The document discusses accounting information systems and their role in organizing and reporting financial information. It defines key terms like data, information, and the functional steps to transform data into useful information for decision making. It also outlines common business activities, source documents, data storage methods, and coding techniques used to classify financial information.
The document discusses accounting information systems and their role in organizing and reporting financial information. It defines key terms like data, information, and the functional steps to transform data into useful information for decision making. It also outlines common business activities, source documents, data storage methods, and coding techniques used to classify financial information.
The document discusses accounting information systems and their role in organizing and reporting financial information. It defines key terms like data, information, and the functional steps to transform data into useful information for decision making. It also outlines common business activities, source documents, data storage methods, and coding techniques used to classify financial information.
The document discusses accounting information systems and their role in organizing and reporting financial information. It defines key terms like data, information, and the functional steps to transform data into useful information for decision making. It also outlines common business activities, source documents, data storage methods, and coding techniques used to classify financial information.
Download as DOCX, PDF, TXT or read online from Scribd
Download as docx, pdf, or txt
You are on page 1of 4
acis – prelim information generation
interpreting, reporting, and communicating
the study of accounting information systems information. accounting information system it is the principal way of organizing and reporting is a framework in which data is collected, financial information. it has been called the processed, controlled and managed through “language of business.” stages in order to provide information to users accounting and information systems comprise it evolves over time and becomes more the functional area of business responsible for formalized as a firm grows and becomes more providing information to the other areas to enable complex. it can be a manual or computerized them to do their jobs and for reporting the results system to interested parties. firms depend on information systems in order to to that end, an accounting system is used to survive and stay competitive identify, analyze, measure, record, summarize, and communicate relevant economic information accounting information system to interested parties. is a unified structure that employs physical resources and components to transform systems economic data into accounting information for is an entity consisting of interacting parts that are external and internal users. coordinated to achieve one or more common objectives. Systems must possess input, roles of accountants with respect to an ais process, and output. financial accountants data prepare financial information for external data are raw facts and figures that are processed decision-making in accordance with GAAP. to produce information. managerial accountants information prepare financial information for internal decision- is data that have been processed and are making. meaningful and useful to users. The terms “meaningful” and “useful” are value – laden terms auditors and usually subsume other qualities such as evaluate controls and attest to the fairness of the timeliness, relevance, reliability, consistency, financial statements. comparability, etc. accounting managers functional steps in transforming data into information control all accounting activities of a firm.
data collection tax specialists
capturing, recording, validating and editing data develop information that reflects tax obligations for completeness, and accuracy. of the firm.
data maintenance/processing consultants
classifying, sorting, calculating data. devise specifications for the AIS.
data management transaction processing: the data processing cycle
storing, maintaining and retrieving data. data input data control steps in processing input are: safeguarding and securing data and ensuring the capture transaction data triggered by a accuracy and completeness of the same. business activity (event). make sure captured data are accurate and complete. ensure company policies are followed (e.g., source data automation devices approval of transaction) captures transaction data in machine-readable data capture form at the time and place of their origin. information collected for an activity includes: data storage activity of interest (e.g., sale) resources affected (e.g., inventory and cash) important to understand how data is organized people who participated (e.g., customer and chart of accounts employee) coding schemas that are well thought information comes from source documents. out to anticipate management needs are most efficient and effective. source document transaction journals (e.g., sales) captures data at the source when the transaction subsidiary ledgers (e.g., accounts takes place receivable) paper source documents general ledger turnaround documents note: with the above, one can trace the path of the source data automation (captured data from transaction (audit trail). machines, e.g., point of sale scanners at ledgers grocery store) general ledger- contains summary-level data for common business activities & source documents every asset, liability, equity, revenue and expense account. business activity source documents revenue cycle subsidiary ledger take customer order sales order contains detailed data for any general ledger deliver or ship order delivery ticket or bill of account with many individual subaccounts. landing receive cash remittance advice or remit. coding techniques list data in ledgers are organized logically using deposit cash receipt deposit slip coding techniques. adjust customer credit memo coding is the systematic assignment of numbers account or letters to items to classify and organize them.
business activity source documents 1. sequence code
expenditure cycle items are numbered consecutively to account for request items purchase requisition all items. any missing items cause a gap in the order items purchase order numerical sequence. receive items receiving report 2. block code pay for items check or electronic fund transfer blocks of numbers are reserved for specific categories of data. common business activities & source documents- 3. group code human resource cycle two or more subgroups of digits used to code business activities source documents items, are often used in conjunction with block record time worked by time cards codes. employees 4. mnemonic code record time spent of job time tickets or time sheet letters and numbers are interspersed to identify specific jobs an item. the mnemonic code is derived from the description of the item and is usually easy to financial reporting memorize. systems documentation techniques system implementation chart of accounts involves the actual carrying out of the design a list of the numbers assigned to each general plan. ledger account. documentation is one of the most important parts of systems general journal implementation used to record infrequent or nonroutine transactions. flowchart. specialized journal is a symbolic diagram that shows the data flow records large numbers of repetitive transactions and sequence of operations in a system. such as sales, cash receipts, and cash probably the most common systems technique. disbursements. symbol audit trail used in a flowchart to represent the functions of a traceable path of a transaction through a data an information or other type of system. processing system from point of origin to final output, or from final output to point of origin. normal direction of flow it is used to check the accuracy and validity of from left to right and top to bottom. ledger postings. analytic flowchart information output identifies all significant processing in an the data stored in the database files can be application, emphasizing processing tasks that viewed apply controls. online (soft copy) flow of processing is depicted using symbols printed out (hard copy) connected with flowlines.
document – records of transaction or other document flowchart
company data (e.g., sales invoice) similar in format to an analytic flowchart but contains less detail about the processing report – used by employees to control functions of each entity shown on the chart. operational activities and by managers to make the only symbol used in a document flowchart is decisions and to formulate business strategies the document symbol. (e.g., monthly sales report) flow distribution chart query – is used to provide the information illustrates the distribution of multiple copy forms needed to deal with problems and questions that with an organization. need rapid action or answers. (question for the emphasis is on who gets what forms rather specific information in a database, e.g., what than on how these forms are processed. division had the most sales for the month?) social engineering attacks enterprise resource planning (ERP) systems Integrates activities from the entire organization phishing production is a fraudulent attempt, usually made through payroll email, to steal your personal information. sales is a cyber-attack that uses disguised email as a purchasing weapon. the goal is to trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or a note from someone in their company — and to click a link or download an attachment. obtains personal information such as names, addresses, social security numbers. use shortened or misleading links that redirect users to suspicious websites that host phishing landing pages. incorporate threats, fear and a sense of urgency in an attempt to manipulate the user into responding quickly. 5 categories of phishing 1. vishing – voice + phishing 2. smishing – SMS phishing 3. search engine phishing 4. spear phishing – email or electronic communications scam targeted towards a specific individual, organization or business. although often intended to steal data for malicious purposes, cybercriminals may also intend to install malware on a targeted user’s computer. 5. whaling – this technique targets C-suite posts like CEO, CFO, COO – or any other senior management positions – who are considered to be big players in the information chain of any organization, commonly known as “whales” in phishing terms. phishing a broad, automated attack that is less sophisticated. spear-phishing a customized attack on a specific employee & company.