Free Essay

Characteristics of an Information Systems

In:

Submitted By lacubanaloca
Words 623
Pages 3
An accountant plays a vital role in any business; one can even say they are one of the most influential practitioners. For instance, accountants participant in generating rules and guidelines, advising day to day business activities, and even decision making. While the IT and IS communities are used frequently in many businesses, they are not the founders of the characteristics of useful information. The key reason behind this is due to the fact that accountants are the users of IS and IT communities. As being the primary users, one can expect the characteristics, rules, and guidelines for an information system to be designed by the accountants themselves. In a broader view, “accountants can assume three roles: designer, user, and auditor” (Gelinas, Dull 27).
As a designer, the accountant can offer its knowledge of various principles (accounting principles and auditing principles), and various methods and techniques (information system and system development). In designing an accounting information system (AIS), the accountant can answer various questions that relate back to the seven characteristics of useful information systems. Some questions may include: “What will be recorded and how will transactions be recorded? When will the transaction be recorded and when will they be reported? What controls will be necessary to provide valid, accurate, and complete records? How much detail will reports need?” (Gelinas, Dull 27). If accountants did not design the AIS then these questions may be left unanswered without their expertise.
Accountants perform many functions in an organization such as a “clerk, controller, treasurer, tax specialist, and financial analyst” (Gelinas, Dull 27). Therefore, it is necessary for them to use the AIS to perform their duties. As a user, it is imperative for the accountant to participant in the AIS process to make sure it contains the required features. In addition, knowing how to use the AIS technology would be very beneficial in working effectively and efficiently. For example, a financial analyst would need to know how to store the data and access it, and how to present the information. Finally, as an auditor, one of their main interests in the AIS is the reliability of the data. Without reliability, auditors cannot “provide an opinion on the effectiveness and efficiency on internal controls” (Brazel 38). Accountants will remain the main users and as a user, an auditor as well.
With the seven characteristics in mind, could they have evolved from the past? With technology not being as easily accessible as in today’s accounting world, one can assume that information was not as relevant, reliable, timely, or accessible. In relation, modern technology is so efficient in today’s world; therefore the flow of information can be quickly exchanged at any time. For example, Internet has allowed companies to send reports across the globe at any given time. This ability gives accountants easy access to information and timely information. Without timely information, relevant and reliable information would be impossible. However, one possible disadvantage in today’s accounting world may be the relevance of the data. With such easy access to information, it can be more difficult to narrow down that information to its essence. Having too much information can make AIS more difficult to understand and increase uncertainty. Without being able to understand the AIS, an accountant cannot verify the same information. All these characteristics come hand in hand; if one characteristic fails then other characteristics will be affected.
Although today’s accounting world has greatly shifted from the past, one cannot deny that the accounting community has always had a major impact in generating the characteristics of useful information. Older accounting communities created the building blocks of the characteristics. Technology merely enhanced the flow of information and efficiency. Accounts will remain the designer, user, and auditors of the AIS.

Similar Documents

Premium Essay

Characteristics of Management Information System

...MANAGEMENT INFORMATION SYSTEM An effective management information system (MIS) assembles data available from company operations, external inputs and past activities into information that shows what the company has achieved in key areas of interest, and what is required for further progress. The purpose of a MIS is to help executives of an organization make decisions that advance the organization's goals. The most important characteristics of an MIS are those that give decision-makers confidence that their actions will have the desired consequences. To function effectively as an interacting, interrelated, and interdependent feedback tool for management and staff, MIS must be "useable." The five elements of a useable MIS system are: * Timeliness * Accuracy * Consistency * Completeness * Relevance The usefulness of MIS is hindered whenever one or more of these elements are compromised. Timeliness: To simplify prompt decision making, an institution's MIS should be capable of providing and distributing current information to appropriate users. Information systems should be designed to expedite reporting of information. The system should be able to quickly collect and edit data, summarize results, and be able to adjust and correct errors promptly. Information must be on time for the purpose for which it is required. Information received too late will be irrelevant. For example, if you receive a brochure from a theatre and notice...

