The Digital World Flashcards

1
Q

How was Auditing conducted in the pre-computer era

A

Paper-based systems: Auditors worked with handwritten ledgers (nominal ledgers, day books), invoices, purchase orders, and delivery notes.

Manual verification: Every transaction was traced by hand, with auditors checking calculations (e.g., totals, balances) and reconciling entries across multiple books.

Time-intensive: Audits required physical access to documents, making the process slower and more prone to human error than digital methods.

Key Challenge: Lack of automation meant higher reliance on auditor expertise to detect discrepancies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What was Sage, and how did it transform accounting/ auditing

A

First mass-market accounting software: Launched in the 1980s, Sage automated tasks like payroll, bookkeeping, and financial reporting.

Significance:
Replaced manual ledger systems for small/large businesses.

Paved the way for modern cloud tools (Xero, QuickBooks) by proving software could handle core accounting functions.

Auditing impact: Reduced manual errors and provided standardized digital records, making audits more efficient.

Limitation: Early versions were desktop-based, lacking real-time collaboration (unlike later cloud systems).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Cloud Computing, and how does it work

A

On-demand delivery of computing services (storage, software, processing) over the internet.

Key Features:
Remote hosting: Data/apps are stored on third-party servers (e.g., AWS, Azure).

Scalability: Users pay for only what they use, avoiding upfront hardware costs.

Accessibility: Data can be accessed anywhere with an internet connection.

Examples: SaaS (Software-as-a-Service) like Xero, IaaS (Infrastructure-as-a-Service) like AWS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does ‘auditing the cloud’ entail, and how is it different

A

Focus Areas:
Data security: Assessing encryption, access controls, and compliance (e.g., GDPR).

Third-party risks: Evaluating cloud providers’ reliability and backup protocols.

System integrity: Ensuring cloud-based financial records are accurate and tamper-proof.

Challenges vs. Traditional Audits:
Less physical control over data (relies on provider’s infrastructure).

Requires understanding of shared responsibility models (client vs. provider controls).

Auditor’s Role: Must verify both the client’s use of the cloud and the provider’s safeguards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does Cloud Technology Improve auditing processes

A

Efficiency Gains:
Real-time data - Auditors access live records without waiting for physical documents.

Automation - Tools auto-flag discrepancies (e.g., duplicate invoices).

Collaboration - Multiple auditors can work simultaneously on shared files.

Risk Reduction:
Version control - Cloud logs track changes, reducing tampering risks.

Disaster recovery - Data backups minimize loss compared to paper systems.

Limitations: New risks like cybersecurity threats or vendor lock-in must be managed.

Example: Cloud-based audit trails in QuickBooks simplify transaction tracking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 5 Primary Concerns when Auditing Cloud-Based Systems

A

Loss of Control - Entrusting data to third-party providers reduces direct oversight of infrastructure and processes.

Security Risks - Vulnerabilities to hacking, data breaches, or unauthorized access due to shared infrastructure.

Data Integrity - Ensuring accuracy and consistency of data managed externally (e.g., no unauthorized alterations).

Privacy Compliance - Adherence to regulations (e.g., GDPR) when sensitive data is stored/processed remotely.

Availability - Reliance on provider uptime; outages could disrupt audit timelines.

Why It Matters: Auditors must assess provider safeguards and contractual agreements to mitigate these risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Who owns Data stored in the Cloud

A

General Rule: The entity (user/organization) uploading data retains ownership.

Provider Rights: Cloud vendors may claim limited rights to process/store data (e.g., for maintenance).

Key Consideration: Ownership terms are defined in the Service-Level Agreement (SLA).

Audit Implication: Auditors must review SLAs to confirm ownership clauses and usage rights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Who controls Cloud-Hosted Data

A

Shared Responsibility Model:
User Controls - Access permissions, data entry, and user management.

Provider Controls - Physical infrastructure, network security, and backup protocols.

Critical Factor: Control boundaries vary by provider (e.g., AWS vs. Azure).

Auditor’s Task: Verify if the client’s control measures align with their compliance needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Is Cloud Data safe from Hacking or Theft

A

Provider Protections: Encryption, firewalls, and intrusion detection systems are standard.

Persistent Risks:
Shared infrastructure exposes “side-channel” attack risks.
User negligence (e.g., weak passwords) compromises security.

Auditor’s Role: Evaluate both provider and client security practices (e.g., multi-factor authentication).

Reality: No system is 100% secure, but risks can be mitigated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Is Cloud Data always available when needed

A

SLAs Guarantee Uptime (e.g., 99.9%), but outages occur due to:
Cyberattacks (e.g., DDoS).
Provider technical failures.

