Information technology auditing and application controls for small and mid-sized businesses : revenue, expenditure, inventory, payroll, and more /
Essential guidance for the financial auditor in need of a working knowledge of IT If you're a financial auditor needing working knowledge of IT and application controls, Automated Auditing Financial Applications for Small and Mid-Sized Businesses provides you with the guidance you need. Concept...
Saved in:
Main Authors: | |
---|---|
Group Author: | ; |
Published: |
John Wiley and Sons, Inc.,
|
Publisher Address: | Hoboken, New Jersey : |
Publication Dates: | [2014] |
Literature type: | eBook |
Language: | English |
Series: |
Wiley corporate F & A series
|
Subjects: | |
Online Access: |
http://onlinelibrary.wiley.com/book/10.1002/9781118801024 |
Summary: |
Essential guidance for the financial auditor in need of a working knowledge of IT If you're a financial auditor needing working knowledge of IT and application controls, Automated Auditing Financial Applications for Small and Mid-Sized Businesses provides you with the guidance you need. Conceptual overviews of key IT auditing issues are included, as well as concrete hands-on tips and techniques. Inside, you'll find background and guidance with appropriate reference to material published by ISACA, AICPA, organized to show the increasing complexity of systems, starting with gener. |
Carrier Form: | 1 online resource. |
Bibliography: | Includes bibliographical references and index. |
ISBN: |
9781118233191 (epub) 1118233190 (epub) 9781118222454 (pdf) 1118222458 (pdf) 9781118801024 1118801024 9781118261064 (oBook) 1118261062 (oBook) |
Index Number: | HD30 |
CLC: | F239.1 |
Contents: |
Cover; Series; Title Page; Copyright; Dedication; Preface; Acknowledgments; Chapter 1: Why Is IT Auditing Important to the Financial Auditor and the Financial Statement Audit?; MANAGEMENT'S ASSERTIONS AND THE IT AUDIT; OBJECTIVES OF DATA PROCESSING FOR SMALL AND MEDIUM-SIZED ENTERPRISES (SMEs); SPECIAL CHALLENGES FACING SMEs; RESEARCH CONFIRMING THE RISKS ASSOCIATED WITH SMEs; A FRAMEWORK FOR EVALUATING RISKS AND CONTROLS, COMPENSATORY CONTROLS, AND REPORTING DEFICIENCIES; SUMMARY: THE ROAD AHEAD; Chapter 2: General Controls for the SME; GENERAL CONTROLS: SCOPE AND OUTCOMES. THE "COSO PROCESS"-PUTTING IT ALL TOGETHER: FINANCIAL STATEMENTS, ASSERTIONS, RISKS, CONTROL OBJECTIVES, AND CONTROLSSUMMARY; Chapter 3: Application-Level Security; KEY CONSIDERATIONS; INITIAL SECURITY SETUP; SECURITY ROLE DESIGN; PASSWORD CONFIGURATION; SEGREGATION OF DUTIES; PERSONNEL, ROLES, AND TASKS; ACCESS REVIEWS; HUMAN ERROR; SUMMARY; Chapter 4: General Ledger and the IT Audit; THE GENERAL LEDGER: A CLEARINGHOUSE OF FINANCIAL INFORMATION; CHART OF ACCOUNTS FOR QUICKBOOKS; SME RISKS SPECIFIC TO THE GENERAL LEDGER AND THE CHART OF ACCOUNTS. ASSERTIONS UNDERLYING THE FINANCIAL STATEMENTS AND GENERAL LEDGER CONTROLSIT CONTROLS, THE TRANSACTION LEVEL, AND THE GENERAL LEDGER; SUMMARY; Chapter 5: The Revenue Cycle; RISK EXPOSURES AND SUBPROCESSES; APPLICATION CONTROLS, REVENUE CYCLE RISKS, AND RELATED AUDIT PROCEDURES; SUMMARY; Chapter 6: The Expenditure Cycle; RISK EXPOSURES AND SUBPROCESSES; APPLICATION CONTROLS, EXPENDITURE CYCLE RISKS, AND RELATED AUDIT PROCEDURES; SUMMARY; Chapter 7: The Inventory Cycle; RISK EXPOSURES AND SUBPROCESSES; APPLICATION CONTROLS, INVENTORY CYCLE RISKS, AND RELATED AUDIT PROCEDURES; SUMMARY. Chapter 8: The Payroll CycleRISK EXPOSURES AND SUBPROCESSES; APPLICATION CONTROLS, PAYROLL CYCLE RISKS, AND RELATED AUDIT PROCEDURES; SUMMARY; Chapter 9: Risk, Controls, Financial Reporting, and an Overlay of COSO on COBIT; PCAOB WARNINGS: INSUFFICIENT EVIDENCE TO SUPPORT OPINIONS; HOW WE GOT HERE: A HISTORICAL PERSPECTIVE; RISK; RISK AND FRAUD; CONTROLS; FINANCIAL REPORTING; PCAOB GUIDANCE ON IT CONTROLS; INTEGRATING COSO, COBIT, AND THE PCAOB; SUMMARY; Chapter 10: Integrating the IT Audit into the Financial Audit; RISKS, MATURITY, AND ASSESSMENTS. CROSS-REFERENCING COBIT TO THE PCAOB AND COSOPLAN AND ORGANIZE; PROGRAM DEVELOPMENT AND CHANGE; COMPUTER OPERATIONS AND ACCESS TO PROGRAMS AND DATA; MONITOR AND EVALUATE; SUMMARY; Chapter 11: Spreadsheet and Desktop Tool Risk Exposures; SPECIFIC TYPES OF RISKS AND EXPOSURES; RESEARCH ON ERRORS IN SPREADSHEETS; COMPLIANCE DIMENSIONS OF SPREADSHEET RISK EXPOSURES; SPREADSHEET AUDITING TOOLS; GOVERNANCE OF SPREADSHEETS AND DESKTOP TOOLS; CONTROL CONSIDERATIONS; AUDITING CONTROLS AND CREATING A BASELINE; LIFE AFTER THE BASELINE: MAINTAINING SPREADSHEETS AND DESKTOP TOOLS; SUMMARY. |