Words: 647 - Pages: 3

Premium Essay

Logistics Information System

...Logistics Information System (LO-LIS) Release 4.6C HELP.LOLIS Logistics Information System (LO-LIS) SAP AG Copyright © Copyright 2001 SAP AG. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP AG. The information contained herein may be changed without prior notice. Some software products marketed by SAP AG and its distributors contain proprietary software components of other software vendors. Microsoft , WINDOWS , NT , EXCEL , Word , PowerPoint and SQL Server are registered trademarks of Microsoft Corporation. IBM , DB2 , OS/2 , DB2/6000 , Parallel Sysplex , MVS/ESA , RS/6000 , AIX , S/390 , ® ® ® AS/400 , OS/390 , and OS/400 are registered trademarks of IBM Corporation. ORACLE is a registered trademark of ORACLE Corporation. INFORMIX -OnLine for SAP and Informix Dynamic Server Informix Software Incorporated. ® ® ® ® ® ® TM ® ® ® ® ® ® ® ® ® ® ® ® ® ® ® ® ® are registered trademarks of UNIX , X/Open , OSF/1 , and Motif are registered trademarks of the Open Group. HTML, DHTML, XML, XHTML are trademarks or registered trademarks of W3C , World Wide Web Consortium, Massachusetts Institute of Technology. JAVA is a registered trademark of Sun Microsystems, Inc. JAVASCRIPT is a registered trademark of Sun Microsystems, Inc., used under license for technology invented and implemented by Netscape. SAP, SAP Logo, R/2, RIVA, R/3, ABAP, SAP ArchiveLink, SAP Business...

Words: 51862 - Pages: 208

Premium Essay

Expanded Cia Triangle

...2013 Information in IT security is a valuable resource and asset. The value of the information from the characteristics it possesses cause appreciation or depreciation for the user of the information, In IT security there is seven characteristics for information to be considered valuable and secure. The expanded C.I.A triangle was created to explain those characteristics in more detail. The seven characteristics for the triangle are Availability, Accuracy, Authenticity, Confidentiality, Integrity, Utility, and Possession. Availability Availability is a characteristic of making information accessible to person or computer system without interference or obstruction, as well as receiving the information in a required format. A good example of using availability is going to an ATM to deposit or with draw money. The ATM is available to all users that can verify that they have an account that contains enough funds to complete a transaction. The machine is made available with the use of magnetic card that has the user’s account information stored on it. When it comes to a computer or similar device availability to information mainly made is thru the use of user log-ins with a password. Accuracy Accuracy is a characteristic of information when it is free from mistakes or errors and it has the value that the end user expects. If information is modified intentionally or unintentionally, it is no longer accurate. An example of this is an expense report. The information contained...

Words: 921 - Pages: 4

Premium Essay

Invasive Biometric Characteristics

...involves confirmation or rejection of a person's claimed identity based on specific characteristics. Biometric characteristics can be roughly broken up into two categories i.e. Invasive and Non-Invasive Invasive Biometric Characteristics Invasive biometric identification requires the subject to perform an action in order to be authenticated. Some of the invasive biometric characteristics are as follows, • Iris Recognition • Fingerprint Recognition • Hand Geometry Recognition • Palm Print Recognition • DNA Identification • Signature...

Words: 787 - Pages: 4

Free Essay

Hotel Paris

...San Diego User assistance by situational, task- and model-based process information filtering in interactive, semi-automated human-automation systems Marcel Langer and Dirk S¨ ffker o Chair of Dynamics and Control University of Duisburg-Essen Duisburg, Germany Email: {marcel.langer; soeffker}@uni-due.de Abstract operators representing (human or technical) actions. Tasks are described by defining final situations that need to be reached and process information are fused to a situation vector representing the actual state of the entire system. Suitable information is identified by comparison of differences in future situations and used for the detection of valuable information with respect to the defined (sub)task. The hierarchical task analysis [4] of a semi-automated molding process using No-Bake-Technique is additional discussed as an illustrative application example that is completely mapped into the SOM-framework. Furthermore, the results of a user study of selected functionality of the developed process guiding and supervision assistance system are presented. Nowadays, the integration of users into technical systems becomes necessary due to reasons of automation concepts that are not capable of completely integrating process knowledge and manufacturing skills for full automation of technical processes. In such interactive, semi-automated systems human operators are facing a high amount of process information that need to be evaluated according to individual skills and knowledge...

