Free Essay

How Event Reports Are Processed

In:

Submitted By kellylow
Words 2496
Pages 10
Event Reporting User Manual
May 19, 2008

Event Reporting User Manual
Event Reports
An Event Report lets you track the identification, investigation, and resolution of any issues affecting your fleet or business operation. Event Reports can be an important element of your company's Quality Assurance (QA) program, Continuing Analysis And Surveillance System (CASS), reliability program, or Safety Management System. For more information about safety risk management, consult the U.S. FAA’s Safety Program website (http://faasafety.gov/). HAI’s Event Report program is accessible through the web at www.eventreporting.org, or www.mmir.com. Registration only takes a few minutes. You can add and remove additional users to your company’s account, with their own unique log-on. An Event Report’s status can be New, Open, Closed, or Rescinded. When an Event Report is initiated, its status is New. Once acknowledged by the designated management representative (via checkbox), the report’s status is Open. An Open report means that an issue has been identified, brought to management's attention, and needs to be addressed. Authorized users can enter additional comments on Open reports as an investigation ensues. Once the issue has been satisfactorily resolved and documented, the Event Report should be classified as Closed. Once Closed, no further entries or amendments are possible on the Event Report. Authorized users may also rescind a New or Open Event Report, but this option should be used sparingly. Rescinding an Event Report effectively nullifies the report without resolution. The report remains stored in your company’s account for reference purposes. Refer to User Levels section to determine the capabilities of authorized users. Event Reports are INTERNAL TO YOUR COMPANY unless specifically designated to be SHARED (see Shared Reports section). Unlike MMIR reports that you send to the FAA or the part manufacturer, your Event Reports are ONLY ACCESSIBLE TO AUTHORIZED COMPANY EMPLOYEES, unless designated as SHARED. The information in an Event Report can easily be copied to a MMIR form, if deemed appropriate. For example, after an Event Report is filed, it may be determined that a defective part was at fault. You have the option to transfer information from the Event Report to a MMIR form, allowing for quick submission of a warranty claim or SDR. The Event Report stays permanently in your account. These topics are explained further in this manual.

1

Registration
If you use MMIR, you may already have an Event Report account. Check with your company MMIR administrator. The log-on name and password will be the same for both systems. To register a new Event Report account, go to www.eventreporting.org or www.mmir.com. and click on the “Not registered? Click here” link. Registration only takes a few minutes; simply follow the step-by-step process. You can add and remove additional users to your company’s account, each with their own unique log-on.

Begin registration here

During registration, you will be asked for a log-on email address and a password. You will use this email / password combination to log onto the Event Reporting system. Be sure to use a real email address. You will be notified at this address whenever a new Event Report is entered into your company’s account. You will also be asked if you want to activate “Anonymous Reporting.” This is a special feature of Event Reporting. Anonymous Reporting allows all company employees to submit a report without personal identification, hence, anonymously. Why? Employees may feel more comfortable reporting potential problems without fear of personal

2

retribution. Whether this fear is warranted or not, many companies have found that just having the option available to employees offers another avenue to identify and fix small issues, before they become big trouble.

Enter strong password

Enter a strong password, then click Continue. A new web page will be generated. It will show your computer-generated Company ID number and your Anonymous Reporting password. This Anonymous Reporting feature can be turned on or off as you deem appropriate. Use the “Edit Users” link on the Main Menu.

3

Print and distribute

Because this is the information your employees will need to log on and submit an Anonymous Report, we suggest you use the “Print this Page” link. To get an even cleaner copy that you can post on the company bulletin board, drop in employees’ mail slots, or disseminate via company email, click on the PDF Version link. This Anonymous Event Reporting narrative page, which includes your Company ID / Password, is also accessed from the Authorized Users page.

4

On the Authorized Users page (click “Edit Users” from the Main Menu), you can add additional users for your Event Reporting account. Generally, this will be limited to specific employees who will be authorized to create, edit, or respond to Event Reports. Authorized users can be added, amended, or deleted anytime.

