Professional Documents
Culture Documents
Chapter 1 AIs
Chapter 1 AIs
CHAPTER ONE
ACCOUNTING INFORMATION SYSTEM AN OVERVIEW
1.1. An Overview Of Accounting Information System
The Information Environment
We begin the study of AIS with the recognition that information is a business resource. Like the
other business resources of raw materials, capital, and labor, information is vital to the survival
of the contemporary business organization.
In Every business day, vast quantities of information flow to decision makers and other users to
meet a variety of internal needs. In addition, information flows out from the organization to
external users, such as customers, suppliers, and stakeholders who have an interest in the firm.
What Is a System?
For many, the term system generates mental images of computers and programming. In fact, the
term has much broader applicability. Some systems are naturally occurring, whereas others are
artificial. Natural systems range from the atom - a system of electrons, protons, and neutrons - to
the universe - a system of galaxies, stars, and planets. All life forms, plant and animal, are
examples of natural systems. Artificial systems are man made. These systems include everything
from clocks to submarines and social systems to information systems.
We have two broad classes of systems emerge from the decomposition: the accounting
information system (AIS) and the management information system (MIS).
The distinction between AIS and MIS centers on the concept of a transaction. The information
system accepts input, called transactions, which are converted through various processes into
output information that goes to users.
A transaction is an event that affects or is of interest to the organization and is processed by its
information system as a unit of work. Transactions fall into two classes: financial transactions
and non financial transactions.
A financial transaction is an economic event that affects the assets and equities of the
organization, is reflected in its accounts, and is measured in monetary terms. Sales of products to
customers, purchases of inventory from vendors, and cash disbursements and receipts are
examples of financial transactions. Every business organization is legally bound to correctly
process these types of transactions.
Nonfinancial transactions are events that do not meet the narrow definition of a financial
transaction. For example, adding a new supplier of raw materials to the list of valid suppliers is
an event that may be processed by the enterprise’s information system as a transaction. Important
as this information obviously is, it is not a financial transaction, and the firm has no legal
obligation to process it correctly- or at all.
An accounting information system
An accounting information system is a collection of resources such as people and equipment
designed to transform financial data into information. The information is communicated to a
wide variety of decision makers. AISs perform this transformation whether they are essentially
manual or computerized.
Organizational Strategy
Culture
AIS
Information
Technology
IT is profoundly changing the way that accounting and many other business activities are
performed. It is also essential to know the costs and benefits of new IT developments. This
requires developing basic understanding of business strategies and how IT can be used to
implement those strategies as well as how new developments in IT create an opportunity to
modify those strategies.
Moreover, because the AIS functions within an organization, it should be designed to reflect the
values of that organizational culture. The design of AIS also influences the organizational culture
by controlling the flow of information within the organization. For example, an AIS that makes
information easily accessible and widely available is likely to increase pressures for more
decentralized and autonomy.
1.2. The Role of the AIS in the Value Chain
The objective of most organizations is to provide value to their customers. This requires
performing a number of different activities. These activities are conceptualized as forming a
value chain. An organization’s value chain consists of five primary activities that directly
provide value to its customers. These are:
1. Inbound logistics- consists of receiving, storing, and distributing the materials that are
inputs used by the organization to create the services and products that it sells.
2. Operations- activities that transform inputs into final products or services.
3. Outbound logistics- are the activities involved in distributing finished products or
services to customers.
4. Marketing and sales- refers to the activities involved in helping customers to buy the
organization’s products or services.
5. Service- activities that provide post sale support to customers. Examples are repairs and
maintenance services.
Organizations also perform a number of other support activities that enable the five primary
activities to be performed efficiently and effectively. Those support activities can be grouped
into four categories:
1. Firm Infrastructure- refers to the accounting, finance, legal support, and general
administrative activities that are necessary for any organization to function. The AIS is
part of the firm infrastructure.
2. Human resources- activities that include recruiting, hiring, training, and providing
employee benefits and compensation.
3. Technology- activities that improve a product or service. Examples include research and
development, improvements in information technology, web site development, and
product design.
4. Purchasing- includes all the activities involving in procuring raw materials, supplies,
machinery, and the buildings used to carry out the primary activities.
