+ All Categories
Home > Economy & Finance > Accounting information system introduction

Accounting information system introduction

Date post: 13-Jun-2015
Category:
Upload: sellyhood
View: 223 times
Download: 6 times
Share this document with a friend
Description:
Accounting information system introduction
Popular Tags:
21
© 2006 Prentice Hall Business Publishing Accounting Information Systems, 10/e Romney/Steinbart 1 of 138 INTRODUCTION Skip pp. 278 – 282. Learn pp. 282 – 291. Skip pp. 292 – 298. SECURITY CONFIDENTIALITY PRIVACY PROCESSING INTEGRITY AVAILABILITY SYSTEMS RELIABILITY
Transcript
Page 1: Accounting information system introduction

© 2006 Prentice Hall Business Publishing Accounting Information Systems, 10/e Romney/Steinbart 1 of 138

INTRODUCTION

• Skip pp. 278 – 282.

• Learn pp. 282 – 291.

• Skip pp. 292 – 298.

SECURITY

CO

NF

IDE

NT

IAL

ITY

PR

IVA

CY

PR

OC

ES

SIN

G I

NT

EG

RIT

Y

AV

AIL

AB

ILIT

Y

SYSTEMSRELIABILITY

Page 2: Accounting information system introduction

© 2006 Prentice Hall Business Publishing Accounting Information Systems, 10/e Romney/Steinbart 2 of 138

PROCESSING INTEGRITY

• Five categories of integrity controls are designed to meet the preceding objectives:– Source data controls– Data entry controls– Processing controls– Data transmission controls– Output controls

Page 3: Accounting information system introduction

© 2006 Prentice Hall Business Publishing Accounting Information Systems, 10/e Romney/Steinbart 3 of 138

PROCESSING INTEGRITY

• Five categories of integrity controls are designed to meet the preceding objectives:– Source data controls– Data entry controls– Processing controls– Data transmission controls– Output controls

Page 4: Accounting information system introduction

© 2006 Prentice Hall Business Publishing Accounting Information Systems, 10/e Romney/Steinbart 4 of 138

PROCESSING INTEGRITY

• The following source data controls regulate integrity of input:– Forms design– Pre-numbered forms sequence test– Turnaround documents– Cancellation and storage of documents– Authorization and segregation of duties– Visual scanning– Check digit verification– RFID security

Page 5: Accounting information system introduction

© 2006 Prentice Hall Business Publishing Accounting Information Systems, 10/e Romney/Steinbart 5 of 138

PROCESSING INTEGRITY

• Five categories of integrity controls are designed to meet the preceding objectives:– Source data controls– Data entry controls– Processing controls– Data transmission controls– Output controls

Page 6: Accounting information system introduction

© 2006 Prentice Hall Business Publishing Accounting Information Systems, 10/e Romney/Steinbart 6 of 138

PROCESSING INTEGRITY

• Once data is collected, data entry control procedures are needed to ensure that it’s entered correctly. Common tests to validate input include:– Field check– Sign check– Limit check– Range check– Size (or capacity) check– Completeness check– Validity check– Reasonableness check

Page 7: Accounting information system introduction

© 2006 Prentice Hall Business Publishing Accounting Information Systems, 10/e Romney/Steinbart 7 of 138

• Four Types of Questions• The instructor will …..

– 1. State data input test (field check)• List 4 possible definitions

– 2. State data input test (field check)• List 4 possible examples

– Which one is an example.– Which one is not an example.

– 3. State definition of data input test • List 4 possible terms

– 4. State example of data input test• List 4 possible terms

• In all types of question…..– 1 is correct– 1 is “way off” (maybe ‘sounds like could be term’)

Page 8: Accounting information system introduction

© 2006 Prentice Hall Business Publishing Accounting Information Systems, 10/e Romney/Steinbart 8 of 138

PROCESSING INTEGRITY

• Additional Batch Processing Data Entry Controls– In addition to the preceding controls, when using

batch processing, the following data entry controls should be incorporated.

• Sequence check• Error log• Batch totals

– Financial Total– Hash Total– Record Count

Page 9: Accounting information system introduction

© 2006 Prentice Hall Business Publishing Accounting Information Systems, 10/e Romney/Steinbart 9 of 138

PROCESSING INTEGRITY

• Additional online data entry controls– Online processing data entry controls include:

• Transaction logs– Includes detailed records of all transaction data.– Identifies the sequence in which transaction were

entered– Can be used to reconstruct damaged online files.

