Solutions Manual For
Accounting Information Systems 15th Edition, Global Edition
Marshall B. Romney Paul John Steinbart Scott L. Summers David A. Wood
CHAPTER 1 ACCOUNTING INFORMATION SYSTEMS: AN OVERVIEW SUGGESTED ANSWERS TO DISCUSSION QUESTIONS 1.1
Discuss the concept of a system and the issues of goal conflict and goal congruence. A system is a set of two or more components that are somehow interrelated and interact together to achieve a specific goal. A system usually consists of smaller components called subsystems. These subsystems have specific and defined functions, which interact with and support the larger system. The concept of systems is key to information technology and AIS. All systems, including the AIS, must work to achieve one or more organizational goals. Goal conflict results when a decision or action of a subsystem is inconsistent with another subsystem or the system (organization) as a whole. Goal congruence results when a subsystem achieves its goals while contributing to the organization's overall goal. Subsystems should maximize organizational goals.
1.2
Give an example of how an AIS can improve decision making and describe the multistep activities involved in the process. Decision making is a complex, multistep activity: identify the problem, collect and interpret information, evaluate ways to solve the problem, select a solution methodology, and implement the solution. An AIS can provide assistance in all phases of decision making. Reports can help to identify potential problems. Decision models and analytical tools can be provided to users. Query languages can gather relevant data to help make the decision. Various tools, such as graphical interfaces, can help the decision maker interpret decision model results, evaluate them, and choose among alternative courses of action. In addition, the AIS can provide feedback on the results of actions.
An AIS can help improve decision making in several ways:
It can identify situations requiring management action. For example, a cost report with a large variance might stimulate management to investigate and, if necessary, take corrective action. It can reduce uncertainty and thereby provide a basis for choosing among alternative actions. It can store information about the results of previous decisions, which provides valuable feedback that can be used to improve future decisions. For example, if a company tries a particular marketing strategy and the information gathered indicates that it did not succeed, the company can use that information to select a different marketing strategy. It can provide accurate information in a timely manner. For example, Walmart has an enormous database that contains detailed information about sales transactions at each of its stores. It uses this information to optimize the amount of each product carried at each store. It can analyze sales data to discover items that are purchased together and can use such information to improve the layout of merchandise or to encourage additional sales of related items. For example, Amazon uses its sales database to suggest additional books for customers to purchase.
1-1 .
Ch. 1: Accounting Information Systems: An Overview
1.3
A software company in Munich is organizing a competition, inviting business ideas that promote the use of smartphone technology to conduct business. You enter your business plan, an initiative to involve unemployed teenagers and young adults from local communities to generate business and employment, and it was so well received that you were awarded a special prize of €5,000. You plan on using your prize money to implement your idea. a. Identify key decisions you need to make, the information you require to make these key decisions, and the five major business processes you need to engage in. b. Identify the external parties with whom you would need to exchange information and specify the information you will receive from these parties and the information that you will send to these parties. The author uses this as a class discussion: the typical process the author follows is that students work through the content of a chapter before it is covered in class. Students are required to answer questions (such as this one) and submit it before the lecture. The author then assesses the answers, and, based on problems identified within the answers, the lecture content would be determined. Students are thus required to complete the questions before coming to the class. In class, the students are divided into small groups (about 4 – 5 students per group). Each small group has to come to some consensus about the answers that they will present to the class. The groups could be randomly allocated, or the groups could be based on similarity in initial ideas. A group is then selected (or a group can volunteer) to present their answers to the class. Since all students have had the opportunity to engage with the content prior to the presentation in class, there should be meaningful contributions and discussions about how the presented solutions could be improved. Answers will vary, but the main aim is to get students to understand (for part a) how the business processes, key decisions, and information needs are all intertwined (as shown in Table 1-2). This then links to the external parties (part b) in Figure 1-1. Since the scenario indicated the use of mobile phones to conduct business, students should ideally relate their answers to some form of retail (buying / selling of goods / services).
1-2 .
Accounting Information Systems 15e, GE
1.4
How do an organization’s business processes and lines of business affect the design of its AIS? Give several examples of how differences among organizations are reflected in their AIS. An organization’s AIS must reflect its business processes and its line of business. For example:
1.5
Manufacturing companies will need a set of procedures and documents for the production cycle; non-manufacturing companies do not. Government agencies need procedures to track separately all inflows and outflows from various funds, to ensure that legal requirements about the use of specific funds are followed. Financial institutions do not need extensive inventory control systems. Passenger service companies (e.g., airlines, bus, and trains) generally receive payments in advance of providing services. Therefore, extensive billing and accounts receivable procedures are not needed; instead, they must develop procedures to account for prepaid revenue. Construction firms typically receive payments at regular intervals, based on the percentage of work completed. Thus, their revenue cycles must be designed to track carefully all work performed and the amount of work remaining to be done. Service companies (e.g., public accounting and law firms) do not sell physical goods and, therefore, do not need inventory control systems. They must develop and maintain detailed records of the work performed for each customer to provide backup for the amounts billed. Tracking individual employee time is especially important for these firms because labor is the major cost component.
Figure 1-5 shows that organizational culture and the design of an AIS influence one another. What does this imply about the degree to which an innovative system developed by one company can be transferred to another company? Since people are one of the basic components of any system, it will always be difficult to transfer successfully a specific information systems design intact to another organization. Considering in advance how aspects of the new organizational culture are likely to affect acceptance of the system can increase the chances for successful transfer. Doing so may enable the organization to take steps to mitigate likely causes of resistance. The design of an AIS, however, itself can influence and change an organization’s culture and philosophy. Therefore, with adequate top management support, implementation of a new AIS can be used as a vehicle to change an organization. The reciprocal effects of technology and organizational culture on one another, however, mean that it is unrealistic to expect that the introduction of a new AIS will produce the same results observed in another organization.
1-3 .
Ch. 1: Accounting Information Systems: An Overview
1.6
Why are accounting software packages designed with separate transaction modules? Since every organization does not necessarily use all of the transaction cycles in its operations, it is to the advantage of the organization to be able to “pick and choose” from among various software modules that track and record different transaction cycles. For example, a law firm would have no need to implement a production cycle module. Also, the nature of a transaction cycle varies across the broad spectrum of business organizations. Again, a law firm would have a revenue cycle, but it would not involve the purchase, receipt, and payment for products or merchandise; likewise, a retail store chain may not sell any consulting services to its customers.
1.7
Apply the value chain concept to S&S. Explain how it would perform the various primary and support activities. The value chain classifies business activities into two categories: primary and support. The five primary activities at S&S: a. Inbound logistics includes all processes involved in ordering, receiving, and temporarily storing merchandise that is going to be sold to S&S customers. b. S&S does not manufacture any goods, thus its operations activities consists of displaying merchandise for sale and protecting it from theft. c. Outbound logistics includes delivering the products to the customer. d. Sales & marketing includes ringing up and processing all sales transactions and advertising products to increase sales. e. Service includes repairs, periodic maintenance, and all other post-sales services offered to customers. The four support activities at S&S: a. Firm infrastructure includes the accounting, finance, legal, and general administration functions required to start and maintain a business. b. Human resource management includes recruiting, hiring, training, evaluating, compensating, and dismissing employees. c. Technology includes all investments in computer technology and various input/output devices, such as point-of-sale scanners. It also includes all support activities for the technology. d. Purchasing includes all processes involved in identifying and selecting vendors to supply goods and negotiating the best prices, terms, and support from those suppliers.
1-4 .
Accounting Information Systems 15e, GE
1.8
Information technology enables organizations to easily collect large amounts of information about employees. Discuss the following issues: These questions involve traditional economic cost/benefit issues and less well-defined ethical issues. a. To what extent should management monitor employees’ e-mail? Generally, the courts have held that organizations have the right to monitor employees’ email. Such monitoring can have disastrous effects on employee morale, however. On the other hand, it might provide legitimate information about group members’ individual contributions and productivity. b. To what extent should management monitor which Web sites employees visit? Students are likely to argue whether or not this should be done. One potential benefit that could be argued is the likelihood that if employees are aware that they will be monitored they will be less prone to surf the Web for non-work-related uses. c. To what extent should management monitor employee performance by, for example, using software to track keystrokes per hour or some other unit of time? If such information is collected, how should it be used? Arguments pro and con can be generated about the effects of such monitoring on performance and on morale. Clearly, the specifics of any incentive schemes tied to such metrics are important. d. Should companies use software to electronically “shred” all traces of e-mail? Arguments can be raised on both sides of this issue. Try to get students to go beyond the legal ramifications of recent news stories and to explore the ethical implications of destroying different kinds of email. e. Under what circumstances and to whom is it appropriate for a company to distribute information it collects about the people who visit its Web site? Direct students to the guidelines followed by organizations that certify how various web sites use the information they collect. Students are likely to make the argument that personal information is inherently private and sacrosanct. To challenge that view, ask them about the legitimacy of developing and maintaining a reputation. Doesn’t that involve the divulgence and sharing of personal information among strangers? Ask the class if it is feasible (or undesirable) to totally prevent or prohibit such sharing of information. The instructor should also refer the students to GAPP, as one of its criteria concerns sharing information with 3rd parties. The instructor and the students could read the GAPP criterion about sharing data together, and then discuss what they think. Remind the students that GAPP is not regulatory law – just recommended best practice.
1-5 .
Ch. 1: Accounting Information Systems: An Overview
SUGGESTED ANSWERS TO THE PROBLEMS 1.1
IT is changing the nature of accounting and the role of accountants. Write a two-page report describing what you think will be the nature and the value of the accounting function in a large company in the future. Numerous answers are possible. Several articles addressing this topic have appeared in Strategic Finance and the Journal of Accountancy.
1.2
The annual report is considered by some to be the single most important printed document that companies produce. In recent years, annual reports have become large documents. They now include such sections as letters to the stockholders, descriptions of the business, operating highlights, financial review, management discussion and analysis, a discussion of company internal controls, segment reporting, inflation data, and the basic financial statements. The expansion has been due in part to a general increase in the degree of sophistication and complexity in accounting standards and disclosure requirements for financial reporting. The expansion also is reflective of the change in the composition and level of sophistication of users. Current users include not only stockholders but also financial and securities analysts, potential investors, lending institutions, stockbrokers, customers, employees, and—whether the reporting company likes it or not—competitors. Thus, a report originally designed as a device for communicating basic financial information now attempts to meet the diverse needs of an ever-expanding audience. Users hold conflicting views on the value of annual reports. Some argue that they fail to provide enough information, whereas others believe disclosures in annual reports have expanded to the point where they create information overload. Others argue that the future of most companies depends on acceptance by the investing public and by its customers; therefore, companies should take this opportunity to communicate well-defined corporate strategies. Adapted from the CMA Examination a. Identify and discuss the basic factors of communication that must be considered in the presentation of the annual report. The annual report is a one-way communication device. This requires an emphasis on clarity and conciseness because there is no immediate feedback from the readers as to what messages they are receiving. The preparer must attempt to identify the users/audience of the report, and to determine their values, beliefs, and needs. Then the preparer can determine the language, i.e., words and phrases that would be appropriate and familiar to the users/audience. The preparer must also consider the organization of the material in the report. Logical ordering and attractive formatting facilitate the transmission of ideas. b. Discuss the communication problems a corporation faces in preparing the annual report that result from the diversity of the users.
1-6 .
Accounting Information Systems 15e, GE
The different users of annual reports have differing information needs, backgrounds, and abilities. For some users, the annual report may serve as an introduction to the company and/or the only significant information about the company. By using the report to communicate to all users, the problems the corporation faces include the following.
In an attempt to reach several audiences, a company may include information for each audience. Consequently, the annual report may grow in size and complexity to the point where it contains more information than many users want to receive or are able to comprehend, i.e., information overload. In some cases, technical concepts may be reduced to concepts that are more common; this reduces precision and conciseness thereby leading to more generalizations.
Care must be taken in the presentation of information. Words and phrases familiar to one user group may not be understood by those in other user groups. Graphic displays that are meaningful to some may be meaningless to others.
c. Select two types of information found in an annual report, other than the financial statements and accompanying footnotes, and describe how they are helpful to the users of annual reports. Other than the financial statements and accompanying footnotes, an annual report provides information concerning
Management's discussion and analysis of results. Organizational objectives, strategies, and management's outlook for the future. Board of Directors members and the officers and top management of the organization. Segment data and performance information. New initiatives and research information. Recent stock price history and stock information.
Students will have many and varied answers as to how the information is helpful, which should lead to a rich class discussion. This discussion can be combined with the discussion of part e. d. Discuss at least two advantages and two disadvantages of stating well-defined corporate strategies in the annual report. Stating well-defined corporate strategies in a company's annual report accomplishes the following: Advantages: Communicates the company's plan for the future and resolves any disparate issues. Provides a vehicle for communicating the company's strengths. Builds investor confidence and portrays a positive image. Disadvantages: Locks management into fulfilling stated objectives and strategies, causing inflexibility. Communicates to unintended users who could put the company at risk (i.e., competitors).
1-7 .
Ch. 1: Accounting Information Systems: An Overview
e. Evaluate the effectiveness of annual reports in fulfilling the information needs of the following current and potential users: shareholders, creditors, employees, customers, and financial analysts Annual reports fulfill users' information needs as discussed below. 1. Shareholders. Annual reports meet the statutory requirement that publicly held corporations are to report annually to stockholders and report on the stewardship of management to both current and potential stockholders. The annual report gives shareholders financial and operating information such as income from operations, earnings per share, the Balance Sheet, Cash Flow Statement, and related footnote disclosure that potential shareholders need to evaluate the risks of and potential returns on investment. However, the volume of data presented in annual reports can result in information overload that reduces the value of the reports. Confusion can result from reducing technical concepts to common concepts or by the presentation of duplicate messages by different forms of media. 2. Creditors. The annual report of public companies provides financial information as well as trend information. This allows creditors to project financial solvency and to evaluate the company’s ability to repay loans. 3. Employees. The annual report gives the employees information such as a description of the company's pension plan and the employee stock incentive plan. This gives employees a base from which to compare their benefits program to those of other companies. Annual reports also provide employees with a year-end review of the results to which they have contributed during the year. In this sense, the annual report provides reinforcement and rewards. The annual report also informs or reminds employees of the organization's values and objectives and sensitizes them to the aspects of the organization with which they are not familiar. On the other hand, the employee already knows how the organization is performing so the annual report does not provide any substantive additional information. 4. Customers. The annual report provides customers with trend information and management performance information. They can use this to assess the company's past and current performance. 5. Financial analysts. The set of audited comparative financial statements provides the basis for analysis done by financial analysts. Notes, which are an integral part of the statements, describe or explain various items in the statements, present additional detail, or summarize significant accounting policies. Financial analysts are the most sophisticated class of users of annual reports. However, some data may be too condensed. Analysts may also need information in addition to that provided in annual reports to facilitate their analyses. f.
Annual reports are public and accessible to anyone, including competitors. Discuss how this affects decisions about what information should be provided in annual reports. Management may omit information entirely from the annual report or disguise it because competitors have access to annual reports. The objective of reporting should be to reveal as much as possible without giving away proprietary information or a competitive edge.
1-8 .
Accounting Information Systems 15e, GE
1.3
Alexander Forbes, a diversified financial services organization, is one of the major financial services organizations in Africa, providing financial solutions to individual and corporate customers. Their services include retirement planning, asset and wealth management, medical insurance, and consulting. Headquartered in Johannesburg, South Africa, the company has operations in eight regions across sub-Saharan Africa and the Channel Islands, employing over 3,000 people. It reported operating income of ZAR 3,647 million (South African rand) for the year 2017–18. In recent years, Alexander Forbes has embarked on simplifying the company structure to enable better collaboration across divisions. One of the structural changes was the separation of the technology function from the operations function to create an information technology (IT) function as a revenue-generating cluster. The IT function is responsible for modernizing systems to provide, among other services, a single customer view. This made it possible for Alexander Forbes to use IT as a strategic tool. One of the ways in which this is being achieved is the company’s health insurance services. The company keeps track of its customers in an integrated database so that customer care representatives are able to handle queries and transactions for customers across all healthcare products. The database tracks all claims submitted by their customers, including visits made by healthcare professionals, medication, procedures, and treatments. In case of prescriptions for which cheaper options, often in the form of generic alternatives, are available, customers are immediately informed via text message to their mobile phones. However, it is often found that customers prefer the more expensive medication rather than the generic alternative. A record of co-payment is maintained on the database for such customers since the company does not cover the full cost of relatively expensive medication. All claims submitted by customers are digitized and can be easily retrieved if any queries arise. Customers can also access their historical records through the company’s website. Customers can install the company’s mobile application to submit claims and check their status. a. Why should Alexander Forbes collect data on the drugs that are prescribed? What could the company do with this data? The benefits a company realizes from gathering and storing data should be greater than the cost of collecting the data. Since customers will submit their claims anyway, the company has access to all the claim data, so there should not be no additional costs incurred for gathering data. The biggest cost incurred would be for storing the data, followed by the processing and aggregating of the data. Alexander Forbes could share the collected, processed data with pharmaceutical companies as well as pharmacies / dispensaries to show trends in the types of medication prescribed over time. This would assist the pharmaceutical companies with their production schedules, and it would assist pharmacies / dispensaries in having accurate stock levels.
1-9 .
Ch. 1: Accounting Information Systems: An Overview
b. Although customers are informed of cheaper generic alternatives to expensive medication, many customers opt for the more latter even though they have to make a co-payment. How can Alexander Forbes use its AIS to persuade pharmacies to encourage customers to opt for the more affordable generic alternatives? The company could publish summary figures on the types of medication dispensed and the copayments incurred by customers at the different dispensing groups, thus demonstrating to the public where medication might be more affordable. Another influence could be that pharmacies / dispensaries could use the information to more aggressively promote cheaper alternatives. c. How does digitizing the claims add value to the organization? Digitizing the claims adds value since the business process is streamlined and queries can be handled more effectively and efficiently. It is no longer necessary for customer representatives to search manually through paper documents – searches can be done electronically. It is easy to lose paper documents (for example separate pages of claims or payments made) or to misfile paper documents in incorrect folders. These issues with paper documents resulted in delays when issues had to be resolved. With digitized documents, it is much easier to search for information and resolve issues, as documents are rarely missing or misfiled. Customer service representatives can easily access all required information while the representative is talking to the customer over the phone (or while handling queries online / via the mobile application). d. How does the mobile application add value to the organization? The mobile application allows customers to submit claims and query anything at any time and any place that suits them. Customers can scan (or take a picture) of a claim whenever it is convenient for the customer – the customer is not restricted to specific times and locations. The customer does not have to visit a branch or get to a post office to either deliver or send off claim documentation. Queries can be handled via the application too – the customer need not phone a customer service representative and have a conversation – the customer can handle queries online and can search through claims and communication history because the integrated database makes this information available to both the customer and the customer representative. e. Use the Internet to find other IT improvements that Alexander Forbes has introduced outside of their healthcare division. Write a short paragraph on each new application or other newsworthy item you find. Students should be able to find newsworthy items that might be of interest. Here are some interesting articles – not necessarily all positive news, but newsworthy nonetheless. Ensure that the links are still active before sharing them with students. https://www.dimensiondata.com/en/insights/case-studies/2015/11/alexander-forbes https://www.businesslive.co.za/bd/companies/financial-services/2018-12-11-failed-it-upgradedrags-alexander-forbes-into-a-loss/
1-10 .
Accounting Information Systems 15e, GE
https://www.moneyweb.co.za/moneyweb-radio/cancelled-it-project-impacts-alexander-forbesinterims/
1.4
I
Match the description in the right column with the correct information characteristic in the left column. 1. Access restricted
E 2. Accurate B 3. Available H 4. Reputable D 5.Complete K 6. Concise L 7. Consistent M 8. Current N 9. Objective F 10. Relevant G 11. Timely
J 12. Useable A 13. Understandable C 14. Verifiable
1.5
a. A report was carefully designed so that its data was easily comprehended by the reader. b. A manager working on the weekend needed information about a customer’s production requests and found it on the company’s network. c. Before production reports are accepted, two clerks working independently must produce the same information. d. An accounts receivable aging report included all customer accounts. e. A report was checked by three different people to make sure it was correct. f. An accounts receivable aging report is used in credit-granting decisions. g. An accounts receivable aging report was received before the credit manager had to decide whether to extend credit to a customer. h. Needing help with a decision, a manager sought the opinion of a highly regarded expert. i. To protect intellectual property, a company encrypted the data, stored it in a very secure facility, and limited its use to five people. j. Tired of keying supplier prices into a database, a purchasing manager insisted the data be sent in machine readable form. k. After a lengthy, rambling presentation, a CEO insisted future presentations contain only pertinent facts and last no more than 30 minutes. l. A new manager insisted that monthly reports look the same so she could compare a new month’s results to previous months. m. After making a decision based on outdated data, a new CFO required all analysis to be conducted with up-to-date data. n. Reluctant to rely on his personal feelings about a decision, a manager sought the opinion of an outside expert.
EC Coaches is a privately held, medium-sized company that operates a fleet of luxury coaches, semi-luxury and commuter buses, and a variety of luxury and standard vehicles. Ranging from five to 60 seaters, these vehicles are leased to tour operators, universities, schools, charitable organizations, and other businesses. To protect their investment in their vehicles and ensure that they provide their customers with vehicles in immaculate condition, EC Coaches has a maintenance facility where they do basic repairs and maintenance on their vehicles. Scheduled vehicle services are handled by agents according to the maintenance plans agreed at the time of purchase of the vehicle.
1-11 .
Ch. 1: Accounting Information Systems: An Overview
You were recently hired by EC Coaches and you are eager to demonstrate your worth to the company. Your supervisor asked you to prepare an accounts payable aging report as of the end of the year for use in the upcoming audit of the company’s financial statements. Student solutions will vary based on their background and education. The following are possible solutions. a. What is an accounts payable aging report? An accounts payable aging report lists outstanding supplier / vendor account balances by the length of time outstanding. For example, in this case, this is a list of all agents with whom maintenance plans are agreed with the outstanding balances owed to them, as well as the length of time the balances had been outstanding. b. Why is an accounts payable aging report needed for an audit? An accounts payable aging report is needed during an audit to determine which invoices are due and which invoices are overdue. Whenever the report is scrutinized, it is important to remember that not all supplier payment terms are the same – some may, for example, be that payment is made after 60 days, then invoices listed in the “before 60 days” column is not overdue yet. c. What is an accounts payable aging report used for in normal company operations? An accounts payable aging report is used in normal company operations to provide information for: Identifying major creditors – how much the business owes each creditor, and how long the outstanding balance has been owed. Monitoring expenses – this helps with managing the cash flow of the business. Identifying obligations that are due – and when those are due. Makes budgeting, and ultimately financial stability, possible, as expenses and obligations can be identified and managed. d. What data will you need to prepare the report? To prepare an accounts payable aging report, all credit purchases from suppliers are needed – this information can be obtained from invoices indicating the amount outstanding, the length of time the balance had been outstanding, and the due date for payment.
e. Where will you collect the data you need to prepare the report? The data needed to prepare the accounts payable aging report can be collected from the purchase transactions, cash disbursement files, and cash disbursement tables. f.
How will you collect the necessary data for the report?
1-12 .
Accounting Information Systems 15e, GE
If the data is in machine-readable form, it can be collected by preparing and running programs or queries that will extract the purchases and cash payment data. If the data is maintained on paper, it can be collected from daily or monthly purchase reports and daily or monthly cash disbursements reports. g. What will the report look like (i.e., how will you organize the data collected to create the information your supervisor needs for the audit)? Prepare an accounts payable aging report template in Excel or another spreadsheet software. The accounts receivable aging report should look something like the following, whether it is prepared on paper or in Excel: Supplier Number
Supplier Name
0-30 Days Outstanding
31-60 Days Outstanding
61-90 Days Outstanding
91+ Days Outstanding
h. How will you distribute the report? How many copies will you make? Who should receive the copies? What security features will you implement? The accounts payable aging report should be restricted to employees with operational or authoritative responsibility for supplier accounts, such as the accounts payable clerk and the controller. If the report is in an electronic form, access to the report should be restricted to appropriate authorized personnel. If the report is distributed on paper, only as many copies as necessary should be produced and they should be delivered in a manner that ensures the confidentiality of the data. Security features could include placing the report on a passwordprotected server or encrypting the file prior to emailing it or placing it on a server.
1.6
Albert Heijn (or AH) is arguably the largest retail chain in Europe, owning supermarkets, convenience stores, and online shopping services in food and other goods. AH prides itself on establishing the first modern supermarkets. Founded in 1887 in Oostzaan, the Netherlands, Albert Heijn grew from a humble grocery store to a chain of supermarkets. Its first supermarket was established in 1952 and, over the decades, AH has been the shopping destination of choice for the majority of the people living in the Netherlands, Belgium, and other European countries. The chain comprises more than 850 stores, including more than 200 franchisees. AH is known for being an early adopter of information technology and has been one of the first supermarkets to take on a loyalty-card program. Customers can avail of a discount with a card called ‘Bonuskaart’ in Dutch. It is issued to them after their personal information is entered into a database. This provides AH with a mine of information about its customers. It utilizes this information to expand its business and push sales. a. What kind of information do you think AH gathers?
1-13 .
Ch. 1: Accounting Information Systems: An Overview
The Bonuskaart application filled out in the store captures data such as customer names, addresses, household size, ages of children, dietary preferences, and income levels.
When the Bonuskaart is used to qualify for the discounts, Albert Heijn computers record everything a customer purchases.
b. How do you think the AH has motivated its customers to sign up for the bonus card program?
It offers merchandise discounts to customers who sign up and gives card users a point for every pound spent. Points can be used to reduce the price of future purchases or exchanged for frequent flier miles.
Big spenders are sent special promotions.
c. What can the AH accomplish with the data it collects? Think in terms of strategy and competitive advantage.
Customized Coupons and promotions. Albert Heijn analyzes customer purchases and customizes its marketing based on the results. Quarterly, Albert Heijn mails active Bonuskaart customers three coupons for frequently purchased items and three coupons for items they are likely to buy or that Albert Heijn wants them to try. Albert Heijn is so good at understanding their customer’s tastes and preferences that their coupons are 10 to 15 times more likely to be used than other coupons. The quarterly mailing also contains vouchers that allow members to redeem their accumulated points. Some 95% of all vouchers are redeemed.
Cross marketing. Analysis of customer data allows Albert Heijn to discover unique buying habits. For example, men who purchased diapers for newborns buy more beer than the normal male – presumably because they are more likely to stay at home and less likely to go out.
Improved decision-making. Albert Heijn has been able to make better decisions and set better company goals than ever before. Using data on purchases and the ethnic makeup of the neighborhoods surrounding the stores, Albert Heijn is able to stock goods that have greater customer appeal. For example, Albert Heijn noticed that customers in a small store in a South Asian and Arab part of town were not buying complete meals. They went elsewhere to buy certain staple foods and Asian brands. Further analysis led to the decision to replace the small store with a Supercenter that offered more than 800 foreign products. It included a halal butcher shop, the latest movies from India, Arabic and Asian
1-14 .
Accounting Information Systems 15e, GE
newspapers, and an Indian jewelry counter. Albert Heijn also redesigned its shopping carts to handle the bulk purchases of its customers more easily.
Customer loyalty. Albert Heijn used Bonuskaart data to neutralize Wal-Mart’s most significant advantage. Albert Heijn identified 300 items that price-sensitive shoppers frequently purchased and lowered their prices. This kept the customers most likely to shop at Walmart from defecting.
New product rollouts. Analysis of Bonuskaart data showed that affluent customers were not buying certain products like fruit, cheese, and wine. This led to the introduction of a premium quality brand, “Albert Heijn’s Finest,” that successfully attracted affluent customers. Customer data also allows Albert Heijn to figure out quickly how new initiatives are working. For example, when Albert Heijn rolled out ethnic foods for Indians and Pakistanis, data analysis showed that white affluent customers were also buying the products. The rollout was quickly expanded to include them.
Improved supplier relationships. Outside companies are taking advantage of Albert Heijn’s data to improve their decision-making. When Kimberly-Clark introduced a premium toilet paper, it used Bonuskaart data to track who purchased it and who continued to purchase it. Further analysis showed that those who bought the toilet paper also were big buyers of skin-care products. This allowed Kimberly-Clark to develop a marketing program that offered free beauty treatments to those who continued to buy the toilet paper.
d. What could be some of the disadvantages of the card program? Some critics believe that loyalty card programs
1.7
Are too expensive to maintain and that companies can buy data to achieve similar results for less than the loyalty program costs. Slow down checkout lines. Are a threat to the customer’s privacy.
Match each of the following terms with its definition.
1. _J__ Accounting information system 2. _P__ Artificial intelligence 3. _Y__ Blockchain 4. _D__ Business processes 5. _R__ Data
a. Exceeding the amount of information a human mind can absorb and process b. Use of software and algorithms to find and solve problems and improve business performance c. The benefit provided by information minus the cost of producing it d. A set of activities and tasks that help accomplish a specific organizational goal e. An agreement to exchange goods or services in exchange for cash 1-15 .
Ch. 1: Accounting Information Systems: An Overview
6. _B__ Data analytics 7. _U__ Data dashboard 8. _N__ Expenditure cycle 9. _X__ General ledger and reporting system 10. _G__ Give-get exchange 11. _Z_ Goal congruence 12. _T__ Information 13. _O__ Machinereadable 14. _I__ Primary activities 15. _S_ Production cycle 16. _H__ Revenue cycle 17. _M__ Supply chain 18. _L__ Support activities 19. _Q__ System 20. _E__ Transaction 21. _K__ Value chain 22. _C__ Value of information
f. Process of capturing, processing, and storing transaction data for later use and for producing information output g. Frequent exchanges such as surrendering cash for inventory and paying employees for labor h. Activities associated with selling goods and services in exchange for cash or a future promise of cash i. Value chain activities that produce, market, and deliver products to customers and provide post-delivery support j. A system that collects, records, stores, and processes data to produce information for decision makers k. Linking all the primary and support activities in a business l. Activities such as firm infrastructure and technology that enable main activities to be performed efficiently and effectively m. An organization’s value chain as well as its vendors, distributors, and customers n. Activities associated with purchasing inventory for resale for cash or a promise to pay cash o. Data in a format that can be processed by a computer p. Computer systems that simulate human intelligence processes such as learning, reasoning, and self-improvement q. Procedures and routines that carry out specific activities, achieve objectives, or solve problems r. Facts collected, recorded, stored, and processed by an information system s. Activities associated with using labor, raw materials, and equipment to produce finished goods t. Organized and processed data that provide meaning and improve decision making u. Display of data points and performance indicators in easily understood charts, tables, or gauges v. Activities associated with hiring, compensating, promoting, and terminating employees w. Major give-get exchanges that occur frequently in most companies x. Information-processing operations involved in preparing reports for internal and external parties y. Individual digital records linked using cryptography in a single list called a chain z. A subsystem achieves its goals while contributing to the overall goal
1.8. Classify each of the following items as belonging in the revenue, expenditure, human resources/payroll, production, or financing cycle. a. b. c. d.
Pay pay-as-you-earn (PAYE) payroll taxes–Expenditure Cycle Send material requisition to inventory–Production Cycle Issue stock to investors–Financing Cycle Borrow money from the bank to purchase a new factory – Financing Cycle
1-16 .
Accounting Information Systems 15e, GE e. Complete receiving report – Expenditure Cycle f. Appoint replacement purchasing clerk Human Resources / Payroll Cycle g. Measure employee performance using a performance management system – Human Resources / Payroll Cycle h. Choose suitable supplier of raw materials – Expenditure Cycle i. Ensure employees are up to date with the latest tax provisions – Human resources / Payroll Cycle j. Record personal and tax information for new employees – Human Resources / Payroll Cycle k. Determine labor needs for the next production run – Production Cycle l. Create purchase requisition – Expenditure Cycle m. Transfer employee contribution to medical aid – Human Resources /Payroll Cycle n. Update work-in-progress file to accumulate cost data – Production Cycle o. Process sales returns – Revenue Cycle p. Prepare a bill of materials – Production Cycle q. Extract sold goods from the warehouse – Revenue Cycle r. Approve payment after receiving all inventory on receiving report – Expenditure Cycle s. Manage dividend payments – Financing Cycle t. Confirm hours worked on automated timekeeping system – Human Resources / Payroll Cycle u. Send unsettled customer accounts to collection agency – Revenue Cycle v. Pay interest on loan required to buy new factory – Financing Cycle w. Prepare a purchase order – Expenditure Cycle
1-17 .
CHAPTER 2 OVERVIEW OF TRANSACTION PROCESSING AND ENTERPRISE RESOURCE PLANNING SYSTEMS SUGGESTED ANSWERS TO DISCUSSION QUESTIONS 2.1
Table 2-1 lists some of the documents used in the revenue, expenditure, and human resources cycle. What kinds of input or output documents or forms would you find in the production (also referred to as the conversion cycle)? Students will not know the names of the documents, but they should be able to identify the tasks about which information needs to be gathered. Here are some of those tasks
2.2
Requests for items to be produced Documents to plan production Schedule of items to be produced List of items produced, including quantity and quality Form to allocate costs to products Form to collect time spent on production jobs Form requesting raw materials for production process Documents showing how much raw materials are on hand Documents showing how much raw materials went into production List of production processes List of items needed to produce each product Documents to control movement of goods from one location to another
Give three examples each of the advantages and the disadvantages of an ERP system with a centralized database. How you can increase the change of a successful ERP implementation? An ERP system, with its centralized database, provides significant advantages: An ERP provides an integrated, enterprise-wide, single view of the organization’s data and financial situation. Storing all corporate information in a single database breaks down barriers between departments and streamlines the flow of information. Data input is captured or keyed once, rather than multiple times, as it is entered into different systems. Downloading data from one system to another is no longer needed. Management gains greater visibility into every area of the enterprise and greater monitoring capabilities. Employees are more productive and efficient because they can quickly gather data from both inside and outside their own department. ERP systems also have significant disadvantages: Cost. ERP hardware, software, and consulting costs range from $50 to $500 million for a Fortune 500 company and upgrades can cost $50 million to $100 million. Midsized companies spend between $10 and $20 million. 2-1 .
Ch. 2: Overview of Transaction Processing and Enterprise Resource Planning Systems
Amount of time required. It can take years to select and fully implement an ERP system, depending on business size, number of modules to be implemented, degree of customization, the scope of the change, and how well the customer takes ownership of the project. As a result, ERP implementations have a very high risk of project failure. Changes to business processes. Unless a company wants to spend time and money customizing modules, they must adapt to standardized business processes as opposed to adapting the ERP package to existing company processes. The failure to map current business processes to existing ERP software is a main cause of ERP project failures.
Reaping the potential benefits of ERP systems and mitigating their disadvantages requires conscious effort and involvement by top management. Top management’s commitment to and support for the necessary changes greatly increase the chances of success. Because ERP systems are complex and expensive, choosing one is not an easy task. In doing so, you must take great care to ensure that the ERP system has a module for every critical company process and that you are not paying for software modules that you do not need. One way to choose a suitable system is to select a package designed for your industry. Although cost is a huge concern, buying too cheaply can cost more in the long run if the system does not meet your needs, because modification costs can be quite high. You can minimize the risk of buying the wrong package by researching the best ERP vendors. There are many ERP vendors, the two largest being SAP and Oracle. Other leading vendors are The Sage Group, Microsoft, and Infor. Because it is too difficult for most companies to implement ERP software by themselves, they often hire an ERP vendor or a consulting company to do it for them. These firms usually provide three types of services: consulting, customization, and support. For most midsized companies, implementation costs range from the list price of the ERP user licenses to twice that amount. Large companies with multiple sites often spend three to five times the cost of the user license. Because many processes automatically trigger additional actions in other modules, proper configuration is essential. This requires a sound understanding of all major business processes and their interactions so they can be defined. Examples include setting up cost/profit centers, credit approval policies, and purchase approval rules. In the configuration process, companies balance the way they want the system to operate with the way it lets them operate. If the way an ERP module operates is unacceptable, the company can modify the module. Alternatively, it can use an existing system and build interfaces between it and the ERP system. Both options are time consuming, costly, and result in fewer system integration benefits. In addition, the more customized a system becomes, the more difficult it is to communicate with suppliers and customers. To make configuration easier, ERP vendors are developing built-in “configuration” tools to address most customers’ needs for system changes. The importance of sound internal controls in an ERP cannot be overstated. The integrated nature of ERP systems means that unless every data item is validated and checked for accuracy at the time of initial entry, errors will automatically propagate throughout the system. Thus, data entry controls and access controls are essential. Most managers and employees see and have access to only a small portion of the system. This segregation of duties 2-2 .
Accounting Information Systems 15e, GE
provides sound internal control. It is important to separate responsibility for custody of assets, authorization of activities that affect those assets, and recording information about activities and the status of organizational assets.
2.3
What is the purpose of turnaround documents? Give examples of how companies use turnaround documents. Answers may vary. Companies typically use turnaround documents to enable cheap, fast, accurate data input. Turnaround documents also enable separation of duties, where a document is printed in one functional area and then used in another. Examples of turnaround documents include picking tickets and packing slips. The picking ticket is printed in a separate area, and it includes all the items that need to be sent off to a customer (that is, what the customer has ordered). Ideally, the picking ticket should match the packing slip (what is actually sent off to the customer, which may or may not match the picking slip – in cases where products are not available or are on back order, the picking ticket and packing slip will be different).
2.4
Discuss the guidelines for a better coding system. Explain why these guidelines are important, and what would happen if they are not met. The following guidelines result in a better coding system. The code should:
2.5
Be consistent with its intended use, which requires that the code designer determine desired system outputs prior to selecting the code. Allow for growth. For example, don’t use a three-digit employee code for a fastgrowing company with 950 employees. Be as simple as possible to minimize costs, facilitate memorization and interpretation, and ensure employee acceptance. Be consistent with the company’s organizational structure and across the company’s divisions.
Some accounting students believe that they do not need to study information systems to be good accountants. What are the disadvantages of this point of view? What are the advantages of accountants being involved in designing and preparing reports that measure more than just financial performance? The accountant would not have a holistic understanding of the organization and would be focused purely on financial performance measures Without being able to consider the possible improvements in effectiveness and efficiency of the accounting processes, an accountant would not have a holistic understanding of the organization and would be focused purely on financial performance measures. The organization would be impacted negatively, as the accounting processes might not be improved in terms of effectiveness and efficiency. Managers would not be able to make informed decisions as it is possible 2-3 .
Ch. 2: Overview of Transaction Processing and Enterprise Resource Planning Systems
that the managers would not have access to reliable, up-to-date information as and when that information is required – managers might have to wait for periodic reports to address issues, and by the time the reports are made available, the issue might be completely out of hand. Being able to create reports as and when required (for example via a database query) could potentially prevent such events – but the accountant needs to have the know-how in terms of what is possible from the information system’s side. By virtue of the nature of their training, accountants are trained how to design systems that will maximize the reliability of the information that is produced by these systems. Accountants also need to be aware of potential threats to the reliability of the information that is produced and the best measures available to mitigate those threats. Without training in information systems, it is possible that accountants may not be made aware of potential threats and the measures needed to handle these threats.
2-4 .
Accounting Information Systems 15e, GE
SUGGESTED ANSWERS TO THE PROBLEMS 2.1
The chart of accounts must be tailored to an organization’s specific needs. Discuss how the chart of accounts for the following organizations would differ from the one presented for S&S in Table 2-2. Some of the changes in the chart of accounts for each type of entity include the following: a.
b.
c.
University
No equity or summary drawing accounts. Instead, have a fund balances section for each type of fund.
Several types of funds, with a separate chart of accounts for each. The current fund is used for operating expenses, but not capital expenditures. Loan funds are used to account for scholarships and loans. Endowment funds are used to account for resources obtained from specific donors, generally with the objective that principal be preserved, and that income be used for a specific purpose. Plant funds are used for major capital expenditures. Most fund categories would be further divided into restricted and unrestricted categories.
Unlikely to have Notes Receivable but may have Accounts Receivable for students who pay tuition in installment payments.
Tuition and fees would be one source of revenue. Others include gifts, investment income, sales of services, and, for public universities, state appropriations.
Student loans are an asset; student deposits are a liability.
Bank
Loans to customers would be an asset, some current others noncurrent, depending upon the length of the loan.
No inventory
Customer accounts would be liabilities.
Classification of revenue would be among loans, investments, service charges, etc.
No cost of goods sold.
Government Unit
No equity or summary drawing accounts. Instead, have fund balances.
Balance sheet shows two major categories: (1) assets and (2) liabilities and fund equity.
Separate chart of accounts for each fund (general fund, special revenue fund, capital projects fund, and debt service fund).
Revenue and expenditure accounts would be grouped by purpose (e.g., police, highways, sanitation, education, etc.). 2-5 .
Ch. 2: Overview of Transaction Processing and Enterprise Resource Planning Systems
d.
Encumbrance accounts
Revenues would include taxes, licenses and permits, fines, and charges for specific services.
Taxes receivable as a separate category due to importance.
No cost of goods sold.
Manufacturing Company Several types of inventory accounts (raw materials, work-in-process, and finished goods).
e.
Expansion of S&S
2.2
Additional digits to code revenues and expenses by products and to code assets/liabilities by divisions.
Additional digits to code: Revenues and expenses by products and by stores Assets/liabilities by stores.
Steven Young is the controller of Seoul-based DMCA, a company that designs and manufactures specialized equipment. The company has five major operating divisions, mechanical design, electrical design, machine manufacturing, part manufacturing, and installation. The sales from each of the divisions ranged between ₩750,000 and ₩5 million (South Korean won) in the previous financial year. Each of the divisions is independent, both physically and managerially, except for the continuous surveillance of the company’s founder, Xolani Ncube. The AIS for each division evolved according to the needs and the abilities of its accounting staff. Young is the first controller to have responsibility for overall financial management. As Young will be retiring in five years, Ncube wants Young to improve the AIS so that it will be easier to monitor the performance of each division. Young decided to include the following features in the financial reporting system: • Managers should receive uniform, timely, and accurate reports of all business activities in each division. The uniform monthly reports across divisions should be completed by the fifth day of the following month to provide sufficient time for corrective action (if required) to affect the performance of the next month. Companywide financial reports should be available at the same time. • Reports should provide a basis for measuring the return on investment for each division. In addition to revenue and expense accounts, reports should therefore also show assets assigned to each division. • Meaningful budget data, required for planning and decision-making purposes, should also be generated. Budgets should reflect managerial responsibility and it should show costs for the major product groups. • Young believes that a new chart of accounts would be required to incorporate the
2-6 .
Accounting Information Systems 15e, GE
newly included features. He wants to divide financial statement accounts into major categories, such as assets, liabilities, revenue, and equity. He foresees a need for a maximum of 15 control accounts within each of the categories. From his observations to date, he estimates that 75 subsidiary accounts will be more than adequate for each control account. • Each division has a maximum of five major product groups. A minimum of ten cost centers within any product group is required, including both the operating and nonoperating groups. Young views general divisional costs as a non-revenueproducing product group. According to Young’s estimation, 40 expense accounts and nine specific variance accounts would be adequate. Design a chart of accounts for DMCA. Explain how you structured the chart of accounts to meet the needs of the company and the company’s operating characteristics. Keep total account code length to a minimum, while still satisfying Young’s requirements. A six-digit code (represented by letters ABCDEF) is sufficient to meet SDC’s needs: A This digit identifies the 5 divisions and the corporate office. B This digit represents major account types (asset, liability, equity, revenue, expense). C This digit represents the major classification within account type: For balance sheet accounts, this represents specific sub-categories (current assets, plant and equipment, etc.), as only six categories are needed. For expense and revenue accounts, this digit represents the product group, as again there are only five products plus general costs. D This digit represents specific accounts or cost centers: For balance sheet accounts, this is the control account; two digits are required because the problem indicates a maximum of 15 categories. For expense accounts, this is the cost center; two digits are required because the problem indicates a minimum of ten cost centers. EF These two digits represent the subsidiary accounts and natural expense categories: For expense accounts, these represent the 49 natural expense categories and variances for each cost center. For the balance sheet, these two digits accommodate up to 99 subsidiary accounts.
2.3
The purpose of an audit trail is to be able to trace a transaction from its origin through source documents to the final output or backwards from the final output to the original source documents to prove the accuracy and validity of ledger postings. Describe in detail the audit trail for the following in a manufacturing business: a. Shipping an order to a customer b. Customer returns defective goods c. Employee payroll for employee wages (using time cards or time sheets) The purpose of an audit trail is to be able to trace a transaction from its origin on source documents to the final output or backwards from the final output to the original source documents to prove the accuracy and validity of ledger postings. Describe in detail the audit trail for the following in a manufacturing business: 2-7 .
Ch. 2: Overview of Transaction Processing and Enterprise Resource Planning Systems
a. Shipping an order to a customer The audit trail for shipping an order to a customer needs to link the sales order to the picking ticket (to identify the products and the quantity of each product). Ordered inventory should correspond to what is documented on the picking ticket and documentation signed off by both the warehouse (from where the inventory was released) and the shipping department (from where the items will be sent to the customer) should correspond in terms of the number and identities of customers that placed the order, items, and quantities. The sales order should be linked to the waybill and the packing slip at the shipping department to be able to track that billing and accounts receivable have the correct amount due by the customer. The waybill and packing slip should be linked to the courier company responsible for the delivery of the appropriate goods to the customer as indicated on the sales order. Inventory needs to be reduced by the quantities as indicated on the picking ticket (not the sales order, as there may be items on back order). b. Customers returning defective goods The audit trail for customers who return defective goods needs to link the sales order to the goods received note at the receiving department to verify that the goods that were returned were actually purchased by the specific customer, and that the goods were actually returned. A credit memo is then linked to the customer’s account (accounts receivable) to adjust the customer balance with the amount indicated on the credit memo. c. Employee payroll for employee wages (using time cards or time sheets) The audit trail for the employee payroll for employee wages where employees need to complete time cards or time sheets links the records of all employee activities that are recorded on time cards or time sheets to the checks or electronic payments related to each employee. 2.4
Your IT company deals in laptops, desktops, and servers. You also sell computer parts like hard drives and motherboards. Design a coding scheme for your company. Grading depends upon the instructor’s judgment about the quality of the coding scheme. The coding scheme should be either a group or block coding. In addition, the student’s solutions should provide sufficient detail in order to determine whether the solution represents a group or block coding scheme.
2.5
Match the following terms with their definitions __i___ 1. attribute __c___ 2. audit trail __t___ 3. batch processing __y___ 4. block code __d___ 5. chart of accounts __u___ 6. coding 2-8 .
Accounting Information Systems 15e, GE __z___ 7. control account __j___ 8. data processing cycle __e___ 9. data value __r___ 10. database __k___ 11. entity __f___ 12. field __h___ 13. general journal __a___ 14. general ledger __s___ 15. group code __l___ 16. master file __v___ 17. mnemonic code __o___ 18. real-time processing __x___ 19. record __b___ 20. sequence code __p___ 21. source data automation __w___ 22. source documents __q___ 23. specialized journal __m___ 24. subsidiary ledger __n___ 25. transaction file __g___ 26. turnaround documents
2.6
Identify which data processing method (batch or real-time) would be required for the following scenarios: a. Prepare weekly payroll checks – Batch b. Purchase goods from an online (e-commerce) store – Online, real-time c. Prepare daily bank deposits – Batch d. Prepare municipality bills for water and electricity – Batch e. Make a cash withdrawal at an ATM – Online, real-time f. Purchase bus tickets online – Online, real-time g. Transfer money to your mother via money transfer at the local grocery store – Online, real-time h. Purchase clothing from your favorite retail outlet at the local mall – Batch
2.7
On their websites, you will find several online demonstrations for the SAP and Oracle ERP systems. Visit these websites and explore their content by doing the following:
2-9 .
Ch. 2: Overview of Transaction Processing and Enterprise Resource Planning Systems
a. Search the SAP site for corporate videos, and watch two of them. Explore the industries, services, solutions, and platforms that SAP offers. Read several of the articles, such as the ones about customer successes. b. Explore the Oracle website just as you explored the SAP site. After viewing the Web sites, and based on your reading of the chapter, write a 2-page paper that describes how an ERP can connect and integrate the revenue, expenditure, human resources/payroll, and financing cycles of a business. Student solutions will vary depending on the demonstrations they observe. However, the demonstrations should give the students a more concrete and visual understanding of what an ERP system is and does. Student solutions should at least discuss how an ERP could integrate all of the various cycle activities of a business into one integrated system.
2.8
Which of the following actions update a master file and which would be stored as a record in a transaction file? a. Add a new customer –
Master file
b. Record purchases of raw materials –
Transaction file
c. Change the tax percentage on taxable goods – Master file d. Update supplier payment terms – e. Record sales –
Master file
Transaction file
f. Record employee commission on sales – Transaction file g. Update accounts receivable balance –
Master file
h. Update unit prices of selected stock items – i. Record cash receipts –
Master file
Transaction file
j. Update customer balance –
Transaction file
k. Update customer contact details –
Master file
l. Record payroll checks – Transaction file
2.9
You were hired to assist Ashton Fleming in designing an accounting system for S&S. 2-10 .
Accounting Information Systems 15e, GE
Ashton has developed a list of the journals, ledgers, reports, and documents that he thinks S&S needs (see Table 2-6). He asks you to complete the following tasks: a. Specify what data you think should be collected on each of the following four documents: sales invoice, purchase order, receiving report, employee time card b. Design a report to manage inventory. c. Design a report to assist in managing credit sales and cash collections. d. Visit a local office supply store and identify what types of journals, ledgers, and blank forms for various documents (sales invoices, purchase orders, etc.) are available. Describe how easily they could be adapted to meet S&S’s needs. No single answer exists with this case. Indeed, solutions will vary depending upon student ingenuity and creativity. Student answers can be compared to examples of these documents found in chapters 10 and 11. a.
A sample invoice is presented in the Revenue Cycle chapter. A sample purchase order is presented in the Expenditure Cycle chapter. A sample receiving report also appears in the Expenditure Cycle chapter. Although student designs will vary, each document should contain the following data items: Sales Invoice Customer name and address Customer account number Customer order number Salesperson code Shipping Address Shipper and date shipped Terms of sale Total Amount due Purchase Order Ship to address Bill to address Purchasing agent number Quantity of parts ordered Prices of parts ordered Taxes, if any Receiving Report Vendor name Vendor address Shipper Quantity received Description/quality remarks Inspected by
Product code or number Product description Quantity ordered Quantity shipped Unit price Extended price Taxes, if applicable
Item numbers ordered Payment terms Shipping instructions Supplier name or number Date of purchase Total amount of purchase
Vendor number Date received Receiving clerk number Part number received Purchase order number
Employee Time Card 2-11 .
Ch. 2: Overview of Transaction Processing and Enterprise Resource Planning Systems
Employee name Employee number Pay period Department number Employee signature b.
The report to manage inventory should contain the following information:
c.
Preferred vendor Product number Description Reorder point Quantity on Hand Quantity Available Vendor performance history Quantity on order Lead time
The report to manage credit sales and cash collections should include:
d.
Total regular hours Time in/ Time out Total overtime hours Approved by
Credit sales per period Cash collections per period Aging of accounts receivable Customers by geographic region Uncollectible accounts per period
The answers to this will vary depending upon the types of documents carried in the office supplies stores visited by the students. A fruitful topic for class discussion, or a possible additional case assignment, is to compare the design of paper documents to the data entry screen layouts used in various popular accounting packages.
2.10 Answer the following 10 multiple choice questions. (Correct answers bolded.) 1. Which of the following statements is (are) true? a. Well-designed documents and screens improve accuracy and completeness by providing instructions or prompts about what data to collect b. Online batch processing is where transaction data are entered, edited, and processed as they occur. c. ERP implementation costs for large companies with multiple sites are usually about half the cost of the ERP user license. d. In an ERP system, data entry controls such as validating data item and checking them for accuracy at the time of initial entry are not needed. e. Data in ledgers is organized logically using coding techniques that assign numbers or letters to items to classify and organize them. 2-12 .
Accounting Information Systems 15e, GE
2. Which of the following statements is (are) true? a. With sequence codes, items are numbered consecutively to account for all items, and missing items cause a gap in the numerical sequence. b. The data capture or input process is usually triggered by a top management decision. c. Updating done periodically, such as daily or weekly, is referred to as batch processing. d. Cumulative accounting information is stored in general and subsidiary journals. e. Computers store data in a field; the fields containing data about entity attributes constitute a record.
3. Which of the following statements is (are) true? a. A chart of accounts facilitates preparing financial statements because data stored in individual accounts can easily be summed for presentation. b. Repetitive and frequently used database queries are usually developed by users; one-time queries are usually developed by information systems specialists. c. A database query can provide the information needed to deal with problems and questions that need rapid action or answers. d. A journal entry shows the accounts and amounts to be debited and credited. e. Transaction files are permanent and must be maintained for several years for backup purposes.
4. Which of the following statements is (are) true? a. A group code is derived from the description of the item and is usually easy to memorize. b. Using source data automation or well-designed turnaround documents and data entry screens helps ensure captured data are accurate and complete c. It is usually best to let a user determine what data to input rather than have data input screens list the data the user needs to enter d. If the sum of all subsidiary ledger account balances does not equal its general ledger control account balance, a recording error has occurred. e. Real-time processing updates transactions as they occur, helping ensure stored information is current and useful in making decision.
2-13 .
Ch. 2: Overview of Transaction Processing and Enterprise Resource Planning Systems
5. Which of the following statements is (are) true? a. With mnemonic codes, blocks of numbers are reserved for specific categories of data. b. Input controls are improved by using pre-numbered source documents or by the system automatically assigning a sequential number to each transaction. c. In an integrated ERP system, undetected data entry errors can automatically propagate throughout the system. d. As ERP modules do not automatically trigger additional actions in other modules, it is less important to understand business processes and their interactions. e. A purchase to pay ERP module facilitates production scheduling, work-inprocess, quality control, cost management, and manufacturing processes.
6. Which of the following statements is (are) true? a. Data is one of a company’s most important resources but to function properly most organizations do not have to have the data readily and easily accessible. b. Turnaround documents are company output sent to an external party and returned as an input document. c. Each type of entity possesses the same set of attributes or characteristics of interest that are stored, but the specific data values for those attributes will differ depending on the entity. d. Reaping the potential benefits of ERP systems and mitigating their disadvantages requires conscious effort and involvement by top management. e. Real-time data processing is almost always cheaper and more efficient than batch processing.
7. Which of the following statements is (are) true? a. Source data automation devices capture transaction data in paper form at the time and place of their origin. b. Master files are permanent and exist across fiscal periods; individual master file records may change frequently. c. General ledgers are often used for accounts receivable, inventory, fixed assets, and accounts payable. d. If an ERP system does not meet your needs, it can almost always be inexpensively modified to meet your unique needs e. When choosing an ERP system, make sure it has a module for every critical company process and you are not paying for modules you do not need.
2-14 .
Accounting Information Systems 15e, GE
8. Which of the following statements is (are) true? a. Documents are records of transaction or other company data that can be printed out or stored as electronic images in a computer b. Transaction data are almost always recorded in a ledger before they are entered into a journal c. Since batch processing data are current and accurate only immediately after processing, it is used for applications that do not need frequent updating. d. ERP systems are not effective in integrating non-financial company operations with a traditional accounting system. e. Well-designed screens improve accuracy and completeness by using checkoff boxes or pull-down menus to present the available options
9. Which of the following statements is (are) true? a. A transaction file contains records of individual business transactions and is similar to a general ledger in a manual AIS. b. To ensure credit sales policies are followed, the system can be programmed to check a customer’s credit limit and payment history. c. Use of pre-numbered documents makes it harder to verify that all transactions have been recorded and that none has been misplaced. d. An ERP system uses a centralized database to share information across business processes and coordinate activities. e. It is difficult for an ERP system to provide management with the up-to-date information needed to plan, control, and evaluate an organization’s business
10. Which of the following statements is (are) true? a. The need for reports should be periodically assessed because they are often prepared long after they are needed---wasting time, money, and resources. b. An audit trail is a transaction path through a data processing system from point of origin to final output, but not backward from final output to point of origin. c. Accountants and systems developers do not need to understand how data are captured, organized, stored, processed, or accessed. d. An AIS has traditionally been referred to as a transaction processing system because its only concern was financial data and accounting transactions. e. A master file, like a ledger in a manual AIS, stores cumulative information about an organization.
2-15 .
Ch. 2: Overview of Transaction Processing and Enterprise Resource Planning Systems
SUGGESTED ANSWERS TO THE CASES 2.1
Bar Harbor Blueberry Farm Data from Case
Date March 7 March 11 March 14 March 21 March 21 March 24
Supplier Invoice AJ34 14568 893V 14699 10102 10145
Supplier Name Bud’s Soil Prep Osto Farmers Supply Whalers Fertilizer Osto Farmers Supply IFM Wholesale IFM Wholesale
Supplier Address PO Box 34 45 Main Route 34 45 Main 587 Longview 587 Longview
Amount $2,067.85 $ 67.50 $5,000.00 $3,450.37 $4,005.00 $ 267.88
Purchases Journal Page 1 Date
Supplier
March 7 March 11 March 14 March 21 March 21 March 24
Bud’s Soil Prep Osto Farmers Supply Whalers Fertilizer Osto Farmers Supply IFM Wholesale IFM Wholesale
March 31
TOTAL
Supplier Invoice AJ34 14568 893V 14699 10102 10145
Account Number 23 24 36 24 38 38
Post Ref √ √ √ √ √ √
Amount $2,067.85 $ 67.50 $5,000.00 $3,450.37 $4,005.00 $ 267.88 14,858.60
2-16 .
Accounting Information Systems 15e, GE
General Ledger Accounts Payable Date March 1
Account Number: 300
Description Balance Forward
Post Ref
Debit
√
March 31
Purchases Date March 1
Credit
Balance $18,735.55
14,858.60
33,594.15
Account Number: 605 Description Balance Forward
March 31
Post Ref
Debit
√
14,858.60
2-17 .
Credit
Balance $54,688.49 69,547.09
Ch. 2: Overview of Transaction Processing and Enterprise Resource Planning Systems
Account Payable Subsidiary Ledger Account No: 23 Date March 1 March 7
Description Balance Forward Supplier invoice AJ34
Account No: 24 Date March 1 Mar 11 Mar 21
Whalers Fertilizer
Description Balance Forward Supplier invoice 893V
Account No: 38 Date March 1 Mar 21 Mar 24
Osto Farmers Supply
Description Balance Forward Supplier invoice 14568 Supplier invoice 14699
Account No: 36 Date March 1 March 14
Bud’s Soil Prep
IFM Wholesale
Description Balance Forward Supplier invoice 10102 Supplier invoice 10145
PO Box 34 Debit
45 Main Debit
Route 34 Debit
587 Longview Debit
2-18 .
Terms: 2/10, Net 30 Credit Balance 0.00 2,067.85 2,067.85
Terms: 2/10, Net 30 Credit Balance 0.00 67.50 67.50 3,450.37 3,517,87
Terms: 2/10, Net 30 Credit Balance 0.00 5,000.00 5,000.00
Terms: 2/10, Net 30 Credit Balance 0.00 4,005.00 4,005.00 267.88 4,272.88
Accounting Information Systems 15e, GE
2.2
SDC Corp. - Chart of Accounts Design Design a chart of accounts for SDC. Explain how you structured the chart of accounts to meet the company’s needs and operating characteristics. Keep total account code length to a minimum, while still satisfying all of Mace’s desires. (Adapted from the CMA Exam) A six-digit code (represented by letters ABCDEF) is enough to meet SDC’s needs: A This digit identifies the 4 divisions plus the corporate office B This digit represents major account types (asset, liability, equity, revenue, expense). C This digit represents the major classification within account type:
For balance sheet accounts, this represents specific sub-categories (current assets, plant and equipment, etc.), as only six categories are needed.
For expense and revenue accounts, this digit represents the product group, as again there are only five products plus general costs.
D This digit represents specific accounts or cost centers:
For balance sheet accounts, this is the control account; one digit is adequate because the problem says no more than 10 categories.
For expense accounts, this is the cost center; one digit is adequate because the problem indicates no more than 6 cost centers.
EF These two digits represent the subsidiary accounts and natural expense categories:
For expense accounts, these represent the 56 natural expense categories and variances for each cost center.
For the balance sheet, these two digits accommodate up to 100 subsidiary accounts.
2-19 .
CHAPTER 3 SYSTEMS DOCUMENTATION TECHNIQUES SUGGESTED ANSWERS TO DISCUSSION QUESTIONS 3.1
Identify the DFD from the following narrative: Henk buys a new bicycle at a local shop and pays with his debit card. The sales clerk enters the transaction in the cash register. At the time of closing, the sales clerk gives the register tape and the debit card PIN tape to his manager. Data Flows: merchandise, payment, cash and register tape Data Source: customer Processes: capture sales and payment data and collect payment, give cash and register tape to manager Storage: sales file (register tape), cash register
3.2
Do you agree with the following statement: “Any one of the systems documentation procedures can be used to adequately document a given system”? Explain. It is usually not sufficient to use just one documentation tool. Every tool documents a uniquely important aspect of a given information system. For example: System flowcharts are employed to understand physical system activities including inputs, outputs, and processing. Data flow diagrams provide a graphic picture of the logical flow of data within an organization. Business process diagrams show the activities a company engages in to do business and the diagrams can be used to evaluate internal controls strengths and weaknesses. Each alternative is appropriate for a given aspect of the system. As a result, they work together to fully document the nature and function of the information system.
3-1 .
Ch. 3: Systems Documentation Techniques 3.3
Compare the guidelines for preparing flowcharts, BPDs, and DFDs. What general design principles and limitations are common to all 3 documentation techniques? Similar design concepts include the following:
All three methods require an initial understanding of the system before actual documentation begins. This insures that the system is properly represented by the diagram.
All three methods require the designer to identify the elements of the system and to identify the names and relations associated with the elements.
All three methods encourage the designer to show only the regular flows of information and not to be concerned with unique situations.
All three require more than one “pass” to capture the essence of the system accurately.
The product of all three methods is a model documenting the flow of information, processes, and/or documents in an information system. All three documentation methods are limited by the nature of the models they employ, as well as by the talents and abilities of the designer to represent reality. 3.4
Explain the difference between a system flowchart and a program flowchart. What is the relationship between the two? A system flowchart graphically represents the relationships among system inputs, processing, storage, and output. It is used to describe the data flows and procedures within an accounting information system. A system flowchart typically provides an overview of how each business process works. A program flowchart, on the other hand, illustrates the sequence of logical operations performed by a computer in executing a single program (as opposed to an entire system as in the case of a system flowchart). The relationship between a system flowchart and a program flowchart is that a program flowchart describes the specific steps and logic used to execute a process depicted on a system flowchart.
3-2 .
Accounting Information Systems 15e, GE SUGGESTED ANSWERS TO THE PROBLEMS
Prepare flowcharting segments for each of the following operations:
3.1 a.
Backing up historical source documents by converting them to a magnetic tape using a computer-based optical character reader (OCR)
OCR Source Documents
b.
Conversion of Documents to Tape by OCR
Source Data
Updating an airline reservation using your home computer
View reservation data
Request, complete, and submit an online reservation change form
Revise reservation data on web-based airline reservation system
Reservation File
Reservation update request
c.
Preparing an accounts receivable aging report on paper from the accounts receivable master file and the cash receipts master file, both of which are stored electronically
3-3 .
Ch. 3: Systems Documentation Techniques
3-4 .
Accounting Information Systems 15e, GE 3.1 (continued) Assorted Flowcharting Segments Using the company tablet to remotely enter transactions that were recorded on paper-based source documents during a power failure
Source documents
Update database Company tablet
Payroll Master File
Automatic database update
Payroll transaction file
An automatic update of the payroll transaction file and the cumulative payroll data in the payroll master file, with employees’ working hours from a biometrical database
Shift Database
e.
f.
Database
d.
Using a mobile phone to access the company’s inventory database to check stock levels
3-5 .
Display query and response
Query inventory database
Mobile phone
3-6 .
Inventory database
Ch. 3: Systems Documentation Techniques
Accounting Information Systems 15e, GE 3.1 (continued) Assorted Flowcharting Segments Manually backing up the customer database to magnetic tape
Customer Database
h.
Make manual backup
Having your supplier database automatically backed up from a magnetic tape to the hard disk after a hardware malfunction
Backup of Supplier database on magnetic tape
i.
Backup of customer database on tape
Restore database
Supplier database
g.
Using a laptop to access sales orders for the last month, hard copies of which are printed and filed in descending order of date of the sales orders
3-7 .
View sales orders
Access customer sales, extract sales orders for last month, print hard copies
Request sales orders for last month
Sales order (hard copies)
D
3-8 .
Sales database
Ch. 3: Systems Documentation Techniques
Accounting Information Systems 15e, GE 3.2
a.
Prepare a system flowchart of the process described.
Remote location job-time ticket
View jobtime ticket form Terminal
Terminal
Express-mailed weekly to headquarters
Enter job-time ticket data
Payroll summary report
Weekly: Update payroll, work in process, & payroll transaction databases, disburse funds, print reports
Supervisor
Scan job time tickets
Disburse Funds Employee Payments Government Payments
View payroll data
401K company Payments
Work in process database
Payroll database Employee query
3-9 .
Ch. 3: Systems Documentation Techniques
b. Employee
Activities Performed
Job Sites
Weekly
Remote locations
Express mail paper jobtime tickets
Enter jobtime tickets
Enter jobtime tickets daily
Data Processing Update payroll database, work in process database, payroll transaction file
Process jobtime tickets weekly
Payroll Supervisor
Disburse funds to employees, government, 401K company
Create and send summary payroll report
Review summary payroll report
Employees Access payroll data using Internet
3-10 .
Accounting Information Systems 15e, GE
3.3
Prepare a document flowchart to reflect how ANGIC Insurance Company processes its casualty claims.
a.
CLAIMS DEPARTMENT
ADJUSTER From claimant
Notice of Loss
START
1 2
Proof of Loss Form Proof of Loss
Prepare proof of loss form, claim record
From Claimant
3
DATA PROCESSING
4 1 2
Proof of Loss Proof of
Notice of Loss
3
Loss
Claim Record
4
Adjuster’s Report
To Claimant Adjuster’s Report
1
Proof of Loss Proof of Loss
2
Authorize Claim Payment
2
Loss
4
Proof of Loss
N
2 1
Proof of Loss Proof of
3
Claim Record 2
Prepare Separate Report
Assist claimant with form
Notice of Loss
Proof of Loss
Prepare Check & Disbursement List
Disbursement List
1
Proof of Loss
N
Adjuster’s Report
To claimant
To Claimant
A
3-11 .
Check
Accounting
Ch. 3: Systems Documentation Techniques 3.3
b.
Employee Claims Department
Prepare a BPD to reflect how ANGIC Insurance Company processes its casualty claims.
Activities Performed From Claimant Receive notice of loss
Prepare proof of loss form, send to claimant
Data Processing Department
Adjustor
Claims Department
Initiate record of claim
Receive notice of loss & record of claim Help claimant complete proofof-loss, agree on loss amount
Receive authorized proof-ofloss
Prepare & disburse payment check
Prepare adjuster report
Receive proofof-loss, adjustor report
Authorize payment to claimant
Accounting Review cash disbursement list
3-12 .
Prepare cash disbursements list
Accounting Information Systems 15e, GE 3.4
Prepare a BPD that documents Beccan’s business processes.
Employee Retail Store
Activities Performed Weekly & rush orders
Review inventory, place order Shipping Clerk
Warehouse Inventory Control Clerk
Count inventory and reconcile to corporate database
Receive goods
Fill orders, authorize delivery, ship goods System generates purchase requisition
Purchasing Department
Warehouse Receiving Clerk
Quarterly
Adjust & approve purchase requisition
Finalize & approve system generated PO
Receive system prepared receiving report
Maintain & update perpetual inventory system
Send PO to vendor
Receive goods, complete receiving report: date and quantity
Accounts Payable
From vendor Receive vendor invoice
Get receiving report & PO
3-13 .
Reconcile P.O., receiving report, invoice
Disburse funds to vendors
3.5
As the internal auditor for No-Wear Products, you have been asked to document the company’s payroll processing system. Based on your documentation, No-Wear hopes to develop a plan for revising the current system to eliminate unnecessary delays in paycheck processing. The head payroll clerk explained the system: The payroll processing system at No-Wear Products is fairly simple. Time data are recorded in each department using timecards and clocks. It is annoying, however, when people forget to punch out at night, and we have to record their time by hand. At the end of the period, our payroll clerks enter the timecard data into a payroll file for processing. Our clerks are pretty good—though I’ve had to make my share of corrections when they mess up the data entry. Before the payroll file is processed for the current period, human resources sends us personnel changes, such as increases in pay rates and new employees. Our clerks enter this data into the payroll file. Usually, when mistakes get back to us, it’s because human resources is recording the wrong pay rate or an employee has left and the department forgets to remove the record. The data are processed and individual employee paychecks are generated. Several reports are generated for management—though I don’t know what they do with them. In addition, the government requires regular federal and state withholding reports for tax purposes. Currently, the system generates these reports automatically, which is nice. a.
Prepare a context diagram to document the payroll processing system at NoWear Products.
3-14 .
Accounting Information Systems 15e, GE
Employee Time Card Data
Employee Paychecks
Operating Documents
Payroll Processing System
Internal Reports
Management
Human Resources Department Personnel Data Withholding Reports
3-15 .
Governmental Agencies
Ch. 3: Systems Documentation Techniques 3.5
a. (continued.)
Level 0 Data Flow Diagram for the payroll processing system at No-Wear Products.
Operating Departments
Time Card Data
Human Resources Department
Personnel Changes 1.0 Process Employee Timecards
2.0 Update Payroll File
Payroll File
4.0 Generate Payroll Reports
3.0 Generate Paycheck Internal Reports
Employee
Withholding Reports
Pay check Management
3-16 .
Governmental Agencies
Accounting Information Systems 15e, GE 3.5
b. Prepare a document flowchart to document the payroll processing system at No-
Wear Products. No-Wear Products-Payroll Employees in Functional Department
Payroll
Time Card
Record Time Data
Record Time
Completed Time Card
Enter Time Data
Process Payroll Changes
Completed Time Card
Enter Payroll Changes
Payroll File
From Human Resource Dept
Payroll Changes
N
Process Payroll, Prepare Checks and Reports
Paycheck
N
Employee
Management Report
Management
Federal Tax Report
Stat Tax Report
3-17.
Goverrnment
3.5
c. Prepare a BPD to document the payroll processing system at No-Wear Products.
Employee
Activities Performed
Departments Record time data
Payroll Process payroll. Prepare employee paychecks. Prepare payroll reports for management and for federal and state withholdings tax
Enter time data and personnel changes into payroll system Human Resources Personnel changes
3-18 .
Disburse employee paychecks. Send reports to management and governmental agencies
3.6
Ashton Fleming has decided to document and analyze the accounts payable process at S&S so the transition to a computerized system will be easier. He also hopes to improve any weaknesses he discovers in the system. In the following narrative, Ashton explains what happens at S&S: Before S&S pays a vendor invoice, the invoice must be matched against the purchase order used to request the goods and the receiving report that the receiving department prepares. Because all three of these documents enter the accounts payable department at different times, a separate alphabetical file is kept for each type of document. The purchase orders that are forwarded from purchasing are stored in a purchase order file. The receiving reports are stored in a receiving report file. When vendor invoices are received, the accounts payable clerk records the amount due in the accounts payable file and files the invoices in the vendor invoice file. S&S pays all accounts within 10 days to take advantage of early-payment discounts. When it is time to pay a bill, the accounts payable clerk retrieves the vendor invoice, attaches the purchase order and the receiving report, and forwards the matched documents to Ashton Fleming. Ashton reviews the documents to ensure they are complete, prepares a two-part check, forwards all the documents to Susan, and records the check in the cash disbursements journal. Susan reviews the documents to ensure that they are valid payables and signs the checks. She forwards the check to the vendor and returns the documents and the check copy to the accounts payable clerk. The clerk files the documents alphabetically in a paid invoice file. At the end of every month, the accounts payable clerk uses the accounts payable ledger to prepare an accounts payable report that is forwarded to Susan. After she is finished with the report, Susan files it chronologically. a.
Prepare a context diagram to document accounts payable processing at S&S.
Purchasing
Receiving Purchase Order Receiving Report
S&S Accounts Payable Invoice
Vendor
Accounts Payable Report
Payment & Remittance Advice
3-19 .
Management
Ch. 3: Systems Documentation Techniques 3.6
a. (continued.) Prepare a level 0 Data Flow Diagram of S&S Accounts Payable
Vendor
Purchasing
Receiving
Invoice Purchase Order
1.0 Record Payable
2.0 Collect & Store Purchase Orders & Receiving Reports
Receiving Report
Purchase Orders Accounts Payable
Vendor Invoices
Receiving Reports
Cash Disbursements Journal
3.0 Make Payment
Accounts Payable Report
4.0 Prepare Management Reports
Payment & Remittance Advice
Paid Invoices
Management
3-20 .
Vendor
3.6 b. Prepare a document flowchart to document accounts payable processing at S&S.
S&S Accounts Payable Accounts Payable From Purchasing
From Receiving
Controller
From Vendor
A
Owner/Manager B
Purchase Order Receiving Report
Receiving Report
Purchase Order
A
A
Purchase Order
Vendor Invoice
Receiving Report
Check 1
Vendor Invoice
Record Accounts Payable
Prepare Vendor Checks
Check 1
A
Cash Disbursement Purchase Order Receiving Report
Purchase Order
D
Purchase Order
Vendor Invoice
To Vendor
Journal
C
Receiving Report
Review and Sign Checks
Prepare Monthly Accounts Payable
Accounts Payable Report
Purchase Order
Check 2
Accts Payable Ledger
Vendor Invoice
Match Pur Ord, Receiving Report, Invoice
Vendor Invoice
Vendor Invoice
Receiving Report
Check 2
Vendor Invoice
Rec.Reprt
Vendor Invoice
C
Check 1
Check 2
Check 2
Accounts Payable Report
Review Acc Payable Report
A
A
B
3-21 .
D
D
3.6 c. Prepare a BPD to document accounts payable processing at S&S.
Employee
Activities Performed
Purchasing Purchase Order (PO)
Receiving Receiving Report (RR) Accounts payable
Ashton Fleming
FROM VENDOR
Enter Vendor Invoice (VI) in A/P file
End of Month
Attach PO & RR to VI
Review VI, PO, RR; Prepare 2-part check
Make payments within 10 days to take advantage of discount
Prepare A/P report;
Record check in Cash Disbursements Journal
Susan Review VI, PO, RR; Sign checks
Send checks to vendors 3-22
.
Send VI, PO, RR, copy of check to A/P
Prepare A/P report; Send to Susan
3.7 Ashton Fleming has asked you to document the cash receipts system at S&S. Ashton’s narrative of the system follows: Customer payments include cash received at the time of purchase and payments received in the mail. At day’s end, the treasurer endorses all checks and prepares a deposit slip for the checks and the cash. A clerk deposits the checks, cash, and deposit slip at the local bank each day. When checks are received as payment for accounts due, a remittance slip is included with the payment. The Treasurer sends this to accounts receivable. Data from the remittance slips are entered into the computer, and the accounts receivable database is updated. The remittance slips are stored in a file drawer by date. Every week, accounts receivable generates a cash receipts report and an aged trial balance using the accounts receivable ledger. The cash receipts report is sent to Scott and Susan and one of them reviews it. A copy of the aged trial balance is sent to the credit and collections department, where it is reviewed. a. Develop a context diagram for the cash receipts system at S&S.
Bank Deposit
Payment at Sale Cash Receipts System
Customers Remitances on Account
Cash Receipts Report
Management
Aged Trial Balance Credit and Collections
3-23 .
Ch. 3: Systems Documentation Techniques
3.7 a. (continued) Develop a level 0 Data Flow Diagram of the Cash Receipts System at S&S:
Customers
Remittance File
Payments at Sale Remittances on Account
1.0 Process Payments
Remittance Slips
2.0 Update Customer Accounts
Endorsed Checks & Cash, Deposit Slip
Accounts Receivable Ledger
Bank
3.0 Prepare Reports
Aged Trial Balance
Cash Receipts Report
Management
3-24 .
Credit and Collections
Accounting Information Systems 15e, GE 3.7
b.
Prepare a document flowchart to document the cash receipts system at S&S.
3-25 .
3.7
c.
Employee Treasurer
Prepare a business process diagram for the cash receipts system at S&S Activities Performed From customer Receive cash and remittance advices, endorse checks, and prepare deposit slip
Clerk Deposit cash in bank Accounts Receivable
Weekly
Receive remittance advice, update accounts receivable
Generate cash receipt report & aged trial balance using A/R ledger
Management: Scott & Susan
Review cash receipts report
Credit and Collections
Review aged trail balance
3-26 .
3.8 Computer Warehouse is a wholesale firm that supplies computer hardware to large companies. Accepting orders is subject to the customer meeting agreed-upon terms of payment. Details of rejected orders are recorded in the customer data file as part of customers’ credit history. Customers can pay for their orders either via electronic funds transfers or direct deposits into the firm’s bank account. In the interest of safety, Computer Warehouse does not accept cash payments. For each order that is verified and accepted, an invoice is generated and a pick list is sent to the warehouse. The orders are processed once their payments are received. Each order is handled by a specific sales representative, who earns a commission on each sale. The firm has six basic data files, which contain customer information, warehouse information, product information, accounts receivable, sales information, and payments information, respectively. Over the next few years, the company expects to become a multimilliondollar operation. Recognizing the need to computerize their in-store operations, the company has begun the process by calling you to assist them with documenting the ordering system. Create a context diagram and a Level 0 diagram for the order system at Computer Warehouse. Also create a Level 1 diagram for filling an order at Computer Warehouse. Context diagram of Computer Warehouse order system: Customers
Rejected order Warehouse
Order Picking list
Invoice Order System Payment
Completed order Sales commission
Bank deposit
Sales representative
Bank
3-27 .
Ch. 3: Systems Documentation Techniques Level 0 diagram of Computer Warehouse sales order: Order details
Customers
Reject Order Note
Picking List
Warehouse
1.0 Fill Order
Invoice
Accounts Receivable
Invoice
2.0 Create Invoice
Completed Order
Payment detail Payment Invoice detail
3.0 Process Payment
Bank deposit Sales
Commission
Bank
3-28 .
Accounting Information Systems 15e, GE Level 1 – Fill Order at Computer Warehouse: Customers
Reject Order Note
1.2 Prepare Reject Order Note
Rejected Order Order
Credit History
1.1 Verify Order
Product information
Customers
Credit Status Information Products Processed order Picking Information
1.3 Compile Order
Picking List
Stock Update
3-29 .
Warehouse
Ch. 3: Systems Documentation Techniques 3 .9
Prepare a program flowchart to help Melanie program this process. Start
Input Weight (W), Height (H)
Body Mass Index (BMI) = W/H^2
BMI < 18.5
Yes
Weight Status (WS) = Underweight
No
WS = Normal
No
BMI > 25
Print W, H, BMI, WS
End
3-30 .
Yes
WS = Overweight
Accounting Information Systems 15e, GE 3.10 Prepare a context diagram and a Level 0 DFD for each of the following scenarios. a.
Collect time and attendance reports from different departments to calculate weekly wages. This data is validated before payroll is prepared.
Context
Departments
Time and attendance data
Payroll System
Reports
Level 0
Departments
b.
Time and attendance data
1.0 Validate time and attendance data
Validated time and attendance data
2.0 Prepare Payroll
A customer order is approved and filled. The inventory data is then updated.
Context
Customers
Customer order
Order system
Update inventory
1.0 Verify Order
Processed order
Inventory
Level 0 Customers
Customer order
Inventory
c.
2.0 Compile order
Update inventory
A customer cancels her mail order. The cancellation is processed and a confirmation is sent to the customer.
Context
3-31 .
Ch. 3: Systems Documentation Techniques
Customers
Mail order system
Order cancellation
Cancellation acknowledgement
Level 0 Cancellation acknowledgement
Customers
d.
Order cancellation
1.0 Process Order
A customer makes a partial payment on her outstanding balance with a check and submits a remittance advice. Accounts receivable is updated to reflect the customer credit balance, and the remittance advice is filed manually.
Context Customers
Remittance on account
Cash Receipt SYstem
Level 0 Remittance file
Customers
Remittance on account
1.0 Process Payment
Remittance advice
2.0 Update Customer Accounts
Accounts receivable
e.
A vendor invoice is received and subsequently paid. Accounts payable is then updated and the report is submitted for review to the management.
Context
3-32 .
Accounting Information Systems 15e, GE
Vendor
Accounts Payable
Invoice
Accounts payable report
Management
Payment
Level 0 Vendor
Invoice
1.0 Record Accounts Payable
Accounts Payable
Vendor Invoice
Vendor
2.0 Process Payment
3.0 Prepare Management Reports
Accounts payable report
f.
Vendor payment
Management
Pay the value added tax (VAT) collected on sales made in the past month to the revenue service using the e-filing option on their website.
Context Payment advice notice Revenue Services
Tax forms and payment
Level 0
3-33 .
Prepare Taxes
Ch. 3: Systems Documentation Techniques
Revenue Services
Payment advice notice
Tax Documents
1.0 Process Tax Documents
2.0 Prepare Revenue Services Form
Revenue Services Form and Payment
Revenue Services
3-34 .
Accounting Information Systems 15e, GE 3.11
A small business in Tokyo, Japan, is experiencing a slump in sales and decides to engage in a sales promotion tactic. Customers who use the store credit card and spend at least ¥25,000 per invoice are offered a 15% discount. Customers who spend more than ¥25,000 but do not use the store credit card are offered a 3% discount. The company decides to prepare a flowchart to help them properly design a computer program to enter sales prices, apply the discount, and print the invoice. Prepare a flowchart to help the company program this process. Start
Enter invoice total
Total >= 25 000
Yes
Used store credit card?
No
Give 3% discount
No
Print Invoice
End
3-35.
Yes
Give 15% discount
Ch. 3: Systems Documentation Techniques SUGGESTED ANSWERS TO THE CASES 3-1
You are the systems analyst for the Wee Willie Williams Widget Works (also known as Dub 5, which is a shortened version of 5 Ws). Dub 5 produces computer keyboard components. It has been producing keyboards for more than 20 years and has recently signed an exclusive 10-year contract to provide the keyboards for all Dell personal computers. As the systems analyst, you have been assigned the task of developing a level 0 DFD for Dub 5’s order processing system. You have finished gathering all the information you need to develop the first-pass DFD and now want to complete the diagram. Level 0 DFD for Dub 5: Order 1.0 Credit Review
Customer
Credit file
Order Rejection Approved orders 2.0 Enter customer orders Customer
Inventory
3.0 Check Inventory & Prepare Packing Slip
Open Orders
Warehouse
Packing Slip
Shipping Notice 4.0 Prepare Invoice
Invoice Copy
Accounting
Invoice
Invoice
Customer
3-36 .
Accounting Information Systems 15e, GE 3-1 Level 1 DFD for Dub 5:
Customer Order Credit File
1.1 Check Credit
Customer Account
Approved Order
Rejected Order Customer 1.2 Check Current Order against Credit Limit
Over Credit Limit Notice
Credit Application
Rejected Order Lacking Credit Approval
1.3 Prepare Credit Application
Note: The Order Rejection notice shown on the context level diagram and the level 0 diagram can take two forms: The Over Credit Limit Notice or the Credit Application. These two items are shown on the level 1 DFD.
3-37 .
Case 3-1 Dub 5 Business Processing Diagram Employee Order Processing Clerk
Activities Performed
From Customer
Receive Customer Order
Customer not apprvd for credit: OR order > credit limit
Credit Debt
No
Enter Customer Order; Update Customer File
Yes
Sufficient Inv
No
Notify customer of insufficient inventory
Yes
File Invoice Prepare Packing Slip
Send customer credit application, notify order shipped when credit approved
No Customer Approved for Credit? Yes
Notify customer: order shipped when payment received Warehouse
Ship goods to customer
Billing
Prepare customer invoices; send copies to customer, order processing, accounting
Accounting Update Accounts Receivable 3-38 .
Place notice in file: customer invoice sent
Accounting Information Systems 15e, GE
CHAPTER 4 RELATIONAL DATABASES SUGGESTED ANSWERS TO DISCUSSION QUESTIONS 4.1
Contrast the logical and the physical views of data, and discuss why separate views are necessary in database applications. Describe which perspective is most useful for each of the following employees: a programmer, a manager, and an internal auditor. How will understanding logical data structures assist you when designing and using database systems?
Databases are possible because of their database management system (DBMS). As shown in Figure 4.1, the DBMS is a software program that sits between the actual data stored in the system and the application programs that use the data. As shown in Figure 4.4, this allows users to separate the way they view the data (called the logical view) from the way the data is actually stored (the physical view). The DBMS interprets the users' requests and retrieves, manipulates, or stores the data as needed. The logical views separate the applications from physical information storage concerns. This in turn provides increased flexibility in applications, improved data security, and ease of use. In a database system, the db programmer may need to interact with the physical view as well as the logical views. An application programmer would be unlikely to interact with the physical view as most application programs are given a logical view to perform their functions. A manager will rarely need to understand or be familiar with the physical view of the data. Nor, in most instances, will the internal auditor need to understand the physical view as most everything they do involves the logical view of the data. If accountants understand logical data structures and the logical view of the data, they are better able to manage, use, and audit a database and its data. This implies that we trust DBMS implementations to appropriately deliver the logical views from the physical representation of the database. Accountants will often view and evaluate the rights associated with logical views in order to determine internal control risks associated with each logical view. 4.2
The relational data model represents data as being stored in tables. Spreadsheets are another tool that accountants use to employ a tabular representation of data. What are some similarities and differences in the way these tools use tables? How might an accountant’s familiarity with the tabular representation of spreadsheets facilitate or hinder learning how to use a relational DBMS?
Spreadsheets and databases differ on many dimensions. Capacity: Database tables can store many more records that spreadsheet tables. Analysis: Spreadsheets can more quickly perform ad-hoc analysis of a table’s data. Knowledge needed: Databases require more knowledge and time to perform ad-hoc analysis.
4-1 .
Ch. 4: Relational Databases
Repeatability: Analysis performed in spreadsheets is often difficult to repeat as steps performed in the analysis are lost once performed. Analysis performed in databases are usually created and stored as steps in a process. Thus, one can reperform the analysis on current data. Integrity: Data entry, storage and manipulation in a spreadsheet is not protected by constraints imposed by the data structure of a database. Therefore, data integrity is usually higher for database data.
In sum, spreadsheets are best used for ad-hoc analysis, modeling, planning and in nontransaction settings. Databases are best used for storing and processing large data sets in repeated operations where data integrity is important. Databases can readily export data to a spreadsheet for ad-hoc analysis. Accountants’ familiarity with spreadsheets sometimes leads them to use a spreadsheet for a task that is better suited for a database. Spreadsheet familiarity reduces the likelihood that an accountant will invest time to increase their database skills. Over the years, the Journal of Accountancy has published a number of very good articles on how to use databases and when to use databases and when to use spreadsheets. These articles can be found on the Journal’s website: http://www.journalofaccountancy.com/ 4.3
Some people believe database technology may eliminate the need for double-entry accounting. This creates three possibilities: (1) the double-entry model will be abandoned; (2) the double-entry model will not be used directly, but an external-level schema based on the double-entry model will be defined for accountants’ use; or (3) the double-entry model will be retained in database systems. Which alternative do you think is most likely to occur? Why?
No single answer exists with this question; indeed, solutions will vary depending upon student ingenuity and creativity. Reports should be graded in terms of how well each possibility was addressed and in terms of writing quality. Good answers should address the following:
Database technology does permit abandonment of double entry but abandoning double entry style storage of transactions does not mean that we cannot query the data and produce double entry style reports. Thus, the concept and control provided by reproducing double entry accounting reports can be maintained in a database system. The use of a schema for accountants is plausible and has been implemented in many systems. It does eliminate the redundancy of double entry from the database system, yet it still provides a framework familiar and useful to accountants and financial analysts. There is a good possibility that double entry will remain as an input form, even in databases, due to inertia. Indeed, many modern AIS, such as ERP systems, use databases but also retain the principles of double entry.
4-2 .
Accounting Information Systems 15e, GE 4.4
What is the purpose of a database and a database management system? How do the two relate to a database system?
The purpose of a database is to combine records (rows of data) that are usually stored in separate files into a consolidated, common “pool” which can then be accessed by authorized users and appropriate application programs. The purpose of a database management system (DBMS) is to manage and control the data and the interfaces between the data and the application programs that use the data. Thus, the database stores the data and the DBMS manages and controls this data (as well as the interface between the data and the application programs). The combination consisting of the database, the DBMS, and the application programs that access the database through the DBMS is collectively referred to as the database system. 4.5
Why is good data important? What are the consequences of bad or corrupt data?
Bad data costs businesses over $600 billion a year. Some people estimate that over 25% of business data is inaccurate or incomplete. In addition, incorrect database data can lead to bad decisions, embarrassment, and angry users. The text illustrated this with the following examples: For quite some time, a company sent half its catalogs to incorrect addresses. A manager finally investigated the large volume of returns and customer complaints and corrected the customer addresses in the database. He saved the company $12 million a year. Valparaiso, Indiana used the county database to develop its tax rates. After mailing the tax notices, it was discovered that a $121,900 home was valued at $400 million. Due to the $3.1 million property tax revenue shortfall, the city, the school district, and governmental agencies had to make severe budget cuts. Managing data is not going to get any easier as the quantity of data generated and stored doubles every 18 months. 4.6
Explain the advantages of database systems for accountants.
Virtually all mainframes and servers use database technology, and database use in personal computers is growing rapidly. Most accountants are involved with databases through data entry, data processing, querying, or auditing. They also develop, manage, or evaluate the controls needed to ensure database integrity. Databases provide organizations with the following benefits: Data integration. Master files are combined into large “pools” of data that many application programs access. An example is an employee database that consolidates payroll, personnel, and job skills master files. Data sharing. Integrated data are more easily shared with authorized users. Databases are easily browsed to research a problem or obtain detailed information underlying a report. The FBI, which does a good job of collecting data but a poor job of sharing it, is spending 8 years and $400 million to integrate data from their different systems. 4-3 .
Ch. 4: Relational Databases
4.7
Minimal data redundancy and data inconsistencies. Because data items are usually stored only once, data redundancy and data inconsistencies are minimized. Data independence. Because data and the programs that use them are independent of each other, each can be changed without changing the other. This facilitates programming and simplifies data management. Cross-functional analysis. In a database system, relationships, such as the association between selling costs and promotional campaigns, can be explicitly defined and used in the preparation of management reports.
What is a tuple in a database? What does it consist of and what function does it have in a database?
A tuple is a row in a table that contains data about a specific item in a database table. Each column contains data about an attribute of that entity. Each row in a Customer table contains data about a specific customer, and each column contains data about customer attributes, such as name and address. SUGGESTED ANSWERS TO THE PROBLEMS 4.1
The following data elements comprise the conceptual-level schema for a database: cost product code product description product cost quantity on hand minimum stock level quantity purchased invoice number supplier code supplier name supplier terms a. Identify three potential users and design a subschema for each. Justify your design by explaining why each user needs access to the subschema data elements.
To complete a purchase order, the purchase order clerk needs access to the following data: product code product description product cost quantity on hand minimum stock level supplier code
To manage stock (inventory), the inventory control department needs access to the following data stored in the database: 4-4 .
Accounting Information Systems 15e, GE product code product description quantity on hand
To pay suppliers for inventory purchase, the accounts payable clerk needs access to the following data stored in the database: supplier code supplier name supplier terms
b. Use Microsoft Access or another relational database software to create the schema tables. Specify the primary key(s), foreign key(s), and any other data that might be required for each table. Test your model by entering sample data in each table.
Table Name Products (Inventory)
Primary Key Product code
Foreign Keys **
Invoice
Invoice number
Supplier Code
Product Invoice
Product Code* Invoice number*
Product Code* Invoice number*
Supplier
Supplier code
Other Attributes Product description Product cost Quantity on hand Minimum stock level Date of sale (additional data) Quantity sold Product cost (actual purchase cost) Supplier name Supplier terms
* The invoice number and product code in product invoice are both primary keys and foreign keys; they are primary keys, as both are needed to uniquely identify a purchase; and they are both foreign keys, as they are primary keys in the related tables. ** Students could opt to add the supplier code as the foreign key in the product, if the argument is that a product is always supplied by a single supplier. 4.2
Most DBMS packages contain data definition (DDL), data manipulation (DML), and data query languages (DQL). For each of the following, indicate which language would be used and why.
a. The hourly rate of employees, paid biweekly, is updated. The DML – this changes content of the database. b. A new table is added to the database to record employees’ dependent or beneficiary data. The DDL – this changes the structure of the database. c.
A column is added to this table and is populated with employee codes to indicate the employees who have listed a dependent. The DDL and the DML – the former to add the new column; the latter to add the employee number.
4-5 .
Ch. 4: Relational Databases
d. A request is made to print a list of the names of all employees who have included dependents in their medical aid fund contributions. The DQL – this list can be produced by a query.
e. The credit controller is granted temporary access to select data in the customer table . The DDL – this is used to set security constraints by granting and revoking access. f.
4.3
Sales transactions of the day are added to the sales table. The DML – this is used to add data to the database/process transactions.
Ashton wants to store the following data about S&S’s purchases of inventory: item number date of purchase vendor number vendor address vendor name purchase price quantity purchased employee number employee name purchase order number description quantity on hand extended amount total amount of purchase
REQUIRED a. Design a set of relational tables to store this data. Name each table and field in accordance with good database design. Do all the data items need to be stored in a table? If not, which ones do not need to be stored, and why do they not need to be stored? b. Identify the primary key for each table. c. Identify the foreign keys needed in the tables to implement referential integrity. Table Name Inventory
Primary Key ItemID
Foreign Keys
Purchases
PurchaseOrderID
Purchases_Inventory
ItemID PurchaseOrderID
VendorID EmployeeID (Purchasing Agent) ItemID PurchaseOrderID
Vendor
VendorID
Employee
EmployeeID
4-6 .
Other Attributes Description QuantityOnHand PurchaseDate PurchaseOrderTotal QuantityPurchased PurchasePrice (actual) ExtendedAmount VendorName VendorAddress EmployeeName
Accounting Information Systems 15e, GE
NOTE TO INSTRUCTOR: ExtendedAmount and PurchaseOrderTotal do not have to be stored in the database as they can be calculated from other values. ExtendedAmount is QuantityPurchased x PurchasePrice. PurchaseOrderTotal is the sum of all the ExtendedAmounts for all items on a particular purchase order. d. Implement your tables using any relational database product to which you have access. e. Test your specification by entering sample data in each table. f. Create a few queries to retrieve or analyze the data you stored. There is no solution to parts d through f as students will select different software packages and come up with different queries. 4.4
Retrieve the Chapter 4 Relational Database (in Microsoft Access format) from http://www.pearsonglobaleditions.com or create the tables in Table 4-5 in a relational DBMS product. REQUIRED Write queries to answer the following questions. Your instructor may specify the method of acquiring the database noted above and whether to use Design view or SQL view. a.
List Customers that live in the city of Winslow. Provide CustomerID, CustomerName and Street.
Solution Output:
Obtaining the solution using SQL: SELECT Customer.CustomerID, Customer.CustomerName, Customer.Street FROM Customer WHERE Customer.City = "Winslow"; Obtaining the solution using QBE:
b.
List all sales for which SalesPerson “B. Green” was responsible. Provide SalesInvoiceID, SaleDate, CustomerID and CustomerName.
Solution Output:
4-7 .
Ch. 4: Relational Databases
Solution SQL: SELECT Sales.SalesInvoiceID, Sales.SaleDate, Sales.CustomerID, Customer.CustomerName FROM Sales INNER JOIN Customer ON Sales.CustomerID = Customer.CustomerID WHERE Sales.SalesPerson = “B. Green”; Obtaining the solution using QBE:
c.
List all inventory items sold to “Lola Doyle”. Provide SaleDate, ItemID, Description and Quantity.
Solution Output:
Obtaining the solution using SQL: NOTE TO INSTRUCTOR: This SQL solution uses aliases of tables so as to abbreviate the statement. For example, the Sales table uses the alias ‘s’. Everywhere you see ‘s.’ would have had ‘Sales.’ if the alias had not been used. A table alias is created by placing the alias immediately after the table name in the FROM statement. “Customer c” below aliases the Customer table as c. Sometimes you will see “Customer AS c” to create the alias in SQL. The AS statement is optional in table aliasing. The AS statement is required in field aliasing. SELECT s.SaleDate, i.ItemID, i.Description, si.Quantity FROM ((Customer c INNER JOIN Sales s ON c.CustomerID = s.CustomerID) INNER JOIN Sales_Inventory si ON s.SalesInvoiceID = si.SalesInvoiceID) INNER JOIN Inventory i ON si.ItemID = i.ItemID WHERE c.CustomerName = “Lola Doyle”; Obtaining the solution using QBE:
4-8 .
Accounting Information Systems 15e, GE
Queries with Aggregate functions d. How many different kinds of inventory items does S&S sell? Use NumOfItems as the name of the output column.
Solution Output:
Obtaining the solution using SQL: SELECT COUNT(Inventory.ItemID) AS NumOfItems FROM Inventory; Obtaining the solution using QBE:
e.
How many sales were made during October? Use NumOfSales as the name of your output column.
Solution Output:
Obtaining the solution using SQL: SELECT COUNT(Sales.SalesInvoiceID) AS NumOfSales FROM Sales WHERE Sales.SaleDate Between #10/1/2021# AND #10/31/2021# Obtaining the solution using QBE:
4-9 .
Ch. 4: Relational Databases
f.
How many sales were made to each customer? List CustomerID, CustomerName and NumOfSales. Sort the list by NumOfSales in descending order.
Solution Output:
Obtaining the solution using SQL: SELECT Customer.CustomerID, Customer.CustomerName, COUNT(Sales.SalesInvoiceID) AS NumOfSales FROM Customer INNER JOIN Sales ON Customer.CustomerID = Sales.CustomerID GROUP BY Customer.CustomerName ORDER BY COUNT(Sales.SalesInvoiceID) DESC; Obtaining the solution using QBE:
g.
How many units of each product were sold? Provide ItemID, Description, Color and SumOfQuantity, Sort the list by ItemID in ascending order.
Solution Output:
Obtaining the solution using SQL: 4-10 .
Accounting Information Systems 15e, GE
SELECT Inventory.ItemID, Inventory.Description, Inventory.Color, SUM(Sales_Inventory.Quantity) AS SumOfQuantity FROM Inventory INNER JOIN Sales_Inventory ON Inventory.ItemID = Sales_Inventory.ItemID GROUP BY Inventory.ItemID, Inventory.Description, Inventory.Color ORDER BY Inventory.ItemID Obtaining the solution using QBE:
h.
List the total of each invoice. Computed this by summing Quantity times SoldPrice for all the items on each invoice. Name the total InvoiceTotal. Provide SalesInvoiceID, SaleDate, SalesPerson, InvoiceTotal. Sort the list by InvoiceTotal in descending order.
Solution Output:
Obtaining the solution using SQL: SELECT Sales.SalesInvoiceID, Sales.SaleDate, Sales.SalesPerson, SUM(Sales_Inventory.Quantity*Sales_Inventory.SoldPrice) AS InvoiceTotal FROM Sales INNER JOIN Sales_Inventory ON Sales.SalesInvoiceID = Sales_Inventory.SalesInvoiceID GROUP BY Sales.SalesInvoiceID, Sales.SaleDate, Sales.SalesPerson ORDER BY SUM(Sales_Inventory.Quantity*Sales_Inventory.SoldPrice) DESC; Obtaining the solution using QBE:
4-11 .
Ch. 4: Relational Databases * Advanced queries that may require nesting or reference to earlier queries. i.
What were total sales in October? Provide TotalSales. You may reuse your query from question h.
Solution Output:
NOTE TO INSTRUCTOR: We present two solutions to this query. OPTION 1 solution relies on a prior query. It calls this prior query in the FROM statement. OPTION 2 solution does not rely on a prior query. Rather in performs the query as an inner query, before the outer query is performed. Note that the difference between OPTION 1 and OPTION 2 is only in the FROM statement. OPTION 1 references a saved query. OPTION 2 incorporates the SQL from question h in the FROM statement. Most power users prefer to nest there queries as in OPTION 2. Doing so allows the query to stand alone. It also eliminates the risk that someone may have modified the prior query, which would cause this query to be incorrect. Obtaining the solution using SQL: OPTION 1: SELECT SUM(InvoiceTotal) AS TotalSales FROM p_4_4_h WHERE SaleDate BETWEEN #10/1/2021# AND #10/31/2021# OPTION 2: SELECT SUM(InvoiceTotal) AS TotalSales FROM ( SELECT Sales.SalesInvoiceID, Sales.SaleDate, Sales.SalesPerson, SUM(Sales_Inventory.Quantity*Sales_Inventory.SoldPrice) AS InvoiceTotal FROM Sales INNER JOIN Sales_Inventory ON Sales.SalesInvoiceID = Sales_Inventory.SalesInvoiceID GROUP BY Sales.SalesInvoiceID, Sales.SaleDate, Sales.SalesPerson ) WHERE SaleDate BETWEEN #10/1/2021# AND #10/31/2021# Obtaining the solution using QBE: OPTION 1:
OPTION 2: 4-12 .
Accounting Information Systems 15e, GE
If you choose Option 2, it must be done in the SQL view since QBE only invites a user to specify an existing table or query. j.
What was the average amount of a sales transaction? Provide AvgSales. You may reuse your query from question h.
Solution Output: NOTE TO INSTRUCTOR: Refer to the note on question i. Obtaining the solution using SQL: OPTION 1: SELECT AVG(InvoiceTotal) AS AvgSales FROM p_4_4_h OPTION 2: SELECT AVG(InvoiceTotal) AS AvgSales FROM ( SELECT Sales.SalesInvoiceID, Sales.SaleDate, Sales.SalesPerson, SUM(Sales_Inventory.Quantity*Sales_Inventory.SoldPrice) AS InvoiceTotal FROM Sales INNER JOIN Sales_Inventory ON Sales.SalesInvoiceID = Sales_Inventory.SalesInvoiceID GROUP BY Sales.SalesInvoiceID, Sales.SaleDate, Sales.SalesPerson ); Obtaining the solution using QBE: OPTION 1:
OPTION 2: If you choose Option 2, it must be done in the SQL view since QBE only invites a user to specify an existing table or query. k.
Which product sold the most units? Provide ItemID, Description, Color and SumOfQuantity. You may reuse your query from question g.
Solution Output:
4-13 .
Ch. 4: Relational Databases
NOTE TO INSTRUCTOR: We present three solutions to this query. OPTION 1 solution relies on a prior query. It also uses the “TOP 1” statement in the SELECT. This typically returns one row of data. Since there is an ORDER BY, it returns the largest row of all rows returned. One might think that there is a flaw in this solution as returning one row would be incorrect if there was a tie. That is, if the two best selling products both sold 15 units, this query would seem to only show one of the best-selling products. However, Access has incorporated the recognition of ties for its TOP statement. This is problematic if you really only wanted one row. OPTION 2 solution relies on a prior query twice; once in the FROM statement and again in the WHERE clause. The WHERE clause is particularly interesting in that SumOfQuantity is compared to the output of a query, in this case a MAX query. It is important to note that the MAX query only SELECTS one column and the MAX only returns one row. Therefore, the output of the MAX query is a single value. That value is compared against SumOfQuantity. The structure of this query allows the response to present ties. If the two best selling products both sold 15 units, this query would show both of those products. OPTION 3 is identical to OPTION 2, except that the p_4_4_g query is no longer referenced. Rather the SQL from p_4_4_g is put in place of the p_4_4_g reference. Doing so allows the query to stand alone. It also eliminates the risk that someone may have modified the prior query, which would cause this query to be incorrect Obtaining the solution using SQL: OPTION 1: SELECT TOP 1 ItemID, Description, Color, SumOfQuantity FROM p_4_4_g ORDER BY SumOfQuantity DESC OPTION 2: SELECT ItemID, Description, Color, SumOfQuantity FROM p_4_4_g WHERE SumOfQuantity = (SELECT MAX(SumOfQuantity) FROM p_4_4_g); OPTION 3: SELECT ItemID, Description, Color, SumOfQuantity FROM ( SELECT Inventory.ItemID, Inventory.Description, Inventory.Color, SUM(Sales_Inventory.Quantity) AS SumOfQuantity FROM Inventory INNER JOIN Sales_Inventory ON Inventory.ItemID = Sales_Inventory.ItemID GROUP BY Inventory.ItemID, Inventory.Description, Inventory.Color ) WHERE SumOfQuantity = (SELECT MAX(SumOfQuantity) FROM ( SELECT Inventory.ItemID, Inventory.Description, Inventory.Color, SUM(Sales_Inventory.Quantity) AS SumOfQuantity FROM Inventory INNER JOIN Sales_Inventory ON Inventory.ItemID = Sales_Inventory.ItemID GROUP BY Inventory.ItemID, Inventory.Description, Inventory.Color 4-14 .
Accounting Information Systems 15e, GE
)); Obtaining the solution using QBE: OPTION 1:
OPTION 2: Note that an entire SQL query is placed in the Criteria box
OPTION 3: If you choose Option 3, it must be done in the SQL view since QBE only invites a user to specify an existing table or query.
l.
Which salesperson made the largest sale? Provide the SalesPersons name and the amount of the sale. You may reuse your query from question h.
NOTE TO INSTRUCTOR: Refer to the note on question k as the structure for the three OPTIONs is the same. Solution Output:
Obtaining the solution using SQL: OPTION 1: SELECT TOP 1 SalesPerson, InvoiceTotal FROM p_4_4_h ORDER BY InvoiceTotal DESC; OPTION 2: SELECT SalesPerson, InvoiceTotal 4-15 .
Ch. 4: Relational Databases
FROM p_4_4_h WHERE InvoiceTotal = (SELECT MAX(InvoiceTotal) FROM p_4_4_h); OPTION 3: SELECT SalesPerson, InvoiceTotal FROM ( SELECT Sales.SalesInvoiceID, Sales.SaleDate, Sales.SalesPerson, SUM(Sales_Inventory.Quantity*Sales_Inventory.SoldPrice) AS InvoiceTotal FROM Sales INNER JOIN Sales_Inventory ON Sales.SalesInvoiceID = Sales_Inventory.SalesInvoiceID GROUP BY Sales.SalesInvoiceID, Sales.SaleDate, Sales.SalesPerson ) WHERE InvoiceTotal = (SELECT MAX(InvoiceTotal) FROM ( SELECT Sales.SalesInvoiceID, Sales.SaleDate, Sales.SalesPerson, SUM(Sales_Inventory.Quantity*Sales_Inventory.SoldPrice) AS InvoiceTotal FROM Sales INNER JOIN Sales_Inventory ON Sales.SalesInvoiceID = Sales_Inventory.SalesInvoiceID GROUP BY Sales.SalesInvoiceID, Sales.SaleDate, Sales.SalesPerson )); Obtaining the solution using QBE: OPTION 1:
OPTION 2: Note that an entire SQL query is placed in the Criteria box
4-16 .
Accounting Information Systems 15e, GE
OPTION 3: If you choose Option 3, it must be done in the SQL view. 4.5
The tables in Table 4-17 reveal the structure of a database for the following queries. Build the database and enter data from these tables in a relational DBMS package, build the database and import an expanded dataset formatted in Excel available at http://www.pearsonglobaleditions.com, or retrieve the database from http://www.pearsonglobaleditions.com (in Microsoft Access format).
REQUIRED Write queries to answer the following questions. Your instructor may specify the method of acquiring the database noted above and whether to use Design view or SQL view. a.
For which items are there at least 100 units in QuantityOnHand?
Solution Output (expanded data):
Solution Output (original data):
4-17 .
Ch. 4: Relational Databases
Obtaining the solution using SQL: SELECT Inventory.ItemID, Inventory.Description, Inventory.QuantityOnHand FROM Inventory WHERE Inventory.QuantityOnHand > 99; Obtaining the solution using QBE:
b.
What were the item numbers, price, and quantity of each item sold on invoice number 103?
Solution Output:
Obtaining the solution using SQL: SELECT Sales_Inventory.ItemID, Inventory.ListPrice, Sales_Inventory.Quantity, Sales_Inventory.Invoice FROM Inventory INNER JOIN Sales_Inventory ON Inventory.ItemID = Sales_Inventory.ItemID WHERE Sales_Inventory.Invoice = 103;
4-18 .
Accounting Information Systems 15e, GE
Obtaining the solution using QBE:
c.
Which customers made purchases from Martinez? Provide CustomerName and SalesPerson. (Show customer names only once, even if they purchased from Martinez multiple times.)
Solution Output (expanded data):
Solution Output (original data):
Obtaining the solution using SQL: SELECT DISTINCT Customer.CustomerName, Sales.SalesPerson FROM Customer INNER JOIN Sales ON Customer.CustomerID = Sales.CustomerID WHERE Sales.SalesPerson = "Martinez"; Obtaining the solution using QBE:
4-19 .
Ch. 4: Relational Databases
The option for showing distinct rows may be difficult to find in the Access menu system. It is the ‘Unique Values’ selector found in the property sheet that can be selected as shown in the solution.
d.
List Invoice, SaleDate, SalesPerson, CustomerName, and Amount for Invoices whose Amount is over $1,500. Sort the Amount from largest to smallest.
Solution Output (expanded data):
Solution Output (original data): Obtaining the solution using SQL: SELECT s.Invoice, s.SaleDate, s.SalesPerson, c.CustomerName, s.Amount FROM Customer c INNER JOIN Sales s ON c.CustomerID = s.CustomerID WHERE s.Amount > 1500 ORDER BY s.Amount DESC; Note the use of aliases in the SQL solution. Use of aliases is optional. Obtaining the solution using QBE:
4-20 .
Accounting Information Systems 15e, GE
e.
List Invoice, ItemID, Description, SellPrice, ListPrice, Quantity, and compute the Extension (SellPrice * Quantity) for all items sold where the SellPrice is different than the ListPrice. Sort by ItemID in descending order.
Solution Output (expanded data):
Solution Output (original data):
Obtaining the solution using SQL: SELECT si.Invoice, si.ItemID, i.Description, si.SellPrice, i.ListPrice, si.Quantity, (si.SellPrice*si.Quantity) AS Extension FROM Inventory i INNER JOIN Sales_Inventory si ON i.ItemID = si.ItemID WHERE i.ListPrice <> si.SellPrice ORDER BY si.ItemID DESC; Note the use of aliases in the SQL solution. Use of aliases is optional. Obtaining the solution using QBE:
NOTE TO INSTRUCTOR: Follow-up discussion question: Why would SellPrice be different than ListPrice? The SellPrice may be different than the ListPrice on the day of sale due to sale discounts or other promotions. Over time, the SellPrice will likely be different than ListPrice as ListPrice should change with the market. SellPrice for a transaction should never change.
4-21 .
Ch. 4: Relational Databases f.
Compute the profit margin for each item sold. Calculate the profit margin as (SellPrice-StdCost)/SellPrice. List Invoice, SaleDate, ItemID, SellPrice, Quantity, and computed ProfitMargin. Sort by ProfitMargin in descending order.
Solution Output (expanded data, partial):
Solution Output (original data):
Obtaining the solution using SQL: SELECT s.Invoice, s.SaleDate, si.ItemID, si.SellPrice, i.StdCost, ROUND((SellPriceStdCost)/SellPrice,2) AS ProfitMargin FROM (Sales AS s INNER JOIN Sales_Inventory AS si ON s.Invoice = si.Invoice) INNER JOIN Inventory AS i ON si.ItemID = i.ItemID ORDER BY (SellPrice-StdCost)/SellPrice DESC; Note the ROUND function is not required. Use of aliases is optional. Obtaining the solution using QBE:
Note the ROUND function is not required.
4-22 .
Accounting Information Systems 15e, GE g.
Compute the profit for each line of the invoices. Calculate the profit as (SellPrice – StdCost) * Quantity. List Invoice, SaleDate, ItemID, SellPrice, Quantity, and computed Profit. Sort by Invoice in ascending, then Profit in descending order.
Solution Output (original data, expanded data not shown as the first 16 rows would be the
same): Obtaining the solution using SQL: SELECT s.Invoice, s.SaleDate, si.ItemID, si.SellPrice, si.Quantity, (SellPriceStdCost)*Quantity AS Profit FROM (Sales s INNER JOIN Sales_Inventory si ON s.Invoice = si.Invoice) INNER JOIN Inventory i ON i.ItemID = si.ItemID ORDER BY s.Invoice, (SellPrice-StdCost)*Quantity DESC; Note the use of aliases in the SQL solution. Use of aliases is optional. Obtaining the solution using QBE:
Queries with Aggregate functions h.
How many sales transactions were made in October? Name your output column Num_Of_Sales.
Solution Output (original data, expanded data not shown as the rows would be the same):
Obtaining the solution using SQL: SELECT COUNT(Sales.Invoice) AS Num_of_Sales FROM Sales 4-23 .
Ch. 4: Relational Databases
WHERE Sales.SaleDate Between #10/1/2018# And #10/31/2018#;
Obtaining the solution using QBE: i.
How many customers live in Arizona? List the State and CountOfCustomers.
Solution Output (original data, expanded data not shown as the rows would be the same):
Obtaining the solution using SQL: SELECT Customer.State, Count(Customer.CustomerID) AS CountOfCustomers FROM Customer WHERE Customer.State = "AZ" GROUP BY Customer.State; Note: The WHERE Customer.State = "AZ" would be removed if HAVING Customer.State = "AZ" were placed after the GROUP BY clause.
Obtaining the solution using QBE:
4-24 .
Accounting Information Systems 15e, GE j.
How many customers live in each state? List the State and CountOfCustomers. Sort the list alphabetically by State.
Solution Output (expanded data):
Solution Output (original data):
Obtaining the solution using SQL: SELECT Customer.State, Count(Customer.CustomerID) AS CountOfCustomers FROM Customer GROUP BY Customer.State ORDER BY Customer.State; Obtaining the solution using QBE:
4-25 .
Ch. 4: Relational Databases k.
How much did each salesperson sell based on Sales.Amount? List SalesPerson and TotalAmount. Sort from largest TotalAmount to smallest.
Solution Output (expanded data):
Solution Output (original data):
Obtaining the solution using SQL: SELECT Sales.SalesPerson, Sum(Sales.Amount) AS TotalAmount FROM Sales GROUP BY Sales.SalesPerson ORDER BY Sum(Sales.Amount) DESC ; Obtaining the solution using QBE:
l.
How many units of each item were sold? List ItemID, Description, TotalSold. Sort on TotalSold in ascending order.
Solution Output (expanded data):
4-26 .
Accounting Information Systems 15e, GE
Solution Output (original data): Obtaining the solution using SQL: SELECT Inventory.ItemID, Inventory.Description, Sum(Sales_Inventory.Quantity) AS TotalSold FROM Inventory INNER JOIN Sales_Inventory ON Inventory.ItemID = Sales_Inventory.ItemID GROUP BY Inventory.ItemID, Inventory.Description ORDER BY Sum(Sales_Inventory.Quantity) ;
Obtaining the solution using QBE: m.
Compute a total for each invoice based on Quantity times SellPrice. Name your total InvoiceTotal. Display Invoices where InvoiceTotal does not equal Amount. List Invoice, SaleDate, SalesPerson, Amount, InvoiceTotal. If no rows meet your criteria, consider changing the value of Amount for Invoice 101 to a different value to test your query.
Solution Output (expanded data):
Solution Output (original data): No rows meet these criteria. Obtaining the solution using SQL: SELECT Sales.Invoice, Sales.SaleDate, Sales.Amount, Sum(Quantity*SellPrice) AS InvoiceTotal FROM Sales INNER JOIN Sales_Inventory ON Sales.Invoice = Sales_Inventory.Invoice GROUP BY Sales.Invoice, Sales.SaleDate, Sales.Amount HAVING Sales.Amount <> Sum(Quantity*SellPrice) Obtaining the solution using QBE:
4-27 .
Ch. 4: Relational Databases
NOTE TO INSTRUCTOR: Follow-Up Discussion Question: Why would our computed InvoiceTotal differ from Amount? This query demonstrates a data inconsistency. Either the Amount was computed incorrectly or perhaps the underlying data has been accidentally or even fraudulently manipulated. This query also demonstrates that while database developers may not want to store a computed amount, accountants may request that some computed fields be stored. The accountant can use the comparison of a stored amount to detect data manipulation. Advanced queries that may require nesting or reference to earlier queries.
NOTE TO INSTRUCTOR: The advanced queries use queries within queries. This is referred to as nesting SQL queries. When nesting queries are present, the SQL engine executes the nested or inner queries first, then the outer queries can be executed on the result of the nested query. It is not uncommon to see queries nested several levels deep in practice. n.
Show invoices for the customer(s) with the largest credit limit. List CreditLimit, CustomerName, Invoice, SaleDate, Amount.
Solution Output (expanded data):
Solution Output (original data): Obtaining the solution using SQL: Query1: SELECT Customer.CreditLimit, Customer.CustomerName, Sales.Invoice, Sales.SaleDate, Sales.Amount FROM Customer INNER JOIN Sales ON Customer.CustomerID = Sales.CustomerID WHERE Customer.CreditLimit = (The MAX CreditLimit which is unknown in this query); Query2 (The Max CreditLimit): SELECT MAX(Customer.CreditLimit) FROM Customer; Now nest Query2 inside of Query1: SELECT Customer.CreditLimit, Customer.CustomerName, Sales.Invoice, Sales.SaleDate, Sales.Amount FROM Customer INNER JOIN Sales ON Customer.CustomerID = Sales.CustomerID WHERE Customer.CreditLimit = (SELECT MAX(Customer.CreditLimit) FROM Customer); 4-28 .
Accounting Information Systems 15e, GE
Obtaining the solution using QBE: Option 1:
Option 2: Step 1: Create Query “p_4_5_n_p1”
Step 2: Reference “p_4_5_n_p1” in second query.
o.
Show invoices that are 2 times larger than the average invoice based on Amount. List Invoice, SaleDate, Amount.
Solution Output (expanded data):
Solution Output (original data): 4-29 .
Ch. 4: Relational Databases
Obtaining the solution using SQL: Query1: SELECT Sales.Invoice, Sales.SaleDate, Sales.Amount FROM Sales WHERE Sales.Amount = (Average Invoice Amount which is unknown in this query *2); Query2 (Average Invoice Amount*2): SELECT Avg(Sales.Amount)*2 FROM Sales; Now nest Query2 inside of Query1: SELECT Sales.Invoice, Sales.SaleDate, Sales.Amount FROM Sales WHERE Sales.Amount > (SELECT Avg(Sales.Amount)*2 FROM Sales); Obtaining the solution using QBE: Option 1:
4-30 .
Accounting Information Systems 15e, GE
Option 2:
Step 1: Create Query “p_4_5_o_p1” Step 2: Reference “p_4_5_o_p1” in second query.
4.6
C&A Company wants to store employee skill data. Each employee may possess one or more skills, and several employees may have the same skill. The company wants to include the following facts in the database: date hired date of birth skill acquisition date
a. Design a set of relational tables to store these data. The necessary tables, with their attendant primary and foreign keys, are as follows: b. Identify the primary key for each table, and identify any needed foreign keys. Table Name Employee
Primary Key Employee Number
Skills Employees-Skills
Skill number Skill number Employee number
Foreign Keys Supervisor number (another employee number)
4-31 .
Other Attributes Employee name Pay rate Date hired Date of birth Skill name Date skill acquired
Ch. 4: Relational Databases c. Implement your schema using any relational DBMS. Specify primary and foreign keys and enforce referential integrity. Demonstrate the soundness of your design by entering sample data in each table.
There is no single solution to part (c) as students will select different software packages and enter different data in the tables. 4.7
You want to extend the schema shown in Table 4-18 to include information about customer payments. Some customers make installment payments on each in voice. Others write a check to pay for several different invoices. You want to store the following information: amount applied to a specific invoice cash receipt number customer name customer number date of the payment employee who processed the payment invoice to which payment applies total amount received
REQUIRED a. Modify the set of tables in Table 4-18 to store this additional data. Name each table and field in accordance with good database design. b. Identify the primary key for each new table you create.
The following additional tables, with their attendant primary keys, are needed to store the other new attributes. Note that customer name is already stored in the customer table. TotalAmountReceived might not be stored as it could be computed as a sum of AmountApplied for all instances of a particular CashReceiptID. Table Name CashReceipts
Primary Key CashReceiptID
CashReceipts_Sales InvoiceID (Invoice payment applies to) CashReceiptID c.
Foreign Keys CustomerID EmployeeID (Employee processing payment) InvoiceID CashReceiptID
Other Attributes ReceiptDate TotalAmountReceived
AmountApplied (to a specific invoice)
Implement your schema using any relational DBMS package. Indicate which attributes are primary and foreign keys, and enter sample data in each table you create.
There is no solution to part c as students will select different software packages and enter different data in the tables.
4-32 .
Accounting Information Systems 15e, GE
4.8
Create relational tables that solve the update, insert, and delete anomalies in Table 419. Name each table and field in accordance with good database design.
InvoiceID ShipDate OrderDate CustomerID CustomerName ItemID Description Quantity 52 6-19-21 5-25-21 201 Johnson 103 Trek 9000 5 52 6-19-21 5-25-21 201 Johnson 122 Nimbus 8 4000 52 6-19-21 5-25-21 201 Johnson 10 Izzod 3000 11 52 6-19-21 5-25-21 201 Johnson 71 LD Trainer 12 57 6-20-21 6-01-21 305 Henry 535 TR 18 Standard 57 6-20-21 6-01-21 305 Henry 115 NT 2000 15 57 6-20-21 6-01-21 305 Henry 122 Nimbus 5 4000 TABLE 4-19 To avoid the update, insert, and delete anomalies, four separate relational tables are created. INVOICE TABLE InvoiceID ShipDate OrderDate CustomerID (PK) (FK) 52 6-19-21 5-25-21 201 57 6-20-21 6-01-21 305 INVOICE-INVENTORY TABLE InvoiceID ItemID (PK/FK) (PK/FK) 52 103 52 122 52 10 52 71 57 535 57 115 57 122 CUSTOMER TABLE CustomerID (PK) 201 305 Item Table ItemID (PK) 10
Quantity 5 8 11 12 18 15 5
CustomerName Johnson Henry
Description Izzod 3000 4-33 .
Ch. 4: Relational Databases
71 103 115 122 535
LD Trainer Trek 9000 NT 2000 Nimbus 4000 TR Standard Note: PK-Primary Key, FK – Foreign Key, PK/FK – Primary Key/Foreign Key
4.9
Create relational tables that solve the update, insert, and delete anomalies in Table 420. Name each table and field in accordance with good database design.
TABLE 4-20 Purchas Purchase PartID Descriptio UnitPric Quantit VendorI VendorNam VendorAddr eOrderI OrderDat n e yOrdere D e ess e D d 2 3/9/21 334 XYZ $30 3 504 KL Supply 75 Stevens Dr. 2 3/9/21 231 PDQ $50 5 504 KL Supply 75 Stevens Dr. 2 3/9/21 444 YYM $80 6 504 KL Supply 75 Stevens Dr. 3 4/5/21 231 PDQ $45 2 889 Oscan Inc 55 Cougar Cir. PART TABLE PartID Description (PK) 334 XYZ 231 PDQ 444 YYM PURCHASE ORDER TABLE PurchaseOrderID VendorID PurchaseOrderDate (PK) (FK) 2 504 3/9/21 3 889 4/5/21 VENDOR TABLE VendorID VendorName VendorAddress (PK) 504 KL Supply 75 Stevens Dr. 889 Oscan Inc. 55 Cougar Cir. PURCHASE_PART TABLE PartID PurchaseOrderID QuantityOrdered Unit (PK/FK) (PK/FK) Price 2 334 3 30 4-34 .
Accounting Information Systems 15e, GE
2 2 3
231 5 50 444 6 80 231 2 45 Note: PK-Primary Key, FK – Foreign Key, PK/FK – Primary Key/Foreign Key
4.10
From the database created in the comprehensive problem (also available at http://www.pearsonglobaleditions.com), perform queries based on the tables and query grid shown in Table 4-21. Your instructor may specify whether you are to use Design view or SQL view. Which borrowers use Advent Appraisers? List BorrowerID, LastName, AppraiserName.
a.
Solution Output:
Obtaining the solution using SQL: SELECT Borrower.BorrowerID, Borrower.LastName, Appraiser.AppraiserName FROM Appraiser INNER JOIN Borrower ON Appraiser.AppraiserID = Borrower.AppraiserID WHERE Appraiser.AppraiserName = "Advent Appraisers"; Obtaining the solution using QBE:
b.
List all of the property appraisers with the letter “d” in their name, sorted by name. List AppraiserID and AppraiserName.
Solution Output:
Obtaining the solution using SQL: 4-35 .
Ch. 4: Relational Databases
SELECT Appraiser.AppraiserID, Appraiser.AppraiserName FROM Appraiser WHERE Appraiser.AppraiserName LIKE "*d*";
Obtaining the solution using QBE: c.
List all of the lenders who have participated in a transaction that used AppraiserID 8. Provide LenderName, BorrowerID, and ReqMortAmount.
Solution Output:
Obtaining the solution using SQL: SELECT Lender.LenderName, Borrower.BorrowerID, Borrower.ReqMortAmount FROM Lender INNER JOIN Borrower ON Lender.LenderID = Borrower.LenderID WHERE Borrower.AppraiserID = 8; Obtaining the solution using QBE:
d.
List the lenders that lent more than $100,000. Provide LenderName and AppraiserName. Only list each combination of LenderName and AppraiserName once.
Solution Output:
4-36 .
Accounting Information Systems 15e, GE
Obtaining the solution using SQL: SELECT DISTINCT l.LenderName, a.AppraiserName FROM (Lender l INNER JOIN Borrower b ON l.LenderID = b.LenderID) INNER JOIN Appraiser a ON a.AppraiserID = b.AppraiserID WHERE b.ReqMortAmount > 100000; Note the use of aliases in the SQL solution. Use of aliases is optional. Obtaining the solution using QBE:
The DISTINCT parameter is achieved by selecting ‘Yes’ on the Unique Values parameter in the property sheet. Queries that use aggregate functions e.
What is the average amount borrowed from each lender? Provide LenderID, LenderName, and AvgMortAmt. Sort by AvgMortAmt in descending order. Consider using ROUND() to present at 2 decimal places.
Solution Output:
Obtaining the solution using SQL: SELECT Lender.LenderID, Lender.LenderName, Round(Avg(Borrower.ReqMortAmount),2) AS AvgMortAmt FROM Lender INNER JOIN Borrower ON Lender.LenderID = Borrower.LenderID GROUP BY Lender.LenderID, Lender.LenderName ORDER BY Avg(Borrower.ReqMortAmount) DESC; Obtaining the solution using QBE:
4-37 .
Ch. 4: Relational Databases
f.
How many appraisals did each appraiser perform? Provide AppraiserName and CountOfAppraisals.
Solution Output:
Obtaining the solution using SQL: SELECT a.AppraiserName, Count(b.AppraiserID) AS CountOfAppraisals FROM Appraiser a INNER JOIN Borrower b ON a.AppraiserID = b.AppraiserID GROUP BY a.AppraiserName; Note the use of aliases in the SQL solution. Use of aliases is optional. Obtaining the solution using QBE:
Advanced queries that may require nesting or reference to earlier queries. g. Which borrower requested the largest mortgage? Provide BorrowerID, LastName and ReqMortAmount.
Solution Output: Obtaining the solution using SQL: OPTION 1: SELECT TOP 1 Borrower.BorrowerID, Borrower.LastName, Borrower.ReqMortAmount FROM Borrower ORDER BY Borrower.ReqMortAmount DESC; 4-38 .
Accounting Information Systems 15e, GE
Note: The TOP 1 operator will provide more than one row if there are duplicates of the ORDER BY criteria. OPTION 2: SELECT Borrower.BorrowerID, Borrower.LastName, Borrower.ReqMortAmount FROM Borrower WHERE Borrower.ReqMortAmount = (SELECT MAX(Borrower.ReqMortAmount) FROM Borrower); Note: See solution to Problem 4-5o to see more options to nesting SQL Obtaining the solution using QBE: OPTION 1:
OPTION 2:
Note: See solution to Problem 4-5o to see more options to nesting SQL h.
Which borrower requested the smallest mortgage? Provide BorrowerID, LastName and ReqMortAmount.
Solution Output: Obtaining the solution using SQL: OPTION 1: SELECT TOP 1 Borrower.BorrowerID, Borrower.LastName, Borrower.ReqMortAmount FROM Borrower ORDER BY Borrower.ReqMortAmount ASC; 4-39 .
Ch. 4: Relational Databases
Note: The TOP 1 operator will provide more than one row if there are duplicates of the ORDER BY criteria. OPTION 2: SELECT Borrower.BorrowerID, Borrower.LastName, Borrower.ReqMortAmount FROM Borrower WHERE Borrower.ReqMortAmount = (SELECT MIN(Borrower.ReqMortAmount) FROM Borrower); Note: See solution to Problem 4-5o to see more options to nesting SQL . Obtaining the solution using QBE: OPTION 1:
OPTION 2:
Note: See solution to Problem 4-5o to see more options to nesting SQL 4.11 Answer the following multiple-choice questions. (Correct solutions bolded.) 1. With respect to data warehouses, databases, and files, which of the following statement(s) is (are) true? a. Databases were developed to address the proliferation of master files, which had to be created each time the need for information arose. b. A data warehouse contains details as well as summaries of historical data. c. Databases used for transaction processing are eventually replaced by data warehouses. d. Data mining refers to the analysis of large amounts of data to make strategic decisions. e. Database systems allow data sharing and data integration. 2. With respect to data warehouses, databases, and files, which of the following statement(s) is (are) true? a. Accountants should not be involved in the creation and management of databases.
4-40 .
Accounting Information Systems 15e, GE b. Good data is important for businesses because bad data could lead to a loss of customer confidence. c. Data warehouses should not contain redundant data. d. Management should enforce appropriate policies and procedures to ensure clean data. e. Business intelligence refers to the analysis of large amounts of data for operational decision-making. 3. With respect to data warehouses, databases, and files, which of the following statement(s) is (are) true? a. Data warehouses do not require proper controls as they house historical data. b. Data stored in data warehouses should be encrypted. c. Online analytical processing makes use of queries to extract proven relationships among data. d. Data mining uses structure queries to discover hypothesized relationships in data. e. Transaction databases minimizes redundancy and maximizes efficiency of updates . 4. With respect to database systems, which of the following statement(s) is (are) true? a. The organization-wide view of the entire database lists all the data elements and the related relationships in an internal-level schema. b. A human resource manager’s view of all employee information stored in a table would be called her logical view. c. The type of data, its order, and the length of data fields are all stored in a record layout document. d. The external-level schema defines how data is stored in the database. e. A data dictionary stores information about the data within the database. 5. With respect to database systems, which of the following statement(s) is (are) true? a. The DQL is used to update database content. b. A user needs to request permission to access a report writer in order to create reports. c. A user does not need to request permission to access the DQL of a DBMS. d. Database users cannot change their logical view of data without changing the way those data are physically stored. e. DBMS software links the way data are physically stored with each user’s logical view of the data. 6. With respect to database systems, which of the following statement(s) is (are) true? a. A schema is a description of all the data elements and the structure of the database. b. The DQL is used by end users to update the structure of the database. c. Only authorized administrators and programmers should have access to the DDL and DML. d. A subschema in a database is used to provide access to those sections of the database that do not apply to that subschema. e. The physical view of the database is the way data are stored and physically arranged. 7. With respect to relational databases, which of the following statement(s) is (are) true? a. A primary key can only be a single attribute and is used to uniquely identify a tuple in a table. b. A logical data model is a physical representation of the structure of the database. 4-41 .
Ch. 4: Relational Databases c. A database consists of a single two-dimensional table that stores all data. d. Semantic data modeling needs knowledge of business processes and information requirements to create normalized tables. e. Normalized database tables do not suffer from anomalies. 8. With respect to relational databases, which of the following statement(s) is (are) true? a. A foreign key may be null if it is not a part of the primary keys of the table where it appears. b. Entity integrity means that a primary key must be unique or may contain a null value. c. c. Non-key attributes need not describe a characteristic of the object identified by the primary key. d. Tables in 3NF are free of update, insert, and delete anomalies. e. Depending on the data being stored, some columns in a tuple may contain multiple values. 9. With respect to relational databases, which of the following statement(s) is (are) true? a. A delete anomaly is said to occur when one cannot delete a specific tuple from a table. b. Referential integrity states that a primary key cannot be null and its value must be unique. c. An insert anomaly is said to occur when it is not possible to add records to a database. d. Non-key attributes should never be null. e. A foreign key is an attribute in a table that is also a primary key in another table and is used to link the two tables.
4-42 .
Accounting Information Systems 15e, GE
SUGGESTED ANSWERS TO THE CASE CASE 4-1 Research Project As in all areas of IT, DBMSs are constantly changing and improving. Research how businesses are using DBMSs, and write a report of your findings. Address the following issues: 1) Which popular DBMS products are based on the relational data model? 2) Which DBMS products are based on a logical model other than the relational data model? 3) What are the relative strengths and weaknesses of the different types (relational versus other logical models) of DBMSs?
No single answer exists with this case; indeed, solutions will vary depending upon student ingenuity and creativity. Reports should be graded in terms of how well each issue was addressed and in terms of writing quality. Students should be able to find the following information:
Relational DBMSs include DB2, Oracle, SQL Server and Access.
Many newer products such as MongoDB are based on the object-oriented data model, or are a hybrid of the relational and object-oriented approaches. Older mainframe DBMS are based on hierarchical or network logical models. SAP HANA is a column-oriented DBMS.
Hierarchical and network DBMSs often provide performance advantages--especially in terms of processing speed. Those advantages, however, usually come at the cost of making it much more difficult for end users to do ad-hoc queries of the database. Relational databases support easy to use, yet powerful query languages like SQL and graphical query-by-example languages such as that provided by Microsoft Access. Object-oriented databases are especially effective for including multimedia, whereas hierarchical, network, and relational databases are better suited for alphanumeric data (although the relational model can be extended to include multimedia data). Pure object-oriented databases are more often designed for special purpose scientific use when graphical images and sound need to be stored in the database. Relational and hybrid object-relational DBMSs are commonly used in newer transaction processing systems, although older systems are based on the hierarchical or network data models.
4-43 .
CHAPTER 5 INTRODUCTION TO DATA ANALYTICS IN ACCOUNTING SUGGESTED ANSWERS TO DISCUSSION QUESTIONS 5.1 The first step of an analytics mindset is to ask the right questions. How do you learn how to ask the right questions? How would you teach someone else how to ask the right questions? Student answers will vary. We expect that they would reference the SMART criteria outlined in the chapter. Questions need to provide Specific answers. Responses must be measurable or lead to data that is measurable and analyzable. Responses should lead to potential Actions that are Achievable. The question must be Relevant to the person and context of the business. Finally, the question should be Timely. 5.2 This chapter discusses several different ways to structure data warehouses, data marts, and data lakes. Discuss the diagrams listed in the book, or diagram your own structures, for data warehouses, data marts, and data lakes and discuss the pros and cons of each structure. The three structures shown in the chapter are shown below with a discussion of some of the pros and cons of the structure.
This structure makes the data warehouse of central importance. If the data warehouse is maintained well, the data marts and data lake should have high data quality. If there are problems in the data warehouse, then the rest of the data in the organization is likely to be flawed as well. This structure likely results in the data marts having less timely information than the data warehouse.
5-1 .
Ch. 5: Introduction to Data Analytics in Accounting
For this structure, the data marts are of greatest importance and if they are maintained well, the data warehouse and data lake should be of high quality. This type of approach should have data marts have the most up-to-date information.
This structure requires the data sources to populate both the data marts and the date warehouse at the same time. This can result in extra ETL work if the data mart and data warehouse are structured differently. Also, if some part of the ETL process does not work correctly, the data marts and the data warehouses may not “tell the same story” meaning the data that should be the same may not be. 5.3 Companies are automating many accounting tasks. Is automation good or bad? Consider this question from the view of accounting students, accounting practitioners, other business professionals, and society as a whole. What should be done to achieve the good aspects of automating accounting tasks while minimizing the poor aspects? Student answers will vary. Answers will vary for different perspectives, some general topics for all areas include the following. Positives include: Financial benefits for the organization 5-2 .
Accounting Information Systems 15e, GE
Employees no longer performing menial and mundane tasks Improved effectiveness and efficiency in different processes
Negatives include: Potential employment losses for employees and related consequences to society Mistakes in automation could cause massive problems before being discovered Automation can be difficult to implement and may not result in gains and improvements To achieve the positives and mitigate the negatives, companies and employees will need a process to implement bots and work with employees. Using a risk management framework (as discussed in chapter 10) can be very helpful. Internal controls around automation should be instituted, especially change management controls and monitoring controls. Clear communication with employees and job training for displaced employees will be very valuable. 5.4 The end of this chapter suggests that data analytics are not always appropriate for a decision context. Identify three unique business situations for which data analytics may not be appropriate. Identify why data analytics are not appropriate in these situations and how a decision maker should make their decision without using data. Data analytics are only useful if analyzing the past can predict or model the future. Data Analytics faces difficulty in (1) new environments with no data, (2) dramatically changing environments where historic data is no longer relevant to the future, and (3) when the analytics conflict with the core fundamentals. (HR collect employee health data that confirms that employees like sugar, but HR knows that sugar increases health care costs.). Decision makers can make decisions without data by using a decision-making framework (risk management frameworks are discussed in Chapter 10), consulting with experienced professionals, or using teams and groups to develop solutions.
5-3 .
Ch. 5: Introduction to Data Analytics in Accounting
SUGGESTED ANSWERS TO THE PROBLEMS 5.1 Match the following terms with the appropriate definition or example: 1 analytics mindset a Information that results from the examination of data to understand the past, answer the question “what happened?” 2 automation b The application of machines to automatically perform a task that was once performed by human beings 3 bot c The amount of data that is created and stored by an organization 4 dark data d A collection of structured, semi-structured, and unstructured data stored in a single location 5 data lake e An autonomous computer program designed to perform a specific task 6 data mart f Different forms data can take. 7 data storytelling g Computer software that can be programmed to automatically perform tasks across applications just as human workers do 8 data swamps h Information that results from analyses that focus on predicting the future, answer the question, “what might happen in the future?” 9 data variety i A character, or series of characters, that mark the end of one field and the beginning of the next field 10 data velocity j Data that describes other data 11 data veracity k The use of a graphical representation of data to convey meaning 12 data visualization l The quality or trustworthiness of data 13 data volume m Data repositories that are not accurately documented so that the stored data cannot be properly identified and analyzed 14 delimiter n A way of thinking that centers on the correct use of data and analysis for decision making. 15 descriptive analytics o The process of translating often complex data analyses into more easy to understand terms to enable better decision making 16 diagnostic analytics p Data that has no uniform structure 17 ETL process q Two characters that indicate the beginning and ending of a field and tell the program to ignore any delimiters contained between the characters 18 flat file r A set of procedures for blending data. The acronym stands for extract, transform, and load data. 19 metadata s Information that attempt to determine causal relationships, answer the question “why did this happen?” 20 predictive analytics t Information that results from analyses to provide a recommendation of what should happen, answer the question “what should be done?” 5-4 .
Accounting Information Systems 15e, GE
21 prescriptive analytics
u
22 robotic process automation (RPA) 23 structured data 24 text qualifier 25 unstructured data
v w x y z
A text file that contains data from multiple tables or sources and merges that data into a single row Data repositories that hold structured data for a subset of an organization The pace at which data is created and stored Data that is highly organized and fits into fixed fields Storage of structured data from many different sources in an organization Information the organization has collected and stored that would be useful for analysis but is not analyzed and is thus generally ignored
Solution 1 n 2 b 3 e 4 z 5 d 6 v 7 o 8 m 9 f 10 w 11 l 12 k 13 c 14 i 15 a 16 s 17 r 18 u 19 j 20 h 21 t 22 g 23 x 24 q 25 p 5.2 For each of the following examples, indicate whether the data is structured, semistructured, or unstructured or a mix of each. Explain your answer.
5-5 .
Ch. 5: Introduction to Data Analytics in Accounting
1. A company runs many social media campaigns to increase sales. The company collects data about the amount spent on each add campaign, the number of people who click on each add, whether each person clicking on an add completed a purchase, and the location (city and country) of each person who clicked on an ad. All of these types of data are structured data because these are highly organized data that fit into fixed fields. For example, amount of money spent is a financial number that can round to two decimal places, number of people is an integer value, whether a person completes a purchase is an integer, and the location is a defined text value. 2. A company performs performance evaluations of all its employees each quarter. The evaluations include comments made by peers of each of employee, a supervisor’s write-up of performance during the quarter with a rating on a 5-point scale, and performance metrics relative to their job title (e.g., sales completed for sales people, units repaired for repair people, etc.). This is a mix of data structures. The scaled items and performance metrics are structured data. The comments and write-up are semi-structured data. 3. A call center records all phone calls between employees and customers. The company stores the data so that they can review it if any allegations are made of inappropriate employee behavior. Recorded phone calls are unstructured data because they are a fixed length. 4. A company scrapes data from a review website where customers can write-in about products they have purchased. The company analyzes each of the reviews but only records the number of words in the review, a rating of the tone of the review (scores from -3 to +3), and the number of stars given (1 to 4). Although the reviews would be a type of unstructured or semi-structured data, after the analysis, the company only stores structured data. 5. A university tracks all of the classes that students sign up for each semester. The university records the course number, class description, and course credit hours for each student. This is structured data because the course number, description, and credit hours are all welldefined and fit into a fixed field. 6. A mechanic keeps a digital catalog of all of the part numbers and part descriptions for each type of vehicle that the company services.
5-6 .
Accounting Information Systems 15e, GE
This is structured data the part number and description are highly organized data that fits into a fixed field. 7. A non-profit organization keeps a list of all donors who have given to their organization in the past. The organization tracks names, dates of donations, amount donated, and additional comments about the donor and their donation. This is a mix of structured and semi-structured data. The field containing comments is semistructured, the other items are structured data. 8. An online retailer tracks all of the IP addresses of every web visit. The retailer monitors IP addresses to see if visits are coming from IP addresses that are known to hack company websites. This is structured data. 9. A company scrapes data from a review website where customers can write-in about products they have purchased. The company stores each of the written reviews. This is likely to be semi-structured data because companies often have limited amount of space devoted to reviews (i.e., 1,000 characters). The written reviews thus have some organization, but they cannot be fully and easily analyzed. 10. A company owns a football stadium and takes high definition photos of all fans. The company stores these images and plans eventually to use advanced technologies to see which fans are most likely to wear the team’s colors so they can market clothing to them. The photos are unstructured data because they do not have uniform structure and cannot be easily fit into a relational database (the link to a photo can, but the information about the photo itself would be stored outside the database). 5.3 Consider the following scenario. You are a tax professional meeting with a new client to help them make strategic tax planning decisions. You know that clients can choose a variety of tax positions that vary in aggressiveness. A very conservative tax position will result in paying higher taxes, but a reduced likelihood of the IRS auditing and fining the client. In contrast, taking an aggressive tax position will result in lower taxes, but an increased likelihood of the IRS auditing and fining the client. As this is a new client, you want to assess the client’s appetite for taking aggressive versus more conservative tax positions. An intern prepared a list of questions for you to ask the client. Review the list of questions below. REQUIRED
5-7 .
Ch. 5: Introduction to Data Analytics in Accounting
For each question, decide whether it is a SMART question or not. If not a SMART question, then rewrite the question and explain why you changed the question. Consider each question independent of the others, meaning redundancy between questions is ok, as you would not likely ask all of these questions. This exercise helps you practice developing SMART questions. 1. You want to take an aggressive tax position, right? This is a leading question, which is problematic at the outset because it influences the client to want to answer in a certain way. The question could be reworded as Do you want to be aggressive or conservative in your tax compliance? This question allows for a specific, relevant answer. 2. Why do you pay taxes? This question is not very specific and will not result in an answer that can be measured or achievable. A better question would be, do you pay taxes because you feel it is your duty or to avoid penalties? Why? 3. What do you think Congress should do to reform personal income taxes in this country? Open ended question calling for speculation, but certainly not actionable in the current environment. The question is also not specific. This is not relevant and thus, should not be reworded or asked in this context. 4. How much money do you want to save on taxes? This question introduces ethical problems as it makes it seem that the practitioner can make any number work for tax expense. Although the answer would be specific and measurable (e.g., $1,000,000), the answer would not be necessarily achievable as there are important laws to follow. A better question would be, to what extent are you willing to take money-saving, aggressive tax positions that will increase your risk of being audited by the IRS? Alternatively, appropriate numbers could be introduced such as are you willing to take an aggressive tax position that saves you $1,000 but would increase your risk of an IRS audit by 20%? 5.4 Consider the following scenario. You are a new staff internal auditor for a national restaurant chain. Your manager assigns you to visit a new restaurant that is performing poorly. In preparing for your visit, you review several customer review websites and find that many customers are complaining about the cleanliness of the restaurant. When you alert your manager to this, she is concerned about potential health code violations. She asks you to prepare a list of questions that you will ask the employees related to the cleanliness of the restaurant. Your manager wants to understand the risk this restaurant is in violation of health codes and why it is offending customers. 5-8 .
Accounting Information Systems 15e, GE
REQUIRED Prepare a series of questions to ask the employees. Remember the SMART principles as you design your questions. For each question, list whom you plan to ask the question, and discuss how the question applies one or more of the SMART principles. Every question does not need to apply all of the SMART principles, but across all of the questions, you should address all of the SMART principles. 1. Ask CEO. Do you wish to reduce the probability violating health codes? a. The answer of Yes/No: Specific b. The answer of Yes/No: Measurable c. Doesn’t lead to action necessarily d. Relevant to viability of restaurant. e. Presumably timely in that customer sentiments are recently discovered. 2. Ask Operations Director. Do you track customer sentiment? a. The answer of Yes/No: Specific b. The answer of Yes/No: Measurable c. If so, provides data to analyze trend. d. Relevant to viability of restaurant. e. Presumably timely. 3. Ask Restaurant manager. How much budget should be allocated to cleanliness? a. Specific number b. Measurable c. Provides data to analyze against budget and spending actuals d. Relevant to viability of restaurant. e. Presumably timely. 4. Ask Restaurant manager. Has cleanliness been compromised by the budget? a. Yes/No Specific b. Measurable c. Provides rationale to analyze data about spending on cleanliness d. Relevant to viability of restaurant. e. Presumably timely. 5. Ask Restaurant manager. Does a health code violation affect your career or earnings? a. Yes/No Specific b. Measurable c. No data to analyze, but may lead to analysis of negative impacts of prior violations. d. Relevant to viability of restaurant. e. Presumably timely. 6. Ask staff workers. How frequently do you receive training on cleanliness and health code standards? a. Defined in time… so specific b. Measurable c. Can analyze frequency of training in contrast with violations or complaints. 5-9 .
Ch. 5: Introduction to Data Analytics in Accounting
d. Relevant to viability of restaurant. e. Presumably timely. 7. Ask customers. Were you uncomfortable with anything related to cleanliness during your visit? a. Somewhat specific. May need text analysis to find commonalities. b. Measurable, but only with coding. c. Can analyze types of complaints and contrast with budget, time of day, employee training, and perhaps individual employees. d. Relevant to viability of restaurant. e. Presumably timely. 5.5 For each of the following situations, indicate whether the analysis is an example of a descriptive analytic, diagnostic analytic, predictive analytic, or prescriptive analytic. 1. An accounting firm is trying to understand if its external audit fees are appropriate. They compute a regression using public data from all companies in their industry to understand the factors associated with higher audit. Diagnostic 2. A self-driving car company uses artificial intelligence to help clean its historic social media data so they can analyze trends. Descriptive (AI is foil) 3. An airline downloads weather data for the past 10 years to help build a model that will estimate future fuel usage for flights. Predictive 4. A shipyard company runs a computer simulation of how a tsunami would damage its shipyards, computing damages in terms of destruction and lost production time. Predictive 5. An online retail company tracks past customer purchases. Based on the amount customers previously spent, the program automatically computes purchase discounts for current customer purchases to build loyalty. Prescriptive 6. An all-you-can-eat restaurant uses automated conveyer belts to bring cold food to the chefs for preparation. The conveyer belts bring the food to the chefs based on algorithms that monitor the number of people entering and leaving the restaurant. 5-10 .
Accounting Information Systems 15e, GE
Prescriptive 7. A large manufacturer of farm equipment continuously analyzes data sent from engine sensors to understand how load, temperature, and other factors influence engine failure. Diagnostic 8. A small tax services business provides its financial statements to a bank to get a loan so it can buy a new building to grow its business. Descriptive 5.6 The same data can be provided to you in many different ways. Below are four extracts of the same data. The first extract is properly formatted for import into the company database. Notice, that this extract uses a pipe delimiter, puts each unique record on a different row, and uses text qualifiers of a single quote when commas are present. Your task is to discuss how to transform the other extracts so they can be imported into the company database. REQUIRED For each of the other three data extracts, do the following: Describe if delimiters are present, and if so, what they are. Describe if text qualifiers are present, and if so, what they are. Describe the steps you would take to prepare each extract for importing into the company’s database. Correct Format for Import
1. Extract 1
Delimiter is comma, no text qualifiers, going to be very hard to change because of lack of text qualifiers, will require significant manual editing or advanced programming.
5-11 .
Ch. 5: Introduction to Data Analytics in Accounting
2. Extract 2
Delimiter is tab, text qualifiers are double quotes (but missing on the CreditLimits), special things to consider include the missing delimiter for PrimaryKey and CustomerName. 3. Extract 3
Tab delimiter for first two columns, then | (pipe) for rest. Text qualifiers are all ok, Special things to consider is that each row is represented by \r\n. The \r\n is used by Windows to indicate a new line. 5.7 Excel Project: ETL in Excel You are to analyze production patterns for a company producing lawn equipment. The company wants to understand which regions and managers produce the most units. They also want to know if they are producing more units than the minimum run requirement for each production run. The minimum run requirement is the number of units that must be produced to be profitable for each type of inventory item. Go to the student download page at http://www.pearsonglobaleditions.com and download the files labeled “P57tbl_Batch.csv”, “P5-7tbl_Products.csv”, “P5-7tbl_ProductsBatch .txt”, and “P5-7.xlsx”. The first three files are exported from systems that produce different output formats. REQUIRED Import each of the csv and txt files into the Excel file. Import each file into the sheet with the same name as the file. Pay attention to the delimiters in each file and whether the file uses text qualifiers or not. Combine the data from the three sheets on the tab labeled “P57tbl_AllData”. Once you have all the data gathered correctly into the “P5-7tbl_AllData” tab, answer the following questions, listing each answer on the appropriate sheet (e.g., Solution1 sheet, Solution2 sheet, and Solution3 sheet): 1. How many units did each location produce? 2. How many units did each manager produce? 3. How many product batch runs produced fewer units than the minimum run size? The solution file is posted on the website labeled “P5-7Solution.xlsx”. The answers to the questions are as follows:
5-12 .
Accounting Information Systems 15e, GE
Question 1 Row Labels South North West East Grand Total
Sum of UnitsProduced 4658 3797 2907 2133 13495
Question 2 Row Labels Holly Evans Merle Cole Alicia Bowman Carol Carpenter Austin Romero Lucy Baker Marshall Berry Monica Barnett Alison Horton Paulette Zimmerman Grand Total
Sum of UnitsProduced 1850 1732 1559 1537 1480 1435 1420 929 909 644 13495
Question 3 The answer is 21 5.8 Excel Project: Well Designed Visualizations The following visualization (viz) shows all state taxes and fees collected for the state of New York from 2014 to 2018, inclusive.
5-13 .
Ch. 5: Introduction to Data Analytics in Accounting
REQUIRED For this viz, do the following: 1. Describe ways you would change the viz to (a) simplify the data presentation and (b) emphasize what is important. Assume the objective of this visualization is to compare how each type of tax collections changes over time. 2. Go to the student download page at http://www.pearsonglobaleditions.com and download the files labeled “P5-8NewYorkTaxes.xlsx”. Implement some of the ideas you suggested for part 1 to simplify the viz and emphasize importance. Student answers may vary. For part 1, here are several items the students may identify: Simplification o The y-axis is labeled in scientific notation, this is difficult to understand. o The x-axes have rotated words and the dual labeling is complex and cumbersome. o The blue lines in the background of the chart area are distracting and unnecessary o The legend is far away from the lines making it more difficult to interpret. Emphasis o The chart focuses on how each type of collected tax differs within a year. Using multiple lines and only year on the x-axis would make it easier to see changes over time. o The title is not descriptive
5-14 .
Accounting Information Systems 15e, GE
Here is a possible chart (which is posted on the Textbook website in the answers in the file “P58NewYorkTaxesSolution.xlsx”) that improves upon the previous chart.
5.9 For the viz listed in problem 5.8, describe ways that you could change the viz to present the data in unethical ways. How could using one of these unethical viz presentation techniques hurt the institution using this data and damage your career? Many unethical presentations are based on misdirecting discussion from the question asked. Thus, some presentations could be ethical if they are directly addressing the question, but be unethical if they are masking the data from a different question. For example, a chart could be created to show percentage change from base year 2014. This chart would be ethical in addressing the question of how revenue from each tax type has changed recently. But it could be unethical if the question were how to increase total revenue from taxes by 5%. The suggested presentation would effectively hide that most taxes come from personal income and focus
5-15 .
Ch. 5: Introduction to Data Analytics in Accounting
attention on why property transfer taxes have declined. (even though the amount of revenue in that category is very small). Other unethical possibilities: inappropriate grouping of tax types, gaps in the x-axis scale, reverse scaling of years, or non-ordinal presentation of years. Unethical presentation could lead to improper decisions for the organization, or decisions that favor one point of view. If you are known to use viz to mislead peers or decision makers, individual trust will be lost. You will not be asked to contribute to further analysis discussions. Ultimately you will not be desired as an ongoing colleague or employee. 5.10 Automation is significantly changing the accounting profession. Research an example of how a company has automated an accounting task during the last year. Prepare a memo that summarizes the following: Describe how the accountant(s) performed the task before and after the automation. Describe the benefits the company realized because of the automation. Describe any drawbacks to using automation. Based on your learning, suggest one additional area in accounting that is likely to be automated in the future. Justify why you believe this area will be automated. Student answers will vary. Most will be aware of discussions of automating certain tasks to gain efficiency in the workplace. Many will fear that such automation will reduce employment opportunities for entry-level workers. They may find their examples in recruiting literature as many firms are noting automation as a service for clients.
5-16 .
Accounting Information Systems 15e, GE
SUGGESTED ANSWER TO THE CASE CASE 5-1 The following case was developed by the Ernst & Young Academic Resource Center, which is sponsored by the Ernest & Young Foundation. Robotic process automation is growing in importance in the accounting profession. Several RPA vendors provide free trial software including Automation Anywhere (https://www.automationanywhere.com/lp/communityedition) and UIPath (https://www.uipath.com/freetrial-or-community). Download one of these software packages and complete the following case.* Robotic Process Automation – Wood’s Amazing Woods Inc. Overview Wood’s Amazing Woods Inc. (Wood’s), a small company in Idaho, sells wood products to customers. The founder, Jason Woodworth, has focused most of his attention on providing excellent service and products, but not on keeping his accounting system up-to-date. Wood’s currently has a manual billing process to bill customers for the wood products sold. That work is performed by a billing specialist, Emily Young, a recent accounting graduate. Jason would like to completely automate his currently manual billing process to drive productivity and cost savings. Jason also wants to provide Emily with the opportunity to do some data analytics on their financial information and reduce her overtime during month-end for better work life balance. You will build a bot for each case part starting with a simple billing scenario in part I. The bot you will build in each subsequent case builds off the first bot and is more complex than the previous bot as more complexity will be added to the billing process. Recall that the basic function of a bot is to recreate the steps that a human would do in a process. This case uses a simplified automation process that is modified from what would happen in an actual accounting firm or business in several ways. For example, companies typically would use more sophisticated software than the excel files used in this case; however, the process of creating bots is the same for simple and more sophisticated software. In addition, companies typically have solutions to provide automated billings. This case uses this simplified scenario to teach the introductory principles of building bots and does not necessarily demonstrate a typical process that would be automated in practice. Although the case simplifies the software and the process, the basic skills of building an RPA are applicable to all automation settings. Before you begin ► Save all of the provided Excel files for the case (go to the student download page at
http://www.pearsonglobaleditions.com and download the files) into the same folder on your hard drive. You should build the bot so that the first sequence allows the user to input the file path for the folder where the files are located. Choose a file path that does not have too long of a name. Store this file path as a variable and then use this variable as a reference to load/save/move/etc. any files. This way the bot can be moved to other computers and still function (i.e., be graded by your professor). 5-17 .
Ch. 5: Introduction to Data Analytics in Accounting
–
Innovation_mindset_case_studies_RPA_Billing_MasterInvoice.xlsx
–
Innovation_mindset_case_studies_RPA_Billing_InvoiceData1.xlsx
–
Innovation_mindset_case_studies_RPA_Billing_InvoiceData2.xlsx
–
Innovation_mindset_case_studies_RPA_Billing_InvoiceData3.xlsx
► It is recommended that you organize your thinking in a flowchart before you begin
programming your bot. This makes it more likely that you do not forget key parts of the process. It also allows you the ability to develop your bot in segments or sections. This can make troubleshooting much easier. Objective Your task is to build a bot that automates the billing process. Ultimately, a billing specialist should be able to open the RPA software and run the bot, which should do all the steps that are described in the manual process (following) without any human interaction, with one exception. When the bot is run, it should require the user to enter a file folder location where the files are currently and will be saved when done. This allows the bot to be transferable to other computers and still run successfully. Part I Wood’s Amazing Woods Inc. currently uses the following manual process to bill its customers: ► The billing specialist, Emily Young, opens the Excel file with the invoice data,
Innovation_mindset_case_studies_RPA_Billing_InvoiceData1.xlsx. ► She then reviews the data and opens the Excel invoice template,
Innovation_mindset_case_studies_RPA_Billing_MasterInvoice.xlsx. ► Emily creates a unique invoice for each record in the invoice data. ► She then saves the updated invoice template file for each customer as
“Innovation_mindset_case_studies_RPA_Billing_MasterInvoice_InvoiceNumber.xlsx” (where InvoiceNumber is replaced by the invoice number being billed). In the invoice data file, there is only a single record. Required ► Your bot is required to create an invoice for the one invoice.
Part II Wood’s Amazing Woods Inc. currently uses the same billing process as in Part I but uses the invoice data Excel file, Innovation_mindset_case_studies_RPA_Billing_InvoiceData2.xlsx. In this invoice data, there are multiple records for billing. Required 5-18 .
Accounting Information Systems 15e, GE ► Your bot is required to create an invoice for each customer that should be billed. The
bot should be programmed so it can complete the task for any number of records that are included in the invoice data. In other words, you should not hard code all the values. Instead, you should use programming to loop through all of the rows and create invoices accordingly. Part III Wood’s Amazing Woods Inc. currently uses the following manual process to bill its customers. ► The billing specialist, Emily Young, opens the Excel file with the invoice data,
Innovation_mindset_case_studies_RPA_Billing_InvoiceData3.xlsx. There are multiple records in this data. ► She then reviews the data and opens the Excel invoice template,
Innovation_mindset_case_studies_RPA_Billing_MasterInvoice.xlsx. ► Emily creates a unique invoice for each record in the invoice data if the customer has
not already been billed. –
Customers who have been billed have dates in the column labeled “Billed.” If the field is empty, then the customer needs to be billed.
–
If a customer has already been billed, Emily skips this customer and goes on to the next customer.
► She then saves the updated invoice template file for each customer as
“Innovation_mindset_case_studies_RPA_Billing_MasterInvoice_InvoiceNumber.xlsx” (where InvoiceNumber is replaced by the invoice number being billed). ► Once she is finished creating the invoices for each customer, she opens the invoice data
Excel file, Innovation_mindset_case_studies_RPA_Billing_InvoiceData3.xlsx. and updates the “Billed” column with the current billing date. ► Finally, she saves the file as
Innovation_mindset_case_studies_RPA_Billing_InvoiceData3_Complete.xlsx. Required ► Your bot is required to create an invoice for each customer that has not been previously
billed. The bot should be programmed so it can complete the task for any number of records that are included in invoice data. In other words, you should not hard code all the values. Instead, you should use programming to loop through all of the files and create invoices accordingly. The use of the EY ARC cases stipulated that solutions could not be posted with the textbook. The solutions, including detailed implementation guides, videos, and other resources can be downloaded by going to https://eyonline.ey.com/eysso/unprotected/logon.aspx.
5-19 .
CHAPTER 6 TRANSFORMING DATA SUGGESTED ANSWERS TO DISCUSSION QUESTIONS 6.1 Why is transforming data necessary and why does it take so much time? What ways can you think of to reduce the time needed to transform data? Transforming data is necessary in many situations. For example, data may be analyzed for a different purpose than it was gathered. Data may be stored about employee’s bi-weekly pay, but it needs to be analyzed on an annual basis. Therefore, the data will need to be transformed. Another reason data transformation is necessary is when data is stored in different systems and needs to be combined before it can be analyzed. Data from different systems are unlikely to be stored with the same exact attributes as definitions may differ between systems. Unless data from different systems are in perfect alignment, they may need to be transformed to retain high quality data attributes. To reduce transformation time, data should be captured in as clean a form as possible and be stored in a properly designed database whenever possible. When designing data storage, consideration should be given to future data usage so that it can be stored in a useful way. Also, there are many automation techniques that can be used to periodically clean data which can save significant amounts of time. 6.2 For each of the data quality attributes listed in Table 6-1, discuss a business scenario that would be harmed if data did not have the data attribute. As you prepare these scenarios, are there other attributes of data that you believe should be added to Table 61? If so, why? Included in the table are examples of answers that can satisfy this question. Other answers are acceptable but should clearly link the attribute to a business consequence. Attribute Accurate
Complete
Consistent
Problematic Business Scenario When companies prepare financial statements, if the underlying data is not accurate the company can be forced to restate their financial statements. This can cause the company’s stock price to drop significantly and can lead to job loss for executives, the auditor, and others. When filing tax forms, if a CPA does not include all the necessary data in the tax forms the individual/business can face significant fines from the government. Multinational companies collect cash in many currencies. Before making calculations, it is important to make sure that all amounts are consistent in that they are denominated in the same currency. 6-1 .
Ch. 6: Transforming Data Timely
Valid
When making decisions about pricing products, having timely performance data about past product sales and current inventory levels is very important to avoid stock outs and carrying too much inventory. Auditors rely on their tests of company data. If the data is not valid, they are not able to come to an appropriate conclusion and issue a proper audit report.
These data attributes are the most common attributes for high quality data; however, there are others can be considered important as well. Here are some examples: Size: data that is too large for analysis by available computing resources is not useful to the organization. Complexity: data that is too difficult to analyze because it has a complex or a not fully understood architecture is not useful to an organization. Availability: if data is not available to be analyzed, it is not useful and becomes dark data. Data must be available to analysts if they are to extract meaningful insights. Precision: data can be collected at many different levels. For example, data about temperature can be measured at the country, state, city, or even finer geographic designation. If you want to know the temperature outside to decide if you should wear a jacket to work, the temperature at the country or state level is not likely to be useful. 6.3 Companies are increasingly operating throughout the entire world. As such, the data that companies collect can differ based on the country where the data is captured. This chapter identified two problems that can exist in data based on operating throughout the world: different formats for dates and capturing time stamps in different locations. What are other possible challenges you would observe in data captured throughout the world? Several additional examples of challenges with data captured across the world include: Language: different countries use different languages and data consistency can be very challenging if capturing data in different languages. Temperature: some countries measure temperature in Fahrenheit (F) and others in Celsius (C). Decimals and Thousand Separators: different countries use different decimal and thousand separators. In the United States the thousand separator is the comma “,” and the decimal separator is the period “.”. In contrast, many European countries reverse this and use a period as a thousand separator and the comma as a decimal separator. Names of Entities: In addition to translation issues of country and city names (i.e. Seville Spain vs Sevilla España), there are locations where multiple governments claim the same geography. For example, two rival countries may claim a city. Data about that city may be duplicated in a database or not consistently attributed to the same country. Privacy: countries have different laws and requirements related to data privacy. Being aware of what can be stored and not stored in different countries is very important.
6-2 .
Accounting Information Systems 15e, GE 6.4 What are the strengths and weaknesses of each of the four data validation procedures discussed in this chapter? What are other possible ways to validate data? Data Validation Procedure Visual Inspection
Basic Statistical Tests
Audit a Sample
Advanced Testing Techniques
Strengths Easy to preform quickly Increases understanding of data Easy to perform quickly Provide ability to find different problems than visual inspection Increases understanding of data item fields Can identify problems in original data (i.e., unreasonable values) Can identify many types of errors Only technique that identifies accuracy of data by tying back to original source Can calculate likely error rates for entire data set Can identify many different types of problems Can identify complex problems
Weaknesses Hard to examine large data sets Unlikely to discover all types of problems Does not identify complex problems Difficult to use on non-numeric data
Time consuming Does not capture problems if data was initially gathered incorrectly
Time consuming Requires domain knowledge expertise
Other possible ways to validate data include re-performing the ETL process and comparing the output. This is very time consuming but may be valuable for very important data questions.
6-3 .
Ch. 6: Transforming Data SUGGESTED ANSWERS TO THE PROBLEMS 6.1 Match the following terms with the appropriate definition or example: 1 aggregate data a process of analyzing data to make certain the data has the properties of high quality data: accuracy, completeness, consistency, timeliness, and validity. 2 cryptic data values b data values that are correctly formatted but not listed in the correct field. 3 data cleaning c all types of errors that come from inputting data incorrectly. 4 data concatenation d examining data using human vision to see if there are problems. 5 data consistency e the process of tracing extracted or transformed values back to their original source. 6 data contradiction errors f data items that have no meaning without understanding a coding scheme. 7 data de-duplication g the process of changing data into a common format so that is useful for decision-making. 8 data entry errors h a technique that rotates data from a state of rows to a state of columns. 9 data filtering i errors that occur when a secondary attribute in a row of data does not match the primary attribute. 10 data imputation j a data field that contains only two responses, typically a 0 or 1. Also called a dichotomous variable. 11 data parsing k the principle that every value in a field should be stored in the same way. 12 data pivoting l the process of changing the organization and relationships among data fields to prepare the data for analysis. 13 data standardization m data errors that occur when a data value falls outside an allowable level. 14 data structuring n a data field that contains only two responses, typically a 0 or 1. Also called a dummy variable. 15 data threshold violations o the process of updating data to be consistent, accurate and complete. 16 data validation p data that is inconsistent, inaccurate, or incomplete. 17 dichotomous variable q separating data combined in a single field into multiple fields. 18 dirty data r the combining of data from two or more fields into a single field. 19 dummy variable s the process of replacing a null or missing value with a substituted value. 6-4 .
Accounting Information Systems 15e, GE 20
misfielded data values
t
21
violated attribute dependencies
u
22
visual inspection
v W X
the process of removing records or fields of information from a data source. the process of analyzing data and removing two or more records that contain identical information. the presentation of data in a summarized form. an error that exists when the same entity is described in two conflicting ways. the process of ordering data to reveal unexpected values.
Solutions 1 v 2 f 3 o 4 r 5 k 6 w 7 u 8 c 9 t 10 s 11 q 12 h 13 g 14 l 15 m 16 a 17 n 18 p 19 j 20 b 21 i 22 d 6.2 Excel Project: Data Pivoting You are a data analyst for the city of Burlington, Vermont. Download the data file “P62BurlingtonVermontData.xlsx” from the student download page at http://www.pearsonglobaleditions.com, which contains the annual account balance information for city departments for six fiscal years. For this problem, use the sheet titled “Annual Data”, which contains data aggregated to the annual level for the different city departments. REQUIRED 6-5 .
Ch. 6: Transforming Data Using this data, prepare a different sheet that has a PivotTable that answers each of the following questions: a) How have total department budgets changed each year? To answer the question, create a PivotTable that shows the budgeted amount of expenditures for each fiscal year. Do not include grand totals. Add conditional formatting data bars to show which amounts are the greatest. b) Which funds have the largest expense budgets for fiscal year 6? Create a PivotTable that shows fund names and budgeted amounts for fiscal year 6. Sort the data so the greatest budgets amounts are listed at the top. c) Regardless of department, organization, or fund, what type of activities were most costly during the entire time period (hint: use the “Detail_Description” field for this question)? How much did they pay for this activity? Solutions to this problem can be downloaded from the textbook website. The solution file is called “P6-2BurlingtonVermontDataSolution.xlsx”. A screen shot of the solution for each part is included below. Solution to Part A
Solution to Part B 6-6 .
Accounting Information Systems 15e, GE
6-7 .
Ch. 6: Transforming Data Solution to Part C
6.3 Excel Project: Aggregating Data at Different Levels You are an internal auditor for the city of Burlington, Vermont. Download the data file “P6-3BurlingtonVermontData.xlsx” from the student download page at http://www.pearsonglobaleditions.com, which contains all the annual account balance information for city departments for six fiscal years. In this workbook are two sheets. The “Annual Data” sheet contains data aggregated to the annual level for the different city departments. The “Monthly Data” sheet contains data aggregated to the monthly level for the different city departments. You are planning to perform audit procedures on the “Monthly Data.” But before you do, you need to verify that the data in this sheet matches the data in the “Annual Data” worksheet, which you already verified is correct. REQUIRED Analyze the two sheets and, based on your analysis, answer the following questions: a) Under what circumstances can you not use the “Annual Data” sheet for your audit? Said differently, why might you need the data in the “Monthly Data” sheet? b) On a separate worksheet in Excel, create a summary of the data that shows the total dollar amount of transactions for the two different sheets. Are these the same for both data sets? c) Does the total amount for transactions differ for the different departments and years? Create two sheets: the first sheet should compare departments and the second sheet should compare years. What do you learn from these analyses? d) Based on your analysis to the previous questions, suggest the areas that you believe are most important to investigate further. Why do you believe these areas are the most important to investigate further? Solutions to this problem can be downloaded from the textbook website. The solution file is called “P6-3BurlingtonVermontDataSolution.xlsx”. A screen shot of the solution for each part is included below. Part A: For an audit, you cannot use the annual data if you want to examine data at a more detailed level. For example, if you want to examine seasonal expenditure patterns, you must have data for the different months and not just for the year. Part B:
6-8 .
Accounting Information Systems 15e, GE
The amounts are not the same for both sheets. Part C: Analysis for departments
Analysis for fiscal years
Based on the analysis, the two sheets do not reconcile well. This means that the annual aggregated data and the monthly aggregated data do not measure the same transactions. As can 6-9 .
Ch. 6: Transforming Data be seen in the two analyses pasted above, the amount for departments does not add up and the amount for fiscal years does not add up. Given that the problem said the annual data appears to be correct, this appears to be a problem with the monthly data. Part D: Based on these analyses, the internal auditor should do the following: Examine why no Year 6 transactions are included in the monthly data. Likely the monthly data will need to be extracted again as it is not complete. Examine the fiscal years and the funds with the greatest differences. The difference calculations above would be very helpful in identifying the areas with the most risk. 6.4 Excel Project: Parsing Data Go to the student download page at http://www.pearsonglobaleditions.com and download the file labeled “P6-4CustomerData.xlsx”. For this problem, assume that your supervisor gave you this file and said that it contains information about customers. The file has several fields merged together and your supervisor wants you to parse them into separate fields. REQUIRED Separate the fields as instructed in parts a and b below. a) Parse the data on the “Data – Simplified” sheet. Put your solution on the “Simplified Solution” sheet. The image below shows the solution for the first three rows. Your solution should separate the information using only formulas. Leave the formulas in your solution file for grading. As a hint, you can solve this problem using a combination of the LEFT, RIGHT, MID, FIND, and VALUE formulas.
b) Parse the data on the “Data – Advanced” sheet. Put your solution on the “Advanced Solution” sheet. The image below shows the solution for the first three rows. Your solution should separate the information using only formulas. Leave the formulas in your solution file for grading. As a hint, you can solve this problem using a combination of the LEFT, RIGHT, MID, FIND, TRIM, SUBSTITUTE, REPT, LEN, and VALUE formulas.
Solutions to this problem can be downloaded from the textbook website. The Excel file labeled “P6-4CustomerDataSolution.xlsx” contains solutions for both part A and Part B. There are multiple ways to solve the problem, but the solution should only use formulas and should have a solution for every field. 6.5 Excel Project: Fixing Cryptic Data using Data Concatenation
6-10 .
Accounting Information Systems 15e, GE You work at a non-profit that seeks to help people start businesses in third world countries so they can lift themselves out of poverty. Your organization has found that it is more successful to work in countries that have policies that make it easier to start a business. You have been asked to explore which countries your organization should consider entering. To do this, go to the student download page at http://www.pearsonglobaleditions.comand download the file labeled “P65StartingABusiness.xlsx”. This data set comes from The World Bank and provides information about the relative ease of starting a business and doing business in countries around the world. The Excel spreadsheet contains three years of data in multiple sheets. The data is not easy to understand as it is spread across multiple sheets and the “Final Report” sheet currently only shows cryptic data values for the Country and Year. The data for this problem comes from The World Bank: Doing Business dataset: see http://www.doingbusiness.org/en/data for more information REQUIRED Do the following a) Fill out the “Final Report” sheet so that it looks like the image below. You should use formulas to prepare the final report. Leave the formulas in your solution file for grading. As a hint, you can solve this problem using a combination of the VLOOKUP and CONCATENATE functions. You will need to add columns to some of the sheets to complete the task with these formulas.
b) Fill out the “Final Report-Advanced” sheet so that it looks like the image below. You should use formulas to prepare the final report. Leave the formulas in your solution file for grading. For this problem, you are only allowed to use the combination of the following formulas: INDEX, MATCH, and CONCATENATE functions. You will not need to add columns to complete the task with these formulas.
c) Compare and contrast the formulas you used to answer part A and part B. Research both types of formulas and discuss which formulas are better for use in practice. Solutions to this problem can be downloaded from the textbook website. The file labeled “P6-5StartingABusinessSolution.xlsx” contains solutions for both part A and Part B. There are multiple different ways to solve the problem, but the solution should only use formulas and should have a solution for every field. The solution for Part C is as follows. The Index/Match approach is harder to learn but it is superior to the Vlookup approach in most ways. Index/Match is superior because it works 6-11 .
Ch. 6: Transforming Data faster, does not require the columns and rows to be in a predefined order (so you can search to the right of the column that contains the information for merging), is immune to changes in the spreadsheet caused by inserting columns, and is easier to drag and copy. Future versions of Excel will also include an XLOOKUP, which will perform many of the functions of the Index/Match. As this version of Excel is provided to students, you should consider teaching XLOOKUP to students. 6.6 Excel Project: Formatting Data Consistently You are preparing to analyze data about the Washington DC Public Schools from January 2009 to February 2019. Go to the student download page at http://www.pearsonglobaleditions.com and download the data titled “P66WashingtonDCData.xlsx”. You notice that the formatting of the data in the fields “Transaction_Date” and “Transaction_Amount” has become corrupted and each entry can be formatted in many ways. Note, all of the data in the “Transaction_Date” field contains a date (so any numbers are stored date values). All of the data listed in the “Transaction_Amount” column refer to dollar amounts. REQUIRED For the two fields, format the data in each field to be consistent within each column. Justify the choice you made for the data format you choose to use for each column. Describe the process you went through to make sure you formatted all the data correctly. The data in the “Transaction_Date” column only needs to be to be accurate to the day, month, and year level (so do not worry about time information in the column if it is present). The data in the “Transaction_Amount” column needs to be accurate to the penny level. Solutions to this problem can be downloaded from the textbook website. The file labeled “P6-6WashingtonDCDataSolution.xlsx” contains solutions. This problem cannot be done by just selecting the cells and changing the format. Some of the entries are saved in different formats and the problem requires using formulas and other means to correct the data . To do this, perform the following: Select all of the values and change the format for the column to an appropriate date format. Sort the data to find the values that are not saved as dates. For the values not sorted as dates, you can use the formulas DATE, YEAR, MONTH, and DAY. Specifically, use the date function and then each of the other functions inside of it. So it would look something like this =DATE(YEAR(A2),MONTH(A2),DAY(A2)) Paste these new values into the column as appropriate. Sort the column and find the errors that are listed as #VALUE. These cells have a problem in that they have extra information. For example, they look like “2010-0909T00:00:00.000Z”. You can solve this in a few different ways. o You can do a search and replace all values of “T00:00:00.000Z” with “” (nothing).
6-12 .
Accounting Information Systems 15e, GE
o You can extract text using formulas or parse the text and remove the portion that is not correct. Once these cells have been corrected, you can use the same DATE function as described above. Paste the final values in the cell so that everything is complete.
6.7 Excel Project: Auditing a Data Extract You work as an auditor for the city of Washington DC and have been asked to audit employee purchasing card (p-cards) expenses. You have been asked to validate that the cleaned data for a sample of the p-card transactions match the original records before the transformation process. Go to the student download page at http://www.pearsonglobaleditions.com and download the data file titled “P67WashingtonDCDataAudit.xlsx” The file contains two sheets. The sheet labeled “Population” includes all p-card transactions from January 2009 to February 2019. The sheet labeled “Sample” contains the 20 transactions from 2019 you have selected for examination. REQUIRED a. Determine whether all the data in the sample transactions matches the original data. If there are errors, document any you find. b. Once you are finished, estimate how many errors are likely for each field in the 2019 data. a. The sample contains the following errors: For transaction ID 337777 the amount in the sample shows a negative but it should be a positive. For transaction ID 363824 the amount in the sample shows a negative but it should be a positive. For transaction ID 360577 the state is incorrect. It should be WA not AW. For transaction ID 362371 the amount in the sample shows a negative but it should be a positive. b. The fields ObjectID, Agency, Year, Vendor_Name, and MCC_Description have no errors. The columns Transaction_Amount and Vendor_State_Province have errors of 3 out of 20 and 1 out of 20, respectively. The estimated error rate for each is computed as follows: Total number of transactions in 2019 * error rate Transaction_Amount = 8,169 * 15% = 1,225.35 errors in the 2019 data. Vendor_State_Province = 8,169 * 5% = 408.45 errors in the 2019 data. Be careful to only apply the error rates to 2019 since the problem is focused only on drawing a sample from 2019 data.
6-13 .
Ch. 6: Transforming Data An especially mindful student may notice that all of the Transaction_Amount errors are related to missing negative signs. In this case, the enterprising student might assume that all negative signs were incorrect. If the student assumes this and analyzes the data, there are 350 transactions with negative amounts. So, the error rate using this observation would be 350 / 8,169 = 4.284%. 6.8 For the S&S Case discussed in this chapter, you receive the following output containing basic descriptive statistics for some of the columns in the full dataset (the chapter example problem contained a small excerpt of data, this problem uses more data). S&S has a total of 60 products that customers purchase across 3 categories. REQUIRED List the concerns you have with the data and discuss what steps you would take for each concern you identified.
There are many possible answers; below we highlight the most egregious observations for each field. RowNumber: There are less unique values than rows, this suggests that there is a duplicate RowNumber in the data. VendorName: There are null values in vendor names. There should be no purchases without a vendor name. DiscountRate: The discount rate has a maximum value of 100, which means someone received a 100% discount. This is very unlikely and should be investigated. ProdCat: There should only be3 unique values since the company only has 3 categories. It currently has 8.It is likely that some values have decimals attached to them since the minimum value is 1 and the maximum is 3. ProdID: There is nothing unusual in this field. The total number of products is 25, but since ProdID repeats for each product category this is not problematic. UnitsPurch: There is a value of -150, suggesting that someone purchased a negative number of units. This should be investigated. TotalCosts: The total of non-null values and null values is greater than 453. Something is incorrect since all of the fields suggest there are only 453 rows of data. This should be investigated. 6.9 Excel Project: Creating Data Errors 6-14 .
Accounting Information Systems 15e, GE This problem asks you to create a data set with specified errors. REQUIRED a. Create a fake dataset that has at least 20 rows and 6 columns. The dataset can relate to any setting in accounting or business. In the dataset, include at least one of each of the following types of errors: cryptic data values, data contradiction errors, data entry errors, data threshold violations, misfielded data values, and violated attribute dependencies. b. Prepare a memo to go with your dataset that describes the nature of the data. Then define each error and describe the example error you included in your dataset. This problem follows closely from the example given in the chapter. It requires students to understand the data errors and produce an example of each error. Since what students will produce a wide variety of answers, grading should be based on whether their example correctly demonstrates the error. 6.10 Search the internet for an example of a business project failure caused by a failure in some part of the ETL process. Based on the example you find, discuss the principles discussed in this chapter that the company failed to follow. In addition, discuss the reasons why you think the company failed to follow these principles. There are many different possible answers for this problem. The student should describe the example and then clearly describe any principles from the chapter that were included in the example. SUGGESTED ANSWER TO THE CASE Case 6.1 The following case was developed by the Ernst & Young Academic Resource Center, which is sponsored by the Ernest & Young Foundation. For this case, you have received a data file, Analytics_mindset_case_studies_ETL_Case4.xlsx (go to the student download page at http://www.pearsonglobaleditions.com to download this file). It includes 789 lines of journal entries for 11 days from a hotel and conference center (on the tab labeled JELineItems), as well as other important accounting-relevant data sets on these other tabs: BusinessUnits, ChartOfAccounts, PreparerInfo and Source. The following is a select list of data fields from this file noting the field name and field description tabs on which the data field is located. Field name
Field description
Tab
JENumber
Unique identifier for each journal entry.
JELineItems
GLAccountNumber GL account number from chart of
6-15 .
JELineItems and
Ch. 6: Transforming Data
Field name
Field description
Tab
accounts. The tab labeled GLAccounts contains the full information about the GL accounts.
ChartOfAccounts
BusinessUnitID
The business unit number (1–8) of the journal entry.
JELineItems, BusinessUnits and PreparerInfo
PreparerID
The employee ID for the employee who initiated the transaction. For transactions recorded initially in a subsystem (e.g., GuestSYS or POS), the PreparerID is listed as the system and not the employee.
JELineItems and PreparerInfo
► Note that the PreparerID is not unique.
The company starts all ID numbering over for each business unit. Thus, the combination of the PreparerID and BusinessUnit number is unique for each employee. SourceID
A unique identifier for each Source.
JELineItems and Source
EffectiveDate
Date the entry was posted to the GL as occurring. The EffectiveDate is the date that the transaction is posted in the GL and recognized as revenue. The corporate office, therefore, is recognizing revenue throughout the year based on this date, rather than the date that it is meeting its performance obligations, which you would consider the “right” effective date for proper accounting treatment. However, the corporate office performs year-end cutoff procedures to account for this at a level of materiality that, year over year, would suit corporate and ensure that amounts are properly stated.
JELineItems
JEDescription
Description of the transaction. May include vendor or guest name, etc.
JELineItems
Debit
Debit amount of the entry (positive).
JELineItems
Credit
Credit amount of the entry (negative).
JELineItems
Amount
Total amount of the journal entry line item (may be positive or negative).
JELineItems
6-16 .
Accounting Information Systems 15e, GE
Field name
Field description
Tab
BusinessUnit
The business unit name (e.g., hotel, food and beverage) of the journal entry.
BusinessUnits
BUDescription
A description of each business unit.
BusinessUnits
AccountType
For each account, a high-level description of which type of general ledger account it is (e.g., asset, liability, equity, expense, revenue).
ChartOfAccounts
AccountClass
For each account, a more detailed description of which type of general ledger account it is (e.g., accounts receivable, cash, payroll expense).
ChartOfAccounts
GLAccountName
Name of the general ledger account from the chart of accounts.
ChartOfAccounts
PreparerName
The name of the employee.
PreparerInfo
Source
Describes the payment type or other source type of the transaction (CASH RECEIPT, CHECK, CREDIT CARD RECEIPT, CREDIT MEMO, PAYROLL JV, PAYROLL MANUAL JV, PAYROLL S/B JV, PURCHASE CARD, REGULAR JV).
Source
Required ► You have been asked to prepare a single, flat file (i.e., spreadsheet) with all of the data
fields from each tab within the data file combined in a single sheet labeled Case 6-1 solution. This sheet is already provided in the workbook. The journal entry line item data and the required column headers (attributes) have already been copied into this new spreadsheet. You are required to populate the remaining fields with accurate data. –
Management wants to create a repeatable ETL data process for this scenario. This requires a template that uses a consistently formatted data set. Therefore, you should retain formulas in your final sheet for columns K through Q, and you should not add, delete or move any data in any of the other sheets.
–
Your final sheet should look like the following screenshot. (The first three rows are provided, showing the correct answer. Make sure your rows have the formula entered into them).
6-17 .
Ch. 6: Transforming Data
The use of the EY ARC cases stipulated that solutions could not be posted with the textbook. The solutions, including detailed implementation guides, videos, and other resources can be downloaded by going to https://eyonline.ey.com/eysso/unprotected/logon.aspx.
6-18 .
CHAPTER 7 DATA ANALYSIS AND PRESENTATION SUGGESTED ANSWERS TO DISCUSSION QUESTIONS 7.1 Fill in the chart below by describing one analytic for each analytic type that the business function could perform. Descriptive
Diagnostic
Predictive
Prescriptive
Accounting and Finance Information Technology Human Resources Marketing Production There are many possible answers to this question. Shown here is an example answer. Descriptive Diagnostic Predictive Prescriptive Accounting and Finance Accounting Examine Predict bad Automatically ratios such which factors debt expense calculate as gross increase foreign margin or overhead currency return on exposure and investment execute hedging contracts to cover the exposure Information Technology Compute Examine Predict the Predict number of factors that life of website cyber increase time servers so traffic and attacks to resolve IT they can plan automatically against issues for allocate more computer replacement. bandwidth to system high traffic websites Human Resources A headcount Examine Predict who Predict of which factors is likely to customer employees increase receive job demand and by different employee offers to be automatically factors (e.g., turnover poached schedule gender, race, from your more etc.) organization. employees during peak periods
7-1 .
Ch. 7: Data Analysis and Presentation
Marketing
Statistics about customer spending habits.
Determine factors that lead to repeated customer purchases
Production
Compute % of products that are scrapped
Determine the causes of production line scrap (e.g., tired workers or bad raw materials)
Predict customer’s significant life events so you can market appropriately to them Predict when machines are likely to have problems
Automatically analyze customers and grant the appropriate amount of credit Analyze stocks of raw materials and automatically order at the right time.
7.2 The chapter discusses common data problems related to GIGO, overfitting, extrapolation, and not respecting variation inherent in model predictions. Describe a situation different from is the ones listed in the textbook demonstrating why each of these is problematic in an accounting or business setting. What other data problems can you identify? There are many possible answers to this question. Shown here are some example answers. One additional accounting or business example of each of these problems is: GIGO: Any analysis that is performed on the wrong data or inappropriate data. A company may make international tax computations. If they use the wrong tax rates, either because the rates are dated or from the wrong country, the overall tax computations will be incorrect. An employee at an auto dealership might see a data field labeled ‘cust_sat’ in the database and use it in a model to predict when they will buy a new car. The model performs poorly. They later learn that ‘cust_sat’ is a measure of the number of minutes that the customer ‘sat’ waiting for repair and not customer satisfaction. Overfitting: Investors trying to predict stock market prices can fall prey to overfitting. They have a lot of historical data and create a model that explains the data they have very well, expecting it to predict the future. Often, they fit so many parameters to the model that the future model does not predict well because the relations found in the test data are spurious. Extrapolation beyond the range: When companies enter a new market, they are prone to incorrect extrapolation. For example, if a consumer company wants to enter a new country, they may use past data from a neighboring country to predict what will happen in the new company. These analyses are extrapolating where data is not present. If the company is not careful, they may not appropriately predict the future because the new country differs in an important dimension from other markets.
7-2 .
Accounting Information Systems 15e, GE
Not respecting variation: Variation is a very important topic for manufacturing firms. When making any product, machines do not produce identical parts, but rather the parts can differ by small amounts. This can be problematic if the variance is not planned for and controlled because the manufactured parts may not fit in the finished good.
Some additional data problems include not using enough data when analyzing a phenomenon (which relates to data overfitting), misinterpretation of what statistical tests mean, using old data, and using data in an ad-hoc manner and having too much confidence in the analysis. 7.3 In what circumstances is data visualization better than using text explanations and tables of numeric data? In what situations is it worse? Justify your reasoning. As discussed in the chapter, data visualization can help individuals process data faster, is easier to use, and supports how most people learn. Data visualization is useful for quickly gaining an understanding of data and a topic and communicating the results to others. Data visualization can be less useful when someone might interpret the information in a different way than intended or when a process is very complex and has much nuance. In these cases, it can be superior to use text explanations or numeric data. 7.4 Figure 7.2 lists the best chart type for each visualization purpose. Select a chart type and describe why it is less than ideal for the other purposes listed in Figure 7.2. There are many possible solutions for this problem. Below, we highlight a few possible example solutions. Pie charts are inappropriate for comparisons because it is much more difficult to compare the area of the slice than it is to look a bar and see which one is taller or shorter. Likewise, pie charts are not ideal for trends because they do not highlight change over time. All of the chart types for comparison, distribution, evaluating trends, and part-to-whole comparisons are poor at showing correlation because correlations require plotting two values against each other and all of these chart types plot only a single dimension relative to a fixed amount or against nothing (i.e., only one dimension is mapped).
7-3 .
SUGGESTED ANSWERS TO THE PROBLEMS 7.1 Match each term with its definition. 1 alternative a in design, making a visualization easy to interpret and hypothesis understand. 2 categorical data b an approach to examining data that seeks to explore the data says without testing formal models or hypotheses. 3 classification c design rule suggesting that a viz should not contain too analyses much or too little, but just the right amount of data. 4 confirmatory d avoiding the intentional or unintentional use of deceptive data analysis practices that can alter the user’s understanding of the data being presented. 5 data deception e the intentional arranging of visualization items in a way to produce emphasis. 6 data ordering f a proposed explanation worded in the form of an inequality, meaning that one of the two concepts, ideas, or groups will be greater or less than the other concept, idea, or group. 7 data overfitting g any visual representation of data, for example graphs, diagrams, or animations. 8 effect size h a subset of data used to train a model for future prediction. 9 emphasis i a quantitative measure of the magnitude of the effect. 10 ethical j a graphical depiction of information, designed with or presentation without an intent to deceive, that may create a belief about the message and/or its components, which varies from the actual message. 11 exploratory data k data items that take on a limited number of assigned values analysis to represent different groups. 12 extrapolation l a subset of data not used for the development of a model but beyond the used to test how well the model predicts the target outcome. range 13 machine m a process of estimating a value that is beyond the range of learning the data used to create the model. 14 null hypothesis n when a model is designed to fit training data very well but does not predict well when applied to other data sets. 15 outlier o in design, the amount of attention that an element attracts. 16 simplification p testing a hypothesis and providing statistical evidence of the likelihood that the evidence refutes or supports a hypothesis. 17 test data set q in design, making it easy to know what is most important. 18 training data set r a data point, or a few data points, that lies an abnormal distance from other values in the data. 19 type I error s the incorrect rejection of a true null hypothesis. 20 type II error t techniques that identify various groups and then try to
7-1 .
Ch. 7: Data Analysis and Presentation
21
visual weight
u
22
visualization
v
w x y
classify a new observation into one of those groups. an application of artificial intelligence that allows computer systems to improve and to update prediction models without explicit programming. a proposed explanation worded in the form of an equality, meaning that one of the two concepts, ideas, or groups will be no different than the other concept, idea, or group. the failure to reject a false null hypothesis. the concept that data analysis is of no value if the underlying data is not of high quality. Data dispersion around the central value
Solutions 1 f 2 k 3 t 4 p 5 j 6 e 7 n 8 i 9 q 10 d 11 b 12 m 13 u 14 v 15 r 16 a 17 l 18 h 19 s 20 w 21 o 22 g 7.2 Excel Problem Walmart Inc. has made historical sales data available for 45 stores located in different regions throughout the United States. Go to the student download page at http://www.pearsonglobaleditions.com and download the files labeled “WalmartSales.csv” and “WalmartFeatures.csv”. REQUIRED Using this data, compute the following descriptive statistics:
7-2 .
Accounting Information Systems 15e, GE
a. Central tendency: regardless of store, compute the mean and the median weekly sales for all departments and for each department individually. Choose one department that has a large difference between the median and the mean and discuss why they are so different and how using only one of the metrics could lead to a poor business decision. b. Data spread: compute the minimum, maximum, and standard deviation for weekly sales for each department. Which department number has the greatest spread? Why might it be important for a store manager to understand the different spreads of weekly sales for each department? c. Data distribution: create a histogram for the weekly sales of departments 12 and 16. What are the implications of the different distribution of sales for these two departments? Create one hypothesis for why you think these departments may have a different distribution. d. Correlations: compute two correlations: (1) the correlation of weekly sales with temperature and (2) the correlation of weekly sales with fuel prices. Interpret what the correlation coefficient means for each correlation. Which variable, temperature or fuel prices, is more highly correlated with sales? Create a hypothesis of why you think one of these variables has a higher correlation with sales. Question parts a, b, and c can be answered using only the “WalmartSales.csv” file. Part d requires merging the two provided files. The merge must be done on the combined (i.e., concatenated) columns of Store and Date. This is demonstrated in the solution file, which can be downloaded from the textbook website. The answers for all questions are posted in one Excel file labeled “P7-2WalmartSolutions.xlsx”. The solution file has the solution for each problem on a different sheet. a. Part A solutions are as follows: The mean for the entire sample is $15,981.26 The median for the entire sample is $7,612.03 The mean and median for each individual department is listed in the Excel file. Note, that an array formula is used to compute the median (to see a walkthrough of the logic of this formula go to https://www.lifewire.com/excel-median-if-array-formula-3123300). An alternative approach is to separate the data for each department first and then compute the median. One store that has a large difference between the mean and the median values is department 99. The difference between the mean and median values is $69,764.50. To see what causes this large difference, you can plot the weekly sales for just this department and see that many of the transactions are very small (e.g., $0.01), but there are a few extremely large outliers (e.g., $12,550 and $12,225). These large outliers increase the mean value but not the median value. From a business decision making standpoint, it is important not to believe that the mean amount is the likely weekly amount. The outliers heavily influence the mean. So, if performance of department managers was assessed on the mean amount, the department manager for department 99 would almost always come in as underperforming.
7-3 .
Ch. 7: Data Analysis and Presentation
b. Part B solutions are included in the solution document for each department. The problem computes min, max, and standard deviation values using array formulas (similar to part A). These can be computed in a much more time intensive manner by separating each distinct department. The department with the greatest spread is department 72 with a spread of $693,478.36. It is important for the store manager to understand the different spreads for departments so she can understand the performance differences between departments and natural fluctuations in weekly sales by department. c. Part C solutions are contained in the Excel file. The histograms have the same starting points, bin widths, and y-axis increments so it makes it easier to compare and contrast the distributions across the two departments. The distributions show that department 12 has a much tighter distribution, meaning there is less variation from week to week. In contrast, department 16 has very few similar average sales from week to week and the sales span a much larger amount. There are many possible hypotheses to explain these differences. One is that department 16 sells more items that are related to holidays whereas department 12 sells items that are related to things that are purchased every day (like a dairy department). d. Part D solutions are contained in the Excel file. The correlation between sales and temperature is -0.002312447 and between sales and fuel prices is -0.000120296. Both of these correlations are very small, meaning that sales do not covary much with either temperature or fuel prices. The negative coefficients on both variables means that as temperature or fuel prices go up, one would expect sales to go down. Of the two correlations, the correlation with temperature is slightly larger meaning that sales are more likely to differ when temperatures change than when fuel prices change. One possible reason why weather is more closely related to sales is that when temperatures go up, people are more likely to stay home and stay cool whereas with fuel prices changes they are still likely to go out and shop the same amount. 7.3 Excel Problem Walmart Inc. has made historical sales data available for 45 stores located in different regions throughout the United States. Go to the student download page at http://www.pearsonglobaleditions.com and download the files labeled “WalmartSales.csv” and “WalmartFeatures.csv”. REQUIRED Using this data, answer the question “which elements best explain why department sales differ?” To do this, compute the following regression models. For each model, interpret the output for each variable and discuss the important business insights you can derive from the model results (Hint: be careful in setting up the data that you transform it correctly). a. Regress total sales for each department on unemployment. b. Regress weekly sales data on temperature, fuel prices, CPI, unemployment, and IsHoliday.
7-4 .
Accounting Information Systems 15e, GE
Question parts a and b require merging the two files. The merge must be done on the combined (i.e., concatenated) columns of Store and Date. This is demonstrated in the solution file, which can be downloaded from the textbook website. The answers for all questions are posted in one Excel file labeled “P7-3WalmartSolutions.xlsx”. The solution file has the solution for each problem on a different sheet. The regression results were computed using the data analysis addon package. a. Part A solutions are contained in the Excel answer file. The regression results are also pasted below and discussed. SUMMARY OUTPUT Regression Statistics Multiple R
0.026
R Square Adjusted R Square
0.001
Standard Error
22,704
Observations
421,570
0.001
ANOVA df Regression Residual Total
1 421,568 421,569
F
Significance F
145,455,471,781 515,454,046
282.189
0.000
Pvalue
Lower 95%
Upper 95%
Lower 95.0%
Upper 95.0%
SS
MS
145,455,471,781 217,298,931,238,867 217,444,386,710,648
Coefficients
Standard Error
t Stat
Intercept
18,490.703
153.423
120.521
-
18,189.998
18,791.408
18,189.998
18,791.408
Unemployment
(315.245)
18.766
(16.798)
0.000
(352.027)
(278.464)
(352.027)
(278.464)
The interpretation of key items are as follows: The R-square value of 0.001 means that a change in unemployment only explains about 0.1% of the change in weekly sales. This is a very low amount meaning that unemployment explains a very small amount of the variation in weekly sales. Examining the intercept suggests that if the unemployment rate was 0 (which it is very unlikely to ever be), the average amount of expected weekly sales would be $18,490.703. The t-stat and p-value test if this coefficient estimate is likely different than zero, and the
7-5 .
Ch. 7: Data Analysis and Presentation
very low p-value (which is so small Excel rounds it to 0) means that there is a very low likelihood that the “true” coefficient amount (if we were able to know everything) is greater than zero. The coefficient on unemployment of (315.245) means that for every 1 unit increase in unemployment (which means an increase of 1%), the average department’s weekly sales is expected to decrease by $315.245. The t-stat and p-value test if this coefficient estimate is likely different than zero, and the very low p-value means that there is a very low likelihood that the “true” coefficient amount (if we were able to know everything) is greater than zero.
The overall business interpretation is that unemployment appears to have a statistically significant effect on weekly sales, but it only explains a very small amount of the variance of weekly sales. A store manager should expect sales to go down by a small amount if unemployment increases, but there are many other factors that explain this relationship. This model is not likely very helpful for running a business. b. Part B solutions are contained in the Excel answer file. The regression results are also pasted below and discussed. SUMMARY OUTPUT Regression Statistics Multiple R 0.043 R Square 0.002 Adjusted R Square 0.002 Standard Error 22689.892 Observations 421570.000 ANOVA df
SS 5 410085049192 421564 217034301661457 421569 217444386710648
Regression Residual Total
Coefficients Intercept
Standard Error
MS F 82017009838 159.309 514831204
Significance F 0.000
t Stat
P-value
Lower 95%
Upper 95%
Lower 95.0%
Upper 95.0%
23582.027
400.084
58.943
0.000
22797.874
24366.179
22797.874
24366.179
Temperature
13.775
2.014
6.840
0.000
9.828
17.721
9.828
17.721
Fuel_Price
-383.929
79.208
-4.847
0.000
-539.174
-228.683
-539.174
-228.683
CPI
-20.655
0.985
-20.974
0.000
-22.585
-18.725
-22.585
-18.725
Unemployment
-463.659
20.078
-23.093
0.000
-503.010
-424.307
-503.010
-424.307
IsHoliday
1264.632
138.644
9.121
0.000
992.894
1536.370
992.894
1536.370
The interpretation of key items are as follows:
7-6 .
Accounting Information Systems 15e, GE
The R-square value of 0.002 means that the independent variables only explain about 0.2% of the change in weekly sales. This is a very low amount meaning that these variables only explain a very small amount of the variation in weekly sales. The Intercept line item is the expected weekly sales when all the dependent variables are equal to zero. This would likely never happen. When using multiple regression, the intercept rarely has an interpretable meaning. It is still important to include it for the fit of the rest of the model. If it is not included, then the model is forced to have an intercept of zero, which is rarely a good idea. Each of the other variables is interpreted “ceteris paribus” meaning holding the effect constant of all other variables. That is, the temperature coefficient of 13.775 means that holding the effects of fuel price, CPI, unemployment, and whether it is a holiday constant, a 1 degree increase in temperature should increase weekly average sales by $13.75. The t-stat and p-value are interpreted as discussed above in answering part A. As all the p-values for the variables are statistically significant, meaning the p-values are very low, each of the coefficients has a statistically significant effect on average weekly sales. Each are discussed in turn. o As fuel prices increase, weekly average sales are likely to decrease by $383.929 for each dollar increase in fuel prices. o As the CPI increases 1 unit, average weekly sales are likely to decrease $20.655. o As unemployment increases 1 percent, weekly sales are likely to decrease by $463.659. o The IsHoliday variable is a dummy variable. Its interpretation is slightly different. The coefficient of $1,264.632 suggests that when the week has a holiday in it, the average weekly sales are $1,264.632 higher than weeks where there is not a holiday.
A store manager may use this model to help plan for increases and decreases in weekly sales. For example, the model shows that holidays are likely to significantly increase sales, so the manager may want to increase staffing and make sure enough products are ordered. However, the model is not that helpful in creating a deep understanding of weekly sales. Given the very low explanatory power, the manager should look to build a better model. Some ideas might be to estimate separate models for each department or look for additional variables that would explain weekly sales. 7.4 For each of the following scenarios, list the purpose(s) of the visualization and the type(s) of visualization that would best fulfill the purpose(s). Justify your choice. a. A stock analyst is showing a potential customer how projected returns from various mutual funds will affect the size of retirement savings over time. This task is meant to show a trend over time. Line Plots or area plots would be most appropriate for showing how things change over time. If the problem is interpreted as a comparison of the final size of the retirement savings, then comparison charts such as a bar plot would be more appropriate. The words “over time” make “trend evaluations” a more appropriate answer than “comparison.”
7-7 .
Ch. 7: Data Analysis and Presentation
b. A tax accountant is showing the CFO how the accumulated effect of asset depreciation differs using Modified Accelerated Cost Recovery System (MACRS) depreciation, straight-line depreciation, accelerated depreciation, and units of production depreciation. This task requires a comparison, so a bar chart would be appropriate. The problem asks for a comparison of the total effect and not changes over time, so a comparison chart is better than a “trend evaluation” chart. c. A marketing analyst prepares a viz to show which countries present the best opportunity for expansion to increase profits. This task would likely best be shown using an “other” chart type; specifically, a viz using a map and overlaying data would be valuable. A second possible answer is to consider this as a comparison, where an appropriately sorted list could be useful. d. A corporate accountant is examining how much variability there is in individual customer spending in response to a social media campaign about company advances in social responsibility. This task requires the corporate accountant to show a comparison of different distributions (this is signaled by the “how much variability” wording). While a bar chart is often used for comparison, bar charts cannot show variability well. Thus, a better answer is to consider a distribution chart. A box-plot allows for showing distributions and making comparisons and is thus the best answer. e. A large conglomerate corporation operates businesses in several different industries. The CEO wants to see how much each industry contributes to the overall profits of the corporation. This task requires showing how each industry contributes to the whole of the company, and thus a pie chart or treemap is appropriate. A bar chart could be used, but this does not show how parts contribute to a whole and thus is not the best answer possible. f. The manager of a movie theater wants to understand how attendance at his movie theater is affected by prices. This task is a correlation task that shows how one variable (attendance) is influenced by another variable (price). A scatterplot would be the most appropriate viz in this situation. A regression overlay on the scatterplot would be informative. 7.5 Excel Problem
7-8 .
Accounting Information Systems 15e, GE
Walmart Inc. has made historical sales data available for 45 stores located in different regions throughout the United States. Go to the student download page at http://www.pearsonglobaleditions.com and download the files labeled “WalmartSales.csv” and “WalmartFeatures.csv”. Using this data, a data analyst produced a viz to try to explain how temperature and fuel prices relate to average weekly sales. The visualization has the following elements: the black line represents weekly sales, the bars represent average weekly temperatures, the blue coloring on the bars shows median weekly fuel prices, and the red line is a regression trend line that corresponds to the equation shown on the chart. REQUIRED For this chart, do the following: a. Discuss how you would simplify the chart to show how temperature and fuel prices relate to average weekly sales. b. Download the data and make a new visualization (or visualizations) that presents the information in a simplified form.
a. The chart can be simplified in several ways. First, choosing a better chart type will help eliminate extraneous data and make it easier to display the relationship of temperature and fuel prices to weekly sales. . Second, there is too much additional information in the
7-9 .
Ch. 7: Data Analysis and Presentation
chart, including all the information about the model, multiple color schemes, date information on the x-axis, dual y-axes, a long title, long axes, and too much detail on some of the axes. b. The following visualizations were created in Tableau. The Tableau workbook titled “P75WalmartSalesTempFuelSolution.twbx” can be downloaded from the textbook website (http://www.pearsonglobaleditions.com).
7.6 The Maryland Transit Administration publishes the cost per passenger for citizens using local bus, light rail, metro rail, mobility paratransit, MARC (Maryland Area Regional Commuter train), contracted commuter bus, and taxi. The cost per passenger is calculated by taking the total operating costs of each respective mode of transportation and dividing it by the total number of annual trips. They produced the following generic viz to show their data. REQUIRED Do the following: a. Discuss how this chart fails to use emphasis appropriately. b. Generate two scenarios where emphasis would be important. Write a short summary of the scenario.
7-10 .
Accounting Information Systems 15e, GE
c. Go to the student download page at http://www.pearsonglobaleditions.com and download the file labeled “P7-6MarylandTransitCosts.xlsx”. For each scenario, create a visualization that emphasizes what is important relative to the scenario you designed for part b. Describe the design element(s) you chose to emphasize what is important.
Solutions generated in Tableau are included for download from the website (http://www.pearsonglobaleditions.com). They are contained in the file “P76MarylandTransitCostsSolution.twbx”. a. The chapter suggests three ways to show emphasis: highlighting, weighting, and ordering. The viz does not use highlighting; instead, colors are assigned based on years. The viz does not use any type of weighting. The viz also does not order the data in a way that emphasizes what is important. Although the viz does not use any of these types of emphasis, care should be taken not to use too much emphasis (i.e., you don’t necessarily want to use all types of emphasis either). b. Two scenarios where emphasis would be useful are (1) identify all the types of travel that have costs above the median value travel costs and (2) identify which type of transportation has had the most dramatic increases in travel costs over time. Student answers should focus on being specific and identifying some aspect of the situation that is more or less important than other aspects.
7-11 .
Ch. 7: Data Analysis and Presentation
c. For the two examples, suggested in part B, see the following visualizations and descriptions. 1) identify all the types of travel that have costs above the median value travel costs
This chart uses several techniques to emphasize which transportation options are most costly. It uses emphasis by using highlighting, weighting, and an additional technique. For highlighting and weighting, a red color is used, a visually “heavy” color relative to grey. The visualization also orders the data so what is most important is listed on the top. Finally, the median line is included, and the title of the graph helps guide the reader to understand the color code and the purpose of the visualization while emphasizing costs and those items above the median amount. (2) identify which type of transportation has had the most dramatic increases in travel costs over time.
7-12 .
Accounting Information Systems 15e, GE
This chart uses several techniques to emphasize which mode of transportation has had the largest increase in costs over time. The chart uses highlighting (a bright color) to show the most important finding. The chosen color also has high visual weight. The chart type was chosen to show percentage changes which highlight differences more than just raw amounts. Also, a callout was used to highlight the most important take-away from the chart. 7.7 In the state of Maryland, Montgomery County passed a law that requires all retail establishments to charge a five-cent tax on each paper or plastic carryout bag. Retailers retain 1 cent of the 5 cents for the bags they sell to a customer. The other 4 cents must be remitted to the county. Go to the student download page at http://www.pearsonglobaleditions.com and download the file labeled “P77MarylandBagTax.xlsx”. This file provides the actual amount companies collected, the
7-13 .
Ch. 7: Data Analysis and Presentation
amount they paid to the city each month (labeled “Amount Due”), and the amount they retained from the tax. REQUIRED Using this data, create a separate visualization to accomplish each of the following objectives. a. Create a visualization that emphasizes the vendors who contributed the most to the bag taxes collected by the county. Provide a brief explanation of which emphasis technique(s) you used. b. Create a visualization that emphasizes which cities paid the most bag taxes to the county. Provide a brief explanation of which emphasis technique(s) you used. Exclude all items that have a null value in the City field. c. Create a visualization that examines the annual trend in amount collected for each city over time. Exclude all items that have a null value in the City field. Emphasize the town “Germantown” in the visualization. Provide a brief explanation of which emphasis technique(s) you used. Solutions generated in Tableau are included for download from the website (http://www.pearsonglobaleditions.com). They are contained in the file “P77MarylandBagTaxSolution.twbx”. a. For part A, consider the following possible solution. Students should focus on using principles taught in this chapter to produce high quality visualizations.
7-14 .
Accounting Information Systems 15e, GE
This question asks for a comparison of company contributions to the whole of bag taxes collected. As such, a tree map is appropriate. The viz uses different colors and size to highlight which companies contributed the most to the total amount collected. It also orders the companies so that it is easy to see which ones contribute the most. Not all labels are included because of the size of the names. If some specific companies were deemed important, then their names could be presented. b. For part b, consider the following possible solution.
7-15 .
Ch. 7: Data Analysis and Presentation
This viz uses several of the principles discussed in the chapter to emphasize which cities paid the most in taxes. It uses gradient coloring to show which amounts are highest, and it also uses ordering to list the most important at the top. The labels make it easy to see the exact amounts of which cities are highest (which is also shown by the bars). c. For part c, consider the following possible solution.
7-16 .
Accounting Information Systems 15e, GE
Part c asks for a comparison in trends. A comparison in trends can be shown with an area chart. The chart above uses color and labeling to highlight Germantown’s contribution to the total % of taxes collected by the county. It also uses ordering to emphasize how Germantown relates to other cities. In this case, Germantown is not contributing the most or least, so it would make it more difficult to understand the viz if it was listed at the top or bottom. Rather, the current ordering shows the appropriate placement of Germantown relative to other cities. The title is also used to emphasize the focus on Germantown.
7-17 .
Ch. 7: Data Analysis and Presentation
7.8 Walmart Inc. has made historical sales data available for 45 stores located in different regions throughout the United States. Go to the student download page at http://www.pearsonglobaleditions.com and download the files labeled “WalmartSales.csv” and “WalmartFeatures.csv”. For this problem, assume that you are the manager of department 92 at store 23. REQUIRED Using this data, make two visualizations. One visualization should make your department appear to be the most profitable of all other department 92s by using unethical data presentation techniques. You can use any techniques other than changing the data. The second visualization should ethically present the performance of your department. Discuss how you manipulated the data in the unethical visualization to make your store appear better than it actually is performing. Solutions generated in Tableau are included for download from the website (http://www.pearsonglobaleditions.com). They are contained in the file “P78WalmartUnethicalEthicalSales.twbx”.
Unethical Visualization
7-18 .
Accounting Information Systems 15e, GE
The unethical visualization does several things to make the department look like it is performing very well. First, it only chooses other stores where the departments are performing much worse (rather than show all stores, or a representative sample of different stores). The axis is hidden on the left because it doesn’t start at 0 and so it makes performance look even better. The principles of emphasis are used to highlight the department’s performance, the title tells a one-sided story, and the bar for the department is much wider so that it looks not only taller but bigger than the rest of the bars. Ethical Presentation
This visualization includes all stores with a department 92 and highlights that store 23 has done well but is not dominating all the other department 92s at Walmart. The axis is corrected to start at zero, sizing is the same for all stores, and overall this presents a more complete picture of what is going on. 7.9 Search the Internet and find two visualizations. One visualization should be an example of a poorly designed visualization, but that is not misleading or unethical. The other visualization should be a visualization that you believe is misleading or unethical. Paste each visualization in your answer document and then using principles discussed in the
7-19 .
Ch. 7: Data Analysis and Presentation
chapter describe why the first chart is poorly designed and why the second chart is unethical. Discuss why there is a difference between poor design and unethical design. Answer: There are many different possible answers from students. The key to the problem is the description about the visualization. Here are two examples of how students can answer this question: Poor Visualization
This chart comes from the article posted online at https://www.nature.com/articles/nclimate3179. This chart is a poor chart in many regards. The chart is unnecessarily complex. It is not clear what pertains to which axis, there are too many axes, the title is not helpful, the legends are far away from the words, etc. In terms of emphasis, nothing is emphasized so it is hard to know what to use the chart for (including not having a title describing the chart). Unethical Visualization
7-20 .
Accounting Information Systems 15e, GE
This viz makes it look like the stand your ground law caused gun deaths to decrease. The problem is that the axis on the left is inverted from what you would normally expect. When you switch this, the viz looks like this:
Also, the viz could be suspect because of the cutoff in dates (it could be that gun deaths are more cyclical and the 1990 date is abnormally high or low). One of the primary reasons for differences in ethical vs. poor visualization is the intent of the viz. When a viz is meant to use data out of context to prove a point it is unethical.
7-21 .
Ch. 7: Data Analysis and Presentation
SUGGESTED ANSWER TO THE CASE Case 7.1 The following case was developed by the Ernst & Young Academic Resource Center, which is sponsored by the Ernest & Young Foundation. Part 1: Background You are the chief technology officer (CTO) of an international bank. A key component of your job is to manage risk within the bank related to information technology (IT). Banks face significant regulatory oversight and must have well-functioning internal controls to prevent and detect any problems related to IT. Within the IT area, data security and privacy are high-risk areas. As such, you must design and implement internal controls to reduce risk. One key preventive internal control that your bank has implemented is employee training. As part of this control, all bank employees must complete regular IT trainings. The feedback you have received about past trainings is that they are tedious and boring. You are concerned that employees may not engage fully in the trainings and, thus, the control is not helping reduce the risk of an IT security incident. If there is a significant IT security incident on your watch, you are likely to lose your job. At a recent conference, you heard of a new way to increase interest in and learning from training: gamification of training. Gamification is the application of gaming techniques — like using points, badges, leaderboards, stories, etc. — to non-game scenarios. As one gamified vendor representative explained, “We take traditional training courses and make them more fun by making them a game. Your employees will engage at a deeper level, learning significantly more than in any traditional training session, and have fun while doing it!” The possibility of making IT security training more interesting has perked your interest. You need to make a recommendation to the rest of the executive team about whether you will purchase and implement gamified training for your next wave of IT security training or go with a traditional training module. To help you make an informed decision, you reach out to a friend at another bank who recently implemented a gamified IT security training module at her bank. She sends you a data file and memo for you to analyze to help inform your decision. Before you go any further, you remember your training about the importance of using an analytics mindset. You decide to review the training material before continuing. Implementing an analytics mindset Having and using an analytics mindset are critical in accounting and business. An analytics mindset is the ability to: ► Ask the right questions ► Extract, transform and load relevant data ► Apply appropriate data analytics techniques
7-22 .
Accounting Information Systems 15e, GE ► Interpret and share the results with stakeholders
In this setting, using an analytics mindset means using data to inform your decision, rather than going with your “gut feeling,” another person’s recommendation or using another way of deciding. Given that you have data from a similar bank, it makes sense to see what you can learn (and recognize what you cannot learn) by using their data. Required 1.
As a CTO, there are many things you need to consider when choosing the best IT security training program for your employees. Develop a list of questions (at least five) for which you want answers to make the best decision about whether you should implement a gamified training model.
2.
Review the memo and descriptions of the data sent from your friend in the appendix. Also, review the data and consider the following (go to the student download page at http://www.pearsonglobaleditions.com and download the file labeled “Analytics_mindset_case_studies_Gamification_P1.xlsx”):
3.
–
Which questions that you generated in the first requirement can you answer or not answer by using the data?
–
What additional data would you need to answer the questions you developed?
–
What are the limitations of the data provided by your friend?
Prepare a recommendation for the rest of your organization’s executives about whether your organization should use gamified training. –
Use a visualization software package to create visualizations that can be sent to everyone before the meeting. Give thought to how you will display your analyses so that it is understandable and convincing.
–
Make sure your deliverable clearly states the problem, your recommendation, the reasons supporting your recommendation, and any key questions and issues that you were not able to address (and what you would need to address them).
7-23 .
Case 7.1 Appendix Memo from friend Our bank recently decided to try a gamified IT training model. Before providing the training, we sent a survey to a number of our employees to test their IT security knowledge (this group has not done any recent IT training). We received 325 usable responses from this group (Group 1). We then had all employees of the bank complete the gamified training. Afterward, we asked all employees to fill out a survey. We received 531 usable responses from this group (Group 2). For Group 2, we asked the same questions we used to measure IT security knowledge as we did with Group 1. We also asked Group 2 numerous questions about how much these employees enjoyed the training, how they rated it, etc. A full description of the questions and data fields in the Excel file is included below. A few notes about the data file: ► Any time a field is blank, it means there is no response for that question from the
employee. Be careful as you import data to make certain that the values reflect that they are missing rather than showing the value as zero. ► It may be obvious, but there is no data about Group 1’s satisfaction with the training
because they had not yet completed the training. ► The data does not include personally identifiable information, like an email address, so
the data between the two groups cannot be linked for an employee who participated in both surveys. You might consider how this could influence the interpretation of your results. Here’s a description of the data in the Excel file. ► ID – a randomly generated unique identifier for each employee response in the data set. ► ReceivedTraining – a dummy variable that equals “Yes” if the employee filled out the
survey after completing the gamified training and “No” if the employee did not participate in the gamified training. ► TotalKnowledge – the percentage score of the employee on the IT security knowledge
test. Scores can range from 0.00000 (missed every question) to 1.00000 (answered every question correctly). The next data fields measure how employees who completed the gamified training scored on the bank’s learning objectives. Each question was measured on a seven-point scale with 1 = strongly disagree, 2 = disagree, 3 = somewhat disagree, 4 = neither agree nor disagree, 5 = somewhat agree, 6 = agree and 7 = strongly agree. ► BetterPerform – the answer to: “I can better perform my job because of this training.” ► ContentNeeded – the answer to: “This program provided the training content that I
needed for my job.” ► UnderstandResponsibilities – the answer to: “After the training, I feel proficient in the
following areas: I understand my responsibilities for protecting information.” ► ApplyTechniques – the answer to: “After the training, I feel proficient in the following
areas: I can apply the risk management techniques used in protecting information.”
7-1 .
Ch. 7: Data Analysis and Presentation ► KnowImportance – the answer to: “After the training, I feel proficient in the following
areas: I know the reputational importance of effective information security and the consequences of information being lost or stolen.” The next data fields all used the same basic question: “Please compare the most recently completed gamified training that used an interactive, game-style approach with your last training experience that did not use this approach. Please rate which was better using the following dimensions … .” Employees could select any number on a seven-point scale with responses anchored at 1 = gamified training, 4 = they were the same and 7 = traditional training. Employees rated their satisfaction with the training based on the following words: ► Enjoyable ► Interesting ► Fun ► Informative ► Boring ► Waste of time
The next data fields contain rankings of different types of training. Employees were asked to “Please provide a rank ordering of what you would prefer for future training.” A ranking of 1 was the most preferred, followed by 2, 3, 4 and 5 being the least preferred. The types of training that were ranked include the following (with description): ► RankGamified – online training using an interactive, game-style approach ► RankOnlineVoice – online training using mostly written materials with voice-over (e.g.,
PowerPoint presentation with a narrator) ► RankWritten – online training containing only written material ► RankLecture – in-person training with a traditional approach ► RankOther – other, please describe
7-2 .
Accounting Information Systems 15e, GE
Analytics mindset Gamification Part 2: To provide additional evidence about how a gamified training approach compares with more traditional training approaches, you conduct an experiment. Experiments have several advantages over surveys (like the data you analyzed in Part 1). In a true experiment, you can randomly assign participants to do different things (called conditions in experimental talk). Randomly assigning participants creates equal comparisons because any unique factors should be represented equally in each group. For example, assume in Part 1 that the group that did not receive gamified training included the least intelligent and least motivated people in the company. When comparing the responses, you wouldn’t know whether differences in the performance of the gamified training were caused by the training or the differences in motivation and intelligence of the groups. If you can randomly assign participants to either complete the training or not complete the training, then there should be an approximately equal number of intelligent and motivated people in each group (especially as you have larger groups participate), so any differences should be caused by the training and not other factors. In the experiment, there are three different groups: ► Group 1 received no training at all. ► Group 2 received a traditional training course that did not use gamification. ► Group 3 received a gamified training course.
Participants in all three groups answered the same knowledge questions as in Part 1. Participants in Groups 2 and 3 also answered the satisfaction questions related to enjoyable, interesting, fun, informative, boring and waste of time. In the experiment, these questions were measured on a seven-point scale with 1 = strongly disagree, 2 = disagree, 3 = somewhat disagree, 4 = neither agree nor disagree, 5 = somewhat agree, 6 = agree and 7 = strongly agree. In the experiment, there is one additional field labeled TypeOfTraining, which lists whether they received “No training”, “Non-gamified training” or “Gamified training.” Required 1. Brainstorm the advantages and disadvantages for using an experiment versus a survey. What are the strengths and weaknesses of each approach? 2. Prepare a recommendation for the rest of your organization’s executives about whether you should use gamified training based on the experimental data (go to the student download page at http://www.pearsonglobaleditions.com and download the file labeled “Analytics_mindset_case_studies_Gamification_P2.xlsx”). –
Use a visualization software package to create a story that can be sent to everyone before the meeting. Give thought to how you will display your analysis so that it is understandable and convincing. 7-3 .
Ch. 7: Data Analysis and Presentation
–
Make sure your deliverable clearly states the problem, your recommendation, the reasons supporting your recommendation, and any key questions and issues that you were not able to address (and what you would need to address them). Also, consider the following questions: ► Do you reach a different conclusion based on the experimental data versus the
survey data? ► Which data do you think is more convincing?
What evidence supports your recommendation and does not support your recommendation? Why do you believe the evidence supporting your recommendation is more convincing than the evidence that does not support your recommendation? The use of the EY ARC cases stipulated that solutions could not be posted with the textbook. The solutions, including detailed implementation guides, videos, and other resources can be downloaded by going to https://eyonline.ey.com/eysso/unprotected/logon.aspx.
7-4 .
CHAPTER 8 FRAUD AND ERRORS SUGGESTED ANSWERS TO DISCUSSION QUESTIONS 8.1
Do you agree that high penalty, such as reducing salaries or retirement benefits, is the most effective way to reduce employee fraud because the cost of dishonesty is excessive? There can be various answers to this, depending on the management of the company. While some feel that high penalty is the discouragement to employee fraud, others believe that proper training and a conducive culture can check employee fraud.
8.2
You work for a small company in which an employee, who was single-handedly responsible for handling cash receipts as well as customer billing, has recently confessed to lapping when the amount that was available via cash receipts was no longer sufficient to cover the amount that was being stolen. What is lapping and what can be done to prevent it? How can lapping be identified? How should your company’s management respond to the confession? Lapping is when accounts receivable is altered to hide stolen receivable payments. Subsequent receivable payments are then used to cover the original theft. This process continues for as long as the perpetrator is able to cover the debt with payments that are made by customers. In a lapping scheme, cash and accounts receivable are typically involved. Lapping can typically be prevented by ensuring regular audits of cash receipts; and also be separating cashier and billing duties. Track the use of credit memos and employees responsible for writing off bad debt – as someone involved in lapping may eventually want to write off the outstanding debt in a bid to stop the lapping. Making use of digitally recording (by images) of checks sent in for payments and invoices to match a customer payment to an invoice can prevent lapping from occurring. Lapping is typically identified by a rise in aging of accounts receivable. Since the theft involves two asset accounts (cash and accounts receivable), the cover-up must continue indefinitely unless the money is replaced, or the debt is written off the books. So, when employees refuse to take vacation leave, it could be an indicator of lapping going on. Periodic reviews of cash receipts and tracing payments to their relevant outstanding receivables will show if there are any inappropriate cash receipts applied to incorrect customer accounts. Once the employee had confessed, there should be a thorough investigation of the fraud and actual losses should be determined. The employee might not have kept track of everything that had been lapped, and the amount the employee confessed to might be far less than the actual amount defrauded. When the investigation is done, appropriate controls should be put in place to prevent future cases of lapping. 8-1 .
Ch. 8: Fraud and Errors
8.3
Discuss the following statement by Roswell Steffen, a convicted embezzler: “For every foolproof system, there is a method for beating it.” Do you believe a completely secure computer system is possible? Explain. If internal controls are less than 100% effective, why should they be employed at all? The old saying "where there is a will, there is a way" applies to committing fraud and to breaking into a computer system. It is possible to institute sufficient controls in a system so that it is very difficult to perpetrate the fraud or break into the computer system, but most experts would agree that it just isn't possible to design a system that is 100% secure from every threat. There is bound to be someone who will think of a way of breaking into the system that designers did not anticipate and did not control against. If there were a way to make a foolproof system, it would be highly likely that it would be too cost prohibitive to employ. Though internal controls can’t eliminate all system threats, controls can:
8.4
Reduce threats caused by employee negligence or error. Such threats are often more financially devastating than intentional acts. Significantly reduce the opportunities, and therefore the likelihood, that someone can break into the system or commit a fraud.
Revlon hired Logisticon to install a real-time invoice and inventory processing system. Seven months later, when the system crashed, Revlon blamed the Logisticon programming bugs they discovered and withheld payment on the contract. Logisticon contended that the software was fine and that it was the hardware that was faulty. When Revlon again refused payment, Logisticon repossessed the software using a telephone dial-in feature to disable the software and render the system unusable. After a three-day standoff, Logisticon reactivated the system. Revlon sued Logisticon, charging them with trespassing, breach of contract, and misappropriation of trade secrets (Revlon passwords). Logisticon countersued for breach of contract. The companies settled out of court. Would Logisticon’s actions be classified as sabotage or repossession? Why? Would you find the company guilty of committing a computer crime? Be prepared to defend your position to the class. This problem has no clear answer. By strict definition, the actions of Logisticon in halting the software represented trespassing and an invasion of privacy. Some states recognize trespassing as a breach of the peace, thereby making Logisticon’s actions illegal. However, according to contract law, a secured party can repossess collateral if the contract has been violated and repossession can occur without a breach of the peace. The value of this discussion question is not in disseminating a “right answer” but in encouraging students to examine both sides of an issue with no clear answer. In most 8-2 .
Accounting Information Systems 15e, GE
classes, some students will feel strongly about each side and many will sit on the fence and not know. 8.5
Because improved computer security measures sometimes create a new set of problems—user antagonism, sluggish response time, and hampered performance— some people believe the most effective computer security is educating users about good moral conduct. Richard Stallman, a computer activist, believes software licensing is antisocial because it prohibits the growth of technology by keeping information away from the neighbors. He believes high school and college students should have unlimited access to computers without security measures so that they can learn constructive and civilized behavior. He states that a protected system is a puzzle and, because it is human nature to solve puzzles, eliminating computer security so that there is no temptation to break in would reduce hacking. Do you agree that software licensing is antisocial? Is ethical teaching the solution to computer security problems? Would the removal of computer security measures reduce the incidence of computer fraud? Why or why not? Answers will vary. Students should consider the following conflicting concepts: Software licensing encourages the development of new ideas by protecting the efforts of businesses seeking to develop new software products that will provide them with a profit and/or a competitive advantage in the marketplace. This point is supported by the following ideas:
The prospect of a financial reward is the primary incentive for companies to expend the time and money to develop new technologies. If businesses were unable to protect their investment by licensing the software to others, it would be much more difficult for them to receive a reward for their efforts in the research and development of computer software. Economic systems without such incentives are much more likely to fail in developing new products to meet consumer needs.
The only way to foster new ideas is to make information and software available to all people. The most creative ideas are developed when individuals are free to use all available resources (such as software and information). Many security experts and systems consultants view proper ethical teaching as an important solution to most security problems. However, no single approach is a complete solution to the problem of computer fraud and abuse. Proper ethical teachings can reduce but not eliminate the incidents of fraud. Though no security system is impenetrable, system security measures can significantly reduce the opportunity for damages from both intentional and unintentional threats by employees. Controls can also make the cost (in time and resources) greater than the benefit to the potential perpetrator.
8-3 .
Ch. 8: Fraud and Errors
Ultimately, the reduction in security measures will increase opportunities for fraud. If the perpetrator has sufficient motive and is able to rationalize his dishonest acts, increased opportunity will probably lead to an increase in computer crimes.
8-4 .
Accounting Information Systems 15e, GE
SUGGESTED ANSWERS TO THE PROBLEMS
8.1
Match the terms with their definitions:
1. _E__ corruption 2. _C__ fraud 3. _M__ rationalization 4. _A__ sabotage 5. _B__ cookie 6. _K__ lapping 7. _O__ opportunity 8. _Q___ investment fraud 9. _N___ computer fraud 10. _L__ check kiting
11. _D__ white-collar criminals 12. _H__ fraudulent financial reporting 13. _G__ misappropriation of assets 14. _I__ pressure
a. Intentional act with the intent to destroy a system or its components b. Text file created by a website and stored on a visitor’s computer that tells who the user is and what they have done c. Any means a person uses to gain an unfair advantage over another person d. Business people who commit fraud by resorting to trickery; their crimes usually involve a violation of trust or confidence e. Dishonest conduct by those in power; involves illegitimate, immoral, or unethical actions f. Software used to do harm g. Theft of company assets by employees h. Intentional or reckless conduct that results in materially misleading financial statements i. Person’s incentive or motivation for committing fraud j. Resistance to change intended to destroy, cripple, or weaken system effectiveness, such as increased error rates, disruptions, or deliberate sabotage k. Concealing theft of cash by delaying the posting of accounts receivable collections l. Creating cash using the lag between the time a check is deposited and the time it clears the bank m. Excuse fraud perpetrators use to justify their illegal behavior
n. Any type of fraud that requires computer technology to perpetrate o. Condition that allows a person to commit and conceal a fraud and convert it to personal gain p. Techniques or psychological tricks used to allow perpetrators to gain access to a building, computer, or network. q. Misrepresenting or omitting facts to promote an investment that promises fantastic profits with little or no risk
8-5 .
Ch. 8: Fraud and Errors
8.2
An employee at an electrical engineering firm was unhappy about being overlooked for a promotion opportunity and decided to resign. He started working at a competing firm in the same city. The former firm soon realized that their innovative designs in engineering solutions were being made available at the new firm where the employee was now working. After a thorough investigation, it was found that the disgruntled employee’s account and password (and therefore his access to confidential designs) were still active. The investigation indicated that the employee had regularly accessed his account and reviewed the confidential designs. a.
Identify and explain the type of fraud that has taken place. Misappropriation of assets – in this case, the disgruntled employee had access to confidential information. This information was stolen and used at the new firm where he worked.
b.
What must have motivated the employee to commit the fraud? Explain your answer. This seems to be an emotional pressure, as the employee was disgruntled because he was overlooked for a promotion opportunity. This means the employee probably felt that his performance was not recognized and he was not satisfied with this situation. These emotions could have led to the employee envying or resenting the person that did get the promotion.
c.
List two contributing factors to the type of fraud that has taken place. The two factors are: i. Absence of internal controls. ii. Failure to enforce existing internal controls.
8-6 .
Accounting Information Systems 15e, GE
8.3
The computer frauds that are publicly revealed represent only the tip of the iceberg. Although many people perceive that the major threat to computer security is external, the more dangerous threats come from insiders. Management must recognize these problems and develop and enforce security programs to deal with the many types of computer fraud. Explain how each of the following six types of fraud is committed. Using the format provided, also identify a different method of protection for each and describe how it works Adapted from the CMA Examination.
Type of Fraud
Explanation
Identification and Description of Protection Methods
Input manipulation
This requires the least amount of technical skill and little knowledge of how the computers operate. Input data are improperly altered or revised without authorization. For example, payroll time sheets can be altered to pay overtime or an extra salary.
Program alteration
Program alteration requires programming skills and knowledge of the program. Program coding is revised for fraudulent purposes. For example: Ignore certain transactions such as overdrafts against the programmers' account Grant excessive discounts to specified customers
8-7 .
Documentation and Authorization Data input format authorized and properly documented. Control over blank documents. Comprehensive editing Control source of data Programmed Terminal/User protection Programs that only accept inputs from certain designated users, locations, terminals, and/or times of the day. Programmers should not be allowed to make changes to actual production source programs and data files. Segregation of Duties Programmers should not have access to production programs or data files. Periodic Comparisons Internal Audit or an independent group should periodically process actual data, and compare the output with output from normal operations. Differences indicate unauthorized program changes. Periodic comparisons of on-line programs to off-line backup copies to detect changes. Independent file librarian function who controls custody/access to programs
Ch. 8: Fraud and Errors
File alteration
Defrauder revises specific data or manipulates data files. For example: Using program instructions to fraudulently change an employee’s pay rate in the payroll master file Transferring balances among dormant accounts to conceal improper withdrawals of funds.
Data theft
Smuggling out data on: - Hard copies of reports/files. - Magnetic devices in briefcases, employees' pockets, etc.
Restrict Access to Equipment/Files Restrict access to computer center. Programmers and analysts should not have direct access to production data files. Have a librarian maintain production data files in a library. Restrict computer operator access to applications documentation, except where needed to perform their duties, to minimize their ability to modify programs and data files. Electronic sensitization of all library materials to detect unauthorized removals. Encrypt sensitive data transmissions.
Tap or intercept data transmitted by data communication lines Sabotage
Theft of Computer Time
Physical destruction of hardware or software.
Unauthorized use of a company's computer for personal or outside business activities. This can result in the computer being fully utilized and lead to unnecessary computer capacity upgrades.
8-8 .
Terminated employees immediately denied access to all computer equipment and information to prevent them from destroying or altering equipment or files. Maintain backup files at secure off-site locations. Assigning blocks of time to processing jobs and using the operating system to block out the user once the allocated time is exhausted. Any additional time would require special authorization.
Accounting Information Systems 15e, GE
8.4
You were asked to investigate extremely high, unexplained merchandise shortages at a department store chain. Classify each of the five situations as a fraudulent act, an indicator of fraud, or an event unrelated to the investigation. Justify your answers. Adapted from the CIA Examination a.
The receiving department supervisor owns and operates a boutique carrying many of the same labels as the chain store. The general manager is unaware of the ownership interest. This is an indication of possible fraud. This conflict of interest is a fraud symptom that alerts auditors to the possibility of fraud. The receiving department supervisor’s ownership of the boutique may also be in conflict with the organization's code of ethics and conduct.
b.
The receiving supervisor signs receiving reports showing that the total quantity shipped by a supplier was received and then diverts 5% to 10% of each shipment to the boutique. This is a fraudulent act because there is a theft accompanied by: 1. A false statement, representation, or disclosure (signing the receiving report) 2. A material fact, (the signature on the receiving report causes the company to act; that is, to pay the vendor) 3. An intent to deceive (The supervisory deceives the company so that it will pay for the goods he steals) 4. A justifiable reliance (The store relies on the misrepresentation to pay the vendor) 5. An injury or loss (The supervisor steals goods the store pays for)
c.
The store is unaware of the short shipments because the receiving report accompanying the merchandise to the sales areas shows that everything was received. This is a weakness in internal control. Sales personnel should count the goods received and match their counts to the accompanying receiving report. Failure to do so allows the theft to go undetected.
d.
Accounts Payable paid vendors for the total quantity shown on the receiving report. Proper internal control says that Accounts Payable should match the vendor’s invoice to both the purchase order and the receiving report. Because this matching would not detect the theft, some may argue that this is a weakness in internal control. However, the weakness lies in the sales department not counting (independently verifying) the receiving department count. (see parts c and e)
8-9 .
Ch. 8: Fraud and Errors
Therefore, accounts payable paying the vendor the total amount due is not a fraud or an indicator of fraud or an internal control weakness. It has no bearing on the investigation. e.
Based on the receiving department supervisor’s instructions, quantities on the receiving reports were not counted by sales personnel. This is the same internal control weakness described in part c. The receiving department supervisor gave those instructions to facilitate his or her fraud In addition, sales personnel’s following the receiving department supervisor’s instructions is another internal control weakness. The receiving department supervisor should not have control over or manage sales personnel. There should be a clear-cut segregation of duties between sales and receiving. The receiving department supervisor having control over or supervising sales personnel is also a fraud symptom that should alert auditors to the possibility of fraud.
8-10 .
Accounting Information Systems 15e, GE
8.5
For each of the following independent cases of employee fraud, recommend how to prevent similar problems in the future. a. Some customers found that the products of a prestigious brand sold at retail shops in China are counterfeits. This explains why the customers prefer to buy those products in the European country of their origin, Hong Kong, or Macau. Investigation revealed that the staff of the retail shops exchange genuine products with fake ones. They sell the fake products to retail customers and the genuine ones through personal channels. While collusion is difficult to prevent, the store could improve its control system by: • Implementing job rotation so that the same employees are not always performing the same duties. • Having a specific person responsible for managing inventory—and ensuring monitoring of this key person and periodic rotation of staff at this role. • Videotaping the staff and periodically reviewing the tapes looking for fraud and collusion. • Tagging each item with an electronic tag that can only be deactivated by scanning it into a cash register. This may cost more (and be more hassle) than it is worth. b. A computer programmer runs a special program to transfer the decimal points of 100,000 customer accounts of a bank to his account. For example, after running the program, the balance in a customer’s account would change from $23,456.78 to $23,456. Every month, this programmer gains several thousands of dollars by pressing a button. The fraud could be prevented with better internal controls, including: • Supervising the computer programmer and monitoring his performance. • Hiring a computer consultant or forensic specialist to fix the system and checking the system for back doors and loopholes which allow siphoning. • Having a special approval process in place for any system changes made by the programming/systems team which directly impacts actual account balances—and restricting access for such programs without such approval. c. In a remote area in Vietnam, a metal collection organization collects used rails and plates from construction companies. An employee calibrated the pound and reported lighter weight to the metal providers. She then sold the excess metal collected for personal profit. The weights & measures-related fraud could be prevented with better internal controls, including: • Having separate employees responsible for: o Collecting the used rails and plates. o Reporting the weight to the metal providers. • Implementing human resources policies for discharging employees that send messages about the required level of ethical behavior and integrity.
8-11 .
Ch. 8: Fraud and Errors
8.6
An insurance company in Asia reported a profit of $100 million for the financial year 2019–20 through the news-dissemination system of the stock exchange where it was listed. Its stock price increased several times as the announced profit was 10 times more than the previous year’s profit. A few days later, the company announced a mistake in the released financial results and stated that the correct profit should be $9.5 million. Regulatory bodies were asked to investigate if it was a trick used to manipulate stock prices. It was not clear who should be held responsible: the management, the accounting system, or the auditor? a.
Is this an example of fraudulent financial reporting? Answers will vary.
b.
What procedures could reduce the occurrence of such “mistakes”? The Treadway Commission recommended four actions to reduce fraudulent financial reporting: 1.
Establish an organizational environment that contributes to the integrity of the financial reporting process.
2.
Identify and understand the factors that lead to fraudulent financial reporting.
3.
Assess the risk of fraudulent financial reporting within the company.
4.
Design and implement internal controls to provide reasonable assurance of preventing fraudulent financial reporting.
8-12 .
Accounting Information Systems 15e, GE
8.7
An individual has bank accounts at four different banks (Banks A, B, C, and D) in Singapore. The client deposited a check of S$25,000 into Bank A into the account he has at Bank C. He is aware that the transaction will be cleared at Bank A only after seven working days and so, for that period, he still has access to S$25,000 in Bank C. Two days later, he withdraws this money from Bank C and deposits another check of S$25,000 in Bank A, this time from Bank B, to ensure the availability of funds in Bank B for another seven working days. Within this period, he withdraws this amount from Bank A and, before the seven working days are over, deposits a check of S$25,000 from Bank D into Bank B. What type of embezzlement scheme is this and what can be done to make it difficult to successfully conceal such a scheme? This is a typical example of a check-kiting scheme where an individual, for his own personal gain or on behalf of a company, can hide the theft of cash using the time delay between depositing a check and the time it clears the bank to “create” cash. Implementing electronic banking systems and making it mandatory for clients to deposit checks electronically will make check-kiting schemes harder to execute, since the time delay is drastically shortened.
8-13 .
Ch. 8: Fraud and Errors
8.8
prominent insolvency practitioner and former chairman of a large law firm with a 40-year legal career was removed from the role of an attorney in early January 2019.The attorney was charged with embezzling millions of South African rand and failed to account any of it to his co-investors. The police alleged that he transferred several millions of a Swiss company’s investments from his law firm’s account to an interest-bearing investment account. As part of the embezzlement scheme, the money in the interest-bearing investment account was indicated as money belonging to the law firm, which he then paid out to himself. When the Swiss company inquired after the status of their investment, the attorney refunded the capital amount to the appropriate account in the law firm but kept the accumulated interest for himself. a. How does the attorney fit the profile of a fraudster? How does he not fit the profile? b. What fraud scheme did he use? c. What controls could have prevented his fraud? d. What controls could have detected his fraud? a.
How does the attorney fit the profile of a fraudster? The attorney fit the profile in that he was in a position of power at a firm that had an untarnished reputation; he possessed knowledge, experience and skills and he was respected in the legal fraternity; he had a career of 40 years in this fraternity, and he was in a profession that subscribed to a code of ethics. He wanted to enrich himself. How does he not fit the profile? He was probably not that young anymore (he had a 40-year career already), he was most likely not unhappy or disgruntled, as he held a position of power and he made the strategic decision, based on the position that he held as chairman. There was thus no motivation to get even with an employer; nor was there envy because of overlooked promotions, etc.
b.
What fraud scheme did he use? The fraud he committed was most likely triggered by greed or pride – no matter how much he had, it would never be enough. He used the investment of another company to earn interest and create another source of income for himself.
c.
What controls could have prevented his fraud? Management should not have been allowed to override internal controls in place, nor should people in a position of power be able to exert pressure on subordinates to assist with perpetrating fraud. Transactions and activities should only be approved by authorized personnel. Independent checks should be performed by independent parties to restrict opportunities of threats taking place.
d.
What controls could have detected his fraud? Bank reconciliations and bank statements should be prepared and reviewed by independent parties. Investment accounts should be scrutinized to ensure that the accounts linked up with the entities that had made the investments.
8-14 .
Accounting Information Systems 15e, GE
8.9 The Journal of Accountancy periodically publishes an article called “What Is Your Fraud IQ?” It consists of 10 or more multiple-choice questions dealing with various aspects of fraud. The answers, as well as an explanation of each answer, are provided at the end of the article. Visit the Journal of Accountancy site (http://www.journalofaccountancy.com) and search for the articles. Read and answer the questions in three of these articles, and then check your answers. There should be 5 or 6 of these articles on the Journal of Accountancy web site. No solution is provided here as the solutions are at the end of each article. Most questions are thought provoking and the answers informative. 8.10 Select the correct answer(s) for the following multiple-choice questions. Note that there may be more than one correct answer. 1. Which of the following could be examples of unintentional threats to accounting information systems? a. Typing error by a data entry clerk who entered the figure A$10,000 instead of A$1,000. b. Several businesses remained without electricity for up to 8 hours due to a generator breakdown at the power station. c. An update to an online retailer’s sale items erroneously changed sale prices for all products to A$50, instead of a markdown of 50% on each item. d. Undetected data transmission errors costed a company close to A$300,000 because the errors were picked up only after 48 hours. e. A center housing all the servers of a large enterprise was flooded due to torrential rains. 2.
Which of the following is (are) TRUE about fraud? a. b. c. d. e.
White-collar criminals are trusted by their peers and their managers. Production workers are the most likely to be involved in corruption. Bid rigging is an example of investment fraud. Misappropriation of assets refers to the theft of physical assets. Justifiable reliance (where a person uses misrepresented information to take action) does not constitute fraud.
3. Which of the following actions could be linked to fraudulent financial reporting? a. Falsifying financial statements to deceive debtors. b. Recognizing revenues only after the revenues were earned. c. Overstating fixed assets. d. Indicating lower stock prices to attract stock sales. e. Amending financial statements to meet cash flow needs.
8-15 .
Ch. 8: Fraud and Errors
4. Which of the following have the potential to motivate financial statement fraud? a. Problematic habits, such as gambling or drug abuse. b. Major market saturation. c. New regulatory requirements impacting profitability. d. Bad investment choices. e. High employee turnover. 5. Which of the following opportunities permit employee and/or management fraud? a. Low turnover of employees in key positions. b. Management participation in internal control systems. c. Unclear policies and procedures in the company. d. Effective internal auditing staff. e. Numerous year-end adjustments. 6. Which of the following are NOT examples of computer fraud? a. Students accessing a university database to view their peers’ assessment marks. b. Payroll staff changing commission rates of their friends in sales. c. HR clerk accessing and making a digital copy of the pay scales of all employees in the company from his direct line manager’s workstation. d. Submitting handwritten invoices for electronic payment on behalf of a home industry for supposed catering purposes. e. Creating fraudulent paychecks. 7. Which of the following is (are) true about cyber sleuths? a. They need to know how to retrieve deleted emails. b. They come from an information systems and information technology background. c. They specialize in testing the strength of internal controls in a company. d. They need to be able to follow both paper and electronic trails. e. They need to understand data storage, but it is not necessary for them to understand data communication. 8. Which of the following are reasons for the rise in computer fraud? a. Computers used by employees (such as laptops and personal computers) are well protected and therefore it is easy to detect when a computer fraud was committed. b. Major damage can be done in a short span of time. c. Companies are reluctant to report incidents of computer fraud. d. Computer programs need constant updating for fraudulent transactions to take place. e. There are many highly skilled hackers with knowledge on how to commit computer fraud. 9. An employee at a large organization used the company computer during his lunch time to conduct a betting scheme. What type of fraud did he commit? a. input fraud. b. processor fraud. c. computer instruction fraud. d. data fraud. e. output fraud.
8-16 .
Accounting Information Systems 15e, GE
10. A graphic design graduate used design software to create paychecks that looked identical to those of a company in his town. The paychecks were deposited electronically into several of his friends’ accounts. What type of fraud did he commit? a. b. c. d. e.
input fraud. processor fraud. computer instruction fraud. data fraud. output fraud.
8-17 .
Ch. 8: Fraud and Errors
8.11 Research the following two topics and write a 3-page paper discussing what you found. a. There are several fraud analytics software packages on the market. Investigate them and try to determine what software is used most frequently, which ones are the least and most expensive, and what the major features of the software are. b. The chapter discussed just a few of the many data analytics techniques used to detect fraud. Research data analytics techniques and include in your report how the techniques are used, which companies have used them, and what the companies found when using the technique. Student answers will vary depending on what they find and how much time they spend researching. The important thing is that the students is learning how to research an important topic and then write up his/her findings.
8-18 .
Accounting Information Systems 15e, GE
SUGGESTED ANSWERS TO THE CASES 8.1
1.
How does Miller fit the profile of the average fraud perpetrator?
Like many fraud perpetrators, David Miller was not much different than the general public in terms of education, values, religion, marriage, and psychological makeup. Like Miller, many white-collar criminals are regarded as ideal employees until they are caught. Like him, they are dedicated and work long hours. He was well respected, occupied a position of trust, and was viewed as an honest, upstanding citizen. Most fraud perpetrators spend all that they steal. Few invest it. Miller was no exception.
How does he differ?
Miller was not disgruntled and unhappy, nor was he seeking to get even with his employer. Though David Miller was never convicted of fraud, he was involved in a number of schemes. In contrast, most fraud perpetrators are first time offenders.
How did these characteristics make him difficult to detect? It is often difficult to detect fraud perpetrators because they possess few characteristics that distinguish them from the public. Most white-collar criminals are talented, intelligent, and well educated. Many are regarded as the ideal employee that occupies a position of trust, is dedicated, and works hard for the company. They are otherwise honest, upstanding citizens that have usually never committed any other criminal offense. 2.
Explain the three elements of the opportunity triangle (commit, conceal, convert) and discuss how Miller accomplished each when embezzling funds from Associated Communications. What specific concealment techniques did Miller use? There are three elements to the opportunity triangle: 1. The perpetrator must commit the fraud by stealing something of value, such as cash, or by intentionally reporting misleading financial information. Miller was able to steal cash by undermining the internal controls that required two signatures on checks. He asked company officials to sign checks before they went on vacation "just in case" the company needed to disburse funds while they were gone. 2. To avoid detection, the perpetrator must conceal the crime. Perpetrators must keep the accounting equation in balance by inflating other assets or decreasing liabilities or equity. Concealment often takes more effort and time and leaves 8-19 .
Ch. 8: Fraud and Errors
behind more evidence than the theft or misrepresentation. Taking cash requires only a few seconds; altering records to hide the theft is more challenging and time-consuming. To conceal the theft, Miller retrieved the canceled check from the bank reconciliation and destroyed it. The amount stolen was then charged to an expense account of one of the units to balance the company's books. Miller was able to work himself into a position of trust and influence. Because he occupied this position his actions were not questioned and he was able to subvert some of the internal controls intended to prevent the type of actions he was able to take. 3. The perpetrator must convert the stolen asset into some form usable by the perpetrator if the theft is of an asset other than cash. For example, stolen inventory and equipment must be sold or otherwise converted into cash. In financial statement fraud, the conversion is more indirect, such as in undeserved pay raises, promotions, more stock options, etc. Miller was able to convert the check to cash by writing himself checks and depositing them in his personal account. 3.
What pressures motivated Miller to embezzle? How did Miller rationalize his actions? Motivation. After David Miller had undergone therapy, he believed his problem with compulsive embezzlement was an illness, just like alcoholism or compulsive gambling. He stated that the illness was driven by a subconscious need to be admired and liked by others. He thought that by spending all of that money others would like him. Ironically, he was universally well liked and admired at each job and it had nothing to do with money. In fact, one associate at Associated was so surprised at the news of the thefts that he said that it was like finding out that your brother was an ax murderer. Miller also claimed that he is not a bad person, that he never intended to hurt anyone, but once he got started he just could not stop. Rationalization. The case does not specify what Miller's rationalizations were. He may, in fact, have had a number of different rationalizations. The case suggests that he "needed it" to pay back the money he stole from previous employers. He was always "just borrowing" the money and intended to pay it back. Miller may have also been convinced that he would never be prosecuted for his crimes. Many of the rationalizations listed in the text are also possibilities.
4.
Miller had a framed T-shirt in his office that said, “He who dies with the most toys wins.” What does this tell you about Miller? What lifestyle red flags could have tipped off the company to the possibility of fraud? Miller's life seemed to be centered on financial gain and the accumulation of material goods or, as the quote says, "toys." Such gain, he felt, would lead to prestige and recognition among his friends in the business community. 8-20 .
Accounting Information Systems 15e, GE
The wealth and extravagant spending in relation to Miller's salary was the primary red flag that most companies never questioned. Consider that on his $130,000 a year salary he was able to afford two Mercedes-Benz sedans; a lavish suburban house; a condominium at Myrtle beach; expensive suits; tailored and monogrammed shirts; diamond, sapphire, ruby, and emerald rings for his wife; and a new car for his fatherin-law. 5.
Why do companies hesitate to prosecute white-collar criminals?
Negative publicity. Companies are reluctant to prosecute fraud because of the financial damage that could result from negative publicity. A highly visible fraud is a public relations disaster. The company could lose a lot of business due to the adverse publicity.
Exposes system weaknesses. Reporting and prosecuting fraud may reveal vulnerabilities in a company's system. This could attract even more acts of fraud.
Concern for the perpetrator's family. If an employee is willing to make retribution, companies may not press charges to protect the employee’s family and reputation.
Society is more concerned with "real" crime. Political considerations motivate enforcement officials to focus their resources on more violent and visible crimes such as rape, murder, and robbery. Some people see fraud as an internal problem and not as a serious crime that demands prosecution.
Unclear definition of computer fraud. One reason computer fraud is not prosecuted more is that the definition of computer fraud is so vague. As a result, no one really knows how much it really costs and there isn't as much motivation to go after computer fraud cases.
Prosecution difficulties. It is difficult, costly, and time consuming to investigate fraud. It is even harder to prove. As a result, it can be hard to prosecute fraud cases successfully and get convictions.
Lack of expertise. Many law enforcement officers, lawyers, and judges lack the skills necessary to investigate, prosecute and evaluate fraud, especially computer fraud.
Light sentences. When fraud cases are prosecuted and a conviction is obtained, the sentences received are sometimes very light. This discourages prosecution.
8-21 .
Ch. 8: Fraud and Errors
What are the consequences of not prosecuting? When fraud is not prosecuted, it sends a message to employees and to the public that enforcing laws is not important to the company. A reputation for being "soft" on fraud may result in the companies becoming increasingly vulnerable to additional fraud. Failure to report and prosecute a fraud also means that the perpetrator goes free and can repeat his or her actions at another company, as David Miller did. If the perpetrator does not have to pay the consequences of his actions, she is more likely to repeat them because she "got away with it" and was not punished. How could law enforcement officials encourage more prosecution? To encourage more fraud prosecution, law enforcement officials must take actions to solve each of the problems mentioned above. In addition, they must encourage more effective reporting of such crimes. The public should be educated to recognize and report fraud as a serious offense. 6.
What could the victimized companies have done to prevent Miller’s embezzlement? Not much is said in the case about how Miller committed many of the frauds. In each of the frauds, it is likely that the theft of cash could have been prevented by tighter controls over access to cash and blank checks and to the means of writing and signing checks. Some could have been prevented or at least detected by better control over monthly bank statements and their reconciliation. In retrospect, Miller was given too much trust and authority and that led to a breakdown of internal controls. However, companies have to trust their top level employees, such as the CFO. Even though this trust is necessary, a greater separation of duties and more supervision of Miller's work would have made it more difficult for him to perpetrate the frauds. In all but the first fraud, a more thorough background check of Miller may have revealed his past fraudulent activities and the company could have avoided the problems that arose after he was hired.
8-22 .
Accounting Information Systems 15e, GE
8.2 1. 2. 3. 4.
Figure 8-3 shows the employees and external parties that deal with Heirloom. Explain how Heirloom could defraud the bank and how each internal and external party except the bank could defraud Heirloom. What risk factor, unusual item, or abnormality would alert you to each fraud? What control weaknesses make each fraud possible? Recommend one or more controls to prevent or detect each means of committing fraud.
There are many ways to perpetrate fraud. Some of the more easily recognizable ways are the following: 1. Ways to Commit Fraud
2. Indication Something is Wrong 3. Weaknesses Allowing Fraud Receivables employees could Lag between customer payments No separation of and the posting of the payments. duties between cash 1. Steal cash receipts by lapping. receipts, posting Payments are made by sending in a If the appropriate controls are in receivables, and coupon and a $25 payment. Any of place, customers listed on the pre- preparing bank the three receivables employees listing of cash would not match deposit. could pocket the payment, save the the names on the bank deposit or coupon, put a subsequent payment those credited for payment on the No independent with the “saved” coupon, and run same day. checks on the payment through the system. performance. Increase in the number of accounts written off. No monthly 2. Steal cash receipts and allow If the perpetrator did not get statements. accounts to be written off. It is difficult to collect from some greedy, this might not be easily customers because they only have a detected since 35-40% of No work or family PO Box address and do not have a accounts are defaulted on already. secondary addresses phone. Receivables employees could Even a slow steady increase in the and phone numbers. steal cash receipts from these number of defaulting-due-tocustomers each month and allow the fraud customers might not be accounts to be written off. easily detected.
8-23 .
4. Controls to Minimize Fraud Separate custody of cash (opening cash receipts) from recording (posting payments to receivables records). Have 2 people open all cash receipts and prepare a pre-listing of cash receipts. Compare customer names on the pre-listing to customer names on the receivables posting and the bank deposits. Send monthly statements. Bank financing, credit card payments, or automatic withdrawals from checking or savings accounts. Involve sales agent in tracking down customers that cannot be reached before writing them off.
Ch. 8: Fraud and Errors
Sales agents could 3. Falsify sales to reach an incentive level. Agents can book fictitious contracts, pay with a money order, send correspondence to a PO Box they control, and let the contract default with no more payments. Agents selling less than 101 contracts can break even by falsifying up to 16 sales. ($250 down - $100 commission = $150 cost. $2500 bonus / $150 cost = 16 contracts). Agents selling less than 201 can falsify up to 40 contracts. ($250 down - $125 commission = $125 cost. $5000 bonus / $125 cost = 40 contracts) 4. Defer yearend sales Sales that will not qualify for a new incentive level could be held and put in next year’s sales. Sales agents could 5. Steal part of a customer’s payment. An agent could send in $250 of a $900 sale and pocket the difference. The agent could then make payments for a while and let the contract lapse. Not a big risk as virtually all customers choose financing.
Customer complaints. Abnormally large number of sales just before year end, combined with agent barely reaching an incentive level Increase in the number of accounts written off, especially for agents barely reaching an incentive level.
Few and steep incentive levels that motivate unwanted behavior. Inability to effectively follow -up on collections (addresses and phone numbers). See #2
Customer complaints.
Decrease in the number of customers paying the $900, which will be hard to detect since, so few use that option.
Analysis of December sales for sales agents who barely reach an incentive level, especially on last day or two of the year. Analysis of default rates per sales agent for those who barely reach an incentive level, especially on last day or two of the year.
Address and phone numbers not verified.
Check customer credit, addresses, and phone numbers.
Photographers don’t verify if customers are current before a sitting, so $250 is as good as $900.
Require photographers to verify that customers are current before each sitting.
Customers don’t sign, initial photography plan order forms
8-24 .
Base sales incentives on customer collections, not on original sales.
Customer credit not checked.
Customer complaints. Do most customers finance because agents are already doing this?
More graduated incentives that do not provide such strong incentives.
Require customers to sign photography plan order forms and initial the amount paid and financing arrangements.
Accounting Information Systems 15e, GE
6. Management can bleed the company or engage in non-armslength transactions with owners. Both owners are paying their spouses exorbitant salaries and have extravagant expense accounts and perks.
Company perpetually short of cash Expense accounts and perks unusually high
No apparent controls to prevent one owner from defrauding the other owner.
An external, independent audit. Full disclosure of all payments, perks, or nonarms-length transactions to a qualified tax preparer to ensure full compliance with applicable tax laws.
Inflated salary expenses Abnormally high prices for the assets purchased.
Buildings, equipment, and furnishings could be purchased from/by the owners at inflated or deflated prices. This is not fraud, as long as what occurs is reported properly for tax purposes and financial statement given to the bank properly disclose any needed items. It is fraud if one owner authorizes payments, perks, or non-arms length transactions to himself or his family that the other partner is not aware of. 7. Customers can use photo coupons without completing their payments. There are no controls to prevent customers who have stopped paying on their note from taking their coupon to their photographer for a sitting and getting their picture taken.
Increase in the number of sittings per current customer. Coupons submitted for customers that have been written off. Photographer complaints.
Require all payments, perks, or non-armslength transactions to an owner to be approved by the other owner.
Photographers are not required to verify if customers are current before a sitting. Customer given all their coupons at initial purchase.
Set up automatic withdrawals from checking accounts or automatic charges to credit cards. Require photographers to verify that customers are current before each sitting. Keep a list of customer payments; do not pay for customers that are no longer current. Do credit checks on all potential customers.
8-25 .
Ch. 8: Fraud and Errors
8. Photographers could send in unused coupons or fake coupons. Photographers have exclusive rights to customers in their specified areas. They could encourage customers to leave the coupons at the photo studio so they are not lost or misplaced. If a customer did not come in during the 6-month period, the photographer could submit his unused coupon.
Abnormally high rate of customers using their coupons
Photographers given an exclusive area.
Coupons that do not look authentic. Customer complaints.
Customers not signing coupons or otherwise verifying they had a sitting.
Abnormally high number of customers 30-60 days overdue.
Photographers could send in coupons for non-current customers as they are not required to verify if customers are current before a sitting. Nor does the company verify that submitted coupons are for a current customer. Bank does not verify data from Heirloom.
If the coupon book is not left for safekeeping, the photographer could scan a coupon, change the name to a customer who did not use their coupon, print it, and send it in.
9. Heirloom can defraud the bank by misstating the maximum amount Heirloom can borrow. Notes payable are in the borrowing base until they are 60 days overdue. To maximize that base, Heirloom could lap customer payments. They could take a monthly payment on a current account and apply it to an account that is just about to go 60 days overdue. The inflated list could be used to support a higher than justified loan.
8-26 .
Pre-number coupons. Have a code on the coupon that the photographer has to call in to the company (or enter on a website) before authorization is granted to take the photo. For each photographer, analyze what percent of customers use their coupons looking for abnormally high usage rates. Require photographers to verify that customers are current before each sitting. Do not pay for customers that are no longer current.
Analysis of the list, such as An increase in the number or percentage of accounts on the list submitted to the bank with no comparable increase in sales. Comparison of monthly lists to see if the same names appear month after month.
Accounting Information Systems 15e, GE
10. Heirloom can defraud the bank by misstating its financial statements in many ways. For example: - Understating its allowance and bad debt expense (not writing off uncollectible receivables and lowballing the bad debt expense). - Creating fictitious sales and notes receivables. - Intentionally under or over stating the sales commission estimates.
Unusual decrease in the allowance or bad debt amounts.
There is no mention of an external audit by independent CPAs.
Sales increase without a comparable increase in receivables; inventory; cost of goods sold; and applicable expenses such as photographer and album expenses, embossing and shipping, and commissions. Sales commissions out of line with those of the industry or past years.
8-27 .
An external, independent audit. Financial statement analysis, such as Analysis of bad debt to sales and allowance to sales ratios to see if they are below those of past years and those of comparable customers in the same industry. Analysis of sales ratios, comparing sales to receivables; inventory; gross margin, cost of goods sold; and applicable expenses such as album and photographer expenses, embossing and shipping, and commissions.
CHAPTER 9 COMPUTER FRAUD AND ABUSE TECHNIQUES SUGGESTED ANSWERS TO DISCUSSION QUESTIONS 9.1
The United Kingdom and Spain were reported to be two countries that were impacted the worst by the WannaCry (also known as WCRY) ransomware attack of May 2017. The attack targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments. Computer and phone systems of major hospitals and numerous corporations across 150 countries were hacked. At the hospitals, these disruptions meant that non-emergency surgeries and appointments had to be cancelled while ambulances were diverted to hospitals that had uninfected systems. There were indications of a bug having been propagated through the older Microsoft systems that were past their end-of-life. An infected computer system could also infect other systems on the same network, unless those systems were properly updated with emergency patches that were released by Microsoft a month prior to and during this cyberattack. The attack was estimated to have affected more than 200,000 computers worldwide, with total damages ranging from hundreds of millions to billions of dollars. How could it have been possible for attackers to gain access to the IT systems of hospitals and large corporations? If the perpetrators were people from outside the organizations (which seems the most likely case, given the Microsoft vulnerability), the bug (vulnerability) in the Microsoft code made it possible for the hackers to get into the system via a trap door / back door which enabled them to access the systems without having to go through normal system controls. It was then possible to infect the systems with ransomware – which is a type of malware that encrypts all the information on the storage devices of the different systems. What should these organizations do to avoid these incidents in the future? Ensure that all the concerned staff are aware of security policies and procedures. Ensure that all IT staff responsible for security of the networked systems (including networked computers, phone systems) are aware of the latest software patches and company policies and procedures regarding appropriate updates. Ensure that their anti-virus software is always up to date and actively running. Hardware and software should be updated as and when tested patches are released.
9.2
What motives do people have for hacking? Why has hacking become so popular in recent years? Do you regard it as a crime? Explain your position.
9-1 .
Ch. 9: Computer Fraud and Abuse Techniques
Hacking is the unauthorized access, modification, or use of an electronic device or some element of a computer system. Hacking represents illegal trespassing and is punishable as a federal crime under the 1986 Computer Fraud and Abuse Act. Hacking has increased significantly in popularity for several reasons. Perhaps the most important is the increasing use of personal computers and the Internet and the corresponding rise in the number and the skill level of the users. In other words, there are more systems to break into, and there are more people capable of breaking in. Most hackers are motivated by monetary rewards. Hackers have found many ways to profit handsomely from their hacking activities. Other hackers seek to destroy data, to make unauthorized copies of the data, or to damage the system in some way. Some hackers are motivated by the challenge of breaking and entering a system and many do so with no intent to do harm. They may feel that hacking is a “right” enjoyed by computer users in a “free information” society. Many of these benign hackers also argue that hacking rarely does any harm to a computer system and is acceptable behavior.
9.3
What is social engineering? Describe at least four social engineering techniques. Social engineering refers to techniques or psychological tricks used to get people to comply with the perpetrator’s wishes in order to gain physical or logical access to a building, computer, server, or network. Generally, social engineering is used in computer abuse to access a system to obtain confidential data. Piggybacking—latching onto a legitimate user in data communications. Masquerading or Impersonation—the perpetrator gains access to the system by pretending to be an authorized user. Social engineering—a perpetrator tricks an employee into giving him the information he needs to get into the system. Identity theft—illegally assuming someone else's identity, usually with the social security number. Pretexting—using an invented scenario to increase the likelihood the victim will give away information. Posing—fraudsters try to collect personal information by pretending to be legitimate business colleagues. Phishing—sending e-mail, pretending to be a legitimate business colleague, requesting user ID or password or other confidential data. Vishing—pretending to be a legitimate business colleague and attempting to get a victim to provide confidential information over the phone. 9-2 .
Accounting Information Systems 15e, GE
Carding—using stolen credit card information. Pharming—redirecting website traffic to a spoofed website. Typosquatting—setting up websites with names similar to real websites. Scavenging—gaining access to confidential data by searching corporate records in dumpsters or computer storage. Shoulder surfing—looking over a person's shoulder in a public place to see PIN or passwords. Skimming—manually swiping a credit card through a handheld card reader and storing the data for future use. Eavesdropping—observation of private communications by wiretapping or other surveillance techniques. E-mail forgery—removing message headers, using such anonymous e-mail for criminal activity.
9-3 .
Ch. 9: Computer Fraud and Abuse Techniques
SUGGESTED ANSWERS TO THE PROBLEMS 9.1
A few years ago, news began circulating about a computer virus named Michelangelo that was set to “ignite” on March 6, the birthday of the famous Italian artist. The virus attached itself to the computer’s operating system boot sector. On the magical date, the virus would release itself, destroying all of the computer’s data. When March 6 arrived, the virus did minimal damage. Preventive techniques limited the damage to isolated personal and business computers. Though the excitement surrounding the virus was largely illusory, Michelangelo helped the computer-using public realize its systems’ vulnerability to outside attack. a.
b.
c.
What is a computer virus? Cite at least three reasons why no system is completely safe from a computer virus. A computer virus is a segment of executable code that attaches itself to an application program or some other executable component. When the hidden program is triggered, it makes unauthorized alterations in the way a system operates. There are a number of reasons why no one is completely safe from a virus:
Viruses are contagious and are easily spread from one system to another. A virus spreads when users share programs or data files, download data from the Internet, or when they access and use programs from external sources such as suppliers of free software.
Viruses can spread very quickly. In a network environment, a virus can spread to thousands of systems in a relatively short period. When the virus is confined to a single machine or to a small network, it will soon run out of computers to infect.
Many viruses lie dormant for extended periods without doing any specific damage except propagating itself. The hidden program leaves no external signs of infection while it is reproducing itself.
Many computer viruses have long lives because they can create copies of themselves faster than the virus can be destroyed.
Why do viruses represent a serious threat to information systems? What damage can a virus do to a computer system? Viruses are a significant threat to information systems because they make unauthorized alterations to the way a system operates and cause widespread damage by destroying or altering data or programs. If adequate backup is not maintained, viral damage may also mean permanent loss of important or unique information, or timeconsuming reentry of the lost information. A virus can cause significant damage when it takes control of the computer, destroys the hard disk’s file allocation table, and makes it impossible to boot (start) the system or to access data on a hard drive. They can also intercept and change transmissions, print disruptive images or messages on the screen, or cause the screen image to disappear. As the virus spreads, it takes up space, clogs communications, and hinders system performance. How does a virus resemble a Trojan horse? A virus is like a Trojan horse in that it can lie dormant for extended periods, undetected until triggered by an event or condition. 9-4 .
Accounting Information Systems 15e, GE
d.
What steps can be taken to prevent the spread of a computer virus? Focus 9-1 lists the following steps individuals can take to keep their computers virus free:
Install reputable and reliable antivirus software that scans for, identifies, and destroys viruses. Only use one antivirus program, as multiple programs conflict with each other.
Do not fall for ads touting free anti-virus software, as much of it is fake and contains malware. Some hackers create websites stuffed with content about breaking news so that the site appears on the first page of search results. Anyone clicking on the link is confronted with a pop-up with a link to fake anti-virus software.
Do not fall for pop-up notices that warn of horrible threats and offer a free scan of your computer. Although no scan actually takes place, the program reports dozens of dangerous infections and tells you to purchase and download their fake antivirus program to clean it up.
Make sure that the latest versions of the antivirus programs are used. National City Bank in Cleveland, Ohio, installed some new laptops. The manufacturer and the bank checked the laptops for viruses but did not use the latest antivirus software. A virus spread from the laptop hard drives to 300 network servers and 12,000 workstations. It took the bank over two days to eradicate the virus from all bank systems. Scan all incoming e-mail for viruses at the server level as well as when it hits users’ desktops.
Do not download anything from an email that uses noticeably bad English, such as terrible grammar and misspelled words. Real companies hire people to produce quality writing. Many viruses come from overseas. English is obviously not their first language.
All software should be certified as virus-free before loading it into the system. Be wary of software from unknown sources, as they may be virus bait—especially if their prices or functionality sound too good to be true.
Deal with trusted software retailers. Some software suppliers use electronic techniques to make tampering evident. Ask if the software you are purchasing has such protection. Check new software on an isolated machine with virus detection software. Software direct from the publisher has been known to have viruses. Have two backups of all files. Data files should be backed up separately from programs to avoid contaminating backup data. If you use flash drives, diskettes, or CDs, do not put them in strange machines as they may become infected. Do not let others use those storage devices on your machine. Scan all new files with antiviral software before any data or programs are copied to your machine.
9-5 .
Ch. 9: Computer Fraud and Abuse Techniques
9.2
The controller of a small business received the following e-mail with an authenticlooking e-mail address and logo: From: To: Subject:
Big Bank [antifraud@bigbank.com] Justin Lewis, Controller, Small Business USA Official Notice for all users of Big Bank!
Due to the increased incidence of fraud and identity theft, we are asking all bank customers to verify their account information on the following Web page: www.antifraudbigbank.com Please confirm your account information as soon as possible. Failure to confirm your account information will require us to suspend your account until confirmation is made. A week later, the following e-mail was delivered to the controller: From: To: Subject:
Big Bank [antifraud@bigbank.com] Justin Lewis, Controller, Small Business USA Official Notice for all users of Big Bank!
Dear Client of Big Bank, Technical services at Big Bank is currently updating our software. Therefore, we kindly ask that you access the website shown below to confirm your data. Otherwise, your access to the system may be blocked. web.da-us.bigbank.com/signin/scripts/login2/user_setup.jsp We are grateful for your cooperation. a.
What should Justin do about these e-mails? This is an attempt to acquire confidential information so that it can be used for illicit purposes such as identity theft. Since the email looks authentic and appears authoritative, unsuspecting and naïve employees are likely to follow the emails instructions. Justin should: Notify all employees and management that the email is fraudulent and that no information should be entered on the indicated website. Delete the email without responding to its sender. Launch an education program for all employees and management about computer fraud practices that could target their business. Notify Big Bank regarding the email.
9-6 .
Accounting Information Systems 15e, GE
b.
c.
What should Big Bank do about these e-mails?
Immediately alert all customers about the email and ask them to forward any suspicious email to the bank security team. But this needs to be done via the bank’s web site, not by an email message. Banks need to consistently never use email in ways similar to this type of attack.
Establish a quick and convenient method that encourages customers and employees to notify Big Bank of suspicious emails.
The warnings received by customers and employees should be investigated and remedial actions should be taken.
Notify and cooperate with law enforcement agencies so the perpetrator can be apprehended.
Notify the ISP from which the email originated, demanding that the perpetrator’s account be discontinued.
Identify the computer fraud and abuse technique illustrated. This computer fraud and abuse technique is called phishing. Its purpose is to get the information need to commit identity theft.
9.3
A customer of a bank received the following email: Dear Valued Customer! As part of our continuing commitment to protect your account and to reduce instance of fraud on our website, we are performing a periodic review of the accounts of our customers. You are requested to visit our website by following the link given below. You will be guided to provide information about your account and yourself. All your information is safe with us as this is a protected account. You will be redirected to the bank’s home page after verification. This procedure is essential for us to continue to provide you a safe and risk-free environment to send and receive money. It would also help us maintain the quality of our online banking systems. Thank you. What is the name of this computer fraud? What are its characteristics? Since people seldom use e-mail to commit this fraud nowadays, what is the current trend? Suggest three ways to protect yourself from this sort of fraud. Banks actually offer a service like this. For example, Citi Bank offers a program called Virtual Account Numbers.
9-7 .
Ch. 9: Computer Fraud and Abuse Techniques
Students will likely present many different solutions to this problem. Table 6-1 in the text provides a comprehensive list of computer fraud and abuse techniques that the students may draw upon. Potential solutions should at least include:
identity theft
packet sniffing
Spyware
eavesdropping to capture the card number.
Using RAN can limit the amount of money stolen. If the card or card number is stolen, it can only be used for the specific vendor and time for which it is issued. In addition, it can only be used for one purchase or only a set number of purchases identified when the card number was issued. At any rate, restricting the card to only a specific merchant and for a specific time and number of transactions severely restricts the thief's ability to steal. Using RAN can help prevent identity fraud. Since the card is only linked to the actual customer at the bank, the identity of the customer is shielded to anyone who steals the card or the card number. The thief would need to hack into the bank’s system to find the identity of the RAN cardholder since it would not be printed on the card itself. Also, RAN can frustrate those who capture card numbers through packet sniffing, spyware, and eavesdropping. These techniques may capture the card number, but once the thieves have it, their ability to exploit the card for monetary gain is severely restricted. IMPORTANT: Even though banks offer these types of services, this email may be a clever Phishing expedition and a recipient should not respond to the email or click on the indicated link. This prevents the recipient from being the victim of an attack or malicious malware. If a person was interested in the service, he should contact his bank and ask about it. Alternatively, he could research the service and call those who offer it.
9-8 .
Accounting Information Systems 15e, GE
9.4
Match the internet related computer fraud and abuse technique in the left column with the scenario in the right column. Terms may be used once, more than once, or not at all.
1. adware 2. botnet 3. bot herder 4. click fraud 5. dos
6. e-mail threats 7. hijacking 8. internet misinformation 9. key logger 10. pharming 11. phishing
12. spamming 13. spyware 14. spoofing 15. typosquatting
i. Software that collects consumer surfing and purchasing data. o. A network of hijacked computers. r. Hackers that control hijacked computers. u. Inflating advertising revenue by clicking online ads numerous times. t. Overloading an Internet service provider’s e-mail server by sending hundreds of e-mail messages per second from randomly generated false addresses. c. Sending an e-mail instructing the recipient to do something or they will suffer adverse consequences. l. Gaining control of a computer to carry out unauthorized illicit activities. s. Circulating lies or misleading information using the world’s largest network. q. Use of spyware to record a user’s keystrokes. n. Diverting traffic from a legitimate Web site to a hacker’s Web site to gain access to personal and confidential information. j. E-mails that look like they came from a legitimate source but are actually from a hacker who is trying to get the user to divulge personal information. e. E-mailing an unsolicited message to many people at the same time. a. Software that monitors and reports a user’s computing habits. k. Making an e-mail look like it came from someone else. f. Creating Web sites with names similar to real Web sites so users making errors while entering a Web site name are sent to a hacker’s site.
9-9 .
Ch. 9: Computer Fraud and Abuse Techniques
9.5
Match the computer fraud and abuse technique in the left column with the definition in the right column. The definition on the right may be used once, more than once, or not at all.
1. ___ packet sniffing 2. ___ round-down fraud 3. ___ bluebugging 4. ___ scavenging 5. ___ chipping 6. ___ eavesdropping 7. ___ salami technique 8. ____ evil twin 9. ____ war dialing
10. ___ vishing 11. ___ phreaking 12. ___ piggybacking 13. ___ war driving 14. ___ bluesnarfing 15. ___ identity theft
a. Intercepting Internet and other network transmissions e. Placing truncated decimal places in an account controlled by the perpetrator i. Making phone calls and sending text messages using another user’s phone without physically holding that phone o. Searching through garbage for confidential data u. Inserting a chip that captures financial data in a legitimate credit card reader s. Intercepting and/or listening in on private voice and data transmissions l. Embezzling small fractions of funds over time p. A rogue wireless access point masquerading as a legitimate access point h. Searching for modems on unprotected phone lines in order to access the attached computer and gain access to the network(s) to which it is attached b. E-mails instructing a user to call a phone number where they are asked to divulge personal information t. Using telephone lines to transmit viruses and to access, steal, and destroy data n. Gaining access to a protected system by latching onto a legitimate user g. Searching for unprotected wireless networks in a vehicle k. Capturing data from devices that use Bluetooth technology d. Illegally obtaining confidential information, such as Social Security number, about another person so that it can be used for financial gain c. Deep packet filtering f. Copying company data, such as computer files, without permission j. Concealing data within a large MP3 file m. Covertly swiping a credit card in a card reader that records the data for later use q. Devices that hide IP addresses r. Use of spyware to record a user’s keystrokes v. Altering data before or during entry into a computer system w. Decoding and organizing captured network data
21
9-10 .
Accounting Information Systems 15e, GE
9.6
Match the data security computer fraud and abuse technique in the left column with the scenario in the right column. Terms may be used once, more than once, or not at all.
1. dictionary attack 2. hacking 3. logic bomb 4. malware 5. masquerading 6. password cracking 7. piggybacking 8. posing 9. pretexting 10. rootkit 11. shoulder surfing 12. skimming 13. social engineering 14. software piracy 15. steganography 16. trap door 17. trojan horse 18. virus 19. worm 20. zero-day attack
a. Guessing user IDs and passwords using a dictionary of user IDs and passwords w. Gaining access to a computer system without permission. s. Software that sits idle until a specified circumstance or time triggers it. l. Software used to do harm. n. Pretending to be a legitimate user, thereby gaining access to a system and all the rights and privileges of the legitimate user. c. Recovering passwords by trying every possible combination of characters and comparing them to a cryptographic hash of the password e. Using a wireless network without permission. x. Creating a seemingly legitimate business, collecting personal information while making a sale, and never delivering the item sold. u. Acting under false pretenses to gain confidential information. q. Software that conceals processes, files, network connections, and system data from the operating system and other programs. v. Observing or listening to users as they divulge personal information. f. Covertly swiping a credit card in a card reader that records the data for later use. r. Methods used to trick someone into divulging personal information. p. Unauthorized copying or distribution of copyrighted software. g. Concealing data within a large MP3 file. i. Entering a system using a back door that bypasses normal system controls. k. Unauthorized code in an authorized and properly functioning program. b. Segment of executable code that attaches itself to software. m. Program that can replicate itself and travel over networks. h. Attack between the time a software vulnerability is discovered and a patch to fix the problem is released.
9-11 .
Ch. 9: Computer Fraud and Abuse Techniques
9.7
Match the data security computer fraud and abuse technique in the left column with the scenario in the right column. Terms may be used once, more than once, or not at all.
1 buffer overflow attack 2 carding 3 caller ID spoofing 4 cyber extortion 5 cyber bullying 6 economic espionage 7 e-mail spoofing 8 IP address spoofing 9 Internet auction fraud 10 Internet pumpand-dump fraud 11 Lebanese looping
12 man-in-themiddle attack 13 podslurping 14 ransomware 15 scareware 16 sexting 17 SQL injection 18 SMS spoofing 19 XSS attack
j. So much input data that storage is exceeded; excess input contains code that takes control of the computer. x. Verifying credit card validity. r. Displaying an incorrect phone number to hide the caller’s identity. u. Demand for payment to ensure a hacker does not harm a computer. q. Using social networking to harass another person v. Theft of trade secrets and intellectual property. k. Making an electronic communication appear as though it originated from a different source. l. Creating packets with a forged address to impersonate another computing system. w. Using a site that sells to the highest bidder to defraud another person g. Using the Internet to inflate a stock price so it can be sold for a profit. a. Inserting a sleeve to trap a card in an ATM, pretending to help the owner to obtain a PIN, and using the card and PIN to drain the account. t. A hacker placing himself between a client and a host to intercept network traffic. c. Using a small storage device to download unauthorized data from a computer. s. Software that encrypts programs and data until a payment is made to remove it. e. Malicious software that people are frightened into buying. h. Exchanging explicit messages and pictures by telephone. i. Inserting a malicious database query in input in a way that it can be executed by an application program. n. Changing the name or number a text message appears to come from. p. Link containing malicious code that takes a victim to a vulnerable Web site where the browser executes the malicious code embedded in the link.
9-12 .
Accounting Information Systems 15e, GE
9.8
You have learned about many computer fraud and abuse techniques used to harm people and computer systems. This is a self-directed assignment to learn more about some of the techniques discussed in the book and techniques not covered in the text. a. Go online and research four computer fraud or abuse techniques. Two of the techniques already discussed in the text can be researched but look for at least two additional techniques. b. Write a four-page report (one page for each of the four techniques) on your findings. For each technique, the write-up should include items such as the following: 1. An explanation of the technique, what it is used for, how it works, etc. For a technique covered in the text, your write-up must go beyond what is discussed there. Simply repeating what is in the text is not acceptable. 2. Any available estimates illustrating how extensively the technique is used or the losses caused by its use. 3. Examples illustrating how companies or individuals have been victimized by the techniques. 4. What is being done, if anything, to prevent or minimize the impact of the technique.
5. Print media or URL references showing where you got your information. c. If instructed by your professor, come prepared to present your findings to the class. There are many techniques not covered in the chapter that students can find. Some possibilities out of many are: Address Resolution Protocol (ARP) spoofing Data diddling Data leakage DNS spoofing Internet terrorism QR barcode replacements Splogs Superzapping Tabnapping Web cramming
9-13 .
Ch. 9: Computer Fraud and Abuse Techniques
9.9 Identify the computer fraud and abuse technique used in each the following actual examples of computer wrongdoing. Each of these real-world scenarios were taken from news accounts of computer fraud and abuse. There may be other valid answers, but the answers shown below are what the news accounts and experts investigating the case said were used to perpetrate the fraud. a. A teenage gang known as the “414s” broke into the Los Alamos National Laboratory, Sloan-Kettering Cancer Center, and Security Pacific Bank. One gang member appeared in Newsweek with the caption “Beware: Hackers at play.” b. Daniel Baas was the systems administrator for a company that did business with Acxiom, who manages customer information for companies. Baas exceeded his authorized access and downloaded a file with 300 encrypted passwords, decrypted the password file, and downloaded Acxiom customer files containing personal information. The intrusion cost Acxiom more than $5.8 million. c. Cyber-attacks left high-profile sites such as Amazon.com, eBay, Buy.com, and CNN Interactive staggering under the weight of tens of thousands of bogus messages that tied up the retail sites’ computers and slowed the news site’s operations for hours. d. Susan Gilmour-Latham got a call asking why she was sending the caller multiple adult text messages per day. Her account records proved the calls were not coming from her phone. Neither she nor her mobile company could explain how the messages were sent. After finding no way to block the unsavory messages, she changed her mobile number to avoid further embarrassment by association. e. A federal grand jury in Fort Lauderdale claimed that four executives of a rental-car franchise modified a computer-billing program to add five gallons to the actual gas tank capacity of their vehicles. Over three years, 47,000 customers who returned a car without topping it off ended up paying an extra $2 to $15 for gasoline. f. A mail-order company programmer truncated odd cents in sales-commission accounts and placed them in the last record in the commission file. Accounts were processed alphabetically, and he created a dummy sales-commission account using the name of Zwana. Three years later, the holders of the first and last sales-commission accounts were honored. Zwana was unmasked and his creator fired. g. MicroPatent, an intellectual property firm, was notified that their proprietary information would be broadcast on the Internet if they did not pay a $17 million fee. The hacker was caught by the FBI before any damage was done. 9-14 .
Hacking
Password cracking
Denial of service attack
SMS spoofing
Salami technique
Round-down fraud
Cyber-extortion
Accounting Information Systems 15e, GE
h. When Estonia removed a Russian World War II war memorial, Estonian government and bank networks were knocked offline in a distributed DoS attack by Russian hackers. A counterfeit letter of apology for removing the memorial statue was placed on the Web site of Estonia’s prime minister.
Denial-of-service attack used to perpetrate cyberterrorism. The perpetrator(s) had to hack into the web site to post the fake letter. Phishing
i. eBay customers were notified by e-mail that their accounts had been compromised and were being restricted unless they reregistered using an accompanying hyperlink to a Web page that had eBay’s logo, home page design, and internal links. The form had a place for them to enter their credit card data, ATM PINs, Social Security number, date of birth, and their mother’s maiden name. Unfortunately, eBay hadn’t sent the e-mail. Hacking into the system. j. A teenager hijacked the eBay.de domain name and several Pharming to redirect the months later the domain name for a large New York ISP. Both website traffic hijacked Web sites pointed to a site in Australia. k. Travelers who logged into the Alpharetta, Georgia, airport’s Internet service had personal information stolen and picked up as many as 45 viruses. A hacker had set up a rogue wireless network with the same name as the airport’s wireless access network. l. Criminals in Russia used a vulnerability in Microsoft’s server software to add a few lines of Java code to users’ copies of Internet Explorer. The code recorded the users’ keyboard activities, giving the criminals access to usernames and passwords at many banking Web sites. The attacks caused $420 million in damage. m. America Online subscribers received a message offering free software. Users who opened the attachments unknowingly unleashed a program hidden inside another program that secretly copied the subscriber’s account name and password and forwarded them to the sender. n. Rajendrasinh Makwana, an Indian citizen and IT contractor who worked at Fannie Mae’s Maryland facility, was terminated at 1:00 P.M. on October 24. Before his network access was revoked, he created a program to wipe out all 4,000 of Fannie Mae’s servers on the following January 31. o. A man accessed millions of ChoicePoint files by claiming in writing and on the phone to be someone he was not. p. A 31-year-old programmer unleashed a Visual Basic program by deliberately posting an infected document to an alt.sex Usenet newsgroup using a stolen AOL account. The program evaded security software and infected computers using the Windows operating system and Microsoft Word. On March 26, the Melissa program appeared on thousands of e-mail systems disguised as an important message from a colleague or friend. 9-15 .
Evil twin
Hacking into the system to install the key logger Key logging to capture data Trojan horse
Time/logic bomb
Pretexting Worm/virus. Although it was called the Melissa virus, it was actually a worm
Ch. 9: Computer Fraud and Abuse Techniques
The program sent an infected e-mail to the first 50 e-mail addresses on the users’ Outlook address book. Each infected computer would infect 50 additional computers, which in turn would infect another 50 computers. The program spread rapidly and exponentially, causing considerable damage. Many companies had to disconnect from the Internet or shut down their e-mail gateways because of the vast amount of e-mail the program was generating. The program caused more than $400 million in damages. q. Microsoft filed a lawsuit against two Texas firms that produced software that sent incessant pop-ups resembling system warnings. The messages stated “CRITICAL ERROR MESSAGE! REGISTRY DAMAGED AND CORRUPTED” and instructed users to visit a Web site to download Registry Cleaner XP at a cost of $39.95. r. As many as 114,000 Web sites were tricked into running database commands that installed malicious HTML code redirecting victims to a malicious Web server that tried to install software to remotely control the Web visitors’ computers. s. Zeus records log-in information when the user of the infected computer logs into a list of target Web sites, mostly banks and other financial institutions. The user’s data is sent to a remote server where it is used and sold by cyber-criminals. The new version of Zeus will significantly increase fraud losses, given that 30% of Internet users bank online.
Scareware
SQL injection attack inserted code that redirected victims to malicious Web servers (pharming). A Trojan virus inserted a keystroke logger on computers. These computers created a botnet that captured and sent bank data to hackers who sold it. The program that caused the pop-ups was Hotbar adware.
t. It took Facebook 15 hours to kill a Facebook application that infected millions of PCs with software that displays a constant stream of pop-up ads. The program posted a “Sexiest Video Ever” message on Facebook walls that looked like it came from a friend. Clicking the link led to a Facebook installation screen, where users allowed the software to access their profiles and walls. Once approved, the application told users to download an updated, free version of a popular Windows video player. Instead, it inserted a program that displayed pop-up ads and links. A week later a “Distracting Beach Babes” message did the same thing. u. Robert Thousand, Jr. discovered he lost $400,000 from his Fraudsters used Ameritrade retirement account shortly after he began receiving identity theft tactics a flood of phone calls with a 30-second recording for a sex (such as phishing) to hotline. An FBI investigation revealed that the perpetrator get victim’s obtained his Ameritrade account information, called Ameritrade account Ameritrade to change his phone number, created several VoIP information. accounts, and used automated dialing tools to flood the dentist’s Social engineering phones in case Ameritrade called his real number. The tactics were used to perpetrator requested multiple monetary transfers, but get Ameritrade to 9-16 .
Accounting Information Systems 15e, GE
Ameritrade would not process them until they reached Thousand to verify them. When the transfers did not go through, the attacker called Ameritrade, gave information to verify that he was Thousand, claimed he had been having phone troubles, and told Ameritrade he was not happy that the transfers had not gone through. Ameritrade processed the transfers, and Thousand lost $400,000. v. The Internet Crime Complaint Center reports a “hit man” scam. The scammer claims that he has been ordered to assassinate the victim and an associate has been ordered to kill a family member. The only way to prevent the killings is to send $800 so an Islamic expatriate can leave the United States. w. In an economic stimulus scam, individuals receive a phone call from President Obama telling them to go to a Web site to apply for the funds. To receive the stimulus money, victims have to enter personal identification information, complete an online application, and pay a $28 fee.
9-17 .
process the transfers. A telephone denial of service attack gave the attacker time to drain the victim’s financial accounts. Cyber-extortion. The email threat was sent to extort $800 from the victim and his family. This is vishing (phishing done by voice instead of email).
Ch. 9: Computer Fraud and Abuse Techniques
9.10
In August 2011, the Hong Kong Stock Exchange (HKEx) suspended trading for seven stocks after its news announcement website HKExnews was hit by a distributed denialof-service (DoS) attack. This site was the only online platform used by HKEx to make announcements for the listed companies and for their regulatory filings. There were 1,463 listed companies and 5,712 other types of securities, including warrants and bonds. The affected stock included HSBC, Cathay Pacific, and the Hong Kong exchange itself. These stocks had a combined market value of HK$1.5 trillion. The companies tried to make price-sensitive announcements during the lunchtime trading break but due to the attack, the announcements failed to reach the investors. The trading system was not affected but investors relied on timely financial information posted on the HKExnews website to make investment decisions. After investigations, the law enforcement department arrested a businessman for the attack. He was sentenced to nine months in jail. Later, there were discussions on suspension policies and Internet security measures of the Hong Kong Stock Exchange as such an attack could be easily carried out by anyone with serious consequences.
a.
What is a DoS attack? A computer attack in which the attacker sends so many e-mail bombs or web page requests, often from randomly generated false addresses, that the Internet service provider’s e-mail server or the web server is overloaded and shuts down.
b.
What can HKEx do to reduce the impact of a DoS attack? Answers will vary.
Aftermath: The hackers were a 19-year old California man, Christopher Maxwell, and two juveniles. Based in part on evidence supplied by the hospital, Maxwell pleaded guilty to conspiracy and intentionally causing damage to a protected computer. He was sentenced to 37 months in federal prison and ordered to pay $112,500 in restitution to the hospital.
9-18 .
Accounting Information Systems 15e, GE
9.11 Answer the following multiple-choice questions. (Correct answers are bolded) 1. Your mobile phone was stolen, and you duly reported the theft and blacklisted your phone. Shortly thereafter your father receives an SMS on his smartphone indicating that your phone was switched on and asks him to follow a link to permanently deactivate the phone. He clicks on the link and is taken to a website where a message is displayed, informing him that your phone has now been permanently deactivated. Later in the day, your father tries to access Netflix from his phone, but he receives another text message informing him that he is not a registered Netflix user. The message indicated that he could click on the link in the message in order to register his Netflix account. He realizes that something is wrong and suspects that the link he clicked to deactivate your phone was a sham. Which of the following fraudulent techniques is likely to have been used? a. Spyware b. Spoofing c. Scareware d. SMS spoofing 2. You receive a notification from your bank about an online transaction relating to the purchase of two airline tickets to the Solomon Islands. You immediately call the fraud department of your credit card company, who then ask you to verify the last couple of transactions on your credit card. You notice an unlikely credit card purchase of $2.50 on your credit card statement. Which of the fraudulent techniques is likely to have been used? a. Phishing b. Hijacking c. Salami technique d. Carding 3. A group of hackers from across countries like Italy, Spain, the United Kingdom, Georgia, Belgium, and Poland worked together to infect the networks and systems of several companies with malware using social engineering. They used the malware to access corporate email accounts and monitored communications to locate any reference to or indication of payment requests. The hackers then set up a simultaneous transaction with the targeted company’s website to intercept any possible payments and redirect the money through a complicated network of money-laundering transactions. Which fraudulent technique was used by the hackers to intercept the payments? a. Keylogger b. Man-in-the-middle attack c. Posing d. Phishing 4. In 2016, two Nigerian cybercriminals were traced and positively identified in connection with a cyberattack after having sent rogue emails that asked key employees from companies in the Middle East and Asia, among other regions, to 9-19 .
Ch. 9: Computer Fraud and Abuse Techniques
open a document that contained supposed errors in invoices. Once the document was opened, a malicious software was installed on the user’s computer and was then used to obtain log-in credentials and other confidential information used by the employees while approving financial transactions. Which of the following fraudulent techniques was used by the hackers to obtain this sensitive information? a. Eavesdropping b. Piggybacking c. Keylogger d. Password cracking 5. Your colleague needs to make her last vendor payment for the day, but she is in a hurry. Since the company has decided to opt for online banking, she is about to enter her banking credentials online when she gets distracted by someone else wanting to check some information with her. In the meantime, a malicious website runs a script and changes the content of the payment portal’s home page to a fake login page. Your colleague does not notice anything suspicious and resumes entering her banking credentials, which are then sent to the hacker’s server. Which of the following fraudulent technique was used in this scenario? a. Spoofing b. Tabnapping c. Posing d. Pharming 6. A site offers computer gamers in-game bonuses for clicking on advertisements while playing online games. Since they would like to enjoy the in-game benefits, the gamers happily participate. What type of fraudulent scheme is this? a. Adware b. Data leakage c. Internet misinformation d. Click fraud 7. A multinational company fell victim to a fraud scheme wherein a supposed HR employee sent an email to all medical aid scheme members. The email explained changes to some medical aid regulations in order to meet the government’s regulatory compliance standards. All medical aid members were requested to accept these changes by following a link to the “SharePoint site” of the company where users were to log on using their company credentials. What technique did the hacker use to defraud the company? a. Social engineering b. Pretexting c. Posing d. Phishing 8. Suppose that your neighbor has an unsecured Wi-Fi network and you often use his network connection to access the Internet without his knowledge. By doing so, you are guilty of __________. 9-20 .
Accounting Information Systems 15e, GE
a. b. c. d.
social engineering cyber-extortion piggybacking hijacking
9. How can you ensure that the computer systems in your company are free from viruses? a. Install the software obtained from software publishers directly onto your systems. b. Ensure that you have at least two different anti-virus software packages installed on the systems–one for checking emails and another for regular use. c. Ensure that you have installed the latest version of the anti-virus software installed on your systems. d. Regularly check that your backup files on either flash drives or DVD drives work by re-storing them on another system other than your own. 10. Which of the following statements is true about anti-virus software? a. It cannot detect malware. b. It is reactive and not proactive. c. It works best if there are at least two anti-virus software programs installed on the system. d. It is good at detecting newly released viruses.
9-21 .
Ch. 9: Computer Fraud and Abuse Techniques
SUGGESTED ANSWERS TO THE CASES 9.1
1.
How did Shadowcrew members concealed their identities?
Used aliases when working online Communicated via proxy servers Rented commercial mailboxes under false names
How can average citizens protect their identities while interacting online? 2.
Use discretion in revealing personal information online. Individuals who use chat rooms, for instance, should avoid identifying themselves with their actual names, birthdays, or other identifying information. Do not give out personal information online unless absolutely necessary.
How has the Internet made detecting and identifying identity fraudsters difficult? By using aliases, fraudulent email accounts, and proxy servers, thieves make it difficult to detect and punish deviant behavior.
3.
What are some of the most common electronic means of stealing personal information?
4.
Accessing public and victim-provided data Phishing and spoofing Pharming Posing Spyware and keylogging Skimming and chipping
What is the most common way that fraudsters use personal data? The most common way that fraudsters use personal data is to commit credit card fraud. This may include abuse to existing accounts or the opening of new, fraudulent accounts. Credit card fraud accounts for 26% of identity fraud cases.
5.
What measures can consumers take to protect against the online brokering of their personal data?
Avoid giving out their personal data – online or otherwise – whenever possible. Avoid filling out online surveys or polls that request identifying information. Make sure that websites are secure before submitting any personal information. If store clerks request information like name, phone number, or address when you are making a purchase, question the necessity of providing such information.
9-22 .
Accounting Information Systems 15e, GE
6.
What are the most effective means of detecting identity theft?
Regularly monitoring credit reports Checking account statements thoroughly Review the annual Social Security Personal Earnings and Benefits Estimate Statement
See Focus 9-1 for more information of detecting identity theft 7.
What pieces of personal information are most valuable to identity fraudsters?
Name Address Date of birth Social Security number (SSN) Driver’s license number Mother’s maiden name Account numbers Card expiration dates Internet passwords Personal Identification Numbers (PIN) User IDs for online account access Security numbers from back of credit and debit cards Other identifying information
The rest of the story: One of the results of Operation Firewall was the convictions of Andrew Mantovani, Chad Hatten, and James Ancheta.
Mantovani, a 24-year-old college student and a Shadowcrew co-founder, was sentenced to 32 months in federal prison, a $5,000 fine, and three years of probation. Hatten, a 36-year-old, received 90 months in federal prison, 24 months for “aggravated identity theft” and 66 months or fraud. Hatten must also endure three years of supervised release. James Ancheta, a 21-year-old “bot” creator that seized control of more than 400,000 computers to install revenue-generating adware and sold his bots to other users, was sentenced to 57 months in federal prison for his crimes. Ancheta was ineligible for parole and restricted from touching a computer until three years after his release.
9-23 .
CHAPTER 10 CONTROL AND ACCOUNTING INFORMATION SYSTEMS SUGGESTED ANSWERS TO DISCUSSION QUESTIONS 10.1 Answer the following questions about the audit of Springer’s Lumber & Supply a.
What deficiencies existed in the control environment at Springer’s? The “control environment” refers to the tone or culture of a company and helps determine how risk consciousness employees are. It is the foundation for all other ERM components, providing discipline and structure. It is essentially the same thing as the control environment in the internal control framework. The control environment also refers to management’s attitude toward internal control, and to how that attitude is reflected in the organization’s control policies and procedures. At Springer’s, several deficiencies in the control environment are apparent: 1.
2. 3. 4.
Management authority is concentrated in three family members, so there are few, if any, checks and balances on their behavior. In addition, several other relatives and friends of the family are on the payroll. Since the company has a “near monopoly” on the business in the Bozeman area, few competitive constraints restrain prices, wages, and other business practices. Lines of authority and responsibility are loosely defined, which make it difficult to identify who is responsible for problems or decisions. Management may have engaged in “creative accounting” to make its financial performance look better, which suggests a management philosophy that could encourage unethical behavior among employees.
b. Do you agree with the decision to settle with the Springers rather than to prosecute them for fraud and embezzlement? Why or why not? Whether or not to settle with the Springers is a matter of opinion, with reasonable arguments on both sides of the issue.
The reasons for reaching a settlement are clearly stated: the difficulty of obtaining convictions in court, and the possible adverse effects on the company’s market position. On the other hand, the evidence of fraud here seems strong. If this kind of behavior is not penalized, then the perpetrators may be encouraged to do it again, with future adverse consequences to society.
10-1 .
Ch. 10: Control and Accounting Information Systems
c. Should the company have told Jason and Maria the results of the high-level audit? Why or why not? Whether or not Jason and Maria should have been told the results of the high-level audit is also a matter of opinion. The investigative team is apparently trying to keep its agreement to maintain silence by telling as few people as possible what really happened. On the other hand, Jason and Maria were the ones who first recognized the problems; it seems only right that they be told about the outcome. Many lessons may be drawn from this story. 1. 2. 3. 4. 5. 6.
Auditors should view the condition of an organization’s control environment as an important indicator of potential internal control problems. Fraud is more easily perpetrated and concealed when many perpetrators are involved, and especially when management is involved. Purchasing and payroll are two areas that are particularly vulnerable to fraud. Determining whether fraud has actually occurred is sometimes quite difficult, and proving that it has occurred is even more difficult. Frauds do occur, so auditors must always be alert to the possibility of fraud. Auditors should not accept management’s explanations for questionable transactions at face value but should do additional investigative work to corroborate such explanations.
10.2 Explain why the Foreign Corrupt Practices Act was important to accountants. The act is important to accountants because it incorporates the language of the AICPA pronouncement on internal controls. The Act mandates that corporations should keep records that accurately and fairly reflect their transactions and assets in reasonable detail. The internal control system of these organizations should be able to provide reasonable assurance that: a) transactions are properly authorized and recorded; b) assets are safeguarded and protected from unauthorized access; and c) recorded asset values are periodically compared with actual assets and any differences are corrected. The act requires corporations to maintain good systems of internal accounting control. 10.3 One function of the AIS is to provide adequate controls to ensure the safety of organizational assets, including data. However, many people view control procedures as “red tape.” They also believe that, instead of producing tangible benefits, business controls create resentment and loss of company morale. Discuss this position. Well-designed controls should not be viewed as “red tape” because they can improve both efficiency and effectiveness. The benefits of business controls are evident if one considers the losses that frequently occur due to the absence of controls. Consider a control procedure mandating weekly backup of critical files. Regular performance of this control prevents the need to spend a huge amount of time and money recreating files that are lost when the system crashes, if it is even possible to recreate the files at all. Similarly, control procedures that require workers to design structured 10-2 .
Accounting Information Systems 15e, GE
spreadsheets can help ensure that the spreadsheet decision aids are auditable and that they are documented well enough so that other workers can use them. It is probably impossible to eliminate resentment or loss of morale among all employees, but these factors may be minimized if controls are administered fairly and courteously. Of course, there is a cost-benefit tradeoff in implementing internal controls. If an organization has too many controls, this may justifiably generate resentment and loss of morale among employees. Controls having only marginal economic benefit may be rejected for this reason. Another factor is the obtrusiveness of the controls. When the user sees no clear need or purpose to a control it can appear to be there only to control them and little more than that. When the user does not understand their purpose, controls can often provoke resentment. 10.4 In recent years, Supersmurf’s external auditors have given clean opinions on its financial statements and favorable evaluations of its internal control systems. Discuss whether it is necessary for this corporation to take any further action to comply with the Sarbanes–Oxley Act. The Sarbanes-Oxley Act of 2002 (SOX) applies to publicly held companies and their auditors and was intended to prevent financial statement fraud, make financial reports more transparent, provide protection to investors, strengthen the internal controls at public companies, and punish executives who perpetrate fraud. SOX has had a material impact on the way boards of directors, management, and accountants of publicly held companies operate. It has also had a dramatic impact on CPAs of publicly held companies and the audits of those companies. As a result of SOX, Supersmurf’s management and their audit committee must take a more active role in the financial disclosure process. Some of the more prominent roles include: Audit Committee
Audit committee members must be on the company’s board of directors and be independent of the company. One member of the audit committee must be a financial expert. Audit committees hire, compensate, and oversee any registered public accounting firm that is employed Auditors report to the audit committee and not management Audit committees must pre-approve all audit and non-audit services provided by its auditor
Management
The CEO and CFO at companies with more than $1.2 billion in revenue must prepare a statement certifying their quarterly and annual financial statements and disclosures are fairly presented, were reviewed by management, and are not misleading. 10-3 .
Ch. 10: Control and Accounting Information Systems
Management must prepare an annual internal control report that states o They are responsible for establishing and maintaining an adequate internal control structure o Management assessed the company’s internal controls and attests to their accuracy, including notations of significant defects or material noncompliance found during their internal control tests. o Auditors were told about all material internal control weaknesses and fraud o Significant changes to controls after management’s evaluation were disclosed and corrected Management must base its evaluation on a recognized control framework, developed using a due-process procedure that allows for public comment. The report must contain a statement identifying the framework used to evaluate control effectiveness. The most likely framework is one of the COSO formats and discussed in the chapter. SOX also specifies that a company’s auditor must attest to as well as report on management’s internal control assessment.
10.5 When you go to a movie theater, you buy a prenumbered ticket from the cashier. This ticket is handed to another person at the entrance to the movie. What kinds of irregularities is the theater trying to prevent? What controls is it using to prevent these irregularities? What remaining risks or exposures can you identify? There are two reasons for using tickets. 1.
2.
The theater is trying to prevent cashiers from stealing cash by providing greater control over cash receipts. You cannot get into the theater without a ticket so you never give cash to a cashier without insisting on a ticket. That makes it much harder for a cashier to pocket cash. Prenumbered tickets are also used so cashiers cannot give tickets to their friends. The number of tickets sold at the cashier counter can be reconciled with the number of tickets taken by the usher letting patrons into the theater.
Reconciling the cash in the register to the tickets sold and then reconciling the number of tickets sold to the number collected by the ticket-taker helps prevent the theft of cash and giving tickets away to friends. Despite these controls, the following risks still exist:
The ticket-taker can let friends into the theater without tickets. The ticket-taker may take money from theater patrons, pocketing the cash and letting them enter without a ticket. The cashier and the ticket-taker may collude in selling admittances without issuing tickets and then split the proceeds.
10.6 Some restaurants use customer checks with prenumbered sequence codes. Each food server uses these checks to write up customer orders. Food servers are told not to destroy any customer checks; if a mistake is made, they are to void that check and
10-4 .
Accounting Information Systems 15e, GE
write a new one. All voided checks are to be turned in to the manager daily. How does this policy help the restaurant control cash receipts? The fact that all documents are prenumbered provides a means for accounting for their use and for detecting unrecorded transactions. Thus, a missing check indicates a meal for which a customer did not pay. Since each server has his or her own set of checks, it is easy to identify which server was responsible for that customer. This policy may help to deter theft (e.g., serving friends and not requiring them to pay for the meal, or pocketing the customer’s payment and destroying the check) because a reconciliation of all checks will reveal that one or more are missing. 10.7 Discuss the weaknesses in COSO’s internal control framework that led to the development of the COSO Enterprise Risk Management framework. COSO's internal control framework 1. had too narrow a focus. 2. examined controls without first addressing purposes and risks of business processes 3. existing internal control systems often have controls that protect against items that are no longer risks or are no longer important. 4. focusing on controls first has an inherent bias toward past problems and concerns.
10-5 .
Ch. 10: Control and Accounting Information Systems
SUGGESTED SOLUTIONS TO THE PROBLEMS 10.1 You are an audit supervisor assigned to a new client, Go-Go Corporation, which is listed on the New York Stock Exchange. You visited Go-Go’s corporate headquarters to become acquainted with key personnel and to conduct a preliminary review of the company’s accounting policies, controls, and systems. During this visit, the following events occurred: a. You met with Go-Go’s audit committee, which consists of the corporate controller, treasurer, financial vice president, and budget director. b. You recognized the treasurer as a former aide to Ernie Eggers, who was convicted of fraud several years ago. c. Management explained its plans to change accounting methods for depreciation from the accelerated to the straight-line method. Management implied that if your firm does not concur with this change, Go-Go will employ other auditors. d. You learned that the financial vice president manages a staff of five internal auditors. e. You noted that all management authority seems to reside with three brothers, who serve as chief executive officer, president, and financial vice president. f. You were told that the performance of division and department managers is evaluated on a subjective basis because Go-Go’s management believes that formal performance evaluation procedures are counterproductive. g. You learned that the company has reported increases in earnings per share for each of the past 25 quarters; however, earnings during the current quarter have leveled off and may decline. h. You reviewed the company’s policy and procedures manual, which listed policies for dealing with customers, vendors, and employees. i. Your preliminary assessment is that the accounting systems are well designed and that they employ effective internal control procedures. j. Some employees complained that some managers occasionally contradict the instructions of other managers regarding proper data security procedures. k. After a careful review of the budget for data security enhancement projects, you feel the budget appears to be adequate. l. The enhanced network firewall project appeared to be on a very aggressive implementation schedule. The IT manager mentioned that even if he put all of his personnel on the project for the next five weeks, he still would not complete the project in time. The manager has mentioned this to company management, which seems unwilling to modify the schedule. m. Several new employees have had trouble completing some of their duties, and they do not appear to know who to ask for help. n. Go-Go’s strategy is to achieve consistent growth for its shareholders. However, its policy is not to invest in any project unless its payback period is no more than 48 months and yields an internal rate of return that exceeds its cost of capital by 3%. 10-6 .
Accounting Information Systems 15e, GE
o. You observe that company purchasing agents wear clothing and exhibit other paraphernalia from major vendors. The purchasing department manager proudly displays a picture of himself holding a big fish on the deck of a luxury fishing boat that has the logo of a major Go-Go vendor painted on its wheelhouse. The information you have obtained suggests potential problems relating to Go-Go’s control environment. Identify the problems, and explain them in relation to the control environment concepts discussed in this chapter The underlined items correspond to one of the 7 elements of the control environment covered in the text. a.
You met with Go-Go’s audit committee, which consists of the corporate controller, treasurer, financial vice president, and budget director. PROBLEM: Section 301 of the Sarbanes-Oxley Act of 2002 (SOX) applies to publicly held companies and their auditors. It requires audit committee members to be on the company’s board of directors and to be independent of the company. That is not the case at Go-Go Corporation. SOLUTION: All members of the audit committee should be members of the Board of Directors. They must also be independent of the company – meaning none of the audit committee can be employees. The audit committee is responsible for overseeing the corporation’s internal control structure, its financial reporting process, and its compliance with related laws, regulations, and standards. The committee works closely with the corporation’s external and internal auditors. SOX requires audit committees to be responsible for hiring, compensating, and overseeing the auditors and for auditors to report all critical accounting policies and practices to the audit committee.
b.
You recognized the treasurer as a former aide to Ernie Eggers, who was convicted of fraud several years ago. PROBLEM: Because the position of corporate treasurer involves managing cash and other financial assets, it is critical that the position be filled with someone of unquestioned commitment to integrity and ethical values. This question presents somewhat of a dilemma. Here are the two sides of that dilemma. On the one hand, just because the treasurer worked for someone that turned out to be dishonest does NOT mean the treasurer is dishonest as well. Everyone should be judged on his or her own merits, not those of someone else. Therefore, you need to be careful not to assume automatically that the treasurer is dishonest. On the other hand, the fact that the treasurer has been an aide to someone convicted of fraud should raise questions in your mind. You should approach all audits with the requisite skeptical attitude. That skeptical attitude should be heightened due to his past associations. 10-7 .
Ch. 10: Control and Accounting Information Systems
SOLUTION: Though you may not have specific information linking the corporate treasurer to the prior fraud, this information should indicate a need to examine carefully the corporation’s human resource standards and personnel policies and practices with respect to hiring. c.
Management explained its plans to change accounting methods for depreciation from the accelerated to the straight-line method. Management implied that if your firm does not concur with this change, Go-Go will employ other auditors. PROBLEM: Why would a company want to move from an accelerated depreciation method to one with a lower depreciation write-off? One reason is that it reduces depreciation expense, thereby increasing net income and, potentially, the company’s stock price. Alternatively, they may be looking for a way to mask, or hide, other company problems that will affect net income. SOLUTION: The company should have a logical and defensible reason for changing accounting methods, other than just to increase net income and the stock price. The company may be willing to go to great lengths to “get their own way” with respect to an important financial reporting matter. The commitment to ethics issue involves questionable practices, desire to make the numbers, etc. If management does not have a good reason for the desired change, company management’s commitment to integrity and ethical values should be carefully evaluated. It is also possible that there is a problem with management’s philosophy and operating style. Management’s philosophy and operating style relates to risk-taking propensity and problems with philosophy and operating style are similar to carelessness or recklessness. It is important to note that management can be careless, yet ethical; they can also be careful, yet unethical.
d.
You learned that the financial vice president manages a staff of five internal auditors. PROBLEM: The internal audit function is not organizationally independent of the accounting and finance functions. SOLUTION: Organization structure and board of director requirements dictates that internal audit should report directly to the audit committee of the board of directors rather than the financial vice president.
e.
You noted that all management authority seems to reside with three brothers, who serve as chief executive officer, president, and financial vice president. PROBLEM: The dominance of an organization’s management by one or a few individuals is an aspect of management’s philosophy and operating style that might indicate a problem with the control environment, in that there may be a potential for this small group to override the internal control system. Just because a family is run by family members does not indicate there is a problem such as fraud – but it does make it easier to commit and that should be take into consideration. 10-8 .
Accounting Information Systems 15e, GE
SOLUTION: It is important to evaluate carefully this situation to determine if it indeed presents an internal control weakness. f.
You were told that the performance of division and department managers is evaluated on a subjective basis, because Go-Go’s management believes that formal performance evaluation procedures are counterproductive. PROBLEM: This indicates a possible problem with management’s human resource standards and their methods of monitoring performance. Subjective evaluation methods are often not be as effective in detecting problems or in identifying good performance as objective measures, such as formal performance evaluation procedures, that have been communicated to employees. SOLUTION: It is important to evaluate carefully this situation to determine if it indeed presents an internal control weakness.
g.
You learned that the company has reported increases in earnings per share for each of the past 25 quarters; however, earnings during the current quarter have leveled off and may decline. PROBLEM: Management’s philosophy and operating style, as well as their commitment to integrity and ethical values, can be tested when a company faces declining earnings. When earnings per share decrease or when they do not meet expectations, company stock can take a dive, sometimes a significant one. As a result, a company may try and avoid earnings decreases when possible. The problem comes when management uses questionable or even illegal means to prop up their earnings. SOLUTION: Because many frauds have been perpetrated to prop up earnings, this significant fraud “red flag” must be investigated.
h.
You reviewed the company’s policy and procedures manual, which listed policies for dealing with customers, vendors, and employees. PROBLEM: One of the methods of assigning authority and responsibility is a written and comprehensive policies and procedures manual. Go-Go has a written policy and procedures manual, but it is incomplete. It is limited to only three areas: policies for dealing with customers, vendors, and employees. SOLUTION: A policies and procedures manual should contain much more than what is indicated. The manual should explain proper business practices, describe the knowledge and experience needed by key personnel, and list the resources provided to carry out specific duties. It should spell out management policy with respect to handling specific transactions and documents and the systems and procedures employed to process those transactions. It includes the organization’s chart of accounts and sample copies of forms and documents. The manual should be a helpful on-the-job reference for employees and a useful tool in training new employees. 10-9 .
Ch. 10: Control and Accounting Information Systems
i.
Your preliminary assessment is that the accounting systems are well designed and that they employ effective internal control procedures. PROBLEM: Even though you believe that the accounting systems are well designed, and that they employ effective internal control procedures, you cannot rely on that belief. The most effective internal control systems and procedures can be negated by a weak internal control environment, such as top management overriding the internal controls. In other words, there is no evidence that the controls are effective or that employees use and follow them. SOLUTION: You cannot rely on the internal control procedures being effective until you test the controls.
j.
Some employees complained that some managers occasionally contradict the instructions of other managers regarding proper data security procedures. PROBLEM: It does not appear that there is a clear line of authority and responsibility for data security policies and procedures. SOLUTION: Achieving adequate security and control over an organization’s data should be a top management priority. A company’s organizational structure defines its lines of authority, responsibility, and reporting and provides the overall framework for controlling and monitoring its operations. Management should assign authority and responsibility for business objectives, such as data security, to specific departments and individuals and then hold them accountable for achieving those objectives. Authority and responsibility are assigned through formal job descriptions; employee training; and operating plans, schedules, and budgets. A written policy and procedures manual can be an important tool for assigning authority and responsibility.
k.
After a careful review of the budget for data security enhancement projects, you feel the budget appears to be adequate. PROBLEM: This item does not appear to be a problem. Your careful review indicates that the company appears to be allocating sufficient budget dollars to fund the data security enhancement projects.
l.
The enhanced network firewall project appeared to be on a very aggressive implementation schedule. The IT manager mentioned that even if he put all of his personnel on the project for the next five weeks, he still would not complete the project in time. The manager has mentioned this to company management, which seems unwilling to modify the schedule. PROBLEM: The firewall implementation schedule is not feasible. SOLUTION: Management’s philosophy and operating style should be carefully evaluated. Is management taking undue business risks to achieve its objectives? Is management pressuring employees to achieve the desired results regardless of the methods used to achieve them?
10-10 .
Accounting Information Systems 15e, GE
m.
Several new employees have had trouble completing some of their duties, and they do not appear to know who to ask for help. PROBLEM: Employee training and support appear to be rather weak. Companies that shortchange training are more likely to have more fraud and more security breaches. If the employees do not know who to turn to for help, the company’s organizational structure and methods of assigning authority and responsibility appear to be lacking or unexplained. SOLUTION: Good human resource standards require that training programs familiarize new employees with their responsibilities; expected levels of performance and behavior; and the company’s policies and procedures, history, culture, and operating style. Ongoing training is needed to help employees tackle new challenges, stay ahead of the competition, adapt to changing technologies, and deal effectively with the evolving environment.
n.
Go-Go’s strategy is to achieve consistent growth for its shareholders. It also has a policy not to invest in any project unless its payback period is no more than 48 months and yields an internal rate of return that exceeds its cost of capital by 3%. PROBLEM: Go-Go’s risk appetite, although aggressive, appears to be grounded in solid capital budgeting principles. This item, therefore, does not appear to be a problem
o.
You observe that company purchasing agents wear clothing and exhibit other paraphernalia from major vendors. The purchasing department manager proudly displays a picture of himself holding a big fish on the deck of a luxury fishing boat that has the logo of a major Go-Go vendor painted on its wheelhouse. PROBLEM: Gifts from vendors can unduly influence purchasing agents to buy more goods from the gifting vendors. Purchasing decision should be free of this sort of bias. SOLUTION: Part of management’s philosophy and operating style should be the creation of an organizational culture that stresses integrity and commitment to ethical values and competence. In doing so, management should develop clearly stated human resource standards and policies that explicitly describe honest and dishonest behaviors, often in the form of a written code of conduct (methods of assigning authority and responsibility), and communicate them to employees. These policies should especially cover issues that are uncertain or unclear, such as conflicts of interest and the acceptance of gifts. For example, most purchasing agents would agree that accepting a $5,000 bribe from a supplier is dishonest, but a weekend fishing trip or clothing is not as clear-cut. The observations in the purchasing department indicated that there could be a problem with favoring certain vendors. 10-11 .
Ch. 10: Control and Accounting Information Systems
10.2 Explain how independent performance evaluation procedures are either violated or effectively applied in each of the following situations. Identify the problem and suggest the check required (or applied) to prevent the identified problem from occurring. a.
The manager who oversees the corporate fleet vehicles signed off on the purchase of 15 luxury SUVs to expand the company’s fleet of cars. As soon as this was done, he instructed that the payment be made. PROBLEM: There was no review of the transaction by a second person. SOLUTION: A second person should review the transaction and ensure that proper authorization was obtained. The supporting documentation should also be carefully reviewed and the accuracy of all the prices and quantities must be verified.
b.
At a newly opened local restaurant, waiters work six-hour shifts. There are three six-hour shifts per day, with each shift overlapping the next. The restaurant currently has two cash registers and these can be operated by any one of the waiters during a shift without them requiring any form of identification. The new manager has decided that the cash in the cash register box will be checked once every 24 hours, i.e., in the mornings before the new shift for the day begins. PROBLEM: It would be nearly impossible to compare actual sales made to the recorded sales. In the case of a discrepancy, it will not be possible to determine where or how the discrepancy occurred. SOLUTION: The manager should either assign a dedicated cashier/waiter to the cash register or introduce some form of biometric identification to track the waiter using the cash register at any given time. Actual sales should also be compared with the recorded sales for each waiter at the end of their shift (that is, by., matching the cash in the cash register box with the cash totals on the cash register tape).
c.
A company’s financial clerk does a spot check of the account books and finds that there is a discrepancy between the balances of the checking account and the bank statement. PROBLEM: Reconciliations of independently maintained records have not been done. SOLUTION: Bank reconciliations should be done to ensure that the balance of the checking account and the balance as per the bank statement agree.
d.
In July of the previous year, the inventory clerk suspects that the warehouse inventory level is not being reflected accurately. When the year-end inventory was reviewed at the end of February of this year, his suspicions were confirmed. PROBLEM: Actual quantities were not compared with recorded quantities. 10-12 .
Accounting Information Systems 15e, GE
SOLUTION: Inventory should be counted periodically (physically) and the counted values should be matched with the perpetual inventory records. e.
There was a spike in credit sales that was not picked up by the credit sales controller. When he was confronted by his line manager about it, he blamed the accounts receivable department for not identifying the issue earlier. The accounts receivable department denies that there was a spike in credit sales as their records do not indicate PROBLEM: It is possible that analytical reviews were not done to examine relationships the between credit sales and accounts receivable departments. There might also have been incorrect entries made in either of the two departments. SOLUTION: In this case, the relationship between the datasets of credit sales and accounts receivable should be examined on a regular basis to ensure that an increase in credit sales will also reflect as an increase in accounts receivable.
f.
A new employee at a company identifies a discrepancy between the total debits and total credits after payroll entries were finalized. PROBLEM: Debits should equal credits. SOLUTION: The use of double-entry bookkeeping for accounting purposes makes it possible to promptly identify discrepancies between the debits and credits for a given process.
g.
A client calls up a store to check the availability of a specific product at the store. The client is informed by the sales manager that he has checked their inventory system and the stock is available for the specific product. The customer visits the store, only to find that the product is no longer in stock. Upon querying the cashier, the client is again informed that the inventory system shows a relatively large quantity of the PROBLEM: Here two possible problems could exist—the relationship between sales and inventory might not be managed appropriately, and/or actual quantities of inventory were not matched with recorded quantities. SOLUTION: If the issue was that the relationship between sales and inventory might not have been maintained, one should ensure that every sale should reduce inventory by the correct quantity. The issue of the actual inventory not matching the recorded inventory could be addressed by having regular physical stock counts and matching these with the recorded quantities.
h.
Over a period of five years, one of the managers in a company realizes that the company does not seem to be performing as well as it forecasts and budgets for. However, he optimistically goes on believing that things will turn for the better. PROBLEM: The management did not properly review the company performance. 10-13 .
Ch. 10: Control and Accounting Information Systems
SOLUTION: Top-level reviews are needed – as part of these reviews, there should be periodic comparisons between actual performance and planned performance (as in budgets, forecasts, and targets). i.
In order to speed up the processing of sales transactions, one person was made responsible both for the sales journal as well as the accounts receivable master file. PROBLEM: Reconciliation of independently maintained records was ignored. SOLUTION: The sales journal and the accounts receivable master file should be handled by two different staff members. There should then be a reconciliation of the control account to the master file.
j.
The supervisor at a local hypermarket verifies the accuracy of the cash in the cash register box assigned to a retail clerk. Every so often an internal auditor verifies if the supervisor actually performed this check. PROBLEM: Independent review – in this case it was done. SOLUTION: The accuracy of cash register boxes should be periodically checked – first by the supervisor and then by the internal auditor; thus, in some cases, two separate individuals would be cross-checking a third individual’s work.
k.
The payroll clerk realizes that the time sheets and absence records of a specific department in the organization were not in line with company policy. The supervisor of this specific department has been on sick leave for the last three months. PROBLEM: The department had no supervisor who could do independent checks of the supporting documents (in this case, time sheets and absence records). SOLUTION: There is a need to appoint a staff member who can review these documents before the documents are signed off for processing.
10.3
Match the terms with their definitions
1. _I__ inherent risk 2. _N__ general authorization 3. _F_ control environment 4. _O_ corrective controls 5. _R__ risk appetite 6. _M__ application
a. Outside party hired to manage systems development effort b. Probability that a threat will come to pass c. Risk that remains after management implements internal controls or some other response to risk. d. Cooperation between two or more people to thwart internal controls e. Special approval needed to handle a transaction f. Company culture that is the foundation for all other internal 10-14 .
Accounting Information Systems 15e, GE
controls 7. _A__ systems integrator 8. _T___ utilization 9. _S___ security management 10. _Y__ strategic master plan 11. _E__ specific authorization 12. _D__ collusion 13. _K__. throughput 14. _P__ systems administrator 15. _C__ residual risk 16. _H__ data control 17. _B__ likelihood 18. _U___ analytical review 19. _V__ exposure 20. _Z__ systems analysts 21. _J__ audit trail 22. _W__ audit committee 23. _L__ digital signature
control components g. Person who ensures an organization’s networks operate properly h. Ensures source data is approved, monitors workflow, and handles input errors i. Susceptibility of accounts or transactions to control problems in absence of internal control j. Path used to trace a transaction from origin to output or from output to origin k Amount of work performed during a given time period l. Electronically signing a document with data that cannot be forged m. Controls that prevent, detect, and correct transaction errors and fraud in transaction processing programs n. Given to employees to handle routine transactions without special approval o. Controls that identify and correct problems and recover from resulting errors p. Responsible for making sure a system operates smoothly and efficiently q. Document that shows how a project will be completed r. Amount of risk company is willing to accept to achieve its goals and objectives s. Makes sure systems are secure and protected from internal and external threats t. Percentage of time a system is used u. Examining relationships between different sets of data v. Potential dollar loss if a threat become a reality w. Outside, independent directors responsible for financial reporting, regulatory compliance, and internal control x. Controls designed to discover control problems not prevented y. Multiple year plan of projects company must complete to achieve long-range goals z. Help users determine their information needs and design systems to meet those needs
21 22 not used: G, Q, X
10-15 .
