Chapter 16
Chapter 16
Computers in auditing
EXAM FOCUS
There will be regular questions in the exam that require students to have knowledge of the
impact of computers on auditing, but this will often be linked into another area such as the
audit of inventory or auditing the expenses in the incom e statement.
There are two distinct ways in which computers impact upon the w ork of auditors.
¨ 2IWHQ D FOLHQW·V DFFRXQWLQJ V\VWHPV ZLOO EH FRPSXWHULVHG DQG WKLV JLYHV ULVH WR SDUWLFXODU
auditing problems; these problems are addressed in ISA 401.
¨ The auditor him self can use computers to assist in the conduct of the audit.
Both of the above are important areas as far as questions are concerned.
The ACCA Study Guide has no specific section on computer auditing. Instead it is assumed
that accounting systems are normally computerised, so any auditing activity w ill require
familiarity w ith computers. The syllabus content contains tw o relevant elements:
In order to cover these elements the follow ing topics are included:
1 Introduction
1.1 The auditor's primary objective
You should not forget that normal principles of auditing still apply irrespective of the system
of recording and processing transactions. W hilst the normal auditing standards should be
followed it is likely that the auditor will need additional guidance in carrying out his audit of a
computerised system.
255
$&&$3DSHU)7H[W²$XGLWDQG$VVXDUDQFH ,QWHUQDWLRQDO
The basic objective remains to form an opinion on the truth and fairness of the financial
statements but the methods by which the auditor obtains the evidence to enable him to form
his opinion may vary somew hat from the methods employed w hen auditing manual
accounting systems.
¶7KH DXGLWRU VKRXOG KDYH VXIILFLHQW NQRZOHGJH RI WKH &,6 WR SODQ GLUHFW VXSHUYLVH DQG
review the work performed. The auditor should consider whether specialised CIS skills are
QHHGHGLQDQDXGLW·
If specialised skills are needed, the auditor should seek the assistance of a professional w ith
VXFK VNLOOV HLWKHU RQ WKH DXGLWRU·V RZ Q VWDII RU H[WHUQDOO\ 7KH SURYLVLRQV RI ,6$ ZLOO EH
UHOHYDQWLQWKHDXGLWRU·VXVHRIWKHZRUNRIDQH[SHUWLQVXFKFLUFXPVWDQFHV
(a) the need to use staff with specialised knowledge and skills (as noted above);
(b) the possible problem s of loss of visible evidence and systematic errors;
(c) the tim ing of audit w ork to ensure that data is available in readily usable form;
(d) the possible need to rely on internal controls and the special computer assisted
techniques which can be used.
(i) understanding how the system processes and produces accounting information and
what controls are operating on the system;
(ii) the loss of a visible audit trail due to a reduction in the amount of printed output.
The audit trail is the facility to trace individual transactions through a system from source (in
most cases a source document) to completion (inclusion in a summary figure in the accounts)
or vice versa. Frequently computer-generated totals, analyses and balances are not printed out
in detail because management is not exercising control through verification of the individual
items processed.
Techniques which the auditor can use to overcome this problem include:
(i) DUUDQJLQJIRUSULQWRXWVRILQIRUPDWLRQVSHFLILFDOO\IRUWKHDXGLWRU·VXVH
(ii) program med interrogation facilities whereby records stored on file are printed out on a
selective basis by means of a direct request to that file;
(iv) testing on a totals basis rather than tracing individual items (eg, comparing analyses
with previous periods and budgets);
256
Chapter 16 Computers in auditing
(v) using alternative tests (eg, testing inventory counting procedures w hen movements
making up inventory balances cannot be tested);
Types of CAATs
Audit software Test data Others
7KHDXGLWRU·VSURJUDPV 7KHDXGLWRU·VGDWDDSSOLHGWRWKH
DSSOLHGWRWKHFOLHQW·VGDWD FOLHQW·VSURJUDPV
0DLQXVH²LQVXEVWDQWLYHWHVWV 0DLQXVH²LQWHVWVRIFRQWURO
2 Internal controls
2.1 Types of controls
Controls over com puter-based accounting systems are usually considered under tw o main
headings, namely application controls and general controls.
