The Importance of Accounting Information Systems

Generally, the day-to-day running of a business organization comprises several transactions which the firm engages in. As a result, there is a need to always keep the records in a systematic manner for decision-making and for reference. Accounting is a systematic way of recording business transactions. The data of all the transactions are recorded and kept mainly for future use. These data are tracked and recorded in a computer-based system (financial accounting system) to facilitate the accuracy of the data. The main users of the accounting information are the shareholders, creditors, financial analysts, vendors, and government agencies. There are various categories of books and documents in which the accounting information is kept. For instance, the books of original entry which comprises of various journals such as cash journal, general journal, purchase journal, and sales journal; and the source documents like, cash receipts, bank statements, and cash statements. The information from Continue reading

Transaction Process System – Activities, Objectives and Characteristics

Transaction processing system (TPS), an information system (IS) mostly used by managers in operational management to record internal transactions, economic events that occur within an organization and external transactions where the business event took place outside the organization to make operational decision. TPS supports different tasks by setting a set of rules and guidelines that specify the ways to capture or collect, process and store any transaction in a form of data or information. Transaction Process System Activities Processing business transactions was the first application of computer of most firms. Since the 1950s, Transaction processing system (TPS) have evolved from slow, manual systems to advanced computerized system. TPS, a cross-functional information system were among the earliest computerized systems developed to record, process, validate, and store business for future use or retrieval. Transactions are the economic events or exchange between two or more business entities. Basically, TPS is an organized collection Continue reading

Disaster Recovery Plan (DRP) in Business

Fire, flood, earthquake and accidental deletion of data are all acts that can cause disastrous consequences on data. Such disasters can prevent the network from operating normally, which in turn can hamper the organization’s business. These disasters can be classified into man-made disasters and environmental disasters. Man-made disasters are intentionally or unintentionally caused by humans. For example, a user accidentally deletes the data, virus and malicious programs can damage data and various other events can cause data loss and downtime. Environmental disasters are non-preventive but can be reduced if appropriate precautions are taken. Environmental disasters include fire, flood, earthquake, tornado and hurricane. Disaster recovery deals with recovery of data that is damaged due to destructive activities. The time required to recover from a disaster depends on the disaster recovery plan implemented by the organization. A good disaster recovery plan can prevent an organization from any type of disruption. Disaster Recovery Continue reading

Information Systems in Various Levels of Modern Organizations

The INFORMATION SYSTEM plays a major role in the organization by satisfying the diverse needs through a variety of systems such as Query systems, Analysis systems, Modeling systems and Decision support systems. It helps the Clerical personnel in transaction processing and answers their queries on data pertaining to transaction. It helps junior management by providing operational data for planning and control, and helps them in Decision-making. It helps the Middle management in short-term planning, target setting and controlling business functions. It helps Top management in goal setting, planning and evolving business plans and their implementation. OPERATIONAL-LEVEL SYSTEMS At the operational level are transactions processing systems through which products are designed, marketed, produced, and delivered. These systems accumulate information in databases that form the foundation for higher-level systems. In today’s leading organizations, the information systems that support various functional units-marketing, finance, production, and human resources-are integrated into what is known as Continue reading

Data Processing Methods

1. Batch Processing. Batch processing is a technique in which data to be processed or programs to be executed are collected into groups to permit convenient, efficient, and serial processing. It is the simplest form of data processing. With this method, data is entered to the information flow in large volumes, or batches. That is, the processing by computer is performed periodically, at specified time intervals (weekly, monthly, etc) when large volumes are accumulated. Daily transactions in a business establishment, for example, may be batch processed on a weekly basis. Instead of being processed periodically when a sufficient volume has been accumulated. Advantages of batch processing are: Economical when a large volume of data must be processed and The most appropriate method for those applications (e.g., payroll) where the delay caused by accumulating data into batches does not reduce the value of the information. Limitations of batch processing are: It Continue reading

Data Tampering – Meaning, Types and Countermeasures

Tampering means changing or deleting a resource without authorization. A web application is an application that is accessed through a web browser over the internet. Data tampering in web applications simply means a way in which a hacker or a malicious user gets into a web site and changes, deletes or to access unauthorized files. A hacker or malicious user can also tamper indirectly by using a script exploit that is the hacker would get the script to execute by masking it as a user input from a page or as a web link. Tampering is one of the biggest security threats faced by web applications. It is used to change or edit files found in web applications which are usually used by multi-million business corporations across the world. Tampering started in the late 1980’s as a way to sabotage data or plant a malicious or destructive program to delete Continue reading