click below
click below
Normal Size Small Size show me how
AIS Final
Question | Answer |
---|---|
The set of steps associated with an activity; one way an organization creates value. The processes discussed in the text include sales/collection, acquisition/payment, conversion, financing, and human resources. | business process |
Hard copy or electronic forms,often used as the basis for data entry in an AIS.For the sales/collection process,they may include remittance advices and customer invoices;in the acquisition/payment process,they include purchase orders and receiving reports | documents |
Terms that govern when title to merchandise passes from the seller to the buyer (destination or shipping point) and who is responsible for the cost of freight (collect or prepaid) | freight terms |
One element of an AIS. Policies and procedures designed to achieve four objectives: safeguarding assets, ensuring financial statement reliability, promoting operational efficiency, and encouraging compliance w/management's directives. | internal controls |
The common activities associated with a business process. Although the steps may vary slightly for some processes between organizations, certain common elements are nearly always present. | steps |
The seller pays the freight company up front, and the buyer takes responsibility for the goods when they arrive at the destination. | FOB destination, freight prepaid |
The buyer takes responsibility for the goods when they arrive and pays the freight bill at the same time. | FOB destination, freight collect |
The buyer takes responsibility for the goods as soon as they are loaded on the truck/train/plane. But the seller pays the freight company up front. | FOB shipping point, freight prepaid |
The buyer takes responsibility for the goods at the shipping point and pays the freight company when the goods arrive. | FOB shipping point, freight point |
To summarize items ordered and prices Originator-Sales department Recipient-Warehouse | Customer order |
To guide selection of items from warehouse Originator-Warehouse Recipient-Shipping department | Picking list |
To specify contents of shipment Originator-Shipping department Recipient-Customer | Packing list |
To specify freight terms Originator-Shipping department Recipient-Common Carrier | Bill of lading |
To bill client Originator-Billing department Recipient-Cash receipts department | Customer check |
To provide a source document for AIS Originator-Customer Recipient-Accounting department | Remittance advice |
To transmit cash receipts to bank Originator-Cash receipts department Recipient-Bank | Deposit slip |
A protocol used to transmit data electronically between a vendor and a customer | Electronic data interchange |
Also know as XBRL. A markup language that allows users to tag data so that they can be read by virtually any computer program on any hardware platform. | eXtensible Business Reporting Language |
To request that the purchasing department order goods or services from a vendor Originator-Operating department Recipient-Purchasing department | Purchase requisition |
To specify the items to be ordered, freight terms, shipping address, and other information for the vendor Originator-Purchasing department Recipient-Vendor | Purchase order |
To ensure that goods have been ordered and received in good condition Originator-Receiving department Recipient-Various departments | Receiving report |
To request payment from a customer Originator-Vendor Recipient-Accounting department | Vendor invoice |
To pay the vendor Originator-Accounting department Recipient-Vendor | Check |
The process of combining raw material, labor, and overhead in the production of finished goods. | Conversion process |
The process of acquiring external funding, most commonly through debt or equity. | Financing process |
Issuance of capital stock, purchase of treasury shares, issuance and repayment of long-term debt, and dividend distributions. | Financing process transactions |
Associated with personnel activities in an organization, from the time of hiring to the time discharge via retirement, termination, or quitting. | Human resource process |
A production operation typically associated with unique, customized, or made-to-order goods. Examples include consulting assignments and custom-built homes. | Job costing |
The forms commonly used to process payroll transactions. Examples include Form W-4, Form W-2, payroll register, employee earnings record, Form 1099, Form 940, and Form 941. | Payroll forms |
A production operation typically associated with mass-produced, undifferentiated goods such as computer disks or black video tape. | Process costing |
Requests raw material from the warehouse for production. Originator-Production Recipient-Warehouse | Materials requisition |
Summarizes the material, labor, and overhead costs in a job costing system. Originator-Production Recipient-Accounting | Job cost sheet |
Accumulates labor data (time, pay rate, total labor cost). Originator-Production Recipient-Accounting | Labor time ticket |
Summarizes cost and quantity information in a process costing system. Originator-Production Recipient-Accounting | Production cost report |
Documents the movement of materials from the warehouse into production. Originator-Warehouse Recipient-Production | Materials move ticket |
Establishes payroll withholding status. Data included: employee identification data, withholding status, number of withholding allowances. | Form W-4 |
Reports year-end information for tax purposes. Data included: employee identification data, employer identification, gross pay and tax withholding's, 401(k) contributions. | Form W-2 |
Computes payroll data for all employees for a given pay period. Data included: employee identification data, hours worked, pay rate, total gross pay, tax and benefit withholding's, net pay. | Payroll register |
Summarizes payroll data for a single employee for multiple pay periods. Data includes: virtually the same as the payroll register. | Employee earnings record |
Reports amounts paid to an independent contractor (I.C.). Data included: I.C. identification data, payer's identification data, total amount paid. | Form 1099 |
Reports employer's federal unemployment taxes. Data included: company name, amount paid. | Form 940 |
Reports amounts withheld by employer to IRS. Data included: company name, employee identification data, amounts withheld. | Form 941 |
