Audit Lessons
Audit Lessons
Audit Lessons
IT Governance
IT governance definition
IT governance is an element of corporate governance, aimed at improving the overall
management of IT and deriving improved value from investment in information and
technology.
A robust corporate governance framework can help you meet the requirements of laws and
regulations such as the DPA (Data Protection Act) 2018 and the GDPR.
For instance, the GDPR requires data controllers and processors to demonstrate their
compliance with its requirements through certain documentation, including relevant logs,
policies and procedures.
Harnessing the elements of IT governance will help you create and maintain appropriate
policies and procedures to help meet your data privacy requirements.
It sets out principles, definitions and a high-level framework that organisations of all types
and sizes can use to better align their use of IT with organisational decisions and meet their
legal, regulatory and ethical obligations.
As well as ISO 38500, there are numerous widely recognised, vendor-neutral frameworks
that organisations can use to implement an IT governance programme.
Each has its own IT governance strengths – for instance, COBIT focuses more on process
management and ITIL on service management – but you might benefit from an integrated
approach, using parts of several frameworks to deliver the results you need.
Widely adopted around the world, ITIL is a framework for ITSM (IT service management). Its
latest iteration, ITIL 4, was launched in February 2019.
ITIL is supported by ISO/IEC 20000-1:2018 – the international standard for ITSM against
which organisations can achieve independent certification.
COBIT
COBIT 2019, the latest iteration of the framework, was released in November 2018. It builds
on COBIT 5, introducing new concepts and addressing the latest developments affecting
enterprise IT.
Calder-Moir IT Governance Framework
This framework provides structured guidance on how to approach IT governance. It can help
benchmark the balance and effectiveness of IT governance practices within an organisation.
1. Value delivery
2. Strategic alignment
3. Performance management
4. Resource management
5. Risk management
IT governance auditing
As IT governance plays a crutial role in strategic performance, internal auditors are expected
to include it in their audit plans.
Does the board and top management really understand its role in making IT
governance effective?
Is IT management competent, and is it really a part of the top management team?
Is IT genuinely contributing to achievement of organisation’s strategic and tactical
objectives?
Is there a robust (planned and tested) IT risk management framework in place,
specifically including IT projects, DPA compliance, cyber security, ICT continuity?
Is IT able to identify and prioritise key technology changes that will enhance
organisational performance?
Are IT metrics really measuring IT performance in terms of delivering value and
resource optimisation and risk reduction?
https://youtu.be/5U5f17vO1Y0
Comparing COBIT 4.1 to COBIT 5
https://youtu.be/_W8DuJNi-2M
Here is a comparison between COBIT 4.1 AND COBIT 5. Click on the link to learn more
The work of an IT auditor
It’s an essential role for organizations that rely on technology given that one small technical
error or misstep can ripple down and impact the entire company. IT audits are important for
evaluating internal control and processes in an effort to keep the organization and its data
secure from external or internal threats.
IT audit responsibilities
As an IT auditor you will be responsible for running several audits of an organization’s
technologies and processes. IT audits are also referred to as automated data processing
(ADP) audits and computer audits. In the past, IT audits have also been labeled as electronic
data processing (EDP) audits. Companies may also run an information security (IS) audit to
evaluate the organization’s security processes and risk management. The IT audit process is
typically utilized to asses data integrity, security, development and IT governance.
Technological innovation process: an audit process that creates a risk profile for
current and future projects with a focus on the company’s experience with those
technologies and where it stands in the market
Innovative comparison audit: an audit that looks at an organization’s ability to
innovate compared to competitors and evaluates how well the company produces
new products
Technological position audit: an audit that examines current technology in the
organization and future technologies that will need to be adopted
Systems and applications: an audit process that specifically evaluates whether
systems and applications are controlled, reliable, efficient, secure and effective
Information processing facilities: an audit to evaluate an organization’s ability to
produce applications even in disruptive conditions
Systems development: an audit for verifying that systems that are being developed
are suited for the organization and meet development standards
Management of IT and enterprise architecture: an audit of the IT management’s
organizational structure for information processing
Client, server, telecommunications, intranets and extranets: audits to examine
controls on client-connected servers and networks
IT auditor salary
According to data from the Robert Half Technology 2019 Accounting and Finance Salary
Guide, the average salaries for an IT auditor ranging from entry level to manager are as
follows:
IT auditor skills
The skills you need as an IT auditor will vary depending on your specific role and industry,
but there’s a general set of skills that all IT auditors need to be successful. Some of the most
commonly sought skills for IT auditor candidates include:
https://youtu.be/D-BT5V0WMag
The Certified Information Systems Auditor (CISA) is a certification and a globally recognized
standard for appraising an IT auditor's knowledge, expertise and skill in assessing
vulnerabilities and instituting IT controls in an enterprise environment. Click on the link to
learn more
The Certified Information Systems Auditor (CISA) is a certification and a globally recognized
standard for appraising an IT auditor's knowledge, expertise and skill in assessing
vulnerabilities and instituting IT controls in an enterprise environment.
Implementing an audit strategy for information systems (IS) that is based on risk
management.
Planning audits that can be used to determine whether or not IT assets are protected,
managed and valuable.
Executing the audits in compliance with the organization's set standards and objectives.
Sharing audit results and providing recommendations to management based on the
results.
Performing reexaminations of the audits to ensure the recommended actions have been
performed by management.
A CISA's responsibilities often extend beyond auditing control. They are expected to work with
management to confirm organizational processes, plans for implementation and operation of the
deployed systems, and promote the organization's objectives and strategies.
After systems are implemented, CISAs must continue to monitor various areas to ensure
successful deployment of the systems. This includes conducting project and post-implementation
reviews. Other responsibilities include evaluating:
Finally, a CISA is responsible for working with management. This is to ensure the security
standards, policies, procedures and controls within the organization impart integrity,
confidentiality and availability of information assets.
In order to become CISA certified, applicants must complete the following five steps:
ISACA asks that all CISA applicants complete five years of professional IS auditing,
control, assurance or security work, but substitutions and waivers can be obtained. For example,
one year of IS experience or one year of non-IS auditing can be substituted for one year of
experience. Also, 60 to 120 university semester credit hours -- a two year to four year degree --
can replace one or two years of experience, respectively. Two years as a full-time instructor
within the related field at a university can also replace one year of experience.
Work experience must be within the 10 years prior to a candidate's application submission or
within five years of a passed CISA exam. The candidate must also show adherence to ISACA's
Code of Professional Ethics and Information Systems Auditing Standards. Once these criteria are
met, the candidate can successfully apply for certification.
The CISA exam is open to any individual who expresses an interest in IS auditing, control and
security. It is four hours long and consists of 150 multiple-choice questions set around five job
practice domains:
A score of 450 or higher (scored on a scale of 200 to 800) is required to pass the exam. It can be
taken at any time in testing locations worldwide and remotely online. The exam is offered in
English, Chinese Mandarin Simplified, Chinese Traditional, French, German, Italian, Japanese,
Korean, Spanish and Turkish.
Individuals looking to prepare for the exam can take advantage of preparation materials that are
available through the ISACA. Many ISACA chapters also host CISA exam review courses. It is
recommended that people preparing for the exam take as many practice tests as possible in
addition to studying the ISACA Review Manual and learning to think like an accountant.
Adopting an accountant's mindset is beneficial because most of the people who write the CISA
exam either work as accountants or in the financial services industry. Therefore, by thinking like
an accountant, a test-taker can gain a greater understanding of the questions and answers and the
way they were written.
If a CISA candidate passes the exam, they will be sent the information needed to apply for the
CISA certificate. However, they must first ensure they have met the work experience
requirements.
CISA applicants and certification holders must abide by ISACA's Continuing Professional
Education (CPE) program. This training is to ensure that CISAs stay up to date and proficient in
their fields.
ISACA requires maintenance fees and a minimum of 20 CPE hours annually, plus an additional
120 contact hours during a fixed three-year period.
