Accounting 4100: Accounting Systems

studied byStudied by 3 people
5.0(1)
get a hint
hint

Types of AIS

1 / 88

Studying Progress

0%
New cards
89
Still learning
0
Almost done
0
Mastered
0
89 Terms
1
New cards

Types of AIS

  1. Manual Systems

  2. Legacy Systems

  3. Modern, integrated IT Systems

New cards
2
New cards

Legacy System

Existing system, often based on old technology

New cards
3
New cards

Legacy Systems: Advantages

  1. Customized to specific needs

  2. Support unique business processes that are not inherent in accounting software

  3. Contain invaluable historical data that may be difficult to integrate into a new system

  4. Well supported and understood by existing personnel

New cards
4
New cards

Manual Systems- Turnaround document

is a document that has been output from a computer, some extra information added to it, and then returned to become an input document to be printed etc. For example, meter cards are produced for collecting readings from gas meters, photocopiers, water meters etc

New cards
5
New cards

Legacy System: Disadvantages

  1. Costly to maintain

  2. Often lack adequate supporting documentation

  3. Hardware needed to maintain may become obsolete

  4. Not usually based on user-friendly interface

  5. Tends to use software written in older computer language

  6. Often difficult to modify to make user friendly

  7. Difficult to integrate when companies merge

New cards
6
New cards

Legacy System: Decision to replace or update

  1. Screen scrapers - new system same screen

  2. Enterprise Application Integration - merge systems

  3. Complete replacement of Legacy Systems - new system (Three ways to switch)

New cards
7
New cards

Data v. Information

Data - simply raw facts that describe an event and have little meaning on their own. It is an input.

Information - data organized in a meaningful way, Information is interpreted data. Information is an output.

New cards
8
New cards

Information overload

Computers can process and organize a large amount of data.

Too much information causes information overload. If there is too much information it is difficult to make a decision.

New cards
9
New cards

Attributes of useful information

Relevant

  • Predictable Value

  • Feedback Value

  • Timely Reliable

  • Verifiable

  • Representational Faithfulness

  • Neutrality

  • Understandable Complete Accessible

New cards
10
New cards

Processing Methods - Batch Processing Advantages

1 .Efficient for large volumes of like transactions 2. Audit trail is maintained 3. Generally use less costly hardware and software 4. Hardware and software systems are not as complicated as on-line systems 5. Generally easier to control than other types of computerized systems. 6. Personnel become specialized and efficient in processing routine transactions.

New cards
11
New cards

Processing Methods - Batch Processing Disadvantages

  1. Processing can take longer

  2. Adding or deleting records takes much computer maintenance time

  3. Some data duplication is likely

  4. integration across business processes is difficult in legacy systems that are batch oriented

  5. Lag while all transactions in a batch are collected

  6. May require that transactions and master files be sorted in the same sequential order

New cards
12
New cards

Value Chain

is a series of business processes that products pass through gaining some value at each activity

Primary activities - directly provide value to customer

  1. Inbound logistics

  2. Operations

  3. Outbound Logistics

  4. Marketing and Sales Activities

  5. Service Activities

New cards
13
New cards

Value Chain

support activities sustain the primary activities

  • Firm infrastructure (accounting and legal)

  • Human Resource Management

  • Technology

  • Procurement

New cards
14
New cards

Information Technology

Computers, ancillary equipment, software, services, and related resources as applied to support business processes

New cards
15
New cards

IT Enablement

Using IT systems to enhance efficiency and effectiveness of internal or supply chain processes.

IT usage accomplishes one or more of the following objectives: Increased efficiency of business processes Reduced cost of business processes Increased accuracy of the data related to business processes

New cards
16
New cards

Business Process Reengineering (BPR)

is the purposeful and organized changing of business processes to make them more efficient.

New cards
17
New cards

SOX

The Sarbanes-Oxley Act came about as a response to business scandals.

