Thursday, November 15, 2018

Sources of management information and management reports


Sources of management information and management reports
1. Sources of management accounting information: Internal sources of information include the financial accounting records and other systems closely tied to the accounting system.
Capturing data/information from inside the organisation involves the following.
(a) A system for collecting or measuring transactions data – eg sales, purchases, inventory and revenue – which sets out procedures for what data is collected, how frequently, by whom and by what methods, and how it is processed and filed or communicated
(b) Informal communication of information between managers and staff (eg, by word of mouth or at meetings)
(c) Communication between managers
1.1 Sources of monetary and non-monetary information
1.1.1 The financial accounting records: You are by now very familiar with the idea of a system of sales ledgers and purchase ledgers, general ledgers, cash books, and so on. These records provide a history of an organisation's monetary transactions.
Some of this information is of great value outside the accounts department – most obviously, for example, sales information for the marketing function. Other information, like cheque numbers, is of purely administrative value within the accounts department.
You will also be aware that, to maintain the integrity of its financial accounting records, an organisation of any size will have systems for and controls over transactions. These also give rise to valuable information.
An inventory control system is the classic example: besides actually recording the monetary value of purchases and inventory in hand for external financial reporting purposes, the system will include purchase orders, goods received notes, goods returned notes, and so on, which can be analysed to provide management information about speed of delivery, say, or the quality of supplies.
1.1.2 Other internal sources: Much information that is not strictly part of the financial accounting records nevertheless is closely tied to the accounting system.
(a) Information about personnel will be linked to the payroll system. Additional information may be obtained from this source if, say, a project is being costed and it is necessary to ascertain the availability and rate of pay of different levels of staff.
(b) Much information will be produced by a production department about machine capacity, movement of materials and work in progress, set up times, maintenance requirements, and so on.
(c) Many service businesses – notably accountants and solicitors – need to keep detailed records of the time spent on various activities, both to justify fees to clients and to assess the efficiency of operations.
Staff themselves are one of the primary sources of internal information. Information may be obtained either informally in the course of day-to-day business or formally through meetings, interviews or questionnaires.
1.2 External sources of information: External information tends to be more relevant to strategic and tactical decisions than to operational decisions. (Benchmarking is an exception.)
Capturing information from outside the organisation might be carried out formally and entrusted to particular individuals, or might be 'informal'.
1.3. Formal collection of data from outside sources: There are many sources of external information.
(a) A company's tax specialists will be expected to gather information about changes in tax law and how this will affect the company.
(b) Obtaining information about any new legislation on health and safety at work, or employment regulations, must be the responsibility of a particular person – for example the company's legal expert or company secretary – who must then pass on the information to other managers affected by it.
(c) Research and development work often relies on information about other R&D work being done by another company or by government institutions. An R&D official might be made responsible for finding out about R&D work outside the company.
(d) Marketing managers need to know about the opinions and buying attitudes of potential customers. To obtain this information, they might carry out market research exercises.
Informal gathering of information from the environment goes on all the time, consciously or unconsciously, because the employees of an organisation learn what is going on in the world around them – perhaps from the media, meetings with business associates or the trade press.
Organisations hold external information, such as invoices and advertisements, from customers and suppliers. However, there are many occasions when an active search outside the organisation is necessary.
1.4 Specific external sources: Secondary data, such as government statistics or data provided by online databases, is not collected by or for the user. Primary data – more expensive than secondary data – is more tailored to the user's exact needs. Market research is an example.
1.4.1 Directories: Examples (of business directories) include the following (although there are many others).
(a) Kompass Register (Kompass)
(b) Who owns Whom (Dun & Bradstreet)
(c) Key British Enterprises (Dun & Bradstreet)
1.4.2 Associations: There are associations in almost every field of business and leisure activity, and ACCA itself is an organisation. Associations collect and publish data for their members that can be of great interest to other users. For example, although the services of the Road Haulage Association (RHA) are geared towards transport businesses, their analysis of fuel prices rises could be useful to all motorists.
1.4.3 Government agencies: The Government is a major source of economic information and information about industry and population trends. Examples of UK Government publications are as follows. Most of these are available online and can be downloaded for free.
(a) National Statistics, divided into 12 separate themes such as economy, health and labour
(b) The Digest of UK Energy Statistics (published annually)
(c) Housing and Construction Statistics (published quarterly)
(d) Financial Statistics (monthly)
(e) Economic Trends now published with Labour Market Trends in the Economic Labour Market Review
(f) Public Sector Employment Trends (annual) gives details of employment in the public sector in the UK
(g) A variety of publications on the Department for Business, Innovation and Skills website give data on industrial and commercial trends at home and overseas
(h) Social Trends (annual)
Official statistics are also published by other government bodies, such as the European Union, the United Nations and local authorities.
1.4.4 Other published sources: This group includes all other publications, including some digests and pocket books and periodicals (often available in public libraries).
1.4.5 Syndicated services: The sources of secondary data we have looked at so far have generally been free because they are in the public domain. Inexpensiveness is an advantage that can be offset by the fact that the information is unspecific and needs considerable analysis before being useable. A middle step between adapting secondary data and commissioning primary research is the purchase of data collected by market research companies. The data tend to be expensive but less costly than primary research.
1.4.6 Consumer panels: A form of continuous research which result in secondary data often bought in by marketers is that generated by consumer panels. These constitute a representative sample of individuals and households whose buying activity in a defined area is monitored either continuously (every day, with results aggregated) or at regular intervals, over a period of time. There are panels set up to monitor purchases of groceries, consumer durables, cars, baby products and many others.
1.5 Information from customers: Customers can provide useful information.
(a) Firms send out satisfaction questionnaires and market research.
(b) Customer comments and complaints sent voluntarily can suggest improvements.
1.6 Information from suppliers: Supplier information comes in several categories.
Information
Comment
'Bid' information
A supplier pitching for a product will detail products, services and prices. This is before a deal is done.
Operational information
If a firm has placed a particular job or contract with a supplier, the supplier may provide details of the stages in the manufacturing process, eg the delivery time.
Pricing information
Component prices vary from industry to industry; some are volatile.
Technology
Technological developments in the supplier's industry can affect the type of input components, their cost and their availability.

