ig ig
Instructor’s Solutions
Manual
Accounting Information
Systems
15th Edition
3-1
Copyright (c) 2021 Pearson Education, Inc.
ig ig ig ig ig
, Accounting Information Systems
ig ig
3-2
Copyright (c) 2021 Pearson Education, Inc.
ig ig ig ig ig
, Accounting Information Systems ig ig
chapter 1 ig
accountinginformationsystems ig i
g
: An overview
ig ig
Suggested Answers to Discussion Questions
ig ig ig ig
1.1 The value of information is the difference between the benef
ig ig ig ig ig ig ig ig ig
its realized from using that information and the costs of pro
ig ig ig ig ig ig ig ig ig ig
ducing it. Would you, or any organization,ever produce inf
ig i g ig ig ig ig i
g ig ig
ormation if its expected costs exceededits benefits? If so, p
ig ig ig ig ig i
g ig ig ig ig
rovide some examples. If not, why?ig ig ig ig ig
Most organizations produce information only if its valueexce
ig ig ig ig ig ig ig i
g
eds its cost. However, there are two situations where inform
ig ig i g ig ig ig ig ig ig
ation may be produced even if its cost exceeds its value.
ig ig ig ig ig ig ig ig ig ig
a. It is often difficult to estimate accurately the value o
ig ig ig ig ig ig ig ig ig
f information and the cost of producing it. Therefore, o
ig ig ig ig ig ig ig ig ig
rganizations may produce information that they expect w ig ig ig ig ig ig ig
ill produce benefits in excess ofits costs, only to be dis
ig ig ig ig ig i
g ig ig ig ig ig
appointed after the fact. ig ig ig
b. Production of the information may be mandated by either a ig ig ig ig ig ig ig ig ig
government agency or a private organization. Examples i
ig ig ig ig ig ig ig ig
nclude the tax reports required by the IRS and disclosureig ig ig ig ig ig ig ig ig
requirements forfinancial reporting.
ig ig i
g ig
1.2 Can the characteristics of useful information listed inTabl
ig ig ig ig ig ig ig i
g
e 1-
ig
1 be met simultaneously? Or does achieving onemean sacrifici
ig ig ig ig ig ig ig i
g ig
ng another?
ig
Several of the criteria in Table 1.1 can be met simultaneously
ig ig ig ig ig ig ig ig ig ig
. For example, more timely information is
i g ig ig ig ig ig
3-3
Copyright (c) 2021 Pearson Education, Inc. ig ig ig ig ig
, Accounting Information Systems ig ig
also likely to be more relevant.
ig ig ig ig ig i g Verifiable informationis li ig i
g ig
kely to be more accurate. ig ig ig ig
However, achieving one objective may require sacrificinganot ig ig ig ig ig ig i
g
her. For example, ensuring that information is morecomplete
i g ig ig ig ig ig ig i
g i
may reduce its timeliness. Similarly, increased verifiabi
g ig ig ig i g ig ig
lity and accuracy may reduce its timeliness.
ig ig ig ig ig ig
The decision maker must decide which trade-
ig ig ig ig ig ig
offs arewarranted in each situation.
ig i
g ig ig ig
1.3 You and a few of your classmates decided to become entreprene
ig ig ig ig ig ig ig ig ig ig
urs. You came up with a great idea for a newmobile phone appl
i g ig ig ig ig ig ig ig ig ig i
g ig ig
ication that you think will make lots of money. Your business
ig ig ig ig ig ig ig ig ig ig ig
plan won second place in a local competition, and you are usin
ig ig ig ig ig ig ig ig ig ig ig
g the $10,000 prize to support yourselves as you start your co
ig ig ig ig ig ig ig ig ig ig ig
mpany.
a. Identify the key decisions you need to make to be successfu ig ig ig ig ig ig ig ig ig ig
l entrepreneurs, the information you need tomake them, and
ig ig ig ig ig ig i
g ig ig ig
the business processes you will need to engage in.
ig ig ig ig ig ig ig ig
b. Your company will need to exchange information withvario
ig ig ig ig ig ig ig i
g
us external parties. Identify the external parties, and
ig ig ig ig ig ig ig ig
specify the information received from and sent to each of ig ig ig ig ig ig ig ig ig
them. ig
The author turns this question into an in-
ig ig ig ig ig ig ig
class groupactivity. Students are divided up in groups, to
ig i
g ig ig ig ig ig ig ig
ld toclose their books, and given 15 minutes to:
ig i
g ig ig ig ig ig ig ig
a. Think through the business processes, key decisions,and ig ig ig ig ig ig i
g ig
information needs issues in their group. ig ig ig ig ig
b. Identify the external users of information and specif ig ig ig ig ig ig ig
y the information received from and sent toeach of them
ig ig ig ig ig ig ig i
g ig ig
.
One group is selected to present their answers to the class. Th
ig ig ig ig ig ig ig ig ig ig ig
e other groups are told to challenge the group’s answers, prov
ig ig ig ig ig ig ig ig ig ig
ide alternative answers, and chip in with additional answers
ig ig ig ig ig ig ig ig ig
not provided by the selected group. Since the group that prese
ig ig ig ig ig ig ig ig ig ig
nts is not selected until after the time has expired, students
ig ig ig ig ig ig ig ig ig ig ig
are motivatedto do a good job, as they will be presenting to the
ig i
g ig ig ig ig ig ig ig ig ig ig ig
ir peers.ig
The value of this activity is not in arriving at a
ig ig ig ig ig ig ig ig ig ig
3-4
Copyright (c) 2021 Pearson Education, Inc. ig ig ig ig ig