Accounting Information Systems, 5 th edition James A. Hall COPYRIGHT © 2007 Thomson South-Western, a part of The Thomson Corporation. Thomson, the Star.

Slides:



Advertisements
Similar presentations
Chapter 6 Computer Assisted Audit Tools and Techniques
Advertisements

Audit of Autonomous District Councils (in an IT environment using FAAM)
Presented to the Tallahassee ISACA Chapter
Accounting Information Systems, 5th edition James A. Hall
ITAuditing Using GAS & CAATs
General Ledger and Reporting System
Overview of Transaction Processing and Enterprise Resource Planning Systems Chapter 2.
Auditing Computer-Based Information Systems
Chapter 3 Ethics, Fraud, and Internal Control Accounting Information Systems, 5 th edition James A. Hall COPYRIGHT © 2007 Thomson South-Western, a part.
Auditing Computer Systems
Auditing Computer-Based Information Systems
The Islamic University of Gaza
The Islamic University of Gaza
Accounting Information Systems, 6 th edition James A. Hall COPYRIGHT © 2009 South-Western, a division of Cengage Learning. Cengage Learning and South-Western.
CAATTs for Data Extraction and Analysis
Accounting Information Systems, 5th edition James A. Hall
Internal Control Concepts Knowledge. Best Practices for IT Governance IT Governance Structure of Relationship Audit Role in IT Governance.
Chapter 14 System Controls. A Quote “The factory of the future will have only two employees, a man and a dog. The man will be there to feed the dog. The.
Accounting Information Systems, 5 th edition James A. Hall COPYRIGHT © 2007 Thomson South-Western, a part of The Thomson Corporation. Thomson, the Star.
1 Output Controls Ensure that system output is not lost, misdirected, or corrupted and that privacy is not violated. Exposures of this sort can cause serious.
©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 18-1 Accounting Information Systems 9 th Edition Marshall.
Processing Integrity and Availability Controls
Auditing Auditing & Automated Systems Chapter 22 Auditing & Automated Systems Chapter 22.
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley The Impact of Information Technology on the Audit.
Chapter 13 Auditing Information Technology
Hall, Accounting Information Systems, 7e ©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly.
Chapter 7: Computer-Assisted Audit Techniques [CAATs]
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
Processing Integrity and Availability Controls
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
Information Systems Auditing and Assurance
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Auditing Computerized Information Systems
Today’s Lecture application controls audit methodology.
Chapter 22 Systems Design, Implementation, and Operation Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 22-1.
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
Chapter 17: Computer Audits ACCT620 Internal Accounting Otto Chang Professor of Accounting.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
The Islamic University of Gaza
Accounting Information Systems, 6 th edition James A. Hall COPYRIGHT © 2009 South-Western, a division of Cengage Learning. Cengage Learning and South-Western.
Chapter 3 Ethics, Fraud, and Internal Control Accounting Information Systems, 5 th edition James A. Hall COPYRIGHT © 2007 Thomson South-Western, a part.
Implications of Information Technology for the Audit Process
Introduction to Transaction Processing and Documentation Techniques COPYRIGHT © 2007 Thomson South-Western, a part of The Thomson Corporation. Thomson,
Copyright © 2007 Pearson Education Canada 1 Chapter 13: Audit of the Sales and Collection Cycle: Tests of Controls.
Understanding the IT environment of the entity. Session objectives Defining contours of financial accounting in an IT environment and its characteristics.
S4: Understanding the IT environment of the entity.
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
AUDIT IN COMPUTERIZED ENVIRONMENT
 2004 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, by Bodnar/Hopwood 13 – 1 Chapter 13 Auditing Information Technology.
Auditing Data Management Systems Chapter 3 with added info.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
Copyright © 2007 Pearson Education Canada 1 Chapter 11: Overall Audit Plan and Audit Program.
Chapter 7: Computer-Assisted Audit Techniques [CAATs]
Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly.
Chapter 8-1 Chapter 8 Accounting Information Systems Information Technology Auditing Dr. Hisham madi.
8 INTERNAL CONTROL. Definition Duty  mgt (CEO)  Board  Internal auditor  Employee  External person.
Overview of Transaction Processing and Enterprise Resource Planning Systems Chapter 2.
Chapter 11 Designing Inputs, Outputs, and Controls.
Auditing Information Technology
Controlling Computer-Based Information Systems, Part II
Processing Integrity and Availability Controls
The Impact of Information Technology on the Audit Process
The Impact of Information Technology on the Audit Process
Overview of Transaction Processing and Enterprise Resource Planning Systems Chapter 2.
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Presentation transcript:

Accounting Information Systems, 5 th edition James A. Hall COPYRIGHT © 2007 Thomson South-Western, a part of The Thomson Corporation. Thomson, the Star logo, and South-Western are trademarks used herein under license

 Controls and audit tests relevant to systems development  Risks and controls for program changes and the source program library  Auditing techniques (CAATTs) used to verify application controls  Auditing techniques used to perform substantive tests in an IT environment

 Authorizing development of new systems  Addressing and documenting user needs  Technical design phases  Participation of internal auditors  Testing program modules before implementing ◦ Testing individual modules by a team of users, internal audit staff, and systems professionals

Auditing objectives: ensure that... ◦ SDLC activities applied consistently and in accordance with management’s policies ◦ system as originally implemented was free from material errors and fraud ◦ system was judged to be necessary and justified at various checkpoints throughout the SDLC ◦ system documentation is sufficiently accurate and complete to facilitate audit and maintenance activities

 Audit Procedures: ◦ New systems must be authorized. ◦ Feasibility studies conducted. ◦ User needs analyzed and addressed. ◦ Cost-benefit analysis completed. ◦ Proper documentation completed. ◦ All program modules thoroughly tested before implementation. ◦ Checklist of problems was kept.

