This article discusses the utilization of computer systems in Bell Studio and the issues faced in its operations, such as payroll systems, purchasing system, and ordering system. It also explores the risks inherent in computer-based systems and the security measures in electronic commerce.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: BELL STUDIO BELL STUDIO Name of Student Name of University Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1BELL STUDIO Executive summary Utilization of computer systems would allow the organization to automate most of their services like ordering, processing the orders and many more. This reduces a huge amount of human error that are involved in the entire system. Besides this, the usage of computer systems in the operations can also prove to be the source of new risks, this takes place in most of the times and the risks faced in the systems can be mitigated using various processes. The organization selected for this particular organization is Bell Studio. Bell Studio also faces numerous issues in its operations, the issues faced by the organization includes in the aspect of its payroll systems, purchasing system, ordering system and many more. The systems of this organization has numerous loopholes, these loopholes are mentioned in the report below, and they are presented in details.
2BELL STUDIO Table of Contents Introduction......................................................................................................................................3 Discussion........................................................................................................................................4 Internal control weaknesses.........................................................................................................4 Issues in purchase system........................................................................................................4 Issues in cash disbursement system.........................................................................................5 Various functional areas that influence disbursement.............................................................6 Issues in payroll system...........................................................................................................7 Risks inherent in computer based system 400.............................................................................8 Security measures in electronic commerce..................................................................................9 Data flow diagram of purchase and cash distribution systems..................................................11 Data flow diagram of payroll system.........................................................................................12 System flowchart of purchase system........................................................................................13 System flow chart of cash disbursements system......................................................................14 System flowchart of payroll system..........................................................................................15 Conclusion.....................................................................................................................................15 References......................................................................................................................................17
3BELL STUDIO Introduction Various operations that are undertaken within an organization might face numerous issues, these issues can be solved with the usage of computer systems for carrying out most of their operations. Usage of computer systems would allow the organization to automate most of their services like ordering, processing the orders and many more.This reduces a huge amount of human error which are involved in the entire system(Pearlson, Saunders and Galletta 2016). Besides this, the usage of computer systems in the operations can also prove to be the source of new risks, this takes place in most of the times and the risks faced in the systems can be mitigatedusingvariousprocesses(LaudonandLaudon2016).Therisksfacedbythe organization are dependent on the firms that it deals with along with the size of the firm. The organization selected for this particular organization is Bell Studio, this organization deals with a wholesaler art of supplies. It involves manufacturers from various countries worldwide, some of the countries include Australia, Japan, China, New Zealand and many more. This organization has various systems like purchase systems,cash distributed systems, payroll systems and some more similar factors(Cassidy 2016). The systems of this organization has numerous loopholes, these loopholes are mentioned in the report below, and they are presented in details.This report further provides various diagrams like data flow diagrams of purchase and cash distribution systems, System flowchart of purchases system, System flowchart of cash disbursements system, Data flow diagram of payroll system, System flowchart of payroll system, Description of internal control weakness in each system and risks associated with the identified weakness (Chiang, Grover and Liang 2018). It also discusses regarding the threats that might inherent in various computer based systems.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4BELL STUDIO Discussion Internal control weaknesses Issues in purchase system The purchase system of Bell Studio does not actually make use of any technology, it processes its operations manually, and there exists a high level of complexity while taking as well as fulfilling their orders. The might have various clauses like usage of multiple orders capture as well as fulfillment legacy systems (DeLone and McLean 2016). A manual or a paper based system for the purpose of procurementcreates issues for the employees as well as the entire organization. The organization is aiming at creating excess amount of documents.The purchase cycle usually can consist up to 7 documents but more documents can hamper the entire system(Ansoff,KipleyandLewis2018).Thepurchasingprocessincludesrequisitions, purchasing various orders, order acknowledgements, quotations, good received notes, advice notes, packing slips along with invoices.These are usually a huge amount of paper work to be produced and keeping track of a particular process. As much as proper record keeping is important for effective as well as efficient procurement and purchasing, there are numerous problems that are included in the process of paper based records (Wu, Straub and Liang 2015). The main issues that would be faced by the organization include lost as well as damage of the records, they might get accidentally destroyed. It would be usually hard to spot the fake requests, missing transactions and invoices; these have high chances to cost a huge amount of money as well as time (Mignerat and Rivard 2015). Usage of manual process for the purpose of purchasing might require a regularly updated as well as efficient filing system; these files would containdata regarding the purchases carried out by the organization along with the organizational detail. Manual purchasing would require a
