SlideShare a Scribd company logo
CHAPTER 6 
AUDITING IN COMPUTERISED 
INFORMATION SYSTEM ENVIRONMENT 
NOR AMALIA BINTI AHAD 
10DAT11F2027 
NORMASTURA BINTI AHMAD 
10DAT11F2039 
SITI NABILAH BINTI ABDULLAH 
10DAT11F2042 
NUR SYUHADA BINTI RUSLAN 
10DAT11F2048
6.1.1 Describe The Changing 
Information Of Technology and 
Implication For Auditing 
 People are constantly looking for online activities and expect 
faster delivery. In accounting as well as auditing, IT plays a 
vital role in producing reliable and timely financial statements 
and reports. 
 Most companies use IT to improve company internal control 
system through the addition of new control procedure through 
computer and replacing the manual control due to the 
likelihood of possible human error.
Electronic Data Processing (EDP) 
Planning 
Recording 
Managing 
Reporting business 
transaction
Electronic Data Processing (EDP) 
Source Document : 
 Invoice 
 Revenue Receipt 
 Payment Voucher 
 Cheque
Electronic Data Processing (EDP) 
The basic financial reporting : 
 Statement of financial position (balance 
sheet) 
 Profit and Loss account 
 Statement of cash flows 
 Statement of changes in equity
Advantages and Disadvantages of Using 
IT Systems 
Advantages Disadvantages 
• Easier to have instant data 
processing compared to manual 
data processing. 
• The use of electronic data 
processing has resulted in 
decreased vacancies for job 
searchers like accountant 
• More accurate and effective 
time of transactions. 
• High cost for companies as 
effective electronic data 
processing software tends to be 
expensive. 
• Increase performances 
especially in manufacturing 
industries and related industries 
due to improved the inventory 
automated systems. 
• Additional cost for support 
and backup systems in the 
event of power failure.
Implication 
From manual control to electronic environment : 
 Traditional paperwork in which the auditor can see and 
feel the printed marks evidencing transaction are carried 
out online and most cases in ‘real time’. 
 Generally looks for the authorizing signatures on the 
papers evidencing the transactions and Electronic. 
 It processing environment such authority is evidenced by 
the user of identification codes and passwords which are 
all physically invisible. 
 The level of complexity can be classified into 2 
level that is low and high.
6.1.2 Determine the level of 
complexity in computerized 
information system environment 
1. EDP systems can be defined by their technical 
complexity and the extent to which they are used in an 
organization. 
2. Technical complexity : 
 Online-line processing 
- An online system allows direct access 
into the computer. Transactions can be put directly into the 
system so that master files are updated at time the entry is 
made.
 Communication systems 
- Communication channels can connect the computer 
directly to users anywhere in the world. 
 Distributed processing 
-When the computing function is apportioned among 
CPUs spread geographically and connected by a 
communication system. 
 Data Base Management 
- As the volume and uses of computer-processed data 
expand, data on different files are often redundant. 
-The effect is inefficient use of file space and the need 
to update files continually.
6.1.3 General Control CIS 
Control Descriptions 
The it control 
environment 
• The IT government structure 
• How IT risk are identified, mitigated 
and managed 
• The information system, strategic plan 
and budget 
• The organizational structure and 
segregation of duties 
Day-to-day computer 
operations 
• Acquisition, installations, 
configuration, integration and 
maintenance of the IT infrastructure 
• Delivery of information service to user 
• Management of third-party provider
Access to program and data • Security of passwords 
• Internet firewalls and remote access 
controls 
• Data encryption and cryptographic 
keys 
Program development and 
program changes 
• Acquisition and implementation of 
new applications 
• System development and quality 
assurance methodology 
Monitoring of IT operations • Policies and procedures regarding 
the information system and reporting 
that ensure that user comply with IT 
general control.
Application Control On CIS 
1. Application control is controls within a computer application 
to ensure- completeness, accuracy of input, processing and 
validity of the resulting accounting entries. 
2. The main aim is to ensure Validity, completeness and 
accuracy of accounting data. 
3. Application controls classified into: 
a) Input controls 
b) Processing controls 
c) Output controls
a) Input controls 
 The main aim of input controls is to reduce errors in the data 
entered in the system for processing. Input controls include 
checking and ensuring that : 
- Input data are authorized by the appropriate official. 
