SlideShare ist ein Scribd-Unternehmen logo
1 von 24
CHAPTER 6 
AUDITING IN COMPUTERISED 
INFORMATION SYSTEM ENVIRONMENT 
NOR AMALIA BINTI AHAD 
10DAT11F2027 
NORMASTURA BINTI AHMAD 
10DAT11F2039 
SITI NABILAH BINTI ABDULLAH 
10DAT11F2042 
NUR SYUHADA BINTI RUSLAN 
10DAT11F2048
6.1.1 Describe The Changing 
Information Of Technology and 
Implication For Auditing 
 People are constantly looking for online activities and expect 
faster delivery. In accounting as well as auditing, IT plays a 
vital role in producing reliable and timely financial statements 
and reports. 
 Most companies use IT to improve company internal control 
system through the addition of new control procedure through 
computer and replacing the manual control due to the 
likelihood of possible human error.
Electronic Data Processing (EDP) 
Planning 
Recording 
Managing 
Reporting business 
transaction
Electronic Data Processing (EDP) 
Source Document : 
 Invoice 
 Revenue Receipt 
 Payment Voucher 
 Cheque
Electronic Data Processing (EDP) 
The basic financial reporting : 
 Statement of financial position (balance 
sheet) 
 Profit and Loss account 
 Statement of cash flows 
 Statement of changes in equity
Advantages and Disadvantages of Using 
IT Systems 
Advantages Disadvantages 
• Easier to have instant data 
processing compared to manual 
data processing. 
• The use of electronic data 
processing has resulted in 
decreased vacancies for job 
searchers like accountant 
• More accurate and effective 
time of transactions. 
• High cost for companies as 
effective electronic data 
processing software tends to be 
expensive. 
• Increase performances 
especially in manufacturing 
industries and related industries 
due to improved the inventory 
automated systems. 
• Additional cost for support 
and backup systems in the 
event of power failure.
Implication 
From manual control to electronic environment : 
 Traditional paperwork in which the auditor can see and 
feel the printed marks evidencing transaction are carried 
out online and most cases in ‘real time’. 
 Generally looks for the authorizing signatures on the 
papers evidencing the transactions and Electronic. 
 It processing environment such authority is evidenced by 
the user of identification codes and passwords which are 
all physically invisible. 
 The level of complexity can be classified into 2 
level that is low and high.
6.1.2 Determine the level of 
complexity in computerized 
information system environment 
1. EDP systems can be defined by their technical 
complexity and the extent to which they are used in an 
organization. 
2. Technical complexity : 
 Online-line processing 
- An online system allows direct access 
into the computer. Transactions can be put directly into the 
system so that master files are updated at time the entry is 
made.
 Communication systems 
- Communication channels can connect the computer 
directly to users anywhere in the world. 
 Distributed processing 
-When the computing function is apportioned among 
CPUs spread geographically and connected by a 
communication system. 
 Data Base Management 
- As the volume and uses of computer-processed data 
expand, data on different files are often redundant. 
-The effect is inefficient use of file space and the need 
to update files continually.
6.1.3 General Control CIS 
Control Descriptions 
The it control 
environment 
• The IT government structure 
• How IT risk are identified, mitigated 
and managed 
• The information system, strategic plan 
and budget 
• The organizational structure and 
segregation of duties 
Day-to-day computer 
operations 
• Acquisition, installations, 
configuration, integration and 
maintenance of the IT infrastructure 
• Delivery of information service to user 
• Management of third-party provider
Access to program and data • Security of passwords 
• Internet firewalls and remote access 
controls 
• Data encryption and cryptographic 
keys 
Program development and 
program changes 
• Acquisition and implementation of 
new applications 
• System development and quality 
assurance methodology 
Monitoring of IT operations • Policies and procedures regarding 
the information system and reporting 
that ensure that user comply with IT 
general control.
Application Control On CIS 
1. Application control is controls within a computer application 
to ensure- completeness, accuracy of input, processing and 
validity of the resulting accounting entries. 
2. The main aim is to ensure Validity, completeness and 
accuracy of accounting data. 
3. Application controls classified into: 
a) Input controls 
b) Processing controls 
c) Output controls
a) Input controls 
 The main aim of input controls is to reduce errors in the data 
entered in the system for processing. Input controls include 
checking and ensuring that : 
- Input data are authorized by the appropriate official. 
