Referencer For Quick Revision: Intermediate Course Paper-7 Sec-A: Information Technology
Referencer For Quick Revision: Intermediate Course Paper-7 Sec-A: Information Technology
Referencer For Quick Revision: Intermediate Course Paper-7 Sec-A: Information Technology
Revision
Intermediate Course Paper-7
Sec-A: Information Technology
A compendium of subject-wise capsules published in the
monthly journal “The Chartered Accountant Student”
Board of Studies
(Academic)
ICAI
INDEX
Edition of Students’
Page No. Topics
Journal
1-7 December 2019 Business Process Management & IT
7-13 December 2019 Information Systems and IT Fundament als
14-18 March 2020 Telecommunication and Network
18-22 March 2020 Business Information Systems
Business Process Automation through
22-25 March 2020
Application Software
information technology
The capsule on IIPC (old) Paper 7A: Information Technology that covers Chapter 1 “Business Process Management & IT”
and Chapter 2 “Information Systems and IT Fundamentals” of subject is another step of Board of Studies in its endeavour
to provide quality academic inputs to IIPC students of Chartered Accountancy course. This capsule intends to assist
students in their quick revision of Chapters 1 and 2 and should not be taken as a substitute for the detailed study of these
chapters. Students are advised to refer to the relevant study material and Revision Test Paper for comprehensive study
and revision.
Order to Cash Process (O2C) Flow Cycle The strategy of the company is specified, which describes its long-
term concepts to develop a sustainable competitive advantage in the
market.
Recording Pick release
Customer Order Determines Realize
Availability of the The items are
A purchase order items is checked moved from the Goals
is received from a and customer warehouse to the
customer. The business strategy is broken down to Operational Goals which can
order is booked. staging area. be organized, so that each goal can be divided into a set of sub-goals.
Determines Realize
1
INformation technology
Business Process Management (BPM) - “The achievement of an Define
organization’s objectives through the improvement, management Measurements that are critical to customer
and control of essential business processes”. satisfaction [Critical to Quality, (CTQ)] are
identified for further project improvement.
BPM's Principles BPM's Practices
3
INformation technology
Accounting Systems Automation Data Processing Cycle
An Accounting Information System (AIS) is defined as a system The Data Processing Cycle consists of following basic steps
of collection, storage and processing of financial and accounting with alerts, controls and feedback at each step.
data that is used by decision makers.
Accountants and Auditors must study and understand AIS and Data Input Involves the activities like capturing the
related concepts so that they can accomplish the functions of data, implementing control procedures,
accounting, general accounting reports and using accounting recording in journals, posting to ledgers
reports. The Accounting Information System is the mechanism and preparation of reports.
that allows accountants to perform their accounting functions and
tasks. Basic Functions of an Accounting Information System. Data Storage Involves organizing the data in master file
1 Collect and Collect and store data about or reference file of an automated system for
store data organization’s business activities and easy and efficient access.
transactions by capturing transaction
Data Involves addition, deletion and updating of
data from source documents and posting
Processing the data in the transaction file, master file
data from journals to ledgers.
or reference file.
2 Record Record transactions data into journals.
transaction These journals present a chronological Information Involves generation of documents and
record of what occurred and provide Output managerial reports in printable or
management with information useful for electronic form for addressing queries.
decision making.
3 Safeguard Provide adequate controls to ensure
organisational that data are recorded and processed
assets accurately by safeguarding organizational
assets (data and systems). Benefits of BPMS
Automating repetitive business processes
• Processing Cycles of an Accounts BPM: These are namely
Financing Cycle, Revenue Cycle, Expenditure Cycle, • Processes such as report creation and distribution or the
Human Resource Cycle, and Production Cycle. monitoring of or reporting on company’s Key Performance
Financing Cycle The cycle consists of a set of transactions Indicators (KPI) reduces the manual operational costs
leading to the recognition of a major economic and helps employees to concentrate on activities that are
event on the financial statements. important to the success of business.
Revenue Cycle It includes transactions surrounding the
recognition of revenue involving accounts Bpms works by ‘loosely coupling’ with a company's
like Sales, Accounts Receivable, Inventory and existing applications
General Ledger.
Expenditure It includes transactions surrounding the • Enables to monitor, extract, format and distribute
Cycle recognition of expenditures involving accounts information to systems and people; in line with business
like Purchases, Accounts Payable, Cash events or rules.
Disbursements, Inventory and General Ledger,
preparation and recording of purchase orders; Operational savings
receipt of goods and the recording of the
cost of inventory; receipt of vendor invoices; • BPM focuses on optimization of processes. The processes
recording of accounts payable and preparation that are repetitive are optimized and lead to reduced
and recording of cash disbursements. expenses which translate to immediate cost savings.
Human This involves activities of hiring and paying
Resource Cycle employees. Reduction in the administration involved in compliance
Production This involves the recurring set of business and iso activities
Cycle activities and related data processing
operations associated with the manufacturer • The BPM is ideally suited to support companies in
of products including activities like converting their quest for process improvement and compliance/
raw materials and labor into finished goods. governance certification.
• General Ledger & Reporting System: The information • It gives full control over process and document change,
processing operations involved in updating the general clarity of inherent risks, and ease with which process
ledger and preparing reports, summarize the results of an knowledge is communicated across the company.
organization’s activities. An important function of the AIS is
to efficiently and effectively collect and process the data about Freeing-up of employee time
a company’s transactions.
• Data Processing Cycle: In the data processing cycle, the • There is a hard cost associated with employee time as well
processes of business activities about which data must be as soft costs associated with losing business or lowered
collected and processed are identified. Further, the activities, productivity.
resources affected by that event, the agents who participate in
that event and the event of interest could be the input, output, • Another area where time comes into play is in opportunity
processing, storage, alerts, controls and feedback. costs.
5
INformation technology
b. Data Flow Diagram (DFD) is a graphical representation of Basic Flowchart Shapes
the flow of data through an information system. The major DFD
component’s symbols are as follows:
Entity An entity is the source or destination of data. Entities
are often represented as rectangles.
Process The process is the manipulation or work that transforms
data, performing computations, making decisions (logic
flow), or directing data flows based on business rules. Process Decision Document Data
Data A data store is where a process stores data between
Store processes for later retrieval by that same process or
another one.
Data Data flow is the movement of data between the entity,
Flow the process and the data store. Data flow portrays the Start 1 Start 2 Pre-defined Stored Data
interface between the components of the DFD. Process
Meaning Symbols
Process or
Data Store or
Internal Sequential Direct Data Manual
Entity Storage Data Input
Data Flow
Types of DFD
Logical Data A logical DFD focuses on the business and how
Flow Diagram the business operates. It describes the business Card Paper Tape Delay Display
events that take place and the data required
and produced by each event. The logical model
reflects the business.
Physical Data A physical DFD shows how the system will be
Flow Diagram implemented. The physical model depicts the Manual Preparation Parallel Loop Limit
system. Operation Mode
Advantages of DFD Limitations of DFD
• It aids in describing the boundaries • It make the
of the system. programmers little
• It is beneficial for communicating confusing concerning Terminator On-page Off-page Flowchart
existing system knowledge to the the system. Reference Reference shapes
users. • The biggest drawback
• A straightforward graphical of the DFD is that it
technique which is easy to recognize. simply takes a long
• DFDs can provide a detailed time to create, so long
representation of system that the analyst may
components. not receive support Auto height Dynamic Line curve Control
• It is used as the part of system from management to Text
documentation file. complete it.
Connector Connector Transfer
• DFDs are easier to understand • Physical considerations
by technical and nontechnical are left out.
audiences.
• It supports the logic behind the data fdgdfgfg
flow within the system.
Annotation
c. Flow Chart is a type of diagram that represents an algorithm,
workflow or process, showing the steps as boxes of various kinds, d. A Decision Tree also termed as an Inference or Logical tree
and their order by connecting them with arrows. is a collection of a basis (condition) and a conclusion (action).
It allows the programmer to compare different approaches and • A decision tree is a decision support tool that uses a tree-like
alternatives on paper and often shows interrelationships that are graph or model of decisions and their possible consequences,
not immediately apparent. including chance event outcomes, resource costs, and utility.
• Decision Trees are measured to be one of the most accepted
Advantages of using Flowchart approaches for representing classifier.
• Quicker grasp of relationships Advantages of using Decision Tree
• Effective Analysis • Are simple to understand and interpret. People are able to
• Communication understand decision tree models after a brief explanation.
• Documentation
• Efficient coding • Possible scenarios can be added.
• Orderly check out of problem • Worst, best and expected values can be determined for
• Efficient program maintenance different scenarios.
- Skype.
Capabilities
• WhatsApp Messenger is a cross-platform • Verify that the accounting values fairly present items worth.
mobile messaging application which allows us to
exchange messages without having to pay for SMS. CUTOFF
It is available for: iPhone, BlackBerry, Android,
Windows phone etc. • Verify that the transaction is re-coded in the proper accounting
• Team-ware, Collaboration Software or period.
Groupware software allow collective and
collaborative working of teams from different
geographical locations on an online and real-time COMPLIANCE
basis. • Verify that the processing is in compliance with governmental
laws and regulations, generally accepted accounting
• Most enterprises store digital versions of procedures, and organization's policies and procedures.
Management
Information
them out.
Processes
7
INformation technology
Audit Procedures
REALIGNMENT OF CHANGES IN CUSTODY OF
Study • Gather evidential matter relating to technical FUNCTIONS FILES AND DOCUMENTS
Technical aspects of systems under study, including
Aspects all relevant documentation describing the Data entry and source of Ready access to data over telecom
computer facility, application programs, transactions may be centralized. links complicate custodial
operating procedures, security procedures and functions of data. Data librarian
so on. may become in charge for data.
A computer and storage device dedicated • Complex Instruction Set Computer (CISC): If the
File Server to storing files. Any user on the network control unit contains a number of micro-electronic
can store files on the server.
circuitry to generate a set of control signals and each
micro-circuitry is activated by a micro-code, this
Print A computer that manages one or more
printers. design approach is called CISC design. Examples of
Server
CISC processors are: Intel 386, 486, Pentium, Pentium
Pro, Pentium II, Pentium III processors etc.
Network A computer that manages network traffic.
Server • Reduced Instruction Set Computer (RISC): To
execute each instruction, if there is separate electronic
Database A computer system that processes database circuitry in the control unit, which produces all the
Server queries.
necessary signals, this approach of the design of the
control section of the processor is called RISC design.
A program that handles all application
Application operations between users and an It is also called hard-wired approach. Examples of RISC
Server enterprise's backend business applications processors: IBM RS6000, MC88100 processors etc.
or databases.
9
INformation technology
INFORMATION SYSTEM LAYERS
SYSTEM NETWORK
APPLICATIONS
SOFTWARE LINKS
Hardware is the tangible portion of our computer systems; Educational Holds contents adopted for use by students.
something we can touch and see. Software E.g. Examination Test CDs.
