ACCOUNTING INFORMATION SYSTEMS (ACCT 331)

OVERVIEW

1. COURSE DESCRIPTION

Students enrolling into the Bachelor of Accounting and Finance program will be exposed to the use of AIS to optimize business development, operation, auditing, and analysis for decision-making and be the product owners for AIS and other related technologies. This course aims to explore the relationships between AIS and business processes and internal controls and provide students with appropriate knowledge and skills in using AIS and other related technologies

2. REASON FOR THE COURSE

This course aims to give students a foundation in accounting information systems (AIS), technology management, and digital applications commonly used in business settings.  There are four main goals that this course intends to accomplish. First, it enables students to develop their knowledge and skills in relation to AIS in achieving organizational objectives. Second, it develops students’ ability to apply the knowledge gained in relation to the life cycle and project management of information systems in a business environment. Third, it further develops lifelong learning skills of independent learning and study in relation to AIS. Finally, it exposes students to real case studies and best practices centered around issues in AIS. 

3. STUDY HOURS

4. ROLE IN CURRICULUM

Prerequisites:

Introduction to Computer Science (COSC 101) and Financial Accounting 1 (ACCT 211) are prerequisites for this course.

  • COURSE LEARNING OUTCOMES (CLO)
  • ASSESSMENT AND GRADING
  • TEACHING METHODS
  • STUDY PLAN
  • TEXTBOOKS AND REFERENCES

LEARNING OUTCOMES

On successful completion of this course, students will be able to:

Knowledge Level of
Learning 
Related PLO

Explain Information Flows (CK1)
Explain Information Flows in Accounting Information Systems

Understand PK1

Describe Fraud and IT Risk Management (CK2)
Describe Computer Fraud, IT Risk Management and Trust Services Criteria.

Understand PK2
Cognitive Skills Level of Learning Related PLO

Create Project Management Plan (CC1)

Create Project Management Plan for Accounting Systems in relation to Cost & Schedule Estimates

Create PC2
Evaluate IT Control Systems (CC2)
Evaluate IT Controls applicable for Systems Reliability using Trust Services Criteria & Risk Based Design
Evaluate PC2
Communication, Information Technology, and Numerical Skills Level of
Learning
Related PLO
Describe the Emerging of the Technologies (CCIT1)
Describe the potential use of some emerging technologies in driving transformational improvements.
Describe PCIT2
Apply AIS Development Strategies (CCIT2)
Apply AIS development strategies in the IT decision-making process.
Apply PCIT2
Interpersonal Skills and Responsibilities Level of
Learning
Related PLO
Work in a Team (CIP1)
Work in a team to evaluate effective decisions for Process & Key AIS Controls in Revenue, Expenditure, Production and HRM Cycles
 Characterize  PIP1

ASSESSMENT AND GRADING

Grades will be determined based on the following assessments and score allocations:

SKILL Assessment Skill Weighting for Grade
Participation Assignment (Report) Assignment (Presentation) In Class Test (2) Final Exam
Explain Information Flows (CK1)       75% 25% 10%
Describe Fraud and IT Risk Management (CK2)       50% 50% 20%
Create Project Management Plan (CC1)   50% 50%     25%
Evaluate IT Control Systems (CC2)       50% 50% 10%
Describe the Emerging of the Technologies (CCIT1)       25% 75% 15%
Apply AIS Development Strategies (CCIT2)   25%  25%   50% 10%
Work in a Team (CIP1) 100%           

TEACHING METHODS

This course is primarily lecture and assignment based; assigned readings will support learning and serve as a reference to materials covered in class. During class, approximately half of the class will be devoted to lecture with another half of the class for working on case studies and problem sets and reviewing the solutions. 

 

Students will submit two assignments in the area of AIS:

Assignment: Project Management Assignment (Part I)

Work type: Group

Output format: Written Report

Language: English

Description: The assignment requires students to analyze a case study and work in groups to present their group reports on the assigned case. This concerns developing a proposal to change AIS from an internally developed system called Financial Information System (FIS) to an Enterprise Resource Planning (ERP) system called Systems Applications and Products in Data Processing (SAP), creating a cost management plan and schedule management plan and identifying potential risks. It could be done using a Project Management Tool called JIRA.

Assignment: Project Management Assignment (Part II)

Work group: Group

Output format: Presentation

Language: English

Description: Each group will present the Project Management Assignment (Part I) by discussing how Project Management is used in changing AIS, explaining the plan for managing cost and scheduling management plan, and identifying potential risks. The group will explain the benefits of using Project Management tools, possible challenges, and how those challenges shall be managed and/or resolved.

Assignment Rubric:

STUDY PLAN

The course targets the 30 lessons in the study plan below. Each lesson is 1.5 class hours; there are a total of 45 class hours. The study plan below describes the learning outcome for each lesson, described in terms of what the student should be able to do at the end of the lesson. Readings should be done by students as preparation before the start of each class. Implementation of this study plan may vary somewhat depending on the progress and needs of students.