- Data represent valid record of actual transaction 
- Correctly classified for the purpose of accounting. 
 Example : - Sequence checks 
- Batch control
b) Processing controls 
 There are divided into mechanical and programmed 
controls. 
 Programmed control are done during the system 
development to ensure that only data related to a particular 
transaction is processed and not otherwise. 
c) Output Controls 
 Controls relating to input and processing itself with the final 
objective. 
 Relates precisely to the original input. 
 Represents the outcome of a valid and tested program of 
instructions.
6.1.4 The Plan An Audit Strategic 
1) Ensure that these is adequate compliance and substantive 
procedures and transmitted date are correct and completed. 
2) Apply professional scepticism by cross verification of 
record, reconciliation between primary and subsidiary 
ledger, questioning and critical assessment of audit 
evidence. 
3) The audit which may be affected by the client CIS 
environment.
An application may be considered to be complex when: 
a) The volume of transactions is such that users would find 
it difficult to identify and correct error processing. 
b) The computer automatically generate material 
transactions or entries directly to another application. 
c) The computer perform complicated computations of 
financial information and automatically generates 
material transaction.
6.2 .1 The Concept Of Computer 
Assisted Audit Techniques 
(CAAT) 
 CAAT’s are computer programs and data that the auditor 
uses as part of the audit procedures to process data of audit 
significance contained in a client computer information 
system (CIS). 
 Auditor's use of a computer-assisted audit technique is 
something special- normally the techniques used by an 
auditor are not computer assisted.
 The term CAAT refers to the use of certain software that 
can be used by the auditor to perform audits and to achieve 
the goals of auditing. 
 CAATs offer much needed help a the audit technology 
tools facilitate more granular analysis of data and help to 
determine the accuracy of the information.
6.2.2 Types Of CAATs 
I. Generalized Audit Software (GAS) 
 Comprises computer programs used for audit purposes to 
process data audit significance from the client accounting 
system. 
 It is used by the auditor to examine the entity computer 
files and may be used during both test of control and 
substantive testing of transactions and balances. 
II. Test Data 
 Test data is data submitted by the auditor for processing 
by the clients computer based accounting system. 
 The review of an application system will provide 
information about internal controls built in the system.
III. Utility Software 
 Utility software is the subset of software, such as database 
management systems report generators, that provides 
evidence to the auditors about system control effectiveness. 
IV. The audit-expert system 
 The audit expert system will give direction and valuable 
information to all levels of auditors while carrying out the 
audit because the-based system knowledge-base of the senior 
auditors and managers.
The Advantages Of CAAT 
 Independently access the data stored on a computer system 
without dependence on the client 
 Test the reliability of client software, for example the IT 
application controls 
 Increase the accuracy of audit tests 
 Perform audit tests more efficiently, which in the long-term 
will result in a more cost effective audit.
6.2.3 Method Audit Computerized 
Information System (CIS) 
1) Auditing around the computer 
 This approach, the auditor is not using computer control to 
reduce assessed control risk. 
 Instead, the auditor uses manual controls to support reduced 
control risk assessment. 
 Often, smaller companies lack dedicated IT personnel, or 
they rely on periodic involvement of IT consultants to assist 
in installing and maintaining hardware and software. 
 Auditing around the computer is effective because these 
system often produce sufficient audit trails to permit auditor 
to compare source documents.
2) Auditing through the computer 
 as organisations expand their use of IT, internal controls are 
often embedded in applications that are visible only in 
electronic form.
Example Of Auditing Around And Through The 
Computer 
Internal Control Auditing Around the 
Computer Approach 
Auditing Through 
the Computer 
Approach 
1. Credit is approved 
for sales on account 
Select a sample of 
sales transaction from 
the journal and obtain 
the related customer 
sales order 
Obtain a copy of the 
client sales 
applications program 
and related credit limit 
master file 
2. Payroll is processed 
only 
Select a sample of 
payroll disbursements 
from the payroll 
journal 
Create a test data file 
of valid and invalid 
employee ID number

