internal controls. Enforce a code of ethics. SO 1 An introduction to the need for a code of ethics and good internal controls

93 Need for a Code of Ethics and Internal Controls
Quick Review The careful and responsible oversight and use of the assets entrusted to management is called a. control environment. b. stewardship. c. preventive control. d. security. SO 1 An introduction to the need for a code of ethics and good internal controls

94 Accounting Related Fraud
Fraud - theft, concealment, and conversion to personal gain of another’s money, physical assets, or information. Misappropriation of Assets - defalcation or internal theft. Misstatement of Financial Records - earnings management or fraudulent financial reporting. SO 2 The accounting related fraud that can occur when ethics codes and internal controls are weak or not correctly applied

95 Accounting Related Fraud
Fraud, three conditions must exist. Exhibit 3-1 The Fraud Triangle SO 2 The accounting related fraud that can occur when ethics codes and internal controls are weak or not correctly applied

96 Accounting Related Fraud
Exhibit 3-2 Categories of Accounting Related Fraud Categories of Accounting-Related Fraud SO 2 The accounting related fraud that can occur when ethics codes and internal controls are weak or not correctly applied

97 Accounting Related Fraud
Quick Review Which of the following is not a condition in the fraud triangle? a. rationalization. b. incentive. c. conversion. d. opportunity. SO 2 The accounting related fraud that can occur when ethics codes and internal controls are weak or not correctly applied

98 The Nature of Management Fraud
Management Fraud is usually in the form of fraudulent financial reporting. Managers misstate financial statements in order to: Increased stock price. Improved financial statements. Enhanced chances of promotion, or avoidance of firing or demotion. Increased incentive-based compensation. Delayed cash flow problems or bankruptcy. SO 3 The nature of management fraud

99 The Nature of Management Fraud
Management Fraud may involve: Overstating revenues and assets. Understating expenses and liabilities. Misapplying accounting principles. Enron’s top management had been hiding debt and losses by using special purpose entities (SPEs). Two Examples: Managers at Xerox approved and encouraged accounting practices that violated GAAP and accelerated revenue recognition. SO 3 The nature of management fraud

100 The Nature of Management Fraud
Quick Review There are many possible indirect benefits to management when management fraud occurs. Which of the following is not an indirect benefit of management fraud? a. delayed exercise of stock options. b. delayed cash flow problems. c. enhanced promotion opportunities. d. increased incentive-based compensation. SO 3 The nature of management fraud

101 The Nature of Employee Fraud
Employee Fraud usually means that an employee steals cash or assets for personal gain. Kinds of Employee Fraud: Inventory theft. Cash receipts theft. Accounts payable fraud. Payroll fraud. Expense account fraud. Kickback Collusion Larceny Skimming SO 4 The nature of employee fraud

102 The Nature of Management Fraud
Quick Review Which of the following is not an example of employee fraud? a. skimming. b. larceny. c. kickbacks. d. earnings management. SO 4 The nature of employee fraud

103 The Nature of Management Fraud
Quick Review The most difficult type of misstatement to discover is fraud that is concealed by a. over-recording the transactions. b. nonrecorded transactions. c. recording the transactions in subsidiary records. d. related parties. SO 4 The nature of employee fraud

104 The Nature of Customer Fraud
Customer Fraud occurs when a customer improperly obtains cash or property from a company, or avoids a liability through deception. Kinds of Customer Fraud: Credit card fraud. Check fraud. Refund fraud. SO 5 The nature of customer fraud

105 The Nature of Vendor Fraud
Vendor Fraud occurs when vendors obtain payments to which they are not entitled. Vendors may: Submit duplicate or incorrect invoices. Send shipments in which the quantities are short. Send lower-quality goods than ordered. SO 6 The nature of vendor fraud

106 The Nature of Vendor Fraud
Quick Review The review of amounts charged to the company from a seller that it purchased from is called a a. vendor audit. b. seller review. c. collusion. d. customer review. SO 6 The nature of vendor fraud

107 The Nature of Computer Fraud
Computer Fraud may include: Industrial espionage. Software piracy. SO 7 The nature of computer fraud

108 The Nature of Computer Fraud
Internal Sources of Computer Fraud Input manipulation Program manipulation Salami technique Trojan horse programs Trap door alterations Output manipulation SO 7 The nature of computer fraud

109 The Nature of Computer Fraud
External Sources of Computer Fraud In most cases conducted by someone outside the company who has gained unauthorized access to the computer. Two Common Types: Hacking. Denial of Service attack (DoS) Spoofing. SO 7 The nature of computer fraud

110 The Nature of Vendor Fraud
Quick Review Which of the following is generally an external computer fraud, rather than an internal computer fraud? a. spoofing b. input manipulation c. program manipulation d. output manipulation SO 6 The nature of vendor fraud

111 Policies to Assist in the Avoidance of Fraud and Errors
Actions to assist in prevention or detection of fraud and errors: Maintain and enforce a code of ethics. Maintain a system of accounting internal controls. Maintain a system of information technology controls. SO 8 The policies that assist in the avoidance of fraud and errors

112 Maintain a Code of Ethics
Sarbanes–Oxley Act of 2002 Requirement - public companies adopt and disclose a code of ethics. Concepts usually found in code of ethics: Obeying applicable laws and regulations. Conduct that is honest, fair, and trustworthy. Avoiding all conflicts of interest. Creating and maintaining a safe work environment. Protecting the environment. SO 9 The maintenance of a code of ethics

113 System of Accounting Internal Controls
Objectives of an internal control system are: Safeguard assets (from fraud or errors). Maintain accuracy and integrity of accounting data. Promote operational efficiency. Ensure compliance with management directives. SO 10 The maintenance of accounting internal controls

114 System of Accounting Internal Controls
Three types of controls: Preventive controls Detective controls Corrective controls COSO Report - five components of internal control: Control environment. Risk assessment. Control activities. Information and communication. Monitoring. SO 10 The maintenance of accounting internal controls

115 System of Accounting Internal Controls
Exhibit 3-5 Factors of the Control Environment Control Environment Example of a less risky control environment Example of a more risky control environment Factor Integrity and ethics The company has a code of The company does not have ethics, and it is rigidly a code of ethics, or if they enforced. have one, it is not enforced. Philosophy and operating Management is very Management is very style conservative in its approach aggressive and risk taking to things such as mergers. in its approach to things such as mergers. SO 10 The maintenance of accounting internal controls

116 System of Accounting Internal Controls
Example of a less risky control environment Example of a more risky control environment Factor Assignment of authority Lines of authority are well Managers have overlapping and responsibility established, and managers’ duties, and oftentimes jobs and duties are clear to managers are not quite sure them. whether or not they have certain responsibilities and authority. Organization and Management carefully trains Management does not spend development of people and cultivates employees to any money or time on the be able to take on more training of employees. responsibility. Attention and direction by Members of the board Members of the board do the board of directors examine reports and hold not prepare for the top management meetings they attend and accountable for the are merely “big-name” accuracy of the reports. figureheads.

117 System of Accounting Internal Controls
Risk Assessment Management must develop a way to: Identify the sources of risks. Determine impact of risks. Estimate chances of risks occurring. Develop an action plan to reduce the impact and probability of risks. Execute the action plan and continue the cycle, beginning again with the first step. SO 10 The maintenance of accounting internal controls

118 System of Accounting Internal Controls
Control Activities Categories: Authorization of transactions Segregation of duties Adequate records and documents Security of assets and documents Independent checks and reconciliation SO 10 The maintenance of accounting internal controls

119 System of Accounting Internal Controls
Control Activities Categories: Authorization of Transactions General authorization Specific authorization SO 10 The maintenance of accounting internal controls

120 System of Accounting Internal Controls
Control Activities Categories: Segregation of Duties Exhibit 3-6 Segregation of Duties SO 10 The maintenance of accounting internal controls

121 System of Accounting Internal Controls
Control Activities Categories: Adequate Records and Documents Supporting documentation for all significant transactions Schedules and analyses of financial information Accounting cycle reports Audit Trail SO 10 The maintenance of accounting internal controls

122 System of Accounting Internal Controls
Control Activities Categories: Security of Assets and Documents Protecting physical assets Protecting information Cost-benefit comparison SO 10 The maintenance of accounting internal controls

123 System of Accounting Internal Controls
Control Activities Categories: Independent Checks and Reconciliation Procedures: Reconciliation Comparison of physical assets with records Recalculation of amounts Analysis of reports Review of batch totals SO 10 The maintenance of accounting internal controls

124 System of Accounting Internal Controls
Quick Review Which control activity is intended to serve as a method to confirm the accuracy or completeness of data in the accounting system? a. authorization b. segregation of duties c. security of assets d. independent checks and reconciliations SO 10 The maintenance of accounting internal controls

125 System of Accounting Internal Controls
Quick Review Proper segregation of functional responsibilities calls for separation of the functions of a. authorization, execution, and payment. b. authorization, recording, and custody. c. custody, execution, and reporting. d. authorization, payment, and recording. SO 10 The maintenance of accounting internal controls

126 System of Accounting Internal Controls
Information and Communication An effective accounting system must: Identify all relevant financial events transactions. Capture the important data of these transactions. Record and process the data through appropriate classification, summarization, and aggregation. Report this summarized and aggregated information to managers. SO 10 The maintenance of accounting internal controls

127 System of Accounting Internal Controls
Information and Communication Monitoring Any system of control must be constantly monitored to assure that it continues to be effective. SO 10 The maintenance of accounting internal controls

128 System of Accounting Internal Controls
Reasonable Assurance of Internal Controls Controls achieve a sensible balance of reducing risk when compared with the cost of the control. Not possible to provide absolute assurance, because: Flawed judgments are applied in decision making. Human error exists in every organization. Controls can be circumvented or ignored. Controls may not be cost beneficial. SO 10 The maintenance of accounting internal controls

129 System of Information Technology Controls
For any business process, there should be both accounting internal controls as in COSO, and IT controls as in the Trust Principles. Risk and controls in IT are divided into five categories: Security Availability Processing integrity. Online privacy. Confidentiality. SO 11 The maintenance of information technology controls

130 System of Information Technology Controls
Quick Review AICPA Trust Principles identify five categories of risks and controls. Which category is best described by the statement, “Information process could be inaccurate, incomplete, or not properly authorized”? a. security b. availability c. processing integrity d. confidentiality SO 11 The maintenance of information technology controls

131 Copyright Copyright © 2008 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.

132

133 Accounting Information Systems, 1st Edition
Internal Controls and Risks in IT Systems Accounting Information Systems, 1st Edition

134 Study Objectives An overview of internal controls for IT systems
General controls for IT systems General controls from a Trust Principles perspective Hardware and software exposures in IT systems Application software and application controls Ethical issues in IT systems 1. On the topic, “Challenges Facing Financial Accounting,” what did the AICPA Special Committee on Financial Reporting suggest should be included in future financial statements? Non-financial Measurements (customer satisfaction indexes, backlog information, and reject rates on goods purchases). Forward-looking Information Soft Assets (a company’s know-how, market dominance, marketing setup, well-trained employees, and brand image). Timeliness (no real time financial information)

135 Internal Controls for IT Systems
Accounting Information System - collects, processes, stores, and reports accounting information. Computer-based systems have been described as being of two types: General controls Application controls SO 1 An overview of internal controls for IT systems

136 Internal Controls for IT Systems
Exhibit 4-1 General and Application Controls in IT Systems Application controls used to control inputs, processing, and outputs. General controls apply overall to the IT accounting system. SO 1 An overview of internal controls for IT systems

137 Internal Controls for IT Systems
Concept Check Internal controls that apply overall to the IT system are called a. Overall controls. b. Technology controls. c. Application controls. d. General controls. SO 1 An overview of internal controls for IT systems

138 General Controls in IT Systems
Five categories of general controls: Authentication of users and limiting unauthorized access Hacking and other network break-ins Organizational structure Physical environment and physical security of the system Business Continuity SO 2 General controls for IT systems

139 General Controls in IT Systems
Authentication of Users and Limiting Unauthorized Users Authentication of users Log-in User IDs Password Smart card Security token Two factor authentication Biometric devices Computer log Nonrepudiation User profile Authority table Configuration tables SO 2 General controls for IT systems

140 General Controls in IT Systems
Hacking and other Network Break-Ins Firewall Symmetric encryption Public key encryption Wired equivalency privacy Wireless protected access Service set identifier Virtual private network Secure sockets layer Virus Antivirus software Vulnerability assessment Intrusion detection Penetration testing SO 2 General controls for IT systems

141 General Controls in IT Systems
Organizational Structure IT governance committee, responsibilities include: Align IT investments to business strategy. Budget funds and personnel for the most effective use of the IT systems. Oversee and prioritize changes to IT systems. Develop, monitor, and review all IT operational policies. Develop, monitor, and review security policies. SO 2 General controls for IT systems

142 General Controls in IT Systems
Organizational Structure Duties to be segregated are: Systems analysts Programmers Operators Database administrator SO 2 General controls for IT systems

143 General Controls in IT Systems
Physical Environment and Security Physical access controls: Limited access to computer rooms through employee ID badges or card keys Video surveillance equipment Logs of persons entering and exiting the computer rooms Locked storage of backup data and offsite backup data SO 2 General controls for IT systems

144 General Controls in IT Systems
Business Continuity Business Continuity Planning (BCP) Business continuity related to IT systems: A strategy for backup and restoration of IT systems, to include redundant servers, redundant data storage, daily incremental backups, a backup of weekly changes, and offsite storage of daily and weekly backups. A disaster recovery plan. SO 2 General controls for IT systems

145 General Controls in IT Systems
Concept Check Which of the following is not a control intended to authenticate users? a. User log-in. b. Security token. c. Encryption. d. Biometric devices. SO 2 General controls for IT systems

146 General Controls in IT Systems
Concept Check An IT governance committee has several responsibilities. Which of the following is least likely to be a responsibility of the IT governance committee? Develop and maintain the database and ensure adequate controls over the database. Develop, monitor, and review security policies. Oversee and prioritize changes to IT systems. d. Align IT investments to business strategy. SO 2 General controls for IT systems

147 General Controls from an AICPA Trust Principles Perspective
AICPA Trust Principles categorizes IT controls and risks into five categories: Security Availability Processing integrity Online privacy Confidentiality SO 3 General controls from a Trust Principles perspective

148 General Controls from an AICPA Trust Principles Perspective
Risks In Not Limiting Unauthorized Users IT controls that lessen risk of unauthorized users gaining access to the IT system: user ID, password, security token, biometric devices, log-in procedures, access levels, computer logs, and authority tables. SO 3 General controls from a Trust Principles perspective

149 General Controls from an AICPA Trust Principles Perspective
Risks From Hacking or Other Network Break-Ins Controls that may be applied are, firewalls encryption of data, security policies, security breach resolution, secure socket layers (SSL), virtual private network (VPN), network (VPN), SO 3 General controls from a Trust Principles perspective

150 General Controls from an AICPA Trust Principles Perspective
Risks From Hacking or Other Network Break-Ins Controls that may be applied are, wired equivalency privacy (WEP), wireless protected access (WPA), service set identifier (SSID), antivirus software, vulnerability assessment, penetration testing, and intrusion detection. SO 3 General controls from a Trust Principles perspective

151 General Controls from an AICPA Trust Principles Perspective
Risks From Environmental Factors Environmental changes that affect the IT system can cause availability risks and processing integrity risks. Physical Access Risks Business Continuity Risks SO 3 General controls from a Trust Principles perspective

152 General Controls from an AICPA Trust
Concept Check AICPA Trust Principles describe five categories of IT risks and controls. Which of these five categories would best be described by the statement, “The system is protected against unauthorized access”? a. Security. b. Confidentiality. c. Processing integrity. d. Availability. SO 3 General controls from a Trust Principles perspective

153 General Controls from an AICPA Trust
Concept Check The risk that an unauthorized user would shut down systems within the IT system is a(n) a. Security risk. b. Availability risk. c. Processing integrity risk. d. Confidentiality risk. SO 3 General controls from a Trust Principles perspective

154 Hardware and Software Exposures
Typical IT system components that represent “entry points” where the risks must be controlled. The operating system The database The database management system (DBMS) Local area networks (LANs) Wireless networks E-business conducted via the Internet Telecommuting workers Electronic data interchange (EDI) Application software SO 4 Hardware and software exposures in IT systems

155 Hardware and Software Exposures Typical “entry points”
Exhibit 4-6

156 Hardware and Software Exposures
The Operating System The software that controls the basic input and output activities of the computer. Provides the instructions that enable the CPU to: read and write to disk, read keyboard input, control output to the monitor, manage computer memory, and communicate between the CPU, memory, and disk storage. SO 4 Hardware and software exposures in IT systems

157 Hardware and Software Exposures
The Operating System Unauthorized access would allow an unauthorized user to: Browse disk files or memory for sensitive data or passwords. Alter data through the operating system. Alter access tables to change access levels of users. Alter application programs. Destroy data or programs. SO 4 Hardware and software exposures in IT systems

158 Hardware and Software Exposures
The Database A large disk storage for accounting and operating data. Controls such as: user IDs, passwords, authority tables, firewalls, and encryption are examples of controls that can limit exposure. SO 4 Hardware and software exposures in IT systems

159 Hardware and Software Exposures The Database Management System
A software system that manages the interface between many users and the database. Exhibit 4-7 SO 4 Hardware and software exposures in IT systems

160 Hardware and Software Exposures The Database Management System
Exhibit 4-6 The Database Management System A software system that manages the interface between many users and the database. SO 4 Hardware and software exposures in IT systems

161 Hardware and Software Exposures The Database Management System
A software system that manages the interface between many users and the database. Physical access, environmental, and business continuity controls can help guard against the loss of the data or alteration to the DBMS. SO 4 Hardware and software exposures in IT systems

162 Hardware and Software Exposures
LANS and WANS A local area network, or LAN, is a computer network covering a small geographic area. A group of LANs connected to each other is called a wide area network, or WAN. SO 4 Hardware and software exposures in IT systems

163 Hardware and Software Exposures
LANS and WANS Exhibit 4-6 Controls: limit unauthorized users firewalls encryption virtual private networks SO 4 Hardware and software exposures in IT systems

164 Hardware and Software Exposures
Exhibit 4-6 Wireless Networks Same kind of exposures as a local area network. SO 4 Hardware and software exposures in IT systems

165 Hardware and Software Exposures
Wireless Networks Same kind of exposures as a local area network. Controls include: wired equivalency privacy (WEP) or wireless protected access (WPA), station set identifiers (SSID), and encrypted data. SO 4 Hardware and software exposures in IT systems

166 Hardware and Software Exposures Internet and World Wide Web
Exhibit 4-6 Internet and World Wide Web The use of dual firewalls can help prevent hackers or unauthorized users from accessing the organization’s internal network of computers. SO 4 Hardware and software exposures in IT systems

167 Hardware and Software Exposures Telecommuting Workers
Exhibit 4-6 Telecommuting Workers The organization’s security policy should address the security expectations of workers who telecommute, and such workers should connect to the company network via a virtual private network.

