Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

1

1. +Chapter One of information. More specifically, it is the study of complementary


A System: is a set of two or more interrelated components that networks that people and organizations use to collect, filter,
interact to achieve a goal. process, create and distribute data.
Need of Accounting Information Systems: The priority of clear Data: is raw, unorganized facts that need to be processed. Data
information, quick accessing, retrieve the information, storing can be something simple and seemingly random and useless until
information is day by day increasing. Because of that, achieving it is organized.
the goals and objectives, to show sincerity, efficiency, and honesty Information: When data is processed organized, structured or
in front of the government, people it is necessary. presented in a given context so as to make it useful, it is called
Basically, there are two types of essentialities for AIS: information.
1. Organization Essentialities: A transaction: is an event that affects or is of interest to the
a) Provide financial records to their bankers, government and organization and is processed by its information system as a unit
people in easy way. of work.
b) Set of procedures require to meet all of their government In accounting Information System, Transactions are divided into
obligations, such as remitting sales, income, and payroll taxes. two categories:
c) Deciding for product prices to face competition effectively, earn a) Financial Transaction: A financial transaction is an economic
sufficient profit. event that affects the assets and equities of the organization, is
d) Knowing for credit extension, on what terms, and how to reflected in its accounts, and is measured in monetary terms.
accurately track what customers owe and have paid. b) Nonfinancial Transactions: Nonfinancial transactions are
e) To Provide better training, hiring and supervising their events that do not meet the narrow definition of a financial
employees. transaction.
f) Keep the track of cash inflows and outflows f) Knowing for Components of Accounting Information System:
appropriate product mix and showroom space for carrying 1. Technology: Ability to plan and manage business operations
quantities etc. depends partly on knowledge of the technology available.
2. Essentialities of Accountants: Technology provides the foundation on which AIS and business
a) accounting system and financial reporting operations rest.
b) long term strategic planning 2. Databases: It is important to understand the variety of
c) Managing the Accounting and financing databases, both private and public; the quantity and type of data
d) Internal consulting available in these databases; and methods of retrieving those
e) short term budgeting data.
f). Financial and Economic analysis 3. Reporting: To design reports generated by an information
g). Process Improvement system, the accountant must know what outputs are required or
h). Computer systems and operations are desirable.
i). Performance evaluation of the organization 4. Control: Control is the mean by which we make sure the
j). Customer and product profitability analysis. etc. intended actually happens. Consider how much more difficult it
Accounting information systems (AISs): stand at the crossroads of will be to control modern, complex business processes.
two disciplines: ‘‘accounting’’ and ‘‘information systems.’’ 5. Business Operations: Organizations engage in activities or
Accounting information systems exists at the intersection of two operations, such as hiring employees, purchasing inventory, and
important disciplines: collecting cash from customers. An AIS operates in concert with
1. Accounting these business operations.
2. Information Systems 6. Events Processing: As organizations undertake their business
Accounting Information System: is a system that collects, records, operations, events, such as sales and purchases, occur. Data about
stores, and processes data to produce information for decision these events must be captured and recorded to reflect and
makers. monitor the business operations.
Functions of AIS: 7. Management Decision Making: The information used for a
1.Collects and Store Data: It collects and store data about events, decision must be tailored to the type of decision under
resources, and agents. consideration.
2.Transformation of Data: It transforms that data into information 8. System Development and Operation: Choosing the data for a
that management can use to make decisions about events, report, designing that report, and configuring an enterprise
resources, and agents. system are examples of systems development tasks that can be
3.Control: It Provides adequate controls to ensure that the entity’s accomplished by an accountant.
resources (including data) are: (a) Available when needed (b) 9. Communications: To present the results of their activities
Accurate and reliable effectively, accountants must possess strong oral and written
4.Communiction: It communicate the information to communication skills.
management and concerned parties who require the information. 10. Accounting and Auditing Principles: To design and operate the
2.Information System: accounting system, an accountant must know the proper
An information system (IS): is an organized system for the accounting procedures and must understand the audits to which
collection, organization, storage and communication the accounting information will be subjected.