(a) Application controls. These relate to the transactions and standing data appertaining to
each computer-based accounting system and are therefore specific to each application.
The objectives of application controls, which may be manual or program med, are to
ensure the completeness and accuracy of the accounting records and the validity of the
entries made therein resulting from both manual and program med processing.
(b) General controls. These are controls, other than application controls, w hich relate to the
environment within w hich computer-based accounting systems are developed,
maintained and operated, and which are therefore applicable to all the applications.
The objectives of general controls are to ensure the proper development and
implementation of applications, and the integrity of program and data files, and of
computer operations. Like application controls, general controls may be either manual
or program med.
Application and general controls are inter-related. Strong general controls contribute to the
assurance which may be obtained by the auditor in relation to application controls. On the
other hand, unsatisfactory general controls may underm ine strong application controls or
exacerbate unsatisfactory application controls.
Control m ust be established over three areas and the examples of controls given below are
com mon to many applications.
257
$&&$3DSHU)7H[W²$XGLWDQG$VVXDUDQFH ,QWHUQDWLRQDO
258
Chapter 16 Computers in auditing
Control techniques used to ensure completeness and accuracy of input may also assist in
controlling processing. Other controls are:
(ii) sum mary processing eg, a depreciation calculation based on total asset value
compared with the sum of depreciation calculations based on individual asset values.
In view of the importance of these files more costly control techniques are often justified such
as:
(iii) record counts and hash totals established and checked by the user each time the file is
used.
General controls must be established over many areas since they cover the computer
installation itself rather than any individual application. The principal requirements are
controls:
259
$&&$3DSHU)7H[W²$XGLWDQG$VVXDUDQFH ,QWHUQDWLRQDO
(i) segregation of duties for systems design, program ming, operating and supervision;
(ii) approval of development by senior employees and monitoring by internal audit;
(iii) procedures to prevent unauthorised access to programs;
(iv) comparison of production program s to controlled copies;
(v) documentation of all system changes.
These controls are needed to ensure that the correct program is used with appropriate files,
programs are run in the correct sequence and errors arising during program execution are
resolved. Controls include:
This area is largely dependent on application controls over specific files but general controls
may also be applicable. These would include:
These controls are necessary to minim ise the impact of any system failure that m ight occur.
Com mon back-up procedures include:
3 Planning considerations
3.1 The audit strategy
The purpose of audit planning is to enable the auditor to achieve in the most efficient manner
the principal objective of the audit, which is to ascertain w hether, in his opinion, the financial
statements on which he is reporting show a true and fair view of the state of affairs at a given
date and of the results and cash flow s for the period ended on that date.
The first stage in the audit approach is for the auditor to determine the m ost efficient and
effective audit strategy for each aspect of the financial statements. In order to determ ine the
audit strategy, the auditor will need to gain a prelim inary understanding of the nature of the
FOLHQW·V EXVLQHVV DQG SDUWLFXODU ULVN DUHDV RI WKH QDWXUH DQG VLJQLILFDQFH RI DFFRXQW EDODQFHV
ZLWKLQ WKH ILQDQFLDO VWDWHPHQWV DQG RI WKH FOLHQW·V DFFRXQWLQJ V\VWHP DQG UHODWHG LQWHUQDO
controls.
260
Chapter 16 Computers in auditing
Based on his prelim inary understanding the auditor w ill decide w hether to base the audit of
each significant account balance or group of account balances in the financial statem ents
principally on:
(a) tests of control designed to confirm the consistent and proper operation of accounting
systems from which account balances are derived in com bination w ith limited
substantive tests directed to the completeness, validity and accuracy of account
balances; or
(b) substantive tests directed to the completeness, validity and accuracy of account
balances.
This is because in addition to the manual controls carried out on the data being processed, the
auditor will be concerned with other types of procedures and controls w hich are unique to
computer systems. Tw o significant points can be made.
(a) The control environment will typically be m ore complex due to:
(i) WKH OLNHO\ H[LVWHQFH RI DQ DGGLWLRQDO ´OD\HUµ RI FRQWUROV LQ WKH IRUP RI JHQHUDO
controls; and
(ii) the existence of program med procedures and conWUROV Z LWKLQ WKH FOLHQW·V
software.