Refer the following diagram :
1. Firm Infrastructure
2. Human Resources
3. Technology
4. ACCOUNTING INFORMATION SYSTEM
Purchasing 4
Rift Valley University Nekemte Campus Year 2016, Department of Accounting
It shall be recalled that systems are often composed of subsystems. Thus, each step in an
organization’s value chain is itself a system consisting of a set of activities. For example, the
sales and marketing step includes such activities as market research, calling on customers, order
processing, and credit approval. In addition, an organization’s value chain is itself a part of a
larger system. Organizations interact with suppliers, distributors, and customers.
How Can AIS Add Value to an Organization?
The value chain model shows that the AIS is a support activity. Thus, AIS can add value to the
organization by providing accurate and timely information so that the five primary value chain
activities can be performed more effectively and efficiently. A well-designed AIS can do this by:
1. Improving the quality and reducing the cost of products and services- an AIS for example
can monitor machinery so that operators are notified immediately when the process falls
outside acceptable quality limits. This helps not only maintain product quality but also
reduces the amount of wasted materials and the costs of having to rework anything.
2. Improving efficiency- a well designed AIS can help improve the efficiency of operations
by providing more timely information. For example, a just in time manufacturing
approach requires constant, accurate, up to date information about raw materials
inventories and their costs.
3. Improved decision making- an AIS can improve decision making by providing accurate
information in a timely manner.
4. Sharing of knowledge- a well-designed AIS can make it easier to share knowledge and
expertise, perhaps thereby improving operations and even providing a competitive
advantage.
A well designed AIS can also help an organization profit by improving the efficiency and
effectiveness of its supply chain. For example, allowing customers to directly access the
company’s inventory and sales order entry systems can reduce the cost of sales and marketing
activities. Moreover, if such access reduces customers’ costs and time of ordering, both sales and
customer retention rates may increase.
2. AIS APPLICATIONS
SHIPPING
• The second basic activity in the revenue cycle is filling customer orders and shipping the
desired merchandise.
• The process consists of two steps
– Picking and packing the order
– Shipping the order
• The warehouse department typically picks the order
• The shipping departments packs and ships the order
• Both functions include custody of inventory and ultimately report to the VP of
Manufacturing.
• The clerk then records online:
– The sales order number – The quantities shipped
– The item numbers ordered
• This produces
– Updates the quantity-on-hand field in the inventory master file
– Produces a packing slip
– Produces multiple copies of the bill of lading
• The bill of lading is a legal contract that defines responsibility for goods in transit
• It identifies: The carrier, the source, the destination, Special shipping instructions, who
pays for the shipping
The shipment is accompanied by:
– The packing slip
– A copy of the bill of lading
– The freight bill
• (Sometimes bill of lading doubles as freight bill)
• What happens to other copies of the bill of lading?
– One is kept in shipping to track and confirm delivery
– One is sent to billing to trigger an invoice
– One is retained by the freight carrier
BILLING
• The third revenue cycle activity is billing customers.
• This activity involves two tasks: Invoicing and Updating accounts receivable
• Accurate and timely billing is crucial.
• Billing is an information processing activity that repackages and summarizes information
from the sales order entry and shipping activities
• Requires information from:
– Shipping Department on items and quantities shipped
– Sales on prices and other sales terms
• The basic document created is the sales invoice. The invoice notifies the customer of:
– The amount to be paid
– Where to send payment
• An integrated AIS may merge the billing process with sales and marketing by using data
about a customer’s past purchases to send information about related products and services
with his monthly statement.
• The accounts receivable function reports to the controller
• This function performs two basic tasks
– Debits customer accounts for the amount the customer is invoiced
– Credits customer accounts for the amount of customer payments
• Two basic ways to maintain accounts receivable:
– Open-invoice method – Balance forward method
• OPEN-INVOICE METHOD:
– Customers pay according to each invoice
– Two copies of the invoice are typically sent to the customer
• Customer is asked to return one copy with payment
• This copy is a turnaround document called a remittance advice
– Advantages of open-invoice method
• Conducive to offering early-payment discounts
• Results in more uniform flow of cash collections
– Disadvantages of open-invoice method
• More complex to maintain
• BALANCE FORWARD METHOD:
– Customers pay according to amount on their monthly statement, rather than by
invoice
– Monthly statement lists transactions since the last statement and lists the current
balance
• The tear-off portion includes pre-printed information with
customer name, account number, and balance
• Customers are asked to return the stub, which serves as the
remittance advice
CASH COLLECTIONS
• The final activity in the revenue cycle is collecting cash from customers
• The cashier, who reports to the treasurer, handles customer remittances and deposits them
in the bank
• Because cash and checks are highly vulnerable, controls should be in place to discourage
theft
– Accounts receivable personnel should not have access to cash (including checks)
THREATS IN SHIPPING
• Threats in the shipping process include:
– THREAT 5: Shipping Errors
– THREAT 6: Theft of Inventory
THREATS IN BILLING
• Threats that relate to this process are:
– THREAT 7: Failure to bill customers
– THREAT 8: Billing errors
– THREAT 9: Errors in maintaining customer accounts
• The need to purchase goods typically results in the creation of a purchase requisition.
