Premium Essay

Ais, Account

In: Business and Management

Submitted By EARN
Words 279
Pages 2
An accountant can assume the following three roles in the current business environment:

designer, user, and auditor. As a designer, an accountant has to understand business processes

and control and map business processes to the system, considering the cost and benefit of

different options and critical business needs. It may be noted that the involvement of the

accountant at an early stage of system development pays the highest dividends to the

organization. This is so because controls need to be incorporated in the system at the design

stage itself.

Accountants, as users, need to acquire certain skills in order to make productive use

of information technology. It is expected of an accountant to possess knowledge in the following


1. A thorough understanding of at least one operating system;

2. A thorough understanding of at least one basic accounting package, word processing

software, spreadsheet, database, e-mail software and a browser;

3. A general understanding of systems and application controls for safeguarding systems

and data against unauthorized use, piracy, virus attacks and system failure.

As user of information technology, an accountant must also know how to test and assess the

acceptability of a particular system being acquired or developed for his use and to operate and

manage such a system and keep it up to date.

As internal and external auditors, accountants are collecting and evaluating evidence to

determine whether a computer system safeguards assets, maintains data integrity, and enables

communication. In addition, an accountant should access to information, achieves operational

goals effectively, and consumes resources efficiently. Thus, information systems auditing supports traditional audit objectives that focus on asset safeguarding, data integrity,…...

Similar Documents

Premium Essay


... | | | | | | *Note: All asterisked Questions, Exercises, and Problems relate to material contained in the Appendices to each chapter. ASSIGNMENT CHARACTERISTICS TABLE |Problem Number | |Difficulty Level|Time | | |Description | |Allotted (min.) | |1A |Identify problems and recommend inventory system. |Moderate |20-30 | |2A |Record inventory transactions and post to inventory account – perpetual |Moderate |30-40 | | |system. | | | |3A |Record inventory transactions – perpetual system. |Moderate |30-40 | |4A |Record and post inventory transactions – perpetual system. Prepare partial|Moderate |60-70 | | |income statement and balance sheet. | | | |5A |Prepare adjusting and closing entries – perpetual system. Prepare |Moderate |50-60 | | ......

Words: 17595 - Pages: 71

Premium Essay


...Personal, Nominal account balances In accounting terms, a balance sheet is a statement of balances in ledger accounts after closing the nominal accounts i.e. a statement of Real, Personal and Special Nominal account balances. Special Nominal Accounts Nominal accounts whose balances are carried over from one accounting period to another. Statement of balances carried forward If the balance sheet is the one drawn on the last day of the accounting period, the balances represent the ledger account balances to be carried forward to the subsequent accounting period. Deriving additional information from the Balance Sheet | Apart from the information relating to the organisation's assets and liabilities, a lot of other information can be derived from the balance sheet. For deriving some kinds of information, arranging the assets and liabilities in a specific order is all that is needed to be done. For deriving some other kinds of information the balance sheet may have to be redrawn by grouping and rearranging the information contained in it. Some of the methods used to derive the additional information are Setting off related ledger account balances Balance sheet contains some derived information that is obtained by clubbing or setting off certain related ledger account balances. Net Value of Assets Asset account has a debit balance which indicates the net value [cost - depreciation to date] of the asset. Ledgers Show Where depreciation reserve account is being......

Words: 31927 - Pages: 128

Premium Essay


...aid of examples, how the transactions impact the accounting equation. The accounting equation consists of three company`s accounts including assets, liabilities and owner`s equity. The accounting equation can be summarized as : Assets = Liabilities + Owner`s Equity Based on the equation, assets are the total of liabilities and owner`s equity. Assets are a company’s resources—things the company owns. Examples of assets include cash, accounts receivable, inventory, prepaid insurance, investments, land, buildings, equipment, and goodwill. Liabilities are the amounts of the company owes. Examples of liabilities include notes or loans payable, accounts payable, salaries and wages payable, and interest payable. Owner’s equity or stockholders’ equity is the amount left over after liabilities are deducted from assets: Assets – Liabilities = Owner’s Equity. Owner's Equity is applicable when the company is a sole proprietorship. If the company is a corporation, the words Stockholders' Equity is used. Owner’s or stockholders’ equity also reports the amounts invested into the company by the owners plus the cumulative net income of the company that has not been withdrawn or distributed to the owners. The accounting balance will balance if the records are accurate. The balance is maintained because every business transaction impact at least two accounts. For example, when a company borrows money from a bank, the company’s assets will increase and its liabilities will......

Words: 812 - Pages: 4

Premium Essay

Ais Attacks

...Attacks On AIS Introduction The more modern technology advances it appears vulnerabilities continuously exist in software used on networks. Hackers or automated information system (AIS) attackers gain access to system networks by manipulating those vulnerabilities. Attackers accomplish this by exploiting operating systems at the root level (Balga, Iftode, & Chen, 2008). Although there are protective measures available, businesses, particularly small businesses, are the most susceptible to these attacks. The following paragraphs will provide an argument based on why businesses are liable for loss when attackers attack their AIS. AIS The assembly of firmware, hardware, and software makes up the automated information system or AIS. It is here where computers store information, such as computations and communications. Businesses and governmental agencies benefit from the use of an AIS. The benefits are time and cost efficient; however, the greater the benefit the greater the risk of attacks. Businesses are losing billions of dollars annually because of these attacks especially when there is no preventive measures in place (Balga, Iftode, & Chen, 2008). Without preventive measures, attackers forge Internet Protocol (IP) Addresses, which causes the victims of the attack to attack other victims. The source of the attack remains unidentifiable. Another type of attack is through user accounts. Networks use authentication information, such as user ID and......

Words: 773 - Pages: 4

Premium Essay

Fraud in Ais

...Fraud in the AIS Chad Burrell Professor Daniel Acheampong Accounting Information Systems ACC564 August 14, 2013 Abstract Firm Embezzled There were many failures in the firms accounting system that assisted this embezzlement to last for a decade. Sue Sachdeva was the main accountant at Koss Corporation and it is estimated that she embezzled over 34 million dollars during that time. Sachdeva was able to embezzle this amount through wire transfers, checks, and credit cards (Whitehouse, 2011). The first failure was the age of the AIS. It is estimated that the system was almost 30 years old. There were two offers to purchase a new system and each time Michael Koss, the CEO, denied the request (Whitehouse, 2011). Koss was operating on an outdated accounting system and probably thought that it was okay because he had auditors come in and authenticate the work it did. It is important to have a current system in order to keep accurate reports in keeping the company operating efficiently. Another failure was the reports that were produced by the AIS. Michael Koss never took the time to look at the financial records of the company. Even though he was the CEO of the company, he never took adequate time to read and compare the financial statements on a monthly or yearly basis. SOX The article recounts some specific problems within Koss: * Koss Corporation prepared materially inaccurate financial statements, book and records, and lacked adequate......

Words: 1071 - Pages: 5

Premium Essay

Advance Ais

...T OPIC SEVEN Other AIS Development Approaches © 2012 UMT Advanced Accounting Information Systems 1 INTRODUCTION • We’ll also discuss how to hasten or improve the development process through: – Business process reengineering – Prototyping – Computer-aided software engineering (CASE) tools © 2012 UMT Advanced Accounting Information Systems 2 BUSINESS PROCESS REENGINEERING • Business process reengineering (BPR) is the analysis and redesign of business processes and information systems to achieve significant performance improvements. – Reduces a company to its essential business processes. – Reshapes organizational work practices and information flows to take advantage of technological advancements. © 2012 UMT Advanced Accounting Information Systems 3 BUSINESS PROCESS REENGINEERING • BPR: – Simplifies the system. – Makes it more effective. – Improves a company’s quality and service. • BPR software has been developed to help automate many BPR tasks. © 2012 UMT Advanced Accounting Information Systems 4 BUSINESS PROCESS REENGINEERING • Michael Hammer has set forth several principles that help organizations successfully reengineer business processes: - Organize around outcomes, not tasks. • DO AWAY WITH: Assigning different parts of a business process to different people, with the resulting handoffs, delays, and errors. INSTEAD: Each person’s job is designed around an objective, outcome, or process rather than a task needed......

