SlideShare a Scribd company logo
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Accounting Information Systems, 8e
James A. Hall
Chapter 17
IT Controls Part III:
Systems Development,
Program Changes, and
Application Controls
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Objectives for Chapter 17
 Be familiar with the controls and audit tests
relevant to the systems development process.
 Understand the risks and controls associated
with program change procedures and the role
of the source program library.
 Understand the auditing techniques (CAATTs)
used to verify the effective functioning of
application controls.
 Understand the auditing techniques used to
perform substantive tests in an IT
environment.
2
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Systems Development Controls
Controllable activities that distinguish an effective
systems development process include:
 Systems authorization
 User specification
 Technical design
 Internal audit participation
 Program testing
 User test and acceptance procedures
3
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Auditor’s objectives
The auditor’s objectives are to ensure that
 all systems development activities are
applied consistently and follow
management’s policies
 system as originally implemented was free
from material errors and fraud
 system was judged necessary and justified
at checkpoints throughout the SDLC, and
 system documentation is sufficiently
accurate and complete to facilitate audit
and maintenance activities.
4
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Tests of Systems Development
Controls
 New systems must be authorized.
 Feasibility studies were conducted.
 User needs were analyzed and addressed.
 Cost-benefit analysis was done.
 Proper documentation was completed.
 All program modules must be thoroughly
tested before they are implemented.
 Checklist of problems was kept.
5
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
System Maintenance Controls
 Last, longest and most costly phase of
systems development
 Up to 80-90% of entire cost of a
system
 All maintenance actions should require
 Technical specifications
 Testing
 Documentation updates
 Formal authorizations for any changes
6
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Program Change
Audit objectives: detect unauthorized
program maintenance and determine
that...
 maintenance procedures protect
applications from unauthorized changes
 applications are free from material errors
 program libraries are protected from
unauthorized access
7
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Source Program Library
 Source program library (SPL)
 library of applications and software
 place where programs are
developed and modified
 once compiled into machine
language, no longer vulnerable
8
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Uncontrolled Access to the SPL
9
Figure 17-2
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Controlled SPL Environments
 SPL Management Systems (SPLMS)
protect the SPL by controlling the
following functions:
 storing programs on the SPL
 retrieving programs for maintenance
purposes
 deleting obsolete programs from the
library
 documenting program changes to
provide an audit trail of the changes
10
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Source Program Library under the
Control of SPL Management Software
11
Figure 17-3
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
SPL Control Features
 Password control
 Separation of test libraries
 Audit trails
 Reports that enhance management
control and the audit function
 Assigns program version numbers
automatically
 Controlled access to maintenance
commands 12
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Program Change
 Auditing procedures: verify that
programs were properly maintained,
including changes
 Specifically, verify…
 identification and correction of
unauthorized program changes
 identification and correction of application
errors
 control of access to systems libraries
13
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Testing Application Controls
 Techniques for auditing applications
fall into two classes:
1. testing application controls – two
general approaches:
– black box – around the computer
– white box – through the computer
2. examining transaction details and
account balances—substantive
testing
14
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Auditing Around the Computer -
The Black Box Approach
15
Figure 17-9
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Auditing through the Computer:
The ITF Technique
16Figure 17-14
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Testing Application Controls
 Black Box Approach – focuses on
input procedures and output results
 To Gain need understanding…
 analyze flowcharts
 review documentation
 conduct interviews
17
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Testing Application Controls
 Auditing through-the-computer
 focuses on understanding the internal logic
of processes between input and output
 Common tests
• Authenticity tests
• Accuracy tests
• Completeness tests
• Redundancy tests
• Access tests
• Audit trail tests
• Rounding error tests
18
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Audit Testing Techniques
 Test data method: testing for logic or control
problems - good for new systems or systems
which have undergone recent maintenance
 base case system evaluation (BCSE) - using a
comprehensive set of test transactions
 tracing - performs an electronic walkthrough of
the application’s internal logic
 Test data methods are not fool-proof
 a snapshot - one point in time examination
 high-cost of developing adequate test data
19
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Audit Testing Techniques
 Integrated test facility (ITF): an
automated, on-going technique that
enables the auditor to test an
application’s logic and controls during
its normal operation
 Parallel simulation: auditor writes
simulation programs and runs actual
transactions of the client through the
system
20
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
The Parallel Simulation Technique
21
Figure 17-11
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Substantive Testing
 Techniques to substantiate account balances.
For example:
 search for unrecorded liabilities
 confirm accounts receivable to ensure they are
not overstated
 Requires first extracting data from the system.
Two technologies commonly used to select,
access, and organize data are:
 embedded audit module
 generalized audit software
22
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Embedded Audit Module
 An ongoing module which filters out non-
material transactions
 The chosen, material transactions are
used for sampling in substantive tests
 Requires additional computing resources
by the client
 Hard to maintain in systems with high
maintenance
23
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Embedded Audit Module Technique
24Figure 17-12
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Generalized Audit Software
 Very popular & widely used
 Can access data files & perform
operations on them:
 screen data
 statistical sampling methods
 foot & balance
 format reports
 compare files and fields
 recalculate data fields
25
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Using GAS to Access
Complex File Structure
26
Figure 17-14

