Free Essay

Accounting Information System

In:

Submitted By Monkeymeeee
Words 2573
Pages 11
Accounting Information Systems

Accounting Information System
Tutorial 3 Answers
5.4

Environmental, institutional, or individual pressures and opportune situations, which are present to some degree in all companies, motivate individuals and companies to engage in fraudulent financial reporting. Fraud prevention and detection require that pressures and opportunities be identified and evaluated in terms of the risks they pose to a company.
Adapted from the CMA Examination.
a.

Identify two company pressures that would increase the likelihood of fraudulent financial reporting.














b.

Sudden deceases in revenue or market share
Financial pressure from bonus plans that depend on short-term economic performance Intense pressure to meet/exceed earnings expectations or improve reported performance Significant cash flow problems; unusual difficulty collecting receivables or paying payables
Heavy losses, high or undiversified risk, high dependence on debt, or unduly restrictive debt covenants
Heavy dependence on new or unproven product lines
Severe inventory obsolescence or excessive inventory buildup
Highly unfavorable economic conditions (inflation, recession)
Litigation, especially management vs. shareholders
Impending business failure or bankruptcy
Problems with regulatory agencies
Unusual spikes in interest rates
Poor or deteriorating financial position

Identify three corporate opportunities that make fraud easier to commit and detection less likely.











Weak or nonexistent internal controls
Failure to enforce/monitor internal controls
Management not involved in control system or overriding controls
Unusual or complex transactions such as the consolidation of two companies
Accounting estimates requiring significant subjective judgment by management
Managerial carelessness, inattention to details
Dominant and unchallenged management
Ineffective oversight by board of directors
Nonexistent or ineffective internal auditing staff
Insufficient separation of authorization, custody, and record-keeping duties
6-1

Accounting Information Systems










Inadequate supervision or too much trust in key employees
Unclear lines of authority
Lack of proper authorization procedures
No independent checks on performance or infrequent third-party reviews
Inadequate documents and records
Inadequate system for safeguarding assets
No physical or logical security system
No audit trails

The list show here can be augmented by the items in Table 5-4 listed in the Other
Factors column.
c. For each of the following, identify the external environmental factors that should

be considered in assessing the risk of fraudulent financial reporting.


The company’s industry o Specific industry trends such as overall demand for the industry's products, economic events affecting the industry, and whether the industry is expanding or declining. o Whether the industry is currently in a state of transition affecting management's ability to control company operations.



The company’s business environment o The continued viability of the company's products in the marketplace. o Sensitivity of the company's operations and profits to economic and political factors. 

The company’s legal and regulatory environment o The status of the company's business licenses or agreements, especially in light of the company's record of compliance with regulatory requirements. o The existence of significant litigation.

d.

What can top management do to reduce the possibility of fraudulent financial reporting? 



Set the proper tone to establish a corporate environment contributing to the integrity of the financial reporting process.
Identify and understand the factors that can lead to fraudulent financial reporting.
Assess the risk of fraudulent financial reporting that these factors can cause within the company.
6-2

Accounting Information Systems




Design and implement internal controls that provide reasonable assurance that fraudulent financial reporting is prevented, such as establishing an Internal Audit
Department that reports to the Audit Committee of the Board of Directors.
Enforce the internal controls
NOTE: Most fraudulent financial reporting fraud is perpetrated by top management, often by overriding internal controls. While some of the above controls in part d are more likely to prevent misappropriation of assets, they can still be useful for preventing or deterring fraudulent financial reporting.

6-3

Accounting Information Systems

5.6

An insurance company in Asia reported profit of $100 million for the financial year through the news-dissemination system of the stock exchange. Its stock price jumped by several times, as the announced profit was 10 times more than the previous year’s.
A few days later, the company announced a mistake in the released financial result, and stated that the correct profit should be $9.5 million. Regulatory bodies were asked to investigate if it was a trick used to manipulate stock prices. It was not clear who should be held responsible: the management, the accounting system or the auditor? a.

