SM2_PL_AIS
SM2_PL_AIS
DECISION MAKING
Identify the problem
Collect and interpret information
Evaluate ways to solve the problem
Select a solution methodology
Implement the solution.
SUPPORT ACTIVITIES:
1. Firm infrastructure is the accounting,
finance, legal, and general administration
activi ties that allow an organization to
function.
ACCOUNTING INFORMATION SYSTEM BSAC 3rd yr Cutiee
AIS | Prelims | Semester 2 | Sy. 2024 – 2025
TOPIC 2: Overview of Transaction SOURCE DATA AUTOMATION: devices capture
Processing and ERP Systems transaction data in machine-readable form at the
time and place of their origin.
Data Processing Cycle - Examples include ATMs used by banks,
point-of-sale (POS) scanners used in retail
stores, and bar code scanners used in
warehouses.
Data Output
Soft copy: Displayed on a screen
Hard copy: Printed on paper
ADVANTAGES OF ERPS:
Integration of an organization’s data and
financial information
Data is captured once
Greater management visibility, increased
monitoring
Better access controls
Standardizes business operating
procedures
Improved customer service
More efficient manufacturing
DISADVANTAGES OF ERPS:
Cost
Time-consuming to implement
Changes to an organization’s existing
business processes can be disruptive
Complex
Resistance to change
ACCOUNTING INFORMATION SYSTEM BSAC 3rd yr Cutiee
AIS | Prelims | Semester 2 | Sy. 2024 – 2025
TOPIC 3: Systems Documentation processing, and output in an
Techniques information system
DOCUMENTATION c. Program flowchart, which shows
Set of documents and models the sequence of logical operations
Narratives, data flow models, a computer per forms as it
flowcharts executes a program.
Narrative Description: Written, step-by- 3. Business Process diagrams, which are
step explanation of system components graphical descriptions of the business
and how they interact processes used by a company
Describe who, what, why, when, and
where of systems: Data Flow Diagrams
Input, process, storage, output, - describes the flow of data within an
and controls organization.
SAS 94 requires independent auditors to - It uses the first four symbols to represent
understand all internal control procedures. four basic elements: data sources and
Documentation assists in auditor destinations, data flows, transformation
understanding and documentation processes, and data stores.
of their understanding
Sarbanes-Oxley states that management:
Is responsible for internal control
system
Is responsible for assessing the
effectiveness of the IC System
Both management and external
auditors need to document and
test IC System
The Sarbaes-Oxley Act SOX of 2002
requires an internal control report in public
company annual reports that ENTITY:
states that management is Represents a source of data or input into
responsible for establishing and the system
maintaining an adequate internal or
control structure and Represents a destination of data or output
assesses the effectiveness of the from the system
company’s internal control DATA FLOWS:
Movement of data among:
Documentation Tools Entities (sources or destinations)
1. Data flow diagram (DFD), a graphical Processes
description of data sources, data flows, Data stores
transfor mation processes, data storage, Label should describe the information
and data destinations moving
2. Flowchart, which is a graphical PROCESS: Represents the transformation of
description of a system. There are several data
types of flow charts, including: DATA STORE: Represents data at rest
a. Document flowchart, which shows CONTEXT DIAGRAM: highest-level DFD; a
the flow of documents and summary-level view of a system, showing the
information between departments data processing system, its input(s) and output(s),
or areas of responsibility and their sources and destinations
b. System flowchart, which shows the
relationship among the input, DATA FLOW DIAGRAM LEVELS
Context
ACCOUNTING INFORMATION SYSTEM BSAC 3rd yr Cutiee
AIS | Prelims | Semester 2 | Sy. 2024 – 2025
Highest level (most general) 2. Processing symbols show data
Purpose: show inputs and outputs processing, either electronically or by
into system hand.
Characteristics: one process 3. Storage symbols show where data is
symbol only, no data stores stored.
Level-0 4. Flow and miscellaneous symbols
Purpose: show all major indicate the flow of data, where flowcharts
activity steps of a system begin or end, where decisions are made,
Characteristics: processes and how to add explanatory notes to
are labeled 1.0, 2.0, and so flowcharts.
on
Five Data Processing Activities
1. Updating the employee/payroll master file
(first paragraph).
2. Handling employee compensation
(second, fifth, and sixth paragraphs). Later
in this chapter, you will see a breakdown
of this activity into smaller parts in a lower-
level DFD.
3. Generating management reports (third
paragraph).
4. Paying taxes (fourth paragraph).
5. Posting entries to the general ledger (last
paragraph).
Flowcharts
Use symbols to logically depict transaction
processing and the flow of data through a
system.
Using a pictorial representation is easier to
understand and explain versus a detailed
narrative.
Types of Flowcharts
1. Document
a. Illustrates the flow of documents
through an organization
b. Useful for analyzing internal control
procedures
2. System
a. Logical representation of system
inputs, processes, and outputs
b. Useful in systems analysis and
design
3. Program: Represent the logical sequence
of program logic
Podslurping - Using a small de vice with storage Web cramming - offering a free website for a
capacity (iPod, flash drive) to download unau month, develop ing a worthless website, and
thorized data from a computer. charging the phone bill of the people who accept
the offer for months, whether they want to
Salami technique - Stealing tiny slices of money continue using the website or not.
from many dif ferent accounts
Software piracy - The unauthorized copying or
Round-down fraud - Instructing the computer to distribution of copyrighted software.
round down all interest calculations to two
decimal places. The fraction of a cent rounded Social Engineering
down on each calculation is put into the pro - techniques or psychological tricks used to
grammer’s account. get people to comply with the perpetrator’s
wishes in order to gain physical or logical
Economic espionage - Theft of information, access to a building, com puter, server, or
trade secrets, and intellectual property network—usually to get the information
needed to access a system and obtain
Cyber-extortion - Threatening to harm a confidential data.
company or a person if a specified amount of - Seven human traits to reveal information:
money is not paid. o Compassion
o Greed
Cyber-bullying - Using computer technology to o Sex appeal
support delib erate, repeated, and hostile o Sloth
behavior that torments, threat ens, harasses, o Trust
humiliates, em barrasses, or otherwise harms o Urgency
another person.
o Vanity
- Minimize social engineering:
Sexting - Exchanging sexually explicit text
o Never let people follow you into a
messages and revealing pictures with other
restricted building.
people, usually by means of a phone.
o Never log in for someone else on a
computer, especially if you have
Internet terrorism - Using the Internet to disrupt
administrative access.
electronic commerce and harm computers and
o Never give sensitive information
communications.
over the phone or through e-mail.
Internet misinformation - Using the Internet to o Never share passwords or user
spread false or misleading information. IDs.
o Be cautious of anyone you do not
E-mail threats - Threats sent to victims by e-mail. know who is trying to gain access
The threats usually require some follow-up action, through you.
often at great expense to the victim.
ACCOUNTING INFORMATION SYSTEM BSAC 3rd yr Cutiee
AIS | Prelims | Semester 2 | Sy. 2024 – 2025
Identity theft - Assuming someone’s identity, Tabnapping - Secretly changing an already open
usually for economic gain, by illegally ob taining browser tab in order to capture user IDs and
confidential information such as a Social Security passwords when the victim logs back into the site.
num ber or a bank account or credit card number.
Scavenging/dumpster diving - Searching
Pretexting - Using an invented scenario (the documents and records to gain access to con
pretext) that cre ates legitimacy in the target’s fidential information. Scavenging methods include
mind in order to increase the likelihood that a searching garbage cans, communal trash bins,
victim will divulge information or do something and city dumps.
Posing - Creating a seemingly legitimate Shoulder surfing - When perpetrators look over
business, collecting personal information while a person’s shoulders in a public place to get
mak ing a sale, and never delivering the product. information such as ATm PIn numbers or user IDs
and passwords
Phishing - Sending an elec tronic message
pretending to be a legitimate company, usually a Lebanese looping - Inserting a sleeve into an
financial institution, and requesting information or ATm that prevents it from ejecting the card. The
verification of information and often warning of a perpetrator pretends to help the victim, tricking
consequence if it is not provided. the person into entering the PIn again.
- once the victim gives up, the thief removes
Vishing - Voice phishing; it is like phishing except the card and uses it and the PIn to
that the victim enters confidential data by phone. withdraw money.
Pharming - redirecting website traffic to a Chipping - Planting a small chip that records
spoofed website. transaction data in a legitimate credit card reader.