• Provides systems with features & capabilities to help Refers to the situation that arises when
connect computer networks. Contention there is a conflict for some common
resource in a network.
• Keeps a track of where each file is stored and who can Adding new files
access it, based on which it provides the file retrieval. to database
User
DBMS - Basic Concepts
Reliability communication
Characters Collection of Bits.
• Wherein a connection is first established and then data is Record Collection of Fields.
exchanged, like it happens in case of telephone networks.
File Collection of
Connectionless Networks Records.
11
INformation technology
Hierarchical Database
Network Database Information System Life Cycle
Model
Model
Phase 1: Investigate
DATABASE MODELS Understand the Problem
Relational Database Object Oriented Database
Model Model
Phase 5: Maintenance & Phase 2: Analyse
Review Assess the Solutions
advantages of dbms Evaluate Results
• In a DBMS, data does not reside in applications but data Hardware platform: Computer, network capabilities,
bases program & data are independent of each other. input, storage and output devices;
Software: Programming language, package and database;
Outputs: Report layouts and screen designs;
Faster application development Inputs: Documents, screen layouts and validation procedures;
User interface: How users will interact with the computer
• In the case of deployment of DBMS, the data is already system;
therein databases, application developer has to think of Modular design: Of each program in the application;
only the logic required to retrieve the data in the way a Test plan: Develop test data;
user needs. Conversion plan: How the new system is to be
implemented; and
Documentation: Including systems and operations
documentation. Later, a user manual will be produced.
Adaptive All systems will need to adapt to changing Network as a Service (NaaS)
Maintenance needs within a company. Involves optimization of resource allocation by
considering network and computing resources as a
whole. Example - VPN, Mobile N/w Virtualization.
Corrective Problems frequently surface after a system
Maintenance has been in use for a short time, however
Communication as a Service (CaaS)
thoroughly it was tested. Any errors must Allows businesses to selectively deploy communication
be corrected. devices and modes on a pay-as-you-go, as-needed basis.
This approach eliminates the large capital investments.
Examples are: Voice over IP (VoIP), Instant Messaging (IM),
cloud computing Collaboration and Videoconferencing.
13
Information Technology
information Technology
The Capsule on IIPC(Old) Paper 7A: Information Technology incorporates Chapter 3: Telecommunication
and Network, Chapter 4: Business Information Systems and Chapter 5: Business Process Automation Through
Application Software. This capsule intends to assist students in their Quick revision and should not be taken
as a substitute for the detailed study of these chapters. Students are advised to refer to the relevant study
material and Revision Test Paper for comprehensive study and revision.
♦ These are starting and stopping points in any telecommunication network environment including Video
Terminals Terminals, Microcomputers, Telephones, Office Equipment, Telephone & Transaction Terminals.
♦ These support data transmission and reception between terminals and computers by providing a variety
Telecommunications
of control and support functions. They include Network Interface Card, Modem, Multiplexer and
Processors
Internetworked Processors such as Switch, Router, Hub, Bridge, Repeater, etc.
♦ Used to optimize and streamline the essential business processes, using the latest technology to automate
Telecommunications the functions involved in carrying them out.
Media/Channels ♦ Grouped into Guided Media and Unguided Media.
♦ Guided Media inludes Twisted pair Wire, Coaxial Cable, Fiber optics and Unguided Media includes
Terestrial Microwave, Radio Wave, Micro Wave, Infrared Wave and Communication Satellites.
Computers ♦ Of all sizes and types are connected through media to perform their communication assignments.
Telecommunications ♦ Consists of programs that control telecommunications activities and manage the functions of
Control Software telecommunications networks. They include Telecommunication Monitors, Network Operating
Systems for network servers, Network Management Components and Communication Packages.
Area Coverage Based Classification Functional Based Classification Ownership Based Classification
Multi-Tier Architecture
Single Tier Architecture Two Tier Architecture n-Tier Architecture
Involves putting all the required A software architecture in which a It is a client–server architecture in which
components for a software application or presentation layer or interface runs on a presentation, application processing, and
technology on a single server or platform. client, and a data layer or data structure data management functions are logically
gets stored on a server. separated.
Cl -1 Cl -2 Cl -3
Cl -1 Cl -2 Cl -3
Client 2 Tier Tier
15
Information Technology
Network Computing
The growing reliance on the computer hardware, software, and data resources of the Internet, Intranets, extranets, and other networks has
emphasized that for many users “the network is the computer”.
Features of Network Computing are as follows:
Network computers & other thin clients provide a browser-based user-interface for processing small application programs (applets).
These are microcomputers without floppy or hard disk drives that are designed as low-cost networking computing devices.
Application and database servers provide the operating system, application software, applets, databases, and database management
software needed by end users in network.
Models of Computing
Centralized Computing - It is done at a central location, Decentralized Computing - Decentralized computing is the allocation of
using terminals attached to a central computer. The computer resources, both hardware and software, to each individual workstation, or
itself may control all the peripherals directly, or they may be office location. Decentralized systems enable file sharing and all computers
attached via a terminal server. can share peripherals.
Advantages - It offers greater security over decentralized Advantages - These can run independently of each other and enable file
systems because all the processing is controlled in a central sharing and all computers can share peripherals such as printers & scanners,
location. allowing all the computers in the network to connect to the internet.
Network Topology
‘Topology’ defines the physical or logical arrangement of links in a network. It is the geometric representation of the relationship of all the
links and linking devices (usually called Nodes) to each other.
A node failure does not bring Failure of one computer on the If one of the microcomputer If one of node fails, the network
down the entire network. Failure network can affect the whole fails, it will not affect the entire traffic can be redirected to
of server affects whole network. network. network. another node.
