AISPRELIM
AISPRELIM
INFORMATION
SYSTEM
PRELIM
Accounting Information
CHAPTER 1
Systems:
An Overview
INTRODUCT ION
• OBJECTIVES:
• Recognize the primary information flows within the business environment.
• Understand the difference between accounting information systems and
management information systems.
• Understand the difference between financial transactions and nonfinancial
transactions.
• Know the principal features of the general model for information systems.
• Understand the organizational structure and functional areas of a business.
• Be able to distinguish between external auditing, internal auditing, and advisory
services as they relate to accounting information systems.
SYSTEMS, DATA, AND INFORMAT ION
•A system is:
•A set of interrelated components
•That interact
•To achieve a goal
SYSTEMS, DATA,
AND INFORMATION
•The systems concept encourages integration (i.e., minimizing the duplication of recording, storing,
reporting, and processing).
•Data are facts that are collected, recorded, stored, and processed by an information system.
•Organizations collect data about:
• Events that occur
• Resources that are affected by those events
• Agents who participate in the events
Imagine you're using an online shopping platform like
Lazada or Shopee. The website collects and processes a
lot of data in order to offer a seamless shopping
experience.
Data Collected:
• User Information – When you sign up or log in, the
website collects your personal details like name,
address, payment information, and browsing history.
• Product Information – The website keeps records of
each product, including descriptions, prices, images,
and stock availability.
• Search Queries – The system tracks what items you
search for, your preferences, and which products you
click on.
• Transaction Data – When you purchase an item, data
about your transaction (payment details, items
purchased, time of purchase) is collected.
Data Processing:
• Personalized Recommendations – The system analyzes
your previous searches and purchases to recommend
other products you might like, based on patterns
identified in the data.
• Inventory Management – Based on user activity and
transactions, the website updates the stock availability,
ensuring that only available products are shown.
• Targeted Ads – The platform may use your browsing
history and behavior to show you personalized ads for
products you're likely to buy.
SYSTEMS, DATA, AND INFORMAT ION
Benefits of information
- Cost of producing information
Value of information
Benefits of information may include:
• Reduction of uncertainty
• Improved decisions
• Improved ability to plan and schedule activities
SYSTEMS, DATA, AND INFORMAT ION
Benefits of information
- Cost of producing information
Value of information
Costs may include time and resources spent:
• Collecting data
• Processing data
• Storing data
• Distributing information to users
SYSTEMS, DATA, AND INFORMAT ION
Benefits of information
- Cost of producing information
Value of information
Costs and benefits of information are often difficult
to quantify, but you need to try when you’re making
decisions about whether to provide information.
SYSTEMS, DATA, AND INFORMAT ION
• Understandability
• Verifiability
SYSTEMS, DATA, AND INFORMAT ION
• Accessibility
SYSTEMS, DATA, AND INFORMAT ION
AREA of EFFECT
company’s financial position or performance long-term impacts on business performance
External
AIS Parties
• The AIS interacts with external parties, such as customers, vendors, creditors, and governmental agencies.
INTERACTION WITH EXTERNAL AND INTERNAL
PART IES
Internal External
Parties AIS Parties
Internal External
Parties AIS Parties
• The interaction is typically two way, in that the AIS sends information to and
receives information from these parties.
TRANSACTION CYCLES
•A transaction is:
• An agreement between two entities to exchange goods or services; OR
• Any other event that can be measured in economic terms by an organization.
•EXAMPLES:
• Sell goods to customers
• Depreciate equipment
TRANSACTION CYCLES
Give Get
Goods Cash
REVENUE and RECEIPT CYCLE
ACCOUNTS • Sales, S. Returns and Allowances, S. Discounts
AFFECTED • Receivables, AFDA, BD Expense
• Cash
DEPARTMENTS REVENUE DISBURSEMENT
INVOLVED • Sales/ Customer order • Mail room or receptionist
• Credit • Treasury
• Inventory Control/ Warehouse • Accounting (receivable and general)
• Shipping
• Billing
• Accounting (inventory, receivable and general)
FORMS OR DOCUMENTS RECEIVED, INITIATED AND PROCESSED
FORM DESCRIPTION INITIATED BY: DISTRIBUTED TO:
SALES ORDER DETAILS OF GOODS ORDERED (QUANTITY, PRICES AND PAYMENT SALES DEPARTMENT • CUSTOMERS
(ORDER SLIP; TERMS) • CREDIT
CUSTOMER ORDER) • SHIPPING
• BILLING
SHIPPING DOCUMENT DESCRIBES THE GOODS TO BE SHIPPED AND SERVED AS A SHIPPING DEPARTMENT • CUSTOMERS
(BILL OF LADING; CONTRACT BETWEEN THE ENTITY AND CARRIER • CARRIER
DELIVERY RECEIPT) • BILLING
SALES INVOICE DESCRIBES THE GOODS SOLD, AMOUNT DUE AND THE TERMS BILLING DEPARTMENT • CUSTOMERS
(BILLING STATEMENT; OF PAYMENT • ACCOUNTING
STATEMENT OF ACCOUNT)
REMITTANCE ADVICE INTENDED TO FACILITATE THE ACCOUNTING FOR CASH BILLING DEPARTMENT • CUSTOMERS
COLLECTION
DAILY SUMMARIES SUMMARIZES TRANSACTIONS RECORDED DURING THE DAY BY RECEIVABLE (FOR SALES) • GENERAL ACCOUNTING
THE DIFFERENT DEPARTMENT TREASURY (COLLECTION) • TREASURY AND RECEIVABLE
MAIL ROOM (MAIL RECEIVED)
EXPENDITURE AND DISBURSEMENTS CYCLE
VENDOR’S INVOICE DESCRIBES THE GOODS SOLD, AMOUNT DUE AND THE TERMS VENDOR • ACCOUNTS PAYABLE
OF PAYMENT
DAILY SUMMARIES SUMMARIZES TRANSACTIONS RECORDED DURING THE DAY BY ACCOUNTS PAYABLE (FOR PURCHASES) • GENERAL ACCOUNTING
THE DIFFERENT DEPARTMENT TREASURY (PAYMENT)
PRODUCTION OR CONVERSION CYCLE
Give Get
Cash Labor
HUMAN RESOURCES AND PAYROLL CYCLE
ACCOUNTS • Salaries and Wages Expense and Payable
AFFECTED • Premiums Expense and Payable
• Withholding Taxes Payable
• Inventories
• Cash
DEPARTMENTS EXPENDITURE DISBURSEMENT AND DISTRIBUTION
INVOLVED • User • Treasury
• HR/ Personnel • Accounting (general)
• Payroll
• Accounting (inventory and general)
FORMS OR DOCUMENTS RECEIVED, INITIATED AND PROCESSED
FORM DESCRIPTION INITIATED BY: DISTRIBUTED TO:
HR RECORDS CONTAINS ALL INFORMATION RELATED TO THE EMPLOYEES AS WELL AS THEIR SALARY HR DEPARTMENT • PAYROLL (LIMITED TO
(PERSONNEL RECORDS 201 RATES, DEDUCTIONS AND OTHER PAYROLL RELATED INFORMATION PAYROLL
FILE) INFORMATION ONLY)
DOCUMENTS ALL ACTIONS TAKEN BY THE EMPLOYEES OR MANAGEMENT ON BEHALF OF
THE EMPLOYEE
DAILY TIME RECORD NUMBER OF HOURS WORKED USER DEPARTMENT • PAYROLL
PAYROLL REGISTER SHOWS ALL RELATED PAYROLL INFORMATION (GROSS, DEDUCTIONS, AND NET PAY) PAYROLL • TREASURY
• GENERAL ACCOUNTING
LABOR COST SUMMARY SHOWS ALL PAYROLL INFORMATION WHICH IS CAPITALIZABLE OR CAN BE ATTRIBUTED PAYROLL • INVENTORY
TO A PARTICULAR JOB OR CUSTOMER ORDER ACCOUNTING
EMPLOYEE EARNING’S RECORD CUMULATIVE, YEAR-TO-DATE SUMMARY OF EARNINGS AND DEDUCTIONS OF EVERY VENDOR • ACCOUNTS PAYABLE
EMPLOYEE
DAILY SUMMARIES SUMMARIZES TRANSACTIONS RECORDED DURING THE DAY BY THE DIFFERENT PAYROLL (LIABILITY RECOGNITION) • GENERAL ACCOUNTING
DEPARTMENT TREASURY (PAYMENT)
INVENTORY (CAPITALIZABLE)
FINANCING AND INVEST ING CYCLE
•The financing cycle involves interactions with investors and creditors.
•You raise capital (through stock or debt), repay the capital, and pay a return
on it (interest or dividends).
Give Get
Cash cash
TRANSACTION CYCLES
General Ledger
and Reporting • The Revenue Cycle
System • Gets finished goods from the production
cycle.
• Provides funds to the financing cycle.
• Provides data to the general ledger and
reporting system.
Human Res./ Financing
Payroll Cycle Cycle
Raw
Mats.
Revenue Expenditure Production
Cycle Cycle Cycle
Data
General Ledger
and Reporting • The Expenditure Cycle
System • Gets funds from the financing cycle.
• Provides raw materials to the production
cycle.
• Provides data to the general ledger and
reporting system.
Human Res./ Financing
Payroll Cycle Cycle
Finished Goods
Raw
Mats.
Revenue Expenditure Production
Cycle Cycle Cycle
General Ledger
and Reporting • The Production Cycle:
System • Gets raw materials from the expenditure
cycle.
• Gets labor from the HR/payroll cycle.
• Provides finished goods to the revenue cycle.
• Provides data to the general ledger and
Human Res./ reporting system.
Financing
Payroll Cycle Cycle
Revenue Expenditure Production
Cycle Cycle Cycle
General Ledger
and Reporting • The HR/Payroll Cycle:
System • Gets funds from the financing cycle
• Provides labor to the production cycle.
• Provides data to the general ledger and
reporting system.
Human Res./ Funds Financing
Payroll Cycle Cycle
Revenue Expenditure Production
Cycle Cycle Cycle
General Ledger
and Reporting • The Financing Cycle:
System • Gets funds from the revenue cycle.
• Provides funds to the expenditure and
HR/payroll cycles.
• Provides data to the general ledger and
reporting system.
Human Res./ Funds Financing
Payroll Cycle Cycle
Revenue Expenditure Production
Cycle Cycle Cycle
Data
General Ledger Information for
Internal & External Users
and Reporting
System
Data
• Gets data from all of the cycles.