2

The AIS is composed of three major subsystems: 4. Justifiable reliance-The misrepresentation must have resulted in
A. The Transaction Processing System (TPS): It is a process/system justifiable reliance upon information, which caused someone to
which divides/classifies the all-financial transactions in to three act
cycles. These are: 5. Injury or loss-The misrepresentation must have caused injury or
• Revenue Cycle loss
• Expenditure Cycle There are two levels of fraud: (1) Employee Fraud and (2)
• Conversion Cycle Management Fraud.
B. The General Ledger/Financial Reporting System (GL/FRS): A. Following are the kinds of Employee Fraud:
prepares the traditional financial statements, such as the income 1. Inventory theft
statement, balance sheet, statement of cash flows, tax returns, 2. Cash receipts theft
and other reports required by law. 3. Accounts payable fraud
C. The Management Reporting System (MRS): It prepares special- 4. Payroll fraud
purpose financial reports and information needed for decision 5. Expense account fraud
making by the management. These special reports are budgets, B. Management Fraud:
variance reports, and responsibility reports. 1. Increase stock price
There are Three transaction cycles process most of the firm's 2. Enhance chances for promotion, or avoid firing or demotion
economic activity: 3. Increase compensation
1. Expenditure Cycle 4. Delay cash flow problems or bankruptcy
2. Conver-sion Cycle Three categories of fraud schemes according to the Association
3. Revenue cycle of Certified Fraud Examiners:
These cycles exist in all types of businesses—both profit-seeking A. Fraudulent Statements:
and not-for-profit seeking. B. Corruption
The term “Ethics” is derived from the Greek word ethos which C. Asset Misappropriation
mean custom, habit, character or disposition. A. Fraudulent Statements: Fraudulent statements are associated
Meaning of Ethics: Broadly speaking, ethics is a branch of with management fraud. All fraud involves some form of financial
philosophy which seeks to address issues related to concepts of misstatement.
right and wrong. B. Corruption: There are four principal types of corruption:
Therefore, business ethics is a set of moral principles or values. i. Bribery: Bribery involves giving, offering, soliciting, or receiving
Ethical issues in business can be divided into four areas: things of value to influence an of-ficial in the performance of his
1.Equity: executive salaries, comparable worth, product pricing… or her lawful duties.
2.Rights: corporate due process, employee health screening, ii. Illegal Gratuities: An illegal gratuity involves giving, receiving,
employee privacy, sexual harassment, diversity, equal offering, or soliciting some-thing of value because of an official act
employment opportunity, whistle blowing… that has been taken.
3.Honesty: employee and management conflicts of interest, iii. Conflicts of Interest: occurs when an em-ployee acts on behalf
security of organization data and records, misleading advertising, of a third party during the discharge of his or her duties or has
questionable business practices in foreign countries, accurate self-interest in the ac-tivity being performed.
reporting of shareholder interest... iv. Economic Extortion: Economic extortion is the use (or threat)
4. Exercise of Corporate Power: political action committee, of force (including economic sanctions) by an individual or
workplace safety, product safety, environment issue, divestment organization to obtain something of value.
of interest, corporate political contributions, downsizing and plant 3. Asset Misappropriation
closures… i. Making charges to expense accounts to cover theft of asset
Following are the main computer ethics issues: (especially cash)
• Privacy ii. Lapping: using customer’s check from one account to cover
• Security—accuracy and confidentiality theft from a different account
• Ownership of property iii. Transaction fraud: deleting, altering, or adding false
• Artificial intelligence transactions to steal assets
• Misuse of computer Objectives of Internal Control:
Fraud: denotes a false representation of a material fact made by 1. Safeguard assets of the firm
one party to another party with the intent to deceive the other 2. Ensure accuracy and reliability of accounting records and
party. information
According to common law, a fraudulent act must meet the 3. Promote efficiency of the firm’s operations
following five conditions: 4. Measure compliance with management’s prescribed policies
1. False representation - false statement or disclosure and procedures
2. Material fact - a fact must be substantial in inducing someone Internal control consists of five components:
to act 1. The control environment,
3. Intent -Intent to deceive must exist 2. Risk assessment,
3. In-formation and communication,
3

4. Monitoring, 1. Sales Order Procedures: Sales order procedures include the


5. Control activities. following activities:
1. The Control Environment: Integrity and ethics of management, i. Receive Order: The sales process begins with the receipt of a
Organizational structure, Role of the board of directors and the customer order indicating the type and quantity of merchandise
audit committee, Management’s policies and philosophy, desired.
