Page 1 of 8 Assessment Task – Tutorial Questions Unit Code: HI5019 (MidTerm) Unit Name: Strategic Information Systems for Business and Enterprise Assignment: Tutorial Questions Due: Week 13, dated...

1 answer below »
assgnmnt attached


Page 1 of 8 Assessment Task – Tutorial Questions Unit Code: HI5019 (MidTerm) Unit Name: Strategic Information Systems for Business and Enterprise Assignment: Tutorial Questions Due: Week 13, dated 21st October 2020, on Wednesday at 05:30 pm. Weighting: 50% Purpose: This assignment is designed to assess your level of knowledge of the key topics covered in this unit Unit Learning Outcomes Assessed.: 1. Critically evaluate the purpose and role of accounting information systems in today’s business environment. 2. Articulate the various transaction cycles, financial reporting, management reporting systems and e-commerce systems to technical and non-technical stakeholders. 3. Evaluate systems development methodologies and the role of accountants in system development projects. 4. Appraise the risks inherent in computer-based systems/ERP, including the role of ethics and the various internal control processes that need to be in place. 5. Critically evaluate the range of cultural, security, privacy and ethical issues facing individuals and organizations as a result of information systems. Description: Each week students were provided with three tutorial questions of varying degrees of difficulty. The tutorial questions are available in the Tutorial Folder, for each week, on Blackboard. The Interactive Tutorials are designed to assist students with the process, skills, and knowledge to answer the provided tutorial questions. Your task is to answer a selection of tutorial question for weeks 1 to 11 inclusive and submit these answers in a single document. Page 2 of 8 The questions to be answered are: Question 1: Week 4, 7 Marks. [Words Limit: Up to 400 words.] a) Internal controls play an important role in reducing the risks of fraudulent activities in any organization. Further, advanced technology helps accountants in reducing fraud. Explain how an advanced technology transaction processing system reduces fraudulent activities from any organizing. [4 Marks. Words Limit: Up to 200 words] b) Refer to the given system flowchart, and we have discussed the control weakness and the risk associated with these control weaknesses. Based on these control weaknesses and the associated risk, what types of frauds are possible in this business environment. [3 Marks. Word Limit: Up to 200 words] --------------------------------------------------------------------------------------------------------------------- Page 3 of 8 Question 2: Week 5, 11 Marks. [Words Limit: Up to 400 words.] The flowchart below illustrates two alternative inventory ordering methods. Answer part 1 to 3 based on this flowchart. Required: 1. Some organizations prefer using alternative two. What are the advantages of using alternative two instead of the alternative one? Be specific. [2 Marks] 2. What is the difference between purchase requisition and purchase order? [2 Marks] Page 4 of 8 3. Under what circumstances can you envision management using alternative one rather than alternative two? [3 Marks] 4. Some accountants argue that the receiving department should be eliminated. Discuss the objective of eliminating the receiving function. What accounting/audit problems need to be resolved. [4 Marks] --------------------------------------------------------------------------------------------------------------------- Question 3: Week 6, 7 Marks. [Words Limit: Up to 300 words.] HARDA Limited employs 650 workers in ten different departments. These workers work in various capacities, including the manufacturing workers, technician, and janitorial workers. Each department has a supervisor who is responsible for supervising departmental activities. In addition to supervising operations, the supervisors of the departments are responsible for recruiting, hiring, and firing workers within their areas of responsibility. The organization attracts casual labour and experiences a 20 to 30 per cent turnover rate in employees per year. Employees clock on and off the job each day to record their attendance on time cards. Each department has its clock machine located in an unattended room away from the main production area. Each week, the supervisors gather the time cards, review them for accuracy, and sign and submit them to the payroll department for processing. Besides, the supervisors submit personnel action forms to reflect newly hired and terminated employees. From these documents, the payroll department signs the paychecks, which are drawn on the general cash account, and sends them to the department supervisors for distribution to the employees. A payroll register is sent to the cash disbursements department where it is filed. Required: a) Discuss the risks for payroll fraud in the HARDA Limited payroll system. [3 Marks] b) What controls would you implement to reduce the risks? [4 Marks] --------------------------------------------------------------------------------------------------------------------- Page 5 of 8 Question 4: Week 8, 11 Marks. [Words Limit: Up to 300 words.] Marketing system provides some useful insights regarding the sales order. Different