Words: 3170 - Pages: 13

Free Essay

Ai Weiwei

...2013 Ai Weiwei Ai Weiwei is an internationally celebrated Chinese artist whose voice is heard loudly through his art. He believes in freedom of expression and despises the Chinese Government’s power. Ai’s contemporary style comes in many forms; Sculpture, architecture, installation, film and photography, are only some of his great talents; his art exposes the very real hardships of the Chinese people and how their culture has been muted over time. The government has become such a major influence and has gained so much power that at one point they convinced the people to destroy their cultural reminders in hopes that they will leave behind an insignificant past. Ai Weiwei was born the 18 of May 1957 to father Ai Qing and mother Gao Ying. Ai Qing was well known throughout China for his very forward poetry. Qing would later be considered a liberal who spoke out by joining a very left wing Artist Association and in doing so he was subsequently arrested in the early 1930’s, this decision cost he and his family to be sentenced to live in a labor camp. For the first eighteen years of Ai Weiwei’s life was spent in Xinjiang and later they would be removed to Gobi Desert (with even worse conditions) then back again to Xinjiang before being released in 1975. Life was very hard for the family during this long period of time. The year of 1975, brought with it great change for their entire Weiwei family, they were allowed to return home to Beijing and in the year of 1978, Ai Qing......

Words: 2779 - Pages: 12

Free Essay

String Ai vs Weak Ai

...machines that were able to do some kind of intelligent work. According to AI concept it is possible for a machine to think. Actually intelligence has different meanings according to different people so let’s skip this talk and come to the point Strong vs Weak AI. Strong AI: According to think tanks of AI a day will come when computer’s computations and calculations will become so strong that a computer will be able to take decisions just like human brain, so that we will be able to call it as intelligent as human brain. In other words a machine will think in the same way as a human brain does. Weak AI: Weak AI is also intelligence in a way because the technology that we are using today as AI can be referred to as weak AI. Because the level of AI that we attain today can’t be placed at the level of human brain, because the most advance machines today we have can’t actually think like human brains. The case of chess master Garry Kasparov vs IBM's Deep Blue program is a good illustration. Although Kasparov had the advantage of human intuition, Deep Blue had the ability to calculate 200 million probabilities per second. Better approach to adopt: According to me it is impossible for a machine to attain a level of intelligence like human brain. But if we consider that it happens so this will be a destruction of the world. Because human brain is equally as dangerous as it is intelligent, so better approach is weak AI but it should be evolved for the betterment of humanity....

Words: 294 - Pages: 2

Premium Essay

The Adoption of Ais

...(IaaS), and four deployment models: Public cloud, Private cloud, Hybrid cloud and Community cloud. (Mell and Grance, 2011). ii. Accounting information system (AIS) Accounting information system is often described as “the combination of two terms- Accounting & Information System, whose major function is to collect, financial data, process it & provide financial information to the external & internal users” (Salehi et al. 2014, pp. 186). In essence, accounting information system is not necessarily a computerized system, it can be merely a simple manual system using pen and paper. However, with the rapid development of cloud computing, it has an increasingly significant impact on the revolution of accounting information system. iii. Adoption of cloud based accounting information system on the market On the Australian market, MYOB and QuickBooks have been the dominant accounting software providers for the past 25 years. However, cloud computing opens up possibilities for new software to enter into market. Xero and Saasu are the examples of those strong contenders in this area. (Ambrosiussen Accountants & Advisors, 2014) According to a research study conducted by CCH Australia in 2013 nationwide, fourteen per cent of small and medium enterprises are using a cloud based software to manage their accounts, while the adoption among accountants is much higher, almost one in four currently using a cloud platform. (CCH, 2013) Although cloud accounting information......