Ch. 10: Control and Accounting Information Systems The Garden Nursery, a client of your firm, has come to you with the following problem. It has three clerical employees who must perform the following functions:
10.4
a. Approve vendor selection b. Maintain vendor payment terms c. Maintain accounts payable ledger d. Handle inventory received e. Authorize purchase orders f. Approve receiving reports g. Maintain vendor records h. Authorize cash disbursement Assuming equal abilities among the three employees, the company asks you to assign the eight functions to them to maximize internal control. Assume that these employees will perform no accounting functions other than the ones listed. REQUIRED
a. List four possible unsatisfactory pairings of the functions. The following are authorization functions: Approve vendor selection Authorize purchase orders Approve receiving reports The following are recording functions: Maintain vendor payment terms Maintain accounts payable ledger Maintain vendor records The following are custody functions: Handle inventory received Authorize cash disbursement Any combinations where the functions across groups are not separated (that is, where a function from one list is combined with a function from another list), will be unsatisfactory. When a custody function is paired with a recording function, there is the possibility to 10-16 .
Accounting Information Systems 15e, GE
falsify records in order to hide asset theft. When a recording function is combined with an authorization function, it is possible that records can be changed in order to cover up fraudulent or inaccurate transactions that were not properly authorized. When an authorization function is combined with a custody function, there is the possibility of authorization of inaccurate or fictitious transactions to hide asset theft. b. State how you would distribute the functions among the three employees. Assume that all functions require an equal amount of time to be completed. Clerk 1: Approve vendor selection; authorize purchase orders; approve receiving reports. Clerk 2: Maintain vendor payment terms; maintain accounts payable ledger; maintain vendor records. Clerk 3: Handling inventory received; authorize cash disbursement.
10-17 .
Ch. 10: Control and Accounting Information Systems
10.5 During a recent review, ABC Corporation discovered that it has a serious internal control problem. It is estimated that the impact associated with this problem is $1 million and that the likelihood is currently 5%. Two internal control procedures have been proposed to deal with this problem. Procedure A would cost $25,000 and reduce likelihood to 2%; procedure B would cost $30,000 and reduce likelihood to 1%. If both procedures were implemented, likelihood would be reduced to 0.1%. a.
What is the estimated expected loss associated with ABC Corporation’s internal control problem before any new internal control procedures are implemented? Expected Loss = Risk * Exposure = 0.05 * $1,000,000 = $50,000
b.
Compute the revised estimate of expected loss if procedure A were implemented, if procedure B were implemented, and if both procedures were implemented.
Control Procedure
Risk
Exposure
Revised Expected Loss
Reduction in Expected Loss
Cost of Control(s)
Net Benefit (Cost)
A
0.02
$1,000,000
$20,000
$30,000
$25,000
$ 5,000
B
0.01
$1,000,000
$10,000
$40,000
$30,000
$10,000
Both
0.001
$1,000,000
$ 1,000
$49,000
$55,000
$(6,000)
c. Compare the estimated costs and benefits of procedure A, procedure B, and both procedures combined. If you consider only the estimates of cost and benefit, which procedure(s) should be implemented? Considering only the estimated costs and benefits, procedure B should be implemented because its net benefit is greater than A; it is also greater than both A and B together. Care must be taken with these discussions, however, because the numbers used are estimates. The net benefit figures are only as good as the estimates used to produce them.
10-18 .
Accounting Information Systems 15e, GE
a.
What other factors might be relevant to the decision Another important factor to consider is how critical the $1,000,000 loss would be to ABC Corporation.
b.
If ABC is a multi-billion dollar corporation, then they can afford to evaluate this matter strictly on the basis of estimated costs and benefits.
However, if ABC is a small corporation then a loss of this magnitude could threaten their continued existence, and it may be worthwhile to incur extra costs (as a form of insurance premium) to reduce the risk of loss to the smallest possible level.
Use the Goal Seek function in Microsoft Excel to determine the likelihood of occurrence without the control and the reduction in expected loss if the net benefit/cost is 0. Do this for procedure A, procedure B, and both procedures together
Control Procedure A - Goal Seek-setup.
Control Procedure A - Goal Seek - solved.
10-19 .
Ch. 10: Control and Accounting Information Systems
Control Procedure B - Goal Seek-setup.
Control Procedure B - Goal Seek - solved.
Control Procedure Both - Goal Seek-setup.
10-20 .
Accounting Information Systems 15e, GE
Control Procedure Both - Goal Seek - solved.
10-21 .
Ch. 10: Control and Accounting Information Systems
10.6 The management at MechDesign Industries recognizes that a well-designed internal control system provides many benefits. Among the benefits are reliable financial records that support decision making and a greater probability of detecting errors and preventing fraud. MechDesign Industries’ internal auditing department periodically reviews the company’s accounting records to determine the effectiveness of internal controls. In its latest review, the internal audit staff found the following eight conditions: For each of the eight conditions detected by the company’s internal audit staff: a. Identify a possible cause of the condition. b. Recommend controls and/or actions would correct the condition and prevent it from happening again. a. Possible Cause 1.
Many purchases were personally approved by the purchasing department manager and did not have a corresponding purchase requisition - Since this was done by the purchasing department manager, one would assume that there should not be a lack of understanding of written procedures – this seems to be a failure to comply with written procedures. - It is likely that fraud is being committed by ignoring official approval processes.
2.
The prices of some raw materials purchased from a specific vendor are unusually high and this vendor is not on the preferred vendor list. - the vendor might be a family member / friend of an employee. - the vendor might have promised a kickback when material is bought. There was a sudden increase in backorders for recorded sales orders over the last two months. - it is possible that inventory is being stolen by employees. - it is possible that unauthorized access to physical inventory or inventory records enabled unauthorized changes.
3.
b. Recommendation to Correct/Prevent Condition Ensure that written procedures on approval of documents exist – ensure that the entire staff is aware of these procedures (provide training of this is not the case). Employees overriding the procedures should be held accountable. Unapproved documents should be scrutinized to determine if there are any evidence of theft or fraud. In cases where theft or fraud is detected, the offending employee should be prosecuted. Buyers in the purchasing department should only be allowed to select preferred vendors for raw material purchases. Any changes in preferred vendors should be appropriately authorized (not managed by the buyers).
Count inventory when finished goods are received at the warehouse; in cases where there is a shortage of raw materials, also periodically count raw material inventory and ensure that raw materials leaving for the production floor actually arrive at the production floor. Reconcile all inventory counts – from the warehouse to the storeroom, and also before inventory is shipped, when
10-22 .
Accounting Information Systems 15e, GE
inventory arrives at shipping, and when inventory is actually shipped to customers. Use RFID tags (or possibly bar codes) to track finished inventory and assist with inventory counts. Storeroom and warehouse staff should be held accountable for inventory losses – this can only be done of the inventory counts are reconciled at each step in the process.
4.
5.
6.
7.
8.
Many purchase orders are recorded as being open. However, when the purchase order tracking is done, orders have been received. - employees may be slack in recording received goods and packing slip information. There are many customers returns due to defective products. - typically, an indication of poor product quality. Since cleaning materials are not part of the production stock, and the maintenance supervisor is responsible for the cleaning materials’ requisitioning, he also orders and receives the cleaning materials. - there might be a shortage of staff; but this is a clear problem with segregation of duties. Many employees have access to a range of business processes and activities— including to some of the functions that they do not currently perform. - this might occur because staff were moved around between departments or business units where staff used to have specific roles and responsibilities The payroll director has been working in the company for about six years without taking a single day of leave.
Physical and logical access to inventory records should be restricted to authorized employees. Any inventory adjustments should also be authorized by responsible employees. Record goods received and packing slip information and match packing slip information in a timely manner with actual goods received to ensure that finalized orders are indicated as such.
Production problems should be addressed. Identify the parts / raw material causing products to be defective and review vendor selection for those products. The same person cannot request cleaning materials to be ordered, and then, once the request is approved, order and receive the ordered products. One person should complete the purchase order for the cleaning materials and another should sign off the invoice or the receiving report once the cleaning materials are received. Monitor staff access to business processes and activities – grant and revoke access as and when required. When staff move between departments, processes, or functions, access of previous departments, processes, or functions should be revoked, and new access granted for the new department, process, or function. Enforce the annual vacation policy as this will make it impossible to hide illegal or unethical conduct.
10-23 .
Ch. 10: Control and Accounting Information Systems
When the employee was unexpectedly hospitalized, fictitious employees were identified on the payroll by the director who had temporarily replaced the hospitalized employee. - director did not take vacation leave and could thus manipulate payroll records - director could pocket the pay of the fictitious employees
10-24 .
Accounting Information Systems 15e, GE
10.7 For the following scenarios, describe the recommendations the internal auditors should make to prevent these problems in the future. Scenario 1: After working together at a local school cafeteria for over eight years, two elderly women employees announce their retirement citing reasons of wanting to spend more time with their families. They were loved by the learners at the school and were considered to be considerate, pleasant, caring, and loyal by the other employees at the cafeteria as well as the school authorities. They also always offered to come in early to work and stay back late to cash up. However, soon after their retirement, the authorities discover a sharp increase in their daily cash deposits for the cafeteria. Noting this significant difference, they investigated the matter, and the retired employees’ theft was uncovered.
A mandatory yearly vacation would have made it possible to pick up discrepancies much earlier; however, if the women had gone on vacation on separate occasions, they might still have had the opportunity to hide their theft
The person manning the cash register should be the person managing the float and cashing up at that specific cash register – any discrepancies will then need to be paid in by the employee responsible.
Scenario 2: An employee who works in the production department of a large company manages to get access to the company storehouse. He pockets several materials from the storehouse, only some of which was purchased for his personal use. In the inventory journal, he excludes the quantity purchased for his personal use in recording the parts issued to the production department. Noting differences in the inventory records and the actual quantities available at the storehouse, the company hires an internal auditor to investigate the matter.
This employee had (unauthorized) access to physical inventory and inventory records – thus he was able to remove inventory (a custody function) and update the records (recording function). The custody and recording functions should be separated to ensure segregation of duties. Proper access control should be enforced in terms of storeroom access –only authorized employees should be allowed access. Access to inventory records should be given to authorized employees only but not to employees who have custody functions too.
10-25 .
Ch. 10: Control and Accounting Information Systems
10.8 Tralor Corporation manufactures and sells several different lines of small electric components. Its internal audit department completed an audit of its expenditure processes. Part of the audit involved a review of the internal accounting controls for payables, including the controls over the authorization of transactions, accounting for transactions, and the protection of assets. The auditors noted the following items: 1. Routine purchases are initiated by inventory control notifying the purchasing department of the need to buy goods. The purchasing department fills out a prenumbered purchase order and gets it approved by the purchasing manager. The original of the five-part purchase order goes to the vendor. The other four copies are for purchasing, the user department, receiving for use as a receiving report, and accounts payable. 2. For efficiency and effectiveness, purchases of specialized goods and services are negotiated directly between the user department and the vendor. Company procedures require that the user department and the purchasing department approve invoices for any specialized goods and services before making payment. 3. Accounts payable maintains a list of employees who have purchase order approval authority. The list was updated two years ago and is seldom used by accounts payable clerks. 4. Prenumbered vendor invoices are recorded in an invoice register that indicates the receipt date, whether it is a special order, when a special order is sent to the requesting department for approval, and when it is returned. A review of the register indicated that there were seven open invoices for special purchases, which had been forwarded to operating departments for approval over 30 days previously and had not yet been returned. 5. Prior to making entries in accounting records, the accounts payable clerk checks the mathematical accuracy of the transaction, makes sure that all transactions are properly documented (the purchase order matches the signed receiving report and the vendor’s invoice), and obtains departmental approval for special purchase invoices. 6. All approved invoices are filed alphabetically. Invoices are paid on the 5th and 20th of each month, and all cash discounts are taken regardless of the terms. 7. The treasurer signs the checks and cancels the supporting documents. An original document is required for a payment to be processed. 8. Prenumbered blank checks are kept in a locked safe accessible only to the cash disbursements department. Other documents and records maintained by the accounts payable section are readily accessible to all persons assigned to the section and to others in the accounting function. Review the eight items listed and decide whether they represent an internal control strength or weakness a. For each internal control strength you identified, explain how the procedure helps achieve good authorization, accounting, or asset protection control.
10-26 .
Accounting Information Systems 15e, GE
b.
For each internal control weakness you identified, explain why it is a weakness and recommend a way to correct the weakness Adapted from the CMA Examination
# a. Why it is a strength
b. Why it is a weakness
b. Recommendation to correct weakness
1 User authorization means the right materials and quantities will be ordered.
A purchase order copy should not be used as a receiving report unless the quantities have been blanked out.
The receiving report is prepared after an independent count and identification.
The user/purchaser may not be trained in purchasing techniques and could be overcharged in the transaction.
Both the user and the purchasing agent should be involved in negotiating with the company.
It increases the potential for collusive agreements.
The purchasing department should approve orders before the purchase, not before payment is made.
Failure to properly maintain the list of authorized signatories renders it useless
Update the list as soon as a change in purchase authorization occurs.
The use of pre-numbered purchase orders allows all POs to be accounted for. 2
2
3
Payables clerk should be required to use the list. 4 Numbering and recording process establishes good control over invoices and helps ensure their recording in accounting records.
Failure to follow-up on open invoices indicates an ineffective control due to a lack of follow-up.
A periodic review and followup of all open items.
6
Paying monthly on only the 5th or 20th prevents payment of any invoice due on another date.
Approved, unpaid invoices should be filed by payment due date first, and then alphabetically.
6
Taking unearned cash discounts causes additional paperwork when disputed by
Pay suppliers on or before the discount date.
5 The transaction audit helps minimize errors and helps ensure that only properly authorized transactions are recorded.
10-27 .
Ch. 10: Control and Accounting Information Systems suppliers and creates animosity. This policy may lead to fewer discounts being offered.
Lost discounts should be analyzed for cause and future avoidance.
7 Proper separation of duties exists Requiring original documents and cancelling them after payment reduces duplicate payments. 8 Proper protection of blank checks (locked safe only accessible to cash disbursements department
Unlimited access to cash disbursement documents (other than blank checks) permits unauthorized alteration of payables documents. This could result in a loss of control, a loss of accountability, or a loss of assets - as well as improper or inaccurate accounting or destruction of records.
10-28 .
A policy limiting access to and physical protection of accounts payable documents and records should be established and monitored.
Accounting Information Systems 15e, GE 10.9 Lancaster Company makes electrical parts for contractors and home improvement
retail stores. After their annual audit, Lancaster’s auditors commented on the following items regarding internal controls over equipment: 1. The operations department that needs the equipment normally initiates a purchase requisition for equipment. The operations department supervisor discusses the proposed purchase with the plant manager. If there are sufficient funds in the requesting department’s equipment budget, a purchase requisition is submitted to the purchasing department once the plant manager is satisfied that the request is reasonable. 2. When the purchasing department receives either an inventory or an equipment purchase requisition, the purchasing agent selects an appropriate supplier and sends them a purchase order. 3. When equipment arrives, the user department installs it. The property, plant, and equipment control accounts are supported by schedules organized by year of acquisition. The schedules are used to record depreciation using standard rates, depreciation methods, and salvage values for each type of fixed asset. These rates, methods, and salvage values were set 10 years ago during the company’s initial year of operation. 4. When equipment is retired, the plant manager notifies the accounting department so the appropriate accounting entries can be made. 5. There has been no reconciliation since the company began operations between the accounting records and the equipment on hand. Identify the internal control weaknesses in Lancaster’s system, and recommend ways to correct them. Adapted from the CMA Examination
10-29 .
Ch. 10: Control and Accounting Information Systems
Weakness 1. No authorization form describing the item to be acquired, why it is needed, expected costs, and benefits.
2. Equipment purchases over a certain amount are not reviewed and approved by top management. 3. Purchase requisitions for fixed assets are intermingled with requisitions for inventory, even though they are very different purchases. This results in a lack of control over the much more expensive equipment acquisitions. 4. No mention of pre-numbered purchase requisitions or purchase orders.
Recommendation The purchase requisition should include an item description, why the item is needed, estimated costs and benefits, account code, useful life, depreciation method, and management approval.
Large sums of money can be spent on equipment. Large purchases should be approved by top management Authorized equipment acquisitions should be processed using special procedures and purchase orders. Copies of equipment purchase orders should be distributed to all appropriate departments so they can be monitored. Pre-numbered purchase requisitions and purchase orders should be used so that all documents can be accounted for.
5. Plant engineering is not inspecting machinery and equipment upon receipt.
Machinery and equipment should be subject to normal receiving routines. In addition, plant engineering should inspect the machines to make certain the correct item was delivered and that it was not damaged in transit.
6. Equipment is not tagged and controlled to prevent theft.
All new machinery and equipment should be assigned a control number and tagged at the time of receipt.
7. Plant engineering is not helping with the equipment installations.
Plant engineering should help with the equipment installations to ensure expensive equipment is not damaged.
8. Machinery and equipment accounting policies, including depreciation, have not been updated to make certain that the most desirable methods are being used.
Machinery and equipment accounting procedures, including depreciation, must be updated periodically to reflect actual experience, changes in accounting pronouncements, and income tax legislation.
9. Equipment retirement schedules are not reconciled periodically to general ledger control accounts.
Equipment retirement schedules, which provide information on asset cost and accumulated depreciation, should be reconciled to general ledger control accounts at least yearly. Periodically, a physical inventory of fixed assets should be taken and reconciled to the equipment retirement schedule and the general ledger control account.
10-30 .
Accounting Information Systems 15e, GE
10.10 The Langston Recreational Company (LRC) manufactures ice skates for racing, figure skating, and hockey. The company is in Kearns, Utah, so it can be close to the Olympic Ice Shield, where many Olympic speed skaters train. Given the precision required to make skates, tracking manufacturing costs is very important to management so it can price the skates appropriately. To capture and collect manufacturing costs, the company acquired an automated cost accounting system from a national vendor. The vendor provides support, maintenance, and data and program backup service for LRC’s system. LRC operates one shift, five days a week. All manufacturing data are collected and recorded by Saturday evening so that the prior week’s production data can be processed. One of management’s primary concerns is how the actual manufacturing process costs compare with planned or standard manufacturing process costs. As a result, the cost accounting system produces a report that compares actual costs with standards costs and provides the difference, or variance. Management focuses on significant variances as one means of controlling the manufacturing processes and calculating bonuses. Occasionally, errors occur in processing a week’s production cost data, which requires the entire week’s cost data to be reprocessed at a cost of $34,500. The current risk of error without any control procedures is 8%. LRC’s management is currently considering a set of cost accounting control procedures that is estimated to reduce the risk of the data errors from 8% to 3%. This data validation control procedure is projected to cost $1,000 per week. a. Perform a cost/benefit analysis of the data-validation control procedures.
Cost of Production Data Reprocessing Risk of Data Errors Expected Reprocessing Costs (Cost of Process * Risk)
Without Control Process
With Control Process
$34,500
$34,500
8%
3%
$2,760
$1,035
$1,725
$1,000
-$1,000
Cost of Control Process Net estimated benefit/(loss)
Net Difference Expected
$725
10-31 .
Ch. 10: Control and Accounting Information Systems
b. Based on your analysis, make a recommendation to management regarding the control procedure. Since the process yields an estimated net weekly benefit of $725, LRC should implement the control process. c. The current risk of data errors without any control procedures is estimated to be 8%. The data control validation procedure costs $1,000 and reduces the risk to 3%. At some point between 8% and 3% is a point of indifference—that is, Cost of reprocessing the data without controls = Cost of processing the data with the controls + Cost of controls. Use a spreadsheet application such as Excel Goal Seek to find the solution Solution: 6% Without Control Process Cost of Production Data Reprocessing Risk of Data Errors Expected Reprocessing Costs (Cost of Process * Risk)
With Control Process
Net Difference Expected
$34,500
$34,500
6%
3%
$2,035
$1,035
$1,000
$1,000
-$1,000
Cost of Control Process Net estimated benefit
$0
10-32 .
Accounting Information Systems 15e, GE
Goal Seek Setup:
10-33 .
Ch. 10: Control and Accounting Information Systems
Goal Seek Solved:
10-34 .
Accounting Information Systems 15e, GE
SUGGESTED SOLUTIONS TO THE CASE 10.1 Nino Moscardi, president of Greater Providence Deposit & Trust (GPD&T), received an anonymous note in his mail stating that a bank employee was making bogus loans. Moscardi asked the bank’s internal auditors to investigate the transactions detailed in the note. The investigation led to James Guisti, manager of a North Providence branch office and a trusted 14-year employee who had once worked as one of the bank’s internal auditors. Guisti was charged with embezzling $1.83 million from the bank using 67 phony loans taken out over a three-year period. Court documents revealed that the bogus loans were 90-day notes requiring no collateral and ranging in amount from $10,000 to $63,500. Guisti originated the loans; when each one matured, he would take out a new loan, or rewrite the old one, to pay the principal and interest due. Some loans had been rewritten five or six times. The 67 loans were taken out by Guisti in five names, including his wife’s maiden name, his father’s name, and the names of two friends. These people denied receiving stolen funds or knowing anything about the embezzlement. The fifth name was James Vanesse, who police said did not exist. The Social Security number on Vanesse’s loan application was issued to a female, and the phone number belonged to a North Providence auto dealer. Lucy Fraioli, a customer service representative who cosigned the checks, said Guisti was her supervisor and she thought nothing was wrong with the checks, though she did not know any of the people. Marcia Perfetto, head teller, told police she cashed checks for Guisti made out to four of the five persons. Asked whether she gave the money to Guisti when he gave her checks to cash, she answered, “Not all of the time,” though she could not recall ever having given the money directly to any of the four, whom she did not know. Guisti was authorized to make consumer loans up to a certain dollar limit without loan committee approvals, which is a standard industry practice. Guisti’s original lending limit was $10,000, the amount of his first fraudulent loan. The dollar limit was later increased to $15,000 and then increased again to $25,000. Some of the loans, including the one for $63,500, far exceeded his lending limit. In addition, all loan applications should have been accompanied by the applicant’s credit history report, purchased from an independent credit rating firm. The loan taken out in the fictitious name would not have had a credit report and should have been flagged by a loan review clerk at the bank’s headquarters. News reports raised questions about why the fraud was not detected earlier. State regulators and the bank’s internal auditors failed to detect the fraud. Several reasons were given for the failure to find the fraud earlier. First, in checking for bad loans, bank auditors do not examine all loans and generally focus on loans much larger than the ones in question. Second, Greater Providence had recently dropped its computer services arrangement with a local bank in favor of an out-of-state bank. This changeover may have reduced the effectiveness of the bank’s control procedures. Third, the bank’s loan review clerks were rotated frequently, making follow-up on questionable loans more difficult.
10-35 .
Ch. 10: Control and Accounting Information Systems
Guisti was a frequent gambler and used the embezzled money to pay gambling debts. The bank’s losses totaled $624,000, which was less than the $1.83 million in bogus loans, because Guisti used a portion of the borrowed money to repay loans as they came due. The bank’s bonding company covered the loss. The bank experienced other adverse publicity prior to the fraud’s discovery. First, the bank was fined $50,000 after pleading guilty to failure to report cash transactions exceeding $10,000, which is a felony. Second, bank owners took the bank private after a lengthy public battle with the State Attorney General, who alleged that the bank inflated its assets and overestimated its capital surplus to make its balance sheet look stronger. The bank denied this charge. 1.
How did Guisti commit the fraud, conceal it, and convert the fraudulent actions to personal gain? Commit: James Guisti, a trusted 14-year employee and manager of a Greater Providence Deposit & Trust’ branch office, was authorized to make consumer loans up to a certain dollar limit without loan committee approvals. He used this authority to create 67 fraudulent 90-day notes requiring no collateral. As the scheme progressed, he was able to bypass the loan committee approval as some of his loans exceed his loan limit. Guisti was charged with embezzling $1.83 million from the bank. Conceal: He made the loans out to five people: his wife using her maiden name, his father, two friends, and a non-existent person. To avoid detection, he made sure the loans were performing and that they were never examined for non-payment. That is, when the loans matured, he would take out a new loan, or rewrite the old one, to pay the principal and interest due. He also kept the loans small to avoid the attention of auditors, who examined loans much larger than those he was fraudulently originating. Convert: He had a subordinate, customer service representative Lucy Fraioli, cosign the checks. He then had another subordinate, head teller Marcia Perfetto, cash the checks, and give him the money.
2.
Good internal controls require that the custody, recording, and authorization functions be separated. Explain which of those functions Guisti had and how the failure to segregate them facilitated the fraud. Authorization: Guisti was authorized to make consumer loans up to $10,000 (later $15,000 and then $25,000) without loan committee approval. This authorization is standard industry practice. He used this authority to create fraudulent loans. As the scheme progressed, he was able to bypass loan committee approval for loans that exceeded his loan limit. This is not standard industry practice and represents a failure of bank internal controls.
10-36 .
Accounting Information Systems 15e, GE
Custody: Guisti was able to commit the fraud because he was able to obtain custody of the checks used to extend the loans. He used his position as branch manager to get his subordinates to cosign the checks and cash them. Recording: Nothing in the case write-up indicates that Guisti had any recording responsibilities. It appears that he used the bank’s normal recording processes: the bank recorded the loans when created and the payments were appropriately recorded when Guisti repaid them 3.
Identify the preventive, detective, and corrective controls at GPD&T and discuss whether they were effective. Preventive: All bank loans exceeding Guisti’s limit ($10,000, then $15,000 and then $25,000) were supposed to be approved by a loan committee. This control was not enforced or was not effective as Guisti was able to bypass it. GPD&T segregated the functions of loan origination, authorization (a co-signer needed on loans), and custody of cash (tellers). Guisti used his position of branch manager to override the controls over co-signatures and check cashing. Loan applications were to be accompanied by the applicant’s credit history report, purchased from an independent credit rating firm. The loan taken out in the fictitious name did not have that credit report and it should have been flagged by a loan review clerk at the bank’s headquarters. This control was not enforced or was not effective as Guisti was able to bypass it. Greater Providence dropped its computer services arrangement with a local bank in favor of an out-of-state bank. This may have reduced the effectiveness of the bank’s control procedures. Detective: State regulators and the bank’s internal auditors failed to detect the fraud. Bank auditors do not examine all loans and focus on much larger loans than Guisti’s. The bank’s loan review clerks were rotated frequently, making follow-up on questionable loans more difficult. Corrective: The bank bonded (an insurance policy on an employee’s honesty) its employees. When the bank was defrauded, the bank’s bonding company covered the loss. This control was effective in restoring the financial losses the bank experienced.
4.
Explain the pressures, opportunities, and rationalizations that were present in the Guisti fraud. Pressures: Guisti was a frequent gambler and needed the money to pay gambling debts. Opportunities: As the Branch Manager, Guisti could override some internal controls and unduly influence his subordinates not to comply with others.
Rationalization: No information is given on how or why Guisti rationalized his fraud
10-37 .
Ch. 10: Control and Accounting Information Systems
5.
Discuss how Greater Providence Deposit & Trust might improve its control procedures over the disbursement of loan funds to minimize the risk of this type of fraud. In what way does this case indicate a lack of proper segregation of duties? Loan funds should generally not be disbursed in cash. Better control would be established by depositing the funds in a checking account in the borrower’s name or by issuing a bank check to the borrower. When cashing such a check, bank personnel should require identification containing the borrower’s photograph, and the borrower’s signature on the check, and should scan both the photograph and the signature to verify the borrower’s identity. In no case should one bank employee disburse cash to another for a loan to a third party borrower without first verifying the existence and identity of the borrower. Customer service representatives generally should not co-sign checks to borrowers without first verifying their existence.
6.
Discuss how Greater Providence might improve its loan review procedures at bank headquarters to minimize its fraud risk. Was it a good idea to rotate the assignments of loan review clerks? Why or why not? A system should be in place at the bank’s headquarters to maintain data on all outstanding bank loans. This system should flag all loans that have been made in excess of the loan officer’s lending limit. The authenticity of these loans should be scrutinized by internal auditors or other bank officials independent of the loan officer. Disciplinary action should be taken when a loan officer extends a loan that is greater than his loan limit. Approved loans for which there is no credit report should be flagged and scrutinized. Bank headquarters could send a letter to each new borrower thanking them for their business. Individuals whose names had been used on loan documents without their permission would be likely to question why they had received such a letter, while letters mailed to fictitious borrowers would be returned as undeliverable. Either event should trigger an investigation. Rotating the assignments of loan review clerks may have made it more difficult for the bank to detect this fraud. After it discovered the embezzlement, Greater Providence changed its policy to require its loan review clerks to track a problem loan until it is resolved.
10-38 .
Accounting Information Systems 15e, GE
7.
Discuss whether Greater Providence’s auditors should have been able to detect this fraud. Audits are not guaranteed to detect fraud. It is too costly for auditors to examine every loan, so they generally examine a systematically selected sample. It makes sense for auditors to focus on larger loans, since that is where the greatest exposure is. The case notes that Guisti was a former auditor. Therefore, he would have been very familiar with the bank’s control system and its audit procedures. He undoubtedly made use of this knowledge in planning and carrying out his embezzlement scheme. On the other hand, since the bank’s central records were computerized, it should have been a simple matter for auditors to find and examine every outstanding loan record with questionable characteristics, such as:
Loan amounts in excess of the loan officer’s lending limit Short-term loans that had been rewritten several times.
If auditors had any indication that Guisti was heavily involved in gambling activities, they should have examined his accounts very carefully. However, the case gives no indication that the auditors were ever aware of Guisti’s penchant for gambling. 8.
Are there any indications that the control environment at Greater Providence may have been deficient? If so, how could it have contributed to this embezzlement? There are three indications of potential deficiencies in the bank’s control environment.
Controls may have been deficient during the computer services changeover. However, the fraud took place over a three-year period, and any problems relating to the computer changeover should have taken much less than three years to resolve. The bank pled guilty to a felony three years prior to discovery of the fraud, which was about the time the fraud began. The state’s charges of an inflated balance sheet suggest the possibility that the integrity of the bank’s management may be flawed, though there is certainly no proof of this.
While one indicator of a deficient control environment may be tolerable, three begins to look like a pattern. Deficiencies in the bank’s control environment certainly could have contributed to the embezzlement by enhancing the opportunity for fraud and by fostering an attitude that dishonest behavior is somehow acceptable.
10-39 .
CHAPTER 11 CONTROLS FOR INFORMATION SECURITY SUGGESTED ANSWERS TO DISCUSSION QUESTIONS 11.1
Explain why an organization would want to use all of the following information security controls: firewalls, intrusion prevention systems, intrusion detection systems, and a CIRT. Using this combination of controls provides defense-in-depth. Firewalls and intrusion prevention systems are preventive controls. Intrusion detection systems are used to identify problems and incidents. The purpose of a Computer Incident Response Team (CIRT) is to respond to and mediate problems and incidents. According to the time-based model of security, information security is adequate if the firewalls and intrusion prevention systems can delay attacks from succeeding longer than the time it takes the intrusion detection system to identify that an attack is in progress and for the CIRT to respond. Honeypots are useful because they provide early warning signs of attacks. The CIRT can respond to attempts to access the organization’s honeypots by adjusting the rules in the IPS to block further access from any outside location that has attempted to connect to the honeypot. If it turns out that an employee has accessed the honeypot, the CIRT can monitor that employee to verify whether the access was accidental or a sign that the employee is about to engage in some form of undesirable act.
11.2
What are the five principles that jointly contribute to the reliability of information systems? Briefly explain each principle.
Security – this relates to both physical and logical access to the system and the data it stores; access should only be granted to authorized users. Confidentiality – this relates to the protection of sensitive organizational information from unauthorized disclosure. Privacy – this relates to personal information about a variety of entities (such as customers, suppliers, business partners) that should be collected, used, disclosed, and maintained according to regulatory requirements. Such information should be protected from unauthorized disclosure. Processing integrity – data should be processed accurately, completely, timely, and only with proper authorization. Availability – the system and the information it stores need to be available to meet operational and contractual obligations.
11.3
Describe what a man-trap is. Explain how it contributes to information security. A man-trap is a specially designed room to trap unauthorized individuals. Typically, a man-trap room contains two doors. Entry to the first door requires the person insert and ID card and enter a password. Successful authentication opens the first door, permitting 11-1 .
Ch. 11: Controls for Information Security
the individual into the room. Once inside the room, the door closes and locks behind the individual. Then, the individual must successfully pass a second set of authentication controls that typically includes a biometric credential. Failure to pass results in the individual being trapped in the room. 11.4
Identify three ways users can be authenticated, and give an example of each. Users can be authenticated by verifying: 1. something they know (password). 2. something they have (smart card or ID badge). 3. Something they are (biometric identification of fingerprint).
11.5
What is defense-in-depth? Why do you think it is important to an organization? Defense-in-depth is the principle whereby an organization employs multiple layers of controls to prevent the possibility of a single point of failure. Defense-in-depth often involves the use of a combination of preventive, detective, and corrective controls. This means that many organizations make use of, for example, firewalls and several authentication methods (passwords, biometrics) to restrict access to their information system and its data. When multiple layers of controls are used, these controls overlap and complement one another, increasing the overall effectiveness, because if one control fails, the others are still in place and the information system and its data are still protected.
11.6
Should section 404 of Sarbanes–Oxley be extended to include cybersecurity? Answers are likely to vary. But should generate good discussion about the use of carrots vs. sticks to getting management to give attention to cybersecurity.
11.7
Two of the key processes of COBIT 5 deal with managing change and procedures for testing and transitioning to new solutions. Briefly describe the characteristics of a well-designed change control and change management process.
All change requests should be documented – this documentation to include the nature of the change, why it was required, the date of the change request and the outcome of the request. All change request approvals should be documented with all approvals by the appropriate management levels. Senior management should review and approve major changes to processes and systems to ensure that requested changes are in line with the long-term strategic plans of the organization. All proposed changes should be tested on a testing system (not the live IS) so that normal business will not be disrupted if there are any software issues. Transfer of the data from the old to the new system should include conversion controls to ensure that the data is accurately and completely transferred. Internal auditors should review this process. All system documentation (program instructions, system descriptions, procedure manuals) should be updated to reflect the newly implemented changes. In cases of “emergency changes”, there should be a process in place to enforce review, approval and documentation of these changes; this should be done as soon as it is
11-2 .
Accounting Information Systems 15e, GE
practically possible after a crisis. All emergency changes should be logged in an audit trail. “Emergency changes” should be the exception – as soon as there is an increase in “emergency changes” there should be an investigation as to why this is happening. There should be plans in place to be able to go back to a previous “version” if the implemented changes create unexpected problems. A “backout” plan is needed. During the changeover process, user rights and privileges should be monitored and reviewed to ensure that proper segregation of duties is maintained.
11-3 .
Ch. 11: Controls for Information Security
SUGGESTED SOLUTIONS TO THE PROBLEMS 11.1
Match the following terms with their definitions: Definition
Term __d__ 1. Vulnerability
a. Code that corrects a flaw in a program
__q__ 2. Exploit
b. Verification of claimed identity
__b__ 3. Authentication
c. Firewall technique that filters traffic by examining only the information in packet headers to test the rules in an ACL
__k_ 4. Authorization
d. Flaw or weakness in a program
__f__ 5. Demilitarized zone (DMZ)
e. Test that determines how long it takes to detect and respond to an attack
__r__ 6. Deep packet inspection
f.
__m__ 7. Router
g. Device that connects the organization to the Internet
__h__ 8. Honeypot
h. Device that has no real function, but merely serves as a decoy
__i__ 9. Firewall
i.
Device that provides perimeter security by filtering packets
__l__ 10. Hardening
j.
Set of employees assigned responsibility for resolving problems and incidents
__j__ 11. CIRT
k. Restricting the actions a user is permitted to perform
__a__ 12. Patch
l.
__o__ 13. Change control and change management
m. Device that uses the Internet Protocol (IP) to send packets across networks
__c__ 14. Packet filtering
n. Detective control that identifies weaknesses in devices or software
__g__ 15. Border router
o. Plan that ensures modifications to an information system do not reduce its security
__n__ 16. Vulnerability scan
p. Process of applying code supplied by a vendor to fix a problem in that vendor’s software
__e__ 17. Penetration test
q. Software code that can be used to take advantage of a flaw and compromise a system
__p__ 18. Patch management
r. Firewall technique that filters traffic by examining not just packet header information but also the contents of a packet
11-4 .
Subnetwork accessible from the Internet but separate from the organization’s internal network
Improving security by removal or disabling unnecessary programs and features
Accounting Information Systems 15e, GE
11.2
The CISO of the ABC company is considering how to increase the strength of employee passwords. Currently, passwords must be 10 characters, they must be case-sensitive (i.e., include both lower- and upper-case alphabetic characters), and they must contain at least two numbers. a. Calculate the size of the search space of possible passwords given the current password requirements. b. Calculate the size of the search space of possible passwords if the current password requirements were changed so that they must contain at least two special characters (e.g., $, #, @, etc.) from a list of 66 commonly available symbols. c. Calculate the size of the search space of possible passwords if the current password requirements were changed so that passwords must be 20 characters long. d. Which modification to the current password requirements (adding the requirement to include special symbols or increasing the length from 10 to 20) increases the strength of the password the most? e. Which modification do you recommend? Why?
Solution: a. The current search space is the number of choices for each character (62 = 26 upper-case letters, 26 lower-case letters, and 10 digits) raised to the length (10): 6210= 8.3929937E+17. b. There would now be 128 possible choices for each character: 26 upper-case letters, 26 lowercase letters, 10 digits, and 66 special characters. Thus the total search space would be 12810 = 1.1805916E+21. c. There would 62 choices for each character (26 upper-case letters, 26 lower-case letters, and 10 digits). Thus the search space would be 6220 = 7.0442343E+35. d. Doubling the length (from 10 to 20 characters) has a greater effect than doubling the character set size (from 62 to 128 choices). The difference in the resulting set sizes is: 7.0442343E+35/1.1805916E+21 = 5.9666986E+14 or 596,669,860,000,000 more possibilities. e. Increasing the length – because it increases resistance to brute-force guessing the most. Also, easier to type alphanumeric passwords than ones that also have to contain special characters.
11-5 .
Ch. 11: Controls for Information Security
11.3
The following table lists the tasks that an employee is required to perform:
Employee Gerald Malusi Wande Olwethu Samjay
Tasks Check network logs of employee logins to determine who logged in remotely over the weekend. Maintain supplier information. Update regulatory tax changes. Add new employees. Check supplier payment terms. Update reorder levels when new products are added to the stock list.
Use the following codes to complete the access control matrix so that each employee will have the appropriate rights and privileges to perform their tasks: 0 = 5 no access 1 = 5 read only access 2 = 5 read and modify records 3 = 5 read, modify, create, and delete records Employee Inventory master file Gerald 0 Malusi 0 Wande 0 Olwethu 0 Samjay 2 11.4
Supplier master file 0 3 0 1 0
Payroll master file 0 0 3 0 0
System log files 1 0 0 0 0
Which preventive, detective, and/or corrective controls would best mitigate the following threats? a. An employee’s laptop was stolen at the airport. The laptop contained personally identifying information about the company’s customers that could potentially be used to commit identity theft. Preventive: Policies against storing sensitive information on laptops and requiring that if any such information must exist on the laptop that it be encrypted. Training on how to protect laptops while traveling to minimize the risk of theft. Corrective: Installation of “phone home” software might help the organization either recover the laptop or remotely erase the information it contains. b. A salesperson successfully logged into the payroll system by guessing the payroll supervisor’s password. Preventive: Strong password requirements such as at least an 8-character length, use of 11-6 .
Accounting Information Systems 15e, GE
multiple character types, random characters, and require that passwords be changed frequently. Detective: Locking out accounts after 3-5 unsuccessful login attempts; since this was a “guessing” attack, it may have taken more than a few attempts to login. c. A criminal remotely accessed a sensitive database using the authentication credentials (user ID and strong password) of an IT manager. At the time the attack occurred, the IT manager was logged into the system at his workstation at company headquarters. Preventive: Integrate physical and logical security. In this case, the system should reject any user attempts remotely log into the system if that same user is already logged in from a physical workstation. Detective: Having the system notify appropriate security staff about such an incident. d. An employee received an email purporting to be from her boss informing her of an important new attendance policy. When she clicked on a link embedded in the email to view the new policy, she infected her laptop with a keystroke logger. Preventive: Security awareness training is the best way to prevent such problems. Employees should be taught that this is a common example of a sophisticated phishing scam. Detective and corrective: Anti-spyware software that automatically checks and cleans all detected spyware on an employee's computer as part of the logon process for accessing a company's information system. e. A company’s programming staff wrote custom code for the shopping cart feature on its web site. The code contained a buffer overflow vulnerability that could be exploited when the customer typed in the ship-to address. Preventive: Teach programmers secure programming practices, including the need to carefully check all user input. Management must support the commitment to secure coding practices, even if that means a delay in completing, testing, and deploying new programs. Detective: Make sure programs are thoroughly tested before being put into use Have internal auditors routinely test in-house developed software. f. A company purchased the leading “off-the-shelf” e-commerce software for linking its electronic storefront to its inventory database. A customer discovered a way to directly access the back-end database by entering appropriate SQL code.
11-7 .
Ch. 11: Controls for Information Security
Preventive: Insist on secure code as part of the specifications for purchasing any 3rd party software. Thoroughly test the software prior to use. Employ a patch management program so that any vendor provided fixes and patches are immediately implemented. g. Attackers broke into the company’s information system through a wireless access point located in one of its retail stores. The wireless access point had been purchased and installed by the store manager without informing central IT or security. Preventive: Enact a policy that forbids installation of unauthorized wireless access points. Detective: Conduct routine audits for unauthorized or rogue wireless access points. Corrective: Sanction employees who violate policy and install rogue wireless access points. h. An employee picked up a USB drive in the parking lot and plugged it into their laptop to “see what was on it,” which resulted in a keystroke logger being installed on that laptop. Preventive: Security awareness training. Teach employees to never insert USB drives unless they are absolutely certain of their source. Anti-spyware software that automatically checks and cleans all detected spyware on an employee's computer as part of the logon process. i. Once an attack on the company’s website was discovered, it took more than 30 minutes to determine who to contact to initiate response actions. Preventive: Document all members of the CIRT and their contact information. Practice the incident response plan.
j. To facilitate working from home, an employee installed a modem on his office workstation. An attacker successfully penetrated the company’s system by dialing into that modem. Preventive: Routinely check for unauthorized or rogue modems by dialing all telephone numbers assigned to the company and identifying those connected to modems. k. An attacker gained access to the company’s internal network by installing a wireless access point in a wiring closet located next to the elevators on the fourth
11-8 .
Accounting Information Systems 15e, GE
floor of a high-rise office building that the company shared with seven other companies. Preventive: Secure or lock all wiring closets. Require strong authentication of all attempts to log into the system from a wireless client. Employ an intrusion detection system. 11.5
Staff training in terms of security awareness is a critical preventive control. Despite this, many employees do not adhere to these security policies though they go through the motions as if they understand the importance of the organization’s security policies. There are several articles on how a lack of security awareness or a lack of adherence to security policies threatens organizations.
Find at least two examples of data or security breaches caused by employees of a company. Write a brief report to explain what happened, how the breach was discovered, and what the outcomes of the security breach were. The answers will vary based on a student’s research and findings. Students should be encouraged to that many security or data breaches are a result of either employee carelessness or the inability to follow set security policies. In some cases, there might be malicious intent, but these breaches often take place because of employee negligence. Interesting links (at the time of writing) that contain security breach examples: https://www.observeit.com/blog/5-examples-of-insider-threat-caused-breaches/ https://www.techworld.com/security/uks-most-infamous-data-breaches-3604586/ 11.6 a. Use the following facts to assess the time-based model of security for the ABC Company; how well does the existing system protect ABC? Assume the best-, average-, and worst-case estimates are independent for each component of the model. • Estimated time that existing controls will protect the system from attack 5 14 minutes (worst case), 18 minutes (average case), and 22 minutes (best case) • Estimated time to detect that an attack is happening 5 6 minutes (best case), 9 minutes (average case) and 12 minutes (worst case) • Estimated time to respond to an attack once it has been detected 5 5 minutes (best case), 10 minutes (average case), and 15 minutes (worst case) Solution: The company is only secure for the worst case of P under the best case scenarios for both D and R. Otherwise, for worst case of P, the company is insecure. For average case of P, the company is secure if R is best case scenario OR if R is average and D is best case. For best case of P, the company is secure if either R or D is best case or if both are average. 11-9 .
Ch. 11: Controls for Information Security
b. The company is considering investing an additional $100,000 to improve its security. Given the following possibilities, which single investment would you recommend? Explain your answer. • An investment of $100,000 in better perimeter defenses would change the estimates for protection time to 20 minutes (worst case), 24 minutes (average case), and 30 minutes (best case). • An investment of $100,000 in better detection systems would change the estimates for detection time to 3 minutes (best case), 5 minutes (average case), and 8 minutes (worst case). • An investment of $100,000 in training would change the estimates for response time to 1 minute (best case), 2 minutes (average case), and 4 minutes (worst case). Solution: The best overall investment is to spend the $100K on training to improve response time, R, because then even in the worst case of both P and D, the company only has trouble if R is not best (see solution spreadsheet – . If P is average or best case, spending the money on R guarantees the company satisfies the time-based model formula, regardless of the quality of D. In contrast, spending the $100K on P yields problems if P is only average, R is worst case, and D is average or worst. In the worst case of P, the company is not secure whenever R is worst case (regardless of D) or when R is average and D is worst. Spending the $100K on D yields possible insecurity even in the P best case scenario. The Excel spreadsheet uses conditional color fill in the cells to highlight the results of the various investments. The color is applied as follows: 1. Create formulas in each cell that reflect the results of the time based model (i.e., P[D+R]). 2. Use the conditional color formatting option for cells to shade green if the formula yields a positive number (which means that P > D+R), yellow if the value is zero (meaning P = D+R), and red if the value is negative (meaning P < D+R). 11.7
Answer the following questions in relation to user access controls. 1. Discuss whether the following statement is true: “The single most important factor affecting the strength of a password is its length. The longer, the better.” To a certain extent, this is true, but merely having a long password is not going to be effective if the password is a dictionary word, a date, or something that is directly linked to the user. A long password is only effective if it is not easy to guess (such as a name, or a date of birth). 2. Discuss the concept of randomness and the uses of multiple character types when creating a password. Give examples of two strong passwords that are difficult to guess and crack, but which you as a user will be able to remember (without writing them down!) and explain why you regard these two as strong passwords.
11-10 .
Accounting Information Systems 15e, GE
To prevent passwords from being guessed, one should not use dictionary words; nor anything that relates to or can be linked to the user – this includes names, dates, addresses, phone numbers; interest- or hobby-related information, etc. Users should typically make use of multiple character types – this means a combination of upper and lowercase alphabetical characters, numeric characters, and special characters (for example, any of these: ~!@#$%^&*). However, some systems do not allow certain special characters, and this can be problematic. Consider the password examples the students provide. This could also be an interesting discussion question in the classroom setting. Something else that could be linked to passwords is to bring home the idea that the same password should not be used for multiple places – this is a huge security risk. 3. Discuss at least two instances where you have seen biometric identifiers being used as authentication control. Many smartphones and tablets have fingerprint scanners to unlock the device; some have facial recognition. Waiters at restaurants often have to log in to the cash register via a fingerprint / thumb print scanner. 4. If you switch to a new bank and want to register for online banking, which is available via an app on your mobile phone, would you need multifactor authentication, multimodal authentication, or both? Explain your answer. Multimodal authentication could be used to identify you as a user – thus you might be required to provide a user id and password or a PIN to log in to the app on your mobile device – so, to verify you as a user, multimodal authentication could possibly be used. If the bank requires a password or PIN as well as (for example) a scanned fingerprint, then multifactor authentication is used. Another discussion point could be the linking of your device with your banking profile: you would need to register your device – this enables you to use the app from your mobile device – every time you upgrade or change your mobile device, you need to remove the previously linked device and link the new device as the media access control address of different mobile devices are different. 5. What is the difference between authentication and authorization? Authentication is used to verify the identity of the person / device attempting to access a system. Authorization refers to restricting access of authenticated users – thus a user might be authenticated to log in to a system, but the user has restricted access to certain portions of the system and might also have restrictions on the actions that may be performed. 6. What problems could be encountered when using an access control matrix to authorize users? How would you be able to mitigate these problems? An access control matrix needs to be updated regularly; an access control matrix is a static table that needs to be updated whenever there are employee changes – when employees move around in an organization, when new employees start, or when employees leave the organization. Every time such a change takes place, the access control matrix needs to be updated, otherwise the compatibility test might either 11-11 .
Ch. 11: Controls for Information Security
allow access to employees that should no longer have access, or employees that should have access might not have been granted access yet. One way of mitigating the problems with the static access control matrix is to make use of business process management systems that embed authorization into automated business processes. 7. Would it ever be necessary to authorize devices? Provide examples to explain your answer. In some cases, devices also need to be authorized. For example, specific payroll employees that have access to the payroll master file should only access payroll master files from their workstations at the office; they should not be allowed access to the payroll master file from other workstations at the organization and they should also not be able to access the payroll master file from outside the organization (for example, from home). 8. Consider the following statement: “The attempt at enforcing strong passwords is counterproductive.” Do you agree with this statement? Explain your answer. Students could either agree or disagree with this statement – consider their arguments and motivations. On the one hand, having a strong password and requiring these passwords to be periodically changed often lead to users forgetting their passwords – this leads to many calls to helpdesks to reset the passwords. When users create strong passwords, they might decide to write it down (rather than trying to remember it) and this defeats the purpose of a strong password; because the password then becomes something the user has (because it is written down) rather than something the user knows. Other arguments could be that newer operating systems allow for longer passwords, which would allow users to use easy-to-remember passwords (the first letters of the lyrics of a favorite song, or a phrase that is easy to remember but unlikely to be cracked by combining multiple character types). The problem with long passphrases is that some security policies require password-protected screen savers too; which means that every time the user has not actively used the computer for a short period of time, the user will need to re-enter the password / passphrase. 11.8 Secure configuration of endpoints includes properly configuring your browser and smartphone. Visit the Center for Internet Security’s website (www.cisecurity.org). Navigate to the “Configuration Benchmarks” and download the benchmark for either your favorite browser or your smartphone. Adjust the settings for java, JavaScript, and plugins to the recommended settings. Then test the properly configured device on the following tasks: a. Access your university e-mail account b. Access your personal e-mail account c. Use your favorite search engine to find information about travel tours to Easter Island d. Attempt to book a flight e. Play an online game (Sudoku, Kenken, etc.) Required 11-12 .
Accounting Information Systems 15e, GE
Write a brief report that explains the effects, if any, of the more secure device configuration when you attempted each task. Reports will vary from student to student. The best way to grade is to review the quality of the explanation. You may want to require students to submit screen shots of either success or failure in performing each task. 11.9
Check if any of your email accounts have been compromised in a data breach by visiting the “have I been pawned” website (https://haveibeenpwned.com/). Write a report on your findings. Students may or may not have email accounts that have been compromised in a data breach. Regardless of the outcome of this exercise, it is good to discuss this in class, and explain the ease with which such breaches can occur. These breaches occur even on reputable sites (for example, Adobe) – so one must always be careful about protecting passwords and not use the same passwords for multiple applications.
11.10 Answer the following nine multiple-choice questions: 1. The system employs a compatibility test to decide whether to let a particular employee update records in a particular file. The compatibility test is a part of the aspect of access control referred to as _____. a. authentication b. authorization c. accountability Correct answer is b. 2. The set of instructions for taking advantage of a flaw in a program is called a(n) _____. a. vulnerability b. patch c. update d. exploit Correct answer is d. 3. Firewalls are most effective in reducing the ability of an attacker to _____. a. conduct initial reconnaissance b. research vulnerabilities and exploits c. scan and map the target d. all of the above are prevented by firewalls e. none of the above are prevented by firewalls Correct answer is c. Firewalls can filter traffic into and out from a network. Thus, they can block attempts to scan. They cannot stop an attacker from surfing the Internet to gather publicly 11-13 .
Ch. 11: Controls for Information Security
available information (a) about a specific company (a) or (b) about vulnerabilities in various types of systems and exploits that can be used to take advantage of those vulnerabilities. 4. A company’s current password policy requires that passwords be alphanumeric, case-sensitive, and be 10 characters long. Which one of the following changes to a company’s password policy will increase password strength the most? a. Require passwords to also include special characters (such as $, &, etc.) b. Require passwords to be 15 characters long c. Both of the above changes would have the same effect on password strength Correct answer is b. Increasing the length of a password by a specific percentage (in this case 50%) increases the search space much more than increasing the size of the character set by a similar percentage. Current size of search space is 6210 = 8.39299E+17. Requiring special characters to be used but keeping the length at 10 yields a search space of 9510 = 5.98737E+19. Requiring the length to be increased to 15 alpha-numeric, case-sensitive, characters yields a search space of 6215 = 7.6891E+26.
5. Which of the following set of authentication credentials provides the strongest access control? a. A password and a security question. b. A PIN and a smart card. c. Voice recognition and a fingerprint. d. All of the combinations of credentials are equally strong. Correct answer is b. See Figure 11-1. 6. A firewall that uses ________________ would be most effective in detecting and stopping an attempt to deface the organization’s website by sending an HTML “PUT” command to its web server. a. static packet filtering b. stateful packet filtering c. deep packet inspection Correct answer is c. Neither type of packet filtering looks at the contents of the packet. Only deep packet inspection can check the type of command being sent. 7. In addition to encryption, organizations should _____ to effectively secure wireless communications. a. place all wireless access points in the DMZ b. configure all wireless clients to operate in ad hoc mode c. do both of the above d. do none of the above Correct answer is a. Operating in ad hoc mode is risky because it allows direct peer-to-peer connections that may not be filtered at all. 11-14 .
Accounting Information Systems 15e, GE
8. Which of the following statements are true? a. IT developments such as virtualization, Cloud computing, and the Internet of Things weaken information security. b. A large number of emergency changes is a potential red flag of other problems. c. Information security is improved when the CISO reports to the CIO. d. All of the statements are true. e. None of the statements are true. Correct answer is a. Testing should never be done in the production environment. A large number of emergency changes may indicate that managers view the change control process as too bureaucratic and, therefore, try to circumvent it by calling their change an emergency. Although emergency changes should be reviewed and authorized, that review process is by definition cursory. After the crisis has been resolved, the emergency change should be formally reviewed and documented. 9. ABC bank wants to strengthen the security of its online bill-pay features. Therefore, it decides that in addition to a password, users must also correctly enter a 6-digit number sent to their smartphone. This is an example of a process referred to as ______. a. multifactor authentication b. multimodal authentication c. Neither of the other statements are true. Correct answer is a. The password is something the customer knows; the number comes from something the customer has.
11-15 .
Ch. 11: Controls for Information Security
SUGGESTED SOLUTIONS TO THE CASES CASE 11-1 Assessing Change Control and Change Management Read the article “Security Controls that Work” by Dwayne Melancon in the 2007 Issue, Volume 4 of the Information Systems Control Journal. Write a report that answers the following questions: 1. What are the differences between high-performing organizations and medium- and low-performing organizations in terms of normal operating performance? Detection of security breaches? Percentage of budget devoted to IT? 2. Which controls were used by almost all high-performing organizations, but were not used by any low- or medium-performers? 3. What three things do high-performing organizations never do? 4. What metrics can an IT auditor use to assess how an organization is performing in terms of change controls and change management? Why are those metrics particularly useful?
SOLUTION: Details will vary, but a good solution should incorporate the following points: 1. Differences between high-performing and medium- and low-performing organizations are that high-performing organizations – the article lists the following: Completed eight times as many projects Managed six times as many applications and IT services Authorized and implemented 15 times as many changes Achieved server-to-system administrator ratios 2.5 times higher than medium performers and 5.4 times higher than low performers Experienced one-half the change failure rate of medium performers and one-third the change failure rate of low performers Experienced 12 percent less unplanned work than medium performers and 37 percent less than low performers Superior service levels, measured by the mean time between failures and low mean time to repair The earliest and most consistent integration of security controls into IT operational processes, measured by control location, security staff participation in the IT operations life cycle and number of security incidents resulting in loss The best posture of compliance, measured by the fewest number of repeat audit findings and lowest staff count required to stay compliant High efficiencies, measured by high server-to-system administrator ratios and low amounts of unplanned work (i.e., new work that is unexpectedly introduced when a change is made)
11-16 .
Accounting Information Systems 15e, GE
2. The article states that all high-performing organizations used two controls that none of the low- or medium-performers did: Are systems monitored for unauthorized changes? Are there defined consequences for intentional unauthorized changes? In addition, the following four controls were found much more frequently in highperforming organizations than in low- or medium-performers: ○ A formal process for IT configuration management ○ An automated process for configuration management ○ A process to track change success rates (the percentage of changes that succeed without causing an incident, service outage or impairment) ○ A process that provides relevant personnel with correct and accurate information on current IT infrastructure configurations 3. The article states that three things high-performing organizations NEVER do:
They never let developers make changes in production. They never let change management processes get bureaucratic They never let users exceed their role in the change process.
4. The article identifies these key metrics for IT auditors to track:
Amount of time devoted to unplanned work—An unplanned work rate higher than 20 to 25 percent is a sure indication of a lack of effective controls and a cultural problem within IT. It usually means too much time and resources are spent on troubleshooting and maintaining IT operations and not enough time is spent on improving the business. The Visible Ops Handbook indicates that high performers spend less than 5 percent of their time on unplanned work. Volume of emergency changes—Almost by definition, “emergency” changes are unauthorized changes that are often used as a way to circumvent the formal change management process or avoid disciplining employees for violating those processes. If an organization has a volume of emergency changes that exceeds 15 percent, auditors should take that as a warning sign that it is not taking change management seriously. The highest performers tend to have 5 percent or fewer emergency changes. Also, it is important to ensure that there is an actual process, albeit streamlined, for emergency changes. Number and causes of failed changes—The ITPI study found that high performers consistently maintained successful change rates of 95 percent or more, often as high as 99 percent. Successful changes are those that are implemented without causing an outage or unplanned work episode.
Other things to look out for, which the study found in medium and low performers, include: • A high frequency of security incidents, unexplained outages or other system availability events • A lot of late projects and cost overruns due to unplanned or emergency work • High employee turnover and low morale
11-17 .
Ch. 11: Controls for Information Security
CASE 11-2 Research Project Research a security incident selected by your instructor and answer the following questions: a. When the breach occurred b. When the breach was discovered c. How and by whom the breach was discovered d. Consequences of the breach to the organization 1. Effect on stock prices 2. Effect on future sales 3. Cost of remuneration (e.g., credit monitoring) offered to customers 4. Regulatory fines e. Effect on the CISO and CIO (did either or both resign or get fired?) f. Nature of any disclosures by the company (attach the statements) – in your opinion, did the company accept responsibility for the problem or try to excuse it? Defend your answer. g. The company’s plans/response to the incident: what does it plan to do differently in the future? h. Lessons learned: In your opinion, what could the company have done differently to either reduce the likelihood of the incident happening, mitigate the consequences of the breach, or both? Deliverable: Your instructor will choose whether you are to submit a written report, make an oral presentation to the class, or both.
Written report suggested grading rubric: 75% on content (thoroughness) 25% on writing style (number of typos, grammar errors, active vs. passive, etc.) Oral presentation suggested grading rubric: 75% on content (thoroughness) 25% on presentation (speaks clearly, interesting, etc.)
11-18 .
CHAPTER 12 CONFIDENTIALITY AND PRIVACY CONTROLS SUGGESTED ANSWERS TO DISCUSSION QUESTIONS 12.1
With reference to the Edward Snowden case, explain why some companies prohibit their employees from using personal email at work, or forwarding company emails to such accounts? Today, organizations constantly exchange information with their business partners and customers. Therefore, protecting confidentiality also requires controls over outbound communications. One tool for accomplishing that is data loss prevention (DLP) software, which works like antivirus programs in reverse, blocking outgoing messages (whether e-mail, IM, or other means) that contain key words or phrases associated with the intellectual property or other sensitive data the organization wants to protect. DLP software is a preventive control. It can and should be supplemented by embedding code called a digital watermark in documents. The digital watermark is a detective control that enables an organization to identify confidential information that has been disclosed. When an organization discovers documents containing its digital watermark on the Internet, it has evidence that the preventive controls designed to protect its sensitive information have failed. It should then investigate how the compromise occurred and take appropriate corrective action.
12.2
Comment on this statement made by some IT and marketing professionals: Data security and convenience move in opposite directions. There will be different answers to this question
12.3
Describe some steps you can take to minimize the risk of identity theft. Shred documents containing personal information. Never send personally identifying information in unencrypted e-mail. Beware of e-mail/phone/print requests to verify personal information that the requesting party should already possess. Do not carry your social security card with you. Print only your initials and last name on checks. Limit the amount of other information preprinted on checks. Do not use your mailbox for outgoing mail. Do not carry more than a few blank checks with you. Use special software to digitally clean any digital media prior to disposal. Monitor your credit cards regularly. File a police report as soon as you discover a purse or wallet missing. Make photocopies of your driver's license, passport and credit cards and keep them in a safe location. Immediately cancel any stolen or lost credit cards.
12.4
What privacy concerns might arise from the use of biometric authentication techniques? What about the embedding of RFID tags in products such as clothing? What other technologies might create privacy concerns?
12-1 .
Ch. 12: Confidentiality and Privacy Controls
Many people may view biometric authentication as invasive. That is, in order to gain access to a work related location or data, they must provide a very personal image of part of their body such as their retina, finger or palm print, their voice, etc. Providing such personal information may make some individuals fearful that the organization collecting the information can use it to monitor them. In addition, some biometrics can reveal sensitive information. For example, retina scans may detect hidden health problems – and employees may fear that such techniques will be used by employers and insurance companies to discriminate against them. RFID tags that are embedded or attached to a person’s clothing would allow anyone with that particular tag’s frequency to track the exact movements of the “tagged” person. For police tracking criminals that would be a tremendous asset, but what if criminals were tracking people who they wanted to rob or whose property they wanted to rob when they knew the person was not at home. Cell phones and social networking sites are some of the other technologies that might cause privacy concerns. Most cell phones have GPS capabilities that can be used to track a person’s movement – and such information is often collected by “apps” that then send it to advertisers. GPS data is also stored by cell phone service providers. Social networking sites are another technology that creates privacy concerns. The personal information that people post on social networking sites may facilitate identity theft. 12.5
What is a digital certificate? Go to www.amazon.com.au and find the following information regarding the digital certificate on the Australian site of Amazon: the date range for which the certificate is valid, the signature algorithm used, and the public key of the certificate. A digital certificate is an electronic document that certifies the identity of the owner of the specific public key and it also contains the public key of the owner. [It can be found by right-clicking on the padlock in the address bar and viewing the certificate details.] The information regarding the Australian version of the Amazon site (at the date of publishing), is as follows: date range for which the certificate is valid: 1 April 2019 – 16 March 2020 signature algorithm used: sha256RSA public key of the certificate: RSA (2048 Bits)
12-2 .
Accounting Information Systems 15e, GE
12.6
What is hashing and how does it differ from encryption? Why do you think an organization would want to use hashing? Hashing is the process of taking human-readable text and creating a short code, called a hash. The size of the document / file that is hashed is immaterial as the hash for a specific algorithm is always the same size – e.g. if you use the SHA-512 algorithm, the output will always be a 512-bit hash, regardless of the size of the input document. Hashing differs from encryption in that a hashing algorithm simply returns a hash value; it does nothing to the input file. A hash cannot be reversed; thus, you cannot take the hash value and covert it back to the original input file. Encryption is reversible, since encryption changes human-readable documents from plaintext to ciphertext, which humans cannot read, while decryption takes the ciphertext and converts it back to the original input file / document. The output of encryption is roughly the same size as the input text (e.g. a 5-page document will be a 5-page encrypted document; a one-line input will be encrypted as a one-line output). Hashing does thus not protect the confidentiality or privacy of the information – hashing ensures the integrity of the document / file that was transmitted. Hashing ensures that the delivered file is identical to the original (if the hash values of the two files are identical).
12-3 .
Ch. 12: Confidentiality and Privacy Controls
SUGGESTED SOLUTIONS TO THE PROBLEMS 12.1
Match the terms with their definitions:
1. _e__ Virtual Private Network (VPN) 2. _l__ Data Loss Prevention (DLP) 3. _b__ Digital signature 4. _k__ Digital certificate 5. _f__ Data masking 6. _q__ Symmetric encryption 7. __h_ Blockchain 8. __j_ Plaintext 9. _m__ Hashing 10. _n_Ciphertext 11. _s__Information rights management (IRM) 12. _c_ Certificate authority 13. _r__ Nonrepudiation 14. _d__ Digital watermark 15. _p__ Asymmetric encryption 16. _o_ Key escrow
17. _a__ Nonce
a. Random number used to validate a new block in a blockchain b. A hash encrypted with the creator’s private key c. Company that issues pairs of public and private keys and verifies the identity of the owner of those keys d. Secret mark used to identify proprietary information e. Encrypted tunnel used to transmit information securely across the Internet f. Replacing real data with fake data g. Unauthorized use of facts about another person to commit fraud or other crimes h. Distributed ledger of hashed documents i. Process of turning ciphertext into plaintext j. Document or file that can be read by anyone who accesses it k. Used to store an entity’s public key, often found on web sites l. Procedure to filter outgoing traffic to prevent confidential information from leaving m. Process that transforms a document or file into a fixed length string of data n. Document or file that must be decrypted to be read o. Copy of an encryption key stored securely to enable decryption if the original encryption key becomes unavailable p. Encryption process that uses a pair of matched keys, one public and the other private; either key can encrypt something, but only the other key in that pair can decrypt q. Encryption process that uses the same key to both encrypt and decrypt r. Inability to unilaterally deny having created a document or file or having agreed to perform a transaction s. Software that limits what actions (read, copy, print, etc.) can be performed by users granted access to a file or document
12-4 .
Accounting Information Systems 15e, GE
12.2
Your university or college has a record of various types of information. Give examples of the following and explain why. a. Information that needs to be kept confidential. b. Information that should be kept private. The focus here is to see if the student knows the difference between confidentiality and privacy. Confidentiality requires organizational data to be protected while privacy concerns information regarding individuals. Students will probably have a variety of answers here. Example of information that would need to be kept confidential: University intellectual property, such as research in progress; legal documentation; tender documents. Example of information that would need to be kept private: Staff personal details; student personal details; student financial records; student academic records.
12.3
Download a hash calculator from the course website (or use one provided by your instructor) or use an online hash calculator for this exercise. Use it to create SHA256 (or any other hash algorithm your instructor assigns) hashes for the following: a. A document that contains this text: “I will pay you $10.39 to walk the dog.” b. A document that contains this text: “I will pay you $1039 to walk the dog.” c. A document that contains this text: “I will pay you $10.39 to walk the Dog.” d. A document that contains this text: “I will pay you $10.39 to walk the dog.” (Note: this message contains two spaces between the words “to” and “walk”). e. Make a copy of the document used in step a, and calculate its hash value. f. What do the results of steps a–d show? g. What does comparing the hash from step a to the hash from step e tell you? Many different hash calculators exist, both for download and online use. One good source is download.cnet.com. Steps a-e: the exact hash values will depend upon the nature of the source document (Word, NotePad, etc.) so you may want to ask students to report what they used so that you can verify the results. Step f: The key point is that any change, no matter how minute, changes the hash value. Step g: Comparing steps a and e illustrates how the exact same file on two different machines yields the exact same hash.
12-5 .
Ch. 12: Confidentiality and Privacy Controls
12.4
Accountants often need to print financial statements with the words “DO NOT COPY” appearing in light type in the background. a. Create a watermark with the phrase “DO NOT COPY” in a Word document. Print out a document that displays that watermark.
In Word, the Page Layout menu contains an option to create a watermark.
When you click on the Watermark choice, a drop-down menu presents an array of built-in options for using the phrase “DO NOT COPY” as a watermark.
12-6 .
Accounting Information Systems 15e, GE
b. Create the same watermark in Excel, and print out a spreadsheet page that displays that watermark. Excel does not have a built-in watermark facility. However, if you search for information about watermarks in Excel’s help function, you learn that you have two options:
12-7 .
Ch. 12: Confidentiality and Privacy Controls
12-8 .
Accounting Information Systems 15e, GE
. 12-9 .
Ch. 12: Confidentiality and Privacy Controls
c. Can you make your watermark “invisible” so that it can be used to detect whether a document containing sensitive information has been copied to an unauthorized location? How? How could you use that “invisible” watermark to detect violation of copying policy? If you make the text of the watermark white, then it will not display on the screen. To make the watermark visible in Word, on the Page Layout menu select the “Page Color” option and set the color to something dark to reveal the “invisible” white watermark. In Excel, you would select all cells and then change the fill color to something dark to reveal the “invisible” white watermark.
12-10 .
Ch. 12: Confidentiality and Privacy Controls
12.5
Create a spreadsheet to compare current monthly mortgage payments versus the new monthly payments if the loan were refinanced, as shown:
Restrict access to the spreadsheet by encrypting it. In Excel 2007, choose Prepare and then Encrypt Document.
12-11 .
Ch. 12: Confidentiality and Privacy Controls
Then select a password, and be sure to remember it:
12-12 .
Accounting Information Systems 15e, GE
Further protect the spreadsheet by limiting users to the ability to select and enter data only in the six highlighted cells. To protect the two cells that contain the formula (shown below with red boxed borders): a. Select the cells that users are allowed to change (cells D6:D8 and D11:D13) b. Under the Format drop-down menu, select format cells
12-13 .
Ch. 12: Confidentiality and Privacy Controls
Then uncheck the box next to “Locked” as shown below, because these are going to be the only cells we do not protect in the next step.
12-14 .
Accounting Information Systems 15e, GE
Now, under the Format drop-down menu, select “Protect Sheet” and then a) enter a password, and b) uncheck the box “Select locked cells”. This will protect the entire sheet EXCEPT for the cells you unlocked in the previous step – users can only move between the six unlocked cells! BE SURE TO REMEMBER YOUR PASSWORD – it is the only way to unlock the spreadsheet.
12-15 .
Ch. 12: Confidentiality and Privacy Controls
12.6 Visit Symantec.com or any other security software vendor assigned by your instructor and download a trial version of encryption software. a. Use the software to encrypt a file. b. Send the encrypted file to your instructor and to a friend. c. Try to open an encrypted file you receive from your friend or from your instructor. Print a screenshot to show what happens. d. List all the options for importing the key needed to decrypt an encrypted file you receive from your friend or instructor. Which do you think is most secure? Easiest? Explain why. e. Import (or install) the key needed to decrypt an encrypted file you receive from your friend or instructor. E-mail the decrypted file to whomever sent it to you and obtain verification that it is the plaintext version of the encrypted file they sent you. Solutions will vary depending upon the student’s computer and version of operating system and the encryption software used. To grade: a. Require submission of a file. b. Verify that the file submitted is indeed encrypted by trying to open it in Word, Excel and/or a text editor. If you cannot, it was encrypted. c. Require submission of a screenshot and inspect to verify that the student really could not open the encrypted file. d. Multiple solutions exist – the student should list at least some of the following: Via a USB from the creator. May be impractical, may contain viruses, etc. Typing in as you talk on the phone or from a text message. May be relatively secure, but likely to have typos. Email copy/paste. Easy, but not secure. Visiting the sender’s website and obtaining their public key. Complex and unlikely to be practical for most individuals. e. Easiest for you to test on a file sent to you so you can verify that it worked.
12-16
Accounting Information Systems
12.7
Individuals’ increased presence on social networking sites and the use of the Internet has not only enabled them to communicate more effectively but has also increased the risk of a breach of privacy. Perform the following experiments, and write a report on the impression a person might develop if they track you on the Internet: a. Go to any search engine and search for your name. How many results show up? Search for images with your name. How many of the images that show up are yours? Suggest ways to minimize the number of times a search engine actually tracks your name or photos. Answers will vary. b. It is often claimed that Facebook is a threat to our privacy. Do you agree? Explain your answer. Answers will vary.
12.8
Practice encryption using any encryption capabilities provided by your computer’s operating system and third-party encryption software. Required: a. Use your computer operating system’s built-in encryption capability to encrypt a file. In Word 2016, you can encrypt the document by choosing the option “encrypt with Password” under the protect Document option, part of the Info section of the File tab.
You will then be prompted for a password to protect that file.
12-17 .
Ch. 12: Confidentiality and Privacy Controls
You can also encrypt an existing file by right-clicking on its name in a directory list and then choosing Properties, which brings up this pop-up window:
12-18 .
Accounting Information Systems
Clicking on the Advanced button brings up this dialog box:
Select the box “Encrypt contents to secure data” and follow the directions. Create another user account on your computer and log in as that user. In Windows, there are two ways to create new user accounts. One way is to open the Control Panel and select the option “User Accounts”. This brings up the following screen:
Select the “Manage User Accounts” and then click the “Add” button. You will then be prompted to give a name to your new user account and decide whether it is a standard user or an account with administrative rights. For purposes of this exercise, 12-19 .
Ch. 12: Confidentiality and Privacy Controls
just create a standard user.
12-20 .
Accounting Information Systems
Method 2: Open the Control Panel, choose “Administrative Tools and then select “Computer Management”:
Double-click on Computer Management and then click on the Users and Groups:
12-21 .
Ch. 12: Confidentiality and Privacy Controls
Now, click on the “Users” folder in the left pane, and then click on the “Action” menu item at the top and select the option “New user”:
Fill in the screen, giving your new user a name and password. It will probably be easiest for this assignment to not force the new user to change passwords. Also, uncheck the box “Account is disabled” so that you can do the rest of this exercise.
12-22 .
Accounting Information Systems
Which of the following actions can you perform? 1. Open the file 2. Copy the file to a USB drive. 3. Move the file to a USB drive. 4. Rename the file. 5. Delete the file ADDITIONAL NOTE TO INSTRUCTORS: Tell students to save the encrypted file in a shared directory that is accessible to all users who log onto that system. That way, even a standard user will be able to see the files. Solutions may vary depending upon the computer’s operating system. In Windows, a standard user who did not create the encrypted file will not be able to open, copy, or move the encrypted file to a USB drive – but is able to rename or delete it. This demonstrates that encryption is not a total solution – if someone has physical access to a computer that has encrypted files on it, they may not be able to read that file but they can destroy it. Thus, physical access controls are also important. In Windows, if a student creates another user account with Administrative privileges, that account will also not be able to open, copy or move the encrypted file to a USB drive – but can rename or delete it. One other difference is that a user with administrative privileges can also open up other user’s profiles. IMPORTANT NOTE TO INSTRUCTORS: Tell students to delete the new user account that they created to do this problem after they finish the assignment. c. Download and install a copy of an other encryption software program recommended by your instructor. Use the software to encrypt some files on a USB drive and then try to perform the same five actions listed in requirement a. d. Write a brief report that compares the third-party encryption software’s functionality to that of the built-in encryption functionality provided by your computer’s operating system. Which is easier to use? Why? What are the limits (in terms of performing the five tasks) of each? Answers will vary, but students will most likely note that 3rd party encryption tools provide many additional features not found in their operating system’s encryption function. 12.9 Explore As a preventive control, encryption is used to protect both confidentiality and privacy.In the first quarter of 2019, Facebook was considering adding end-to-end encryption across all its messaging services. At the time, this included WhatsApp, Messenger, and direct chats on Instagram. a. Read up on the proposed end-to-end encryption. b. Write a brief report on the benefits of such end-to-end encryption for the end user, such as those using the different messaging apps provided by Facebook. Include all the research papers, journals, news articles, or websites you have 12-23 .
Ch. 12: Confidentiality and Privacy Controls
cited in your report. At the time of writing, these two articles were useful: https://www.popsci.com/facebookend-to-end-encryption and https://www.theverge.com/2019/1/25/18197222/facebookmessenger-instagram-end-to-end-encryption-feature-zuckerberg. Students should be encouraged to look at the most recent data available online. If end-to-end encryption is implemented, the main benefits for the end user include:
Encryption takes place on both sides (both ends of the communication channel), thus the messages cannot be intercepted, interpreted, or read. This means that Facebook will no longer be able to use information sent via the messaging apps to target customers with targeted ads. Users will be able to send messages across the different platforms – thus you will be able to send a secure message from WhatsApp to a contact in Instagram; and the message will be transmitted securely, without the possibility of it being intercepted. On the other hand, it could be possible that Facebook might set a limit on how many times a message can be forwarded on a platform (since there is no way to track / moderate the content that is sent on the platforms). It is important to note that the message content will be encrypted in end-to-end encryption, but not the additional (meta) data that is part of what is transmitted. The sender, receiver, and the time the message was sent will be visible to whoever wants to scrutinize it. Backups of phone information, for example (especially if the backup is made to the cloud) could potentially lead to security breaches, as companies such as Apple have access to iPhone information stored on the iCloud. Also, when backups are accessible, so would be the information inside the backup. 12.10 Explore Explain why digital certificates are more important for enterprises than for individuals. What types of digital certificates are usually issued by commercial certificate authorities such as Thawte and Verisign? What is the process called? Solutions will vary depending upon the specific certificate authorities the student investigates. Students will most likely choose Verisign, GoDaddy, Entrust, Equifax, Deutsche Telekom, and Thawte. These certificate authorities (CAs) issue several types of certificates. For example, the Verisign site has a white paper called “Beginners Guide to SSL certificates” that includes the following explanation: DIFFERENT TYPES OF SSL CERTIFICATE There are a number of different SSL Certificates on the market today. 1.
The first type of SSL Certificate is a self-signed certificate. As the name implies, this is a certificate that is generated for internal purposes and is not issued by a CA. Since the web site owner generates their own certificate, it does not hold the same weight as 12-24 .
Accounting Information Systems
2.
3.
a fully authenticated and verified SSL Certificate issued by a CA. A Domain Validated (DV) SSL Certificate is considered an entry-level SSL Certificate and can be issued quickly. The only verification check performed is to ensure that the applicant owns the domain (web site address) where they plan to use the certificate. No additional checks are done to ensure that the owner of the domain is a valid business entity. A fully authenticated SSL Certificate is the first step to true online security and confidence building. Taking slightly longer to issue, these certificates are only granted once the organization passes a number of validation procedures and checks to confirm the existence of the business, the ownership of the domain, and the user’s authority to apply for the certificate.
All VeriSign® brand SSL Certificates are fully authenticated. 4.
5.
6.
7.
8.
Even though an SSL Certificate is capable of supporting 128-bit or 256-bit encryption, certain older browsers and operating systems still cannot connect at this level of security. SSL Certificates with a technology called Server-Gated Cryptography (SGC) enable 128- or 256-bit encryption to over 1212.12% of web site visitors. Without an SGC certificate on the web server, browsers and operating systems that do not support 128-bit strong encryption will receive only 40- or 56-bit encryption. Users with certain older browsers and operating systems will temporarily step-up to 128-bit SSL encryption if they visit a web site with an SGC-enabled SSL Certificate. For more information about SGC please visit: www.verisign.com/sgc. A domain name is often used with a number of different host suffixes. For this reason, you may employ a Wildcard Certificate that allows you to provide full SSL security to any host of your domain—for example: host.your_domain. com (where “host” varies but the domain name stays constant). Similar to a Wildcard Certificate, but a little more versatile, the SAN (Subject Alternative Name) SSL Certificate allows for more than one domain to be added to a single SSL Certificate. Code Signing Certificates are specifically designed to ensure that the software you have downloaded was not tampered with while en route. There are many cyber criminals who tamper with software available on the Internet. They may attach a virus or other malicious software to an innocent package as it is being downloaded. These certificates make sure that this doesn’t happen. Extended Validation (EV) SSL Certificates offer the highest industry standard for authentication and provide the best level of customer trust available. When consumers visit a web site secured with an EV SSL Certificate, the address bar turns green (in high-security browsers) and a special field appears with the name of the legitimate web site owner along with the name of the security provider that issued the EV SSL Certificate. It also displays the name of the certificate holder and issuing CA in the address bar. This visual reassurance has helped increase consumer confidence in ecommerce.
12.11 Answer all of the following multiple-choice questions:
12-25 .
Ch. 12: Confidentiality and Privacy Controls
1. Websites often provide a link to the organization’s privacy policy. Doing so most directly satisfies the requirements of the section of GAPP referred to as _____. a. management b. notice c. quality d. collection Correct answer: b. 2. Which of the following factors increase the strength of an encryption solution? a. Securely storing encryption keys somewhere other than in the browser. b. Keeping the encryption algorithm secret. c. Using a 24-bit encryption key. d. All three options increase the strength of an encryption solution. e. None of the three factors increase the strength of an encryption solution. Correct answer: a. 3. Able wants to send an encrypted document to Baker as an email attachment. If Able wants to securely send Baker the key to decrypt the document, Able should encrypt the key using: a. Able's public asymmetric key. b. Able's private asymmetric key. c. Baker's public asymmetric key. d. Baker's private asymmetric key. Correct answer: c. If Able encrypts the symmetric key with Baker’s public key, Baker will be the only person who can decrypt the key and then be able to decrypt the document. . 4. Which of the following is the most important reason why it is virtually impossible for one entity in a blockchain network to unilaterally alter a document after it has been recorded and validated in a new block of transactions? a. The use of a nonce to validate each block b. The existence of multiple copies of the blockchain on many different computers c. Digital signatures d. Digital certificate Correct answer is b. As the textbook explains, it is theoretically possible to “remine” a block and find a new nonce that will validate an altered block. However, although that may be feasible to do on one device, it is virtually impossible to do so fast enough to alter every copy of the blockchain that is stored on many different devices. 5.
GAPP stresses the importance of obtaining consent when collecting, using, and sharing information about customers. If a company’s policy is to ask customers for permission to collect sensitive personal information and then only asks questions about sensitive matters (such as political beliefs or sexual orientation) after the 12-26 .
Accounting Information Systems
customer agrees to answer such questions, it is following the process referred to as _____. a. explicit consent (opt-out) b. explicit consent (opt-in) c. implicit consent (opt-out) d. implicit consent (opt-in) Correct answer: b. 6.
Which of the following statements is true? a. A file encrypted with X's private key can only be decrypted by using X's private key. b. A file encrypted with X's private key can only be decrypted using X's public key. c. A file encrypted with X's private key can only be decrypted by using Y's private key. d. A file encrypted with X's private key can only be decrypted using Y's public key.
Correct answer: b. 7.
To decrypt a digital signature, the recipient uses the _____. a. sender's private key. b. sender's public key. c. recipient's private key. d. recipient's public key.
Correct answer: b. The digital signature is a hash encrypted with the sender’s private key. Thus, it can only be decrypted using the sender’s public key. 8. When is encryption least effective in protecting the confidentiality of sensitive data? a. At rest b. While it is being processed c. While it is transmitted over the Internet d. Encryption is equally effective in protecting confidentiality at all stages of the data processing cycle. Correct answer: b. Generally, data must be decrypted to be processed. To protect confidentiality during processing requires the use of tokenization to mask the true data values. 9.
Which of the following is the most reliable way to acquire a company’s public asymmetric key to be confident it really is owned by that company? a. Obtain it from a digital signature posted on that company’s website. b. Obtain it directly from the company by means of an encrypted email. c. Obtain it from a valid digital certificate issued by a trusted certificate authority and posted on the company’s website.
12-27 .
Ch. 12: Confidentiality and Privacy Controls
d. Obtain it directly from the company via a USB delivered by a trusted delivery service (e.g., FedEx, UPS, or DHL). Correct answer is c. As the textbook explains, the safest way to be sure of the identity of the owner of a public key is to obtain it from a valid digital certificate signed by a trusted certificate authority. You cannot obtain a public key from a digital signature (you need the public key to decrypt the signature). Options b and d are not as reliable as option c because it is possible that a criminal posing as the company could send you a public key through those two methods. 10. The system used to issue pairs of asymmetric encryption keys and digital certificates is called a _______. a. VPN b. key escrow c. PKI d. tokenization or data masking Correct answer is c. A public key infrastructure (PKI) is the system whereby trusted certificate authorities create pairs of public and private asymmetric keys and distribute the public keys via digital certificates. A Virtual Private Network (VPN) is an encrypted tunnel for securely sending information across the public Internet. Key escrow is a way to back up encryption keys so that they are accessible if the owner is no longer around to decrypt something. Tokenization or data masking replaces sensitive data with arbitrary strings of characters of the same length and type so that the data can be processed but the people doing the processing cannot “snoop” on the sensitive data.
SUGGESTED SOLUTIONS TO THE CASES Case 12-1
Protecting Privacy of Tax Returns
The department of taxation in your state is developing a new computer system for processing individual and corporate income-tax returns. The new system features direct data input and inquiry capabilities. Identification of taxpayers is provided by using the Social Security number for individuals and federal tax identification number for corporations. The new system should be fully implemented in time for the next tax season. The new system will serve three primary purposes: 1 Tax return data will either be automatically input directly into the system if the taxpayer files electronically or by a clerk at central headquarters scanning a paper return received in the mail. 2 The returns will be processed using the main computer facilities at central headquarters. Processing will include four steps: a. Verifying mathematical accuracy b. Auditing the reasonableness of deductions, tax due, and so on, through the use of edit routines, which also include a comparison of current and prior years’ data. 12-28 .
Accounting Information Systems
3
c. Identifying returns that should be considered for audit by department revenue agents d. Issuing refund checks to taxpayers Inquiry services. A taxpayer will be allowed to determine the status of his or her return or get information from the last three years’ returns by calling or visiting one of the department’s regional offices, or by accessing the department’s web site and entering their social security number.
The state commissioner of taxation and the state attorney general are concerned about protecting the privacy of personal information submitted by taxpayers. They want to have potential problems identified before the system is fully developed and implemented so that the proper controls can be incorporated into the new system. Required Describe the potential privacy problems that could arise in each of the following three areas of processing, and recommend the corrective action(s) to solve each problem identified: a. Data input b. Processing of returns c. Data inquiry [CMA examination, adapted]
12-29 .
Ch. 12: Confidentiality and Privacy Controls
a. Privacy problems that could arise in the processing of input data, and recommended corrective actions, are as follows:
Problem
Controls
Unauthorized employee accessing paper returns submitted by mail.
b.
Restrict physical access to room used to house paper returns and scanning equipment by
Using ID badges or biometric controls
Logging all people who enter.
Unauthorized employee accessing the electronic files.
Multi-factor authentication of all employees attempting to access tax files.
Interception of tax information submitted electronically.
Encrypt all information submitted to the tax website.
Privacy problems that could arise in the processing of returns, and recommended corrective actions, are as follows:
Problem
Controls
Operator intervention to input data or to gain output from files.
Limit operator access to only that part of the documentation needed for equipment operation. Prohibit operators from writing programs and designing the system. Daily review of console log messages and/or run times. Encryption of data by the application program.
Attempts to screen individual returns on the basis of surname, sex, race, etc., rather than tax liability.
Training about proper procedures Multi-factor authentication to limit access to system. Encrypt of tax return data stored in system
12-30 .
Accounting Information Systems
c.
Privacy problems that could arise in the inquiry of data, and recommended corrective actions, are as follows:
Problem
Controls
Unauthorized access to taxpayer information on web site
Strong authentication of all people making inquiries via the web site using something other than social security numbers – preferably multi-factor, not just passwords. Encryption of all tax return data while in storage Encryption of all traffic to/from the web site
Unauthorized release of information in response to telephone inquiry
Training on how to properly authenticate taxpayers who make telephone inquiries
Disclosure of taxpayer information through improper disposal of old files
Training on how to shred paper documents prior to disposal
Strong authentication of taxpayers making telephone inquiries
Training on how to wipe or erase media that contained tax return information prior to disposal
(CMA Examination, adapted)
12-31 .
Ch. 12: Confidentiality and Privacy Controls
Case 12-2 Generally Accepted Privacy Principles Obtain a copy of Generally Accepted Privacy Principles from the AICPA’s web site (www.aicpa.org). (You will find it by following this path: Under Interest Areas choose Information Management and Technology Assurance then in the upper left portion of that page in the box titled Resources select Security and Privacy and scroll down the list until you find GAPP). Use the GAPP document to answer the following questions: 1. What is the difference between confidentiality and privacy? Privacy relates to information collected about identifiable individuals. Confidentiality relates to the organization’s intellectual property and similar information it collects/shares with business partners. Regulations exist concerning responsibilities for protecting privacy; no such broad regulations exist with respect to confidentiality. 2. How many categories of personal information exist? Why? Two: personal information and sensitive personal information. Examples are provided on page 4 of the GAPP document (which is reproduced below and highlighted in yellow): Personal Information Personal information (sometimes referred to as personally identifiable information) is information that is about, or can be related to, an identifiable individual. It includes any information that can be linked to an individual or used to directly or indirectly identify an individual. Individuals, for this purpose, include prospective, current, and former customers, employees, and others with whom the entity has a relationship. Most information collected by an organization about an individual is likely to be considered personal information if it can be attributed to an identified individual. Some examples of personal information are as follows: • Name • Home or e-mail address • Identification number (for example, a Social Security or Social Insurance Number) • Physical characteristics • Consumer purchase history Some personal information is considered sensitive. Some laws and regulations define the following to be sensitive personal information: • Information on medical or health conditions • Financial information • Racial or ethnic origin • Political opinions • Religious or philosophical beliefs • Trade union membership • Sexual preferences • Information related to offenses or criminal convictions
12-32 .
Accounting Information Systems
Sensitive personal information generally requires an extra level of protection and a higher duty of care. For example, some jurisdictions may require explicit consent rather than implicit consent for the collection and use of sensitive information. Some information about or related to people cannot be associated with specific individuals. Such information is referred to as nonpersonal information. This includes statistical or summarized personal information for which the identity of the individual is unknown or linkage to the individual has been removed. In such cases, the individual’s identity cannot be determined from the information that remains because the information is deidentified or anonymized. Nonpersonal information ordinarily is not subject to privacy protection because it cannot be linked to an individual. However, some organizations may still have obligations over nonpersonal information due to other regulations and agreements (for example, clinical research and market research). The difference is that sensitive personal information can, if misused, cause significant harm or embarrassment to the individual. 3. In terms of the principle of choice and consent, what does GAPP recommend concerning opt-in versus opt-out? Sensitive personal information requires explicit consent (i.e., opt-in). Other personal information can be collected through either explicit (opt-in) or implicit (opt-out) consent. 4. Can organizations outsource their responsibility for privacy? No. The section on “Outsourcing and Privacy” on page 3 specifically states that organizations cannot totally eliminate their responsibility for complying with privacy regulations when they outsource collection, use, etc. of personal information. 5. What does principle 1 state concerning top management’s and the Board of Directors’ responsibility for privacy? It is top management’s responsibility to assign privacy management to a specific individual or team (management criterion 1.1.2). As an illustrative control for this criterion, the Board of Directors should review privacy policies at least annually. 6. What does principle 1 state concerning the use of customers’ personal information when testing new applications? It must be rendered anonymous (all personally identified information removed). 7. Obtain a copy of your university’s privacy policy statement. Does it satisfy GAPP criterion 2.2.3? Why? Answers will vary. The key point is the rationale provided as to why the policy is (not) clear and easy to understand.
12-33 .
Ch. 12: Confidentiality and Privacy Controls
8. What does GAPP principle 3 say about the use of cookies? Organizations must develop programs and procedures to ensure that if customers want to disable cookies, the organization complies with those wishes. 9. What are some examples of practices that violate management criterion 4.2.2?
Surreptitious collection of data via secret cookies or web beacons Linking information collected with information collected from other sources without notifying individuals Use of a third party to collect information in order to avoid having to provide notice to people that the organization is collecting personal information about them.
10. What does management criterion 5.2.2 state concerning retention of customers’ personal information? How can organizations satisfy this criterion? Organizations need a retention policy and must regularly inventory the information they store and delete it if no longer relevant. 11. What does management criterion 5.2.3 state concerning the disposal of personal information? How can organizations satisfy this criterion? Organizations need to destroy media with sensitive information. Note that sometimes this requires destruction of an entire file or database (e.g., cannot just destroy one track on CD or DVD). If documents are released, personal information needs to be redacted. 12. What does management criterion 6.2.2 state concerning access? What controls should organizations use to achieve this objective? Organizations need to authenticate the identity of people requesting access to their personal information. DO NOT use Social Security Numbers for such authentication. 13. According to GAPP principle 7, what should organizations do if they wish to share personal information they collect with a third party? Organizations should
Disclose that they intend to share information with third parties (management criterion 7.1.1) Provide third parties with the organization’s privacy policies (management criterion 7.1.2) Only share information with third parties that have systems in place to provide the same level of protection of privacy as the sharing organization (management criterion 7.2.2) Take remedial actions against third parties that misuse personal information disclosed to them (management criterion 7.2.4)
12-34 .
Accounting Information Systems
14. What does GAPP principle 8 state concerning the use of encryption? Personal information must be encrypted whenever transmitted (management criterion 8.2.5) or stored on portable media (management criterion 8.2.6). 15. What is the relationship between GAPP principles 9 and 10? Principle 9 stresses the importance of maintaining accurate records. Principle 10 requires that a complaint resolution process must exist. One of the most frequent causes of complaints will likely be customers discovering, when provided access as per principle 6, errors and inaccuracies in their records which the organization fails to correct on a timely basis.
12-35 .
CHAPTER 13 PROCESSING INTEGRITY AND AVAILABILITY CONTROLS SPECIAL INTRODUCTION TO EXCEL This chapter includes a number of problems that use Excel’s built-in Data Validation tool to help students better understand processing integrity controls by programming them in a spreadsheet. Some students will already be familiar with this tool, others will not. Therefore, this brief introductory tutorial may be useful as a hand-out prior to assigning the Excel questions in this chapter. The Data Validation tool is found on the “Data” tab, as shown below:
13-1 .
Ch. 13: Processing Integrity and Availability Controls Click on “Data Validation” and then choose the option “data validation”:
This brings up the following window, which can be used to design a variety of processing integrity controls that will apply to the currently selected cell (in the example above, the Data Validation controls will be applied to cell C2):
Clicking on the drop-down arrow in the “allow” box yields the following choices:
13-2 .
Accounting Information Systems 15e, GE
Any value (the cell can take numeric, text, date, etc. input) without restrictions Whole numbers only allowed Decimals allowed (but not required)
Choosing either whole numbers or decimals, yields the following additional choices:
This default window can be used to create a “range check” with minimum and maximum values. Click the drop-down arrow in the Data box to reveal other types of tests that can be created:
13-3 .
Ch. 13: Processing Integrity and Availability Controls
List – permissible values must be selected from a list that the control designer creates
The list of permissible choices can appear in a drop-down menu (if that box is checked) using values found in a set of cells in the spreadsheet (using the source field):
If the “In-cell dropdown” box is checked, the values will appear in a drop-down list when a user clicks on that cell. The list of permitted values in the drop-down box can be found in the portion of the spreadsheet as indicated in the “Source” box
If the “In-cell dropdown” box is not checked, users will still be restricted to entering values from the list indicated in the source box, but will have to manually type in those values rather than selecting from a drop-down menu.
Date – only date values Time – only time values Text Length – length of text string 13-4 .
Accounting Information Systems 15e, GE Choosing either Date, Time, or Text Length yields the same set of choices as for “whole numbers” or “decimals”, making it easy to create limit checks, range checks, size checks, etc.:
13-5 .
Ch. 13: Processing Integrity and Availability Controls Custom – formulas can be used to limit input values For example, we can create a “reasonableness test” that requires cell C2 to be less than or equal to 10 times the value in cell B2 as follows:
Once the processing integrity control has been designed, the “Input Message” tab can be used to create a message explaining the permissible input values that will appear whenever a user selects that cell:
Which yields the following:
13-6 .
Accounting Information Systems 15e, GE
Finally, the “Error Alert” tab can be used to create a meaningful error message whenever user data violates the constraints:
13-7 .
Ch. 13: Processing Integrity and Availability Controls The message can have a title, plus as much text as desired. In addition, there are three action choices: 1. Stop – the user is prohibited from inputting the erroneous data
2. Warning – the user is informed that the data is not valid, but has the option of entering it anyway.
3. Information – the user is informed that the data is not valid. Clicking OK results in the data being entered anyway; clicking cancel rejects the data.
13-8 .
Accounting Information Systems 15e, GE
SUGGESTED ANSWERS TO DISCUSSION QUESTIONS 13.1
Batch totals summarize numeric values for a batch of input records. Name three commonly applied batch totals, and explain how they are used. Batch totals summarize numeric values for a batch of input records. The following are three commonly used batch totals: 1. 2. 3.
13.2
A financial total sums a field that contains monetary values, such as the total dollar amount of all sales for a batch of sales transactions. A hash total sums a nonfinancial numeric field, such as the total of the quantityordered field in a batch of sales transactions. A record count is the number of records in a batch.
What is fault tolerance and why is it important? How do you think an organization can ensure that its systems are fault tolerant? Fault tolerance refers to the capability of a system to continue functioning, even if one or more of the hardware components of the system fail. It is important to ensure that system downtime is minimized as far as possible. While students may provide different answers, the ways in which fault tolerance can be achieved include the use of RAID, where data is written simultaneously to multiple disk drives and software embedded in hardware or combinations thereof.
13.3
What is the difference between an incremental backup and a differential backup and why would each of these be used? Which of these backup strategies do you think would be most beneficial for an organization? Defend your answer. Incremental backup: This is a type of partial backup where only the data items that had changed since the last partial backup will be backed up. This type of backup is used to create an incremental set of files, where each file will typically contain the transactions for one day (if the incremental backup is made daily). Differential backup: Also a type of partial backup, it backs up all the changes that were made since the last full backup. Each of the differential backups will thus contain the cumulative effects of all activities that had taken place since the last full backup. The selection of a backup strategy will depend on multiple factors. If it is crucial to restore data quickly, the differential mode might be preferred. If storage space and / or time is an issue, incremental backups might be preferred. Differential backups (except for the first one after a full backup) will take longer than incremental backups to complete. More storage space would also be required than in the case of incremental backups. 13-9 .
Ch. 13: Processing Integrity and Availability Controls On the one hand, restoring backups made using the differential strategy is much simpler, as the last full backup should be restored, followed by the last differential backup that was made (as this copy will contain all the changes since the last full backup). On the other hand, restoring incremental backups would mean restoring the last full backup, and then restoring each subsequent incremental backup in the correct sequence. 13.4
Define and contrast between a recovery point objective and a recovery time objective. A recovery point objective is the maximum amount of time that a firm is willing to risk the possible loss of transaction data. A recovery time objective is the maximum amount of time that a firm is willing to risk losing access to its accounting information system due to disaster.
13.5
13.6
Some Data transmission controls, like checksums and parity bits, are crucial to minimizing data transmission errors. How do checksums and parity bits identify data transmission errors? Checksums work based on creating hashes and comparing them. When data is transmitted, the device that sends the file will create a hash of the file. This hash is called a checksum. When the file is received at the destination end, the receiving device also creates a hash of the file that was received. The two hashes are compared, and if those hashes are the same, the transmission will be assumed to be accurate. If the hashes differ, the file is resent, and the process is repeated. A Parity bit is an extra bit that is added to the beginning of every character and is used to check the accuracy of the transmission. There are two basic schemes: even and odd parity. With even parity, each character will have an even number of bits with the value 1. In odd parity, it will be an uneven number of bits. On the receiving end, the device will perform parity checking, which means that it will check that the correct number of bits are set to 1 in each of the characters that was received. Why do you think that surveys continue to find that a sizable percentage of organizations either do not have formal disaster recovery and business continuity plans or have not tested and revised those plans for more than a year? Likely reasons include: Belief that “it won’t happen to us” Lack of time to develop plans Lack of money to develop plans Not important to senior management (no support for planning or testing) Risk attitude/appetite of senior management
13-10 .
Accounting Information Systems 15e, GE
SUGGESTED SOLUTIONS TO THE PROBLEMS 13.1 Match the following terms with their definitions: a. A file used to store information for long periods __r__ 1. business continuity plan (BCP) __i__ 2. completeness check __n__ 3. hash total __t__ 4. incremental daily backup __a__ 5. archive __u__ 6. field check __c__ 7. sign check
__h__ 8. cold site __e__ 9. limit check
__j__ 10. zero-balance test __m__ 11. recovery point objective (RPO) __l__ 12. recovery time objective (RTO) __o__ 13. record count __q__ 14. validity check __s__ 15. check digit verification __v__ 16. closed-loop verification __d__ 17. parity checking
of time. b. A plan that describes how to resume IT functionality after a disaster. c. An application control that verifies that the quantity ordered is greater than 0. d. A control that verifies that all data was transmitted correctly by counting the number of odd or even bits. e. An application control that tests whether a customer is 18 or older. f. A daily backup plan that copies all changes since the last full backup. g. A plan that in the event the organization's data center is unavailable, contracts for use of an alternate site that has all necessary computing and network equipment, plus Internet connectivity. h. A plan that in the event the organization's data center is unavailable, contracts for use of an alternate site that is pre-wired for Internet connectivity but has no computing or network equipment. i. An application control that ensures that a customer’s ship-to address is entered in a sales order. j. An application control that makes sure an account does not have a balance after processing. k. An application control that compares the sum of a set of columns to the sum of a set of rows. l. A measure of the length of time that an organization is willing to function without its information system. m. The amount of data an organization is willing to re-enter or possibly lose in the event of a disaster. n. A batch total that does not have any intrinsic meaning. o. A batch total that represents the number of transactions processed. p. An application control that validates the correctness of one data item in a transaction record by comparing it to the value of another
13-11 .
Ch. 13: Processing Integrity and Availability Controls data item in that transaction record. q. An application control that verifies that an account number entered in a transaction record matches an account number in the related master file. r. A plan that describes how to resume business operations after a major calamity, like Hurricane Katrina, that destroys not only an organization’s data center but also its headquarters. s. A data-entry application control that verifies the accuracy of an account number by recalculating the last number as a function of the preceding numbers. t. A daily backup procedure that copies only the activity that occurred on that particular day. u. A data-entry application control that could be used to verify that only numeric data is entered into a field. v. A data-entry application control that displays the value of a data item and asks the user to verify that the system has accessed the correct record. w. A batch total that represents the total dollar value of a set of transactions.
__p__ 18. reasonableness test
__w__ 19. financial total
13.2
Excel Problem Enter the following data into a spreadsheet and then perform the following tasks: Employee Number 468921 357942 8l6543 963248
a.
Hours worked 28 50 40 40
Pay rate 15.00 16.50 5.00 57.60
Gross Pay 420.00 825.00 200.00 2304.00
Deductions 325.00 205.00 45.00 10.00
Net pay 95.00 620.00 245.00 2294.00
Calculate examples of these batch totals: A hash total Solution: sum of the employee number or pay rate columns, since these totals have no intrinsic meaning. In this example, the error in the third employee’s number (the letter l instead of the digit 1) would prevent calculating a hash total on that column. So you could only sum the pay rate column, yielding a hash total of 94.10
A financial total Solution: sum of the hours worked (158), gross pay (3749.00), deductions (585), 13-12 .
Accounting Information Systems 15e, GE or net pay (3254.00) columns as all these results have financial meaning
A record count Solution: 4, which is a count of the rows
b.
Assume the following rules govern normal data: Employee numbers are five-digits in length and range from 10000 through 99999. Maximum pay rate is $35, and minimum is $15. Hours worked should never exceed 40. Deductions should be between 10% and 35% of gross pay. Give a specific example of an error or probable error in the data set that each of the following controls would detect:
Field check A field check on the employee number column would detect that the second row does not contain only numbers; thus, it would detect the letter “l” in the second employee number.
Limit check A limit check on hours worked would flag row 2 as an error because 50 hours worked exceeds the maximum hours worked of 40.
Range check A range check on payrate would flag errors in row 3 (the value of $5 is less than the minimum of $15) and row 4 (the value of $57.60 is greater than the maximum of $35).
Reasonableness test Comparison of deductions to gross pay would flag a potential problem in row 1 since it is not unlikely that a person being paid $420 have $325 of deductions. Similarly, row 4 would be flagged because it is unlikely that someone with gross pay of $2304 would only have $10 in deductions.
Cross-footing balance test A cross-footing balance test would detect that sum of gross pay (3749.00) minus sum of deductions (585) does not equal sum of net pay (3254.00).
c.
Create a control procedure that would prevent, or at least detect, each of the errors in the data set.
Employee number not numeric 13-13 .
Ch. 13: Processing Integrity and Availability Controls Using the data validation tool, select the cells you want to test (in the employee number column) and specify the legal limits (whole numbers beginning with 10000 through 99999) as follows:
Pay rate too high or too low This range test could be programmed using the data validation tool as follows:
Hours worked too high 13-14 .
Accounting Information Systems 15e, GE Using the data validation tool, a limit check to ensure that hours worked must be less than or equal to 40 can be designed as follows:
13-15 .
Ch. 13: Processing Integrity and Availability Controls Deductions too low or too high relative to gross pay This reasonableness test would be programmed using the data validation tool and choosing “custom” in the allow field, as follows:
Error in calculating net pay
13-16 .
Accounting Information Systems 15e, GE 13.3 Excel Problem The Scorpion Railroad provides rides on diesel and steam trains through the scenic Arizona desert. It owns 32 engines, each with a unique serial number consisting of 6 digits. Printed below are data for trips on September 10. Each trip lasts a minimum of 1.5 hours. Engine Departure Serial # Trip Date Type time Return time 173954 09/10 D 09:15 11:46 624974 09/01 S 10:25 10:23 13o856 09/10 E 12:30 16:42 442751 09/11 D 13:45 17:43 820451 09/10 DD 15:00 18:32 003876 09/10 S 15:30 15:45 Valid train codes (engine type column): D = Diesel, S = Steam a. Identify and describe any errors in the data. Five of the six records contain errors as follows: 2nd – Wrong date is used (09/01 instead of 09/10); also, return time is earlier than departure time (and thus, the duration is less than at least 1.5 hours) 3rd – serial number has the letter o instead of a zero; engine type (E) is invalid. 4th – Wrong date is used (09/11 instead of 09/10). 5th – Engine Type (DD) is invalid. 6th – Duration of trip is less than 1.5 hours. b. For each of the five data fields, suggest one or more input edit controls that could be used to detect input errors. Field 1 – Serial number: Field check to ensure only numeric data entered. Field 2 - Date of trip: Check that day, month, and year correspond to the current date. Field check that value is a date Field 3 – Train engine type used: Validity check that character is one of the legal characters (D or S, to represent diesel and steam, respectively). Field check to verify that only a single character is used. 13-17 .
Ch. 13: Processing Integrity and Availability Controls Field 4 – Departure time: Field check to verify that the field contains valid time format. Field 5 – Return time:
Field check to verify that the field contains valid time format.
Reasonableness test that return time is at least 1.5 hours later than departure time.
c. Enter the data in a spreadsheet and create appropriate controls to prevent or at least detect the input errors. Field 1 - Serial number: Field check to ensure only numeric data entered. Using the Data Validation tool in Excel (under the Data tab), assuming the data is to be entered into cell B11:
13-18 .
Accounting Information Systems 15e, GE Field 2 – Trip date: Check that day, month, and year correspond to the current date. In the data validation tool, you would select the cells you want to test and enter the date value you want to compare to, as follows:
Note: this will also flag any non-date entries.
13-19 .
Ch. 13: Processing Integrity and Availability Controls Field 3 – Engine type: Validity check that character is one of the legal characters to describe a train (D or S, for Diesel and Steam, respectively).
This assumes that the legal values (D and S) are stored in cells E10 and E11 Note that this control not only ensures that the data entered must be either a D or S, but it also prevents typing in more than one character.
13-20 .
Accounting Information Systems 15e, GE Check that only a single character is used. (field check) – note that if you use the preceding validation rule to require entry from an approved list, then this control is not necessary
Field 4 – Departure time: Field check to verify that the field contains valid time format.
Field 5 – Return time:
Field check to verify that the field contains valid time format. 13-21 .
Ch. 13: Processing Integrity and Availability Controls Same as for field 4
Reasonableness test that field 5 is at least 1.5 hours later than field 4.
d. Suggest other controls to minimize the risk of input errors.
prompting to request each required input item.
preformatting to display an input form including all required input items.
completeness check on each input record to ensure all item have been entered.
default values such as today’s date for the flight date.
closed-loop verification (member name would appear immediately after the member number)
(SMAC Examination, adapted) 13.4 Retrieve the spreadsheet from your course website and edit it to include the following controls: 1. Annual fee cannot exceed 8% of purchase cost. 2. Training costs cannot exceed $12,000 in year 0 and $3,000 thereafter. (Enter the annual training costs in cell B10 and enter initial year 0 training costs in cell D10). 13-22 .
Accounting Information Systems 15e, GE 3. Annual savings due to efficiency cannot exceed $5000, but must be zero in year 0. 4. Cell C2 (highlighted in yellow to the right of the word “Answer”) must force entry of either “YES” or “NO” – no other values can be accepted. (hint: use cells A30 and A31 as the source for a dropdown list). 5. Your name must appear in cell C3 and the cell must ensure that any name entered cannot exceed 30 characters total. 6. Cell B8 (annual fee) must NOT permit any alphabetic text. 7. The reduction in risk due to the security investment (cell B18) must range between 2% and 8%, inclusive. 8. Lock the spreadsheet so that data can only be entered in these cells (all highlighted in yellow): a. C2 b. C3 c. B8 d. B10 e. B12 f. B18 g. D10 h. A30 i. A31 Solution: See solution spreadsheet. 13.5
Answer all of the following multiple-choice questions:
1) An employee who is paid a salary of $50,000 submitted a request to withhold $50 per paycheck in voluntary deductions to a 401 (K) plan. The next weekly paycheck was for a net amount of $50. The employee was furious. Which of the following controls would be most effective in detecting this problem prior to distributing the paychecks? a. Financial total b. Size check c. Limit check d. Reasonableness test e. Record count Correct answer: d. Such a test would clearly identify that net pay is unusual. Financial totals and record counts are only useful for detecting whether batches are processed completely and correctly – the problem here is that the amount withheld from the employee is too large. But that amount would be used in both the pre- and post-processing of the batch, and thus would not catch the problem in the actual calculations. Size checks only filter out excess data input, so would not apply here. Limit checks would require setting an absolute minimum limit for all paychecks, which is not practical. 2) A control that checks whether a date is entered in the date ordered attribute is called a(n): a. Date check 13-23 .
Ch. 13: Processing Integrity and Availability Controls b. Compatibility test c. Field check d. Validity check e. Range check Correct answer: c. Field checks can be used to ensure that a field contains only a specific type of data (e.g., numeric or date). 3) A sales representative mistakenly entered a nonexistent account number into the customer number field on a sales form. As a result, the goods were shipped but the customer was never billed. Which type of control would be most effective in preventing this type of problem? a. Turnaround document b. Completeness check c. Field check d. Validity check e. Check digit verification Correct answer: d. Validity checks ensure that the account actually exists. Check digit verification only tests whether such an account number could exist, not whether it actually does exist. 4) Which type of batch total would detect the fact that exactly three time cards got lost during processing, which meant that three employees did not receive a paycheck? a. Financial total b. Record count c. Hash total d. None of the three would detect the problem e. All of the three choices would detect the problem
Correct answer: b. Financial totals and hash totals would identify that something went wrong during processing but would not specifically detect that the problem was that 3 records were lost. 5) Testing whether or not all employees are less than 65 years old would be an example of a(n): a. Reasonableness test b. Sign check c. Check digit verification d. Limit check e. Validity check Correct answer: d. Limit checks can test values against either an upper limit or a lower limit (but not both – that is what a range check does). 13-24 .
Accounting Information Systems 15e, GE 6) An employee entered the wrong account number on the memo line of the check mailed to a supplier. Consequently, another customer’s account was credited for that payment. The most effective way to prevent such problems would be to use a. Turnaround documents b. A validity check of customer account numbers c. Closed loop verification d. Check digit verification of customer account numbers Correct answer: a. Turnaround documents would totally eliminate the possibility of this type of mistake, because the customer does not enter any account number. 7) Which input control is designed to prevent a buffer overflow attack? a. Size check b. Reasonableness test c. Range check d. Field check Correct answer: a. A buffer overflow happens when too much data is entered into a field in a form. A size check would prevent this by not accepting more than the specified number of characters. 8) A data entry application control that ensures that data entered into the quantity ordered field is greater than zero is called a __________. a. Sign check b. Validity check c. Reasonableness check d. Zero-balance check e. Size check Correct answer: a. 9) An application control that compares the amount of an employee’s raise to that employee’s existing salary is called a(n): a. Limit check b. Range test c. Reasonableness test d. Check digit verification e. Size check Correct answer: c. Reasonableness tests compare two data values to one another. 10) An organization uses batch processing to update customer accounts. During the process, the computer first sorts all sales transactions by customer number. That process is done so that during batch processing, the system can perform a: a. Reasonableness test b. Completeness check 13-25 .
Ch. 13: Processing Integrity and Availability Controls c. Sequence check d. Cross-footing balance test e. Record count Correct answer: c. Batch processing is more efficient and accurate if all transactions are first sorted by the foreign key for the account so that they are in the same sequence as the primary key of the related master file.
13.6 You have been asked for advice on various backup plans available to an organization. The IT manager explained to you that there is a time frame of a maximum of 5 hours when backups can be restored and ideally the backup size should not exceed 2500 GB. All backups (regardless of the type of backup) need to be retained for an entire week. The following options are available: 1.
Option A: Daily backups conducted from Monday through Saturday • Time to perform backup: 2 hours and 30 minutes • Backup size: 500 GB • Time to restore from a backup: 2 hours
2.
Option B: Weekly full backups on Saturday evenings, plus daily differential backups (Monday through Saturday) • Time to perform full backup: 2hours and 30 minutes • Backup size: 500 GB • Time to restore from a full backup: 2 hours • Time needed for daily backup is 15 minutes for the first day and then the time increases by 20 minutes for each following day (35 minutes for the second day, 55 minutes for the third day, etc.) • Daily backup size is 90 GB on the first day, and it grows by 90 GB each day (90 GB first day, 180 GB second day, etc.) • Time to restore the differential backup is half an hour on the first day, increasing by half an hour every following day (30 minutes on day one, 60 minutes on day two, 90 minutes on day three, etc.)
3.
Option C: Weekly full backups on Saturday evenings, plus daily incremental backups (Monday through Saturday) • Time to perform full backup: 2 hours and 30 minutes • Backup size: 500 GB • Time to restore from a full backup: 2 hours • Time needed for daily backup is 20 minutes • Daily backup size is 90 GB • Time to restore each of the daily backup files is 20 minutes plus 5 minutes to find and load each incremental file after the first incremental file 13-26 .
Accounting Information Systems 15e, GE a. For each of the backup options, determine the following: 1. Time spent on backups per week 2. Storage requirements 3. Time to restore b. Consider the totals you have calculated and then propose the most appropriate backup option based on the organization’s requirements. a. Backup Plan Option A: Full Daily Backup
Time spent on backups per week 900 Minutes (6 days * 150 minutes)
Storage requirements
Time to Restore
3000 GB (6 days * 500 GB/day)
120 Minutes to restore most recent full backup 120 Minutes
Total 900 Minutes 3000 GB Option B: weekly full backup plus daily differential backup Full Weekly 150 Minutes (for the 500 GB Backup one full backup) Daily Differential Backup
350 Minutes (15 minutes first day, increasing by 20 minutes/day) = 15+35+55+75+ 95+115=230
1890 GB (90 GB for first day, 160 GB for second day, etc.)= 90+180+270+360+ 450+540=1890
Total 500 Minutes 2390 GB Option C: weekly full backup plus daily incremental backup Full Weekly 150 Minutes (for the 500 GB Backup on one full backup) Saturday Daily 120 Minutes (6 days 540 GB (6 days * 90 Incremental * 20 minutes/day) GB/day) Backup
13-27 .
120 Minutes to restore last full backup 30 to 210 Minutes (30 minutes first day, increasing by 30 minutes more each subsequent day with 210 minutes on Saturday) 30-60-90-120-180210 150-330 Minutes 120 Minutes to restore last full backup 20-145 Minutes (20 minutes per incremental file plus 5 minutes extra to find and load each additional incremental file beginning with Tuesday and ending on Saturday)
Ch. 13: Processing Integrity and Availability Controls Backup Plan Time spent on Storage requirements backups per week
Total 270 Minutes
1040 GB
Time to Restore
20+(5+20) + (5+20) + (5+20) + (5+20) + (5+20) = up to 145 minutes on Saturday 150-265 Minutes
b. Based on these totals, Option C is the only option available that meets the requirements of less than 5 hours for restoring the backups and less than 2500 GB storage space. 13.7
Which control(s) would best mitigate the following threats? a. The A company was planning on introducing fault tolerance into its system architecture but had not finalized its decision yet. In the meantime, the IT department ensured that all backups were made—full backups every Friday night and daily incremental backups. However, the main hard drive, housing all the company data, crashed. The IT department secured a replacement hard drive, but they were unable to restore the company data. Ensure that all backups are regularly tested to ensure that backups can actually be restored in the case of any disaster. Having fault tolerance (e.g. in terms of mirroring disks using RAID) could also mitigate this risk. b. A hospital’s information system is affected when one of its hard drives crashes. The information system contained all patient-related records like procedures, medication, and allergies, and without it the medical staff do not have access to crucial patient information. Fault tolerance is the important factor here. This can be managed either by real-time mirroring or RAID disks. Make use of real-time mirroring where two exact copies of the database is maintained. In the event of the failure of one data center, the other data center will simply take over and the users will not even notice the switch over. Could also make use of RAID instead of a single disk drive – data will then be written to multiple disks simultaneously. If one hard disk fails, the other simply takes over and all data would be available immediately. c
An employee intended to apply for 30 days of unpaid leave due to personal reasons through the company’s online leave portal. When the employee received 13-28 .
Accounting Information Systems 15e, GE confirmation of his leave being approved, he noticed that he had applied for 300 days, not 30. A limit check could have been used to check that the leave days fall within a prespecified range. Alternatively, a range check could be used – if the company allows only a certain number of unpaid leave days. A reasonableness check could also be used – again, this will depend on company policies. d A new inventory clerk entered a new stock item and indicated, by accident, that the reorder level should be -20. A sign test should be used for reorder level – it cannot be negative. e. Overnight, a fire broke out in the server room of a large company. Luckily the fire was quickly contained since smoke detectors were triggered, spraying water and killing the fire. The manager and IT staff member on standby were notified. They rushed to the office to ensure that the disaster recovery plan was implemented. Since damage to the server room was mostly superficial, it was possible to resume operations as soon as the file servers were up and running again. The manager and IT staff member on standby could not agree on the process of getting everything up and running again. An It is of no use if there is a disaster recovery plan (DRP) in place, but the plan is not documented appropriately with specific instructions on who should be notified (in this case, this step might have been clear) and what steps should be followed to resume operations. The DRP should also be tested periodically to ensure that changes in equipment and procedures are also recorded. f.
You are instructed to process a vendor invoice and are given only the invoice. You are told that the receiving report is not available and that you must simply make the payment. Data matching needs to be done – the vendor invoice information (amounts, quantity ordered) must match the purchase order as well as the receiving report (to indicate that the correct quantities were received).
g. You need to do a credit check on a customer before they can complete the
current transaction and find the correct account number before the system will allow you to approve the transaction. Prompting – online completeness check to see that you actually have the correct account number before approving the transaction. 13-29 .
Ch. 13: Processing Integrity and Availability Controls Closed-loop verification – checking the accuracy of the input data (for example, entering the customer surname and finding the appropriate account number, checked against an address) h. A company was taken to court by a former employee who accused one of the payroll staff members of inappropriately withholding tax information. This accusation was made after the employee left the company, and was made based on events that had allegedly occurred approximately five years prior to him leaving. The payroll manager requested information from five years ago, but was informed that backups are only made of information from the previous week. In order to satisfy legal requirements, companies need to keep archives of their information (specifically tax-related information) for a specified number of years. If this company had kept an archive (which is kept indefinitely), the information the payroll manager requested, would have been available.
i.
An accounts payable clerk paid the same invoice twice. Source documents that have been processed (such as an invoice paid in this case) should be canceled to prevent them from being processed again. Paper documents should be defaced – for example, by using a stamp that indicates “Paid”; electronic documents should be canceled by setting a flag that indicates that the document had already been processed (e.g. the invoice number should not be listed as an open invoice that had not been settled yet).
j. In several countries, electricity supply is often suspended, referred to as loadshedding or rolling blackout, during specific set times to balance the supply-anddemand on the power grid. Unfortunately, often the load-shedding is not managed according to the scheduled time, and companies face problems with their database servers. The first step would be to install an uninterruptible power supply (UPS) to provide protection in the event of a power failure (or load-shedding, in his case). The UPS should allow enough time for the system to at least be powered down gracefully in the event of an extended power outage. It is important to regularly check the batteries in the UPS to ensure that it will function when needed. In cases of long power outages, it would be best to have backup generators. k. A batch of sales transactions was sent to headquarters for processing overnight. Some data transmission error occurred and one of the sheets containing sales transactions was lost. This mistake was only identified three weeks later when two unrelated events identified a problem: there was a random inventory check 13-30 .
Accounting Information Systems 15e, GE that identified a discrepancy between actual inventory and inventory sold; and a customer wanted to return a product, but even though the customer had his receipt, there was no record of the actual transaction on the system. Batch totals would have caught this. A record count would have indicated that there were several records that were not processed, or a hash total (such as the sum of the customer numbers) would have indicated a discrepancy. l. A recently appointed data entry clerk was under pressure to finish off a large batch of payments. In several of the amounts that had to be entered, the clerk entered the letter “l” instead of the number “1”. Field checks should be used to ensure that all characters entered in the payment amount field are actually numbers / numeric characters. m. Your company received notice that your account at one of your suppliers is overdue. You do, however, have a record of the payment that was made. When you furnished the supplier’s accounting department with the proof of payment, the accounts receivable clerk apologized and said there was a typing error where two digits of your account number were transposed. Check digit verification on your account number at the accounts receivable section of your supplier should pick this up. If the incorrect account number (with the transposed digits) does not belong to another customer, a validity check for actual customers would also have picked this up. On the other hand, if the incorrect customer number did belong to another customer, closed loop verification could be used to ensure that the payment is recorded against the correct account. n. A credit bureau manager contacted you regarding their backup procedures. He explained that one of the DVDs on which their full backups were made in plain text had gone missing, and he is worried what might happen if the DVD fell in the wrong hands. Two days later the disk was found under a desktop machine. What advice about controls would be appropriate in this case? Backup data should be encrypted. o. A newly appointed employee who had just emigrated from England was entering sales data, including the date the sales were made. The employee was used to dates being in the date-month-year format and entered all the dates accordingly. The system the employee used had been set up to accept dates in the monthdateyear format. Field checks can be used to ensure the dates are in the appropriate format. 13-31 .
Ch. 13: Processing Integrity and Availability Controls p. A small business owner that manages his finances in a spreadsheet program asked if you could assist him with some of his calculations. There was a recent case where the value added tax (VAT) in the country was changed from 14% to 15%, and the business owner said his accountant indicated that he had incorrect VAT values in his financial reporting. He maintained that he had updated the VAT rate in his spreadsheet. This could typically be a case of “hardwiring”, where actual values were used in calculations in the spreadsheet, for example, the VAT value of 14% was entered as 14% everywhere where such calculations were made. The person working with the spreadsheet had possibly not changed all occurrences of the 14% VAT value to the new 15% value, hence the incorrect calculations. This can be prevented by having the VAT value entered once in the spreadsheet, and then reference is made to the cell where the VAT value was entered (called absolute referencing in some spreadsheet applications). If the VAT value thus changes, there is only one place where the change needs to be made.
13-32 .
Accounting Information Systems 15e, GE 13.8 During a heavy storm, lightning struck an office building that houses the data center of a small accounting firm. The lightning caused a fire that interrupted the electricity supply to the building and damaged some of the computer hardware and office equipment. The fluctuations in the power supply caused the file server to power down. All of this occurred while the backups were being made, rendering the backup unusable. To save money, the company’s backups are always made on the same storage media, re-using the same media every time a backup is made. Identify the weaknesses in the firm’s backup process and disaster recovery procedures. 1. There seems to be only one backup at any given point in time, and the storage media used for this backup is re-used with every subsequent backup. 2. There also seems to be only one copy of the backup – and this is most likely to be stored on site (in order for the media to be re-used every time). 3. Backups are not made with regular intervals – it seems as if backups are made occasionally (with no mention of the regularity thereof). 4. The UPS might not have been tested – it could be that the batteries were flat (the UPS did not work properly when the power outage occurred). 5. Backups were most likely never tested to see if it could be restored, since the same media was used for each backup. 6. There is no evidence of a disaster recovery plan – not documented nor tested.
13-33 .
Ch. 13: Processing Integrity and Availability Controls 13.9 Excel Problem 1. Create data validation rules in a spreadsheet to perform each of the following controls: a. Limit check – that values in the cell are > 30
b. Range check – that values in the cell are between 15 and 65
13-34 .
Accounting Information Systems 15e, GE
c. Sign check – that values in the cell are negative
d. Field check – that values in a cell are only numeric 13-35 .
Ch. 13: Processing Integrity and Availability Controls
The ISNUMBER function tests whether the cell contains only numeric data.
e. Size check – that cell accepts no more than 9 characters of text
f. Reasonableness check – that cell’s value is more than twice the value of the cell 13-36 .
Accounting Information Systems 15e, GE to its left Assume that the cell to be tested is C6 and the comparison cell is B6:
g. Validity check – that a value exists in a list of allowable values
13-37 .
If the preceding data validation rule was applied to cell C7, the spreadsheet would look like this:
And clicking the drop-down arrow would display the following:
13-38 .
Accounting Information Systems
2. Enter the following values into cells in your spreadsheet in a row below the last row used for the data validation rules in step 1: a. 75 b. happy Now create the following data validation rules for those two cells: i) for the cell containing the value "75" create a data validation rule that all values must be less than 50 ii) for the cell containing the word "happy" create a data validation rule that requires text to have a maximum length of 4 characters Do the validation rules work? What does that reveal about the ability to use data validation rules after data has already been entered? What happens if you apply the "Circle Invalid Data" tool to those cells? Data validation rules do not work if the cell already contains data. However, the “Circle Invalid Data” rule will identify that there is invalid data in those cells.
13-39 .
Ch. 13: Processing Integrity and Availability Controls
13-40 .
13. 10 The A pharmaceutical company runs three shifts daily: 06:00 A.M. to 2:00 P.M.; 2:00 P.M. to 10:00 P.M.; and 10:00 P.M. to 06:00 A.M. Backups and system maintenance are performed between midnight and 06:00 A.M. Consider the following scenarios and determine if the current backup procedures given in each scenario would enable the company to meet its recovery objectives. Explain your answers by providing examples of where and when the recovery objectives are met or not met. Scenario 1: The company makes two daily incremental backups Mondays to Saturdays; one at 07:00 A.M. and one at 07:00 P.M. Full weekly backups are made on Sundays at 10:00 A.M. • Recovery time objective: 270 minutes • Time to complete full backup: 120 minutes • Time to restore from a full backup: 75 minutes • Time to make incremental daily backup: 25 minutes • Time to restore each incremental backup: 15 minutes Scenario 1: Time required to restore:
From Sunday’s full backup: 75 minutes Time to restore Monday’s first incremental backup: 15 minutes Time to restore Monday’s second incremental backup: 15 minutes Time to restore Tuesday’s first incremental backup: 15 minutes Time to restore Tuesday’s second incremental backup: 15 minutes Time to restore Wednesday’s first incremental backup: 15 minutes Time to restore Wednesday’s second incremental backup: 15 minutes Time to restore Thursday’s first incremental backup: 15 minutes Time to restore Thursday’s second incremental backup: 15 minutes Time to restore Friday’s first incremental backup: 15 minutes Time to restore Friday’s second incremental backup: 15 minutes Time to restore Saturday’s first incremental backup: 15 minutes Time to restore Saturday’s second incremental backup: 15 minutes Total time taken at this point to restore Sunday’s full backup and incremental backups for each day Monday - Saturday: 75 minutes + 30 minutes per day * 6 = 255 minutes Even if the entire week’s backups had to be restored, it will still fall within the 270 minutes recovery time objective, which meets the objectives. Scenario 2: Differential backups are made Monday – Saturday at 11:00 P.M. each night. Full weekly backups are made on Sundays at 10:00 A.M. Recovery time objective: 240 minutes • Time to complete full backup: 240 minutes • Time to restore from a full backup: 150 minutes • Time to make differential daily backup: 45 minutes on Monday, increasing by 15 minutes each successive day • Time to restore differential daily backup: 15 minutes for Monday, increasing By 8 minutes each successive day. 13-41 .
Ch. 13: Processing Integrity and Availability Controls
Scenario 2: Time required to restore:
Time to restore from Sunday’s full backup: 150 minutes Time to restore Monday’s backup: 15 minutes Time to restore Tuesday’s backup: 23 minutes Time to restore Wednesday’s backup: 31 minutes Time to restore Thursday’s backup: 39 minutes Time to restore Friday’s backup: 47 minutes Time to restore Saturday’s backup: 55 minutes
The longest time taken to restore would be Sunday’s full backup of 150 minutes plus the 55 minutes of Saturday for a total of 205 minutes – thus, even if there is a disaster and everything needs to be restored, the recovery time will be met. Scenario 3: Time required to restore backups: Recovery point objective 5 18 hours • Daily backups at midnight • Backup process takes 150 minutes during which two sets of tape copies are created • The off-site backup tape copies are collected every morning at 05:00 A.M. for off-site storage For any given day, backups are made at midnight and the backup process finishes at 02:30. If any disaster occurred before 05:00 when the off-site backup copy is collected, the entire 24 hours’ worth of data would be lost; meaning that the recovery point objective of 18 hours would not be met. 13.11 Answer all of the following multiple-choice questions: 1) A tsunami destroys an organization’s headquarters and its main warehouse. Which of the following documents would contain instructions on how to respond to that problem? a. DRP b. BCP Correct answer: b. 2) A company makes full backups every Friday night and partial backups on Mondays, Tuesdays, Wednesdays, and Thursdays. Which of the following is true?
13-42 .
Accounting Information Systems
a. On Wednesday, it would take less time to do an incremental backup than a differential backup, but it would take more time to restore the system from incremental backups than from differential backups b. On Wednesday, it would take less time to do an incremental backup than a differential backup, and it would also take less time to restore the system from incremental backups than from differential backups c. On Wednesday, it would take more time to do an incremental backup than a differential backup, but it would take less time to restore the system from incremental backups than from differential backups d. On Wednesday, it would take more time to do an incremental backup than a differential backup, and it would also take more time to restore the system from incremental backups than from differential backups Correct answer: a. 3) Which of the following statements is true? a. If a company needs to keep a copy of tax-related data about the costs of its manufacturing facility indefinitely, it should archive that information. b. Archives should be encrypted, but backups should not be encrypted. c. The way to recover after a hard drive fails is to restore the most recent archive of the database. d. Best practice for backup and recovery is to have two copies of an archive, one on-site and the other off-site. e. None of the statements above are true. Correct answer: a. Statements b-d apply to backups, not archives.
4) Fault tolerance procedures/devices/controls contribute to achieving the system reliability objective referred to as _____________. a. Confidentiality b. Privacy c. Processing Integrity d. Availability e. Security Correct answer: d.
5) An organization leases a building that is prewired for both telephone and Internet access. It also signs a contract with Dell in which Dell promises to deliver 30 servers and 25 desktop machines, all configured with the latest version of Windows, within 24 hours of being asked to do so. The organization has adopted the approach to disaster recovery and business continuity that is referred to as a 13-43 .
Ch. 13: Processing Integrity and Availability Controls
b. Hot site c. Cold site d. Real-time mirroring Correct answer: b. 6) Which of the following disaster recovery options is most appropriate when the values for both RTO and RPO are 2 days or longer? a. Hot site b. Cold site c. Real-time mirroring Correct answer: b. 7) Which measure is primarily designed to determine the frequency of making backups? a. RPO b. RTO Correct answer: a.
8) Which of the following approaches to the issue of availability produces the smallest RTO and RPO? a. Hot site b. Cold site c. Real time mirroring d. All of the above result in the same RTO and RPO Correct answer: c.
9) Which of the following statements is true? a. Deduplication encourages organizations to switch to making differential instead of incremental partial backups. b. Deduplication encourages organizations to switch to making incremental instead of differential partial backups. c. Deduplication encourages organizations to switch to making incremental partial backups instead of full backups. d. Deduplication encourages organizations to switch to making differential partial backups instead of full backups. Correct answer: c.
13-44 .
Accounting Information Systems
SUGGESTED ANSWERS TO THE CASES Case 13-1 Ensuring Systems Availability Many organizations are often in the news because of failed disaster recovery and failed business continuity planning. In June 2019, Vodafone had a major outage where customers had issues with mobile data and broadband services. At the time of writing, limited information was available about the event: 1. Sophie Curtis, “Vodafone DOWN: Mobile and Home Broadband Customers Unable to Access Network,” Mirror (June 2019) (https://www.mirror. co.uk/tech/breakingvodafone-down-mobile-broadband-16512733). 2. James Sillars, “Vodafone Services Worldwide Hit by Internet Failure,” SkyNews (June 2019) (https://news.sky.com/story/vodafone-glitch-reportedacross-large-partsof-europe-11741189). Google was in the news in June 2019 for an outage that affected several customers, including Vimeo, Pokémon GO, and Snapchat. At the time of writing, information on this event could be found at a variety of sites, including 3. Liam Tung, “Google Details ‘Catastrophic’ Cloud Outage Events: Promises to do Better Next Time,” DZNet (June 2019) (https://www.zdnet.com/article/googledetails-catastrophic-cloud-outage-eventspromises-to-do-better-next-time/). 4. Lisette Voytko, “Major Outage Brings Down Discord, Reddit, Amazon And More,” Forbes (June 2019) (https://www.forbes.com/sites/lisettevoytko/ 2019/06/24/majoroutage-brings-down-discord-reddit-amazon-and-more/#731ee9a030a4). Required: a. Review the incidents at Vodafone and Google and explain the main cause of the outages. Discuss why the disaster recovery or business continuity plans were not sufficient to prevent the widespread outages. At the time of writing, the information on the Vodafone event was sketchy, with most sites reporting the failure of an international link and possibly a problem with the DNS servers at Vodafone. This failure caused disruptions across Europe, and as far afield as India and Australia. Vodafone merely indicated that their engineers were working to solve the problem, and that customers could try some technical workaround solutions – these were most notably useful for tech-savvy users; but for the average user the workaround would not be useful, as they might not know where and how to change DNS 13-45 .
Ch. 13: Processing Integrity and Availability Controls
settings on their devices to access the Internet via another link. At the time of writing, there was no specifics giving clarity as to why the disaster recovery plans were not sufficient to prevent the outage from taking place. In all likelihood (as with Google below) it was a case of the disaster recovery plans not being tested for all possible eventualities. Information about the incident at Google could readily be accessed from the links provided in the question. It seems as if the outage was caused by a configuration change – this configuration change (a software update) was planned for a specific set of servers in one region, but the configuration change was applied to more servers across multiple regions. The incorrect configuration change happened because of a bug in the automation software that manages the configuration changes. This change impacted the capacity of the available bandwidth of the affected parties. What was supposed to assist Google in the event of reduced network capacity actually caused more issues in this case – when the failure was detected and a response was initiated, the congested network ended up being even more congested. The automation software rescheduled jobs, using bandwidth that should have been available for other jobs, adding to the network congestion. Google had vast backup plans and resources available, but despite having them in place, Google’s communication tools were damaged, and engineers could not communicate properly with their customers. Google had reportedly indicated that the emergency response tools and procedures had to be reviewed. This review would have to include updates and retesting to ensure that this kind of failure would not cripple Google operations again.
The disaster recovery plans have probably not been tested for scenarios like this one, and therefore even the timely detection of the problem could not prevent the widespread outages. b. What Find at least one example of a company where solutions were put in place (either by the company itself or by an outsourced company) to ensure that failures like the ones at Vodafone and Google do not cripple the organization. Explain what was done to ensure that systems are always available. This question can typically be answered by reviewing case studies published by companies offering solutions to organizations. One such a solution is that of Lyco – see https://www.kalamazooit.co.uk/case_studies/lyco/ Lyco required a solution where their increased data volumes had to be stored securely (on- and off-site). Data had to be available 24/7.Using vaulted data across multiple sites, it was possible to cater for basically any event. In the case of Lyco, the recovery point 13-46 .
Accounting Information Systems
was 1 hour or less. The way in which this was made possible was that Lyco outsourced their recovery solution by means of a hybrid disaster recovery as a service solution offered by a third party. Case 13-2 Ensuring Process Integrity in Spreadsheets Obtain a copy of the article “How to debug Excel spreadsheets” by Rayman Meservy and Marshall Romney published in the Journal of Accountancy (November 2015), pp. 46-52 from either your school library or from the website www.aicpa.org. The spreadsheet referenced in the article is available for download from the course website. Download the spreadsheet and follow along with the steps in the article. Write a report that answers the following questions (these are not completely answered in the article). Include screenshots to support your answers. Hint: the questions below are listed in the sequence in which you will encounter them when working through the steps described in the article. 1. How do you know when the “Trace Precedents” rule has located the cell that contains the source of a chain of errors? 2. Which cells are affected by the error in cell AL4? 3. Explain the nature of the circular reference in the original formula in cell AB6. 4. When you used the “Error Checking” tool, which cells did Excel find? For which of those cells did Excel suggest the correct solution? For which cells did you decide to ignore Excel’s error message? Why? 5. In the section “Other Error-Checking Tips” the article points out that the formula for dropping the lowest score ignores blanks. Instead of doing the nonpermanent solution described in the article, create a permanent solution that will successfully handle any future missing quizzes or assignments (i.e., fix the formula so that it will correctly drop a blank cell instead of the lowest non-blank cell). 6. Write a data validation rule that would prevent the kind of error that exists in cell U53, so that you do not have to rely on manually identifying such an error and manually correcting it. 7. The final paragraph of the section “Other Error-Checking Tips” asks whether there remain any other cells that have values amid a column of formulas. Did you find any? 8. The final section of the article asks you to examine the formulas to see if they are correct. Did you find any logic errors? Explain. 13-47 .
Ch. 13: Processing Integrity and Availability Controls
Solution: 1. When clicking on “Trace Precedents” does not change the red arrow line, you know you have located the original source of the error. 2. Cells BB4, AL60, AL62, AL63, and AL64 are all directly affected by the error in AL4. In turn, those cells affect several others. 3. The formula tries to identify the smallest number in a range that includes itself (i.e., the formula in cell AB6 is looking for the smallest value in the range d6:aB6; it should stop in column z, which is the last column for those assignments. 4. The “errors” in column BC can be ignored because they are not really errors. The problem is that only a few students did extra credit – most did not, so for most students the formula will be referencing an empty cell, which is okay. The “error” in cells AA13 and AB13 indicates that there is a missing value in one of the assignments, but that is okay because it is possible that someone did not turn in an assignment, so this error can be ignored. The same goes for the “errors” in cells AA20 and AB20. Also AB21 and AC21. The error in cell AK16 correctly identified that the range was incorrect, only including AI16; it needed to be changed to include AJ16. Cells AR7 and AR17 were correctly identified as having a number stored as text; need to correct that. Cells BD17 and BE17 correctly identified as an error in the VLOOKUP formula; lookup reference range stopped at row 75, needed to be edited to include row 76. Cell AK45 incorrectly omitting column AJ. Cell BB45 was missing parentheses around the last three terms in the formula. Cell BC47 incorrectly included parentheses in the formula. Cells I55, Y55, I58, Y58, and many cells in rows 60, 62, 63, and 64 all were flagged as potential errors because referenced blank cells, but that is not really an error so can be ignored. Cell AZ7 had multiple problems: the reference was to cell AY5 instead of AY58 and also the numerator in the formula should have referenced row 7 instead of row 5. Not sure why the article said there was an error in cell AU5 – could not find any in the spreadsheet. 13-48 .
Accounting Information Systems
5. One possible solution involves the countblank function, which looks for blank cells. If it finds two or more in a row, then you don’t drop any scores. If it finds one, you would then only drop the lowest numeric score. If it finds zero, then you drop the two lowest scores. Here is how the resulting formula in column AC (total points) would look: =IF(COUNTBLANK(D4:Z4)>=2,SUM(D4:Z4),IF(COUNTBLANK(D4:Z4)=1,SUM(D4:Z4)AA4,SUM(D4:Z4)-SUM(AA4:AB4))) This solution enables the professor to maintain a distinction between taking a quiz and getting a zero on it versus not taking the quiz at all. 6. If all the input cells for the quizzes had a data validation rule that said it had to be whole numbers between 0 and 10, then non-numeric entries like the decimal point would not be permitted. It is also important to check the “ignore blank” feature so that the spreadsheet would permit blanks. 7. Depending upon whether the student corrected the problem in cell BB42, that cell may still be hardcoded instead of a formula. 8. The total points possible (cell AC58) shows 200, after dropping the two lowest scores. However, there were a total of 23 quizzes (columns D-Z = 23 columns), so the total possible quiz points should be 210. The formula for the averages for each quiz (row 60) incorrectly includes the total number of students (row 55). It should only calculate the average for rows 4 through 53. One way to spot this problem is to look at the values in the “average” row – how can a 10 point quiz have an average score above 10? The same error occurs in calculating the average score on the projects and in the online section and for midterms and final exam.
13-49 .
The Revenue Cycle: Sales to Cash Collections
CHAPTER 14 THE REVENUE CYCLE: SALES TO CASH COLLECTIONS SUGGESTED ANSWERS TO DISCUSSION QUESTIONS 14.1
A basic threat around sales order entry is that important data about the order will be either missing or inaccurate. Explain how this risk can be mitigated. A basic threat during sales order entry is that important data about the order will be either missing or inaccurate. This not only creates inefficiencies (someone will have to call the customer back and reenter the order in the system), but also may negatively affect customer perceptions and, thereby, adversely affect future sales. ERP systems use a variety of data entry edit controls that were discussed in Chapter 10 to mitigate this threat. For example, completeness checks can ensure that all required data, such as both shipping and billing addresses, are entered. Automatic lookup of reference data already stored in the customer master file, such as customer addresses, prevents errors by eliminating data entry. In the header section (the top portion of the screen), the salesperson need only enter the name of the customer in the sold-to and ship-to fields, and the system pulls the rest of the information from the customer master file. In the detail section (the lower portion of the figure), the salesperson needs to enter only the item number and quantity ordered, and the rest of the information is pulled from the inventory and pricing master files. Note that by looking up the reference data, the ERP system is necessarily performing a validity check of the customer name and inventory item number entered by the salesperson. ERP systems should also be configured to perform reasonableness tests to compare the quantity ordered with item numbers and past sales history. Of course, all of these built-in controls presuppose that the master data is accurate. In addition, all of these data entry edit controls need to be incorporated on Web sites to ensure that customers accurately and completely enter all required data and in the EDI system used to accept electronic orders from customers. A second threat associated with the sales order entry activity concerns the legitimacy of orders. If a company ships merchandise to a customer and the customer later denies having placed the order, there is a potential loss of assets. For paper-based transactions, the legitimacy of customer orders is established by the customer’s signature. Digital signatures (control 6.1) provide similar assurance of legitimacy and the evidence to support nonrepudiation for electronic transactions. Finally, accountants can help managers to better monitor sales activity by using their knowledge about business processes to design reports that focus on key performance drivers. For example, reports that break down sales by salesperson, region, or product provide a means to evaluate sales order entry efficiency and effectiveness. Reports that show marginal profit contribution by product, distribution channel, region, salesperson, or customer can provide additional insights.
14-1 .
Accounting Information Systems 15e, GE
14.2
Some products, like music and software, can be digitized. How does this affect each of the four main activities in the revenue cycle? Digitized products do not change the four basic business activities of the revenue cycle. For all products, whether digitized or not, an order must be taken, the product shipped, the customer billed, and cash collected. The only thing that digitized products change is inventory management, as products do not need to be removed from a warehouse to be delivered. However, a copy of a product must be shipped (usually electronically, but in some cases it may need to be burned on a DVD and then shipped).
14.3
14.4
Delivery of products from distribution centers can be a complex issue, particularly when considering outbound logistics. Explain why the location of distribution centers is an important decision and how logistics software can be used to ensure effective and efficient product delivery. Logistics software can be used to determine optimal inventory levels per distribution center (when taking into consideration the customers within the area and their order history) as well as to ensure optimal delivery schedules. Logistics software can be used to identify the most appropriate location to store inventory (if there are multiple distribution centers available). The idea is to ensure that only minimum inventory is carried per distribution center, but also that there should be sufficient inventory to meet the delivery needs of each customer. Logistics software can also be used to ensure that daily deliveries are optimized – for example, by using a specific number of trucks to make deliveries to various locations within a specific area. The sequence of loading of inventory into trucks should match the delivery sequence – thus the items that should be delivered first, should be loaded into the truck last. What kind of threats are eliminated by replacing bar codes with radio-frequency identification tags? Replacing bar codes with radio-frequency identification (RFID) tags (control 8.2) can eliminate many of these problems because the data entry occurs automatically. For situations where use of RFID tags is uneconomical or not practical, training and regular reminders from management can reduce the frequency of the undesired behavior (control 8.3 in Table 14-1). Nevertheless, because the behaviors described above are likely to occur during particularly busy times, periodic physical counts of inventory (control 8.4) are necessary to verify the accuracy of recorded amounts. Figure 14-10 shows an example of a physical inventory worksheet. Notice that it lists each inventory item and the quantity that should be on hand, according to system records. It also includes a column to record the results of the physical count.
14.5
Municipalities usually mail their utility bills to customers on a monthly basis. A resident noticed that he does not receive his utility bill at the same time as that of his next door neighbor. Explain why this could be happening.
14-2 .
The Revenue Cycle: Sales to Cash Collections
Municipalities typically make use of cycle billing. Cycle billing is the process whereby monthly statements are prepared for subsets of customers at different times. For example, a customer master file may be split into four equal parts according to surname (or possibly area – but not in this case, as the neighbor receives his statement at a different time). Each week of the month, one set (which would be a quarter of the customers) would receive their bills. The advantage (to the municipality) of this approach is that there is a uniform cash flow throughout the month (as the payment due dates would be staggered) and the processing time for preparing, printing, and mailing the bills would be reduced. 14.6
Discuss the controls that need to be in place to prevent issues relating to credit memos. The task of authorizing credit memos should be separate from sales order entry as well as customer account maintenance. Credit memos should only be authorized if there is a corresponding document indicating that damaged goods have been returned, or in the case of a specific instruction authorized by management. The system should automatically block this process if there is no evidence of at least one of these authorizations.
14-3 .
Accounting Information Systems 15e, GE
SUGGESTED ANSWERS TO THE PROBLEMS 14.1
Match the terms with their definitions.
1. __d__ CRM system 2. __g_ Open-invoice method 3. __a__ Credit memo 4. __h__ Credit limit 5. __b__ Cycle billing 6. __c___ FEDI 7. _n__ Remittance advice 8. _j__ Lockbox 9. _k__ Back order 10. _m__ Picking ticket 11. _l__ Bill of lading 12. _q_Factoring 13. _r_Accounts receivable aging report 14. _e_EFT 15. _o_ UPIC
14.2
a. Document used to authorize reducing the balance in a customer account b. Process of dividing customer account master file into subsets and preparing invoices for one subset at a time c. System that integrates EFT and EDI information d. System that contains customer-related data organized in a manner to facilitate customer service, sales, and retention e. Electronic transfer of funds f. Method of maintaining accounts receivable that generates one payment for all sales made the previous month g. Method of maintaining customer accounts that generates payments for each individual sales transaction h. Maximum possible account balance for a customer i. Electronic invoicing j. Post office box to which customers send payments k. Document used to indicate stock outs exist l. Document used to establish responsibility for shipping goods via a third party m. Document that authorizes removal of merchandise from inventory n. Turnaround document returned by customers with payments o. Number other than the company’s real bank account number that customers can use to remit payments to the company’s bank account p. Selling accounts receivable to a firm that specializes in collecting past due accounts q. Document that shows the amounts of accounts receivable that are current and past due
What internal control procedure(s) would provide protection against the following threats? a. Theft of goods by the shipping dock workers, who claim that the inventory shortages reflect errors in the inventory records. Inventory clerks should count and document goods (on paper or by computer) as they leave inventory storage. Shipping personnel should be required to count and document receipt of goods from the finished goods storeroom to acknowledge responsibility for custody of the goods transferred. Counting goods when they are received and when they are sent to inventory storage as well as when goods leave inventory storage and are sent to shipping helps maintain control over inventory. Reconciling the two sets of counts makes it more difficult for employees to steal inventory as it is received and shipped.
14-4 .
The Revenue Cycle: Sales to Cash Collections
b. Posting the sales amount to the wrong customer account because a customer account number was incorrectly keyed into the system. If the transactions are being entered online, closed loop verification could be used. The system could respond to the operator entering the account number by retrieving and displaying the customer’s name for the operator to review. If the transactions are being entered in batches, redundant data such as the first five characters of the customer’s name could be included in each input record; after finding a match on customer account number, the system would also verify that the name characters match before posting the transaction. Note that a validity check would only tell you if a valid customer number was entered, not if the correct valid customer number was entered. Likewise, check digit verification could tell you if the customer number existed, but not if it was the right customer number. c. Making a credit sale to a customer who is already four months behind in making payments on his account. Up-to-date credit records must be maintained to control this problem. During the credit approval process, the credit manager should review the accounts receivable aging schedule to identify customers with past-due balances to prevent additional sales to those customers. Alternatively, the computer system could be programmed to determine if the customer had any past due balances over a specified length of time (such as 60 days). If not, the sale would be approved. If they had a past-due balance, a notice could be sent to the credit manager who could review the sale and make a decision about extending additional credit. A credit limit check would not be sufficient, because a customer could have a balance below the credit limit but be past due. A computer system could be programmed to check both credit limit and past due accounts and authorize sales. Sales not passing either the credit limit or the past due test would be sent to the credit manager for a decision. d. Authorizing a credit memo for a sales return when the goods were never actually returned. A receiving report should be required before a credit for sales returns is issued. The system should be configured to block issuance of credit memos without the required documentation that the goods have been returned. e. Writing off a customer’s accounts receivable balance as uncollectible to conceal the theft of subsequent cash payments from that customer. The problem usually occurs because the same individual writes off accounts and processes cash payments. Therefore, the best control procedure to prevent this problem is to separate the function of authorizing write-offs of uncollectible accounts from the function of handling collections on account. f. Billing customers for the quantity ordered when the quantity shipped was actually less due to back ordering of some items. 14-5 .
Accounting Information Systems 15e, GE
Shipping personnel should be required to record the actual quantity shipped on the order document and/or enter the quantity shipped into the accounting system, in order that bills can be prepared based upon the quantity shipped rather than the quantity ordered. The system should be configured to generate invoices automatically based on the quantity shipped. g. Theft of checks by the mailroom clerk, who then endorsed the checks for deposit into the clerk’s personal bank account. In order to cover up this theft, the mailroom clerk has to be able to alter the accounts receivable records. Otherwise, a customer who is subsequently notified that they are past due will complain and provide proof that they sent in payment. Therefore, the critical control is to segregate duties so that whoever opens the mail does not have the ability to maintain customer accounts. If accounts receivable updates the records based on a cash receipts pre-list instead of the actual checks, the mailroom clerk could conceivably lap payments. To prevent this, the cash receipts pre-list could be compared to the checks before the list is sent to accounts receivable. The checks should not be sent to accounts receivable as the accounts receivable clerk could perform the lapping. Other deterrents used to deter theft of checks by the mailroom clerk include having two people open the mail, using video cameras to tape the check opening process, and utilizing a bank lockbox.
14-6 .
The Revenue Cycle: Sales to Cash Collections
h. Theft of funds by the cashier, who cashed several checks from customers. In order to cover up this theft, the cashier has to be able to alter the accounts receivable records. Otherwise, a customer who is subsequently notified that they are past due will complain and provide proof that they sent in payment. Therefore, the critical control is to segregate the duties of handling cash and making deposits from the maintenance of accounts receivable records.
One way to control cash receipts is shown below. The mailroom creates a cash prelist, sends a copy to a 3rd party, and sends the checks to the cashier. The cashier prepares duplicate deposit slips, sends the original to the bank with the checks, and sends a copy to the 3rd party. When the checks are deposited, the bank sends a copy of the validated deposit slip to the 3rd party, who compares all three documents to make sure all cash is deposited.
Checks Cashier
Mailroom Cash Prelist
Checks and deposit Bank Deposit Slip
Validated Deposit Slip
3rd Party compares cash prelist, deposit slip from cashier, and validated deposit slip from bank i. Theft of cash by a waiter who destroyed the customer sales ticket for customers who paid cash. In a manual system, all sales tickets should be prenumbered and accounted for so management can detect missing sales tickets. In many restaurant systems, waiters cannot get food out of the kitchen without entering a customer order into the system. The system creates a prenumbered sales document that must be cleared by the waiter that day. This prevents the waiter from destroying sales tickets and giving people free food. These systems also are capable of some reasonableness tests such as: Beginning inventory of food Food used in the sales orders that day = Ending inventory of food The ending inventory of food is counted and compared to the projected ending inventory to determine if food items are missing. This check is most frequently used for expensive items of food like steak, shrimp, lobster, etc. j. Shipping goods to a customer but then failing to bill that customer.
14-7 .
Accounting Information Systems 15e, GE
To prevent this from occurring deliberately, it is necessary to segregate the shipping and billing functions. To prevent this from happening by accident, the system needs to automatically bill customers for shipments. The system should also be configured to periodically reconcile all shipments with a billing and generate reports of unbilled shipments for management review and corrective action. k. Lost sales because of stockouts of several products for which the computer records indicated there was adequate quantity on hand. Regular physical inventory counts need to be made, the results compared to recorded amounts on hand, and needed adjustments to inventory quantities made. In this scenario, it is possible that the judgment as to what is “adequate quantity on hand” was inaccurate. This quantity can be improved using an accurate sales forecasting system and frequently reviewing and revising the forecasts as needed. l. Unauthorized disclosure of buying habits of several well-known customers. Access to customer information should be restricted using User IDs, passwords, and an access control matrix. Employees given such access need to be trained to follow the organization’s privacy policies. In addition, encryption of the data would prevent snooping by IT employees who do not have direct access to the application system. Otherwise, such employees may be able to use their access to the operating system to be able to view data. m. Loss of all information about amounts owed by customers in New York City because the master database for that office was destroyed in a fire. Data: Regular backups with copies being stored off-site. Hardware and software: Hot or cold site arrangements for both Recovery: Disaster recovery plan developed, tested, and in place n. The company’s Web site was unavailable for seven hours because of a power outage. A UPS can power a system for a time, but most are unlikely to be able to power a system for seven hours. Two better options are
Backup power generators capable of running the web site for seven hours Real-time mirroring, with the system switching over to the other site when the system went down. 14-8 .
The Revenue Cycle: Sales to Cash Collections
o. Interception and theft of customers’ credit card numbers while being sent to the company’s Web site. Encryption of credit card information prior to transmitting over the Internet. Typically this involves using SSL. p. A sales clerk sold a $7,000 wide-screen TV to a friend and altered the price to $700. All product prices and sales discounts maintained in the system Use of barcodes and RFID tags to identify the product and sales price A system configured to give sales clerks read-only access to pricing data to prevent them from changing the price. Supervisor approvals for any needed changes or discounts to the listed price A log of all system overrides and supervisor changes to prices q. A shipping clerk who was quitting to start a competing business copied the names of the company’s 500 largest customers and offered them lower prices and better terms if they purchased the same product from the clerk’s new company. Shipping clerks should not have access to customer account information. Access (and attempted access) to customer records should be logged and reports reviewed to verify that only authorized employees see that information. r. A fire in the office next door damaged the company’s servers and all optical and magnetic media in the server room. The company immediately implemented its disaster recovery procedures and shifted to a backup center several miles away. The company had made full daily backups of all files and stored a copy at the backup center. However, none of the backup copies were readable. Periodically practicing and testing the backup and restoration process would verify its effectiveness. s. A clerk in a retail clothing store accepts returns from customers but, instead of putting the clothes back on the rack, hides them under the counter and then puts them into his gym bag and takes them home. The problem here is that the clerk was authorized to accept returns and grant credit and also had custody of the inventory. The solution is to segregate those duties by requiring the store manager to authorize all returns and to ensure that clerks place all returned merchandise in a secure location for restocking.
14-9 .
Accounting Information Systems 15e, GE
14.3
You have been asked to review the process through which cash collections are handled in a small business. You observe that a staff member in the accounts receivable department receives all incoming payments and, since the business does not accept any checks unless approved in advance by the management, most payments are cash payments. There are the odd check payments, but all of them were accepted because of prior approval by the management.
REQUIRED What would your advice be to the management of this business in the context of what you observed? The duties of actually receiving payments (cash or pre-approved checks) and posting remittances to customer accounts should be segregated. In this case, the staff member in accounts receivable would be one of the staff members responsible for posting remittances to customers. The staff members involved in posting remittances to customer accounts should not be involved in handling any payments for customers (cash or checks) – these employees should only receive the information regarding the payments that were made (remittance data) so that the customer account balances can be updated. When these duties are segregated, it is possible to enforce two independent control checks. Total credits to accounts receivable as recorded by the accounting department should be equal to the total debit to the cash that is reported as being deposited (for example by a cashier). The list of remittances as sent to the internal audit department can then be compared to the deposit slips and bank statements to ensure that all monies received (cash plus checks) were in actual fact deposited. 14.4 Download the spreadsheet from the course website and perform the following tasks. REQUIRED a. Create a formula in column F to calculate how many days a particular invoice has been outstanding. b. Create a formula in column G that attaches the correct label to each invoice (e.g., if the invoice is 0–30 days old, the label should be “0–30”; if it is 31–60 days old, the label should be “31–60”, etc.) according to the table in the upper right corner of the spreadsheet. c. Create a pivot table that shows the sum, count, and average values for each of the four categories of accounts receivable. d. Create a pivot table that shows total amounts and count of invoices by both category (e.g., 0–30, 31–60, etc.) and region (East, West, North, South). e. Modify the pivot table in step d to be able to filter the results by salesperson. 14-10 .
The Revenue Cycle: Sales to Cash Collections
SOLUTION: see spreadsheet solution for instructors 14.5 Create a questionnaire checklist that can be used to evaluate controls for each of the four basic activities in the revenue cycle (sales order entry, shipping, billing, and cash collections). REQUIRED a. For each control issue, write a Yes/No question such that a “No” answer represents a control weakness. For example, one question might be “Are customer credit limits set and modified by a credit manager with no sales responsibility?” A wide variety of questions is possible. Below is a sample list: Question Yes 1. Is access to master data restricted? 2. Is the master data regularly reviewed and all changes investigated? 3. Is sensitive data encrypted while stored in the database? 4. Does a backup and disaster recovery plan exist? 5. Have backup procedures been tested within the past year? 6. Are appropriate data entry edit controls used? 7. Are digital signatures required for online orders? 8. Are physical counts of inventory taken regularly and used to adjust the perpetual inventory records? 9. Are the credit approval and sales order entry tasks performed by separate individuals? 10. Are picking list quantities compared to sales orders? 11. Is physical access to inventory controlled? 12. Are reports of open sales orders regularly created and reviewed? 13. Are shipping documents reconciled with sales orders? 14. Are the shipping and billing functions performed by different individuals? 15. Are monthly statements mailed to customers? 16. Are the functions of processing customer payments and maintaining accounts receivable performed by separate individuals? 17. Is the bank account reconciled by someone other than the person who processes customer payments? 18. Are lockbox arrangements used? 19. Are customer credit limits set and modified by a credit manager with no sales responsibility?
No
b. For each Yes/No question, write a brief explanation of why a “No” answer represents a control weakness. Question
Reason a “No” answer represents a weakness
1
Unrestricted access to master files could facilitate fraud by allowing employees to change
14-11 .
Accounting Information Systems 15e, GE account balances to conceal theft 2
Failure to investigate all changes to customer master data may allow fraud to occur because unauthorized changes to credit limits may not be detected.
3
Failure to encrypt sensitive data can result in unauthorized disclosure of personal information about customers
4
If a backup and disaster recovery plan does not exist, the organization may suffer loss of important data.
5
If the backup plan is not regularly tested, it may not work.
6
Without proper data entry edit controls, errors in sales order entry may occur resulting in shipments that are not billed, sending the wrong items, etc.
7
Without a digital signature, orders may be processed and sent that the customer later refuses, resulting in increased costs
8
Without periodic physical counts, the perpetual inventory records are likely to be incorrect, creating problems in filling customer orders on time
9
If the same individual approves changes in credit and takes customer orders, they can increase credit limits for friends, which may result in sales that are not collected.
10
Not comparing picking lists to sales orders can result in shipping the wrong merchandise or the wrong quantities to customers.
11
If physical access to inventory is not restricted, theft may occur.
12
Failure to monitor sales orders may result in delays in filling customer orders
13
Failure to compare shipping documents to sales orders may result in errors in filling customer orders
14
Not segregating the billing and shipping functions increases the risk of deliberately not billing for shipments
15
Not mailing monthly statements to customers increases the risk of not detecting errors or fraud in maintaining accounts receivable
16
Not segregating handling of customer payments and maintenance of accounts receivable creates the possibility of lapping
17
If the bank account is reconciled by the same person who processes customer payments, theft can occur and be covered up by adjusting the bank balance on the bank reconciliation
18
Not using lockboxes, where feasible, creates delays in receiving customer payments which could result in cash flow problems
19
If credit limits are set by someone with sales responsibility, that person may be tempted to grant credit to customers to maximize sales (and thereby commissions or bonuses earned) without regard to the risk of having to write off the sales as uncollectible.
14.6
Excel Project. Accountants should help managers understand trends in revenue cycle activities. One important issue concerns granting credit to customers. Trends in bad debt expense (BDE) to write-offs (WO) provide insights into the accuracy of credit granting policies. It is also important to monitor how long it will take to write off the current balance in the allowance for doubtful accounts (BADA Exhaustion Rate).
14-12 .
