Академический Документы
Профессиональный Документы
Культура Документы
Lecture 1
Explain what an AIS is and its role in value creation
2. How does an AIS add value
3. Overview the five major transaction cycles
4. Discuss the data processing cycle
value chain:
primary activties and second activities
Primary activities: Inbound Logistics, operations, outbound logistics, marketing and sales,
servicing
secondary activities
Firm infrastructure, HR mgmt., Technology, Procurement
understand journal entry and processes within each business cycles
input processing storage output
Lecture 2
1. Explain the difference between database and file-based systems
Database: a set of inter related centrally managed files
File-based system: files are set up based on functions and independent of each other.
Benefits of database systems:
Data integration, data sharing, reporting flexibility, minimize data redundancy and
inconsistencies
Data independence, central mgmt. of data, cross function analysis
2. Describe what a relational database is and how it organizes data
3. Explain the difference between logical and physical views of a database
Logical view is the view of the users which can be customized according to individual
requirement. Physical view is the manner the data is stored within the database which is
maintained by programmers and database managers.
4. Create a set of well-structured tables to properly store data in a relational database
Output Fraud
Example
Controls
Enter fictitious records, enter
wrong amounts to pocket
difference
Use company computer for
personal business
Modifying software eg salami
attack
Altering damaging data files
Copy data files without
authorization (sell to
competitor)
Read data output from remote
locaiton
salami technique, DDOS few questions, identity theft, malware, (following tut)
understand each one and diferences
Social engineering: Person pretending to be someone else in order gain information.
Malware: software to do harm
Virus self-replicating, executable code attached to programs or files when triggered make
unauthorized changes to computer
(P >D+ C) Focus is to prevent any unauthorized access or have ample time to detect and correct
the loop holes
Revenue
Cycle Activities
Key Decisions
Threats
Control Procedures
Customization
Inventory level
Delivery method
Price
Credit limit
amount
Payment
processing
Shipping
Billing
Cash collection
Production
(DPPA)
Product design
-accountant collect cost
information and assist
design team to minimize
cost
Planning and scheduling
-meet orders and
minimize inventory
Production operations
-check inventory
-check material bill to
order materials needed
-adjust master
production schedule to
include new orders
Cost accounting
-collect cost information
to determine profitability
-Mix of product to
produce
-Product price
-How much
resource allocated
-How to manage
cost & evaluate
performance
Shipping
Shipping errors
Theft of inventory
Billing
Failure to bill
Bill wrongly
Cash collection
Error in maintaining
Theft of cash
Expenditur
e
Purchase inventory
-how much to buy
JIT or MRP system
Receiving goods
-accepting and counting
Paying goods
-approve and pay vendor
invoice
-Optimal level of
inventory
-Which supplier is
best price and
quality
-Inventory
storage location
-Consolidate
purchase to get
optimal price
Purchasing
-purchase too much or
too little
-kickbacks
Receiving
-receive wrong goods,
bad condition, wrong
amount
-theft
Paying
-error in invoice
-misappropriation of cash
HR &
payroll
GL
Financial
reporting
Recruit
Train
Assign job
Compensation
(payroll)
Performance
evaluation
termination
Purchasing
-approved price list, vendor list
-approved PR
-good inventory mgmt system
consult inventory before
purchasing
Receiving
-create receiving report
-segregation of duties for counter
and custodian
-physical safeguard for inventory
RFID tagging
Paying
-using Evalued
-regular reconciliation, request for
statement of accounts from
creditor
-review hiring policies to ensure
good quality staff hired
-ensure personnel records are
matched to physical empees
-attend training to keep up to date
with relevant regulations
Reconciliation
Audit trial
Back up
Access control
XBRL
-what
Publish financial statement electronically using tags
Benefits
-can extract data for analysis without reentering data
-data can be transformed into different formats for use
Balanced scorecard
-measuring financial and non-financial measures
-four perspective
Learning & growth
Internal Business
Customer
Financial