ACC 504 - Advanced Accounting Information Systems
Course Competencies
A1, 2008

The student will be able to:

1. identify in an organization, give appropriate examples of, and clearly differentiate between Transaction Processing Systems (TPS), Management Information Systems (MIS), Office Automation Systems (OAS), Decision Support Systems (DSS), and Executive Support Systems (ESS). (1/lecture)
        Types of Information Systems

2. discuss various functional systems and explain how functional systems relate to the types of systems in competency 1. (1)

3. explain what is meant by internal control process, explain the three objectives, the main approaches to this, and specific methods of implementation within the information systems function. (1)
        COSO Framework
        Internal Control Process
        Segregation of Duties
          Not specific competencies:

        Accounting and Finance - Typical Structure and Responsibilities
        Application Controls
        General Controls in IS
        IS Steering Committee
        Objectives of Application Controls

4. describe the three uses of systems techniques in auditing and the three uses in systems development. (2)
        The Use of Systems Techniques

5. differentiate between flow charting, IPO/HIPO, logical data flow diagrams, and structured analysis. (2)

6. describe analytic, document, and forms distribution flowcharts. (2)

7. describe and give examples of appropriate uses for the major computer input, output, and secondary storage devices. (3/lecture)
        Types of Computers
        PCs - Plus and Minus
        Major Problems & Issues With PCs
        Hardware - Input
        Hardware - Output
        Hardware - Input/Output
        Hardware - Storage

8. describe the major types of software, their functions and appropriate applications, including the role and importance of the operating system. (3/lecture)
        Types of Computer Software

9. explain the various parts of a long distance communications network (WAN) and give an example. (3/lecture)
        Typical WAN Channel Speeds
        Wide Area Networks

10. describe the various parts of a local area network (LAN), discuss the advantages and disadvantages of a LAN, and explain an example use of a LAN in a business. (3/lecture)
        Local Area Networks

11. explain how the Internet functions, including servers, browsers, ISPs and e-mail; advantages and disadvantages for business; major uses; and Internet, intranets & extranets. (3/lecture)
        Internet - Overview
        How Business Generates Value With the Internet
        Internet Benefits to Organizations
        Business Concerns About the Internet
        Internet, Intranet, Extranet

          Not specific competencies:

        Internet E-Commerce - Security Issues
        Individual Uses of the Internet

12. discuss the basic components of transaction processing systems. (4)
        Components of Accounting TPS Systems

13. describe the process by which a double-entry accounting system would be designed and implemented. (lecture)
        Process to Design an Accounting System

15. depict common coding systems that are used in transaction processing, with particular emphasis on coding an organization's chart of accounts. (lecture)
        Common Coding Chart of Accounts

16. explain the concept of financial transparency, discuss recent trends relating to transparency, including the Sarbanes-Oxley Act, and relate this concept to information systems design. (4, lecture)
        COSO Framework
        Sarbanes-Oxley: Impacts on Financial Transparency

16a. describe the concept of information privacy, how this relates to security and internal control, and the trend in legal requirements in the field of information privacy, including Gramm-Leach-Bliley. (4, lecture)
        Gramm-Leach-Bliley Summary: TITLE V -- Privacy
        Gramm-Leach-Bliley Act
        OECD Guidelines on the Protection of Privacy
        Privacy

17. discuss the most common types of business exposures. (4)
        Common Business Exposures

18. explain the specific ways in which computer processing (versus manual) increases exposure to undesirable events. (4)
        Computers Increase Exposures

19. describe each of the major control activities in relation to accounting systems. (4)
        Accounting Control Activities

20. explain, and give examples, of each of the general controls for transaction processing and their relationship to SAS 78. (4)
        General Controls for TPS

21. explain, and give examples, of a variety of methods of implementing application controls in the input, processing, and output phases of transaction processing. (4)
        Application Controls
       
Evaluation of Biometric Techniques
        Main Edit Techniques
        Objectives of Application Controls

22. discuss and relate specific types of active threats and specific controls for such active threats. (5)
        Threats to Computer Systems
        Computer Crime
        Desktop Security Suggestions
       
Evaluation of Biometric Techniques
        Reducing Vulnerability to Network Attacks In Small Business
        Top 10 IT Security Mistakes
        Types of Computer Fraud
        Wireless Networks Pose High Security Risks

22A. explain the overall design of system security, including the three levels of security, and security objectives. (lecture)
        Computer Application Security Objectives
        Levels of Computer Security
        IS Physical Security

23. discuss and relate specific types of passive threats and specific controls for such passive threats. (5)
        Threats to Computer Systems
        Computer Application Security Objectives
        Levels of Computer Security

23A. identify risks inherent in various types of business internet connections/uses and specific control methods for such threats. (3/lecture)
        Threats to Computer Systems
        Internet E-Commerce - Security Issues
        Reducing Vulnerability to Network Attacks In Small Business

