ACC 564
Accounting Information System 12th Edition
Custom Edition for Strayer University by Marshall B. Romney Paul J. Steinbart
In order to purchase this solution, please click on below link.
http://www.studentoffortune.com/question/2049421/ACC-564
Chapter 1-22 All Solved Includes All Quizzes for ACC 564
Chapter 1
1.1 The value of information is the difference between the benefits realized from using that information and the costs of producing it. Would you, or any organization, ever produce information if its expected costs exceeded its benefits? If so, provide some examples. If not, why not?
1.2 Can the characteristics of useful information listed in Table 1-1 be met simultaneously? Or does achieving one mean sacrificing another?
1.3 You and a few of your classmates decided to become entrepreneurs. You came up with a great idea for a new mobile phone application that you think will make lots of money. Your business plan won second place in a local competition, and you are using the $10,000 prize to support yourselves as you start your company.
1.5 Figure 1-4 shows that organizational culture and the design of an AIS influence one another. What does this imply about the degree to which an innovative system developed by one company can be transferred to another company?
1.6 Figure 1-4 shows that developments in IT affect both an organization’s strategy and the design of its AIS. How can a company determine whether it is spending too much, too little, or just enough on IT?
1.7 Apply the value chain concept to S&S. Explain how it would perform the various primary and support activities.
1.8 Information technology enables organizations to easily collect large amounts of information about employees. Discuss the following issues:
Problems
1.1 Information technology is continually changing the nature of accounting and the role of accountants. Write a two-page report describing what you think the nature of the accounting function and the accounting information system in a large company will be like in the year 2020.
1.2 Adapted from the CMA Examination
a. Identify and discuss the basic factors of communication that must be considered in the presentation of the annual report.</para></listitem>
b. Discuss the communication problems a corporation faces in preparing the annual report that result from the diversity of the users being addressed.
c. Select two types of information found in an annual report, other than the financial statements and accompanying footnotes, and describe how they are helpful to the users of annual reports.
d. </inst>Discuss at least two advantages and two disadvantages of stating well-defined corporate strategies in the annual report.</para></listitem>
e. Evaluate the effectiveness of annual reports in fulfilling the information needs of the following current and potential users: shareholders, c</para></listitem>reditors</para></listitem>, <listitem><para><inst></inst>employees</para></listitem>, c<ustomers, and f</para></listitem>inancial analysts</para></listitem></orderedlist></listitem>
f. Annual reports are public and accessible to anyone, including competitors. Discuss how this affects decisions about what information should be provided in annual reports.
1.3 The use of IT at USAA
a. Why should USAA collect data on which auto parts are fixed most frequently? What could it do with this data?</para></listitem>
b. Even though USAA offered to waive the deductible, the repair shops still managed to convince 95% of the owners to replace rather than repair their damaged windshields. How could USAA use its AIS to persuade more shop owners to repair rather than replace their windows?</para></listitem>
1.5 The Howard Leasing Company
a. What kind of information do you think Tesco gathers?
c. What are some problems or drawbacks you can see with using these devices in business?
1.8 Classify each of the following items as belonging in the revenue, expenditure, human resources/payroll, production, or financing cycle.
1-1 The Web site for this book contains an adaption of Russell L. Ackoff’s classic article “Management Misinformation Systems” from Management Science. In the article, Ackoff identified five common assumptions about information systems and then explained why he disagreed with them.
Read the five assumptions, contentions, and Ackoff’s explanations. For each of the five assumptions, decide whether you agree or disagree with Ackoff’s contentions. Prepare a report in which you defend your stand and explain your defense.
CHAPTER 2
2.2 With respect to the data processing cycle, explain the phrase “garbage in, garbage out.” How can you prevent this from happening?
2.3 </inst><para>What kinds of documents are most likely to be turnaround documents? Do an internet search to find the answer and to find example turnaround documents.
2.4 The data processing cycle in Figure 2-1 is an example of a basic process found throughout nature. Relate the basic input/process/store/output model to the functions of the human body.
2.5 Some individuals argue that accountants should focus on producing financial statements and leave the design and production of managerial reports to information systems specialists. What are the advantages and disadvantages of following this advice? To what extent should accountants be involved in producing reports that include more than just financial measures of performance? Why?</para></question></general-problem></problemset>
2.1 The chart of accounts must be tailored to an organization’s specific needs. Discuss how the chart of accounts for the following organizations would differ from the one presented for S&S in <link linkend=”ch02table04″ preference=”0″>Table 2-2<xref linkend=”ch02table04″ label=”2-4″/></link>.</para>
2.2 <para>Design a chart of accounts for SDC. Explain how you structured the chart of accounts to meet the company’s needs and operating characteristics. Keep total account code length to a minimum, while still satisfying all of Mace’s desires.</para><source>
2.3 An audit trail enables a person to trace a source document to its ultimate effect on the financial statements or work back from amounts in the financial statements to source documents. Describe in detail the audit trail for the following:</para>
2.4 Your nursery sells various types and sizes of trees, bedding plants, vegetable plants, and shrubs. It also sells fertilizer and potting soil. Design a coding scheme for your nursery.
2.5 Match the following terms with their definitions
2.6 For each of the following scenarios identify which data processing method (batch or online, real-time) would be the most appropriate.
2.7 <para>After viewing the Web sites, and based on your reading of the chapter, write a 2 page paper that describes how an ERP can connect and integrate the revenue, expenditure, human resources/payroll, and financing cycles of a business.
2.8 Which of the following actions update a master file and which would be stored as a record in a transaction file?
2.9 You were hired to assist Ashton Fleming in designing an accounting system for S&S. Ashton has developed a list of the journals, ledgers, reports, and documents that he thinks S&S needs (see <link linkend=”ch02table06″ preference=”1″>Table 2-6<xref linkend=”ch02table06″ label=”2-8″/></link>). He asks you to complete the following tasks:</para>
a. Specify what data you think should be collected on each of the following four documents:
b. Design a report to manage inventory.</para></listitem>
2.1 Bar Harbor Blueberry Farm
Data from Case
CHAPTER 3
SYSTEMS DEVELOPMENT AND DOCUMENTATION TECHNIQUES
3.1 Identify the DFD elements in the following narrative: A customer purchases a few items from a local grocery store. Jill, a salesclerk, enters the transaction in the cash register and takes the customer’s money. At closing, Jill gives both the cash and the register tape to her manager.
3.2 Do you agree with the following statement: “Any one of the systems documentation procedures can be used to adequately document a given system”? Explain.
3.3 Compare the guidelines for preparing flowcharts and DFDs. What general design principles and limitations are common to both documentation techniques?
3.4 Your classmate asks you to explain flowcharting conventions using real-world examples. Draw each of the major flowchart symbols from memory, placing them into one of four categories: input/output, processing, storage, and flow and miscellaneous. For each symbol, suggest several uses.
3.1 Prepare flowcharting segments for each of the following operations:
e. reading data from a magnetic disk into the computer to be printed on a report
f. using a computer or terminal to </inst>key data from source documents to a file stored on a magnetic disk
g. manually sorting and filing invoices numerically
h. using a terminal to enter source document data and send it to a </inst>remote location where an online processing system records it in a database stored on magnetic disk
k. enter employee hours recorded on time cards in the payroll transaction file maintained on disk and update wage data maintained on the payroll master file
l. use a terminal to </inst>access a price list maintained on disk to complete a purchase order. An electronic copy of the purchase order is sent to the vendor and a backup copy is printed and filed by vendor name
m. update an airline reservation on a Web-based airline reservation system from a home computer
3.2 Happy Valley Utility Company
b. Draw a system flowchart depicting customer payments processing, starting with the mail room operations and ending with the two printed reports.
