Professional Documents
Culture Documents
BUSINESS SCHOOL
Learning Objectives
Business Transactions
Chapter 4 Pages 162-179; 183-187; 195-203; Skim Read Pages 179-183
- Provide an overview of the recording process (LO1)
- Explain how the use of double-entry bookkeeping mirrors the first-
principles approach (LO2)
- Explain the importance of a trial balance (LO3)
- (Skim Read Only) Close off a simple set of accounts (LO4)
- Record a series of period-end adjustments in the accounts (LO5) – Only
up to an including depreciation
- Use an adjusted trial balance and a worksheet to complete a final set of
accounts (LO7)
- Describe a chart of accounts and its importance (LO8)
1
14/02/2018
In the past 18 months, the e-commerce small business owner has had to cough
up about $10,000 accounting for purchases made with stolen card details on his
two websites. He has paid back about $6000 for 20 separate fraudulent
transactions in the past 18 months, plus another $4000 for fraud that has been
committed on another website he owns.
"If you check out with a credit card, NAB accepts payment, approves the card
and the funds hit our account. Then we send out the goods," he said.
"However, anywhere up to a few months later, the bank can send us a letter
saying that the card was used fraudulently.
"Then they automatically deduct the amount received for the goods and hand us
an additional $25 'chargeback' fee to cover the cost of the transaction."
2
14/02/2018
Past Stories
http://www.smh.com.au/nsw/duped-grandmother-sentenced-
to-jail-for-aiding-phishing-scam-20180203-h0t7b6.html
A Batemans Bay woman stole more than $1.1 million from her
employers, using every cent of the ripped-off funds to feed her son’s
crippling gambling addiction, Wollongong District Court heard
yesterday.
3
14/02/2018
4
14/02/2018
5
14/02/2018
6
14/02/2018
7
14/02/2018
Impersonation of companies
› What is encryption?
› It is the primary method of achieving confidentiality in e-commerce.
› Plain-text messages are rearranged by some mathematical process.
› The encrypted message cannot be read by anyone who does not know the
process.
8
14/02/2018
The Limitations of
Internal Control
9
14/02/2018
10
14/02/2018
Steps
3. After checking their correctness, journalise those
items that appear on the bank statement but not on
the firm’s books
a) Debit to Cash at Bank (1) bank collections, (2) EFT cash receipts,
and (3) interest revenue earned on money in the bank.
b) Credit to Cash at Bank (1) EFT cash payments, (2) service
charges, (3) cost of printed cheques, and (4) other bank charges
(for example, charges for dishonoured cheques or stale-date
cheques).
4. Compare the adjusted bank balance and the adjusted book
balance. The two adjusted balances should be equal.
5. Notify the bank of any errors it has made.
11
14/02/2018
Lecture Example
› In Lectures
12
14/02/2018
Cloud computing
› Ability to use and store data on an online system instead of a physical
computer
› Requires internet access
› Provides real-time data
› Allows links to external parties (banks, customers, suppliers).
13
14/02/2018
14