The Revenue Cycle: Sales to Cash Collections
REQUIRED a. Create a spreadsheet that contains the following data: Year BDE/WO BADA/WO BADA Exhaustion Rate (years)
Year 1 1.81 1.42 1.33
Year 2 0.98 1.73 1.81
Year 3 1.08 1.89 1.67
Year 4 1.27 1.48 1.35
Year 5 0.94 1.26 1.2
b. Create a two-dimensional columnar chart that displays the data values for each variable for the five years. c. Create a new chart that will display a two-dimensional columnar chart that shows a rolling five-year window of the variables. Add the following data for Year 6 and Year 7 to your spreadsheet to demonstrate that the new chart shows only Years 1-5 values: Year BDE/WO BADA/WO BADA Exhaustion Rate (years)
Year 6 1.1 1.3 1.5
Year 7 1.3 1.1 1.6
(Hint: Read the article “Simplify Your Future with Rolling Charts,” by James A. Weisel in the July 2012 issue of the Journal of Accountancy for an explanation of the how to create a rolling chart (step c)—and take care to follow Excel’s rules for naming ranges. Read the article “Assessing the Allowance for Doubtful Accounts: Using historical data to evaluate the estimation process,” by Mark E. Riley and William R. Pasewark in the September 2009 issue of the Journal of Accountancy for an explanation of how the variables used in this problem can help you evaluate a company’s process for estimating the allowance for doubtful accounts. The Journal of Accountancy is available either in print or online at www.aicpa.org). The spreadsheet solution is available on website. Key steps include: Offset formula: =OFFSET(cell in column B, 0 rows, COUNTA() – rolling number +1 columns, 1, columns) – note: the last entry, columns, should be a number representing the number of years you want to display Chart: after blank chart, add the source data. Must type a name or reference column A; for Yvalues use =Sheet1!Nameofrange, for X-axis use Sheet1!Year (must use Sheetname!) To display names, find two columns that are blank and insert name paste pastelist. You can also access formula names by going to the formula tab in the ribbon and then choose the option “manage names” 14.7
Maritime Engineering is an engineering company specializing in the installation, repair, and maintenance of ship and port infrastructure. The company was established in 1990 in the industrial area in the port city of Port Elizabeth. The company uses different programs to record its activities. Due to the nature of the business, the receiving department and the workshop are located close to the harbor. This makes it easier for engineering teams to transport finished parts or 14-13 .
Accounting Information Systems 15e, GE
materials required for repair due to the short distance. The loading dock at the workshop serves a dual purpose: not only are the raw materials are delivered there, the completed materials required for maintenance and repairs are also transported from there to the sites where they are required. All engineers have their own laptops, which they carry with them when site visits are required to quote on repair or maintenance work. Accepted quotes on proposed maintenance or repair work are sent via e-mail to the administrative section of Maritime Engineering. For existing customers, the go-ahead is given for the work to start upon manual verification. For new customers, a customer account is first created. All maintenance and repair work is on credit for both existing and new customers. Materials required for the accepted quotes are then collated and parts that need to be manufactured, if any, are sent for manufacturing. Once the materials have been collated, they are queued in order of customer names near the loading dock for the supervising engineer to arrange their transportation. Repair and maintenance work is often delayed because it can begin only when all materials have been received, and manufactured parts are frequently not delivered in time because their raw materials may not be readily available in the warehouse. The warehouse staff logs all such shortages as soon as they are identified, and the inventory records are updated every Monday morning. A periodic inventory is maintained, and physical inventory counts are done once every six months. Customers are invoiced only when all the work on the accepted. Invoices are sent via e-mail. REQUIRED a. Identify at least three weaknesses in Maritime Engineering’s revenue cycle procedures, explain the associated problem, and propose a solution. Present your answer in a two-column table with these headings: Weakness or Problem and Solution. b. Draw a BPMN diagram to depict Maritime Engineering’s revenue cycle revised to incorporate your solutions to step a. (CPA Examination, adapted)
14-14 .
The Revenue Cycle: Sales to Cash Collections
Weaknesses and / or Potential Problem(s) CHAPTER 12 Recommendation(s) to Correct Weaknesses
1. No integrated system (such as an ERP system) is used – thus it is difficult to verify information of customers, as such verification will have to be done manually.
Replace the separate systems with an integrated ERP system to enable automatic customer verification.
2. Emails of accepted quotes only lead to validation of the existence of the customer (and the subsequent creation of a new customer account, if it is a new customer), but not the customer credit histories. This has the potential to result in uncollectible accounts.
Customers’ credit should be checked and no work should be accepted for those that do not meet credit standards.
3. Outgoing replacement parts and materials are placed near the loading dock door. The loading dock is also used to receive incoming deliveries of raw materials. This increases the risk of theft, which may account for the delays in manufacturing replacement parts due to shortages in raw materials.
Separate the shipping and receiving docks.
4. Physical counts of inventory are made at every six months, but inventory records of raw materials are only updated weekly. This could contribute to the unexpected shortages of raw materials resulting in delays in manufacturing of replacement parts.
The warehouse staff should enter information about shortages as soon as they are discovered.
5. No reconciliation seems to be made between the accepted quotations and the invoices, as invoices are prepared once the work had been completed. It is then possible that additional work was required, and this work would then not be recorded on the quotation; and subsequently not billed.
The system should be configured to match invoices, work done and quotes accepted and alert the engineers of any discrepancies.
Physically restrict access to the loading dock area where maintenance and repair parts needed for accepted quotes are placed.
14-15 .
Ch. 12: The Revenue Cycle: Sales to Cash Collections
Students’ solutions to part b will vary depending upon which weaknesses the students identified and corrected. The following corrects weaknesses 2 – 5 listed above. Employee Admin clerk
Activity Performed (sequential, left-to-right across all rows) Receive Quote acceptance email
Credit Manager
Sale > Credit Limit?
Yes
Approve Credit Sale?
No
Prepare Order
Yes
No
Warehouse Clerk
Pick & Pack Order
Engineer Arrange Transport to Customer
Accountant Prepare & email Invoice to Customer
14-17.
Update Accounts Receivable
Accounting Information Systems 14.8
Parktown Medical Center, Inc. is a small health care provider owned by a publicly held corporation. It employs seven salaried physicians, ten nurses, three support staff, and three clerical workers. The clerical workers perform such tasks as reception, correspondence, cash receipts, billing, and appointment scheduling. All are adequately bonded. Most patients pay for services rendered by cash or check on the day of their visit. Sometimes, however, the physician who is to perform the respective services approves credit based on an interview. When credit is approved, the physician files a memo with one of the clerks to set up the receivable using data the physician generates. The servicing physician prepares a charge slip that is given to one of the clerks for pricing and preparation of the patient’s bill. At the end of the day, one of the clerks uses the bills to prepare a revenue summary and, in cases of credit sales, to update the accounts receivable subsidiary ledger. The front office clerks receive cash and checks directly from patients and give each patient a prenumbered receipt. The clerks take turns opening the mail. The clerk who opens that day’s mail immediately stamps all checks “for deposit only.” Each day, just before lunch, one of the clerks prepares a list of all cash and checks to be deposited in Parktown’s bank account. The office is closed from 12 noon until 2:00 p.m. for lunch. During that time, the office manager takes the daily deposit to the bank. During the lunch hour, the clerk who opened the mail that day uses the list of cash receipts and checks to update patient accounts. The clerks take turns preparing and mailing monthly statements to patients with unpaid balances. One of the clerks writes off uncollectible accounts only after the physician who performed the respective services believes the account will not pay and communicates that belief to the office manager. The office manager then issues a credit memo to write off the account, which the clerk processes. The office manager supervises the clerks, issues write-off memos, schedules appointments for the doctors, makes bank deposits, reconciles bank statements, and performs general correspondence duties. Additional services are performed monthly by a local accountant who posts summaries prepared by the clerks to the general ledger, prepares income statements, and files the appropriate payroll forms and tax returns.
14-18 .
Accounting Information Systems 15e, GE
REQUIRED a. Identify at least three control weaknesses at Parktown. Describe the potential threat and exposure associated with each weakness, and recommend how to best correct them. 1. Weakness: The employees who perform services are permitted to approve credit without an external credit check. Threat: Sales could be made that turn out to be uncollectible. Control: Someone other than the physician performing the services (probably the office manager) should do a credit check. Credit limits should be established and used to control the amount of credit offered. 2. Weakness: The physician who approves credit also approves the write-off of uncollectible accounts. Threat: Accounts receivable could be understated and bad debts expense overstated because write-offs of accounts could be approved for accounts that are, in fact, collectible. Accounts receivable could be overstated and bad debt expense understated because write-offs may not be initiated for accounts that are uncollectible. Control: Separate the duties of approving credit and approving the write-off of accounts receivable from performance of services. 3. Weakness: The employee who initially handles cash receipts also prepares billings and maintains accounts receivable. Threat: Theft by lapping could occur. Fees earned and cash receipts or accounts receivable could be understated because of omitted or inaccurate billing. Control: Segregate the functions of cash receipts handling and billing/accounts receivable. 4. Weakness: The employee who makes bank deposits also reconciles bank statements. Threat: The cash balance per books may be overstated because all cash is not deposited (i.e. theft). Control: Bank reconciliation should be done by an employee with no other cash handling responsibilities. 5. Weakness: The employee who makes bank deposits also issues credit memos. Threat: The office manager could steal cash and cover up the shortage by issuing a credit memo for the amount stolen. Control: Cash deposits should be made by an employee who does not have authority to issue credit memos and who also does not maintain accounts receivable. 6. Weakness: Trial balances of the accounts receivable subsidiary ledger are not prepared independently of, or verified and reconciled to, the accounts receivable control account in the general ledger. Threat: Any of fees earned, cash receipts, and uncollectible accounts expense could be either understated or overstated because of undetected differences between the subsidiary ledger and the general ledger. Also, fees earned and cash receipts or accounts receivable could be understated because of failure to record billings, cash receipts, and write-offs accurately. Control: Periodic reconciliation of the subsidiary accounts receivable ledger to the general ledger control account for accounts receivable.
14-12-18 .
Accounting Information Systems b. Draw a BPMN diagram to depict Parktown’s revenue cycle revised to incorporate your solutions to step a. (CPA Examination, adapted) Actual solution will depend upon which weaknesses were corrected: this figure addresses all weaknesses listed in part a. Employee Activity Performed (sequential, left-to-right across all rows) Physician Perform Services
Front Office Clerk 1
Customer requests credit?
No
Prepare Charge Slip
Yes Receive Payment
Prepare Receipt
Front Office Clerk 2
Monthly Prepare revenue summary & update A/R
Office Manager
Reconcile Bank Account
Remittance List
Monthly
Decide whether to grant credit
Front Office Clerk 3
Deposit Receipts
Review Past Due A/R & Issue Credit Memo
Customer Remittances
Open Mail with another Office Clerk
14-18.
Endorse Checks & Prepare Remittance List
Ch. 12: The Revenue Cycle: Sales to Cash Collections 14.9
The Bopeep is a local company that manufactures and distributes educational toys to schools that cater to special needs children. The toys are manufactured as well as stored in Bopeep’s workshop. All finished products are bar-coded. For the most part, Bopeep’s management requires that the stock of their popular products be maintained to ensure immediate delivery when ordered. Other products, including custom products, are manufactured on a just-in-time basis. Bopeep maintains a perpetual inventory. Currently, all special needs schools within Bopeep’s delivery capacity are already its clients, and there is no scope in the near future to add any new schools as customers. Bopeep receives orders via e-mail, telephone, and their website. Once a customer places an order, the admin officer records its details on a physical order form. The admin officer uses the bar code of the items to identify the ordered products. The information on the physical order forms is entered into a computerized system at the end of each business day. The first task of the admin officer every morning is to print out the orders captured on the previous day and send them to the workshop. Any staff member that is free at the time the forms are delivered to the workshop can start collating orders by ticking the items off on each form. Once an order has been collated, the staff member responsible for packing will then pack the order and manually label it with the school’s delivery address. A network administrator, who is in charge of the computing equipment used at Bopeep, backs up their files every day. On Fridays, she creates two copies of the backed up data and takes one of them home for safekeeping. The admin officer sometimes stands in for the network administrator and uses the network administrator’s computer to create the backups. If this need comes up on a Friday, the admin officer will take the one of the two backup copies home. Of late, the stock levels of Bopeep’s popular products have almost always been below their required levels even though their manufacturing is a continuous process. For this reason, the management suspects that this could be a case of inventory theft. REQUIRED a. Identify the major control weaknesses in Bopeep’s sales order entry and shipping procedures. For each weakness you identify, suggest a method to correct that weakness. Your solution must be specific—identify which specific employees should do what. Assume that no new employees can be hired. 1. Weakness in sales order entry: the admin officer rewrites the order details onto a paper-based form. This has the potential to lead to data entry errors as well as invalid orders. 14-18 .
The Revenue Cycle: Sales to Cash Collections
Control 1: make use of an integrated system where data entry edit controls can be used (for example, to select an existing customer; select the items ordered from a pre-populated list; etc.) Control 2: when orders are placed via the company website or an email, digital signatures should be provided to validate the actual order. In the case of telephonic orders, there should be some method of confirmation of the order before the actual order is placed to ensure that the customer cannot deny placing the order. 2. Weakness in sales order entry: no mention is made of checking the credit limits of the customer schools. Control: Credit limits should be checked before orders are fulfilled. 3. Weakness in shipping procedures: any free staff member in the workshop has access to inventory and can pack orders for schools. Control 1: there should be physical restrictions to authorized staff to access inventory; only authorized staff should be allowed to make up the orders for the schools. This would then imply that the workshop should be a separate area from where the inventory is kept to enable access restrictions. Control 2: when the workshop and the warehouse is separated, there should then be documented inventory transfers between the workshop and the warehouse – every time products are manufactured, the finished products should be transferred to the warehouse and appropriate transfer documentation should be completed to prevent inventory theft. Control 3: As soon as the production run of a specific product is complete, the finished products should be barcoded, and the quantity of finished products recorded in inventory (to match the perpetual inventory system used). 4. Weakness in shipping procedure: when orders are packed, the printed order form is used to tick off all items are the order is made up. Control: there should be a picking list that is associated with the order that was placed to ensure that the correct items are selected for that particular order. There should also be a packing slip that is associated with the picking list and the order to ensure that what was ordered was indeed packed and shipped. Everything cannot be entered in a single form. Since items are barcoded, the barcodes of each of the items that are selected can be scanned – this will then update what had been picked and packed for the order, automatically reducing inventory levels by the quantity scanned.
14-12-21 .
Accounting Information Systems 15e, GE
Weakness in shipping procedures: Manually labelling the packed orders for delivery. Control: this could result in delivery to the wrong school; order forms, picking and packing slips should all correspond and an integrated system could be used to automatically print the address label which would then be linked to the original order. b. Describe the IT control procedures that should exist in order to protect Bopeep from loss, alteration, or unauthorized disclosure of data.
14.10
The Friday backup copies should be sent to a secure place (and not simply taken to either the network administrator or admin officer’s homes) There should be a segregation of duties between the admin officer and the network administrator – The admin officer should never be allowed access to the network administrator’s machine Nothing is mentioned about password-protection or encryption of the backed up data – the backed up data should either be password protected or encrypted to prevent alteration or unauthorized disclosure. Nothing is mentioned about where the daily backup files are stored – these should be stored in a secure location, and it should also be password-protected (or encrypted) to protect it from alteration or disclosure.
Figure 14-21 depicts the activities performed in the revenue cycle by the Newton Hardware Company. (CPA Examination, adapted) a. Identify at least 3 weaknesses in Newton Hardware’s revenue cycle. Explain the resulting threat and suggest methods to correct the weakness.
Weakness
Threat/Problem
Recommendation
Accountant prepares and mails invoice to customer based only on the sales order.
Errors in shipments could result in billing errors.
Accountant should prepare invoice only after receiving copy of shipping documentation and comparing that to sales order.
Warehouse clerk picks and packs order prior to obtaining results of credit limit check.
Shipments of merchandise to customers with poor credit, resulting in loss of merchandise.
Warehouse clerk should not pick and pack until after notified of result of credit check.
14-12-22 .
The Revenue Cycle: Sales to Cash Collections Sales clerk issues credit memos.
Sales to customers with poor credit, in order to meet sales quota or earn commissions.
Credit manager should approve and issue all credit memos. If merchandise is to be returned, require receiving department to document return prior to crediting the customer’s account.
Accountant receives customer payments and maintains A/R.
Fraud (lapping).
Cash collections clerk should retain customer remittances and deposit them. Only send a remittance list to the accountant for use in updating A/R.
Cash collections clerk handles cash and prepares bank reconciliation.
Theft and cover up by manipulating the bank reconciliation.
Someone not involved in handling customer payments or making deposits should do the monthly bank reconciliation.
b. Identify ways to use IT to streamline Newton’s revenue cycle activities. Describe the control procedures required in the new system. Some ways that Newton could use IT to improve efficiency include: On-line data entry by sales staff. The system should include credit checks on customers as well as check inventory availability Email notification of each department (shipping, billing, etc.) whenever another department performs an action (e.g., billing is notified whenever shipping enters data indicating that an order has been released) EDI billing of customers Establishment of electronic lockboxes with banks so that customer payments go directly to company’s account Controls that should be implemented in the new system include: Passwords to limit access to authorized users, and to restrict the duties each employee may perform and which files they may access A variety of input edit checks (limit checks, range checks, reasonableness tests, etc.) to ensure completeness of data entry and accuracy 14.11 Match the threats in the first column to the appropriate control procedures in the second column (more than one control may address the same threat). Threat 1. _a,p__ Uncollectible sales 2. _g,i__ Mistakes in shipping orders to customers. 3. __o_ Crediting customer payments to the wrong account. 4. _f,m,o__ Theft of customer
Applicable Control Procedures a. Restrict access to master data. b. Encrypt customer information while in storage. c. Backup and disaster recovery procedures.
d. Digital signatures. 14-12-23
.
Accounting Information Systems 15e, GE
payments. 5. _e,j,k__ Theft of inventory by employees. 6. __l_ Excess inventory. 7. _a__ Reduced prices for sales to friends. 8. _d__ Orders later repudiated by customers who deny placing them. 9. _h,q__ Failure to bill customers. 10. _h__ Errors in customer invoices 11. _m,n_ Cash flow problems 12. _c__ Loss of accounts receivable data 13. __a,b_ Unauthorized disclosure of customer personal information. 14. _g,r__ Failure to ship orders to customers.
e. Physical access controls on inventory f. Segregation of duties of handling cash and maintaining accounts receivable. g. Reconciliation of packing lists with sales orders. h. Reconciliation of invoices with packing lists and sales orders. i. Use of barcodes or RFID tags. j. Periodic physical counts of inventory k. Perpetual inventory system. l. Use of either EOQ, MRP, or JIT inventory control system. m. Lockboxes or electronic lockboxes.
n. Cash flow budget o. Mail monthly statements to customers. p. Credit approval by someone not involved in sales. q. Segregation of duties of shipping and billing. r. Periodic reconciliation of prenumbered sales orders with prenumbered shipping documents.
14-12-24 .
The Revenue Cycle: Sales to Cash Collections
14.12 Answer all of the following multiple-choice questions. 1. Which of the following pairs of duties combines the functions of custody and authorization in a manner that would allow an employee to conceal the theft of a customer’s payment? a. Handling cash receipts plus maintaining accounts receivable b. Writing checks plus reconciling the bank statement c. Handling cash receipts plus issuing credit memos d. All of the combinations involve custody and authorization in a manner that would enable an employee to conceal theft of a customer’s payment e. None of the combinations involve the functions of custody and authorization in a manner that would enable an employee to conceal theft of a customer’s payment Correct answer: c. Issuing credit memos is an authorization activity; handling cash receipts is custody. The employee could issue a credit memo to authorize writing down the customer’s account for the amount of the payment that was stolen. Answer a is wrong because it involves a combination of custody (handling cash receipts) and recording (maintaining accounts receivable). Answer b is wrong because writing checks would further reduce the amount of cash and reconciling the bank statement would not adjust the customer’s account for the stolen payment; consequently, the customer would then complain when informed that he/she had not paid their account. 2.
Which of the following violates proper segregation of duties? a. The same person maintains both accounts receivable and accounts payable. b. The same person approves sales orders that exceed a customer’s credit limit and processes and reconciles the bank account. c. The same person handles customer payments and has access to blank checks. d. All of the above combinations violate proper segregation of duties. e. None of the above combinations violate proper segregation of duties.
Correct answer: e. None of the combinations enables someone to both commit a fraud and effectively conceal it. 3.
Which of the following types of fraud requires access to the accounts receivable master file? a. Lapping b. Kiting c. Theft of inventory d. None of the above
Correct answer: a. 4.
The CEO is concerned about the possibility of employees stealing inventory. In the formal language used for risk analysis, theft of inventory is referred to as a(n): a. risk b. exposure c. expected loss d. threat 14-12-25 .
Accounting Information Systems 15e, GE
e. None of the above Correct answer: d. 5.
For good internal control in an ERP system, sales staff should be permitted to: a. Adjust customer credit limits b. Issue credit memos c. Both of the above d. Neither of the above
Correct answer: d. Sales staff are often paid on commission, so have an incentive to make and approve sales. Therefore, they should not be allowed to adjust credit limits. If they can issue credit memos, they could make sales to non-creditworthy customers and subsequently write those sales off. 6. Which of the following procedures, by itself, is most effective at preventing employees from stealing cash? a. Restrictively endorsing all checks from customers upon receipt b. Having someone who has no access to cash reconcile the bank accounts c. Sending monthly statements to customers d. Using lockboxes for customer remittances e. Creating invoices so that the bottom portion is to be returned as a remittance advice Correct answer: d is most effective, as it eliminates the risk of theft of incoming payments. All the other measures just reduce the overall risk. 7. Which of the following combinations of duties can the same employee perform without violating the principle of segregation of duties? a. Shipping inventory and billing customers b. Issuing credit memos and maintaining accounts receivable c. Taking customer orders and checking inventory availability d. All three of the listed combinations can be performed by the same person without violating the principle of segregation of duties e. None of the three listed combinations should be performed by the same person because all three combinations violate the principle of segregation of duties Correct answer: c. If the same employee performs both actions in choice a, there is a risk of failing to bill for shipments. If the same employee performs both actions in choice b, there is the risk of writing off friends’ accounts. 8.
Which of the following is an example of the type of fraud referred to as misappropriation of assets? a. embezzlement b. lapping c. inventory theft 14-12-26 .
The Revenue Cycle: Sales to Cash Collections
d. all of the above e. none of the above Correct answer: d. 9. Which of the following controls would be most effective in mitigating the risk of inventory theft? a. Reconciling shipping documents to sales orders, picking lists and packing slips. b. Separating the functions of shipping and billing c. Documentation of all transfers of inventory between employees d. Use of lockboxes Correct answer: c. 10. For effective internal control, which of the following duties can the person who handles customer payments also perform? a. Issue credit memos b. Reconcile the bank account c. Maintain accounts receivable d. All of the above e. None of the above Correct answer: e. Performing any of the duties listed would enable the employee to commit and conceal theft of cash. 14.13 Excel Project Required a. Create a spreadsheet that contains the following data:
14-12-27 .
Accounting Information Systems 15e, GE
b. On the same worksheet, but to the right of the data above, create the following table to show calls made by each salesperson this quarter. Use the sumproduct function to create a formula that automatically calculates the total calls handled. Calls Made by Salesperson This Quarter July Barnes Hsu Jackson Martinez Smith
August
September
(Hint: Read the article “Supercharge Your Excel Sum Operations: Add data by up to 30 criteria,” by J.D. Kern in the July 2009 issue of the Journal of Accountancy for an explanation of the sumproduct function and the use of double dashes. The Journal of Accountancy is available either in print or online at www.aicpa.org). The solution spreadsheet is available on the website. Key formula: July sales for Barnes (will need to adjust for the other cells): =SUMPRODUCT(--($G3=$A$3:$A$25),--(7=MONTH($B$3:$B$25)),($C$3:$C$25))
14.14 The following table presents the results of using a CAAT tool to interrogate the XYZ Company’s ERP system for revenue cycle activities. It shows the number of times each employee performed a specific task. 14-12-28 .
The Revenue Cycle: Sales to Cash Collections
Employee A Employee B Employee C Employee D Employee E Employee F Employee G Employee H Employee I Employee J
Take Order 250 305 275
Approve Credit 5
Ship Inventory
Maintain A/R
Issue Credit Memo
Bill Customer 15 100
Deposit Customer Remittances
Reconcile Bank Account
10 85
10 400 430
5 25 600
400 430
15
20 25 650
14-12-29 .
1
Accounting Information Systems 15e, GE
REQUIRED Identify five examples of improper segregation of duties and explain the nature of each problem you find. 1. Employee A takes orders and approves credit. Employee may collude with a friend to make sales that turn out to be uncollectible. 2. Employee A takes orders and bills customers. Employee may fail to bill sales made to friends. 3. Employee B takes orders and bills customers. Employee may fail to bill sales made to friends. 4. Employee D approves credit and issues credit memos. The employee could make sales to friends on credit and then write those sales off. 5. Employee D issues credit memos and deposits customer remittances. The employee could steal remittances and conceal the theft by issuing a credit memo to write down the customer’s account. 6. Employee E both ships inventory and bills customers. The employee could ship merchandise to friends and not invoice them. 7. Employee H maintains A/R and handles customer payments. The employee could commit lapping. 8. Employee I approves credit and issues credit memos. The employee could make sales to friends on credit and then issue credit memos to write off the accounts. 9. Employee J handles customer payments and reconciles the bank account. The employee could steal payments and conceal the theft by manipulating the bank reconciliation.
14-12-30 .
The Revenue Cycle: Sales to Cash Collections
SUGGESTED ANSWERS TO THE CASE Case 14.1: RESEARCH PROJECT: The Use of RFID in Retail Supplementing the basic information provided in this chapter with reputable sources, provide a detailed explanation of how and why RFID is used in retail stores to improve the accuracy of reported inventory levels. Your discussion should focus on passive and active RFID systems and practical examples of where and how RFID is used in retail. Students should indicate that RFID eliminates many of the problems that are encountered with barcoding (for example, data entry can occur automatically with RFID; RFID does not require line-of -sight; RFID tags are not sensitive to dirt; RFID tags store additional information; RFID tags can be used for real-time inventory tracking and can provide information about possible inventory delays). RFID tags make use of radio frequency electromagnetic energy, enabling RFID readers to detect and identify objects (such as a box containing a specific inventory item) Certain RFID tags can contain information that can be updated (inventory levels, product information, etc.) Some RFID tags can monitor and record sensory data (for example, temperatures, where inventory is dependent on cooling systems to keep fresh produce fresh) Active RFID tags
have their own energy / power (usually from batteries) source are always on, enabling them to receive radio waves from the receiver can initiate alerts (for example, if a temperature rise is undesirable, an alert can be sent) are rather expensive need some form of maintenance (for example, battery replacement)
Passive RFID tags derive their energy from the reader through an electromagnetic field can typically store information, but this information is static and can usually not be changed only responds when activated by a reader are relatively inexpensive does not really need maintenance Semi-passive RFID Hybrid between passive and active Battery-powered but does not transmit active signals
14-12-31 .
Accounting Information Systems 15e, GE
Practical examples: this will be dependent on what the student finds. At the time of writing, the following papers on the use of RFID in retail were available: https://www.reliableplant.com/Read/19650/rfid-significantly-improves-item-level-inventoryaccuracy https://link.springer.com/chapter/10.1007/978-3-319-13177-1_16 https://www.sciencedirect.com/science/article/pii/S000768131830137X https://content.iospress.com/articles/international-journal-of-rf-technologies/rft1788 https://journals.sagepub.com/doi/full/10.1177/1847979016685093
14-12-32 .
CHAPTER 15 THE EXPENDITURE CYCLE: PURCHASING TO CASH DISBURSEMENTS SUGGESTED ANSWERS TO DISCUSSION QUESTIONS 15.1
A Stockholm-based medicine company wishes to reduce kickbacks. For kickbacks to make economic sense, the supplier must find a way to recover the money spent on it. This usually is accomplished by inflating the price of subsequent purchases or by substituting goods of inferior quality. Name three processes to prevent kickbacks. Kickbacks, which are gifts from suppliers to purchasing agents for the purpose of influencing their choice of suppliers, are another threat. For the kickback to make economic sense, the supplier must find some way to recover the money spent on the bribe. This usually is accomplished by inflating the price of subsequent purchases or by substituting goods of inferior quality. Even if neither of these problems occurs, kickbacks impair the buyer’s objectivity. To prevent kickbacks, companies should prohibit purchasing agents from accepting any gifts from potential or existing suppliers. (Trinkets that are clearly of inconsequential value may be allowed.) These policies should apply not only to gifts of tangible goods, but also to services. For example, meeting planners should be informed that it is against company policy to accept frequent-traveler points from hotels for booking the company’s meetings there. Training employees how to respond to unsolicited “gifts” from suppliers is also important, because many kickback schemes are initiated when unethical suppliers send such “tokens of appreciation,” usually in the form of cash, to unwary employees. Once the employee accepts the gift, the supplier threatens to disclose the payment to a supervisor unless the employee makes additional purchases from that supplier. Job rotation is another important control to reduce the risk of kickbacks: Purchasing agents should not deal with the same suppliers indefinitely, because doing so increases the risk that they may succumb to the constant temptations offered by an unethical supplier. If the organization is too small to rotate job duties across different purchasing agents, it should periodically conduct a detailed audit of the purchasing agent’s activities. Purchasing agents should also be required to take their allotted vacation time each year, because many frauds are discovered when the perpetrator is absent and unable to continue covering up the illicit activity. Finally, purchasing agents should be required to sign annual conflict of interest statements, (control 11.3) disclosing any financial interests they may have in current or potential suppliers. Kickbacks are difficult to prevent, so detective controls are also necessary. One particularly effective detection control is the supplier audit. Supplier audits may be one of the best tools for assessing the effectiveness of expenditure cycle controls. It entails having an internal auditor visit a supplier’s office to check its records. The objective is to identify suppliers likely to be associated with problems such as kickbacks. Red flags that indicate potential problems include: 1. A large percentage of the supplier’s gross sales was to the company conducting the supplier audit. 2. The supplier’s pricing methods differ from standard industry practice. 3. The supplier does not own the equipment it rents but is itself renting that equipment from a third party. 15-1 .
Ch 15: The Expenditure Cycle: Purchasing to Cash Disbursements 4. Entertainment expenses are high in terms of a percentage of the supplier’s gross sales. 5. The supplier submits altered or fictitious third-party invoices. 6. The supplier’s address on its invoices is fictitious. Supplier audits can yield substantial returns. One company recovered more than $250,000 for such problems as duplicate billings. Supplier audits also often uncover violations of the company’s conflict of interest policy. Interestingly, many suppliers support the idea of supplier audits, because the process gives them a “good excuse” for not offering purchasing agents gifts or entertainment. 15.2
Errors in master files can cause a variety of problems in the expenditure cycle. Describe the problems to be expected if there are errors in the following: supplier master file, inventory master file, and purchasing master file. Inaccurate or invalid master data is the first general threat in the expenditure cycle. Errors in the master files are likely to cause the following problems, identified per master file:
15.3
Supplier master file: ordering from suppliers that are not on the approved list, purchasing materials that are inferior, purchasing items at inflated prices, untimely deliveries, sending payments to incorrect addresses, and payments to fictitious suppliers, which ultimately results in fraudulent payments. Inventory master file: unanticipated inventory shortages (leading to production delays in cases where companies produce products), unnecessary purchases, and excess inventory. Purchasing master file: unauthorized purchases and failure to take advantage of negotiated discounts.
What types of decision-making and strategic information should an AIS provide in the expenditure cycle. The AIS should provide decision making information to: Determine when and how much additional inventory to order. Select the appropriate vendors from whom to order. Verify the accuracy of vendor invoices. Decide whether purchase discounts should be taken. Monitor cash flow needs to pay outstanding obligations. AIS should also provide the following strategic and performance evaluation information on: Efficiency and effectiveness of the purchasing department. Analysis of vendor performance such as on-time delivery, quality, etc. Time taken to move goods from the receiving dock into production. Percentage of purchase discounts taken.
15.4
A petty cash fund should be set up as an imprest fund. Name the two characteristics of such a fund. An imprest fund has two characteristics: it is set at a fixed amount, such as $100, and it requires vouchers for every disbursement. At all times, the sum of cash plus vouchers should equal the preset fund balance. When the fund balance gets low, the vouchers are presented to accounts payable for replenishment. After accounts payable authorizes this transaction, the cashier then writes a check to restore the petty cash fund to its designated level. As with the supporting documents used for regular purchases, the vouchers used to support replenishment of the petty cash fund should be canceled at the time the fund is restored to its preset level.
15-2 .
Accounting Information Systems 15e, GE 15.5
Cash disbursement, the final step of the expenditure cycle, faces a number of threats including cash flow problems. Why is it important to monitor this problem? What is the best way to mitigate this threat? It is important to plan and monitor expenditures in order to avoid cash flow problems. A cash flow budget is the best way to mitigate this threat.
15.6
How should one go about choosing suppliers for a preferred supplier list? How should information systems be updated once a supplier is selected as preferred supplier for a specific product? There are several factors that should be considered before a supplier is added to a preferred supplier list. The main factors to consider are price, the quality of materials delivered, and supplier dependability in terms of making deliveries. When considering price, one needs to look at the prices offered by the supplier. Often, there might be negotiated discounts that could impact the decision to review the other factors for a specific supplier. The quality of materials is important, as companies incur rework and scrap costs if the quality of raw materials (in the case of production companies) are of poor quality. Suppliers need to deliver on time, as and when required / promised, as non-delivery or late delivery impacts other costs (with possible loss of customers) if the company cannot deliver because of supplier non-delivery. Once a supplier is identified as a preferred supplier for a specific product, the supplier should become part of the product inventory master record – this will ensure that, every time the specific product is ordered, it would not be required to select a supplier to purchase from, as the preferred supplier should already be indicated. There are some exceptions to this rule, though: in the case where products are high-cost and low-usage items, the management might want to specifically select a supplier for each purchase. It is also possible that the management wants an alternative potential supplier in case the primary supplier cannot deliver for any reason (such as a stockout on the supplier side).
15-3 .
Ch 15: The Expenditure Cycle: Purchasing to Cash Disbursements SUGGESTED ANSWERS TO THE PROBLEMS 15.1
Which internal control procedure would be most cost-effective in dealing with the following expenditure cycle threats? a. A purchasing agent orders materials from a supplier that he partially owns.
Require a purchase requisition from an operating department as authorization for preparation of all purchase orders.
Require purchasing manager, before approving PO, to o Review the purchase requisition o Ensure that orders are placed only with approved vendors.
Require purchasing agents to disclose any financial interest in supplier companies, though this may be difficult to enforce.
Ensure that purchasing agents do not have investments in vendors on the approved vendor list.
b. Receiving-dock personnel steal inventory and then claim the inventory was sent
to the warehouse. Count all deliveries and record counts on a receiving report. Require warehouse personnel to count the goods received when they are transferred to the warehouse and acknowledge receipt of the specified quantity by signing the receiving report. Have accounts payable personnel review the signed receiving report copy (signed by both the receiving department and the warehouse personnel) prior to approving payment. c. An unordered supply of laser printer paper delivered to the office is accepted
and paid for because the “price is right.” After jamming all of the laser printers, however, it becomes obvious that the “bargain” paper is of inferior quality.
The problem here is that office employees are seldom trained about proper procedures for receiving, because it is assumed that all goods are delivered only to the warehouse. Office employees, like receiving employees, need to be trained not to accept deliveries unless they can verify the existence of an approved purchase order for those goods. In addition, companies should not approve and pay invoices unless they can match the invoice to an approved purchase order and receiving report.
d. The company fails to take advantage of a 1% discount for promptly paying a
vendor invoice.
File invoices by discount date
Maintain a cash budget
15-4 .
Accounting Information Systems 15e, GE e. A company is late in paying a particular invoice. Consequently, a second invoice
is sent, which crosses the first invoice’s payment in the mail. The second invoice is submitted for processing and also paid.
f.
Review related supporting voucher package or records (receiving report and purchase order) before approving an invoice for payment.
Change the status of the invoice and its supporting records from "pending" to "paid" after payment is made.
Deface the invoice and all supporting documents (such as marking them paid) so they cannot be used to support the payment of a duplicate invoice.
Inventory records show that an adequate supply of copy paper should be in stock, but none is available on the supply shelf.
Count physical inventory periodically. Correct system records using the count.
g. The inventory records are incorrectly updated when a receiving-dock employee
enters the wrong product number at the terminal.
Use closed loop verification – The item number is entered as input, the system displays the corresponding item description, and the user is asked to verify that it is the desired item. Use barcodes or RFID tags to eliminate the need to enter the item number manually.
h. A clerical employee obtains a blank check and writes a large amount payable to
a fictitious company. The employee then cashes the check.
Store unused blank company checks in a secure location.
Segregate duties by having the person reconciling the bank account be different from the person making payments Segregate duties by having the person signing checks be different from the person authorizing disbursements and preparing checks
i.
Ensure that the check signer reviews the documentation (purchase order and receiving report) supporting each disbursement prior to signing each check.
A fictitious invoice is received and a check is issued to pay for goods that were never ordered or delivered.
Program the system so that it only prints checks to approved suppliers listed in the database Restrict access to the supplier master data. Require appropriate background checks and management approvals before adding a new supplier to the supplier master data Review changes to the supplier master data periodically Require supporting documents (purchase order and receiving report) for each invoice that is paid 15-5 .
Ch 15: The Expenditure Cycle: Purchasing to Cash Disbursements
j.
Require the person who authorizes disbursements to review the purchase order and receiving report, as well as the invoice.
Segregate duties by having the person signing checks be different from the person authorizing disbursements and preparing checks
Ensure that the check signer reviews the invoice, purchase order, and receiving report supporting each disbursement prior to signing a check.
Deface the invoice and all supporting documents (such as marking them paid) so they cannot be used to support the payment of a duplicate invoice.
The petty cash custodian confesses to having “borrowed” $12,000 over the last five years.
Create a petty cash imprest fund and only replenish it based on receipts documenting how the funds were used
Conduct periodic surprise counts of petty cash on hand to verify that the total of cash plus receipts equals the fund amount.
k. A purchasing agent adds a new record to the supplier master file. The company
does not exist. Subsequently, the purchasing agent submits invoices from the fake company for various cleaning services. The invoices are paid.
l.
Restrict access to the supplier master file Require appropriate background checks and management approvals before adding a new supplier to the supplier master data Monitor on a regular basis all changes made to the supplier master data Implement budgetary controls and regular analyses of expenses related to services to detect this type of problem, as well as higher-than-expected expenses for a particular department.
A clerk affixes a price tag intended for a low-end flat panel TV to a top-of-theline model. The clerk’s friend then purchases that item, which the clerk scans at the checkout counter.
Restrict access to price tags so that cashiers do not have access to price tags Segregate duties by not letting stocking clerks work as cashiers. Monitor check-out clerks, either live or by closed-circuit cameras, to deter fraud. Hire honest and ethical employees by conducting effective interviews, checking references, and conducting background checks if cost effective.
m. A receiving dock employee noticed that a delivery had four cases of iPads but
that the purchase order only requested three cases, so the employee set aside the fourth box and took it home.
Receiving dock employees should not know the quantities expected, only the supplier and the names of the items being ordered. That way they do not have the opportunity to steal “excess” shipments and also will be more diligent in correctly counting what 15-6 .
Accounting Information Systems 15e, GE
arrives. Purchasing should reconcile the receiving report against the purchase order and investigate the cause of all discrepancies.
n. A purchasing agent regularly orders from particular suppliers who pay the
employee kickbacks in order to win orders.
15.2
Require purchasing agents to disclose all financial investments in potential suppliers. Require competitive bidding for all purchases of high-priced items. Track and analyze the percentage of business each purchasing agent awards to various suppliers and investigate the quality and price charged by any suppliers from whom purchases are frequently made – if they are offering kickbacks, they likely are recouping their “investment” through shoddy products or higher prices, or both. Implement and enforce controls to prevent purchasing agents from making changes to the supplier master file (e.g., from adding or deleting suppliers and changing supplier status to preferred supplier). Hire honest and ethical employees by conducting effective interviews, checking references, and conducting background checks if cost effective.
Match the terms in the left column with their appropriate definition in the right column.
1. 2. 3. 4.
Terms _n__ economic order quantity __f_ materials requirements planning (MRP) _e__ Just-in-time (JIT) inventory system __g_ purchase requisition
a. b. c. d.
5. __b_imprest fund
e.
6. __a_ purchase order
f.
7. _s__ kickbacks
g.
8. __r_ procurement card
h.
9.
__p_ blanket purchase order
i.
10. _h__ evaluated receipts
j.
Definitions A document that creates a legal obligation to buy and pay for goods or services. The method used to maintain the cash balance in the petty cash account. The time to reorder inventory based on the quantity on hand falling to predetermined level. A document used to authorize a reduction in accounts payable when merchandise is returned to a supplier. An inventory control system that triggers production based upon actual sales. An inventory control system that triggers production based on forecasted sales. A document only used internally to initiate the purchase of materials, supplies, or services. A process for approving supplier invoices based on a two-way match of the receiving report and purchase order. A process for approving supplier invoices based on a three-way match of the purchase order, receiving report, and supplier invoice. A method of maintaining accounts payable in 15-7
.
Ch 15: The Expenditure Cycle: Purchasing to Cash Disbursements settlement (ERS) 11. __m_ disbursement voucher 12. _q_ receiving report
13. __d_ debit memo 14. _o__ vendor managed inventory 15. __l_ voucher package
16. _j__ non-voucher system 17. _k__ voucher system
which each supplier invoice is tracked and paid for separately. k. A method of maintaining accounts payable that generates one check to pay for a set of invoices from the same supplier. l. Combination of a purchase order, receiving report, and supplier invoice that all relate to the same transaction. m. A document used to list each invoice being paid by a check. n. An inventory control system that seeks to minimize the sum of ordering, carrying, and stockout costs. o. A system whereby suppliers are granted access to point-of-sale (POS) and inventory data in order to automatically replenish inventory levels. p. An agreement to purchase set quantities at specified intervals from a specific supplier. q. A document used to record the quantities and condition of items delivered by a supplier. r. A special purpose credit card used to purchase supplies. s. A fraud in which a supplier pays a buyer or purchasing agent in order to sell its products or services.
15-8 .
Accounting Information Systems 15e, GE 15.3
EXCEL PROJECT: Using Benford’s Law to Detect Potential Disbursements Fraud. a. Read the article “Using Spreadsheets and Benford’s Law to Test Accounting Data,” by Mark G. Simkin in the ISACA Journal, Vol. 1, 2010, available at www.isaca.org. b. Download the spreadsheet for this problem and follow the steps in the article to analyze whether the invoice data conforms to Benford’s Law. Your spreadsheet should: 1 Display the first digit for each invoice amount (Hint: You may need to use the Value and Left functions). 2 Complete the columns for “Expected #” and “Actual #” for the data set 3 Use a formula in cell F13 that calculates the sample size 4 Use a formula in cell G15 to calculate the chi-square test value comparing the actual and expected distribution of leading digits of invoice amounts 5 Create a chart that compares the actual and expected frequencies for the leading digits for invoice amounts
15-9 .
To apply Benford’s law, we need to write a formula that extracts the left-most digit from an invoice number. Excel has a number of built-in functions that can parse characters in a string. The function LEFT(cell, n) returns the left n characters from the specified cell. Thus, in our case, Left (C4,1) returns the left-most digit from cell C4. However, the various character-parsing functions (LEFT, RIGHT, MID) all return their results as text. Therefore, we need to transform that result back into a number by using the VALUE function. Therefore, the formula in column C is: =VALUE(LEFT(C4,1)) The formula for the sample size is: =COUNT(C2:C31) The formula in the “expected” column multiplies the values in cells F4:F12 by the count result in Cell G15 The formula in the “actual” column uses the COUNTIF function: =COUNTIF($C$2:$C$31,E18) – which counts the column of lead digits to see how many of them have the value in cell E18. Copying this formula down will yield counts of the number of lead digits equal to the value in cell E19, then E20, etc.
15-10 .
Accounting Information Systems 15e, GE 15.4 Match threats in the left column to appropriate control procedures in the right column. More than one control may be applicable. Threat 1. _d,e__ Failing to take available purchase discounts for prompt payment. 2. _f__ Recording and posting errors in accounts payable. 3. _l__ Paying for items not received. 4. __h,o_ Kickbacks. 5. _b,c,g_ Theft of inventory. 6. _m,l_ Paying the same invoice twice. 7. _g,b,c_ Stockouts. 8. __h,i,j,o_ Purchasing items at inflated prices. 9. __k,q_ Misappropriation of cash. 10. _h,i,o,p__ Purchasing goods of inferior quality. 11. __a_ Wasted time and cost of returning unordered merchandise to suppliers. 12. __n_ Accidental loss of purchasing data.
13. __j_ Disclosure of sensitive supplier information (e.g., banking data).
Control Procedure a. Only accept deliveries for which an approved purchase order exists. b. Document all transfers of inventory. c. d. e. f.
Restrict physical access to inventory. File invoices by due date. Maintain a cash budget. Automated comparison of total change in cash to total changes in accounts payable. g. Adopt a perpetual inventory system. h. Require purchasing agents to disclose financial or personal interests in suppliers. i. Require purchases to be made only from approved suppliers. j. Restrict access to the supplier master data. k. Restrict access to blank checks. l.
Only issue checks for a complete voucher package (receiving report, supplier invoice, and purchase order). m. Cancel or mark “Paid” all supporting documents in a voucher package when a check is issued. n. Regular backup of the expenditure cycle database. o. Train employees how to respond properly to gifts or incentives offered by suppliers. p. Hold purchasing managers responsible for costs of scrap and rework. q. Reconciliation of bank account by someone other than the cashier.
15-11 .
Ch 15: The Expenditure Cycle: Purchasing to Cash Disbursements 15.5
Use Table 15-2 to create a questionnaire checklist that can be used to evaluate controls for each of the basic activities in the expenditure cycle (ordering goods, receiving, approving supplier invoices, and cash disbursements). a. For each control issue, write a Yes/No question such that a “No” answer represents a control weakness. For example, one question might be “Are supporting documents, such as purchase orders and receiving reports, marked “paid” when a check is issued to the vendor?” A wide variety of questions is possible. Below is a sample list: Yes No Question 1. Is access to supplier master data restricted? 2. Are additions to supplier master data regularly reviewed and all changes investigated? 3. Is sensitive data encrypted while stored in the database? 4. Does a backup and disaster recovery plan exist? 5. Have backup procedures been tested within the past year? 6. Are appropriate data entry edit controls used? 7. Is a perpetual inventory maintained? 8. Are physical counts of inventory taken regularly and used to adjust the perpetual inventory records? 9. Are competitive bids used when ordering expensive items? 10. Are purchasing agents required to disclose financial interests in suppliers? 11. Are budgets set for service expenses and are variances investigated? 12. Is the system configured to generate purchase orders only to suppliers listed in the database? 13. Are receiving dock employees trained to accept deliveries only when an approved purchase order exists? 14. Are receiving dock employees trained about the importance of accurately counting all items delivered? 15. Do receiving dock employees inspect all deliveries for quality? 16. Do both receiving dock employees and inventory control employees sign off on the transfer of items? 17. Is physical access to inventory restricted? 18. Are invoices only approved for payment when accompanied by both a purchase order and receiving report? 19. Is supporting documentation cancelled or marked “Paid” when a check is generated? 20. Are invoices filed by due date (adjusted for any discounts for early payment)? 21. Is access to blank checks restricted? 22. Is access to the EFT system restricted? 23. Is the bank account regularly reconciled by someone not involved in issuing checks? 15-12 .
Accounting Information Systems 15e, GE b. For each Yes/No question, write a brief explanation of why a “No” answer represents a control weakness. Question 1 2 3 4 5 6 7 8 9 10 11 12
15
14 15 16 17 18 19 20 21 22 23
Reason a “No” answer represents a weakness Unrestricted access to supplier master data could facilitate fraud by allowing the creation of fake suppliers to whom checks can be issued. Failure to investigate all changes to supplier master data may allow fraud to occur because unauthorized suppliers may not be detected. Failure to encrypt sensitive data can result in the unauthorized disclosure of banking-related information about suppliers. If a backup and disaster recovery plan does not exist, the organization may lose important data. If the backup plan is not tested regularly, it may not work. Without proper data entry edit controls, errors in purchasing, receiving, and paying suppliers can occur. Without a perpetual inventory system, shortages and excess inventory is more likely. Without periodic physical counts, the perpetual inventory records are likely to be incorrect. Without competitive bids, purchases may be at higher than necessary prices. Non-disclosure of personal interests in suppliers creates a conflict of interest and may lead to kickbacks and other forms of fraud. Without budgets and analyses of services expenses, these expenses can be fraudulently inflated to cover up fraud. If generating purchase orders is not restricted to suppliers in the database, purchases may be made from unauthorized suppliers which may result in paying too much, receiving inferior quality goods, or violating laws. If receiving dock employees accept deliveries without an approved purchase order, this may result in higher costs and wasted time processing deliveries and then returning those unordered items. Failure to count deliveries accurately will create errors in inventory records and may result in paying for goods not received. Failure to inspect the quality of goods at the receiving dock increases the risk of production delays when the problem is discovered later. Failure to acknowledge the transfer of goods increases the risk of loss and precludes assigning responsibility for any shortages. Inadequate physical security increases the risk of theft of inventory. Failure to require a voucher package can result in paying for items not ordered or not received. Failure to cancel supporting documents can result in paying the same invoice twice. Failure to file invoices by due date increases the risk of not taking advantage of discounts for prompt payment. Unrestricted access to blank checks increases the risk of misappropriation of funds. Unrestricted access to the EFT system increases the risk of misappropriation of funds. Lack of an independent bank account reconciliation increases the risk of fraud going undetected. It also precludes the timely identification of unauthorized disbursements, possibly resulting in the bank refusing to correct the problem.
15-13 .
15.6
You are auditing a local pharmaceutical company. One of the newly appointed purchasing staff is an old school friend of yours. During lunch one day he tells you that the company’s purchasing department is looking at their list of preferred suppliers and wonders why his line manager was adamant that purchase orders should be sent only to preferred suppliers. Adding that he personally knows a supplier that can provide raw materials at a much better price than the preferred suppliers, your friend believes that he can save the company thousands in the long run.
REQUIRED Explain why purchasing from unauthorized suppliers is not acceptable and how supplier selection should be managed. Purchasing from unauthorized suppliers is one of the threats faced by the expenditure cycle. Several potential problems can be encountered when purchasing from unauthorized vendors:
items purchased may be of inferior quality. items may be overpriced. there might be legal consequences if a supplier, with whom it is illegal to transact, is used.
ERP systems should only allow approved suppliers to be used (that is, they should not be able to issue a purchase order to a supplier not on the approved supplier list) – these suppliers should appear in the master file and this file should not be available for editing by unauthorized staff. This is probably also one of the reasons why the current preferred supplier lists were scrutinized to ensure that there were no unauthorized changes made to the list.
15-14 .
15.7 The following table presents the results of using a CAAT tool to interrogate the XYZ Company’s ERP system for expenditure cycle activities. It shows the number of times each employee performed a specific task. Order Inventory
Employee A Employee B Employee C Employee D Employee E Employee F Employee G Employee H Employee I
Maintain Supplier Master File (add, delete, edit)
Receive Inventory
150 7
Approve Supplier Invoices for Payment 5 10 10
Pay Suppliers Via EFT
Sign Checks
Mail Checks
100
100
100
10
10
Reconcile Bank Account
425 150 400
125 25
1
306 300
Required Identify three examples of improper segregation of duties and explain the nature of each problem you find. 1. Employee A orders inventory and approves invoices – can order stuff for personal use. 2. Employee C maintains supplier master file and approves invoices, so could submit and approve payments to fictitious vendors. 3. Employee D approves invoices and makes EFT payments and signs/mails checks – could approve disbursal of funds to self. 4. Employee F signs checks and reconciles the bank account – could disburse funds to self and conceal by recording bank fees when reconciling the account. 5. Employee G approves invoices and mails checks – by getting custody of signed checks, has opportunity to alter.
15-15 .
15.8
The following list identifies several important control features. For each control, (1) describe its purpose and (2) explain how it could be best implemented in an integrated ERP system. a. Cancellation of the voucher package by the cashier after signing the check
b. Separation of duties of approving invoices for payment and signing checks c. Prenumbering and periodically accounting for all purchase orders. d. Periodic physical count of inventory. e. Requiring two signatures on checks for large amounts f. Requiring that a copy of the receiving report be routed through the inventory stores department prior to going to accounts payable. g. Requiring a regular reconciliation of the bank account by someone other than the person responsible for writing checks h. Maintaining an approved supplier list and checking that all purchase orders are issued only to suppliers on that list Item a.
Part I - Purpose Prevent resubmission of invoices for double payment
b.
Prevent payment of fictitious invoices
c. d.
Prevent unauthorized purchases. Verify the accuracy of recorded amounts and detect losses. Prevent large disbursements for questionable reasons. Verifies that items received were placed in inventory and were not stolen.
e. f.
g. h.
Detect unauthorized disbursements. Ensure the purchase of quality goods and prevent violations of laws or company policies.
Part II – ERP System Control Control field in supplier invoice record to indicate the document has been used Control field in purchase order and receiving report records to indicate the document has been used to support payment. System matches all invoices to corresponding receiving reports and purchase orders Checks signed by cashier. Sequence check of all purchase orders. Still need to count physical inventory periodically. Still need two signatures. Receiving clerks enter that goods were transferred to inventory. Inventory clerks acknowledge receipt of goods via terminals. System configured so that voucher package requires that the receiving report include the acknowledgement of receipt by inventory control. Still required. Validity check of supplier number on all purchase orders. Restrict access to the supplier master file Verify all changes to the supplier master file Restrictions on who can make changes to the supplier master file.
15-16 .
Accounting Information Systems 15e, GE 15.9
Firms often have to spend many hours on finding suppliers for the materials they require and find high demand items every time their inventory reaches reorder level. Having preferred suppliers for high demand items is one solution, but there is always the risk of stockouts if such suppliers are unable to supply. Stockouts of items like maintenance, repair, and operating (MRO) supplies and service parts as well as raw materials required in production could bring the operations of an organization to a standstill. Consider a motor vehicle manufacturing plant in Uitenhage, South Africa, that is located next to a tire manufacturing plant. The motor vehicle manufacturer uses the tires, manufactured in the plant next door to their motor vehicle assembly plant, in their production line. The tires from the manufacturing plant are therefore supplies required in the production line where motor vehicles are assembled.
REQUIRED Propose a solution to the motor vehicle manufacturer to ensure that sufficient stock of tires is always available for their production line, and explain its advantages and disadvantages. Vendor-managed inventory (VMI) is a process whereby large portions of inventory control and purchasing functions are outsourced. With VMI, suppliers are given access to sales and inventory data. Suppliers are then authorized to automatically replenish inventory when stock levels fall to a predetermined reorder level. Thus the tire manufacturer would be given access to the sales and inventory data of the motor manufacturer. Advantages: In this arrangement, costs are cut in that the inventory on hand is enough (as and when required) and formal purchase order processes are not required. Theoretically, there should not be any stockouts on the motor vehicle manufacturer side, as the tire supplier should monitor stock levels and replenish as and when needed. In most cases, these replenishments can take place without human intervention in terms of ordering processes. The tire manufacturer could maintain stock levels in the motor vehicle manufacturing plant at an optimum level, based on the production schedule of the motor manufacturer. The tire manufacturer can also adjust their production schedules based on the requirements of the motor manufacturer – the tire manufacturer can observe trends and ensure that they do not run out of stock. The motor vehicle manufacturer will only pay for stock used in the production line, so that they do not carry any excess stock. Disadvantages: The motor vehicle manufacturer is giving up some level of control over their tire inventory levels as this is now managed by an outside supplier. A challenge that is always part of this arrangement is the issue of trust – there needs to be complete trust between the two parties and the information systems of both parties need to be secure, as a security issue in one information system might potentially impact the security of the trading partner’s information system.
15-17 .
Ch. 15: The Expenditure Cycle: Purchasing and Cash Disbursements
15.10 Last year the Diamond Manufacturing Company purchased over $10 million worth of office equipment under its “special ordering” system, with individual orders ranging from $5,000 to $30,000. Special orders are for low-volume items that have been included in a department manager’s budget. The budget, which limits the types and dollar amounts of office equipment a department head can requisition, is approved at the beginning of the year by the board of directors. The special ordering system functions as follows: Purchasing A purchase requisition form is prepared and sent to the purchasing department. Upon receiving a purchase requisition, one of the five purchasing agents (buyers) verifies that the requester is indeed a department head. The buyer next selects the appropriate supplier by searching the various catalogs on file. The buyer then phones the supplier, requests a price quote, and places a verbal order. A prenumbered purchase order is processed, with the original sent to the supplier and copies to the department head, receiving, and accounts payable. One copy is also filed in the open-requisition file. When the receiving department verbally informs the buyer that the item has been received, the purchase order is transferred from the open to the filled file. Once a month, the buyer reviews the unfilled file to follow up on open orders. Receiving The receiving department gets a copy of each purchase order. When equipment is received, that copy of the purchase order is stamped with the date and, if applicable, any differences between the quantity ordered and the quantity received are noted in red ink. The receiving clerk then forwards the stamped purchase order and equipment to the requisitioning department head and verbally notifies the purchasing department that the goods were received. Accounts Payable Upon receipt of a purchase order, the accounts payable clerk files it in the open purchase order file. When a vendor invoice is received, it is matched with the applicable purchase order, and a payable is created by debiting the requisitioning department’s equipment account. Unpaid invoices are filed by due date. On the due date, a check is prepared and forwarded to the treasurer for signature. The invoice and purchase order are then filed by purchase order number in the paid invoice file. Treasurer Checks received daily from the accounts payable department are sorted into two groups: those over and those under $10,000. Checks for less than $10,000 are machine signed. The cashier maintains the check signature machine’s key and signature plate and monitors its use. Both the cashier and the treasurer sign all checks over $10,000. a. Describe the weaknesses relating to purchases and payments of “special orders” by the Diamond Manufacturing Company. b. Recommend control procedures that must be added to overcome weaknesses identified in part a. c. Describe how the control procedures you recommended in part b should be modified if Diamond reengineered its expenditure cycle activities to make maximum use of current IT (e.g., EDI, EFT, bar-code scanning, and electronic forms in place of paper documents). 15-18 .
Accounting Information Systems 15e, GE Weakness 1. Buyer does not verify that the department head’s request is within budget.
Control Compare requested amounts to total budget and YTD expenditures.
Effect of new IT System can automatically compare the requested amount to the remaining budget.
2. No procedures established to ensure the best price is obtained.
Solicit quotes/bids for large orders.
EDI and Internet can be used to solicit bids.
3. Buyer does not check vendor’s past performance.
Prepare a vendor performance report and use it when selecting vendors.
Vendor performance ratings can be updated automatically and made available to buyer.
4. Blind counts not made by receiving.
Black out quantities ordered on copy of Purchase Order sent to receiving Provide incentives if discrepancies between packing slip and actual delivery are detected.
5. Written notice of equipment receipt not sent to purchasing. 6. Written notice of equipment receipt not sent to accounts payable 7. Mathematical accuracy of vendor invoice is not verified. 8. Invoice quantity not compared to receiving report quantity. 9. Notification of acceptability of equipment from requesting department not obtained prior to recording payable.
Send written notice of equipment receipt to purchasing. Send written notice of equipment receipt to accounts payable Verify mathematical accuracy of vendor invoice. Compare/verify invoiced quantity with quantity received. Obtain confirmation from requisitioner of the acceptability of equipment ordered prior to recording payable.
Do not permit receiving clerks to access quantities on purchase orders. Request bar coding or RFID tagging of all items and use readers to check in all deliveries. Still provide incentives to detect discrepancies. Receiving data and comments entered via on-line terminals and routed to purchasing. Configure system to notify accounts payable automatically of equipment receipt. Automatic verification of mathematical accuracy of vendor invoice. System verifies invoice quantity with quantity received.
10. Voucher package not sent to Treasurer.
Send voucher package (purchase order and receiving report) to Treasurer along with approved invoice. Treasurer should mark voucher package as PAID when check is signed.
Configure system to match invoices automatically with supporting documents.
Bank account should be reconciled by someone other than Accounts Payable or the treasurer.
Bank account should be reconciled by someone other than Accounts Payable or the treasurer.
11. Voucher package not cancelled when invoice paid. 12. No mention of bank reconciliation.
15-19 .
Configure system to require confirmation of equipment acceptability prior to approving invoice for payment.
Configure system to mark supporting documents as used when invoice is paid.
d. Draw a BPMN diagram that depicts Diamond’s reengineered expenditure cycle. (CPA Examination, adapted) Solution will vary depending upon which weaknesses were corrected. This BPMN addresses all the weaknesses listed above. Employee Department Heads
Activity Performed (sequential, left-to-right across all rows) Purchase Requisition
Inspect & Approve
Equipment
Purchasing (Buyer)
Verify request within budget; use RFP for large purchases; check supplier history
Order Inventory
Notification of acceptability
RR copy
Update open P.O.s
Receiving Clerk Receive & Inspect Receiving Report
Accounts Payable
Monthly
Receive Invoice from Supplier
Use P.O and R.R. to approve invoice and update A/P
Treasurer Pay Supplier & Cancel Voucher Package
15-20 .
File Cancelled Voucher Package
Receive & Reconcile bank statement
15.11 The ABC Company performs its expenditure cycle activities using its integrated ERP system as follows: Employees in any department can enter purchase requests for items they note as being either out of stock or in small quantity. The company maintains a perpetual inventory system. Each day, employees in the purchasing department process all purchase requests from the prior day. To the extent possible, requests for items available from the same supplier are combined into one larger purchase order in order to obtain volume discounts. Purchasing agents use the Internet to compare prices in order to select suppliers. If an Internet search discovers a potential new supplier, the purchasing agent enters the relevant information in the system, thereby adding the supplier to the approved supplier list. Purchase orders above $10,000 must be approved by the purchasing department manager. EDI is used to transmit purchase orders to most suppliers, but paper purchase orders are printed and mailed to suppliers who are not EDI capable. Receiving department employees have read-only access to outstanding purchase orders. Usually, they check the system to verify existence of a purchase order prior to accepting delivery, but sometimes during rush periods they unload trucks and place the items in a corner of the warehouse where they sit until there is time to use the system to retrieve the relevant purchase order. In such cases, if no purchase order is found, the receiving employee contacts the supplier to arrange for the goods to be returned. Receiving department employees compare the quantity delivered to the quantity indicated on the purchase order. Whenever a discrepancy is greater than 5%, the receiving employee sends an email to the purchasing department manager. The receiving employee uses an online terminal to enter the quantity received before moving the material to the inventory stores department. Inventory is stored in a locked room. During normal business hours an inventory employee allows any employee wearing an identification badge to enter the storeroom and remove needed items. The inventory storeroom employee counts the quantity removed and enters that information in an online terminal located in the storeroom. Occasionally, special items are ordered that are not regularly kept as part of inventory, from a specialty supplier who will not be used for any regular purchases. In these cases, an accounts payable clerk creates a one-time supplier record. All supplier invoices (both regular and one-time) are routed to accounts payable for review and approval. The system is configured to perform an automatic 3way match of the supplier invoice with the corresponding purchase order and receiving report. Each Friday, approved supplier invoices that are due within the next week are routed to the treasurer’s department for payment. The cashier and treasurer are the only employees authorized to disburse funds, either by EFT or by printing a check. Checks are printed on dedicated printer located in the treasurer’s department, using special stock paper that is stored in a locked cabinet accessible only to the treasurer and cashier. The paper checks are sent to 15-21 .
Ch. 15: The Expenditure Cycle: Purchasing and Cash Disbursements
accounts payable to be mailed to suppliers. Monthly, the treasurer reconciles the bank statements and investigates any discrepancies with recorded cash balances.
Required: a. Identify weaknesses in ABC’s existing expenditure cycle procedures, explain the resulting problems, and suggest as solution. Weakness/Problem Applicable Control Purchase requests are not reviewed and Purchase requisitions should be reviewed and approved prior to submission. This can approved by the originating department’s result in ordering unnecessary items. manager prior to being processed. A formal inventory control system (EOQ, A formal inventory control system should be MRP, or JIT) is not used. This is likely to used to plan purchases to minimize the result in both shortages and excess combined costs of stock outs, excess inventory. inventory, and ordering costs. There is no mention of periodic physical Regular physical counts of inventory need to counts of inventory. Thus, the perpetual be conducted. inventory records are likely to become Discrepancies with the perpetual inventory inaccurate over time. It will also not be records need to be promptly investigated. possible to detect theft of inventory in a timely manner. Any purchasing agent can add new Restrict the number of employees who can suppliers to the approved supplier master make changes to the approved supplier list. file without approval. As a result, the Periodically print a report of all changes and approved supplier master file may review them to ensure that they have all been contain unreliable or non-existent approved. suppliers. Selection of suppliers is based solely on Criteria for selecting suppliers should include price. As a result, inferior quality information on supplier reliability and products could be purchased, resulting in product quality. increased costs due to warranty repairs, The system should be configured to track scrap, or rework. actual supplier performance against promised delivery dates. Receiving department employees have Reconfigure the system and do not permit access to the quantities ordered on receiving department employees’ to access purchase orders. This may lead them to quantity ordered information. not actually count every delivery, especially during busy times, but instead simply visually compare the quantity delivered to the quantity ordered. Receiving department employees Create a policy requiring receiving sometimes unload deliveries without department employees to always verify the verifying the existence of an approved existence of a valid purchase order before purchase order. This wastes time in accepting delivery. 15-22 .
Accounting Information Systems 15e, GE unloading and then subsequently contacting the supplier to return the unordered items. Receiving department employees inform purchasing of discrepancies between quantities received and ordered greater than 5%. They may fail to do this during busy periods, resulting in failure to timely resolve problems. The identity of employees removing inventory from the storeroom is not recorded. This makes it difficult to investigate the cause of any discrepancies between recorded and actual counts of inventory. Accounts payable clerks can create onetime supplier records without review and subsequently approve payments to those suppliers. This creates the possibility of fraudulent disbursements. There is no indication that supporting documents in the voucher package are marked “cancelled” or “paid” after being used to issue a check. This can result in duplicate payments. Checks are returned to accounts payable to be mailed to suppliers. This provides an opportunity to intercept and alter a check. The treasurer, who has the ability to write checks and authorize EFT payments, also reconciles the bank account. This provides an opportunity to commit fraud and cover up the discrepancy by altering the reconciliation.
Publish and enforce sanctions for violating this policy. Schedule additional help during busy periods. Configure the system to compare quantities received to quantities ordered. The system should send discrepancies exceeding a tolerable deviation directly to the purchasing manager. The identity of employees removing inventory should be recorded. This can be done either by swiping an ID badge or by entering a user ID in an online terminal.
The system should be configured to print a list of all one-time suppliers. Management should review that list regularly. Accounts payable should not be able to create any new supplier records – that task should only be done by the purchasing manager. The system should be configured to mark supporting documents in a voucher package as PAID when used to generate a check or EFT payment. Checks should be mailed by the cashier or the cashier’s assistant.
Someone other than the cashier or treasurer should reconcile the bank account statement.
b. Draw a BPMN that reflects the ABC Company’s reengineered expenditure cycle processes. Actual solution will depend upon which weaknesses were identified; this diagram addresses all the weaknesses
15-23 .
Employee Any Employee
Activity Performed (sequential, left-to-right across all rows) Purchase Requisition
Purchasing (Buyer)
Review & Approve – if not approved, return to requester
Order Inventory
RR copy
Update open P.O.s
Copy of P.O.
Receiving Clerk
Receive & Inspect
Inventory Control Store Goods & Sign off with Receiving Clerk
Receiving Report
Accounts Payable
Monthly Receive Invoice from Supplier
Use P.O and R.R. to approve invoice and update A/P
Treasurer or Cashier Pay Supplier & Cancel Voucher Package
15-24 .
File Cancelled Voucher Package
Receive & Reconcile bank statement
15.12 Figure 15-12 depicts the basic activities performed in Lexsteel’s expenditure cycle. The following additional information supplements that figure:
Because of cash flow problems, Lexsteel always pays suppliers on the last possible day before incurring a penalty for late payment. Supplier invoices are processed and paid weekly. Every Friday, the accounts payable clerk reviews and approves all invoices with a due date the following week. The purchasing manager reviews and approves all purchases prior to emailing them to suppliers. After counting and inspecting incoming deliveries, the receiving clerk enters the following information into the system: o Quantities received for each inventory item o Date and time received o Supplier number After entering that information, the receiving clerk takes the inventory to the inventory control department for storage. Access to the inventory control department is restricted. Inventory is only released to production when properly authorized request is received. When the inventory is released, the inventory control clerk updates the perpetual inventory system. Physical counts of inventory are taken every three months. Discrepancies between the counts and recorded quantities on hand are investigated. Upon resolution of the investigation, the plant manager authorizes adjustments to the perpetual inventory records to change them to the amount actually on hand.
REQUIRED Identify at least three control weaknesses in Lexsteel’s expenditure cycle. For each weakness, explain the threat and suggest how to change the procedures to mitigate that threat. 1. Weakness: No timely resolution/follow-up if there are differences between quantities order and received. a. Threat: may end up paying for items not received. b. Recommendation: timely reconciliation of receiving report against purchase order and follow-up on any discrepancies. 2. Weakness: Voucher package not cancelled upon payment. a. Threat: Uncancelled documents can be used to make duplicate or fraudulent disbursements. b. Recommendation: cancel the PO and RR upon approval to pay vendors. 3. Weakness: treasurer makes EFT transactions and reconciles bank statements. a. Threat: Treasurer can steal funds and conceal by adjusting the bank reconciliation. b. Recommendation: someone other than the treasurer, who does not have access to cash, should do the bank reconciliation. 4. Weakness: Lexsteel does not take advantage of discounts for early payment. 15-25 .
Ch. 15: The Expenditure Cycle: Purchasing and Cash Disbursements
a. Threat: Cash flow problems are made worse because must pay more than necessary. b. Recommendation: Develop a cash budget and procure a line of credit to enable taking advantage of supplier discounts for early payment of invoices. 5. Weakness: Receiving clerk has custody of inventory and updates records a. Threat: theft by receiving clerk, who can conceal by adjusting the records. b. Recommendation: require documentation of quantity transferred to inventory. 6. Weakness: Copy of RR sent to A/P is not signed by inventory control. a. Threat: theft of inventory with no way to determine accountability. b. Recommendation: require inventory control and receiving to both sign off on transfer of inventory to stores. 7. Weakness: no indication that receiving verifies that all incoming deliveries are authorized. a. Threat: time and cost of receiving and then returning unordered merchandise. b. Recommendation: require receiving to check open PO file (without information about quantities ordered) prior to accepting a delivery.
Problem 15.13 Excel Problem REQUIRED Download the spreadsheet for this problem from the course website and use the Filter and Sort functions to identify the following warning signs of potentially fraudulent supplier invoices: 1. Suppliers that have multiple different names but the same address 2. Different suppliers with the same PO Box for an address 3. Suppliers who submit sequentially numbered invoices 4. Invoices just below a threshold requiring approval; for example, invoices just below $10,000 5. Duplicate invoice numbers from the same supplier 6. Invoices without a number Solution steps for Problem 15.13 1. First sort by supplier (payee) name in in alpha order will show multiple variants for AAA Hardware and DFR, Inc. Also helps if you insert a couple of blank rows between each name. 2. Filter on the Address column. Choose “Advanced Filter” and Click “begins with” then enter P* to find PO Boxes. Next sort by PO Box number – will see several names with same PO box (DFR and Midwest Copiers)
15-26 .
Accounting Information Systems 15e, GE 3. First sort by supplier, then sort by invoice number will reveal that all invoices for Office Supply Headquarters are in sequence – even though days apart. This is suspicious because indicates we are their only customer. 4. First sort by amount in descending order. Then filter on the amount column, clicking the “Between” button, setting it to be at least $9000 and less than $10,000 to see invoices just below $10,000 from AAA Hardware, Z Best Office Supplies, and Office Supply Headquarters. Given that the latter invoices are also sequentially numbered, looks suspicious. 5. Sort by supplier (payee name) then by invoice number shows several duplicates: invoice 2133 from Hard Copy Masters and invoice 2156 from DFR 6. Filter on Invoice number and select “blanks” 15.14 Answer the following multiple-choice questions: 1.
Which of the following is (are) true regarding an imprest fund? a. It has a flexible amount available. b. Vouchers are required for each disbursement. c. The sum of the cash and the vouchers should be equal to a preset value. d. Both a. and b. are true. e. Both b. and c. are true.
Correct answer: e. 2.
Which of the following control procedures mitigates the threat of duplicate payments? a. Invoices should be approved for payment only when accompanied by a valid purchase order. b. Photocopied invoices can be paid. c. When an invoice is paid, the invoice and the entire voucher package should be canceled (for example marked “paid”) in a way that it cannot be submitted again. d. When evaluated receipt settlement (invoiceless system) is used, receiving reports need not be marked as paid as no invoices are generated. e. None of the statements above are true.
Correct answer: c. 3.
Which of the following processes is ideal for automation? a. Matching supplier invoices to purchase orders and receiving reports b. Auditing of supplier records c. Identifying preferred suppliers d. Creation of a purchase order e. None of the above
Correct answer: a. 15-27 .
Ch. 15: The Expenditure Cycle: Purchasing and Cash Disbursements
4.
Which of the following cannot act as a control to the threat of errors in supplier invoices? a. Require detailed receipts for all procurement card purchases b. Data entry edit controls c. Restrict access to supplier master data d. Utilize evaluated receipt settlement e. Verification of the freight bill
Correct answer: b. 5.
Which of the following is not a threat to activities associated with ordering? a. Accepting unordered items b. Not taking advantage of discounts offered c. Theft of inventory d. All of the above e. None of the above
Correct answer: d. 6.
Which of the following is (are) true about the expenditure cycle? a. The primary external information exchange is with customers. b. Expense data flow from the expenditure cycle to the general ledger and reporting system. c. The primary objective of the expenditure cycle is to minimize the total cost of retaining customers. d. All of the statements above are true. e. None of the statements above is true.
Correct answer: b. 7.
Which of the following is (are) used to determine the reorder point of inventory items? a. Delivery time b. Desired stock levels to handle unexpected demand fluctuations c. Number of items required d. Only a. and b. e. None of the above
Correct answer: d. 8.
In which of the following cases will a debit memo be prepared? (Select all that apply.) a. When the quantity of goods received is different from the amount ordered b. When damaged goods are received 15-28 .
Accounting Information Systems 15e, GE c. When poor quality goods are received d. When a duplicate payment has been made e. When inventory is moved from the warehouse to the loading dock Correct answer: b and c. 9.
Why should the receiving department have access to the open purchase order file? a. To ensure accurate counts of inventory received b. To compare actual versus budgeted expenses c. To only accept deliveries with a valid purchase order d. To reduce costs of unloading and storing unordered goods e. All of the above
Correct answer: c. 10.
What can be used to reduce the number of small invoices paid by accounts payable? a. Disbursement voucher b. ERS c. Non-voucher system d. Procurement card e. Imprest fund
Correct answer: d.
15-29 .
Ch. 15: The Expenditure Cycle: Purchasing and Cash Disbursements
SUGGESTED ANSWERS TO THE CASES CASE 15-1
GROUP CASE ANALYSIS
Read the case titled “The Rosslyn School District Fraud: Improving School District Internal Control and Financial Oversight” available from your instructor, and write a report that answers the following questions: 1. What internal control weaknesses allowed the fraud to occur? 2. How would the establishment of an audit committee and six hours of training on financial oversight responsibilities (part of the Five Point Plan) reduce the risk of a similar fraud occurring again? 3. How would the recommended changes in claims processing affect the risk of a similar fraud occurring again? NOTE TO INSTRUCTORS: The case is published in Issues in Accounting Education, Volume 32, Number 4 (November 2017), pp. 25-39. However, do not just download the entire article and post because pp. 35-39 contain information that students do not need to see. Instead, post the “Student Version of the Case” which is a supplemental file posted with the Teaching Notes. The Teaching Notes and the Student Version of the Case are available only to non-student-member subscribers to Issues in Accounting Education through the American Accounting Association’s electronic publications system at http://www.aaapubs.org/ . Nonstudent-member subscribers should use their usernames and passwords for entry into the system where the Teaching Notes can be reviewed and printed. Please do not make the Teaching Notes available to students or post them on websites. If you are a non-student-member of AAA with a subscription to Issues in Accounting Education and have any trouble accessing this material, please contact the AAA headquarters office at info@aaahq.org or (941) 921-7747. Grading: See Teaching Notes for suggested solutions. Grade on quality of answer and on writing quality.
15-30 .
Accounting Information Systems 15e, GE Case 15-2: Anatomy of a multi-million dollar embezzlement at ING bank REQUIRED: It is instructive to study, in detail, how payment frauds work. Read the article “Lessons from an $8 Million Fraud” by Mark J. Nigrini and Nathan J. Mueller, published in the Journal of Accountancy (August 2014), pp. 32-37 and write a report that answers the following questions: 1. What misconfiguration error in the ERP system enabled the fraud to occur? 2. What security best practices were not followed and, therefore, facilitated the fraud? What access controls should have been in place to prevent or reduce the risk of the fraud? 3. What segregation of duties violations allowed the fraud to occur? 4. What detective controls failed, thereby allowing the fraud to continue? 5. How was the fraud finally uncovered? 6. What aspects of the internal environment element of the COSO framework could have prevented or reduce the likelihood of the fraud occurring? 7. How could the fraud have been detected earlier? Grade based on thoroughness of the answer AND on writing. Key points to include: 1. Misconfiguration of ERP system gave Mueller ability to approve and issue checks up to $250,000 even though he was an accounting manager who, therefore, controlled the accounting records to conceal his theft. 2. Employees shared login credentials. ING should have followed these practices: a. Multi-factor authentication b. Policy against sharing credentials and regular audits to verify compliance with that policy c. Authorization controls to restrict employees from having incompatible duties d. Physical safeguarding of checks 3. Mueller could authorize payments, had custody of the checks, and controlled the recording process. 4. Several, including: a. The Accounts Payable department should have investigated the $4,500 check that was returned to them. b. Internal audit should have performed analytics on payments to suppliers, which would have detected the escalating growth in payments to ACE. 5. Mueller’s ex-wife discussed her suspicions with an employee at ING. 6. Several, including a. Proper hiring practices would have led to careful scrutiny of all new employees who joined the firm via mergers. b. Effective supervision would have noticed Mueller’s extravagant lifestyle. c. Fraud awareness training might have led the A/P department to investigate the returned check. 15-31 .
Ch. 15: The Expenditure Cycle: Purchasing and Cash Disbursements
7.
d. A fraud hotline might have encouraged coworkers to report their suspicions. Several, including a. Effective supervision would have noticed Mueller’s extravagant lifestyle as a red flag and initiated investigation. b. Fraud awareness training might have led the A/P department to investigate the returned check. c. A fraud hotline might have encouraged coworkers to report their suspicions. d. Regular security audits might have uncovered the weaknesses in security practices that enabled the fraud to occur. e. Compliance audits might have discovered the lack of segregation of duties that enabled the fraud to occur and continue.
15-32 .
CHAPTER 16: THE PRODUCTION CYCLE SUGGESTED ANSWERS TO DISCUSSION QUESTIONS 16.1. Why are access control and appropriate user rights included in integrated ERP potential threats, and how can they be mitigated? Enforcing proper access controls and segregation of duties requires that the controller or CFO review and suggest appropriate configuration of user rights in integrated ERP systems. The default installation of such systems typically provides every employee with far too much power. Therefore, it is important to modify user permissions to ensure that employees are assigned only those privileges necessary to perform their specified job duties. In addition to multifactor authentication of employees, locationbased access controls on devices should also be used. For example, the system should be programmed to reject any attempts to alter inventory records from a terminal located in the engineering department. Finally, logs of all activities, especially any actions involving managerial approval, such as requests for additional raw materials or overtime, should be recorded and maintained for later review (control 1.3) as part of the audit trail. 16.2. Discuss the two outputs created by product design. What do these documents describe, and what are they used for? The product design activity creates two outputs. The first, a bill of materials, which specifies the part number, description, and quantity of each component used in a finished product. The second is an operations list, which specifies the sequence of steps to follow in making the product, which equipment to use, and how long each step should take. 16.3. List the similarities between MRP-II manufacturing and lean manufacturing. When is the use of MRP-II most suitable for a company? Two common methods of production planning are manufacturing resource planning and lean manufacturing. Manufacturing resource planning (MRP-II) is an extension of materials resource planning (discussed in Chapter 13) that seeks to balance existing production capacity and raw materials needs to meet forecasted sales demands. MRPII systems are often referred to as push manufacturing, because goods are produced in expectation of customer demand. Just as MRP-II is an extension of MRP inventory control systems, lean manufacturing extends the principles of just-in-time inventory systems (discussed in Chapter 13) to the entire production process. The goal of lean manufacturing is to minimize or eliminate inventories of raw materials, work in process, and finished goods. Lean manufacturing is often referred to as pull manufacturing, because goods are produced in response to customer demand. Theoretically, lean manufacturing systems produce only in response to customer orders. In practice, however, most lean manufacturing systems develop short-run production plans. For example, Toyota develops monthly production plans so that it can provide a stable schedule to its suppliers. This strategy enables the suppliers to plan their production schedules so that they can deliver their products to Toyota at the exact time they are needed. 16-1 .
Thus, both MRP-II and lean manufacturing systems plan production in advance. They differ, however, in the length of the planning horizon. MRP-II systems may develop production plan for up to 12 months in advance, whereas lean manufacturing systems use much shorter planning horizons. If demand for a company’s product is predictable and the product has a long life cycle, then an MRP-II approach may be justified. In contrast, a lean manufacturing approach may be more appropriate if a company’s products are characterized by short life cycles, unpredictable demand, and frequent markdowns of excess inventory. 16.4. Discuss how an ERP system can provide integration to enable accurate production planning. Use a practical example to support your discussion. To enable accurate production planning, integration between customer orders, purchases from suppliers, and labor availability are required. Customer orders are recorded in the revenue cycle; purchases from suppliers are recorded in the expenditure cycle; and labor availability comes from the HR/Payroll cycle. ERP systems have the ability to provide the integration required. Example: When a new order comes in, the system checks the inventory on hand to determine the quantities that should be produced to fill the new order. Labor needs are then calculated and based on what labor is required to fill the order within the specified time frame; it is determined whether overtime should be scheduled or if additional (and possibly temporary) assistance should be hired. At the same time, the bill of materials is used to determine if any components need to be ordered. If any components are required, purchase orders are sent to the appropriate suppliers (typically via EDI). The MPS is then updated to include the newly received order. 16.5
Some companies have switched from a “management by exception” philosophy to a “continuous improvement” viewpoint. The change is subtle, but significant. Continuous improvement focuses on comparing actual performance to the ideal (i.e., perfection). Consequently, all variances are negative (how can you do better than perfect?). The largest variances indicate the areas with the greatest amount of “waste,” and, correspondingly, the greatest opportunity for improving the bottom line. What are the advantages and disadvantages of this practice? An advantage of continuous improvement reports is that they combat the tendency for complacency. A disadvantage is that they can create too much pressure if expectations for improvement are unrealistic. Accountants can help avoid this by becoming involved in collecting and analyzing performance data to ensure that targets are realistic.
16-2 .
SUGGESTED ANSWERS TO THE PROBLEMS 16.1. Match the terms in the left column with their definitions from the right column: 1. _c__ Bill of materials 2. _k__ Operations list 3. _l__ Master Production Schedule 4. _m_ Lean manufacturing 5. _j__ Production order 6. _d__ Materials requisition
7. _i__ Move ticket
8. _h__ Job-time ticket 9. _f__ Job-order costing 10. _a_ Cost driver 11. _b_ Throughput 12. _o_ Computer-integrated manufacturing
a. A factor that causes costs to change. b. A measure of the number of good units produced in a period of time. c. A list of the raw materials used to create a finished product. d. A document used to authorize removal of raw materials from inventory. e. A cost-accounting method that assigns costs to products based on specific processes performed. f. A cost accounting method that assigns costs to specific batches or production runs and is used when the product or service consists of uniquely identifiable items. g. A cost accounting method that assigns costs to each step or work center and then calculates the average cost for all products that passed through that step or work center. h. A document that records labor costs associated with manufacturing a product. i. A document that tracks the transfer of inventory from one work center to another. j. A document that authorizes the manufacture of a finished good. k. A document that lists the steps required to manufacture a finished good. l. A document that specifies how much of a finished good is to be produced during a specific time period. m. A production planning technique that is an extension of the just-in-time inventory control method. n. A production planning technique that is an extension of the Materials Requirement Planning inventory control method. o. A term used to refer to the use of robots and other IT techniques as part of the production process.
16-3 .
16.2
Which internal control procedure(s) would best prevent or detect the following threats? a. A company has developed a unique product that is rather complex to manufacture and that contains a large number of unique components, but its manufacturing is a tedious, time consuming process.
This is a typical example of poor product design which increases costs – accountants should participate in the product design activity. Accountants can analyze how the use of alternative components and changes in the production process can decrease production costs. In cases where there are large warranty and repair costs, accountants can also use information from the revenue cycle about repair and warranty costs to identify causes of failure and suggest redesign opportunities. b. The production employee requested additional raw materials not indicated on the bill of materials and asked the inventory control clerk to immediately send over the raw materials without waiting for the proper documentation, claiming that the production run was halted as there was a shortage of those raw materials.
Any additional materials should be documented and authorized by supervisory staff. Move tickets are required to document the movement of inventory through the stages in the production process.
c. A compressor used in production malfunctioned and caused a fire on the production line.
Physical safeguards such as fire alarms and fire sprinklers should be installed to minimize the risk during events such as a fire. Insurance should be taken out to replace or repair any fixed assets that are damaged during a disaster such as a fire.
d. The quantities indicated on the materials requisition and the move tickets of raw materials for transfers to the factory were indicated as 3% more than required and the excess arriving at the factory was then sold privately.
This typically involves people from different departments working together to steal excess material – thus a variety of controls would be needed. All inventory movement should be documented - the bill of materials information and what is recorded in the MPS should match what goes onto the materials requisition and the move ticket. Periodic physical counts of inventory and reconciliation of those counts to recorded quantities should be done. Access to inventory master data should be restricted. Custody of assets should be segregated from recording and authorizing asset removals.
e. An engineer accessed the inventory records from the engineering department to update them.
Restrict access to master data and ensure that the access control in the ERP system is set to only give relevant staff authorized access to the master file. The system should also prevent access to inventory, based on the location of the requesting computer – thus location-based access control should also be implemented. 16-4 .
The controller or CFO should review access controls and request appropriate configuration of user rights in an integrated ERP.
f. Physical work-in-progress inventory counts did not match the records in the production information system.
Supervision by factory supervisors should be required. Inventory movement should be recorded throughout the production process on the production floor, using RFID or bar codes to track where and how workin-progress items are moving. An employee that does not have custodial responsibility should perform physical counts periodically.
g. A move ticket was completed by a production employee to illegally obtain raw materials from the storeroom.
Authorization of move tickets should be limited to appropriate staff. A move ticket should be accompanied by a materials requisition and production order for transfer from the storeroom to the factory for production. Unexplained variances between actual and recorded work-in-progress should be investigated.
h. A staff member in production sent the exact steps for manufacturing a novel item to the production engineer via email, but somehow this information made its way onto a social media platform.
Ensure proper access controls (thus only authorized personnel should be able to access this information). Encryption of this type of information is crucial – both when this information is transmitted (for example via email) and when backups of this information are stored.
i. An employee entered part number 589974 instead of part number 589947 as being used in the production of a specific item.
Closed loop verification and validity checks can be performed to ensure that data entry is accurate. Data collection could potentially also be automated by scanning a bar code or reading an RFID tag to identify the part number used.
j. Expensive equipment required for the production of a new item was purchased directly out of a departmental budget.
A formal request for competitive bids by potential suppliers is required. A RFP should be distributed to all prospective suppliers. Responses from prospective suppliers should be reviewed by the capital investments committee and the best bid should be identified. Only at this point can the normal expenditure cycle process be followed.
k.A fast-fashion clothing manufacturer was forced into having an end-ofseason sale to move large quantities of excess stock from its inventory to improve its cash flow.
Overproduction results in the risk of carrying excess inventory and potentially also negatively impacting cash flow – proper production planning can mitigate these risks. 16-5 .
Accurate and current sales forecasts and data about current inventory can improve forecasts. Trends and total time to manufacture should be regularly collected and this data used to adjust the MPS. Production orders should be properly approved and authorized. Correct production orders should be released. Access to production scheduling programs should be restricted to ensure that only authorized production orders are released.
l. A company developed a new product and required several new staff members to man its production line. Planning was ahead of schedule and it was possible to start production earlier than anticipated. Despite proper planning, there was clear evidence of poor performance on some areas of the production line. 16.3
It is possible that production line workers were not properly trained – especially since production started earlier than anticipated. Proper training should address the poor performance. Performance reports should indicate where training is lacking.
Use Table 16-1 to create a questionnaire checklist that can be used to evaluate controls for each of the basic activities in the production cycle (product design, planning and scheduling, production operations, and cost accounting).
a. For each control issue, write a Yes/No question such that a “No” answer represents a control weakness. A wide variety of questions is possible. Below is a sample list: Question Yes No 1. Is access to production master data (production orders, inventory, master production schedule, etc.) restricted? 2. Is the production master data regularly reviewed and all changes investigated? 3. Is production data encrypted while stored in the database? 4. Does a backup and disaster recovery plan exist? 5. Have backup procedures been tested within the past year? 6. Are appropriate data entry edit controls used? 7. Is a perpetual inventory of raw materials components maintained? 8. Are physical counts of raw materials inventory taken regularly and used to adjust the perpetual inventory records? 9. Are competitive bids used when ordering fixed assets? 10. Are reports prepared showing the number of unique components for each finished product? 11. Are warranty and repair costs tracked for each finished product? 12. Is a Master Production Schedule (MPS) created and followed? 13. Are materials requisitions used to authorize and document removal of raw materials from inventory? 14. Are move tickets used to document transfers of raw materials and work-inprocess in the factory? 15. Are the disposals of fixed assets documented? 16. Is there insurance against losses due to fire, flood, or other disaster?
16-6 .
b. For each Yes/No question, write a brief explanation of why a “No” answer represents a control weakness. Question 1 2 3 4 5 6
7 8 9 10 11 12
13 14 15 16
Reason a “No” answer represents a weakness Unrestricted access to the production master data could result in disclosure of trade secrets or creation of unauthorized production orders. Failure to investigate all changes to production master data may allow errors to remain undetected that result in over- or under-production of finished goods. Failure to encrypt production data can result in the unauthorized disclosure of sensitive information. If a backup and disaster recovery plan does not exist, the organization may lose important data. If the backup plan is not regularly tested, it may not work. Without proper data entry edit controls, errors may occur in recording production operations, which may result in inventory valuation errors, over- or underproduction, or poor pricing decisions. Without a perpetual inventory system, shortages and excess inventory is more likely. Without periodic physical counts and any necessary inventory records adjustments, the perpetual inventory records are likely to be incorrect. Without competitive bids, purchases may be at higher than necessary prices. Failure to track the number of common and unique components used can result in poor product design or excessive costs of production and inventory. Failure to trace warranty and repair costs to specific finished products precludes correcting poor product designs. Without a Master Production Schedule, unauthorized production orders could result in over-production of finished goods. There could also be underproduction of finished goods. Failure to document transfer of raw materials from inventory stores can lead to theft. Not documenting the transfer of raw materials and work-in-process can prevent discovery of theft and make it difficult to identify the perpetrator. Not documenting the disposal of fixed assets can cover up theft and make it difficult to identify the perpetrator. Lack of adequate insurance exposes the organization to the risk of substantial monetary loss in the event of an insurable incident.
16-7 .
16.4
You have recently been hired as the controller for a small manufacturing firm that makes high-definition televisions. One of your first tasks is to develop a report measuring throughput. Describe the data required to measure throughput and the most efficient and accurate method of collecting that data. Throughput = A x B x C where A = total production (units) / processing time B = processing time / total elapsed real time C = good units / total production (units) A x B x C reduces down to good units/total elapsed real time The key data needed are: total production in units good units produced (i.e., those without defects) time spent performing production tasks total time The AIS can calculate total time by recording 1) the time when the production order was released and 2) the time when it was completed and the products were placed into finished goods inventory. Total time spent in operations (processing time) can be collected by measuring the time spent on each operation. This can be most accurately done with badge or card readers at each station. Total production can be recorded by counting (with bar-code scanners or using RFID tags, if possible) all units produced at each step of the manufacturing process. Subtracting defective units from total production yields good production. Production in multi-stage processes is probably the most difficult to measure accurately, especially if defects are identified continuously because then it is necessary to track all such partially completed work to obtain a more accurate measure of throughput.
16-8 .
16.5
You are the internal auditor for BayWear Products. You have been asked to document the production process at BayWear. On a daily basis, the clerk in the raw materials department checks open production orders and the master production schedule to determine which materials need to be sent to production. All the raw materials are bar-coded. The workers on the production floor each have an individual work station where they have access to all the equipment required to assemble the BayWear products. Each time a worker needs to operate one of the machines at the work station, they are required to scan their staff card, which contains information related to the specific worker. Once the staff card is scanned, the worker information is associated with the specific product that is manufactured, and the time taken to manufacture the product is also recorded. As each factory worker uses raw materials, the bar-codes of the raw materials are scanned. Once a product is completed, it is packaged, and the last machine operated by a production worker prints the product bar-code that is affixed to the packaging. All completed products are send to the warehouse from where distribution takes place. The production planning department uses current inventory levels and sales forecasts to prepare the master production schedule, which lists the styles and quantities to be manufactured during the coming week. The production order preparation program accesses the master production schedule and the operations list. Both the master production schedule and the operations list are stored in the production database and are used to prepare production orders for each product to be manufactured. Every time a new production order is created, it needs to be added to the open production order master file stored on disk. REQUIRED a. Prepare a data flow diagram of the production process as described above.
16-9 .
b. Explain at least ten control procedures that should be included in the system.
Some of the possible controls are listed here: Access control needed by production workers – user ID required when staff cars is scanned to gain access to equipment. Validity checks - needed for the staff ID number (on staff card) as well as checking bar-codes of products that are used. Limit checks – to check quantity produced. Field checks – to check date of production as well as quantity produced. Completeness check – to ensure all information is recorded for each product manufactured. Reasonableness test – time taken to complete a product, as well as number of products completed within a specific timeframe. Sequentially numbered product orders to ensure no missing orders. Backup copies made of all production orders and operations lists. Prompting – requesting workers to scan bar-codes to ensure all raw materials are 16-10 .
scanned before use. Header labels – all master files require header labels.
16.6
You are the accountant at a production company and you are asked for advice on proposed improvements to the production processes in the company. The scrap rate of the current production process is 12% and the return rate is 2.5%. The wasted material (scrap costs) of one unit of a manufactured product amounts to £17.50 per unit. The average warranty or repair cost per unit is £75 per unit that is returned. The following alternatives are proposed: Option A Invest an additional £300,000 in new equipment. The new process will require an additional cost of £1.25 per unit that is produced. The prediction is that scrap rate will be reduced by 50% from the current levels, but there will be no change in the current levels of the return rate. Option B Invest an additional £60,000 in new equipment. The new process will require an additional cost of £2.00 per unit that is produced. The prediction is that scrap rate will be reduced by 70% from current levels, and the current return rate will be reduced by 60% from current levels. Option C Invest an additional £1.5 million in new equipment. The new process will require no additional cost per unit that is produced. The prediction is that scrap rate will be reduced by 40% from current levels, and the return rate will be reduced by 70% from current levels. REQUIRED
a. Currently, production stands at 600,000 units. If we assume that the current production levels will continue, which option of the three listed above would you recommend and why?
16-11 .
From the calculations below it can be seen that only Option B reduces the “cost increase” – thus saving the company money: Number of units produced scrap rate return rate scrap costs warranty costs
Option A Option B Option C
600000 12% 3% 17.50 75.00 Equipment 300000 60000 1500000
Reduction % Scrap Return 50% 0% 70% 60% 40% 70%
Xtra/unit 1.25 2.00 0.00
Investment 1050000.00 1260000.00 1500000.00
Calculated saving Scrap Return 630000.00 0.00 882000.00 675000.00 504000.00 787500.00
Formulas used:
b. If production increases to 1,000,000 units, which option would you recommend and why? 16-12 .
Tot savings 630000.00 1557000.00 1291500.00
Cost increase 420000.00 -297000.00 208500.00
From the calculations below it can be seen that Option C reduces the cost the most – thus saving the company money: Number of units produced scrap rate return rate scrap costs warranty costs
Option A Option B Option C
1000000 12% 3% 17.50 75.00 Equipment Xtra/unit 300000 1.25 60000 2.00 1500000 0.00
Reduction % Scrap Return 50% 0% 70% 60% 40% 70%
Calculated saving Investment Scrap Return 1550000.00 1050000.00 0.00 2060000.00 1470000.00 1125000.00 1500000.00 840000.00 1312500.00
Formulas used:
16-13 .
Tot savings Cost increase 1050000.00 500000.00 2595000.00 -535000.00 2152500.00 -652500.00
16.7
EXCEL PROBLEM
REQUIRED a. Create a spreadsheet that calculates throughput for the following combinations: Productive capacity = 1,000 units per hour Productive processing time ranges from 90% to 98%, increasing in increments of 2% Yield ranges from 91% to 99% increasing in increments of 2% Costs of productive processing time: o 90% = $100 o 92% = $150 o 94% = $250 o 96% = $400 o 98% = $600 Costs of yield rates: o 91% = $10 o 93% = $20 o 95% = $35 o 97% = $60 o 99% = $100 o b. Create a formula that displays in a labeled cell the maximum throughput. c. Create a cell range that displays the total costs for the various combinations of yield and productive processing time. d. Below the cell range created in step 3 write a statement explaining whether the company should focus on changing productive processing time or yield in order to minimize total costs for the same amount of throughput.
Solution on next page:
16-14 .
Accounting Information Systems
Management should focus on productive processing time because increasing it while holding yield constant results in same throughput at less total cost than the reverse. Cells above in same color have same throughput – note that higher levels of productive processing time results in lower total costs (e.g., 92% productive processing time and 91% yield rate has lower costs for throughput of 837 than does 90% productive processing time and 93% yield rate).
16-15 .
Ch. 16: The Production Cycle
16.8 EXCEL PROBLEM Acme Manufacturing currently employs 13 people in its receiving department. Each receiving dock clerk earns $50,000 per year. Each employee can unload up to 200 pallets of inventory per day. It currently receives on average 2450 pallets per day. Acme is considering two options to improve productivity of its receiving dock employees. Option 1 (Automation) involves investing $200,000 in automation equipment that would enable each employee to unload up to 350 pallets of inventory per day. Option 2 (RFID) involves investing $50,000 in RFID equipment that would enable each employee to unload up to 275 pallets per day. For both options, Acme plans to keep total costs of the receiving function the same as they currently are by eliminating some workers. 4 workers would be eliminated if Acme chooses option 1 (automation) and 1 worker would be eliminated if it chooses option 2 (RFID). REQUIRED a. Download the spreadsheet from the course website and complete it by creating formulas to calculate i. Receiving capacity ii. Cost per pallet received (Note: standard cost equals total costs divided by maximum capacity) iii. Cost of receiving capability used iv. Cost of unused receiving capability b. Acme now wishes to further downsize its operations under options 1 and 2, but without impairing its ability to receive and process incoming shipments. Thus, it desires to keep enough employees to be able to process at least 2600 pallets per day. Management realizes that it cannot employ a fraction of a worker, thus there will continue to be some excess capacity with both options. Complete the remainder of the spreadsheet to show i. Number of employees required under all 3 options ii. Actual receiving capability under all 3 options iii. Cost per pallet received (Note: standard cost equals total costs divided by maximum capacity) iv. Cost of receiving capability used v. Cost of unused receiving capability
Solution on following page and spreadsheet available to instructors:
16-16 .
Accounting Information Systems
16-17 .
Ch. 16: The Production Cycle
16.9 EXCEL PROBLEM* REQUIRED Download the spreadsheet for problem 16.9 from the website for this textbook. Write formulas to calculate the total depreciation expense and to display the correct values in the following three columns: Age, Depreciation Rate, and Depreciation Expense. (Hint: You will need to use the VLOOKUP and MATCH functions to do this. You may also want to read the article “Double-Teaming In Excel,” by Judith K. Welch, Lois S. Mahoney, and Daniel R. Brickner, in the November 2005 issue of the Journal of Accountancy, from which this problem was adapted). Solution:
Depreciation expense formula: =VLOOKUP(J5,$A$4:$D$14,MATCH(H5,$A$4:$D$4,0)) - explanation of formula: The age column subtracts the year the asset was purchased from the reference year in cell H3. It then adds one to that value because the year the asset is purchased is its first year of depreciation. The VLOOKUP function extracts tax rate from the tax table. The first argument to the VLOOKUP function is the asset’s age. The second argument is the location of the vlookup table (cells A14 to D14, using absolute references so that the formula can be correctly copied). The third argument is the row in which to find the answer. In this case, the row is given by the result of the MATCH function. The first argument of the MATCH function is the cell which contains the asset class (column H). The second argument indicates where the column headings are for the different classes (A4:D4). The third argument (0) indicates the match type where 0 means an exact match. 16-18 .
Accounting Information Systems
16.10
Answer all of the following multiple-choice problems:
1. In terms of quality control measures, scrap and rework costs are part of a. Prevention costs b. Inspection costs c. Internal failure costs d. External failure costs Correct answer: c. 2. Which part of the throughput formula provides information about the impact of equipment downtime on overall productivity? a. Productive capacity b. Productive processing time c. Yield d. None of the above Correct answer: b. 3.
Which of the following is most likely the cost driver for accounts payable expenses associated with processing supplier invoices? a. Number of different parts purchased b. Total price of purchases c. Number of suppliers used d. Number of purchases made e. All of the metrics listed above
Correct answer: d. Each purchase results in a supplier invoice that must be processed and paid. 4.
Move tickets are a control procedure designed to reduce the risk of a. Loss or destruction of production data b. Theft of inventory c. Disruption of operations d. Inappropriate allocation of overhead costs
Correct answer: b. 5.
At which stage of the production process can accountants contribute to significantly reducing the cost of goods sold? a. Product design b. Planning and scheduling c. Production operations d. None of the above 16-19 .
Ch. 16: The Production Cycle
Correct answer: a. 6.
MRP-II would most likely be used by a company that produces a. Different grades of milk (e.g., whole, 2% and skim) b. Toner cartridges for laser printers c. Toys based on a new movie d. All of the above are equally amenable to MRP-II systems e. None of the above
Correct answer: a. Future demand for consumer staples, such as milk, is much more predictable than demand for toner cartridges or toys. Toys are a “fad” item for which it is extremely difficult to predict future demand. Toner cartridges are not purchased regularly because individual consumers and businesses have markedly different patterns of use. 7.
In terms of quality control measures, the costs associated with issuing credit memos to customers who return defective products is part of a. Prevention costs b. Inspection costs c. Internal failure costs d. External failure costs e. None of the above
Correct answer: d. 8.
Which control procedure would be most effective in reducing the risk of over- or under-production? a. Reviewing all changes to master data b. Activity-based costing c. Production planning systems d. Computer-integrated manufacturing e. Reports that highlight the components of throughput
Correct answer: c.
SUGGESTED ANSWERS TO THE CASES CASE 16-1
The Management Accountant and Product Design
Poor product design is one of the threats that causes an escalation in costs. The theoretical solution to this threat is to involve accountants as active participants in the product design activity. 16-20 .
Accounting Information Systems
The question you need to answer is: Why is it necessary to include management accountants in product development teams? Review reputable sources to build an argument and answer the question. Cite your sources. Structure your answer as follows, and provide practical examples from existing companies and research findings to substantiate your argument:
Introductory section: give an overview of the product design step in the production cycle and identify the main threats and controls relevant to this step. General role of the management accountant: describe the general role of the management accountant within an organization. Role of the management accountant in product design: Now focus on the role of the management accountant in relation to product design. Ensure that you clearly explain why a management accountant should be included in product development teams. Conclude your discussion by indicating the benefits of having the expertise of a management accountant on the development team.
Solution: Your instructor may prescribe a different format for your answer. Some guiding principles when assessing submissions:
Consider the writing style and writing quality Assess whether the student fulfilled the task requirements, as set out in the proposed structure / format Assess the logical reasoning and building of an argument in the process
Research indicates that a large portion of product costs are predetermined during product development. Product development is no longer a purely sequential process, since large integrated teams from a variety of functional areas participate in the product development process. In the new, non-sequential process, there is a higher probability of balancing costs and other product characteristics. The role of the management accountant is then to use their specialist skills in understanding the relationship between the financial function and the other functional business areas such as marketing, production, and engineering.
The role of the management account has changed over the years and the focus is no longer just financial in nature – there should also be a strong emphasis on understanding design, and the financial implications in design decisions. Financial measures are still useful, but management accountants should be able to consider alternative, non-financial measures to assist in the evaluation of new product developments.
16-21 .
CHAPTER 17 THE HUMAN RESOURCES MANAGEMENT/PAYROLL CYCLE SUGGESTED ANSWERS TO DISCUSSION QUESTIONS 17.1
Many organizations outsource their HRM functions to reduce organizational overhead, have access to a wider range of benefits, and free up computing resources. What are the potential pitfalls that organizations need to be aware of before deciding to outsource HRM functions? The aim of this discussion question is to make students aware that they should not blindly assume that outsourcing is the solution to issues within an organization related to the HR function. There are a myriad number of issues to consider before the outsourcing decision is made. The issues identified here are some of the issues that need consideration – the students may very well identify additional issues that might also need consideration. General issues regarding outsourcing (regardless of function being outsourced)
If there are issues within an organization, outsourcing is not the solution – the issues need to be resolved first, before outsourcing should be considered. Outsourcing on top of unresolved issues will simply create even more issues within the organization. Employee morale – since outsourcing potentially “takes away” work from in-house employees, employees may regard outsourcing in a negative light and it could also potentially be seen as giving up or losing expertise that used to be available within the organization.
HRM outsourcing issues to consider:
Often, recruitment officers require special skills to find a potential candidate for a position in an organization where the candidate will be able to fit in with the organization’s culture – it is not merely finding a candidate with the appropriate skills to perform the tasks. Training can be outsourced, but it is crucial that employees with in-house expertise regarding training are available. If the training employee at the outsourcing company is no longer available, it would be difficult for the outsourcing company to determine if available employees have the necessary skills to replace the employee who is no longer available. Another training issue to consider is that the appropriate technology is available at the company providing the training. Managing benefits needs careful consideration, as employees often have questions to be answered and management often requests reports, and if this is managed by an outsourced company, the time and paperwork going into managing these benefits need to be considered. Benefit communication should also be considered, as any changes in benefits need to be communicated to all employees. The convenience of 17-1 .
Ch. 17: The Human Resources Management/Payroll Cycle
17.2
an in-house benefit administrator would no longer be available. The organization could also potentially lose control over information flow. Service quality (linking to the previous point) should also be considered – queries might be answered, but the quality of the service (in terms of answers and time taken) should be considered. Cost estimations are crucial, as it is possible that the outsourced service might end up being more expensive than the in-house alternative due to unforeseen costs.
An important step in the payroll cycle is to validate each employee’s time and attendance data. How an employee’s time and attendance data is collected differs depending on her pay status. Explain how IT can reduce the risk of intentional inaccuracies in time and attendance data. (For example, some manufacturing companies now use biometric authentication techniques, such as hand scans, to verify the identity of the employee who is clocking in and out of work.) IT can also reduce the risk of intentional inaccuracies in time and attendance data. For example, some manufacturing companies now use biometric authentication techniques (control 8.2), such as hand scans, to verify the identity of the employee who is clocking in and out of work. The objective is to prevent an employee from leaving work early but having a friend falsely record that person as being at work. Segregation of duties (control 8.3) is also important. Time card data, used for calculating payroll, should be reconciled to the job-time ticket data, used for costing and managerial purposes, by someone not involved in generating that data. The total time spent on all tasks, as recorded on the jobtime tickets, should not exceed the attendance time indicated on an employee’s time card. Conversely, all time spent at work should be accounted for on the job-time tickets. In addition, requiring departmental supervisors to review and approve time cards and jobtime tickets (see Figure 17-6, which illustrates one way to implement control 8.4) provides a detective control on the accuracy of time and attendance data. Supervisory review is particularly important for employees who telecommute. Analysis of system logs can provide assurance that telecommuters are truly working the amount of time for which they are getting paid and that they are not operating a personal business on the side, using company-provided assets.
17.3
You are responsible for implementing a new employee performance measurement system that will provide factory supervisors with detailed information about each of their employees on a weekly basis. In conversation with some of these supervisors, you are surprised to learn they do not believe these reports will be useful. They explain that they can already obtain all the information they need to manage their employees simply by observing the shop floor. Comment on that opinion. Formal reports on employee performance are not intended to replace direct observation, but to supplement it. Direct observation is important, but a manager cannot observe all employees all the time. It is also difficult to accurately summarize detailed observations across time. 17-2 .
Accounting Information Systems 15e, GE
How could formal reports supplement and enhance what the supervisors learn by direct observation? Well-designed reports provide quantitative summary measures of aspects of employee performance that are believed to be important to the achievement of the organization’s goals. Quantitative measures facilitate tracking performance trends over time. These benefits, however, will be difficult for many managers to understand until they have had experience in using such reports. There are also legal issues at stake. If an employee or former employee brings suit against the employer, supporting documentation may justify the employer’s position. 17.4
Sales staff are often paid in a different manner compared to other employees. Explain how the payment of sales staff can differ from the other staff, such as secretarial staff. Sales staff often are paid either on a straight commission or on a salary plus commission basis. This requires the staff to carefully record the amount of their sales. In addition, some sales staff are paid bonuses for exceeding targets. An increasing number of companies in the United States are extending such incentive bonuses to employees other than sales staff, to motivate employees to improve their productivity and work quality. For example, Nucor Corporation, one of the largest steel producers in the United States, pays its steelworkers an hourly rate set at approximately 60% of the industry average, plus a bonus based on the tons of steel they produce and ship. Companies have long used stock options to reward executives; in recent years, many companies have extended this practice to their nonexecutive employees as well. The argument is that stock options motivate employees to actively look for ways to improve service and cut costs so that the value of their compensation package rises. Using incentives, commissions, and bonuses requires linking the payroll system and the information systems of sales and other cycles to collect the data used to calculate bonuses. Moreover, the bonus/incentive schemes must be properly designed with realistic, attainable goals that can be objectively measured. It is also important that goals be congruent with corporate objectives and that managers monitor goals to ensure that they continue to be appropriate. Indeed, poorly designed incentive pay schemes can result in undesirable behavior. For example, Sears Automotive experienced unintended negative effects from implementing a new incentive plan in the early 1990s that paid its repair staff a commission based on the amount of parts sold and number of hours worked. The intent was to focus employees’ attention on how their efforts affected the company’s bottom line. The result, however, was a scandal in which it was alleged that Sears employees recommended unnecessary repairs to boost their own pay. The alleged abuses reduced public trust in Sears Automotive and led to lower revenues. Although Sears discontinued use of this incentive system, it took years to fully regain the consumer trust it had lost. Besides the possibility of creating unintended and undesirable behaviors, 17-3 .
Ch. 17: The Human Resources Management/Payroll Cycle
poorly designed incentive pay schemes can also run afoul of legal, tax, and regulatory requirements. 17.5
How would you respond to the treasurer of a small charity who tells you that the organization does not use a separate checking account for payroll because the benefits are not worth the extra monthly service fee? A separate payroll account limits the organization’s exposure to only the amount of cash deposited into the payroll account. A separate account is also easier to reconcile and to detect any errors or irregularities.
17.6
This chapter discussed how the HR department should have responsibility for updating the HRM/payroll database for hiring, firing, and promotions. What other kinds of changes may need to be made? Other types of changes include name changes (usually due to change in marital status), number of dependents, voluntary extra withholdings, and address changes. What controls should be implemented to ensure the accuracy and validity of such changes? Allow employees to make these changes through a web-based application available on the organization’s intranet. The application should include processing integrity checks to prevent invalid entries. Closed loop verification (displaying all changes to the employee) should also be used. To ensure validity, multi-factor authentication should be required to enter such changes Strict access controls should be implemented to protect the master database. A detective control is to separately notify the employee of changes that were made and ask for confirmation that they are valid.
17-4 .
Accounting Information Systems 15e, GE
SUGGESTED ANSWERS TO THE PROBLEMS 17.1
Match the terms with their definitions.
1. _e__ Payroll service bureau 2. _h__ Payroll clearing account 3. _g__ Earnings statement 4. _a__ Payroll register 5. _c__ Time card 6. _b__ Time sheet
a. A list of each employee’s gross pay, payroll deductions, and net pay in a multicolumn format. b. Used to record the activities performed by a salaried professional for various clients. c. Used to record time worked by an hourly-wage employee. d. An organization that processes payroll and provides other HRM services. e. An organization that processes payroll. f. A list of all the deductions for each employee. g. A document given to each employee that shows gross pay, net pay, and itemizes all deductions both for the current pay period and for the year-to-date. h. Special general ledger account used for payroll processing.
17.2
What internal control procedure(s) would be most effective in preventing the following errors or fraudulent acts? a. The company was fined by the governmental tax authorities for incorrect tax payments. •
Processing integrity controls (cross-footing checks, batch totals) could minimize the risk of inaccuracies.
•
Detective controls such as supervisory reviews and providing employees with earnings statements can be used to identify errors before payments are due.
b. A retired employee was not removed as current employee from the payroll master file. The retired employee’s payment method was changed to EFT and the banking details updated to reflect that of a payroll clerks’ friend. •
Periodically print and have supervisors verify all changes to the payroll master file.
•
Limit access to payroll master file to only authorized employees. 17-5 .
Ch. 17: The Human Resources Management/Payroll Cycle
c. The cashier signed a second payroll check to be paid from the organization’s regular bank account for a friend in debt. •
Supporting documentation should be available, such as the payroll register and disbursement voucher, before a payroll check should be signed.
•
All payroll payments should be made from a separate payroll bank account.
d. A senior staff member on the assembly line is responsible for checking time card data for all assembly line workers on the production floor. When overtime is calculated, several of his friends receive higher wages than the other workers. •
Time card data should be reconciled to the data on the job-time tickets.
•
Segregation of duties is required – the staff member is part of the workers generating the data, and he should not be responsible for reconciling the time card data to the job-time ticket data.
•
Total time spent on tasks should be checked not to exceed attendance time as indicated on the time cards of the employees.
•
Departmental supervisors should also review and approve time cards and job-time tickets.
e. Productivity during the first 15 minutes and the last 15 minutes of every shift was found to be much lower than the productivity during the remainder of the shift. Employees indicated that there was often a bottleneck at the time clock, which caused them to waste time. •
Use badge readers instead of time clocks – this can also automatically feed data to the payroll processing system.
•
Make use of biometric controls (such as fingerprint readers) at the workstations to enable employees to clock in and out – then there should not be bottlenecks at a single point where employees need to clock in and out. Data can also be automatically fed to the payroll processing system.
f. When overtime hours worked over the weekend were captured from the time cards that were submitted, an error occurred and one employee was not paid overtime while another was overpaid due to a data entry error where two digits were transposed in the employee number: 17682 was entered as 17862, causing employee 17682 to not receive overtime payment and employee 17862 receiving his overtime as well as employee 17682’s overtime. 17-6 .
Accounting Information Systems 15e, GE
•
Use hash totals when processing payments – the hash total of employee numbers in this case would be incorrect
•
Make use of source data automation for data entry – such as badge readers and / or biometric controls
g. An organization installed a new payroll system and hired a payroll clerk. When the new payroll clerk entered an employee’s name (assuming she was an existing employee), the payroll system prompted the payroll clerk whether a new employee record should be created. The payroll clerk created a new record. •
Proper segregation of duties is required – the person preparing the payroll should not have access to creating new employee records (or maintaining employee records).
•
The default configuration of the payroll system should be changed so that the payroll clerk should not be able to add or modify any employee records.
h. An employee managed to use the query function of the employee database to determine the salary of another employee in her department. •
Employ multifactor authentication and physical security controls to restrict access to HRM and payroll master data.
•
Encrypt the database to ensure that information would not be understandable, should anyone gain access to the database without the proper authorization.
i. The payroll master file was corrupted and when the on-site backup copy was restored, it also turned out to be corrupt . • •
Regularly test backup copies – restore backups to ensure that the content is still intact. Do not keep backup copies on-site – ensure that backup copies are stored off-site (in this case it would not solve the problem, as the backup copy – regardless of where it was stored – was also corrupted).
j. A company needed to find a suitable candidate to fill their Chief Security Officer position. An employee in HR managed to get the father of his best friend appointed to this position. The friend’s father had a criminal record. •
Appropriate hiring procedures should be in place.
•
A professional firm should be used to complete thorough background checks and to verify credentials. 17-7 .
Ch. 17: The Human Resources Management/Payroll Cycle
17.3
The Casters Company is a newly established manufacturing company that manufactures aluminum equipment such as ladders, trolleys, castors, and wheels. The company has a few inexperienced members in their staff, and you are asked to answer their questions regarding some of the HR and payroll processes. a. What actions or activities will initiate changes in the payroll master database? Whenever new employees are hired, when employees leave the employment of the company (resigned, retired, fired), when employee pay rates change, changes in taxrelated or government regulated deductions, changes in any form of insurance deductions (for example, medical aid, life insurance) all these should initiate changes in the payroll master database. b. Which payroll master database changes are the responsibility of the HR department, and which are the responsibility of the payroll department? HR is responsible for internal changes related specifically to employment (new staff hired; staff that retired or were fired) while the payroll department is responsible for updates related to tax rates and other deductions. The payroll department can only implement changes once it is informed about such changes by government departments and external companies (medical aid / insurance etc.). c. Should the payroll records of employees that leave the company be removed in the month in which they leave to prevent fraudulent paychecks being issued? No – the records should be maintained until the end of the financial year to ensure that all tax reports and other tax and government-required related information would still be available. There should, however, be some indication that the employer is no longer employed, such as a termination date and reason in the database to prevent such employee records from still generating paychecks. d. Why does management say that unexpected high employee turnover results in additional costs to the company? There are the normal direct costs associated with the hiring of new employees, which includes costs associated with advertising vacancies, the background checking of applicants, and interviewing of potential employees. In some cases where help is immediately needed, there may be the additional cost of hiring a temporary employee, which could potentially lead to lower productivity. Once a new employee is hired, the new employee might need additional training, which again impacts the productivity of the new employee until such time that the employee is sufficiently trained and capable of performing the required tasks at an optimum level. 17-8 .
Accounting Information Systems 15e, GE
It is often said that the total cost of replacing an employee is about 1½ times the annual salary of the employee. e. Why are there differences in the processes of determining employee remuneration? What are these differences? The differences stem from the fact that the employee pay statuses are different. Some employees are paid by the hour, whilst other employees earn a fixed salary. Employees that are paid per hour often need to submit a time card where arrival and departure times are recorded. On the other hand, some employees are paid a fixed salary and their attendance hours are not regulated like those of the hourly paid workers. Employees such as sales employees work on a straight commission or salary-plus-commission basis, therefore, the sales linked to each employee should be recorded accurately. In many cases, employees may be paid bonuses, based on their performance over a certain period, and this information also needs to be accurately recorded. f. Why is it important to link the goals of incentive schemes, bonuses, and commissions to the objectives of the company? Poorly designed goals and goals that are not in line with the objectives of the company can potentially have a negative effect. For example, paying an incentive for the number of parts sold in the guarantees / repairs department might increase sales of parts, but it also inadvertently increases the repairs done. This incentive could lead to increased sales, but it might point to low-quality products if the sales of repair parts suddenly increase. g. Why do companies invest in source data automation if information can simply be entered manually?
With source data automation, the aim is to reduce unintentional errors when information is collected. Time and attendance data can be collected accurately in real time as and when employees arrive and depart from work (either within the department or at their workstations) – for example, through the use of employee cards or biometric systems (such as fingerprint scanners). Once this information is collected, it can be forwarded to the payroll processing system, without having to enter it separately from a manual system where information was collected.
17-9 .
Ch. 17: The Human Resources Management/Payroll Cycle
17.4
Although most medium and large companies have implemented sophisticated payroll and HRM systems like the one described in this chapter, many smaller companies still maintain separate payroll and HRM systems that employ many manual procedures. Typical of such small companies is the Kowal Manufacturing Company, which employs about 50 production workers and has the following payroll procedures:
The factory supervisor interviews and hires all job applicants. The new employee prepares a W-4 form (Employee’s Withholding Exemption Certificate) and gives it to the supervisor. The supervisor writes the hourly rate of pay for the new employee in the corner of the W-4 form and then gives the form to the payroll clerk as notice that a new worker has been hired. The supervisor verbally advises the payroll department of any subsequent pay raises. A supply of blank time cards is kept in a box near the entrance to the factory. All workers take a time card on Monday morning and fill in their names. During the week they record the time they arrive and leave work by punching their time cards in the time clock located near the main entrance to the factory. At the end of the week the workers drop the time cards in a box near the exit. A payroll clerk retrieves the completed time cards from the box on Monday morning. Employees are automatically removed from the payroll master file when they fail to turn in a time card. The payroll checks are manually signed by the chief accountant and then given to the factory supervisor, who distributes them to the employees. The factory supervisor arranges for delivery of the paychecks to any employee who is absent on payday. The payroll bank account is reconciled by the chief accountant, who also prepares the various quarterly and annual tax reports.
a. Identify weaknesses in current procedures, and explain the threats that they may allow to occur. Weakness
Threat
1. Factory supervisor hires all job applicants and forwards their W-4 form to the payroll clerk. 2. Factory supervisor verbally informs payroll of all employee pay raises.
3. Factory supervisors determine pay rates 4. Blank time cards are readily available.
The factory supervisor could hire fictitious employees and submit their W-4 form. No documentation on pay raises could lead to employee disputes and litigation. The factory supervisor could give the fictitious employees raises. Factory supervisors can overpay or underpay new hires An employee could have another employee fill out a time card when they were late or not even at
17-10 .
Accounting Information Systems 15e, GE
5. Weekly time cards are not collected until the next Monday.
6
Employees are automatically removed from the payroll master if they do not turn in a timecard 7. The factory supervisor distributes paychecks. 8. Payroll account reconciled by chief accountant who also signs paychecks.
work. Time cards could be altered over the weekend with fictitious or false information in the case of a vendetta against another employee.
A sick employee or one on vacation could be “fired” because they did not turn in a timecard. The supervisor can conveniently keep the paychecks of fictitious or fired employees. Have someone else reconcile the payroll bank account.
b. Suggest ways to improve the Kowal Manufacturing Company’s internal controls over hiring and payroll processing. (CPA Examination, adapted) 1. A system of advice forms should be installed so that new hires, terminations, rate changes, etc., are reported to the payroll department in writing. Such forms should be submitted by the employee and verified by the appropriate supervisor. 2. Before applicants are hired, their backgrounds should be investigated by contacting references to determine that they are honest and have no undesirable personal characteristics. 3. The supply of blank time cards should be removed. At the beginning of each week the payroll department should provide each worker with a time card with his name typed or printed on it. 4. The foreman should collect the time cards at the end of the week, approve them, and turn them over to the payroll clerk. All time cards should be accounted for and any missing cards investigated. 5. The payroll checks should be distributed to the workers by a responsible person other than the foreman. Unclaimed checks should be sent to internal audit until claimed by the worker. In addition, the following changes should be made because the problem does not state that these procedures are being followed:
If the Company has a cost system that requires the workers to prepare production reports or to account for their time by work tickets, the time cards and the production reports or work tickets should be compared.
The payroll checks should be prenumbered to control their issuance.
A responsible person other than the chief accountant and the payroll clerks should reconcile the payroll bank account.
17-11 .
Ch. 17: The Human Resources Management/Payroll Cycle
From time to time, an officer of the Company should witness a payroll distribution on a surprise basis.
c. Draw a BPMN diagram that shows Kowal Manufacturing Company’s payroll process redesigned to implement your suggestions in step b. Specific solutions will vary, depending upon what weaknesses the student identified in step b. The following diagram incorporates all suggestions except for HR’s role. Employee
Activity
Factory Workers
Supervisor
Complete Timecards
Weekly Review and Approve Timecards
Payroll Clerk
Weekly Prepare Paychecks
Chief Accountant
Record Payroll
Weekly
Sign Paychecks
Accounts Payable
Distribute Paychecks
Monthly
Receive & Reconcile bank statement
17-12 .
Accounting Information Systems 15e, GE
17.5
Arlington Industries manufactures and sells engine parts for large industrial equipment. The company employs over 1,000 workers for three shifts, and most employees work overtime when necessary. Figure 17-10 depicts the procedures followed to process payroll. Additional information about payroll procedures follows:
The HRM department determines the wage rates of all employees. The process begins when a form authorizing the addition of a new employee to the payroll master file is sent to the payroll coordinator for review and approval. Once the information about the new employee is entered in the system, the computer automatically calculates the overtime and shift differential rates for that employee.
A local accounting firm provides Arlington with monthly payroll tax updates, which are used to modify the tax rates.
Employees record time worked on time cards. Every Monday morning the previous week’s time cards are collected from a bin next to the time clock, and new time cards are left for employees to use. The payroll department manager reviews the time cards to ensure that hours are correctly totaled; the system automatically determines if overtime has been worked or a shift differential is required.
The payroll department manager performs all the other activities depicted in Figure 17-10
The system automatically assigns a sequential number to each payroll check. The checks are stored in a box next to the printer for easy access. After the checks are printed, the payroll department manager uses an automatic checksigning machine to sign the checks. The signature plate is kept locked in a safe. After the checks have been signed, the payroll manager distributes the paychecks to all first-shift employees. Paychecks for the other two shifts are given to the shift supervisor for distribution.
The payroll master file is backed up weekly, after payroll processing is finished. (CMA Examination, adapted)
a. Identify and describe at least three weaknesses in Arlington Industries’ payroll process.
The payroll processing system at Arlington Industries violates the principle of segregation of duties. The same individual verifies time cards, inputs payroll information into the master file, prints the checks, machine-signs the checks, distributes the checks, and prepares the payroll journal entry. 17-13 .
Ch. 17: The Human Resources Management/Payroll Cycle
There is no authorization of employees' time cards by a supervisor or other objective party such as a timekeeper.
Time cards are not stored securely when completed on Fridays.
There is no authorization of overtime.
The payroll checks are not prenumbered nor are they properly stored. As a result, there is no audit trail to verify check usage.
Supervisors for the second and third shifts distribute paychecks.
b. Identify and describe at least two different areas in Arlington’s payroll processing system where controls are satisfactory. The personnel department determines the wage rate and initiates the setup of payroll records, which is a good example of segregation of duties.
A backup of the master file is made after each weekly processing of the payroll.
A local accounting firm provides Arlington Industries with updates on tax rates.
Time cards are reviewed for accuracy.
17-14 .
Accounting Information Systems 15e, GE
17.6
Excel Problem Objective: Learn how to find and correct errors in spreadsheets used for payroll. a. Download the worksheet for this problem from the website. b. Create formulas in columns K-O that would display an error message if that payroll record violated any of the following rules: 1. All employees must be paid at least the minimum wage of $15 2. Overtime only exists if the employee has worked 40 hours of regular time. 3. Maximum regular hours is 40 4. Net pay does not equal gross pay minus all deductions (overtime pay is 1.5 times regular payrate) 5. An employee has zero deductions
Solution: The formulas for the 5 errors are as follows: 1. =IF(B2<15,"Pay < Minimum Wage","") 2. =IF(AND(D2>0,C2<40),"Overtime but worked less than 40 hours","") 3. =IF(C2>40,"Max regular hours cannot exceed 40","") 4. =IF(I2<>E2-(F2+G2+H2),"Net pay does not equal gross pay less taxes and roth401","") 5. =IF(AND(F2=0,G2=0,H2=0),"Zero deductions","")
17.7
Excel Problem 17-15 .
Ch. 17: The Human Resources Management/Payroll Cycle
Objective: Learn how to use VLOOKUP. a. Download the worksheet for this problem from the website. b. Create a formula to calculate taxes, using the following rate table: If gross pay is less than $500, taxes are 12% If gross pay is at least $500 and less than $750, taxes are 15% If gross pay is at least $750 but less than $1000, taxes are 20% If gross pay is greater than $1000, taxes are 28% Solution: The formula for gross pay is = D4*VLOOKUP(D4,$G$4:$H$7,2) Students could add the final argument “True”, but need not do so. The Tax Table must be entered in cells G4:H7, and should look like this: 0 500 750 1000
12% 15% 20% 28%
This structure ensures that gross pay less than the value in column G gets taxed at the rate in column H
17-16 .
Accounting Information Systems 15e, GE 17.8
The local community feels that secondary school education is a necessity in our society and that lack of education leads to a number of social problems. As a result, the local school board has decided to take action to reverse the rising dropout rate. The board has voted to provide funds to encourage students to remain in school and earn their high school diplomas. The idea is to treat secondary education like a job and pay students. The board, however, could not agree on the details for implementing this new plan. Consequently, you have been hired to devise a system to compensate students for staying in school and earning a diploma. As you devise your compensation scheme, be sure it meets the following general control objectives for the payroll cycle: All personnel and payroll transactions are properly authorized. All employees are assigned to do productive work, and they do it efficiently and effectively. All transactions are accurately recorded and processed. Accurate records are maintained. All disbursements are proper. Write a proposal that addresses these five questions: a. How should the students be compensated (e.g., for attendance, grades)? b. How and by whom will the payments be authorized? c. How will the payments be processed? d. How should the payments be made (e.g., in cash or other means)? e. When will the payments be made? There is no one correct answer to this problem. Students should answer parts b, c, d and e as if they were developing a payroll system, regardless of how they answer part a. The following are some of the issues that need to be addressed: Who will have custody over records relating to student activity? Are controls in place to ensure that students actually receive their pay? What controls govern adding/deleting students from the database? How will attendance and grades be verified? How will the rewards be safeguarded? (e.g., if pay with cash, what controls will prevent employees from stealing the funds?)
17-17 .
Ch. 17: The Human Resources Management/Payroll Cycle
17.9
What threats should each of these control procedures mitigate? a. Make use of EFT to pay employees. Prevents theft of physical paychecks and cuts costs. b. Use hash totals of employee numbers. Ensure that all payroll records have been processed; ensure that the input of payroll data was accurate; and ensure that no false time cards were entered during processing. c. Make use of a zero-balance check. The payroll clearing account is managed as an imprest fund. At the end of the payroll processing and after all payroll entries have been posted, the payroll clearing account should have a zero balance. This is to ensure that payroll processing was accurate and complete. d. Distribute an earnings statement (pay slip) to each individual employee. The earnings statement (pay slip) enables the employee to check all deductions and payment received for hours worked. Any discrepancies can then immediately be addressed. e. Make use of user IDs and passwords. These links (with access controls) should be used to prevent unauthorized disclosures of sensitive information as well as unauthorized changes to payroll master data. An access control matrix can be used to define what actions each of the employees are allowed to perform (if any) and which files the employee may access (if any). f. Do not allow HRM employees to assist with payroll processing. Segregation of duties between HR and payroll prevents the possibility of an HR employee creating fictitious employees or changing pay rates. g. Implement reasonableness tests for incorporating payroll changes. This is to prevent inaccurate payroll master data, which could potentially lead to errors in employee payment and / or fines for remitting inaccurate payroll taxes to the appropriate government departments.
17-18 .
Accounting Information Systems 15e, GE
h. Use source data automation with time and attendance data. Source data automation can reduce the risk of unintentional errors when collecting time and attendance data. It can also improve employee productivity. i. Unclaimed paychecks should be returned to the treasurer’s office. Such paychecks should be traced back to the time card records and matched to the employee master file to verify that the employee is a legitimate employee of the company. j. Check that the funds transferred for employee payroll equals the amount of net pay for the specific pay period. Use of a separate payroll bank account will limit the possible loss exposure to the amount of cash in the separate payroll account. It will also enable easier payroll reconciliation and detection of fraudulent paychecks. k. Supporting documentation is required before the cashier can sign any payroll checks. Prevents theft and / or fraudulent distribution of paychecks. l. When new employees are added, ensure that all required information entered into the payroll master file is validated. Validating required information will ensure that no fictitious employees are added to the payroll master file. m. Regularly review changes made to the payroll master file. This will prevent inaccurate or invalid master data that may lead to incorrect payments or payments to non-existing employees. n. Ensure that the database containing payroll and HR information is encrypted at all times. This protects sensitive information from the database to be disclosed, either intentionally or unintentionally.
17-19 .
17.10 Excel Problem Objective: Learn how to use text and array formulas to locate potential payroll problems. a. Download the spreadsheet for this problem from the course Web site. b. In column I, under the label “Ghost Employee?” write a function that compares the employee# in the timecards column to the employee# in the payroll master data column and displays the message: “Timecard employee# does not exist in master data” for any employee in the timecards columns who is not listed in the payroll master data columns. The function should leave the cell blank if the employee# in the timecards worksheet does exist in the payroll master file worksheet or if that row in the timecards columns is blank. (Hint: Use the ISNA and MATCH functions.) formula: =if(A4+””,””,IF(ISNA(MATCH(A4,$E$4:$E$26,0)),"Timecard employee# does not exist in master data","")) The MATCH function compares the focal cell (in this case, the employee number in the timecard data from column A) to an array of values (in this case, the list of employee numbers in the payroll master data in column E) to look for an exact match (the value of the third argument is zero). If there is no match, the MATCH function returns the value N/A. The ISNA function returns the value true if that cell has the value N/A, and nothing otherwise. Therefore, the IF function will return the message that the employee number on the timecard does not exist in the master data if the MATCH function fails to find an exact match. The double quotes ensure that if the employee number does exist, then no message is returned. Note that the first IF clause ensures that if there is a blank or missing timecard, the error message does not appear – this affects what appears in row 26. c. In column L, titled “Invalid SSN?” write a function to identify invalid Social Security numbers. Assume that Social Security numbers that begin with the digit 0 or that have the digits 99 for the middle two numbers are invalid. Your function should display a message that flags either of these two conditions or which displays nothing otherwise. (Hint: there are text functions that examine specific portions of a string, such as the left 3 characters, and there are also functions that convert text to numeric values.) formula: =IF(VALUE(LEFT(G4,1))=0,"SSN that begin with a Zero are invalid",IF(VALUE(MID(G4,5,2))=99,"SSN that have value of 99 as middle two digits are invalid","")) Excel’s built-in text functions (MID and LEFT) are used here to parse social security numbers. The function MID takes three arguments: the first one indicates the cell to test (in this case, the social security numbers in column G); the second indicates 17-20 .
Accounting Information Systems 15e, GE
the position to begin with (in this case, the fifth character which is the one immediately following the first hyphen in a social security number); and the third argument indicates how many digits to examine (in this case, 2, in order to check the middle two digits in a social security number). The LEFT function takes two arguments: the first one indicates the cell to test (in this case, the social security numbers in column G); the second indicates how many digits to examine (in this case, just the leftmost digit). The entire nested IF function then works as follows: 1. Test if the left-most digit is 0. If it is, it displays the message that “SSN that begin with a Zero are invalid”. 2. If the left-most digit is not 0, the second IF test is performed, which checks to see if the two middle digits are 99. If they are, then the formula returns the message “Social Security Numbers that have a value of 99 as the two middle digits are invalid”. If this test is also not true, then the social security number is valid and no message is displayed. d. In column P, titled “Missing Paycheck?” write a function to check whether a timecard exists for each employee in the master payroll data section of the worksheet. The formula should return either the message “No paycheck created for this employee” or display nothing. Formula: =IF(ISNA(MATCH(E4,$A$4:$A$25,0)),"No paycheck created for this employee","") The MATCH function checks to see if the employee number in the master payroll data (column E) exists in the timecard data (column A). If it does, then the MATCH function is true. This means that the ISNA function is false. Therefore, the IF function displays nothing (the double quotes). If the employee number in the master payroll data (column E) does not exist in the timecard data (column A) the MATCH function returns the value N/A. Therefore, the ISNA function is true, and the IF statement displays the message that “No paycheck created for this employee.”
Solution: 17-21 .
Ch. 17: The Human Resources Management/Payroll Cycle
17-22 .
17.11 1.
Answer the following multiple-choice questions Which detective control can be used to identify changes made to master data? a. Data processing integrity controls b. Segregation of duties c. Restricted access to master data d. Reports to review changes made to master data e. Restricted physical access to master data
Correct answer: d. 2.
Which of the following is not an input source to the payroll system? a. Human resource management department b. External organizations such as insurance and medical aid companies c. Government departments d. Employees e. Bank
Correct answer: e. 3.
Which of the following is a key control to ensure that no unjustified payments are made to existing employees? a. Source data automation b. Segregation of duties c. Regular review of changes made to payroll master data d. Distribution of earnings statements e. Verification of employees receiving paychecks
Correct answer: b. 4.
What is the purpose of an access control matrix? a. Define actions that employees may perform and confirm files they may access b. Verify user IDs and define the files they may access c. Enforce integrity controls and verify user IDs and passwords d. Verify user IDs and define actions that employees may perform e. Define actions that employees may perform and enforce integrity controls
Correct answer: a. 5.
What is the purpose of a payroll register? a. Serves as supporting documentation to authorize fund transfers to payroll account b. Lists year-to-date totals of gross pay, deductions, and net pay c. Lists gross pay, deductions, and net pay for each employee d. Both a. and c. 17-23 .
Ch. 17: The Human Resources Management/Payroll Cycle
e. Both a. and b. Correct answer: d. 6.
Which of the following data processing integrity controls are used to mitigate threat of payroll errors? a. Batch totals b. Reasonableness check c. Sequence check d. Use of supporting documents e. Data matching
Correct answer: a. 7.
What would be potential benefits if a business decided to get an outside company to handle their payroll function? a. The outside company benefits from economies of scale and can offer payroll functions at a cost lower than what it would cost the original business to handle payroll themselves b. The payroll function no longer requires computing resources c. It is possible to offer a wide range of benefits to the business, since the outside company shares the benefit administration costs across all its clients d. All of the above e. None of the above
Correct answer: d. 8.
If a new employee is appointed, who should be responsible for updating the payroll master file with the information of the new employee? a. An HR employee b. The manager of the department where the employee is appointed c. A payroll clerk d. The payroll supervisor
Correct answer: a.
SUGGESTED ANSWERS TO THE CASES CASE 17-1
Excel Project* - Sorting and grouping data
Download the spreadsheet for this case from the website. The spreadsheet contains performance data by region and by employee for multiple time periods. 17-24 .
Accounting Information Systems 15e, GE
REQUIRED: 1. Copy the raw data to a second sheet in the same workbook and use the subtotals function to group the data by employee so that you can either display the full details for various employees or just the totals by each employee by region. 2. Copy the raw data to a third sheet in the same workbook and create a PivotTable to group the data by employee and region so that you can display each employee’s performance. 3. Open a fourth sheet in the same workbook and title it “Preferences”. On that sheet state which approach (SubTotals or PivotTable) you prefer and explain why.
Solution: The key is to copy all of the data to new worksheets, one labeled SUBTOTALS and the other PIVOTTABLE. Then, on the SUBTOTALS sheet select all the data cells and then choose the Subtotals command. Be sure to select sum and appropriate group formatting. For the PIVOTTABLE solution, you similarly select everything then choose to manually create a Pivot Table. Arrange it so that the employees are in the rows, and the other values are in columns.
17-25 .
CHAPTER 18 GENERAL LEDGER AND REPORTING SYSTEM SUGGESTED ANSWERS TO DISCUSSION QUESTIONS 18.1
XBRL stands for eXtensible Business Reporting Language. It is a programming language designed specifically to facilitate the communication of business information. The SEC requires U.S. public companies to use XBRL when submitting their filings. Explain how accountants can, and should, play a major role in all phases of producing XBRL reports. XBRL stands for eXtensible Business Reporting Language; it is a special programming language designed specifically to facilitate the communication of business information. Beginning in June 2009, the SEC required the 500 largest U.S. public companies to use XBRL when submitting their filings. By June 2011 all public companies will use XBRL. Prior to XBRL, preparers had to manually create reports in various formats for different users. Although those reports were then sent electronically to users, the recipients then had to reenter the data into their own systems in order to manipulate it. The entire process was inefficient and prone to error. XBRL improves the reporting process. Preparers encode the data and transmit it electronically in various formats to users, who can directly analyze it. Thus, XBRL saves time and reduces the chances for data entry errors. Without XBRL, electronic documents, regardless of format (text, HTML, PDF, etc.) were essentially just digital versions of paper reports. Humans could read the data, but computers could not automatically process it until the recipient manually entered it in the appropriate format. XBRL changes that by encoding information about what a particular data item means so that other computer programs can understand what to do with it. XBRL can annotate a number in a spreadsheet to indicate that it represents sales for a particular time period, following U.S. GAAP and measured in U.S. dollars.
18.2
Describe some of the basic attributes used to define each element in an XBRL schema. A detective control that can be used to trace changes in general ledger account balances back to source documents.
18.3
Why is the audit trail an important control? The audit trail is a detective control used to verify the accuracy and completeness of transaction processing. Tracing a set of source documents forward through the journal entries that updated the general ledger verifies that the transactions were actually recorded. Tracing changes in general ledger accounts back to source documents provides 18-1 .
Ch. 18: General Ledger and Reporting System
a way to verify that the transactions did indeed occur and that they were recorded correctly. Although an accounting system should employ a variety of processing integrity controls to prevent errors from occurring, preventive controls are never 100% effective. Therefore, they need to be supplemented with detective controls like an audit trail. 18.4
No matter what basis is used to prepare a unit’s budgetary performance report, the method used to calculate the budget is crucial. The easiest approach is to establish fixed targets for each unit, store these figures in the database, and compare actual performance with these preset values. What are the major drawbacks of this approach? A major drawback to this approach is that the budget number is static and does not reflect unforeseen changes in the operating environment. Consequently, individual managers may be penalized or rewarded for factors beyond their control. For example, assume that the budgeted amounts in Figure 18-11 for the general superintendent are based on planned output of 2,000 units. If, however, actual production is 2,200 units because of greater-than-anticipated sales, then the negative variances for each expense category may indicate not inefficiency, but rather the increased level of output.
18.5
The trial balance lists the balances for all general ledger accounts. If all activities have been properly recorded, the total of all debit balances in various accounts should equal the total of all credit balances. If they don’t, a posting error has occurred. How can one detect such an error? Reconciliations and control reports can detect whether any errors were made during the process of updating the general ledger. One form of reconciliation is the preparation of a trial balance. The trial balance is a report that lists the balances for all general ledger accounts. Its name reflects the fact that if all activities have been properly recorded, the total of all debit balances in various accounts should equal the total of all credit balances; if not, a posting error has occurred. Another important reconciliation is comparing the general ledger control account balances to the total balance in the corresponding subsidiary ledger. For example, the sum of the balances of individual customer accounts should equal the amount of the accounts receivable control account in the general ledger. If these two totals do not agree, the difference must be investigated and corrected. It is also important to examine all transactions occurring near the end of an accounting period to verify that they are recorded in the proper time period. At the end of a fiscal period it is also important to verify that any temporary “suspense” or “clearing” accounts have zero balances. Clearing and suspense accounts provide a means to ensure that the general ledger is always in balance.
18-2 .
Accounting Information Systems 15e, GE
SUGGESTED ANSWERS TO THE PROBLEMS 18.1
Match the term in the left column with its appropriate definition from the right column:
1. __d__ journal voucher file 2. __k__ instance document 3. __a__ XBRL element 4. __f__ Balanced Scorecard 5. __l__ XBRL extension taxonomy 6. __i__ dashboards 7. __e__ XBRL taxonomy 8. __g__ XBRL linkbase 9. __h__ XBRL schema 10. __j__ XBRL style sheet 11. __b__ responsibility accounting 12. __c__ flexible budget
a. an individual financial statement item b. evaluating performance based on controllable costs c. evaluating performance by computing standards in light of actual activity levels d. the set of journal entries that updated the general ledger e. a set of files that defines XBRL elements and specifies the relationships among them f. a multi-dimensional performance report g. a file that defines relationships among XBRL elements h. a file that defines the attributes of XBRL elements i. a detective control that can be used to trace changes in general ledger account balances back to source documents j. a file that explains how to display an XBRL instance document k. a file that contains specific data values for a set of XBRL elements for a specific time period or point in time l. a file containing a set of customized tags to define new XBRL elements that are unique to a specific organization m. A real-time report containing key operating performance metrics
18-3 .
Ch. 18: General Ledger and Reporting System
18.2
Which control procedure would be most effective in addressing the following problems? a. Users other than the treasurer can create journal entries. An authorization control, using an access control matrix and compatibility tests. b. A manager used his computer to post adjusting entries to conceal unauthorized expenses. Restrict posting of adjusting entries to terminals in the controller’s office. Regularly produce a change report indicating all changes to the general ledger, and have these changes reviewed to verify the validity of these changes. c. An IT staff member used the ERP system to view financial records and subsequently informed a friend of his working at a competitor organization about the financial troubles of his employer. The IT staff member should not have access to the ERP system. Encryption should be used to prevent the IT staff from using system controls to access sensitive information in the ERP system. d. The treasurer accidentally posted a debit to the wrong account number. Use closed-loop verification to match the account number with the appropriate account description. e. Depreciation expenses for the current period were never recorded. Create a standard adjusting entry file for recurring adjusting entries – this ensures input completeness and reduces the risk of forgetting to make the entry. f. An upper-level manager understated liabilities in an effort to improve the financial outlook of the organization. Ensure independent audits of all special journal entries to the general ledger. All changes to general ledger accounts should be captured as part of the audit trail. g. A newly appointed manager decided that management needs to develop a new balanced scorecard to measure the financial goals within the organization. Accountants and system professionals should be part of the process of developing a balanced scorecard. 18-4 .
Accounting Information Systems 15e, GE
The balanced scorecard should measure all four dimensions: financial, customer, internal operations, and innovation and learning (not only the financial dimension). h. When a transaction was processed, the treasurer did not enter the account number. A completeness check, to ensure all required information is entered. 18.3
The general ledger and reporting system has a major role in the accounting information system of a company. Briefly explain what information the general ledger and reporting system receives from the different accounting cycle subsystems. Revenue cycle: provides information on recorded sales and also provides all cash receipts. Expenditure cycle: provides information on recorded purchases and all cash disbursements. Production cycle: provides information on cost of goods manufactured. HR/Payroll cycle: provides all wage and salary expenses.
18.4
You are working at a Trident Steel, a steel solution provider that manufactures steel for several industries, including construction, mining, and automotive industries. One of your immediate tasks is to develop a balance scorecard to monitor the overall performance of Trident Steel.
REQUIRED a. Draw up a balance scorecard for Trident Steel and propose at least two goals per dimension. At least one goal per dimension should focus on performance and at least one goal should be related to risk Dimension goals Financial Increase turnover / sales Average payment period (debtors) Improve operating income Customer Increase brand 18-5 .
Ch. 18: General Ledger and Reporting System
recognition Reduce customer complaints Increase number of new customers Rate of sales returns Internal operations Increase capacity usage rate of production machinery Increase number of on-time deliveries Decrease number of defective products Innovation and learning Employee satisfaction Employee suggestions: accepted and implemented Ethics violations Leadership development
18-6 .
Accounting Information Systems 15e, GE
b. Propose measures that could be used to evaluate each goal identified in the previous question. Dimension goals Financial Increase turnover / sales Average payment period (debtors) Improve operating income Customer Increase brand recognition Reduce customer complaints Increase number of new customers Rate of sales returns Internal operations Increase capacity usage rate of production machinery Increase number of on-time deliveries Decrease number of defective products Innovation and learning Employee satisfaction Employee suggestions: accepted and implemented Ethics violations Leadership development
Measure
Target
Actual
Percentage increase in sales
6%
3%
Accounts receivable aging report
30 days
90 days
Operating margin
15%
14.5%
Brand recognition surveys
90%
70%
Number of complaints received
>50
90
Sales to new customers as % of 10% total sales Returns as a % of sales made 7%
4%
Measure capacity rate
90%
75%
Count number of on-time deliveries
95%
70%
12%
Count number defective product of <20 returns
45
Employee satisfaction surveys
80%
90%
Number of employee suggestions >10 that were accepted and implemented
4
0 Number of reported ethics 15 violations Number of employees attending leadership training
8 10
18-7 .
Ch. 18: General Ledger and Reporting System
c. Identify how the data needed for each dimension in the previous question would be gathered. Financial measures will be generated by the accounting system and reports can be extracted to provide requested information. Customer measures (except for brand recognition) and internal operation measures can be collected from the information system as well as when the activities are performed. Innovation and learning measures will need to be collected either while the activities are performed, or as separate reporting measures afterwards. Brand recognition can be done via surveys – typically online. 18.6
Excel Problem* Objective: Enhancing Tabular Displays in Excel
Required: a. Improve tabular displays of information by shading alternate rows. Download the spreadsheet for this problem from the textbook website and use conditional formatting to shade alternating rows so that even numbered rows are in standard white but odd numbered rows are in a light shade of blue, beginning with row 3. b. Improve tabular displays by adding colored arrows (red, yellow and green) in column B (next to the number) to indicate status in terms of “red” = definitely a negative trend, “yellow” = warning, and “green” = definitely a positive trend for sales, sales returns, and cost of goods sold. Use the following rules: 1. For sales: green means that this year’s sales are larger than last year’s; yellow means this year’s sales are less than last year’s but more than two years ago; red otherwise. 2. For net sales: green means that net sales are more than 97% of sales; yellow means between 95% and 97% of sales; red means less than 95% of sales. 3. For gross profit, green means more than last year; yellow means less than last year but more than two years ago; red otherwise. c. Insert a row between Operating Expenses and Income tax, with the label “Income before tax”. Your solution at this point should look like Figure 18-15 below HINTS: The formula mod(row(),2) returns the remainder of dividing the row number by 2. Choose classic style for row shading; choose icon sets and then search for the colored arrows for "labeling" the trends of sales, net sales, and gross profits. You may want to check the “reverse icon” box for some of the rows where you are placing your icon. 18-8 .
Accounting Information Systems 15e, GE
Solution spreadsheet available on website. Key steps: 1. For shading rows, select rows 2-9 and then under Format tab select “Conditional
2.
a. b. c. 3.
Formatting”. Choose classic style and then select “Use formula”, then choose “custom format” and edit the entries to ensure that font remains black for all, no border, and that fill is a light shade of blue. The formula should be =mod(row(),2) to ensure that only odd numbered rows, beginning with row 3, are shaded. If students select all rows, instead of 2-9, then the row with column labels will also be shaded. For the icons, select the cell in column B for which you want an icon: In cell B2, select conditional formatting and choose “icon sets” for style, then select the red, green and yellow filled arrows. Then select use formula and enter the requirements specified. In cell B4, repeat the steps followed for cell B2. In cell B6, repeat the same steps as for cells B2 and B4. Inserting a new row should change the shading of the rows for Income Taxes and Net Income if students used conditional formatting. Otherwise, they will have to manually re-shade the desired rows. You can test whether they used a formula by inserting another blank row just above Income Taxes and observing whether the following rows change shading.
18-9 .
Ch. 18: General Ledger and Reporting System
18.7
In Italy, it is mandatory for unlisted companies to utilize XBRL extensions to Financial statement notes. Use reputable sources to determine the advantages and the Disadvantages of this requirement, from a chartered accountant’s perspective. Cite your sources. The purpose of this question is to let students realize that the use of technology is not always the solution it is purported to be – simply using technology does not necessarily solve problems or make (as in this case) reporting easier. One potential source is the following paper: Avallone, F., Ramassa, P., & Roncagliolo, E. (2016). XBRL Extension to the Financial Statement Notes: Field-based Evidence on Unlisted Companies. International Journal of Digital Accounting Research, 16. One of the benefits of the mandatory XBRL extensions is that it is easier to draw comparisons across different firms. This is made possible because the prescribed taxonomy would be the same across the different firms. Some of the disadvantages include that the taxonomy required might make voluntary disclosures more difficult and that; it might also make it difficult to disclose the statement cash flows. Less data may also be available for the users. Compliance will not necessarily improve, as it would still be possible to leave out some information without causing issues related to validating the submitted documents. If voluntary information is not included in the required tables, it makes it difficult to make voluntary disclosures.
18-10 .
Accounting Information Systems 15e, GE
18.8
Excel Problem*
Objective: Learn how to use the camera feature to create a dashboard REQUIRED: a. Download the spreadsheet for this problem. b. Format the data to display sales and income before tax as currency, with no decimals. c. Format the rest of the data to display commas for the thousands, with no decimals. d. Create a column chart (or bar chart, whichever you prefer) that shows the trend in sales and net sales. e. Create 4 pie charts, one for each year, to show the relative size of sales returns, cost of goods sold, operating expenses, interest expense, and income before tax expressed as percentages of total sales (see Figure 18-16 below for an example). f. Create a line chart that shows the trend in sales and income before tax. g. Label this entire worksheet, with the 3 charts, as “Source Data”. h. Open a new blank worksheet and label it “Dashboard”. i. Use the camera tool to insert the charts from the “Source Data” worksheet on the “Dashboard” worksheet. j. Resize and re-arrange the charts on the Dashboard page in any manner you think most interesting. HINTS: 1. You may need to load the camera tool onto your toolbar. Search the Internet for tips on how to do so. 2. You may need to move your charts around so that they do not share any cells in the spreadsheet, because you may have to select the cells in which the chart is located, not the chart itself, to be able to use the camera tool. SUGGESTED SOLUTION: Steps a-c are straightforward application of formatting options. Step d is likely to differ depending upon student preferences – the key is to show the trends. Steps e-h are straightforward application of Excel tools. One possible source for help in finding a camera tool: https://www.dummies.com/software/microsoft-office/excel/use-the-excel-camera-tool-indashboards-and-reports/ Step j solutions will vary depending upon tastes and preferences of students. One possible solution is available on the website.
18-11 .
Ch. 18: General Ledger and Reporting System
18.9 XBRL Problem* Objective: Practice examining iXBRL financial statements to identify use of extension taxonomies. REQUIRED: a. Access the iXBRL reports from the SEC for two companies in the same industry (your instructor may specifically assign companies and industries or leave the choice to you – the key is that both companies must be in the same industry). Use the SEC’s iXBRL viewer (or another iXBRL viewer of your choice) to explore the iXBRL Consolidate Statement of Income for each company and submit a document that completes the following table: Name of Company 1
Name of Company 2
Number of iXBRL elements in the Consolidated Statement of Income that are based on a standard taxonomy (US GAPP, IFRS, etc.) Number of iXBRL elements in the Consolidated Statement of Income that are based on an extension taxonomy b. Attach screenshots of all iXBRL elements that use an extension taxonomy. c. How do you explain any differences you find between the two companies? For example, given that they are in the same industry, why do you think one company created a special extension taxonomy for one or more elements but the other company did not and instead used the standard U.S. GAPP taxonomy?
SUGGESTED SOLUTION: Exact values in the table will depend upon the companies selected. Results must be supported by screenshots. Explanations of any differences likely will discuss differences in the business processes of the two companies.
18-12 .
18.10 Excel Problem Objective: How to do what-if analysis with graphs. a. Read the article “Tweaking the Numbers,” by Theo Callahan in the June 2001 issue of the Journal of Accountancy (either the print edition, likely available at your school’s library, or access the Journal of Accountancy archives at www.aicpa.org). Follow the instructions in the article to create a spreadsheet with graphs that do what-if analysis. Most of the steps in the article can be done as indicated. One difference is finding the control toolbox to create a spin button. This requires that the “Developer” tab is available as shown below.
Click on “Design Mode” to toggle Click on Insert to add spin buttons and other Active X controls
The Developer tab normally appears to the right of the View tab The Microsoft Office Button is in the far upper left
18-13 .
If the developer tab is not available, follow these steps (for Excel 2007): 1. Click the Microsoft Office Button (in far upper left corner – see prior screenshot) 2. Click Excel Options 3. In the “Popular” category, under “Top options for working with Excel” select the “Show Developer tab in the Ribbon” check box and click OK
On the Developer tab you then click insert and select the “spin box” option from the list of choices of Active X controls. Then position your cursor in the cell where you want to insert a spin button and left-click once. You can now right-click on the spin-button and fill in the values for the spin buttons as indicated in the article. Hint: it may help to increase the height of the rows before trying to add more spin buttons. The rest of the article steps work as described. 18-14 .
Accounting Information Systems 15e, GE
b. Now create a spreadsheet to do graphical what-if analysis for the “cash gap.” Cash gap represents the number of days between when a company has to pay its suppliers and when it gets paid by its customers. Thus, Cash gap = Inventory days on hand + Receivables collection period – Accounts payable period. The “cash gap” formula indicates how much of a cushion a company has, given a set of assumptions about inventory, receivables, and payables. If the projected cash gap is too small, management can increase it by instituting changes that either increase the delay in paying suppliers, speeding up collections from customers, or reducing inventory levels. The purpose of your spreadsheet is to display visually what happens to cash gap when you “tweak” policies concerning inventory, receivables, and payables. Thus, you will create a spreadsheet that looks like Figure 18-11 c. Set the three spin buttons to have the following values:
Linked cell Maximum Minimum Value Small change
Spin button for Inventory C2 120 0 30 10
Spin button for Receivables C3 120 30 60 10
18-15 .
Spin button for Payables C4 90 20 20 10
Ch. 18: General Ledger and Reporting System
18-16 .
Accounting Information Systems 15e, GE
d.
The article "Analyzing Liquidity: Using the Cash Conversion Cycle" by C. S. Cagle, S. N. Campbell, and K. T. Jones in the Journal of Accountancy (May 2013), pp. 44-48 calls the "Cash Gap" the "Currency Conversion Cycle" and explains that bigger values are bad because they indicate less liquidity (because cash needed to pay suppliers is tied up in receivables and inventory). Indeed, the "cash gap" can even be negative for companies, like Dell, that collect payment from customers in advance and stretch out payments to suppliers as long as possible. Given that background, collect the information from annual reports needed to calculate the "cash gap" for at least 3 years for Dell, Walmart, Home Depot, and McDonalds. Enter that data in a spreadsheet and create a graph that you think best highlights the trend in cash gap across the different companies. The solution will depend upon which companies were chosen, but the key to grading is that it follows guidelines for graph design discussed in chapter 7 (left-to-right for years, origin starts at zero) and is either a line or column chart because those two types are ideal for trends.
SUGGESTION: To detect/deter cheating if using this problem in more than one section or across terms, modify the default values for minimum, maximum, value, and small change. You may also want to change the companies that students use for step d.
18-17 .
Ch. 18: General Ledger and Reporting System
SUGGESTED ANSWERS TO THE CASES
Case 18-1 Exploring iXBRL Viewers* The SEC provides a free iXBRL viewer. Another free viewer is available at edgardashboard.xbrlcloud.com. Use those two iXBRL viewers (and any others that your professor assigns) to examine the iXBRL filings by a specific company and write a report that compares them in terms of ease of use and features. Attach screen shots to support your analyses. Solution will depend on the tools chosen. Suggestion: grade based on quality of the review (completeness, coherence, readability, use of screenshots, etc.) The goal is to have students examine state-of-the-art tools and get them used to exploring the Internet for useful tools to assist them in their future career.
Case 18-2 Evaluating a General Ledger Package * Magazines such as the Journal of Accountancy and Strategic Finance periodically publish reviews of accounting software. Obtain a copy of a recent software review article and read its comments about a general ledger package to which you have access. Using the software, write a report that indicates whether, and why, you agree or disagree with the review’s opinions about: a. Ease of installation b. Flexibility of initial setup of chart of accounts c. Ease of modifying the chart of accounts d. Control procedures available to restrict access e. Control procedures available to ensure accuracy of input and processing f. Report flexibility (ease of creating new reports) g. Adequacy and control over the audit trail (e.g., what reference data are automatically provided versus how much of the audit trail must be manually reconstructed, security from tampering, etc.). Answers will vary depending upon the package selected and depth of research undertaken. You may want to assign the package to be researched in order to reduce the number of students studying the same package. This may also be a good team assignment, in which case you may require an oral presentation. Grade on writing quality, soundness of reasoning, and completeness of answer. The goal is to have students examine state-of-the-art tools and get them used to exploring the Internet for useful tools to assist them in their future career. * Life-long learning opportunity 18-18 .
CHAPTER 19 DATABASE DESIGN USING THE REA DATA MODEL SUGGESTED ANSWERS TO DISCUSSION QUESTIONS 19.1
Why is it not necessary to model activities such as entering information about customers or suppliers, mailing invoices to customers, and recording invoices received from suppliers as events in an REA diagram? The REA data model is used to develop databases that can meet both transaction processing and management analysis needs. Only events that either (1) directly change the quantities of resources, (2) represent commitments to future exchange events, or (3) that provide new information about activities that management wants to plan, evaluate, and control need to be included in such databases. None of the activities listed in the question satisfy these requirements. Customer information is stored in rows in the customer table and supplier data is stored in rows in the supplier table. The bulk of this would have been entered when the database was initially created and the customer and supplier tables created and populated. Subsequently, new rows would be entered in these tables as a by-product of other events that management does want to plan, evaluate, and control – such as a sales call, the receipt of an order from a new customer, or placing an initial order with a new supplier. Data processing activities, such as preparing reports or transcribing data from a form, are not explicitly modeled because they do not change information about any resources nor are they fundamental activities which management wants to control. (Consider: How often are managers concerned about how many reports a given employee prints in one day?) Indeed, all the information contained in a vendor invoice is already in the purchasing company’s database before the vendor invoice arrives: the quantity ordered is known when the order is placed, as is the quoted price and terms of payment, and the quantity received in good condition is known when the receiving report is stored. Consequently, there is no need to explicitly model activities such as mailing or recording invoices as events in an REA data model. In fact, many administrative data processing activities are not even necessary steps in the value chain. For example, with the advent of sophisticated AIS, particularly ERP systems, many companies are requesting their suppliers not to send them any invoices.
19.2
Auditors (both internal and external) often need to obtain audit evidence from relational databases. A tool called the REA data model is used to design and document an AIS. What does REA stand for? How does this reflect in the focus of the data model? The basic REA template was developed to assist in modeling an organization’s economic transactions and, therefore, centers on events, the resources they affect, and the agents who participate in them. Two events can be linked to reflect economic duality (the give19-1 .
Ch. 19: Database Design using the REA Data Model
to-get relationship) or causal sequence (orders precede sales). Most resources are independent of one another and thus do not need to be directly linked. For example, inventory and cash do not directly affect one another, but only do so through events such as the sale of inventory and subsequent receipt of cash. Nevertheless, in chapter 19 we will see that sometimes two resources may be directly linked to one another in order to represent information about location, such as in which warehouse inventory is stored. Similarly, the basic REA template does not directly link agents to one another because they often do not influence one another. As with resources, however, we will see in chapter 19 that it is sometimes desirable to directly model links between agents. One reason would be to represent supervisory relationships; another would be to reflect the assignment of employees to service specific subsets of customers or suppliers. Finally, the basic REA template does not include direct links between agents and resources because in many situations there is no reason to track such relationships. As chapter 19 will show, however, if management wants to assign and track custody over specific resources, it is possible to enhance the basic REA template to include direct links between resources and agents. 19.3
Which three questions must be answered to identify the resources and agents in an REA model? Once the relevant events have been specified, the resources that are affected by those events need to be identified. This involves answering three questions: 1. What economic resource is reduced by the “Give” event? 2. What economic resource is acquired by the “Get” event? 3. What economic resource is affected by a commitment event?
