Week 4-2 Flashcards

1
Q

Audit around the computer

A

The use of IT in audit is a choose.
- Ignore computer processing
- Select source document (for example: purchase order) to match output
- Is often within smaller clients, private firms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Audit through the computer

A
  • Review and evaluate internal controls in an electronic data system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Two types of controls

A
  • Phyiscal
  • IT controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Two types of IT controls:

A
  • General controls
  • Application controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IT-general controls

A

TGC Apply to all the system components, processes,
and data present in an organization

Example controls:
- Logical acces controls over infrastructure,
applications, and data
- Program Change Management
- System development
- Conputer Operations
- Physical security controls over data centers
- Backup and recovery controls

Testing of control is usually on a sample basis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IT-general controls categories

A

o Separation of IT duties
o Physical controls
o Change management
o Back-up and contingency (recovery)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Three key aspects to seperate

A
  • Development of application (internal or external)
  • Operations
  • Data controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are Application controls?

A

Application controls relate to transactions and data pertaining to
each application and are specific to each application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

‘Rules’ of application controls can be

A

o Embedded – the application control is already part of or program/logic within the application software (e.g., 2 or 3-way match capabilities)
o Configured – the application control is performed depending on how the application is setup/configured or workflow is designed (e.g. accounts payable tolerance levels)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Input application control

A
  • To ensure that the information being processed is authorized, accurate, and complete
  • Data capture/Data validation
  • For example:
    o Financial total  total for all records in a batch
    o Hash total  total of codes from all batch records
    o Record count  total of records in a batch
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Proccessing application controls

A

rocessing
- Validation test (check digit; existence)  correct file, database, or program?
- Sequence test  correct processing order?
- Arithmetic accuracy test  accuracy of processed data?
- Data reasonableness test (range/limit)  data exceeds preset amounts?
- Completeness test field test  completeness of record fields?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Output application controls

A

Detect errors after processing is completed
- Output controls (highlight transactions)
- Error controls (suspense accounts)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

how to Test application controls

A

Typically, they can be tested as an example by using the
master file and the application of the client. The auditor
produces some transactions and pushes them through the
system. The auditor has its own program to see what the
results should be using the master file and subset of
transactions. And see whether the results of auditor match
with what the client has.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Pervasive nature of It controls – Canada, Sutton, Kuhn, IJAT (2009)

A

Hypotheses
- Increase in audit fees positively associated with IT material weaknesses
- Increase in audit fees greater for firms reporting IT material weaknesses
 Both true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The remote audit – Teeter, Alles Vasarhalyi, JETA (2010)

A

Deterrence Effect: In the context of the screenshot, the deterrence effect is enhanced by remote auditing. Since the auditors can potentially review the client’s systems and transactions at any time, and the client is not certain when the audit will occur, there is a continuous presence of the audit threat. This constant possibility of an audit may deter the client from committing irregularities or fraud because they must always be prepared for the auditor to review their transactions. The continuous monitoring environment essentially expands the deterrence effect because the “audit risk” is present throughout the year rather than just at scheduled audit times.

Efficiency Effect: The efficiency effect here seems to be related to the reduction in latency between when transactions occur and when they are audited. Traditional audits, which may occur annually or semi-annually, can have a longer latency between the occurrence of transactions and their examination by auditors. With remote auditing, especially when continuous auditing techniques are used, this latency can be significantly reduced. The transaction can be recorded, and almost immediately, the auditor can review it, leading to more timely audits and potentially more efficient business processes and decision-making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly