|
Chapter 1 Accounting Information Systems and the Accountant |
|
|
1 | (32) |
|
1.1 Introduction: Why Study Accounting Information Systems? |
|
|
1 | (1) |
|
1.2 Careers in Accounting Information Systems |
|
|
2 | (4) |
|
Traditional Accounting Career Opportunities |
|
|
2 | (1) |
|
|
2 | (1) |
|
|
3 | (1) |
|
Information Technology Auditing and Security |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
6 | (7) |
|
|
6 | (3) |
|
|
9 | (3) |
|
|
12 | (1) |
|
|
13 | (1) |
|
1.4 What Are Accounting Information Systems? |
|
|
13 | (5) |
|
Accounting Information Systems |
|
|
13 | (4) |
|
The Role of Accounting Information Systems in Organizations |
|
|
17 | (1) |
|
1.5 What's New in Accounting Information Systems? |
|
|
18 | (15) |
|
Cloud Computing---Impact for Accountants |
|
|
18 | (1) |
|
|
19 | (1) |
|
Suspicious Activity Reporting |
|
|
20 | (1) |
|
Forensic Accounting, Governmental Accountants, and Terrorism |
|
|
21 | (1) |
|
Corporate Scandals and Accounting |
|
|
21 | (12) |
|
Chapter 2 Accounting on the Internet |
|
|
33 | (34) |
|
|
33 | (1) |
|
2.2 The Internet and World Wide Web |
|
|
34 | (4) |
|
Internet Addresses and Software |
|
|
34 | (1) |
|
|
35 | (1) |
|
The World Wide Web, HTML, and IDEA |
|
|
36 | (1) |
|
Groupware, Electronic Conferencing, and Blogs |
|
|
36 | (1) |
|
Social Media and Its Value to Accountants |
|
|
37 | (1) |
|
2.3 XBRL---Financial Reporting on the Internet |
|
|
38 | (4) |
|
XBRL Instance Documents and Taxonomies |
|
|
38 | (2) |
|
The Benefits and Drawbacks of XBRL |
|
|
40 | (1) |
|
The Current Status of XBRL |
|
|
41 | (1) |
|
|
42 | (7) |
|
|
42 | (1) |
|
|
43 | (1) |
|
E-Payments, E-Wallets, and Virtual Currencies |
|
|
44 | (2) |
|
Business-to-Business E-Commerce |
|
|
46 | (1) |
|
Electronic Data Interchange (EDI) |
|
|
47 | (1) |
|
|
47 | (2) |
|
2.5 Privacy and Security on the Internet |
|
|
49 | (18) |
|
Identity Theft and Privacy |
|
|
49 | (2) |
|
|
51 | (1) |
|
|
52 | (1) |
|
Firewalls, Intrusion Detection Systems, Value-Added Networks, and Proxy Servers |
|
|
53 | (2) |
|
|
55 | (1) |
|
Digital Signatures and Digital Time Stamping |
|
|
56 | (11) |
|
Chapter 3 Cybercrime, Fraud, and Ethics |
|
|
67 | (32) |
|
|
67 | (1) |
|
|
68 | (5) |
|
Distinguishing Between Cybercrime and Fraud |
|
|
68 | (2) |
|
|
70 | (2) |
|
|
72 | (1) |
|
3.3 Examples of Cybercrime |
|
|
73 | (5) |
|
Compromising Valuable Information |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
76 | (2) |
|
3.4 Preventing and Detecting Cybercrime and Fraud |
|
|
78 | (8) |
|
Enlist Top-Management Support |
|
|
79 | (1) |
|
Increase Employee Awareness and Education |
|
|
79 | (1) |
|
Assess Security Policies and Protect Passwords |
|
|
80 | (1) |
|
|
81 | (1) |
|
Identify Computer Criminals |
|
|
82 | (1) |
|
Maintain Physical Security |
|
|
83 | (1) |
|
Recognize the Symptoms of Employee Fraud |
|
|
84 | (1) |
|
Use Data-Driven Techniques |
|
|
85 | (1) |
|
Employ Forensic Accountants |
|
|
86 | (1) |
|
3.5 Ethical Issues, Privacy, and Identity Theft |
|
|
86 | (13) |
|
Ethical Issues and Professional Associations |
|
|
87 | (1) |
|
Meeting the Ethical Challenges |
|
|
88 | (1) |
|
|
89 | (1) |
|
Company Policies with Respect to Privacy |
|
|
89 | (1) |
|
|
90 | (9) |
|
Chapter 4 Information Technology and AISs |
|
|
99 | (40) |
|
|
99 | (1) |
|
