You are on page 1of 13

Course Description

This course complements the course in auditing. It discusses information technology (IT) – related risks, security and control mechanisms and techniques that may be
employed to address the risks, and the impact of computer use on the audit. It also introduces computer assisted audit techniques and tools. In this course, students
gain an appreciation of the particular features and understanding of the risks involved in auditing in a CIS environment, the CIS controls they would expect to find in
this area. The students gain hands-on experience in the use of computers in performing audits.

I. COURSE LEARNING OUTCOMES

Upon completion of the course, the students will be able to:

Cognitive
1. Discuss the impact of computers on accounting systems.
2. Explain the effects of computers on the audit process.
3. Discuss the auditor’s responsibilities with respect to internal control over Electronic Data Processing (EDP) systems.
4. Identify major types of computer fraud.
5. Discuss the basic audit procedures applied in evaluating the internal control and substantive testing in a CIS environment.

Psychomotor
1. Demonstrate awareness how audit planning is done in a CIS environment.
2. Demonstrate basic skills in designing audit programs for IT audits.
3. Prepare an IT audit report.

Affective
1. Support the vision, mission and goals of the University, the College and the Department
2. Comply with PAPS 1013, Electronic Commerce – Effect on the Audit of Financial Statements.
3. Exemplify the code of ethics that IT auditors follow.

II. TEXTBOOK(S) AND REFERENCE(S)

Textbook : Information Technology Auditing


By: James A. Hall
3rd Edition

References : Principles of Auditing and Other Assurance Services


By: Ray Whittington and Kurt Pany
2012 Edition, McGraw-Hill Companies

Auditing and Assurance Services: An Integrated Approach


By: Alven Arens, et.al.
2011 Edition, Pearson Prentice Hall

Note on textbook(s) and reference(s): The teacher reserves the right to choose the textbook(s) and reference(s) he/she deems
appropriate.

III. DETAILED COURSE OUTLINE/LEARNING PLAN

WK HRS TOPIC LEARNING OUTCOMES STRATEGIES/ACTIVITIES ASSESSMENT OF LEARNING


OUTCOMES
1 1.5   
1 1.5 Auditing and Internal Control

 Overview of auditing  Differentiate attest  Lecture/Discussion  Drill


 The role of the audit services from advisory  Class sharing  Students to submit written
committee services and explain the  Review workshop analysis on cases
 Financial audit relationship between the  Case analysis and assigned
components two. presentation  Quiz on the topic
 Audit risk  Explain the structure of an  Assign readings for the
 The IT audit audit and the conceptual next meeting
 Internal control elements of the audit  Assign cases for the next
 Internal control objectives, process. topic
principles, and models  Identify internal control
categories presented in
the COSO framework.
 Describe key features of
Section 302 and 404 of
the Sarbanes-Oxley Act.
 Explain the relationship
between general controls,
application controls, and
financial data integrity.

2 3 Auditing IT Governance Controls

 Information technology
governance  Explain the risks of  Lecture/Discussion  Drill
 Structure of the incompatible functions  Class sharing  Students to submit written
information technology and how to structure the  Video clip presentation analysis on cases
function IT function.  Case analysis and assigned
 The computer center  Describe the controls and presentation  Quiz on the topic
 Disaster recovery planning precautions required to  Assign readings for the
 Outsourcing the IT ensure the security of an next meeting
function organization’s computer  Assign cases for the next
facilities. topic
 Explain the key elements
of a disaster recovery
plan.
 Describe the benefits,
risks, and audit issues
related to IT outsourcing.

3 3 Security Part I: Auditing Operating


Systems and Networks

 Auditing operating  Identify the principal  Lecture/Discussion  Drill


systems threats to the operating  Role playing  Students to submit a
 Auditing networks system and the control  Case analysis and reflection paper on the role
 Auditing electronic data techniques used to presentation play presented
interchange (EDI) minimize the possibility of  Students to submit written
 Auditing PC-based actual exposures. analysis on cases
accounting systems  Explain the principal risks assigned
associated with commerce  Quiz on the topic
conducted over intranets
and the Internet and the
control techniques used to
reduce these risks.
 Identify the risks
associated with personal
computing systems.
 Recognize the unique
exposures that arise in
connection with electronic
data interchange (EDI)
and explain how these
exposures can be
reduced.

4 3 Security Part II: Auditing Database


Systems

 Explain the operational  Lecture/Discussion  Drill


 Data management problems inherent in the  Group discussion  Students to submit written
approaches flat-file approach to data  Case analysis and analysis on cases
 Key elements of the management that gave presentation assigned
database environment rise to the database  Quiz on the topic
 Databases in a distributed approach.
environment  Explain the relationships
 Controlling and auditing among the fundamental
data management components of the
systems database concept.
 Recognize the defining
characteristics of three
database models:
hierarchical, network, and
relational.
 Explain the operational
features and associated
risks of deploying
centralized, partitioned,
and replicated database
models in the DDP
Environment.
 Describe the audit
objectives and procedures
used to test data
management controls.

5 3 Systems Development and


Program Change Activities

 Participants in systems  Identify the stages in the  Lecture/Discussion  Drill


development SDLC.  Oral recitation  Graded oral recitation
 Information systems  Describe common  Case analysis and  Students to submit written
acquisition problems that can lead to presentation analysis on cases
 The systems development failure in the systems assigned
life cycle development process.  Quiz on the topic
 Controlling and auditing he  Explain the importance of
SDLC strategic system planning.
 Describe how
accountants participate in
the SDLC.
 Identify the basic features
of both the structured and
object-oriented
approaches to systems
design.
 Discuss the major steps
involved in a cost-benefit
analysis of proposed
information systems.
 Enumerate the
advantages and
disadvantages of the
commercial software
option, and discuss the
decision-making process
used to select commercial
software.
 Explain the purpose of a
system walkthrough.
 Describe the different
types of system
documentation and the
purposes they serve.

6 2 PRELIM EXAMINATION
7 3 Transaction Processing and
Financial Reporting Systems
Overview

 An overview of transaction  Explain the broad  Lecture/Discussion  Drill


processing objectives of the three  Illustration through the  Students to submit written
 Accounting records transaction cycles and the extensive use of graphics analysis on cases
 Documentation techniques types of transactions such as figures, diagrams, assigned
 Computer-based processed by each of flowcharts and tables  Students to take a moving
accounting systems them.  Case analysis and quiz.
 Data coding schemes  Explain the relationship presentation
 The general ledger system between traditional  Assign readings for the
accounting records and next meeting
 The financial reporting
their digital equivalents in  Assign cases for the next
system
computer-based systems. topic
 XBRL-reengineering
 Describe the
financial reporting
documentation techniques
 Controlling the FRS used for representing
manual and computer-
based systems.
 Explain the technologies
used to automate and
reengineer accounting
information systems.
 Explain the operational
features of the general
ledger system (GLS) and
the financial reporting
system (FRS).

8-9 6 Computer-Assisted Audit Tools


and Techniques
 Application controls  Identify the classes of  Lecture/Discussion  Drill
 Testing computer transaction input controls  Oral recitation  Graded oral recitation
application controls used by accounting  Case analysis and  Students to submit written
 Computer-aided audit applications. presentation analysis on cases
tools and techniques for  Explain the objectives and  Assign readings for the assigned
testing controls techniques used to next meeting  Quiz on the topic
implement processing  Assign cases for the next
controls, including run-to- topic
run, operator intervention,
and audit trail controls.
 Explain the methods used
to establish effective
output controls for both
batch and real-time
systems.
 Differentiate black box
auditing from white box
auditing.
 Discuss the key features
of the CAATTs.

9-10 6 Data Structure and CAATTs for


Data Extraction

 Data structure  Explain the components  Lecture/Discussion  Drill


 Designing relational of data structures and  Class sharing  Students to submit written
database how these are used to  Quiz show analysis on cases
 Embedded audit module achieve data-processing  Illustration through the assigned
 Generalized audit software operations. extensive use of graphics  Quiz on the topic
 ACL software  Discuss the structures such as figures, diagrams,
used in flat-file systems, flowcharts and tables
including sequential,  Case analysis and
indexes, hashing, and presentation
pointer structures.  Assign readings for the
 Discuss the relational next meeting
database structures and  Assign cases for the next
the principles of topic
normalization.
 Explain the features,
advantages, and
disadvantages of the
embedded audit module
approach to data
extraction.
 Identify the capabilities
and primary features of
generalized audit
software.
 Describe the more
commonly used features
of ACL.

11 2 MIDTERM EXAMINATION
12-13 6 Auditing the Revenue Cycle

 Revenue cycle activities  Explain the operational  Lecture/Discussion  Drill


and technologies tasks associated with the  Oral recitation  Students to submit written
 Revenue cycle audit revenue cycle under  Illustration through the analysis on cases
objectives, controls, and different levels of extensive use of graphics assigned
tests of controls technology. such as figures, diagrams,  Quiz on the topic
 Substantive tests of  Explain the audit flowcharts and tables
revenue cycle accounts objectives related to the  Case analysis and
revenue cycle. presentation
 Discuss the revenue cycle  Assign readings for the
control issues related to next meeting
alternative technologies.  Assign cases for the next
 Recognize the topic
relationship between
revenue cycle audit
objectives, controls, and
tests of controls.
 Explain the nature of
substantive tests in
achieving revenue cycle
audit objectives.
 Describe the common
features and functions of
ACL that are used to
perform substantive tests.

14-15 6 Auditing the Expenditure Cycle

 Expenditure cycle  Explain the primary tasks  Lecture/Discussion  Drill


activities and technologies associated with the  Group activity in a form of  Students to submit a
 Expenditure cycle audit expenditure cycle under talk show with audience journal about the group
objectives, controls, and different levels of participation activity
tests of controls technology.  Illustration through the  Students to submit written
 Substantive tests of  Explain the audit extensive use of graphics analysis on cases
expenditure cycle objectives related to the such as figures, diagrams, assigned
accounts expenditure cycle. flowcharts and tables  Quiz on the topic
 Discuss the expenditure  Case analysis and
cycle control issues presentation
related to alternative  Assign readings for the
technologies. next meeting
 Recognize the  Assign cases for the next
relationship between topic
expenditure cycle audit
objectives, controls, and
tests of controls.
 Explain the nature of
substantive tests in
achieving expenditure
cycle audit objectives.
 Describe the common
features and functions of
ACL that are used to
perform substantive tests.

16 3 Enterprise Resource Planning


Systems

 What is an ERP?  Explain the general  Lecture/Discussion  Drill


 ERP system functionality and key  Class sharing  Students to submit written
configurations elements of ERP  Illustration through the analysis on cases
 Data warehousing systems. extensive use of graphics assigned
 Risks associated with ERP  Explain the various such as figures, diagrams,  Quiz on the topic
implementation aspects of ERP flowcharts and tables
 Implications for internal configuration including  Case analysis and
control and auditing servers, databases, and presentation
the use of bolt-on  Assign readings for the
software. next meeting
 Explain the purpose of  Assign cases for the next
data warehousing as a topic
strategic tool and
recognize the issues
related to the design,
maintenance, and
operation of a data
warehouse.
 Recognize the risks
associated with ERP
implementation.
 Identify the key
considerations related to
ERP implementation.
 Explain the internal
control and auditing
implications associated
with ERPs.

17 3 Business Ethics, Fraud, and Fraud


Detection

 Ethical issues in business  Identify the broad issues  Lecture/Discussion  Drill


 ISACA code of ethics pertaining to business  Role playing  Students to submit written
 Fraud and accountants ethics.  Video clip presentation analysis on cases
 Auditor’s responsibility for  Explain what constitutes  Case analysis and assigned
detecting fraud fraudulent behavior. presentation  Students to submit a
 Fraud detection  Explain fraud-motivating reflection paper on the role
techniques forces. play presented
 Identify typical fraud  Quiz on the topic
schemes perpetrated by
managers and
employees.
 Discuss the common anti-
fraud techniques used in
both manual systems and
computer-based systems.
 Describe the use of ACL
in the detection of fraud.
18 2 FINAL EXAMINATION

IV. EXPECTATIONS FROM STUDENT


Every student is expected to:
1. Come to each class prepared and participate in the class discussions,
2. Take all quizzes/examinations on the date scheduled,
3. Read the assigned topics prior to class,
4. Solve assigned problems prior to class,
5. Submit course requirements, if any, on time,
6. Abide with class policies, and
7. Understand the course syllabus

You might also like