College of Administration and Finance Sciences
Assignment (2)
Deadline: November 11th 2023 @ 23:59
Course Name: Introduction to AIS
Student’s Name:
Course Code: ACCT402
Student’s ID Number:
Semester: 1st
CRN: 13950
Academic Year: 1445 H
For Instructor’s Use only
Instructor’s Name: Dr. Youssef RIAHI
Students’ Grade:
/15
Level of Marks: High/Middle/Low
Instructions – PLEASE READ THEM CAREFULLY
• The Assignment must be submitted on Blackboard (WORD format only) via
allocated folder.
• Assignments submitted through email will not be accepted.
• Students are advised to make their work clear and well presented, marks may be
reduced for poor presentation. This includes filling your information on the cover
page.
• Students must mention question number clearly in their answer.
• Late submission will NOT be accepted.
• Avoid plagiarism, the work should be in your own words, copying from students or
other resources without proper referencing will result in ZERO marks. No
exceptions.
• All answers must be typed using Times New Roman (size 12, double-spaced) font.
No pictures containing text will be accepted and will be considered plagiarism.
• Submissions without this cover page will NOT be accepted.
College of Administration and Finance Sciences
Assignment Question(s):
(Marks 15)
IMPORTANT NOTE: Answer in your own words, DO NOT COPY from slides,
fellow student, or internet source without proper citation.
Assignment Question(s):
Q1
What does Internal Control means? Then explain its two main frameworks.
(5 marks)
Q2
Explain the reasons of hacking? Discuss why has hacking increased in recent years? Give
your opinion on hacking.
(5 marks)
Q3
Explain the objectives of Information Systems Audit?
(2.5 Marks)
Q4
What are the activities of sales order entry? Give two of the threat that may face and what
could be the possible controls for those threats?
Good Luck
(2.5 Marks)
Accounting
Information
Systems
This page intentionally left blank
Accounting
Information
Systems
Thirteenth Edition
Marshall B. Romney
Brigham Young University
Paul John Steinbart
Arizona State University
Boston Columbus Indianapolis New York San Francisco Upper Saddle River
Amsterdam CapeTown Dubai London Madrid Milan Munich Paris Montréal Toronto
Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo
Editor in Chief: Donna Battista
Acquisitions Editor: Ellen Geary
Editorial Assistant: Christine Donovan
Director of Marketing: Maggie Moylan Leen
Marketing Manager: Alison Haskins
Team Lead, Project Management: Jeff Holcomb
Senior Production Project Manager: Liz Napolitano
Manager, Rights & Permissions Manager: Michael Joyce
Rights & Permissions Coordinator: Samantha Graham
Senior Manufacturing Buyer: Carol Melville
Interior Designer: Liz Harasymcuk
Cover Designer: Laura Gardner, Creative Circle
Cover Art: Roman Okopny/iStock Vectors/Getty Images
Full-Service Project Management: Jen Carley, PreMediaGlobal, Inc.
Composition: PreMediaGlobal. Inc.
Printer/Binder: Courier/Kendallville
Cover Printer: Lehigh-Phoenix Color/Hagerstown
Typeface: 10/12 Times
Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on the
appropriate page within text.
Photo Credits: Laptop icon, throughout book: Zentilia/Shutterstock; Blue eye icon, throughout book: Sam D. Cruz/Shutterstock;
pp. i, iii (top), 1, 3, 25, 49, 83: Ian Dagnall/Alamy; pp. i, iii (bottom), 121, 123, 151, 189, 229, 261, 287, 311: ViewApart/Fotolia;
pp. 337, 339, 379, 415, 443, 471: Image Source/Getty Images; pp. 587, 589, 623, 651: Radius Images/Alamy.
Microsoft and/or its respective suppliers make no representations about the suitability of the information contained in the documents and related graphics published as part of the services for any purpose. All such documents and related graphics are provided
“as is” without warranty of any kind. Microsoft and/or its respective suppliers hereby disclaim all warranties and conditions with
regard to this information, including all warranties and conditions of merchantability, whether express, implied or statutory, fitness
for a particular purpose, title and non-infringement. In no event shall Microsoft and/or its respective suppliers be liable for any special, indirect or consequential damages or any damages whatsoever resulting from loss of use, data or profits, whether in an action
of contract, negligence or other tortious action, arising out of or in connection with the use or performance of information available
from the services.
The documents and related graphics contained herein could include technical inaccuracies or typographical errors. Changes are
periodically added to the information herein. Microsoft and/or its respective suppliers may make improvements and/or changes in
the product(s) and/or the program(s) described herein at any time. Partial screen shots may be viewed in full within the software
version specified.
Microsoft® and Windows® are registered trademarks of the Microsoft Corporation in the U.S.A. and other countries. This book is
not sponsored or endorsed by or affiliated with the Microsoft Corporation.
Copyright © 2015, 2012, 2009 by Pearson Education, Inc. All rights reserved. Manufactured in the United States of America. This
publication is protected by Copyright, and permission should be obtained from the publisher prior to any prohibited reproduction,
storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording,
or likewise. To obtain permission(s) to use material from this work, please submit a written request to Pearson Education, Inc.,
Permissions Department, One Lake Street, Upper Saddle River, New Jersey 07458, or you may fax your request to 201-236-3290.
Many of the designations by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those
designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed in initial
caps or all caps.
Library of Congress Cataloging-in-Publication Data
Romney, Marshall B.
Accounting information systems / Marshall B. Romney, Brigham Young University, Paul J. Steinbart,
Arizona State University. — Thirteenth Edition.
pages cm
Includes index.
ISBN 978-0-13-342853-7 (alk. paper)
1. Accounting—Data processing. 2. Information storage and retrieval systems—Accounting. I. Steinbart,
Paul John. II. Title.
HF5679.R6296 2014
657.0285—dc23
2013044830
10 9 8 7 6 5 4 3 2 1
ISBN 10:
0-13-342853-2
ISBN 13: 978-0-13-342853-7
Brief Contents
Preface xix
PART I
Conceptual Foundations of Accounting Information
Systems 1
Chapter 1 Accounting Information Systems: An Overview 2
Chapter 2 Overview of Transaction Processing and Enterprise
Resource Planning Systems 24
Chapter 3 Systems Documentation Techniques 48
Chapter 4 Relational Databases 82
PART II Control and Audit of Accounting Information
Systems 121
Chapter 5 Computer Fraud 122
Chapter 6 Computer Fraud and Abuse Techniques 150
Chapter 7 Control and Accounting Information Systems 188
Chapter 8 Controls for Information Security 228
Chapter 9 Confidentiality and Privacy Controls 260
Chapter 10 Processing Integrity and Availability Controls 286
Chapter 11 Auditing Computer-Based Information Systems 310
PART III Accounting Information Systems Applications 337
Chapter 12 The Revenue Cycle: Sales to Cash Collections 338
Chapter 13 The Expenditure Cycle: Purchasing to Cash
Disbursements 378
Chapter 14 The Production Cycle 414
Chapter 15 The Human Resources Management and Payroll Cycle 442
Chapter 16 General Ledger and Reporting System 470
v
vi
Brief Contents
PART IV The REA Data Model 501
Chapter 17 Database Design Using the REA Data Model 502
Chapter 18 Implementing an REA Model in a Relational Database 534
Chapter 19 Special Topics in REA Modeling 556
PART V The Systems Development Process 587
Chapter 20 Introduction to Systems Development and Systems
Analysis 588
Chapter 21 AIS Development Strategies 622
Chapter 22 Systems Design, Implementation, and Operation 650
Glossary 676
Index 697
Contents
Preface xix
Part I
Conceptual Foundations of Accounting Information
Systems 1
Chapter 1 Accounting Information Systems: An Overview 2
Introduction 3
Information Needs and Business Processes 5
Information Needs 5
Business Processes 6
Accounting Information Systems 10
How an AIS Can Add Value to an Organization 11
The AIS and Corporate Strategy 12
The Role of the AIS in the Value Chain 14
Summary and Case Conclusion 15 ■ Key Terms 16
AIS in Action: Chapter Quiz 16 ■ Discussion Questions 17 ■ Problems 18
Case 1-1 Ackoff’s Management Misinformation Systems 21
AIS in Action Solutions: Quiz Key 22
Chapter 2 Overview of Transaction Processing and Enterprise
Resource Planning Systems 24
Introduction 25
Transaction Processing: The Data Processing Cycle 26
Data Input 26
Data Storage 27
Data Processing 33
Information Output 33
Enterprise Resource Planning (ERP) Systems 35
Summary and Case Conclusion 38 ■ Key Terms 38
AIS in Action: Chapter Quiz 38 ■ Discussion Questions 39 ■ Problems 40
Case 2-1 Bar Harbor Blueberry Farm 44
AIS in Action Solutions: Quiz Key 45
Chapter 3 Systems Documentation Techniques 48
Introduction 49
Data Flow Diagrams 50
Subdividing the DFD 52
vii
viii
Contents
Flowcharts 56
Types of Flowcharts 57
Program Flowcharts 60
Business Process Diagrams 60
Summary and Case Conclusion 64 ■ Key Terms 64
AIS in Action: Chapter Quiz 64 ■ Comprehensive Problem 65 ■
Discussion Questions 66 ■ Problems 66
Case 3-1 Dub 5 73
AIS in Action Solutions: Quiz Key 74 ■ Comprehensive Problem Solution 76
Chapter 4 Relational Databases 82
Introduction 82
Files Versus Databases 83
Using Data Warehouses for Business Intelligence 84
The Advantages of Database Systems 85
The Importance of Good Data 85
Database Systems 86
Logical and Physical Views of Data 86
Schemas 86
The Data Dictionary 88
DBMS Languages 88
Relational Databases 88
Types of Attributes 88
Designing a Relational Database for S&S, Inc. 90
Basic Requirements of a Relational Database 92
Two Approaches to Database Design 93