Delegation of responsibility and authority, Performance evaluation ii. Check Credit: Before processing the order further, the
measures, External influences—regulatory agencies customer's creditworthiness needs to be established. The
Policies and practices managing human resources circumstances of the sale will determine the nature and degree of
2. Risk Assessment: Identify, analyze and manage risks relevant to the credit check.
financial reporting, Changes in external environment, Risky iii. Pick Goods: The receive order activity forwards the stock
foreign markets, release document (also called the picking ticket) to the pick goods
Significant and rapid growth that strain internal controls, New function, in the warehouse. This document identifies the items of
product lines, Restructuring, downsizing, Changes in accounting inventory that must be located and picked from the warehouse
policies shelves.
3. Information and Communication: iv. Ship Goods: Before the arrival of the goods and the verified
Identifies and records all valid transactions, provides timely stock release document, the shipping department receives the
information in appropriate detail to permit proper classification packing slip and shipping notice from the receive order function.
and financial reporting, accurately measures the financial value of The packing slip will ultimately travel with the goods to the
transactions, accurately records transactions in the time period in customer to describe the contents of the order.
which they occurred v. Bill Customer: The shipment of goods marks the completion of
4. Monitoring: The process for assessing the quality of internal the economic event and the point at which the customer should
control design and operation, Separate procedures—test of be billed.
controls by internal auditors the billing function performs the following record keeping-
Ongoing monitoring, computer modules integrated into routine related tasks:
operations, management reports which highlight trends and - Records the sale in the sales journal.
exceptions from normal performance - Forwards the ledger copies of the sales order to the update
5. Control Activities: Control activities can be grouped into two accounts receivable task.
distinct categories: (A) in-formation technology (IT) controls and - Sends the stock release document to the update inventory
(B) physical controls. records task.
A. IT Controls: It relate specifically to the computer environment. vi. Update Inventory Records: The inventory control
There are two types of IT controls. function updates inventory subsidiary ledger accounts from
1. General controls: It relate to the entity wide computer information contained in the stock release document.
environment vii. Post to General Ledger: By the close of the transaction
2. Application controls: It ensure the integrity of specific systems processing period, the general ledger function has received
B. Physical Controls: It is primarily relating to human activities. journal vouchers from the billing and inventory control tasks and
There are six types of physical controls. an account summary from the AR function.
A. Transaction Authorization 2. Sales Return Procedures: Following activities are required for
B. Segregation of Duties sales return procedures:
C. Supervision i. Prepare Return Slip: When items are returned, the receiving
D. Accounting Records department employee counts, inspect, and prepare a return slip
E. Access Control describing the items.
F. Independent Verification ii. Prepare Credit Memo: Upon receipt of the return slip, the sales
Chapter Two employee prepares a credit memo. This document is the
the revenue cycle: the revenue cycle is the direct exchange of authorization for the customer to receive credit for the
finished goods or services for cash in a single transaction between merchandise returned.
a seller and a buyer. More complex revenue cycles process sales iii. Approve Credit Memo: The credit manager evaluates the
on credit. circumstances of the return and makes a judgment to grant (or
This time lag splits the revenue transaction into two phases: disapprove) credit. The manager then returns the approved credit
(1) the physical phase: involving the transfer of assets or services memo to the sales department.
or goods from the seller to the buyer. iv. Update Sales Journal: Upon receipt of the approved credit
(2) the financial phase: involving the receipt of cash by the seller memo, the transaction is recorded in the sales journal as a contra
in payment of the account receivable. entry.
Revenue cycle activities/components can be divided into three v. Update Inventory and AR Records: The inventory control
categories: function adjusts the inventory records and forwards the credit
1. Sales Order Procedures memo to accounts receivable, where the customer's account is
2. Sales Return Procedures also adjusted.
3. Cash Receipts Procedures
4

vi. Update General Ledger: Upon receipt of the journal voucher ledger requires additional financial information, such as a copy of
and account summary information, the general ledger function the supplier’s invoice when it arrives.
reconciles the figures and posts to the following control accounts. v. Set Up Accounts Payable: Finally, the AP clerk summarizes the
3. Cash Receipts Procedures: The sales order procedure described entries in the purchases journal for the period (or batch) and
a credit transaction that resulted in the establishment of an prepares a journal voucher for the general ledger function.
