©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 12 - 1 The Impact of Information Technology on the Audit Process Chapter 12.

Slides:



Advertisements
Similar presentations
1 Senn, Information Technology, 3 rd Edition © 2004 Pearson Prentice Hall James A. Senns Information Technology, 3 rd Edition Chapter 7 Enterprise Databases.
Advertisements

Chapter 1: The Database Environment
© 2008 Pearson Addison Wesley. All rights reserved Chapter Seven Costs.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Chapter 1: Introduction to MYOB Accounting Plus
Chapter 1 The Study of Body Function Image PowerPoint
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 1 Embedded Computing.
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Author: Julia Richards and R. Scott Hawley
1 Copyright © 2013 Elsevier Inc. All rights reserved. Appendix 01.
UNITED NATIONS Shipment Details Report – January 2006.
Document #07-2I RXQ Customer Enrollment Using a Registration Agent (RA) Process Flow Diagram (Move-In) (mod 7/25 & clean-up 8/20) Customer Supplier.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Exit a Customer Chapter 8. Exit a Customer 8-2 Objectives Perform exit summary process consisting of the following steps: Review service records Close.
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Year 6 mental test 10 second questions
Audit Responsibilities and Objectives
REVIEW: Arthropod ID. 1. Name the subphylum. 2. Name the subphylum. 3. Name the order.
Chapter 6 Data Design.
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley The Demand for Audit and Assurance Services Chapter.
2 |SharePoint Saturday New York City
VOORBLAD.
Audit Reports Chapter 3.
Factor P 16 8(8-5ab) 4(d² + 4) 3rs(2r – s) 15cd(1 + 2cd) 8(4a² + 3b²)
Basel-ICU-Journal Challenge18/20/ Basel-ICU-Journal Challenge8/20/2014.
1..
CONTROL VISION Set-up. Step 1 Step 2 Step 3 Step 5 Step 4.
© 2012 National Heart Foundation of Australia. Slide 2.
LO: Count up to 100 objects by grouping them and counting in 5s 10s and 2s. Mrs Criddle: Westfield Middle School.
Understanding Generalist Practice, 5e, Kirst-Ashman/Hull
Model and Relationships 6 M 1 M M M M M M M M M M M M M M M M
25 seconds left…...
Systems Development and Documentation Techniques
Januar MDMDFSSMDMDFSSS
Section 404 Audits of Internal Control and Control Risk
Chapter 10: The Traditional Approach to Design
Analyzing Genes and Genomes
Systems Analysis and Design in a Changing World, Fifth Edition
Internal Control and Control Risk
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Audit of the Capital Acquisition and Repayment.
12 Financial Management 12-1 Financial Planning
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Essential Cell Biology
Audit of the Sales and Collection Cycle
©2006 Prentice Hall Business Publishing, Auditing 11/e, Arens/Beasley/Elder Audit Sampling for Tests of Controls and Substantive Tests of Transactions.
Intracellular Compartments and Transport
PSSA Preparation.
©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Fraud Auditing Chapter 11.
Essential Cell Biology
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Audit of the Acquisition and Payment Cycle Chapter.
Accounting Principles, Ninth Edition
Immunobiology: The Immune System in Health & Disease Sixth Edition
Overall Audit Plan and Audit Program
1 Chapter 13 Nuclear Magnetic Resonance Spectroscopy.
Chapter 14 The Human Resources (HR) Management and Payroll Processes
Energy Generation in Mitochondria and Chlorplasts
©2010 Prentice Hall Business Publishing, Auditing 13/e, Arens//Elder/Beasley Completing the Tests in the Sales and Collection Cycle: Accounts Receivable.
©2006 Prentice Hall Business Publishing, Auditing 11/e, Arens/Beasley/Elder The Impact of Information Technology on the Audit Process Chapter 12.
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley The Impact of Information Technology on the Audit.
Chapter 12/2 Audit Software Techniques
Chapter 12 The Impact of Information Technology on the Audit Process
Auditing Complex EDP Systems
Implications of Information Technology for the Audit Process
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
The Impact of Information Technology on the Audit Process
The Impact of Information Technology on the Audit Process
The Impact of Information Technology on the Audit Process
Presentation transcript:

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder The Impact of Information Technology on the Audit Process Chapter 12

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Learning Objective 1 Describe how IT improves internal control.

