Professional Documents
Culture Documents
ebook download (Original PDF) Core Concepts of Accounting Information Systems, 14th Edition all chapter
ebook download (Original PDF) Core Concepts of Accounting Information Systems, 14th Edition all chapter
http://ebooksecure.com/product/ebook-pdf-core-concepts-of-
accounting-information-systems-13th/
http://ebooksecure.com/product/ebook-pdf-core-concepts-of-
accounting-information-systems-canadian-edition/
http://ebooksecure.com/product/ebook-pdf-accounting-information-
systems-14th-edition/
http://ebooksecure.com/product/accounting-information-
systems-14th-edition-ebook-pdf/
(eBook PDF) Accounting Information Systems 14th Global
Edition
http://ebooksecure.com/product/ebook-pdf-accounting-information-
systems-14th-global-edition/
https://ebooksecure.com/download/principles-of-information-
systems-ebook-pdf-2/
http://ebooksecure.com/product/ebook-pdf-accounting-information-
systems-10th-edition/
http://ebooksecure.com/product/ebook-pdf-accounting-information-
systems-3rd-edition/
http://ebooksecure.com/product/ebook-pdf-accounting-information-
systems-13th-edition/
k
Trim size: 8in x 10in Simkin fbetw.tex V1 - 12/27/2017 3:36 P.M. Page vi
k k
k
k
Trim size: 8in x 10in Simkin fpref.tex V1 - 12/27/2017 3:36 P.M. Page vii
PREFACE
The content of AIS courses varies widely from school to school. Some schools use their
AIS courses to teach accounting students how to use computers. In other colleges and
universities, the course focuses on business processes and data modeling. Yet other
courses emphasize transaction processing and accounting as a communication system
that has little to do with the technical aspects of how systems gather, process, or store
underlying accounting data.
vii
k
k
Trim size: 8in x 10in Simkin fpref.tex V1 - 12/27/2017 3:36 P.M. Page viii
viii Preface
Given the variety of objectives for an AIS course and the different ways that instruc-
tors teach it, we developed a textbook that attempts to cover the core concepts of
AIS. In writing the text, we assumed that students have completed basic courses in
financial and managerial accounting and have a basic knowledge of computer hard-
ware and software concepts. The text is designed for a one-semester course in AIS and
may be used at the community college, baccalaureate, or graduate level.
Our hope is that individual instructors will use this book as a foundation for an AIS
course, building upon it to meet their individual course objectives. Thus, we expect that
many instructors will supplement this textbook with other books, cases, software, or
readings. The arrangement and content of the chapters permits flexibility in covering
subject materials and allows instructors to omit chapters that students have covered in
prior courses.
Special Features
This edition of our book uses a large number of special features to enhance the cov-
erage of chapter material as well as to help students understand chapter concepts.
Thus, each chapter begins with a list of learning objectives that emphasize the impor-
tant subject matter of the chapter. This edition of the book also includes many new
real world Cases-in-Point, which we include to illustrate a particular concept or proce-
dure. Each chapter also includes a more-detailed real-world case as an end-of-chapter
AlS-at-Work feature.
k Each chapter ends with a summary and a list of key terms. To help students under- k
stand the material, each chapter includes multiple-choice questions for self-review with
answers. There are also three types of end-of-chapter exercises: (1) discussion ques-
tions, (2) problems, and (3) case analyses. This wide variety of review material enables
students to examine many different aspects of each chapter’s subject matter and also
enables instructors to vary the exercises they use each semester.
The end-of-chapter materials include references and other resources that allow
interested students to explore the chapter material in greater depth. In addition, instruc-
tors may wish to assign one or a number of articles listed in each chapter refer-
ence section to supplement chapter discussions. These articles are also an important
resource for instructors to encourage students to begin reading such professional jour-
nals as Strategic Finance, The Journal of Accountancy, and The Internal Auditor.
Supplements
There are a number of supplements that accompany this textbook. One is an instruc-
tor’s manual containing suggested answers to the end-of-chapter discussion questions,
problems, and case analyses. There is also a test bank consisting of true-false, multiple
choice, and matching-type questions, as well as short answer problems and fill-in-
the-blank questions, so that instructors have a wide variety of choices. In addition,
PowerPoint lecture slides accompany the text, and all of these materials can be accessed
from the book’s companion website at www.wiley.com/college/simkin.
k
k
Trim size: 8in x 10in Simkin fpref.tex V1 - 12/27/2017 3:36 P.M. Page ix
Preface ix
This edition of our book includes a number of changes from prior editions.
Acknowledgements
We wish to thank the many people who helped us during the writing, editing, and
production of our textbook. Our families and friends are first on our list of acknowl-
edgments. We are grateful to them for their patience and understanding as we were
revising this textbook. Next, we thank those instructors who read earlier drafts of
this edition of our textbook and provided enormously valuable ideas and suggestions
to improve the final version. Chief among these is Timothy L. Baker, University of
South Carolina Aiken, who was invaluable in improving the quality and content for
chapters 4, 6, 7, 10, and 11, as well as providing timely feedback on many others.
k
k
Trim size: 8in x 10in Simkin fpref.tex V1 - 12/27/2017 3:36 P.M. Page x
x Preface
We would also like to acknowledge the timely assistance of Paul M. Di Gangi, Univer-
sity of Alabama at Birmingham, who stepped in on short notice to provide technical
assistance and review on chapters 14 through 16.
In addition, we are indebted to the many adopters of our book who frequently
provide us with feedback. We’d also like to thank the following people who provided
feedback for the Fourteenth Edition:
Mark G. Simkin
k James L. Worrell k
Arline A. Savage
k
k
CONTENTS
CHAPTER 1 Accounting Information Systems and the Security/ 53
Accountant/ 1 Spam, Phishing, Spoofing, and Ransomware/ 53
1.1 Introduction: Why Study Accounting Information Firewalls, Intrusion Detection Systems,
Systems?/ 1 Value-Added Networks, and Proxy Servers/ 54
1.2 Careers in Accounting Information Systems/ 2 Data Encryption/ 57
Traditional Accounting Career Opportunities/ 2 Digital Signatures and Digital Time
Systems Consulting/ 2 Stamping/ 58
Fraud Examiner or Forensic Accountant/ 3
Information Technology Auditing and Security/ 4 CHAPTER 3 Information Technology and AISs/ 69
Predictive Analytics/ 5 3.1 Introduction/ 69
1.3 Accounting and IT/ 6 3.2 The Importance of Information Technology to
Financial Accounting/ 6 Accountants/ 70
Managerial Accounting/ 9 Six Reasons/ 70
Auditing/ 12 The Top 10 Information Technologies/ 71
Taxation/ 14 3.3 Input, Processing, and Output Devices/ 72
1.4 What Are Accounting Information Systems?/ 14 Input Devices/ 72
Accounting Information Systems/ 14 Central Processing Units/ 78
The Role of Accounting Information Systems in Output Devices/ 80
Organizations/ 18 3.4 Secondary Storage Devices/ 81
1.5 What’s New in Accounting Information Magnetic (Hard) Disks/ 82
Systems?/ 19 CD-ROMs, DVDs, and Blu-Ray Discs/ 83
Cloud Computing—Impact for Accountants/ 19 Flash Memory/ 84
Corporate Responsibility Reporting/ 20 Image Processing and Record Management
k Suspicious Activity Reporting/ 21 Systems/ 84 k
Forensic Accounting, Governmental Accountants, 3.5 Data Communications and Networks/ 85
and Terrorism/ 22 Communication Channels and Protocols/ 85
Corporate Scandals and Accounting/ 22 Local and Wide Area Networks/ 86
Client/Server Computing/ 89
Wireless Data Communications/ 90
CHAPTER 2 Accounting on the Internet/ 32 Cloud Computing/ 93
2.1 Introduction/ 32 3.6 Computer Software/ 93
2.2 The Internet and World Wide Web/ 33 Operating Systems/ 93
Internet Addresses and Software/ 33 Application Software/ 94
Intranets and Extranets/ 34 Programming Languages/ 95
The World Wide Web, HTML, and IDEA/ 35
Groupware, Electronic Conferencing, and CHAPTER 4 Accounting and Data Analytics/ 109
Blogs/ 35 4.1 Introduction/ 109
Social Media and Its Value to Accountants/ 36 4.2 Big Data/ 110
2.3 XBRL—Financial Reporting on the Internet/ 37 Volume/ 110
XBRL Instance Documents and Taxonomies/ 38 Velocity/ 110
The Benefits and Drawbacks of XBRL/ 38 Variety/ 111
The Current Status of XBRL/ 40 Veracity/ 112
2.4 Electronic Business/ 41 4.3 Analyzing Data/ 112
e-Accounting/ 41 Data Procurement/ 113
Retail Sales/ 42 Data Provisioning/ 115
E-Payments, E-Wallets, and Virtual Data Analysis/ 116
Currencies/ 43 Presentation/ 117
B2C, B2B, and C2C E-Commerce/ 46 4.4 Enabling Technologies and Tools/ 118
Electronic Data Interchange/ 47 Data Access/ 118
Cloud Computing/ 48 Analysis and Data Visualization Tools/ 121
2.5 Privacy and Security on the Internet/ 51 4.5 Data Analytics and the Accounting
Identity Theft and Privacy/ 51 Profession/ 123
xi
k
k
xii Contents
k
k
Contents xiii
9.3 The Production Process/ 272 Evaluating the Effectiveness of Information Systems
Objectives of the Production Process/ 272 Controls/ 335
Inputs to the Production Process/ 277 11.3 The Information Technology Auditor’s Toolkit/ 337
Outputs of the Production Process/ 278 Auditing Software/ 337
9.4 The Financing Process/ 279 People Skills/ 340
Objectives of the Financing Process/ 279 11.4 Auditing Computerized Accounting Information
Inputs to the Financing Process/ 281 Systems/ 340
Outputs of the Financing Process/ 281 Testing Computer Programs/ 341
9.5 Business Processes in Special Industries/ 282 Validating Computer Programs/ 342
Professional Service Organizations/ 283 Review of Systems Software/ 343
Not-for-Profit Organizations/ 283 Validating Users and Access Privileges/ 344
Health Care Organizations/ 285 Continuous Auditing/ 345
9.6 Business Process Reengineering/ 287 11.5 Information Technology Auditing Today/ 347
Why Reengineering Sometimes Fails/ 288 Information Technology Governance/ 347
The Sarbanes–Oxley Act of 2002/ 347
Auditing Standard No. 2201 (AS 2201)/ 349
CHAPTER 10 Cybercrime, Fraud, and Ethics/ 296 ISACA Information Technology Assurance
10.1 Introduction/ 296 Framework/ 350
10.2 Cybercrime and Fraud/ 297 IIA’s Global Technology Audit Guides and Guide to
Distinguishing between Cybercrime and the Assessment of IT Risk series/ 351
Fraud/ 297
Cybercrime Legislation/ 300
Cybercrime Statistics/ 303 CHAPTER 12 Documenting Accounting Information
10.3 Examples of Cybercrime/ 304 Systems/ 358
