Analysis of Strategic Information Systems Tutorial Questions HI5019

Verified

Added on  2023/01/11

|7
|1976
|30
Homework Assignment
AI Summary
This assignment analyzes tutorial questions from the HI5019 Strategic Information Systems for Business and Enterprise course. It explores the relationship between data, information, and information systems, emphasizing their importance in modern business operations. The report delves into various types of business fraud, providing examples such as economic extortion, and discusses effective control and prevention measures. It differentiates between credit check systems with basic and advanced technologies. Furthermore, it examines internal control weaknesses in cash disbursement systems, highlighting associated risks. Finally, the assignment outlines control techniques to prevent and detect fraud schemes, specifically focusing on payroll fraud. The analysis provides a comprehensive overview of key concepts and practical applications within strategic information systems, offering insights into data management, fraud prevention, and internal controls.
Document Page
Strategic Information
Systems for Business and
Enterprise
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
INTRODUCTION ..........................................................................................................................3
WEEK 1...........................................................................................................................................3
Relationship between data, information and information system ............................................3
WEEK 2...........................................................................................................................................4
A) Type of fraud.........................................................................................................................4
B) Controls and prevents.............................................................................................................4
WEEK 3...........................................................................................................................................4
difference between Credit check advance technology system and credit check in basic
technology system ......................................................................................................................4
WEEK 4...........................................................................................................................................5
Internal control weakness in two symbol's cash disbursements system and the risk associate
with the weakness ......................................................................................................................5
WEEK 5...........................................................................................................................................6
Control techniques to prevent or detect the fraud schemes .....................................................6
CONCLSUION................................................................................................................................6
REFERENCE...................................................................................................................................7
Document Page
INTRODUCTION
The strategic role of information systems is to enhance the image of information Services
in an organization. Strategic information systems are developed in response to corporate business
initiative, and they are intended to give competitive advantage to the organization.
This report will analyze the relationship between information system , data and
information. It will also cover the business frauds and their solution. This report will discuss
cash disbursements of two symbols and their limitation. In the end of this report will describe
two control requires preventing or detect the fraud schemes.
WEEK 1
Relationship between data, information and information system
The modern world completely centered around the useful information, companies like
Big and small generate the lots of value out of the proper information management , many
which is their core business. There are many companies who could not exist without a proper
management of the information which they needed to operate their business (Du Toit., 2016).
In other words their information system.
An information system is the group of different different companies procedures and
resources which are used to gather , process and store and communicate the information
within the companies' workplace, so they can can sun their organizational information and make
their business success and better as compare to the others.
Sara is the singular unit of the knowledge , this has no intrinsic value on their own .
People cannot extract the meaning from the data without knowing more about the data which
they have it while the information is something which can be likable with the data ,
information provide the meaning about the data, and we can use it our business planning and
making the information more suitable for the company and company can use it take higher
advantages in their business.
`Data, information system and information are connected and interlinked with each other
(Gu, Qi and Wang., 2018). Company collect t the data from the sources, information system of
the company provide make the information simple which can be use to get meaning for
information and this information is used to make their business better and smooth.
Document Page
WEEK 2
A) Type of fraud
This is an Economic extortion fraud because this fraud occurs when the officials pr the
employees , through the wonderful,l use of the actual and threaten the force or fear. Officers
demand for the money or some other consideration to refrain from discriminating a business
decision, In this case also we can see that the conical health inspector is threaten to close
down the business and making the fake health violence notice which is illegal and fraud.
Resrount is following all the heath related regulation but the inspector is creating a force on the
restrunt owner top pay money to him and this money will go directly to the inspector because
the he was issuing the fake health violence notice (Kitsios and Kamariotou., 2016).
B) Controls and prevents
This fraud happened with the many business owner, and they become a part of the
corruptions which is illegal. In this case study the business owner can collect the evidence
against the inspector to control and present this fraud. They can go legally and file a case
against the inspector. The restaurant owner can show the evidence in the court this will help
him to get the justice. It can be problem if they can not have strong evidence. Some of the
strong evidence are the eye evidence, camera recording etc. this can help the owner to
overcome from this problem and the fraud as well. They can also file the corporation case on
him, this is important for the owner to take action against him because this thing can repeat
again and they have to pay high amount top the inspector all the time and he will also become
the part of the crime so this will be better it he go illegal and fight against the inspector.
WEEK 3
difference between Credit check advance technology system and credit check in basic
technology system
In a credit check in advance technology system, the system logic is not a human being ,
makes the decision to the grant or the deny the credit based on the customers credit history
which is contained in the file Credit history (Rezvani, Dong and Khosravi., 2017). The
customers credit is denied then the sales clerk cannot force the creditor to continue their
transaction. It is depended on the creditor. If they want to repeat they can because its depend on
5them while the basic credit check in technology system. Credit cheeking of the customers is
the function which is run by the credit department , This department is responsible to ensure
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
the proper applications of the companies polices about the credit. The complexity of the credit
is totally depend on the companies policy and their procedures. This is an relationship with their
customers and the maternity of the transaction. The approval of the credit for the first time
for the customers can take time and it can also conclude the consultation with an outside
credit bureau. In the contrast of the existing customers credit decisions involve the ensuring
only that the current transaction of the customers does not exceed the credit limited of the
customers may be delt with the very quick which can be a probable for the casters, and they
can face the problem form the companies credit system and their procedure.
WEEK 4
Internal control weakness in two symbol's cash disbursements system and the risk associate with
the weakness
The internal control is the accurate process which ensurer the continuous reliability of
the achievement of goals and the objectives of the company which can be related to the
companies daily operations , reporting of the financial resources and companies regulations
and their laws (Soares and Setyohady., 2017). This was started that the companies clerk get the
documents from the accounting department of the company for the account payable. And then
they create the check for the invoice amount and then undated the check register. Then the
leaders account of the payable account payable control from the terminal and the finally, field
the invoice , copy of the purchase order , reports revived and the checks in the department.
Weakness and risk
the segmentation duties for the authorization and processing of the distribution of the cash
activities are run by the Clerk, and, and he is also involved in the authoring the liable as well
as I process payment of the employees.. the weakness in this process is that the companies clerk
authorize the liability for the account payable and the processes the payments as well.
Another risk is involved is may be the clerk only because it could create the wrong vendors
, wrong liability, and they can also disburse the funds which can be big problem for the
company, and they will not get any idea about it. The internal control of the company should
be imposed n for the segregation of the duties and the tasks of the authorization of the
liabilities and the disbursement of the companies funds and their distribution to the
companies employees.
Document Page
WEEK 5
Control techniques to prevent or detect the fraud schemes
A payroll fund is the amount which is used to pay the salaries of the employees for their
contribution in the activities. They give salaries on the basis of their work and distributed to the
employees motherly basis (Wijaya and Prasetyo., 2020). Companies face many frauds in the
payroll system and this case it one of them which was about the Leaon jones who worked I the
warehouse of the large building supply chain company and his own employer was doing fraud
with them \
Control techniques to prevent fraud
the company's payroll department has no independent information control to change
the information status of the employees until the employees give the information that he
or she leaves the job permanently so clearly is been an fraud and Leaon Jones can go
legally and take the actions against the employer.
An employee action report from the personnel department should be listed all the
current employees. Time card for the employees termination or their non-existence
should be found out when the reconciled with the personal report, The independent
paymaster should be distributed the paychecks to the employees. If an employee is not
present to receive the paychecks, this will be returned to the payroll department of the
company for the security and prevention purpose.
CONCLSUION
AS per the report has been analyzed the relationship between information system , data
and information and why it is import for the company. It also has been covered the business
frauds and their solution. This report has been disused about the cash disbursements of two
symbols and their limitation also provide the weakness in this process. In the end of this report
has been described two control requires preventing or detect the fraud schemes.
Document Page
REFERENCE
Books and journal
Du Toit, A. S., 2016. Using environmental scanning to collect strategic information: A South
African survey. International Journal of Information Management.36(1). pp.16-24.
Gu, Y., Qi, L. and Wang, J., 2018. Breaking the Monolith: Strategy, Variety, and Performance
of Enterprise Information Systems. Journal of Systems Science and Systems
Engineering.27(6). pp.727-770.
Kitsios, F. and Kamariotou, M., 2016, September. Decision support systems and business
strategy: a conceptual framework for strategic information systems planning. In 2016 6th
International Conference on IT Convergence and Security (ICITCS) (pp. 1-5). IEEE.
Rezvani, A., Dong, L. and Khosravi, P., 2017. Promoting the continuing usage of strategic
information systems: The role of supervisory leadership in the successful implementation
of enterprise systems. International Journal of Information Management.37(5). pp.417-
430.
Soares, S. and Setyohady, D. B., 2017, August. Enterprise architecture modeling for oriental
university in Timor Leste to support the strategic plan of integrated information system.
In 2017 5th International Conference on Cyber and IT Service Management (CITSM) (pp.
1-6). IEEE.
Wijaya, A. F. and Prasetyo, M. W., 2020. Strategic Planning Information Systems Enterprise
Architecture Planning Method Case Study of Semarang City Public Works
Department. Journal of Information Systems and Informatics.2(1). pp.114-122.
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]