Beruflich Dokumente
Kultur Dokumente
PBL SESSION 1
a)
to produce information. For example, the business needs to collect data about a sale such as data
and total amount; the resource sold which are good or service, quantities sold and unit price, and
the people who participated who are customer and salesperson.
Information is data that have been organized and processed to provide meaning to a user.
The value of information is the benefit produced by the information minus the cost of producing
it. Benefits of information are reduced uncertainty, improved decisions, and improved ability to
plan and schedule activities. The costs are the time and resources spent to produce and distribute
the information. Information costs and benefits can be difficult to quantify, and it is difficult to
determine the value of information before it has been produced and utilized.
There are seven characteristics that make information useful and meaningful. Relevant
information is needed to reduce uncertainty, improves decision making, or confirms or corrects
prior expectations. Information must be reliable because it free from error or bias and accurately
represents organization events or activities. Complete information does not omit important
aspects of the events or activities it measures. Timely is about information provided in time for
decision makers to make decisions. Information that presented in a useful and intelligible format
is called understandable information. Verifiable information is two independent, knowledgeable
people produce the same information. While, accessible information is available to users when
they need it and in a format they can use.
Based on the case of Tesci Stores (Malaysia) Sdn Bhd, they had introduced their
Kelabcard. The information needed to filled the Kelabcard application are customer names,
contact information including email address, demographic information such as postcode,
preferences and interests, and other information relevant to customer surveys and offers. Once
the customer has the Kelabcard, they are qualifying for the discounts. Therefore, Tesci should set
up their computers record everything a customer purchases.
AC220 5A
Page 1
AC220 5A
Page 2
How do you think Tesci has motivated customers to sign up for its Kelabcard programme?
Tesci may motivate their customers to sign up for its Kelabcard programme by offer
discount to their customer. Besides that, customers may gain a point for every Ringgit that they
spend at any of Tesci stores as well as the partner stores, and have a special promotion once they
have being a Kelabcard member.
Generally, loyal customer has a high potential to sign up for this Kelabcard since they
may enjoy a low price compare to a non-member of Kelabcard when they buy goods at any Tesci
stores. Every single item that they bought from Tesci will entitle for discount. Hence, Tesci may
encourage more sales which are prompt customers to make additional purchases. This will
benefit both parties either the Tesci itself where they may increase their sale and attract others to
retail in their store. For the customer, they might buy the items with a discount rate where
approach them back to Tesci to buy the items.
Another way to motivate customers to sign up for Tesci Kelabcard is customer may
collect point for every Ringgit they spend. Tesci Kelabcard holder benefit when shopping at any
Tesci Stores. For example, they enjoy 1 point for every RM1 they spend, and double points on
special offers. These points are stored and built up and 4 times a year the holder receives
vouchers to the value of points they have saved. Vouchers can be spent in store on shopping or
used on Kelabcard Deals where they are worth 4 times the value. They also entitled to free
access to the Kelabcard clubs which include healthy food, baby and toddler, and food.
Special promotion given to customer may attract them to sign up their Kelabcard. Mostly
people will spend a lot of their money during a big sale. They believe that is the right time for
them to control their cash flow. Hence, Tesci may win greater share of wallet and able to make a
profit to their business operation. Besides that, it helps in keeping customers from deflecting.
Special promotion can be done in seasonal basis. For instance, during festive season, Tesci may
organize a special promotion to member of Kelabcard either by allow them to buy an exclusive
product with a low price. Special promotion also can be in form of rebates.
AC220 5A
Page 3
What can Tesci accomplish with the Kelabcard data it collects? Think in terms of strategy
and competitive advantage.
Since Tesci had gather information about their customer, they might use the data to
accomplish any improvement in their business operation. Therefore, Tesci may impose any
suitable strategies and competitive advantage.
One of the strategies is cross marketing. This is the most effective strategy where a sales
marketing secret that works better for business that have the same target audience, but are not
direct competition with each other. Doing cross promotions with other businesses increase
Tescis profit, sales and beat their competition. Tesci can discover their customer unique buying
habits by using the data provided by them before. In the other word, cross marketing is an
analysis of customer data allows Tesci to discover unique buying habits. For instance, men who
purchased diapers for newborns buy more beer than the normal male which presumably because
they are more likely to stay at home and less likely to go out.
Second strategy is Tesci should improve decision making. Decision making taking into
those steps which are identify problem, select a method for solving the problem, collect data
needed to execute the decision model, interpret the outputs of the model, evaluate the merits of
each alternative and choose and execute the preferred solution. By using data on purchases and
the ethnic makeup of the neighborhoods surroundings the stores, Tesci is able to stock goods that
have a greater customer appeal. Tesci may replace the store which the customer was not buying
complete meals with the stores which offered more foreign products.
Third strategy and competitive advantage is customer loyalty. Loyalty program is a
structured marketing effort that reward and therefore encourage loyal buying behavior which is
potentially beneficial to the Tesci. Tesci should use Kelabcard data to neutralize competitors
most significant advantage. For example, Tesci may identify certain items that price-sensitive
shoppers frequently purchased and lowered their prices. This kept the customers most likely to
shop at competitors store from defecting.