Creating Relational Database Queries 93
Query 1 95
Query 2 97
Query 3 98
Query 4 98
Query 5 100
Database Systems and the Future of Accounting 100
Summary and Case Conclusion 101 ■ Key Terms 102
AIS in Action: Chapter Quiz 102 ■ Comprehensive Problem 103 ■
Discussion Questions 104 ■ Problems 104
Case 4-1 Research Project 110
AIS in Action Solutions: Quiz Key 110 ■ Comprehensive Problem Solution 112 ■
Appendix: Data Normalization 114 ■ Summary 117 ■ Second Normalization Example 117
Part II Control and Audit of Accounting Information
Systems 121
Chapter 5 Computer Fraud 122
Introduction 123
AIS Threats 124
Introduction to Fraud 126
Misappropriation of Assets 127
Fraudulent Financial Reporting 128
SAS No. 99: The Auditor’s Responsibility to Detect Fraud 128
Who Perpetrates Fraud and Why 129
The Fraud Triangle 129
Contents
Computer Fraud 134
The Rise in Computer Fraud 134
Computer Fraud Classifications 136
Preventing and Detecting Fraud and Abuse 138
Summary and Case Conclusion 139 ■ Key Terms 140
AIS in Action: Chapter Quiz 140 ■ Discussion Questions 141 ■ Problems 142
Case 5-1 David L. Miller: Portrait of a White-Collar Criminal 144
Case 5-2 Heirloom Photo Plans 145
AIS in Action Solutions: Quiz Key 147
Chapter 6 Computer Fraud and Abuse Techniques 150
Introduction 150
Computer Attacks and Abuse 151
Social Engineering 159
Malware 164
Summary and Case Conclusion 173 ■ Key Terms 174
AIS in Action: Chapter Quiz 175 ■ Discussion Questions 176 ■ Problems 176
Case 6-1 Shadowcrew 184
AIS in Action Solutions: Quiz Key 185
Chapter 7 Control and Accounting Information Systems 188
Introduction 189
Why Threats to Accounting Information Systems are Increasing 189
Overview of Control Concepts 190
The Foreign Corrupt Practices and Sarbanes–Oxley Acts 191
Control Frameworks 192
Cobit Framework 192
COSO’s Internal Control Framework 194
COSO’s Enterprise Risk Management Framework 194
The Enterprise Risk Management Framework Versus the Internal
Control Framework 196
The Internal Environment 196
Management’s Philosophy, Operating Style, and Risk Appetite 197
Commitment to Integrity, Ethical Values, and Competence 197
Internal Control Oversight by the Board of Directors 198
Organizational Structure 198
Methods of Assigning Authority and Responsibility 198
Human Resources Standards that Attract, Develop, and Retain
Competent Individuals 198
External Influences 200
Objective Setting 200
Event Identification 201
Risk Assessment and Risk Response 201
Estimate Likelihood and Impact 202
Identify Controls 203
Estimate Costs and Benefits 203
Determine Cost/Benefit Effectiveness 203
Implement Control or Accept, Share, or Avoid the Risk 203
Control Activities 204
Proper Authorization of Transactions and Activities 204
Segregation of Duties 205
Project Development and Acquisition Controls 207
Change Management Controls 208
ix
x
Contents
Design and Use of Documents and Records 208
Safeguard Assets, Records, and Data 208
Independent Checks on Performance 209
Information and Communication 210
Monitoring 210
Perform Internal Control Evaluations 210
Implement Effective Supervision 210
Use Responsibility Accounting Systems 210
Monitor System Activities 211
Track Purchased Software and Mobile Devices 211
Conduct Periodic Audits 211
Employ a Computer Security Officer and a Chief Compliance Officer 212
Engage Forensic Specialists 212
Install Fraud Detection Software 212
Implement a Fraud Hotline 213
Summary and Case Conclusion 213 ■ Key Terms 214
AIS in Action: Chapter Quiz 214 ■ Discussion Questions 216 ■ Problems 216
Case 7-1 The Greater Providence Deposit & Trust Embezzlement 224
AIS in Action Solutions: Quiz Key 225
Chapter 8 Controls for Information Security 228
Introduction 228
Two Fundamental Information Security Concepts 230
Security is a Management Issue, Not Just a Technology Issue 230
Defense-in-Depth and the Time-Based Model of Information Security 231
Understanding Targeted Attacks 232
Preventive Controls 233
People: Creation of a “Security-Conscious” Culture 233
People: Training 234
Process: User Access Controls 235
It Solutions: Antimalware Controls 238
It Solutions: Network Access Controls 238
It Solutions: Device and Software Hardening Controls 243
It Solutions: Encryption 244
Physical Security: Access Controls 245
Change Controls and Change Management 246
Detective Controls 247
Log Analysis 247
Intrusion Detection Systems 248
Penetration Testing 248
Continuous Monitoring 248
Corrective Controls 248
Computer Incident Response Team (CIRT) 249
Chief Information Security Officer (CISO) 249
Patch Management 250
Security Implications of Virtualization and the Cloud 250
Summary and Case Conclusion 251 ■ Key Terms 252
AIS in Action: Chapter Quiz 252 ■ Discussion Questions 253 ■ Problems 254
Case 8-1 Assessing Change Control and Change Management 257
Case 8-2 Role-Play: Designing an Effective Information Security Program 257
AIS in Action Solutions: Quiz Key 258
Contents
Chapter 9 Confidentiality and Privacy Controls 260
Introduction 260
Preserving Confidentiality 261
Identify and Classify Information to be Protected 261
Protecting Confidentiality With Encryption 262
Controlling Access to Sensitive Information 262
Training 264
Privacy 264
Privacy Controls 264
Privacy Concerns 265
Privacy Regulations and Generally Accepted Privacy Principles 267
Encryption 268
Factors that Influence Encryption Strength 269
Types of Encryption Systems 270
Hashing 272
Digital Signatures 272
Digital Certificates and Public Key Infrastructure 274
Virtual Private Networks (VPNS) 275
Summary and Case Conclusion 276 ■ Key Terms 276
AIS in Action: Chapter Quiz 277 ■ Discussion Questions 278 ■ Problems 278
Case 9-1 Protecting Privacy of Tax Returns 282
Case 9-2 Generally Accepted Privacy Principles 282
AIS in Action Solutions: Quiz Key 283
Chapter 10 Processing Integrity and Availability Controls 286
Introduction 286
Processing Integrity 286
Input Controls 287
Processing Controls 289
Output Controls 290
Illustrative Example: Credit Sales Processing 291
Processing Integrity Controls in Spreadsheets 292
Availability 293
Minimizing Risk of System Downtime 293
Recovery and Resumption of Normal Operations 294
Summary and Case Conclusion 298 ■ Key Terms 299
AIS in Action: Chapter Quiz 299 ■ Discussion Questions 300 ■ Problems 301
Case 10-1 Ensuring Systems Availability 306
Case 10-2 Ensuring Process Integrity in Spreadsheets 307
AIS in Action Solutions: Quiz Key 308
Chapter 11 Auditing Computer-Based Information Systems 310
Introduction 311
The Nature of Auditing 312
Overview of the Audit Process 312
The Risk-Based Audit Approach 314
Information Systems Audits 315
Objective 1: Overall Security 315
Objective 2: Program Development and Acquisition 317
Objective 3: Program Modification 318
Objective 4: Computer Processing 319
Objective 5: Source Data 322
Objective 6: Data Files 323
xi
xii
Contents
Audit Software 324
Operational Audits of an AIS 326
Summary and Case Conclusion 326 ■ Key Terms 327
AIS in Action: Chapter Quiz 327 ■ Discussion Questions 328 ■ Problems 329
Case 11-1 Preston Manufacturing 333
AIS in Action Solutions: Quiz Key 333
Part III Accounting Information Systems Applications 337
Chapter 12 The Revenue Cycle: Sales to Cash Collections 338
Introduction 340
Revenue Cycle Information System 341
Process 341
Threats and Controls 342
Sales Order Entry 344
Taking Customer Orders 345
Credit Approval 347
Checking Inventory Availability 349
Responding to Customer Inquiries 351
Shipping 352
Pick and Pack the Order 352
Ship the Order 354
Billing 357
Invoicing 357
Maintain Accounts Receivable 359
Cash Collections 362
Process 362
Threats and Controls 363
Summary and Case Conclusion 365 ■ Key Terms 366
AIS in Action: Chapter Quiz 366 ■ Discussion Questions 367 ■ Problems 367
Case 12-1 Research Project: How CPA Firms Are Leveraging New Developments in IT 375
AIS in Action Solutions: Quiz Key 375
Chapter 13 The Expenditure Cycle: Purchasing to Cash
Disbursements 378
Introduction 379
Expenditure Cycle Information System 381
Process 381
Threats and Controls 383
Ordering Materials, Supplies, and Services 386
Identifying What, When, and How Much to Purchase 386
Choosing Suppliers 389
Receiving 393
Process 393
Threats and Controls 394
Approving Supplier Invoices 395
Process 395
Threats and Controls 397
Cash Disbursements 399
Process 399
Threats and Controls 399
Contents
Summary and Case Conclusion 401 ■ Key Terms 402
AIS in Action: Chapter Quiz 402 ■ Discussion Questions 403 ■ Problems 404
Case 13-1 Research Project: Impact of Information Technology on Expenditure Cycle Activities,
Threats, and Controls 411
AIS in Action Solutions: Quiz Key 412
Chapter 14 The Production Cycle 414
Introduction 415
Production Cycle Information System 417
Process 418
Threats and Controls 418
Product Design 419
Process 419
Threats and Controls 421
Planning and Scheduling 421
Production Planning Methods 421
Key Documents and Forms 421
Threats and Controls 424
Production Operations 426
Threats and Controls 426
Cost Accounting 428
Process 428
Threats and Controls 429
Summary and Case Conclusion 434 ■ Key Terms 435
AIS in Action: Chapter Quiz 435 ■ Discussion Questions 436 ■ Problems 436
Case 14-1 The Accountant and CIM 439
AIS in Action Solutions: Quiz Key 440
Chapter 15 The Human Resources Management
and Payroll Cycle 442
Introduction 443
HRM/Payroll Cycle Information System 444
Overview of HRM Process and Information Needs 444
Threats and Controls 447
Payroll Cycle Activities 449
Update Payroll Master Database 449
Validate Time and Attendance Data 451
Prepare Payroll 453
Disburse Payroll 457
Calculate and Disburse Employer-Paid Benefits Taxes and Voluntary
Employee Deductions 458
Outsourcing Options: Payroll Service Bureaus and Professional
Employer Organizations 459
Summary and Case Conclusion 460 ■ Key Terms 461
AIS in Action: Chapter Quiz 461 ■ Discussion Questions 462 ■ Problems 462
