Question

In: Accounting

Write a brief summary of the AIS used at your place of employment. If you are...

Write a brief summary of the AIS used at your place of employment. If you are not currently employed, you may use a previous employer or interview an acquaintance about the AIS used at his or her workplace. If you have not been employed, interview a friend or family member. Assume you are an accounting manager at this organization and, reflecting on the concepts covered in this course, describe the changes that you would make to the internal control structure. If you would not make any changes, explain why. Consider the personal attitudes, values, and culture of your employees and organization.

Solutions

Expert Solution

Answer:

I presently work in a bank and the association utilizes a accounting data system(AIS) to gather, store and deal with its money related information(financial). The bank that I work in employments AIS to likewise process its information and afterward create important reports which are utilized for examination and basic leadership by accountants, managers, leaders and other stakeholders of the organisation.

My employer's AIS comprise of the accompanying segments – individuals, systems, information, programming, data innovation system and interior controls. There are system clients in the bank and that are accountants and managers. The bank has diverse offices like treasury, retail resources division, corporate loaning division and so forth. AIS of the bank help the distinctive division of the bank to cooperate genuinely. Methodology are the techniques that the bank and its framework that is being utilized to gather, store, recover and in conclusion process information. The majority of the strategies for handling information are computerized. Information incorporates information in regards to income, finance, costs, charges, and so forth. Essentially it incorporates all budgetary data that is relevant to the bank's the same old thing. The product that the bank utilizes is Microsoft's dynamic GP. The bank's data innovation foundation comprises of programming and equipment. The principle components are PCs, servers, printers, switches, and capacity media. The bank has set up required inward controls set up to defend and ensure delicate information.

The progressions that I might want to make in the interior control structure are to make the structure more innovation progressed. At present touchy information is secured utilizing passwords. This can be improved by making utilization of advances mechanical devices like bio-metric recognizable proof that will prompt a larger amount of assurance of the delicate information.

The way of life of the organization and the attitudes of the employees support safety of data. Numerous touchy data like subtleties of the clients and customers must be ensured and the bank's way of life and representative's frame of mind completely bolsters all instruments and controls that upgrades the information security.


Related Solutions

You are a supervisor at your current place of employment OR a place of employment that...
You are a supervisor at your current place of employment OR a place of employment that you would like to work for in the future. You have noticed that one of your subordinates is in violation of the dress code that is in place for the company/agency/organization. This particular employee has worn attire that is far too casual for the workplace and on some occasions might have been considered in bad taste. Write an email to this employee (make up...
Write an IPS for someone anonymous (made up) with the brief summary of a person you...
Write an IPS for someone anonymous (made up) with the brief summary of a person you made up. A portfolio manager who reads the IPS should be able to make informed decisions only based on the IPS and without having met the person Example solution below: --------------------------------------------------------------------------------------------- At this point we know (or can reasonably infer) that Mr. Franklin is: •unmarried (a recent widower) •childless •70 years of age •in good health •possessed of a large amount of (relatively) liquid...
Choose one of the following two topics and write up a brief summary. You can assume...
Choose one of the following two topics and write up a brief summary. You can assume solar metal content for the star. (5 points): Describe the evolution of a one solar mass star after the core He-burning phase of evolution. Include the nature of the remnant and what supports it against collapse. Describe the evolution of a ten solar mass star after the core He-burning phase of evolution. Include the nature of the remnant and what supports it against collapse.
Go on the link listed and write a brief summary about what you learned about McKinsey...
Go on the link listed and write a brief summary about what you learned about McKinsey and Company. http://www.mckinsey.com/about_us
Write an abstract/brief summary of the Economic and Social Cost of the Opioid Crisis in the...
Write an abstract/brief summary of the Economic and Social Cost of the Opioid Crisis in the US. Provide some data/research about this problem. Please write as much as you can and don't copy everything from the internet.
Write a brief summary of the judicial branch role in health policy (supplier)
Write a brief summary of the judicial branch role in health policy (supplier)
brief summary of NPPV
brief summary of NPPV
If you are the marketing manager at an Academy, Write a brief description of your Advertising...
If you are the marketing manager at an Academy, Write a brief description of your Advertising objective, what type of budge will you use, what is the advertising strategy, and message strategy
Write a brief summary describing any encryption method not already mentioned in this chapter. In this...
Write a brief summary describing any encryption method not already mentioned in this chapter. In this summary, describe the history and origin of the algorithm. Compare the efficacy of this algorithm to other well-known algorithms. Blowfish, AES, RC4, Serpent,3DES, RSA, PGP, Hashing, SHA, MD5 , Diffie–Hellman These are the method are already mentioned in this chapter.
Write a brief summary describing any encryption method not already mentioned in this chapter. In this...
Write a brief summary describing any encryption method not already mentioned in this chapter. In this summary, describe the history and origin of the algorithm. Compare the efficacy of this algorithm to other well-known algorithms. Blowfish, AES, RC4, Serpent,3DES, RSA, PGP, Hashing, SHA, MD5 These are the method are already mentioned in this chapter.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT