Powered By Blogger

Sunday 4 March 2012

My Last Blog Post for DAC0163 Accounting Information System: Comment & Suggestions

Accounting information system is an interesting subject to learn because I have learned about UBS system, computer programs and information system. Now my final examination is just around the corner and this shows that my 4th semester is going to end. I hope I will do my best for AIS as well as other subjects too.

I would like to thank my lecturer Mr. Noreffendy for his guidance and lectures.  Sir, you are the one of the best lecturer in MSU and thank you so much for your guidance. I would also like to wish GOOD LUCK to all the students who are sitting for final examination. And now is time to say good bye to the blog and also Accounting Information System (AIS).


State six(6) Tranning Approaches Under Employee Training Program Under System Implementation System

Training approaches available to the company:
  • Hiring outside training consultants
  • Using training manual
  • Using videotape presentation
  • Using audiotape presentation
  • By training seminar
  • Using individualized hand-on instruction
  • By computer-assisted training


Reason for employee training:
  • Recruiting costs relating to hiring a new employee are avoided
  • Existing employees are already familiar with the firm's operations
  • Employee morale is often enhanced, especially in cases where the new position would be a promotion for an existing employee

Explain What Is "Communication Gap" Under System Analysis Phase

PHASE 1: SURVEY THE PRESENT SYSTEM (OBJECTIVE)
  • Identify specific problems
  • Gain a fundamental understanding of the operational aspects of the system

COMMUNICATION GAP PROBLEM APPROACHES
·         Communication the benefits of the proposed system to the individuals
·         Provide assurance that you are genuinely concerned with making life better for those involved in the system
·         Get to know as many people involved in the system as soon as possible

PHASE 2: IDENTIFY INFORMATION NEEDS (BASIC APPROACHES)
  • Identify the manager's primary job responsibilities
  • Identify the means by which the manager is evaluated
  • Identify the means by which the manager evaluates personal output
  • Identify some of the major problems the manager faces

PHASE 3: SYSTEM REQUIREMENTS
  • Output requirement
  • Input requirement

PHASE 4: DEVELOP A SYSTEM ANALYSIS REPORT
  • A summary of the scope and purpose of the analysis project
  • An overall cost budget and timetable for the project to date
  • Specification of system performance requirement


Friday 2 March 2012

Find Information That Relate To Biometric Time and Attendance System

Biometric time and attendance system is one of the most successful applications of biometric technology. With the integration and use of biometric technology, it is easier to verify the time and attendance of their employees. Biometric time and attendance has taken a starring role in today's competitive markets. As labour cost becomes more and more a factor in determining the profitability of business, the ability to reduce employee theft has become a principal goal.

Due to this basic reason, we will only see many organisations by-passing the traditional punch clock and advancing to biometric time and attendance systems. One of the main advantages of a biometric time and attendance system is it avoids "buddy-punching". Buddy punching was a major loophole which employees could exploit in the traditional time attendance systems. Apart from that, biometric time and attendance systems fulfil all other basic features required.

A biometric time and attendance system will have a user specify whether the employee is clocking-in or clocking-out. By using finger prints to determine identity, buddy-punching problems can be totally eliminated as well as other fraud. Attendance of each employee is printed on the attendance report. The attendance report can easily be exported to facilitate for payroll purposes.

State the difference between Paper Based Information System & Paperless Information System

PAPER- BASED INFORMATION SYSTEM

·                     Provide lower degree of automatic
·                     Time consuming
·                     Work in batches
·                     Lower degree of control
·                     Do not involve optical scanner and bar-code merchandised
·                     Data update regularly


PAPER- LESS INFORMATION SYSTEM

·                     Provide higher degree of automation
·                     Less time consuming
·                     Not work in batches
·                     Higher degree of control
·                     Use of optical scanner and bar-coded merchandised
·                     Data update instantly


DISCUSS AND ELABORATE DISASTER RISK MANAGEMENT PROCEDURE

ESCALATION PROCEDURS
State the conditions under which a disaster should be declared.

ALTERNATE PROCESSING ARRANGEMENT
Most important part of disaster recovery plan is the specification of a backup site to be used if the primary computing site is destroyed or unusable.

EMERGENCE RESPONSE CENTER
When disaster strikes, all authority for data processing and computer operation is transferred to the emergence response team.

THE PERSONNEL REPLACEMENT PLAN
 Possibility of losing employees to the disaster must be considered.

THE SALVAGE PLAN
In some disaster it is possible to recover equipment and valuable records if quick action is taken.

THE PLAN FOR TESTING AND MAINTAINING THE SYSTEM
The disaster recovery plan should be tested every 6 months.

HOW DOES WIRETAPPING INTRUDERS POSE A THREAT TO INFORMATION SYSTEM?



A LARGE PORTION OF THE INFORMATION PROCESSED BY THE COMPANY'S COMPUTERS TRAVELS OVER WIRES AND CABLES ARE CALLED WIRETAPPER. SOME INFORMATION IS TRANSMITTED ONLY FROM ONE ROOM TO THE NEXT, AND OTHER INFORMATION MAY BE TRANSMITTED ACROSS THE COUNTRY VIA THE INTERNET. THESE LINES ARE VULNERABLE TO WIRE TAPPING, WHICH MAY BE DONE WITH EVEN INEXPENSIVE DEVICES THAT ARE CAPABLE OF PERFORMING THE TASK WITHOUT GIVING ANY CLUES THAT THE WIRE IS BEING TAPPED.  For example, a simple induction loop coiled around a terminal wire can pick up most voice and RS232 communications. More complex types of eavesdropping can be set up as well. Communications Security, it's important to physically secure all network cabling to protect it both from interception and from vandalism.