Professional Documents
Culture Documents
Ringkasan SIA
Ringkasan SIA
1.The use of information in decision making Factors Influencing Design of the AIS
2.The nature, design, use and implementation of an AIS
3.Financial information reporting
Why Study AIS?
To understand how the accounting system works.
How to collect data about an organization’s activities and
transactions
How to transform that data into information that
management can use to run the organization
How to ensure the availability, reliability, and accuracy of
that information
Auditors need to understand the systems that are used to The Value Chain
produce a company’s financial statements.
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1552
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1553
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
Strategic planningis concerned with establishing In manual systems, this information is provided in the
organizational objectives and policies for accomplishing form of reports that fall into two main categories:
thoseobjectives. –financial statements
–managerial reports
Information Technology and Corporate Strategy
New developments in IT affect the design of an AIS. 3 To provide adequate internal controls:
Develop a basic understanding of :
–corporate strategies. Ensure that the information produced by the system is
–how IT developments can be used to implement existing reliable.
organizational strategies. Ensure that business activities are performed efficiently
–how IT developments can be used to create an and in accordance with management’s objectives.
opportunity to modify existing strategies. Safeguard organizational assets.
Because an AIS functions within an organization, it should Basic Subsystems in the AIS
be designed to reflect the values of that organizational
culture.
Strategy and Strategic Positions
Two Basic Strategies
To be a lower-cost producer than competitors
To differentiate products and services from
competitors
Three Basic Strategic Positions
Variety-based strategic position
Need-based strategic position
Access-based strategic position
What role does the AIS play in helping organizations 1.The revenue cycle: involves activities of selling goods or
adopt and maintain a strategic position? services and collecting payment for those sales.
–Data collection about each activity 2.The expenditure cycle: involves activities of buying and
–Transforming data into information that can be used by paying for goods or services used by the organization.
management to coordinate those activities 3.The human resources/payroll cycle:involves activities of
hiring and paying employees.
What is the Value of Information? 4.The production cycle:involves activities converting raw
The value of information is the benefit produced by the materials and labor into finished goods.
information minus the cost of producing it. 5.The financing cycle:involves activities of obtaining
necessary funds to run the organization, repay creditors,
The Role of the AIS and distribute profits to investors.
The Internet makes strategy more important than ever.
Enterprise resource planning (ERP) systems integrate all The Data Processing Cycle
aspects of a company’s operations with its traditional AIS. The data processing cycle consists of four steps:
The key feature of ERP systems is the integration of 1.Data input
financial data and other nonfinancial operating data. 2.Data storage
3.Data processing
4.Information Output
CHAPTER 2
The trigger for data input is usually business activity. Data
OVERVIEW OF BUSINESS PROCESSES must be collected about:
1.Each event of interest
2.The resources affected by each event
3.The agents who participate in each event
The Three Basic Functions Performed by an AIS Data Processing Cycle: Data Input
1. To collect and store data about the organization’s Historically, most businesses used paper source
business activities and transactions efficiently and documentsto collect data and then transferred that data
effectively: into a computer. Today, most data are recorded directly
through data entry screens.Control over data collection is
Capture transaction data on source documents. improved by:
Record transaction data in journals, which present a
chronological record of what occurred. prenumbering each source document and using
Post data from journals to ledgers, which sort data by turnaround documents
account type. having the system automatically assign a sequential
number to each new transaction
2. To provide management with information useful for employing source data automation
decision making:
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1554
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1555
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
Providing Information for Decision Making firsthand glimpse of the types of problems that can arise
The second function of the AIS is to provide management from inadequate documentation?
with information useful for decision making. The –failure to bill for repair work
information an AIS provides falls into two main categories:
What is Segregation of Duties?
Financial Statements Segregation of duties refers to dividing responsibility for
Managerial Reports different portions of a transaction among several people.
What functions should be performed by different people?
Financial Statements –authorizing transactions
Prepare a trial balance. –recording transactions
Make adjusting entries. –maintaining custody of assets
Prepare the adjusted trial balance.
Produce the income statement. CHAPTER 3
Make closing entries.
Produce the balance sheet.
Prepare the statement of cash flows. INTRODUCTION TO E-BUSINESS
Managerial Reports
The AIS must also be able to provide managers with
detailed operational information about the organization’s Introduction: E-Business
performance. Two important types of managerial E-business refers to all uses of advances in information
reports are : technology (IT), particularly networking and
– budget communications technology, to improve the ways in which
– performance reports an organization performs all of its business processes.
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1557
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
contracting organization accesses the software via the guarantee that e-business processes satisfy the three key
Internet. characteristics of any business transaction
Financial Electronic Data Interchange (FEDI) Validity
Integrity
Privacy
Encryption
There are two principal types of encryption systems:
Single-key systems: Same key is used to encrypt and
decrypt the message
•Simple, fast, and efficient
•Example: the Data Encryption Standard (DES)
algorithm
Public KeyInfrastructure (PKI): Uses two keys:
Factors to Consider When Evaluating ASPs •Public key is publicly available and usually used to
encode message
•Private key is kept secret and known only by the
owner of that pair of keys. Usually used to decode
message
Advantages & Disadvantages of PKI
Advantages
No sharing of key necessary
More secure than single-key systems
Disadvantages
Much slower than single-key systems
Digital Signatures and Digests
Digital signature: An electronic message that uniquely
Factors to Include in Service Level Agreements identifies the sender of that message.
