Академический Документы
Профессиональный Документы
Культура Документы
CBFS4203
Accounting Information System
Copyright © Open
Copyright Open University
University Malaysia
Malaysia (OUM)
(OUM)
Table of Contents
Course Guide ix-xiv
Topic 1 Accounting Information System: An Overview 1
1.1 A Framework for Information System 3
1.1.1 The Accounting Information System (AIS) 6
1.1.2 The Management Information System (MIS) 6
1.2 The Revolution of Telecommunications Infrastructure 7
1.2.1 The Manual Process Model 8
1.2.2 The Flat File Model 9
1.2.3 The Database Model 11
1.2.4 The REA Model 12
1.2.5 ERP Systems 13
1.3 The Role of the Accountant 15
1.3.2 Accountants as the System Designers 15
1.3.3 Accountant as the System Auditors 16
Summary 16
Key Terms 16
References 17
INTRODUCTION
CBFS4203 Accounting Information System is one of the courses offered by the
Faculty of Science and Technology at Open University Malaysia (OUM). This
course is worth 3 credit hours and should be covered over 8 to 15 weeks.
COURSE AUDIENCE
This course is offered to all students taking the Bachelor in Information
Technology programme. This module aims to impart the fundamentals of
accounting information system.
As an open and distance learner, you should be able to learn independently and
optimise the learning modes and environment available to you. Before you begin
this course, please confirm the course material, the course requirements and how
the course is conducted.
STUDY SCHEDULE
It is a standard OUM practice that learners accumulate 40 study hours for every
credit hour. As such, for a three-credit hour course, you are expected to spend
120 study hours. Table 1 gives an estimation of how the 120 study hours could be
accumulated.
Study
Study Activities
Hours
LEARNING OUTCOMES
By the end of this course, you should be able to:
1. Describe the meaning of accounting information system as compared to
management information system;
2. Discuss the development in accounting, the criticism, architecture and the
alternative information system architecture; and
3. Discuss business process modeling including control and audit in
accounting information system environment.
COURSE SYNOPSIS
This course is divided into 8 topics. The synopsis for each topic is presented below:
Topic 4 describes the existence of a sound system for internal control in order to
ensure asset safeguarding, data integrity, system effectiveness and system
efficiency.
Topic 5 explains preliminary topics that are common to all three transaction
processing cycles, namely the revenue cycle, the expenditure cycle and the
conversion cycle.
Topic 6 describes the revenue cycle activities. This includes internal control
procedures, computer application system and controls in the computer
environment for revenue cycle activities.
Topic 8 discusses the production cycle activities internal controls, procedures for
production cycle, computer application system for production cycle and controls
in the computer environment for the production cycle activities.
Topic 9 discusses the general ledger and reporting activities. This includes
internal control procedures, computer application system, and controls in the
computer environment for the financial cycle activities.
Learning Outcomes: This section refers to what you should achieve after you
have completely gone through a topic. As you go through each topic, you should
frequently refer to these learning outcomes. By doing this, you can continuously
gauge your progress of digesting the topic.
able to gauge whether you have understood what you have read (clearly,
vaguely or worse you might find out that you had not comprehended or retained
the sub-section(s) that you had just gone through). Most of the time, the answers
to the questions can be found directly from the module itself.
Summary: You can find this component at the end of each topic. This component
helps you to recap the whole topic. By going through the summary, you should
be able to gauge your knowledge retention level. Should you find points inside
the summary that you do not fully understand, it would be a good idea for you
to revisit the details from the module.
Key Terms: This component can be found at the end of each topic. You should go
through this component to remind yourself of important terms or jargons used
throughout the module. Should you find terms here that you are not able to
explain, you should look for the terms from the module.
PRIOR KNOWLEDGE
No prior knowledge is required.
ASSESSMENT METHOD
Please refer to myINSPIRE.
Copyright © Open
Copyright Open University
University Malaysia
Malaysia (OUM)
(OUM)
COURSE GUIDE xiii
REFERENCES
Boockholdt, J., L. (1999). Accounting information systems. Singapore: McGraw-Hill.
Nickerson, R., C. (2001). Business and information systems. New Jersey: Prentice Hall.
Robert, C., N. (2001). Business and information systems. New Jersey: Prentice Hall.
Romney & Steinbart. (2003). Accounting information systems (4th ed.). New Jersey:
Prentice Hall.
Ron, W. (1999). Information systems control and audit. New Jersey: Prentice Hall.
Wilkinson et al. (2002). Accounting information systems (4th ed.). New York: John
Wiley and Sons, Inc.
LEARNING OUTCOMES
By the end of this topic, you should be able to:
1. Define system, subsystem and Information System;
2. Distinguish the differences between Accounting Information
System (AIS) and Management Information Systems (MIS);
3. Explain two classifications of transaction;
4. Discuss the evolution of information system model; and
5. Explain three roles of accountant in AIS.
X INTRODUCTION
In this topic, we will look into a brief overview of accounting information system.
The first section will introduce you to the framework of the Accounting
Information Systems. Then, the evolution of information systems will be
discussed in the second section. There are five models discussed in this section
which are the Flat File System, the Database, the Resource, Event Agents (REA)
and Enterprise Resource Planning (ERP) systems. Finally, section 1.3 focuses on
the three different roles of accountant: as users, designers and auditors.
ACTIVITY 1.1
Imagine you are in a grocery store like Carrefour or Giant. You are there
to buy household needs for the whole week. Suddenly, when you arrive
at the cashier, the whole transaction processing system crashed down
and you are not able to bring home any of the goods. How do you think
business information system directly affect your life?
Before we look at the framework, let us look at Table 1.1 for the definition of
system, subsystem and information system.
Term Definition
System Group of elements that are integrated with the common
purpose of achieving one objective.
Subsystem System within a system, or where the situations when there is a
system exist on more than one level.
Information Organised combination of people, hardware, software, and
System communication networks and data resources that stores,
retrieves, transforms, and disseminates information in an
organisation.
Let us look closely to Figure 1.2. Figure 1.2 shows an example of Information
System (IS) for a manufacturing firm. Obviously, we can see the main difference
between AIS and MIS is the type of transaction they processed. The domain of the
AIS can be identified by using the framework shown in Figure 1.2. We should
note that the framework is just a conceptual view. The organisation of a real IS
could be different from Figure 1.1. Normally, in real world environment, the AIS
and MIS application will be integrated in order to have an efficient business
operations and to ensure the business operation run smoothly.
We talk about transaction all the time. However, what is the exact meaning of
transaction? Transaction is an event that affects or is of interest to the organisation
and that is processed by its information system as a unit of work. According to
Hall (2004), transaction can be classified into two which are:
• Financial transaction; and
• Non-financial transaction.
Now, let us look at Table 1.2 for the definition of financial and non-financial
transaction.
SELF-CHECK 1.1
Currently, most of the organisations have included both AIS and MIS features in
their information systems. This is to enhance the uses of the information systems
and at the same time to improve the operations of the organisation. Because of
this situation, the traditional role of accountants has changed as they are required
to provide the correct and reliable non-financial data.
However, this model is useful for learning the basic business concepts manually,
before moving on to the computer based system. Besides, the logic business
process is much easier to understand when we separate the technology with the
process. We can easily understand the internal control activities such as audit
trails and access controls through the understanding of manual process.
In this environment, each data files are not related to each other. For instance, in
an organisation, if there are 10 departments using one same file, the legacy
system will have 10 same files in it. The data will be processed individually. Any
changes of data must be updated in all files. Thus, it will make the process more
tedious. The individual/department must be aware of any updates and promptly
update the same files at all different location/department.
Now, let us look at Figure 1.6 which illustrates the flat file model.
Refer to Figure 1.6, there are 3 different users using their own stand-alone system.
Each system used specific files for their application.
(i) Accounting section through Billing/Accounts Receivable System uses
Customer Data, Sales Invoices and Cash Receipts.
(ii) Marketing section through Product Promotion System uses Customer Data
and Sales Invoice.
(iii) Product Services through Service Scheduling System uses Customer Data
and Product Services Schedule.
If the Accounting section updates the data in Sales Invoice file, then the file in
Product Promotion System must be updated too. Data redundancies exist
because the same files exist in the different system in an organisation. This can
lead to three problems, as shown in Table 1.3.
Problem Explanation
Data storage Unnecessary storage costs of paper documents and/or
magnetic form.
Data updating Modifications must be performed several times.
Currency of Potential problem of failing to update all affected files.
information
Based on the figure, the users are the Accounting, Marketing and Product
Services department. Those departments are using the same file, the Customer
Sales. But, the difference is that each department has a different user view. For
example, Accounting department only need to view Current Account Receivable.
