Free Essay

Accounting Information System

In:

Submitted By faridman
Words 4849
Pages 20
ACCOUNTING INFORMATION SYSTEMS
PBL REPORT TASK 4
“INTERNAL CONTROL ANALYSIS 1”

Required:
Explain how the principle of separation of duties is violated in each the following situations. Also suggest one or more procedure to reduce risk, and exposure highlighted in each of example.

Solving Problems: a. A payroll clerk recorded 40-hour workweek for an employee who had quit the previous week. He then prepared a paycheck for this employee, forged her signature, and cashed the check.
Violation:
The payroll clerk only have an authority to prepare the paycheck, not to signature or cashed the checks. The signature of payroll is the duty of HR manager, while cashed the paychecks is the duties of the cashier, so, the payroll clerk has violated his/her job description and his/her authorities.
Solution:
In this case, we must make know job description and authorities to the clerk. Because the duty of clerk on this case is only record the activities happen. If all the job done by the clerk, the clerk can make a manipulation or some fraud for example, that the clerk issue a check but the check is not for the employee but for the clerk. So we must have someone to control the clerk and cut it out when some mistake happen. And to solve this case we can also order someone to be the HR manager to make this case more secure from fraud. And for cashed the check we can give that job to cashier. After separate this duty and authorities we can minimize the risk.

b. While opening the mail, cashier set aside, and subsequently cashed, two checks payable to the company on account.
Violation:
In this case, I think the problem, is why the cashier opened the mail? I think this is clerk job. The cashier job is only spend the money. So we must make a new job description for the cashier and the clerk.
Solution:
So we can make solve this case by, first we must separate the cashier and clerk job. Make new job description for them. The cashier job is only spend the money if there is check payable. But for checking the mail is still the job of clerk. Then before the check is transform to cash, still must have permission from finance manager so there will be more responsibility in activities. c. A cashier prepared a fictious invoice from a company using his brother-in law’s name. He sent an electronic payment for the invoice to his brother in law.

Violation:
Cashier is not have a right to make an invoice, the invoice must be prepared by A/P staff, and the cashier can not make a payment before they got the assignment from the finance manager, there is no clear job description in this problem.
Solution:
So in this case, we must make a clear job description. But before that, we must know there is a big fraud that cashier do. She make fictious invoice. To make clear this, we must give punishment to the cashier so they won’t be do that anymore. After we clear that problem now we can make a new design of issue a invoice. Invoice only can issue if already have a permission from the finance manager, or other manager. Because invoice can be responsible if there will be mistake in someday. d. An employee of finishing department walked off with several parts from the store room and recorded the items as having been issued to the assembly department.
Violation:
The problem is errorness of the employee. Because he walked off with several parts in the store room. In this case we must make a new design of storing inventory.
Solution:
So with this case we must give the new design for storing inventory. Employee must be complete move the inventory from assembly department to finishing department. There must be no miss inventory that still in the store room. It must all move on. After that the employee is must be given a practice so there will be no more mistake like this again in the future.

e. A cashier cashed a check from a customer in payment of an account receivable, pocketed the cash, and conceal the theft by properly posting the receipt to the customer account in the accounts receivable ledger.
Violation:
This is a fraud problem. The cashier has violated the ethics of work with do this. This problem probably can happen because of the weak internal control, there’s no tight controlling in cash receiving, so the cashier can do this.
Solution:
This is a big trouble for company. So for the first things we do is we must give a punishment to the cashier and give a warning for other problem in the future. After the problem is clear we must have a new regulation for cashier so there will be no more action like this anymore. And manager must do more action to control every activities of the cashier.

Task 5 (Discussion Task)
“Internal Control Analysis 2”

Main Problem
‘The errors and fraud conditions in management at Covington, Inc’.

Analyze Problem * What causes of the errors and fraud conditions? * How to determine or detect the errors and fraud of the condition? * How to prevent or control to be implemented that would correct the condition?

Learning objective * Identify the exposures to risk that a firm’s faces with respect to assets and data, including those involving fraud * Describe security measures that pertain to physical non-computer resources * Discuss security measures for data and information * Identify controls, security, and audit measures that pertain particularly to computer networks

Solution 1. Daily bank deposit do not always correspond with the cash receipt a. Possible cause of the condition * Errors may appear in input data called human errors, such as names or number. Maybe, when the clerical and operational employees-who process transactional data and have access to assets, enter the daily bank deposit, the names or number is not suitable. These errors may often occur on an occasional and random basis, like a clerk accidentally cross out the wrong key on a terminal keyboard. So, the erroneous data will damage the accuracy and reliability of a files and outputs. It means that, the daily bank deposit cannot appropriate with the cash receipt. * Deliberate errors or fraud. These irregularities may appear in input data (daily bank deposit), during processing, or in generated outputs (cash receipt). In short, a clerk may increase or decrease the amount on the cash receipt.

b. The action to be taken and/or controls to be implemented * One of things that the manager should pay more attention and more concerning to the security design system that are able to protect any kind of datam especially bank deposit and cash receipt. Manager can put some special access that only the employee who has authorization to the data information programs.

