• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/66

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

66 Cards in this Set

  • Front
  • Back

Business Processing Reengineering (BPR)

purposeful and organized changing of BP to be more efficient.



align BP's with IT systems to record processed and make them more effective and efficient

BPR leads to 2 kinds of efficiency improvement

1. underlying process is reengineered to be conducted more efficiently



2. improves efficiency of underlying process

IT and BPR have mutually enhancing relationship

BPR should leverage the IT process to improve the efficiency of the process

Data organization

organized in a hierarchy



bit


byte


field


record


file


datebase

bit (binary digit)

smallest unit of info having 1 or 2 values: 0 & 1

Byte

unit of storage that represents one character made of 8 bits

field

1 item within a record

record

set of related fields for the same entity

file

entire set of related records

database

entire collection of files/data stored on a computer to be easily accessed, retrieved, manipulated, and stored

relational database

stored data in several small 2-D tables that can be joined together in many ways to represent relationships among the data



ex: single customer having multiple orders

master files

relatively permanent files that maintain detailed data for major purposes.



ex: payroll master filed has records of employees information to process payroll

transaction file

set of relatively temporary records that is processed to update master file



ex: payroll transaction file contains hours worked by employees for pay period. processed against master file and employee year-to-date balances are updated in master file

sequential access files

records stored in sequence with one record stored after another



faster when records are accessed and used in this order

random access files (direct access)

1. not written or read in sequential order


2. stored in random order


3. more efficient


4. formula or hashing scheme assigned to an address to each record for computer to find a record


5. formula can be recalculated to find address of requested record

indexed sequential access method (ISAM)

1. stored sequentially but can be accessed randomly


2. allows random access


3. when both access methods are necessary

two modes of processing transactions

1. batch processing


2. online processing

batch processing

similar transactions grouped together for specific time then processed



best suited for apps with large volumes of similar trans processed at regular intervals to sequential access files


example of batch processing

payroll - time cards grouped together for 2 week pay period and payroll processing takes place on entire set of cards

online processing

opposite of batch processing



transactions are processed and entered one at a time



real-time processing system



best suited for apps with large record volumes to random access files

real-time processing system

processed immediately in real-time so output is available immediately

data warehouse

integrated collection of enterprise-wide data



includes 5-10 fiscal years of nonvolatile data used to support mgment making decisions/planning

operational database

contains data thats continually updated as transactions are processed



includes data for current fiscal year & supports day-to-day operations and record keeping

example of operational database

recording a sale means sales inventory and receivable balances must be updated



doesn't occur in data warehouse

data in data warehouse

data is nonvolatile



it doesn't change as rapidly as in the operational database

data mining

process of searching data within thdata warehouse for identifiable patterns that can be used to predict future behavior



predict customer buying behaviors to plan appropriately to produce, distribute, & sell the right products

networks

two or more computers linked together to share infor and/or resources



LAN


Internet


Intranet


Extranet

LAN (local area network)

most important topic of AIS



computer network tha spans a small area



confined to a single or group of buildings intended to connect computers within organization

WAN (Wide Area Network)

system of LANs connected over a distance of other network connections

Internet

global computer network



WWW - world wide web

Intranet

company's private network accessible only to employees



uses common standard and protocols of internet



only accessible from work computers



purpose is to distribute data/info to employees to make shared data/files available & manage projects

Extranet

similar to intranet except offers access to selected outsiders


buyers, distributers, suppliers, wholesalers



allow business partners to exchange info

E-business

example of IT enablement



use of electronic means to enhance BPs



encompasses all forms of trading



servicing customers & vendors, swapping info with them & electronic recording & control of internal processes

Electronic data interchange (EDI)

intercompany computer-to-computer transfer of business docs in standard business format



characteristics: intercompany, comp-to-comp, standard business format



used to transmit POs, invoices, and payments electronically between partners

intercompany

one of three important characteristics of EDI



2 or more companies conducting business electronically

computer-to-computer

one of three important characteristics of EDI



indicates each company's computers are connected via a network

standard business format

one of three important characteristics of EDI



necessary so companies, vendors, and sellers can interact and trade electronically by EDI software

Point of sale (POS) system

hard/software system that captures sales thru barcoding



occurs in real-time



enhances CSAT by enabling faster & accurate sales

Automated matching

hard/software system which software matches an invoice to related PO and receiving report



files must be online and ready for processing; PO and receiving files must be in database/online