- Data represent valid record of actual transaction 
- Correctly classified for the purpose of accounting. 
 Example : - Sequence checks 
- Batch control
b) Processing controls 
 There are divided into mechanical and programmed 
controls. 
 Programmed control are done during the system 
development to ensure that only data related to a particular 
transaction is processed and not otherwise. 
c) Output Controls 
 Controls relating to input and processing itself with the final 
objective. 
 Relates precisely to the original input. 
 Represents the outcome of a valid and tested program of 
instructions.
6.1.4 The Plan An Audit Strategic 
1) Ensure that these is adequate compliance and substantive 
procedures and transmitted date are correct and completed. 
2) Apply professional scepticism by cross verification of 
record, reconciliation between primary and subsidiary 
ledger, questioning and critical assessment of audit 
evidence. 
3) The audit which may be affected by the client CIS 
environment.
An application may be considered to be complex when: 
a) The volume of transactions is such that users would find 
it difficult to identify and correct error processing. 
b) The computer automatically generate material 
transactions or entries directly to another application. 
c) The computer perform complicated computations of 
financial information and automatically generates 
material transaction.
6.2 .1 The Concept Of Computer 
Assisted Audit Techniques 
(CAAT) 
 CAAT’s are computer programs and data that the auditor 
uses as part of the audit procedures to process data of audit 
significance contained in a client computer information 
system (CIS). 
 Auditor's use of a computer-assisted audit technique is 
something special- normally the techniques used by an 
auditor are not computer assisted.
 The term CAAT refers to the use of certain software that 
can be used by the auditor to perform audits and to achieve 
the goals of auditing. 
 CAATs offer much needed help a the audit technology 
tools facilitate more granular analysis of data and help to 
determine the accuracy of the information.
6.2.2 Types Of CAATs 
I. Generalized Audit Software (GAS) 
 Comprises computer programs used for audit purposes to 
process data audit significance from the client accounting 
system. 
 It is used by the auditor to examine the entity computer 
files and may be used during both test of control and 
substantive testing of transactions and balances. 
II. Test Data 
 Test data is data submitted by the auditor for processing 
by the clients computer based accounting system. 
 The review of an application system will provide 
information about internal controls built in the system.
III. Utility Software 
 Utility software is the subset of software, such as database 
management systems report generators, that provides 
evidence to the auditors about system control effectiveness. 
IV. The audit-expert system 
 The audit expert system will give direction and valuable 
information to all levels of auditors while carrying out the 
audit because the-based system knowledge-base of the senior 
auditors and managers.
The Advantages Of CAAT 
 Independently access the data stored on a computer system 
without dependence on the client 
 Test the reliability of client software, for example the IT 
application controls 
 Increase the accuracy of audit tests 
 Perform audit tests more efficiently, which in the long-term 
will result in a more cost effective audit.
6.2.3 Method Audit Computerized 
Information System (CIS) 
1) Auditing around the computer 
 This approach, the auditor is not using computer control to 
reduce assessed control risk. 
 Instead, the auditor uses manual controls to support reduced 
control risk assessment. 
 Often, smaller companies lack dedicated IT personnel, or 
they rely on periodic involvement of IT consultants to assist 
in installing and maintaining hardware and software. 
 Auditing around the computer is effective because these 
system often produce sufficient audit trails to permit auditor 
to compare source documents.
2) Auditing through the computer 
 as organisations expand their use of IT, internal controls are 
often embedded in applications that are visible only in 
electronic form.
Example Of Auditing Around And Through The 
Computer 
Internal Control Auditing Around the 
Computer Approach 
Auditing Through 
the Computer 
Approach 
1. Credit is approved 
for sales on account 
Select a sample of 
sales transaction from 
the journal and obtain 
the related customer 
sales order 
Obtain a copy of the 
client sales 
applications program 
and related credit limit 
master file 
2. Payroll is processed 
only 
Select a sample of 
payroll disbursements 
from the payroll 
journal 
Create a test data file 
of valid and invalid 
employee ID number

