ACCA考试《审计与认证业务F8》知识点(4)

来源: 高顿网校 2015-03-27
  ELEVANT TO CAT QUALIFICATION PAPER 8 AND ACCA QUALIFICATION
  PAPERS F8 AND P7
  SPECIFIC ASPECTS OF AUDITING IN A
  COMPUTER-BASED ENVIRONMENT
  Information technology (IT) is integral to modern accounting and management
  information systems. It is, therefore, imperative that auditors should be fully
  aware of the impact of IT on the audit of a client’s financial statements, both in
  the context of how it is used by a client to gather, process and report financial
  information in its financial statements, and how the auditor can use IT in the
  process of auditing the financial statements.
  The purpose of this article is to provide guidance on following aspects of
  auditing in a computer-based accounting environment:
  ? Application controls, comprising input, processing, output and master
  file controls established by an audit client, over its computer-based
  accounting system and
  ? Computer-assisted audit techniques (CAATs) that may be employed by
  auditors to test and conclude on the integrity of a client’s
  computer-based accounting system.
  Exam questions on each of the aspects identified above are often answered to
  an inadequate standard by a significant number of students – hence the reason
  for this article.
  Dealing with application controls and CAATs in turn:
  APPLICATION CONTROLS
  Application controls are those controls (manual and computerised) that relate
  to the transaction and standing data pertaining to a computer-based
  accounting system. They are specific to a given application and their objectives
  are to ensure the completeness and accuracy of the accounting records and
  the validity of entries made in those records. An effective computer-based
  system will ensure that there are adequate controls existing at the point of
  input, processing and output stages of the computer processing cycle and over
  standing data contained in master files. Application controls need to be
  ascertained, recorded and evaluated by the auditor as part of the process of
  determining the risk of material misstatement in the audit client’s financial
  statements.
  Input controls
  Control activities designed to ensure that input is authorised, complete,
  accurate and timely are referred to as input controls. Dependent on the
  complexity of the application program in question, such controls will vary in
  terms of quantity and sophistication. Factors to be considered in determining
  these variables include cost considerations, and confidentiality requirements
  with regard to the data input. Input controls common to most effective
  application programs include on-screen prompt facilities (for example, a
  request for an authorised user to ‘log-in’) and a facility to produce an audit
  2
  SPECIFIC ASPECTS OF AUDITING IN A COMPUTER-BASED
  ENVIRONMENT
  JANUARY 2011
  trail allowing a user to trace a transaction from its origin to disposition in the
  system.
  Specific input validation checks may include:
  Format checks
  These ensure that information is input in the correct form. For example, the
  requirement that the date of a sales invoice be input in numeric format only –
  not numeric and alphanumeric.
  Range checks
  These ensure that information input is reasonable in line with expectations. For
  example, where an entity rarely, if ever, makes bulk-buy purchases with a value
  in excess of $50,000, a purchase invoice with an input value in excess of
  $50,000 is rejected for review and follow-up.
  Compatibility checks
  These ensure that data input from two or more fields is compatible. For
  example, a sales invoice value should be compatible with the amount of sales
  tax charged on the invoice.
  Validity checks
  These ensure that the data input is valid. For example, where an entity
  operates a job costing system – costs input to a previously completed job
  should be rejected as invalid.
  Exception checks
  These ensure that an exception report is produced highlighting unusual
  situations that have arisen following the input of a specific item. For example,
  the carry forward of a negative value for inventory held.
  Sequence checks
  These facilitate completeness of processing by ensuring that documents
  processed out of sequence are rejected. For example, where pre-numbered
  goods received notes are issued to acknowledge the receipt of goods into
  physical inventory, any input of notes out of sequence should be rejected.
  Control totals
  These also facilitate completeness of processing by ensure that pre-input,
  manually prepared control totals are compared to control totals input. For
  example, non-matching totals of a ‘batch’ of purchase invoices should result in
  an on-screen user prompt, or the production of an exception report for
  follow-up. The use of control totals in this way are also commonly referred to
  as output controls (see below)。Check digit verification
  This process uses algorithms to ensure that data input is accurate. For
  example, internally generated valid supplier numerical reference codes, should  3
  SPECIFIC ASPECTS OF AUDITING IN A COMPUTER-BASED
  ENVIRONMENT
  JANUARY 2011
  be formatted in such a way that any purchase invoices input with an incorrect
  code will be automatically rejected.
  Processing controls
  Processing controls exist to ensure that all data input is processed correctly
  and that data files are appropriately updated accurately in a timely manner.
  The processing controls for a specified application program should be
  designed and then tested prior to ‘live’ running with real data. These may
  typically include the use of run-to-run controls, which ensure the integrity of
  cumulative totals contained in the accounting records is maintained from one
  data processing run to the next. For example, the balance carried forward on
  the bank account in a company’s general (nominal) ledger. Other processing
  controls should include the subsequent processing of data rejected at the point
  of input, for example:
  ? A computer produced print-out of rejected items.
  ? Formal written instructions notifying data processing personnel of the
  procedures to follow with regard to rejected items.
  ? Appropriate investigation/follow up with regard to rejected items.
  ? Evidence that rejected errors have been corrected and re-input.
  Output controls
  Output controls exist to ensure that all data is processed and that output is
  distributed only to prescribed authorised users. While the degree of output
  controls will vary from one organisation to another (dependent on the
  confidentiality of the information and size of the organisation), common
  controls comprise:
  ? Use of batch control totals, as described above (see ‘input controls’)。
  ? Appropriate review and follow up of exception report information to
  ensure that there are no permanently outstanding exception items.
  ? Careful scheduling of the processing of data to help facilitate the
  distribution of information to end users on a timely basis.
  ? Formal written instructions notifying data processing personnel of
  prescribed distribution procedures.
  ? Ongoing monitoring by a responsible official, of the distribution of output,
  to ensure it is distributed in accordance with authorised policy.
  Master file controls
  The purpose of master file controls is to ensure the ongoing integrity of the
  standing data contained in the master files. It is vitally important that stringent