168 Hardware and Software Exposures Electronic Data Interchange
Company-to-company transfer of standard business documents in electronic form. EDI controls include: authentication, computer logs, and network break-in controls. Exhibit 4-6

169 Hardware and Software Exposures
Concept Check The risk of an unauthorized user gaining access is likely to be a risk for which of the following areas? a. Telecommuting workers. b. Internet. c. Wireless networks. d. All of the above. SO 4 Hardware and software exposures in IT systems

170 Application Software and Application Controls
Applications software accomplishes end user tasks such as: word processing, spreadsheets, database maintenance, and accounting functions. Applications controls - intended to improve the accuracy, completeness, and security of input, process, and output. SO 5 Application software and application controls

171 Application Software and Application Controls
Input Controls Date input - data converted from human readable form to computer readable form. Input controls are of four types: Source document controls Standard procedures for data preparation and error handling Programmed edit checks Control totals and reconciliation SO 5 Application software and application controls

172 Application Software and Application Controls Source Document Controls
Source document -paper form used to capture and record the original data of an accounting transaction. Note: Many IT systems do not use source documents. General controls such as computer logging of transactions and keeping backup files, become important. Where source documents are used, several source document controls should be used. SO 5 Application software and application controls

173 Application Software and Application Controls
Source Document Controls Form Design - Both the source document and the input screen should be well designed so that they are easy to understand and use, logically organized into groups of related data. Form Authorization and Control: Area for authorization by appropriate manager Prenumbered and used in sequence Blank source documents should be controlled SO 5 Application software and application controls

174 Application Software and Application Controls
Source Document Controls Retention of Source Documents: Retained and filed for easy retrieval Part of the audit trail. SO 5 Application software and application controls

175 Application Software and Application Controls
Standard Procedures for Data Input Data Preparation – standard data collection procedures reduce the chance of lost, misdirected, or incorrect data collection from source documents. Error Handling: Errors should be logged, investigated, corrected, and resubmitted for processing Error log should be regularly reviewed by an appropriate manager SO 5 Application software and application controls

176 Application Software and Application Controls
Programmed Input Validation Checks Data should be validated and edited to be as close to the original source of data as possible. Input validation checks include: 1. Field check 2. Validity check 3. Limit check 4. Range check 5. Reasonableness check 6. Completeness check 7. Sign check 8. Sequence check 9. Self-checking digit SO 5 Application software and application controls

177 Application Software and Application Controls
Control Totals and Reconciliation Control totals are subtotals of selected fields for an entire batch of transactions. Three types: record counts, batch totals, and hash totals. SO 5 Application software and application controls

178 Application Software and Application Controls
Processing Controls Intended to prevent, detect, or correct errors that occur during processing. Ensure that application software has no errors. Control totals, limit and range tests, and reasonableness and sign tests. Computer logs of transactions processed, production run logs, and error listings. SO 5 Application software and application controls

179 Application Software and Application Controls
Output Controls Reports from the various applications. Two primary objectives of output controls: to assure the accuracy and completeness of the output, and to properly manage the safekeeping of output reports to ascertain that security and confidentiality of the information is maintained. SO 5 Application software and application controls

180 Application Software and Application Controls
Concept Check Which programmed input validation check compares the value in a field with related fields with determine whether the value is appropriate? a. Completeness check. b. Validity check. c. Reasonableness check. d. Completeness check. SO 5 Application software and application controls

181 Application Software and Application Controls
Concept Check Which programmed input validation check determines whether the appropriate type of data, either alphabetic or numeric, was entered? a. Completeness check. b. Validity check. c. Reasonableness check. d. Field check. SO 5 Application software and application controls

182 Application Software and Application Controls
Concept Check Which programmed input validation makes sure that a value was entered in all of the critical fields? a. Completeness check. b. Validity check. c. Reasonableness check. d. Field check. SO 5 Application software and application controls

183 Application Software and Application Controls
Concept Check Which control total is the total of field values that are added for control purposes, but not added for any other purpose? a. Record count. b. Hash total. c. Batch total. d. Field total. SO 5 Application software and application controls

184 Ethical Issues in Information Technology
Besides fraud, there are many kinds of unethical behaviors related to computers, such as: Misuse of confidential customer information. Theft of data, such as credit card information, by hackers. Employee use of IT system hardware and software for personal use or personal gain. Using company to send offensive, threatening, or sexually explicit material. SO 6 Ethical issues in IT systems

185 Copyright Copyright © 2008 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.

186

187 Accounting Information Systems, 1st Edition
Corporate Governance and the Sarbanes-Oxley Act Accounting Information Systems, 1st Edition

188 Study Objectives An overview of corporate governance
Participants in the corporate governance process The functions within the corporate governance process The history of corporate governance The Sarbanes–Oxley Act of 2002 The impact of the Sarbanes–Oxley Act on corporate governance The importance of corporate governance in the study of accounting information systems Ethics and corporate governance 1. On the topic, “Challenges Facing Financial Accounting,” what did the AICPA Special Committee on Financial Reporting suggest should be included in future financial statements? Non-financial Measurements (customer satisfaction indexes, backlog information, and reject rates on goods purchases). Forward-looking Information Soft Assets (a company’s know-how, market dominance, marketing setup, well-trained employees, and brand image). Timeliness (no real time financial information)

189 An Overview of Corporate Governance
Accountants would characterize corporate governance as a system of checks and balances whereby a company’s leadership is held accountable for building: shareholder value and creating confidence in the financial reporting processes. Tone at the top - set of values and behaviors in place for the corporate leaders. SO 1 An overview of corporate governance

190 An Overview of Corporate Governance
Concept Check Which of the following is not considered a component of corporate governance? a. Board of directors oversight. b. IRS audits. c. Internal audits. d. External audits. SO 1 An overview of corporate governance

191 An Overview of Corporate Governance
Concept Check Good corporate governance is achieved when the interests of which of the following groups are balanced? a. Internal auditors and external auditors. b. Shareholders and regulators. c. Shareholders, the corporation, and the community. d. Regulators and the community. SO 1 An overview of corporate governance

192 An Overview of Corporate Governance
Concept Check Corporate governance is primarily concerned with a. enhancing the trend toward more women serving on boards of directors.. b. promoting an increase in hostile takeovers. c. promoting the legitimacy of corporate charters. d. emphasizing the relative roles, rights, and accountability of a company’s stakeholders. SO 1 An overview of corporate governance

193 Participants in Corporate Governance Process
Exhibit 5-1 Stakeholders as participants in the corporate governance process Stakeholders are all of the different people who have some form of involvement or interest in the business. SO 2 Participants in the corporate governance process SO 1 An overview of corporate governance

194 Participants in Corporate Governance Process
Exhibit 5-1 Stakeholders as participants in the corporate governance process Internal Stakeholders Shareholders Board of directors Audit committee Management Employees Internal auditors

195 Participants in Corporate Governance Process
Exhibit 5-1 Stakeholders as participants in the corporate governance process External Stakeholders External auditors Governing bodies Communities Investors Creditors Customers and suppliers

196 Participants in Corporate Governance Process
Concept Check The governing body responsible for establishing the COSO framework for internal controls evaluations is the a. Treadway Commission. b. SEC. c. PCAOB. d. FASB.

197 Functions Within Corporate Governance Process
Management Oversight Policies and procedures in place to lead the directorship of the company. Features of effective leaders: recruiting, motivating, evaluating, problem solving, and decision making. SO 3 The functions within the corporate governance process

198 Functions Within Corporate Governance Process
Internal Controls and Compliance Accurate and transparent financial reporting requires a process approach. Six-step process for internal controls: Define key activities and resources. Define objectives of each activity. Obtain input from experienced users and advisors on the effective design of controls. Formally document the details of controls. Test the effectiveness of controls. Engage in continuous improvement. SO 3 The functions within the corporate governance process

199 Functions Within Corporate Governance Process Financial Stewardship
Discipline, respect, and accountability encourage good financial stewardship. Earnings management - manipulating financial information. early recognition of revenues early shipment of products falsification of customers falsification of invoices or other records allowing customers to take products without taking title to the products SO 3 The functions within the corporate governance process

200 Functions Within Corporate Governance Process
Ethical Conduct Integrity, fairness, and accountability are the underlying concepts in each of the roles of corporate governance. SO 3 The functions within the corporate governance process

201 Functions Within Corporate Governance Process
Concept Check When financial information is presented properly and its correctness is verifiable, it is a. transparent. b. compliant. c. accurate. d. accountable. SO 3 The functions within the corporate governance process

202 History of Corporate Governance
Corporate governance first came to light in the 1930s with the creation of the Securities and Exchange Commission and in reaction to the accounting problems connected with the market crash of 1929 and the Great Depression. Over the years, the concept has evolved as the business world has shifted focus from materiality to earnings pressures and, most recently, to the requirements of the Sarbanes–Oxley Act. SO 4 The history of corporate governance

203 Sarbanes–Oxley Act of 2002 The Sarbanes–Oxley Act (“the Act”) applies to public companies and the auditors of public companies. The Public Company Accounting Oversight Board (PCAOB) was established. PCAOB comprises five members appointed by the SEC. PCAOB governs the work of auditors of public companies PCAOB has investigative and disciplinary authority over the performance of public accounting firms. SO 5 The Sarbanes-Oxley Act of 2002

204 Sarbanes–Oxley Act of 2002 Certain sections of the Act pertain to audit services. 201—Services outside scope of practice of auditors. 301—Public company audit committees. 302—Corporate responsibility for financial reports. 906—Failure of corporate officers to certify financial reports. 401—Disclosures in periodic reports. 404—Management assessment of internal controls. 406—Code of ethics for senior financial officers. SO 5 The Sarbanes-Oxley Act of 2002

205 Sarbanes–Oxley Act of 2002 Certain sections of the Act pertain to audit services. 409—Real-time disclosures. 802—Criminal penalties for altering documents. 1102—Tampering with a record or otherwise impeding an official proceeding. 806—Protection for employees of publicly traded companies who provide evidence of fraud. SO 5 The Sarbanes-Oxley Act of 2002

206 Concept Check Sarbanes–Oxley Act of 2002
Which of the following nonaudit services may be performed by auditors for a public-company audit client? a. IT consulting regarding the general ledger system for a newly acquired division. b. Programming assistance on the new division’s general ledger system. c. Human resources consulting regarding personnel for the new division. d. Income tax return preparation for the new division. SO 5 The Sarbanes-Oxley Act of 2002

207 c. It protects whistleblowers’ jobs and prohibits retaliation.
Sarbanes–Oxley Act of 2002 Concept Check Section 806 of the Sarbanes–Oxley Act is often referred to as the whistleblower protection provision of the Act because a. It offers stock ownership to those who report instances of wrongdoing. b. It specifies that whistleblowers must be terminated so as to avoid retaliation. c. It protects whistleblowers’ jobs and prohibits retaliation. d. It provides criminal penalties for the alteration or destruction of documents. SO 5 The Sarbanes-Oxley Act of 2002

208 Impact of Sarbanes–Oxley Act
Management Oversight More knowledgeable about accounting principles and financial systems. Management certification of financial information. Rigid penalties for noncompliance. SO 6 The impact of the Sarbanes–Oxley Act on corporate governance

209 Impact of Sarbanes–Oxley Act Internal Controls and Compliance
Extra work for accountants, IT departments, and executives. More paperwork is now prepared, retained, and filed with the SEC. More timely information is required. Section 404 requires companies to monitor their systems to find weaknesses in internal controls. SO 6 The impact of the Sarbanes–Oxley Act on corporate governance

210 Impact of Sarbanes–Oxley Act
Financial Stewardship Act has caused many companies to take a deeper look at their policies and procedures that govern corporate conduct. Ethical Conduct codes of conduct performance evaluation models communications SO 6 The impact of the Sarbanes–Oxley Act on corporate governance

211 Impact of Sarbanes–Oxley Act
Concept Check In the corporate governance chain of command, the audit committee is accountable to a. The company’s vendors and other creditors. b. Management and employees. c. Governing bodies such as the SEC and PCAOB. d. The external auditors. SO 6 The impact of the Sarbanes–Oxley Act on corporate governance

212 Impact of Sarbanes–Oxley Act
Concept Check Which of the following is true regarding the post-Sarbanes–Oxley role of the corporate leader? a. More emphasis is placed on strategic planning and less emphasis on financial information. b. The corporate leader must be more in tune with IT to provide corporate governance solutions. c. The corporate leader must be more focused on merger and acquisition targets. d. The corporate leader tends to be less involved with the board of directors. SO 6 The impact of the Sarbanes–Oxley Act on corporate governance

213 Corporate Governance in the Study of AIS
The Sarbanes–Oxley Act heightens the business value of financial information. Since the Act requires more financial information and faster financial reporting, there is more attention than ever on the importance of the accountants and IT personnel who provide financial information for the company. SO 7 Importance of corporate governance in the study of AIS

214 Ethics and Corporate Governance
Internal stakeholders may sometimes have difficult ethical choices to make when their personal interests conflict with the interests of shareholders. Corporate governance must provide the structure to make sure that a system of financial stewardship is maintained, even when times get tough. SO 8 Ethics and corporate governance

215 Ethics and Corporate Governance
Concept Check Many corporate frauds involve a. Managers soliciting assistance from their subordinates. b. A small deceptive act that intensifies into criminal behavior c. An earnings management motive. d. All of the above. SO 8 Ethics and corporate governance

216 Copyright Copyright © 2008 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.

217

218 Accounting Information Systems, 1st Edition
IT Governance Accounting Information Systems, 1st Edition

219 Study Objectives An overview of IT governance and its role in strategic management An overview of the system development life cycle (SDLC) The elements of the systems planning phase of the SDLC The elements of the systems analysis phase of the SDLC The elements of the systems design phase of the SDLC The elements of the systems implementation phase of the SDLC The elements of the operation and maintenance phase of the SDLC The critical importance of IT governance in an organization Ethical considerations related to IT governance 1. On the topic, “Challenges Facing Financial Accounting,” what did the AICPA Special Committee on Financial Reporting suggest should be included in future financial statements? Non-financial Measurements (customer satisfaction indexes, backlog information, and reject rates on goods purchases). Forward-looking Information Soft Assets (a company’s know-how, market dominance, marketing setup, well-trained employees, and brand image). Timeliness (no real time financial information)

220 Introduction to IT Governance
How does a company decide, which IT systems are appropriate? which accounting software package to buy? when it has outgrown its accounting software or when to upgrade the software? whether to use IT systems to sell products on the web? whether to establish a data warehouse for analyzing data such as sales trends? whether to use ERP systems or customer relationship management (CRM) software? SO 1 An overview of IT governance and its role in strategic management

221 Introduction to IT Governance
IT systems must be strategically managed. Strategic management is the process of determining the strategic vision for the organization, developing the long-term objectives, creating the strategies that will achieve the vision and objectives, and implementing those strategies. SO 1 An overview of IT governance and its role in strategic management

222 Introduction to IT Governance
Proper management, control, and use of IT systems is IT governance. IT Governance is defined as: [A] structure of relationships and processes to direct and control the enterprise in order to achieve the enterprise’s goals by adding value while balancing risk versus return over IT and its processes. IT governance provides the structure that links IT processes, IT resources and information to enterprise strategies and objectives. SO 1 An overview of IT governance and its role in strategic management

223 Introduction to IT Governance
Management must focus on the following activities: aligning IT strategy with the business strategy cascading strategy and goals down into the enterprise providing organizational structures that facilitate the implementation of strategy and goals insisting that an IT control framework be adopted and implemented measuring IT’s performance SO 1 An overview of IT governance and its role in strategic management

224 Introduction to IT Governance
The board and top management must ensure that the organization has processes to accomplish the following: Continually evaluate the match of strategic goals to the IT systems in use. Identify changes or improvements to the IT system. Prioritize the necessary changes to IT systems. Develop the plan to design and implement those IT changes that are of high priority. Implement and maintain the IT systems. Continually loop back to step 1. SO 1 An overview of IT governance and its role in strategic management