19.4
Explain what is meant by the following statement: Accountants can and should participate in all stages of the database design process. Accountants are in a unique position within a business organization. They are intimately acquainted with the many business transactions that occur in an organization and they are knowledgeable about the policies and practices of the business itself as well as the environment within which it operates. The knowledge base and skill sets of the accountant should be put to good use in the development of database design to the fullest extent possible (although some accountants may not possess AIS coding and development skill sets). Consider that during the planning stage accountants provide some of the information used to evaluate the feasibility of the proposed project and they participate in making the decision itself. Accountants can identify user information needs and develop logical schema during the requirement analysis and design stages. Accountants can also help test the accuracy of the new database and application programs during the implementation stage of development. Accountants can also act as “subject matter experts” since they are knowledgeable users of the new system. They can also serve as managers of the system once it is up and running. 19-2 .
Accounting Information Systems 15e, GE
19.5
What is the relationship between the things that would be represented as resources in an REA diagram and the different categories of assets found on an organization’s balance sheet? (Hint: Are there any assets that would not be modeled as resources? Are there any resources in an REA diagram that are not listed as assets on a balance sheet?) There are asset categories listed on a company balance sheet that would not be presented as a resource on an REA diagram. The most noticeable is Accounts Receivable. Accounts Receivable is merely the difference between amount that a company has sold to a customer and the amount the customer has paid for those sales, and, therefore, need not be explicitly modeled as a resource. There are also some resources in an REA model that do not appear on an organization’s balance sheet as an asset. A noteworthy example is employee skills. The skills possessed by employees are certainly an economic resource to an organization. As we will see in chapter 19, these skills would be recorded in a database to facilitate effective management, plan for future hiring and training needs, etc. According to generally accepted accounting principles, however, employee skills are not recorded as an asset in the financial statements. This does not mean that they lack economic value; indeed, the stock market appears to place considerable weight on intangibles like employee knowledge when determining the market value of a company.
19.6
Describe the basic types of entities that one would find in an REA data model, giving an example of each and explaining how they should relate to one another. Entities are classified into three categories: resources, events, and agents. An organization will acquire and use resources and these resources all have economic value to the organization. Examples of resources are cash and inventory. Events are associated with business activities that the organization will be engaged in and management needs to collect information on these events for planning and control within the organization. Examples of event entities are sales and receive cash. Agents identify who would be participating in the different events or business activities. Examples of agents are employees and customers. The entities are related to one another in the following way: Each event must be linked to at least one resource that it affects. Each event must be linked to at least one other event. Each event must be linked to at least two participating agents.
19.7
What are the five stages of the database design process? In which stages should accountants participate? Why? The five stages of database design are: systems analysis, conceptual design, physical design, implementation and conversion, and operation and maintenance. Accountants can 19-3 .
Ch. 19: Database Design using the REA Data Model
and should participate in every stage of the database design process, but their level of participation will vary across stages. During the systems analysis phase, accountants help evaluate project feasibility and identify user information needs. In the conceptual design stage, accountants participate in developing the logical schemas, designing the data dictionary, and specifying important controls. Accountants with good database skills may directly participate in implementing the data model during the physical design stage. During the implementation and conversion stage accountants should be involved in testing the accuracy of the new database and the application programs that will use that data, as well as assessing the adequacy of controls. Finally, many accountants are regular users of the organization’s database and sometimes even have responsibility for its management. Accountants may provide the greatest value to their organizations by taking responsibility for data modeling. Data modeling is the process of defining a database so that it faithfully represents all aspects of the organization, including its interactions with the external environment. Data modeling occurs during both the systems analysis and conceptual design stages of database design. 19.8
What is the purpose of cardinalities in the REA data model? How are they determined? Give an example of possible cardinalities that can be found in an REA data model and explain how they are determined. The business practices within the organization determine what the cardinalities in the REA data models should be. During Systems Analysis and the Conceptual Design Stage of the database design process, information about the organization and its business practices are collected. This information is then used to determine the cardinalities required in the data model. Examples of cardinalities (this will depend on what the student provides): An employee may take a customer order, but it is possible that an employee is not involved with customer orders at all (for example, a sales representative may assist with customer orders, but an HR staff member will not be involved in customer orders). It is also possible for an employee to assist with many customer orders. Thus, the employee entity may be associated with zero (as in the case of the HR staff member, or a new sales representative that had not assisted any customers yet) or with many customer orders. On the other hand, a single customer order can only be handled by a single employee, and an order must be handled by an employee – no order can be placed or accepted if there was not an employee involved. Thus there is a relationship between “Take customer order” and “Employee” in the diagram, with the relationship on the “Take customer order” side of the diagram being a zero to many cardinality (as an employee may be involved in zero to many orders, as explained previously), and the cardinality on the “Employee” side will be one to one (thus an order must be handled by an employee, and by a single employee only).
19-4 .
Accounting Information Systems 15e, GE
SUGGESTED ANSWERS TO THE PROBLEMS 19.1
Dennie’s is a small chips shop located near the local university’s soccer field. Dennie’s serves walk-in customers only. The shop carries 15 different menu options. When a customer pays for an individual purchase, a sales transaction usually includes just one item. When a customer pays for a family or group purchase, however, a single sales transaction includes many different items. All sales must be paid for at the time the customer is served. Dennie’s maintains several banking accounts, but deposits all sales receipts into the shop’s main checking account.
REQUIRED Draw an REA diagram, complete with cardinalities, for Dennie’s revenue cycle.
Inventory
Sales
Employee
Customer
Receive Cash
Cash
Employee
19-5 .
Ch. 19: Database Design using the REA Data Model
19.2
Dennie, the owner of the chips shop, purchases frozen foods from two vendors. Over the years, he has developed good relationships with both vendors so that they allow him to pay them biweekly for all purchases made during the preceding two-week period. Dennie calls in orders on Mondays and Thursdays. The orders are delivered the next day. Dennie buys soda from one of the several local stores and pays for each purchase at the time of sale with a check from the company’s main checking account.
REQUIRED Draw an REA diagram, complete with cardinalities, for Dennie’s expenditure cycle.
Inventory
Order Inventory
Employee
Receive Inventory
Vendor
Employee Disburse Cash
Cash
Vendor
19-6 .
Accounting Information Systems 15e, GE
19.3
Xola has a curios shop where he sells traditional handmade crockery and utensils to customers. All customers, walk-in as well as corporate, pay for their purchases in full at the time of the sale. Xola keeps track of all his customers and, at this stage, does not track potential customers. He has a single bank account for his business and all business-related transactions.
REQUIRED Draw an REA diagram for the revenue cycle of Xola’s business. Include all entities and cardinalities.
19-7 .
Ch. 19: Database Design using the REA Data Model
19.4
Xola only purchases finished products from suppliers and pays his vendors in full when he purchases his items. He keeps track of possible suppliers, in case he cannot obtain products from his usual suppliers. All payments for purchases made are paid from Xola’s business bank account.
REQUIRED Draw an REA diagram for the revenue cycle of Xola’s business. Include all entities and cardinalities.
19-8 .
Accounting Information Systems 15e, GE
19.5
Xola’s curios shop has expanded to the point where he now needs to buy additional equipment and fixed assets. Xola is a cautious businessman and, at this stage, he orders single pieces of office equipment or fixed assets at a time and pays for each order in full at the time of purchase. The arrangement between Xola and his suppliers is that each individual order will be shipped separately.
REQUIRED Draw an REA diagram for the ordering process described. Include all entities and cardinalities.
19-9 .
Ch. 19: Database Design using the REA Data Model
19.6
Provide an example (in terms of companies with which you are familiar) for each of the business situations described by the following relationship cardinalities:
a. Sales
Receive Cash
A company may receive multiple cash payments on a single sale or a company may receive one payment for several sales. This scenario could take place between any seller (vendor) and any customer. The seller (vendor) is allowing customers to make multiple payments on a single invoice and is allowing customers to pay for multiple invoices with a single payment.
b. Sales
Inventory
A sale can include multiple items, but an item can be included in only one sale. This type of arrangement would involve individual items like art work or automobiles.
c. Receive Inventory
Disburse Cash
In this scenario, some inventory purchases can be paid for with multiple payments, while at times a single disbursement may pay for multiple purchases. This scenario represents a revolving credit plan offered by suppliers.
19-10 .
Accounting Information Systems 15e, GE
d. Receive Inventory
Disburse Cash
In this scenario, inventory purchases are to be paid for with a single payment. For example, a vendor sends a monthly bill for merchandise delivered to a customer. The supplier does not accept or allow installment payments. This is typical for many business to business transactions that involve low-priced items. e. Receive Inventory
Disburse Cash
In this scenario, a single purchase of inventory is paid for with multiple payments. For example, a car dealership makes installment payments for cars delivered from the manufacturer. f. Take Customer Order
Sales
In this scenario, each sale must be preceded by one and only one order. The fact that both the order and sales events are recorded implies that there is probably a time lag between taking the customer’s order and filling that order, so that the selling organization needs to be able to track the status of orders. An internet sale is an example of this type of scenario. When a customer places an order with Amazon.com, there is a time lag between the time the order is sent by the customer and the time Amazon fills the order. g. Take Customer Order
Sale
In this scenario, each sale can be comprised of multiple orders and each order can be associated with multiple sales. Thus, we have here a situation where the selling company batches orders and only ships periodically – e.g., with restaurants, suppliers may take orders daily but fill them only on Mondays and Thursdays. Moreover, suppliers may occasionally run out of some items, requiring multiple deliveries (sales) to fill a specific order. 19-11 .
Ch. 19: Database Design using the REA Data Model
h. Sales
Receive Cash
Payment upfront for a single sale similar to the way DELL sells computers; i.e., no installment payments are allowed, the customer must pay in full in advance (prior to shipment).
i. Inventory
Sale
In this scenario, a sale can include multiple inventory items. Also, a single inventory item can be included in multiple sales. For example, Wal-Mart customers can purchase many inventory items such as detergent, tires, and clothing items. These mass-produced inventory items can also be sold to many customers. Therefore, a sale can include a box of detergent, a set of tires, and a sweatshirt. By the same token, the same brand of detergent can be included in many different sales.
j. Take Customer Order
Sales
Sales need not be preceded by orders, but any orders are associated with only one sale (filled individually, not batched). An example is a hardware store in which some sales are made to walk-in customers (sales without preceding orders), but which also allows contractors to place orders by phone, fax, or over the Internet in advance and then pick up the order later.
19-12 .
Accounting Information Systems 15e, GE
19.7
Model the cardinalities of the following business policies: a. The relationship between the Sale and Receive Cash events for installment sales.
Sales
Receive Cash
b. The relationship between the Sale and Receive Cash events at a convenience store.
Sales
Receive Cash
c. The Take Customer Order–Sale relationship in a situation when occasionally several shipments are required to fill an order because some items were out of stock. The solution presented here presumes that one sale (order fulfillment event) can be linked to multiple orders, with occasional partial deliveries because items need to be back ordered.
Take Customer Order
Sales
Alternate solution, if each order is filled individually but sometimes requires multiple deliveries:
Take Customer Order
Sales
19-13 .
Ch. 19: Database Design using the REA Data Model
a. The Sale-Inventory relationship for a custom homebuilder. This solution assumes that customers only purchase one home at a time. This is likely to be the case for custom homes. Situations in which an investor purchases multiple homes from a builder are most likely going to involve “tract” homes (e.g., several homes that follow a standard floor plan).
Sales
Inventory
b. The relationship between the Sale and Receive Cash events for Dell computers, which requires customers to pay the entire amount of their purchase in advance, prior to Dell shipping the merchandise.
Sales
c.
Receive Cash
The relationship between the Sale and Receive Cash events for a retail store that has some in-store sales paid in full by customers at the time of the sale but that also makes some in-store sales to customers on credit, billing them later and permitting them to make installment payments. This solution assumes that customers also occasionally pay for multiple sales with one payment. If, however, this never occurs, the alternate solution would be appropriate.
Sales
Receive Cash
Alternate solution assuming all payments are for one and only one sale.
Sales
Receive Cash
19-14 .
Accounting Information Systems 15e, GE
d. The relationship between the Receive Inventory and Disburse Cash events in the case where suppliers require payment in advance, in full.
Disburse Cash
Receive Inventory
e. The relationship between the Call on Customers event (i.e., the visit by a salesperson to a potential customer) and the Take Customer Order event for a business that is only conducted door-to-door (e.g., kitchen knives, certain books, etc.) so that the only way to order the items is when a salesperson visits the customer. (Hint: do you think every call results in an order?)
Take Customer Order
Call on Customers
i. The relationship between the Call on Customers and Take Customer Orders events for a manufacturer which also accepts orders on its Web site.
Take Customer Order
Call on Customers
j.
The relationship between the Receive Inventory and Disburse Cash events for a company which receives monthly bills from its suppliers for all purchases made the previous month; some suppliers require payment of the entire bill, in full, within 30 days or they will not accept any subsequent orders, but other suppliers accept installment payments.
Disburse Cash
Receive Inventory
19-15 .
Ch. 19: Database Design using the REA Data Model
19.8
Builders Warehouse sells building material and plumbing equipment to individual as well as corporate customers. Individual customers are typically walk-in customers who pay for their purchases before leaving the store. Corporate customers often have accounts with Builders Warehouse and these customers prefer to call through their orders, have them made up, and then send a driver to collect the items. These types of corporate purchases are charged to the accounts of the corporate customers. At the end of the month, the corporate customers can either pay off the entire balance on the account, or they can pay off the balance over a period of three months. The arrangement with corporate customers is that all payments should be made via EFT.
REQUIRED Draw an REA diagram for the revenue cycle of Builders Warehouse. Include all entities and cardinalities.
19.9
Builders Warehouse places inventory orders via the web sites of their suppliers. In most cases, the orders are filled in a single shipment. However, sometimes there might not be sufficient stock at the supplier and then the available items are shipped, while the items that are not immediately available are shipped as soon as each arrives at the suppliers. The shipment of these items can also be combined with any other orders placed by Builders Warehouse. Builders Warehouse pays all the 19-16 .
Accounting Information Systems 15e, GE
previous month’s orders by the 15th of the month and the arrangements with suppliers are that some orders may be paid over a period of two months. REQUIRED Draw an REA diagram for the expenditure cycle of Builders Warehouse. Include all entities and cardinalities.
19-17 .
Ch. 19: Database Design using the REA Data Model
19.10 Prescott Dolls sells porcelain dolls exclusively at antique shows. Prescott Dolls purchases inventory from individuals at garage sales, flea markets, antique malls, and estate sales. Each time the owner, Dahlia Prescott, makes a purchase, she records the person’s name, address, date, specific items purchased and price paid, and total amount spent. Later at home, Dahlia cleans, researches, and prices the inventory for sale to customers. She assigns an inventory number to each item and records the ‘asking’ price. Dahlia buys price tags and display supplies from a company that sells at flea markets and antique shows. All inventory and supplies purchases are immediately paid for using cash or with company checks from a bank account in Prescott Dolls’ name. Cash received from customer sales are also deposited in this account. Three times a year, Dahlia rents a booth at antique shows. A deposit is always required, with the balance due at the start of the show. Dahlia records the deposit and final payment, along with the show organizer’s name and address, in the same worksheet on which she records purchases of inventory and supplies. REQUIRED Draw an REA diagram for Prescott Dolls, related to purchasing inventory and supplies, renting booths, and paying for all items.
19-18 .
Accounting Information Systems 15e, GE
19.11 Answer the following multiple-choice questions 1. Which of the following steps in the revenue cycle would appear as event entities in an REA diagram? a. Sales Order Entry b. Shipping c. Billing d. Cash Collections Answer: a, b, and d would all be events in the revenue cycle REA diagram. Billing would not be an event because it is just a data processing activity that does not add any new information to the database. 2. Which of the following steps in the expenditure cycle would appear as event entities in an REA diagram? a. Ordering b. Receiving c. Approve Supplier Invoices d. Cash Disbursements Answer: a, b, and d would all be events in the revenue cycle REA diagram. Approve Supplier Invoices would not be an event because it is just a data processing activity that does not add any new information to the database. 3. Customers are sent monthly statements that list and total all sales transactions during the preceding month. Customers must pay the entire balance owed in full with one check. Given this set of facts, the relationship between the Sale and Receive Cash events would be modeled as being a. 1:1 b. 1:N c. N:1 d. M:N Answer: c. Each sale is paid with one check, but one check can pay for multiple sales. 4. ABC company has a checking account, savings account, and payroll account with the XYZ bank. ABC company deposits all customer payments into its checking account. The relationship between Cash and Receive Cash would be modeled as being a. 1:1 b. 1:N c. N:1 d. M:N Answer: b. Each Cash account can be linked to multiple Receive Cash events, but each Receive Cash event is deposited into one, and only one, Cash account. 5. The REA diagram for the revenue cycle of a pet store would represent the relationship between Sales and Inventory as being ____. a. 1:1 b. 1:N c. N:1 d. M:N Answer: d. Each sale can consist of many different inventory items (e.g., a 10 lb. bag of Brand X dog food), and each inventory item can be part of many different sales transactions. 19-19 .
Ch. 19: Database Design using the REA Data Model
6. An art museum only purchases and displays original pieces of art. It sometimes purchases several works of art from the same artist at the same time. The REA diagram for the art museum’s expenditure cycle would model the relationship between Purchases and Inventory as being ____. a. 1:1 b. 1:N c. N:1 d. M:N Answer: b. Each purchase may involve multiple pieces of art, but each piece of art is only purchased once. 7. A company’s suppliers send it separate invoices for each purchase. It also sends the company a monthly statement that summarizes all transactions during the preceding calendar month. Sometimes a supplier offers a discount if a specific invoice is paid in full within 15 days; in such cases, the company takes advantage of the discount. Otherwise, the company pays the full amount listed on the monthly statement within seven days of receiving the statement. Given this set of facts, the relationship between the Disburse Cash and Purchase events in the company’s expenditure cycle REA diagram would be modeled as being ____. a. 1:1 b. 1:N c. N:1 d. M:N Answer: b. Each disburse cash (payment) event to a supplier can be linked to multiple purchases, but each purchase is paid for in full in one disbursement (the company does not make installment payments). 8. A grocery store sells to individuals and also to groups, such as the local fire department and a college fraternity. Given this set of facts, the grocery store’s revenue cycle REA diagram would model the relationship between Sales and Customers as being ____. a. 1:1 b. 1:N c. N:1 d. M:N Answer: c. Each sale is made to one, and only one, specific customer. Although the fire department and the fraternity may be comprised of multiple individuals, each is considered to be just one single entity with regard to business transactions. However, each customer may participate in many sales events. 9. ABC company has a checking account, savings account, and payroll account with the XYZ bank. The REA diagram for ABC’s expenditure cycle would model the relationship between Disburse Cash and Cash as being ____. a. 1:1 b. 1:N c. N:1 d. M:N Answer: c. Each Cash account can be linked to multiple Disburse Cash events, but each Disburse Cash event is made from one, and only one, Cash account. 19-20 .
Accounting Information Systems 15e, GE
SUGGESTED ANSWERS TO THE CASES 19.1
Sparky’s Amusement Park is an entertainment park run by recent college graduates. It caters to young people and others who are young at heart. The owners are very interested in applying what they have learned in their information systems and marketing classes to operate a park better than any other in the area. To accomplish these goals, guests of the park are given a personal “membership card” as they enter. This card will be used to identify each guest. Assume that a new card is issued each time a guest comes to the park. As a result, the system does not have to track one person over a period of time. As at other parks, guests pay a flat fee for the day and then are able to ride all of the attractions (such as a double-looping roller coaster and the merry-go-round) for no extra charge. The owners, however, want to track the rides each guest takes and the attractions the guests use. They plan to have guests swipe their membership card through a computerized card reader, which automatically enters information into the computer system. This should allow the owners to gather data about the following: Number of people who use each piece of equipment. (How many people rode the Ferris wheel today?) Number of times each piece of equipment is operated daily. Times of day the attraction is busy or slow. (When was the carousel the busiest?) Number of attractions each guest uses. (How many different pieces of equipment did customer 1122 ride?) Number of rides each guest enjoys. (How many different rides did customer 1122 enjoy? Did each guest go on any rides more than once?) Draw an REA diagram for Sparky’s revenue cycle only. Be sure to include cardinalities. State any assumptions you had to make. (This problem is adapted from one developed for classroom use by Dr. Julie Smith David at Arizona State University.)
The entities of interest include the equipment, cash accounts, the events of running the rides and collecting cash, the guests, and the employees. Note that there is no event called “sell membership card” because the economic exchange is the providing of rides in return for money. The membership card is just a means of tracking who uses what rides and could be replaced with tokens, hand stamps, or any other mechanism. Be sure students understand that the membership cards are not a resource – Sparky’s is not better off by printing up more cards. (This is a good point to discuss).
19-21 .
Ch. 19: Database Design using the REA Data Model
The suggested REA diagram solution is as follows:
Equipment
Give Ride
Employee
Customer
Cash
Receive Cash Employee
The relationships of interest are those shown in the REA diagram. Most cardinalities are standard, except for the following:
The “Give Ride” event involves running one particular piece of equipment. This solution assumes that attractions are run (e.g., the Ferris Wheel is turned on) at regular intervals, even if no customers happen to be on it. If, however, an attraction is only run if there is at least one customer who wants to go on that ride, then the diagram would have to be modified to show that each “Give Ride" event is linked to at least one customer.
Many guests can ride the same piece of equipment at the same time.
The “Receive Cash” (or “Get Cash”) event can involve receiving money for a group of people.
The cardinalities also reflect the fact that the “Receive Cash” event precedes the “Give Ride” event.
The unique number assigned to an activated membership card represents each “Guest” – this is how Sparky can track who uses what rides. Hence, a new row is only added to the Guest table for each paying customer. Since Sparky does not know the personal identity of his patrons, a new row in that table is created each separate day that the same person pays for admission. Note that customers do not, however, have to ride any rides – they may just be “babysitting” for example. On the other hand, most paying customers probably go on many different rides. 19-22 .
CHAPTER 20 IMPLEMENTING AN REA MODEL IN A RELATIONAL DATABASE SUGGESTED ANSWERS TO DISCUSSION QUESTIONS 20.1
How would the process of generating a cash disbursements journal from the REA data model presented in Figure 20-4 and Table 20-1 differ from the process for creating a sales journal? The steps required to create a cash disbursements journal would be simpler than the process used to create a sales journal. A cash disbursements journal typically lists all of an organization’s payments to its various suppliers (payroll disbursements are usually recorded separately from payments to suppliers). The information typically recorded in a cash disbursements journal includes the date, method of payment, payment identifier (e.g., check number or EFT transaction number), payee, amount, and description of the purpose. Note that all of this information can be found in the disburse cash event table. Thus, the information necessary to produce a cash disbursements journal can be found by querying only one table. The query would be restricted to those rows for which the supplier number, a foreign key, has values (null values for the supplier number would occur because the cash disbursements were for payroll).
20.2
There is an important difference between merging redundant events and merging redundant resources. Explain this difference. Merging redundant resources does not affect any cardinalities, but merging redundant events alters the minimum cardinalities associated with the other events that are related to the merged event.
20.3
Explain what a foreign key is and discuss the role of foreign keys when implementing a relational database. A foreign key in a table is an attribute that is used as a primary key in another table. Thus the primary key of Table A can be used as a foreign key in Table B. Foreign keys are used to link different tables and to ensure efficient implementation of 1:1 and 1:N relationships. In a 1:1 relationship, the table in which the foreign key should be placed is often an arbitrary choice. A review of the minimum cardinalities could indicate where the most efficient placement would be. Another possible indicator about where to place the foreign key could be if one event precedes another. In such cases, it might be more appropriate to place the primary key of the event that occurs first as the foreign key in the event that occurs second, as this would improve internal control. In cases where this placement might complicate querying the database, the primary key of the second event can be inserted as the foreign key in the first event. 20-1 .
Ch. 20: Implementing an REA Model in a Relational Database
In a 1:N relationship, the primary key of the one side should become the foreign key in the many side. In an M:N relationship, a separate table is created to handle the relationship. In this separate table, the primary keys of the two tables that participate in the relationship will be used as foreign keys in the table handling the relationship. Since the combination of the two foreign keys will enable one to uniquely identify a specific row, the combination of the two foreign keys will be the primary key of the additional table. 20.4
You are given the Inventory, Sales, and Sales-Inventory tables and their associated attributes from a company’s database: The values for these attributes can be derived from other values that are stored in the database. The “current quantity on hand” can be calculated by taking the beginning quantity on hand value (in the Inventory table), plus any inventory of that item that was purchased (in the Inventory-Receive Inventory table), minus the number of items (of this particular item) that was sold (in the Sales-Inventory table). Similarly, the “total invoice amount” can be calculated by using the information in the Sales-Inventory table – multiply the quantity sold by the actual sales price (as indicated in each row), and then totaling all those values for that particular invoice
20.5
Explain where in the REA model you can find the information normally found in a journal. In traditional AISs, journals provide a chronological listing of transactions. In a relational database designed according to the REA data model, event entities store information about transactions. Thus, the information normally found in a journal is contained in the tables used to record data about events. For example, each row in the Sales event table contains information about a particular sales transaction. Thus, a sales journal can be produced by writing a query that displays the appropriate entries in the sales table for a given period. In a similar manner, queries of the Order Inventory event and Cash Disbursements event tables can be used to generate purchases and cash disbursements journals.
20.6
Why does Figure 20-4 show only one cash disbursement entity if Fred’s Train Shop uses a general operating checking account for purchases of inventory, supplies, and operating expenses such as rent but also uses a separate checking account for payroll? REA models do not represent actual physical accounts but types of accounts. Thus, even though Fred’s Train Shop uses two checking accounts, the REA displays a single entity for cash. This entity contains information about all of Fred’s individual checking accounts. Each row in the cash table for Fred’s train shop would provide information about a specific checking account. Each account would have its own primary key. Then, when there is a cash disbursement it would be linked to the specific record or row in the cash table that represented which of the two checking accounts for Fred’s Train 20-2 .
Accounting Information Systems 15e, GE
Shop was used to make a particular disbursement. This linking would involve using the primary key of the appropriate checking account as a foreign key in that row in the Disburse Cash event table. 20.7
Examine Figure 20-4 and Table 20-1. Why do the Inventory, Customers, and Suppliers tables all have an attribute that contains data about the balance at the beginning of the current fiscal period? The reason that all three entities contain an attribute that stores the beginning balance is that the related event tables typically contain information for only the current year. Thus, the beginning balance attribute represents information about prior years’ events. This information about beginning balances is needed in order to calculate current balances at any point in time. For example, the Inventory table would show the quantity on hand for each inventory item at the beginning of the current fiscal year. The M:N table linking the Receive Inventory and Inventory tables includes an attribute for the quantity received of a specific inventory item. The M:N table linking the Inventory and Sales tables includes an attribute for the quantity sold of a particular item. Thus, the quantity on hand at a particular point in time equals the beginning quantity on hand plus the sum of all receipts of that inventory item minus the sum of all sales of that item. The Customer and Supplier tables contain information about the beginning balances of Accounts Receivable and Accounts Payable for specific customers and suppliers, respectively. Current balances can then be computed by adding the sum of all sales to a customer (purchases from a supplier) and subtracting the sum of all payments from a customer (payments to a supplier) during the current fiscal year.
20-3 .
Ch. 20: Implementing an REA Model in a Relational Database
SUGGESTED ANSWERS TO THE PROBLEMS 20.1
Refer to Problems 19.1 and 19.2 for information about the revenue and expenditure cycle activities for Joe’s ice-cream shop in order to draw an integrated REA diagram of both cycles.
Employees
Order Inventory
Inventory
Sales
Employee
Vendors Customer Receive Inventory
Employees
Disburse Cash
Vendors
20.2
Cash
Receive Cash
Employee
Develop a set of tables to implement the integrated REA diagram you developed in Problem 20.1 for Joe’s ice-cream shop in a relational database. Specify a primary key for each table, and suggest at least one other attribute that should be included in each table. Table
Other attributes foreign keys in italics
Primary key
Employees
Employee#
Name, date hired, salary, position
Vendors
Vendor#
Name, address, beginning account balance
Customers
Customer#
Name, address, beginning account balance
Order Inventory
Purchase Order#
Date, vendor#, employee#
Receive Inventory
Receiving Report#
Date, vendor#, employee#, purchase order#, check#
Disburse Cash
Check#
Employee#, Vendor#, GLAccount#, amount
Inventory
Item#
Description, beginning quantity on hand, list price
Cash
GLAccount#
Account Name, beginning balance 20-4.
Accounting Information Systems 15e, GE
Sales
Invoice#
Date, customer#, employee#, amount
Receive Cash
Remittance#
Date, customer#, employee#, invoice#, GLAccount#
Inventory
Item#
Description, quantity on hand, reorder quantity, reorder point
Order InventoryInventory
PurchaseOrder#, Item#
Quantity, UnitCost
Receive Inventory- ReceivingReport#, Inventory Item#
Quantity, condition
Sales-Inventory
Quantity, UnitPrice
20.3
Invoice#, Item#
Rutendo Designs is a fashion design house that caters to Malaysian haute couture. Rutendo keeps records of a number of designers, even designers she has not contracted before. She pays her designers in full when a design is completed and all payments are made from her business bank account. Clients are both individual customers and corporate clients like the Miss Malaysia beauty pageant. The arrangement Rutendo has with her clients is that all sales are made in-store as the clients need to be one hundred percent satisfied with their designs before leaving the store. All sales need to be paid in full before the designs may leave the premises. Rutendo Designs has a number of bank accounts, but all sales from the store are deposited into the business bank account.
REQUIRED Draw an integrated REA diagram for the revenue and expenditure cycles of Rutendo Designs.
20-5 .
Ch. 20: Implementing an REA Model in a Relational Database
20.4
20.5
Use the integrated REA diagram for Rutendo Designs developed in Problem 20.3 to develop a set of tables that can be implemented in a relational database. Specify the tables, the primary keys, any foreign keys, and at least one additional attribute per table. Table Designer
Primary key DesignerNo
Other attributes (foreign keys in italics) Name, address, phone, contact, account balance
Employee
EmployeeNo
Name, date hired, salary, date of birth, position
Purchases
PONo
Date, employeeNo, designerNo
Disburse Cash
CheckNo
GLAccountNo, employeeNo, designerNo, PONo, date, amount
Inventory
ItemNo
Cost, sales price, description
Cash
GLAccountNo
Account name, beginning balance
Sales
InvoiceNo
ItemNo, CustomerNo, employeeNo, date
Receive Cash
RemittanceNo
Date, amount, employeeNo, customerNo, invoiceNo, GLAccountNo
Customer
CustomerNo
Name, address, beginning balance
The following table and attributes exist in a relational database: Table Customer Sales Receive Cash
Attributes CustomerNo, Name, address, contactNumber InvoiceNo, CustomerNo, SalesRepNo, date, amount Date, amount, CustomerNo, InvoiceNo
REQUIRED Draw an REA diagram for this database. State any additional assumptions you need to make about cardinalities. Students should realize that the Employee, Inventory and Cash entities should be added, even though they are not listed in the table. Assumptions about cardinalities are the following:
Sales are either paid in full on the day of the sale (hence the one on the receive cash side) or payment is made in full at the end of the month (hence the zero on the receive cash side), where a sale is paid in full, once off, later. Should customers be allowed to make installment payments, the receive cash side should be changed to many instead of one. Inventory does not consist of unique items, so the maximum on the sale side of the relationship is many. If the items were unique (one of a kind), the maximum would have been one. 20-6 .
Accounting Information Systems 15e, GE
20.6
A single bank account is used for depositing sale monies.
Paint-it-All is a paint warehouse that supplies paint to corporate customers as well as individual customers. The walk-in customers are usually the individual customers and these customers need to pay for their paint at the time of the purchase. Corporate customers email their orders through and once the order is ready for collection, a driver is sent to pick up the order. These customers have accounts and the arrangement is that corporate customers have a maximum of 60 days to settle their accounts via EFT. In order to ensure that Paint-it-All can supply their customers with the quantities of paint required, Paint-it-All orders their inventory from their suppliers via the web sites of their suppliers. On rare occasions suppliers are out of stock of certain paints, and the available items for that specific order is then shipped when it is ready. The paint on back-order are shipped as soon as it arrives at the suppliers. The backorder items can be shipped with other orders placed by Paintit-All. Similar to their arrangement with their customers, Paint-it-All has an arrangement of 60 days to finalize payment via EFT.
REQUIRED Draw an integrated REA diagram for the revenue and expenditure cycles of Paintit-All.
20-7 .
Ch. 20: Implementing an REA Model in a Relational Database
20.7
Create a set of tables to implement the integrated REA diagram you developed in Problem 20.6 for Paint-it-All in a relational database. Specify a primary key for each table, and suggest at least one other attribute that should be included in each table. Table
Primary key
Other attributes (foreign keys in italics)
Supplier
SupplierNo
Name, address, phone, contact
Employee (includes receiving clerk, purchasing clerk)
EmployeeNo
Name, date hired, salary, date of birth, position
Order Inventory
PONo
Date, supplierNo, employeeNo
Receive Inventory
Rec-ReportNo
Date, supplierNo, employeeNo, checkNo, PONo
Disburse Cash
CheckNo
Date, amount, supplierNo, employeeNo, GLaccountNo
Inventory
ItemNo
Description, beginning QoH, reorder quantity, reorder point
20-8 .
Accounting Information Systems 15e, GE
20.8
Cash
GLaccountNo
Account name, beginning balance
Sales
InvoiceNo
Date, employeeNo, customerNo, remittanceNo
Receive Cash
RemittanceNo
Date, amount, employeeNo, customerNo, GLaccountNo
Customers
CustomerNo
Name, address, beginning balance
Order InventoryInventory
PONo, ItemNo
Quantity, unit cost
Sales-Inventory
InvoiceNo, ItemNo
Quantity, unit price
Receive InventoryInventory
Rec-ReportNo, ItemNo
Quantity, condition
Order InventoryReceive Inventory
PONo, RecReportNo
Quantity
Receive Inventory – Disburse Cash
Rec-ReportNo, CheckNo
Quantity, price
Sales-Receive cash
InvoiceNo, RemittanceNo
Date, amount
Explain how to calculate the total amount of accounts payable: Total Accounts Payable can be calculated in five steps, as follows: Step 1: Normally, only orders actually received are considered purchases for purposes of calculating accounts payable. Therefore, begin with a query of the Receive Inventory table (or M:N relationship table linking the Order Inventory and Receive Inventory events) to determine which orders have been received this fiscal period. Step 2: Query the Order Inventory – Inventory table to determine the total amount purchased this fiscal period by summing the product of quantity ordered by its unit cost for those purchase orders for which there is a corresponding receipt of inventory (from step 1). Step 3: Retrieve the total beginning balance of Accounts Payable by querying the Suppliers table and summing the beginning balance column. Step 4: Query the Disburse Cash table to calculate the total amount paid to suppliers this fiscal period by summing the amount column for every row in which the supplier number is not null. It is important to exclude rows where the supplier number is null, as those represent other types of payments (e.g., payroll).
20-9 .
Ch. 20: Implementing an REA Model in a Relational Database
Step 5: Total Accounts Payable = Answer to Query 2 + Answer to Query 3 – Answer to Query 4.
20.9
Refer to Figure 20.4 and Table 20-1 to write the query logic needed to answer the following questions. (Optional: If requested by your instructor, write your queries in SQL or a Query-By-Example graphical interface.) Some answers may require more than one query—try to write the most efficient queries possible. a. Accounts payable for all suppliers in Arizona Step 1: Normally, only orders actually received are considered purchases for purposes of calculating accounts payable. Therefore, begin with a query of the Receive Inventory table (or M:N relationship table linking the Order Inventory and Receive Inventory events) and the Supplier table to determine which orders have been received this fiscal period. The supplier table is needed in order to restrict the result to only those suppliers located in Arizona. Step 2: Query the Order Inventory – Inventory table to determine the total amount purchased this fiscal period by summing the product of quantity ordered by its unit cost for those purchase orders for which there is a corresponding receipt of inventory (from step 1). Step 3: Retrieve the total beginning balance of Accounts Payable by querying the Suppliers table and summing the beginning balance column, restricting the sum operation to only those suppliers located in Arizona. Step 4: Query the Disburse Cash and Supplier tables to calculate the total amount paid to suppliers located in Arizona this fiscal period by summing the amount column for every row in the Disburse Cash table for which the supplier number equals the primary key of a row in the Supplier table that has a value of Arizona in its address column. Step 5: Total Accounts Payable to Arizona Suppliers = Answer to Query 2 + Answer to Query 3 – Answer to Query 4.
b. Total amount of sales to a customer named Smith Step 1: Identify all sales to Smith by writing a query that joins the Sales and Customer tables, where the value of the customer# in the Sales table equals the primary key in the row of the Customer table where the name = Smith. Step 2: Sum the product of quantity sold times unit price in the M:N Sales-Inventory table for only those rows with sales invoice numbers identified in step 1.
20-10 .
Accounting Information Systems 15e, GE
c. Total wage expense Pay rates are likely to differ across employees. Therefore, calculate total wage expense by summing the wage expense for each employ, as follows: Step 1: Query the Time Worked table to sum the total hours worked, grouped by employee number. Step 2: Query the table produced in step 1 and the Employee table to calculate the total wages earned by each employee (by multiplying total hours worked times that employee’s pay rate). Step 3: Sum the total amounts in the table produced in step 2. d. Total wages payable Total wages payable equals wages earned but not yet paid. Thus, use the same procedure as used to calculate total wage expense, except restrict step 1 to only those rows in the Time Worked table for which the paycheck# column is null. e. Net increase (decrease) in quantity-on-hand for a particular inventory item Step 1: Write a query to sum the quantity received in the M:N relationship table linking the Receive Inventory event and the Inventory table for only those rows with a particular value in the item# column. Step 2: Write a query to sum the quantity sold in the M:N Sales-Inventory relationship table for only those rows with the same item# as used in step 1. Step 3: Net change in quantity-on-hand for that item = Query 1 – Query 2. f. The proportion of sales made to walk-in customers (i.e., no order) Step 1: Write a query to calculate total sales by summing the product of quantity sold times unit price in the Sales-Inventory M:N relationship table. Step 2: Write a query to identify all sales to walk-in customers by listing all sales invoices in the Sales table for which the order number column is null. Step 3: Repeat step 1, but restrict the calculation to only those rows in the SalesInventory table for which the sales invoice number appeared in the step 2 query. Step 4: Divide query 3 by query 1. g. The salesperson who made the largest amount of sales in October Step 1: Write a query to identify all rows in the Sales table that occurred in October. 20-11 .
Ch. 20: Implementing an REA Model in a Relational Database
Step 2: Write a query to calculate total sales by summing the product of quantity sold times unit price in the Sales-Inventory M:N relationship table using only those rows in the Sales-Inventory table for which the invoice number appears in the result of query 1. Step 3: Write a query that joins the result of query 2 with the Employee table (using Employee number as the common field). Step 4: Write a query that identifies the employee number and employee name associated with the maximum amount sold in query 3. h. The salesperson who made the most sales in October Step 1: Write a query to identify all rows in the Sales table that occurred in October. Step 2: Write a query that counts the number of rows in the response to query 1, grouped by employee number. Step 3: Write a query that identifies the employee number in query 2 that has the maximum value in the count column. Step 4: Write a query that joins the result of query 3 with the employee table to display both the employee number and name. i.
The most popular item, in terms of total units sold
Step 1: Write a query against the M:N Sales-Inventory relationship table that sums the quantity sold column, grouped by product number. Step 2: Write a query against the table resulting from query 1, that identifies the item number with the maximum value in the total quantity sold column. Step 3: Write a query that joins the result of query 2 with the inventory table to display both the item# and its description.
20-12 .
Accounting Information Systems 15e, GE
20.10 Refer to Problem 19.10 and develop a set of tables to implement the REA diagram you developed for Stan’s Southern Barbeque Supply Store. Identify the primary and foreign keys for each table, and don’t forget to address any M:N relationships. Table
Primary key
Foreign Keys
Other attributes
Order Inventory
Purchase Order#
Employee#, Vendor#, Receiving Report#
Date
Receive Inventory
Receiving Report#
Vendor#, Employee#
Date, vendor invoice #
Disburse Cash
Check#
Vendor#, Employee#, GLAccount#
Date, amount, description
Cash
GLAccount#
Balance, beginning balance
Inventory
Item#
Description, beginning quantity on hand, reorder quantity, reorder point
Employee
Employee#
Name, hire date, position, payrate
Vendor
Vendor#
Name, address, contact, beginning account balance, performance rating
Order InventoryInventory
Purchase Order#, Item#
Quantity, unit cost
Receive InventoryInventory
Receiving Report#, Item#
Quantity, condition
Receive Inventory-Cash Disbursement
Receiving Report#, Check#
Amount applied
20-13 .
Ch. 20: Implementing an REA Model in a Relational Database
20.11 Answer the following multiple-choice problems. 1. Which of the following types of relationships in an REA diagram must be implemented as a separate table in a relational database? a. 1:1 b. 1:N c. N:1 d. M:N Answer: d. Only M:N relationships must be implemented as separate tables. The other three types of relationships can be implemented using foreign keys. 2. When implementing a revenue cycle REA diagram in a relational database, the relationship between customers and sales would be implemented by ____. a. placing the customer number attribute as a foreign key in the sales table b. placing the sales invoice number as a foreign key in the customer table c. either approach is equally acceptable Answer: a. A sale can be linked to only one customer, so customer number could be a foreign key in the sale table. However, a customer can be linked to many different sales, so invoice number cannot be a foreign key in the customer table. 3. When merging REA diagrams from two different cycles, it is not necessary to change the minimum cardinality for _____ that appear in both of the separate REA diagrams. a. Resources b. Agents c. Events Answer: a. Merging two REA diagrams that share common resources does not required making any changes to minimum cardinalities of those resources. However, merging two REA diagrams that share a common event often necessitates changing the minimum cardinalities of agents in different cycles that are linked to that common event to zero because the event will be linked to only one of those agents. For example, a disburse cash event could be linked to either an employee or a supplier as the recipient of the payment, but not to both simultaneously. In addition, it may be necessary to change the minimum cardinality of events in each cycle that are linked to the common event to zero because the common event can only be linked to an event in one cycle, not to two different events in two cycles. 4. ABC Company sells original manuscripts of Broadway plays. ABC pays for all its purchases in full with one check. It allows customers to make installment payments on sales that exceed $33,000. However, a customer cannot make another purchase until all prior purchases have been paid for. The REA diagram for ABC company depicts seven Employee entities, each labeled for the role played by that type of employee (e.g., cashier, salesperson, shipping clerk, accountant, etc.). The REA diagram also contains two resource entities (Inventory and Cash) and the following events: Purchases, Disburse Cash, Sales, and Receive Cash. The REA diagram also contains two instances of the Customer entity and three instances of the Supplier
20-14 .
Accounting Information Systems 15e, GE
entity. Implementing the integrated REA diagram for the revenue and expenditure cycles of the ABC company in a relational database requires how many tables? a. 5 b. 7 c. 9 d. 15 e. 18 Answer: c. Tables are needed for three types of agents (customers, suppliers, and employees), two resources (inventory and cash), and four events (purchases, disburse cash, sales, and receive cash). There is no need for multiple tables for any of the agents: the employee’s role can be represented as an attribute in the employee table. None of the relationships are many-to-many (M:N), so all can be implemented via foreign keys. 5. The XYZ Company sells sports equipment. The actual sales price of a given item varies throughout the year due to sales events. The actual sales price should be stored as an attribute in the _________ table. a. Sales b. Inventory c. Sales-Inventory Answer: c. The actual sales price varies over time. Thus, it is a fact about both the item being sold and the particular sales transaction. Thus, it belongs in the SalesInventory table that represents the M:N relationship between those two entities. 6. In an integrated REA diagram for both the revenue and expenditure cycles, the quantity on hand during the middle of the year for an inventory item would be stored as an attribute in the ____ table. a. Inventory. b. Sales-Inventory c. Purchases-Inventory d. None of the three tables Answer: d. An integrated REA diagram for the revenue and expenditure cycles shows how inventory is both acquired and sold. The quantity on hand at a particular point in time, therefore, reflects the net effect of all purchases and sales. Thus, it would not be stored as a fixed attribute, but would rather be obtained by a query that summed the quantity purchased attribute in the Purchases-Inventory table and then subtracted from that the sum of the quantity sold attribute in the Sales-Inventory table, plus the quantity on hand at the beginning of the period attribute in the Inventory table.
20-15 .
Ch. 20: Implementing an REA Model in a Relational Database
SUGGESTED ANSWERS TO THE CASE 20.1
The specific solution will vary depending upon the DBMS and REA data model used. Therefore, we present only the query logic here for the model depicted in Figure 20.4.
1. Calculate total Accounts Receivable. a. Calculate beginning Accounts Receivable by summing the beginning balance attribute in the Customer table. b. Calculate total new Sales this fiscal period by summing the product of quantity sold times unit price from the Sales – Inventory M:N relationship table. c. Calculate total cash received from customers by summing amount received column in the Receive Cash table. d. Total Accounts Receivable = Query A + Query B – Query C
2. Calculate Accounts Receivable for a specific customer. This requires a similar set of queries as used to calculate total Accounts Receivable: a. Calculate beginning Accounts Receivable by summing the beginning balance attribute in the Customer table for the customer of interest. b. Select only those rows in the Sales table that represent sales to the customer of interest (i.e., those rows in the Sales table which have a value in the Customer# foreign key column equal to the Customer# of the particular customer of interest). c. Calculate total new Sales this fiscal period by summing the product of quantity sold times unit price from the Sales – Inventory M:N relationship table for only those rows which have an invoice number in the set of invoice numbers from query b. d. Calculate total cash received from customers by summing amount received column in the Receive Cash table for only those rows which have a value in the Customer# foreign key column equal to the Customer# of the particular customer of interest. e. Total Accounts Receivable = Query A + Query C – Query D.
20-16 .
Accounting Information Systems 15e, GE
3. Create a sales invoice form that references the appropriate tables and inputs data about attributes into the proper tables. The syntax for doing this will vary depending upon the DBMS used. Solutions should be tested to ensure that the form adds new rows to the following tables:
Sales
Sales-Inventory
It will also need to reference the Customer and Inventory tables to identify relevant information (shipping and billing addresses, item description, etc.).
4. Calculate as many financial statement items as possible from the data model you implement. Income Statement items derivable from Figure 20.4: Only Sales and Wage Expense can be definitively calculated; cost of goods sold requires making assumptions about inventory cost/valuation method (FIFO, LIFO, weighted average, specific identification).
Sales
Sum the product of quantity sold times unit price for all rows in the M:N SalesInventory relationship table
Wage expense
Step 1: Query the Time Worked table to sum the total hours worked, grouped by employee number. Step 2: Query the table produced in step 1 and the Employee table to calculate the total wages earned by each employee (by multiplying total hours worked times that employee’s pay rate). Step 3: Sum the total amounts in the table produced in step 2.
20-17 .
Ch. 20: Implementing an REA Model in a Relational Database
Balance Sheet items derivable from Figure 20.4: Only Cash, Accounts Receivable, Accounts Payable, and Wages Payable can be definitively calculated. Inventory valuation requires an assumption about inventory method (FIFO, LIFO, weighted average, specific identification).
Cash Step 1: Calculate the beginning balance of cash by summing the amount column in the Cash table. Step 2: Calculate total cash receipts by summing the amount column in the Receive Cash table. Step 3: Calculate total cash disbursements by summing the amount column in the Disburse Cash table. Step 4: Ending Cash Balance = Answer to Query 1 + Answer to Query 2 – Answer to Query 3.
Accounts Receivable a. Calculate beginning Accounts Receivable by summing the beginning balance attribute in the Customer table. b. Calculate total new Sales this fiscal period by summing the product of quantity sold times unit price from the Sales – Inventory M:N relationship table. c. Calculate total cash received from customers by summing amount received column in the Receive Cash table. d. Total Accounts Receivable = Query A + Query B – Query C
20-18 .
Accounting Information Systems 15e, GE
Accounts Payable Step 1: Normally, only orders actually received are considered purchases for purposes of calculating accounts payable. Therefore, begin with a query of the Receive Inventory table (or M:N relationship table linking the Order Inventory and Receive Inventory events) to determine which orders have been received this fiscal period. Step 2: Query the Order Inventory – Inventory table to determine the total amount purchased this fiscal period by summing the product of quantity ordered by its unit cost for those purchase orders for which there is a corresponding receipt of inventory (from step 1). Step 3: Retrieve the total beginning balance of Accounts Payable by querying the Suppliers table and summing the beginning balance column. Step 4: Query the Disburse Cash table to calculate the total amount paid to suppliers this fiscal period by summing the amount column for every row in which the supplier number is not null. It is important to exclude rows where the supplier number is null, as those represent other types of payments (e.g., payroll). Step 5: Total Accounts Payable = Answer to Query 2 + Answer to Query 3 – Answer to Query 4.
Wages Payable Step 1: Query the Time Worked table to sum the total hours worked, grouped by employee number, restricted to only those rows for which the check number column is null. Step 2: Query the table produced in step 1 and the Employee table to calculate the total wages earned by each employee (by multiplying total hours worked times that employee’s pay rate). Step 3: Sum the total amounts column in the table produced in step 2.
20-19 .
Ch. 20: Implementing an REA Model in a Relational Database
5. Design appropriate input controls for the sales invoice form created in step 3. The syntax required will vary depending upon the DBMS used. Students should be encouraged to review material from chapter 10 to identify appropriate input controls. Solutions should include the following: 1. Auto-number the sales invoice to prevent creating duplicate or null primary keys. 2. Validity check on item numbers. 3. Sign check on quantity sold and price fields. 4. Completeness checks on customer information (billing and shipping address) – this information should ideally be automatically populated upon entering the customer number. 5. Completeness checks on inventory information (description, list price, etc.) – this information should ideally be automatically populated upon entering the item number. 6. Validity check on sales date (check against the current system date).
20-20 .
CHAPTER 21 SPECIAL TOPICS IN REA MODELING SUGGESTED ANSWERS TO DISCUSSION QUESTIONS 21.1
Often it takes several sales calls to obtain the first order from a new customer. Why then does Figure 21-1 depict the relationship between the Call on Customer and Take Customer Order events as being 1:1? When a sales person visits a customer it is represented by the event Call on Customer. Although single sales call may be followed by many orders from a customer over time, it is easier and more effective to evaluate sales force productivity by linking each sales call only to orders placed at the time of the sales call, that is, only those sales calls that linked to an order are successful. Hence, the maximum cardinality between the Call on Customer and the Take Order event is 1. However, a sales call does not always result in a sales order. Thus, the minimum cardinality from the Call on Customer event to the Take Order event is 0. Some orders, however, do not follow directly from a sales call. Therefore, the minimum cardinality from the Take Order event to the Call on Customer event is also 0.
21.2
Why would it be necessary to include an entity such as Warehouse in an REA diagram? A warehouse entity would typically be needed if an organization has more than one warehouse where inventory could be stored. In most cases, a warehouse would be able to store multiple inventory items – but it is also possible that a specific inventory item can be stored at multiple warehouses (this is typically the case when organizations aim to optimize their deliveries to their clients, or when raw materials are stored at multiple locations, ideally close to where manufacturing takes place). In having the location of each warehouse (one of the reasons for having a warehouse entity), it is possible to evaluate the performance of the warehouse and also track in- and outbound logistics to and from the specific warehouse.
21.3
Discuss the nature of the relationship between the Financial Institution and Cash entities as depicted in the following extract from a REA diagram:
Every row on the Cash table will need to correspond to a specific general ledger account. This general ledger account will be aggregated in the balance sheet under “Cash and Cash equivalents”. A specific cash account can only be linked to a single financial institution, but on the other hand, an account such as Petty Cash will not be linked to any Financial Institution. It is quite likely that an organization has accounts with multiple financial
21-1 .
Ch. 21: Special Topics in REA Modeling
institutions; and it is also possible that an organization has more than one account at any given financial institution. 21.4
Why is the event Issue Debt often modeled as a separate event entity? The event Issue Debt is a special kind of cash receipt. It is often modeled as a separate event entity because it contains distinctly different attributes from those associated with cash receipts that arise from the Sales event, such as the face amount of debt issued, total amount received, date issued, maturity date, and interest rate.
21.5
Small companies are often hesitant to integrate human resource management (HRM) and payroll data. Discuss at least three arguments that could be used to convince their management to integrate HRM and payroll data. Integration will improve decision-making by providing access to more of the relevant data needed for monitoring employee development. It is logical, since both systems are organized around the same entity: the employee. It should facilitate the retrieval and utilization of employee data when the data required would otherwise have to be obtained from both data bases. It should facilitate the process of updating employee data, since a single update process would replace two separate updating processes. It should simplify the development and implementation of more complex compensation schemes, such as flexible benefits or incentive pay. Centralizing the administration of employee data under the control of database management software should enhance data security. It should minimize or eliminate the cost of storing identical data in two different databases. It should minimize or eliminate the confusion that might otherwise arise when two different databases use different data definitions, or report different values, for the same data item.
21.6
Describe the relationships between Recruiting and Skills, and between Recruiting and Job Applicants. The Recruiting event entity stores data about activities performed to notify the public of job openings. The data recorded in this entity are useful for documenting compliance with employment laws and also for evaluating the effectiveness of various methods used to announce job opportunities. The M:N relationship between Skills and Recruiting reflects the fact that each advertisement may seek several specific skills and that, over time, there may be several advertisements for a given skill. The relationship between the Recruiting event and Job Applicants is modeled as being M:N because many people 21-2 .
Accounting Information Systems 15e, GE
typically apply for each job opening, but a given individual may also respond to more than one recruiting event. Also, more than one employee may participate in each recruiting event, and, over time, a given employee may participate in many such events.
21.7
How would you modify the expenditure cycle REA diagram in Figure 21-4 to include the return of defective products to suppliers for credit? Since the supplier, inventory, and employee entities already exist on the diagram, return of defective good to the supplier would only need one additional event entity on the diagram. An event labeled something like “Return Defective Goods” would be added. It would be linked to both the supplier and employee agent entities to facilitate performance tracking for accountability purposes. It would be linked to the Inventory resource, because it would decrease the quantity on hand. Each “Return Defective Goods” event would be linked to a minimum of 1 and a maximum of many inventory items; each inventory item would be linked to 0 or many “Return” events. The “Return Defective Goods” event would be linked to the “Receive Inventory” event. Each “Receive Inventory” event would be linked to 0 or 1 “Return Defective Goods” events. The minimum is zero because the inventory has to be received prior to its return; the maximum is 1 because a given receipt event will be linked to at most one return event for defective merchandise. Each “Return” event would be linked to a minimum and maximum of 1 “Receive” events because something would have to be purchased before it could be returned, and if defective, the item would only be returned one time.
21-3 .
Ch. 21: Special Topics in REA Modeling
SUGGESTED ANSWERS TO PROBLEMS
21.1
Sipho owns Art-on-Main, a store that sells art supplies such as canvases, pencils, paint, and brushes. Sipho employs ten employees. Eight of the employees are responsible for receiving inventory from suppliers and selling products to customers. The other two employees are responsible for ordering inventory. Sipho is solely responsible for paying the suppliers, and all supplier payments are made via EFT. The inventory for Art-on-Main gets ordered from multiple suppliers and the arrangement Sipho has with his suppliers is that as soon as an order is ready to be shipped, it will be sent to Art-on-Main. If multiple orders are ready at the same time, the orders are shipped together in one shipment. Sometimes the suppliers are out of stock and those items are then put on back order and shipped as soon as each missing item arrives. Sipho has built up an excellent credit history and therefore his suppliers allow him to make instalment payments. Art-on-Main has a website where it advertises its available stock, but all the sales are made in the store. Art-on-Main supplies art equipment to a number of schools in the area, and the schools are allowed to pay for their purchases over a period of two months. It is possible for the schools to pay for more than one purchase with any given payment. Payments by any customer can be made by cash, credit card, or EFT. Art-on-Main employees are paid once a week, on Friday, and payments are made from the checking account that is used specifically for payroll. Sipho tracks how much time each employee spends each day on performing their specific tasks (for example restocking shelves, working at the cash register, checking in inventory). He realizes that the productivity and morale of his employees are positively impacted if each one of them can see how much time they spend on each type of task. REQUIRED Draw an integrated REA diagram that includes payroll processing and employee time for Art-on-Main.
21-4 .
Accounting Information Systems 15e, GE
21-5 .
Ch. 21: Special Topics in REA Modeling
21.2 The Mesa Veterinary Hospital is run by Dr. Brigitte Roosevelt. She has two employees in the office and has asked you to develop a database to help better track her data. Dr. Roosevelt currently uses her personal computer only for word processing, but she is interested in also using it to maintain pet histories and accounting information. She is excited about the transition and is counting on you to help her through the process. She describes her daily activities as follows: When new customers come to Mesa Veterinary Hospital, the “owners” of the pets are required to complete an introductory form. This form includes the following: • Owner name • Address • Day phone • Night phone They are also required to provide the following information about each pet, as some people own many pets: • Pet name • Breed • Color • Birth date Dr. Roosevelt would like to enter this information once and then have the system retrieve it for all subsequent visits. When customers call to make appointments, one of the office clerks asks what kind of services they require (e.g., is it a routine exam, a surgery, etc.). Dr. Roosevelt sees only one pet during each appointment. If she is going to see one owner’s two pets, then two separate appointments are necessary (but scheduled back-to-back). For each appointment, Dr. Roosevelt records the pet’s weight, notes the reason for the appointment, and records her diagnosis. Depending on the diagnosis, the doctor will possibly prescribe any number of medications to cure the pet. Owners are charged $25 for each appointment and must pay additionally for any medications prescribed for their pets. Dr. Roosevelt requires all pets to be brought back for another examination prior to refilling any prescriptions. Customers must pay for services and medication in full at the conclusion of their visits. You also learn that Dr. Roosevelt orders drugs and medications from several different suppliers. She places orders weekly, on Fridays. Suppliers usually make one shipment to fill each order, but sometimes have to make additional shipments if they are currently out of stock of one or more items. In such cases, they always ship the back-ordered item as soon as they receive it from the manufacturer; they never combine such back orders with subsequent orders by Dr. Roosevelt. Suppliers bill Dr. Roosevelt monthly and expect payment in full by the 15th of the following month. A few suppliers do permit Dr. Roosevelt to make installment payments. The prices charged by suppliers for a given product may change several times during the year, so it is important to accurately store the cost of each item each time it is purchased. 21-6 .
Accounting Information Systems 15e, GE
Dr. Roosevelt concludes the interview by requesting that in addition to the facts mentioned, she wants the system to store the following attributes: • Number of pets owned by each customer • Total charge for the appointment • Prescription price • Drug name • Length of appointment • Diagnosis • Date of appointment • Service requested
REQUIRED a. Given this brief overview, draw an integrated REA diagram for the Mesa Veterinary Hospital and include cardinalities.
Employees
Order Drugs
Drugs
Make Appointment
Services
Employee
Customer
Vendors
Employees
Perform Examination
Receive Drugs
Pet
Employee
Vendors
Disburse Cash
Receive Cash
Cash
21-7.
Customer
Ch. 21: Special Topics in REA Modeling
b.
As directed by your instructor, either draw the tables necessary to implement the integrated REA diagram you developed for the Mesa Veterinary Hospital or build the tables in a relational DBMS to which you have access. Be sure to include all attributes from the narrative plus the additional ones explicitly listed by Dr. Roosevelt at the conclusion of the interview. Create additional attributes only if necessary.
Table Services
Primary Key Service number
Drugs
Drug number
Cash Make Appointment
GLAccount number Appointment number
Perform Exam
Exam number
Receive Cash
Receipt number
Pets
Pet number
Customers
Customer number
Employees Appointment-Services
Vendor Order Drugs
Employee number Appointment number Service number Appointment number Exam number Drug number Exam number Vendor number Purchase order number
Receive Drugs
Receiving report number
Disburse Cash
Check number
Order Drugs-Drugs
Purchase order number, Drug number Receiving report number, Drug Quantity received, condition number Receiving report, Check Amount applied to invoice Number
Appointment-Exam Drugs-Exams
Receive Drugs-Drugs Receive DrugsDisburse Cash
Other Attributes (foreign keys in italics) Name, standard cost, list price, standard time to perform Drug name, standard cost, list price, beginning quantity-on-hand Bank name, type of account, beginning balance Date, Reason for visit, employee number, customer number, pet number Date, Pet number, time started, time completed, scheduled time, diagnosis, total charge, receipt_number, weight, appointment number Date, amount, customer number, employee number, GLAccount number Pet name, breed, color, birth date, customer number Customer name, address, day phone, night phone, number of pets owned Name, date hired, salary
Dosage, actual cost, actual price
21-8 .
Name, address, account balance Vendor number, employee number, date, amount Vendor number, employee number, purchase order number, date, vendor invoice Vendor number, employee number, GL Account number, amount, description, date Quantity, unit cost
Accounting Information Systems 15e, GE
21.3 Your university hires you to implement a database system for the library network. You have interviewed several librarians, and the following summarizes these discussions: •
The library’s main goal is to provide students and professors with access to books and other publications. The library, therefore, maintains an extensive collection of materials that are available to anyone with a valid university identification card.
•
The standard procedure for lending materials is that the student or faculty member comes to one of the three campus libraries and locates the book or journal on the shelves.
•
Each book is assigned three unique numbers. First, the book is assigned a number by the publisher, called the International Standard Book Number (ISBN). This number allows the publishers to track each title and the number changes with each new edition. The second number is the Dewey decimal number, which is assigned to the title and written on the outside spine of the book. This number is used to organize the library shelves and is thus helpful to the students and faculty. It is therefore critical that this number be available to users on the online inquiry screens. The last number is a university book ID number. A different number is assigned to every book that is received so the library can track all copies of each book. This number is different from the other two numbers such that if the library has three copies of one book, each will have a unique university book ID number.
•
When students or faculty check out books, the system must be able to track the specific copy that is being borrowed. Each book has a magnetic strip inserted in its spine, which is used as a security measure. If someone tries to take a book without checking it out, an alarm sounds.
•
In general, students and faculty have equal clout in the library. Both are able to check out most books and to check out several books at one time. No one is allowed to remove periodicals from any library. The length of time that the book may be borrowed varies, however, depending on who checks it out. Students are allowed to check out a book for several weeks; faculty may borrow books for several months.
•
When patrons check out books, they take their materials to the circulation desk. At that time, the librarian scans in each item’s university book ID number and the borrower’s ID number. The system records a separate loan event for each book being checked out, assigning each a separate loan number. At this time, each book’s due date is calculated and marked on a slip located inside each book’s front cover. Simultaneously, the magnetic strip is deactivated so the book may be removed from the library.
•
After borrowers check out a book, they are expected to return it by its due date. In reality, everyone is allowed 30 days after the due date recorded on the checkout slip before the book is officially overdue. At that point, the book must be returned, and the borrower is assessed a $10 fine. If the book is permanently lost, then the borrower is fined $75 for the book’s replacement. All fines must be paid in cash, in full. Students are not allowed to enroll for subsequent semesters until all library fines are paid; they also do not receive a diploma until all library fines are paid. Faculty must pay all outstanding fines by June 30 of each year.
•
When a book is returned, the return must be entered into the system, and a unique return number is used to log the transaction. At that time, the loan record is updated to show that the book has been returned. 21-9 .
Ch. 21: Special Topics in REA Modeling
The following attributes have been identified as critical for the new system: University book ID Book publisher Due date Loan number Checkout date Borrower phone number Cash account number Librarian name Book status (on the shelf or checked out) Type of borrower (faculty or student) Librarian college degree Actual return date Borrower ID Borrower name Book title Fine receipt number Amount received Library name Amount of fine Default library where book is shelved Borrower’s fine balance owed ISBN number Book return number Dewey decimal number Borrower address Book copyright date Borrower e-mail address Library borrowed from Librarian number Account balance Total number of books in a specific library Loan status (still outstanding, or returned) Author name REQUIRED a. Draw an REA diagram for the library system. Remember to include cardinalities.
a.
REA diagram solution.
21-10 .
Accounting Information Systems 15e, GE
Cash Receive Fine
Employee
Borrower Library
Loan Book
Employee Books
Book Return
Employee
Book Titles
Borrower
Authors
Library
21-11.
Ch. 21: Special Topics in REA Modeling
Explanation of cardinalities: 1. One key to the problem is understanding that the Loan Book event represents the checking out of a single book. As stated in the problem, if a borrower checks out 5 books, the system adds five rows to the Loan Book table. This does not affect the borrower’s checkout experience at all. 2. Another important fact is realizing that books have multiple authors. 3. One final important fact involves recognizing the distinction between physical books and book titles. If the library has five copies of the same book title, it wants to track the status of each individual physical copy. But, a great deal of information about publisher, copyright, etc. is not affected by how many copies the library owns. Therefore, it is more efficient to create a separate entity called book title, to store this constant information. 4. The cardinality from Receive Fines to Loan Book is (1,N) because a loan has to occur prior to a fine being paid, but one cash receipt may pay for fines associated with a number of different loans. The cardinality from Loan Book to Receive Fines is (0,N) because many loans never result in fines, but some loans result in multiple fines ($10 late fee, $75 replacement fee).
b. As directed by your instructor, either create the tables on paper that would be required to implement your REA diagram or actually build those tables in a relational DBMS to which you have access. Only use the attributes listed, unless others are absolutely necessary. Problem 21-3, part b. Table solution Table
Primary Key
Library Books
Library name * University Book ID
Book Title
ISBN#
Author Book TitleAuthor Loan Book
Author number Author number ISBN# Loan number
Book Return
Book return number
Cash Receive Fine
Cash account number Fine receipt#
Employee
Librarian#
Other Attributes (foreign keys in italics) Number of books Book status, ISBN#, default library shelved at Publisher, copyright date, Dewey Decimal number Name
Due date, University Book ID, Borrower ID, loan status, library borrowed from, librarian #, date checked out University Book ID, Loan number, library name, return date, borrower ID, librarian # Beginning account balance Amount received, cash account#, library name, librarian #, borrower ID Name, College degree, YTD loans processed 21-12
.
Accounting Information Systems 15e, GE
Borrower
Borrower ID
Fine-Loan
Fine receipt# Loan number
Name, address, email, SSN, fine balance owed, phone number Amount of fine
* Library name can be the primary key because it is created by the library system and, therefore, guaranteed to be unique for each library.
21.4 Assume that Stained Glass Artistry, a new shop that specializes in making stained glass artwork, has hired you to design an integrated database that will provide the owners with the accounting information they need to effectively manage the business. Stained Glass Artistry makes a wide variety of stained glass windows for sale in its store. A unique job order is assigned to each production run, which includes creating multiple copies of the same basic design. When raw materials are issued to employees, the issuance is documented on a prenumbered raw material issue form. The different kinds of glass needed for the product, and other materials such as copper foil or lead, are issued at one time, so that employees can efficiently produce the design. Creating a piece of stained glass art involves several different steps, including cutting, foiling, and soldering. The owners want to track how much time each employee spends each day performing each of those various tasks. The owners have developed raw material and direct labor standards for each design they offer. They want their AIS to track actual costs and standard costs so that they can generate reports that provide price and quantity variance information. The owners also have provided you with the following list of facts that they want stored in the database. (Note: You must create appropriate primary keys for each table; this is the list of other attributes.) Attributes in Standard Glass Artistry AIS: Date hired Time started task Time completed task Style of glass (name or description) Quantity on hand Color of glass Quantity to be produced Actual cost of design Design name Standard quantity of glass use in design Quantity issued Standard hours to make design Standard cost of design Date design produced Date of birth Wage rate 21-13 .
Ch. 21: Special Topics in REA Modeling
Employee name Standard cost of glass
REQUIRED a. Draw an integrated REA diagram for Stained Glass Artistry. Include both minimum and maximum cardinalities. Raw Materials Inventory
Bill of Materials
Employee (Inventory Control)
Issue Raw Materials
Employee (Factory)
Work in Process
Employee Services
Perform Job Operations
Finished Goods Inventory
Labor Standards
Explanation of cardinalities: a) Each row in the Bill of Materials table represents the standards for using one specific raw material to produce one specific finished good design. Therefore, every row in the Bill of Materials table is linked to one and only one row in the finished goods table. A finished good, however, may consist of numerous raw materials and, therefore, be linked to many rows in the Bill of Materials table. b) Each row in the Labor Standards table represents the standards for making a particular design. Thus, each such standard is linked to one, and only one, finished good. A finished good, however, may involve several different labor activities and, therefore, be linked to multiple rows in the labor standards table.
21-14.
Accounting Information Systems 15e, GE
c) Jobs consist of making one or more copies of a specific design. Therefore, each Work in Process is linked to one and only one finished good. Each finished good, however, may be produced many different times and, therefore, can be linked to multiple rows in the Work in Process table. d) All raw materials are issued at one time; thus, the relationship between Raw Materials Inventory and Issue Raw Materials is M:N. e) Sometimes there may be a need to obtain additional raw materials, due to breakage. Therefore, each Work in Process job may be linked to multiple Issue Raw Materials events. Each event, however, is linked to one, and only one, specific job. f) Each specific job operation is linked to one, and only one, Work in Process, but any given Work in Process job can be linked to many different labor operations. g) The Employee Services entity is an abstract entity that represents the time acquired from various classes of employees. It will be discussed in chapter 14. For now, just explain that each row represents all the time the company acquires from a specific class of employees (artisans, clerks, management, etc.) b. Create the set of relational tables required to implement your REA diagram for Stained Glass Artistry in a relational database.
Table Name Raw Materials Employee Employee Services Bill of Materials
Issue Raw Materials
Primary Key(s) Raw Material number Employee number Category number B.O.M. number
Work in Process
Raw Materials Issue number W.I.P. number
Perform Job Operation
Job Operation number
Finished Goods Inventory Labor Standards
Design number
Raw Materials – Issue Raw Materials Bill of Materials – Issue Raw Materials
Labor Standard number Raw Material number Raw Materials Issue number B.O.M. number Raw Materials Issue number 21-15 .
Other Attributes (foreign keys in italics, others in normal font) Style of glass, beginning quantity on hand, color of glass, standard cost of glass Name, date hired, wage rate, date of birth Raw materials number, design number, Standard quantity of glass to use in this design W.I.P. number, issuing employee number, receiving employee number Design number, Quantity to be produced, date design produced, actual cost of design Employee number, category number, labor standard number, W.I.P. number, Time started task, time completed task Design name, beginning quantity on hand, standard cost of design Design number, Standard hours to make design Quantity issued
Ch. 21: Special Topics in REA Modeling
1.5
The XYZ Company sells tools and parts to automotive repair shops. Shops call in orders; all orders received by noon are delivered the same day. Between 12:00 and 1:00, the system prints out schedules. From 1:00 to 5:00, drivers make deliveries according to the printed schedules. Typically, each driver makes between 25 and 30 deliveries each day. Each delivery is signed for by a repair shop manager; the portable laptop then uses wireless communications to transmit information about the delivery back to the XYZ Company and the information is recorded as another row in the sales event table. The XYZ Company uses its own trucks to make local deliveries to its customers. It wants to track information about the use of those trucks: which employee drove which truck, to which customers did a particular truck make deliveries, which deliveries are made on which days, what was the starting and stopping mileage each day?
REQUIRED a. Draw a partial REA diagram of the XYZ Company’s revenue cycle to model these events: Taking Customer Orders, Deliveries, and the Use of Vehicles. Be sure to include cardinalities.
Inventory
Truck
Take Order
Employee
Delivery
Customer
Use of Vehicle
Employee
21-16.
Accounting Information Systems 15e, GE
b.
Create a set of tables (either on paper or in a relational DBMS to which you have access) to implement the REA model you developed for the XYZ Company.
Table Name
Primary Key
Take Order
Order Number
Delivery
Delivery Number
Use of Vehicles
Vehicle Use Number
Inventory
Item Number
Truck Employee Customer
Truck Number Employee Number Customer Number
Take OrderOrder Number, Item Number Inventory Delivery-Inventory Delivery Number, Item Number
Other Fields(foreign keys in italics, others in normal font) Customer Number, Employee Number, Amount Order Number, Vehicle Use Number, Truck Number, Employee Number, Customer Number Employee Number, Truck Number, Depart Time, Return Time Description, Quantity, List Price, Unit Cost, Beginning Quantity On Hand, Reorder Quantity, Reorder Point Type, Description Name, Address, Position, Pay Rate Name, Address, Phone, Beginning Account Balance, Credit Limit Quantity Quantity
21.6 TechnoDent is an automotive repair shop that also sells parts and accessories to customers who prefer to do their own minor repair work. Customers bringing their vehicles in for repairs need to pay for the parts used during repairs as well as the labor associated with the specific repair. Sometimes no new parts are used, for example, when a customer brings in a vehicle to have a flat tire repaired, the original tire will simply be repaired and the customer will only have to pay the labor charge for the service that was rendered. Customers buying parts to do their own repair work at home need to pay for their purchase in full at the time of the sale. When a vehicle is brought in for repairs at TechnoDent, the customer needs to pay a specified amount up front (calculated as a certain percentage of the specific service to be rendered). The outstanding balance is paid when the vehicle is collected. Inventory is purchased from a variety of suppliers across the country and orders are mostly delivered the next working day. When a supplier is out of stock of a specific item, the supplier will send what is available immediately, and the remainder will be sent as soon as it arrives at the supplier. TechnoDent prefers to pay all suppliers in full and has arranged with its suppliers that they will pay for all purchases made the previous month by the 20th of the next month. REQUIRED Draw an integrated REA diagram for the revenue and expenditure cycle of TechnoDent. 21-17 .
Ch. 21: Special Topics in REA Modeling
21.7 At Big Time University (BTU) students are allowed to purchase two basketball tickets for each home game. Each ticket contains the date of the game, and the seat information, such as section, row, and individual seat number. Students pay for each game individually; that is, student sporting event passes are not used at BTU. BTU deposits the proceeds from each game into its bank. REQUIRED a. Prepare an REA diagram with cardinalities for the revenue cycle for BTU’s basketball games. State any assumptions you may have to make concerning BTU’s business policies and practices.
21-18 .
Accounting Information Systems 15e, GE
Ticket
Ticket Sales
Student
Ticket Window Clerk
Receive Cash
Cash
Student
b. Implement your model in a set of relational tables. Be sure to specify primary keys, foreign keys, and identify at least one other attribute that should be included in each table.
Table Name Ticket Sales
Primary Key(s) Invoice Number
Receive Cash
Remittance Number
Ticket
Ticket Number
Student Ticket Window Clerk Cash
Student Number Employee Number GLAccount Number
21.8
Other Attributes (foreign keys in italics, others in normal font) Student Number, Employee Number, Date, Total Amount Invoice Number, Employee Number, Student Number, GLAccount Number, Date, Total Amount Invoice Number, Event, Date, Section, Row, Seat Name, Address, Phone Name, Address, Phone, Position Name, Beginning Balance
Small contractors often rent special equipment for specific jobs. They need to track the equipment that is rented, when it is returned, and payments made to the rental company.
REQUIRED a. Draw a partial REA diagram for the acquisition, payment, and return of rental equipment. Be sure to include cardinalities and state any assumptions you made when specifying those cardinalities.
21-19 .
Ch. 21: Special Topics in REA Modeling
Rented Equipment
Cash
Return Rented Equipment
Employee
Rent Equipment
Vendor
Disburse Cash
Employee
This solution is based on the following assumptions: 1. Each Rent event is independent of every other Rent event. For example, each time the contractor rents equipment, they must sign a rental agreement or contract for all the equipment they rent at that particular time. 2. Each Return Rented Items event is tied to one and only one Rent event. In other words, all equipment rented according to a previously signed rental agreement is returned at the same time. 3. The contractor pays for the rental at the time of Rent event. 4. The contactor maintains a listing of all types of equipment that they rent. This listing allows the contractor to rent multiple items of the same type. For example, the contractor may rent 5 jackhammers and 5 air compressors in a single Rent event. Thus, many rental item types may appear on a single Rent event. Note: An alternative solution would be to model the rental and return of each individual piece of equipment separately. This would be appropriate if assumption 2 is relaxed and the contractor is permitted to return each individual item at different times. This alternative solution would be modeled similar to Figure 21-3.You may want to explore the effects of these two alternative solutions on both the processing of events and the subsequent generation of queries and reports. b.
Create a set of tables (either on paper or in a relational DBMS to which you have access) to implement the REA model you developed.
21-20 .
Accounting Information Systems 15e, GE
Table Name Rented Equipment Cash Return Rented Items
Primary Key Equipment number GL Account Number Return number
Rent Equipment
Rental number
Disburse Cash
Check number
Employee Vendor
Employee number Vendor number
Rented Equipment – Rent Equipment Rented Equipment – Return Rented Items
Equipment number, rental number Equipment number, return number
Other attributes (foreign keys) Description, Name, beginning balance Date, time, vendor number, employee number, rental number Date, time, vendor number, employee number Date, amount, GL Account number, Employee number, Vendor number Name, date hired, pay rate Name, address, beginning balance quantity quantity
21.9 Answer the following multiple-choice questions. 1. Management at the ABC Company has decided to formally approve all requests to purchase goods. The Request Inventory event will be used for this purpose. The Request Inventory event will be linked to the following: a. Inventory, Order inventory, Supplier, Employee b. Warehouse, Order inventory, Supplier, Employee c. Inventory, Order inventory, Receive inventory, Employee d. Warehouse, Receive inventory, Supplier, Employee Answer: a – For every request, there would be a link to inventory (as specific inventory would be requested), there will also be a link to Order inventory (if a request is approved, inventory will be ordered). If a request is approved, inventory will be ordered from a specific supplier, and an employee will put forward a request to order inventory. 2. The ABC Company generates revenue from the sale of automotive parts and provision of automotive repair services. The relationship between the Sale event and the Services resource would be: a. a minimum of zero service and a minimum of zero sales b. a minimum of one service and a minimum of one sales c. a minimum of one service and a minimum of zero sales d. a minimum of zero service and a minimum of one sales Answer: b. Every rental event is linked to at least one receive cash event (the payment of the rental fee, up front). But it may never be linked to a return event. 3. The ABC Company receives Internet access from an Internet service provider. The relationship between the Service resource and the Acquire Service event would be: a. a minimum of one service and a minimum of zero acquire service b. a minimum of zero service and a minimum of zero acquire service c. a minimum of zero service and a minimum of one acquire service d. a minimum of one service and a minimum of one acquire service 21-21 .
Ch. 21: Special Topics in REA Modeling Answer: a – For every service resource, there can be zero or many services provided, and for every acquired service, there can only be a single provider. 4. In the production cycle of a company, the Job Operations List entity will be related to the following: a. Employee Time and Finished Goods Inventory b. Perform Machine Operations and Work in Progress c. Perform Job Operations and Work in Progress d. Finished Goods Inventory and Perform Job Operations Answer: d – The Job Operations List contains the productions tasks needed to perform specific operations in order to complete inventory (finished goods). 5. Which entity can be used to evaluate the cost of employee development efforts and its effectiveness in a company? a. Time worked b. Skills c. Time used d. Training Answer: d – Training enables a company to record all workshops, training programs, and development efforts used to improve and maintain employee skills. This is the only entity that contains all of this information and it can be used to determine the effectiveness of employee training and development.
21-22 .
Accounting Information Systems 15e, GE
SUGGESTED ANSWERS TO THE CASES Case 21.1 This case involves creating a database from an integrated REA diagram and then using the REA diagram to guide the writing of queries to prepare financial statements. Required a. Create the tables necessary to implement Figure 21-9 in a relational database. Be sure to include primary keys and other relevant attributes in each table.
Table Name Customer
Primary Key(s) Customer number
Employee
Employee number
Take Customer Order
Sales Order Number
Sales
Invoice Number
Receive Cash
Remittance Number
Finished Goods Inventory Work in Process
Item Number
Use Equipment
Machine Operation Number
Equipment Operations List Job Operations List Use Employee Time
Machine Operation List Number Job Operations List Number Job Ticket Number
Bill of Materials
Bill of Materials Number
Raw Materials
Raw Material Number
Issue Raw Materials
Raw Materials Issue Number
Suppliers
Supplier Number
W.I.P. Number
21-23 .
Other Attributes (foreign keys in italics, others in normal font) Name, address, phone, beginning account balance, credit limit Name, date hired, wage rate, date of birth, position Customer number, employee number, date Customer number, employee number, sales order number, Item Number, date Customer number, employee number, GLAccount number, Invoice Number date, amount Name, Description, beginning quantity on hand, standard cost, list price Item Number, Quantity to be produced, date design produced Equipment ID number, W.I.P. number, Machine Operation List number, Time Started, Time Finished, Date Item number, standard time Standard time, Item number Description, Time started, Time Finished, Date, Employee Number, WIP Number, Job Operations List Number Raw materials number, item number, Standard quantity used in this design Description, beginning quantity on hand, standard cost W.I.P. number, issuing employee number, receiving employee number, Raw Material Number Name, Address, Phone, Beginning balance
Ch. 21: Special Topics in REA Modeling
Equipment
Equipment ID Number
Acquire Services
Service Acquisition number
General and Administrative Services Cash Time Worked
GLAccount Number
Order Raw Materials and Equipment Receive Raw Materials and Equipment Disburse Cash
Purchase Order Number
Issue Stock
Issuance Number
Issue Debt
Loan Number
Transfer Agent Customer Order – Finished Goods Sale – Receive Cash
Transfer Agent Number Order Number, Item Number Invoice Number, Receipt Number Purchase Order Number, Raw Materials Number
Order Raw Materials and Equipment – Raw Materials Receive Raw Materials and Equipment – Raw Materials Receive Raw Materials and Equipment – Cash Disbursements
GLAccount Number TimeCard Number
Receiving Report Number Check Number
Description, Cost, Depreciation Method, Useful Life, Salvage Value, Year Acquired, Purchase Order number, Receiving report number Description, Cost, Check number, supplier number, employee number, GL Account number Description, length of contract, budget Description, beginning balance Employee Number, Supervisor Number, Time in, Time Out, Date, Check number Date, employee number, supplier number, equipment ID number Date, supplier number, equipment ID number GLAccount Number, Date, Amount, Purpose, Employee (payee) Number, Supplier Number, Cashier number, Stock issuance number, Loan number, Transfer Agent Number Date, Transfer Agent Number, Employee (Treasurer) number, GLAccount number, Number of Shares, par value Amount, Date, Interest rate, term, Transfer Agent number, employee (Treasurer) number, GLAccount number Name, Address, Phone Quantity ordered, unit sales price Amount applied Quantity ordered, unit cost
Receipt Number, Raw Materials Number
Quantity received, condition
Receiving Report Number, Check number
Amount applied to invoice
21-24 .
Accounting Information Systems 15e, GE
Order Raw Materials and Equipment – Receive Raw Materials and Equipment Issue Raw Materials – Raw Materials Sales - Finished Goods Inventory Employees – Receive Raw Materials and Equipment
Purchase Order number, Receiving Report number
Raw materials number, Issue Raw Materials Number Invoice Number, Item Number Employee number, Receiving Report Number
Quantity issued
Quantity sold
b. Write the query, or set of queries, necessary to generate as many elements of financial statements as possible. For example, write the query or set of queries that would be used to calculate the amount of cash on hand, the total of accounts receivable, the total value of raw materials, inventory on hand, etc. The actual syntax will depend on the software used. The following logic describes the queries that can be used to provide most of the information needed to construct a simple income statement and balance sheet: 1. To derive total sales you need to query three tables Take Customer Order – Finished Goods Inventory, and Sales. First, find the set of customer order numbers that have been realized as sales (i.e., all customer order numbers that appear in the Sales table). Then, for that set of customer orders, query the M:N relationship table between Take Customer Orders and Finished Goods Inventory and sum the product of quantity ordered times unit sales price. 2. To derive total actual Cost of Goods Sold requires assumptions about inventory costing method (LIFO, FIFO, etc.). However, it is straightforward to calculate the standard cost of goods sold as follows: query the Finished Goods Inventory, the M:N relationship table between Finished Goods and Take Customer Order, take Customer Orders, and Sales. First, find the set of customer order numbers that have been realized as sales (i.e., all customer order numbers that appear in the Sales table). Then, for that set of customer orders, query the M:N relationship table between Take Customer Orders and Finished Goods Inventory and the Finished Goods Inventory tables and sum the product of quantity ordered times standard cost per unit. 3. Only three expenses can be calculated from the model: wages, general administrative expenses, and depreciation. a. To calculate wages expense: Sum hours worked (from the Time Worked entity) and group by employee number. Then multiply the total hours worked for each employee by that employee’s payrate (found in the Employees table). b. To calculate general administrative expenses, sum the cost column in the Acquire Services table.
21-25 .
Ch. 21: Special Topics in REA Modeling
c. The Equipment table contains all the information needed to calculate depreciation (acquisition cost, useful life, depreciation method, salvage value, and year acquired). 4. To calculate cash balance first retrieve the sum of the beginning balance attribute from the Cash table. Second, sum the amount column in the Receive Cash, Issue Stock, and Issue Debt tables and add those three numbers to the beginning balance. Then sum the amount in the Disburse Cash table and subtract that from your previous total. 5. To calculate accounts receivable begin by computing the sum of the beginning balance attribute from the customers table. Next, add to that the total amount of sales (see step 1). Then, subtract the sum of the amount column in the Receive Cash table. 6. It is straightforward to calculate the standard cost of ending inventory using the standard unit price. Calculating the actual cost of ending inventory is complex, requiring retrieval of information from many tables and assumptions about the costing method (FIFO, LIFO, Weighted Average). 7. The equipment table has the cost of all equipment. Cumulative depreciation can be calculated from the information in the table and that amount subtracted from cost to yield book value. 8. Accounts payable can be calculated as follows. a. Begin by retrieving the sum of the beginning balance attribute from the suppliers table. b. Then calculate the total of all purchases. i. For equipment, this involves summing the cost attribute for all rows in the equipment table linked to a Receive Raw Materials and Equipment event this fiscal period. ii. For raw materials, this involves several steps. Begin by finding the set of raw materials orders that are linked to receive events this period. Then query the Order Raw Materials and Equipment – Raw Materials M:N table and sum the product of quantity ordered times unit cost. iii. For services, this equals the sum of the cost column in the Acquire Services table for all rows in which the check number is null. c. Then calculate payments to suppliers by summing the amount attribute in the Disburse Cash table for all rows that are linked to suppliers. d. Accounts payable = step a + step b – step c 9. Long term debt can be calculated by summing the amount column in the Issue Debt table. 10. The total par value of common stock can be calculated by summing the product of par value times number of shares. 21-26 .
CHAPTER 22 INTRODUCTION TO SYSTEMS DEVELOPMENT AND SYSTEMS ANALYSIS SUGGESTED ANSWERS TO DISCUSSION QUESTIONS 22.1 The approach to long-range AIS planning described in this chapter is important for large organizations with extensive investments in computer facilities. Should small organizations with far fewer information systems employees attempt to implement planning programs? Why or why not? Be prepared to defend your position to the class. Yes, companies with few IS employees should attempt to implement planning programs. This is particularly true if the company or its computer usage is growing. The extent of the planning should be commensurate with the size of the computer facility, reliance on system information, and the potential value of the company’s system. Planning produces benefits even if the planning effort is minimal. In the smallest facility, the plan may consist simply of a few pages of thoughts and projects that are prepared and reviewed periodically by the person in charge of the system. It could also consist of a bare bones cost-benefit analysis. A smaller company will typically have fewer funds than a large company will. Therefore, inadequate planning can be more disastrous and financially draining for small companies. 22.2 You have been approached by the owner of ShopSmart, a local general dealer, to give advice regarding the implementation of an accounting information system. ShopSmart currently uses a manual system to manage everything: from ordering inventory to handling sales. You are asked to explain the process that will be used to design and implement a new accounting information system at ShopSmart while taking into account that there current system is a completely manual system. Here, students need to discuss the five steps in the systems development life cycle (SDLC), taking into consideration that ShopSmart has no existing (automated) processes in place. The main points to discuss, per step, are as follows: Systems analysis: All information required to purchase or develop the system is gathered in the systems analysis step. Since ShopSmart is doing everything manually, there will be no modification of an existing system. All development requests are screened and prioritized – since this is a completely new system, developed from scratch, all elements of the system needs to be listed and prioritized. If ShopSmart approves the project, the feasibility of the proposed project should be determined. If the proposed project is deemed feasible, the information needs of the system users and management needs to be documented. These needs are used as the basis of the system requirements. A systems analysis report is prepared and this report is then submitted for review by the information systems steering committee. Conceptual design: In this step, it is important to determine if off-the-shelf software would be appropriate and / or available; since everything is currently done manually, chances are that ShopSmart does not have in-house expertise to develop the system; if off-the-shelf software is not appropriate, it is most likely that development will then need to be outsourced. Decisions need to be made as to what the system should accomplish and how it is to be controlled. Once the conceptual 22-1 .
Ch 22: Introduction to Systems Development; Systems Analysis design requirements have been established it needs to be communicated to the information system steering committee. Physical design: The broad conceptual user-oriented design requirements then gets coded (programmed) and tested. Input and output documents are designed and files and databases created. Procedures and controls are built into the system. The results of this phase are communicated to the information system steering committee. Implementation and conversion: An implementation and conversion plan is developed; new hardware and any additional software are installed and tested. Staff will be trained (and new staff hired, if required) and processing procedures are tested and modified. System documentation is completed, and all standards and controls for the new system are established. The old system is removed (often after a period of running the old and new system in parallel to ensure all is working correctly) and a post-implementation audit is done to ensure that there are no design deficiencies. If any deficiencies are identified, those are corrected. A final report is sent to the information systems steering committee. Operations and maintenance: this is the final phase (which is ongoing) during which the new system is periodically reviewed and changes made as problems are identified or additional needs become evident. 22.3 Why is it important that systems development is properly planned? Refer to the advantages of planning systems development in your discussion. Without proper planning, it is quite likely that the final system will be a system that is poorly integrated and also difficult to operate and maintain. The advantages that proper planning can offer includes the following: the goals and objectives of the planed information system will support of the organization’s overall strategic plan. When there is coordination between the organization’s goals and the information system goals, the systems are more likely to be efficient, since there will be coordinated subsystems that will be able to work together. When the subsystems are coordinated, it is much easier to be able to determine when and where new applications are required. With this coordination, it is also possible to stay ahead of the changes in IT. Appropriately planned systems development will reduce the possibility of duplication (since subsystems are coordinated) and effort will not be wasted on the development of unnecessary subsystems. Cost and time overruns can be avoided, since, with a coordinated effort, the subsystems will work together to attain the main goal. Maintenance is less costly and the management will be prepared for resource needs, as and when required. Employees will also be less resistant to change, as they will be part of the planning process and will be able to understand their role in the bigger picture of all the coordinated subsystems. 22.4 For each of the following, discuss which data-gathering method(s) are most appropriate and why: a. Examining the adequacy of internal controls in the purchase requisition procedure Observation of procedures, interviews with employees, and documentation reviews (of document or control flowcharts, for example) will all aid in understanding purchase requisition procedures. Each type of procedure will identify different aspects of the internal controls in the purchasing department. b. Identifying the controller’s information needs - An in-depth interview with the controller is one way to determine her information needs. However, managers often don’t know what information they need; they say they need the information they are now getting and little else. 22-2 .
Accounting Information Systems 15e, GE Therefore, the interviewer/analyst must understand the manager’s function and the role of that function in the organization. The interviewer should also ask the controller what information she would like to receive that she is not now receiving. Interviewing is an efficient fact-finding technique that allows a prepared and informed interviewer to ask “why” or probing questions to better identify the controller’s needs. Reviewing the reports that the controller currently receives is also a good way to identify her needs. c.
Determining how cash disbursement procedures are actually performed - If the cash procedures are documented, a review of that documentation will help understand how it is supposed to work. The best way to understand how cash disbursement procedures are actually performed is to interview employees, observe them, and prepare flowcharts and notes.
d.
Surveying employees about the move to a total quality management program - By using a questionnaire, the opinions of many different employees can be gathered. Questionnaires also produce information in a standardized format. A questionnaire allows employees to think about the questions before giving answers and it is more objective than other data gathering methods. Anonymous questionnaires will encourage employees to give honest answers. Questionnaires produce a “breadth” but not a “depth” of information. To go beyond the questions in the questionnaire, interviews should be held with selected employees. The purpose of the interviews is to probe deeper to find out why employees feel as they do.
e.
Investigating an increase in uncollectible accounts - Interviews with employees and examination of documents will provide good initial sources of information to investigate the problem. Documents will show which accounts are uncollectible and help with an understanding of the company’s collection policies. Interviews will help determine why uncollectible accounts have increased.
22.5 The One of the main issues to consider during systems development is to determine the feasibility of the proposed project. Discuss the purpose of a feasibility study and discuss examples of different types of feasibility that need to be considered. A feasibility study should be performed. In short, a feasibility study is an investigation that is used to determine if it would be practical to develop a new system. A feasibility study is also sometimes referred to as a business case. Input needs to be obtained from the management, accountants, system staff, and the users of the system. During the SDLC, there are specific decision points where the IS steering committee needs to make go/no-go decisions. These decisions are at points when the feasibility of a proposed project is reassessed. Depending on the project and its feasibility, the project might be cancelled, the project might continue if certain conditions are met, or the project may continue unconditionally. The following types of feasibility need to be assessed: Economic: the questions to answer here is if the benefits that can potentially be gained actually justify the time, money, and resources required to complete the proposed system. Technical: the question to be asked here is if the system can be developed with existing technology. Legal: The question to ask here is if the system actually complies with all laws, regulations, policies, and contractual obligations. 22-3 .
Ch 22: Introduction to Systems Development; Systems Analysis Scheduling: The question to ask here is if it would be possible to develop and implement the system within the time allowed / scheduled. Operational: The question here relates to the staffing and employees – does the company have access to employees with the skills and expertise to design, implement, and operate the system? Another important question is whether the employees will actually be willing to use the system. 22.6 Give some examples of systems analysis decisions that involve a trade-off between each of the following pairs of objectives: There are many examples of the tradeoffs between information system objectives. One example is provided here for each pair of objectives. a.
economy and usefulness - the decision of how much information to give a credit manager to help in deciding whether to extend credit versus the cost of providing that information.
b.
economy and reliability - the decision of whether to implement a new internal control procedure.
c.
economy and customer service - the decision of whether or not to allow sales personnel to access data versus the cost of providing that information and the cost of the information being used for unintended purposes.
d.
simplicity and usefulness - any decision about the extent to which output information should be reported in detail or in summarized form.
e.
simplicity and reliability - any decision about whether or not to implement an internal control procedure.
f.
economy and capacity - the decision of whether to acquire additional storage capacity.
g.
economy and flexibility - the decision to replace older, less flexible storage mediums with newer, more flexible, and often more costly storage mediums.
22.7 For each of the following items, discuss which of the four data gathering methods would be most appropriate and why. a. Eliciting 300 employees’ opinions on a new incentive program to replace the current bonus program.
Eliciting opinions from a large population on a potentially emotionally charged topic is best handled with a questionnaire. You can ask the same questions from a large number of employees; you will get candid responses, particularly if you respect anonymity; the questionnaire would be relatively quick and inexpensive to create and analyze responses. b. Identifying how the credit approval process for new customers should be conducted and by whom.
Identifying how a process is supposed to be done is best handled by reviewing documentation about the process. Flowcharts, data flow diagrams, process diagrams, job descriptions, organizational charts, and training manuals would all provide information about the design of the credit approval process.
22-4 .
Accounting Information Systems 15e, GE 22.8 Discuss the strategies often used to determine requirements for a proposed AIS. Ask users: the simplest way to start off with is to ask users what they need. However, often users do not understand what they need as they just know what they have to do every day. Often, users do not have the ability to break down their daily tasks into the individual information elements they need to use. When speaking to users, it is often more appropriate to ask some questions, such as: what decisions do you make, what processes are you involved in? It is also good practice to get the users to think beyond what they are currently using and doing in order to also identify possible future needs. Analyze existing external systems: it is possible that there are existing systems that could potentially meet the needs of the company – then it is not necessary to redevelop something that already exists. Study existing systems: Sometimes certain parts of an existing system at a company are not used as intended – in some cases certain parts of a system is not used at all. It might be that the current system in place might just need some modifications, or it might indicate that the existing system does in actual fact need to be replaced. Create prototype: Users can be given a prototyped system and asked to comment on the prototype. In this way developers can find what users like and what they do not like and changes can be made; this is an iterative process, so the developer creates a prototype, test it with the users; and then repeat the process until such time that the user and the developer are in agreement as to what is required. 22.9 Ajax Manufacturing installed a new bar code based inventory tracking system in its warehouse. To close the books each month on a timely basis, the six people who work in the warehouse must scan each item in a 36-hour period while still performing their normal duties. During certain months, when inventory expands to meet seasonal demands, the scan takes as many as 30 hours to complete. In addition, the scanners do not accurately record some inventory items that require low operating temperatures. A recent audit brought to management’s attention that the inventory records are not always accurate. Which aspect(s) of feasibility did Ajax fail to consider prior to installing the inventory tracking system? Ajax Manufacturing failed to consider operational and technical feasibility when implementing their inventory tracking system. Operational feasibility considers whether the organization’s personnel can and/or will use the system. For Ajax, the 30 hours required to scan all inventory in a 36-hour period was very difficult on personnel and most likely led to human error in the inventory count due to fatigue. Technical feasibility deals with whether the technology is in place for the system to work. For Ajax, although the technology was in place and worked under normal circumstances, the scanners did not always work in the cold conditions of Ajax’s warehouse. Therefore, the technology sometimes failed, which resulted in inventory errors.
22-5 .
Ch 22: Introduction to Systems Development; Systems Analysis SUGGESTED ANSWERS TO THE PROBLEMS 22.1 Match the terms with their definitions 1. __M_ systems analysis 2. __A__ conceptual design 3. __R__ physical design 4. __S__ implementation and conversion 5. __H __ IS steering committee 6. __L _ systems analysts 7. __B__ master plan 8. __O __ PERT diagram 9. __N __ critical path 10. _E _ Gantt chart 11. _Y _ feasibility study 12. _P __ economic feasibility 13. _U__ technical feasibility 14. _T __ operational feasibility 15. _I _ payback period 16. _Z __ NPV 17. _J __ IRR 18. _D __ aggression 19. _F __ avoidance
20. _V __ initial investigation 21. _W __ systems survey 22. _K __ logical model
a. Process of deciding how to meet user needs, identifying and evaluating design alternatives, and developing detailed system specifications b. Describes a system’s contents; how it’s developed, by whom, and when; and how needed resources will be acquired c. Description of a system’s document flow, computer processes and people performing them, and equipment used d. Resisting change by destroying, crippling, or weakening system effectiveness such as increased error rates or sabotage e. Bar graph that shows project activities on the left, units of time on the top, and activity time requirements as a horizontal bar f. Resisting change by ignoring a new IS and hoping the new system will go away g. Document showing project requirements, a cost–benefit analysis, and how a project will be completed h. High-level management that plans and oversees the IS function, sets policies to govern the AIS, ensures control, and coordinates activities i. Calculation of the number of years required for the net savings of an investment to equal its initial cost j. Calculating the interest rate that makes the present value of total costs equal to the present value of total savings k. System description that focuses on activities performed and information flow regardless of how the flow is accomplished l. People who help users determine their information needs, study existing systems, and design new ones m. SDLC step of gathering information needed to purchase, develop, or modify a system n. PERT path requiring the greatest amount of time to complete a project; if any activity is delayed, the whole project is delayed o. Way to coordinate, control, and schedule systems development activities; a diagram shows the relationships among activities p. Determining if system benefits justify the time, money, and resources required to implement it q. Return-on-investment technique that compares estimated benefits and costs to determine if a system is cost beneficial r. Detailed specifications are used to code and test software, design input/output, and create files/databases, and implement controls s. Process in which procedures are tested and modified, controls are established, documentation is completed, and employees are trained on a new system t. Determining if a company needs the people to design, implement, and operate the proposed system and if employees will use it u. Determining if a proposed system can be developed given the available technology v. Preliminary investigation to determine whether a proposed new system is both needed and feasible w. Extensive study of the current AIS x. Resisting change by blaming everything on the new system so it 22-6 .
Accounting Information Systems 15e, GE becomes the scapegoat for all problems and errors y. Investigation to determine if it is practical to develop a new application or system z. Discounting estimated future cash flows back to the present using a discount rate that reflects the time value of money
22.2 Mary Smith is the bookkeeper for Dave’s Distributing Company, a distributor of soft drinks and juices. Because the company is rather small, Mary performs all daily accounting tasks herself. Dave, the owner of the company, supervises the warehouse/delivery and front office staff, but he also spends much of his time jogging and skiing. For several years, profits were good, and sales grew faster than industry averages. Although the accounting system was working well, bottlers were pressuring Dave to computerize. With a little guidance from a CPA friend and with no mention to Mary, Dave bought a new computer system and some accounting software. Only one day was required to set up the hardware, install the software, and convert the files. The morning the vendor installed the computer system, Mary’s job performance changed dramatically. Although the software company provided two full days of training, Mary resisted learning the new system. As a result, Dave decided she should run both the manual and computer systems for a month to verify the new system’s accuracy. Mary continually complained that she lacked the time and expertise to update both systems by herself. She also complained that she did not understand how to use the new computer system. To keep accounts up to date, Dave spent two to three hours a day running the new system himself. Dave found that much of the time spent running the system was devoted to identifying discrepancies between the computer and manual results. When the error was located, it was usually in the manual system. This significantly increased Dave’s confidence in the new system. At the end of the month, Dave was ready to scrap the manual system, but Mary said she was not ready. Dave went back to skiing and jogging, and Mary went on with the manual system. When the computer system fell behind, Dave again spent time catching it up. He also worked with Mary to try to help her understand how to operate the computer system. Months later, Dave was very frustrated because he was still keeping the computer system up to date and training Mary. He commented, “I’m sure Mary knows how to use the system, but she doesn’t seem to want to. I can do all the accounting work on the computer in two or three hours a day, but she can’t even do it in her normal eight-hour workday. What should I do?” This is an actual case with the facts presented as accurately as possible. The objective is to familiarize students with the behavioral issues surrounding a systems change. It is less important to determine the “right answer” (there may not be one) that it is to discuss the issues. a.
What do you believe is the real cause of Mary’s resistance to computers? Employee reaction to the installation of a new information system is often diverse and unpredictable. In many cases, employees must make significant behavioral adjustments to ensure the future success of the new system. These adjustments go well beyond mere surface anxieties such as fear of the unknown. Possible causes of Mary’s resistance to computers include (phased as questions):
Is Mary’s adverse behavior due to a perceived need to protect her ego? Is she afraid she cannot use the computer properly and would look foolish?
Since Mary was excluded from the decision to automate the office, does she feel 22-7 .
Ch 22: Introduction to Systems Development; Systems Analysis resentment and refuse to use a system she wasn’t asked to help select?
b.
c.
d.
Is she fearful because computers sometimes cause people to overcommunicate? (i.e., with capabilities such as electronic mail, employees can be reached anywhere and anytime, making it difficult to get away from all the interruptions that are part of the daily grind.)
Is she worried that the computer will impose its own structure on the organization? The computer can considerably narrow that freedom causing people to view the computer as structure and constraint.
Did she have an adverse experience with previous changes to her work environment and as a result is suspicious of any new system?
What events may have contributed to the new system’s failure?
The company did not involve Mary in the systems change. They did not ask for her ideas, thoughts, or input. Evidently, she was not informed of the change until the computer was moved into her office and the furniture rearranged to make room for it. It would be easy for her to get the feeling she was not a very valued employee of the company.
The company did not explain why the system was being implemented, what the company hoped to achieve with the system, and why it was so important to the company.
The changes to Mary’s job and responsibilities were not explained.
Mary was not given any assurance that she would not be replaced by the system.
The company did not alleviate Mary’s fear by reassuring her that training would be provided to help her adapt to the new system and her duties.
Running two systems longer than it took to test system reliability was a mistake, as was having Dave do the work.
In retrospect, how should Dave have handled the accounting system computerization?
Mary should have been informed of the change that was going to take place, the purpose of the change, and why it was important to the company. Discussing these things with Mary beforehand could have helped the company create an attitude of trust and cooperation and could have set an example for what they expected of Mary.
The company should have allowed Mary to make suggestions concerning the system, especially the things that would help her do her job more efficiently.
Mary should be reassured that she has control over the system and not the other way around and that the system will help her perform her job more effectively.
Education prior to systems implementation could perhaps have helped Mary adapt to the system more readily.
At what point in the decision-making process should Mary have been informed? Should she have had some say in whether the computer was purchased? If so, what should have been the nature of her input? If Mary had not agreed with Dave’s decision to acquire the computer, what should Dave have done?
Mary should have at least been informed as soon as the decision was made to purchase the system. Preferably, Mary should have been informed at the very start when the company began thinking about the computer system. This would have allowed Mary to give valuable input and to be involved throughout the entire process.
Because Mary was only a bookkeeper and did not fully understand the necessity of the 22-8 .
Accounting Information Systems 15e, GE system, she should not have been allowed to make the final decision on acquiring the system. However, if Mary had been involved from the beginning it is possible that she would have been in favor of the system. Even though she should not make the final decision, if her input had been considered it would have helped her accept the decision better.
e.
An effort should have been made to persuade her of the system’s viability. If that is unsuccessful then consideration should be given to relocating her within the company. If both previous plans fail then termination is the only alternative available.
Mary should have been given an opportunity for greater input. The company should have solicited her suggestions concerning how the system would best assist her with her job and how the system could achieve success in general terms. This participation would have likely increased Mary’s self-esteem and security with the new system and changed her whole outlook about the system.
A hard decision must be made about Mary. Significant efforts have been made to train her, but they have been unsuccessful. What would you recommend at this point? Should she be fired? Threatened with the loss of her job? Moved somewhere else in the business? Given additional training? There are advantages and disadvantages to each of the following four options. Students will come to different conclusions based on their background. It is important to bring out the pros and cons of each approach. A few of these are shown below. This problem works well when the instructor determines which students support which alternative and plays them off against each other. 1. Firing can have the following advantages:
The company can hire a more qualified individual who can perform the job more efficiently.
The company can rid itself of an uncooperative employee and replace her with someone with a more positive attitude.
Firing can have the following disadvantages:
The company sends messages to other employees and perhaps the community in general that they don’t care about their employees as much as they do about profits and operations. This may lower company morale.
The firm may have higher training and hiring costs.
The person hired may cost more and bring unknown problems to the job.
2. Transferring employees can have the following advantages:
The company is less likely to communicate that it does not care for its employees.
The transferred person has experience with the company and may be of greater value to the company in another area than a newly hired person may.
Training and hiring costs remain constant. Transferring can have the following disadvantages:
Employees may resent being transferred and not perform well in their new duties. 22-9 .
Ch 22: Introduction to Systems Development; Systems Analysis
Employees may not be qualified for the new job and perform poorly.
If the transferred employee is disgruntled and talks about her situation to her coworkers, it could affect company morale.
3. Persuasion can have the following advantages:
A valuable employee may be retained, and her time freed up to perform tasks that are more important.
Hiring and training costs can be kept to a minimum.
The company communicates consideration for its employees. Persuasion can have the following disadvantages:
The employee may never truly adapt, resulting in poor job performance and an increase in errors.
Significant costs may be incurred to constantly train the employee and identify the mistakes made by the employee.
The company may make poor decisions based on incorrect information given by the employee.
It may only serve to increase even further the frustration level that already exists.
Mary was eventually fired and another bookkeeper hired. With the new system, there was not enough work to keep the new employee busy full time. Consequently, the employee took over additional tasks that Dave had originally been performing. This freed him up for more creative tasks and to have more personal time. Mary was interviewed several years later. She was employed at another firm and worked extensively with computers. Mary was asked if the company could have done anything to help her adapt to the computer and she said no. She had such a mental block against the computer at the time that she doubted the company could have done anything else to help her. It required several years for her to overcome her fear and learn to use computers.
22-10 .
Accounting Information Systems 15e, GE 22.3 A large pharmaceutical company had decided in the early 1990s that they needed an upgraded information system to increase their efficiency in, amongst others, their distribution facility, handling inventory and customer orders, shipping, and billing. The company had some of their employees look at the different products that are available on the market and, after some product reviews and evaluation, the company decided on SAP R/3. Subsequently, the company purchased the SAP R/3 enterprise resource planning system and decided to also acquire a warehouse automation system to manage their inventory at their warehouses. Management decided on a consultancy firm to handle the integration and implementation of SAP R/3 and the warehouse automation systems. Management believed that the combination of these two systems would enable them to be handle more customer orders and ultimately be more profitable. Implementation of these systems took place in the two years following the original purchase of the SAP R/3 system. The warehouse employees were unsettled by the new implementation as the integration of SAP R/3 and the warehouse automation system threatened the jobs of many of the warehouse employees. In the period after the implementation was started, large volumes of inventory were damaged, orders were not filled, and many mistakes were made in the new system. Seemingly, the new system could not handle the volume of transactions. Shortly after the project to implement and integrate SAP R/3 and the warehouse automation began, the company signed a huge deal with a health care company. This deal required additional transaction volumes and the new system could not manage to process the required transactions. It was determined that the new system could only manage 10,000 customer orders every night, while the previous system managed 420,000 orders per night (orders were processed in batch mode at night). The company needed high transaction volumes to stay profitable, and the implementation and integration of the new systems, coupled with the large, newly acquired contract, was meant to provide the company with a competitive edge. The pharmaceutical company relied on consultancy employees to implement and integrate the new systems and it was found that the 50 consultants that were available to handle the implementation and integration were not sufficiently skilled. Since the consultants were not able to manage the implementation and integration with their current skill sets, the turnover of consultants was high. The original budget included about $5 million for acquiring new hardware, $4 million for the new software, $18 million for a new computerized warehouse, and several (undisclosed) millions for consulting fees. In the end, the planned project was a complete disaster with a final cost of approximately $100 million, leading to the demise of the company. In this case, there were specific issue identified with the planning and the implementation of the proposed system. REQUIRED a.
Explain the impact that a lack of planning had on the failed implementation. What could have been done to prevent the failure from occurring in terms of planning? In terms of planning, the major issues related to management decisions – the management decided on what software to buy, the management consulted with a single firm, and end users were not involved in the process as the management made all the decisions. Based on the facts of the case, it seems as if there never was an IS steering committee appointed to
22-11 .
Ch 22: Introduction to Systems Development; Systems Analysis drive the entire process. Such an IS steering committee should have members with sufficient technical and operational knowledge to ensure that the appropriate software is selected. Similarly, the IS steering committee should have had the option to review more than one consultancy’s advice before a decision was made. It was clear from the facts in the case that employees had not been consulted – the warehouse employees were not consulted at all. Without support and understanding from the users, projects are likely to fail. Consultation with the employees (and all other relevant stakeholders) should include a discussion on an impact analysis to determine how different units in the company will be affected by the proposed system. b.
Explain the impact that implementation issues had on the failed implementation. What could have been done to prevent the failure from happening in terms of implementation? In terms of implementation, it seems as if the software was purchased and installed. Then there was the installation of the warehouse automation software – and it was expected that all software would function properly and ensure that profits would be increased. There is no evidence from the case that any of the business processes were adapted to be suitable for use with the SP R/3 system. It seems as if testing was not done properly, as in the end the new system configuration could not even handle the same volume of traffic that the previous system could manage. All in all, the project scope was probably too much to handle, especially with the inclusion of the ambitious warehouse project. Although management was the initial driver of the project, it seemed as if management did not fully commit to realizing when things were not going according to plan. IT cannot simply be thrown at problems in an organization and while hoping that everything will work out – IT is not a silver bullet. On the contrary, proper planning and implementation are required to ensure successful IS projects. The fact that end users were not involved from the get-go is another concern, as end users are resentful of new systems – especially if such systems could potentially cause them to lose their jobs. The current business processes had to be reviewed to determine which of the processes could be improved and then one can consider utilizing ERP software with improved processes. Simply installing the ERP software is not the solution. Software needs to be thoroughly tested with a variety of scenarios to ensure that the software can handle any type of relevant scenario. The ambitious addition of another large project should not have been approved – the warehouse automation should have been considered once the SAP R/3 installation was deemed successful. Throughout the implementation process top management and the IT steering committee should have monitored the project status, and whenever any issues were flagged, it should have been addressed. Simply throwing more money at a project is not going to make the project successful.
22-12 .
Accounting Information Systems 15e, GE 22.4 Research has shown that many software development projects are late, others run over budget, while still others are unsuccessful. There are several reasons for unsuccessful information system projects, and one of the reasons is project management failure. What is the task of a project manager in an information systems development team? What are the typical skills required by a project manager? Discus the major roles or responsibilities a project manager needs to master to ensure successful project management. Project managers are the people in charge of the planning of projects – they are also in charge of the successful execution of the planned projects. A project manager will be the team member that needs to define the goals of the project. Different teams (internally and externally, where appropriate) need to be aligned and need to communicate – the project manager needs to oversee that the different teams are aligned. The project schedule (in terms of timelines and possible dependencies) needs to be created, and once the project has started, the performance indicators should be tracked. Project managers often need to wear a variety of hats in the business world, and this leads to a variety of skills required. A project manager needs to have skills related to budgeting (forecasting as well as management), business strategy development and alignment with development teams (also at strategic level) and scoping of projects by determining what should be included and what should be excluded. Progress should both be measured and reported (typically by means of Gantt charts, for example). The quality of what had been done should be checked. According to project management training institutions, the roles / responsibilities of project managers can be summarized as follows:
Taking the lead – a project manager needs to be a leader and part of the leadership skills include relationship building (as can be seen in the team discussion in one of the other areas). Leaders often have to manage teamwork, resolve conflict, and be able to adapt in a highpressure environment. “Soft skills” are becoming more and more important among the set of skills required by a project manager. Manage the team and their timeline – the team will most likely be a multi-disciplinary team, with team members having very different perspectives on what needs to be developed. Relationships between all the members of the team need to be managed. Part of this process is also to manage the timelines that need to be adhered to so that the project can finish on time (and within budget!). Organizing the team – this is closely related to the first point. A project manager should have the ability to work with multiple teams and ensure that timelines are adhered to; and that deliverables are available as was planned. Different team members and different teams often have to work together to ensure that deliverables are ready by the stipulated deadlines. Project managers need to streamline all project activities and ensure that the teams are organized. Technological skills – although technology cannot replace the knowledge and skills set of the human mind, project managers need to be able to leverage existing technology. In doing so, information can readily be shared, data can be synthesized, and all stakeholders can be informed of updates. In project management software (part of the technology to be leveraged), issues such as budget management, file sharing, time tracking, and email integration are all important technologies to be understood and used. Performance tracking and measurement – with the requirement to work across teams to identify key performance indicators, project managers need to utilize appropriate measurement tools to report on strategic alignment and return on investment. Project managers need to report on what they find, but they also need to be able to interpret findings and give explanations as to what the findings mean. Such findings are often what impacts the strategy of a project, and if changes 22-13 .
Ch 22: Introduction to Systems Development; Systems Analysis need to be made based on findings the project manager had reported on, it is easier to motivate implementation of such changes. 22.5. Rossco is considering the purchase of a new computer with the following estimated costs: initial systems design, $54,000; hardware, $74,000; software, $35,000, one-time initial training, $11,000; system installation, $20,000; and file conversion, $12,000. A net reduction of three employees is expected, with average yearly salaries of $40,000. The system will decrease average yearly inventory by $150,000. Annual operating costs will be $30,000 per year. The expected life of the machine is four years, with an estimated salvage value of zero. The effective tax rate is 40%. All computer purchase costs will be depreciated using the straightline method over its four-year life. Rossco can invest money made available from the reduction in inventory at its cost of capital of 11%. All cash flows, except for the initial investment and start-up costs, are at the end of the year. Assume 365 days in a year. Use a spreadsheet to perform a feasibility analysis to determine if Rossco should purchase the computer. Compute the following as part of the analysis: initial investment, after-tax cash flows for years 1 through 4, payback period, net present value, and internal rate of return. Rossco should proceed with the purchase. The internal rate of return of 23.23% is higher than the hurdle rate of 11%. There is a positive NPV of $56,157. Payback is in 2.44 years.
22-14 .
Accounting Information Systems 15e, GE
22-15 .
Ch 22: Introduction to Systems Development; Systems Analysis 22.6
Joanne Grey, a senior consultant, and David Young, a junior consultant, are conducting a systems analysis for a client to determine the feasibility of integrating and automating clerical functions. Joanne had previously worked for the client, but David was a recent hire. The first morning on the job, Joanne directed David to interview a departmental supervisor and learn as much as possible about department operations. David introduced himself and said, “Your company has hired us to study how your department works so we can make recommendations on how to improve its efficiency and lower its cost. I would like to interview you to determine what goes on in your department.” David questioned the supervisor for 30 minutes but found him to be uncooperative. David gave Joanne an oral report on how the interview went and what he learned about the department. Describe several flaws in David’s approach to obtaining information. How should this task have been performed?
Ms. Grey did not give Mr. Young adequate instructions about how to conduct the interview and what information to obtain. A senior consultant must exercise closer supervision and provide better guidance to junior employees. Perhaps Ms. Grey should have performed the interview while Mr. Young observed.
The consultants did not prepare for the interview. They should have studied available documentation to learn what the department does and what the supervisor’s job responsibilities are. Then they should have prepared an interview guide listing the topics to be discussed and the questions to be asked.
Mr. Young provided an oral report rather than a written report of his findings. An interviewer should take notes during the interview, and polish them immediately afterward, in order to provide documentation for future analysis and reference.
Mr. Young’s opening statements to the supervisor were negative in tone. He should attempt to establish rapport with the interviewee, avoid making negative or threatening statements, and be positive about the goals of the study.
Mr. Young should have asked the supervisor to explain how the department works. Most of the talking should have been done by the supervisor while Mr. Young listened and took notes.
The interview should have been scheduled ahead of time and the department supervisor should have had time to prepare for the interview.
22-16 .
Accounting Information Systems 15e, GE 22.7
The following lists specific project activities and their scheduled starting and completion dates. For simplicity sake, work from the assumption that all activities start on a Monday and end on a Friday. Activity
Starting Date
Ending Date
A B C D E F G H
3 June 10 June 24 June 1 Jul 1 Jul 15 Jul 22 Jul 8 Jul
14 Jun 28 Jun 5 Jul 5 Jul 19 Jul 2 Aug 26 Jul 2 Aug
a. Use a format similar to that of Figure 20-3 and prepare a Gantt chart for this project. b. Assume you review the project progress on 12 July. Activity progress are as follows: • Activities A, B, and D have been completed • Activity C is 50% completed • Activity E is 66% completed • Activity F is 30% completed • Activity G has not started yet • Activity H is 50% completed Record this information on your Gantt chart and then determine if the project is behind schedule, on schedule, or ahead of schedule. Explain. c. What are the advantages and the disadvantages of using a Gantt chart as a project planning tool? a.
22-17 .
Ch 22: Introduction to Systems Development; Systems Analysis b. Updated Gantt chart:
Based on the Gantt chart, where completed and partially completed tasks are indicated, one can see that Task C is definitely behind schedule, but Tasks F and G are ahead of schedule. The arrows added indicate the current date. Although there are two tasks that are ahead of schedule, there is a task that is behind schedule, which makes the project behind schedule.
c. At any point in time, it is possible to see at a glance which activities are on schedule and which activities are behind schedule. The main advantage of using a Gantt chart is the ability to see graphically what the status of the entire schedule is – this is true for small projects as well as large, complex projects. The major disadvantage is that the relationships between activities (for example, if one activity is dependent on another or needs to be completed before another can start) are not depicted.
22-18 .
Accounting Information Systems 15e, GE 22.8
Businesses often modify or replace their financial information system to keep pace with their growth and take advantage of improved IT. This requires a substantial time and resource commitment. When an organization changes its AIS, a systems analysis takes place. Adapted from the CMA exam a. Explain the purpose and reasons for surveying an organization’s existing system.
To gain an understanding of the existing system and how it functions.
To determine the constraints of the current system.
To assess the strengths and weaknesses of the existing system and to identify problems that need to be resolved.
To provide design ideas for the new system and to identify available resources.
To provide information about users’ information needs.
b. Explain the activities commonly performed during systems analysis. Initial Investigation
Verify the nature of the problem and the needs of the users.
Gather the information needed to evaluate the feasibility of the request.
Systems Survey
Study and review the existing organizational structure to determine how it functions.
Collect and review internal documents and reports to determine design, content, use, frequency of preparation, etc.
Develop and use questionnaire forms to determine processing frequencies, input/output volumes, and other information.
Conduct personal interviews to confirm and expand upon data gathered from the questionnaire.
Develop flowcharts, models, and diagrams to document the existing system.
Study external data sources, including companies who develop or who similar systems, consultants specializing in such systems, customers, industry trade associations, and government agencies.
Observe activities to determine how the system actually works, rather than what people or the documentation say should be done.
Feasibility Study
Conduct a study to determine whether to continue with the project.
Information Needs and System Requirements
Define and document the information needs of the users.
Define and document the requirements of the new system.
Systems Analysis Report
Summarize and document analysis activity findings.
22-19 .
Ch 22: Introduction to Systems Development; Systems Analysis c. Systems analysis is often performed by a project team composed of a systems analyst, a management accountant, and other knowledgeable and helpful people. What is the management accountant’s role in systems analysis? Most systems analysis work is performed by systems people. However, the management accountant is an important part of the development team and would be of assistance in providing information about various aspects of the system, including: Management’s needs for required reports and their format. System requirements. Source documents in use. The relevance, reliability, and timeliness of input/output data. The internal controls which exist and which should be incorporated into any new or redesigned system. 22.9
Managers at some companies face an ongoing systems development problem: IS departments develop systems that businesses cannot or will not use. At the heart of the problem is a gap that separates the world of business and the world of IS that many departments are unable or ready to cross. One reason for the crisis is that many companies are looking for ways to improve existing, out-of-date systems or to build new ones. Another is high user expectations that IS departments are not meeting. Users seek more powerful applications than are available on many older systems. The results can be devastating. An East Coast chemical company spent more than $1 million on a budgeting and control system that was never used. The systems department’s expertise was technical excellence, not budgets. As a result, the new system completely missed the mark when it came to meeting business needs. In another instance, a Midwestern bank used an expensive computer-aided software engineering (CASE) tool to develop a system that users ignored because there had been no design planning. A senior analyst for the bank said, “They built the system right; but unfortunately, they didn’t build the right system.” a. What causes this gap? The gap between the information needs of business managers and the information produced by IS department occurs because: Technology is advancing rapidly and many systems are outdated and do not produce the needed information in the manner needed by users. Better-educated users are demanding more powerful information systems and better results from information systems that aren’t performing. Poor communications among system designers, end users, and business managers results in the development of ineffective information systems. IS people who do not understand operations and the management of the business. b. What would you suggest to solve this problem?
A first step in effective systems design is a thorough business analysis to understand how a business operates and how its business functions relate. This helps systems 22-20 .
Accounting Information Systems 15e, GE professionals and business managers to communicate effectively when developing an integrated system.
Businesses could hire managers with a systems background so they can be a liaison between the systems department and the finance and accounting departments, helping business managers to communicate their needs clearly. These managers should be willing and able to get involved in the IS development process.
More involvement and interaction between the systems staff and end users. End users should take an active role in the development process. In particular, designers should work closely with end users to assess needs and to develop specific working solutions.
A more integrated approach to systems development involving all the necessary parties: designers, programmers, business managers, and end users.
Management should provide employees with the training needed to make the system work right.
In today’s environment many companies are moving their systems to the cloud and buying software rather than developing it. They are also making use of new developments such as artificial intelligence, data analytics, and blockchain
c. Discuss the role a systems designer, business manager, and end user can take to narrow this gap. Systems designers can involve end users and managers in the design and development process. This reduces the behavioral problems associated with a new system and improves the probability that the system will meet the desired business objectives. They should also make a concerted effort to understand the business processes of the company. Business managers can support the design team’s efforts to encourage end-user involvement in the development process. In addition, business managers can communicate regularly with systems developers to ensure that the system is meeting business objectives. The end user can help bridge the gap by taking a cooperative, interactive role in the development process. d. Who plays the most vital role in the effective development of the system? All players play important roles in the systems development process. This gap between the business and IS world is in large part the result of an overreliance upon the systems analyst to meet the needs of managers and end users without their cooperation and input. It is also a result of analysts not taking the time to understand the business processes at their company.
22-21 .
Ch 22: Introduction to Systems Development; Systems Analysis 22-10 Focus 22-1 described the IRS’s attempts to replace its aging information systems. Many other governmental agencies have similar problems. News reports indicate that the U.S. government is spending billions to keep antiquated computer systems running. Other reports describe how some governmental agencies still use floppy disks to store data. . Conduct a search (using written materials, the Internet, electronic databases, etc.) for information on how governmental agencies need to replace its aging legacy systems. Per your professor’s instructions, prepare an oral or written summary reporting your findings.
Students should find many articles describing the problem the federal government is having with old and outdated information systems. Here are a few of many examples: https://www.foxnews.com/politics/government-spending-billions-to-keep-antique-computersystems-running http://www.digitaljournal.com/technology/usa-government-spends-billions-each-year-on-archaiccomputers/article/466252 https://www.dailymail.co.uk/news/article-3608228/Govt-report-Feds-spend-billions-run-ancienttechnology.html
22.11
Select the correct answer for each of the following multiple-choice questions. (Correct answers are bolded.)
1. In which SDLC step does the company translate broad, user-oriented systems requirements into the detailed specifications used to create a fully developed system? a. physical design b. systems analysis c. conceptual design d. implementation and conversion e. operations and maintenance 2. Who in the organization is responsible for planning individual system development projects and monitoring the project to ensure timely and cost-effective completion? a. management b. project development team c. users d. information systems steering committee e. systems analysts 3. There are several different types of feasibility analysis. Which type of analysis seeks to answer the question: “Does the system comply with all applicable federal and state laws, administrative agency regulations, and contractual obligations?” a. legal feasibility b. economic feasibility c. technical feasibility d. scheduling feasibility e. operational feasibility
22-22 .
Accounting Information Systems 15e, GE 4. When a new or improved system is needed, which document describes the problem, explains the need for a change, lists the proposed system’s objectives, and explains its anticipated benefits and costs? a. request for initial investigation b. request for systems analysis c. request for systems development d. request for feasibility analysis 5. A systems survey is an extensive study of the current AIS that has a number of objectives. Which of the following is not one of those objectives? a. Gain an understanding of company operations, policies, and procedures. b. Make preliminary assessments of current and future processing needs. c. Develop working relationships with users and build support for the AIS. d. Develop a blueprint for detailed systems design that can be given to management. e. Collect data that identify user needs and conduct a feasibility analysis. 6. At the end of the systems analysis process, systems developers need to do all of the following except _________________________________. a. create and document detailed system requirements that explain exactly what the system will produce b. explain the requirements to users, obtain their approval, and have user management sign system requirements documents to indicate their approval c. prepare a detailed and technical document of all user requirements for top management d. prepare a systems analysis report to summarize and document all analysis activities 7. In which SDLC step do all the elements and activities of the system come together to form a completed operational system? a. systems analysis b. conceptual design c. physical design d. operations and maintenance e. implementation and conversion 8. Who in the organization is responsible for planning and overseeing the information systems function? a. management b. users c. project development team d. systems analysts e. information systems steering committee 9. There are several different types of feasibility analysis. The analysis that seeks to answer the question “Can the system be developed and implemented using existing technology?” is called ___________________ feasibility. a. economic b. legal c. scheduling d. technical e. operational
22-23 .
Ch 22: Introduction to Systems Development; Systems Analysis 10. With respect to an initial investigation, which of the following statements is false? a. A project’s scope is a description of what a development project should and should not accomplish. b. A new AIS is often the answer to organizational problems because it provides needed structures and processes. c. A new AIS is useful when the identified problem is a result of the lack of information or inefficient data processing. d. The initial investigation should determine a project’s viability and recommend it be initiated as proposed, modified, or abandoned. e. Approved projects should be assigned a priority and added to the organization’s master plan. 11. Which of the following statements is false? a. When data gathering is complete, the current system’s strengths and weaknesses are evaluated to generate ideas for how to design and structure the new system. b. Determining information needs is a relatively easy task because most employees can adequately explain their information needs. c. A feasibility analysis is updated regularly as a project proceeds and costs and benefits become clearer. d. When a project is deemed feasible, user needs are identified, and system requirements are documented. 12. Which approach to gathering data about an organization’s existing information system can help verify how a system operates? a. interviews b. questionnaires c. systems documentation d. observation 13. Which of the following strategies for determining system requirements is least likely to be successful? a. Ask management what information their employees need. b. Examine existing systems to find what is working well in the current system. c. Analyze external systems so you do not have to “reinvent the wheel.” d. Create a prototype so users can identify what they like and dislike about the system.
22.13
A PERT chart is a tool that is useful in project planning. a. Why would one use a PERT chart as opposed to a Gantt chart? PERT charts are often used before a project begins. The chart is then used to plan and determine the duration of each task – you also indicate the relationships between tasks, with a clear indication of any predecessors that need to be completed before certain tasks start. A PERT chart also contains a critical path. This path includes the activities that require the most time and if any activity on the critical path is delayed, the entire project will be delayed. b. What are the typical steps you would need to follow to complete a PERT chart? 1. Start by listing all the activities in the project. 22-24 .
Accounting Information Systems 15e, GE 2. Determine the sequence of the activities and also if there are any activities that are dependent on other activities – if a specific task needs to be completed before another can start, there is a dependency. 3. Create a node for each activity and add arrows to determine the sequence, and any dependencies. 4. Estimate the time required for each activity – then add the start time and completion time (dependent on the duration of the activity) to each node. 5. Determine the critical path.
c. What are the main advantages project managers can realize when using a PERT chart? It is possible to identify the critical path (this would be activities that take the longest to complete; and it would determine the shortest time in which the project can be completed)
It is possible to create a realistic schedule for completing the project. Activities that can be completed simultaneously (and ones that need to be completed before others can start) can be identified. Identify if there is any “slack” time where certain activities are not on the critical path, and thus not critical to the final deadline. Identify activities that might need to be compressed to ensure that the overall project can still meet the deadline.
d. Draw a PERT chart for the following activities:
22-25 .
Ch 22: Introduction to Systems Development; Systems Analysis
22-26 .
Accounting Information Systems 15e, GE 22.14
A company hired a consultancy firm to determine the feasibility of integrating their automated warehouse function into their enterprise resource planning system. The consultancy firm sent two junior consultants, Mpumelelo Ngwabe and Joyce Stanger, on a site visit to gather data from the users. The instruction the two junior consultants received was to interview and observe the actual users of the system and to report back what they have found. On their way over to the client, Mpumelelo and Joyce decided that Mpumelelo will interview available warehouse staff in their offices while Joyce will observe what happens on the warehouse floor. Mpumelelo managed to interview two staff members separately. The two interview experiences were like chalk and cheese: the first interview lasted more than two hours and Mpumelelo found the employee friendly and willing to talk about almost everything, including common interests that they shared. The other interview was a painful experience with a much older employee that lasted no more than ten minutes, with the employee being uncooperative. Joyce managed to observe some of the workers in the warehouse while they were performing their normal duties. However, after about 20 minutes of observation, one of the employees noticed Joyce and asked if she was lost or needed some help. Joyce briefly explained that she is here as part of a team to investigate the integration of the automated warehouse function into the enterprise resource planning system. When the employee returned to the warehouse floor, Joyce noticed that there was quite a lot of conversations taking place and, after a while, the behavior of the employees on the warehouse floor was slightly different from what she had initially observed. On their way back to the office, Mpumelelo and Joyce strategized as to how they would convey their findings to their manager when they meet with him in 45 minutes.
REQUIRED Describe any areas of concern you have that relates to the way in which Mpumelelo and Joyce gathered information and explain what should have been done differently.
It seems that the consultants were never briefed about what protocol to follow while gathering information. This caused the two consultants to quickly strategize on their way to the client about who was going to do what. This planning should have been done beforehand. Part of the planning for information gathering would be to make arrangements for interviewing employees – this involves studying existing documentation and making sure that you understand the current processes. Then you need to make a list of possible questions that would guide you during the interview process. It is crucial to make an appointment with an appropriate employee and to explain the purpose of the interview, and the time it will take to conduct the interview. The interviews seemed to have been unstructured conversations, with one interview lasting more than two hours (and seemingly discussing personal matters and interests) – on the other hand, the short interview with the uncooperative employee would probably also have been more successful if the employee had time to prepare and knew about the interview beforehand. The consultants arrived unannounced and simply took up time from employees that did not “budget” time for interviews within their daily schedules. Joyce’s observation could be problematic since it seems that the employees were not aware of the fact that a consultant would be observing them while they performed their normal day-to-day tasks. The first 20 minutes seemed to have enabled Joyce to observe the employees without being spotted, but as soon as she was spotted and she explained to an employee what she was doing, the employee informed the other employees, and their behavior changed. Joyce was unsure about the 22-27 .
Ch 22: Introduction to Systems Development; Systems Analysis
reason for the change – it might simply be because they were now aware of being observed, or it might be because of the purpose of her visit. Feedback to Mpumelelo and Joyce’s manager will in all likelihood be an oral report, seeing that they are meeting the manager within 45 minutes after their visit to the company. A written report should actually be prepared – and this report should contain information that was noted during the interviews and the observations. This would have meant that the consultants should have made notes while they were gathering information, and they should not rely on memory to recall what they had heard or observed.
22-28 .
Accounting Information Systems 15e, GE SUGGESTED ANSWERS TO THE CASES 22-1 Audio Visual Corporation (AVC) manufactures and sells visual display equipment. Headquartered in Boston, it has seven sales offices with nearby warehouses that carry its inventory of new equipment and replacement parts. AVC has a departmentalized manufacturing plant with assembly, maintenance, engineering, scheduling, and cost accounting departments as well as several component parts departments. When management decided to upgrade its AIS, they installed a mainframe at headquarters and local area networks at each sales office. The IS manager and four systems analysts were hired shortly before they integrated the new computer and the existing AIS. The other IS employees have been with the company for years. During its early years, AVC had a centralized decision-making organization. Top management formulated all plans and directed all operations. As the company expanded, decision making was decentralized, although data processing was highly centralized. Departments coordinated their plans with the corporate office but had the freedom to develop their own sales programs. However, information problems developed, and the IS department was asked to improve the company’s information processing system once the new equipment was installed. Before acquiring the new computer, the systems analysts studied the existing AIS, identified its weaknesses, and designed applications to solve them. In the 18 months since the new equipment was acquired, the following applications were redesigned or developed: payroll, production scheduling, financial statement preparation, customer billing, raw materials usage, and finished goods inventory. The departments affected by the changes were rarely consulted until the system was operational. Recently the president stated, “The systems people are doing a good job, and I have complete confidence in their work. I talk to them frequently, and they have encountered no difficulties in doing their work. We paid a lot of money for the new equipment, and the systems people certainly cost enough, but the new equipment and new IS staff should solve all our problems.” Two additional conversations regarding the new AIS took place. BILL TAYLOR, IS MANAGER AND JERRY ADAMS, PLANT MANAGER JERRY: Bill, you’re trying to run my plant for me. I’m the manager, and you keep interfering. I wish you would mind your own business. BILL: You’ve got a job to do, and so do I. As we analyzed the information needed for production scheduling and by top management, we saw where we could improve the workflow. Now that the system is operational, you can’t reroute work and change procedures, because that would destroy the value of the information we’re processing. And while I’m on that subject, we can’t trust the information we’re getting from production. The documents we receive from production contain a lot of errors. JERRY: I’m responsible for the efficient operation of production. I’m the best judge of production efficiency. The system you installed reduced my workforce and increased the workload of the remaining employees, but it hasn’t improved anything. In fact, it might explain the high error rate in the documents. BILL: This new computer cost a lot of money, and I’m trying to make sure the company gets its money’s worth. JERRY ADAMS, PLANT MANAGER AND TERRY WILLIAMS, HUMAN RESOURCES MANAGER
22-29 .
Ch 22: Introduction to Systems Development; Systems Analysis JERRY: My best production assistant, the one I’m grooming to be a supervisor, told me he was thinking of quitting. When I asked why, he said he didn’t enjoy the work anymore. He’s not the only one who is unhappy. The supervisors and department heads no longer have a voice in establishing production schedules. This new computer system took away the contribution we made to company planning and direction. We’re going back to when top management made all the decisions. I have more production problems now than I ever had. It boils down to my management team’s lack of interest. I know the problem is in my area, but I thought you could help me. TERRY: I have no recommendations, but I’ve had similar complaints from purchasing and shipping. We should explore your concerns during tomorrow’s plant management meeting. Adapted from the CMA Examination Evaluate the preceding information, and answer the following questions: 1.
Identify the problems the new computer system created and discuss what caused them. The problems stem from a total lack of communication at AVC. The failure to communicate has existed for years and exists between all levels of management. Top management did not adequately plan for the IS upgrade and did not involve non-IS employees in the process. In addition, through lack of direction or control, top management has allowed the IS group to change not only information systems but also operating systems and procedures without operating management approval. Further, there appears to be a lack of concern by IS over the problems the new systems have created for operating management. A new computer system was purchased and a new IS team was hired; however, top management failed to win the confidence of current operating management who are accustomed to a more decentralized approach. Communication problems continued during the systems design phase. The IS group failed to involve operating management in systems changes and apparently operating management failed to communicate their interest in being involved. As managers in a decentralized atmosphere they could have forced IS to communicate but they chose to ignore the problem. Therefore, the failure to communicate properly can be traced to both the IS and user groups. This problem was worsened by top management not adequately planning the conversion process and their failure to perceive the potential problems between IS and operating management. The new systems are now complete. Operating management realizes that there has been a centralization of decision-making and a loss of operating flexibility resulting in employee morale problems. Yet, they are still unable or unwilling to communicate with top management, who continue to be unaware of operating problems with the new IS system.
2.
How could AVC have avoided the problems? How can they prevent them in the future? The problems could have been avoided by top management doing a better job of planning and communication, holding meetings between the IS staff and user groups throughout the systems design and implementation process, and by top management soliciting input from both user groups and IS staff in order to more closely monitor the project’s progress. To avoid future problems, AVC management needs to review organizational relationships to ensure proper organization and to insist on better cooperation and communication. In addition, top management should evaluate management personnel to determine if interpersonal problems are a roadblock to good internal communication.
22-30 .
CHAPTER 23 AIS DEVELOPMENT STRATEGIES SUGGESTED ANSWERS TO DISCUSSION QUESTIONS 23.1 What is the accountant’s role in the computer acquisition process? Should the accountant play an active role, or should all the work be left to computer experts? In what aspects of computer acquisition might an accountant provide a useful contribution? The accountant is likely to be: A major user of the computer output Responsible for internal controls over data processing in the organization An expert in cost estimation and analysis A designer of many of the systems that the computer is intended to supplant. With these responsibilities, the accountant must be actively involved in the computer acquisition process. The accountant’s role is probably best carried out by participating on a team or committee together with computer experts, systems analysts, production personnel, engineers, managers, and others whose functions are closely related to the information systems activity.
23-1 .
Ch. 23: AIS Development Strategies 23.2 In a Midwest city of 45,000, a computer was purchased and in-house programmers began developing programs. Four years later, only one incomplete and poorly functioning application had been developed, none of software met users’ minimum requirements, and the hardware and the software frequently failed. Why do you think the city was unable to produce quality, workable software? Would the city have been better off purchasing commercial software? Could the city have found commercial software that met its needs? Why or why not? Certainly not all instances of use or failure to use commercial software are as dramatic or as clearcut as this. Nor in all cases will commercial software meet the functional requirements at a reasonable cost in an acceptable time frame. A careful evaluation of commercial software, however, can result in a system that performs admirably and cost effectively for data processing users. a.
Some possible reasons why the city was unable to produce a quality, workable system are:
b.
Poor management. Inexperienced systems analysts and programmers. Inadequate needs analysis and requirements definition. Management does not understand development well enough to direct and manage it. Failure of users and development personnel to communicate. Failure to establish checkpoints for monitoring the project. Lack of continuity among the people working on the system. Failure to plan the development project adequately.
The city would have been better off purchasing commercial software for the following reasons:
c.
They could have saved themselves a great deal of money. They could have implemented the system much faster. They would not have needed as many in-house programmers. They could have avoided a lot of hassles, headaches, etc. They could have “test-driven” the program to know exactly what they were getting. They could also have talked to other users to measure satisfaction with the software. Commercial software is much more likely to be bug free. The commercial software developer can keep the software up-to-date easier and less expensively. They probably would have gotten a much better system. There are certainly enough cities, and hence a large enough market, for there to be quality commercial software available. A city of 45,000 shouldn’t have an overly complex system, such that none of the available commercial software would have been acceptable. The commercial might not have been able to meet all the city’s detailed needs and desires, but commercial software that came close to their needs certainly could have been found without all the problems mentioned above.
An adequate turnkey system was available, and it would have saved the city nearly $500,000. In fact, the city’s annual data processing costs exceeded the annual costs of the new turnkey system.
23-2 .
Accounting Information Systems 15e, GE 23.3 You are a systems consultant for Ernst, Price, and Deloitte, CPAs. At your country club’s annual golf tournament, Frank Fender, an automobile dealer, describes a proposal from Turnkey Systems and asks for your opinion. The commercial software system will handle inventories, receivables, payroll, accounts payable, and general ledger accounting. Turnkey personnel would install the $40,000 system and train Fender’s employees. Identify the major themes you would touch on in responding to Fender. Identify the advantages and disadvantages of using a turnkey system with commercial software for the organization’s accounting system. Major themes that should be touched upon in responding to Fender’s inquiry include:
The need for a feasibility study to determine whether a new system is technically, economically, and operationally feasible for Fender’s dealership. The need to identify the dealership’s needs and prepare specifications based on those needs. The importance of requesting proposals from competing vendors and systematically comparing them. The possibility of using EDP consultants to help and of outsourcing the system. If students only suggest they obtain more information on this vendor and its hardware and software, then they are missing the point of the case. It is important to take a more general and systematic approach to the system acquisition decision, rather than making a “yes-no” decision on only this one system. Advantages of a turnkey system
Less expensive than internally built systems and the commercial software may be better priced. Takes less time and human resources to develop and run. Experts are available for both the commercial software and hardware. One-source support for the entire system. The vendor cannot pass the responsibility for a problem off on someone else. A single vendor may also facilitate system start-up and conversion as well as training on how to use the system. Warranties are usually available. Simplified selection process Costs are reduced since it is not necessary to match software with hardware meaning that it is less likely that various items of hardware and software will be incompatible.
Disadvantages of a turnkey system:
Software or hardware may not be completely suited to company’s needs. Software modification may not be available or covered. Increased vulnerability to continuity of the vendor’s business. Lack of control over design.
23-3 .
Ch. 23: AIS Development Strategies 23.4 Sara Jones owns a rapidly growing retail store that faces stiff competition due to poor customer service, late and error-prone billing, and inefficient inventory control. To continue its growth, its AIS must be upgraded but Sara is not sure what it wants the AIS to accomplish. Sara has heard about prototyping but does not know what it is or whether it would help. How would you explain prototyping to Sara? Include an explanation of its advantages and disadvantages as well as when its use is appropriate. Prototyping is an approach to systems design in which a simplified working model of a system is developed that is, a scaled-down, experimental version of the system requested by the users. The first step is to identify the basic requirements of the system. The emphasis is on what output should be produced rather than how it should be produced. A “first draft” model is quickly (days or weeks) and inexpensively built and given to users so they can experiment with it. This allows users to determine what they want the system to accomplish and what they like and don’t like about it. Based upon their reactions and feedback, the developers modify the system and again present it to the users. This iterative process of trial usage and modification continues until the users are satisfied that the system adequately meets their needs. The last step is making the system operational. The two choices are to use the already developed prototype or to use the prototype as a model for developing a new system. Some of the advantages of prototyping include:
Better definition of user needs
Higher user involvement and satisfaction Faster development time
Fewer errors in the implemented system More opportunity to make changes
Less costly than other development alternatives
Some of the disadvantages of prototyping include:
Requires a significant amount of users’ time
Less efficient use of system resources Incomplete systems development
Inadequately tested and documented systems
Cost of learning the different versions of the software Never-ending development
Prototyping is appropriate when
there is a high level of uncertainty about what is needed it is unclear what questions to ask
the final system cannot be clearly visualized because the decision process is still unclear Speed is an issue
The system must meet just one or two major critical needs There is a high likelihood of failure.
23-4 .
Accounting Information Systems 15e, GE 23.5 Clint Grace has been business more than 30 years and has definite ideas about how his ten retail stores should be run. He is financially conservative and is reluctant to make expenditures that do not have a clear financial payoff. Store profitability has declined sharply, and customer dissatisfaction is high. Store managers never know how much inventory is on hand and when purchases are needed until a shelf is empty. Clint asks you to determine why profitability has declined and to recommend a solution. You determine that the current AIS is inefficient and unreliable and that company processes and procedures are out of date. You believe the solution is to redesign the systems and business processes using BPM. What are some challenges you might face in redesigning the system? How will you present your recommendations to Clint? Business process management (BPM) is a systematic approach to continuously improving and optimizing an organization’s business processes. Grace may be resistant to BPM and its attendant changes and new technology because:
Tradition: Grace has been at the business for 30 years and the old way of doing things has been a part of his life. Changing a lifestyle is very difficult. Resistance: It is human nature to resist radical change and step out of one’s “comfort zone.” Grace may be so set in his ways that resistance seems inevitable. Time requirements: BPM is not a “quick-fix.” Redesigning business processes at a chain of regional stores is likely to a lengthy process. Cost: Resistance is likely because Grace’s financially conservative attitude may not mesh with a costly business process redesign. Lack of management support: Grace has been calling the shots for many years. It may be difficult for him to give full support to the project even if the need for redesign is obvious. Retraining: After the BPM project is completed, Grace will be faced with the cost of retraining his employees. Retraining is also costly and time consuming.
Student answers as to how to present the recommendations to Clint Grace will vary depending on the perception of the student. However, some general guidelines are:
Recognize that it may be hard to convince Grace. Therefore, you must plan your strategy well. You must be able to sell Grace on the benefits of BPM for his ten stores. Be aware of potential problems and seek to avoid them. Be sensitive to the feelings and reactions of persons affected by the change. Inform Mr. Grace that the reason for BPM is not to come in and without feeling destroy people’s jobs. Having Grace very involved in the project will help him feel like the ideas that are instituted are his ideas also. Participation is ego enhancing, challenging, and intrinsically satisfying, and it builds self-esteem and security. You must provide honest feedback to Grace on all suggestions. Tell him which of his and his employee’s suggestions are being used and how they are being implemented, which suggestions are not being used and why, and which suggestions will be incorporated at a later date and why they are not being incorporated now. Show how Grace’s competitors are using newer business processes to gain a competitive advantage over his department stores. Remember that it is better to take things slow, than to have Grace reject BPM. It is usually better to spend the extra time and money to ensure that a system is well accepted and well designed.
23-5 .
Ch. 23: AIS Development Strategies
SUGGESTED ANSWERS TO THE PROBLEMS 23.1
Match the terms with their definitions:
1. __P_ scrum master
a. Software and hardware sold as a package; the user can begin using the system after the vendor installs it 2. __A_ turnkey system b. Company that rents cloud-based software applications that customers can access via the Internet 3. __U_ executable c. Document that asks vendors to bid on a system to meet specified architecture baseline needs 4. __L_ scrum d. Comparing systems by executing input, processing, and output development tasks on different computer systems and evaluating the results 5. __J_ nonoperational e. Evaluating the overall merits of vendor proposals by assigning a prototypes weight to each evaluation criterion based on its importance 6. __S_ integration f. Hands-on development, use, and control of computer-based tests information systems by users 7. __T_ unified process g. Hiring an outside company to handle an organization’s data processing activities 8. __E__ point scoring h. Systematic approach to gradually and continuously improving business processes 9. __I__ prototyping i. Systems design approach where a simplified working model of an AIS is developed 10. _N_ user stories j. Prototype is discarded, but the system requirements identified are used to develop a new system 11. _B_ Software-as-a- k. Philosophy and principles for IS development in an unknown, Service rapidly changing environment 12. _R__ unit tests l. Development focus is flexibility, responding to new requirements, adapting to changes, and quickly delivering a system to evaluate 13. _W__ business m. Customer is responsible for making sure the scrum team process reengineering produces what is needed 14. _M__ product n. Description of what a product owner wants to include in the owner system 15. _H_ business o. Pre-determined time period where the team works on high process management priority items in the product backlog 16. _O__ sprint p. Person who makes sure scrum practices are followed, holds daily team meetings, and works with product owners 17. _Y__ scrum q. Produces higher quality software by taking best software methodology development practices to very high levels 18. __G__ outsourcing r. Helps determine whether a given feature works as intended. 19. _D__ benchmark s. Checks for incompatible interfaces between code segments problem 20. _Q__ extreme t. Development framework with four phases: inception, elaboration, programming construction, and transition 21. _K__ agile u. Partial system implementation that includes all significant development architecture components 23-6 .
Accounting Information Systems 15e, GE
22. _C__ request for proposal
v. Integrated package of tools that skilled designers use to plan, analyze, design, program, and maintain an IS w. Thorough analysis and redesign of business processes and systems to achieve dramatic improvements; often a drastic, onetime-event x. Prototypes that are further developed into fully functional systems y. Development methodology where teams work in intense, short, iterative, incremental process to reach a common development goal z. Items waiting to be developed; prioritized by the product owner
21
23-7 .
Ch. 23: AIS Development Strategies 23.2
This chapter describes several different agile methodologies for system development. Select one of the methodologies and conduct a search (using written materials, the Internet, electronic databases, etc.) for one or more companies that have successfully used that methodology to develop an information s ystem. Per your professor’s instructions, prepare an oral or written summary of the successful implementation. Include in your summary the nature of the system, the approach used to develop the system, and a description of what it does and how it has helped the company that developed it. Student answers will vary depending upon what they find.
23.3
Search written materials, the Internet, and electronic databases for successful and failed information systems implementations. Prepare an oral or written summary of a successful and a failed implementation. Include the approach used to acquire or develop the system. Student answers will vary depending upon what they find.
23-8 .
Accounting Information Systems 15e, GE 23.4 Mark Mitton, the liaison to the IS department, has eliminated all but the best three systems. Mark developed a list of required features, carefully reviewed each system, talked to other users, and interviewed appropriate systems representatives. Mark used a point-scoring system to assign weights to each requirement. Mark developed Table 23-4 to help him select the best system. a.
Use a spreadsheet to develop a point-scoring matrix and determine which system Mark should select. Based on the point-scoring evaluation, project number one should be selected. Project #1 scored 6645 points, project #2 scored 6370 points, and project #3 scored 6530 points.
23-9 .
Ch. 23: AIS Development Strategies b.
Susan Shelton did not agree with Mark’s weightings and suggested the following changes: Flexibility Reputation and reliability Quality of support utilities Graphics capability
60 50 10 10
When the changes are made, which vendor should Mark recommend? Based on Susan’s changes, Mark should now select project #3. Project #1 scored 6285 points, project #2 scored 6330 points, and project #3 scored 6610 points.
23-10 .
Accounting Information Systems 15e, GE c.
Mark’s manager suggested the following changes to Susan’s weightings: Reputation and reliability Installation assistance Experience with similar systems Training assistance Internal memory size
90 40 40 65 10
Will the manager’s changes affect the decision about which system to buy? Based on further revisions by his manager, Mark should now select project #2. Project 1 scored 6055 points, project #2 scored 6550 points, and project #3 scored 6490 points.
23-11 .
Ch. 23: AIS Development Strategies d.
What can you conclude about point scoring from the changes made by Susan and Mark’s manager? Develop your own weighting scale to evaluate the commercial software. What other selection criteria would you use? Be prepared to discuss your results with the class. The most significant conclusion is that the results of the point-scoring methods are highly subjective. Slight variations in the weightings or in the points assessed can alter the results dramatically. A point-scoring matrix is a useful tool but the results are not always conclusive.
e.
What are the weaknesses of the point-scoring method? Care must be taken when to avoid placing too much emphasis on a point-scoring outcome. This approach does not recognize that the factors being evaluated may interact in ways that are not taken into account. Nor does it evaluate the effects of a particular weakness on other factors or assess compensating strengths. In addition, since both the weights and the points are assigned subjectively, the margin for error is sizable. Students should recognize that the best conclusion may be tentative at best and that Mark should conduct additional research to determine the most effective system to meet his business’s needs.
23-12 .
Accounting Information Systems 15e, GE 23.5 Nielsen Marketing Research (NMR), with operations in 29 countries, produces and disseminates marketing information. Nielsen has been the primary supplier of decision support information for more than 70 years. NMR’s most recognizable product is the Nielsen television ratings. Nielsen is one of the largest users of computer capacity in the UnitedStates. Its information system consistently ranks above average in efficiency for its industry. NMR hired IBM to evaluate outsourcing its information processing. NMR wanted to know whether outsourcing would allow it to concentrate on giving its customers value -added services and insights, increase its flexibility, promote rapid growth, and provide it with more real-time information. What are the benefits and risks of outsourcing for NMR? THE BENEFITS OF OUTSOURCING:
IT is changing so rapidly that companies spend a lot of their information system money on new technology. Outsourcing is a way to alleviate this cash drain. NMR could use the cash savings to provide a better product to its customers.
It is difficult to find well-trained people to maintain and develop these complex information systems. It is also very costly to have an in-house group of information systems experts. NMR may be concerned about the cost of maintaining an in-house information systems staff and their ability to remain current in the ever-changing technological environment.
When a company improves its information system or introduces new technology, the employees who operate and manage the system (and sometimes the users) must be retrained. Outsourcing would eliminate much of the time and costs required for training.
Outsourcing may make it easier for Nielsen to concentrate on the things it does best (its “core competencies”) and leave the data processing business to computer companies who are more qualified. Companies who adopt outsourcing for this reason believe that their information systems are essential, but not that it is essential for them to operate the systems.
Outsourcers offer special expertise for anything from assisting with development and design to handling the complete design and installation of a new system. This could help NMR’s information processing stay abreast of the most up-to-date changes in systems technology.
Outsourcing can help solve cost pressures and economic difficulties that force companies to consider head-count reductions, cutbacks on employee training, data center consolidations, budget and resource cutbacks, and other costs.
Companies can benefit from the economies of scale the outsourcers achieve from standardizing users’ applications, buying hardware at bulk prices, splitting development and maintenance costs between projects, and operating at higher volumes.
Outsourcing development projects can help a company benefit from the skills of trained industry specialists who have installed hundreds of systems.
When companies downsize they can be left with an information system that is too large for their needs. Outsourcing can help solve this problem.
Outsourcing can help decrease the fixed costs associated with seasonal businesses that require heavy computer usage for part of the year and very light usage the rest of the year.
23-13 .
Ch. 23: AIS Development Strategies AMONG THE RISKS OF OUTSOURCING ARE THE FOLLOWING:
A major risk is entering an inflexible agreement that does not provide the company an “out” for future unanticipated circumstances.
Another risk is losing too much control over your information system by outsourcing. NMR will want to make sure that it works closely with the outsourcer to oversee the development and operation of the information system.
It is possible to lose a fundamental understanding of information system needs and how the system can provide competitive advantages. If NMR decides to outsource it will be very important to maintain a close partnership with the outsourcer, helping NMR stay current and apprised of information system needs and strategies. NMR could lose its reputation and ability to provide a quality product if this risk is not completely controlled.
Once a company decides to outsource, the company is usually locked into outsourcing. If NMR decides to abandon outsourcing and begin processing its own data again they may have to buy or rent new buildings and equipment along with hiring a new data processing staff. The costs and effort involved in doing this are considerable.
NMR may not realize all of the projected outsourcing benefits. Critics contend that in many cases the goals of outsourcing never come to pass.
NMR may not receive the quality of service they desire. Some companies complain that outsource providers are slow to adopt new technologies and are slow to respond to changing business conditions.
Do the benefits outweigh the risks? Explain your answer. Without knowing the results of the evaluation that NMR commissioned, there is no “right” answer as to whether the benefits would outweigh the risks. Even when the results are known, there may not be a “right” answer. The purpose of the question is to get the students to pick a side of the debate and support it. Class discussion should bring out the pros and cons of outsourcing.
23-14 .
Accounting Information Systems 15e, GE 23.6 A large organization had 18 months to replace its old customer information system with a new one that could differentiate among customer levels and provide appropriate products and services on demand. The new system, which cost $1 million and was installed by the IS staff on time, did not work properly. Complex transactions were error-prone, some transactions were canceled, and others were put on hold, and the system could not differentiate among customers. The system was finally shut down, and transactions were processed manually. New IS management was hired to build a new system and mend the strained relationship between operations and IS. So what went wrong? IS couldn’t—or wouldn’t—say no to all the requests for systems enhancements. Eager to please top management, IS management ignored the facts and assured them they could build a scalable system that was on time and on budget. Another big mistake was a strict project schedule with little flexibility to deal with problems and unforeseen challenges. Developers never spoke up about any glitches they encountered along the way. More than a dozen people (including the CIO) lost their jobs because of their roles in this disaster. a.
What could IS management have done differently to make this project successful?
Obtained a better understanding of user requirements and what the system needed to accomplish, in particular the complex transactions that were problematic. They needed to develop a complete set of specifications before proceeding with the development Negotiated more time to complete the project. Managed the project better. Project phases were not used and approved before the next phase began.
Tested the system more extensively before it went operational
Provided monthly progress reports to management Informed top management of unforeseen problems and challenges that caused delays or put the project significantly behind schedule.
Been more open with management in communicating costs and potential problems. Frozen requirements at an appropriate time so that continual changes weren’t made so that development could proceed unhindered by new requests.
In summary, the problems were caused by poor planning, poor problem definition, inadequate system specifications, poor project management, poor control over requested system changes, and poor communication. b.
c.
What in-house development issues are demonstrated in this case?
Custom software development is difficult, time consuming, and error prone.
Time schedules can be tight and projects are often not finished on time.
Requirements and systems planning are often lacking.
There can be inadequate communication and cooperation between users and developers. How could the in-house issues have been addressed to prevent the system’s failure?
It should have been made clear to management that in-house development is difficult, time consuming, and error prone. This could have been facilitated by citing examples of in-house development projects, preferably from within their own industry, so that management could have gotten a clearer picture of the risks and benefits of in-house development. 23-15 .
Ch. 23: AIS Development Strategies
d.
A carefully thought-out and documented project plan should have been prepared. A backup plan with worst-case scenarios and project completion times should have been prepared. Key personnel should have been designated as liaisons between management and the project team so that credible and timely information could have been communicated back and forth.
Can we conclude from this case that organizations should not have custom software written for them? Explain your answer. No, we cannot generalize that companies should not have custom software developed for them. If the company had followed good systems design and project management procedures, had clear and concise system requirements, and been managed properly problems with the development should have been minor and more easily resolvable. In the end, the company scrapped the software and hired two vendors to help them with the project. One vendor designed and built the system and the other vendor supervised the work of the first vendor.
23-16 .
Accounting Information Systems 15e, GE 23.7 Meredith Corporation publishes books and magazines, owns and operates television stations, and has a real estate marketing and franchising service. Meredith has 11 different systems that do not communicate with each other. Management wants an executive information system that provides them with the correct and timely information they need to make good business decisions. Meredith has decided to use prototyping to develop the system. a.
b.
Identify three questions you would ask Meredith personnel to determine systems requirements. What information are you attempting to elicit from each question?
What is Meredith’s background and what are its goals and objectives? It is difficult to help a company without knowing where it is coming from and where it hopes to go.
What is the nature of the problem and what are its causes? Oftentimes company employees have a good idea as to the cause of the company’s problems and have good suggestions for resolving them.
What is the timetable for the project? How soon is the system needed? If the company must have a solution in a short amount of time, prototyping should be considered. The answer may also affect the decision as to whether the prototype should be operational or nonoperational.
What processes are involved? Identifying the business processes will allow the consultant to identify the basic system requirements.
What does Meredith expect from their new executive information system? What information does Meredith need to make effective decisions? When developing an information system, the question of what information is needed is more important than how the information should be processed.
What input data does Meredith need to capture and process in order to produce the desired information? Where does the data originate and how does it enter the system? How and where is it stored?
Explain how prototyping works. What would the system developer do during the iterative process step? Why would you want the fewest iterations possible? 1. At Meredith, the prototype process would begin by interviewing personnel in order to identify system requirements for the prototype. The focus should be on what output should be produced and not how the output should be produced. Some of the questions to ask Meredith personnel are shown in the answer to part a. 2. After identifying system requirements, an initial prototype would be developed that meets the agreed-upon requirements. The goal would be to develop the prototype quickly and turn it over to the users. 3. The users experiment with the prototype and determine what is good and what is bad about it. Their feedback is used to modify the prototype. Within reason, there should be as many iterations as needed to capture accurately user requirements. The more efficiently this can be done; that is, the fewer iterations needed, the less the system will cost, the faster it can be developed and implemented, and the happier the company and the users will be. 4. When the prototype is completed, it is either made operational or used as the specifications for developing a more functional system. Prototyping tools are efficient, easy to use, and can create files, screens, reports, and program code much faster and with much less effort than conventional programming languages.
23-17 .
Ch. 23: AIS Development Strategies c.
Would you want the prototype to be operational or nonoperational? Why? If it were an operational prototype, what would have to happen? If it were a nonoperational prototype, how would the prototype be used? The answer to these questions will vary depending on the student’s view of the situation. Some of the points the student should bring up are: Operational Prototype. Because Meredith needs the system so quickly, an operational prototype would be advantageous. To make the prototype operational, the developer must make any changes in the system that are required to incorporate needed controls, improve operational efficiency, provide backup and recovery, and to integrate the prototype with the systems with which it interfaces. Changes must also be made, if necessary, so that the system will accept real input, access real data files, process data, make the necessary computations and calculations, and produce real output. Nonoperational Prototype. In many instances, it is not practical to modify the prototype to make it a fully functional system. The process of making a prototype operational may take as long as recreating the system in a basic programming language and may not be as efficient. In such cases, the prototype is discarded and the system requirements identified during the prototyping process are used to develop a new system. The systems development life cycle is followed to develop the system, with the prototype as the model for development.
d.
Suppose the company decides the prototype system is not practical, abandons it, and takes some other approach to solving its information problem. Does that mean prototyping is not a valid systems development approach? Explain your answer. Just because the prototype system is not used does not mean prototyping is not a useful development technique. On the contrary, prototyping has saved the company thousands of dollars and a great deal of time by finding out quickly that the system is not functional. That is much more cost effective than going through the much more costly traditional SDLC process.
23-18 .
Accounting Information Systems 15e, GE 23.8 Norcom, a division of a large manufacturer, needed a new distribution and customer service system. The project was estimated to take 18 months and cost $5 million. The project team consisted of 20 business and IT staff members. After two years, the CIO was fired, and the company hired a CIO with expertise in saving troubled projects. The new CIO said three grave errors were committed. 1. IT picked the wrong software using a very naïve request for proposal process. 2. IT did not formulate a project plan. 3. No one “owned” the project. The IT staff assumed the users owned the project, the users believed the IT staff owned it, and management believed the vendor owned it. The CIO developed a 2,000-line plan to rescue the project. Three months later, the system failed, even with IT staff and consultants working on it day and night. The failed system was to have been the company’s preeminent system, but it could not even process customer orders correctly, resulting in complaints about late shipments and receiving the wrong goods. After three years and $4 million, the new CIO polled the staff anonymously. Only two said the project could be saved, and they had staked their careers on the project. The message that the project was not worth saving was very hard for the CIO to give. It was likewise hard for the division president to receive it; he could not accept the idea of killing a project that cost so much money. He finally accepted the decision and all the ramifications involved, including corporate IT taking control of all IT operations at his division. a.
b.
c.
