The practicing accountant should have a thorough knowledge of the processes within an accounting system. Otherwise, it would not be possible to create a system of controls, write procedures, understand where errors are originating, or develop new systems. The Accounting Information Systems course provides the deep background needed to gain proficiency in this area. The course also examines how transactions are recorded and roll up into the general ledger and financial statements. In addition, there is significant treatment of the many controls integrated into accounting systems, as well as how someone could fraudulently penetrate an accounting system. Finally, the course describes the key events in the process of developing and installing a new system. In short, this course is the essential source book for the accountant who wants to understand the core functions of an accounting information system.
Learning Objectives
- Upon successful completion of this course, participants will be able to:
Recognize the components of an accounting information system, and how it can be used.
Identify the characteristics of data.
Recognize different types of business processes.
Describe the nature of a give-get exchange.
Describe the data processing cycle.
Recognize different types of source documents.
Differentiate between the different types of ledgers and their contents.
Specify where accounts are categorized within the chart of accounts.
Specify the uses to which a context diagram can be put.
Identify the best practices associated with the development of data flow diagrams and flowcharts.
Recognize the different types of data representation in a database.
State how tables and fields within a database are described.
Describe the advantages of a relational database.
Identify the tools used to manipulate and investigate data.
Describe the legal basis for fraud having been perpetrated.
Describe the three elements of the fraud triangle.
Identify the conditions that should be present in order to reduce the incidence of fraud.
Recognize the different classifications of computer-related fraud.
Specify the conceptual failings that can interfere with a system of controls.
Identify the different classifications of controls.
State the organizations supporting the Committee of Sponsoring Organizations.
Describe the components of the Internal Control
- Integrated Framework and the Enterprise Risk Management framework.
Identify the domains included in the COBIT model.
Recognize the different types of directed attacks to which a system may be subjected.
Identify the different types of input controls.
State the privacy principles noted in the Generally Accepted Privacy Principles.
Describe the different types of data backups.
Recognize the characteristics of a digital signature.
Describe the contents of an audit plan.
Identify the techniques used to collect audit evidence.
Describe the advantages of using computer-assisted auditing.
Recognize the components of the sales cycle and the failures that can arise from having incorrect data in it.
Identify the flow of information through the sales cycle, as well as the use of various documents within it.
Recognize the components of the expenditure cycle and the failures that can arise from having incorrect data in it.
Describe the formula for calculating the amount of reserve stock.
Identify the concepts underlying a just-in-time system.
Identify the various documents used in the expenditure cycle.
State the reasoning behind using the target costing system.
Recognize the components of the production cycle and the failures that can arise from having incorrect data in it.
Identify the components of the master production schedule.
Describe the different types of best practices that may be incorporated into an advanced manufacturing environment.
Identify the key components of an activity-based costing system.
Recognize the components of the human resources cycle and the failures that can arise from having incorrect data in it.
Identify the various documents and reports used in the human resources cycle.
Specify the situations in which the use of incentive compensation software is warranted.
Describe the responsibilities of an employer and its supplier when payroll is outsourced.
Identify the contents of the financial statements.
Recognize the formatting changes that can be used to enhance the relevance of reported information.
Identify the different types of month-end adjusting entries.
Describe the advantages of using long-term systems planning.
Specify the actions that can be taken to improve the odds of completing a system installation.
Recognize the levels of in-house expertise needed to operate different types of software installations.
Major Topics
Characteristics of Useful Accounting Information
AIS and Business Processes
The Data Processing Cycle
Types of Fraud
The Fraud Triangle
Computer Attacks
Fraud and Theft Detection
Control Principles
Committee of Sponsoring Organizations (COSO)
Control Objectives for Information and Related Technology (COBIT)
Security Controls
Types of Audits
AIS Audits
Sales Cycle Overview
Expenditure Cycle Overview
Production Cycle Overview
Human Resources Cycle Overview
The Nature of Financial Reporting
Systems Development and Analysis