You are on page 1of 3

usually a customer account, an individual understanding of the nature of a computer and

transaction, or a line item on a transaction. The capabilities is needed.


following items need further explanation when
Hardware
using nonstatistical sampling:
A computer is a machine that can be
 Identifying individually significant items
programmed to accept data (input), process it to
 Determining the sample size
useful information (output), and store it away (in
 Selecting sample items a secondary storage device) for safekeeping or
 Calculating the sample results later reuse. The processing of input to output is
Identifying individually significant items. The directed by the software but performed by the
auditor determines which items should be hardware. To function, a computer system
tested and which items should be subjected to requires four main aspects of data handling:
sampling. The items that will be tested input, processing, output, and storage. The
individually are items that may contain potential hardware responsible for these four areas is as
misstatements that individually exceed the follows:
tolerable misstatement. These items are tested  Input devices accept data or commands
100% because the auditor is not willing to accept in a form that the computer can use; they
any sampling risk. send the data or commands to the
Determining the sample size. The formula used processing unit.
by auditor based on AICPA Audit Guide, audit  The processor (CPU) has electronic
sampling is circuitry that manipulates input data
into the information people want.
𝑃𝐵
𝑆= 𝐴𝐹  Output devices show people the
𝑇𝑀 processed data – information – in
PB = Population book value understandable and usable form.
TM = Tolerable Misstatement  Storage (secondary storage) which
AF = Assurance factor consists of secondary storage devices
such as disk.
Selecting sample items. When using
nonstatistical sampling, the auditor may use Software
some form of random sampling or systematic
The software really makes the computer useful.
selection method including the haphazard
Generally, it is categorized as systems software
sampling.
or application software.
Calculating the sample results. The AICAP Guide,
 System software (operating system) is
Audit sampling described to accept the methods
the underlying software found on all
of projecting the amount of misstatement found
in the nonstatistical sample. These methods are: computers. It serves as intermediary
software between the application
 Ratio method (ratio estimation) software and hardware. Some important
 Average difference method (difference tasks of an operating system are
estimation) managing the computer’s resources
(CPU, disk drives, printers) and running
the applications software.
CHAPTER 11  Application software may be either
AUDITING IN A COMPUTERIZED SYSTEMS custom or packaged.
ENVIRONMENT UNIQUE CHARACTERISTICS OF SPECIFIC EDP
THE COMPUTER ENVIRONMENT SYSTEMS

INTRODUCTION TO AN ELECTRONIC DATA Computer information systems differ as to their


PROCESSING SYSTEM characteristics. A system, regardless of its size,
may possess the following elements:
Before considering the impact of IT on the work
of the certified public accountant, some  Batch processing
 Online capabilities
 Database storage Networks that span a large geographical area are
 Computer networks called wide are network (WANs). Local are
 End user computing network (LAN) is a communication network that
allows resources, data, and program sharing
Batch processing within limited geographical area.
It is a common EDP system. The input data are Networking enables companies to implement
gathered and processed periodically in discreet distributed data processing, in which
groups. While batch computer systems do not information and programs are shared by large
provide up-to-the-minute information, they are number of users.
often more efficient than other types of systems.
Computer security should be established at each
Online Capabilities location to ensure that the data can be changed
It allows users to have direct (online) access to or accessed by authorized personnel.
the data stored in the system. When an online End User computing
system in use, individual transactions may be
entered directly from the originators at remote The user departments are responsible for the
locations. The transactions may be held in a development and execution of certain computer
transaction file and later posted to the records application when a company implements end
as a batch, or real-time processing may be used. user computing. A user department both
In online, real time (OLRT) systems, transactions generated and uses its own information. The
are processed immediately, and all accounting information systems department is generally
records are updated instantaneously. not involved in these applications.