List the primary components of an RFP.
Detailed system specifications, with a clear distinction between mandatory and desired requirements.
Applications required and desired.
Inputs and outputs required and desired
Files and databases required and desired
Frequency and methods of file updating and inquiry.
Unique characteristics or requirements.
Identify possible components or deficiencies in Norcom’s RFP that could have led the new CIO to claim that it was naïve or insufficient.
The RFP lacked the software specifications needed to prepare a good RFP response.
Norcom did not have a project plan, which should have guided the RFP development. The formulation of a good RFP would have required the creation of a project plan.
Identify possible approaches Norcom could have used to evaluate RFP responses.
Norcom could have requested help with the RFP process and the necessary documents from someone with extensive RFP experience, such as a systems consultant.
Norcom could have brought in a more effective and experienced CIO earlier.
Norcom management could have created clear lines of authority and ownership of the project.
23-19 .
Ch. 23: AIS Development Strategies 23.9 Quickfix is rapidly losing business, and management wants to redesign its computer repair processes and procedures to decrease costs and increase customer service. Currently, a customer needing help calls one of five regional service centers. A customer service representative records the relevant customer information, finds the closest qualified technician, and calls the technician’s cell phone to see whether the repair fits into his or her schedule. If not, the representative finds the next closest technician. When a technician is located, customer repair information is texted or emailed to the technician. The technician calls the customer and arranges to pick up the computer and replace it with a loaner. Making these arrangements takes one to two days and sometimes more if technicians are not available or do not promptly return calls. If a broken computer cannot be quickly repaired, it is sent to a repair depot. These repairs take another four to seven days. If problems arise, it can take up to two weeks for an item to be repaired. When a customer calls to see whether the computer is ready, the service representative calls the technician to find out the status and calls the customer back. The repair process usually takes five phone calls between the customer, the service representative, and the technician. There are several problems with this process that have led to a significant drop in business: (1) it is time-consuming; (2) it is inconvenient for a custome r to have a computer removed, a new one installed, and then the old one reinstalled; and (3) service representatives do not have immediate access to information about items being repaired. Quickfix decides to use BPM principles to redesign its business processes. a.
Identify the repair processes that occur and decide which should be redesigned. 1. Customer calls Quickfix requesting service. 2. Customer service representatives record customer information and repair needs. 3. Technicians are scheduled to make the repair. 4. Computer is repaired. All four processes should be redesigned
b.
Describe how the repair process can be redesigned to solve the three problems identified. Design a new information system with the following features.
A single, centralized database that stores all the data about customers, technicians, and the items being serviced.
Software is available that automates the customer service process. The principles in the chapter about buying software should be followed to select the system that best meets Quickfix’s needs
The hardware needed to run the software and access the database mentioned above.
Quickfix could minimize its hardware and building costs and maximize efficiency by creating one centralized customer service center instead of the five regional centers.
Alternatively, it could opt for keeping two to five service centers, each with its own equipment. With multiple sites, each could serve as backups to the other sites. Service centers closer to the customers might provide better customer service.
23-20 .
Accounting Information Systems 15e, GE The repair process could be redesigned in many different ways. Some ideas are:
In addition to phone requests for service, Quickfix could design their new system to accept requests via fax, emails, texts, entries on the customer service section of its web site, etc.
When a repair request is received, a customer service representative enters the necessary data into a customer order maintained in the information system. The design should minimize the amount of data the service representative enters, while still giving customers the flexibility of notifying Quickfix in the way that is most convenient to them.
The system uses the customer’s address to search the list of authorized technicians maintained in the company’s database. The system produces a list of the four closest technicians and their schedule for the next week. The system lists the technicians in order of priority, based on location and availability. The customer service representative selects one of the technicians to perform the repair service and the system sends them an electronic notification and an electronic copy of the customer order.
If the technician is unable to perform the work on a timely basis, he responds electronically and another technician is scheduled.
To repair computers faster, technicians could use specially equipped trucks equipped with the necessary spare parts. This would allow them to do most repairs at the customer’s business instead of sending the computer to a repair center.
Each repair truck could be equipped with a global positioning systems (GPS) technology that helps the technician locate the customer.
The GPS could also be used to facilitate emergency orders. The system could locate the technician closest to the customer with the emergency and dispatching her to handle the emergency as soon as she is available.
Technicians carry notebook computers with built-in radio frequency and cellular phone technology modems that give them a direct, high-speed access to the company’s information systems via the internet. Using these modems, the technicians can communicate with the central office from almost anywhere using a virtual private network (VPN) ensuring a secure transmission of data.
Each morning the technicians logon to the Customer Service Center and retrieve their schedule for the day. Their schedule is organized and prepared by the computer at the Customer Service Center to minimize travel time. As each repair job is completed, the technicians enter the data on the customer order and send it into the Customer Service Center over the VPN.
If the computer cannot be repaired at the customer’s site by the technician, the customer service representative enters this into the system and picks up the computer. The technician arranges for the repair center to pick up the broken computer and deliver a loaner computer. The repair locations are also connected to the centralized system and as computers are scheduled for repairs based on estimated arrival time. As the repairs are made, the technicians update the customer order.
Since repair time will be greatly decreased, there will be many fewer phone calls asking about the status of the repair. For those who do call, the centralized information system provides the customer service representative with much more information. She can tell the customer when the repair is scheduled, who will do it, and how to get hold of him including his cell phone number and email address. If the computer has been sent away for repair, the representative can tell the customer when it is scheduled for repair and when it will be returned.
23-21 .
Ch. 23: AIS Development Strategies In a world with no costs, Quickfix would do all of the above. However, we live in a world where we must always weigh costs versus benefits and only implement the things the above items that make financial sense. c. What benefits can be achieved by redesigning the repair process?
Increased customer service and satisfaction because most computers are repaired immediately at the customer’s business. This should also save money because the amount of time it takes to repair computers is reduced
A significant improvement in communication speed due to the centralized system and the use of the latest advancements in technology. Customer service representatives will know the exact status of any customer repair order.
Reduced costs from closing regional centers, service representatives having to do less data entry and significantly less scheduling work, lower shipping and handling costs, and handling few calls.
Increased revenues from technicians being able make more service calls in any given day and the ability to handle higher margin emergency calls,
23-22 .
Accounting Information Systems 15e, GE SUGGESTED ANSWERS TO THE CASES 23-1 Wong Engineering Corp (WEC) operates in 25 states and three countries. WEC faced a crucial decision: choosing network software that would maximize functionality, manageability, and end-user acceptance of the system. WEC developed and followed a fourstep approach: Step 1. Develop evaluation criteria. WEC organized a committee that interviewed users and developed the following evaluation criteria: Ease of use Scope of vendor support Ease of network management and administration Cost, speed, and performance Ability to access other computing platforms Security and control Fault tolerance and recovery abilities Ability to connect workstations to the network Global naming services Upgrade and enhancement options Vendor stability WEC organized the criteria into the following four categories and prioritized them. Criteria vital to short-term and long-term business goals were given a 5. “Wish list” criteria were weighted a 3. Inapplicable criteria were given a 1. 1. Business criteria: overall business, economic, and competitive issues 2. Operational criteria: tactical issues and operating characteristics 3. Organizational criteria: networks ’ impact on the information systems structure 4. Technical criteria: hardware, software, and communications issues Step 2. Define the operating environment. Several data-gathering techniques were used to collect information from which an information systems model was developed. The model revealed the need to share accounting, sales, marketing, and engineering data at three organizational levels: district, division, and home office. District offices needed access to centralized financial information to handle payroll. WEC needed a distributed network that allowed users throughout the organization to access company data. Step 3. Identify operating alternatives. Using the criteria from step 1, committee members evaluated each commercial software package and then compared notes during a roundtable discussion. Step 4. Test the software. The highest-scoring products were tested, and the product that fit the organization’s needs the best was selected. REQUIRED Discuss the committee’s role in the selection process. How should committee members be selected? What are the pros and cons of using a committee to make the selection? The evaluation committee selected a network operating system and other software to support the organization’s distributed structure. They developed and followed a four-step approach: 1. Develop evaluation criteria. 2. Define the current and future operating environment at the company.
23-23 .
Ch. 23: AIS Development Strategies 3
Identify and evaluate the network operating system alternatives.
4
Test the products that appear to meet their needs and select the best commercial software.
A committee with qualified people from all affected areas has the following advantages:
Encourages planning. An effective team effort requires planning to ensure the system meets the needs of the business. The result: compromise in the planning stage and not during implementation.
Produces better results. Organizing a cross-functional team to select an operating system insures that the selection process considers the needs of all parties. The result: fewer out-of-control projects.
Facilitates acceptance of the results. Behavioral problems are minimized using a cross-functional selection team that supports user participation. The result: smoother system implementation.
Problems that may arise from using a committee include a longer development time, interdepartmental competition for resources, and irresolvable selection process conflicts. a.
What data-gathering techniques could WEC use to assess user needs? To select a vendor?
Interviews with users
Surveys or questionnaires
Observations of business activities.
What data-gathering techniques could WEC use to select a vendor?
b.
Library research
Discussions with current and former customers
Word-of-mouth recommendations.
Meetings with vendor candidates to discuss the evaluation criteria selected.
Asking vendors to develop a demonstration to verify their claims.
What is the benefit of analyzing the operating environment before selecting the software? It is difficult to select the proper software if you do not know how it is to be used and what needs it has to satisfy. An analysis of the operating environment provides the information needed to model the desired information system and to make the proper selection. The committee’s analysis shows the need to share data at the district, division, and home office levels. In addition, the lower levels needed access to centralized data. The model that emerged made it clear that the company needed a distributed network that allows users throughout the organization access to company data. What data-gathering techniques help a company understand the operating environment?
Interviews
Surveys at various management and operational levels
Observations. 23-24 .
Accounting Information Systems 15e, GE c.
In selecting a system using the point-scoring method, how should the committee resolve scoring disputes? List at least two methods. Disputes often arise when using committees. To resolve point scoring disputes, the committee could seek a unanimous consent on disputed issues by compromise and further discussion. If that fails, they could simply average the scores given by each committee member. The committee could also consider throwing out the highest and lowest scores.
d.
Should a purchase decision be made on the point-scoring process alone? What other procedure(s) should the committee employ in making the final selection? Seldom is a system selected based on point scoring alone. The scores are used to select the most promising candidates. The committee should test the most promising candidates to determine which product best meets the company’s needs in the most cost-effective manner. The committee should also verify with existing customers that the system works as promised.
23-25 .
CHAPTER 24 SYSTEMS DESIGN, IMPLEMENTATION, AND OPERATION SUGGESTED ANSWERS TO DISCUSSION QUESTIONS 24.1
Prism Glass is converting to a new information system. To expedite and speed up implementation, the CEO asked your consulting team to postpone establishing standards and controls until after the system is fully operational. How should you respond to the CEO’s request? The consulting team should strongly advise the CEO that postponing standards and controls is not advisable. Rather than save time and money, the company will probably lose time in the future when unanticipated problems and weaknesses arise due to the lack of standards and controls. The following are reasons why performance standards and control procedures should be established before the system becomes operational:
Internal control considerations must be taken into account when assigning job responsibilities.
Job descriptions and work schedules must include the various control procedures.
Performance standards associated with each position must be considered when selecting personnel to operate the system.
Documentation standards and data security provisions must be formulated before the system can be operational.
Error checks must be built into all computer software systems.
Procedures for guiding users and operators through the system and the various error conditions must be established before the users and operators begin working with the new system.
If the information system is not properly controlled, the information it produces will be of little value. Controls must be built into the system to ensure its effectiveness, efficiency, and accuracy.
24-1 .
Ch 24: Systems Design, Implementation, and Operation 24.2
When a company converts from one system to another, many areas within the organization are affected. Explain how conversion to a new system will affect the following groups, both individually and collectively. The following are possible responses to each of the five areas: a. Personnel: Employees will be affected in at least two important ways. 1. They may be reluctant to accept the new system. They may fear for their jobs, feel as if they are no longer vital components of the organization, or they may completely reject the new system, and refuse to utilize it. 2. They will have to learn new policies and procedures to work with the new system. Initially, this may cause a slight reduction of overall productivity until they learn the system. b. Data Storage: One of the primary logistical concerns of implementing a new system is making the required data accessible to the new system. This often requires that files be converted to new formats and that the company's databases are restructured to accommodate the new system's information requirements. In addition, new sources of input may be required which will increase the need for employee instruction and training. c. Operations: New personnel may have to be hired or current employees may need to be trained to run the new system. Users will have to adjust to new system inputs and outputs. The company as a whole will be affected by changes in employee morale and productivity until the personnel are accustomed to and proficient with the system. d. Policies and Procedures: A new information system usually requires new operating policies and procedures, including those for data security and control, error checking, documentation, backup and recovery procedures, and file maintenance. These new policies and procedures should be disseminated to the employees before the actual conversion takes place to ensure that the employees are aware of the new requirements and to facilitate the system conversion. e. Physical Facilities: The effect on the physical facilities will be largely determined by the size and nature of the system being installed. For example, a server will only require a corner or perhaps a small room, whereas a mainframe may require a large facility. In any event, the company will need to be concerned about physical access to the system; off-site backup and recovery procedures; protection from fire, flooding, and other disasters; office space for programmers and operators; lighting, air conditioning, and humidity control; and data communications facilities.
24-2 .
Accounting Information Systems 15e, GE 24.3
During which of the five SDLC stages is each task, labeled (a) through (m), performed? More than one answer may apply for each activity. a. Writing operating procedures manuals - Physical (detailed) systems design phase and Implementation and conversion phase b. Developing program and process controls - Physical (detailed) systems design phase and Implementation and conversion phase c. Identifying alternative systems designs - Conceptual (general) systems design phase d. Developing a logical model of the system - Conceptual (general) systems design phase e. Identifying external and administrative controls - Conceptual (general) systems design phase f.
Testing the system - Implementation and conversion phase
g. Training personnel - Implementation and conversion phase and Operation and maintenance phase h. Evaluating the existing system - Systems analysis i.
Analyzing the achievement of systems benefits - Operation and maintenance
j.
Modifying and altering programs - Operation and maintenance
k. Analyzing total quality management (TQM) performance measures - This can be done in all phases, but is most likely in the first (systems analysis) and last (Operation and maintenance). l. Conducting a feasibility analysis - Feasibility tests are conducted at all phases of the SDLC. m. Aligning AIS development plans with business objectives - Systems analysis phase
24-3 .
Ch 24: Systems Design, Implementation, and Operation 24.4
In which phase of the systems development life cycle would each of the following positions be most actively involved? Justify your answers. a. Managerial accountant - The managerial accountant is usually involved in the analysis phase as designers assess their needs as users. The project development team may also ask the accountant to help with an economic feasibility analysis. In addition, the accountant may also assist in the design phases, helping design reports. b. Programmer - Most of the programmer's involvement comes during the physical design and the implementation and conversion phases - coding, testing, and debugging computer programs. The programmer is also involved with the maintenance phase, making modifications to the system and fixing bugs. c. Systems analyst - The analyst is usually involved in all phases of the SDLC. d. Financial vice president - The financial vice-president is usually involved in the systems analysis phase. However, as a member of the steering committee the financial VP will oversee all phases of the SDLC. e. Information systems manager – The IS manager is responsible for overseeing all information systems activities; she will be involved in all phases of the SDLC. f.
Internal auditor - The auditor is often consulted during the systems analysis phase when security requirements for the new system are determined. During the design phase, the auditor will often test controls to insure their adequacy. The operation and maintenance phase lasts indefinitely and it is during this phase that the auditor conducts his routine audit tests.
24-4 .
Accounting Information Systems 15e, GE
SUGGESTED ANSWERS TO THE PROBLEMS 24.1
Match the terms with their definitions:
1. _Q__ direct conversion 2. _A__ conceptual design specifications 3. _C__ scheduled report 4. _O__ acceptance test 5. _U_ postimplementation review 6. _N__ processing test data 7. _T__ pilot conversion 8. __I__ program maintenance 9. __G_ structured programming 10. _V__ postimplementation review report 11. _F__ demand report 12. _R__ parallel conversion 13. _M__ walk-throughs 14. _J__ physical systems design report 15. _S__ phase- in conversion 16. _ E __ triggered exception report 17. _K __ systems implementation 18. _D___ specialpurpose analysis report 19. _L__ implementation plan 20. _H__ debugging
a. Requirement specifications for systems output, data storage, input, processing procedures, and operations b. Summarizes conceptual design, guides physical design, and communicates how information needs will be met c. Report prepared on a regular basis, with a pre-specified content and format d. Report with no pre-specified content, format, or pre-specified schedule; usually prepared at management request e. Report with pre-specified content and format, prepared in response to abnormal conditions f. Report with a pre-specified content and format, prepared only on request g. Modular programming approach; each module performs specific function and is coordinated by a control module h. Process of discovering and eliminating program errors i. Updating a computer program due to changed user needs, fixing bugs, or legal or regulatory changes j. Summarizes what was accomplished in physical design; used to determine whether to proceed to implementation k. Process of installing hardware and software and getting the IS up and running l. Written plan showing how new system will be implemented and when the project is complete and the IS operational m. Step-by-step reviews of program logic to find incorrect logic, errors, omissions, or other problems n. Processing valid and erroneous transactions to see if a program operates as designed and errors are detected and corrected o. Using real transactions to determine if user-developed acceptance criteria are met p. Process of changing from an old computer system to a new one q. Changing from an old to a new system by terminating the old when the new is introduced r. Changing from an old to a new system by operating both simultaneously until confident the new system functions correctly s. Gradually replacing elements in an old system with new elements until the old system is replaced t. Implementing a new system in one location, resolving its problems, and then implementing it in the rest of the organization u. Review of new system after operating for a brief period to 24-5 .
Ch 24: Systems Design, Implementation, and Operation
ensure it meets planned objectives and review system controls v. Report that analyzes a newly system to determine if it achieved its intended purpose 21 not used: B conceptual systems design report P conversion
24-6 .
Accounting Information Systems 15e, GE 24.2 Wang Lab’s tremendous growth left the company with a serious problem. Customers would often wait months for Wang to fill orders and process invoices. Repeated attempts by Wang’s understaffed IS department to solve these problems met with failure. Finally, Wang hired a consulting firm to solve its revenue tracking problems and expedite prompt receipt of payments. The 18-month project turned into a doubly long nightmare. After three years and $10 million, the consultants were dismissed from the unfinished project. The project failed for many reasons. The systems development process was so dynamic that the failure to complete the project quickly became self-defeating as modifications took over the original design. Second, management did not have a clear vision of the new AIS and lacked a strong support staff. As a result, a number of incompatible tracking systems sprang from the company’s distributed computer system. Third, the project was too large and complex for the consulting firm, who had little experience with the complex database at the heart of the new system. Finally, the project had too many applications. Interdependencies among subprograms left consultants with few completed programs. Every program was linked to several subprograms, which in turn were linked to several other programs. Programmers eventually found themselves lost in a morass of subroutines with no completed program. The IS department finally developed a system to solve the problem, but their revenue tracking system suffered quality problems for years. Wang Labs asked you, a member of the IS staff, to write a memo explaining the failure of the systems development project. a. Why did the development project fail? What role did the consultants play in the failure?
Dynamic requirements. The development process was so dynamic that the failure to complete the project quickly was self-defeating as modifications took over the original design. System requirements were never “frozen” so the project could be completed.
Management did not have a clear vision of the new system. As a result, incompatible tracking systems sprung up throughout the company's distributed processing system.
Management lacked a strong IS staff. A qualified IS staff could have planned and managed the development project better, improving the chances for success.
The project was too large and too complex and the consulting firm had little experience. The firm had little understanding of the desired technology: a complex database that represented the heart of the new system.
The project had too many applications. Interdependencies among subprograms and subroutines left consultants with few completed programs.
b. Identify the organizational issues that management must address in the future.
Management should develop a unified strategic information plan. Organizations should reinforce their business strategy with a complementary information strategy.
Wang should establish an IS steering committee to govern the development process and support the strategic plan. A steering committee monitors systems development activities and could have provided management oversight to the consulting team.
Wang should support the strategy with an expanded, qualified IS staff. A company's reputation is tarnished when it develops an inadequate and unreliable system. Management should hire a larger IS staff, adding more qualified employees – ones that have the necessary skills to support the information strategy. 24-7 .
Ch 24: Systems Design, Implementation, and Operation
Wang should set policies governing systems developme nt. Well-established procedures governing the planning, scheduling, design, implementation, and documentation of a new information system can minimize the risk of runaway projects. Management must also set standards governing the selection of consultants, if necessary.
c. Recommend steps the company could take to guarantee consulting service quality.
Wang should improve existing development policies. Wang must first establish its internal development policies that govern the systems development process. For example, a more effective internal MIS staff can provide the consultants with necessary support.
Wang should establish consulting services evaluation criteria. Management must view consultants as vendors and evaluate which consulting firm provides the best service at a fair price. This may include closed bidding, background checks, credential checks, and probing meetings to determine if the firm has the skills to complete the project.
Wang should use an IS steering committee and project development teams to monitor consultants. An oversight body can reinforce the information strategy and hold the consulting team accountable for the development process.
24-8 .
Accounting Information Systems 15e, GE 24.3
Tiny Toddlers, a manufacturer of children’s toys and furniture, is designing and implementing a distributed system to assist its sales force. Each of the 10 sales offices in Canada and 20 in the United States maintains its own customers and is responsible for granting credit and collecting receivables. Electronic data input forms used by each sales office to maintain the customer master file and to enter the daily sales orders are shown in Figures 24-4 and 24-5. Evaluate the electronic data input forms shown in Figures 24-4 and 24-5 using the following format: Weakness
Explanation
Recommendation(s)
Customer Maintenance Form
Weakness
Explanation
Recommendation(s)
No fields for recording a new customer’s phone number, email address, or website.
Tiny Toddlers cannot call or email the customer or visit their website without this data.
The form should have fields for this information after the address information.
The form is not prenumbered.
There is no way to ensure that all maintenance forms are processed and accounted for.
The form should have a preprinted number in the upper right or left corner.
No indication that information has been entered into the computer system.
The person entering the data does not initial the form after the data is entered into the system. A form may be missed or entered twice.
The report should have a space to record the initials of the person entering the data and the date it is entered.
There is no space provided for recording date the form is created (or the effective date of the change).
The company would not know the effective date of the change nor when the form was created.
An effective change date should be added to this report. If the effective change date can be different from the date the form is created, a field for that date should also be included.
The form does not have a place where the person who fills out the form can sign or initial.
If the data entry clerk could not read or understand the information on the form, she would not know who filled out the form.
A place should be provided for the person who fills out the form to sign or initial it.
24-9 .
Ch 24: Systems Design, Implementation, and Operation 24.3 (continued) Sales Order Form Weakness
Explanation
Recommendation(s)
There is no indication that the customer approves of the order.
Where possible, all orders should be signed by the customer to ensure that the customer is responsible for requesting the order.
Provision should be provided on the form for the customer's order approval.
The form is not prenumbered.
There is no way to ensure that all sales orders are processed and accounted for.
There is no space to enter a ship to address or shipping instructions
The goods cannot be shipped to a different address than the customer’s office address, as there is no ship to address. Nor is there any want to know a customer’s special shipping instructions. There is no way for the company to reference back to purchase order from the customer There is no way to know if the customer was given a special price, a sale price, or a standard price.
The form should have a preprinted number in the upper right corner. Add a ship to address to the sales order form as well as a space to record special shipping instructions.
There is no space for the customer’s purchase order number There is no room for the unit price or extended amounts on the sales order form
Add as space on the form for the customer purchase order number Include columns for Unit Price and Extended Amount.
Some students may refer to the sales order form shown in the Revenue Cycle chapter.
24-10 .
Accounting Information Systems 15e, GE 24.4 Mickie Louderman is the new assistant controller of Pickens Publishers. She was the controller of a company in a similar industry, where she was in charge of accounting and had considerable influence over computer center operations. Pickens wants to revamp its information system, placing increased emphasis on decentralized data access and online systems. John Richards, the controller, is near retirement. He has put Mickie in charge of developing a new system that integrates the company’s accounting-related functions. Her promotion to controller will depend on the success of the new AIS. Mickie uses the same design characte ristics and reporting format she used at her former company. She sends details of the new AIS to the departments that interface with accounting, including inventory control, purchasing, human resources, production control, and marketing. If they do not respond with suggestions by a prescribed date, she will continue the development process. Mickie and John have established a new schedule for many of the reports, changing the frequency from weekly to monthly. After a meeting with the director of IS, Mickie selects a programmer to help her with the details of the new reporting formats. Most control features of the old system are maintained to decrease the installation time, with a few new ones added for unusual situations. The procedures for maintaining the controls are substantially changed. Mickie makes all the AIS control change and program-testing decisions, including screening the control features related to payroll, inventory control, accounts receivable, cash deposits, and accounts payable. As each module is completed, Mickie has the corresponding department implement the change immediately to take advantage of the labor savings. Incomplete instructions accompany these changes, and specific implementation responsibility is not assigned to departmental personnel. Mickie believes operations people should learn as they go, reporting errors as they occur. Accounts payable and inventory control are implemented first, and several problems arise. The semimonthly payroll runs, which had been weekly under the old system, have abundant errors, requiring numerous manual paychecks. Payroll run control totals take hours to reconcile with the computer printout. To expedite matters, Mickie authorizes the payroll clerk to prepare payroll journal entries. The new inventory control system fails to improve the carrying level of many stock items. This causes critical stock outs of raw mate rial that result in expensive rush orders. The new system’s primary control procedure is the availability of ordering and user information. The information is available to both inventory control and purchasing personnel so that both departments can issue timely purchase orders. Because the inventory levels are updated daily, Mickie discontinues the previous weekly report. Because of these problems, system documentation is behind schedule, and proper backup procedures have not been implemented. Mickie has requested budget approval to hire two systems analysts, an accountant, and an administrative assistant to help her implement the new system. John is disturbed by her request because her predecessor had only one part-time assistant. Adapted from the CMA Exam. a.
List the steps Mickie should have taken during while designing the AIS to ensure that end-user needs were satisfied. Interviews should have been conducted with users affected by the changes to understand existing system and business processes, what organizational units are affected by the changes, procedures used to provide information, decision users make and the information needed to make them, current problems users face, needed improvements, and future information needs The capabilities of the new system should have been explained so users can determine how the capabilities can be used to improve the system – ways the developers may not 24-11 .
Ch 24: Systems Design, Implementation, and Operation
b.
have thought of. In other words, employees in the individual departments should have been encouraged to make suggestions for changes and improvements. Mickie should not have automatically assumed that the things that worked for her previous employer would work at Pickens. While they can be used as a starting point, Mickie needs to make sure that the human aspect of systems development is not ignored. That is, Pickens employees have to buy into the new system. As the different parts of the system are developed, the changes should be reviewed with the affected users to ensure that their needs are met. Mickie should have been more proactive in this process. It is not acceptable to give them a date to respond and then proceed with development if she does not hear from them. The users should have been actively involved in the development process all during development. This would endure that all affected users approve of the changes and buy into the change. Mickie and John should not take upon themselves the responsibility of determining what information users need or when they need it. They should not have established a new schedule for many of the reports, changing the frequency from weekly to monthly. Mickie should not have assumed that the control features of the old system were sufficient in the new system. While this may save time, it does not ensure adequate controls. Mickie should not change the procedures for maintaining the controls without user input and approval. In fact, all controls issues should be approved by the users. Mickie cannot possibly understand the system and user needs well enough to make all the control change and program testing decisions. The departments affected by the changes should have been consulted. While having departments implement changes immediately might produce labor savings, there are more important things to consider when deciding when to implement the system. These include whether it has been completely tested and how it interfaces with the rest of the changes. This is evidenced by the problems that surfaced when the changes were introduced too soon. Incomplete instructions accompanied the changes, and specific implementation responsibility was not assigned to departmental personnel. That, and Mickie’s belief that operations people should learn as they go and report errors as they occur, is very bad development policy. Documentation should be complete and back up procedures should be in place before a systems conversion takes place. Identify and describe three ways Mickie violated internal control principles during the AIS implementation.
Most of the control features of the "old" system were retained in the "new" system; however, the procedures for maintaining controls were substantially changed. The procedures and controls were not coordinated. More importantly, controls appropriate for the "new" systems were not properly developed and evaluated.
Proper backup procedures were not implemented in many areas. This put the system and overall operations in a vulnerable position.
Systems, programming, and operating documentation were behind schedule. Documentation should be complete before a systems conversion takes place.
Separation of duties was violated by allowing o
both inventory control and purchasing personnel to issue purchase orders
o
payroll clerks to prepare journal entries for payroll processing 24-12 .
Accounting Information Systems 15e, GE c.
Identify and describe the weaknesses in Mickie’s approach to implementing the new AIS. How could you improve the development process for the remaining parts of the AIS?
Weaknesses No systems analysis or feasibility study. Poor planning
Systems testing and reviews were not conducted prior to implementation. Little or no user involvement
System modules implemented without adequate training, documentation, or instructions.
Recommendations Perform a thorough systems analysis that includes a feasibility study. Prepare a development plan, a budget, and a schedule for project completion. An accepted implementation plan for each module must be formalized and followed All modules should be properly tested for processing, informational, and control effectiveness. . Users must participate in the development of the systems plan, the tests of information content and controls, and final implementation acceptance. New modules should not be implemented until adequate documentation is prepared and all affected organizations and personnel have been appropriately trained.
24-13 .
Ch 24: Systems Design, Implementation, and Operation 24.5
Ryon Pulsipher, manager of Columbia’s property accounting division, has had difficulty responding to the following departmental requests for information about fixed assets. 1. The controller has requested individual fixed assets schedules to support the general ledger balance. Although Ryon has furnished the information, it is late. The way the records are organized makes it difficult to obtain information easily. 2. The maintenance manager wants to verify the existence of a punch press that he thinks was repaired twice. He has asked Ryon to confirm the asset number and the location of the press. 3. The insurance department wants data on the cost and book values of assets to include in its review of current insurance coverage. 4. The tax department has requested data to determine whether Columbia should switch depreciation methods for tax purposes. 5. The internal auditors have spent significant time in the property accounting division to confirm the annual depreciation expense. Ryon’s property account records, kept in an Excel spreadsheet, show the asset acquisition date, its account number, the dollar amount capitalized, and its estimated useful life for depreciation purposes. After many frustrations, Ryon realizes his records are inadequate and that he cannot supply data easily when requested. He discusses his problems with the controller, Gig Griffith. RYON: Gig, something has to give. My people are working overtime and can’t keep up. You worked in property accounting before you became controller. You know I can’t tell the tax, insurance, and maintenance people everything they need to know from my records. Internal auditing is living in my area, and that slows down the work. The requests of these people are reasonable, and we should be able to answer their questions and provide the needed data. I think we need an automated property accounting system. I want to talk with the AIS people to see if they can help me. GIG: I think that’s a great idea. Just be sure you are personally involved in the design of any system so you get all the info you need. Keep me posted on the project’s progress. Adapted from the CMA Exam. a. Identify and justify four major objectives Columbia’s automated property accounting system should possess to respond to departmental requests for information. Chapter 1 lists the following seven characteristics of useful information Relevant. Information is relevant if it reduces uncertainty, improves decision-making, or confirms or corrects prior expectations.
Reliable. Information is reliable if it is free from error or bias and accurately represents organization events or activities.
Complete. Information is complete if it does not omit important aspects of the events or activities it measures.
Timely. Information is timely if it is provided in time for decision makers to make decisions.
Understandable. Information is understandable if it is presented in a useful and intelligible format.
Verifiable. Information is verifiable if two independent, knowledgeable people produce the same information. 24-14 .
Accounting Information Systems 15e, GE
Accessible. Information is accessible if it is available to users when they need it and in a format, they can use.
The CMA exam answer included a characteristic not on the above list:
Flexibility. Flexibility ensures that the computer will adapt to changing business needs without a complete redesign.
b. Identify the data that should be included in the database for each asset. Asset name Manufacturer Model Serial number Asset class code Company assigned asset number General ledger account number Location data (plant, department, building) Acquisition date Original cost Data for book depreciation and tax depreciation Maintenance record: cycle, date, amount Estimated salvage value
24-15 .
Ch 24: Systems Design, Implementation, and Operation 24.6
A credit union is developing a new AIS. The internal auditors suggest planning the systems development process in accordance with the SDLC concept. The following nine items are identified as major systems development activities that will have to be completed. 1. System test 2. User specifications 3. Conversion 4. Systems survey 5. Technical specifications 6. Post-implementation planning 7. Implementation planning 8. User procedures and training 9. Programming Adapted from the CIA Exam. a. Arrange the nine items in the sequence in which they should logically occur. The logical sequence of occurrence is as follows: 1. Systems Survey 2. User Specifications 3. Technical Specifications 4. Implementation Planning 5. Programming 6. User Procedures and Training 7. System Test 8. Conversion 9. Postimplementation Planning b. One major activity is converting data files from the old system to the new one. List three types of file conversion documentation that would be of particular interest to an auditor. 1. Conversion completion documentation indicating that all previously existing files have been converted at a satisfactory level of quality. 2. Operating test documentation indicating that the converted files are able to support the volume of work in the application. 3. Application approval documentation indicating that the implemented system had proper user and EDP management approval.
24-16 .
Accounting Information Systems 15e, GE 24.7 MetLife, an insurance company, spent $11 billion to acquire Travelers Life and Annuity from Citicorp in one of the largest insurance company acquisitions of all time. The Metlife CIO estimated it would take three years to integrate the two systems. Because the integration project was especially critical, he figured he could accomplish the integration in 18 months if he pulled out all the stops. The MetLife CEO gave him nine months to complete the task. To pull off the integration in nine months, he had to:
Integrate over 600 IS applications, all with their own infrastructure and business processes. The new systems had to comply with “One MetLife,” a company policy that all information systems had to have a common look and feel companywide and be able to function seamlessly with other MetLife systems.
Work with over 4,000 employees located in 88 offices scattered all over the globe.
Supervise an oversight team and 50 integration teams in seven project management offices.
Work with hostile, uncooperative Travelers employees for the six months it took to get regulatory approval and close the deal. The systems had to be integrated three months after the deal closed.
Identify integration deliverables (144 in total) and manage the process to deliver them.
Negotiate with Citicorp for hundreds of transition services that would not be immediately converted to MetLife’s systems.
24-17 .
Ch 24: Systems Design, Implementation, and Operation a. What tasks do you think MetLife would have to perform to successfully integrate the Traveler systems into MetLife’s? Separate Travelers’ IS operations and assets from Citicorp’s so MetLife could begin the systems integration process. Determine what systems had to be integrated before the deadline and which could be outsourced to Citicorp until they could be integrated into MetLife’s system. Develop a critical path for the integration process so delays in critical path activities did not delay the whole process. Train large numbers of employees in project planning activities and tools. Identify and freeze systems requirements as soon as possible. The project management team should establish early deadlines for systems requirements and hold users to them. Increase system capacity to handle all of the new data from the Travelers’ systems. Develop/modify transaction-processing systems to handle all of Travelers’ transaction data. Perform a security and privacy analysis of all of Travelers’ systems and determine needed upgrades to comply with MetLife’s security policies. Change Travelers’ laptop and desktop infrastructure so that it matched that of MetLife. Enlarge MetLife’s distribution system by integrating over 150 annuity and life insurance wholesalers and giving them appropriate access to MetLife’s systems. Add all 4000 plus Travelers’ employees to MetLife’s Human Resources and Payroll systems and to their email system. Move Travelers’ 6 life insurance and 2 annuity product lines to MetLife’s systems. Travelers’ investment portfolio had to be made accessible to MetLife managers before the deal closed. Both projects required MetLife and Travelers employees to analyze the differences between the ways data were stored in the two companies. They then had to map all data elements in each system so they could convert Travelers data to the MetLife data storage format. This was one of the most difficult acquisition tasks. Integrate the two company’s data centers. This required some data centers to be combined and others to be expanded. Determine system test capacities, build test environments, and lock down testing procedures and capabilities. Stress and user acceptance testing had to be performed at least 3 months prior to the integration date. Travel to every country and every major Travelers office to train former Travelers employees on the MetLife systems. b.
Search the Internet for articles that describe the integration process. Write a two-page summary of the problems and successes that MetLife experienced while integrating the two systems. A number of articles describe MetLife’s experience. A particularly good article is “Nine Months to Merge” found in the February 20, 2006 issue of Information Week.
24-18 .
Accounting Information Systems 15e, GE 24.8 During final testing, just before launching a new payroll system, the project manager at Reutzel Legal Services found that the purchased payroll system was doing the following:
Writing checks for negative amounts
Printing checks with names and employee numbers that did not match Making errors; for example, $8 per hour became $800 per hour if a decimal point was not entered
Writing checks for amounts greater than a full year’s salary Fortunately, payroll was still installed on time, and only 1.5% of the checks had to be manually reissued every payday until the problem was solved. Other problems were that no one had made sure the new system was compatible with the existing payroll database, and there appeared to be no formal transition between the development of the project and the implementation of the project. The system was never run in parallel. Although the programming manager lost his job, the payroll problems helped raise awareness of the company’s growing dependence on IT. Lacking a major problem, there was a perception that the information system did not affect operations. a. What does “the system was never run in parallel” mean? Running in parallel refers to operating the old and new systems simultaneously for a period. A company processes all transactions with both systems, compares the output, reconciles the differences, and corrects problems. The old and new systems are run in parallel until the new system proves itself and the organization is certain that the new system is functioning properly. b.
If the company had run the system in parallel, what should have occurred? Parallel processing protects companies from errors, but it is costly and stressful because the same set of transactions and activities must be processed twice. This places a significant burden on the company, a burden many companies are not willing to undertake. However, because companies often experience problems during conversion, parallel processing has gained widespread popularity. If the company had operated the new and old systems in parallel, they should have been able to use the paychecks produced by the old system until all errors were detected and corrected.
c.
What other testing methodologies could have been used by the firm? The company could have implemented a pilot conversion where one office or branch of the company could have implemented, tested, and corrected any errors before releasing the system to the rest of the organization. Alternatively, the company could have performed a phased conversion where a new system is implemented, tested, and modified one phase or module at a time.
d.
What other types of problems are evident from reading the case? There does not appear to be proper management or leadership of the system development, implementation, or testing processes involved in this system. For example
Final testing should have been attempted prior to just before launching the payroll system.
Management should have made sure the new system was compatible with the existing payroll database and the new system should have been tested using the existing database.
There should have been a formal transition between the development of the project and the implementation of the project.
24-19 .
Ch 24: Systems Design, Implementation, and Operation 24.9 A new program at Jones and Carter Corporation (JCC) was supposed to track customer calls. Unfortunately, the program took 20 minutes to load on a PC, and it crashed frequently. The project did not have a traditional reporting structure, and it appeared that no one was actually in charge. The lead project manager quit halfway through the project, the in-house programmers we re reassigned to other projects or let go, and two layers of management loosely supervised the systems analyst. Management hired consultants to fix the application, but after three months and $200,000, the project was discontinued. JCC did not check the references of the consulting firm it hired to create the new system. The consultants, who were located two states away, made many programming errors. Although the systems analyst caught some of the consultant’s mistakes, they grew increasingly distant and difficult to work with. They would not even furnish the source code to the project managers, most likely because they were afraid of revealing their incompetence. a.
Identify potential causes for the system implementation failure.
•
•
b.
Leadership and managerial oversight is clearly lacking at Jones and Carter Corp (JCC). When the project was managed internally, the following problems existed: o
There was no evident reporting structure to support and manage the project. It appeared that no one was actually in charge
o
The lead project manager quit halfway through the project
o
The in-house programmers who were familiar with the project were reassigned to other projects or let go.
o
Two layers of management loosely supervised the systems analyst.
Management falsely assumed that the problems could be solved by hiring a consultant. In truth, the problem with the project was internal and caused by poor management, supervision, and project management. When a consulting firm was hired, it does not appear that anyone checked out their competence, obtained referrals, or did any other due diligence with regard to the consulting firm.
What steps should JCC have taken to successfully design and implement the call tracking system?
Start and end the process with a clearly designated manager over the project and with clearly defined lines of authority.
Institute a formal review process for hiring consultants.
Require change control documentation so managers can see what changes were made during development.
Assign a central manager for the project team who is the conduit for communication and decisions.
In summary, JCC should have followed the systems development processes explained in chapters 22-24.
24-20 .
Accounting Information Systems 15e, GE 24.10 This chapter describes several different systems conversion approaches. Select one of the approaches and conduct a search (using written materials, the Internet, electronic databases, etc.) for one or more companies that have successfully used the approach to convert from an older system to a newer system. Per your professor’s instructions, prepare an oral or written summary of the successful conversion. Include in your summary the nature of the system, the approach used to convert the system, and a description of how successful the conversion was, including what worked well and what did not.
Student answers will vary depending upon what they find.
24-21 .
Ch 24: Systems Design, Implementation, and Operation
SUGGESTED ANSWERS TO THE CASES 24.1 Citizen’s Gas Company (CGC) provides natural gas service to 200,000 customers . The customer base is divided into the following three revenue classes: Class Residential Commercial Industrial Totals
Customers Sales in Cubic Feet 160,000 80 billion 38,000 15 billion 2,000 50 billion 145 billion
Revenues $160 million $ 25 million $ 65 million $250 million
Residential customer gas usage is highly correlated with the weather. Commercial customer usage is partially weather dependent. Industrial customer usage is governed almost entirely by business factors. The company buys natural gas from 10 pipeline companies in the amounts specified in contracts that run for 5 to 15 years. For some contracts, the supply is in equal monthly increments; for other contracts, the supply varies according to the heating season. Supply over the contract amounts is not available, and some contracts contain take-or-pay clauses. That is, the company must pay for the gas volume specified in the contract, regardless of the amount used. To match customer demand with supply, gas is pumped into a storage field when supply exceeds customer demand. Gas is withdrawn when demand exceeds supply. There are no restrictions on the gas storage field except that the field must be full at the beginning of each gas year (September 1). Consequently, when the contractual supply for the remain- der of the gas year is less than that required to satisfy projected demand and fill the storage field, CGC curtails service to industrial customers (except for heating quantities). The curtailments must be care fully controlled to prevent either an oversupply at year-end or a curtailing of commercial or residential customers so the storage field can be filled at year-end. In recent years, CGC’s planning efforts have not been able to control the supply during the gas year or provide the information needed to establish long-term contracts. Customer demand has been projected only as a function of the total number of customers. Commercial and industrial customers’ demand for gas has been curtailed. This has resulted in lost sales and caused an excess of supply at the end of the gas year. To correct the problems, CGC has hired a director of corporate planning. She is presented with a conceptual design for an information system that will help analyze gas supply and demand. The system will provide a monthly gas plan for the next five years, with particular emphasis on the first year. The plan will provide detailed reports that assist in the decisionmaking process. The system will use actual data during the ye ar to project demand for the year. The president has indicated that she will base her decisions on the effect alternative plans have on operating income. Adapted from the CMA Exam. 1. Discuss the criteria to consider in specifying the structure and features of CGC’s new system.
Need for market information. The factors that affect the demand and supply for gas must be isolated, their re lative importance determined, and their effect quantified.
Need for accuracy. The level of accuracy required of the system determines the required level of detail, quality of the input data, and sophistication of the system logic. While the system must be designed to provide the accuracy that matches the need, care must be taken to ensure that excessive effort is not spent in being overly accurate in specific areas when the overall accuracy is inherently less due to the planning environment. 24-22 .
Accounting Information Systems 15e, GE
Frequency of use. The frequency of system use provides direction as to the level of automation and sophistication needed. If the system will be used only once each month to project the effect of the most recent actual data, it may be sufficient to develop a less sophisticated system. If it is likely that a variety of alternatives will be evaluated each month, a sophisticated, on-line system will be more desirable.
Turnaround required. The need for timely reporting at month end provides guidance as to the degree of automation and the level of complexity that will be appropriate. Because the system is to be used for both multi-year planning and monthly tactical planning, the system should be designed to provide for quick turnaround of results at month end. Accordingly, consideration must be given to minimizing data input requirements.
Cost/benefit analysis. The new system must be justified on a cost/benefit basis.
Data processing environment. Typically, planning systems require a significant amount of computer resources, both in terms of processing time and data storage.
Supportability. Company personnel must be able to support the system on an ongoing basis. This includes collecting and entering data as well as updating the system. If the support burden is excessive, the system will suffer from lack of timely reporting or will be run using simplifying assumptions that affect the degree of accuracy and credibility of the system. If the system cannot be readily modified and maintained, it will quickly fall into a state of disrepair and will no longer be used.
2. Identify the data that should be incorporated into CGC’s new system to provide adequate planning capability. Explain why each data item it is important and the level of detail needed for the data to be useful.
Number of customers. The customer count should be projected by month, unless customer growth is regular, in which case a base customer count can be used in conjunction with a growth factor. The customer count should be broken into categories based upon use which will facilitate estimating demand, [i.e., residential, commercial heating, commercial non-heating, industrial heating, industrial non-heating].
Weather data. The weather data needed to project heating requirements should be entered as needed. For the first year, meteorological trends may indicate an unusually warm or cold year. For the following years, average monthly weather data may be used. As the year progresses, more accurate short-term forecasts should be entered to improve the predictive ability of the panning system
Heating factors. Heating factors are data that convert weather data to customers' demand. They should be provided for each type of customer which uses heating, i.e., residential, commercial heating, and industrial heating. The heating factors need not vary by month unless it is determined that a seasonal relationship exists or that trends such as conservation are likely.
Customer unit demand. The average monthly consumption for each commercial and industrial non-heating customer must be provided, either as a constant or as varying over time, to reflect both seasonal fluctuations and longer term trends. This data would also be used to project the non-heating portion of commercial and industrial customer demand.
Sales forecasts. The sales to the top industrial accounts should be forecast individually by month for the first year of the five-year plan; future years may make use of annual growth rates. Heating and non-heating sales for all other customers will be projected by 24-23 .
Ch 24: Systems Design, Implementation, and Operation revenue class.
Customer rate structure. The customer rate structure should provide monthly rate information at the revenue class level, i.e., residential, commercial, and industrial. Data must be monthly to provide for periodic rate changes by revenue class.
Supplier contract terms. For each supply contract, the contract term (beginning and end dates), monthly volumes, unit costs, and take-or-pay conditions must be maintained.
Storage field capacity. The capacity of the gas storage field is required in order to determine if gas remains in storage that can be withdrawn to supplement pipeline supply.
Priority system. A priority system needs to be established in case the company needs to curtail service to its customers due to an inadequate supply of gas.
The first six factors are necessary in order to determine the demand for gas. The next two items are necessary to determine supply. The last item is necessary to give direction whenever the supply is not adequate to meet demand. Data must be considered on a monthly basis because of the implied monthly variations of demand and supply.
24-24 .
Instructor’s Resource Manual
Accounting Information Systems 15th Edition, Global Edition
Marshall B. Romney Paul John Steinbart Scott L. Summers David A. Wood
CHAPTER 1 ACCOUNTING INFORMATION SYSTEMS: AN OVERVIEW Instructor’s Manual Learning Objectives: 1. Distinguish between data and information, discuss the characteristics of useful information, and explain how to determine the value of information. 2. Explain the decisions an organization makes and the information needed to make them, and the major business processes present in most companies. 3. Explain how an AIS adds value to an organization, how it affects and is affected by corporate strategy, and its role in a value chain.
Learning Objective One Distinguish data from information, discuss the characteristics of useful information, and explain how to determine the value of information.
Systems, Data, and Information Systems A system is a set of detailed methods, procedures, and routines that carry out specific activities, perform a duty, achieve goals or objectives, or solve problems. Systems are almost always composed of smaller subsystems Each subsystem is designed to achieve one or more organizational goals. For example, the college of business is a system composed of various subsystems known as departments (e.g., Marketing, Management, Accounting, etc.). Each subsystem is designed to achieve one or more organizational goals, changes in subsystems cannot be made without considering the effect on other subsystems and the system as a whole. Goal conflict occurs when a subsystem’s goals are inconsistent with the goals of another subsystem or the system as a whole.
1-1 .
Goal congruence is achieved when a subsystem achieves its goals while contributing to the organization’s overall goal.
Data Data are facts that are collected, recorded, stored, and processed by an information system. Several kinds of data need to be collected in businesses, such as: 1. Facts about the activities that take place (e.g., date, total amount). 2. The resources affected by the activities (e.g., number of units). 3. The people who participate in the activity (e.g., S&S).
Information Information is data that have been organized and processed to provide meaning and context that can improve the decision-making process. If using the example of data provided above—date, number of units, and S&S—would you be able to determine if this is a sales transaction, purchase transaction, or any other type of transaction? No, because it is not organized and contextual, meaning it is not determinable. You would need to know that the context of the transaction is a sales transaction and S&S is a customer (as opposed to a vendor). Number of units are number of units sold. Data is most useful when it is machine-readable and standardized such that it can be processed by a computer with little human intervention. For example, digital transaction information such as “IR144, $12.95, Infrared reader, 3, $38.85” might be presented digitally, but the meaning of that data is not clear. This might be a purchase transaction or a sales transaction. IR144 might represent a transaction ID, employee ID, vendor ID, or customer ID. Taxonomies have been created to embed meaning in digital data. XBRL is a taxonomy that structures business information for communication between business systems. Using the XBRL taxonomy is quite complex and embeds a lot of information about the characteristics and constraints of each data field. An XBRL presentation of Cash of 11,000 from a balance sheet for 2022 may be represented in XBRL as <iascf-pfs:CashCashEquivalents numericContext="Group2022AsOf">11000</iascfpfs:CashCashEquivalents>
Note the tag name of CashCashEquivalents. Tag names have to be created in XBRL for all financial statement elements. Also, note the attribute numericContext that has a value of Group2020AsOf. This provides additional context to the value of 11,000. The XBRL taxonomy does not have elements for tagging individual transactions. 1-2 .
Thus XBRL cannot effectively ‘tag’ the transaction noted above. The UBL taxonomy, an open source taxonomy for tagging business transactions has a schema for invoices. http://docs.oasisopen.org/ubl/os-UBL-2.2/UBL-2.2.html Below is an example of how the data above might be tagged in that taxonomy. <cac:InvoiceLine> <cbc:ID>1</cbc:ID> <cbc:InvoicedQuantity>3</cbc:InvoicedQuantity> <cbc:LineExtensionAmount currencyID="USD">38.85</cbc:LineExtensionAm ount> <cac:Item> <cbc:Name>Infrared reader</cbc:Name> <cac:SellersItemIdentification> <cbc:ID>IR144</cbc:ID> </cac:SellersItemIdentification> </cac:Item> <cac:Price> <cbc:PriceAmount currencyID="USD">12.95</cbc:PriceAmount> </cac:Price> </cac:InvoiceLine> Tagging data with agreed upon taxonomies allows data elements and their context to be transmitted between systems. It also improves reliability, relevance, accessibility, understandability, and timeliness. There are limits to the amount of information the human mind can effectively absorb and process. Information overload occurs when those limits are passed. When you get more information than you can effectively assimilate, you suffer from information overload. •
Example: Final exams week!
When you have reached the overload point, the quality of decisions declines while the costs of producing the information increases. Information Technology (IT) are computers and other electronic devices used to store, retrieve, transmit, and manipulate data to help decision makers more effectively filter and condense information. The value of information is the benefit produced by the information minus the cost of producing it. Benefits include reduced uncertainty, improved decisions, and improved ability to plan and schedule activities. Costs include the time and resources spent to produce and distribute information. A good example of the value of information is provided on page 31 for the 7-Eleven stores in Japan. Each store uses information for: 1. Keeping track of the 3,000 items sold in each store and 1-3 .
determining what products are moving, at what time of the day, and under what weather conditions. 2. Keeping track of customers (what and when they buy). If their best customers are single men, for example, the store makes sure it has the fresh rice dishes they purchase on their lunch hour and at the end of the workday. 3. Ordering sandwiches and rice dishes from suppliers automatically. Orders are placed and filled three times a day so stores can always have fresh food. 7-Eleven allows its suppliers to access sales data in their computers so they can forecast demand. 4. Coordinating deliveries with suppliers. This allows the stores to reduce the number of deliveries from 34 to 12 a day, resulting in less clerical receiving time. 5. Preparing a color graphic display that indicates which store areas contribute the most to sales and profits. Table 1-1 on page 30 provides the fourteen characteristics that make information useful and meaningful for decision making. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14.
Access Restricted Accurate Available Reputable Complete Concise Consistent Current Objective Relevant Timely Useable Understandable Verifiable
Multiple Choice 1 Data differ from information in which way? a. Data are facts about a sale b. Information is data organized to provide meaning c. Data are meaningful bits of information d. There is no difference Multiple Choice 2 Which of the following is not a characteristic that makes information useful? a. It is reputable b. It is timely c. It is inexpensive 1-4 .
d. It is relevant
Learning Objective Two Explain the decisions an organization makes and the information needed to make them , and the major business processes present in most companies. .
Key Decisions and Information Needs Using the S&S case, we can determine what information will be needed to make better decisions. An information system is comprised of the people and technology that produce information. Information in an organization is organized through a set of related, coordinated, and structured activities and tasks, performed by a person, a computer, or a machine that help accomplish a specific organizational goal known as a business process. The case will help students to understand that before collecting data and processing it into information, the decisions that management and other external users will be making need to be known first. Only after this is known can we begin designing and using the AIS to capture, collect, and process the correct data as needed by decision makers. These information needs and key decisions are provided in Table 1-2 on page 32. Multiple Choice 3 What information needs are generally associated with the acquire inventory business process? a. Market Analysis b. Vendor Performance c. Inventory status reports d. All of the above
Learning Objective Three Explain how an AIS adds value to an organization, how it affects and is affected by corporate strategy, and its role in a value chain.
Business Processes
1-5 .
Taking the list of specific business processes from S&S it is easier to group them into related transactions. A transaction is an agreement between two entities to exchange goods or services or any other event that can be measured in economic terms by an organization. Transaction processing is the process of capturing transaction data, processing it, storing it for later use, and producing information output such as a financial statement. The activities between two entities are pairs of events involved in give-get exchange (e.g., give inventory to a customer, get cash from the customer). These frequent give-get exchanges that occur in companies are grouped around business processes or transaction cycles and are: 1. The Revenue Cycle (AKA customer to cash (C2C)—Activities associated with selling goods and services in exchange for cash or future promise to receive cash (Accounts Receivable). 2. The Expenditure Cycle—(AKA purchase to pay (P2P))Purchase of inventory for resale or raw materials for use in production in exchange for cash or a promise to pay cash in the future (Accounts Payable). 3. The Production or Conversion Cycle—Raw materials are converted into finished goods. 4. The Human Resource/Payroll Cycle—Employees are hired, trained, compensated, evaluated, promoted, and terminated. 5. The Financing Cycle—Companies acquire capital by selling shares or borrowing money and where investors are paid dividends or interest. For each of these processes there is a basic give-get relationship. Figure 1-2 on page 33 provides a description of the basic give-get exchanges. 1. Revenue Cycle—Give goods, get cash or A/R. 2. Expenditure Cycle—Give cash or A/P, get goods or raw materials. 3. Production Cycle—Give labor and raw materials, get finished goods. 4. Human Resource—Give cash, get labor. 5. Financing Cycle—Give cash, get cash. Figure 1-3 on page 34 shows the relationship between these cycles and the general ledger and reporting system function which is used to generate information for both management and external parties. Multiple Choice 4 Which transaction cycle includes interactions between an organization and its suppliers? a. Revenue cycle b. Expenditure cycle c. Human resources/payroll cycle 1-6 .
d. General ledger and reporting system Multiple Choice 5 In which cycle does a company ship goods to customers? a. Production cycle b. Financing cycle c. Revenue cycle d. Expenditure cycle
Accounting Information Systems An accounting information system (AIS) is a system that collects, records, stores, and processes data to produce information for decision makers. This is illustrated in Figure 1-4 on page 37. An AIS can be a pencil and paper manual system or one that involves the latest technology. Six components of an AIS 1. The people who operate the system and perform various functions. 2. The procedures and instructions, both manual and automated, involved in collecting, processing, and storing data about the organization’s activities. 3. The data about the organization and its business processes. 4. The software used to process the organization’s data. 5. The information technology infrastructure, including computers, peripheral devices, and network communications devices used to collect, store, process, and transmit data and information. 6. The internal controls and security measures that safeguard the data in the AIS. These six components enable an AIS to fulfill three important business functions: 1. Collect and store data about organizational activities, resources, and personnel. 2. Transform data into information that is useful for making decisions so management can plan, execute, control, and evaluate activities, resources, and personnel. 3. Provide adequate controls to safeguard the organization’s assets, including its data, to ensure that the assets and data 1-7 .
are available when needed and the data are accurate and reliable. Multiple Choice 6 Which of the following is a function of an AIS? a. Reducing the need to identify a strategy and strategic position. b. Transforming data into useful information. c. Allocating organizational resources. d. Automating all decision making.
How an AIS Can Add Value to an Organization 1. Improve the quality and reduce the costs of products or services. 2. Improve efficiency. A well-designed AIS can make operations more efficient by providing more timely information. 3. Share knowledge. A well-designed AIS can make it easier to share knowledge and expertise, perhaps thereby improving operations and even providing a competitive advantage. 4. Improve the efficiency and effectiveness of its supply chain. 5. Improve the internal control structure. 6. Improve decision making.
Multiple Choice 7 An AIS provides value by: a. improving products or services through information that increases quality and reduces costs b. providing timely and reliable information to decision makers c. creating new products d. both A and B
An AIS Can Use Artificial Intelligence and Data Analytics to Improve Decision Making Artificial Intelligence uses computer systems to simulate human intelligence processes such as learning, reasoning, and self-improvement. Within accounting AI may be used to automate parts of the financial reporting process, the audit, and many operational decisions. Data Analytics is the use of software and algorithms to discover, describe, interpret, communicate, and apply meaningful patterns to improve business performance. Data analytics have long been used to analyze past
1-8 .
performance. Increasingly data analytics are designed to focus on the future. A data dashboard is an essential part of most analytic tools. It displays important data points, key metrics, and key performance indicators in the form of graphs, tables, and gauges.
The AIS and Blockchain Blockchain is appropriately named as it chains blocks of data together through the use of cryptography algorithms that create hashes. The hash of a prior block is included in the latest block, creating the chain. At a high level a blockchain repeatedly executes the following 5 steps: 1. Initiate transaction 2. Validate transaction 3. Create a block 4. Calculate and insert a hash 5. Complete transaction A detailed discussion of the processes of using and maintaining a blockchain are covered in Chapter 11. Blockchain advantages include: 1. Accuracy 2. Transparency 3. Data consistency 4. Trust 5. No need for third parties 6. Single set of books 7. Cost 8. Decentralization 9. Efficiency 10. Privacy 11. Security 12. Provenance Blockchain disadvantages include: 1. Cost 2. Loss of privacy and confidentiality 3. Susceptibility
Cloud Computing, Virtualization, and the Internet of Things Cloud computing takes advantage of the modern global network to allow individuals to access software (software as a service), hardware (infrastructure as a service), and application environments (platform as a service) remotely. Variations include: public, private, or hybrid clouds, depending on whether the remote resources are owned by the user. Virtualization is the installation of multiple computing environments in a single physical computer. A corporation might virtualize their database server, email server, and file server (three separate computing environments – each with their own operating system) on a single physical computer. This cuts hardware costs and reduces maintenance costs.
1-9 .
The Internet of Things (IOT) refers to the embedding of sensors in a multitude of devices that are capable of communicating (sharing data) with the internet. IOT allows for monitoring and control of many common devices such as heating, appliances, and lights from any internet connection in the world. There are significant security implications to the IOT.
The AIS and Corporate Strategy Figure 1-5 on page 45 shows three factors that influence the design of an AIS: IT developments, business strategy, and organizational culture. For example, the growth of the internet has affected the way many value chain activities are performed. The internet makes a company’s products available almost anywhere. An organization’s AIS play an important role in helping it adopt and maintain a strategic position. The information system can collect financial and nonfinancial data about the organization’s activities.
The Role of the AIS in the Value Chain The role of an AIS in the value chain is detailed in Figure 1-6 on page 45 showing the linking together of all the primary and support activities in a business. The objective of most organizations is to provide value to their customers. Five primary activities that directly provide value to its customers: 1. Inbound logistics consists of receiving, storing, and distributing the materials an organization uses to create the services and products it sells. 2. Operations activities transform inputs into final products or services. 3. Outbound logistics activities distribute finished products or services to customers. 4. Marketing and sales activities help customers buy the organization’s products or services. 5. Service activities provide post-sale support to customers. Four Categories of Support Activities
1-10 .
1. Firm infrastructure is the accounting, finance, legal, and general administration activities that allow an organization to function. 2. Human resources activities include recruiting, hiring, training, and providing employee benefits and compensation. 3. Technology activities improve a product or service. 4. Purchasing activities procure raw materials, supplies, machinery, and the buildings used to carry out the primary activities. Supply Chain [Figure 1-7 on Page 46] shows an extended system that includes an organization’s value chain (manufacturer) as well as suppliers, distributers, retailers, and customers. 1. Raw Materials Supplier 2. Manufacturer 3. Distributor 4. Retailer 5. Consumer Multiple Choice 8 The value chain concept is composed of the following two types of activities: a. Primary and secondary b. Primary and support c. Support and value d. Technology and support Multiple Choice 9 Which of the following is a primary activity in the value chain? a. Purchasing b. Accounting c. Post-sales service d. Human resource management
Multiple Choice 10 Which of the following is a support activity in the value chain? a. Purchasing b. Manufacturing c. Post-sales service d. Receiving materials
1-11 .
Answers to Multiple Choice Questions: Multiple Choice Number 1 2 3 4 5
Multiple Choice Answer B C D B C
Multiple Choice Number 6 7 8 9 10
Multiple Choice Answer B D B C A
References Used: 1. Michael E. Porter and Victor E. Millar, How Information Gives You Competitive Advantage. Harvard Business Review, (July–August 1985), pp. 175–186. 2. Michael E. Porter, What Is Strategy? Harvard Business Review, November-December 1996), pp. 87-104.
1-12 .
CHAPTER 2 OVERVIEW OF TRANSACTION PROCESSING AND ENTERPRISE RESOURCE PLANNING SYSTEMS Instructor’s Manual Learning Objectives: 1. Describe the data processing cycle used to process transactions, including how data is input, stored, and processed and how information is output. 2. Discuss how organizations use enterprise resource planning (ERP) systems to process transactions and provide information. Questions to be addressed in this chapter include: 1. How should I organize the accounting records so that financial statements can be easily produced? 2. How am I going to collect and process data about all of S&S’s transactions? 3. How do I organize all the data that will be collected? 4. How should I design the AIS so that the information provided is reliable and accurate? 5. How can I design procedures to ensure that they meet all government obligations, such as remitting sales, income, and payroll taxes?
Learning Objective One Describe the data processing cycle used to process transactions, including how data is input, stored, and processed and how information is output.
Transaction Processing: The Data Processing Cycle Four Major Steps in the Data Processing Cycle
2-1 .
1) Data Input 2) Data Storage 3) Data Processing 4) Information Output The first step in processing transactions is to capture the data for each transaction that takes place and enter them into the system. Data Input Data must be collected about three facets of each business activity: 1. Each activity of interest 2. The resource(s) affected by each activity 3. The people who participate in each activity For example, collect the following data about a sales transaction: 1. Date and time of day the sale occurred 2. Employee who made the sale and the checkout clerk who processed the sale 3. Checkout register where the sale was processed 4. Item(s) sold 5. Quantity of each item sold 6. List price and actual price of each item sold 7. Total amount of the sale 8. For credit sales: delivery instructions, customer bill-to and ship-to addresses, customer name For the above example, the activity of interest is the sales activity. A sales activity involves resources of inventory and cash (the company gives inventory and in exchange receives cash). The people who participated in this activity are the salesperson and the customer. Source documents are used to capture data at the beginning of the transaction. Table 2-1 (p. 59) provides details as to various business activities and related source documents. Many times this data is automatically captured such as point-ofsale (POS) scanners or even automated invoice scanning that uses scanners that will automatically capture common items from a vendor invoice and processes it to accounts payable. These types of examples are known as source data automation.
2-2 .
Source documents are documents used to collect data about their business activities. Source documents are also used to support the validity of the business activities. XBRL is a good example of a format that supports source data automation between financial reporting systems. UBL is an example of a format that supports source data automation between transaction processing systems. If paper documents are exchanged with customers or suppliers, data input accuracy and efficiency is improved by using turnaround documents, which are records of company data sent to an external party and then returned to the system as input (e.g., remittance slip). Data Storage A company’s data are one of its most important resources. Accountants need to know how to manage data for maximum corporate use. Ledgers General ledger contains summary-level data for every asset, liability, equity, revenue, and expense account of the organization. Subsidiary ledger records all the detailed data for any general ledger account that has many individual subaccounts. These subsidiary ledgers would be used for accounts receivable and accounts payable. Accounts receivable subsidiary ledger would record detailed data for customers whom buy products or services on credit. The accounts receivable subsidiary ledger would support the accounts receivable general ledger controlling account. Accounts payable subsidiary ledger would record detailed data for the individual vendor credit purchases of merchandise or supplies made by the company. The accounts payable subsidiary ledger would support the accounts payable general ledger controlling account. Coding Techniques Coding is the systematic assignment of numbers or letters to items to classify and organize them.
2-3 .
1. With sequence codes, items are numbered consecutively to ensure that there will be no gaps in the sequence. 2. With a block code, blocks of numbers within a numerical sequence are reserved for categories having meaning to the user. S&S had the specific range of code numbers for their following major product categories: Product Code 1000000-1999999 2000000-2999999 3000000-3999999 4000000-4999999
Product Type Electric range Refrigerator Washer Dryer
3. Group codes are often used in conjunction with the block code. S&S uses a seven-digit product code number, for example, the group coding technique might be applied as follows: Digit Position 1-2 3 4-5 6-7
Meaning Product line, size, style Color Year of manufacture Operational features
4. Mnemonic codes are letters and numbers used in a combination to identify an item. The code is derived from the description of the item and is usually easy to memorize. For example, Dry300W05 could represent a low end (300), white (W) dryer (Dry) made by Sears (05). In designing a coding system, the following guidelines will result in a better coding system: 1. The code should be consistent with its intended use, which requires the code designer to determine the types of system outputs desired by users prior to selecting the code. 2. Make sure the code allows for growth in the number of items to be coded. 3. Make the coding system as simple as possible in order to minimize costs, facilitate memorization and interpretation of coding categories, and ensure employee acceptance. Make sure the coding system is consistent (1) with the company’s organizational structure and (2) across the different divisions of an organization. Chart of Accounts
2-4 .
A chart of accounts is a list of all general ledger accounts an organization uses with each general ledger account being assigned a specific number. Audit Trail: The accounting data and records should provide a trail starting with the source document that supports the transaction (e.g., let’s use credit sales) all the way through to the final posting in the general ledger accounts to the financial statements. An audit trail provides a means to check the accuracy and validity of ledger postings. In auditing, this technique would be called tracing. In the opposite direction; from the general ledger to the journals and subsidiary ledgers to the source document; this is called vouching for auditors. This is covered in more detail in Auditing Theory and Practice courses. Computer-Based Storage Concepts An entity is something about which information is stored (e.g., employees, inventory items, and customers). Each entity has attributes, or characteristics of interest, which need to be stored. For example, an employee’s hourly rate of pay, unit cost of an inventory item, and a customer’s address. Figure 2-3 on page 64 provides examples of data storage elements: 1. Data values are stored in a physical space called a field. In the figure the fields are Customer number, Customer name, Address, Credit limit, and Balance. 2. A row of fields that contain data about various attributes (values) of the same entity forms a record. In the figure the records are represented by each of the three rows; so there are three records. 3. The contents of each field within a record are called a data value. Sometimes, not mentioned in this book, the contents of each field are called a specific data element which contains the value of the data. 4. In turn, data elements/data value is composed of characters such as letters, numbers, and symbols. 5. Related records are grouped to form a file. 6. Two basic types of files exist:
A master file is conceptually similar to a ledger in a manual AIS.
The second basic type of file is called a transaction file, which is conceptually similar to a journal in manual AIS.
Data Processing 2-5 .
Once data about a business activity have been collected and entered into the system they must be processed. Data processing implies the execution of certain procedures, usually involving a series of tasks. There are four different types of file processing, referred to as CRUD: 1. Creating new data records, such as adding a new employee to the payroll master file or database after they have been hired. 2. Reading, retrieving, or viewing existing data. 3. Updating data previously stored about the activity, the resources affected by the activity, or the people who performed the activity (see Figure 2-4, page 65). 4. Deleting data, such as purging the vendor master file of all vendors that the company no longer does business with. Periodic updating of data is referred to as batch processing. This approach may be combined with either the offline or online entry of data. Under the real-time processing method of processing, individual transactions are entered directly into the computer via a terminal as they occur; thus, ensuring that stored information is always current. Information Output This is the final step in the data processing cycle. Forms of Information Output Documents are records of transaction or other company data, such as checks and invoices. Documents generated at the end of transaction processing activities are called operational documents to distinguish them from source documents, which are used at the beginning of the process. Reports are prepared for both internal and external users. We are all familiar with the external reports called financial statements. Information needs cannot always be satisfied strictly by documents or periodic reports. Instead, problems and questions constantly arise that need rapid action or answers. To respond to this problem, personal computers or terminals are used to query the system. For example, it is much easier for a customer service 2-6 .
employee to help solve a customer billing problem by looking up the information instead of looking through several different reports.
Purpose of Output There are four main types of financial reports that were covered in Principles of Accounting I & II courses, the balance sheet, income statement, statement of owner’s equity, or statement of stockholder’s equity, and the statement of cash flows. Sometimes a statement of retained earnings is used instead of the statement of stockholder’s equity. These financial statements are used by both external and internal users. Budgets are used by the management of the firm. Budgets require estimating future revenue/sales, cost, and expenses. This is the operational budget. There are also cash budgets and capital expenditure budgets. Blockchain is more than a distributed ledger that you learned about in Chapter 1. Transactions can be processed through blockchain in the form of smart contracts. Smart contracts are regular contracts with terms and agreements. They are stored in the blockchain in such a way that when the terms are met, they can autoexecute to fulfill the contract. The terms can be met by actions happening within the blockchain. The terms (and autoexecution) can also be tied to external events such as receiving inventory or fulfilling service terms. Multiple Choice 1 Which of the following is not a step in the data processing cycle? a. Data collection b. Data input c. Data storage d. Data processing Multiple Choice 2 Recording and processing information about a transaction at the time it occurs is referred to as which of the following? a. Batch processing b. Real-time processing c. Captured transaction processing d. Chart of accounts processing Multiple Choice 3 How does the chart of accounts list general ledger accounts? a. Alphabetical order b. Chronological order c. Size order d. The order in which they appear in financial statements
2-7 .
Multiple Choice 4 Which one below is not a type of data processing activity? a. Creating b. Updating c. Recording d. Reading Multiple Choice 5 Which of the items below are not an attribute of a smart contract? a. Has terms b. Can auto-execute c. Built into blockchain d. Must use cryptocurrency For class discussion: Why is it important for an accountant to understand their business and industry as well as management’s informational needs in addition to knowing how to generate financial statements? (You may use S&S as the context while asking this question.) This discussion question is useful to get students to understand that accounting information is not just about knowing debits and credits. The role of an accountant is an important role in understanding the business information, how to incorporate controls for that information, and how to help management measure performance by providing insight, foresight, and oversight to the business. Hence, an accountant can be an active member of the business management team.
Learning Objective Two Discuss how organizations use enterprise resource planning (ERP) systems to process transactions and provide information.
ERP systems are designed to overcome problems as they integrate all aspects of a company’s operations with its traditional AIS. A key feature of ERP systems is the integration of financial with other nonfinancial operating data. More sophisticated ERP systems are using tools to integrate external information with their internal information to be more proactive in managing the business.
Multiple Choice 6 Which of the following is not an advantage of an ERP system? a. Better access control 2-8 .
b. Standardization of procedures and reports c. Improved monitoring capabilities d. Simplicity and reduced costs
Class Discussion Question: Think about the various forms of social media (e.g., Twitter, Facebook). Would this nonfinancial information external to the company be of use? What other nonfinancial information would be useful? Could you think of financial information that is external to the organization that might be useful to management as well? This discussion question is to get the students thinking in a “data analytic mindset” because organizations need to compete in a global market which requires synthesizing information that is both internal and external to the organization. For example, Walmart uses sales information as well as weather forecasts to predict which items stores should be stocked up on during a hurricane (NYtimes.com, 2004). This allows the company to use past information from within the organization and synthesize it with external information to be more proactive. In addition, IBM purchased weather.com specifically so weather data analytics can be used by organizations to better predict their inventory needs (Thurai, November 9, 2015). Sources: https://www.nytimes.com/2004/11/14/business/yourmoney/whatwalmart-knows-about-customers-habits.html https://www.ibmbigdatahub.com/blog/author/andy-thurai
Answers to Multiple Choice Questions: Multiple Choice Number 1 2 3 4 5 6
Multiple Choice Answer A B D C D D
2-9 .
CHAPTER 3 SYSTEMS DOCUMENTATION TECHNIQUES Instructor’s Manual Learning Objectives: 1. Prepare and use business process diagrams (BPDs) to understand, evaluate, and document information systems. 2. Prepare and use flowcharts to understand, evaluate, and document information systems. 3. Prepare and use data flow diagrams to understand, evaluate, and document information systems.
Questions to be addressed in this chapter include: 1. What is the purpose of documentation? 2. Why do accountants need to understand documentation? 3. What documentation techniques are used in accounting systems? 4. What are BPDs, flowcharts, and data flow diagrams? •
How are they alike and different?
•
How are they prepared?
Introduction Techniques Used to Document a System Narratives, flowcharts, diagrams, and other written materials that explain how a system works. Documentation tools are important on one or more of the following levels: 1. At a minimum, you must be able to read documentation to determine how the system works. 2. You may be required to evaluate internal control systems documentation to identify control strengths and weaknesses and recommend improvements. Alternatively, you may have to evaluate the documentation for a proposed system to determine if the system meets the company’s needs. 3. The greatest amount of skill is needed to prepare documentation. If you are a member of a team that is developing a new system, then you must prepare documentation to show how both the existing and the 3-1 .
proposed systems operate. This chapter discusses the following three documentation tools: 1. BPD is a graphical description of the business processes used by a company. 2. Flowcharts a. Document flowchart is a graphical description of the flow of documents and information between departments or areas of responsibility within an organization. i. Internal Control flowchart is used to describe, analyze, and evaluate internal controls, including identifying system strengths, weaknesses, and inefficiencies. b. System flowchart is a graphical description of the relationship among the input, processing, and output in an information system. c. Program flowchart is a graphical description of the sequence of logical operations that a computer performs as it executes a program.
3. Data flow diagram is a graphical description of data sources, data flows, transformation processes, data storage, and data destinations.
Accountants need to understand systems documentation for many reasons. For example, auditing standards require independent auditors to understand the automated and manual internal control procedures an entity uses. In addition, Sarbanes-Oxley Act (SOX) of 2002 requires an internal control report in public company annual reports. To be able to document and attest to internal controls requires the use and knowledge of systems documentation tools.
Learning Objective One Prepare and use business process diagrams to understand, evaluate, and document information systems.
Business Process Diagrams A BPD is a visual representation of the different steps or activities in a business process. Figure 3-1 on page 87 shows the basic symbols used for drawing BPDs as well as the Payroll at S&S. The Business 3-2 .
Process Modeling Initiative Notation Working Group established standards for drawing BPD’s. Guidelines are in Focus 3-1 on page 87: 1. Identify and understand the business processes. 2. Ignore certain items (e.g., documents as they flow through the system of where they are stored). 3. Decide how much detail to include. 4. Organize diagram. 5. Enter each business process on the diagram. 6. Draw a rough sketch of the BPD. 7. Draw a final copy of the BPD. Multiple Choice 1 A BPD is a visual way of: a. Describing the systems program b. Describing the activities in a process c. Describing the internal controls of a process d. Describing the documents in a process
Learning Objective Two Prepare and use flowcharts to understand, evaluate, and document information systems.
Flowcharts A flowchart is a pictorial, analytical technique used to describe some aspect of an information system in a clear, concise, and logical manner. Flowcharts use a standard set of symbols to describe pictorially the transaction processing procedures a company uses and the flow of data through a system. The Sarbanes-Oxley Act requires companies to document their business processes and internal controls. 1. Input/output symbols. Input/output symbols represent devices or media that provide input to or record output from processing operations. 2. Processing symbols. Processing symbols either show what type of device is used to process data or indicate when processing is performed manually. 3. Storage symbols. Storage symbols represent the device used to store data that the system is not currently using. 4. Flow and miscellaneous symbols. Flow and miscellaneous symbols indicate the flow of data and goods. They also represent such operations as where flowcharts begin or end, where decisions are made, and when to add explanatory notes to flowcharts. 3-3 .
Figure 3-3 on pages 90-91 contains common flowcharting symbols. Focus 3-2 on page 91 provides the following guidelines for preparing flowcharts: 1 2 3
4
Understand a system before flowcharting it. Identify the entities to be flowcharted. Organize flowchart. Design so that data flows from top to bottom and from left to right. Show where documents or processes originate, where data is processed, and where data is stored and sent. Show the final disposition of all documents to prevent loose ends that leave the reader dangling. Show data entered into or retrieved from a database as passing through a processing operation (i.e., computer program) first. In document flowcharts, divide the flowchart into columns with labels. Clearly label all symbols. Write a description of the input, process, or output inside the symbol. Use arrowheads on all flow lines.
5
Page Connectors. If flowchart cannot fit on one page use offpage connectors.
6
Draw a rough sketch of the flowchart. Be more concerned with capturing content than with making a perfect drawing. Review it with people familiar with the system. Make sure all uses of flowcharting conventions are consistent.
7
Draw the final flowchart. Place the flowchart name, date, and preparer’s name on each page.
Document Flowcharts A document flowchart illustrates the flow of documents and information among areas of responsibility within an organization. Document flowcharts that describe and evaluate internal controls are often referred to as internal control flowcharts. The document flowchart for the S&S payroll process, as described in Table 3-1 on page 88 and 89, is now shown in Figure 3-4 on pages 92 and 93. Note that there are four areas of responsibility: payroll, accounts payable, management, and general ledger. Note that the solid lines represent the document or processing flow whereas the dashed lines represent the data or information flow.
System Flowcharts System flowcharts depict the relationship among the input, processing, and output of an accounting information system. 3-4 .
Program Flowcharts A program flowchart illustrates the sequence of logical operations performed by a computer in executing a program. Some of the computer programs are COBOL (Common Business Language), FORTRAN, and RPG from the old days. COBOL is still being used in many large organizations. Now, there is C++ and Java. Multiple Choice 2 Which of the following statements is FALSE? a. A flowchart is an analytical technique used to describe some aspect of an information system in a clear, concise, and logical manner. b. Flowcharts use a standard set of symbols to describe pictorially the flow of documents and data through a system. c. Flowcharts are easy to prepare and revise when the designer utilizes a flowcharting software package. d. A system flowchart is a narrative representation to identify system weaknesses. e. A program flowchart shows the logic used in computer programs.
Learning Objective Three Prepare and use data flow diagrams to understand, evaluate, and document information systems.
Data Flow Diagrams A data flow diagram (DFD) graphically describes the flow of data within an organization. Elements in a Data Flow Diagram (Figure 3-1, p. 87 of the book) Four Basic Elements: 1.
Data sources and destinations
2.
Data flows
3.
Transformation processes
3-5 .
4.
Data stores
5.
Internal Control
Data flow diagram symbols shown in Figure 3-7 on page 95: Data sources and destinations
Data flows Transformation processes Data stores Internal Control Figure 3-8 on page 96 shows the basic data flow diagram elements between data source, process, and data destination. Data Sources and Destinations Data sources and data destinations are represented by squares, as illustrated by items A (customer), J (bank), and K (credit manager) in Figure 3-9 on page 97. A data flow represents the flow of data among processes, data stores, and data sources and destinations. Processes represent the transformation of data. Figure 3-9 shows that process payment (c) takes the customer payment and splits it in to the remittance data and the deposit (which includes the checks and deposit slip created within process payment). A data store is a temporary or permanent repository of data. Subdividing the Data Flow Diagram The highest-level data flow diagram is referred to as a context diagram. A context diagram provides the reader with a summarylevel view of the system. Figure 3-11 (p. 98) provides an example of the data flows at this summary level. Focus 3-3 on Page 99 Guidelines for Drawing a Data Flow Diagram 1.
Understand the system.
2.
Ignore certain aspects of the system.
3.
Determine system boundaries.
4.
Develop a context diagram.
5.
Identify data flows. 3-6 .
6.
Group data flows.
7.
Identify transformation processes.
8.
Group transformation processes.
9.
Identify all files or data stores.
10.
Identify all data sources and destinations.
11.
Name all data flow diagram elements.
12.
Subdivide the data flow diagram.
13.
Give each process a sequential number.
14.
Repeat the process.
15.
Prepare a final copy.
Multiple Choice 1 A DFD is a representation of which of the following? a. Relationship among modules, data, and programs of an AIS b. Flow of data in an organization c. Decision rules in a computer program d. Computer hardware configuration
Answer to Multiple Choice Questions: Multiple Choice Question Answers Number Answer 1 B 2 D 3 B
3-7 .
CHAPTER 4 RELATIONAL DATABASES Instructor’s Manual Learning Objectives: 1. Explain the importance and advantages of databases, as well as the difference between database and file-based legacy systems. 2. Explain database systems, including logical and physical views, schemas, the data dictionary, and DBMS languages. 3. Describe what a relational database is and how it organizes data, and how to create a set of well-structured relational database tables. 4. Query a relational database using visual methods as well as using structured query language. Questions to be addressed in this chapter: 1. What is a database system, and how is this different from fileoriented systems? 2. What is a relational database? 3. How do you design a well-structured set of tables in a relational database? 4. How do you query a relational database system?
Introduction The emphasis in this chapter will be on understanding the structure of a relational database system. Databases and Files Figure 4-1 on page 120 provides a comparison of file-oriented versus database systems. A key concept to remember is that fileoriented data stays in the originating department whereas the database approach is an organizational resource used by the entire organization. Most firms developing new systems and applications for use in today’s business environment choose the database approach to data management. Data independence, a critical feature of the database approach, is the separation of data from the program applications that access and process the data. Data independence is achieved by interposing the database management system (DBMS) software between the database and the users of the data (e.g., the application programs). 4-1 .
A DBMS acts as an interface between the database and the various application programs. As technology improves many companies are developing very large databases called data warehouses which are used as analysis (and not transaction processing) to provide support for strategic decision making. A file, as described in the back of our book in the glossary, is a set of logically related records, such as the payroll records of all employees. A database is a set of interrelated, centrally coordinated data tables stored electronically with as little data redundancy as possible. Figure 4-2 on page 120 shows the basic elements of data hierarchy. Fields contain data about one customer such as the customers address, customer name, and so on. All the fields for one customer form a record (e.g., customer record). A set of related records, such as all customer records, forms a table (e.g., customer table). A set of interrelated tables forms a database (e.g., a customer sales database may include customer table, inventory table, and sales table). We use the term database to mean the collected data sets that are organized and stored as an integral part of an organization’s computer-based information system. Data analytics is discussed more fully in Chapter 7. Three techniques are introduced here: 1. Business Intelligence is the analysis of large amounts of data for strategic decision making. 2. Online analytical processing (OLAP) is the process of using queries to investigate hypothesized relationships among data. 3. Data mining is the process of analyzing data repositories for unhypothesized relationships in the company’s data and business processes using sophisticated statistical analysis.
Learning Objective One Explain the importance and advantages of databases, as well as the difference between database and file-based legacy systems.
4-2 .
The Importance and Advantages of Database Systems Note to Students: Many job announcements for accounting positions require the knowledge and skills from experience in using databases and data analytics. Understanding the data structure of an AIS is critical when you need to create custom reports.
Most accounting students will audit or work for a company that uses database technology to store, process, and report accounting transactions. Database technology is widespread because it provides organizations with the following benefits: 1. Data integration: Integration is achieved by combining files into larger “pools” of data that many application programs can access. An example is an employee database that consolidates data formerly contained in payroll, personnel, and job skills master files. This makes it easier for information to be combined in unlimited ways. 2. Data sharing: Integrating data makes it easier to share data with all authorized users. 3. Minimal data redundancy and data inconsistencies: Because data items are usually stored only once, data redundancy and data inconsistencies are minimized. 4. Data independence: Because data and the programs that use them are independent of one another, each can be changed without having to change the other. This makes programming easier and simplifies data management. 5. Cross-functional analysis: In a database system, relationships, such as the association between selling costs and promotional campaigns, can be explicitly defined and used in the preparation of management reports. Note to the Instructor: This additional benefit could be added that is not mentioned in the book: One-time Data Entry and Storage: In the database approach to data management, data are input into the database once, stored in a particular location, and available for use by multiple applications and users. Multiple Choice 1 4-3 .
A customer’s name would be a: a. database b. table c. field d. record Multiple Choice 2 Which of the following would be identified as a table? a. A customer’s name b. Data about one customer c. All inventory records d. Data about one inventory item Multiple Choice 3 Which of the following is not an advantage of database systems? a. Data sharing b. Data independence c. Data privacy d. Data integration For class discussion: How would sales data information be used in the following management positions? Sales Manager Marketing Manager Purchasing Manager Manufacturing Manager Accounting Manager The reason for this discussion is to get the class to think broader about how the same information is useful within different contexts. For example, the sales manager may use sales information to examine two different commission plans before making a final decision. The purchasing manager may use sales information to help predict demand for certain products. The manufacturing manager may use sales information to help plan for product production. It is also good to tie this into a discussion of why it’s important to have good quality data. This may be a good time to discuss rights to data by posing the question of who should have access to the particular elements within sales data.
Learning Objective Two Explain database systems, including logical and physical views, schemas, the data dictionary, and DBMS languages.
4-4 .
Database Systems Logical and Physical Views of Data Figure 4-3 on page 122 provides an example of a record layout of an accounts receivable table. The logical view is how the user or programmer conceptually organizes and understands the data. The physical view refers to how and where the data are physically arranged and stored in the computer system. Figure 4-4 on page 123 provides two logical views of data. As shown in Figure 4-4, DBMS software handles the link between the way data are physically stored and each user’s logical view of the data.
Schemas A schema describes the logical structure of a database. Three levels of schemas: the conceptual, the external, and the internal. Figure 4-5 on page 124 provides the three levels of schemas. The conceptual-level schema is the organization-wide view of the entire database. The external-level schema consists of a set of individual user views of portions of the database, each of which is also referred to as a subschema. The internal-level schema provides a low-level view of the database. It describes how the data are actually stored and accessed, including information about record layouts, definitions, addresses, and indexes.
The Data Dictionary The data dictionary contains information about the structure of the database. The data elements composing the database are fully described in a data dictionary, which serves as a repository containing facts about the structure of the data elements employed in applications. Table 4-1 on page 125 provides an example of a data dictionary. The data dictionary is a useful document to refer to when you are creating queries or customized reports. 4-5 .
For class discussion: As students are learning about structure and relationships of data tables in a database, it is important to remind them that not extracting the right information can lead to poor decisions. For example, if the accountant was reviewing sales returns and pulled the following information: Return date Item returned Price This information may appear to be normal sales return information, from a comparison of period to period; however, adding the field store #, and/or salesperson #, the accountant may discover that one store, or one particular salesperson has a higher amount of sales returns compared to others. A further examination of the detail may indicate fraudulent activity.
DBMS Languages The data definition language (DDL) is used to (1) build the data dictionary, (2) initialize or create the database, (3) describe the logical views for each individual user or programmer, and (4) specify any limitations or constraints on security imposed on database records or fields. The data manipulation language (DML) is used for data maintenance, which includes such operations as updating, inserting, and deleting portions of the database. The data query language (DQL) is used to interrogate the database. The DQL retrieves, sorts, orders, and presents subsets of the database in response to user queries. A report writer is a language that simplifies report creation.
4-6 .
Note to the Instructor: The additional definition and additional uses that were not included in the book could be provided to the students: A database control system (DBCS) controls the various components of the DBMS. For example, the DBCS creates and manages the structure used for storing the data. It also creates the necessary support components that allow simultaneous multiple-user access to the data. In addition to the functions provided by these components, many DBMS packages allow users to: 1. 2. 3.
Analyze data and create ad hoc or customized reports Create and display graphs Create customized applications via host programming languages 4. Import and export data and images from other packages 5. Perform online data editing 6. Purge or archive obsolete data 7. Consolidate redundant master file records 8. Back up data 9. Maintain other security measures 10. Interface with communications networks
Multiple Choice 4 The data view that shows how the user or programmer conceptually organizes and understands the data is the: a. record layout view b. logical view c. physical view d. none of the above Multiple Choice 5 Which of the following statements is FALSE? a. The data dictionary contains information about the structure of the database. b. The internal-level schema provides a high-level view of the database. c. The DDL is used to build the data dictionary. d. The conceptual-level schema is the organization-wide view of the entire database. Multiple Choice 6 The way data are physically arranged and stored in the computer system is the: a. physical view b. logical view 4-7 .
c. schema view d. system view
Learning Objective Three Describe what a relational database is, how it organizes data, and how to create a set of well-structured relational database tables.
Relational Databases A data model is an abstract visual representation of the contents of a database. The relational data model represents everything in the database as being stored in the form of tables such as the one shown in Table 4-2 on page 126. Technically, these tables are called relations (hence the name relational data model), but we will use the two words interchangeably. Each row in a relation, called a tuple, contains data about a specific occurrence of the type of entity represented by that table. For example, each row in the inventory table in Table 4-2 contains data about a particular inventory item that S&S carries. Types of Attributes A primary key is the attribute, or combination of attributes, that uniquely identifies a specific row in a table. The primary key for the inventory table in Table 4-2 is the Item Number. A foreign key is an attribute in a table that is a primary key in another table. Foreign keys are used to link tables. For example, the Inventory table in Table 4-2 has a foreign key of Vendor number (VendorID is a primary key in the Vendor table.) By having this foreign key, we can create a relationship between the Inventory table and the Vendor table. Multiple Choice 7 In a Sales Table, the most likely primary key would be: a. sales invoice ID b. inventory item ID c. customer ID d. customer name Multiple Choice 8 4-8 .
In an inventory table, the most likely nonkey column(s) would be: a. item number b. color c. price d. b and c e. a and c
Designing a Relational Database for S&S, Inc. Option 1: Store All Data in One Uniform Table. This data is provided in Table 4-3 on page 128 This approach has several disadvantages: 1. It creates a great deal of redundancy in terms of stored data. For example, because there are three separate inventory items sold, the sales invoice number 102 is listed three times with the invoice and customer data is repeated each time an item is sold. 2. The second problem that can occur is referred to as an insert anomaly, because there is no way to store information about prospective customers until they actually make a purchase. 3. A third problem that can occur is referred to as an update anomaly, changing the customer data would require reviewing the entire table and selecting each occurrence for that one change. This may be difficult and result in errors in the database. 4. A final problem that can occur is referred to as a delete anomaly, in which unintended consequences can occur. For example, deleting one transaction may remove information about a customer. Note to the Instructor: A good way to reinforce the concepts of insert, update, and delete anomalies is a simple spreadsheet and physically identify the issues above showing the problems.
Option 2: Vary the Number of Columns This data is provided in Table 4-4 on pages 129. In this option, the data storage is to record the sales invoice and customer information just once. This required additional items which required four additional columns:
4-9 .
1. Item 2. Quantity 3. Unit Price 4. Extended Amount We still have disadvantages. This approach does not reduce some of the redundancy and some of the anomalies associated with the data storage scheme illustrated in Table 4-4. This table is set up for the sale of three items. What happens if eight items are sold? This would require 40 columns! Now we are going to have even more columns to add three more items. The problems associated with Options 1 and 2 in Tables 4-3 and 44 can be solved with a relational database (a set of tables). Basic Requirements of a Relational Database 1. Every column in a row must be single valued. 2. Primary keys cannot be null. 3. Foreign keys, if not null, must have values that correspond to the value of a primary key in another table. 4. All nonkey attributes in a table should describe a characteristic about the object identified by the primary key. A set of relational databases are provided in Table 4-5 on page 130. As shown in Table 4-5, we now have more than one table that have relationships: 1. Sales Table 2. Sales_Inventory Table 3. Inventory Table 4. Customer Table Primary key is the attribute, or combination of attributes, that uniquely identifies a specific row in a table. As a result, the value for a primary key cannot be blank (null). If it was blank, then there would be no way to identify a specific row and retrieve any data. The entity integrity rule ensures that every row in every relation must represent data about some specific object in the real world.
4-10 .
Foreign keys are used to link rows in one table to rows in another table. Refer to the lines and arrows in Table 4-5. CustomerID can link each sales transaction with the customer who participated in that event only if the Sales table CustomerID value corresponds to an actual customer number in the Customer table. This is referred to as the referential integrity rule that ensures the consistency of the database. For example, the customer number is a foreign key in the sales table that relates to the customer number that is a primary key in the customer table. Note to the Instructor: Students sometimes have difficulty understanding the referential integrity rule, and it may be easier to explain in terms of master files and transaction files and demonstrate it in class using MS Access. For the example above, the master file is customer table and the transaction file is the sales table. To keep track of all customer sales transactions, it will require that a customer has been set up in the customer file first (master file) before you can enter the sales transaction. Demonstrating this in MS Access requires that your relationships between the tables “Enforce Referential Integrity.” Thus, by entering a sales transaction that does not have a customer number existing from the Customer Table will give an error message. Foreign keys can have a null value. Some customers that pay cash may not want to give up their identity which would allow a company to track them. Therefore, there will be some customer number fields that will be left blank. Nonkey attributes are items in a table that are neither a primary key nor a foreign key. As previously described as the fourth basic requirement for a relational database, all nonkey attributes in a table should describe a characteristic about the object identified by the primary key. Two Approaches to Database Design One approach is called normalization, which starts with the assumption that everything is initially stored in one large table. A normalized database means that it is free of update, insert, and delete anomalies. Another alternative way to design well-structured relational databases involves semantic data modeling. Under this approach, the database designer uses knowledge about how business processes typically work and about the information needs associated with transaction processing to draw a graphical picture of what should be included in the database. The resulting figure can then be directly used to create a set of relational tables that are in third normal form (3NF). Refer to the website for the third normal form. 4-11 .
Multiple Choice 9 Which of the following is not a basic requirement of a relational database? a. Every column in a row must be single valued. b. Primary keys cannot be null. c. Foreign keys, if not null, must have values that correspond to the value of another foreign key in another table. d. All nonkey attributes in a table should describe a characteristic about the object identified by the primary key. e. All of the above are basic requirements of a relational database.
Creating Relational Database Queries In the text we demonstrate creating queries using the QBE and SQL interfaces. While some may think that the QBE interface is sufficient for all queries, we note that even moderately complex queries overwhelm the QBE interface. Additionally, becoming proficient in the SQL language allows your query skills to be transportable across all relational database products.
Note to the Instructor: If students want to follow along with the five queries and create these queries; they need to first bring up this website: http://www.pearsonglobaleditions.com Next, the students need to follow the following steps: 1. Left click on “Student Download Page” under “Accounting Information Systems 15/e.” 2. Click on “Case and Problem Spreadsheets” 3. Click on “Chapter 4” 4. This will give the student the Chapter 4 Relational Database with “Customer,” “Inventory,” “Sales” and “Sales_Inventory” to be used to follow along and practice.
Query 1. List the invoice numbers, dates, and salesperson for sales made to Lola Doyle. We are using the Sales and Customer Tables for this Query. We determine that these are the appropriate tables by examining the fields that are needed for output as well as examining the criteria fields. Studying the logical model we see that the needed fields are in the two tables and that the tables are connected by a primary key/foreign key pair. Next, we select the columns from each Table to be included in the Query. Note the Sales Table Primary Key is SalesInvoiceID and the Foreign Key is the CustomerID which is the Primary Key for the Customer Table.
4-12 .
Both QBE and SQL solutions are shown in Table 4-7 on page 134. The Sales and Customer Tables, and the Results of the Query are shown in Table 4-8 on page 135. Query 2. List the SaleDate, Description, and Quantity for each transaction in which refrigerators were sold in October. This query involves the Sales, Sales_Inventory, and Inventory tables. We determined that these were the appropriate tables by identifying the fields desired for presentation as well as the criteria fields. Examining the logical model is always a good starting place for determining which tables to include in the query. Students should be able now to determine the Primary Keys and the Foreign Keys involved. The Completed Query 2 and Query 2 Answer are provided in Table 410 on page 136. Query 3. How many refrigerators were sold in October? This query builds off of query 2 and introduces aggregating data across rows. As with query 2 we are using three tables; Sales, Sales_Inventory, and Inventory tables. The inclusion of an aggregation now displays a “total” line in the QBE view. In the SQL view the aggregate action occurs primarily in the SELECT clause. With an aggregate action, you may now use GROUP BY and HAVING as needed to complete your query. In this case GROUP BY isn’t needed as the query requests a single number… the number of refrigerators. The Completed Inquiry 3 and Query 3 Answer are provided in Table 4-12 on page 138. Table 4-13 highlights the difference between a non-aggregate and aggregate query in the SQL view. Query 4. This query asks for the description and quantity sold for inventory items that sold 2 or more units. We will be using the Sales, Sales_Inventory, and Inventory tables again. Consider that this query builds upon query 3. Query 3 had an aggregate expression without any grouping, so it produced a single row of output. By adding a grouping (Group By in the “total’ line of QBE or GROUP BY statement in SQL), a row of output will be produced for each grouping. For this query, we want a group (sum) for each inventory item. In the example the field Inventory.Description is used for the grouping field. While this works for this example, it would have been better to group by the Inventory.ItemID field as it uniquely identifies an inventory item. The Description field may produce incorrect results if two or more inventory items have the same description. With the grouping complete, if you ran the query you will get a list with a sum of quantity sold for each inventory item. We are not yet finished, as we want to limit the output to those items that have sold two or more. This query is designed to show the HAVING clause. You cannot use the WHERE clause to limit the output as the computed total is not yet available when the WHERE clause operates. See note below.
4-13 .
Note to instructor: For instruction simplicity and clarity of thought, we recommend telling students to think of SQL being executed in the following order: 1. FROM collects the tables and joins them together 2. WHERE filters the rows based on criteria 3. SELECT selects the columns to display 4. GROUP BY performs aggregate actions 5. HAVING filter aggregated rows based on criteria This ordering helps students see the bigger picture by 1. identifying the tables, creating linkages, 2. applying criteria, 3. selecting columns, and then 4. and 5. doing aggregate actions. Keep in mind that this is just a good way to think of how SQL operates and is not intended as a ‘fact’. Each vendor’s SQL engine has its own optimization techniques. The computed total is available after the execution of the GROUP BY. The HAVING can then filter based on computed aggregate values. The Completed SQL for query 3 and 4 are presented in Table 4-13 in order to contrast the single aggregate of query 3 with the grouped aggregate of query 4. The completed Query 4 and Query 4 Answer are provided in Table 4-14 on page 139. Query 5. Lists the SaleDate and InvoiceTotal for each invoice. It is designed to build off of Query 4. The added element in Query 5 is the demonstration of mathematical operations between fields within a row. In this case the students will need to compute the extended price of an item, which is Quantity * SoldPrice. This row total is computed in the SELECT clause and could be presented as an Extended Amount. However, as this query asks for an invoice total, the calculated field needs to be summed for each invoice. Thus, there may be some confusion of whether a calculated amount must be inside of a SUM as it is in this example. Clearly calculated amounts do not need to be inside of aggregate functions. They may stand on their own and be aliased with the AS clause. The Completed Query 5 and Query 5 Answer are provided in Table 415 on page 141. Multiple Choice 10 Which tables were needed in the query that answered the question: “How many ranges were sold in October?” a. Sales table b. Inventory table c. Sales_Inventory table d. All of the above e. a and c
Database Systems and the Future of Accounting The most significant effect of database systems will be in the way accounting information is used in decision making. 4-14 .
Relational databases, however, provide query languages that are powerful and easy to use. Managers can concentrate solely on specifying what information they want and query the database or use the query to build a custom report. Why is this important? Because the database creates flexibility and while most businesses may be similar on the surface (they do sales and purchase goods and services); underneath they may be very unique in how they get things done which gives them competitive advantage. Finally, relational DBMSs provide the capability of integrating financial and operational data.
Answer to Multiple Choice Questions: Multiple Choice Question Answers Number Answer Number Answer 1 C 6 A 2 C 7 A 3 C 8 D 4 B 9 E 5 B 10 D
4-15 .
CHAPTER 5 Introduction to Data Analytics in Accounting Instructor’s Manual Learning Objectives: 1. Explain what makes a good question and evaluate questions relative to the SMART framework. 2. Describe the extract, transform, and load (ETL) process and key components of each step of the process. 3. Explain the differences between descriptive, diagnostic, predictive, and prescriptive analytics. Understand the situations for which each type of analytic is appropriate. 4. List the principles that lead to high-quality data visualizations. 5. Describe how automation interacts with the analytics mindset and when data analytics is not the right tool for making a decision.
Introduction Data is more prevalent, easier to analyze, and increasingly important in business. These changes have led people to talk about big data which are data sets characterized by huge amounts of data (data volume), in various formats (data variety), and for which the quality may be suspect (data veracity). These “V’s” combined with data velocity (the pace at which data is created and stored) represent the 4 V’s of big data. The 4 V’s of big data are changing business and accounting. Focus 5-1 on page 164 discusses how accountants must change in this emerging world. A key to this change, is that accountants must focus on developing new mindsets, which is a mental attitude, a way of thinking, or a frame of mind. In particular, the analytics mindset is key to navigating big data and being a successful accountant of the future. The analytics mindset (as defined by Ernst and Young or EY) is the ability to Ask the right questions. Extract, transform, and load relevant data. Apply appropriate data analytic techniques. Interpret and share the results with stakeholders. Although this is a “new” mindset, it is worth pointing out to students that this mindset parallels the scientific method and is a time-honored method for knowledge acquisition. The entire chapter (and chapters 6 and 7) build off the idea of the analytics mindset. Multiple Choice 1 A key competency that accountants and business professionals must develop in the age of big data is which of the following? 5-1 .
a. Analytics mindset b. Big data mindset c. The ETL mindset d. The SMART mindset
Learning Objective One Explain what makes a good question and evaluate questions relative to the SMART framework.
Ask the Right questions Asking the right questions is the first step of the analytics mindset. Good questions follow the SMART framework. The SMART acronym is defined as • Specific: needs to be direct and focused to produce a meaningful answer. • Measurable: must be amenable to data analysis and thus the inputs to answering the question must be measurable with data. • Achievable: should be able to be answered and the answer should cause a decision maker to take an action. • Relevant: should relate to the objectives of the organization or the situation under consideration. • Timely: must have a defined time horizon for answering. Note to Instructor: you can have students practice developing good questions by giving them a context and having them design questions that fit the SMART framework. For example, the context could be an external auditor visiting with several employees to understand the “tone at the top” of the organization. Students can ask questions and then discuss how to improve them using this framework. Here is an example: Initial question: “How is the tone at the top?” o Improvements: (specific) “How does the CEO communicate the following internal controls are important or unimportant?” o Improvements: (measurable) “How often do employees complete training related to making ethical decisions?” o Improvements: (timely) “During the last year, how many times did the CEO not follow a rule or encourage another employee to not follow a rule?”
Multiple Choice 2 Which of the following is not one of the SMART question criteria: 5-2 .
a. Achievable b. Specific c. Timely d. Reliable
Learning Objective Two Describe the extract, transform, and load (ETL) process and key components of each step of the process.
Extract, Transform, and Load Relevant Data The ETL process is a set of procedures for preparing data. The acronym stands for extract, transform, and load data. Given how important the ETL process is, the AICPA has developed a set of Audit Data Standards to help with this process. You can review these standards at https://www.aicpa.org/interestareas/frc/assuranceadvisoryservices/audit datastandards.html. The voluntary standards provide guidance so that computer systems can be designed to output client data in a standard format and then the auditor can more easily import the data into tools for analysis.
Extracting Data Extracting data follows a three step process: 1. Understand data needs and the data available. 2. Perform the data extraction. 3. Verify the data extraction quality and document what you have done. In understanding data, it is important to understand the following principles about data. Data comes in several different forms, including structured data, unstructured data, and semi-structured data. Structured data is data that is highly organized and fits into fixed fields. Semi-structured data is data that has some organization but is not fully organized to be inserted into a relational database. Unstructured data is data that has no uniform structure. Some examples of each are as follows: Structured data: financial data such as debit and credit amounts, sales records, customer information (e.g., name, address, phone number, etc.)
Semi-structured data: email, XML data, CSV files
Unstructured data: pdf files, images, video recordings 5-3 .
Data is usually stored in organizations in several different structures, including data warehouses, data marts, and data lakes. Figure 5-1 on page 167 shows various ways that these data structures can be built. Data warehouses are very large databases containing detailed and summarized data for a number of years used for analysis rather than transaction processing (defined in Chapter 4). Data marts hold structured data for a subset of the organization (e.g., for a region). Data lakes are a collection of structured, semi-structured, and unstructured data stored in a single location. Data lakes typically hold all data in an organization and relevant data from outside an organization (e.g., social media data). When information the organization has collected and stored that would be useful for analysis but is not analyzed and is thus ignored is called dark data. Most estimates suggest that most data in an organization is dark data. For example, IBM estimates that 90% of data generated by sensors and analog-to-digital conversions is dark data. Data swamps are repositories that are not accurately documented so that the stored data cannot be properly identified and analyzed. To help reduce the likelihood of dark data and data swamps, companies should document metadata in data dictionaries. Metadata is data that describes data and examples include what type of data is allowed in a field, the format of data, etc. Extracting data can be a very time consuming process. Chapter 6 focuses much more specifically on this topic. Some basic principles students should understand from this chapter relate to flat files, delimiters, and text qualifiers. A flat file is a text file that contains data from multiple tables or sources and merges that data into a single row. For example, a relational database would show data for customers and their purchases separated into three tables (as shown in the figures below): Figure: Snippets of Relational Database Tables for Customers and Orders
5-4 .
In contrast, a flat file might combine the information about customers in multiple different tables into a single table of information (often displayed in Microsoft Excel or a query output) as follows:
Note, that often flat files reduce the information in a relational database through aggregation (e.g., sum, median, max, etc.). Or, flat files will violate the design principles of a relational database discussed in Chapter 4 (e.g., a flat file may contain redundant customer information). When flat files are saved, the computer system needs to somehow determine which information is stored in each column. To do this, computers use delimiters and text qualifiers. Table 5-1 on page 169 contains examples of delimiters and text qualifiers. Delimiters are a character, or series of characters, that marks the end of one field and the beginning of the next field. The most common delimiters (delimiter is listed between “”) are a space “ “ and a comma “,”. However, neither of these are very useful because they are commonly used in normal writing. Thus, the audit data standards recommend using a pipe “|”. A text qualifier are two characters that indicate the beginning and ending of a field and tell a computer program 5-5 .
to ignore any delimiters contained between the characters. The most common text qualifier are beginning and ending quotes “”. Note to Instructor: a class exercise can be to put examples of data on the screen (or in a handout) and have students identify the text qualifiers and delimiters. Identifying delimiters and text qualifiers will help students look for patterns in data that can be useful for the ETL process. Here are a few examples: Example 1 Flat file, Header Row: InventoryNo InventoryName MaxUnitsSold CostPerUnit Flat file, Data Row: 1001 ‘Unique Bargains Barb Eyeless 10# Hooks’ 25 $5.23 1002 ‘10Pcs Rod Tip Clamp Fish Bite Lure’ 15 $9.52 Solution: The delimiter is a space “ “, and the text qualifier are single quotes ‘’ Example 2 Flat file, Header Row: CustNo@ @FirsName@ @LastName@ @Email@ @StreetAddress Flat file, Data Row: 100@ @Larry@ @Blackhurts@ @lbst@rigg.com@ @44 Crab Avenue, West Chicago IL 60185 101@ @Odette@ @Schlochindorf@ @swasing@timi.com@ @765 Olive Tree Circle, Kennewick, WA 99337 Solution: The delimiter is “@ @” and there is no text qualifier. This can be a tricky one to show students. In this case the email address is not a problem because the delimiter is three characters “@ @” and email addresses only have a single @ sign and no space. So, a text qualifier is not needed. This is not a likely case used in practice, but it helps students to understand what is and is not a delimiter and text qualifier.
Transforming Data There are four steps to transforming data: 1. Understand the data and the desired outcome 2. Standardize, structure, and clean the data 3. Validate data quality and verify data meets data
requirements 4. Document the transformation process These steps are not always sequential and may need to be performed multiple times iteratively. It may be the case that as data is cleaned and transformed objectives change and the data will have to be further refined. Chapter 6 goes into these steps in much more detail. 5-6 .
Loading Data Typically when data has been extracted and transformed well, the data loading process is a relatively simple process. However, data loading often reveals errors in the transformation steps as the data is not accepted correctly into the new system. Also, a key step that is often skipped in loading data is providing high quality documentation of what the loaded data means, so users of the data do not make mistakes in using the data. A simple loading exercise that can be done in class is to save data as a CSV file (or other delimited file) and then have the students load the data into Excel (or use Excel and have the students load the data into a program like Access). The students can set the delimiters and understand how the program “reads” the CSV data and interprets it. The original CSV file can contain a few errors, such as extra data on a line, an extra delimiter, and the students can visually see how the program reacts when trying to load it. Multiple Choice 3 Which of the characters would be best to use as a delimiter for financial data? a. $ (dollar sign) b. ~ (tilde) c. % (percentage sign) d. - (minus sign) Multiple Choice 4 Which of the following types of data is most likely to properly use delimiters and text qualifiers? a. Dark data b. Unstructured data c. Semi-structured data d. Structured data
Learning Objective Three Explain the differences between descriptive, diagnostic, predictive, and prescriptive analytics. Understand the situations for which each type of analytic is appropriate.
Apply Appropriate Data Analytic Techniques Data analytics can be categorized into four categories: 1. Descriptive analytics: information that results from the examination of data to understand the past, answers the question “what happened?” 5-7 .
2. Diagnostic analytics: information that results from the examination of data to determine causal relationships, answers the question “why did this happen?” 3. Predictive analytics: information that results from analyses that focus on predicting the future, answers the question, “what might happen in the future?” 4. Prescriptive analytics: information that results from analyses to provide a recommendation of what should happen, answers the question “what should be done?” Each of these analytics is covered in more depth in Chapter 7. Some things to help students understand that all of these are used in practice, but they are typically used most in the following order: descriptive, diagnostic and predictive, prescriptive. Also, diagnostic and predictive analytics are related in that if you understand what causes something, you then are better able to predict the future. The difference is whether you are trying to understand “why” something happens (diagnostic) or explicitly trying to predict the future (predictive). Often, companies will perform diagnostic analytics first and then build predictive analytic models. Also, predictive analytics and prescriptive analytics are closely related. To perform a prescriptive analytic, you must have a predictive analytic. That is, a model or algorithm will predict something and then the prescriptive analytic decides what to do or makes a recommendation based on that prediction. A few examples of each type of analytic follows: 1. Descriptive analytics: common financial ratios such as earnings per share, inventory turnover ratios, profitability ratios, etc. 2. Diagnostic analytics: often statistical analyses such as using regression to see if one thing causes (or more often is associated with) another. Seeing if more frequent maintenance reduces manufacturing defects, testing if weather events cause employee happiness which then causes performance differences. 3. Predictive analytics: all forecasting analytics are examples of predictive analytics (sales forecasts, EPS forecasts, stock price forecasts, etc.) 4. Prescriptive analytics: these are often models that provide a recommendation. Machines are increasingly monitored with sensors and metrics that will predict when the machine might fail and make the recommendation to perform maintenance or replace the machine. When making credit approval decisions, a company will gather various data to predict how likely a customer will be a “good” customer that pays and then make a recommendation to accept or not. The chapter also provides discussion of future skills that students will need, see Figure 5-2 on page 172. These skills are likely to change over time. The key point to make to students is that the accounting profession requires continual learning and development. Also, the predicted most valuable skills of the future accountant relate to improving with technology and data. Multiple Choice 5 A company develops a computer program to replace stock analysts that makes stock purchasing recommendations based on financial statement 5-8 .
data and social media information. This is an example of which type of analytic? a. Descriptive b. Diagnostic c. Predictive d. Prescriptive analytics Multiple Choice 6 In order to create a computer program that predicts customer demand in a restaurant, a data analyst tests to see if different sport seasons cause more customers to go out to eat. The data analyst computed which type of analytic? a. Descriptive b. Diagnostic c. Predictive d. Prescriptive analytics
Learning Objective Four List the principles that lead to high-quality data visualizations.
Interpret and Share the Results with Stakeholders Interpreting Results Interpretation of results is a very important step of the analytic mindset. While on the surface level, it seems obvious, this step can result in significant differences in interpreting the data. One way to help teach students about this topic, is to provide a mini case study and assign half the class to take one role and the other class to take a different role. This is often done in academic studies. 1 At the end of this section, a case study used in the Burton, Emett, Simon, and Wood (2012) article (citation contained in the footnote) is provided that can be used for this type of activity. Sharing Results This chapter introduces this topic. It is covered in much more depth in chapter 7. Results are often shared using data visualizations in data dashboards by using data storytelling. Data visualization is the use of a graphical representation of data to convey meaning. A data dashboard is the display of important data points, metrics, and key performance indicators in easily understood data visualizations. Data storytelling 1
For example, see the following: Ahlawat, S. S., & Lowe, D. J. (2004). An examination of internal auditor objectivity: In-house versus outsourcing. Auditing: A Journal of Practice & Theory, 23(2), 147-158. Burton, F. G., Emett, S. A., Simon, C. A., & Wood, D. A. (2012). Corporate managers' reliance on internal auditor recommendations. Auditing: A Journal of Practice & Theory, 31(2), 151-166.
5-9 .
is the process of translating often complex data analyses into more easily understood terms to enable better decision making. The key to sharing results depend on following good data visualization principles. The following principles are basic, key principles for sharing results successfully: Choosing the right type of visualization. Simplifying the presentation of data. Emphasizing what is important. Representing the data ethically. For teaching purposes, you can display various data visualizations found on the internet and discuss how they used these principles. Some examples of high quality visualizations can be found at the following links: https://public.tableau.com/en-us/gallery/?tab=viz-of-theday&type=viz-of-the-day The visualization company Tableau provides daily good visualizations. https://piktochart.com/data-visualization-examples/ Perform a web search for “Best Data visualizations of YEAR” and you will find many additional examples. Some examples of poor data visualizations can be found at the following links: https://flowingdata.com/category/visualization/uglyvisualization/ https://www.businessinsider.com/the-27-worst-charts-of-all-time2013-6#burger-king-has-3-times-as-much-in-sales-than-starbucksit-makes-sense-that-its-three-times-taller-but-the-fact-that-itsarea-is-nine-times-that-of-starbucks-shows-why-this-chartexemplifies-everything-that-is-wrong-with-charts-that-try-toincorporate-cutesy-graphics-2 http://livingqlikview.com/the-9-worst-data-visualizations-evercreated/ Perform a web search for “Worst Data visualizations of YEAR” and you will find many additional examples. Multiple Choice 7 Which of the following is not a problem have with interpreting data correctly: a. Mistaking correlation for causation b. Confirmation bias c. Data overload d. All the above are problems Multiple Choice 8 Which of the following statements is FALSE: a. Data storytelling allows a person to make the data say anything s/he wants to achieve his/her objective. b. Data dashboards show multiple visuals to tell a complete story. c. Data interpretation can differ between individuals for nonnefarious reasons. 5-10 .
d. Data visualization often communicates information more quickly and in a more memorable fashion than using text.
Learning Objective Five Describe how automation interacts with the analytics mindset and when data analytics is not the right tool for making a decision.
Additional Data Analytics Considerations Automation is the application of machines to automatically perform tasks once performed by humans. Automation has increased as computing resources have become less expensive and more powerful, and as computer scientists have developed better algorithms for performing tasks. Within accounting, robotic process automation (RPA) is making significant inroads. You can find more about the state of RPA in accounting by reviewing the article at https://doi.org/10.2308/acch52466 (Cooper, L. A., Holderness Jr, D. K., Sorensen, T. L., & Wood, D. A. (2019). Robotic process automation in public accounting. Accounting Horizons, 33(4), 15-35.). Focus 5-2 on page 175 provides a discussion of how automation can change and not change an industry. This discussion can lead to a nice classroom discussion on the strengths and weaknesses of automation in accounting. In this discussion, it is worth noting that the tasks that are the easiest to automate are those that are rules-based and stable. They are also more likely to be automated if they are frequently performed and time consuming. This can help students realize the importance of education, especially learning how to do challenging, judgment-oriented tasks. Note to Instructor: If your students are unfamiliar with RPA, you may choose to do a quick in class demo showing students how RPA works. Alternatively, You could have the students watch a video such as https://www.uipath.com/solutions/process/finance-and-accountingautomation to understand what RPA can do in business.
The chapter concludes with the caution that data analytics is not always the right tool for decision making. Although the chapter focuses on data analytics, it is important to emphasize to students the situations where data analytics might not be the best tool for decision making. A few examples where data analytics are not appropriate include ethical decisions (even if the data says to do something wrong, you should not do it), times where there is no data, and for hard to measure decisions (however, defining this is difficult because often better measures can be captured). Multiple Choice 9 Choose the best answer, the creation of a “bot” is related to which of the following words? 5-11 .
a. Dark data b. Data visualization c. Robotic process automation (RPA) d. The extract, transform, and load (ETL) process Multiple Choice 10 Which of the following is a situation where data analytics is better than using human judgment to inform or to make a decision? a. There is not enough data for estimating an analytic. b. Making an ethical judgment. c. Data cannot measure a phenomenon well. d. All of the above are situations where human judgment is better than using data analytics.
Answer to Multiple Choice Questions: Multiple Choice Question Answers Number Answer Number Answer 1 A 6 B 2 D 7 C 3 B 8 A 4 D 9 C 5 D 10 D
5-12 .
Possible Case study for classroom use. Case comes from Burton, F. G., Emett, S. A., Simon, C. A., & Wood, D. A. (2012). Corporate managers' reliance on internal auditor recommendations. Auditing: A Journal of Practice & Theory, 31(2), 151-166. For use in the classroom, assign students to take different roles such as internal auditor, manager, audit committee member, etc. Then have the students come to a recommendation. Very frequently, the students will have different recommendations based on their role. This can facilitate a rich discussion on how various factors (such as position, incentives, etc.) influence interpretation of the same data. Introduction You are a manager in a major chemical company’s headquarters. You have recently taken over responsibility for analysis related to polypropylene, one of the plastics produced by the North American Plastics Division. Polypropylene is sold primarily in granular form and is used in a number of products, ranging from food packaging to diapers to automotive parts. The versatility of polypropylene has led to increased demand over the last several years. Polypropylene is produced in a “continuous process,” meaning that large quantities of a homogeneous product are made in a nonstop operation. The process stops only for repairs to or maintenance of the machinery used. Further, the steps of the production process are highly interrelated, so that shutting down one portion of the plant requires shutting down the entire plant. One of the current issues at the Milwaukee plant pertains to a “turnaround” currently planned to take place in several months. A “turnaround” is simply a planned whole-plant shutdown for the purpose of performing all inspection, maintenance, and modification activities in a coordinated effort at one time. The machinery must be shut down to perform many of these activities, so plant downtime is minimized if they are all performed at the same time. Since it began operating, the Milwaukee plant has completed a turnaround every two years. When you arrived at work this morning, you learned that several employees, who are paid based on annual production, suggest that the planned turnaround be postponed for one year. They say that turnarounds are tremendously expensive operations, requiring a three-week shutdown. They argue that the company can improve profitability by changing the Milwaukee plant turnaround interval from every two years to every three years. Although they have made these recommendations, you will make the final decision about the turnaround interval. Your job performance ratings and compensation are based on the decisions you make that maximize the long-term profitability of the company. Additional Information Following is a report prepared by Jessie Lunt on the issue of postponing the turnaround. You told Jessie of your initial impression about postponing the turnaround and Jessie went to work to do more research on the issue at your request. Jessie is one of the company’s in-house internal auditors.
5-13 .
Jessie was hired directly out of college to work for the company in its internal audit department and has been with the company for 5 years. Jessie has been promoted to manager within the internal audit function and works directly with the head of internal audit on various internal auditing projects. The head of internal audit assigned Jessie to perform a detailed cost/benefit analysis of the plant turnaround and present the findings to you. On the following page you will find Jessie’s recommendations. As you read Jessie’s recommendations, there are two important things to keep in mind. 1. Most aspects of turnaround analyses are inherently subjective. In fact, much of the analysis done for this type of decision is based on soft data, such as estimates, opinions, and assumptions. Accordingly, there is a lot of room for judgment in this type of analysis. 2. Making a good decision here is critical as your compensation and job success depend on maximizing the company’s long-term profitability. Jessie’s Recommendations The Milwaukee plant has traditionally performed a turnaround every two years. A few other plants in the company’s plastics division have adopted three-year turnaround intervals. I propose that we continue with the two-year turnaround schedule and proceed with the scheduled turnaround this year. When deciding whether to change the turnaround interval, it is necessary to compare the benefits associated with changing the planned turnaround to the costs associated with the increase in unplanned shutdown days that will likely occur if the planned turnaround interval is changed. Benefits Associated with Changing the Turnaround Interval – If the turnaround interval is changed, benefits would arise from two sources: 1.
No out-of-pocket costs will be incurred this year for the turnaround activities listed below Inspect the internal condition of all vessels Tear down, inspect, and replace parts of compressors Clean and pressure-test heat-exchanger tube bundles Recalibrate all instruments Remove and replace spent catalysts Total out-of-pocket costs of a turnaround
2.
$1,800,000 $2,900,000 $1,300,000 $600,000 $900,000 $7,500,000
Additional production and sales that would result from not shutting-down the plant for the turnaround. Daily polypropylene production (based on future productive capacity) Sales price Polypropylene daily revenue
1,500,000 lbs/day * $0.35 per lb $525,000
Other daily revenue (scrap and by-product sales)
+ $75,000
5-14 .
Equals: Total daily revenue
= $600,000
Less: Daily variable cost (1,500,000 lbs per day * $0.18 per lb)
- $270,000
Equals: Extra daily revenue if turnaround is postponed
= $330,000
Duration of a normal turnaround
* 21 days
Total extra daily revenue if turnaround is postponed
= $6,930,000
Summary: If the turnaround is performed this year, it will require $7,500,000 in out-of-pocket costs and result in lost sales of $6,930,000. In other words, a turnaround costs $14,430,000. If you spread out this total turnaround cost over three years, it comes to an average cost of $4,810,000 per year. If you spread it over two years, it comes to $7,215,000 per year. Thus, the average annual savings are $2,405,000 ($7,215,000 $4,810,000) if you change from doing one planned shutdown every two years to one every three years. Costs Associated with Changing the Turnaround Interval – The plastics division loses money whenever there is an unplanned shutdown of the plant. It is likely that some unplanned shutdown days will occur, even if the turnaround is performed this year. Moreover, plants operating on a 3-year turnaround interval typically have more unplanned shutdown days than those operating on a 2-year interval. Thus, if the planned turnaround is delayed, then it is reasonable to expect an increase in the number of unplanned shutdown days. Costs of unplanned shutdowns include sales lost due to unplanned production interruption and other costs such as decreased equipment life, repair costs, ruined inventory, and cancellation fees, etc.
Daily cash flow foregone during shutdown (see previous analysis) Estimated average number of additional days lost due to unplanned shutdowns during next year Total cash flow foregone during unplanned shutdown Other costs (decreased equipment life, repair costs, ruined inventory, cancellation fees, etc.) Total costs of unplanned shutdown (per year)
$330,000 * 7.5 days = $2,475,000 + $300,000 = $2,775,000
Overall Recommendation In my opinion, the benefits of increasing the turnaround interval to threeyears ($2,405,000 per year) will not exceed the costs resulting from unplanned additional shutdown days ($2,775,000 per year. Thus, I recommend that you do not approve the proposal to increase the turnaround interval to three years and thus carry out the turnaround this year as scheduled. Questions 1. Do you recommend the turnaround to be postponed? 2. How confident are you in your choice? 3. Explain your reasoning behind your recommendation concerning the turnaround. 5-15 .
CHAPTER 6 Transforming Data Instructor’s Manual Learning Objectives: 1. Describe the principles of data structuring related to aggregating data, data joining, and data pivoting. 2. Describe data parsing, data concatenation, cryptic data values, misfielded data values, data formatting, and data consistency and how they relate to data standardization. 3. Describe how to diagnose and fix the data cleaning errors related to data duplication, data filtering, data contradiction errors, data threshold violations, violated attribute dependencies, and data entry errors. 4. List and describe four different techniques to perform data validation.
Introduction This chapter covers how to transform data. The chapter uses examples throughout based on a shared scenario. The data that is used throughout the chapter is listed in Figure 6-1 on page 189. Figure 6-2 on page 190 provides an abbreviated data dictionary for the data contained in Figure 6-1. Figure 6-10 on page 202 provides a solution with all of the data properly cleaned. A few observations are important to keep in mind: Data transformation can range from simple to very complex. It is important to help students understand the range of complexity that might be encountered in data transformation. In transforming data, a key objective is to assure the data is of high quality. The attributes of high quality data are presented in Table 6-1 on page 191 (these were also referenced in Chapter 1 of the text).
Transformation techniques are presented individually to aid in understanding; however, in practice these techniques can be combined in many different ways and used together.
Data transformation is at its core an exercise in understanding objectives, pattern recognition, and using logic. Often there are multiple ways to achieve the same objectives. Learning multiple techniques will allow the student to choose the most efficient transformation techniques.
Transformation is typically the most time consuming part of using data. Even though it is often not “seen” by stakeholders since it is done behind the scene, but is critical to the success of any data analysis.
6-1 .
Learning Objective One Describe the principles of data structuring related to aggregating data, data joining, and data pivoting.
Data Structuring Data structuring is the process of changing the organization and relationships among data fields to prepare the data for analysis. You can think of data structuring as organizing the data and getting it into the right layout. There are three key principles to consider when structuring data: 1. Aggregate data: the presentation of data in a summarized form. Companies record data at a fully disaggregated level, usually recording details of each individual transaction. This data is then aggregated to different levels. Some examples include summing all sales by customers to see how much each customer purchases or creating financial statements (which aggregate all data according to accounting rules). A key concept about aggregating data is that information is lost when data is aggregated. For example, when summing customer purchases, the data about when they made purchases or the size of their purchases is lost in the aggregate data. Figure 6-4 on page 192 contains examples of data aggregated at different levels. 2. Data joining (discussed in Chapter 4): the joining of data contained in different tables into a single table. 3. Data pivoting: A technique that rotates data from rows to columns. This is often performed because different programs are designed to handle data in different formats. Students most likely have experience using data pivoting in Microsoft Excel pivot tables. Pivoting changes the orientation of the data. This may allow us to quickly see patterns in data or create different presentations of data. Data pivoting often requires aggregating data to different levels. Figure 6-5 and 6-6 on pages 192-193 provide examples of data that has been pivoted. Multiple Choice 1 Susy receives a data extract of the purchasing transactions for various purchasing agents at the company. She would like to understand if purchasing agents with more experience are better at their jobs. To do this, she needs the years of experience of each purchasing agent, which is contained in a different table in the relational database. What technique will Susy need to use to add the new data to the data extract she received? a. Aggregating data b. Data joining c. Data pivoting d. None of the above 6-2 .
Multiple Choice 2 Paul has a list that contains four columns, inventory numbers, region numbers, date of sale, and total sales for the date. Paul wants to create a table that shows all inventory numbers in the first column of the table and then the name of each region across the top of the table, with total sales per region and inventory item in the body of the table (with no regard to dates of sales). To do this, what technique does Paul need to use? a. Aggregating data b. Data joining c. Data pivoting d. A and B e. A and C f. B and C g. A, B, and C
Learning Objective Two Describe data parsing, data concatenation, cryptic data values, misfielded data values, data formatting, and data consistency and how they relate to data standardization.
Data Standardization Data standardization is the process of standardizing the structure and meaning of each data element so it can be analyzed and used in decision making. If dealing with a flat file, you can think of data standardization as making sure the data in each column correctly represents that column, whereas data cleaning (discussed subsequently) is making sure the data in the rows are correct. Data standardization involves the following principles: 1. Data parsing and data concatenation: Data parsing is the separation of data from a single field into multiple fields whereas data concatenation is the combining of data from two or more fields into a single field. Figure 6-7 on page 194 presents an example of data parsing. Figure 6-8 on page 195 presents an example of data concatenation. You can show students examples of data parsing and data concatenation using Excel. These can be shown as follows: o Data parsing in Excel can be done using formulas such as “left”, “right”, and “mid”. These formulas extract the specified characters from another field. PCWorld provides a detailed example of this at https://www.pcworld.com/article/3163966/excel-tutorial-howto-import-and-parse-complicated-data.html. Data can also be parsed in Excel using the “Text-to-Columns” features. Microsoft provides discussion of this functionality at https://support.office.com/en-us/article/split-text-intodifferent-columns-with-the-convert-text-to-columns-wizard30b14928-5550-41f5-97ca-7a3e9c363ed7. o Data concatenation in Excel can be done using the formula 6-3 .
“concatenate” or using the operator “&”. Microsoft provides discussion of both of these ways of concatenating at https://support.office.com/en-us/article/concatenatefunction-8f8ae884-2ca8-4f7a-b093-75d702bea31d. 2. Cryptic data values: are data items that have no meaning without understanding a coding scheme. The text gives an example of a consulting firm keeping track of the positions of employees in the organization by using a coding scheme of 1 for partner, 2 for senior consultant, and 3 for research analyst. Without understanding the coding, the numbers 1, 2, and 3 in the employee table are meaningless. For dummy variables or dichotomous variables there is a general understanding of their meaning and they are usually not considered cryptic data values. Dummy variables and dichotomous variables are two names for the same thing: a data field that contains only two responses, typically 0 or 1. Generally speaking, the value of 1 is interpreted as signifying the presence of the attribute and 0 the absence of the attribute. If well named, these variables are easily understood. For example, a dummy variable for Male of 1 and 0 means the customer is male (1) or female (0); however, the dummy variable of gender with 1 and 0 is a cryptic data value. 3. Misfielded data values: are data values that are correctly formatted but not listed in the correct field. The example used in the text is for the data field “City” that contains the country name “Germany.” Germany is a correct value, it is just in the wrong field. It should be in the “Country” field. It is important to realize that misfielded data values can apply to an entire column or to just a specific value. 4. Data formatting and data consistency: data formatting relates to ensuring that the same type of data is presented in the same way e.g., all currency amounts in a column have a $ sign and two decimal places. Data consistency is making sure every value in a field is stored in the same way. In practice, it is not always obvious whether a problem is caused by data formatting or data consistency as they both have the same appearance in the extracted data. To understand what the actual problem is, it is usually necessary to examine the underlying coding of a database. That being the case, the solution to a transformation for either problem is usually the same, fix the data so it is the same. To fix the underlying problem so it doesn’t happen again requires more investigation and effort. Figure 6-9 on page 197 contains an example of phone numbers in different data formats. There is also a lengthy discussion of different data consistency and data formats in Figure 6-1 (on the chapter problem). The bullet points on page 197 list all of these problems.
6-4 .
Multiple Choice 3 The combining of data into a single column is called ________ whereas the separation of data into different columns is called ________? a. Data consistency, Data formatting b. Data formatting, Data consistency c. Data concatenation, Data parsing d. Data parsing, Data concatenation Multiple Choice 4 Consider the data extract listed below. The information in the Age field, suffers from which of the following problems?
a. Cryptic data values b. Misfielded data values c. Data formatting d. Data consistency Multiple Choice 5 A field labeled “ReceivesDiscount” in a customer table contains values of 0 and 1. Which of the following is the best description of this field and data? a. The field lacks consistency b. The field has cryptic data values c. The field is a dummy variable d. The field should be concatenated
Learning Objective Three Describe how to diagnose and fix the data cleaning errors related to data duplication, data filtering, data contradiction errors, data threshold violations, violated attribute dependencies, and data entry errors.
Data Cleaning Data cleaning is the process of updating data to be consistent, accurate, and complete. When data is inconsistent, inaccurate, or incomplete it is called dirty data. The chapter discusses 6 common errors to look for when cleaning data. 1. Data de-duplication: The process of analyzing data and removing two or more records that contain identical information. Most common solution is to delete the duplicate entry of data. Encourage the students to really understand their data. For example, if an extract of sales transactions has duplicate rows 6-5 .
of a customerid, productid, quantity, and price, this may or may not be duplicate data. A customer may come to a store every morning and buy the same amount of the same product. Thus, without a date field, it is difficult to know if the data is duplicated. 2. Data filtering: The process of removing records or fields of information from a data source. When filtering data, you must decide what to do with null values: ignore them, delete them, or replace them. The process of replacing a null or missing value with a substituted value is called data imputation. All of these choices come with pros and cons; whatever choice is made, it is critical to document choice for others who use the data. 3. Data contradiction errors: an error that exists when the same entity is described in two conflicting ways. Most common solution is to investigate which data is “truth” and update the incorrect entry. For example, if the same sales order is listed with two different dates in a system, the sales order with the incorrect date should be removed or corrected. 4. Data threshold violations: data errors that occur when a data value falls outside an allowable level. The most common solution is to find the violation and correct it (or to replace it with a null value if the truth cannot be determined). As an example, a sale should not have a negative value for the quantity sold (unless the company uses negatives to show sales returns). 5. Violated attribute dependencies: errors that occur when a secondary attribute in a row of data does not match the primary attribute. The most common solution is to correct the data that contains the error. For example, a supplier may be listed as being from the United States but then in the state field it says “Spain.” The state field should be adjusted to a state within the United States. 6. Data entry errors: all types of errors that come from entering data incorrectly. These errors should be investigated and corrected. Two common examples are spelling mistakes and transposition errors. Note to Instructors: The European Spreadsheet Risks Interest Group keeps a list of “horror stories” related to using spreadsheets. Many of these horror stories relate to dirty data. You can pull examples from this website or have students review and give reports on common dirty data problems in spreadsheets. The stories are listed at http://www.eusprig.org/horror-stories.htm The following data is used for multiple choice questions 6-8.
6-6 .
Multiple Choice 6 What type of error is present on line 4 and 5? a. Data de-duplication error b. Data imputation error c. Data contradiction error d. Violated attribute dependency error e. Data entry error Multiple Choice 7 Assume that in the data above, that Joe’s Hamburgers on line 2, 7, and 8 represents the same business operating in a single location. If the field CustomerAddress was added as column E, what type of error would be present if one of the entries on line 2, 7, or 8 was for a different, real restaurant? a. Data de-duplication error b. Data imputation error c. Data contradiction error d. Data entry error Multiple Choice 8 Assume the real name of the company on row 6 in Column C is Tim’s Salads. What most likely caused this error? a. Data de-duplication error b. Data imputation error c. Data contradiction error d. Violated attribute dependency error e. Data entry error
Learning Objective Four List and describe four different techniques to perform data validation.
Data Validation
6-7 .
Data validation is the process of analyzing data to make certain the data has the properties of high-quality data: accuracy, completeness, consistency, timeliness, and validity. There are four techniques that can be used to validate data. 1. Visual Inspection: This is the process of examining data using human vision to see if there are problems. 2. Basic Statistical Tests: Using basic statistical tests (often using descriptive statistics like mean, average, counts, etc.) to find if there are errors in the data. 3. Audit a Sample: Taking a sample of data and carefully analyzing the sample for errors. 4. Advanced Testing Techniques: Using a deep understanding of relationships and the data to analyze the data for errors. It is important to note that these validation techniques are often used in combinations and in sequence. Each has strengths and weaknesses. It can be a worthwhile exercise to have students individually, or as groups, brainstorm positives and negatives about each technique. Below are listed several possible positives and negatives for each technique. 1. Visual Inspection a. Positives: i. Quick and easy to perform. ii. Can identify data structure problems as well as standardization problems. b. Negatives: i. Hard to perform on large datasets. Relies on the training and expertise of the observer (which may be high or low). ii. Hard to document systematic changes for external parties (i.e., change management controls, or improvements for external auditors). 2. Basic Statistical Tests a. Positives i. Easy to perform on large datasets ii. More useful for quantitative amounts. iii. Very useful for identifying outliers and other statistical anomalies. iv. Good first step to understanding data before additional analysis. b. Negatives i. Limited in the types of errors that can be discovered. ii. Of limited value for qualitative amounts. iii. Not good for finding data standardization problems. 3. Audit a Sample a. Positives i. Can determine error rates that can be extrapolated to the population. For example, if you randomly select 1% of the population of transactions for audit and find 3 spelling errors and 15 duplicate values, you can estimate that the full data set has 300 selling errors (3/0.01) and 1,500 duplicate values (15/0.01). 6-8 .
ii. Can detect all types of errors. iii. Allows for identifying extraction and loading errors if data is checked against original data. b. Negatives i. Selecting and analyzing a large sample is time consuming. ii. Sampling is never perfect and may miss errors. 4. Advanced Testing Techniques a. Positives i. Can discover complex errors (such as errors of logic). ii. Can be targeted to errors that are more serious for the objective of the analysis. b. Negatives i. Requires expertise in the domain. ii. Not always available for all data sets. Multiple Choice 9 A production manager wants her data analyzed to help improve efficiency on the product line. However, the manager knows the data she has is not always accurate. To be useful, she needs to make sure that at least 95% of the data is correct. What validation technique should the manager use to have confidence in her data? a. Visual inspection b. Basic statistical tests c. Audit a sample d. Advanced testing techniques Multiple Choice 10 Which type of data validation technique is best able to detect outliers in numeric fields? a. Visual inspection b. Basic statistical tests c. Audit a sample d. Advanced testing techniques
Answer to Multiple Choice Questions: Multiple Choice Question Answers Number Answer Number Answer 1 B 6 A 2 E 7 C 3 C 8 E 4 B 9 C 5 C 10 B
6-9 .
CHAPTER 7 Data Analysis and Presentation Instructor’s Manual Learning Objectives: 1. Define and give examples of descriptive, diagnostic, predictive, and prescriptive analytics. 2. Describe when each type of analytic is most appropriately used in a business context. 3. Select the correct type of visualization format for visualizing data. 4. Understand design principles of simplification, emphasis, and ethical data presentation to design high-quality data visualizations.
Introduction After preparing the data (the topic of chapter 6), the data must be analyzed and the results communicated to the relevant stakeholders. This chapter focuses on these two key parts of the analytics mindset.
Learning Objective One Define and give examples of descriptive, diagnostic, predictive, and prescriptive analytics.
Learning Objective Two Describe when each type of analytic is most appropriately used in a business context.
These two learning objectives are closely related, and thus we discuss them together.
Data Analysis The third step of the analytics mindset presented in Chapter 5 is to “Apply appropriate data analytic techniques.” There are many analytic techniques that can be applied, this chapter breaks these techniques into four areas: descriptive analytics, diagnostic analytics, predictive analytics, and prescriptive analytics. Figure 7-1 on page 216 provides a graph to show how 7-1 .
these analytics are related to complexity and value added to the organization.
Descriptive Analytics Descriptive analytics, as defined in Chapter 5, examine the question of “what happened?” Examples of descriptive analytics include external auditors computing profit margins and leverage ratios to determine if business risk changed significantly during a period and to identify possible fraud. Corporate accountants computing metrics such as cost-per-unit, inventory turnover ratios, customer acquisition costs, and variance of budgets-toactual expenses and revenues to understand how the business is performing. Descriptive analytics often use exploratory data analysis techniques, which is an approach to examining data that seeks to explore the data without testing formal models or hypotheses. These types of techniques are often used to: To find mistakes in the data. To understand the structure of data. To check assumptions required by more formal statistical modeling techniques. To determine the size, direction, and strength of relationships between variables. Descriptive analytics often explore central tendency, spread, distributions, and correlations. These attributes of data are commonly shown in a visualization (also called a viz). A viz is any visual representation of data, such as a graph, diagram, or animation. Common measures of each of these concepts, including appropriate visualization techniques, are as follows: Central tendency: mean and median. These are often shown in charts using bar charts or box-and-whisker charts. Medians are less influenced by outliers, which is a data point or a few data points, that lie an abnormal distance from other values in the data.
Spread (or dispersion of the data around a central value): standard deviations and examining quartiles. These are often shown in charts using box-and-whisker charts.
Distribution: while there are formal statistical measures of distribution, this is often examined using histograms.
Correlations: correlation coefficients. These are often shown in charts using scatterplots or in correlation tables. Correlations range from -1 to 1. Scores of -1 show a perfect negative correlation, meaning as one variable goes up, the other goes down. A score of 1 shows a perfect positive correlation. Zero means there is no relation between the two variables.
Diagnostic Analytics 7-2 .
Diagnostic analytics, as defined in Chapter 5, examine the question of “why did this happen?” Diagnostic analytics include both informal and formal analyses. Informal analyses build off of descriptive analytics and often use logic and basic tests to reveal relationships in the data that explain why something happened. The following example was used in the text: If a company observes that the overall gross margin fell in the last quarter (a descriptive analytic), they might examine the mix of products sold. The analysis can be as simple as creating a table that shows all products sold in the last quarter versus the previous quarter, then computing the difference to see if more or fewer products with high/low gross margins sold. Analysts often must ask follow-up questions and perform analyses related to these questions to uncover the true underlying cause. For example, if a large quantity of low gross margin products were sold, the data analyst could again investigate why this was the case and may find that the marketing department advertised these products heavily in the last quarter. In turn, that might lead the analyst to ask why the marketing department focused on those products. The process continues until the analyst has discovered the root cause. A general rule of thumb for informal analysis is the “5 Why’s” principle, which states that it often requires asking “Why?” five times in order to uncover the true reason why something happened. Formal analyses typically build off confirmatory data analysis tests. Confirmatory data analysis use hypothesis testing and provide statistical evidence of the likelihood that the evidence refutes or supports a hypothesis. This type of testing involves using the following 4 steps: 1. State a null and alternative hypothesis. 2. Select a level of significance for refuting the null hypothesis. 3. Collect a sample of data and compute the probability value. 4. Compare the computed probability against the level of significance and determine if the evidence refutes the null hypothesis. Failing to refute the hypothesis is seen as support of the alternative hypothesis. A null hypothesis is a proposed explanation worded in the form of an equality, meaning that one of the two concepts, ideas, or groups will be no different than the other concept, idea, or group. In contrast, an alternative hypothesis is a proposed explanation worded in the form of an inequality, meaning that one of the two concepts, ideas, or group will be greater or less than the other concept idea or group. An example of a null and alternative hypothesis can be developed around the idea of whether giving stock options makes employees more likely to commit fraud. The following two hypotheses could be tested: 7-3 .
Null hypothesis: Paying employees with stock options will have no effect on their likelihood of committing fraud.
Alternative hypothesis: Paying employees with stock options will increase (or you could say decrease) the likelihood of committing fraud.
Notice that both the null and alternative hypotheses can’t both be right, the data will either support one or the other. With a null and alternative hypothesis generated, there are two types of errors that are possible when analyzing data. The following tables shows these errors.
The data finds
Null hypothesis is true Null hypothesis is false
Null hypothesis is actually: True False Correct Type II Error Type I Error Correct
In statistics, to avoid finding a type I error, the person analyzing the data would select the probability that they are willing to accept for having a type I error. This level of significance is usually 0.05, but the values of 0.01 and 0.10 are also commonly selected. Once this level is chosen, the statistical test can be performed (e.g., an ANOVA, regression, etc.). The statistical test will result in a p-value computation that can be compared to the selected significance level. The analyst can then decide whether to reject the null hypothesis or if the evidence supports the alternative hypothesis. Statistical significance does not tell how important the relation is (or how strong it is). To do this, you need to examine a computation of effect size. An effect size is a quantitative measure of the magnitude of the effect. Determining the importance of the computed effect size depends on the situation.
Predictive Analytics Predictive analytics, as defined in Chapter 5, examines the question of “what is likely to happen in the future?” Examples of predictive analytics include predicting customer behavior (e.g., purchasing behavior, repayment behavior, etc.) and predicting local or world events (e.g., will interest rates increase). Predictive analytics use historical data to find patterns that may continue in the future. Creating predictive analytics usually follows the following steps: 1. Select the target outcome. It is important to know the difference between continuous variables and categorical data. Categorical data are data items that take on a limited number of assigned values to represent different groups. It is important to understand categorical data, because when you use categorical data you must use classification analysis (in step 3). Classification analyses are techniques that identify various groups and 7-4 .
then try to classify new observations into one of those groups. 2. Find and prepare the appropriate data. This involves the ETL process discussed in Chapter 6. 3. Create and validate a model. Models are usually built with a training dataset, which is a subset of data used to train a model for future prediction. The model is then tested on a test dataset, which is a subset of data not used for the development of a model but used to test how well the model predicts the target outcomes. Separating your data into training and test datasets is important to avoid data overfitting, which is when a model is designed to fit training data very well but does not predict well when applied to other datasets. Techniques are being developed that continue to learn (or said differently, to improve) over time with the accumulation of additional data. One popular way to do this is use machine learning, which is an application of artificial intelligence that allows computer systems to improve and update prediction models without explicit programming.
Prescriptive Analytics Prescriptive analytics, as defined in Chapter 5, examine the question of “what should be done?” Prescriptive analytics can either provide a recommended course of action or a programmed action for a system based on predictive analytics results. These types of analytics are in development and appear to be tuned to specific business scenarios. They are least used in practice. One example of prescriptive analytics is UPS using prescriptive analytics to design routes for drivers to deliver their packages. Prescriptive analytics use techniques such as artificial intelligence (AI), machine learning, and other statistics to generate predictions.
Common Problems with Data Analytics Data analytics are not infallible. They are powerful tools, but they can be easily misused or misunderstood. Focus 7-1 on page 221 discusses the Space Shuttle Challenger explosion and the Japan Fukushima Daiichi nuclear reactor disaster that were both related to misusing data analytics. Common problems with data analytics include the following: GIGO (Garbage in, garbage out), which means that data analysis has no value if the underlying data is not of high quality.
Overfitting (discussed previously).
Extrapolation beyond the range which is a process of estimating a value beyond the range for the data used to 7-5 .
create the model (and is related to the Space Shuttle Challenge explosion previously mentioned). This challenge relates to not fully appreciating the variance inherent in statistics and that statistical estimates are better thought of as possible ranges of solutions rather than specific answers. Multiple Choice 1 A CEO wants to know the trends in her company’s market share relative to her competitors. She asks an analyst to prepare analytics to show how the market share of each company in the industry has changed over the last 5 years. What type of analytic is the analyst going to prepare? a. Diagnostic analytic b. Prescriptive analytic c. Predictive analytic d. Descriptive analytic Multiple Choice 2 Which of the following is the best example of a prescriptive analytic? a. Evaluating whether billboards increase sales for a pharmaceutical company. b. Creating a model predicting employee absenteeism based on weather for a trucking company. c. Developing a model to predict audit risk that includes a recommendation for accepting audit clients based on the model outcomes. d. Evaluating the performance of airline on-time-arrivals to large and to small cities. Multiple Choice 3 An accounting firm predicts the likelihood of employees passing the CPA exam within one year of accepting an offer. In creating the dataset, the HR analyst sorts the data incorrectly so that the hire date and the exam pass date on each line do not correspond. This analysis most likely suffers from which of the following problems? a. GIGO b. Overfitting c. Extrapolating beyond the range d. Too much variance Multiple Choice 4 A company developed a dessert in their lab that involves a special freezing process. The company tested the production process using temperatures in the range of -50 to -30 Celsius. The company’s freezing equipment on the production line is not functioning as well as expected, so it can only cool things to -10 Celsius. The data analysts believe this will still work to successfully produce the dessert based on their analysis of previous data. What problem are the data analysts ignoring in this example? a. GIGO b. Overfitting c. Extrapolating beyond the range 7-6 .
d. Too much variance
Learning Objective Three Select the correct type of visualization format for visualizing data.
Choosing the Right Visualization Figure 7-2 on page 223 provides a summary of how to select the correct visualization to share data. The key to choosing the correct visualization is understanding the purpose of the visualization. Five purposes for showing business data and the charts common for each purpose are:
Comparison: Comparing data across categories. Most often shown with a bar chart or bullet chart.
Correlation: Comparing how two numeric variables fluctuate with each other. Most often shown with a scatterplot or heatmap.
Distribution: Show the spread of numeric data values. Most often shown with a histogram or boxplot.
Trend Evaluation: Show changes over an ordered variable (most often time). Most often shown with a line chart or area chart.
Part to Whole: Show which items make up the parts of a total. Most often shown with a pie chart or treemap.
There are other visualization types and purposes such as using maps to show special data, showing flows of data, and using combo charts.
Multiple Choice 5 The first visualization you see in the report is a boxplot. If the people designing the viz use good practice, what is the likely purpose of this visualization? a. Comparison b. Correlation c. Distribution d. Trend Evaluation e. Part to Whole f. Other Multiple Choice 6 Which of the following graph types would be best to show correlation? a. Bullet chart b. Treemap 7-7 .
c. Area chart d. Histogram e. None of the above
Learning Objective Four Understand design principles of simplification, emphasis, and ethical data presentation to design high-quality data visualizations.
Designing High-Quality Visualizations To communicate effectively, visualizations should be well designed. An egregiously poorly designed visualization is show in Figure 7-3 on page 225. This visualization is used to discuss the principles of high quality design. Note that the chapter discusses 3 of the most important visualization principles based on research, but these are not the only principles for high quality viz design. The idea is that these 3 principles will help students with the most important concepts, to which they can add more concepts in the future. The three principles are: 1. Simplification: principle of making a visualization easy to interpret and understand. 2. Emphasis: principle of assuring the most important message is easily identifiable. 3. Ethical data presentation: principle of avoiding the intentional or unintentional use of deceptive practices that can alter the user’s understanding of the data being presented. These design principles apply to each part of the viz including: the title, axes including labels, tick marks, and lines), legend, and data area. The data area in a visualization is the area where the lines/bar/slices/etc. are displayed. Principle: Simplification Visualizations are more effective when they simplify the presentation to clearly and concisely communicate. Four important techniques that can help simplify data visualization are: 1. Quantity: Visualizations should follow the goldilocks principle of containing not too much and not too little, but just the right amount of data. Examples of how Figure 7-3 can be improved in terms of quantity include, shortening the title, simplifying the axes (removing so many numbers, not reporting so many decimal places, etc.), removing information overload, and not using so many different formats.
7-8 .
2. Distance: The farther items are placed from each other, the harder it is to interpret. Putting similar things close together simplifies a viz. Figure 7-4 on page 227 provides an example of how you can move labels from a legend to the body of the viz to reduce distance. Also, it shows how you can move labels to the top of each bar (so you don’t have to refer to an axis) to remove distance and simplify the viz. Grouping data is also helpful for removing distance. In Figure 7-4 data are grouped by department (colors are for departments), and if the primary purpose of the viz was to look at education levels, then the data could be grouped by education levels to remove distance from the different education levels for making comparisons. 3. Orientation: Data is easier to understand if it is oriented in the correct fashion. For example, bar charts can be turned sideways so that there is sufficient space to see all the data and so the labels are presented in horizontal fashion. Figure 76 on page 229 provides an example of how changing the orientation can simplify a viz. 4. Color (this principle applies to both simplification and emphasis, it is covered in Focus 7-2 on page 230). For the principle of simplification, color should have meaning. You should only use colors for communication (e.g., don’t just color all bars a different color to make the viz have lots of colors). Principle: Emphasis Visualizations are created for a purpose. A high quality viz will emphasize that purpose and make it easy to understand. There are several techniques for emphasizing data (we note that color is again important, but it is embedded in both highlighting and weighting so we do not call it out as a separate technique): 1. Highlighting: This technique uses colors, contrast, call-outs, labels, fonts, arrows, or other means to bring attention to an item. Usually highlighting is applied in the data area of a viz. Colors are often used for highlighting. Figure 7-7 on page 230 shows how color can be used to highlight effectively. 2. Weighting: Visual weight refers to the amount of attention an element attracts. Objects that have more visual weight are “heavy” and draw more attention than “light” objects. Figure 7—8 on page 231 shows how color, contrast, complexity, density, and size all relate to visual weight and gives examples of heavier and lighter weights for each technique. 3. Ordering: Data ordering is the intentional arranging of viz items in a way to produce emphasis. The two 7-9 .
most common ways to use ordering to produce emphasis are (1) use categories on the axes and (2) order by the values of the data. These methods are almost always superior to random data ordering. Figure 7-9 on pages 232-233 illustrate the power of ordering to emphasize what is important. Ordering typically makes the highest and lowest values most salient. Ordering is very effective when combined with other emphasis techniques. Principle: Ethical Data Presentation A data analyst may choose to use presentation tools to “make the data say anything they want.” This is unethical. It is critical to help students understand that emphasis and simplification are used to help bring understanding and meaning to what the data actually say and not what someone wants the data to say. The tools are not intended to inappropriately or unethically influence others. Helping students understand ethical principles of data presentation will also help them detect when a viz is designed to manipulate them. Data deception is a graphical depiction of information, designed with or without an intent to deceive, that creates a belief about the message and/or its components, which varies from the actual message. To avoid deception, consider the following three principles: 1. Show representations of numbers proportional to the reported number (starting the y-axis at zero helps ensure this). Figure 7-10 on page 233 shows examples of how this principle is violated. Using this principle avoids making minor differences look like they are more important than they really are (i.e. the 0.1 different in the left graph looks like a much bigger deal than in the middle graph). Also if you use visual weight to make something larger than another it looks like it is more important than it is (the viz on the far right of the figure). 2. In vizs designed to depict trends, time should progress from left to right on the x-axis. Figure 711 on page 234 shows a violation of this rule. It also shows how poor labeling can compound the problem since most people assume that time increases as you move to the right on the viz. 3. Present complete data given the context. Figure 7-12 on page 235 shows how you can take the full timeline of data and cut it into different pieces that will tell an incomplete picture (i.e., the market is improving, staying the same, or dropping when it is in fact doing all three).
7-10 .
Teaching Note: A useful in-class exercise can be to present poorly designed visualizations and have the students critique the vizs using the principles discussed. You can find bad viz examples by doing a Google image search for “bad viz examples.” In addition to critiquing the viz, you can ask the students to come up with solutions to improve the viz. Multiple Choice 7 Which of the following is not a technique for increasing visual weight? a. Color b. Size c. Complexity d. Highlighting e. Density Multiple Choice 8 All of the following techniques are useful for simplifying a visualization except for which one? a. Ordering b. Color c. Distance d. Quantity Multiple Choice 9 A manager wants to report division products in a way that makes her division look better than they actually are. To do this, she uses a line chart that only shows data for the last 20 days and not the last 90 days as the last 20 days show an upward trend in production. The manager did not follow which ethical rule? a. Show representations of numbers proportional to the reported number (starting the y-axis at zero helps ensure this). b. In vizs designed to depict trends, show time progressing from left to right on the x-axis. c. Present complete data given the context. d. None of the above.
Multiple Choice 10 When using a pie chart, what is the mostly likely ethical violations that can be perpetrated? a. Show representations of numbers proportional to the reported number (starting the y-axis at zero helps ensure this). b. In vizs designed to depict trends, show time progressing from left to right on the x-axis. c. Present complete data given the context. d. All the above can be perpetrated in a pie chart.
7-11 .
Answer to Multiple Choice Questions: Multiple Choice Question Answers Number Answer Number Answer 1 D 6 E 2 C 7 D 3 A 8 A 4 C 9 C 5 C 10 C
7-12 .
CHAPTER 8 FRAUD AND ERRORS Instructor’s Manual Learning Objectives: 1. Explain the threats faced by modern information systems. 2. Define fraud and describe both the different types of fraud and the auditor’s responsibility to detect fraud. 3. Discuss who perpetrates fraud and why it occurs, including the pressures, opportunities, and rationalizations that are present in most frauds. 4. Define computer fraud and discuss the different computer fraud classifications. 5. Explain how to prevent and detect computer fraud and abuse. Jason anticipated the following questions that management was going to ask: 1. What constitutes a fraud, and is the withholding problem a fraud? 2. How was the fraud perpetrated? What motivated Don to commit it? 3. Why did the company not catch these mistakes? Was there a breakdown in controls? 4. How can the company detect and prevent fraud? 5. How vulnerable is the company’s computer system to fraud?
Introduction Our society has become increasingly dependent on accounting information systems. As system complexity and our dependence on systems increase, companies face the growing risk of their systems being compromised. A recent survey disclosed that 1. 67% of companies had a security breach. 2. More than 45% were targeted by organized crime. 3. 60% reported financial losses. 4. Data breaches are up over 400% from 2017 to 2018.
8-1 .
Note to instructors: there are many resources online that provide an extensive update on data breaches, to show students the extent of the problem, for example: http://www.idtheftcenter.org/ this website provides good information on identity theft. http://breachlevelindex.com/ this website has good visualizations that can be shared with students (look in resources tab for infographic).
The four types of threats to an AIS a company faces are explained in Table 8-1 on page 250.
Learning Objective One Explain the threats faced by modern information systems.
AIS Threats Four Types of System Threats: 1. Natural and political disasters 2. Software errors and equipment malfunctions 3. Unintentional acts 4. Intentional acts 1. Natural and political disasters Fires, excessive heat, floods, earthquakes, high winds, war, and attacks by terrorists.
World Trade Center in New York City (9/11)
Flood in Chicago
Heavy rains in Mississippi and Missouri Rivers
Earthquakes in Los Angeles and San Francisco
Attacks on government information systems by foreign countries, espionage agents, and terrorists
2. Software Errors and Equipment Malfunctions 8-2 .
Losses due to software bugs are at almost $60 billion a year. More than 60% of the companies studied had significant software errors in the previous year. For example:
Bugs in a new tax accounting system were to blame for California’s failure to collect $635 million in business taxes.
There have been a number of massive power failures that have left hundreds of thousands of people and many businesses without power when an industrial control system in part of the grid failed leaving 50 million people in the Northeast without power.
A software bug in Burger King’s software resulted in a $4,334.33 debit card charge for four hamburgers. The cashier accidentally keyed in the $4.33 charge twice.
3. Unintentional Acts Caused by human carelessness, failure to follow established procedures, and poorly trained or supervised personnel. The Computing Technology Industry Association estimates that human errors cause 80% of security problems. Forrester Research estimates that employees unintentionally create legal, regulatory, or financial risks in 25% of their outbound e-mails. Programmers make logic errors. Examples include the following:
In Japan, a data entry clerk at Mizuho Securities mistakenly keyed in a sale for 610,000 shares of JCom for 1 yen instead of the sale of 1 share for 610,000 yen. The error cost the company $250 million.
A bank programmer mistakenly calculated interest for each month using 31 days. Resulted in more than $100,000 in excess interest paid.
A U of Washington employee moved data from one server to another (which has a different configuration). This exposed nearly 1 million patient records. The error was discovered when a patient found his data by googling himself.
UPS lost a cardboard box with computer tapes containing information, such as names, Social Security numbers, account numbers, and payment histories on 3.9 million Citigroup customers. 8-3 .
A programmer made a one-line-of-code error that priced all goods at Zappos, an online retailer, at $49.95—even though some of the items it sells are worth thousands of dollars. The change went into effect at midnight, and by the time it was detected at 6:00 A.M., the company had lost $1.6 million on goods sold far below cost.
4. Intentional Acts The most frequent type of computer crime is fraud. This is where the intent is to steal something of value. The threat can also be in the form of sabotage, in which the intent is to destroy or harm a system or some of its components. Focus 8-1 on p. 250-251 “Electronic Warfare” describes recent cyber-attacks. Information systems are increasingly vulnerable to attack. In a recent three-year period, the number of networks that were compromised rose 700%. Example of security breaches: consider the case of OpenTable, a restaurant reservation service that did not design its cookie properly. A cookie is data that websites store on your computer. The cookie identifies the websites to your computer and identifies you to the website so you do not have to log on each time you visit the site. At OpenTable, the customer number stored in the cookie was very easy to change. An experienced programmer opened an account at OpenTable and, in less than an hour, wrote a program that cycled through all the customer numbers and downloaded most of the company’s database. Note to the Instructor: there are probably several recent local examples that you can identify to help make this concept relevant to students at your school. In fact, you may be surprised by how robust this discussion gets and students will sometimes share their own personal experiences. Multiple Choice 1 Operating system crashes are an example of: a. natural and political disasters b. intentional acts c. unintentional acts d. software errors and equipment malfunctions
8-4 .
Learning Objective Two Define fraud and describe both the different types of fraud and the auditor’s responsibility to detect fraud.
INTRODUCTION TO FRAUD Fraud is any and all means a person uses to gain an unfair advantage over another person. Legally, for an act to be considered fraudulent there must be: 1. A false statement, representation, or disclosure 2. A material fact, which is something that induces a person to act 3. An intent to deceive 4. A justifiable reliance; that is, the person relies on the misrepresentation to take an action 5. An injury or loss suffered by the victim Attempts to Estimate the Staggering Losses from Fraud: The Association of Certified Fraud Examiners (https://www.acfe.com/) estimates total yearly global fraud losses to be over $3.7 trillion a year. Most fraud perpetrators are knowledgeable insiders. This is because they understand the company’s system and its weaknesses to perpetrate fraud. Fraud perpetrators are also referred to as white-collar criminals. Two types of Fraud: 1. Misappropriation of assets and 2. Fraudulent financial reporting
Misappropriation of Assets Misappropriation of assets is often referred to as employee fraud. Typical employee fraud has a number of important elements or characteristics: 8-5 .
1. The fraud perpetrator must gain the trust or confidence of the person or company being defrauded. 2. Instead of a weapon or physical force to commit a crime, fraud perpetrators use trickery, cunning, or false or misleading information to obtain money or assets. 3. They hide their tracks by falsifying records or other information. 4. Few frauds are terminated voluntarily. Instead, the fraud perpetrator continues due to “need or greed.” Often, perpetrators begin to depend on the “extra” income and get to a point where they cannot afford to stop. Other times they move to a higher lifestyle that requires a greater amount of money. It is at this point where they get braver, or should we say more relaxed, where the perpetrator gets greedy and starts stealing larger amounts of money; this is where they normally get caught. 5. Sees how easy it is to get extra money. The need or the greed impels them to continue with the fraud. 6. Fraud perpetrators spend their ill-gotten gains, usually on an extravagant lifestyle. Rarely do they save or invest the money they take. Some of these high cost luxurious items include big homes, fancy cars, gambling, or just a big spender type person. 7. Many perpetrators that become greedy not only start taking greater amounts of money, but also take the money more often. 8. As previously mentioned, perpetrators at some point start getting braver and grow careless or overconfident. The fraud perpetrator cannot get away with stealing cash or property forever. At some point, although it may take some time, they are going to get caught.
Fraudulent Financial Reporting The Treadway Commission (National Commission on Fraudulent Financial Reporting) defined fraudulent financial reporting as intentional or reckless conduct, whether by act or omission, that results in materially misleading financial statements.