Case 15-1 Research Report: HRM/Payroll Opportunities for CPAs 467
AIS in Action Solutions: Quiz Key 468
Chapter 16 General Ledger and Reporting System 470
Introduction 471
General Ledger and Reporting System 472
Process 472
Threats and Controls 473
xiii
xiv
Contents
Update General Ledger 475
Process 475
Threats and Controls 475
Post Adjusting Entries 478
Process 479
Threats and Controls 479
Prepare Financial Statements 480
Process 480
Threats and Controls 484
Produce Managerial Reports 486
Process 486
Threats and Controls 486
Summary and Case Conclusion 490 ■ Key Terms 491
AIS in Action: Chapter Quiz 491 ■ Discussion Questions 492 ■ Problems 493
Case 16-1 Exploring XBRL Tools 497
Case 16-2 Evaluating a General Ledger Package 497
Case 16-3 Visualization tools for Big Data 497
AIS in Action Solutions: Quiz Key 498
Part IV The REA Data Model 501
Chapter 17 Database Design Using the REA Data Model 502
Introduction 502
Database Design Process 503
Entity-Relationship Diagrams 504
The REA Data Model 505
Three Basic Types of Entities 506
Structuring Relationships: The Basic REA Template 506
Developing an REA Diagram 509
Step 1: Identify Relevant Events 509
Step 2: Identify Resources and Agents 511
Step 3: Determine Cardinalities of Relationships 512
Summary and Case Conclusion 518 ■ Key Terms 519
AIS in Action: Chapter Quiz 519 ■ Comprehensive Problem 522 ■
Discussion Questions 522 ■ Problems 523
Case 17-1 REA Data Modeling Extension 526
AIS in Action Solutions: Quiz Key 526 ■ Comprehensive Problem Solution 530
Chapter 18 Implementing an REA Model in a Relational Database 534
Introduction 535
Integrating REA Diagrams Across Cycles 535
Rules for Combining REA Diagrams 538
Merging Redundant Resource Entities 538
Merging Redundant Event Entities 539
Validating the Accuracy of Integrated REA Diagrams 540
Implementing an REA Diagram in a Relational Database 540
Step 1: Create Tables for Each Distinct Entity and M:N Relationship 540
Step 2: Assign Attributes to Each Table 542
Step 3: Use Foreign Keys to Implement 1:1 and 1:N Relationships 543
Completeness Check 544
Using REA Diagrams to Retrieve Information from a Database 545
Creating Journals and Ledgers 545
Contents
Generating Financial Statements 546
Creating Managerial Reports 547
Summary and Case Conclusion 547 ■ Key Term 548
AIS in Action: Chapter Quiz 548 ■ Comprehensive Problem 549 ■
Discussion Questions 549 ■ Problems 550
Case 18-1 Practical Database Design 551
AIS in Action Solutions: Quiz Key 551 ■ Comprehensive Problem Solution 553
Chapter 19 Special Topics in REA Modeling 556
Introduction 557
Additional Revenue and Expenditure Cycle Modeling Topics 557
Additional Revenue Cycle Events and Attribute Placement 557
Additional Expenditure Cycle Events and Attribute Placement 559
Sale of Services 562
Acquisition of Intangible Services 562
Digital Assets 563
Rental Transactions 563
Additional REA Features 565
Employee Roles 565
M:N Agent–Event Relationships 565
Locations 565
Relationships Between Resources and Agents 565
Production Cycle REA Model 566
Additional Entities—Intellectual Property 566
Production Cycle Events 568
New REA Feature 568
Combined HR/Payroll Data Model 569
HR Cycle Entities 569
Tracking Employees’ Time 570
Financing Activities Data Model 571
Summary and Case Conclusion 572
AIS in Action: Chapter Quiz 575 ■ Discussion Questions 576 ■ Problems 577
Case 19-1 Practical Database Assignment 581
AIS in Action Solutions: Quiz Key 581 ■ Appendix: Extending the REA Model to Include
Information About Policies 585
Part V The Systems Development Process 587
Chapter 20 Introduction to Systems Development and Systems
Analysis 588
Introduction 589
Systems Development 591
The Systems Development Life Cycle 591
The Players 592
Planning Systems Development 593
Planning Techniques 594
Feasibility Analysis 595
Capital Budgeting: Calculating Economic Feasibility 596
Behavioral Aspects of Change 598
Why Behavioral Problems Occur 598
How People Resist Change 598
Preventing Behavioral Problems 599
xv
xvi
Contents
Systems Analysis 600
Initial Investigation 600
Systems Survey 601
Feasibility Study 603
Information Needs and Systems Requirements 603
Systems Analysis Report 605
Summary and Case Conclusion 606 ■ Key Terms 607
AIS in Action: Chapter Quiz 608 ■ Comprehensive Problem 609 ■ Discussion
Questions 609 ■ Problems 610
Case 20-1 Audio Visual Corporation 617
AIS in Action Solutions: Quiz Key 618 ■ Comprehensive Problem Solution 620
Chapter 21 AIS Development Strategies 622
Introduction 623
Purchasing Software 623
Selecting a Vendor 624
Acquiring Hardware and Software 624
Evaluating Proposals and Selecting a System 625
Development by In-House Information Systems Departments 627
End-User-Developed Software 627
Advantages and Disadvantages of End-User Computing 628
Managing and Controlling End-User Computing 629
Outsourcing the System 630
Advantages and Disadvantages of Outsourcing 630
Business Process Management 631
Internal Controls in a Business Process Management System 632
Prototyping 633
When to Use Prototyping 634
Advantages of Prototyping 634
Disadvantages of Prototyping 635
Computer-Aided Software Engineering 635
Summary and Case Conclusion 636 ■ Key Terms 637
AIS in Action: Chapter Quiz 637 ■ Comprehensive Problem Freedom from Telemarketers—the do
Not Call List 638 ■ Discussion Questions 638 ■ Problems 639
Case 21-1 Professional Salon Concepts 644
AIS in Action Solutions: Quiz Key 646 ■ Comprehensive Problem Solution 649
Chapter 22 Systems Design, Implementation, and Operation 650
Introduction 651
Conceptual Systems Design 651
Evaluate Design Alternatives 651
Prepare Design Specifications and Reports 653
Physical Systems Design 653
Output Design 654
File and Database Design 654
Input Design 655
Program Design 656
Procedures and Controls Design 657
Systems Implementation 658
Implementation Planning and Site Preparation 658
Selecting and Training Personnel 659
Complete Documentation 660
Testing the System 660
Contents
Systems Conversion 661
Operation and Maintenance 662
Summary and Case Conclusion 663 ■ Key Terms 664
AIS in Action: Chapter Quiz 664 ■ Comprehensive Problem Hershey’s Big Bang ERP 665 ■
Discussion Questions 666 ■ Problems 667
Case 22-1 Citizen’s Gas Company 672
AIS in Action Solutions: Quiz Key 673 ■ Comprehensive Problem Solution 675
Glossary 676
Index 697
xvii
This page intentionally left blank
Preface
To the Instructor
This book is intended for use in a one-semester course in accounting information systems at
either the undergraduate or graduate level. Introductory financial and managerial accounting
courses are suggested prerequisites, and an introductory information systems course that covers a computer language or software package is helpful, but not necessary.
The book can also be used as the main text in graduate or advanced undergraduate management information systems courses.
The topics covered in this text provide information systems students with a solid understanding of transaction processing systems that they can then build on as they pursue more indepth study of specific topics such as databases, data warehouses and data mining, networks,
systems analysis and design, computer security, and information system controls.
Enhancements in the Thirteenth Edition
Perhaps the most noticeable change in the thirteenth edition is the change from a two-color
design to a full-color design. This improves the readability of figures and diagrams, making
it easier for students to understand relationships among concepts. We also made extensive
revisions to the content of the material to incorporate recent developments, while retaining the
features that have made prior editions easy to use. Every chapter has been updated to include
up-to-date examples of important concepts. Specific changes include:
1. Introduction of business process diagrams in Chapter 3 and their use in the five chapters
of Part III to provide an easy-to-understand method for showing the sequential flow of
activities within business processes.
2. More detailed discussion of internal control frameworks: COSO, COSO-ERM, and
COBIT. In particular, we discuss the new revision to the COSO framework and have updated the discussion of IT controls to reflect the new distinction between governance and
management that was introduced in COBIT 5.
3. Updated discussion of information security countermeasures, including the security and
control implications associated with virtualization and cloud computing. We also moved
the material on change management from Chapter 10 to Chapter 8 to reflect its importance as one of the key layers of defense.
4. Annotation of the data flow diagrams in the five chapters of Part III to include information about when and where major internal control threats exist within each business process. In addition, in each chapter the discussion of controls to mitigate the various threats
has also been revised to explicitly reference the summary table of threats and countermeasures found in each chapter. Each chapter also explicitly discusses how to properly
configure ERP systems to enforce proper segregation of duties.
xix
xx
Preface
5. Many new end-of-chapter discussion questions and problems, including additional Excel
exercises that are based on articles from the Journal of Accountancy so that students can
develop the specific skills used by practitioners.
6. Many new computer fraud and abuse techniques have been added to help students understand the way systems are attacked.
7. The database chapter has been updated with all new tables and figures so that the Microsoft Access screen shots reflect the latest version of that product. At the request of some
of our loyal adopters, an Appendix to Chapter 4 is included with this edition of the text
that discusses database normalization.
Customizing this Text
Pearson Custom Library can help you customize this textbook to fit how you teach the course.