1.7 The internet: The internet increases the richness of external data and reduces the cost of searching for it. The internet is a global network connecting millions of computers. The internet offers efficient, fast and cost-effective email, and massive information search and retrieval facilities. There is a great deal of financial information available and users can also access publications and news releases issued by the Treasury and other government departments.
Businesses are also using it to provide information (cheaply) about their own products and services and to conduct research into their competitors' activities.
The internet offers a speedy and impersonal way of getting to know the basics (or even the details) of the services that a company provides.
The internet is commonly used to access information about suppliers.
(a) A firm can visit a supplier's website for details of products and services.
(b) The user can search a number of websites through a browser. Note that the internet may not contain every supplier; arguably it should not be relied on as the sole source.
(c) A number of business to business sites have been opened. Participating members offer their services, and can offer quotes. A lot of the communication search problem is avoided.
1.8 Database information: A management information system or database should provide managers with a useful flow of relevant information which is easy to use and easy to access. Information is an important corporate resource.
Managed and used effectively, it can provide considerable competitive advantage and so it is a worthwhile investment.
It is now possible to access large volumes of generally available information through databases held by public bodies and businesses.
(a) Some companies, such as LexisNexis, charge users a subscription fee to access their electronic database. LexisNexis' clients come primarily from within the legal and accountancy profession, who use the service to access legal and public records related information.
(b) Public databases are also available for inspection.
Dun & Bradstreet provides general business information. AC Nielsen operates online information regarding products and market share.
Developments in information technology allow businesses to have access to the databases of external organisations. Reuters, for example, provides an online information system about money market interest rates and foreign exchange rates to firms involved in money market and foreign exchange dealings, and to the treasury departments of a large number of companies. The growing adoption of technology at point of sale provides a potentially invaluable source of data to both retailer and manufacturer.
1.8.1 Online databases: Most external databases are online databases, which are very large computer files of information supplied by database providers and managed by 'host' companies whose business revenue is generated through charges made to users. Access to such databases is open to anyone prepared to pay and who is equipped with a PC plus internet access and communication software. These days there are an increasing number of companies offering free internet access. Most databases can be accessed around the clock.
1.9 Data warehouses: A data warehouse contains data from a range of internal (for instance sales order processing system, nominal ledger) and external sources. One reason for including individual transaction data in a data warehouse is that the user can drill down to access transaction-level detail if necessary. Data is increasingly obtained from newer channels, such as customer care systems, outside agencies or websites.
The warehouse provides a coherent set of information to be used across the organisation for management analysis and decision-making. The reporting and query tools available within the warehouse should facilitate management reporting and analysis. This analysis can be enhanced through using data mining software to identify trends and patterns in the data.