2. Bad check from customers usually are reviewed and approved by the same employee a. Possible cause of the condition * This is usually caused deliberate errors constitute fraud. Maybe there is no strict and clear regulation that can control the employee with their actual job desk. b. The action to be taken and/or controls to be implemented * In this fraud condition, internal audit staff must check first about the check received. Then, the manager should make a security to protect from the unauthorized data and information, as bad check from the customers. So it can be controlled and avoid from the fraud of the employee.

3. There are occupational discrepancies between physical inventory account and the perpetual inventory records. a. Possible cause of the condition * Unintentional losses of assets, assets (inventory) may be lost or misplaced by accident. It means that if newly received inventory maybe put the wrong warehouse bins, the pickers do not find it when filling orders and the data as well as the physical assets may be lost. So, it could be a difference between the physical inventory account and the perpetual inventory records. * Theft of assets, the inventory maybe stolen by outsiders, such as professional thieves who break into a storeroom or maybe stolen by the employee of the company. b. The action to be taken and/or controls to be implemented * For this problem, one part who should take a correction is the internal audit staff, control, check, and count it surely to the physical inventory in the storeroom. And the manager can increase the control such as security guards and motion detection alarms and so on to reduce the risk of exposure.

4. The auditor notice alteration to physical count and perpetual records.
The action to be taken and/or controls to be implemented * An amount control total, the total of the values in amount or quantity field * An hash total, the total of values in an identification field * A record count, the total number of source documents, hence transactions being processed in a batch

5. There is high percentage of customer refund and credits
The action to be taken and/or controls to be implemented this case show that the company doesn’t have a clear regulation that concern about refund, and it makes customer can refund whenever they want even it’s customer fault if the stuff that they buy is broken by themselves. As for credits, it looks like the company doesn’t give a clear terms of payment to the customer, so that the customer doesn’t pay their credits and the company doesn’t even try to tell them about it. For solving this problem , the company must concern in the making of a clear regulation and procedure, so it will reduce customer refunds and credits. If it happens for a long time, it’ll be hard for the company to get more profit

6. Many original documents are missing or lost. However, there are substitute copies of all missing originals. a. Possible cause of the condition * Breaches of security, unauthorized persons may gain access to firm’s document, like “hacker” may break into a firm’s computerized files via a distant terminal and take the document. * Act of violence and natural disasters, certain violent acts cause damage to the firm’s document and the natural disaster, such as hurricanes and floods may destroy the document, so it will be lost. b. The action to be taken and/or controls to be implemented * The manager should protect from unauthorized access to data and information by giving password to allow access to authorized users and to restrict each user to the data or information and programs. On the other hand, it must be a protection from natural disasters or environmentally controlled, such as constructing computer centre on high terrain that will minimize the threat of floods, computer facilities should be constructed of fireproof materials and should contain a fireproof vault to serve as the document. Then, the manager also should recovery and reconstruction of lost data.

7. An unexplained decrease in the gross profit percentage has occurred.
The action to be taken and/or controls to be implemented just like the situation number five, I think the amount of gross profit percentage of customer refund and credit. So, to fix this situation, I think we should fix the situation number five, so we can get the actual gross profit.

8. Many documents are not countersigned.
The action to be taken and/or controls to be implemented if the document are not countersigned, its means there’s no approval for the documents, so the company can’t make any operation regarding the document that are not countersigned. And from what I think there’s should be an error an authorization may appear as a signature and so on. And then the authorization are generally reflected through transaction documents so if there’s no any signature, it’s impossible to go to the next step because there’s no approval.
Hilmy Arya (023100081)

Task 5 (Discussion Task)
“Internal Control Analysis 2”

Main Problem : The errors and fraud conditions in management at Covington, Inc.
Analyze Problem : * What causes of the errors and fraud conditions? * How to determine or detect the errors and fraud of the condition? * How to prevent or control to be implemented that would correct the condition?

Learning objective : * Identify the exposures to risk that a firm’s faces with respect to assets and data, including those involving fraud * Describe security measures that pertain to physical non-computer resources * Discuss security measures for data and information * Identify controls, security, and audit measures that pertain particularly to computer networks

Solution
Daily bank deposit do not always correspond with the cash receipt b. Possible cause of the condition * Unintentional errors, errors may appear in input data called human errors, such as names or number. Maybe, when the clerical and operational employees-who process transactional data and have access to assets, enter the daily bank deposit, the names or number is not suitable. These errors may often occur on an occasional and random basis, like a clerk accidentally cross out the wrong key on a terminal keyboard. So, the erroneous data will damage the accuracy and reliability of a files and outputs. It means that, the daily bank deposit cannot appropriate with the cash receipt. * Deliberate errors or fraud. These irregularities may appear in input data (daily bank deposit), during processing, or in generated outputs (cash receipt). In short, a clerk may increase or decrease the amount on the cash receipt.

c. The action to be taken and/or controls to be implemented * The manager should design a security for data and information to combat fraud and irregularities provide protection from unauthorized access to data and information by giving password to allow access to authorized users and to restrict each user to the data or information and programs; protection from undetected access of data and information which is not correspond names, number and etc. So, it can reduce the risk from exposures.