Add, edit, or delete users on your company account Find your company’s Anonymous Report Company ID / password

Enable / disable toggle button; or change password

Every additional user must have a unique email and password

Select a User Level for each user

5

User Levels
There are four User Levels for Event Reporting. Higher levels retain the capabilities of lower levels: Read allows the user to view existing Event Reports only. Write authorizes the user to initiate a ("New") report and edit (add information and comments) existing company reports. This is an appropriate level for employees who have reason to report and/or comment on problems or observations. Manager controls the dispensation of Event Reports; i.e., Acknowledge, Close, and Rescind. See “Working with Event Reports” for explanation. Administrator controls other users' levels of authorization, and adds or removes users from the system. Administrators are notified via email when a new Event Report is submitted. The person who registers for the company account is automatically designated an Administrator.

6

Working with Event Report Forms
To start a report, log on, and from the Main Menu, select "New Event Report"

Start here

Event Report Form
The Event Report form is structured to let you assign general categories pertaining to subject and urgency of resolution. You can also designate the time of the event occurrence, and if applicable, the specific aircraft and/or engine. The important point to remember is to USE THE FORM AS YOU SEE FIT. Unlike SDR or warranty claim forms, there are no required fields on the Event Report form. Just provide enough information to help with your operation.

7

Company information, report status, overview

Ratings; occurrence date & time Broad categories: • Ground Operations • Flight Operations • Maintenance • Administrative Multiple subcategories User-customizable locations User-customizable topics

Aircraft, Engine; SDR, MIS fields
(if applicable)

Check for related reports

Narrative boxes (text) Part(s) information

Accountability record; all previous versions available for review

Once report is “Open,” Manager level can “Close” report when resolved and documented; or Rescind report

8

Anonymous User Reports
There is growing understanding that to encourage the reporting of problem areas and safety-related issues by all employees, a business climate must exist in which identifying and correcting problems takes precedence over assigning fault and metering punishment. To work towards that goal of a “Just Culture,” Event Reporting provides the option for users to submit Event Reports anonymously. It is up to management to decide whether or not to utilize this feature, or whether to continue it. To allow anonymous reporting, the MMIR Account Administrator must select that option on the Registration form (“Edit Registration & Users” link on the Main Menu). A strong password must be selected (at least 8 alpha and 1 numeric characters), and a Company ID is automatically assigned. This Company ID / password log-on should be made available to all company employees, and not revealed outside the company. An anonymous Event Report filed using this log-on is directed to your company. Anonymous Users can only initiate Event Reports; they have no User Level authorization. NOTE: An employee does not have to be a registered user to submit an Anonymous Event Report. Anyone with the correct Company ID / password log-on can access Anonymous Reporting at www.eventreporting.org. Just click on the “File Anonymous Event Report” link:

Start here to submit an Anonymous Report

How Event Reports are Processed
When someone initiates an Event Report, its status is New. The report remains in New status until a Manager (or higher User Level) reviews the report and checks the “Click here to acknowledge this report” box (just beneath the large Describe Event text box).

9

Once the report is acknowledged, its status changes to Open. Authorized users (those with access to your company’s account; i.e., Additional Users) can log on to Event Reporting anytime and review or add details to the Event Report. ANYONE WHO ACCESSES OR EDITS AN EVENT REPORT HAS THEIR INITIALS ASSIGNED TO THAT REPORT. By tracking who has accessed an Event Report, accountability is provided. This accountability trail is listed under the “History” section, including dates and times. EXCEPTION: Anonymous Users are only identified as “Anonymous.” Probably the most important features of the Event Report form are the 3 text boxes: Describe Event, Investigations & Findings, and Resolution. Here, authorized users describe in their own words what happened, keep track of findings as an investigation progresses, and document the resolution for future reference. An Event Report can be accessed and edited by authorized company users indefinitely, until the report is Closed or Rescinded. Closed: An Event Report is designated as Closed by a Manager or higher User Level (via the checkbox at the bottom of the form) when the issue has been satisfactorily resolved and documented. Remember, someone in your company may review this form years later, so make the report detailed enough to be helpful. After checking the Closed box, you can specify the date on which the report was closed, and the initiator of the Event Report will be notified via email (unless Anonymous). Also, you will be given the option to “share” your Event Report; i.e., make it available to be read by external parties. Once Closed, the Report is reviewable, but no longer editable. Rescinded: A Manager User Level or higher may also rescind a New or Open Event Report, but this option should be used sparingly. Rescinding an Event Report effectively nullifies the report without resolution. The report remains stored in your company’s account for reference purposes. Summarizing, you Close an Event Report when the issue has been resolved and documented. You may Rescind an Event Report if you believe the underlying issue did not warrant action. Only a Manager User Level or higher can Close or Rescind an Event Report. Note that there is no Delete option for Event Reporting. In other words, once started, the Report will remain available indefinitely, for review. It can stay in New or Open status indefinitely as well. There is one exception:

10

This is the menu you will see after you Save your Event Report. You can review it, edit it, print it out, create a new Event Report, search for existing Event Reports, go to the Main Menu, copy the data from the Event Report to a MMIR form, or log off. IF YOU HAVE JUST INITIATED A REPORT, you have the option, just this time, to delete it. THIS IS THE ONLY TIME YOU CAN ACTUALLY DELETE AN EVENT REPORT; i.e., immediately after starting it. The next time any authorized user (including the initiator) accesses this report, the Delete option will be unavailable.

11

Remember, an Event Report “goes nowhere” unless you specifically designate it as “Shared” when you close it. If the Event Report is not shared, only authorized users on your company’s Event Report account have access to it.

Related Event Reports
Over time, you will probably create dozens or hundreds of Event Reports. Inevitably, some will overlap in some way. That is, the same or similar issue may re-appear. Wouldn’t it be useful to be able to tie these report references together? You can with Event Reporting. If there are other Event Reports, within your company of course, that might be related to the report you are working on, it’s easy to reference them. And you don’t have to rely on your memory. Simply check the box where it says, “Check here if this report is related to other Event Reports.” A new text box will appear. If you remember the report number, type it in here. More than likely though, you’ll want to click the Search button.

Check this box if you think other reports may be relevant Review your reports to determine relevance

A chronological list of all your company’s Event Reports appears. You can review individual reports, and check to insert their numbers into the current report if appropriate.

12

Search and Review Event Reports

So how do you go in and find Event Reports? Easy. From the Main Menu, select “Search Event Report.” The following search form will appear:

If you want to review and edit your company’s Event Reports, just click the Submit button. If you are interested in viewing external (other companies’) Shared Event Reports, select the appropriate option, then click Submit. Searching on “Company Reports” will bring up the following search screen:

13

If you know the record number, just enter it in the Record # box at the top and click the Go! button. Otherwise, search on any or all fields under the Comprehensive Search banner. The date range defaults to the past year, but change that to your preference. Another helpful feature is the keyword search. Let’s say you remember something you wrote in one of the text fields, such as Investigation & Findings: “The pilot reported a click clack noise on shutdown.” To quickly find the report, you could type a clause as you remember it; e.g., click clack. A list would appear that includes all Event Reports with that text in any of the 3 narrative text fields.

Shared Reports
What is the advantage of sharing your company’s information? Depending on the nature of the event, sharing information can be positive for safety. You will have to make that determination when you Close your Event Report. You will be given the opportunity to designate the report for sharing with others. This means that external parties, even your competitors, will be able to review that specific Report, unaltered and in full. !TIP While anyone may view a Shared Event Report, no one can amend or edit it.

14

HAI believes safety is enhanced when information is shared. A documented problem and its resolution could be helpful to other operators who might be experiencing similar issues, or make them aware of potential trouble. HAI recommends sharing information whenever competitive interests are not infringed. Who knows...someone else’s shared Event Report may help you one day. If you have comments about Event Reporting, contact HAI at mmir@rotor.com, or +1 (703) 683-4646.

15

Dedicated to the advancement of the international helicopter community

Similar Documents

Premium Essay

Accounting Info System

... Facts that are collected, recorded, stored and processed by an information system a) Information b) Data c) Systems d) Mandatory information 3. Information is a) What happens when the data exceeds the amount the human mind can absorb. b) The benefit produced by the information minus the cost of producing it. c) Facts that are collected, recorded, stored, and processed by an information system. d) Data that have been organized and processed to provide meaning to a user. 4. Data are a) facts entered, stored, and processed by an information system. b) processed output that is useful to decision makers. c) another word for information. d) quantitative facts that are not qualitative by nature. 5. Which of the following statements below shows the contrast between data and information? a) Data is the output of an AIS. b) Information is the primary output of an AIS. c) Data is more useful in decision-making than information. d) Data and information are the same. 6. The value of information can best be defined as a) how useful it is to decision makers. b) the benefits produced by possessing and using the information minus the cost of producing it. c) how relevant it is. d) the extent to which it maximizes the value chain. 7. An accounting information system (AIS) processes __________ to provide users with __________. a) data; information b) data; transactions c) information; data d) data; benefits 8. How many components are found in an AIS? a) three b)...