More Related Content

What's hot

Classification of Audit.pptx
Classification of Audit.pptxClassification of Audit.pptx
Classification of Audit.pptx
AbrarAhmed932553
 
Internal check internal audit internal control
Internal check internal audit internal controlInternal check internal audit internal control
Internal check internal audit internal control
SriramPurnaKotla
 
Internal controls in auditing
Internal controls in auditingInternal controls in auditing
Internal controls in auditingHardik Shah
 
Cost audit meaning, importance, objectives, phases
Cost audit meaning, importance, objectives, phasesCost audit meaning, importance, objectives, phases
Cost audit meaning, importance, objectives, phases
Dr. Ankita Chaturvedi
 
Verification and valuation of assets and liabilities
Verification and valuation of assets and liabilitiesVerification and valuation of assets and liabilities
Verification and valuation of assets and liabilities
Atta Hussain Syed
 
AUDIT REPORT [ AUDITING ]
AUDIT REPORT [ AUDITING ]AUDIT REPORT [ AUDITING ]
AUDIT REPORT [ AUDITING ]
Rakshit Porwal
 
Audit working papers
Audit working papersAudit working papers
Audit working papers
student
 
Auditing (Introduction to Auditing)
Auditing (Introduction to Auditing) Auditing (Introduction to Auditing)
Auditing (Introduction to Auditing)
Noorulhadi Qureshi
 
Forensic accounting ppt (2)
Forensic accounting ppt (2)Forensic accounting ppt (2)
Forensic accounting ppt (2)
Shriya Gupta
 
Varificationa & valuation of assets and liabilities
Varificationa & valuation of assets and liabilitiesVarificationa & valuation of assets and liabilities
Varificationa & valuation of assets and liabilities
Ashwitha shetty
 
Auditing in a computer environment copy
Auditing in a computer environment   copyAuditing in a computer environment   copy
Auditing in a computer environment copySaleh Rashid
 
Auditing In Computer Environment Presentation
Auditing In Computer Environment PresentationAuditing In Computer Environment Presentation
Auditing In Computer Environment Presentation
EMAC Consulting Group
 
Chapter 2 internal control
Chapter 2 internal controlChapter 2 internal control
Chapter 2 internal control
Dr Manu H Natesh
 
Bank audit ppt 1
Bank audit ppt 1Bank audit ppt 1
Bank audit ppt 1
SHWETA MANKAR
 
Internal Control
Internal ControlInternal Control
Internal Control
ravalhimani
 
Types of auditing
Types of auditingTypes of auditing
Types of auditing
RanjithR76
 
duties and rights of auditor
duties and rights of auditorduties and rights of auditor
duties and rights of auditorSonali Kukreja
 
Objectives of auditing
Objectives of auditingObjectives of auditing
Objectives of auditing
VadivelM9
 
AUDIT WORKING PAPERS -OWNERSHIP AND CUSTODY-PPT
AUDIT WORKING PAPERS -OWNERSHIP AND CUSTODY-PPTAUDIT WORKING PAPERS -OWNERSHIP AND CUSTODY-PPT
AUDIT WORKING PAPERS -OWNERSHIP AND CUSTODY-PPT
HeldaMaryA
 
Verification and valuation of assets and liabilities
Verification and valuation of assets and liabilitiesVerification and valuation of assets and liabilities
Verification and valuation of assets and liabilities
suganyababu14
 

What's hot (20)

Classification of Audit.pptx
Classification of Audit.pptxClassification of Audit.pptx
Classification of Audit.pptx
 
Internal check internal audit internal control
Internal check internal audit internal controlInternal check internal audit internal control
Internal check internal audit internal control
 
Internal controls in auditing
Internal controls in auditingInternal controls in auditing
Internal controls in auditing
 
Cost audit meaning, importance, objectives, phases
Cost audit meaning, importance, objectives, phasesCost audit meaning, importance, objectives, phases
Cost audit meaning, importance, objectives, phases
 
Verification and valuation of assets and liabilities
Verification and valuation of assets and liabilitiesVerification and valuation of assets and liabilities
Verification and valuation of assets and liabilities
 
AUDIT REPORT [ AUDITING ]
AUDIT REPORT [ AUDITING ]AUDIT REPORT [ AUDITING ]
AUDIT REPORT [ AUDITING ]
 
Audit working papers
Audit working papersAudit working papers
Audit working papers
 
Auditing (Introduction to Auditing)
Auditing (Introduction to Auditing) Auditing (Introduction to Auditing)
Auditing (Introduction to Auditing)
 
Forensic accounting ppt (2)
Forensic accounting ppt (2)Forensic accounting ppt (2)
Forensic accounting ppt (2)
 
Varificationa & valuation of assets and liabilities
Varificationa & valuation of assets and liabilitiesVarificationa & valuation of assets and liabilities
Varificationa & valuation of assets and liabilities
 