Is it an example of fraudulent financial reporting?
Answers will vary.

b.

What procedures could reduce the occurrence of such “mistakes”?

The Treadway Commission recommended four actions to reduce fraudulent financial reporting: 1. Establish an organizational environment that contributes to the integrity of the financial reporting process.
2. Identify and understand the factors that lead to fraudulent financial reporting.
3. Assess the risk of fraudulent financial reporting within the company.
4. Design and implement internal controls to provide reasonable assurance of preventing fraudulent financial reporting.

6-4

Accounting Information Systems
5.7

A bank auditor met with the senior operations manager to discuss a customer’s complaint that an auto loan payment was not credited on time. The customer said the payment was made on May 5, its due date, at a teller’s window using a check drawn on an account in the bank. On May 10, when the customer called for a loan pay-off balance so he could sell the car, he learned that the payment had not been credited to the loan. On May 12, the customer went to the bank to inquire about the payment and meet with the manager. The manager said the payment had been made on May
11. The customer was satisfied because no late charge would have been assessed until
May 15. The manager asked whether the auditor was comfortable with this situation.
The auditor located the customer’s paid check and found that it had cleared on May
5. The auditor traced the item back through the computer records and found that the teller had processed the check as being cashed. The auditor traced the payment through the entry records of May 11 and found that the payment had been made with cash instead of a check.
What type of embezzlement scheme is this, and how does it work?
Adapted from the CIA Examination
The circumstances are symptomatic of lapping, which is a common form of embezzlement by lower-level employees in positions that handle cash receipts.
In a lapping scheme, the perpetrator steals cash, such as a payment on accounts receivable by customer A. Funds received at a later date from customer B are used to pay off customer A's balance. Even later, funds from customer C are used to pay off B, and so forth. Since the time between the theft of cash and the subsequent recording of a payment is usually short the theft can be effectively hidden. However, the cover-up must continue indefinitely unless the money is replaced, since the theft would be uncovered if the scheme is stopped.

6-5

Accounting Information Systems

6.1

A few years ago, news began circulating about a computer virus named Michelangelo that was set to “ignite” on March 6, the birthday of the famous Italian artist. The virus attached itself to the computer’s operating system boot sector. On the magical date, the virus would release itself, destroying all of the computer’s data. When
March 6 arrived, the virus did minimal damage. Preventive techniques limited the damage to isolated personal and business computers. Though the excitement surrounding the virus was largely illusory, Michelangelo helped the computer-using public realize its systems’ vulnerability to outside attack.
a.

What is a computer virus? Cite at least three reasons why no system is completely safe from a computer virus.
A computer virus is a segment of executable code that attaches itself to an application program or some other executable component. When the hidden program is triggered, it makes unauthorized alterations in the way a system operates.
There are a number of reasons why no one is completely safe from a virus:




Viruses can spread very quickly. In a network environment, a virus can spread to thousands of systems in a relatively short period. When the virus is confined to a single machine or to a small network, it will soon run out of computers to infect.



Many viruses lie dormant for extended periods without doing any specific damage except propagating itself. The hidden program leaves no external signs of infection while it is reproducing itself.


b.

Viruses are contagious and are easily spread from one system to another. A virus spreads when users share programs or data files, download data from the Internet, or when they access and use programs from external sources such as suppliers of free software.

Many computer viruses have long lives because they can create copies of themselves faster than the virus can be destroyed.

Why do viruses represent a serious threat to information systems? What damage can a virus do to a computer system?
Viruses are a significant threat to information systems because they make unauthorized alterations to the way a system operates and cause widespread damage by destroying or altering data or programs. If adequate backup is not maintained, viral damage may also mean permanent loss of important or unique information, or time-consuming reentry of the lost information.
A virus can cause significant damage when it takes control of the computer, destroys the hard disk's file allocation table, and makes it impossible to boot (start) the system or to access data on a hard drive. They can also intercept and change transmissions, print disruptive images or messages on the screen, or cause the screen image to disappear. As the virus spreads, it takes up space, clogs communications, and hinders system performance.
6-6

Accounting Information Systems

c.