The use of OLRT system results in a significant Computer security should be established at each
changes in internal control. Original source location to prevent unauthorized access to the
documents my be available to support input to company’s data.
the computer and the overall amount of the hard IMPACT OF COMPUTERS ON ACCOUNTING
copy audit trail may substantially reduced. SYSTEMS
Essential controls should be programmed into
the computer. The use of computers in business information
systems has fundamental effects on the nature
Database storage of business transacted, the procedures followed,
In a database system, separate application files the risks incurred, and the methods of
(master files) are replaced with integrated mitigating those risks. These effects flow from
databases that are shared by many users and the characteristics that distinguish computer-
application programs. It eliminates much of data based from manual processing.
redundancy, and since database is normally
 Consistency of performance
stored on a direct access device, the system
 Concentration of duties
responds quickly to users’ requests for
 Systems generated transactions
information.
 Documents are not maintained in
It is essential that the database be secured readable form
against improper access or alteration.  Reports can be generated easily
Organizations that use database systems often
create a data administrator function, with Consistency of performance
responsibility for implementing and If the computer is programmed to perform
maintaining central databased and controlling specific task, it will run consistently so long as
access to the data. failures do not occur.
Computer Networks Concentration of duties
Networks of computers linked together through Incompatible duties are frequently combined
telecommunication links enable companies to within the system provided there are
communicate information back and forth compensating controls that are put in place.
between geographically dispersed business
locations. Systems generated transactions
There are programs that automatically compute Virus infects programs already in existence by
certain transaction without the need for an input inserting new code. The primary purpose of a
document. virus is to reproduce. It may also have a
secondary function such as destroying data,
Documents are not maintained in readable form
when the target program is executed, the virus
Data can be entered into the system without infects another program. The secondary viral
supporting documents. For example, in an function is then performed at some later time,
electronic data interchange (EDI) system a perhaps using a bomb as a trigger.
purchase transaction may be automatically Characteristics of a virus include replication,
initiated by the client’s computer by sending an requires a host program as a carrier, activated by
electronic message (purchase order) directly to a external action, and replication limited to
supplier’s computer system. Invoicing and system.
payment for the purchase may also be processed
Trojan Horse
electronically.
A trojan horse is a program that performs a
Reports can be generated easily
useful (normal) function, but also performs an
In online, real-time systems, transactions are unexpected action – a form of virus (attack or
processed immediately and all accounting trap door).
records are updated instantaneously.
Worm
COMPUTER FRAUD
A worm differs from a virus in that it reproduces
Computer fraud is rampant, as the use of on its own, rather than requiring a program host.
computers becomes part of our daily lives, with Characteristics of a worm include replication,
greater and greater frequency. The definition of does not require a host (self-contained)
what constitutes computer fraud becomes even activated by creating a process (needs a
more complex with the ingenuity of people who multitasking system), and replication occurs
intend to deceive, mispresent, destroy, steal across communication links for network worms.
information, or cause harm to others by
Bomb
accessing information through deceptive and
illegal means. More and more people across the A logic bomb goes off when the program being
globe are becoming comfortable with the online normally arrives at a prespecified event (e.g., a
purchasing process. But as more people start financial calculation exceeds a certain peso
buying things online, computer fraud is amount). A time bomb goes off at a prespecified
becoming a much larger problem than anyone time.
could have guessed. Just as you have to be
Trap Door
careful when you’re walking down the street, or in
your own home when you lock up at night, you’ve A trap door allows a user to gain more access to
got to be careful of the many examples of more system functions that are normally
computer fraud that will make their way onto available. These access privileges can be
your computer. obtained through a keyboard sequence or
system condition (e.g., an aborted system start-
Today’s fraudsters aren’t just bored teenagers
up). Once the access is obtained, the user can
anymore. The online criminals of today are
then manipulate, change, or destroy data.
skilled computer experts who know how to
manipulate your computer into giving them the Auditors should be alert to the potential for these
information they need for their computer fraud types of techniques used in fraud when
schemes. And the worst part is that you can have evaluating control risk for clients using
crucial information stolen from you without ever computerized systems.
knowing what had happened.
INTERNAL CONTROL IN THE COMPUTER
Frauds have typically relied on techniques INFORMATION SYSTEM
(malicious code) unique to computers such as
Virus, Trojan horse, Worm, Bomb and Trap door. AUDITOR’S RESPONSIBILITIES

Virus Management has the responsibility to maintain


controls that provide reasonable assurance that

You might also like