4.2 The Importance of Information Technology to Accountants |
|
|
100 | (2) |
|
|
100 | (1) |
|
The Top 10 Information Technologies |
|
|
101 | (1) |
|
4.3 Input, Processing, and Output Devices |
|
|
102 | (9) |
|
|
102 | (6) |
|
|
108 | (2) |
|
|
110 | (1) |
|
4.4 Secondary Storage Devices |
|
|
111 | (4) |
|
|
112 | (1) |
|
CD-ROMs, DVDs, and Blu-Ray Discs |
|
|
113 | (1) |
|
|
114 | (1) |
|
Image Processing and Record Management Systems |
|
|
114 | (1) |
|
4.5 Data Communications and Networks |
|
|
115 | (7) |
|
Communication Channels and Protocols |
|
|
115 | (1) |
|
Local and Wide Area Networks |
|
|
116 | (2) |
|
|
118 | (2) |
|
Wireless Data Communications |
|
|
120 | (2) |
|
|
122 | (1) |
|
|
122 | (17) |
|
|
123 | (1) |
|
|
124 | (1) |
|
|
125 | (14) |
|
Chapter 5 Documenting Accounting Information Systems |
|
|
139 | (40) |
|
|
139 | (1) |
|
5.2 Why Documentation is Important |
|
|
140 | (3) |
|
5.3 Primary Documentation Tools |
|
|
143 | (15) |
|
|
144 | (5) |
|
|
149 | (4) |
|
|
153 | (3) |
|
|
156 | (2) |
|
5.4 Other Documentation Tools |
|
|
158 | (6) |
|
|
159 | (1) |
|
Decision Tables and Decision Trees |
|
|
160 | (2) |
|
Software Tools for Graphical Documentation and SOX Compliance |
|
|
162 | (2) |
|
5.5 End User Computing and Documentation |
|
|
164 | (15) |
|
The Importance of End User Documentation |
|
|
165 | (1) |
|
Policies for end user Computing and Documentation |
|
|
166 | (13) |
|
Chapter 6 Developing and Implementing Effective Accounting Information Systems |
|
|
179 | (36) |
|
|
179 | (1) |
|
6.2 The Systems Development Life Cycle |
|
|
180 | (2) |
|
Four Stages in the Systems Development Life Cycle |
|
|
180 | (1) |
|
Systems Studies and Accounting Information Systems |
|
|
181 | (1) |
|
|
182 | (2) |
|
|
182 | (1) |
|
Investigating Current Systems |
|
|
183 | (1) |
|
|
184 | (5) |
|
Understanding Organizational Goals |
|
|
184 | (1) |
|
|
185 | (1) |
|
|
186 | (1) |
|
Evaluating System Feasibility |
|
|
187 | (2) |
|
6.5 Detailed Systems Design and Acquisition |
|
|
189 | (8) |
|
Designing System Outputs, Processes, and Inputs |
|
|
189 | (3) |
|
The System Specifications Report |
|
|
192 | (1) |
|
Choosing an Accounting Information System |
|
|
193 | (3) |
|
|
196 | (1) |
|
6.6 Implementation, Follow-Up, and Maintenance |
|
|
197 | (18) |
|
Implementation Activities |
|
|
198 | (1) |
|
Managing Implementation Projects |
|
|
199 | (3) |
|
Postimplementation Review |
|
|
202 | (1) |
|
|
202 | (13) |
|
Chapter 7 Database Design |
|
|
215 | (28) |
|
|
215 | (1) |
|
7.2 An Overview of Databases |
|
|
215 | (8) |
|
|
216 | (1) |
|
Significance of Databases |
|
|
216 | (2) |
|
Storing Data in Databases |
|
|
218 | (2) |
|
Additional Database Issues |
|
|
220 | (3) |
|
7.3 Steps in Developing a Database Using the Resources, Events, and Agents (REA) Approach |
|
|
223 | (7) |
|
Step 1 Identify Business and Economic Events |
|
|
223 | (1) |
|
|
224 | (1) |
|
Step 3 Identify Relationships |
|
|
225 | (2) |
|
Step 4 Create Entity-Relationship Diagrams |
|
|
227 | (1) |
|
Step 5 Identify Attributes of Entities |
|
|
227 | (2) |
|
Step 6 Convert E-R Diagrams into Database Tables |
|
|
229 | (1) |
|
|
230 | (13) |
|
|
231 | (1) |
|
|
232 | (1) |
|
|
233 | (10) |
|
Chapter 8 Organizing and Manipulating the Data in Databases |
|
|
243 | (32) |
|
|
243 | (1) |
|
8.2 Creating Database Tables in Microsoft Access |
