SlideShare une entreprise Scribd logo
1  sur  151
HAPTER 9 Auditing Computer-Based Information Systems
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],Planning
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],Collecting Evidence Planning
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],Evaluating Evidence Collecting Evidence Planning
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Communicating Audit Results Evaluating Evidence Collecting Evidence Planning
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Communicating Audit Results Evaluating Evidence Collecting Evidence Planning
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],Communicating Audit Results Evaluating Evidence Collecting Evidence Planning
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],Communicating Audit Results Evaluating Evidence Collecting Evidence Planning ,[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Communicating Audit Results Evaluating Evidence Collecting Evidence Planning ,[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Communicating Audit Results Evaluating Evidence Collecting Evidence Planning
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INFORMATION SYSTEMS AUDITS ,[object Object],[object Object],[object Object],[object Object],[object Object]
INFORMATION SYSTEMS AUDITS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IS COMPONENTS AND AUDIT OBJECTIVES Source Data Output Processing Source Data Data Entry Programs Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Files
IS COMPONENTS AND AUDIT OBJECTIVES Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Source Data Output Processing Source Data Data Entry Programs Files
OBJECTIVE 1:  OVERALL SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 1:  OVERALL SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 1:  OVERALL SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 1:  OVERALL SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 1:  OVERALL SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IS COMPONENTS AND AUDIT OBJECTIVES Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Source Data Output Processing Source Data Data Entry Programs Files
IS COMPONENTS AND AUDIT OBJECTIVES Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Source Data Output Processing Source Data Data Entry Programs Files
OBJECTIVE 2:  PROGRAM DEVELOPMENT AND ACQUISITION ,[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 2:  PROGRAM DEVELOPMENT AND ACQUISITION ,[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 2:  PROGRAM DEVELOPMENT AND ACQUISITION ,[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 2:  PROGRAM DEVELOPMENT AND ACQUISITION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 2:  PROGRAM DEVELOPMENT AND ACQUISITION ,[object Object],[object Object],[object Object],[object Object],[object Object]
IS COMPONENTS AND AUDIT OBJECTIVES Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Source Data Output Processing Source Data Data Entry Programs Files
IS COMPONENTS AND AUDIT OBJECTIVES Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Source Data Output Processing Source Data Data Entry Programs Files
OBJECTIVE 3:  PROGRAM MODIFICATION ,[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 3:  PROGRAM MODIFICATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 3:  PROGRAM MODIFICATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 3:  PROGRAM MODIFICATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 3:  PROGRAM MODIFICATION ,[object Object],[object Object],[object Object]
OBJECTIVE 3:  PROGRAM MODIFICATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 3:  PROGRAM MODIFICATION ,[object Object],[object Object],[object Object]
OBJECTIVE 3:  PROGRAM MODIFICATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IS COMPONENTS AND AUDIT OBJECTIVES Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Source Data Output Processing Source Data Data Entry Programs Files
IS COMPONENTS AND AUDIT OBJECTIVES Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Source Data Output Processing Source Data Data Entry Programs Files
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IS COMPONENTS AND AUDIT OBJECTIVES Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Source Data Output Processing Source Data Data Entry Programs Files
IS COMPONENTS AND AUDIT OBJECTIVES Source Data Output Processing Source Data Data Entry Programs Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Files
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object],[object Object]
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object],[object Object]
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object]
Record Name Employee Weekly Time Report Field Names
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IS COMPONENTS AND AUDIT OBJECTIVES Source Data Output Processing Source Data Data Entry Programs Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Files
IS COMPONENTS AND AUDIT OBJECTIVES Source Data Output Processing Source Data Data Entry Programs Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Files
OBJECTIVE 6:  DATA FILES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 6:  DATA FILES ,[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 6:  DATA FILES ,[object Object],[object Object],[object Object]
OBJECTIVE 6:  DATA FILES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 6:  DATA FILES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 6:  DATA FILES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 6:  DATA FILES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 6:  DATA FILES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 6:  DATA FILES ,[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OPERATIONAL AUDITS OF AN AIS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OPERATIONAL AUDITS OF AN AIS ,[object Object],[object Object],[object Object],[object Object]
OPERATIONAL AUDITS OF AN AIS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OPERATIONAL AUDITS OF AN AIS ,[object Object],[object Object],[object Object],[object Object]
OPERATIONAL AUDITS OF AN AIS ,[object Object],[object Object]
SUMMARY ,[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