Weitere ähnliche Inhalte

Was ist angesagt?

Unit 1 Introduction to Auditing
Unit 1 Introduction to AuditingUnit 1 Introduction to Auditing
Unit 1 Introduction to AuditingRadhika Gohel
 
Rights and duties of company auditor
Rights and duties of company auditorRights and duties of company auditor
Rights and duties of company auditorSundar B N
 
Appointment and removal of auditor
Appointment and removal of auditorAppointment and removal of auditor
Appointment and removal of auditorBharathikukutla
 
Appointment of Auditor
Appointment of AuditorAppointment of Auditor
Appointment of AuditorAnkit Agarwal
 
Auditing-definition & objective of auditing
Auditing-definition & objective of auditingAuditing-definition & objective of auditing
Auditing-definition & objective of auditingRavi kumar
 
Liabilities of company auditor for auditing
Liabilities of company auditor for auditingLiabilities of company auditor for auditing
Liabilities of company auditor for auditingPinkey Rana
 
AUDIT REPORT [ AUDITING ]
AUDIT REPORT [ AUDITING ]AUDIT REPORT [ AUDITING ]
AUDIT REPORT [ AUDITING ]Rakshit Porwal
 
Unit 1 Introduction to Audit
Unit 1   Introduction to AuditUnit 1   Introduction to Audit
Unit 1 Introduction to AuditAjay Nazarene
 
Cost audit meaning, importance, objectives, phases
Cost audit meaning, importance, objectives, phasesCost audit meaning, importance, objectives, phases
Cost audit meaning, importance, objectives, phasesDr. Ankita Chaturvedi
 
Auditing (Introduction to Auditing)
Auditing (Introduction to Auditing) Auditing (Introduction to Auditing)
Auditing (Introduction to Auditing) Noorulhadi Qureshi
 
Accounting standards
Accounting standards Accounting standards
Accounting standards Manah Chhabra
 

Was ist angesagt? (20)

Auditor's Report
Auditor's  ReportAuditor's  Report
Auditor's Report
 
Presentation on vouching and verification
Presentation on vouching and verificationPresentation on vouching and verification
Presentation on vouching and verification
 
9. audit evidence
9. audit evidence9. audit evidence
9. audit evidence
 
Audit, investigation & forensic accounting: Exploring the nexus
Audit, investigation & forensic accounting: Exploring the nexusAudit, investigation & forensic accounting: Exploring the nexus
Audit, investigation & forensic accounting: Exploring the nexus
 
Unit 1 Introduction to Auditing
Unit 1 Introduction to AuditingUnit 1 Introduction to Auditing
Unit 1 Introduction to Auditing
 
Rights and duties of company auditor
Rights and duties of company auditorRights and duties of company auditor
Rights and duties of company auditor
 
Appointment and removal of auditor
Appointment and removal of auditorAppointment and removal of auditor
Appointment and removal of auditor
 
Introduction of auditing
Introduction of auditingIntroduction of auditing
Introduction of auditing
 
Appointment of Auditor
Appointment of AuditorAppointment of Auditor
Appointment of Auditor
 
Auditing-definition & objective of auditing
Auditing-definition & objective of auditingAuditing-definition & objective of auditing
Auditing-definition & objective of auditing
 
Liabilities of company auditor for auditing
Liabilities of company auditor for auditingLiabilities of company auditor for auditing
Liabilities of company auditor for auditing
 
AUDIT REPORT [ AUDITING ]
AUDIT REPORT [ AUDITING ]AUDIT REPORT [ AUDITING ]
AUDIT REPORT [ AUDITING ]
 
Appointment of auditor
Appointment of auditorAppointment of auditor
Appointment of auditor
 
Unit 1 Introduction to Audit
Unit 1   Introduction to AuditUnit 1   Introduction to Audit
Unit 1 Introduction to Audit
 
Cost audit meaning, importance, objectives, phases
Cost audit meaning, importance, objectives, phasesCost audit meaning, importance, objectives, phases
Cost audit meaning, importance, objectives, phases
 
Auditing (Introduction to Auditing)
Auditing (Introduction to Auditing) Auditing (Introduction to Auditing)
Auditing (Introduction to Auditing)
 
Internal check audit (ppt)
Internal check audit (ppt)Internal check audit (ppt)
Internal check audit (ppt)
 
Auditor's report
Auditor's reportAuditor's report
Auditor's report
 
MANAGING DIRECTOR
MANAGING DIRECTORMANAGING DIRECTOR
MANAGING DIRECTOR
 
Accounting standards
Accounting standards Accounting standards
Accounting standards
 

Ähnlich wie Chapter 6

Chapter 4 : Auditing and the information technology environment
Chapter 4 : Auditing and the information technology environmentChapter 4 : Auditing and the information technology environment
Chapter 4 : Auditing and the information technology environmentKugendranMani
 
Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Sharah Ayumi
 
Auditing In Computer Environment Presentation
Auditing In Computer Environment PresentationAuditing In Computer Environment Presentation
Auditing In Computer Environment PresentationEMAC Consulting Group
 
