Computer Assisted Audit Techniques

It is very convenient for a CPA to use Computer-Assisted Audit Techniques (CAATs) when auditing a business. CAATs may improve the effectiveness and efficiency of auditing procedures. They may also provide effective test tests of controls and substantive procedures where there are no input documents or a visible audit trail, or where population and sample are very large. The purpose of this Statement is to provide guidance on the use of CAATs. It applies to all uses of CAATs involving a computer of any type or size.
Description of Computer Assisted Audit Techniques (CAATs)
CAATs are computer programs and data the auditor uses as part of the audit procedures to process the data of audit significance contained in an entity’s information systems. The data may be transaction data, on which the auditor wishes to perform tests of controls or substantive procedures, or they may be other kinds of data. For example, details of the application of some general controls may be in the form of text or other files by applications that are not part of the accounting system. The auditor can use CAATs to review those files to gain evidence of the existence and operation of those controls.

Considerations in the use of CAATs

The IT Knowledge, Expertise and Experience of the Audit Team
According to PSA 401 “Auditing in a Computer Information Systems Environment” deals with the level of skill and competence the audit team needs to conduct an audit in an IT environment.
The audit team should have sufficient knowledge to plan, execute and use the results of the particular CAAT adopted. The level of knowledge required depends on the complexity and nature of the CAAT and of the entity’s information system.
The Availability of CAATs and Suitable Computer Facilities and Data
The auditor may plan to use the other computer facilities when the use of CAATs on an entity’s computer is uneconomical or impractical.
Impracticability of Manual Test
Some audit procedure may not be possible to perform manually because they rely on complex processing or involve amounts of data that would overwhelm any manual procedure. In addition, many computer information systems perform tasks for which no hard copy evidence is available and therefore, it may be impracticable for the auditor to perform tests manually.
Effectiveness and Efficiency
The effectiveness and efficiency of auditing procedures may be improved by using CAATs to obtain and evaluate audit evidence.
Timing
Certain data, such as transaction details, are often kept for only a short time, and may not be available in machine-readable form by the time the auditor wants them. Thus, the auditor will need to make arrangements for the retention of data required, or may need to alter the timing of the work that requires such data.

Using CAATs
The major steps to be undertaken by the auditor in the application of a CAAT are to:

a. Set the objective of the CAAT application
b. Determine the content and accessibility
c. Identify the specific files or database to be examined
d. Understand the relationship between the data tables where a database is to be examined
e. Define the specific tests or procedures and related transactions and balances affected
f. Define the output requirements
g. Arrange with the user and IT departments, if appropriate, for copies of the relevant files or database tables to be made at the appropriate cutoff date and time
h. Identify the personnel who may participate in the design and application of the CAAT
i. Refine the estimates of costs and benefits
j. Ensure that the use of CAATs is properly controlled and documented
k. Arrange the administrative activities, including the necessary skills and computer facilities
l. Reconcile data to be used for the CAAT with the accounting records
m. Execute the CAAT application; and
n. Evaluate the results.

Using CAATs in Small Entity IT Environment
Great emphasis on tests of details of transactions and balances and analytic review procedures, which may increase the effectiveness of certain CAATs, particularly audit software.
Where smaller volumes of data are processed, manual methods may be more cost effective. A small entity may not be able to provide adequate technical assistance to the auditor, making the use of CAATs impracticable. Certain audit package or generalized audit software may not operate small computers, thus restricting the auditor’s choice of CAATs.
Computer-Assisted Audit Techniques (CAATs)

Audit Productivity Software

Are tools used by auditors that facilitate their productivity by automating the auditing function and lessen the amount of time they spend on other administrative tasks. These tools include electronic working paper, groupware, engagement management, reference libraries and document management.

Generalized Audit Software Tool

Is the tool use by the auditors to automate different audit task. Design to read, process and write data with the aid of functions performing specific audit routines and with self-made macros.