More Related Content

What's hot

James hall ch 3
James hall ch 3James hall ch 3
James hall ch 3
David Julian
 
Parallel simulation
Parallel simulationParallel simulation
Parallel simulation
kzoe1996
 
James hall ch 13
James hall ch 13James hall ch 13
James hall ch 13
David Julian
 
Test Data Approach
Test Data ApproachTest Data Approach
Test Data Approach
kzoe1996
 
Generalized audit-software
Generalized audit-softwareGeneralized audit-software
Generalized audit-software
kzoe1996
 
Corporate Governance
Corporate GovernanceCorporate Governance
Corporate Governance
Aliza Racelis
 
Chapter 11 Enterprise Resource Planning System
Chapter 11 Enterprise Resource Planning SystemChapter 11 Enterprise Resource Planning System
Chapter 11 Enterprise Resource Planning System
Muhammad Azmy
 
System Development Life Cycle
System Development Life CycleSystem Development Life Cycle
System Development Life Cycle
Doma Ngonie
 
Chapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systemsChapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systems
jayussuryawan
 
Corporate governance -global models
Corporate governance -global modelsCorporate governance -global models
Corporate governance -global models
Varadraj Bapat
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
Tommy Zul Hidayat
 
Internal controls in an IT environment
Internal controls in an IT environment Internal controls in an IT environment
Internal controls in an IT environment
Chris Nicole Apat-Orcullo, CPA
 
Computer Assisted Audit Tools and Techniques - the Force multiplier in the ba...
Computer Assisted Audit Tools and Techniques - the Force multiplier in the ba...Computer Assisted Audit Tools and Techniques - the Force multiplier in the ba...
Computer Assisted Audit Tools and Techniques - the Force multiplier in the ba...
Ee Chuan Yoong
 
Audit of the Payroll and Personnel Cycle _ Accounting & Audting
Audit of the Payroll and Personnel Cycle _ Accounting & AudtingAudit of the Payroll and Personnel Cycle _ Accounting & Audting
Audit of the Payroll and Personnel Cycle _ Accounting & Audting
Carl Hebeler
 
Lecture 19 physical and manual system -revenue cycle - accounting informatio...
Lecture 19  physical and manual system -revenue cycle - accounting informatio...Lecture 19  physical and manual system -revenue cycle - accounting informatio...
Lecture 19 physical and manual system -revenue cycle - accounting informatio...
Habib Ullah Qamar
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
jayussuryawan
 
James hall ch 10
James hall ch 10James hall ch 10
James hall ch 10
David Julian
 
Chapter 1 auditing and internal control
Chapter 1 auditing and internal controlChapter 1 auditing and internal control
Chapter 1 auditing and internal control
Tommy Zul Hidayat
 
Auditing in a computer environment copy
Auditing in a computer environment   copyAuditing in a computer environment   copy
Auditing in a computer environment copySaleh Rashid
 

What's hot (20)

James hall ch 3
James hall ch 3James hall ch 3
James hall ch 3
 
Parallel simulation
Parallel simulationParallel simulation
Parallel simulation
 
James hall ch 13
James hall ch 13James hall ch 13
James hall ch 13
 
Test Data Approach
Test Data ApproachTest Data Approach
Test Data Approach
 
Generalized audit-software
Generalized audit-softwareGeneralized audit-software
Generalized audit-software
 
Corporate Governance
Corporate GovernanceCorporate Governance
Corporate Governance
 
Pp 06-new
Pp 06-newPp 06-new
Pp 06-new
 
Chapter 11 Enterprise Resource Planning System
Chapter 11 Enterprise Resource Planning SystemChapter 11 Enterprise Resource Planning System
Chapter 11 Enterprise Resource Planning System
 
