...|[pic] |Course Syllabus | | |School of Business | | |ACC/542 Version 2 | | |Accounting Information Systems | Copyright © 2009, 2007 by University of Phoenix. All rights reserved. Course Description In this course, students examine the fundamentals of accounting systems design. Topics include business information systems, business processes and data flows, database concepts and tools, internal control and risks, auditing the information system, and using the information system to perform audit functions. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending...
Words: 2534 - Pages: 11
...CHAPTER 9 AUDITING COMPUTER-BASED INFORMATION SYSTEMS SUGGESTED ANSWERS TO DISCUSSION QUESTIONS 9.1 Since most organizations make extensive use of computer-based systems in processing accounting data, it is essential that computer expertise be available in the organization's audit group. Such expertise should include: * Extensive knowledge of computer hardware, software, and accounting applications * A detailed understanding of appropriate control policies and procedures in computer systems * An ability to read and understand system documentation * Experience in planning computer audits and in using modern computer auditing techniques. All internal auditors may not possess expertise in all of these areas. However, there is certainly some minimum level of computer expertise that is appropriate for all auditors. This would include: * An understanding of computer hardware, software, accounting applications, and controls. * The ability to examine all elements of the computerized AIS * The ability to use the computer as a tool to accomplish these auditing objectives. ...
Words: 5026 - Pages: 21
...Assessing Information Technology General Control Risk: An Instructional Case Carolyn Strand Norman, Mark D. Payne, and Valaria P. Vendrzyk ABSTRACT: Information Technology General Controls (ITGCs), a fundamental category of internal controls, provide an overall foundation for reliance on any information produced by a system. Since the relation between ITGCs and the information produced by an organization’s various application programs is indirect, understanding how ITGCs interact and affect an auditor’s risk assessment is often challenging for students. This case helps students assess overall ITGC risk within an organization’s information systems. Students identify specific strengths and weaknesses within five ITGC areas, provide a risk assessment for each area, and then evaluate an organization’s overall level of ITGC risk within the context of an integrated audit. Keywords: internal controls; general control; ITGC; risk assessment. INTRODUCTION he Sarbanes-Oxley Act (SOX 2002) and the Public Company Accounting Oversight Board (PCAOB) Auditing Standard No. 5 (PCAOB 2007) require that the organization’s chief executive officer (CEO) and chief financial officer (CFO) include an assessment of the operating effectiveness of their internal control structure over financial reporting when issuing the annual report. External auditors must review management’s internal control assessment as part of an annual integrated audit of an organization’s internal controls over financial reporting. In short...
Words: 6299 - Pages: 26
...continuation of Audit and Assurance 1. It intends to strengthen and enhance the students’ understanding in auditing. Among the topics that will be discussed are code of ethics, auditors’ liability and in-depth explanations on analytical procedures, computer assisted audit techniques, audit sampling, materiality and audit risk, group audit and current issues facing the auditing profession. This course will justify other activities than financial statement audit that can be performed by a public accountant like performance/operational audit, internal audit and compliance audit. 2. COURSE OBJECTIVES This course intends the student: 1. To comprehend applicable regulations, legal responsibilities and ethical standards and current issues facing the audit profession. 2. To appreciate the concepts of internal control system and the use of computer assisted audit techniques in auditing a computerised environment. 3. To understand and apply audit risk, materiality, and statistical and non statistical audit sampling techniques. 4. To be familiar with related issues in audit completion, group audit, internal audit and related audit services and other services that can be provided by the public accounting firms. 3. LEARNING OUTCOMES Upon completion of the course, students will be able to: 1. Explain the professional conduct and ethics of an auditor, the legal liability environment affecting the auditors and relate it to relevant cases (C2, P2...
Words: 1222 - Pages: 5
...a breach of duty of care (failure to follow GAAS, negligent audit). • There must be proof that the party suffered a loss or damage • There must be a connection between the party’s loss or damage and the breach of the duty. Question A HHH Company’s Case • HHH hired the auditors; therefore the auditors owe a duty of case to the shareholders. • The shareholders would have to show that the auditors were negligent in their audit, that is, the auditor issued an unqualified report even though there is a misstatement in the financial statements. • HHH lost its investment in the commodities • HHH shareholders would have to show that they suffered the loss due to the auditor’s negligence. Question A • Each store is managed by an owner of the business, which suggests that an external audit is not required. • The company is not public, so there is no statutory requirement for an audit. • If the company borrows from an outside source, then an external audit may be a requirement by the lender. • The existing shareholders are already creditors of the company, and they may wish to have an audit. Question B • Collusion requires 2 or more people to work together to circumvent the controls. In this case, the 2 purchasing clerks could have colluded by having 1 clerk record a false vendor number on the invoice and then the other clerk prepare the payment to M. Smith. • This is an example of management override. In this case, the control procedure to have the purchasing manager approve...
Words: 683 - Pages: 3
...Case 04-1 Total Computer, Inc. Tim Jacobs (Audit Manager) was reviewing the working papers for Total Computer, Inc., a large, privately owned retailer of computer hardware in the United States. Tim is on site at the client’s headquarters and has only two sections to review: inventory reserves and accounts receivable. Inventory Reserves While reviewing the inventory working papers of Total Computer, Inc., Tim focused on the lower of cost or market (“LOCOM”) inventory reserve, which had been identified as an area of audit risk. The working papers included a schedule prepared by the client showing beginning and ending balances, write-offs, and the current-year provision. Sarah Byrd (Audit Staff) summed the schedule and traced the ending LOCOM reserve balance into the general ledger without exception. Further, Sarah documented in a memo that she held discussions with Betty Bingham (Controller) to gain an understanding of the client’s assumptions and judgments regarding the calculation of LOCOM inventory reserves. Betty prepared the LOCOM reserve based on her extensive knowledge of the company and the computer hardware business, as well as, her discussions with Jerry Lee (Director of Marketing). Sarah’s memo documented the following: • Inventory is a diverse portfolio of computer hardware produced by several manufacturers. • Total Computer, Inc., consistently has experienced an average inventory turnover of 10 times per year. • Based on his knowledge of the marketplace, Jerry identified...
Words: 995 - Pages: 4
...dramatically 2 IT Inside Organization 3 SIMASTERGAMA Case study: UGM UNIVERSITY ENTERPRISE SYSTEM Informasi untuk Eksekutif (Rektor, Wakil REktor, Direktur) Informasi untuk Manajer (Ka Adm, Kabag/Kasi) Academics MO DUL /AP LIK AS HR Payroll Library Accounting Informasi untuk Operasional (Front Office) I dll. Fakultas Biologi Fakultas Ekonomika dan Bisnis Fakultas ISIPOL Fakultas Farmasi Fakultas Kedokteran Fakultas Pertanian TAS KUL FA Transition of IS Governance Poor IS Governance Good IS Governance 5 Need for Audit of Information Systems 6 Information System Auditing “IS Auditing is the process of collecting and evaluating evidence to determine whether a computer system safeguards assets, maintains data integrity, allows organizational goals to be achieved effectively, and uses resources efficiently” (Weber, 1999) 7 Objectives of IS Auditing Evaluate and Improved of… asset safeguarding system efficiency IS Auditing system effectiveness data integrity 8 Information Technology Auditing IT audits: provide audit services where processes or data, or both, are embedded in technologies (Hall, 2011). Joint with internal, external, and fraud audits Scope of IT audit coverage is increasing Characterized by CAATTs IT governance as part of corporate governance 9 Phases of the Information Systems Audit 1. Initial review and evaluation of the area to be audited, and the audit plan...
Words: 647 - Pages: 3
...Syllabus Certified General Accountants Association of Canada 100 – 4200 North Fraser Way Burnaby, British Columbia Canada V5J 5K7 www.cga-canada.org © CGA-Canada, 2013 All rights reserved. These materials or parts thereof may not be reproduced or used in any manner without the prior written permission of the Certified General Accountants Association of Canada. Printed in Canada ISBN for an individual volume: 978-1-55219-599-4 About CGA-CANADA _________________________________________ CGA-Canada today The CGA designation focuses on integrity, ethics, and the highest education requirements. Recognized as the country’s accounting business leaders, CGAs provide strategic counsel, financial leadership, and overall direction to all sectors of the Canadian economy. The Certified General Accountants Association of Canada — CGA-Canada — sets standards, develops education programs, publishes professional materials, advocates on public policy issues, and represents CGAs nationally and internationally. The Association represents 75,000 CGAs and students in Canada, Bermuda, the Caribbean, Hong Kong, and China. Mission CGA-Canada advances the interests of its members and the public through national and international representation and the establishment of professional standards, practices, and services. A proud history CGA-Canada was founded in Montréal in 1908 under the leadership of John Leslie, vicepresident of the Canadian Pacific Railway. From the beginning, its objective...
Words: 39811 - Pages: 160
... Fall 2013 Course Outline AP/ADMS 4552 3.0 Section A and B Information Systems Audit Term: Fall 2013 COURSE: AP/ADMS 4552 3.0 Sections A and B Information Systems Audit Schedule First day of class: Section A: Wednesday, September 11, 2013 11:30 AM – 2:30 PM, Location: HNE 030 Section B: Thursday, September 12, 2013 7:00 PM – 10:00 PM, Location: HNE 032 REQUIRED COURSE TEXT/READINGS: • Hall, James A., (2011), Information Technology Auditing, 3e, Mason: South-Western Cengage Learning (Referred to as “IT Audit Text” in the Readings List for each class) • Additional material as listed in the course outline. This includes articles referenced by links, readings from books that were required for prerequisite courses, cases and assignment details posted on our web site. • CICA Assurance Handbook, as available online from York University library, (referred to as “Handbook” in the Readings List for each class). Selected readings are from: [Note this book is available on reserve at the business library in the Schulich building if you do not have a copy.] • Arens, A., R. J. Elder, M. S. Beasley and I. B. Splettstoesser-Hogeterp. 2011. Auditing: The Art and Science of Assurance Engagements, Canadian 11th Edition, Pearson Prentice Hall: Toronto. (Referred to as “Audit Text” in the Readings List) References for the 12th Canadian edition of the Audit text (as an alternative to the 11th edition) will be provided separately as a document...
Words: 3433 - Pages: 14
...IT Audit Seminar organized by National Audit Office, China 1 to 4 September 2004 Paper on “Formulation of IT Auditing Standards” By -- Ms.Puja S Mandol and Ms. Monika Verma Supreme Audit Institution of India Introduction The use of computers and computer based information systems have pervaded deep and wide in every modern day organization. An organization must exercise control over these computer based information systems because the cost of errors and irregularities that may arise in these systems can be high and can even challenge the very existence of the organization. An organizations ability to survive can be severely undermined through corruption or destruction of its database; decision making errors caused by poor-quality information systems; losses incurred through computer abuses; loss of computer assets and their control on how the computers are used within the organization. Therefore managements across the world have deployed specialized auditors to audit their information systems to find out gaps between declared policies and actual use and shortcomings in the information system design and usage. Information Systems Audit is the process of collecting and evaluating evidence to determine whether a computer system has been designed to maintain data integrity, safeguard assets, allows organizational goals to be achieved effectively and uses the resources efficiently. The IS Auditor should see that not only adequate internal controls exist...
Words: 6839 - Pages: 28
...Audit Plan ACC 410 I will attempt to set up an audit plan for Keystone Computers & Networks, Inc. In order to set up this audit plan, I will use an outline format that will cover systematically throughout the entire audit. Every audit is unique in which all auditors have their own ways of making their plans. Planning of an audit is a continuous process and that the strategy and planned audit approach may change as new information comes to an auditor’s attention during the course of the audit. The steps that the auditor will approach on the audit plan will be as follows. The auditor will start by planning a quality audit for Keystone Computers & Networks, Inc. The plan will then be to perform a quality audit for Keystone Computers & Networks, Inc. The next step will be to look for any kind of fraud, both financial reporting and misappropriation of assets. The last step will be to prepare the audit report. I will attempt to start from the first of the report and outline all the steps throughout the entire process. I. Introduction A. Setting up an audit plan in the opening paragraph B. Systematic of the format, the auditor will use to prepare an audit plan of Keystone Computers & Networks, Inc. C. Supporting sentences in making the entire audit plan work for the company In order to start an audit the auditor needs to plan everything out before approaching the client’s financial statements and stating the audit, there are steps to perform...
Words: 1928 - Pages: 8
...| ------------------------------------------------- Top of Form | | | | Language | | | | ------------------------------------------------- Top of Form | Bottom of Form | | | | | | * Tenders * Downloads * Income Tax Returns * Wealth Tax Return * Forms * Challans * International Taxation * Non Residents * Foreign Companies * Advance Rulings * Transfer Pricing * DTAA * Comprehensive agreements * Limited agreements * Other Agreements * Tax Information Exchange Agreement (TIEA) * Witholding Tax * Tax Law and Rules * Acts * Income Tax Act * Wealth Tax Act * Gift Tax Act * Expenditure Tax Act * Interest Tax Act * Finance Acts * Rules * Income Tax Rules * Wealth Tax Rules * Gift Tax Rules * Expenditure Tax Rules * Interest Tax Rules * Advance Ruling * ITAT Rules * Settlement Commission Rules * Circulars * Notifications * About Us * History of Direct Taxation * Vision, Mission, Values * Organisation and Functions * CBDT * Directorate Generals * Administration * Legal & Research * Systems * Vigilance * NADT * Exemptions * HRD * International Taxation ...
