The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.

ระบบสารสนเทศทางการบัญชี

Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by สนุกสนาน สมานชีวี, 2022-06-14 06:58:59

Accounting Information Systems

ระบบสารสนเทศทางการบัญชี

Keywords: AIS,Accounting information systems

 ERP Configurations

 are client-server based
 can typically run on many operating system

platforms

 Centralized database

 stores information about each data
item just once

 makes it immediately available to
all the various functions

 Application interfaces

 a best-of-breed approach
 extended application interfaces

 Internet portals

 Are gateways to other web sites
 enhance communication and

productivity among employees,
customers, partners, and suppliers

 An ERP typically integrates

 financial functions,
 human resource functions,
 manufacturing functions, and
 sales and distribution functions.

Costs Benefits

 Hardware  Reduction in inventory
 Software investment
 Training
 Improvement in asset
 Technical management
 Business processes
 Improved decision-making
 Data conversion  Resolution of data
 Interfaces and
redundancy
customization and integrity problems
 Professional services  Increase in flexibility and
 Reassigned employees responsiveness
 Software maintenance  Improved customer service
 Software upgrades and satisfaction
 Global and supply chain
integration

Organizations have many choices when selecting AIS software:

Entry-Level Small–Medium Business

 Simply Accounting (SMB)

 Peachtree Sage ACCPAC Advantage

 QuickBooks Series

 Microsoft Small Business Sage MAS 90
Accounting MAS 200

High-End Enterprise Resource Macola ES
Planning (ERP) Cougar Mountain

 SAP NetSuite
 PeopleSoft Microsoft Dynamics GP

 J.D. Edwards

 Oracle

Organizations have many choices when selecting AIS software:

Special Industry Small–Medium Enterprise

 Peachtree Nonprofit (SME)

 Cougar Mountain Fund Sage MAS 500
(NFP) e by Epicor

 AccuBuild (construction) Lawson

 Everest POS (retail) Microsoft Dynamics AX

 Phoenix (insurance) mySAP All-in-One

Custom-Built

 Operating on cloud
 Don’t use sever or hardware for collection
 Maintenance fixed cost
 Working everywhere
 Convenience

 Example Software
 SAP on cloud
 Express on cloud
 PEAK (Thai software) Operation system online and on

cloud etc………..

Such as accounting program online
and on cloud

 โปรแกรมบญั ชี ออนไลน์ ทช่ี ่วยใหธ้ ุรกจิ เตบิ โตมากกว่า | PEAK (peakaccount.com)
 โปรแกรมบญั ชี ออนไลน์ สาหรบั นกั ธุรกจิ ยุคใหม่ (flowaccount.com)
 ระบบ ERP แบบ Cloud 1,700 บาท/เดอื น ทดลองฟรี | Ecount ERP
 โปรแกรมบญั ชอี อนไลน์ SMEMOVE || โปรแกรมสาเรจ็ รูปทดลองใชฟ้ รี
 ระบบจดั การรา้ นคา้ ออนไลนค์ รบวงจร ทางเลอื กใหมข่ องธุรกิจออนไลน์ | Ginee
 Bplus Mini ERP On Cloud (businessplus.co.th)

Chapter 6

Computer Crime, Ethics, and Privacy

-Introduction
-Computer Crime, Abuse, and Fraud
-Examples of Computer Crimes
-Mitigating Computer Crime and Fraud
-Ethical Issues, Privacy, and Identity Theft

Computer Crime & Abuse
the Difference

Computer crime involves the manipulation of a computer
or computer data, to dishonestly

◦ obtain money, acquire property, or get some other
advantage of value, or to cause a loss.

Computer abuse is when someone’s computer is used or
accessed

◦ a mischievous manner with a motive of revenge or
challenge

◦ is punishable in extreme cases

FEDERAL LEGISLATION

The Computer Fraud and Abuse Act (CFAA) of 1986
which was amended in 1994 and 1996
 -Defines computer fraud as an illegal act for which
computer technology is essential for its perpetration,
investigation, or prosecution.
 -Defines seven fraudulent acts, the first
three are described as misappropriation
of assets and the last four as “other” crimes

CFAA Fraudulent Acts

•-Unauthorized theft, use, access,
modification, copying, or destruction of
software or data.
•-Theft of money by altering computer
records or the theft of computer time.
•-Intent to illegally obtain information or
tangible Property through the use of
computers.

CFAA Fraudulent Acts

Use or the conspiracy to use computer
resources to commit a felony.

Theft, vandalism, destruction of computer
hardware.

Trafficking in passwords or other login
information for accessing a computer.