For more information on how to prepare for the CISA Certification Exam, please watch the
video below
https://youtu.be/JrEhhF5oFJ8
The Philippine legal framework for E-commerce consists of various laws governing retail
trade, consumer protection laws and regulations, i.e., data protection, intellectual
property rights law, most of which were passed years before the growth of the E-
commerce industry but are currently being applied to regulate it
Under the law, E-commerce Act applies to any kind of data message and electronic
document used in the context of commercial and non-commercial activities to include
domestic and international dealings, transactions, arrangements, agreements, contracts and
exchanges and storage of information
https://www.officialgazette.gov.ph/2000/06/14/republic-act-no-8792-s-2000/
IT audit and assurance standards define mandatory requirements for IT auditing. They
report and inform: IT audit and assurance professionals of the minimum level of acceptable
performance required to meet the professional responsibilities set out in the ISACA Code of
Professional Ethics. For more on this topic, kindly click on the link
Standards, Guidelines, Tools and
Techniques
ISACA Member and Certification Holder Compliance
The specialized nature of information technology (IT) audit and assurance and the skills
necessary to perform such engagements require standards that apply specifically to IT audit
and assurance. The development and dissemination of the IT audit and assurance standards
are a cornerstone of the ISACA® professional contribution to the audit community.
IT audit and assurance standards define mandatory requirements for IT auditing. They
report and inform:
ITAF™, 4th Edition (www.isaca.org/itaf) provides a framework for multiple levels of guidance:
General standards (1000 series)—Are the guiding principles under which the IT
assurance profession operates. They apply to the conduct of all assignments and
deal with the IT audit and assurance professional’s ethics, independence, objectivity
and due care as well as knowledge, competency and skill.
Performance standards (1200 series)—Deal with the conduct of the assignment, such
as planning and supervision, scoping, risk and materiality, resource mobilization,
supervision and assignment management, audit and assurance evidence, and the
exercising of professional judgment and due care.
Reporting standards (1400 series)—Address the types of reports, means of
communication and the information communicated.
General
1001 Audit Charter
1002 Organizational Independence
1003 Auditor Objectivity
1004 Reasonable Expectation
1005 Due Professional Care
1006 Proficiency
1007 Assertions
1008 Criteria
Performance
1201 Risk Assessment in Planning
1202 Audit Scheduling
1203 Engagement Planning
1204 Performance and Supervision
1205 Evidence
1206 Using the Work of Other Experts
1207 Irregularities and Illegal Acts
Reporting
1401 Reporting
1402 Follow-up Activities
General
2001 Audit Charter
2002 Organizational Independence
2003 Auditor Objectivity
2004 Reasonable Expectation
2005 Due Professional Care
2006 Proficiency
2007 Assertions
2008 Criteria
Performance
2201 Risk Assessment in Planning
2202 Audit Scheduling
2203 Engagement Planning
2204 Performance and Supervision
2205 Evidence
2206 Using the Work of Other Experts
2207 Irregularities and Illegal Acts
Reporting
2401 Reporting
2402 Follow-up Activities
Ethical Issues
The Code of Ethics states the principles and expectations governing the behavior of
individuals and organizations in the conduct of internal auditing. It describes the
minimum requirements for conduct and behavioral expectations rather than specific
activities. For more on this topic, kindly click on the link
Auditor Ethics
Those who act as auditors must have a high standard of ethics. The term “auditor” is Latin
for someone who hears complaints and makes decisions or acts likea judge.To act as a
judge, a person must be ethical. If the auditor loses favor in this area, it is almost impossible
to regain trust from audit managementand auditees
Examples
If a budget calls for numerous hours and you get the job done efficiently, is it unethical
to put down hours not worked?
Is it unethical to overlook something during the audit because the client says it is
not important?
https://www.iiafiji.org/resources/66eff172-2496-4c51-8025-c2d53d2c3956.pdf
For the complete discussion on the legal and ethical issues for IT Auditors, please click on
the video below
https://youtu.be/i1E2iNvY9fU
Unrecorded Expenses
Another type of accounting fraud takes place when a company does not record its
expenses. The company's net income is overstated, and its costs are understated on
the income statement. This type of accounting fraud creates a false impression of how much
net income a company is receiving. In reality, it may be losing money.
Suppose a company has current assets of $1 million, and its current liabilities are $5 million.
If the company overstates its current assets and understates its current liabilities, it is
misrepresenting its liquidity. The company could state that it has $5 million in current assets
and $500,000 in current liabilities. Then, potential investors will believe that the company
has enough liquid assets to cover all of its liabilities.
The consequences of accounting fraud were severe in the Enron case. Criminal charges were
brought against many of the company's top executives, and some of them were sent to
prison. The scandal also eventually destroyed accounting giant Arthur Andersen LLP, which
handled Enron's books.
It’s not difficult to see why business owners want to understand the mindset behind
employee fraud. Crime insurance can cover losses once they’ve happened, but if owners can
figure out what leads workers to become fraudsters, they can work to prevent the
fraud before it happens.
In the 1970s, criminologist Donald R. Cressey published a model called the “fraud triangle”.
The fraud triangle outlines the three conditions that lead to higher instances of occupational
fraud: motivation, opportunity, and rationalization.
When an employee has a reason for committing fraud, gets a chance to do so without
getting caught, and can come up with a justification for their behavior, they’re more likely to
commit an occupational crime.
Read on to learn more about each condition of the fraud triangle, why they contribute to
fraud, and how you can prevent them from occurring within your workforce.
Who Commits Fraud?
The stereotypical fraud offender looks a lot like any other high-performing, trusted
employee. Nine in ten fraud offenders have no prior history of fraud, and 55% have no
history of any workplace misconduct. In fact, only 13% of fraudsters have so much as a poor
performance evaluation on the record.
It’s circumstances, not personality traits, that lead people to commit fraud. In fact, the
National Association of State Auditors, Comptrollers, and Treasurers claims that most
people could be incentivized to commit fraud under the right circumstances.
This estimate is called the “10-80-10 Rule.” It states that just 10% of people would never
commit fraud for any reason, another 10% of people are actively looking for opportunities
to commit fraud, and the remaining 80% fall somewhere in between.
Members of this middle group aren’t fraudsters by nature, but neither are they steadfast in
their commitment to a life free of crime.
For example, an employee with a stellar ten-year record may suddenly be able to
justify embezzlement after their child is diagnosed with a serious illness that requires
otherwise unaffordable treatments.
Each person has a different set of circumstances—a different combination of fraud triangle
components (motivation, rationalization, and opportunity)—will make fraud feel “worth it.”
By digging into each of the fraud triangle conditions, business owners can work to prevent
them from affecting their employees.
However, the right motivation can tempt otherwise trustworthy employees to consider
cheating their employer.
What one person feels is a valid justification might not be compelling to another. There are
as many different motivations for fraud as there are people in the world, but they can be
sorted into a few main categories:
Demonstrating empathy for your employees will help them see that you care about their
wellbeing and are willing to offer the help and support they need in good times and in bad.
With a supportive employer at their back, workers have far fewer reasons to turn to fraud.
Standardized processes and rigorous oversight procedures are key to keeping your
operations invulnerable to fraud. However, it’s not enough to just put these systems in
place: the opportunity for fraud still exists if security protocols are present but unmonitored,
ineffective, or unenforced.
Particularly when it comes to fraud that relies on cybersecurity access, frequent testing and
adjustments are required to make sure security standards remain effective.
It’s also essential to have a plan for what happens after a violation is detected.
If alerts are allowed to pile up in an unmonitored inbox or if violations aren’t met with real
consequences, employees are more likely to take their chances in hopes that they’ll be able
to fly under the radar in the same way.
Even those who could be incentivized to break the law given the right motivation usually
wouldn’t be willing to do so if it meant they were harming someone else.
But when it comes to defrauding a company, many fraudsters can convince themselves that
theirs is a victimless crime.
An accountant who sees how much their sales department spends entertaining potential
clients may justify skimming a few dollars here and there for themselves.
Or an account lead on a work trip might charge unnecessary extras to their hotel room
because “everyone does it; it’s one of the perks of the job.”
An effective way to prevent these types of rationalizations is to champion transparency
when it comes to company finances.
If you explain to your staff that holiday bonuses depend on the company’s ability to hit a
certain profit margin, employees will have a better understanding of the importance of a
few dollars here and there.
When employees witness the company’s profits being reinvested in its workforce, they’re
more likely to engage emotionally in the success of the team.
If you’re a caring and committed boss, you probably already employ the majority of these
strategies simply because you believe it’s the right way to run your company.
You shouldn’t need the threat of potential fraud to motivate you to spend time with your
employees, champion standards of fairness, and practice open communication and
transparency.
The fact that these things may also keep your company from falling victim to employee
theft is just a bonus.
According to Wolfe and Hermanson (2004), opportunity pushes someone into fraud, while
pressure and motivation (i.e., incentives) push people in that direction. Capability, on the
other hand, permits the individual to see the open doorway as an opportunity and seize it
by passing through it again.
1. Capability
This is the circumstance in which a person possesses the required characteristics, abilities, or
skills to conduct fraud. This is the point at which the fraudster identified the specific
opportunity for fraud and had the means to make it happen. The supporting components of
capability include position, intelligence, ego, coercion, deception, and stress. Due to the
inability to carry it out or cover it up, not every person who has the motive, opportunity, and
realization will be able to perpetrate fraud. When it comes to widespread or persistent
deception, this component is very crucial.
2. Motive or Pressure
The term "perceived pressure" refers to factors that encourage unethical behavior. Every
fraudster experiences some pressure to act unethically. Depending on the pressure, it may
be financial or not. Pressure can be felt in many different ways, particularly when there is a
non-shareable financial need. The most frequent reason for an entity to commit a bad deed
is acknowledged to be financial pressure. More specifically, financial demands on the
fraudster account for around 95% of all fraud cases.
3. Opportunity
The perception of opportunity is the third condition for fraud to take place. A person can
commit organizational fraud when a control or governance system is ineffective and
provides the opportunity. This is referred to as "internal control vulnerabilities" in the
accounting industry. A perceived opportunity has a similar aspect to perceived pressure in
that it is not necessary for the chance to also be actual. However, the perpetrator's
perception and belief provide the opportunity. In general, the lower the risk of detection,
the more likely fraud is to occur.
4. Rationalization
The FDT's fourth component is rationalization. It is stated that before acting unethically, the
offender must develop certain morally acceptable concepts. The justifications and defenses
used to distinguish immoral behavior from criminal activities are referred to as
rationalization. A person is less likely to commit fraud if he/she is unable to defend the
dishonest behavior. Other fraudsters justify their actions by saying things like, "I had to steal
to provide for my family," and "some people did it, why not me?" Since it is hard to
comprehend the mind of a fraud perpetrator, rationalization is tough to detect. Fraudsters
have a certain mindset that enables them to defend or rationalize their fraudulent behavior.
. An auditor should design the audit to provide reasonable assurance of detecting errors
and fraud that are material to the financial statements. For more on this topic, kindly click
on the link
Auditors will enter a much expanded arena of procedures to detect fraud as they implement SAS
no. 99. The new standard aims to have the auditor’s consideration of fraud seamlessly blended
into the audit process and continually updated until the audit’s completion. SAS no. 99 describes
a process in which the auditor (1) gathers information needed to identify risks of material
misstatement due to fraud, (2) assesses these risks after taking into account an evaluation of the
entity’s programs and controls and (3) responds to the results. Under SAS no. 99, you will gather
and consider much more information to assess fraud risks than you have in the past. (For the text
of the new standard, see Official Releases, page 105.)
PROFESSIONAL SKEPTICISM
SAS no. 99 reminds auditors they need to overcome some natural tendencies—such as
overreliance on client representations—and biases and approach the audit with a skeptical
attitude and questioning mind. Also essential: The auditor must set aside past relationships and
not assume that all clients are honest. The new standard provides suggestions on how auditors
can learn how to adopt a more critical, skeptical mind-set on their engagements, particularly
during audit planning and the evaluation of audit evidence.
There are two primary objectives of the brainstorming session. The first is strategic in nature, so
the engagement team will have a good understanding of information that seasoned team
members have about their experiences with the client and how a fraud might be perpetrated and
concealed.
You should note that SAS no. 99 does not This article is adapted from chapter 2 of Fraud
restrict brainstorming to the planning phase Detection in a GAAS Audit—SAS No. 99
of the audit process. Brainstorming can be Implementation Guide by Michael Ramos, which
used in conjunction with any part of the was published by the AICPA concurrent with the
information-gathering process. Auditors issuance of the new fraud standard. This
gather data continuously throughout the nonauthoritative practice aid provides an in-depth,
engagement, so look for opportunities to section-by-section explanation as well as
brainstorm all the way through. Some implementation guidance and practice tips for the
auditors may choose to meet for discussions standard. To order the book (product no. 006613)
again near the conclusion of the audit to by telephone, call the AICPA at 888-777-7077; to
consider the findings and experiences of all order online go to www.CPA2biz.com .
team members and whether the team’s
assessment about and response to the risk of
material misstatement due to fraud were
appropriate.
In addition to brainstorming, SAS no. 99 requires audit team members to communicate with
each other throughout the engagement about the risks of material misstatement due to fraud. In
fact, the standard requires the auditor with final responsibility for the audit to determine whether
there has been appropriate communication among team members throughout the engagement.
Determine a reasonable time limit. Consultants and business owners who participate regularly
in business brainstorming sessions suggest that a good session lasts about an hour. After that, the
energy begins to fade and the law of diminishing returns sets in.
Consider assigning “homework.” The session will be much more productive if all members
have a similar level of understanding about the client, the nature of its business and its current
financial performance. For auditors brainstorming about fraud matters, it may be beneficial to
perform analytical, fact-based research before the session. In structuring your session, it will
help to consider the characteristics of the fraud triangle. For example, you might discuss the
incentives/pressures that may exist at the entity or the opportunities management or employees
have to commit fraud. You also might discuss observations about attitude/rationalization that
may indicate the presence of risk at the company.
Describe the objective of the session in language people can relate to. To help generate
creative, practical ideas, pose questions people can more easily understand, such as the
following:
If you were the bookkeeper for the entity, how could you embezzle funds and not get caught?
If you worked on the loading dock, how could you steal inventory?
If you owned this company, how might you manipulate the financial statements to impress
bankers?
No ideas or questions are dumb. Prejudging questions by labeling them “dumb” is one sure
way to stifle the contribution of ideas.
No one “owns” ideas. When individuals become personally invested in an idea, they tend to
“fight” for it as long as possible. There may be a time and a place for battling over the validity of
an idea, but a brainstorming session is not one of them.
There is no hierarchy. The world of ideas does not recognize rank, experience or
compensation level. Create an environment in which senior team members share information
without dominating the discussion and junior members feel “safe” contributing their own ideas.
Excessive note-taking is not allowed. A brainstorming session is an intuitive, spontaneous
process. Excessive note taking is a barrier to this process.
Management. The new standard lists several items you should ask about that relate to
management’s awareness and understanding of fraud, fraud risks and the steps taken to mitigate
risks. Several of these inquiries were not required under previous standards. Some inquiries are
relatively straightforward, but others may require you to “educate” management about the
characteristics of fraud, the nature of fraud risks and the types of programs and controls that will
deter and detect fraud. The guidance contained in SAS no. 99 provides you with the background
necessary to discuss these matters.
Others. The SAS requires you to make inquiries of the audit committee (even if it is not active),
internal audit personnel (if applicable) and others about the existence or suspicion of fraud and
to inquire as to each individual’s views about the risks of fraud. “Others” can include those
employees who are outside the financial reporting process.
For the most part, auditors tend to restrict their client inquiries to personnel directly involved in
the financial-reporting process. This approach is appropriate for matters of which accounting
personnel have direct knowledge—for example, how transactions are processed or controlled.
However, it is less effective to ask accounting personnel about matters of which they do not have
first-hand knowledge (for example, the procedures used to examine, count and receive items into
inventory). Critics of the audit process frequently cite the auditor’s reluctance to make inquiries
outside of the accounting department as a reason for the lack of the in-depth understanding
necessary to plan and perform an effective and efficient audit. SAS no. 99 is the first standard
that requires auditors to make inquiries of “others within the entity,” such as
Further, you should not restrict your inquiries to senior management. The standard suggests
making inquiries of personnel at various levels within the organization. These are two primary
objectives in making such inquiries.
To obtain first-hand knowledge of fraud. Fraud can happen in any department and at any
level within the organization. Someone in the entity may have observed a person committing or
concealing a fraud. Often, those with knowledge of a fraud have stated, after the fact, that they
would have told someone, “but nobody asked.” SAS no. 99 increases the likelihood that the
auditor will now be that “someone” who asks.
The standard allows you to use considerable judgment in determining to which employees
within the organization you should direct your inquiries and what questions you should ask.
Asking the same question of different people can increase the effectiveness of your inquiries, as
you can compare answers to identify consistencies or anomalies in the responses.
Auditors are cautioned not to think that these fraud risk factors are all-inclusive. In fact, research
has found that auditors who used open-ended questions that encouraged them to develop their
own fraud risk factors outperformed those who relied on a checklist based on looking only for
the illustrated fraud risk factors.