Detailed specification of expected ASP performance
Uptime Digest: The message that is used to create a digital
Frequency of backups signature or digital summary.
Use of encryption
Data access controls If any individual character in the original document
Remedies for failure of ASP to meet contracted service changes, the value of the digest also changes. This ensures
levels that the contents of a business document have not been
Ownership of data stored at ASP altered or garbled during transmission
Outbound Logistics Digital Certificates & Certificate Authorities
E-Business can improve the efficiency and effectiveness of Digital Certificate: Used to verify the identity of the public
sellers’ outbound logistical activities. key’s owner.
Timely and accurate access to detailed shipment A digital certificate identifies the owner of a particular
information. private key and the corresponding public key, and the time
Inventory optimization. period during which the certificate is valid.
For goods and services that can be digitized, the
outbound logistics function can be performed entirely Digital certificates are issued by a reliable third party,
electronically. called a Certificate Authority, such as:
Sales and Marketing Verisign
Companies can create electronic catalogs to Entrust
automate sales order entry. Digital Signature Trust
Significantly reduce staffing needs.
Customization of advertisements The certificate authority’s digital signature is also included
on the digital certificate so that the validity of the
Post-Sale Support and Service certificate can also be verified.
Consistent information to customers.
Provide answers to frequently asked questions (FAQs). Types of Networks
The global networks used by many companies to conduct
E-Business Success Factors electronic commerce and to manage internal operations
The degree to which e-business activities fit and support consist of two components:
the organization’s overall business strategy. The ability to
1. Private portion owned or leased by the company
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1558
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
Communications Software
Communications software manages the flow of data across
a network. It performs the following functions:
–access control
–network management
–data and file transmission
Companies build a virtual private network (VPN) to –error detection and control
improve reliability and security, while still taking advantage –data security
of the Internet.
Communications Channels
Data Communications System Components A communications channel is the medium that connects
There are five basic components in any data the sender and the receiver.
communication network (whether it is the Internet, a LAN, –standard telephone lines
a WAN, or a VAN): –coaxial cables
–fiber optics
1.The sending device –microwave systems
2.The communications interface device –communications satellites
3.The communications channel –cellular radios and telephones
4.The receiving device
5.Communication software Communications Channels
Data Communications System Components
The following are components of the data communications
model:
–interface devices
–communications software
–communications channel
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1559
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
CHAPTER 4
In a LAN configured as a ring, each node is directly linked
to two other nodes
RELATIONAL DATABASES
Types of Files
Two basic types of files are used to store data.
1. The master file, which is conceptually similar to a ledger
in a manual system.
2. The transaction file, which is conceptually similar to a
In a LAN configured as a bus, each device is connected to journal in a manual system.
the main channel, or bus. Communication control is
decentralized on bus networks File Approach
For many years, companies created new files and programs
each time an information need arose. This proliferation of
master files created problems:
1. Often the same data was stored in two or more separate
files.
2. The specific data values stored in the different files were
not always consistent.
File-Oriented Approach
Wide area networks (WANs) can be configured in one of
three basic ways:
1. Centralized system
2. Decentralized system
3. Distributed data processing
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1560
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1562
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1563
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1564
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
Entity-Relationship Diagram
An Entity-Relationship (E-R) diagram is one method for
portraying a database schema. It is called an E-R diagram
because it shows the various entitiesbeing modeled and
the important relationshipsamong them. In an E-R
diagram, entities appear as rectangles, and relationships
between entities are represented as diamonds.
Implementing an REA Diagram in a Relational Database
An REA diagram can be used to design a well-structured
relational database. A well-structured relational database
is one that is not subject to update, insert, and delete
anomaly problems.
Implementing an REA diagram in a relational database is a
three-step process:
1.Create a table for each distinct entityand for each many-
to many relationship
2.Assign attributes to appropriate tables
3.Use foreign keys to implement one-to-one and one-to-
many relationships
Create Tables
From the previously discussed REA diagram, nine tables
would be created: one for each of the seven entities and
one for each of the many-to-many relationships.
1.Inventory
2.Purchases
3.Employees
4.Vendors
5.Cashier
6.Cash disbursements
7.Cash
8.Purchases-inventory
9.Purchases-cash disbursements
Implement One-to-One and One-to-Many Relationships
Assign Attributesfor Each Table One-to-One Relationships: In a relational database, one-to-
Primary keys: Usually, the primary key of a table one relationships between entities can be implemented by
representing an entity is a single attribute. including the primary key of one entity as a foreign key in
the table representing the other entity.
Other Attributes: Additional attributes are included in each
table to satisfy transaction processing requirements. No examples of 1:1 relationships in the sample diagram
Sample E-R Diagram based on REA One-to-Many Relationships: In a relational database, one-
to-many relationships can be also implemented in relation
to databases by means of foreign keys. The primary key of
the entity with the maximum cardinality of N becomes a
foreign key in the entity with a maximum cardinality of 1
Examples: Employee number and vendor number are
foreign keys in the purchases event and in the cash
disbursement event
Documentation of Business Practices
REA diagrams are especially useful for documenting an
advanced AIS built using databases. REA diagrams provide
information about the organization’s business practices.
The zero minimum for the sales event indicates that credit
sales are made . The N maximum for the sales event means
that customers may make installment payments
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1565
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
CHAPTER 6
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1566
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
Transformation processes
Appear as circles
Represent the transformation of data
Data stores
Appear as two horizontal lines
Represent a temporary or permanent repository of data
Data dictionary:
Data flows and data stores are typically collections of data
elements. EXAMPLE: A data flow labeled student
informationmight contain elements such as student name,
date of birth, ID number, address, phone number, and
major.