The purchase requisition is a paper document or electronic form that identifies:
– Who is requesting the goods
– Where they should be delivered
– When they’re needed
– Item numbers, descriptions, quantities, and prices
– Possibly a suggested supplier
– Department number and account number to be charged
• Most of the detail on the suppliers and the items purchased can be pulled from the
supplier and inventory master files.
• The purchase requisition is received by a purchasing agent (aka, buyer) in the purchasing
department, who typically performs the purchasing activity.
– In manufacturing companies, this function usually reports to the VP of
Manufacturing.
• A crucial decision is the selection of supplier.
• Key considerations are: Price, Quality and Dependability.
• Dependability is especially important in JIT systems because late
or defective deliveries can bring the whole system to a halt.
• Consequently, certification that suppliers meet ISO 9000 quality
standards is important. This certification recognizes that the
supplier has adequate quality control processes.
• Once a supplier has been selected for a product, their identity should become part of the
product inventory master file so that the selection process does not have to be carried out
for every purchase.
– A list of potential alternates should also be maintained.
– For products that are seldom ordered, the selection process may be repeated every
time.
• It’s important to track and periodically evaluate supplier performance, including data on:
– Purchase prices
– Rework and scrap costs
– Supplier delivery performance
• The purchasing function should be evaluated and rewarded based on how well it
minimizes total costs, not just the costs of purchasing the goods.
• A purchase order is a document or electronic form that formally requests a supplier to
sell and deliver specified products at specified prices.
• The PO is both a contract and a promise to pay. It includes:
• The payroll department receives notification of changes in tax rates and other payroll
deductions from government agencies, insurers, unions, etc.
• These changes occur periodically.
• Information on time and attendance comes in various forms depending on the employee’s
pay scheme.
PREPARE PAYROLL
PREPARE PAYROLL
• Procedures:
– The payroll transaction file is sorted by employee number (same sequence as
master file).
– For each transaction, the payroll master file is read for pay rates, etc., and gross
pay is calculated.
• Hourly Employees: Gross pay = (hours worked x wage rate) +
Overtime + Bonuses
• Salaried Employees: Gross pay = annual salary x fraction of year
worked
– Payroll deductions are summed and subtracted from gross pay to obtain net pay.
There are two types of deductions: Payroll tax withholdings and Voluntary deductions
DISBURSE PAYROLL
GENERAL THREATS
• The general threats are:
– THREAT 7: Loss, Alteration, or Unauthorized Disclosure of Data
– THREAT 8: Poor Performance
Chapter 3
3.System Development and Documentation Tools and Techniques
Documentation encompasses the narratives, flowcharts, diagrams, and other written material
that explain how the system works. This information covers the who, what, when, where, why,
and how of data entry, processing, storage, information output and system controls. One
popular means of documenting a system is to develop diagrams, flowcharts, tables, and other
graphical representations of information. These are then supplemented by a narrative
description of the system, which is a written step-by step explanation of system components
and interactions.
The two most common tools of system documentation- dataflow diagrams and flowcharts will
be discussed in this part. These tools save the organization both time and money.
Depending on the job function being performed, documentation tools are important on one or
more of the following levels:
Training users
Documentation also includes the user guides, procedure manuals, and other operating
instructions that help people learn how the AIS operates.
Good documentation helps system designers develop object-oriented SW, that is, programs that
contain modular, reusable code. This object-orientation helps programmers avoid writing
duplicate programs and facilities changes when programs must be modified later.
Auditing AISs
Documentation helps auditors determine the strengths and weaknesses of a system’s controls.
1. Data flow diagram- a graphical description of the source and destination of data that
shows data flow within an organization, the processes performed on the data and how
data are stored.
2. Document flow chart- a graphical description of the flow of documents and information
between departments or areas of responsibility within an organization.