Words: 5143 - Pages: 21

Free Essay

How to Write Literature Review

...Literature Review of Information Technology Adoption Models at Firm Level Tiago Oliveira and Maria Fraga Martins ISEGI, Universidade Nova de Lisboa, Lisbon, Portugal toliveira@isegi.unl.pt mrfom@isegi.unl.pt Abstract: Today, information technology (IT) is universally regarded as an essential tool in enhancing the competitiveness of the economy of a country. There is consensus that IT has significant effects on the productivity of firms. These effects will only be realized if, and when, IT are widely spread and used. It is essential to understand the determinants of IT adoption. Consequently it is necessary to know the theoretical models. There are few reviews in the literature about the comparison of IT adoption models at the individual level, and to the best of our knowledge there are even fewer at the firm level. This review will fill this gap. In this study, we review theories for adoption models at the firm level used in information systems literature and discuss two prominent models: diffusion on innovation (DOI) theory, and the technology, organization, and environment (TOE) framework. The DOI found that individual characteristics, internal characteristics of organizational structure, and external characteristics of the organization are important antecedents to organizational innovativeness. The TOE framework identifies three aspects of an enterprise's context that influence the process by which it adopts and implements a technological innovation: technological...

Words: 5760 - Pages: 24

Premium Essay

Biometrics

...classification system, since: a) Criminals could easily change their names, and attempts to try different systems (by age, criminal method) end up in failure. Bertillion, son of Lui Bertillion – president of the Anthropological society, came up with an idea to utilize anthropological parameters (height, length and volume of the head, length of the hands, fingers, etc.) to identify personality. This was a break-through in criminalistics. With the development of electronics, Bertillioon’s theory was recalled and scientists realized that human beings have numerous unique characteristics beginning from the iris of the eye to the fingerprints and all these characteristics can be used in personality identification. With the rapid development of computer technologies, the concept of information security is becoming more and more important. Crime scene investigators have been using behavioral and physical characteristics for centuries in order to identify the criminals, nowadays; we have a great need for identification and authorization in information security. Information Security is being understood as a protection of the information and informational infrastructure from the impacts, which could potentially end up in damage, loss of the information or informational infrastructure. Information Security deals with the provision of information confidentiality, information integrity and availability. It’s obvious that the weakest place in provision of information security is...

Words: 1934 - Pages: 8

Premium Essay

Role of Ias

...ensuring a high quality, principles-based international financial reporting system The primary objective of financial reporting as set out in the IASB’s Conceptual Framework is to provide financial information to existing and potential investors, lenders and other creditors in making decisions about providing resources to the entity; to enable efficiency of operation of capital markets and To ensure investors’ and lenders’ confidence and trust. High quality financial reporting appears when companies are having good internal financial accounting and reporting systems with sound internal controls to start with; methods of accounting (through accounting standards) to deal with specific items and transactions based on sound underpinning principles and concepts included in the Conceptual Framework; and finally a high quality audit with its own standards and ethical requirements. The qualitative characteristics describe the nature of the information provided. Fundamental characteristics are necessary for financial information to be useful, in other words it must be relevant and faithfully represent what it purports to represent. The usefulness of financial information is enhanced if it is comparable, verifiable, timely and understandable. The two fundamental characteristics involve: Relevance Relevant financial information is capable of making a difference in the decisions made by users. Information may be capable of making a difference in a decision even if some users choose...

