College of Administration and Finance Sciences
Assignment (1)
Deadline: Saturday 22/04/2023 @ 23:59
Course Name: Introduction to
Accounting Information Systems
Student’s Name:
Course Code: ACCT 402
Student’s ID Number:
Semester: Third Term 22/23
CRN:
Academic Year: 1444 H
For Instructor’s Use only
Instructor’s Name:
Students’ Grade:
/15
Level of Marks: High/Middle/Low
Instructions – PLEASE READ THEM CAREFULLY
• The Assignment must be submitted on Blackboard (WORD format only) via allocated
folder.
• Assignments submitted through email will not be accepted.
• Students are advised to make their work clear and well presented, marks may be
reduced for poor presentation. This includes filling your information on the cover
page.
• Students must mention question number clearly in their answer.
• Late submission will NOT be accepted.
• Avoid plagiarism, the work should be in your own words, copying from students or
other resources without proper referencing will result in ZERO marks. No exceptions.
• All answers must be typed using Times New Roman (size 12, double-spaced) font.
No pictures containing text will be accepted and will be considered plagiarism.
• Submissions without this cover page will NOT be accepted.
1
College of Administration and Finance Sciences
Assignment Question(s):
(Marks 15)
Question 1:
(04 Marks)
Explain what an AIS is, describe the basic tasks it performs in an organization using examples of Saudi
Companies.
Answer:
Question 2:
(03 Marks)
Give examples of Saudi companies that using ERP and what are the advantages of implementing the
ERP?
Answer:
Question 3:
•
(04 Marks)
What motives do people have for hacking? Why has hacking become so popular in
recent years? Do you regard it as a crime? Explain your position.
Answer
2
College of Administration and Finance Sciences
Question 4:
(02 Marks)
Describe at least four ways a company can make fraud less likely to occur.
Answer:
Question 5:
(02 Marks)
Personal information about customers is collected, used, disclosed, and maintained only in compliance
with internal policies and external regulatory requirements and is protected from unauthorized
disclosure. With reference to Privacy Concern how would you deal with SPAM and Identify Theft
problem of your business organization?
Answer:
3
College of Administration and Finance Sciences
Question 1:
(04 Marks)
Explain how Accounting information System (AIS) add value to the organization using examples of
Saudi Companies.
70) How can an AIS add value to the organization?
Answer: An AIS can increase the efficiency and effectiveness of the value chain by improving the
quality and lowering costs of products or services, improving efficiency of operations, improving
decision making, enhancing the sharing of knowledge, improving the efficiency and effectiveness of
its supply chain and improving the internal control structure.
Question 2:
(03 Marks)
Give examples of Saudi companies that using ERP and what are the advantages of implementing the
ERP?
73) Describe four advantages and four disadvantages of implementing an ERP system at a
multinational corporation.
Answer:
Advantages
Integrating information breaks down barriers between departments and streamlines the flow of
information.
Data input is captured or keyed only once.
Management gains greater visibility into every area of the enterprise and has improved monitoring
capabilities.
Better access control is established by consolidating multiple permissions and security models into a
single data access structure.
Standardization of procedures and reports across business units.
Customer service improves as employees can quickly access data.
Increased productivity of employees.
Disadvantages
ERP systems are very costly.
Implementation is time consuming.
Changes to business processes are sometimes required, in order to minimize the customization
needed.
Complexity of the system.
Employees may be resistant to implement and use an ERP system and change business processes.
Question 3:
(04 Marks)
What motives do people have for hacking? Why has hacking become so popular in recent years? Do
you regard it as a crime? Explain your position.
Hacking is the unauthorized access, modification, or use of an electronic device or some element of a
computer system. Hacking represents illegal trespassing and is punishable as a federal crime under
the 1986 Computer Fraud and Abuse Act.
College of Administration and Finance Sciences
Hacking has increased significantly in popularity for several reasons. Perhaps the most important is
the increasing use of personal computers and the Internet and the corresponding rise in the number
and the skill level of the users. In other words, there are more systems to break into, and there are
more people capable of breaking in.
Most hackers are motivated by monetary rewards. Hackers have found many ways to profit
handsomely from their hacking activities. Others hackers seek to destroy data, to make unauthorized
copies of the data, or to damage the system in some way.
Some hackers are motivated by the challenge of breaking and entering a system and many do so with
no intent to do harm. They may feel that hacking is a “right” enjoyed by computer users in a “free
information” society. Many of these benign hackers also argue that hacking rarely does any harm to a
computer system and is acceptable behavior.
Question 4:
(02 Marks)
Identify the corporate opportunities that make fraud easier to commit and detection less likely.
• Set the proper tone to establish a corporate environment contributing to the integrity of the
financial reporting process.
• Identify and understand the factors that can lead to fraudulent financial reporting.
• Assess the risk of fraudulent financial reporting that these factors can cause within the company.
• Design and implement internal controls that provide reasonable assurance that fraudulent
financial reporting is prevented, such as establishing an Internal Audit Department that reports to
the Audit Committee of the Board of Directors.
• Enforce the internal controls
NOTE: Most fraudulent financial reporting fraud is perpetrated by top management, often by
overriding internal controls. While some of the above controls in part d are more likely to prevent
misappropriation of assets, they can still be useful for preventing or deterring fraudulent financial
reporting.
Question 5:
(02 Marks)
Personal information about customers is collected, used, disclosed, and maintained only in compliance
with internal policies and external regulatory requirements and is protected from unauthorized
disclosure. With reference to Privacy Concern how would you deal with SPAM and Identify Theft
problem of your business organization?
Many people may view biometric authentication as invasive. That is, in order to gain access to a
work related location or data, they must provide a very personal image of part of their body such as
their retina, finger or palm print, their voice, etc. Providing such personal information may make
some individuals fearful that the organization collecting the information can use it to monitor them.
In addition, some biometrics can reveal sensitive information. For example, retina scans may detect
hidden health problems – and employees may fear that such techniques will be used by employers
and insurance companies to discriminate against them.
College of Administration and Finance Sciences
RFID tags that are embedded or attached to a person’s clothing would allow anyone with that
particular tag’s frequency to track the exact movements of the “tagged” person. For police tracking
criminals that would be a tremendous asset, but what if criminals were tracking people who they
wanted to rob or whose property they wanted to rob when they knew the person was not at home.
Cell phones and social networking sites are some of the other technologies that might cause privacy
concerns. Most cell phones have GPS capabilities that can be used to track a person’s movement –
and such information is often collected by “apps” that then send it to advertisers. GPS data is also
stored by cell phone service providers.
Social networking sites are another technology that creates privacy concerns. The personal
information that people post on social networking sites may facilitate identity theft.
Le fin