Internal auditors’ roles and responsibilities
Internal auditors’ roles and responsibilitiesInternal auditors’ roles and responsibilities
Internal auditors’ roles and responsibilities
Salih Islam
 
Chapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraudChapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraud
VidaB
 
Chapter 2. audit planning procedures & documentation
Chapter 2. audit planning procedures & documentationChapter 2. audit planning procedures & documentation
Chapter 2. audit planning procedures & documentation
Thane
 

Tendances (20)

Forensic accounting
Forensic accountingForensic accounting
Forensic accounting
 
forensic accounting& role and function of forensic accountant
 forensic accounting& role and function of forensic accountant forensic accounting& role and function of forensic accountant
forensic accounting& role and function of forensic accountant
 
Audit of the acquisition and payment cycle
Audit of the acquisition and payment cycleAudit of the acquisition and payment cycle
Audit of the acquisition and payment cycle
 
Internal auditors’ roles and responsibilities
Internal auditors’ roles and responsibilitiesInternal auditors’ roles and responsibilities
Internal auditors’ roles and responsibilities
 
Forensic accounting
Forensic accountingForensic accounting
Forensic accounting
 
Accounting Information System BY Ahmed Yasir Khan.
Accounting Information System BY Ahmed Yasir Khan.Accounting Information System BY Ahmed Yasir Khan.
Accounting Information System BY Ahmed Yasir Khan.
 
Audit & Investigation Presentation Module 1.pptx
Audit & Investigation Presentation Module 1.pptxAudit & Investigation Presentation Module 1.pptx
Audit & Investigation Presentation Module 1.pptx
 
AUDIT CASE
AUDIT CASEAUDIT CASE
AUDIT CASE
 
Chapter 11, Tests of Controls
Chapter 11, Tests of ControlsChapter 11, Tests of Controls
Chapter 11, Tests of Controls
 
INTERNATIONAL AUDITING STANDARDS -PPT.pptx
INTERNATIONAL AUDITING STANDARDS -PPT.pptxINTERNATIONAL AUDITING STANDARDS -PPT.pptx
INTERNATIONAL AUDITING STANDARDS -PPT.pptx
 
Chapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraudChapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraud
 
Internal Audit
Internal AuditInternal Audit
Internal Audit
 
Lecture 10, chap 15, Chapter 15,Auditing Purchases, Payables and Payroll
Lecture 10,  chap 15, Chapter 15,Auditing Purchases, Payables and PayrollLecture 10,  chap 15, Chapter 15,Auditing Purchases, Payables and Payroll
Lecture 10, chap 15, Chapter 15,Auditing Purchases, Payables and Payroll
 
8. internal control new
8. internal control new8. internal control new
8. internal control new
 
Audit of the acquisition and payment cycle
Audit of the acquisition and payment cycleAudit of the acquisition and payment cycle
Audit of the acquisition and payment cycle
 
Internal controls
Internal controlsInternal controls
Internal controls
 
Chapter 2. audit planning procedures & documentation
Chapter 2. audit planning procedures & documentationChapter 2. audit planning procedures & documentation
Chapter 2. audit planning procedures & documentation
 
Topic 7 audit planning
Topic 7 audit planningTopic 7 audit planning
Topic 7 audit planning
 
Lecture slide, chapter 5, The Auditor’s Legal Liability
Lecture slide, chapter 5,    The Auditor’s Legal LiabilityLecture slide, chapter 5,    The Auditor’s Legal Liability
Lecture slide, chapter 5, The Auditor’s Legal Liability
 
