Strategic Information Systems for Business and Enterprise
Verified
Added on 2023/01/11
|7
|1976
|30
AI Summary
This report analyzes the relationship between information systems, data, and information. It also covers business frauds and their solutions. The report discusses cash disbursements and control techniques to prevent or detect fraud schemes.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Strategic Information Systems for Business and Enterprise
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents INTRODUCTION..........................................................................................................................3 WEEK 1...........................................................................................................................................3 Relationship between data, information and information system............................................3 WEEK 2...........................................................................................................................................4 A) Type of fraud.........................................................................................................................4 B) Controls and prevents.............................................................................................................4 WEEK 3...........................................................................................................................................4 differencebetween Credit check advance technology system and credit check inbasic technology system......................................................................................................................4 WEEK 4...........................................................................................................................................5 Internal control weakness in two symbol's cash disbursements systemand the risk associate with the weakness......................................................................................................................5 WEEK 5...........................................................................................................................................6 Control techniques to prevent or detect the fraud schemes.....................................................6 CONCLSUION................................................................................................................................6 REFERENCE...................................................................................................................................7
INTRODUCTION The strategic role of information systems is to enhance the image of information Services in an organization. Strategic information systems are developed in response to corporate business initiative, and they are intended to give competitive advantage to the organization. This reportwill analyze the relationship betweeninformation system , dataand information. It will also cover thebusiness frauds and their solution.This report will discuss cash disbursementsof two symbols and their limitation. In the end of this report will describe two control requires preventing or detect the fraud schemes. WEEK 1 Relationship between data, information and information system The modern worldcompletelycenteredaround the useful information, companies like Big and smallgenerate the lotsof valueout of the proper information management , many which is their core business. There are many companieswho could not exist withouta proper management of the informationwhich they needed to operate their business (Du Toit., 2016). In other words their information system. An information systemis the groupof different differentcompanies proceduresand resourceswhich are used to gather , process and storeand communicatethe information within the companies' workplace, so they can can sun their organizational information and make their business success and better as compare to the others. Sarais the singularunitof the knowledge , this has no intrinsic valueontheir own . People cannot extract the meaning from the data without knowing more about the data which they have it whilethe information is somethingwhichcan be likable with thedata , information provide the meaning about the data, andwe can use itour business planning and making the information more suitable for the company and company can use it takehigher advantages in their business. `Data, information system and information are connected and interlinked with each other (Gu, Qi and Wang., 2018). Company collect t the datafrom the sources, information system of the companyprovide make the informationsimplewhich can be useto getmeaning for information and this information is used to make their business better and smooth.
WEEK 2 A) Type of fraud This is an Economic extortion fraud because this fraud occurs when the officials pr the employees , throughthe wonderful,l use of the actual andthreaten theforceor fear. Officers demand for the moneyor some other considerationto refrainfrom discriminating a business decision, In this case also we can seethat the conicalhealth inspectoris threatento close down the business andmaking thefakehealthviolencenoticewhich isillegal and fraud. Resrount is following all the heath related regulation but the inspector is creating a force on the restrunt owner top pay money to him and this money will go directly to the inspector because thehe was issuing the fake health violence notice (Kitsios and Kamariotou., 2016). B) Controls and prevents Thisfraud happened with the many business owner, andthey become a part of the corruptionswhich is illegal. In this case studythe business owner can collect the evidence against theinspectorto control and present this fraud. They can go legally andfile a case against theinspector. The restaurant owner canshow the evidence in the courtthis will help himto get the justice.It can be problemif they can not have strong evidence.Some of the strongevidence are the eye evidence, camera recording etc. this can help theowner to overcome from this problem and the fraud as well. Theycan also file the corporation case on him, this is important for the owner to take action against himbecausethis thingcan repeat again and they have to pay high amount top the inspector all the time and he will also become the part of the crime so this will be better it he go illegal and fight against the inspector. WEEK 3 differencebetween Credit check advance technology system and credit check inbasic technology system In a credit check in advance technology system, the system logic is not a human being , makes the decisionto the grant or the denythe credit basedon the customerscredit history which is contained in thefileCredit history (Rezvani,Dong and Khosravi., 2017). The customers credit is deniedthen the sales clerkcannot force thecreditor tocontinue their transaction. It is depended on the creditor. If they want to repeat they canbecause its depend on 5them while the basic credit check in technology system. Credit cheeking of thecustomersis the function which isrun by thecredit department ,This department is responsibleto ensure
