Preface |
|
xv | |
Acknowledgments |
|
xxv | |
Part I Overview of Accounting Information Systems |
|
1 | (142) |
|
Chapter 1 The Information System: An Accountant's Perspective |
|
|
3 | (30) |
|
The Information Environment |
|
|
4 | (9) |
|
|
5 | (1) |
|
An Information Systems Framework |
|
|
5 | (3) |
|
|
8 | (1) |
|
|
9 | (4) |
|
Organizational Structure And AIS |
|
|
13 | (7) |
|
|
13 | (3) |
|
|
16 | (1) |
|
|
17 | (3) |
|
The Role Of Accountants In AIS |
|
|
20 | (3) |
|
Accountants as System Designers |
|
|
20 | (1) |
|
Accountants as System Auditors |
|
|
21 | (2) |
|
|
23 | (10) |
|
Chapter 2 Introduction to Transaction Processing |
|
|
33 | (60) |
|
An Overview Of Transaction Processing |
|
|
34 | (2) |
|
|
34 | (2) |
|
|
36 | (9) |
|
|
36 | (6) |
|
|
42 | (2) |
|
Digital Accounting Records |
|
|
44 | (1) |
|
|
45 | (4) |
|
|
46 | (2) |
|
|
48 | (1) |
|
|
49 | (14) |
|
Data Flow Diagrams and Entity Relationship Diagrams |
|
|
49 | (3) |
|
|
52 | (8) |
|
|
60 | (2) |
|
|
62 | (1) |
|
Transaction Processing Models |
|
|
63 | (6) |
|
Differences between Batch and Real-Time Systems |
|
|
63 | (1) |
|
Updating Master Files from Transactions |
|
|
64 | (1) |
|
Batch Processing Using Real-Time Data Collection |
|
|
65 | (2) |
|
|
67 | (2) |
|
|
69 | (4) |
|
|
69 | (1) |
|
|
69 | (1) |
|
Numeric and Alphabetic Coding Schemes |
|
|
70 | (3) |
|
|
73 | (1) |
|
|
73 | (20) |
|
Chapter 3 Ethics, Fraud, and Internal Control |
|
|
93 | (50) |
|
Ethical Issues In Business |
|
|
94 | (5) |
|
|
94 | (1) |
|
|
94 | (4) |
|
Sarbanes-Oxley Act and Ethical Issues |
|
|
98 | (1) |
|
|
99 | (11) |
|
|
99 | (1) |
|
|
100 | (1) |
|
Financial Losses from Fraud |
|
|
101 | (1) |
|
The Perpetrators of Frauds |
|
|
102 | (2) |
|
|
104 | (6) |
|
Internal Control Concepts And Techniques |
|
|
110 | (20) |
|
COSO Internal Control Framework |
|
|
114 | (6) |
|
|
120 | (5) |
|
|
125 | (1) |
|
Backup Process in Batch System Using Direct Access Files |
|
|
126 | (1) |
|
Backup of Master Files in a Real-Time System |
|
|
126 | (1) |
|
|
127 | (3) |
|
|
130 | (13) |
Part II Transaction Cycles and Business Processes |
|
143 | (232) |
|
Chapter 4 The Revenue Cycle |
|
|
145 | (64) |
|
|
146 | (12) |
|
Overview of Revenue Cycle Activities |
|
|
146 | (12) |
|
|
158 | (20) |
|
Basic Technology Revenue Cycle |
|
|
159 | (1) |
|
Basic Technology Sales Order Processing System |
|
|
159 | (4) |
|
Basic Technology Cash Receipts System |
|
|
163 | (1) |
|
Advanced Technology Revenue Cycle |
|
|
163 | (1) |
|
Integrated Sales Order Processing System |
|
|
163 | (3) |
|
Integrated Cash Receipts System |
|
|
166 | (2) |
|
Revenue Cycle Risks and Internal Controls |
|
|
168 | (7) |
|
Point-of-Sale (POS) Systems |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
176 | (1) |
|
Point-of-Sale Control Issues |
|
|
177 | (1) |
|
|
177 | (1) |
|
Reengineering Using the Internet |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