How does a virus resemble a Trojan horse?
A virus is like a Trojan horse in that it can lie dormant for extended periods, undetected until triggered by an event or condition.

d.

What steps can be taken to prevent the spread of a computer virus?
Focus 6-1 lists the following steps individuals can take to keep their computers virus free: 

Install reputable and reliable antivirus software that scans for, identifies, and destroys viruses. Only use one antivirus program, as multiple programs conflict with each other.



Do not fall for ads touting free anti-virus software, as much of it is fake and contains malware. Some hackers create websites stuffed with content about breaking news so that the site appears on the first page of search results. Anyone clicking on the link is confronted with a pop-up with a link to fake anti-virus software. 

Do not fall for pop-up notices that warn of horrible threats and offer a free scan of your computer. Although no scan actually takes place, the program reports dozens of dangerous infections and tells you to purchase and download their fake antivirus program to clean it up.

 Make sure that the latest versions of the antivirus programs are used. National
City Bank in Cleveland, Ohio, installed some new laptops. The manufacturer and the bank checked the laptops for viruses but did not use the latest antivirus software. A virus spread from the laptop hard drives to 300 network servers and
12,000 workstations. It took the bank over two days to eradicate the virus from all bank systems.
 Scan all incoming e-mail for viruses at the server level as well as when it hits users’ desktops.


Do not download anything from an email that uses noticeably bad English, such as terrible grammar and misspelled words. Real companies hire people to produce quality writing. Many viruses come from overseas. English is obviously not their first language.



All software should be certified as virus-free before loading it into the system. Be wary of software from unknown sources, as they may be virus bait—especially if their prices or functionality sound too good to be true.

 Deal with trusted software retailers.
 Some software suppliers use electronic techniques to make tampering evident.
Ask if the software you are purchasing has such protection.
 Check new software on an isolated machine with virus detection software.
Software direct from the publisher has been known to have viruses.
6-7

Accounting Information Systems

 Have two backups of all files. Data files should be backed up separately from programs to avoid contaminating backup data.
 If you use flash drives, diskettes, or CDs, do not put them in strange machines as they may become infected. Do not let others use those storage devices on your machine. Scan all new files with antiviral software before any data or programs are copied to your machine.

6-8

Accounting Information Systems

6.2

The controller of a small business received the following e-mail with an authenticlooking e-mail address and logo:
From:
To:
Subject:

Big Bank [antifraud@bigbank.com]
Justin Lewis, Controller, Small Business USA
Official Notice for all users of Big Bank!

Due to the increased incidence of fraud and identity theft, we are asking all bank customers to verify their account information on the following Web page: www.antifraudbigbank.com Please confirm your account information as soon as possible. Failure to confirm your account information will require us to suspend your account until confirmation is made.
A week later, the following e-mail was delivered to the controller:
From:
To:
Subject:

Big Bank [antifraud@bigbank.com]
Justin Lewis, Controller, Small Business USA
Official Notice for all users of Big Bank!

Dear Client of Big Bank,
Technical services at Big Bank is currently updating our software. Therefore, we kindly ask that you access the website shown below to confirm your data. Otherwise, your access to the system may be blocked. web.da-us.bigbank.com/signin/scripts/login2/user_setup.jsp We are grateful for your cooperation.
a.

What should Justin do about these e-mails?
This is an attempt to acquire confidential information so that it can be used for illicit purposes such as identity theft. Since the email looks authentic and appears authoritative, unsuspecting and naïve employees are likely to follow the emails instructions. Justin should:


Notify all employees and management that the email is fraudulent and that no information should be entered on the indicated website.



Delete the email without responding to its sender.



Launch an education program for all employees and management about computer fraud practices that could target their business.

