CHAPTER 1: ROLE AND PURPOSE OF AIS                                        1.
Inputs – documents
                                                                                                    a. What kind of source documents will system users need?
ACCOUNTING INFORMATION SYSTEM – a set of interrelated activities, documents,                        b. Should the source documents be paper-based, electronic or both?
and technologies designed to collect data, process it, and report to a diverse group of             c. How many copies of each source document will be required?
internal external decision makers in organizations.                                                 d. What information should the documents contain?
                                                                                               2.   Processes – computers and satellites
Three reasons why AIS is important: (H-A-D)
                                                                                                    a. Which processing tools should the AIS use?
    1.   Helps achieve some components of the FASB Conceptual Framework                             b. Should the tools be manual, computer-based or both?
    2.   Acquiring knowledge help students learn more about business processes                      c. If computer-based, which software and hardware should be implemented?
    3.   Develop core competencies by AICPA.                                                   3.   Outputs – general purpose FS
                                                                                                    a. What other reports will managers and system users need?
AIS relates to Conceptual Framework by                                                              b. How should the AIS be designed to facilitate their production?
                                                                                               4.   Storage – paper form, electronic or mix
        Capturing data on the elements of FS.                                                      a. How should data be stored?
        Transforming data into relevant and reliable information.                                  b. Where should it be stored?
        Recognizing and adapting to the cost-benefit constraint                                    c. How long should it be stored?
                                                                                                    d. Under what conditions can/should data be destroyed?
Core competencies (B-F-P)
                                                                                               5.   Internal Controls – daily back up of data and separation of duty
        Broad business perspective competencies                                                    a. What controls are necessary to promote integrity?
              Strategic/Critical thinking – ability to link data, knowledge and insight            b. What behavioral effects are controls likely to have?
                  together to provide information for decision making                               c. Are controls cost-effective?
              Resource management – being able to apply management and human
                                                                                           AIS INFORMATION SOURCES AND INFO LITERACY CONCEPTS
                  resource theories to HR issues and organizational problems
        Functional competencies                                                           Information Competence (IC) – evaluating validity is a critical skill for reaching
              Risk analysis – understanding business risk                                 conclusions and finding genuinely valuable information
              Research – needs to have strong research skills
        Personal competencies                                                             Five criteria: (A-A-O-C-C)
              Problem solving and decision making
                                                                                               1.   Authority – Who created the information? The purpose of creation?
              Communication – skills necessary to give and exchange information,
                                                                                               2.   Accuracy – Where does the information come from? Does it contain obvious
                  and the ability to listen, deliver powerful presentations and produce
                                                                                                    errors or misleading graphs?
                  examples
                                                                                               3.   Objectivity – Does the information contain advertising? Is it available freely?
AIS STRUCTURE                                                                                  4.   Currency – when was it created? When was it last updated?
                                                                                               5.   Coverage – is the source still in construction? Did it cover sufficient depth?
                          Internal Control
                                                                                           CRITICAL THINKING
            Inputs      processes      outputs       Storage
                                                                                               -    The mental process of actively and skillfully conceptualizing, applying,
                                                                                                    synthesizing and evaluating information to reach an answer or conclusion
    -
                                                                                          Journal – a chronological listing of all the organization’s recordable transactions
                  CHAPTER 2: TRANSACTION PROCESSING IN AIS
                                                                                          Trial balance – a listing of all the accounts in an organization’s general ledger, with their
ACCOUNTING AND BOOKKEEPING
                                                                                          balances, that demonstrates the equality of debits and credits in the ledger
Accounting – the process of identifying, measuring and communicating economic
information to permit informed judgments and decisions by users of the information.       Adjusting entries:
                                                                                               Accrued revenue – service provided before collection of cash
Bookkeeping – the part of accounting devoted to identifying and measuring the                  Accrued expense – receive service before paying cash
economic information                                                                           Deferred revenue – receives cash before service
                                                                                               Prepaid expenses – uses up assets that was previously been paid for
ACCOUNTING CYCLE
                                                                                               Uncollectible accounts – estimates of amounts that customers are unwilling to
    1.    Obtain information                                                                      pay
    2.    Analyze transactions                                                                 Depreciation – periodic allocation of an asset’s cost
    3.    Record transactions
    4.    Post to general ledger                                                          General purpose financial statements:
    5.    Prepare unadjusted trial balance                                                    Income statement – summarizes the results of business operations; reports
    6.    Record adjusting entries                                                                revenues and expenses
    7.    Prepare adjusted trial balance                                                      Statement of Changes in Shareholder’s Equity – reports changes in capital
    8.    Prepare financial statements                                                            stock and retained earnings account
    9.    Close temporary accounts                                                            Balance sheet – financial position of the organization; assets, liabilities and
    10.   Prepare post-closing trial balance                                                      capital
                                                                                              Statement of cash flows – three categories of cash flows: investing operating
Two basic types of transaction:
                                                                                                  and financing
Internal – adjusting entries, closing entries and reversing entries
External – exchanges of goods and services with other individuals and business entities
                                                                                          CODING SYSTEMS
Common internal controls with source documents:
                                                                                          Williamson (2006) coding systems:
    Sequential numbering
                                                                                                Sequential coding – numbers the items in sequence
    Physical security
                                                                                                Block coding – numbers are assigned in blocks (exg. All current asset
    Transaction limits
                                                                                                   accounts starts with the code “1”)
                                                                                                Hierarchal coding – each digit/block of digits conveys important information to
Five steps of transaction analysis:
                                                                                                   people who know the code; “fund coding”
    1. Identify accounts affected
                                                                                                Mnemonic codes – help people remember the meaning of the code.
    2. Identify effect of transaction
    3. Determine element of FS by each account
                                                                                          HUMAN JUDGMENT AND IT
    4. Determine which kind of entry is required for each account
    5. Verify total debits = total credits
                                                                                          Human judgment comes into play in AIS in:
        Designing source documents- should be clear and easy to read                           a. Systems risk – relating to information technology
        Recognizing recordable transactions – (exg. Market value of land are not               b. Human error risk – possibility of people in the org to make mistakes
         recordable)                                                                       3.   Strategic risks – relates to the decision-making process of the higher
        Estimating amounts and interpreting accounting rules                                   management
                                                                                                a. Legal and regulatory risk – chances that the parties will break laws
                                                                                                b. Business strategy risk – poor decision making related to a company’s
                            CHAPTER 3: INTERNAL CONTROLS                                            basis for competing
                                                                                           4.   Hazard risk
INTERNAL CONTROL – a process, effected by an entity’s board of directors,                       1. Director’s and Officers’ liability – accused of mismanagement
management and other personnel designed to provide reasonable assurance regarding
achievement of objectives relating to operations, reporting and compliance             COSO’S INTERNAL CONTROL INTEGRATED FRAMEWORK
Foreign Corrupt Practices Act (FCPA) – passed in the US Congress in 1977 in order to   Control environment – establishing the “tone at the top”
stop corrupt practices (bribery) in the business world of US
                                                                                       Risk assessment – clarifying an organization’s risk exposures
Sarbanes-Oxley Act of 2002 (SOX) – management and external auditors must annually
assess internal control; certain required disclosures to SEC; personally signed        Control activities – developing specific controls to address the risk exposures
certifications and reports; most sweeping accounting-related legislation
                                                                                       Information and communication – ensuring stakeholders know about the internal
Purpose of Internal Control (C-A-R-E-S)                                                control plan
     Compliance with applicable laws and regulations
     Accomplishment of the company’s mission                                          Monitoring – creating a process for keeping the plan update and relevant
     Relevant and reliable financial reporting
     Effective and efficient operations
                                                                                                              CHAPTER 4: MANAGEMENT CONCEPTS
     Safeguarding of assets
                                                                                       Enterprise risk management – a process applied in strategy setting and across the
RISKS
                                                                                       enterprise, designed to identify potential events that may affect the entity, and manage
Brown’s Taxonomy of Risk
                                                                                       risk to be within its risk appetite, to provide reasonable assurance regarding the
                                                                                       achievement of the entity’s objectives
    1.   Financial Risks – related to monetary activities
         a. Market Risks – changes in company’s stock prices, investment values and
                                                                                       ERM FRAMEWORK ELEMENTS
              interest rates
                                                                                          1. Internal Environment – encompasses the tone of an organization, and sets
         b. Credit Risks – customer’s unwillingness to pay amounts owed to the
                                                                                             basis for how risk is viewed and addressed by an entity’s people; overall
              organization
                                                                                             organizational attitude about ERM
         c. Liquidity risks – possibility that the company will not have enough cash
              and near-cash assets to meet obligations
                                                                                           2.   Objective Setting – this should support and align with the entity’s mission and
    2.   Operational Risks – concerned with people, assets and technologies used to
                                                                                                are consistent with its risk appetite; what an organization is trying to accomplish
         create value for the org’s customers
    3.   Event identification – events that could interfere with achieving the objectives      7. Communicate early and often
                                                                                            BEHAVIORAL ISSUES
    4.   Risk assessment – chance that the interfering events will occur
                                                                                            Expectancy theory – says that motivation is the product of three factors: expectancy
    5.   Risk response – generic ways to manage risks (events)                              (will I be successful?), instrumentality (will I be rewarded?), valence (do I value the
                                                                                            reward?)