Page 10: Accounting information system introduction

© 2006 Prentice Hall Business Publishing Accounting Information Systems, 10/e Romney/Steinbart 10 of 138

PROCESSING INTEGRITY

• Five categories of integrity controls are designed to meet the preceding objectives:– Source data controls– Data entry controls– Processing controls– Data transmission controls– Output controls

Page 11: Accounting information system introduction

© 2006 Prentice Hall Business Publishing Accounting Information Systems, 10/e Romney/Steinbart 11 of 138

PROCESSING INTEGRITY

• Processing Controls– Processing controls to ensure that data is processed

correctly include:• Data matching• File labels

– Header Record– Trailer Record

• Recalculation of batch totals• Cross-footing balance test• Write-protection mechanisms• Database processing integrity procedures

– Concurrent Update Controls

• Data conversion controls

Page 12: Accounting information system introduction

© 2006 Prentice Hall Business Publishing Accounting Information Systems, 10/e Romney/Steinbart 12 of 138

PROCESSING INTEGRITY

• Five categories of integrity controls are designed to meet the preceding objectives:– Source data controls– Data entry controls– Processing controls– Data transmission controls– Output controls

Page 13: Accounting information system introduction

© 2006 Prentice Hall Business Publishing Accounting Information Systems, 10/e Romney/Steinbart 13 of 138

PROCESSING INTEGRITY

• Data Transmission Controls– When the receiving unit detects a data

transmission error, it asks the sending unit to re-send. Usually done automatically.

– Sometimes, the system may not be able to accomplish automatic resubmission and will ask the sender to re-transmit the data.

Page 14: Accounting information system introduction

© 2006 Prentice Hall Business Publishing Accounting Information Systems, 10/e Romney/Steinbart 14 of 138

PROCESSING INTEGRITY

• Message Acknowledgment Techniques– A number of message acknowledgment

techniques can be used to let the sender of an electronic message know that a message was received:

• Echo check• Trailer record

Page 15: Accounting information system introduction

© 2006 Prentice Hall Business Publishing Accounting Information Systems, 10/e Romney/Steinbart 15 of 138

PROCESSING INTEGRITY

• Five categories of integrity controls are designed to meet the preceding objectives:– Source data controls– Data entry controls– Processing controls– Data transmission controls– Output controls

Page 16: Accounting information system introduction

© 2006 Prentice Hall Business Publishing Accounting Information Systems, 10/e Romney/Steinbart 16 of 138

PROCESSING INTEGRITY

• Output Controls– Careful checking of system output provides

additional control over processing integrity.– Output controls include:

• User review of output• Reconciliation procedures• External data reconciliation

Page 17: Accounting information system introduction

© 2006 Prentice Hall Business Publishing Accounting Information Systems, 10/e Romney/Steinbart 17 of 138

Example: Credit Sales Processing

– Shows how Processing Integrity Controls are implemented.

– When Studying: Try to tie examples to previous terms & definitions.

However, some examples do not tie back.

– 7 Steps in Batch Processing (pp. 288 – 289)

– 3 Major Steps in Online Processing (pp. 289 – 291)

• Online Data Entry• Online Processing• Online Output

Page 18: Accounting information system introduction

© 2006 Prentice Hall Business Publishing Accounting Information Systems, 10/e Romney/Steinbart 18 of 138

• In Access Assignment 1, we specified that the data field “RRNumber” in the Receiving Report table should be strictly autonumber. This is an example of:

a) Limit Check

b) Size Check

c) Field Check

d) Completeness Check

Page 19: Accounting information system introduction

© 2006 Prentice Hall Business Publishing Accounting Information Systems, 10/e Romney/Steinbart 19 of 138

• The data entry control “validity check” would detect discrepancies between the primary key fields and prevent the enforcement of referential integrity. Which of the following is a best example:

a) A zip code of BY23A

b) A product ID such as “BOX 16”

c) A vendor ID, such as “LASRON” that is not listed in the Vendor table

d) An employee without a pay-rate

Page 20: Accounting information system introduction

© 2006 Prentice Hall Business Publishing Accounting Information Systems, 10/e Romney/Steinbart 20 of 138

• Which of the following processing control most likely contains the “file name” for the file being processed?

a) Header record

b) Each individual record in the file

c) Batch total

d) Trailer record.

Page 21: Accounting information system introduction

© 2006 Prentice Hall Business Publishing Accounting Information Systems, 10/e Romney/Steinbart 21 of 138

• Summing up all employee ID numbers for a batch of Receiving activities is an example of…

a) Financial total

b) Query total

c) Check digit verification

d) Hash total


Recommended