The Impact of Information Technology On The Audit Process
The Impact of Information Technology On The Audit Process
Chapter Opening Vignette – “Just Because the Computer Did the Work
Doesn’t Mean It’s Right”
12-1
obtained to support its reliability. In this case, students might be asked what different
ways the aging could be tested.
12-2
This vignette also allows for a discussion of many of the audit software
packages, such as ACL software highlighted in this edition, that are now available for
purchase and use by auditors. These vendor developed software packages are
capable of reading client data stored in a variety of formats and re-computing
information, such as re-doing an aging of accounts receivable. The Windows based
format of the software allows the auditor to easily perform numerous audit tasks
requiring testing of client data presented in electronic form efficiently and effectively.
If not already assigned, ACL problems in chapters 7, 8, and 11 could be used to
illustrate the benefits of audit software tools as part of this chapter’s discussions.
This chapter highlights that while IT reduces many of the risks associated
with traditional manual accounting systems, new risks are introduced. We focus on
those risks and then outline internal controls specific to IT that management can
implement to address some of those risks.
Most students already embrace the idea that IT provides tremendous benefits to
businesses and that most businesses rely on IT to some extent to produce financial
statement information. This section illustrates two primary benefits for internal control
when IT is integrated into accounting systems:
(See T-12-1)
12-3
Internal Controls Specific to IT (page 372)
In this section, we illustrate how management can respond to many of the risks
unique to IT by implementing internal controls specific to IT. We describe both
general controls and application controls and highlight how they differ. We
emphasize how general controls have an umbrella effect over all aspects of the IT
function while application controls apply to the processing of individual transactions
within a specific transaction cycle. We note that general controls are designed to
protect each application software program and data from many of the risks noted
earlier in this chapter. Figure 12-1 (page 373) provides a useful visual example of
the difference between general and application controls.
We highlight how the six categories of general controls have an overriding effect
on all IT functions by briefly describing each category of control. Table 12-1 (page
373) provides a helpful summary of the six general controls along with an example of
each. We particularly emphasize the importance of segregating key duties and the
importance of a controlled systems development process.
The use of Problem 12-20 provides a good way to emphasize the concepts
related to this general control.
12-4
Systems Development – We refer back to the discussion of how the use
of IT to process transactions can lead to systematic error by noting that
once errors are included in software programming the computer will
process transactions incorrectly until those programs are changed. We
describe how a well-designed process of selecting, designing, testing, and
implementing application software using a team of both IT and non-IT
personnel helps increase the likelihood that program design errors are
properly addressed before the system is implemented and relied upon to
produce financial statement information. We emphasize that an important
aspect of systems development involves thorough testing of the system
before implementation through the use of pilot and parallel testing.
(See Table-12-1)
(See T-12-2)
12-5
underlying application software
12-6
programs or related master files are not reliable due to a deficient IT environment.
For example, the lack of control surrounding program development and program
changes increases the auditor’s concern that application programs are more likely to
produce systematic error. T-12-3 illustrates the typical flow of auditor testing of
general controls and application controls. It is important to emphasize that the results
of auditor testing of general and application controls should be considered by
auditors of public companies when issuing reports on internal control over financial
reporting.
This usually leads to a discussion of the terms “auditing around the computer”
(where the auditor does not use computer performed controls to reduce control risk)
and “auditing through the computer” (where the auditor tests computer-performed
internal controls and account balances electronically because good general controls
exist). When discussing this section, we illustrate the test data, parallel simulation,
and the embedded audit module approaches to auditing through the computer. T-12-
4 provides a useful way to demonstrate how these three approaches differ. In
addition, Figures 12-3 and 12-4 (pages 382 and 383) illustrate the test data and
parallel simulation approaches, respectively. Problems 12-22, 12-23, and 12-24 help
illustrate the uses of these audit approaches. The ACL Problem 12-31 provides
hands-on experience in using audit software as an audit tool.
The material presented in earlier sections of this chapter addresses the effect of
IT on the audit process for organizations that centralize the IT function. While all
organizations need a strong general controls environment, some of those general
control issues differ across various IT environments. In this section we highlight
unique issues for network environments, database management systems, e-
commerce systems and outsourced IT functions. Problem 12-28 provides a basis for
illustrating risks unique to on-line sales systems.
12-7
CHAPTER 12
CROSS REFERENCE OF LEARNING OBJECTIVES AND PROBLEM MATERIAL
Discussion
Multiple Questions
Review Choice and ACL Problem
Learning Objectives Questions Questions Problems and Cases
12-1 Describe how IT improves internal control. 12-1 12-17 12-23
12-2 Identify risks that arise from using an IT-based 12-2, 12-3, 12-18 12-19, 12-20, 12-30
accounting system. 12-4, 12-5 12-21, 12-23,
12-25, 12-27
12-6
12-3 Explain how general controls and application controls 12-6, 12-7 12-19, 12-20, 12-30
reduce IT risks. 12-21, 12-23,
12-25, 12-27
12-4 Describe how general controls affect the auditor’s 12-8, 12-9, 12-17, 12-18 12-21, 12-23,
testing of application controls. 12-10 12-26
12-5 Use test data, parallel simulation, and embedded audit 12-11 12-21, 12-22, 12-31
module approaches when auditing through the 12-23, 12-24
computer.
12-6 Identify issues for e-commerce systems and other 12-12, 12-13, 12-28, 12-29
specialized IT environments. 12-14, 12-15,
12-16
KEY RISKS SPECIFIC TO
IT ENVIRONMENTS
Unauthorized access
Loss of data
T-12-1
INPUT, PROCESSING, AND
OUTPUT APPLICATION CONTROLS
PROCESSING OUTPUT
INPUT CONTROLS CONTROLS CONTROLS
Input IT Output
Processing
T-12-2
T-12-3
SEQUENCE FOR EVALUATION –
GENERAL AND APPLICATION CONTROLS
T e s t G e n e ra l
C o n tr o ls
N o - D o n o t r e ly o n IT
E ffe c tiv e
a p p lic a tio n c o n tr o ls to
?
r e d u c e c o n tr o l r is k
Y e s - E v a lu a te
a p p lic a tio n
c o n tr o ls
N o - D o n o t r e ly o n IT
E ffe c tiv e
a p p lic a tio n c o n tr o ls to
?
r e d u c e c o n tr o l r is k
Y e s - P e rfo rm
te s ts o f
a p p lic a tio n
c o n tr o ls a n d , if
e ffe c tiv e , r e d u c e
s u b s ta n tiv e te s ts
T-12-3
COMPARISON OF TEST DATA,
PARALLEL SIMULATION AND
EMBEDDED AUDIT MODULE APPROACHES
EMBEDDED
BASIS FOR PARALLEL AUDIT
COMPARISON TEST DATA SIMULATION MODULE
Generally
Test to test
Test
effectiveness output, but
unusual
Objectives of client’s sometimes
transaction
internal used to test
output
controls internal
controls
Tests of
controls Generally Generally
Tests of
versus substantive substantive
controls
substantive tests tests
test
Client’s
Computer
Client’s Auditor’s modified
program used
by auditor
T-12-3