This course aims to give students a foundation in accounting information systems, technology management, and applications that are commonly used in business settings and have broad application in business. There are three main goals. First, enable students to develop their knowledge and skills in relation to accounting information systems in achieving organizational objectives. Second, develop the ability of students to apply the knowledge they gain in relation to the life cycle and project management of information systems in a business environment. Third, further develop lifelong learning skills of independent learning and study in relation to accounting information systems. Finally, this class will hone students with case studies or integrative cases and best practices.



The professional roles of bachelor of accountancy graduates will require use of an accounting information system (AIS) to optimize business development, operation, auditing, analysis for decision making, and be the product owners for accounting information systems. This course aims to explore the relationships between the AIS and business processes and internal controls, and provide students the knowledge and skills to be an effective product owner of accounting information systems .

Credits: 3
Lecture Hours: 45 + Additional 9 Hours SAP Hands-On

Self-Study Hours: 

  • Reading: 42 (125 pages of Course Reference Book)      
  • Review: 18 (Specific Case Studies on IT Risk Management)
  • Assignment: 30 (Research on DIgital Transformation, analysis, writing)

Total Study Hours: 135



Students should have passed Financial Accounting 1 and Introduction to Computer Science.


The learning outcomes for this course cover three main areas: On successful completion of this course, students will be able to understand the following knowledge areas:

1  Knowledge

Level of Learning PLO CLO Learning Outcome
Understand PK1 CK1 Explain Information Flows in Accounting Information Systems
Understand PK2 CK2 Describe Computer Fraud, IT Risk Management and Trust Services Criteria

2  Cognitive Skills

Level of Learning PLO CLO Learning Outcome
Create PC2 CC1 Construct Project Management Plan for Accounting Systems (Cost & Schedule Estimates)
Evaluate PC2 CC2 Select IT Controls applicable for Systems Reliability (using Trust Services Criteria & Risk Based Design)

3  Communication, Information Technology, and Numerical Skills

Level of Learning PLO CLO Learning Outcome
Understand PCIT3 CCIT1 Describe the potential of some of the emerging technologies in driving transformational improvements (such as Cloud Computing, RPA)
Apply PCIT3 CCIT2 Implement SDLC (Systems Development Life Cycle) Concepts in IT Selection Process
Apply PCIT3 CCIT3 Use SAP R/3 for recording basic financial transactions (GL Accounts Creation, Recording Customer & Vendor Invoice and payments, Customer & Vendor Creation)

4   Interpersonal Skills and Responsibilities

Level of Learning PLO CLO Learning Outcome
Evaluate PIP2 CIP1 Recommend effective decisions for IT enablement / Project Management


The course targets the 30 lessons in the study plan below. Each lesson is 1.5 class hours; there are a total of 45 class hours. The study plan below describes the learning outcome for each lesson, described in terms of what the student should be able to do at the end of the lesson. Readings should be done by students as preparation before the start of each class. Implementation of this study plan may vary somewhat depending on the progress and needs of students.

No  Lesson Learning Outcomes Teaching and Learning Activities, Assessment
1,2, 3, and 4

Accounting Information Systems: An Overview

  1. Describe information needs and

    business processes (CK1)

  1. Describe accounting  

  information system (CK2)  

Lecture Description of information needs and business processes AIS components and functions Discuss role of AIS in the value chainReading: AIS book, Chapter 1, Page 28-41
5, 6,7, and 8

Project Management (including related concepts of Product Management) Getting to know project management (CK2, CK4, CIP1)

  1. Define a project & Project Management
  2. Characteristic of a PM – Project Manager
  3. Product Scoping v/s Project Scoping (CK4)
  4. Define project methodology
  5. Define project management process
  6. Discuss Project management software
  7. Define five levels of CMMI
  8. Discuss CMMI approaches from project Initiation to project execution processes

  Lecture Group problem-based learning Discussion Integrative case Reading:

    1. PMBOK –
    2. Product Managers for Digital Age 
    3. The Agile Coach – What is Product Management 
    4. Product Management 
    5. What is CMMI –
    6. What is CMMI? –
    7. Case Study of CMMI implementation at Bank of Montreal (BMO) Financial Group:
9 and 10 Project Management Hands-on (using the tool) – CK2


11, 12, and 13

AIS Development Strategies (CK6, CCIT1, CIP1)

  1. Describe how organizations purchase application software, vendor services, and hardware.
  2. Explain how information system departments develop custom software.
  3. Explain how end users develop, use, and control computer-based information systems.
  4. Explain why organizations outsource their information systems, and evaluate the benefits and risks of this strategy.
  5. Brief introduction to Prototyping

