ACC 504 - Advanced Accounting Information Systems
Course Competencies
A1, 2008
The student will be able to:
1. identify in an organization, give appropriate examples of, and clearly differentiate
between Transaction Processing Systems (TPS), Management Information Systems (MIS), Office
Automation Systems (OAS), Decision Support Systems (DSS), and Executive Support Systems
(ESS). (1/lecture)
Types of Information
Systems
2. discuss various functional systems and explain how functional systems relate to the types of systems in competency 1. (1)
3. explain what is meant by internal control process, explain the three objectives, the
main approaches to this, and specific methods of implementation within the information
systems function. (1)
COSO
Framework
Internal Control Process
Segregation
of Duties
Not specific competencies:
Accounting and Finance -
Typical Structure and Responsibilities
Application Controls
General Controls in IS
IS Steering Committee
Objectives of
Application Controls
4. describe the three uses of systems techniques in auditing and the three uses in
systems development. (2)
The Use of Systems
Techniques
5. differentiate between flow charting, IPO/HIPO, logical data flow diagrams, and structured analysis. (2)
6. describe analytic, document, and forms distribution flowcharts. (2)
7. describe and give examples of appropriate uses for the major computer input, output,
and secondary storage devices. (3/lecture)
Types of Computers
PCs - Plus and Minus
Major Problems &
Issues With PCs
Hardware - Input
Hardware - Output
Hardware - Input/Output
Hardware - Storage
8. describe the major types of software, their functions and appropriate applications,
including the role and importance of the operating system. (3/lecture)
Types of Computer
Software
9. explain the various parts of a long distance communications network (WAN) and give
an example. (3/lecture)
Typical WAN Channel
Speeds
Wide Area Networks
10. describe the various parts of a local area network (LAN), discuss the advantages and
disadvantages of a LAN, and explain an example use of a LAN in a business. (3/lecture)
Local Area Networks
11. explain how the Internet functions, including servers, browsers, ISPs and e-mail;
advantages and disadvantages for business; major uses; and Internet, intranets &
extranets. (3/lecture)
Internet - Overview
How Business Generates
Value With the Internet
Internet Benefits to
Organizations
Business Concerns About the
Internet
Internet, Intranet,
Extranet
Not specific competencies:
Internet E-Commerce -
Security Issues
Individual Uses of the
Internet
12. discuss the basic components of transaction processing systems. (4)
Components of Accounting
TPS Systems
13. describe the process by which a double-entry accounting system would be designed
and implemented. (lecture)
Process to Design an
Accounting System
15. depict common coding systems that are used in transaction processing, with
particular emphasis on coding an organization's chart of accounts. (lecture)
Common Coding Chart of
Accounts
16. explain the concept of financial transparency, discuss
recent trends relating to transparency, including the Sarbanes-Oxley Act, and
relate this concept to information systems design. (4, lecture)
COSO
Framework
Sarbanes-Oxley: Impacts on Financial Transparency
16a. describe the concept of information privacy, how this
relates to security and internal control, and the trend in legal requirements in
the field of information privacy, including Gramm-Leach-Bliley. (4, lecture)
Gramm-Leach-Bliley Summary: TITLE V -- Privacy
Gramm-Leach-Bliley Act
OECD Guidelines on the
Protection of Privacy
Privacy
17. discuss the most common types of business exposures. (4)
Common Business Exposures
18. explain the specific ways in which computer processing (versus manual) increases
exposure to undesirable events. (4)
Computers Increase
Exposures
19. describe each of the major control activities in relation to accounting systems.