Words: 1746 - Pages: 7

Premium Essay

Pyq Ais

...AIS 630 COMPILATION OF PAST SEMESTERS QUESTIONS APRIL 2008 – JUNE 2013 COMPILED BY : AC220 6E STUDENTS LECTURER : DR. INTAN SALWANI MOHAMED DATE : AS AT 25TH NOVEMBER 2013 CHAPTER 1 – Introduction to Information Systems Development APRIL 2009 Question 1 a) System Development Life Cycle (SDLC) is one of the commonly used methods for developing information system. Explain what SDLC is. (4 marks) OCTOBER 2009 Question 1 a) Developing information systems is a complex process and requires team effort with different skills and experts. Explain the role of the following team members in relation to SDLC. i) End user ii) Infrastructure analyst iii) System Analyst iv) Project manager (8 marks) OCTOBER 2010 Question 1 a) List the phases that can be found in the systems development life cycle. (5 marks) b) Explain two (2) critics towards the waterfall model of the systems development life cycle. (4 marks) APRIL 2011 Question 1 * An information systems development team needs a mixture of knowledge and skills to successfully build a system. List any four (4) personnel involved in a typical information systems development team. (2 marks) JANUARY 2012 Question 1 a) State the FIVE (5) components of a computer-based information system. (2.5 marks) JUNE 2012 Question 1 a) Systems development life cycle is a series of recommended steps or phases designed as a guideline for developing information system.......

Words: 3158 - Pages: 13

Premium Essay


...ITEMS | DEBIT (RM) | CREDIT (RM) | Equipment |   |   | | 20,000.00 | Retained Profit | |   | 25,000.00 | | Advertising expenses |   | | 8,800.00 | Motor Vehicle | |   | 35,000.00 | | Accounting Fee | |   | 1,100.00 | | Account Receivable | |   | 4,500.00 | | Audit Fee | |   | | 9,900.00 | Inventory | |   | | 70,000.00 | Ordinary Share | |   | 200,000.00 | | Cash | | |   | | 6,500.00 | Other Payable | |   | 27,300.00 | | Bank | | |   | | 25,200.00 | Account Payable | |   | 11,000.00 | | Wages expenses | |   | | 83,000.00 | Building | | |   | | 105,500.00 | Notes payable | |   | 80,000.00 | | Land | | |   | 97,000.00 | | Cost of Goods Sold | |   | | 120,000.00 | Printing and stationary |   | 1,100.00 | | Wages payable | |   | | 10,600.00 | Other expenses | |   | | 4,300.00 | Sales revenue |   |   | 238,000.00 | | TOTAL | 720,000.00 | 463,800.00 | ARERIE SDN BHD TRIAL BALANCE FOR YEAR ENDED 31 DECEMBER 2009 Additional information: a) The depreciation expenses for equipment, motor vehicle and building using straight line method are as follow: Equipment 10% Motor Vehicle 20% Building 5% b) At 22th December 2009, Arerie Sdn Bhd has purchase furniture with amount RM5,000 in cash. c) Audit fee incurred during the year amount to RM 2,500 and remain unpaid. d) The debtor has paid RM3,000 by cheque but still not recorded. You are required to prepare: ...

Words: 263 - Pages: 2

Premium Essay

Ais Problem science? Exercise 4. Draw a document flowchart to depict each of the following situations. a. An individual from the marketing department of a wholesale company prepares five copies of a sales invoice, and each copy is sent to a different department. b. The individual invoices from credit sales must temporarily be stored until they can be matched against customer payments at a later date. c. A batch control tape is prepared along with a set of transactions to ensure completeness of the data. d. The source document data found on employee application forms are used as input to create new employee records on a computer master file. e. Delinquent credit customers are sent as many as four different inquiry letters before their accounts are turned over to a collection agency. f. Physical goods are shipped back to the supplier if they are found to be damaged upon arrival at the receiving warehouse. g. The data found on employee time cards are keyed onto a hard disk before they are processed by a computer. Page | 3 h. The data found on employee time cards are first keyed onto a floppy diskette before they are entered into a computer job stream for processing. i. A document flowchart is becoming difficult to understand because too many lines cross one another. j. Three people, all in different departments, look at the same document before it is eventually filed in a fourth department. k. Certain data from a source document are copied into a......