225 Introduction to IT Governance
Company should have an IT governance committee and a formal process to select, design, and implement IT systems (system development life cycle, or SDLC). SO 1 An overview of IT governance and its role in strategic management

226 Introduction to IT Governance
Concept Check IT governance includes all but which of the following responsibilities? a. Aligning It strategy with the business strategy. b. Writing programming code for IT systems. c. Insisting that an IT control framework be adopted and implemented. d. Measuring IT’s performance. SO 1 An overview of IT governance and its role in strategic management

227 An Overview of SDLC The systems development life cycle (SDLC) is a systematic process to manage the acquisition, design, implementation, and use of IT systems. Operation and Maintenance Exhibit 6-1 An Overview of the Systems Development Life Cycle System Planning System Implementation System Analysis System Design SO 2 An overview of the system development life cycle (SDLC)

228 Process Map of the System Development Life Cycle (SDLC)
An Overview of SDLC Exhibit 6-2 Process Map of the System Development Life Cycle (SDLC) SO 2 An overview of the system development life cycle (SDLC)

229 Elements of Systems Planning Phase of SDLC
IT governance committee must monitor the IT system through feedback about network utilization, security breaches, and reports on the operation of the system. IT governance committee should consider: the assessment of IT systems and their match to strategic organizational objectives, and the feasibility of each of the requested modifications or upgrades. SO 3 The elements of the systems planning phase of the SDLC

230 Elements of Systems Planning Phase of SDLC
Exhibit 6-3 System Planning Process Map SO 3 The elements of the systems planning phase of the SDLC

231 Elements of Systems Planning Phase of SDLC
Feasibility Study IT governance committee should evaluate the feasibility of each competing proposal. Four feasibility aspects Technical Operational Economic Schedule feasibility SO 3 The elements of the systems planning phase of the SDLC

232 Elements of Systems Planning Phase of SDLC
Planning and Oversight of Proposed Changes IT governance committee must decide which of the changes can be undertaken at the current time. Next phases of the SDLC: 1. Formally announce the project. 2. Assign the project team that will begin the next phase, the systems analysis. 3. Budget the funds necessary to complete the SDLC. 4. Continue oversight and management of the project team and proposed IT changes. SO 3 The elements of the systems planning phase of the SDLC

233 Elements of Systems Planning Phase of SDLC
Concept Check Which of the following feasibility aspects is an evaluation of whether the technology exists to meet the need identified in the proposed change to the IT system? a. Technical feasibility. b. Operational feasibility. c. Economic feasibility. d. Schedule feasibility. SO 3 The elements of the systems planning phase of the SDLC

234 Elements of Systems Planning Phase of SDLC
Concept Check The purpose of the feasibility study is to assist in? a. Selecting software. b. Designing internal controls. c. Designing reports for the IT system. d. Prioritizing IT requested changes. SO 3 The elements of the systems planning phase of the SDLC

235 Elements of Systems Analysis Phase of SDLC
Exhibit 6-4 System Analysis Process Map Preliminary Investigation The purpose of the preliminary investigation is to determine whether the problem or deficiency in the current system really exists. “go” or “no-go” decision SO 4 The elements of the systems analysis phase of the SDLC

236 Elements of Systems Analysis Phase of SDLC
System Survey A systems survey requires collecting data about the current system, including the following: Inputs Outputs Processes Controls Data storage Transaction volumes Errors SO 4 The elements of the systems analysis phase of the SDLC

237 Determination of User Requirements
Elements of Systems Analysis Phase of SDLC Determination of User Requirements To gain a complete understanding of the system under study, the project team should not only observe and review documentation, but also seek the opinions and thoughts of those who use the system. Interviews Questionnaires SO 4 The elements of the systems analysis phase of the SDLC

238 Analysis of the System Survey
Elements of Systems Analysis Phase of SDLC Analysis of the System Survey Analysis phase is the critical-thinking stage. In many cases, the analysis phase may lead to business process reengineering (BPR). “ fundamental rethinking and radical redesign of business processes to bring about dramatic improvements” in performance. SO 4 The elements of the systems analysis phase of the SDLC

239 Elements of Systems Analysis Phase of SDLC System Analysis Report
The report to inform the IT governance committee of the results of the systems survey, user needs determination, and BPR. SO 4 The elements of the systems analysis phase of the SDLC

240 Elements of Systems Analysis Phase of SDLC
Concept Check Which phase of the system development life cycle includes determining user needs of the IT system? a. Systems planning. b. Systems analysis. c. Systems design. d. Systems implementation. SO 4 The elements of the systems analysis phase of the SDLC

241 Elements of Systems Design Phase of SDLC
Purchased Software Exhibit 6-5 System Design Process Map for Purchased Software SO 5 The elements of the systems design phase of the SDLC

242 Elements of Systems Design Phase of SDLC
When evaluating each proposal, the IT governance committee should consider: 1. Price of software or software modules 2. Match of system and user needs to features of the software 3. Technical, operational, economic, and schedule feasibility 4. Technical support provided by the vendor 5. Reputation and reliability of the vendor 6. Usability and user friendliness of the software 7. Testimonials from other customers SO 5 The elements of the systems design phase of the SDLC

243 Elements of Systems Design Phase of SDLC
In-House Design Exhibit 6-6 System Design Process Map for In-House Design SO 5 The elements of the systems design phase of the SDLC

244 Elements of Systems Design Phase of SDLC
Conceptual Design Involves identifying the alternative conceptual design approaches to systems that will meet the needs identified in the system analysis phase. SO 5 The elements of the systems design phase of the SDLC

245 Elements of Systems Design Phase of SDLC Evaluation and Selection
Feasibility assessments are: Technical feasibility Operational feasibility Economic feasibility Schedule feasibility In most cases, the cost–benefit analysis is the most important of the four tests. SO 5 The elements of the systems design phase of the SDLC

246 Elements of Systems Design Phase of SDLC
Detailed Design The purpose of the detailed design phase is to create the entire set of specifications necessary to build and implement the system. The various parts of the system that must be designed are the outputs, inputs, Processes, data storage, and internal controls. SO 5 The elements of the systems design phase of the SDLC

247 Elements of Systems Design Phase of SDLC
Concept Check A request for proposal (RFP) is used during the? a. Phase-in period. b. Purchase of software. c. Feasibility study. d. In-house design. SO 5 The elements of the systems design phase of the SDLC

248 Elements of Systems Implementation Phase
Exhibit 6-7 Implementation and Operation Process Map Parallel Direct cutover Phase-in Pilot SO 6 The elements of the systems implementation phase of the SDLC

249 Elements of Systems Implementation Phase
Concept Check Which of the following steps within the systems implementation phase could not occur concurrently with other steps, but would occur at the end? a. Employee training. b. Data conversion. c. Software programming. d. Post-implementation review. SO 6 The elements of the systems implementation phase of the SDLC

250 Elements of Systems Implementation Phase
Concept Check Each of the following are methods for implementing a new application system except a. Direct cutover conversion. b. parallel conversion. c. Pilot conversion. d. Test method conversion. SO 6 The elements of the systems implementation phase of the SDLC

251 Elements of the Operation and Maintenance Phase
Management should receive regular reports regarding the performance of the IT system. Examples of reports are: IT performance IT load usage and excess capacity Downtime of IT systems Maintenance hours on IT systems IT security and number of security breaches or problems IT customer satisfaction, from both internal and external customers. SO 7 The elements of the operation and maintenance phase of the SDLC

252 Elements of the Operation and Maintenance Phase
Concept Check The use of the SDLC for IT system changes is important for several reasons. Which of the following is not a part of the purposes of the SDLC processes? a. As a part of strategic management of the organization. b. As part of the internal control structure of the organization. c. As part of the audit of an IT system. d. As partial fulfillment of management’s ethical obligations. SO 7 The elements of the operation and maintenance phase of the SDLC

253 Critical Importance of IT Governance
Three major purposes are served by the continual and proper use of the IT governance committee and the SDLC: 1. The strategic management process of the organization 2. The internal control structure of the organization 3. The fulfillment of ethical obligations SO 8 The critical importance of IT governance in an organization

254 Ethical Considerations Related to IT Governance
Management has an ethical obligation to maintain a set of processes and procedures that assure accurate and complete records and protection of assets. Employees should not subvert the process. Consultants have at least four ethical obligations: Bid the engagement fairly, and completely disclose the terms of potential cost increases. Bill time accurately to the client. Do not oversell unnecessary services or systems. Do not disclose confidential or proprietary information. SO 9 Ethical considerations related to IT governance

255 Ethical Considerations Related to IT Governance
Concept Check Confidentiality of information is an ethical consideration for which of the following party or parties? a. Management. b. Employees. c. Consultants. d. All of the above. SO 9 Ethical considerations related to IT governance

256 Copyright Copyright © 2008 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.

257

258 Accounting Information Systems, 1st Edition
Auditing Information Technology-Based Processes Accounting Information Systems, 1st Edition

259 Study Objectives An introduction to auditing IT processes
The various types of audits and auditors Information risk and IT-enhanced internal control Authoritative literature used in auditing Management assertions used in the auditing process and the related audit objectives The phases of an IT audit The use of computers in audits Tests of controls Tests of transactions and tests of balances Audit Completion/Reporting Other audit considerations Ethical issues related to auditing 1. On the topic, “Challenges Facing Financial Accounting,” what did the AICPA Special Committee on Financial Reporting suggest should be included in future financial statements? Non-financial Measurements (customer satisfaction indexes, backlog information, and reject rates on goods purchases). Forward-looking Information Soft Assets (a company’s know-how, market dominance, marketing setup, well-trained employees, and brand image). Timeliness (no real time financial information)

260 Introduction to Auditing IT Processes
Accounting services that improve the quality of information are called assurance services. An audit is the most common type of assurance service. SO 1 An introduction to auditing IT processes

261 Types of Audits and Auditors
Main purpose of the audit is to assure users of financial information about the accuracy and completeness of the information. Three primary types of audits include compliance audits, operational audits, and financial statement audits. SO 2 The various types of audits and auditors

262 Types of Audits and Auditors
Audits are typically conducted by accountants. Certified public accountants (CPAs) Internal auditor IT auditors Government auditors SO 2 The various types of audits and auditors

263 Types of Audits and Auditors
IT environment plays a key role in how auditors conduct their work in the following areas: Consideration of risk Audit procedures used to obtain knowledge of accounting and internal control systems Design and performance of audit tests SO 2 The various types of audits and auditors

264 Types of Audits and Auditors
Concept Check Which of the following types of audits is most likely to be conducted for the purpose of identifying areas for cost savings? a. Financial statement audits b. Operational audits c. Regulatory audits d. Compliance audits SO 2 The various types of audits and auditors

265 Types of Audits and Auditors
Concept Check Financial statement audits are required to be performed by a. government auditors. b. CPAs. c. internal auditors. d. IT auditors. SO 2 The various types of audits and auditors

266 Risk and IT-Enhanced Internal Control
Information risk is the chance that information used by decision makers may be inaccurate. Following are some causes of information risk: Remoteness of information Volume and complexity of underlying data Motive of the preparer SO 3 Information risk and IT-enhanced internal control

267 Authoritative Literature Used in Auditing
Sources of authoritative literature Generally accepted auditing standards (GAAS) Public Company Accounting Oversight Board (PCAOB) Auditing Standards Board (ASB) International Audit Practices Committee (IAPC) Information Systems Audit and Control Association (ISACA). SO 4 Authoritative literature used in auditing

268 Authoritative Literature Used in Auditing
Concept Check Which of the following is not a part of generally accepted auditing standards? a. general standards b. standards of fieldwork c. standards of information systems d. standards of reporting SO 4 Authoritative literature used in auditing

269 Authoritative Literature Used in Auditing
Concept Check Which of the following best describes what is meant by the term “generally accepted auditing standards”? a. Procedures used to gather evidence to support the accuracy of a client’s financial statements b. Measures of the quality of an auditor’s conduct c. Professional pronouncements issued by the Auditing Standards Board d. Rules acknowledged by the accounting profession because of their widespread application SO 4 Authoritative literature used in auditing

270 Authoritative Literature Used in Auditing
Concept Check In an audit of financial statements in accordance with generally accepted auditing standards, an auditor is required to a. document the auditor’s understanding of the client company’s internal controls. b. search for weaknesses in the operation of the client company’s internal controls. c. perform tests of controls to evaluate the effectiveness of the client company’s internal controls. d. determine whether controls are appropriately designed to prevent or detect material misstatements. SO 4 Authoritative literature used in auditing

271 Management Assertions and Audit Objectives
Responsibility for the preparation of financial statements lies with management Management assertions are claims regarding the financial condition and results of operations. Existence/occurrence Valuation and Allocation Accuracy, Classification, Cutoff Completeness Rights and Obligations Presentation and Disclosure Audit tests developed for an audit client are documented in an audit program. SO 5 Management assertions used in the auditing process and the related audit objectives

272 Management Assertions and Audit Objectives
Concept Check Auditors should design a written audit program so that a. all material transactions will be included in substantive testing. b. substantive testing performed prior to year end will be minimized. c. the procedures will achieve specific audit objectives related to specific management assertions. d. each account balance will be tested under either a substantive test or a test of controls. SO 5 Management assertions used in the auditing process and the related audit objectives

273 Management Assertions and Audit Objectives
Concept Check Which of the following audit objectives relates to the management assertion of existence? a. A transaction is recorded in the proper period. b. A transaction actually occurred (i.e., it is real). c. A transaction is properly presented in the financial statements. d. A transaction is supported by detailed evidence. SO 5 Management assertions used in the auditing process and the related audit objectives

274 Phases of an IT Audit There are four primary phases to an IT audit:
planning, tests of controls, substantive tests, and audit completion/reporting. SO 6 The phases of an IT audit

275 SO 6 The phases of an IT audit
Exhibit 7-4 Process Map of Phases of an Audit SO 6 The phases of an IT audit

276 Phases of an IT Audit Audit evidence is proof of the fairness of financial information. Techniques for gathering evidence: physically examining or inspecting assets or supporting documentation obtaining written confirmations rechecking or recalculating information observing the underlying activities making inquiries of client personnel analyzing financial relationships and comparisons SO 6 The phases of an IT audit

277 Phases of an IT Audit Audit Planning
Auditors review and assess the risks and controls, establish materiality guidelines, and develop relevant tests addressing the objectives. SO 6 The phases of an IT audit

278 Audit Planning Phase Process Map
Phases of an IT Audit Audit Planning Exhibit 7-5 Audit Planning Phase Process Map SO 6 The phases of an IT audit

279 Concept Check Phases of an IT Audit
Risk assessment is a process designed to a. identify possible events that may effect the business. b. establish policies and procedures to carry out internal controls. c. identify and capture information in a timely manner. d. test the internal controls throughout the year. SO 6 The phases of an IT audit

280 Concept Check Phases of an IT Audit
Which of the following audit procedures is most likely to be performed during the planning phase of the audit? a. Obtain an understanding of the client’s risk assessment process. b. Identify specific internal control activities that are designed to prevent fraud. c. Evaluate the reasonableness of the client’s accounting estimates. d. Test the timely cutoff of cash payments and collections. SO 6 The phases of an IT audit

281 Use of Computers in Audits
Auditing around the computer Auditing through the computer Auditing with the computer Computer-assisted audit techniques (CAATs) SO 7 The use of computers in audits

282 Use of Computers in Audits
Concept Check Which of the following is the most significant disadvantage of auditing around the computer rather than through the computer? a. The time involved in testing processing controls is significant. b. The cost involved in testing processing controls is significant. c. A portion of the audit trail is not tested. d. The technical expertise required to test processing controls is extensive. SO 7 The use of computers in audits

283 Control Testing Phase Process Map
Tests of Controls Exhibit 7-6 Control Testing Phase Process Map Tests of controls involve audit procedures designed to evaluate both general controls and application controls. SO 8 Test of controls

284 Tests of Controls General Controls
Two broad categories of general controls that relate to IT systems: IT administration and related operating systems development and maintenance processes Security controls and related access issues SO 8 Test of controls

285 Tests of Controls General Controls IT Administration
Audit tests include review for the existence and communication of company policies regarding: personal accountability and segregation of incompatible responsibilities job descriptions and clear lines of authority computer security and virus protection IT systems documentation SO 8 Test of controls

286 Tests of Controls General Controls Security Controls
To test external access controls, auditors may perform: Authenticity tests. Penetration tests Vulnerability assessments Review access logs to identify unauthorized users or failed access attempts SO 8 Test of controls

287 Tests of Controls Application Controls
Computerized controls over application programs. Auditors should test Systems documentation Main functions of the computer applications input, processing, and output. SO 8 Test of controls

288 Completeness or redundancy tests
Tests of Controls Application Controls Input Controls Financial totals Hash totals Completeness or redundancy tests Limit tests Validation checks Field checks SO 8 Test of controls

289 Tests of Controls Application Controls
Processing Controls, techniques for testing Test data method Program tracing Integrated test facility Parallel simulation Embedded audit modules SO 8 Test of controls

290 Tests of Controls Application Controls Output Controls
Reasonableness tests Audit trail tests Rounding errors tests SO 8 Test of controls

291 Concept Check Tests of Controls
The primary objective of compliance testing in a financial statement audit is to determine whether a. procedures have been updated regularly. b. financial statement amounts are accurately stated. c. internal controls are functioning as designed. d. collusion is taking place. SO 8 Test of controls

292 Concept Check Tests of Controls
Which of the following computer assisted auditing techniques processes actual client input data (or a copy of the real data) on a controlled program under the auditor’s control to periodically test controls in the client’s computer system? a. Test data method b. Embedded audit module c. Integrated test facility d. Parallel simulation SO 8 Test of controls

