Chapter 7 - Risk Assessment and Inherent Risk Flashcards

1
Q

What is audit risk?

A

It is the risk that an inappropriate or erroneous conclusion is made even when audit plans and procedures are in accordance to GAAP, but it is materially misstated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do we do if it is impossible to eliminate audit risk?

A

If it is impossible to eliminate audit risk you will collect sufficient appropriate audit evidence to reduce it to an acceptable level. It will then allow the auditor to draw a reasonable conclusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the relationship of audit risk to the auditor?

A

Audit risk is related to the process of auditing. It is not the auditors business risk, such as loss from litigation or adverse publicity, that can arise as a result of an audit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the two components of audit risk?

A

Audit risk is comprised of inherent risk, control risk, and detection risk. It is the foundation for all audits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the two levels that RMM exists at?

A
  1. The overall financial statement level
  2. The assertion level for classes of transactions, account balances, and disclosures.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the risk of material misstatement at the financial statement level? What causes it?

A

Risks that relate perversely to the financial statements as a whole and potentially affect many assertions. Business risk, fraud, or deficiencies in the control environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the risk of material misstatement at the assertion level? What are the two components of RMM at the assertion level?

A

Refers to the risks that affect classes of transactions, account balances, and disclosures. Inherent risk and control risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is inherent risk?

A

The susceptibility of an assertion relating to a class of transaction, account balance, or the disclosure before considering the effectiveness of the clients internal controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is control risk?

A

It is the risk that a clients internal controls systems will not prevent or detect material misstatement in a timely manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Who does control risk and inherent risk belong too?

A

Control risk and inherent risk belong to the client, they are independent of the audit of the financial statements. Auditors have no control over these risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What precedes RMM at the assertion level?

A

The nature, timing, and extent of further audit procedures - These are the procedures that go beyond the risk assessment procedures as a response to RMM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is detection risk?

A

It is the risk that the auditors procedures will not be effective in detecting a material misstatement when one exists. It is the only component that auditors are able to control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the audit risk model?

A

It is a conceptual tool, not a precise formula, which helps the auditor plan their risk response. It is comprised of the following

AR = RMM * Detection Risk
RMM = Inherent Risk * Control Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the relationship between RMM and Detection risk?

A

There is an inverse relationship.

As RMM goes up, detection risk will go down as we will perform more substantive procedure ensuring we do not miss anything. They do this to make audit risk low
Ad RMM goes down, detection risk goes up as we perform less substantive procedures and focus more on the internal controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the two most common formulas for the audit risk model? What is the relationship between control risk and sufficient appropriate audit evidence?

A

Remember we always want the Audit Risk to be low, therefore these are common:

  1. Audit Risk (L) = Control Risk (H) * Inherent Risk (H) * Detection Risk (L) - More sufficient appropriate audit evidence
  2. Audit Risk (L) = Control Risk (L) * Inherent Risk (L) * Detection Risk (H) - less sufficient appropriate audit evidence.

There is a direct relationship. As the control risk goes up, sufficient appropriate audit evidence goes down, and vice versa.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do we manage detection risk?

A

Essentially if the detection risk is high that means that the auditor will be relying on the internal controls and therefore does not care about the substantive testing rigorous processes lowering sample size, quality, etc. If the detection risk is low, this means that the auditor will be relying heavily on the substantive test procedures and thus place more of an emphasis on it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are relevant assertions? When are these assertions determined?

A

Relevant assertions are assertions about a class of transactions, account balances, or disclosures that are relevant when it has an identified RMM. Before considering the internal controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are three ways to manage detection risk?

A
  1. Change the nature of the audit procedures - Use high quality evidence
  2. Change the timing of the audit procedures - Perform the audit procedure at the end of the year rather than during an interim period.
  3. Change the extent of the audit procedures - Use a large sample size
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does the audit risk model focus on? What are two practical ways auditors manage detection risk?

A

The audit risk model focuses on the adjustment of the further audit procedures.
1. Assigning more experienced staff to that area
2. Reviewing the completed audit tests more thoroughly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How do we determine the existence of RMM? What is it?

A

We assess the inherent risk factors. Inherent risk factors are events or conditions that affect RMM before the consideration of controls. It may be quantitative or qualitative.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the five inherent risk factors. Briefly describe each one

A
  1. Complexity - The complexity and confusing nature of the accounting records
  2. Bias - Management skewing the information for their own benefit or fraud, they fail to remain neutral.
  3. Subjectivity - A misunderstanding of different method to apply an accounting framework or policy, the ability to prepare in an objective manner.
  4. Change - There was a change in an accounting policy, model, or environment
  5. Uncertainty - Management makes estimates on the basis of imprecise non comprehensive data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Are these factors assessed independently?

A

No, these factors are not assessed independently rather they are assessed as a whole, in a holistic manner.

23
Q

What is the purpose of evaluating the nature and significance of the risks?

A
  1. Determine the overall risk response at the financial statement level. 2
  2. Design the further audit procedures that address the risks at the assertion level.
24
Q

What are overall financial statement level risks?

A

These are risks that pervasively affect the financial statements as a whole or many different assertions.

25
Q

What are the steps taken after the auditor has identified the overall financial statement risk?

A
  1. Determine whether the risks affect the assessment of risks at the assertion level.
  2. Evaluate the nature and extent of the pervasive effect on the financial statements.
26
Q

What are examples of events and conditions that are pervasive risk?

A
  1. Poorly trained or inexperienced accounting staff
  2. Significant control deficiencies.
  3. A history of ongoing loss and liquidity problems
  4. Past misstatements a/history of errors/significant amount of adjustments.
  5. Fraud
  6. Management integrity
27
Q

How do we develop an appropriate risk response at the assertion level?

A

We need to identify the significant class of transactions, account balances, and disclosures, with significance being related to materiality and risk factors

28
Q

What happens once the risk has been identified?

A

Determine the relevant assertion and assess the inherent risk for the assertion that depends upon the degree of the likelihood and the magnitude of misstatement, on the spectrum of inherent risk.

29
Q

What is significant risk?

A

It is the inherent risk factors, that when individual or aggregated, have increased the likelihood of misstatements occurring or the magnitude of the misstatement. Significant risks need special attention.

30
Q

What are 5 examples of significant risks?

A
  1. Transactions where there are multiple acceptable accounting treatments
  2. Accounting estimates that have high estimation uncertainty or complex models.
  3. Account balances or quantitative disclosures that involve complex calculations
  4. Accounting principles that may be subject to different interpretations
  5. Changes in the entity’s business
31
Q

What are two significant risks as defined by audit standards?

A
  1. Related party transactions outside the normal course of business
  2. Assume there is fraud in the revenue cycle.
32
Q

What is a related party? What is an example of a related party

A

A party that has the ability to influence decisions either directly or indirectly. A parent company and its subsidiary

33
Q

What is an economic dependence?

A

Is the potential for exercise of significant influence on an audit client by its most important supplier, customer, lender, or borrower.

34
Q

What are non routine transactions? Why are these transactions more risky?

A

Transactions that are unusual due to the size, nature, or they are infrequent in nature. They are more risky because they are subjected to management interventions, manual data collection and processing, complex accounting principles or calculations not fixed by internal controls systems.

35
Q

What are IFRS and ASPE requirements for non routine related party transactions? What is a potential risk?

A
  1. Disclosure the nature of the relationship
  2. Description of the transaction with dollar amounts
  3. Amounts due from and to related parties.
  • Since they are not arms length transaction parties there is a risk that they were not valued at the same amounts.
36
Q

What are the two types of responses developed by the auditor?

A
  1. Overall risk response (audit strategy) addressing the pervasive risks at the financial statement level.
  2. A risk response on the assertion level, further audit procedures like substantive testing and test of controls.
37
Q

What are examples of risk response at the overall financial statement level?

A
  1. Assign more experienced staff of those with special skills
  2. Instruct the engagement team to have heightened professional skepticism.
  3. Increase the involvement of the audit partner and management
  4. Closer supervision and review
  5. Incorporate elements of unpredictability in the selection of the further audit procedures
  6. Consider if changes need to be made to the overall audit strategy/
38
Q

What are the risk responses at the assertion level?

A
  1. Test of controls
  2. Test of details / substantive audit procedures
39
Q

Which is higher the fraud risk or the error risk? Why?

A

Fraud risk because it involves complex sophisticated schemes designed by perpetrators to conceal it who misrepresent information to the auditor, colluding and concealing it with other people involved.

