©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley 11 - 1 The Impact of Information Technology on the Audit.

Slides:



Advertisements
Similar presentations
©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder The Impact of Information Technology on the Audit Process Chapter 12.
Advertisements

Presented to the Tallahassee ISACA Chapter
Auditing Concepts.
Auditing Computer-Based Information Systems
Learning Objectives LO5 Document an accounting system to identify key controls and weaknesses in order to assess control risk. LO6 Write key control tests.
Auditing Computer-Based Information Systems
Nature of IT Based Systems
Chapter 10: Auditing the Expenditure Cycle
©2006 Prentice Hall Business Publishing, Auditing 11/e, Arens/Beasley/Elder The Impact of Information Technology on the Audit Process Chapter 12.
Chapter 14 System Controls. A Quote “The factory of the future will have only two employees, a man and a dog. The man will be there to feed the dog. The.
©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 18-1 Accounting Information Systems 9 th Edition Marshall.
Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES.
Auditing Auditing & Automated Systems Chapter 22 Auditing & Automated Systems Chapter 22.
©2012 Prentice Hall Business Publishing, Auditing 14/e, Arens/Elder/Beasley Audit of the Inventory and Warehousing Cycle Chapter 21.
Overview of Transaction Processing and Enterprise Resource Planning Systems Chapter 2.
Chapter Lead Black Slide © 2001 Business & Information Systems 2/e.
©2003 Prentice Hall Business Publishing, Essentials of Auditing 1/e, Arens/Elder/Beasley Audit of the Sales and Collection Cycle Chapter 11.
Chapter 12/2 Audit Software Techniques
Auditing Systems Development, Acquisition and Maintenance
Chapter 12 The Impact of Information Technology on the Audit Process
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Today’s Lecture application controls audit methodology.
Chapter 22 Systems Design, Implementation, and Operation Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 22-1.
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
Chapter 17: Computer Audits ACCT620 Internal Accounting Otto Chang Professor of Accounting.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Overview of Systems Audit
The Islamic University of Gaza
Chapter 5 Internal Control over Financial Reporting
Auditing Complex EDP Systems
Implications of Information Technology for the Audit Process
9 - 1 ©2003 Prentice Hall Business Publishing, Essentials of Auditing 1/e, Arens/Elder/Beasley Internal Control and Control Risk Chapter 9.
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Internal Control and Control Risk Chapter 10.
1 Chapter Three IT Risks and Controls. 2 The Risk Management Process Identify IT Risks Assess IT Risks Identify IT Controls Document IT Controls Monitor.
Copyright © 2007 Pearson Education Canada 1 Chapter 13: Audit of the Sales and Collection Cycle: Tests of Controls.
Evaluation of Internal Control System
Understanding the IT environment of the entity. Session objectives Defining contours of financial accounting in an IT environment and its characteristics.
Chapter 1 Accounting Information Systems: An Overview Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 1-1.
S4: Understanding the IT environment of the entity.
 2001 Prentice Hall Business Publishing, Accounting Information Systems, 8/E, Bodnar/Hopwood Chapter 10 Electronic Data Processing Systems.
Fundamentals I: Accounting Information Systems McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Audit Responsibilities and Objectives Chapter 6.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.1 Internal.
5 - 1 ©2003 Prentice Hall Business Publishing, Essentials of Auditing 1/e, Arens/Elder/Beasley Audit Responsibilities and Objectives Chapter 5.
Today’s Lecture Covers
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
AUDIT IN COMPUTERIZED ENVIRONMENT
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
8-1 Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
This Lecture Covers Roles of –Management –IT Personnel –Users –Internal Auditors –External Auditors.
Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly.
The Impact of Information Technology on the Audit Process
Chapter 3-Auditing Computer-based Information Systems.
©2005 Prentice Hall Business Publishing, Auditing and Assurance Services 10/e, Arens/Elder/Beasley Audit of the Inventory and Warehousing Cycle.
©2005 Prentice Hall Business Publishing, Auditing and Assurance Services 10/e, Arens/Elder/Beasley Internal Control and Control Risk Chapter 10.
8 INTERNAL CONTROL. Definition Duty  mgt (CEO)  Board  Internal auditor  Employee  External person.
Information Systems Security
Auditing Concepts.
Chapter 08 Consideration of
Managing the IT Function
The Impact of Information Technology on the Audit Process
Defining Internal Control
Computer-Based Processing: Developing an Audit Assessment Approach
The Impact of Information Technology on the Audit Process
Effects of IT on Consideration of Internal Control in a Financial Statement Audit Dr. Donald McConnell Jr. 12/1/2018.
CHAPTER 15 AUDITING EDP SYSTEMS.
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Presentation transcript:

©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley The Impact of Information Technology on the Audit Process Chapter 11

©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Learning Objective 1 Describe how IT improves internal control.