- The chip is later removed or electronically
Evil twin - A wireless network with the same accessed to re trieve the data recorded on
name (Service Set Identifier) as a legitimate it.
wireless access point. Users are connected to the
twin because it has a stronger wireless signal or Eavesdropping - Listening to private
the twin disrupts or disables the legitimate access communications or tap ping into data
point. transmissions intended for someone else. one
way to intercept signals is by setting up a wiretap
Typosquatting/UrL hijacking - Setting up
similarly named websites so that users making Malware
typographical errors when entering a website - Any software that is used to do harm
name are sent to an invalid site
Spyware: Software that secretly monitors
QR Barcode replaements:Fraudsters cover valid computer usage, collects personal information
quick response codes with stickers containing a about users, and sends it to someone else, often
replacement qr code to fool people into going to without the computer user’s permission
an unintended site that infects their phones with
malware. Adware: Spyware that causes banner ads to pop
up on a monitor, collects information about the
user’s web-surfing and spending habits, and for
ACCOUNTING INFORMATION SYSTEM BSAC 3rd yr Cutiee
AIS | Prelims | Semester 2 | Sy. 2024 – 2025
wards it to the adware creator, often an unlocked and the confidential information is reas
advertising or media organization. sembled. –
- Adware usually comes bundled with - The host file can still be heard or viewed
freeware and shareware downloaded from because humans are not sensitive enough
the Internet to pick up the slight decrease in image or
sound quality
Torpedo software - Software that destroys
competing mal ware. This sometimes results in Rootkit - A means of concealing system
“malware warfare” between competing malware components and mal ware from the operating
developers. system and other programs; can also modify the
operating system.
Scareware - malicious software of no benefit that
is sold using scare tactics Superzapping - The unauthor ized use of a
- The most common scare tactic is a dire special system program to bypass regular system
warning that a computer is infected with a controls and perform illegal acts.
virus, spyware, or some other catastrophic - The superzap utility was originally written
prob lem. to handle emergencies, such as restoring
a system that had crashed
Ransomware - Software that encrypts programs
and data until a ransom is paid to remove it. Virus - A segment of executable code that
attaches itself to a file, program, or some other
Keylogger - Software that records computer executable system component.
activity, such as a user’s keystrokes, e-mails sent - When the hidden program is triggered, it
and received, websites visited, and chat session makes unauthorized alterations to the way
participation. a system operates
Trojan horse - A set of unau thorized computer Worm - Similar to a virus, except that it is a
instructions in an authorized and otherwise program rather than a code segment hidden in a
properly functioning program host program.
- A worm also copies itself automatically
Time bomb/logic bomb - A program that lies idle and actively transmits itself directly to
until some specified circumstance or a particular other systems
time triggers it. once triggered, the program
sabotages the system by de troying programs or Bluesnarfing - Stealing (snarfing) contact lists,
data. images, and other data using flaws in bluetooth
applications.
Trap door/back door - A set of computer
instructions that allows a user to bypass the sys Bluebugging - Taking control of someone else’s
tem’s normal controls. phone to make or listen to calls, send or read text
messages, connect to the Internet, forward the
Packet sniffers - Programs that capture data victim’s calls, and call numbers that charge fees
from information packets as they travel over the
Internet or company networks.
- Captured data is sifted to find confidential
or proprietary information
Objective Setting
STRATEGIC – high-level goals aligned with
corporate mission
OPERATIONAL – effectiveness and efficiency of
operations
REPORTING – complete and reliable, improve
decision making
COMPLIANCE – laws and regulations are
followed
Control Activities
Event Identification - policies and procedures to provide
- an incident or occurrence emanating from
reasonable assurance that control
internal or external sources that affects
objectives are met
implementation of strategy or achievement
o proper authorization of
of objectives
transactions and activities
o positive or negative impacts
signature or code on
o events may trigger other events
document to signal
o all events should be anticipated authority over a process
o segregation of duties
Risk Assesment o project development and
IDENTIFY RISK – identify likelihood of risk
acquisition controls
- identify positive or negative impact
o change management controls
o design and use of documents and
TYPES OF RISK
records
INHERENT – risks that exists before any plans
o safeguarding assets, records, and
are made to control it
RESIDUAL – remining risk after controls are in data
place to reduce it o independent checks on
performance
Risk Response Segragation of Accounting Duties
REDUCE – implement effectove internal control - no one employee should be given too
ACCEPT – do nothing, accept likelihood of risk much responsibility
SHARE – buy insurance, outsource, hedge - Separate:
AVOID – do not engage in activity that produce o Authorization – approving
risk transactions and decisions
o Recording
Preparing source docments
Entering data into AIS
ACCOUNTING INFORMATION SYSTEM BSAC 3rd yr Cutiee
AIS | Prelims | Semester 2 | Sy. 2024 – 2025
Maintaining accounting - Employ a security officer and compliance
records officer
o Custory - Engage forensic specialists
Handling cash, inventory, - Install fraud detection software
fixed assets - Implement a fraud hotline
Receiving incoming checks
Waiting checks