departments use this information. For instance, the production process uses this information to forecast the expected sale for next month. The production clerk uses this to create an online production schedule. From this schedule, the system automatically prepares weekly online work orders to be used by the production department. The production supervisor assesses the work orders from his terminal and prepares the necessary paper-based move tickets and materials requisitions. Then, the move tickets and two copies of the materials requisitions are distributed to each work centre. Later, work centre employees submit the two copies of the materials requisitions to the warehouse in exchange for materials and sub-assemblies. If additional new materials are needed beyond the standard quantity, the supervisor issues additional materials requisitions. Work centre employees record their work hours on paper-based job cards and send them to the accounting department. After the production is completed in a work centre, the move ticket is submitted to the accounting department. Upon the completion of a production batch, the production supervisor closes the open work order file. The warehouse manager files one copy of the materials requisition and updates the materials inventory file in the computer in her office. The manager then sends a second copy of the materials requisition to the accounting department. At the end of the day, the manager prepares a digital journal voucher and post it to the general ledger control account. The accounting clerk assesses the work orders and set up a work-in-process account for a production batch. Throughout the production period, the clerk also receives move tickets, job tickets, and materials requisitions, which he uses to post to the work-in-process account. At the end of each day, the accounting clerk prepares a digital journal voucher and post it to the general ledger control account to reflect the status of work-in-process and to record transfers of work-in-process to finished goods inventory. Required: Analyse the risks associated with the following business processes of a manufacturing company. --------------------------------------------------------------------------------------------------------------------- Page 6 of 8 Question 5: Week 10, 7 Marks. [Words Limit: Up to 350 words.] You are working in a mid-size company for the last couple of years. Recently you are promoted as a Chief Information Officer (CIO) and excited to perform your new role efficiently. David Savage, Chief Operation Officer (CEO) of your company has decided to implement an Enterprise Resource Planning (ERP) system. David Savage has met with a consulting ERP firm based on a recommendation from a friend at his club. During a recent meeting, David Savage introduced the chief consultant, who was charming, was personable, and seemed very knowledgeable. The CEO’s first instinct was to sign a contract with the consultant, but he decided to hold off until he had received your input. Required: David Savage asked you to write a memo presenting the issues and the risks associated with consultants. Further, outline a set of procedures that could be used as a guide in selecting a consultant. --------------------------------------------------------------------------------------------------------------------- Question 6: Week 11, 7 Marks. [Words Limit: Up to 350 words.] a) Lecture 10 and Interactive Tutorial 11 discusses the acronym TELOS which provides guidance for accessing project feasibility. The term stands for technical, economic, legal, operational and schedules feasibility. Discuss these feasibilities briefly. And elaborate cost-benefit analysis under economic feasibility. [4 Marks] b) Accountants should be involved in the detailed design and implementation of the system development life cycle. Comment on the statement. [3 Marks] Submission Directions: The assignment will be submitted via Blackboard. Each student will be permitted only ONE submission to Blackboard. You need to ensure that the document submitted is the correct one. Page 7 of 8 Academic Integrity Holmes Institute is committed to ensuring and upholding Academic Integrity, as Academic Integrity is integral to maintaining academic quality and the reputation of Holmes’ graduates. Accordingly, all assessment tasks need to comply with academic integrity guidelines. Table 1 identifies the six categories of Academic Integrity breaches. If you have any questions about Academic Integrity issues related to your assessment tasks, please consult your lecturer or tutor for relevant referencing guidelines and support resources. Many of these resources can also be found through the Study Skills link on Blackboard. Academic Integrity breaches are a serious offence punishable by penalties that may range from deduction of marks, failure of the assessment task or unit involved, suspension of course enrolment, or cancellation of course enrolment. Table 1: Six categories of Academic Integrity breaches Plagiarism Reproducing the work of someone else without attribution. When a student submits their own work on multiple occasions this is
Answered Same DayOct 15, 2021HI5019

Answer To: Page 1 of 8 Assessment Task – Tutorial Questions Unit Code: HI5019 (MidTerm) Unit Name: Strategic...

Harshit answered on Oct 19 2021
147 Votes
Unit Code: HI5019
Unit Name: Strategic Information System For Business And Enterprise
CONTENT
    SERIAL NO.
    TOPICS
    PAGE NO
    1
    Answer to Q1
    
    2
    Answer to Q2
    
    3
    Answer to Q3
    
    4
    Answer to Q4
    
    5
    Answer to Q5
    
    6
    Answer to Q6
    
    7
    References
    
ANSWER TO QUESTION 1
a) An advanced technology transaction processing system helps in the reduction of fraudulent activities in organizing in the following manner:
· Restricting
the employees from access to assets which will control the potential of misappropriation of the same. If access is given to employees about all the aspects that the chance of fraud increases. Therefore, a background check of employees must be done before recruiting them.
· It serves as a storage system. It store important and confidential documents of the companies. Thus, there is no possibility of duplication of records.
· Backup and recovery of all the data and records can be maintained through this. Therefore, it eradicates the chance of loss of information and records.
· As the systems are controlled and operated by authorized persons or customers, the organization.
· The advanced technology transaction processing system also reduces the time taken to complete a task because now everything is done digitally and not manually (Bentley-Goode, K.A., Newton, N.J. and Thompson, A.M., 2017).
Thus, training the employees to adapt to new changes will help the organization to make effective changes at runtime.
b) With the help of the flowchart, the various types of fraud which are possible in the business environment based on control weakness and associated risk are:
· Payroll Fraud: this happens when an employee lies about the number of working hours, asking for pay advance without paying back etc. Company also sometimes hire employees without checking their background which affects the organization. To stop this fraud audit payroll account must be done to catch fraudulent behaviour early on.
· Sales Fraud: this kind of fraud is done to boost the sales of the company. This can be done by preparing fake invoices or fake shipping documents to show that sales occurred.
· Identity Theft: This type of fraud is created by theft of goods from the warehouse, false inventory, and shipping counts or important documents that contain confidential information about the organization. Therefore, affecting the organization.
· Manipulating the financial statement: This is commonly done by understating the liabilities and overstating the assets and revenue.
· Not using advanced technology: The companies need to maintain digital copies of the documents and records which can help in preventing fraud and not letting handover important documents to anyone.
Answer to Question 2
(1) For the safe-keeping of the data and other information of the customer, the organization should arrange for the back-up and recovery which is not seen in the alternative 1. Along with the above, this option also provides better efficiency of the company and improves the growth of the company and also is less complicated. The same method is used in purchased copy and used in transferring the data. But in alternative2 we are doing this twice. Hence, organizations prefer using alternative 2 instead of Alternative1.
(2) The difference between purchase requisition and purchase order are:
I. Purchase requisition is an internal document whereas; purchase order is an external document.
II. Purchase requisition is a process which is inter departmental and is done before buying goods are service. On the other hand, purchase order simply means ordering products or services from outside the organization which means from external sources.
III. First, a purchase requisition is made and the purchase order follows the purchase requisition.
IV. The content of the purchase requisition form is the name and department of the requester, date of request, and name of the vendor, reason for purchase, purchase requisition number, item description, and quantity. On the other hand, the purchase order form contains the name of the company, quantity, price of good per unit, delivery date, billing detail, payment term, purchase order number, and relevant stakeholder signature (Babai, M.Z., Ladhari, T. and Lajili, I., 2015).
(3) In alternative 2, the blind copies and purchase order etc are checked but in Alternative 1 only the list of transactions are seen. The size of the organization is to be considered based on the sensitivity of the situation and apart from that, each and every aspect should not be considered.
(4) The amount of time...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here