179 | (30) |
|
Chapter 5 The Expenditure Cycle Part I: Purchases and Cash Disbursements Procedures |
|
|
209 | (42) |
|
|
210 | (8) |
|
Overview of Purchases and Cash Disbursements Activities |
|
|
210 | (8) |
|
|
218 | (17) |
|
Basic Technology Expenditure Cycle |
|
|
220 | (3) |
|
Advanced Technology Expenditure Cycle |
|
|
223 | (1) |
|
Integrated Purchases Processing System |
|
|
223 | (4) |
|
Integrated Cash Disbursements System |
|
|
227 | (1) |
|
Expenditure Cycle Risks and Internal Controls |
|
|
228 | (6) |
|
|
234 | (1) |
|
|
235 | (16) |
|
Chapter 6 The Expenditure Cycle Part II: Payroll Processing and Fixed Asset Procedures |
|
|
251 | (40) |
|
The Conceptual Payroll System |
|
|
251 | (9) |
|
Payroll System General Tasks |
|
|
252 | (8) |
|
|
260 | (1) |
|
The Physical Payroll System |
|
|
260 | (9) |
|
Basic Technology Payroll System |
|
|
260 | (1) |
|
Advanced Technology Payroll System |
|
|
260 | (5) |
|
Payroll System Risks and Internal Controls |
|
|
265 | (4) |
|
The Conceptual Fixed Asset System |
|
|
269 | (7) |
|
The Logic of a Fixed Asset System |
|
|
269 | (2) |
|
The Physical Fixed Asset System |
|
|
271 | (3) |
|
Fixed Asset System Risks and Controls |
|
|
274 | (2) |
|
|
276 | (15) |
|
Chapter 7 The Conversion Cycle |
|
|
291 | (38) |
|
The Traditional Manufacturing Environment |
|
|
292 | (14) |
|
|
293 | (10) |
|
Controls in the Traditional Environment |
|
|
303 | (3) |
|
World-Class Companies And Lean Manufacturing |
|
|
306 | (2) |
|
What Is a World-Class Company? |
|
|
306 | (1) |
|
Principles of Lean Manufacturing |
|
|
306 | (2) |
|
Techniques And Technologies That Promote Lean Manufacturing |
|
|
308 | (4) |
|
Physical Reorganization of the Production Facilities |
|
|
308 | (1) |
|
Automation of the Manufacturing Process |
|
|
308 | (4) |
|
Accounting In A Lean Manufacturing Environment |
|
|
312 | (5) |
|
What's Wrong with Traditional Accounting Information? |
|
|
313 | (1) |
|
|
314 | (1) |
|
|
315 | (2) |
|
Information Systems That Support Lean Manufacturing |
|
|
317 | (3) |
|
Materials Requirement Planning |
|
|
317 | (1) |
|
Manufacturing Resource Planning |
|
|
318 | (2) |
|
Enterprise Resource Planning Systems |
|
|
320 | (1) |
|
|
320 | (9) |
|
Chapter 8 Financial Reporting and Management Reporting Systems |
|
|
329 | (46) |
|
The General Ledger System |
|
|
329 | (6) |
|
|
330 | (1) |
|
|
330 | (2) |
|
|
332 | (1) |
|
Sophisticated Users with Homogeneous Information Needs |
|
|
332 | (1) |
|
Financial Reporting Procedures |
|
|
332 | (3) |
|
XBRL-Reengineering Financial Reporting |
|
|
335 | (7) |
|
|
335 | (1) |
|
|
336 | (5) |
|
A Brief History of XBRL Reporting |
|
|
341 | (1) |
|
|
342 | (3) |
|
|
342 | (2) |
|
Internal Control Implications of XBRL |
|
|
344 | (1) |
|
The Management Reporting System |
|
|
345 | (15) |
|
Factors That Influence the MRS |
|
|
345 | (7) |
|
|