6-9

Accounting Information Systems


b.

Notify Big Bank regarding the email.

What should Big Bank do about these e-mails?




Establish a quick and convenient method that encourages customers and employees to notify Big Bank of suspicious emails.



The warnings received by customers and employees should be investigated and remedial actions should be taken.



Notify and cooperate with law enforcement agencies so the perpetrator can be apprehended. 

c.

Immediately alert all customers about the email and ask them to forward any suspicious email to the bank security team. But this needs to be done via the bank’s web site, not by an email message. Banks need to consistently never use email in ways similar to this type of attack.

Notify the ISP from which the email originated, demanding that the perpetrator’s account be discontinued.

Identify the computer fraud and abuse technique illustrated.
This computer fraud and abuse technique is called phishing. Its purpose is to get the information need to commit identity theft. The perpetrator probably also used brand spoofing of Big Bank’s web site.

6-10

Similar Documents

Premium Essay

Accounting Information Systems

...Accounting Information Systems; Riordan Manufacturing Accounting Information Systems; Riordan Manufacturing Looking at the company’s information page, you can observe almost anything that goes on within the company. With the shire size of a global company such as this one, you know that they have to use a lot of different systems just to remain profitable. Their web site states that “Riordan Manufacturing is a global plastics manufacturer employing 550 people with projected annual earnings of $46 million. The company is wholly owned by Riordan Industries, a Fortune 1000 enterprise with revenues in excess of $1 billion. Its products include plastic beverage containers produced at its plant in Albany, Georgia, custom plastic parts produced at its plant in Pontiac, Michigan, and plastic fan parts produced at its facilities in Hangzhou, China”. From that information you can see that there are locations in San Jose, California, Albany, Georgia, Pontiac, Michigan, and Hangzhou, China. That many different locations require the company to use a comprehensive system just so they can communicate with each other, this is needed mostly to make sure each location is doing what it needs to, but also to keep productivity companywide at its peak. Looking at it that way there’s a need to upgrade the systems as business evolves, but the decision needs to be made at the appropriate time. The first system they have in place is called HRIS, the company profile describes the system as keeping...

Words: 1493 - Pages: 6

Premium Essay

Accounting Information System

...Polytechnic University of the Philippines Sta. Mesa, Manila College of Accountancy and Finance CHAPTER 1: ACCOUNTING INFORMATION SYSTEMS AND THE ACCOUNTANT Submitted By: Angeles, Jireh Nesamiel L. Carullo, Shery Lyn A. Gutierrez, Joe Mar C. Monforte, Roselyn G. Reyes, Edward Angelo A. BSA 3-9 Submittes To: Prof. Leandro Cruz Fua WHAT’S NEW IN ACCOUNTING INFORMATION SYSTEMS? Cloud Computing—Impact for Accountants According to Ron Gill, cloud computing is a way of using business applications over the Internet—such as the way you use the Internet for your bank transactions. Think of cloud computing as a way to increase IT capacity or add capabilities without investing in new infrastructure, training new people, or licensing new software. Mostly, we’re talking about a subscription-based or pay-per-use service that makes IT’s existing capabilities scalable whenever the need exists. Estimates suggest that the fast-growing cloud computing industry will reach $42 billion by 2012. Cloud computing resources may be categorized as data storage, infrastructure and platform, or application software (i.e., business applications such as purchases, HR, sales, etc.). If a firm would like to take advantage of cloud computing, it would most likely need to subscribe to all three of these categories from the service provider. For example, business applications depend on company data that is stored in the database, and data storage depends on the appropriate infrastructure...

Words: 2839 - Pages: 12

Premium Essay

Accounting Information Systems

... |Accounting Information Systems I | Copyright © 2009, 2007, 2005, 2004, 2003, 2001 by University of Phoenix. All rights reserved. Course Description This course is designed to provide accounting students with the proper mix of technical information and real-world applications. Areas of study include fundamental concepts and technologies (what computers can do for business), the Internet, intranets, electronic commerce, information systems development, basic project management principles, decision support systems, and the benefits of computer and human synergy. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Bagranoff, N. A., Simkin, M. G., & Strand, C. S. (2008). Core concepts of accounting information...