Regarding fraud risk factors relating to attitude/rationalization, you cannot possibly know with
certainty a person’s ethical standards and beliefs. However, during the course of your
engagement, you may become aware of circumstances that indicate the possible presence of an
attitude or ability to rationalize that you consider to be a fraud risk. For example, a recurring
attempt by management to justify marginal, inappropriate accounting on the basis of materiality
and a strained relationship between management and the current or predecessor auditor are fraud
risks relating to fraudulent financial reporting.
SAS no. 99 requires you to consider other information that may be helpful in identifying the
risks of material misstatement due to fraud. This other data can be gleaned during
Once that link between risk identification and audit test design is eliminated, it is not surprising
that the design of audit tests is not effective in helping auditors identify risks
Your goal is to “assess” or to synthesize the identified risks to determine where the entity is most
vulnerable to material misstatement due to fraud, the types of frauds that are most likely to occur
and how those material misstatements are likely to be concealed.
It also helps to consider whether the identified risks are related to either specific accounts or
transactions or to the financial statements as a whole. Once you can link the identified risks to a
specific account (or the financial statements taken as a whole), you then can design and perform
more effective procedures. When assessing information about potential fraud risks, consider the
type, significance, likelihood and pervasiveness of the risk.
Presume improper revenue recognition is a fraud risk. The vast majority of fraudulent
financial reporting schemes involved improper revenue recognition. SAS no. 99 states that you
“should ordinarily” presume there is risk of material misstatement due to fraud relating to
revenue recognition. If you do not identify improper revenue recognition as a risk of material
misstatement due to fraud, you should document the reasons supporting this conclusion.
Always identify the risks of management override of controls as a fraud risk. Those who
have studied fraudulent financial reporting have noted that risk of management override is
unpredictable, and, therefore, it is difficult for auditors to design procedures to identify and
assess it. For that reason, management override always should be addressed in the design of
audit procedures.
Judgments about the risks of material misstatement due to fraud have an overall effect on how
the audit is conducted in the following ways.
Accounting principles. The standard audit report expresses an opinion as to whether the
financial statements “present fairly…in accordance with GAAP.” Some auditors and others
involved in the financial reporting process have questioned whether the “present fairly” criterion
has become subordinate to “in accordance with GAAP.” That is, the issue may be whether some
entities make a case that “since GAAP does not explicitly prohibit a particular accounting
treatment, it must be acceptable” without considering whether the accounting will result in a
“fair presentation” of the financial position, results of operations and cash flows.
Thus, the choice of accounting principles, in addition to their application, becomes crucial
for auditors to consider. SAS no. 99 requires you to consider management’s selection and
application of significant accounting principles as part of your overall response to the risks
of material misstatement.
The new standard focuses your attention on accounting principles related to subjective
measurements and complex transactions. In addition, given the presumption of revenue
recognition as a fraud risk, you should consider the integrity of the entity’s policies on
revenue recognition and whether these policies are consistent with key revenue-recognition
concepts such as the completion of the earnings process, the realization of sales proceeds
and the delivery of the product or service.
Testing journal entries and other adjustments. Your assessment of the risk of material
misstatement due to fraud, together with your evaluation of the effectiveness of controls,
will determine the extent of your tests. SAS no. 99 requires that you inspect the general
ledger to identify journal entries to be tested and examine the support for those items.
Thus, the choice of accounting principles, in addition to their application, becomes crucial
for auditors to consider. SAS no. 99 requires you to consider management’s selection and
application of significant accounting principles as part of your overall response to the risks
of material misstatement.
The new standard focuses your attention on accounting principles related to subjective
measurements and complex transactions. In addition, given the presumption of revenue
recognition as a fraud risk, you should consider the integrity of the entity’s policies on
revenue recognition and whether these policies are consistent with key revenue-recognition
concepts such as the completion of the earnings process, the realization of sales proceeds
and the delivery of the product or service.
Discuss the matter and the approach for further investigation with an appropriate level of
management that is at least one level above those involved and with senior management
and the audit committee.
SAS no. 99 provides guidance on the auditor’s course of action when the risk of material
misstatement due to fraud is such that he or she is considering withdrawing from the
engagement. It is impossible to definitively describe when withdrawal is appropriate, but in
any event you probably will want to consult with your legal counsel.
COMMUNICATIONS
SAS no. 99 says, “Whenever you have
determined that there is evidence that a
fraud may exist, that matter should be
brought to the attention of the proper
level of management. This is
appropriate even if the matter might be
considered inconsequential, such as a
minor defalcation by an employee at a
low level in the entity’s organization.”
Thus, the threshold for communication
is “evidence that a fraud may exist.” The
mere presence of a fraud risk factor or
some other condition that has been
observed when fraud is present
generally does not meet this threshold.
DOCUMENTATION
The documentation requirements of SAS no. 99 significantly extend those of the previous
standard, requiring documentation supporting compliance with substantially all the major
requirements of the standard. SAS no. 99 provides a complete, easy-to-understand list of
documentation requirements.
The procedures performed to obtain information necessary to identify and assess the risks
of material misstatement due to fraud.
Specific risks of material misstatement due to fraud that were identified and a description
of the auditor’s response to those risks.
If the auditor has not identified improper revenue recognition as a risk of material
misstatement due to fraud in a particular circumstance, the reasons supporting that
conclusion.
The results of the procedures performed to further address the risk of management
override of controls.
Conditions and analytical relationships that caused the auditor to believe additional
auditing procedures or other responses were required and any further responses the auditor
concluded were appropriate to address such risks or other conditions.
The nature of the communications about fraud made to management, the audit
committee and others
For the complete lecture on Auditor's responsibility for detecting fraud, please watch the
video below
https://youtu.be/ybi4EZ-zrKs
For information on fraud detection techniques, please watch the video below
https://youtu.be/yZguNBE6FFQ
Midterm Period
The Ideal Structure for an IT Department in a Growing Business
The modern ecosystem of global SMEs, as well as larger enterprises, is one that heavily
relies on its Information Technology (IT) Infrastructure in order to increase internal
operations and optimize corporate products and services. Therefore, there should be an
ideal structure for an It Department in a growing business. Click on the link to learn more
The Ideal IT Department Structure to Facilitate
Business Growth
The modern ecosystem of global SMEs, as well as larger enterprises, is one that heavily
relies on its Information Technology (IT) Infrastructure in order to increase internal
operations and optimize corporate products and services. Businesses of every industry
typically have six basic, internal, functional operations:
IT systems and services can be leveraged in order to greatly increase all of the core business
functions, such that an enterprise’s efficiency, communications, and productivity can be
optimized using a variety of IT systems, all of which can increase both the bottom and top
lines of the business. It is crucial, however, that an IT department be scalable to a company’s
current growth, and to its projected/future growth, thus allowing the company to grow
efficiently.
There is a great deal of strategic planning that must be undertaken in order to efficiently
define the ideal structure of any given company’s IT department. As with any company
department, the ideal structure of the IT department should be one that facilitates company
growth, increases profits, and optimizes internal operations. In order for such an ideal
structure to be realized, company executives should determine the aspects associated with
the utilization of the IT infrastructure, including:
The planning of a company’s IT departmental structure must also take into account the
differing organizational models associated with a business organization’s departments,
which includes a matrix organizational model (project and functional-based), functional
organizational model (departments based on fulfilling distinct processes that are associated
with a specified area of expertise), product organizational structure (departments defined by
a specific product-line), customer organizational structure (structure based on customer
buyer-personas), geographic organizational structure (regional-based), etc
https://pingboard.com/blog/types-business-organizational-structures/.
The size of an organization, along with the management model and the structure of its
departments, plays a crucial role in how effective communications within the company will
be. Thus, the strategic plan associated with defining the structure of any given department
in an enterprise – including the IT department – must take into account the growth and
natural changes associated with a scalable IT infrastructure within an ever-changing
enterprise.
Businesses do not operate as static entities, but operate as dynamic organizations that must
have flexible strategic plans and strategies that are meant to scale with the changing needs
of the organization. Additionally, the business model, products/services, departments,
demographics, IT systems/technology, etc. may all change over time as the business grows,
along with a presumed increase in the number of personnel within the organization over
time. Thus, both an IT strategic plan, and the blueprint of the departmental structures, must
remain flexible and should include proposed tweaks to the blueprint due to projected
growth rates in order to allow the IT department (and all departments within the enterprise)
to continue to meet the goals of the organization.