System Development Life Cycle
System Development Life CycleSystem Development Life Cycle
System Development Life Cycle
 
Chapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systemsChapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systems
 
Corporate governance -global models
Corporate governance -global modelsCorporate governance -global models
Corporate governance -global models
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
 
Internal controls in an IT environment
Internal controls in an IT environment Internal controls in an IT environment
Internal controls in an IT environment
 
Computer Assisted Audit Tools and Techniques - the Force multiplier in the ba...
Computer Assisted Audit Tools and Techniques - the Force multiplier in the ba...Computer Assisted Audit Tools and Techniques - the Force multiplier in the ba...
Computer Assisted Audit Tools and Techniques - the Force multiplier in the ba...
 
Audit of the Payroll and Personnel Cycle _ Accounting & Audting
Audit of the Payroll and Personnel Cycle _ Accounting & AudtingAudit of the Payroll and Personnel Cycle _ Accounting & Audting
Audit of the Payroll and Personnel Cycle _ Accounting & Audting
 
Lecture 19 physical and manual system -revenue cycle - accounting informatio...
Lecture 19  physical and manual system -revenue cycle - accounting informatio...Lecture 19  physical and manual system -revenue cycle - accounting informatio...
Lecture 19 physical and manual system -revenue cycle - accounting informatio...
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
 
James hall ch 10
James hall ch 10James hall ch 10
James hall ch 10
 
Chapter 1 auditing and internal control
Chapter 1 auditing and internal controlChapter 1 auditing and internal control
Chapter 1 auditing and internal control
 
Auditing in a computer environment copy
Auditing in a computer environment   copyAuditing in a computer environment   copy
Auditing in a computer environment copy
 

Similar to Pp 17-new

Icai seminar kolkata
Icai seminar kolkataIcai seminar kolkata
Icai seminar kolkata
sunil patro
 
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
gueste080564
 
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
renetta
 
Technology Controls in Business - End User Computing
Technology Controls in Business - End User ComputingTechnology Controls in Business - End User Computing
Technology Controls in Business - End User Computing
guestc1bca2
 
Ch-01 accounting information system .pptx
Ch-01 accounting information system .pptxCh-01 accounting information system .pptx
Ch-01 accounting information system .pptx
NafeesReza1
 
IRJET- Website Health Checker
IRJET- Website Health CheckerIRJET- Website Health Checker
IRJET- Website Health Checker
IRJET Journal
 
Online resume builder management system project report.pdf
Online resume builder management system project report.pdfOnline resume builder management system project report.pdf
Online resume builder management system project report.pdf
Kamal Acharya
 
Hp application performance center software
Hp application performance center softwareHp application performance center software
Hp application performance center softwareHP Enterprise Italia
 
IRJET- A Review on Bug Tracking System
IRJET- A Review on Bug Tracking SystemIRJET- A Review on Bug Tracking System
IRJET- A Review on Bug Tracking System
IRJET Journal
 
3Audit Software & Tools.pptx
3Audit Software & Tools.pptx3Audit Software & Tools.pptx
3Audit Software & Tools.pptx
jack952975
 
Xsemble - Make software like they make cars!
Xsemble - Make software like they make cars!Xsemble - Make software like they make cars!
Xsemble - Make software like they make cars!
Ashish Belagali
 

Similar to Pp 17-new (20)

Pp 13-new
Pp 13-newPp 13-new
Pp 13-new
 
Pp 15-new
Pp 15-newPp 15-new
Pp 15-new
 
Pp 02-new
Pp 02-newPp 02-new
Pp 02-new
 
Pp 02-new
Pp 02-newPp 02-new
Pp 02-new
 
Pp 14-new
Pp 14-newPp 14-new
Pp 14-new
 
Pp 05-new
Pp 05-newPp 05-new
Pp 05-new
 
Pp 07-new
Pp 07-newPp 07-new
Pp 07-new
 
Pp 05-new
Pp 05-newPp 05-new
Pp 05-new
 
Icai seminar kolkata
Icai seminar kolkataIcai seminar kolkata
Icai seminar kolkata
 
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
 
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
 
Technology Controls in Business - End User Computing
Technology Controls in Business - End User ComputingTechnology Controls in Business - End User Computing
Technology Controls in Business - End User Computing
 
Ch-01 accounting information system .pptx
Ch-01 accounting information system .pptxCh-01 accounting information system .pptx
Ch-01 accounting information system .pptx
 