Compromising Valuable Information/ 304 12.1 Introduction/ 358
k Hacking/ 305 12.2 Why Documentation is Important/ 359 k
Denial of Service/ 307 12.3 Primary Documentation Tools/ 362
10.4 Preventing and Detecting Cybercrime and Data Flow Diagrams/ 363
Fraud/ 309 Document Flowcharts/ 368
Enlist Top-Management Support/ 309 System Flowcharts/ 372
Increase Employee Awareness and 12.4 Other Documentation Tools/ 377
Education/ 309 Program Flowcharts/ 378
Assess Security Policies and Protect Decision Tables and Decision Trees/ 379
Passwords/ 310 Software Tools for Graphical Documentation and
Implement Controls/ 311 SOX Compliance/ 381
Identify Computer Criminals/ 312 12.5 End-User Computing and Documentation/ 383
Maintain Physical Security/ 313 The Importance of End-User Documentation/ 383
Recognize the Symptoms of Employee Fraud/ 314 Policies for End-User Computing and
Use Data-Driven Techniques/ 316 Documentation/ 385
Employ Forensic Accountants/ 316
10.5 Ethical Issues, Privacy, and Identity Theft/ 317
Ethical Issues and Professional CHAPTER 13 Developing and Implementing Effective
Associations/ 317 Accounting Information Systems/ 398
Meeting the Ethical Challenges/ 318 13.1 Introduction/ 398
Privacy/ 319 13.2 The Systems Development Life Cycle/ 399
Company Policies with Respect to Privacy/ 320 Four Stages in the Systems Development Life
Identity Theft/ 320 Cycle/ 399
Systems Studies and Accounting Information
Systems/ 401
CHAPTER 11 Information Technology Auditing/ 329 13.3 Systems Planning/ 401
11.1 Introduction/ 329 Planning for Success/ 401
11.2 The Audit Function/ 330 Investigating Current Systems/ 403
Internal versus External Auditing/ 330 13.4 Systems Analysis/ 403
Information Technology Auditing/ 331 Understanding Organizational Goals/ 403
k
k
xiv Contents
Systems Survey Work/ 404 CHAPTER 15 Organizing and Manipulating the Data in
Data Analysis/ 406 Databases/ 462
Evaluating System Feasibility/ 406 15.1 Introduction/ 462
13.5 Detailed Systems Design and Acquisition/ 408 15.2 Creating Database Tables in Microsoft
Designing System Outputs, Processes, and Access/ 463
Inputs/ 409 Database Management Systems/ 463
The System Specifications Report/ 412 Using Microsoft Access/ 463
Choosing an Accounting Information Creating Database Tables/ 464
System/ 413 Creating Relationships/ 466
Outsourcing/ 416 15.3 Entering Data in Database Tables/ 468
13.6 Implementation, Follow-Up, and Creating Records/ 468
Maintenance/ 417 Ensuring Valid and Accurate Data Entry/ 469
Implementation Activities/ 417 Tips for Creating Database Tables and
Managing Implementation Records/ 472
Projects/ 419 15.4 Extracting Data from Databases: Data Manipulation
Postimplementation Review/ 421 Languages (DMLs)/ 473
System Maintenance/ 422 Creating Select Queries/ 473
Creating Action Queries/ 477
Guidelines for Creating Queries/ 478
CHAPTER 14 Database Design/ 434
Structured Query Language (SQL)/ 478
14.1 Introduction/ 434 Sorting, Indexing, and Database
14.2 An Overview of Databases/ 434 Programming/ 479
What Is a Database?/ 435
Significance of Databases/ 435
CHAPTER 16 Database Forms and Reports/ 490
Storing Data in Databases/ 437
Additional Database Issues/ 439 16.1 Introduction/ 490
k 14.3 Steps in Developing a Database Using the 16.2 Forms/ 490 k
Resources, Events, and Agents (REA) Creating Simple Forms/ 492
Approach/ 442 Using Forms for Input and Output Tasks/ 496
Step 1—Identify Business and Economic Subforms: Showing Data from Multiple
Events/ 443 Tables/ 497
Step 2—Identify Entities/ 444 Concluding Remarks about Forms/ 498
Step 3—Identify Relationships/ 444 16.3 Reports/ 498
Step 4—Create Entity–Relationship Creating Simple Reports/ 499
Creating Reports with Calculated Fields/ 502
Diagrams/ 445
Creating Reports with Grouped Data/ 504
Step 5—Identify Attributes of Entities/ 446
Concluding Remarks about Reports/ 506
Step 6—Convert E-R Diagrams into Database
Tables/ 447
14.4 Normalization/ 449 Glossary/ (Available online at
First Normal Form/ 449 http://www.wiley.com/college/simkin)
Second Normal Form/ 450
Third Normal Form/ 451 Index/ 516
k
k
Trim size: 8in x 10in Simkin c01.tex V1 - 12/27/2017 3:34 P.M. Page 1
Chapter 1
k k
“In the accounting profession, for example, firms working with clients that own large
mineral deposits or mining operations can now use drones to fly over the area, tak-
ing thousands of pictures and measurements. CPAs can then use that data to provide
exact estimates of holdings. “Their balance sheets and their assets are literally sitting
on the ground,” and drones can quickly calculate inventory estimates by flying over
the area … ”
k
k
Trim size: 8in x 10in Simkin c01.tex V1 - 12/27/2017 3:34 P.M. Page 2
teller to help you? When is the last time you went to a travel agency to ask someone to
find you an airline ticket for your spring break vacation to Florida or the Virgin Islands?
