Accounting Information Systems
Accounting Information Systems
11th Edition
ISBN: 9781337552127
Author: Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher: Cengage Learning
Question
Chapter 3, Problem 5P
Summary Introduction

To develop: A paper on the use of the internet to support EDI.

Introduction:

Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.

Blurred answer
Students have asked these similar questions
Do you think the key to further improve computer security lies in more effective user training or in improvement in the security feature that hardware and software vendors design into their products? Discuss
Lamar LLC is in the process of updating its revenues and receivables systems with the implementation of new accounting software. James Loden, Inc. is an independent information technology consultant who is assisting Tamar with the project. James has developed the following checklist containing internal control points that the company should consider in this new implementation: Will different system access levels for different users be incorporated?
The ABC Company is switching from its legacy centralizedsystem to a fully distributed system. Underthe new model, all employees will work from PCsconnected to a local area network. a. Outline a plan of action to ensure that the propercontrols over hardware, software, data, people,procedures, and documentation are in place.b. Discuss any risks the company may face if thedevised plan is not implemented.

Chapter 3 Solutions

Accounting Information Systems

Knowledge Booster
Similar questions
  • Lamar LLC is in the process of updating its revenues and receivables systems with the implementation of new accounting software. James Loden, Inc. is an independent information technology consultant who is assisting Tamar with the project. James has developed the following checklist containing internal control points that the company should consider in this new implementation: Will all data entry clerks and accounting personnel have their own PCs with log‐in IDs and password protection?
    Better Business Company (BBC) is in the process of planning a more advanced computer-based information system. Slavish, Moore, LLP, BBCs consulting firm, has recently been provided with an overview of their proposed plan: To ensure that the system functions as needed, the BBC Information System (BBCIS) will be created with input from its employees. System construction will begin with prototyping, computer-aided software engineering technology, and Gantt charts. From this point, IT professionals and a systems administrator, who are full-time employees of BBC, will create data models of the business process, define conceptual user views, design database tables, and specify system controls. Users in each department will submit written descriptions of their information needs and business problems to the IT professionals, who will then perform feasibility studies. Each aspect of the system will be documented in accordance with best practices and standards. The systems administrator will determine access privileges and maintain access control lists and database authorization tables. The administrator will have sole access to the transaction log, which will be used to record all changes made to database tables. A role of the administrator is to detect unauthorized access, reconstruct events, and promote personal accountability. The systems administrator will also be responsible for ensuring that virus protection software is current. Another important task of the administrator is to ensure that adequate backup to databases and applications occur and that disks and tapes are stored in a secure off-site location. Each employee requiring computer access will be assigned a user ID and password that will be entered when logging onto the system. If a computer terminal is left idle for more than five minutes, the system will close out the session and the user will need to log on again. Furthermore, users will be required to change their passwords once every year. Hardware will be purchased from Bell Computer Company with the advice of in-house systems developers. With the exception of basic applications, user departments will be allowed to purchase additional software that they need, which will be added to the system. BBCIS will run on a central server in the computer center located in the companys administration building. Two security guards will be assigned to the entrance to the computer room. To access the computer center, employees will swipe their ID cards on the lock to the main entrance door. The system will record the times of each entry and departure from the center. The data center will employ an advanced air-conditioning and air filtration system to eliminate dust and pollens. There will also be a sprinkler system to minimize damages in case of a fire. Required Based on BBCs plans for the implementation of a new computer system, describe the potential risks and needed controls. Classify these according to the relevant areas of the COSO framework.
    Recommended textbooks for you
  • Accounting Information Systems
    Accounting
    ISBN:9781337619202
    Author:Hall, James A.
    Publisher:Cengage Learning,
    Pkg Acc Infor Systems MS VISIO CD
    Finance
    ISBN:9781133935940
    Author:Ulric J. Gelinas
    Publisher:CENGAGE L
    Entrepreneurial Finance
    Finance
    ISBN:9781337635653
    Author:Leach
    Publisher:Cengage
  • Accounting Information Systems
    Accounting
    ISBN:9781337619202
    Author:Hall, James A.
    Publisher:Cengage Learning,
    Pkg Acc Infor Systems MS VISIO CD
    Finance
    ISBN:9781133935940
    Author:Ulric J. Gelinas
    Publisher:CENGAGE L
    Entrepreneurial Finance
    Finance
    ISBN:9781337635653
    Author:Leach
    Publisher:Cengage