    6.   Control activities – specific ways to manage risks (events)
                                                                                                       𝑴𝒐𝒕𝒊𝒗𝒂𝒕𝒊𝒐𝒏 = 𝑬𝒙𝒑𝒆𝒄𝒕𝒂𝒏𝒄𝒚 × 𝑰𝒏𝒔𝒕𝒓𝒖𝒎𝒆𝒏𝒕𝒂𝒍𝒊𝒕𝒚 × 𝑽𝒂𝒍𝒆𝒏𝒄𝒆
    7.   Information and communication – wats to share the ERM plan
                                                                                                            CHAPTER 5: INFORMATIONS SYSTEMS CONCEPTS
   8. Monitoring – ensure the ERM plan stays relevant                                       Systems Development Life Cycle (SDLC) – a methodology for designing,
NATURE OF BUSINESS PROCESS MANAGEMENT                                                       implementing, and maintaining virtually any kind of information system
Business process management                                                                 7 parts:
    - a business improvement strategy based on documenting, analyzing and                       1.      Initiation/planning – unfulfilled need present
       redesigning processes for greater performance                                            2.      Requirements analysis – what is to be accomplished
    - a systematic approach to analyzing, redesigning, improving and managing                   3.      Design – how system should look
       specific process                                                                         4.      Build – writing codes; customizing
                                                                                                5.      Test – critique the system and suggestion for improvement
Generalized model of BPM                                                                        6.      Implementation – actual use by the org
   1. Select the process and define its boundaries.                                             7.      Operations and Maintenance
   2. Observe, document and map the process steps and flow.
   3. Collect process-related data                                                          Capability Maturity Model (CMM) – Watts Humphrey (1980s) to assess business
   4. Analyze the collected data                                                            processes in an objective way
   5. Identify and prioritize potential process improvements
   6. Optimize the process                                                                  5 Levels:
   7. Implement and monitor process improvements                                                1. Chaotic – unstable and noncohesive processes
                                                                                                2. Repeatable – development of major milestones for projects
BASIC PRINCIPLES                                                                                3. Defined – more detail and with more rigor; processes are defined but not
   1. Understand how the              business     processes     interact   with/support              measured
       organizational strategy.                                                                 4. Managed - management develops metrics to establish goals and control
                                                                                                      processes
Strategy – the ways an organization gains competitive advantage in the market                   5. Optimized – “continuous improvement”
    2.   Move away from “we’ve always done it this way”. Be open to alternatives.           INFORMATION TECHNOLOGY SELECTION
    3.   Enlist top management support
    4.   Hire the right people                                                              Two kinds of issues to consider:
    5.   Value people who has experience with the process                                        Macro-level issues
    6.   Well defined task for consultants
        Micro-level issues                                                                                          CHAPTER 6: FLOWCHARTING
                                                                                          Flowchart – a graphical representation of some part of an information system.
Micro-level factors to consider
                                                                                          Classification of flowcharts:
        Need                                                                                  Systems flowchart – gives the user a “big picture” look at an information
                                                                                                   system
        Strategic fit – indicates how an organization competes in market                      Program flowchart – shows the logic associated with a computer program
                                                                                               Document flowchart – shows the various documents involved in a system.
        Mission statement – explains why an organization exists; how it is different         - Portrays the procedures performed on these documents
         from competitors                                                                      Hardware flowchart –shows the computers, printers, monitors, input devices
                                                                                                   and other hardware elements associated with an information system
        Personnel involvement -
        Financing                                                                            Good flowcharting habits:
                                                                                              1. Should be from top to bottom, left to right
Macro-level factors                                                                           2. Should have plenty of white space
    Cost – total cost of the IT: upfront cost, training, maintenance and customization       3. Have a title
    Adaptability – can it be adapted effectively to the organization?                        4. Should be organized in columns that depict areas of responsibility
    Training – how easy will the employees learn to use the new IT?                          5. If document involved in business process, must have clear origin and clear
    Vendor reliability – is it a well-established, reputable company                            termination
                                                                                              6. Rough drafts should be discussed by involved persons
3-Stage Process (Sylla and Wen, 2002) for evaluating IT investments
Step 1: intangible benefits evaluation
     - management support
     - competitive advantage
     - business transformation
Step 2: IT investments risk analysis
     - physical risks
     - managerial risk
Step 3: Tangible benefits evaluation
- productivity
- operating process performance
*weighted-rating technique
                                                                                                                FLOWCHARTING TOOLS AND SYMBOLS
                                                                                                     7.    Data must be moved by a process
FLOWCHART DESIGN STEPS                                                                               8.    Data cannot move directly from external entity to a data store; by a process
   1. Establish the system boundary – putting a box around the system; delimiting                    9.    Cannot move data to external entity; a process
   2. Determine column headings – column headings should focus on area of                            10.   Data store has a noun phrase label
      responsibility                                                                                 11.   Cannot move data from external entity to another EE
   3. List actions performed within each column – what a department do within                        12.   EE has a noun phrase label
      the system                                                                                     13.   Data flow has only one direction between symbols
   4. Select appropriate symbols                                                                     14.   Data flow cannot directly go back to the same process it leaves.
