Sei sulla pagina 1di 4

June 19, 2019 [ACCOUNTING INFORMATION SYSTEMS]

LESSON CODE: 000 STUDENT NAME:


SCHOOL/DEPARTMENT: BCP/BSAIS INSTRUCTOR: ALEJANDRE A. LORESCA JR.

ACCOUNTING INFORMATION SYSTEMS SYLLABUS Course Goals

Course Description
Upon successful completion, students should be able to:

1. Explain basic concepts of Accounting Information


Information technology plays a big role in the way an Systems, business processes and the application of Accounting
entity processes information. This course exposes the learners to Information Systems in businesses and organizations
computerized business system environment that integrates
bookkeeping, accounting, financial reporting, tax reporting and 2. Prepare and use information systems documentation
auditing. Learners will be exposed to the development standards techniques to understand and document information systems
and practices for accounting information systems and will gain
3. Explain how AIS are used to record and enable business
hands-on experience in the use of electronic software for business
processes and transaction processing
transaction processing, applying SAP and other business and
accounting software package. Learners assume the position of end-
4. Explain the basic database concepts and identify a
users and systems designer. Learners should be able to apply SAP
suitable strategy for selecting an AIS system for a business
and/or software in processing transactions from one functional area
to another and in generating and analyzing business and accounting 5. Critically evaluate internal controls, fraud, cybercrime
reports. and information system controls in a business

This course aims to provide students with an overall 6. Gain an understanding of and being up-to-date on
knowledge and understanding of accounting information systems contemporary issues (e.g. big data, cyber security, data analytics,
and implications of their use in modern business. The course XBRL, ERP etc.)
examines the application of accounting information systems in
business particularly in supporting strategic and operational 7. Use cloud accounting system (XERO) and visual analytics
decision-making and operations (e.g. transactions cycles including software (SAS VA)
revenue, expenditure etc.). The course also covers information
systems documentation techniques and how AIS are used to record
and enable business processes and transaction processing. The
Course Outline
course includes critical evaluation of internal controls, fraud,
cybercrime and information system controls in a business.
Contemporary issues including cyber security, big data and
information management are also covered. Students also get hands
on experience on using cloud based accounting software, XERO and I. Accounting Information Systems: An Overview
visual analytics software, SAS VA. a. Distinguish data from information, discuss the
characteristics of useful information, and explain
Prerequisites – There are no prerequisites for this course. how to determine the value of information.
b. Explain the decisions an organization makes and
the information needed to make them.
c. Identify the information that passes between
Program – BSAIS internal and external parties and an AIS.
d. Describe the major business processes present in
most companies.
e. Explain what an accounting information system
(AIS) is and describe its basic functions.

1 | BSAIS
June 19, 2019 [ACCOUNTING INFORMATION SYSTEMS]

f. Discuss how an AIS can add value to an a. Compare and contrast computer attack and
organization. abuse tactics.
g. Explain how an AIS and corporate strategy affect b. Explain how social engineering techniques are
each other. used to gain physical or logical access to
h. Explain the role an AIS plays in a company’s computer resources.
value chain. c. Describe the different types of malware used to
II. Overview of Transaction Processing and Enterprise harm computers.
Resource Planning Systems VII. Control and Accounting Information Systems
a. Describe the four parts of the data processing a. Explain basic control concepts and explain why
cycle and the major activities in each. computer control and security are important.
b. Describe documents and procedures used to b. Compare and contrast the COBIT, COSO, and
collect and process transaction data. ERM control frameworks.
c. Describe the ways information is stored in c. Describe the major elements in the internal
computer-based information systems. environment of a company.
d. Discuss the types of information that an AIS can d. Describe the four types of control objectives that
provide. companies need to set.
e. Discuss how organizations use enterprise e. Describe the events that affect uncertainty and
resource planning (ERP) systems to process the techniques used to identify them.
transactions and provide information. f. Explain how to assess and respond to risk using
III. Systems Documentation Techniques the Enterprise Risk Management (ERM) model.
a. Prepare and use data flow diagrams to g. Describe control activities commonly used in
understand, evaluate, and document companies.
information systems. h. Describe how to communicate information and
b. Prepare and use flowcharts to understand, monitor control processes in organizations.
evaluate, and document information systems. VIII. Controls for Information Security
c. Prepare and use business process diagrams to a. Explain how information security affects
understand, evaluate, and document information systems reliability.
information systems. b. Describe how a combination of preventive,
IV. Relational Databases detective, and corrective controls can be
a. Explain the importance and advantages of employed to provide reasonable assurance
databases, as well as the difference between about information security.
database systems and file-based legacy systems. IX. Confidentiality and Privacy Controls
b. Explain the difference between logical and a. Identify and explain controls designed to protect
physical views of a database. the confidentiality of sensitive corporate
c. Explain fundamental concepts of database information.
systems such as DBMS, schemas, the data b. Identify and explain controls designed to protect
dictionary, and DBMS languages. the privacy of personal information collected
d. Describe what a relational database is and how it from customers, employees, suppliers, or
organizes data. business partners.
e. Create a set of well-structured tables to store c. Explain how the two basic types of encryption
data in a relational database. systems work.
f. Perform simple queries using the Microsoft X. Processing Integrity and Availability Controls
Access database. a. Identify and explain controls designed to ensure
V. Computer Fraud processing integrity.
a. Explain the threats faced by modern information b. Identify and explain controls designed to ensure
systems. systems availability.
b. Define fraud and describe the process one XI. Auditing Computer-Based Information Systems
follows to perpetuate a fraud. a. Describe the scope and objectives of audit work,
c. Discuss who perpetrates fraud and why it occurs, and identify the major steps in the audit process.
including the pressures, opportunities, and b. Identify the six objectives of an information
rationalizations that are present in most frauds. system audit, and describe how the risk-based
d. Define computer fraud and discuss the different audit approach can be used to accomplish these
computer fraud classifications. objectives.
e. Explain how to prevent and detect computer c. Describe the different tools and techniques
fraud and abuse. auditors use to test software programs and
VI. Computer Fraud and Abuse Techniques program logic.
2 | BSAIS
June 19, 2019 [ACCOUNTING INFORMATION SYSTEMS]