The data dictionary contains a description of all data
elements, data stores, and data flows in a system.
Subdividing the DFD:
Few systems can be fully diagrammed on one sheet of
paper, and users have needs for differing levels of detail.
Consequently, DFDs are subdivided into successively
lower levels to provide increasing amounts of detail.
The highest level of DFD is called a context diagram.
It provides a summary-level view of the system.
It depicts a data processing system and the external
entities that are:
•Sources of its input
•Destinations of its output
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1567
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1568
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
Some data inputs and outputs will not appear on the first Unnecessarily complex document flows
level of the DFD but appear as the processes are exploded Procedures that cause wasteful delays
into greater levels of detail.
The data flow diagram focuses on the logical flow of data.
FLOWCHARTS
A flowchart is an analytical technique that describes some
aspect of an information system in a clear, concise, and
logical manner. Flowcharts use a set of standard symbols
to depict processing procedures and the flow of data.
Flowcharting History:
–Introduced in 1950s by industrial engineers to document
business processes and document flows for process
improvement.
–Sarbanes-Oxley 2002 increased importance by requiring
companies to document business processes and internal
controls procedures.
Every shape on a flowchart depicts a unique operation,
input, processing activity, or storage medium. In the days
of yore, flowcharts were manually created using plastic
templates. Most flowcharts are now drawn using a
software program such as Visio.
Microsoft and Power Point are also used.
The software uses pre-drawn shapes, and the developer
drags the shapes into the drawing.
There are four types of flowcharting symbols:
Input/output symbols
Input/output symbols indicate the type of device or media
that provides input to or records output from a process.
Processing symbols
Processing symbols indicate the type of device used to
process the data or whether the data is processed
manually.
Storage symbols
Storage symbols indicate the type of device used to store
data while the system is not using it.
Flow and miscellaneous symbols
Flow and miscellaneous symbols may indicate:
–The flow of data and goods
–The beginning or end of the flowchart
–The location of a decision
–An explanatory note
DOCUMENT FLOWCHARTS
A document flowchart shows the flow of documents and
information among areas of responsibility in an
organization. These flowcharts trace a document from
cradle to grave and show:
Where a document comes from
Where it’s distributed
How it’s used
It’s ultimate disposition
Everything that happens as it flows through the system
Internal control flowcharts are document flowcharts used
to evaluate the adequacy of internal controls, such as
segregation of duties or internal checks.They can reveal
weaknesses or inefficiencies such as:
Inadequate communication flows
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1569
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
–Displayed on a screen Now let’s change the story so that students enter
–Printed on paper enrollment data online. The registrar’s office sends a tape
–An input to the next process file of the enrollment data to the bursar’s office and
continues to send paper class lists to faculty.
PROGRAM FLOWCHARTS
Program flowcharts illustrate the sequence of logical
operations performed by a computer in executing a
program. hey also follow an input—process—output
pattern.
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1571
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
1. Control environment
Why are AIS Threats Increasing? 2. Control activities
Increasing numbers of client/server systems mean that 3. Risk assessment
information is available to an unprecedented number of 4. Information and communication
workers. Because LANs and client/server systems 5. Monitoring
distribute data to many users, they are harder to control
than centralized mainframe systems. WANs are giving Information Systems Auditand Control Foundation
customers and suppliers access to each other’s systems The Information Systems Audit and Control Foundation
and data, making confidentiality a concern. (ISACF) recently developed the Control Objectives for
Information and related Technology (COBIT). COBIT
Overview of Control Concepts consolidates standards from 36 different sources into a
What is the traditional definition of internal control? single framework. The framework addresses the issue of
Internal control is the plan of organization and the control from three vantage points, or dimensions:
methods a business uses to safeguard assets, provide
accurate and reliable information, promote and improve 1. Information: needs to conform to certain criteria that
operational efficiency, and encourage adherence to COBIT refers to as business requirements for information
prescribed managerial policies. 2. IT resources: people, application systems, technology,
facilities, and data
Overview of Control Concepts 3. IT processes: planning and organization, acquisition and
What is management control? implementation, delivery and support, and monitoring
Management control encompasses the following three
features: The Control Environment
1. It is an integral part of management responsibilities. The first component of COSO’s internal control model is
2. It is designed to reduce errors, irregularities, and achieve the control environment. The control environment consists
organizational goals. of many factors, including the following:
3. It is personnel-oriented and seeks to help employees 1. Commitment to integrity and ethical values
attain company goals. 2. Management’s philosophy and operating style
3. Organizational structure
4. The audit committee of the board of directors
5. Methods of assigning authority and responsibility
Internal Control Classifications 6. Human resources policies and practices
The specific control procedures used in the internal control 7. External influences
and management control systems may be classified using
the following four internal control classifications: Control Activities
The second component of COSO’s internal control model is
1. Preventive, detective, and corrective controls control activities. Generally, control procedures fall into
2. General and application controls one of five categories:
3. Administrative and accounting controls 1. Proper authorization of transactions and activities
4. Input, processing, and output controls 2. Segregation of duties
The Foreign Corrupt Practices Act 3. Design and use of adequate documents and records
4. Adequate safeguards of assets and records
Committee of Sponsoring Organizations (COSO) 5. Independent checks on performance
The Committee of Sponsoring Organizations (COSO) is a
private sector group consisting of five organizations: Proper Authorization of Transactions and Activities
1. American Accounting Association Authorizationis the empowerment management gives
2. American Institute of Certified Public Accountants employees to perform activities and make decisions.
3. Institute of Internal Auditors
4. Institute of Management Accountants Digital signatureor fingerprint is a means of signing a
5. Financial Executives Institute document with a piece of data that cannot be forged.
In 1992, COSO issued the results of a study to develop a Specific authorizationis the granting of authorization by
definition of internal controls and to provide guidance for management for certain activities or transactions.