3. System flowchart- a graphical description of the relationship among the input,
processing, and output in an information system.
4. Program flowchart- a graphical description of the sequence of logical operations that a
computer performs as it executes a program.
These tools are used extensively in the system development process. Systems development is a
complex process and these tools are used to create order from chaos and complexity. In
addition, the team members who develop information systems projects often change and these
documentation tools help the new team members get up to speed quickly.
Both DFDs and flowcharts are easy to prepare and revise when one of the recently developed
DFDs or flowcharting software packages is used. They are easier to use than most word
processors. Once a few basic commands are mastered, users can quickly and easily prepare,
store, revise, and print presentation quality DFDs or flowcharts.
shall be used. The context diagram shall be decomposed into high level processes, and
then exploded into successively lower level processes.
13. Give each process a sequential number- in completed DFD, each process is given a
sequential number that helps readers move back and forth between different DFD
levels. Data flows should only go from lower numbered to higher numbered processes.
14. Repeat the process- DFD developers must work through organization data flows several
times. Each subsequent pass helps refine the diagram and identify the fine points. When
refining, the DFD shall be organized to flow from top to bottom and from left to right.
15. Prepare a final copy- the final copy of the DFD shall be drawn. Data flow lines shall be
allowed to cross over each other, if necessary, a data store or destination may be
repeated. The name of the DFD, the data prepared, and the preparer shall be placed on
each page.
Elements in a Data Flow Diagram
A DFD is composed of four basic elements: data sources and destinations, data flows,
transformation processes, and data stores. Each will be represented in a DFD by a unique
symbol.
The
Process
Data Stores
Source/Destination
Entity
Data Flow
For example, in the diagram below, the input to process C is data flow B, which comes form data
source A. The outputs of process C are data flows D and E. Data flow E is sent to data destination
F.
Bank
(J)
The highest-level DFD is referred to as a context diagram. A context diagram provides the reader
with a summary level view of the system. It depicts a data processing system and the external
entities that are the sources and destinations of the system's inputs and outputs. For example,
the following can be considered as the context diagram of payroll processing procedures for a
certain company. It shows that the payroll processing system receives time card data from
different departments and employees' data from the human resource department. When these
data are processed, the system produces:
Time
Payroll
Tax reports and payments Government
cards Agencies
Departments Processing
Employee Employees
S
paychecks
y
Payroll
Human s
check Bank
resources t
Employee e report Management
Payroll
data m
Flowcharts
A flowchart is an analytical technique used to describe some aspect of an information system in
a clear, concise, and logical manner. Flowcharts use a standard set of symbols to pictorially
describe transaction processing procedures. The following are general guidelines for preparing
flowcharts that are readable, clear, concise, consistent, and understandable.
10. Having an input and output for each manual processing symbol. Two documents shall
not be connected directly except when moving from one column to another column.
11. Using on page connectors to avoid excess flow lines, which results in a neat looking page
as well as using off-page connectors to move from one flowchart page to another. All
connectors shall be clearly labeled to avoid confusion.
12. Using arrowheads on all flow lines and not assuming that the reader will know the
direction of the flow.
13. Clearly labeling the pages 1 of 3, 2 of 3 etc if a flowchart can not fit into a single page.
14. Showing documents or reports first in the column in which they are created and then
moving to another column for further processing. A manual process is not needed to
show documents being flowcharted.
15. Showing all data entered into or retrieved from a computer file as passing through a
processing operation (a computer program) first.
16. Drawing a line from the document to a file to indicate that it is being filed. A manual
process is not needed to show a document entering a file.
17. Drawing a rough sketch of the flowchart as a first effort. Concern shall be with capturing
content than perfect drawing. Few systems can be flowcharted in a single draft.
18. Redesigning the flowchart to avoid clutter and a large number of crossed lines.
19. Verifying the flowchart's accuracy by reviewing it with the people familiar with the
system. It shall be assured that all uses of flowchart conventions are consistent.
20. Drawing the final copy of the flowchart, placing the name of the flowchart, the date, and
the preparer's name on each page.
Flowchart Symbols
There are various types of symbols used to create flowcharts. Each symbol has a special
meaning that is easily conveyed by its shape. The shape indicates and describes the operation
performed and the input, processing, output, and storage media employed. The symbols are
drawn by a software program or with a flowcharting template.