Words: 540 - Pages: 3

Premium Essay

Business

...• Managers Positive correlation关系 exists between size of money loss and perpetrator’s authority level, tenure任期, education level, age and male gender. Control Activities, Business Processes and Accounting * Financial statements make a series of assertions认定 about the events that have taken place and the balances that are presented.(how an error in a business process can impact the financial statements) * Applying internal controls (also concerned with environment) involves an evaluation of these assertions coupled with a risk assessment. * Once risk has been identified, it needs to be evaluated. * (After identifying risks, management will decide on appropriate policies and procedures to address the risks. These are called control activities, and will communicate to the organization for implementation.) Classification of Internal Controls By Australian Auditing Standards Preventive/ Detective/ Corrective (how they deal with risks) General/ Application (IT controls) Automated/ Manual 2. Performance Reviews Activities that involve some form of review or analysis of performance. E.g. 2 people doing the same job * Independent checks ensure that transactions are processed accurately – another important control element. * What are the various types of independent checks? a) Reconciliation of two independently maintained sets of records b) Comparison of actual quantities实际数量 with recorded amounts c) Double-entry accounting 复式记账 ...

Words: 1436 - Pages: 6

Premium Essay

Cognitive Psychology

...Cognitive Psychology Definition Psy 360 June 6, 2011 Dr. Felix Montes Cognitive Psychology Definition Cognitive psychology has a different approach than that of previous psychologies. Cognitive psychology accepts the scientific method and introspection as a method of investigations. Introspection is the self-observation reports of the conscious inner thoughts, desires, and sensations. It is the oneself (Wikipedia, 2011). The other way cognitive psychology is different is in the way it acknowledges the existence of internal mental states like beliefs, desires, ideas, and motivation (Wikipedia, 2011). The definition of cognitive psychology is described as the study of mental processes and how a person thinks, perceives information, remembers the information, and learns from the experience. In the larger field of cognitivism, neuroscience, philosophy, and linguistics play a role. Although this science stems from behaviorism it is its own science. The core of cognitive psychology is how to acquire, process, and store information (Willingham, 2007). Most of the famous psychologists and philosophers somehow relate back to Wilhelm Wundt. Wundt is credited with the founding of the first lab back in 1879. There was a lab at Harvard University before this in 1875 but because William James used this lab as a source of teaching and for experiments, he is not credited for the first lab. Wundt did the necessary steps to have cognitive psychology sighted as a science...

Words: 939 - Pages: 4

Premium Essay

Unit 531 Week 3 Data Analysis Paper

...imputed into an information system so it can be managed and processed. Data has to be stored in the most efficient way, like keeping the same type of data together. The data stored must accurate, valid and fit-for-purpose so that when it is outputted as information, the information that is used is correct and won’t impede the company’s work. People People are involved in obtaining data and processing it to create information for purposes relevant to the business. Staff need to have the correct training and skills to get the most out of information systems and make them effective employees. Hardware The hardware used in information systems must be capable of the software used in the business as well as handle the mass...

Words: 921 - Pages: 4

Free Essay

Discriminate Between Data and Information

...information Data is the raw material for data processing. The data relate to facts, event and transactions. Data refers to unprocessed information. Information is data that has been processed in such a way as to be meaningful to the person who receives it. It is anything that is communicated. For example, researchers who conduct market research survey might ask a member of the public to complete questionnaires about a product or a service. These completed questionnaires are data; they are processed and analyze in order to prepare a report on the survey. This resulting report is informative. Data | Information | Originated at mid 17th century | Originated in late middle time | Data are raw facts. | Information is processed data | May not always be meaningful. | Information is always meaningful. | Input to any system may be treated as Data | Output after processing the system is Information | Data must be processed to understand. | The information is already in understandable form, it may be processed further to make it more understandable. | Difficult to Understanding | Easy to Understanding | Data may not be in the order. | Information should be in the order | Example: Statistics, numbers, characters, images. | Example Reports, Knowledge | Data is used as input to the computer system. | Information is the output of data. | Data is unprocessed facts figures. | Information is processed data. | Data is not specific. | The information is specific | Data is...