Words: 3264 - Pages: 14

Premium Essay

Accounting Information System

...HI5019 Strategic Information Systems for Business and Enterpise (T1, 2013) Assignment (20% of Final Mark) The assignment has two parts namely Part A (20 marks) & B (20 marks). Part A will require you to answer four (4) questions. Part B will involve two (2) cases selected form you textbook, Accounting Information Systems 8th edition by James A. Hall. The assignment aims to develop an understanding of Accounting Information Systems structure and their use in the business setting. The task is to answer questions relating to transaction processing, ethics, fraud and internal control. This assignment itself includes several assignments, each of which comprises a part of the students’ task. However, it is well encouraged to include any additional information that students may think will be useful in completing the task. General Rules and Requirements: Reports must be confined to 3,000 words (+/- 5%). As a minimum, a title page, table of contents page (based on your report headings), introduction, conclusion and references should be included. Font type should be Arial (size 11), paragraph spacing should be 1.5. Note: Any  additional  material  from  external  sources  that  you  “copy and paste”  into  your  report  is   NOT included in the word limit. Also, ensure it is appropriately referenced. PART A (20 marks) 1. How does SOX affect the provision of attest and advisory services? (5 marks) 2. Compare and contrast the relative advantages and disadvantages of sequential, block,...

Words: 450 - Pages: 2

Premium Essay

Accounting Information System

...HI5019 Strategic Information Systems for Business and Enterpise (T1, 2013) Assignment (20% of Final Mark) The assignment has two parts namely Part A (20 marks) & B (20 marks). Part A will require you to answer four (4) questions. Part B will involve two (2) cases selected form you textbook, Accounting Information Systems 8th edition by James A. Hall. The assignment aims to develop an understanding of Accounting Information Systems structure and their use in the business setting. The task is to answer questions relating to transaction processing, ethics, fraud and internal control. This assignment itself includes several assignments, each of which comprises a part of the students’ task. However, it is well encouraged to include any additional information that students may think will be useful in completing the task. General Rules and Requirements: Reports must be confined to 3,000 words (+/- 5%). As a minimum, a title page, table of contents page (based on your report headings), introduction, conclusion and references should be included. Font type should be Arial (size 11), paragraph spacing should be 1.5. Note: Any additional material from external sources that you “copy and paste” into your report is NOT included in the word limit. Also, ensure it is appropriately referenced. PART A (20 marks) 1. How does SOX affect the provision of attest and advisory services? (5 marks) 2. Compare and contrast the relative advantages and disadvantages of sequential, block, group, alphabetic...

Words: 450 - Pages: 2

Free Essay

Accounting Information System

...TUGAS AKHIR SISTEM INFORMASI AKUNTANSI   Dosen : Haryono, Drs., M.Com.       Disusun Oleh :   Amanda Pratiwi S. 13/347120/EK/19389   Shilvy Candra 13/347602/EK/19402   Siti Fauziah 13/347050/EK/19385   Yuniana Rizki R. 13/347074/EK/19388     Fakultas Ekonomika dan Bisnis   Universitas Gadjah Mada   Yogyakarta PENDAHULUAN Profil Perusahaan Sumber : Google Platinum Internet Café merupakan sebuah perusahaan yang bergerak di bidang jasa internet dan juga café yang berdiri pada bulan Juli tahun 2009. Karakteristik bisnisnya lebih kepada konsep café internet untuk tempat berkumpul dan mengerjakan tugas. Jasa dan produk yang ditawarkan di sini antara lain persewaan komputer dan internet, percetakan (foto dan kertas), scanning, burning, pulsa, serta café. Jasa yang paling utama adalah persewaan komputer dan internet. Kantor pusat perusahaan terletak di daerah Gelagah Sari dan mempunyai empat cabang dengan nama yang berbeda. Alamat : Jalan Kaliurang Km 5,5 Sleman ,Yogyakarta 55281 Twitter : @platinum_jakal Facebook : Platinum Internet Café Struktur Organisasi Direktur       Manajer  Umum   Manajer   Operasional   Kepala   gudang   café   Kapten   café   Manajer   Keuangan   Manajer   Teknis   Kasir   Café     Wakil   Manajer   Operator   Staf   multimedia   Teknisi   khusus...