The ideal structure of a company’s IT department should include certain standard teams and
organizational characteristics, including a support/tech department, IT management
(including a bimodal IT management model), enterprise architecture, IT maintenance,
network/system administration, IT security, etc.
Often the best approach is to use a centralized IT organizational model with strong
departmental relationships and focused goals, which includes using dedicated resources for
specific areas (that are managed centrally). This approach provides the control and
efficiency of a centralized organizational model, while also providing departments/business
units with a strong influence over the priorities for their respective areas.
For instance, there are several IT roles that are traditionally fulfilled by internal staff, and
several roles that are commonly fulfilled by outsourced staff – however, in today’s global IT
ecosystem, there is no clear-cut rule for separating internal staff from outsourced staff.
Utilizing the most cost-effective, robust IT resources is key for any growing business, and
thus both efficiency (including operational productivity) and overhead (including internal
staff training costs) must be taken into account when deciding to use outsourced staff
versus hiring internal staff.
While it is possible for businesses to save over 15-20 percent in costs by outsourcing
specific tasks to trained professionals, there are times when it is more advantageous to
utilize in-house staff, such as for tasks associated with automation, and tasks that are
consistent and routine. Using outsourced staff, however, may help to save more money and
resources with regard to specific, highly-skilled, non-routine business tasks. Here are some
IT roles that are often outsourced to skilled professionals:
Support Desk
Network Administrator
Software Developer
Software Tester
Engineer
Security Analyst
Systems/Database Engineer
With a comprehensive IT strategic plan, it is possible for executives to craft the perfect IT
departmental structure based on the determinations associated with the enterprise using
internal IT staff versus outsourced IT staff.
Though the ideal structure of an organization’s IT department can vary according to the
goals of the enterprise, there are standard functions and roles/teams that every IT
department should have within its superstructure.
All IT departments require personnel that are trained and focused on providing technical
support to all departments in the event of technical failures and IT issues. An optimal service
desk is one that is focused on problem-solving, and has the ability to quickly and efficiently
fix issues as they arise, including providing maintenance to IT systems, and helping to
prevent future technical problems.
The four core operations carried out by managers are planning, organizing, leading, and
controlling. Within that scope, IT governance requires program/project managers, vendor
managers, and IT financial analysts. Within an IT infrastructure, services and projects are
based on the specific components of said IT infrastructure. Typically, an IT infrastructure is
composed of hardware systems, enterprise systems, software systems, network systems, and
database systems.
Enterprise Architecture
In the initial stages of an enterprise’s development, and as a business grows, the dynamic
nature of workplace operations translates to a requirement for constant maintenance of IT
systems, along with the initial planning, installation, testing, and deployment of IT
components. Maintenance workflows may include simple technical fixes, or large system
upgrades, along with security patches, updates, and recovery operations.
The development and evolution of very specific, functional departments within enterprises
has often given rise to departmental silos, which sometimes operate as completely separate,
distinct micro-organizations within a business that may or may not effectively communicate
and/or work together. In order for modern businesses to continue to offer value in an
increasingly technology-dominated world, business departments have sought to integrate
different departmental workflows in order to increase communications, productivity and
operational efficiency.
One significant example is with DevOps, which integrates software development practices
with automated testing and IT production operations. Essentially, DevOps combines
workflows – and consequently departmental operations – from the software development
lifecycle (SDLC) and IT operations (including testing and security) in order to deliver
products in a more efficient manner, while breaking down the barriers of departmental silos
within software development firms.
Application Management is a critical function within any IT department, and includes both
Software Development – and the optimal management of an application’s Software
Development Life Cycle (SDLC) – and the patching, updating and maintenance of all
operational business applications within an enterprise. Application management is
necessary in order to ensure that all back-end IT software systems (applications) operate at
peak performance.
Information Security
Every IT department should include a skilled, trained team of cybersecurity analysts,
engineers, and security testers, to ensure that all attack surfaces are covered, and that the
security posture of the hardware, software and networking IT infrastructure is solid. In an
age of increasing data breaches, having security specialists to conduct passive and active
vulnerability scans/penetration tests, is an important step in maintaining data security, while
the installation of security controls (e.g. Unified Threat Management, Web Application
Firewalls, Intrusion Detection Systems, Next-Generation Firewalls, etc.) and the routine
completion of security analyses (e.g. threat modeling, security scanning, security
administration, malware analysis, secure database management/encryption of private data,
etc.) are critical.
These steps not only help to protect a company’s customers, but also ensures due diligence
to protect the company since many U.S. legislations and compliance standards – such as
Sarbanes-Oxley, HIPAA, PCI-DSS – require due diligence on the part of companies to ensure
complete data security. Additionally, having adequate security management – in the form of
a Chief Information Security Officer (CISO) – is an important step to ensure that all IT
security operations are carried out effectively.
The IT Infrastructure Library (ITIL) Provides Some Tried and Tested Approaches
ITIL offers a comprehensive guide to best practices associated with the establishment of an
optimal IT department, and the effective execution of IT departmental operations. The ITIL
framework offers five core processes that can be used to align all business goals with the IT
infrastructure, and by extension, the overarching structure of the IT department:
Service Strategy: Aligning the critical business goals/model with the components and
services of the enterprise’s IT infrastructure.
Service Design: The IT services that the IT systems offer in order to support the
business’s operations.
Service Transition: The transition from a planning/developmental phase to an
operational/management phase.
Service Operation: Operating all services according to the service-level agreements in
place.
Continual Service Improvement: Analyzing and offering improvements for each
service in order to increase service quality.
Data Center
At its simplest, a data center is a physical facility that organizations use to house their critical
applications and data. To learn more about, click on the link
Modern data centers are very different than they were just a short time ago. Infrastructure
has shifted from traditional on-premises physical servers to virtual networks that support
applications and workloads across pools of physical infrastructure and into a multicloud
environment.
In this era, data exists and is connected across multiple data centers, the edge, and public
and private clouds. The data center must be able to communicate across these multiple
sites, both on-premises and in the cloud. Even the public cloud is a collection of data
centers. When applications are hosted in the cloud, they are using data center resources
from the cloud provider.
Data center design includes routers, switches, firewalls, storage systems, servers, and
application delivery controllers. Because these components store and manage business-
critical data and applications, data center security is critical in data center design. Together,
they provide:
Network infrastructure. This connects servers (physical and virtualized), data center
services, storage, and external connectivity to end-user locations.
Storage infrastructure. Data is the fuel of the modern data center. Storage systems are
used to hold this valuable commodity.
Computing resources. Applications are the engines of a data center. These servers provide
the processing, memory, local storage, and network connectivity that drive applications.
Data center services are typically deployed to protect the performance and integrity of the
core data center components.
Network security appliances. These include firewall and intrusion protection to safeguard
the data center.
Data center components require significant infrastructure to support the center's hardware
and software. These include power subsystems, uninterruptible power supplies (UPS),
ventilation, cooling systems, fire suppression, backup generators, and connections to
external networks.
The most widely adopted standard for data center design and data center infrastructure is
ANSI/TIA-942. It includes standards for ANSI/TIA-942-ready certification, which ensures
compliance with one of four categories of data center tiers rated for levels of redundancy
and fault tolerance.
Tier 1: Basic site infrastructure. A Tier 1 data center offers limited protection against
physical events. It has single-capacity components and a single, nonredundant distribution
path.
Tier 3: Concurrently maintainable site infrastructure. This data center protects against
virtually all physical events, providing redundant-capacity components and multiple
independent distribution paths. Each component can be removed or replaced without
disrupting services to end users.
Tier 4: Fault-tolerant site infrastructure. This data center provides the highest levels of
fault tolerance and redundancy. Redundant-capacity components and multiple
independent distribution paths enable concurrent maintainability and one fault
anywhere in the installation without causing downtime.
These are built, owned, and operated by companies and are optimized for their end users.
Most often they are housed on the corporate campus.
In colocation ("colo") data centers, a company rents space within a data center owned by
others and located off company premises. The colocation data center hosts the
infrastructure: building, cooling, bandwidth, security, etc., while the company provides and
manages the components, including servers, storage, and firewalls.
Cloud data centers
In this off-premises form of data center, data and applications are hosted by a cloud
services provider such as Amazon Web Services (AWS), Microsoft (Azure), or IBM Cloud or
other public cloud provider.