You can select just the chapters from this text that you plan to cover and arrange them in
the sequence you desire. You even have the option to add your own material or third party
content. In addition, you may choose an alternate version of the REA material presented in
Chapters 17–19 that uses the Batini style notation instead of the crows feet notation featured
in this book.
To explore how to create a customized version of the book you can contact your Pearson
representative.
Supplemental Resources
As with prior editions, our objective in preparing this thirteenth edition has been to simplify
the teaching of AIS by enabling you to concentrate on classroom presentation and discussion,
rather than on locating, assembling, and distributing teaching materials. To assist you in this
process, the following supplementary materials are available to adopters of the text:
●
●
●
●
●
Solutions Manual prepared by Marshall Romney at Brigham Young University and Paul
John Steinbart at Arizona State University
Instructors Manual prepared by Robyn Raschke at University of Nevada–Las Vegas
Test Item File prepared by Robert Marley at Georgia Southern University
TestGen testing software, a computerized test item file
PowerPoint Presentation slides developed by Robyn Raschke at University of Nevada–
Las Vegas
The thirteenth edition includes an entirely new set of PowerPoint slides that make extensive use of high-quality graphics to illustrate key concepts. The slides do not merely consist
of bullet points taken verbatim from the text, but instead are designed to help students notice
and understand important relationships among concepts. The large number of slides provides
instructors a great deal of flexibility in choosing which topics they wish to emphasize in class.
In addition, you can access all these supplements from the protected instructor area of
www.pearsonhighered.com.
We recognize that you may also wish to use specific software packages when teaching the
AIS course. Contact your Pearson representative to learn about options for bundling this text
(or a customized version) with software packages or other texts such as Peachtree Computerized Practice Set: Comprehensive Assurance and Systems Tool (CAST); Manual AIS Practice
Set: Comprehensive Assurance and Systems Tool (CAST); or CAST: Auditing Simulation, all
written by Laura R. Ingraham and J. Gregory Jenkins, both at North Carolina State University.
To the Student
As did previous editions, the thirteenth edition of Accounting Information Systems is designed
to prepare you for a successful accounting career whether you enter public practice, industry,
or government. All of you will be users of accounting information systems. In addition to being
users, some of you will become managers. Others will become internal and external auditors,
Preface
and some of you will become consultants. Regardless of your role, you will need to understand
how accounting information systems work in order to effectively measure how cost-effectively
they perform, to assess their reliability and that of the information produced, or to lead the
redesign and implementation of new and better systems. Mastering the material presented in
this text will give you the foundational knowledge you need in order to excel at all those tasks.
This text discusses important new IT developments, such as virtualization and the move
to cloud computing, because such developments affect business processes and often cause
organizations to redesign their accounting systems to take advantage of new capabilities. The
focus, however, is not on IT for the sake of IT, but on how IT affects business processes and
controls. Indeed, new IT developments not only bring new capabilities, but also often create
new threats and affect the overall level of risk. This text will help you understand these issues
so that you can properly determine how to modify accounting systems controls to effectively
address those new threats and accurately assess the adequacy of controls in those redesigned
systems. We also discuss the effect of recent regulatory developments, such as the SEC mandate to use XBRL and the pending switch from GAAP to IFRS, on the design and operation
of accounting systems.
In addition to technology- and regulatory-driven changes, companies are responding to
the increasingly competitive business environment by reexamining every internal activity in
an effort to reap the most value at the least cost. As a result, accountants are being asked to
do more than simply report the results of past activities. They must take a more proactive role
in both providing and interpreting financial and nonfinancial information about the organization’s activities. Therefore, throughout this text we discuss how accountants can improve the
design and functioning of the accounting information system (AIS) so that it truly adds value
to the organization by providing management with the information needed to effectively run
an organization.
Key Learning Objectives
When you finish reading this text, you should understand the following key concepts:
●
●
●
●
●
●
●
●
●
●
●
●
●
The basic activities performed in the major business cycles
What data needs to be collected to enable managers to plan, evaluate, and control the
business activities in which an organization engages
How IT developments can improve the efficiency and effectiveness of business
processes
How to design an AIS to provide the information needed to make key decisions in each
business cycle
The risk of fraud and the motives and techniques used to perpetrate fraud
The COSO and COSO-ERM models for internal control and risk management, as well as
the specific controls used to achieve those objectives
The Control Objectives for Information and Related Technology (COBIT) Framework
for the effective governance and control of information systems and how IT affects the
implementation of internal controls
The AICPA’s Trust Services framework for ensuring systems reliability by developing procedures to protect the confidentiality of proprietary information, maintain
the privacy of personally identifying information collected from customers, assure
the availability of information resources, and provide for information processing
integrity
Fundamentals of information security
Goals, objectives, and methods for auditing information systems
Fundamental concepts of database technology and data modeling and their effect on
an AIS
The tools for documenting AIS work, such as REA diagrams, data flow diagrams,
business processing diagrams, and flowcharts
The basic steps in the system development process to design and improve an AIS
xxi
xxii
Preface
Features to Facilitate Learning
To help you understand these concepts the text includes the following features:
1. Each chapter begins with an integrated case that introduces that chapter’s key concepts and topics and identifies several key issues or problems that you should be able
to solve after mastering the material presented in that chapter. The case is referenced
throughout the chapter and the chapter summary presents solutions to the problems and
issues raised in the case.
2. Focus Boxes and real-world examples to help you understand how companies are using
the latest IT developments to improve their AIS.
3. Hands-on Excel exercises in many chapters to help you hone your computer skills.
Many of these exercises are based on “how-to” tutorials that appeared in recent issues of
the Journal of Accountancy.
4. Numerous problems in every chapter provide additional opportunities for you
to demonstrate your mastery of key concepts. Many problems were developed
from reports in current periodicals. Other problems were selected from the various
professional examinations, including the CPA, CMA, CIA, and SMAC exams. Each
chapter also has one or more cases that require more extensive exploration of specific topics.
5. Chapter quizzes at the end of each chapter enable you to self-assess your understanding
of the material. We also provide detailed explanations about the correct answer to each
quiz question.
6. Extensive use of Full-Color Graphics. The text contains hundreds of figures, diagrams,
flowcharts, and tables that illustrate the concepts taught in the chapters. Color is used to
highlight key points.
7. Definitions of key terms are repeated in the glossary margins in each chapter. In addition, a comprehensive glossary located at the back of the book makes it easy to look up
the definition of the various technical terms used in the text.
8. Extensive on-line support at Pearson’s content-rich, text-supported Companion Website
at www.pearsonhighered.com/romney/.
Excel Homework Problems
Accountants need to become proficient with Excel because it is a useful tool for tasks related
to every business process. That is why each of the chapters in the business process section
contains several homework problems that are designed to teach you new Excel skills in a context related to one of the business processes discussed in the chapter.
As with any software, Microsoft regularly releases updates to Microsoft Office, but not
everyone always immediately switches. Eventually, however, during your career you will periodically move to a newer version of Excel. When you do, you will find that sometimes you
need make only minor changes to existing spreadsheets, but other times you may have to
make more significant changes because the newer version of Excel now incorporates different
features and functions.
So how do you keep abreast of changes? And how can you learn new Excel skills “on the
job” to simplify tasks that you now find yourself doing repeatedly? You could pay to take a
course, but that can be costly, time-consuming and may not always be timely. Alternatively,
you can develop life-long learning skills to continuously update your knowledge. One important way to do this is to begin now to save copies of two types of articles that regularly appear
in the Journal of Accountancy. The first is the monthly column titled “Technology Q&A,”
which often contains answers to questions about how do you do something in a newer version
of Excel that you know how to do in an older version. The second type of article is a complete
tutorial about a powerful way to use one or more Excel functions to automate a recurring task.
Often, this second type of article has an online spreadsheet file that you can download and use
to follow along with the example and thereby teach yourself a new skill.
Preface
The Journal of Accountancy web site maintains an archive of these articles that you can
search to see if there is one that addresses a task that is new for you. Even if the article explains how to do something (such as create a pivot table) in an older version of Excel, in most
cases you will find that many of the steps have not changed. For those that have, if you read
the old way to do it as described in the article, you can then use Excel’s built-in help feature to
see how to do the same task in the newer version that you are now using.
The Excel homework problems in the five business process chapters in this textbook let
you practice using Journal of Accountancy articles to help you develop new skills with Excel.
Many of the problems reference a Journal of Accountancy tutorial article. Some are written
for the version of Excel that you currently use, in which case it will be straightforward to
follow the article to solve the problem. Others, however, were written for earlier versions of
Excel, which gives you an opportunity to practice learning how to use Excel’s help functions
to update the steps in the tutorial.
Content and Organization
This text is divided into five parts, each focused on a major theme.
Part I: Conceptual Foundations of Accounting
Information Systems
Part I consists of four chapters which present the underlying concepts fundamental to an
understanding of AIS. Chapter 1 introduces basic terminology and provides an overview of
AIS topics. It discusses how an AIS can add value to an organization and how it can be used
to help organizations implement corporate strategy. It also discusses the types of information companies need to successfully operate and introduces the basis business processes that
produce that information. It concludes by describing the role of the AIS in an organization’s
value chain.
Chapter 2 introduces transaction processing in automated systems, presenting basic information input/output, processing, and data storage concepts. You will see the wide range of
data that must be collected by the AIS. This information helps you to understand what an AIS
does; as you read the remainder of the book, you will see how advances in IT affect the manner in which those functions are performed. Chapter 2 also introduces you to Enterprise Resource Planning (ERP) systems and discusses their importance and uses in modern business.
Chapter 3 covers three of the most important tools and techniques used to understand,
evaluate, design, and document information systems: data flow diagrams, business process
diagrams, and flowcharts. You will learn how to read, critique, and create systems documentation using these tools.
Chapter 4 introduces the topic of databases, with a particular emphasis on the relational
data model and creating queries in Microsoft Access. The chapter also introduces the concept
of business intelligence.
Part II: Control and Audit of Accounting Information Systems
The seven chapters in Part II focus on threats to the reliability of AIS and applicable controls
for addressing and mitigating the risks associated with those threats. Chapter 5 introduces
students to the different kinds of threats faced by information systems, primarily focusing on
the threat of fraud. The chapter describes the different types of fraud and explains how fraud is
perpetrated, who perpetrates it, and why it occurs.
