已阅读5页,还剩12页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
Accounting Information SystemsCHAPTER 9AUDITING COMPUTER-BASED INFORMATION SYSTEMSSUGGESTED ANSWERS TO DISCUSSION QUESTIONS9.1 Since most organizations make extensive use of computer-based systems in processing accounting data, it is essential that computer expertise be available in the organizations audit group. Such expertise should include: Extensive knowledge of computer hardware, software, and accounting applications A detailed understanding of appropriate control policies and procedures in computer systems An ability to read and understand system documentation Experience in planning computer audits and in using modern computer auditing techniques.All internal auditors may not possess expertise in all of these areas. However, there is certainly some minimum level of computer expertise that is appropriate for all auditors. This would include: An understanding of computer hardware, software, accounting applications, and controls. The ability to examine all elements of the computerized AIS The ability to use the computer as a tool to accomplish these auditing objectives.9.2Many authorities have suggested in recent years that internal auditors should be involved in systems development projects in order to ensure that newly developed systems are auditable and have effective controls. However, if the auditors involvement is too great, then his or her independence may be impaired with respect to subsequent review and evaluation of the system. Accordingly, the auditor should not be a member of a systems development team, or be otherwise directly involved in designing or implementing new systems.There are indirect forms of auditor involvement that are appropriate. The auditor can1. Recommend a series of control and auditability guidelines that all new systems should meet. 2. Independently review the work of the systems development team, evaluate both the quality of the systems development effort and its adherence to control and auditability guidelines, and report his or her findings to management. In both cases the auditor is working through management rather than with the systems development team.9.3 The most effective auditor is a person who has training and experience as an auditor and training and experience as a computer specialist. However, few people have such an extensive background, and personnel training and development are both expensive and time consuming. Berwick may find it necessary to accept some tradeoffs in staffing its audit function. Since auditors generally work in teams, Berwick should probably begin by using a combination of the first two approaches. Then, as audit teams are created for specific purposes, care should be taken to ensure that the members of each audit team have an appropriate mix of skills and experience.9.4 The question implies Tustins internal auditors never bothered to investigate transactions below a certain dollar amount, and/or shortages of less than a certain percent. This is not good audit practice.While auditors generally examine transaction samples that are selected to include a high percentage of items having a high dollar value, their sampling procedures should not ignore transactions with lower dollar values. There must have been hundreds of falsified transactions, and an effective sampling plan should have uncovered a few of them. Audit software could be used to fully reconcile collections with billings, and list any discrepancies for further investigation. An assistant finance director should not have the authority to enter credits to customer accounts. Certainly, there should have been documentation to support such transactions. An internal control audit should have detected inadequacies in Tustins computer access controls, as well as a lack of documentation for certain transactions.9.5 Exception testing for payroll deductions. This type of computer-assisted audit technique (CAAT) program can identify employees who have no deductions. This is important because fictitious or terminated employees will generally not have deductions. (CIA Examination, adapted)SUGGESTED SOLUTIONS TO THE PROBLEMS9.1a.The response to the recommendation that your department be responsible for the pre-audit of suppliers invoices is:Internal auditing should not assume responsibility for pre-audit of disbursements. Objectivity is essential to the audit function, and internal auditors should be independent of the activities they must review. They should not prepare records or engage in any activity which could compromise their objectivity and independence. Furthermore, because internal auditing is a staff function, involvement in such a line function would be inconsistent with the proper role of an internal auditor.b.The response to the request that you make suggestions during development of the system is:It would be advantageous for internal auditing to make specific suggestions during the design phase concerning controls and audit trails to be built into a system. Internal auditing should build an appropriate interface with the Data Processing Department to help achieve this goal. Neither objectivity nor independence is compromised if the auditor makes recommendations for controls in the system under review. For example, internal auditing may: Provide a list of control requirements. Review testing plans. Determine that there are documentation standards and that they are being followed. Determine that the project itself is under control and that there is a system for gauging design progress.Internal auditing must refrain, however, from actual participation in designing the system.c.The response to the request that you assist in the installation of the system and approve the system after making a final review is:The auditor must remain independent of any system that will be subsequently audited. Therefore, the auditor must refrain from giving overall approval of the system in final review. The auditor may help in the installation or conversion of the system by continuing to offer suggestions for controls, particularly during the implementation period. In this situation, the auditor may review for missing segments, results of testing, and adequacy of documentation of program and procedures in order to determine readiness of the system for installation or conversion. After installation or conversion, the auditor may participate in a post-installation audit, either alone or as part of a team.