• Provides information for internal and external
Human Res./ Financing users.
Payroll Cycle Cycle
TRANSACT ION PROCESSING:
THE DATA PROCESSING CYCLE
• A number of actions can be taken to improve the accuracy and efficiency of data input:
• Turnaround documents.
• EXAMPLE: The stub on your telephone bill that you tear off and
return with your check when you pay the bill.
• The customer account number is coded on the document, usually in
machine-readable form, which reduces the probability of human
error in applying the check to the correct account.
DATA INPUT
• A number of actions can be taken to improve the accuracy and efficiency of data input:
• Turnaround documents.
• Source data automation.
• A number of actions can be taken to improve the accuracy and efficiency of data input:
• Turnaround documents.
• Source data automation.
• Well-designed source documents and data entry screens.
DATA INPUT
• A number of actions can be taken to improve the accuracy and efficiency of data
input:
• Turnaround documents.
• Source data automation.
• Well-designed source documents and data entry screens.
• Using pre-numbered documents or having the system automatically assign sequential
numbers to transactions.
DATA INPUT
• A number of actions can be taken to improve the accuracy and efficiency of data input:
• Turnaround documents.
• Source data automation.
• Well-designed source documents and data entry screens.
• Using pre-numbered documents or having the system automatically assign sequential numbers to transactions.
• Verify transactions.
• EXAMPLE: Check for inventory availability before completing
an online sales transaction.
DATA STORAGE
• Ledger
A ledger is a file used to store cumulative
information about resources and agents. We
typically use the word ledger to describe the set
of t-accounts. The t-account is where we keep
track of the beginning balance, increases,
decreases, and ending balance for each asset,
liability, owners’ equity, revenue, expense, gain,
loss, and dividend account.
DATA STORAGE
• General Ledger
• Following is an example of a ledger account for accounts receivable:
GENERAL LEDGER
• On December 1, a sale is made to Lee Co. for P800. Lee Co. was sent Invoice No. 201.
• Entity
• Attribute
• Record
• Data Value
• Field
• File
• Master File
• Transaction File
• Database
COMPUTER-BASED STORAGE CONCEPTS
Workload
File
TRANSACT ION PROCESSING:
THE DATA PROCESSING CYCLE
• The data processing cycle consists of four steps:
• Data input
• Data storage
• Data processing
• Information output
DATA PROCESSING
•Once data about a business activity has been collected and entered into a system, it
must be processed. There are four different types of file processing:
•Updating data to record the occurrence of an event, the resources affected by
the event, and the agents who participated, e.g., recording a sale to a customer.
•Changing data, e.g., a customer address.
•Adding data, e.g., a new customer.
•Deleting data, e.g., removing an old customer that has not purchased anything in
5 years.
DATA PROCESSING
• Batch processing:
• Source documents are grouped into batches, and control totals are calculated.
• Periodically, the batches are entered into the computer system, edited, sorted, and
stored in a temporary file.
• The temporary transaction file is run against the master file to update the master file.
• Output is printed or displayed, along with error reports, transaction reports, and
control totals.
DATA PROCESSING
•Documentation covers the who, what, when, where, why, and how of:
•Data entry
•Processing
•Storage
•Information output
•System controls
INTRODUCTION
• How do accountants use documentation?
• At a minimum, they have to read documentation to understand how a system works.
• They may need to evaluate the strengths and weaknesses of an entity’s internal controls.
• Requires heavy reliance on documentation
• They may peruse documentation to determine if a proposed system meets the needs of its users.
• They may prepare documentation to:
• Demonstrate how a proposed system would work
• Demonstrate their understanding of a system of internal controls
• Documentation tools help accountants by:
• Organizing very complicated systems into a form that can be more readily understood.
• Helping new team members understand a pre-existing system.
DATA FLOW DIAGRAMS
•A data flow diagram (DFD) graphically describes the flow of data within an
organization. It is used to:
• Document existing systems
• Plan and design new systems
•There is no black-and-white approach to developing a DFD.
DATA FLOW DIAGRAMS
• Example of a data flow
diagram of the customer Accounts
payment process Receivable
Deposit
Bank
DATA FLOW DIAGRAMS
• Appear as squares
• Represent organizations or individuals that send or receive data used or produced by the system
• An item can be both a source and a destination
Data sources and destinations
• Data sources and
destinations are marked in
red. Accounts
• Can you tell which are Receivable
sources and which are
destinations?
Bank
DATA FLOWS
• Appear as arrows
• Represent the flow of data between sources and destinations, processes, and data stores
DATA FLOWS
• Data flows are shown in red.
• Does it appear that a data flow
can be two-way? Accounts
• If so, how is it handled? Receivable
Deposit
Bank
DATA FLOWS
• Data flows should always be
labeled.
• The exception is a data flow Accounts
moving into or out of a data store. Receivable
• What symbol is the data store?
Deposit
Bank
DATA FLOW DIAGRAMS
• As you probably surmised from the previous slides, if a data flow is two-way, use a
bi-directional arrow.
General Update
Ledger Receivables
DATA FLOW DIAGRAMS
•If two data elements flow together, then the use of
one data flow line is appropriate.
• If the data elements do not always flow together, then multiple lines will be needed.
Deposit
Bank
Data stores
• Appear as two horizontal lines
• Represent a temporary or permanent repository of data
DATA FLOW DIAGRAMS
• The data store is shown in red.
