ACC 504 - Advanced Accounting Information Systems
Course Competencies
A1, 2010
The student will be able to:
1. identify in an organization, give appropriate examples
of, and clearly differentiate between Transaction Processing Systems (TPS),
Management Information Systems (MIS), Office Automation Systems (OAS), Decision
Support Systems (DSS), and Executive Support Systems (ESS). (1/lecture)
Types of Information
Systems
2. be familiar with the functional areas of a business, their principal activities and explain how functional systems relate to the types of systems in competency 1. (1)
3. recognize the types of transactions processed in each of the three transaction cycles. (2)
4. understand the differences between source, product and
turnaround documents and their relationship to journals, subsidiary ledgers and
the general ledger. (2)
Components of Accounting
TPS Systems
5. discuss the typical accounting records in a computer-based system and their inter-relationships. (2)
6. read, review, and prepare data flow diagrams and flow
charts with activity areas. (2)
The Use of
Systems Techniques
7. explain the advantages, disadvantages, and appropriate
situations for the use of batch and on-line input as well as batch and on-line
processing; provide specific examples and be able to diagram various
combinations and hybrids in accounting information systems. (2, lecture)
Batch & Online Input
& Processing
8. understand the basic ethical issues in IS, including
privacy the concept of information privacy, how this relates to security and
internal control, and conflicts between various individual rights. (3, lecture)
Gramm-Leach-Bliley Summary: TITLE V -- Privacy
Gramm-Leach-Bliley Act
OECD Guidelines on the
Protection of Privacy
Privacy
9. be familiar with the basic concept of internal control,
including control objectives, exposures, and risks. (3)
Accounting and Finance -
Typical Structure and Responsibilities
Common Business Exposures
Internal Control Process
Segregation
of Duties
10. explain the specific ways in which computer processing
(versus manual) increases exposure to undesirable events. (lecture)
Computers Increase
Exposures
11. discuss the COSO control framework, SAS78, SAS 70, SAS 94, COBIT, ERM, SOX 404, and other
related internal control issues. (3)
COSO
Framework
General Controls for TPS
12. describe each of the major control activities in
relation to accounting systems. (3)
Accounting Control
Activities
13. understand management and auditor responsibilities under SOX Sections 302 and 404. (15)
14. discuss IT governance and control issues and solutions.
(15)
IS Steering Committee
15. explain a variety of controls and approaches to ensure
security of an organization’s computer facilities. (15)
Types of IS Audits
16. identify various sources of disaster and continuity
risks and explain the concept of a business continuity plan and the key elements
of such a plan. (15, lecture)
Business Continuity Planning
Disaster Recovery Plan
for IS
17. discuss and relate specific types of active threats and
specific controls for such active threats. (16, lecture)
Threats to Computer
Systems
18. discuss and relate specific types of passive threats
and specific controls for such passive threats. (16, lecture)
Threats to Computer
Systems
Computer Application
Security Objectives
Levels of Computer
Security
19. discuss and relate specific types of network threats
and specific controls for such network threats. (16, lecture)
Threats to Computer
Systems
Internet E-Commerce -
Security Issues
Reducing Vulnerability to
Network Attacks In Small Business
Wireless Networks Pose
High Security Risks
20. explain the overall design of system security,
including the three levels of security, and security objectives. (lecture)
Computer Application
Security Objectives
Levels of Computer
Security
IS Physical Security
21. discuss the specific components of a JIT manufacturing system (quick-response in retailing) and their relationship to the various parts of the accounting system of the manufacturer, their vendor(s), and their customer(s). (lecture)
22. describe EDI (Electronic Data Interchange), including
what it is, the advantages and disadvantages, and when it would be appropriate
for an organization to use EDI. (16, lecture)
EDI
23. relate EDI to its impact on the specific types of
threats and appropriate control methods. (16, 4, lecture)
EDI Security Risks
Threats to Computer
Systems
24A. discuss the traditional systems development cycle.