This act requires public companies and their auditors to assess and report on the design and effectiveness of internal control over financial reporting.

It also established the PCAOB, to provide standards and oversight to public companies and auditors.

New cards
18
New cards

SOX - Sections Pertaining to audit services

201- Services outside of practice of auditors (Only tax returns. Bad Audits. Auditors cannot provide services outside of audits) 203 -Auditor partner rotation 204 - Auditor reports to audit committee 301- Public company audit committees (Entirely independent board members) 404- Management assessment of internal controls (MOST IMPORTANT)

New cards
19
New cards

SOX - Sections that pertain to audit services

806- Protection for employees of publicly traded companies who provide evidence of fraud 409 - Real-time disclosures. 802 - Criminal penalties for altering documents. 1102- Tampering with a record or otherwise impeding an official proceeding.

New cards
20
New cards

Internal Controls

Objectives of Internal Control

  1. Safeguard assets (from fraud or errors)

  2. Maintain accuracy and integrity for accounting data

  3. Promote operational efficiency

  4. Ensure compliance with management directives

New cards
21
New cards

Internal Controls (Types)

Purpose to prevent errors and deter fraud.

  1. Preventive

  • Requiring authorization of documents (make sure someone else looks over documents)

  1. Detective

  • Bank Reconciliations (Make sure everything is accounted for)

  1. Corrective

  • Backup Files

New cards
22
New cards

Risk Assessment

Process of identifying and analyzing risks. Companies should determine the likelihood and impact of risk. Types of Risk:

  • Inherent Risk - risk related to the nature of the business activity

  • Control Risk - in the threat that errors or irregularities will not be prevented, detected, or corrected by internal controls.

  • Residual Risk - the risk that remains after controls are put in to place

New cards
23
New cards

Risk Responses

Situation: Warehouse Catching Fire Reduce - Sprinkler system

Share - Insurance

Avoid - Won't place warehouse in a certain location

Accept -go on with life

New cards
24
New cards

Control Activities (Internal)

Physical Controls are mainly manual but they could use computers:

  • Authorization

  • Segregation of Duties

  • Supervision

  • Accounting Documents and Records

  • Access Control

  • Interdependent Verification

New cards
25
New cards

Control Activities: Segregation of Duties or Supervision

Want to keep all three separate:

  • Authorization (Signs checks)

  • Recording (Makes journal entry)

  • Custody (Has checks)

(Can't have one person doing too much because it could lead to fraud)

New cards
26
New cards

General Control Activities (IT Control Activities)

IT Controls can be split in to general controls and application controls. The general controls apply overall to the IT system and include:

  1. Authentication of users and limiting unauthorized access

  2. Hacking and other network break-ins

  3. Organized structure

  4. Physical environment and physical security of the system

  5. Business continuity

New cards
27
New cards

General Controls - Authentication

  • Log-in

  • User ID's

  • Password

  • Smart Card

  • Security Token (Flash Drive)

  • Two factor Authentication (Know and have)

  • Biometric Devices

New cards
28
New cards

General Controls - Hacking and other Network Break-ins

  • Firewall

  • Symmetric Encryption -

  • Public Key Encryption-

  • Wired Equivalency Privacy

  • Wireless Protected Access

  • Virtual Private Network -

  • Virus

New cards
29
New cards

General Controls - Physical Environment and Security

  • Location

  • Operating Environment

  • Back-up systems

New cards
30
New cards

General Controls

AICPA Trust Services Principles categorizes IT controls and risks into five categories: a. Security b. Availability c. Processing Integrity d. Online privacy e. Confidentiality

New cards
31
New cards

Processing Integrity

System processing is complete accurate, timely and authorized.