• Notice that the inflows and
outflows to the data store are not Accounts
labeled. Receivable
Customer
Remittance Receivables
payment
Process data Update Information Credit
Customer
Payment A/R Manager
Deposit
Bank
DATA FLOW DIAGRAMS
•Data dictionary:
• Data flows and data stores are typically collections of data elements.
• EXAMPLE: A data flow labeled student information might contain elements such
as student name, date of birth, ID number, address, phone number, and major.
• The data dictionary contains a description of all data elements, data stores, and
data flows in a system.
DATA FLOW DIAGRAMS
•Subdividing the DFD:
• Few systems can be fully diagrammed on one sheet of paper,
and users have needs for differing levels of detail.
• Consequently, DFDs are subdivided into successively lower
levels to provide increasing amounts of detail.
DATA FLOW DIAGRAMS
•The highest level of DFD is called a context diagram.
•It provides a summary-level view of the system.
•It depicts a data processing system and the external entities that are:
• Sources of its input
• Destinations of its output
DATA FLOW DIAGRAMS
Govt.
Departments Agencies
Human Bank
Resources
• This is the context diagram for the
S&S payroll processing system Management
DATA FLOW DIAGRAMS
Departments Employees
Employee
New employee Time paychecks
Human
Resources form cards
1.0
Employee Update 2.0 Payroll
change Empl.Payroll Pay check Bank
form File Employees
Payroll
3.0 disburse- 5.0
Prepare Employee/ ment data
This diagram shows the Reports Payroll File
Update
Gen.
Ledger
next level of detail for the Payroll
Payroll tax
disb. voucher
Payroll
3.0 disburse- 5.0
How do the sources and Prepare Employee/
Payroll File
ment data Update
Reports Gen.
destinations differ from the Payroll tax
Ledger
• RULE 1: Understand the system. Observe the flow of information and interview people involved to
gain that understanding.
• RULE 2: Ignore control processes and control actions (e.g., error corrections). Only very critical error
paths should be included.
• RULE 3: Determine the system boundaries—where it starts and stops. If you’re not sure about a
process, include it for the time being.
DATA FLOW DIAGRAMS
• RULE 4: Draw the context diagram first and then draw successively greater levels of
detail.
• RULE 5: Identify and label all data flows. The only ones that do not have to be labeled
are those that go into or come out of data stores.
• RULE 6: Data flows that always flow together should be grouped together. Those that do
not flow together should be shown on separate lines.
DATA FLOW DIAGRAMS
• RULE 7: Show a process (circle) wherever a data flow is converted from one form to another. Likewise, every
process should have at least one incoming data flow and at least one outgoing data flow.
• RULE 8: Transformation processes that are logically related or occur simultaneously can be grouped in one
bubble.
• RULE 9: Number each process sequentially. A process labeled 5.0 would be exploded at the next level into
processes numbered 5.1, 5.2, etc. A process labeled 5.2 would be exploded into 5.21, 5.22, etc.
DATA FLOW DIAGRAMS
•RULE 10: Process names should include action verbs, such as update, prepare, etc.
•RULE 11: Identify and label all data stores, whether temporary or permanent.
•RULE 12: Identify and label all sources and destinations. An entity can be both a
source and destination. You may wish to include such items twice on the diagram, if
needed, to avoid excessive or crossing lines.
DATA FLOW DIAGRAMS
• RULE 13: As much as possible, organize the flow from top to bottom and left to right.
• RULE 14: You’re not likely to get it beautiful the first time, so plan to go through several
iterations of refinements.
• RULE 15: On the final copy, lines should not cross. On each page, include:
• The name of the DFD
• The date prepared
• The preparer’s name
DATA FLOW DIAGRAMS
Data Inputs Processes Data Outputs
DATA FLOW DIAGRAMS
•The first paragraph of the narrative for the payroll process reads as follows:
•When employees are hired, they complete a new employee form. When a change
to an employee’s payroll status occurs, such as a raise or a change in the number
of exemptions, human resources completes an employee change form. A copy of
these forms is sent to payroll. These forms are used to create or update the
records in the employee/payroll file and are then stored in the file. Employee
records are stored alphabetically.
DATA FLOW DIAGRAMS
• The first paragraph of the narrative for the payroll process reads as follows:
• When employees are hired, they complete a new employee form. When a change to an
employee’s payroll status occurs, such as a raise or a change in the number of exemptions, human
resources completes an employee change form. A copy of these forms is sent to payroll. These
forms are used to create or update the records in the employee/payroll file and are then stored in
the file. Employee records are stored alphabetically.
The portion marked in red relates to activities that go on outside the boundaries of the
payroll system. Consequently, these activities will not be included on the DFD.
DATA FLOW DIAGRAMS
• The first paragraph of the narrative for the payroll process reads as follows:
• When employees are hired, they complete a new employee form. When a change to an employee’s
payroll status occurs, such as a raise or a change in the number of exemptions, human resources
completes an employee change form. A copy of these forms is sent to payroll. These forms are
used to create or update the records in the employee/payroll file and are then stored in the file.
Employee records are stored alphabetically.
The portion marked in red suggests two data flows coming into the payroll process (new employee forms
and employee change forms). The source of the inflows is the human resources department.
