Chapter 6 Computer Assisted Audit Tools and Techniques

Slides:



Advertisements
Similar presentations
2017/3/25 Test Case Upgrade from “Test Case-Training Material v1.4.ppt” of Testing basics Authors: NganVK Version: 1.4 Last Update: Dec-2005.
Advertisements

Chapter 1: Introduction to MYOB Accounting Plus
INTERNAL CONTROLS.
By Rick Clements Software Testing 101 By Rick Clements
ENTREPRENEURSHIP (Ms. Hawkins)
Tutorial 9 – Creating On-Screen Forms Using Advanced Table Techniques
XP New Perspectives on Microsoft Office Word 2003 Tutorial 6 1 Microsoft Office Word 2003 Tutorial 6 – Creating Form Letters and Mailing Labels.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
Determine Eligibility Chapter 4. Determine Eligibility 4-2 Objectives Search for Customer on database Enter application signed date and eligibility determination.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Accounting and Financial Reporting
Making the System Operational
AUDITING THE REVENUE PROCESS
Banking Services AVAILABLE FOR A SMALL BUSINESS. BANKING SERVICES 2 Welcome 1. Agenda 2. Ground Rules 3. Introductions.
Shared Work Employer Representative Orientation 1.
Controlling Food Cost in Production
Payment & Remittance Processes
1 How to Enter Time. 2 Select: Log In Once logged in, Select: Employees.
EMS Checklist (ISO model)
Text 1 July, 2010 DCMS: Training Manual Campaign Management.
Banking Procedures and Control of Cash
AS9102 First Article Inspection Report
Introduction When you choose a restaurant for a meal, are you concerned with: The price of the meal How long you have to wait to be seated The quality.
ABC Technology Project
© Paradigm Publishing, Inc Access 2010 Level 1 Unit 1Creating Tables and Queries Chapter 2Creating Relationships between Tables.
Audit of Acquisition Cycle and Inventory
KDE GL UTILITIES FOR THE CHART OF ACCOUNTS MIGRATION Kristin Lambert – OET.
Benchmark Series Microsoft Excel 2013 Level 2
LESSON 4-1 Preparing a Chart of Accounts
Addition 1’s to 20.
Model and Relationships 6 M 1 M M M M M M M M M M M M M M M M
25 seconds left…...
School Census Summer 2011 Headlines Version Jim Haywood Product Manager for Statutory Returns.
A Closer Look at Food Cost
Controlling as a Management Function
Week 1.
Internal Control and Control Risk
We will resume in: 25 Minutes.
12 Financial Management 12-1 Financial Planning
©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder The Impact of Information Technology on the Audit Process Chapter 12.
Accounting Information Systems 8e
Chapter 11 Describing Process Specifications and Structured Decisions
1 PART 1 ILLUSTRATION OF DOCUMENTS  Brief introduction to the documents contained in the envelope  Detailed clarification of the documents content.
Accounting Principles, Ninth Edition
Financial Merchandise Management
Import Tracking and Landed Cost Processing An Enhancement For AS/400 DMAS from  Copyright I/O International, 2001, 2005, 2008, 2012 Skip Intro Version.
Benchmark Series Microsoft Excel 2010 Level 1
General Ledger and Reporting System
Chapter 14 System Controls. A Quote “The factory of the future will have only two employees, a man and a dog. The man will be there to feed the dog. The.
Accounting Information Systems, 5 th edition James A. Hall COPYRIGHT © 2007 Thomson South-Western, a part of The Thomson Corporation. Thomson, the Star.
1 Output Controls Ensure that system output is not lost, misdirected, or corrupted and that privacy is not violated. Exposures of this sort can cause serious.
Processing Integrity and Availability Controls
Overview of Transaction Processing and Enterprise Resource Planning Systems Chapter 2.
Hall, Accounting Information Systems, 7e ©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly.
Processing Integrity and Availability Controls
CHAPTER 6 ELECTRONIC DATA PROCESSING SYSTEMS
The Islamic University of Gaza
Overview of Transaction Processing and Enterprise Resource Planning Systems Chapter 2.
Checking data Chapter 7 Prepared by:Sir Mazhar Javed.
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Sequential Files Chapter 13. Master Files Set of files used to store companies data in areas like payroll, inventory Set of files used to store companies.
Verification & Validation. Batch processing In a batch processing system, documents such as sales orders are collected into batches of typically 50 documents.
13-1 Sequential File Processing Chapter Chapter Contents Overview of Sequential File Processing Sequential File Updating - Creating a New Master.
13- 1 Chapter 13.  Overview of Sequential File Processing  Sequential File Updating - Creating a New Master File  Validity Checking in Update Procedures.
Chapter 7: Computer-Assisted Audit Techniques [CAATs]
Controlling Computer-Based Information Systems, Part II
Processing Integrity and Availability Controls
CHAPTER 6 ELECTRONIC DATA PROCESSING SYSTEMS
Presentation transcript:

Chapter 6 Computer Assisted Audit Tools and Techniques LihChyun Shu

Contents Application controls Testing computer application controls Input controls Processing controls Output controls Testing computer application controls Black box approach White box approach Computer aided audit tools and techniques for testing controls

Application Controls Programmed procedures designed to deal with potential exposures that threaten specific applications, such as payroll, purchases, and cash disbursements systems. Three categories: Input controls Processing controls Output controls

Input Controls Designed to ensure that transactions are valid, accurate, and complete. Broad classes: Source document controls Data coding controls Batch controls Validation controls Input error correction Generalized data input systems

Source document controls Techniques to prevent source document fraud (for example, an individual with access to purchase orders and receiving reports could fabricate a purchase transaction to a non-existent supplier) Use pre-numbered source documents Use source documents in sequence Periodically audit source documents

Data Coding Controls Checks on integrity of data codes used in processing. A customer’s account number, an inventory item number, and a chart of accounts number are all examples of data codes.

Data Coding Controls Three types of errors that can corrupt data codes and cause processing errors: Transcription errors Single transposition errors Multiple transposition errors

Transcription Errors Addition errors: e.g., inventory item number 83276 recorded as 832766 Truncation errors: e.g., the inventory item above recorded as 8327 Substitution errors: e.g., the inventory item above recorded as 83266

Transposition Errors Single transposition errors: occur when two adjacent digits are reversed. Multiple transposition errors: occur when nonadjacent digits are transposed. For example, 83276 is recorded as 87236.

Check Digits A method to detect data coding errors. A check digit is a control digit added to the code that allows the integrity of the code to be established during subsequent processing. The simplest form of check digit is to sum the digits in the code and use this sum as the check digit.

Check Digits For example, the calculated check digit for customer account code 5327 would be 7 (5+3+7+2=17, then drop the tens column) This technique can detect some transcription errors, but not transposition errors. Another technique in page 217 can be used to detect transposition errors. See ‘Check digit’ from Wikipedia in relevant links

Batch Controls A method used to manage high volumes of transaction data through a system. Provide assurance that All records in batch are processed No records are processed more than once An audit trail of transactions is created

Steps in Batch Controls Grouping similar types of transactions (such as sales order) together in batches For each batch of documents, prepare a batch transmittal sheet that contains (see page 218) A unique batch number A batch date A transaction code (type of transactions) Number of records in batch (record count) Total dollar value of a financial field (batch control total) Total of a unique non-financial field (hash total)

Steps in Batch Controls Batch transmittal sheet is used to assess the integrity of the batch during processing as shown in Figure 6-2 (page 219). Batch control total can be used to make sure the batch is in balance Hash total can be used to detect the fraud that someone replaced one of the sales orders in the batch with a fictitious record of the same dollar amount (see page 220)

Validation Controls Intended to detect errors in transaction data before the data are processed. Three levels of input validation controls: Field interrogation Record interrogation File interrogation

Filed Interrogation Missing data checks Numeric-alphabetic data checks Zero-value checks Limit checks Range checks Validity checks (compare actual values against known acceptable values)

Record Interrogation Validate entire record by examining inter-relationship of its field values. Reasonableness checks: e.g., an employee’s pay rate of 18 dollars per hour is excessive, when compared to the employee’s job skill code of 693 (employees in this skill class never earn more than 12 dollars per hour)

Record Interrogation Sign check: e.g., dollar amount field must be positive for sales but negative for sales return transactions. Sequence check: determine if a record is out of order

File Interrogation Ensure that correct file is being processed by the system. Internal label checks verify that the file processed is the one the program is actually calling for. Files usually have external labels that identify them to librarian and operator. But wrong labels may be affixed to files. Operating system can create internal label that is placed at the beginning of the file (Figure 6-6 in page 224)

File Interrogation Version checks are used to verify that the version of the file being processed is correct. Expiration date check prevents a file from being deleted before it expires.

Input Error Correction 3 common error handling techniques Immediate correction Create an error file Reject entire batch

Generalized Data Input Systems To achieve a high degree of control and standardization over input validation procedures. This technique includes centralized procedures to manage the data input for all of the organization’s transaction processing systems. (see Figure 6-9)

Processing Controls Run-to-run controls Operator intervention controls Audit trail controls

Run-to-run Controls Use batch control figures to monitor the batch as it moves from one run to another. Specific uses of run-to-run control figures: Recalculate control totals (dollar amount fields, hash totals, record counts) Transaction codes: ensure only correct type of transaction is being processed. Sequence checks ensure the proper order of transactions being processed

Operator Intervention Controls Operator intervention increases the potential for human errors. Systems that limit operator intervention thru operator intervention controls are thus less prone to errors.

Audit Trail Controls Techniques to preserve audit trails: Transaction logs: every transaction successfully processed by the system should be recorded on a transaction log, which servers as a journal. Log of automatic transactions Listing of automatic transactions Error listing