  ‘security’ controls should be exercised over all master files.
  These include:
  ? appropriate use of passwords, to restrict access to master file data
  ? the establishment of adequate procedures over the amendment of data,
  comprising appropriate segregation of duties, and authority to amend
  being restricted to appropriate responsible individuals
  ? regular checking of master file data to authorised data, by an
  independent responsible official
  4
  SPECIFIC ASPECTS OF AUDITING IN A COMPUTER-BASED
  ENVIRONMENT
  JANUARY 2011
  ? processing controls over the updating of master files, including the use of
  record counts and control totals.
  COMPUTER ASSISTED AUDIT TECHNIQUES (CAATs)
  The nature of computer-based accounting systems is such that auditors may
  use the audit client company’s computer, or their own, as an audit tool, to
  assist them in their audit procedures. The extent to which an auditor may
  choose between using CAATs and manual techniques on a specific audit
  engagement depends on the following factors:
  ? the practicality of carrying out manual testing
  ? the cost effectiveness of using CAATs
  ? the availability of audit time
  ? the availability of the audit client’s computer facility
  ? the level of audit experience and expertise in using a specified CAAT
  ? the level of CAATs carried out by the audit client’s internal audit function
  and the extent to which the external auditor can rely on this work
  There are three classifications of CAATs – namely:
  ? Audit software
  ? Test data
  ? Other techniques
  Dealing with each of the above in turn:
  Audit software
  Audit software is a generic term used to describe computer programs designed
  to carry out tests of control and/or substantive procedures. Such programs
  may be classified as:
  Packaged programs
  These consist of pre-prepared generalised programs used by auditors and are
  not ‘client specific’。 They may be used to carry out numerous audit tasks, for
  example, to select a sample, either statistically or judgementally, during
  arithmetic calculations and checking for gaps in the processing of sequences.
  Purpose written programs
  These programs are usually ‘client specific’ and may be used to carry out tests
  of control or substantive procedures. Audit software may be bought or
  developed, but in any event the audit firm’s audit plan should ensure that
  provision is made to ensure that specified programs are appropriate for a
  client’s system and the needs of the audit. Typically, they may be used to
  re-perform computerised control procedures (for example, cost of sales
  calculations) or perhaps to carry out an aged analysis of trade receivable
  (debtor) balances.
  Enquiry programs
  These programs are integral to the client’s accounting system; however they
  may be adapted for audit purposes. For example, where a system provides for
  the routine reporting on a ‘monthly’ basis of employee starters and leaversSPECIFIC ASPECTS OF AUDITING IN A COMPUTER-BASED
  ENVIRONMENT
  JANUARY 2011
  this facility may be utilised by the auditor when auditing salaries and wages in
  the client’s financial statements. Similarly, a facility to report trade payable
  (creditor) long outstanding balances could be used by an auditor when
  verifying the reported value of creditors.
  Test data
  Audit test data
  Audit test data is used to test the existence and effectiveness of controls built
  into an application program used by an audit client. As such, dummy
  transactions are processed through the client’s computerised system. The
  results of processing are then compared to the auditor’s expected results to
  determine whether controls are operating efficiently and systems’
  objectiveness are being achieved. For example, two dummy bank payment
  transactions (one inside and one outside authorised parameters) may be
  processed with the expectation that only the transaction processed within the
  parameters is ‘accepted’ by the system. Clearly, if dummy transactions
  processed do not produce the expected results in output, the auditor will need
  to consider the need for increased substantive procedures in the area being
  reviewed.
  Integrated test facilities
  To avoid the risk of corrupting a client’s account system, by processing test
  data with the client’s other ‘live’ data, auditors may instigate special ‘test data
  only’ processing runs for audit test data. The major disadvantage of this is that
  the auditor does not have total assurance that the test data is being processed
  in a similar fashion to the client’s live data. To address this issue, the auditor
  may therefore seek permission from the client to establish an integrated test
  facility within the accounting system. This entails the establishment of a
  dummy unit, for example, a dummy supplier account against which the
  auditor’s test data is processed during normal processing runs.
  Other techniques
  This section contains useful background information to enhance your overall
  understanding.
  Other CAATs include:
  Embedded audit facilities (EAFs)
  This technique requires the auditor’s own program code to be embedded
  (incorporated) into the client’s application software, such that verification
  procedures can be carried out as required on data being processed. For
  example, tests of control may include the reperformance of specific input
  validation checks (see input controls above) – selected transactions may be
  ‘tagged’ and followed through the system to ascertain whether stated controls
  and processes have been applied to those transactions by the computer
  system. The EAFs should ensure that the results of testing are recorded in a
  special secure file for subsequent review by the auditor, who should be able to
  conclude on the integrity of the processing controls generally, from the results
  of testing. A further EAF, often overlooked by students, is that of an analytical
  6
  SPECIFIC ASPECTS OF AUDITING IN A COMPUTER-BASED
  ENVIRONMENT
  JANUARY 2011
  review program enabling concurrent performance of analytical review
  procedures on client data as it is being processed through the automated
  system.
  Application program examination
  When determining the extent to which they may rely on application controls,
  auditors need to consider the extent to which specified controls have been
  implemented correctly. For example, where system amendments have
  occurred during an accounting period, the auditor would need assurance as to
  the existence of necessary controls both before and after the amendment. The
  auditor may seek to obtain such assurance by using a software program to
  compare the controls in place prior to, and subsequent to, the amendment
  date.
  Summary
  The key objectives of an audit do not change irrespective of whether the audit
  engagement is carried out in a manual or a computer-based environment. The
  audit approach, planning considerations and techniques used to obtain
  sufficient appropriate audit evidence do of course change. Students are
  encouraged to read further to augment their knowledge of auditing in a
  computer-based environment and to practise their ability to answer exam
  questions on the topic by attempting questions set in previous ACCA exam
  papers.
  Brian Pine is examiner for CAT Paper 8
  高顿网校温馨提醒
  各位考生,2015年ACCA备考已经开始,为了方便各位学员能更加系统地掌握考试大纲的重点知识,帮助大家充分备考,体验实战,高顿网校开通了全免费的ACCA题库(包括精题真题和全真模考系统),题库里附有详细的答案解析,学员可以通过多种题型加强练习。欢迎各位考生扫描下方二维码下载,体验手机做题的超爽感受。
acca备考 热门问题解答
acca考试怎么搭配科目?