Bad check from customers usually are reviewed and approved by the same employee c. Possible cause of the condition * Deliberate errors constitute fraud. In this condition, maybe there is a fraud between the employee and customers because the same employee wants to review and approve the check. So the employee may increase the amount on a check received from the customer or underfoot a column of cash receipt. d. The action to be taken and/or controls to be implemented * In this fraud condition, internal audit staff must check first about the check received. Then, the manager should make a security to protect from the unauthorized data and information, as bad check from the customers. So it can be controlled and avoid from the fraud of the employee.

There are occupational discrepancies between physical inventory account and the perpetual inventory records. c. Possible cause of the condition * Unintentional losses of assets, assets (inventory) may be lost or misplaced by accident. It means that if newly received inventory maybe put the wrong warehouse bins, the pickers do not find it when filling orders and the data as well as the physical assets may be lost. So, it could be a difference between the physical inventory account and the perpetual inventory records. * Theft of assets, the inventory maybe stolen by outsiders, such as professional thieves who break into a storeroom or maybe stolen by the employee of the company. d. The action to be taken and/or controls to be implemented * In this case, the internal audit staff should control, check, and count it first according to the physical inventory in the storeroom. After that, to keep the inventory save, the manager have to protect from unauthorized access known as access control includes security guards, fenced in area, burglar and fire exit alarms, motion detection alarms, locked doors, closed-circuit television monitors, safes, insurance coverage. Besides that, a complementary measure is close supervision of employees who handle the inventory.

The auditor notice alteration to physical count and perpetual records.
The action to be taken and/or controls to be implemented a. An amount control total, the total of the values in amount or quantity field b. An hash total, the total of values in an identification field c. A record count, the total number of source documents, hence transactions being processed in a batch

There is high percentage of customer refund and credits
The action to be taken and/or controls to be implemented this case show that the company doesn’t have a clear regulation that concern about refund, and it makes customer can refund whenever they want even it’s customer fault if the stuff that they buy is broken by themselves. As for credits, it looks like the company doesn’t give a clear terms of payment to the customer, so that the customer doesn’t pay their credits and the company doesn’t even try to tell them about it. For solving this problem , the company must concern in the making of a clear regulation and procedure, so it will reduce customer refunds and credits. If it happens for a long time, it’ll be hard for the company to get more profit

Many original documents are missing or lost. However, there are substitute copies of all missing originals. c. Possible cause of the condition * Breaches of security, unauthorized persons may gain access to firm’s document, like “hacker” may break into a firm’s computerized files via a distant terminal and take the document. * Act of violence and natural disasters, certain violent acts cause damage to the firm’s document and the natural disaster, such as hurricanes and floods may destroy the document, so it will be lost. d. The action to be taken and/or controls to be implemented * The manager should protect from unauthorized access to data and information by giving password to allow access to authorized users and to restrict each user to the data or information and programs. On the other hand, it must be a protection from natural disasters or environmentally controlled, such as constructing computer centre on high terrain that will minimize the threat of floods, computer facilities should be constructed of fireproof materials and should contain a fireproof vault to serve as the document. Then, the manager also should recovery and reconstruction of lost data.

An unexplained decrease in the gross profit percentage has occurred.
The action to be taken and/or controls to be implemented just like the situation number five, I think the amount of gross profit percentage of customer refund and credit. So, to fix this situation, I think we should fix the situation number five, so we can get the actual gross profit.

Many documents are not countersigned.
The action to be taken and/or controls to be implemented if the document are not countersigned, its means there’s no approval for the documents, so the company can’t make any operation regarding the document that are not countersigned. And from what I think there’s should be an error an authorization may appear as a signature and so on. And then the authorization are generally reflected through transaction documents so if there’s no any signature, it’s impossible to go to the next step because there’s no approval.
M.Azhar.y
023100073
“Internal Control Analysis 2”
Task 5 : discussion task
Main Problem : The errors and fraud conditions in management at Covington, Inc.
Analyze Problem :
What causes of the errors and fraud conditions?
How to determine or detect the errors and fraud of the condition?
How to prevent or control to be implemented that would correct the condition?
Learning objective :
Identify the exposures to risk that a firm’s faces with respect to assets and data, including those involving fraud
Describe security measures that pertain to physical non-computer resources
Discuss security measures for data and information
Identify controls, security, and audit measures that pertain particularly to computer networks

Solution
Daily bank deposit do not always correspond with the cash receipt
Possible cause of the condition
Unintentional errors, errors may appear in input data called human errors, such as names or number. Maybe, when the clerical and operational employees-who process transactional data and have access to assets, enter the daily bank deposit, the names or number is not suitable. These errors may often occur on an occasional and random basis, like a clerk accidentally cross out the wrong key on a terminal keyboard. So, the erroneous data will damage the accuracy and reliability of a files and outputs. It means that, the daily bank deposit cannot appropriate with the cash receipt.
Deliberate errors or fraud. These irregularities may appear in input data (daily bank deposit), during processing, or in generated outputs (cash receipt). In short, a clerk may increase or decrease the amount on the cash receipt.