DATA FLOW DIAGRAMS
Data Inputs Processes Data Outputs
New employee forms and
employee change forms
(from H.R. Dept.)
DATA FLOW DIAGRAMS
• The first paragraph of the narrative for the payroll process reads as follows:
• When employees are hired, they complete a new employee form. When a change to an employee’s payroll status
occurs, such as a raise or a change in the number of exemptions, human resources completes an employee change
form. A copy of these forms is sent to payroll. These forms are used to create or update the records in the
employee/payroll file and are then stored in the file. Employee records are stored alphabetically.
The sentence marked in red suggests a process (update employee records) with the data outflow going to a data store (the
employee/payroll file).
DATA FLOW DIAGRAMS
Data Inputs Processes Data Outputs
New employee forms and Update records (read from Updated employee/
employee change forms file and record) payroll file
(from H.R. Dept.)
DATA FLOW DIAGRAMS
• The first paragraph of the narrative for the payroll process reads as follows:
• When employees are hired, they complete a new employee form. When a change to an employee’s
payroll status occurs, such as a raise or a change in the number of exemptions, human resources
completes an employee change form. A copy of these forms is sent to payroll. These forms are used
to create or update the records in the employee/payroll file and are then stored in the file.
Employee records are stored alphabetically.
The final sentence in this paragraph provides information about the physical storage of the data. Physical information is utilized in
flowcharts but not in data flow diagrams.
DATA FLOW DIAGRAMS
Data Inputs Processes Data Outputs
New employee forms and Update records (read from Updated employee/
employee change forms file and record) payroll file
(from H.R. Dept.)
DATA FLOW DIAGRAMS
Depart-
ments Employees
Employee
New employee Time paychecks
Human form cards
Resources
1.0
Update 2.0
Employee Payroll
Empl. Pay
change check
Payroll Employ- Bank
form
File ees
Payroll
disburse-
3.0 5.0
ment data
Prepare Employee/ Update
Reports Payroll File Gen.
Ledger
Payroll tax
Payroll disb. voucher
report
4.0 General
Pay Ledger
Taxes Tax report
Manage- & payment
ment Govt.
Agencies
FLOWCHARTS
Storage symbols indicate the type of device used to store data while the
system is not using it.
FLOWCHARTS
• There are four types of flowcharting symbols:
• Input/output symbols
• Processing symbols
• Storage symbols
• Flow and miscellaneous symbols
• Flow and miscellaneous symbols may
indicate:
– The flow of data and goods
– The beginning or end of the flowchart
– The location of a decision
– An explanatory note
FLOWCHARTS
• Click on buttons below if you wish to review symbols in the various categories.
Symbols
Input/Output Symbols
Processing
Input/Output Processing
Symbols Symbols
Symbols
Storage Flow Misc.
Symbols
• Internal control flowcharts are document flowcharts used to evaluate the adequacy of
internal controls, such as segregation of duties or internal checks.
• They can reveal weaknesses or inefficiencies such as:
• Inadequate communication flows
• Unnecessarily complex document flows
• Procedures that cause wasteful delays
• Document flowcharts are also prepared in the system design process.
This is part of the document flowchart
GUIDELINES FOR PREPARING FLOWCHARTS
•Identify:
•Entities to be flowcharted, e.g., departments, functions, external
parties (the parties who “do” things in the story)
•Documents or information flows
•Processes
What are the entities in this flowchart?
GUIDELINES FOR PREPARING FLOWCHARTS
•Every manual process should have at least one input and at least one output.
•Show all data entered into or retrieved from a computer file as passing through a
process first.
•Do not show process symbols for:
• Forwarding a document to another entity
• Filing a document
Forwarding
a document
Filing
a document
GUIDELINES FOR PREPARING FLOWCHARTS
• If a flowchart takes more than one page, label the pages as 1 of 5, 2 of 5, 3 of 5, etc.
• Show documents or reports first in the column where they are created.
• Start with a rough draft; then redesign to avoid clutter and crossed lines.
• Verify the accuracy of your flowchart by reviewing it with users, etc.
• Place the flowchart name, the date, and the preparer’s name on each page of the final
copy.
SYSTEM FLOWCHARTS
•A system flowchart depicts the relationship among the inputs, processes, and
outputs of an AIS.
•The system flowchart begins by identifying the inputs to the system.
• These inputs can be:
– New data
– Data stored for future use
– Both
SYSTEM FLOWCHARTS
•A system flowchart depicts the relationship among the inputs, processes, and
outputs of an AIS.
• The system flowchart begins by identifying the inputs to the system.
• Each input is followed by a process, i.e., the steps performed on the data.
• If the process is performed by a computer,
the logic of the computer program would be
depicted in a program flowchart.