Words: 13539 - Pages: 55

Premium Essay


...adjusted trial balance. Now that all the end of the year adjustments are made and the adjusted trial balance matches the subsidiary accounts, financial statements can be prepared. After financial statements are published and released to the public, the company can close its books for the period. Closing entries are made and posted to the post closing trial balance. At the start of the next accounting period, occasionally reversing journal entries are made to cancel out the accrual entries made in the previous period. After the reversing entries are posted, the accounting cycle starts all over again with the occurrence of a new business transaction. Here is a simplified summary of the steps in a traditional accounting cycle. Some textbooks list more steps than this, but I like to simplify them and combine as many steps as possible. * -- Identify business events, analyze these transactions, and record them as journal entries * -- Post journal entries to applicable T-accounts or ledger accounts * -- Prepare an unadjusted trial balance from the general ledger * -- Analyze the trial balance and make end of period adjusting entries * -- Post adjusting journal entries and prepare the adjusted trial balance * -- Use the adjusted trial balance to prepare financial statements * -- Close all temporary income statement accounts with closing entries * -- Prepare the post closing trial balance for the next accounting period * -- Prepare reversing......

Words: 7143 - Pages: 29

Premium Essay

History of Ais

...[edit]Software architecture of a modern AIS A modern AIS typically follows a multitier architecture separating the presentation to the user, application processing and data management in distinct layers. The presentation layer manages how the information is displayed to and viewed by functional users of the system (through mobile devices, web browsers or client application). The entire system is backed by a centralized database that stores all of the data. This can include transactional data generated from the core business processes (purchasing, inventory, accounting) or static, master data that is referenced when processing data (employee and customer account records and configuration settings). As transaction occur, the data is collected from the business events and stored into the system’s database where it can be retrieved and processed into information that is useful for making decisions. The application layer retrieves the raw data held in the database layer, processes it based on the configured business logic and passes it onto the presentation layer to display to the users. For example, consider the accounts payable department when processing an invoice. With an accounting information system, an accounts payable clerk enters the invoice, provided by a vendor, into the system where it is then stored in the database. When goods from the vendor are received, a receipt is created and also entered into the AIS. Before the accounts payable department pays the vendor,......

Words: 2186 - Pages: 9

Premium Essay

Ai Robot

...AI robot: how machine intelligence is evolving No computer can yet pass the 'Turing test' and be taken as human. But the hunt for artificial intelligence is moving in a different, exciting direction that involves creativity, language – and even jazz • Comments (109) • Marcus du Sautoy • The Observer, Saturday 31 March 2012 • Article history [pic] Marcus du Sautoy with one of Luc Steels's language-making robots. Photograph: Jodie Adams/BBC 'I propose to consider the question "Can machines think?"' Not my question but the opening of Alan Turing's seminal 1950 paper which is generally regarded as the catalyst for the modern quest to create artificial intelligence. His question was inspired by a book he had been given at the age of 10: Natural Wonders Every Child Should Know by Edwin Tenney Brewster. The book was packed with nuggets that fired the young Turing's imagination including the following provocative statement: "Of course the body is a machine. It is vastly complex, many times more complicated than any machine ever made with hands; but still after all a machine. It has been likened to a steam machine. But that was before we knew as much about the way it works as we know now. It really is a gas engine; like the engine of an automobile, a motor boat or a flying machine." If the body were a machine, Turing wondered: is it possible to artificially create such a contraption that could think like he did? This year is Turing's centenary so would......

Words: 1894 - Pages: 8