Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 24

Accounting information systems study notes

Week 1 Lecture 1
Data and information

Characteristics that make information useful


1. Relevant -Information needed to make a decision.
2. Reliable-Information free from bias.
3. Complete -Does not omit important aspects of event or activities.
4. Timely information-Information needs to make in time to make a decision.
5. Understandable-Information must be presented in a meaningful manner.
6. Verifiable-Two individual people can produce the same conclusion.
7. Accessible- available are when needed.

Accounting information systems in value chain and databases

AIS- Stores, collects, records and processes data to produce information for decision making.

Interaction between AIS and external and internal parties.


How does an AIS add value to an organisation?
1. Reducing operating costs
2. Improving efficiency
3. Increase in knowledge.
4. Supply chain strengthening
5. Improved internal control structure.
6. Improved decision making

Isolated Accounting system


1. Safeguard accounting data
2. Analyse accounting data
3. Store accounting data

Integrated enterprise system

Value and Supply chain


Value chain-Value chain activities are primary and support activities.
Primary-Activities that provide direct value to customers.
Support-Activities that support primary activities for efficiency and effectiveness.

Supply chain-An extended system that includes the value chain as well as its distributors,
suppliers, and creditors.
Business processes and transaction cycles

Baseline Accounting system with transaction cycles


Accounting information systems study notes

Week 2 Lecture 2
Strategy for competitive advantage
A company that has the following:
 An edge over competitors
 Superior margins
 Value
 Difficult or impossible to replicate.

VRIO Framework

Source of competitive
advantage
Porters five forces of competitive advantage

1. Threat of new entrants-The threat of new companies and ideas infiltrating the
market and gravitating serious market share.
2. Threat of internal competition-The threat of competitors offering similar
products/services for an improved perceive value.
3. Threat of alternatives-The threat of further competitors offering alternative
products and services for the same need.
4. Customer bargaining power-When the customer is in few, and the market is
saturated with similar products (Price war results).
5. Supplier bargaining power- When the supplier market is saturated, and
companies have a wide array to choose from.

Key strategies for competitive advantage

Broad market
 Cost leadership
 Differentiation
Narrow segments
 Focus
Examples of competitive advantages
 Ease of use
 Experience
 Trade secrets
 Patents/trademarks
 Natural resources
 Technology
 Innovation
 Personal touch
 Scale
 Sustainability
 Brand equity
 Ambassadors
 Supply chain and logistics

Upcoming advantages
 Supplier and customer intimacy
 CSR

Information systems and business strategy

Effects of the internet of things on competitive advantage


 Intensify competitive rivalries.
 Increased customer bargaining power (Low switching costs)
 Opportunities to create sand enlarge customer base.

IT influences firm level vale chain.

IT influence
intra firm processes
 Improve synergies. -Pooling of resources between companies
 Improve knowledge sharing as a core competency. -Encourages sharing between
business units

Network based strategies.


 Takes advantage of network economies-The cost of adding another participant
is negligible but marginal gain is higher.
 Creates virtual organisations. -Uses networks to link ideas, assets to create and
distribute products/services.
 Business ecosystem-Keystone firms that dominate and create platforms used
by niche forms.

Business and IT alignment


It and business alignment can be described as the integration of IT with a firm’s strategy,
mission and goals.

IT driving and enabling relationships.

IT alignment framework

Six characteristics of excellent business-IT alignment


1. Engine of innovation
2. CRM is of supreme importance.
3. Integrate all employees from departments to strength the core values and to align
business expectations.
4. SMART goals
5. IT employees understand the businesses financial position.
6. Vibrant and inclusive company culture

Business process and Information systems


 Business process- a activity(s) that adds value to the organisation.
 BP elements-Input, output, resources
 Objectives- Efficiency and effectiveness

Business process improvement (BPI)


Five bases of BPI
1. Define
2. Measure
3. Analyse
4. Improve
5. Control

Business process management (BPM)


Five bases of BPM
1. Imitation
2. Development
3. Implementation
4. Controlling
5. Optimising

Business process reengineering


Radical redesign of the whole business

Industry best practices


 Created by consulting companies, research organisations, government body’s and
industry associations.