2. Information for control purposes: Much control is achieved through the feedback of internal information.
Control is dependent on the receipt and processing of information, both to plan in the first place and to compare actual results against the plan, so as to judge what control measures are needed.
Plans will be based on an awareness of the environment (from externally sourced information) and on the current performance of the organisation (based on internal information such as, for example, sales volumes and costs).
Control is achieved through feedback – information about actual results produced from within the organisation (that is, internal information) such as variance control reports for the purpose of helping management with control decisions.
The sources of information outlined earlier in the chapter are used to supply management with data for control.
For instance, payroll records give information on the total cost of staff and a breakdown into cost by function, role, bonuses, taxes, and so on which can show management how different cost areas are performing. As payroll is often a large cost and to some extent discretionary or variable, it is important to monitor and control.
Equally, information on wage payments will also be relevant to an organisation's cash flow planning. As far as possible, organisations like to keep their cash balances within certain limits. So, by knowing the amount and timing of wages and salary payments, the organisation can make any adjustments to ensure cash balances remain within the desired limits.
Information about inventory levels can also be instructive. For example, some lines of inventory may be slow moving, but management will need to establish why this is. Has a competitor introduced a rival product, or reduced its prices? Have there been any quality issues with the product which have damaged its reputation in the marketplace? Is the product in a long-term decline and should production of it be discontinued? In this respect, information about quantities of a product sold compared with quantities produced could also be very useful. For example, if a product is selling very well, production may need to be increased so that demand can be satisfied and any stock-outs avoided.
Customer data is vital in any business that strives to focus on customers. Thus data on buying habits, where customers shop, what they buy and who the main customers are all give feedback for control purposes.
Equally, data from customer sales accounts can provide useful information on how customer debts are aged. A report on the ageing of debt can provide management with information on how successful its receivables control policy is. Management's response will be different if half the customer debt has been outstanding for more than say, 60 days, compared with only 5% of the debt being outstanding for more than 60 days.
External data is useful for benchmarking provided the correct or appropriate benchmarks are selected.

3. Costs of information: Be aware of the cost of inefficient use of information.
The costs to an organisation of the collection, processing and production of internal information can be divided into three types. These are direct data capture costs, process costs, and indirect costs of producing internal information.
Cost
Examples
Direct data capture
·       Use of bar coding and scanners (eg in retailing and manufacturing)
·       Employee time spent filling in timesheets
·       Secretary time spent taking minutes at a meeting
Processing
·       Payroll department time spent processing and analysing personnel costs
·       Time for personnel to input data (eg in relation to production) on to the MIS
Inefficient use of information
·       Information collected but not needed
·       Information stored long after it is needed
·       Information disseminated more widely than necessary
·       Collection of the same information by more than one method
·       Duplication of information

4. Costs, benefits and limitations of external information: There are specific costs not only in obtaining data but also in maintaining the infrastructure supporting data collection and distribution.
4.1 Costs: Identifying the costs of obtaining external data is not difficult. Effectively there are five types of cost.