evaluating internal control systems. The report has been
widely accepted as the authority on internal controls. Segregation of Duties
Good internal control demands that no single employee
The COSO study defines internal control as the process be given too much responsibility. An employee should not
implemented by the board of directors, management, and be in a position to perpetrate and conceal fraud or
those under their direction to provide reasonable unintentional errors.
assurance that control objectives are achieved with regard
to:
–effectiveness and efficiency of operations
–reliability of financial reporting
–compliance with applicable laws and regulations
COSO’s internal control model has five crucial
components:
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1572
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1573
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1574
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1575
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1576
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
Once they begin the fraud, it is very hard for them –theft of money by altering computer records or the theft
to stop. of computer time
They usually begin to rely on the extra income. –theft or destruction of computer hardware
–use or the conspiracy to use computer resources to
Perpetrators of computer fraud tend to be younger and commit a felony
possess more computer knowledge, experience, and skills. –intent to illegally obtain information or tangible property
Some computer fraud perpetrators are more motivated by through the use of computers
curiosity and the challenge of ―beating the system. Others
commit fraud to gain stature among others in the The Rise in Computer Fraud
computer community. Organizations that track computer fraud estimate that 80%
of U.S. businesses have been victimized by at least one
Three conditions are necessary for fraud to occur: incident of computer fraud.No one knows for sure exactly
1.A pressure or motive how much companies lose to computer fraud. Why?
2.An opportunity
3.A rationalization There is disagreement on what computer fraud is.
Many computer frauds go undetected, or unreported.
Pressures Most networkshave a low level of security.
What are some financial pressures? Many Internet pages give instructions on how to
–living beyond means perpetrate computer crimes.
–high personal debt Law enforcement is unable to keep up with fraud.
–inadequate‖ income
–poor credit ratings Computer Fraud Classifications
–heavy financial losses
–large gambling debts
What are some work-relatedpressures?
–low salary
–nonrecognition of performance
–job dissatisfaction
–fear of losing job
–overaggressive bonus plans
What are otherpressures?
–challenge
–family/peer pressure
–emotional instability Computer Fraud and Abuse Techniques
–need for power or control What are some of the more common techniques to
–excessive pride or ambition commit computer fraud?
– Cracking
Opportunities – Data diddling
An opportunity is the condition or situation that allows a – Data leakage
person to commit and conceal a dishonest act. – Denial of service attack
Opportunities often stem from a lack of internal controls. – Eavesdropping
However, the most prevalent opportunity for fraud results – E-mail forgery and threats
from a company’s failure to enforceits system of internal –Hacking
controls. –Internet misinformation and terrorism
Rationalizations –Logic time bomb
Most perpetrators have an excuse or a rationalization that –Masquerading or impersonation
allows them to justify their illegal behavior. –Password cracking
–Piggybacking
What are some rationalizations? –Round-down
The perpetratoris just ―borrowing‖ the stolen assets. –Salami technique
The perpetrator is not hurting a real person, just a –Software piracy
computer system. –Scavenging
No one will ever know. –Social engineering
–Superzapping
Computer Fraud –Trap door
The U.S. Department of Justice defines computer fraud as –Trojan horse
any illegal act for which knowledge of computer –Virus
technology is essential for its perpetration, investigation, –Worm
or prosecution.
Preventing and Detecting Computer Fraud
What are examples of computer fraud? What are some measures that can decrease the potential
–unauthorized use, access, modification, copying, and of fraud?
destruction of software or data 1. Make fraud less likely to occur.
Computer Fraud 2. Increase the difficulty of committing fraud.
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1577
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1578
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1579
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1580
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
–Observation of the preparation of off-site storage back-up Four basic business activities are performed in the revenue
facilities cycle:
–Reconciliation of master file totals with separately Sales order entry
maintained control totals Shipping
Billing
Some compensating controls: Cash collection
–Effective computer security controls
–Strong user controls SALES ORDER ENTRY
–Strong processing controls Sales order entry is performed by the sales order
department. The sales order department typically reports
Computer Software to the VP of Marketing.
A number of computer programs, called computer audit
software (CAS) or generalized audit software (GAS), have Steps in the sales order entry process include:
been written especially for auditors. CAS is a computer Take the customer’s order.
program that, based on the auditor’s specifications, Check the customer’s credit.
generates programs that perform the audit functions. Check inventory availability.
Respond to customer inquiries (may be done by
Usage of Computer Software customer service or sales order entry).
The auditor’s first step is to decide on audit objectives,
learn about the files to be audited, design the audit
reports, and determine how to produce them. This
information is recorded on specification sheets and
entered into the system via a data entry program. This
program creates specification records that the CAS uses to
produce one or more auditing programs. The auditing
programs process the sources files and perform the
auditing operations needed to produce the specified audit
reports.