Accounting information systems study notes

Week 3 Lecture 3

Overview of ERM
The Core Information Systems

Enterprise resource planning

ERP Systems, Business Processes and Best Practice

-An ERP system is a set of computer program modules that attempts to integrate the different
functional areas of the organization.

-An ERP is designed based on best practice – the best way of performing a particular process.

ERP stands for Enterprise Resource Planning.


Goal: improve and streamline internal business processes.
Customer Relationship
Management CRM
Operational CRM Systems

Two Major Components

Customer-facing applications
Customer touching applications
Operational CRM Systems provide the following benefits: Efficient, personalized marketing,
sales, and service
A 360-degree view of each customer.

The ability of sales and service employees to access a complete history of customer
interaction with the organization, regardless of the touch point.

Interact directly with customers.

- Sales

 -  Field service

 -  Customer call centres and reps

Customer-Facing Applications

 Customer Service and Support


 Sales Force Automation (SFA) • Marketing • Campaign Management

Customer Interact directly with technology and applications.

Customer-Touching Applications

Search and Comparison Capabilities Technical and Other Information and Services
Customized Products and Services Personalized web pages
FAQs
E-mail and Automated Response
Loyalty Programs

Provides business intelligence by analysing customer.

behaviours and perceptions

Copyright © 20110 John Wiley & Sons, Inc. All rights reserved.

Front-office business processes.

Better knowledge of customers

Better segmentation

Better customer retention

Better anticipation of needs

Better communication
Better protection of data privacy

Benefits of CRM

CRM and business strategy?

 Better customer knowledge and anticipation of needs

 Customer intimacy Differentiation

 Segmentation

 Focus

 Better communication

 Many strategies, esp reputation/brand/based/CSR- based strategies.

 Customer retention

 All strategies, esp differentiation and focus

 Protection of data privacy

 All strategies

Supply Chain Management SCM

The Structure of Supply Chains

Upstream Internal Downstream

The Components of Supply Chains

The Flows in the Supply Chain


Tiers of suppliers Material flows Information flows

Financial Flows

Procurement Distribution

Five Basic Processes of Supply Chain Management

Differentiation Focus Customer Intimacy Cost leadership

Two Basic Strategies of SCM

Benefits of SCM

Select and partner with high quality


suppliers.

Help with modifications in internal product


design and innovation.

Evaluate and analyse your historical data for insights.

Adapt to changing markets and customer demands.

Tracking raw materials and finished inventory.

Key take away points:

SCM stands for Supply Chain Management.


Goal: improve coordination between participants of the supply chain.

(suppliers, distributors, manufacturers, etc.) .


Accounting information systems study notes

Week 4 Lecture 4
Control activities, business processes and accounting

• Errors can occur in the financial reporting process.

• Auditing standards are the basis of external financial statement audits.

• Primary concern is the financial accuracy of the statements.

• For an accountant working with a AIS, the concern extends beyond financial to non-
financial risks and controls.

Internal controls as part of enterprise risk management

 Applying internal controls involves an evaluation of assertions coupled with a risk


assessment.

 Once risk has been identified, the extent needs to be evaluated.

 After identifying risks, policies, and procedures to address the risks will be
implemented – these policies are called control activities.

Types of control activities

Australian Auditing Standard ASA 315 classifies controls into five types:

 Authorisation

 Performance reviews

 Information processing controls


 Physical controls

 Segregation of duties

Types of control activities

1. Authorisation:
• Activities and procedures to assure transactions and events are carried out by those with the
higher clearance. Set defined roles, responsibilities, and adherence mechanisms for
individuals within the organisation.

2. Performance reviews: Review or analysis of performance

3. Information processing controls:


Work towards the accuracy, completeness, and authorisation of transactions.

4. Accuracy: data entered is correct and reflects actual recorded events.

Completeness: all events are recorded. General controls: policies and procedures that
support applications and application controls. Application controls: manual or automated
procedures, at business process level, related to the processing of transactions by individual
applications.

