CAATTs for Data Extraction and Analysis

Slides:



Advertisements
Similar presentations
Computer Assisted and Audit Tools and Techniques Drs. Haryono, Ak. M.Com & Dimas M. Widiantoro, SE., S.Kom., M.Sc. Pics from :
Advertisements

Databases MMG508. DB Properties  Definition of a database: “A database is a collection of interrelated data items that are managed as a single unit”
C6 Databases.
ITAuditing Using GAS & CAATs
The Islamic University of Gaza
Chapter 12 Information Systems Chapter Goals Define the role of general information systems Explain how spreadsheets are organized Create spreadsheets.
©Silberschatz, Korth and Sudarshan1.1Database System Concepts Chapter 1: Introduction Purpose of Database Systems View of Data Data Models Data Definition.
15 Chapter 15 Web Database Development Database Systems: Design, Implementation, and Management, Fifth Edition, Rob and Coronel.
Accounting Information Systems, 5 th edition James A. Hall COPYRIGHT © 2007 Thomson South-Western, a part of The Thomson Corporation. Thomson, the Star.
1 Output Controls Ensure that system output is not lost, misdirected, or corrupted and that privacy is not violated. Exposures of this sort can cause serious.
Computer Assisted Audit Techniques
©Silberschatz, Korth and Sudarshan1.1Database System Concepts Chapter 1: Introduction Purpose of Database Systems View of Data Data Models Data Definition.
Fundamentals, Design, and Implementation, 9/e Chapter 7 Using SQL in Applications.
Chapter 12 Information Systems Nell Dale John Lewis.
Chapter 9: The Client/Server Database Environment
Managing Data Resources. File Organization Terms and Concepts Bit: Smallest unit of data; binary digit (0,1) Byte: Group of bits that represents a single.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Dr. Kalpakis CMSC 461, Database Management Systems Introduction.
Chapter 1 Introduction to Databases
Chapter 13 Auditing Information Technology
Lecture-8/ T. Nouf Almujally
Hall, Accounting Information Systems, 7e ©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly.
Lecture The Client/Server Database Environment
The Client/Server Database Environment
Chapter 12/2 Audit Software Techniques
Auditing Computerized Information Systems
CHAPTER 9 DATABASE MANAGEMENT © Prepared By: Razif Razali.
Chapter 5 Lecture 2. Principles of Information Systems2 Objectives Understand Data definition language (DDL) and data dictionary Learn about popular DBMSs.
ADVANCED DATABASES WITH ORACLE 11g FOR ADDB7311 LEARNING UNIT 1 of 7.
Introduction to Databases
The Islamic University of Gaza
Copyright © 2003 by Prentice Hall Module 4 Database Management Systems 1.What is a database? Data hierarchy and data organization Field, record, file,
 Introduction Introduction  Purpose of Database SystemsPurpose of Database Systems  Levels of Abstraction Levels of Abstraction  Instances and Schemas.
Concepts of Database Management, Fifth Edition Chapter 1: Introduction to Database Management.
The McGraw-Hill Companies, Inc Information Technology & Management Thompson Cats-Baril Chapter 3 Content Management.
CST203-2 Database Management Systems Lecture 2. One Tier Architecture Eg: In this scenario, a workgroup database is stored in a shared location on a single.
Information Systems: Databases Define the role of general information systems Describe the elements of a database management system (DBMS) Describe the.
Concepts of Database Management, Fifth Edition Chapter 1: Introduction to Database Management.
7.1 Managing Data Resources Chapter 7 Essentials of Management Information Systems, 6e Chapter 7 Managing Data Resources © 2005 by Prentice Hall.
6 Chapter Databases and Information Management. File Organization Terms and Concepts Bit: Smallest unit of data; binary digit (0,1) Byte: Group of bits.
Relational Databases Database Driven Applications Retrieving Data Changing Data Analysing Data What is a DBMS An application that holds the data manages.
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
Mainframe (Host) - Communications - User Interface - Business Logic - DBMS - Operating System - Storage (DB Files) Terminal (Display/Keyboard) Terminal.
C6 Databases. 2 Traditional file environment Data Redundancy and Inconsistency: –Data redundancy: The presence of duplicate data in multiple data files.
5 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved.
Lesson Overview 3.1 Components of the DBMS 3.1 Components of the DBMS 3.2 Components of The Database Application 3.2 Components of The Database Application.
1 CSE 2337 Introduction to Data Management Textbook: Chapter 1.
IT Auditing & Assurance, 2e, Hall & Singleton Chapter 8: IT Auditing & Assurance, 2e, Hall & Singleton CAATTs for Data Extraction and Analysis.
IT Auditing & Assurance, 2e, Hall & Singleton Chapter 8: CAATTs for Data Extraction and Analysis IT Auditing & Assurance, 2e, Hall & Singleton.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 8-1 Chapter Eight Audit Sampling: An Overview and Application.
 2004 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, by Bodnar/Hopwood 13 – 1 Chapter 13 Auditing Information Technology.
DATA RESOURCE MANAGEMENT
Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly.
Presentation on Database management Submitted To: Prof: Rutvi Sarang Submitted By: Dharmishtha A. Baria Roll:No:1(sem-3)
Auditing Of Information Systems Systems Analysis And Design © Systems Analysis And Design © V. Rajaraman OBJECTIVES  Ensure computer based financial and.
Chapter 8-1 Chapter 8 Accounting Information Systems Information Technology Auditing Dr. Hisham madi.
INTRODUCTION TO INFORMATION SYSTEMS LECTURE 9: DATABASE FEATURES, FUNCTIONS AND ARCHITECTURES PART (2) أ/ غدير عاشور 1.
© 2009 Pearson Education, Inc. Publishing as Prentice Hall 1 Lecture 9: The Client/Server Database Environment Modern Database Management 9 th Edition.
Data Resource Management Data Concepts Database Management Types of Databases Chapter 5 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies,
Managing Data Resources File Organization and databases for business information systems.
Audit Sampling: An Overview and Application
The Client/Server Database Environment
Auditing Information Technology
Chapter 1: Introduction
Chapter 12 Information Systems.
Chapter 9: The Client/Server Database Environment
MANAGING DATA RESOURCES
Chapter 7 Using SQL in Applications
Chapter 1: Introduction
Chapter 1: Introduction
Presentation transcript:

CAATTs for Data Extraction and Analysis Chapter 7

CAATTs See CAATT from Wikipedia in relevant links Auditors make extensive use of CAATTs in gathering accounting data for testing application controls and in performing substantive tests. This chapter discusses data extraction tools that are used to analyze the data processed by an application rather than the application itself. By analyzing data retrieved from computer files, the auditor can make inferences about the presence and functionality of controls in the application that processed the data.

Data Extraction Software An important use of such software is in performing substantive tests. Most audit testing occurs in the substantive-testing phase of the audit. These procedures are called substantive tests because they are used to substantiate dollar amounts in account balances.

Substantive tests Include, but are not limited to, the following: Determining the correct value of inventory Determining the accuracy of prepayments and accruals Confirming accounts receivable with customers Searching for unrecorded liabilities

Substantive tests (Cont) In an IT environment, the records needed to perform such tests are stored in computer files and databases. Before substantive tests can be performed, the data need to be extracted from the host system and presented to the auditor in a usable format.

Data Extraction Software Two types: embedded audit modules (EAM) general audit software (GAS)

Embedded Audit Module The objective of EAM is to identify important transactions while they are being processed and extract copies of them in real-time. An EAM is a specially programmed module embedded in a host application to capture predetermined transaction types for subsequent analysis. See Figure 7-20.

Embedded Audit Module (Cont) As the selected transaction is being processed by the host application, a copy of the transaction is stored in an audit file for subsequent review. The EAM approach allows selected transactions to be captured throughout the audit period, or at any time during the period, thus significantly reducing the amount of work the auditor must do to identify significant transactions for substantive testing.

Embedded Audit Module (Cont) To begin data capturing, the auditor specifies to the EAM the parameters and materiality threshold of the transactions set to be captured. For example, let’s assume that the auditor establishes a $50,000 materiality threshold for transactions processed by a sales order processing system. Transactions equal to or greater than $50,000 will be copied to the audit file. From this set of transactions, the auditor may select a subset to be used for substantive tests.

Risks in using EAM Operational efficiency: EAM may decrease operational performance because executing EAM incurs extra system overhead. Verifying EAM integrity: When application logic is modified, corresponding EAM logic may also need to be changed.

Generalized Audit Software (GAS) Most widely used CAATT for IS auditing. GAS allows auditors to access electronic coded data files and perform various operations on their contents. Some of the more common uses for GAS are shown in page 274….

GAS is popular GAS languages are easy to use and require little computer background on the part of the auditor. Many GAS products can be used on both mainframe and PC. Auditors can perform their tests independent of the computer service’s staff. GAS can be used to audit the data stored in most file structures and formats.

Using GAS to access complex structures See Figures 7-22, 7-23, 7-24

ACL software Designed as a meta-language for auditors to access most data stored by electronic means and test them comprehensively Many of the problems associated with accessing complex data structures have been solved by ACL’s Open Data Base Connectivity (ODBC) interface. Definition of ODBC

ODBC Illustration ODBC-compliant DBMS MS SQL Application Program Driver SQL commands Driver Oracle Driver DB 2