Auditing in a computer environment copy
Auditing in a computer environment   copyAuditing in a computer environment   copy
Auditing in a computer environment copy
 
Auditing In Computer Environment Presentation
Auditing In Computer Environment PresentationAuditing In Computer Environment Presentation
Auditing In Computer Environment Presentation
 
Chapter 2 internal control
Chapter 2 internal controlChapter 2 internal control
Chapter 2 internal control
 
Bank audit ppt 1
Bank audit ppt 1Bank audit ppt 1
Bank audit ppt 1
 
Internal Control
Internal ControlInternal Control
Internal Control
 
Types of auditing
Types of auditingTypes of auditing
Types of auditing
 
duties and rights of auditor
duties and rights of auditorduties and rights of auditor
duties and rights of auditor
 
Objectives of auditing
Objectives of auditingObjectives of auditing
Objectives of auditing
 
AUDIT WORKING PAPERS -OWNERSHIP AND CUSTODY-PPT
AUDIT WORKING PAPERS -OWNERSHIP AND CUSTODY-PPTAUDIT WORKING PAPERS -OWNERSHIP AND CUSTODY-PPT
AUDIT WORKING PAPERS -OWNERSHIP AND CUSTODY-PPT
 
Verification and valuation of assets and liabilities
Verification and valuation of assets and liabilitiesVerification and valuation of assets and liabilities
Verification and valuation of assets and liabilities
 

Similar to Chapter 6

Audit and Assurance
Audit and AssuranceAudit and Assurance
Audit and Assurance
MuhamadSyawal7
 
Chapter 4 : Auditing and the information technology environment
Chapter 4 : Auditing and the information technology environmentChapter 4 : Auditing and the information technology environment
Chapter 4 : Auditing and the information technology environment
KugendranMani
 
Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Sharah Ayumi
 
Computerized Environment
Computerized EnvironmentComputerized Environment
Computerized Environment
VadivelM9
 
Core Areas of a CA- Interlinked with computers
Core Areas of a CA- Interlinked with computersCore Areas of a CA- Interlinked with computers
Core Areas of a CA- Interlinked with computersShikha Gupta
 
Sushant edp
Sushant edpSushant edp
Sushant edpzalak007
 
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDITComputer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
Shahzeb Pirzada
 
Auditing in computerized environment.pptx
Auditing in computerized environment.pptxAuditing in computerized environment.pptx
Auditing in computerized environment.pptx
infantemiliya18
 
Information systems and its components iii
Information systems and its components   iiiInformation systems and its components   iii
Information systems and its components iii
Ashish Desai
 
Components of Computerised Accounting.pptx
Components of Computerised Accounting.pptxComponents of Computerised Accounting.pptx
Components of Computerised Accounting.pptx
SabbahIqbal
 
Icai seminar kolkata
Icai seminar kolkataIcai seminar kolkata
Icai seminar kolkata
sunil patro
 
CONTROL AND AUDIT
CONTROL AND AUDITCONTROL AND AUDIT
CONTROL AND AUDIT
Ros Dina
 
Text-DISA_Review_Questions.docx
Text-DISA_Review_Questions.docxText-DISA_Review_Questions.docx
Text-DISA_Review_Questions.docx
CAVEDPRAKASHPALIWAL
 
Text-DISA_Review_Questions.docx
Text-DISA_Review_Questions.docxText-DISA_Review_Questions.docx
Text-DISA_Review_Questions.docx
CAVEDPRAKASHPALIWAL
 
Information 2nd lesson
Information 2nd lessonInformation 2nd lesson
Information 2nd lesson
Anne ndolo
 
3.42211- CIS Audit.pdf
3.42211- CIS Audit.pdf3.42211- CIS Audit.pdf
3.42211- CIS Audit.pdf
Nehemiah27
 

Similar to Chapter 6 (20)

Audit and Assurance
Audit and AssuranceAudit and Assurance
Audit and Assurance
 
Chapter 4 : Auditing and the information technology environment
Chapter 4 : Auditing and the information technology environmentChapter 4 : Auditing and the information technology environment
Chapter 4 : Auditing and the information technology environment
 
Bankauditin it env
Bankauditin it envBankauditin it env
Bankauditin it env
 
bankauditinITEnv
bankauditinITEnvbankauditinITEnv
bankauditinITEnv
 
bankauditinITEnv
bankauditinITEnvbankauditinITEnv
bankauditinITEnv
 
Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6
 
Computerized Environment
Computerized EnvironmentComputerized Environment
Computerized Environment
 
