Information technology auditing and application controls for small and mid-sized businesses : revenue, expenditure, inventory, payroll, and more /

Essential guidance for the financial auditor in need of a working knowledge of IT If you're a financial auditor needing working knowledge of IT and application controls, Automated Auditing Financial Applications for Small and Mid-Sized Businesses provides you with the guidance you need. Concept...

Full description

Saved in:
Bibliographic Details
Main Authors: Wood, Jason, 1976
Group Author: Brown, William C. Business writer; Howe, Harry, 1952
Published: John Wiley and Sons, Inc.,
Publisher Address: Hoboken, New Jersey :
Publication Dates: [2014]
Literature type: eBook
Language: English
Series: Wiley corporate F & A series
Subjects:
Online Access: http://onlinelibrary.wiley.com/book/10.1002/9781118801024
Summary: Essential guidance for the financial auditor in need of a working knowledge of IT If you're a financial auditor needing working knowledge of IT and application controls, Automated Auditing Financial Applications for Small and Mid-Sized Businesses provides you with the guidance you need. Conceptual overviews of key IT auditing issues are included, as well as concrete hands-on tips and techniques. Inside, you'll find background and guidance with appropriate reference to material published by ISACA, AICPA, organized to show the increasing complexity of systems, starting with gener.
Carrier Form: 1 online resource.
Bibliography: Includes bibliographical references and index.
ISBN: 9781118233191 (epub)
1118233190 (epub)
9781118222454 (pdf)
1118222458 (pdf)
9781118801024
1118801024
9781118261064 (oBook)
1118261062 (oBook)
Index Number: HD30
CLC: F239.1
Contents: Cover; Series; Title Page; Copyright; Dedication; Preface; Acknowledgments; Chapter 1: Why Is IT Auditing Important to the Financial Auditor and the Financial Statement Audit?; MANAGEMENT'S ASSERTIONS AND THE IT AUDIT; OBJECTIVES OF DATA PROCESSING FOR SMALL AND MEDIUM-SIZED ENTERPRISES (SMEs); SPECIAL CHALLENGES FACING SMEs; RESEARCH CONFIRMING THE RISKS ASSOCIATED WITH SMEs; A FRAMEWORK FOR EVALUATING RISKS AND CONTROLS, COMPENSATORY CONTROLS, AND REPORTING DEFICIENCIES; SUMMARY: THE ROAD AHEAD; Chapter 2: General Controls for the SME; GENERAL CONTROLS: SCOPE AND OUTCOMES.
THE "COSO PROCESS"-PUTTING IT ALL TOGETHER: FINANCIAL STATEMENTS, ASSERTIONS, RISKS, CONTROL OBJECTIVES, AND CONTROLSSUMMARY; Chapter 3: Application-Level Security; KEY CONSIDERATIONS; INITIAL SECURITY SETUP; SECURITY ROLE DESIGN; PASSWORD CONFIGURATION; SEGREGATION OF DUTIES; PERSONNEL, ROLES, AND TASKS; ACCESS REVIEWS; HUMAN ERROR; SUMMARY; Chapter 4: General Ledger and the IT Audit; THE GENERAL LEDGER: A CLEARINGHOUSE OF FINANCIAL INFORMATION; CHART OF ACCOUNTS FOR QUICKBOOKS; SME RISKS SPECIFIC TO THE GENERAL LEDGER AND THE CHART OF ACCOUNTS.
ASSERTIONS UNDERLYING THE FINANCIAL STATEMENTS AND GENERAL LEDGER CONTROLSIT CONTROLS, THE TRANSACTION LEVEL, AND THE GENERAL LEDGER; SUMMARY; Chapter 5: The Revenue Cycle; RISK EXPOSURES AND SUBPROCESSES; APPLICATION CONTROLS, REVENUE CYCLE RISKS, AND RELATED AUDIT PROCEDURES; SUMMARY; Chapter 6: The Expenditure Cycle; RISK EXPOSURES AND SUBPROCESSES; APPLICATION CONTROLS, EXPENDITURE CYCLE RISKS, AND RELATED AUDIT PROCEDURES; SUMMARY; Chapter 7: The Inventory Cycle; RISK EXPOSURES AND SUBPROCESSES; APPLICATION CONTROLS, INVENTORY CYCLE RISKS, AND RELATED AUDIT PROCEDURES; SUMMARY.
Chapter 8: The Payroll CycleRISK EXPOSURES AND SUBPROCESSES; APPLICATION CONTROLS, PAYROLL CYCLE RISKS, AND RELATED AUDIT PROCEDURES; SUMMARY; Chapter 9: Risk, Controls, Financial Reporting, and an Overlay of COSO on COBIT; PCAOB WARNINGS: INSUFFICIENT EVIDENCE TO SUPPORT OPINIONS; HOW WE GOT HERE: A HISTORICAL PERSPECTIVE; RISK; RISK AND FRAUD; CONTROLS; FINANCIAL REPORTING; PCAOB GUIDANCE ON IT CONTROLS; INTEGRATING COSO, COBIT, AND THE PCAOB; SUMMARY; Chapter 10: Integrating the IT Audit into the Financial Audit; RISKS, MATURITY, AND ASSESSMENTS.
CROSS-REFERENCING COBIT TO THE PCAOB AND COSOPLAN AND ORGANIZE; PROGRAM DEVELOPMENT AND CHANGE; COMPUTER OPERATIONS AND ACCESS TO PROGRAMS AND DATA; MONITOR AND EVALUATE; SUMMARY; Chapter 11: Spreadsheet and Desktop Tool Risk Exposures; SPECIFIC TYPES OF RISKS AND EXPOSURES; RESEARCH ON ERRORS IN SPREADSHEETS; COMPLIANCE DIMENSIONS OF SPREADSHEET RISK EXPOSURES; SPREADSHEET AUDITING TOOLS; GOVERNANCE OF SPREADSHEETS AND DESKTOP TOOLS; CONTROL CONSIDERATIONS; AUDITING CONTROLS AND CREATING A BASELINE; LIFE AFTER THE BASELINE: MAINTAINING SPREADSHEETS AND DESKTOP TOOLS; SUMMARY.