Audit Impact:
Delays if data is inaccessible during critical periods.
Need for backup access plans (e.g., offline copies).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does the ACCA define Big Data in Auditing

A

Extremely large collections of data (data sets) that may be analysed to reveal patterns, trends and associations, especially relating to human behaviour and interactions.

Key Points:
Focuses on volume and analytical purpose
Example: Analysing millions of crypto transactions to detect fraud patterns

Audit Relevance: Enables population-wide analysis vs. traditional sampling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the Five Key Characteristics (Vs) of Big Data

A

Volume: Massive scale (e.g., Ethereum’s entire transaction history)

Variety: Structured (trade logs) & unstructured data (customer emails, news)

Velocity: Real-time generation (e.g., live crypto price fluctuations)

Veracity: Data accuracy challenges (e.g., verifying blockchain extraction tools)

Value: Insights for decision-making (e.g., fraud detection in full transaction sets)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do Volume and Variety manifest in cryptocurrency audits?

A

Volume Challenge:
Example: A crypto exchange processes 500K trades/day
Solution: Use blockchain explorers + data analytics tools

Variety Examples:
Structured: Trade timestamps, wallet addresses
Unstructured: Social media sentiment, support tickets

Audit Risk: Traditional sampling misses anomalies in large/diverse datasets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why are Velocity and Veracity critical for Crypto Audits

A

Velocity:
Crypto markets move 24/7 → auditors need real-time analysis tools
Example: Detecting wash trading during volatile periods

Veracity:
Blockchain is immutable, but extraction methods may introduce errors
Audit Procedure: Cross-check data across multiple blockchain explorers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do Auditors derive value from big data

A

Benefits:
Fraud Detection: Identify suspicious transaction clusters
Risk Assessment: Correlate price swings with social media trends
Efficiency: Automate tests on 100% of transactions

Tools Used:
AI pattern recognition
Network analysis software

Example: Flagging transactions between “related” wallets disguised as independent actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does the IAASB define Data Analytics in Auditing?

A

“The science and art of discovering and analyzing patterns, deviations, and inconsistencies in data related to an audit through analysis, modeling, and visualization.”

Key Aspects:
Scientific: Uses statistical/mathematical techniques (e.g., regression analysis).

Artistic: Requires judgment to interpret results (e.g., assessing crypto transaction anomalies).

Outputs: Visualizations (e.g., network graphs of wallet interactions) inform audit planning/testing.

Example: Mapping Bitcoin transaction flows to identify potential related-party dealings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How does Data Analytics Improve on the auditing quality

A

Deeper Entity Understanding - Analyse crypto transaction volumes/frequencies to assess business model risks.

Risk-Based Testing - Stratify data to focus on high-risk areas (e.g., wallets with abnormal trading volumes).

Enhanced Professional Scepticism - Flag deviations (e.g., transactions at non-market prices) for investigation.

Group Audit Consistency - Standardize analytics across subsidiaries holding digital assets.

Testing Complex Datasets - Audit 100% of blockchain transactions vs. impractical manual sampling.

Cryptocurrency Example: Using clustering algorithms to detect wash trading patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How does the FRC define AI in Auditing

A

“The use of computer systems to perform tasks normally requiring human intelligence.”

Key Technologies:
Machine learning (ML), data mining, speech/image recognition, sentiment analysis.

19
Q

What are the Five Principles of the UK government’s AI Framework

A

Safety, Security & Robustness - Ensure AI systems are resilient to attacks/errors.

Transparency & Explainability - Avoid “black box” models; auditors must understand AI decisions.

Fairness - Prevent bias (e.g., in risk-scoring algorithms).

Accountability & Governance - Clear ownership of AI tools’ outputs.

Contestability & Redress - Allow challenges to AI-driven findings.

20
Q

How can Auditors leverage AI

A

Fraud Detection - ML analyses emails for suspicious language (e.g., urgency/evasion markers).

Risk Assessment - AI correlates financial data with news/social media for holistic risks.

Continuous Auditing - Real-time transaction monitoring (e.g., crypto exchange anomalies).

Efficiency Gains - Automate document review (e.g., extracting lease terms from contracts).

Outcome: Auditors focus on high-judgment areas.

21
Q

What are the Key Challenges when integrating AI into audits

A

Data Integration - Merging structured (ledgers) and unstructured data (emails).

AI Hallucinations - False positives/negatives require human validation.

Skill Gaps - Auditors need ML literacy to interpret outputs.

Data Validation - Verify sources (e.g., blockchain vs. internal records).

Cost & Ethics - Balancing tool investments with confidentiality requirements.

Example: AI misclassifying legitimate crypto trades as “high risk.”