The Customer Sales file is stored in the Database, which is managed and
controlled by the Database Management Systems (DBMS).
Each user has their own level of access to the database. When user submit their
request for viewing the data, the DBMS will validate and authorise the access to
the database based on the userÊs level of authority. The request will be denied if
the users are trying to access the data that is not authorised for them.
This database model is slightly different with the flat file model, where it
promotes the data sharing concept. The data sharing can solve the problems
caused by the flat file model such as data redundancy.
The early database system is called traditional systems where at that time the
DBMS were designed to interface directly with the flat file programs. It will be
easier and cheaper when the organisation replaced their flat file with the database
systems. But still, this early database system has the limitations. However, the
existence of relational database model really improved the database systems in
terms of flexibility and reliability.
Although the REA model was proposed as a result of the study of accounting
theories, it can be applied to many other business domains. It can be used for
inventory control by assigning goods to resources, transfers to events and owners
to agent. Beside that, it also can be used for payroll by assigning the lengths of
time to resource, time cards to events and employees to agents. This REA model
is a promising modeling technique for developing business applications because
it has a solid foundation and it can be applied to nearly all business domains.
Here the REA model is a conceptual modelling tool specifically designed to provide
structure for designing AIS databases. REA model provides structure in two ways:
(a) Identifying what entities should be included in the AIS database; and
(b) Prescribing how to structure the relationships among the entities in the AIS
database.
the ERP system or sometimes could be both. This is to make sure the success in
the implementation of the ERP systems.
Table 1.4 summarises the characteristics of ERP.
Characteristics of ERP
1. Facilitate data sharing.
2. Facilitate flows of information.
3. Introduces common business exercises.
4. Contains complex and large size system.
5. Requires several years of constructions before it can be completed.
6. Normally comes as commercial product.
7. Need to be tailored to individualÊs organisational needs / requirements.
SELF-CHECK 1.2
In the table provided below, write down at least two major
characteristics of each information systems model as discussed earlier in
Section 1.2. Research on the Internet to find out real life example of each
model. Have fun!
ACTIVITY 1.2
Have you ever been in a bank? Whether you are withdrawing money,
depositing money, making payments etc, you are indirectly deals with
accounting transactions. Now, try to list out the roles of accountants.
In this section, we will examine the accountantsÊ role in the current business
environment. Basically, accountants involved in three roles/ways (refer to Figure
1.8).
SELF-CHECK 1.3
What are the three roles played by accountants with respect to the
information system?
• The main difference between AIS and MIS is the type of transaction they
processed.
• The AIS process both financial and non-financial transactions, while the MIS
process the non-financial transaction only.
• The evolution of the Information Systems shows that each new model has
been created to overcome the problems and limitations of the previous
models.
• Finally, the role of accountants in the current business environment has
changed.
• An accountant plays important role as a user, systems designer and also as a
system auditor.
X INTRODUCTION
Information systems provide information to support the operations and
management of businesses and other organisations. In order to understand
information systems, it is first necessary to understand how businesses and other
types of organisations operate and managed. It is also important for us to know
how businesses use information in their various functions, and how common
business activities process information. This topic shows how information flows
within a business to support business operations. Later, we will explain how
information helps in the management of a business. Lastly, this topic will
describe several basics business information processing activities.
ACTIVITY 2.1
The information will flow between people within a department as well as from
one department to another. The information could be submitted through a
document, voice or computer. The flow of information will be discussed in the
next paragraph.
Figure 2.1 shows the flow of information related to the sales of goods. The flow
starts once the customers submit order for items they want to purchase. The sales
department receives the customer orders information and sends the information
to the shipping department. This department views the information and pack the
goods based on the order and send it to the respective customer. The shipping
information will then be sent to the billing department. The billing department
prepares the billing information which includes the amount that the customer
needs to pay and send it to the customer and accounts receivable department.
Customers who receive the billing information will now send the payment to the
organisation which directly goes to the accounts receivable department. Accounts
receivable department manages the customer bills and sends reminder to the
customers who have not paid their bills within the stipulated time.
Figure 2.2 illustrates the flows of information for inventory control. The shipping
department sends the shipping information to the inventory control department.
This includes the quantity they have sent to the customer. Receiving department
send information on the inventory received from vendors to the inventory control
department. The inventory reorder information will be sent to purchasing
department by the inventory control department. This happens when the
inventory level is below the stated level.
Figure 2.3 shows the flow of information related to purchasing goods. The
purchasing department receives the information on inventory reorder from
inventory control department and prepares the purchasing information and sends
it to the respective supplier and also to accounts payable department. The supplier
sends the billing information to the organisation specifically the accounts payable
department. The receiving department sends information on which items they
have received from the supplier to the account payable department. Payment will
be made to the supplier by the accounts payable department.
The flow of information might be different for each organisation. This depends
on the type of business they operate.
term planning for the organisation. Thus, the information is really important to
the management.
Besides, the management uses the information to manage the business such as
deciding which customer deserves to purchase from the organisation on credit
basis and which suppliers to choose for purchasing the inventories.
In general, information is really a crucial thing for the management since they are
the one who manage the organisation and need to make decisions and do the
planning. The information needed is produces from the information that flows
within the organisation. Refer to Figure 2.2 which shows the information flow for
inventory control. Here, the manager needs to do the inventory reordering
decision. The inventory control department keeps track of the quantity of
inventory that the organisation has in stock and when the inventory level is low,
the department is able to detect it. Customer order information received by the
sales department which is then uses this information to forecast sales. Once the
manager receives the information on the low level of inventory, he or she can use
the sales forecast to decide on the quantity of the inventory to reorder. Therefore,
the information flows is to the manager in order for him or her to make decision.
ACTIVITY 2.2
Before setting up any businesses, do you think a market survey is
necessary to determine the success of the business? Always, why
gathering potential customer requirements are a good beginning
step to start up any business?
Entering customer order is the first activity of the business information processing
which occur in the sales department. This activity receives orders from customers
indicating the type and quantity of the goods requested. Customers may place their
order through telephone, sending them by mail, or even fill in an order form
(manually or electronically). Hence, the orders are usually not in a standard format.
Figure 2.5 shows the example of customer order form.
Sales department must ensure that the inventory is sufficient according to the
order. Besides, the department also needs to determine whether credit should be
extended to the customer. After that, the sales order will be prepared by the sales
department. An example of sales order is shown in figure 2.6. This document,
which is also called as shipping order is the output for this activity. It contains the
customerÊs particular, items ordered and the quantity. The sales department
sends the sales order to the shipping department.
Then, the billing department will prepare the customerÊs invoice based on the
information in the copy of the sales order.
The billing department then sends the invoice to the customer and another copy
to the account receivable department. The sales order in Figure 2.7 is the input for
the billing activity while customerÊs invoice in Figure 2.8 is the output.
and payments to the customers and prepare the reports of accounts receivable to
other departments or functions of the organisation.
Copy of the invoice and payment from customers are the input for this activity.
Outputs for the activity includes the statement which is the summary of the
invoice charges and payments, overdue notices or reminders and the reports of
accounts receivable. The accounts receivable department sends this report to the
general accounting department. Refer to Figure 2.9 for the example of the
statement and Figure 2.10 is the account receivable report.
The inputs for this activity are the sales order from the shipping department and
the receiving notice from the receiving department which indicates the quantity
of items received from suppliers. Figure 2.11 shows the example of receiving
notice. The inventory reorder report and the inventory value report are the
output for this activity. Figure 2.12 shows the example of the inventory reorder
report which is send to the purchasing department. The inventory value report as
shown in Figure 2.13 will be sent to the general accounting department.
Processing in this activity involves keeping track of the quantity on hand for each
item in inventory. The inventory control department updates this quantity from
data in the sales orders and receiving notices.
The type of inventory described here is called finished goods inventory because it
deals with final products which are ready for sale. Manufacturing, wholesaling
and retailing are some of the business use this type of inventory. However,
manufacturers do not prepare the inventory reorder report but they produces a
report indicating what items should be manufactured.
The input to this activity is the inventory reorder report which is from the
inventory control department and the output is the purchase order as shown in
Figure 2.14. The purchasing department sends one copy of the purchase order to
the supplier and another one to the accounts payable department.
The inputs for this activity are the copy of the purchase order from the
purchasing department, the invoice from supplier and a copy of the receiving
notice received from the receiving department. The outputs are the payment to
the supplier and the accounts payable report which summarize the supplier
charges and payments for the specific month. Refer Figure 2.15 for the example of
the accounts payable report which is sent to the general accounting department.
The input for this activity is the employee work report. This report is based on
the type of the employee. If the employee is paid based on hourly basis, the
report prepared is the time sheet which shows the total of hours the employee
has accomplished for each day. Figure 2.16 shows the example of the time sheet.
