INFT6500 - Accounting Information System Report: Strategy and Testing
VerifiedAdded on 2022/09/07
|6
|1521
|28
Report
AI Summary
This report details an accounting information system's implementation and testing strategy, focusing on enhancing business operations through improved data management. The strategy involves adopting a new information system capable of generating customer invoices, managing stock requirements, and tracking customer requests. The report identifies potential risks, such as data inconsistencies, and proposes testing methods, including creating a model system and utilizing test data subsets. System controls are crucial, including distributed data centers, continuous database backups, and user authentication, incorporating multi-factor authentication. The report emphasizes the importance of disaster recovery plans, data encryption, and regular system backups to minimize data loss and ensure business continuity. It also addresses the need to protect data on laptops and recommends placing data centers in low-risk areas, while also highlighting the use of cloud networks and third-party data security services.

Running head: ACCOUNTING INFORMATION SYSTEM
ACCOUNTING INFORMATION SYSTEM
Name of the Student:
Name of the University:
Author Note
ACCOUNTING INFORMATION SYSTEM
Name of the Student:
Name of the University:
Author Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

PAGE \*
MERGEFO
ACCOUNTING INFORMATION SYSTEM
Table of Contents
Part 2b 2
Implementation and testing strategy 2
System Controls 3
Bibliography 4
MERGEFO
ACCOUNTING INFORMATION SYSTEM
Table of Contents
Part 2b 2
Implementation and testing strategy 2
System Controls 3
Bibliography 4

PAGE \*
MERGEFO
ACCOUNTING INFORMATION SYSTEM
Part 2b
Implementation and testing strategy
The strategy that will be adopted by the company is that the company will adopt a new
information system that will have the capabilities to generate the customer invoices with the use of the
data provided to it, it will be able to calculate the requirement of the stocks and it will be able to track
the requests of the customers (Stonebraker, 2018). The risks that can be faced are that if there are any
inconsistencies in the data then the system will give wrong results for the requirements of the data. To
test this strategy the inputs that are stored and retrieved from the database have to be consistent
through all the different tables in the database. The consistency of the tables in the database has to be
checked. Also, a small subsystem has to be created or a model of the entire system has to be created
before the implementation of the system. This system will be useful to test the performance and
consistency of the system (Dennis, Wixom & Roth, 2018). The test data that will be taken for the
testing purpose will be a subset of the data related to a sample of the previous stocks and then analyze
the output to test the performance (Dennis, Wixom & Roth, 2018). This company can utilize this
database into its system for improving their business profit and market position. This database can be
implemented into the business by utilizing the previous records into the business. This database can
calculate the accuracy of their record keeping which can be started by installing the previous data into
the system so that it can show whether the design can actually and accurately calculate the time period
or not. The stock system needs a proper calculation of when the stock would exhaust, when to order,
how much to order and etc. This could be only possible if the proper installation of the database is
done into the business (Grigoriev, 2015). Each and every department should be connected with this
database for a proper record. The call management system that will be implemented must be tested
first. To test the call management system a random number of selected locations will be chosen to add
MERGEFO
ACCOUNTING INFORMATION SYSTEM
Part 2b
Implementation and testing strategy
The strategy that will be adopted by the company is that the company will adopt a new
information system that will have the capabilities to generate the customer invoices with the use of the
data provided to it, it will be able to calculate the requirement of the stocks and it will be able to track
the requests of the customers (Stonebraker, 2018). The risks that can be faced are that if there are any
inconsistencies in the data then the system will give wrong results for the requirements of the data. To
test this strategy the inputs that are stored and retrieved from the database have to be consistent
through all the different tables in the database. The consistency of the tables in the database has to be
checked. Also, a small subsystem has to be created or a model of the entire system has to be created
before the implementation of the system. This system will be useful to test the performance and
consistency of the system (Dennis, Wixom & Roth, 2018). The test data that will be taken for the
testing purpose will be a subset of the data related to a sample of the previous stocks and then analyze
the output to test the performance (Dennis, Wixom & Roth, 2018). This company can utilize this
database into its system for improving their business profit and market position. This database can be
implemented into the business by utilizing the previous records into the business. This database can
calculate the accuracy of their record keeping which can be started by installing the previous data into
the system so that it can show whether the design can actually and accurately calculate the time period
or not. The stock system needs a proper calculation of when the stock would exhaust, when to order,
how much to order and etc. This could be only possible if the proper installation of the database is
done into the business (Grigoriev, 2015). Each and every department should be connected with this
database for a proper record. The call management system that will be implemented must be tested
first. To test the call management system a random number of selected locations will be chosen to add
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