No  Lesson Learning Outcomes Teaching and Learning Activities, Assessment
1,2, 3, and 4

Accounting Information Systems: An Overview

  1. Describe information needs and

    business processes (CK1)

  1. Describe accounting  

  information system (CK2)  

Lecture Description of information needs and business processes AIS components and functions Discuss role of AIS in the value chainReading: AIS book, Chapter 1, Page 28-41
5, 6,7, and 8

Project Management (including related concepts of Product Management) Getting to know project management (CK2, CK4, CIP1)

  1. Define a project & Project Management
  2. Characteristic of a PM – Project Manager
  3. Product Scoping v/s Project Scoping (CK4)
  4. Define project methodology
  5. Define project management process
  6. Discuss Project management software
  7. Define five levels of CMMI
  8. Discuss CMMI approaches from project Initiation to project execution processes

  Lecture Group problem-based learning Discussion Integrative case Reading:

    1. PMBOK – https://www.pmi.org/pmbok-guide-standards/foundational/pmbok
    2. Product Managers for Digital Age 
    3. The Agile Coach – What is Product Management 
    4. Product Management 
    5. What is CMMI – https://cmmiinstitute.com/cmmi/intro
    6. What is CMMI? – https://www.cio.com/article/2437864/process-improvement-capability-maturity-model-integration-cmmi-definition-and-solutions.html
    7. Case Study of CMMI implementation at Bank of Montreal (BMO) Financial Group: http://grafp.com/Pdf/BMO%20-%20case%20study.pdf
9 and 10 Project Management Hands-on (using the tool) – CK2

 

11, 12, and 13

AIS Development Strategies (CK6, CCIT1, CIP1)

  1. Describe how organizations purchase application software, vendor services, and hardware.
  2. Explain how information system departments develop custom software.
  3. Explain how end users develop, use, and control computer-based information systems.
  4. Explain why organizations outsource their information systems, and evaluate the benefits and risks of this strategy.
  5. Brief introduction to Prototyping

Lecture Didactic questioning Group discussionReading:

  1. AIS book, Chapter 20, Page 647- 649
  2. AIS book, Chapter 21, Page 680 -697
14, 15, 16, and 17

Introduction to Systems Development, Systems Analysis, Design, Implementation, and Operation (CK6, CCIT1, CIP1)

  1. Explain the life cycle / phases of the systems development life cycle.
  2. Discuss methodologies used
  3. Discuss the people involved in systems development and the roles they play.
  4. Explain why system changes trigger behavioral reactions, what form this resistance to change takes, and how to avoid or minimize the resulting problems
Lecture Didactic questioning Group discussionReading: AIS book, Chapter 20, Page 654 – 663 AIS book Chapter 22, Page 708 – 722
18

Digital Transformation (CC1, CCIT4)

  1. Define what is digitalization
  2. Define what is disruptive technology
  3. Discuss implications for its people, culture, processes, and technology
  4. Discuss risk of ignoring it
  5. Discuss trends

  Lecture Didactic questioning Discussion Case study discussion – Netflix Reading:

  1. Digitization, digitalization and digital transformation – https://www.i-scoop.eu/digitization-digitalization-digital-transformation-disruption/
  2. Digitization, Digitalization, And Digital Transformation: Confuse Them At Your Peril – https://www.forbes.com/sites/jasonbloomberg/2018/04/29/digitization-digitalization-and-digital-transformation-confuse-them-at-your-peril/#17a4a66d2f2c
  3. Netflix Delivers Billions of Hours of Content Globally by Running on AWS –
19

Overview of Transaction Processing and Enterprise Resource Planning Systems (CK4, CK5, CK6)

  • Describe Transaction Processing
  • Describe Enterprise Resources Planning(ERP) and its pros andcons

 

Reading:

  1. AIS book, Chapter 2
  2. What is ERP – https://www.sap.com/products/what-is-erp.html
  3. Four ERP implementation casestudies you can learn from https://www.erpfocus.com/erpimplementation-case-studies.html
20, 21, and 22

Computer Fraud and Abuse (CK3)

  1. Define AIS threats
  2. Introduce fraud & Fraud Triangle
  3. Define computer fraud and discuss the different computer fraud classifications. 
  4. Explain the prevent, detect, and correct approaches in computer fraud and abuse.
  5. Explain Social Engineering

Lecture Discussion Case studiesReading: 

  1. AIS book Chapter 5, Page 153 – 170  
  2. AIS book Chapter 6, Page 191-192 
  3. AIS book Chapter 7, Page 224
  4. Journal of Accountancy – Why employees commit fraud – https://www.journalofaccountancy.com/issues/2001/feb/whyemployeescommitfraud.html
  5. Top 12 Cyber Crime Facts & Statistics – https://www.blue-pencil.ca/top-12-cyber-crime-facts-and-statistics/
  6. A malware attack against accounting software giant Wolters Kluwer – https://www.cnbc.com/2019/05/08/wolters-kluwer-accounting-giant-hit-by-malware-causing-quiet-panic.html 
  7. Social Engineering –
23 and 24

Risk Management Information Systems (CK3)