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder How Information Technologies Enhance Internal Control  Computer controls replace manual controls  Higher-quality information is available

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Learning Objective 2 Identify risks that arise from using an IT-based accounting system.

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Assessing Risks of Information Technologies  Risks to hardware and data  Reduced audit trail  Need for IT experience and separation of IT duties

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Risks to Hardware and Data  Reliance on the functioning capabilities of hardware and software  Systematic versus random errors  Unauthorized access  Loss of data

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Reduced Audit Trail  Visibility of audit trail  Reduced human involvement  Lack of traditional authorization

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Need for IT Experience and Separation of Duties  Reduced separation of duties  Need for IT experience

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Learning Objective 3 Explain how general controls and application controls reduce IT risks.

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Internal Controls Specific to Information Technology  General controls  Application controls

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Relationship Between General and Application Controls Cash receipts application controls Sales application controls Payroll application controls Other cycle application controls GENERAL CONTROLS Risk of unauthorized change to application software Risk of system crash Risk of unauthorized master file update Risk of unauthorized processing

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder General Controls  Administration of the IT function  Separation of IT duties  Systems development  Physical and online security  Backup and contingency planning  Hardware controls

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Administration of the IT Function The perceived importance of IT within an organization is often dictated by the attitude of the board of directors and senior management.

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Segregation of IT Duties Chief Information Officer or IT Manager Systems Development Operations Data Control Security Administrator

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Systems Development Typical test strategies Pilot testingParallel testing

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Physical and Online Security Physical Controls:  Keypad entrances  Badge-entry systems  Security cameras  Security personnel Online Controls:  User ID control  Password control  Separate add-on security software

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Backup and Contingency Planning One key to a backup and contingency plan is to make sure that all critical copies of software and data files are backed up and stored off the premises.

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Hardware Controls These controls are built into computer equipment by the manufacturer to detect and report equipment failures.

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Application Controls  Input controls  Processing controls  Output controls

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Input Controls These controls are designed by an organization to ensure that the information being processed is authorized, accurate, and complete.

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Batch Input Controls  Financial total  Hash total  Record count

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Processing Controls  Validation test  Sequence test  Arithmetic accuracy test  Data reasonableness test  Completeness test

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Output Controls These controls focus on detecting errors after processing is completed rather than on preventing errors.

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Learning Objective 4 Describe how general controls affect the auditor’s testing of application controls.

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Impact of Information Technology on the Audit Process  Effects of general controls on control risk  Effects of IT controls on control risk and substantive tests  Auditing in less complex IT environments  Auditing in more complex IT environments

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Learning Objective 5 Use test data, parallel simulation, and embedded audit module approaches when auditing through the computer.

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Test Data Approach 1. Test data should include all relevant conditions that the auditor wants tested. 2. Application programs tested by the auditors’ test data must be the same as those the client used throughout the year. 3. Test data must be eliminated from the client’s records.

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Test Data Approach Application programs (assume batch system) Control test results Master files Contaminated master files Transaction files (contaminated?) Input test transactions to test key control procedures

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Test Data Approach Auditor-predicted results of key control procedures based on an understanding of internal control Control test results Auditor makes comparisons Differences between actual outcome and predicted result

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Parallel Simulation The auditor uses auditor-controlled software to perform parallel operations to the client’s software by using the same data files.

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Parallel Simulation Auditor makes comparisons between client’s application system output and the auditor-prepared program output Exception report noting differences Productiontransactions Auditor-preparedprogram Auditorresults Masterfile Client application system programs Clientresults

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Embedded Audit Module Approach Auditor inserts an audit module in the client’s application system to identify specific types of transactions.

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Learning Objective 6 Identify issues for e-commerce systems and other specialized IT environments.

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Issues for Different IT Environments  Issues for network environments  Issues for database management systems  Issues for e-commerce systems  Issues when clients outsource IT

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder End of Chapter 12