293 Concept Check Tests of Controls
Which of the following is a general control to test for external access to a client’s computerized systems? a. Penetration tests b. Hash totals c. Field checks d. Program tracing SO 8 Test of controls

294 Tests of Transactions and Balances
Substantive Testing - tests of accuracy of monetary amounts of transactions and account balances. Computerized auditing tools make it possible for more efficient audit tests such as: mathematical and statistical calculations data queries identification of missing items in a sequence stratification and comparison of data items selection of items of interest from the data files summarization of testing results into a useful format for decision making SO 9 Test of transactions and tests of balances

295 Tests of Transactions and Balances
Exhibit 7-9 Substantive Testing Phase Process Map SO 9 Test of transactions and tests of balances

296 Tests of Transactions and Balances
Concept Check Generalized audit software can be used to a. examine the consistency of data maintained on computer files. b. perform audit tests of multiple computer files concurrently. c. verify the processing logic of operating system software. d. process test data against master files that contain both real and fictitious data. SO 9 Test of transactions and tests of balances

297 Audit Completion/Reporting
Four basic types of reports: Unqualified opinion Qualified opinion Adverse opinion Disclaimer The most important task is obtaining a letter of representations from client management. SO 10 Audit Completion/Reporting

298 Audit Completion/Reporting
Exhibit 7-10 Audit Completion/Reporting Phase Process Map SO 10 Audit Completion/Reporting

299 Other Audit Considerations
Different IT Environments Using PCs, companies may use IT environments that involve networks, database management systems, and/or e-commerce systems. SO 11 Other audit considerations

300 Other Audit Considerations
Changes in a Client’s IT Environment Auditors must consider whether additional audit testing is needed. Specific audit tests include verification of: Assessment of user needs Authorization for new projects and program changes Adequate feasibility study and cost–benefit analysis Proper design documentation Proper user instructions Adequate testing before system is put into use SO 11 Other audit considerations

301 Other Audit Considerations
Sampling Test a limited number of items or transactions and then draw conclusions about the balance as a whole on the basis of the results. SO 11 Other audit considerations

302 Other Audit Considerations
Concept Check Independent auditors are generally actively involved in each of the following tasks except: a. Preparation of a client’s financial statements and accompanying notes b. Advising client management as to the applicability of a new accounting standard c. Proposing adjustments to a client’s financial statements d. Advising client management about the presentation of the financial statements SO 11 Other audit considerations

303 Other Audit Considerations
Concept Check Which of the following is most likely to be an attribute unique to the audit work of CPAs, compared with work performed by attorneys or practitioners of other business professions? a. Due professional care b. Competence c. Independence d. A complex underlying body of professional knowledge SO 11 Other audit considerations

304 Other Audit Considerations
Concept Check Which of the following terms is not associated with the auditor’s requirement to maintain independence? a. Objectivity b. Neutrality c. Professional skepticism d. Competence SO 11 Other audit considerations

305 Ethical Issues Related to Auditing
AICPA Code of Professional Conduct Six principles of the code: Responsibilities. The Public Interest. Integrity. Objectivity and Independence. CPAs Due Care Scope and Nature of Services Auditors must practice professional skepticism SO 12 Ethical issues related to auditing

306 Copyright Copyright © 2008 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.

307 Overview of ERP Systems
Concept Check Manufacturing companies implement ERP systems for the primary purpose of a. Increasing productivity. b. Reducing inventory quantities. c. Sharing information. d. Reducing investments. SO 1 The overview of an ERP system

308

309 Accounting Information Systems, 1st Edition
Revenue and Cash Collection Processes and Controls Accounting Information Systems, 1st Edition

310 Study Objectives An overview of revenue processes within an organization Sales processes and the risks and controls in sales processes Sales return processes and the risks and controls in sales return processes Cash collection processes and the risks and controls in cash collection processes An overview of IT systems of revenue and cash collection that enhance the efficiency of revenue processes E-business systems and the related risks and controls Electronic data interchange (EDI) systems and the related risks and controls Point of sale (POS) systems and the related risks and controls Ethical issues related to revenue processes Corporate governance of revenue processes 1. On the topic, “Challenges Facing Financial Accounting,” what did the AICPA Special Committee on Financial Reporting suggest should be included in future financial statements? Non-financial Measurements (customer satisfaction indexes, backlog information, and reject rates on goods purchases). Forward-looking Information Soft Assets (a company’s know-how, market dominance, marketing setup, well-trained employees, and brand image). Timeliness (no real time financial information)

311 Introduction to Revenue Processes
Companies sell products and/or services. Examples: Retailers: Record the sale, collect cash, update inventory status all at the time of the sale. Manufacturers: Sell product to other companies. Deliver goods and bill customer at a later date. Collect payment. SO 1 An overview of revenue processes within an organization

312 Introduction to Revenue Processes
Systems and processes must be in place to capture, record, summarize, and report sales transactions. Processes include: Polices and procedures employees follow in completing the sale. Capturing customer data and sales quantities. Routing sales documents to the right departments. The Accounting System uses this flow of sales documents to various departments to record, summarize, and report the results of the sales transactions. SO 1 An overview of revenue processes within an organization

313 Introduction to Revenue Processes
Exhibit 8-1 Revenue Processes within the Overall System SO 1 An overview of revenue processes within an organization

314 Introduction to Revenue Processes
Business processes common in company-to-company sales are: Collect order data from customer. Deliver goods. Record receivable and bill customer. Handle product returns. Collect the cash. Update records, such as accounts receivable, cash, inventory, revenue, and cost of goods sold. SO 1 An overview of revenue processes within an organization

315 Sales Processes Terminology Purchase Order Sales Order Price List
Credit Limit Pick List Packing Slip Bill of Lading. Shipping Log Sales Invoice (Bill) Sales Journal SO 2 Sales processes and the risks and controls in sales processes

316 Sales Processes See next slide for larger image. Exhibit 8-2
Sales Process Map See next slide for larger image. SO 2 Sales processes and the risks and controls in sales processes

317 Sales Processes Exhibit 8-2 Sales Process Map
SO 2 Sales processes and the risks and controls in sales processes

318 Sales Processes Exhibit 8-2 Sales Process Map
SO 2 Sales processes and the risks and controls in sales processes

319 Controls and Risks in Sales Processes
Common procedures associated with the revenue process: Authorization of transactions Segregation of duties Adequate records and documents Security of assets and documents Independent checks and reconciliation SO 2 Sales processes and the risks and controls in sales processes

320 Controls and Risks in Sales Processes
Characteristics indicating risk with respect to revenue processes: Frequent changes made to sales prices or customers. Pricing structure is complex or based on estimates. Large volume of transactions. One or few key customers. Shipments not controlled directly by the company. Product mix is difficult to differentiate. Shipping and/or recordkeeping at multiple locations. SO 2 Sales processes and the risks and controls in sales processes

321 Controls and Risks in Sales Processes
Quick Review The purpose of tracing shipping documents to prenumbered sales invoices would be to provide evidence that shipments to customers were properly invoiced. b. no duplicate shipments or billings occurred. c. goods billed to customers were shipped. d. all prenumbered sales invoices were accounted for. SO 2 Sales processes and the risks and controls in sales processes

322 Controls and Risks in Sales Processes
Quick Review The purpose of tracing sales invoices to shipping documents would be to provide evidence that shipments to customers were properly invoiced. b. no duplicate shipments or billings occurred. c. goods billed to customers were shipped. d. all prenumbered sales invoices were accounted for. SO 2 Sales processes and the risks and controls in sales processes

323 Sales Returns Processes
Company must have procedures for receiving returned goods, crediting customer’s account, and placing items back in inventory. Terminology: Receiving log Receiving report Credit memorandum SO 3 Sales return processes and the risks and controls in sales return processes

324 Sales Returns Processes
Exhibit 8-8 Sales Returns Process Map See next slide for larger image. SO 3 Sales return processes and the risks and controls in sales return processes

325 Sales Returns Processes
Exhibit 8-8 Sales Returns Process Map SO 3 Sales return processes and the risks and controls in sales return processes

326 Sales Returns Processes
Exhibit 8-8 Sales Returns Process Map SO 3 Sales return processes and the risks and controls in sales return processes

327 Controls and Risks Associated with the Sales Returns Process
Specific controls over the sales returns process: Authorization of transactions Segregation of duties Adequate records and documents Security of assets and documents Independent checks and reconciliation SO 3 Sales return processes and the risks and controls in sales return processes

328 Controls and Risks Associated with the Sales Returns Process
Circumstances which may indicate high level of risk. Quantities of returns are difficult to determine. High volume of credit memo activity. Product prices change frequently, or pricing structure is otherwise complex. Returns are received at various locations, or issuance of credit memos may occur at different locations. One or few key customers. Returns not controlled directly by the company. SO 3 Sales return processes and the risks and controls in sales return processes

329 Controls and Risks Associated with the Sales Returns Process
Quick Review Under a system of sound internal controls, if a company sold defective goods, the return of those goods from the customer should be accepted by the receiving clerk. b. sales clerk. c. purchasing clerk. d. inventory control clerk. SO 3 Sales return processes and the risks and controls in sales return processes

330 Cash Collection Processes
Company-to-company sales are typically made on account, and a time span is given for the customer to pay. Terminology: Remittance advice Cash receipts journal SO 4 Cash collection processes and the risks and controls in cash collection processes

331 Cash Collection Processes
Exhibit 8-12 Cash Receipts Process Map See next slide for larger image. SO 4 Cash collection processes and the risks and controls in cash collection processes

332 Cash Collection Processes
Exhibit 8-12 Cash Receipts Process Map SO 4 Cash collection processes and the risks and controls in cash collection processes

333 Cash Collection Processes
Exhibit 8-12 Cash Receipts Process Map SO 4 Cash collection processes and the risks and controls in cash collection processes

334 Cash Collection Processes
Quick Review Which of the following is not a document that is part of the cash collection process? Remittance advice b. Cash receipts journal c. Bank deposit slip d. Packing slip SO 4 Cash collection processes and the risks and controls in cash collection processes

335 Controls and Risks Associated with the Cash Collection Process
Specific controls over the cash receipts process: Authorization of transactions Segregation of duties Adequate records and documents Security of assets and documents Independent checks and reconciliation SO 4 Cash collection processes and the risks and controls in cash collection processes

336 Controls and Risks Associated with the Cash Collection Process
Circumstances that may indicate risks to cash collections. High volume of cash collections. Decentralized cash collections. Lack of consistency in the volume or source of collections. Presence of cash collections denominated in foreign currencies. SO 4 Cash collection processes and the risks and controls in cash collection processes

337 Cash Collection Processes
Quick Review Which of the following would represent proper segregation of duties? The employee who has custody of cash also does accounts receivable record keeping. b. The employee who has custody of cash completes the bank reconciliation. The employee who opens mail containing checks prepares a list of checks received. The employee who opens mail containing checks records transactions in the general ledger. SO 4 Cash collection processes and the risks and controls in cash collection processes

338 IT Enabled Systems of Revenue and Cash Collection Processes
Larger IT systems generally have: Fewer manual processes More computerized processes SO 5 An overview of IT systems of revenue and cash collection that enhance the efficiency of revenue processes

339 IT Enabled Systems of Revenue and Cash Collection Processes
Exhibit 8-17 Revenue Processes System Flowchart IT Enabled Systems of Revenue and Cash Collection Processes Exhibit 8-17 is a system flowchart of a generic version of revenue system with some paper documents.

340 IT Enabled Systems of Revenue and Cash Collection Processes
Sophisticated, highly integrated IT systems capture, record, and process revenue and cash collection events. Such systems include: E-commerce systems. Electronic Data Interchange (EDI) systems. Point of Sale (POS) systems. SO 5 An overview of IT systems of revenue and cash collection that enhance the efficiency of revenue processes

341 IT Enabled Systems of Revenue and Cash Collection Processes
Sophisticated IT systems usually lead to: First, underlying processes are reengineered (BPR) so as to be conducted more efficiently. Second, IT systems improve the efficiency of the underlying processes. SO 5 An overview of IT systems of revenue and cash collection that enhance the efficiency of revenue processes

342 E-Business Systems and the Risks and Controls
Two popular types of Internet sales: Business to Business (B2B) Business to Consumer (B2C) SO 6 E-business systems and the related risks and controls

343 E-Business Systems and the Risks and Controls
Advantages of e-commerce include: Reduced cost Shorter sales cycles Increased accuracy and reliability of sales data Increased potential market for products and services SO 6 E-business systems and the related risks and controls

344 E-Business Systems and the Risks and Controls
Risks related to Internet Sales include: Security and Confidentiality Unauthorized access. Hackers or other network break-ins. Repudiation of sales transactions. Processing Integrity Invalid data entered by customers. Incomplete audit trail. Errors when integrating data into back end systems. SO 6 E-business systems and the related risks and controls

345 E-Business Systems and the Risks and Controls
Risks related to Internet Sales include: Availability Hardware and software system failures that block customers from access to the website. Virus and worm attacks. Denial-of-service attacks by hackers. In addition, there are many online privacy risks to customers. SO 6 E-business systems and the related risks and controls

346 E-Business Systems and the Risks and Controls
Quick Review When a company sells items over the Internet, it is usually called e-commerce. There are many IT risks related to Internet sales. The risk of invalid data entered by a customer would be a(n) availability risk. b. processing integrity risk. c. security risk d. confidentiality risk SO 6 E-business systems and the related risks and controls

347 E-Business Systems and the Risks and Controls
Quick Review When a company sells items over the Internet, there are many IT risks. The risk of hardware and software failures that prevent website sales would be a(n) availability risk. b. processing integrity risk. c. security risk d. confidentiality risk SO 6 E-business systems and the related risks and controls

348 Electronic Data Interchange and the Risks and Controls
Electronic data interchange is the inter-company, computer-to-computer transfer of business documents in a standard business format. ANSI X.12 standards divide EDI data transmissions into three parts: Header data Trailer data Labeling interchanges Data segments SO 7 Electronic data interchange (EDI) systems and the related risks and controls

349 Electronic Data Interchange and the Risks and Controls
Value Added Networks (VANs) Exhibit 8-18 EDI Using a Third-Party Network

350 Electronic Data Interchange and the Risks and Controls
Advantages to an EDI system within the revenue and cash collection processes: Reduction or elimination of data keying. Elimination of keying errors. Elimination of costs related to keying errors. Elimination of time needed to key in orders. Elimination of mail delays. SO 7 Electronic data interchange (EDI) systems and the related risks and controls

351 Electronic Data Interchange and the Risks and Controls
Advantages to an EDI system within the revenue and cash collection processes: Elimination of postage costs. Reduction in inventory levels. Competitive advantage through better customer service. Preservation of business with existing customers who have adopted EDI. SO 7 Electronic data interchange (EDI) systems and the related risks and controls

352 Electronic Data Interchange and the Risks and Controls
Risks in an EDI system include: Security and Confidentiality Unauthorized access. Trading partners gaining access to unauthorized data. Hackers or other network break-ins. Repudiation of sales transactions. Processing Integrity Invalid data entered by trading partners. Incomplete audit trail. Errors when integrating data into back end systems. SO 7 Electronic data interchange (EDI) systems and the related risks and controls

353 Electronic Data Interchange and the Risks and Controls
Risks in an EDI system include: Availability Hardware and software system failures that block customers from access to the EDI system. IT controls can lessen these risks. Controls are: Authentication Encryption Transaction logging Control totals Acknowledgment SO 7 Electronic data interchange (EDI) systems and the related risks and controls

354 Electronic Data Interchange and the Risks and Controls
Quick Review When The use of electronic data interchange (EDI) to conduct sales electronically has both risks and benefits. Which of the following is a benefit of EDI, rather than a risk? Incomplete audit trail. b. Repudiation of sales transactions. c. Unauthorized access. d. Shorter inventory cycle time. SO 7 Electronic data interchange (EDI) systems and the related risks and controls

355 Point of Sale Systems and the Risks and Controls
Point of Sale systems, features that assist accountants and managers: Touch screen menus. Bar code scanning. Real-time access to inventory and price data. Credit card authorizations during the sale. Real-time update of cash, sales, and inventory records. Immediate summaries and analyses. Integration with the company’s general ledger system. SO 8 Point of sale (POS) systems and the related risks and controls

356 Point of Sale Systems and the Risks and Controls
Point of Sale systems can reduce some processing integrity risks within revenue and cash collection: Pricing errors for products sold. Cash overage shortage errors. Errors in inventory changes—less chance of an incorrect product number. Erroneous or invalid sales voids or deletions. SO 8 Point of sale (POS) systems and the related risks and controls

357 Point of Sale Systems and the Risks and Controls
Quick Review When An IT system that uses touch screens, bar coded products, and credit card authorization during the sale is called a(n) electronic data interchange system. b. e-commerce system. c. point of sale system. d. e-payables system. SO 8 Point of sale (POS) systems and the related risks and controls

358 Ethical Issues Related to Revenue Processes
Intentional revenue inflation is unethical, and many types of revenue inflation are illegal. Two ways to inflate revenue: Channel stuffing Leaving sales open SO 9 Ethical issues related to revenue processes

359 Corporate Governance of Revenue Processes
Four primary functions of the corporate governance process: Management oversight. Internal controls and compliance. Financial stewardship. Ethical conduct. Establishing proper processes, internal controls, and ethical guidelines leads to better corporate governance and, therefore, good financial stewardship. SO 10 Corporate governance of revenue processes

360 Quick Review Corporate Governance of Revenue Processes
Which of the following is not a method of unethically inflating sales revenue? Electronic data interchange system. b. E-commerce system. c. Point of sale system. d. E-payables system. SO 10 Corporate governance of revenue processes

361 Copyright Copyright © 2008 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.

362

363 Accounting Information Systems, 1st Edition
Expenditures Processes and Controls-Purchases Accounting Information Systems, 1st Edition

364 Study Objectives An introduction to expenditures processes
Purchasing processes and the related risks and controls Purchase return processes and the related risks and controls Cash disbursement processes and the related risks and controls An overview of IT systems of expenditure and cash disbursement processes that enhance the efficiency of expenditures processes Computer-based matching of purchasing documents and the related risks and controls Evaluated receipt settlement systems and the related risks and controls E-business and electronic data interchange (EDI) systems and the related risks and controls E-payables systems Procurement cards Ethical issues related to expenditures processes Corporate governance in expenditures processes 1. On the topic, “Challenges Facing Financial Accounting,” what did the AICPA Special Committee on Financial Reporting suggest should be included in future financial statements? Non-financial Measurements (customer satisfaction indexes, backlog information, and reject rates on goods purchases). Forward-looking Information Soft Assets (a company’s know-how, market dominance, marketing setup, well-trained employees, and brand image). Timeliness (no real time financial information)

365 Introduction to Expenditure Processes
When a purchase occurs, the information resulting from that purchase must flow into the purchase recording systems, the accounts payable and cash disbursement systems, and the inventory tracking systems. Transaction Processing Systems (TPS) SO 1 An introduction to expenditure processes

366 Introduction to Expenditure Processes
Exhibit 9-1 Expenditures Processes within the Overall System SO 1 An introduction to expenditure processes

367 Introduction to Expenditure Processes
Exhibit 9-2 Comparison of the Revenue and Expenditures Processes SO 1 An introduction to expenditure processes

368 Introduction to Expenditure Processes
Common expenditures processes include: Prepare a purchase requisition and/or purchase order. Notify vendor (supplier) of goods or services needed. Receive goods or services. Record the payable. Pay the resulting invoice. Update the records affected, such as accounts payable, cash, inventory, and expenses. SO 1 An introduction to expenditure processes

369 Purchasing Processes Terminology Purchase Requisition Purchase Order
Purchases Journal Blind Purchase Order Bill of Lading Packing Slip Receiving Report Receiving Log Cutoff Accounts Payable Subsidiary Ledger SO 2 Purchasing processes and the related risks and controls

370 Purchasing Processes See next slide for larger image. Exhibit 9-2
Purchasing Process Map See next slide for larger image. SO 2 Purchasing processes and the related risks and controls

371 Purchasing Processes Exhibit 9-2 Purchasing Process Map
SO 2 Purchasing processes and the related risks and controls

372 Purchasing Processes Exhibit 9-2 Purchasing Process Map
SO 2 Purchasing processes and the related risks and controls

373 Controls and Risks in Purchasing Processes
Common procedures associated with the revenue process: Authorization of transactions Segregation of duties Adequate records and documents Security of assets and documents Independent checks and reconciliation Cost-benefit considerations SO 2 Purchasing processes and the related risks and controls

374 Controls and Risks in Purchasing Processes
Characteristics indicating risk with purchasing processes: Goods received difficult to differentiate, count, or inspect. High volumes of goods are received, or goods are of high value. Inventory pricing arrangements are complex or based on estimates. Frequent changes occur in purchase prices or vendors. Company depends on one or few key vendors. Receiving and/or record keeping are performed at multiple locations. SO 2 Purchasing processes and the related risks and controls

375 Controls and Risks in Purchasing Processes
Quick Review Within the purchasing processes, which of the following is the first document prepared and thereby the one that triggers the remaining purchasing processes? a. The invoice b. The receiving report c. The purchase order d. The purchase requisition SO 2 Purchasing processes and the related risks and controls

376 Controls and Risks in Purchasing Processes
Quick Review Personnel who work in the receiving area should complete all of the following processes except counting the goods received. inspecting goods received for damage. preparing a receiving report. preparing an invoice. SO 2 Purchasing processes and the related risks and controls

377 Controls and Risks in Purchasing Processes
Quick Review Which of the given departments will immediately adjust the vendor account for each purchase transaction so that the company will know the correct amount owed to the vendor? Purchasing Receiving Accounts payable Shipping SO 2 Purchasing processes and the related risks and controls

378 Purchase Returns Processes
Reasons for Returns: Goods received are unacceptable: Quantity or quality discrepancies Damage or defects Errors in the type of goods delivered or ordered Discrepancies in the terms of the purchase Timing issues Changes in the company’s needs. SO 3 Purchase return processes and the related risks and controls

379 Purchase Returns Processes
Exhibit 9-9 Purchase Returns Process Map See next slide for larger image. SO 3 Purchase return processes and the related risks and controls

380 Purchase Returns Processes
Exhibit 9-9 Purchase Returns Process Map SO 3 Purchase return processes and the related risks and controls

381 Purchase Returns Processes
Exhibit 9-9 Purchase Returns Process Map SO 3 Purchase return processes and the related risks and controls

382 Risks and Controls in the Purchase Returns Process
Specific controls over the purchase returns process: Authorization of transactions Segregation of duties Adequate records and documents Security of assets and documents Independent checks and reconciliation Cost-benefit considerations SO 3 Purchase return processes and the related risks and controls

383 Risks and Controls in the Purchase Returns Process
Quick Review The document prepared when purchased items are returned is a(n) debit memo. invoice. receiving report. sales journal. SO 3 Purchase return processes and the related risks and controls

384 Cash Disbursement Processes
Cash disbursements process must be designed to ensure that the company appropriately processes payments to satisfy its accounts payable when they are due. Terminology: Cash management Remittance advice Cash disbursements journal SO 4 Cash disbursement processes and the related risks and controls

385 Cash Disbursement Processes
Exhibit 9-14 Cash Disbursement Process Map See next slide for larger image. SO 4 Cash disbursement processes and the related risks and controls

386 Cash Disbursement Processes
Exhibit 9-14 Cash Disbursement Process Map Cash Disbursement Processes SO 4 Cash disbursement processes and the related risks and controls

387 Cash Disbursement Processes
Exhibit 9-14 Cash Disbursement Process Map Cash Disbursement Processes SO 4 Cash disbursement processes and the related risks and controls

388 Risks and Controls Cash Disbursement Process
Specific controls over the cash receipts process: Authorization of transactions Segregation of duties Adequate records and documents Security of assets and documents Independent checks and reconciliation Cost-benefit considerations SO 4 Cash disbursement processes and the related risks and controls

389 Risks and Controls Cash Disbursement Process
Quick Review Which of the following controls is not normally performed in the accounts payable department? The vendor’s invoice is matched with the related receiving report. Vendor invoices are selected for payment. Asset and expense accounts to be recorded are assigned. Unused purchase orders and receiving reports are accounted for. SO 4 Cash disbursement processes and the related risks and controls

390 Risks and Controls Cash Disbursement Process
Quick Review In a system of proper internal controls, the same employee should not be allowed to sign checks and cancel the supporting voucher package. receive goods and prepare the related receiving report. prepare voucher packages and sign checks. initiate purchase requisitions and inspect goods received. SO 4 Cash disbursement processes and the related risks and controls

391 Risks and Controls Cash Disbursement Process
Quick Review Within accounts payable, to ensure that each voucher is submitted and paid only once, each invoice approved to be paid should be supported by a receiving report. stamped “paid” by the check signer. prenumbered and accounted for. approved for authorized purchases. SO 4 Cash disbursement processes and the related risks and controls

392 IT Systems of Expenditure and Cash Disbursement Processes
Three-Way Match - matching of a purchase order to the related receiving report and invoice. Time consuming and expensive. Business Process Reengineering (BPR) to improve efficiency and effectiveness. IT systems include: Computer-based matching and checking of purchasing documents Evaluated receipt settlement (ERS) Electronic forms of purchase and payment SO 5 An overview of IT systems of expenditure and cash disbursement processes that enhance the efficiency of expenditures processes

393 IT Systems of Expenditure and Cash Disbursement Processes
Exhibit 9-19 Document Matching to Approve and Pay for Purchases Exhibit 8-17 is a system flowchart of a generic version of revenue system with some paper documents. SO 5 An overview of IT systems of expenditure and cash disbursement processes that enhance the efficiency of expenditures processes

394 Computer-Based Matching
Automated matching - software matches an invoice to its related purchase order and receiving report. Advantages reduce time, costs, errors, and duplicate payments in invoice processing. Risks system errors unauthorized access, fraud, and inadequate backup of files. SO 6 Computer-based matching of purchasing documents and the related risks and controls

395 Risks and Controls in Computer-Based Matching
Security and Confidentiality Risks Processing Integrity Risks Availability Risks SO 6 Computer-based matching of purchasing documents and the related risks and controls

396 Elevated Receipt Settlement
Prior to 2000, some companies, began implementing invoice-less matching systems for purchasing and paying vendors. Evaluated receipt settlement (ERS) - receipt of goods is carefully evaluated and, if it matches the purchase order, settlement of the obligation occurs through this system. SO 7 Evaluated receipt settlement systems and the related risks and controls

397 Risks and Controls in Elevated Receipt Settlement
Security and Confidentiality Risks Processing Integrity Risks Availability Risks SO 7 Evaluated receipt settlement systems and the related risks and controls

398 Risks and Controls in Elevated Receipt Settlement
Quick Review Which of the following IT systems is designed to avoid the document matching process and is an “invoiceless” system? Computer-based matching system Electronic data interchange Evaluated receipt settlement Microsoft Dynamics GP® SO 7 Evaluated receipt settlement systems and the related risks and controls

399 E-Business and Electronic Data Interchange
Value Added Networks (VANs) Exhibit 8-18 EDI Using a Third-Party Network

400 Risks and Controls in El-Business and EDI
Exhibit 9-20 E-Business and EDI Risks and Controls SO 8 E-business and electronic data interchange (EDI) systems and the related risks and controls

401 Risks and Controls in El-Business and EDI
Quick Review Input controls such as field check, validity check, limit check, and reasonableness check are useful in IT systems of purchasing processes to lessen which of the following risks? Unauthorized access Invalid data entered by vendors Repudiation of purchase transactions Virus and worm attacks SO 8 E-business and electronic data interchange (EDI) systems and the related risks and controls

402 E-Payables Electronic Invoice Presentment and Payment (EIPP)
Takes advantage of the connectivity of the Internet to electronically send invoices or payments. SO 9 E-payables system

403 Procurement Cards Procurement cards Called p-cards
Credit cards that organization gives to certain employees to make designated purchases. Normally not used to purchase raw materials or products Used for small-dollar-amount purchases. SO 10 Procurement cards

404 Ethical Issues Related to Expenditures
It is important to establish internal control policies and IT controls to help prevent or detect such fraud, ethical lapses, or errors. SO 11 Ethical issues related to expenditures processes

405 Ethical Issues Related to Expenditures
It is important to establish internal control policies and IT controls to help prevent or detect fraud, ethical lapses, or errors. SO 11 Ethical issues related to expenditures processes

406 Ethical Issues Related to Expenditures
Quick Review Which of the following is most likely to be effective in deterring fraud by upper level managers? Internal controls An enforced code of ethics Matching documents prior to payment Segregating custody of inventory from inventory record keeping SO 11 Ethical issues related to expenditures processes

407 Corporate Governance in Expenditure Processes
Corporate governance policies should incorporate the four areas of management oversight, internal controls, financial stewardship, and ethical behavior. SO 12 Corporate governance in expenditure processes

408 Copyright Copyright © 2008 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.

409

410 Accounting Information Systems, 1st Edition
Expenditures Processes and Controls-Payroll and Fixed Assets Accounting Information Systems, 1st Edition

411 Study Objectives An introduction to payroll and fixed asset processes
Payroll processes Risks and controls in payroll processes IT systems of payroll processes Fixed asset processes Risks and controls in fixed asset processes IT Systems of fixed asset processes Ethical issues related to payroll and fixed assets processes Corporate governance in payroll and fixed assets processes 1. On the topic, “Challenges Facing Financial Accounting,” what did the AICPA Special Committee on Financial Reporting suggest should be included in future financial statements? Non-financial Measurements (customer satisfaction indexes, backlog information, and reject rates on goods purchases). Forward-looking Information Soft Assets (a company’s know-how, market dominance, marketing setup, well-trained employees, and brand image). Timeliness (no real time financial information)

412 Introduction to Payroll and Fixed Asset Processes
Payroll processes Acquiring and maintaining human resources. Capturing and maintaining employee data. Paying employees. Recording cash and payroll liabilities and expenses. Fixed asset processes Purchasing property. Capturing and maintaining relevant data about assets. Paying for and recording the related assets. Recording depreciation and other expenses. Accounting for gains or losses. SO 1 An introduction to payroll and fixed asset processes

413 Introduction to Payroll and Fixed Asset Processes
Various risks Recorded expenditures may not be valid. Transactions may be recorded in the wrong amount. Valid expenditure transactions may have been omitted. Transactions may have been recorded in the wrong employee or vendor account. Transactions may not have been recorded in a timely manner. Transactions may not have been accumulated or transferred to the accounting records correctly. SO 1 An introduction to payroll and fixed asset processes

414 Payroll and Fixed Asset Processes
Exhibit 10-1 Expenditure Processes within the Overall System SO 1 Payroll and fixed asset processes

415 Introduction to Payroll and Fixed Asset Processes
Quick Review Which of the following statements about payroll and fixed asset processes is true? Both have only routine processes. Both have only nonroutine processes. Both have routine and nonroutine processes. Payroll has only routine processes, while fixed asset has only nonroutine processes SO 1 An introduction to payroll and fixed asset processes

416 Payroll Processes Terminology Human resources department
Organization chart Time sheet Payroll register Payroll disbursements journal SO 2 Payroll processes

417 Payroll Processes SO 2 Payroll processes
Exhibit 10-3 Payroll Process Map See next slide for larger image. SO 2 Payroll processes

418 Payroll Processes SO 2 Payroll processes Exhibit 10-3
Payroll Process Map SO 2 Payroll processes

419 Payroll Processes SO 2 Payroll processes Exhibit 10-3
Payroll Process Map SO 2 Payroll processes

420 Quick Review Payroll Processes
For a given pay period, the complete listing of paychecks for the pay period is a payroll register. payroll ledger. payroll journal. paymaster. SO 2 Payroll processes

421 Quick Review Payroll Processes A payroll voucher
authorizes an employee paycheck to be written. authorizes the transfer of cash from a main operating account to a payroll account. authorizes the transfer of cash from a payroll account to a main operating account. authorizes the paymaster to distribute paychecks. SO 2 Payroll processes

422 Risks and Controls in Payroll Processes
Common procedures associated with the payroll process: Authorization of transactions Segregation of duties Adequate records and documents Security of assets and documents Independent checks and reconciliation Cost-benefit considerations SO 3 Risks and controls in payroll processes

423 Risks and Controls in Payroll Processes
Quick Review For proper segregation of duties, the department that should authorize new employees for payroll would be payroll. human resources. cash disbursement. general ledger. SO 3 Risks and controls in payroll processes

424 Risks and Controls in Payroll Processes
Quick Review Internal control problems would be likely to result if a company’s payroll department supervisor was also responsible for reviewing authorization forms for new employees. comparing the payroll register with the batch transmittal data. authorizing changes in employee pay rates. hiring subordinates to work in the payroll department. SO 3 Risks and controls in payroll processes

425 Risks and Controls in Payroll Processes
Quick Review Which of the following departments or positions most likely would approve changes in pay rates and deductions from employee salaries? Human resources Treasurer Controller Payroll SO 3 Risks and controls in payroll processes

426 IT Systems of Payroll Processes
Payroll requires routine mathematical calculations and storing of a large volume of data regarding employees, deductions, vacation days, sick days, and other data. IT systems can include payroll and human resources software, automated timekeeping, Internet-based timekeeping, and electronic transfer of funds. Some organizations outsource payroll processing. SO 4 IT systems of payroll processes

427 IT Systems of Payroll Processes
Quick Review An integrated IT system of payroll and human resources may have extra risks above those of a manual system. Passwords and access logs are controls that should be used in these integrated systems to lessen the risk of hardware failures. erroneous data input. payroll data that does not reconcile to time cards. unauthorized access to payroll data. SO 4 IT systems of payroll processes

428 Fixed Assets Processes
Fixed assets may include the following: vehicles, office equipment and computers, machinery and production equipment, furniture, and real estate (such as land and buildings). SO 5 Fixed asset processes

429 Fixed Assets Processes
Fixed Asset Acquisitions Initiated by user department. Large cash outlays sometimes required. Non-routine transactions that require specific authorization. Capital budget. Fixed asset subsidiary ledger. SO 5 Fixed asset processes

430 Fixed Assets Processes
Fixed Asset Continuance Involves: Updating cost data for improvements Updating estimated figures as needed Adjusting for periodic depreciation Keeping track of physical location of assets Depreciation schedule SO 5 Fixed asset processes

431 Fixed Assets Processes
Fixed Asset Disposals Four Basis Steps: Date of disposal is noted, and depreciation computations updated through this date. Disposed assets are removed from fixed asset subsidiary ledger. Related depreciation accounts are removed. Gains or losses are computed. SO 5 Fixed asset processes

432 Fixed Assets Processes
Exhibit 10-11 Fixed Asset Disposal Process Map See next slide for larger image. SO 5 Fixed asset processes