24. identify various sources of disaster risks and various components of a business continuation and disaster recovery plan. (5)
       
Business Continuity Planning
        Disaster Recovery Plan for IS

24a. explain the concept and purposes of data retention policies, including legal and regulatory requirements, as well as electronic discovery requirements. (lecture)

25. diagram and describe the major features and operations in each of the following application systems and the inter-relationships: order processing and accounts receivable. (7) (7-4A through 7-4G and related materials)

25a. diagram and describe the major features and operations in each of the following application systems and the inter-relationships: procurement, cash disbursements, human resources, and payroll. (8) (8-2A through 8-2G and related materials)

25b. provide an overview description of the flow of transaction data in a manufacturing firm. (9)

26. diagram and describe the major features and operations in each of the following application systems and their inter-relationships: production control, property accounting, and the systems in the preceding competencies. (9)

26a. define and explain the major components and functions of Enterprise Resource Planning (ERP) systems. (7, 8, 9)
        ERP - Enterprise Resource Planning

26b. define and explain the major components and functions of Customer Relationship Management (CRM) systems and how the relate to other enterprise systems. (lecture)
        CRM - Customer Relationship Management

26c. discuss various alternative system approaches including Application Service Providers (ASP), Software as a Service (SaaS), service bureaus, and online storage, including advantages and disadvantages of each and when they may be appropriate. (lecture)
        Reporting, Data Mining & Analytics

26d. explain data mining, business analytics and business intelligence systems, including their appropriate uses. (lecture)

27. explain and list organizational advantages and disadvantages for various approaches to distributing hardware, data, and IS personnel. (9, lecture)
        Centralization/Decentralization of IS People
        Distributed Data Processing
        Distributed Databases

28. relate various types of IS distributed environments to their impact on the specific types of threats and appropriate control methods. (9, lecture)
        Threats to Computer Systems

29. describe EDI (Electronic Data Interchange), including what it is, the advantages and disadvantages, and when it would be appropriate for an organization to use EDI. (9, lecture)
        EDI

30. relate EDI to its impact on the specific types of threats and appropriate control methods. (9, lecture)
        EDI Security Risks
        Threats to Computer Systems

31. explain the advantages, disadvantages, and appropriate situations for the use of batch and on-line input as well as batch and on-line processing; provide specific examples and be able to diagram various combinations and hybrids in accounting information systems. (6, lecture)
        Batch & Online Input & Processing

31a. describe image management (document processing), including what it is, the advantages and disadvantages, and when it would be appropriate for an organization to use. (lecture)
        Records Management
        Information, Records, and Electronic Document Management

31b. discuss the concepts of paperless tax, accounting and audit; including various technical, organizational, and practical issues. (lecture)

31c. describe the concepts involved in virtual offices, virtual workplaces, and outsourcing of accounting work, including various AICPA and IRS regulations. (lecture)

32. discuss the specific components of a quick-response retail system and their relationship to the various parts of the accounting system of the retailer and of their vendors. (lecture)

33. discuss the specific components of a JIT (quick-response) manufacturing system and their relationship to the various parts of the accounting system of the manufacturer, their vendors, and their customers. (9, lecture)

33a. discuss various office automation tools, including their appropriate uses. (lecture)
        Office Automation Systems
        Groupware

34. distinguish between "auditing through the computer" and "auditing with the computer." (16)

35. describe and evaluate various alternative audit technologies. (16)
        IS Auditing Technology

36. explain various types of IS audits. (16)
        Types of IS Audits

37. discuss current trends in accounting and information systems as they relate to business. (lecture)
        Change in IS Focus
        Application Service Providers
        Virtual Teams
        Virtual Workplaces

38. discuss common software utilized in the accounting function and by accounting firms. (lecture and projects)
        Main Uses of PCs

40. explain what e-business is and its advantages and disadvantages. (E1)
        Levels of E-Business

41. describe the major differences between e-business and a traditional business that affect the accounting system. (lecture)

42. explain the accounting and auditing issues and risks in an e-business. (lecture)
    E-Business Risks
    Controlling E-Business Risks

43. differentiate between the basic e-business models and strategies, including when each would be appropriate. (lecture)

44. relate specific areas of information systems to their related GAAP and GAAS requirements, including SAS 70, 94 and 99, (both PCAOB and FASB/AICPA). (lecture)

45. explain XBRL, data tagging, meta data, and relate to financial accounting requirements.
    IASCF Fundamentals of XBRL

 - Last revised 1/25/2008 -

Home

Main Page

Contact

Contact rkulzick@stu.edu with questions or comments about this web site.
Copyright © 2000-2008 Raymond S. Kulzick - Last modified: September 13, 2008