The action to be taken and/or controls to be implemented
The manager should design a security for data and information to combat fraud and irregularities provide protection from unauthorized access to data and information by giving password to allow access to authorized users and to restrict each user to the data or information and programs; protection from undetected access of data and information which is not correspond names, number and etc. So, it can reduce the risk from exposures.
Bad check from customers usually are reviewed and approved by the same employee
Possible cause of the condition
Deliberate errors constitute fraud. In this condition, maybe there is a fraud between the employee and customers because the same employee wants to review and approve the check. So the employee may increase the amount on a check received from the customer or underfoot a column of cash receipt.
The action to be taken and/or controls to be implemented
In this fraud condition, internal audit staff must check first about the check received. Then, the manager should make a security to protect from the unauthorized data and information, as bad check from the customers. So it can be controlled and avoid from the fraud of the employee.
There are occupational discrepancies between physical inventory account and the perpetual inventory records.
Possible cause of the condition
Unintentional losses of assets, assets (inventory) may be lost or misplaced by accident. It means that if newly received inventory maybe put the wrong warehouse bins, the pickers do not find it when filling orders and the data as well as the physical assets may be lost. So, it could be a difference between the physical inventory account and the perpetual inventory records.
Theft of assets, the inventory maybe stolen by outsiders, such as professional thieves who break into a storeroom or maybe stolen by the employee of the company.
The action to be taken and/or controls to be implemented
In this case, the internal audit staff should control, check, and count it first according to the physical inventory in the storeroom. After that, to keep the inventory save, the manager have to protect from unauthorized access known as access control includes security guards, fenced in area, burglar and fire exit alarms, motion detection alarms, locked doors, closed-circuit television monitors, safes, insurance coverage. Besides that, a complementary measure is close supervision of employees who handle the inventory.
The auditor notice alteration to physical count and perpetual records.
The action to be taken and/or controls to be implemented
An amount control total, the total of the values in amount or quantity field
An hash total, the total of values in an identification field
A record count, the total number of source documents, hence transactions being processed in a batch
There is high percentage of customer refund and credits
The action to be taken and/or controls to be implemented this case show that the company doesn’t have a clear regulation that concern about refund, and it makes customer can refund whenever they want even it’s customer fault if the stuff that they buy is broken by themselves. As for credits, it looks like the company doesn’t give a clear terms of payment to the customer, so that the customer doesn’t pay their credits and the company doesn’t even try to tell them about it. For solving this problem , the company must concern in the making of a clear regulation and procedure, so it will reduce customer refunds and credits. If it happens for a long time, it’ll be hard for the company to get more profit

Many original documents are missing or lost. However, there are substitute copies of all missing originals.
Possible cause of the condition
Breaches of security, unauthorized persons may gain access to firm’s document, like “hacker” may break into a firm’s computerized files via a distant terminal and take the document.
Act of violence and natural disasters, certain violent acts cause damage to the firm’s document and the natural disaster, such as hurricanes and floods may destroy the document, so it will be lost.
The action to be taken and/or controls to be implemented
The manager should protect from unauthorized access to data and information by giving password to allow access to authorized users and to restrict each user to the data or information and programs. On the other hand, it must be a protection from natural disasters or environmentally controlled, such as constructing computer centre on high terrain that will minimize the threat of floods, computer facilities should be constructed of fireproof materials and should contain a fireproof vault to serve as the document. Then, the manager also should recovery and reconstruction of lost data.
An unexplained decrease in the gross profit percentage has occurred.
The action to be taken and/or controls to be implemented just like the situation number five, I think the amount of gross profit percentage of customer refund and credit. So, to fix this situation, I think we should fix the situation number five, so we can get the actual gross profit.
Many documents are not countersigned.
The action to be taken and/or controls to be implemented if the document are not countersigned, its means there’s no approval for the documents, so the company can’t make any operation regarding the document that are not countersigned. And from what I think there’s should be an error an authorization may appear as a signature and so on. And then the authorization are generally reflected through transaction documents so if there’s no any signature, it’s impossible to go to the next step because there’s no approval.
Task 5 (Discussion Task)
Internal Control Analysis 2
Main Problem : The errors and fraud conditions in management at Covington, Inc.
Analyze Problem : * What causes of the errors and fraud conditions? * How to determine or detect the errors and fraud of the condition? * How to prevent or control to be implemented that would correct the condition?