IRJET- Website Health Checker
IRJET- Website Health CheckerIRJET- Website Health Checker
IRJET- Website Health Checker
 
Online resume builder management system project report.pdf
Online resume builder management system project report.pdfOnline resume builder management system project report.pdf
Online resume builder management system project report.pdf
 
Pp 06-new
Pp 06-newPp 06-new
Pp 06-new
 
Hp application performance center software
Hp application performance center softwareHp application performance center software
Hp application performance center software
 
IRJET- A Review on Bug Tracking System
IRJET- A Review on Bug Tracking SystemIRJET- A Review on Bug Tracking System
IRJET- A Review on Bug Tracking System
 
3Audit Software & Tools.pptx
3Audit Software & Tools.pptx3Audit Software & Tools.pptx
3Audit Software & Tools.pptx
 
Xsemble - Make software like they make cars!
Xsemble - Make software like they make cars!Xsemble - Make software like they make cars!
Xsemble - Make software like they make cars!
 

More from Sri Apriyanti Husain

7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
Sri Apriyanti Husain
 
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
Sri Apriyanti Husain
 
15 ma aksya_tafakkur ke 1_sri apriyanti husain
15 ma aksya_tafakkur ke 1_sri apriyanti husain15 ma aksya_tafakkur ke 1_sri apriyanti husain
15 ma aksya_tafakkur ke 1_sri apriyanti husain
Sri Apriyanti Husain
 
15 ma aksya_tafakkur ke 1_sri apriyanti husain
15 ma aksya_tafakkur ke 1_sri apriyanti husain15 ma aksya_tafakkur ke 1_sri apriyanti husain
15 ma aksya_tafakkur ke 1_sri apriyanti husain
Sri Apriyanti Husain
 
Formulir pendaftaran-s3 p ps feb ub
Formulir pendaftaran-s3 p ps feb ubFormulir pendaftaran-s3 p ps feb ub
Formulir pendaftaran-s3 p ps feb ub
Sri Apriyanti Husain
 
Informasi pendaftaran pasca s2 & s3
Informasi pendaftaran  pasca s2 & s3Informasi pendaftaran  pasca s2 & s3
Informasi pendaftaran pasca s2 & s3
Sri Apriyanti Husain
 
Informasi pendaftaran pasca s2 & s3
Informasi pendaftaran  pasca s2 & s3Informasi pendaftaran  pasca s2 & s3
Informasi pendaftaran pasca s2 & s3
Sri Apriyanti Husain
 
Tugas regresi berganda
Tugas regresi bergandaTugas regresi berganda
Tugas regresi berganda
Sri Apriyanti Husain
 
Alfamart
AlfamartAlfamart
146020300111009 sri apriyanti husain review jurnal_metode penelitian non posi...
146020300111009 sri apriyanti husain review jurnal_metode penelitian non posi...146020300111009 sri apriyanti husain review jurnal_metode penelitian non posi...
146020300111009 sri apriyanti husain review jurnal_metode penelitian non posi...
Sri Apriyanti Husain
 
Review jurnal akuntansi forensik uas pp_ak kelas malam
Review jurnal akuntansi forensik uas pp_ak kelas malamReview jurnal akuntansi forensik uas pp_ak kelas malam
Review jurnal akuntansi forensik uas pp_ak kelas malam
Sri Apriyanti Husain
 
Review jurnal akuntansi forensik uas pp_ak kelas malam angkatan 24
Review jurnal akuntansi forensik uas pp_ak kelas malam angkatan 24Review jurnal akuntansi forensik uas pp_ak kelas malam angkatan 24
Review jurnal akuntansi forensik uas pp_ak kelas malam angkatan 24
Sri Apriyanti Husain
 
Profit over people; neoliberalism, global order 1888363894
Profit over people; neoliberalism, global order 1888363894Profit over people; neoliberalism, global order 1888363894
Profit over people; neoliberalism, global order 1888363894
Sri Apriyanti Husain
 
Review disertasi pak bambang haryadi
Review disertasi pak bambang haryadiReview disertasi pak bambang haryadi
Review disertasi pak bambang haryadi
Sri Apriyanti Husain
 
Review disertasi full
Review disertasi fullReview disertasi full
Review disertasi full
Sri Apriyanti Husain
 
Review disertasi pak bambang haryadi
Review disertasi pak bambang haryadiReview disertasi pak bambang haryadi
Review disertasi pak bambang haryadi
Sri Apriyanti Husain
 