(4)
Accounting Control
Activities
20. explain, and give examples, of each of the general controls for transaction
processing and their relationship to SAS 78. (4)
General Controls for TPS
21. explain, and give examples, of a variety of methods of implementing application
controls in the input, processing, and output phases of transaction processing. (4)
Application Controls
Evaluation of
Biometric Techniques
Main
Edit Techniques
Objectives of
Application Controls
22. discuss and relate specific types of active threats and specific controls for such
active threats. (5)
Threats to Computer
Systems
Computer Crime
Desktop Security
Suggestions
Evaluation of
Biometric Techniques
Reducing Vulnerability to
Network Attacks In Small Business
Top 10 IT Security
Mistakes
Types of Computer Fraud
Wireless Networks Pose
High Security Risks
22A. explain the overall design of system security, including the three levels of
security, and security objectives. (lecture)
Computer Application
Security Objectives
Levels of Computer
Security
IS Physical Security
23. discuss and relate specific types of passive threats and specific controls for such
passive threats. (5)
Threats to Computer
Systems
Computer Application
Security Objectives
Levels of Computer
Security
23A. identify risks inherent in various types of business internet connections/uses and
specific control methods for such threats. (3/lecture)
Threats to Computer
Systems
Internet E-Commerce -
Security Issues
Reducing Vulnerability to
Network Attacks In Small Business
24. identify various sources of disaster risks and various components of a
business continuation and disaster
recovery plan. (5)
Business Continuity Planning
Disaster Recovery Plan
for IS
24a. explain the concept and purposes of data retention policies, including legal and regulatory requirements, as well as electronic discovery requirements. (lecture)
25. diagram and describe the major features and operations in each of the following application systems and the inter-relationships: order processing and accounts receivable. (7) (7-4A through 7-4G and related materials)
25a. diagram and describe the major features and operations in each of the following application systems and the inter-relationships: procurement, cash disbursements, human resources, and payroll. (8) (8-2A through 8-2G and related materials)
25b. provide an overview description of the flow of transaction data in a manufacturing firm. (9)
26. diagram and describe the major features and operations in each of the following application systems and their inter-relationships: production control, property accounting, and the systems in the preceding competencies. (9)
26a. define and explain the major components and functions of Enterprise Resource
Planning (ERP) systems. (7, 8, 9)
ERP - Enterprise Resource
Planning
26b. define and explain the major components and functions of Customer Relationship
Management (CRM) systems and how the relate to other enterprise systems. (lecture)
CRM - Customer
Relationship Management
26c. discuss various alternative system approaches
including Application Service Providers (ASP), Software as a Service (SaaS),
service bureaus, and online storage, including advantages and disadvantages of
each and when they may be appropriate. (lecture)
Reporting,
Data Mining & Analytics
26d. explain data mining, business analytics and business intelligence systems, including their appropriate uses. (lecture)
27. explain and list organizational advantages and disadvantages for various approaches
to distributing hardware, data, and IS personnel. (9, lecture)
Centralization/Decentralization
of IS People
Distributed Data Processing
Distributed Databases
28. relate various types of IS distributed environments to their impact on the specific
types of threats and appropriate control methods. (9, lecture)
Threats to Computer
Systems
29. describe EDI (Electronic Data Interchange), including what it is, the advantages
and disadvantages, and when it would be appropriate for an organization to use EDI. (9,
lecture)
EDI
30. relate EDI to its impact on the specific types of threats and appropriate control
methods. (9, lecture)
EDI Security Risks
Threats to Computer
Systems
31. explain the advantages, disadvantages, and appropriate situations for the use of
batch and on-line input as well as batch and on-line processing; provide specific examples
and be able to diagram various combinations and hybrids in accounting information systems.
(6, lecture)
Batch & Online Input
& Processing
31a. describe image management (document processing), including what it is, the
advantages and disadvantages, and when it would be appropriate for an organization to use.
(lecture)
Records Management
Information, Records, and
Electronic Document Management
31b. discuss the concepts of paperless tax, accounting and audit; including various technical, organizational, and practical issues. (lecture)
31c. describe the concepts involved in virtual offices, virtual workplaces, and outsourcing of accounting work, including various AICPA and IRS regulations. (lecture)
32. discuss the specific components of a quick-response retail system and their relationship to the various parts of the accounting system of the retailer and of their vendors. (lecture)
33. discuss the specific components of a JIT (quick-response) manufacturing system and their relationship to the various parts of the accounting system of the manufacturer, their vendors, and their customers. (9, lecture)
33a. discuss various office automation tools, including their appropriate uses.
(lecture)
Office Automation Systems
Groupware
34. distinguish between "auditing through the computer" and "auditing with the computer." (16)
35. describe and evaluate various alternative audit technologies. (16)
IS Auditing Technology
36. explain various types of IS audits. (16)
Types of IS Audits
37. discuss current trends in accounting and information systems as they relate to
business. (lecture)
Change in IS Focus
Application Service
Providers
Virtual Teams
Virtual Workplaces
38. discuss common software utilized in the accounting function and by accounting
firms. (lecture and projects)
Main Uses of PCs
40. explain what e-business is and its advantages and
disadvantages. (E1)
Levels of
E-Business
41. describe the major differences between e-business and a traditional business that affect the accounting system. (lecture)
42. explain the accounting and auditing issues and risks in
an e-business. (lecture)
E-Business Risks
Controlling E-Business Risks
43. differentiate between the basic e-business models and strategies, including when each would be appropriate. (lecture)
44. relate specific areas of information systems to their related GAAP and GAAS requirements, including SAS 70, 94 and 99, (both PCAOB and FASB/AICPA). (lecture)
45. explain XBRL, data tagging, meta data, and relate to
financial accounting requirements.
IASCF
Fundamentals of XBRL
- Last revised 1/25/2008 -