Learning objective : * Identify the exposures to risk that a firm’s faces with respect to assets and data, including those involving fraud * Describe security measures that pertain to physical non-computer resources * Discuss security measures for data and information * Identify controls, security, and audit measures that pertain particularly to computer networks

Solution 9. Daily bank deposit do not always correspond with the cash receipt c. Possible cause of the condition * Unintentional errors, errors may appear in input data called human errors, such as names or number. Maybe, when the clerical and operational employees-who process transactional data and have access to assets, enter the daily bank deposit, the names or number is not suitable. These errors may often occur on an occasional and random basis, like a clerk accidentally cross out the wrong key on a terminal keyboard. So, the erroneous data will damage the accuracy and reliability of a files and outputs. It means that, the daily bank deposit cannot appropriate with the cash receipt. * Deliberate errors or fraud. These irregularities may appear in input data (daily bank deposit), during processing, or in generated outputs (cash receipt). In short, a clerk may increase or decrease the amount on the cash receipt. d. The action to be taken and/or controls to be implemented * The internal audit staff should design a security for data and information to combat fraud and irregularities provide protection from unauthorized access to data and information by giving password to allow access to authorized users and to restrict each user to the data or information and programs; protection from undetected access of data and information which is not correspond names, number and etc. So, it can reduce the risk from exposures.

10. Bad check from customers usually are reviewed and approved by the same employee e. Possible cause of the condition * Deliberate errors constitute fraud. In this condition, maybe there is a fraud between the employee and customers because the same employee wants to review and approve the check. So the employee may increase the amount on a check received from the customer or underfoot a column of cash receipt. f. The action to be taken and/or controls to be implemented * In this fraud condition, internal audit staff must check first about the check received. Then, they should make a security to protect from the unauthorized data and information, as bad check from the customers. So it can be controlled and avoid from the fraud of the employee.

Similar Documents

Premium Essay

Accounting Information Systems

...Accounting Information Systems; Riordan Manufacturing Accounting Information Systems; Riordan Manufacturing Looking at the company’s information page, you can observe almost anything that goes on within the company. With the shire size of a global company such as this one, you know that they have to use a lot of different systems just to remain profitable. Their web site states that “Riordan Manufacturing is a global plastics manufacturer employing 550 people with projected annual earnings of $46 million. The company is wholly owned by Riordan Industries, a Fortune 1000 enterprise with revenues in excess of $1 billion. Its products include plastic beverage containers produced at its plant in Albany, Georgia, custom plastic parts produced at its plant in Pontiac, Michigan, and plastic fan parts produced at its facilities in Hangzhou, China”. From that information you can see that there are locations in San Jose, California, Albany, Georgia, Pontiac, Michigan, and Hangzhou, China. That many different locations require the company to use a comprehensive system just so they can communicate with each other, this is needed mostly to make sure each location is doing what it needs to, but also to keep productivity companywide at its peak. Looking at it that way there’s a need to upgrade the systems as business evolves, but the decision needs to be made at the appropriate time. The first system they have in place is called HRIS, the company profile describes the system as keeping...

Words: 1493 - Pages: 6

Premium Essay

Accounting Information System

...Polytechnic University of the Philippines Sta. Mesa, Manila College of Accountancy and Finance CHAPTER 1: ACCOUNTING INFORMATION SYSTEMS AND THE ACCOUNTANT Submitted By: Angeles, Jireh Nesamiel L. Carullo, Shery Lyn A. Gutierrez, Joe Mar C. Monforte, Roselyn G. Reyes, Edward Angelo A. BSA 3-9 Submittes To: Prof. Leandro Cruz Fua WHAT’S NEW IN ACCOUNTING INFORMATION SYSTEMS? Cloud Computing—Impact for Accountants According to Ron Gill, cloud computing is a way of using business applications over the Internet—such as the way you use the Internet for your bank transactions. Think of cloud computing as a way to increase IT capacity or add capabilities without investing in new infrastructure, training new people, or licensing new software. Mostly, we’re talking about a subscription-based or pay-per-use service that makes IT’s existing capabilities scalable whenever the need exists. Estimates suggest that the fast-growing cloud computing industry will reach $42 billion by 2012. Cloud computing resources may be categorized as data storage, infrastructure and platform, or application software (i.e., business applications such as purchases, HR, sales, etc.). If a firm would like to take advantage of cloud computing, it would most likely need to subscribe to all three of these categories from the service provider. For example, business applications depend on company data that is stored in the database, and data storage depends on the appropriate infrastructure...

Words: 2839 - Pages: 12

Premium Essay

Accounting Information Systems

... |Accounting Information Systems I | Copyright © 2009, 2007, 2005, 2004, 2003, 2001 by University of Phoenix. All rights reserved. Course Description This course is designed to provide accounting students with the proper mix of technical information and real-world applications. Areas of study include fundamental concepts and technologies (what computers can do for business), the Internet, intranets, electronic commerce, information systems development, basic project management principles, decision support systems, and the benefits of computer and human synergy. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Bagranoff, N. A., Simkin, M. G., & Strand, C. S. (2008). Core concepts of accounting information...