Psak 65-laporan-keuangan-konsolidasian-ifrs-10-consolidated-fs-22012014
Psak 65-laporan-keuangan-konsolidasian-ifrs-10-consolidated-fs-22012014Psak 65-laporan-keuangan-konsolidasian-ifrs-10-consolidated-fs-22012014
Psak 65-laporan-keuangan-konsolidasian-ifrs-10-consolidated-fs-22012014
Sri Apriyanti Husain
 
Psak 62-kontrak-asuransi-140212
Psak 62-kontrak-asuransi-140212Psak 62-kontrak-asuransi-140212
Psak 62-kontrak-asuransi-140212
Sri Apriyanti Husain
 
Psak 58-aset-tidak-lancar-yang-dimiliki-untuk-dijual-dan-operasi-yang-dihenti...
Psak 58-aset-tidak-lancar-yang-dimiliki-untuk-dijual-dan-operasi-yang-dihenti...Psak 58-aset-tidak-lancar-yang-dimiliki-untuk-dijual-dan-operasi-yang-dihenti...
Psak 58-aset-tidak-lancar-yang-dimiliki-untuk-dijual-dan-operasi-yang-dihenti...
Sri Apriyanti Husain
 
Psak 55-pengakuan-instrumen-keuangan-ias-39-18122013-pokok
Psak 55-pengakuan-instrumen-keuangan-ias-39-18122013-pokokPsak 55-pengakuan-instrumen-keuangan-ias-39-18122013-pokok
Psak 55-pengakuan-instrumen-keuangan-ias-39-18122013-pokok
Sri Apriyanti Husain
 

More from Sri Apriyanti Husain (20)

7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
 
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
 
15 ma aksya_tafakkur ke 1_sri apriyanti husain
15 ma aksya_tafakkur ke 1_sri apriyanti husain15 ma aksya_tafakkur ke 1_sri apriyanti husain
15 ma aksya_tafakkur ke 1_sri apriyanti husain
 
15 ma aksya_tafakkur ke 1_sri apriyanti husain
15 ma aksya_tafakkur ke 1_sri apriyanti husain15 ma aksya_tafakkur ke 1_sri apriyanti husain
15 ma aksya_tafakkur ke 1_sri apriyanti husain
 
Formulir pendaftaran-s3 p ps feb ub
Formulir pendaftaran-s3 p ps feb ubFormulir pendaftaran-s3 p ps feb ub
Formulir pendaftaran-s3 p ps feb ub
 
Informasi pendaftaran pasca s2 & s3
Informasi pendaftaran  pasca s2 & s3Informasi pendaftaran  pasca s2 & s3
Informasi pendaftaran pasca s2 & s3
 
Informasi pendaftaran pasca s2 & s3
Informasi pendaftaran  pasca s2 & s3Informasi pendaftaran  pasca s2 & s3
Informasi pendaftaran pasca s2 & s3
 
Tugas regresi berganda
Tugas regresi bergandaTugas regresi berganda
Tugas regresi berganda
 
Alfamart
AlfamartAlfamart
Alfamart
 
146020300111009 sri apriyanti husain review jurnal_metode penelitian non posi...
146020300111009 sri apriyanti husain review jurnal_metode penelitian non posi...146020300111009 sri apriyanti husain review jurnal_metode penelitian non posi...
146020300111009 sri apriyanti husain review jurnal_metode penelitian non posi...
 
Review jurnal akuntansi forensik uas pp_ak kelas malam
Review jurnal akuntansi forensik uas pp_ak kelas malamReview jurnal akuntansi forensik uas pp_ak kelas malam
Review jurnal akuntansi forensik uas pp_ak kelas malam
 
Review jurnal akuntansi forensik uas pp_ak kelas malam angkatan 24
Review jurnal akuntansi forensik uas pp_ak kelas malam angkatan 24Review jurnal akuntansi forensik uas pp_ak kelas malam angkatan 24
Review jurnal akuntansi forensik uas pp_ak kelas malam angkatan 24
 
Profit over people; neoliberalism, global order 1888363894
Profit over people; neoliberalism, global order 1888363894Profit over people; neoliberalism, global order 1888363894
Profit over people; neoliberalism, global order 1888363894
 
Review disertasi pak bambang haryadi
Review disertasi pak bambang haryadiReview disertasi pak bambang haryadi
Review disertasi pak bambang haryadi
 