352 | (5) |
|
Behavioral Considerations |
|
|
357 | (3) |
|
Data Analytics And Ad Hoc Reporting |
|
|
360 | (4) |
|
|
360 | (1) |
|
|
360 | (4) |
|
|
364 | (11) |
Part III Advanced Technologies in Accounting Information |
|
375 | (168) |
|
Chapter 9 Database Management Systems |
|
|
377 | (62) |
|
Overview Of The Flat-File Versus Database Approach |
|
|
377 | (4) |
|
|
378 | (1) |
|
|
378 | (1) |
|
|
379 | (1) |
|
|
379 | (1) |
|
|
379 | (1) |
|
Flat-File Problems Solved |
|
|
380 | (1) |
|
Controlling Access to the Database |
|
|
380 | (1) |
|
The Database Management System |
|
|
380 | (1) |
|
|
381 | (1) |
|
Elements Of The Database Environment |
|
|
381 | (6) |
|
|
381 | (1) |
|
The Database Management System |
|
|
381 | (4) |
|
The Database Administrator |
|
|
385 | (2) |
|
|
387 | (1) |
|
The Relational Database Model |
|
|
387 | (17) |
|
|
389 | (6) |
|
Anomalies, Structural Dependencies, and Data Normalization |
|
|
395 | (2) |
|
Represent the View as a Single Table |
|
|
397 | (2) |
|
Remove Repeating Group Data |
|
|
399 | (1) |
|
Remove Partial Dependencies |
|
|
400 | (1) |
|
Remove Transitive Dependencies |
|
|
401 | (1) |
|
Linking the Normalized Tables |
|
|
401 | (3) |
|
Top-Down Approach To Designing Relational Databases |
|
|
404 | (7) |
|
Identify the Views to Be Modeled |
|
|
405 | (1) |
|
Normalize Data Model and Add Primary Keys |
|
|
406 | (2) |
|
Determine Cardinalities and Add Foreign Keys |
|
|
408 | (1) |
|
Construct the Physical Database |
|
|
409 | (1) |
|
Prepare the Physical User Views |
|
|
409 | (2) |
|
Commercial Database System |
|
|
411 | (1) |
|
Databases In A Distributed Environment |
|
|
411 | (6) |
|
|
411 | (2) |
|
|
413 | (4) |
|
|
417 | (1) |
|
|
417 | (22) |
|
Chapter 10 The REA Approach to Database Modeling |
|
|
439 | (30) |
|
|
440 | (3) |
|
|
440 | (3) |
|
|
443 | (8) |
|
Differences between ER and REA Diagrams |
|
|
443 | (1) |
|
View Modeling: Creating an Individual REA Diagram |
|
|
444 | (7) |
|
View Integration: Creating An Enterprise-Wide REA Model |
|
|
451 | (11) |
|
Step 1. Consolidate the Individual Models |
|
|
451 | (3) |
|
Step 2. Define Primary Keys, Foreign Keys, and Attributes |
|
|
454 | (4) |
|
Step 3. Construct the Physical Database and Produce User Views |
|
|
458 | (2) |
|
REA and Value Chain Analysis |
|
|
460 | (2) |
|
REA Compromises in Practice |
|
|
462 | (1) |
|
|
462 | (7) |
|
Chapter 11 Enterprise Resource Planning Systems |
|
|
469 | (28) |
|
|
470 | (2) |
|
|
471 | (1) |
|
Online Analytical Processing |
|
|
472 | (1) |
|
ERP System Configurations |
|
|
472 | (5) |
|
|
472 | (1) |
|
|
473 | (3) |
|
|
476 | (1) |
|
|
476 | (1) |
|
|
477 | (5) |
|
Modeling Data for the Data Warehouse |
|
|
477 | (1) |
|
Extracting Data from Operational Databases |
|
|
478 | (1) |
|
|
478 | (2) |
|
Transforming Data into the Warehouse Model |
|
|
480 | (1) |
|
Loading the Data into the Data Warehouse Database |