Core Areas of a CA- Interlinked with computers
Core Areas of a CA- Interlinked with computersCore Areas of a CA- Interlinked with computers
Core Areas of a CA- Interlinked with computers
 
Sushant edp
Sushant edpSushant edp
Sushant edp
 
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDITComputer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
 
Auditing in computerized environment.pptx
Auditing in computerized environment.pptxAuditing in computerized environment.pptx
Auditing in computerized environment.pptx
 
Bankauditin it env
Bankauditin it envBankauditin it env
Bankauditin it env
 
Information systems and its components iii
Information systems and its components   iiiInformation systems and its components   iii
Information systems and its components iii
 
Components of Computerised Accounting.pptx
Components of Computerised Accounting.pptxComponents of Computerised Accounting.pptx
Components of Computerised Accounting.pptx
 
Icai seminar kolkata
Icai seminar kolkataIcai seminar kolkata
Icai seminar kolkata
 
CONTROL AND AUDIT
CONTROL AND AUDITCONTROL AND AUDIT
CONTROL AND AUDIT
 
Text-DISA_Review_Questions.docx
Text-DISA_Review_Questions.docxText-DISA_Review_Questions.docx
Text-DISA_Review_Questions.docx
 
Text-DISA_Review_Questions.docx
Text-DISA_Review_Questions.docxText-DISA_Review_Questions.docx
Text-DISA_Review_Questions.docx
 
Information 2nd lesson
Information 2nd lessonInformation 2nd lesson
Information 2nd lesson
 
3.42211- CIS Audit.pdf
3.42211- CIS Audit.pdf3.42211- CIS Audit.pdf
3.42211- CIS Audit.pdf
 

More from Nur Dalila Zamri

Power point contoh slide viva
Power point contoh slide vivaPower point contoh slide viva
Power point contoh slide viva
Nur Dalila Zamri
 
Business research (Last Semester Project)
Business research (Last Semester Project)Business research (Last Semester Project)
Business research (Last Semester Project)
Nur Dalila Zamri
 
Resume new
Resume newResume new
Resume new
Nur Dalila Zamri
 
C v new
C v newC v new
Chapter 2
Chapter 2Chapter 2
Chapter 2
Nur Dalila Zamri
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
Nur Dalila Zamri
 
Chapter 3 (2)
Chapter 3 (2)Chapter 3 (2)
Chapter 3 (2)
Nur Dalila Zamri
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
Nur Dalila Zamri
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
Nur Dalila Zamri
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
Nur Dalila Zamri
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
Nur Dalila Zamri
 
Business finance ratio (bp plastic)
Business finance  ratio (bp plastic)Business finance  ratio (bp plastic)
Business finance ratio (bp plastic)
Nur Dalila Zamri
 
Bus,fin
Bus,finBus,fin
Pb604 – bussiness finance
Pb604 – bussiness financePb604 – bussiness finance
Pb604 – bussiness finance
Nur Dalila Zamri
 
Cahpter 2 Audit Sampling
Cahpter 2 Audit SamplingCahpter 2 Audit Sampling
Cahpter 2 Audit Sampling
Nur Dalila Zamri
 
Business finance Chapter1 - Finance management
Business finance Chapter1 - Finance managementBusiness finance Chapter1 - Finance management
Business finance Chapter1 - Finance management
Nur Dalila Zamri
 
Audit bab1 sem 6- Audit Approach
Audit bab1 sem 6- Audit ApproachAudit bab1 sem 6- Audit Approach
Audit bab1 sem 6- Audit Approach
Nur Dalila Zamri
 
Ten principles that form the foundations of financial management
Ten principles that form the foundations of financial managementTen principles that form the foundations of financial management
Ten principles that form the foundations of financial management
Nur Dalila Zamri
 
Business plan workbook 17nov 1
Business plan workbook 17nov 1Business plan workbook 17nov 1
Business plan workbook 17nov 1Nur Dalila Zamri
 

More from Nur Dalila Zamri (20)

Power point contoh slide viva
Power point contoh slide vivaPower point contoh slide viva
Power point contoh slide viva
 
Business research (Last Semester Project)
Business research (Last Semester Project)Business research (Last Semester Project)
Business research (Last Semester Project)
 