   5. Prepare a first draft                                                                          15.   A data flow can go directly to a data store
   6. Discuss flowchart with others                                                                  16.   Data flows has noun phrase label
   7. Revise as needed
                                                                                                 DATA FLOW DIAGRAMS AND FLOWCHARTS
                       CHAPTER 7: DATA FLOW DIAGRAMMING
                                                                                                             DFD                            FC
DFD SYMBOLS AND DESIGN CONSIDERATIONS                                                                -     Four symbols             -    Many symbols
                                                                                                     -     Leveled sets             -    Columns
                                                              Process – any set of                   -     Level        zero,            depicting area of
                                                                                                           1.0,1.1..                     responsibility
                                                              procedures an organization
                                                                                                     -     Focus on data            -    Numbers can be
                                                              uses to gather data, change                  and how they                  used even not for
                                                              data to information, or report               move between                  process
                                                              the information to system                    business                 -    Concerned       w
                                                              users; starts with an action                 processes,                    data, also w docs
                                                              word;       two      identifying             external entities             and processing
                                                              characteristics: a number and                and data stores               tools
                                                                                                     -     Line represents          -    Line represent
                                                              a name
                                                                                                           data with noun                movement
                                                                                                           phrase label
External entity – any person or org outside the boundary of information system
                                                                                                 LEVELED SETS OF DFDS
Data store –a place for collecting data; file
                                                                                                 Leveled sets – a collection that models related business processes
Data flow – a directional line; refers to the data itself, not what happens to it.
                                                                                                 Context diagram – show how the process, a single circle, related to the external entities,
GOOD DFD RULES:                                                                                  rectangles.
   1. Processes should have unique names
   2. Inputs to a process should differ from the outputs to a process                            DATABASE DESIGN
   3. Any single DFD should not have more than seven processes                                   Database tables – the fundamental building blocks of relational databases
   4. No process can have only outputs.                                                          Primary key – a field that uniquely identifies every record within the table
   5. No process can have only inputs.
   6. Process = verb phrase label
Query – a set of instructions that examines records in one or more tables, then outputs                  2.  Information events deal with recording and maintaining data, as well
data in accordance with instructions                                                                         as reporting information
Reports – a third database object                                                                       3. Decision/management events concerned with human decision making
Forms – allows user to input data to a table and/or look up data in a table                 Agents – people involved in the information system: employees (internal), customers
                                                                                            (external)
Normalization – the process of making a database table efficient and effective              Resources – the things agents need to complete the events: cash, inventory, supplies
Three-stage process:
    1. First Normal Form (1NF) –eliminates repeating groups                                 Resources – left column
    2. Second Normal Form (2NF) – eliminates repeating groups and redundant data            Events – middle column
    3. Third Normal Form (3NF) – eliminates repeating groups, redundant data and            Agents – right column
        columns not dependent on the Primary key
                                                                                            Six-step REA model:
                            CHAPTER 8: REA MODELING                                             1. Understand the org’s environment and objectives – to have a thorough
TYPES OF AIS                                                                                         grasp of what the organization does
    View-driven – traditional accounting systems; focus on general purpose                     2. Review the business process and identify the strategically significant
       financial statements; idea that departments can remain separate and unrelated                 operating events. Focus on strategically significant operating events.
                                                                                                3. Analyze each strategically significant operating events to identify the
                  Five key problems:                                                                relevant event resources and agents.
                        1. Focus on very small, well-defined group of important                 4. Identify the relevant behaviors, characteristics and attributes of the REA
                             business events                                                         model elements. Helps create database tables.
                        2. Process data in batches, data are often outdated                     5. Identify and document the direct relationships among elements of the REA
                        3. System captures limited set of data                                       Model.
                        4. Data are highly aggregated and stored in multiple places             6. Validate the REA model with business people.
                        5. Internal control is often protective and expensive
        Event-driven – focus on business processes; assumes that the purpose of AIS        CARDINALITIES – tell the accounting professional about the relationships between
         is to provide info about economic events that is useful in a variety of decision   elements of a REA model.
         context.
               Capture more data about individual transactions                             DATABASE CREATION FROM A REA MODEL
               Organize data so can be accessed and understood by variety of
                   people                                                                   1ST RULE. When the maximum cardinalities between two elements of a REA model
               Equipped to answer questions that cannot be answered by view-driven         are one and many, include the primary key from the “one side” in the table on the
                                                                                            “many side.”
REA MODELING
                                                                                            2nd RULE. When the maximum cardinalities between two elements of a REA model
REA – “resources, events and agents”                                                        are many and many, create a separate junction table to reflect the combined
    Events:                                                                                relationship.
             1. Operating events focus on activities involved with providing goods and
                 services to customers.                                                     The idea is to create a workable model that reflects an organization’s
                                                                                            STRATEGICALLY SIGNIFICANT OPERATING ACTIVITIES.
           CHAPTER 9: XBRL (eXtensible Business Reporting Language)                                3.    Language.
TERMINOLOGIES                                                                                      Own rules regarding punctuation.
       Extensible                                                                            GLOBAL TAXONOMIES AND TAGGING TOOLS
         “X” in XBRL;
         the XBRL language is ‘able’ to be ‘extended’;                                            Global Ledger taxonomy – commonly known as XBRL-GL, helps organizations
         quality of XBRL that allows users to add tags                                            manage internal information.
       Specification                                                                              -     Allows representation of anything that is found in a chart of accounts, journal
         A specific example of a broader class of objects                                               entries or historical trans.
         XBRL is a part of a larger group of languages called XML (eXtensible
             Markup Language)                                                                 ORGANIZATIONAL BENEFITS
         XBRL is focused on descriptors of business reporting information
       Taxonomy                                                                                   XBRL helps the organization in 2 ways:
         A way to organize knowledge
                                                                                                   1.    Allows more efficient data collection and reporting
         “table of contents”
                                                                                                   2.    Facilitates data consumption and analysis.
         “asset, liabilities, equity”
         XBRL is focused on specific industry groups                                              XBRL Benefits:
       Namespace
         The internet location of an XBRL taxonomy                                                1.    Save costs
         “dictionary” of XBRL                                                                     2.    Consolidates results
       Instance document                                                                          3.    Improve accuracy and reliability of financial data
         A document that includes data properly tagged with XBRL                                  4.    Focus effort on analysis, forecast, etc
                                                                                                   5.    Achieve quicker, efficient decisions
HISTORY AND STRUCTURE                                                                              6.    More effective use of internet
                                                                                                   7.    Improve investor relations
       XBRL is one application of XML.                                                            8.    Simplify process and reduce costs
                                                                                                   9.    Obtain quicker responses
   XML – a standard for the electronic exchange of data between businesses and on
                                                                                                   10.   Free from systems and software
   the internet. Under this, identifying tags are applied to items of data so that they can
   be processes efficiently by computer software.                                             INTERNAL CONTROL
   eXtensible BusinessReporting Language                                                      Risks and control activities:
   1.   extensible.                                                                                1.    Comprised data – firewall, backup
                                                                                                   2.    Tagging errors – electronic tagging
   Users can ‘extend’ the language beyond original parameters based on needs.
                                                                                                   3.    Hardware/Software failure – disaster recovery plans
   2.   business reporting.                                                                        4.    Selection of inappropriate taxonomy – periodic review and approval of taxonomy
                                                                                                         used
   It is specifically designed to tag and transmit financial information.