New nodes can be added easily It is considered to be inefficient It is easy to install, easily It is the best choice for fault
without affecting rest of the as data can only travel in one extendable and inexpensive. tolerance, however, it is very
network. route to reach its destination. difficult to setup and maintain.
Parallel Serial
Asynchronous Synchronous
Serial Mode Parallel Mode
In this, the data bits are transmitted serially one after another. In this, the data bits are transmitted simultaneously.
Data is transmitted over a single wire. Data is transmitted over 8 different wires.
It is a cheaper mode of transferring data. It is relatively expensive mode of transferring data.
It is useful for long distance data transmissions. Not practical for long distance communications as it uses parallel
paths, so cross talk may occur.
It is relatively slower. It is relatively faster.
Transmission Mode used to define direction of signal flow between two linked devices
Simplex Connection Half -Duplex Connection Full Duplex Connection
Data flows in only one direction. Data flows in one direction or the other, Data flows in both directions simultaneously.
but not both at the same time.
Terminal A Terminal B Terminal A Terminal B Terminal A Terminal B
Example – Data from user’s Example – Walkie-Talkie. Example – Mobile Phones.
computer to the printer.
Network Architecture
♦ It refers to the layout of the network consisting of the hardware, software, connectivity, communication protocols and mode of
transmission, such as wired or wireless and its goal is to promote an open, simple, flexible, and efficient telecommunications
environment. It includes hardware components used for communication, cabling and device types, network layout and
topologies, physical and wireless connections, implemented areas and future plans.
Protocols
♦ Protocols are software that performs a variety of actions necessary for data transmission between computers. These are a set of
rules for inter-computer communication that have been agreed upon and implemented by many vendors, users and standards
bodies to ensure that the information being exchanged between the two parties is received and interpreted correctly.
The OSI Model: The International Standards Organization (ISO) developed a seven-layer Open Systems Interconnection (OSI)
model to serve as a standard model for network architectures.
TCP/IP The OSI Model Functions
Application Layer Provides communications services for end user applications.
Application or Process Layer Presentation Layer Provides appropriate data transmission formats and codes.
Session Layer Supports the accomplishment of telecommunication sessions.
Host-to-Host Transport Layer Transport Layer Supports the organization and transfer of data between nodes in the network.
Internet Protocol (IP) Network Layer Provides appropriate routing by establishing connections among network links.
Network Interface Data Link Layer Supports error-free organization and transmission of data in the network.
Physical Layer Physical Layer Provides physical transmission of data on the telecommunication media in the network.
Threats
Unstructured Threats
♦ These originate mostly from inexperienced individuals using easily available hacking tools from the Internet.
♦ These include port-scanning tools, address-sweeping tools, and many others.
Structured Threats
♦ These originate from individuals who are highly motivated and technically competent and usually understand network
systems design and the vulnerabilities of those systems.
External Threats
♦ These originate from individuals or organizations working outside an organization, which does not have authorized
access to organization’s computer systems or network.
Internal Threats
♦ These threats originate from individuals who have authorized access to the network. These users either have an account
on a server or physical access to the network.
Vulnerability
Vulnerability is an inherent weakness in the design, configuration, or implementation of a network or system that renders it susceptible to
a threat. The following facts are responsible for occurrence of vulnerabilities in the software:
Software Bugs - Software bugs are so common that users have developed techniques to work around the consequences, and bugs that
make saving work necessary every half an hour or crash the computer every so often are considered to be a normal part of computing.
Timing Windows - This problem may occur when a temporary file is exploited by an intruder to gain access to the file, overwrite
important data, and use the file as a gateway for advancing further into the system.
Insecure default configurations - Insecure default configurations occur when vendors use known default passwords to make it as easy
as possible for consumers to set up new systems.
Trusting Untrustworthy information - This is a problem that affects routers, or those computers that connect one network to another.
End users - Generally, users of computer systems are not professionals and are not always security conscious.
Network Security
It is based on the increasing demand and expectations, the security involves four aspects: Privacy (Confidentiality), Message
Authentication, Message Integrity and Non-repudiation.
Privacy Authentication Integrity Non-Repudiation
• This means that sender and receiver • The receiver is sure of • This means that the data must • This means that a receiver
expect confidentiality. The transmitted the sender’s identity arrive at the receiver exactly must be able to prove that
message should make sense to and that an imposter as it was sent. There must a received message came
only intended receiver and the has not sent the not be any changes during from a specific sender and
message should be unintelligible to message. the transmission – either the sender must not be able
unauthorized users. accidental or malicious. to deny sending it.
17
Information Technology
Secure Socket Layer - It provides a secure channel between two SSH File Transfer Protocol - A computing network protocol
machines operating over the Internet or an internal network. for accessing and managing files on remote file systems.
Network Security ProtocolS
HyperText Transfer Protocol Secure - A protocol for secure Secure Shell (SSH) - A program to log into another computer
communication over a computer network, with especially over a network, execute commands in a remote machine and move
wide deployment on the Internet. files from one machine to another.
E-commerce / M-commerce
Electronic Commerce (e-Commerce) is a sophisticated combination of technologies and consumer-based services integrated to form a new
paradigm in business transaction processing. It refers to the use of technology to enhance the processing of commercial transactions between
a company, its customers and its business partners.
Benefits of e-Commerce Application and Implementation are as follows:
• Reduction in costs to buyers and suppliers by electronically accessing on-line databases; errors, time, and overhead costs in information
processing; time to complete business transactions; inventories and reduction of risk of obsolete inventories; overhead and advertising
costs; use of ecologically damaging materials.