3.3 <para>Prepare a system flowchart of the process described.</para></problem>
3.4 Prepare a document flowchart to reflect how ANGIC Insurance Company processes its casualty claims.
3.5
a. Prepare a context diagram and level 0 DFD to document the payroll processing system at No-Wear Products.
b. Prepare a document flowchart to document the payroll processing system at No-Wear Products.
3.7
b. Prepare a document flowchart to document accounts payable processing at S&S.
3.8
a. Develop a context diagram and a level 0 DFD of the acquisition/payment system at Oriental Trading.
b. Prepare a document flowchart to document the acquisition/payment system at Oriental Trading.
3.9
a. Develop a context diagram and a level 0 DFD for the cash receipts system at S&S.</para></listitem>
3.11
3.13 Bottom Manufacturing Corporation Charge Sales System
a. List the procedures or the internal documents that are labeled letters <emphasis>c</emphasis> to <emphasis>r</emphasis> in the flowchart of Bottom Manufacturing Corporation’s charge sales system. Organize your answer as follows (Note that the explanations of the letters <emphasis>a</emphasis> and <emphasis>b</emphasis> in the flowchart are entered as examples):
</para></listitem>
b. Using the guidelines for preparing flowcharts in <link
linkend=”ch03sb02″ preference=”0″>Focus 3-2<xref
linkend=”ch03sb02″ label=”3-2″/></link> and the flowcharting
symbols shown in <link linkend=”ch03fig08″ preference=”0″>Figure
3-8<xref linkend=”ch03fig08″ label=”3-8″/></link>, critique
the flowchart shown in <link linkend=”ch03fig13″
preference=”0″>Figure 3-13<xref linkend=”ch03fig13″
label=”3-13″/></link>. List the ways the flowchart violates
the guidelines or uses improper symbols.
3.14
c. A customer places an online order to purchase merchandise. The order is approved, filled, and sent to the customer with an invoice.
d. An inventory request is received by the purchasing department. The purchasing
e. A vendor invoice is received, reviewed, and compared against the appropriate purchase order, then paid and filed.</para></listitem>
f. A bill of lading for ordered inventory is received from a vendor, recorded, checked against the appropriate purchase order, and filed.
3 .15 <para>Prepare a program flowchart to help Melanie program this process.</para></problem>
3.16
3-1 <para>You are the systems analyst for the Wee Willie Williams Widget Works (also known as Dub 5, which is a shortened version of 5 Ws). Dub 5 produces computer keyboard components. It has been producing keyboards for more than 20 years and has recently signed an exclusive 10-year contract to provide the keyboards for all Dell personal computers. As the systems analyst, you have been assigned the task of developing a level 0 DFD for Dub 5’s order processing system. You have finished gathering all the information you need to develop the first-pass DFD and now want to complete the diagram.</para>
4.7 Compare and contrast the file-oriented approach and the database approach. Explain the main advantages of database systems.
4.1
a. Identify three potential users and design a subschema for each. Justify your design by explaining why each user needs access to the subschema data elements.
b. Use Microsoft Access or some other relational database product to create the schema tables. Specify the primary key(s), foreign key(s), and other data for each table. Test your model by entering sample data in each table.
4.2 Most DBMS packages contain data definition, data manipulation, and data query languages. For each of the following, indicate which language would be used and why.
c. A programmer develops a program to update the fixed-assets records stored in the database.
d. The human resources manager requests a report noting all employees who are retiring within five years.
e. The inventory serial number field is extended in the inventory records to allow for recognition of additional inventory items with serial numbers containing more than 10 digits.
f. A user develops a program to print out all purchases made during the past two weeks.
g. An additional field is added to the fixed-asset records to record the estimated salvage value of each asset.
4.3 Ashton wants to store the following data about S&S’s purchases of inventory:
d. What was the average amount of a sales transaction?
e. Which salesperson made the largest sale?
f. How many units of each product were sold?
g. Which product was sold most frequently?</para></listitem></orderedlist></problem>
4.5
Enter the tables in <link linkend=”ch04table15″ preference=”1″>Table 4-15<xref linkend=”ch04table15″ label=”4-15″/></link> into a relational DBMS package. Write queries to answer the following questions. <emphasis>Note</emphasis>: For some questions, you may have to create two queries—one to calculate a total and the second to answer the question asked.<inlinemediaobject role=”titleicon” id=”ch04dg03″ type=”dg01″><imageobject><imagedata/></imageobject><textobject/></inlinemediaobject></para>
d. What were the item numbers, price, and quantity of each item sold on invoice number 103?
e. How much did each salesperson sell?
date hired
date of birth
date skill acquired
employee name
employee number
pay rate </pa
<listitem><para><inst>c. </inst>Implement your schema using any relational DBMS. Specify primary and foreign keys, and enforce referential integrity. Demonstrate the soundness of your design by entering sample data in each table.</para></listitem></orderedlist></problem>
4.7 You want to extend the schema shown in <link linkend=”ch04table16″ preference=”0″>Table 4-16<xref linkend=”ch04table16″ label=”4-16″/></link> to include information about customer payments. Some customers make installment payments on each invoice. Others write a check to pay for several different invoices. </para>
<listitem><para><inst>a. </inst>Modify the set of tables in <link linkend=”ch04table16″ preference=”1″>Table 4-16<xref linkend=”ch04table16″ label=”4-16″/></link> to store this additional data.<inlinemediaobject role=”titleicon” id=”ch04dg05″ type=”dg01″><imageobject><imagedata/></imageobject><textobject/></inlinemediaobject></para></listitem>
<listitem><para><inst>b. </inst>Identify the primary key for each new table you create.</para></listitem>
<listitem><para><inst>c. </inst>Implement your schema using any relational DBMS package. Indicate which attributes are primary and foreign keys, and enter sample data in each table you create.
</para></listitem></orderedlist></problem
4.8 Create relational tables that solve the update, insert, and delete anomalies in <link linkend=”ch04table17″ preference=”1″>Table 4-17.
4.9 Create relational tables that solve the update, insert, and delete anomalies in <link linkend=”ch04table18″ preference=”1″>Table 4-18.
4.10 From the database created in the comprehensive problem, perform queries based on the tables and query grid shown in <link linkend=”ch04table19″ preference=”1″>Table 4-19<xref linkend=”ch04table19″ label=”4-19″/></link>.
c. List all of the property appraisers.
g. Which borrower requested the smallest mortgage?
4.1 As in all areas of information technology, DBMSs are constantly changing and improving. Research how businesses are using DBMSs, and write a report of your findings. Address the following issues:
5.1 Do you agree that the most effective way to obtain adequate system security is to rely on the integrity of company employees? Why or why not? Does this seem ironic? What should a company do to ensure the integrity of its employees?
5.2 You are the president of a multinational company where an executive confessed to kiting $100,000. What is kiting and what can your company do to prevent it? How would you respond to the confession? What issues must you consider before pressing charges?
5.3 Discuss the following statement by Roswell Steffen, a convicted embezzler: “For every foolproof system, there is a method for beating it.” Do you believe a completely secure computer system is possible? Explain. If internal controls are less than 100% effective, why should they be employed at all?
5.4 Revlon hired Logisticon to install a real-time invoice and inventory processing system. Seven months later, when the system crashed, Revlon blamed the Logisticon programming bugs they discovered and withheld payment on the contract. Logisticon contended that the software was fine and that it was the hardware that was faulty. When Revlon again refused payment, Logisticon repossessed the software using a telephone dial-in feature to disable the software and render the system unusable. After a three-day standoff, Logisticon reactivated the system. Revlon sued Logisticon, charging them with trespassing, breach of contract, and misappropriation of trade secrets (Revlon passwords). Logisticon countersued for breach of contract. The companies settled out of court.
Would Logisticon’s actions be classified as sabotage or repossession? Why? Would you find the company guilty of committing a computer crime? Be prepared to defend your position to the class.
5.5 Because improved computer security measures sometimes create a new set of problems—user antagonism, sluggish response time, and hampered performance—some people believe the most effective computer security is educating users about good moral conduct. Richard Stallman, a computer activist, believes software licensing is antisocial because it prohibits the growth of technology by keeping information away from the neighbors. He believes high school and college students should have unlimited access to computers without security measures so that they can learn constructive and civilized behavior. He states that a protected system is a puzzle and, because it is human nature to solve puzzles, eliminating computer security so that there is no temptation to break in would reduce hacking.
<para>Do you agree that software licensing is antisocial? Is ethical teaching the solution to computer security problems? Would the removal of computer security measures reduce the incidence of computer fraud? Why or why not?
5.1 You were asked to investigate extremely high, unexplained merchandise shortages at a department store chain. Classify each of the five situations as a fraudulent act, an indicator of fraud, or an event unrelated to the investigation. Justify your answers.
a. The receiving department supervisor owns and operates a boutique carrying many of the same labels as the chain store. The general manager is unaware of the ownership interest.
b. The receiving supervisor signs receiving reports showing that the total quantity shipped by a supplier was received and then diverts 5% to 10% of each shipment to the boutique.
c. The store is unaware of the short shipments because the receiving report accompanying the merchandise to the sales areas shows that everything was received.
d. Accounts Payable paid vendors for the total quantity shown on the receiving report.
e. Based on the receiving department supervisor’s instructions, quantities on the receiving reports were not counted by sales personnel.
5.2 A client heard through its hot line that John, the purchases journal clerk, periodically enters fictitious acquisitions. After John creates a fictitious purchase, he notifies Alice, the accounts payable ledger clerk, so she can enter them in her ledger. When the payables are processed, the payment is mailed to the nonexistent supplier’s address, a post office box rented by John. John deposits the check in an account he opened in the nonexistent supplier’s name.
a. Define fraud, fraud deterrence, fraud detection, and fraud investigation.
5.3 The computer frauds that are publicly revealed represent only the tip of the iceberg. Although many people perceive that the major threat to computer security is external, the more dangerous threats come from insiders. Management must recognize these problems and develop and enforce security programs to deal with the many types of computer fraud.
Explain how each of the following six types of fraud is committed. Using the format provided, also identify a different method of protection for each and describe how it works
5.4 Environmental, institutional, or individual pressures and opportune situations, which are present to some degree in all companies, motivate individuals and companies to engage in fraudulent financial reporting. Fraud prevention and detection require that pressures and opportunities be identified and evaluated in terms of the risks they pose to a company. Adapted from the CMA Examination.
a. List the fraud symptoms that should have aroused the auditor’s suspicion.
b. What audit procedures would show that fraud had in fact occurred.
5.7 A bank auditor met with the senior operations manager to discuss a customer’s complaint that an auto loan payment was not credited on time. The customer said the payment was made on May 5, its due date, at a teller’s window using a check drawn on an account in the bank. On May 10, when the customer called for a loan pay-off balance so he could sell the car, he learned that the payment had not been credited to the loan. On May 12, the customer went to the bank to inquire about the payment and meet with the manager. The manager said the payment had been made on May 11. The customer was satisfied because no late charge would have been assessed until May 15. The manager asked whether the auditor was comfortable with this situation.
The auditor located the customer’s paid check and found that it had cleared on May 5. The auditor traced the item back through the computer records and found that the teller had processed the check as being cashed. The auditor traced the payment through the entry records of May 11 and found that the payment had been made with cash instead of a check.
What type of embezzlement scheme does this appear to be, and how does that scheme operate?
5.8 AICPA adapted
a. Prepare a schedule showing how much the cashier embezzled.
5.9 An accountant with the Atlanta Olympic Games was charged with embezzling over $60,000 to purchase a Mercedes-Benz and to invest in a certificate of deposit. Police alleged that he created fictitious invoices from two companies that had contracts with the Olympic Committee: International Protection Consulting and Languages Services. He then wrote checks to pay the fictitious invoices and deposited them into a bank account he had opened under the name of one of the companies. When he was apprehended, he cooperated with police to the extent of telling them of the bogus bank account and the purchase of the Mercedes-Benz and the CD. The accountant was a recent honors graduate from a respected university who, supervisors stated, was a very trusted and loyal employee.
5.10 Lexsteel, a manufacturer of steel furniture, has facilities throughout the United States. Problems with the accounts payable system have prompted Lexsteel’s external auditor to recommend a detailed study to determine the company’s exposure to fraud and to identify ways to improve internal control. Lexsteel’s controller assigned the study to Dolores Smith. She interviewed Accounts Payable employees and created the flowchart of the current system shown in Figure 5-3.
Lexsteel’s purchasing, production control, accounts payable, and cash disbursements functions are centralized at corporate headquarters. The company mainframe at corporate headquarters is linked to the computers at each branch location by leased telephone lines.
The mainframe generates production orders and the bills of material needed for the production runs. From the bills of material, purchase orders for raw materials are generated and e-mailed to vendors. Each purchase order tells the vendor which manufacturing plant to ship the materials to. When the raw materials arrive, the manufacturing plants produce the items on the production orders received from corporate headquarters.
The manufacturing plant checks the goods received for quality, counts them, reconciles the count to the packing slip, and e-mails the receiving data to Accounts Payable. If raw material deliveries fall behind production, each branch manager can send emergency purchase orders directly to vendors. Emergency order data and verification of materials received are e-mailed to Accounts Payable. Since the company employs a computerized perpetual inventory system, periodic physical counts of raw materials are not performed.
Vendor invoices are e-mailed to headquarters and entered by Accounts Payable when received. This often occurs before the branch offices transmit the receiving data. Payments are due 10 days after the company receives the invoices. Using information on the invoice, Data Entry calculates the final day the invoice can be paid, and it is entered as the payment due date.
Once a week, invoices due the following week are printed in chronological entry order on a payment listing, and the corresponding checks are drawn. The checks and payment listing are sent to the treasurer’s office for signature and mailing to the payee. The check number is printed by the computer, displayed on the check and the payment listing, and validated as the checks are signed. After the checks are mailed, the payment listing is returned to Accounts Payable for filing. When there is insufficient cash to pay all the invoices, the treasurer retains certain checks and the payment listing until all checks can be paid. When the remaining checks are mailed, the listing is then returned to Accounts Payable. Often, weekly check mailings include a few checks from the previous week, but rarely are there more than two weekly listings involved.
When Accounts Payable receives the payment listing from the treasurer’s office, the expenses are distributed, coded, and posted to the appropriate cost center accounts. Accounts Payable processes weekly summary performance reports for each cost center and branch location. Adapted from the CMA Examination
5.11 The Association of Certified Fraud Examiners periodically prepares an article called “What Is Your Fraud IQ?” It consists of 10 or more multiple choice questions dealing with various aspects of fraud. The answers, as well as an explanation of each answer, are provided at the end of the article. Visit the Journal of Accountancy site (http://www.journalofaccountancy.com) and search for the articles. Read and answer the questions in three of these articles, and then check your answers.
5.12 Explore the Anti-Fraud and Forensic Accounting portion of the AICPA Web site (http://www.aicpa.org/INTERESTAREAS/FORENSICANDVALUATION/RESOURCES/Pages/default.aspx), and write a two-page report on the three most interesting things you found on the site.
5.1 1. How does Miller fit the profile of the average fraud perpetrator?
Accounting Information System 12th Edition
Custom Edition for Strayer University by Marshall B. Romney Paul J. Steinbart
In order to purchase this solution, please click on below link.
http://www.studentoffortune.com/question/2049421/ACC-564
Chapter 1-22 All Solved Includes All Quizzes for ACC 564
Chapter 1
1.1 The value of information is the difference between the benefits realized from using that information and the costs of producing it. Would you, or any organization, ever produce information if its expected costs exceeded its benefits? If so, provide some examples. If not, why not?