Online keying
Computer processing
Display
Journal/ledger
Document or processing flow
Magnetic disk On-page connector
Off-page connector
Magnetic tape
Terminal
Decision
Document Flowcharts
A document flowchart illustrates the flow of documents and information among areas of
responsibility within an organization. They trace a document from its cradle to its grave. They
show where a document originates, its distribution, the purpose for which it is used, its ultimate
disposition, and everything that happens as it flows through the system.
The document flowchart can reveal weaknesses or inefficiencies in a system such as inadequate
communication flows, unnecessary complexity in document flows, or procedures responsible for
causing wasteful delays. They also can be prepared as part of the system design process and
should be included in the documentation of an information system.
Major flowchart symbols are available from EXCEL. To view the Drawing Toolbar of
In EXCEL, “View/Toolbar/Drawing”
Or you can also click directly on the Drawing icon in the Standard Toolbar.
System Flowcharts
System flowcharts depict the relationship among the input, processing, and output of an AIS. A
system flowchart begins by identifying both the inputs that enter the system and their origins.
The input is followed by the processing portion of the flowchart. The input is followed by
processing portion of the flowchart that is the steps performed on the data. The logic the
computer uses to perform the processing task is shown on a program flowchart. The resulting
new information is the output component, which can be stored for later use, displayed on a
screen, or printed on paper. In many instances, the output from one process is an input to
another.
System flowcharts are an important systems analysis, design, and evaluation tool. They are
universally employed in systems work and provide an immediate form of communication among
workers. The system flowchart is an excellent vehicle for describing information flows and
procedures within AIS.
Program Flowcharts
A program flowchart illustrates the sequence of logical operations performed by a computer in
executing a program. It describes the specific logic to perform a process shown on a systems
flowchart. A flow line connects the symbols and indicates the sequence of operations. The
processing symbol represents a data movement or arithmetic calculation. Once designed and
approved, the program flowchart serves as the blueprint for coding the computer program.
Input
Storag Process
e
Output
Enter
sales
Start Appr
order Reject
ove d No
Order
Inventor
for Yes
y Back-
credit?
No
available Order
? Yes
Fill order Stop
- Demands for development resources are so numerous that AIS projects are
backlogged for several years.
- A newly designed AIS doesn't always meet users needs
Purchase Software
Canned software is written by software development companies and is sold on the open
market to a broad range of users with similar requirements.
Turnkey systems are a combination of software and hardware sold as a package. The
vendor installs the entire system and user needs only to “turn the key”.
The Internet has given companies a new way to acquire software:
Application service providers (ASPs) host Web-based software on their computers and deliver
the software to their clients over the Internet.
Companies that buy rather than develop AIS software still go through the systems development
life cycle (SDLC).
1. Systems analysis
2. Conceptual design
3. Physical design
4. Implementation and conversion
5. Operation and maintenance
Most often, organizations develop their own custom software, because canned software
that fit their specific needs is not available.
Developing custom software is difficult and error-prone.
It also consumes a great deal of time and resources.
When contracting with an outside organization, a company should maintain control over the
development process. Some guidelines:
End-user computing (EUC) is the hands-on development, use, and control of computer-
based information systems by users.
With the advent of inexpensive PCs and powerful, inexpensive software, users began
developing their own systems to create and store data, access and download company
data, and share data and computer resources in networks.
Examples of end user development uses:
Retrieving information from company databases to produce simple reports or to answer
one-time queries
Performing “what if” sensitivity or statistical analyses
Developing applications using prewritten software (spreadsheet or database system)
Preparing schedules and lists, such as depreciation schedules, accounts receivable aging,
and loan amortizations
Benefits of End-User Computing
User creation, control, and implementation Freeing up IS resources
Timeliness
Organizations use several different approaches to mange and control end-user computing. For
example, a help desk can encourage, support, coordinate and control end-user activities.
What is outsourcing?
It is hiring an outside company to handle all or part of an organization’s data
processing activities.
In a mainframe outsourcing agreement, the outsourcers buy their client’s computers
and hire all or most of the client’s employees.
In a client/server or PC outsourcing agreement, an organization outsources a particular
service, a segment of its business, a particular function, or PC support.