40
Q

What are 4 ways to highlight and assess the RMM due to fraud?

A
  1. Discuss with the audit team members the RMM due to fraud.
  2. Make inquiries to management, those in charge of governance, and others regarding processes
  3. Evaluate unusual and unexpected relationships identified when performing analytical review procedures.
  4. Evaluate the risk for revenue fraud and management override and period end.
41
Q

At what level is the consideration of RMM for fraud made at?

A

It is made at the financial statement level and the assertion level for classes of transactions, account balances, presentations and disclosures.

42
Q

What are the 4 components of discussions with the audit team according to CAS?

A
  1. How and where they believe the entity’s financial statements might be susceptible to material misstatements due to fraud. - Include know internal and external factors like opportunities, pressures, and environment
  2. How management could perpetrate and conceal financial reporting fraud
  3. How anyone might misappropriate assets of the entity
  4. How the auditor might respond to the susceptibility of material misstatements due to the fraud.
43
Q

Describe inquiries with those in charge of management, governance, and others

A

Management - Inquiries about if they are aware of any fraud, process of assessing fraud and it frequency, nature of fraud risk, internal controls, and fraud risks reported to the committee.
Governance - Views on the risk for fraud and if they know knowledge or suspects of fraud
Others - Ask other people like inventory management

44
Q

Describe the evaluation of unusual or unexpected relationships identified

A

As we know these analytical procedures must be done at the beginning and at completion. The auditor should evaluate results that significantly differ from the expectations

45
Q

What is the fraud triangle?

A

Represents the three conditions for fraud: Incentives / pressure, opportunities, and attitudes/rationalizations

46
Q

Describe the 3 parts of the fraud triangle

A

Incentives / pressures - Management or the employees have incentives or pressures to behave unethically
Opportunities - Opportunities arise for the management or employees to behave unethically.
Attitudes / Rationalizations - An attitude, character, or set of ethical values exist such that management or employees intentionally unethically. They are in an environment where they are encouraged to act unethically.

47
Q

What are fraud risk factors?

A

Entity factors that increase the risk of fraud

48
Q

What are the two parts of misappropriation of assets? What is it heavily focused on?

A
  1. Theft
  2. Corruption - Owner, executive, or employees abuses his or her power to subvert the decision making process for personal or company gain.
  • Heavier emphasis on personal interest and theft
49
Q

What are the three levels to respond to for fraud risks?

A
  1. Overall financial statement level
  2. Assertion level
  3. Management override level.
50
Q

Describe overall response to fraud risk

A

Essentially in this section apply the 6 different types of possible responses to the overall risk response level. Ensure you use more skilled people, more skepticism, more managers and partners, closer supervision, adding elements of surprise to the nature, timing, and extent of the procedures, as well as considering changes to the overall audit strategy.

51
Q

Describe overall response to the assertion level fraud risk

A

Essentially perform more substantive analytical procedures to the account that is subjected to fraud and the type of fraud risk identified. Essentially we perform the three aspect of modifying the nature, extent, and timing of the audit procedures.

52
Q

What are the three fraud risk responses to management override and describe them

A
  1. Examine the journal entries and other adjustments for evidence of possible misstatements
  2. Review accounting estimates for biases - Look back at significant prior year estimates and assess any significant changes in the company’s processes or managements judgments
    3.Evaluate the business rationale for significant unusual transactions -
53
Q

What are the three types of automated tools and techniques that can be used to detect fraud? Briefly describe them

A
  • They will typically use audit software or machine learning like MindBridge
  1. Audit Data Analytics - Excel and PowerBI to look for
    fake revenue transactions by looking for duplicates of invoices or reconciling sales database with receivables database. ,

sort transactions or account balances into subcategories for further audit testing ,

or spreadsheet data visualization tools to perform analytical procedures at a disaggregated level

  1. AI understand complex relationships among a vast amount of data, including the entities transactions, third party data, and years of journal entries and records - Looks for issues, flags them, and people follow up, and cause codes
  2. Human intervention and professional judgement - ATT’s do not detect fraud with a click of a mouse but rather highlight anomalies. The auditor can then focus on those high risk anomalies, you look at documentation, people, and procedures. Only then can fraud truly be determined, and it needs human intervention to execute, assess, and examine.