• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/49

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

49 Cards in this Set

  • Front
  • Back
Accounting Information Systems (AIS)
a system that records, processes, and reports on transactions to provide financial and nonfinancial information to make decisions and have appropriate levels of internal controls for those transactions.
Relevance
1. Predictive value (helps with forecasting)

2. Feedback value (corrects past predictions)


3. Timeliness (available in time for decisions)

Reliability
1. Verifiable (can be confirmed by independent party)

2. Representational Faithfulness (reports what actually happened)


3. Neutrality (information is not biased)

Data





Information

- Raw facts that describe the characteristics of an event, have little meaning.





- Data organized in a meaningful way to be useful to the user.

Information Value Chain
Overall transformation from a business need and business event to the collection of data and information to an ultimate decision.
Discretionary Information
Generally produced for internal purposes and not required by law to be provided to management.
Mandatory Information
Produced for external information for investors, banks etc, usually at lowest possible cost to comply with regulator laws.
Specific Accounting Roles
1. User

2. Manager


3. Designer


4. Evaluator

Business Value





Value Chain

- Items, events, and interactions that determine the financial health/well-being of the firm.





- Chain of business processes for a firm.

Value Chain
1. Firm Infrastructure - all activities needed to support the firm. (CEO, finance, accounting, etc)

2. HR Management - recruiting, hiring, training, & compensating employees.


3. Technology - all technologies necessary to the company (R&D).


4. Procurement - activities involving purchasing inputs (raw materials, supplies, & equipment.)

Enterprise Resource Planning (ERP or ES)
Centralized database that collects data from throughout the firm. (Data from orders, sales, inventory, customers, employees, etc).
Supply Chain
Flow of materials, information, payments, and services from raw materials suppliers, through factories and warehouses, all the way to customer.
Customer Relations Software (CRM)
software used to manage and nurture a firm's interactions with its current and potential clients.
Business Process





Business Analysis

- Business activities that use resources to transform inputs into outputs to achieve a business goal.





- Defining business process requirements and evaluating potential improvements.

Business Model



- Roles

Simple, abstract representation of one or more business processes.



1. Manage Complexity


2. Elicit Requirements


3. Reconcile viewpoints


4. Specify Requirements

Activity Model
Describes sequence of workflow in a business process.


Business Process Modeling Notation


(BPMN)

Standard for the description of activity models.

Standard for the description of activity models.


Event - important occurances that affect flow of activities (start & end events).


Activities - specific steps in business process.


Sequence Flow - solid arrows that signify direction of process flow.


Gateways - a decision in the process.


Annotations - additional description.

Message Flows






Documentation

- Shows exchanges between two participants (pools) in the same process in a BPMN.






- An information transmission and communication tool that explains how business processes and business systems work.

Systems Development Life Cycle (SDLC)






Process Management

- Process of creating/modifying information systems to meet the needs of its users.






- Process of carrying out the systems development life cycle to achieve and intended outcome.

Phases of SDLC

1. Planning


2. Analysis


3. Design


4. Implementation


5. Maintenance



1. Planning Phase






2. Analysis Phase

1. summarizes the business needs with a high-level view of the intended project.






2. Involves a complete, detailed analysis of the systems needs of the end user, as well as a proposed solution.


3. Design Phase




4. Implementation Phase




5. Maintenance Phase







3. Describing in detail the desired features of the system that were uncovered in the analysis phase.






4. Involves development, testing, and implementation of the new system.






5. Making changes, corrections, upgrades to the system to continue to meet requirements.

Scope Creep




Triple Constraint

- The change in a project's scope after the project work has started.






- 3 factors that constrain IT and other projects:


1. Cost


2. Scope


3. Time

Project Manager






Project Sponsor

- Lead member of the project team who is responsible for the project.






- Generally Sr. Exec who takes responsibility for the success of the project.

Grantt Chart

Graphical representation of the project schedule that maps the tasks to a project calendar.




Quote






Sales Order






Sale

- Description of product/service to be provided to customer.






- Event documenting commitments by customers to purchase products.






- Events documenting the transfer of goods to customer & and proper revenue recognition.

Collaboration






Choreography






Orchestration

- Shows 2 participant pools & the interaction between them within a process using BPMN.






- The message flow (interaction) between 2 participant pools of a process using BPMN.






- Sequence of activities within one pool.

Access Controls






Application Controls

- Limit who can use and change records in a system.






- Ensure data integrity and an audit trail.

Sarbanes-Oxley Act

Response to business scandals that requires public companies register with the SEC and their auditors to annually assess and report over the effectiveness of their financial reporting.

Public Company Accounting Oversight Board


(PCAOB)

Established by SOX to provide independent oversight of public accounting firms.

Corporate Governance


A set of processes and policies in managing an organization with sound ethics to safeguard interests of its stakeholders.

Application Controls









Specific to an application to ensure the validity, completeness, and accuracy of a transaction.





Detective Controls



Find problems when they arise.

Preventive Controls



Deter problems before they arise.

Corrective Controls


Fix problems that have been identified.

General Controls


Pertain to enterprise wide issues such as controls over accessing the network, developing & maintaining applications, and documenting changes of programs.



Committee of Sponsoring Organizations (COSO)
Several organizations that studies the casual factors that lead to fraudulent financial reporting and educational institutions to improve the quality of financial reporting through internal control and corporate governance.
Control Objectives for Information and Related Technology (COBIT)
An internationally accepted set of best IT security and control practices for IT management released by the ITGI
Enterprise Risk Management (ERM)

A process affected by the entity's board of directors, management, and others, designed identify potential events that may affect the entity, and manage risk to be within the risk appetite, and to provide reasonable assurance regarding achievements.
Risk Assessment
Process of identifying and analyzing risks systematically to determin the firm's risk response and control activities.

Inherent Risk

The risk related to the nature of the business activity itself.


Control Risk

The threat of errors or irregularities in the underlying transaction will not be prevented, detected, and corrected by the internal control system.

Residual Risk

The product of inherent risk and control risk.



= Inherent Risk x Control Risk




(risk that remains after management responds to risk and after controls have been put in place)


Physical Controls

Mainly manual but could involve the use of computer technology.

IT Controls

Involve processes that provide assurance for information and help to mitigate risks associated with technology.



- IT controls


- Access controls


- Computer operation controls


Input Controls

Ensure the authorization, entry, and verification of data entering the system.




- Validity checks


- Field, size, & range checks


- Completeness check

Processing Controls

Ensure the data and transactions are processed accurately.




- Prenumbered documents


- Sequence checks


- Batch totals



Output Controls

Provide output to authorized people and ensure the output is used properly.