|
|
244 | (6) |
|
Database Management Systems |
|
|
244 | (1) |
|
An Introduction to Microsoft Access |
|
|
244 | (1) |
|
|
245 | (2) |
|
|
247 | (3) |
|
8.3 Entering Data in Database Tables |
|
|
250 | (5) |
|
|
250 | (1) |
|
Ensuring Valid and Accurate Data Entry |
|
|
251 | (3) |
|
Tips for Creating Database Tables and Records |
|
|
254 | (1) |
|
8.4 Extracting Data from Databases: Data Manipulation Languages (DMLs) |
|
|
255 | (7) |
|
|
255 | (3) |
|
|
258 | (2) |
|
Guidelines for Creating Queries |
|
|
260 | (1) |
|
Structured Query Language (SQL) |
|
|
260 | (1) |
|
Sorting, Indexing, and Database Programming |
|
|
261 | (1) |
|
Online Analytical Processing (OLAP) and Data Mining |
|
|
261 | (1) |
|
8.5 Cloud Databases and Data Warehouses |
|
|
262 | (13) |
|
|
262 | (1) |
|
|
263 | (12) |
|
Chapter 9 Database Forms and Reports |
|
|
275 | (26) |
|
|
275 | (1) |
|
|
275 | (8) |
|
|
277 | (3) |
|
Using Forms for Input and Output Tasks |
|
|
280 | (1) |
|
Subforms: Showing Data from Multiple Tables |
|
|
281 | (2) |
|
Concluding Remarks About Forms |
|
|
283 | (1) |
|
|
283 | (18) |
|
|
283 | (4) |
|
Creating Reports with Calculated Fields |
|
|
287 | (2) |
|
Creating Reports with Grouped Data |
|
|
289 | (2) |
|
Concluding Remarks About Reports |
|
|
291 | (10) |
|
Chapter 10 Accounting Information Systems and Business Processes: Part I |
|
|
301 | (32) |
|
|
301 | (1) |
|
10.2 Business Process Fundamentals |
|
|
302 | (2) |
|
Overview of the Financial Accounting Cycle |
|
|
302 | (1) |
|
|
303 | (1) |
|
10.3 Collecting and Reporting Accounting Information |
|
|
304 | (3) |
|
|
305 | (1) |
|
From Source Documents to Output Reports |
|
|
306 | (1) |
|
|
307 | (6) |
|
Objectives of the Sales Process |
|
|
308 | (3) |
|
Inputs to the Sales Process |
|
|
311 | (1) |
|
Outputs of the Sales Process |
|
|
312 | (1) |
|
10.5 The Purchasing Process |
|
|
313 | (7) |
|
Objectives of the Purchasing Process |
|
|
314 | (1) |
|
Inputs to the Purchasing Process |
|
|
315 | (3) |
|
Outputs of the Purchasing Process |
|
|
318 | (2) |
|
10.6 Current Trends in Business Processes |
|
|
320 | (13) |
|
Business Process Outsourcing (BPO) |
|
|
321 | (1) |
|
Business Process Management Software |
|
|
322 | (11) |
|
Chapter 11 Accounting Information Systems and Business Processes: Part III |
|
|
333 | (30) |
|
|
333 | (1) |
|
11.2 The Resource Management Process |
|
|
334 | (6) |
|
Human Resource Management |
|
|
334 | (3) |
|
|
337 | (3) |
|
11.3 The Production Process |
|
|
340 | (6) |
|
Objectives of the Production Process |
|
|
340 | (4) |
|
Inputs to the Production Process |
|
|
344 | (1) |
|
Outputs of the Production Process |
|
|
345 | (1) |
|
11.4 The Financing Process |
|
|
346 | (3) |
|
Objectives of the Financing Process |
|
|
346 | (2) |
|
Inputs to the Financing Process |
|
|
348 | (1) |
|
Outputs of the Financing Process |
|
|
348 | (1) |
|
11.5 Business Processes in Special Industries |
|
|
349 | (5) |
|
Professional Service Organizations |
|
|
350 | (1) |
|
Not-for-Profit Organizations |
|
|
351 | (1) |
|
Health Care Organizations |
|
|
352 | (2) |
|
11.6 Business Process Reengineering |
|
|
354 | (9) |
|
Why Reengineering Sometimes Fails |
|
|
355 | (8) |
|
Chapter 12 Integrated Accounting and Enterprise Software |
|
|
363 | (28) |
|
|
363 | (1) |
|
12.2 Integrated Accounting Software |