Cost
Examples
Direct search costs
·             Cost of a marketing research survey (this can be considerable)
·             Subscriptions to online databases
·             Subscriptions to magazines, services
·             Download fees
Indirect access costs
·            Management and employee time spent finding useful information
·            Wasted management and employee time on unsuccessful searches for information
·            Spurious accuracy / redundancy
·            Wasted management and employee time on excessive searching
·            Wasted time on trying to find spurious accuracy
Management costs
·             Recording, processing and dissemination of external information
·             Wasted time due to information overload
·             Wasted time on excessive processing
Infrastructure costs
·             Installation and maintenance of computer networks, servers, landlines, etc to facilitate internet searching and internal electronic communication
Time theft
·            Wasted time caused by abuse of internet and email access facilities
·            Lost time
·            Cost of monitoring and disciplinary procedures
·            Information overload
As can be seen from the earlier case example, the internet can significantly reduce search time and cost. More information can be had for less money.
a.2   Benefits and limitations of external data: The benefits can be quantified in the following terms.
(a) The quality of decisions that the data has influenced
(b) Risk/uncertainties avoided by having the data
(c) The organisation's ability to respond appropriately to the environment or to improve its performance
One of the principal limitations of external data is that its quality cannot be guaranteed. Its quality will depend on the following characteristics.
(a) The producers of the data (they may have an axe to grind; trade associations may not include data which runs counter to the interests of its members)
(b) The reason for the data being collected in the first place
(c) The collection method (random samples with a poor response rate are particularly questionable)
(d) The age of the data (government statistics and information based on them are often relatively dated, though information technology has speeded up the process)
(e) How parameters were defined (for instance, the definition of family used by some researchers could well be very different to that used by others)
Using poor quality external data can have disastrous consequences: projects may proceed on the basis of overstated demand levels; opportunities may not be grasped because data is out of date and does not show the true state of the market.
4.2.1 Advantages arising from the use of secondary (as opposed to primary) data
(a) The data may solve the problem without the need for any primary research: time and money is thereby saved.
(b) Cost savings can be substantial because secondary data sources are a great deal cheaper than those for primary research.
(c) Secondary data, while not necessarily fulfilling all the needs of the business, can be of great use:
(i) Setting the parameters, defining a hypothesis, highlighting variables; in other words, helping to focus on the central problem
(ii) Providing guidance, by showing past methods of research and so on, for primary data collection
(iii) Helping to assimilate the primary research with past research, highlighting trends and the like
(iv) Defining sampling parameters (target populations, variables, and so on)
a.2.2          Disadvantages to the use of secondary data
(a) Relevance. The data may not be relevant to the research objectives in terms of the data content itself, classifications used or units of measurement.
(b) Cost. Although secondary data is usually cheaper than primary data, some specialist reports can cost large amounts of money. A cost-benefit analysis will determine whether such secondary data should be used or whether primary research would be more economical.
(c) Availability. Secondary data may not exist in the specific product or market area.
(d) Bias. The secondary data may be biased, depending on who originally carried it out and for what purpose. Attempts should be made to obtain the most original source of the data, to assess it for such bias.
(e) Accuracy. The accuracy of the data should be questioned.
The golden rule when using secondary data is use only meaningful data. It is obviously sensible to begin with internal sources and a firm with a good management information system should be able to provide a great deal of data. External information should be consulted in order of ease and speed of access.