5BELL STUDIO huge amount of regular updates and efficient filing system; this would consume a huge amount of space as well as man hours for the purpose of working in an effective manner (Hung, Huang and Yen2016). The purchasing process include numerous steps which are very lengthy as well as time consuming, hence the manual purchasing system requires more time than expected. Issues in cash disbursement system The cash disbursement system of the organization usually issued under numerous special circumstances, inspite of this, it faces numerous issues.Suppose a particular vendor drops the materials for a particular delivery and he is supposed to be paidfor that delivery immediately, and there is no option to get payment using the regular accounts payable process (Chuang and Lin 2017).A cheque has to be provided to the vendor and then the accounting system is updated later.This situation might be faced by the organization. These occurrences of various manual disbursements have the ability to create an issue. It is a very easy way for a particular employee to steam funds if he has access to signature stamps, cheques and many more organizational data (Du Toit 2016). The theft can be covered with the help of entering data in the presented accounting system that indicates cash only delivery from a particular supplier. The paperwork might not be necessary because the process of payment does not always go through the accounts payable system. Later on it is realized by an individual that the supporting documentation is not present (Morecroft 2015). This is because it is one of the easiest way for committing fraud. It is very important for the organization to examine various cash disbursements in order to check how many times manual disbursements are carried out and the circumstances that surround these payments. It can prove to be helpful for the organization to sample various disbursements and hence look for some documentation on its support (Cui, Ye and Teo 2015). It is also very important to check these, at the time when frequency is very high or unusual.
6BELL STUDIO Suppose the accounting manager had written cheques to himself and various manual disbursements to various suppliers in order to maintain a bank account along with covering the theft. He had known that the control of the company on supplies as well as inventory was poor, hence management will not be able to reconcile amount on the accounting record (Aversa, Cabantous and Haefliger 2018). After the theft had been uncovered, a particular examination on disbursements had revealed a high amount of manual disbursements. Management had known that the cash deliveries had been rare hence there must not be any volume of payments that had been issued manually (Lee, Thomas and Baskerville 2015). If someone had been examined these type of transactions, the theft would not have occurred. This example described, why it is important for examining various disbursements. The accounting system of the company would have a particular way for identifying the unusual payments (Peltier 2016). It might be a labor intensive process for examining the disbursements. The work might result to be helpful when fraud had been identified. Various functional areas that influence disbursement Organizational unitPractices or policies influenced Accounts payable departmentDistributed policies Disbursement scheduling or forecasts Discount policies Distributed records Invoice information Production departmentStatus of inventory position Initiation of orders and quantities Initiation of charge-backs Purchasing departmentDiscount policies Assist in determination of orders and quantities Usageofelectronicpurchaseorders and payment Negotiationforvendors,termsand prices Vendor relations Negotiationforvendors,termsand
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7BELL STUDIO prices Personnel departmentNegotiation of wages and pay periods Localized payroll policies Direct deposit policies Treasury departmentBank relationships Bank services Disbursement policies Funding policies Disbursement mechanisms Account balance overnight Table: functional areas that influence disbursement (Source:Kummer and Schmiedel 2016) Issues in payroll system Some issues that exist in the enterprise are presented below Human error:The enterprise goes through a particular payroll process in a manual manner, theyusuallyundergoagreatamountoffrustrationwhichisaccompaniedbyvarious interventions that are manual in nature. The payroll processing system had overburdened numerous professionals including the finance teams, they left them with various mundane activitiessuchasrepetitivecrosscheckinganddocumentation(Goni,Chofrehand Mukhtar2017). Suppose the enterprise had been through a particular transaction and this transaction had been checked in an appropriate manner, after few months the professions require the data regarding the transaction, for this purpose they need to inspect the transaction once again, this causes a huge problem for them because the detailed data related to the activity is not saved (Dwivedi, Wastell and Laumer 2015). This process is also very prone to various human errors. Non- compliance:The payroll processing system that exists within the organization is non- compliance in nature. This particular process requires more attention for making improvement legislative updates (Pearlson, Saunders and Galletta 2016). Faltering on and abiding by statutory