                                                                                          3. G2C – Government to Consumer – Internal Revenue Service
                                                                                          4. G2B – Government to Business – EDGAR (SEC)
    Chapter 10 – E-business and Enterprise Resource Planning Systems                      5. C2C – Consumer to Consumer – eBay
                                                                                         Enterprise Resource Planning (ERP) – a relational database that provides
    E-commerce – the exchange of goods and services by means of the Internet or          comprehensive information for making decisions in organizations (ex. Oracle’s
     other computer networks                                                              PeopleSoft and SAP)
    Benefits of E-business:                                                                   More holistic (complete) view of the organization
     1. Marketing: geographic market expansion, hard-to-reach markets, more              Modular Organization of ERP Systems
         targeted marketing
     2. Reduced operating costs: marketing, telecommunications, transactions                                    Primary Stakeholder          Module Components in
         processing, doesn’t suffer the costs of maintaining real-world stores      Generic Module Name
                                                                                                                      Group                          SAP
         thereby charging less to consumers
                                                                                    Customer Relationship
     3. Streamlined (organized) operations                                                                           Customers                Sales and distribution
                                                                                     Management (CRM)
     4. Quicker, easier product and service delivery                                   Human Resource
    Costs of E-business:                                                                                            Employees                  Human Resources
                                                                                     Management (HRM)
     1. Financial costs associated with setting up networks                             Supply Chain
     2. Need to develop different, better internal control systems                                                     Vendors                Materials management
                                                                                        Management
          Control Number – a three digit number printed next to the card           Financial Management            Stockholders               Financial Accounting
               number itself, above the signature panel on the back of the card
          Trust Services – a set of professional assurance and advisory                 Database Tables in ERP systems
               services based on a common framework (a core set of principles and
               criteria) to address the risks and opportunities of IT.
          WebTrust – the accounting profession’s answer to concerns relating       Generic Module Name             Table Names                Table Primary Key
               electronic commerce
          SysTrust – the accounting profession’s answer to concerns relating to    Customer Relationship                                       Customer ID, sales
                                                                                                                  Customers, Sales
               system reliability                                                    Management (CRM)                                             transaction ID
          Data Encryption                                                             Human Resource                                          Employee ID, payroll
                                                                                                              Employee, pay employees
                                                                                     Management (HRM)                                             transaction ID
     3. Potential for customer distrust
                                                                                        Supply Chain
     4. Severe consequences for technology breakdowns: Los of customer                                            Vendor, inventory          Vendor ID, Inventory ID
                                                                                        Management
         confidence, lost sales, overloaded customer service phone lines, and
                                                                                    Financial Management          Chart of Accounts              Account Number
         generalized damage to a company’s reputation
    Amazon’s marketing strategy (six pillars)
     1. It freely proffers(offers) products and services
                                                                                         10 major causes of ERP implementation failures (Umble and Umble 2002):
     2. It uses a customer friendly interface
                                                                                          1. Poor leadership from top management  Clear, strong leadership and
     3. It scales easily from small to large
                                                                                              support from top management
     4. It exploits its affiliate’s products and resources
                                                                                          2. Automating existing redundant or non-value added processes in the
     5. It uses existing communication systems
                                                                                              new system  few policies need to be changed to make the most of the
     6. It utilizes universal behaviors and mentality
                                                                                              ERP system, otherwise, managers will be doing the same ineffective
    E-business Taxonomies:
                                                                                              things, only faster
     1. B2C – Business to consumer – Travelocity
     2. B2B – Business to Business – Dell computers
    3.   Unrealistic Expectations  Systems are not a panacea (cure) for                    Application Service Provider – an organization that provides a contractual
         problems with organizational culture, poorly designed business processes,           service to deploy, host and manage applications for customers remotely from a
         or inadequate internal controls                                                     centralized location (Jaruzelski and Lake 2014)
    4. Poor project management  managers have to apply solid project                       ASP subcategories: (5)
         management techniques for selecting the right people, completing the                1. Enterprise ASPs – deliver high end business applications
         tasks in the right order, and staying on schedule                                   2. Local/Regional ASPs – supply wide variety of application services for
    5. Inadequate education and training  seeing the ERP as solely an                            smaller businesses in a local area
         information technology project, rather than a an opportunity to analyse             3. Specialist ASPs – provide applications for a specific need, such as Web
         business processes and make them better                                                  site services or human resources
    6. Trying to maintain the status quo  be upfront and honest from the start              4. Vertical Market ASPs – provide support to a specific industry such as
         about the purpose and possible results of implementing ERP systems                       healthcare
    7. A bad match between ERP software and organizational process                          5. Volume Business ASPs – supply general small/medium-sized businesses
         consult with colleagues about which ERP software has worked well, and                    with prepackaged application services in volume
         which has worked poorly, in a specific industry                                    COSO’s Enterprise Risk Management – Integrated Framework – discuss
    8. Inaccurate data in the system  the information generated by an ERP                   ASPs as a form of risk sharing, one way of responding to risks in an
         system are as only as valid and useful as the data that undergird them              organization’s environment
    9. ERP implementation viewed as an IT project  view ERP project as                     Uses of ASPs: (5)
         holistic, touching not only information technology, but also business               1. Process insurance claims
         processes and organizational behaviour issues                                       2. Complete the steps in accounting cycle
    10. Significant technical difficulties  such as bugs in the software,                   3. Manage stock market
         problems interfacing with existing information systems, and hardware                4. Provide personal financial planning
         difficulties                                                                        5. Prepare income tax returns
   Six necessary conditions for a successful ERP implementation:                           ASPs benefits:
    1. Obtain organizational commitment: get a clear, strong commitment to                   1. Less costly than purchasing software outright
         the project throughout the organization                                             2. Increased flexibility
    2. Communicate strategic goals clearly: employees must understand the                    3. Potentially improved customer service
         goals of the ERP project – typically, providing better information more             4. Role in disaster recovery plans
         quickly for decision making                                                        ASPs risk:
    3. View ERP as an enterprise-wide venture: ERP touches every aspect of                   1. Psychological and behavioural factors
         operations                                                                          2. Service interruptions
    4. Select a compatible ERP system: don’t believe everything the software                 3. Compromised data
         vendor or implementation consultants tell you! Do your own research; ask            4. Inability to pay monthly fees
         for other companies that have had successful (and unsuccessful)                    Internal controls that will address ASPs risk:
         implementations                                                                     1. Establish a budget for the ASP project
    5. Resolve multisite issues: the project management plan must deal                       2. Back up data on a daily basis
         specifically with multisite issues                                                  3. Provide ongoing training for employees using ASP
    6. Ensure data accuracy: the project team needs to do significant employee               4. Create firewalls and encryption protocols
         education about the importance of accurate data entry; test runs with              Service Organizational Control Reports – internal control reports on the
         fictitious data before the system “goes live” also can help achieve this goal       services provided by a service organization providing a valuable information that
                                                                                             users need to assess and address the risk associated with an outsourced ervice
