Hello, dear friend, you can consult us at any time if you have any questions, add WeChat: daixieit

ACCTG 222 Accounting Information Systems

SEMESTER ONE, 2022

LS Ltd is a small retail shop that sells children’s toys . The owners recently hired a  graduate and asked him to prepare a flowchart depicting the company's sales and collection process . Here is his first attempt:

 

1    Identify at least five weaknesses in the design of the graduate's system flowchart for LS Ltd that do not follow the conventions .

2   Write a memo on how  LS  Ltd can improve its revenue and cash collection process . Identify the steps involved and who should be performing the task. Include at least five internal controls and explain how each of these controls help reduce risks .

For simplicity, assume that:

·  The company cannot hire more people.

·   It does not give credit to customers .

·  The customers pay for the items and take them home immediately (no shipment).

All  purchase  requests   by  the  University   Library  goes  through  its   requisitions department. Staff and students can suggest titles of books , periodicals , and other items  via e-mail to the  requisition  librarian. The  requisitions  librarian tracks  these requests in a database. Once at least ten requests for the same item have come in, the requisitions librarian orders it from a vendor using a standard purchase order. The requisitions librarian e-mails the people who requested for that item to inform them of the order and files a copy of the purchase order by title.

When the item is received, the receiving clerk matches it against the purchase order. If it matches , the item moves out of the receiving department into the library, where it is filed. A copy of the receiving report goes to the requisition librarian and the financial services department.

The financial services  clerks  match  the  invoice  against  the  receiving  report  and purchase order. They also reconcile any differences between them with the vendor. Invoices are paid monthly on the 20th. The financial services clerk creates a payment packet of all relevant documents , stamps “ Paid” on the top, and files it alphabetically by vendor name and date within the vendor file.

3   Create a Data Flow Diagram at the Context Level for this process .

4    Identify two internal control risks in the library’s purchase and expenditure process . Explain why   these are risks in this context and suggest one internal control for each of the two identified risks .

Computer Crime is increasing worldwide and is being committed in different forms .    Here are a couple of recent events . Use Carter's taxonomy to analyse these events . State the element(s ) of the taxonomy that applies to each event with an explanation   for your selection. Discuss how companies can protect themselves from such events in the future.

5   A teenager committed a denial-of-service attack on a telecommunication network’s system .

6   An employee used their previous access  into the company's system to lock out other users  by changing their passwords .

7   Criminals broke into a retail shop and stole all the store's computers and then hacked into their customer database.

8   A  common form  of  payroll fraud is  payments to non-existent employees or to employees that were previously terminated and should no longer be on payroll. Explain how this type of fraud is committed and describe control techniques that can be used to detect or prevent this risk.

9    Identify and clearly describe other key internal controls that should be included to reduce other potential risks in payroll processing.