Or when is the last time you stood in line to fill out paperwork for the courses you
wanted to take for next semester? Most likely, the answer to each of these questions is
“never.” And that is because of information technology (IT). Information technology is
so pervasive today that it is nearly impossible to do anything that does not in some way
involve technology. So ask yourself the question “how can you possibly be a successful
accountant if you do not have a basic understanding of how technology influences the
profession?”
Case-in-Point 1.1 The AICPA has an Information Management and Technology Assur-
ance (IMTA) Section that supports CPAs who offer assurance services and information man-
agement support for their clients. This section provides access to resources to help CPAs
understand how the use of data and reports from information systems can lead to better busi-
ness decisions. Members also gain an understanding of how they can use IT and information
systems skills combined with financial insight to evaluate technology risks.1
Systems Consulting
A consultant is an outside expert who helps an organization solve problems or pro-
vides technical expertise on an issue. Systems consultants provide help with issues
1American Institute of Certified Public Accountants, accessed from www.aicpa.org, March 2017.
2Robert, H. 2017. “Salary guide for accounting and finance,” accessed from www.roberthalf.com, March
2017.
k
k
Trim size: 8in x 10in Simkin c01.tex V1 - 12/27/2017 3:34 P.M. Page 3
k
k
Trim size: 8in x 10in Simkin c01.tex V1 - 12/27/2017 3:34 P.M. Page 4
FIGURE 1-1 Examples of job titles and pay range for Fraud Examiners and Forensic Accoun-
tants. Source: 2017 Salary guide for accounting and finance, www.roberthalf.com, accessed
March 2017.
perform advanced digital forensics. The objective is to reduce fraud risk and to
detect fraud.
The salary ranges and possible job locations are varied. Most positions will likely
be located in larger metropolitan areas, but may also be found in mid-sized cities.
From the chart for 2017 (Figure 1-1), you can see the salary ranges for several types
of positions.
Essentially, fraud occurs where there are weak internal controls or when a man-
ager or employee circumvents the internal controls that are in place. A more detailed
explanation of internal controls is contained in Chapters 6 and 7.
Assurance Services
• Financial statement attestation
• Internal control reporting
• Assess procedures and controls concerning privacy and confidentiality, performance measurement,
systems reliability, outsourced process controls, information security
Business Risk Services
Fraud Investigation and Dispute Services
Technology and Security Risk Services
Specialty Advisory Services
FIGURE 1-2 A sample of the many types of services offered by Ernst & Young LLP, one of the
largest international professional service organizations.
k
k
Trim size: 8in x 10in Simkin c01.tex V1 - 12/27/2017 3:34 P.M. Page 5
Case-in-Point 1.2 According to Cindy Wyatt, Managing Member at Insyte CPAs, LLC in
Birmingham, Alabama, who herself has passed the CISA certification examinations, “Tech-
nology is paramount in today’s business environment. Accountants who understand informa-
tion technology controls are far more effective in their careers, and thus, far more valuable
to the organizations they serve.”
Sometimes the best way to assess the risks associated with a computerized system
k is to try to penetrate the system, which is referred to as penetration testing. These k
tests are usually conducted within a systems security audit from which the organiza-
tion attempts to determine the level of vulnerability of their information systems and
the impact such weaknesses might have on the viability of the organization. If any
security issues are discovered, the organization will typically work swiftly to correct
the problems or at least mitigate the impact they might have on the company. But
what if someone else penetrates an organization’s systems? That is commonly called
“hacking” and is usually a very serious problem for any company. We cover hacking
in more detail in Chapter 10.
Case-in-Point 1.3 In 2013 and 2014, Yahoo Inc. had its systems hacked, affecting over
a billion user accounts. The hacker(s) penetrated Yahoo’s network and were able to steal
user names, email addresses, dates of birth, telephone numbers, and encrypted passwords.
Yahoo disclosed that it had spent $11 million in legal fees and $5 million to investigate the
breach and patch the security holes. The CEO, Marissa Mayer had to also forego her 2016
cash bonus of around $2 million and her 2017 equity award of no less than $12 million.4
Predictive Analytics
What you will soon learn from studying this book, and hopefully through reading pro-
fessional accounting journals, is that the accounting profession is constantly changing.
To be successful as an accounting professional, you will need to stay abreast of these
k
k
Trim size: 8in x 10in Simkin c01.tex V1 - 12/27/2017 3:34 P.M. Page 6
changes, or better yet get out in front of some of the expected trends in the profession.
One of those trends that we want to alert you to is the rapidly growing opportunities in
the field of predictive analytics, which is the result of the tremendous amount of data
that is now available within organizations (e.g., data warehouses, which offer oppor-
tunities for data mining). In the future, this is the most likely area where you can add
value—by being able to analyze that data and make useful business predictions for
your clients.
You might be surprised to learn that a number of accounting jobs already require
this type of skill set—for example, jobs such as client service analyst, quantitative
analyst, risk analyst, and financial planner and analyst (responsible for preparing the
annual plan and long-range or 5-year plan for a company and usually reports to the
CFO).5 So what exactly is predictive analytics, and what does this type of professional
do? The predictive analytics professional uses a variety of skills and abilities, ranging
from statistical analysis, data modeling, and data mining used by management to make
predictions about the future.
This might require a mind shift for some accounting majors. Rather than seeking
an MBA degree or an MS in accounting, consider an MS degree in analytics or business
analytics. There are now over 100 such degree programs in the United States, offering
full-time, part-time, and online delivery. So that you can appreciate the strong demand
for this new type of credential, the first MS in Analytics program was available in 2007,
and around 25% of these programs just started since 2016.6 If you go to the website at
footnote 6, you can find the universities that offer these programs, the length of each
program, the cost, and the curriculum. You might also be interested in the 2016 median
starting salary of $87,700 with no experience (see Institute for Advanced Analytics, MSA
k k
Infographic, analytics.ncsu.edu, accessed March 2017).
Financial Accounting
The major objective of the financial accounting information system is to provide
relevant information to individuals and groups outside an organization’s boundaries,
for example, investors, federal and state tax agencies, and creditors.
k
k
Trim size: 8in x 10in Simkin c01.tex V1 - 12/27/2017 3:34 P.M. Page 7
Taxation
Financial
IT Auditing
Accounting
Managerial
Accounting
FIGURE 1-3 Overview of the major areas of accounting impacted by information technology.
Nonfinancial Data. The basic inputs to, and outputs from, traditional financial account-
ing systems are usually expressed in monetary units. This can be a problem if the AIS
ignores nonmonetary information that is also important to users. For example, an
investor might like to know what the prospects are for the future sales of a company,
but many financial AISs do not record information such as unfulfilled customer sales
because such sales are not recognizable financial events for accounting purposes, even
though they represent important business events. The AIS is a subset of the manage-
ment information system of an organization, which also stores important nonfinancial
information about organizational resources, business events, and agents (customers,
vendors, banks, etc.) in databases precisely because they are relevant to the decision-
making processes of their users.
Inadequacies in financial performance measures have encouraged companies to
consider nonfinancial measures when evaluating performance. Some of the advan-
tages include the following: (1) nonfinancial measures can provide a closer link to
long-term organizational strategies; (2) drivers of success in many industries are “in-
tangible assets” such as intellectual capital and customer loyalty, rather than the “hard
assets” that are recorded on balance sheets; (3) such measures can be better indi-
cators of future financial performance; and (4) investments in customer satisfaction
can improve subsequent economic performance by increasing revenues and loyalty of
existing customers, attracting new customers, and reducing transaction costs.7
7 Ittner, C. and D. Larcker. “Non-financial performance measures: What works and what doesn’t,”
k
k
Trim size: 8in x 10in Simkin c01.tex V1 - 12/27/2017 3:34 P.M. Page 8
Interactive Data and XBRL. A problem that accountants, investors, auditors, and other
financial managers have often faced is that data used in one application are not eas-
ily transferable to another. This means that accountants may spend hours preparing
spreadsheets and reports that require them to enter the same data in different formats
over and over. Interactive data are data that can be reused and carried seamlessly
among a variety of applications or reports. Consider, for example, a data item such as
total assets. This number might need to be formatted and even calculated several differ-
ent ways (e.g., at cost, net realizable value, book value, replacement value) for reports
8 ThyssenKrupp, A.G., “Non-financial Performance Indicators,” Online Annual Report 2010/2011, accessed
March 2017.
k
k
Trim size: 8in x 10in Simkin c01.tex V1 - 12/27/2017 3:34 P.M. Page 9
such as filings with the SEC, banks, and performance reports. With interactive data,
the data are captured in the database only once and can be used wherever needed.
Interactive data require a language for standardization that “tags” the data at its
most basic level. As an example, for total assets, this would be at the detail level for
each asset. Extensible business reporting language (XBRL) is the language of choice
for this purpose. As of 2010, the SEC requires public companies to file their financial
reports in XBRL format. In addition, many companies, software programs, and indus-
tries are beginning to incorporate XBRL for creating, transforming, and communicating
financial information.
We will discuss cloud computing later in this chapter, but at this point, we want to
make you aware of this technology with respect to XBRL. XBRL Cloud made a viewer
available that allows anyone to examine SEC XBRL financial filings, and it is called
the XBRL Cloud EDGAR Dashboard.9 When a filing is posted on the SEC website,
XBRL Cloud takes the information and adds a new line to the Dashboard that indi-
cates the name of the filing company, the form type and date filed, the percentage of
extended elements, the creation software that was used to prepare the filing, and free
validation checking. A description of some of the Dashboard’s features can be found
at xbrl.squarespace.com. We discuss XBRL in more detail in Chapter 2, and you can
learn about the current status of XBRL at www.XBRL.org.
Case-in-Point 1.5 The Federal Deposit Insurance Corporation (FDIC) insures bank
deposits over a specific amount. FDIC wanted to create an Internet-based Central Data
Repository that stored all the quarterly data they received from more than 7,000 banks. They
convinced their software vendors to incorporate XBRL to standardize the data. The tagged
k data that the FDIC receives from banks now has improved accuracy and can be published k
and made available to users much more quickly than before.10
Managerial Accounting
The principal objective of managerial accounting is to provide relevant information to
organizational managers, that is, users who are internal to a company or government
agency. Cost accounting and budgeting are two typical parts of a company’s managerial
accounting system. Let us examine each of them in turn.
k
Another random document with
no related content on Scribd:
“That doesn’t make any difference to me. If I have got to fetch this
Shah I don’t wish to go to the wrong place. Where is Belgium? Is it a
shilling fare in a cab?”
He explained that it was in foreign parts--the first place I have
heard of lately which a body could not go to in a cab for a shilling.
I said I could not go alone, because I could not speak foreign
languages well, could not get up in time for the early train without
help, and could not find my way. I said it was enough to have the
Shah on my hands; I did not wish to have everything piled on me.
Mr. Blank was then ordered to go with me. I do like to have
somebody along to talk to when I go abroad.
When I got home I sat down and thought the thing all over. I
wanted to go into this enterprise understandingly. What was the main
thing? That was the question. A little reflection informed me. For two
weeks the London papers had sung just one continual song to just
one continual tune, and the idea of it all was “how to impress the
Shah.” These papers had told all about the St. Petersburg splendors,
and had said at the end that splendors would no longer answer; that
England could not outdo Russia in that respect; therefore some other
way of impressing the Shah must be contrived. And these papers
had also told all about the Shahstic reception in Prussia and its
attendant military pageantry. England could not improve on that sort
of thing--she could not impress the Shah with soldiers; something
else must be tried. And so on. Column after column, page after page
of agony about how to “impress the Shah.” At last they had hit upon
a happy idea--a grand naval exhibition. That was it! A man brought
up in Oriental seclusion and simplicity, a man who had never seen
anything but camels and such things, could not help being surprised
and delighted with the strange novelty of ships. The distress was at
an end. England heaved a great sigh of relief; she knew at last how
to impress the Shah.
My course was very plain, now, after that bit of reflection. All I had
to do was to go over to Belgium and impress the Shah. I failed to
form any definite plan as to the process, but I made up my mind to
manage it somehow. I said to myself, “I will impress this Shah or
there shall be a funeral that will be worth contemplating.”
I went to bed then, but did not sleep a great deal, for the
responsibilities were weighing pretty heavily upon me. At six o’clock
in the morning Mr. Blank came and turned me out. I was surprised at
this, and not gratified, for I detest early rising. I never like to say
severe things, but I was a good deal tried this time. I said I did not
mind getting up moderately early, but I hated to be called day before
yesterday. However, as I was acting in a national capacity and for a
country that I liked, I stopped grumbling and we set out. A grand
naval review is a good thing to impress a Shah with, but if he would
try getting up at six o’clock in the morning--but no matter; we started.
We took the Dover train and went whistling along over the
housetops at the rate of fifty miles an hour, and just as smoothly and
pleasantly, too, as if we were in a sleigh. One never can have
anything but a very vague idea of what speed is until he travels over
an English railway. Our “lightning” expresses are sleepy and indolent
by comparison. We looked into the back windows of the endless
ranks of houses abreast and below us, and saw many a homelike
little family of early birds sitting at their breakfasts. New views and
new aspects of London were about me; the mighty city seemed to
spread farther and wider in the clear morning air than it had ever
done before. There is something awe-inspiring about the mere look
of the figures that express the population of London when one
comes to set them down in a good large hand--4,000,000! It takes a
body’s breath away, almost.
We presently left the city behind. We had started drowsy, but we
did not stay so. How could we, with the brilliant sunshine pouring
down, the balmy wind blowing through the open windows, and the
Garden of Eden spread all abroad? We swept along through rolling
expanses of growing grain--not a stone or a stump to mar their
comeliness, not an unsightly fence or an ill-kept hedge; through
broad meadows covered with fresh green grass as clean swept as if
a broom had been at work there--little brooks wandering up and
down them, noble trees here and there, cows in the shade, groves in
the distance and church spires projecting out of them; and there
were the quaintest old-fashioned houses set in the midst of smooth
lawns or partly hiding themselves among fine old forest trees; and
there was one steep-roofed ancient cottage whose walls all around,
and whose roof, and whose chimneys, were clothed in a shining mail
of ivy leaves!--so thoroughly, indeed, that only one little patch of roof
was visible to prove that the house was not a mere house of leaves,
with glass windows in it. Imagine those dainty little homes
surrounded by flowering shrubs and bright green grass and all sorts
of old trees--and then go on and try to imagine something more
bewitching.
By and by we passed Rochester, and, sure enough, right there, on
the highest ground in the town and rising imposingly up from among
clustering roofs, was the gray old castle--roofless, ruined, ragged,
the sky beyond showing clear and blue through the glassless
windows, the walls partly clad with ivy--a time-scarred, weather-
beaten old pile, but ever so picturesque and ever so majestic, too.
There it was, a whole book of English history. I had read of
Rochester Castle a thousand times, but I had never really believed
there was any such building before.
Presently we reached the sea and came to a stand far out on a
pier; and here was Dover and more history. The chalk cliffs of
England towered up from the shore and the French coast was
visible. On the tallest hill sat Dover Castle, stately and spacious and
superb, looking just as it has always looked any time these ten or
fifteen thousand years--I do not know its exact age, and it does not
matter, anyway.