                                                                                            3 broad types of SOC reports:
    1.   SOC 1 – control relevant to user entities internal control over financial             Privacy laws have made managers and other stakeholders aware
         reporting                                                                                 of the critical need to protect information assets
    2.   SOC 2 – controls over security, availability, processing integrity,          5. Intrusions
         confidentiality, or privacy                                                           to gain access to a network or a system by bypassing security
    3.   SOC 3 – less-detailed but similar to SOC 2 reports                                        controls or exploiting lack of adequate controls
                                                                                               hacker for profit/hacker for fun
                                                                                      6. Information Theft
    Chapter 11 – Computer Crime and Information Technology Security                            Targets the organization’s most precious asset: information
                                                                                               Results in potentially higher losses for the organizations
   Taxonomy for Computer Crime (Carter)                                              7. Information Manipulation
    1. Target – the system or its data. The objective of these crimes is to impact             Input manipulation – hard to detect since the fraudulent input may
        the confidentiality, availability, and/or integrity of data stored on the                  look valid until an in depth examination is performed
        computer                                                                               Program manipulation – involves the modification or insertion of
    2. Instrumentality – uses the computer to further a criminal end; the                          specific functions in the computer information system
        computer is used to commit a crime                                                     Salami technique – where unnoticeable slices of a financial
    3. Incidental – encompasses crimes where the computer is not required for                      transaction are removed and transferred to another account
        the crime but is related to the criminal act                                  8. Malicious Software (Malware)
    4. Associated – the growth of the internet has generated new version of fairly             Can take many different forms: a virus infecting a system and
        traditional crimes                                                                         modifying its data, a worm replicating over the network causing a
   Business risk and threats to information systems                                               bottleneck, or a Trojan horse allowing an unauthorized backdoor
    1. Fraud                                                                                       into a system that directly impacts the confidentiality of the files
              Any illegal act for which knowledge of computer technology is                       residing on the system
                  used to commit the offense                                                   Logic bombs
              Data diddling – intentional modification of information                9. Denial of Service Attacks
              Theft of information                                                            Attacks prevent computer systems and networks from functioning
              Sarbanes-Oxley Act – introduced with the firm resolve to increase                   in accordance with their intended purpose
                  corporate responsibility and requires that companies establish               Causes loss of service to the users by consuming scarce
                  extensive governance policies to prevent and respond to                          resources such as bandwidth, memory, processor cycles
                  fraudulent activities                                                        Can disrupt configuration information or physical components
    2. Error                                                                          10. Website Defacements
              Implementing preventive controls that will detect and correct                   A form of digital graffiti where intruders modify pages on the site
                  errors before they can occur can prevent financial losses and                    in order to leave their mark, send a message, or mock the
                  negative impacts to the organization’s image                                     organization
    3. Service Interruption and Delays                                                         Hacktivism – politically motivated defacement that attempts to
              Delay - Can bring the organization to a standstill                                  send a message to the organization or some part of the online
              Service interruption: accidental (can be caused by someone                          community
                  shutting down the wrong machine), wilful neglect (could be due to   11. Extortion
                  outdated antivirus software), and malicious behaviour (can be                the result of the computer being the object of a crime; the
                  caused by a hacker launching a denial of service attack against                  extortionist contacts an organization after successfully stealing
                  an organization’s Web site                                                       information or launching a DOS attack
    4. Disclosure of Confidential Information
              Can have major impacts on an organization’s financial health
   Information Security – the protection of data in a system against unauthorized                          Adequate supervision of employees - This should be the first
    disclosure, modification, or destruction, and protection of the computer system                          line of defense in protecting critical computing infrastructures
    itself against unauthorized use, modification, or denial of service.                                    Security Reviews – monitor the program to ensure compliance,
   Basic Principles of Information Security:                                                                fine tune the security policy and controls in accordance with the
    1. Confidentiality – condition that exists when data are held in confidence and                          organization’s goals, and ensure that any deficiencies are
          are protected from unauthorized disclosure                                                         corrected
    2. Data integrity – state that exists when data stored in an information system                         Security audits – examine whether the information systems
          are the same as those in the source documents or have been correctly                               operate in accordance with the security policy and ensure that
          processed from source data and have not been exposed to accidental or                              the controls are effective in protecting these systems
          malicious alteration or destruction                                                               Administrative security controls – established for three main
    3. Availability – achieved when the required data can be obtained within the                             reasons: (1) to provide supplemental controls (2) to protect
          required time frame                                                                                information processing resources (3) to ensure that all
   Classification of IT controls:                                                                           employees have proper authorization to access computing
    1. Physical security controls – are required to protect computers, related                               resources
          equipment, and their contents from espionage, theft, and destruction or
                                                                                                           Note: Preventive controls are implemented to keep unwanted
          damage by accident, fire, or natural disasters.
                                                                                                           events from occurring, detective controls attempt to identify
    2. Technical security controls (logical controls) – involve the use of
          safeguards incorporated in computer and telecommunication hardware and                           anomalous and unwanted events once they have occurred, whereas
          software                                                                                         corrective controls remedy problems discovered by detective
                Firewalls – the first line of defense in protecting the corporate                         controls
                    network from network based threats
                Access control policy – determines which packets can flow                      ISACA (Information Systems Audit and Control Association) – a
                    between the network segments protected by firewalls                          professional group that bridges the gap between accounting and information
                Intrusion detection systems and intrusion prevention                            technology
                    systems – detect potentially malicious data and access patterns             COBIT 5.0 – five principles that form the foundation of a strong IT
                    (Network based: examine network traffic, they look for specific              governance and management:
                    patterns of anomalous behaviour or deviations from the standard              1. Meeting Stakeholder needs: When an organization manages its IT well,
                    behaviour of the network & Individual based: detect malicious                     the system will meet legitimate information needs of all stakeholder groups
                    activity by examining system calls, event logs, critical system files,       2. Covering the enterprise end to end: A well designed plan for managing
                    and other valuable system information                                             information covers the whole entity not just the IT function
                Cryptography – transforms data to (1) hide them, (2) prevent them               3. Applying a single integrated framework: incorporates ad builds on other
                    from being modified and/or, (3) prevent unauthorized access to                    frameworks to produce a unified set of ideas
                    them                                                                         4. Enabling a holistic approach: integrating IT governance and
    3. Administrative Security Controls – management constraints, as well as                          management throughout the entity
          operational and accountability procedures                                              5. Separating governance from management: governance focuses on
                 Security policies – a clear and concise set of guiding                              strategic decision making, goal setting, and prioritization; management
                      statements supported by management; it provides a framework                     focuses more on day to day actions needed to achieve those goals
                      that ensures that information assets are secured                          Seven enablers (tools that make the best possible uses of information and
                 Security awareness training – is an often overlooked part of a                 information technology)
                      security management program.