Chapter 6 discusses computer fraud and abuse techniques. Three major types of computer
fraud are discussed: computer attacks and abuse, social engineering, and malware. The chapter explains the dozens of ways computer fraud and abuse can be perpetrated.
Chapter 7 uses the COSO framework, including the expanded enterprise risk management (COSO-ERM) model, to discuss the basic concepts of internal control. It also introduces
the COBIT framework which applies those concepts to IT, thereby providing a foundation for
effective governance and control of information systems.
xxiii
xxiv
Preface
Chapter 8 focuses on information security. It introduces the fundamental concepts of defense-in-depth and the time-based approach to security. The chapter provides a broad survey
of a variety of security topics including access controls, firewalls, encryption, and incident
detection and response.
Chapter 9 discusses the many specific computer controls used in business organizations
to achieve the objectives of ensuring privacy and confidentiality, and includes a detailed explanation of encryption.
Chapter 10 addresses the controls necessary to achieve the objectives of accurate processing of information and ensuring that information is available to managers whenever and
wherever they need it.
Chapter 11 describes principles and techniques for the audit and evaluation of internal
control in a computer-based AIS and introduces the topic of computer-assisted auditing.
Part III: Accounting Information Systems Applications
Part III focuses on how a company’s AIS provides critical support for its fundamental business processes. Most large and many medium-sized organizations use enterprise resource
planning (ERP) systems to collect, process, and store data about their business processes, as
well as to provide information reports designed to enable managers and external parties to
assess the organization’s efficiency and effectiveness. To make it easier to understand how an
ERP system functions, Part III consists of five chapters, each focusing on a particular business process.
Chapter 12 covers the revenue cycle, describing all the activities involved in taking customer orders, fulfilling those orders, and collecting cash.
Chapter 13 covers the expenditure cycle, describing all the activities involved in ordering,
receiving, and paying for merchandise, supplies, and services.
Chapter 14 covers the production cycle, with a special focus on the implications of recent
cost accounting developments, such as activity-based costing, for the design of the production
cycle information system.
Chapter 15 covers the human resources management/payroll cycle, focusing primarily on
the activities involved in processing payroll.
Chapter 16 covers the general ledger and reporting activities in an organization, discussing topics such as XBRL, the balanced scorecard, the switch from GAAP to IFRS, and the
proper design of graphs to support managerial decision making.
Each of these five chapters explains the three basic functions performed by the AIS: efficient transaction processing, provision of adequate internal controls to safeguard assets (including data), and preparation of information useful for effective decision making.
Part IV: The REA Data Model
Part IV consists of three chapters that focus on the REA data model, which provides a conceptual tool for designing and understanding the database underlying an AIS. C
hapter 17
introduces the REA data model and how it can be used to design an AIS database. The
chapter focuses on modeling the revenue and expenditure cycles. It also demonstrates
how the REA model can be used to develop an AIS that can not only generate traditional
financial statements and reports but can also more fully meet the information needs of
management.
Chapter 18 explains how to implement an REA data model in a relational database system. It also shows how to query a relational database in order to produce various financial
statements and management reports.
Chapter 19 explains how to develop REA data models of the production, HR/payroll, and
financing cycles. It also discusses a number of advanced modeling issues, such as the acquisition and sale of intangible products and services and rental transactions.
Preface
Part V: The Systems Development Process
Part V consists of three chapters that cover various aspects of the systems development process. Chapter 20 introduces the systems development life cycle and discusses the introductory steps of this process (systems analysis, feasibility, and planning). Particular emphasis is
placed on the behavioral ramifications of change.
Chapter 21 discusses an organization’s many options for acquiring or developing an AIS
(e.g., purchasing software, writing software, end-user-developed software, and outsourcing)
and for speeding up or improving the development process (business process reengineering,
prototyping, and computer-assisted software engineering).
Chapter 22 covers the remaining stages of the systems development life cycle (conceptual
design, physical design, implementation, and operation and maintenance) and emphasizes the
interrelationships among the phases.
Acknowledgments
We wish to express our appreciation to all supplements authors for preparing the various supplements that accompany this edition. We thank Martha M. Eining of the University of Utah
and Carol F. Venable of San Diego State University for preparing the comprehensive cases included on our Web site. We are also grateful to Iris Vessey for her contributions to the problem
material. We thank Bill Heninger of Brigham Young University for allowing us to use portions
of his database normalization tutorial to create the Appendix to Chapter 4.
Perhaps most importantly, we are indebted to the numerous faculty members throughout
the world who have adopted the earlier editions of this book and who have been generous
with their suggestions for improvement. We are especially grateful to the following faculty
who participated in reviewing the thirteenth edition throughout various stages of the revision
process:
Dr. Linda Bressler, University of Houston–Downtown
Elizabeth Carlson, University of Southern Florida–Sarasota/Manatee
Gregory J. Gerard, Florida State University
Lois S. Mahoney, Eastern Michigan University
Robert Marley, Georgia Southern University
We are grateful for permission received from four professional accounting organizations to use problems and unofficial solutions from their past professional examinations in
this book. Thanks are extended to the American Institute of Certified Public Accountants for
use of the CPA Examination materials, to the Institute of Certified Management Accountants
for use of CMA Examination materials, to the Institute of Internal Auditors for use of CIA
Examination materials, and to the Society of Management Accountants of Canada for use of
SMAC Examination materials. We also wish to thank Netsuite, Inc., for providing permission
to use screenshots of their software throughout the text.
Of course, any errors in this book remain our responsibility. We welcome your comments
and suggestions for further improvement.
Finally, we want to thank our wives and families for their love, support, and encouragement. We also want to thank God for giving us the ability to start and complete this book.
— Marshall B. Romney
Provo, Utah
—Paul John Steinbart
Tempe, Arizona
xxv
This page intentionally left blank
Conceptual Foundations
of Accounting
Information Systems
pa r t
I
Chapter 1
Accounting Information
Systems: An Overview
Chapter 2
Overview of Transaction
Processing and Enterprise
Resource Planning (ERP)
Chapter 3
Systems Documentation
Techniques
Chapter 4
Relational Databases
1
Chapter
1
Accounting Information
Systems: An Overview
Learning Objectives
After studying this chapter, you should be able to:
1. Distinguish data from information, discuss the characteristics of useful information, and explain how to determine the value of information.
2. Explain the decisions an organization makes and the information needed to
make them.
3. Identify the information that passes between internal and external parties
and an accounting information system (AIS).
4. Describe the major business processes present in most companies.
5. Explain what an AIS is and describe its basic functions.
6. Discuss how an AIS can add value to an organization.
7. Explain how an AIS and corporate strategy affect each other.
8. Explain the role an AIS plays in a company’s value chain.
In tegrat i ve Case
S&S
After working for years as a regional manager for a retail organization, Scott Parry opened
his own business with Susan Gonzalez, one of his district managers, as his partner. They
formed S&S to sell appliances and consumer electronics. Scott and Susan pursued a “clicks
and bricks” strategy by renting a building in a busy part of town and adding an electronic
storefront.
Scott and Susan invested enough money to see them through the first six months. They
will hire 15 employees within the next two weeks—3 to stock the shelves, 4 sales representatives, 6 checkout clerks, and 2 to develop and maintain the electronic storefront.
Scott and Susan will host S&S’s grand opening in five weeks. To meet that deadline, they
have to address the following important issues:
1. What decisions do they need to make to be successful and profitable? For example:
a. How should they price products to be competitive yet earn a profit?
2
b. Should they extend credit, and, if so, on what terms? How can they accurately
track what customers owe and pay?
c. How should they hire, train, and supervise employees? What compensation and
benefits package should they offer? How should they process payroll?
d. How can they track cash inflows and outflows to avoid a cash squeeze?
e. What is the appropriate product mix? What inventory quantities should they
carry, given their limited showroom space?
2. What information do Scott and Susan need to make those decisions?
a. What information do the external entities they interact with need?
b. What information do management and other employees need?
c. How can they gather, store, and disseminate that information?
3. What business processes are needed, and how should they be carried out?
4. What functionality should be provided on the website?
Although Scott and Susan could use an educated guess or “gut feeling” to make these
decisions, they know they can make better decisions if they obtain additional information.
A well-designed AIS can solve these issues and provide the information they need to make
any remaining decisions.
Introduction
We begin this chapter by explaining important terms and discussing the kinds of information that organizations need and the business processes used to produce that information. We
continue with an exploration of what an accounting information system (AIS) is, how an AIS
adds value to an organization, how an AIS and corporate strategy affect each other, and the
role of the AIS in the value chain.
A system is a set of two or more interrelated components that interact to achieve a goal.
Most systems are composed of smaller subsystems that support the larger system. For example, a college of business is a system composed of various departments, each of which is a
subsystem. Moreover, the college itself is a subsystem of the university.
Each subsystem is designed to achieve one or more organizational goals. Changes in subsystems cannot be made without considering the effect on other subsystems and on the system
as a whole. Goal conflict occurs when a subsystem’s goals are inconsistent with the goals of
another subsystem or with the system as a whole. Goal congruence occurs when a subsystem
achieves its goals while contributing to the organization’s overall goal. The larger the organization and the more complicated the system, the more difficult it is to achieve goal congruence.
system – Two or more interrelated
components that interact to
achieve a goal, often composed
of subsystems that support the
larger system.
goal conflict – When a subsystem’s goals are inconsistent with
the goals of another subsystem
or the system as a whole.
goal congruence – When a subsystem achieves its goals while
contributing to the organization’s overall goal.
3
4
Part I
Conceptual Foundations of Accounting Information Systems
data – Facts that are collected,
recorded, stored, and processed by a system.
information – Data that have
been organized and processed
to provide meaning and improve decision-making.
information overload – Exceeding the amount of information
a human mind can absorb and
process, resulting in a decline in
decision-making quality and an
increase in the cost of providing
information.
Information technology (IT) – The
computers and other electronic
devices used to store, retrieve,
transmit and manipulate data.
value of information – The
benefit provided by information
less the cost of producing it.