22
Q

Why are auditors adopting AI and Big Data

A

Primary Driver: Client demands (businesses using AI → auditors must adapt).

Secondary Drivers:
Competitive Pressure - Firms using AI gain efficiency advantages.
Regulatory Expectations - Enhanced fraud detection capabilities.

Example: Auditing an AI-driven trading algorithm requires understanding its data inputs.

23
Q

What is a Blockchain

A

A distributed ledger technology (DLT) that records transactions across a decentralized peer-to-peer network.

Uses cryptography to secure data, ensuring immutability and transparency.

24
Q

What are the Key Features of a Blockchain

A

Decentralization -No central authority; maintained by multiple nodes (participants).
Consensus mechanisms (e.g., Proof of Work, Proof of Stake) validate transactions.

Immutability - Once recorded, transactions cannot be altered or deleted (tamper-resistant).

Transparency - All participants have access to the same ledger (varies by blockchain type).

Security - Cryptographic hashing ensures data integrity.

Example: Bitcoin’s blockchain records all BTC transactions since 2009.

25
What is Blockchains Impact on Audit Evidence
Advantages for Auditors: ✔ Immutable Records - Reduced risk of post-entry tampering (stronger evidence reliability). ✔ Real-Time Data - Enables continuous auditing (e.g., monitoring crypto transactions live). Challenges for Auditors: ❌ Pseudo-Anonymity - Hard to prove wallet ownership (e.g., does the client really control this address?). ❌ Data Reconciliation - Must verify off-chain records (e.g., financial statements vs. blockchain data).
26
Will Blockchain Replace Audits
Optimist View: "Perfect audit trail" could reduce fraud → less need for traditional audits. Smart contracts automate compliance (e.g., triggering revenue recognition). Realist View: Auditor’s role shifts (but doesn’t disappear): -Control Focus: Who can input data into the blockchain? -Off-Chain Verification: Ensuring real-world assets match blockchain records. -Smart Contract Audits: Checking code for vulnerabilities (e.g., reentrancy attacks)
27
Skills Auditors need for Blockchain
Technical Skills: 🔹 Blockchain Literacy Understand consensus models (PoW, PoS), smart contracts, tokenomics. 🔹 Data Forensics - Use tools like Chainalysis or Elliptic to trace crypto flows. 🔹 Programming Basics - Read smart contract code (Solidity for Ethereum). Analytical Skills: 🔹 Risk Assessment - Identify on-chain risks (e.g., 51% attacks, oracle manipulation). 🔹 Regulatory Knowledge - Compliance with FATF Travel Rule, anti-money laundering (AML) laws. Training Gap: Traditional accounting programs lack blockchain modules → auditors must upskill.
28
What is Cryptocurrency
Cryptocurrency is digital money that uses cryptography (advanced encryption) to secure transactions. Unlike regular money controlled by banks, crypto operates on decentralized networks called blockchains.
29
5 Key Features of Cryptocurrency
✔ No Central Control – No bank or government manages it. ✔ Built on Blockchain – Every transaction is recorded publicly on a digital ledger. ✔ Pseudonymous – Users have wallet addresses (like "1A1zP1...") instead of real names. ✔ Immutable – Once recorded, transactions can’t be changed. ✔ Highly Volatile – Prices can swing wildly in hours (e.g., Bitcoin dropping 20% in a day).
30
Data Collection & Reliability: Challenges and Audit Approach
Challenges: Blockchain data must be extracted and reconciled with financial systems. Public blockchain explorers may lack independent verification. Audit Procedures: ✔ Assess IT General Controls (ITGCs) – Verify node security, data transfer controls. ✔ Compare Data Across Multiple Explorers – Use tools like Etherscan, Blockchain.com. ✔ Evaluate Third-Party Nodes vs. Running Own Node – Balance cost, privacy, and reliability.
31
Ownership & Control Verification: Challenges and Audit Approach
Challenges: Wallet addresses are pseudonymous (no direct owner identification). Private keys = ultimate control (if lost/stolen, funds are irretrievable). Audit Procedures: ✔ Third-Party Custodian Confirmations – Verify holdings (but not necessarily control). ✔ Test Private Key Management – Are keys split (multi-sig)? Stored securely (cold storage)? ✔ Observe Key Generation Ceremonies – For new wallets, verify who holds access. ✔ Review ISAE 3402/SOC Reports – If using third-party custodians.
32
Valuation Risks: Challenges and Audit Approach
Challenges: Prices vary across exchanges (e.g., BTC at 60 K o n B i n a n c e v s . 60KonBinancevs.59.5K on Kraken). "Principal market" determination is subjective. Audit Procedures: ✔ Understand Management’s Pricing Methodology – Does it align with IFRS 13? ✔ Verify Principal Market – Highest volume/liquidity, accessible to the entity. ✔ Test Fair Value Measurements – Use CAATs to compare against market data. ✔ Assess Impairment Triggers – For crypto held as intangible assets (IAS 38).
