1 / 55

Basic Subsystems in the AIS

Basic Subsystems in the AIS. Financing Cycle. Expenditure Cycle. Human Resources. General Ledger & Reporting System. Production Cycle. Revenue Cycle. The Value Chain. Primary Activities. Operations. Inbound Logistics. Outbound Logistics. Marketing and Sales. Service.

dawson
Download Presentation

Basic Subsystems in the AIS

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Basic Subsystems in the AIS Financing Cycle Expenditure Cycle Human Resources General Ledger & Reporting System Production Cycle Revenue Cycle

  2. The Value Chain Primary Activities Operations Inbound Logistics Outbound Logistics Marketing and Sales Service

  3. The Value Chain Support Activities Infrastructure Technology Purchasing Human Resources

  4. The Value System • The value chain concept can be extended by recognizing that organizations must interact with suppliers, distributors, and customers. • An organization’s value chain and the value chains of its suppliers, distributors, and customers collectively form a value system.

  5. The Systems Development Life Cycle • What are the five steps in the systems development life cycle (SDLC)? • Systems analysis • Conceptual design • Physical design • Implementation and conversion • Operations and maintenance

  6. The Systems Development Life Cycle Systems Analysis Conduct initial investigation Conduct system survey Conduct feasibility study Determine information needs and system requirements Deliver systems requirements Feasibility analysis and decision points

  7. The Players • Who are the people involved in developing and implementing AIS? • management • accountants • information systems steering committee • project development team • systems analysts and programmers • external players

  8. Planning Techniques F C D A B E Critical path A,B,E,F

  9. Planning Techniques Project Planning Chart (Sample Gantt Chart) ____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________ Activity Week Starting 1 2 3 4 5 6 7 8

  10. Feasibility Analysis • What are some capital budgeting techniques? • payback period • net present value (NPV) • internal rate of return (IRR)

  11. Ways to obtain an AIS Purchase (Pre-written) Build (Customized) Lease (Pre-written) Canned Software Turnkey (H/W & S/W) In-house Developed Out-sourced (External) Application Service Provider (ASP) “Modified” Canned Software I.S. Developed End-user Developed (EUD)

  12. Threats to AIS • Natural and politicaldisasters: • fire / heat / floods / earthquakes / winds / war • S/W errors & Equipment Malfunctions: • H/W failures / power outages / data transmission errors • Unintentional acts: • accidents / lost data / human & logic errors /systems that do not meet company needs • Intentional acts: • Sabotage / computer fraud / embezzlement

  13. Physical Access Controls • How can physical access security be achieved? • placing computer equipment in locked rooms and restricting access to authorized personnel • having only one or two entrances to the computer room • requiring proper employee ID • requiring that visitors sign a log • installing locks on PCs

  14. Logical Access Controls • Users should be allowed access only to the data they are authorized to use and then only to perform specific authorized functions. • What are some logical access controls? • passwords • physical possession identification • biometric identification • compatibility tests

  15. Protection of PCs and Client/Server Networks • Many of the policies and procedures for mainframe control are applicable to PCs and networks. • The following controls are also important: • Train users in PC-related control concepts. • Restrict access by using locks and keys on PCs. • Establish policies and procedures. • Portable PCs should not be stored in cars. • Back up hard disks regularly. • Encrypt or password protect files. • Build protective walls around operating systems. • Use multilevel password controls to limit employee access to incompatible data.

  16. Internet Controls • Caution when conducting business on the Internet: • the global base of people that depend on the Internet • the variability in quality, compatibility, completeness, and stability of network products and services • access of messages by others • security flaws in Web sites • attraction of hackers to the Internet • Controls used to secure Internet activity: • passwords • encryption technology • routing verification procedures • Firewall = a barrier between the networks that does not allow information to flow into and out of the trusted network.

  17. Principles of a Reliable System • Security of the system against unauthorized physical and logical access. • Availability of the system when needed. • Maintainability of the system as required without affecting its availability, security, and integrity. • Integrity of the system to ensure that processing is complete, accurate, timely, and authorized.

  18. Segregation of Duties Withinthe Systems Function • Organizations must implement compensating control procedures. • Authority & responsibility must be clearly divided among the following functions: • Systems analysis • Programming • Computer operations • Users • AIS library • Data control

  19. Segregation of Duties Custodial Functions Handling cash Handling assets Writing checks Receiving checks in mail Authorization Functions Authorization of transactions Recording Functions Preparing source documents Maintaining journals Preparing reconciliations Preparing performance reports

  20. Data Flow Diagrams • A data flow diagram (DFD) graphically describes the flow of data within an organization. • It is used to document existing systems and to plan and design new ones. • There is no ideal way to develop a DFD.

  21. Disaster Recovery Plan • Every organization should have a disaster recovery plan to restore data processing capacity smoothly and quickly as possible. • Objectives of a recovery plan: • Minimize the extent of the disruption, damage, and loss. • Temporarily establish an alternative means of processing information. • Resume normal operations as soon as possible. • Train and familiarize personnel with emergency operations.

  22. Disaster Recovery Plan • A sound disaster plan should contain the following elements: • Priorities for the recovery process • Backup data and program files • Specific assignments • Complete documentation • Backup computer and telecommunications facilities • reciprocal agreements • hot and cold sites • Questions need to be asked: • Who needs access to what information? • When do they need it? • On which systems does the information reside?

  23. Disaster Recovery Plan • There are other aspects of disaster recovery planning that deserve mention: • The recovery plan is incomplete until it has been satisfactorily tested by simulating a disaster. • The recovery plan must be continuously reviewed and revised to ensure that it reflects current situation. • The plan should include insurance coverage.