Discover more about data centers and what the future will bring to them and your network.
The first wave saw the shift from proprietary mainframes to x86-based servers, based
on-premises and managed by internal IT teams.
A second wave saw widespread virtualisation of the infrastructure that supported
applications. This allowed for improved use of resources and mobility of workloads
across pools of physical infrastructure.
The third wave finds us in the present, where we are seeing the move to cloud,
hybrid cloud and cloud-native. The latter describes applications born in the cloud.
Organizations can choose to build and maintain their own hybrid cloud data centers, lease
space within colocation facilities (colos), consume shared compute and storage services, or
use public cloud-based services. The net effect is that applications today no longer reside in
just one place. They operate in multiple public and private clouds, managed offerings, and
traditional environments. In this multicloud era, the data center has become vast and
complex, geared to drive the ultimate user experience.
What Is IT Outsourcing?
IT outsourcing is the business practice of using external providers to handle information
technology functions, i.e. software development, infrastructure solutions, software support.
Popular reasons to outsource being access to better skills, price to quality ratio, ease of upscaling.
Companies also often outsource data storage because it is cheaper to contract a third party than to
buy and maintain their own data storage devices and facilities.
5 Main Advantages of Outsourcing
1. Reduced Expenses
2. Access to Global Talent Pool
3. Significant Time Savings
4. Ability to Upscale Fast
5. Uninterrupted workflow
Reduced Expenses
You get to enjoy significant cost savings when you outsource to a country with lower
production costs: a lower cost of living for employees, meaning lower salaries, as well as
lower infrastructure and operational costs.
Outsourcing allows you to reach professionals that may be in short supply or unavailable
locally.
You’ll be able to work with new clients and take on new projects without having to spend
time on the processes described above.
Uninterrupted workflow
Your business will function round the clock thanks to the time difference between the in-
house team and the outsourcing vendor’s team.
Time Difference
This can be a curse as much as a blessing, and in the worst cases it can significantly hamper
the communication flow between you and your outsourcing partner
Language Barriers
The language barriers can result in miscommunication and wasted effort unless you and the
vendor you partner with have at least one language in common.
Different Work habits can be the result of different cultural environments, can interrupt your
established workflow, and will definitely need getting used to.
Long Distances
Extremely long distances between you and the outsourcing vendor can turn business trips
into an expensive and tiresome experience.
1. To Reduce Cost
More often than not, outsourcing means saving money. This is often due to lower labor
costs, cheaper infrastructure, or an advantageous tax system in the outsourcing location.
Resources that are scarce at home can sometimes be found in abundance elsewhere,
meaning you can easily reach them through outsourcing.
By delegating some of your business processes to a third party, you’ll give your in-house
employees the opportunity to focus on more meaningful tasks.
When you stop wasting time on mundane, time-consuming processes, you’ll be able to
move forward with your core offering a lot faster.
5. Globalization
https://youtu.be/hkjBhwWgZAs
Auditing in an operating System
Overview
The operating system is the computer’s control program. It allows users and their
applications to share and access common computer resources, such as processors, main
memory, databases, and printers. If operating system integrity is compromised, controls
within individual accounting applications may also be circumvented or neutralized. Because
the operating system is common to all users, the larger the computer facility, the greater the
scale of potential damage. Thus, with an ever-expanding user community sharing more and
more computer resources, operating system security becomes an important internal control
issue.
First, it translates high-level languages, such as COBOL, C++, BASIC, and SQL, into the
machine-level language that the computer can execute. The language translator modules of
the operating system are called compilers and interpreters.
Second, the operating system allocates computer resources to users, workgroups, and
applications. This includes assigning memory work space (partitions) to applications and
authorizing access to terminals, telecommunications links, databases, and printers.
Third, the operating system manages the tasks of job scheduling and multiprogramming. At
any point, numerous user applications (jobs) are seeking access to the computer resources
under the control of the operating system. Jobs are submitted to the system in three ways:
(1) directly by the system operator, (2) from various batch-job queues, and (3) through
telecommunications links from remote workstations. To achieve efficient and effective use
of finite computer resources, the operating system must schedule job processing according
to established priorities and balance the use of resources among the competing
applications.
The operating system must protect itself from users. The operating system must protect
users from each other. The operating system must protect users from themselves. The
operating system must be protected from itself.The operating system must be protected
from its environment.
Overview Operating system security involves policies, procedures, and controls that
determine who can access the operating system, which resources (files, programs, printers)
they can use, and what actions they can take. The following security components are found
in secure operating systems: log-on procedure, access token, access control list, and
discretionary access privileges.
Log-on Procedure
A formal log-on procedure is the operating system’s first line of defense against
unauthorized access. When the user initiates the process, he or she is presented with a
dialog box requesting the user’s ID and password. The system compares the ID and
password to a database of valid users.
Access Token
If the log-on attempt is successful, the operating system creates an access token that
contains key information about the user, including user ID, password, user group, and
privileges granted to the user. The information in the access token is used to approve all
actions the user attempts during the session.
Access Control
ListAn access control list is assigned to each IT resource (computer directory, data file,
program, or printer), which controls access to the resources. These lists contain information
that defines the access privileges for all valid users of the resource. When a user attempts to
access a resource, the system compares his or her ID and privileges contained in the access
token with those contained in the access control list. If there is a match, the user is granted
access.
OverviewOperating system control objectives may not be achieved because of flaws in the
operating system that are exploited either accidentally or intentionally. Accidental threats
include hardware failures that cause the operating system to crash. Errors in user application
programs, which the operating system cannot interpret, also cause operating system
failures.
Sources of Exposures2. Individuals, both internal and external to the organization, who
browse the operating system to identify and exploit security flaws.
Overview
Password ControlA password is a secret code the user enters to gain access to systems,
applications, data files, or a network server. If the user cannot provide the correct password,
the operating system should deny access. Although passwords can provide a degree of
security, when imposed on nonsecurity-minded users, password procedures can result in
end-user behavior that actually circumvents security.
Password ControlThe most common method of password control is the reusable password.
The user defines the password to the system once and then reuses it to gain future access.
The quality of the security that a reusable password provides depends on the quality of the
password itself. If the password pertains to something personal about the user, such as a
child’s name, pet’s name, birth date, or hair color, a computer criminal can often deduce it.
Password ControlTo improve access control, management should require that passwords be
changed regularly and disallow weak passwords. Software is available that automatically
scans password files and notifies users that their passwords have expired and need to be
changed.
For more on auditing operating systems, please see the video below
https://youtu.be/Ovlbh_2z1ho
Semi-Final Period
Auditing electronic data interchange (edi)
EDI is the electronic exchange of business transactions, in a standard format, from one
entity's computer to another entity's computer through an electronic communications
network. For more on this lesson, kindly click on the link
https://egrove.olemiss.edu/cgi/viewcontent.cgi?article=1035&context=aicpa_guides
Auditing of the Software of Computer Accounting System
When auditing a computerized accounting system, the independent auditor should have a
general familiarity with the effects of the use of information technology on the various
characteristics of accounting control. For more on this topic, kindly click on the link
The corporate world is getting more and more inclined towards the use of information
technology (IT) and computer information system (CIS) in their daily operation for the
purpose of processing of data, as well as decision making, and control of business
organizations. Computers are now used in banks, hospitals, schools, home etc to keep
records and to perform other operations. Every company adopt the accounting system
method of recording of transaction, because it is generally required that companies have to
reveal certain financial and management information to the government and public users;
and also because accounting is an indispensable tool in business decision making –process
[Expert tutors and first class online study resources,2014]. With the development of
information technologies, there were also developed computer products, such as software
that make accounting easy for users of accounting information [Drew Nelson, 2012]. In the
very limited field related to accounting matter alone, computer is used in tax collection,
financial operation, insurance operation, inventory control, construction, cost estimation
among others.
This sudden change in the development of various organizations led to the change in the
nature of audit evidence generated by each financial transaction [Drew Nelson. (2012].
Auditing is important in an organization that have a computerized accounting system in
order to satisfy the owners of the business (shareholders) that the financial statement
presented to them is correct (present a true and fair view). Therefore, it is the external
auditor that is required to carry out this duty of examining the transactions and reporting
their findings to the shareholders and the public. Companies need to also satisfy themselves
that financial statement is correct, before they can use them to make decisions. They
therefore, employ auditor as a staff of the organization (internal auditor) who perform
independent appraisal function established within an organization as a service to the
organization with the objective of assisting members of the organization in the effective
discharge of their obligations. The auditor is therefore required to possess reasonable
knowledge of various hardware and software used in the organization in order to audit a
computerized accounting system. The last few years have been an exciting time in the world
of IT auditing as a result of the accounting scandals and increased regulations
https://ceur-ws.org/Vol-2104/paper_181.pdf
PAPS 1013 (Electronic Commerce – Effect on the Audit of Financial Statements
Philippine Auditing Practice Statements (PAPS or Statements) are issued by the Auditing
Standards and Practices Council (ASPC) to provide practical assistance to auditors in
implementing the Philippine Standards on Auditing (PSAs) or to promote good practice.
Statements do not have the authority of PSAs. For more on this, please click on the link
Philippine Auditing Practice Statements (PAPS or Statements) are issued by the Auditing
Standards and Practices Council (ASPC) to provide practical assistance to auditors in
implementing the Philippine Standards on Auditing (PSAs) or to promote good practice.
Statements do not have the authority of PSAs. For more on this, please click on the link
below
https://aasc.org.ph/downloads/PAPS/publications/PDFs/PAPS-1013.pdf
Final Period
Data Management Approaches
In this article, I am going to discuss the different approaches to Data Management. Basically,
what we will discuss is, how we store data in earlier days and what problems we face, and
how we overcome those problems using the Database approach. Please click on the link for
more
Data Management:
In everyday life, we come across data. Data is the raw fact. Every day in our work or
profession we gain data. We collect information. But what is the difference between data
and information? We will make you learn about data.
Data:
Basically, all the facts about things are termed Data. We always deal with data. All the details
around us are termed as data, like name, phone no, address. So, in simple words, we can say
that it is a Raw Fact i.e. Characters, Numbers, special characters. For Example, Empid is data,
Ename is data, Salary is data, DOJ is data, etc.
Data is never giving accurate or meaningful statements or information to users. For
example, From the above data, we cannot say that whether Warner is the name of an
employee, or name of a customer, or the name of a Product because Warner is simply data.
Information:
Among all, the meaningful data is called Information. We fetch only the information from all
the facts. So, in simple words, we can say that processing the data or raw facts is called
information. And the information will provide meaningful statements.
Managing data is always a factor in our daily life events. We do different kinds of activities
according to requirements. Some areas like data modeling, data mining, data integration,
data governance, master data management, etc.
1. Data modeling: In this concept data are being designed through the different
models, the relationship between the data and other details are portrayed through
this concept.
2. Data Mining: It is used for transforming raw data into information. It has wide use in
Industries. It is a major concept for handling data.
3. Data integration: It combines different data from different sources and also
analyzes those data for the processing of information.
4. Data governance: Data handling policies are made under this concept; it also
confirms data fetching consistency and other related issues.
There is another term called data quality management, for fixing errors and other issues of
data.
In the file management system, data can be stored in files with help of the Operating
System. In the conventional method, data were being stored in files. Also, the fetching of
data and modification of data is done with this file. Moreover, the files contain information
with all other records.
Earlier in any enterprise, data fetching was a big issue. For every incident, one had to go
through all the records. These records were being kept in files. A file is a collection of data.
The system of maintenance and managing the files is called a file system. This was to create
and manage all the data. The conventional file system was an important part of any
enterprise.
In a File-based system, every data is stored in the form of a file. The earlier system to the
database was file-based systems. Previously database is using a file-based system. In this, a
large number of files are needed to perform various tasks so, each and every data is stored
in the form of a file only. Group of files used for storing data of an organization here
different files are used to store a data of an organization. So multiple files will be used like
file 1, file 2, file 3, ———- file n. for example, in an organization 1 st file is for employee
information 2nd file is for employee personal details 3 rd file is for employee company related
details, and so on. Each and every file is used to store different types of information. Here
each file is independent of another file. One single file is called a Flat File. Each file
contained and processed information for one specific task. All these files are designed by
using C/C++ language. So, if you stored the information, complete information will be in
the form of files then what are the drawbacks we’ll see.
What is a File?
A file is a collection of related data stored in memory. Each file is used to store different
information. Here each file is independent of another file. One single file is called a Flat File.
Data Retrieval:
If you want to retrieve data from flat files then we must develop an application program in
high-level languages whereas if you want to retrieve data from a database then we are
using SQL language. For example, to retrieve data from flat files, we need to develop an
application program by using HLL such as C, C++, Java, .Net, etc.
To retrieve data from Database, we use SQL queries such as Select * from <table name>;
These problems come into the picture when we store data in multiple files where the
changes are made in one file will not be reflected in another copy of the file. So, Data
Redundancy means duplicate data/information i.e. we can store the same information in
multiple files and Data Inconsistency means data confusion.
But in the case of a database, we can maintain a number of copies of the same data, and
still, the changes made in one copy will be reflected in another copy because internally
maintain acid properties by default in the database.
Data Redundancy:
Data redundancy means duplication of data values i.e.; the same information is duplicated in
several files. This makes the data redundant; the same information appears in different files
in different ways. If we maintain duplication then it means wastage of time, wastage of
money, and storage space also. So, in your DBMS main drawback is redundancy.
Data Inconsistency:
Data Inconsistency means different copies of the same data are not matching. For Ex, in 1
file employee A’s phone no. is 9764734221 and in another file that employee A’s same
phone number is having a different meaning (i.e., phone number is saved as an ID number).
So, different copies of the same data are not matching, that is nothing but a data
inconsistency. Same basic data existing in different files with different meanings then you
can say that is a data inconsistency. Example: Phone no. of the customer is different at
different files.
Data Isolation:
Data isolation means data is scattered in different files, and files in different formats, writing
a new application program to retrieve data is difficult. Each and every file is formatting in a
different way then retrieving information from these files is very difficult that is nothing but
data isolation.
Data Integrity:
Data integrity means data values may need to satisfy some integrity constraints. For
example, if you are maintaining some bank database so balance is one attribute so bank
balance values, suppose it is maintaining some integrity constraints like each and every
customer should have the 1000/- rs. Minimum balance so here bank balance value should
be 1000/- rs. Minimum, this is nothing but the integrity constraints.
Example: If you want to fill some application form here age should be like 18 yrs. this is
nothing but is some integrity constraints. So, each and every data value must satisfy some
integrity constraints.
In the file-based approach to handling the above condition, we need to go through the
program code whereas in the database approach we can declare integrity constraint along
with the definition whereas in your file-based approach if you maintain some integrity
constraint you need to write the programming code. In this database approach just simply,
you can mention the integrity constraint along with the query language.
Data Atomicity:
It is difficult to ensure atomicity in the file processing system. For example, two accounts are
their A and B both are the customers, A and B both are having accounts and A wants to
transfer 100/- rs. to B so here from A’s account 100/- rs. is deducted but it is not credited in
the B’s account due to some failure, so that is nothing but atomicity.
If multiple users are updating the same data simultaneously, it will result in an inconsistent
data state. In a file processing system, it is very difficult to handle using programming code.
Security:
Enforcing security constraints in a file processing system is very difficult. For example, in the
banking system, payroll personal need only the part of the database that has information
about various bank employees. They don’t need access to information about customer
account. If you see in the bank if anybody asks the payroll information then like customer
name, customer age, customer address, customer bank balance every information will be
there so if I asked my details, I should see only my details if another person details, I am
able to see then it is not maintaining security.
Data is never secure under books and flat-file whereas databases are providing an excellent
concept is called a role-based security mechanism for accessing data from databases in a
secure manner with the help of authentication and authorization.
Data Indexing:
Indexes are used for accessing data much faster but flat files do not provide any index
mechanism whereas databases will provide an indexing mechanism. To access the required
data from a location fastly indexing are used. The file is not supporting indexes.
Considering all the above factors, there a need was created for better management of data.
The situation demanded proper management of data. At this point of time, a new
technology was introduced i.e. Database.
Storing data to a database, fetch from it, and updating the database is the main aim for
more accuracy of data. The management system of this database is called a database
management system. DBMS removes the main constraint for handling data. It provides data
integrity, data consistency. Redundant data was also removed from it. It allows users to have
a hassle-free process for data fetching.
Database:
Types of Databases:
OLAP: It is used for data analysis (or) data summarized (or) history of data of particular
business. Example: Datawarehouse.
DBMS:
It is the software that is used to manage & maintain data/information in the database. By
using DBMS, we can create new databases, new tables, insert, update, delete and select the
data from the database.
