IT(information technology)
Accounting Information System(AIS)
Coding
Sequence - a list of transactions where we do not want duplicates and gaps in sequential numbers
Block- anytime a block of numbers are used to group similar items( 100-199 refers to assets, 200-299 refers to liabilities)
Group - different groups of numbers have different meanings, like a phone number(first numbers refer to area code, second group refers to specific number)
Chart of accounts
-allows the business to customize classification of data in the ways that best meet the information requirements of the business
Batch Procesing
Online Real-Time processing(OLRT)
Query
Centralization processing enviroments
Reports
Periodic reports - produced routinely on a periodic basis Exception Reports - produced when a specific condition or exception occurs(i.e customer who's credit balance is greater than the credit limit) Demand Reports(aka pull report) - user has to pull report from the system or software, tell the system you want/demand a report on something Ad-hoc report - one that does not currently exist but can be created on demand without the need of a software developer. Creating a custom report that the software does not already have.
More Reports
Push Reports - if a report window displays up-to-date reports every time an end user logs into a computer network, system automatically pushes current report to person, system generated but not scheduled
Dashboard Report - present summary information report that aids management action. More visual for quick reference
XBRL report - XBRL tags DEFINE the data. For example, tags could indicate the taxonomy used(GAAP or IFRS) the currency, the time period, as well as the definition of the element.
- A macro could be written that would pull tagged information from financial statements(like current assets or current liabilities) and then calculate the current ratio for you.
Categories of business information systems
Transaction Processing Systems(TPS) - process and record the routine daily transactions necessary to conduct a business
Management Information Systems(MIS) - provides users predefined reports that support effective business decisions, helping with daily or monthly decisions
Decision Support Systems(DSS) - an extension of MIS that provides interactive tools to support decision making. More specific than MIS. i.e tells you how much inventory you should order for example by using more advanced tools
Executive Information Systems(EIS) - senior executives with immediate and easy access to internal and external information to assist in STRATEGIC decision making i.e long term
Systems Development Life Cycle(SDLC)
Prototyping Model
Alternative to SDLC, an approximation of a final system is built and tested and reworked as necessary until final system is complete
Steps in System Development
A DITTO
Participants in Business Process Desgin
Management - providing support and encouragement for development projects, clear signal that user needs are met
Accountants - plays 3 different roles :
Information Systems Steering Committee - plan and oversee the information systems function and make sure the system moves in the right direction and “gets done”
Project Development Team - responsible for the successful design and implementation of the business system
External parties - may need to seek their input
IT Control Objectives (memorize)
COBIT - framework that provides a set of measures, indicators, processes and best practices to maximize the benefit of information technology
1) Business Objectives - might include effective decision support, efficient transaction processing, compliance with reporting requirements
2) Governance Objectives - IT governance: strategic alliance, value delivery(promises made by the organization to meet certain needs of users), Resource Management, Risk Management, Performance Measurement
*3)Information Criteria: ICE RACE I - Integrity C -Confidentiality E - Efficiency R - Reliability A- Availability C- Compliance E- Effectiveness
4) IT Resources
*5) Domains and processes of COBIT PO AIDS ME PO - plan and organize AI - acquire and implement DS - deliver and support ME - monitor and evaluate
Role of technology systems in monitoring controls
1.General Controls - ensure and organizations control environment is stable and well maintained overall
Application Controls - prevent, detect, and correct Transaction error and fraud and are more specific
file labels: external labels are readable by humans, internal labels are readable by computers
4,5,6. Zero footing, system double checks before erasing something, user does reconciliation to make sure information correct
Segregation of Duties IT
System analyst - a) internally developed system - determines system requirements, designs overall system, and determines what type of network will be needed
b) purchased system - integrate with existing internal and purchased applications, and provide training to end users
Computer programmer - a) Application programmer/ Software developer(engineer) - responsible for writing and/or maintaining application programs
b) System programmer - responsible for installing, supporting, monitoring and maintaining the operating system. May also support capacity planning functions
Computer Operator - schedule and run the processing jobs, can be automated(no need for person)
File Librarian - store and protect programs and tapes from damage and unauthorized use(mostly automated nowadays)
Data Librarian - custody of and maintains the entity’s data and ensures it is only released to those who are authorized
Security Administrator - responsible for the assignment of initial passwords and the rules for maintaining them
System Administrator a) Database administrator - responsible for maintaining and supporting the database software, and performing certain security functions. DIfferent from data librarian works on OVERALL DATABASE and librarian works on specific data in database.
b) Network administrator - support computer networks
c) web administrator - responsible for company website
Data Input Clerk - prepare, verify and input data to be processed
Hardware Technician - sets up hardware and troubleshoots hardware problems
End user - workers in an organization who enter data into a system or use the information processed by it
Son-father-grandfather concept
Mirroring - backup every transaction on a separate computer
UPS
Uninterrupted Power Supply - backup generator battery
Data Encryption
Digital Certificates - an electronic document created by a trusted party that which certifies the identity the owners of a particular public key
PKI’s( public key infrastructure) mange these keys
Passwords
Policies
Program Level Policy - mission statement of IT security
Program Framework Policy - the IT security strategy
E-commerce vs. E-business
E-commerce - the specific electronic completion of an exchange of buying and selling
E-business - more general and broad refers to any business done through an electronic form