Controls
General Application
Programmed Manual
procedures
In determining the audit strategy, it w ill be necessary for the auditor to understand
clearly the nature and different types of internal control and the way in w hich they
relate to one another.
(b) Certain features of computerised processing in general may influence the audit
strategy decision. For example, the auditor may use computer programs to quickly
examine large volumes of processed data, thus adopting substantive testing
procedures as an alternative to, or to supplement, control reliance.
261
$&&$3DSHU)7H[W²$XGLWDQG$VVXDUDQFH ,QWHUQDWLRQDO
DQG PDLQWDLQ FRQWUROV WKDW Z LOO HQVXUH DV IDU DV SRVVLEOH WKH UHOLDELOLW\ RI WKH FRPSDQ\·V
accounting records and the safeguarding of its assets.
A comm on approach is the use of an internal control questionnaire (ICQ) to identify and
evaluate the controls which exist in a computer system.
This might consist of questions asking w hether there are controls in a system which meet
specified overall objectives, or which prevent or detect the occurrence of specified errors or
omissions.
In addition to a detailed ICQ, it is frequently helpful to sum marise the principal controls over
each system in a form that enables the auditor rapidly to gain an impression of the overall
VWUHQJWKRIFRQWURO7KLVPD\WDNHWKHIRUPRID´FRQWUROPDWUL[µ
Alternatively, some firms structure their ICQs for use in an EDP environment by considering
general controls in the first section, and only if these appear to be adequate for audit purposes
and suitable for testing would they move on to a second section w hich identifies and evaluates
application controls.
In the section on application controls, an integrated set of internal control questions may be
used covering controls over both the manual part and the program med part of the application,
and the impact of relevant general controls.
(a) It is difficult to make changes to a computer system once it is operational. The auditor
should therefore make any suggestions or recommendations at the relevant stage of
development so that they can be incorporated easily. Indeed, clients often encourage
RUVSHFLILFDOO\UHTXLUHWKHDXGLWRU·VHYDOXDWLRQDQGFRPP HQWVSULRUWRLPSOHPHQWDWLRQ
(b) The auditor w ill need to know the nature and extent of programmed procedures in
order to decide whether to rely on and test the implementation controls. W ithout
adequate lead time before implementation he may be unable to plan and perform the
tests.
(c) The auditor may be able to arrange for additional features to be included in the system
that will assist his subsequent audit tests. For example, facilities may be arranged to
obtain print-outs on request or for additional fields to be included on master files for
subsequent exam ination by a computer audit program.
It should be added that, whilst for the above reasons it will be highly desirable for the auditor
to review systems prior to their going live, this will not be possible in all cases. W here he is
required to evaluate systems w hich have been in operation for some time, the auditor should
bear in mind the possible difficulty of making program changes, which he may nevertheless
deem desirable. In these cases he should consider, where practicable, making alternative
recommendations to strengthen manual controls.
262
Chapter 16 Computers in auditing
The auditor w ill normally carry out his tests of control on general controls before those on
application controls. This is because, if the general controls have operated satisfactorily, the
auditor will be able to restrict his work on the application controls. The approach he adopts to
the application controls is thus largely dependent on the results of his tests on the general
controls.
Computer systems are frequently unable to carry out conventional audit tests because visible
evidence is not available as a routine. Alternative techniques include the use of CAATs such as
audit software, audit test data and program code analysis, which are unique to com puter
systems.
7KHVH WKUHH W\SHV RI VLWXDWLRQ KDYH WUDGLWLRQDOO\ EHHQ FRYHUHG E\ WKH SKUDVH ´ORVV RI DXGLW
WUDLOµ +RZHYHU WKLV WHUP LV XQIRUWXQDWH LQ WKDW LW LPSOLHV WKDW WKH PHDQV WR FKHFN UHVXOWV E\
conventional tests should be available to auditors and the failure to incorporate this in the
system is a matter for criticism. This is not true; what matters is the adequacy of the controls.