Minimal Data Redundancy: Data redundancy exists when the same data are stored
unnecessarily at different places. The database approach does not eliminate redundancy
completely, but it provides the facilities to the designer to carefully control the amount of
redundancy.
Improved Data Consistency: If the amount of data redundancy is controlled, it will reduce
the data inconsistency also. It is also highly recommended to maintain the same version of
data at all locations.
Improved Quality: The database approach provides an optimum number of tools &
processes to improve data quality. Every data designer can specify a rule called integrity
constraints which users can’t violate.
The main motto of the database is to maintain the ACID Property of the database. What
does really ACID mean?
1. ‘A’ stands for Atomicity. All the data in the database is to be Atom in nature. Any
kind of data redundancy is not acceptable in any condition. Duplicate data are to be
removed from the database.
2. ‘C’ stands for consistency. Any kind of inconsistency of data may lead to failure. so
all the inconsistent data are to be removed from the database.
3. ‘I’ stands for Integrity. Data are to be integrated in order to manage the stability of
the database.
4. The last part of the database is Durability. The effect of the change is made in the
Database is to be sustained in terms of results. A durable result is desired to be
found in the database.
Effectively managing the organization’s data resources requires much more than simply
selecting a logical database model. The database is an organizational discipline, a method,
not just a tool or technology. It requires organizational and conceptual change.
Management commitment and understanding are essential.
Opportunities
Firms have become acutely aware of how much organizational performance can be
improved by making better use of their data, as the examples in this chapter and other
chapters of the text so clearly illustrate. This is why so many companies are investing in data
mining and customer relationship management technology.
Management Challenges
It has been very difficult for organizations to manage their data effectively. A true database
environment requires an organization to change the way it defines and uses data and
typically represents a very large investment.
COST/BENEFIT CONSIDERATIONS
Designing a database to serve the enterprise can be a lengthy and costly process. In
addition to the cost of DBMS software, related hardware, and data modeling, organizations
should anticipate heavy expenditures for integrating, merging, and standardizing data from
different systems and functional areas. Despite the clear advantages of the DBMS, the short-
term costs of developing a DBMS often appear to be as great as the benefits. It may take
time for the database to provide value.
Return to Top
Solution Guidelines
The critical elements for creating a database environment are (1) data administration, (2)
data-planning and modeling methodology, (3) database technology and management, and
(4) users. This environment is depicted in Figure 7-18.
FIGURE 7-18 Key organizational elements in the database environment
For a database management system to flourish in any organization, data administration
functions and data-planning and modeling methodologies must be coordinated with
database technology and management. Resources must be devoted to train end users to
use databases properly.
DATA ADMINISTRATION
Database systems require that the organization recognize the strategic role of information
and begin actively to manage and plan for information as a corporate resource. This means
that the organization must develop a data administration function with the power to define
information requirements for the entire company and with direct access to senior
management. The chief information officer (CIO) or vice president of information becomes
the primary advocate in the organization for database systems.
Data administration is responsible for the specific policies and procedures through
which data can be managed as an organizational resource. These responsibilities include
developing information policy, planning for data, overseeing logical database design and
data dictionary development, and monitoring how information systems specialists and end-
user groups use data.
The fundamental principle of data administration is that all data are the property of
the organization as a whole. Data cannot belong exclusively to any one business area or
organizational unit. All data should be available to any group that requires them to fulfill its
mission. An organization needs to formulate an information policy that specifies its rules for
sharing, disseminating, acquiring, standardizing, classifying, and inventorying information
throughout the organization. Information policy lays out specific procedures and
accountabilities, specifying which organizational units share information, where information
can be distributed, and who is responsible for updating and maintaining the information.
Although data administration is a very important organizational function, it has proved very
challenging to implement.
The organizational interests served by the DBMS are much broader than those in the
traditional file environment; therefore, the organization requires enterprise-wide planning
for data. Enterprise analysis, which addresses the information requirements of the entire
organization (as opposed to the requirements of individual applications), is needed to
develop databases. The purpose of enterprise analysis is to identify the key entities,
attributes, and relationships that constitute the organization’s data. These techniques are
described in greater detail in Chapter 14.
Databases require new software and a new staff specially trained in DBMS techniques, as
well as new data management structures. Most corporations develop a database design and
management group within the corporate information systems division that is responsible for
defining and organizing the structure and content of the database and maintaining the
database. In close cooperation with users, the design group establishes the physical
database, the logical relations among elements, and the access rules and procedures. The
functions it performs are called database administration.
distributed database
A distributed database is a database that consists of two or more files located in different
sites either on the same network or on entirely different networks. Portions of the database
are stored in multiple physical locations and processing is distributed among multiple
database nodes.
By contrast, a centralized database consists of a single database file located at one site
using a single network.
When in a collection, distributed databases are logically interrelated with each other, and
they often represent a single logical database. With distributed databases, data is physically
stored across multiple sites and independently managed. The processors on each site are
connected by a network, and they don't have any multiprocessing configuration.
5 ways
centralized databases differ from distributed databases
A common misconception is that a distributed database is a loosely connected file system.
In reality, it's much more complicated than that. Distributed databases incorporate
transaction processing, but are not synonymous with transaction processing systems.
Location independent
Distributed query processing
Distributed transaction management
Hardware independent
Operating system independent
Network independent
Transaction transparency
DBMS independent
In a homogenous distributed database system, all the physical locations have the same
underlying hardware and run the same operating systems and database
applications. Homogenous distributed database systems appear to the user as a single
system, and they can be much easier to design and manage. For a distributed database
system to be homogenous, the data structures at each location must be either identical or
compatible. The database application used at each location must also be either identical or
compatible.
Different nodes may have different hardware, software and data structure, or they may be in
locations that are not compatible. Users at one location may be able to read data at another
location but not upload or alter it. Heterogeneous distributed databases are often difficult
to use, making them economically infeasible for many businesses.
Distributed databases are capable of modular development, meaning that systems can be
expanded by adding new computers and local data to the new site and connecting them to
the distributed system without interruption.
When failures occur in centralized databases, the system comes to a complete stop. When a
component fails in distributed database systems, however, the system will continue to
function at reduced performance until the error is fixed.
Admins can achieve lower communication costs for distributed database systems if the data
is located close to where it is used the most. This is not possible in centralized systems.
Replicated data is used to create instances of data in different parts of the database. By
using replicated data, distributed databases can access identical data locally, thus avoiding
traffic. Replicated data can be divided into two categories: read-only and writable data.
Read-only versions of replicated data allow revisions only to the first instance; subsequent
enterprise data replications are then adjusted. Writable data can be altered, but the first
instance is immediately changed.
Database
replication ensures the data in distributed databases remains up to date
Horizontally fragmented data involves the use of primary keys that refer to one record in
the database. Horizontal fragmentation is usually reserved for situations in which business
locations only need to access the database pertaining to their specific branch.
Vertically fragmented data involves using copies of primary keys that are available within
each section of the database and are accessible to each branch. Vertically fragmented data
is utilized when the branch of a business and the central location interact with the same
accounts in different ways.
Reorganized data is data that has been adjusted or altered for decision support databases.
Reorganized data is typically used when two different systems are handling transactions and
decision support. Decision support systems can be difficult to maintain and online
transaction processing requires reconfiguration when many requests are being made.
Separate schema data partitions the database and the software used to access it in order to
fit different departments and situations. There is usually an overlap between different
databases within separate schema data.
Apache Ignite specializes in storing and computing large volumes of data across clusters of
nodes. In 2014, Ignite was open sourced by GridGain Systems and later accepted into the
Apache Incubator program. Apache Ignite's database uses RAM as the default storage and
processing tier.
Apache Cassandra offers support for clusters that span multiple locations, and it features its
own query language, Cassandra Query Language (CQL). Additionally, Cassandra's replication
strategies are configurable.
Apache HBase runs on top of the Hadoop Distributed File System and provides a fault-
tolerant way to store large quantities of sparse data. It also features compression, in-
memory operation and Bloom filters on a per-column basis. HBase is not intended as a
replacement for SQL database, although Apache Phoenix provides a SQL layer for HBase.
Couchbase Server is a NoSQL software package that is ideal for interactive applications that
serve multiple concurrent users by creating, storing, retrieving, aggregating, manipulating
and presenting data. To support these many application needs, Couchbase Server provides
scalable key value and JSON document access.