d. Describe computer audit software, and explain c. Understand the implications of new IT
how it is used in the audit of an AIS. developments, such as XBRL, and changes in
e. Describe the nature and scope of an operational external reporting requirements, such as IFRS,
audit. for the design and operation of the general
XII. The Revenue Cycle: Sales to Cash Collections ledger and reporting system.
a. Describe the basic business activities and related d. Discuss how tools like responsibility accounting,
information processing operations performed in balanced scorecards, and graphs can be used to
the revenue cycle. provide information managers need to
b. Discuss the key decisions that need to be made effectively monitor performance.
in the revenue cycle, and identify the XVII. Database Design Using the REA Data Model
information needed to make those decisions. a. Discuss the steps for designing and
c. Identify major threats in the revenue cycle, and implementing a database system.
evaluate the adequacy of various control b. Use the REA data model to design an AIS
procedures for dealing with those threats. database.
XIII. The Expenditure Cycle: Purchasing to Cash Disbursements c. Draw an REA diagram of an AIS database.
a. Explain the basic business activities and related d. Read an REA diagram and explain what it reveals
information processing operations performed in about the business activities and policies of the
the expenditure cycle. organization being modeled.
b. Discuss the key decisions to be made in the XVIII. Implementing an REA Data Model in a Relational
expenditure cycle, and identify the information Database
needed to make those decisions. a. Integrate separate REA diagrams for individual
c. Identify major threats in the expenditure cycle, business cycles into a single, comprehensive
and evaluate the adequacy of various control organization-wide REA diagram.
procedures for dealing with those threats. b. Build a set of tables to implement an REA model
XIV. The Production Cycle of an AIS in a relational database.
a. Describe the major business activities and c. Explain how to write queries to retrieve
related information processing operations information from an AIS relational database built
performed in the production cycle. according to the REA data model.
b. Identify major threats in the production cycle XIX. Special Topics in REA Modeling
and evaluate the adequacy of various control a. Develop REA data models for a variety of
procedures for dealing with those threats. organizations besides retail stores.
c. Explain how a company’s cost accounting system b. Develop REA data models for the HR/payroll,
can help it achieve its manufacturing goals. manufacturing, and capital assets business
d. Discuss the key decisions that must be made in cycles.
the production cycle and identify the XX. Introduction to Systems Development; Systems Analysis
information required to make those decisions. a. Explain the five phases of the systems
XV. The Human Resources Management and Payroll Cycle development life cycle.
a. Describe the major business activities and b. Discuss the people involved in systems
related information processing operations development and the roles they play.
performed in the human resources management c. Explain the importance of systems development
(HRM)/payroll cycle. planning and describe planning techniques.
b. Discuss the key decisions to be made in the d. Discuss the various types of feasibility analysis
HRM/payroll cycle and identify the information and calculate economic feasibility.
needed to make those decisions. e. Explain why system changes trigger behavioral
c. Identify the major threats in the HRM/payroll reactions, what form this resistance to change
cycle and evaluate the adequacy of various takes, and how to avoid or minimize the
internal control procedures for dealing with resulting problems.
them. f. Discuss the key issues and steps in systems
XVI. General Ledger and Reporting System analysis.
a. Describe the information processing operations XXI. AIS Development Strategies
required to update the general ledger and to a. Describe how organizations purchase application
produce reports for internal and external users. software, vendor services, and hardware.
b. Identify the major threats in general ledger and b. Explain how information system departments
reporting activities and evaluate the adequacy of develop custom software.
various control procedures for dealing with c. Explain how end users develop, use, and control
them. computer-based information systems.
3 | BSAIS
June 19, 2019 [ACCOUNTING INFORMATION SYSTEMS]

d. Explain why organizations outsource their


information systems, and evaluate the benefits
and risks of this strategy.
e. Explain the principles and challenges of business
process management.
f. Describe how prototypes are used to develop an
AIS, and discuss the advantages and
disadvantages of doing so.
g. Explain what computer-aided software
engineering is and how it is used in systems
development.
XXII. Systems Design, Implementation, and Operation
a. Discuss the conceptual systems design process
and the activities in this phase.
b. Discuss the physical systems design process and
the activities in this phase.
c. Discuss the systems implementation and
conversion process and the activities in this
phase.
d. Discuss the systems operation and maintenance
process and the activities in this phase.

REFERENCES

http://wps.pearsoned.com/bp_romney_ais_13/244/62
562/16015892.cw/index.html

4 | BSAIS

Potrebbero piacerti anche