Testing Computer Application Controls

Two General Approaches – Black box (around the computer) approach
– White box (through the computer) approach

Black box approach

Auditors do not just rely on a detailed knowledge of the application’s internal logic. Instead, they seek to know the functional characteristics of the application by analyzing flowcharts and interviewing knowledgeable personnel in the client’s organization.

White box approach

Relies on an in-depth knowledge of the internal logic of the application being tested.
COMMON TYPES OF TESTS OF CONTROLS

Authenticity tests – which verify that an individual, a programmed procedure, or a message attempting to access a system is authentic.
Accuracy tests – which ensure that the system processes only data values that conform to specified tolerances.
Completeness tests – identify missing data within a single record and entire records missing from a batch.
Redundancy tests – determine that an application processes each record only once.
Access tests – which ensure that the application prevents authorized users from unauthorized access to data.
Audit trail tests – which ensure that the application creates an adequate audit trail.
Rounding error tests – verify the correctness of rounding procedures.

Computer-Aided Audit Tools and Techniques for Testing

a. Test data method – is used to established application integrity by processing specially prepared sets of input data through production applications that are under review.
b. Integrated test facility approach is an automated technique that enables the auditor to test an application’s logic and controls during its normal operation.
c. Parallel simulation – requires the auditor to write a program that simulates key features or processes of the application under review.

Continuous Auditing Techniques

Binary check – determine whether a control is working effectively. Example is the inventory count.
Outlier – is a numerical value that is significantly different than one might expect.
Trends – analysis software to identify trends.

Electronic Commerce−Effect on the Audit of Financial Statements
The purpose of this Philippine Auditing Practice Statement is to give guidance to assist auditors of financial statements where an entity engages in commercial activity that takes place by means of connected computers over a public network. The purpose of the auditor’s consideration is not to make an opinion or provide consulting services regarding the entity’s e-commerce systems.
The internet refers to the worldwide network of computer networks that is nowadays very useful to the public. It is a shared public network that enables communication with other entities and individuals around the world making the world smaller for everybody. There is some risk that is inevitable when using public network that the auditor must know.
Skills and Knowledge
It is important that the auditor has the skills and knowledge to perform the audit. He is also responsible to ensure that the IT personnel is suited to have business knowledge to perform the audit. They must know the what to affect the financial statements like the entity’s strategy and activities, technology applied and risks that can affect the business.
Knowledge of the Business
The auditor must acquire knowledge of the business enough to enable the auditor to identify and understand the events, transactions, and practices that may have a significant effect on the financial statements or on the audit report. Knowledge of the business includes a general knowledge of the economy and the industry within which the entity operates. The growth of the e-commerce may have a big effect on the entity’s traditional business environment.
Risk Identification
It is inevitable for a management to face risks relating to the business activities of the company like; loss of transaction integrity; pervasive e-commerce security risk; system availability risk; loss of information privacy; improper accounting policies; noncompliance with taxation and other legal regulatory requirements; over reliance on e-commerce when placing significant business systems; and systems and infrastructure failures or crashes.
Internal Control Considerations
Internal controls can be used to alleviate many of the risks associated with e-commerce activities. In accordance with PSA 400, “Risk Assessments and Internal Control,” the auditor regards the control environment and control procedures the entity has applied to its e-commerce activities to the extent they are relevant to the financial statement assertions. As well as addressing security, transaction integrity, and process alignment.
The Effect of Electronic Records on Audit Evidence
Electronic records of evidence can be easily destroyed or altered and there may not be any proper records for business transaction. The auditor accounts whether the entity’s security of information policies, and security controls as implemented are sufficient to prevent unauthorized changes to the accounting system or records. The auditor may test automated controls to check the record integrity, digital signatures, electronic date stamps and the likes. Depending on his assessment whether to perform additional procedures or not.
IT Risk and Controls
1. Identifying IT Risk – It is important to identify risks to your IT systems and data, to reduce or manage those risks, and to develop a response plan in the event of an IT crisis. IT risks include:

Hardware and software failure- like power loss or data corruption
Malware – malicious software designed to disrupt computer operation
Viruses – computer code that can copy itself and scatter from one computer to another, often disrupting computer operations
Spam, scan and phishing – unsolicited email that seeks to trick people into revealing personal details or buying fraudulent goods
Human Error – incorrect data processing, careless data disposal, or accident opening of infected email attachments.

Identifying IT Controls
They are specific activities performed by a person or system that have been designed to prevent or detect the occurrence of a risk that could threaten your information technology infrastructure and supported business applications. The two broad categories of IT controls are; general controls and application controls. Examples of general controls are strong password policy and encryption of mobile devices. Example of application control is anomaly detection system.
Documenting IT Controls
When documenting IT controls, it should include a particular description of the particular controls tested, the process used to test the controls, the number of times each control will be tested, the system used to pick the items selected, list of the item chosen, list of any exceptions, their causes and implications, and any modification or changes to our strategy resulting from our tests.
Monitoring IT Risks and Controls
Is the process for tracking pinpointed risks, monitoring excess risks, identifying recent risks, play risk response plans and evaluating their effectiveness throughout the project life cycle. It is very important not only for the auditors but also for the management together with the IT controller to monitor the risks and controls that will be applied to lessen the possible future outcome that can harm the business.

Calculate the price
Make an order in advance and get the best price
Pages (550 words)
$0.00
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know how difficult it is to be a student these days. That's why our prices are one of the most affordable on the market, and there are no hidden fees.

Instead, we offer bonuses, discounts, and free services to make your experience outstanding.
How it works
Receive a 100% original paper that will pass Turnitin from a top essay writing service
step 1
Upload your instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
Pro service tips
How to get the most out of your experience with MyhomeworkGeeks
One writer throughout the entire course
If you like the writer, you can hire them again. Just copy & paste their ID on the order form ("Preferred Writer's ID" field). This way, your vocabulary will be uniform, and the writer will be aware of your needs.
The same paper from different writers
You can order essay or any other work from two different writers to choose the best one or give another version to a friend. This can be done through the add-on "Same paper from another writer."
Copy of sources used by the writer
Our college essay writers work with ScienceDirect and other databases. They can send you articles or materials used in PDF or through screenshots. Just tick the "Copy of sources" field on the order form.
Testimonials
See why 20k+ students have chosen us as their sole writing assistance provider
Check out the latest reviews and opinions submitted by real customers worldwide and make an informed decision.
DATA565
The support team was late responding , my paper was late because the support team didn't respond in a timely manner. The writer of the paper finally got it right but seems there was a problem getting the revisioin to me.
Customer 452773, April 7th, 2024
Nursing
Impressive writing
Customer 452547, February 6th, 2021
FIN571
excellent work
Customer 452773, March 1st, 2024
Business and administrative studies
Thank you for your hard work and effort. Made a 96 out of 125 points Lacked information from the rubic
Customer 452773, October 27th, 2023
Human Resources Management (HRM)
excellent
Customer 452773, June 25th, 2023
History
Don't really see any of sources I provided, but elsewise its great, thank you!
Customer 452697, May 8th, 2021
ACC/543: Managerial Accounting & Legal Aspects Of Business
EXCELLENT JOB
Customer 452773, January 10th, 2024
FIN571
excellent
Customer 452773, March 15th, 2024
Business and administrative studies
great job as always
Customer 452773, February 26th, 2023
Business and administrative studies
Thank you for your hard work and help
Customer 452773, February 21st, 2023
Management
Love this writer!!! Great work
Customer 452597, April 5th, 2021
English 101
IThank you
Customer 452631, April 6th, 2021
11,595
Customer reviews in total
96%
Current satisfaction rate
3 pages
Average paper length
37%
Customers referred by a friend
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat
Close

Sometimes it is hard to do all the work on your own

Let us help you get a good grade on your paper. Get professional help and free up your time for more important courses. Let us handle your;

  • Dissertations and Thesis
  • Essays
  • All Assignments

  • Research papers
  • Terms Papers
  • Online Classes
Live ChatWhatsApp