Auditing (Ch. 12) Flashcards
Automated work paper
allows internal and external auditors to automate and standardize specific audit tests and audit documentation
Auditing around the computer
audit approach whereby an auditor follows a company’s audit trail up to the point at which accounting data enter the computer and then picks these data up again when they reappear in processed form as computer output
Auditing through the computer
audit approach whereby and auditor follows a company’s audit trail through the internal computer operations phase of automated data processing
Auditing with the computer
audit approach whereby the auditor uses the computer to aid in performing various auditing procedures
Compliance testing
procedures performed by auditors to ensure the general and application controls are in place and working as prescribed
Computer-assisted audit techniques (CAAT)
use of computer processes or specialized software to perform audit functions, such as sorting data to detect duplicate accounts payable invoice numbers
Continuous Auditing
the use of tools that allow auditing to occur even when an auditor is not present. XBRL can support this concept
Fraud triangle
includes three elements indicating potential for fraud; Motive, Opportunity, and Rationalization
Generalized audit software (GAS)
computer packages that enable auditors to review computer files without continually rewriting processing programs
General-use software
used by auditors as productivity tools for improving their work
Information systems risk assessment
method used by an auditor to evaluate the desirability of IT-related controls for a particular aspect of business risk
Information technology (IT) governance
ensuring that information technology risks are controlled and also that IT in an organization is deployed strategically to meet objectives
Integrated test facility (ITF)
used by auditors to test a company’s computer programs. A more comprehensive test technique that is used to audit an AIS in an operational setting
Parallel simulation
a control testing method used by auditors to create a second system that duplicates a portion of the clients system.
Program change control
a set of internal control procedures developed to ensure against unauthorized program changes