B. Jadwal Kuliah:
Kelas Hari Sesi Waktu Ruang
A Selasa Sesi 4 6 Pukul: 10.15 12.45 5103
B Selasa Sesi 1 3 Pukul: 07.30 10.00 5103
C Senin Sesi 4 6 Pukul: 10.15 12.45 5103
D Senin Sesi 7 9 Pukul: 13.55 16.25 5104
C. Metode dan Bentuk Pembelajaran:
Proses pembelajaran bersifat interaktif, holistik, integratif, saintifik, kontekstual, tematik, efektif, kolaboratif, dan berpusat pada mahasiswa.
Kuliah dilaksanakan dengan metode pembelajaran kolaboratif, yaitu capaian pembelajaran lulusan diraih melalui proses pembelajaran bersama
yang melibatkan interaksi antar individu pembelajar untuk menghasilkan kapitalisasi sikap, pengetahuan, dan keterampilan. Metode pembelajaran
juga studi kasus, serta diskusi kelompok dengan diawali penugasan kelompok yang dikerjakan setelah ujian tengah semester (UTS) dan
dilanjutkan presentasi oleh setiap kelompok dilaksanakan pada 2 (dua) pertemuan di akhir semester.
Bentuk pembelajaran mata kuliah ini adalah kuliah, responsi, dan tutorial, yang dilaksanakan dimulai dengan membahas teori dan kasus-kasus
yang ada di masing-masing chapter sesuai dengan materi yang dibahas. Mahasiswa juga dikenalkan dengan beberapa contoh Sistem Informasi
Akuntansi (SIA) yang ada di beberapa jenis perusahaan (sektor jasa, dagang, dan manufaktur), baik SIA berbasis manual maupun SIA yang
berbasis komputer. Mahasiswa diarahkan terhadap pemahaman dan penguasaan: teknik dan dokumentasi sistem, pengendalian intern, siklus
akuntansi, dan teknologi informasi.
D. Penugasan:
1. Pada setiap awal perkuliahan, dilaksanakan pre-test (quiz) secara tertulis atau lisan untuk topik pembahasan yang sama, guna memastikan
bahwa mahasiswa peserta kuliah telah siap dengan materi topik pembelajaran.
2. Pada setiap akhir perkuliahan, Mahasiswa akan mendapat tugas Pekerjaan Rumah (PR) yang dikerjakan secara individual dan harus
dikumpulkan pada awal perkuliahan (setelah pre-test/quiz) minggu berikutnya.
3. Mahasiswa akan mendapat tugas kelompok pada akhir semester, dimana masing-masing kelompok melakukan analisis terhadap sebuah SIA
perusahaan tertentu dan dipresentasikan pada sesi/pertemuan ke-15 dan ke-16.
E. Penilaian Mahasiswa:
1. Kehadiran Mahasiswa
Kehadiran mahasiswa minimal 75% dari tatap muka yang terjadwal, apabila kurang dinyatakan tidak lulus. Kehadiran mahasiswa tidak menjadi
masukan/input dalam komponen penilaian. Akan tetapi, kehadiran mahasiswa akan menentukan mahasiswa didalam keikutsertaannya dalam ujian
yang terdiri dari 2 (dua) kali, yaitu: Ujian Tengah Semester dan Ujian Akhir Semester.
2. Penilaian Prestasi
a. Ujian Tengah Semester (50%)
1). Partisipasi Kelas : 15%
2). Tugas Individu : 15%
3). Pre-test/Quiz : 20%
4). Ujian Tengah Semester : 50% (ujian tulis/presentasi/ujian lisan, etc.)
b. Ujian Akhir Semester (50%)
1). Partisipasi Kelas : 15%
2). Tugas Individu : 15%
3). Pre-test/Quiz : 20%
4). Tugas Kelompok : 20%
5). Ujian Akhir Semester : 30% (ujian tulis/presentasi/ujian lisan, etc.)
3. Nilai Akhir
Skala 100 Nilai (Angka) Nilai (Huruf)
85 4,00 A
80 84 3,70 A-
75 79 3,30 B+
70 74 3,00 B
65 69 2,70 C+
60 64 2,00 C
55 59 1,00 D
< 55 0,00 E
F. Bahan Kajian
Sessi Pencapaian Kemampuan
Topik Bahasan Referensi per Tahap Pembelajaran
ke:
Penjelasan Silabus 1. Distinguish data from information, discuss the characteristics of useful information, and explain how
Accounting Information Systems: An to determine the value of information.
Overview 2. Explain the decisions an organization makes and the information needed to make them.
3. Identify the information that passes between internal and external parties and an AIS.
1 4. Describe the major business processes present in most companies.
Ch. 1 (R)
5. Explain what an accounting information system (AIS) is and describe its basic functions.
6. Discuss how an AIS can add value to an organization.
7. Explain how an AIS and corporate strategy affect each other.
8. Explain the role an AIS plays in a companys value chain.
1. Describe the four parts of the data processing cycle and the major activities in each.
2. Describe documents and procedures used to collect and process transaction data.
2 Overview of Transaction Processing and 3. Describe the ways information is stored in computer-based information systems.