1.2 Can the characteristics of useful information listed in Table 1-1 be met simultaneously? Or does achieving one mean sacrificing another?
1.3 You and a few of your classmates decided to become entrepreneurs. You came up with a great idea for a new mobile phone application that you think will make lots of money. Your business plan won second place in a local competition, and you are using the $10,000 prize to support yourselves as you start your company.
- a. Identify the key decisions you need to make to be successful entrepreneurs, the information you need to make them, and the business processes you will need to engage in.
- b. Your company will need to exchange information with various external parties. Identify the external parties, and specify the information received from and sent to each of them.
1.5 Figure 1-4 shows that organizational culture and the design of an AIS influence one another. What does this imply about the degree to which an innovative system developed by one company can be transferred to another company?
1.6 Figure 1-4 shows that developments in IT affect both an organization’s strategy and the design of its AIS. How can a company determine whether it is spending too much, too little, or just enough on IT?
1.7 Apply the value chain concept to S&S. Explain how it would perform the various primary and support activities.
1.8 Information technology enables organizations to easily collect large amounts of information about employees. Discuss the following issues:
- To what extent should management monitor employees’ e-mail?
- To what extent should management monitor which Web sites employees visit?
- c. To what extent should management monitor employee performance by, for example, using software to track keystrokes per hour or some other unit of time? If such information is collected, how should it be used?
- d. Should companies use software to electronically “shred” all traces of e-mail?
- e. Under what circumstances and to whom is it appropriate for a company to distribute information it collects about the people who visit its Web site?
Problems
1.1 Information technology is continually changing the nature of accounting and the role of accountants. Write a two-page report describing what you think the nature of the accounting function and the accounting information system in a large company will be like in the year 2020.
1.2 Adapted from the CMA Examination
a. Identify and discuss the basic factors of communication that must be considered in the presentation of the annual report.</para></listitem>
b. Discuss the communication problems a corporation faces in preparing the annual report that result from the diversity of the users being addressed.
c. Select two types of information found in an annual report, other than the financial statements and accompanying footnotes, and describe how they are helpful to the users of annual reports.
d. </inst>Discuss at least two advantages and two disadvantages of stating well-defined corporate strategies in the annual report.</para></listitem>
e. Evaluate the effectiveness of annual reports in fulfilling the information needs of the following current and potential users: shareholders, c</para></listitem>reditors</para></listitem>, <listitem><para><inst></inst>employees</para></listitem>, c<ustomers, and f</para></listitem>inancial analysts</para></listitem></orderedlist></listitem>
f. Annual reports are public and accessible to anyone, including competitors. Discuss how this affects decisions about what information should be provided in annual reports.
1.3 The use of IT at USAA
a. Why should USAA collect data on which auto parts are fixed most frequently? What could it do with this data?</para></listitem>
b. Even though USAA offered to waive the deductible, the repair shops still managed to convince 95% of the owners to replace rather than repair their damaged windshields. How could USAA use its AIS to persuade more shop owners to repair rather than replace their windows?</para></listitem>
- a. How does the image-processing system at USAA add value to the organization?
- b. How do the remote deposit capture and mobile banking system at USAA add value to the organization?
- c. Do an Internet search and find out what other advancements USAA has introduced. Write a brief paragraph on each new application or other newsworthy item you find (maximum limit of three applications or items).
1. Relevant | a. The report was carefully designed so that the data contained on the report became information to the reader |
2. Reliable | b. The manager was working one weekend and needed to find some information about production requests for a certain customer. He was able to find the report on the company’s network. |
3. Complete | c. The data on a report was checked by two clerks working independently |
4. Timely | d. An accounts receivable aging report that included all customer accounts |
5. Understandable | e. A report checked by 3 different people for accuracy |
6. Verifiable | f. An accounts receivable aging report used in credit granting decisions |
7. Accessible | g. An accounts receivable aging report was received before the credit manager had to make a decision whether to extend customer credit |
1.5 The Howard Leasing Company
- a. What is an accounts receivable aging report?
- Why is an accounts receivable aging report needed for an audit?
- What is an accounts receivable aging report used for in normal company operations?
- What data will you need to prepare the report?
- Where will you collect the data you need to prepare the report?
- How will you collect the necessary data for the report?
- What will the report look like (i.e., how will you organize the data collected to create the information your supervisor needs for the audit)? Prepare an accounts receivable aging report in Excel or another spreadsheet package.
- How will you distribute the report? How many copies will you make? Who should receive the copies? What security features will you implement?
a. What kind of information do you think Tesco gathers?
- a. How do you think Tesco has motivated over 12 million customers to sign up for its Clubcard program?
- b. What can Tesco accomplish with the Clubcard data it collects? Think in term of strategy and competitive advantage.
- c. What are some of the disadvantages to the Clubcard program?
- d. Do an Internet search to find out how Tesco is doing in comparison to Wal Mart and other grocers and retailers. Write a few paragraphs explaining your findings.
- a. What commercial activities can be done with a cell phone? With a cell phone/PC combination device? What do you do when you’re on your cell phone? What do you expect to be doing in five years?
c. What are some problems or drawbacks you can see with using these devices in business?
1.8 Classify each of the following items as belonging in the revenue, expenditure, human resources/payroll, production, or financing cycle.
- Purchase raw materials
- Pay off mortgage on factory
- Hire a new assistant controller
- Establish a $10,000 credit limit for a new customer
- Pay for raw materials
- Disburse payroll checks to factory workers
- Record goods received from vendor
- Update the allowance for uncollectible accounts
- Decide how many units to make next month
- Complete picking ticket for customer order
- Record factory employee timecards
- Sell concert tickets
- Draw on line-of-credit
- Send new employees to a business ethics course
- Pay utility bills
- Pay property taxes on office building
- Pay federal payroll taxes
- Sell DVD player
- Collect payment on customer accounts
- Obtain a bank loan
- Pay sales commissions
- Send an order to a vendor
- Put purchased goods into the warehouse
1-1 The Web site for this book contains an adaption of Russell L. Ackoff’s classic article “Management Misinformation Systems” from Management Science. In the article, Ackoff identified five common assumptions about information systems and then explained why he disagreed with them.
Read the five assumptions, contentions, and Ackoff’s explanations. For each of the five assumptions, decide whether you agree or disagree with Ackoff’s contentions. Prepare a report in which you defend your stand and explain your defense.
CHAPTER 2
Overview of Business Processes
2.1 Table 2-1 lists some of the documents used in the revenue, expenditure, and human resources cycle. What kinds of input or output documents or forms would you find in the production (or conversion) cycle?2.2 With respect to the data processing cycle, explain the phrase “garbage in, garbage out.” How can you prevent this from happening?
2.3 </inst><para>What kinds of documents are most likely to be turnaround documents? Do an internet search to find the answer and to find example turnaround documents.
2.4 The data processing cycle in Figure 2-1 is an example of a basic process found throughout nature. Relate the basic input/process/store/output model to the functions of the human body.
2.5 Some individuals argue that accountants should focus on producing financial statements and leave the design and production of managerial reports to information systems specialists. What are the advantages and disadvantages of following this advice? To what extent should accountants be involved in producing reports that include more than just financial measures of performance? Why?</para></question></general-problem></problemset>
2.1 The chart of accounts must be tailored to an organization’s specific needs. Discuss how the chart of accounts for the following organizations would differ from the one presented for S&S in <link linkend=”ch02table04″ preference=”0″>Table 2-2<xref linkend=”ch02table04″ label=”2-4″/></link>.</para>
2.2 <para>Design a chart of accounts for SDC. Explain how you structured the chart of accounts to meet the company’s needs and operating characteristics. Keep total account code length to a minimum, while still satisfying all of Mace’s desires.</para><source>
2.3 An audit trail enables a person to trace a source document to its ultimate effect on the financial statements or work back from amounts in the financial statements to source documents. Describe in detail the audit trail for the following:</para>
2.4 Your nursery sells various types and sizes of trees, bedding plants, vegetable plants, and shrubs. It also sells fertilizer and potting soil. Design a coding scheme for your nursery.
2.5 Match the following terms with their definitions
TERM | DEFINITION |
a. data processing |
|
b. source documents | 2. Items are numbered consecutively to account for all items; missing items cause a gap in the numerical sequence |
c. turnaround documents | 3. Path of a transaction through a data processing system from point of origin to final output, or backwards from final output to point of origin |
d. source data automation | 4. List of general ledger account numbers; allows transaction data to be coded, classified, and entered into proper accounts; </para <para>facilitates preparation of financial statements and reports |
e. general ledger | 5. Contents of a specific field, such as “George” in a name field |
f. subsidiary ledger | 6. Portion of a data record that contains the data value for a particular attribute, like a cell in a spreadsheet |
g. control account | 7. Company data sent to an external party and then returned to the system as input |
h. coding | 8. Used to record infrequent or non-routine transactions |
i. sequence code | 9. Characteristics of interest that need to be stored |
j. block code | 10. The steps a company must follow to efficiently and effectively process data about its transactions |
k. group code | 11. Something about which information is stored |
l. mnemonic code | 12. Stores cumulative information about an organization; like a ledger in a manual AIS. |
m. chart of accounts | 13. Contains detailed data for any general ledger account with many individual subaccounts |
n. general journal | 14. Contains records of individual business transactions that occur during a specific time period |
o. specialized journal | 15. Updating each transaction as it occurs |
p. audit trail | 16. Devices that capture transaction data in machine-readable form at the time and place of their origin |
q. entity | 17. Used to record large numbers of repetitive transactions |
r. attribute | 18. Set of interrelated, centrally coordinated files |
s. field | 19. Two or more subgroups of digits are used to code items |
t. record | 20. Updating done periodically, such as daily |
u. data value | 21. Systematic assignment of numbers or letters to items to classify and organize them |
v. master file | 22. Letters and numbers, derived from the item description, are interspersed to identify items; usually easy to memorize |
w. transaction file | 23. Initial record of a transaction that takes place; usually recorded on preprinted forms or formattted screens |
x. database | 24. Fields containing data about entity attributes; <keyterm linkend=”ch02kt29″ role=”strong” preference=”1″>like a row in a spreadsheet |
y. batch processing | 25. Sets of numbers are reserved for specific categories of data |
z. online, real-time processing | 26. The general ledger account corresponding to a subsidiary ledger, where the sum of all subsidiary ledger entries should equal the amount in the general ledger account |
2.6 For each of the following scenarios identify which data processing method (batch or online, real-time) would be the most appropriate.
2.7 <para>After viewing the Web sites, and based on your reading of the chapter, write a 2 page paper that describes how an ERP can connect and integrate the revenue, expenditure, human resources/payroll, and financing cycles of a business.
2.8 Which of the following actions update a master file and which would be stored as a record in a transaction file?
- Update customer address change
- Update unit pricing information
- Record daily sales
- Record payroll checks
- Change employee pay rates
- Record production run variances
- Record Sales Commissions
- Change employee office location
- Update accounts payable balance
- Change customer credit limit
- Change vendor payment discount terms
- Record purchases
2.9 You were hired to assist Ashton Fleming in designing an accounting system for S&S. Ashton has developed a list of the journals, ledgers, reports, and documents that he thinks S&S needs (see <link linkend=”ch02table06″ preference=”1″>Table 2-6<xref linkend=”ch02table06″ label=”2-8″/></link>). He asks you to complete the following tasks:</para>
a. Specify what data you think should be collected on each of the following four documents:
b. Design a report to manage inventory.</para></listitem>
- Design a report to assist in managing credit sales and cash collections.
- Visit a local office supply store and identify what types of journals, ledgers, and blank forms for various documents (sales invoices, purchase orders, etc.) are available. Describe how easily they could be adapted to meet S&S’s needs.
2.1 Bar Harbor Blueberry Farm
Data from Case
Date | Supplier Invoice | Supplier Name | Supplier Address | Amount |
March 7 | AJ34 | Bud’s Soil Prep, Inc. | PO Box 34 | $2,067.85 |
March 11 | 14568 | Osto Farmers Supply | 45 Main | $ 67.50 |
March 14 | 893V | Whalers Fertilizer, Inc. | Route 34 | $5,000.00 |
March 21 | 14699 | Osto Farmers Supply | 45 Main | $3,450.37 |
March 21 | 10102 | IFM Package Wholesale | 587 Longview | $4,005.00 |
March 24 | 10145 | IFM Package Wholesale | 587 Longview | $ 267.88 |
CHAPTER 3
SYSTEMS DEVELOPMENT AND DOCUMENTATION TECHNIQUES
3.1 Identify the DFD elements in the following narrative: A customer purchases a few items from a local grocery store. Jill, a salesclerk, enters the transaction in the cash register and takes the customer’s money. At closing, Jill gives both the cash and the register tape to her manager.
3.2 Do you agree with the following statement: “Any one of the systems documentation procedures can be used to adequately document a given system”? Explain.
3.3 Compare the guidelines for preparing flowcharts and DFDs. What general design principles and limitations are common to both documentation techniques?
3.4 Your classmate asks you to explain flowcharting conventions using real-world examples. Draw each of the major flowchart symbols from memory, placing them into one of four categories: input/output, processing, storage, and flow and miscellaneous. For each symbol, suggest several uses.
3.1 Prepare flowcharting segments for each of the following operations:
- a. processing transactions stored on magnetic tape to update a master file stored on magnetic tape
- b. processing transactions stored on magnetic tape to update a database stored on a magnetic disk
- c. converting source documents to magnetic tape using a computer-based optical character reader (OCR)
- d. processing OCR documents online to update a database on magnetic disk
e. reading data from a magnetic disk into the computer to be printed on a report
f. using a computer or terminal to </inst>key data from source documents to a file stored on a magnetic disk
g. manually sorting and filing invoices numerically
h. using a terminal to enter source document data and send it to a </inst>remote location where an online processing system records it in a database stored on magnetic disk
- i. a scheduled automatic backup of an internal hard drive to an external hard drive
k. enter employee hours recorded on time cards in the payroll transaction file maintained on disk and update wage data maintained on the payroll master file
l. use a terminal to </inst>access a price list maintained on disk to complete a purchase order. An electronic copy of the purchase order is sent to the vendor and a backup copy is printed and filed by vendor name
m. update an airline reservation on a Web-based airline reservation system from a home computer
3.2 Happy Valley Utility Company
- a. Draw a system flowchart of the billing operations, commencing with the computer preparation of the meter reading forms and ending with the mailing of customer bills.
b. Draw a system flowchart depicting customer payments processing, starting with the mail room operations and ending with the two printed reports.
3.3 <para>Prepare a system flowchart of the process described.</para></problem>
3.4 Prepare a document flowchart to reflect how ANGIC Insurance Company processes its casualty claims.
3.5
- a. Prepare a document flowchart that indicates the interaction and use of these documents among all departments at Beccan Company’s central facility. It should provide adequate internal control over the receipt, issuance, replenishment, and payment of tires and supplies. You may assume that there is a sufficient number of document copies to ensure that the perpetual inventory system has the necessary basic internal controls.</para><source>
- b. Use the instructor proUsing the flowcharting conventions discussed in Focus 3.2, critique the instructor provided CMA solution. List all the ways the CMA solution violates those flowcharting guidelines.
a. Prepare a context diagram and level 0 DFD to document the payroll processing system at No-Wear Products.
b. Prepare a document flowchart to document the payroll processing system at No-Wear Products.