Words: 993 - Pages: 4

Free Essay

Business

...transactions that involves the collection, modification and retrieval of all transaction data of an organization .It can also referred to as an event that generates or modifies data that is eventually stored in an information system. A transaction process system also monitors transaction programs, a special kind of programmes, manages data that must be left in a consistent state for example if an electronic payment is made, the amount must be either both withdrawn from one account and added to the other, or none at all. In case of a failure preventing transaction completion, the partially executed transaction must be rolled back by the transaction process system. Characteristics of transaction process systems Rapid Response It has fast performance with a rapid response time is critical. Businesses cannot afford to have customers waiting for a TPS to respond, the turnaround time from the input of the transaction to the production for the output must be a few seconds or less. Reliability Many organisations rely heavily on their TPS; a breakdown will disrupt operations or even stop the business. For a TPS to be effective its failure rate must be very low. If a TPS does fail, then quick and accurate recovery must be possible. This makes well–designed backup and recovery procedures essential. Inflexibility A TPS wants every transaction to be processed in the same way regardless of the user, the customer or the time for day. If a TPS were flexible, there would be too many opportunities...

Words: 1549 - Pages: 7

Premium Essay

Case 04-4: Three Little Pigs, Inc.– Inventory Impairment

...BACKGROUND Three Little Pigs, Inc. (PIGS) is a provider of pork products. The Company produces approximately 4.1 million hogs per year; the majority of which are internally processed. However, a portion of the hogs produced are sold to outside third parties. PIGS does not have any commitments to sell live hogs to third parties and it does not hedge its live hogs through commodity futures contracts. PIGS has three major categories of hog inventory: (1) live hogs available for sale; (2) developing animals; and (3) processed pork products. Management is confident that the wholesale price of processed pork products exceeds the cost to bring such products to market. However, spot market prices charged for live hogs sold to third parties have recently declined and are currently below the Company’s cost of producing these hogs. The decline in spot market prices is due to several factors, including the capture of the Big Bad Wolf, which led to an increased supply of pork. As of the second quarter ending September 2002, futures prices for lean hogs indicate a further decline before recovering late in the fourth quarter, as illustrated below: October 2002 $29.00 November 2002 $30.00 December 2002 $33.00 January 2003 $37.00 February 2003 $42.00 March 2003 $45.00 Farmer Joe asserts that the price decline reflected above is the result of seasonality. Currently, the cost of producing a live hog is $38/cwt ($38 per 100 pounds). Therefore, live hogs available for sale are carried...

Words: 1282 - Pages: 6

Free Essay

Current Events in Business Research

...Current Events in Business Research Debra Blackwelder RES/351 March 10, 2014 John Gilpin Current Events in Business Research The business research process begins with the collecting of data and then processed into information that can be used to define more details on where, when, how, what type of business is needed for that type of buyer. You have to clarify the research question by discovering the management dilemma, defining the management question, defining the research question(s) and finally refining the research question(s), which is called the exploration of research. Then the research proposal is done, followed by the research design strategy, then data collection and preparation. Next are the data analysis and interpretation, then research reporting finishing with the management decision. The article that the Arthur used for this paper talks about how President Obama issued a list of executive orders, one of which is for the Center for Disease Control (CDC) received $10 million to research gun control violence. In the wake of all the different school shootings, the Obama Administration and anti-guns proponents thought the evidence would be irrefutable to support why guns make Americans less safe. They were not expecting what the CDC report found in their Priorities for Research to Reduce the Threat of Firearm-Related Violence. Their report study findings are that armed citizens are likely to be injured by an attacker, defensive uses of guns are common and that...

