Auditing Risk in Computerized Accounting
Auditing Risk in Computerized Accounting
INFORMATION SYSTEM
By
Osim E. Etim
Department of Accounting,
Faculty of Business Administration,
University of Uyo.
and
Abstract
Developments brought about by information and communication
technology and its increasing application in accounting information
system has resulted to more risk exposures faced by business
organizations, particularly risks associated with computer crimes and
frauds, in addition to audit trail absence. Effective handling of risk is
necessary for reduction in auditors’ liability and enhancement of
audited financial statements reliability for decision making. The study
examines implications of business risks on audit risk and various tools
used for audit in a computerized accounting system environment.
Exploratory and descriptive research methods were adopted involving
application of central limit theorem and Kolmogorov- Smirnov test for
treatment of data gathered through questionnaire administered to forty
external auditors in public practice. Results show management
integrity, nature of business, quality of internal control as highly
susceptible to risky transactions. It was also revealed that use of
standard audit tool kits will reduce audit failure and possible liabilities;
quality audit reports and reliable financial reports. It is recommended
that external auditors should always evaluate risk profile every audit
1
Academic Excellence
engagement before accepting the audit, regular updates in ICT tools
and mandatory ICT knowledge by external auditors as a compliance
requirement for issuing and renewing practical licence by those
responsible for that.
Accounting products, financial statements, are prepared for two separate user
groups, each with different interests, needs, and points of view. One group is external to
the corporate body in an operational sense and is concerned principally with the
financial strength and performance of the business. The other group is internal
management and focuses primarily on: organizational planning through the use of
budgets and data refined for use in control and decision making (Etim, 2011).
2
Auditing Risk in …
Moreso, financial statements prepared by management as stewardship reports
can hardly be expected to be entirely impartial and unbiased, any more than a football
coach could be expected to serve as both coach and referee in the same game. These
statements may likely be prepared carelessly or intentionally either overstating assets or
overlooking and omitting liabilities from the statement of financial position or due to
arithmetical errors or as a result of lack of knowledge of generally accepted accounting
principles (GAAP)
Implied in the above is the fact that external auditors’ opinion provides
reasonable assurance of detecting material misstatements of the financial statements
(both errors and fraud) and illegal acts that have a direct and material effect on the
determination of financial statement amounts. Auditing arose as a result of separation of
ownership and management groups in organizations, to protect stakeholders’ interest.
Thus, the CAIS is characterized by such risks of asset theft, perquisite, artificial,
revenue information, expense manipulation, hacking, spam, phishing and identity y
frauds. Audit risk is the risk that auditors may give an inappropriate opinion on the
financial statement. It is the probability that the auditors may unknowing fail to
3
Academic Excellence
appropriately modify their opinion on financial statements that are materially misstated
(Whittington and Pany, 2004).
The study will assist external auditors in planning their audit programmes to
ensure reliable audit approach and reports, hence minimizing possible liabilities and
audit failures as well as bridge the expectation gap which currently exist between what
the auditors actually do and what the public expect of them.
Research Questions
The following research questions have been raised based on the study.
1. What is the implication of business risk on audit risk?
2. What tools are available to external auditors to carryout auditing in a
computerized Accounting information system environment?
Hypothesis Development:
One hypothesis is developed for the study and stated in null form as follows:
Ho: Use of audit tool kits in a computerized account environment does not reduce audit
risk.
4
Auditing Risk in …
Federation of Accountants (IFAC). These constitute quality control framework for all
practicing public accounting firms to ensure engagement are conducted in accordance
with applicable professional standards (AICPA, 2008). Applying the above requires the
practitioners’ independence, objectivity, integrity, due diligence as well as possession of
required professional skill and knowledge in all manner of engagements.
A key point here is that independent auditors should adopt a risk based approach
to conducting field work and rendering assurance services to client.
For the purpose of this paper, we build on the risk categorization model of
Crouly. (2006). These authors consider risk factors in a systematic way and group risk
factors into eight categories: market risk, credit risk, liquidity risk, operational risk, legal
and regulatory risk, business risk, strategic risk and reputation risk following Linsley
and shrives (2006), we regroup the categories in order to obtain four risk types that
impact directly on audit: financial risk, operational risk, legal, tax and regulatory risk
and business risk.
Financial Risk: This risk is a broad and well-known risk category. It consists of market
risk, credit risk and liquidity risk. This risk relates to price movements in financial
markets (Tofik, 2006). Crouly et al (2006) define market risk as “the risk that changes in
5
Academic Excellence
financial market prices and rates will reduce the value of a security or portfolio”.
Market risk arises because of a number of factors such as interest rates exposures,
foreign exchange exposure, commodity price-sensitive revenue or expenses, stock
option plans and pension liabilities. Credit risk is the possibility that the payment of
contractual obligations may not be fulfilled by the counterpart, (Chike, 2004).
Liquidity Risk: When a company is not able to meet the payment of commitments it
has made, liquidity risk occurs (Cabedo and Tirado, 2004).
Operational Risk: Dozie (2007) relates operational risk to potential losses due to
inadequate or failing internal processes, people and systems or resulting from external
events. Crouhy, et al (2006) distinguishes three major types of operational risk. The first
type is technology risk, principally the risks associated with computer systems. It
implies the risks involved with information access, information availability and
infrastructure (Linsley and Shrives, 2006). Alozie (2001) describes technology risk as
the loss events “due to piracy, theft, failure, breakdown, or other disruption technology,
data or information”. The second type is fraud risk by management or employees. The
third type of operational risk is human factor risk; it relates to potential losses resulting
from human errors (e.g. accidentally destroying a file), including external loss events
(e.g. following a natural disaster).
Legal, Tax and Regulatory Risk: Legal, tax and regulatory risk arises for a whole
variety of reasons. An example of legal risk is the involvement in lawsuits or the
infringement of legal norms. Another example is a change in tax law which may have
vast implication for a firm.
Business, Strategic and Reputation Risk: Business risk, strategic risk and reputation
risk are grouped together. Following Croupy et al. (2006), these three types of risk are
identified as business risk. Business risk refers to the typical risks a company faces:
uncertainty about the demand for products, the price that can be charged for those
products, the cost of producing, stocking and delivering the products (Croupy et al.,
2006). The risk associated with actions by competitors (Tofik, 2006) and potential losses
of competitive advantage (Cabedo and Tirdo, 2004) are other examples of business risk.
Strategic risk refers to the risk associated with significant investments for which
high uncertainty exists about success and profitability (Crouhy et al 2006). A firm
investing in research and development (R & D), for example, encounters uncertainty
about the relation between its R & D investment and new product or process outputs
(Miller,1992).
6
Auditing Risk in …
Reputation risk refers to the risk that a good reputation which can leads to value
creation, turns to a bad reputation and, as a result, company value being destroyed
(Ndukwe, 2009). Daferighe and Adedeji (2010), see reputation risk as a range of threats’
that have the potential to undermine a company’s ability to function as a commercial
enterprise and impair its standing to the community, an intangible asset that is very
costly.
The effect of business risk is the threat that an event or action will adversely
affect a business’s ability to achieve its ongoing objectives, and consequently,
management may tend to adopt measures that give false impression of the financial
position, hence emergence of ‘Audit Risk’, the probability that the auditor would draw
and invalid audits conclusion and therefore, expressed invalid audit opinion. It is the
probability of reporting that financial statements present a true and fair view whereas
they do not and vice versa. (Adenuyi, 2010, Babatunde, 2005, Whitigton and Pany,
2004).
Control Risk: This is the probability that if material misstatement financial information
occurs, the internal controls are weak, there is a higher risk of fraud and error, so the
control risk will be high, example of control risk is lack of integrity by top management
staff.
Detection Risk: This is the probability that the auditor’s substantive procedures will not
detect material misstatement that exist within a class of transactions or an account
balance. The level of detection is determined by the uncertainties that are due to
sampling risk.
7
Academic Excellence
Prior Empirical Studies on Risk Disclosure
In recent years, corporate reporting shifted from the disclosure of financial
results toward informing the shareholders and other stakeholders about a wide variety of
topics. One of these topics is risk (Ndukwe, 2009). Investors know that creating value
regimes involves risk-taking and they like to know which risks the company faces and
how these risks are (or will be) managed (Ekechi, 2001). As a result, there is an
increasing demand for transparent risk reporting in annual reports. Bolaji (2004) defines
risk disclosure as “the communication of information concerning firms’ strategies,
characteristics, operations, and other external factors that have the potential to affect
expected results”.
Few empirical studies have been published on the subject of corporate risk
disclosure and, more specifically, on auditing risk on computerized accounting
information system. A number of these rely on content analysis of animal or
management reports and what external auditors do. Beattie, Mcllennes and Fearnley,
(2004) distinguish two categories: subjective (analyst rating) and semi- objective
(disclosure index studies, content analysis, readability studies, and linguistic analysis).
Content analysis has been selected for this study because it has been widely used in the
accounting research, particularly in corporate disclosure studies (Beretta and Bozzalan,
2004; Deumes,2005; Linsley and Shrives, 2006; Abraham and Cox, 2007).
8
Auditing Risk in …
Z = Z-Score Value
SD = Standard Deviation
DN = Calculated and table values for Kolmogorov-Smirnov test
F = the number of observations
Fo(x) = The specified (or theoretical) cumulative frequency distribution
under Ho for any value of x.
Fo(x) = The observed cumulative frequency distribution of a random
sample of N observation for any value of x.
The critical value of D for sample size of N > 35. The decision rule is that Ho will be
rejected if the calculated Dcal is greater than the tabulated Dtab under the deviation level
of 5 percent.
9
Academic Excellence
Source: Field Survey, Data 2012.
685
= ∑ = /10 = 68.5
(x − x )
n−1
7140
= /10-1
7140
= /9 = 793.33
( )
Standard Deviation (SD) =
= √793.33
= 28.17
Applying the central limit theorem :
Z= x-x
SD is exactly standardized where; n > 30
Where x = 40; SD = 28.17, = 68.5
Z = 40 – 68.5
28.17
Z = - 1.01
Pr (Z > - 1.01) 1 – Pr (Z - 1.01)
= 1 – (0.5000 – 0.45640
= 0.0436
From the above computations, the following statistical results are obtained:
Mean (x) = 68.5
Standard deviation (SD) = 28.17
Distribution (Z) = 0.0436.