Data are facts that are collected, recorded, stored, and processed by an information system. Businesses need to collect several kinds of data, such as the activities that take place, the
resources affected by the activities, and the people who participate in the activity. For example, the business needs to collect data about a sale (date, total amount), the resource sold (good
or service, quantity sold, unit price), and the people who participated (customer, salesperson).
Information is data that have been organized and processed to provide meaning and improve the decision-making process. As a rule, users make better decisions as the quantity and
quality of information increase.
However, there are limits to the amount of information the human mind can absorb and
process. Information overload occurs when those limits are passed, resulting in a decline in
decision-making quality and an increase in the cost of providing that information. Information
system designers use information technology (IT) to help decision makers more effectively
filter and condense information. For example, Walmart has over 500 terabytes (trillions of
bytes) of data in its data warehouse. That is equivalent to 2,000 miles of bookshelves, or about
100 million digital photos. Walmart has invested heavily in IT so it can effectively collect,
store, analyze, and manage data to provide useful information.
The value of information is the benefit produced by the information minus the cost of
producing it. Benefits of information include reduced uncertainty, improved decisions, and
improved ability to plan and schedule activities. The costs include the time and resources
spent to produce and distribute the information. Information costs and benefits can be difficult
to quantify, and it is difficult to determine the value of information before it has been produced and utilized. Nevertheless, the expected value of information should be calculated as effectively as possible so that the costs of producing the information do not exceed its benefits.
To illustrate the value of information, consider the case of 7-Eleven. When a Japanese company licensed the very successful 7-Eleven name from Southland Corporation, it invested heavily
in IT. However, the U.S. stores did not. Each 7-Eleven store in Japan was given a computer that:
●
●
●
●
●
Keeps track of the 3,000 items sold in each store and determines what products are moving, at what time of day, and under what weather conditions.
Keeps track of what and when customers buy to make sure it has in stock the products
most frequently purchased.
Orders sandwiches and rice dishes from suppliers automatically. Orders are placed and
filled three times a day so that stores always have fresh food. In addition, suppliers can
access 7-Eleven sales data electronically so that they can forecast demand.
Coordinates deliveries with suppliers. This reduces deliveries from 34 to 12 a day, resulting in less clerical receiving time.
Prepares a color graphic display that indicates which store areas contribute the most to
sales and profits.
Average daily sales of 7-Eleven Japan were 30% higher and its operating margins almost
double those of its closest competitor. What happened to Southland and its 7-Eleven stores
in the United States? Profits declined, and Southland eventually had to file for bankruptcy.
7-Eleven Japan came to the company’s rescue and purchased 64% of Southland.
Table 1-1 presents seven characteristics that make information useful and meaningful.
Table 1-1 Characteristics of Useful Information
Relevant
Reliable
Complete
Timely
Understandable
Verifiable
Accessible
Reduces uncertainty, improves decision making, or confirms or corrects
prior expectations.
Free from error or bias; accurately represents organization events or
activities.
Does not omit important aspects of the events or activities it measures.
Provided in time for decision makers to make decisions.
Presented in a useful and intelligible format.
Two independent, knowledgeable people produce the same
information.
Available to users when they need it and in a format they can use.
CHAPTER 1 Accounting Information Systems: An Overview
5
Information Needs and Business Processes
All organizations need information in order to make effective decisions. In addition, all organizations have certain business processes in which they are continuously engaged. A business
process is a set of related, coordinated, and structured activities and tasks that are performed
by a person, a computer, or a machine a computer or a machine, and that help accomplish a
specific organizational goal.
To make effective decisions, organizations must decide what decisions they need to make,
what information they need to make the decisions, and how to gather and process the data
needed to produce the information. This data gathering and processing is often tied to the basic business processes in an organization. To illustrate the process of identifying information
needs and business processes, let’s return to our S&S case study.
business process – A set of related, coordinated, and structured
activities and tasks, performed
by a person, a computer, or a
machine that help accomplish a
specific organizational goal.
Information Needs
Scott and Susan decide they must understand how S&S functions before they can identify the
information they need to manage S&S effectively. Then they can determine the types of data
and procedures they will need to collect and produce that information. They created Table 1-2
Table 1-2 Overview of S&S’s Business Processes, Key Decisions, and Information Needs
Business Processes
Key Decisions
Information Needs
Acquire capital
How much
Find investors or borrow funds
If borrowing, obtaining best terms
Size of building
Amount of equipment
Rent or buy
Location
How to depreciate
Experience requirements
How to assess integrity and competence of
applicants
How to train employees
What models to carry
How much to purchase
How to manage inventory (store, control,
etc.)
Which vendors
Which media
Content
Markup percentage
Offer in-house credit
Which credit cards to accept
If offering credit, what terms
How to handle cash receipts
Cash flow projections
Pro forma financial statements
Loan amortization schedule
Capacity needs
Building and equipment prices
Market study
Tax tables and depreciation regulations
Acquire building and equipment
Hire and train employees
Acquire inventory
Advertising and marketing
Sell merchandise
Collect payments from customers
Pay employees
Amount to pay
Deductions and withholdings
Process payroll in-house or use outside
service
Pay taxes
Payroll tax requirements
Sales tax requirements
Pay vendors
Whom to pay
When to pay
How much to pay
Job descriptions
Applicant job history and skills
Market analyses
Inventory status reports
Vendor performance
Cost analyses
Market coverage
Pro forma income statement
Credit card costs
Customer credit status
Customer account status
Accounts receivable aging report
Accounts receivable records
Sales (for commissions)
Time worked (hourly employees)
W-4 forms
Costs of external payroll service
Government regulations
Total wage expense
Total sales
Vendor invoices
Accounts payable records
Payment terms
6
Part I
Conceptual Foundations of Accounting Information Systems
transaction – An agreement between two entities to exchange
goods or services, such as selling inventory in exchange for
cash; any other event that can
be measured in economic terms
by an organization.
transaction processing – Process
of capturing transaction data,
processing it, storing it for later
use, and producing information
output, such as a managerial
report or a financial statement.
give-get exchange – Transactions that happen a great many
times, such as giving up cash
to get inventory from a supplier and giving employees a
paycheck in exchange for their
labor.
business processes or
transaction cycles – The major
give-get exchanges that occur
frequently in most companies.
revenue cycle – Activities associated with selling goods and
services in exchange for cash or
a future promise to receive cash.
expenditure cycle – Activities associated with purchasing inventory for resale or raw materials
in exchange for cash or a future
promise to pay cash.
to summarize part of their analysis. It lists S&S’s basic business processes, some key decisions that need to be made for each process, and information they need to make the decisions.
Scott and Susan realize that the list is not exhaustive, but they are satisfied that it provides
a good overview of S&S. They also recognize that not all the information needs listed in the
right-hand column will be produced internally by S&S. Information about payment terms for
merchandise purchases, for example, will be provided by vendors. Thus, S&S must effectively
integrate external data with internally generated data so that Scott and Susan can use both
types of information to run S&S.
S&S will interact with many external parties, such as customers, vendors, and governmental agencies, as well as with internal parties such as management and employees.
To get a better handle on the more important interactions with these parties, they prepared
Figure 1-1.
Business Processes
Scott decides to reorganize the business processes listed in Table 1-2 into groups of related
transactions. A transaction is an agreement between two entities to exchange goods or services or any other event that can be measured in economic terms by an organization. Examples
include selling goods to customers, buying inventory from suppliers, and paying employees.
The process that begins with capturing transaction data and ends with informational output,
such as the financial statements, is called transaction processing. Transaction processing is
covered in more depth in Chapter 2.
Many business activities are pairs of events involved in a give-get exchange. Most organizations engage in a small number of give-get exchanges, but each type of exchange happens
many times. For example, S&S will have thousands of sales to customers every year in exchange
for cash. Likewise, S&S will continuously buy inventory from suppliers in exchange for cash.
These exchanges can be grouped into five major business processes or transaction
cycles:
●
●
The revenue cycle, where goods and services are sold for cash or a future promise to receive cash. This cycle is discussed in Chapter 12.
The expenditure cycle, where companies purchase inventory for resale or raw materials
to use in producing products in exchange for cash or a future promise to pay cash. This
cycle is discussed in Chapter 13.
Interactions between
S&S and External and
Internal Parties
Customer Orders
Purchase Orders
Figure 1-1
Vendors
Goods & Services
Goods & Services
Vendor Invoices
Customer Invoices
Vendor Payments
Customer Payments
Invest Funds
Investors
Loans
Creditors
Labor & Services
Dividends
Financial Statements
Customers
Accounting
Information
System
at S&S
Wages, Salaries
& Commissions
Employees
Managerial Reports &
Loan Payments
Financial Statements
Financial Statements
Budgets &
Management
Accounting Entries
Banks
Deposits
Regulations & Tax Forms
Withdrawals
Taxes & Reports
Bank Statements
Government
Agencies
CHAPTER 1 Accounting Information Systems: An Overview
●
●
●
The production or conversion cycle, where raw materials are transformed into finished
goods. This cycle is discussed in Chapter 14.
The human resources/payroll cycle, where employees are hired, trained, compensated,
evaluated, promoted, and terminated. This cycle is discussed in Chapter 15.
The financing cycle, where companies sell shares in the company to investors and borrow money, and where investors are paid dividends and interest is paid on loans.
These cycles process a few related transactions repeatedly. For example, most revenue
cycle transactions are either selling goods or services to customers or collecting cash for those
sales. Figure 1-2 shows the main transaction cycles and the give-get exchange inherent in each
cycle.
These basic give-get exchanges are supported by a number of other business activities.
For example, S&S may need to answer a number of customer inquiries and check inventory
levels before it can make a sale. Likewise, it may have to check customer credit before a credit
sale is made. Accounts receivable will have to be increased each time a credit sale is made
and decreased each time a customer payment is received. Table 1-3 lists the major activities in
each transaction cycle.