433 Fixed Assets Processes
Exhibit 10-11 Fixed Asset Disposal Process Map SO 5 Fixed asset processes

434 Fixed Assets Processes
Exhibit 10-11 Fixed Asset Disposal Process Map SO 5 Fixed asset processes

435 Fixed Assets Processes
Quick Review The purchase of fixed assets is likely to require different authorization processes than the purchase of inventory. Which of the following is not likely to be part of the authorization of fixed assets? Specific authorization Inclusion in the capital budget An investment analysis or feasibility analysis of the purchase Approval of the depreciation schedule SO 5 Fixed asset processes

436 Risks and Controls in Fixed Assets Processes
Authorization of Transactions Three Formal Steps: Investment analysis Comparison with the capital budget Review of the proposal and specific approval Exhibit 10-13 Fixed Asset Approval Levels SO 6 Risks and controls in fixed asset processes

437 Risks and Controls in Fixed Assets Processes
Common procedures associated with the fixed asset process: Authorization of transactions Segregation of duties Adequate records and documents Security of assets and documents Independent checks and reconciliation Cost-benefit considerations SO 6 Risks and controls in fixed asset processes

438 Risks and Controls in Fixed Assets Processes
Quick Review Which of the following is not a part of “adequate documents and records” for fixed assets? Fixed asset journal Fixed asset subsidiary ledger Purchase order Fixed asset tags SO 6 Risks and controls in fixed asset processes

439 Risks and Controls in Fixed Assets Processes
Quick Review Which of the following questions would be least likely to appear on an internal control questionnaire regarding the initiation and execution of new PP&E purchases? Are requests for repairs approved by someone higher than the department initiating the request? Are prenumbered purchase orders used and accounted for? Are purchase requisitions reviewed for consideration of soliciting competitive bids? Is access to the assets restricted and monitored? SO 6 Risks and controls in fixed asset processes

440 Risks and Controls in Fixed Assets Processes
Quick Review Which of the following reviews would be most likely to indicate that a company’s property, plant, and equipment accounts are not understated? Review of the company’s repairs and maintenance expense accounts. Review of supporting documentation for recent equipment purchases. Review and recomputation of the company’s depreciation expense accounts. Review of the company’s miscellaneous revenue account. SO 6 Risks and controls in fixed asset processes

441 IT Systems of Fixed Assets Processes
The efficiency and effectiveness of accounting for fixed assets can be greatly improved through the use of specialized asset management software. Such software simplifies the record keeping regarding location and description of fixed assets, depreciation and maintenance records, audit trail, and linkages to the general ledger. SO 7 IT systems of fixed assets processes

442 IT Systems of Fixed Assets Processes
Quick Review Which of the following is not an advantage of fixed asset software systems when compared with spreadsheets? Better ability to handle nonfinancial data such as asset location Easier to apply different depreciation policies to different assets Manual processes to link to the general ledger Expanded opportunities for customized reporting SO 7 IT systems of fixed assets processes

443 Ethical Issues Related to Payroll and Fixed Assets Processes
Typical sources of time sheet falsifications: Exaggeration of hours worked Falsification of overtime or holiday time worked Falsification of sales in order to increase commission payouts Overstatement of job-related expenses SO 8 Ethical issues related to payroll and fixed assets processes

444 Ethical Issues Related to Payroll and Fixed Assets Processes
Ghost Employee Clues that a ghost employee may exist: Payroll register identifies paychecks without adequate tax withholdings. Personnel files contain duplicate addresses, Social Security numbers, or bank account numbers. Payroll expenses are over budget. Paychecks not claimed when paymaster distributes. Paychecks contain dual endorsements. SO 8 Ethical issues related to payroll and fixed assets processes

445 Ethical Issues Related to Payroll and Fixed Assets Processes
Fixed asset information is more likely to be manipulated by management to unethically enhance the financial statements. Often, this occurs when management misclassifies expenses as fixed asset purchases. SO 8 Ethical issues related to payroll and fixed assets processes

446 Quick Review Ethical Issues Related to Payroll
The term “ghost employee” means that hours worked has been exaggerated by an employee. false sales have been claimed to boost commission earned. overtime hours have been inflated. someone who does not work for the company receives a paycheck. SO 8 Ethical issues related to payroll and fixed assets processes

447 Corporate Governance in Payroll and Fixed Assets Processes
In addition to the need for strong management oversight, internal controls, and ethical practices, corporate managers must recognize their responsibility to be good stewards of the assets underlying the payroll and fixed assets processes. SO 9 Corporate governance in payroll and fixed assets processes

448 Copyright Copyright © 2008 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.

449

450 Accounting Information Systems, 1st Edition
Conversion Processes and Controls Accounting Information Systems, 1st Edition

451 Study Objectives Basic features of conversion processes
The components of the logistics function Cost accounting reports generated by conversion processes Risks and controls in conversion processes IT systems of conversion processes Ethical issues related to conversion processes Corporate governance in conversion processes 1. On the topic, “Challenges Facing Financial Accounting,” what did the AICPA Special Committee on Financial Reporting suggest should be included in future financial statements? Non-financial Measurements (customer satisfaction indexes, backlog information, and reject rates on goods purchases). Forward-looking Information Soft Assets (a company’s know-how, market dominance, marketing setup, well-trained employees, and brand image). Timeliness (no real time financial information)

452 Basic Features of Conversion Processes
Conversion processes - activities related to the transformation of resources into goods or services. Resources include: Materials Labor Overhead Various other expenses necessary to run the operating facility SO 1 Basic features of conversion processes

453 Basic Features of Conversion Processes
Major activities within this process include Operational planning, Optimizing use of employees, property, and inventories, Controlling production flows, Ensuring product quality, and Preparing related cost accounting and financial accounting records. SO 1 Basic features of conversion processes

454 Basic Features of Conversion Processes
Exhibit 11-1 Conversion Processes within the Overall System SO 1 Basic features of conversion processes

455 Basic Features of Conversion Processes
Exhibit 11-2 Overview of the Conversion Processes SO 1 Basic features of conversion processes

456 Basic Features of Conversion Processes
Quick Review Manufacturing has changed in recent years as a result of each of the following factors except: globalization technological advances increased competition lack of economic prosperity SO 1 Basic features of conversion processes

457 Components of the Logistics Function
Logistics is the logical, systematic flow of resources throughout the organization. Three primary components: planning, resource management, and operations. SO 2 The components of the logistics function

458 Components of the Logistics Function
bill of materials operations list Production orders Production schedule Exhibit 11-3 Components of the Logistics Function SO 2 The components of the logistics function

459 Components of the Logistics Function
Terminology Economic Order Quantities (EOQ) Raw materials Work-in-process Finished goods Inventory status report Exhibit 11-3 Components of the Logistics Function SO 2 The components of the logistics function

460 Components of the Logistics Function
Operations may be performed by : Continuous processing of homogeneous products Batch processing Custom, made-to-order processing Exhibit 11-3 Components of the Logistics Function SO 2 The components of the logistics function

461 Components of the Logistics Function
Exhibit 11-5 Production Process Map See next slide for larger image. SO 2 The components of the logistics function

462 Components of the Logistics Function
Exhibit 11-5 Production Process Map SO 2 The components of the logistics function

463 Components of the Logistics Function
Exhibit 11-5 Production Process Map SO 2 The components of the logistics function

464 Components of the Logistics Function
Quick Review The term conversion processes is often used synonymously with operations. production. manufacturing. all of the above. SO 2 The components of the logistics function

465 Components of the Logistics Function
Quick Review Which of the following activities is not part of the planning component of the logistics function? Research and development Capital budgeting Human resource management Scheduling SO 2 The components of the logistics function

466 Components of the Logistics Function
Quick Review Which of the following terms relates to the control of materials being held for future production? Routing Work-in-process Stores Warehousing SO 2 The components of the logistics function

467 Components of the Logistics Function
Quick Review When additional procedures are necessary to bring a defective product up to its required specifications, this is referred to as rework. scrap. work-in-process. variance reporting. SO 2 The components of the logistics function

468 Components of the Logistics Function
Quick Review A firm expects to sell 1000 units of its best-selling product in the coming year. Ordering costs for this product are $100 per order, and carrying costs are $2 per unit. Compute the optimum order size, using the EOQ model. 10 units 224 units 317 units 448 units SO 2 The components of the logistics function

469 Cost Accounting Reports Generated by Conversion Processes
Standard costs are expected costs based on projections of a product’s required resources. Perpetual inventory systems involve recording purchases as raw materials inventory, recording all components of work-in-process for inventories in various stages of production, and recording total cost of sales for products completed and sold. SO 3 Cost accounting reports generated by conversion processes

470 Cost Accounting Reports Generated by Conversion Processes
Periodic inventory systems involve updating the inventory and cost of sales accounts only at the end of the period. Variances represent the differences between actual costs and the standard costs applied. SO 3 Cost accounting reports generated by conversion processes

471 Risks and Controls in Conversion Processes
Common procedures within the conversion process: Authorization of transactions Initiation of production orders Issuance of materials into production Transfer finished goods to warehouse or shipping areas Segregation of duties Adequate records and documents SO 4 Risks and controls in conversion processes

472 Risks and Controls in Conversion Processes
Common procedures within the conversion process: Security of assets and documents Independent checks and reconciliation Physical inventory count Physical inventory reconciliation Cost-benefit considerations SO 4 Risks and controls in conversion processes

473 Risks and Controls in Conversion Processes
Quick Review Which of the following internal controls is typically associated with the maintenance of accurate inventory records? Performing regular comparisons of perpetual records with recent costs of inventory items Using a just-in-time system to keep inventory levels at a minimum Performing a match of the purchase request, receiving report, and purchase order before payment is approved Using physical inventory counts as a basis for adjusting the perpetual records SO 4 Risks and controls in conversion processes

474 Risks and Controls in Conversion Processes
Quick Review The goal of a physical inventory reconciliation is to determine the quantity of inventory sold. compare the physical count with the perpetual records. compare the physical count with the periodic records. determine the quantity of inventory in process. SO 4 Risks and controls in conversion processes

475 IT Systems of Conversion Processes
Computerized systems may provide the following benefits: Automatic computation of materials requirements Systematic scheduling that allows for greater flexibility and increased efficiencies Timely transfer of inventories due to the automatic notification features Validation of data entries Automatic updating of inventory status reports Automatic preparation of financial accounting entries and cost accounting reports SO 5 IT systems of conversion processes

476 IT Systems of Conversion Processes
Additional trends that enhance the conversion process: Computer-aided design (CAD) Computer-aided manufacturing (CAM) Industrial robots Materials resource planning (MRP) Manufacturing resource planning (MRP-II) Enterprise-wide resource planning (ERP) Computer-integrated manufacturing systems (CIMs) Just-in-time (JIT) production systems SO 5 IT systems of conversion processes

477 IT Systems of Conversion Processes
Match IT systems on left with their definitions on the right: CAD CAM MRP MRP-II ERP CIMs JIT A network including production equipment, computer terminals, and accounting systems b. Electronic workstation including advanced graphics and 3-D modeling of production processes Automated scheduling of manufacturing resources, including scheduling, capacity, and forecasting functions The minimization of inventory levels by the control of production so that products are produced on a tight schedule in time for their sale A single software system that includes all manufacturing and related accounting applications Automated scheduling of production orders and materials movement Production automation, including use of computers and robotics SO 5 IT systems of conversion processes

478 IT Systems of Conversion Processes
Match IT systems on left with their definitions on the right: CAD CAM MRP MRP-II ERP CIMs JIT A network including production equipment, computer terminals, and accounting systems b. Electronic workstation including advanced graphics and 3-D modeling of production processes Automated scheduling of manufacturing resources, including scheduling, capacity, and forecasting functions The minimization of inventory levels by the control of production so that products are produced on a tight schedule in time for their sale A single software system that includes all manufacturing and related accounting applications Automated scheduling of production orders and materials movement Production automation, including use of computers and robotics SO 5 IT systems of conversion processes

479 IT Systems of Conversion Processes
Match IT systems on left with their definitions on the right: CAD CAM MRP MRP-II ERP CIMs JIT A network including production equipment, computer terminals, and accounting systems b. Electronic workstation including advanced graphics and 3-D modeling of production processes Automated scheduling of manufacturing resources, including scheduling, capacity, and forecasting functions The minimization of inventory levels by the control of production so that products are produced on a tight schedule in time for their sale A single software system that includes all manufacturing and related accounting applications Automated scheduling of production orders and materials movement Production automation, including use of computers and robotics SO 5 IT systems of conversion processes

480 IT Systems of Conversion Processes
Match IT systems on left with their definitions on the right: CAD CAM MRP MRP-II ERP CIMs JIT A network including production equipment, computer terminals, and accounting systems b. Electronic workstation including advanced graphics and 3-D modeling of production processes Automated scheduling of manufacturing resources, including scheduling, capacity, and forecasting functions The minimization of inventory levels by the control of production so that products are produced on a tight schedule in time for their sale A single software system that includes all manufacturing and related accounting applications Automated scheduling of production orders and materials movement Production automation, including use of computers and robotics SO 5 IT systems of conversion processes

481 IT Systems of Conversion Processes
Match IT systems on left with their definitions on the right: CAD CAM MRP MRP-II ERP CIMs JIT A network including production equipment, computer terminals, and accounting systems b. Electronic workstation including advanced graphics and 3-D modeling of production processes Automated scheduling of manufacturing resources, including scheduling, capacity, and forecasting functions The minimization of inventory levels by the control of production so that products are produced on a tight schedule in time for their sale A single software system that includes all manufacturing and related accounting applications Automated scheduling of production orders and materials movement Production automation, including use of computers and robotics SO 5 IT systems of conversion processes

482 IT Systems of Conversion Processes
Match IT systems on left with their definitions on the right: CAD CAM MRP MRP-II ERP CIMs JIT A network including production equipment, computer terminals, and accounting systems b. Electronic workstation including advanced graphics and 3-D modeling of production processes Automated scheduling of manufacturing resources, including scheduling, capacity, and forecasting functions The minimization of inventory levels by the control of production so that products are produced on a tight schedule in time for their sale A single software system that includes all manufacturing and related accounting applications Automated scheduling of production orders and materials movement Production automation, including use of computers and robotics SO 5 IT systems of conversion processes

483 IT Systems of Conversion Processes
Match IT systems on left with their definitions on the right: CAD CAM MRP MRP-II ERP CIMs JIT A network including production equipment, computer terminals, and accounting systems b. Electronic workstation including advanced graphics and 3-D modeling of production processes Automated scheduling of manufacturing resources, including scheduling, capacity, and forecasting functions The minimization of inventory levels by the control of production so that products are produced on a tight schedule in time for their sale A single software system that includes all manufacturing and related accounting applications Automated scheduling of production orders and materials movement Production automation, including use of computers and robotics SO 5 IT systems of conversion processes

484 IT Systems of Conversion Processes
Match IT systems on left with their definitions on the right: SO 5 IT systems of conversion processes

485 IT Systems of Conversion Processes
Quick Review Which of the following is not considered a benefit of using computerized conversion systems? Automatic computation of materials requirements Increased sales and cost of sales Increased efficiency and flexibility Early error detection and increased accuracy SO 5 IT systems of conversion processes

486 IT Systems of Conversion Processes
Quick Review Which of the following represents a method of managing inventory designed to minimize a company’s investment in inventories by scheduling materials to arrive at the time they are needed for production? The economic order quantity (EOQ) Material resource planning (MRP) First-in, first-out (FIFO) Just-in-time (JIT) SO 5 IT systems of conversion processes

487 IT Systems of Conversion Processes
Quick Review For which of the following computerized conversion systems is Wal-Mart well known? CAD/CAM MRP-II CIMs JIT SO 5 IT systems of conversion processes

488 Ethical Issues Related to Conversion Processes
Earnings management is the act of misstating financial information in order to improve financial statement results. Absorption costing involves the inclusion of both variable and fixed costs in the determination of unit costs for ending inventories and cost of goods sold. SO 6 Ethical issues related to conversion processes

489 Corporate Governance in Conversion Processes
The internal controls and ethical tone and procedures within the conversion process are also part of the corporate governance structure. Establishing and maintaining reliable inventory management processes, internal controls, and ethical practices help ensure proper financial stewardship. SO 7 Corporate governance in conversion processes

490 Copyright Copyright © 2008 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.

491

492 Accounting Information Systems, 1st Edition
Administrative Processes and Controls Accounting Information Systems, 1st Edition

493 Study Objectives An introduction to administrative processes
Source of capital processes Investment processes Risks and controls in capital and investment processes General ledger processes Risks and controls and risks in general ledger processes Reporting as an output of the general ledger processes Ethical issues related to administrative processes and reporting Corporate governance in administrative processes and reporting 1. On the topic, “Challenges Facing Financial Accounting,” what did the AICPA Special Committee on Financial Reporting suggest should be included in future financial statements? Non-financial Measurements (customer satisfaction indexes, backlog information, and reject rates on goods purchases). Forward-looking Information Soft Assets (a company’s know-how, market dominance, marketing setup, well-trained employees, and brand image). Timeliness (no real time financial information)

494 Administrative Processes
Three administrative processes described in this chapter: Source of capital processes Investment processes General ledger processes

495 Introduction to Administrative Processes
Administrative processes are transactions and activities that either are specifically authorized by top managers or are used by managers to perform administrative functions. First set of processes: Examples include sale of stocks or bonds, the initiation of loans, bonds or notes payable, and the investment of funds in marketable securities. Second set of processes: financial information being recorded in general ledger accounts. SO 1 An introduction to administrative processes

496 Introduction to Administrative Processes
Exhibit 12-2 Overall View of Transactions, Processes, and Resulting Reports SO 1 An introduction to administrative processes

497 Introduction to Administrative Processes
Quick Review Which of the following is not part of an administrative process? The sale of stock The sale of bonds The write-off of bad debts The purchase of marketable securities SO 1 An introduction to administrative processes

498 Sources of Capital Processes
Capital is the funds used to acquire long-term, capital assets of an organization. Source of capital processes are those processes to authorize the raising of capital, the execution of raising capital, and the proper accounting of that capital. SO 2 Source of capital processes

499 Sources of Capital Processes
Exhibit 12-3 Sources of Capital Process Map SO 2 Source of capital processes

500 Sources of Capital Processes
Quick Review Which of the following statements is not true regarding source of capital transactions? These processes should not be initiated unless there is specific authorization by management at a top level. Source of capital processes will result in potential dividend or interest payments. Retirement of debt is a source of capital process. The fact that these transactions and processes cannot occur without oversight by top management means other controls are not necessary. SO 2 Source of capital processes

501 Investment Processes Management should properly manage, or administer, the investment of excess funds. Investment processes are those processes which authorize, execute, manage, and properly account for investments of excess funds. SO 3 Investment processes

502 Investment Processes SO 3 Investment processes Exhibit 12-4
Investment Process Map SO 3 Investment processes

503 Quick Review Investment Processes
The officer within a corporation that usually has oversight responsibility for investment processes is the controller. treasurer. chief executive officer (CEO). chief accounting officer (CAO). SO 3 Investment processes

504 Risks and Controls in Capital and Investment Processes
For both source of capital processes and investment processes, the important control is the specific authorization and oversight by top management. Generally, the risks are not related to employee fraud, but are instead related to management fraud. SO 4 Risks and controls in capital and investment processes

505 Quick Review Risks and Controls
Which of the following statements is not true regarding internal controls of capital and investment processes? Internal controls aimed at preventing and detecting employee fraud in capital and investment processes are not as effective. Top management fraud, rather than employee fraud, is more likely to occur. Any fraud is likely to involve manipulating capital and investment processes. Because of top management oversight, the auditor need not review these processes.

