1. The people who use the system
2. The procedures and instructions used to collect, process, and store data
3. The data about the organization and its business activities
4. The software used to process the data
computers, peripheral device
5. The information technology infrastructure, including the computer peripheral devices, and network communications devices used in the AIS
6. The internal controls and security measures that safeguard ais data