                                                                                                                 Inbound logistics: move raw materials
          Enabler                 ISACA Explanation                      Example                                 Operations: transform materials into finished products
                                                                                                                 Outbound Logistics: move finished product
                                  Vehicle to translate the                                                       Marketing & sales: sell the product
                                                                    Enterprise Risk
1. Principles, policies, and      desired behaviour into                                                         Service: provide support as needed
                                                                management plan, internal
frameworks                      practical guidance for day                                                  Support activities: provide essential services to the organization
                                                                     control plan
                                    to day management                                                            Procurement: purchasing function
                                Organized set of practices                                                       Information technology: R & D, other transforms of IT
                                                                 Sales/collection process,
                                 and activities to achieve                                                       Human resource management: personnel-related functions
                                                                   acquisition/payment
                                   certain objectives and                                                        Infrastructure: other aspects of the organization
2. Processes                                                       process, conversion
                               produce a set of outputs in
                                                                process, human resource                  Process Description (Sales/collection) – TAP-FISH-BICOP
                               support of achieving overall
                                                                process, financing process                1. Take a customer’s order – either face to face, via the Internet, through the
                                      IT related goals
3. Organizational                   Key decision making                                                       mail, over the phone and others
                                                                    C-suite executives                    2. Approve the customer’s credit - such as scanning the credit card
Structures                        entities in an enterprise
                               Very often underestimated                                                  3. Fill the order based on the approved credit – preparing the order for
4. Culture, ethics, and            as a success factor in       Valuing open dialogue and                     shipment
behavior                              governance and                   cooperation                        4. Ship the product (if necessary)
                                  management activities                                                   5. Bill the customer
                                 Required for keeping the                                                 6. Collect payment – (1) open invoice system – a customer remittance is tied
                                 organization running and                                                     to a specific invoice or set of invoices (provides more detail though
                                                                Product demand, employee
                                 well governed, but at the                                                    complex). (2) balance forward system – remittances are not applied to a
5. Information                                                     satisfaction, vendor
                               operational level very often,                                                  particular invoice; rather, they are simply applied to a customer’s total
                                                                         reliability
                                   the key product of the                                                     outstanding balance
                                       enterprise itself                                                  7. Process uncollectible receivables as necessary
                                Infrastructure, technology,                                              Documents Associated with the Sales/ Collection Process
                                                                    Enterprise resource
                                    and applications that
6. Services, Infrastructure                                     planning systems, relational
                               provide the enterprise with
and applications                                                   databases, transaction      Document Name             Basic Purpose                Originator            Recipient
                                  information technology
                                                                    processing software                                To summarize items
                                 processing and services                                        Customer Order                                     Sales department        Warehouse
                                 Required for successful                                                                ordered and prices
                                completion of all activities,                                                       To guide selection of items                             Shipping
7. People, skills, and                                           Functional experts, cross        Picking List                                        Warehouse
                                  and for making correct                                                                 from warehouse                                    department
competencies                                                        functional thinking                               To specify contents of             Shipping
                                    decisions, and taking                                        Packing List                                                               Customer
                                     corrective actions                                                                     shipments                   department
                                                                                                                                                         Shipping
                                                                                                 Bill of Lading       To specify freight terms                           Common Carrier
                                                                                                                                                        department
                    CHAPTER 12 SALES/COLLLECTION PROCESS                                       Customer Invoice             To bill client         Billing department       Customer
                                                                                                                                                                          Cash receipts
                                                                                               Customer Check            To remit payment              Customer
         Business Process – a set of procedures and policies designed to create value                                                                                     department
          for some organizational stakeholder                                                                           To provide a source                                Accounting
                                                                                               Remittance Advice                                       Customer
         Value Chain – a way to think about the processes organizations use for their                                       document                                      department
          stakeholder (Porter’s Value Chain)                                                                        To transmit cash receipts to     Cash receipts
                                                                                                  Deposit slip                                                                Bank
                                                                                                                               bank                   department
            Primary activities: directly involved in value creation
                                                                                                                    a. Incorporating independent order checking
           File Structures in the Sales/Collection Process                                                         b. Using information technology to fill orders
                                                                                                               4.   Damaging goods in the delivery process
  File Name          File Type     Primary Key     Other Data                                                       a. Packing merchandise adequately prior to shipment
                                                   Last name, First name                                            b. Insuring goods in transit
                                                   Street Address, city state, ZIP ode                         5.   Billing the customer incorrectly
                                                   Phone number                                                     a. Machining documents prior to billing
  Employee            Master       Employee ID
                                                   Emergency Contact                                                b. Using information technology to ensure numerical accuracy
                                                   Department                                                  6.   Mishandling cash receipts
                                                   Hire date                                                        a. Separating duties
                                                   Customer company name                                            b. Restrictively endorsing checks when they are received
                                                   Street address, city, state, ZIP Code                            c. Reconciling the bank statement at least monthly
                                                   Phone number
  Customer            Master        Customer ID                                                                        CHAPTER 13 ACQUISITION/PAYMENT PROCESS
                                                   Contact person name
                                                   Credit limit
                                                   Date of first sale                                     Basic steps: (Hollander, Denna and Cherrington) – RAP REDIW
                                                   Product name                                            1. Request goods and services based on monitored need
                                                   Beginning balance date                                  2. Authorize a purchase
   Inventory          Master         Product ID    Beginning balance quantity                              3. Purchase goods/services
                                                   Beginning balance cost per unit                         4. Receive goods and services (blind copy – indicates what items are
                                                   Preferred supplier                                          expected from what vendor but not the item in quantities)
                                                   Transaction date                                        5. Disburse Cash
                                    Transaction
    Sales           Transaction                    Customer ID                                             6. When necessary, process purchase returns
                                        ID
                                                   Employee ID                                            Documents Used in the Acquisition Payment Process
                                                   Product ID
                                    Transaction                                               Document Name                  Basic Purpose                Originator         Recipient
Sales/Inventory      Junction                      Quantity sold
                                        ID                                                                            To request that the purchasing
                                                   Selling price per unit                        Purchase                                                  Operating        Purchasing
                                                                                                                        department order goods or
                                                                                                 requisition                                              department        department
                                                                                                                          services from a vendor
           Common Risk Faced in the sales/collection process and the internal                                           To specify the items to be
            controls that might lessen those risks:                                                                   ordered, freight terms, shipping    Purchasing
                                                                                              Purchase Order                                                                  Vendor
                                                                                                                      address, and other information      department
             1. Granting credit to customers who are not creditworthy
                                                                                                                              for the vendor
                 a. Relying on third-party vendors to grant credit (Visa, Discover, or
                                                                                                                        To ensure that goods have
                      American Express)                                                                                                                    Receiving          Various
                                                                                              Receiving report         been ordered and received in
                 b. Establishing a formal credit approval process, independent of the                                                                     department        departments
                                                                                                                              good condition
                      sales function (example of separation of duties)                                                 To request payments from a                           Accounting
                 c. Conducting a cash-only business                                            Vendor Invoice                                               Vendor
                                                                                                                                 customer                                   department
             2. Selling products that are not available                                                                                                   Accounting
                 a. Checking stock on hand before completing a customer’s order                    Check                    To pay the vendor                                 Vendor
                                                                                                                                                          department
                      (maintain a relational organization/ERP system controlled by a query)
                 b. Maintaining adequate inventory (just in time, economic order quantity,
                      and reorder point)                                                                  File Structures in the Acquisition/ Payment Process
             3. Filing the customer’s order incorrectly
                                                                                                      c. Insure products en route
    File name          File Type       Primary Key                   Other data                   4.  Experiencing theft of inventory and/or cash
                                                        Last name, first name                         a. Establish an internal audit function
                                                        Street Address, city state, ZIP               b. Reconcile bank statements promptly
                                                        code                                          c. Separate authorization, custody, and usage functions for both
    Employee             Master        Employee ID      Phone Number                                       inventory and cash
                                                        Emergency Contact                             d. Install employee monitoring systems
                                                        Department                                    e. Bond employees who handle high value goods – Fidelity bonding –
                                                        Hire date                                          insurance focused on employee behavior: (1) individual bonds – cover
                                                        Vendor company name                                theft by a specific named individual (2) Schedule bonds – list every
                                                        Street address, city state, ZIP                    name or position to be covered (3) Blanket bonds – the most
                                                        code
                                                                                                           encompassing, covers all employees without reference to individual
      Vendor             Master         Vendor ID       Phone number
                                                                                                           names or positions
                                                        Contact person name
                                                        Credit limit                              5. Making errors in paying invoices
                                                        Date of fist purchase                         a. Require document matching (purchase order, receiving report, invoice)
                                                        Product Name                                  b. Employ information technology to take advantage of available
                                                        Beginning balance date                             discounts
     Inventory           Master         Product ID      Beginning balance quantity                    c. Stamp documents paid to avoid duplicate payments
                                                        Beginning balance cost per unit          Comprehensive view of sales/collection process and acquisition/payment
                                                        Preferred supplier                        process
                                                        Transaction date                          1. An operating department in the buying organization request goods and
    Purchases         Transaction     Transaction ID    Vendor ID                                     services
                                                        Employee ID                               2. The purchasing department in the buying organization authorizes purchase
                                                        Product ID                                3. The sales department in the selling organization takes the customer’s order
Purchases/Inventory     Junction      Transaction ID    Quantity Purchased                        4. The credit department in the selling organization approves the customer’s
                                                        Purchase price per unit                       credit
                                                                                                  5. The warehouse in the selling organization fills the order based on the
                                                                                                      approved credit
         Common Risk Faced in the acquisition/payment process and the internal
                                                                                                  6. The selling organization’s shipping department ships the product
          controls that might lessen those risks:
                                                                                                  7. The buying organization’s receiving department receives the goods
          1. Ordering unneeded goods
                                                                                                  8. The billing department in the selling organization bills the client
              a. Institute a system for monitoring inventory levels
                                                                                                  9. The cash disbursements department in the buying organization disburses
              b. Require justification for unusual orders or orders over a specified dollar
                                                                                                      the cash
                   amount                                                                         10. The cash receipts department in the selling organization collects payment
              c. Specify the business purpose for ordered goods
          2. Purchasing goods from inappropriate vendors                                                    CHAPTER 14 OTHER BUSINESS PROCESSES
              a. Develop and enforce a conflict of interest policy
              b. Establish criteria for supplier reliability and quality of goods                Conversion process – basic purpose is to convert direct material, direct labor,
              c. Create strategic alliances with preferred vendors                                and manufacturing overhead (factors of production) into a finished product.