|
|
481 | (1) |
|
Decisions Supported by the Data Warehouse |
|
|
481 | (1) |
|
Supporting Supply Chain Decisions from the Data Warehouse |
|
|
482 | (1) |
|
Risks Associated With ERP Implementation |
|
|
482 | (5) |
|
Big Bang versus Phased-In Implementation |
|
|
483 | (1) |
|
Opposition to Changes in the Business's Culture |
|
|
483 | (1) |
|
|
483 | (2) |
|
Choosing the Wrong Consultant |
|
|
485 | (1) |
|
High Cost and Cost Overruns |
|
|
486 | (1) |
|
Disruptions to Operations |
|
|
486 | (1) |
|
Implications For Internal Control And Auditing |
|
|
487 | (5) |
|
Transaction Authorization |
|
|
487 | (1) |
|
|
487 | (1) |
|
|
487 | (1) |
|
|
488 | (1) |
|
|
488 | (1) |
|
|
488 | (2) |
|
Internal Control Issues Related to ERP Roles |
|
|
490 | (2) |
|
|
492 | (5) |
|
Chapter 12 Electronic Commerce Systems |
|
|
497 | (46) |
|
Intra-Organizational Networks And EDI |
|
|
498 | (1) |
|
|
498 | (10) |
|
|
498 | (3) |
|
|
501 | (1) |
|
|
502 | (2) |
|
|
504 | (1) |
|
|
504 | (4) |
|
Risks Associated With Electronic Commerce |
|
|
508 | (6) |
|
|
508 | (1) |
|
|
509 | (1) |
|
|
509 | (5) |
|
Security, Assurance, And Trust |
|
|
514 | (5) |
|
|
514 | (1) |
|
|
515 | (2) |
|
|
517 | (1) |
|
|
517 | (1) |
|
|
518 | (1) |
|
Implications For The Accounting Profession |
|
|
519 | (2) |
|
|
519 | (1) |
|
|
520 | (1) |
|
|
520 | (1) |
|
|
520 | (1) |
|
|
520 | (1) |
|
|
520 | (1) |
|
|
521 | (1) |
|
|
521 | (1) |
|
A Changing Legal Environment |
|
|
521 | (1) |
|
|
521 | (1) |
|
|
522 | (21) |
Part IV Systems Development Activities |
|
543 | (40) |
|
Chapter 13 Systems Development and Program Change Activities |
|
|
545 | (38) |
|
The Systems Development Process |
|
|
545 | (1) |
|
Participants In Systems Development |
|
|
546 | (1) |
|
Information Systems Acquisition |
|
|
546 | (2) |
|
|
547 | (1) |
|
In-House versus Commercial Software Issues |
|
|
548 | (1) |
|
The Systems Development Life Cycle |
|
|
548 | (26) |
|
|
549 | (3) |
|
Systems Analysis-Phase II |
|
|
552 | (4) |
|
Conceptual Systems Design-Phase III |
|
|
556 | (3) |
|
System Evaluation and Selection-Phase IV |
|
|
559 | (7) |
|
|
566 | (1) |
|
Application Programming and Testing-Phase VI |
|
|
567 | (2) |
|
System Implementation-Phase VII |
|
|
569 | (5) |
|
Systems Maintenance-Phase VIII |
|
|
574 | (1) |
|
|
574 | (1) |
|
Provide Technical Expertise |
|
|
575 | (1) |
|
Specify Documentation Standards |
|
|
575 | (1) |
|
|
575 | (8) |
Part V Computer Controls and IT Auditing |
|
583 | (106) |
|
Chapter 14 Auditing IT Controls Part I: Sarbanes-Oxley and IT Governance |
|
|
585 | (38) |
|
|
585 | (1) |
|
Financial Audit Components |
|
|
586 | (1) |
|
|
587 | (1) |
|
|
587 | (4) |
|
|
587 | (1) |
|
|
588 | (1) |
|
|
589 | (2) |
|
Overview Of Sox Sections 302 And 404 |
|
|
591 | (6) |
|
Relationship between IT Controls and Financial Reporting |
|
|
592 | (1) |
|
Audit Implications of Sections 302 and 404 |