8-6 .
The Treadway Commission studied 450 lawsuits against auditors and found undetected fraud to be a factor in half of them. Some prime examples are Enron, WorldCom, Tyco, Adelphia, HealthSouth, Global Crossing, and Xerox. Executives cook the books, as they say, by fictitiously inflating revenues, recognizing revenues before they are earned, closing the books early (delaying current period expenses to a later period), overstating inventories or fixed assets, and concealing losses and liabilities. The Treadway Commission recommended four actions to reduce the possibility of fraudulent financial reporting: 1. Establish an organizational environment that contributes to the integrity of the financial reporting process. 2. Identify and understand the factors that lead to fraudulent financial reporting. 3. Assess the risk of fraudulent financial reporting within the company. 4. Design and implement internal controls to provide reasonable assurance that fraudulent financial reporting is prevented. A study by the Association of Certified Fraud Examiners found that misappropriation of assets by employees is more than 17 times more likely than fraudulent financial reporting. SAS No. 99 (AU-C Section 240): The Auditor’s Responsibility to Detect Fraud SAS No. 99 requires auditors to: 1. Understand fraud. 2. Discuss the risks of material fraudulent misstatements. 3. Obtain information. 4. Identify, assess, and respond to risks. 5. Evaluate the results of their audit tests. 6. Document and communicate findings. 7. Incorporate a technology focus.
Multiple Choice 2 8-7 .
The Association of Certified Fraud Examiners (ACFE) estimates total global fraud losses to be more than: a. $9.2 trillion a year. b. $3.7 trillion a year. c. $290 billion a year. d. $920 billion a year. Multiple Choice 3 Which of the following statements is FALSE? a. Fraudulent financial reporting are large errors in the financial statements. b. Misappropriation of assets is employee theft. c. SAS No. 99 requires auditors to understand fraud. d. SAS No. 99 was adopted in 2002.
Learning Objective Three Discuss who perpetrates fraud and why it occurs, including the pressures, opportunities, and rationalizations that are present in most frauds.
Who Perpetrates Fraud and Why Perpetrators of computer fraud tend to be younger and possess more computer knowledge, experience, and skills. Some hackers and computer fraud perpetrators are more motivated by curiosity, a quest for knowledge, the desire to learn how things work, and the challenge of “beating the system.” Most have no previous criminal record. Research shows that three conditions are necessary for fraud to occur: a pressure, an opportunity, and a rationalization. This is referred to as the fraud triangle and is shown as the middle triangle in Figure 8-1 on page 257.
Pressures A pressure is a person’s incentive or motivation for committing the fraud. The three common types of pressures are financial, emotional, and lifestyle, which are summarized in Table 8-2 on page 257. Table 8-3 on page 258 provides the pressures that can lead to financial statement fraud.
Opportunities
8-8 .
As shown in the opportunity triangle in Figure 8-1 on page 257, opportunity is the condition or situation that allows a person or organization to do three things: 1. Commit the fraud Most fraudulent financial reporting consists of the overstatement of assets or revenues or the understatement of liabilities, or the failure to disclose information. 2. Conceal the fraud A common and effective way to hide a theft is to charge the stolen item to an expense account. For example, charge supplies to an expense account when they are initially purchased, before they are used. This allows the perpetrator the opportunity to use some of the supplies for personal benefit at the expense of the company. These unused supplies should have been recorded as an asset called Supplies until they are used. Another way to hide a decrease in assets is by lapping. In a lapping scheme, the perpetrator steals the cash or check that customer A mails in to pay its accounts receivable. Funds received at a later date from customer B are used to pay off customer A’s balance. Funds from customer C is used to pay off customer B, and so forth. In a kiting scheme, the perpetrator covers up a theft by creating cash through the transfer of money between banks. For example, suppose a fraud perpetrator opens checking accounts in three banks, called bank A, B, and C, and deposits $100 in each account. Then the perpetrator “creates” cash by depositing a $1,000 check from bank A into bank B and then withdraws the $1,000 from bank B. It takes two days for his check to clear bank A. Because there are insufficient funds in bank A to cover the $1,000 check, the perpetrator deposits a $1,000 check from bank C to bank A before his check to bank B clears bank A. Because bank C also has insufficient funds, $1,000 must be deposited to bank C before the check to bank A clears. The check to bank C is written from bank B, which also has insufficient funds. And the scheme continues. I have also seen situations where kiting also includes credit cards with the use of checking accounts. Note to Instructor: Because most banks would require you to deposit some money to start a checking account, an initial deposit of $100 in each bank was included above. In addition, the following charts provide a picture explanation of the above kiting scheme. The chart uses dates, balances, and NSF due dates. 8-9 .
Rationalizations Rationalization allows perpetrators to justify their illegal behavior. A list of some of the rationalizations people use: 1. I am only “borrowing” the money (or asset) and will repay my “loan.” 2. You would understand if you knew how badly I needed it. 3. What I did was not that serious. 4. It was for a good cause (the Robin Hood syndrome, robbing from the rich to give to the poor). 5. I occupy a very important position of trust. I am above the rules. 6. Everyone else is doing it, so it is not that wrong. 7. No one will ever know. 8. The company owes it to me, and I am taking no more than is rightfully mine. Multiple Choice 4 The three conditions that are present when fraud occurs include: a. attitude b. opportunity c. lack of control d. financial Multiple Choice 5 The pressures that can lead to employee fraud include: a. fear of losing job b. lack of control c. poor performance ratings d. family or peer pressure e. a and d Multiple Choice 6 Internal control factors that provide an opportunity for employee and financial statement fraud includes a. incompetent personnel b. operating on a crisis basis c. inadequate supervision d. low employee morale and loyalty Note to the Instructor: Generally it is fairly easy to find several recent fraud schemes in the local news. Going through the news article and trying to identify the pressure, opportunity, and rationalization 8-11 .
as an in-class exercise or discussion is a good way for students to understand these concepts through telling of the story vs. memorization.
Learning Objective Four Define computer fraud and discuss the different computer fraud classifications.
Computer Fraud Computer fraud is any illegal act for which knowledge of computer technology is essential for its perpetration, investigation, or prosecution. More specifically, computer fraud includes the following: 1. Unauthorized theft, use, access, modification, copying, and destruction of software or data. 2. Theft of assets by altering computer records.
3. Intent to illegally obtain information or tangible property through the use of computers. The Rise in Computer Fraud Estimated costs of computer fraud in the United States is from $70 to $125 billion a year and rising. Computer systems are particularly vulnerable to computer crimes for the following reasons: 1. Billions of characters of data are stored in company databases. People who manage to break into these databases can steal, destroy, or alter massive amounts of data in very little time. 2. Computer fraud is difficult to detect. 3. Organizations want employees, customers, and suppliers to have access to their system. The number and variety of these access points significantly increase the risks. (A good example of this was Target’s computer fraud; http://krebsonsecurity.com/2014/02/target-hackers-broke-invia-hvac-company/). 4. Computer programs need to be changed or modified illegally only once without permission for the system to operate improperly for as long as the system is in use. 5. Modern systems utilize personal computers (PCs), which are inherently more vulnerable to security risks. It is difficult to control physical access to each networked PC. 8-12 .
In addition, PCs and their data can be lost, stolen, or misplaced. 6. Computer systems face a number of unique challenges: reliability (e.g., accuracy, completeness), equipment failure, environmental dependency (e.g., power, damage from water or fire), vulnerability to electromagnetic interference and interruption, eavesdropping, and misrouting. The increase in computer fraud schemes is due to some of the following reasons: 1. Not everyone agrees on what constitutes computer fraud. 2. Many computer frauds go undetected. For example, the Pentagon, which has the U.S. government’s most advanced hacker-awareness program, detected and reported only 1 in 500 break-ins. 3. A high percentage of uncovered frauds are not reported. 4. Many networks have a low level of security. 5. Many Internet pages give step-by-step instructions on how to perpetrate computer crimes and abuses. 6. Law enforcement is unable to keep up with the growing number of computer frauds. 7. The total dollar value of losses is difficult to calculate. Computer Fraud Classifications As shown in Figure 8-2 on page 263, one way to categorize computer fraud is to use the data processing model: input, processor, computer instructions, stored data, and output. Input Fraud The simplest and most common way to commit fraud is to alter computer input. It requires little, if any, computer skills. Instead, perpetrators need only understand how the system operates so they can cover their tracks. To commit payroll fraud, perpetrators can enter data to increase their salary, create a fictitious employee, or retain a terminated employee on the records. Example of input fraud: a New York bank employee changes the company deposit slips to forged deposit slips. For three days he deposited bank deposits in his personal account. Then he disappeared and was not caught as he used an alias name. There are more examples on page 263. 8-13 .
Processor Fraud Computer fraud can be committed through unauthorized system use, including the theft of computer time and services. Example of processor fraud: employees of an insurance company were running an illegal gambling website. These employees hid the computers under the floor. There are more examples on page 263. Computer Instructions Fraud Computer fraud can be accomplished by tampering with the software that processes company data. Data Fraud Illegally using, copying, browsing, searching, or harming company data constitutes data fraud. The greatest exposure in data fraud comes from employees with access to the data. The most frequent type of data fraud is the illegal use of company data, typically by copying it, using it, or searching it without permission. For example, an employee using a small flash drive or an iPod can steal large amounts of data and remove it without being detected. The following are some recent examples of stolen data: 1. The office manager of a Wall Street law firm found information about prospective mergers and acquisitions in the firm’s Word files. He sold the information to friends and relatives, who made several million dollars trading the securities illegally. 2. A 22-year-old Kazakhstan man broke into Bloomberg’s network and stole account information, including that of Michael Bloomberg, the mayor of New York and the founder of the financial news company. He demanded $200,000 in exchange for not using or selling the information. He was arrested in London when accepting the ransom. 3. A software engineer tried to steal Intel’s plans for a new microprocessor. Because he could view but not copy or print the manufacturing plans, he photographed them screen by screen late at night in his office. One of Intel’s controls was to notify security when the plans were viewed after hours. He was caught photographing the plans. 4. Cyber-criminals used sophisticated hacking and identity theft techniques to hack into seven major online brokerage firm accounts. They sold the securities in those accounts and used the cash to pump up the price of 15 low-priced, 8-14 .
thinly traded public companies they already owned. They then dumped the 15 stocks in their personal accounts for huge gains. E-trade lost $18 million and Ameritrade $4 million in similar pump-and-dump schemes. 5. The U.S. Department of Veterans Affairs was sued because an employee laptop that contained the records of 26.5 million veterans was stolen, exposing them all to identity theft. Later, another laptop with the records of 38,000 people disappeared from a subcontractor’s office. Data can also be changed, damaged, destroyed, or defaced. Data also can be lost due to negligence or carelessness. Deleting files does not erase them. Even reformatting a hard drive often does not erase files or wipe the drive clean. Output Fraud Computer output, displayed on monitors or printed on paper, can be stolen or misused. Fraud perpetrators can use computers and output devices to forge authentic-looking outputs. For example, a company laserprinter could be used to prepare paychecks. Multiple Choice 7 Computer fraud is increasing rapidly due to the fact that: a. not everyone agrees on what constitutes computer fraud b. many computer frauds go undetected c. the total dollar value of losses is difficult to calculate d. all of the above Multiple Choice 8 Which of the following is not a classification of computer fraud: a. Data fraud b. Input fraud c. Processor fraud d. Program fraud
Multiple Choice 9 An employee downloaded new product development plans after hours. This is an example of: a. Input fraud b. Output fraud c. Processing fraud d. Data fraud e. Computer instructions fraud
8-15 .
Learning Objective Five Explain how to prevent and detect computer fraud and abuse.
Preventing and Detecting Computer Fraud and Abuse Table 8-5 on pages 265 and 266 provides a summary of ways to prevent and detect computer fraud. 1. Make fraud less likely to occur. 2. Increase the difficulty of committing fraud. 3. Improve detection methods. 4. Reduce fraud losses and errors. Multiple Choice 10 Ways to prevent and detect computer fraud include: a. Develop a strong system of internal controls. b. Install fraud detection software. c. Segregate the accounting functions of authorization, recording, and custody. d. All of the above.
Answer to Multiple Choice Questions: Multiple Choice Question Answers Number Answer Number Answer 1 D 6 C 2 B 7 D 3 A 8 D 4 B 9 D 5 E 10 D Note to the Instructor: The following is taken from the Certified Fraud Examiners Manual that includes additional information regarding fraud schemes that may be included for the students.
EMPLOYEE FRAUD SCHEMES Cash Cash is the focal point of most accounting entries. Cash, both on deposit in banks and petty cash, can be misappropriated through many different schemes. These schemes can be either on-book or off-book, 8-16 .
depending on where they occur. Generally, cash schemes are smaller than other internal fraud schemes because companies have a tendency to have comprehensive internal controls over cash and those internal controls are adhered to. Cash fraud schemes follow general basic patterns, including skimming, voids/under-rings, swapping checks for cash, alteration of cash receipt tapes, fictitious refunds and discounts, journal entries, and kiting. Skimming Skimming involves removing cash from the entity before the cash is recorded in the accounting system. This is an off-book scheme; receipt of the cash is never reported to the entity. A related type of scheme is to ring up a sale for less than the actual sale amount. (The difference between the actual sale and the amount on the cash register tape can then be diverted.) This is of particular concern in retail operations (e.g., fast food restaurants) where much of the daily sales are in cash, and not by check or credit card. EXAMPLE According to an investigation, fare revenues on the Chicago Transit Authority’s (CTA) rail system allegedly were misappropriated by agency employees. The statistics indicate that the thefts are not confined to the one station that originally was suspected and that the fare-skimming by transit workers might have been reduced by news of the investigation. In the four days after reports of skimming surfaced, about $792,000 was turned in by station agents system wide. In a similar Monday through Friday period only $723,000 was turned in by station agents. CTA officials estimated that a planned installation of a $38 million automated fare-collection system would eliminate $6.5 million annually in revenue “shrinkage,” mostly from employee theft. At least 10 workers have been investigated, including nine ticket agents and one supervisor or clerk. Early reports indicated that agents pocketed money after recording “transfer” or “monthly passes” as cash-paying customers passed through turnstiles. Voids/Under-Rings There are three basic voids/under-ring schemes. The first is to record a sale/cash receipt and then void the same sale, thereby removing the cash from the register. The second, and more common variation, is to purchase merchandise at unauthorized discounts. The third scheme, which is a variation of the unauthorized discount, is to sell merchandise to a friend or co-conspirator using the employee’s discount. The coconspirator then returns the merchandise for a full refund, disregarding the original discount. EXAMPLE Roberta Fellerman, a former Ball State University employee, was indicted on federal charges of stealing about $105,000 from the school’s bookstore operations. Fellerman was charged with stealing the money over a 33-month period. 8-17 .
The thefts allegedly were from proceeds of the sales of books to students who took Ball State courses through an “off-campus” program at many cities around Indiana. Fellerman was in charge of the sale of the books from the book store. Fellerman was accused of altering records and taking currency from a cash drawer. She was also charged with income tax violations for failing to report the stolen money on her federal tax returns. Swapping Checks for Cash One common method where an employee can misappropriate cash is to exchange his own check for cash in the cash register or cash drawer. Periodically, a new check is written to replace the old check. This process can be continued so that on any given day, there is a current check for the cash removed. This is a form of unauthorized “borrowing” from the company. Obviously, if it is the company policy that cash drawers or registers are reconciled at the conclusion of each day and turned over to a custodian, then this fraud scheme is less likely to be committed. However, if personnel are allowed to keep their own cash drawers and only remit the day’s receipts, then this method of unauthorized borrowing will be more common. EXAMPLE Lisa Smith, a Garfield High School fiscal clerk at a central treasurer function allegedly “borrowed” $2,400 by placing 23 personal checks in deposits which were made from various student activities at decentralized locations. Ms. Smith placed a personal check in each deposit as a method of keeping track of the amount of money which had been “borrowed.” The transactions were inappropriately delayed for up to five months. Auditors detected the delayed transactions during an unannounced cash count. On the day of the count, the fund custodian had only a few hundred dollars in his bank account (confirmed by telephone upon receipts of custodian’s authorization). When all 23 personal checks were deposited in the district’s account, several were returned as NSF. After payday, all NSF checks subsequently cleared the bank. The custodian’s employment with the district was terminated. Alteration of Cash Receipts Documentation A lack of segregation of duties can create an opportunity for an employee to misappropriate company funds. For example, if the same person is responsible for both collecting and depositing the cash receipts, then this person has the opportunity to remove funds from the business for his own personal use and conceal such theft through the deposits. This is often the case in smaller organizations where there are few personnel to divide the daily operations. A variation of this scheme is to mutilate or destroy the cash receipts documentation so that any attempt to reconcile the cash deposited with the cash receipts is thwarted. 8-18 .
EXAMPLE An elected county treasurer allegedly stole $62,400 over a threeyear period from property tax receipts. Every other day, after cash receipt transactions were batched and posted to the subsidiary accounting records, the treasurer altered the total cash receipts and the actual deposit. Therefore, the control account and the deposit were equal but that total did not match the total postings to the individual tax payers’ accounts. In each of the three years, the difference between the control account receivable and the summation of the individuals in the subsidiary accounts was written off. These were unsupported accounting adjustments. Evidence was obtained by reconstructing the three years’ cash receipts and matching the differences between the total cash receipts, control account, and the individual (subsidiary) accounts with the unsupported accounting adjustments. Fictitious Refunds and Discounts Fictitious refunds occur when an employee enters a transaction as if a refund were given; however, no merchandise is returned, or no discount is approved which substantiates the refund or discount. The employee misappropriates funds equal to the fictitious refund or discount. This scheme is most prevalent in the retail/merchandise industry; however, it can occur in any operation in which a refund or discount is given. EXAMPLE Dora Malfrici, a former New York University student financial aid official, was charged along with her husband Salvatore with stealing $4.1 million. This was allegedly done by falsifying more than a thousand tuition refund checks. The loss was described as one of the largest embezzlements ever uncovered at a U.S. university. The money was allegedly taken from the Tuition Assistance Program, operated by the New York State Higher Education Services Corporation to provide expenses money to needy students. However, NYU officials assert that the funds came from a University account, not from State money. Malfrici’s job was to assure that students entitled to funds from the Corporation received their checks. According to the U.S. Attorney, she arranged for checks to be made out to hundreds of legitimate NYU students who were not entitled to receive any funds. These students were kept unaware of this because the checks were deposited into bank accounts in Manhattan and New Jersey that allegedly were controlled by the Malfricis. These checks were made over to Elizabeth Pappa before being deposited into accounts in that name. Some other checks were made payable directly to Pappa. The FBI was unable to locate Elizabeth Pappa and believes that such a person never existed. Reportedly, the Malfricis spent $785,000 of the funds in question on expensive jewelry and $85,000 of the money on Florida real estate. Kiting 8-19 .
Kiting is the process whereby cash is recorded in more than one bank account, but in reality, the cash is either nonexistent or is in transit. Kiting schemes can be perpetrated using one bank and more than one account or between several banks and several different accounts. Although banks generally have a daily report that indicates potential kiting schemes, experience has shown that they are somewhat hesitant to report the scheme until the balance in their customers’ accounts is zero. There is one important element to check kiting schemes: all kiting schemes require banks to pay on unfunded deposits. This is not to say that all payments on unfunded deposits are kiting schemes, but rather, that all kiting schemes require payments be made on unfunded deposits. In other words, if a bank allows its customers to withdraw funds on deposits that the bank has not yet collected the cash, then kiting schemes are possible. In today’s environment where customers use wire transfers, kiting schemes can be perpetrated very quickly and in very large numbers. EXAMPLE Ronald W.P. Sylvia, 59, and his son-in-law, Philip L. Grandone, 33, both of Dartmouth, admitted to participating in a checkkiting scheme that bilked the Bank of Boston out of $907,000. Grandone, owner of two pharmacies in the New Bedford area, had cash-flow problems when Sylvia, operator of two auto sales and leasing businesses, offered to write a check to cover some of his son-in-law’s operating expenses. Grandone repaid that $50,000 loan within a few days, but borrowed again and again “in everincreasing amounts” to bring fresh infusions of cash into his faltering pharmacy businesses. An exchange of checks between Grandone and Sylvia eventually occurred literally daily until Sylvia’s bank caught on to the float scheme and froze Sylvia’s account. Cut off from Sylvia’s supply of cash, Grandone’s account with the Bank of Boston was left overdrawn by $907,000. Grandone was ordered to make restitution to the Bank of Boston.
8-20 .
CHAPTER 9 COMPUTER FRAUD AND ABUSE TECHNIQUES Instructor’s Manual Learning Objectives: 1. Compare and contrast computer attack and abuse tactics. 2. Explain how social engineering techniques are used to gain physical or logical access to computer resources. 3. Describe the different types of malware used to harm computers.
Learning Objective One Compare and contrast computer attack and abuse tactics.
Computer Attacks and Abuse Techniques Computer Attacks Six steps that many criminals use to attack information systems. 1. Conduct Reconnaissance. Study the target to learn as much as possible about the target and potential vulnerabilities. 2. Attempt Social Engineering. Often the easiest method to break into a system is to get someone to open the ‘door’. Imaging a phone call that goes as follows: “Hi this is Bill from IT Support. You may have noticed your computer is running slowly. We think you have a malware. Let me help. Logoff and restart your computer. As the computer boots, tell me everything you see on the computer screen. Now tell me each thing that you type in as you boot the computer. It’s OK to tell me your userid and password. After all, I’m from support.” 3. Scan and map the target. This is done to identify potential points of remote entry or other vulnerabilities. There is a lot of software tools that are available to help even a novice attacker perform sophisticated attacks.
9-1 .
Note to Instructor: You could illustrate the ease by which an attacker can conduct reconnaissance on a system. They can use open source software such as SAINT https://en.wikipedia.org/wiki/SAINT (software) which launches a set of probes to a system to detect anything that might allow them to gain unauthorized access.
4. Research the software, hardware, and other devices associated with the network. 5. Execute the attack. 6. Cover tracks. Find and delete logs. Install software to create a backdoor for future visits to the compromised system.
Hacking is the unauthorized access to and use of computer systems, usually by means of a personal computer and a telecommunications network. Most hackers are able to break into systems using known flaws in operating systems or application programs, or as a result of poor access controls. Some hackers are motivated by the challenge of breaking into computer systems and just browse or look for things to copy and keep. Other hackers have malicious intentions. The following examples illustrate hacking attacks and the damage they cause: 1. Several years ago, Russian hackers broke into Citibank’s system and stole $10 million from customer accounts. 2. 101 million Sony PlayStation accounts were hacked, crashing the network for over a month. More than 12 million credit card numbers, e-mail addresses, passwords, home addresses, and other data were stolen. Hijacking is gaining control of someone else’s computer to carry out illicit activities without the user’s knowledge. A botnet, short for robot network, is a network of hijacked computers. Hackers who control the hijacked computers, called bot herders, use the combined power of the infected machines, called zombies. A denial-of-service (DoS) attack occurs when an attacker sends so many e-mail bombs (thousands per second), often from randomly generated false addresses, that the Internet service provider’s e-mail server is overloaded and shuts down. Another DoS attack is sending so many requests for web pages that the web server crashes. 9-2 .
A good example was when lots of people were receiving so many e-mails so fast that they could not even delete them all; it was just a constant flow of e-mails in which these people could not do anything else. As a result, some people now have more than one e-mail provider, one which they only use to catch the junk e-mails. Most DoS attacks are quite easy to accomplish and involve the following: 1. The attacker infects a botnet with a DoS program. 2. The attacker activates the program and the zombie computers begin sending pings (e-mails or requests for data) to the computer being attacked. The victim computer responds to each ping, not realizing the zombie computer sent it a fictitious return address and waits for a response that never comes. 3. Because the victim computer is waiting for so many responses that never come, system performance begins to degrade until the computer finally freezes (it does nothing but respond to the pings) or it crashes. 4. The attacker terminates the attack after an hour or two to limit the victim’s ability to trace the source of the attacks. Brute Force Attack. All possible combinations of characters are used when performing the attack. Newer computers can do every possible combination of 8 characters in about 2 hours. Longer passwords are becoming more and more important. Dictionary Attack. Rather than use every possible combination, software uses the words and combinations of words in a dictionary iteratively to find a match. You may note patterns in how email addresses are assigned in businesses. That pattern can be placed in software such that email addresses are generated that follow the pattern. Let the fishing begin… Lewis University found that 74% of emails received on one day were for nonexistent email addresses. Clearly an attack. See spamming below. Credential recycling is also prevalent. An attacker buys breached personal data from the dark web. They then use that data to attempt to access other websites. You can find out if your email address was breached in known breaches by visiting Have I Been PWNED https://haveibeenpwned.com/ The best defenses against attack are monitoring, long/complex passwords, limiting attempts, and multifactor authentication. Spamming is e-mailing the same unsolicited message to many people at the same time, often in an attempt to sell them something. Spammers use very creative means to find valid e-mail addresses. They scan the Internet for addresses 9-3 .
posted online and also hack into company databases and steal mailing lists. Hackers also spam blogs (Splogs), which are websites containing online journals, by placing random or nonsensical comments to blogs that allow visitor comments. Splogs, or spam blogs, promote affiliated websites to increase their Google Page Rank, a measure of how often a web page is referenced by other web pages. Spoofing is making an electronic communication look as if someone else sent it to gain the trust of the recipient. Spoofing includes the following types: E-mail spoofing is making an e-mail appear as though it originated from a different source. Caller ID spoofing is displaying an incorrect number (any number the attacker chooses) on a caller ID display to hide the caller’s identity. (This is an increasing activity with cellphones.) IP address spoofing is creating Internet Protocol (IP) packets with a forged source IP address to conceal the identity of the sender or to impersonate another computer system (often used in DoS attacks). SMS spoofing is using the short message service (SMS) to change the name or number a text message appears to come from. Web-page spoofing or phishing. A zero-day attack (or zero-hour attack) is an attack between the time a new software vulnerability is discovered, and the software developers and the security vendors release software, called a patch, that fixes the problem. Cross-site scripting (XSS) is a vulnerability in dynamic web pages that allows an attacker to bypass a browser’s security mechanisms and instruct the victim’s browser to execute code, thinking it came from the desired website. Buffer overflow attack happens when the amount of data entered into a program is greater than the amount of the memory (the input buffer) set aside to receive it usually causing the system to crash.
SQL Injection (insertion) attack, malicious code in the form of an SQL query is inserted into input so it can be passed to and executed by an application program. 9-4 .
In masquerading, or impersonation, the perpetrator gains access to the system by pretending to be an authorized user. This approach requires a perpetrator to know the legitimate user’s ID number and password. Man-in-the-middle (MITM) attack is when a hacker intercepts network traffic between a client and a host. Figure 9-1 on p. 188 describes a MITM attack. Piggybacking is tapping into a telecommunications line and latching on to a legitimate user before the user logs into a system. The legitimate user unknowingly carries the perpetrator into the system. Piggybacking has several meanings: 1.
The clandestine use of a neighbor’s Wi-Fi network; this can be prevented by enabling the security feature in the wireless network.
2.
Tapping into a telecommunications line and electronically latching on to a legitimate user before the user enters a secure system; the legitimate user unknowingly carries the perpetrator into the system.
3.
An unauthorized person passing through a secure door when an authorized person opens it, thereby bypassing physical security controls, such as keypads, ID cards, or biometric identification scanners.
Hackers who search for dial-up modem lines by programming computers to dial thousands of phone lines are referred to as war dialing. War driving is driving around looking for unprotected wireless networks. Some war drivers draw chalk symbols on sidewalks to mark unprotected wireless networks, referred to as war chalking. One enterprising group of researches went war rocketing. They sent rockets into the air that let loose wireless access points, each attached to a parachute. Podslurping is using a small device with a storage capacity (e.g., ipod or usb drive) to download unauthorized data. A fraud perpetrator can use the salami technique, to embezzle large sums of money a “salami slice” at a time from many different accounts (tiny slices of money are stolen over a period of time). The round-down fraud technique is used most frequently in financial institutions that pay interest. In the typical 9-5 .
scenario, the programmer instructs the computer to round down all interest calculations to two decimal places. The fraction of a cent that is rounded down on each calculation is put into the programmer’s account or one that he or she controls. Phreaking is attacking phone systems to obtain free phone line access. Phreakers also use the telephone lines to transmit viruses and to access, steal, and destroy data. Economic espionage is the theft of information, trade secrets, and intellectual property. This has increased by 323% during one five-year period. The U.S. Department of Justice estimates that intellectual property theft losses total $250 billion a year. Almost 75% of these losses are to an employer, former employer, contractor, or supplier. A growing problem is cyber-extortion, in which fraud perpetrators threaten to harm a company if it does not pay a specified amount of money. Cyber-bullying is using the Internet, cell phones, or other communication technologies to support deliberate, repeated, and hostile behavior that torments, threatens, harasses, humiliates, embarrasses, or otherwise harms another person. Sexting is exchanging sexually explicit text messages and revealing pictures, usually via phone. Internet misinformation is using the Internet to spread false or misleading information about people or companies. This can be done in a number of ways, including inflammatory messages in online chats, setting up websites, and spreading urban legends. Fraud perpetrators are beginning to use unsolicited e-mail threats to defraud people. For example, Global Communications sent a message to many people threatening legal action if an unspecified overdue amount was not paid within 24 hours. Internet auction fraud is using an Internet auction site to defraud another person. Internet pump-and-dump fraud is using the Internet to pump up the price of a stock and then selling it. Cryptocurrency Fraud - Defrauding investors in a variety of cryptocurrency-related fraud schemes, such as fake initial coin offerings and fake exchanges and wallets. Many companies advertise online and pay based on how many users click on ads that take them to the company’s website. Advertisers pay from a few cents to more than $10 for each click. Click fraud is intentionally clicking on these ads numerous times to inflate advertising bills. Software piracy is copying software without the publisher’s permission. It is estimated that for every legal copy of software 9-6 .
there are seven to eight illegal ones. I have seen some places where this is almost like an acceptable practice. Multiple Choice 1 Stealing tiny slices of money over time is which technique: a. Posing b. Salami technique c. Vishing d. Data diddling Multiple Choice 2 A hacker that places himself between a client and a host to intercept communications between them is: a. Man in the middle b. Evil twin c. Middleman d. None of the above
Learning Objective Two Explain how social engineering techniques are used to gain physical or logical access to computer resources.
Social Engineering Social engineering refers to techniques or psychological tricks used to get people to comply with perpetrators wishes to gain physical or logical access to a building, computer, server, or network. According to Cisco, perpetrators take advantage of several human traits to gain unauthorized access to networks, systems, or physical locations. 1. Compassion—people’s desire to help others. 2. Greed—getting a good deal or something for free. 3. Sex Appeal—more likely to cooperate if flirtatious. 4. Sloth—take advantage of laziness as few people want to do things the hard way. 5. Trust—more likely to cooperate if gain someone’s trust. 6. Urgency—sense of urgency or immediate need leads people to be more cooperative. 7. Vanity—more likely to be cooperative if appeal to someone’s vanity. To minimize the threat of social engineering: 9-7 .
1. Never let people follow you into a restricted area. 2. Never login for someone else on a computer. 3. Never give sensitive information over the phone or through email. 4. Never share passwords or user IDs. 5. Be cautious of anyone you do not know who is trying to gain access through you. Focus 9-2 on p. 293 discusses how social engineering is used on the social networking site, Facebook, to perpetrate fraud. Identity theft is assuming someone’s identity, usually for economic gain, by illegally obtaining and using confidential information, such as the person’s Social Security number or their bank account or credit card number. Identity thieves benefit financially by taking funds out of the victim’s bank accounts, taking out mortgages, or other loan obligations, and taking out credit cards and running up large debts. In one case, a convicted felon incurred $100,000 of credit card debt, took out a home loan, purchased homes and consumer goods, and then filed for bankruptcy in the victim’s name. In pretexting, people act under false pretenses to gain confidential information. For example, they might conduct a security investigation and lull the person into disclosing confidential information by asking 10 innocent questions before asking the confidential ones. Posing is creating a seemingly legitimate business, collecting personal information while making a sale, and never delivering a product. Phishing is sending out an e-mail, instant message, or text message pretending to be a legitimate company, usually a financial institution, and requesting information. The recipient is asked to either respond to the e-mail request or visit a web page and submit the data or respond to a text message. The IRS has set up a website and an e-mail address (phishing@irs.gov) where people can forward for investigation suspicious e-mails that purport to be from the IRS. In voice phishing, or vishing, e-mail recipients are asked to call a specified phone number, where a recording tells them to enter confidential data. Phished (and otherwise stolen) credit card numbers can be bought and sold, which is called carding. Pharming is redirecting a website’s traffic to a bogus (spoofed) website, usually to gain access to personal and confidential information. So how does pharming work? If you do not know someone’s phone number, you look it up in a phone book. If you could change XYZ Company’s number in the phone book to your phone number, people calling XYZ Company would reach you instead. You 9-8 .
could then ask them to divulge information only they would know to verify their identity. An evil twin is when a hacker sets up a wireless network with the same name (called Service Set Identifier, or SSID) as the wireless access point at a local hot spot or a corporation’s wireless network. Typosquatting, also called URL hijacking, is setting up websites with names very similar to real websites so when users make mistakes, such as typographical errors, in entering a website name the user is sent to an invalid site. The typosquatter’s site may do the following: 1. Trick the user into thinking she is at the real site by using a copied or a similar logo, website layout, or content. These sites often contain advertising that would appeal to the person looking for the real domain name. The typosquatter might also be a competitor. 2. Send the user to a site very different from what was wanted. In one famous case, a typosquatter sent people looking for sites that appealed to children to a pornographic website. 3. Use the false address to distribute viruses, adware, spyware, or other malware. Scavenging, or dumpster diving, is gaining access to confidential information by searching corporate or personal records. Some identity thieves search garbage cans, communal trash bins, and city dumps to find documents or printouts with confidential company information. They also look for personal information, such as checks, credit card statements, bank statements, tax returns, discarded applications for reapproved credit cards, or other records, that contain Social Security numbers, names, addresses, telephone numbers, and other data that allow them to assume an identity. Be sure to tear up (or preferably shred) your personal correspondence from banks and credit card companies to the point that the number cannot be read, before you throw it in to the trash; especially in a public trash container. Shoulder surfing is watching people as they enter telephone calling card or credit card numbers or listening to conversations as people give their credit card number over the telephone or to salesclerks. Lebanese looping, the perpetrator inserts a sleeve into an ATM that prevents the ATM from ejecting the card. The perpetrator pretends to help, tricking the person into entering her PIN again. Once the victim gives up, the thief removes the card and uses it and the PIN to withdraw money. Skimming is double-swiping a credit card in a legitimate terminal or covertly swiping a credit card in a small, hidden, handheld card reader that records credit card data for later use. 9-9 .
Chipping is posing as a service engineer and planting a small chip in a legitimate credit card reader. Eavesdropping enables perpetrators to observe private communications or transmissions of data. One way to intercept signals is by setting up a wiretap. Discussion Question: Do your activities using social media (e.g., Facebook, Twitter, Linkedin) expose any risks of computer attacks or fraud? What about your use of smartphones? The intent here is to get a discussion with the students to have them understand how their activities on social media websites may put them at risk. For example, many banking sites ask about your high school mascot, or the first car you drove, and so on. This information may be skimmed off of social media sites if the user is unaware of their privacy settings. Use of smartphones can also be a good discussion as to apps that are downloaded and how do you know that if they are free, they do not include malware? Multiple Choice 3 Techniques used to obtain confidential information, often by tricking people, are referred to as what? a. Pretexting b. Posing c. Social engineering d. Identity theft
Learning Objective Three Describe the different types of malware used to harm computers.
Malware This section describes malware, which is any software that can be used to do harm. Malware is not restricted to computers and is spread using several simultaneous approaches including fake versions of legitimate apps, file sharing, shared access to files, e-mail attachments, and remote access vulnerabilities. Pages 297-305 list various malware types. Spyware software secretly collects personal information about users and sends it to someone else without the user’s permission. The information is gathered by logging keystrokes, monitoring 9-10 .
computing habits, such as websites visited, and scanning documents on the computer’s hard disk. Spyware infections, of which users are usually unaware, come from the following: 1. Downloads, such as file sharing programs, system utilities, games, wallpaper, screensavers, music, and videos. 2. Websites that secretly download spyware when they are visited. This is call drive-by downloading. 3. A hacker using security holes in web browsers and other software. 4. Programs masquerading as anti-spyware security software. 5. A worm or virus. 6. Public wireless network. For example, users receive a message they believe is from the coffee shop or hotel where they are using wireless technology. Clicking on the message inadvertently downloads a Trojan horse or spyware application. One type of spyware, called adware (short for advertising supported software), does two things: First, it causes banner ads to pop up on your monitor as you surf the Internet. Second, it collects information about the user’s web-surfing and spending habits and forwards it to the company gathering the data, often an advertising or large media organization. Scareware is malicious software of no benefit that is sold using scare tactics. Ransomware locks you out of all your programs and data by encrypting them. Often times, victims are told to pay the ransom in bitcoins. Another form of spyware, called a keylogger, records computer activity, such as a user’s keystrokes, e-mails sent and received, websites visited, and chat session participation. A Trojan horse is a set of malicious, unauthorized computer instructions in an authorized and otherwise properly functioning program. Some Trojan horses give the creator the power to remotely control the victim’s computer. Unlike viruses and worms, the code does not try to replicate itself. Time bombs and logic bombs are Trojan horses that lie idle until triggered by a specified time or circumstance. Once triggered, the bomb goes off, destroying programs, data, or both. Company insiders, typically disgruntled programmers or other systems personnel who want to get even with their company, write many bombs. 9-11 .
A trap door, or back door, is a way into a system that bypasses normal system controls. Programmers use trap doors to modify programs during systems development and normally remove them before the system is put into operation. Packet sniffers are programs that capture data from information packets as they travel over the Internet or company networks. Captured data are sifted to find confidential information, such as user IDs and passwords, and confidential or proprietary information that can be sold or otherwise used. Steganography programs hide data from one file inside a host file, such as a large image or sound file. There are more than 200 different steganographic software programs available on the Internet. A rootkit is software that conceals processes, files, network connections, memory addresses, systems utility programs, and system data from the operating system and other programs. Rootkits often modify parts of the operating system or install themselves as drivers. A computer virus is a segment of self-replicating, executable code that attaches itself to software. Many viruses have two phases. In the first phase, the virus replicates itself and spreads to other systems or files when some predefined event occurs. In the attack phase, also triggered by some predefined event, the virus carries out its mission. In one survey, almost 90% of the respondents said their company was infected with a virus within the prior 12 months. During the attack phase, triggered by some predefined event, viruses destroy or alter data or programs, take control of the computer, destroy the hard disk’s file allocation table, delete or rename files or directories, reformat the hard disk, or change the content of files. Symptoms of a computer virus include computers that will not start or execute; unexpected read or write operations; an inability to save files; long program load times; abnormally large file sizes; slow systems operation; and unusual screen activity, error messages, or file names. The Sobig virus, written by Russian hackers, infected an estimated 1 of every 17 e-mails several years ago. The MyDoom virus infected 1 in 12 e-mails and did $4.75 billion in damages. It is estimated that viruses and worms cost businesses more than $20 billion a year. Most viruses attack computers, but all devices connected to the Internet or that are part of a communications network run the risk of being infected. Recent viruses have attacked cell phones 9-12 .
and personal digital assistants. These devices are infected through text messages, Internet page downloads, and Bluetooth wireless technology. Flows in Bluetooth applications have opened up the system to attack. Bluesnarfing is stealing (snarfing) contact lists, images, and other data from other devices using Bluetooth. Bluebugging is taking control of someone else’s phone to make calls or send text messages, or to listen to phone calls and monitor text messages received. A computer worm is a self-replicating computer program similar to a virus except for the following three differences: 1.
A virus is a segment of code hidden in or attached to a host program or executable file, whereas a worm is a standalone program.
2.
A virus requires a human to do something (run a program, open a file, etc.) to replicate itself, whereas a worm does not and actively seeks to send copies of itself to other devices on a network.
3.
Worms harm networks (if only by consuming bandwidth), whereas viruses infect or corrupt files or data on a targeted computer.
Worms often reside in e-mail attachments, which, when opened or activated, can damage the user’s system. A worm usually does not “live” very long, but it is quite destructive while “alive.”
Multiple Choice 4 What type of software secretly collects personal information about users and sends it to someone else without the user’s permission? a. Rootkit b. Torpedo software c. Spyware d. Malware Multiple Choice 5 Software that records computer activity is known as: a. Trojan horse b. Malware c. Spyware d. Keylogger
Answer to Multiple Choice Questions:
9-13 .
Multiple Choice Question Answers Number Answer 1 B 2 A 3 C 4 C 5 D Note to Instructors: This chapter contains a long list of terms and definitions. It can sometimes be difficult for a student to remember them in an efficient way. There are two resources that you may find helpful in assigning students to watch videos. The first resource is from Bryant University with 10 short videos 5–10 min each) called “A hacker’s guide to cybersecurity”. The first five videos are about hacking that relate to this chapter, the last five videos are on prevention and what to do if you have been breached. A Second resource is a documentary movie on the web, “Can you hack ithackers wanted” produced by Kevin Spacey (1.5 h long) that provides a good story with many of these terms. In addition, the FBI has a cybersecurity section to their web page that provides recent news on computer attacks. Resources: http://www.hackersguidetocybersecurity.com/ Documentary can be seen on YouTube: http://www.youtube.com/watch?v=CdfeXqKDWHg http://www.fbi.gov/about-us/investigate/cyber
9-14 .
CHAPTER 10 CONTROL AND ACCOUNTING INFORMATION SYSTEMS Instructor’s Manual Learning Objectives: 1. Explain basic control concepts and why computer control and security are important. 2. Compare and contrast the COBIT, COSO, and ERM control frameworks. 3. Describe the major elements in the environment of a company. 4. Explain how to assess and respond to risk using the Enterprise Risk Management (ERM) model. 5. Describe control activities commonly used in companies. 6. Describe how to communicate information and monitor control processes in organizations.
Introduction Why Accounting Information Systems Threats Are Increasing More than 60% of organizations have recently experienced a major control failure for some of the following reasons: 1. Increase in number of information systems means that information is available to an increasing number of workers. 2. Distributed (decentralized) computer networks are harder to control than centralized mainframe systems. 3. Wide area networks are giving customers and suppliers access to one another’s systems and data, making confidentiality a major concern. Some of the reasons why organizations do not adequately protect their data are: 1. Computer control problems have been underestimated and downplayed. 2. The control implications of moving from centralized, hostbased computer systems to a networked or Internet-based system have not been fully understood. 3. Many companies have not realized that data is a resource and must be protected. 4. Productivity and cost pressures have motivated management to forgo time-consuming control measures. 10-1 .
Any potential adverse occurrence that could be injurious to either the accounting information system or the organization is referred to as a threat. The potential dollar loss should a particular threat become a reality is referred to as the exposure or impact of the threat. The probability that the threat will happen is the likelihood associated with the threat.
Why Control and Security Are Important As an accountant you must have a good understanding of information technology (IT) and its capabilities and risks. Although, internal control objectives remain the same regardless of the data processing method, a computer-based AIS requires different internal control policies and procedures. One of the primary objectives of an accounting information system is to provide control in a business organization. One of management’s basic functions is to ensure that enterprise objectives are achieved. Thus, management’s decisions pertaining to controls are crucial to the firm’s success in meeting its objectives. Management expects accountants to: 1.
Take a proactive approach to eliminating system threats.
2.
Detect, correct, and recover from threats when they occur.
Learning Objective One Explain basic control concepts and why computer control and security are important.
Overview of Control Concepts Internal control is the process implemented by the board of directors, management, and those under their direction to provide reasonable assurance that the following control objectives are achieved: 1. Safeguarding assets, including preventing or detecting, on a timely basis, the unauthorized acquisition, use, or disposition of material company assets.
10-2 .
2. Maintaining records in sufficient detail to accurately and fairly reflect company assets. 3. Providing accurate and reliable information. 4. Prepare financial reports in accordance with established criteria. 5. Promoting and improving operational efficiency, including making sure company receipts and expenditures are made in accordance with management and directors’ authorizations. 6. Encouraging adherence to prescribed managerial policies. 7. Complying with applicable laws and regulations. Preventive controls deter problems before they arise: anticipate the problem. Detective controls discover problems as soon as they arise: what we normally call in auditing “following the problem.” Corrective controls identify and correct problems that have been discovered and recover from resulting errors. They include procedures taken to identify the cause of a problem, correct resulting errors or difficulties, and modify the system so that future problems are minimized or eliminated. General controls are designed to make sure an organization’s control environment is stable and well managed. Some of the more important general controls are: 1.
Information systems management controls.
2.
Security management controls.
3.
Information technology infrastructure controls.
4.
Software acquisition, development, and maintenance controls.
Application controls prevent, detect, and correct transaction errors and fraud in application programs. They are concerned with the accuracy, completeness, validity, and authorization of the data captured, entered, processed, stored, transmitted to other systems, and reported.
Levers of Control Many people feel there is a basic conflict between creativity and controls. In other words, you cannot have both. Four levels of control to help companies to reconcile this conflict: 1. The first is a concise belief system that 10-3 .
communicates company core values to employees and inspires them to live by them. 2. A boundary system helps employees act ethically by setting limits on employee behavior. This means encouraging employees to solve problems and meet customer needs within the limits of freedom. 3. To ensure the efficient and effective achievement of important goals, a diagnostic control system measures company progress by comparing actual performance to planned performance (budget). 4. An interactive control system helps top-level managers with high-level activities that demand frequent and regular attention, such as developing company strategy, setting company objectives, understanding and assessing threats and risks, monitoring changes in competitive conditions and emerging technologies, and developing responses and action plans to proactively deal with these highlevel issues. The Foreign Corrupt Practices and Sarbanes-Oxley Acts The Foreign Corrupt Practices Act (1977) The primary purpose of this Act was to prevent the bribery of foreign officials in order to obtain business. The chapter notes example of FCPA violations that resulted in fines in the billions. The Sarbanes-Oxley Act of 2002 (SOX) Applies to publicly held companies and their auditors and was intended to prevent financial statement fraud, make financial reports more transparent, provide protection to investors, strengthen the internal controls at public companies, and punish executives who perpetrate fraud. Some of the important aspects of The Sarbanes-Oxley Act are: 1. Public Company Accounting Oversight Board (PCAOB) The PCAOB is a five-member board appointed by the Securities and Exchange Commission (SEC). The PCAOB sets and enforces auditing, quality control, ethics, independence, and other auditing standards. 2. New rules for auditors Auditors must report specific information to the company’s audit committee, such as critical accounting policies and practices, alternative GAAP treatments, and auditor-management disagreements. 10-4 .
CPA Auditors are prohibited from performing certain nonaudit services, such as bookkeeping, information systems design and implementation, internal audit outsourcing services, management functions, and human resource services. Audit firms cannot provide services to companies if top management was employed by the auditing firm and worked on the company’s audit in the preceding 12 months. 3. New roles for audit committees Audit committee members must be on the company’s board of directors and be independent of the company. 4. New rules for management Requires the CEO and CFO to certify that financial statements and disclosures are fairly presented, are reviewed by the management, and are not misleading. 5. New internal control requirements Requires publicly held companies to issue a report accompanying the financial statements that states management is responsible for establishing and maintaining an adequate internal control structure and appropriate control procedures. For more detailed information on The Sarbanes-Oxley Act, click on the following website: http://www.sec.gov/about/laws/soa2002.pdf After the Sarbanes-Oxley Act was passed, the SEC mandated that management must: 1. Base its evaluation on a recognized control framework. The most likely frameworks are formulated by The Committee of Sponsoring Organizations (COSO). 2. Disclose any and all material internal control weaknesses. 3. Conclude that a company does not have effective internal controls over financial reporting if there are any material weaknesses. Multiple Choice 1 What type of internal controls finds the problem before it occurs? a. Detective controls b. Preventive controls c. General controls d. Corrective controls 10-5 .
Multiple Choice 2 The Public Company Accounting Oversight Board consists of: a. Seven members b. Three members c. Five members d. Six members
Learning Objective Two Compare and contrast the COBIT, COSO, and ERM control frameworks.
Control Frameworks COBIT Framework The Information Systems Audit and Control Foundation (ISACF) developed the Control Objectives for Information and related Technology (COBIT) framework. COBIT is a framework of generally applicable information systems security and controls practices of Information Technology control. The framework allows: 1. Management to benchmark the security and control practices of Information Technology environments. 2. Users of Information Technology services to be assured that adequate security and control exist. 3. Auditors to substantiate their opinions on internal control and to advise on Information Technology security and control matters. The COBIT framework addresses the issue of control from five key principles: 1. Meeting stakeholder needs. Helps users to customize business processes and procedures to create an information system that adds value to its stakeholders. 2. Covering the enterprise end-to-end. Focus is not just on the IT operation; it integrates all IT functions and processes into companywide functions and processes. 3. Applying a single, integrated framework. COBIT can be aligned at a high level with other standards and frameworks. 4. Enabling a holistic approach. Applies a holistic approach that results in effective governance and management of all IT functions in the company. 5. Separating governance from management. Distinguishes between governance (direct, evaluate, and monitor) and management (plan, build, run, and monitor). 10-6 .
The objective of governance is to create value by optimizing the use of organizational resources to produce desired benefits in a manner that effectively addresses risk. Responsibility of the Board: 1. Evaluate stakeholder needs to identify objectives. 2. Provide management with direction by prioritizing objectives. 3. Monitor management’s performance. Responsibility of Management: 1. Planning, building, running, and monitoring the activities and processes used by the organization to pursue the objectives established by the board of directors. Governance and management of IT is an ongoing process requiring monitoring, communication, and feedback. Figure 10-2 on page 328 provides a COBIT process reference model using five governance processes to Evaluate, Direct, and Monitor (EDM01–EDM 05) and 32 management processes. The management processes are broken down into the following four domains: 1. Align, plan, and organize (APO). 2. Build, acquire, and implement (BAI). 3. Deliver, service, and support (DSS). 4. Monitor, evaluate, and assess (MEA).
The Committee of Sponsoring Organizations Internal Control Framework The Committee of Sponsoring Organizations (COSO) is a private-sector group consisting of the American Accounting Association, the AICPA, the Institute of Internal Auditors, the Institute of Management Accountants, and the Financial Executives Institute. In 1992, COSO issued the Internal Control—Integrated Framework, which defines internal controls and provides guidance for evaluating and enhancing internal control systems. COSO was updated in 2013 to align with technological advancements. COSO’s internal control model has five crucial components, provided in Table 10-1 on page 330: 1. Control environment. 2. Risk assessment. 3. Control activities. 4. Information and communication. 10-7 .
5. Monitoring. Enterprise Risk Management—Integrated with Strategy and Performance Expands on the elements of the internal control integrated framework and provides an all-encompassing focus on the broader subject of enterprise risk management. The 2017 update is noted in Focus 10-1 on page 329. The basic principles behind enterprise risk management are: 1. Companies are formed to create value for their owners. 2. Company management must decide how much uncertainty it will accept as it creates value. 3. Uncertainty results in risk, which is the possibility that something will occur to affect adversely the company’s ability to create value or to erode existing value. 4. Uncertainty can also result in an opportunity, which is the possibility that something will occur to affect positively the company’s ability to create or preserve value. 5. The Enterprise Risk Management—Integrated Framework helps management to manage uncertainty, and its associated risk and opportunity, so they can build and preserve value.
Multiple Choice 3 Which of the following concepts were addressed in COSO-ERM beyond the original IC? a. Company value proposition b. How to address uncertainty c. The risk profile of opportunities d. All of the above Multiple Choice 4 Which of the following is not a component of COSO-IC? a. Control Activities b. External environment c. Monitoring d. b and c e. All of the above are components of COSO IC
10-8 .
Learning Objective Three Describe the major elements in the control environment of a company.
The Control Environment The control environment is the most important component of the ERM and internal control frameworks. An internal environment consists of items such as the following: 1. Management’s philosophy, operating style, and risk appetite. 2. The board of directors. 3. Commitment to integrity, ethical values, and competence. 4. Organizational structure. 5. Methods of assigning authority and responsibility. 6. Human resource standards. 7. External influences.
Management’s Philosophy, Operating Style, and Risk Appetite Companies have a risk appetite, which is the amount of risk a company is willing to accept in order to achieve its goals and objectives. The more responsible management’s philosophy and operating style and the more clearly they are communicated, the more likely employees will behave responsibly. Management’s philosophy, operating style, and risk appetite can be assessed by answering questions such as these: 1. Does management take undue business risks to achieve its objectives, or does it assess potential risks and rewards prior to acting? 2. Does management attempt to manipulate such performance measures as net income so that its performance can be seen in a more favorable light? 3. Does management pressure employees to achieve results regardless of the methods, or does it demand ethical behavior? In other words, does management believe the ends justify the means?
The Board of Directors 10-9 .
The Sarbanes-Oxley Act requires all public companies to have an audit committee composed entirely of outside (nonemployee), independent directors. The audit committee is responsible for overseeing the corporation’s internal control structure, its financial reporting process, and its compliance with related laws, regulations, and standards.
Commitment to Integrity, Ethical Values, and Competence It is important to create an organizational culture that stresses integrity and commitment to both ethical values and competence. Companies endorse integrity as a basic operating principle by actively teaching and requiring it. Management should consistently reward and encourage honesty and give verbal labels to honest and dishonest behavior. Management should develop clearly stated policies that explicitly describe honest and dishonest behaviors. Companies should require employees to report any dishonest, illegal, or unethical acts and discipline employees who knowingly fail to report violations.
Organizational Structure Important aspects of organizational structure include: 1. Centralization or decentralization of authority. 2. Assignment of responsibility for specific tasks. 3. Whether there is a direct reporting relationship (e.g., functional organizational structure or divisional organizational structure) or more of a matrix structure. A matrix organizational structure is a design that utilizes functional and divisional chains of command simultaneously in the same part of the organization. 4. Organization by industry, product line, geographical location, or by a particular distribution or marketing network. 5. The way responsibility allocation affects management’s information requirements. 6. The organization of the accounting and information system functions. 7. The size and nature of company activities.
10-10 .
Methods of Assigning Authority and Responsibility Authority and responsibility are assigned through formal job descriptions; employee training; operating plans, schedules, and budgets; a formal company code of conduct; and a written policy and procedures manual.
Human Resource Standards The following policies and procedures are important: 1.
Hiring. To obtain the most qualified and ethical employees, hiring should be based on educational background, relevant work experience, past achievements, honesty and integrity, and how well potential employees meet written job requirements.
2.
A thorough background check includes verifying educational and work experience, talking to references, checking for a criminal record, and checking credit records.
3.
Compensating. It is important to pay employees a fair and competitive wage. Poorly paid employees are likely to feel resentment and make up the difference in their wages by stealing money, property, or both.
4.
Training. Training programs should familiarize new employees with their responsibilities; expected levels of performance and behavior; and the company’s policies and procedures, history, culture, and operating style. Training on Fraud and Ethics:
Fraud awareness.
Ethical considerations.
Punishment for fraud and unethical behavior.
5.
Evaluating and promoting. Employees should be given periodic performance appraisals that help them to understand their strengths and weaknesses. Promotion should be based on performance and how well qualified employees are for the next position.
6.
Discharging. A company should take care when firing employees. To prevent sabotage or copying confidential data before they leave, dismissed employees should be removed from sensitive jobs immediately and denied access to the information system.
7.
Managing disgruntled employees. Some employees who commit fraud are seeking revenge for a perceived
10-11 .
wrong done to them. Hence, companies should have procedures for identifying disgruntled employees and either helping them resolve their feelings or removing them from jobs where they might be able to harm the organization or perpetrate a fraud. 8.
Vacations and rotation of duties. Many fraud schemes, such as lapping and kiting, require the ongoing attention of the perpetrator. Many of these employee frauds are discovered when the perpetrator is suddenly forced, by illness or accident, to take time off.
9.
Confidentiality agreements and fidelity bond insurance. All employees, suppliers, and contractors should be required to sign and abide by a nondisclosure or confidentiality agreement. Fidelity bond insurance coverage of key employees protects companies against losses arising from deliberate acts of fraud by bonded employees. Prosecute and incarcerate hackers and fraud perpetrators. Most fraud cases and hacker attacks go unreported and are not prosecuted for several reasons:
Companies are reluctant to report computer crimes and intrusions—a recent study showed only 36% reporting intrusions—because a highly visible fraud is a public relations disaster.
Law enforcement officials and the courts are so busy with violent crimes that they have little time for computer crimes in which no physical harm occurs.
Fraud is difficult, costly, and time-consuming to investigate and prosecute.
Many law enforcement officials, lawyers, and judges lack the computer skills needed to investigate, prosecute, and evaluate computer crimes.
When fraud cases are prosecuted and a conviction is obtained, the sentences received are often light.
External Influences Financial Accounting Standards Board (FASB). Public Company Accounting Oversight Board (PCAOB). Security and Exchange Commission (SEC).
10-12 .
Multiple Choice 5 Which of the following is not considered the Control Environment in COSO-IC? a. External influences b. Management’s risk appetite c. Ethical Values d. Compliance with the SEC Multiple Choice 6 Which of the following statements is TRUE? a. An internal environment consists of an organizational structure. b. Control activities are a component of COSO-IC. c. The Sarbanes-Oxley Act requires all public companies to have an audit committee. d. All of the above are true.
Learning Objective Four Explain how to access and respond to risk using the Enterprise Risk Management model.
Risk Assessment and Risk Response The third component of COSO’s IC mode are risk assessment and risk response. The risks that exist before management takes any steps to control the likelihood or impact of a risk are called inherent risks. The risk that remains after management implements internal controls, or some other response to risk, is residual risk. The ERM model indicates that there are four ways to respond to risk: 1. Reduce. The most effective way to reduce the likelihood and impact of risk is to implement an effective system of internal controls. 2. Accept. Accepts the likelihood and impact of the risk by not acting to prevent or mitigate it.
10-13 .
3. Share. Share some of the risk or transfer it to someone else. For example, buy insurance, outsource an activity, or enter into hedging transactions. Auditing definition of hedges: hedges protect an entity against the risk of adverse price or interest-rate movements on its assets, liabilities, or anticipated transactions. A hedge avoids or reduces risk by counterbalancing losses with gains on separate positions. Hedge, in securities, is a transaction that reduces the risk of an investment. Hedge fund is a special type of investment fund with fewer restrictions on the types of investments it can make. Of note is a hedge fund’s ability to sell short. In exchange for the ability to use more aggressive strategies, hedge funds are more exclusive (e.g., fewer people). Usually only the wealthy are allowed to invest in hedge funds. There are three main types of hedges: fair value hedges, cash flow hedges, and foreign currency hedges—which are beyond the scope of this class. 4. Avoid. Risk is avoided by not engaging in the activity that produces the risk. This may require the company to sell a division, exit a product line, or not expand as anticipated. Accountants can assess and reduce inherent risk using the risk assessment and response strategy shown in Figure 10-3 on page 336.
Estimate Likelihood and Impact Some events pose a greater risk because the probability of their occurrence is more likely. For example, a company is more likely to be the victim of a fraud than of an earthquake, and employees are more likely to make unintentional errors than they are to commit fraud.
Identify Controls Management must identify one or more controls that will protect the company from each event.
Estimate Costs and Benefits No internal control system can provide foolproof protection against all events, as the cost would be prohibitive.
10-14 .
In addition, because many controls negatively affect operational efficiency, too many controls slow the system and make it inefficient. The benefits of an internal control procedure must exceed its costs. Benefits can be hard to quantify, but include: 1. Increased sales and productivity. 2. Reduced losses. 3. Better integration with customers and suppliers. 4. Increased customer loyalty. 5. Competitive advantages. 6. Lower insurance premiums. Costs are usually easier to measure than benefits. Primary cost is personnel, including: 1. Time to perform control procedures. 2. Costs of hiring additional employees to effectively segregate duties. 3. Costs of programming controls into a system. Other costs of a poor control system include: 1. Lost sales. 2. Lower productivity. 3. Drop in stock price if security problems arise. 4. Shareholder or regulator lawsuits. 5. Fines and penalties imposed by governmental agencies. One way to estimate the value of internal controls involves expected loss, the mathematical product of impact and likelihood: Expected loss = Impact × Likelihood Determine Cost/Benefit Effectiveness Total pay period payroll cost $10,000. Extra cost of $600 per pay period will reduce the likelihood of the event from 15% to 1%. The expected risk cost without the extra $600 validation procedure is $1,500 [$10,000 × 15%]. The expected risk cost with the extra $600 validation procedure is $100 [$10,000 × 1%].
10-15 .
The expected benefit of validation procedure is $800 as shown in Table 10-2 on page 337. Implement Control or Avoid, Share, or Accept the Risk When controls are cost-effective, they should be implemented so that risk can be reduced. Risks that are not reduced must be accepted, shared, or avoided. Multiple Choice 7 Which is inappropriate for a company’s response to risk? a. Ignore b. Share c. Reduce d. Avoid Multiple Choice 8 The cost of conducting and compiling the end of the month inventory is $20,000 and the risk of an inventory error is 12% without a validation procedure and 2% with the validation procedures. The expected total to retake and compile the inventory without a validation procedure is $1,200 and with the validation procedure is only $300. The cost of the validation procedure is $650. What is the net expected benefit of the validation procedure? a. $250 b. $350 c. $450 d. $600
Learning Objective Five Describe control activities commonly used in companies.
Control Activities The fourth component of COSO’s IC model is control activities, which are policies, procedures, and rules that provide reasonable assurance that management’s control objectives are met and the risk responses are carried out. Generally, control procedures fall into one of the following categories: 1. Proper authorization of transactions and activities
10-16 .
Management establishes policies for employees to follow and then empowers employees to perform accordingly. This empowerment, called authorization, is an important part of an organization’s control procedures. Authorizations are often documented by signing, initializing, or entering an authorization code on a transaction document or record. Computer systems are now capable of recording a digital signature, a means of signing a document with a piece of data that cannot be forged. Employees who process transactions should verify the presence of the appropriate authorization(s). Certain activities or transactions may be of such consequence that management grants specific authorization for them to occur. For example, management review and approval are often required for sales in excess of $20,000, capital expenditures in excess of $10,000, or uncollectible write-off in excess of $5,000. In contrast, management can authorize employees to handle routine transactions without special approval, a procedure known as general authorization. 2. Segregation(separation) of duties [Figure 10-4 on page 339]
Authorization—approving transactions and decisions.
Recording—preparing source documents; entering data into online systems; maintaining journals, ledgers, files, or databases; preparing reconciliations; and preparing performance reports.
Custody—handling cash, tools, inventory, or fixed assets; receiving incoming customer checks; writing checks on the organization’s bank account.
If two of these three functions are the responsibility of a single person, then problems can arise. For example: The former city treasurer of Fairfax, Virginia, was convicted of embezzling $600,000 from the city treasury. When residents used cash to pay their taxes, she would keep the currency. She recorded tax collections on the property tax
10-17 .
records but did not report them to the city controller. The utilities director of Newport Beach, California, who was responsible for authorizing transactions and had custody of cash, was charged with embezzling $1.2 million. He forged invoices or easement documents (the right to pass through a person’s land), authorizing payments to a real or fictitious property owner. The payroll director of the Los Angeles Dodgers, who was responsible for both authorization and recording functions, pleaded guilty to embezzling $330,000 from the team. He credited employees for hours not worked and then received a kickback of 50% of their extra compensation. Collusion is when two or more people are working together to override the preventive aspect of the internal control system. 3. Segregation of systems duties: [Figure 10-5 on page 340]
Authorization. This is authorization at a systems level. Giving rights for individuals to perform their job functions within the system. It is also the approval of changes to programming or even new programming or systems. Data Entry. Responsible for entering or capturing data for all business transactions, accounts, and relations. Programming. They determine information needs and design systems to meet those needs. Operations. Responsible for running the system. Assure that data is properly processed, stored, and that needed output is produced. Data Storage. Responsible for physical storage and custody of databases, files, and programs. Also responsible for maintaining backup copies. Users. Individually responsible for logical access and proper use. Must safeguard the dataset and output for which they are responsible. Management. These are the administrators of the AIS. These teams might include: Systems administration. Systems administrators are responsible for ensuring that the different parts of an information system operate smoothly and efficiently. Network management. Network managers ensure that all applicable devices are linked to the organization’s internal and external
10-18 .
networks and that the networks operate continuously and properly.
Security management. Security management ensures that all aspects of the system are secure and protected from all internal and external threats.
Change management. These individuals manage all changes to an organization’s information system to ensure they are made smoothly and efficiently and to prevent errors and fraud.
Data Control. The data control group ensures that source data have been properly approved, monitors the flow of work through the computer, reconciles input and output, maintains a record of input errors to ensure their correction and resubmission, and distributes systems output.
Database Administrators. Described in Chapter 4. Coordinate, control, and manage the database.
Project Development and Acquisition Controls 1.
Strategic master plan. To align an organization’s information system with its business strategies, a multiyear strategic master plan is developed and updated yearly.
2.
Project controls. A project development plan shows how a project will be completed, including the modules or tasks to be performed and who will perform them, the dates they should be completed, and project costs. Project milestones—significant points when progress is reviewed and actual and estimated completion times are compared. A performance evaluation of project team members should be prepared as each project is completed.
3.
Data processing schedule. To maximize the use of scarce computer resources, all data processing tasks should be organized according to a data processing schedule.
4.
Steering committee. A steering committee should be formed to guide and oversee systems development and acquisition.
5.
System performance measurements. For a system to be evaluated properly, it must be assessed using system
10-19 .
performance measurements. Common measurements include throughput (output per unit of time), utilization (percentage of time the system is being productively used), and response time (how long it takes the system to respond). 6.
Post-implementation review. After a development project is completed, a post-implementation review should be performed to determine if the anticipated benefits were achieved. To simplify and improve systems development, some companies hire a systems integrator, a vendor who uses common standards and manages a cooperative systems development effort involving its own development personnel and those of the client and other vendors. Companies that use systems integrators should:
Develop clear specifications.
Monitor the systems integration project.
Change Management Controls Change management is the process of making sure changes do not negatively affect systems reliability, security, confidentiality, integrity, and availability. Design and Use of Documents and Records The proper design and use of electronic and paper documents and records help ensure the accurate and complete recording of all relevant transaction data.
Safeguarding Assets, Records, and Data In addition to safeguarding cash and physical assets, such as inventory and equipment, a company needs to protect its information. Many people mistakenly believe that the greatest risks companies face are from outsiders. Companies also face significant risks from customers and vendors that have access to company data. New technologies such as blockchain can assist in safeguarding data from change. But it may also introduce risks to privacy. Some of the computer-based controls that can be put into place to safeguard assets include: 1.
Create and enforce appropriate policies and procedures.
10-20 .
2.
Maintain accurate records of all assets.
3.
Restrict access to assets.
4.
Protect records and documents.
Independent Checks on Performance 1.
Top level reviews. Management at all levels should monitor company results and periodically compare actual company performance to (a) planned performance, as shown in budgets, targets, and forecasts; (b) prior period performance; and (c) the performance of competitors.
2.
Analytical reviews. An analytical review is an examination of the relationship between different sets of data.
3.
Reconciliation of two independently maintained sets of records.
4.
Comparison of actual quantities with recorded amounts.
5.
Double-entry accounting: debits must equal credits.
6.
Independent review. After one person processes a transaction, a second person sometimes reviews the work of the first.
Multiple Choice 9 Which of the following would need specific authorization? a. Writing checks over a predetermined threshold. b. Sales manager approving a sale. c. Receiving clerk accepting goods. d. Cashier receiving payments. Multiple Choice 10 Which of the following does not violate separation of duties? a. Approving purchase orders and receiving items ordered. b. Approving payment to vendors and completing the monthly bank reconciliation. c. Receiving checks in the mail and maintaining the cash receipts journal. d. Writing checks and receiving checks in the mail.
Learning Objective Six Describe how to communicate information and monitor control processes in organizations.
10-21 .
Information and Communication Accounting Information Systems have five primary objectives: 1. Identify and record all valid transactions. 2. Properly classify transactions. 3. Record transactions at their proper monetary value. 4. Record transactions in the proper accounting period. 5. Properly present transactions and related disclosures in the financial statements.
Monitoring Perform ERM Evaluations. Implement Effective Supervision. Use Responsibility Accounting. Monitor System Activities. There are software packages available to review computer and network security measures, detect illegal entry into systems, test for weaknesses and vulnerabilities, report weaknesses found, and suggest improvements. Software is also available to monitor and combat viruses, spyware, spam, pop-up ads, and to prevent browsers from being hijacked. All system transactions and activities should be recorded in a log that indicates who accessed what data, when, and from which online device. In monitoring employees’ computers at work or at home, companies must be careful to ensure that they do not violate the employee’s privacy. To help, one way would be to have written policies that employees agree to in writing which indicate: 1.
The technology employees’ use on the job belongs to the company.
2.
E-mails received on company computers are not private and can be read by supervisory personnel.
3.
Employees should not use technology in any way to contribute to a hostile work environment.
10-22 .
Perhaps some of you have also seen this happen; many government activities and offices have taken the computer games off their computers.
Track Purchased Software The Business Software Alliance (BSA) is very aggressive in tracking down and finding companies who violate software license agreements. Companies should periodically conduct software audits.
Conduct Periodic Audits One way to monitor risk and detect fraud and errors is to conduct periodic external and internal audits, as well as special network security audits. Internal audits involve reviewing the reliability and integrity of financial and operating information and providing an appraisal of internal control effectiveness. Internal audits can detect excess overtime, underused assets, obsolete inventory, padded travel expense reimbursements, excessively loose budgets and quotas, poorly justified capital expenditures, and production bottlenecks.
Employ a Computer Security Officer and Computer Consultants A computer security officer (CSO) is in charge of AIS security and should be independent of the information system function and report to the COO or CEO. The overwhelming number of new tasks related to SOX and other forms of compliance has led many larger companies to delegate all compliance issues to a chief compliance officer (CCO).
Engage Forensic Specialists Forensic accountants specialize in fraud detection and investigation. Forensic accounting is now one of the fastest-growing areas of accounting due to the SarbanesOxley Act, new accounting rules such as SAS No. 99, and boards of directors demanding that forensic accounting be an ongoing part of the financial reporting and corporate governance process. Most forensic accountants are CPAs, and many have received specialized training with the FBI, the IRS, or other law enforcement agencies. Computer forensics is discovering, extracting, safeguarding, and documenting computer evidence such that
10-23 .
its authenticity, accuracy, and integrity will not succumb to legal challenges.
Install Fraud Detection Software People who commit fraud tend to follow certain patterns and leave behind clues, such as things that do not make sense. Software has been developed to uncover these fraud symptoms. ReliaStar Financial used a fraud detection package from IBM to detect the following: 1. Hundreds of thousands of dollars in fraudulent claims from a Los Angeles chiropractor. The software noticed that all of the chiropractor’s patients lived more than 50 miles from the doctor’s office and flagged the bills for investigation. 2. A Long Island doctor who submitted bills weekly for a rare and expensive procedure that is normally done once or twice in a lifetime. 3. A podiatrist who saw four patients and then billed ReliaStar for almost 500 separate procedures. Other companies have neural networks (programs that mimic the brain and have learning capabilities), which are quite accurate in identifying suspected fraud.
Implement a Fraud Hotline The Sarbanes-Oxley Act mandates that companies set up mechanisms for employees to report abuses such as fraud. Fraud hotlines provide a means for employees to anonymously report fraud.
Answer to Multiple Choice Questions: Multiple Choice Question Answers Number Answer Number Answer 1 B 6 D 2 C 7 A 3 D 8 B 4 B 9 A 5 D 10 D
10-24 .
CHAPTER 11 CONTROLS FOR INFORMATION SECURITY Instructor’s Manual Learning Objectives: 1. Explain how security and the other four principles in the Trust Services Framework affect systems reliability. 2. Explain three fundamental concepts: why information security is a management issue, how people’s behavior impacts security, and the time-based model of information security. 3. Describe the controls that can be used to protect an organization’s information. 4. Describe the controls that can be used to timely detect that an organization’s information system is under attack. 5. Discuss how organizations can timely respond to attacks against their information system. 6. Explain how virtualization, cloud computing, and the Internet of Things affect information security.
Learning Objective One Explain how security and the other four principles in the Trust Services Framework affect systems reliability.
One basic function of an accounting information system is to provide information useful for decision making. Figure 11-1 on page 362 shows the five fundamental principles that contribute to the overall objective of systems reliability: 1. Security—Security procedures restrict access (both physical and logical) to authorized users only. 2. Confidentiality—By restricting access, the confidentiality of sensitive organizational information is protected. 3. Privacy—Also, by restricting access, the privacy of personal identifying information collected from customers, employees, suppliers, or business partners is protected from unauthorized disclosure. 4. Processing integrity—data are processed accurately, completely, in a timely manner, and only with proper authorization. 11-1 .
5. Availability—the system and its information are available to meet operational and contractual obligations.
Multiple Choice 1 The five principles of the Trust Services Framework that contribute to the overall objective of systems reliability include: a. Effectiveness b. Processing integrity c. Plan and organize d. Reliability
Learning Objective Two Explain three fundamental concepts: why information security is a management issue, how people’s behavior impacts security, and the timebased model of information security.
There are three fundamental information security concepts: 1. Security is a management issue, not just a technology issue 2. People: The critical factor 3. The time-based model of information security Security is a management issue, not just a technology issue Effective information security requires the support of management and involvement throughout all phases of the security life cycle (see Figure 11-2 on page 353). There are four steps in the security life cycle: 1. Assess the information security-related threats that the organization faces and select an appropriate response. 2. Develop information security policies and communicate them to all employees. 3. Acquire and implement specific technological tools. 4. Monitor performance to evaluate the effectiveness of the organization’s information security program. People: The critical factor Training is a critical preventive control as employees must understand and follow the organization’s security policies. All employees should be taught why security measures are important to the organization’s long-run survival. Some good security measures include: 1.
Never open unsolicited e-mail attachments. 11-2 .
2.
Only use approved software.
3.
Never share or reveal your passwords.
4.
Take steps to physically protect laptops. Training is especially needed to educate employees about social engineering attacks, which use deception to obtain unauthorized access to information resources. Employees also need to be trained not to allow other people to follow them through restricted access entrances. This social engineering attack, called piggybacking, can take place not only at the main entrance to the building but also at any internal locked doors, especially to rooms that contain computer equipment.
The time-based model of information security Time-based model of information security: Using the formula to evaluate if security procedures are effective (if true)… P>D+R, where P=the time it takes an attacker to break through the various controls that protect the organization’s information assets, D=the time it takes for the organization to detect that an attack is in progress, and R=the time it takes to respond to and stop the attack. Multiple Choice 2 The time-based model of information security is defined as: a. Time it takes an attacker to break through the various controls that protect the organization’s information assets. b. Time it takes for the organization to detect an attack. c. Time it takes to respond to an attack.
Learning Objective Three Describe the controls that can be used to protect an organization’s information.
Table 11-1 on page 366 provides examples of preventive, detective, and corrective controls used to satisfy the time-based model of security. 11-3 .
Preventive Controls Major types of preventive controls are listed in Table 11-1 on page 366. Preventive controls have four pieces of the security puzzle: Physical Security: access controls Process: user access controls Change management IT solutions Physical Security: Access Controls Controlling physical access to the system is absolutely essential. Within minutes a skilled attacker can gain physical access to the system and obtain sensitive data. Focus 11-2 on page 368 describes an especially elaborate set of physical access controls referred to as a “mantrap.” This technique involves the use of specially designed rooms that serve as an entryway to the data center. They typically contain two doors, each of which uses multiple authentication methods to control access. Laptops, cell phones, and Personal Digital Assistant (PDA) devices require special attention. A PDA is a handheld computer that has had a significant impact on personal productivity. Laptop theft is a huge problem. The major cost is not the price of replacing the laptop, but the loss of the confidential information it contains and the costs of notifying those affected.
Process: User Access Controls Authentication focuses on verifying the identity of the person or device attempting to access the system. Users can be authenticated by verifying: 1. Something they know, such as passwords or personal identification (PINs). 2. Something they have, such as smart cards or ID badges. 3. Some physical characteristic (referred to as a biometric identifier), such as their fingerprints or voice.
11-4 .
Focus 11-3 on page 370 discusses some of the requirements for creating strong passwords. 1. Length Most security experts recommend that strong passwords include at least eight characters. 2. Multiple character types Mixture of alphabetic, numeric, special characters, uppercase, and lowercase. 3. Randomness Should not be found in dictionary. Words should not be preceded or followed by a number. Should not be employee’s personal interest, hobbies, or other information. 4. Kept secret Passwords must be kept secret to be effective.
Authorization Controls Authorization restricts access of authenticated users to specific portions of the system and specifies what actions they are permitted to perform. Access control matrix is a table specifying which portions of the system users are permitted to access and what actions they can perform (see Figure 11-4 on page 371). When an employee attempts to access a particular information systems resource, the system performs a compatibility test that matches the user’s authentication credentials against the access control matrix to determine whether that employee should be allowed to access that resource and perform the requested action. Authentication and authorization should also apply to devices. Every workstation, printer, or other computing device needs a Network Interface Card (NIC)to connect to the organization’s internal network. Each NIC has a unique identifier, referred to as its Media Access Control (MAC) address.
IT Solutions: Antimalware Controls
11-5 .
Malware is a major threat and can damage or destroy information or provide a means for unauthorized access. COBIT 5 DSS05.01 recommends the following: 1. Malicious software awareness education. 2. Installation of antimalware protection tools on all devices. 3. Centralized management of patches and updates to antimalware software. 4. Regular review of new malware threats. 5. Filtering of incoming traffic to block potential sources of malware. 6. Training employees not to install shared or unapproved software.
IT Solutions: Network Access Controls Perimeter Defense: Routers, Firewalls, and Intrusion Prevention Systems Figure 11-6 on page 373 shows the relationship between an organization’s information system and the Internet. A border router connects an organization’s information system to the Internet. Behind the border router is the main firewall, which is either a special-purpose hardware device or software running on a general-purpose computer. Firewall is a combination of security algorithms and router communications protocols that prevents outsiders from tapping into corporate databases and e-mail systems. The organization’s web servers and e-mail servers are placed in a separate network, called the demilitarized zone (DMZ) because it sits outside the corporate network yet is accessible from the Internet. Overview of TCP/IP and Routers Information travels throughout the Internet and internal local area networks in the form of packets. It is not documents or files that are sent to the printer. Instead they are broken down into packets and then sent to the printer. Well-defined rules and procedures called protocols dictate how to perform these activities. Figure 11-7 on page 374 shows how two important protocols, referred to as TCP/IP, govern the process for transmitting information over the Internet. The Transmission Control Protocol (TCP) specifies the procedures for dividing files and documents into 11-6 .
packets to be sent over the Internet and the methods for reassembly of the original document or file at the destination. The Internet Protocol (IP) specifies the structure of those packets and how to route them to the proper destination. Every IP packet consists of two parts: a header and a body. The header contains the packet’s origin and destination addresses, as well as information about the type of data contained in the body of the packet. Special-purpose devices called routers are designed to read the destination address fields in IP packet headers to decide where to send (route) the packet next. Controlling Access by Filtering Packets A set of rules, called an Access Control List (ACL), determines which packets are allowed entry and which are dropped. Border routers typically perform what is called static packet filtering, which screens individual IP packets based solely on the contents of the source or destination fields in the IP packet header. Deep Packet Inspection Stateful packet filtering is still limited to examining only information in the IP packet header. Undesirable mail can get through if the return address is not on the list of unacceptable sources. Clearly, control over incoming mail would be more effective if each envelope or package were opened and inspected. Such a process, called deep packet inspection, provides this added control. Intrusion prevention systems (IPS) are designed to identify and drop packets that are part of an attack. Defense-In-Depth to Restrict Network Access The use of multiple perimeter filtering devices is actually more efficient than trying to use only one device.
Securing Wireless Access The following procedures need to be followed to adequately secure wireless access: 1.
Turn on available security features.
2.
Authenticate all devices attempting to establish 11-7 .
wireless access to the network before assigning them an IP address. 3.
Configure all authorized wireless Network Interface Cards (NICs) to operate only in infrastructure mode, which forces the device to connect only to wireless access points.
4.
Use noninformative names for the access point’s address, which is called a Service Set Identifier (SSID).
5.
Reduce the broadcast strength of wireless access points to make unauthorized reception off-premises more difficult.
6.
Encrypt all wireless traffic. This is essential to protect the confidentiality and privacy of wireless communications because they are transmitted “over the air” and are inherently susceptible to unauthorized interception.
IT Solutions: Device and Software Hardening Controls Routers, firewalls, and intrusion prevention systems are designed to protect the network perimeter. However, information system security is enhanced by supplementing preventive controls. Three areas deserve special attention: 1. EndpointConfiguration. 2. User accounts. 3. Software design. 1. EndpointConfiguration Hosts can be made more secure by modifying their configurations. Every program running on a host represents a potential point of attack because it probably contains flaws, called vulnerabilities, which can be exploited to either crash the system or take control of it. Microsoft Baseline Security Analyzer and vulnerability scanners can be used to identify unused and, therefore, unnecessary programs that represent potential security threats. This process of turning off unnecessary features is called hardening. 2. User Account Management
11-8 .
Users who need administrative powers on a particular computer should be assigned two accounts: one with administrative rights and another that has only limited privileges. It is especially important that they be logged into their limited regular user account when browsing the web or reading their e-mail. 3. Software Design As organizations have increased the effectiveness of their perimeter security controls, attackers have increasingly targeted vulnerabilities in application programs. The most common input-related vulnerability is referred to as a buffer overflow attack, in which an attacker sends a program more data than it can handle. Most programs set aside a fixed amount of memory, referred to as a buffer, to hold user input. However, if the program does not carefully check the size of data being input, an attacker may enter many times the amount of data that was anticipated and overflow the buffer.
IT Solutions: Encryption Encryption is the final layer of defense to prevent unauthorized access to sensitive information. Multiple Choice 3 An example of preventive controls would include: a. Log analysis b. Authorization controls c. Encryption d. a and b e. b and c Multiple Choice 4 A biometric identifier includes: a. Passwords b. Fingerprints c. Smart cards d. PINs
Learning Objective Four Describe the controls that can be used to timely detect that an organization’s information system is under attack. 11-9 .
Answer to Multiple Choice Questions:
Four types of detective controls listed in Table 11-1 on page 366. 1. Log analysis is the process of examining logs to identify evidence of possible attacks. 2. Intrusion detection systems (IDSs) is a system that creates logs of all network traffic that was permitted to pass the firewall and then analyzes those logs for signs of attempted or successful intrusions. 3. Honeypots which is a decoy system used to provide early warning that an insider or outsider is attempting to search for confidential information. 4. Continuous monitoring of both employee compliance with the organization’s information security policies and overall performance of business processes.
Learning Objective Five Discuss how organizations can timely respond to attacks against their information system.
Responding to Attacks Two controls relate to responding to attacks: 1. Computer Incident Response Team (CIRT)is a team that is responsible for dealing with attacks and should do the following four steps: a. Recognition that a problem exists. b. Containment of the problem. c. Recovery. d. Follow-up. 2. Chief Information Security Officer (CISO) a. Sr. Manager position. b. Independent of other information systems functions and reports to Chief Operating Officer (COO) or the Chief Executive Officer (CEO). Monitor and Revise Security Solutions Penetration testing is an authorized attempt by either the internal audit team or an external security consulting firm to break into the organization’s information system. 11-10 .
Change Controls and Change Management is the formal process used to ensure that modifications to hardware, software, or processes do not reduce systems reliability. Characteristics of a well-designed change control and change management process include:
Documentation of all change requests, identifying the nature of the change, its rationale, date of request, and outcome of request. Documented approval of all change requests by management. Testing of all changes in a separate system, not the one used for daily business processes. Conversion controls to ensure that data are accurately and completely transferred from the old to the new system. Updating of all documentation (program instructions, system descriptions, procedures manuals, etc.) to reflect the newly implemented changes. A special process for timely review, approval, and documentation of emergency changes as soon after the crisis as is practical. Development and documentation of “backout” plans to facilitate reverting to previous configurations if the new change creates unexpected problems. Careful monitoring and review of user rights and privileges during the change process to ensure that proper segregation of duties is maintained.
Learning Objective Six Explain how virtualization, cloud computing, and the Internet of Things affect information security.
Virtualization and Cloud computing can increase risks possibly by: Unsupervised physical access in virtualization environment exposes the entire virtual network to risk of theft or destruction. Public clouds may have reliability issues because the organization is outsourcing control of its data and computing resources to a third party. However, there are opportunities to improve overall security by: Implementing strong access controls in the cloud and using multifactor authentication.
11-11 .
Internet of Things (IoT) refers to embedding sensors in a multitude of devices so they can connect to the Internet. Again, there is a net effect of positive and negative effects. The major issue is that since these devices are connected to the Internet, there are more ways to gain access to the corporate network and must be secured. Answers to Multiple Choice Questions: Multiple Choice Question Answers Number Answer 1 B 2 A 3 E 4 B
11-12 .
CHAPTER 12 CONFIDENTIALITY AND PRIVACY CONTROLS Instructor’s Manual Learning Objectives: 1. Describe the controls that can be used to protect the confidentiality of an organization’s information and the privacy of personal information collected from customers, suppliers, and employees. 2. Discuss how the Generally Accepted Privacy Principles (GAPP) framework provides guidance in developing a comprehensive approach to protecting privacy that satisfies the requirements of privacy regulations such as the EU’s General Data Privacy Regulation. 3. Discuss how different types of encryption systems work, and explain the difference between encryption and hashing. 4. Explain how to create a digital signature and how it provides a means to create legally enforceable contracts. 5. Discuss how blockchain works.
Learning Objective One Describe the controls that can be used to protect the confidentiality of an organization’s information and the privacy of personal information collected from customers, suppliers, and employees.
Confidentiality and Privacy Reliable systems protect confidential information from unauthorized disclosure. Types of information that need to be protected would include: business plans, pricing strategies, client and customer lists, and legal documents. Figure 12-1 on page 395 identifies the four components of protecting confidentiality and privacy. 1. Identify and classify the information to be protected. 2. Encrypt the information. 3. Control access to the information. 4. Train employees to properly handle the information. Encryption is a fundamental control procedure for protecting the confidentiality of sensitive information.
12-1 .
It is easy to intercept information sent over the Internet. Encryption solves this problem. However, encryption only protects data when stored or during transmission and not during processing because data need to be decrypted in order to be processed. Therefore, supplementing encryption with the access controls and training is important. Information rights management (IRM) is software that provides an additional layer of protection to sensitive information that is stored in digital format offering the capability not only to limit access to specific files or documents but also to specify the actions (read, copy, print, download, etc.) to individuals granted access to that resource can perform.
Organizations may use data loss prevention (DLP) software to control the outbound communications. DLP is software that blocks outgoing messages (e-mail, instant messages, etc.) that contain key words or phrases associated with intellectual property or other sensitive data the organization wants to protect. DLP software is a preventative control, a detection control is using a digital watermark embedded in documents that enables an organization to identify confidential information that has been disclosed. Useful control procedures for doing so include the following: 1. Restrict access to rooms housing printers and fax machines. 2. Run password protected screensavers on laptops and computers. 3. Use screen protection devices that limit the distance and angle from which information can be seen. 4. It is especially important to control the disposal of information resources. Printed reports and microfilm containing sensitive information should be shredded before being thrown out. Proper disposal of computer media requires use of special software designed to “wipe” the media clean by repeatedly overwriting the disk with random patterns of data. Voice over IP (VoIP) telephone conversations should be encrypted. All communication between users and the cloud should be encrypted. Highly sensitive and confidential data should not be stored in a public cloud. Training is the most important control for protecting confidentiality. Employees need to know what information can be shared with outsiders. Employees need to be taught how to protect confidential data such as:
12-2 .
how to use encryption software, always log out of applications, use a password-protected screen saver, do not leave reports containing sensitive information in plain view on their desks, proper use of e-mail, blogs, instant messaging.
Multiple Choice 1 It is especially important to encrypt sensitive information stored in: a. Hard drives b. Public clouds c. Databases d. Turnaround documents Multiple Choice 2 It is important to control access to system output. Some of the control procedures include: a. The organization establishes a set of procedures and policies for protecting the privacy of personal information. b. Source documents and other forms should be designed to help ensure that errors and omissions are minimized. c. Train employees to not leave reports containing sensitive information in plain view on their desktops when they are not physically present. d. None of the above.
Learning Objective Two Discuss how the Generally Accepted Privacy Principles (GAPP) framework provides guidance in developing a comprehensive approach to protecting privacy that satisfies the requirements of privacy regulations such as the EU’s General Data Privacy Regulation.
Privacy Regulations and Generally Accepted Privacy Principles To improve privacy, one should understand relevant laws and privacy principles. The European Union (EU) passed one of the most far reaching and strict privacy regulations in the world, called the General Data Privacy Regulation or GDPR. These regulations require “privacy by design” meaning an organization needs to take a proactive approach to protecting privacy and can face penalties of up to 4% of global revenues if found to violate GDPR. The regulation applies to any company that stores any data about European residents. The regulations grant people a number of new rights including:
12-3 .
Access to the data that organizations have about them. Correction of errors in that stored data. Deletion of personal information stored about them (“the right to be forgotten”) Revocation of consent to sell or share their information with other organizations.
Generally Accepted Privacy Principles (GAPP) identifies the following 10 internationally recognized best practices for protecting the privacy of customers’ personal information: 1.
Management. The organization establishes a set of procedures and policies for protecting the privacy of personal information it collects and assigns responsibility and accountability for those policies to a specific person or group of employees.
2.
Notice. The organization provides notice about its privacy policies and practices at or before the time it collects personal information from customers, or as soon as practicable thereafter.
3.
Choice and consent. The organization describes the choices available to individuals and obtains their consent to the collection and use of their personal information.
4.
Collection. The organization collects only that information needed to fulfill the purposes stated in its privacy policies.
5.
Use, retention, and disposal. The organization uses its customers’ personal information only in the manner described in its stated privacy policies and retains that information only as long as it is needed. When information is no longer useful, it should be disposed of in a secure manner.
6.
Access. The organization provides individuals with the ability to access, review, correct, and delete the personal information stored about them.
7.
Disclosure to third parties. The organization discloses customers’ personal privacy policies and only to third parties who provide equivalent protection of that information.
8.
Security. The organization takes reasonable steps to protect customers’ personal information from loss or unauthorized disclosure.
9.
Quality. The organization maintains the integrity of its customers’ personal information.
10. Monitoring and enforcement. The organization assigns one or more employees to be responsible for assuring compliance with its stated privacy policies and 12-4 .
periodically verifies compliance with those policies. Identity theft: assuming someone’s identity usually for economic gain. Focus 12-1 on page 401 discusses the steps one can take to minimize the risk of identity theft: 1.
Shred all documents that contain personal information, especially unsolicited credit card offers.
2.
Securely store documents that contain sensitive personal and financial information.
3.
Never send personally identifying information in unencrypted e-mail.
4.
Beware of e-mail, telephone, and print requests to verify personal information that the requesting party should already possess.
5.
Do not carry your Social Security card with you.
6.
Resist requests to provide your social security number to businesses that ask for it, as it is seldom needed for most transactions.
7.
Print only your initials and last name, rather than your full name, on checks. This prevents a thief from knowing how you sign your name.
8.
Limit the amount of other information (address and phone number) preprinted on checks, and consider totally eliminating such information.
9.
Do not place outgoing mail containing checks or personal information in your mailbox for pickup.
10. Do not carry more than a few blank checks with you. 11. Use special software to thoroughly clean any digital media prior to disposal, or physically destroy the media. 12. Monitor your credit reports regularly. 13. File a police report as soon as you discover that your purse or wallet was stolen. 14. Make photocopies of driver’s licenses, passports, and credit cards. 15. Immediately cancel any stolen or lost credit cards.
Multiple Choice 3 Which of the following requires organizations to protect the privacy of their customers’ personal information? 12-5 .
a. COBIT DS 11 b. Trust Services Privacy Framework c. General Data Privacy Regulation (GDPR) d. AICPA Multiple Choice 4 Which of the following statements is FALSE? a. Employee use of e-mail and instant messaging probably represents two of the greatest threats to the confidentiality of sensitive information. b. To protect yourself from identity theft you should print only your initials and last name, rather than your full name on checks. c. The phrase “garbage in, garbage out” highlights the importance of data quality. d. Organizations should not provide individuals with the ability to access, review, correct, or delete the personal information stored about them.
Learning Objective Three Discuss how different types of encryption systems work, and explain the difference between encryption and hashing.
Encryption Encryption is the final layer of preventive controls. Encrypting information before sending it over the Internet creates what is called a Virtual Private Network (VPN). Encryption is the process of transforming normal text, called plaintext, into unreadable gibberish, called ciphertext. The term cipher is sometimes used as a synonym for ciphertext. In turn, a secret code is the same as a cipher. Decryption reverses this process, transforming ciphertext back into plaintext. Figure 12-2 on page 402 shows that both a key and an algorithm are used to encrypt plaintext into ciphertext and to decrypt the ciphertext back into plaintext. The key is also a string of binary digits of a fixed length. The binary code either has a value of 1 or 0. This code is written into successive powers of 2, rather than powers of
12-6 .
10 as in decimal. Thus, a binary number 1101 means (from right to left): 20 1 x 1 = 1 21 0 x 2 = 0 22 1 x 4 = 4 23 1 x 8 = 8 Thus, 11012 = 1310 The following is a Binary Number, Decimal, and Hexadecimal table. Hexadecimal is often used because it is simpler and takes less space. Binary number
Decimal equivalent
Hexadecimal equivalent
0001
1
1
0010
2
2
0011
3
3
0100
4
4
0101
5
5
0110
6
6
0111
7
7
1000
8
8
1001
9
9
1010
10
A
1011
11
B
1100
12
C
1101
13
D
1110
14
E
1111
15
F
12-7 .
The following website provides conversion between binary, decimal, and hexadecimal: www.easycalculation.com\\binary-converter.php
Note: Bits are combined in groups of eight bits called bytes. Encryption Strength Three important factors determine the strength of any encryption system: 1. Key length Longer keys provide stronger encryption by reducing the number of repeating blocks of ciphertext. This makes it harder to spot patterns in the ciphertext that reflect patterns in the original plaintext. The English binary 8-bit code is below:
2. Nature of encryption algorithm A third factor affecting encryption strength concerns the nature of the algorithm. 3. Key management policies The procedures used to store and manage the encryption keys are also important. COBIT control objective DS 5.8 identifies important control objectives related to the management of cryptographic keys, which are pieces of information (a parameter) that control the operation of a cryptographic algorithm. This is often the most vulnerable aspect of encryption systems.
12-8 .
Cryptography strictly applies to translating messages into cipher or code. The science of breaking codes and ciphers without a key is called cryptanalysis. Cryptology is the science that embraces both cryptography and cryptanalysis. Access to encryption keys must be tightly controlled. A second best alternative is a process called key escrow, which involves making copies of all encryption keys used by employees and storing those copies securely.
Types of Encryption Systems There are two basic types of encryption systems: 1. Symmetric encryption systems that use the same key both to encrypt and decrypt. Symmetric encryption has the following three problems:
Both parties (sender and receiver) need to know the shared secret key.
Separate secret keys need to be created for use with each different party with whom encryption is going to be used.
Both parties using symmetric encryption must know the same secret key; there is no way to prove who created a specific document.
2. Asymmetric encryption systems that use two keys. One key, called the public key, is widely distributed and available to everyone. The other key, called the private key, is kept secret and known only to the owner of that pair of keys. Table 12-1 on page 404 provides a comparison of encryption systems.
Hashing Hashing is a process that takes plaintext of any length and transforms it into a short code called a hash. Table 12-2 on page 406 provides a comparison of hashing and encryption. For example, the SHA-256 algorithm creates a 256-bit hash.
12-9 .
Multiple Choice 5 Which of the following statements is TRUE? a. Symmetric encryption is faster than asymmetric encryption and can be used to provide nonrepudiation of contracts. b. Symmetric encryption is faster than asymmetric encryption but cannot be used to provide nonrepudiation of contracts. c. Asymmetric encryption is faster than symmetric encryption and can be used to provide nonrepudiation of contracts. d. Asymmetric encryption is faster than symmetric encryption but cannot be used to provide nonrepudiation of contracts.
Learning Objective Four Explain how to create a digital signature and how it provides a means to create legally enforceable contracts.
Digital Signatures Asymmetric encryption and hashing are used to create digital signatures. A digital signature is information encrypted with the creator’s private key. This encrypted information can only be decrypted using the corresponding public key. Using a hash of the original plaintext to create a digital signature not only is efficient but also provides a means for establishing that the message decrypted by the recipient is exactly the same as the message created by the sender.
Digital Certificates and Public Key Infrastructure A digital certificate is an electronic document, created and digitally signed by a trusted third party that certifies the identity of the owner of a particular public key. The term Public Key Infrastructure (PKI) refers to the system and processes used to issue and manage asymmetric keys and digital certificates. The organization that issues public and private keys and records the public key in a digital certificate is called a certificate authority.
12-10 .
Illustrative Example: The Role of Encryption and Hashing in E-Business (using a digital signature) Figure 12-5 on page 408 provides this example Step 1: A person “X” creates a contract. Step 2: “X” uses SHA-256 hashing algorithm to hash the contract. Step 3: “X” uses “X’s” private key to encrypt hash of contract (this creates the digital signature). “X” sends the contract and the digital signature to “Y”. Step 4: “Y” receives contract and digital signature from “X”. Step 5: “Y” performs the following steps: a. “Y” uses same hashing algorithm (in this case SHA256) to hash the contract. b. “Y” uses “X’s” public key to decrypt the digital signature. After performing A and B, “Y” now has the hash of a contract, and the hash received from X of the contract. Step 6: “Y” compares to see if the two hashes match. If they do, “Y” knows that “X” created the contract that “Y” now has. If they do not match, “Y” knows that “X” either did not create the contract, or the contract was corrupted during transmission.
Effects of Encryption on Other Layers of Defense Digital signatures use asymmetric encryption to create legally binding electronic documents. Web-based e-signatures are an alternative mechanism for accomplishing the same objective. An e-signature is a cursive-style imprint of a person’s name that is applied to an electronic document.
Multiple Choice 6 What word describes a legally binding agreement that cannot be unilaterally repudiated by either party? a. Digital Signature b. Nonrepudiation c. Encryption d. Hashing
12-11 .
Learning Objective Five Discuss how blockchain works.
Blockchain Blockchain is a distributed ledger of hashed documents with copies stored on multiple computers. Blockchain cannot be unilaterally altered by any one entity. Figure 12-6 on page 410411 provides a detailed instruction of how blocks are added to a blockchain. The process follows these steps (more details contained in the figure). 1. Create a root hash for a block of documents. 2. Validate the new block and store the validation number in block header. 3. Append the new block to existing chain 4. Copy the updated blockchain to computers of all other participants in the blockchain network. Multiple Choice 7 Which of the following statements is TRUE about blockchains? a. It is easier to detect changes to items that are included on a blockchain than in traditional ERP systems. b. Blockchains are faster for recording transactions than traditional ERP systems. c. Once created there is no way to change a blockchain transaction. d. All the above are false.
Answers to Multiple Choice Questions: Multiple Choice Question Answers Number Answer 1 B 2 C 3 C 4 D 5 B 6 B 7 C
12-12 .
CHAPTER 13 PROCESSING INTEGRITY AND AVAILABILITY CONTROLS Instructor’s Manual Learning Objectives: 1. Identify and explain controls designed to ensure processing integrity. 2. Identify and explain controls designed to ensure systems availability by minimizing the risk of system downtime and enabling efficient recovery and resumption of operations.
Learning Objective One Identify and explain controls designed to ensure processing integrity.
Processing Integrity Table 13-1 on page 424 lists the basic controls that are essential for processing integrity for the process stages input, processing, and output.
Input Controls As the old saying goes: “garbage in, garbage out.” The quality of data that is collected about business activities and entered into the information system is vital. The following source data controls regulate the integrity of input: 1. Forms design. Source documents and other forms should be designed to help ensure that errors and omissions are minimized.
Prenumbered forms. Prenumbering forms improves control by making it possible to verify that none are missing.
Turnaround documents. A turnaround document is a record of company data sent to an external party and then returned by the external party to the system as input.
2. Cancellation and storage of documents. Documents that have been entered into the system should be cancelled so they cannot be inadvertently or fraudulently reentered into the system. Paper documents should be 13-1 .
defaced, e.g., by stamping them “paid.” Electronic documents can be similarly “cancelled” by setting a flag field to indicate that the document has already been processed. 3. Authorization and segregation of duties. Source documents should be prepared only by authorized personnel acting within their authority. 4. Visual scanning. Source documents should be scanned for reasonableness and propriety before being entered into the system.
Data Entry Controls The following tests are used to validate input data: 1.
A field check determines if the characters in a field are of the proper type.
2.
A sign check(+/-) determines if the data in a field have the appropriate arithmetic sign.
3.
A limit check tests a numerical amount to ensure that it does not exceed a predetermined value.
4.
A range check is similar to a limit check except that it has both upper and lower limits.
5.
A size check ensures that the input data will fit into the assigned field.
6.
A completeness check on each input record determines if all required data items have been entered.
7.
A validity check compares the ID code or account number in the transaction data with similar data in the master file to verify that the account exists.
8.
A reasonableness test determines the correctness of the logical relationship between two data items.
9.
Check digit verification. Authorized ID numbers (such as an employee number) can contain a check digit that is computed from the other digits. For example, the system could assign each new employee a nine-digit number, then calculate a tenth digit from the original nine and append that calculated digit to the original nine to form a 10-digit ID number. Data entry devices can be programmed to perform check digit verification by using the first nine digits to calculate the tenth digit each time an ID number is entered. If an error is made in entering any of the 10 digits, the
13-2 .
calculation made on the first nine digits will not match the tenth, or check digit. The above tests are used for both batch processing and online real-time processing.
Additional Batch Processing Data Entry Controls: 1.
Batch processing works correctly only if the transactions are presorted to be in the same sequence as records in the master file. A sequence check tests if a batch of input data is in the proper numerical or alphabetical sequence.
2.
Information about data input or data processing errors (date they occurred, cause of the error, date corrected, and resubmitted) should be entered in an error log.
3.
Batch totals. Three commonly used batch totals are:
A financial total sums a field that contains dollar values, such as the total dollar amount of all sales for a batch of sales transactions.
A hash total sums a nonfinancial numeric field, such as the total of the quantity ordered field in a batch of sales transactions.
A record count sums the number of records in a batch.
Additional Online Data Entry Controls Whenever possible, the system should automatically enter transaction data, which saves keying time and reduces errors. Other Online Processing Data Entry Controls 1. Prompting, in which the system requests each input data item and waits for an acceptable response. This ensures that all necessary data are entered (e.g., an online completeness check). 2. Preformatting, in which the system displays a document with highlighted blank spaces and waits for the data to be entered. 3. Closed-loop verification checks the accuracy of input data by using it to retrieve and display other related information. 4. Creation of a transaction log that includes a detailed record of all transaction data; a unique transaction identifier; the date and time of entry; terminal, transmission line, and operator identification; and the sequence in which the
13-3 .
transaction was entered. 5. Error messages should indicate when an error has occurred, which items are in error, and what the operator should do to correct it.
Processing Controls Controls are also needed to ensure that data are processed correctly. 1. Data matching. In certain cases, two or more items of data must be matched before an action can take place. For example, the system should verify that information on the vendor invoice matches that on both the purchase order and the receiving report before paying a vendor. 2. File labels. File labels need to be checked to ensure that the correct and most current files are being updated. Two important types of internal labels are header and trailer records. The header record is located at the beginning of each file and contains the file name, expiration date, and other identification data. The trailer record is located at the end of the file and contains the batch totals calculated during input. 3. Recalculation of batch totals. Batch totals can be recomputed as each transaction record is processed and compared to the values in the trailer record. If financial or total discrepancy is evenly divisible by nine, the likely cause is a transposition error, in which two adjacent digits were inadvertently reversed (e.g., 46 instead of 64). 4. Cross-footing and zero-balance test. Often totals can be calculated in multiple ways. For example, in spreadsheets a grand total can often be computed either by summing a column of row totals or by summing a row of column totals. These two methods should produce the same result.
A cross-footing balance test compares the results produced by each method to verify accuracy. For example, the totals for all debit columns are equal to the totals for all credit columns.
13-4 .
A zero-balance test applies the same logic to control accounts. For example, adding the balance for all customers in an accounts receivable subsidiary ledger and comparing to the balance in the accounts receivable general control account should be the same; the difference should be zero.
5. Write-protection mechanisms. These protect against the accidental writing over or erasing of data files stored on magnetic media. 6. Concurrent update controls protect records from errors that occur when two or more users attempt to update the same record simultaneously. This is accomplished by locking out one user until the system has finished processing the update entered by the other.
Output Controls Careful checking of system output provides additional control over processing integrity. Important output controls include: 1. User review of output. Users should carefully examine system output for reasonableness, completeness, and that they are the intended recipient. 2. Reconciliation procedures. Periodically, all transactions and other system updates should be reconciled to control reports, file status/update reports, or other control mechanisms. In addition, general ledger accounts should be reconciled to subsidiary account totals on a regular basis. 3. External data reconciliation. Database totals should periodically be reconciled with data maintained outside the system. For example, the number of employee records in the payroll file can be compared with the total from human resources to detect attempts to add fictitious employees to the payroll database. 4. Data transmission controls. Parity checking and message acknowledgement techniques are two basic types of data transmission controls (Checksums and parity bits). Checksums use a hash of a file to verify accuracy. Parity Checking Computers represent characters as a set of binary digits (bits). When data are transmitted, some bits may be lost or received incorrectly due to media disruptions or failures. To detect these types of errors, an extra digit, called a parity bit, is added to every character. For example, the digits 5 and 7 can be 13-5 .
represented by the seven-bit patterns 0000101 and 0000111, respectively. An eighth bit could be added to each character to serve as the parity bit. Two basic schemes are referred to as even parity and odd parity. In even parity, the parity bit is set so that each character has an even number of bits with the value 1; in odd parity, the parity bit is set so that an odd number of bits in the character have the value 1. Message Acknowledgment Techniques Techniques can be used to let the sender of an electronic message know that a message was received: 1.
Echo check. When data are transmitted, the system calculates a summary statistic, such as the number of bits in the message. The receiving unit performs the same calculation—a procedure known as an echo check—and sends the result to the sending unit. If the counts agree, the transmission is presumed to be accurate.
2.
Trailer record. The sending unit stores control totals in a trailer record. The receiving unit uses that information to verify that the entire message was received.
3.
Numbered batches. If a large message is transmitted in segments, each can be numbered sequentially so that the receiving unit can properly assemble the segments.
Example: Credit Sales Processing The following is an example of processing integrity controls using a credit sale as an example. The following transaction data are used: sales order number, customer account number, inventory item number, quantity sold, sale price, and delivery date. Processing these transactions includes the following steps: 1. Entering and editing the transaction data. 2. Updating the customer and inventory records (the amount of the credit purchase is added to the customer’s balance; for each inventory item, the quantity sold is subtracted from the quantity on hand). 3. Preparing and distributing shipping or billing documents.
Processing Integrity Controls using the example above: 1. When a user accesses the online system, logical access controls confirm the identity of the data entry device (personal computer, terminal) and the validity of the user’s ID number and password.
13-6 .
2. A compatibility test is performed on all user interactions to ensure that only authorized tasks are performed. 3. The system automatically assigns the transaction the next sequential sales order number and the current date as the date of the invoice. 4. To assist authorized personnel in entering sales data, the system prompts for all required input (completeness test). After each prompt, the system waits for a response. 5. Each response is tested using one or more of the following controls: validity checks (valid customer and inventory numbers), field and sign checks (only positive, numeric characters in the quantity, date, and price fields), and limit or range checks (delivery date versus current date). 6. When the customer number is entered, the system retrieves the corresponding customer name from the database and displays it on the screen (closed-loop verification). 7. When the inventory item number is entered, the system and the operator go through the same procedures as they do with the customer number. Processing Controls Updating files includes the customer and inventory database records. Additional validation tests are performed by comparing data in each transaction record with data in the corresponding database record. These tests often include the following: 1. Validity checks on the customer and inventory item numbers. 2. Sign checks on inventory-on-hand balance (after subtracting quantities sold). 3. Limit checks that compare each customer’s total amount due with the credit limit. 4. Range checks on the sale price of each item sold relative to the permissible range of prices for that item. 5. Reasonableness tests on the quantity sold of each item relative to normal sales quantities for that customer and that item. 13-7 .
Output Controls Output controls that can be utilized are as follows: 1. Billing and shipping documents are forwarded electronically to only preauthorized users. 2. Users in the shipping and billing departments perform a limited review of the documents by visually inspecting them for incomplete data or other obvious errors. 3. The control report is sent automatically to its intended recipients, or they can query the system for the report. Focus 13-1 on page 428 discusses some of the concerns involving the use of electronic voting machines. Voting software could use completeness checks to ensure that voters made choices in all races. This would eliminate the “hanging” problem created by failing to completely punch out the hole on a paper ballot. Limit checks could identify and prevent voters from attempting to select more candidates than permitted in a particular race. Some security experts suggest that election officials adopt the methods used by the state of Nevada to ensure that electronic gambling machines operate honestly and accurately, which include the following: 1. The Gaming Control Board keeps copies of all software. It is illegal for casinos to use any unregistered software. For electronic voting, the government should keep copies of the source code. 2. Frequent on-site spot checks of the computer chips in gambling machines are made to verify compliance with the Gaming Control Board’s records. Similar tests should be done to voting machines. 3. Extensive tests are conducted of the machine’s physical security, such as how it reacts to stun guns and large electric shocks. Voting machines should be similarly tested. 4. All gambling machine manufacturers are carefully scrutinized and are registered. Similar checks should be performed on voting machine manufacturers and software developers.
Multiple Choice 1 13-8 .
The COBIT control objective that addresses the threat of invalid input is: a. DSS 06 b. BAI 06 c. APO 06 d. APO 03 Multiple Choice 2 If an online file is damaged, the _____ can be used for reconstruction purposes. a. transaction log b. field check c. hash total d. record count Multiple Choice 3 _____ protects records from errors that occur when two or more users attempt to update the same record simultaneously. a. Cross-footing balance test b. Online processing controls c. Concurrent update controls d. Zero-balance test
Learning Objective Two Identify and explain controls designed to ensure systems availability by minimizing the risk of system downtime and enabling efficient recovery and resumption of operations.
Availability Reliable systems and information are available for use whenever needed. Threats to system availability originate from many sources, including: 1.
Hardware and software failures.
2.
Natural and man-made disasters.
3.
Human error.
4.
Worms and viruses.
5.
Denial-of-service attacks and other acts of sabotage.
Table 13-2 on page 429 summarizes the key controls related to ensure system availability which minimize system downtime and provide timely recovery.
13-9 .
Minimizing Risk of System Downtime The loss of system availability can cause significant financial losses. Organizations can take a variety of steps to minimize the risk of system downtime. The physical and logical access controls can reduce the risk of successful denial-of-service attacks. Good computer security reduces the risk of system downtime due to the theft or sabotage of information system resources. The use of redundant components, such as dual processors and redundant arrays of independent hard drives (RAID), provides fault tolerance, enabling a system to continue functioning in the event that a particular component fails. Surge protection devices provide protection against temporary power fluctuation that might otherwise cause computers and other network equipment to crash. An uninterruptible power supply (UPS) system provides protection in the event of a prolonged power outage.
Recovery and Resumption of Normal Operations Sr. Management must ask themselves two questions relating to the risk of downtime: 1. How much data are we willing to recreate from source documents (if they exist) or potentially lose (if no source documents exist)? 2. How long can the organization function without its information system? Figure 13-1 on page 431 shows the relationship of these two questions. Management’s answer to the first question determines the organization’s recovery point objective (RPO). RPO is inversely related to the frequency of backups. The answer to the second question determines the organization’s recovery time objective (RTO). Disaster recovery and business continuity plans are essential if an organization hopes to survive a major catastrophe.
13-10 .
Data Backup Procedures A backup is an exact copy of the most current version of a database, file, or software program. The process of installing the backup copy for use is called restoration. Several different backup procedures exist: A full backup is an exact copy of the data recorded on another physical media (tape, magnetic disk, CD, DVD, and so on). Full backups are time-consuming, so most organizations only do full backups weekly and supplement them with daily backups. Two types of partial backups are: 1. An incremental backup involves copying only the data items that have changed since the last backup. 2. Differential backup copies all changes made since the last full backup. 3. Deduplication is a process that uses hashing to identify and backup only those portions of a file or database that have been updated since the last backup. Management must establish an RPO, which represents the maximum length of time for which it is willing to risk the possible loss of transaction data. Real-time mirroring involves maintaining two copies of the database at two separate data centers at all times and updating both copies in real-time as each transaction occurs. Periodically, the system makes a copy of the database at that point in time, called a checkpoint, and stores it on backup media. An archive is a copy of a database, master file, or software that will be retained indefinitely as a historical record, usually to satisfy legal and regulatory requirements. Infrastructure Replacement A second key component of disaster recovery includes provisions for replacing the necessary computer infrastructure: computers, network equipment and access, telephone lines, other office equipment (e.g., fax machines), and supplies.
13-11 .
The RTO represents the time following a disaster by which the organization’s information system must be available again.
Organizations have three basic options for replacing computer and networking equipment: 1. The least expensive approach is to create reciprocal agreements with another organization that uses similar equipment to have temporary access to and use of their information system resources. 2. Another solution involves purchasing or leasing a cold site, which is an empty building that is prewired for necessary telephone and Internet access, plus a contract with one or more vendors to provide all necessary computers, and other office equipment within a specified period of time. 3. A more expensive solution for organizations, such as financial institutions and airlines, which cannot survive any appreciable time period without access to their information system, is to create what is referred to as a hot site. A hot site is a facility that is not only prewired for telephone and Internet access but also contains all the computing and office equipment the organization needs to perform its essential business activities. Documentation Documentation is an important, but often overlooked, component of disaster recovery and business continuity plans. The plan itself, including instructions for notifying appropriate staff and the steps to be taken to resume operations, needs to be well documented. Testing Periodic testing and revision are probably the most important component of effective disaster recovery and business continuity plans. Most plans fail their initial test because it is impossible to anticipate everything that could go wrong. Disaster recovery and business continuity plans need to be tested on at least an annual basis.
13-12 .
Focus 13-2 on page 434 describes how NASDAQ recovered from September 11. Because of their recovery plan, NASDAQ was up and running only six days after the 9/11/01 terrorist attack. Although the Manhattan office phone lines were out, NASDAQ still had offices in Maryland and Connecticut, which allowed it to monitor the regulatory processes. NASDAQ also had their executives carry more than one mobile phone in case one service provider went down.
Multiple Choice 4 Which of the following COBIT control objective addresses the importance of locating and designing the rooms housing mission-critical servers and databases? a. DSS 01 b. DSS03 c. DSS05 d. DSS 06 Multiple Choice 5 Full backups are time-consuming, so most organizations only do full backups _____ and supplement them with _____ partial backups. a. monthly; weekly b. quarterly; monthly c. annually; quarterly d. weekly; daily
Answers to Multiple Choice Questions: Multiple Choice Question Answers Number Answer 1 A 2 C 3 C 4 A 5 D
13-13 .
CHAPTER 14 THE REVENUE CYCLE: SALES TO CASH COLLECTIONS Instructor’s Manual Learning Objectives: 1. Describe the basic business activities in the revenue cycle and discuss the general threats to that process and the controls that can be used to mitigate those threats. 2. Explain the sales order entry process, the key decisions that need to be made, and threats to that process, and describe the controls that can be used to mitigate those threats. 3. Explain the shipping process, key decisions that need to be made, and threats to that process, and describe the controls that can be used to mitigate those threats. 4. Explain the billing process, key decisions that need to be made, and threats to that process, and describe the controls that can be used to mitigate those threats. 5. Explain the cash collections process, key decisions that need to be made and threats to that process, and describe the controls that can be used to mitigate those threats. Questions to be addressed in this chapter include: 1. How could AOE improve customer service? What information does marketing need to perform its tasks better? 2. How could AOE identify its most profitable customers and markets? 3. How can AOE improve its monitoring of credit accounts? How would any changes in credit policy affect both sales and uncollectible accounts? 4. How could AOE improve its cash collection procedures?
Introduction The revenue cycle is a recurring set of business activities and related information processing operations associated with providing goods and services to customers and collecting cash in payment for those sales. Refer to Figure 14-2 on page 454 for the context diagram of the revenue cycle.
Learning Objective One Describe the basic activities in the revenue cycle and discuss the general threats to that process and the controls that can be used to mitigate those threats.
14-1 .
Revenue Cycle Business Activities Figure 14-3 on page 455 shows the four basic business activities performed in the revenue cycle. 1. Sales order entry 2. Shipping 3. Billing 4. Cash collections The revenue cycle’s primary objective is to provide the right product in the right place at the right time for the right price. To accomplish that objective, management must make the following key decisions: 1. To what extent can and should products be customized to individual customers’ needs and desires? 2. How much inventory should be carried, and where should that inventory be located? 3. How should merchandise be delivered to customers? Should the company perform the shipping function itself or outsource it to a third party that specializes in logistics? 4. What are the optimal prices for each product or service? 5. Should credit be extended to customers? 6. How much credit should be given to individual customers? 7. What credit terms should be offered? 8. How can customer payments be processed to maximize cash flow?
General Threats and Controls General threats and controls throughout the revenue cycle include: 1. Threat: Inaccurate or invalid master data Control: Data processing integrity controls Restriction of access to master data Review of all changes to master data 2. Threat: Unauthorized disclosure of sensitive information Control: Access controls Encryption 14-2 .
Tokenization of customer personal information 3. Threat: Loss or destruction of data Control: Backup and disaster recovery procedures 4. Threat: Poor performance Control: Managerial Reports Multiple Choice 1 A general threat throughout the revenue cycle includes: a. Loss or destruction of data b. Invalid orders c. Theft of inventory d. All of the above e. None of the above Multiple Choice 2 The following are the business activities performed in the revenue cycle: 1. Shipping 2. Cash collections 3. Sales order entry 4. Billing The correct sequence in which these activities are performed is: a. 3, 2, 1, 4 b. 3, 4, 1, 2 c. 3, 1, 4, 2 d. 3, 4, 2, 1
Learning Objective Two Explain the sales order entry process, the key decisions that need to be made, and threats to that process, and describe the controls that can beSales used Order to mitigate Entry those threats.
The revenue cycle begins with the receipt of orders from customers. The sales order entry process involves four steps: 1. Taking the customer’s order 2. Approving customer credit 3. Checking inventory availability 4. Respond to customer inquiries Taking Customer Orders 14-3 .
Normally, this order document is electronically displayed on a computer monitor screen. Orders can be received in the store, by mail, by phone, over a website, or by a salesperson in the field. Websites provide another way to automate sales order entry. Online order information can be automatically routed to the warehouse to generate picking and shipping instructions. Figure 14-7 on page 460 provides a typical sales order entry screen (this is from NetSuite accounting software). Credit Approval Most business-to-business sales are made on credit. Credit sales should be approved before they are processed. Each customer will have a credit limit. Credit limit is the maximum allowable account balance for each customer based on the customer’s past credit history and ability to pay. Figure 14-8 on page 463 shows the information typically available for this purpose: the customer’s credit limit, current balance, and age of any outstanding unpaid invoices. An accounts receivable aging report as shown in Figure 14-9 on page 463 is a useful report that lists customer accounts and the length of time outstanding for each invoice. Checking Inventory Availability The next step is to determine if there is sufficient inventory available to fill the order. Figure 14-10 on page 464 shows an example of the information that is usually available to the sales order entry clerk. When there are not sufficient items on hand to fill the customer’s order, a back order is created. Once the item(s) become available, a picking ticket is created. The picking ticket authorizes the inventory control function to release merchandise to the shipping department. The accuracy of inventory records is important because customers may become justifiably upset when unexpected delays occur in filling their orders.
14-4 .
For Class Discussion: What example do you have if you place an order online and the website shows the item is available only to find out the next day that the item is back ordered? What has actually happened when you receive this notice is that the inventory system is not updating in real time and it is likely that updates are done overnight in a batch processing manner. Responding to Customer Inquiries Customer service is so important that many companies use special software packages, called Customer Relationship Management (CRM) systems, to support this vital process. The goal of CRM is to retain customers. This is important because a general marketing rule of thumb is that it costs at least five times as much to attract and make a sale to a new customer as it does to make a repeat sale to an existing customer. Transaction processing technology can also be used to improve customer relationships. For example, many commercial POS systems (point of sale) can link not only with the inventory file but also with the customer master file. This not only automatically updates accounts receivable balances but provides an opportunity to print customized coupons and personal messages on each sales receipt, such as “Thank you.” Information technology can be used to automate responses to many customer routine inquiries. Websites provide a cost-effective alternative to traditional toll-free telephone customer support, automating that process with a list of frequently asked questions (FAQs). Discussion boards can also be provided so that customers can share information and useful tips with one another. Websites also enable customers to use personal identification numbers (PINs) to directly access their account information and to check on the status of orders.
Sales Order Entry Threats and Controls The primary objectives of the sales order entry process are to accurately and efficiently process customer orders, ensure that the company gets paid for all credit sales and that all sales are legitimate, and to minimize the loss of revenue arising from poor inventory management.
14-5 .
The following are Threats 5 through 9 listed for sales order entry in Table 14-1 on page 457-458. Threat 5: Incomplete or Inaccurate Customer Orders Incomplete or inaccurate information about the customer and their order could prove embarrassing because most likely you will need to call that customer to get the correct information. Control: Data entry edit controls Restriction of access to master data Threat 6: Invalid Orders Sales orders must be properly authorized from the customer (this is usually a signature if on a written contract, or can be digitized for online orders authorizing the order). Control: Digital signatures or written signatures Threat 7: Uncollectible Accounts Another threat in sales order entry is the possibility of making sales that later turn out to be uncollectible. Control: Use credit limits Specific authorization to approve sales to new customers or sales that exceed customer's credit limit Management review of accounts receivable aging report Threat 8: Stockouts or Excess Inventory Sales could be lost due to stock outs. Excess inventory means additional carrying costs and potential markdowns. Control: Perpetual inventory control system Use bar codes or RFID Training Periodic physical counts of inventory Sales forecasts and activity reports Threat 9: Loss of Customers Control: CRM systems, self-help websites, and proper evaluation of customer service ratings
Multiple Choice 3 A useful report for management to control for the threat of uncollectible accounts is: a. Customer list 14-6 .
b. Accounts receivable aging report c. Sales order report d. Inventory report
Learning Objective Three Explain the shipping process, key decisions that need to be made, and threats to that process, and describe the controls that can be used to mitigate those threats.
Shipping The second basic activity in the revenue cycle is filling customer orders and shipping the desired merchandise. Refer to circle 2 in Figure 14-3 on page 455. The primary objective of the shipping function is to fill customer orders efficiently and accurately, and to safeguard inventory. Figure 14-12 on page 467 provides a data flow diagram for shipping. Shipping consists of the following two steps: 1.
Picking and packing the order
2.
Shipping the goods
Pick and Pack the Order The picking ticket printed by sales order entry triggers the pick and pack process. Some of the investments companies have made are in an automated warehouse system that includes computers, bar-code scanners, conveyer belts, and communications technology. Radio-Frequency Identification (RFID) replaces the bar codes. The RFID tag eliminates the need to align items with scanners; instead, the tags can be read as the inventory moves throughout the warehouse. Ship the Order The shipping department compares the physical count of inventory with the quantities indicated on the picking ticket and with the quantities indicated on the copy of the sales order that was sent directly to shipping from sales order entry. 14-7 .
The packing slip lists the quantity and description of each item included in the shipment. An example of a packing slip is Figure 14-13 on page 469. The bill of lading is a legal contract that defines responsibility for the goods in transit. Figure 14-14 on page 470 provides a sample of a bill of lading. If the customer is to pay the shipping charges, the copy of the bill of lading may serve as a freight bill, to indicate the amount the customer should pay to the carrier. One major decision that needs to be made when filling and shipping customer orders concerns the choice of delivery method as this can be a major cost factor. Another important decision concerns the location of distribution centers. RFID systems can provide real-time information on shipping status and thus provide additional value to customers.
Threats to the shipping activity and controls: Threat 10: Picking the Wrong Items or Wrong Quantity Customers want what they ordered and do not want a surprise and hassle of returning something they did not order. Control: Bar-code and RFID technology Reconciliation of picking lists to sales order details Threat 11: Theft of Inventory This is the threat that an employee or customer could steal the merchandise. Also, inventory can be stolen in transit. Control:
Restrict physical access to inventory All inventory transfers should be documented RFID and bar-code technology Periodic physical counts of inventory and reconciliation to recorded quantities
Threat 12: Shipping Errors Shipping the wrong items or quantities of merchandise and shipping to the wrong locations are serious errors because they can significantly reduce customer satisfaction and thus future sales.
14-8 .
Control: Reconciliation of shipping documents with sales orders, picking lists, and packing slips. Use RFID systems to identify delays Data entry via bar-code scanners and RFID Data entry edit controls Configuration of ERP system to prevent duplicate shipments Multiple Choice 4 An important decision during the shipping stage is: a. Selecting a carrier b. Location of distribution centers c. All of the above d. None of the above Multiple Choice 5 The following lists the quantity and description of each item included in the shipment: a. Picking ticket b. Bill of lading c. Sales order d. Packing slip
Learning Objective Four Explain the billing process, key decisions that need to be made, and threats to that process, and describe the controls that can be used to mitigate those threats.
Billing The third basic activity in the revenue cycle, shown in circle 3.0 in Figure 14-3 on page 455, involves billing customers. The primary objectives of the billing and accounts receivable functions are to ensure that customers are billed for all sales, that invoices are accurate, and that customer accounts are accurately maintained. Figure 14-15 on page 472 provides a data flow diagram of invoicing and accounts receivable.
Invoicing The document created in the billing process is the sales invoice, which notifies customers of the amount to be paid and where to send payment. 14-9 .
Figure 14-16 on page 473 provides an example of an invoice. Maintain Accounts Receivable The accounts receivable function uses the information on the invoice to debit the customers’ accounts for credit purchases and credit the customers’ accounts when payment is received. Under the open-invoice method, customers normally pay according to each invoice. The customer is asked to return a copy of the invoice when mailing in their payment. This return copy is referred to as the remittance advice. Under the balance-forward method, customers typically pay according to the amount shown on a monthly statement. A monthly statement lists all transactions, including both sales and payments. Figure 14-17 on page 474 provides an example of a monthly statement. One advantage of the open-invoice method is that it is conducive to offering discounts for prompt payment, as invoices are individually tracked and aged. A disadvantage of the open-invoice method is the added complexity required to maintain information about the status of each individual invoice for each customer. Under cycle billing, monthly statements are prepared for subsets of customers at different times. For example, the customer master file might be divided into four parts, and each week monthly statements would be prepared for one-fourth of the customers. Exceptions: Account Adjustments and Write-offs This involves either the return of merchandise by customers for credit or the write-off of customers who do not pay their bill. Figure 14-18 on page 476 provides an example of a credit memo. After repeated attempts to collect payment have failed, it may be necessary to write-off a customer’s account. In such cases, the credit manager issues a credit memo to authorize the write-off.
14-10 .
Threat 13: Failure to Bill Customers Failure to bill customers for items shipped results in the loss of assets and erroneous data about sales, inventory, and accounts receivable. Control: Segregating the shipping and billing functions Periodic reconciliation of invoices with sales orders, picking tickets, and shipping documents Threat 14: Billing Errors Billing errors, such as pricing mistakes and billing customers for items not shipped or on back order, represent another potential threat. Controls: Configuration of system to automatically enter pricing data Restrict access to pricing master data Data entry edit controls Reconciling shipping documents to the sales order
Threat 15: Posting Errors in Accounts Receivable Control: Data entry controls such as the following edit checks should be used to ensure accuracy in updating customer accounts: 1. Validity checks on the customer and invoice numbers. 2. Closed-loop verification to ensure that the proper account is being credited. 3. A field check to ensure that only numeric values are entered for payment amounts. Reconciliation of batch totals Mailing of monthly statements to customers Reconciliation of subsidiary accounts to general ledger Threat 16: Inaccurate or Invalid Credit Memos Control: Segregation of duties of credit memo authorization. Returns must have proper authorization from management (RMA: Return Management Authorization) Multiple Choice 6 The two basic methods to maintain accounts receivable are: a. Real-time and open-invoice b. Real-time and balance-forward c. Open-invoice and balance-forward d. None of the above
14-11 .
Learning Objective Five Explain the cash collections process, key Cash Collections decisions that need to be made and threats to that process, and describe the controls that can be used to mitigate those threats.
The final step in the revenue cycle is cash collections. Refer to circle 4.0 in Figure 14-3 on page 455. The primary objective of the cash collections function is to safeguard customer remittances. The cashier handles customer remittances and deposits them in the bank. A remittance list provides the names and amounts of all customer remittances, and sends it to accounts receivable. A lockbox is a postal address to which customers send their remittances. The participating bank picks up the checks from the post office box and deposits them to the company’s account. Under an electronic lockbox arrangement, the bank electronically sends the company information about the customer account number and the amount remitted as soon as it receives and scans those checks. With electronic funds transfer (EFT), customers send their remittances electronically to the company’s bank and thus eliminate the delay associated with the time the remittance is in the mail system. EFT is usually accomplished through the banking system’s Automated Clearing House (ACH) network. EFT involves only the transfer of funds. Although every bank can do EFT through the ACH system, not every bank possesses the EDI capabilities necessary to process the related remittance data. Electronic data interchange (EDI) is the use of computerized communication to exchange business data electronically in order to process transactions. Financial electronic data interchange (FEDI) integrates the exchange of EFT with the exchange of the remittance data; electronic data interchange (EDI).
14-12 .
Figure 14-19 on page 478 provides a picture of the difference between EDI, EFT, and FEDI. When dealing with customers who are not FEDI capable, or with individual consumers, companies can also speed the collection process by accepting credit cards or procurement cards (a special type of credit card discussed in Chapter 13). Threat 17: Theft of Cash Control: The following segregation of duties should be used to reduce this risk. The person who handles (deposits) should not also: 1. post remittances to customer accounts 2. create or authorize credit memos 3. reconcile the bank account In general, the handling of money and checks within the organization should be minimized. The optimal methods are a bank lockbox arrangement or the use of EFT or FEDI for customer payments. Immediately upon opening mail, create a list of all customer payments received. Prompt, restrictive endorsement of all customer checks 2 people open mail Use cash registers Daily deposits Threat 18: Cash Flow Problems Control: Lockbox can help increase the posting of cash in a bank account. This is helpful when the organization has many transactions in a month. Discounts for prompt payment by customers Cash flow budgets Multiple Choice 7 The applicable control procedure for the threat of incomplete or inaccurate customer orders is: a. Data entry edit checks b. Segregation of duties c. Data entry edit controls d. Reconciliation of sales order with the picking ticket
14-13 .
Multiple Choice 8 The applicable control for theft of cash is: a. Lockboxes b. Segregation of duties c. Use of cash registers d. All of the above Multiple Choice 9 Operational data is needed to monitor performance and to perform the following recurring tasks: a. Respond to customer inquiries about account balances and order status b. Select methods for delivering merchandise c. Determine inventory availability d. B and C e. All of the above Multiple Choice 10 Aging of accounts receivable is based on the: a. sales order date b. picking ticket date c. invoice date d. bill of lading date
Answer to Multiple Choice Questions: Multiple Choice Question Answers Number Answer Number 1 A 6 2 C 7 3 B 8 4 C 9 5 D 10
14-14 .
Answer C A D E C
CHAPTER 15 THE EXPENDITURE CYCLE: PURCHASING TO CASH DISBURSEMENTS Instructor’s Manual Learning Objectives: 1. Describe the basic business activities and related information processing operations in the expenditure cycle, explain the general threats to those activities, and describe the controls that can mitigate those threats. 2. Explain the process and key decisions involved in ordering goods and services, identify the threats to those activities, and describe the controls that can mitigate those threats. 3. Explain the process and key decisions involved in receiving goods and services, identify the threats to those activities, and describe the controls that can mitigate those threats. 4. Explain the process and key decisions involved in approving supplier invoices for goods and services, identify the threats to those activities, and describe the controls that can mitigate those threats. 5. Explain the process and key decisions involved in making cash disbursements to suppliers, identify the threats to those activities, and describe the controls that can mitigate those threats. Questions to be addressed in this chapter include: 1. What must be done to ensure that AOE’s inventory records are current and accurate to avoid unexpected components shortages like those experienced at the Wichita plant? 2. How could the problems at the Dayton plant be avoided in the future? What can be done to ensure timely delivery of quality components? 3. Is it possible to reduce AOE’s investment in materials inventories? 4. How could the information system provide better information to guide planning and production? 5. How could IT be used to further reengineer expenditure cycle activities?
Introduction The expenditure cycle is a recurring set of business activities and related data processing operations associated with the purchase of and payment for goods and services.
15-1 .
Figure 15-1 on page 495 provides a context diagram of the expenditure cycle. Note that the expenditure cycle involves the revenue cycle, inventory cycle, various departments involved in requesting items to be ordered and receiving the items, and the production cycle. This chapter focuses on the purchase of raw materials, finished goods, supplies, and services. Chapters 16 and 17 will cover fixed assets and labor services, respectively. The primary objective of the expenditure cycle is to minimize the total cost of acquiring and maintaining inventories, supplies, and the various services the organization needs to function.
Learning Objective One Describe the basic business activities and related information processing operations performed in the expenditure cycle, explain the general threats to those activities, and describe the controls that can mitigate those threats.
Expenditure Cycle Business Activities Figure 15-2 on page 497 provides a level 0 data flow diagram for the expenditure cycle. Four basic business activities in the expenditure cycle: 1. Ordering goods, supplies, and services. 2. Receiving and storing goods, supplies, and services. 3. Approving supplier invoices. 4. Paying for goods, supplies, and services.
Expenditure Cycle Information Needs The following information is needed for the following operational tasks in the expenditure cycle: 1. Determine when and how much additional inventory to order. 2. Select the appropriate suppliers from whom to order. 3. Verify the accuracy of vendor invoices. 4. Decide if purchase discounts should be taken. 5. Monitor cash flow needs to pay outstanding obligations. 15-2 .
The AIS needs to provide information to evaluate the following: 1.
Purchasing efficiency and effectiveness
2.
Supplier performance
3.
Time taken to move goods from receiving to production
4.
Percent of purchase discounts taken
Notice that these decisions require both financial and operating data. Because inventory represents a sizable investment of working capital, reports that help manage inventory are especially valuable. A key inventory measure is the inventory turnover.
Control Objectives, Threats, And Procedures In the expenditure cycle (or any cycle), a well-designed AIS should provide adequate controls to ensure that the following objectives are met: 1. All transactions are properly authorized. 2. All recorded transactions are valid. 3. All valid and authorized transactions are recorded. 4. All transactions are recorded accurately. 5. Assets are safeguarded from loss or theft. 6. Business activities are performed efficiently and effectively. 7. The company is in compliance with all applicable laws and regulations. 8. All disclosures are full and fair. Table 15-2 on pages 500-501 provides a detail of the threats and controls for the expenditure cycle. General Control Issues Threat 1: Inaccurate or invalid master data Controls: Data processing integrity controls, restriction of access to master data, review of all changes to master data. Threat 2: Unauthorized disclosure of sensitive information Controls: Access controls and Encryption
15-3 .
Threat 3: Loss or destruction of data Controls: Backup and disaster recovery procedures Threat 4: Performing Poorly Controls: Managerial reports Multiple Choice 1 The activities in the expenditure cycle in the correct order of activity is: a. order, storing, paying b. ordering, receiving, approving, paying c. identifying needs, approving, ordering, paying d. approving, receiving, paying
Learning Objective Two Explain the process and key decisions involved in ordering goods and services, identify the threats to those activities, and describe the controls that can mitigate those threats.
Order Goods The first major business activity in the expenditure cycle (circle 1.0 in Figure 15-2 on page 497) is ordering inventory or supplies. Key decisions in this process involve identifying what, when, and how much to purchase and from whom. Weaknesses in inventory control can create significant problems with this process as demonstrated in the introductory AOE case: 1. Inaccurate inventory records. 2. Inventory shorts resulting in production delays caused by late delivery or substandard components delivered. Alternative Inventory Control Methods One of the key factors affecting the ordering process is the inventory control method to be used. We will consider three alternate approaches to inventory control: Economic order quantity (EOQ); just-in-time inventory (JIT); and materials requirements planning (MRP). EOQ is the traditional approach to managing inventory. The goal is to maintain enough stock so that production does not get interrupted. An optimal order size is calculated by minimizing 15-4 .
the sum of ordering costs, carrying costs, and stockout costs. A reorder point is also calculated. 1. Ordering costs include all expenses associated with processing purchase transactions. 2. Carrying costs are those associated with holding inventory. 3. Stockout costs are those costs that result from inventory shortages, such as lost sales or production delays. 4. The reorder point is when to order based on delivery time and safety stock levels. 5. Optimal order size
EOQ =
2 DP C
D = Demand in units for a specified period P = Relevant ordering cost per purchase order C = Relevant carrying cost of one unit in stock for the time period used for D Materials requirement planning (MRP) seeks to reduce inventory levels by improving the accuracy of forecasting techniques to better schedule purchases to satisfy production needs. This schedule identifies the quantities of raw materials, parts, and supplies needed in production and the point in time when they will be needed. Just-in-time (JIT) systems attempt to minimize, if not totally eliminate, carrying inventory by purchasing and producing goods in response to actual sales. These systems have frequent, small deliveries of materials, parts, and supplies directly to the location where production will occur. A major difference between MRP and JIT is the production scheduling. 1. MRP systems schedule production to meet forecasted sales; thereby creating a stock of finished goods inventory. 2. JIT systems schedule production in response to customer demands; thereby virtually eliminating finished goods inventory. Purchase Requests Whatever the inventory control system, the order processing typically begins with a purchase request followed by the generation of a purchase order. The purchase requisition is 15-5 .
triggered by the inventory control function or an employee noticing a shortage. Advanced inventory control systems automatically initiate purchase requests when quantity falls below the reorder point. The purchase requisition is a paper or electronic form that identifies who is requesting the goods; where they should be delivered; when they’re needed; item numbers, descriptions, quantities, and prices; a suggested supplier; and the department number and account number to be charged. The purchase requisition is received by a purchasing agent in the purchasing department, who typically performs the purchasing activity. The purchase requisition is a document, or electronic form, that identifies the requisitioner; specifies the delivery location and date needed; identifies the item numbers, descriptions, quantity, and price of each item requested; and may suggest a supplier. Figure 15-5 on page 503 shows a typical purchase requisition data entry screen used in ERP systems. Generating Purchase Orders A crucial decision is the selection of supplier for inventory items. Several factors should be considered in making this decision: 1. Price 2. Quality of materials 3. Dependability in making deliveries Once a supplier has been selected for a product, their identity should become part of the product inventory master file. It’s important to track and periodically evaluate supplier performance. The purchasing function should be evaluated and rewarded based on how well it minimizes total costs, not just the costs of purchasing the goods. A purchase order (PO), shown in Figure 15-7 on page 506 is a document or electronic form that formally requests a supplier to sell and deliver specified products at specified prices. The PO is both a contract and a promise to pay. Multiple purchase orders may be completed for one purchase requisition if multiple vendors will fill the request. A blanket purchase order is a commitment to buy specified items at specified prices from a particular supplier for a set time period. Improving Efficiency and Effectiveness The major cost driver is the number of purchase orders processed. Using EDI is one way to improve the purchasing process. EDI reduces costs by eliminating the clerical work associated with printing and mailing paper documents. 15-6 .
The time between recognizing the need to reorder an item and subsequently receiving it also is reduced. Vendor-managed inventory programs provide another means of reducing purchase and inventory costs. Vendor-managed inventory essentially outsources much of the inventory control and purchasing. Suppliers are given access to point-of-sales and inventory data and are authorized to automatically replenish inventory. For example, Walmart uses vendor management systems with their vendors (e.g., Proctor & Gamble) to make sure that the store shelves are well-stocked. Reverse auctions provide another technique to reduce purchasingrelated expenses. In reverse auctions, suppliers compete with one another to need demand at the lowest price. One other way to reduce purchasing-related costs is to conduct a pre-award audit, normally involving large purchases that involve bids. The internal auditor verifies the accuracy of the bids.
Order Goods Threat 5: Stockouts or Excess Inventory Stockouts result in lost sales; excess inventory incurs higher than necessary carrying costs. Controls: Accurate inventory control and sales forecasting; use of perpetual inventory method; supplier performance reports; recording of inventory changes in real time; barcoding inventory; and periodic physical counts Threat 6: Ordering Unnecessary Items Companies must also beware of purchasing items that are not currently needed. Controls: Integrate databases of various divisions and produce reports that link item descriptions to part numbers to allow consolidation of orders Threat 7: Purchasing Goods at Inflated Prices The cost of purchased components represents a substantial portion of the total cost of many manufactured products. Controls: Price lists for frequently-purchased items; use of catalogs for low-cost items; solicitation of bids for high-cost and specialized products; review of purchase 15-7 .
orders; budgetary controls and responsibility accounting; and performance review Threat 8: Purchasing Goods of Inferior Quality Sometimes purchasing goods at the lowest possible price sacrifices quality of the goods. Controls: Use of approved supplier list; review of purchase orders; tracking of supplier performance; purchasing accountability for rework and scrap Threat 9: Purchasing from Unreliable Suppliers Require certification from suppliers (e.g., ISO 9000) and monitor supplier performance. Threat 10: Purchasing from Unauthorized Suppliers Purchasing from unauthorized suppliers can result in numerous problems. Items may be of inferior quality or overpriced. Controls: Review of purchase orders; restriction of access to supplier list; periodic review of supplier list; and coordination with procurement card providers to restrict acceptance of cards Threat 11: Kickbacks Kickbacks are gifts from suppliers to purchasing agents for the purpose of influencing their choice of suppliers. Controls: “No gift” policy for buyers; employee training on gift handling; job rotation and mandatory vacation; audits of buyers; review of conflict of interest statements; vendor audits EDI-Related Threats Controls: Restriction of EDI access; verification and authentication of EDI transactions; acknowledgment of EDI transactions; log and review EDI of transactions; encryption; digital signatures; EDI agreements with suppliers Types of issues that occur when suppliers are linked to the company’s POS system to automatically manage inventory: 1. At what point in the process can the order be canceled? 2. Which party is responsible for the cost of return freight if contract terms are not followed? 3. Which party is responsible for errors in bar codes, RFID tags, and labels? 15-8 .
4. What happens if errors in the purchasing company’s POS system cause additional errors in the amount of goods that suppliers provide? 5. Can suppliers ship more inventory than ordered if doing so reduces total freight costs by having a full, rather than partial, truckload? Purchases of Services Controls: Hold supervisors accountable for costs; compare actual to budgeted expenses; review and audit contracts for services Multiple Choice 2 The approach to managing inventory that is based on forecasted sales to schedule production is: a. IBM b. EOQ c. MRP d. JIT Multiple Choice 3 Crucial operating decisions when selecting suppliers for inventory items includes: a. price b. quality of materials c. dependability of making decisions d. all of the above Multiple Choice 4 The document used to request that an item be ordered is the: a. purchase order b. purchase requisition c. purchase advice d. purchase auction Multiple Choice 5 The major cost driver in the purchasing function is: a. the number of purchase orders processed b. the price of the items purchased c. the reputation of the supplier d. none of the above.
15-9 .
Learning Objective Three Explain the process and key decisions involved in receiving goods and services, identify the threats to those activities, and describe the controls that can mitigate those threats.
Receiving and Storing Goods The receiving department accepts deliveries from suppliers. The receiving department normally reports to the warehouse manager, who reports to vice president of manufacturing. The inventory stores department, which also reports to the warehouse manager, is responsible for the storage of the goods. The receipt of goods must be communicated to the inventory control function to update inventory records. The two major responsibilities of the receiving department are deciding whether to accept delivery (based on whether there is a valid purchase order) and verifying the quantity and quality of delivered goods. Verifying the quantity of delivered goods is important so the company pays only for goods received and inventory records are updated accurately. The receiving report is the primary document used in this process. The receiving report includes the date received, shipper, supplier, and purchase order number. For each item received, it shows the item number, description, unit of measure, and quantity. It also provides space for signature and comments by the person who receives and inspects the goods. A receiving report is not typically used for receipt of services. Receipt of services is typically documented by supervisory approval of the supplier’s invoice. When goods arrive, a receiving clerk compares the PO number on the packing slip with the open PO file to verify the goods were ordered. The receiving clerk counts the goods and examines them for damage before routing to the warehouse or factory. Three possible exceptions to this process are: 1. Receiving a quantity of goods different from the amount ordered. 2. Receiving damaged goods. 3. Receiving goods of inferior quality that fail inspection. In all three cases, the purchasing department must resolve the situation with the supplier. 15-10 .
In the case of damaged or poor quality goods, a debit memo is prepared after the supplier agrees to take back the goods or grant a price reduction. Improve Efficiency and Effectiveness One way to improve the efficiency of the receiving process is to require suppliers to bar code their products. Bar-coding enables receiving clerks to scan in the product number, description, and quantity of all items received, eliminating data errors. Radio frequency identification (RFID) tags are attached to each crate of goods and emit a signal that a receiving unit embedded in the gates near a company’s warehouse unit can read. EDI and satellite technology provide another way to improve the efficiency of inbound logistics. EDI advance shipping notices inform companies when products have been shipped. Finally, audits may identify opportunities to cut freight costs. For example, many companies have negotiated significant savings with specific carriers. Focus 15-1 on page 509 describes supplier audits as a tool for assessing expenditure cycle effectiveness.
Receive and Store Goods The primary objectives of this process are to verify the receipt of ordered inventory and safeguard the inventory against loss or theft. Threat 12: Receiving Unordered Goods Controls: Accept goods only when there is an approved purchase order Threat 13: Mistakes in Counting Received Goods Controls: Bar coding of ordered goods; quantities blanked out on receiving forms; signature of receiving clerks; bonuses for catching discrepancies; re-counting of items by inventory control Threat 14: Verify Receipt of Services Controls: Budgetary controls, audits Threat 15: Stealing Inventory Controls: Secure storage locations for inventory; documentation of intra-company transfers; periodic physical counts; segregation of duties Multiple Choice 6 15-11 .
A receiving report is typically not used for: a. low cost supply items b. items ordered on blanket purchase orders c. receipt of services d. reoccurring items
Learning Objective Four Explain the process and key decisions involved in approving supplier invoices, identify the threats to those activities, and describe the controls that can mitigate those threats.
Approve Vendor Invoices for Payment Approval of vendor invoices is done by the accounts payable department, which reports to the controller. The legal obligation to pay arises when goods are received; but most companies pay only after receiving and approving the invoice. This timing difference may necessitate adjusting entries at the end of a fiscal period. The objective of accounts payable is to authorize payment only for goods and services that were ordered and actually received. This requires information from purchasing about the existence of a valid purchase order and from receiving for a report that goods were received. There are two basic approaches to processing vendor invoices: 1. Non-voucher system—Each approved invoice is posted in the supplier’s records in accounts payable, filed, and is then stored in an open invoice file. When a check is written, the invoice is removed from the open invoice file, marked “paid” and then stored in a paid invoice file. Marking “paid” on the invoice is an act known as “cancelling the invoice” so the invoice cannot be paid twice. 2. Voucher system—A disbursement voucher is also prepared which identifies the supplier, lists outstanding invoices, and net amount to be paid after discounts and allowances. The disbursement voucher effectively shows which accounts will be debited and credited, along with the account numbers. There are three advantages for using disbursement vouchers: 1. Several invoices may be paid at once (reducing number of checks). 2. Vouchers can be prenumbered, which simplifies tracking all payables. 15-12 .
3. The voucher provides a record that a vendor invoice has been approved for payment and facilitates invoice approval separate from invoice payment. This makes it easier to schedule both activities to maximize efficiency. Accounting approves the invoice for payment by comparing the invoice to the purchase order and receiving report. A voucher package, which contains the approved invoice, supporting purchase order, and receiving report, is sent to the cashier. This voucher package authorizes issuance of a check or EFT to the supplier. Pay Approved Invoices The final activity in the expenditure cycle is the payment of approved invoices. The cashier reviews the voucher package, approves the payment, prepares the check for payment, and signs the check.
Improving Efficiency and Effectiveness The accounts payable process, which matches vendor invoices to purchase orders and receiving reports, is a prime candidate for automation. Processing efficiency can be improved by: Requiring suppliers to submit invoices by EDI and having the system automatically match invoices to purchase orders and receiving reports. Another option is to eliminate vendor invoices. This “invoiceless” approach is called evaluated receipt settlement (ERS). ERS replaces the traditional three-way matching process with a two-way match of the purchase order and receiving report. Procurement cards provide one way to eliminate the need for accounts payable to process many small noninventory invoices. A procurement card is a corporation credit card that employees can use only at designated suppliers to purchase specific kinds of items. Using corporate credit cards for travel expenses further reduces the number of invoices that need to be processed. Preparing careful short-term cash budgets is useful in taking advantage of early-payment discounts. For example, if the corporation purchased an item for $100,000 with the terms 2/10, n/30; the amount of the discount that could be realized by paying within 10 days is $2,000. Even more important, if the corporation did not pay within the ten days, the 2% discount represents an annual interest rate of 18% (2% × 360/20). Finally, financial data electronic interchange (FEDI) can cut the costs associated with paying suppliers by eliminating the need to prepare and mail checks.
15-13 .
Focus 15-2 on page 513 shows dramatic improvements can often be made simply by reengineering the accounts payable and cash disbursements processes. Medtronic had successfully used both Six Sigma and Lean principles to streamline its work-flow activities and improve product quality. Six Sigma is a philosophy that focuses on improving quality by reducing mistakes. Lean analysis seeks to improve efficiency by eliminating bottlenecks and redundancies. Medtronic initiated a series of intensive 5-day projects, called kaizen, to apply Six Sigma and Lean principles to improve accounts payable. Medtronic’s application of process improvement techniques yielded a dramatic improvement in the efficiency and effectiveness of its accounts payable function: 1. The time required to open the mail, sort, process, and record vendor invoices dropped from 3 days to 1 day. 2. The number of invoices for which discounts for prompt payment were taken increased by 15%. 3. Payment processing times were cut by 50%. Threat 16: Failing to Catch Errors in Vendors’ Invoices Controls: Check mathematical accuracy; verify procurement card charges; adopt ERS; train staff on freight terminology; use common carrier to take advantage of discounts Threat 17: Mistakes in Posting to Accounts Payable Controls: Reconciliations and data entry controls Multiple Choice 8 Which of the following statements is FALSE? a. Kickbacks are the most expensive form of employee corruption. b. RFID technology is more efficient than bar codes. c. The Bureau of Industry and Security maintains lists of individuals and companies with whom it is illegal to transact business. d. Competitive written bids should be solicited for high-cost and specialized products. e. All of the above. Multiple Choice 9
15-14 .
The following is (are) a red flag(s) that would identify suppliers likely to represent potential problems: a. The supplier’s address is on the invoices. b. Entertainment expenses are high in terms of a percentage of the supplier’s gross sales. c. A large percentage of the supplier’s gross sales were to one company. d. a and b e. b and c
Learning Objective Five Explain the process and key decisions involved in making cash disbursements to suppliers, identify the threats to those activities, and describe the controls that can mitigate those threats.
Cash Disbursements This is the final activity of the expenditure cycle. The cashier, who reports to the treasurer, is responsible for paying suppliers. This segregates the custodial function from the authorization and recording functions. Expenditures should be made by check or EFT. If minor purchases are paid for by cash, a petty cash fund is set up as an imprest fund. An imprest fund is a cash account with two characteristics: 1. 2.
It is set at a fixed amount. Vouchers are required for every disbursement.
At all times, the sum of cash plus vouchers should equal the preset fund balance. Threat 18: Failing to Take Available Purchase Discounts Controls: File and track invoices by due date; prepare cash flow budgets Threat 19: Paying for Goods not Received Controls: Compare invoice quantities to quantities reported by receiving and inventory control; use tight budgetary controls. Use of corporate credit cards for travel expenses. Requiring receipts for travel expenses Threat 20: Paying the Same Invoice Twice Controls: Approve invoices only with complete voucher package; pay only on original invoices; cancel invoices once paid; use 15-15 .
internal audit to detect and recover overpayments; control access to accounts payable master file Threat 21: Misappropriation of Cash, Checks, or EFT Controls: Restrict access to cash, checks, and check signing machines; use sequentially numbered checks and reconcile; segregate duties; two signatures on checks over a certain limit; restrict access to supplier list; cancel all documents; have independent bank reconciliation; use check protection measures or positive pay; provide strict logical and access controls for EFT; log, encrypt, stamp, and number all EFT transactions; monitor EFT transactions; and use embedded audit modules Threat 22: Check Alteration Controls: Check-protection machines, use of special inks and papers, “positive pay” arrangements with banks Threat 23: Cash Flow Problems Controls: Cash flow budget Multiple Choice 10 Imprest funds are used to make minor purchases with cash, the total sum of cash and _______________ should equal the preset fund balance. a. checks b. vouchers c. coins d. notes
Answer to Multiple Choice Questions: Multiple Choice Question Answers Number Answer Number Answer 1 B 6 C 2 C 7 E 3 D 8 E 4 B 9 B 5 A 10 B
15-16 .
CHAPTER 16 THE PRODUCTION CYCLE Instructor’s Manual Learning Objectives: 1. Describe the major business activities and key decisions that must be made in the production cycle, the threats to accomplishing production cycle objectives, and the controls that can mitigate those threats. 2. Explain the key decisions and information needs in product design, the threats to those activities, and the controls that can mitigate those threats. 3. Explain the key decisions and information needs in planning and scheduling production, the threats to those activities, and the controls that can mitigate those threats. 4. Explain the key decisions and information needs in production operations, the threats to those activities, and the controls that can mitigate those threats. 5. Explain the key decisions and information needs for accurate cost accounting, threats to those activities, and the controls that can mitigate those threats.
Introduction The production cycle is a recurring set of business activities and related information processing operations associated with the manufacture of products. Figure 16-1 on page 534 shows how the production cycle is linked to the other subsystems in a company’s AIS. A company’s AIS plays a vital role in the production cycle. Accurate and timely cost accounting information is essential input to decisions about the following: 1. Product mix (what to produce). 2. Product pricing. 3. Resource allocation and planning (e.g., whether to make or buy a product, relative profitability of different products). 4. Cost management (planning and controlling manufacturing costs, evaluating performance). This chapter examines the three major functions of the AIS in the production cycle: 1. Capturing and processing data about business activities.
16-1 .
2. Storing and organizing the data to support decision making. 3. Providing controls to ensure the reliability of data and the safeguarding of organizational resources.
Learning Objective One Describe the major business activities and key decisions that must be made in the production cycle, the threats to accomplishing production cycle objectives, and the controls that can mitigate those threats.
Production Cycle Activities Figure 16-2 on page 534 shows the four basic activities in the production cycle: 1. Product design 2. Planning and scheduling 3. Production operations 4. Cost accounting Figure 16-2 also depicts the principal information flows between each of those activities and the other AIS cycles. One popular approach to improving manufacturing performance, called Six Sigma, begins with careful measurement and analysis of current processes in order to find ways to improve them.
Control Objectives, Threats, and Procedures A second function of a well-designed AIS is to provide adequate controls to meet the following production cycle objectives: 1. All production activities and fixed asset acquisitions are properly authorized. 2. Work-in-process inventories and fixed assets are safeguarded. 3. All valid, authorized production cycle transactions are recorded. 4. All production cycle transactions are recorded accurately. 5. Accurate records are maintained and protected from loss.
16-2 .
6. Production cycle activities are performed efficiently and effectively. Wherever feasible, use of RFID tags or bar codes can further improve data entry accuracy. Table 16-1 on page 537 Lists the major threats and exposures in the production cycle and the additional control procedures, besides adequate documents, and records.
General Threats Threat 1-3: Loss, Alteration, or Unauthorized Disclosure of Data Loss or alteration of production data hinders the monitoring of inventory and fixed assets and makes it difficult to ensure that manufacturing activities are being performed efficiently and effectively. Inventory and work-in-process records must be protected from both intentional and accidental losses or damages. Regular back-up of all data files is important. Access controls are also necessary to protect production data because of the potential losses of production trade secrets. Unauthorized access also increases the risk of damage to important data files. Passwords and user IDs can limit access to sensitive files. It is important to enforce proper access controls and segregation of duties which requires the controller or CFO to review and suggest appropriate configuration of user rights in integrated AIS packages and ERP systems. Access and processing integrity controls are also needed to ensure the confidentiality and accuracy of production cycle data transmissions among different factories. Multiple Choice 1 The following are the basic activities in the production cycle: 1. production operations 2. product design 3. cost accounting 4. planning and scheduling Which of the following is the correct sequence of the basic activities? a. 2, 3, 1, 4 b. 2, 1, 4, 3 c. 2, 4, 1, 3 d. 2, 1, 3, 4
16-3 .
Learning Objective Two Explain the key decisions and information needs in product design, the threats to those activities, and the controls that can mitigate those threats.
Product Design The first step in the production cycle is product design (circle 1.0 in Figure 16-2). The objective of this activity is to design a product that meets customer requirements in terms of quality, durability, and functionality while minimizing production costs. Focus 16-1 on page 538 explains how simulation software is constantly improving the efficiency and effectiveness of product design. Product life-cycle management (PLM) software consists of three key components: 1. Computer-aided design (CAD) software to design new products. 2. Digital manufacturing software that simulates how those products will be manufactured. 3. Product data management software that stores all the data associated with products. GM estimates that it costs approximately $500,000 to run crash tests with real cars and hopes that CAD software can reduce the number of such tests by 85 percent. However, Airbus learned that the PLM software has pitfalls. In 2006, it announced that production of the A380 superjumbo airliner would be delayed by at least two years, costing Airbus approximately $6 billion in lost profits. The problem was using different versions of the same CAD software. A survey found that almost 50% of companies using CAD software had to redesign products because of incompatibilities between CAD software used by different design teams.
16-4 .
Key Documents and Forms The product design activity creates two main documents: 1. Bill of materials which specifies the part number, description, and quantity of each component used in a finished product. 2. An operations list, which specifies the sequence of steps to follow in making the product, which equipment to use, and how long each step should take. Role of the Accountant Accountants should participate in product design because 65 percent to 80 percent of product costs are determined at the product design stage. Production costs can be reduced by increasing the number of common components used for a line of related products. Accountants can add value if they not only design the AIS to measure and collect the relevant cost data, but also, if they help the design team to use that data proactively to improve profitability.
Threat 4: Poor Product Design Poor product design drives up costs in several ways to include using too many unique components and poorly designed products. Product design can be improved with accurate data about the relationship between components and finished goods. Multiple Choice 2 _____ percent to _____ percent of product costs are determined in the product design stage of the production process. a. 60; 80 b. 65; 80 c. 55; 70 d. 60; 70 Multiple Choice 3 Analysis of warranty and repair costs are a control for dealing with: a. disruption of operations b. poor product design c. excessive raw materials d. inaccurate cost data
16-5 .
Learning Objective Three Explain the key decisions and information needs in planning and scheduling, the threats to those activities, and the controls that can mitigate those threats.
Planning and Scheduling The second setup in the production cycle is planning and scheduling (circle 2.0 in Figure 16-2). Planning Methods Two common methods of production planning are management resource planning and lean manufacturing. Manufacturing resource planning (MRP-II) is an extension of materials requirements planning, covered in Chapter 15, that seeks to balance existing production capacity and raw material needs to meet forecasted sales demands. MRP-II systems are often referred to as push manufacturing, because goods are produced in expectation of customer demand. Lean manufacturing extends the principles of just-in-time systems to the entire production process. Lean manufacturing is often referred to as pull manufacturing, because goods are produced in response to customer demand. However, in practice, most lean manufacturing systems develop short-run production plans. Both MRP-II and lean manufacturing systems plan production in advance. MRP-II systems may develop production plans for up to 12 months in advance. Lean manufacturing systems use much shorter planning horizons. Key Documents and Forms The master production schedule (MPS) specifies how much of each product is to be produced during the planning period and when that production should occur (Refer to Figure 16-6 on page 540). The MPS is used to develop a detailed timetable that specifies daily production and to determine if raw materials need to be purchased. To do this, it is necessary to “explode” the bill of 16-6 .
materials to meet the production goals as listed in the MPS (see Table 16-2 on page 541). This figure shows that the planning and scheduling activity produces three other documents: 1. A production order which authorizes the manufacture of a specified quantity of a particular product. A sample of the production order is provided in Figure 16-7 on page 542. 2. A materials requisition authorizes the removal of the necessary quantity of raw materials from the storeroom to the factory location where they will be used. A sample of the materials requisition is provided in Figure 16-8 on page 542. 3. Subsequent transfers of raw materials throughout the factory are documented on move tickets, which identify the parts being transferred, the location to which they are transferred, and the time of transfer. A sample of the move ticket is provided in Figure 16-9 on page 543. Bar-coding improved the speed and accuracy of recording information about material movements and eliminating the need to manually enter data. More recently, radio-frequency identification (RFID) tags further improve efficiency by eliminating the need for any human intervention in the scanning process. This makes RFID scanners up to 40 times faster than bar-code scanners. Surveys estimate that as much as 10%–20% of handling materials in the warehouse is spent on looking for the right product. RFID technology can eliminate this cost. RFID tags have a scanner that broadcasts a signal to locate the desired product. Role of the Accountant The accountant must ensure that the AIS collects and reports costs in a manner consistent with the production planning techniques of the company. Lean manufacturing emphasizes working in teams and seeks to maximize the efficiency and synergy of all teams involved in making a particular product. Threat 5: Over- or Underproduction Two related threats in the planning and scheduling process are overproduction and underproduction. Overproduction can result in a supply of goods in excess of short-run demands, thereby creating potential cash flow problems. There is also a risk of carrying inventory items that become obsolete. Underproduction can result in lost sales and dissatisfied customers.
16-7 .
More accurate production planning can prevent over- and underproduction. Improvement requires accurate and current sales forecasts from the revenue cycle systems, and data about inventory stocks from the expenditure cycle. Proper approval and authorization of production orders is another control to prevent overproduction of specific items. Multiple Choice 4 A production planning method that is based on goods being produced based on customer demand is: a. pull manufacturing b. MRP-II c. push manufacturing d. lean manufacturing Multiple Choice 5 A _____ authorizes the removal of raw materials from the storeroom to the factory and a _____ documents the transfers of raw materials throughout the factory. a. materials requisition; moving ticket b. transfer voucher; moving ticket c. materials requisition; transfer voucher d. none of the above
Learning Objective Four Explain the key decisions and information needs in production operations, the threats to those activities, and the controls that can mitigate those threats.
Production Operations The third step in the production cycle is the actual manufacture of products (circle 3.0 in Figure 16-2). Using various forms of IT in the production process, such as robots and computer-controlled machinery, is referred to as computer-integrated manufacturing (CIM). Accountants are not required to be experts on every facet of CIM, but they must understand how it affects the AIS. In order to minimize inventory carrying costs, the AIS must maintain accurate perpetual inventory records. This requires integrating information about customer orders (from the revenue
16-8 .
cycle) with information about purchases from suppliers (from the expenditure cycle), along with information about labor available (from the HR/payroll cycle). Threats 6 and 7: Theft of Inventories and Fixed Assets To reduce the risk of inventory loss, physical access to inventories should be restricted and all internal movements of inventory should be documented. Proper segregation of duties is important to safeguard inventory. Maintaining physical custody of the raw materials and finished goods inventories is the responsibility of the inventory stores department. Department of factory supervisors have primary responsibility for workin-process inventories. Internal controls are also needed to safeguard fixed assets. Managers should be assigned responsibility and accountability for fixed assets under their control. Finally, inventories and fixed assets are also subject to loss due to fire or other disasters. Therefore, adequate insurance coverage should be maintained to cover such losses and provide for the replacement costs of these assets. Threat 8: Poor Performance Inefficiencies in production operations result in increased expenses. Thus, manufacturing activities must be closely monitored and prompt action taken to correct any deviations from standards. Threat 9: Suboptimal Investment in Fixed Assets Overinvesting in fixed assets can create excess costs and underinvestment can impair productivity. Both problems reduce profitability. Proper authorization of fixed-asset transactions is important. Holding managers accountable for their department’s return on the fixed assets provides additional incentive to control such expenditures. Due to the size of fixed-asset purchases, companies should invite several competing suppliers to provide bids. A document called a request for proposal (RFP), which specifies the desired properties of the asset, is sent to each vendor. Threat 10: Loss of Inventory or Fixed Assets Due to Fire or Other Disasters Insurance can mitigate this loss. Threat 11: Disruption of Operations The high level of automation in production cycle activities means that disasters that disrupt the functioning of information systems can also disrupt manufacturing activities. 16-9 .
Backup power sources and uninterruptible power supply devices are required to ensure that critical equipment and machinery are not damaged during a power loss. This will ensure that the production process can continue on schedule. Not only do companies need to have a disaster plan, but companies need to check on their supplier’s plan and come up with alternate sources for critical components. Multiple Choice 6 A form of IT that involves robots is: a. CIS b. MRP c. RFID d. CIM Multiple Choice 7 The formal request of a competitive bid for machinery and equipment from suppliers is a document called: a. RFP b. MRP c. CIM d. JIT
Learning Objective Five Explain the key decisions and information needs for accurate cost accounting, threats to those activities, and the controls that can mitigate those threats.
Cost Accounting The final step in the production cycle is cost accounting (circle 4.0 in Figure 16-2). The three principal objectives of the cost accounting system are: 1.
Provide information for planning, controlling, and evaluating the performance of production operations.
2.
Provide accurate cost data about products for use in pricing and product mix decisions.
16-10 .
3.
Collect and process the information used to calculate the inventory and cost of goods sold values that appear in the company’s financial statements.
Every firm requires cost accounting data about the following four facets of its production operations: 1. Raw materials used 2. Labor hours expended 3. Machine operations performed 4. Other manufacturing overhead costs incurred Types of Accounting Systems Most companies use either job-order or process costing to assign production costs. Job-order costing assigns costs to specific production batches, or jobs, and is used when the product or service being sold consists of discretely identifiable items. Process costing assigns costs to each process, or work center, in the production cycle, then calculates the average cost for all units produced.
Process Figure 16-10 on page 543 depicts a typical online AIS for the production cycle. Both systems require accumulating data about four basic kinds of costs: 1) raw materials, 2) direct labor, 3) machinery and equipment, and 4) manufacturing overhead.
Raw Materials Usage Data When production is initiated, the issuance of materials requisition triggers a debit to work-in-process for the raw materials sent to production, and a credit when raw materials are not used and returned to inventory. RFID tags improve the efficiency of tracking materials usage.
Direct Labor Costs As shown in Figure 16-10, a worker enters the data on time spent on each specific job task using online terminals at each factory workstation.
Machinery and Equipment Usage Companies implement CIM to automate the production process. 16-11 .
Data for machinery and equipment used at a workstation and the duration of such use is collected by wiring the factory so that each piece of equipment is linked to the computer. The wired connections are now being replaced with wireless technology. This enables the use of 3-D simulation software to evaluate the effects of modifying shop-floor layout and workflow to easily and quickly implement beneficial changes.
Manufacturing Overhead Costs Manufacturing costs that cannot be directly related to the production of a specific product is referred to as manufacturing overhead. Examples include factory costs of water, power, and other utilities; miscellaneous supplies; rent, insurance, and property taxes. Accountants can play a key role in controlling overhead costs by carefully assessing how changes in product mix affect total manufacturing overhead. Threat 12 Inaccurate Cost Data Diminishes the effectiveness of production scheduling and undermines management’s ability to monitor and control manufacturing operations. This threat is best controlled with using RFID technology, bar code scanners, badge readers, and other devices. Threat 13: Inappropriate Allocation of Overhead Costs Can lead to erroneous decisions, best mitigated by activity based costing. Threat 14: Misleading Reports Can lead to erroneous decisions, best mitigated by performance metrics. Activity-Based Costing refines a costing system by identifying individual activities as the fundamental cost objects. An activity is an event, task, or unit of work with a specified purpose such as designing products, setting up machines, operating machines, and distributing products. Note to Instructor: For the above definition, refer to page 170, Chapter 5, of the Prentice Hall Cost Accounting Textbook, 12th edition. Activity Based Costing versus Traditional Cost Systems
Following are three significant differences between ABC and traditional approaches to product costing: 1.
ABC systems attempt to directly trace a larger proportion of overhead costs to products. Advances in IT make this feasible.
16-12 .
2.
ABC systems use a greater number of cost pools to accumulate indirect costs (manufacturing overhead). Whereas most traditional cost systems lump all overhead costs together. ABC systems distinguish three separate categories of overhead:
3.
Batch-related overhead. Examples include setup costs, inspections, and materials handling.
Product-related overhead. These costs are related in the diversity of the company’s product line. Examples include research and development, expediting, shipping and receiving, environmental regulations, and purchasing.
Company-wide overhead. This category includes such costs as rent or property taxes. These costs apply to all products.
ABC systems attempt to rationalize the allocation of overhead to products by identifying cost drivers. A cost driver is anything that has a cause and effect relationship on costs. For example, the number of purchase orders processed is one cost driver of purchasing department costs.
Benefits of ABC Systems ABC systems cost more to run than traditional cost systems because they require the collection of more production-related data and in greater detail. They are also more complex. More accurate cost data results in better product mix and pricing decisions, and more detailed cost data to improve management’s ability to control and manage total costs. Better decisions. Traditional cost systems tend to apply too much overhead to some products and too little to others. This leads to two types of problems: 1. Companies may accept sales contracts for some products at prices below their true cost of production. Sales increase, but profits decline. 2. Companies may overprice other products. ABC systems avoid these problems. ABC also uses data to improve product design. Finally, ABC data improve managerial decision making by providing information about the costs associated with specific activities, instead of classifying those costs by financial statement category, which aids in managerial analysis by focusing attention on key processes. 16-13 .
The ABC analysis shows which activities (training, testing, and maintenance and system analysis) are running over budget and which are not. Improved cost management. Another advantage of ABC is that it clearly measures the results of managerial actions on overall profitability. ABC systems measure both the amount spent to acquire resources and the consumption of those resources. This distinction is reflected in the following formula: Cost of activity capability = Cost of activity used + Cost of unused capacity. To illustrate, consider the receiving function at a manufacturing firm such as AOE. Assume the following: 1. The salary expense for the receiving department is $100,000. 2. Receiving employees can handle 500 shipments. 3. The cost per shipment is $200. 4. Assume that 400 shipments are actually received. The cost of the receiving activity is $80,000 ($200 × 400 shipments). The remaining $20,000 ($100,000-$80,000) in salary expense represents the cost of unused capacity. Better Decisions CPAs have now added and supplemented the traditional financial statements with reports based on lean accounting. One suggested change involves assigning costs to product lines instead of departments. In addition to this change, accountants should also develop new measures that are designed to focus on issues important to production cycle managers. Throughput—A Measure of Production Effectiveness Throughput represents the number of good units produced in a given period of time. It consists of three factors as shown in the following formula: Throughput = (Total units produced/Processing time) × (Processing time/Total time) × (Good units/Total units) Productive capacity: The first term in the formula shows the maximum number of units that can be produced using current technology.
16-14 .
Productive processing time: The second term in the formula indicates the percentage of total production time used to manufacture the product. Yield: The third term in the formula represents the percentage of good units produced. Quality Control Measures Quality control costs can be divided into four areas: 1. Prevention costs are associated with changes to production processes designed to reduce the product defect rate. 2. Inspection costs are associated with testing to ensure that products meet quality standards. 3. Internal failure costs are associated with reworking, or scrapping, products identified as being defective prior to sale. 4. External failure costs result when defective products are sold to customers. They include such costs as product liability claims, warranty and repair expenses, loss of customer satisfaction, and damage to the company’s reputation. The ultimate objective of quality control is to “get it right the first time.” Some companies have found that the most important management decision involves switching from the traditional “management by exception” philosophy to a “continuous improvement” viewpoint.
Multiple Choice 8 The best control procedure to ensure that data entry is accurate is to automate date collection using: a. RFID technology b. badge readers c. ID cards d. a and b e. all of the above Multiple Choice 9 The number of goods produced in a given period of time is: a. processing b. production c. throughput d. productive processing Multiple Choice 10 The _____ overhead includes costs such as rent or property tax. a. batch-related 16-15 .
b. company-wide c. product-related d. none of the above
Answer to Multiple Choice Questions: Multiple Choice Question Answers Number Answer Number Answer 1 C 6 D 2 B 7 A 3 B 8 E 4 B 9 C 5 C 10 B
16-16 .
CHAPTER 17 THE HUMAN RESOURCES MANAGEMENT AND PAYROLL CYCLE Instructor’s Manual Learning Objectives: 1. Describe the major business activities, key decisions, and information needs in the HRM/payroll cycle, the general threats to those activities, and the controls that can mitigate those threats. 2. Explain the payroll cycle activities, key decisions and information needs, the threats to those activities, and the controls that can mitigate those threats. 3. Discuss and evaluate the options for outsourcing HRM/payroll cycle activities.
Learning Objective One Describe the major business, key decisions, and information needs in the HRM/payroll cycle, the general threats to those activities, and the controls that can mitigate those threats.
Introduction The human resources management (HRM)/payroll cycle is a recurring set of business activities and related data processing operations associated with effectively managing employee workforce. The more important tasks include: 1. Recruiting and hiring new employees 2. Training 3. Job assignment 4. Compensation (payroll) 5. Performance evaluation 6. Discharge of employees due to voluntary or involuntary termination Tasks 1 and 6 are performed once and tasks 2 through 5 are performed repeatedly. This chapter focuses primarily on the payroll system.
17-1 .
Overview The HRM provides information about hiring, termination, and pay-rate changes due to pay raises and promotions. The various departments provide data for the hours worked. The government provides the tax information and requirements. The principal output for the payroll cycle is checks. Although direct labor costs are a small portion of the total manufacturing costs, employees are a key cost driver when it comes to their performance which affects the quality of the products being manufactured. Some believe that the value of employees’ skills and knowledge is several times greater than the value of a company’s tangible assets. However, accounting and the AIS have not traditionally measured or reported this value of the employees. The only value of the employee has been the wage and salary expense for direct labor, which is included in the work-in-process inventory. Recognizing the value of employees’ knowledge and skills can help companies better understand the true costs associated with excessive turnover. Experts estimate that the cost of replacing employees is 1.5 times greater than that of an employee’s annual salary. For example, consider two companies with 1,500 employees earning on the average $50,000. One company has an employee turnover rate of 20% and the other only 8%. The company with the 20% rate would need to replace 300 employees each year (1,500 ˟ 20%). The company’s cost for each employee would be $75,000 ($50,000 ˟ 1.5). This would result in an annual cost of $22.5 million (300 employees ˟ $75,000) As for the company with the 8% turnover rate, they would only need to replace 120 employees; their annual cost would only be $9 million (75 employees ˟ $75,000). Employee morale is also important. A Gallup survey found that an employee’s attitude affects profitability. The survey found that there are four key attitudes: 1. Employees believe they have the opportunity to do what they do best.
17-2 .
2. They believe their opinions count. 3. They think that coworkers are committed to quality. 4. They understand the connection between their jobs and the company’s mission. Focus 17-1 on page 567 describes the value of understanding employee jobs and attitudes. Senior executives are now spending time in the trenches to better understand job duties and pressures. For example, the CEO of Loews Hotels spent time working as a bellman, pool attendant, and housekeeper. The vice president of DaVita Inc., spent three days working in one of the company’s clinics. Most important, these senior executives acted on their findings to improve working conditions. Figure 17-2 on page 565 provides the integration of Payroll and HRM functions in a typical ERP system.
Key Decisions and Information Needs The payroll system must be designed to collect and integrate cost data with other types of HR information to enable management to make the following kinds of decisions: 1. Future workforce staffing needs
How many employees are needed in the next five years to accomplish the organization’s strategic plans?
Which employees possess the needed skills?
Which skills are in short supply?
Which skills are in oversupply?
How effective are current training programs in maintaining and improving employee skill levels?
2. Employee performance
Which employees should be promoted or receive pay raises?
Who should be discharged?
Is overall performance improving or declining?
Is turnover excessive?
17-3 .
Is tardiness or absenteeism a problem?
3. Employee morale
What is the overall level of employee morale and job satisfaction?
How can the compensation scheme be used to improve morale, satisfaction, and performance?
What additional fringe benefits, if any, should be offered?
4. Payroll processing efficiency and effectiveness
How frequently should employees be paid?
Are labor costs being accurately allocated to products and other cost centers?
Are all applicable tax reporting requirements being met?
How easily can employee requests for information be answered?
Internally and externally generated information is needed to make these decisions. Access to current, accurate information about employee skills and knowledge can also provide an organization with strategic benefits. A second strategic benefit of an integrated HRM/payroll data model is that staff can perform many HRM activities more efficiently, thereby reducing costs. Online resumes are being used for hiring new employees. A well-designed HRM database also can be used to reduce recruiting costs. General Controls: A second major function of the AIS in the HRM/payroll cycle is to provide adequate internal controls to ensure meeting the following objectives: 1. All payroll transactions are properly authorized. 2. All recorded payroll transactions are valid. 3. All valid, authorized payroll transactions are recorded. 4. All payroll transactions are accurately recorded. 5. Applicable government regulations regarding remittance of taxes and filing of payroll and HRM reports are met. 6. Assets (both cash and data) are safeguarded from loss or theft.
17-4 .
7. HRM/payroll cycle activities are performed efficiently and effectively. Simple, easy-to-complete documents with clear instructions facilitate the accurate and efficient recording of payroll transactions. Appropriate application controls, such as validity checks and field (format) checks, further increase the accuracy of data entry when using electronic documents. Providing space on both paper and electronic documents to record who completed and who reviewed the form gives evidence that the transaction was properly authorized. Prenumbering all documents facilitates checking that all transactions have been recorded. Restricting access to programs that create documents and, if paper documents are still used, to blank documents, reduces the risk of unauthorized transactions. Table 17-1 on page 568 lists the major threats in the HRM/payroll cycle and the applicable control procedures.
Employment Practices The objective of the HRM function is to efficiently hire, develop, retain, and dismiss employees.
General Controls Threats 1-5 As for other disbursements, there are two general threats: 1) the loss, alteration, or unauthorized disclosure of data and 2) poor performance. Threat 1-3: Loss, Alteration, or Unauthorized Disclosure of Data Backup and disaster-recovery procedures provide the best controls for reducing the risk of payroll data loss. Physical and logical access controls are important preventive measures to mitigate this threat. Access and processing integrity controls are also needed to ensure the confidentiality and accuracy of payroll cycle data transmissions. Use of encryption and tokenization. Finally, protecting the privacy of employee data also is important. Threat 4: Hiring Unqualified or Larcenous Employees Hiring unqualified employees can increase production expenses, and hiring a larcenous employee can result in theft of assets. Skill qualifications for each open position should be stated explicitly in the position control report.
17-5 .
It is especially important to verify a job application’s skills and references, including college degrees earned, because research shows that approximately 30% of resumes contain false information. Background checks should also be conducted. Threat 5: Violation of Employment Laws The government imposes stiff penalties on firms that violate provisions of employment law. The best control procedure is careful documentation of all actions relating to advertising, recruiting, and hiring new employees and dismissal of employees. Continuing education on changes in employment laws provides organizations with knowledge of upcoming changes and how to handle them from a process and systems perspective. Multiple Choice 1 Tasks performed in the HRM/payroll cycle that are performed repeatedly (for as long as the employee works at the company) include: a. Training b. Recruiting c. Compensation d. A and C e. B and C Multiple Choice 2 Experts have determined that the cost of replacing employees is 1.5 times that of an employee’s annual salary. Company A and B both have 10,000 employees that earn $60,000 each on the average. Company A has an employee turnover rate of 3% and Company B has a 12% turnover rate. What is the difference between Company A’s and Company B’s annual employer turnover cost? a. $27,000,000 b. $54,000,000 c. $74,000,000 d. $81,000,000 Multiple Choice 3 The questions asked for the future workforce staffing needs decision includes: a. How many employees are needed in the next 5 years to accomplish the organization’s strategic plans? b. Which skills are in short supply? c. How effective are current training programs in maintaining and improving employee skill levels? d. All of the above e. A and B
17-6 .
Learning Objective Two Explain the payroll cycle activities, key decisions and information needs, the threats to those activities, and the controls that can mitigate those threats.
Payroll Cycle Activities Figure 17-4 on page 570 shows the five basic activities performed in the payroll cycle: 1. Update payroll master file. 2. Validate time and attendance data. 3. Prepare payroll. 4. Disburse payroll. 5. Disburse payroll taxes and miscellaneous deductions.
Update Payroll Master File Updating the payroll master file includes changes such as 1) new hires, 2) terminations, 3) changes in pay rates, and 4) changes in discretionary withholdings (circle 1.0 in Figure 17-4). It is important that all payroll changes are entered in a timely manner and are properly reflected in the next pay period.
Threat 6: Unauthorized Changes to the Payroll Master File Unauthorized changes to the payroll master file can result in increased expenses if wages, salaries, commission, or other base rates are falsified. Proper segregation of duties is the key control procedure for dealing with this threat. Only the HRM department should be able to update the payroll master file for hirings, firings, pay raises, and promotions. Controlling access to the payroll system is also important. The system should be programmed to compare user IDs and passwords with an access control matrix that: 1. Defines what actions each employee is allowed to perform
17-7 .
2. Confirms what files each employee is allowed to access Threat 7: Inaccurate Updating of Payroll Master Data Inaccuracies in time and attendance records can result in increased labor expenses and erroneous labor expense reports. Automation can reduce the risk of unintentional inaccuracies. The data entry program should include the following data processing integrity controls: 1. Field checks for numeric data in the employee-number and hours worked fields 2. Limit checks on the hours worked field 3. A validity check of the employee number Proper segregation of duties can reduce the risk of intentional accuracies. Time clock data, used for calculating payroll, also should be reconciled to the job time ticket data.
Validate Time and Attendance Data This validation is shown in circle 2.0 in Figure 17-4. Pay Schemes Most employees are paid either on a fixed salary or on an hourly basis (wages). For those paid on an hourly basis, many companies use a time card which is used to record the hours worked. The time card also includes the total hours worked for a pay period. Employees who earn a fixed salary seldom record their labor efforts on a time card. Instead, their supervisors monitor their presence on the job. Sales staff often are paid either on a straight commission or on a salary plus commission basis. Nucor Corporation, a large steel company, pays its steelworkers an hourly rate at approximately 60% of the industrial average, plus a bonus based on the tons of steel (tonnage) they produce. It is important that incentive schemes such as the example with Nucor Corporation, require linking the payroll system with other information generated from the organization such as sales, production, etc. Efficiency Opportunities Using Information Technology
17-8 .
Payroll processing can be made more efficient by collecting employee time and attendance data electronically instead of on paper documents. Those data are then automatically fed to the payroll processing system. Also, electronic time clocks can transmit time and attendance data directly to the payroll processing system. Threat 8: Inaccurate Time and Attendance Data Automating source data to capture hours worked can prevent errors. Segregation of duties and reconciliation of job-time tickets to the time cards. Supervisory review can catch errors.
Prepare Payroll The third step in the payroll cycle is preparing payroll (circle 3.0 in Figure 17-4). Procedures 1. The payroll transaction file is sorted by employee number. 2. The sorted time-data file is then used to prepare employee paychecks. 3. Next, all payroll deductions are summed and the total is subtracted from gross pay to obtain net pay. 4. Once net pay is obtained, the year-to-date fields for gross pay, deductions, and net pay in the payroll master file are updated. 5. Finally, the payroll register and employee paychecks are printed. The payroll register is a report that lists each employee’s gross pay, payroll deductions, and net pay. Note that the employees who worked in excess of 40 hours received overtime pay of 1.5 times the hourly rate. As a result, you cannot multiply the “hours” times the “pay rate” to get the “gross pay.” Sometimes the payroll register is accompanied by a deduction register which lists the miscellaneous voluntary deductions for each employee. Figure 17-8 on page 575 provides an example of both reports. Employee paychecks also typically include an earnings statement, which lists the amount of gross pay, deductions, and net pay for the current period and year-to-date totals.
17-9 .
Table 17-2 on page 576 describes some of the additional reports produced by the payroll system; especially for government agencies. Figure 17-9 on page 576 shows that most payroll and HRM software provides extensive support for meeting the reporting requirements of federal, state, and local governments. Threat 9: Inaccurate Processing of Payroll The complexity of payroll processing makes it susceptible to errors. Processing errors can lead to penalties if the errors result in failure to remit the proper amount of payroll taxes due the government. Three types of control procedures address the threat of payroll errors: 1. Batch totals should be calculated at the time of data entry and then checked against comparable totals calculated during each stage of processing. Hash totals of employee numbers are particularly useful. If the original and subsequent hash totals of employee numbers agree, it means that:
All payroll records have been processed.
Data input was accurate.
No bogus time cards were entered during processing.
2. Cross-footing the payroll register 3. A payroll clearing account The payroll clearing account is a general ledger account that is used in a two-step process to check the accuracy and completeness of recording payroll costs and their subsequent allocation to appropriate cost centers. The recordings for each pay period include: Debit to payroll account Credit to deductions payable Credit to cash for net pay Then when direct and indirect labor is used in manufacturing the recording is: Debit to work-in-process for direct labor Debit to manufacturing overhead for indirect labor Credit to payroll account The amount credited to the payroll account should be equal to the initial debit to the payroll account. This internal check is called a zero-balance check.
17-10 .
Companies hire temporary employees or outside help to get around a hiring freeze. The IRS provides a checklist of questions that can be used to determine if a worker should be classified as an employee or an independent contractor.
Disburse Payroll The next step is actual disbursement of paychecks to employees (circle 4.0 in Figure 17-4). Most employees are paid by either check or direct deposit. Procedures The following procedures are followed: 1. Once paychecks have been prepared, the payroll register is sent to the accounts payable department for review and approval. 2. A disbursement voucher is then prepared to authorize the transfer of funds from the company’s general checking account to its payroll bank account. 3. The disbursement voucher and payroll register are then sent to the cashier. 4. The cashier reviews the payroll register and disbursement voucher and then prepares and signs a check transferring funds to the company’s payroll bank account. The cashier also reviews, signs, and distributes the employee paychecks. 5. The payroll register is then returned to the payroll department. Efficiency Opportunity: Direct Deposit Direct deposit is one way to improve the efficiency and reduce the costs of payroll processing. Direct deposit provides savings to employers by eliminating the cost of purchasing, processing, and distributing paper checks, not to mention reducing bank fees and postage.
Disburse Payroll Taxes and Miscellaneous Deductions The final activity in the payroll process is paying the payroll tax liabilities and the other voluntary deductions of each employee (circle 5.0 in Figure 17-4). Companies either prepare checks or use electronic funds transfer to pay the taxes and deductions.
17-11 .
The employer pays some payroll taxes and employee benefits directly. The IRS Circular E, Employer’s Tax Guide, provides detailed instructions about employer’s obligations for withholding and remitting payroll taxes, and for filing reports. Employers often contribute some or all of the amounts to pay for their employee’s health, disability, and life insurance. Many employers also offer their employees flexible benefit plans, under which the employee receives some minimum coverage in medical insurance and pension contributions. Threat 10: Theft or Fraudulent Distribution of Paychecks Another major threat is the theft of paychecks or the issuance of paychecks to fictitious or terminated employees. The controls related to other cash disbursements, discussed in Chapter 11, also apply to payroll: 1. Access to blank payroll checks and to the check signature machine should be restricted. 2. All payroll checks should be sequentially prenumbered and periodically accounted for. 3. The cashier should sign all payroll checks only when supported by proper documentation (the payroll register and disbursement voucher). 4. Someone independent of the payroll process should reconcile the payroll bank account. A separate payroll bank account provides additional protection against forgery or alteration. It is also important that someone who does not authorize or record payroll should distribute paychecks and control the transfer of funds for direct deposit. Special procedures should be used to handle unclaimed paychecks because they indicate the possibility of a problem, such as a nonexistent or terminated employee. Multiple Choice 4 The third step in the payroll cycle is: a. validating time and attendance data b. updating the payroll master file c. prepare payroll d. calculating employer paid benefits and taxes Multiple Choice 5 Miscellaneous and voluntary payments on behalf of each employee from payroll is: a. payroll register 17-12 .
b. deduction register c. earnings statement d. payroll tax register Multiple Choice 6 The report that lists each employee’s gross pay, payroll deductions, and net pay is the: a. payroll voucher b. payroll register c. deduction register d. payroll transactions Multiple Choice 7 Which data processing integrity controls can mitigate payroll errors? a. Payroll clearing account b. Hash totals of employee numbers c. Cross-footing payroll register d. None of the above e. All of the above Multiple Choice 8 What control mitigates the threat of theft or fraudulent distribution of paychecks? a. Data processing integrity controls b. Prenumbering all paychecks c. Restricting access to blank payroll checks and the check signing machine d. Training Multiple Choice 9 The _____ is used to check numeric data and the _____ is used to check the hours-worked field. a. field check; validity check b. limit check; field check c. field check; limit check d. validity check; field check
Learning Objective Three Discuss and evaluate the options for outsourcing HRM/payroll cycle activities.
Outsourcing Options: Payroll Service Bureaus and Professional Employer Organizations (PEOs)
17-13 .
In an effort to reduce costs, many organizations are outsourcing their payroll and HRM functions. A payroll service bureau maintains the payroll master file for each of its clients and performs the payroll processing activities. A PEO not only processes payroll but also provides HRM services such as employee benefit design and administration. When organizations outsource payroll processing, they send time and attendance data along with information about personnel changes to the payroll service bureau or PEO at the end of each pay period. Payroll service bureaus and PEOs are especially attractive to small and midsize businesses for the following reasons: 1. Reduced costs 2. Wider range of benefits 3. Freeing up of computer resources Multiple Choice 10 Benefits of outsourcing payroll and HRM functions include: a. Allows small companies to provide benefits similar to large companies b. Reduces costs c. Companies can focus their resources on improving services related to their business d. None of the above e. All of the above
Answer to Multiple Choice Questions: Multiple Choice Question Answers Number Answer Number Answer 1 D 6 B 2 D 7 E 3 D 8 C 4 C 9 B 5 B 10 E
17-14 .
CHAPTER 18 GENERAL LEDGER AND REPORTING SYSTEMS Instructor’s Manual Learning Objectives: 1. Describe the activities, information needs, and key decisions made in the general ledger and reporting system, explain the general threats in the cycle, and describe the controls that can be used to mitigate those threats. 2. Explain the process for updating the general ledger, the threats to that process, and the controls that can be used to mitigate those threats. 3. Explain the purpose and nature of posting adjusting entries, the threats to that process, and the controls that can be used to mitigate those threats. 4. Explain the process of preparing financial statements, the threats to that process, the controls that can be used to mitigate those threats, and how IT developments such as XBRL can improve the efficiency and effectiveness of preparing financial statements. 5. Describe the process for producing various managerial reports, the threats to that process, and how tools like responsibility accounting and the balanced scorecard can help mitigate those threats.
Introduction This chapter discusses the information processing operations involved in updating the general ledger and preparing reports that summarize the results of an organization’s activities. Figure 18-1 on page 594 provides a context diagram of the general ledger and reporting system. One of the primary functions of the general ledger and reporting system is to collect and organize data from the following sources: 1. Each of the accounting cycle subsystems described in Chapters 14 through 17 provides information about regular transactions. 2. The treasurer provides information about financing and investing activities, such as the issuance or retirement of debt and equity instruments and the purchase or sale of investment securities. 3. The budget department provides budget numbers. 4. The controller provides adjusting entries.
18-1 .
The general ledger and reporting system must be designed to produce regular periodic reports and to support real-time inquiry needs.
Learning Objective One Describe the activities, information needs, and key decisions made in the general ledger and reporting system, explain the general threats in the cycle, and describe the controls that can be used to mitigate those threats.
General Ledger and Reporting System Activities Figure 18-2 on page 594 is a level 0 data flow diagram depicting the four basic activities performed by the general ledger and reporting system. Circle 1.0 Update general ledger Circle 2.0 Post adjusting entries Circle 3.0 Prepare financial statements Circle 4.0 Produce managerial reports Figure 18-3 on page 595 depicts a typical online system used to perform these activities. The first three activities in Figure 18-2 (Circles 1.0, 2.0, and 3.0) represent the basic steps in the accounting cycle, culminating in the production of the traditional set of financial statements. The control objectives in the general ledger and reporting system are similar to those in the other AIS cycles discussed in previous chapters. 1. All updates to the general ledger are properly authorized. 2. All recorded general ledger transactions are valid. 3. All valid, authorized general ledger transactions are recorded. 4. All general ledger transactions are accurately recorded. 5. General ledger data are safeguarded from loss or theft. 6. General ledger system activities are performed efficiently and effectively. Table 18-1 on page 596 lists the major threats and exposures in the general ledger and financial reporting system, along with applicable control procedures.
18-2 .
Threat 1: Inaccurate or invalid general ledger data Mitigation of this threat is through the use of data processing and integrity controls when posting journal entries. Restrict access to the general ledger, and a detective control is to review all changes to general ledger data. Threat 2: Unauthorized disclosure of financial statement This threat can occur when financial statements are prematurely released. Access controls (i.e. use of multifactor authentication and physical security) restrict access to the general ledger. Encrypting the database also provides additional protection. Threat 3: Loss or destruction of data Employ backup and disaster recovery procedures. Multiple Choice 1 The third basic activity in the accounting system which produces financial statements is: a. post adjusting entries b. prepare financial statements c. update general ledger d. produce managerial reports Multiple Choice 2 To minimize the risk of an unscrupulous manager that can conceal theft of assets or poor performance by altering information in the general ledger. Which of the following statement(s) is TRUE? a. Employ read-only privileges to portions of the system necessary to perform assigned duties. b. Employ an access control matrix designed to limit the functions that can be performed by users. c. Review all changes made to the general ledger data. d. All of the above are true.
Learning Objective Two Explain the process for updating the general ledger, the threats to that process, and the controls that can be used to mitigate those threats.
Update General Ledger Updating consists of posting journal entries that originate from two sources: 1. Accounting subsystems 18-3 .
Each of the accounting subsystems described in Chapters 14 through 17 creates a journal entry to update the general ledger. 2. Treasurer The treasurer’s office creates individual journal entries to update the general ledger for nonroutine transactions such as issuance or retirement of debt. Journal entries to update the general ledger may be documented on a form called a journal voucher. Figure 18-3 shows that the individual journal entries used to update the general ledger are then stored in the journal voucher file. Threats and controls Threat 4: Inaccurate Updating of General Ledger Errors made in updating the general ledger and poorly designed reports can lead to poor decision making and impair the quality of the decisions made. The controls for this threat fall into three categories: 1. Input edit and processing controls 2. Reconciliations and control reports 3. Maintenance of an adequate audit trail
Input Edit and Processing Controls The journal entries from the other AIS cycles comes from the output of a series of processing steps, which are subject to a variety of application control procedures. The journal entries made by the treasurer and controller are original data entry which needs input edit and processing controls. 1. A validity check to ensure that general ledger accounts exist for each account number referenced in a journal entry. 2. Field (format) checks to ensure that the amount field in the journal entry contains only numeric data. 3. Zero-balance checks to verify that total debits equal total credits in a journal entry. 4. A completeness test to ensure that all pertinent data are entered, especially the source of the journal entry.
18-4 .
5. Closed-loop verification matching account numbers with account descriptions to ensure that the correct general ledger account is being accessed.
6. A sign check of the general ledger account balance, once updating is completed. 7. Calculating run-to-run totals to verify the accuracy of journal voucher batch processing.
Reconciliation and Control Report Reconciliations and control reports can detect whether any errors were made during the updating of the general ledger. Another form of reconciliation is the trial balance which detects whether total debit balances in the general ledger are equal to total credit balances. Clearing and suspense accounts provide a means to ensure that the general ledger is always in balance. To illustrate, assume that one clerk is responsible for recording the release of inventory to customers and the other is responsible for recording the billing of customers. The journal entry made by the inventory clerk would be: Debit “Unbilled shipments” Credit “Inventory”
XXX XXX
The journal entry made by the billing clerk would be: Debit “Accounts receivable” XXX Credit “Unbilled shipments”
XXX
After both entries have been made, the special clearing account, unbilled shipments, should have a balance of zero. Another important reconciliation is comparing the general ledger control account balance to the total balance in the corresponding subsidiary ledger. Enterprise resource planning (ERP) systems provide a number of control reports to help identify the source of errors that occurred. 1. Listing journal vouchers by general account number helps identify the source of any errors affecting a specific general ledger account. 2. Listing the journal vouchers by sequence can indicate the absence of any journal entry postings. 3. The general journal listing shows the details, description, and amount debited or credited of each entry posted to the 18-5 .
general ledger. This report indicates whether total debits are equal to total credits.
The Audit Trail The audit trail depicts the path of a transaction through the accounting system. An audit trail facilitates the following tasks: 1. Tracing any transaction from the original source document to the journal entry that updated the general ledger and to any report or other document using that data. 2. Tracing any items appearing in a report back through the general ledger to its original source documents. The journal voucher file provides information about the source of all entries made to update the general ledger. The usefulness of the audit trail depends on its integrity. Therefore, it is important to periodically make backups of all audit trail components and to control access to them. Multiple Choice 3 The act of tracing any transaction from its original source document (whether paper or electronic) to the journal entry that updated the general ledger and to any report or other document using that data: a. Provides a means to verify that all transactions are recorded correctly b. Provides a means to verify that all transactions were authorized c. Provides a means to verify that all authorized transactions were recorded correctly d. All of the above Multiple Choice 4 A report that lists the balances for all general ledger accounts is called: 1. Balance Sheet 2. Trial Balance 3. Audit Trail 4. Journal entry control report
Learning Objective Three Explain the purpose and nature of posting adjusting entries, the threats to that process, and the controls that can be used to mitigate those threats.
18-6 .
Post Adjusting Entries These adjusting entries originate from the controller’s office. The trial balance is a report that lists the balances for all general ledger accounts. Adjusting entries fall into five basic categories: 1. Accruals represent entries made at the end of the accounting period to reflect events that have occurred but for which cash has not yet been received or disbursed. 2. Deferrals represent entries made at the end of the accounting period to reflect the exchange of cash prior to performance of the related event. 3. Estimates represent entries that reflect a portion of expenses that occur over a number of accounting periods. 4. Revaluations represent entries made to reflect either differences between the actual and recorded value of an asset or a change in accounting principle. 5. Corrections represent entries made to counteract the effects of errors found in the general ledger. Information about these adjusting entries is also stored in the journal voucher file.
Threats and Controls Threat 6: Inaccurate Adjusting Entries Data entry processing integrity controls as well as spreadsheet error protection controls minimize the risk of mistakes. Creating a standardized adjusting entry file eliminates the need to repeatedly key in the same types of journal entries at each month end close and can reduce the risk of forgetting to post an adjusting entry, ensuring completeness. Threat 7: Unauthorized Adjusting Entries Strong access controls reduce the risk while detective controls such as periodic reconciliations and audit trails provide a means to detect unauthorized or inaccurate adjusting entries.
Multiple Choice 5 The _____ posts the adjusting journal entries after the trial balance has been prepared. a. finance department 18-7 .
b. controller’s office c. treasurer’s office d. COO Multiple Choice 6 The _____ category includes adjusting entries to record the expensing of prepaid assets. a. estimates b. corrections c. deferrals d. revaluations e. accruals
Learning Objective Four Explain the process of preparing financial statements, the threats to that process, the controls that can be used to mitigate those threats, and how IT developments such as XBRL can improve the efficiency and effectiveness of preparing financial statements.
Prepare Financial Statements The third activity in the general ledger and reporting system is preparing financial statements (circle 3.0 in Figure 18-2). The income statement is prepared first. The balance sheet is prepared next. The third major financial statement is the statement of cash flows. Transitioning from GAAP to IFRS Although the requirement continues to be pushed back, organizations will need to plan in the future how their general ledgers and reporting can accommodate the change from GAAP accounting to IFRS. IFRS differs from GAAP in several ways: 1. Accounting for fixed assets—IFRS requires the componentization of fixed assets. Componentization requires companies to identify and disaggregate their fixed assets. Most organizations only have this recorded as a total (e.g. cost of the delivery vehicle); however, under IFRS that delivery vehicle would have the component of the cab and engine and the trailer as separate components. 2. Accounting for research and development costs, IFRS allows capitalization of R&D costs at an earlier stage than GAAP. 3. IFRS does not permit last in, first out (LIFO).
18-8 .
XBRL: Revolutionizing the Reporting Process Communications technology has long been used to reduce time and costs of preparing and distributing financial statements and managerial reports. Previously, electronic dissemination of reports containing financial and nonfinancial information was a cumbersome, inefficient process. The problem was that many recipients had different requirements concerning the manner in which information was to be delivered. For example, SEC filings include a lot of the information that is also found in financial statements. Figure 18-8 on page 603 shows the traditional electronic reporting process which contains much of the same information, but presented in many different ways. The underlying cause of these problems was the lack of standards for identifying the content data. The Extensible Business Reporting Language (XBRL) is a variant of XML, specifically designed for use in communicating the content of financial data. XBRL creates tags for each data item similar to that used by HTML. Refer to Figure 18-8 on page 603. Tag names are at the bottom of Figure 18-9 on page 604, such as <us-gaap:SalesRevenueGoodsNet>. The tags are used to describe the various line items in the financial statement. The other fields in each tag provide contextual information such as the year and the units of measurement. XBRL provides two major benefits to the creation and electronic dissemination of financial data. First, it enables organizations to publish information only once, using standard XBRL tags. The second benefit of XBRL is that the information that XBRL tags provide is interpretable. This means that recipients will no longer need to manually reenter data they acquired electronically so that decision support tools can analyze them. The benefits of XBRL are not limited to its use to exchange financial data with external parties. Internal reporting will also benefit because data from the organization’s AIS can be exported once and then reused by different managers in different applications. This eliminates the need to manually re-enter the same data.
18-9 .
XBRL is certainly an important IT development. It is also noteworthy because the accounting profession spearheaded its development (see Focus 18-1 on page 608).
Threats and Controls Threat 8: Inaccurate Financial Statements Data processing integrity controls and the use of packaged software used to produce financial statements minimize the risk of errors. Training and experience in applying IFRS and XBRL reduces the risk of errors. Audits provide a good detective control. Threat 9: Fraudulent Financial Reporting Independent review (audit) is the best control. Multiple Choice 7 The following are the three basic financial statements: 1. Balance sheet 2. Income statement 3. Statement of cash flows The correct order in preparing these financial statements is: a. 2, 1, 3 b. 1, 2, 3 c. 1, 3, 2 d. 2, 3, 1 e. 3, 1, 2 Multiple Choice 8 XBRL is a variant of _____. a. HTML b. NAARS c. EDGAR d. XML Multiple Choice 9 The power of XBRL lies in the information provided by its: a. edit checks b. tags c. data marks d. none of the above
Learning Objective Five Describe the process for producing various managerial reports, the threats to that process, and how tools like responsibility accounting and the balanced scorecard can help mitigate those threats. 18-10 .
Produce Managerial Reports The final activity in the general ledger and reporting system (circle 4.0 in Figure 18-2) is producing various managerial reports. Examples of these reports include budgets and performance reports.
Threats and Controls Threat 10: Poorly Designed Reports and Graphs Poorly designed reports and graphs can cause managers to make biased or erroneous decisions. Three controls that mitigate this threat are: responsibility accounting, balanced scorecard, and training on proper graph design.
Responsibility Accounting Budgets and performance reports should be developed on the basis of responsibility accounting. Responsibility accounting is reporting financial results on the basis of managerial responsibilities within an organization. Many production, service, and administrative departments are evaluated using cost centers. In contrast, sales departments are often evaluated as revenue centers. No matter which basis is used to prepare a unit’s budgetary performance report, the method used to calculate the budget standard is crucial. The easiest approach to developing a budgetary performance report is to establish fixed targets for each unit (referred to as a static budget). The drawback to this approach is that it does not consider any changes in the operation of the activity. These changes could include actual units produced being different then the fixed (static) budget amount. Another example would be a difference in the number of unit sales. A solution to such problems is to develop a flexible budget, in which the budgeted amounts vary in relation to some measure of organizational activity.
The Balanced Scorecard The balanced scorecard is a report that provides a multidimensional perspective of organizational performance. A balanced scorecard contains measures reflecting four perspectives of the organization: 1) financial, 2) customer, 3) internal operations, and 4) innovation and learning. Table 18-2 on page 612 provides an example of a balanced scorecard used by AOE. This provides the targeted goal, and the current period and prior period actual performance results. 18-11 .
Many companies have three key financial goals: 1. Increased revenue streams through sales of new products 2. Increased profitability as reflected in return on equity 3. Maintaining adequate cash flow to meet obligations For every organization, customers are the key to achieving financial goals. AOE’s balanced scorecard contains two key goals: 1) improve customer’s satisfaction and 2) become the preferred supplier for key customers. To continuously improve service and results, it is important to develop new products and to train the workforce. Hypothetically, increased employee training is expected to improve service quality, as reflected in the percentage of customer orders filled correctly. In turn, improved service quality is expected to result in increased customer satisfaction and in key customers making a greater share of purchases from AOE. Accountants and systems professionals should participate in the development of a balanced scorecard. Although the balanced scorecard was initially developed as a strategic management tool, it can also be used as a vehicle to better manage enterprise risk. The balance scorecard is usually depicted in a dashboard in an interactive display of real-time measures of key indicators of operating performance. Multiple Choice 10 In using a balanced scorecard, _____ is (are) the key for every organization to achieving financial goals. a. profitability b. internal controls c. innovation d. customers
Answer to Multiple Choice Questions: Multiple Choice Question Answers Number Answer Number Answer 1 B 6 C 2 D 7 A 3 C 8 D 4 B 9 B 5 C 10 D 18-12 .
CHAPTER 19 DATABASE DESIGN USING THE REA DATA MODEL Instructor’s Manual Learning Objectives: 1. Discuss the steps for designing and implementing a database system. 2. Explain the nature and use of Entity-Relationship (E-R) diagrams. 3. Explain the content and purpose of the REA data model. 4. Use the REA data model to design an AIS database. 5. Read an REA diagram and explain what it reveals about the business activities and policies of the organization modeled. Questions to be addressed in this chapter include: 1. What steps are followed to design and implement a database system? 2. How is the REA data model used to design an AIS database? 3. How is an entity-relationship REA diagram of an AIS database drawn? 4. How are REA diagrams read, and what do they reveal about the business activities and policies of the organization being modeled?
Introduction This chapter introduces the topic of data modeling, one aspect of database design that accountants should understand. We discuss entity-relationship (E-R) diagrams and the REA accounting model and demonstrate how to use these tools to build a data model of an AIS.
Learning Objective One Discuss the steps for designing and implementing a database system.
Database Design Process Figure 19-1 on page 628 shows the five basic steps in database design.
19-1 .
1. Systems analysis 2. Conceptual design 3. Physical design 4. Implementation and conversion 5. Operation and maintenance The first stage (systems analysis) consists of initial planning to determine the need for and feasibility of developing a new system. The second stage (conceptual design) includes developing the different schemas for the new system, at the conceptual, external, and internal levels. The third stage (physical design) consists of translating the internallevel schema into the actual database structures that will be implemented in the new system. The fourth stage (implementation and conversion) includes all the activities associated with transferring data from existing systems to the new database AIS, testing the new system, and training employees how to use it. The fifth and final stage is using and maintaining the new system. Accountants can and should participate in every stage of the database design process. Accountants may provide the greatest value to their organizations by taking responsibility for data modeling. Data modeling is the process of defining a database so that it faithfully represents all aspects of the organization, including its interactions with the external environment. Multiple Choice 1 Data modeling occurs at which stage of the database design process? a. Physical design b. Conceptual design c. Implementation d. Operation
Learning Objective Two Explain the nature and use of Entity-Relationship (E-R) diagrams.
19-2 .
Entity-Relationship Diagrams An entity-relationship (E-R) diagram is a graphical technique for portraying a database schema. An entity is anything about which the organization wants to collect and store information. In an E-R diagram, entities are depicted as rectangles. Figure 19-2 on page 629 shows various E-R diagrams Some data modelers use diamonds to depict relationships (panel A), whereas others do not (panel B). Sometimes the attributes associated with each entity are depicted as name ovals connected to each rectangle (panel C) whereas others associate attributes with each entity which are listed in a separate table (panel D). E-R diagrams can be used to represent the contents of any kind of database. In this book, our focus is on databases designed to support an organization’s business activities. Multiple Choice 2 Which of the following statement(s) is TRUE? a. An entity is anything about which the organization wants to collect and store information. b. Events are the various business activities about which management wants to collect information for planning or control purposes. c. Some data modelers, tools, and authors use diamonds to depict relationships. d. E-R diagrams can be used to represent the contents of any kind of database. e. All of the above are true.
Learning Objective Three Explain the content and purpose of the REA data model.
The REA Data Model The REA data model was developed for use in designing AIS. The REA data model focuses on the business semantics underlying an organization’s value chain activities.
19-3 .
Three Basic Types of Entities The REA data model is so named as it has three distinct categories: 1. R—resources the organization acquires and uses 2. E—events (business activities) in which the organization engages 3. A—agents participating in these events Resources are those things that have economic value to the organization. Events are the various business activities about which management wants to collect information. There are two event entities in Figure 19-3 on page 630: Sales and Receive Cash. Agents are the people and organizations that participate in the events. Figure 19-3 includes two types of agent entities: Employees and Customers.
Structuring Relationships: The Basic REA Template The essential features of the basic pattern are: 1. Each event is linked to at least one resource that it affects. 2. Each event is linked to at least one other event. 3. Each event is linked to at least two participating agents. Rule 1—Every Event Entity Must Be Linked to at Least One Resource Entity Events must be linked to at least one resource that they affect. The “Get Resource A” in Figure 19-4 on page 631 increases the quantity of a resource. For example, “Get” includes the receipt of goods from a supplier which increases the amount of inventory, and the receipt of payment from a customer increases the amount of cash. Relationships that affect the quantity of a resource are sometimes referred to as stockflow relationships. “Give” events include paying suppliers and selling merchandise which decreases the amount of cash and inventories respectively.
19-4 .
Not every event changes the quantity of a resource. For example, a customer’s commitment to purchase merchandise will not alter the quantity of a resource until the sale is actually made. The commitment of a company to purchase merchandise from a vendor will not change the quantity of a resource until the actual purchase is made and the items are received. Rule 2—Every Event Entity Must Be Linked to at Least One Other Event Entity Figure 19-4 on page 631 shows that the Get Resource A event is linked to the Give Resource B event in what is called an economic duality relationship. Figure 19-5 on page 632 shows that each accounting cycle can be described in terms of such give-to-get economic duality relationships. The accounting cycles include 1) revenue cycle, 2) expenditure cycle, 3) payroll cycle, 4) financing cycle, and 5) production cycle. Rule 3—Every Event Entity Must Be Linked to at Least Two Participating Agents For accountability, organizations need to be able to track the actions of employees. Figure 19-4 on page 631 shows each event linked to two participating agent entities. For events that involve external agents, the internal agent is the employee and the external agent is the outside party. For events that involve internal agents, the internal agent is the employee that is giving up a resource and the external agent is the employee who is receiving the resource. Multiple Choice 3 In regards to REA data modeling, some researchers have proposed a fourth type of entity, which they call _____. a. accounts b. locations c. data d. special agents Multiple Choice 4 The essential features of relationship patterns include: a. Each event is linked to at least two participating agents. b. Each event is linked to no more than one resource that it affects. c. Each event is linked to at least one other event. d. A and C e. All of the above. 19-5 .
Multiple Choice 5 In order for a manufacturer to Get inventory, they must Give: a. Cash b. Raw materials c. Machinery d. B and C e. A and C
Learning Objectives Four and Five Use the REA data model to design an AIS database. Read an REA diagram and explain what it reveals about the business activities and policies of the organization being modeled.
Developing an REA Diagram Figure 19-6 on page 633 shows the REA diagram Paul developed for the revenue cycle of Fred’s Train Shop. This chapter focuses on developing an REA diagram for an individual transaction cycle. Developing an REA diagram for a specific transaction cycle consists of the following three steps: 1. Identify the events about which management wants to collect information. 2. Identify the resources affected by each event and the agents who participate in those events. 3. Determine the cardinalities of each relationship. Step 1: Identify Relevant Events The first step in developing an REA model of a transaction cycle is to identify the events of interest to management. At a minimum, this must include two events that include the basic giveto-get economic exchange. Usually, there are other events that management is interested in planning, controlling, and monitoring that also need to be included in the REA model. From Chapter 14, the revenue cycle typically consists of four sequential activities: 1. Take customer orders. 19-6 .
2. Fill customer orders. 3. Bill customers. 4. Collect payment from customers. The first activity of taking the customer’s order does not involve the acquisition of resources (get) or provision of resources to an external party (give). The second activity of filling the customer’s order does involve the reduction of the organization’s inventory level; representing the Give Resource event. The third activity of billing customers also does not involve an increase or decrease of any economic resource. The fourth activity of collecting payments from customers does involve an increase in the cash resource. Figure 19-6 on page 633 shows that the basic business activities in the revenue cycle indicate that the basic give-to-get economic exchange consists of two events: 1) fill customer orders (referred to as the Sales event) and 2) collect payments from customers (referred to as the Receive Cash event). In drawing an REA diagram for an individual transaction cycle, it is useful to divide the paper into three columns, one for each type of entity. Use the left column for resources, the center column for events, and the right column for agents. After identifying the economic exchange events, it is necessary to determine which other business activities should be represented as events in the REA model. This requires understanding what each activity entails because only those activities that involve the acquisition of new information need to be included in the model. Refer to Figure 19-6 on page 633 that was for Fred’s Train Shop in which the REA diagram was designed by Paul. Paul notes that the Sales and Receive Cash reflects most in-store sales transactions in which the customer selects the items to buy and then pays for them. However, there are some customers that call the store and ask Fred to put items aside in which they will pick them up later during the week. So now Paul needs to add the commitment event Take Customer Order to the REA diagram before the Sales event. Fred does have credit sales to some customers such as shopping centers and hotels. However, billing customers only involves printing and mailing invoices. The customer’s obligation to pay arises from the 19-7 .
delivery of the merchandise, not from the printing of an invoice. Therefore, Paul does not need to add the billing event in the revenue cycle REA diagram. What about accounts receivable? How can you possibly monitor the accounts receivable balance sheet item? What information would the billing event add that you don’t already have? Answer: “Nothing.” You already have the information from the Sales event. Accounts receivable equals all sales in which customers have not yet paid. So again, Paul does not have to include the billing event. Finally, notice that there are no events that pertain to the entry of data. The reason for this is that the REA data model is used to design transaction processing databases. The objective is to model the basic value-chain business activities of an organization: 1) what it does in order to generate revenues and 2) how it spends cash and uses its other resources. Thus, what gets modeled in the REA diagram is the business event (e.g. the sales transaction) and the facts that management wants to collect about that event, not the entry of that data. Step 2: Identify Resources and Agents Next, the resources that are affected by those events need to be identified. This involves answering three questions: 1. What economic resource is reduced by the “Give” event? 2. What economic resource is acquired/increased by the “Get” event? 3. What economic resource is affected by a commitment event? Again, a solid understanding of business processes makes it easy to answer these questions. To continue with our example, Paul observed that the Sales event involves giving inventory to customers. The Cash Receipts event involves receiving cash from customers. Cash can be in the form of money, checks, credit cards, or debit cards. Paul added the Inventory resource and Cash resource entities to the REA diagram. Finally, the Take Customer Order event involves the setting aside of merchandise for customers. In addition to specifying the resources affected by each event, it is also necessary to identify the agents who participate in those events. There will always be at least one internal agent (employee) and, in most cases, an external agent (customer or vendor) who participate in each event. In the case of Fred’s Train Shop’s revenue cycle, a customer and a salesperson participate in each sales event. 19-8 .
For the Receive Cash event, the customer and cashier are the two agents. Both the revenue cycle and the Take Customer Order event involve customers and employees. Step 3: Determine Cardinalities of Relationships The final step in drawing an REA diagram for one transaction cycle is to add information about relationship cardinalities. Cardinalities describe the nature of the relationship between two entities by indicating how many instances of one entity can be linked to each specific instance of another entity. No universal standard exists for presenting information about cardinalities in REA diagrams. The text adopts the graphical “crow’s feet” notation style for representing cardinality information. Table 19-1 on page 636 explains the meaning of the symbols used to represent cardinality information. Focus 19-1 on page 637 compares the notation used in this book with other commonly used conventions. Figure 19-7 on page 638 depicts both minimum and maximum cardinalities for each entity participating in a relationship. Minimum cardinality indicates whether a specific instance of the entity next to the cardinality must be linked to at least one instance of the entity on the opposite side of that relationship. A minimum cardinality of zero means that an instance of the entity on this side of the relationship need not be linked to any specific instances of the other event. For example, in Figure 19-7 the minimum cardinality of 0 next to the Sales entity in the Customer-Sales relationship indicates that information about a new customer can be added to the Customer entity without any specific sales transaction. A minimum cardinality of one means that each instance of that entity must be linked to at least one instance of the other entity participating in that relationship. For example, in Figure 19-7 the minimum cardinality of 1 next to the Customer entity in the Customer-Sale relationship indicates that information about a new sale can be added only if it is linked to a specific customer. The maximum cardinality indicates whether one instance of that entity can be linked to more than one instance of the other entity participating in that relationship.
19-9 .
In Figure 19-7 the maximum cardinality next to Customer entity in the Customer-Sale relationship is 1. This means that each sales transaction can be linked to only one customer. Three Types of Relationships Figure 19-7 portrays these three types of relationships: 1. A one-to-one (1:1) relationship exists when the maximum cardinality for each entity in the relationship is 1. Panel A: one-to-one (1:1) relationship 2. A one-to-many (1:N) relationship exists when the maximum cardinality of one entity in the relationship is 1 and the maximum cardinality for the other entity in that relationship is many. Panel B: one-to-many (1:N) relationship Panel C: Opposite a one-to-many relationship is what is referred to as (N:1) 3. A many-to-many (M:N) relationship exists when the maximum cardinality for both entities in the relationship is many. Panel D: many-to-many (M:N) relationship Figure 19-7 shows that any of these possibilities might describe the relationship between the Sales and Receive Cash events. The cardinalities must reflect the organization’s business policies. Figure 19-7, panel A, represents the typical revenue cycle relationship for business-to-consumer retail sales. Note that it does not matter how customers pay for each sales transaction. If management is interested in tracking the frequency of different payment methods, this fact might be recorded as an attribute of the Sales event. Panel B and C of Figure 19-7 depicts two ways that one-to-many (1:N) relationships can occur. Panel B indicates that the organization has a business policy that allows customers to make installment payments to the selling organization. However, this does not mean that every sales transaction is paid for in installments. Panel C shows another type of 1:N relationship between Sale and Cash Receipts. This indicates that the organization has a business policy that does not permit customers to make 19-10 .
installment payments. This type is especially used for businessto-business sales of nondurable goods. Panel D of Figure 19-7 depicts a many-to-many relationship between the Sale and Cash Receipt events. This type represents an organization that has business policies that allow customers to make installment payments and also permit customers to accumulate a balance representing a set of sales transactions over a period of time. Some sales transactions may be paid in full in one payment and some customers may pay for each sales transaction separately. Multiple Choice 6 The second step in developing an REA diagram is: a. determine the cardinalities of each relationship. b. identify the events about which management wants to collect information. c. identify the resources affected by each event and the agents who participate in those events. d. None of the above. Multiple Choice 7 Which of the activities in a revenue cycle does not involve a Get or Give event? a. Bill customers b. Take customer orders c. Fill customer orders d. Collect payment from customers e. B and C Multiple Choice 8 Three types of relationships between entities include: a. 1:M b. N:M c. 1:N d. 0:1
Business Meaning of Cardinalities The information that reflects facts about the organization and its business practices is obtained during the systems analysis and conceptual design stages of the database design process. Let’s now examine Figure 19-6 to see what it reveals about Fred’s Train Shop. First, note that all of the agent-event relationships are 1:N. A particular agent often participates in many events. The minimum cardinalities associated with the agent-event relationships reflect typical business processes which shows that each event must be linked to an agent (e.g. a sale must involve a customer and a payment from a customer). 19-11 .
Figure 19-6 shows that the minimum cardinality on the event side of the agent-event relationship is 0. The organization may wish to store information about potential customers and alternate suppliers. Figure 19-6 depicts M:N relationships between the inventory resource and the various events that affect it. Most organizations track such inventory by an identifier such as part number, item number, or stock-keeping unit (SKU) number and do not attempt to track each physical instance of that product. When a sale occurs, the system notes which product number(s) were sold. The same inventory item may be linked to many different sales events. What if an organization sells unique, one-of-a-kind inventory, such as original artwork? Such items can only be sold one time; consequently, the maximum cardinality on the event side of the inventory-sales event would be 1. The minimum cardinalities on each side of the inventory-event relationships shown in Figure 19-6 reflect typical business practices; every order or sales event must be linked to at least one inventory item. Now consider the relationship between the cash resource and the Receive Cash event. Each cash receipt from a customer is deposited into one cash account. Then the treasurer transfers money from that account to other cash accounts. Each customer payment must be deposited into some account; hence the minimum cardinality is 1 on the resource side of the relationship. However, the minimum cardinality on the event side of the relationship is 0. Finally, let us examine the event-event relationship. Fred’s Train Shop ships each business customer order individually and waits until all items are in stock before filling an order. Thus, each order is linked to only one sales transaction and each sales transaction is related to only one order. The minimum cardinality on the sales side of the relationship is 0, meaning that orders may exist which are not linked to sales. Fred’s Train Shop extends credit to its business customers and mails them monthly statements. The business customers send Fred one check to cover all their purchases during a given time period. Therefore, one Cash Receipts event could be linked to many different Sale events. Because Fred’s Train Shop extends credit to some of its customers, at any point in time there can be Sale events that are not yet linked to any Receive Cash events. The minimum cardinality on the Receive Cash side of the relationship is 0. Fred’s Shop never requires customers to pay in advance for special orders. Thus, every Receive Cash event must be linked to a Sale event. The minimum cardinality on the sales side of the Sale-Receive relationship is 1. 19-12 .
Uniqueness of REA Diagrams Because each organization will have its own unique REA diagram, so will relationship cardinalities differ. An REA diagram will need to be changed for every change in an organization’s business practices. As such, data modeling is usually a complex and repetitive process. Thus, it is not unusual to erase and redraw portions of an REA diagram several times before finally producing an acceptable model. Focus 19-2 on page 642 highlights the importance of involving the eventual users of the system in the data modeling process so that terminology is consistent. Multiple Choice 9 The information about the choice of cardinalities is obtained during the _____ stage of the database design process. a. physical design b. implementation and conversion c. systems analysis and conceptual design d. operation and maintenance Multiple Choice 10 Most organizations track an inventory by an identifier such as: a. part number b. item number c. SKU d. All of the above e. A and B
Answer to Multiple Choice Questions: Multiple Choice Question Answers Number Answer Number Answer 1 B 6 C 2 E 7 E 3 B 8 C 4 D 9 C 5 D 10 C
19-13 .
CHAPTER 20 IMPLEMENTING AN REA MODEL IN A RELATIONAL DATABASE Instructor’s Manual Learning Objectives: 1. Integrate separate REA diagrams for individual business cycles into a single, comprehensive, organization-wide REA diagram. 2. Build a set of tables to implement an REA model of an AIS in a relational database. 3. Use the REA data model to write queries to retrieve information from an AIS relational database. Questions to be addressed in this chapter: 1. How to integrate the separate REA diagrams into a single,
comprehensive, enterprise-wide data model. 2. How to use the integrated data model to design a set of
relational database tables. 3. How to query the resulting database to generate both traditional
financial statements as well as any custom performance reports.
Introduction This chapter shows how to implement an REA diagram in a database. The REA data modeling can also be used to design object-oriented databases. We begin by showing how to integrate separate REA diagrams developed for individual transaction cycles into a single, comprehensive enterprise wide data model.
Learning Objective One Integrate separate REA diagrams for individual business cycles into a single, comprehensive, organization-wide REA diagram.
Integrating REA Diagrams Across Cycles Figures 20-1, 20-2, and 20-3 (pages 662-663) present REA diagrams of Fred’s Train Shop’s revenue, expenditure, and payroll cycles, respectively.
20-1 .
Figures 20-1 and 20-2 were explained in Chapter 19, so we focus in Chapter 20 on Figure 20-3 for the HR/payroll cycle activities. Fred’s Train Shop uses an electronic time clock to record the hours worked by each employee each day by marking the time each employee began and ended working. Each event must be linked to a particular employee and his or her supervisor. A paycheck is issued to a particular employee and signed by a particular cashier. The relationship among agents and events is 1:N. The minimum cardinality on the agent side of those relationships is always 1. The minimum cardinality on the event side of the relationships is always 0 in order to store data about new employees before they start to work. The relationship between the Time Worked and Disburse Cash events reflects the use of an employee’s time and paying for it. The relationship between these two events is 1:N. This is because each Disburse Cash event is linked to many daily Time Worked events. The Employee Time entity represents the fact that the resource being acquired by the Time Worked event is the use of an employee’s skills and knowledge for a particular period of time. Every organization needs to monitor how much time each employee works. The Time Worked event is an example of a “Get” resource event. How an employee uses their time is an example of a “Give” resource event. These two events capture all of the information used to collect and monitor each employee’s time. Each check or electronic funds transfer must be linked to at least one and only one cash account. However, the same cash account may be linked to many disbursement events.
Rules for Combining REA Diagrams Figures 20-1, 20-2, and 20-3 each contain some of the same entities. For example, the inventory resource appears in both Figures 20-1 and 20-2. The cash disbursements event appears in both Figures 20-2 and 203. Both the employee agent and the cash resource appear in all three diagrams. Such redundancies provide the basis for combining REA diagrams into a single, comprehensive, enterprise-wide REA model. Refer to
20-2 .
Figure 20-4 on page 664 which shows such a model for Fred’s Train Shop. Notice that the diagram merges copies of resource and event entities, but retains multiple copies of agent entities.
Merging Redundant Resource Entities Remember that REA diagrams for individual transaction cycles involve give-to-get economic exchanges. Figure 20-1 shows that inventory is reduced (Sales event) in exchange for cash (Receive Cash event). However, it does not show how the inventory was acquired or how the organization uses the cash it receives from customers. Figure 20-2 shows how the inventory was acquired by giving up cash. However, it does not show what the organization does with the inventory or how it acquired cash used to pay suppliers. These problems are eliminated by merging redundant resource entities as that shown in Figure 20-4.
Merging Redundant Event Entities REA diagrams for individual transaction cycles may include some events that also appear in the REA diagrams of another transaction cycle. For example, Figures 20-2 and 20-3 both contain the Disburse Cash event entity. Figure 20-4 shows that the Disburse Cash event is linked to both the Receive Inventory and the Time Worked events. Merging redundant resources does not affect any cardinalities. However, merging redundant events does alter the minimum cardinalities associated with the other events. In Figure 20-4, the cardinalities between the inventory resource and each of the four events (Order Inventory, Receive Inventory, Take Customer Order, and Sales) are the same as that in Figures 20-1 and 202. However, the cardinalities between the Disburse Cash event and the other two events (Receive Inventory and Time Worked) in Figure 20-4 are different from that in Figures 20-2 and 20-3. The reason for this difference lies in the underlying semantics about the nature of the relationship between the merged entity and other entities. In other words, the resource entity is linked to event entities in one cycle and to event entities in the other cycle. Because both are possible, none of the cardinalities need to be changed.
20-3 .
However, it is different when merging an event across transaction cycles. The event that appears in both individual transaction cycles can be linked to an event of one transaction cycle or to an event in another transaction cycle. However, the event cannot be linked to both events. Consequently, the minimum cardinality associated with the other event must be 0 in the integrated REA diagram. In addition, merging two transaction cycles on a common event may also affect the minimum cardinalities between the merged event and the agents participating in that event. For example, in Figure 20-4 the minimum cardinality between the Disburse Cash event and the Supplier entity is now 0 instead of 1.
Validating the Accuracy of Integrated REA Diagrams In Chapter 19 there were three basic principles for drawing REA diagrams for individual transaction cycles. There are now six rules for integrated REA diagrams: 1. Every event must be linked to at least one resource. 2. Every event must be linked to two agents who participate in that event. 3. Every event that involves the disposition of a resource must be linked to an event that involves the acquisition of a resource. (This reflects the economic duality underlying “give-to-get” economic exchanges.) 4. Every resource must be linked to at least one event that increments that resource and to at least one event that decrements that resource. 5. If event A can be linked to more than one other event, but cannot be linked simultaneously to all of those other events, then the REA diagram should show that event A is linked to a minimum of 0 of each of those other events. 6. If an event can be linked to any one of a set of agents, but cannot be simultaneously linked to all those agents, then the REA diagram should show that event is linked to a minimum off 0 of each of those agents. Multiple Choice 1 The REA diagram for Fred’s Train Shop’s individual expenditure cycle has _____ event entities. a. 2 b. 3 c. 4 d. 5
20-4 .
Multiple Choice 2 The REA diagram for Fred’s Train Shop’s individual revenue cycle has _____ resource entities. a. 2 b. 3 c. 4 d. 5 Multiple Choice 3 Merging redundant _____ does not affect any cardinalities, but merging redundant _____ alters minimum cardinalities. a. resources; agents b. events; resources c. resources; events d. agents; resources Multiple Choice 4 Whenever a merged event involves different agents in each of the individual transaction cycles being merged, the minimum cardinalities between that event and those agents changes from _____ to _____. a. 1; M b. 0; M c. 0; 1 d. 1; 0
Learning Objective Two Build a set of tables to implement an REA model of an AIS in a relational database.
Implementing an REA Diagram in a Relational Database Once the REA conceptual model is developed, it can be used to design a well-structured relational database that is not subject to the update, insert, and delete anomaly problems discussed in chapter 4. There are three steps to implementing an REA diagram in a relational database: 1. Create a table for each distinct entity in the diagram and for each many-to-many relationship. 2. Assign attributes to appropriate tables. 3. Use foreign keys to implement one-to-one and one-to-many relationships. Step 1: Create Tables for Each Distinct Entity and M:N Relationship A properly designed relational database has a table for each distinct entity and for each many-to-many relationship in an REA diagram. 20-5 .
Figure 20-4 has 13 distinct entities. We will not be implementing Employee Time in the database. Seven tables will represent the event entities in the diagram: Order Inventory, Receive Inventory, Disburse Cash, Time Worked, Take Customer Orders, Sales, and Receive Cash. Two tables will be used for resource entities: Inventory and Cash. Three tables are needed to implement the distinct agent entities: Employees, Customers, and Suppliers. In Figure 20-4 there are five M:N relationships. Three are from the revenue cycle: 1. Take Customer Orders-Inventory 2. Sales-Inventory 3. Sales-Receive Cash Two are from the expenditure cycle: 1. Inventory-Order Inventory 2. Inventory-Receive Inventory 17 Tables will be needed to implement Figure 20-4 into a relational database. Step 2: Assign Attributes to Each Table The next step is to determine which attributes should be included in each table. Identify Primary Keys Remember from Chapter 4 that every table in a relational database must have a primary key, consisting of an attribute, or combination of attributes, that uniquely identifies each row in that table. Fred’s Train Shop uses invoice numbers as the primary key of the sales table and customer number for the Customer table. M:N relationship tables consist of two primary keys. The SalesInventory table consists of both the invoice number and product number as primary keys. These multiple-attribute primary keys are called concatenated keys. Assign Other Attributes to Appropriate Tables
20-6 .
Other attributes included in a relational database table must be a fact about the object represented in the primary or foreign key. These other attributes could include such items as customer name and address. A foreign key is an attribute in a table that is a primary key in another table. Foreign keys are used to link tables. The 17 Tables needed to implement Figure 20-4 into a relational database are listed in Table 20-1. In addition to the name of the table, it lists the primary key, foreign keys, and other attributes. Note that the last five tables in Table 20-1 have concatenated keys (two primary keys). In Figure 20-4, four of these event entities (tables in Table 20-1) have a M:N relationship with the inventory resource entity. Note that the employee number primary key in the Employees table is the foreign key in seven other tables: 1) Order Inventory, 2) Receive Inventory, 3) Disburse Cash, 4) Take Customer Orders, 5) Sales, 6) Receive Cash, and 7) Record Time Worked. Table 20-1 also includes nonkey attributes in some of the M:N relationship tables. Nonkey attributes are items in a table that are neither a primary key nor a foreign key. All nonkey attributes in a table should describe a characteristic about the object identified by the primary key. Nonkey attributes are listed in Table 20-1 under the Other Attributes column. Price and Cost Data In Table 20-1, notice that information about prices and costs are stored as an attribute in several different tables. The Inventory table stores the suggested list price for the item. The Sales-Inventory stores the actual sales price. Cumulative and Calculable Data Notice that Table 20-1 does not contain cumulative data, such as “quantity on hand” in the Inventory table, or calculated data, such as “total amount of sale” in the Sales table. The reason this data is not provided in these two tables is because the information is already available: The inventory quantity on hand equals the quantity on hand 20-7 .
at the beginning on the current fiscal period (Inventory table) plus the total quantity purchased this period (total quantity purchased in Receive-Inventory table) minus the quantity sold in the Sales-Inventory table. The total amount of sale equals quantity sold by the actual sales price in the Sales-Inventory table. Step 3: Use Foreign Keys to Implement 1:1 and 1:N Relationships 1:1 and 1:N relationships are more efficiently implemented by means of foreign keys instead of being implemented as separate tables. Using Foreign Keys to Implement 1:1 Relationships In a relational database, 1:1 relationships between entities can be implemented by including the primary key of either entity as a foreign key in the other table. Careful analysis of the minimum cardinalities of the relationship suggests that this approach is more efficient. Consider the case of a 1:1 relationship between sales and customer payments (see Figure 19-7, panel A). The minimum cardinality for the Receive Cash event is 0. The minimum cardinality for the Sale event is 1. Using Foreign Keys to Implement 1:N Relationships 1:N relationships can also be implemented in relational databases with foreign keys. There is only one way to do this: The primary key of the entity that can be linked to multiple instances of the other entity must become a foreign key in that other entity. The primary keys of the Salesperson and Customer tables are included as foreign keys in the Sales table. Reversing this procedure would violate one of the fundamental rules of relational database design. M:N relationships must be implemented as separate tables. Because each entity can be linked to multiple occurrences of the entity on the other side of the relationship, it is not possible to make either entity’s primary key a foreign key in the other entity.
Completeness Check The list of attributes that users and management want included in the database provides a means to check and validate the implementation process. Checking this list against the table column names may reveal not only the fact that a particular attribute has not been assigned to the appropriate table in the database but may even indicate the need to 20-8 .
modify the REA diagram itself. Paul Stone double-checked the list of desired attributes; he found that he did not have any table to cover the attribute “product discussed during sales calls.” Paul realizes that this necessitates creating another entity “Call on Customers.” It is often useful to create tables even before completely finishing an REA diagram and assign attributes to them. Once all attributes have been assigned to tables, a final accuracy check of relational databases (basic requirements discussed in Chapter 4) is required: 1. Every table must have a primary key. 2. Other nonkey attributes in each table must be either a fact about the thing designated by the primary key or foreign keys used to link that table to another table. 3. Every attribute in every table is single-valued.
Multiple Choice 5 In implementing an REA diagram in a relational database, the _____ are used to implement 1:1 and 1:M relationships. a. primary keys b. foreign keys c. nonkeys d. database keys Multiple Choice 6 An example of a table that has concatenated keys is: a. Inventory b. Sales-inventory c. Disburse cash d. Receive inventory Multiple Choice 7 Which of the following statements is FALSE? a. The second step in implementing an REA diagram in a relational database is assigning attributes to appropriate tables. b. The primary key “Customer Number” in the Customers table is a foreign key in the Sales table. c. Tables should never be created before completely finishing an REA diagram. d. In a relational database designed according to the REA data model, event entities store information about transactions. e. All of the above are true.
20-9 .
Learning Objective Three Use the REA data model to write queries to retrieve information from an AIS relational database.
Using REA Diagrams to Retrieve Information from a Database In this section we refer to Figure 20-4 and Table 20-1 to show how to use completed REA diagrams to retrieve information to evaluate performance.
Creating Journals and Ledgers The traditional journals and ledgers can be created through the use of queries. Deriving Journals from Queries In a relational database, event entities store information about transactions. Information found in a journal is contained in the tables used to record data about events. For example, the Sales and Sales-Inventory tables contain information for sales transactions. Thus, a sales journal can be produced through sales queries. However, this would produce a list of all sales transactions (cash and credit sales). Sales journals include only credit sales. To be able to determine the credit sales, the REA model would create a new role “sale of merchandise to a customer” in the Sales table and “receipt of payment from a customer” in the Receive Cash table. For cash sales, both rows would have the same values in the date and customer number columns. Rows in the Receive Cash table with dates later than the date of the corresponding sales would present payments on credit sales. Ledgers In AISs, ledgers are master files that contain cumulative information about specific accounts. Resource and agent entities contain permanent information that is carried over from one fiscal year to the next. Information about an organization’s assets that is posted in ledgers is stored in Resource tables.
20-10 .
Each of the resource accounts is affected by increment and decrement events. For example, equipment is purchased and used, cash is received and disbursed, and inventory is purchased and sold. Queries to display the current cumulative balance for these accounts must reference not only the appropriate table for that resource entity but also the event tables that affect it. Many financial statement accounts are represented as resources in the REA model. An important exception is claims: Figure 20-4 does not include Accounts Receivable or Accounts Payable. Accounts Receivable represents sales transactions for which customer payments have not yet been received, and Accounts Payable represents purchases from suppliers that have not yet been paid for. Therefore, neither account needs to be explicitly stored as separate tables.
Generating Financial Statements It is possible to use a completed REA diagram to guide the writing of queries to produce the information that would be included in financial statements.
Creating Managerial Reports A major advantage of the REA data model is that it integrates nonfinancial and financial data in the AIS and makes both types of data easily accessible to management. For example, Table 20-4 show that the Sales table in Figure 20-4 includes an attribute to record the time that the sale occurred. This will allow the tracking of sales activity during different times of the day to better plan staffing needs at Fred’s Train Shop. The general ledger is normally designed in AISs using the chart of accounts based on the structure of financial statements. Therefore, the nonfinancial data needs to be stored in a separate database or information system. Multiple Choice 8 Sales and Sales-Inventory tables can be queried to produce a list of all sales transactions. However, to produce a sales journal would also include queries of the both the _____ and _____ tables. a. Receive Cash; Inventory b. Sales-Receive Cash; Cash c. Cash-Sales; Receive Cash d. Receive Cash; Sales-Receive Cash
20-11 .
Multiple Choice 9 A lot of the information about an organization’s assets that is posted in ledgers is stored in _____ tables. a. Resource b. Event c. Agent d. Activity Multiple Choice 10 Many financial statement accounts are represented as resources in the REA model except for: a. Cash b. Accounts Receivable c. Inventory d. None of the above
Answer to Multiple Choice Questions: Multiple Choice Question Answers Number Answer Number Answer 1 B 6 B 2 A 7 C 3 C 8 D 4 D 9 A 5 B 10 B
20-12 .
CHAPTER 21 SPECIAL TOPICS IN REA MODELING Instructor’s Manual Learning Objectives: 1. Create REA data models for the revenue and expenditure cycles of other types of organizations besides retail stores. 2. Extend REA diagrams to include information about employee roles, M:N agent-event relationships, locations, and relationships between resources and agents. 3. Understand and create an REA diagram for the production cycle. 4. Understand and create an REA diagram for the HR/payroll cycle. 5. Understand and create an REA diagram for the financing cycle. Questions to be addressed in this chapter: 1. How do you model the revenue cycle activities of a business that provides services, such as computer or automotive repairs? What about a business that rents items instead of selling them? 2. How do you model the production cycle activities of a manufacturer? 3. How do you integrate payroll activities with other HR processes, such as hiring and training employees? 4. How do you model financing transactions, such as the issuance of stock or debt?
Introduction This chapter extends the basic concepts to a variety of other types of businesses and transaction cycles.
Learning Objective One Create REA data models for the revenue and expenditure cycles of other types of organizations besides retail.
Additional Revenue Cycle Modeling Topics Figure 21-1 on page 686 presents a revenue cycle REA diagram that includes manufacturers, distributors, and other types of businesses. Table 21-1 on page 687 lists the tables and their attributes that would be required to implement this model in a relational database. 21-1 .
Additional Events Figure 21-1 separates the warehouse activity of filling an order from the activity of actually shipping or delivering that order to the customer. The relationship between the Take Customer Order and Fill Customer Order event is represented as being one-to-many (1:N). The minimum cardinalities reflect the fact that two events occur sequentially. The maximum cardinalities reflect the fact that sometimes the company may be out of stock of one or more items that were ordered. The maximum cardinality from the Fill Customer Order event to the Take Customer Order event is 1. The relationship between the Fill Customer Order and Ship Order events is 1:1. The minimum cardinalities reflect the fact that the two events are sequential. The maximum cardinality from the Fill Customer Order event to the Ship Order event is 1 because once all the items that were ordered and in stock have been picked and packed, that entire package is shipped intact to the customer. For proper accountability, each Ship Order event is linked to one, and only one, Fill Customer Order event.
Attribute Placement Table 21-1 shows that the primary key of the shipping event is the shipment number. The primary key for Call on Customer is the Call Number. The Call Number is also the foreign key for Take Customer Order. The primary key for Take Customer Order is the Sales Order Number. The Sales Order Number is also the foreign key for Fill Customer Order. The primary key for Fill Customer Order is the Picking Ticket Number. The Picking Ticket Number is also the foreign key for Ship Order. The primary key for Ship Order is the Shipment Number. The primary key for Receive Cash is the Remittance Number. Note that the unit cost for each item is an attribute in the Inventory Table.
21-2 .
The unit list price is an attribute in the Inventory Table and the Inventory-Take Customer Order Table.
New REA Feature—Employee Roles The REA diagram in Figure 21-1 provides the job roles of employees. The salesperson is involved in the Call on Customer and Take Customer Order events. The warehouse employee is involved in the Fill Customer Order event. The shipping employee is involved in the Fill Customer Order and Ship Order events. There is also an external agent, carrier, involved in the Ship Order event. The cashier is involved in the Receive Cash event.
Sale of Services Now we will switch from selling a product to providing a service. Figure 21-3 on page 690 provides an REA diagram of a partial revenue cycle for a service type business. The Service Table would provide a row for each type of service. For example, an automotive repair shop would have individual rows for such services as oil changes and brake replacement. The inventory involved would include oil and brake shoes. The relationship between the Sales and Services resources would be modeled as M:N because most businesses provide the same types of services to many different customers. The relationship between Sales and Inventory would also be M:N as there would be many types of parts used for the same types of services. For another example, a CPA firm could include rows for tax services, audits, consulting services, and financial planning. The firm could also breakdown audits into financial statement, compliance, and operational audits. The inventory in this case would not involve identifiable inventory parts. Only the professional and administrative labor would be mainly involved. The relationship between Sales and Services resources would remain the same as mentioned above at M:N. However, the relationship between Sales and Inventory would now be a minimum cardinality of 0.
21-3 .
Digital Assets What about digital assets? Companies sell software, music, or digital photographs over the Internet. These types of companies sell only the copies, but not the actual resource. You would still need an Inventory Table so that customers can see what products are available for sale. The Inventory table is almost the same as that for businesses that sell merchandise. The difference is that there is no need for attributes such as quantity on hand, quantity available, and reorder point and reorder quantity because they are only selling copies.
Rental Transactions Some businesses rent items rather than selling them. This involves only the temporary use of a resource. Thus, the rental transaction involves receipt of the returned item and receipt of cash. Figure 21-5 on page 692 provides an REA diagram for a partial revenue cycle for rental transactions. Businesses need to track each rental item or equipment separately. The primary key for rental equipment would be the serial number. Attributes in the Rental Inventory table would include the date and time it was rented, rental price, and terms of the rental agreement. Figure 21-5 shows that the Rent Item event is linked to both the Receive Cash and Return Item events. The minimum cardinality of 1 reflects that customers normally pay first. The maximum cardinality is N because there may be additional charges when an item is returned. The cardinality from the Receive Cash event to the Rent Item event is a minimum of 0 and maximum of 1. The relationship between the Rent Item and Return Item events is 1:1.
Additional Expenditure Cycle Modeling Topics Figure 21-2 presents an expanded expenditure cycle REA diagram that includes internal requests for purchases. Table 21-2 on page 689 provides the corresponding tables. Table 21-2 shows cost information is stored in several tables. By storing the cost of each order with the quantity purchased, the system can calculate the actual cost of ending inventory and the cost of goods sold according to any accepted inventory valuation method (LIFO, FIFO, weighted-average, or specific identification).
21-4 .
Additional Events Figure 21-4 on page 691 is similar to the REA diagram in 20-2, except that we have one new event, Request Inventory at the beginning of the REA diagram. There is also one new corresponding table, Request Inventory. Request Inventory event provides a way to collect data about the request sent by activities or departments to the purchasing department. The cardinality pair from the Request Inventory event to the Order event has a minimum cardinality of 0 and maximum of N. The 0 minimum reflects the fact that the purchase request occurs before the purchase order. The N maximum reflects the fact that some requests involve items from more than one vendor, requiring more than one purchase order. Going back to the Request Inventory event from the Order event also has a 0 minimum and N maximum.
Attribute Placement There is only one attribute, Quantity Requested, in the new table, Inventory-Request_Inventory. The unit costs and quantity-on-hand attributes are provided in the Inventory Table. The quantity ordered attribute is provided in the Inventory-Order_Inventory Table. This will be needed in calculating the cost of goods sold and the inventory value as various valuation methods (FIFO, LIFO, weighted-average, or specific identification).
New REA Feature—M:N Agent-Event Relationships Figure 21-2 depicts the relationship between the Receive Inventory event and employees as being M:N. This reflects the fact that many deliveries involve large quantities which will require several employees. Receiving inventory involves Receiving and Warehouse employees.
New REA Feature—Locations The locations involved include: 1. The activity or department where the order was requested 2. The purchasing department where the order was placed 3. The receiving department 4. The warehouse
21-5 .
The cardinality pair from the Warehouse to the Inventory resource has a 0 minimum and N maximum. If the same inventory items are stored in more than one warehouse, the maximum cardinality from Inventory to Warehouse is N. The minimum cardinality from the Cash Resource to Financial Institutions is 0; the maximum cardinality is 1.
New REA Feature—Relationships Between Resources and Agents Figure 21-2 includes a relationship between the Inventory resource entity and the Supplier agent entity.
Acquisition of Intangible Services Organizations acquire various intangible services, such as Internet access, telephone service, and utilities. Payments for these services are included in the Disburse Cash table. Acquisition of these services is included in the Acquire Services table. The relationship between the acquisition event and the resource entity is modeled as 1:N because in most cases each service is acquired from a different supplier.
Rental Transactions Many organizations rent office spaces and warehouses. Information about the payment event is included in the Disburse Cash table. A separate Rent Resource event may be created to represent the acquisition of the resource. Rented and owned resources may be represented in separate entities. In addition, if the rented resource must be returned, then another event will need to be included in the REA diagram. In that case, the Rent Resource event would be linked to two events: 1) Disburse Cash and 2) the Return of the resource. Multiple Choice 1 The relationship from Take Customer Order to Salesperson is a maximum cardinality of _____ and minimum cardinality of _____. a. 1; N b. 0; N c. M; N d. 1; 1
21-6 .
Multiple Choice 2 The Picking Ticket Number is the primary key in the _____ table and the foreign key in the _____ table. a. Take Customer Order; Fill Customer Order b. Fill Customer Order; Ship Order c. Ship Order; Fill Customer Order d. Call on Customers; Fill Customer Order Multiple Choice 3 In the REA diagram for services, the minimum cardinality from the Sales event to the Inventory Resource is _____ and the minimum cardinality from the Sales event to the Services entity is _____. a. 0; 0 b. 1; 0 c. 0; 1 d. 1; 1 Multiple Choice 4 For rental transactions, the primary key for the rental inventory table would be a(n) _____. a. inventory line number b. part number c. serial number d. A and C Multiple Choice 5 In the expenditure cycle, the relationship between the Receive Inventory event and receiving employee is: a. M:N b. 1:N c. 1:1 d. M:1
Learning Objective Two Extend REA diagrams to include information about employee roles, M:N agent-event relationships, locations, and relationships between resources and agents.
Additional REA Features Figures 21-1 and 21-2 also depict additional REA features: Employee Roles are identified in Figures 21-1 and 21-2; however, in Tables 21-1 and 21-2 there is only one employee entity. Information
21-7 .
about job role is simply an attribute (job title) in the Employee table. M:N Agent-Event Relationships occur whenever an activity is performed by more than one employee and management wants the ability to monitor each individual’s performance. An example is shown in Figure 21-2 with the relationship between Receive Inventory and Employees. Locations are shown in Figure 21-2 in two new entities: Warehouses and Financial Institutions. For example, linking the warehouse location in the Warehouse entity to the Receive Inventory event allows management to evaluate performance of different locations. A M:N relationship between the Inventory entity (Resource) and Supplier entity (Agent) is a way to identify preferred and alternative suppliers. Multiple Choice 6 In the expenditure cycle, a M:N relationship between Inventory and Supplier entities represents: a. Inventory can be purchased from preferred suppliers only. b. Inventory can be purchased from preferred suppliers or alternative suppliers. c. Inventory can be purchased from alternative suppliers only. d. None of the above.
Learning Objective Three Understand and create an REA diagram for the production cycle.
Production Cycle REA Model Figure 21-6 provides a partial REA diagram for the Production Cycle. Table 21-3 provides the corresponding tables. There are four main events in a production cycle REA diagram: 1. Issuance of raw materials 2. Use of labor in production 3. Use of machinery and equipment in production 4. Production of new finished products, represented by the work-inprocess event
Additional Entities—Intellectual Property
21-8 .
Figure 21-6 on page 694 includes three special types of resource entities; 1) the Bill of Materials, 2) the Job Operations List, and 3) the Machine Operations List. The Bill of Materials has relationships with Raw Materials and Finished Goods. The cardinality relationship from Bill of Materials to Raw Materials resource is a minimum of 1 and a maximum of 1. The cardinality relationship from Bill of Materials to Finished Goods Inventory resource is a minimum of 1 and a maximum of 1. The Job Operations List has relationships with Perform Job Operations event and Finished Goods Inventory resource. The cardinality relationship from Job Operations List to Perform Job Operations is a minimum of 0 and a maximum of N. The cardinality relationship from Job Operations List to Finished Goods Inventory is a minimum of 1 and a maximum of 1. The Machine Operations List resource has relationships with Perform Machine Operations event and Finished Goods Inventory resource. The cardinality relationship from Machine Operations List to Perform Machine Operations is a minimum of 0 and a maximum of N. The cardinality relationship from Machine Operations List to Finished Goods Inventory is a minimum of 1 and a maximum of 1. Note that Figure 21-6 also includes an entity titled “Employee Time.”
Production Cycle Events Data about actual raw materials used in production is stored in the Raw Materials Issuance entity. Information about the actual labor and machine operations performed are stored in the Job Operations and Machine Operations entities, respectively. The Job Operations event entity is an example of a Give Resource event. The Machine Operations event records information about the use of a specific piece of machinery or equipment. Note that the Machine Operations event is not used to record depreciation.
21-9 .
Figure 21-6 models the relationships between the Job Operations event and the Job Operations List entity, and between the Machine Operations event and the Machine Operations List entity, as being 1:N. The Work-in-Process entity is used to collect and summarize data about the raw materials, labor, and machine operations used to produce a batch of goods. The relationship between Work-in-Process and those three event entities are all 1:N. Thus, three Give Resource events are related to one Get Resource event. Note that Figure 21-6 shows only one agent associated with the Job Operations event.
New REA Feature—Relationships Between Agents There is a 1:N relationship between employees and supervisors. This reflects the fact that each employee is assigned to a specific supervisor and the fact that many employees are assigned to one supervisor. Relationships between internal agents may be created to model lines of responsibilities. There can also be relationships with external agents. For example, companies may assign customers to specific employees.
Multiple Choice 7 Which main event is not included in the production cycle REA diagram? a. Issuance of raw materials b. Allocation of factory overhead c. Use of machinery and equipment in production d. All of the above e. A and C Multiple Choice 8 For the production cycle, the Equipment ID number primary key in the Equipment table is also the foreign key in the _____ table. a. Job Operations List b. Perform Job Operations c. Perform Machine Operations d. Work in Process
Learning Objective Four Understand and create an REA diagram for the HR/payroll cycle.
21-10 .
Combined HR/Payroll Data Model Figure 21-7 integrates the payroll and HR activities. The Time Worked event is necessary to calculate payroll. The Time Used event is used for cost accounting, to properly assign labor costs. All other events represent HR activities.
HR Cycle Entities The Employee entity is linked to almost every other entity in the diagram. The Employee entity stores much of the data typically found in the employee master file. The Skills entity contains data about the different job skills of interest to the organization. The relationship between Skills and Employees is modeled as being M:N because one employee may possess a number of job skills and several employees may possess the same skill. The Training event entity represents the various workshops, training programs, and other opportunities provided for employees to develop and maintain their skills. The relationship between the Employees and Training entities is M:N. The relationship between the Skills and Training entities is 1:N. The Recruiting event entity stores data about activities performed to notify the public of job openings. The M:N relationship between Skills and Recruiting reflects the fact that each advertisement may seek several specific skills and that, over time, there may be several advertisements for a given skill. The relationship between the Recruiting event and Job Applicants is modeled as being M:N. The Interview event stores detailed data about each job interview. It is linked to the Hire Employees event in a 1:N relationship.
Tracking Employees’ Time It is instructive to compare the information provided by the Time Used event to that provided by linking specific business events to the employee agent who performed that task. Regular event-agent relationships, such as that between sales and employees, collect data to answer such questions as: How much did salesperson X sell this week?
21-11 .
How many sales did each salesperson make? The Time Used event provides the information needed to answer such questions as: How much time did a particular salesperson spend calling in customers, as opposed to providing customer service support via the telephone? Not every organization collects detailed data about their employees’ use of time. Moreover, even when such an event is included, the resource that is used (Employee Time) is seldom implemented because there are no meaningful attributes to describe. Multiple Choice 9 The relationship between the Skills and Training entities is a. M:N b. 1:1 c. 1:N d. 0:1
Learning Objective Three Understand and create an REA diagram for the financing cycle.
Financing Activities Data Model Figure 21-8 on page 699 provides a partial financial activities’ REA diagram. The event Issue Debt is connected to the Cash resource entity. It is often modeled as a separate event entity because it contains attributes different from those associated with cash receipts that arise from the Sales event. The Transfer Agent maintains the necessary information about individual creditors to direct the interest payments and payment of the principal. Issue Debt event contains data about the aggregate amount received from issuing a set of debt instruments. For example, the issuance of $10,000,000 5% bonds which were purchased for $9,954,000, constitutes on Issue Debt event. Usually, the organization writes one check for the total amount of interest owed and sends that to the transfer agent. The transfer agent then distributes individual checks to each credit holder. In our example, the company would send $125,000 to the transfer agent for the first quarter payment on the $10,000,000 bonds. 21-12 .
The transfer of funds would be recorded as one row in the Disburse Cash table. The cardinality of the relationship from the Disburse Cash event to the Issue Debt event has a 1 maximum. The minimum cardinality is 0. Equity transactions are modeled in a manner similar to debt transactions. Most companies do not deal direct with stockholders. Figure 21-8 shows that both types of equity transactions involve participation by an employee (the treasurer) and the external transfer agent. The Disburse Cash and Issue Stock events are modeled as being M:N. The minimum cardinalities are 0 in both directions.
Multiple Choice 10 The _____ in the financing activities REA diagram contains data about the aggregate amount received from issuing debt instruments. a. Transfer Agent b. Issue Debt c. Disburse Cash d. None of the above
Answer to Multiple Choice Questions: Multiple Choice Question Answers Number Answer Number Answer 1 D 6 B 2 B 7 B 3 C 8 C 4 C 9 C 5 A 10 B
21-13 .
CHAPTER 22 INTRODUCTION TO SYSTEMS DEVELOPMENT AND SYSTEMS ANALYSIS Instructor’s Manual Learning Objectives: 1. Explain the five phases of the systems development life cycle, and discuss the people involved in systems development and the roles they play. 2. Explain the importance of systems development planning, and describe the types of plans and planning techniques used. 3. Discuss the various types of feasibility analysis, and calculate economic feasibility using capital budgeting techniques. 4. Explain why systems changes trigger behavioral reactions, what form does this resistance to change take, and how to avoid or minimize the resulting problems. 5. Discuss the key issues, objectives, and steps in systems analysis. Questions to be addressed in this chapter include: 1. What process must be followed to obtain and implement a new system? 2. What planning is necessary to ensure the system’s success? Who will be involved, and how? Do special committees need to be formed? What resources are needed? How should the planning be documented? 3. How will employees react to a new system? What problems might this change cause, and how can they be minimized? 4. How should the new system be “sold” to top management? How can expected costs and benefits be quantified to determine whether the system will be cost-effective?
Introduction Companies in a very competitive global business world are constantly looking for new, faster, and more reliable ways of obtaining information. Companies usually change their systems for one of the following reasons: 1. Changes in user or business needs 2. Technological changes 3. Improved business processes
22-1 .
4. Competitive advantage 5. Productivity gains 6. Growth 7. Downsizing 8. Systems integration 9. Systems age and need to be replaced Developing quality, error-free software is a difficult, expensive, and time-consuming task. Most software development projects deliver less than one expects, and take more time and money than expected. Developers start cutting corners by omitting some of the basic systems development steps. Omitting these steps will only lead to disaster. This is illustrated by the following statistics: 1. An American Management Systems study revealed that 75% of all large systems are not used, not used as intended, or generate meaningless reports or inaccurate data. 2. A Standish Group International study found that
More than 70% of software development projects are delivered late.
54% were over budget.
66% were unsuccessful.
30% were cancelled before they were completed.
Runaways can consume a great deal of time and money, and in the end produce no usable results, as illustrated by the following examples: 1. Pacific Gas & Electric (PG&E) pulled the plug on a client/server information system for all of its residential and commercial customers. People in and out of the utility labeled the system, five years in development, and a financial disaster with no end product. 2. California’s Department of Motor Vehicles decided to overhaul its system, which was originally developed in 1965. It took an equivalent of 18 programmers working for an entire year to add a Social Security number file to the drivers’ license and vehicle registration file. After seven years, $44 million, and not a single usable application, the state canceled the project.
22-2 .
Focus 22-1 on page 720 illustrates how the IRS made attempts to replace its aging system. The IRS concluded that it needed to modernize its 40-year-old computer system and operations. The system is responsible for processing and storing all taxpayer records and currently takes in more than $2 trillion a year. Critics claimed that the system had already been updated, fixed, and improved so many times that a software meltdown is a real possibility. What effect would this collapse have on the U.S. Government? In the worst case scenario: 1. The IRS would not be able to tell who had paid their taxes. 2. Tax revenues, hundreds of billions of dollars’ worth, would not be collected. 3. To meet its obligation, the government would have to borrow money, throwing the financial markets into a panic. A number of years ago, the IRS spent $3.3 billion on an upgrade effort that failed. In the late 1990s, the IRS embarked on an $8 billion effort called the Business Systems Modernization (BSM) program. The BSM spent almost $4 million on a project that was never finished and was eventually cancelled.
22-3 .
Learning Objective One Explain the five phases of the systems development life cycle, and discuss the people involved in systems development and the roles they play.
Systems Development Whether systems changes are major or minor, most companies go through a systems development life cycle.
The Systems Development Life Cycle Figure 22-1 on page 721 provides the five step process for the Systems Development Life Cycle (SDLC): 1. Systems Analysis
The information needed to purchase or develop a new system is gathered.
Requests for systems development are prioritized.
If a project passes, the current system is surveyed to define the nature and scope of the project and to identify its strengths and weaknesses.
Then an in-depth study of the proposed system is conducted to determine its feasibility.
If the system is found feasible, the information needs of system users and managers are identified and documented.
A report based on the needs and systems requirements is prepared and submitted to the information systems steering committee.
2. Conceptual Design During the conceptual design, the company decides how to meet user needs. The first step is to identify and evaluate appropriate design alternatives:
Purchase the software.
Develop the software in-house.
Outsource system development to someone else.
22-4 .
3. Physical Design
Input and output documents are designed.
Computer programs are written.
Files and databases are created.
Procedures are developed.
Controls are built into the new system.
4. Implementation and Conversion Implementation and conversion constitute the capstone phase during which all the elements and activities of the system come together. New hardware or software is installed and tested. Standards and controls for the new system are established and system documentation completed. The final step is to deliver the operational system to the organization. A final report is sent to the information systems steering committee. 5. Operations and Maintenance Modifications are made as problems arise or as new needs become evident. It is important to note that throughout the SDLC three activities (planning, managing behavioral reactions to change, and assessing the ongoing feasibility of the project) are performed. Multiple Choice 1 Which activity is performed throughout the SDLC? a. Planning b. Budgeting c. Managing behavioral reactions to change d. B and C Multiple Choice 2 In the IRS’s attempts to replace its aging information system, it lost almost _____ million on the BSM project. a. $1.2 b. $2.5 c. $3.0 d. $4.0
22-5 .
Multiple Choice 3 The following are the five steps in the systems development life cycle: 1. Implementation and Conversion 2. Conceptual Design 3. Systems Analysis 4. Operations and Maintenance 5. Physical Design The correct order in which these steps occur is: a. 1, 2, 3, 4, 5 b. 2, 4, 3, 1, 5 c. 3, 2, 5, 1, 4 d. 4, 2, 3, 5, 1
The Players Management Top management’s most important roles are providing support and encouragement for the development projects. The principal roles of user management are to determine information requirements, to assist systems analysts, to assign key staff members to development projects, and to allocate appropriate funds. Users AIS users communicate their information needs to system developers. Users that are members of the project development team or steering committee help manage systems development. Accountants, as requested, have a role in designing system controls and periodically monitoring and testing the system. Information Systems Steering Committee The purpose of the information systems steering committee is to plan and oversee the information systems function. The steering committee sets policies that govern the AIS and ensures top-management participation, guidance, and control. Project Development Team Each development project has a team of systems specialists, managers, accountants and auditors, and users that guides its development. Team members plan each project, monitor the project, make sure proper consideration is given to the human element, and communicate project status to top management and the steering committee. 22-6 .
Systems Analysts and Programmers Systems analysts study existing systems, design new ones, and prepare specifications that are used by computer programmers. Computer programmers write programs using the specifications developed by the analysts. External players are customers and vendors who may play a role in the system development (e.g. EDI). Multiple Choice 4 Which of the following statement(s) is (are) TRUE? a. Management assists the project development team. b. The steering committee sets policies that govern the AIS. c. Accountants may play two roles during the systems design. d. The project development team designs new systems.
Learning Objective Two Explain the importance of systems development planning, and describe the types of plans and planning techniques used.
Planning Systems Development As shown in Figure 22-1 several activities must be performed at various times throughout the SDLC. One such activity is planning. Systems development planning is an important step for the following key reasons: 1. Consistency. Planning enables the system’s goals and objectives to correspond to the organization’s overall strategic plan. 2. Efficiency. Systems are more efficient, subsystems are coordinated, and there is a sound basis for selecting new applications for development. 3. Cutting edge. The company remains abreast of the ever-present changes in information technology. 4. Lower costs. Duplication, wasted effort, and cost and time overruns are avoided. The system is less costly and easier to maintain. 5. Adaptability. Management is better prepared for future resource needs, and employees are better prepared for the changes that will occur.
22-7 .
Poorly planned development efforts result in a company returning to the prior phase to correct errors and design flaws. This process is costly and results in delays, not to mention frustration and low morale. Figure 22-2 on page 723 lists reasons for returning to a prior SDLC phase. Two types of systems development plans are needed: 1) individual project plans prepared by project teams and 2) a master plan developed by the information systems steering committee. 1.
Project Development Plan The basic building block of information systems planning is the project development plan. Each project development plan contains 1) a cost/benefit analysis, 2) developmental and operational requirements, and 3) human resource, hardware, software and financial resource requirements.
2.
The Master Plan A master plan is a long-range planning document that specifies:
What the system will consist of
How it will be developed
Who will develop it
How needed resources will be acquired
Where the AIS headed
Focus 22-2 on page 724 explains why inadequate planning was one of the reasons why EDS lost a significant amount of money in its contract with the U.S. military. The U.S. military hired Electronic Data Systems to develop a secure, hacker-proof network to link almost 350,000 computers at more than 4,000 Navy sites. However, the almost $10 billion contract has resulted in significant headaches and losses at one point estimated to total almost $1.7 billion. EDS made the following mistakes: 1. Had little previous experience with the military and did not adequately plan for some of the requests 2. Did not verify Navy estimates 3. Did not properly plan and coordinate project tasks
22-8 .
4. Did not give the Navy adequate instructions 5. Did not track the inventory of computers
Planning Techniques Two techniques for scheduling and monitoring systems development activities are the program evaluation and review technique (PERT) and the GANTT Chart. The PERT requires that all activities and the precedent and subsequent relationships among them be identified. Completion time estimates are made, and the critical path—the path requiring the greatest amount of time—is determined. Below is an example of a PERT chart. The numbers represent weeks.
The critical path is A(5) + D(4) + G(9) = 18 weeks. A Gantt chart shown as Figure 22-3 on page 725 is a project scheduling technique that divides each project into activities with estimated start and completion times. Multiple Choice 5 The types of systems development plans that are needed include: a. Project development plan b. A master plan c. A recovery plan d. A and B e. B and C Multiple Choice 6 In a master plan, a planning horizon of approximately _____ years is reasonable, and the plan should be updated at least _____ a year. a. 3; 2 to 3 times b. 4; once c. 3; 1 to 2 times d. 4; 2 to 3 times 22-9 .
Learning Objective Three Explain the various types of feasibility analysis, and calculate economic feasibility using capital budgeting techniques.
Feasibility Analysis As shown in Figure 22-1, a feasibility study (also called a “business case”) is prepared during systems analysis and updated as necessary during the remaining steps in the SDLC. At major decision points (refer to Figure 22-1), the steering committee uses the study to decide whether to terminate a project, proceed unconditionally, or proceed if specific problems are resolved. Although uncommon, systems have been scrapped after implementation because they did not work or failed to meet an organization’s needs. For example, Bank of America hired a software firm to replace a 20-year-old batch system used to manage billions of dollars in institutional trust accounts. After two years the new system was implemented despite warnings that it was not adequately tested. Ten months later the system was scrapped, the bank’s top systems and trust executives had resigned, and the company had taken a $60 million write-off to cover expenses. During the ten months, the company lost 100 institutional accounts with $4 billion in assets. Focus 22-3 on page 726 describes a project at Blue Cross/Blue Shield that was scrapped after six years of work and a $120 million investment. Five important aspects to be considered during a feasibility study are as follows: 1.
Economic feasibility. Will system benefits justify the time, money, and other resources required to implement it?
2.
Technical feasibility. Can the planned system be developed and implemented using existing technology?
3.
Legal feasibility. Does the system comply with all applicable federal and state laws and statutes, administrative agency regulations, and the company’s contractual obligations?
4.
Scheduling feasibility. Can the system be developed and implemented in the time allotted?
22-10 .
5.
Operational feasibility. Does the organization have access to people who can design, implement, and operate the proposed system? Will people use the system?
Calculating Economic Feasibility Costs and Benefits The basic framework for feasibility analysis is the capital budgeting model, in which cost savings and other benefits as well as initial outlay costs, operating costs, and other cash outflows, are translated into dollar estimates. Some of the tangible and intangible benefits a company might obtain from a new system are cost savings; improved customer service, productivity, decision making, and data processing; better management control; and increased job satisfaction and employee morale. Equipment costs are an initial outlay cost if the system is purchased and an operating cost if rented or leased. The primary operating cost is maintaining the system. Studies show that between 65% and 75% of an organization’s systems efforts are spent in maintaining current information systems. Initial outlay and operating costs are summarized in Table 22-2 on page 727. 1.
Hardware
2.
Software
3.
Staff
4.
Supplies and overhead
5.
Maintenance/backup
6.
Documentation
7.
Site preparation
8.
Installation
9.
Conversion
10. Financial
Capital Budgeting Various feasibility measures are used to narrow the list of alternative approaches that meet system requirements. The following are three commonly used capital budgeting techniques: 1.
Payback period. This is the number of years required for the net savings to equal the initial cost of the investment.
22-11 .
2.
Net present value (NPV). All estimated future cash flows are discounted back to the present, using a discount rate that reflects the time value of money.
3.
Internal rate of return (IRR). The IRR is the effective interest rate that results in an NPV of zero. A project’s IRR is compared with a minimum acceptable rate to determine acceptance or rejection.
Multiple Choice 7 _____ project was scrapped after 6 years of work and a $120 million investment. a. Nike’s b. Bank of America’s c. Blue Cross/Blue Shield’s d. None of the above Multiple Choice 8 The capital budgeting technique that considers the time value of money is: a. Payback period b. IRR c. NPV d. SDLC
Learning Objective Four Explain why systems changes trigger behavioral reactions, what forms this resistance to change takes, and how to avoid or minimize the resulting problems.
Behavioral Aspects of Change The behavioral aspects of change are crucial, because the best system will fail without the support of the people it serves. Organizations must be sensitive to and consider the feelings and reactions of persons affected by change.
Why Behavioral Problems Occur To minimize adverse behavioral reactions, one must first understand why resistance takes place. Some of the more important factors include the following: 1. Fear. Many people fear the unknown and the uncertainty accompanying change. They also fear losing their jobs, losing respect or status, failure, technology, and automation.
22-12 .
2. Top-management support. Employees who sense a lack of topmanagement support for change wonder why they themselves should endorse it. 3. Experience with prior changes. Employees who had a bad experience with prior changes are more reluctant to cooperate when future changes occur. 4. Communication. Employees are unlikely to support a change unless the reasons behind it are explained. 5. Disruptive nature of the change process. Requests for information and interviews are distracting and place additional burdens on people. These disturbances can create negative feelings toward the change that prompted them to occur. 6. Manner in which change is introduced. Resistance is often a reaction to the methods of instituting change rather than to change itself. 7. Biases and emotions. People with emotional attachments to their duties or coworkers may not want to change if those elements are affected. 8. Personal characteristics and background. Generally speaking, the younger and more highly educated people are, the more likely they are to accept change.
How People Resist AIS Changes Focus 22-4 on Page 729 explains the resistance to change that the U.S. Department of Defense has experienced in trying to update its information systems. Major resistance often takes one of three forms: aggression, projection, or avoidance. 1. Aggression is behavior that is usually intended to destroy, cripple, or weaken the system’s effectiveness. It may take the form of increased error rates, disruptions, or deliberate sabotage. 2. Projection involves blaming the new system for any and every unpleasant occurrence. 3. Dealing with problems through avoidance is a common human trait. One way for employees to deal with a new AIS is to avoid using it in the hope that the problem can be ignored or that it will eventually go away.
Preventing Behavioral Problems People’s reactions to change can be improved by observing the following guidelines:
22-13 .
1.
Obtain management support. When possible, a powerful champion, who can provide resources for the system and motivate others to assist and cooperate with systems development, should be appointed.
2.
Involve users. Those that are affected by the system should participate in its development, making suggestions, and helping make decisions.
3.
Allay fears, and stress new opportunities. The organization should provide assurances that no major job losses or responsibility shifts will occur.
4.
Meet users’ needs. It is essential that the form, content, and volume of system output be designed to satisfy user needs.
5.
Avoid emotionalism. When logic vies with emotion, it rarely stands a chance. Emotional issues related to change should be allowed to cool, handled in a nonconfrontational manner, or sidestepped.
6.
Provide training. Effective use or support cannot be obtained if users are confused about or do not understand the system.
7.
Reexamine performance evaluation. Users’ performance standards and criteria should be reevaluated to ensure that they are satisfactory in view of changes brought on by the new system.
8.
Keep communication lines open. Managers and users should be fully informed of system changes as soon as possible.
9.
Test the system. The system should be properly tested prior to implementation to minimize initial bad impressions.
10. Keep the system simple and humanize it. Avoid complex systems that cause radical changes. Make the change seem as simple as possible by conforming to existing organizational procedures. System acceptance is unlikely if individuals believe the computer is controlling them or has usurped their positions. 11. Control users’ expectations. A system is sold too well if users have unrealistic expectations of its capabilities and performance. Be realistic when describing the merits of the system. Multiple Choice 9 Some of the reasons why employees resist new systems include(s): a. Fear b. Communications c. Promotions d. All of the above e. A and B 22-14 .
Learning Objective Five Discuss the key issues, objectives, and steps in systems analysis.
Systems Analysis When a new or improved system is needed, a written request for systems development is prepared. The five steps in the analysis phase and their objectives are shown in Figure 22-4 on page 731 and discussed in this section.
Initial Investigation An initial investigation is conducted to screen projects. During the initial investigation, the exact nature of the problem(s) under review must be determined. The project’s scope (what it should and should not seek to accomplish) also must be determined. If a project is approved, a proposal to conduct systems analysis is prepared. Table 22-3 on page 731 provides the contents of the Shoppers Mart proposal, representative of the information in a proposal to conduct systems analysis.
Systems Survey During the systems survey, an extensive study of the current AIS is undertaken. The objectives of a systems survey are as follows: 1. Gain a thorough understanding of company operations, policies, and procedures; data and information flow; AIS strengths and weaknesses; and available hardware, software, and personnel. 2. Make preliminary assessments of current and future processing needs, and determine the extent and nature of the changes needed. 3. Develop working relationships with users and build support for the AIS. 4. Collect data that identify user needs, conduct a feasibility analysis, and make recommendations to management.
22-15 .
The advantages and disadvantages of four common methods of gathering data are summarized here and in Table 22-4 on page 732. 1. Interviews An interview helps gather answers to “why” questions:
Why is there a problem? Why does the AIS work this way? Why is this information important?
2. Questionnaires Questionnaires are used when the amount of information to be gathered is small and well defined, and is obtained from many people. Questionnaires take relatively little time to administer, but are time consuming to develop. 3. Observation Observation is used to verify information gathered using other approaches and to determine how a system actually works, rather than how it should work. 4. Systems documentation Systems documentation describes how the AIS is intended to work. Document Findings and Model the Existing System The information gathered during the analysis phase must be documented so it can be used throughout the systems development project. Physical models illustrate how a system functions by describing the flow of documents, the computer processes performed and the people performing them, the equipment used, and any other physical elements of the system. Logical models illustrate what is being done, regardless of how the flow is actually accomplished. Table 22-5 on page 733 provides a list of system analysis and design tool techniques. Analyze the Existing System Once data gathering is complete, the survey team evaluates the AIS’s strengths and weaknesses to develop ideas for designing and structuring the new AIS. Prepare Systems Survey Report The systems survey culminates with a systems survey report. Table 22-3 shows the table of contents for the Shoppers Mart systems survey report.
22-16 .
Feasibility Study At this point in systems analysis, a more thorough feasibility analysis is conducted to determine the project’s viability.
Information Needs and Systems Requirements Once a project is deemed feasible, the company identifies the information needs of AIS users and documents systems requirements. Table 22-6 on page 734 is an example of systems requirements. Figure 22-5 on page 734 is a humorous view of the types of communication problems associated with this process. To illustrate the importance of accurately determining systems requirements, consider the example of Corning Corporation. The company began investigating the quality of the ophthalmic pressings it manufactures and sells to the makers of prescription lenses. It found that 35% of its drafting documents contained errors. It costs $250 if the errors were discovered before the tool makers cut the tools, $20,000 if discovered before the assembly line began production, and up to $100,000 after the tools were sent to the customer. Systems Objectives and Constraints Many organizations take a systems approach to determining information needs and system requirements. It is important to determine system objectives so that analysts and users can focus on those elements most vital to the AIS’s success. Table 22-7 on page 735 provides the list of AIS objectives. Organizational constraints usually make it impossible to develop all parts of a new AIS simultaneously. Therefore, the system is divided into smaller subsystems or modules. A system’s success often depends on the project team’s ability to cope with the constraints the organization faces. Common constraints include: 1. Governmental agency requirements 2. Management policies and guidelines 3. Lack of sufficiently qualified staff 4. The capabilities and attitudes of system users 5. Available technology
22-17 .
6. Limited financial resources Strategies for Determining Requirements 1.
Ask users what they need.
2.
Analyze external systems.
3.
Examine existing system use.
4.
Create a prototype.
Documentation and Approval of User Requirements Detailed requirements for the new AIS that explain exactly what the system must produce should be created and documented. The requirements list should be supported by sample input and output forms, as well as charts, to make it easier for readers to conceptualize the system. When user requirements have been determined and documented, the project team meets with the users.
Systems Analysis Report Systems analysis is concluded by preparing a systems analysis report to summarize and document the analysis activities and serve as a repository of data from which systems designers can draw. A go/no go decision may be made up to three times during systems analysis: 1. During the initial investigation 2. At the end of the feasibility study 3. At the completion of the analysis phase
Multiple Choice 10 Questionnaires are conducted during the _____ step in systems analysis. a. feasibility study b. systems survey c. initial investigation d. None of the above
22-18 .
Answer to Multiple Choice Questions: Multiple Choice Question Answers Number Answer Number Answer 1 D 6 A 2 D 7 C 3 C 8 C 4 B 9 E 5 D 10 B
22-19 .
CHAPTER 23 AIS DEVELOPMENT STRATEGIES Instructor’s Manual Learning Objectives: 1. Describe how organizations purchase application software, vendor services, and hardware. 2. Explain how information system departments develop custom software. 3. Explain why organizations outsource their information systems, and evaluate the benefits and risks of this strategy. 4. Explain how business process management (BPM), prototyping, agile development, and computer-aided software engineering can help improve system development.
Questions to be addressed in this chapter include: 1. Can Ann buy the software she needs? If so, how should she buy hardware and software and select a vendor? 2. How do companies develop software in-house? Is this the best approach for SM? 3. How extensively should SM use end-user-developed software? 4. Should SM improve its existing system or redesign its business processes and develop a system to support them? 5. Is outsourcing the information system a viable alternative to obtaining a new system? Do the benefits of outsourcing outweigh its risks? 6. If SM decides to develop the system in-house, should it use technologies such as BPM, agile development, prototyping, or computer-assisted software engineering?
Introduction Traditionally, companies have experienced the following difficulties in developing an AIS: 1. Demands for development resources are so numerous that AIS projects can be backlogged for several years. 2. A newly designed AIS does not always meet user needs. 3. The development process can take so long that the system no longer meets company needs. 4. Users are unable to specify their needs adequately. 23-1 .
5. Changes to the AIS are often difficult to make after requirements have been frozen into specifications.
Learning Objective One Describe how organizations purchase application software, vendor services, and hardware.
Purchasing Software A Deloitte & Touche survey found that most chief information officers expect to replace their current systems with commercially available packages rather than use custom-developed software. Consider the following examples: 1. Hard Rock Café International wanted to get its customers to visit its cafes and website more often. It purchased customer relationship software from Epiphany, obtained 225,000 customer names from its fan club, and mailed special promotional offers. In less than a year, the profits from the increased traffic had more than paid for the hardware and software it purchased to run the promotions. 2. WellPoint Health Networks installed PeopleSoft’s payroll, benefits, and human resources software to allow its employees to manage their own benefit enrollments and changes. The new system is saving the company $400,000 a year. 3. Pacific Gas & Electric had to respond to the deregulation of California’s power industry. Rather than try and update its 37-year-old customer information system, it spent three years and invested $204 million in canned software. This project was the largest installation of customer information system software in the history of the utility industry. Written by software development companies, canned software is sold on the open market to a broad range of users with similar requirements. Some companies combine software and hardware and sell them as a package. These are called turnkey systems. A major problem with canned software is that it often does not meet all of a company’s information or data processing needs. The Internet has given companies a new way to acquire software. Application service providers (ASPs) host Web-based software on their computers and deliver the software to their clients over the Internet.
23-2 .
Selecting a Vendor Decisions to make or purchase software can be made independently of the decision to acquire hardware, service, maintenance, and other AIS resources. Vendors can be found by referrals, attending conferences, in industry magazines, and on the Internet.
Acquiring Hardware and Software Once AIS requirements have been defined, an organization is ready to purchase software and hardware. Companies that are buying large or complex systems, however, send vendors a request for proposal (RFP), which is an invitation to propose a system that meets the company’s needs by a specified date. A formal approach to acquiring system resources, such as an RFP, is important for the following reasons: 1. Saves time. The same information is provided to all vendors, eliminating repetitive interviews and questions. 2. Simplifies the decision-making process. All responses are in the same format and based on the same information. 3. Reduces errors. The chances of overlooking important factors are reduced. 4. Avoids potential for disagreement. Both parties possess the same expectations, and pertinent information is captured in writing. When an RFP is solicited based on exact hardware and software specifications, the total costs are usually lower and less time is required for vendor preparation and company evaluation. Generally speaking, the more information a company provides to a vendor, the better the company’s chances of receiving a system that meets its requirements.
Evaluating Proposals and Selecting a System Proposals that are missing important information, fail to meet minimum requirements, or are ambiguous should be eliminated. Proposals that pass this preliminary screening should be carefully compared with the proposed AIS requirements to determine: 1. If they meet all mandatory requirements 2. How many of the desirable requirements they meet Table 23-1 on page 757 presents criteria that can be used to evaluate hardware, software, and vendors.
23-3 .
One way to compare system performance is to use a benchmark problem—a data-processing task with input, processing, and output jobs typical of those the new AIS will be required to perform. Another approach is point scoring, which is illustrated in Table 23-2 on page 758. Requirements costing estimates the cost of purchasing or developing features that are not present in a particular AIS. Neither point scoring nor requirements costing is totally objective. In points scoring, the weights and the points used are assigned subjectively and dollar estimates of costs and benefits are not included. Once the best AIS has been identified, the software should be thoroughly test-driven. The lessons that Geophysical Systems Corporation (GSC) learned from its vendor selection process highlight the importance of a thorough vendor evaluation (see Focus 23-1 on page 758). GSC developed a device that uses sonar to analyze the production potential of oil and gas discoveries. GSC hired and paid Seismograph Service Corporation $20 million to write the software program to analyze the data. However, the software program did not accurately process the data and perform the computations. When the software program failed, GSC’s clients canceled their contracts. The result was that GSC went from sales of $40 million and profits of $6 million to filing for bankruptcy two years later. GSC sued Seismograph and was awarded more than $48 million as compensation for lost profits. Despite the availability of good software packages, many organizations meet their information needs by writing their own software.
Multiple Choice 1 Which of the following statements is FALSE? a. Canned software is sold on the open market to a broad range of users with similar requirements. b. A request for proposal saves time. c. A major problem with canned software is that it often does not meet all of a company’s information or data processing needs. d. WellPoint Health Networks saved $204 million a year with its new system.
23-4 .
Multiple Choice 2 One way to compare system performance is to use _____. a. requirements costing b. point scoring c. a benchmark problem d. turnkey systems
Learning Objective Two Explain how information system departments develop custom software.
Development by In-House IS Departments Developing custom software is difficult and error-prone and it consumes a great deal of time and resources. The U.S. Government Accountability Office (GAO) reported that 31% of the information system projects of the federal government, costing $12 billion (19% of its annual IT budget), are either poorly planned or not living up to their intended objectives. After end users define their requirements, analysts work with them to determine the format of paper and screen outputs. The analysts then identifies the data required for each input and the data to be retained in the files. Custom software is usually developed and written in-house. Chapter 22 discusses in more depth the process used to develop software. The following guidelines are recommended: 1. Carefully select a developer. The outside developer should have experience in the company’s industry, a good understanding of business in general, and an in-depth understanding of how the company conducts its business. 2. Sign a contract. The contract should place responsibility for meeting the company’s requirements on the developer and should allow the company to discontinue the project if certain key conditions are not met. 3. Plan and monitor each step. All aspects of the project should be designed in detail and there should be frequent checkpoints for monitoring the project. 4. Maintain effective communication. The relationship between the company and the developer should be rigorously defined. Frequent communication is necessary.
23-5 .
5. Control all costs. Cost should be tightly controlled and cash outflows minimized until the project has been completed and accepted. There is no single right answer to the build-or-buy decision. Different companies come to different conclusions. For example, Gillette once developed its own software but then decided to shift more from proprietary systems to off-the-shelf software when possible. Pepsi, on the other hand, has moved in the opposite direction. It once bought most of its mainframe software but, after moving to a client/server architecture, it could not find software sophisticated enough to meet its needs.
End-User-Developed Software End-user computing (EUC) is the hands-on development, use, and control of computer-based information systems by users. For example, a savings and loan in California wanted a system to track loan reserve requirements. Its information systems department said the system would take 18 months to develop. Rather than wait, the loan department used a PC and a database program to develop a functional program in a single day.
Appropriate End-User Development and Use End-user development (EUD) occurs when information users, such as managers, accountants, and internal auditors develop their own applications using computer specialists as advisors. The following are examples of appropriate EUDs: 1. Retrieving information from company databases to produce simple reports or to answer one-time queries. 2. Performing “what-if,” sensitivity, or statistical analysis. 3. Developing applications using prewritten software, such as a spreadsheet or a database system. 4. Preparing schedules and lists, such as depreciation schedules, accounts receivable aging, and loan amortizations.
Advantages of End-User Computing One reason EUC has increased so significantly is that it offers the following advantages: 1. User creation, control, and implementation 2. Systems that meet user needs 3. Timeliness 23-6 .
4. Freeing up systems resources 5. Versatility and ease of use
Disadvantages of End-User Computing There are some significant drawbacks to EUC and to eliminating analyst/programmer involvement in the development process. 1. Logic and development errors. End users have little experience in systems development and are more likely to make errors and less likely to recognize when errors have occurred. 2. Inadequately tested applications. Users are not as likely to rigorously test their applications, either because they do not recognize the need to do so or because of the difficulty or time involved. Users have grossly inflated opinions of how error-free their systems are. For example, one of the Big Four CPA firms found that 90% of the spreadsheet models it tested had at least one calculation error. 3. Inefficient systems. Most end users are not programmers and have not been trained in systems development. 4. Poorly controlled and documented systems. Many end users do not implement controls to protect their systems. 5. System incompatibilities. Some companies add end-user equipment without considering the technological implications. For example, Aetna Life & Casualty spent more than $1 billion a year on IT in an attempt to gain a competitive advantage. The result was 50,000 PCs, 2,000 minicomputers and servers, 108 word processing systems, 19 incompatible e-mail systems, and 36 different communications networks. Aetna realized it needed to shift its emphasis from trying to own the latest technology to the effective use of technology. Aetna now uses only a few different types of PCs, Microsoft software products, two electronic mail systems, and one network. 6. Duplication of systems and data and wasted resources. If end users are unaware that other users have similar information needs, duplicate systems occur. 7. Increased costs. A single PC purchase is inexpensive, but buying PCs for hundreds or thousands of workers is costly. 23-7 .
Updating the hardware and software every few years is also expensive.
Managing and Controlling End-User Computing Organizations use several different approaches to manage and control EUC. A help desk can encourage, support, coordinate, and control end-user activities. Duties of the help desk include the following: 1. Providing hotline assistance to help resolve problems 2. Serving as a clearinghouse for information, coordination, and assistance 3. Training end-users how to use specific hardware and software and providing corresponding technical maintenance and support 4. Evaluating new end-user hardware and software products 5. Assisting with application development 6. Developing and implementing standards for:
Hardware and software purchases to ensure compatibility
Documentation and application testing
Controlling security issues such as fraud, software piracy, and viruses
7. Controlling corporate data so:
Authorized end users can access and share it
It is not duplicated
Access to confidential data is restricted
Multiple Choice 3 The following is not an appropriate example of end user development: a. Statistical analysis b. Process payroll c. One-time queries d. None of the above Multiple Choice 4 An advantage of EUC is _____ whereas _____ is a disadvantage. a. development errors; logic errors
23-8 .
b. cost; timeliness c. timeliness; system incompatibility d. ease of use; user control Multiple Choice 5 Aetna Life & Casualty spent more than _____ which resulted in purchasing _____ PCs and _____ minicomputers. a. $1 billion; 50,000; 2,000 b. $1.4 billion; 62,000; 2,750 c. $2 billion; 70,000; 3,500 d. $2.5 billion; 82,000; 4,750
Learning Objective Three Explain why organizations outsource their information systems and evaluate the benefits and risks of this strategy.
Outsourcing the System Outsourcing is hiring an outside company to handle all or part of an organization’s data processing activities. In a mainframe outsourcing agreement, the outsourcers buy their client’s computers and hire all or most of the client’s employees. They then operate and manage the entire system on the client’s site, or they migrate the system to the outsourcer’s computers. In a client/server or a PC outsourcing agreement, an organization outsources a particular service, a segment of its business, a particular function, or PC support. Most Fortune 2000 companies outsource anywhere from 10% to 80% of their PC support functions.
The Growth in Outsourcing Applications Outsourcing was initially used for standardized applications (e.g. payroll). However, Eastman Kodak outsourced its data processing operation and sold its mainframes to IBM. It also outsourced its telecommunications and its PC operations. As a result, capital expenditures for computers fell 90% and operating expenses decreased between 10% and 20%. Kodak expected the annual AIS savings to reach approximately $130 million over a 10-year period.
23-9 .
Several years ago, Xerox signed what was then the largest outsourcing deal in history: a $3.2 billion, 10-year contract with EDS to outsource its computing, telecommunications, and software management in 19 countries. Many Fortune 500 companies outsource some or all of their information systems. Most companies do not outsource the strategic management of their IT environment, BPM, or IT architecture. Outsourcing is no longer confined to large organizations. As prices have come down, smaller companies are jumping on the outsourcing bandwagon.
The Benefits of Outsourcing There are a number of significant advantages to outsourcing: 1. A business solution. Outsourcing is a viable strategic and economic business solution because it allows companies to concentrate on their core competencies. 2. Asset utilization. Organizations with millions of dollars tied up in IT can improve their cash position and reduce expenses by selling those assets to an outsourcer. 3. Access to greater expertise and more advanced technology. Many companies cannot afford to retain a staff to manage and develop the increasingly complex networks required in today’s business. 4. Lower costs. Many companies outsource because skilled overseas providers can perform needed work at dramatically lower labor rates, resulting in significant savings. 5. Less development time. Experienced industry specialists often can develop and implement a system faster and more efficiently than can in-house staff. 6. Elimination of peaks-and-valleys usage. Many companies have seasonal businesses that require heavy computer power during part of the year, but very little the remainder of the year. 7. Facilitation of downsizing. Companies that downsize are often left with an unnecessarily large AIS function.
Risks of Outsourcing Although many outsourcing agreements are great success stories, studies show that anywhere from 25% to 50% of outsourcing agreements either fail or do not live up to significant agreement objectives. In one survey, 17% of outsourcing agreements were labeled as disasters. There are many reasons why outsourcing projects fail, including:
23-10 .
1. Not preparing properly 2. Lukewarm executive and company buy-in 3. Blind imitation of competitors 4. Thinking outsourcing will solve deeper problems 5. Shifting responsibility for a bad process to someone else 6. Entering into ill-defined agreements that do not meet expectations Companies that outsource often experience one or more of the following drawbacks: 1.
Inflexibility. Many outsourcing contracts are for 10 years and contracts are difficult or costly to break.
2.
Loss of control. A company that outsources runs the risk of losing control of its system and data, and of its confidential data being shared with others.
3.
Reduced competitive advantage. Companies can lose a fundamental understanding of their information systems needs and how the system can provide it with competitive advantages.
4.
Locked-in system. It is expensive and difficult to reverse outsourcing. If the company is unable to buy back the dataprocessing facilities, it will have to buy new equipment and hire a new data-processing staff.
5.
Unfulfilled goals. Critics point out that many outsourcing goals and benefits are never realized.
6.
Poor service. Some companies complain of receiving poor service from their outsourcing company.
7.
Increased risk. Outsourcing business processes can expose a company to significant risks, including operations, financial, technology, strategy, market position, human capital (personnel), legal, regulatory, and reputation impairment risks.
Multiple Choice 6 Outsourcing the system has the following advantages: a. Reduced competitive advantage b. Loss of control c. Inflexibility d. None of the above Multiple Choice 7 Organizations can improve their _____ and reduce ________ by selling assets to an outsourcer. 23-11 .
a. expenses; cash position b. cash position; expenses c. debt; costs d. services; personnel
Learning Objective Four Explain how business process management, prototyping, agile development, and computeraided software engineering can help improve system development.
Business Process Management Business process management (BPM) is a systematic approach to continuously improving an organization’s business processes. The four underlying principles of BPM are: 1. Business processes can produce competitive advantages 2. Business processes must be managed end to end 3. Business processes should be agile 4. Business processes must be aligned with organizational strategy and needs Business process management systems (BPMS) automate and facilitate business process improvements. A BPMS has the following four components: 1. A process engine to model and execute applications, including business rules 2. Business analytics to help identify and react to business issues, trends, and opportunities 3. Collaboration tools to remove communication barriers 4. A content manager to store and secure electronic documents, images, and other files Internal Controls in a Business Process Management System A BPMS can improve internal controls by: 1. Authorization: a BPMS uses the organization’s business process rules to determine the correct person to perform a task and authorizes that person to perform it. 2. Segregation of duties 3. Application controls 4. Audit trail
Prototyping Prototyping is an approach to systems design in which a simplified working model of a system is developed. A prototype, or first draft, is quickly and inexpensively built and provided to users for testing. 23-12 .
UNUM Life Insurance used prototyping to show how a new system using image processing would work. Middle managers at first had a hard time envisioning how they wanted to use image processing and understanding the issues involved in the change. After viewing a prototype, the managers caught on to the possibilities and issues associated with image processing.
Steps in Developing a Prototype As shown in Figure 23-1 on page 766, four steps are involved in developing a prototype: The first step is to identify basic system requirements. The second step is to develop an initial prototype. The third step is to use and experiment with a prototype in order to determine whether the prototype meets needs. The fourth step is to develop an initial prototype into a fully functional system.
When to Use Prototyping In most cases, prototyping supports rather than replaces the SDLC. Prototyping is appropriate when 1) there is a high level of uncertainty about the AIS, 2) it is unclear what questions to ask, 3) the final AIS cannot be clearly visualized, or 4) there is a high likelihood of failure. A summary of the conditions that make prototyping an appropriate design methodology is presented in Table 23-3 on page 767.
Advantages of Prototyping Prototyping has the following advantages: 1. Better definition of user needs 2. Higher user involvement and satisfaction 3. Faster development time Mutual Life Insurance developed the prototype of an executive information system in only one month, as described in Focus 23-2 on page 770. 4. Fewer errors 5. More opportunity for changes
23-13 .
6. Less costly
Disadvantages of Prototyping Prototyping has the following disadvantages: 1. Significant user time 2. Less efficient use of system resources 3. Inadequately testing and documentation 4. Negative behavioral reactions 5. Never-ending development
Computer-Aided Software Engineering The developers of software for others have failed to create software to simplify their own work. The development of powerful computer-aided software (or systems) engineering (CASE) tools, an integrated package of computer-based tools that automate important aspects of the software development process, has changed that. CASE tools are used to plan, analyze, design, program, and maintain an information system. CASE tools do not replace skilled designers. Instead, they are a host of well-integrated tools that give developers effective support for all phases of the SDLC.
Advantages and Disadvantages of CASE Technology CASE tools provide the following important advantages: 1. Improved productivity. Sony reported that CASE tools increased productivity by more than 600%. 2. Improved program quality. 3. Cost savings. Savings of 80% to 90% are possible. 4. Improved control procedures. CASE tools encourage the development of system controls, security measures, and system auditability and error-handling procedures early in the design process. 5. Simplified documentation. Some of the more serious problems with CASE technology include the following:
23-14 .
1. Incompatibility. Some CASE tools do not interact effectively with other systems. 2. Unmet expectations. According to a Deloitte & Touche survey, only 37% of the chief information officers using CASE believe they achieved the expected benefits. Multiple Choice 8 A BPMS can improve the following internal control: a. Authorization b. Application controls c. Segregation of duties d. All of the above Multiple Choice 9 The second step in developing a prototype is: a. To develop an initial prototype b. Develop an initial prototype into a fully functional system c. Specify basic needs d. Use and experiment with a prototype; determine whether the prototype meets needs Multiple Choice 10 CASE tools provide the following important advantage(s): a. Timeliness b. Cost savings c. Improved development time d. All of the above
23-15 .
Answer to Multiple Choice Questions: Multiple Choice Question Answers Number Answer Number Answer 1 D 6 D 2 C 7 B 3 B 8 D 4 C 9 B 5 A 10 B
23-16 .
CHAPTER 24 SYSTEMS DESIGN, IMPLEMENTATION, AND OPERATION Instructor’s Manual Learning Objectives: 1. Discuss the conceptual systems design process and the activities in this phase. 2. Discuss the physical systems design process and the activities in this phase. 3. Discuss the systems implementation process and the activities in this phase. 4. Discuss the systems conversion process and the activities in this phase. 5. Discuss the systems operation and maintenance process and the activities in this phase. Questions to be addressed in this chapter include: 1. Should her team develop what it considers to be the best approach to meeting SM’s needs, or should they develop several approaches? 2. How can she ensure that system output will meet user needs? When and how should input be captured, and who should capture it? Where should AIS data be stored, and how should it be organized and accessed? 3. How should SM convert from its current to its new AIS? How much time and effort will be needed to maintain the new AIS? In what capacity should Ann’s accounting staff participate?
Introduction Accountants should help keep the project on track by evaluating and measuring benefits, monitoring costs, and ensuring that the project stays on schedule. Effective systems analysis and design can ensure that developers correctly define the business problem and design the appropriate solution. This chapter discusses the other steps in the systems development life cycle: 1. Conceptual systems design 2. Physical systems design 3. Systems implementation 4. Systems conversion
24-1 .
5. Operation and maintenance
Learning Objective One Discuss the conceptual systems design process and the activities in this phase.
Conceptual Systems Design In the conceptual systems design phase, the developer creates a general framework for implementing user requirements and solving problems identified in the analysis phase. As shown in Figure 24-1 on page 786, there are three main steps in conceptual design: 1. Evaluating design alternatives 2. Preparing design specifications 3. Preparing the conceptual systems design report
Evaluate Design Alternatives There are many ways to design an AIS, so accountants and others involved in systems design must continually make design decisions. In addition, there are many different ways that a company can approach the systems development process: (1) purchase software from a vendor, (2) design the system in-house, or (3) outsource to develop and manage the information system. The design team should identify a variety of design alternatives and evaluate each with respect to the following standards: 1. How well it meets organizational and system objectives 2. How well it meets user needs 3. Whether it is economically feasible 4. What its advantages and disadvantages are Table 24-1 on page 786 presents examples of conceptual and physical design considerations and their corresponding design alternatives.
Prepare Design Specifications Once a design alternative has been selected, the project team develops the conceptual design specifications for the following elements:
24-2 .
1. Output. Because the system is designed to meet users’ information needs, output specifications must be prepared first. 2. Data storage. For Shoppers Mart, decisions included:
Which data needs to be stored for the sales report
Whether the data should be stored in sequential or random order
What type of file or database to use
Which field size is appropriate for the data items
3. Input. Design considerations for Shoppers Mart include which sales data to enter, sales location and amount, and where, when, and how to collect data. 4. Processing procedures and operations. Design considerations for Shoppers Mart include how to process the input and stored data to produce the sales report and also the sequence in which the processes must be performed.
Prepare the Conceptual Systems Design Report At the end of the conceptual design phase, a conceptual systems design report is prepared to: 1. Guide physical systems design activities 2. Communicate how management and user information needs will be met 3. Help the steering committee assess system feasibility
Multiple Choice 1 In the conceptual design phase of the systems development life cycle, _____ specifications must be prepared first. a. input b. output c. data storage d. data processing Multiple Choice 2 Assumptions and unresolved problems are included in the following report(s): a. Conceptual systems design report b. Physical systems design report c. Post-implementation review report d. All of the above e. A and B
24-3 .
Learning Objective Two Discuss the physical systems design process and the activities in this phase.
Physical Systems Design During the physical systems design phase, the company determines how the conceptual AIS design is to be implemented. As shown in Figure 24-2 on page 787, physical system design phases include (1) designing output, (2) creating files and databases, (3) designing input, (4) writing computer programs, (5) developing procedures, and (6) building controls into the new AIS.
Output Design The objective of output design is to determine the nature, format, content, and timing of printed reports, documents, and screen displays. Some important output design considerations are summarized in Table 242 on page 788. Output usually fits into one of the following four categories: 1.
Scheduled reports have a prespecified content and format and are prepared on a regular basis.
2.
Special-purpose analysis reports have no prespecified content or format and are not prepared on a regular schedule.
3.
Triggered exception reports have a prespecified content and format but are prepared only in response to abnormal conditions.
4.
Demand reports have a prespecified content and format but are prepared only on request.
File and Database Design Table 24-3 on page 789 summarizes some of the more important file and database design considerations: 1) medium, 2) processing mode, 3) maintenance, 4) size, and 5) activity level.
Input Design Considerations for input design are shown in Table 24-4 on page 789. 1. Medium 2. Source 3. Format 4. Type 5. Volume 6. Personnel 7. Frequency 8. Cost
24-4 .
9. Error detection and correction
Forms Design Table 24-5 on page 790 is a useful tool for evaluating existing forms and designing new ones: 1.
General considerations
2.
Introductory section of form
3.
Main body of form
4.
Conclusion section of form
Computer Screen Design Computer screens are most effective when these procedures are followed: 1. Organize the screen so data can be entered quickly, accurately, and completely. 2. Enter data in the same order as displayed on paper forms used to capture the data. 3. Complete the screen from left to right and top to bottom. Group together logically related data. 4. Design the screen so users can jump from one data entry location to another or use a single key or go directly to screen locations. 5. Make it easy to correct mistakes. Clear and explicit error messages that are consistent across all screens are essential. 6. Restrict the amount of data on a screen to avoid clutter. Limit the number of menu options on a single screen.
Program Design Program development is one of the most time-consuming activities in the SDLC. Programs subdivided into small, well-defined modules are a process called structured programming. To improve software quality, organizations should develop programming standards. Although accountants need not be computer programmers, they should understand how software is created. Following are eight steps for developing software: Step 1 Determine user needs. Systems analysts consult with users and agree on software requirements. 24-5 .
Step 1 is performed as a part of the systems analysis phase of the SDLC. Step 2 Create and document a development plan. A development plan is produced and documented. Step 2 is done during conceptual systems design and may carry over to the beginning of physical design. Step 3 Write program instructions (code). This is when the computer code (or program instructions) is written. Step 4 Test the program. Debugging is discovering and eliminating program errors. After a program is coded, a visual and mental review, referred to as desk checking, is conducted to discover programming errors. The Gartner Group estimates that bugs that are not discovered until later in the SDLC cost 80% to 1,000% more to fix than those discovered earlier. Focus 24-1 on page 791 discusses the difficulty of testing software and the consequences of releasing software with undetected errors. Most of the tasks in steps 3 and 4 are done during systems design and are completed during systems implementation. Step 5 Document the program. Documentation explains how programs work and is used to help correct and resolve errors. Step 6 Train program users. Program documentation is often used to train users. Steps 5 and 6 are begun in systems design, but most of the work is done during systems implementation. Step 7 Install the system. All system components, including the programs, are combined and the company begins to use the system. Step 7 is completed during systems implementation and conversion. Step 8 Use and modify the system. Factors that require existing programs to be revised, referred to as program maintenance, include requests for new or revised reports; changes in input, file content, or values such as tax rates; error detection; and conversion to new hardware. Step 8 is part of the operation and maintenance phase.
Procedures Design Everyone who interacts with a newly designed AIS needs procedures that answer who, what, when, where, why, and how questions related to all AIS activities.
24-6 .
Controls Design The often-heard computer adage “garbage in, garbage out” emphasizes that improperly controlled input, processing, and database functions produce information of little value. Controls must be built into an AIS to ensure its effectiveness, efficiency, and accuracy. Some of the more important control concerns that must be addressed are summarized in Table 24-6 on page 792: 1. Validity 2. Authorization 3. Accuracy 4. Security 5. Numerical control 6. Availability 7. Maintainability 8. Integrity 9. Audit trail
Physical Systems Design Report At the end of this phase, the team prepares a physical systems design report that summarizes what was accomplished and serves as the basis for management’s decision whether or not to proceed to the implementation phase. Multiple Choice 3 The following consideration(s) is (are) involved in the file and database design. a. Use b. Operations c. Medium d. A and C Multiple Choice 4 “Is additional training necessary?” is a concern to be answered during _____ design. a. input b. output c. files and database d. program e. controls
24-7 .
Multiple Choice 5 _____ development is one of the most time-consuming activities in the SDLC. a. Input b. Output c. Files and database d. Program e. Controls Multiple Choice 6 _____ is done during systems design and is completed during systems implementation. a. Develop a plan b. Desk checking c. Write program instructions d. All of the above e. B and C
Learning Objective Three Discuss the systems implementation process and the activities in this phase.
Systems Implementation Systems implementation is the process of installing hardware and software and getting the AIS up and running. The state of Virginia has been especially successful in designing and implementing its AIS. Focus 24-2 on page 794 describes the improvements the state made to its AIS.
Implementation Planning An implementation plan consists of implementation tasks, expected completion dates, cost estimates, and the person or persons responsible for each task. One reason that Blue Cross/Blue Shield’s new $200 million system failed was because there was no organizational restructuring.
Site Preparation A large computer may require extensive changes, such as additional electrical outlets, data communications facilities, raised floors, humidity controls, special lighting, and air conditioning. Space is needed for equipment, storage, and offices.
24-8 .
Select and Train Personnel Employees can be hired from outside the company or transferred internally. Because effective training is time consuming and expensive, companies take shortcuts. They are busy trying to maintain and upgrade their new system. Effective AIS training must consist of more than just hardware and software skills. Employees must be oriented to new policies and operations, and training should be planned and scheduled so it occurs just before systems testing and conversion. Boots the Chemists at a London-based international pharmacy developed a new approach to training. Store employees that were nervous about the new computer system were invited to a party where a new POS system had been installed. They were asked to try to harm the new POS system. Employees quickly found out that they could not harm the system and learned that it was easy to use.
Complete Documentation Three types of documentation must be prepared for new systems: 1. Development documentation describes the new AIS. It includes:
A system description
Copies of output, input, and file and database layouts
Program flowcharts
Test results
User acceptance forms
2. Operations documentation includes:
Operating schedules
Files and databases accessed
Equipment security
File retention requirements
24-9 .
3. User documentation teaches users how to operate the AIS. It includes a procedures manual and training materials.
Test the System Inadequate system testing was one reason for the Blue Cross/Blue Shield system failure described previously. Documents and reports, user input, operating and control procedures, processing procedures, and computer programs should all be given a trial run in realistic circumstances. In addition, capacity limits and backup and recovery procedures should be tested. Following are three common forms of testing: 1. Walk-throughs are step-by-step reviews of procedures or program logic. 2. Processing test transactions determines if a program operates as designed. 3. Acceptance tests use copies of real transactions and files rather than hypothetical ones. Chemical Bank suffered the consequences of not adequately testing an upgrade to its ATM system. Customers in New York who withdrew money found that their accounts were debited twice. Before the problem was corrected, 150,000 withdrawals with a total value of $8 million were posted to customer accounts. Even software purchased from an outside vendor must be tested thoroughly before being installed.
Multiple Choice 7 New systems must have the following types of documentation: a. Development; Planning; User b. Planning; Budget; User c. Development; Operations; User d. Development; Programming; User
24-10 .
Learning Objective Four Discuss the systems conversion process and the activities in this phase.
Systems Conversion Conversion is the process of changing from the old to the new AIS. This includes converting hardware, software, data files, and procedures.
Conversion Approaches Four conversion approaches are used to change from an old to a new system: 1. Direct conversion immediately terminates the old AIS when the new one is introduced. Focus 24-3 on page 795 discusses the problems at Sunbeam Corp., in part caused by attempting a direct conversion with no backup system. Al Dunlap, a new CEO at Sunbeam Corp., made drastic costcutting moves in which many went too far and ended up hurting the company. His restructuring plan called for eliminating 87% of the company’s products and half of the 6,000 employees. Al terminated computer personnel who were earning $35,000 to learn that they could be making $125,000 a year elsewhere. He replaced the computer personnel with contract workers who made significantly more than $35,000 a year. Some of these contract workers were the computer personnel that he eliminated from the company previously. Al used the direct conversion approach to modernize its information system. Unfortunately, the new system did not work. Without any backup system the entire system was down for months. Orders were lost and some customers did not receive their shipments. Sunbeam had to manually bill its customers. The price of Sunbeam’s stock plummeted and in 1998 Al was fired.
24-11 .
The SEC began investigating Al to find out that $62 million of the $189 million in income for Sunbeam did not comply with accounting rules. Also, Arthur Andersen, Sunbeam’s auditors, paid out $110 million in damages to settle a shareholder class-action suit. In February 2003, Sunbeam filed for Chapter 11 bankruptcy protection. 2. Parallel conversion operates the old and new systems simultaneously for a period of time. 3. Phase-in-conversion gradually replaces elements of the old AIS with the new one. 4. Pilot conversion implements a system in just one part of the organization, such as a branch location. Data conversion can be time-consuming, tedious, and expensive. The difficulty and magnitude of the task can be easily underestimated. The first step in the data conversion process is to decide which data files need to be converted. Then they must be checked for completeness and any data inaccuracies and inconsistencies removed. Once the files and databases have been converted and tested for accuracy, the new system is functional. Multiple Choice 8 Walk-throughs are conducted by the: a. Development team b. System users c. Programmers d. All of the above e. A and B Multiple Choice 9 The first step in the data conversion process is: a. Check data for completeness, and any data inaccuracies, and remove any inconsistencies b. Decide which data files need to be converted c. Conduct data conversion d. Validate new files
Learning Objective Five Discuss the systems operation and maintenance process and the activities in this phase.
24-12 .
Operation and Maintenance The final step in the SDLC is to operate and maintain the new system. A post-implementation review should be conducted on a newly installed AIS to ensure it meets its planned objectives. Table 24-7 on page 796 provides a list of important factors to consider and questions to answer during the post-implementation review. Factors include: 1 2 3 4 5 6 7
Goals and objectives Satisfaction Benefits Costs Reliability Accuracy Timeliness
8 9 10 11 12 13 14
Compatibility Controls and security Errors Training Communications Organizational changes Documentation
When the review has been completed, a post-implementation review report is prepared. The table of contents of this report is provided in Table 24-8 on page 797. User acceptance of the post-implementation review report is the final activity in the systems development process. However, work on the new system is not finished. Studies show that over the life of a system, only 30% of the work takes place during development. The remaining 70% is spent on maintaining the system.
Multiple Choice 10 Studies have shown that _____ percent of the work takes place during development and _____ percent is spent maintaining the system. a. 30; 70 b. 70; 30 c. 65; 35 d. 35; 65
24-13 .
Answer to Multiple Choice Questions: Multiple Choice Question Answers Number Answer Number Answer 1 B 6 E 2 E 7 C 3 C 8 D 4 A 9 B 5 D 10 A
24-14 .
Online CHAPTER AUDITING COMPUTER-BASED INFORMATION SYSTEMS
This chapter was chapter 11 in the fourteenth edition and was removed from the fifteenth edition and made available online to students at the Student Download Page on www.pearsonglobaleditions.com. Additional instructor resources for this chapter can be downloaded from the Instructor Instructor’s Manual Resources Center page at www.pearsonglobaleditions.com under the fourteenth edition instructor resources. Learning Objectives:
1. Describe the scope and objectives of audit work, and identify the major steps in the audit process. 2. Identify the six objectives of an information system audit, and describe how the risk-based audit approach can be used to accomplish these objectives. 3. Describe computer audit software, and explain how it is used in the audit of an AIS. 4. Describe the nature and scope of an operational audit. Questions to be addressed in this chapter include: 1. How could a programming error of this significance be overlooked by experienced programmers who thoroughly reviewed and tested the new system? 2. Is this an inadvertent error, or could it be a fraud? 3. What can be done to find the error in the program?
Introduction This chapter focuses on the concepts and techniques used in auditing an accounting information system. This chapter is written from the perspective of internal auditors, who work for the organization. The chapter will first provide a general overview of auditing, the scope and objectives of internal audit work, and the steps in the auditing process.
Learning Objective One Describe the scope and objectives of audit work and identify the major steps in the audit process.
Online Chapter: AUDITING COMPUTER-BASED INFORMATION SYSTEMS .
The Nature of Auditing Auditing is a systematic process of objectively obtaining and evaluating evidence regarding assertions about economic actions and events to ascertain the degree of correspondence between those assertions and established criteria and communicating the results to interested users.
Types of Internal Auditing Work Three Types of Audits 1. Financial audit: examination of the reliability and integrity of financial transactions, accounting records, and financial statements. 2. Information systems, or internal control audit: examination of the general and application controls of an IS to assess its compliance with internal control policies and procedures and its effectiveness in safeguarding assets. 3. Operational, or management, audit: examination of the economical and efficient use of resources and the accomplishment of established goals and objectives. 4. Compliance audit: examination of organizational compliance with applicable laws, regulations, policies, and procedures. 5. Investigative audit: examination of incidents of possible fraud, misappropriation of assets, waste and abuse, or improper governmental activities.
An Overview of the Auditing Process Figure 11-1 provides an overview of the auditing process. Four Auditing Stages and Activities 1.
Auditing planning. The purpose of audit planning is to determine why, how, when, and by whom the audit will be performed. Three types of risk when conducting an audit:
Inherent risk. This is the susceptibility to material risk in the absence of controls.
Control risk. This is the risk that a material misstatement will get through the
Online Chapter: AUDITING COMPUTER-BASED INFORMATION SYSTEMS .
internal control structure and into the financial statements.
2.
3.
Detection risk. This is the risk that auditors and their audit procedures will not detect a material error or misstatement.
Collection of audit evidence
Observation of the activities being audited.
Review of documentation to understand how a particular accounting information system or internal control system is supposed to function.
Discussions with employees about their jobs and how they carry out certain procedures.
Questionnaires that gather data about the system.
Physical examination of the quantity or condition of tangible assets such as equipment, inventory, or cash.
Confirmation of the accuracy of certain information, such as customer account balances, through communication with independent third parties.
Reperformance of selected calculations to verify quantitative information on records and reports.
Vouching for the validity of a transaction by examining all supporting documents.
Analytical review of relationships and trends among information to detect items that should be further investigated.
Audit sampling.
Evaluation of audit evidence. Materiality and reasonable assurance are important when deciding how much audit work is necessary and when to evaluate the evidence. Determining materiality, what is and is not important in a given set of circumstances, is primarily a matter of judgment. The auditor seeks reasonable assurance that no material error exists in the information or process audited.
Online Chapter: AUDITING COMPUTER-BASED INFORMATION SYSTEMS .
Reasonable assurance is not a guarantee. 4.
Communication of audit results (the audit report). The auditor prepares a written (and sometimes oral) report summarizing the audit findings and recommendations to management, the audit committee, the board of directors, and other appropriate parties.
The Risk-Based Audit Approach Logical framework for carrying out an audit: 1. Determine the threats (fraud and errors) facing the accounting information system. 2. Identify the control procedures implemented to minimize each threat by preventing, detecting, or correcting the fraud and errors. 3. Evaluate internal control procedures. Reviewing system documentation and interviewing appropriate personnel to determine if the necessary procedures are in place is called a systems review. Then tests of controls are conducted to determine if these procedures are satisfactorily followed. 4. Evaluate control weaknesses to determine their effect on the nature, timing, or extent of auditing procedures and client suggestions. Control weaknesses may be acceptable if there are compensating controls that compensate for the internal control weakness deficiency. Multiple Choice 1 When auditors have recommendations in their report to management, they use: a. audit objectives b. established policies c. audit scope d. established criteria Multiple Choice 2 A typical audit has a mix of audit procedures, which of the following is not an audit procedure? a. Confirmation b. Vouching c. Analytical review d. Identify risk factors Online Chapter: AUDITING COMPUTER-BASED INFORMATION SYSTEMS .
Multiple Choice 3 Which type of audit risk involves the chance that there will be a material risk when the controls are absent? a. External risk b. Inherent risk c. Internal risk d. Control risk
Learning Objective Two Identify the six objectives of an information system audit and describe how the risk-based audit approach can be used to accomplish these objectives.
Information Systems Audits The purpose of an information systems audit is to review and evaluate the internal controls that protect the system. In conducting accounting information system audits, auditors should determine if the following objectives are met: 1. Security provisions protect computer equipment, programs, communications, and data from unauthorized access, modification, or destruction. 2. Program development and acquisition are performed in accordance with management’s general and specific authorization. 3. Program modifications have management’s authorization and approval. 4. Processing of transactions, files, reports, and other computer records is accurate and complete. 5. Source data that are inaccurate or improperly authorized are identified and handled according to prescribed managerial policies. 6. Computer data files are accurate, complete, and confidential.
Online Chapter: AUDITING COMPUTER-BASED INFORMATION SYSTEMS .
Figure 11-2 depicts the relationship among these six objectives and information systems components.
Multiple Choice 4 In performing an information systems audit, there are _____ audit objectives. a. 3 b. 4 c. 5 d. 6
Objective 1: Overall Security Table 11-1 contains a framework for auditing computer security; showing the following: 1. Types of security errors and fraud faced by companies. 2. Control procedures to minimize security errors and fraud. 3. Audit procedures: Systems review. 4. Audit procedures: Tests of controls. 5. Compensating controls.
Objective 2: Program Development and Acquisition Two things can go wrong in program development: 1. Inadvertent errors due to misunderstanding of system specifications or careless programming. 2. Unauthorized instructions deliberately inserted into the programs. The auditor’s role in systems development should be limited to an independent review of systems development activities. Auditors should also review the policies, procedures, standards, and documentation listed in Table 11-2. This table provides a framework for reviewing and evaluating the program development process.
Objective 3: Program Modification Table 11-3 presents a framework for auditing application programs and system software changes.
Online Chapter: AUDITING COMPUTER-BASED INFORMATION SYSTEMS .
When a program change is submitted for approval, a list of all required updates should be compiled and approved by management and program users. During systems review, auditors should gain an understanding of the change process by discussing it with management and user personnel. An important part of an auditor’s tests of controls is to verify that program changes were identified, listed, approved, tested, and documented. To test for unauthorized program changes, auditors can use a source code comparison program. There are three ways to detect unauthorized program changes: Source code comparison program to compare current version of the program with the source code (that auditors have a copy of); if there are differences, the changes should be authorized. The reprocessing technique also uses a verified copy of the source code. On a surprise basis, the auditor uses the program to reprocess data and compare that output with the company’s data. Parallel simulation is similar to reprocessing except that the auditor writes a program instead of saving a verified copy of the source code. The auditor’s results are compared with the company’s results and any differences are investigated.
Objective 4: Computer Processing Table 11-4 provides a framework for auditing computer processing controls. The focus of the fourth objective is the processing of transactions, files, and related computer records to update files and databases and to generate reports. Processing Test Data One way to test a program is to process a hypothetical series of valid and invalid transactions. The following resources are helpful when preparing test data: 1. A listing of actual transactions. 2. The test transactions the programmer used to test the program.
Online Chapter: AUDITING COMPUTER-BASED INFORMATION SYSTEMS .
3. A test data generator program, which automatically prepares test data based on program specifications. Disadvantages of processing test transactions: 1. The auditor must spend considerable time developing an understanding of the system and preparing an adequate set of test transactions. 2. Care must be taken to ensure that test data do not affect the company’s files and databases. Concurrent Audit Techniques Millions of dollars of transactions can be processed in an online system without leaving a satisfactory audit trail. The auditor uses concurrent audit techniques to continually monitor the system and collect audit evidence while live data are processed during regular operating hours. Concurrent audit techniques use embedded audit modules, which are segments of program code that perform audit functions. Auditors normally use five concurrent audit techniques: 1.
An integrated test facility (ITF) technique places a small set of fictitious records in the master files. The auditor compares processing with expected results to verify that the system and its controls are operating correctly.
2.
The snapshot technique examines the way transactions are processed. Selected transactions are marked with a special code that triggers the snapshot process.
3.
System control audit review file (SCARF) uses embedded audit modules to continuously monitor transaction activity and collect data on transactions with special audit significance.
4.
Audit hooks are audit routines that flag suspicious transactions. This approach is known as real-time notification, which displays a message on
Online Chapter: AUDITING COMPUTER-BASED INFORMATION SYSTEMS .
the auditor’s terminal as these questionable transactions occur. Focus 11-1 State Farm Life Insurance Company In the regional offices, the system processes more than four million individual policyholder records. The system processes more than 30 million transactions per year and keeps track of policy funds valued at more than $7 billion. Anyone with access and knowledge of the system could commit fraud. The auditors were given the challenge of identifying all the ways fraud was possible. To do this the auditors came up with all the possible ways to defraud the system. Auditors had 33 embedded audit hooks to monitor 42 different types of transactions. The auditors were successful using audit hooks as they did catch an employee fraudulently obtaining cash by processing a loan on her brother’s life insurance policy. She then forged her brother’s signature and cashed the check. To cover up she had to repay the loan before the annual report was sent to her brother. She used a series of fictitious transactions involving a transfer account. She was investigated and the employee was terminated. 5.
Continuous and intermittent simulation (CIS) embeds an audit module in a database management system (DBMS). The CIS module examines all transactions that update the database using criteria similar to those of SCARF.
Analysis of Program Logic If an auditor suspects that a particular application program contains unauthorized code or serious errors, then a detailed analysis of the program logic may be necessary. Online Chapter: AUDITING COMPUTER-BASED INFORMATION SYSTEMS .
1. Automated flowcharting programs, which interpret program source code and generate a corresponding program flowchart. 2. Automated decision table programs, which generate a decision table representing the program logic. 3. Scanning routines, which search a program for occurrences of a specified variable name or other character combinations. 4. Mapping programs, which identify unexecuted program code. 5. Program tracing, which sequentially prints all application program steps executed during a program run.
Objective 5: Source Data Auditors use an input controls matrix, such as the one shown in Figure 11-3. The matrix shows the control procedures applied to each field of an input record. Table 11-5 shows the internal controls that prevent, detect, and correct inaccurate or unauthorized source data. Types of Errors and Fraud Control Procedures Audit Procedures: System Review Audit Procedures: Tests of Controls Compensating Controls
Objective 6: Data Files The sixth objective concerns the accuracy, integrity, and security of data stored in machine-readable files. Table 11-6 summarizes the errors, controls, and audit procedures for this objective. Multiple Choice 5 The compensating controls that compensate for an internal control efficiency include(s) a. information systems insurance b. preventive maintenance c. effective user controls d. all of the above
Online Chapter: AUDITING COMPUTER-BASED INFORMATION SYSTEMS .
Multiple Choice 6 The __________ audit procedure is used for the audit of __________. a. examine system access logs; program development b. review programming evaluation standards; overall computer security c. proper use of internal and external file labels; computer processing controls d. review program documentation standards; program modification Multiple Choice 7 An integrated test facility technique a. examines the way transactions are processed b. places a small set of fictitious records in the master files c. uses embedded audit modules to continuously monitor transaction activity and collect data on transactions with special audit significance d. searches a program for occurrences of a specified variable name or other character combinations Multiple Choice 8 The audit technique used to catch the State Farm Life Insurance Company employee fraudulently taking cash was a. audit hooks b. snapshot technique c. program tracing d. internal control testing
Learning Objective Three Describe computer audit software and explain how it is used in the audit of an AIS.
Computer Software There are a number of computer programs, called computer aided audit techniques (CAAT) also called general audit software, that have been written especially for auditors. CAAT or general audit software is software designed to read, process, and write data with the help of functions performing specific audit routines and with self-made macros. It is a tool in applying Computer Assisted Auditing Techniques. A function of generalized audit software includes importing computerized data; thereafter other functions can be applied. Two of the most popular are Audit Control Language (ACL) and IDEA.
Online Chapter: AUDITING COMPUTER-BASED INFORMATION SYSTEMS .
ACL is a data interrogation tool used by auditors to view, explore, and analyze data efficiently and cost effectively. ACL enables auditors to access data in diverse formats and on various types of storage devices. IDEA (Interactive Data Extraction and Analysis) is a generalized audit software. It is able to import a wide range of different types of data files. During the import, an IDEA file and its field statistics are created. The auditor’s first step is to decide on audit objectives, learn about the files and databases to be audited, design the audit reports, and determine how to produce them. The primary purpose of CAAT is to assist the auditor in reviewing and retrieving information in computer files. CAS cannot replace the auditor’s judgment or free the auditor from other phases of the audit. Multiple Choice 9 Two of the most popular audit software packages include: a. ITF b. ACL c. CIS d. SCARF
Learning Objective Five Describe the nature and scope of an operational audit.
Operational Audits of an Accounting Information System The techniques and procedures used in operational audits are similar to audits of information systems and financial statements. The basic difference is that the scope of the information systems audit is confined to internal controls, whereas the scope of the financial audit is limited to systems output. In contrast, the scope of the operational audit is much broader, encompassing all aspects of information systems management. The evidence collection, during the audit preliminary survey, includes the following activities: 1. Reviewing operating policies and documentation. 2. Confirming procedures with management and operating personnel. Online Chapter: AUDITING COMPUTER-BASED INFORMATION SYSTEMS .
3. Observing operating functions and activities. 4. Examining financial and operating plans and reports. 5. Testing the accuracy of operating information. 6. Testing controls. Multiple Choice 10 The first step in an operational audit is a. evaluating evidence b. collecting evidence c. communicating the results d. none of the above
Answer to Multiple Choice Questions: Multiple Choice Question Answers Number Answer Number Answer 1 D 6 C 2 D 7 B 3 B 8 A 4 D 9 B 5 C 10 D
Online Chapter: AUDITING COMPUTER-BASED INFORMATION SYSTEMS .