Words: 3264 - Pages: 14

Premium Essay

Accounting Information System

...HI5019 Strategic Information Systems for Business and Enterpise (T1, 2013) Assignment (20% of Final Mark) The assignment has two parts namely Part A (20 marks) & B (20 marks). Part A will require you to answer four (4) questions. Part B will involve two (2) cases selected form you textbook, Accounting Information Systems 8th edition by James A. Hall. The assignment aims to develop an understanding of Accounting Information Systems structure and their use in the business setting. The task is to answer questions relating to transaction processing, ethics, fraud and internal control. This assignment itself includes several assignments, each of which comprises a part of the students’ task. However, it is well encouraged to include any additional information that students may think will be useful in completing the task. General Rules and Requirements: Reports must be confined to 3,000 words (+/- 5%). As a minimum, a title page, table of contents page (based on your report headings), introduction, conclusion and references should be included. Font type should be Arial (size 11), paragraph spacing should be 1.5. Note: Any  additional  material  from  external  sources  that  you  “copy and paste”  into  your  report  is   NOT included in the word limit. Also, ensure it is appropriately referenced. PART A (20 marks) 1. How does SOX affect the provision of attest and advisory services? (5 marks) 2. Compare and contrast the relative advantages and disadvantages of sequential, block,...

Words: 450 - Pages: 2

Free Essay

Accounting Information System

...TUGAS AKHIR SISTEM INFORMASI AKUNTANSI   Dosen : Haryono, Drs., M.Com.       Disusun Oleh :   Amanda Pratiwi S. 13/347120/EK/19389   Shilvy Candra 13/347602/EK/19402   Siti Fauziah 13/347050/EK/19385   Yuniana Rizki R. 13/347074/EK/19388     Fakultas Ekonomika dan Bisnis   Universitas Gadjah Mada   Yogyakarta PENDAHULUAN Profil Perusahaan Sumber : Google Platinum Internet Café merupakan sebuah perusahaan yang bergerak di bidang jasa internet dan juga café yang berdiri pada bulan Juli tahun 2009. Karakteristik bisnisnya lebih kepada konsep café internet untuk tempat berkumpul dan mengerjakan tugas. Jasa dan produk yang ditawarkan di sini antara lain persewaan komputer dan internet, percetakan (foto dan kertas), scanning, burning, pulsa, serta café. Jasa yang paling utama adalah persewaan komputer dan internet. Kantor pusat perusahaan terletak di daerah Gelagah Sari dan mempunyai empat cabang dengan nama yang berbeda. Alamat : Jalan Kaliurang Km 5,5 Sleman ,Yogyakarta 55281 Twitter : @platinum_jakal Facebook : Platinum Internet Café Struktur Organisasi Direktur       Manajer  Umum   Manajer   Operasional   Kepala   gudang   café   Kapten   café   Manajer   Keuangan   Manajer   Teknis   Kasir   Café     Wakil   Manajer   Operator   Staf   multimedia   Teknisi   khusus...

Words: 1740 - Pages: 7

Premium Essay

Accounting Information System

...HI5019 Strategic Information Systems for Business and Enterpise (T1, 2013) Assignment (20% of Final Mark) The assignment has two parts namely Part A (20 marks) & B (20 marks). Part A will require you to answer four (4) questions. Part B will involve two (2) cases selected form you textbook, Accounting Information Systems 8th edition by James A. Hall. The assignment aims to develop an understanding of Accounting Information Systems structure and their use in the business setting. The task is to answer questions relating to transaction processing, ethics, fraud and internal control. This assignment itself includes several assignments, each of which comprises a part of the students’ task. However, it is well encouraged to include any additional information that students may think will be useful in completing the task. General Rules and Requirements: Reports must be confined to 3,000 words (+/- 5%). As a minimum, a title page, table of contents page (based on your report headings), introduction, conclusion and references should be included. Font type should be Arial (size 11), paragraph spacing should be 1.5. Note: Any additional material from external sources that you “copy and paste” into your report is NOT included in the word limit. Also, ensure it is appropriately referenced. PART A (20 marks) 1. How does SOX affect the provision of attest and advisory services? (5 marks) 2. Compare and contrast the relative advantages and disadvantages of sequential, block, group, alphabetic...

Words: 450 - Pages: 2

Premium Essay

Accounting Information Systems

...Chapter One As accounting students we have studied a variety of accounting areas involving financial and taxes. The accounting information course appears to be a course that heads in a different direction then what we as students have become accustomed to. Speaking for myself I have always been drawn to the accounting field because it is a black and white area. In other words, there it is organized and has right and wrong answers, this leaving out the gray areas between right and wrong. Accounting information systems appears to be throwing us into a whole new area of the study of accounting. The fine line between right and wrong is becoming smudged into a gray area. With accounting information system we are being thrown into an area that is now unfamiliar to what we have come to know as right or wrong. This accounting information system is designed to help us think outside of the box by providing unstructured problems that will increase our ability to develop professional judgment, our confidence in our ability, and use more critical thinking. The conceptual framework was developed in the late 1970’s by the FASB to be used as a guide for accounting principles. The conceptual framework is set up as a pyramid that has three levels. The top level provides the objective of financial reporting: provide information to decision makers, the second or middle level is divided into two parts, one part is aimed at the elements of financial statements and the second part is geared towards...