Give
Cash
Funds
Funds
Expenditure Cycle
Human Resources/Payroll Cycle
Get Goods/
Raw
Materials
Give
Cash
Get
Labor
Data
Data
Data
General Ledger & Reporting System
Data
Data
Labor
Get
Finished
Goods
Give
Raw
Materials
Finished
Goods
Revenue Cycle
Give
Goods
Raw
Materials
Production Cycle
Give
Labor
Get
Cash
human resources/payroll cycle Activities associated with hiring,
training, compensating, evaluating, promoting, and terminating
employees.
financing cycle – Activities associated with raising money by
selling shares in the company to
investors and borrowing money
as well as paying dividends and
interest.
The AIS and Its
Subsystems
Get
Cash
Funds
Give
Cash
production or conversion cycle Activities associated with using
labor, raw materials and equipment to produce finished goods.
Figure 1-2
Financing Cycle
Information
for Both
Internal
and
External
Users
7
8
Part I
Conceptual Foundations of Accounting Information Systems
Table 1-3 Common Cycle Activities
Transaction Cycle
Major Activities in the Cycle
Revenue
Receive and answer customer inquiries
Take customer orders and enter them into the AIS
Approve credit sales
Check inventory availability
Initiate back orders for goods out of stock
Pick and pack customer orders
Ship goods to customers or perform services
Bill customers for goods shipped or services performed
Update (increase) sales and accounts receivable
Receive customer payments and deposit them in the bank
Update (reduce) accounts receivable
Handle sales returns, discounts, allowances, and bad debts
Prepare management reports
Send appropriate information to the other cycles
Request goods and services be purchased
Prepare, approve, and send purchase orders to vendors
Receive goods and services and complete a receiving report
Store goods
Receive vendor invoices
Update (increase) accounts payable
Approve vendor invoices for payment
Pay vendors for goods and services
Update (reduce) accounts payable
Handle purchase returns, discounts, and allowances
Prepare management reports
Send appropriate information to the other cycles
Recruit, hire, and train new employees
Evaluate employee performance and promote employees
Discharge employees
Update payroll records
Collect and validate time, attendance, and commission data
Prepare and disburse payroll
Calculate and disburse taxes and benefit payments
Prepare employee and management reports
Send appropriate information to the other cycles
Design products
Forecast, plan, and schedule production
Request raw materials for production
Manufacture products
Store finished products
Accumulate costs for products manufactured
Prepare management reports
Send appropriate information to the other cycles
Forecast cash needs
Sell stock/securities to investors
Borrow money from lenders
Pay dividends to investors and interest to lenders
Retire debt
Prepare management reports
Send appropriate information to the other cycles
Expenditure
Human Resources/Payroll
Production
Financing
CHAPTER 1 Accounting Information Systems: An Overview
Notice that the last activity listed in Table 1-3 for each transaction cycle is “Send appropriate information to the other cycles.” Figure 1-2 shows how these various transaction cycles
relate to one another and interface with the general ledger and reporting system, which is
used to generate information for both management and external parties. The general ledger
and reporting system is discussed in more depth in Chapter 16.
In many accounting software packages, the various transaction cycles are implemented
as separate modules. Not every organization needs to implement every module. Retail stores
like S&S, for example, do not have a production cycle and would not implement that module. Moreover, some organizations have unique requirements. Financial institutions, for example, have demand deposit and installment-loan cycles that relate to transactions involving
customer accounts and loans. In addition, the nature of a given transaction cycle differs across
different types of organizations. For example, the expenditure cycle of a service company,
such as a public accounting or a law firm, does not normally involve processing transactions
related to the purchase, receipt, and payment for merchandise that will be resold to customers.
Each transaction cycle can include many different business processes or activities. Each
business process can be relatively simple or quite complex. Focus 1-1 shows how Toyota’s
Focus 1-1
general ledger and reporting
system – Information-processing
operations involved in updating
the general ledger and preparing reports for both management and external parties.
Improving Business Processes Helps Drive Toyota’s Success
Toyota’s Georgetown, Kentucky, manufacturing plant, its
largest in North America, is the size of 156 football fields,
employs 7,000 people, and produces a new car every 55
seconds. Because Toyota produces a high-quality car at a
lower cost than its competitors, it is the largest automobile manufacturer in the world, a title General Motors had
for almost 100 years.
A major factor in its success is the Toyota Production System (TPS), which is a set of philosophies, principles, and business processes supported by IT. Its goal is
to improve continually so Toyota has the most effective
and most efficient manufacturing and business processes
possible. Toyota willingly shares TPS and its manufacturing and business processes with its suppliers to help them
improve their quality and efficiency. It also shares TPS with
its competitors, knowing that by the time they duplicate it
Toyota will have greatly improved TPS.
The following are some of the principles and business
processes on which TPS is built and which Toyota’s information systems must support and enable:
• Performance-monitoring software warns assembly
line workers of equipment problems. Workers stop
production whenever necessary to prevent or correct
defects.
• Their just-in-time (JIT) inventory system is one of the
most sophisticated in the world. Driverless carts take
parts to assembly stations when they are needed so
inventory does not pile up. Suppliers must meet rigid
delivery standards. Four hours before they are needed,
Toyota software electronically tells Johnson Controls
exactly what car seats are needed for each car and the
exact order in which they must be shipped.
9
• Continuous improvement is a critical and ongoing process. No process or detail is too small or insignificant
to improve. Technology is especially important in the
continuous improvement process. This emphasis on
continuous improvement creates a culture that values
continuous learning and embraces change.
• Electronic displays connected to the manufacturing
equipment help workers monitor the assembly line.
Information is communicated by light colors (green
means the process is operating correctly, yellow means
a problem is being investigated, and red means the
assembly line has stopped) and by printed messages
(which machine malfunctioned, its speed and temperature when it broke down, and who was operating the
machine).
• Electronic quality control devices, such as an electronic
sensor on a tool or a beam of light, monitor a process.
These devices let a computer know when a tool is not
used or a required part is not picked up and used at
the appropriate time.
• More than half of Toyota’s information systems employees work in operations at its plants so they can
accompany executives, team leaders, and factory
workers when they go to solve assembly line problems.
In summary, Toyota has a clear and in-depth understanding of the business processes that make it successful,
continuously improves those processes, and understands
the role information systems play in managing, supporting, and facilitating those processes.
Source: Mel Duvall, “What’s Driving Toyota?” Baseline Magazine,
September 5, 2006.
10
Part I
Conceptual Foundations of Accounting Information Systems
attention to continuously improving its business processes has helped it become the largest
and most profitable automobile manufacturer in the world.
After preparing Tables 1-2 and 1-3 and Figures 1-1 and 1-2, Scott and Susan believe they
understand S&S well enough to begin shopping for an information system. Susan recalled a
previous employer that had several separate information systems, because their software was
not designed to accommodate the information needs of all managers. She also vividly recalled
attending one meeting where she witnessed the negative effects of having multiple systems.
The head of marketing had one report on year-to-date sales by product, the production manager had a different report that contained different sales figures, and the controller’s report,
which was produced by the general ledger system, had yet a third version of year-to-date
sales. Over an hour was wasted trying to reconcile those different reports! Susan vowed that
she would make sure that S&S did not ever find itself in such a mess. She would make sure
that any system selected would have the capability to integrate both financial and nonfinancial
data about S&S’s various business processes so that everyone could pull information from the
same system.
Accounting Information Systems
accounting information system A system that collects, records,
stores, and processes data to
produce information for decision makers. It includes people,
procedures and instructions,
data, software, information
technology infrastructure, and
internal controls and security
measures.
It has often been said that accounting is the language of business. If that is the case, then
an accounting information system (AIS) is the intelligence—the information-providing
vehicle—of that language.
Accounting is a data identification, collection, and storage process as well as an information development, measurement, and communication process. By definition, accounting is an
information system, since an AIS collects, records, stores, and processes accounting and other
data to produce information for decision makers. This is illustrated in Figure 1-3.
An AIS can be a paper-and-pencil manual system, a complex system using the latest in
IT, or something in between. Regardless of the approach taken, the process is the same. The
AIS must collect, enter, process, store, and report data and information. The paper and pencil
or the computer hardware and software are merely the tools used to produce the information.
This text does not distinguish an AIS from other information systems. Instead, our viewpoint is that the AIS can and should be the organization’s primary information system and that
it provides users with the information they need to perform their jobs.
There are six components of an AIS:
1. The people who use the system
2. The procedures and instructions used to collect, process, and store data
3. The data about the organization and its business activities
4. The software used to process the data
5. The information technology infrastructure, including the computers, peripheral devices,
and network communications devices used in the AIS
6. The internal controls and security measures that safeguard AIS data
These six components enable an AIS to fulfill three important business functions:
1. Collect and store data about organizational activities, resources, and personnel. Organizations have a number of business processes, such as making a sale or purchasing raw
materials, which are repeated frequently.
Figure 1-3
An AIS Processes Data
to Produce Information
for Decision Makers
AIS
AIS
Data
Decision
Information
User
CHAPTER 1 Accounting Information Systems: An Overview
2. Transform data into information so management can plan, execute, control, and evaluate
activities, resources, and personnel. Decision making is discussed in detail later in this
chapter.
3. Provide adequate controls to safeguard the organization’s assets and data. Control concepts are discussed in detail in Chapters 5–11.
Since accounting data comes from an AIS, AIS knowledge and skills are critical to an
accountant’s career success. Interacting with an AIS is one of the most important activities
that accountants perform. Other important AIS-related activities include designing information systems and business process improvements, as discussed in Chapters 20 to 22. Focus 1-2
explains a specialty to designate that certain CPAs (Certified Public Accountants) have an indepth knowledge of AIS topics.
How an AIS Can Add Value to an Organization
A well-designed AIS can add value to an organization by:
1. Improving the quality and reducing the costs of products or services. For example, an
AIS can monitor machinery so operators are notified immediately when performance
falls outside acceptable quality limits. This helps maintain product quality, reduces waste,
and lowers costs.
2. Improving efficiency. For example, timely information makes a just-in-time manufacturing approach possible, as it requires constant, accurate, up-to-date information about raw
materials inventories and their locations.