Extortion that uses a computer system
as a target.

Importance for Accountants

Importance of computer crime and abuse
to accountants
– because AISs

– help control an organization’s financial
resources are favored targets of disgruntled
employees seeking financial gain or seeking
revenge

Importance for Accountants

because they are responsible for

◦ designing,
◦ implementing, and
◦ monitoring the control procedures for AISs.

because firms suffer millions of dollars in
computer-related losses

◦ due to viruses,
◦ unauthorized access, and
◦ denial of service attacks

Methods Used by Criminals

Hackers
– people who break into the computer files of

others for fun or personal gain.
Shoulder surfing
– stealing calling credit numbers at public phones
Password controls
– limiting computer access to bona fide users

Computer Viruses

Computer virus is a program
 that disrupts normal data processing and
 that can usually replicate itself onto other files, computer systems

or networks.
Boot-sector viruses
 hide in the boot sectors of a disk
 are accessed there by the operating system

every time the system is booted.
Worm viruses
 replicate themselves until the user runs

out of memory or disk space.

Computer Virus Programs

Trojan Horse programs
 reside in legitimate copies of

computer programs.
Logic Bomb programs
 remain dormant until the computer

system encounters a specific condition.
A virus may be stored in an applet, which is a small
program stored on a WWW server.

Thwarting Computer Viruses

-Firewalls which limit external access to
the computer.
-Antivirus software.
-Antivirus control procedures.

Methods for Thwarting Computer
Abuse

Enlist top management support
Increase employee awareness and education
Conduct Security Inventory and protect passwords
Implement controls
Identify computer criminals

Look at technical backgrounds,
morals, and gender and age

Computers and Ethical Behavior

Ethics
◦ a set of moral principles or values
◦ governing an organization as well as individuals

Ethical behavior
◦ making choices and judgments that are morally
proper and then acting accordingly.

Ethical Issues

 Honesty
 Protecting Computer Systems
 Protecting Confidential Information
 Social Responsibility
 Rights of Privacy
 Acceptable Use of Computer

Hardware and Software.

Encouraging Ethical Behavior

– Use job promotions and other benefits to
reward those employees who act responsibly.

– Encourage employees to join professional organizations
with codes of conduct such as Codes of Conduct and
Good Practice for Certified Computer Professional.

Computers and Privacy Issues

• Company policies with respect to privacy issues

• Privacy policy should include

owho owns the computer
ofor what purposes can the computer be used
owhat uses are authorized or prohibited
odisposal of computers

Chapter 7

Introduction to Internal Control Systems

• Introduction
• Internal Control Systems

• Definition
• Framework

• Preventive, Detective, and Corrective Controls
• Control Activities within an Internal Control System
• Cost-Benefit Concept for Developing Controls

Introduction

An organization’s financial resources can
be protected from loss, waste, or theft by

• developing an internal control system
• implementing it within its AIS

An internal control system

• ensures reliable data processing
• promotes operational efficiency

Internal Control

It aims to achieve four main objectives:

• to safeguard assets
• to check the accuracy and reliability of accounting data
• to promote operational efficiency
• to encourage adherence to prescribed managerial

policies

Internal Control

Describes the policies, plans, and procedures
implemented by a firm to protect its assets.

• people involved include:

• board of directors
• management
• other personnel

• provides reasonable assurance of:

• effectiveness and efficiency,
• reliability of financial reporting, and
• compliance with applicable laws

and regulations

Objectives of the Internal Control
Structure

The objectives of the Control Structure are:

• Safeguarding assets
• Checking the accuracy and reliability

of accounting data

• Promoting operational efficiency
• Encouraging adherence to

prescribed managerial policies

Background Information
on Internal Controls

The key laws, professional guidance, and reports that
focus on internal controls are:

• Foreign Corrupt Practices Act 1977
• Treadway Commission Report 1977
• SAS No. 55 1988
• Committee of Sponsoring Organizations (COSO) Report

1992 SAS No. 78 1995

• Control Objectives for Business and IT (COBIT) 1995
• Information Federation for Information Processing 2001

Background of Internal Controls

• Results of The Committee of Sponsoring Organizations

(COSO) in 2017

• defines internal control and describes its components
• presents criteria to evaluate internal control systems
• provides guidance for public reporting on internal

controls

• offers materials to evaluate an internal control system

Components of Internal Control According to
the 2017 COSO Report

• Control Environment
• Risk Assessment
• Control Activities
• Information and

Communication

• Monitoring

The Control Environment

The Control Environment

• establishes the tone of a company,
• influences the control awareness of the employees.

