ACC 504 - Advanced Accounting Information Systems
Course Competencies
A1, 20
11

The student will be able to:

1. identify in an organization, give appropriate examples of, and clearly differentiate between Transaction Processing Systems (TPS), Management Information Systems (MIS), Office Automation Systems (OAS), Decision Support Systems (DSS), and Executive Support Systems (ESS). (1/lecture)
        Types of Information Systems

2. be familiar with the functional areas of a business, their principal activities and explain how functional systems relate to the types of systems in competency 1. (1)

3. recognize the types of transactions processed in each of the three transaction cycles. (2)

4. understand the differences between source, product and turnaround documents and their relationship to journals, subsidiary ledgers and the general ledger. (2)
        Components of Accounting TPS Systems

5. discuss the typical accounting records in a computer-based system and their inter-relationships. (2)

6. read, review, and prepare data flow diagrams and flow charts with activity areas. (2)
        The Use of Systems Techniques
      
 Flow Charting Software

7. explain the advantages, disadvantages, and appropriate situations for the use of batch and on-line input as well as batch and on-line processing; provide specific examples and be able to diagram various combinations and hybrids in accounting information systems. (2, lecture)
        Batch & Online Input & Processing

8. understand the basic ethical issues in IS, including privacy the concept of information privacy, how this relates to security and internal control, and conflicts between various individual rights. (3, lecture)
        Gramm-Leach-Bliley Summary: TITLE V -- Privacy
        Gramm-Leach-Bliley Act
        OECD Guidelines on the Protection of Privacy
        Privacy

9. be familiar with the basic concept of internal control, including control objectives, exposures, and risks. (3)
        Accounting and Finance - Typical Structure and Responsibilities
        Common Business Exposures
        Internal Control Process
        Segregation of Duties

10. explain the specific ways in which computer processing (versus manual) increases exposure to undesirable events. (lecture)
        Computers Increase Exposures

11. discuss the COSO control framework, SAS 109 (AU 314), SSAE 16 (replaces SAS 70), historical SAS78 & SAS 94, COBIT, ERM, SOX 404, and other related internal control issues. (3)
        COSO Framework
        General Controls for TPS

        SAS 109 - AU 314
        SSAE 16

12. describe each of the major control activities in relation to accounting systems. (3)
        Accounting Control Activities

13. understand management and auditor responsibilities under SOX Sections 302 and 404. (15)

14. discuss IT governance and control issues and solutions. (15)
        IS Steering Committee

15. explain a variety of controls and approaches to ensure security of an organization’s computer facilities. (15)
        Types of IS Audits

16. identify various sources of disaster and continuity risks and explain the concept of a business continuity plan and the key elements of such a plan. (15, lecture)
       
Business Continuity Planning
        Disaster Recovery Plan for IS

17. discuss and relate specific types of active threats and specific controls for such active threats. (16, lecture)
        Threats to Computer Systems

18. discuss and relate specific types of passive threats and specific controls for such passive threats. (16, lecture)
        Threats to Computer Systems
        Computer Application Security Objectives
        Levels of Computer Security

19. discuss and relate specific types of network threats and specific controls for such network threats. (16, lecture)
        Threats to Computer Systems
        Internet E-Commerce - Security Issues
        Reducing Vulnerability to Network Attacks In Small Business
        Wireless Networks Pose High Security Risks

20. explain the overall design of system security, including the three levels of security, and security objectives. (lecture)
        Computer Application Security Objectives
        Levels of Computer Security
        IS Physical Security

21. discuss the specific components of a JIT manufacturing system (quick-response in retailing) and their relationship to the various parts of the accounting system of the manufacturer, their vendor(s), and their customer(s). (lecture)

22. describe EDI (Electronic Data Interchange), including what it is, the advantages and disadvantages, and when it would be appropriate for an organization to use EDI. (16, lecture)
        EDI

23. relate EDI to its impact on the specific types of threats and appropriate control methods. (16, 4, lecture)
        EDI Security Risks
        Threats to Computer Systems

24A. discuss the traditional systems development cycle. (lecture)
        Traditional Systems Development Cycle

24B. understand the risks and controls in the areas of system development, program change, and source library areas. (17)

25. explain, and give examples, of a variety of methods of implementing application controls in the input, processing, and output phases of transaction processing. (17)
        Threats to Computer Systems
        Computer Crime
        Desktop Security Suggestions
       
Evaluation of Biometric Techniques
        Top 10 IT Security Mistakes
        Types of Computer Fraud