General Functions of Computer Audit Software
–Reformatting
–File manipulation
–Calculation
–Data selection
–Data analysis
–File processing
–Statistics
–Report generation
Operational Audits of an AIS
The techniques and procedures used in operational audits
are similar to those of IS and financial audits. The basic
difference is that the IS audit scope is confined to internal
controls, whereas the financial audit scope is limited to IIS
output. The operational audit scope encompasses all Take customer orders
aspects of IS management. Operational audit objectives Order data are received on a sales order document which
include evaluating effectiveness, efficiency, and goal may be completed and received:
achievement. •In the store
•By mail
What are some evidence collection activities? •By phone
–Reviewing operating policies and documentation •On a Website
–Confirming procedures with management and operating •By a salesperson in the field
personnel
–Observing operating functions and activities The sales order (paper or electronic) indicates:
–Examining financial and operating plans and reports Item numbers ordered
–Testing the accuracy of operating information Quantities
–Testing controls Prices
Salesperson
REVENUE CYCLE BUSINESS ACTIVITIES How IT can improve efficiency and effectiveness:
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1581
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1582
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1583
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
–The source
–The destination
–Special shipping instructions
–Who pays for the shipping
The shipment is accompanied by:
The packing slip.
A copy of the bill of lading.
The freight bill.
•(Sometimes bill of lading doubles as freight bill).
What happens to other copies of the bill of lading?
One is kept in shipping to track and confirm delivery.
One is sent to billing to trigger an invoice.
One is retained by the freight carrier.
A major shipping decision is the choice of delivery
methods:
Some companies maintain a fleet of trucks.
Companies increasingly outsource to commercial carriers.
•Reduces costs.
•Allows company to focus on core business.
Selecting best carrier means collecting and monitoring
carrier performance data for:
•On-time delivery. Invoicing
•Condition of merchandise delivered. Accurate and timely billing is crucial. Billing is an
information processing activity that repackages and
Another decision relates to the location of distribution summarizes information from the sales order entry and
centers. Many customers want suppliers to deliver shipping activities. Requires information from:
products only when needed. Logistical software tools can Shipping Departmenton items and quantities shipped.
help identify optimal locations to: Saleson prices and other sales terms.
•Minimize amount of inventory carried.
•Meet customers’ needs. The basic document created is the sales invoice. The
•Also helps optimize the use of delivery vehicles on a day- invoice notifies the customer of:
to-day basis. The amount to be paid.
Where to send payment.
Globalization makes outbound logistics more complex:
Distribution methods differ around the worldin terms of Invoices may be sent/received:
efficiency and effectiveness. In paper form.
Country-specific taxes and regulations affect distribution By EDI.
choices. •Common for larger companies.
Logistical software can also help with these issues. •Faster and cheaper than snail mail.
Advanced communications systems can provide real-time
info on shipping status and thus add value: When buyer and seller have accurate online systems:
If you know a shipment will be late and notify the Invoicing process may be skipped.
customer, it helps the customer adapt. •Seller sends an email when goods are shipped.
•Buyer sends acknowledgment when goods are received.
BILLING •Buyer automatically remits payments within a specified
The third revenue cycle activity is billing customers. number of days after receiving the goods.
This activity involves two tasks: Can produce substantial cost savings.
Invoicing
Updating accounts receivable An integrated AIS may also merge the billing process with
sales and marketing by using data about a customer’s past
purchases to send information about related products and
services with his monthly statement.
Updating accounts receivable
The accounts receivable function reports to the controller.
This function performs two basic tasks:
Debits customer accounts for the amount the customer
is invoiced.
Credits customer accounts for the amount of customer
payments.
Two basic ways to maintain accounts receivable:
Open-invoice method
Balanceforward method
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1584
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1585
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
•Lockboxes may be regional, which reduces time in the In the revenue cycle (or any cycle), a well-designed AIS
mail. should provide adequate controls to ensure that the
•Checks are deposited immediately on receipt. following objectives are met:
•Foreign banks can be utilized for international customers.
All transactions are properly authorized.
Electronic boxes All recorded transactions are valid.
Upon receiving and scanning the checks, the bank All valid and authorized transactions are recorded.
immediately sends electronic notification to the company, All transactionsare recorded accurately.
including: Assets are safeguarded from loss or theft.
–Customer account number Business activities are performed efficiently and
–Amount remitted effectively.
The company is in compliance with all applicable laws and
Electronic funds transfer and bill payment regulations.
Customers remit payment electronically to the company’s All disclosure
s are full and fair.
bank.
•Eliminates mailing delays. All transactions are properly authorized.
•Typically done through banking system’s Automated A related threat would be that a transaction would go
Clearing House (ACH) network. through without proper authorization. •Such a transaction
might result from either a mistake or a fraud.
PROBLEM: Some banks do not have both EDI and EFT EXAMPLE: An employee might process an unauthorized
capabilities, which complicates the task of crediting the write-off of his own account, so that he wouldn’t have to
customer’s account on a timely basis. pay.
Financial Electronic Data Interchange (FEDI) All recorded transactions are valid
•Integrates EFT with EDI. The related threat is that a transaction would be recorded
•Remittance data and funds transfer instructions are sent that isn’t valid, i.e., it didn’t actually occur.
simultaneously by the customer. EXAMPLE 1: An employee records a return of merchandise
•Requires that both buyer and seller use EDI-capable on his own account when the goods were never really
banks. returned.
