• Tidak ada hasil yang ditemukan

Addthis Arens Chapter12

N/A
N/A
Protected

Academic year: 2017

Membagikan "Addthis Arens Chapter12"

Copied!
35
0
0

Teks penuh

(1)

The Impact of Information

The Impact of Information

Technology on the Audit

Technology on the Audit

Process

Process

(2)

©2010 Prentice Hall Business Publishing,

©2010 Prentice Hall Business Publishing, Auditing 13/e,Auditing 13/e, Arens//Elder/Beasley Arens//Elder/Beasley 12 - 12 - 22

Learning Objective 1

Learning Objective 1

Describe how IT improves

Describe how IT improves

internal control.

(3)

How Information Technologies

How Information Technologies

Enhance Internal Control

Enhance Internal Control

Computer controls replace manual controls

(4)

©2010 Prentice Hall Business Publishing,

©2010 Prentice Hall Business Publishing, Auditing 13/e,Auditing 13/e, Arens//Elder/Beasley Arens//Elder/Beasley 12 - 12 - 44

Learning Objective 2

Learning Objective 2

Identify risks that arise from using

Identify risks that arise from using

an IT-based accounting system.

(5)

Assessing Risks of

Assessing Risks of

Information Technologies

Information Technologies

Risks to hardware and data

Reduced audit trail

Need for IT experience and

(6)

©2010 Prentice Hall Business Publishing,

©2010 Prentice Hall Business Publishing, Auditing 13/e,Auditing 13/e, Arens//Elder/Beasley Arens//Elder/Beasley 12 - 12 - 66

Risks to Hardware and Data

Risks to Hardware and Data

Reliance on the functioning capabilities

of hardware and software

Reliance on the functioning capabilities

of hardware and software

Systematic versus random errors

Systematic versus random errors

Unauthorized access Unauthorized access

(7)

Reduced Audit Trail

Reduced Audit Trail

Visibility of audit trail

Reduced human involvement

(8)

©2010 Prentice Hall Business Publishing,

©2010 Prentice Hall Business Publishing, Auditing 13/e,Auditing 13/e, Arens//Elder/Beasley Arens//Elder/Beasley 12 - 12 - 88

Need for IT Experience and

Need for IT Experience and

Separation of Duties

Separation of Duties

Reduced separation of duties

(9)

Learning Objective 3

Learning Objective 3

Explain how general controls

Explain how general controls

and application controls

and application controls

reduce IT risks.

(10)

©2010 Prentice Hall Business Publishing,

©2010 Prentice Hall Business Publishing, Auditing 13/e,Auditing 13/e, Arens//Elder/Beasley Arens//Elder/Beasley 12 - 12 - 1010

Internal Controls Specific to

Internal Controls Specific to

Information Technology

Information Technology

General controls

(11)

Relationship Between General

Relationship Between General

and Application Controls

and Application Controls

Cash receipts Risk of unauthorized change

to application software Risk of system crash

Risk of unauthorized

(12)

©2010 Prentice Hall Business Publishing,

©2010 Prentice Hall Business Publishing, Auditing 13/e,Auditing 13/e, Arens//Elder/Beasley Arens//Elder/Beasley 12 - 12 - 1212

General Controls

General Controls

Administration of the IT function

Separation of IT duties

Systems development

Physical and online security

Backup and contingency planning

(13)

Administration of the IT Function

Administration of the IT Function

The perceived importance of IT within an

(14)

©2010 Prentice Hall Business Publishing,

©2010 Prentice Hall Business Publishing, Auditing 13/e,Auditing 13/e, Arens//Elder/Beasley Arens//Elder/Beasley 12 - 12 - 1414

Segregation of IT Duties

Segregation of IT Duties

Chief Information Officer or IT Manager

Systems

Development Operations ControlData

(15)

Systems Development

Systems Development

Typical test strategies

(16)

©2010 Prentice Hall Business Publishing,

©2010 Prentice Hall Business Publishing, Auditing 13/e,Auditing 13/e, Arens//Elder/Beasley Arens//Elder/Beasley 12 - 12 - 1616

Physical and Online Security

Physical and Online Security

Physical Controls:

Physical Controls:

 Keypad entrancesKeypad entrances

 Badge-entry systemsBadge-entry systems  Security camerasSecurity cameras

 Security personnelSecurity personnel

Online Controls:

Online Controls:

 User ID controlUser ID control  Password controlPassword control  Separate add-onSeparate add-on

security software

(17)

Backup and Contingency

Backup and Contingency

Planning

Planning

One key to a backup and contingency plan is to make sure that all critical copies of

(18)

©2010 Prentice Hall Business Publishing,

©2010 Prentice Hall Business Publishing, Auditing 13/e,Auditing 13/e, Arens//Elder/Beasley Arens//Elder/Beasley 12 - 12 - 1818

Hardware Controls

Hardware Controls

These controls are built into computer equipment by the manufacturer to

(19)

Application Controls

Application Controls

Input controls

Processing controls

(20)

©2010 Prentice Hall Business Publishing,

©2010 Prentice Hall Business Publishing, Auditing 13/e,Auditing 13/e, Arens//Elder/Beasley Arens//Elder/Beasley 12 - 12 - 2020

Input Controls

Input Controls

These controls are designed by an organization to ensure that the

information being processed is

(21)

Batch Input Controls

Batch Input Controls

Financial total

Hash total

(22)

©2010 Prentice Hall Business Publishing,

©2010 Prentice Hall Business Publishing, Auditing 13/e,Auditing 13/e, Arens//Elder/Beasley Arens//Elder/Beasley 12 - 12 - 2222

Processing Controls

Processing Controls

Validation test

Sequence test

Arithmetic accuracy test

Data reasonableness test

(23)

Output Controls

Output Controls

These controls focus on detecting errors after processing is completed rather

(24)

©2010 Prentice Hall Business Publishing,

©2010 Prentice Hall Business Publishing, Auditing 13/e,Auditing 13/e, Arens//Elder/Beasley Arens//Elder/Beasley 12 - 12 - 2424

Learning Objective 4

Learning Objective 4

Describe how general controls

Describe how general controls

affect the auditor’s testing

affect the auditor’s testing

of application controls.

(25)

Impact of Information Technology on

Impact of Information Technology on

the Audit Process

the Audit Process

Effects of general controls on control risk

Effects of IT controls on control risk and

substantive tests

Auditing in less complex IT environments

(26)

©2010 Prentice Hall Business Publishing,

©2010 Prentice Hall Business Publishing, Auditing 13/e,Auditing 13/e, Arens//Elder/Beasley Arens//Elder/Beasley 12 - 12 - 2626

Learning Objective 5

Learning Objective 5

Use test data, parallel simulation,

Use test data, parallel simulation,

and embedded audit module

and embedded audit module

approaches when auditing

approaches when auditing

through the computer.

(27)

Test Data Approach

Test Data Approach

1. Test data should include all relevant

conditions that the auditor wants tested.

2. Application programs tested by the

auditors’ test data must be the same as those the client used throughout the year.

(28)

©2010 Prentice Hall Business Publishing,

©2010 Prentice Hall Business Publishing, Auditing 13/e,Auditing 13/e, Arens//Elder/Beasley Arens//Elder/Beasley 12 - 12 - 2828

Test Data Approach

Test Data Approach

Application programs Application programs (assume batch system) (assume batch system)

Control test

transactions to test transactions to test

(29)

Test Data Approach

Test Data Approach

Auditor-predicted results Auditor-predicted results

of key control procedures of key control procedures

based on an understanding based on an understanding

of internal control of internal control Control test actual outcome and actual outcome and

(30)

©2010 Prentice Hall Business Publishing,

©2010 Prentice Hall Business Publishing, Auditing 13/e,Auditing 13/e, Arens//Elder/Beasley Arens//Elder/Beasley 12 - 12 - 3030

Parallel Simulation

Parallel Simulation

(31)

Parallel Simulation

Parallel Simulation

Auditor makes comparisons between Auditor makes comparisons between client’s application system output and client’s application system output and the auditor-prepared program output the auditor-prepared program output

(32)

©2010 Prentice Hall Business Publishing,

©2010 Prentice Hall Business Publishing, Auditing 13/e,Auditing 13/e, Arens//Elder/Beasley Arens//Elder/Beasley 12 - 12 - 3232

Embedded Audit Module

Embedded Audit Module

Approach

Approach

(33)

Learning Objective 6

Learning Objective 6

Identify issues for e-commerce

Identify issues for e-commerce

systems and other specialized

systems and other specialized

IT environments.

(34)

©2010 Prentice Hall Business Publishing,

©2010 Prentice Hall Business Publishing, Auditing 13/e,Auditing 13/e, Arens//Elder/Beasley Arens//Elder/Beasley 12 - 12 - 3434

Issues for Different IT

Issues for Different IT

Environments

Environments

Issues for network environments

Issues for database management systems

Issues for e-commerce systems

(35)

Referensi

Dokumen terkait

Peraturan Pemerintah Nomor 24 Tahun 2004 tentang Kedudukan Protokoler dan Keuangan Pimpinan dan Anggota Dewan Perwakilan Rakyat Daerah (Lembaran Negara Republik Indonesia Tahun

Oleh karenanya, dalam jurnal tersebut membahas tentang konsep kepemimpinan spiritual dalam lembaga pendidikan Islam perspektif Maqashid Syariah dari segi

Berdasarkan hal tersebut di atas, pengendalian internal sangat diperlukan dalam siklus penjualan dan penerimaan kas.Pembentukan dan pelaksanaan pengendalian internal yang baik

Pada hari ini Rabu, tanggal Tiga bulan Juni tahun Dua ribu lima belas, kami yang bertanda tangan di bawah ini Pokja Panitia Untuk Pekerjaan Rehabilitasi Berat Gedung

Tujuan dari penelitian ini yaitu pembangunan sistem komputerisasi untuk penentuan status daya dukung lingkungan berbasis neraca lahan dan mengidentifikasi keseimbangan lahan

Faktor yang mengakibatkan pandangan masyarakat multikultural terhadap suatu yang tidak dapat dijadikan alasan untuk hidup berdampingan secara harmonis adalah ….. beragamnya

 Faktorisasi prima adalah pecahan bilangan komposit yang terdiri dari bilangan-bilangan pembagi yang lebih kecil, dan hasil perkalian dari bilangan-bilangan tersebut sama

Pajak penghasilan terkait pos-pos yang tidak akan direklasifikasi ke laba rugi 0. Penyesuaian akibat penjabaran laporan keuangan dalam mata uang