5. Controls over generating and distributing internal information
Controls need to be in place over the generation of internal information in routine and ad-hoc reports.
5.1   Controls over generating internal information in routine reports
(a) Carry out a cost-benefit analysis. How easy is the report to prepare compared with the usefulness of the decisions that can be taken as a result of its production? The cost of preparing the report will in part be determined by who is preparing it. The cost can be reduced if its preparation can be delegated by a director to a junior member of staff.
(b) A trial preparation process should be carried out and a prototype prepared. Users should be asked to confirm that their requirements will be met.
(c) A consistent format and consistent definitions should be used to ensure that reporting is accurate and the chance of misinterpretation is minimised. Standard house styles will ensure that time is not wasted by managers, staff and report writers on designing alternative layouts.
(d) The originator of the report should be clearly identified so that users' queries can be dealt with quickly.
(e) The report should clearly set out limits to the action that users can take as a result of the information in the report. This will ensure that the organisation's system of responsibilities is maintained.
(f) The usefulness of the report should be assessed on a periodic basis to ensure that its production is necessary.
5.2   Controls over generating internal information in ad hoc reports
(a) Carry out a cost-benefit analysis as above.
(b) Ensure that the required information does not already exist in another format.
(c) Brief the report writer so that only the relevant information is provided.
(d) Ensure that the originator is clearly identified.
(e) Ensure that report writers have access to the most up-to-date information.
5.3 Controls over distributing internal information: A procedures manual sets out controls over distributing internal information.
(a) Procedures manual (for standard reports)
(i) Indicates what standard reports should be issued and when (eg budgetary control report for department X on a monthly basis)
(ii) Sets out the format of standard reports
(iii) Makes clear who should receive particular standard reports
(iv) Indicates whether reports should be shredded (if confidential) or just binned
(v) Makes clear what information should be regarded as highly confidential
(b) Other controls
(i) Payroll and personnel information should be kept in a locked cabinet or be protected by password access on a computer system.
(ii) All employees should be contractually required not to divulge confidential information.
(iii) The internal mail system should make use of 'private and confidential' stamps.
(iv) An appropriate email policy should be set up.
1. Email is best suited to short messages rather than detailed operational problems.
2. Email provides a relatively permanent means of communication, which may be undesirable for confidential/'off-the-record' exchanges.
3. Staff may suffer from information overload.
4. It is uncomfortable to read more than a full screen of information. Longer messages will either not be read properly or will be printed out (in which case they may just as well have been circulated in hard-copy form).
(v) Physical computer security
Internal security. Management can regulate which staff members have access to different types of data. For instance, access to HR records may be restricted to members of the HR team by keeping these records on a separate server or database. In this way, only certain terminals may access servers with sensitive or confidential data stored on them.
External security. The organisation can also protect its data from external access by using firewalls.
A firewall is designed to restrict access to a network by selectively allowing or blocking inbound traffic to parts of an organisation's system. It examines messages entering and exiting the system and blocks any that do not conform to specified criteria. In this way, firewalls can be used to protect data and databases from being accessed by unauthorised people or terminals. For example, access to key servers could be restricted to a small number of terminals only.
5.3   If information is held on a server
(a) Controls over viruses and hacking
(b) Clearly understood policy on the use of emails and corporate IT
(c) Password system to restrict access to particular files

