Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Data processing
1) Creating new data records, such as adding a newly hired employee to the
payroll database.
2) Reading, retrieving or viewing existing data.
3) Updating previously stored data
4) Deleting data, such as purging the vendor master file of all vendors the
company no longer does business with.
Information output
Information is usually presented in one of three forms:
Documents: Are records of transaction or other company data.
Reports: Are used by employees to control operational activities and by
managers to make decisions and to formulate business strategies.
Query: Is used to provide the information needed to deal with problems and
questions that need rapid action or answers.
Enterprise Resource Planning (ERP) Systems
In the book, an overview of an ERP system is shown in Figure 2-6 on page 56.
Basically there is a revenue cycle, expenditure cycle, production cycle, HR/Payroll
cycle and a general ledger and reporting system integrated in an ERP system.
Summary Chapter 4:
File: a set of related records such as all customer records,
Database: A set of interrelated, centrally coordinated files forms a database
Database management system (DBMS): Is the interface between the
database abd rge various application programs.
Data system: the database, the DBMS, and the application programs that
access the database through the DBMS are referred to as the database
system.
Database administrator (DBA): id responsible for the database.
Data warehousing: contains both detailed and summarized data for a
number of years and is used for analysis rather than transaction processing (it
is not unusual for data warehouses to contain hundreds of terabytes of data).
Data warehouses do not replace transaction processing databases they
compliment them by providing support to strategic decision making.
Business Intelligence: using a data warehouse for strategic decision
making id often referred to as business intelligence.
Two main techniques used in business intelligence:
- Online analytical processing (OLAP)
- Data mining
This cycle aims to provide goods and services to customers. Also, the cycle
enable company to collect cash in payment for those sales.
Primary Objective:
Provide the right product
Poor performance
Access controls
Encryption
Managerial reports
3. Billing
4. Cash
Collection
orders
Invalid orders
Uncollectible accounts
Stockouts or excess
inventory
Loss of customers
Credit limits
Managerial reports
Training
Periodic physical counts of inventory
Sales forecasts and activity reports
CRM systems, self-help Web sites, and proper evaluation of customer
service ratings
Shipping
The Sales Order Entry activity is consisting of two main steps which are
mentioned and illustrated below:
1. Picking and packing the order
2. Shipping the order
Shipping Threats
In order to ensure that the shipping
activity runs well, a company
needs to know the possible threats
that they may face such as:
Picking the wrong items or
the wrong quantity
Theft of inventory
Shipping Controls
After the possible threats are known, then it will be easier for a company to
control the whole shipping process by applying some regulations such as
mentioned below:
Bar-code and RFID technology
Billing
The Billing activity is consisting of two main steps which are mentioned and
illustrated below:
1. Invoicing
2. Updating accounts receivable
Billing Threats
In order to ensure that the billing
activity runs well, a company needs
to know the possible threats that
they may face such as:
Failure to bill
Billing errors
Billing Controls
After the possible threats are known, then it will be easier for a company to
control the whole billing process by applying some regulations such as
mentioned below:
Separation of billing and shipping functions
Cash Collection
The last activity in the revenue cycle will be the cash collection from the
customers. Although it is rather a simple activity, there are several threats for
a company to conduct this activity such as mentioned below.
Cash Collection Threats
In order to ensure that the cash collection activity runs well, a company needs
to know the possible threats that they may face such as:
Theft of cash
Having two people open all mail likely to contain customer payments
Product Design
Product design Threats
Poor product design resulting in excess costs
Product design controls
Accounting analysis of costs arising from product design choices
accounting Threats
Inaccurate cost data
Inappropriate allocation of overhead costs
Misleading reports
Cost
Accounting controls
Source data automation
Data processing integrity controls
Time-driven activity-based costing
Innovative performance metrics
Job-Order Costing
Assigns costs to specific production batches, or jobs
-If the product or service is uniquely identifiable
Process Costing
Assigns costs to each process, or work center, in the production
cycle, and then calculates the average cost for all units produced.
-If the product or service is similar and produced in mass
quantities
Activity-Based Costing
Traces costs to the activities that create them
Uses a greater number of overhead pools
-Batch
-Product
-Organization
Identifies cost drivers
Cause-and-effect relationship
Access controls
Encryption
Controls
Thorough documentation of
hiring, performance evaluation,
and dismissal procedures
Continuing education on
changes in employment laws
4. Prepare payroll
Threat
Errors in processing payroll
Controls
5. Disburse payroll
Threat
Theft or fraudulent distribution of
paychecks
Segregation of duties
(reconciliation of job-time
tickets to time
Controls
Untimely payments
Configuration of system to
make required payments using
current instructions from IRS
Configuration of system to
make required payments using
current instructions from IRS
Inaccurate payments