Chapter 6: Introduction to Financial Information Flashcards
What is information?
Data consists of numbers, letters, symbols, raw facts, events and transactions which have been recorded but not yet processed into a form which is suitable for use by management.
Information is data which has been processed in such a way that it is meaningful to the person who receives it.
Data + Meaning = Information
What purposes does information serve?
- Planning (for the future: eg., buyers sourcing material or production managers planning for future production)
- Controlling: eg., manager director with the actual market share versus budget
- Recording Transactions: Accountant (ledger accounting) or Sales ledger clerk (customer balances)
- Performance Measurement: Board of directors, shareholders
- Decision making: which supplier to use, should we invest? Customer - do we want to commit to business for foreseeable future
How do you remember the qualities of good information?
ACCURATE
Accurate
– typos, roundings, categorised, assumptions.
Complete
– all information provided for purpose (e.g. to make decision).
Cost-effective
– benefit > cost of producing information.
User-targeted
– understandable and useful to recipient.
Relevant
– relevant for purpose intended.
Authoritative
– genuine, highest quality for purpose.
Timely
– produced in advance of when needed.
Easy to use
– clear, concise, constructive, communicated appropriately.
What are some internal sources of data?
Internal data sources Accounting records HR/payroll records Machine logs/computer systems Timesheets Communication to/from staff.
What are some external sources of data?
Formally gathered: – Marketing research (e.g. new trends, customer tastes competitor products, etc.) Research and development Tax and accounting specialists (new legislation/standards) Legal specialist (e.g. changes in Health and Safety at work).
Informally gathered:
– Any information gathered on an ongoing basis
(newspapers, internet, meetings with external business colleagues,
etc.).
How do you remember the effective processing of information?
CATIVA
Completeness
– all relevant data is processed.
Accurate
– all processing ensures data remains true to source and error free.
Timeliness
– processing matches data availability and needs.
Inalterability
– data cannot be tampered with by unauthorised persons.
Verifiability
– clear ‘audit trail’ from data source to information.
Assessability
– information produced can be challenged, ensuring quality of system.
What are TPS? What are some examples?
Transaction processing systems (TPS) are systems which perform and record routine transactions.
Finance/accounting systems
sales and purchase ledgers, budgets, nominal ledger, management accounts.
HR systems
payroll, personnel files, training records.
Manufacturing/production systems
purchasing, orders, production schedules, stock control, quality records.
Sales/marketing systems
marketing research, pricing records, sales management records.
What is an MIS?
Management information systems (MIS) are systems to produce information allowing managers to make effective decisions
What are some examples of MIS? (5)
Executive information systems (EIS) or Executive support system (ESS)
A database that pools data from internal and external sources providing easy to use information to senior managers to help make strategic decisions.
Decision support systems (DSS)
Combines data and analytical models or data analysis tools to support decision making.
Expert system (ES) Expert systems allow users to benefit from expert knowledge and information. The systems will consist of a database holding specialised data and rules about what to do in, or how to interpret, a given set of circumstances.
Knowledge work systems (KWS)
Facilitate the creation and integration of new knowledge into an organisation.
Office automation systems (OAS)
Systems that increase the productivity of data and information workers.
How do you assess data security issues?
ACIANA
Availability
– information can be readily accessed at all times.
Confidentiality
– information only accessed by those with a right to access.
Integrity
– data remains unadulterated.
Authenticity
– data/information comes from bona fide sources.
Non-repudiation
– users trust the information produced and the system producing it.
Authorisation
– system changes only made by staff who are accountable for those changes.
What are some controls to mitigate cyber security? (5)
Physical access controls
e.g. door locks, alarm systems, PIN numbers
Security and integrity controls
Examples:
Input controls
Control totals (e.g. batch of invoices)
Range checks (e.g. number of hours on timesheet <168 hours)
Authorisation of source documents/data (e.g. timesheets)
Password controls over input of data (e.g. restricted access to payroll)
Output controls:
Control totals (e.g. batch of invoices versus batch total)
Follow up of error/exception reports (e.g. large overtime payments)
Back-up and archiving
e.g. disaster recovery plans, regular back-up of data.
Personnel controls
e.g. careful recruitment, selection and training of staff operating IS.
Segregation of duties controls Different people responsible for: – Generation of data. – Processing of data. – Recording data. – Physical asset custody (e.g. inventory, cash, etc.).
What are the key features of ‘Big Data’?
The key features of Big Data are described as the 4Vs:
Volume: Considers the amount of data fed into the organisation
Variety: Considers the various form of data received
Velocity: Considers the speed that data is fed into the organisation
Veracity: Considers the reliability of the data received
What is the importance of ‘Big Data’?
Potential to achieve competitive advantage
Huge array of new data sources:
– Social media
– Internet of things
Exponential growth in computing power and storage capacity
New avenues of knowledge creation such as crowd sourcing and open source
software.
What are the risks of ‘Big Data’?
SODS
The abundance of data produced and the potential to capture and harness this data offers significant opportunities to businesses.
It must also be acknowledged this new world of data presents significant challenges
and risks.
These include:
Storage – systems must be reviewed and upgraded to cope with the data and processing required.
Skills – data scientists and analysts are in short supply making it difficult for organisations to recruit and retain the right staff.
Data dependency – data led decisions leads to significant risk should the data be weak, erroneous or corrupted.
Overload – too much information and analysis can make businesses lose sight of the key data and also slow down decision making and responsiveness.
How do managers use data analytics?
Data analytics:
Value is extracted from big data by data scientists through the process of data analytics.
This can be used by a business to create value in the following ways:
- Decision making
Real-time analysed information allows managers to make better decisions. - Customer analysis
Market segmentation and customisation can occur from having a greater insight
into customer needs. - Innovation
Analysed big data can reveal completely new ideas and lead to innovation. - Risk management
Big data can assist with the identification, quantification and management of risks