Lecture Didactic questioning Group discussionReading:

  1. AIS book, Chapter 20, Page 647- 649
  2. AIS book, Chapter 21, Page 680 -697
14, 15, 16, and 17

Introduction to Systems Development, Systems Analysis, Design, Implementation, and Operation (CK6, CCIT1, CIP1)

  1. Explain the life cycle / phases of the systems development life cycle.
  2. Discuss methodologies used
  3. Discuss the people involved in systems development and the roles they play.
  4. Explain why system changes trigger behavioral reactions, what form this resistance to change takes, and how to avoid or minimize the resulting problems
Lecture Didactic questioning Group discussionReading: AIS book, Chapter 20, Page 654 – 663 AIS book Chapter 22, Page 708 – 722

Digital Transformation (CC1, CCIT4)

  1. Define what is digitalization
  2. Define what is disruptive technology
  3. Discuss implications for its people, culture, processes, and technology
  4. Discuss risk of ignoring it
  5. Discuss trends

  Lecture Didactic questioning Discussion Case study discussion – Netflix Reading:

  1. Digitization, digitalization and digital transformation –
  2. Digitization, Digitalization, And Digital Transformation: Confuse Them At Your Peril –
  3. Netflix Delivers Billions of Hours of Content Globally by Running on AWS –

Overview of Transaction Processing and Enterprise Resource Planning Systems (CK4, CK5, CK6)

  • Describe Transaction Processing
  • Describe Enterprise Resources Planning(ERP) and its pros andcons



  1. AIS book, Chapter 2
  2. What is ERP –
  3. Four ERP implementation casestudies you can learn from
20, 21, and 22

Computer Fraud and Abuse (CK3)

  1. Define AIS threats
  2. Introduce fraud & Fraud Triangle
  3. Define computer fraud and discuss the different computer fraud classifications. 
  4. Explain the prevent, detect, and correct approaches in computer fraud and abuse.
  5. Explain Social Engineering

Lecture Discussion Case studiesReading: 

  1. AIS book Chapter 5, Page 153 – 170  
  2. AIS book Chapter 6, Page 191-192 
  3. AIS book Chapter 7, Page 224
  4. Journal of Accountancy – Why employees commit fraud –
  5. Top 12 Cyber Crime Facts & Statistics –
  6. A malware attack against accounting software giant Wolters Kluwer – 
  7. Social Engineering –
23 and 24

Risk Management Information Systems (CK3)

  1. Describe the nature, scope, and objectives of IT risk work, and identify the major steps in the risk process 
  2. Discuss IT risk management approaches
  3. Discuss Control Frameworks (COBIT, COSO’s IC and COSO’s ERM)
  4. Apply IT Risk Management Approaches on a scenario using case-study approach

Lecture Didactic questioning Group discussion Integrative caseReading:

  1. AIS book, Chapter 7, Page 226-230
  2. Risk management white paper:

KPMG Whitepaper Model Risk Management

25, 26 and 27

Information Systems Controls for Systems Reliability, Confidentiality, Privacy, Processing Integrity & Availability (CK3, CC1)

  1. Understand Value of Controls & Risk Based Design of Internal Controls for IT Risks
  2. Understand elements of Systems Reliability 
  3. Understand Trust Services Criteria, SOC2 Report
  4. Discuss ISO 27001
  5. Know about Defense in Depth & Time Based Model of Security
  6. Understand overall context of IT Risks & Controls and apply them in the given Case Study


  1. AIS Chapter 7, Page 235-237
  2. AIS Chapter 8, Page 263-266
  3. AIS Chapter 9, Page 296-297, Page 300
  4. AIS Chapter 10, Table 10-1, Table 10-2, Page 332-334
  5. KPMG – SOC2 & ISO 27001
  6. PwC – SOC2 Reporting Overview

Auditing Computer-Based Information Systems (CK3)

  1. Describe the nature, scope, and objectives of IT audit work, and identify the major steps in the audit process.
  2. Discuss how to manage the information systems audit.