|
|
593 | (4) |
|
|
597 | (1) |
|
Organizational Structure Controls |
|
|
597 | (7) |
|
Segregation of Duties within the Centralized Firm |
|
|
598 | (2) |
|
|
600 | (2) |
|
Creating a Corporate IT Function |
|
|
602 | (2) |
|
Audit Objectives Relating to Organizational Structure |
|
|
604 | (1) |
|
Audit Procedures Relating to Organizational Structure |
|
|
604 | (1) |
|
Computer Center Security And Controls |
|
|
604 | (3) |
|
|
605 | (2) |
|
Disaster Recovery Planning |
|
|
607 | (5) |
|
Providing Second-Site Backup |
|
|
607 | (1) |
|
Identifying Critical Applications |
|
|
608 | (1) |
|
Performing Backup and Off-Site Storage Procedures |
|
|
609 | (1) |
|
Creating a Disaster Recovery Team |
|
|
610 | (1) |
|
|
611 | (1) |
|
Audit Objective: Assessing Disaster Recovery Planning |
|
|
611 | (1) |
|
Audit Procedures for Assessing Disaster Recovery Planning |
|
|
611 | (1) |
|
Outsourcing The IT Function |
|
|
612 | (4) |
|
Risks Inherent to IT Outsourcing |
|
|
613 | (1) |
|
Loss of Strategic Advantage |
|
|
614 | (1) |
|
Audit Implications of IT Outsourcing |
|
|
615 | (1) |
|
|
616 | (1) |
|
|
616 | (1) |
|
|
616 | (7) |
|
Chapter 15 Auditing IT Controls Part II: Security and Access |
|
|
623 | (34) |
|
Controlling The Operating System |
|
|
623 | (7) |
|
Operating System Objectives |
|
|
623 | (1) |
|
Operating System Security |
|
|
624 | (1) |
|
Threats to Operating System Integrity |
|
|
625 | (1) |
|
Operating System Controls and Tests of Controls |
|
|
625 | (5) |
|
Controlling Database Management Systems |
|
|
630 | (4) |
|
|
630 | (2) |
|
|
632 | (2) |
|
|
634 | (9) |
|
Controlling Risks from Subversive Threats |
|
|
634 | (8) |
|
Controlling Risks from Equipment Failure |
|
|
642 | (1) |
|
Electronic Data Interchange Controls |
|
|
643 | (4) |
|
Transaction Authorization and Validation |
|
|
644 | (1) |
|
|
645 | (1) |
|
|
645 | (2) |
|
|
647 | (1) |
|
|
647 | (10) |
|
Chapter 16 Auditing IT Controls Part III: Systems Development, Program Changes, and Application Auditing |
|
|
657 | (32) |
|
Systems Development Controls |
|
|
658 | (7) |
|
Controlling Systems Development Activities |
|
|
658 | (2) |
|
Controlling Program Change Activities |
|
|
660 | (1) |
|
Source Program Library Controls |
|
|
660 | (1) |
|
The Worst-Case Situation: No Controls |
|
|
661 | (1) |
|
A Controlled SPL Environment |
|
|
662 | (3) |
|
IT Application Control Testing And Substantive Testing |
|
|
665 | (5) |
|
Designing Tests of Application Controls |
|
|
666 | (4) |
|
Internal Control Testing Techniques |
|
|
670 | (6) |
|
|
670 | (1) |
|
Through-the-Computer Approaches |
|
|
671 | (2) |
|
The Integrated Test Facility |
|
|
673 | (1) |
|
|
674 | (2) |
|
Substantive Testing Techniques |
|
|
676 | (4) |
|
The Embedded Audit Module |
|
|
676 | (1) |
|
Generalized Audit Software |
|
|
677 | (3) |
|
|
680 | (9) |
Glossary |
|
689 | (22) |
Index |
|
711 | |