• Easier entry into new markets, especially geographically remote markets, for enterprises regardless of size and location.
• Optimization of resource selection as businesses form cooperative teams.
Risks involved in e-Commerce are Problem of anonymity, Repudiation of contract, Lack of authenticity of transactions, Data Loss or theft or
duplication, Attack from hackers, Denial of Service, Non-recognition of electronic transactions, Lack of audit trails and Problem of piracy.
Types of e-Commerce are as follows:
(a) Business-to-Business (B2B) e-Commerce (c) Consumer-to-Business (C2B) e-Commerce (e) Business-to-Government (B2G) e-Commerce
(b) Business-to-Consumer (B2C) e-Commerce (d) Consumer-to-Consumer (C2C) e-Commerce (f ) Business-to-Employee (B2E) e-Commerce
M-commerce (Mobile commerce) is the buying and selling of goods and services through wireless handheld devices such as cellular telephone
and personal digital assistants (PDAs), known as next-generation e-commerce; enables users to access the Internet without needing to find a
place to plug in. The industries affected by m-commerce include Financial services, Telecommunications, Service/retail, etc.
Software
System software/ Application Software Hardware
Physical components of computer
system that collects, quickly/correctly captured are not permissible to influence or completed in full or not at
stores, modifies and for its proper processing. transform the transaction process. all. TPS systems ensure that
retrieves the day-to- • Transaction processing: • Equivalence: Transactions are transactions take place in
day data transactions As Batch/Real-time processed in the similar format their entirety.
of an enterprise. processing. every time to ensure that full • Consistency: TPS systems
(TPS)
Examples are Airline • Database Maintenance: effectiveness is achieved. exist within a set of
Reservation Systems, Correct/up-to date. • High Volume Rapid Processing: operating rules.
Railway reservation • Document & Report instantaneous processing of • Isolation: Transactions
System etc. Generation: purchase transactions is noteworthy to the must appear to take place
orders, pay-checks, sales success of certain industry such as in seclusion.
receipts, invoices, and banking. • Durability: Once
customer statements. • Trustworthiness: designed to be transactions are completed,
robust and trustworthy. they cannot be undone.
Office Automation Systems (OAS) is an amalgamation of hardware, software, and other resources used to smooth the progress
of communications and augment efficiency. Its basic activities include – Exchange of information; management of administrative
documents; handling of numerical data; and meeting, planning and management of work schedules.
Applications Description
Word Processing Use of a computer to perform automatically many of the tasks necessary to prepare typed or printed documents.
Electronic mail Use of a computer network that allows users to send, store & retrieve messages using terminals & storage devices.
Voice Mail Requires computers with an ability to store audio messages digitally and convert them back upon retrieval.
Video Use of television equipment to link geographically dispersed conference participants.
Conferencing
Knowledge Management Systems (KMS) refer to any kind of IT system that stores and retrieves knowledge, improves
collaboration, locates knowledge sources, mines repositories for hidden knowledge, captures and uses knowledge, or in some other
way enhances the KM process. There are two broad types of knowledge—Explicit and Tacit.
Explicit Knowledge: It can be formalized easily and is Tacit Knowledge: It is unarticulated and represented as
easily available across the organization. It is articulated, and intuition, perspective, beliefs, and values that individuals form
represented as spoken words, written material and compiled based on their experiences. It is personal, experimental and
data. It is codified, easy to document, transfer and reproduce. context specific. It is difficult to document and communicate
For example – Online tutorials, Policy and procedural manuals. the tacit knowledge. For example – hand-on skills, special
know-how, employee experiences.
Management Information System (MIS) refers to the data, equipment and computer programs that are used to develop
information for managerial use.
Management: Comprises the process and activity that a manager does in the operation of their organization, i.e., to plan
organize, direct and control operations.
Information: Information simply means processd data or in the layman language, data which can be converted into meaningful
and useful form for a specfic user.
System: Defined as a group of interrelated components working together towards a common goal by accepting input and
producing output in an organize transformation process.
Some Examples of MIS - Airline reservations (seat, booking, payment, schedules, boarding list, special needs, etc.); Bank
operations (deposit, transfer, withdrawal) electronically with a distinguish payment gateways; and Integration of department
with the help of contemporary software’s like ERP.
19
Information Technology
Decision Support System (DSS) is a type of computerized information system that supports business and organizational decision
– making activities. Planning languages commonly used in DSS are General-purpose planning languages and Special-purpose
planning languages. DSS components are as follows:
The user: Usually a manager One or more databases: Model Base: It is the brain of DSS that performs data
with an unstructured or semi- Databases contain both routine manipulations & computations with the data provided
structured problem to solve and non-routine data from both to it by user & database. The planning language in DSS
at management - level of an internal and external sources. allows user to maintain a dialogue with model base.
organization.
Executive Information Systems (EIS) sometimes referred to as an Executive Support System (ESS) serves the strategic level i.e.
top-level managers of the organization.
Components Description
Hardware Includes Input data-entry devices, CPU, Data Storage files and Output Devices.
Software Includes Text base software, Database, and Graphic types such as time series charts, scatter diagrams,
maps, motion graphics, sequence charts, and comparison-oriented graphs (i.e., bar charts) Model base.
User Interface Includes hardware (physical) and software (logical) components by which people (users) interact with
a machine. Several types of interfaces can be available to the EIS structure, such as scheduled reports,
questions/answers, menu driven, command language, natural language, and input/output.