        Application Controls
       
Evaluation of Biometric Techniques
        Main Edit Techniques
        Objectives of Application Controls

26. describe and evaluate various alternative audit technologies. (17)
        IS Auditing Technology

27. identify the functional departments involved in revenue cycle activities and trace the flow of revenue transactions through the organization. (4)

28. specify the documents, journals and accounts that provide audit trails, promote the maintenance of historical records, support internal decision making, and sustain financial reporting in revenue cycle activities. (4)

29. understand the risks associated with the revenue cycle and recognize the controls that reduce those risks. (4)

30. state the operational and control implications of technology used to automate and reengineer the revenue cycle. (4)

31. identify the functional departments involved in purchases and cash disbursements activities and trace the flow of revenue transactions through the organization. (5)

32. specify the documents, journals and accounts that provide audit trails, promote the maintenance of historical records, support internal decision making, and sustain financial reporting involved in purchases and cash disbursements activities. (5)

33. understand the risks associated with purchases and cash disbursements activities and recognize the controls that reduce those risks. (5)

34. state the operational and control implications of technology used to automate and reengineer purchases and cash disbursements activities. (5)

35. identify the functional departments involved in payroll and fixed asset activities and trace the flow of revenue transactions through the organization. (6)

36. specify the documents, journals and accounts that provide audit trails, promote the maintenance of historical records, support internal decision making, and sustain financial reporting involved in payroll and fixed asset activities. (6)

37. understand the risks associated with payroll and fixed asset activities and recognize the controls that reduce those risks. (6)

38. state the operational and control implications of technology used to automate and reengineer payroll and fixed assets. (6)

39. identify the functional departments involved in conversion cycle activities and trace the flow of revenue transactions through the organization. (7)

40. specify the documents, journals and accounts that provide audit trails, promote the maintenance of historical records, support internal decision making, and sustain financial reporting in conversion cycle activities. (7)

41. understand the risks associated with the conversion cycle and recognize the controls that reduce those risks. (7)

42. state the operational and control implications of technology used to automate and reengineer the conversion cycle. (7)

43. explain the concept of middleware, the major approaches to implementing middleware, and when middleware may be appropriate for an organization. (lecture)

44. define and explain the major components and functions of Enterprise Resource Planning (ERP) systems. (7)
        ERP - Enterprise Resource Planning

45. define and explain the major components and functions of Customer Relationship Management (CRM) systems and how the relate to other enterprise systems. (lecture)
        CRM - Customer Relationship Management

46. describe the process by which a double-entry accounting system would be designed and implemented. (lecture)
        Process to Design an Accounting System

47. understand the purpose of data coding and be able to identify the respective features, advantages and disadvantages of the various coding schemes. (8)
        Common Coding Chart of Accounts

48. describe the operational features and appropriate controls governing the GLS and FRS. (8)

49. understand the factors that influence the design of the MRS, including the elements of a responsibility accounting system. (8)

50. explain data mining, business analytics and business intelligence systems, including their appropriate uses. (lecture)
        Reporting, Data Mining & Analytics

51. discuss current trends in accounting and information systems as they relate to business. (lecture)
        Change in IS Focus

52. discuss common software utilized in the accounting function and by accounting firms. (lecture)
        Office Automation Systems
        Groupware

53. discuss various alternative system approaches including Application Service Providers (ASP), Software as a Service (SaaS), service bureaus, and online storage, including advantages and disadvantages of each and when they may be appropriate. (lecture)
        Application Service Providers

54. describe image management (document processing), including what it is, the advantages and disadvantages, and when it would be appropriate for an organization to use. (lecture)
        Records Management
        Information, Records, and Electronic Document Management

55. discuss the concepts of paperless tax, accounting and audit; including various technical, organizational, and practical issues. (lecture)

56. describe the concepts involved in virtual offices, virtual workplaces, and outsourcing of accounting work, including various AICPA and IRS regulations. (lecture)
        Virtual Teams
        Virtual Workplaces

57. explain the concept and purposes of data retention policies, including legal and regulatory requirements, as well as electronic discovery requirements. (lecture)

58. explain XBRL, data tagging, meta data, and relate to financial accounting requirements. (lecture)
    IASCF Fundamentals of XBRL

 - Last Revised 1/09/2011 -

Home

Main Page

Contact

Contact rkulzick@stu.edu with questions or comments about this web site.
Copyright © 2000-2011 Raymond S. Kulzick - Last modified: January 23, 2011