EXAMPLE 2: Many financial statement frauds involve
Accept credit cards or procurement cards from customers. companies recording totally fictitious revenues in order to
•Speeds collection because credit card issuer usually make the company’s financial position appear more
transfers funds within two days. favorable than it actually is.
•Typically costs 2–4% of gross sales price.
All valid and authorized transactions are recorded.
The related threat would be that a transaction that actually
did occur didn’t get recorded.
•EXAMPLE 1: An employee fails to record a sale that the
company made to him so he won’t have to pay the
receivable.
•EXAMPLE 2: In financial statement fraud cases, the
company often fails to record transactions that reduce
income or net assets, e.g., doesn’t record returns from
customers or discounts granted to them. This omission
causes net sales to appear higher than they really are.
All transactions are recorded accurately.
The threat would be that a transaction is recorded
inaccurately. Inaccurate recording typically means that a
transaction is recorded either:
–In the wrong amount
–In the wrong account
–In the wrong time period
•It could also mean that the transaction was credited to
the wrong agents or participants.
EXAMPLES: A fraud might involve a company:
–Over-recording the amount of a sale (wrong amount)
–Recording an unearned revenue as an earned revenue
(wrong account)
–Recording a sale earlier than it occurs (wrong time period)
–Crediting the wrong salesperson for the sale (wrong
agent)
The reverse side of these activities might include:
CONTROL OBJECTIVES, THREATS, AND PROCEDURES –Under-recording a sales return (wrong amount)
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1586
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
–Debiting an asset account instead of sales returns (wrong 4.THREAT 4: Stockouts, carrying costs, and markdowns
account) 5. THREAT 5: Shipping Errors
–Recording the return later than it actually occurred 6. THREAT 6: Theft of Inventory
(wrong time period) 7. THREAT 7: Failure to bill customers
8. THREAT 8: Billing errors
Assets are safeguarded from loss or theft. 9. THREAT 9: Errors in maintaining customer accounts
Threats in this area usually involve theft, destruction, or 10. THREAT 10: Theft of cash
misuse of assets, including data. 11. HREAT 11: Loss, alteration, or unauthorized disclosure
of 12. THREAT 12: Poor performance
Business activities are performed efficiently and
effectively. REVENUE CYCLE INFORMATION NEEDS
The threat is that the activities would be performed Information is needed for the following operational tasks
inefficiently or ineffectively. in the revenue cycle:
Responding to customer inquiries
The company is in compliance with all applicable laws and Deciding onextending credit to a customer
regulations. Determining inventory availability
The obvious threat is non-compliance with laws and Selecting merchandise delivery methods
regulations. An example in the revenue cycle could be a car
dealer who: Information is needed for the following strategic decisions:
–Sells a vehicle to which he doesn’t have clear title; or Setting prices for products/services
–Refuses to allow a customer to return a car in violation of Establishing policies on returns and warranties
state lemon laws. Deciding on credit terms
Determining short-term borrowing needs
Another example might be requesting a credit check on a Planning new marketing campaigns
customer in violation of the Fair Credit Reporting Act
(FCRA). The AIS needs to provide information to evaluate critical
revenue cycle processes:
All disclosures are full and fair. Response time to satisfactorily resolve customer inquiries
•The threat is incomplete and/or misleading disclosures. Time to fill and deliver orders
•This threat is more important in other areas, particularly Percentage of sales orders back ordered
those areas that involve liabilities and contingencies. Customer satisfaction rates and trends
•However, one threat in the revenue cycle could be Analyses of market share and sales trends
misleading disclosures about customers’ rights to return Profitability by product, customer, and region
product. Sales volume in dollars and market share
Effectiveness of advertising and promotions
There are several actions a company can take with respect Sales staff performance
to any cycle to reduce threats of errors or irregularities. Bad debtexpense
These include: Days receivables outstanding
Using simple, easy-to-complete documents with clear Remittances processed daily
instructions (enhances accuracy and reliability).
Using appropriate application controls, such as validity Both financial and non-financial information are needed to
checks and field checks (enhances accuracy and reliability). manage and evaluate revenue cycle activities.
Providing space on forms to record who completed and Likewise, both external and internal information is needed.
who reviewed the form (encourages proper authorizations
and accountability). When the AIS integrates information from the various
cycles, sources, and types, the reports that can be
Pre -numbering documents (encourages recording of valid generated are unlimited. They include reports on:
and only valid transactions). Sales order entry efficiency
Restricting accessto blank documents (reduces risk of Sales breakdowns by salesperson, region, product, etc.
unauthorized transaction). Profitability by territory, customer
, etc.
In the following sections, we’ll discuss the threats that may Frequency and size of backorders
arise in the four major steps of the revenue cycle, as well Slow-moving products
as the controls that can prevent those threats. Projected cash inflows and outflows (called a cash
budget)
THREATS IN SALES ORDER ENTRY Accounts receivable aging
The primary objectives of this process: Revenue margin (gross margin minus selling costs)
Accurately and efficiently process customer orders.
Ensure that all sales are legitimate and that the company Accountants should continually refine and improve an
gets paid for all sales. organization’s performance reports.