This implies that there is 0.436 probability that the mean will lie outside the standard
deviation or 95% probability that all variables listed and studied as business risk factors
affect audit risk.
From the Kolmogorov – Smirnov Frequency Table for the Hypothesis, the
Calculated D-value is the point of greatest divergence between the cumulative observed
and cumulative theoretical distributions, which is 0.15. The tabulate D from the
Kolmogorov – Smionor Test table at = 0.05 for sample size N > 35, is given as:
.
D= = = 0.22
√ √
This shows that Dcal is greater than Dtab; thus, in accordance with the decision
rule, the null hypothesis (Ho) which states that “use of audit tool kits in a computerized
accounting environment does not reduce audit risk” is rejected, meaning that, these tool
kits are necessary for a successful audit programme in a computerized accounting
system environment.
Thus, auditors have to carefully plan their work with emphasis on high risk
areas, that is, must gather enough evidence to reduce audit risk to the barest minimum
particularly when it has to do with reports generated from computerized accounting
information system. The implication here is for external auditors to rise to the occasion
of improving in their skills, knowledge and due diligence when performing audits in a
computerized accounting information system environment.
The table shows that 17 respondents apply standard audit tool kits in their audit
approach, representing an aggregate percentage of 42.5%. 18 respondents (45%) used
these kits at low extent and 5 respondents (12.5%) do not use them at all. These imply
that much needed to be done by auditors to be able to cope with challenges and risks
associated with computerized accounting information system.
11
Academic Excellence
Test of Hypothesis
The data obtain in table 2 is used to test the hypothesis using Kolmogorov –
Smirnor test.
Fo(x) = Theoretical
cumulative distribution 0.2 0.4 0.8 0.6
of choices under Ho.
Fo(x) = Cumulative
distribution of observed 0.25 0.41 0.88 0.75
choices under Ho.
Data in table 3 shows that of the forty external auditors surveyed, seven use
audit tool kit at high extent, ten at moderate extent, eighteen at low extent and five not at
all. Applying the Kolmogorov Smirnov test, 0.05 and 0.01 for high extent and moderate
extent are significant at 5 percent deviation level.
12
Auditing Risk in …
This is to enable them know what audit programme will be suitable and whether
they have the technical know-how for such engagements.
2. Regular training and retraining on contemporary audit techniques for an audit
firm staff.
3. Mandatory ICT knowledge/skills is located as a prerequisite for granting of
licence to practice by the relevant accounting professional bodies such as ICAN
and ANAN.
References
Abraham, S. & Cox, P. (2007). Analyzing the determinants of narrative risk information
in UK FTSE 100 annual reports. The British Accounting Review, 227 – 248.
Adeniyi, A. A. (2010). Auditing and assurance services, Lagos: Value Analysis Consult
(Publishers).
AICPA (American Institute of certified Public Accountants (2008). Reports of the task
force on risks and uncertainties”, New York: AICPA.
Babatunde, F. (2005). Audit companion: Practice and revision Kit, Lagos, FBV
publications.
Beretta, S. and Bozzolan, S. (2004). A framework for the analysis of firm risk
communication”. The International Journal of Accounting; Vol. 39 (s); 265-288.
Bolaji, C. A. (2004). Disclosure level and the cost of equity capital. Lagos: Bright
Publishers.
Chike, K. (2004). Credit risk modeling and valuation. Lagos: Journal of Business
communication, Vol. 142 92) 120 -157.
13
Academic Excellence
Crouly, M. Galai, D. and Mark, R. (2006). The essentials of risk management, McGraw
Hill: New York.
Dozie, M. K. (2007). The level of corporate risk disclosure in Nigeria. Owerri, Ozbee
Press.
14
Auditing Risk in …
Tofik, P. (2006). The theory and practice of risk management policy, Ibadan, University
Press.
Whittington & Pany, K. (2004). Auditing and other Assurance Services (14th ed.)
Boston: McGraw Hill.
APPENDIX I
Business Risk and Audit Risk Matrix
Weight
1 Managing integrity High 3 30 90
2 Management competence Moderate 2 25 50
3 Susceptibility to irregularities due to High 3 30 90
nature of business
4 Complexity of class of transaction Low 1 30 30
5 Susceptibility of asset to loss or High 3 30 90
misappropriation
6 Materiality of the item High 3 25 75
7 Financial position of the client Moderate 2 20 40
8 business Moderate 2 25 50
9 The company’s environment Moderate 2 25 50
Quality of accounting system
10 High 3 40 120
Internal controls system
685
Number of respondents = 40
Key: High risk = 3, moderate risk - 2, low risk = I
1. Embedded audit facilities
2. Integrated test facilities (ITF)
3. System controls and review file (scare)
4. Tracing software
5. Snapshots
6. Systems software data analysis
7. Parallel simulation.
15