8-1 Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.

Slides:



Advertisements
Similar presentations
Module 3: Business Information Systems
Advertisements

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder The Impact of Information Technology on the Audit Process Chapter 12.
Accounting Information Systems, 5th edition James A. Hall
ITAuditing Using GAS & CAATs
Part I: Purchases and Cash Disbursements Procedures
Auditing Concepts.
Auditing Computer-Based Information Systems
Auditing Computer Systems
Nature of IT Based Systems
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 7-1 Chapter 7 CHAPTER 7 THE EFFECT OF INFORMATION TECHNOLOGY ON THE AUDIT.
Accounting Information Systems, 6 th edition James A. Hall COPYRIGHT © 2009 South-Western, a division of Cengage Learning. Cengage Learning and South-Western.
Consideration of Internal Control in an IT Environment.
©2006 Prentice Hall Business Publishing, Auditing 11/e, Arens/Beasley/Elder The Impact of Information Technology on the Audit Process Chapter 12.
Internal Control Concepts Knowledge. Best Practices for IT Governance IT Governance Structure of Relationship Audit Role in IT Governance.
Chapter 14 System Controls. A Quote “The factory of the future will have only two employees, a man and a dog. The man will be there to feed the dog. The.
1 Output Controls Ensure that system output is not lost, misdirected, or corrupted and that privacy is not violated. Exposures of this sort can cause serious.
Computers: Tools for an Information Age
Auditing Auditing & Automated Systems Chapter 22 Auditing & Automated Systems Chapter 22.
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley The Impact of Information Technology on the Audit.
Auditing & Assurance Services, 6e
CHAPTER 6 ELECTRONIC DATA PROCESSING SYSTEMS
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Copyright © 2003 by Prentice Hall Computers: Tools for an Information Age Chapter 14 Systems Analysis and Design: The Big Picture.
Today’s Lecture application controls audit methodology.
Chapter 17: Computer Audits ACCT620 Internal Accounting Otto Chang Professor of Accounting.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
Chapter 3 – Electronic Business (E-Business) Systems
Computers Are Your Future Tenth Edition Chapter 12: Databases & Information Systems Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Transaction Processing System  Business Transactions are certain events that occur routinely in a business firm.  A transaction is a set of activities.
Data management in the field Ari Haukijärvi 2nd EHES training seminar.
(SIA) 14 Internal Audit in an Information Technology Environment Standard should be read in the conjunction with the “Preface to the Standards on Internal.
Chapter 5 Internal Control over Financial Reporting
Auditing Complex EDP Systems
Implications of Information Technology for the Audit Process
Internal Control in a Financial Statement Audit
1 Chapter Three IT Risks and Controls. 2 The Risk Management Process Identify IT Risks Assess IT Risks Identify IT Controls Document IT Controls Monitor.
Copyright © 2007 Pearson Education Canada 1 Chapter 13: Audit of the Sales and Collection Cycle: Tests of Controls.
Understanding the IT environment of the entity. Session objectives Defining contours of financial accounting in an IT environment and its characteristics.
S4: Understanding the IT environment of the entity.
 2001 Prentice Hall Business Publishing, Accounting Information Systems, 8/E, Bodnar/Hopwood Chapter 10 Electronic Data Processing Systems.
4 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Computer Software Chapter 4.
Chapter 12 Inventories and Cost of Goods Sold McGraw-Hill/Irwin
AUDIT IN COMPUTERIZED ENVIRONMENT
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 6-1 Chapter Six Internal Control in a Financial Statement Audit.
 2004 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, by Bodnar/Hopwood 13 – 1 Chapter 13 Auditing Information Technology.
CHAPTER 2 TYPES OF BUSINESS INFORMATION SYSTEM. INTRODUCTION Information System support business operations by processing data related to business operation.
APA – Fundamentals of Payroll Chapter 2 – Payroll Systems March 10, 2012.
Copyright©2001 by Houghton Mifflin Company. All rights reserved. 1 Financial Accounting Belverd E. Needles, Jr. Marian Powers Multimedia.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
The Impact of Information Technology on the Audit Process
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Internal Control in a Financial Statement Audit Chapter Six.
Auditing Concepts.
Chapter 08 Consideration of
Electronic Data Processing Systems Chapter 6.
Auditing Information Technology
Chapter 4 The Revenue Cycle 1.
Controlling Computer-Based Information Systems, Part II
TRANSACTION PROCESSING
Part I: Purchases and Cash Disbursements Procedures
Managing the IT Function
The Impact of Information Technology on the Audit Process
Computer-Based Processing: Developing an Audit Assessment Approach
The Impact of Information Technology on the Audit Process
Payroll and Production
Purchases and Cash Disbursements Procedures
CHAPTER 15 AUDITING EDP SYSTEMS.
CHAPTER 6 ELECTRONIC DATA PROCESSING SYSTEMS
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Presentation transcript:

8-1 Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.

8-2 Many systems have developed away from centralized systems with one main frame computer using user developed software to a combination of smaller computers using commercially available software  Less expensive software  Electronic checkbooks (e.g., Quicken)  Moderate system  Basic general ledger system (e.g.., QuickBooks)  Expensive  ERP systems (e.g., SAP) Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.

8-3  Usually consists of:  Hardware  Digital computer and peripheral equipment  Software  Various programs and routines for operating the system Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.

