Details

IT Auditing and Application Controls for Small and Mid-Sized Enterprises


IT Auditing and Application Controls for Small and Mid-Sized Enterprises

Revenue, Expenditure, Inventory, Payroll, and More
Wiley Corporate F&A, Band 573 1. Aufl.

von: Jason Wood, William Brown, Harry Howe

57,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 08.01.2014
ISBN/EAN: 9781118222454
Sprache: englisch
Anzahl Seiten: 448

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<b>Essential guidance for the financial auditor in need of a working knowledge of IT</b> <p>If you're a financial auditor needing working knowledge of IT and application controls, <i>Automated Auditing Financial Applications for Small and Mid-Sized Businesses</i> provides you with the guidance you need. Conceptual overviews of key IT auditing issues are included, as well as concrete hands-on tips and techniques. Inside, you'll find background and guidance with appropriate reference to material published by ISACA, AICPA, organized to show the increasing complexity of systems, starting with general principles and progressing through greater levels of functionality.</p> <ul> <li>Provides straightforward IT guidance to financial auditors seeking to develop quality and efficacy of software controls</li> <li>Offers small- and middle-market business auditors relevant IT coverage</li> <li>Covers relevant applications, including MS Excel, Quickbooks, and report writers</li> <li>Written for financial auditors practicing in the small to midsized business space</li> </ul> <p>The largest market segment in the United States in quantity and scope is the small and middle market business, which continues to be the source of economic growth and expansion. Uniquely focused on the IT needs of auditors serving the small to medium sized business, <i>Automated Auditing Financial Applications for Small and Mid-Sized Businesses</i> delivers the kind of IT coverage you need for your organization.</p>
<p>Preface xi</p> <p>Acknowledgments xiii</p> <p><b>Chapter 1: Why Is IT Auditing Important to the Financial Auditor and the Financial Statement Audit? 1</b></p> <p>Management’s Assertions and the IT Audit 2</p> <p>Objectives of Data Processing for Small and Medium‐Sized Enterprises (SMEs) 5</p> <p>Special Challenges Facing SMEs 8</p> <p>Research Confirming the Risks Associated with SMEs 13</p> <p>A Framework for Evaluating Risks and Controls, Compensatory Controls, and Reporting Deficiencies 16</p> <p>Summary: The Road Ahead 20</p> <p><b>Chapter 2: General Controls for the SME 21</b></p> <p>General Controls: Scope and Outcomes 22</p> <p>The “COSO Process”—Putting It All Together: Financial Statements, Assertions, Risks, Control Objectives, and Controls 30</p> <p>Summary 35</p> <p><b>Chapter 3: Application‐Level Security 37</b></p> <p>Key Considerations 37</p> <p>Initial Security Setup 40</p> <p>Security Role Design 42</p> <p>Password Configuration 44</p> <p>Segregation of Duties 48</p> <p>Personnel, Roles, and Tasks 49</p> <p>Access Reviews 56</p> <p>Human Error 58</p> <p>Summary 58</p> <p><b>Chapter 4: General Ledger and the IT Audit 59</b></p> <p>The General Ledger: A Clearinghouse of Financial Information 60</p> <p>Chart of Accounts for QuickBooks 62</p> <p>SME Risks Specific to the General Ledger and the Chart of Accounts 65</p> <p>Assertions Underlying the Financial Statements and General Ledger Controls 66</p> <p>IT Controls, the Transaction Level, and the General Ledger 66</p> <p>Summary 78</p> <p><b>Chapter 5: The Revenue Cycle 81</b></p> <p>Risk Exposures and Subprocesses 81</p> <p>Application Controls, Revenue Cycle Risks, and Related Audit Procedures 84</p> <p>Summary 105</p> <p><b>Chapter 6: The Expenditure Cycle 107</b></p> <p>Risk Exposures and Subprocesses 107</p> <p>Application Controls, Expenditure Cycle Risks, and Related Audit Procedures 111</p> <p>Summary 133</p> <p><b>Chapter 7: The Inventory Cycle 135</b></p> <p>Risk Exposures and Subprocesses 136</p> <p>Application Controls, Inventory Cycle Risks, and Related Audit Procedures 143</p> <p>Summary 157</p> <p><b>Chapter 8: The Payroll Cycle 159</b></p> <p>Risk Exposures and Subprocesses 159</p> <p>Application Controls, Payroll Cycle Risks, and Related Audit Procedures 163</p> <p>Summary 248</p> <p><b>Chapter 9: Risk, Controls, Financial Reporting, and an Overlay of COSO on COBIT 249</b></p> <p>PCAOB Warnings: Insufficient Evidence to Support Opinions 250</p> <p>How We Got Here: A Historical Perspective 251</p> <p>Risk 260</p> <p>Risk and Fraud 261</p> <p>Controls 262</p> <p>Financial Reporting 269</p> <p>PCAOB Guidance on IT Controls 279</p> <p>Integrating COSO, COBIT, and the PCAOB 280</p> <p>Summary 286</p> <p><b>Chapter 10: Integrating the IT Audit into the Financial Audit 289</b></p> <p>Risks, Maturity, and Assessments 290</p> <p>Cross‐Referencing COBIT to the PCAOB and COSO 295</p> <p>Plan and Organize 303</p> <p>Program Development and Change 311</p> <p>Computer Operations and Access to Programs and Data 317</p> <p>Monitor and Evaluate 330</p> <p>Summary 334</p> <p><b>Chapter 11: Spreadsheet and Desktop Tool Risk Exposures 337</b></p> <p>Specific Types of Risks and Exposures 338</p> <p>Research on Errors in Spreadsheets 339</p> <p>Compliance Dimensions of Spreadsheet Risk Exposures 344</p> <p>Spreadsheet Auditing Tools 348</p> <p>Governance of Spreadsheets and Desktop Tools 352</p> <p>Control Considerations 355</p> <p>Auditing Controls and Creating a Baseline 356</p> <p>Life after the Baseline: Maintaining Spreadsheets and Desktop Tools 368</p> <p>Summary 369</p> <p><b>Chapter 12: Key Reports and Report Writers Risk Exposures 371</b></p> <p>How Reports Are Used 371</p> <p>Original Reports within the Application 372</p> <p>Modified or Customized Reports within the Application 376</p> <p>Reports Using Third‐Party Packages 378</p> <p>Analyzing and Validating Reports 382</p> <p>Summary 383</p> <p><b>Chapter 13: IT Audit Deficiencies: Defining and Evaluating IT Audit Deficiencies 385</b></p> <p>A Framework for Audit Deficiencies 385</p> <p>Types of IT Audit Failures and Illustrative Cases 388</p> <p>Use of Compensatory Controls 388</p> <p>Ideas for Addressing Segregation‐of‐Duties Issues 388</p> <p>Summary 398</p> <p>References 399</p> <p>About the Authors 405</p> <p>Index 407</p>
<p><b>JASON WOOD, CPA, CITP, CIS, CIA, CFF, MBA,</b> is President of WoodCPA???Plus, a certified public accounting firm that focuses on IT auditing, consulting, and training. Mr. Wood has over seventeen years of international business experience in IT auditing, helping middle market and global Fortune 500 companies. He is an alumnus of the Big Four accounting firms—Deloitte, E&Y, and PwC. <p><b>WILLIAM BROWN, P<small>H</small>D, CPA, CISA, CITP,</b> is Chair of Accounting at Minnesota State University, Mankato, where he has taught accounting and management information systems. He has over twenty years of business experience including roles as vice president, controller, and CFO of several publicly traded companies and the CIO of an IT intensive high-growth SME. <p><b>HARRY HOWE, P<small>H</small>D,</b> is Professor of Accounting and Director of the MS in Accounting Program at SUNY-Geneseo. Howe has coauthored two volumes in the BNA Policy and Practice series and published numerous articles in scholarly and practitioner journals.
<p><b>IT AUDITING AND APPLICATION CONTROLS FOR SMALL AND MID-SIZED ENTERPRISES</b></br> Revenue, Expenditure, Inventory, Payroll, and More <p>Risk is inevitable. As an auditor, you must help your clients not only manage their risk by performing audits and other assessments but also help them understand the nature and extent of risks that exist in the control environment. Information technology (IT) controls are a key aspect of that control environment. Written to help financial auditors provide better service to their clients in the context of application controls, <i>IT Auditing and Application Controls for Small and Mid-Sized Enterprises</i> illustrates and explains many of the basic IT controls common to the types of reporting systems used by small and medium-sized enterprises (SMEs). <p>Sharing their collective decades of experience practicing and teaching in the field, authors Jason Wood, William Brown, and Harry Howe provide you with the tools, guidance, and working knowledge to get started in IT auditing. The authors highlight conceptual and practical topics that are immediately relevant to understanding applications typically used by these businesses, such as MS Excel, QuickBooks, and FRx (Microsoft Dynamics) report writer. <p>Organized to illustrate the increasing complexity of systems, the book begins with general principles and progresses through greater levels of functionality in subsequent modules. Featuring conceptual overviews of key IT auditing issues as well as concrete, hands-on tips and techniques, <i>IT Auditing and Application Controls for Small and Mid-Sized Enterprises</i> examines: <ul> <li>Special challenges facing SMEs</li> <li>The COSO process</li> <li>Application-level security</li> <li>General ledger and the IT audit</li> <li>The revenue, expenditure, inventory, and payroll cycles</li> <li>PCAOB warnings</li> <li>Integrating the IT audit into the financial audit</li> <li>Spreadsheet auditing tools</li> <li>Maintaining spreadsheets and desktop tools</li> <li>Analyzing and validating reports</li> <li>IT audit deficiencies</li> </ul> <p><i>IT Auditing and Application Controls for Small and Mid-Sized Enterprises</i> empowers you with the skills and knowledge to provide better, more accurate service to your clients.

Diese Produkte könnten Sie auch interessieren:

Counterparty Credit Risk, Collateral and Funding
Counterparty Credit Risk, Collateral and Funding
von: Damiano Brigo, Massimo Morini, Andrea Pallavicini
EPUB ebook
69,99 €
Risk Management for Islamic Banks
Risk Management for Islamic Banks
von: Imam Wahyudi, Fenny Rosmanita, Muhammad Budi Prasetyo, Niken Iwani Surya Putri
EPUB ebook
55,99 €