Computerized Environment
Computerized EnvironmentComputerized Environment
Computerized EnvironmentVadivelM9
 
Auditing in a computer environment copy
Auditing in a computer environment   copyAuditing in a computer environment   copy
Auditing in a computer environment copySaleh Rashid
 
Core Areas of a CA- Interlinked with computers
Core Areas of a CA- Interlinked with computersCore Areas of a CA- Interlinked with computers
Core Areas of a CA- Interlinked with computersShikha Gupta
 
Sushant edp
Sushant edpSushant edp
Sushant edpzalak007
 
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDITComputer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDITShahzeb Pirzada
 
Auditing in computerized environment.pptx
Auditing in computerized environment.pptxAuditing in computerized environment.pptx
Auditing in computerized environment.pptxinfantemiliya18
 
Information systems and its components iii
Information systems and its components   iiiInformation systems and its components   iii
Information systems and its components iiiAshish Desai
 
Components of Computerised Accounting.pptx
Components of Computerised Accounting.pptxComponents of Computerised Accounting.pptx
Components of Computerised Accounting.pptxSabbahIqbal
 
Icai seminar kolkata
Icai seminar kolkataIcai seminar kolkata
Icai seminar kolkatasunil patro
 
CONTROL AND AUDIT
CONTROL AND AUDITCONTROL AND AUDIT
CONTROL AND AUDITRos Dina
 
Auditing in Computerized Environment
Auditing in Computerized EnvironmentAuditing in Computerized Environment
Auditing in Computerized EnvironmentDr. Sushil Bansode
 

Ähnlich wie Chapter 6 (20)

Audit and Assurance
Audit and AssuranceAudit and Assurance
Audit and Assurance
 
Chapter 4 : Auditing and the information technology environment
Chapter 4 : Auditing and the information technology environmentChapter 4 : Auditing and the information technology environment
Chapter 4 : Auditing and the information technology environment
 
Bankauditin it env
Bankauditin it envBankauditin it env
Bankauditin it env
 
bankauditinITEnv
bankauditinITEnvbankauditinITEnv
bankauditinITEnv
 
bankauditinITEnv
bankauditinITEnvbankauditinITEnv
bankauditinITEnv
 
Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6
 
Auditing In Computer Environment Presentation
Auditing In Computer Environment PresentationAuditing In Computer Environment Presentation
Auditing In Computer Environment Presentation
 
Computerized Environment
Computerized EnvironmentComputerized Environment
Computerized Environment
 
Auditing in a computer environment copy
Auditing in a computer environment   copyAuditing in a computer environment   copy
Auditing in a computer environment copy
 
Core Areas of a CA- Interlinked with computers
Core Areas of a CA- Interlinked with computersCore Areas of a CA- Interlinked with computers
Core Areas of a CA- Interlinked with computers
 
Sushant edp
Sushant edpSushant edp
Sushant edp
 
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDITComputer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
 
Auditing in computerized environment.pptx
Auditing in computerized environment.pptxAuditing in computerized environment.pptx
Auditing in computerized environment.pptx
 
Bankauditin it env
Bankauditin it envBankauditin it env
Bankauditin it env
 
Information systems and its components iii
Information systems and its components   iiiInformation systems and its components   iii
Information systems and its components iii
 
Components of Computerised Accounting.pptx
Components of Computerised Accounting.pptxComponents of Computerised Accounting.pptx
Components of Computerised Accounting.pptx
 
Icai seminar kolkata
Icai seminar kolkataIcai seminar kolkata
Icai seminar kolkata
 
CONTROL AND AUDIT
CONTROL AND AUDITCONTROL AND AUDIT
CONTROL AND AUDIT
 
Auditing in Computerized Environment
Auditing in Computerized EnvironmentAuditing in Computerized Environment
Auditing in Computerized Environment
 
Text-DISA_Review_Questions.docx
Text-DISA_Review_Questions.docxText-DISA_Review_Questions.docx
Text-DISA_Review_Questions.docx
 

Mehr von Nur Dalila Zamri (20)

Power point contoh slide viva
Power point contoh slide vivaPower point contoh slide viva
Power point contoh slide viva
 
Business research (Last Semester Project)
Business research (Last Semester Project)Business research (Last Semester Project)
Business research (Last Semester Project)
 