5. Physical controls: Controls put in place to physically protect the resources of the
organisation, including protecting them from the risk of theft or damage.

6. Segregation of duties: Certain key functions should not be performed by the same person.
Applies across the IT systems within the organisation.

Preventive, detective, and corrective controls

Preventive controls are designed to prevent errors or irregularities. For example: password,
required fields, a firewall or an input control preventing a data error.

Detective controls will not prevent errors, but instead alert those using the system to Detect
errors. For example: virus software scan.

Corrective controls are designed to correct an error or irregularity after it has occurred.
• For example: disaster recovery plan or virus protection software.

This classification scheme of preventive, detective and corrective controls can be applied
to both general and application controls.

Where control activity takes place

 Input controls: operate as data ____ the system. Address accuracy, validity, and
completeness.
 Processing controls: ensure correct ________ of data e.g., making sure data is
correctly updated in the various data stores.

 Output controls: protect outputs generated by the process e.g., how outputs are
prepared.

Input, processing, and output controls operate within a business process and are
designed based on the particular risks present within the process – they are
application controls.

Controls for a Computerised AIS

Aims of a computerised accounting information system

Proper authorisation
• User privileges, access rights, user restrictions, approval over threshed
Proper recording
• Records right type and format, reflect the reality of the underlying transaction or
event.

• E.g. Input accuracy


Completeness
• at individual transaction and business process level
Timeliness
• Processing does not need to occur immediately – need to suit organisational needs

• Batch/online real-time processing/ Online data gathering and batch processing

General controls

General controls are those that relate across all the information systems in an organisation.

 PHYSICAL CONTROLS

 SEGREGATION OF DUTIES

 USERACCESS

 SYSTEMS DEVELOPMENT PROCEDURES


 USER AWARENESS OF RISKS

 DATASTORAGEPROCEDURES.

General controls

Physical controls are concerned with restricting access to the physical resources.

Major concern is who has physical access.

 Organisations employ a range of physical controls:

 Locked computing premises.

 Discrete premises that do not attract attention.

 Swipe card access.

 Biometric access controls.

 Onsite security.

 Security cameras to record access to the premises.

General controls

Segregation of duties:

 The separating of employee duties and to prevent fraud.

 Between the users of IT, the maintainers of the IT systems, system designers, system
testers and those with access to the data.

User access:

 Logical access of users to the systems within the organisation.

 E.g., use of passwords and a unique identification code to restrict system access.

General controls

Systems development procedures:


 MAINTENANCE AND DEVELOPMENT OF DIFFERENT INFORMATION
SYSTEMS.

 REQUIRES POLICIES, PROCEDURES AND RESTRICTIONS.

 Different user privileges, such as the system administrator.

 Preventive control: assurance that untested or incompatible software and


software that has not been appropriately reviewed or licensed will not be
placed on the system.

General controls

User awareness of risks:


• SECURITY EDUCATION TRAINING AND AWARENESS PROGRAMS TO

ENSURE EMPLOYEES ARE AWARE OF:

 Information system risks.

 Security threats and issues.

 Organisational security policies.

 The policies for detection of fraud.

General controls

Data storage procedures:


• INFORMATION ABOUT CUSTOMERS, STAFF AND INTELLECTUAL
PROPERTY

IS STORED ON SERVERS→
• If released it could financially and non-financially consequences.

 Controls: data access logs, restriction of user privileges

and encryption of stored data.

 MAJOR RISKS ASSOCIATED WITH CLOUD STORAGE:

 Inability to audit and monitor at file level.

 Inability to access the internet to access data.


 Unresolved security issues include data security, network security, data
integrity, web application security and so on.

• Controls: schedule backups (batch or real time).

General controls

Security policies:
• Information security policies to protect electronic.

resources.
• Document an organisation’s approach to security. • Usually by following a framework
and/or standard.

• Should be understood and used by all users.

Application controls

Application controls:

• Built around the operation of a particular process.

• Relate to the key system stages of:

• INPUT
• PROCESSING • OUTPUT.

Application controls

Input controls:

• Standardised forms.

• Pre-numbering documents.

• Sequence checks.