(lecture)
Traditional Systems
Development Cycle
24B. understand the risks and controls in the areas of system development, program change, and source library areas. (17)
25. explain, and give examples, of a variety of methods of
implementing application controls in the input, processing, and output phases of
transaction processing. (17)
Threats to Computer
Systems
Computer Crime
Desktop Security
Suggestions
Evaluation of
Biometric Techniques
Top 10 IT Security
Mistakes
Types of Computer Fraud
Application Controls
Evaluation of
Biometric Techniques
Main
Edit Techniques
Objectives of
Application Controls
26. describe and evaluate various alternative audit
technologies. (17)
IS Auditing Technology
27. identify the functional departments involved in revenue cycle activities and trace the flow of revenue transactions through the organization. (4)
28. specify the documents, journals and accounts that provide audit trails, promote the maintenance of historical records, support internal decision making, and sustain financial reporting in revenue cycle activities. (4)
29. understand the risks associated with the revenue cycle and recognize the controls that reduce those risks. (4)
30. state the operational and control implications of technology used to automate and reengineer the revenue cycle. (4)
31. identify the functional departments involved in purchases and cash disbursements activities and trace the flow of revenue transactions through the organization. (5)
32. specify the documents, journals and accounts that provide audit trails, promote the maintenance of historical records, support internal decision making, and sustain financial reporting involved in purchases and cash disbursements activities. (5)
33. understand the risks associated with purchases and cash disbursements activities and recognize the controls that reduce those risks. (5)
34. state the operational and control implications of technology used to automate and reengineer purchases and cash disbursements activities. (5)
35. identify the functional departments involved in payroll and fixed asset activities and trace the flow of revenue transactions through the organization. (6)
36. specify the documents, journals and accounts that provide audit trails, promote the maintenance of historical records, support internal decision making, and sustain financial reporting involved in payroll and fixed asset activities. (6)
37. understand the risks associated with payroll and fixed asset activities and recognize the controls that reduce those risks. (6)
38. state the operational and control implications of technology used to automate and reengineer payroll and fixed assets. (6)
39. identify the functional departments involved in conversion cycle activities and trace the flow of revenue transactions through the organization. (7)
40. specify the documents, journals and accounts that provide audit trails, promote the maintenance of historical records, support internal decision making, and sustain financial reporting in conversion cycle activities. (7)
41. understand the risks associated with the conversion cycle and recognize the controls that reduce those risks. (7)
42. state the operational and control implications of technology used to automate and reengineer the conversion cycle. (7)
43. explain the concept of middleware, the major approaches to implementing middleware, and when middleware may be appropriate for an organization. (lecture)
44. define and explain the major components and functions
of Enterprise Resource Planning (ERP) systems. (7)
ERP - Enterprise Resource
Planning
45. define and explain the major components and functions
of Customer Relationship Management (CRM) systems and how the relate to other
enterprise systems. (lecture)
CRM - Customer
Relationship Management
46. describe the process by which a double-entry accounting
system would be designed and implemented. (lecture)
Process to Design an
Accounting System
47. understand the purpose of data coding and be able to
identify the respective features, advantages and disadvantages of the various
coding schemes. (8)
Common Coding Chart of
Accounts
48. describe the operational features and appropriate controls governing the GLS and FRS. (8)
49. understand the factors that influence the design of the MRS, including the elements of a responsibility accounting system. (8)
50. explain data mining, business analytics and business
intelligence systems, including their appropriate uses. (lecture)
Reporting,
Data Mining & Analytics
51. discuss current trends in accounting and information
systems as they relate to business. (lecture)
Change in IS Focus
52. discuss common software utilized in the accounting
function and by accounting firms. (lecture)
Office Automation Systems
Groupware
53. discuss various alternative system approaches including
Application Service Providers (ASP), Software as a Service (SaaS), service
bureaus, and online storage, including advantages and disadvantages of each and
when they may be appropriate. (lecture)
Application Service
Providers
54. describe image management (document processing),
including what it is, the advantages and disadvantages, and when it would be
appropriate for an organization to use. (lecture)
Records Management
Information, Records, and
Electronic Document Management
55. discuss the concepts of paperless tax, accounting and audit; including various technical, organizational, and practical issues. (lecture)
56. describe the concepts involved in virtual offices,
virtual workplaces, and outsourcing of accounting work, including various AICPA
and IRS regulations. (lecture)
Virtual Teams
Virtual Workplaces
57. explain the concept and purposes of data retention policies, including legal and regulatory requirements, as well as electronic discovery requirements. (lecture)
58. explain XBRL, data tagging,
meta data, and relate to financial accounting requirements. (lecture)
IASCF
Fundamentals of XBRL