For an employee who is paid a fixed salary, the report shows the attendance for
all working days and for the absence day, the reason must be stated.
Revenue is obtained from sales and other resources such as investments, while
the expenses includes purchasing the inventories and assets, paying the
employees, maintaining and disposal of the assets and others. Reports will be
prepared by the general accounting department, which is called the financial
statements. This report summarised the organisationsÊ accounts.
The inputs for this activity are reports on revenue, expenses, assets and liabilities.
The outputs are the financial statements such as the income statements and the
balance sheet, as shown in Figure 2.18.
SELF-CHECK 2.1
1. How does the Purchasing Department know when to purchase
more goods?
2. For what business information processing activities is a sales
order an input?
• This topic has shown how information flows in business operations, how
managers use information in decision making, and how businesses perform
basic information processing.
• Although a business could handle this flow, use, and processing of
information without the aid of computers and related technology, using
computer information systems for these activities can greatly increase a
businessÊ efficiency and effectiveness.
Manufacturer Retailer
Operations Wholesaler
X INTRODUCTION
Traditionally in accounting world, accountants require pencils, papers and a
basic calculator. We record all accounting transactions on T-accounts that
represents Debit and Credits transaction. We use calculator to balance out the
Debit side of our T-accounts to the Credit side of the same account. As the result,
we will post the difference (if any) to indicate the imbalanced condition of the T-
account. However, this traditional approach has been gradually changed to
The first section of this topic describes the relationship among accounting
records in forming an audit trail in both manual and computer based systems.
Then, we will examine the documentation techniques used to represent system.
At the end, we will look at documentation techniques for manual and
computer-based systems.
ACTIVITY 3.1
3.1.1 Documents
Previously, most organisations uses paper based documents as a common way
for data collection. These data will then be transferred to the computer for the
later use. Currently, these data will be directly stored in the computers through
the specific system.
It is a part of the revenue cycle. When customers make an order, the sales
clerk will prepare multiple copies of sales order. These documents then will
go into the sales system. The information in these documents will be used
by various departments or functions such as Credit, Billing and others.
Thus, it will cause other activities to start in those departments.
Example:
A copy of the Sales Order will be sent to the Credit Department. It will
cause the checking or approval process begins. The personnel in the
department will use the information in the sales order to verify the
customerÊs creditworthiness.
We can take other example like credit card monthly statement sent by the
credit card company to their customers. Most of the statements consist of
two parts:
(i) Statement of the account
(ii) Remittance advice
The remittance advice contains the customerÊs name, account number, the
total credit and also the minimum payment required for that particular
month. Normally, the statement is produced by the Billing Department.
When customer makes payment, they will include the remittance advice
along with the cheque. The remittance advice will be received by the
accounts department. The information in remittance advice such as account
holder name and account number will be used as an input to the accounts
department.
SELF-CHECK 3.1
Can a turnaround document contain information that is
subsequently used as a source document? Why or why not?
3.1.2 Journal
A journal is an initial record in which the effects of transactions on accounts are
recorded. When transactions happen, we record all relevant facts in chronological
order. The data for journals come from the documents such as sales order. The
journal will keep all records of transactions and will be posted to the specific
account. Figure 3.5 shows the process of recording the sales order to the sales
journal.
The sales journal will only record the sales transactions. Each time
processing period ends, the sales clerk will post the amounts to the specified
ledger account. The frequency for processing could be either in daily,
weekly or monthly basis. From Figure 3.7, we can see that these amounts
are posted to account number 401.
Figure 3.9 shows a chart of accounts example. It shows the account name along
with the account number. The account number consists of three digits. This is one
of the coding techniques for AIS application, called Block Codes. This technique
corresponds to the entire class of items by restricting each class to a particular
range within the coding scheme.
3.1.3 Ledgers
A ledger is sometimes called as a book of financial records. We use ledger to
summarise the financial status of an organisation such as the current balance of
accounts. Normally, the various journals will post the financial transaction
information to the ledgers. The information will be used to prepare the financial
statements, internal reports and also to support the daily transactions. Figures
3.10 show the flow of financial information from the source document and finally
end at the general ledger.
Figure 3.10: Flow of information from the economic event to the general ledger
Source: James, A. H. (2001). Accounting information systems. Ohio: Thomson Learning.
ACTIVITY 3.2
Figure 3.12 illustrates the relationship of these files in forming an audit trail.
Figure 3.12 shows how computer files can function as audit trail in an
organisation. It begins by capturing the economic events. The sales are recorded
manually using source documents. Then the data in the source documents will be
transferred to the magnetic files, specifically the transaction files. However, this
will depend on the organisation because some organisations are no longer using
the physical source documents. Hence, the transactions are directly captured on
the magnetic media.
The next step is to update the related master file subsidiary and also the control
accounts. During this process, we may edit the account transactions. For example,
the available credit for each customer will be identified by the system by referring
to the credit file. Any credit problems will be rejected and stored in the error file.
The remaining records will be used to update the related master files. Hence, only
these transactions are added as the sales journal into the archive file.
The original transaction file is not required for audit trail purposes because the
valid transactions have been copied to the journal. The file then can be deleted
and the system is now ready for the next batch of the sales orders.
SELF-CHECK 3.2
ACTIVITY 3.3
How do you relate DFD to Activity Diagram in Unified Modeling
Language? You may go to the internet and locate the answers to
this question.
ERD can be used as a tool for communication during analysis phase in the system
development process. The three main components of an ERD and their functions
are summarised in the following Table 3.3.
Cardinality specifies the number of instances of one entity that can be associated with
each instance of another entity. A relationship can be one-to-one (1:1), one-to-many
(1: M) or many-to-many (M:N). Cardinality can reflect the policy of an organisation.
3
Supply (M: N) Each vendor
supplied more
Entities:
than one items.
Vendor, Inventory. Each item is
supplied by more
than one vendor.
A data flow diagram illustrates the processes, data stores, and external entities in
a business or other system and the data flows between these things.
Four diagrammatical components are used to develop a DFD. Table 3.5 illustrates
these components.
Item Descriptions
Data Flow • Data in motion, moving from one place to another in a system.
• Represent the results of a query to a database, the contents of a
printed report or data on a data entry computer display form.
• Should only represent data, not control.
• Represented by an arrow.
• Should be named as a noun.
Process • The work or actions performed on data so that they are
transformed, stored or distributed.
• Represents the transformation of data in the system. This
represents something that happens in the system.
• Represented by a circle or rounded rectangle.
• Should be named as a verb.
Basic data flow diagram elements are shown in Figure 3.15. The external entities
are A, J and K, where A is the source and J, K are the destination. The system
starts at A where it generates data flow B which is then goes to process C. The
outputs for process C are data flows D and E. E then goes to J, while D goes to
process F. Process F uses data flow D and G and later on process the data. The
process then will produce output G and I. The data flow I is sent to the external
entity or data destination, K. Figure 3.16 shows the data flow diagram of
customer payment which is related to Figure 3.15.
Data flow may consist of more than one data element. Therefore it is important to
decide on the number of line required for the data flow. For example, sometimes
customer has made payment and would like to query regarding their payment.
So, here the different data flow should be used because the payment and
inquiries is different in terms of the purposes. Refer to Figure 3.16.
Decomposition of DFD can be defined as the act of going from a single system to
its component processes or in other words from the highest level DFD to the
lowest level. The highest level view of the system is a context diagram.
A context diagram is a special DFD that is designed to show the system and the
external entities that send data to and/or receive data from the information system.
It contains only one process, no data stores, data flows and the external entities
(sources/sinks). The sources/sinks represent its environmental boundaries.
Figure 3.18 shows the context diagram of a payroll processing procedure. The
employee data is received from the human resource department, while the time
card received from various departments. These data then will be processed and
the system produces four different data that are:
(i) Tax report and payment for government agencies.
(ii) Employee payment for employees.
(iii) Payroll account deposit at the bank.
(iv) Payroll report for the management.
Table 3.6 shows the major processing activities and data flows involved in payroll
processing. Using the information in the table, the context diagram is
decomposed into lower level or we called it as Level 0 diagram, as shown in
Figure 3.19. The data coming from the human resources department were
grouped together and named as „employee data‰.
Source: Romney & Steinbart. Accounting information systems 9/E. New Jersey: Prentice Hall.
The level 1 for Process 2.0 (pay employees) is shown in Figure 3.20. It expands
employees pay process into more detail process. Each of the process in Figure
3.19 can be decomposed into their own level 1 diagram to show the detail
processes.
3.3.3 Flowcharts
A flowchart is a formalised graphic representation of a program logic sequence,
work or manufacturing process. It describes the physical relationship between the
entities or components.