(CIA Examination, adapted)9.2The important audit step that has not been performed in this case is tests of controls (sometimes called compliance tests). Since a system review only tells the auditor what controls are prescribed, tests of controls allow the auditor to determine whether the prescribed controls are being adhered to and are operating effectively.Examples of audit procedures which would be considered tests of controls are: Observation of computer operations, data control procedures, and file library control procedures. Inquiry of key systems personnel with respect to the way in which prescribed control procedures are interpreted and implemented. A questionnaire or checklist often facilitates such inquiry. Review a sample of source documents for proper authorization. Review a sample of on-line data entry entries for authorization. Review of the data control log, the computer operations log, the file librarians log, and the error log for evidence of adherence to prescribed policies. Test data processing by submitting a set of hypothetical transactions and comparing system outputs with expected results. Tracing selected transactions through the system and checking the accuracy of processing of these transactions. Checking the accuracy of a set of batch totals. Review of system operating statistics. Using a computer audit software package to edit the data on selected master files and in selected databases.9.3a. and b. Advantages and disadvantages of the test data processing approach:a. Advantagesb. Disadvantages Does not require extensive programming knowledge to use. Easily understood by the internal auditor. The complete system may be reviewed. Results are often easily checked. An opinion may be formed as to the systems accuracy in processing data. A regular computer program may be used. Situations can be tested that may not exist when auditing around the computer. It may save time. The auditor gains experience. The auditor maintains control over the test. Invalid data can be submitted to test for rejections. It may save computer time. It is impractical to test all error possibilities. There is inability to relate input data to output reports in a complex system. (The particular system output may be in a tape or memory form.) If independent files are not used, it may be difficult to reverse or back out test data from the system. Preparation of satisfactory test transactions may be time consuming. Preparation of test transactions requires technical knowledge.(CIA Examination, adapted)9.4Actions auditors should take to proceed with the accounts receivable audit are:Situation a The auditor should not accept this explanation and arrange with company executives for access to the computer system. The auditor should recommend that the procedures manual spell out computer use and access for audits.Situation b The auditor should not permit the computer program to be cataloged because it could then be changed without the auditors knowledge.Situation c The auditors charter should clearly provide for access to all areas and records of the organization.Situation d Auditors should insist on using their own computer audit program, since someone at the company may wish to conceal falsified accounts receivable. Auditors should insist on using their own computer audit program to expedite the audit, simplify the application, and avoid misunderstanding.(CIA Examination, adapted)9.5Problems with DCHs test data processing application, and suggested solutions:ProblemsSuggested SolutionsDuplicate copy of the program may not be a true duplicate of the current version. Source code comparison. Reprocessing (use previously valid program). Process test transactions concurrently with live ones, on a concealed basis.Duplicate copy of the file may not be a true duplicate of the current version. Obtain the live file and duplicate it under audit control. Process test transactions concurrently with live ones, on a concealed basis.Programmers test data file a. was not independently prepared, and b. may not have contained any erroneous transactions to test the programs ability to detect errors. Auditor must devise own test transactions, either (a) manually, or (b) using a test data generator. Erroneous transactions should deliberately be included.Offsite test only checks the programs, not the source data controls, error procedures, etc. Process test transactions concurrently with live ones, on a concealed basis. Use mini-company test (Integrated Test Facility).Audit seniors conclusion has no basis (no supporting evidence). Must predetermine the result of test data processing, and then compare these to actual results.9.6a.AWs Information Systems Division organization chart:Manager of Systems Development and ProgrammingData ControlOperations SupervisorData Entry SupervisionManager of OperationsDirector of Information Systemsb.1.What is good about this organization structure: Systems development and programming are organizationally independent of the operations functions. Computer operations organizationally independent of data entry and data control.2.What is bad about this organization structure: The manager of operations is responsible for systems programming. The data control clerk