Telecommunication Involves transmitting data from one place to another in a reliable networked system.
specialised systems
Customer Relationship Management (CRM) may be defined as a business process in which client relationships; customer loyalty
and brand value are built through marketing strategies & activities. It allows businesses to develop long-term relationships with
established and new customers while helping modernize corporate performance, incorporates commercial and client-specific
strategies via employee training, marketing planning, relationship building , etc.
Benefits of CRM
♦ Generates customer loyalty, raising a market intelligence enterprise, and an integrated relationship.
♦ Preserves existing customers/provides enhanced services to accomplish loyalty.
♦ Smoothens the progress to capture, consolidate, analysis, and enterprise-wide dissemination of data from existing and potential
customers.
Supply Chain Management (SCM) may be defined as the process of planning, implementing and controlling the operations of the
supply chain with the purpose of satisfying the customer's requirement as efficiently as possible. Core Elements of SCM are as follows:
Human Resource Management System refers to the systems and processes at the intersection between Human Resource
Management (HRM) and Information Technology.
♦ Workforce Management provides powerful tools to effectively manage labor rules, ensure compliance, and control labor
costs and expenses.
♦ Time and Attendance module gathers standardized time and work related efforts, data collection methods, labor distribution
capabilities and data analysis.
♦ Payroll Management facilitates salary, deductions, calculations, eliminates errors, free up HR staff etc.
♦ Training Management tracks the trainer or training organization, costs associated with training schedule, training locations,
required supplies and equipment and registered attendees.
♦ Compensation Management requires integrating employee processes, information and programs with organizational
processes and strategies to achieve optimal organizational results.
♦ Recruitment Management includes processes for managing open positions/requisitions, applicant screening, assessments,
selection and hiring, correspondence, reporting and cost analysis.
♦ Personnel Management comprises of HR master-data, personnel administration, recruitment and salary administration.
♦ Organizational Management includes organizational structure, staffing schedules and job description.
♦ Employee Self Service (ESS) allows employees to query HR related data and perform some HR transactions over the system.
♦ Analytics enables organizations to extend the value of an HRMS implementation by extracting HR related data for use with
other business intelligence platforms.
Data Refers to the information pertinent to the organization's business practices that may include sales orders, customer
billing statements, sales analysis reports etc., which can then be used to prepare accounting statements and reports.
Software These are the computer programs that provide quality, reliability and security to the company's financial data that
may be stored, retrieved, processed and analyzed. Managers rely on the information it outputs to make decisions
for the company, and they need high-quality information to make sound decisions.
IT Infrastructure This include hardware such as personal computers, servers, printers, surge protectors, routers, storage media, and
possibly a backup power supply used to operate the system.
Internal Controls These are the security measures such as passwords or as complex as biometric identification to protect sensitive
data against unauthorized computer access and to limit access to authorized users. Internal controls also protect
against computer viruses, hackers and other internal and external threats to network security.
Expert System (ES) A computerized information system that allows non-experts to make decisions comparable
Definition to those of an expert.
Business Intelligence (BI) is the delivery of accurate, useful information to the appropriate decision makers within the necessary
time frame to support effective decision making for business processes.
Business Intelligence Tools are a type of software that is designed to retrieve, analyze and report data.
Simple Reporting This involves using the data warehouse that provides the perfect architecture to combine all the data
and Querying dispersed throughout the enterprise in different applications in a variety of formats, on a range of hardware,
which could be anywhere to be cleaned up, summarized, converted and integrated into one common format
and available centrally for further processing.
Business Analysis Business analysis refers to presenting visualizing data in a multidimensional manner. This allows the user
to plot data in row and column coordinates to further understand the intersecting points. ETL (Extract,
Transform, Load) tools bring in data from outside sources, transform it to meet business specified
operational needs, and then load the results into the company database
Dashboards Are flexible tools that can be bent into as many different shapes as per user requirements. It includes a
collection of graphs, reports, and KPIs that help monitor business activities as progress on a specific initiative.
Scorecards This involves providing a visual representation of the enterprise strategy by taking critical metrics and
mapping them to strategic goals throughout the enterprise. A scorecard has a graphical list of specific,
attainable strategic milestones, combined with metrics that serve as benchmarks.
Data Mining This involves using statistical, artificial intelligence, and related techniques to mine through large volumes of
or Statistical data and providing knowledge without users even having to ask specific questions. The objective is to provide
Analysis interesting and useful information to users by design even without their querying.
Business Reports are a type task which facilitates in scrutinizing a situation and pertain to business theories to fabricate a variety
of suggestions for development. Business reports are routinely assigned to facilitate us to:
• Accomplish conclusions about a trouble or issue.
• Demonstrate short and apparent communication skills.
• Endow with recommendations for upcoming accomplishing.
• Exhibit our analytical, reasoning, and evaluation skills in identifying and weighing-up potential solutions and outcomes.
• Pertain business and management theory to a practical situation.
• Scrutinize obtainable and potential solutions to a problem, situation, or question.
21
Information Technology
Importance of Access and Privilege Controls
In order to safeguard software systems, procedures are developed and implemented for protecting them from unauthorized
modification, disclosure or destruction to ensure that information remains accurate, confidential, and is available when required.
Access controls help us to restrict whom and what accesses our information resources, and they possess four general functions:
Identity Verification, Authentication, Authorization and Accountability.
Approaches to Access Control are as follows:
Role-based Access Control (RBAC) enforces static Rules-based Access Control (RAC) is largely context-based that
constraints based on a user’s role that largely eliminates considers the data affected, the identity attempting to perform a
discretion when providing access to objects. RBAC, for task, and other triggers governed by business rules.
example, enforces static constraints based on a user’s role.