3. Sharing knowledge. Sharing knowledge and expertise can improve operations and provide a competitive advantage. For example, CPA firms use their information systems
to share best practices and to support communication between offices. Employees can
search the corporate database to identify experts to provide assistance for a particular client; thus, a CPA firm’s international expertise can be made available to any local client.
4. Improving the efficiency and effectiveness of its supply chain. For example, allowing
customers to directly access inventory and sales order entry systems can reduce sales and
marketing costs, thereby increasing customer retention rates.
Focus 1-2
CITP—An IT Specialty Designation for CPAs
The American Institute of Certified Public Accountants
(AICPA) offers several specialty designations for CPAs.
The CITP (Certified Information Technology Professional)
designation reflects the AICPA’s recognition of the importance of IT and its interrelationship with accounting.
A CITP possesses a broad range of business, managerial,
and technological knowledge, making it possible for the
CITP to understand how organizations use IT to achieve
their business objectives. To obtain a CITP certification,
a person must demonstrate a mastery of the following
topics: information system management, business intelligence, fraud, risk assessment, internal control concepts,
and how to test and evaluate an information system.
There are many reasons to earn the CITP certification:
• Because only CPAs can be CITPs, this certification further differentiates you from others in the marketplace.
• It affirms your value as an IT specialist and increases
your value to your employer or clients.
Based on information from http://www.aicpa.org
• It is a great “calling card” for IT people who want to
be leaders in industry, public practice, government, or
academia.
• It opens the doors to new technology-related roles
and opportunities.
• Automatic membership in the IT Section, which allows
you to meet, share best practices, network, and communicate with other CITPs. You can also receive CITP
newsletters and other communications, attend CITP
Webinars, receive CITP member discounts, and access exclusive CITP resources and content on the CITP
Web site.
To qualify for the CITP designation, you must:
• Be a CPA and a member of the AICPA
• Pass the CITP exam
• In the 5 years preceding your application, meet the
1000 hour experience and the 75 hour continuing professional education requirements
11
12
Part I
Conceptual Foundations of Accounting Information Systems
5. Improving the internal control structure. An AIS with the proper internal control structure can help protect systems from fraud, errors, system failures, and disasters.
6. Improving decision making. Improved decision making is vitally important and is discussed below in more detail.
Decision making is a complex, multistep activity: identify the problem, collect and interpret information, evaluate ways to solve the problem, select a solution methodology, and
implement the solution. An AIS can provide assistance in all phases of decision making. Reports can help to identify potential problems. Decision models and analytical tools can be
provided to users. Query languages can gather relevant data to help make the decision. Various
tools, such as graphical interfaces, can help the decision maker interpret decision model results, evaluate them, and choose among alternative courses of action. In addition, the AIS can
provide feedback on the results of actions.
An AIS can help improve decision making in several ways:
●
●
●
●
●
It can identify situations requiring management action. For example, a cost report with a
large variance might stimulate management to investigate and, if necessary, take corrective action.
It can reduce uncertainty and thereby provide a basis for choosing among alternative
actions.
It can store information about the results of previous decisions, which provides valuable feedback that can be used to improve future decisions. For example, if a company
tries a particular marketing strategy and the information gathered indicates that it did
not succeed, the company can use that information to select a different marketing
strategy.
It can provide accurate information in a timely manner. For example, Walmart has an
enormous database that contains detailed information about sales transactions at each of
its stores. It uses this information to optimize the amount of each product carried at each
store.
It can analyze sales data to discover items that are purchased together, and can use such
information to improve the layout of merchandise or to encourage additional sales of related items. For example, Amazon uses its sales database to suggest additional books for
customers to purchase.
Focus 1-3 discusses how IT adds value to UPS.
The AIS and Corporate Strategy
predictive analysis – The use of
data warehouses and complex
algorithms to forecast future
events, based on historical
trends and calculated probabilities.
Since most organizations have limited resources, it is important to identify the AIS improvements likely to yield the greatest return. Making a wise decision requires an understanding of
the organization’s overall business strategy. To illustrate, consider the results of a CIO magazine survey of 500 Chief Information Officers. Asked to identify the three most important skill
sets for a CIO, over 75% put strategic thinking and planning on their list.
Figure 1-4 shows three factors that influence the design of an AIS: developments in IT,
business strategy, and organizational culture. It is also important to recognize that the design
of the AIS can also influence the organization’s culture by controlling the flow of information
within the organization. For example, an AIS that makes information easily accessible and
widely available is likely to increase pressures for more decentralization and autonomy.
IT developments can affect business strategy. For example, the Internet has profoundly affected the way many activities are performed, significantly affecting both strategy and strategic positioning. The Internet dramatically cuts costs, thereby helping companies to implement
a low-cost strategy. If every company used the Internet to adopt a low-cost strategy, then the
effects might be problematic. Indeed, one possible outcome may be intense price competition
among firms, with the likely result that most of the cost savings provided by the Internet get
passed on to the industry’s customers, rather than being retained in the form of higher profits.
Moreover, because every company can use the Internet to streamline its activities, a company
is unlikely to gain a sustainable long-term competitive advantage.
Many other technological advances affect company strategy and provide an opportunity to
gain a competitive advantage. An example is predictive analysis, which uses data warehouses
CHAPTER 1 Accounting Information Systems: An Overview
Focus 1-3
The Use of Technology by UPS
UPS used to invest heavily in training its employees to perform tasks in less time but spent little money on IT. Today,
because of the value IT adds to its business, UPS spends
well over $1 billion a year on IT. That is much more than it
spends on trucks and about as much as it spends on airplanes. UPS has 4,700 employees devoted to developing
and maintaining proprietary software and a website that
20 million people visit each day. Its 15 mainframe computers and 9,000 servers allow UPS customers to control each
shipment (16 million a day) from the time a delivery order
is initiated to the time it arrives at its destination. Here is
how the system works:
• Customers use UPS software or the UPS website to initiate a delivery. They create, print, and attach labels to
their shipment containing detailed sender information
and the time the shipment should arrive.
• They schedule a pickup time electronically.
• The UPS system routes the label information to the distribution center closest to the shipment’s destination.
• At the distribution center, proprietary software uses
the destination, desired arrival time, traffic and
weather conditions, and street information (one-way
streets, etc.) to create the most efficient delivery route.
Drivers have handheld computers with a global positioning system (GPS) that guides their routes.
• The system creates a label that specifies where to
put the shipment on the delivery truck so the earliest
shipments are nearest the driver. Drivers average 100
pickups and deliveries a day, and boxes loaded out of
order can delay the driver up to 30 minutes.
• Customers can use the UPS website to track their shipment. The GPS allows UPS to predict accurately the
shipment’s approximate arrival time.
• The handheld computer is programmed to beep at
the driver if a shipment is delivered to the wrong address or forgotten.
UPS’s commitment to IT has produced dramatic results. Recent system improvements allowed drivers to
make seven to nine more stops each day, reduced the
number of miles UPS drives each year by 1.9 million, and
saved over $600 million per year in operating costs.
However, UPS is not congratulating itself on how well
it has used IT to improve its business. The UPS system is a
work in progress. UPS continues to innovate and find ways
to use IT to become even more efficient and better serve
the customer.
Source: Corey Dade, “How UPS Went from Low-Tech to an IT
Power—and Where It’s Headed Next,” The Wall Street Journal,
July 24, 2006, R4.
and complex algorithms to forecast future events, based on historical trends and calculated
probabilities. Predictive analysis provides an educated guess of what one may expect to see
in the near future, allowing companies to make better business decisions and improve their
processes. FedEx uses predictive analysis to predict, with 65% to 90% accuracy, how customers respond to price changes and new services. Blue Cross Blue Shield of Tennessee uses a
neural-based predictive model to predict the health care that specific patients will need, the
severity of illnesses, and organ failures. Stock market analysts are using predictive analysis to
predict short-term trends in the stock market.
An organization’s AIS plays an important role in helping it adopt and maintain a strategic position. Achieving a close fit among activities requires that data be collected about each
Figure 1-4
Business
Strategy
Organizational
Culture
AIS
Information
Technology
Factors Influencing
Design of the AIS
13
14
Part I
Conceptual Foundations of Accounting Information Systems
activity. It is also important that the information system collect and integrate both financial
and nonfinancial data about the organization’s activities.
The Role of the AIS in the Value Chain
value chain – Linking together
of all the primary and support
activities in a business. Value
is added as a product passes
through the chain.
primary activities – Value
chain activities that produce,
market, and deliver products
and services to customers and
provide post-delivery service
and support.
support activities – Value chain
activities such as firm infrastructure, technology, purchasing,
and human resources that
enable primary activities to
be performed efficiently and
effectively.
supply chain – An extended
system that includes an organization’s value chain as well as
its suppliers, distributors, and
customers.
To provide value to their customers, most organizations perform a number of different activities. Figure 1-5 shows that those activities can be conceptualized as forming a value chain
consisting of five primary activities that directly provide value to customers:
1. Inbound logistics consists of receiving, storing, and distributing the materials an organization uses to create the services and products it sells. For example, an automobile manufacturer receives, handles, and stores steel, glass, and rubber.
2. Operations activities transform inputs into final products or services. For example, assembly line activities convert raw materials into a finished car.
3. Outbound logistics activities distribute finished products or services to customers. An
example is shipping automobiles to car dealers.
4. Marketing and sales activities help customers buy the organization’s products or services. Advertising is an example of a marketing and sales activity.
5. Service activities provide post-sale support to customers. Examples include repair and
maintenance services.
Support activities allow the five primary activities to be performed efficiently and effectively. They are grouped into four categories:
1. Firm infrastructure is the accounting, finance, legal, and general administration activities that allow an organization to function. The AIS is part of the firm infrastructure.
2. Human resources activities include recruiting, hiring, training, and compensating
employees.
3. Technology activities improve a product or service. Examples include research and development, investments in IT, and product design.
4. Purchasing activities procure raw materials, supplies, machineries, and the buildings
used to carry out the primary activities.
Using IT to redesign supply chain systems yields tremendous benefits and cost savings.
For example, Tennessee Valley Authority, a power generator, reengineered its supply chain and
crea…
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more