Words: 7237 - Pages: 29

Free Essay

Accounting Information System

...AIS. Many should be familiar to you, and many were part of our modern accounting scenarios. Let’s briefly discuss each element, with special emphasis on how the accountant is affected. Later in the chapter, we provide a roadmap showing you where each component is covered in this textbook. Before beginning, let us tell you two things. First, the study of AIS, is our broad view, while the accounting information system itself, is our narrow view of an AIS. Second, you shouldn’t assign any meaning to the placements of the elements in figure 1.1. The figure just tells you that there are ten elements. 1. Business Operations: An AIS operates in concert with business operations. Many AIS inputs are prepared by operating departments, the action or work centers of the organization; and many AIS outputs are used to manage these operations. Therefore, we must analyze and manage an AIS in light of the work being performed by the organization. For example, to advise his management and to prepare reports for management decision making, a management accountant must understand his organization’s business. In our scenarios, Jill had to understand corporate takeovers to prepare the relevant analysis. 2. Transaction Processing: An organization Processes Transactions, such as sales and purchase; these Transactions mirror and monitor and business operations. these Transactions have operational, management information system(MIS), and AIS aspects. To design and use the MIS and the AIS, an accountant...

Words: 1475 - Pages: 6

Premium Essay

Accounting Information Systems

...……………………………………………………………………………………….3 Critical aspects of Accounting Information Systems………………………………….................3 People…………………………………………………………………………………….3 Procedure and Process Analysis…………………………………………………………4 Data Analysis…………………………………………………………………………….4 Decision Analysis………………………………………………………………………..4 Design…………………………………………………………………………………….5 Importance of Safeguarding Information ………………………………………………………..6 Network Security………………………. ……………………………………………………….6 Advantages of Accounting Information Systems..……………………………………................7 Disadvantages of Accounting Information Systems……………………………………………..7 Conclusion………………………………………..………………………………………………8 References ……………………………………………………………………………………….9 Introduction The Accounting information systems network is an interactive human interface that enables organizations to make key business decisions. These decisions include strategies, goals and cost saving procedures. Companies must increasingly rely on evolving technology to help manage this data. Technology serves the Accounting information systems as a whole to help an organization and top management make informative decisions. The design of the technology in such a way that it accommodates each critical aspect of the organization - people, procedure and processes analysis, data analysis, decision analysis, and design - is paramount. This paper will look at accounting information system from a macro point of view and discuss...

Words: 1633 - Pages: 7

Free Essay

Accounting Information System

...AC2206A1 Lecturer’s Name : Mr. Marius Benedict Date of Submission : 18th December 2014 TABLE OF CONTENTS | | Pages | Introduction | 3 | Systems Planning | 4 | Context Data Flow Diagram | 8 | Intermediate Data Flow DiagramSystems AnalysisSystems Evaluation And Design Strategies | 910 | * Access | | Purchasing Ready-Made Software Packages | | Outsourcing Contract | | Input Design | | Output Design | | Conclusion | | ACKNOWLEDGEMENT We would like to express our deepest appreciation to all those who provided us the possibility to complete this assignment.  A special gratitude we give to our lecturer for Accounting in information subject, Mr. Marius Benedict, whose contribution in inspiring suggestions, encouragement and helped us to organize our problem based learning. Special thanks to our parents and families for all the support and prays to complete this assignment on time. Last but not least, full of thanks to all our classmates whose are willing to help us out with their abilities. INTRODUCTION Every business or organization needs to evaluate their design operation in order to catch with the current technology. If they did not aware with that, they are facing several problems that may affect their business’s goal especially in gaining the profit. In this case, Hattan is a final year accounting student at UiTM...

Words: 1250 - Pages: 5

Premium Essay

Accounting Information Systems

...Business ACC/542 Version 3 Accounting Information Systems | Copyright © 2012, 2009, 2007 by University of Phoenix. All rights reserved. Course Description In this course, students examine the fundamentals of accounting systems design. Topics include business information systems, business processes and data flows, database concepts and tools, internal control and risks, auditing the information system, and using the information system to perform audit functions. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: University policies: You must be logged into the student website to view this document. Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality.   Course Materials   Bagranoff, N. A., Simkin, M. G., & Strand Norman, C. (2008). Core concepts of accounting information systems (10th ed.). New York, NY: Wiley.   Hunton, J. E., Bryant, S. M., & Bagranoff, N. A. (2004). Core concepts of information technology auditing. Hoboken, NJ: Wiley.   O’Brien, J. A. & Marakas, G. M. (2008). Management information systems (8th ed.). Boston, MA: McGraw-Hill...