  1. Describe the nature, scope, and objectives of IT risk work, and identify the major steps in the risk process 
  2. Discuss IT risk management approaches
  3. Discuss Control Frameworks (COBIT, COSO’s IC and COSO’s ERM)
  4. Apply IT Risk Management Approaches on a scenario using case-study approach

Lecture Didactic questioning Group discussion Integrative caseReading:

  1. AIS book, Chapter 7, Page 226-230
  2. Risk management white paper:

KPMG Whitepaper Model Risk Management

25, 26 and 27

Information Systems Controls for Systems Reliability, Confidentiality, Privacy, Processing Integrity & Availability (CK3, CC1)

  1. Understand Value of Controls & Risk Based Design of Internal Controls for IT Risks
  2. Understand elements of Systems Reliability 
  3. Understand Trust Services Criteria, SOC2 Report
  4. Discuss ISO 27001
  5. Know about Defense in Depth & Time Based Model of Security
  6. Understand overall context of IT Risks & Controls and apply them in the given Case Study

Reading: 

  1. AIS Chapter 7, Page 235-237
  2. AIS Chapter 8, Page 263-266
  3. AIS Chapter 9, Page 296-297, Page 300
  4. AIS Chapter 10, Table 10-1, Table 10-2, Page 332-334
  5. KPMG – SOC2 & ISO 27001
  6. PwC – SOC2 Reporting Overview
28

Auditing Computer-Based Information Systems (CK3)

  1. Describe the nature, scope, and objectives of IT audit work, and identify the major steps in the audit process.
  2. Discuss how to manage the information systems audit.

  Introduction to Business Processes & Key Controls (CK3, and CK5)

  1. Introduce revenue, expenditure, production, and HRM/payroll Cycle
  2. DIscuss Key IT Controls applicable to these cycles

Reading:

  1. AIS Book Chapter 12, Page 380 & 381, Table 12-1
  2. AIS Book Chapter 13, Page 421 & 422, Table 13-1, 13-2
  3. AIS Book Chapter 14, Page 459, 460 and 461, Table 14-1
  4. AIS Book Chapter 15, Page 489, Table 15-1
  5. AIS book, Chapter 11, Page 349-353
  6. Deloitte – IT Auditing Process
29 Explain ERP & major ERP packages and SAP R/3 – 1 (Transaction Processing Recap)   Lecture Didactic questioning Group discussion
Additional Hands-On Activities  
30 SAP R-3 Configurations – 1 Demo Hands-on activity
31 SAP R-3 Configurations – 2 Demo Hands-on activity
32 SAP R-3 – Set Up Customers & Vendors Demo Hands-on activity
33 SAP R-3 – Record Customer Invoices, Vendor Invoices Demo Hands-on activity
34 SAP R-3 – Record Payments Demo Hands-on activity
35 Course Recap Session (CK1, CK2, CK3, CK4, CK5, CK6, CC1, CCIT1, CCIT2) Demo Hands-on activity

TEXTBOOKS AND REFERENCES

Core Textbook

  • Romney, M.B., and  Steinbart, P.J., Accounting Information Systems, 14 Ed.

Supplementary Textbook

References

  1. PMBOK – https://www.pmi.org/pmbok-guide-standards/foundational/pmbok
  2. Product Managers for Digital Age
  3. The Agile Coach – What is Product Management
  4. Product Management
  5. What is CMMI – https://cmmiinstitute.com/cmmi/intro
  6. What is CMMI? – https://www.cio.com/article/2437864/process-improvement-capability-maturity-model-integration-cmmi-definition-and-solutions.html
  7. Case Study of CMMI implementation at Bank of Montreal (BMO) Financial Group: http://grafp.com/Pdf/BMO%20-%20case%20study.pdf
  8. JIRA Based Project Management
  9. Digitization, digitalization and digital transformation – https://www.i-scoop.eu/digitization-digitalization-digital-transformation-disruption/
  10. Digitization, Digitalization, And Digital Transformation: Confuse Them At Your Peril – https://www.forbes.com/sites/jasonbloomberg/2018/04/29/digitization-digitalization-and-digital-transformation-confuse-them-at-your-peril/#17a4a66d2f2c
  11. Netflix Delivers Billions of Hours of Content Globally by Running on AWS –
  12. What is ERP – https://www.sap.com/products/what-is-erp.html
  13. Four ERP implementation case studies you can learn from – https://www.erpfocus.com/erp-implementation-case-studies.html
  14. ournal of Accountancy – Why employees commit fraud – https://www.journalofaccountancy.com/issues/2001/feb/whyemployeescommitfraud.html
  15. Top 12 Cyber Crime Facts & Statistics – https://www.blue-pencil.ca/top-12-cyber-crime-facts-and-statistics/
  16. A malware attack against accounting software giant Wolters Kluwer – https://www.cnbc.com/2019/05/08/wolters-kluwer-accounting-giant-hit-by-malware-causing-quiet-panic.html
  17. Social Engineering –
  18. Risk management white paper: KPMG Whitepaper Model Risk Management
  19. KPMG – SOC2 & ISO 27001
  20. PwC – SOC2 Reporting Overview
  21. Deloitte – IT Auditing Process