Ch. 2 (R)
Enterprise Resource Planning Systems 4. Discuss the types of information that an AIS can provide.
5. Discuss how organizations use enterprise resource planning (ERP) systems to process transactions
and provide information.
1. Prepare and use data flow diagrams to understand, evaluate, and document information systems.
2. Prepare and use flowcharts to understand, evaluate, and document information systems.
3. Explain the importance and advantages of databases, as well as the difference between database
systems and file-based legacy systems.
3&4 Systems Documentation Techniques Ch. 3 (R) 4. Explain the difference between logical and physical views of a database
Relational Database Ch. 4 (R) 5. Explain fundamental concepts of database systems such as DBMS, Schemas, The Database
Dictionary, and DBMS languages
6. Describe what a relational database is and how it organizes data.
7. Create a set of well structured tables to store data in a relational database
8. Perform simple queries using the Microsoft access database
5 Ch. 7 (R) 1. Explain basic control concepts and explain why computer control and security are important
Control and Accounting Information Systems
2. Compare and contrast the COBIT, COSO and ERM control framework
3. Describe the major elements in the internal environment of company
4. Descibe the four types of control objectives that company need to set
5. Describe the event that affect uncertainty and the techniques
6. Explain how to assess and respond to risk using the enterprise risk management (ERM) model
7. Describe control activities commonly used in companies
8. Describe how to communicate information and monitor control processes in organization
1. Explain the threats faced by modern information systems
2. Define fraud and describe the process one follows to perpetuate a fraud
3. Discuss who perpetrates fraud and why it occurs, including the pressures, opportunities, and
rationalizations that are present in most frauds
6 Computer Fraud Ch. 5 (R) 4. Define Computer Fraud and discuss the different computer fraud classifications
Computer Fraud and Abuse Techniques Ch. 6 (R) 5. Explain how to prevent and detect computer fraud and abuse
6. Compare and contrast computer attack and abuse tactics
7. Explain how social engineering techniques are used to gain physical or logical access to computer
resources
8. Describe the different types of malware used to harm computers
1. Discuss how the COBIT framework can be used to develop sound internal control over an
organizations information systems.
2. Explain the factors that influence information systems reliability.
Information Systems Control for System 3. Describe how a combination of preventive, detective, and corrective controls can be employed to
Reliability part 1: Information Security Ch. 8 (R) provide reasonable assurance about information security.
Information Systems Control for System 4. Identify and explain controls designed to protect the confidentiality of sensitive corporate
7 Reliability part 2:Confidentiality and Privacy Ch. 9 (R) information.
Information Systems Control for System 5. Identify and explain controls designed to protect the privacy of customers personal information.
Reliability part 3: Processing Integrity and Ch. 10 (R) 6. Explain how the two basic types of encryption systems work.
Availability 7. Identify and explain controls designed to ensure processing integrity.
8. Identify and explain controls designed to ensure systems availability.
1. Explain the basic business activities and related information processing operations performed in the
expenditure cycle.
2. Discuss the key decisions to be made in the expenditure cycle, and identify the information needed
10 The Expenditure Cycle: Purchasing to Cash to make those decisions.
Ch. 13 (R)
Disbursements 3. Identify major threats in the expenditure cycle, and evaluate the adequacy of various control
procedures for dealing with those threats.
1. Describe the major business activities and related information processing operations performed in
the production cycle.
2. Identify major threats in the production cycle and evaluate the adequacy of various control
procedures for dealing with those threats.
3. Explain how a companys cost accounting system can help it achieve its manufacturing goals.
4. Discuss the key decisions that must be made in the production cycle and identify the information
The Production Cycle required to make those decisions.
11 Ch. 14 (R)
The Human Resources Management and 5. Describe the major business activities and related information processing operations performed in
Ch. 15 (R)
Payroll Cycle the human resources management (HRM)/payroll cycle.
6. Discuss the key decisions to be made in the HRM/payroll cycle and identify the information needed
to make those decisions.
7. Identify the major threats in the HRM/payroll cycle and evaluate the adequacy of various internal
control procedures for dealing with them.
1. Describe the information processing operations required to update the general ledger and to
produce reports for internal and external users.
2. Identify the major threats in general ledger and reporting activities and evaluate the adequacy of
various control procedures for dealing with them.
12 3. Understand the implications of new IT developments, such as XBRL, and changes in external
General Ledger and Reporting System Ch. 16 (R) reporting requirements, such as IFRS, for the design and operation of the general ledger and
reporting system.
4. Discuss how tools like responsibility accounting, balanced scorecards, and graphs can be used to
provide information managers need to effectively monitor performance.
G. Daftar Referensi:
1. Referensi Utama:
Romney, Marshall B., Paul John Steinbart. 2015. Accounting Information Systems. 13th Edition. Prentice Hall, Pearson Education, Inc.
(kode: R)
2. Referensi Pendukung