Principle of Least Privilege
This is a fundamental principle of information security, which refers to give only those privileges to a user account, which are
essential to that user's work. For example, a backup user does not need to install software; hence, the backup user has rights only to
run backup and backup-related applications. Any other privileges, such as installing new software, should be blocked.
Reducing the Impact of Human Error processes as they are introduced that provide greater
♦ BPA removes human participation in the process, control over business and IT processes.
Why BPA shoule be implemented?
which is the source of many errors. Improving Collaboration and Information Sharing
Transforming Data into Information ♦ Business processes designed through a collaborative
♦ BPA can, apart from collecting and storing data also interface mean IT can integrate its processes with the
analyze data and make it available in a form that is business-side logic that drives day-to-day operations.
useful for decision-making. Cost Saving
Improving performance and process effectiveness ♦ Automation leads to saving in time and labor costs
♦ In many cases, tasks that must be done manually through higher efficiency and better management of
are the bottleneck in the process. Automating those the people involved.
manual tasks speeds up the effective throughput of the To remain competitive
application. ♦ To provide the level of products and services as
Making users more efficient and effective offered by competition.
♦ People can focus their energies on the tasks they do Fast service to customers
best, allowing the computers to handle those that ♦ Automation shortens cycle times in the execution
machines are best suited for. of processes through improved and refined business
Making the business more responsive workflows and help enterprises to serve their
♦ Enterprises can easily automate new applications and customers faster and better.
Information may be defined as processed data, which is of value to the user. Information is necessary for decision making and survival
of an entity as success of business depends upon making right decisions at the right time based on the right information available. The
effort to create information from raw data is known as Information Processing.
Classification of information based on level of human/computer intervention is as follows:
Manual Information These are the systems where the level of manual intervention is very high. Components of manual
Processing Cycle information processing cycle include:
♦ Input: Put details in register.
♦ Process: Summarize the information.
♦ Output: Present information to management in the form of reports.
Computerized Information These are systems where computers are used at every stage of transaction processing. The components of a
Processing Cycle computerized information processing cycle include:
♦ Input: Entering data into the computer;
♦ Processing: Performing operations on the data;
♦ Storage: Saving data, programs, or output for future use; and
♦ Output: Presenting the results.
Control is defined as policies, procedures, practices and organization structure that are designed to provide reasonable
assurance that business objectives are achieved and undesired events are prevented or detected and corrected. Major
control objectives are as follows:
Authorization
Ensures that all transactions are approved by responsible personnel in accordance with their specific or general authority before
the transaction is recorded.
Completeness
Ensures that no valid transactions have been omitted from the accounting records.
Accuracy
Ensures that all valid transactions are accurate, consistent with the originating transaction data, and information is recorded in
a timely manner.
Validity
Ensures that all recorded transactions fairly represent the economic events that actually occurred, are lawful in nature, and have
been executed in accordance with management's general authorization.
Physical Safeguards and Security
Ensures that access to physical assets and information systems are controlled and properly restricted to authorized personnel.
Error Handling
Ensures that errors detected at any stage of processing receive prompt corrective action and are reported to the appropriate level
of management.
Segregation of Duties
Ensures that duties are assigned to individuals in a manner that ensures that no one individual can control both the recording
function and the procedures relative to processing a transaction.
23
Information Technology
Information Systems’ (IS) Controls
Auditors need guidelines that will direct them toward those aspects of the information systems function in which material losses
or account misstatements are most likely to occur. Controls reduce expected losses from unlawful events by either decreasing the
probability of the event occurring in the first place or limiting the losses that arise of the event occurs.
A. Managerial Controls: These controls provide a stable infrastructure in which information systems can be built, operated, and maintained
on a day-to-day basis. These are as follows:
Management Subsystem Description of Subsystem
Top Mgt. Responsible primarily for long – run policy decisions on how IS will be used in the organization.
Information Systems Mgt. Provides advice to top mgt. in relation to long-run policy decision making & translates long-run policies
into short-run goals & objectives.
Systems Development Mgt. Responsible for the design, implementation, and maintenance of application systems.
Programming Management Responsible for programming new system; maintain old ones and providing general systems support s/w.
Data Administration Responsible for addressing planning and control issues in relation to use of an organization’s data.
Quality Assurance Responsible for ensuring IS development; implementation, operation, and maintenance conform to
Management established quality standards.
Security Administration Responsible for access controls and physical security over the information systems function.
Operations Management Responsible for planning and control of the day-to-day operations of information systems.
B. Application Controls: It will examine the application functions that need to be in place to accomplish reliable information processing.
Application Subsystem Description of Subsystem
Boundary Comprises components that establish interface between user and system.
Input Comprises components that capture, prepare, and enter commands and data into system.
Communication Comprises components that transmit data among subsystems and systems.
Processing Comprises the components that perform decision making, computation, classification, ordering, and
summarization of data in the system.
Output Comprises components that retrieve and present data to users of the system.
Database Comprises the components that define, add, access, modify, and delete data in the system.
2. Systems Development ♦ Concurrent Audit: Auditors are members of the system development team. They assist
Management Controls: These have the team in improving the quality of systems development for the specific system they are
the responsibility for the functions building and implementing.
concerned with analyzing, designing, ♦ Post-implementation Audit: Auditors seek to help an organization learn from its
building, implementing, and experiences in the development of a specific application system.
maintaining information systems. ♦ General Audit :Auditors evaluate systems development controls overall.