Review disertasi full
Review disertasi fullReview disertasi full
Review disertasi full
 
Review disertasi pak bambang haryadi
Review disertasi pak bambang haryadiReview disertasi pak bambang haryadi
Review disertasi pak bambang haryadi
 
Psak 65-laporan-keuangan-konsolidasian-ifrs-10-consolidated-fs-22012014
Psak 65-laporan-keuangan-konsolidasian-ifrs-10-consolidated-fs-22012014Psak 65-laporan-keuangan-konsolidasian-ifrs-10-consolidated-fs-22012014
Psak 65-laporan-keuangan-konsolidasian-ifrs-10-consolidated-fs-22012014
 
Psak 62-kontrak-asuransi-140212
Psak 62-kontrak-asuransi-140212Psak 62-kontrak-asuransi-140212
Psak 62-kontrak-asuransi-140212
 
Psak 58-aset-tidak-lancar-yang-dimiliki-untuk-dijual-dan-operasi-yang-dihenti...
Psak 58-aset-tidak-lancar-yang-dimiliki-untuk-dijual-dan-operasi-yang-dihenti...Psak 58-aset-tidak-lancar-yang-dimiliki-untuk-dijual-dan-operasi-yang-dihenti...
Psak 58-aset-tidak-lancar-yang-dimiliki-untuk-dijual-dan-operasi-yang-dihenti...
 
Psak 55-pengakuan-instrumen-keuangan-ias-39-18122013-pokok
Psak 55-pengakuan-instrumen-keuangan-ias-39-18122013-pokokPsak 55-pengakuan-instrumen-keuangan-ias-39-18122013-pokok
Psak 55-pengakuan-instrumen-keuangan-ias-39-18122013-pokok
 

Recently uploaded

Donald Trump Presentation and his life.pptx
Donald Trump Presentation and his life.pptxDonald Trump Presentation and his life.pptx
Donald Trump Presentation and his life.pptx
SerdarHudaykuliyew
 
PF-Wagner's Theory of Public Expenditure.pptx
PF-Wagner's Theory of Public Expenditure.pptxPF-Wagner's Theory of Public Expenditure.pptx
PF-Wagner's Theory of Public Expenditure.pptx
GunjanSharma28848
 
Commercial Bank Economic Capsule - May 2024
Commercial Bank Economic Capsule - May 2024Commercial Bank Economic Capsule - May 2024
Commercial Bank Economic Capsule - May 2024
Commercial Bank of Ceylon PLC
 
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
muslimdavidovich670
 
how can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYChow can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYC
DOT TECH
 
Analyzing the instability of equilibrium in thr harrod domar model
Analyzing the instability of equilibrium in thr harrod domar modelAnalyzing the instability of equilibrium in thr harrod domar model
Analyzing the instability of equilibrium in thr harrod domar model
ManthanBhardwaj4
 
Seminar: Gender Board Diversity through Ownership Networks
Seminar: Gender Board Diversity through Ownership NetworksSeminar: Gender Board Diversity through Ownership Networks
Seminar: Gender Board Diversity through Ownership Networks
GRAPE
 
The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.
DOT TECH
 
一比一原版(IC毕业证)帝国理工大学毕业证如何办理
一比一原版(IC毕业证)帝国理工大学毕业证如何办理一比一原版(IC毕业证)帝国理工大学毕业证如何办理
一比一原版(IC毕业证)帝国理工大学毕业证如何办理
conose1
 
where can I find a legit pi merchant online
where can I find a legit pi merchant onlinewhere can I find a legit pi merchant online
where can I find a legit pi merchant online
DOT TECH
 
when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.
DOT TECH
 
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdfUS Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
pchutichetpong
 
how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.
DOT TECH
 
how to sell pi coins on Binance exchange
how to sell pi coins on Binance exchangehow to sell pi coins on Binance exchange
how to sell pi coins on Binance exchange
DOT TECH
 
how to sell pi coins at high rate quickly.
how to sell pi coins at high rate quickly.how to sell pi coins at high rate quickly.
how to sell pi coins at high rate quickly.
DOT TECH
 
can I really make money with pi network.
can I really make money with pi network.can I really make money with pi network.
can I really make money with pi network.
DOT TECH
 