  Introduction to Business Processes & Key Controls (CK3, and CK5)

  1. Introduce revenue, expenditure, production, and HRM/payroll Cycle
  2. DIscuss Key IT Controls applicable to these cycles


  1. AIS Book Chapter 12, Page 380 & 381, Table 12-1
  2. AIS Book Chapter 13, Page 421 & 422, Table 13-1, 13-2
  3. AIS Book Chapter 14, Page 459, 460 and 461, Table 14-1
  4. AIS Book Chapter 15, Page 489, Table 15-1
  5. AIS book, Chapter 11, Page 349-353
  6. Deloitte – IT Auditing Process
29 Explain ERP & major ERP packages and SAP R/3 – 1 (Transaction Processing Recap)   Lecture Didactic questioning Group discussion
Additional Hands-On Activities  
30 SAP R-3 Configurations – 1 Demo Hands-on activity
31 SAP R-3 Configurations – 2 Demo Hands-on activity
32 SAP R-3 – Set Up Customers & Vendors Demo Hands-on activity
33 SAP R-3 – Record Customer Invoices, Vendor Invoices Demo Hands-on activity
34 SAP R-3 – Record Payments Demo Hands-on activity
35 Course Recap Session (CK1, CK2, CK3, CK4, CK5, CK6, CC1, CCIT1, CCIT2) Demo Hands-on activity


This course is primarily lecture and assignment based; assigned readings will support learning and serve as a reference to materials covered in class. During class, approximately half of the class will be devoted to lecture with another half of the class for working on case studies and problem sets and reviewing the solutions.


Grades will be determined based on a grading score, calculated using the following assessments and score allocations:

Assessment Weight of each assessment Learning Outcome Assessed
Participation 20% CK1, CK2 CC1, CC2 CCIT1, CCIT2, CCIT3 CIP1 PK1, PK2 PC2 PCIT3 PIP1
Assignments (Total) 30% N/A  
Assignment 1 – Group 15% CK2, CK4, CIP1 PK1, PIP2
Assignment 2 – Group 15% CCIT2, CIP1 PCIT3, PIP2
In-Class Tests  (2 OR Best 2 out of 3) 20% CK1, CC1, CCIT2 (Test 1) CK2, CC2 (Test 2) PK1, PC2, PCIT3 (Test 1) PK2, PC2 (Test 2)
Final exam 30% CK2 CC2 CCIT1, (possibly CCIT3) PK2 PC2 PCIT3
Total grading score 100%  

Students will submit two assignments in the area of AIS:

Project Management Assignment

Work Group: Group
Output format: Written and verbal presentation
Language: English
Assignment: The assignment requires students to read the integrative case and work in a group to present their group presentation on the case. It will be about making a make or buy decision for AIS, creating a cost management plan and schedule management plan and identifying potential risks, and will potentially be done using Project Management Tool (JIRA)

Technology Risk Management (TRM) Assignment or Emerging Technologies (Robotic Process Automation – RPA) Assignment

Work Group: Group (of 3 to 6)
Output format: APA Format Report
Language: English
Assignment: TRM [Each group will be assigned three of the five trust services criteria elements (Security, Availability, Confidentiality, Processing Integrity, Privacy). Students will explain them in detail, gather details on the practices related to that element in Banks and Microfinance Institutions in Cambodia and present a summary of what’s their recommendation for the selected set of Banks and Microfinance institutions.]  RPA [Each group will identify 2 use-cases of leveraging RPA (Robotic Process Automation) in Accounting & Finance, and briefly explain them. For one of the use cases (out of two), the group will explain the benefits of using RPA for that use-case, possible challenges, and how those challenges will be managed.]



Core Textbook

  • Romney, M.B., and  Steinbart, P.J., Accounting Information Systems, 14 Ed.

Supplementary Textbook


  1. PMBOK –
  2. Product Managers for Digital Age
  3. The Agile Coach – What is Product Management
  4. Product Management
  5. What is CMMI –
  6. What is CMMI? –
  7. Case Study of CMMI implementation at Bank of Montreal (BMO) Financial Group:
  8. JIRA Based Project Management
  9. Digitization, digitalization and digital transformation –
  10. Digitization, Digitalization, And Digital Transformation: Confuse Them At Your Peril –
  11. Netflix Delivers Billions of Hours of Content Globally by Running on AWS –
  12. What is ERP –
  13. Four ERP implementation case studies you can learn from –
  14. ournal of Accountancy – Why employees commit fraud –
  15. Top 12 Cyber Crime Facts & Statistics –
  16. A malware attack against accounting software giant Wolters Kluwer –
  17. Social Engineering –
  18. Risk management white paper: KPMG Whitepaper Model Risk Management
  19. KPMG – SOC2 & ISO 27001
  20. PwC – SOC2 Reporting Overview
  21. Deloitte – IT Auditing Process