3.7
- a. Prepare a context diagram and a level 0 DFD to document accounts payable processing at S&S.
b. Prepare a document flowchart to document accounts payable processing at S&S.
3.8
a. Develop a context diagram and a level 0 DFD of the acquisition/payment system at Oriental Trading.
b. Prepare a document flowchart to document the acquisition/payment system at Oriental Trading.
3.9
a. Develop a context diagram and a level 0 DFD for the cash receipts system at S&S.</para></listitem>
- b. Prepare a document flowchart to document the cash receipts system at S&S.
3.11
- a. Prepare a context diagram and at least two levels of DFDs for this operation.
- b. Prepare a document flowchart to document this operation.
- a. Complete the flowchart given in <link linkend=”ch03fig12″ preference=”1″>Figure 3-12<xref linkend=”ch03fig12″ label=”3-12″/></link>, for sales and cash receipts of Charting, Inc., by labeling the appropriate symbols and indicating information flows. Adapted from the 1969 CPA Exam
- b. Using the guidelines for preparing flowcharts in <link linkend=”ch03sb02″ preference=”0″>Focus 3-2<xref linkend=”ch03sb02″ label=”3-2″/></link> and the flowcharting symbols shown in <link linkend=”ch03fig08″ preference=”0″>Figure 3-8<xref linkend=”ch03fig08″ label=”3-8″/></link>, critique the flowchart shown in <link linkend=”ch03fig12″ preference=”0″>Figure 3-12<xref linkend=”ch03fig12″ label=”3-12″/></link>. List the ways the flowchart violates the guidelines or uses improper symbols.
3.13 Bottom Manufacturing Corporation Charge Sales System
a. List the procedures or the internal documents that are labeled letters <emphasis>c</emphasis> to <emphasis>r</emphasis> in the flowchart of Bottom Manufacturing Corporation’s charge sales system. Organize your answer as follows (Note that the explanations of the letters <emphasis>a</emphasis> and <emphasis>b</emphasis> in the flowchart are entered as examples):
</para></listitem>
<informaltable id=”informaltable2″ frame=”none” float=”0″ type=”untbl1″><tgroup cols=”2″ colsep=”0″ rowsep=”0″ align=”left”><colspec colnum=”1″ colname=”c01″ colwidth=”500″/><colspec colnum=”2″ colname=”c02″ colwidth=”500″/><thead><row><entry valign=”top”><para>Flowchart Symbol Letter</para></entry> | <entry valign=”top”><para>Procedures or Internal Document</para></entry></row></thead> |
<tbody><row><entry valign=”top”><para>a</para></entry> | <entry valign=”top”><para>Prepare six-part sales order.</para></entry></row> |
<row><entry valign=”top”><para>b</para></entry> | <entry valign=”top”><para>File by order number.</para></entry></row></tbody></tgroup></informaltable> |
3.14
- a. Prepare and file a tax return with the tax owed to the Internal Revenue Service.
c. A customer places an online order to purchase merchandise. The order is approved, filled, and sent to the customer with an invoice.
d. An inventory request is received by the purchasing department. The purchasing
e. A vendor invoice is received, reviewed, and compared against the appropriate purchase order, then paid and filed.</para></listitem>
f. A bill of lading for ordered inventory is received from a vendor, recorded, checked against the appropriate purchase order, and filed.
3 .15 <para>Prepare a program flowchart to help Melanie program this process.</para></problem>
3.16
|
|
3-1 <para>You are the systems analyst for the Wee Willie Williams Widget Works (also known as Dub 5, which is a shortened version of 5 Ws). Dub 5 produces computer keyboard components. It has been producing keyboards for more than 20 years and has recently signed an exclusive 10-year contract to provide the keyboards for all Dell personal computers. As the systems analyst, you have been assigned the task of developing a level 0 DFD for Dub 5’s order processing system. You have finished gathering all the information you need to develop the first-pass DFD and now want to complete the diagram.</para>
CHAPTER 4
RELATIONAL DATABASES
4.1 Contrast the logical and the physical view of data and discuss why separate views are necessary in database applications. Describe which perspective is most useful for each of the following employees: a programmer, a manager, and an internal auditor. How will understanding logical data structures assist you when designing and using database systems?</para></question><question id=”ch04ques02″ label=”4.2″>
4.2 The relational data model represents data as being stored in tables. Spreadsheets are another tool that accountants use to employ a tabular representation of data. What are some similarities and differences in the way these tools use tables? How might an accountant’s familiarity with the tabular representation of spreadsheets facilitate or hinder learning how to use a relational DBMS?
4.3 Some people believe database technology may eliminate the need for double-entry accounting. This creates three possibilities: (1) the double-entry model will be abandoned; (2) the double-entry model will not be used directly, but an external-level schema based on the double-entry model will be defined for accountants’ use; or (3) the double-entry model will be retained in database systems. Which alternative do you think is most likely to occur? Why?
4.4 Relational DBMS query languages provide easy access to information about the organization’s activities. Does this mean that online, real-time processing should be used for all transactions? Does an organization need real-time financial reports? Why or why not?</para></question></general-problem></problemset>
RELATIONAL DATABASES
4.1 Contrast the logical and the physical view of data and discuss why separate views are necessary in database applications. Describe which perspective is most useful for each of the following employees: a programmer, a manager, and an internal auditor. How will understanding logical data structures assist you when designing and using database systems?</para></question><question id=”ch04ques02″ label=”4.2″>
4.2 The relational data model represents data as being stored in tables. Spreadsheets are another tool that accountants use to employ a tabular representation of data. What are some similarities and differences in the way these tools use tables? How might an accountant’s familiarity with the tabular representation of spreadsheets facilitate or hinder learning how to use a relational DBMS?
4.3 Some people believe database technology may eliminate the need for double-entry accounting. This creates three possibilities: (1) the double-entry model will be abandoned; (2) the double-entry model will not be used directly, but an external-level schema based on the double-entry model will be defined for accountants’ use; or (3) the double-entry model will be retained in database systems. Which alternative do you think is most likely to occur? Why?
4.4 Relational DBMS query languages provide easy access to information about the organization’s activities. Does this mean that online, real-time processing should be used for all transactions? Does an organization need real-time financial reports? Why or why not?</para></question></general-problem></problemset>
4.5 Why is it so important to have good data?
4.6 What is a data dictionary, what does it contain, and how is it used?
4.6 What is a data dictionary, what does it contain, and how is it used?
4.7 Compare and contrast the file-oriented approach and the database approach. Explain the main advantages of database systems.
4.1
a. Identify three potential users and design a subschema for each. Justify your design by explaining why each user needs access to the subschema data elements.
b. Use Microsoft Access or some other relational database product to create the schema tables. Specify the primary key(s), foreign key(s), and other data for each table. Test your model by entering sample data in each table.
4.2 Most DBMS packages contain data definition, data manipulation, and data query languages. For each of the following, indicate which language would be used and why.
- A database administrator defines the logical structure of the database
c. A programmer develops a program to update the fixed-assets records stored in the database.
d. The human resources manager requests a report noting all employees who are retiring within five years.
e. The inventory serial number field is extended in the inventory records to allow for recognition of additional inventory items with serial numbers containing more than 10 digits.
f. A user develops a program to print out all purchases made during the past two weeks.
g. An additional field is added to the fixed-asset records to record the estimated salvage value of each asset.
4.3 Ashton wants to store the following data about S&S’s purchases of inventory:
- a. Design a set of relational tables to store this data. Do all of the data items need to be stored in a table? If not, which ones do not need to be stored and why do they not need to be stored?