Words: 316 - Pages: 2

Premium Essay

Tourism

...Current Practices in Tourism Hospitality and Events CHTM33 Module Guide University of Sunderland London Campus Contacts Module leader US: Dr. Donna Chambers, Reader Module tutor USLC: Dr. Barbora Cherifi, Academic Tutor 3rd floor staff room barbora.cherifi@sunderland.ac.uk Module information TITLE: Current Practices in tourism, Hospitality and Events CODE: CHTM33 CREDITS: 30 LEVEL: M MODULE BOARD: Tourism PRE-REQUISITES: none CO-REQUISITES: None LEARNING HOURS: 300 Learning Outcomes: Upon successful completion of this module, students will have Knowledge 1. Demonstrated an advanced knowledge of current issues, debates and practices in Tourism, Hospitality and Events. 2. Critically evaluate current research and scholarship relating to tourism, hospitality and events. 3. Critically evaluate the strategic challenges facing Events, hospitality and Tourism organizations. Skills 4. Demonstrate the ability to communicate concepts and analysis orally as well as in written form. 5. Demonstrate the ability to analyze, synthesize and diagnose issues and opportunities in tourism, hospitality and events. 6. Reflect critically on the relationship between theory and practice in tourism, hospitality and events. Content Synopsis This module is conceived as an open platform for students to engage with current practices, issues and debates in Tourism, Hospitality and Events. As well as introducing students to the latest theoretical debates...

Words: 3834 - Pages: 16

Premium Essay

Vx Bvxc

...4-20 a. Assessing management integrity should be considered before accepting the audit engagement. Some considerations are: * check references from other professionals * does the client deal ethically with outside parties b. If during the assessment of management it is suspected that integrity is lacking the auditor would not put much reliance on management’s assertions but would increase the amount of evidence and collect more from external sources. c. The normal responsibility is to carry out the audit with professional skepticism. It is not the auditor’s job to find criminal activity. The auditor will carry out procedures necessary to support his work and at the same time if anything comes to his attention that needs further investigation, will pursue it to its conclusion. d. When management or directors are involved in criminal activity, their credibility is minimal at best. This indicates a larger risk of material misstatement of the financial statements. Where there is evidence of criminal activity, the auditor should consult a lawyer and consider resigning from the audit engagement. e. If it were found that a prudent person (other auditors) would have gathered more evidence that would have led to the discovery of the fictitious sales, then it would be considered negligence. 10-24 Risk of error or fraud | Potential control (type of control) | Inaccurate data could be entered for a sale, resulting in incorrect or unauthorized prices or quantities...

Words: 3127 - Pages: 13

Free Essay

Chapter 3—Electronic Business (E-Business) Systems

...among organizations and/or individuals. These processes include the interaction between the back-office and the front-office processes. DESCRIBE HOW TECHNOLOGY HAS SUPPORTED AMAZON.COM’S GROWTH. Amazon.com has grown because it has used technology to enhance the company’s value chain and to satisfy customers’ needs. It had innovated technology that allows a customer to shop at one location for many different items without burdening the amazon.com with the inventory-carrying expenses of traditional retailers. It has also innovated the collection and analysis of customer purchase data. By offering a wide variety of books online and having the procurement and delivery system in place satisfy orders in a timely manner; it has been able to grow substantially. These provided amazon.com a competitive advantage in the online retailers’ marketplace. DESCRIBE THE ACTIVITIES ASSOCIATED WITH THE MANUAL ACCOUNTING SYSTEM. The following activities are associated with the manual accounting system. First is to journalize the business event in a book of original entry. The second activity is to post the business event from the journal to the subsidiary ledger. Third, is to post the total from the journal to the general ledger. Finally, is to summarize the business events by preparing a trial balance. DESCRIBE THE STAGES OF AN AUTOMATED ACCOUNTING PROCESS. The following activities are associated with the automated...

Words: 2202 - Pages: 9

Premium Essay

Retail Selling

...Retail Selling Retailers Legal Responsibilities and Policies Prepared By: Emma Cunniffe For The Attention Of: Catherine Cooney PPSN: 8150999U Class: Beauty Sales Advisor Issue Date: 20/10/14 Deadline: 17/11/14 Terms of Reference This report is for the FETAC level 5 module Retail Selling as part of my certificate in Retail Practice – Beauty Sales Advisor. Aims The Aims of this report are: * To identify and explain four pieces of legislation that affect retailers. * Discuss the retailers policies on returns * Discuss the retailers policies on after sales services * Discuss how retailers can ensure health and safety in the work place marketing reference to the HAS and to the health and safety at work Act 2005. * Make appropriate conclusions and recommendations Introduction My name is Emma Cunniffe. I am studying to be a Beauty Sales Advisor with a Certificate in Retail Practice. In this report I will outline the retailer’s legal responsibilities as well as policies on returns, after sales services and customer feedback and health and safety. This Assignment is worth 20 % of my overall mark for the module retail selling and it is a mandatory module for a certificate in Beauty Sales. I will use primary and secondary research for this assignment. Methodology I have gathered the research for this assignment from a variety of sources. These sources include the internet, books and class notes. I collected my research at various stages of...