建议优先选择相关联的科目进行搭配报考,这样可以提高备考效率,减轻备考压力,1、F1-F4:为随时机考科目,难度较低,这里可以自行随意选择考试顺序。2、F5-F9:如果你的工作的和财务会计或者审计有关、或者你比较擅长财务和审计的话,推荐先考F7和F8。你可以选择一起考ACCA考试科目F7和F8或者先考F7(8)再考F8(7),这就要取决你一次想考几门。3、P阶段:选修科目中,建议企业首选AFM!第二部分科目进行选择,如果AA和SBR掌握学生更好,可以通过选择AAA,如果SBL掌握的好,可以自己选择APM。

acca一共几门几年考完?

acca一共有15门考试科目,其中有必修科目和选修科目,考生需要考完13门科目才能拿下证书。

acca一年考几次?

acca一年有4次考试,分别是3月、6月、9月和12月,分季机考科目是采取的这类四个考季的模式,而随时机考则是没有这方面的时间规定限制,可以随报随考。

acca的含金量如何?

ACCA证书的含金量是比较高的,从就业、能力提升、全球认可等角度来说,都是比较有优势的证书,其含金量主要表现在以下几个方面:1、国际化,认可度高;2、岗位多,就业前景好;3、缺口大,人才激励。

在线提问
严选名师 全流程服务

Sdanvi

高顿ACCA全学科负责人

教学特色
自创“少女三大法则”和“二阶学习法”
教学资历
两年内高分通过ACCA考试,ACCA业界学霸型讲师
客户评价
帮助学生快速理解ACCA的知识点,是ACCA学习不可错过的宝藏博主
sdanvi
  • 老师好,考出ACCA的难度相当于考进什么大学?
  • 老师好,ACCA考试怎样备考(越详细越好)?
  • 老师好,38岁才开始考ACCA会不会太迟?
  • 老师好,ACCA通过率是多少?
  • 老师好,有了ACCA证后好找工作吗?
999+人提问

Perry

高顿acca明星讲师

学历背景
复旦-麻省理工国际工商管理硕士
教学资历
曾就职于四大、世界500强
客户评价
ACCA业界学霸型讲师
Perry
  • 老师好,acca如果不去考会怎么样?
  • 老师好,acca难度有多大?
  • 老师好,acca一年可以考多少门?
  • 老师好,acca考试科目几年考完?
  • 老师好,acca工资一般是多少钱?
999+人提问

Dora

高顿acca明星讲师

学历背景
英国布里斯托优秀硕士生
教学资历
多年普华永道金融组审计师经验
客户评价
知性又美丽,温柔大姐姐
Dora
  • 老师好,acca持证工资待遇如何?
  • 老师好,35岁考acca有意义吗?
  • 老师好,考过acca能干嘛?
  • 老师好,考完acca可以做什么工作?
  • 老师好,acca年薪一般多少?
999+人提问

高顿教育 > ACCA > 基础阶段F系列