Figure 3.21 shows the symbols used to create flowcharts. Each symbol represents
different processes or tasks. Besides flow charts use special connector symbols to
jump between positions on a same page and from other page to another page.
This are very useful to lessen the mess happened when the flow lines go across
each other.
Figure 3.23 shows the example of system flowchart for sales processing.
Sales terminal are used to capture sales. The terminals will edit the sales
data and print out receipt for customer. The sales data will be stored in the
sales data file on a disk. At the end of each day, the sales data will be
summarised and the batch totals will be printed. Example of batch total is
the total sales for all sales transactions. The summarised data will be
processed again and same goes to the batch total that will be generated and
printed once more. The amount of batch totals then will be compared with
the batch totals generated from the earlier processing. All errors and
exceptions will be reconciled. The accounts receivable, inventory, sales
marketing databases and the general ledger will be updated. Users can use
the inquiry processing system in order to know the account and inventory
status and also the sales analysis.
SELF-CHECK 3.3
Differentiate System Flowchart to ProgramÊs Flowchart. Fill in the table
below for your comparison.
X INTRODUCTION
What can you conclude from the cartoon strip shown above? What would
happen if a business losses control over their accounting transactions?
Computers perform much of the data processing required in both the private and
public sectors of our economies today. The accounting information systems are
now getting more complex in order to meet the increasing needs of information
by the society. Therefore, it is important to maintain the data integrity while
processing it because people could always question the control implemented
during the data processing. Uncontrolled use of computers can have a
widespread impact on a society.
There are seven major reasons for establishing a function to examine controls
over computer-based data processing, as summarised by Figure 4.2.
Figure 4.2: Why we need to examine the controls computer-based data processing
For example, a large department store could face problems when anything
unexpected happened such as the accounts receivable has been destroyed. Unless
its customers are honest and can remember what they have purchased from the
store, the firm might suffer a big loss when customers fail to pay their debts. If
there are no proper back-ups for the computer data, the loss of data through
program error, natural disaster and others could happened. Thus, the data cannot
be recovered and as a result, the business operations of the organisations could be
disrupted. This can happened when existing controls for the computers are taken
for granted.
Nowadays, computers have carried out many important and vital functions in
the organisation. For example, computers monitor the condition of patients
during surgical procedure, direct the flight of a missile and others. Thus, any
error occur to the computers could end up in loss of life, permanent disability of
people or damage to the environment.
ACTIVITY 4.2
What do you think of replacing human toll operators at all lanes of PLUS
highway to the automatic toll booth lanes (like Touch and Go and Smart
Tag)? Will this affect the rate of unemployment in the country?
SELF-CHECK 4.1
ACTIVITY 4.3
Why do you think organisation needs auditor?
Controls Descriptions
Preventive Preventive controls are designed to avoid any possible future problems.
controls This is the most cost-effective compare to detective controls. When
implementing this control, it hinders errors and thus avoids the cost of
correction. Examples of preventive controls include effective control of
physical access to assets and data, proper segregation of the employee
tasks and competent personnel.
Detective These controls are needed because sometimes the problems cannot be
controls prevented. The controls will find out the problems once they occur.
Detective controls are usually more expensive than preventive controls.
Example is such as double checking of the calculations, confirmation of
bank balances and systems review (internal auditing).
Corrective These controls are designed to correct errors once they are detected. This
controls includes procedures taken to identify the cause of a problem, fix the
errors and do the modification to the system so that the future problems
are eliminated or at least minimised. Examples are such as
documentation and reporting systems to keep problems under
management observation until they have been solved or the defect has
been corrected and back-up procedures.
These controls have been implemented and tailored to fit in with a computer
environment. The following subsections will briefly explain these components.
In a computer system, all records are normally maintained at one site where
the computer is located. Therefore the individual who wish to commit a
fraud does not need to go the different location to access the record.
SELF-CHECK 4.2
ACTIVITY 4.4
The hardware and software used for the current information systems
also provided in this assessment. Besides, the current personnel
resources and the current threats and opportunities are also included.
1. Progress report (a) List of achieved and failed current planned proposal.
(b) Changes on major hardware and software platform.
(c) Additional ideas and plans to start the project.
Both the strategic and operational plan need to be reviewed frequently and
updated if necessary. Evaluation should take place few times a year to make sure
that any new systems components can be added and the current ones can be
maintained. During the evaluation process, the functionality, stability,
complexity, cost, strengths and weaknesses of the current system need to be
assessed. These criteria are assessed in order to know whether it is sufficient to
supports the organisationÊs business needs. The user should be asked on the
system they used, whether it meets their requirement or they need any new
technologies to be used. Therefore, the management should prepare and approve
the plan along with the sufficient budgets. Besides, the management should
allocate budget for an emergencies case such as changes of new hard disk
because of hard disk failure and also any unexpected maintenance requirements.
The controlling functions by the top management are also very critical. The
controlling functions involved in controlling the information systems activities
and also control the users of information services. This function also involves in
determining the when the actual activities of the information systems is different
with the planned activities.
The management should carry out control towards the activities done by the
information systems personnel through the implementation of:
ACTIVITY 4.5
Testing must be done by the people who are involved in the development
process. The new system must be tested and modify it if necessary before
implementing it. This is to minimize errors after the system has been
installed. Some of the testing includes system testing, unit testing,
acceptance testing and others.
Both of the system can present substantial control problems for the
management. System software is critical to an organisation; therefore errors
in system software can affect any application systems that use the system
software. Moreover, system software frequently has to run in privileged
mode to carry out its functions. The privilege mode here refers to a special
execution status that enables the system to avoid many standard controls,
which this status can be abused. For example, system software might be used
to gain unauthorised access to private data that can be sold to competitors.
Besides the above measures, actually the most important control that can be
implemented is to train the system programmers to follow the organisationÊs
policies. If the management exercising high ethical behaviour and informing
a clear expectation that all employees must follow this standard, then the
system programmer might think it is difficult to abuse their power.
location with the original data. If the data is destroyed or loss, the person in
charge can retrieve back the data from the backup copy.
The management usually comes out with control policies that describe the
data backup procedures. These policies include:
(i) Procedures for making copies of the data.
(ii) Storing the data separately from the original.
(iii) Reconstruct the data if they are destroyed.
The nature of these procedures depends on the processing method and on the
technology use by the accounting system. The back up procedures in batch
processing, online real time systems and local area networks is different as
explained in the followings:
5 Assign responsibility
• Assign responsibility
Management should assign responsibility to an individual for
maintaining and implementing an up to date contingency plan.
Someone must be appointed and how they can be contacted if
something happens. If the key personnel are unavailable, a list of
alternative personnel and how they can be contacted must be included.
The plan should also identify and assign other responsibilities necessary
to begin operation at the alternative site.
Security administrators have responsibility for controls over malicious and non
malicious threats to physical security and malicious threats to logical security.
A major task of security administrators is to conduct a security program, which
is a is a series of ongoing, regular, periodic reviews conducted to ensure that
assets associated with the information systems functions are safeguarded
adequately.
Functions Responsibilities
System administration Systems administrators are responsible for ensuring that the
different parts of an information system operate smoothly
and efficiently.
Network management Network managers ensure that all applicable devices are
linked to the organisationÊs internal and external networks
and operate continuously and properly.
These physical access controls can be used to ensure the security of a system:
(i) Computer equipment should be kept in a locked room with access
restricted to authorised personnel.
(ii) The entrance to the computer room should be limited to maximum
two entrances. Security guards should be placed near the room and
closed circuit television system must be installed.
(iii) Personnel should be provided with an ID which is used to enter the
buildings or rooms. The entry and exit for each employee can be
recorded and traced.
(iv) Require visitors to sign a log as they enter and leave the site. Brief
them on company security policies, assign visitorÊs badges, and escort
them to their destinations.
(v) Use a security alarm system to detect unauthorised access after
working hours.
(vi) Restrict access to private, secured telephone lines or to authorised
terminals or PCs.
(vii) Install locks on PCs and other computer devices.
(viii) Restrict access to off-line programs, data and equipments.
(ix) Locate hardware and other critical system components away from
dangerous or flammable materials.
(x) Install fire and smoke detectors and fire extinguishers.
For logical access control, users should be allowed to access data they are
authorised to use and view. They also can perform specific functions only
such as viewing, copying, inserting and deleting data. It is also important to
protect data from those outside the organisation.
Operations management must ensure that each function has its own methods
and performance standards. Besides, expert personnel are hired to perform
each function and operations personnel are trained and managed properly.
Control over computer operations govern the activities that support the
daily execution of either test or production systems. Three types of controls
that must exist are:
(i) Those that prescribe the functions that either human operators or
automated operations facilities must perform.
(ii) Those that prescribe how jobs are to be scheduled on the
hardware/software platform.