Words: 2104 - Pages: 9

Premium Essay

Accounting Information Systems

...Chapter 1 ACCOUNTING INFORMATION SYSTEMS: AN OVERVIEW TEACHING TIPS This chapter provides general coverage of many of the text's major themes. It's usually a good idea to indicate how the topics covered in this chapter will be covered in more detail later in the course. Many instructors will not assign any problem from the end of this chapter. This can be done without any loss of overall continuity in the course. If the course will emphasize internal controls, it might be desirable to cover in class one of the general cases on internal control from the back of Chapters 4, 7, or 8. This should be done to stimulate student interest, but the instructor should not worry if the students in the course fail to analyze the case correctly. In some ways, teaching systems can be more difficult than teaching other areas. In many cases there are no clear-cut debits and credits to be made, and judgment is often required. This can make some students feel uncomfortable. So it's usually good to emphasize this at the beginning of the course to properly set students' expectations. The point should also be made that systems are an important area of professional examinations. One of the biggest risks in teaching systems is that it can easily become dry and boring. I have found that the best way to overcome this is to generate as much class discussion as possible on many of the major points in the chapter. Accordingly, I always make class participation about one-fourth of the total...

Words: 4907 - Pages: 20

Premium Essay

Accounting Information System Requirements

...Accounting Information System Requirements XACC/210 The requirements for developing an accounting information system are not unlike the design of an IT system. There are specific steps to adhere to in order to have a successful outcome. 1. Planning and investigation- It is important to determine what is required by each individual company in order to be successful. A company cannot skip this step and jump into a new system. The outcome would surely fail. 2. Analysis- It is important to take a broader view of current systems to determine what is working and what parts of the system need to change in order to be successful. 3. Design- After step one and two have been achieved, designing the new accounting system is the next logical step in order to realize the company vision. 4. Implementation, maintenance, and follow-up- Next, the company will try the new system out, make the necessary adjustments as time goes by, and ensure that things are working as they were designed to work. The accountant’s role in this process is to advise the company what elements are needed to have an accounting system that will allow them to effectively bring the needed information to the company that is needs in order to maintain a profitable business. They know what type of programs that are effective for general accounting purposes, spreadsheets etc. This knowledge and advice an accountant gives is a vital part of the planning and investigation an organization needs to...

Words: 261 - Pages: 2

Premium Essay

Impact of Information Technology on Accounting Systems

...[1] ICPA, “Review and Resume”, Accounting Terminology Bulletin no. 1, (1953), par 9. [2] N. Conn, “Objectives of Financial Reporting by Business Enterprises”, Statement of Financial Accounting Concepts no. 1, (1978), par 9. [3] W. Ballada and S. Ballada, “Basic Accounting”, DomDane Publishing, (2011), pp. 20, 88-90. [4] Information Technology, http://en.wikipedia.org/wiki/Information_technology, (Accessed 2013). [5] M. Ghasemi, V. Shafeiepour, M. Aslani and E. Barvayeh, “The Impact of Information Technology (IT) on Modern Accounting”, Procedia - Social and Behavioral Sciences, vol. 28, (2011), pp. 112–116. [6] http://www.e-conomic.co.uk/accountingsystem/glossary/accounting-system, (Accessed 2013). [7] K. I. Dandago and A. S. Rufai, “Information Technology and Accounting Information System in the Nigerian Banking Industry”, Asian Economic and Financial Review, vol. 4, no. 5, (2013) June, pp.655-670. [8] J. Moscove, P. Sinkin and P. Bagranoff, “A Theory of Interdependent Demand for a Communication Service. Bell Journal of Economics, vol. 5, no.1, (1999), pp. 283-292. [9] J. Hall, Accounting Information System, (2008), pp. 11-28, ISBN-10: 0324560893, ISBN-13: 9780324560893. [10] S. Shanker, “How is Information Technology Used in Accounting?”, Chron Small Business Demand Media, (2013). [11] M. Amidu, et al., “E-Accounting Practices among Small and Medium Enterprises in Ghana”, Journal of Management Policy and Practice, vol. 12, no.4, (2011), p. 152. [12] Cost-Benefit...

Words: 346 - Pages: 2

Premium Essay

Information Systems and Accounting Research

...Guido L. Geerts, author of “A Design Science Research Methodology and Its Application to Accounting Information Systems Research,” asserts most of research currently conducted in the accounting information systems (AIS) and information systems (IS) areas focuses on understanding why things work the way they do, also known as “natural science (Geerts, 2011).” The primary goal of the paper was to introduce the design science research methodology (DSRM) into accounting information systems (AIS) literature by discussing the DSRM, applying the DSRM to different AIS design science papers, and then integrating the DSRM as part of the operational AIS literature (Geerts, 2011). “Currently, integration is increasingly needed in the business environment. This need emerges from the efficiency and synergy requirements necessary in a complex and turbulent environment. In other words, integration is needed to facilitate coordination, which is again related to the building of competitive advantage.” (Granlund & Malmi, 2002, p. 305). Detail Geerts’ introduction gives definitions and history of the concept of DSRM and AIS so that the reader may transition along with the article. There is discussion of each methodology giving the history and the science behind it and then he moves into how the application of DSRM was discussed in the AIS area. According to Geerts the DSRM has three objectives and aims at improving the production, presentation, and evaluation of design science research...

Words: 611 - Pages: 3