SYSTEM FLOWCHARTS
Enrollment
Forms
1.0
Update Student
Student Records
Records
Enrollment
Forms
2.0
Prepare Bursar
Enrollment
Class Lists Forms
Class
Lists
Faculty
Registrar’s Office
Update Sorted
1.0 A Enrollment
Update Student Student
Records Forms
Student Records
Records
Enrollment Sorted Prepare
Forms
Enrollment Class
Forms Lists
2.0
Prepare Bursar Here’s a flowchart
Enrollment
Class Lists Forms that goes with the Sorted
Class
story Enrollment
Class Lists
Lists Forms
Faculty
Faculty Bursar
FLOWCHARTS VS. DFDs
Enrollment Enrollment
Forms Data
1.0 1.0
Update Student Update Student
Student Records Student Records
Records Records
Enrollment Enrollment
Forms Data
2.0 2.0
Prepare Bursar Prepare Bursar
Enrollment Enrollment
Class Lists Forms Class Lists Data
Class Class
Lists Lists
Faculty Faculty
Registrar’s Office Registrar’s Office
Sorted Enrollment
Class Lists Forms
Here’s the revised flowchart. How has it
changed? Class Lists
Faculty Bursar
Faculty
Original Flowchart
DATABASE SYSTEMS AND THE FUTURE OF
ACCOUNT ING
•Some fraud perpetrators are disgruntled and unhappy with their jobs and are
seeking revenge against their employers.
•Others are regarded as ideal, hard-working employees in positions of trust.
•Most have no prior criminal record.
•So why are they willing to risk everything?
The “Fraud Triangle”
Donald Cressey
Rationalization
Pressure
-Physical isolation
becomes non-shareable.
WHO COMMITS FRAUD AND WHY
•The most common pressures were:
-Not being able to pay one’s debts, nor admit it to one’s employer, family, or friends (which
makes in non-shareable).
-Fear of loss of status because of a personal failure
-Business reversals
-Physical isolation • Many frauds are motivated by nothing
-Status gaining more than a perceived need to keep up
with the rich.
WHO COMMITS FRAUD AND WHY
• The most common pressures were:
-Not being able to pay one’s debts, nor admit it to one’s employer, family, or friends (which
makes in non-shareable).
-Fear of loss of status because of a personal failure
-Business reversals
-Physical isolation • May create pressure to get revenge,
take the money you feel is rightfully
-Status gaining owed to you, etc.
•Concealing the fraud often takes more time and effort and leaves
more evidence than the actual theft or misrepresentation.
•Examples:
•Lapping. • Steal a payment from Customer A.
• Apply Customer B’s payment to Customer A’s account so
Customer A won’t get a late notice.
• Apply Customer C’s payment to Customer B’s account, so
Customer B won’t get a late notice, etc.
OPPORTUNITY
• Concealing the fraud often takes more time and effort and leaves more evidence than the actual
theft or misrepresentation.
• Examples of concealment efforts:
• Kiting. • Creates “cash” by transferring money between banks.
• Requires multiple bank accounts.
• Basic scheme:
– Write a check on the account of Bank A.
– Bank A doesn’t have sufficient funds to cover the check, so write a check from an
account in Bank B to be deposited in Bank A.
– Bank B doesn’t have sufficient funds to cover the check, so write a check from an
account in Bank C to be deposited in Bank B, etc.
OPPORTUNITY
•Unless the target of the theft is cash, then the stolen goods must be converted
to cash or some form that is beneficial to the perpetrator.
•Checks can be converted through alterations, forged endorsements, check washing,
etc.
•Non-cash assets can be sold (online auctions are a favorite forum) or returned to
the company for cash.
OPPORTUNITY
Opportunities
OPPORTUNITY
• Internal controls that may be lacking or un-enforced include:
• Authorization procedures
• Clear lines of authority
• Adequate supervision
• Adequate documents and records
• A system to safeguard assets
• Independent checks on performance
• Separation of duties
•One control feature that many companies lack is a background check on all potential employees.
WHO COMMITS FRAUD AND WHY
•Computer systems are particularly vulnerable to computer crimes for several reasons:
• Company databases can be huge and access privileges can be difficult to create and enforce.
Consequently, individuals can steal, destroy, or alter massive amounts of data in very little
time.
• Organizations often want employees, customers, suppliers, and others to have access to their
system from inside the organization and without. This access also creates vulnerability.
• Computer programs only need to be altered once, and they will operate that way until:
• The system is no longer in use; or
• Someone notices.
APPROACHES TO COMPUTER FRAUD
Data
Fraud
Computer
Instructions
Fraud
INPUT FRAUD
• In one example, an agriculture college at a major state university was experiencing very sluggish
performance from its server.
• Upon investigating, IT personnel discovered that an individual outside the United States had effectively
hijacked the college’s server to both store some of his/her research data and process it.
• The college eliminated the individual’s data and blocked future access to the system.
• The individual subsequently contacted college personnel to protest the destruction of the data.
• Demonstrates both:
• How a processor fraud can be committed.
• How oblivious users can sometimes be to the unethical or illegal nature of their activities.
COMPUTER INSTRUCTIONS FRAUD
• Data diddling - Changing data before, during, or after it is entered into the system.
• Can involve adding, deleting, or altering key system data.
• Data leakage - Unauthorized copying of company data
• Denial of service attacks - An attacker overloads and shuts down an Internet service provider’s email
system by sending email bombs at a rate of thousands per second—often from randomly generated
email addresses.
• May also involve shutting down a Web server by sending a load of requests for the Web pages.
METHODS TO COMMIT COMPUTER FRAUD AND ABUSE
• Email forgery (aka, spoofing) Involves sending an email message that appears to have come from someone other than the actual sender.
• Email spoofers may:
• Claim to be system administrators and ask users to change their passwords to specific values.
• Pretend to be management and request a copy of some sensitive information.
• Hacking - Unauthorized access to and use of computer systems—usually by means of a personal computer and a telecommunications
network.