Words: 1740 - Pages: 7

Premium Essay

Accounting Information Systems

...Chapter One As accounting students we have studied a variety of accounting areas involving financial and taxes. The accounting information course appears to be a course that heads in a different direction then what we as students have become accustomed to. Speaking for myself I have always been drawn to the accounting field because it is a black and white area. In other words, there it is organized and has right and wrong answers, this leaving out the gray areas between right and wrong. Accounting information systems appears to be throwing us into a whole new area of the study of accounting. The fine line between right and wrong is becoming smudged into a gray area. With accounting information system we are being thrown into an area that is now unfamiliar to what we have come to know as right or wrong. This accounting information system is designed to help us think outside of the box by providing unstructured problems that will increase our ability to develop professional judgment, our confidence in our ability, and use more critical thinking. The conceptual framework was developed in the late 1970’s by the FASB to be used as a guide for accounting principles. The conceptual framework is set up as a pyramid that has three levels. The top level provides the objective of financial reporting: provide information to decision makers, the second or middle level is divided into two parts, one part is aimed at the elements of financial statements and the second part is geared towards...

Words: 7237 - Pages: 29

Free Essay

Accounting Information System

...AIS. Many should be familiar to you, and many were part of our modern accounting scenarios. Let’s briefly discuss each element, with special emphasis on how the accountant is affected. Later in the chapter, we provide a roadmap showing you where each component is covered in this textbook. Before beginning, let us tell you two things. First, the study of AIS, is our broad view, while the accounting information system itself, is our narrow view of an AIS. Second, you shouldn’t assign any meaning to the placements of the elements in figure 1.1. The figure just tells you that there are ten elements. 1. Business Operations: An AIS operates in concert with business operations. Many AIS inputs are prepared by operating departments, the action or work centers of the organization; and many AIS outputs are used to manage these operations. Therefore, we must analyze and manage an AIS in light of the work being performed by the organization. For example, to advise his management and to prepare reports for management decision making, a management accountant must understand his organization’s business. In our scenarios, Jill had to understand corporate takeovers to prepare the relevant analysis. 2. Transaction Processing: An organization Processes Transactions, such as sales and purchase; these Transactions mirror and monitor and business operations. these Transactions have operational, management information system(MIS), and AIS aspects. To design and use the MIS and the AIS, an accountant...

Words: 1475 - Pages: 6

Premium Essay

Accounting Information Systems

...……………………………………………………………………………………….3 Critical aspects of Accounting Information Systems………………………………….................3 People…………………………………………………………………………………….3 Procedure and Process Analysis…………………………………………………………4 Data Analysis…………………………………………………………………………….4 Decision Analysis………………………………………………………………………..4 Design…………………………………………………………………………………….5 Importance of Safeguarding Information ………………………………………………………..6 Network Security………………………. ……………………………………………………….6 Advantages of Accounting Information Systems..……………………………………................7 Disadvantages of Accounting Information Systems……………………………………………..7 Conclusion………………………………………..………………………………………………8 References ……………………………………………………………………………………….9 Introduction The Accounting information systems network is an interactive human interface that enables organizations to make key business decisions. These decisions include strategies, goals and cost saving procedures. Companies must increasingly rely on evolving technology to help manage this data. Technology serves the Accounting information systems as a whole to help an organization and top management make informative decisions. The design of the technology in such a way that it accommodates each critical aspect of the organization - people, procedure and processes analysis, data analysis, decision analysis, and design - is paramount. This paper will look at accounting information system from a macro point of view and discuss...