- b. Identify the primary key for each table.
- c. Identify the foreign keys needed in the tables to implement referential integrity.
- d. Implement your tables using any relational database product to which you have access.
- e. Test your specification by entering sample data in each table.
- f. Create a few queries to retrieve or analyze the data you stored.
- a. How many different kinds of inventory items does S&S sell?
- b. How many sales were made during October?
d. What was the average amount of a sales transaction?
e. Which salesperson made the largest sale?
f. How many units of each product were sold?
g. Which product was sold most frequently?</para></listitem></orderedlist></problem>
4.5
Enter the tables in <link linkend=”ch04table15″ preference=”1″>Table 4-15<xref linkend=”ch04table15″ label=”4-15″/></link> into a relational DBMS package. Write queries to answer the following questions. <emphasis>Note</emphasis>: For some questions, you may have to create two queries—one to calculate a total and the second to answer the question asked.<inlinemediaobject role=”titleicon” id=”ch04dg03″ type=”dg01″><imageobject><imagedata/></imageobject><textobject/></inlinemediaobject></para>
- a. Which customers (show their names) made purchases from Martinez?
- b. Who has the largest credit limit?
d. What were the item numbers, price, and quantity of each item sold on invoice number 103?
e. How much did each salesperson sell?
- f. How many customers live in Arizona?
- g. How much credit does each customer still have available?
- h. How much of each item was sold? (Include the description of each item in your answer.)
- j. For which items are there at least 100 units on hand?
date hired
date of birth
date skill acquired
employee name
employee number
pay rate </pa
- a. Design a set of relational tables to store these data.<inlinemediaobject role=”titleicon” id=”ch04dg04″ type=”dg01″><imageobject><imagedata/></imageobject><textobject/></inlinemediaobject></para></listitem>
<listitem><para><inst>c. </inst>Implement your schema using any relational DBMS. Specify primary and foreign keys, and enforce referential integrity. Demonstrate the soundness of your design by entering sample data in each table.</para></listitem></orderedlist></problem>
4.7 You want to extend the schema shown in <link linkend=”ch04table16″ preference=”0″>Table 4-16<xref linkend=”ch04table16″ label=”4-16″/></link> to include information about customer payments. Some customers make installment payments on each invoice. Others write a check to pay for several different invoices. </para>
<listitem><para><inst>a. </inst>Modify the set of tables in <link linkend=”ch04table16″ preference=”1″>Table 4-16<xref linkend=”ch04table16″ label=”4-16″/></link> to store this additional data.<inlinemediaobject role=”titleicon” id=”ch04dg05″ type=”dg01″><imageobject><imagedata/></imageobject><textobject/></inlinemediaobject></para></listitem>
<listitem><para><inst>b. </inst>Identify the primary key for each new table you create.</para></listitem>
<listitem><para><inst>c. </inst>Implement your schema using any relational DBMS package. Indicate which attributes are primary and foreign keys, and enter sample data in each table you create.
</para></listitem></orderedlist></problem
4.8 Create relational tables that solve the update, insert, and delete anomalies in <link linkend=”ch04table17″ preference=”1″>Table 4-17.
4.9 Create relational tables that solve the update, insert, and delete anomalies in <link linkend=”ch04table18″ preference=”1″>Table 4-18.
4.10 From the database created in the comprehensive problem, perform queries based on the tables and query grid shown in <link linkend=”ch04table19″ preference=”1″>Table 4-19<xref linkend=”ch04table19″ label=”4-19″/></link>.
- a. Which borrowers use Advent Appraisers?
c. List all of the property appraisers.
- d. List all of the lenders.
- List the lenders that lent more than $100,000.
g. Which borrower requested the smallest mortgage?
4.1 As in all areas of information technology, DBMSs are constantly changing and improving. Research how businesses are using DBMSs, and write a report of your findings. Address the following issues:
- 1. Which popular DBMS products are based on the relational data model?
- 2. Which DBMS products are based on a logical model other than the relational data model?
- 3. What are the relative strengths and weaknesses of the different types (relational versus other logical models) of DBMSs
CHAPTER 5
COMPUTER FRAUD5.1 Do you agree that the most effective way to obtain adequate system security is to rely on the integrity of company employees? Why or why not? Does this seem ironic? What should a company do to ensure the integrity of its employees?
5.2 You are the president of a multinational company where an executive confessed to kiting $100,000. What is kiting and what can your company do to prevent it? How would you respond to the confession? What issues must you consider before pressing charges?
5.3 Discuss the following statement by Roswell Steffen, a convicted embezzler: “For every foolproof system, there is a method for beating it.” Do you believe a completely secure computer system is possible? Explain. If internal controls are less than 100% effective, why should they be employed at all?
5.4 Revlon hired Logisticon to install a real-time invoice and inventory processing system. Seven months later, when the system crashed, Revlon blamed the Logisticon programming bugs they discovered and withheld payment on the contract. Logisticon contended that the software was fine and that it was the hardware that was faulty. When Revlon again refused payment, Logisticon repossessed the software using a telephone dial-in feature to disable the software and render the system unusable. After a three-day standoff, Logisticon reactivated the system. Revlon sued Logisticon, charging them with trespassing, breach of contract, and misappropriation of trade secrets (Revlon passwords). Logisticon countersued for breach of contract. The companies settled out of court.
Would Logisticon’s actions be classified as sabotage or repossession? Why? Would you find the company guilty of committing a computer crime? Be prepared to defend your position to the class.
5.5 Because improved computer security measures sometimes create a new set of problems—user antagonism, sluggish response time, and hampered performance—some people believe the most effective computer security is educating users about good moral conduct. Richard Stallman, a computer activist, believes software licensing is antisocial because it prohibits the growth of technology by keeping information away from the neighbors. He believes high school and college students should have unlimited access to computers without security measures so that they can learn constructive and civilized behavior. He states that a protected system is a puzzle and, because it is human nature to solve puzzles, eliminating computer security so that there is no temptation to break in would reduce hacking.
<para>Do you agree that software licensing is antisocial? Is ethical teaching the solution to computer security problems? Would the removal of computer security measures reduce the incidence of computer fraud? Why or why not?
5.1 You were asked to investigate extremely high, unexplained merchandise shortages at a department store chain. Classify each of the five situations as a fraudulent act, an indicator of fraud, or an event unrelated to the investigation. Justify your answers.
a. The receiving department supervisor owns and operates a boutique carrying many of the same labels as the chain store. The general manager is unaware of the ownership interest.
b. The receiving supervisor signs receiving reports showing that the total quantity shipped by a supplier was received and then diverts 5% to 10% of each shipment to the boutique.
c. The store is unaware of the short shipments because the receiving report accompanying the merchandise to the sales areas shows that everything was received.
d. Accounts Payable paid vendors for the total quantity shown on the receiving report.
e. Based on the receiving department supervisor’s instructions, quantities on the receiving reports were not counted by sales personnel.
5.2 A client heard through its hot line that John, the purchases journal clerk, periodically enters fictitious acquisitions. After John creates a fictitious purchase, he notifies Alice, the accounts payable ledger clerk, so she can enter them in her ledger. When the payables are processed, the payment is mailed to the nonexistent supplier’s address, a post office box rented by John. John deposits the check in an account he opened in the nonexistent supplier’s name.
a. Define fraud, fraud deterrence, fraud detection, and fraud investigation.
- a. List four personal (as opposed to organizational) fraud symptoms, or red-flags, that indicate the possibility of fraud.</para></listitem> Do not confine your answer to this example.
- b. List two procedures you could follow to uncover John’s fraudulent behavior.