Minimize revenue loss arising from poor inventory
management. Revenue Cycle Data Model
The four major business events in the revenue cycle
Threats in the sales order entry process include: (orders, filling the orders, shipping [sales], and cash
1.THREAT 1: Incomplete or inaccurate customer orders collections)
2.THREAT 2: Sales to customers with poor credit The primary external agent (customer) as well as the
3.THREAT 3: Orders that are not legitimate various internal agents involved in revenue cycle activities
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1587
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1588
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1589
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1590
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
Why is there a many-to-many relationship between the MRP-II is an extension of materials resource planning that
order goods and receive goods events? seeks to match existing production capacity and raw
Vendors sometimesmake several separate deliveries to materials needs with forecasted sales demands.
fill one purchase order. The goal of JIT is to minimize inventories of raw materials,
Other times, vendors fill several purchase orders with one work in process, and finished goods.
delivery.
Sometimes, vendors make a delivery to fill a single Documents, forms and procedures:
purchase order in full. The master production schedule (MPS)specifies how
much of each product is to be produced during the
planning period and when that production should occur.
CHAPTER 13 A materials requisitionauthorizes removal of materials
from the storeroom to the factory.
THE PRODUCTION CYCLE Subsequent transfers of these materials are documented
on move tickets.
How can accountants be involved in planning and
Production Cycle Activities scheduling?
The production cycleis a recurring set of business activities –by ensuring that the AIS collects and reports costs in a
and related data processing operations associated with the manner consistent with the production planning
manufacturing of products. Accurate and timely cost techniques used by the company
accounting information is essential input to decisions –by helping to choose whether MRP-II or JIT is more
about: appropriate
•Product mix
•Product pricing Production Operations (Activity 3)
•Resource allocation and planning The third step in the production cycle is the actual
•Cost management manufacture of products. The manner in which this activity
is accomplished varies greatly across companies.
There are four basic activities in the production cycle:
1.Product design What is computer-integrated manufacturing (CIM)?
2.Planning and scheduling It is the use of information technology in the production
3.Production operations process.
4.Cost accounting
Computer-Integrated Manufacturing (CIM) is the use of
Product Design (Activity 1) various forms of IT in the production process, such as
The first step in the production cycle is product design. The robots and computer-controlled machinery, to reduce
objective of this activity is to design a product that meets production costs. Every firm needs to collect data about
customer requirements for quality, durability, and the following four facets of its production operations:
functionality while simultaneously minimizing production 1.Raw materials used
costs. 2.Labor-hours expended
3.Machine operations performed
Documents and procedures: 4.Other manufacturing overhead costs incurred
The product design activity creates two main documents:
1.Bill of materials Cost Accounting (Activity 4)
2.Operations list The final step in the production cycle is cost accounting.
What are the three principal objectives of the cost
How can accountants be involved in product design? accounting system?
–by showing how various design trade-offs affect 1.To provide information for planning, controlling, and
production costs and thereby profitability evaluating the performance of production operations
–by ensuring that the AIS is designed to collect and provide 2.To provide accurate cost data about products for use in
information about the machine setup and materials pricing and product mix decisions
handling costs associated with alternative product designs 3.To collect and process the information used to calculate
–by providing data about repair and warranty costs the inventory and cost of goods sold values
associated with existing products
What are two types of cost accounting systems?
Planning and Scheduling (Activity 2) 1. Job-order costing
The second step in the production cycle is planning and 2. Process costing
scheduling. The objective of this step is a production plan Job-order costing assigns costs to specific production
efficient enough to meet existing orders and anticipate batches or to individual jobs.
short-term demand without creating excess finished goods Process costing assigns costs to each process, and then
inventories. calculates the average cost for all units produced.
What are two common methods of production planning?
1.Manufacturing resource planning (MRP-II) The choice of job-order or process costing affects only the
2.Just-in-time (JIT) manufacturing systems method used to assign costs to products, not the method
used for data collection. Raw Materials:
When production is initiated, the issuance of a materials
requisition triggers the journal entry.
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1591
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1592
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
CHAPTER 14
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1593
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
are received from various government units and insurance –online terminals
companies. –corporate intranets
Validate Time andAttendance Data (Activity 3) Disburse Payroll (Activity 5)
The third activity in the payroll cycle is to validate each The fifth activity is actual disbursement of paychecks to
employee’s time and attendance data. This information employees. Most employees are paid either by check or by
comes in various forms, depending on an employee’s direct deposit of the net pay amount into the employee’s
status. bank account.
What are some pay schemes? Procedures:
–time cards for those paid on an hourly basis Once paychecks have been prepared, the payroll
–self report for professionals register is sent to the accounts payable
–straight commission or salary plus commission department for review and approval.
–incentives and bonuses A disbursement voucher is then prepared.
The disbursement voucher and payroll register are
Procedures: then sent to the cashier.
The payroll department is responsible for
validating employee time records.
For factory workers, validation involves comparing Opportunities for Using Information Technology
the total time worked with the time spent on each What are some opportunities of using information
job. technology to disburse payroll (Activity 5)?
