M/A - Data Integrity of Information System Flashcards
What is the difference between data and information
Data - consists of facts about something that can be used in calculating, reasoning, or planning
Information - Is knowledge obtained from investigation, study, or instruction of data
Turning data into information is a process, a logically related task
Explain what data integrity and unintentional error
data integrity - refers to the accuracy and completeness of data from the time is put into a system
Unintentionally error - incorrect treatment of the data due to human error or software malfunction
Provide the three types of data structure
- Data structure - refers to how data is organized
- Unstructured data - is text other examples are audio, video & images. Good for fraud detection
- Structure data - The analysis has been organized in a formatted repository
Explain what the data life cycle is and what the 6 types
Data life cycle - describe the differences in the life of a piece of data, including the origin and what has been done to it
6 types
1. Start - Data is created
2. Recognize - It is recognized that data might have value in making a decision
3. Transform - The data form or consent is changed, restructure
4. Use - Data is used for analytical purposes. Decision making
5. Store - Data is stored and can be further processed at any time
6. End - Data is no longer needed and therefore destroyed
Audit trail - a digital record of business transactions in a system, printed and achieved online
What is the difference between Manual and automated system
- Manual system - is a system free of automation
Pros - generally easier to understand
Cons - Lack of automation requires more time to perform - Automated system - A system in which information activities
Pro: Once implemented reduced the amount of time
Cons: Require startup cost which may not be viable option, depending on the size
Active user - someone who uses the system
Passive user - Receive report & data from the system only
Explain the difference between insourcing and outsourcing
What important:
1. Scalability - How easily the system can increase or decrease in size
2. Flexibility - The ability of a system to adapt to change
- Infrastructure is needed for on an as-used basis for infrastructure components
Outsourcing - organization will have access to te latest technology, however, it can be quite costly
Provide 4 types of systems that can be used for information system
- Customer Relationship Management - A management accountant may be able to assist in determining the types of cloud used by the organization
- Public cloud includes infrastructure owned by the cloud service provider for use by its customer - Accounting information system - responsible for recording and processing financial transactions & reporting effect
- Transaction processing system - information system collects, stores, and retrieves transactions of an organization
- Enterprising resource planning - Business management software that integrates various departments and functions of an organization into a single IT system
Explain what a database management system is and the four types of information modeling
Database management system - Is software that helps manage the data, store, modify and retrieve (Ex. Oracle, MySQL, Microsoft Access)
- Ability to authorize only certain users of access
- Data security
- Data recovery support
4 types of analysis for information modeling
1. Descriptive analytics - Examines pattern within historical data to try to find the reason for a particular outcome
- Predictive analytics - Uses statistical techniques to determine the probability of future outcome or event
- Data scientists should work with management accountants to create the right statistical algorithm - Diagnostics analytics - Attempt to understand what is causing the issue by analyzing the correlation or patterns of interest
-“Why did it happen” - Prescriptive analytics - Combines, descriptive, and diagnostic analytics to provide recommendations and identify the implication
- Use to order less strawberry yogurt, order less strawberry yogurt, order additional flavour that sell out
Explain what business intelligence is an example used for business intelligence
Business intelligence - includes artificial intelligence and machine learning which are closely linked
Ex. of BI :
Artifical intelligence - Simulation of human intelligence by machine, such as decision-making & visual
Machine learning - A branch of AI in which systems can learn to initiate human cognitive system
Robotics process automation - a BI tool that can be implemented, especially for the manufacturing organization
How are effective control system used for information system
- Control system will ensure data integrity by encompassing policies, standard and procedures aimed at preventing and detecting violation of data
- IT security, a combination of technological approaches and human approaches is needed to ensure that unauthorized individuals do not access private data
Management accountants can support the organization in establishing an effective control system
Ex. - Identifying areas where controls are missing, poorly designed, or not implemented successfully to ensure the integrity of data and information
- Designing effective internal control, especially in areas related to cost and customer information
Explain what data visualization is:
- Way to present complex data, efficiently (clearly) and effectively, to the right decision maker in the right format
-Having access to a lot of data is useless it can be understood by the organization - Examining data management accountant realizes the company tracks only it raw material in the system that the profitability information was drawn from
What are the control environment and different types of general control
Control environment - The action taken by management that sets the tone for how employees act in their role in the organization
Common types of general control
1. Physical security - are employed to protect information system asset from theft, damage and unauthorized use
2. Logical access - Computer application to limit access to authorize user. These control are an important tool used by organization to ensure data is secure from unauthorized access
3. Distributed computing - Ability to carry on information system activities while outside the physical boundaries of the organization. Difficult to ensure overall integrity
Application control
- Provide data integrity, security, confidentiality
- Allows access to specific tasks based on the profile of the user
Validity check - controls built into software that require certain parameters to be met before the data will be processed.