THE LEGAL REGULATION OF THE EXTERNAL COMPANY AUDITOR IN POST-ENRON SOUTH AFRICA Hannine Drake THESIS PRESENTED IN FULFILMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF LAWS AT THE UNIVERSITY OF STELLENBOSCH Supervisor: Prof A.H. van Wyk March 2009 ii DECLARATION By submitting this thesis electronically, I declare that the entirety of the work contained therein is my own, original work, that I am the owner of the copyright thereof (unless to the extent explicitly otherwise
Words: 50477 - Pages: 202
To From Subject Course Date Mr. R. Nijland Luuk Harleman (2430113) Business case Auditing Report 26th of March 2013 luukharleman@gmail.com (243011) 2 Executive Summary In the following case a business process is described of a particular subject which is discussed during the lectures of the APM course. The choice was to write one from your own experience or from an existing company. I chose an existing company since you can keep an interview and it will be easier to identify the current
Words: 3141 - Pages: 13
The Lakeside Company Case Studies in Auditing Twelfth Edition John M. Trussel Dalton State College J. Douglas Frazer Millersville University Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montreal Toronto Delhi Mexico City Sao Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo Editor in Chief: Donna Battista Acquisitions Editor: Stephanie Wall Editorial Project Manager: Christina Rumbaugh
Words: 48183 - Pages: 193
------------------------------------------------- Smackey dog food Auditing [Date] tamucc [Company address] [Date] tamucc [Company address] Smackey Dog Food is a family owned and operated company that began as a dream of two sister’s and its meager beginnings were established in the kitchen of their home. The business has become more profitable and thus the sisters have a need to expand the business into a larger facility. There was a need to hire additional employees in order to
Words: 4656 - Pages: 19
been downloaded 1824 times since 2012* Users who downloaded this article also downloaded: Songlan Peng, Kathryn Bewley, (2010),"Adaptability to fair value accounting in an emerging economy: A case study of China's IFRS convergence", Accounting, Auditing & Accountability Journal, Vol. 23 Iss 8 pp. 982-1011 http://dx.doi.org/10.1108/09513571011092529 Randy Moser, (2014),"IFRS and convergence in China and the USA", Journal of Technology Management in China, Vol. 9 Iss 1 pp. 56-66 http://dx.doi
Words: 9957 - Pages: 40
5.9 SEPARATION OF DUTIES 13 5.10 LEAST PRIVILEGE 14 5.11 UNSUCCESSFUL LOGIN ATTEMPTS 14 5.12 SYSTEM USE NOTIFICATION 14 5.13 SESSION LOCK 15 5.15 SUPERVISION AND REVIEW — ACCESS CONTROL 16 5.16 REMOTE ACCESS 16 5.17 USE OF EXTERNAL INFORMATION SYSTEMS 17 6. SECURITY AWARENESS AND TRAINING POLICY AND PROCEDURES 18 6.1 SECURITY TRAINING 19 7. AUDIT AND ACCOUNTABILITY POLICY AND PROCEDURES 19 7.1 AUDITABLE EVENTS 19 7.2 CONTENT OF AUDIT RECORDS 20 7.3 AUDIT
Words: 19387 - Pages: 78
A GUIDE TO FORENSIC ACCOUNTING INVESTIGATION THOMAS W. GOLDEN, STEVEN L. SKALAK, AND MONA M. CLAYTON JOHN WILEY & SONS, INC. A GUIDE TO FORENSIC ACCOUNTING INVESTIGATION THOMAS W. GOLDEN, STEVEN L. SKALAK, AND MONA M. CLAYTON JOHN WILEY & SONS, INC. This book is printed on acid-free paper. Copyright © 2006 by PricewaterhouseCoopers LLP. PricewaterhouseCoopers refers to the individual member firms of the worldwide PricewaterhouseCoopers organization. All rights reserved. Published
Words: 246885 - Pages: 988
Aircraft Solution (AS) Company Ali Hassan Submitted to: John Michalek SEC571 Principles of Information Security and Privacy Keller Graduate School of Management Submitted: April 21, 2013 Table of Contents Company Overview ……………………………………………1 Company Assets ………………………………………………..1 Vulnerabilities ………………………………………………….2 Hardware Vulnerability………………………………….......2 Policy Vulnerability …………………………..……………..3 Recommended Solutions…………………………………….... 5 Hardware Solutions
Words: 4091 - Pages: 17
Handbook of Management Accounting Research Volume 3 Edited by CHRISTOPHER S. CHAPMAN Imperial College London, UK ANTHONY G. HOPWOOD University of Oxford, UK MICHAEL D. SHIELDS Michigan State University, USA AMSTERDAM – BOSTON – HEIDELBERG – LONDON – NEW YORK – OXFORD PARIS – SAN DIEGO – SAN FRANCISCO – SINGAPORE – SYDNEY – TOKYO Elsevier The Boulevard, Langford Lane, Kidlington, Oxford OX5 1GB, UK First edition 2009 Copyright © 2009 Elsevier Ltd. All rights reserved No part of
Words: 187223 - Pages: 749
major ethical issues related to information technology and identify situations in which they occur. 2. Identify the many threats to information security. 3. Understand the various defense mechanisms used to protect information systems. 4. Explain IT auditing and planning for disaster recovery. Ethics, Privacy, and Information Security LEARNING OBJECTIVES rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 71 WEB RESOURCES Student Web site www.wiley.com/college/rainer • Web quizzes • Lecture
Words: 25389 - Pages: 102