Concurrent Auditing Techniques

Slides:



Advertisements
Similar presentations
Module 3: Business Information Systems
Advertisements

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder The Impact of Information Technology on the Audit Process Chapter 12.
Presented to the Tallahassee ISACA Chapter
ITAuditing Using GAS & CAATs
Overview of Transaction Processing and Enterprise Resource Planning Systems Chapter 2.
AUDITING COMPUTER-BASED INFORMATION SYSTEMS
Auditing Computer-Based Information Systems
Chapter 3 with added info
Auditing Computer Systems
Auditing Computer-Based Information Systems
The Islamic University of Gaza
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 7-1 Chapter 7 CHAPTER 7 THE EFFECT OF INFORMATION TECHNOLOGY ON THE AUDIT.
CAATTs for Data Extraction and Analysis
Consideration of Internal Control in an IT Environment.
©2006 Prentice Hall Business Publishing, Auditing 11/e, Arens/Beasley/Elder The Impact of Information Technology on the Audit Process Chapter 12.
Accounting Information Systems, 5 th edition James A. Hall COPYRIGHT © 2007 Thomson South-Western, a part of The Thomson Corporation. Thomson, the Star.
1 Output Controls Ensure that system output is not lost, misdirected, or corrupted and that privacy is not violated. Exposures of this sort can cause serious.
Computer Assisted Audit Techniques
©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 18-1 Accounting Information Systems 9 th Edition Marshall.
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley The Impact of Information Technology on the Audit.
Overview of Transaction Processing and Enterprise Resource Planning Systems Chapter 2.
Chapter 13 Auditing Information Technology
AUDITING.
Hall, Accounting Information Systems, 7e ©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly.
Chapter 9.4 & 11.4 Paper F8 Audit and Assurance (International) ations/student_accountant/archive/sa_aug09_byrn.
Chapter 12/2 Audit Software Techniques
Cms 2 YE Closing+ tm Preparation & Closing Job Cost.
CHAPTER 6 ELECTRONIC DATA PROCESSING SYSTEMS
Management Information Systems
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Auditing Computerized Information Systems
Today’s Lecture application controls audit methodology.
Chapter 22 Systems Design, Implementation, and Operation Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 22-1.
Chapter 17: Computer Audits ACCT620 Internal Accounting Otto Chang Professor of Accounting.
PHASE 4 SYSTEMS IMPLEMENTATION Application Development SYSTEMS ANALYSIS & DESIGN.
The Islamic University of Gaza
Overview of Transaction Processing and Enterprise Resource Planning Systems Chapter 2.
Chapter 13 Sequential File Processing. Master Files Set of files used to store companies data in areas like payroll, inventory Usually processed by batch.
Auditing Complex EDP Systems
Implications of Information Technology for the Audit Process
Characteristics of ERP Systems. There are some significant differences between ERP and non-ERP systems. These differences are:  In ERP systems, information.
Understanding the IT environment of the entity. Session objectives Defining contours of financial accounting in an IT environment and its characteristics.
S4: Understanding the IT environment of the entity.
 2001 Prentice Hall Business Publishing, Accounting Information Systems, 8/E, Bodnar/Hopwood Chapter 10 Electronic Data Processing Systems.
Today’s Lecture Covers
AUDIT IN COMPUTERIZED ENVIRONMENT
 2004 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, by Bodnar/Hopwood 13 – 1 Chapter 13 Auditing Information Technology.
CHAPTER 2 TYPES OF BUSINESS INFORMATION SYSTEM. INTRODUCTION Information System support business operations by processing data related to business operation.
AUDIT SOFTWARE Chapter 16. Generalized Audit Software Off-the-shelf software that provides a means to gain access to and manipulate data maintained on.
Hall, Accounting Information Systems, 7e ©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly.
Auditing Data Management Systems Chapter 3 with added info.
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
Auditing of CBIS Chapter Ten. IIA Vs. AICPA IIA Audit Scope –Reliability and integrity –Complies with operating parameters –Review IC to safeguard assets.
Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly.
CS523 Database Design Instructor : Somchai Thangsathityangkul You can download lecture note at Class Presence 10% Quiz 10%
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 1 Database Systems.
Chapter 3-Auditing Computer-based Information Systems.
Overview of Transaction Processing and Enterprise Resource Planning Systems Chapter 2.
Electronic Data Processing Systems Chapter 6.
Auditing Information Technology
Developing Information Systems
Deck 12 Accounting Information Systems Romney and Steinbart
Managing the IT Function
The Impact of Information Technology on the Audit Process
Batch Processing Application Audit
The Impact of Information Technology on the Audit Process
Types of CAATs Session 3.
CHAPTER 15 AUDITING EDP SYSTEMS.
SYSTEMS ANALYSIS & DESIGN
Audit Execution Session 5.
Presentation transcript:

Concurrent Auditing Techniques Chapter 18 Concurrent Auditing Techniques

Concurrent Auditing Techniques to collect audit evidence at the same time as an application system undertakes processing of its production

Basic Nature of Concurrent Auditing Techniques 2 bases for collecting audit evidence Special audit modules are embedded in application systems to collect, process, and print audit evidenced Audit records used to store the audit evidence collected so auditors can examine this evidence at a later stage

Concurrent Auditing

Need for Concurrent Auditing Techniques Disappearing Paper-Based Audit Trail Continuous Monitoring Required by Advance Systems (see next Figure) Increasing Difficulty of Performing Transaction Walkthroughs Presence of Entropy in Systems tendency of systems toward internal disorder and eventual collapse over time Problems Posed by Outsourced IT Systems (difficult for auditors to be there at the outsource) EDI and Inter- organizational Info systems

Concurrent Audit Techniques Integrated test facility (dummy company test data then analysis of authenticity, accuracy, and completeness) Snapshot/extended record System control audit review file (SCARF) Continuous and intermittent simulation (CIS)

Integrated Test Facility (ITF) Verifies authenticity, accuracy, and completeness Involves 2 major design decisions: What method will be used to enter test data? What method will be used to remove the effects of ITF transactions?

Methods of Entering Test Data Using ITF (1) Involves tagging transactions submitted as production input to the application system to be tested (2) Involves designing new test transactions and entering them with the production input into the application system

Entering test data

Methods of Removing the Effects of ITF Transactions (1) Modify the application system programs to recognize ITF transactions and to ignore them in terms of any processing that might affect users (2) Submit additional input that reverses the effects of the ITF transactions (3) Submit trivial entries so the effects of the ITF transaction on output are minimal

Snapshot/Extended Record Involves software taking “pictures” of a transaction as it flows through an application system. Major Implementation Decisions Where to locate the snapshot points? When to capture snapshots of transactions? Items needed for reporting of the snapshot data that is captured (timestamp, ID, time of each process)

System Control Audit Review File The most complex technique Involves embedding audit software modules within a host application system to provide continuous monitoring of the system’s transactions 2 major design decisions: What info. will be collected by SCARF? What reporting system will be used?

Information Collected by SCARF Application system errors Policy and procedural variances System exceptions (certain errors are allowed) Statistical samples Snapshots and extended records Profiling data (data to build profile of users) Performance measurement data

Structure of SCARF Reporting Design Decisions Determining how the SCARF file will be updated (e.g., small applications send data to the file once a day) Choosing sort codes and report formats to be used Choosing the timing of report preparation

Continuous & Intermittent Simulation Primary advantages of CIS SCARF defines exceptions of interest but CIS traps exceptions for auditors using DBMS. It does not not require modifications to the application system Provides an online auditing capability Requires less programming instructions Less input/output overheads