2009 Business Environment Class Notes 4.pdf

3
Becker CPA Review – Business 4 Class Notes 1 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. BUSINESS 4 CLASS NOTES Information Technology implications in the business environment are covered in BEC4. This area is worth 22%-28% of the point value on the BEC exam per the Content Specification Outline. The topic breakdown is: Role of business information systems, Roles and responsibilities within the IT function, IT fundamentals, Disaster recovery and business continuity, and Financial statement and business implications of electronic commerce. I. ROLE OF BUSINESS INFORMATION SYSTEMS A. Information Technology includes the hardware, software, data, people, and networks in a company’s computer system. B. IT systems process detailed data, assist in making daily decisions, and, on a higher level, assist in developing business strategies. C. An Accounting Information System (AIS) is part of a Management Information System. The AIS processes accounting transactions from source documents through financial statements, creating an audit trail for tracing and vouching the transactions. D. Other systems, in order of their hierarchy, are transaction processing (TPS), decision support (DSS), management information (MIS), and executive information (EIS). E. Types of reports are periodic scheduled, exception, demand, Ad Hoc or “push.” A well- designed system should have the ability to generate a report to answer virtually any question a user may have. II. ROLES AND RESPONSIBILITIES WITH THE IT FUNCTION A. Job titles within IT are constantly changing and some functions that were once useful are no longer necessary. The term “end user” means anyone who uses the system or enters data into it. B. Proper segregation of duties is very important in the organization of IT. The system should separate responsibilities for authorizing transactions, recording those transactions, and the custody of assets (ARC). In general, systems analysts, computer programmers, computer operators, and security administrators should be kept separate (although many companies combine system analysts and computer programmers). Proper segregation of duties is more difficult in smaller companies. III. IT FUNDAMENTALS A. Hardware includes the computer, storage devices, and peripherals. B. System software includes the operating system and the Database Management System (DBMS). C. The DBMS is a separate system that allows an organization to create and used databases (collections of data records and files).

description

Business Environment Class Notes

Transcript of 2009 Business Environment Class Notes 4.pdf

  • Becker CPA Review Business 4 Class Notes

    1 2009 DeVry/Becker Educational Development Corp. All rights reserved.

    BUSINESS 4 CLASS NOTES

    Information Technology implications in the business environment are covered in BEC4. This area is worth 22%-28% of the point value on the BEC exam per the Content Specification Outline. The topic breakdown is:

    Role of business information systems,

    Roles and responsibilities within the IT function,

    IT fundamentals,

    Disaster recovery and business continuity, and

    Financial statement and business implications of electronic commerce.

    I. ROLE OF BUSINESS INFORMATION SYSTEMS

    A. Information Technology includes the hardware, software, data, people, and networks in a companys computer system.

    B. IT systems process detailed data, assist in making daily decisions, and, on a higher level, assist in developing business strategies.

    C. An Accounting Information System (AIS) is part of a Management Information System. The AIS processes accounting transactions from source documents through financial statements, creating an audit trail for tracing and vouching the transactions.

    D. Other systems, in order of their hierarchy, are transaction processing (TPS), decision support (DSS), management information (MIS), and executive information (EIS).

    E. Types of reports are periodic scheduled, exception, demand, Ad Hoc or push. A well-designed system should have the ability to generate a report to answer virtually any question a user may have.

    II. ROLES AND RESPONSIBILITIES WITH THE IT FUNCTION

    A. Job titles within IT are constantly changing and some functions that were once useful are no longer necessary. The term end user means anyone who uses the system or enters data into it.

    B. Proper segregation of duties is very important in the organization of IT. The system should separate responsibilities for authorizing transactions, recording those transactions, and the custody of assets (ARC). In general, systems analysts, computer programmers, computer operators, and security administrators should be kept separate (although many companies combine system analysts and computer programmers). Proper segregation of duties is more difficult in smaller companies.

    III. IT FUNDAMENTALS

    A. Hardware includes the computer, storage devices, and peripherals.

    B. System software includes the operating system and the Database Management System (DBMS).

    C. The DBMS is a separate system that allows an organization to create and used databases (collections of data records and files).

  • Becker CPA Review Business 4 Class Notes

    2 2009 DeVry/Becker Educational Development Corp. All rights reserved.

    D. The primary advantages of a DBMS are reduction of data redundancy or inconsistency and enhanced information timeliness, effectiveness, and availability.

    E. Networks permit shared resources among interconnected computers. A LAN covers a local area, while a WAN (wide area) allows national and international communications. Most of these networks are set up as client/server systems. There are four types of network topologies.

    F. A WAN may be set up as a Value Added Network (VAN) or it may be internet-based. Since a VAN is privately-owned and the Internet is a public channel, Internet-based is less secure.

    G. A WAN may also be a virtual private network (VPN) which uses the internet. VPNs are less secure than VANs.

    H. Intranets connect separate LANs within a company. An extranet permits outside business partners access to a company network.

    I. Processing of transactions may be by batch (periodic) or it may be on-line (immediate). Flowcharts using unique symbols are designed to illustrate the various transaction components of a system. Controls over input, processing, and output are either manual or programmed into the computerized environment.

    J. The advantages/disadvantages of centralized vs. decentralized processing is fairly settled ground.

    K. A key element of security is controlling access to the system through usernames and passwords.

    IV. DISASTER RECOVERY AND BUSINESS CONTINUITY

    A. Risks associated with IT systems are characterized as strategic, operating, financial, and information. Other specific risks are errors, irregularities, and disasters.

    B. Effective risk management assesses the entitys vulnerability to risks and threats. Once identified, safeguards and controls are put in place to reduce or minimize those vulnerabilities.

    C. Access controls limit access a system, or parts thereof, to authorized personnel only. These controls may be physical (a separate room or area) or they may be electronic. When any changes to responsibilities occur, or there is a hiring or a termination, the access codes need to be adjusted accordingly.

    D. A firewall acts as a gatekeeper to limit access. Firewalls and other controls deter, but do not prevent, unauthorized access or intrusion. Application firewalls employ packet filtering to determine if data should pass through.

    E. Outside threats to an IT system may come in the form of a virus, worm, Trojan Horse, denial-of-service attack, or phishing.

    F. Records and files should be subjected to validation and editing techniques. Backups and off-site storage help ensure continuity in case of a loss of data.

    G. Data encryption, employing public and private keys, offer a form of security for transmitted messages.

    H. Disaster recovery plans are necessary to help ensure business continuity in case of a loss of processing capability. In case of such a loss, a company may use an outside recovery service or have its own cold or hot site prepared in advance.

  • Becker CPA Review Business 4 Class Notes

    3 2009 DeVry/Becker Educational Development Corp. All rights reserved.

    V. FINANCIAL STATEMENT AND BUSINESS IMPLICATIONS OF ELECTRONIC COMMERCE

    A. Electronic Data Interchange (EDI) is a type of e-business/e-commerce that allows for computer-to-computer exchange of business documents between trading partners in structured formats. It is generally more secure than e-commerce because a VAN is normally used.

    B. B2B and B2C allow purchasers to research alternatives through a website and make their purchases electronically.

    C. Enterprise Resource Planning Systems (ERP), Supply Chain Management Systems (SCM), and Customer Relationship Management Systems (CRM) are additional management tools available through computer systems.

    D. Electronic Funds Transfer (EFT) is a form of electronic payment that reduces the time to process checks and credit transactions.

    Appendix I covers the Audit Implications of IT, such as transaction tagging, embedded audit modules, test data, integrated test facility, parallel simulation, and generalized audit software packages (GASP).

    Exam questions released by examiners are available on the Becker Student Website and are also integrated into class materials. Some of the IT questions involve technical aspects that are generally beyond what an accountant should know; however, a candidate should be prepared for as much as possible. The Terminology on B4-69 and B4-70 is important to know.

    /ColorImageDict > /JPEG2000ColorACSImageDict > /JPEG2000ColorImageDict > /AntiAliasGrayImages false /CropGrayImages true /GrayImageMinResolution 150 /GrayImageMinResolutionPolicy /OK /DownsampleGrayImages false /GrayImageDownsampleType /Average /GrayImageResolution 300 /GrayImageDepth -1 /GrayImageMinDownsampleDepth 2 /GrayImageDownsampleThreshold 1.10000 /EncodeGrayImages true /GrayImageFilter /DCTEncode /AutoFilterGrayImages true /GrayImageAutoFilterStrategy /JPEG /GrayACSImageDict > /GrayImageDict > /JPEG2000GrayACSImageDict > /JPEG2000GrayImageDict > /AntiAliasMonoImages false /CropMonoImages true /MonoImageMinResolution 1200 /MonoImageMinResolutionPolicy /OK /DownsampleMonoImages false /MonoImageDownsampleType /Average /MonoImageResolution 1200 /MonoImageDepth -1 /MonoImageDownsampleThreshold 1.10000 /EncodeMonoImages true /MonoImageFilter /CCITTFaxEncode /MonoImageDict > /AllowPSXObjects false /CheckCompliance [ /None ] /PDFX1aCheck false /PDFX3Check false /PDFXCompliantPDFOnly false /PDFXNoTrimBoxError true /PDFXTrimBoxToMediaBoxOffset [ 0.00000 0.00000 0.00000 0.00000 ] /PDFXSetBleedBoxToMediaBox true /PDFXBleedBoxToTrimBoxOffset [ 0.00000 0.00000 0.00000 0.00000 ] /PDFXOutputIntentProfile (None) /PDFXOutputConditionIdentifier () /PDFXOutputCondition () /PDFXRegistryName (http://www.color.org) /PDFXTrapped /Unknown /CreateJDFFile false /SyntheticBoldness 1.000000 /Description >>> setdistillerparams> setpagedevice