New cards
32
New cards

IT Application Controls

These controls are specific to a subsystem and fall in to three categories. Input Controls Data Input - data converted from human readable form to computer readable form Input Controls:

  1. Source document controls

  2. Standard procedures for data preparation and error handling

  3. Programmed edit checks

  4. Control totals and reconciliation

New cards
33
New cards

IT Application Controls - Input

Programmed Input Validation Checks Data should be validated and edited to be as close to the original source of data as possible. Input validation checks include:

  1. Field Check

  2. Validity Check

  3. Limit Check

  4. Range Check

  5. Reasonableness Check

  6. Completeness Check

  7. Sign Check

  8. Sequence Check

  9. Self-checking digit

New cards
34
New cards

Fraud

theft , concealment,and conversion to personal gain of another's money, physical assets, or information

New cards
35
New cards

Misappropriation of assets

defalcation or internal theft (actual physical stealing of assets)

New cards
36
New cards

The Fraud Triangle

  1. Incentive or pressure - get "something" from it, money

  2. Opportunity

  3. Attitude to Rationalize - attitude to think its okay "I'll pay it back" or "I deserve this"

ALL THREE MUST BE PRESENT Exam: Which part is missing?

New cards
37
New cards

Employee Fraud

usually means that an employee steals cash or assets for personal gain Kinds of employee fraud:

  1. Inventory theft

  2. Cash receipts theft

  • Larceny

  • Skimming

  1. Accounts payable fraud (make fake invoice, prevent with separation of duties)

  2. Payroll Fraud

  3. Expense Account Fraud (Reimbursement of meals)

New cards
38
New cards

Employee Fraud - Larceny

steal cash after transaction , already in records

New cards
39
New cards

Employee Fraud - Skimming

steal before transaction occurs

New cards
40
New cards

Goals of information security

Security- access to the system and its data is controlled and restricted to legitimate users

Confidentiality - Sensitive organizational information (e.g., marketing plans, trade secrets) is protected from unauthorized disclosure.

Privacy - Personal information about customers is collected, used, disclosed, and maintained only in compliance with internal policies and external regulatory requirements and is protected from unauthorized disclosure

Processing integrity - data that is processed accurately, completely, in a timely manner, and only with proper authorization

Availability- the system and its information are available to meet operational and contractual obligations (available to use systems when needed)

New cards
41
New cards

Virtual Private Network

Private communication channels, often referred to as tunnels, which are accessible only to those parties possessing the appropriate encryption and decryption keys. (In what situation would someone use a VPN)

New cards
42
New cards

Privacy Principles

  1. Management

  • Procedures and policies

  • Assignment of responsibility

  1. Notice

  • To customers of policies

  1. Choice and Consent

  • Allow customers consent over information provided, stored

  1. Collection

  • Only what is necessary and stated in policy

  1. Use and Retention

  • Based on policy and only for as long as needed for the business

  1. Access

  • Customers should be capable of reviewing, editing, deleting information

  1. Disclosure to 3rd parties

  • Based on policy and only if the 3rd party has same privacy policy statement

  1. Security

  • Protection of personal information

  1. Quality

  • Allow customer review

  • Information needs to be reasonably accurate

  1. Monitor and Enforce

  • Ensure compliance with policy

New cards
43
New cards

Sales and Collection Process

Process Includes:

  • Maintaining Customer Records

  • Making Sales

  • Billing Customers

  • Recording Payments

  • Manage AR

(KNOW STEPS. WHEN MAKE SALES)

New cards
44
New cards

Sales and Collection process

Accounts Receivable Sales Tax Payable Sales -Recording sale of products on account

Cash Sales Tax Payable Sales

  • Sale of products for cash

Cost of Goods Sold Inventory

  • Recording Cost of Sales

Cash Accounts Receivable

  • Received payment for invoice

(KNOW WHICH ACCOUNT IS INVOLVED WITH EACH STEP)

New cards
45
New cards

Important Revenue Terms

  • Purchase Order

  • Sales Order

  • Price list (Inv. #)

  • Credit Limit

  • Pick List

  • Packing Slip

  • Bill of Landing

  • Shipping Log

  • Sales Invoice (Bill)

  • Sales Journal

New cards
46
New cards

Purchases and Expenditures Process

The process includes

  • Buying inventory

  • Maintaining Supplier Records

  • Making Payments

  • Manage AP

New cards
47
New cards

IT Enablement for Cash Disbursements

Three-Way Match is the matching of a purchase order to the related receiving report and invoice.