(iii) Those that prescribe how hardware is to be maintained in good
operating order.
Network operations govern the activities of wide area and local area
networks.
(i) In wide area networks, careful control should be exercised over
network control terminals. These terminals allow powerful access and
action privileges to be executed to monitor and maintain a network.
(ii) In local area networks, file servers must be secured. Unauthorised access
to a file server can allow an intruder to interrupt the operations of a local
area network or compromise data integrity within the network.
QA personnel must be well trained and competent. They must also have a
high level of interpersonal skills. Finding suitable people with the range of
skills required is quite difficult. Furthermore, many information systems
professionals prefer to work in development rather than quality assurance
roles.
Several major types of controls that are being used in the boundary
subsystem are summarised in Table 4.4.
Controls Descriptions
Cryptographic Controls can be used to protect the integrity of data used
within the boundary subsystem.
Access controls Can be used to prevent unauthorised access to and use of
resources.
Audit trail Events in the boundary subsystem must be recorded in an
accounting audit trail. An operations audit trail records
resource-oriented events.
Existence controls This is to restore the boundary subsystem in the event of
failure.
Figure 4.9 summarises edit check that are used in input validation routines.
Figure 4.9: Edit check that are used in input validation routines
Line controls and flow controls are combined within the link management
protocols applied over a communication line. Three widely used link
protocols are:
(i) HDLC
(ii) SDLC
(iii) ATM protocols
Common controls that help preserve the integrity of data processing and
stored data are as follows:
The procedures would ensure that the company does the following:
(i) Reviews all output for reasonableness and proper format.
(ii) Reconciles corresponding output and input control totals on a daily
basis.
Five sets of controls are exercised over these functions that are:
(v) Audit trail controls and a set of existence controls for output
subsystem
Audit trail controls maintain the chronology of events from the time
the content of output is determined to the time the output is presented
to users. Existence controls enable either batch or online output to be
recovered in the event of loss.
SELF-CHECK 4.3
Ron, W. (1999). Information systems control and audit. New Jersey: Prentice Hall.
Romney & Steinbart. Accounting information systems 9/E. New Jersey: Prentice Hall.
LEARNING OUTCOMES
By the end of this topic, you should be able to:
1. Explain how economic events are recorded as accounting
transactions;
2. Describe four transaction cycles that makes up an accounting
transaction processing system;
3. Describe four input acquisition activities;
4. Categorise business activities into their respective cycles; and
5. Discuss the application systems constituting each transaction
cycle.
X INTRODUCTION
How do you think barter system can be implemented in our 21st century? In your
opinion, how does accounting system transactions can help barter systems?
This topic presents an overview of accounting transaction cycles which form the
basis of Accounting Information Systems. There are three main cycles which
consist of the revenue cycle, the expenditure cycle and the production cycle. A
part from that, we will also discuss another topic which is very important in AIS
called general ledger and reporting systems. Some authors consider the general
ledger and reporting system as another cycle called financial cycle. In this topic,
we will look at the cycles in general before proceed to next topics which gives
detail information on each cycle.
From figure 5.1 above, we know that in whatever business activities, the main
objective is to increase the capital of the company. The cycle of business activities
begin when capital is invested in a business. These sources may come from the
owners of the business or they may come from creditors. If the source comes from
the owners, the investment is considered as the ownersÊ equity. If the source
comes from creditors, the investment is either long-term debt or current liabilities
to the company. In many businesses, most of the capital is used to purchase long-
term productive assets which help to increase the capital of the firm. The business
reports the results of its operations to the sources of its capital from time to time.
In short, capital investment comprises of two significant economic events:
(i) Raising capital; and
(ii) Using capital to acquire productive assets
Another event that occurs during this activity is producing business reports to its
sources of capital. It is necessary to maintain those sources especially when
additional capital is needed later.
The next step in the cycle of activities is the conversion of inputs into goods or
services (production). The business sells these goods or services to increase its
capital. The conversion/production process is different for each business.
For manufacturing companies, they buy raw material, apply labour and overhead
to them, and produce an output as the finished goods. On the other hand, service
companies convert inputs into outputs in the form of services. As for the
merchandising companies such as retailers and wholesalers, little labour is used
because they purchase inventories of goods, repackage them and then market
them. Nevertheless, all three businesses use inventories of supplies in their
conversion processes. Also, only one economic event occurs during this conversion
which is the consumption of labour, materials and overhead to produce products
or services that can be sold.
Finally, the last component in the figure is the sale of the goods or services that
were actually the outputs of the conversion process. When these are sold at a
profit, the capital investment of the business increases. Also, additional cash is
available for reinvestment, or for making payments to the sources of capital in the
form of dividends and interest. By providing a source of additional capital, the
sales component completes the cycle of business activities. In sum, the activities
Table 5.1 summarises the economic events in the cycle of business activities.
be identified as the conversion / production cycle and the sales activity can be
identified as the revenue cycle. Table 5.2 summarises the relationship between
business activity and their respective cycles.
In this section, we will examine the accounting cycles in more detail. First, letÊs
start with the financial cycle.
The financial cycle also known as the general ledger and reporting system
consists of two main functions:
(a) To raise capital; and
(b) To use the capital to purchase assets such as property, plant and equipment.
Accurate recording must be done in this cycle in order to see the flow of
information. Transactions such as getting capital from owners or creditors, using
that capital to purchase assets and reporting back to owners and creditors on how
the capital is being used are important to be recorded. Another event which is also
important is periodic reporting to the sources of capital. In financial cycle, the basic
financial statement provides periodic reporting. These statements include the
balance sheet, the income statement and the statement of cash flows. The
summaries in these statements come from the general ledger. Periodic reporting to
the sources of capital is important because it enables a business to raise additional
capital. In Figure 5.4, we can see that there are three accounting application systems
that record the events in the financial cycles. They are the property, the journal
entry, and the financial reporting systems. The relationship among these
application systems and the sources of capital is also illustrates in this figure.
Next, we will look at the expenditure cycle in the accounting transaction cycles.
Now that we understand the events in the expenditure cycle, letÊs move on to the
revenue cycle.
The revenue cycle records all sales made by the company and all payment
received. The sales are in terms of services provided or finished goods, which is the
product of production cycle. As mentioned earlier, there are four economic events
involved in this cycle: receiving an order from a customer, delivering goods or
services to the customer, requesting payment from the customer, and receiving the
payment. These transactions may occur separately or at the same time based on
type of sale. If the sale is a cash sale, then sales order, delivery, request for
payment, and payment occur at the same time. Therefore, accounting systems
normally record these four events with one transaction. However, when companies
sell goods or services on credit, each of the events occurs at separate times. When a
customer pays and the accounting system records the cash receipt, the business is
willing to sell again to the customer. This causes the cycle of transactions to repeat.
Companies that sell in credit use four application systems in the revenue cycle. The
applications are the order entry, shipping, billing, and the cash receipts systems.
Companies that sell on a cash basis frequently use a point-of-sale system that
combines the four economic events in one transaction. Figure 5.6 provides a
graphical representation of the transactions in the revenue cycle.
Finally, we will examine the last cycle in the accounting transaction cycles which
is the conversion cycle or also known as the production cycle.
The conversion cycle contains transactions incurred when raw materials are
transformed into finished goods for sale. Only one economic event exists in the
production cycle which is consuming materials, labour, and overhead. In
manufacturing and service companies, either actual or standard material and
labour costs are recorded in a cost ledger as conversion occurs. Overhead costs are
allocated in the cost ledger, usually based on the amount of labour used. These
costs become associated with the products and are matched with revenue when the
products are sold. However, in merchandising companies, costs of conversion are
recorded when incurred and matched against revenue in the same period. In
conversion cycle, there are three main application systems which are cost
accounting system to record material, labour and overhead cost, payroll system to
generate and calculate paycheck to each employee and inventory system to
maintain record of inventory on hand. Depending on the type of organisation, the
conversion cycle may contain either two or three application systems. For example,
payroll system is needed by all type of organisations, while cost accounting system
is needed by manufacturing and service companies, and inventory system is
needed by manufacturing and merchandising companies. In merchandising and
manufacturing companies, the systems in the production cycle provide interfaces
between the expenditure and revenue cycles. However, the production cycle
cannot be represented as a circle like other cycles since it contains only one event.
Table 5.3: Economic Events and Application Systems that Process Them
SELF-CHECK 5.1
1. Name the three transaction cycles that exist in all businesses.
2. Name the major subsystems of the expenditure cycle.
3. Name the major subsystems of the conversion cycle.
4. Name the major subsystem of the revenue cycle.
• So far, we have learned the activities that form the processing of accounting
transactions.
• We have looked at how the accounting transactions cycles are formed using
the business cycle activities.