If the failure to print out constitutes a weakness in control, as, for example, if the contents of
suspense files were not regularly printed out, the system is deficient and the auditor is correct
to draw this to the attention of the company. But if the failure to print out does not represent a
weakness, the auditor should normally devise alternative techniques to test the operation of
WKH SURJUDP PHG SURFHGXUHV )RU WKHVH UHDVRQV WKH WHUP ´YLVLEOH HYLGHQFHµ LV XVHG LQ WKLV
FKDSWHULQSUHIHUHQFHWR´DXGLWWUDLOµ
M anual tests can also be carried out where full visible evidence is not provided by the system,
but can be created in one of the following ways:
(a) working on current data before it is sent for processing by the computer, for example
manually checking the validity of product codes on despatch notes in order to test a
program med validity check;
(b) selecting a small number of items from those subm itted for processing and processing
these in a separate run, for example processing a small number of purchase invoices
separately to allow the purchase analysis to be checked;
(c) simulating a condition which w ill produce a report if the programmed procedure is
working properly, for example altering an item on an input document so that it fails to
match correctly with data in a pipeline file, or withholding a document so that it is
263
$&&$3DSHU)7H[W²$XGLWDQG$VVXDUDQFH ,QWHUQDWLRQDO
reported as missing (this approach requires careful planning and the agreement of the
client); or
(d) requesting a special print-out of item s processed, for example a listing of sales invoices
included in a sales total produced by the computer.
W here visible evidence of the operation of a program med procedure neither exists nor can be
created, and the appropriate condition cannot be sim ulated, it is not possible to carry out
manual tests.
7KHUHDUHWZRPHWKRGVRIUXQQLQJDXGLWWHVWGDWDZKLFKDUHWHUPHG´OLYHµDQG´GHDGµ$XGLW
test data is classified as dead ZKHQ WKH GDWD LV SURFHVVHG XVLQJ WKH FRPSDQ\·V RSHUDWLRQDO
SURJUDPVEXWVHSDUDWHO\IURPWKHFRPSDQ\·VGDWDDQGXVLQJFRSLHVRIPDVWHUILOHVRUGXPP \
files set up for the purpose. Audit test data is classified as live where the data is processed at
WKHVDPHWLPHDVWKHFRPSDQ\·VGDWDXVLQJWKHDFWXDOPDVWHUILOHV8VXDOO\VSHFLILFUHFRUGVRQ
WKH PDVWHU ILOHV ZLOO EH UHVHUYHG RU FUHDWHG IRU WKLV SXUSRVH 7KLV IRUP RI ´OLYHµ WHVW GDWD LV
often called an integrated test facility (ITF).
7KHUH DUH DGYDQWDJHV DQG GLVDGYDQWDJHV LQ ERWK ´OLYHµ DQG ´GHDGµ DXGLW WHVW GDWD 7KH
disadvantages of one method are, in general, the advantages of the other. In practice, the
DGYDQWDJHVRIUXQQLQJ´OLYHµXVXDOO\RXWZHLJKWKHDGYDQWDJHVRIUXQQLQJ´GHDGµ
Audit software
The auditor usually makes use of his ow n com puter programs to assist in the carrying out of
substantive tests. However, the auditor may decide to use his own computer program s to
assist in testing program med controls. This use of program s is often referred to as simulation.
There is no fundamental difference between the audit use of computer program s as a
substantive test and as a test of a program med control. The main distinction is that, when used
IRUVLPXODWLRQWKHREMHFWLYHRIWKHDXGLWRU·VSURJUDPLVWRFKHFNWKDWWKHFRPSDQ\·VSURJUDPLV
RSHUDWLQJ FRUUHFWO\ E\ FKHFNLQJ DQG DJUHHLQJ ILJXUHV SUHSDUHG E\ WKH FRPSDQ\·V SURJUDP V
W hen used as a substantive test, the program is also used to provide the auditor with
information from the files, over and above that produced by the com pany, that will be helpful
in his audit.
264
Chapter 16 Computers in auditing
Program code analysis comprises the examination by the auditor of source listings of
operational program s to determ ine that the relevant program med procedures are present and
are logically coded. The technical skill required to perform program code analysis is high, as
the auditor needs to be familiar with the program language used. The auditor must verify that
the coding on the source listing that he is examining is the same as that contained in the
operational program which is used for processing.