account receivable. Cash receipts procedures apply to this future vi. Post to General Ledger: The general ledger function receives a
event. Following are activities in these procedures: journal voucher from the AP department and an account
i. Open Mail and Prepare Remittance Advice: A mail room summary from inventory control.
employee opens envelopes containing customers' payments and The cash disbursements system: processes the payment of
remittance advices. Remittance advices contain information obligations created in the purchases system. The principal
needed to service individual customers' accounts. This includes objective of this system is to ensure that only valid creditors
payment date, account number, amount paid, and customer receive payment and that amounts paid are timely and correct. It
check number. performs the following activities:
ii. Record and Deposit Checks: A cash receipts employee verifies i. Identify Liabilities Due: The cash disbursements process begins
the accuracy and completeness of the checks against the prelist. in the AP department by identifying items that have come due.
iii. Update Accounts Receivable: The remittance advices are used Each day, the AP function reviews the open AP file (or vouchers
to post to the customers' accounts in the AR subsidiary ledger. payable file) for such items and sends payment approval in the
iv. Update General Ledger: Upon receipt of the journal voucher form of a voucher packet (the voucher and/or supporting
and the account summary, the general ledger function reconciles documents) to the cash disbursements department.
the figures, posts to the cash and AR control accounts, and files ii. Prepare Cash Disbursement: The cash disbursements clerk
the journal voucher. receives the voucher packet and reviews the documents for
v. Reconcile Cash Receipts and Deposits: Periodically (weekly or completeness and clerical accuracy. clerk prepares a check and
monthly), a clerk from the controller's office reconciles cash records the check number, dollar amount, voucher number, and
receipts and deposits. other pertinent data in the check register, which is also called the
Revenue Cycle Controls: Generally, six classes of internal control cash disbursements journal.
activities that guide in designing and evaluating transaction iii. Update AP Record: Upon receipt of the voucher packet, the AP
processing controls. They are: clerk removes the liability by debiting the AP subsidiary account
• transaction authorization, or by recording the check number and payment date in the
• Segregation of Duties voucher register.
• Supervision iv. Post to General Ledger: The general ledger function receives
• Accounting Records the journal voucher from cash disbursements and the account
• Access Control summary from AP. The voucher shows the total reductions in the
• Independent Verification firm’s obligations and cash account as a result of payments to
the expenditure cycle: the objective of the expenditure cycle is to suppliers. These numbers are reconciled with the AP summary,
convert the organization's cash into the physical materials and the and the AP control and cash accounts in the general ledger are
human resources it needs to conduct business. updated accordingly.
There are two processes that constitute the expenditure cycle for Expenditure Cycle Controls: This section describes the primary
most retail, wholesale, and manufacturing organizations. These internal controls in the expenditure cycle. It includes the following
are (1) Purchases and Cash Disbursements Procedures (2) Payroll steps
Processing and Fixed Asset Procedures 1. Transaction Authorization: It include:
1.Purchases Processing Procedures: Following activities are • Purchases Subsystem
performing in the Purchases Processing Procedures: • Cash Disbursements Subsystem
i. Monitor Inventory Records: When inventories drop to a 2. Segregation of Duties: It include:
predetermined reorder point, a purchase requisition is prepared • Segregation of Inventory Control from the Warehouse
and sent to the prepare purchase order function to initiate the • Segregation of the General Ledger and Accounts Payable
purchase process. from Cash Disbursements
ii. Prepare Purchase Order: The prepare purchase order function • Inspection of Assets
receives the purchase requisitions, which are sorted by vendor if • Check the theft of Assets
necessary. 3. Accounting Records: The control objective of accounting
iii. Receive Goods: The next event in the expenditure cycle is the records is to maintain an audit trail adequate for tracing a
receipt of the inventory. Goods arriving from the vendor are transaction from its source document to the financial
reconciled with the blind copy of the PO. The purpose of the statements. The expenditure cycle employs the following
blind copy is to force the receiving clerk to count and inspect accounting records: AP subsidiary ledger, voucher register,
inventories prior to completing the receiving report. check register, and general ledger.
iv. Update Inventory Records: Organizations uses different 4. Access Controls: In the expenditure cycle, a firm must
inventory valuation methods, so updating an actual cost inventory control direct and indirect access to physical assets such as
5

cash and inventory. These control concerns are essentially unsigned checks
the same as in the revenue cycle. vi. Independent Verification: It includes:
5. Independent Verification: It includes - • verification of time cards
• Independent Verification by Accounts Payable • distribution of paychecks to authorized employees
• Independent Verification by The General Ledger Department • verification of accuracy of payroll registers by A/P dept.