8BELL STUDIO laws has the ability to make the organization serve severe penalties and serves for the reason of non-compliance. Risks inherent in computer based system 400 Computer system threat can be described as the one that leads to corruption or loss of information or any sort of physical damage to hardware and infrastructure. Knowing the ways by which computer security threats are to be identified is considered as the very first step in the process of protecting computer systems (Laudon and Laudon 2016). These threats might be accidental, intentional and they might also be caused by various natural disasters. The security threats could be defined as a particular risk that has the ability to potentially harm various computer systems as well as organization (Cassidy 2016). There are various risk that can be faced by a particular computer based system might be physical in nature, physical threat is a particular potential cause of any sort of accident which might result in sort of loss or any physical damage to the systems (DeLone and McLean 2016). Physical threat can be divided into various categories include internal, external and human. The description of these categories as follows Internal threat: these threats include the damage caused by fire, humidity in office rooms which causes housing or hardware, unstable supply of power and many more. External threat: this kind of threats are caused due to floods, lightning, earthquakes and many more. Human: this sort of damage is cause due to theft, vandalism of hardware, vandalism of infrastructure, disruption, accidental or any sort of intentional errors. There are numerous non-physical threats that might be faced by computer systems, these issues include loss and corruption of the system information, disruption of various business
9BELL STUDIO operations which has the tendency to rely on various computer systems, loss of confidential information, illegal monitoring of various activities on the computer systems, cyber security breaches and may more (Wu, Straub and Liang 2015). The nonphysical threats can also be called as various logical threats. The common types of threats that are non-physical in nature include viruses, Trojans, worms, spyware, key loggers, adware, denial of serve attacks, distributed denial of service attacks, unauthorized access to the computer systems and resources like data, phishing and many more computer security risks (Mignerat and Rivard 2015). The risks inherited in the computer systems also includes some involvement of ethics. An organization must never allow any employee to access data owned by other employees until and unless it is very urgent, this is included within the ethical behavior of an employee (Morecroft 2015). Suppose an employee accesses a particular data that belongs to another employee and that employee was supposed to be confidential, the employee discloses the data within the organization, this would be violation of the ethical roles within the policy (Chuang and Lin 2017). Hence ethics should be in place during implementation of any strategy or process. Security measures in electronic commerce Threat can be defined as a particular activity which can lead to data corruption as well as data loss that is through to the disruption of normal operations of the business (Kummer and Schmiedel 2016). There are physical as well as nonphysical risks, these risks are mentioned above and can be mitigated using various measures, these measures are mentioned below In order to protect various computer systems from various mentioned physical threats, the organization should have various physical security control measures, the measures are Internal: fire threats can be prevented with the usage of automatic fire detectors as well as extinguishers which do not make use of water for the purpose of putting out fire (Aversa,
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10BELL STUDIO Cabantous and Haefliger 2018). Unstable power supply could be avoided by the usage of various voltage controllers. A particular air conditioner could be used for the purpose of controlling the humidity in the room where computers are stored. External: systems for lightning protection could be used for protecting computer systems against these attacks. Lightning protection systems might not be perfect but up to a particular extent, they would reduce the chance of lightning that causes damage (Lee, Thomas and Baskerville 2015). Housing the computer systems in various high lands can be considered as one of the ways for the purpose of protecting systems against natural disasters like floods. Humans: threats like theft could be prevented with the usage of locked doors as well as restricted access to the computer rooms. In order to protect various computer systems from variousthreats that, they must have various logical security measures as well in proper place (Peltier 2016). Some possible measures that could be used by the organizations in order to protect their cyber security threats are as follows
11BELL STUDIO Data flow diagram of purchase and cash distribution systems Figure 1: Data flow diagram of purchase and cash distribution systems
12BELL STUDIO (Source: created by author) Data flow diagram of payroll system
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
13BELL STUDIO Figure 2: Data flow diagram of payroll system (Source: created by author) System flowchart of purchase system Figure 3: System flowchart of purchase system (Source: created by author)
14BELL STUDIO System flow chart of cash disbursements system Figure 4: System flow chart of cash disbursements system (Source: created by author)
15BELL STUDIO System flowchart of payroll system Figure 5: System flowchart of payroll system (Source: created by author)
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
16BELL STUDIO Conclusion From the above report it can be concluded that various operations that are carried out within organization might contain numerous issues, these issues might prove to be very vulnerable to the employees of the organization along with the processes that are used by the organization for the purpose of carrying out their processes. Similarly, the organization that has been selected for this particular organization, Bell Studio also faces numerous issues in its operations, the issues faced by the organization includes in the aspect of its payroll systems, purchasing system, ordering system and many more. The issues that they face might be mitigated with the usage of computer systems, these systems might further provide new issues that would require to be mitigated by the organization. These issues can be physical as well as nonphysical. The detailed description of these issues along with their mitigation strategies are provided in the discussion part of this report.