Words: 1633 - Pages: 7

Free Essay

Accounting Information System

...AC2206A1 Lecturer’s Name : Mr. Marius Benedict Date of Submission : 18th December 2014 TABLE OF CONTENTS | | Pages | Introduction | 3 | Systems Planning | 4 | Context Data Flow Diagram | 8 | Intermediate Data Flow DiagramSystems AnalysisSystems Evaluation And Design Strategies | 910 | * Access | | Purchasing Ready-Made Software Packages | | Outsourcing Contract | | Input Design | | Output Design | | Conclusion | | ACKNOWLEDGEMENT We would like to express our deepest appreciation to all those who provided us the possibility to complete this assignment.  A special gratitude we give to our lecturer for Accounting in information subject, Mr. Marius Benedict, whose contribution in inspiring suggestions, encouragement and helped us to organize our problem based learning. Special thanks to our parents and families for all the support and prays to complete this assignment on time. Last but not least, full of thanks to all our classmates whose are willing to help us out with their abilities. INTRODUCTION Every business or organization needs to evaluate their design operation in order to catch with the current technology. If they did not aware with that, they are facing several problems that may affect their business’s goal especially in gaining the profit. In this case, Hattan is a final year accounting student at UiTM...

Words: 1250 - Pages: 5

Premium Essay

Accounting Information Systems

...Business ACC/542 Version 3 Accounting Information Systems | Copyright © 2012, 2009, 2007 by University of Phoenix. All rights reserved. Course Description In this course, students examine the fundamentals of accounting systems design. Topics include business information systems, business processes and data flows, database concepts and tools, internal control and risks, auditing the information system, and using the information system to perform audit functions. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: University policies: You must be logged into the student website to view this document. Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality.   Course Materials   Bagranoff, N. A., Simkin, M. G., & Strand Norman, C. (2008). Core concepts of accounting information systems (10th ed.). New York, NY: Wiley.   Hunton, J. E., Bryant, S. M., & Bagranoff, N. A. (2004). Core concepts of information technology auditing. Hoboken, NJ: Wiley.   O’Brien, J. A. & Marakas, G. M. (2008). Management information systems (8th ed.). Boston, MA: McGraw-Hill...

Words: 2104 - Pages: 9

Premium Essay

Accounting Information Systems

...Chapter 1 ACCOUNTING INFORMATION SYSTEMS: AN OVERVIEW TEACHING TIPS This chapter provides general coverage of many of the text's major themes. It's usually a good idea to indicate how the topics covered in this chapter will be covered in more detail later in the course. Many instructors will not assign any problem from the end of this chapter. This can be done without any loss of overall continuity in the course. If the course will emphasize internal controls, it might be desirable to cover in class one of the general cases on internal control from the back of Chapters 4, 7, or 8. This should be done to stimulate student interest, but the instructor should not worry if the students in the course fail to analyze the case correctly. In some ways, teaching systems can be more difficult than teaching other areas. In many cases there are no clear-cut debits and credits to be made, and judgment is often required. This can make some students feel uncomfortable. So it's usually good to emphasize this at the beginning of the course to properly set students' expectations. The point should also be made that systems are an important area of professional examinations. One of the biggest risks in teaching systems is that it can easily become dry and boring. I have found that the best way to overcome this is to generate as much class discussion as possible on many of the major points in the chapter. Accordingly, I always make class participation about one-fourth of the total...

Words: 4907 - Pages: 20

Premium Essay

Accounting Information System Requirements

...Accounting Information System Requirements XACC/210 The requirements for developing an accounting information system are not unlike the design of an IT system. There are specific steps to adhere to in order to have a successful outcome. 1. Planning and investigation- It is important to determine what is required by each individual company in order to be successful. A company cannot skip this step and jump into a new system. The outcome would surely fail. 2. Analysis- It is important to take a broader view of current systems to determine what is working and what parts of the system need to change in order to be successful. 3. Design- After step one and two have been achieved, designing the new accounting system is the next logical step in order to realize the company vision. 4. Implementation, maintenance, and follow-up- Next, the company will try the new system out, make the necessary adjustments as time goes by, and ensure that things are working as they were designed to work. The accountant’s role in this process is to advise the company what elements are needed to have an accounting system that will allow them to effectively bring the needed information to the company that is needs in order to maintain a profitable business. They know what type of programs that are effective for general accounting purposes, spreadsheets etc. This knowledge and advice an accountant gives is a vital part of the planning and investigation an organization needs to...

Words: 261 - Pages: 2

Premium Essay

Impact of Information Technology on Accounting Systems

...[1] ICPA, “Review and Resume”, Accounting Terminology Bulletin no. 1, (1953), par 9. [2] N. Conn, “Objectives of Financial Reporting by Business Enterprises”, Statement of Financial Accounting Concepts no. 1, (1978), par 9. [3] W. Ballada and S. Ballada, “Basic Accounting”, DomDane Publishing, (2011), pp. 20, 88-90. [4] Information Technology, http://en.wikipedia.org/wiki/Information_technology, (Accessed 2013). [5] M. Ghasemi, V. Shafeiepour, M. Aslani and E. Barvayeh, “The Impact of Information Technology (IT) on Modern Accounting”, Procedia - Social and Behavioral Sciences, vol. 28, (2011), pp. 112–116. [6] http://www.e-conomic.co.uk/accountingsystem/glossary/accounting-system, (Accessed 2013). [7] K. I. Dandago and A. S. Rufai, “Information Technology and Accounting Information System in the Nigerian Banking Industry”, Asian Economic and Financial Review, vol. 4, no. 5, (2013) June, pp.655-670. [8] J. Moscove, P. Sinkin and P. Bagranoff, “A Theory of Interdependent Demand for a Communication Service. Bell Journal of Economics, vol. 5, no.1, (1999), pp. 283-292. [9] J. Hall, Accounting Information System, (2008), pp. 11-28, ISBN-10: 0324560893, ISBN-13: 9780324560893. [10] S. Shanker, “How is Information Technology Used in Accounting?”, Chron Small Business Demand Media, (2013). [11] M. Amidu, et al., “E-Accounting Practices among Small and Medium Enterprises in Ghana”, Journal of Management Policy and Practice, vol. 12, no.4, (2011), p. 152. [12] Cost-Benefit...

Words: 346 - Pages: 2

Premium Essay

Information Systems and Accounting Research

...Guido L. Geerts, author of “A Design Science Research Methodology and Its Application to Accounting Information Systems Research,” asserts most of research currently conducted in the accounting information systems (AIS) and information systems (IS) areas focuses on understanding why things work the way they do, also known as “natural science (Geerts, 2011).” The primary goal of the paper was to introduce the design science research methodology (DSRM) into accounting information systems (AIS) literature by discussing the DSRM, applying the DSRM to different AIS design science papers, and then integrating the DSRM as part of the operational AIS literature (Geerts, 2011). “Currently, integration is increasingly needed in the business environment. This need emerges from the efficiency and synergy requirements necessary in a complex and turbulent environment. In other words, integration is needed to facilitate coordination, which is again related to the building of competitive advantage.” (Granlund & Malmi, 2002, p. 305). Detail Geerts’ introduction gives definitions and history of the concept of DSRM and AIS so that the reader may transition along with the article. There is discussion of each methodology giving the history and the science behind it and then he moves into how the application of DSRM was discussed in the AIS area. According to Geerts the DSRM has three objectives and aims at improving the production, presentation, and evaluation of design science research...

Words: 611 - Pages: 3