The Evolution of Non-Banking Financial Companies (NBFCs) in India: Challenges...
The Evolution of Non-Banking Financial Companies (NBFCs) in India: Challenges...The Evolution of Non-Banking Financial Companies (NBFCs) in India: Challenges...
The Evolution of Non-Banking Financial Companies (NBFCs) in India: Challenges...
beulahfernandes8
 
USDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptxUSDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptx
marketing367770
 
how to sell pi coins effectively (from 50 - 100k pi)
how to sell pi coins effectively (from 50 - 100k  pi)how to sell pi coins effectively (from 50 - 100k  pi)
how to sell pi coins effectively (from 50 - 100k pi)
DOT TECH
 
how to sell pi coins on Bitmart crypto exchange
how to sell pi coins on Bitmart crypto exchangehow to sell pi coins on Bitmart crypto exchange
how to sell pi coins on Bitmart crypto exchange
DOT TECH
 

Recently uploaded (20)

Donald Trump Presentation and his life.pptx
Donald Trump Presentation and his life.pptxDonald Trump Presentation and his life.pptx
Donald Trump Presentation and his life.pptx
 
PF-Wagner's Theory of Public Expenditure.pptx
PF-Wagner's Theory of Public Expenditure.pptxPF-Wagner's Theory of Public Expenditure.pptx
PF-Wagner's Theory of Public Expenditure.pptx
 
Commercial Bank Economic Capsule - May 2024
Commercial Bank Economic Capsule - May 2024Commercial Bank Economic Capsule - May 2024
Commercial Bank Economic Capsule - May 2024
 
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
 
how can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYChow can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYC
 
Analyzing the instability of equilibrium in thr harrod domar model
Analyzing the instability of equilibrium in thr harrod domar modelAnalyzing the instability of equilibrium in thr harrod domar model
Analyzing the instability of equilibrium in thr harrod domar model
 
Seminar: Gender Board Diversity through Ownership Networks
Seminar: Gender Board Diversity through Ownership NetworksSeminar: Gender Board Diversity through Ownership Networks
Seminar: Gender Board Diversity through Ownership Networks
 
The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.
 
一比一原版(IC毕业证)帝国理工大学毕业证如何办理
一比一原版(IC毕业证)帝国理工大学毕业证如何办理一比一原版(IC毕业证)帝国理工大学毕业证如何办理
一比一原版(IC毕业证)帝国理工大学毕业证如何办理
 
where can I find a legit pi merchant online
where can I find a legit pi merchant onlinewhere can I find a legit pi merchant online
where can I find a legit pi merchant online
 
when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.
 
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdfUS Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
 
how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.
 
how to sell pi coins on Binance exchange
how to sell pi coins on Binance exchangehow to sell pi coins on Binance exchange
how to sell pi coins on Binance exchange
 
how to sell pi coins at high rate quickly.
how to sell pi coins at high rate quickly.how to sell pi coins at high rate quickly.
how to sell pi coins at high rate quickly.
 
can I really make money with pi network.
can I really make money with pi network.can I really make money with pi network.
can I really make money with pi network.
 
The Evolution of Non-Banking Financial Companies (NBFCs) in India: Challenges...
The Evolution of Non-Banking Financial Companies (NBFCs) in India: Challenges...The Evolution of Non-Banking Financial Companies (NBFCs) in India: Challenges...
The Evolution of Non-Banking Financial Companies (NBFCs) in India: Challenges...
 
USDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptxUSDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptx
 
how to sell pi coins effectively (from 50 - 100k pi)
how to sell pi coins effectively (from 50 - 100k  pi)how to sell pi coins effectively (from 50 - 100k  pi)
how to sell pi coins effectively (from 50 - 100k pi)
 
how to sell pi coins on Bitmart crypto exchange
how to sell pi coins on Bitmart crypto exchangehow to sell pi coins on Bitmart crypto exchange
how to sell pi coins on Bitmart crypto exchange
 

