UAS Tutorial Marathon BPF
UAS Tutorial Marathon BPF
DFD Nol:
• Contoh penomoran proses di dalam
DFD Nol adalah 1.0, 2.0, 3.0, 4.0 dst.
• Minimal terdiri dari dua proses.
• Boleh ada data store.
FIGURE 3-7
Level 1 DFD for Process
2.0 in S&S Payroll
Processing
DFD Rinci:
• Contoh penomoran proses di dalam DFD Rinci adalah:
✓ 1.1, 1.2, 1.3, 1.4 dst untuk DFD Rinci 1.0
✓ 2.1, 2.2, 2.3, 2.4 dst untuk DFD Rinci 2.0
✓ 1.1.1, 1.1.2, 1.1.3, 1.1.4 dst untuk DFD Rinci 1.1
✓ 3.1.1, 3.1.2, 3.1.3, 3.1.4 dst untuk DFD Rinci 3.1
• Minimal terdiri dari dua proses.
• Boleh ada data store.
DFD Nol
DFD Konteks
(1 Diagram)
(1 Diagram)
DFD Rinci
(Banyak Diagram)
Contoh DFD Konteks
“Payroll Processing System at S&S
FIGURE 3-6
Level 0 DFD
for S&S Payroll Processing
• Nama aliran data merupakan nama paket data
Surat_pesanan 1.0
Pelanggan Mencatat Pesanan
Pesanan
Kamus data:
Surat_Pesanan = NoPesan+tglpesan+kdplg+nmplg+alamat+tlp+{kdbrg+nmbrg+jml+hrg+totalbrg}+totalseluruh
NoPesan
TglPesan
KdPlg 1.0
Pelanggan NmPlg Mencatat Pesanan
Pesanan
Alamat
Tlp
• Untuk proses yang tidak memiliki rinci maka diakhir nomor proses
diberikan tanda * contoh: 4.3* maka proses 4.3 tidak ada DFD
Rincinya.
ppp
• Misal:
4.1 4.2
xxxxxxx yyyyyy nnnn
xxxxxx yyyyy
BBBBBB
aaaaa ccc
ggg
4.3*
zzzzzzzz
dddd
zzzz
dddd dddd
dddd dddd
eeee
dddd eeee
(a)
(b) (c)
dddd dddd
dddd
dddd
eeee
dddd
eeee
eeee eeee
(d) (f)
(e)
• Nama aliran data input ke suatu proses tidak boleh sama dengan
nama aliran data outputnya.
dddd dddd
dddd dddd
eeee
dddd eeee
(a)
(b) (c)
dddd dddd
dddd
dddd
eeee
dddd
eeee
eeee eeee
(d) (f)
(e)
SYSTEMS ANALYSIS AND DESIGN METHODS 6th Edition Whitten Bentley Dittman
Chapter 16
HR management
and payroll cycle
2.1 4.2
1.1 1.2 2.2 3.1 3.2 4.1
Calculate Manage
Employee Employee Disburse PM PM Identify
Payroll Employee
selection induction payroll assessment adjustment terminations
Liabilities exit
Source: Accounting Information Systems – Understanding Business Processes – 4th Edition – B.Considine, A.Parkes, K.Olesen, Y.Blount, D. Speer – WILEY – John Wiley & Sons Australia, Ltd.
HR Management and Payroll Cycle Documentation
Source: Accounting Information Systems – Understanding Business Processes – 4th Edition – B.Considine, A.Parkes, K.Olesen, Y.Blount, D. Speer – WILEY – John Wiley & Sons Australia, Ltd.
HR Management and
Payroll Cycle Documentation
Source:
Accounting Information Systems –
Understanding Business Processes –
4th Edition –
B.Considine, A.Parkes, K.Olesen, Y.Blount, D. Speer –
WILEY – John Wiley & Sons Australia, Ltd.
Acknowledgement
These slides have been adapted from:
Chapter 16
FIGURE 12-2
The Context Diagram
of the Revenue Cycle
Introduction
FIGURE 12-3
Level 0 Data Flow Diagram:
Revenue Cycle
Introduction
FIGURE 13-2
Level 0 Data Flow Diagram for
The Expenditure Cycle
Introduction
FIGURE 14-2
Level 0
Data Flow Diagram
of the Production
Cycle
(annotated to
include threats)
Payroll Cycle Activities
FIGURE 15-3
Context Diagram of the Payroll Portion of the HRM/Payroll Cycle
Payroll Cycle Activities
FIGURE 15-4
Level 0
Data Flow Diagram
for the Payroll Cycle
Introduction
FIGURE 16-1 Context Diagram of the General Ledger and Reporting System
General Ledger
and Reporting System
FIGURE 16-2
Level 0 Data Flow Diagram of
the General Ledger and Reporting Cycle
(annotated to include threats)
Session 23-24
Integrated System
(Integrated Processes)
INTEGRATED
PROCESS
EXECUTION
Introduction
FIGURE 14-2
Level 0
Data Flow Diagram
of the Production
Cycle
(annotated to
include threats)
Overview of
Control Concepts
Internal controls perform three important functions:
1. Preventive controls – Controls that deter problems before
they arise. Examples include hiring qualified personnel,
segregating employee duties, and controlling physical
access to assets and information.
2. Detective controls – Controls designed to discover control
problems that were not prevented. Examples include
duplicate checking of calculations and preparing bank
reconciliations and monthly trial balances.
3. Corrective controls – Controls that identify and correct
problems as well as correct and recover from the resulting
errors. Examples include maintaining backup copies of
files, correcting data entry errors, and resubmitting
transactions for subsequent processing.
1. Product Design
Threats Controls
Threats Controls
Threats Controls
6. Inventory theft 6 a. Restrict physical access
7. Fixed asset theft b. Document movement of
8. Poor performance inventory
9. Suboptimal investments in c. Segregation of custody duties
fixed assets from authorization and
10. Loss of inventory or fixed recording
assets due to fire or disasters 7 a. Restrict access to fixed assets
11. Disruption of operations b. Keep detailed records of fixed
assets including disposals
8 a. Performance reporting
9 a. Solicit competitive bids
10 a. Insurance and physical
safeguards
11 a. Backup and disaster recovery
plans
4. Cost Accounting
Threats Controls
12. Inaccurate cost data 12 a. Source data automation
13. Inappropriate allocation b. Data processing integrity
of overhead costs controls
14. Misleading reports 13 a. Time-driven activity-based
costing
14 a. Performance metrics