is responsible for the file library.c.Additional information, to be obtained from tests of compliance, would involve whether operating procedures are enforced which will make the separation of functions effective. Such procedures would include: Limited access to equipment, files, and documentation. Maintenance of activity logs for operating functions. Rotation of operations personnel and mandatory vacations. Checking of source data authorization.9-7Accounting Information Systems9.7Inventory transactions input control matrix:RECORD NAME: Parts inventory transactionsFIELD NAMESItem numberDescriptionTransaction dateTransaction typeDocument numberQuantityUnit costCommentsINPUT CONTROLS: Financial totalsCompute Total cost if possible Hash totalsXXX Record countsYes Cross-footing balanceNo Visual inspectionAll fields Check digit verificationX Prenumbered formsX Turnaround documentNo Edit programYes Sequence checkXX Field checkXXXXX Sign checkXAlso for balance on hand Validity checkXXX Limit checkX Reasonableness testXXXCompare quantity with item number Redundant data checkXX Completeness testCompleteness TestCompleteness TestXXXXXXXYes all fields Overflow procedure Other:9.8a.The fraud or abuse an auditor should be most concerned about is the submission of fictitious transactions into the system, either by a dishonest welfare examiner or by an unauthorized person. Fictitious transactions could cause excessive welfare benefits to be paid to a valid welfare recipient, or payments to an ineligible or fictitious recipient. Thus, the most necessary concurrent audit techniques will involve the processes of submitting changes in record status from pending to approved and modifying welfare records to reflect changes in the recipients circumstances. The auditor should verify that the system is set up to: check the password of every person who uses the system permit applicant records to be entered only by persons classified as welfare clerks permit transaction records to be entered only be persons classified as welfare examiners to capture and store the identity of the person entering every applicant record and transaction recordThe most useful concurrent audit technique to minimize the risk of fraudulent transactions would be the use of audit hooks. These program subroutines would review every record entered into the system, capture all data relating to any record that is suspicious and possibly fraudulent, write these records on an audit log or file, and report these records to the audit staff on a real-time basis. Some examples of questionable records that audit hooks might be designed to flag would be: Any welfare application record that is entered into the system by someone other than one of the authorized welfare clerks, and especially if entered by a welfare examiner. Any welfare record status change or modification that is entered into the system by someone other than one of the authorized welfare examiners. Assuming that it takes a minimum of n days for a welfare examiner to verify the authenticity of the data provided by a welfare applicant, any record for which the status change is entered within less than n days of the entry of the original applicant record. Any welfare record modification transaction that causes a welfare recipients benefits to increase by a significant amount (say, 20%), or to exceed some upper limit that is close to the maximum amount a recipient can collect. Any welfare record that is modified more than two or three times within a short period, such as two or three months. Any welfare record modification transaction that involves a change in the recipients address. Any welfare record where the recipients address is a post office box. Any welfare record that is not modified at all within a five year period. Any attempt to access the system by someone not able to supply a valid welfare clerk or welfare examiner password. Any record entered into the system at a time of day that is other than during the agencys normal business hours, or is during a weekend or holiday period.There are undoubtedly other useful audit hooks that could be identified. The audit staff should brainstorm about methods that a fraud perpetrator could use to defraud the system, and develop audit hooks to counteract plausible fraud schemes. As the audit staff receives the data captured by these audit hooks, they must promptly follow up to verify the validity of the data in each questionable record.The auditor should also be concerned about the accuracy of the portion of the program that calculates each welfare recipients benefits. The auditor should verify that this program code is thoroughly tested during the implementation process, and should prepare a copy of this program code for audit purposes, to be compared with the version of this code that is in use at subsequent intervals. To supplement this procedure, as well as to provide additional protection against a possible fraud perpetrator, the auditor could add another audit hook that captures relevant data relating to any attempt to access and modify the welfare processing program itself.b.Computer audit software could be used to process the welfare recipient database against other databases that contain data about welfare recipients, identify any discr
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 成都文昌村拆迁协议书
- 戴姆勒签约奥迪协议书
- 改性塑料体育用品材料创新创业项目商业计划书
- (副高级)高级卫生专业技术资格考试试题及答案
- 【高中语文】《燕歌行》教学设计+统编版高二语文选择性必修中册
- 汕头“书香城市”建设:24 小时书店全覆盖与市民阅读习惯培育纪实 -2026 届高三语文主题读写素材 11 月热点时事写作素材
- 2024年岳阳市消防救援支队政府专职消防员招录真题
- 超静定结构力学特性研究
- 2024年上海交通大学医学院附属新华医院招聘真题
- 人教版(2024)八年级上册英语Unit 6 Plan for Yourself 单元达标测试卷(含答案)
- 农业穿戴设备的人体工学设计
- 酒厂生产安全管理制度
- 2025年高中英语50篇语法填空记高考3500词(翻译及原文版)
- (完整版)人教版小学英语单词表(带音标)
- 《家乡历史名人》课件
- 《低压电工实操及考证》全套教学课件
- DBJ04-T 312-2024 湿陷性黄土场地勘察及地基处理技术标准
- JJF1033-2023计量标准考核规范
- 用火用电安全管理制度
- 颈椎病课件完整版
- 中远海运集团笔试题库2025
评论
0/150
提交评论