AUDIT EVIDENCE
AUDIT EVIDENCE AUDIT EVIDENCE
AUDIT EVIDENCE
 

En vedette

Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6
Sharah Ayumi
 
Ais Romney 2006 Slides 11 The Expenditure Cycle
Ais Romney 2006 Slides 11 The Expenditure CycleAis Romney 2006 Slides 11 The Expenditure Cycle
Ais Romney 2006 Slides 11 The Expenditure Cycle
Sharing Slides Training
 
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
Rikesh Chaurasia
 

En vedette (20)

Ais Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesAis Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational Databases
 
Ais Romney 2006 Slides 02 Business Process
Ais Romney 2006 Slides 02 Business ProcessAis Romney 2006 Slides 02 Business Process
Ais Romney 2006 Slides 02 Business Process
 
Ais Romney 2006 Slides 15 Database Design Using The Rea
Ais Romney 2006 Slides 15 Database Design Using The ReaAis Romney 2006 Slides 15 Database Design Using The Rea
Ais Romney 2006 Slides 15 Database Design Using The Rea
 
Uthaya Chap 05 Input
Uthaya Chap 05 InputUthaya Chap 05 Input
Uthaya Chap 05 Input
 
Ais Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And AisAis Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And Ais
 
Ais Romney 2006 Slides 18 Introduction To Systems Development
Ais Romney 2006 Slides 18 Introduction To Systems DevelopmentAis Romney 2006 Slides 18 Introduction To Systems Development
Ais Romney 2006 Slides 18 Introduction To Systems Development
 
Ais Romney 2006 Slides 14 General Ledger And Reporting System
Ais Romney 2006 Slides 14 General Ledger And Reporting SystemAis Romney 2006 Slides 14 General Ledger And Reporting System
Ais Romney 2006 Slides 14 General Ledger And Reporting System
 
Ais Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesAis Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational Databases
 
Ais Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesAis Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational Databases
 
Ais Romney 2006 Slides 01 Overview
Ais Romney 2006 Slides 01 OverviewAis Romney 2006 Slides 01 Overview
Ais Romney 2006 Slides 01 Overview
 
Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
 
Ais Romney 2006 Slides 13 The Hr Cycle
Ais Romney 2006 Slides 13 The Hr CycleAis Romney 2006 Slides 13 The Hr Cycle
Ais Romney 2006 Slides 13 The Hr Cycle
 
Ais Romney 2006 Slides 11 The Expenditure Cycle
Ais Romney 2006 Slides 11 The Expenditure CycleAis Romney 2006 Slides 11 The Expenditure Cycle
Ais Romney 2006 Slides 11 The Expenditure Cycle
 
Accounting information system
Accounting information systemAccounting information system
Accounting information system
 
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Sppt chap017
Sppt chap017Sppt chap017
Sppt chap017
 
Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1
 
Ais Romney 2006 Slides 06 Control And Ais Part 1
Ais Romney 2006 Slides 06 Control And Ais Part 1Ais Romney 2006 Slides 06 Control And Ais Part 1
Ais Romney 2006 Slides 06 Control And Ais Part 1
 

Similaire à Ais Romney 2006 Slides 09 Auditing Computer Based Is

24201843 studdy-note-8
24201843 studdy-note-824201843 studdy-note-8
24201843 studdy-note-8
Akash Saxena
 
auditpresentation-121006061658-phpapp02.pdf
auditpresentation-121006061658-phpapp02.pdfauditpresentation-121006061658-phpapp02.pdf
auditpresentation-121006061658-phpapp02.pdf
owaissayyed0041
 
2008 Pioneering The Employment Services Audit In The Ontario College Sector
2008 Pioneering The Employment Services Audit In The Ontario College Sector2008 Pioneering The Employment Services Audit In The Ontario College Sector
2008 Pioneering The Employment Services Audit In The Ontario College Sector
Nikhat Rasheed
 

Similaire à Ais Romney 2006 Slides 09 Auditing Computer Based Is (20)

Audits and Regulatory Compliance
Audits and Regulatory ComplianceAudits and Regulatory Compliance
Audits and Regulatory Compliance
 