506 General Ledger SO 5 General ledger processes Exhibit 12-5
Accounting Cycle Process Map SO 5 General ledger processes

507 General Ledger Process
Quick Review Which of the following statements is true? Routine transactions are recorded in the general journal. Nonroutine transactions are entered in the general journal. Nonroutine transactions are recorded in a subsidiary ledger. Nonroutine transactions are recorded in a special journal. SO 5 General ledger processes

508 General Ledger Process
Quick Review Regarding subsidiary ledgers and general ledger control accounts, which of the following is not true? Total balances in a subsidiary ledger should always equal the balance in the corresponding general ledger account. The general ledger maintains details of subaccounts. Control is enhanced by separating the subsidiary ledger from the general ledger. Reconciling a subsidiary ledger to the general ledger can help to detect errors or fraud. SO 5 General ledger processes

509 Risks and Controls in General Ledger Processes
Common procedures associated with the general ledger: Authorization of transactions Segregation of duties Adequate records and documents Security of the general ledger and documents Independent checks and reconciliation Cost-benefit considerations SO 6 Risks and controls and risks in general ledger processes

510 Risks and Controls in General Ledger Processes
Quick Review Which of the following statements regarding the authorization of general ledger posting is not true? Posting to the general ledger always requires specific authorization. User IDs and passwords can serve as authorization to post transactions to the general ledger. A journal voucher serves as authorization for manual systems. As IT systems become more automated, the authorization of general ledger posting is moved to lower levels of employees. SO 6 Risks and controls and risks in general ledger processes

511 Risks and Controls in General Ledger Processes
Quick Review In a manual system with proper segregation of duties, an employee in the general ledger department should only authorize posting to the general ledger. post transactions to the general ledger. reconcile the subsidiary ledger to the general ledger. post transactions to the subsidiary ledger. SO 6 Risks and controls and risks in general ledger processes

512 Reporting as an Output of the General Ledger Processes
External Reporting Four general purpose financial statements balance sheet, income statement, statement of cash flows, and statement of retained earnings are created from general ledger account balances. SO 7 Reporting as an output of the general ledger processes

513 Reporting as an Output of the General Ledger Processes
Internal Reporting Internal reports are usually not financial statements, but reports tailored to specific needs of each management level and function. Many factors affect the type of report provided Type of organization Function managed Time horizon SO 7 Reporting as an output of the general ledger processes

514 Reporting as an Output of the General Ledger
Quick Review Which of the following statements about reporting is true? External users need detailed, rather than summarized, information. All reports, internal and external, are derived only from general ledger data. All organizations need similar internal reports. Internal reports are tailored to the specific needs of each management level and function. SO 7 Reporting as an output of the general ledger processes

515 Reporting as an Output of the General Ledger
For each report shown, indicate in the appropriate column whether the report is likely to be for internal or external users (some reports may be both), and whether data would come exclusively from the general ledger. External Yes Both No Internal No Internal No Internal No External No Internal No SO 7 Reporting as an output of the general ledger processes

516 Ethical Issues Related to Administrative Processes and Reporting
Reasons that unethical and fraudulent behavior would tend to be management-initiated. First, in a properly controlled system, employees do not have access to related assets or source documents. Second, administrative processes are tightly controlled and supervised by top management. Finally, routine nature of processes such as sales, purchasing, payroll, and conversion generates a huge volume of transactions. SO 8 Ethical issues related to administrative processes and reporting

517 Ethical Issues Related to Administrative Processes and Reporting
Unethical Management Behavior in Capital Sources and Investing Management should be honest in the financial statements presented, footnote disclosures, and any related disclosures. not try to mislead creditors about the financial status of the company or its ability to repay any borrowing. SO 8 Ethical issues related to administrative processes and reporting

518 Ethical Issues Related to Administrative Processes and Reporting
Internal Reporting ethical Issues Top management has an ethical obligation to use financial and other reports to encourage beneficial and ethical behavior. Reports to lower level managers are usually used for two purposes. Feedback to lower level managers. Used by upper management to evaluate and reward the performance of lower level managers. SO 8 Ethical issues related to administrative processes and reporting

519 Ethical Issues Related to Administrative Processes and Reporting
Quick Review Which of the following is not an area of measure in a balanced scorecard? Vendor Customer Financial Learning and growth SO 8 Ethical issues related to administrative processes and reporting

520 Corporate Governance in Administrative Processes and Reporting
Setting and monitoring financial goals, and establishing and maintaining reliable accounting journals and ledgers so that performance can be properly reported, are important to effective corporate governance. In addition, internal controls and ethical practices within the administrative processes help ensure proper financial stewardship of a company’s administrative resources. SO 9 Corporate governance in administrative processes and reporting

521 Copyright Copyright © 2008 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.

522

523 Accounting Information Systems, 1st Edition
Data and Databases Accounting Information Systems, 1st Edition

524 Study Objectives The need for data collection and storage
Methods of storing data and the interrelationship between storage and processing The differences between batch processing and real-time processing The importance of databases and the historical progression from flat-file databases to relational databases The need for normalization of data in a relational database Data warehouse and the use of a data warehouse to analyze data The use of OLAP and data mining as analysis tools Distributed databases and advantages of the use of distributed data Controls for Data and Databases Ethical issues related to data collection and storage, and their use in IT systems 1. On the topic, “Challenges Facing Financial Accounting,” what did the AICPA Special Committee on Financial Reporting suggest should be included in future financial statements? Non-financial Measurements (customer satisfaction indexes, backlog information, and reject rates on goods purchases). Forward-looking Information Soft Assets (a company’s know-how, market dominance, marketing setup, well-trained employees, and brand image). Timeliness (no real time financial information)

525 The Need for Data Collection and Storage
Data are the set of facts collected from transactions, whereas information is the interpretation of data that have been processed. Main reasons to store transaction data: To complete transactions from beginning to end. To follow up with customers or vendors and to expedite future transactions. To create accounting reports and financial statements. To provide feedback to management. SO 1 The need for data collection and storage

526 The Need for Data Collection and Storage
Typical storage and processing techniques: The storage media types for data: sequential and random access Methods of processing data: batch and real time Databases and relational databases Data warehouses, data mining, and OLAP Distributed data processing and distributed databases SO 1 The need for data collection and storage

527 The Need for Data Collection and Storage
Concept Check Which of the following best describes the relationship between data and information? a. Data is interpreted information. b. Information is interpreted data. c. Data is more useful than information in decision making. d. Data and information are not related. SO 1 The need for data collection and storage

528 Storing and Accessing Data
Data Storage Terminology Exhibit 13-1 Data Hierarchy Character Field Record File Database SO 2 Methods of storing data and the interrelationship between storage and processing

529 Storing and Accessing Data
Data Storage Media Magnetic tape Sequential access Early Days of Mainframe Computers Modern IT Systems Random Access SO 2 Methods of storing data and the interrelationship between storage and processing

530 Storing and Accessing Data
Concept Check A character is to a field as a. Water is to a pool. b. A pool is to a swimmer. c. A pool is to water. d. A glass is to water. SO 2 Methods of storing data and the interrelationship between storage and processing

531 Storing and Accessing Data
Concept Check Magnetic tape is a form of a. Direct access media. b. Random access media. c. Sequential access media. d. Alphabetical access media. SO 2 Methods of storing data and the interrelationship between storage and processing

532 Data Processing Techniques
Real-time Processing Batch Processing Exhibit 13-2 Comparison of Batch and Real-Time Processing SO 3 The differences between batch processing and real-time processing

533 Data Processing Techniques
Concept Check Which of the following is not an advantage of using real-time data processing? Quick response time to support timely record keeping and customer satisfaction b. Efficiency for use with large volumes of data. c. Provides for random access of data. d. Improved accuracy due to the immediate recording of transactions. SO 3 The differences between batch processing and real-time processing

534 Traditional File-Oriented Approach
Databases Data stored in a form that allows the data to be easily accessed, retrieved, manipulated, and stored. Exhibit 13-3 Traditional File-Oriented Approach Data redundancy Concurrency SO 4 The importance of databases and the historical progression from flat-file databases to relational databases

535 Databases Exhibit 13-3 Database Approach Relationships One-to-One One-to-Many Many-to-Many Database Management System (DBMS) is software that manages the database and controls the access and use of data by individual users and applications. SO 4 The importance of databases and the historical progression from flat-file databases to relational databases

536 The History of Databases
Flat File Database Model Exhibit 13-4 Database Table 1950s and 1960s Text format, sequential order Sequential processing Large volumes of similar transactions Single record not easily retrieved or stored SO 4 The importance of databases and the historical progression from flat-file databases to relational databases

537 The History of Databases
Hierarchical Database Model Inverted tree structure Parent–child, represent one-to-many relationships Record pointer Exhibit 13-5 Linkages in a Hierarchical Database SO 4 The importance of databases and the historical progression from flat-file databases to relational databases

538 The History of Databases
Network Database Model Inverted tree structure More complex relationship linkages by use of shared branches Not very popular, rarely used SO 4 The importance of databases and the historical progression from flat-file databases to relational databases

539 The History of Databases
Relational Database Model Developed in 1969 Stores data in two-dimensional tables Most widely used database structure today Examples include; IBM DB2, Oracle Database, and Microsoft Access SO 4 The importance of databases and the historical progression from flat-file databases to relational databases

540 c. industrial espionage.
Databases Concept Check If a company stores data in separate files in its different departmental locations and is able to update all files simultaneously, it would not have problems with a. attributes. b. data redundancy. c. industrial espionage. d. concurrency. SO 4 The importance of databases and the historical progression from flat-file databases to relational databases

541 b. hierarchical database.
Databases Concept Check When the data contained in a database are stored in large, two-dimensional tables, the database is referred to as a a. flat file database. b. hierarchical database. c. network database. d. relational database. SO 4 The importance of databases and the historical progression from flat-file databases to relational databases

542 Concept Check Databases
Database management systems are categorized by the data structures they support. In which type of database management system is the data arranged in a series of tables? a. Network. b. Hierarchical. c. Relational. d. Sequential. SO 4 The importance of databases and the historical progression from flat-file databases to relational databases

543 The Need for Normalized Data
Relational databases consist of several small tables. Small tables can be joined in ways that represent relationships among the data. Exhibit 13-6 Relational Database in Microsoft Access Bolded field is the primary key. SO 5 The need for normalization of data in a relational database

544 The Need for Normalized Data
Relational database has flexibility in retrieving data. Structured query language (SQL) has become the industry standard. Exhibit 13-7 Relational Database in Microsoft Access SELECT Customers.CustomerID, Customers.CompanyName, Orders.OrderID, Orders.ShippedDate FROM Customers INNER JOIN Orders ON Customers.CustomerID Orders.CustomerID; SO 5 The need for normalization of data in a relational database

545 The Need for Normalized Data
The process of converting data into tables that meet the definition of a relational database is called data normalization. Seven rules of data normalization, additive. Most relational databases are in third normal form. First three rules of data normalization are: Eliminate repeating groups Eliminate redundant data Eliminate columns not dependent on primary key. SO 5 The need for normalization of data in a relational database

546 The Need for Normalized Data
Trade-offs in Database Storage Relational database Not most efficient way to store data that will be used in other ways. Most organizations are willing to accept less transaction processing efficiency for better query opportunities. SO 5 The need for normalization of data in a relational database

547 The Need for Normalized Data
Concept Check Which of the following statements is not true with regard to a relational database? a. It is flexible and useful for unplanned, ad hoc queries. b. It stores data in tables. c. It stores data in a tree formation. d. It is maintained on direct access devices. SO 5 The need for normalization of data in a relational database

548 Use of a Data Warehouse to Analyze Data
Management often needs data from several fiscal periods from across the whole organization. Exhibit 13-8 The Data Warehouse and Operational Databases SO 6 Data warehouse and the use of a data warehouse to analyze data

549 Use of a Data Warehouse to Analyze Data
Management often needs data from several fiscal periods from across the whole organization. Build the data warehouse Identify the data Standardize the data Cleanse, or scrub, the data Upload the data SO 6 Data warehouse and the use of a data warehouse to analyze data

550 Use of a Data Warehouse to Analyze Data
Concept Check A collection of several years’ nonvolatile data used to support strategic decision-making is a(n) a. operational database. b. data warehouse. c. data mine. d. what-if simulation. SO 6 Data warehouse and the use of a data warehouse to analyze data

551 Data Analysis Tools Data mining is the process of searching for identifiable patterns in data that can be used to predict future behavior. OLAP is a set of software tools that allow online analysis of the data within a data warehouse. Analytical methods in OLAP usually include: Drill down Consolidation Pivoting Time series analysis Exception reports What-if simulations SO 7 The use of OLAP and data mining as analysis tools

552 Concept Check Data Analysis Tools
Data mining would be useful in all of the following situations except a. identifying hidden patterns in customers’ buying habits. b. assessing customer reactions to new products. c. determining customers’ behavior patterns. d. determining customers’ behavior patterns. SO 7 The use of OLAP and data mining as analysis tools

553 Distributed Data Processing
Early days Centralized processing Centralized databases Today’s IT Environment Distributed data processing (DDP) Distributed databases (DDB) SO 8 Distributed databases and advantages of the use of distributed data

554 Distributed Data Processing
Distributing the processing and data offers the following advantages: Reduced hardware cost Improved responsiveness Easier incremental growth Increased user control and user involvement Automatic integrated backup The most popular type of distributed system is a client/server system. SO 8 Distributed databases and advantages of the use of distributed data

555 Distributed Data Processing
Concept Check A set of small databases where data are collected, processed, and stored on multiple computers within a network is a a. Centralized database. b. Distributed database. c. Flat file database. d. High-impact process. SO 8 Distributed databases and advantages of the use of distributed data

556 IT Controls for Data and Databases
To ensure integrity (completeness and accuracy) of data in the database, IT application controls should be used. These controls are input, processing, and output controls such as data validation, control totals and reconciliation, and reports that are analyzed by managers. SO 9 Controls for data and databases

557 Ethical Issues Related to Data Collection
Ethical Responsibilities of the Company Data collected and stored in databases in many instances consist of information that is private between the company and its customer. Ten privacy practices for online companies: Management Notice Choice and consent Collection Use and retention Access Disclosure to third parties Security for privacy Quality Monitoring and enforcement SO 10 Ethical issues related to data collection and storage, and their use in IT systems

558 Ethical Issues Related to Data Collection
Ethical Responsibilities of Employees Employees have an ethical obligation to avoid misuse of any private or personal data about customers. There are no specific IT controls that would always prevent authorized employees from disclosing private information. SO 10 Ethical issues related to data collection and storage, and their use in IT systems

559 Ethical Issues Related to Data Collection
Ethical Responsibilities of Customers Customers have an obligation to provide accurate and complete information. keep any known company information confidential. avoid improper use of data that they gain from accessing a database as a customer. SO 10 Ethical issues related to data collection and storage, and their use in IT systems

560 Ethical Issues Related to Data Collection
Concept Check Each of the following is an online privacy practice recommended by the AICPA Trust Principles Privacy Framework except: a. Redundant data should be eliminated from the database. b. Notification of privacy policies should be given to customers. Private information should not be given to third parties without the customer’s consent d. All of the above. SO 10 Ethical issues related to data collection and storage, and their use in IT systems

561 Copyright Copyright © 2008 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.

562

563 Accounting Information Systems, 1st Edition
E-Commerce and E-Business Accounting Information Systems, 1st Edition

564 Study Objectives An introduction to e-commerce and e-business.
The history of the Internet. The physical structure and standards of the Internet. E-commerce and the benefits of e-commerce. The privacy expectations in e-commerce. E-business and the IT enablement. E-business enabling examples. Intranets and extranets to enable e-business. Internal controls for the Internet, intranets, and extranets. XML and XBRL as e-business tools. The ethical issues in e-business and e-commerce. 1. On the topic, “Challenges Facing Financial Accounting,” what did the AICPA Special Committee on Financial Reporting suggest should be included in future financial statements? Non-financial Measurements (customer satisfaction indexes, backlog information, and reject rates on goods purchases). Forward-looking Information Soft Assets (a company’s know-how, market dominance, marketing setup, well-trained employees, and brand image). Timeliness (no real time financial information)

565 Introduction to E-commerce and E-business
E-commerce - electronically enabled transactions between a business and its customers. E-business - includes not only electronic trade with customers, but also servicing customers and vendors, trading information with customers and vendors, and electronic recording and control of internal processes. SO 1 An introduction to e-commerce and e-business.