5 Substantive testing
5.1 Techniques available
W here records supporting balance sheets and income statements are maintained by computer,
the objectives of the substantive tests and the relationship between the system of internal
control and the substantive tests remain the same. How ever, because of, firstly, the
opportunity to make use of the com puter to assist in substantive testing, and, secondly, the
distinctive control features in computer systems, there are often changes in the substantive
tests.
The audit use of file interrogation software to examine data held on computer files represents
the m ost comm on use of the computer to assist in substantive testing. The tw o m ost significant
features in using computer program s are that, firstly, all relevant items are normally exam ined,
whereas w hen manual tests are used only a sample is normally examined, and secondly,
additional information of assistance to the auditor can often be produced. The combination of
these tw o factors usually enables the auditor to carry out m ore effective or more efficient
substantive tests than are practicable by manual means.
It is advisable to establish formal procedures to control the use of audit software. This w ill
help ensure that software is used only in cases where the cost can be justified, that the
contemplated objectives are appropriate, and that the costs are controlled.
Auditors, confronted with large files of accounting data, quickly found the idea of using file
interrogation software attractive. Using such file interrogation program s offered several major
advantages over manual work. Firstly, the w ork is carried out much faster and more
accurately by program. A typical program running on a medium-size computer might review
and classify around 50,000 accounts in five minutes and with much greater consistency than
clerical workers would be able to achieve. Secondly, as a result, far more data can be reviewed.
Invariably, in manual auditing, a compromise has to be struck between the volume the auditor
would like to examine and the volume he can exam ine in practice. This leads in manual work
to the use of sampling techniques of either a formal or informal nature. W ith a file
interrogation program it is often possible to read the whole population in the time it would
take an auditor to work out what the sample should be. Thirdly, less paper work is required
and generated; it is only necessary to print out the results of the test or the items selected for
investigation. Lastly, and m ost importantly, clerical audit time can be devoted to an
examination of the item s defined by the auditor as significant; in other w ords, the auditor can
concentrate on w hat matters most.
In general, audit software can be used to assist substantive tests in the following ways:
265
$&&$3DSHU)7H[W²$XGLWDQG$VVXDUDQFH ,QWHUQDWLRQDO
¨ 7KH UHSHUIRUPDQFH RI WKH FRPSDQ\·V SURFHGXUHV IRU H[DPSOH UHSHUIRUPLQJ WKH
accumulation and ageing of accounts receivable.
¨ The selection of defined items in account balances for the purpose of confirmation or
inspection. The program can also assist in the confirmation work, for example by printing
confirmation request letters. In the context of sampling, the program could also perform
stratification.
¨ The production of additional account analyses and exception reports, for example an
analysis of accounts receivable in relation to credit limits, or exception reports of excess
inventory based on past usage.
The precise nature of the tasks which could be performed will depend on the specific
application. An illustration of the use of audit software in the area of accounts receivable is
provided below.
¨ Analysing the balances or transactions into age categories. Often a m ore detailed analysis
than that prepared by the company is required. Analysing by transaction type may
produce useful information regarding payments on account and unmatched adjustm ents.
¨ Analysing the balances into strata by reference to the amount outstanding and reporting
the largest individual balances on the file.
¨ Identifying balances in excess of credit lim its, analysing them into strata by reference to the
amount by w hich the credit limit is exceeded and computing the am ount of excess over
credit limits.
¨ Identifying accounts with unusual credit limits or no credit limits.
¨ Identifying unusual transactions, for example large sales near the year end or transfers
between accounts.
¨ Identifying unmatched transactions, for example payments on account.
¨ Identifying unusual standing data, for example high discount rates.
¨ Selecting items for confirmation and printing appropriate confirmation requests. These
items can be written to the file and replies can be matched. Information regarding
outstanding item s and second requests can then be produced.
¨ Comparing am ounts outstanding at the balance sheet date with subsequent cash receipts,
computing the am ount remaining unpaid after a reasonable time and analysing the
balances into strata by reference to this am ount.