Words: 12280 - Pages: 50
...Philippine Auditing Practice Statement 1009 COMPUTER-ASSISTED AUDIT TECHNIQUES PAPS 1009 PHILIPPINE AUDITING PRACTICE STATEMENT 1009 COMPUTER-ASSISTED AUDIT TECHNIQUES CONTENTS Paragraphs Introduction Description of Computer Assisted Audit Techniques (CAATs) Considerations in the Use of CAATs Using CAATs Using CAATs in Small Entity IT Environments Effective Date Acknowledgment 1-3 4-6 7-16 17-25 26 27 28-29 The Auditing Standards and Practices Council (ASPC) issues Philippine Auditing Practices Statements (PAPS or Statements) to provide practical assistance to auditors in implementing the Philippine Standards on Auditing (PSAs) or to promote good practice. Statements do not have the authority of PSAs. This Statement does not establish any new basic principles or essential procedures; its purpose is to assist auditors, and the development of good practice, by providing guidance on the application of the PSAs regarding the use of Computer Assisted Audit Techniques as an audit tool. This Statement applies to all uses of CAATs involving a computer of any type or size. The auditor exercises professional judgment to determine the extent to which any of the audit procedures described in this Statement may be appropriate in the light of the requirements of the PSAs and the entity’s particular circumstances. PAPS 1009 Introduction 1. The overall objectives and scope of an audit do not change when an audit is conducted in a computer information technology (IT) environment. The...
Words: 3364 - Pages: 14
...CHAPTER 4 Engagement Planning LEARNING OBJECTIVES | Review Checkpoints | Exercises, Problems and Simulations | 1. List and describe the activities auditors undertake before beginning an engagement. | 1, 2, 3, 4 | 53, 54, 55, 62, 66 | 2. Identify the procedures and sources of information auditors can use to obtain knowledge of a client’s business and industry. | 5, 6, 7, 8, 9 | 52, 56, 59, 65 | 3. Perform analytical procedures to identify potential problems. | 10, 11, 12, 13, 14, 15 | 47, 48, 49, 51, 58, 63, 64 | 4. List and discuss matters of planning auditors should consider for clients who use computers and describe how a computer can be used as an audit tool. | 16, 17, 18, 19, 20, 21, 22 | 57, 60 | 5. Review audit documentation for proper form and content. | 23, 24, 25 | 50, 61 | SOLUTIONS FOR REVIEW CHECKPOINTS 4.1 A CPA can use the following sources of information to help decide whether to accept a new audit client. Financial information prepared by the prospective client: * Annual reports to shareholders * Interim financial statements * Securities registration statements * Annual report on SEC Form 10K * Reports to regulatory agencies Inquiries directed to the prospect's business associates: * Banker * Legal counsel * Underwriter * Other persons, e...
Words: 11602 - Pages: 47
...CGA-CANADA AUDITING 2 EXAMINATION March 2005 Marks 30 Time: 4 Hours Question 1 Select the best answer for each of the following unrelated items. Answer each of these items in your examination booklet by giving the number of your choice. For example, if the best answer for item (a) is (1), write (a)(1) in your examination booklet. If more than one answer is given for an item, that item will not be marked. Incorrect answers will be marked as zero. Marks will not be awarded for explanations. Note: 11/2 marks each a. An attitude of “professional scepticism” is necessary if a CGA is to perform an audit engagement with due care. Which of the following best describes how a CGA may display an attitude of “professional scepticism” when performing an audit engagement? 1) 2) 3) 4) By assuming that management is dishonest in the absence of evidence to the contrary By not allowing clients’ staff to assist in the performance of an audit By rejecting all management assertions in the absence of supporting evidence By questioning all material assertions made by management b. Which of the following steps or modifications to an audit program is likely to be the most appropriate if an auditor assesses the risk of management fraud to be relatively high? 1) 2) 3) 4) c. Performing relatively less audit work at interim dates Placing greater reliance on management’s representations Performing less extensive tests of internal controls Assigning less experienced...
Words: 7836 - Pages: 32