 Last, longest and most costly phase of SDLC ◦ Up to 80-90% of entire cost of a system  Audit Procedures: ◦ All maintenance actions should require  Technical specifications  Testing  Documentation updates  Formal authorizations for changes

Auditing objectives: detect any unauthorized program maintenance and determine that... ◦ maintenance procedures protect applications from unauthorized changes ◦ applications are free from material errors ◦ program libraries (where programs are stored) are protected from unauthorized access

 Auditing procedures: verify that programs were properly maintained, including changes  Specifically, verify… ◦ identification and correction of unauthorized program changes ◦ identification and correction of application errors ◦ control of access to systems libraries

 Narrowly focused exposures within a specific system, for example: ◦ accounts payable ◦ cash disbursements ◦ fixed asset accounting ◦ payroll ◦ sales order processing ◦ cash receipts ◦ general ledger

 Risks within specific applications  Can affect manual procedures (e.g., entering data) or embedded (automated) procedures  Convenient to look at in terms of: ◦ input stage ◦ processing stage ◦ output stage PROCESSING INPUTOUTPUT

 Goal of input controls - valid, accurate, and complete input data  Two common causes of input errors: ◦ transcription errors – wrong character or value ◦ transposition errors – ‘right’ character or value, but in wrong place

 Check digits – data code is added to produce a control digit ◦ especially useful for detecting transcription and transposition errors  Missing data checks – control for blanks or incorrect justifications  Numeric-alphabetic checks – verify that characters are in correct form

 Limit checks – identify values beyond pre-set limits  Range checks – identify values outside upper and lower bounds  Reasonableness checks – compare one field to another to see if relationship is appropriate  Validity checks – compares values to known or standard values

 Programmed procedures ◦ Processes that transform input data into information for output  Three categories: ◦ Batch controls ◦ Run-to-run controls ◦ Audit trail controls

 Batch controls - reconcile system output with input originally entered into system  Based on different types of batch totals: ◦ total number of records ◦ total dollar value ◦ hash totals – sum of non-financial numbers

 Goal of output controls is to ensure that system output is not lost, misdirected, or corrupted, and that privacy is not violated.  In the following flowchart, there are exposures at every stage.

 Output spooling – creates a file during the printing process that may be inappropriately accessed  Printing – create two risks: ◦ production of unauthorized copies of output ◦ employee browsing of sensitive data

 Waste – can be stolen if not properly disposed of (shredding)  Report distribution – for sensitive reports, the following are available: ◦ use of secure mailboxes ◦ require user to sign for reports ◦ deliver reports to user

 End user controls – end users need to inspect sensitive reports for accuracy ◦ shred after used  Controlling digital output – digital output message can be intercepted, disrupted, destroyed, or corrupted as it passes along communications links

 Techniques for auditing applications fall into two classes: 1)testing application controls – two general approaches: –black box – around the computer –white box – through the computer 2) examining transaction details and account balances—substantive testing

Auditing Around the Computer - The Black Box Approach

Auditing through the Computer: The ITF Technique

 Black Box Approach – focuses on input procedures and output results  To Gain understanding… ◦ analyze flowcharts ◦ review documentation ◦ conduct interviews

 White Box Approach - focuses on understanding internal logic of processes between input and output  Common tests ◦ Authenticity tests ◦ Accuracy tests ◦ Completeness tests ◦ Redundancy tests ◦ Access tests ◦ Audit trail tests ◦ Rounding error tests

 Test data method: testing for logic or control problems - good for new systems or systems which have undergone recent maintenance ◦ base case system evaluation (BCSE) - using a comprehensive set of test transactions ◦ tracing - performs an electronic walkthrough of the application’s internal logic  Test data methods are not foolproof ◦ a snapshot - one point in time examination ◦ High-cost of developing adequate test data

 Integrated test facility (ITF): an automated, on-going technique that enables the auditor to test an application’s logic and controls during its normal operation  Parallel simulation: auditor writes simulation programs and runs actual transactions of the client through the system

 Techniques to substantiate account balances. For example: ◦ search for unrecorded liabilities ◦ confirm accounts receivable to ensure they are not overstated  Requires first extracting data from the system. Two technologies commonly used to select, access, and organize data are: ◦ embedded audit module ◦ generalized audit software

 An ongoing module which filters out non- material transactions  The chosen, material transactions are used for sampling in substantive tests  Requires additional computing resources by the client  Hard to maintain in systems with high maintenance

 Very popular & widely used  Can access data files & perform operations on them: ◦ screen data ◦ statistical sampling methods ◦ foot & balance ◦ format reports ◦ compare files and fields ◦ recalculate data fields

 ACL software (ACCT4304, ACCT5324)  IDEA software (ACCT5324)

32