PAGE \*
MERGEFO
ACCOUNTING INFORMATION SYSTEM
the data to the database and a small group of staff will be specially appointed for testing the call
management system. This group of staff will be required to perform the operations on the data
received. This will help in finding the faults in the whole system (Hong, Lu & Hong, 2013). The other
systems have to be tested in the same way that is by creating a small test set. This small test sets for
each system will be able to identify the flaws in the system. For the payroll management system, the
system must be implemented partially for a small group of employees for one or two days. In this time
period, the flaws in the system can be identified. For the warehouse management system, the staff who
work at the warehouses of the company will be required to store information in the system. This
process will be carried out at one of the warehouses. This will help to detect whether the warehouse
management system is useful to manage the data of the stocks.
System Controls
The system control techniques that are to be implemented are that the data centers of the
company have to be distributed across different locations and continuous backup of the database on
short intervals has to be made. Each and every transaction that is made has to be authorized before
they are updated into the database (Grigoriev, 2015). Also, access to the system of the company has to
be limited. For the users to access the system they must have to provide their proper authentication
details like username and password. Also, passwords and usernames are not much secure in recent
times. So, there must be a second level of authentication for the users. The users of the system have to
go through the second level of authentication (Luz Martín‐Peña, Díaz‐Garrido & Sánchez‐López,
2018). Also, the distribution of the database across different locations will help to back up the system
to normal in case of a natural disaster in one location (Oyelere et al., 2018). If one system stops to
work other data centers can be helpful. In the case of natural disasters, the data of the users have to be
assessed to find if there have been any errors in the system. The company must hire the service of
another company that deals with the protection and prevention of loss in the database system in case of
MERGEFO
ACCOUNTING INFORMATION SYSTEM
the data to the database and a small group of staff will be specially appointed for testing the call
management system. This group of staff will be required to perform the operations on the data
received. This will help in finding the faults in the whole system (Hong, Lu & Hong, 2013). The other
systems have to be tested in the same way that is by creating a small test set. This small test sets for
each system will be able to identify the flaws in the system. For the payroll management system, the
system must be implemented partially for a small group of employees for one or two days. In this time
period, the flaws in the system can be identified. For the warehouse management system, the staff who
work at the warehouses of the company will be required to store information in the system. This
process will be carried out at one of the warehouses. This will help to detect whether the warehouse
management system is useful to manage the data of the stocks.
System Controls
The system control techniques that are to be implemented are that the data centers of the
company have to be distributed across different locations and continuous backup of the database on
short intervals has to be made. Each and every transaction that is made has to be authorized before
they are updated into the database (Grigoriev, 2015). Also, access to the system of the company has to
be limited. For the users to access the system they must have to provide their proper authentication
details like username and password. Also, passwords and usernames are not much secure in recent
times. So, there must be a second level of authentication for the users. The users of the system have to
go through the second level of authentication (Luz Martín‐Peña, Díaz‐Garrido & Sánchez‐López,
2018). Also, the distribution of the database across different locations will help to back up the system
to normal in case of a natural disaster in one location (Oyelere et al., 2018). If one system stops to
work other data centers can be helpful. In the case of natural disasters, the data of the users have to be
assessed to find if there have been any errors in the system. The company must hire the service of
another company that deals with the protection and prevention of loss in the database system in case of
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