©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley How Information Technologies Enhance Internal Control Computer controls replace manual controls. Higher-quality information is available.

©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Learning Objective 2 Identify risks that arise from using an IT-based accounting system.

©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Assessing Risks of Information Technologies Reliance on the capabilities of hardware and software Visibility of audit trail Reduced human involvement Systematic versus random errors

©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Assessing Risks of Information Technologies Unauthorized access Loss of data Reduced segregation of duties Lack of traditional authorization Need for IT experience

©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Learning Objective 3 Explain how general controls and application controls reduce IT risks.

©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Internal Controls Specific to Information Technology General Controls Application Controls

©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley General Controls Administration of the IT function Segregation of IT duties Systems development Physical and online security Backup and contingency planning Hardware controls

©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Application Controls Input controls Processing controls Output controls

©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Relationship Between General and Administrative Controls Cash Receipts Application Controls Sales Applications Controls Payroll Application Controls Other Cycle Application Controls Risk of unauthorized change to application software Risk of system crash Risk of unauthorized master file update Risk of unauthorized processing GENERAL CONTROLS

©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Administration of the IT Function The perceived importance of IT within an organization is often dictated by the attitude of the board of directors and senior management.

©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Segregation of IT Duties Chief Information Officer or IT Manager Security Administrator Systems Development Operations Data Control

©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Systems Development Typical test strategies Pilot testing Parallel testing

©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Physical and Online Security Physical Controls:  Keypad entrances  Badge-entry systems  Security cameras  Security personnel Online Controls:  User ID control  Password control  Separate add-on security software

©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Backup and Contingency Planning One key to a backup and contingency plan is to make sure that all critical copies of software and data files are backed up and stored off the premises.

©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Hardware Controls These controls are built into computer equipment by the manufacturer to detect and report equipment failures.

©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Input Controls These controls are designed by an organization to ensure that the information being processed is authorized, accurate, and complete.

©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Batch Input Controls Financial total Hash total Record count

©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Processing Controls Validation test Sequence test Arithmetic accuracy test Data reasonableness test Completeness test

©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Output Controls These controls focus on detecting errors after processing is completed rather than on preventing errors.

©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Learning Objective 4 Describe how general controls affect the auditor’s testing of application controls.

©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Impact of Information Technology on the Audit Process Effects of general controls on control risk Effects of IT controls on control risk and substantive tests Auditing in less complex IT environments Auditing in more complex IT environments

©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Learning Objective 5 Use the test data, parallel simulation, and embedded audit module approaches when auditing through the computer.

©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Test Data Approach Test data should include all relevant conditions that the auditor wants tested. Application programs tested by the auditor’s test data must be the same as those the client used throughout the year. Test data must be eliminated from the client’s records

©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Test Data Approach Application Programs (Assume Batch System) Control Test Results Master Files Contaminated Master Files Transaction Files (Contaminated?) Input Test Transactions to Test Key Control Procedures

©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Test Data Approach Control Test Results Auditor Makes Comparisons Differences Between Actual Outcome and Predicted Result Auditor-predicted Results of Key Control Procedures Based on an Understanding of Internal Control

©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Parallel Simulation The auditor uses auditor-controlled software to perform parallel operations to the client’s software by using the same data files.

©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Parallel Simulation Production Transactions Master File Auditor- Prepared Program Client Application System Programs Auditor Results Client Results Auditor Makes Comparisons Between Client’s Application System Output and Understanding of the Client Systems Via the Parallel Simulation Exception Report Noting Differences

©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Embedded Audit Module Approach Auditor inserts an audit module in the client’s application system to capture transactions with characteristics that are of specific interest to the auditor.

©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Learning Objective 6 Identify issues for e-commerce systems and other specialized IT environments.

©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Issues for Different IT Environments Issues for microcomputer environments Issues for network environments Issues for database management systems Issues when clients outsource IT Issues for e-commerce systems

©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley End of Chapter 11