Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
66 Cards in this Set
- Front
- Back
Business Processing Reengineering (BPR) |
purposeful and organized changing of BP to be more efficient.
align BP's with IT systems to record processed and make them more effective and efficient |
|
BPR leads to 2 kinds of efficiency improvement |
1. underlying process is reengineered to be conducted more efficiently
2. improves efficiency of underlying process |
|
IT and BPR have mutually enhancing relationship |
BPR should leverage the IT process to improve the efficiency of the process |
|
Data organization |
organized in a hierarchy
bit byte field record file datebase |
|
bit (binary digit) |
smallest unit of info having 1 or 2 values: 0 & 1 |
|
Byte |
unit of storage that represents one character made of 8 bits |
|
field |
1 item within a record |
|
record |
set of related fields for the same entity |
|
file |
entire set of related records |
|
database |
entire collection of files/data stored on a computer to be easily accessed, retrieved, manipulated, and stored |
|
relational database |
stored data in several small 2-D tables that can be joined together in many ways to represent relationships among the data
ex: single customer having multiple orders |
|
master files |
relatively permanent files that maintain detailed data for major purposes.
ex: payroll master filed has records of employees information to process payroll |
|
transaction file |
set of relatively temporary records that is processed to update master file
ex: payroll transaction file contains hours worked by employees for pay period. processed against master file and employee year-to-date balances are updated in master file |
|
sequential access files |
records stored in sequence with one record stored after another
faster when records are accessed and used in this order |
|
random access files (direct access) |
1. not written or read in sequential order 2. stored in random order 3. more efficient 4. formula or hashing scheme assigned to an address to each record for computer to find a record 5. formula can be recalculated to find address of requested record |
|
indexed sequential access method (ISAM) |
1. stored sequentially but can be accessed randomly 2. allows random access 3. when both access methods are necessary |
|
two modes of processing transactions |
1. batch processing 2. online processing |
|
batch processing |
similar transactions grouped together for specific time then processed
best suited for apps with large volumes of similar trans processed at regular intervals to sequential access files
|
|
example of batch processing |
payroll - time cards grouped together for 2 week pay period and payroll processing takes place on entire set of cards |
|
online processing |
opposite of batch processing
transactions are processed and entered one at a time
real-time processing system
best suited for apps with large record volumes to random access files |
|
real-time processing system |
processed immediately in real-time so output is available immediately |
|
data warehouse |
integrated collection of enterprise-wide data
includes 5-10 fiscal years of nonvolatile data used to support mgment making decisions/planning |
|
operational database |
contains data thats continually updated as transactions are processed
includes data for current fiscal year & supports day-to-day operations and record keeping |
|
example of operational database |
recording a sale means sales inventory and receivable balances must be updated
doesn't occur in data warehouse |
|
data in data warehouse |
data is nonvolatile
it doesn't change as rapidly as in the operational database |
|
data mining |
process of searching data within thdata warehouse for identifiable patterns that can be used to predict future behavior
predict customer buying behaviors to plan appropriately to produce, distribute, & sell the right products |
|
networks |
two or more computers linked together to share infor and/or resources
LAN Internet Intranet Extranet |
|
LAN (local area network) |
most important topic of AIS
computer network tha spans a small area
confined to a single or group of buildings intended to connect computers within organization |
|
WAN (Wide Area Network) |
system of LANs connected over a distance of other network connections |
|
Internet |
global computer network
WWW - world wide web |
|
Intranet |
company's private network accessible only to employees
uses common standard and protocols of internet
only accessible from work computers
purpose is to distribute data/info to employees to make shared data/files available & manage projects |
|
Extranet |
similar to intranet except offers access to selected outsiders buyers, distributers, suppliers, wholesalers
allow business partners to exchange info |
|
E-business |
example of IT enablement
use of electronic means to enhance BPs
encompasses all forms of trading
servicing customers & vendors, swapping info with them & electronic recording & control of internal processes |
|
Electronic data interchange (EDI) |
intercompany computer-to-computer transfer of business docs in standard business format
characteristics: intercompany, comp-to-comp, standard business format
used to transmit POs, invoices, and payments electronically between partners |
|
intercompany |
one of three important characteristics of EDI
2 or more companies conducting business electronically |
|
computer-to-computer |
one of three important characteristics of EDI
indicates each company's computers are connected via a network |
|
standard business format |
one of three important characteristics of EDI
necessary so companies, vendors, and sellers can interact and trade electronically by EDI software |
|
Point of sale (POS) system |
hard/software system that captures sales thru barcoding
occurs in real-time
enhances CSAT by enabling faster & accurate sales |
|
Automated matching |
hard/software system which software matches an invoice to related PO and receiving report
files must be online and ready for processing; PO and receiving files must be in database/online |
|
Automated matching process |
invoice received from vendor, employee enters details with PO, verifies items, quantities, and price.