Factors included within the control environment are:

Integrity, ethical values and competence of employees
Management philosophy and operating style
Assignment of authority and responsibility
The attention and direction provided by the
board of directors

Risk Assessment

Risk assessment involves
• recognition that every organization faces

risks to its success

• recognition that the sources are internal and external
• identification, analysis and action

to achieve the company’s goals

• use of cost-benefit analysis

Control Activities

Control activities:

• are the policies and procedures that ensure
• management directives are carried out,
• protection of the assets of the firm

• include a combination of
• manual controls
• automated controls.

Control Activities

• Can be categorized as
• approvals
• authorizations
• verifications
• reconciliations
• reviews of operating performance
• segregation of duties

Information and Communication

Management’s responsibility to make sure the
accounting system,

• collects
• measures
• processes
• communicates to individuals inside and outside

the firm

Information and Communication

Communication helps personnel
understand their roles and responsibilities to internal
control by the use of:

• policies and procedures manuals
• training sessions for new employees
• refreshers training for continuing employees

Monitoring

Monitoring

• is the process that assesses the quality

of internal control performance over time

• involves evaluating the design and

operation of controls on a timely basis,

• initiating corrective action when specific controls

are not functioning properly.

Subsidiary2017 COSO Enterprise Risk
Business UnitManagement Framework

Division Internal Environment
Objective Setting
Event Identification
Risk Assessment
Risk Response

Control Activities
Information & Communication

Monitoring

2017 Framework added elements
COSO

• Objective setting
• Event identification
• Risk response

Objective Setting

Enterprise’s objectives are viewed from these four
perspectives:

• Strategic; high level goals and mission
• Operations; day to day goals
• Reporting; internal and external
• Compliance; with laws and regulations

Control Procedures Analysis

Control Procedures can be classified as

• Preventive Controls

• to prevent some potential problem from

occurring when an activity is performed

• Detective Controls –

• alert us when preventive controls have failed

• Corrective controls

• to remedy problems discovered through

detective controls

Control Activities

Within an Internal Control System are
the following features

• a good Audit Trail
• sound personnel policies and competent employees
• separation of duties
• physical protection of assets
• internal reviews of controls by internal audit

subsystem

• Timely Performance Reports

Cost-Benefit Concept for
Developing Controls

A cost-benefit analysis

• should be conducted to make sure that the benefits

of planned controls exceed the cost of implementing
them in the system

• controls are considered cost-effective when their

anticipated benefits exceed their anticipated costs

• an ideal control is a control procedure that reduces

to practically zero the risk of an undetected error or
irregularity.

Cost Benefit Analysis

The benefits of additional control procedures

• result from risk of loss reductions.
• should include a measure of loss

• the exposure (potential loss associated with a control

problem) and

• risk (probability that the control problem will occur).

• are calculated as

• Expected loss = risk X exposure

CHAPTER 8

COMPUTER CONTROLS FOR
ACCOUNTING INFORMATION SYSTEMS

INFORMATION TECHNOLOGY GENERAL CONTROLS
• SECURITY FOR WIRELESS TECHNOLOGY
• CONTROLS FOR HARDWIRED NETWORK SYSTEMS
• SECURITY AND CONTROLS FOR MICROCOMPUTERS
• IT CONTROL OBJECTIVES FOR SARBANES-OXLEY
APPLICATION CONTROLS FOR TRANSACTION PROCESSING
• INPUT, PROCESSING, AND OUTPUT CONTROLS

INTRODUCTION

INTERNAL CONTROL SYSTEMS WITH FOCUS ON

• SPECIFIC SECURITY IN ORGANIZATIONS
• CONTROL PROCEDURES TO ENSURE

• EFFECTIVE USE OF RESOURCES
• EFFICIENT UTILIZATION OF RESOURCES

PRIMARY CHALLENGES ASSOCIATED WITH
CONNECTIVITY

• PROTECTION OF SENSITIVE DATA AND INFORMATION

• STORED OR
• TRANSFERRED

• PROVIDING APPROPRIATE SECURITY AND CONTROL
PROCEDURES

GENERAL CONTROLS FOR
ORGANIZATIONS

DEVELOPING AN APPROPRIATE SECURITY POLICY INVOLVES

• IDENTIFYING AND EVALUATING ASSETS
• IDENTIFYING THREATS
• ASSESSING RISK
• ASSIGNING RESPONSIBILITIES
• ESTABLISHING SECURITY POLICIES PLATFORMS
• IMPLEMENTING ACROSS THE ORGANIZATION
• MANAGING THE SECURITY PROGRAM


Click to View FlipBook Version