Resume new
Resume newResume new
Resume new
 
C v new
C v newC v new
C v new
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Chapter 3 (2)
Chapter 3 (2)Chapter 3 (2)
Chapter 3 (2)
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Business finance ratio (bp plastic)
Business finance  ratio (bp plastic)Business finance  ratio (bp plastic)
Business finance ratio (bp plastic)
 
Bus,fin
Bus,finBus,fin
Bus,fin
 
Pb604 – bussiness finance
Pb604 – bussiness financePb604 – bussiness finance
Pb604 – bussiness finance
 
Cahpter 2 Audit Sampling
Cahpter 2 Audit SamplingCahpter 2 Audit Sampling
Cahpter 2 Audit Sampling
 
Business finance Chapter1 - Finance management
Business finance Chapter1 - Finance managementBusiness finance Chapter1 - Finance management
Business finance Chapter1 - Finance management
 
Audit bab1 sem 6- Audit Approach
Audit bab1 sem 6- Audit ApproachAudit bab1 sem 6- Audit Approach
Audit bab1 sem 6- Audit Approach
 
Ten principles that form the foundations of financial management
Ten principles that form the foundations of financial managementTen principles that form the foundations of financial management
Ten principles that form the foundations of financial management
 
Business plan workbook 17nov 1
Business plan workbook 17nov 1Business plan workbook 17nov 1
Business plan workbook 17nov 1
 
Catalogue
CatalogueCatalogue
Catalogue
 

Kürzlich hochgeladen

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Kürzlich hochgeladen (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