Resume new
Resume newResume new
Resume new
 
C v new
C v newC v new
C v new
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Chapter 3 (2)
Chapter 3 (2)Chapter 3 (2)
Chapter 3 (2)
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Business finance ratio (bp plastic)
Business finance  ratio (bp plastic)Business finance  ratio (bp plastic)
Business finance ratio (bp plastic)
 
Bus,fin
Bus,finBus,fin
Bus,fin
 
Pb604 – bussiness finance
Pb604 – bussiness financePb604 – bussiness finance
Pb604 – bussiness finance
 
Cahpter 2 Audit Sampling
Cahpter 2 Audit SamplingCahpter 2 Audit Sampling
Cahpter 2 Audit Sampling
 
Business finance Chapter1 - Finance management
Business finance Chapter1 - Finance managementBusiness finance Chapter1 - Finance management
Business finance Chapter1 - Finance management
 
Audit bab1 sem 6- Audit Approach
Audit bab1 sem 6- Audit ApproachAudit bab1 sem 6- Audit Approach
Audit bab1 sem 6- Audit Approach
 
Ten principles that form the foundations of financial management
Ten principles that form the foundations of financial managementTen principles that form the foundations of financial management
Ten principles that form the foundations of financial management
 
Business plan workbook 17nov 1
Business plan workbook 17nov 1Business plan workbook 17nov 1
Business plan workbook 17nov 1
 
Catalogue
CatalogueCatalogue
Catalogue
 

Recently uploaded

TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 

Recently uploaded (20)

TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 

Chapter 6

  • 1. CHAPTER 6 AUDITING IN COMPUTERISED INFORMATION SYSTEM ENVIRONMENT NOR AMALIA BINTI AHAD 10DAT11F2027 NORMASTURA BINTI AHMAD 10DAT11F2039 SITI NABILAH BINTI ABDULLAH 10DAT11F2042 NUR SYUHADA BINTI RUSLAN 10DAT11F2048
  • 2. 6.1.1 Describe The Changing Information Of Technology and Implication For Auditing  People are constantly looking for online activities and expect faster delivery. In accounting as well as auditing, IT plays a vital role in producing reliable and timely financial statements and reports.  Most companies use IT to improve company internal control system through the addition of new control procedure through computer and replacing the manual control due to the likelihood of possible human error.
  • 3. Electronic Data Processing (EDP) Planning Recording Managing Reporting business transaction
  • 4. Electronic Data Processing (EDP) Source Document :  Invoice  Revenue Receipt  Payment Voucher  Cheque
  • 5. Electronic Data Processing (EDP) The basic financial reporting :  Statement of financial position (balance sheet)  Profit and Loss account  Statement of cash flows  Statement of changes in equity
  • 6. Advantages and Disadvantages of Using IT Systems Advantages Disadvantages • Easier to have instant data processing compared to manual data processing. • The use of electronic data processing has resulted in decreased vacancies for job searchers like accountant • More accurate and effective time of transactions. • High cost for companies as effective electronic data processing software tends to be expensive. • Increase performances especially in manufacturing industries and related industries due to improved the inventory automated systems. • Additional cost for support and backup systems in the event of power failure.
  • 7. Implication From manual control to electronic environment :  Traditional paperwork in which the auditor can see and feel the printed marks evidencing transaction are carried out online and most cases in ‘real time’.  Generally looks for the authorizing signatures on the papers evidencing the transactions and Electronic.  It processing environment such authority is evidenced by the user of identification codes and passwords which are all physically invisible.  The level of complexity can be classified into 2 level that is low and high.
  • 8. 6.1.2 Determine the level of complexity in computerized information system environment 1. EDP systems can be defined by their technical complexity and the extent to which they are used in an organization. 2. Technical complexity :  Online-line processing - An online system allows direct access into the computer. Transactions can be put directly into the system so that master files are updated at time the entry is made.
  • 9.  Communication systems - Communication channels can connect the computer directly to users anywhere in the world.  Distributed processing -When the computing function is apportioned among CPUs spread geographically and connected by a communication system.  Data Base Management - As the volume and uses of computer-processed data expand, data on different files are often redundant. -The effect is inefficient use of file space and the need to update files continually.
  • 10. 6.1.3 General Control CIS Control Descriptions The it control environment • The IT government structure • How IT risk are identified, mitigated and managed • The information system, strategic plan and budget • The organizational structure and segregation of duties Day-to-day computer operations • Acquisition, installations, configuration, integration and maintenance of the IT infrastructure • Delivery of information service to user • Management of third-party provider
  • 11. Access to program and data • Security of passwords • Internet firewalls and remote access controls • Data encryption and cryptographic keys Program development and program changes • Acquisition and implementation of new applications • System development and quality assurance methodology Monitoring of IT operations • Policies and procedures regarding the information system and reporting that ensure that user comply with IT general control.
  • 12. Application Control On CIS 1. Application control is controls within a computer application to ensure- completeness, accuracy of input, processing and validity of the resulting accounting entries. 2. The main aim is to ensure Validity, completeness and accuracy of accounting data. 3. Application controls classified into: a) Input controls b) Processing controls c) Output controls
  • 13. a) Input controls  The main aim of input controls is to reduce errors in the data entered in the system for processing. Input controls include checking and ensuring that : - Input data are authorized by the appropriate official. - Data represent valid record of actual transaction - Correctly classified for the purpose of accounting.  Example : - Sequence checks - Batch control
  • 14. b) Processing controls  There are divided into mechanical and programmed controls.  Programmed control are done during the system development to ensure that only data related to a particular transaction is processed and not otherwise. c) Output Controls  Controls relating to input and processing itself with the final objective.  Relates precisely to the original input.  Represents the outcome of a valid and tested program of instructions.
  • 15. 6.1.4 The Plan An Audit Strategic 1) Ensure that these is adequate compliance and substantive procedures and transmitted date are correct and completed. 2) Apply professional scepticism by cross verification of record, reconciliation between primary and subsidiary ledger, questioning and critical assessment of audit evidence. 3) The audit which may be affected by the client CIS environment.
  • 16. An application may be considered to be complex when: a) The volume of transactions is such that users would find it difficult to identify and correct error processing. b) The computer automatically generate material transactions or entries directly to another application. c) The computer perform complicated computations of financial information and automatically generates material transaction.
  • 17. 6.2 .1 The Concept Of Computer Assisted Audit Techniques (CAAT)  CAAT’s are computer programs and data that the auditor uses as part of the audit procedures to process data of audit significance contained in a client computer information system (CIS).  Auditor's use of a computer-assisted audit technique is something special- normally the techniques used by an auditor are not computer assisted.
  • 18.  The term CAAT refers to the use of certain software that can be used by the auditor to perform audits and to achieve the goals of auditing.  CAATs offer much needed help a the audit technology tools facilitate more granular analysis of data and help to determine the accuracy of the information.
  • 19. 6.2.2 Types Of CAATs I. Generalized Audit Software (GAS)  Comprises computer programs used for audit purposes to process data audit significance from the client accounting system.  It is used by the auditor to examine the entity computer files and may be used during both test of control and substantive testing of transactions and balances. II. Test Data  Test data is data submitted by the auditor for processing by the clients computer based accounting system.  The review of an application system will provide information about internal controls built in the system.
  • 20. III. Utility Software  Utility software is the subset of software, such as database management systems report generators, that provides evidence to the auditors about system control effectiveness. IV. The audit-expert system  The audit expert system will give direction and valuable information to all levels of auditors while carrying out the audit because the-based system knowledge-base of the senior auditors and managers.
  • 21. The Advantages Of CAAT  Independently access the data stored on a computer system without dependence on the client  Test the reliability of client software, for example the IT application controls  Increase the accuracy of audit tests  Perform audit tests more efficiently, which in the long-term will result in a more cost effective audit.
  • 22. 6.2.3 Method Audit Computerized Information System (CIS) 1) Auditing around the computer  This approach, the auditor is not using computer control to reduce assessed control risk.  Instead, the auditor uses manual controls to support reduced control risk assessment.  Often, smaller companies lack dedicated IT personnel, or they rely on periodic involvement of IT consultants to assist in installing and maintaining hardware and software.  Auditing around the computer is effective because these system often produce sufficient audit trails to permit auditor to compare source documents.
  • 23. 2) Auditing through the computer  as organisations expand their use of IT, internal controls are often embedded in applications that are visible only in electronic form.
  • 24. Example Of Auditing Around And Through The Computer Internal Control Auditing Around the Computer Approach Auditing Through the Computer Approach 1. Credit is approved for sales on account Select a sample of sales transaction from the journal and obtain the related customer sales order Obtain a copy of the client sales applications program and related credit limit master file 2. Payroll is processed only Select a sample of payroll disbursements from the payroll journal Create a test data file of valid and invalid employee ID number