33
Fraud & Misstatement Risks: Challenges and Audit Approach
Red Flags: Unusual Transaction Patterns – Rapid transfers between wallets. Undisclosed Related Parties – Hidden wallet links. Audit Procedures: ✔ Blockchain Forensics – Use Chainalysis/Elliptic to trace fund flows. ✔ Network Analysis – Identify clustered wallets (potential related parties). ✔ Test Controls Over Private Keys – Prevent unauthorized transfers. ✔ Inquire About Fraud Risks – Has management assessed susceptibility?
34
Ethical & Competence Considerations: Challenges and Audit Approach
Key Issues: Crypto is complex and evolving, auditors must stay updated. Self-Review Threat – If firm provides crypto valuation services. Management Competence – Does leadership understand crypto risks? Mitigation Steps: ✔ Training – Ensure audit team understands blockchain basics. ✔ Specialist Involvement – Consult crypto experts for complex areas. ✔ Enhanced Quality Control – Review firm’s ethical policies for crypto audits.
35
What is the 'Auditing around the Computer' approach
Definition: Treats the IT system as a "black box." Auditors manually verify outputs against inputs without examining system internals. Method: Select sample inputs (e.g., invoices). Manually calculate expected results. Compare to system outputs. When Used: For simple systems (e.g., basic calculations). Limitation: Assumes system controls are effective based on samples; doesn’t test system logic. Example: Checking if manually calculated sales totals match system-generated reports.
36
How does 'Auditing through the Computer' work
Definition: Evaluates the IT system’s internal controls, logic, and processing. Focus Areas: Programmed controls (e.g., edit checks). Access controls. Audit trails (tracing transactions). Methods: Test data (submit fake transactions to validate controls). Code reviews (inspect programming logic). When Used: For complex systems where outputs rely on automated controls. Example: Testing if a system flags invalid purchase orders above budget.
37
What's Auditing with the Computer Computer-Assisted Audit Techniques (CAAT)
Definition: Using software (e.g., ACL, IDEA) to automate audit tasks. Common Uses: Data extraction (e.g., all transactions >$10K). Recalculations (e.g., depreciation). Exception reporting (e.g., duplicate payments). Benefits: Tests 100% of data (vs. sampling). Increases efficiency. Tools: General Audit Software (GAS), scripting, AI analytics. Example: Using GAS to identify inactive customer accounts.
38
How do these approaches apply today
Combination Approach: Most audits blend all three: Use CAATs for data analysis. Test controls through the computer. Spot-check around the computer for critical items. Emerging Tech: Blockchain audits require adapting these methods (e.g., using CAATs for on-chain analysis). Takeaway: Auditors must choose methods based on system complexity and risk.
39
What does XBRL stand for and what does it do
XBRL = eXtensible Business Reporting Language An XML-based digital language that tags individual financial data points (e.g., net profit) for automated processing. Purpose: Streamlines reporting, improves accuracy, and reduces manual effort in financial disclosures.
40
Which regulators require XBRL filings
SEC (U.S.) HMRC (UK) Companies House (Singapore) MCA (India) FRC (UK) provides XBRL taxonomies (standardized tag sets). Note: Over 50 countries use XBRL for business reporting.
41
How does XBRL Works How does XBRL 'tag' financial data
Assigns unique computer-readable tags to each data item (e.g., 100,000). Enables software to automatically: Extract, analyze, and compare data. Present it in multiple formats (e.g., reports, dashboards). Example: A company’s assets and liabilities are tagged for instant retrieval.
42
What are the key issues with XBRL implementation
Historical Errors: Early filings (2009 study) had labeling, signage, and amount mistakes. Automation Risk: Software may not catch errors visually obvious to humans. Learning Curve: Companies improved accuracy over time (2013 study showed progress). Stat: 2017 error rate in primary statements: 10.2% (predicted to decline).
43
Has XBRL data quality Improved?
✔ Yes! By 2017, error rates dropped due to: Better company training. Standardized taxonomies. Software enhancements. Prediction (2017): "Very good" accuracy within 5 years (by ~2022).
44
What are the benefits of XBRL
Efficiency: Automates data collection/analysis. Transparency: Standardizes global reporting. Accuracy: Reduces manual entry errors. Regulatory Compliance: Meets SEC/HMRC requirements. Future: Key for AI-driven audits and real-time financial analysis.