• We can also identify the four cycles in the accounting transaction processing
system which are the revenue, expenditure, conversion and financial cycles.
• In each cycle, we have also learned the type of accounting application systems
associated each cycle.
LEARNING OUTCOMES
By the end of this topic, you should be able to:
1. Describe the business activities involved in the revenue cycle;
2. Employ the flow chart of revenue cycle;
3. Interpret the process of revenue cycle transactions using computer;
4. Describe the internal control procedure needed in revenue cycle;
and
5. Construct the DFD for revenue cycle.
X INTRODUCTION
In previous topic, we have studied the accounting transaction cycles in general.
From this topic onwards, we will look into each transaction cycle in more detail.
We will start with the revenue cycle in this topic. Revenue cycle involves selling
of goods or services to customers and receiving payment for the goods or services
being purchased. This includes activities such as customer orders, customer
payments and sales of inventories or services. The process begins when a
customer makes an order to purchase a product or service from a company. The
company will then ship the products or perform the service. An invoice will be
shipped to the customers and the customers will settle the payments using cash
or credits. If it is a credit sale, the company will check the customerÊs credit
history before they approve the sale.
During these transactions, there are several accounts involved. In sales order
processing, the primary accounts involved include:
(a) Sales, from inventories or services
(b) Accounts receivable
(c) Cash
A part from the above accounts, it is also possible to have other accounts when
certain activities such as goods returned, discount purchases and other related
activities occur in the revenue cycle. The accounts include:
• Sales returns and allowances
• Sales discounts
• Sales taxes
• Unearned revenues
• Allowance for doubtful accounts
After looking at the accounts involved, we will examine the activities that occur
in revenue cycle. Table 6.1 below summarises the activities involved.
Activity Description
Customer orders This event occurs when customers want to purchase any goods
or services from the firm.
Verification of This event occurs when customers want to pay their invoices
customer credit and using credit. The customerÊs payment history and credit limit
credit limits will be verified by the credit department.
Determination of This event occurs to make sure that the inventory is available in
inventory the warehouse.
availability
Shipment of goods This event occurs when a company has to deliver the purchase
to customers products to the buyers.
Customer billing, This event occurs when purchases are made by customers. For
including handling any discount sales or any shipping charges, it will be included in
of discounts and the customerÊs bill.
shipping costs
Receipt of cash from This event occurs when customers pay the amount they owe to
customers the company
Determination of This event occurs when inspection is done to check for any
overdue accounts overdue payment.
Receipt of returned This event occurs when goods purchased are returned by the
goods customers due to damage or dissatisfaction.
Based on the events in revenue cycle, many reports and documentations are
prepared or generated. The documents include:
• Sales orders, prepared by sales personnel in the sales department.
• Packing and shipping documents, prepared by shipping personnel in the
shipping department.
• Billing invoices, prepared by accounts receivable personnel in account
receivable department.
• Remittance advises, which often are part of billing invoices and are returned
by customers with payments.
• Checks from customers for the payment of goods or services.
• Deposit slips, prepared by cash receipts personnel in cash receipt department.
In revenue cycle business activities, customers can buy products using either cash
or credit. Several main functions normally occur in any sale such as:
An example of a data flow diagram for sales order processing and cash receipt
processing is shown in the example in Figure 6.1. The processes start when a
customer places an order and firm checks for credit history. Once approved,
goods are picked from the warehouse and ship to the customer together with a
packing slip. The shipping department also sends another copy of packing slip as
well as bill-of-lading to the billing department. On the other hand, sales
department prepares several copies of sales order and send them to warehouse
and billing department. Billing department sends invoice to customer and other
information to be recorded in sales journal, account receivable and general
ledger. Inventory account is also updated based on the information given by the
billing department. When customer makes payment, check and remittance advice
are sent to mail room and sort by the clerk. The check is deposited into the bank
while the remittance advice is sent to account receivable. Then, account
receivable, general ledger and cash receipt journal are updated.
Another example shown is data flow diagram for goods that have been returned
(Figure 6.2). The processes start when customer rejects or returns the goods they
purchase due to damage or dissatisfaction. When the returned good is received, it
is sent to warehouse together with a return slip for restocking purpose. Another
return slip is sent to sales department where several credit memo copies are
prepared. Copies of credit memo are used to update sales journal on return sales,
account receivable, inventory and general ledger.
Figure 6.1: Example of sales order processing and cash receipt processing system: DFD of
sales order processing and cash receipt processing subsystems
Below are detail summaries of all activities that are involved in revenue cycle the
categories comprise of:
(a) Processing customer orders;
(b) Delivery/shipping goods;
(c) Preparing invoices/billing; and
(d) Recording in accounts receivable ledger.
ACTIVITY 6.1
What makes some peopleÊs credit history becomes bad and further
been blacklisted by financial institution?
Terms:
(a) 2/7-2% discount if account is paid within 7 days.
(b) n/30-net amount payable within 30 days.
(c) 10/eom-payment required within 10 days after the end of the month.
(d) net cash 30 days- payment required within 30 days of the end of the month
in which delivery is made.
Credit or adjustment notes were prepared when goods are returned. They are
recorded in sales returns journals.
Bad debts:
• Amounts owing by debtors that are unable to be collected
Revenue cycle ends with customer payments that may take the form of:
(a) Cash - from cash sales.
(b) Cheques - most common form of payment.
(c) Bank transfers.
Figure 6.3 contains a flowchart of an online real time order entry system. A
sales clerk enters data from a customerÊs purchase order. A computer
program validates the data entered by the clerk, verifies that the order is
within the customerÊs credit limit, and creates a sales order detail record.
The program produces two documents. An order acknowledgement is
mailed to the customer confirming acceptance of the order. The sales
register provides a list of all sales orders entered by the clerk.
Older accounting systems used batch processing for this application. With
such a system, a clerk prepared sales orders and accumulated them in
batches. The clerk also created a control total, called a batch total, for each
batch. The batch system then applied the processing steps described above
to transactions a batch at a time. Clerks checked the batch total after each
processing step to ensure that no transactions were lost.
The flowchart of the system in Figure 6.5 shows these procedures. The
program creates a sales invoice and an invoice detail record for each
shipment record created in the billing application. It also allows a billing
clerk to enter data creating credit memos. The program adds invoice detail
records to the accounts receivable change log file and produces a record
summarising the transactions for the general ledger batch summary file.
The clerk prints a daily document register from the contents of the invoice
detail file. A clerk may query the invoice detail file to determine the status
of a specific unpaid sales invoice.
Every month, the system prints customer statements and an aged trial
balance. Many companies practice cycle billing, which means they print and
mail statements to their customers on certain day of the month. This avoids
the difficulties of producing all customer statements at the monthÊs end.
A clerk enters data from remittance advices and creates a cash receipts
detail record from each. The computer program matches each cash receipt
detail record with its appropriate invoice detail record, deletes the invoice
detail record, and prints a register of deleted invoices. It posts the cash
receipt to the appropriate customer master record, adds a record for each
cash receipt to the accounts receivable change log file and produces a record
summarising these transactions for the general ledger batch summary file.
The clerk executes another program that prints a daily cash receipt register
from the cash receipts detail file.
Below are some control measures to validate data in revenue cycle activities.
SELF-CHECK 6.1
• The AIS should be designed to maximise the efficiency with which the basic
activities in the revenue cycle are performed.
• The AIS must also incorporate adequate internal control procedures to
mitigate threats such as uncollectible sales, billing errors, and lost or
misappropriated inventory and cash.
• Control procedures also are needed to ensure that the information provided
for decision making is both accurate and complete.
X INTRODUCTION
This topic describes an overview of the expenditure cycle in Accounting
Transaction Processing cycles. As you have learnt in Topic 5, expenditure cycle
involves the activities such as purchasing of raw materials, finished goods or
services from vendors, disbursing of cash for the goods being purchased, paying
salaries to employees and dealing with the fixed assets in a company. To make it
easier to understand, we will divide this topic into two sections: the purchase and
the cash disbursement subsystems, and the payroll and the fixed asset
subsystems. It is important to separate the payroll transactions because of two
reasons. First, payroll systems must withhold amounts for deductions and taxes
and summarise these in cumulative earnings reports. This is unnecessary when
doing other general purchasing. Second reason is because payroll systems
produce paychecks only to the employees. This is because if payroll checks and
other general checks are combined, it is easy to hide any fraud in payroll system.
ACTIVITY 7.1
The purchasing and cash disbursement activities are two separate subsystems in
the expenditure cycle.
Next, we will look at the processes involve in the cash disbursement subsystems.
A clerk will check for amount due in the account payable and prepare a payment
check. The check is sent to the vendor and concurrently, the general ledger will be
updated.
You will notice that these transactions involve several accounts. Among those
accounts are:
(a) Inventory
(b) Account payable
(i) Purchase account
(ii) VendorÊs account
(c) Cash
You will also notice that there are various reports and documentations generated
during this process. The documents include:
(a) Purchase requisition ă a document that allows a purchase transaction to be
made.
(b) Purchase order ă a document that indicates the details of the items to be
purchased.
(c) Blind copy ă a blank copy of purchase order.
(d) Receiving report ă a document that indicates the details of items such as
quantity.
(e) VendorÊs invoice ă Bills from the vendor on the items being purchased.
(f) Voucher register ă a register that shows the companyÊs account payable.
Based on the above reports, let us look at the events that trigger them.
A purchase requisition is prepared when the inventory clerk detects that the
inventory level has dropped to a certain level.
The purchase requisition is then sent to the purchasing department and several
copies of purchase order will be prepared by the purchasing clerk and distribute to
several departments. One of the purchase order called blind copy which contains
no details, is sent to receiving department to force the receiving clerk to inspect the
inventories upon arrival. After inspection, a receiving report is prepared. An
invoice will be sent by the vendor separately and once receive, the account payable
will be updated. The clerk in accounts payable department prepares a voucher in a
voucher register in order to show the liability of the company.
Now that we know how the reports are produced, we will take a look at the
detail processes involve in the purchasing and cash disbursement subsystems in
the next section.
(d) Storekeeping
Goods received are stored in a secure place. There will be safeguarded by
authorised persons. Goods will only be released upon proper authorisation-
goods/materials requisition note. Authorised dispatch note is required for
dispatch of goods sold. Figure 7.2 summarises the storekeeping functions.
After looking at the above details, you might still want to know more about
the processes. There are seven processes involved in the DFD:
(a) Review needs;
(b) Purchase Inventory;
(c) Receive goods;
(d) Update inventory;
(e) Update control accounts ;
(f) Prepare cash disbursement; and
(g) Update general ledger.
To help you understand better, Figure 7.3 shows the processes in data flow
diagram.
• Validity test
− Program checks for entered digit on VENDOR-NUMBER and
validate against a valid VENDOR-NUMBER list.
(ii) Processing:
• Record count
(iii) Output:
• Record count
− Program verifies that the number of new records in the
purchase order detail file = the number of line items on
purchase orders.
(ii) Processing:
• Record count
− Program verifies that the quantity of goods received equal to
the number of quantity ordered.
(iii) Output:
• Record count
− Program verifies that the number of lines on the voucher
register = the number of records added to the voucher file.
• Validity test
− Program verifies that dates are of the form AA-BB-CCCC,
where AA<13,BB<32 and CCCC is numeric.
(ii) Processing:
• Record count
− Program verifies that the decease in the number of open
purchase order records = the increase in the number of
pending invoice records, the number of records in the old
pending invoice file = the number of records in the new
pending invoice file + the number of new voucher records,
decrease in the number of receipts records = the increase in the
number of pending invoice records.
(iii) Output:
• Record count
− Program verifies that the number of lines on the voucher
register = the number of records added to the voucher file.
(ii) Processing:
• Record count
− Program verifies that the number of records in the old voucher
file = the number of records in the new voucher file + the
number of cash disbursement transaction records.
(iii) Output:
• Record count
− Program verifies that the number of lines on the voucher
register = the number of records added to the voucher file.
• Limit test
− Program flags for review by data control group for
transactions amounts more than RM100,000.
• Run-to-run controls
− Data control group verifies that total amount of checks = total
amounts of vouchers disclosed on control reports and check
register.
ACTIVITY 7.2
What are the three documents that must accompany the payment of
an invoice?
Discuss where these three documents originate and the resulting
control implications.
ACTIVITY 7.3
Imagine you own a small business with ten employees. What information
do you need in order to run a payroll system for your employees? How
would you go about the record keeping for your mini-payroll system?
Figure 7.8 presents a context diagram for the payroll system which shows the
relationships with the HRM system and other parts of the AIS. This figure shows
five major sources of inputs to the payroll system and one output.
As for the output, checks are the payroll systemÊs principal output. Based on the
dataflow in the context diagram, we know that employees receive individual
paychecks in compensation for their services. On the other hand, a payroll check
is sent to the bank to transfer funds from the companyÊs regular accounts to its
payroll account. Finally, checks are also issued to government agencies, insurance
companies, and other organisations to meet company obligations such as paying
for taxes and insurance premiums. In addition, the payroll system also produces
a variety of reports for internal and external use.
Figure 7.8: Context diagram of the payroll portion of the HMR/payroll cycle.
Source: Romney & Steinbart. Accounting information systems 9/E. New Jersey: Prentice Hall.
Now that we understand the inputs and outputs of the payroll system, let us look
at Figure 7.9 which shows the seven basic activities in the payroll cycle. Before we
proceed, it is a good idea to remember that payroll is one of AIS applications that
continues to be processed in batch mode. This is because:
(a) Paychecks are prepared periodically either weekly or biweekly or monthly;
and
(b) Most employees are paid at the same time which makes it appropriate to
process the transactions in batch.
We have now completed the study of three tasks in the fixed asset system. As for
the internal controls and controls in the computer environment, the procedures
and processes are similar to purchase systems described above. Therefore, from
this section onwards, we will only look at the payroll system in particular.
earnings data in the employee master file, and prints the payroll register. After
payroll clerks have reviewed the register for errors, another program prints
paychecks and creates records for the general ledger batch summary file.
(a) Input
(i) Completeness test
• Program verifies that all required input have been entered such as
EMPLOYEE-NUMBER, EMPLOYEE-NAME, HOURS-WORKED.
(b) Processing
(i) Record count
• Number of input transaction records = number of output
transaction records.
(i) Control total
• Total hours in input file = total hours in output file.
(c) Output
(i) Limit test
• Program flags for review by data control group for any
transactions with amounts more than RM10,000.
(i) Record count
• Program verifies that the number of paychecks = the number of
payroll transaction records.
(i) Control total
• Program verifies that total amount of paychecks = total debits to
general ledger accounts = total credits to general ledger accounts.
(i) Run-to-run controls
• Data control group compares control totals taken on paycheck
amounts and disclosed on control report and payroll register.
ACTIVITY 7.4
Prepare a worksheet in MS Excel that tabulates all of possible
deductions a payroll system of a company may consider. You may
research the information needed from the internet. Discuss and
exchange your answers with other course mates, and post them on
myLMS forum.
SELF-CHECK 7.1
1. What documents are included in the audit trail for payroll?
2. List out two accounts that are involved in Fixed Asset
Subsystem.
3. What are the five possible input sources that were fed into the
payroll subsystem?
LERANING OUTCOMES
By the end of this topic, you should be able to:
1. Describe four basic activities and related data processing
operations performed in the production cycle;
2. Discuss the key decisions that must be made in the production
cycle and identify the information required to make those
decisions;
3. Explain the process of production cycle transactions using
computer;
4. Identify internal control procedures in production cycle; and
5. Explain two computerized application of production cycle.
X INTRODUCTION
This topic provides you with detail information about production cycle in
Accounting Transaction Cycles. The activities in this cycle relates to operations
associated with the manufacturing of products. The main activity in production
cycle is to convert the inputs such as raw materials, labours and overhead into
finished product. That is why this cycle is also known as conversion cycle.
The revenue cycle provides information on customer orders and sales forecast to
the production cycle. This information is used to plan for the quantity of inventory
that will be produced. In return, the production cycle send information about
quantity of finished goods that have been produced and quantity that is available
for sale. The production cycle also send information about the needs of raw
materials to the expenditure cycle using purchase requisition forms. In exchange,
the expenditure cycle provides information about the raw materials that have been
purchased together with other expenditure as the overhead costs. The production
cycle also send information on labour needs to payroll cycle while payroll cycle
sends information on labour costs and availability in return. Finally, production
cycle sends information on cost of goods manufactured to the general ledger and
reporting system, and summary reports are sent to the management.
In sum, several functions are involved such as the acquisition of raw materials
and labours, the transfer of raw materials and overhead into production, the
transfer of finished goods into inventory and finally the sale of the inventory.
Next, we will look at Figure 8.2 which shows the four basic activities in the
production cycle:
Figure 8.2 also illustrates the information flows between each of those activities
and other AIS cycles.
So far, we have learnt the four basic functions of production cycle and their
objectives. Figure 8.3 below illustrates typical online AIS for the production cycle.
Let us look at the departments and the data storages involved in this process.
The production cycle databases involved are bill of materials, operation list,
master production schedule, inventory, production orders and work in process.