Words: 2040 - Pages: 9

Premium Essay

Knowledge Management Systems Case Study

...Management System According to Lin and Tseng (2005) defined Knowledge Management System is rapid development of the internet and information technology pushed the world into the era of a new economy. Damodaran and Olphert (2000, as cited in Li, Liu and Liu, 2016) explained that Knowledge Management Systems are information systems that are perceived as facilitating organizational learning by capturing important content and process ‘knowledge’ and making it available to employees as necessary. Alavi and Leidner (2001) well-defined that Knowledge Management System is an information system that is specifically developed to facilitate the processes of creating, storing, retrieving, transferring, and applying organizational knowledge. Dimitrijevic (2014, as cited in El Said, 2015) simplified that Knowledge Management System is a system for applying and using knowledge management principles throughout a process to create, transfer, and apply knowledge in organizations. From organizational point of view, Kanjanabootra, Corbitt and Nicholls (2013) highlighted that...

Words: 1118 - Pages: 5

Premium Essay

Ilovelift

...Management Information System ◄ Previous activity กระดานข่าว Lesson Plan Introduction to MIS L1 H1: Handwritten A4 Papers L2 Jump to... . You are here Home / ► 140-151_IT1-MIS / ► Assignments / ► H2: Handwritten A4 Papers . Separate groups: Section 1 Q: What are the major features of a business that are important for understanding the role of information systems? • Define a business and describe the major business functions. • Define business processes and describe the role they play in organizations. • Identify and describe the different levels in a business firm and their information needs. • Explain why environments are important for understanding a business. Q: How do information systems support the major business functions: sales and marketing, manufacturing and production, finance and accounting, and human resources? • List and describe the information systems serving each of the major functional areas of a business. Q: How do systems serve the various levels of management in a business and how are these systems related? • Describe the characteristics of transaction processing systems (TPS) and role they play in a business. • Describe the characteristics of MIS and explain how MIS differ from TPS and from DSS. • Describe the characteristics of DSS and explain how DSS differ from ESS. • Describe the relationship between TPS, MIS, DSS, and ESS. Q: How do enterprise...

Words: 352 - Pages: 2

Premium Essay

Information Security and Technology

...in a system or protection mechanism that opens it to attack or damage. Exposure is the condition or state of being exposed. 3. What are the three components of the CIA triangle? What are they used for? The three components of the CIA triangle are confidentiality, integrity, and availability. Confidentiality is used to protect information from disclosure or exposure to unauthorized individuals or systems. Integrity is when information is a whole, complete, and uncorrupted. Availability is used to enable authorized users to access information without interference and to receive it in the required format. 4. Describe the critical characteristics of information. How are they used in the study of computer security? The critical characteristics of information is the value of information it possesses. If a characteristic change, the value of information also changes. There are seven critical characteristics which are: Availability - enable authorized users to access information without interference or obstruction and receives it in the required format. Accuracy - information that is free from errors and it has the value that the end user expects Authenticity - quality or state of being genuine or original, not a reproduction or fabrication. Information is authentic when it is in the same state in which it was created, placed, stored, or transferred. Confidentiality - information that is protected from disclosure or exposure to unauthorized individuals or systems. It ensures...

Words: 422 - Pages: 2

Premium Essay

Database Theory

...Chapter 1 Database Systems Discussion Focus How often have your students heard that “you have only one chance to make a good first impression?” That’s why it’s so important to sell the importance of databases and the desirability of good database design during the first class session. Start by showing your students that they interact with databases on a daily basis. For example, how many of them have bought anything using a credit card during the past day, week, month, or year? None of those transactions would be possible without a database. How many have shipped a document or a package via an overnight service or via certified or registered mail? How many have checked course catalogs and class schedules online? And surely all of your students registered for your class? Did anybody use a web search engine to look for – and find – information about almost anything? This point is easy to make: Databases are important because we depend on their existence to perform countless transactions and to provide information. If you are teaching in a classroom equipped with computers, give some “live” performances. For example, you can use the web to look up a few insurance quotes or compare car prices and models. Incidentally, this is a good place to make the very important distinction between data and information. In short, spend some time discussing the points made in Section 1.1, “Data vs. Information.” After demonstrating that modern daily life is almost inconceivable...