566 Introduction to E-commerce and E-business
Exhibit 14-1 E-business and E-commerce The most common method of conducting e-commerce and e-business is to use the Internet to electronically exchange data. SO 1 An introduction to e-commerce and e-business.

567 Introduction to E-commerce and E-business
Quick Review Which of the following statements is true? a. E-business is a subset of e-commerce. b. E-commerce is a subset of e-business. c. E-business and e-commerce are exactly the same thing. d. E-business and e-commerce are not elated. SO 1 An introduction to e-commerce and e-business.

568 The History of the Internet
In 1965, a computer at MIT (Massachusetts) was connected to a computer in California, using dial-up telephone lines. In 1969, computers at four major universities were connected via leased telephone lines. Grew into a network called ARPANET. Purpose was to share military research data among UCLA, UC Santa Barbara (UCSB), Stanford, and the University of Utah. Over time, many other universities, NASA, and the Rand Corporation were connected to this network. SO 2 The history of the Internet.

569 The History of the Internet
Two technologies developed for ARPANET: Packet switching Router was adapted to ARPANET in 1972. BBN Technologies, developed the use of symbol in address. developed a communication protocol to use in ARPANET. in the 1970s, helped develop the TCP/IP protocol. SO 2 The history of the Internet.

570 The History of the Internet
In 1986, the National Science Foundation (NSF) began to develop a backbone set of servers, gateways, and networks that eventually became the Internet. Internet serves as backbone for World Wide Web. In 1992, commercial enterprises began offering Internet access to subscribers. In 1993, first graphical user interface (GUI) browser was developed. In 1995, the NSF relinquished control of the Internet. Since that time, all Internet traffic has been routed through commercial networks. SO 2 The history of the Internet.

571 The History of the Internet
Exhibit 14-2 Chart of the Number of Web Servers

572 The History of the Internet
Quick Review An electronic hardware device that is located at the gateway between two or more networks is a a. packet switch. b. URL. c. router. d. protocol. SO 2 The history of the Internet.

573 The Physical Structure and Standards of the Internet
The Network Types of organizations that make up the Internet. Exhibit 14-3 Architecture of the Internet SO 3 The physical structure and standards of the Internet.

574 The Physical Structure and Standards of the Internet
The Network The Internet comprises, backbone providers, network access points, regional ISPs, local ISPs, and Internet subscribers. SO 3 The physical structure and standards of the Internet.

575 The Physical Structure and Standards of the Internet
The Network The Internet comprises, backbone providers, network access points, regional ISPs, local ISPs, and Internet subscribers. SO 3 The physical structure and standards of the Internet.

576 The Physical Structure and Standards of the Internet
The Network The Internet comprises, backbone providers, network access points, regional ISPs, local ISPs, and Internet subscribers. dial-up modems, digital subscriber lines (DSL), or cable TV lines. SO 3 The physical structure and standards of the Internet.

577 The Physical Structure and Standards of the Internet
Exhibit 14-4 A Simple Web Page and the HTML Source Code. The Common Standards of the Internet HTML - language to present data on websites. SO 3 The physical structure and standards of the Internet.

578 The Physical Structure and Standards of the Internet
Exhibit 14-4 A Simple Web Page and the HTML Source Code. The Common Standards of the Internet SO 3 The physical structure and standards of the Internet.

579 The Physical Structure and Standards of the Internet
Exhibit 14-4 A Simple Web Page and the HTML Source Code. The Common Standards of the Internet URL - uniform resource locater address. Domain Name - Common suffix portions of domain names: .com - commercial .edu - educational .org - nonprofit .gov - governmental .mil - military .net - network URL system actually uses IP addresses. SO 3 The physical structure and standards of the Internet.

580 The Physical Structure and Standards of the Internet
Quick Review The type of organization that serves as the main trunk line of the Internet is called a a. local ISP. b. regional ISP. c. global ISP. d. backbone provider. SO 3 The physical structure and standards of the Internet.

581 E-Commerce and its Benefits
Benefits of E-commerce for the Customer Access to broader market for goods and services. More convenient times for shopping. More choices to the customer. Lower prices. Exchange information with businesses before, during, and after the purchase. Quicker delivery of the product. Receive targeted marketing from businesses. SO 4 E-commerce and the benefits of e-commerce.

582 E-Commerce and its Benefits
Disadvantages of E-commerce for Customer Opportunity for fraud. Theft of assets. Theft of data. Inability to handle or try out the product. SO 4 E-commerce and the benefits of e-commerce.

583 E-Commerce and its Benefits
Benefits of E-commerce for the Business Access to broader market. Reduced marketing costs. Potential for much richer marketing concepts. Quickly react to changes in market conditions. Likely to experience reduced order-processing and distribution costs. Customer convenience likely to result in higher sales. Higher sales with reduced marketing, order processing, and distribution costs can lead to higher profits. SO 4 E-commerce and the benefits of e-commerce.

584 E-Commerce and its Benefits
Disadvantages of E-commerce for Business IT system usually more complex and costly. World Wide Web opens a business to: chances for fraud, hackers, and compromised customer privacy. SO 4 E-commerce and the benefits of e-commerce.

585 E-Commerce and its Benefits
E-Commerce and Traditional Commerce Brick and mortar. Etailers. Clicks and mortar (bricks and clicks). SO 4 E-commerce and the benefits of e-commerce.

586 E-Commerce and its Benefits
Quick Review Which of the following is not a direct advantage for the consumer from e-commerce? a. Access to a broader market. b. More shopping convenience. c. Reduced order-processing cost. d. Information sharing from the company. SO 4 E-commerce and the benefits of e-commerce.

587 E-Commerce and its Benefits
Quick Review Each of the following represents an application of B2C commerce except a. software sales. b. electronic retailing. c. data exchanges. d. stock trading. SO 4 E-commerce and the benefits of e-commerce.

588 Privacy Expectations of Business in E-commerce
Personal information to be protected: Name. Address. Social Security number or other ID number. Employment history. Personal or family health conditions. Personal or family financial information. History of purchases or other transactions. Credit records. SO 5 The privacy expectations in e-commerce.

589 Privacy Expectations of Business in E-commerce
Ten privacy practices to ensure adequate customer confidence regarding privacy of information: Management. Notice. Choice and consent. Collection. Use and retention. Access. Onward transfer and disclosure. Security. Quality. Management and enforcement. SO 5 The privacy expectations in e-commerce.

590 Privacy Expectations of Business in E-commerce
Quick Review Before forwarding customer data, an organization should receive explicit or implicit consent of the customer. This describes which of the AICPA Trust Services Principles online privacy practices? a. Consent. b. Use and retention. c. Access. d. Onward transfer and disclosure. SO 5 The privacy expectations in e-commerce.

591 E-Business and IT Enablement
The supply chain is the set of linked processes that take place from the, acquisition and delivery of raw materials, through the manufacturing, distribution, wholesale, and delivery of the product to the customer. SO 6 E-business and the IT enablement.

592 E-Business and IT Enablement
Exhibit 14-6 E-commerce B2C vs. E-Business B2B4 B2B—A Part of E-Business SO 6 E-business and the IT enablement.

593 E-Business and IT Enablement
Quick Review Which of the following processes within a supply chain can benefit from IT enablement? a. All processes throughout the supply chain. b. Only internal processes within the supply chain. c. Only external processes within the supply chain. d. Exchange processes between a company and its suppliers. SO 6 E-business and the IT enablement.

594 E-Business and IT Enablement
E-Business Enablement Examples SO 7 E-business enabling examples.

595 Intranets and Extranets to Enable E-Business
Exhibit 14-7 Internet, Extranet, and Intranet Three levels of network platforms SO 8 Intranets and extranets to enable e-business.

596 Intranets and Extranets to Enable E-Business
Quick Review Intranets are used for each of the following except a. communication and collaboration. b. business operations and managerial monitoring. c. web publishing. d. customer self-service. SO 8 Intranets and extranets to enable e-business.

597 Internal Controls for the Internet, Intranets and Extranets
Exhibit 14-8 Controls to Limit Access to Intranets and Extranets SO 9 Internal controls for the Internet, intranets, and extranets.

598 Internal Controls for the Internet, Intranets and Extranets
Exhibit 14-8 Controls to Limit Access to Intranets and Extranets SO 9 Internal controls for the Internet, intranets, and extranets.

599 Internal Controls for the Internet, Intranets and Extranets
Quick Review Which of the following IT controls would not be important in an extranet? a. Encryption. b. Password. c. Antivirus software. d. Penetration testing. e. All of the above are important IT controls. SO 9 Internal controls for the Internet, intranets, and extranets.

600 XML and XBRL as Tools to Enable E-Business
Two languages as tools to enable e-business: XML (eXtensible Markup Language) XBRL (eXtensible Business Reporting Language) XML In Internet EDI Internet EDI is alternative to traditional EDI. Uses the Internet to transmit business information between companies. XML allows data exchange over Internet in a rich format. SO 10 XML and XBRL as e-business tools.

601 XML and XBRL as Tools to Enable E-Business
Traditional EDI and VAN versus Internet EDI Exhibit 14-9 SO 10 XML and XBRL as e-business tools.

602 XML and XBRL as Tools to Enable E-Business
XBRL for Financial Statement Reporting Major advantages: Easily used in several formats. Printed in paper format. Displayed as an HTML web page. Sent electronically to the SEC. Transmitted to banks or regulatory agencies. Computer program can extract pieces of information from the XBRL file. SO 10 XML and XBRL as e-business tools.

603 XML and XBRL as Tools to Enable E-Business
Quick Review An extensible markup language designed specifically for financial reporting is a. Internet EDI. b. XML. c. XBRL. d. XFRL. SO 10 XML and XBRL as e-business tools.

604 Ethical Considerations
Online privacy policies of the AICPA Trust services Principles represent ethical obligations to customers. Ethical obligations would dictate that companies take adequate care to guard the security and privacy of data collected through e-commerce. SO 11 The ethical issues in e-business and e-commerce.

605 Copyright Copyright © 2008 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.

606

607 Accounting Information Systems, 1st Edition
IT Infrastructure for E-Business Accounting Information Systems, 1st Edition

608 Study Objectives The overview of an ERP system
The history of ERP systems Current ERP system characteristics The modules of an ERP system The market segments of ERP software systems Implementation issues of ERP systems The benefits and risks of ERP systems ERP systems and the Sarbanes–Oxley Act of 2002 1. On the topic, “Challenges Facing Financial Accounting,” what did the AICPA Special Committee on Financial Reporting suggest should be included in future financial statements? Non-financial Measurements (customer satisfaction indexes, backlog information, and reject rates on goods purchases). Forward-looking Information Soft Assets (a company’s know-how, market dominance, marketing setup, well-trained employees, and brand image). Timeliness (no real time financial information)

609 Overview of ERP Systems
Enterprise Resource Planning (ERP) system integrates all business processes and functions into a single software system, using a single database. ERP system components: Financials Human resources Procurement and logistics Product development and manufacturing Sales and services Analytics Data in a(n) Operational database Data warehouse SO 1 The overview of an ERP system

610 Overview of ERP Systems
Exhibit 15-1 An ERP System SO 1 The overview of an ERP system

611 Overview of ERP Systems
Concept Check Manufacturing companies implement ERP systems for the primary purpose of a. Increasing productivity. b. Reducing inventory quantities. c. Sharing information. d. Reducing investments. SO 1 The overview of an ERP system

612 History of ERP Systems ERP systems:
Developed during the 1960s and 1970s. First generation was materials requirements planning (MRP) software. MRP evolved into manufacturing resource planning (MRP II). ERP software did not become popular with large corporations until the 1990s. SO 2 The history of ERP systems

613 Concept Check History of ERP Systems
In the late 1990s, the Y2K compatibility issue was concerned primarily with computer systems’ a. File retrieval capability. b. Data storage. c. Human resource comparisons. d. Capital budgeting. SO 2 The history of ERP systems

614 Current ERP System Characteristics
EDI, Internet EDI, or extranets are used to connect a company’s ERP system to the IT systems of its suppliers and customers. Exhibit 15-2 An ERP II System SO 3 Current ERP system characteristics

615 Current ERP System Characteristics
ERP spending in 2005 was up 16% over Some reasons for the increase are: Need to improve customer service through standardizing and combining business processes. Global companies may have separate ERP systems in different countries. Aging ERP systems. Bigger IT budgets in 2005. Many companies needed upgraded systems to comply with Sarbanes–Oxley Act. SO 3 Current ERP system characteristics

616 Current ERP System Characteristics
Exhibit 15-3 Pie Chart of ERP Implementations SO 3 Current ERP system characteristics

617 Current ERP System Characteristics
Concept Check Which of the following is not one of the reasons for increased spending on ERP systems in recent years? a. The need for Sarbanes-Oxley compliance. b. Globalization and increased competitive pressures. c. The need for earnings management. d. The need for customer service enhancements. SO 3 Current ERP system characteristics

618 SAP® View of ERP Modules
The top-selling ERP system for large corporations and organizations is SAP. Exhibit 15-4 SAP® View of ERP Modules SO 4 Current ERP system characteristics

619 ERP Modules BE 36: Match the ERP modules with their purpose of the related processes. a. Taking customer orders and preparing for the impending revenue and cash collection. SO 4 Current ERP system characteristics

620 ERP Modules BE 36: Match the ERP modules with their purpose of the related processes. Maintenance of the general ledger and supporting journals and subledgers. SO 4 Current ERP system characteristics

621 Keeping track of purchasing and movement of goods and materials.
ERP Modules BE 36: Match the ERP modules with their purpose of the related processes. Keeping track of purchasing and movement of goods and materials. SO 4 Current ERP system characteristics

622 Accounting for personnel and payroll activities.
ERP Modules BE 36: Match the ERP modules with their purpose of the related processes. Accounting for personnel and payroll activities. SO 4 Current ERP system characteristics

623 ERP Modules BE 36: Match the ERP modules with their purpose of the related processes. Data mining and other processes for obtaining feedback and supporting managerial decision making. SO 4 Current ERP system characteristics

624 Planning and scheduling of conversion activities.
ERP Modules BE 36: Match the ERP modules with their purpose of the related processes. Planning and scheduling of conversion activities. SO 4 Current ERP system characteristics

625 Market Segments of ERP Systems
Tier One Software Usually implemented in very large organizations. Minimum cost to purchase is approximately $350, Often, the cost exceeds $1 million. Three most popular ERP systems in tier one are SAP, Oracle, and Peoplesoft. SO 5 The market segments of ERP software systems

626 Market Segments of ERP Systems
Tier Two Software Intended for organizations with approximately $25 to $250 million in sales. Popular ERP systems are Axapta, Epicor, MAS 500 ERP, Great Plains ERP, and Macola ERP. Price range between $30,000 and $100,000. SO 5 The market segments of ERP software systems

627 Market Segments of ERP Systems
Concept Check The type of ERP system used by large, multinational corporations is known as a. Big bang implementation. b. Modular implementation. c. Tier one software. d. Tier two software. SO 5 The market segments of ERP software systems

628 Implementation of ERP Systems
Important factors and issues to considers when implementing an ERP system. Hiring a consulting firm The best fit ERP system Which modules to implement Best of breed, verses ERP modules Business process reengineering Customization of ERP system Costs of hardware and software Testing the ERP system Data conversion Training of employees Method of conversion, or “go live” Big Bang Location-Wise Modular SO 6 Implementation issues of ERP systems

629 Implementation of ERP Systems
Concept Check Which of the following ERP approaches accomplishes the ERP implementation beginning with one department? a. The pilot method. b. The modular implementation approach. c. The big bang approach. d. The location-wise implementation method. SO 6 Implementation issues of ERP systems

630 Benefits and Risks of ERP Systems
Benefits of ERP Systems Interactive nature of the modules. Real-time nature of processing. “Best Practices” nature of the processes. Single database enhances sharing of information. Capability to analyze large amounts of data. Capability to enhance e-commerce and e-business Capability to interact in real-time. ERP systems are scalable. SO 7 The benefits and risks of ERP systems

631 Benefits and Risks of ERP Systems
Implementation Risks Operation Risks Security Availability Processing integrity Online privacy Confidentiality SO 7 The benefits and risks of ERP systems

632 ERP Systems and the Sarbanes-Oxley Act
Provide feedback information to management regarding internal control. Tracking each employee’s ID and password, Used to properly segregate duties. Can incorporate a matrix of tasks that are incompatible. Allows real-time monitoring and reporting of exceptions. SO 8 ERP systems and the Sarbanes–Oxley Act of 2002

633 Copyright Copyright © 2008 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.


Download ppt "Accounting Information Systems, 1st Edition"

Similar presentations


Ads by Google