A particularly effective use of such packages may be to assist in analytical review w ork. For
example, a template might be programmed to include the normal income statement and
balance sheet headings and a variety of useful ratios and comparisons can be program med into
the m odel. Data for a particular client can then be input to the template, w hich will analyse the
266
Chapter 16 Computers in auditing
information for audit purposes. It may well be possible to use such templates to com pare
actual to budgeted figures or to build up a history of a client covering a number of past years.
This technique is highly relevant to the m odern event-driven processing system s. Resident
code can randomly check transactions for validity and capture data for the auditor. This type
of random check is very useful in high volume high speed applications such as banking.
It is also possible to extend the uses of microcomputer software to tasks that are a more integral
part of the audit process. For example, audit w orking papers may be produced using portable
QRWHERRNFRP SXWHUVZ KLFKFDQEHHDVLO\WUDQVSRUWHGWRWKHFOLHQW·VSUHPLVHV
Audit assignments typically require a detailed budget expressed in units of time and analysed
by grade of staff and by task. Totals and sub-totals of hours allocated then need to be
multiplied by the charge-out rates for each grade of staff so that the budget costs can be
evaluated and a fee can be set. Actual costs will be accumulated from timesheets, again
analysed at least by grade of staff, and ideally also by task, for example, compliance testing and
substantive testing. Such tw o-dimensional arrays of num erical data are exactly suited to the
type of software known as a spreadsheet package.
Spreadsheet packages normally allow some degree of protection for the embedded formulae
and a limited amount of program ming (know n as execute or macro routines, for example),
making it possible for simple system s to be prepared and data files to be maintained. Taking
audit budgets as an example, a spreadsheet system could be designed:
¨ to handle any number of files of budget and actual data, for as many years as required;
¨ to produce standard reports comparing any pair of files, for example actual costs for this
year compared to actual costs on the same client for last year;
¨ to accumulate and evaluate the timesheet data for each period and then to add it to the
accumulating file of current year actual costs.
267
$&&$3DSHU)7H[W²$XGLWDQG$VVXDUDQFH ,QWHUQDWLRQDO
Having dealt w ith automating budgets, the next m ost com mon use of microcomputers by the
auditor is automating various lists of names and addresses. At the simplest this will be
nothing m ore than a mailing list, varying up through degrees of complexity to a full contacts or
client database.
$QRWKHUIRUPRIGDWDEDVHFRXOGEHEXLOWXSIURPWKHDXGLWRU·VRZQGLDU\RIMREVWKDWQHHGWREH
done on each client assignment and the dates on w hich they fall due. In addition to reports on
an individual audit, the system allow s exception reports to be produced for groups of clients.
Such reports could be used to monitor progress on the audits of a parent company and its
subsidiaries or on all of the jobs controlled by a particular audit partner or manager. Reports
can also be produced by date to assist in planning w ork, for example all tasks scheduled to be
completed in the month ahead.
Statistics
Perhaps the most complex administration system that the auditor would be tempted to set up
on a microcomputer w ould be one designed to produce statistics to help monitor and control
aspects of his ow n business, for example:
¨ personal data, recording staff qualifications, w ork experience, courses attended, and so on,
to help with managing staff;
¨ billing information, showing dates due and dates paid, to help with cashflow management;
¨ client information, for example data processing installation and application details, to help
analyse the extent of likely future computer-assisted audit techniques needed on current
audit clients;
¨ information on businesses in an area, extracted from a public database, to help prom ote
practice development.
The working paper is an integral part of the audit. M ost lead schedules and their supporting
analyses vary very little from year to year. They will normally hold prior year figures as well
as current year, and the percentage fluctuation will usually be com puted. A word-processing
or a spreadsheet package can be used to automate standard audit w orking papers.
A more ambitious project, but one which offers the potential for greater cost savings, would be
WRFDSWXUHWKHFOLHQW·VWULDOEDODQFHRQWKHPLFURFRPSXWHUWRJHWKHUZLWKDVXLWDEOH GHVFULSWLRQ
RIWKHZD\LQZKLFKWKHWULDOEDODQFHLWHPVVKRXOGEHSURFHVVHGWRSURGXFHWKHFOLHQW·VILQDQFLDO
accounts, and then to produce or deal with:
¨ lead schedules;
¨ supporting analyses;
¨ financial statements;
¨ client adjustments;
¨ proposed audit adjustments;
¨ reports and ratios designed for analytical review work.