We stepped aboard the little packet and steamed away. The sea
was perfectly smooth, and painfully brilliant in the sunshine. There
were no curiosities in the vessel except the passengers and a
placard in French setting forth the transportation fares for various
kinds of people. The lithographer probably considered that placard a
triumph. It was printed in green, blue, red, black, and yellow; no
individual line in one color, even the individual letters were
separately colored. For instance, the first letter of a word would be
blue, the next red, the next green, and so on. The placard looked as
if it had the smallpox or something. I inquired the artist’s name and
place of business, intending to hunt him up and kill him when I had
time; but no one could tell me. In the list of prices first-class
passengers were set down at fifteen shillings and four pence, and
dead bodies at one pound ten shillings and eight pence--just double
price! That is Belgian morals, I suppose. I never say a harsh thing
unless I am greatly stirred; but in my opinion the man who would
take advantage of a dead person would do almost any odious thing. I
publish this scandalous discrimination against the most helpless
class among us in order that people intending to die abroad may
come back by some other line.
We skimmed over to Ostend in four hours and went ashore. The
first gentleman we saw happened to be the flag lieutenant of the
fleet, and he told me where the Lively lay, and said she would sail
about six in the morning. Heavens and earth. He said he would give
my letter to the proper authority, and so we thanked him and bore
away for the hotel. Bore away is good sailor phraseology, and I have
been at sea portions of two days now. I easily pick up a foreign
language.
Ostend is a curious, comfortable-looking, massively built town,
where the people speak both the French and the Flemish with
exceeding fluency, and yet I could not understand them in either
tongue. But I will write the rest about Ostend in to-morrow’s letter.
We idled about this curious Ostend the remainder of the afternoon
and far into the long-lived twilight, apparently to amuse ourselves,
but secretly I had a deeper motive. I wanted to see if there was
anything here that might “impress the Shah.” In the end I was
reassured and content. If Ostend could impress him, England could
amaze the head clear off his shoulders and have marvels left that
not even the trunk could be indifferent to.
These citizens of Flanders--Flounders, I think they call them,
though I feel sure I have eaten a creature of that name or seen it in
an aquarium or a menagerie, or in a picture or somewhere--are a
thrifty, industrious race, and are as commercially wise and farsighted
as they were in Edward the Third’s time, and as enduring and patient
under adversity as they were in Charles the Bold’s. They are prolific
in the matter of children; in some of the narrow streets every house
seemed to have had a freshet of children, which had burst through
and overflowed into the roadway. One could hardly get along for the
pack of juveniles, and they were all soiled and all healthy. They all
wore wooden shoes, which clattered noisily on the stone pavements.
All the women were hard at work; there were no idlers about the
houses. The men were away at labor, no doubt. In nearly every door
women sat at needlework or something of that marketable nature--
they were knitting principally. Many groups of women sat in the
street, in the shade of walls, making point lace. The lace maker
holds a sort of pillow on her knees with a strip of cardboard fastened
on it, on which the lace pattern has been punctured. She sticks
bunches of pins in the punctures and about them weaves her web of
threads. The numberless threads diverge from the bunch of pins like
the spokes of a wheel, and the spools from which the threads are
being unwound form the outer circle of the wheel. The woman
throws these spools about her with flying fingers, in and out, over
and under one another, and so fast that you can hardly follow the
evolutions with your eyes. In the chaos and confusion of skipping
spools you wonder how she can possibly pick up the right one every
time, and especially how she can go on gossiping with her friends all
the time and yet never seem to miss a stitch. The laces these
ingenious Flounders were making were very dainty and delicate in
texture and very beautiful in design.
Most of the shops in Ostend seemed devoted to the sale of sea
shells. All sorts of figures of men and women were made of shells;
one sort was composed of grotesque and ingenious combinations of
lobster claws in the human form. And they had other figures made of
stuffed frogs--some fencing, some barbering each other, and some
were not to be described at all without indecent language. It must
require a barbarian nature to be able to find humor in such
nauseating horrors as these last. These things were exposed in the
public windows where young girls and little children could see them,
and in the shops sat the usual hairy-lipped young woman waiting to
sell them.
There was a contrivance attached to the better class of houses
which I had heard of before, but never seen. It was an arrangement
of mirrors outside the window, so contrived that the people within
could see who was coming either up or down the street--see all that
might be going on, in fact--without opening the window or twisting
themselves into uncomfortable positions in order to look.
A capital thing to watch for unwelcome (or welcome) visitors with,
or to observe pageants in cold or rainy weather. People in second
and third stories had, also, another mirror which showed who was
passing underneath.
The dining room at our hotel was very spacious and rather
gorgeous. One end of it was composed almost entirely of a single
pane of plate glass, some two inches thick--for this is the plate-glass
manufacturing region, you remember. It was very clear and fine. If
one were to enter the place in such a way as not to catch the sheen
of the glass, he would suppose that the end of the house was wide
open to the sun and the storms. A strange boyhood instinct came
strongly upon me, and I could not really enjoy my dinner, I wanted to
break that glass so badly. I have no doubt that every man feels so,
and I know that such a glass must be simply torture to a boy.
This dining room’s walls were almost completely covered with
large oil paintings in frames.
It was an excellent hotel; the utmost care was taken that
everything should go right. I went to bed at ten and was called at
eleven to “take the early train.” I said I was not the one, so the
servant stirred up the next door and he was not the one; then the
next door and the next--no success--and so on till the reverberations
of the knocking were lost in the distance down the hall, and I fell
asleep again. They called me at twelve to take another early train,
but I said I was not the one again, and asked as a favor that they
would be particular to call the rest next time, but never mind me.
However, they could not understand my English; they only said
something in reply to signify that, and then went on banging up the
boarders, none of whom desired to take the early train.
When they called me at one, it made my rest seem very broken,
and I said if they would skip me at two I would call myself--not really
intending to do it, but hoping to beguile the porter and deceive him.