• Most hackers break into systems using known flaws in operating systems, applications programs, or access controls.
• Some are not very malevolent and mainly motivated by curiosity and a desire to overcome a challenge.
• Others have malicious intent and can do significant damage.
COMPUTER FRAUD AND ABUSE TECHNIQUES
• Phreaking -Hacking that attacks phone systems and uses phone lines to transmit viruses
and to access, steal, and destroy data.
• They also steal telephone services and may break into voice mail systems.
• Some hackers gain access to systems through dial-up modem lines.
• Hijacking - Involves gaining control of someone else’s computer to carry out illicit activities
without the user’s knowledge.
• The illicit activity is often the perpetuation of spam emails.
COMPUTER FRAUD AND ABUSE TECHNIQUES
• Identity theft - Assuming someone’s identity, typically for economic gain, by illegally obtaining and using confidential
information such as the person’s social security number, bank account number, or credit card number.
• Identity thieves benefit financially by:
• Taking funds out of the victim’s bank account.
• Taking out mortgages or other loans under the victim’s identity.
• Taking out credit cards and running up large balances.
• If the thief is careful and ensures that bills and notices are sent to an address he controls, the scheme may be
prolonged until such time as the victim attempts to buy a home or car and finds out that his credit is destroyed.
COMPUTER FRAUD AND ABUSE TECHNIQUES
• Internet misinformation - Using the Internet to spread false or misleading information about people or companies.
• May involve:
• Planting inflammatory messages in online chat rooms.
• Websites with misinformation.
• Pretending to be someone else online and making inflammatory comments that will be attributed to that person.
• A “pump-and-dump” occurs when an individual spreads misinformation, often through Internet chat rooms, to
cause a run-up in the value a stock and then sells off his shares of the stock.
COMPUTER FRAUD AND ABUSE TECHNIQUES
• Internet terrorism - Hackers use the Internet to disrupt electronic commerce and destroy company and
individual communications.
• Viruses and worms are two main forms of Internet terrorism.
• Logic time bombs - A program that lies idle until triggered by some circumstance or a particular time.
• Once triggered, it sabotages the system, destroying programs, data, or both.
• Usually written by disgruntled programmers.
• EXAMPLE: A programmer places a logic bomb in a payroll application that will destroy all the payroll records
if the programmer is terminated.
COMPUTER FRAUD AND ABUSE TECHNIQUES
• Password cracking - An intruder penetrates a system’s defenses, steals the file of valid passwords, decrypts them, and then uses them to
gain access to almost any system resources.
• Phishing - Sending out a spoofed email that appears to come from a legitimate company, such as a financial institution. eBay, PayPal, and
banks are commonly spoofed.
• The recipient is advised that information or a security check is needed on his account, and advised to click on a link to the company’s
website to provide the information.
• The link connects the individual to a Website that is an imitation of the spoofed company’s actual Website. These counterfeit Websites
appear very authentic, as do the emails.
• One newly graduated college student recently took a job in California and deposited his first paycheck of approximately $5,000 in the
bank.
COMPUTER FRAUD AND ABUSE TECHNIQUES
• Piggybacking - Tapping into a telecommunications line and latching onto a legitimate user before that user logs
into a system.
• The legitimate user unknowingly carries the perpetrator into the system.
• Round-down technique - Made famous in the movie, Office Space.
• The programmer instructs the computer to round interest calculations down to two decimal places and deposits
the remaining fraction into the account of a programmer or an accomplice.
• Salami technique - Involves the theft of tiny slices of money over a period of time.
• The round-down is just a special form of a salami technique.
COMPUTER FRAUD AND ABUSE TECHNIQUES
• Social engineering - Perpetrators trick employees into giving them information they need to get into the
system.
• A perpetrator might call an employee and indicate he is the systems administrator and needs to get the
employee’s password.
• Software piracy - Copying software without the publisher’s permission.
• Spamming - Emailing an unsolicited message to multitudes of people, often in an attempt to sell a product.
• Many times the product offers are fraudulent.
COMPUTER FRAUD AND ABUSE TECHNIQUES
Spyware - Software that monitors computing habits, such as Web-surfing habits, and sends the data it gathers to someone else, typically without the user’s permission.
• One type, called adware (for advertising-supported software) does two things:
• Causes banner ads to pop up on your monitor as you surf the net.
• Collects information about your Web-surfing and spending habits and forward it to a company gathering the data—often an advertising or large media
organization.
• May be disclosed in the licensing agreement, but users are unlikely to read it.
• Reputable adware companies claim they don’t collect sensitive or identifying data.
• But there is no way for users to control or limit the activity.
• It is not illegal, but many find it objectionable.
• Software has been developed to detect and eliminate spyware, but it may also impair the downloaded software.
• Some is intentionally difficult to uninstall.
COMPUTER FRAUD AND ABUSE TECHNIQUES
Keystroke loggers - record a user’s keystrokes and emails them to or saves them for the party that planted the logger. These are sometimes used by:
• Parents to monitor their children’s computer usage.
• Businesses to monitor employee activity.
• Fraudsters to capture passwords, credit card numbers, etc.
• can be a hardware device attached to a computer or can be downloaded on an individual’s computer in the same way that any Trojan horse
might be downloaded.
• Spyware and keystroke loggers are very problematic for companies with employees who telecommute or contact the company’s computer from
remote locations.