One of three internal control types necessary to protect data integrity in a computerized information system. | Administrative security controls |
Confidentiality availability, and data integrity are the three basic principles of information security. They are often referred to as the C-I-A triad. | Basic principles of information security |
The accountability framework shows the relationships between six groups of people as part of that process: stakeholders, board of directors, audit committee, IT and information security management, internal audit, and external audit. | CoBIT accountability framework |
This(Control Objectives for Information and Related Technology) was developed by the IS Audit and Control Association (ISACA) to provide guidance for IS internal controls. | CoBIT framework |
The ideal characteristics for information. They include effectiveness, efficiency, confidentiality, integrity, availability, compliance, and reliability. | CoBIT information criteria |
People who commit crimes, specifically involving information systems. | Perpetrators |
One of three internal control types necessary to protect data integrity in a computerized information systems. | Physical security controls |
Potential hazards for information systems. The development of internal controls often begins by identifying this. | Risks and threats |
A classification system for computer crime. Carter's taxonomy has 4 parts: target, instrumentality, incidental, and associated. | Taxonomy for computer crime |
One of three internal control types necessary to protect data integrity in a computerized information system. | Technical security controls |
Any illegal act for which knowledge of computer technology is used to commit the offense. | Fraud |
A young, inexperienced hacker who uses tools and scripts written by others for the purpose of attacking systems. | Script kiddie |
Refers to someone who invades an information system for malicious purposes; for example, they might steal clients' Social Security numbers or change student information. | Hackers |
Hackers driven by financial gain. They possess advanced skills and have turned to hacking--not for the challenge, but for the money | Cyber-criminals |
These criminal organizations have been getting into spamming, phishing, extortion, and all other profitable branches of computer crime. | Organized crime |
Take advantage of information stored on network systems with physical access no longer required to access it by turning to computer intrusion techniques to gather the info they desire. | Corporate spies |
As critical infrastructures become reliant on computers and networks for their operations,they could seriously disrupt power grids,telecommunications,transportation,and others if they were to exploit vulnerabilities to disrupt/shut down critical funcation | Terrorists |
The threat they present is generally due to employees finding themselves in positions of extraordinary privilege in relation to the key functions and assets of their organization | Insiders |
Condition that exists when data are held in confidence and are protected from unauthorized disclosure. | Confidentiality |
State that exists when data stored in an information system are the same as those in the source documents or have been correctly processed from source data and have not been exposed to accidental or malicious alteration or destruction. | Data integrity |
Achieved when the required data can be obtained within the required time frame. | Availability |
CoBIT. The information is relevant and pertinent to the business process and is delivered in a timely, correct, consistent and usable manner. | Effectiveness |
CoBIT. The information is provided though the optimal (most productive and economical) use of resources. | Efficiency |
CoBIT. Sensitive information is protected from unauthorized (sic) disclosure. | Confidentiality |
CoBIT. The information is accurate and complete and is in accordance with business values and expectations. | Integrity |
CoBIT. The information is available when required by the business process, now and in the future. It also concerns the safeguarding of necessary resources and associated capabilities. | Availability |
CoBIT. The information complies with those laws, regulations and contractual arrangements to which the business process is subject, i.e. externally imposed business criteria. | Compliance |
CoBIT. Appropriate information is provided for management to operate the entity and exercise its financial and compliance reporting responsibilities. | Reliability of information |
The premiere professional organization for people with an interest in forensic accounting and fraud examination. | Association of Certified Fraud Examiners |
The plans an accountant makes for his/her career in the profession. | Career plan |
A professional certification demonstrating knowledge and competence in fraud examination. | Certified Fraud Examiner CFE |
A professional certification demonstrating knowledge and competence in management accounting. | Certified Internal Auditor CIA |
A professional certification demonstrating knowledge and competence in information systems auditing. | Certified Information Systems Auditor CISA |
A professional certification demonstrating knowledge and competence in management accounting. | Certified Management Accountant CMA |
Professional organization that sponsors the CISA credential. | Information Systems Audit and Control Association ISACA |
Professional organization that sponsors the CIA credential. | Institute of Internal Auditors IIA |
Professional organization that sponsors the CMA credential. | Institute of Management Accountants IMA |
A systematic review of an organization's accounting information system, often for the purpose of expressing an opinion of the financial statements. | Auditing |
The rules auditors use to promote integrity and consistency in the audit process. Often referred to collectively as GAAS (generally accepted auditing standards). | Auditing standards |
The responsibility of an accountant to act in the best interests of others, such as stockholders. | Fiduciary duty |
A key element of the audit process and accounting information systems design and implementation. | Professional judgment |
A document published by the Government Accountability Office (GAO) that explains the rules for conducting a compliance audit. | Yellow Book |