5.3 The computer frauds that are publicly revealed represent only the tip of the iceberg. Although many people perceive that the major threat to computer security is external, the more dangerous threats come from insiders. Management must recognize these problems and develop and enforce security programs to deal with the many types of computer fraud.
Explain how each of the following six types of fraud is committed. Using the format provided, also identify a different method of protection for each and describe how it works
5.4 Environmental, institutional, or individual pressures and opportune situations, which are present to some degree in all companies, motivate individuals and companies to engage in fraudulent financial reporting. Fraud prevention and detection require that pressures and opportunities be identified and evaluated in terms of the risks they pose to a company. Adapted from the CMA Examination.
- a. Identify two company pressures that would increase the likelihood of fraudulent financial reporting.
- b. Identify three corporate opportunities that make fraud easier to commit and detection less likely.
- c. For each of the following, identify the external environmental factors that should be considered in assessing the risk of fraudulent financial reporting
- · The company’s industry
- · The company’s business environment
- · The company’s legal and regulatory environment
- d. What can top management do to reduce the possibility of fraudulent financial reporting?
- a. Due to abnormal inventory shrinkage in the audiovisual department at a retail chain store, internal auditors conducted an in-depth audit of the department. They learned that a customer frequently bought large numbers of small electronic components from a certain cashier. The auditors discovered that they had colluded to steal electronic components by not recording the sale of items the customer took from the store.
- c. Auditors discovered an accounts payable clerk who made copies of supporting documents and used them to support duplicate supplier payments. The clerk deposited the duplicate checks in a bank account she had opened using a name similar to the supplier’s.</para></listitem></orderedlist><source>
a. List the fraud symptoms that should have aroused the auditor’s suspicion.
b. What audit procedures would show that fraud had in fact occurred.
5.7 A bank auditor met with the senior operations manager to discuss a customer’s complaint that an auto loan payment was not credited on time. The customer said the payment was made on May 5, its due date, at a teller’s window using a check drawn on an account in the bank. On May 10, when the customer called for a loan pay-off balance so he could sell the car, he learned that the payment had not been credited to the loan. On May 12, the customer went to the bank to inquire about the payment and meet with the manager. The manager said the payment had been made on May 11. The customer was satisfied because no late charge would have been assessed until May 15. The manager asked whether the auditor was comfortable with this situation.
The auditor located the customer’s paid check and found that it had cleared on May 5. The auditor traced the item back through the computer records and found that the teller had processed the check as being cashed. The auditor traced the payment through the entry records of May 11 and found that the payment had been made with cash instead of a check.
What type of embezzlement scheme does this appear to be, and how does that scheme operate?
5.8 AICPA adapted
a. Prepare a schedule showing how much the cashier embezzled.
- a. Describe how the cashier attempted to hide the theft.
5.9 An accountant with the Atlanta Olympic Games was charged with embezzling over $60,000 to purchase a Mercedes-Benz and to invest in a certificate of deposit. Police alleged that he created fictitious invoices from two companies that had contracts with the Olympic Committee: International Protection Consulting and Languages Services. He then wrote checks to pay the fictitious invoices and deposited them into a bank account he had opened under the name of one of the companies. When he was apprehended, he cooperated with police to the extent of telling them of the bogus bank account and the purchase of the Mercedes-Benz and the CD. The accountant was a recent honors graduate from a respected university who, supervisors stated, was a very trusted and loyal employee.
- a. How does the accountant fit the profile of a fraudster?
- b. What fraud scheme did he use to perpetrate his fraud?
- c. What controls could have prevented his fraud?
- d. What controls could have detected his fraud?
5.10 Lexsteel, a manufacturer of steel furniture, has facilities throughout the United States. Problems with the accounts payable system have prompted Lexsteel’s external auditor to recommend a detailed study to determine the company’s exposure to fraud and to identify ways to improve internal control. Lexsteel’s controller assigned the study to Dolores Smith. She interviewed Accounts Payable employees and created the flowchart of the current system shown in Figure 5-3.
Lexsteel’s purchasing, production control, accounts payable, and cash disbursements functions are centralized at corporate headquarters. The company mainframe at corporate headquarters is linked to the computers at each branch location by leased telephone lines.
The mainframe generates production orders and the bills of material needed for the production runs. From the bills of material, purchase orders for raw materials are generated and e-mailed to vendors. Each purchase order tells the vendor which manufacturing plant to ship the materials to. When the raw materials arrive, the manufacturing plants produce the items on the production orders received from corporate headquarters.
The manufacturing plant checks the goods received for quality, counts them, reconciles the count to the packing slip, and e-mails the receiving data to Accounts Payable. If raw material deliveries fall behind production, each branch manager can send emergency purchase orders directly to vendors. Emergency order data and verification of materials received are e-mailed to Accounts Payable. Since the company employs a computerized perpetual inventory system, periodic physical counts of raw materials are not performed.
Vendor invoices are e-mailed to headquarters and entered by Accounts Payable when received. This often occurs before the branch offices transmit the receiving data. Payments are due 10 days after the company receives the invoices. Using information on the invoice, Data Entry calculates the final day the invoice can be paid, and it is entered as the payment due date.
Once a week, invoices due the following week are printed in chronological entry order on a payment listing, and the corresponding checks are drawn. The checks and payment listing are sent to the treasurer’s office for signature and mailing to the payee. The check number is printed by the computer, displayed on the check and the payment listing, and validated as the checks are signed. After the checks are mailed, the payment listing is returned to Accounts Payable for filing. When there is insufficient cash to pay all the invoices, the treasurer retains certain checks and the payment listing until all checks can be paid. When the remaining checks are mailed, the listing is then returned to Accounts Payable. Often, weekly check mailings include a few checks from the previous week, but rarely are there more than two weekly listings involved.
When Accounts Payable receives the payment listing from the treasurer’s office, the expenses are distributed, coded, and posted to the appropriate cost center accounts. Accounts Payable processes weekly summary performance reports for each cost center and branch location. Adapted from the CMA Examination
- 1. Discuss three ways Lexsteel is exposed to fraud and recommend improvements to correct these weaknesses.
- 2. Describe three ways management information could be distorted and recommend improvements to correct these weaknesses.
- 3. Identify and explain three strengths in Lexsteel’s procedures
5.11 The Association of Certified Fraud Examiners periodically prepares an article called “What Is Your Fraud IQ?” It consists of 10 or more multiple choice questions dealing with various aspects of fraud. The answers, as well as an explanation of each answer, are provided at the end of the article. Visit the Journal of Accountancy site (http://www.journalofaccountancy.com) and search for the articles. Read and answer the questions in three of these articles, and then check your answers.
5.12 Explore the Anti-Fraud and Forensic Accounting portion of the AICPA Web site (http://www.aicpa.org/INTERESTAREAS/FORENSICANDVALUATION/RESOURCES/Pages/default.aspx), and write a two-page report on the three most interesting things you found on the site.
5.1 1. How does Miller fit the profile of the average fraud perpetrator?
- 2. Explain the three elements of the opportunity triangle (commit, conceal, convert) and discuss how Miller accomplished each when embezzling funds from Associated Communications. What specific concealment techniques did Miller use?
- 3. What pressures motivated Miller to embezzle? How did Miller rationalize his actions?
- 4. Miller had a framed T-shirt in his office that said, “He who dies with the most toys wins.” What does this tell you about Miller? What lifestyle red flags could have tipped off the company to the possibility of fraud?
- Why do companies hesitate to prosecute white-collar criminals?
- What could the victimized companies have done to prevent Miller’s embezzlement?
- 1. Figure 5-4 shows the employees and external parties that deal with Heirloom. Explain how Heirloom could defraud the bank and how each internal and external party except the bank could defraud Heirloom.
- 2. What risk factor, unusual item, or abnormality would alert you to each fraud?
- 3. What control weaknesses make each frau