          3. Receiving unordered defective goods                                                    Job costing – units of product are differentiated from one another
              a. Match receiving reports with approved purchase orders                              Process costing – systems produced are undifferentiated goods
              b. Inspect the goods before accepting a shipment
                  Hybrid system – combine some elements of both job and process costing                      Time to repayment
                   system                                                                                     Frequency of payments
          Conversion Process Documents                                                                       Lender identification data
   Form Name                            Purpose                 Originator     Recipient            Human resource process
                             Request raw material from the                                            Payroll forms:
Materials requisition                                           Production    Warehouse
                               warehouse for production                                     Form Name          Purpose                                  Data Included
                            Summarizes material, labor, and                                 Form W-4           Establishes payroll withholding status   Employee identification data
  Job cost sheet                                                Production     Accounting
                         overhead cost in a job costing system                                                                                          Withholding status
                        Accumulates labor data (time, pay rate,                                                                                         Number of withholding allowances
 Labor time ticket                                              Production     Accounting
                                    total labor cost)                                       Form W-2           Reports year-end information for tax     Employee identification data
  Production cost            Summarizes cos and quantity                                                       purposes                                 Employer identification data
                                                                Production     Accounting
       report            information a process costing system                                                                                           Gross pay and tax withholdings
                         Documents he movement of materials                                                                                             401(k) contributions
Material move ticket                                            Warehouse      Production
                          from the warehouse into production                                Payroll register   Computes payroll data for all            Employee identification data
                                                                                                               employees for a given pay period         Hours worked
          Risk and Control in the Conversion Process                                                                                                   Pay rate
            Risk                                      Control                                                                                           Total gross pay
                                             Special storage conditions                                                                                 Tax and benefit withholdings
   Damage to raw materials                                                                                                                              Net pay
                                    Backup power supplies for heating and cooling
                                              Secured storage areas                         Employee           Summarizes payroll data for a single     Virtually the same as the payroll
      Loss/theft of raw                                                                     earnings record    employee for multiple pay periods        register
                                             Adequate documentation
         materials                                                                          Form 1099          Reports amounts paid to an               I.C identification data
                                               Separation of duties
                                         Workers’ compensation insurance                                       independent contractor (IC)              Payer’s identification data
       Worker injuries                            Safety training                                                                                       Total amount paid
                                                Protective clothing                         Form 940           Reports employer’s federal               Company name
                                                                                                               unemployment taxes                       Amount Paid
                                                                                            Form 941           Reports amounts withheld by
           Financing Process                                                                                  employer to IRS
              Information needed for financing process transactions
                  Equity financing transactions
                                                                                                 CHAPTER 15 DECISION-MAKING MODELS AND KNOWLEDGE MANAGEMENT
                      No. of shares
                      Par value per share
                                                                                                       Information overload (Eppler and Mengis)
                      Market value per share
                                                                                                              the amount of information actually integrated into the decision begins
                      Shareholder identification data
                                                                                                                 to decline
                      Dividend per share
                                                                                                              the volume of information supply exceeds the limited human
                      Dividend dates (declaration, record, payment)
                                                                                                                 information processing capacity
                  Debt financing transactions
                                                                                                              the information processing requirements exceed the information-
                      Principal
                                                                                                                 processing capacity
                      Coupon interest rate (rate of interest paid in cash)
                                                                                                              the decision maker estimates he or she has to handle more
                      Market interest rate (the rate prevailing in the market for
                                                                                                                 information than he or she can efficiently use
                         investments of similar risk
                      Issue date
   Causes of information overload (5)                                                      Knowledge management – the organization generate value from their
    1. Personal factors - everyone’s limitations to process information                      intellectual resources and information systems within a business environment
    2. Information characteristics                                                                  the process through which organizations generate value from such
    3. Task and process parameters\                                                                      assets involves sharing them to employees, departments and even
    4. Organizational design – people in groups have differing ideas and                                 with other companies in an effort to devise best practices (Santosus
        approaches for problem solving and decision making                                               and Surmacz)
    5. Information technology                                                               Four objectives of knowledge management (Rowley)
   Symptoms and effects of Information overload                                             1. To create knowledge repositories
    1. Limited information search and retrieval strategies                                   2. To improve knowledge access
             Less systematic searching                                                      3. To enhance the knowledge environment
             Increased problems differentiating relevant and irrelevant                     4. To manage knowledge as an asset
                 information                                                                Seven steps to create knowledge management system (Nesbit)
    2. Arbitrary information analysis and organization                                       1. Create an organizational culture that supports the ideas of knowledge
             Overlapping and inconsistent categories                                              sharing and development
             Difficulty seeing the big picture                                              2. Define the business goals the knowledge management system will address
    3. Suboptimal decisions                                                                  3. Perform a knowledge audit to identify any duplication, gaps, and overlaps
             Inefficient work                                                                     in an organization’s knowledge base
             Reduced quality and accuracy of decisions                                      4. Create a visual map that describes units of knowledge and the
    4. Strenuous personal situations                                                               relationships between them
             Stress, confusion, and cognitive strain                                        5. Develop a knowledge management strategy based on the content
             Overconfidence                                                                       management, integration, search mechanisms, information delivery, and
   Countermeasures for information overload                                                       collaboration
    1. Allow more time to complete important tasks                                           6. Purchase or build appropriate tools for capturing, analyzing, categorizing,
    2. Compress, aggregate, categorize, and structure information                                  and distributing knowledge
    3. Create, small, self-contained tasks rather than trying to do everything at            7. Periodically reassess the value of the knowledge management system and
        once                                                                                       make necessary adjustments
    4. Define decision models and rules for common decision contexts                        Steps for better thinking (Wolcott and Lynch)
    5. Focus on creating value added information                                             Foundation Knowing: acquire background knowledge and skills
    6. Formalize the language used to describe information                                   1. Identifying: Problem, Relevant information, uncertainties
    7. Handle information as it comes to you – don’t put it off                              2. Exploring: Biases, Assumptions, Qualitative interpretation from various
    8. Improve personal information management                                                     POV, information organization
    9. Improve personal time management skills and techniques                                3. Prioritizing: Ranked list of factors to consider, Conclusion
    10. Use graphs and other visual aids                                                     4. Envisioning: Solution limitations, Information use for future decisions
   2 additional reasons why people don’t always make the best decisions:                   CHAPTER 16: PROFESSIONALISM, ETHICS AND CAREER PLANNING
    (Simon)
                                                                                    PROFESSIONALISM
    1. Satisficing – people’s tendency to stop looking for solutions to a problem
        when they find a solution that works- whether the decision is best or not   7 Characterisctics of Professionals (Dr. Nancy Bell, 2004)
    2. Bounded rationality – a separate, but related, idea which means that
        people will inherently avoid uncertainty and rely on proven rules for               Communicates effectively
        problem solving whenever they can                                                   Thinks rationally, logically and coherently
        Appropriately uses technical knowledge                                               8 Step Model of Dealing with Ethical Dilemmas (Langenderfer and Rockness, 1989)
        Integrates knowledge from many disciplines
                                                                                                       1.    Identify the facts
        Exhibits ethical professional behavior
                                                                                                       2.    Identify the ethics issues and the stakeholders involved
        Recognizes the influence of political, social economic, legal and regulatory
                                                                                                       3.    Define the norms, principles and values related to situation
         forces
                                                                                                       4.    Identify the alternative courses of action
        Actively seeks additional knowledge
                                                                                                       5.    Evaluate the consequences of each possible course of action
4 Criteria of Being Professional (McDonald, 2001)                                                      6.    Decide the best course of action consistent with the norms, principles and
                                                                                                             values
        Specialized knowledge base. Financial reporting rules, auditing standards.                    7.    If appropriate, discuss the alternative with a trusted person
        Complex skills. Use of judgment and computations.                                             8.    Reach a decision
        Autonomy of practice. Refers to independence or self-sufficiency.