Payroll Cycle Activities: Following are the payroll activities • G/L dept. reconciles the labor distribution summary and
1. Update payroll master file: Updating the payroll master file the payroll disbursement voucher
includes changes such as i) new hires, ii) terminations iii) fixed asset procedures: are the property, plant, and equipment
changes in pay rates, and iv) changes in discretionary used in the operation of a business. The process involves three
withholdings categories of tasks:
2. Validate time and attendance data 1. Asset Acquisition
3. Prepare payroll: Procedures i. The payroll transaction file is 2. Asset Maintenance
sorted by employee number. ii. The sorted time-data file is 3. Asset Disposal
then used to prepare employee paychecks. iii. Next, all payroll The Conversion Cycle/Production Cycle:
deductions are summed and the total is subtracted from gross A company's conversion cycle transforms (converts) input
pay to obtain net pay. iv. Once net pay is obtained, the year-to- resources, such as raw materials, labor, and overhead, into
date fields for gross pay, deductions, and net pay in the payroll finished products or services for sale.
master file are updated. Four basic activities in the production cycle are as follows:
v. Finally, the payroll registers and employee paychecks are 1 Product design
printed. 2 Planning and scheduling
The payroll register is a report that lists each employee’s 3 Production operations
gross pay, payroll deductions, and net pay. 4 Cost accounting
4. Disburse payroll: The following procedures are followed: i. 1. Product Design: The first step in the production cycle is product
Once pay slips have been prepared, the payroll register is sent to design. The objective of this activity is to design a product that
the accounts payable department for review and approval. meets customer requirements for quality, durability, and
ii. A disbursement voucher is then prepared to authorize the functionality while simultaneously minimizing production costs.
transfer of funds from the company's general checking account to The product design activity creates two main documents: 1 Bill of
its payroll bank account. iii. The disbursement voucher and payroll materials 2 Operations list
register are then sent to the cashier. 2.Planning and Scheduling: The second step in the production
iv. The cashier reviews the payroll register and disbursement cycle is planning and scheduling.
voucher and then prepares and signs a check transferring funds to The objective of this step is a production plan efficient enough to
the company's payroll bank account. The cashier also reviews/ meet existing orders and anticipate short-term demand without
signs, and distributes the employee paychecks. v. The payroll creating excess finished goods inventories.
register is then returned to the payroll department. Methods of Production Planning:
5. Disburse payroll taxes and miscellaneous deductions. Payroll - Manufacturing resource planning (MRP-II): It is an extension of
is an AIS application that is processed in the batch mode. materials resource planning that seeks to match existing
Payroll controls/ control of payroll frauds: production capacity and raw materials needs with forecasted sales
i. transaction authorization: It helps to prevent: demands.
a. Terminated employees from receiving checks - Just-in-time (JIT) manufacturing systems:
b. Wage rates from being improperly changed for current The goal of JIT is to minimize inventories of raw materials, work in
employees process, and finished goods.
ii. Segregation of Duties: Timekeeping and personnel functions 3.Production Operations: is the actual manufacture of products.
should be separated Every firm needs to collect data about the following four facets of
iii. Supervision: It need to monitor employees to ensure they are its production operations:
not “clocking in” for one another • Raw materials used
iv. Accounting Records: Audit trail of accounting records is • Labor-hours expended
required and includes the audit of the following documents: • Machine operations performed
• time cards • Other manufacturing overhead costs incurred
• job tickets 4. Cost Accounting: Objectives of the cost accounting system
• disbursement vouchers • To provide information for planning, controlling, and
• labor distribution summary evaluating the performance of production operations
• payroll register • To provide accurate cost data about products for use in
• subsidiary ledger accounts pricing and product mix decisions
• general ledger accounts • To collect and process the information used to calculate
v. Access Controls: It need to prevent employees from having the inventory and cost of goods sold values
improper access to: Methods of cost accounting used in production cycle:
accounting records, such as time cards which can be altered
6

1.Job-order costing: Job-order costing assigns costs to specific 5. User-Friendly: Data is easier to access and manipulate with a
production batches or to individual jobs. DBMS than without it. In most cases, DBMSs also reduce the
2. Process costing: Process costing assigns costs to each process, reliance of individual users on computer specialists to meet their
and then calculates the average cost for all units produced data needs.