8-4 Input/Output Devices Central Processing Unit Auxiliary Storage Card Readers Arithmetic Unit Magnetic Disks Terminals Control Unit Magnetic Drums Electronic Cash Magnetic Tapes Registers Optical Compact Disks Optical Scanners Magnetic Tape Drives Magnetic Disk Drives Optical Compact Disks Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.

8-5  Two Types:  Systems software  Programs that control and coordinate hardware components and provide support to application software  Operating system (Examples: Unix, Windows)  Application software  Programs designed to perform a specific data processing task  Written in programming language (Example: Java) Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.

8-6  Regardless of size, system possesses one or more of the following elements  Batch processing  On-line capabilities  Database storage  IT networks  End user computing Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.

8-7  Input data gathered and processed periodically in groups  Example: Accumulate all of a day’s sales transactions and process them as a batch at end of day  Often more efficient than other types of systems but does not provide up-to-minute information Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.

8-8  Online systems allow users direct access to data stored in the system  Two types (a company may use both)  Online transaction processing (OLTP)  Individual transactions entered from remote locations  Online real time (Example: Bank balance at ATM)  Online analytical processing (OLAP)  Enables user to query a system for analysis  Example: Data warehouse, decision support systems, expert systems Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.

8-9  In traditional-IT systems, each computer application maintains separate master files  Redundant information stored in several files  Database system allows users to access same integrated database file  Eliminates data redundancy  Creates need for data administrator for security against improper access Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.

8-10  Networks  Computers linked together through telecommunication links that enable computers to communicate information back and forth  WAN, LAN  Internet, intranet, extranet  Electronic commerce  Involves electronic processing and transmission of data between customer and client  Electronic Data Interchange (EDI) Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.

8-11  User departments are responsible for the development and execution of certain IT applications  Involves a decentralized processing system  IT department generally not involved  Controls needed to prevent unauthorized access Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.

8-12  Importance of internal control not diminished in computerized environment  Separation of duties  Clearly defined responsibilities  Augmented by controls written into computer programs Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.

8-13  In a traditional manual system, hard-copy documentation available for accounting cycle  In computerized environment, audit trail ordinarily still exists, but often not in printed form  Can affect audit procedures  Consulting auditors during design stage of IT-based system helps ultimate auditability Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.

8-14 Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.

8-15  Information systems management  Supervise the operation of the department and report to vice president of finance  Systems analysis  Responsible for designing the system  Application programming  Design flowcharts and write programming code  Database administration  Responsible for planning and administering the company database  Data Entry  Prepare and verify input data for processing Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.

8-16  IT Operations  Run and monitor central computers  Program and file library  Protect computer programs, master files and other records from loss, damage and unauthorized use  Data Control  Reviews and tests all input procedures, monitors processes and reviews IT logs  Telecommunications Specialists  Responsible for maintaining and enhancing IT networks  Systems Programming  Responsible for troubleshooting the operating system Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.

8-17  History shows the person responsible for frauds in many situations set up the system and controlled its modifications  Segregation of duties  Programming separate from controlling data entry  Computer operator from custody or detailed knowledge of programs  If segregation not possible need:  Compensating controls like batch totals  Organizational controls not effective in mitigating collusion Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.

8-18  Interested in evaluating the overall efficiency and effectiveness of information systems operations and related controls throughout the company  Should participate in design of IT-based system  Perform tests to ensure no unauthorized changes, adequate documentation, control activities functioning and data group performing duties. Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.

8-19 Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.

8-20 General Control Activities  Developing new programs and systems  Changing existing programs and systems  Access to programs and data  IT operations controls Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.

8-21  Programmed Control Activities  Input validation checks  Limit test  Validity test  Self-checking number  Batch controls  Item count  Control total  Hash total  Processing controls  Input controls plus file labels  Manual Follow-up Activities  Exception reports follow-up Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.

8-22  Designed to test the completeness and accuracy of IT-processed transactions  Designed to ensure reliability  Reconciliation of control totals generated by system to totals developed at input phase  Example: Sales invoices generated by IT-based system tested for clerical accuracy and pricing by the accounting clerk Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.

8-23  Involves use of one or more user operated workstations to process data  Needed controls  Train users  Document computer processing procedures  Backup files stored away from originals  Authorization controls  Prohibit use of unauthorized programs  Use antivirus software Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.

8-24  Step 1 – Consider IT system in planning  Step 2 – Obtain an understanding of the client and its environment  Documentation of client’s IT-based system depends on complexity of system  Narrative  Systems flowchart  Program flowchart  Internal control questionnaires Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.

8-25  Identify risks  Relate the identified risks to what can go wrong at the relevant assertion level  Consider whether the risks are of a magnitude that could result in a material misstatement  Consider the likelihood that the risks could result in a material misstatement  Evaluate effectiveness of related controls in mitigating risks  Test of controls over IT-based systems Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.

8-26  Auditing Around the Computer--Manually processing selected transactions and comparing results to computer output  Manual Tests of Computer Controls--Inspection of computer control reports and evidence of manual follow-up on exceptions  Auditing Through the Computer--Computer assisted techniques  Test Data  Integrated Test Facility  Controlled Programs  Program Analysis Techniques  Tagging and Tracing Transactions  Generalized audit software – parallel simulation Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.

8-27 In general, using client data and generalized audit software  Examine client’s records for overall quality, completeness and valid conditions  Rearrange data and perform analyses  Select audit samples  Compare data on separate files  Compare results of audit procedures with client’s records Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.

8-28 Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.