Automated matching process

invoice received from vendor, employee enters details with PO, verifies items, quantities, and price.



ensures correct billing

Evaluated receipt settlement (ERS)

invoiceless system - computer hard/software complete invoiceless matching comparing PO with goods received



if matched payment is made to vendor



reduces time and cost of processing payments

E-payables and electronic invoice presentment and payment (EIPP)

web-enables receipt and payment of vendor invoices



enables vendor to send invoice via internet

Enterprise resource planning (ERP)

multi-module software system designed to manage all aspects of an enterprise



broken into modules: financials, sales, purchasing, inventory mgt, manufacturing, & HR



work seamlessly with system and provided user interface between modules

Reductions of risk

1. assets will be stolen or misused


2. errors in accounting data or info


3. fraudulent activity by employees, managers, customers, or vendors


4. risk inherent in IT systems

Risks in IT systems

1. erroneous input of data


2. erroneous processing of data


3. computer fraud


4. computer security breaches


5. hardware or software failure


6. natural disasters that can interrupt computer system operations

Enterprise risk management (ERM)

is the responsibility of mgt


is an ongoing process


- continuous assessment of risks, determination of acceptable levels of risks, and mgt of risks to acceptable level


must involve personnel across the enterprise and mgt

ERM requires mgt to

set procedures and policies related to


1. internal environment


2. objective setting


3. event identification


4. risk assessment


5. risk repsonse


6. control activities


7. info and communication


8. monitoring

internal environment & ERM

encompasses the tone of an organization


sets the basis for how risk is viewed and addressed by an entity's people

objective setting & ERM

must exist before mgt can identify potential events affecting achievement



ERMs ensure mgt has a process to set obj and that they align with the mission and are consistent with its risk appetite.

event identification & ERM

internal and external events affecting achievement of entity's objs must be identified with risks and opportunities



opportunities are channeled back to mgts strategy or objective-setting process

risk assessment & ERM

analyzed by likelihood & impact as a basis for determining how they should be managed



assessed on inherent and residual basis; the likelihood of errors is considered both before and after the application controls

risk response & ERM

management selects avoiding, accepting, reducing, or sharing risk by developing a set of actions to align risks with the entity's risk tolerances and appetite.

control activities & ERM

policies and procedures established and implemented to help ensure that the risk responses are effectively carried out

information and communication & ERM

relevant info is identified, captured, and communicated una form and time frame that enable people to carry out their responsibilities.



effective communication also occurs in a broader sense, flowing down, across, and up the entity

monitoring &ERM

entirety of ERM is monitored and modified if necessary



accomplished through ongoing management activities (internal auditing), separate evaluations (such as those performed by external auditors), or both

Code of Ethics

reduce opportunities for managers or employees to conduct fraud



top mgt must emphasize code of ethics and discipline or discharge those who violate it



managers must emphasize and model ethical behavior to encourage ethical behavior in their employees

Internal Controls - Intergrated Framework

definition and description of internal controls

five interrealted components of internal control

1. control environment


2. risk assessment


3. control activities


4. information and communication


5. monitoring

General controls

apply to the overall IT system



not restricted to a particular accounting application

Example of general controls

ise of passwords to allow only authorized users to log into an IT-based accounting system



without regard to processing data in any specific application passwords should be employed in the IT system

Application controls

used in accounting applications to control inputs, processing, and output.



intended to ensure that inputs & processing are accurate and complete, and outputs are properly distributed, controlled, and disposed of.

Corporate governance

elaborate system of checks and balances whereby a company's leadership is held accountable for building shareholder value and creating confidence in the financial reporting processes

IT governance

proper management, control, and use of IT systems



Management focus to fulfill obligations in IT governance

1. aligning IT strategy with the business strategy


2. cascading strategy and goals down into the enterprise


3. providing organizational structures that facilitate the implementation of strategies and goals


4. insisting that an IT control g


framework be adopted and implemented

importance of AIS to accountants

users of AIS accomplish the functions of accounting, generate accounting reports, and use accounting reports



design or implementation team - decide which software to purchse, how to design software/systems, and implementation of software/systems



auditor of AIS cannot make informed decisions to complete audit without understanding AIS

unethical accounting behaviors

fraudulent financial reporting


revenue inflation


expense account fraud


inflating hours worked for payroll purpose


computer fraud


hacking


browsing confidential data