The AIS is composed of three major subsystems: 6. Improved Security: Through the use of passwords, database
1. The Transaction Processing System (TPS): management systems can be used to restrict data access to only
2. The General Ledger/Financial Reporting System: those who should see it.
3. The Management Reporting System (MRS): Disadvantages of a DBMS:
The general ledger/financial reporting system (GL/FRS): which There are basically two major downsides to using DBMSs. One of
produces the traditional financial statements, such as the income these is cost, and the other the threat to data security.
statement, balance sheet, statement of cash flows, tax returns, i. Cost: Implementing a DBMS system can be expensive and
and other reports required by law. time-consuming, especially in large organizations. Training
Financial reporting system: is the process of producing requirements alone can be quite costly.
statements that disclose an organization's financial status to ii. Security: Even with safeguards in place, it may be possible for
management, investors and the government. These statements some unauthorized users to access the database. Once an
are income statements, balance sheets, cash flow statement and unauthorized user gets into the database, they have access to
tax return etc. all the files, not just a few.
The management reporting system (MRS): which provides Database Abstraction: Major purpose of DBMS is to provide the
internal management with special-purpose financial reports and users only that much information that is required by them
information needed for decision making such as budgets, variance 1. INTERNAL LEVEL (PHYSICAL LEVEL)
reports, and responsibility reports. It describes how data are actually stored on the storage medium.
Chapter Three It is closest to database programmer.
Data: It include raw fact, unprocessed fact and figures. Lowest level of database abstraction.
Base: Place where data stored. 2. CONCEPTUAL LEVEL
Information: Data that has been interpreted and processed It describes what data are actually stored in database.
Meaning of Database: A collection of data is referred to as It is closest to the database manager.
database. It is an intermediate level of database abstraction.
DBMS: is a software that allows a computer to perform database 3.EXTERNAL LEVEL (VIEW LEVEL)
functions of storing, retrieving, editing, deleting and modifying It describes the way in which the data are viewed by individual
data into the database. user.
These programmes /software are: Oracle, Sybase, My SOL, It is the level closest to the users.
Microsoft SOL Server. There are three type of Data Models
The person responsible for the database is known as database 1. Relational Data Model: the data is stored in the form of tables,
administrator the user may insert new tuples(Rows), delete tuples, and modify
DBMS is used in the following sector: tuples.
• Banking: all transactions 2. Network Data Model: In this model data is represented by
• Airlines: reservations, schedules collections of records and relationships among data are
• Universities: registration, grades represented by links.
• Sales: customers, products, purchases Record: It is the collection attributes, each of which contains only
• Manufacturing: production, inventory, orders, supply one data value
chain Link: It is an association between two record
• Human resources: employee records, salaries, tax 3. Hierarchical Data Model: It is similar to that of Network Data
deductions. Model. The only difference is that hierarchical model; records are
Advantages of a DBMS: organized as trees rather than arbitrary graph.
1. Improved Availability: One of the principle advantages of a Some Basic Terminologies in Relational Data Model
DBMS is that the same information can be made available to Relation: A relation is a table i.e. data is arranged in rows and
different users. columns.
2. Minimized Redundancy: The data in a DBMS is more concise Tuple: The rows of tables are generally referred to as tuples.
because, as a general rule, the information in it appears just once. Attributes: The columns of tables are generally referred to as
This reduces data redundancy, or in other words attributes.
3. Accuracy: Accurate: consistent, and up-to-date data is a sign of Degree: The number of attributes in a relation determine the
data integrity. degree of the relation.
4. Program and File Consistency: Using a database management Cardinality: The number of tuples in a relation is called the
system, file formats and system programs are standardized. This cardinality of the relation.
makes the data files easier to maintain because the same rules The REA (acronym for resources, events, and agents) model: is an
and guidelines apply across all types of data. accounting framework for modeling an organization's critical
resources, events, and agents and the relationships between
7

them. Unlike some traditional accounting systems, REA systems • To integrate financial data and systems
permit both accounting and non-accounting data to be identified, • To standardize manufacturing processes
captured, and stored in a centralized database. • To standardize HR information
The REA data model provides structure in two ways: • Timely availability of information.