The payroll clerk calculates batch totals and enters –direct deposit
them along with the time data. –outsourcing to a payroll service bureau
The batch totals are recalculated by the computer
after subsequent processing steps. Calculate Employer-Paid Benefits and Taxes (Activity 6)
Payroll transaction data are entered through Some payroll taxes and employee benefits are paid directly
online terminals. by the employer. Federal and state laws require employers
Edit checks are performed on each time and to contribute a specified percentage of each employee’s
attendance record. gross pay to federal and state unemployment
compensation insurance funds. Employers often contribute
What are some opportunities of using information to health, disability, and insurance premiums. Many
technology tovalidate time and attendance data (Activity companies also offer their employees flexible benefit
3)? plans. Many employees are offered and contribute toward
–collecting employee time and attendance data a choice of retirement savings plans.
electronically, instead of on paper documents
–using badge readers Disburse Payroll Taxes and Other Deductions (Activity 7)
–using electronic time clocks The final activity in the payroll process involves paying the
payroll tax liability and the other voluntary deductions of
Prepare Payroll (Activity 4) each employee. An organization must periodically prepare
The fourth activity in the payroll cycle involves preparing checks or use electronic transfer to pay the various tax
payroll. Data about the hours worked are provided by the liabilities incurred. The timing of these payments is
department in which the employee works. Pay rate specified by the respective government agencies. The
information is obtained from the payroll master file. The funds voluntarily withheld from each employee’s paycheck
person responsible for preparing paychecks cannot add for various benefits must be disbursed to the appropriate
new records to this file. organizations.
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1595
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
Prepare Financial Statements (Activity 3) Errors made in updating the general ledger can lead to
The third activity in the general ledger and reporting poor decision making based on erroneous information in
system involves the preparation of financial statements. financial performance reports. Control procedures fall into
three categories:
The income statement is prepared first. 1.Input edit and processing controls
The balance sheet isprepared next. 2.Reconciliations and control reports
The cash flows statement is prepared last. 3.Maintenance of an adequate audit trail
Produce Managerial Reports (Activity 4) Input Edit and Processing Controls
The final activity in the general ledger and reporting There are two sources of journal entries for updating the
system involves the production of various managerial general ledger:
reports. 1.Summary journal entries from other AIS cycles
What are the two main categories of managerial reports? 2.Direct entries made by the treasurer or controller
1.General ledger control reports
2.Budgets Journal entries made by the treasurer and controller are
original data entry. Several types of input edit and
What are examples of control reports? processing controls are needed to ensure that they are
–lists of journal vouchers by numerical sequence, account accurate and complete. These are:
number, or date Validity Check
–listing of general ledger account balances Field Checks
Zero-balance checks
What are examples of budgets? Completeness test
–operating budget Closed-loop verification
–capital expenditures budget Calculation run-to-run totals to verify accuracy of journal
voucher batch processing
Budgets and performance reports should be developed on Standard adjusting entry file for recurring adjusting
the basis of responsibility accounting. entries made each period
Sign check
What is responsibility accounting?
It involves reporting financial results on the basis of Reconciliation and Control Report
managerial responsibilities within an organization. Reconciliations and control reports can detect if any errors
were made during the process of updating the general
Control: Objectives,Threats, and Procedures ledger. Examples include:
What are the control objectives in the general ledger and Preparation of the trial balance
reporting system? Comparing the general ledger control account balances to
1.Updates to the general ledger are properly authorized. the total balance in the corresponding ledger
2.Recorded general ledger transactions are valid.
3.Valid, authorized general ledger transactions are The audit trail is the path of a transaction through the
recorded. accounting system. The audit trail facilitates these three
Control: Objectives,Threats, and Procedures tasks:
4.General ledger transactions are accurately recorded. 1.Trace any transaction from its original source document
5.General ledger data are safeguarded from loss or theft. to the general ledger and to any report or other document
6.General ledger system activities are performed efficiently using that data.
and effectively. Reconciliation and Control Report
The audit trail, continued
Threats and Controls in the General Ledger and Reporting 2.Trace any item appearing in a report back through the
System general ledger to its original source document
3.Trace all changes in general ledger accounts from their
beginning balance to their ending balance
Threat 2: Unauthorized Access to the General Ledger
Unauthorized access to the general ledger can result in
confidential data leaks to competitors or corruption of the
general ledger. It can also provide a means for concealing
the theft of assets.
Some controls against this threat are:
User IDs and passwords
Read-only access to the general ledger
System checks of authorization codes for each journal
voucher record before posting
Threat 3: Loss or Destruction of the General Ledger
Adequate backup and disaster recover y procedures must
Threat 1: Errors in Updating the General Ledger be in place to protect the general ledger. Backup controls
include:
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1596
PE1
Disusun oleh : Muhammad Firman (Akuntansi FE UI 2012)
1.Use of internal and external file labels Data warehouses, which contain both current and
2.Performance of regular backup of the general ledger historical data, can provide additional support for strategic
decision making. Whereas transaction-processing
Integrated Data Model databases are designed to minimize redundancy, data
An integrated enterprise-wide data model represents a warehouses purposely build in redundancies in order to
merging of separate data models. This merging primarily maximize query efficiency.The process of accessing data
involves linking each resource with the events that contained in the data warehouse and using it for strategic
increase and decrease that resource. decision making is referred to as Business Intelligence.
Integrated Data Model
The two main techniques of business intelligence are:
Online Analytical Processing (OLAP)
Data mining
Opportunities for Using Information Technology
The Extensible Business Reporting Language (XBRL) has
addressed two problems:
Different requirements for the manner in which
information is delivered.
The need for manual reentry of information into
standalone decision analysis tools.
XBRL provides two benefits:
It enables organizations to publish information only once
using standard XBRL tags.
XBRL tags are interpretable.
M a t a k u l i a h l a i n y a n g b e l u m a d a d i P D F i n i a k a n s a y a u p d a t e d i www. a k u n t a n s i d a n b i s n i s . wo rd p re s s . c o m
Contac t me : muhammad.f irman177@gmail.com /@f irmanmhmd (Line) 1597
PE1