An Introduction to Accounting Information Systems | |
Accounting Information Systems and the Accountant | |
Introduction | |
What are Accounting Information Systems? | |
What's New in Accounting Information Systems? | |
Accounting and IT | |
Careers in Accounting Information Systems | |
Information Technology and AISs | |
Introduction | |
The Importance of Information Technology to Accountants | |
Input, Processing, and Output Devices | |
Secondary Storage Devices | |
Data Communications and Networks | |
Computer Software | |
Documenting Accounting Information Systems | |
Introduction | |
Why Documentation is Important | |
Document and System Flowcharts | |
Process Maps and Data Flow Diagrams | |
Other Documentation Tools | |
End-User Computing and Documentation | |
Databases | |
Data Modeling | |
Introduction | |
An Overview of Databases | |
Steps in Creating a Database Using REA | |
Creating Database Tables and Records | |
Organizing and Manipulating the Data in Databases | |
Introduction | |
Normalization | |
Validating the Data in Databases | |
Extracting Data From Databases: Data Manipulation Languages (DMLs) | |
Object-Oriented Databases, Multimedia Databases, and Data Warehouses | |
Database Forms and Reports | |
Introduction | |
Forms | |
Reports | |
Using Accounting Information | |
Accounting Information Systems and Business Processes: Part I | |
Introduction | |
Business Process Fundamentals | |
Collecting and Reporting Accounting Information | |
The Sales Process | |
The Purchasing Process | |
Current Trends in Business Processes | |
Accounting Information Systems and Business Processes: Part II | |
Introduction | |
The Resource Management Process | |
The Production Process | |
The Financing Process | |
Business Processes in Special Industries | |
Business Process Reengineering | |
Accounting and Enterprise Software | |
Introduction | |
Integrated Accounting Software Programs | |
Enterprise-Wide Information Systems | |
Selecting a Software Package | |
Controls, Security, Privacy, and Ethics For Accounting Information Systems | |
Computer Crime, Ethics, and Privacy | |
Introduction | |
Computer Crime, Abuse, and Fraud | |
Three Examples of Computer Crime | |
Mitigating Computer Crime and Fraud | |
Ethical Issues, Privacy, and Identity Theft | |
Introduction to Internal Control Systems | |
Introduction | |
Internal Control Systems | |
Types of Controls | |
Control Activities | |
Evaluating Controls | |
Computer Controls for Organizations and Accounting Information Systems | |
Introduction | |
General Controls for Organizations | |
General Controls for Information Technology | |
Application Controls for Transaction Processing | |
Special Topics in Accounting Information Systems | |
Developing and Implementing Effective Accounting Information Systems | |
Introduction | |
Systems Development Life Cycle | |
Systems Planning | |
Systems Analysis | |
Systems Design | |
Implementation, Follow-Up, and Maintenance | |
Information Technology Auditing | |
Introduction | |
The Audit Function | |
The Information Technology Auditor's Toolkit | |
Auditing Computerized Accounting Information Systems | |
Information Technology Auditing Today | |
Accounting on the Internet | |
Introduction | |
The Internet and World Wide Web | |
XBRL: Financial Reporting on the Internet | |
Electronic Commerce | |
Privacy and Security on the Internet | |
Privacy Statement | |
Disclosure of Business Practices, Shipping, and Billing | |
Glossary | |
Index | |
Table of Contents provided by Publisher. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.