♦ Planning: Techniques like Work Breakdown Structures (WBS), Gantt Charts and PERT (Program
Evaluation and Review Technique) Charts can be used to monitor progress against plan.
3. Programming Management ♦ Design: A systematic approach to program design, such as any of the structured design approaches
Controls: Program development or object-oriented design is adopted.
and implementation is a major ♦ Coding: Programmers must choose a module implementation and integration strategy, a coding
phase within the systems strategy,and a documentation strategy .
development life cycle containing ♦ Testing: Three types of testing are to ensure that a developed or acquired program achieves its
following six phases: specified requirements.
♦ Operation and Maintenance: Management establishes formal mechanisms to monitor the status
of operational programs so maintenance needs can be identified on a timely basis.
4. Data Resource Management
Controls: Data is a critical ♦ For data to be managed better users must be able to share data, data must be available to users
resource that must be managed when it is needed, in the location where it is needed, and in the form in which it is needed.
properly and therefore, ♦ It must be controlled carefully, however, because consequences are serious if data definition is
accordingly, centralized planning compromised or destroyed.
and control are implemented.
5. Quality Assurance ♦ Organizations are increasingly producing safety-critical systems and users are becoming more
Management Controls demanding in terms of the quality of the software they employ to undertake their work.
Information security administrators are responsible for ensuring that information systems assets are secure.
The major threats to the security of information systems and their controls are as given below:
♦ Fire: Well-designed, reliable fire-protection systems must be implemented.
♦ Water: Facilities must be designed and sited to mitigate losses from water damage.
♦ Energy Variations: Voltage regulators, circuit breakers, and uninterruptible power supplies can be used.
♦ Structural Damage: Facilities must be designed to withstand structural damage.
6. Security Management Controls ♦ Pollution: Regular cleaning of facilities and equipment should occur.
♦ Unauthorized Intrusion: Physical access controls can be used.
♦ Viruses and Worms: Controls to prevent use of virus-infected programs and to close security loopholes
that allow worms to propagate.
♦ Misuse of software, data and services: Code of conduct to govern the actions of IS employees.
♦ Hackers: Strong, logical access controls to mitigate losses from the activities of hackers.
♦ These must continuously monitor the performance of hardware/software platform to ensure
7. Operations Management that systems are executing efficiently, an acceptable response time or turnaround time is being
Controls achieved, and an acceptable level of uptime is occurring.
Input Controls
♦ Source Document Control: These facilitate data entry into a computer system & reference checking.
♦ Data Coding Controls: These are put in place to reduce user error during data feeding.
♦ Batch Controls: These are put in place at locations where batch processing is being used.
♦ Validation Controls: These are intended to detect errors in transaction data before the data are processed.
Communication Controls
♦ Physical Component Controls: One way to reduce expected losses in the communication subsystem is to choose physical component
that have characteristics that make them reliable and that incorporate features or provide controls that mitigate the possible effects of
exposures.
♦ Line Error Controls: Whenever data is transmitted over a communication line, it can be received in error because of attenuation,
distortion, or noise that occurs on the line.
♦ Flow Controls: These are needed because two nodes in a network can differ in terms of the rate at which they can send receive and process
data.
♦ Link Controls: This involves two common protocols – HDLC (Higher Level Data Control) and SDLC (Synchronous Data Link Control)
♦ Topological Controls: Specifies the location of nodes within a network, the ways in which these nodes will be linked, and the data
transmission capabilities of the links between the nodes.
♦ Channel Access Controls: Two different nodes in a network can compete to use a communication channel. Whenever the possibility of
contention for the channel exists, some type of channel access control technique must be used.
♦ Internetworking Controls: Internetworking is the process of connecting two or more communication networks together to allow the
users of one network to communicate with the users of other networks.
Processing Controls
♦ Run-to-Run Totals: These help in verifying data that is subject to process through different stages.
♦ Reasonableness Verification: Two or more fields can be compared/cross verified to ensure their correctness.
♦ Edit Checks: Edit checks similar to the data validation controls can also be used at the processing stage to verify accuracy and
completeness of data.
♦ Field Initialization: Data overflow can occur, if records are constantly added to a table or if fields are added to a record without
initializing it, i.e., setting all values to zero before inserting the field or record.
♦ Exception Reports: Exception reports are generated to identify errors in data processed.
♦ Existence/Recovery Controls: The check-point/restart logs, facility is a short-term backup and recovery control that enables a system
to be recovered if failure is temporary and localized.
Output Controls
♦ Storage and Logging of Sensitive and Critical Forms: Pre-printed stationery should be stored securely to prevent unauthorized
destruction or removal and usage.
♦ Logging of Output Program Executions: When programs used for output of data are executed, they should be logged and monitored.
♦ Controls over Printing: This ensures that unauthorized disclosure of information printed is prevented.
♦ Report Distribution and Collection Controls: Distribution of reports should be in a secure way to avoid unauthorized disclosure of
data.
♦ Retention Controls: These consider duration for which outputs should be retained before being destroyed.
♦ Existence/Recovery Controls: These are needed to recover output in the event that it is lost or destroyed.
Database Controls
♦ Sequence Check Transaction and Master Files: Synchronization and correct sequence of processing between the master file and transaction
file is critical to maintain integrity of updation, insertion or deletion of records in the master file with respect to the transaction records.
♦ Ensure all records on files are processed: While processing transaction file records mapped to respective master file end-of-file of transaction
file with respect to the end-of-file of the master file is to be ensured.
♦ Process multiple transactions for a single record in the correct order: Multiple transactions can occur based on a single master record.
25