  • Time consuming and expensive

  • Business Process Reeginneering (BPR) - to improve efficiency effectiveness. IT systems include:

  • Computer - based matching and checking of purchasing documents

  • Evaluated receipt settlement (ERS)

  • Electronic forms of purchase and payment

(ALL THREE MUST MATCH. IT MAKES PROCESS BETTER)

New cards
48
New cards

IT Enablement for Cash Disbursements

Automated Matching - software matches an invoice to its related purchase order and receiving report

Advantages

  • reduce time

  • costs

  • errors, and

  • duplicate payments in invoice processing

Risks

  • system errors in the matching process

  • unauthorized access

  • fraud

  • inadequate backup of files

New cards
49
New cards

Evaluated Receipt Settlement

receipt of goods is carefully evaluated and, if it matches the purchase order, settlement of the obligation occurs through this system

In the mid- 1990s, some companies began implementing invoice-less matching systems for purchasing and paying vendors

New cards
50
New cards

Conversion Process

The conversion process typically includes

  • transfer of raw materials to work in the process

  • transfer of work in process of finished goods

  • account for costs of raw materials, director labor, and allocation of overhead

New cards
51
New cards

Conversion Process

1st Step - Sales Order or Sales Forecast 2nd Step - Logistics 3rd Step - Reporting

New cards
52
New cards

Logistics

is the logical, systematic flow of resources throughout the organization

Three Primary Components:

  • Planning

  • Resources Management

  • Operations

New cards
53
New cards

Resource Management

  • Maintenance and Control

  • Human Resources

  • Inventory Control

  • Purchasing

  • Receiving

  • Stores

  • Routing

  • Warehousing

  • Shipping

New cards
54
New cards

Logistics: Terms

Economic Order Quantities - figure out how much needs to be ordered Raw Materials Work-in Process Finished Goods

New cards
55
New cards

Logistics: Operation

Operations

  • Production - Making the product

  • Quality Control

New cards
56
New cards

Just In Time

The minimization of inventory levels by the control of production so that products are produced on a tight schedule in time for their sale

New cards
57
New cards

Payroll Process

Acquire and maintain human resources Capture and maintain employee data Pay employees Record cash and payroll liabilities and expenses

(PAYROLL PROCESS)

New cards
58
New cards

Fixed Asset Process

Purchasing property Capturing and maintaining relevant data about assets Paying for and recording assets Recording depreciation and other expenses Accounting for gains and losses

New cards
59
New cards

Terms - Payroll

  • Human Resources Department

  • Time Sheet

  • Payroll Voucher - authorizes transfer of cash from main operating account to payroll account

  • Payroll Register - to complete listing of paychecks for the current period

  • Payroll disbursements journal

New cards
60
New cards

Fixed Assets Process

Acquisition - buying Continuance - maintaining Disposal - getting rid of

New cards
61
New cards

Fixed Asset Acquisition (Steps to Acquire)

  • Initiated by user department

  • Large cash outlays sometimes required

  • Non-routine transactions that require specific Authorization

  • Capital budget

  • Fixed asset subsidiary ledger

New cards
62
New cards

Fixed Asset Continuance

Update cost data improvements Update estimated figures as needed Adjust for periodic depreciation Keep track of the physical location of assets Depreciation Schedule

New cards
63
New cards

Fixed Asset Disposal

Four Steps:

  • Note data of disposal and calculate depreciation through this date

  • Remove asset from fixed asset subsidiary ledger

  • Remove related depreciation account

  • Compute gain or loss

New cards
64
New cards

Common Fraud Issues for Payroll

Ghost Employee - employee that only exists on the payroll list but is not real Clues that a ghost employee may exist:

  • Payroll register identifies paycheck without adequate tax withholdings

  • Personnel files contain duplicate addresses, Social Security numbers, or bank account numbers

  • Payroll expenses are over budget

  • Paychecks not claimed when paymaster distributes them

  • Paychecks contain dual endorsements

New cards
65
New cards

Capital Process

Capital - is the funds used to acquire long-term, capital assets of an organization Source of capital processes are those processes to

  • authorize the raising capital

  • the execution of raising capital , and

  • the proper accounting of the capital

(ROUTINE AND NON-ROUTINE)

New cards
66
New cards

Capital Process

This process often requires board approval Two primary types:

  1. Equity (stock)

  2. Debt (bonds or loans)

New cards
67
New cards

XBRL

Extensible Business Reporting Language (XBRL)- is designed to electronically communicate business information and is used to facilitate business reporting of financial and non financial data.

This allows each item in the financial statements to have its own computer readable and searchable tag

New cards
68
New cards

XBRL - Key Terms

XBRL Taxonomy - defines and describes each key data element

XBRL Instance Document - contain the actual dollar amounts or the details of each of the elements within the firm's XBRL database

XBRL Style Sheets - take the instance documents and add presentation elements to make the readable by humans

New cards
69
New cards

Types of Auditors

*CPAs * Internal Auditor IT Auditors Government Auditors

New cards
70
New cards

Auditing Standards

Sources of Authoritative literature

  • Generally Accepted Auditing Standards (GAAS)

  • Public Company Accounting Oversight Board (PCAOB)

  • Auditing Standards Board (ASB)

New cards
71
New cards

Generally Accepted Auditing Standards

  • General Standards Audit performed by people with the adequate technical training and proficiency of an Auditor. Independence of mental attitude and professional care to be practiced through entire audit process.

  • Standards of Fieldwork Audit adequately planned and supervised. An understanding of internal controls is obtained as part of the planning process. Adequate evidence is obtained to provide a reasonable basis for forming an overall opinion on the audit.

  • Standards of Reporting Reports state whether the financial statements are presented in accordance. Report identifies any circumstances where the established principles were not consistently applied. The report also expresses the fairness or unfairness of the financial statements.

New cards
72
New cards

Phases of an Audit

  1. Planning

  2. Tests of Controls

  3. Substantive Tests- tests of accuracy of monetary amounts of transactions and account balances

  4. Audit completion and reporting

New cards
73
New cards

Phases of an Audit

  1. Planning

  2. Tests of Controls

  3. Substantive Tests - tests of the accuracy of monetary amounts of transactions and account balances

  4. Audit Completion and reporting

New cards
74
New cards

Audit Planning

Materiality - estimate the monetary amounts that are large enough to make a difference in decision making.

Auditors review and assess the risks and controls, establish materiality guidelines, and develop relevant tests addressing the objectives.

New cards
75
New cards

Other Audit Considerations

Sampling

  • Test a limited number of items or transactions and then draw conclusions about the balance as a whole on the basis of the results

  • Auditors try to use sampling so that a fair representation of the population is evaluated

  • The choice of an appropriate sampling technique is very subjective

New cards
76
New cards

SDLC (System Development Life Cycle)

IT governance committee should evaluate the feasibility of each competing proposal. The four feasibility aspects:

  1. Technical - analysis may be in the design phase

  2. Operational

  3. Economic - cost-benefit analysis

  4. Schedule - do we have the time

New cards
77
New cards

Balanced Score Card

Recent studies show that management is investing in IT without actually understanding how to best implement it.

The Balanced Scorecard provides a tool that can describe the contribution of IT to the Company's strategy.

It is a performance measurement framework that allows managers to measure the firm's performance from multiple perspectives.

New cards
78
New cards

Balanced Scorecard Perspectives

Learning and Growth - addresses the firms goals for investments in human, information, and organizational capital.

