U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

HOW CAATS (COMPUTER-ASSISTED AUDIT TECHNIQUES) AFFECT AUDIT INDEPENDENCE

NCJ Number
65771
Journal
C A MAGAZINE Volume: 112 Dated: (FEBRUARY 1979) Pages: 35-42
Author(s)
J H KEARNS
Date Published
1979
Length
8 pages
Annotation
ISSUES OF AUDIT CONTROL AND THE MAINTENANCE OF AUDITOR INDEPENDENCE ARE DISCUSSED IN THE APPLICATION OF COMPUTER-ASSISTED AUDIT TECHNIQUES (CAATS).
Abstract
THE RECENT GROWTH OF CAATS HAS BEEN A MAJOR DEVELOPMENT IN HELPING AUDITORS DEAL WITH LARGE COMPUTERIZED SYSTEMS. IN TERMS OF AUDIT INDEPENDENCE, HOWEVER, CAATS PRESENTS TWO MAJOR ISSUES: (1) REQUIREMENTS OF ADEQUATE AUDIT CONTROL OVER CAATS APPLICATIONS TO ENSURE INTEGRITY OF RESULTS, AND (2) THE DEGREE OF RELIANCE AUDITORS PLACE ON SOFTWARE DEVELOPED BY PERSONS OTHER THAN THE AUDITOR. AUDIT CONTROLS IN THE USE OF CAATS MUST GROW FROM A PARTICULAR AUDITING CONTEXT. MAJOR TYPES OF RISK THAT MIGHT COMPROMISE A CAAT ARE AUDITOR ERROR, INADVERTENT CLIENT ERROR, PERSONAL FRAUD, AND COLLUSIVE AND MANAGEMENT FRAUD. THE ADEQUACY OF INTERNAL CONTROL, THE INHERENT RISK OF THE ITEM UNDER AUDIT, AND THE RELIANCE TO BE PLACED ON THE CAAT APPLICATION ARE RELEVANT IN ASSESSING RISK AND SHOULD, THEREFORE, BE CONSIDERED IN DETERMINING AUDIT INDEPENDENCE. WHERE AUDITORS RELY ON CLIENT-OWNED SOFTWARE, THE SOFTWARE COULD BE DELIBERATELY MANIPULATED TO INFLUENCE THE AUDITOR'S APPLICATION. AUDITORS MUST DETERMINE UNDER WHAT CONDITIONS, IF ANY, THEY CAN USE CLIENT SOFTWARE AND WHAT PRECAUTIONS SHOULD BE TAKEN. WHILE IT IS BEYONG THE SCOPE OF THIS ARTICLE TO ANALYZE SPECIFIC CONTROL PROCEDURES AND THEIR APPLICABILITY, TWO EXAMPLES ILLUSTRATE METHODOLOGY. ONE IS A DATA TESTING APPLICATION USING GENERALIZED COMPUTER SOFTWARE, AND THE SECOND EXAMPLE INVOLVES A SYSTEMS TESTING APPLICATION USING A TEST DECK. FOR BOTH EXAMPLES, A NUMBER OF AUDIT CONTROL TECHNIQUES ARE NOTED. HIGHLIGHTS OF CRITIQUES OF THE PRESENTATION ARE ALSO PROVIDED, WITH A RESPONSE FROM THE AUTHOR. (RCB)

Downloads

No download available

Availability