Words: 2315 - Pages: 10

Premium Essay

It205 Smart Scenario - Clarifying Business Strategy Through Database Analysis

...Event Coordinator What are the current problems that the Event Coordinator is having? (multiple choice, multi-select) ☑ System is disconnected from other departments. ☑ Too much manual intervention in the business process. ☑ Required information is not always available. ☑ Information retention is inefficient or non-existent. ☑ Poor use of available information technology resources. ☑ Insufficient use of database technology or tools. ☐ Poor communication. How could a proper database system and subsequent tools serve to improve the issues this department is having? (short answer) Have no database to keep track of clients. Only way of customer feedback is through cards and they do not reply. Database could do all that for them. They schedule staff by previous seasons. Database could give accurate occupancy. Database could advertise and rent rooms. Front Desk What are the current problems that the Front Desk is having? (multiple choice, multi-select) ☑ System is disconnected from other departments. ☑ Too much manual intervention in the business process. ☑ Required information is not always available. ☑ Information retention is inefficient or non-existent. ☑ Poor use of available information technology resources. ☑ Insufficient use of database technology or tools. ☐ Poor communication. How could a proper database system and subsequent tools serve to improve the issues this department is having? (short answer) Recepts should be logged into...

Words: 619 - Pages: 3

Premium Essay

Accounting Information System Chapter 1

...PART Overview of Accounting Information Systems Chapter 1 The Information System: An Accountant’s Perspective 3 Introduction to Transaction Processing 31 Ethics, Fraud, and Internal Control 91 Chapter 2 I Chapter 3 1 CHAPTER The Information System: An Accountant’s Perspective nlike many other accounting subjects, such as intermediate accounting, accounting information systems (AIS) lacks a well-defined body of knowledge. Much controversy exists among college faculty as to what should and should not be covered in the AIS course. To some extent, however, the controversy is being resolved through legislation. The Sarbanes-Oxley Act (SOX) of 2002 established new corporate governance regulations and standards for public companies registered with the Securities and Exchange Commission (SEC). This wide-sweeping legislation impacts public companies, their management, and their auditors. Of particular importance to AIS students is the impact of SOX on internal control standards and related auditing procedures. Whereas SOX does not define the entire content of the AIS course, it does identify critical areas of study that need to be included for accountants. These topics and more are covered in the chapters of this text. The purpose of this chapter is to place the subject of AIS in perspective for accountants. Toward this end, the chapter is divided into three major sections, each dealing with a different aspect of information systems. The first section explores the...

Words: 13048 - Pages: 53

Premium Essay

Kia Motor Fraud

...Executive Summary This report would provide a thorough application of Accounting Information System concepts, accompanied with thorough findings on Kia Motors, South Korea’s second largest automobile manufacturer. The findings were based on mainly secondary data through research obtained from web-based sources such as online articles, analyst reports, financial reports, academic journals and academic databases. The report aims to present the detailed findings of Kia Motors and the fraud that occurred in 2002 through a Balanced Scorecard (“BSC”), Document Flowchart Diagram (“DFD”), as well as the facts and role of the accountant, Cecile Campbell in the fraud committed on Kia Motors in 2002. The report consists of mainly three components. Firstly, a BSC that was developed using Kia Motors’ mission, vision and strategies that were identified and inferred from online research and Kia Motors’ financial statements and sustainability reports. Key information that was included in the BSC were Kia Motors’ performance and risk-based goals, initiatives, measures and their performance target. Secondly, a DFD was created to reflect one of Kia Motors’ key operations. The diagram that was drawn up was based on Kia Motors’ expenditure cycle. It showcased a detailed description of the relevant source documents involved, as well as their flow throughout the business process. The report further highlighted the key internal control strengths, the risk of material misstatements they serve...

Words: 4866 - Pages: 20