The process begins when there is new order from customers or whenever there is
new sales forecast entered by the sales department. Then, production planning
department uses the information together with information on current inventory
level to develop the master production schedule and store in the database. To
authorise the production of specific goods, new records are added to the
production order file. At the same time, new records are also added to the work in
process file to accumulate data on cost. In the mean time, when the engineering
department enters product specification for new products, new records will be
created in the bill of materials and operation list files. The engineering department
accesses both files to examine the design of similar products in order to develop the
specification. The department also accesses the general ledger and inventory files to
get information about the costs of any alternative in designing the products. When
the list of operations to be performed is ready, they are display at the appropriate
workstations. Similar instructions are sent to the computer integrated
During the process illustrates in Figure 8.3, four types of cost data have been
accumulated which are raw materials, direct labour, machinery and equipment,
and manufacturing overhead. Let us now examine how these four categories of
cost data are collected.
First, we will learn how cost on raw materials is collected. Whenever a material
requisition is being issued, the raw materials are sent to production and a debit
will be made in work in process account. If additional materials are needed,
another debit is made to work in process. On the other hand, work in process
account is credited whenever unused materials are returned to the inventory
department. The usage data to calculate the cost is collected by scanning the
materials when they are released from or returned to the inventory department
because most of the materials are bar coded. For those without bar coded, the
inventory clerk uses online terminals to enter the usage data.
Next, we will examine how the cost for direct labour is collected. For direct
labour, a job time ticket can be used to collect data about labour activity. This
document records the amount of time a worker spent on each specific job task.
Alternatively, workers can also enter this data using online terminals at each
factory workstation. To improve the efficiency of this process, firms can also
introduce coded identification cards, which workers would be able to use using a
badge reader or bar code scanner when they start and finish any task.
Another cost to be collected is data on machinery and equipment usage. This data
is collected at each step in the production process, often together with data about
labour costs.
Thus far, we have focused on accounting costs associated with the production of
inventory. However, the AIS also collect and process information about the
property, plant, and equipment used in the production cycle. This is because such
fixed assets represent a significant portion of total assets for many companies, and
so it is important to monitor this investment. Some authors include fixed assets
system in the production cycle but some include this in the expenditure cycle. For
this module, fixed assets have been included in the expenditure cycle in Topic 7.
Internal controls procedures in production cycle are use to make the processing
in the cycle run smoothly. Table 8.1 lists some of the procedures used in
production cycle.
No. Procedure
1 Improved information about the effects of product design on costs.
2 Detailed data about warranty and repair costs.
3 Better production planning systems.
4 Review and approval of fixed asset acquisitions; budgetary controls.
5 Restrict physical access to inventories and fixed assets.
6 Document all movement of inventory through the production process.
7 Identification of all fixed assets.
8 Periodic physical counts of inventory.
9 Adequate insurance.
10 Data entry edit controls; use of bar code scanning where feasible; reconciliation of
recorded amounts with periodic physical counts.
11 Backup and disaster recovery planning; restricting access to cost data.
12 Improved and timelier reporting.
(b) Processing
(i) Record counts
• Program verifies that the number of debits to the inventory account
= the number of receiving reports.
• Program verifies that the number of credits = the number of
materials requisitions.
(c) Output
(i) Control total
• Clerk verifies from control report that all transactions were processed.
(b) Processing
(i) Control total
• In the online real time system, program verifies that total costs
recorded in job cost file = total cost recorded in cost center file.
(c) Output
(i) Control totals
• Data control group verifies that total cost of jobs on job purge
control report = total of job cost reports.
SELF-CHECK 8.1
• In short, you should understand the four basic activities involve in the
production cycle.
• The activities are product design, production planning and scheduling,
production operations and cost accounting.
• Companies must also invest in IT continuously in order to improve the
efficiency of these activities.
• Apart from that, we have also listed the internal control procedures use in the
cycle and described the processes involve in this cycle using computer.
LEARNING OUTCOMES
By the end of this topic, you should be able to:
1. Identify four basic activities performed in the general ledger and
reporting system;
2. Explain the key decisions that must be made in the financial cycle;
3. Identify the information required to make the key decisions in
financial cycle;
4. Describe the process of financial cycle transactions using
computer; and
5. Discuss the control practices and procedures in financial cycle.
X INTRODUCTION
As a future accountant, you must be able to know the basic accounting
transaction processing cycle. After completed all accounting transaction
processing cycle in previous topics, we will now discuss on the general ledger
and reporting system in this topic. It tells about the operations of information
processing involved in updating the general ledger and preparing the reports
that summarise the results of an organisationÊs activities.
ACTIVITY 9.1
What entities need to be recorded in a General Ledger?
Figure 9.2: Context diagram of the general ledger and reporting system
Source: Romney & Steinbart. Accounting information systems 9/E. New Jersey: Prentice Hall.
The information flows in this system must be organised and stored in a way that
meets the various information needs of the internal and external users. For
example, managers need detailed information about the results of operations in
their particular area of responsibility. Investors and creditors want periodic
financial statements to help them assess the organisationÊs performance.
Currently, the investors and creditors are demanding more detailed and frequent
reports from the system. Government agencies also have periodic information
requirements that must be met by a company. Therefore, the design of the
general ledger and reporting system must be able to produce regular periodic
reports and to support real time inquiry needs.
Now that we have studied the context diagram in Figure 9.2, we will look at the
detail processes in level 0 of DFD show in Figure 9.3 below.
Figure 9.3: Level 0 DFD for the general ledger and reporting system
Source: Romney & Steinbart. Accounting information systems 9/E. New Jersey: Prentice Hall.
There are four basic activities performed in the general ledger and reporting
system as illustrates in Figure 9.3. The first three activities which are update
general ledger, post adjusting entries and prepare financial statements represent
the basic steps in the accounting cycle which end with the creation of the
traditional set of financial statements. The fourth activity which is produce
managerial reports indicates that, in addition to financial reports for external
users, the AIS also produces reports for internal management. LetÊs examines
each of these activities in more detail.
transactions that occur during a given period of time (day, week, or month).
LetÊs look at the example in revenue and expenditure cycles.
(b) Treasurer
The treasurerÊs office creates individual journal entries to update the
general ledger for non routine transactions such as the issuance or
retirement of debt, the purchase or sale of investment securities, or the
acquisition of treasury stock.
Journal entries to update the general ledger may be documented on a form called
a journal voucher. Figure 9.3 shows that the individual journal entries used to
update the general ledger are then stored in the journal voucher file. Therefore,
we can find the information in general ledger located in a manual AIS as well.
However, notice that the journal voucher file is a by-product of, not an input to,
the posting process. The journal voucher file is also one of the important parts of
the audit trail.
These reports are used to verify the accuracy of the posting process. Several budgets
are produced for planning and evaluating performance of an organisation. The
operating budget depicts planned revenues and expenditures for each organisational
unit. The capital expenditures budget show planned cash inflows from operations
with planned expenditures and are used to determine the organisationÊs borrowing
needs.
In sum, the processes described above form the general ledger and reporting
system, which we discuss in this topic. To have a better understanding of these
processes, Figure 9.4 below illustrates the general ledger and reporting system in
detail using a flowchart.
The purpose of the journal entry system is to post to the general ledger all transactions
that are not processed by other application systems. These include transactions that
record the acquisition of capital from the issue of stocks and bonds, the receiving of
cash from bank loans, and the acquisition and disposition of property. Meanwhile, the
purpose of the financial reporting system is to close the general ledger and to produce
financial statements and performance reports. It uses the journal entry system to
record adjustments made to the accounts during the closing process. That is why some
accountants identify the two systems as the general ledger system.
(b) Processing
(i) Record count
• Program verifies that the number of changes to the property
master file = the number of vouchers + the number of retirement
orders + the number of capital work orders.
(c) Output
(i) Control total
• Program verifies that total credits to general ledger batch
summary file = total of retirement work orders.
(b) Processing
(i) Record count
• Number of records from input general ledger batch summary file
= number of records in detail postings file + number of records in
output general ledger batch summary file.
(c) Output
(i) Run-to-run control
• Data control group reconciles totals on control report, error listing,
and transaction register.
• Data control group uses transaction register to reconcile the
differences between first and second trial balances.
SELF-CHECK 9.1
• In general, the general ledger and financial reporting system integrates and
summarises the results of various accounting subsystems in revenue,
expenditure and production cycles.
• As discussed before, the general ledger acts as a central master file in the AIS.
• That is why, it is important to implement control procedures stated in this
topic in order to ensure its accuracy and security.
• The controls include edit checks of the journal voucher records posted to the
general ledger, access controls, an adequate audit trail, and appropriate
backup and disaster recovery procedures.
• This topic also discuss about the main applications use in this system which
are Journal Entry and Financial reporting System and Property System.
OR
Thank you.