• Turnaround documents:

• Automated form completion.


 Transaction authorisation procedures.

 Batch totals.
• Independent reviews.

Application controls

Processing controls:
• AIM TO ENSURE THAT DATA WITHIN THE SYSTEM IS

CORRECTLY AND ACCURATELY PROCESSED.

 Run-to-run totals.

 Reconciliations.

 Batch totals.

 Sequence checks.

 Hash totals.

Application controls

Output controls:
• PROTECTACCESSTODIGITALOUTPUTS

(SEGREGATION OF DUTIES).

• Examples: access privileges, ability to generate reports, page numbering of reports and end-
of- report footers; integrated ERP system

• PHYSICALCONTROL.

• Example: confidential information should not be printed on a printer accessible by all staff.

• DATABASEQUERIES: DETECTINGIRREGULARITIESOR ANOMALIES.

• Example: queries of credit return to detect cash/AR fraud

Disaster control plan


Disaster recovery plans

Disaster types:
• Terrorism e.g., September 11.
• Natural disasters e.g., fire or flood, cyclones.
• Online operations e.g., web server going down.

Disaster recovery plan: the strategy that will be put into action, in the event of a disaster that
disrupts normal operations, ____________as soon as possible and _________that relate to its
processes.

Disaster recovery plans COMPONENTS

• Hot site • Cold site

• Evacuation staff: present at the location of the disaster.

• Access staff: after the disaster.

 Key employees in the recovery plan need to be contactable:

 Contact and staff responsibilities, role/s and reporting plan; drills; remote site staff.

• Extranets

• Need to consult with such partners and related bodies when developing plans

Limitations of internal control

The limitations of controls

Threats to an organisation’s objectives:

 Judgement error

 Unexpected transactions: designers of a control system cannot predict every possible


outcome and every future event.
 Collusion: when two or more people conspire to jointly commit a fraud.

 Management override: controls are only effective if management is ethical.

and responsible in promoting ‘good’ behaviour.

 Weak internal controls: controls that are poorly designed or weak.

 Conflicting signals: possibility that different signals are being sent by management to
employees.

An internal control system does not provide 100% assurance that an organisation’s
objectives will be achieved:

The limitations of controls

Additional threats to internal controls include:

 Management incompetence: incompetence at the top can flow down and impact on
the remainder of the organisation.

 External factors: external factors beyond our control that can have dramatic impacts
on an organisation e.g., natural disasters.

 Fraud: working around internal controls for personal gain.

 Regulatory environment: changes in the regulatory environment can

impact the way that organisations operate.

 Information technology: in a constant state of flux e.g., threats from viruses.

Key take away points.

Accounting and control activities was inter-related.

Types of controls based on how to deal with risk and where control activity takes place.

Aims of a computerised AIS

The components and importance of a disaster recovery plan were discussed.

Internal control is not foolproof, it is prone to risks and limitations.


.

Fresh foods should use SCM to address its challenges. Based off the information provided the
business has stated they are facing issues regarding its supply chain efficiency. This has led to
a reduced delivery success rate which has reduced customer satisfaction. SCM should be
integrated as it is the first issue to arise. Therefore, by eradicating the issue using SCM it will
act as a response to the logistical issue and a preventative issue for further customer
dissatisfaction. SCM involves establishing close relationships with suppliers and establishing
new production and logistical chains to better suit the forecast expansion of the business.
Fresh food has clear problems with meeting delivery time. This implies that its current
production facilities are either to small and not located near customers or perhaps both.
Therefore, Fresh food must consider expanding its manufacturing facilities or to solely invest
in new areas that are nearer to multiple suppliers. It is likely that Fresh foods current
suppliers are facing the same geographical constraint as the Fresh food. This relationship is
simply a survival relationship and will affect Fresh food’s ability to grow into the future. By
seeking a new manufacturing hub in an ideal location, a business in need of expansion and
radical redesign will be able to establish a bargaining power with new suppliers, therefore it
is clear that SCM can be utilised to eradicate the problem if Fresh foods moves its majority
manufacturing capacity to new preferred locations.

You might also like