He probably suspected that and was afraid to trust me, because
when he made his rounds at that hour he did not take any chances
on me, but routed me out along with the others. I got some more
sleep after that, but when the porter called me at three I felt
depressed and jaded and greatly discouraged. So I gave it up and
dressed myself. The porter got me a cup of coffee and kept me
awake while I drank it. He was a good, well-meaning sort of
Flounder, but really a drawback to the hotel, I should think.
Poor Mr. Blank came in then, looking worn and old. He had been
called for all the different trains, too, just as I had. He said it was a
good enough hotel, but they took too much pains. While we sat there
talking we fell asleep and were called again at four. Then we went
out and dozed about town till six, and then drifted aboard the Lively.
She was trim and bright, and clean and smart; she was as
handsome as a picture. The sailors were in brand-new man-of-war
costume, and plenty of officers were about the decks in the state
uniform of the service--cocked hats, huge epaulettes, claw-hammer
coats lined with white silk--hats and coats and trousers all splendid
with gold lace. I judged that these were all admirals, and so got
afraid and went ashore again. Our vessel was to carry the Shah’s
brother, also the Grand Vizier, several Persian princes, who were
uncles to the Shah, and other dignitaries of more or less
consequence. A vessel alongside was to carry the luggage, and a
vessel just ahead (the Vigilant) was to carry nobody but just the
Shah and certain Ministers of State and servants and the Queen’s
special ambassador, Sir Henry Rawlinson, who is a Persian scholar
and talks to the Shah in his own tongue.
I was very glad, for several reasons, to find that I was not to go in
the same ship with the Shah. First, with him not immediately under
my eye I would feel less responsibility for him; and, secondly, as I
was anxious to impress him, I wanted to practice on his brother first.
Leaving Ostend, we went out to sea under a clear sky and upon
smooth water--so smooth, indeed, that its surface was scarcely
rippled. I say the sky was clear, and so it was, clear and sunny; but a
rich haze lay upon the water in the distance--a soft, mellow mist,
through which a scattering sail or two loomed vaguely. One may call
such a morning perfect.
The corps of correspondents were well jaded with their railway
journey, but after champagne and soda downstairs with the officers,
everybody came up refreshed and cheery and exceedingly well
acquainted all around. The Persian grandees had meantime taken
up a position in a glass house on the afterdeck, and were sipping
coffee in a grave, Oriental way. They all had much lighter
complexions and a more European cast of features than I was
prepared for, and several of them were exceedingly handsome, fine-
looking men.
They all sat in a circle on a sofa (the deckhouse being circular),
and they made a right gaudy spectacle. Their breasts were
completely crusted with gold bullion embroidery of a pattern
resembling frayed and interlacing ferns, and they had large jeweled
ornaments on their breasts also. The Grand Vizier came out to have
a look around. In addition to the sumptuous gold fernery on his
breast he wore a jeweled star as large as the palm of my hand, and
about his neck hung the Shah’s miniature, reposing in a bed of
diamonds, that gleamed and flashed in a wonderful way when
touched by the sunlight. It was said that to receive the Shah’s portrait
from the Shah was the highest compliment that could be conferred
upon a Persian subject. I did not care so much about the diamonds,
but I would have liked to have the portrait very much. The Grand
Vizier’s sword hilt and the whole back of the sheath from end to end
were composed of a neat and simple combination of some twelve or
fifteen thousand emeralds and diamonds.
We closed up fast upon the ironclads. They fell apart to let our
flotilla come between, and as the Vigilant ranged up the rigging of
the ironclads was manned to salute the Shah. And, indeed, that was
something to see. The shrouds, from the decks clear to the trucks,
away up toward the sky, were black with men. On the lower rounds
of these rope ladders they stood five abreast, holding each other’s
hands, and so the tapering shrouds formed attenuated pyramids of
humanity, six pyramids of them towering into the upper air, and clear
up on the top of each dizzy mast stood a little creature like a clothes
pin--a mere black peg against the sky--and that mite was a sailor
waving a flag like a postage stamp. All at once the pyramids of men
burst into a cheer, and followed it with two more, given with a will;
and if the Shah was not impressed he must be the offspring of a
mummy.
And just at this moment, while we all stood there gazing---
However breakfast was announced and I did not wait to see.
THE SPECTACLE
But never mind. The sea scene grew little by little, until presently it
was very imposing. We drew up into the midst of a waiting host of
vessels. Enormous five-masted men-of-war, great turret ships, steam
packets, pleasure yachts--every sort of craft, indeed--the sea was
thick with them; the yards and riggings of the warships loaded with
men, the packets crowded with people, the pleasure ships
rainbowed with brilliant flags all over and over--some with flags
strung thick on lines stretching from bowsprit to foremast, thence to
mainmast, thence to mizzenmast, and thence to stern. All the ships
were in motion--gliding hither and thither, in and out, mingling and
parting--a bewildering whirl of flash and color. Our leader, the vast,
black, ugly, but very formidable Devastation, plowed straight through
the gay throng, our Shah-ships following, the lines of big men-of-war
saluting, the booming of the guns drowning the cheering, stately
islands of smoke towering everywhere. And so, in this condition of
unspeakable grandeur, we swept into the harbor of Dover, and saw
the English princes and the long ranks of red-coated soldiers waiting
on the pier, civilian multitudes behind them, the lofty hill front by the
castle swarming with spectators, and there was the crash of cannon
and a general hurrah all through the air. It was rather a contrast to
silent Ostend and the unimpressible Flanders.