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
the proper applicationsof the companies polices about the credit. The complexity of the credit is totally depend on the companies policy and their procedures. This is an relationship with their customersandthe maternityof the transaction. The approval of the creditfor thefirst time for the customerscan take timeand it can alsoconclude the consultationwith an outside credit bureau. In the contrast of the existing customers credit decisions involve the ensuring only that the currenttransactionof the customersdoes notexceedthe credit limited of the customersmay bedeltwith the very quick which can be a probable for the casters, andthey can face the problem form the companies credit system and their procedure. WEEK 4 Internal control weakness in two symbol's cash disbursements system and the risk associate with the weakness The internal control is the accurate process which ensurer the continuous reliability of the achievement ofgoals and theobjectives of the companywhich can be related to the companiesdaily operations , reporting of thefinancial resourcesand companiesregulations and their laws (Soares and Setyohady., 2017). This was started that the companies clerk get the documents from the accounting department of the company for the account payable. And then theycreatethe checkfor the invoiceamountand then undatedthe check register. Then the leaders account of the payable account payable control from the terminal and the finally, field the invoice , copy of the purchase order , reports revived and the checks in the department. Weakness and risk the segmentationduties for the authorizationand processing of thedistribution of the cash activities are run by the Clerk, and, and he is also involved in the authoring the liable as well as I process payment of the employees.. the weakness in this process is that the companies clerk authorizethe liabilityfor the accountpayableand the processes the payments as well. Another risk is involvedis may be the clerk only because it could create the wrong vendors , wrongliability, andthey can also disbursethe fundswhich can bebigproblem for the company, and they will not get any idea about it. The internal control of the company should beimposed n for the segregationof the dutiesand the tasksof theauthorizationof the liabilitiesandthe disbursement of thecompanies fundsandtheirdistribution to the companies employees.
WEEK 5 Control techniques to prevent or detect the fraud schemes A payroll fund is the amount which is used to pay the salaries of the employees for their contribution in the activities. They give salaries on the basis of their work and distributed to the employees motherly basis (Wijaya and Prasetyo., 2020).Companiesfacemany frauds in the payroll system and this case it one of themwhich was about the Leaon jones who worked I the warehouseof the large building supply chain company and his own employer was doing fraud with them \ Control techniques to prevent fraud the company'spayroll department hasnoindependent information control to change the information status of the employees until the employees give the information that he or she leaves the jobpermanentlyso clearly is been an fraud and Leaon Jones can go legally and take the actions against the employer. An employee action reportfrom the personneldepartmentshould be listedall the currentemployees. Time card for the employees terminationor their non-existence should befound outwhenthe reconciled with the personal report,The independent paymaster should be distributed the paychecks to the employees. If an employee is not present to receive the paychecks, this will be returned to the payroll department of the company for the security and prevention purpose. CONCLSUION AS per thereport has been analyzed the relationship between information system , data and information and why it is import for the company. It alsohas been coveredthebusiness frauds and their solution.This reporthas been disused about thecash disbursementsof two symbolsand their limitation also provide the weakness in this process. In the end of this report has beendescribed two control requires preventing or detect the fraud schemes.
REFERENCE Books and journal Du Toit, A. S., 2016. Using environmental scanning to collect strategic information: A South African survey.International Journal of Information Management.36(1). pp.16-24. Gu, Y., Qi, L. and Wang, J., 2018. Breaking the Monolith: Strategy, Variety, and Performance ofEnterpriseInformationSystems.JournalofSystemsScienceandSystems Engineering.27(6). pp.727-770. Kitsios, F. and Kamariotou, M., 2016, September. Decision support systems and business strategy: a conceptual framework for strategic information systems planning. In2016 6th International Conference on IT Convergence and Security (ICITCS)(pp. 1-5). IEEE. Rezvani, A., Dong, L. and Khosravi, P., 2017. Promoting the continuing usage of strategic information systems: The role of supervisory leadership in the successful implementation of enterprise systems.International Journal of Information Management.37(5). pp.417- 430. Soares, S. and Setyohady, D. B., 2017, August. Enterprise architecture modeling for oriental university in Timor Leste to support the strategic plan of integrated information system. In2017 5th International Conference on Cyber and IT Service Management (CITSM)(pp. 1-6). IEEE. Wijaya, A. F. and Prasetyo, M. W., 2020. Strategic Planning Information Systems Enterprise ArchitecturePlanningMethodCaseStudyofSemarangCityPublicWorks Department.Journal of Information Systems and Informatics.2(1). pp.114-122.