Chapter 6

  • 1. CHAPTER 6 AUDITING IN COMPUTERISED INFORMATION SYSTEM ENVIRONMENT NOR AMALIA BINTI AHAD 10DAT11F2027 NORMASTURA BINTI AHMAD 10DAT11F2039 SITI NABILAH BINTI ABDULLAH 10DAT11F2042 NUR SYUHADA BINTI RUSLAN 10DAT11F2048
  • 2. 6.1.1 Describe The Changing Information Of Technology and Implication For Auditing  People are constantly looking for online activities and expect faster delivery. In accounting as well as auditing, IT plays a vital role in producing reliable and timely financial statements and reports.  Most companies use IT to improve company internal control system through the addition of new control procedure through computer and replacing the manual control due to the likelihood of possible human error.
  • 3. Electronic Data Processing (EDP) Planning Recording Managing Reporting business transaction
  • 4. Electronic Data Processing (EDP) Source Document :  Invoice  Revenue Receipt  Payment Voucher  Cheque
  • 5. Electronic Data Processing (EDP) The basic financial reporting :  Statement of financial position (balance sheet)  Profit and Loss account  Statement of cash flows  Statement of changes in equity
  • 6. Advantages and Disadvantages of Using IT Systems Advantages Disadvantages • Easier to have instant data processing compared to manual data processing. • The use of electronic data processing has resulted in decreased vacancies for job searchers like accountant • More accurate and effective time of transactions. • High cost for companies as effective electronic data processing software tends to be expensive. • Increase performances especially in manufacturing industries and related industries due to improved the inventory automated systems. • Additional cost for support and backup systems in the event of power failure.
  • 7. Implication From manual control to electronic environment :  Traditional paperwork in which the auditor can see and feel the printed marks evidencing transaction are carried out online and most cases in ‘real time’.  Generally looks for the authorizing signatures on the papers evidencing the transactions and Electronic.  It processing environment such authority is evidenced by the user of identification codes and passwords which are all physically invisible.  The level of complexity can be classified into 2 level that is low and high.
  • 8. 6.1.2 Determine the level of complexity in computerized information system environment 1. EDP systems can be defined by their technical complexity and the extent to which they are used in an organization. 2. Technical complexity :  Online-line processing - An online system allows direct access into the computer. Transactions can be put directly into the system so that master files are updated at time the entry is made.
  • 9.  Communication systems - Communication channels can connect the computer directly to users anywhere in the world.  Distributed processing -When the computing function is apportioned among CPUs spread geographically and connected by a communication system.  Data Base Management - As the volume and uses of computer-processed data expand, data on different files are often redundant. -The effect is inefficient use of file space and the need to update files continually.
  • 10. 6.1.3 General Control CIS Control Descriptions The it control environment • The IT government structure • How IT risk are identified, mitigated and managed • The information system, strategic plan and budget • The organizational structure and segregation of duties Day-to-day computer operations • Acquisition, installations, configuration, integration and maintenance of the IT infrastructure • Delivery of information service to user • Management of third-party provider
  • 11. Access to program and data • Security of passwords • Internet firewalls and remote access controls • Data encryption and cryptographic keys Program development and program changes • Acquisition and implementation of new applications • System development and quality assurance methodology Monitoring of IT operations • Policies and procedures regarding the information system and reporting that ensure that user comply with IT general control.
  • 12. Application Control On CIS 1. Application control is controls within a computer application to ensure- completeness, accuracy of input, processing and validity of the resulting accounting entries. 2. The main aim is to ensure Validity, completeness and accuracy of accounting data. 3. Application controls classified into: a) Input controls b) Processing controls c) Output controls
  • 13. a) Input controls  The main aim of input controls is to reduce errors in the data entered in the system for processing. Input controls include checking and ensuring that : - Input data are authorized by the appropriate official. - Data represent valid record of actual transaction - Correctly classified for the purpose of accounting.  Example : - Sequence checks - Batch control
  • 14. b) Processing controls  There are divided into mechanical and programmed controls.  Programmed control are done during the system development to ensure that only data related to a particular transaction is processed and not otherwise. c) Output Controls  Controls relating to input and processing itself with the final objective.  Relates precisely to the original input.  Represents the outcome of a valid and tested program of instructions.
  • 15. 6.1.4 The Plan An Audit Strategic 1) Ensure that these is adequate compliance and substantive procedures and transmitted date are correct and completed. 2) Apply professional scepticism by cross verification of record, reconciliation between primary and subsidiary ledger, questioning and critical assessment of audit evidence. 3) The audit which may be affected by the client CIS environment.
  • 16. An application may be considered to be complex when: a) The volume of transactions is such that users would find it difficult to identify and correct error processing. b) The computer automatically generate material transactions or entries directly to another application. c) The computer perform complicated computations of financial information and automatically generates material transaction.
  • 17. 6.2 .1 The Concept Of Computer Assisted Audit Techniques (CAAT)  CAAT’s are computer programs and data that the auditor uses as part of the audit procedures to process data of audit significance contained in a client computer information system (CIS).  Auditor's use of a computer-assisted audit technique is something special- normally the techniques used by an auditor are not computer assisted.
  • 18.  The term CAAT refers to the use of certain software that can be used by the auditor to perform audits and to achieve the goals of auditing.  CAATs offer much needed help a the audit technology tools facilitate more granular analysis of data and help to determine the accuracy of the information.
  • 19. 6.2.2 Types Of CAATs I. Generalized Audit Software (GAS)  Comprises computer programs used for audit purposes to process data audit significance from the client accounting system.  It is used by the auditor to examine the entity computer files and may be used during both test of control and substantive testing of transactions and balances. II. Test Data  Test data is data submitted by the auditor for processing by the clients computer based accounting system.  The review of an application system will provide information about internal controls built in the system.
  • 20. III. Utility Software  Utility software is the subset of software, such as database management systems report generators, that provides evidence to the auditors about system control effectiveness. IV. The audit-expert system  The audit expert system will give direction and valuable information to all levels of auditors while carrying out the audit because the-based system knowledge-base of the senior auditors and managers.
  • 21. The Advantages Of CAAT  Independently access the data stored on a computer system without dependence on the client  Test the reliability of client software, for example the IT application controls  Increase the accuracy of audit tests  Perform audit tests more efficiently, which in the long-term will result in a more cost effective audit.
  • 22. 6.2.3 Method Audit Computerized Information System (CIS) 1) Auditing around the computer  This approach, the auditor is not using computer control to reduce assessed control risk.  Instead, the auditor uses manual controls to support reduced control risk assessment.  Often, smaller companies lack dedicated IT personnel, or they rely on periodic involvement of IT consultants to assist in installing and maintaining hardware and software.  Auditing around the computer is effective because these system often produce sufficient audit trails to permit auditor to compare source documents.
  • 23. 2) Auditing through the computer  as organisations expand their use of IT, internal controls are often embedded in applications that are visible only in electronic form.
  • 24. Example Of Auditing Around And Through The Computer Internal Control Auditing Around the Computer Approach Auditing Through the Computer Approach 1. Credit is approved for sales on account Select a sample of sales transaction from the journal and obtain the related customer sales order Obtain a copy of the client sales applications program and related credit limit master file 2. Payroll is processed only Select a sample of payroll disbursements from the payroll journal Create a test data file of valid and invalid employee ID number