17BELL STUDIO References Ansoff, H.I., Kipley, D., Lewis, A.O., Helm-Stevens, R. and Ansoff, R., 2018.Implanting strategic management. Springer. Aversa, P., Cabantous, L. and Haefliger, S., 2018. When decision support systems fail: Insights forstrategicinformationsystemsfromFormula1.TheJournalofStrategicInformation Systems,27(3), pp.221-236. Cassidy, A., 2016.A practical guide to information systems strategic planning. Auerbach Publications. Chiang, R.H., Grover, V., Liang, T.P. and Zhang, D., 2018. Strategic Value of Big Data and Business Analytics. Chuang, S.H. and Lin, H.N., 2017. Performance implications of information-value offering in e- service systems: Examining the resource-based perspective and innovation strategy.The Journal of Strategic Information Systems,26(1), pp.22-38. Cui, T., Ye, H.J., Teo, H.H. and Li, J., 2015. Information technology and open innovation: A strategic alignment perspective.Information & Management,52(3), pp.348-358. DeLone,W.H.andMcLean,E.R.,2016.Informationsystemssuccess measurement.Foundations and Trends® in Information Systems,2(1), pp.1-116. Du Toit, A.S., 2016. Using environmental scanning to collect strategic information: A South African survey.International Journal of Information Management,36(1), pp.16-24. Dwivedi, Y.K., Wastell, D., Laumer, S., Henriksen, H.Z., Myers, M.D., Bunker, D., Elbanna, A., Ravishankar, M.N. and Srivastava, S.C., 2015. Research on information systems failures and
18BELL STUDIO successes: Status update and future directions.Information Systems Frontiers,17(1), pp.143- 157. Goni, F.A., Chofreh, A.G., Mukhtar, M., Sahran, S., Shukor, S.A. and Klemeš, J.J., 2017. Strategicalignmentbetweensustainabilityandinformationsystems:Acaseanalysisin Malaysian public Higher Education Institutions.Journal of cleaner production,168, pp.263- 270. Hung, S.Y., Huang, W.M., Yen, D.C., Chang, S.I. and Lu, C.C., 2016. Effect of information service competence and contextual factors on the effectiveness of strategic information systems planning in Hospitals.Journal of Global Information Management (JGIM),24(1), pp.14-36. Kummer, T.F. and Schmiedel, T., 2016. Reviewing the role of culture in strategic information systems research: A call for prescriptive theorizing on culture management.Communications of the Association for Information Systems,38(1), p.5. Laudon, K.C. and Laudon, J.P., 2016.Management information system. Pearson Education India. Lee, A.S., Thomas, M. and Baskerville, R.L., 2015. Going back to basics in design science: fromtheinformationtechnologyartifacttotheinformationsystemsartifact.Information Systems Journal,25(1), pp.5-21. Mignerat, M. and Rivard, S., 2015. Positioning the institutional perspective in information systems research. InFormulating Research Methods for Information Systems(pp. 79-126). Palgrave Macmillan, London. Morecroft,J.D.,2015.Strategicmodellingandbusinessdynamics:Afeedbacksystems approach. John Wiley & Sons.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
19BELL STUDIO Pearlson, K.E., Saunders, C.S. and Galletta, D.F., 2016.Managing and using information systems, binder ready version: a strategic approach. John Wiley & Sons. Peltier, T.R., 2016.Information Security Policies, Procedures, and Standards: guidelines for effective information security management. Auerbach Publications. Wu, S.P.J., Straub, D.W. and Liang, T.P., 2015. How information technology governance mechanisms and strategic alignment influence organizational performance: Insights from a matched survey of business and IT managers.Mis Quarterly,39(2), pp.497-518.