PAGE \*
MERGEFO
ACCOUNTING INFORMATION SYSTEM
natural disasters and other situations like fire. Proper recovery time must be allotted so that the
company can recover the data that has been lost during the natural disaster. The company must
implement a disaster recovery plan in the company (Rahman, Aldhaban & Akhter, 2013). This plan
must also be tested so that the actual performance of the plan in a real-life situation can be understood.
The sensitive data of the company must have to be encrypted properly so that if the company faces
threats of cybersecurity then the company can minimize the loss of sensitive information. Regular
backup of the system must be done so that the company can avoid the loss of data when natural
disasters occur. The backup of the system must be done at regular intervals because the occurrence of
natural disasters is not certain. It has been seen that companies mostly place their concentration on the
data center to protect the data but the data in the laptop has also to be protected and also loss in the
data on the laptops has also to be prevented. This is due to the reason that the laptops contain most of
the day to day work information which is not updated in the database. There is also some sensitive
information about the company on their laptops. The database or the data center of the company has to
be placed in locations or regions where there is a low risk of natural disasters (Roman & Novikov,
2018). Again most companies use cloud networks these days so that they do not have to worry about
the data of the company. The data of the company is secured with the help of third-party companies
who are specialized in doing so.
MERGEFO
ACCOUNTING INFORMATION SYSTEM
natural disasters and other situations like fire. Proper recovery time must be allotted so that the
company can recover the data that has been lost during the natural disaster. The company must
implement a disaster recovery plan in the company (Rahman, Aldhaban & Akhter, 2013). This plan
must also be tested so that the actual performance of the plan in a real-life situation can be understood.
The sensitive data of the company must have to be encrypted properly so that if the company faces
threats of cybersecurity then the company can minimize the loss of sensitive information. Regular
backup of the system must be done so that the company can avoid the loss of data when natural
disasters occur. The backup of the system must be done at regular intervals because the occurrence of
natural disasters is not certain. It has been seen that companies mostly place their concentration on the
data center to protect the data but the data in the laptop has also to be protected and also loss in the
data on the laptops has also to be prevented. This is due to the reason that the laptops contain most of
the day to day work information which is not updated in the database. There is also some sensitive
information about the company on their laptops. The database or the data center of the company has to
be placed in locations or regions where there is a low risk of natural disasters (Roman & Novikov,
2018). Again most companies use cloud networks these days so that they do not have to worry about
the data of the company. The data of the company is secured with the help of third-party companies
who are specialized in doing so.

PAGE \*
MERGEFO
ACCOUNTING INFORMATION SYSTEM
Bibliography
Dennis, A., Wixom, B. H., & Roth, R. M. (2018). Systems analysis and design. John wiley & sons.
Grigoriev, E. (2015, July). DBMS for business systems. In 2015 10th International Joint Conference
on Software Technologies (ICSOFT) (Vol. 2, pp. 1-6). IEEE.
Hong, L., Lu, M., & Hong, W. (2013, October). A Business Computing System Optimization
Research on the Efficiency of Database Queries. In 2013 International Conference on
Cyber-Enabled Distributed Computing and Knowledge Discovery (pp. 247-250). IEEE.
Luz Martín‐Peña, M., Díaz‐Garrido, E., & Sánchez‐López, J. M. (2018). The digitalization and
servitization of manufacturing: A review on digital business models. Strategic Change,
27(2), 91-99
Oyelere, S. S., Suhonen, J., Wajiga, G. M., & Sutinen, E. (2018). Design, development, and evaluation
of a mobile learning application for computing education. Education and Information
Technologies, 23(1), 467-495.
Rahman, N., Aldhaban, F., & Akhter, S. (2013, July). Emerging technologies in business intelligence.
In 2013 Proceedings of PICMET'13: Technology Management in the IT-Driven
Services (PICMET) (pp. 542-547). IEEE.
Roman, K., & Novikov, B. (2018). Experimental Comparison of DBMS Performance.
Stonebraker, M. (2018, April). My top ten fears about the DBMS field. In 2018 IEEE 34th
International Conference on Data Engineering (ICDE) (pp. 24-28). IEEE.
MERGEFO
ACCOUNTING INFORMATION SYSTEM
Bibliography
Dennis, A., Wixom, B. H., & Roth, R. M. (2018). Systems analysis and design. John wiley & sons.
Grigoriev, E. (2015, July). DBMS for business systems. In 2015 10th International Joint Conference
on Software Technologies (ICSOFT) (Vol. 2, pp. 1-6). IEEE.
Hong, L., Lu, M., & Hong, W. (2013, October). A Business Computing System Optimization
Research on the Efficiency of Database Queries. In 2013 International Conference on
Cyber-Enabled Distributed Computing and Knowledge Discovery (pp. 247-250). IEEE.
Luz Martín‐Peña, M., Díaz‐Garrido, E., & Sánchez‐López, J. M. (2018). The digitalization and
servitization of manufacturing: A review on digital business models. Strategic Change,
27(2), 91-99
Oyelere, S. S., Suhonen, J., Wajiga, G. M., & Sutinen, E. (2018). Design, development, and evaluation
of a mobile learning application for computing education. Education and Information
Technologies, 23(1), 467-495.
Rahman, N., Aldhaban, F., & Akhter, S. (2013, July). Emerging technologies in business intelligence.
In 2013 Proceedings of PICMET'13: Technology Management in the IT-Driven
Services (PICMET) (pp. 542-547). IEEE.
Roman, K., & Novikov, B. (2018). Experimental Comparison of DBMS Performance.
Stonebraker, M. (2018, April). My top ten fears about the DBMS field. In 2018 IEEE 34th
International Conference on Data Engineering (ICDE) (pp. 24-28). IEEE.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