1.By identifying what entities should be included in the AIS There are three ways of organizing ERP:
database 1.Big Bang
2. By prescribing how to structure relationships among the 2.Franchising Strategy
entities in the AIS database. 3.Slam Dunk
Elements of an REA Model: 1.Big Bang: In this most ambitious and difficult of approaches to
Following are the elements of REA model: ERP implementation, companies give up all their legacy at once
R=Resources: Resources are things the company owns, controls, and implement a single ERP system across entire company.
sells, etc. These include the following: Getting everyone to cooperate and accept a new software system
Inventories at the same time is a tremendous effort. Largely because no one
Cash (accounts at the bank) in the company has any experience of using it.
Equipment 2.Franchising Strategy: It suits to large and diverse companies
Property that do not share many common processes
E=Events: Events are transactions such as: Economic transactions, Independent ERP systems are installed in each unit, while linking
Sales, Cash receipts, Purchases, Cash disbursements. common processes across the enterprise
A=Agents: are People or Organizations, Employees, Customers, Systems link together only to share necessary information to get a
clients, Suppliers, vendors. big picture across all business units
It can be concluded that five forms of associations (minimum- 3.Slam Dunk: Generally smaller companies expecting to grow into
maximum cardinalities) are used when constructing the REA ERP
model: Focus is just on few key process.
zero-to-one (0,1) Can be used as an infrastructure to support more diligent
zero-to-many (0, M) installation efforts down the road.
one-to-one (1,1) MRP Systems: Computer technique for taking a product schedule
one-to-many (1, M) as I/P and generating works and purchase orders as O/P
many-to-many (M, M)—rare MRP II Systems: Tended to be so wide in scope giving IT support
Advantages of the REA Model: to all parts of manufacturing company.
i. Elimination of non-value added activities: It helps managers to 1. ERP (Enterprise Resource Planning) Software Package: SAP
identify non-value added activities that can be eliminated. It (System, Application & Products in Data Processing
increased productivity via elimination of non-value added 2. Advanced Business Applications Program(ABAP): ABAP is the
activities generates excess capacity programming language of SAP. It is design to be both platform and
ii. Reduces multiple data collection and storage: Storing both data base independent
financial and nonfinancial data in the same central database Electronic commerce: involves the electronic processing and
reduces multiple data collection, data storage, and maintenance transmission of data. Activities, including the electronic buying
iii. Support decision making: Detailed financial and nonfinancial and selling of goods and services, online delivery of digital
business data supports a wider range of management decisions products, electronic funds transfer (EFT), electronic trading of
iv. Competitive advantages from the REA approach can be see via stocks, and direct consumer marketing primarily the internet.
value chain analysis: Value chain analysis distinguishes between There are primarily five types of e-commerce models they are
primary activities (create value) and support activities (assist explained as following:
performing primary activities). 1. Business to Consumer (B2C): B2C stands for Business to
Meaning of ERP System: Multi-module application software that Consumer as the name suggests, it is the model taking
helps a company to manage the important parts of its business in businesses and consumers interaction. Online business
an integrated fashion. sells to individuals. The basic concept of this model is to
Features of ERP System: sell the product online to the consumers. It provides
smooth and seamless flow of information across organizational direct selling through online.
boundaries 2. Business to Business: It consists of largest form of E-
standardized environment with shared database independent of Commerce. This model defines that Buyer and seller are
applications and integrated applications two different entities. It is similar to manufacturer issuing
Earlier Used Software: goods to the retailer or wholesaler.
1.ERM (Enterprise Resource Management) Encompasses 3. Consumer to Consumer: It helps the online dealing of
accounting, HR& material management goods or services among people. Though there are no
ERP = ERM + APPLICATIONS major parties needed but the parties will not fulfill the
2.MRP (Material Requirement Planning) This aim to keep right transactions without the program which is supplied by
inventories on hand the online market dealer such as eBay and OLX is
Importance of ERP: provided the services to buy and sell 2nd hand goods.
8

4. A peer-to-peer (P2P): is a decentralized model whereby Chapter Four


two individuals interact to buy sell goods and services Systems Development Life Cycle: is the process for planning,
directly with each other or produce goods and service creating, testing, and deploying an information system. This is also
together, without an intermediary third-party or the use called Software Development Life Cycle.
of an incorporated entity or business firm. Phases of Systems Development Life Cycle: Once the business
5. Mobile-Commerce: It deals with conducting the requirement is finalized than the next step will be the System
transactions with the help of mobile. The mobile device Development Life cycle or Software Development Life Cycle
consumers can interact each other and can lead the There are six phases of system development life cycle. These are
business. Mobile Commerce involves the change of as follows:
ownership or rights to utilize goods and related services. 1. Feasibility Study
Advantages of E- Commerce: 2. Analysis
• Access to a worldwide customer and/or supplier base. 3. Designing
• Reductions in inventory investment and carrying costs. 4. Coding
• The rapid creation of business partnerships to fill market 5. Testing
niches as they emerge. 6. Delivery and Maintenance
• Reductions in retail prices through lower marketing costs. 1. Feasibility Study: This is the first phase of SDLC. In this phase,
• Reductions in procurement costs. business analysis team collect information. There are several steps
• Better customer service. involved in this phase. Business analysis team generally use one
Disadvantages of E- Commerce There are two type of risk in E- formula to collect information. Formula is known as TELOS.
Commerce T=Technical Feasibility: As per the client requirement, the
Intranet Risks company analysis that their software, hardware requirement as
Internet Risks well as staff member existed or not
1. Intranet Risks: Intranets are used to connect employees within E=Economic Feasibility: Company will look at the budget and
a single building, between buildings on the same physical decide whether the budget is enough to complete the project or
campus(LANs), and between geographically dispersed not.
locations(WANs). Intranet risk may be in following form L=Legal Feasibility: As per the rule of cyber law, the project is
i. Interception of Network Messages: The unauthorized permissible or not
interception of this information like user IDs, passwords, O=Operational Feasibility: Whatever the clients or users is
confidential e-mails, and financial data files by any employee on expecting operations, can the company developed or company
the network is called sniffing. can explain.
ii. Access to Corporate Databases: Intranets connected to central S= Schedule: Within the time, whatever the client requirement
corporate databases increase the risk that an employee will view, can be to deliver or not
corrupt, change, or copy data. 2. Analysis: After the completion of first phase, Developer will find
iii. Privileged Employees: Information systems employees within d out the business requirement. All business requirement will be
the organization are another group empowered with override writing in one document which is called Business Design
privileges that may permit access to mission-critical data. Document(BDD).
2. Internet Risks: This risk is faced by the Consumer as well as the 3. Designing: SRS document is an input document. Designing is
Business done in two level.
(a) Risks to Consumers: i. High level designing: It means main modules. It is done by
Theft of Credit Card Numbers project manager.
Theft of Passwords ii. Low level designing: It means sub modules and child modules.
Consumer Privacy It is done by project leader.
Cookies and Consumer Security This phase has a document. It is called Project Designing
(b) Risks to Businesses: These are followings Document(PDD). And it is input document for the next phase.
i. IP Spoofing: IP spoofing is a form of masquerading to gain 4. Coding: The Software development team are developing total
unauthorized access to a Web server and/or to perpetrate an source code on specific technology like JAVA, DOT NET and PHP
unlawful act without revealing one's identity. etc.
ii. Denial of Service Attack: A denial of service attack (Dos) is an Once they implemented source code on specific technology
assault on a Web server to prevent it from servicing its legitimate successful then there will be build and build will be input for next
users. phase testing.
iii. Other Malicious Programs: Viruses and other forms of 5. Testing: Build is the input for the testing team and testing phase
malicious programs such as worms, logic bombs, and Trojan has its own life cycle. This is called Software Testing Life
horses pose a threat to both Internet and intranet users. Cycle(STLC).
STLC has six phases. These are as follows.
• Test Planning
• Test Designing
• Test Execution
9

• Result Analysis
• Bug (Defect)Tracking
• Bug Reporting
6. Delivery and Maintenance: Delivery is process through which
the software will be handover to the client. Before handover the
software to client, there are two test. These test are known as
Alpha test and Beta test. It is known as user acceptance testing.
Alpha Testing: In this test one person of client company will come
to the software developing company for verifying their each and
every application are properly working or not in the developing
company location.
Beta Testing: This is the test made the client company by their
own team or by third party at their own company location. Once
both the test successfully completed, the delivery process will be
closed.

You might also like