In addition to using software to produce working papers upon which to record the audit w ork
that was done, it is also possible to use m icrocomputer software to assist in tasks that require
the exercise of audit judgement. There are many instances where computations need to be
made to help the auditor reach a decision on an audit test, and it often happens that those
computations need to be made many times, using different values for the most significant
268
Chapter 16 Computers in auditing
variables. In these cases a microcomputer can be programmed to carry out the com putation in
such a way that the im portant variables can be changed easily and the results produced as
many times as may be needed to show how sensitive they are to fluctuations in the underlying
assumptions.
Analytical review software is a particular type of audit test decision support software. Here,
the microcomputer w ould be used to store, rearrange and report data, including industry
comparatives, on w hich the auditor may wish to perform analytical review. The computation
of ratios and presentation of the results, possibly in the form of a graph, are tasks which most
microcomputers and printers can perform, with the appropriate software.
Expert systems
The auditor m ust make many selections, decisions and judgements in the course of reaching
the audit opinion. There is no doubt that microcomputer software can be used to support the
DXGLWRU·V GHFLVLRQ PDNLQJ EXW ZKHWKHU LW FDQ HYHU JR VR IDU DV WR PDNH GHFLVLRQV IRU WKH
auditor is a different matter. Software capable of exercising judgement is generally know n as
an expert system. An expert system attempts to codify the knowledge and experience of one or
more expert persons, in a way that incorporates the lack of precision in human opinions.
M icrocomputer packages that can be used to build simple expert system s are available, and
many pilot auditor system s are in development. W hether any of these current developments
will result in practical audit systems is, at the m oment, a matter for speculation.
Computer security is of vital importance, not only to the accountant in industry but also to the
accountant in practice, w ho may be advising his client as to suitable security controls or w ho
may be auditing a computer system. Security is the means by which losses are controlled and
therefore involves the identification of risks and the institution of measures either to prevent
such risks entirely or to reduce their impact.
Required
(a) State the main areas of risk w hich may arise in relation to a computer system and in
each case explain one factor w hich could lead to the system being exposed to such a
risk.
(b) Describe the different forms of control w hich should be instituted to safeguard against
computer security risks. (10 marks)
269
$&&$3DSHU)7H[W²$XGLWDQG$VVXDUDQFH ,QWHUQDWLRQDO
The use of m icrocomputers in accounting systems may create problem s for the auditor due to:
Required
(a) to ensure that only authorised people are allowed access to information on files and to
input data to update them;
(b) to ensure that only authorised data is input and that a proper record of all data is kept;
(c) to ensure that all input errors and unauthorised file amendments are highlighted.
(15 marks)
The main computer audit techniques w hich make use of a computer while auditing are test
packs (test data) and computer audit programs (audit software).
Required
(b) Describe five input control techniques which can be incorporated into a computer
operational program. (15 marks)
7 Summary
This chapter has covered three main aspects of computer auditing.
You should learn the various possible controls, since questions on them are likely to occur.
It is important to have a good knowledge of audit software and test data, the form that they
take and the uses to which they can be put.
Other forms of CAATs are not likely to give rise to specific questions but a background
knowledge may be useful.
270
Chapter 16 Computers in auditing
7KHUH LV PXFK RYHUODS ² HVSHFLDOO\ EHWZHHQ WKH FRQWUROV UHTXLUHG LQ VPDOO RQOLQH DQG
database systems. Use your comm on sense to think of the particular problems these areas
present. Then use your know ledge of the controls to consider w hich controls are particularly
relevant.
Finally, the examiner does not expect a technical know ledge of computers. W hat is required is
an understanding of the impact computers have and how auditors can overcome the special
difficulties they present.
271
$&&$3DSHU)7H[W²$XGLWDQG$VVXDUDQFH ,QWHUQDWLRQDO
272