100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Summary Information Systems and Data Analytics $5.41   Add to cart

Summary

Summary Information Systems and Data Analytics

 183 views  14 purchases
  • Course
  • Institution

Summary of concepts needed to pass the course.

Preview 3 out of 20  pages

  • October 21, 2020
  • 20
  • 2020/2021
  • Summary
avatar-seller
Summary IS&DA
Lecture 1: Introduction: accounting, control, audit and analytics
Why information: decision-making, delegating, accountability and operating the business
Information-based control framework (alignment)




Business domain: shows the essence of a company and what it does to create value,
including selling products, purchasing raw materials, hiring personnel, manufacturing
products, delivering services, making investment decisions.
Information domain: provides information to the business domain for decision-making,
accountability and organizational alignment
Data domain: where the data that is needed for information provision is recorded
IT domain: all required software and hardware needed for the other domains

In the Strategy implementation the deliberate strategy choice is translated into action. The
theory is that the resulting eight cells need to be continuously aligned with one another for
optimal problem solutions. This form of continuous alignment implies that a change in one
cell always will lead to changes in at least one other cell, but most likely in more other cells
than just one. E.g.:
- a retail company decides to transform from a traditional ‘brick and mortar’ business
with physical stores to a fully web-based company  change in business strategy
- Replacement of sales personnel with IT personnel and web- administrators 
change in operations
- More information needed because of the web sales  change in information
provision
- The vast amount of data needs to be managed better  change in data
management
- IT infrastructure needs to be built or outsourced for the web store to operate 
change in IT infrastructure

Information system: information provision + data management + IT infrastructure

Transaction data: are temporary data that eventually will lead to changes in master data
e.g. receipt of sales order or payment to a creditor (journal entry)
Master data: are repositories of relatively permanent data maintained over an extended
period of time  e.g. the bank or inventory account (BS post)
- Can be standing data: e.g. name, address, debtor code etc.
- Can change frequently: e.g. cash, accounts receivable etc.


1

,Lecture 2: Risk management & control
2.1 Internal control
Internal control: a process, effected by an entity’s board of directors, management, and
other personnel, designed to provide reasonable assurance regarding the achievement of
objectives relating to operations, reporting and compliance  creating opposed interest
between departments helps with controlling




Value cycle: feeder processes of accounting
- Circles show processes/rectangles show positions/accounting is general ledger
- Shows all business processes into one graph, red lines being segregations of duties:
1. Authorization: making decisions, committing the organization/unit to third
parties/other units
2. Custody: safeguarding assets
3. Recording: the independent accounting function
4. Execution: performing tasks based on assignments given by other functions
5. Checking: comparing ‘what is’ versus ‘what should be’ ACCER

Double-entry accounting: for every debit transaction, a credit transaction is made for the
same amount  triple-entry: 3th recording in blockchain

COSO internal control report (2003): CCRIM
- Monitoring: assesses the quality of internal control
- Information & communication: keeps the control
system together e.g. transaction
recording/accountability
- Risk assessment: identification and analysis of relevant
risks to the achievement of objectives
- Control Activities: hard controls  e.g. a signature that
someone pays within a month or segregation of duties
- Control environment: soft controls  the foundation of all other components
norms and values  organizational culture, structure, HR policies  reduces the
need for hard controls

2

, COSO framework objectives:
- Operations: Effectiveness and efficiency of operations  safeguarding assets
- Reporting: Reliability of internal and external reporting
- Compliance: Compliance with applicable laws and regulations
Control hierarchy: three levels of protection
1. Control environment: overall policies and procedures that demonstrate an
organizations commitment to the importance of control. Having a sound control
environment reduces the need for hard controls.
2. Pervasive control plans: address multiple goals and apply to many processes e.g.
keeping your accounts safe with a password
3. Business process control plans: relate to specific process or to the technology used
to implement the process e.g. checking the credit history of a potential customer
or checking whether the purchase transactions used are all valid



Controls on the business level controls on IT
level

Control matrix: a tool designed to assist in
evaluating the potential effectiveness of
controls in a business process by matching
control goals with relevant control plans 
1. Input validity: customer credit check
2. Input completeness: procedure to
reject data
3. Input accuracy: digital signature check
4. Update completeness:
5. Update accuracy:

2.2 Risk management
Risk: a future uncertain event that, if becoming reality, will have negative consequences for
the organization  example per domain:
- Operations: corona, earthquake that collapses your factory, broken production
machine (in china poisoned baby milk)
- Information: asymmetry, overstated performance report (continuing while making a
loss), financial statements that are incorrect
- Data management: Unauthorized access, data leak
- IT infrastructure: Hardware/software failure, hackers

Managing risks:
- Accept: carrying on with knowing that
the risk is there
- Avoid: eliminate activity or share risk
with others  e.g. an insurance
- Control: correcting deviations due to the
risks  reduce

3

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller patrickvb97. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $5.41. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

64438 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$5.41  14x  sold
  • (0)
  Add to cart