ensures correct billing |
|
Evaluated receipt settlement (ERS) |
invoiceless system - computer hard/software complete invoiceless matching comparing PO with goods received
if matched payment is made to vendor
reduces time and cost of processing payments |
|
E-payables and electronic invoice presentment and payment (EIPP) |
web-enables receipt and payment of vendor invoices
enables vendor to send invoice via internet |
|
Enterprise resource planning (ERP) |
multi-module software system designed to manage all aspects of an enterprise
broken into modules: financials, sales, purchasing, inventory mgt, manufacturing, & HR
work seamlessly with system and provided user interface between modules |
|
Reductions of risk |
1. assets will be stolen or misused 2. errors in accounting data or info 3. fraudulent activity by employees, managers, customers, or vendors 4. risk inherent in IT systems |
|
Risks in IT systems |
1. erroneous input of data 2. erroneous processing of data 3. computer fraud 4. computer security breaches 5. hardware or software failure 6. natural disasters that can interrupt computer system operations |
|
Enterprise risk management (ERM) |
is the responsibility of mgt is an ongoing process - continuous assessment of risks, determination of acceptable levels of risks, and mgt of risks to acceptable level must involve personnel across the enterprise and mgt |
|
ERM requires mgt to |
set procedures and policies related to 1. internal environment 2. objective setting 3. event identification 4. risk assessment 5. risk repsonse 6. control activities 7. info and communication 8. monitoring |
|
internal environment & ERM |
encompasses the tone of an organization sets the basis for how risk is viewed and addressed by an entity's people |
|
objective setting & ERM |
must exist before mgt can identify potential events affecting achievement
ERMs ensure mgt has a process to set obj and that they align with the mission and are consistent with its risk appetite. |
|
event identification & ERM |
internal and external events affecting achievement of entity's objs must be identified with risks and opportunities
opportunities are channeled back to mgts strategy or objective-setting process |
|
risk assessment & ERM |
analyzed by likelihood & impact as a basis for determining how they should be managed
assessed on inherent and residual basis; the likelihood of errors is considered both before and after the application controls |
|
risk response & ERM |
management selects avoiding, accepting, reducing, or sharing risk by developing a set of actions to align risks with the entity's risk tolerances and appetite. |
|
control activities & ERM |
policies and procedures established and implemented to help ensure that the risk responses are effectively carried out |
|
information and communication & ERM |
relevant info is identified, captured, and communicated una form and time frame that enable people to carry out their responsibilities.
effective communication also occurs in a broader sense, flowing down, across, and up the entity |
|
monitoring &ERM |
entirety of ERM is monitored and modified if necessary
accomplished through ongoing management activities (internal auditing), separate evaluations (such as those performed by external auditors), or both |
|
Code of Ethics |
reduce opportunities for managers or employees to conduct fraud
top mgt must emphasize code of ethics and discipline or discharge those who violate it
managers must emphasize and model ethical behavior to encourage ethical behavior in their employees |
|
Internal Controls - Intergrated Framework |
definition and description of internal controls |
|
five interrealted components of internal control |
1. control environment 2. risk assessment 3. control activities 4. information and communication 5. monitoring |
|
General controls |
apply to the overall IT system
not restricted to a particular accounting application |
|
Example of general controls |
ise of passwords to allow only authorized users to log into an IT-based accounting system
without regard to processing data in any specific application passwords should be employed in the IT system |
|
Application controls |
used in accounting applications to control inputs, processing, and output.
intended to ensure that inputs & processing are accurate and complete, and outputs are properly distributed, controlled, and disposed of. |
|
Corporate governance |
elaborate system of checks and balances whereby a company's leadership is held accountable for building shareholder value and creating confidence in the financial reporting processes |
|
IT governance |
proper management, control, and use of IT systems
|
|
Management focus to fulfill obligations in IT governance |
1. aligning IT strategy with the business strategy 2. cascading strategy and goals down into the enterprise 3. providing organizational structures that facilitate the implementation of strategies and goals 4. insisting that an IT control g framework be adopted and implemented |
|
importance of AIS to accountants |
users of AIS accomplish the functions of accounting, generate accounting reports, and use accounting reports
design or implementation team - decide which software to purchse, how to design software/systems, and implementation of software/systems
auditor of AIS cannot make informed decisions to complete audit without understanding AIS |
|
unethical accounting behaviors |
fraudulent financial reporting revenue inflation expense account fraud inflating hours worked for payroll purpose computer fraud hacking browsing confidential data |