|
|
364 | (4) |
|
Small Business Accounting Software |
|
|
364 | (3) |
|
Mid-Range and Large-Scale Accounting Software |
|
|
367 | (1) |
|
Specialized Accounting Information Systems |
|
|
367 | (1) |
|
12.3 Enterprise-Wide Information Systems |
|
|
368 | (9) |
|
Enterprise System Functionality |
|
|
369 | (2) |
|
The Architecture of Enterprise Systems |
|
|
371 | (3) |
|
Business Processes and ERP Systems |
|
|
374 | (1) |
|
Benefits and Risks of Enterprise Systems |
|
|
375 | (2) |
|
12.4 Selecting a Software Package |
|
|
377 | (14) |
|
When Is a New AIS Needed? |
|
|
378 | (1) |
|
Selecting the Right Accounting Software |
|
|
378 | (13) |
|
Chapter 13 Introduction to Internal Control Systems |
|
|
391 | (34) |
|
|
391 | (2) |
|
Definition of Internal Control |
|
|
392 | (1) |
|
|
393 | (1) |
|
13.2 Coso Internal Control---Integrated Framework |
|
|
393 | (3) |
|
|
393 | (2) |
|
|
395 | (1) |
|
13.3 Enterprise Risk Management |
|
|
396 | (4) |
|
|
396 | (2) |
|
Using the 2004 ERM Framework |
|
|
398 | (2) |
|
13.4 Examples of Control Activities |
|
|
400 | (8) |
|
|
400 | (1) |
|
Sound Personnel Policies and Procedures |
|
|
401 | (1) |
|
|
402 | (2) |
|
Physical Protection of Assets |
|
|
404 | (4) |
|
13.5 Monitoring Internal Control Systems |
|
|
408 | (3) |
|
Reviews of Operating Performance |
|
|
408 | (1) |
|
COSO Guidance on Monitoring |
|
|
408 | (1) |
|
Operating Performance vs. Monitoring |
|
|
408 | (1) |
|
|
409 | (2) |
|
|
411 | (1) |
|
|
411 | (1) |
|
|
412 | (1) |
|
|
412 | (1) |
|
|
412 | (13) |
|
Requirements of the Sarbanes-Oxley Act |
|
|
413 | (1) |
|
|
413 | (2) |
|
|
415 | (10) |
|
Chapter 14 Computer Controls for Organizations and Accounting Information Systems |
|
|
425 | (34) |
|
|
425 | (1) |
|
14.2 Enterprise-Level Controls |
|
|
426 | (2) |
|
Risk Assessment and Security Policies |
|
|
427 | (1) |
|
Designing a Security Policy |
|
|
427 | (1) |
|
Integrated Security for the Organization |
|
|
427 | (1) |
|
14.3 General Controls for Information Technology |
|
|
428 | (14) |
|
Access to Data, Hardware and Software |
|
|
429 | (5) |
|
Personnel Policies to Protect Systems and Data |
|
|
434 | (2) |
|
Additional Policies to Protect Systems and Data |
|
|
436 | (6) |
|
14.4 Application Controls for Transaction Processing |
|
|
442 | (17) |
|
|
443 | (3) |
|
|
446 | (2) |
|
|
448 | (11) |
|
Chapter 15 Information Technology Auditing |
|
|
459 | (28) |
|
|
459 | (1) |
|
|
460 | (6) |
|
Internal versus External Auditing |
|
|
460 | (1) |
|
Information Technology Auditing |
|
|
461 | (3) |
|
Evaluating the Effectiveness of Information Systems Controls |
|
|
464 | (2) |
|
15.3 The Information Technology Auditor's Toolkit |
|
|
466 | (3) |
|
|
466 | (2) |
|
|
468 | (1) |
|
15.4 Auditing Computerized Accounting Information Systems |
|
|
469 | (7) |
|
Testing Computer Programs |
|
|
469 | (2) |
|
Validating Computer Programs |
|
|
471 | (1) |
|
Review of Systems Software |
|
|
472 | (1) |
|
Validating Users and Access Privileges |
|
|
473 | (1) |
|
|
474 | (2) |
|
15.5 Information Technology Auditing Today |
|
|
476 | (11) |
|
Information Technology Governance |
|
|
476 | (1) |
|
The Sarbanes-Oxley Act of 2002 |
|
|
476 | (2) |
|
Auditing Standards No. 5 (AS 5) |
|
|
478 | (1) |
|
Third-Party and Information Systems Reliability Assurances |
|
|
478 | (9) |
Index |
|
487 | |