Benefits of Outsourcing
A business and information solution Lower costs
Access to greater expertise and more Elimination of peaks and valleys usage
advanced technology
Facilitation of downsizing
Risks of Outsourcing
Inflexibility
Locked-in system
Unfulfilled goals
Chapter Four
– Systems analysis
– Conceptual Design
– Physical Design
– Implementation and Conversion
– Operation and Maintenance
1) System Analysis
1. Initial investigation- is conducted to screen projects. At this stage, the following are essential:
2. Systems survey- at this stage, an extensive study of the current AIS is undertaken. It may take
weeks or months depending on the complexity and the scope of the system. The objectives of a
system survey include:
Gain a thorough understanding of the company operations, policies, and procedures; data
and information flows; AIS strengths and weaknesses; and available hardware, software, and
personnel.
Make preliminary assessment of current and future processing needs, and determine the
extent and nature of the changes needed.
Develop working relationships with users and build support for the AIS
Collect data that identify user needs, conduct a feasibility analysis and make
recommendations to management.
Finally, the findings are documented, the existing system is modeled and analyzed and a survey report is
prepared.
3. Feasibility study- a more thorough feasibility analysis is conducted to determine the project's
viability. Especially important is economic feasibility. The feasibility analysis is updated as the
project proceeds and costs and benefits become clearer.
The feasibility study and its updates are used by the steering committee as the project proceeds to
decide whether to:
a. Technical feasibility
Is the technology there to do it?
b. Operational feasibility
Do we have people who can do it, and will it get used?
c. Legal feasibility
Does it comply with legal, regulatory, and contractual obligations?
d. Scheduling feasibility
Can it be done in time?
e. Economic feasibility
Will the benefits exceed the costs
Economic feasibility is probably the most important and frequently analyzed aspect. This
examination requires a careful investigation of costs and benefits.
Traditional Methods
Interview
Questionnaire
Observation
Document analysis
Modern Methods
Prototyping
1. Repetitive process involving analysts and users
2. Rudimentary version of system is built and rebuilt based on feedbacks
3. Replaces or augments SDLC
4. Goal: to develop concrete specifications for ultimate system
5. Quickly converts requirements to working version of desired system
6. Once the user sees requirements converted to physical system, they ask for
modifications or generate additional requests
Most useful when:
User requests are not clear
Few users are involved in the system
Designs are complex and require concrete form
History of communication problems between analysts and users
Tools are readily available to build prototype
Drawbacks
Tendency to avoid formal documentation
Difficult to adapt to more general user audience
Sharing data with other systems is often not considered
Systems Development Life Cycle (SDLC) checks are often bypassed
2) Conceptual design
In the conceptual systems design phase, a general framework is developed for implementing user
requirements and solving problems identified in the analysis phase. What are the three steps in
conceptual design?
Different activities will come as a series of steps as shown by the diagram below:
Output Program
design design
Input Controls
design design
©2003 Prentice Hall Business Publishing, 18-16
Accounting Information Systems, 9/e, Romney/Steinbart
The objective of output design is to determine the characteristics of reports, documents, and
screen displays.
Output fits into one of four categories:
1. Scheduled reports
2. Special-purpose analysis
3. Triggered exception reports
4. Demand reports
Conceptual Physical
systems design systems design
– medium of storage
– organization and access
– processing mode
– maintenance
– size and activity level
Physical Systems Design: Input Design
When evaluating input design, the design team must identify the different types of data input
and optimal input method.
What are the two principal types of data input?
1. Forms
2. Computer screens
Physical Systems Design: Procedures Design
Procedures design should answer the who, what, where, and how questions related to all AIS
activities.
What should procedures cover?
input preparation
transaction processing
error detection and corrections
controls
reconciliation of balances
database access
output preparation and distribution
computer operator instructions
Physical Systems Design: Control Design
Validity Authorization
Accuracy Security
Maintainability Integrity
Audit Control
At the end of the physical design phase the team prepares a physical systems design report.
This report becomes the basis for management’s decision whether to proceed to the
implementation phase.
4) Implementation and conversion
Systems implementation is the process of installing hardware and software and getting the AIS up
and running. It includes the following activities.
The relationship of the items in this phase and the conversion process (next phase) will be as shown
below in a series of activities.
Systems Implementation
Implementation planning
Conversion
©2003 Prentice Hall Business Publishing, 18-27
Accounting Information Systems, 9/e, Romney/Steinbart
What are some factors to consider during the post implementation review?
The Players refer to who are the people involved in developing and implementing AIS?
Management
Accountants
Information systems steering committee
Project development team
Systems analysts and programmers
External players
– consistency
– efficiency
– cutting edge How do people resist AIS changes?
– lower costs aggression
– adaptability projection
avoida