  24. Why Fraud Occurs • Three conditions are necessary for fraud to occur: • A pressure or motive • An opportunity • A rationalization

  25. General Controls • General controls ensure that overall computer system is stable and well managed: • Developing a security plan • Segregation of duties within the systems function • Project development controls • Physical access controls • Logical access controls • Data storage controls • Data transmission controls • Documentation standards • Minimizing system downtime • Disaster recovery plans • Protection of personal computers & client/server networks • Internet controls

  26. E-Business Interactions • E-business encompasses an organization’s external interactions with its: • Suppliers • Customers • Investors • Creditors • The government • Media

  27. Categories of E-Business

  28. Use of E-Business • E-business includes the use of IT to redesign its internal processes. • For organizations in many industries, engaging in e-business is a necessity. • Engaging in e-business in and of itself does not provide a competitive advantage. • However, e-business can be used to more effectively implement its basic strategy and enhance the effectiveness and efficiency of its value-chain activities.

  29. E-Business Success Factors • The degree to which e-business activities fit and support the organization’s overall business strategy. • The ability to guarantee that e-business processes satisfy the three key characteristics of any business transaction • Validity • Integrity • Privacy

  30. E-Business Success Factors • Implementation of an EDI must overcome the following threats: • Choosing an inappropriate technology • Unauthorized system access • Tapping into data transmission • Loss of data integrity • Incomplete transactions • System failures

  31. Encryption There are two principal types of encryption systems: • Single-key systems: Same key is used to encrypt and decrypt the message • Simple, fast, and efficient • Example: the Data Encryption Standard (DES) algorithm • Public Key Infrastructure (PKI): Uses two keys: • Public key is publicly available and usually used to encode message • Private key is kept secret and known only by the owner of that pair of keys. Usually used to decode message

  32. Types of Networks • The private portion can be further divided into two subsets: • Local area network (LAN) — a system of computers and other devices, such as printers, that are located in close proximity to each other. • Wide area network (WAN) — covers a wide geographic area.

  33. Types of Networks • What is an Intranet? • The term Intranet refers to internal networks that connect to the main Internet. • They can be navigated with the same browser software, but are closed off from the general public. • What are Extranets?

  34. Types of Networks • Companies build a virtual private network (VPN) to improve reliability and security, while still taking advantage of the Internet. Company A VPN equipment ISP AIS Internet

  35. Network Configuration Options • Local area networks (LANs) can be configured in one of three basic ways: • Star configuration • Ring configuration • Bus configuration

  36. Network Configuration Options • Wide area networks (WANs) can be configured in one of three basic ways: • Centralized system • Decentralized system • Distributed data processing

  37. Network Configuration Options • WAN Configuration: • Centralized • Decentralized • Distributed In a centralized WAN, all terminals and other devices are connected to a central corporate computer.

  38. File-Oriented Approach File # 1 Application program #1 Item A Item B Item C File # 2 Application program #2 Item B Item D Item E

  39. Database Approach Application program #1 Database Item A Item B Item C Item D Item E Application program #2 Database management system Application program #3

  40. Database Approach versus File-Oriented Approach • Minimum data redundancy • Fewer data inconsistencies • Standardized data format • No duplicated processing or storage • Allows cross-functional data analyses • Central data management / data security • Lower cost

  41. Databases • Database management system (DBMS) is the program that manages and controls access to the database. • Database system is the combination of the database, the DBMS, and the application program that uses the database. • Database administrator (DBA) is the person responsible for the database.

  42. Logical & Physical Views of Data A major advantage of database systems over file-oriented systems is that the database systems separate the logical and physical view of data: • Logical view: It is how the user or programmer conceptually organizes and understands the data. • Physical view: It refers to how and where the data are physically arranged and stored on disk, tape, CD-ROM, or other media. The DBMS controls the database so that users can access, query, or update it without reference to how or where the data are physically stored.

  43. Relational Databases • A data model is an abstract representation of the contents of a database. • The relational data model represents everything in the database as being stored in the form of tables. • Technically, these tables are called relations. • Each row in a relation, called a tuple, contains data about a specific occurrence of the type of entity represented by that table.

  44. Schemas • What are schemas? • A schema describes the logical structure of a database. • There are three levels of schemas: • Conceptual-level schema • External-level schema • Internal-level schema

  45. Schemas • Schema Levels: • Conceptual • External • Internal • The conceptual-level schema is an organization-wide view of the entire database. • The external-level schema consists of a set of individual user views of portions of the database, also referred to as a subschema. • The internal-level schema provides a low-level view of the database.

  46. The Data Dictionary • What is a data dictionary? • It contains information about the structure of the database. • For each data element stored in the database, such as the customer number, there is a corresponding record in the data dictionary describing it.

  47. Basic Requirements of the Relational Data Model • Primary keys must be unique. • Every foreign key must either be null or have a value corresponding to the value of a primary key in another relation. • Each column in a table must describe a characteristic of the object identified by the primary key. • Each column in a row must be single-valued. • The value in every row of a specific column must be of the same data type. • Neither column order nor row order is significant.

  48. Basic Subsystems in the AIS Financing Cycle Expenditure Cycle Human Resources General Ledger & Reporting System Production Cycle Revenue Cycle

  49. Revenue CycleBusiness Activities • What are the four basic revenue cycle business activities? • Sales order entry • Shipping • Billing and accounts receivable • Cash collections

  50. For each major business activity within a sub system, be able to identify: • Opportunities for Using Information Technology • Control Objectives, Threats, Exposures and Procedures • Information Needs and Procedures for sub system • See following Examples

More Related