• Spyware on those computers makes the company’s systems vulnerable.
• Individuals are also exposed when they use wireless networks, such as those that may be available in coffee shops.
COMPUTER FRAUD AND ABUSE TECHNIQUES
Superzapping - Unauthorized use of special system programs to bypass regular system controls and perform illegal
acts.
• The name is derived from an IBM software utility called Superzap that was used to restored crashed systems.
Trap doors - Also called back doors.
• Programmers create trap doors to modify programs.
• The trap door is a way into the system that bypasses normal controls.
• The trap door should be removed before the program is implemented.
• If it is not, the programmer or others may later gain unauthorized access to the system.
COMPUTER FRAUD AND ABUSE TECHNIQUES
• Trojan horse - A set of unauthorized computer instructions planted in an authorized and otherwise properly functioning program.
• Allows the creator to control the victim’s computer remotely.
• The code does not try to replicate itself but performs an illegal act at some specific time or when some condition arises.
• Programs that launch denial of service attacks are often Trojan horses.
• War dialing - Hackers search for an idle modem by programming their computers to dial thousands of phone lines.
• Hackers enter through the idle modem and gain access to the connected network.
• War driving - Driving around in cars looking for unprotected home or corporate wireless networks.
• If the hackers mark the sidewalk of the susceptible wireless network, the practice is referred to as warchalking.
COMPUTER FRAUD AND ABUSE TECHNIQUES
Virus - Many viruses have two phases:
• First, when some predefined event occurs, the virus replicates itself and spreads to other systems or files.
• Another event triggers the attack phase in which the virus carries out its mission.
• A virus may lay dormant or propagate itself without causing damage for an extended period.
• Damage may take many forms:
• Send email with the victim’s name as the alleged source.
• Destroy or alter data or programs.
• Take control of the computer.
• Destroy or alter file allocation tables.
• Delete or rename files or directories.
• Reformat the hard drive.
• Change file content.
• Prevent users from booting.
• Intercept and change transmissions.
• Print disruptive images or messages on the screen.
• Change screen appearance.
COMPUTER FRAUD AND ABUSE TECHNIQUES
• Virus symptoms:
• Computer will not start or execute
• Performs unexpected read or write operations
• Unable to save files
• Long time to load programs
• Abnormally large file sizes
• Slow systems operation
• Unusual screen activity
• Error messages
COMPUTER FRAUD AND ABUSE TECHNIQUES
• The low-tech, do-it-yourself attack - You receive an email from a friend, apologizing profusely that he/she has previously sent you an email
that was infected with a virus.
• The friend’s email gives you instructions to look for and remove the offending virus.
• You delete the file from your hard drive. The only problem is that the file you just deleted was part of your operating system.
• Your friend was well-intended and has done the same thing to his/her computer.
• REMEDY: Before even considering following instructions of this sort, check the list of hoaxes that are available on any virus protection Website,
such as:
• www.norton.com
• www.mcafee.com
INTERNAL CONTROLS IN AN IT
ENVIRONMENT
1. General Controls - control policies and procedures that relate to the overall computer
information system
- covers controls over the entity's IT processes that support the continued proper operation of
the IT environment, including the continued effective functioning of information processing
controls and the integrity of information (ie., the completeness, accuracy and validity of
information) in the entity's information system.
GENERAL CONTROLS
1. Information System Management - handled by a Chief Information Officer and supervise the operation of the department
2. System Analysis - responsible for designing the information systems. Focus on setting the goals of the information system and means of
achieving them after considering the goals of the organization and the computer processing needs of the entity.
3. Application Programming - codes the system specifications determined by system analysts using programming languages
4. Database Administration - focus on planning and administering the database by designing it and controlling its use
5. Data Entry - prepare and verify input data for processing
6. Computer Operation - run and monitor central computer in accordance with standard instructions. Sometimes operators may need to access
computer console to correct indicated errors in processing, this is a risk exposure that an operating system should be designed to maintain a log
of computer operator intervention. Also, computer operation should be separated with application programming to mitigate the possibility of
unauthorized changes in computer programs.
7. Program and File Library - protects computer programs, master files, transaction tapes and other records from loss, damage, unauthorized
use or alteration.
8. Data Control - review and test all input procedures, monitor computer processing, reviews exception reports, handles reprocessing of
exceptions detected by the computer and distributes all computer output, also review ramcomputer log of operator intervention and library log
of program usage.
9. Telecommunications - responsible for maintaining and enhancing computer networks and network connections
10.Systems Programming - responsible for troubleshooting the operating system or systems in use, upgrading it N and working with application
system programs in case of incompatibility with the operating systems
11.Quality Assurance - ensures that new systems developed and old ones being replaced are controlled with and ensures the new system to meet
user specification and documentation standards
GENERAL CONTROLS
B. SYSTEM DEVELOPMENT, MAINTENANCE AND DOCUMENTATION
CONTROLS
1) User department must participate in system design
2) Written system specification must be required and approved by management and user
department
3) Both user and IT personnel must test new systems
4) Management, user and IT personnel must approve new system before implementation
5) Control of all master and transaction files to avoid unauthorized changes
6) All program changes should be approved
7) Adequate documentation should be made to facilitate the use of programs
GENERAL CONTROLS
C. ACCESS CONTROLS - provide reasonable assurance that access to equipment, files and programs are limited only to authorized personnel