Words: 4647 - Pages: 19

Premium Essay

Biometric

...What is Biometric Authentication Technology? * Biometric Technology is the field of automated methods of recognition and identification of a person’s physical or behavioral characteristics. * Examples of some physical characteristics include hand, finger, face, iris, and veins. The most commonly used biometric of these examples are faces. * Some examples of behavioral characteristics include voice recognition, signature, walking style, and so on. Behavioral characteristics uses are single traits that are learned. Behavioral characteristics have many limitations such as noise, inter-class similarities, and so on that leads to “False Acceptance Rate” and or “False Rejection Rate”. How is Biometric Authentication Technology used in technology? * Biometric authentication requires comparing a registered biometric sample against a newly captured sample, such as a fingerprint for a lock code. Once the sample is captured for verification, it is then processed by a computer, and stored for later comparison. * This process can be used to track identification or to simply verify a computer account, username, login, credit cards, internet banking, lunch programs, and now days, vehicles. The biometric replaces the password, or keys that we once used to access our personal belongings. * Here is the process of how biometric authentication is used in technology. You have the enrollment process of capturing the sample that could be a fingerprint or your face, once...

Words: 694 - Pages: 3

Premium Essay

Kudler Fine Foods Week 2

...industry specific software. We will go into detail on how to improve the tracking of the inventory to help reduce spoilage and better rotation of products. This will also review and bring together the accounts payable and receivable systems as well as payroll to the inventory system. The suggested system will bring together the inventory into the accounts payable and receivable processes currently in use. We will also explain the need to recreate Kudler’s inventory database because at this current time the system does not inform the company the quantity and the cost for each item that they have in their inventory. Decision and Rationale Kudler Fine Foods needs to update their current out of date accounting system. The current accounting system has four modules, including General Ledger Module, Accounts Payable Module, Accounts Receivable Module, POS Module, and Bank Reconciliation Module. Kudler currently uses an ERP known as Retail Enterprise Management System (REMS). The ideal situation would be to use this current system to its fullest capacity by purchasing additional software for necessary advancements. The REMS system has several modules currently not fully used by Kudler. Each module should interact with each other making the system a solid fit by reducing errors, increasing efficiency, and streamlining duties. After considering the options, the decision was made that the recommended course of action for Kudler Fine Foods is to purchase retail industry-specific...

Words: 868 - Pages: 4

Free Essay

Cpa Requirements

...Association (PARCA). All rights reserved. All rights reserved. This publication is protected by copyright. No part may be reproduced in any form or by any means, including photocopying, or utilized by any information storage and retrieval system without permission of the copyright owner. All rights reserved PARCA V 3.5 Page 1 PARCA CPAS2014 Requirements Certified PACS Associate (CPAS) requirements This document contains the detailed requirements for the certification of a CPAS2014 or Certified PACS Associate. The focus is on general technical and clinical understanding. CPAS2014 is an update to the original CPAS requirements published in 2005 to include new technologies and developments. The requirements are split up in two sections: A) Technical (IT) and B) Clinical. A. Technical (IT) requirements 1. Computer basics (20%) 1.1 Hardware: A computer has hardware components, i.e. CPU, memory, Disk, removable media, display card and display and data entry devices (aka peripherals) such as keyboard and mouse and others. There are several standard interfaces, such as serial and parallel ports, FireWire and several choices of disk and network interfaces. – Know how to distinguish between these components and interfaces and the function and characteristics of each of them. 1.2 CPU and Memory: The CPU and memory determine to a high degree the performance of the computer. – Know impact of the number of parallel processors, their speed and I/O path width...

Words: 2505 - Pages: 11