Pp 17-new

  • 1. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Accounting Information Systems, 8e James A. Hall Chapter 17 IT Controls Part III: Systems Development, Program Changes, and Application Controls
  • 2. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Objectives for Chapter 17  Be familiar with the controls and audit tests relevant to the systems development process.  Understand the risks and controls associated with program change procedures and the role of the source program library.  Understand the auditing techniques (CAATTs) used to verify the effective functioning of application controls.  Understand the auditing techniques used to perform substantive tests in an IT environment. 2
  • 3. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Systems Development Controls Controllable activities that distinguish an effective systems development process include:  Systems authorization  User specification  Technical design  Internal audit participation  Program testing  User test and acceptance procedures 3
  • 4. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Auditor’s objectives The auditor’s objectives are to ensure that  all systems development activities are applied consistently and follow management’s policies  system as originally implemented was free from material errors and fraud  system was judged necessary and justified at checkpoints throughout the SDLC, and  system documentation is sufficiently accurate and complete to facilitate audit and maintenance activities. 4
  • 5. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Tests of Systems Development Controls  New systems must be authorized.  Feasibility studies were conducted.  User needs were analyzed and addressed.  Cost-benefit analysis was done.  Proper documentation was completed.  All program modules must be thoroughly tested before they are implemented.  Checklist of problems was kept. 5
  • 6. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. System Maintenance Controls  Last, longest and most costly phase of systems development  Up to 80-90% of entire cost of a system  All maintenance actions should require  Technical specifications  Testing  Documentation updates  Formal authorizations for any changes 6
  • 7. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Program Change Audit objectives: detect unauthorized program maintenance and determine that...  maintenance procedures protect applications from unauthorized changes  applications are free from material errors  program libraries are protected from unauthorized access 7
  • 8. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Source Program Library  Source program library (SPL)  library of applications and software  place where programs are developed and modified  once compiled into machine language, no longer vulnerable 8
  • 9. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Uncontrolled Access to the SPL 9 Figure 17-2
  • 10. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Controlled SPL Environments  SPL Management Systems (SPLMS) protect the SPL by controlling the following functions:  storing programs on the SPL  retrieving programs for maintenance purposes  deleting obsolete programs from the library  documenting program changes to provide an audit trail of the changes 10
  • 11. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Source Program Library under the Control of SPL Management Software 11 Figure 17-3
  • 12. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. SPL Control Features  Password control  Separation of test libraries  Audit trails  Reports that enhance management control and the audit function  Assigns program version numbers automatically  Controlled access to maintenance commands 12
  • 13. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Program Change  Auditing procedures: verify that programs were properly maintained, including changes  Specifically, verify…  identification and correction of unauthorized program changes  identification and correction of application errors  control of access to systems libraries 13
  • 14. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Testing Application Controls  Techniques for auditing applications fall into two classes: 1. testing application controls – two general approaches: – black box – around the computer – white box – through the computer 2. examining transaction details and account balances—substantive testing 14
  • 15. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Auditing Around the Computer - The Black Box Approach 15 Figure 17-9
  • 16. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Auditing through the Computer: The ITF Technique 16Figure 17-14
  • 17. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Testing Application Controls  Black Box Approach – focuses on input procedures and output results  To Gain need understanding…  analyze flowcharts  review documentation  conduct interviews 17
  • 18. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Testing Application Controls  Auditing through-the-computer  focuses on understanding the internal logic of processes between input and output  Common tests • Authenticity tests • Accuracy tests • Completeness tests • Redundancy tests • Access tests • Audit trail tests • Rounding error tests 18
  • 19. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Audit Testing Techniques  Test data method: testing for logic or control problems - good for new systems or systems which have undergone recent maintenance  base case system evaluation (BCSE) - using a comprehensive set of test transactions  tracing - performs an electronic walkthrough of the application’s internal logic  Test data methods are not fool-proof  a snapshot - one point in time examination  high-cost of developing adequate test data 19
  • 20. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Audit Testing Techniques  Integrated test facility (ITF): an automated, on-going technique that enables the auditor to test an application’s logic and controls during its normal operation  Parallel simulation: auditor writes simulation programs and runs actual transactions of the client through the system 20
  • 21. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. The Parallel Simulation Technique 21 Figure 17-11
  • 22. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Substantive Testing  Techniques to substantiate account balances. For example:  search for unrecorded liabilities  confirm accounts receivable to ensure they are not overstated  Requires first extracting data from the system. Two technologies commonly used to select, access, and organize data are:  embedded audit module  generalized audit software 22
  • 23. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Embedded Audit Module  An ongoing module which filters out non- material transactions  The chosen, material transactions are used for sampling in substantive tests  Requires additional computing resources by the client  Hard to maintain in systems with high maintenance 23
  • 24. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Embedded Audit Module Technique 24Figure 17-12
  • 25. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Generalized Audit Software  Very popular & widely used  Can access data files & perform operations on them:  screen data  statistical sampling methods  foot & balance  format reports  compare files and fields  recalculate data fields 25
  • 26. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Using GAS to Access Complex File Structure 26 Figure 17-14