                                                                                              ETHICAL CASES
         “independence of mind”
        Adherence to a code of ethical behavior                                              Charles Ponzi – committed a multimillion-dollar fraud with international postal reply
                                                                                              coupon; “pyramid” or “multilevel marketing” scheme
ETHICS
                                                                                              Adelphia Communications Corporation – the management engaged in deceptive
Nature of Ethics (Boss, 2014)
                                                                                              accounting practices to meet analyst’ expectations for profitability
    1.   Ethics is a set of standards that:
                                                                                              Enron/Arthur Andersen – best known accounting fraud in recent history (Enron);
         a. Differentiates “right” from “wrong”
                                                                                              downfall of one of the then “Big Five” CPA firms because of Enron (Arthur)
         b. Is established by a particular group
         c. Is imposed on members of the group to regulate behavior                           CAREER PLANNING
    2.   Ethics is a discipline that:
         a. Studies values and guidelines for living                                          Steps in Career Planning
         b. Considers the justification (or lack) of values
                                                                                                        1.   Determine your strengths, aptitudes and abilities
Ethical Egoism – teaches that people are fundamentally solitary creatures, each                         2.   Create a career mission statement
pursuing their own best interest.                                                                       3.   Research employment opportunities related to the first two
                                                                                                        4.   Build your resume
Utilitarianism – teaches that the most ethical action is the one that promotes the greatest             5.   Practice interview skills
good for the greatest number
                                                                                                               CHAPTER 17: AUDITING AND EVALUATING THE AIS
Deontology – “rights and duties” school of ethical thought that believes individuals have
rights and that ethical principles are developed through reasoning;                           Auditing – the area of accounting associated with AIS evaluation.
    -    Ethical decisions are based on a universal moral code, not on the outcome of a
                                                                                              TYPES OF AUDIT (7)
         decision
Virtue ethics – ethical behavior is a natural product of being fundamentally ethical and          1) FINANCIAL AUDIT – involves the examination of a company’s accounting
virtuous; being a good person is more important                                                      information system and financial statements.
    o    Financial Audit Reports: (4)                                                      FORMAT
          Unmodified Report – “clean report” says that the company’s statements               INTRODUCTION - explains when the standard applies in audit engagement
              are prepared in accordance with GAAP.                                            OBJECTIVE – discusses the overall goal of the standard; what is being tried to
          Qualified Report – one or more items don’t conform with GAAP – but does               achieve
              not compromise the overall fairness                                              DEFINITIONS – identifies key terms and their meaning
          Adverse Report – statements are not prepared in accordance with GAAP                REQUIREMENTS – explain what the auditor needs to do to fulfill that standard
          Disclaimer – denotes that the auditors could not tell if they were in               GUIDANCE AND EXPLANATORY MATERIAL - gives additional information
              accordance with GAAP                                                               about the requirements and related matters
    2)   OPERATIONAL AUDIT – auditors examine a company’s rules and procedures
         for conducting business. Internal auditors are often involved.                    GENERALLY ACCEPTED AUDITING STANDARDS
    3)   SYSTEMS AUDIT – determines whether the various forms of information
         technology in an AIS are producing expected results. It also examines the issue        GENERAL STANDARDS – focus on
         of systems security very closely.                                                       the auditor’s background and
    4)   COMPLIANCE AUDIT – Governmental and NPOs are subject to this, virtually                 approach to the audit.
         devoid of judgment                                                                     Training – well-trained in auditing
    5)   MANAGEMENT AUDIT – may involve the greatest degree of judgment.                        Independence – auditor’s mental
         Determines the degree to which the assumptions underlying decisions are valid           attitude
         or how these management decisions are supported.                                       Professional care – properly
    6)   INVESTIGATIVE AUDIT – “fraud audit”; associated with forensic accounting. It            planned
         may be triggered by observation of unusual behavior or discrepancies in the
         AIS.                                                                                   FIELD WORK – set out important ideas for conducting the audit
               Review of documents                                                             Supervision – all staff members must be adequately supervised; as experience
               Interview of neutral third-party witnesses                                       increases, need for supervision decreases
               Interview of corroborative witness                                              Internal control – assess an organization’s risk exposures and determine if IC
               Interview of coconspirators                                                      ameliorates
               Interview of target                                                             Evidence – importance of having an objective, reasonable basis for expressing
    7)   INTERNATIONAL AUDIT – it requires the auditor to understand the accounting              opinion
         rules in another country but also necessitates an intimate understanding of
         national culture, laws, regulation and other nonaccounting issues.                        REPORTING – speak to the ultimate opinion the auditors express
                                                                                                   GAAP – opinion must state if be in accordance
AUDIT CLARITY PROJECT (Skinner, 2012)                                                              Consistency – report inconsistencies between current and prior application
Two main objectives:                                                                               Disclosure – state if it is appropriate
   i.  To make auditing standards easier                                                           Opinion – explain the reasons for opinion
       to read, understand and apply
  ii.  To converge the US Auditing
       Standards with IAS
GENERIC AUDIT STEPS
   I. Assessment of management’s integrity
  II. Evaluate management’s credentials.
 III. Review the internal control system.
 IV.  Perform compliance testing
  V.  Issue the audit report.
ASSERTIONS BY MANAGEMENT (5)
    Existence or occurrence – Did the transaction really happen? Do the assets
      exist?
    Rights and obligations – Does the company really own the assets?
    Valuation and allocation – are the accounts valued correctly?
    Completeness – are the financial statements complete?
    Presentation and disclosure – were all the transactions recorded in the
      correct accounts? Are the disclosures understandable?
SARBANES-OXLEY ACT
    Section 302. Evaluation of internal controls in an audit. Responsibility of CEO
      and CFO.
    Section 401. Disclosures in Periodic Reports. Financial statements must be
      accurate and presented correctly.
    Section 404. Management Assessment of Internal Controls, reemphasizes the
      importance of sound internal control in AIS integrity and reliability.
    Section 409. Real-time reporting is the primary issue of this section.
      Disclosures should be made in nontechnical, easy-to-understand terms
    Section 802. Spells out the penalties for noncompliance with the Act.
                                                                                          “
                                                                                           D
                                                                                           i
                                                                                           s
                                                                                           7
                                                                                           7
                                                                                           7
                                                                                           7
                                                                                           7
                                                                                           7
                                                                                           7