6. Security and confidential information:  Disaffected employees have potential to do deliberate damage to valuable corporate data or systems, especially if the information system is networked, because they may have access to parts of the system that they are not really authorised to use.
If the organisation is linked to an external network, people outside the company (hackers) may also be able to get into the company's internal network, either to steal data or to damage the system.
Various procedures are therefore necessary to ensure the security of highly confidential information that is not for external consumption.
6.1 Passwords: Passwords are a set of characters allocated to a person, terminal or facility which have to be keyed into the system before further access is permitted.
In order to access a system the user first needs to enter a string of characters. If what is entered matches a password issued to an authorised user or valid for that particular terminal, the system permits access. Otherwise the system shuts down and may record the attempted unauthorised access.
Keeping track of these attempts can alert managers to repeated efforts to break into the system; in these cases the culprits might be caught, particularly if there is an apparent pattern to their efforts.
The restriction of access to a system with passwords is effective and widely used but the widespread and growing use of PCs and networks is making physical isolation virtually impossible. The wider use of information systems requires that access to the system becomes equally widespread and easy.
Requirements for system security must be balanced by the operational requirements for access: rigidly enforced isolation of the system may significantly reduce the value of the system.
6.2 Logical access systems: While physical access control (doors, locks, and so on) is concerned with the prevention of unauthorised persons gaining access to the hardware, logical access control is concerned with preventing those who already have access to a terminal or a computer from gaining access to data or software.
In a logical access system, data and software or individual computer systems will be classified according to the sensitivity and confidentiality of data.
(a) Payroll data or details of the draft corporate budget for the coming year may thus be perceived as highly sensitive and made available to identified individuals only.
(b) Other financial information may be made available to certain groups of staff only, for example members of the finance function or a certain grade of management.
(c) Other data may be unrestricted.
A logical access system performs three operations when access is requested.
(a) Identification of the user
(b) Authentication of user identity
(c) Check on user authority
6.3 Database controls: Databases present a particular problem for computer security. In theory, the database can be accessed by large numbers of people, and so the possibility of alteration, unauthorised disclosure or fraud is so much greater than with application-specific files.
It is possible to construct complicated password systems, and the system can be programmed to give a limited view of its contents to particular users or restrict the disclosure of certain types of information to particular times of day. It is possible to build a set of privileges into the system, allowing authorised users with a particular password to access more information.
There are problems ensuring that individuals do not circumvent the database by means of inference, however. If you ask enough questions, you should be able to infer from the replies the information you are really seeking.
For example, the database forbids you to ask if John is employee Category A. However, if you know there are only three employee categories, A, B, and C, and there is no prohibition on asking about categories B and C, you can work out the members of category A by process of elimination (ie neither B, nor C, therefore A).
These so-called inference controls exist to make this difficult by limiting the number of queries, or by controlling the overlap between questions.
6.4 Firewalls: Systems can have firewalls to prevent unauthorised access into company systems. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorised internet users from accessing private networks connected to the internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet specified security criteria.
As well as preventing unauthorised access onto company systems, firewalls can also be used to help protect a company's data from corruption by viruses.
6.5 Encryption: Information transmitted from one part of an organisation to another may be intercepted. Data can be encrypted (scrambled) in an attempt to make it unintelligible to eavesdroppers.
6.6 Other safety measures: Authentication is a technique for making sure that a message has come from an authorised sender.
Dial back security operates by requiring the person wanting access to the network to dial into it and identify themselves first. The system then dials the person back on their authorised number before allowing them access.
All attempted violations of security should be automatically logged and the log checked regularly. In a multi-user system, the terminal attempting the violation may be automatically disconnected.
6.7 Personal data: In recent years there has been a growing popular fear that information about individuals which is stored on computer files and processed by computer can be misused.
In particular, it is felt that an individual could easily be harmed by the existence of computerised data about themselves which was inaccurate or misleading and which could be transferred to unauthorised third parties at high speed and little cost.
As a result, most countries have introduced legislation designed to protect the individual. In the UK, the current legislation is the Data Protection Act 1998.
6.8 Personnel security planning: Certain employees will always be placed in a position of trust; for example, senior systems analysts, the database administrator and the computer security officer. With the growth of networks, almost all employees may be in a position to do damage to a computer system. A recent report claims that 80% of hacking is done by employees.
Although most employees are honest and well intentioned, it may be relatively easy for individuals to compromise the security of an organisation if they wish to do so. The following types of measure are therefore necessary.
(a) Careful recruitment
(b) Job rotation
(c) Supervision and observation by a superior
(d) Review of computer usage (eg via systems logs)
(e) Enforced vacations
The key is that security should depend on the minimum possible number of personnel. Although this is a weakness, it is also a strength.
6.9 Anti-virus and anti-spyware software: The growth of the internet has led to increased exposure to security risks. Two particular risks derive from exposure to computer viruses and to spyware.
Computer viruses typically arrive by email and are triggered when the user opens the email and an attachment. The virus is a self-replicating computer program that infiltrates and then damages a computer system.
Spyware is a type of program that watches what users do with their computer and then sends that information over the internet to a third party. Customers of online bank accounts have experienced particular problems with spyware when their personal financial data has been captured by keylogging software.
Software has been developed to counteract these risks. Anti-virus software works to achieve this by:
(a) Scanning files to look for known viruses
(b) Identifying suspicious behaviour from any computer program that might indicate infection
Anti-spyware software combats spyware in two ways.
(a) Real-time protection which prevents the installation of spyware by blocking software and activities known to represent spyware
(b) Detection and removal of spyware by scanning software and removing files and entries that match known spyware

No comments:

Post a Comment

SBR Notes IAS 16

IAS 16: Property, plant and equipment Ø   Definition Ø   Initial Measurement Ø   Subsequent Measurement 1.        Cost 2.      ...