Process Perspective - Describe the firm's objectives for its business processes.

Customer Perspective - Customer satisfaction focus

Financial Perspective - accounting-based performance that is used as a lagging indicator of firm performance - see how company did

New cards
79
New cards

Developing the Value Porpostion

Payback period= Initial investment / increased cash flow per period

Net Present value - sum of the present value of all cash outflows and inflows

Internal Rate of Return - the discount rate that makes the project's net present value equal to zero (break even)

Accounting Rate of Return = average annual income from project / total IT project cost

New cards
80
New cards

Payback Period

Initial investment / increased cash flow per period

New cards
81
New cards

ERP Systems

Enterprise Resource Planning (ERP) - system integrates all business processes and functions into a single software system, using a single database.

ERP system components:

  1. Financials

  2. Human Resources

  3. Procurement and logistics

  4. Product development and manufacturing

  5. Sales and services

  6. Analytics

New cards
82
New cards

Benefits of ERP

  1. Interactive nature of the modules

  2. Real-time nature of processing

  3. "Best Practices" nature of the processes

  4. Single database enhance sharing of information

  5. Capability to analyze large amounts of data

  6. Capability to enhance e-commerce and e-business

  7. Capability to interact in real-time

  8. ERP systems are scalable

New cards
83
New cards

Types of Stores

  • Brick and Mortar - only have physical stores

  • E-tailers - only sell stuff online

  • Clicks and mortar (bricks and clicks) - a combination of both

New cards
84
New cards

Networks

two or more computers linked together

Types important to accounting:

  • Local Area Network (LAN)

  • Internet - all over the world

  • Intranet - just people in one company

  • Extranet - access to customers and vendors

New cards
85
New cards

Keys

Primary keys are attributes that uniquely identify a specific row or record in the table

Foreign Key - are attributes in one table that are the primary key of another, used to link the tables

New cards
86
New cards

Rules of the Databases

  • The Entity Integrity Rule *- the primary key of a table cannot be null (no data value)

The Referential Integrity - the data value for a foreign key attribute must either be null or match one of the data values that already exist in the corresponding table

Each attribute must be uniquely named

Values of a specific attribute must be of the same type

Each attribute (column) of a record (row) must be single- valued. This requirement forces us to create a relationship table for each many-to-many relationship.

All other non-key attributes in a table must describe a characteristic of the entity identified by the primary key.

(KNOW TOP TWO)

(READ OTHER ONES)

New cards
87
New cards

Activity Models

These are basically flowcharts that show the sequence of workflow in a business process.

New cards
88
New cards

Multiplicities

Multiplicities (also called cardinalities) describe the minimum and maximum number of times an object in one class can be associated with objects in another class

Multiplicities for a class are represented by a pair of numbers placed on the opposite side of the association

(KNOW WHAT THEY ARE)

New cards
89
New cards

Business Rules

A business rule is a succinct statement of a constraint on a business process.

Obligatory. This rule form states what should occur: payment should be made in U.S dollars.

Prohibited. This rule form what should not occur :no payments by check

Allowed. This rule form says what is allowed under what conditions: credit card payments are allowed if the card is American Express.

New cards

Explore top notes

note Note
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 53 people
Updated ... ago
4.5 Stars(2)
note Note
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 23 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 81 people
Updated ... ago
4.5 Stars(2)
note Note
studied byStudied by 7 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 3689 people
Updated ... ago
4.5 Stars(13)

Explore top flashcards

flashcards Flashcard52 terms
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard47 terms
studied byStudied by 12 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard60 terms
studied byStudied by 4 people
Updated ... ago
4.0 Stars(1)
flashcards Flashcard180 terms
studied byStudied by 33 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard46 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard40 terms
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard471 terms
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
flashcards Flashcard33 terms
studied byStudied by 165 people
Updated ... ago
4.0 Stars(1)