AC220 5A
Page 4
AC220 5A
Page 5
AC220 5A
Page 6
State and briefly explain four (4) examples of Revenue Cycle Activities.
Revenue cycle is a recurring set of business activities and related information processing
operations associated with providing goods and services to customers and collecting cash in
payment for those sales. There are four basic business activities that performed in the revenue
cycle which are sales order entry, shipping, billing and cash collection.
Sales order entry is process of taking the customers order, checking and approving
customer credit and also checking inventory availability. All of these processes is recorded in the
sales order document. The document is usually an electronic form displayed on a computer
monitor screen. By using a computer monitor screen, it can lead to a threat during sales order
such as the important data about the order will be either missing or inaccurate. This can be
preventing by using Enterprise Resources Planning (ERP) system by using a variety data entry
edit control. For example, complete checks on the data in order to make sure all of the data are
entered.
The other activity is shipping which refer to fill customer orders and shipping the desired
materials. It involves two steps which are picking and packing order and shipping the order. One
potential threat that can be incurred during the process is the risk of picking the wrong items or
in the wrong quantity. This problem can be avoided by using bar-code and RFID scanners. This
is because, the system can compare the items and quantities recorded with the information on the
sales orders.
The next activities is billing customer. The primary objectives of the billing are to ensure
that customers are billed for all sales that invoices are accurately maintained. The main threat for
this activity is failure to bill the customers that will result in erroneous data about the sales,
inventory and accounts receivable. This threat can be control by do a segregation duties
regarding the shipping and billing function.
AC220 5A
Page 7
b.
State and briefly explain four (4) examples of Expenditure Cycle Activities.
Expenditure cycle consists of the processes a company undergoes to determine the
materials needed and the costs of those materials to produce a finished product. The four
examples in expenditure cycle activities are ordering goods, supplies and service, receiving
and storing, approving supplier invoices and cash disbursements.
Ordering goods, suppliers and service is the process that involve identifying what,
when, and how much to purchase and from whom to purchase. One of the threats of this process
is purchasing goods of inferior quality. This risk can be reduce by requiring suppliers to possess
quality certification and collecting and always monitoring supplier delivery performance in order
to make sure the goods that they produce are in high quality.
Next activity is receiving and storing of ordered items. This process incurred when the
deliveries from suppliers are arrived. The general threat is by accepting unordered items that will
results in cost associated with unloading, storing and later returning those items. The best control
procedure that can be used is to instruct the receiving department to accept only deliveries for
which there is an approved purchase order.
Besides that, approving supplier invoices for payment. One threat that can be occur is
errors on supplier invoices, for example, miscalculations of the total amount due. This problem
can be prevented by verification of the invoice accuracy in order to make sure the amount or
quantity in the invoice is correct.
AC220 5A
Page 8
AC220 5A
Page 9
Provided that Proterm Automobile Industries Sdn Bhds revenue and expenditure
cycle activities depend on the integrated database that contains information about
suppliers, inventory and purchasing activities, explain the threats and controls be
experienced by Proterm Automobile Industries Sdn Bhd in its expenditure cycle.
All expenditure cycle activities depend on integrated database that contains information
about suppliers, inventory and also purchase activities. Proterm Automobile Industries Sdn Bhd
has experience several threat and controls in its expenditure cycle. There have five activities
occur in the expenditure cycle which is consists with general issues throughout entire
expenditure cycle, ordering, receiving, approving supplier invoices and also cash disbursements.
The treats may happen in general issues throughout entire expenditure cycle in Proterm
Automobile Sdn Bhd areinaccurate or invalid master data. This is because of several errors
such as error in the supplier master data could result in ordering from unapproved suppliers,
purchasing materials inferior quality, untimely deliveries, sending payments in the wrong address
and fraudulent disbursement to fictitious suppliers. Errors in inventory master data can result in
production delay due to unanticipated shortages of key materials or unnecessary purchase and
excess inventory. While errors in purchasing master data can result in unauthorized purchase and
failure to take advantage of negotiated discounts. In order to control this threat, the best way is to
restrict access to expenditure cycle master data and configure the system so that only authorized
employees can makes changes in the master data.These threats can also be mitigate by employ
the data processing integrity control. The processing data entry control can ensure that the data is
processed correctly and authorised. For example, Proterm Automobile Industries Sdn Bhd can
make a proper segregation of duties for their employees. A proper segregation of duties here
means that by permitting only a certain person who are responsible for recording or keying any
data of the supplier the information and authorised it. They also need to make sure the
information is reliable and acceptable.
Next threat is unauthorized disclosure of sensitive information such as banking
information about suppliers and special pricing discounts offered by preferred suppliers. This
threat can be control by to configure the system to employ strong access controls that limit who
can view such information. Access control should be utilized by using password or IDs. It is very
important to avoid others people to view important or sensitive information of the company.
AC220 5A
Page 10
AC220 5A
Page 11
AC220 5A
Page 12
AC220 5A
Page 13
AC220 5A
Page 14
AC220 5A
Page 15