Kontrol & Audit Sistem Informasi
Kontrol & Audit Sistem InformasiKontrol & Audit Sistem Informasi
Kontrol & Audit Sistem Informasi
 
AUDIT - AUDITING STRATEGIES.pptx
AUDIT - AUDITING STRATEGIES.pptxAUDIT - AUDITING STRATEGIES.pptx
AUDIT - AUDITING STRATEGIES.pptx
 
Chapter 1 auditing and internal control
Chapter 1 auditing and internal controlChapter 1 auditing and internal control
Chapter 1 auditing and internal control
 
Chapter 1 auditing and internal control
Chapter 1 auditing and internal controlChapter 1 auditing and internal control
Chapter 1 auditing and internal control
 
Audit process
Audit processAudit process
Audit process
 
24201843 studdy-note-8
24201843 studdy-note-824201843 studdy-note-8
24201843 studdy-note-8
 
SEATA by TOMMY SEAH
SEATA by TOMMY SEAHSEATA by TOMMY SEAH
SEATA by TOMMY SEAH
 
Auditing concept
Auditing conceptAuditing concept
Auditing concept
 
auditpresentation-121006061658-phpapp02.pdf
auditpresentation-121006061658-phpapp02.pdfauditpresentation-121006061658-phpapp02.pdf
auditpresentation-121006061658-phpapp02.pdf
 
Audit presentation
Audit presentationAudit presentation
Audit presentation
 
.POINTS TO REMEMBER ADVANCED AUDITING.pdf
.POINTS TO REMEMBER ADVANCED AUDITING.pdf.POINTS TO REMEMBER ADVANCED AUDITING.pdf
.POINTS TO REMEMBER ADVANCED AUDITING.pdf
 
Internal control.. control env
Internal control.. control envInternal control.. control env
Internal control.. control env
 
01 Auditing CH 1.ppt
01 Auditing CH 1.ppt01 Auditing CH 1.ppt
01 Auditing CH 1.ppt
 
Operational Auditing
Operational AuditingOperational Auditing
Operational Auditing
 
2008 Pioneering The Employment Services Audit In The Ontario College Sector
2008 Pioneering The Employment Services Audit In The Ontario College Sector2008 Pioneering The Employment Services Audit In The Ontario College Sector
2008 Pioneering The Employment Services Audit In The Ontario College Sector
 
Internal control and Control Self Assessment
Internal control and Control Self AssessmentInternal control and Control Self Assessment
Internal control and Control Self Assessment
 
Database auditing models
 Database auditing models  Database auditing models
Database auditing models
 
Internal audit
Internal auditInternal audit
Internal audit
 
Tugas mandiri audit novita dewi 11353202277
Tugas mandiri audit  novita dewi 11353202277Tugas mandiri audit  novita dewi 11353202277
Tugas mandiri audit novita dewi 11353202277
 

Plus de sharing notes123

Bliana Grp Twitter Presentation
Bliana Grp Twitter PresentationBliana Grp Twitter Presentation
Bliana Grp Twitter Presentation
sharing notes123
 
Jasmeet Grp Facebook It Group Assig
Jasmeet Grp Facebook It Group AssigJasmeet Grp Facebook It Group Assig
Jasmeet Grp Facebook It Group Assig
sharing notes123
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
sharing notes123
 
Chen-special-topic-01-Multimedia
Chen-special-topic-01-MultimediaChen-special-topic-01-Multimedia
Chen-special-topic-01-Multimedia
sharing notes123
 
Dennis Chap 09 Data Communication
Dennis Chap 09 Data CommunicationDennis Chap 09 Data Communication
Dennis Chap 09 Data Communication
sharing notes123
 
Amr Chap 08 Operating Systems & Utility Programs
Amr Chap 08 Operating Systems & Utility ProgramsAmr Chap 08 Operating Systems & Utility Programs
Amr Chap 08 Operating Systems & Utility Programs
sharing notes123
 
Pramilah Chap 04 System Unit
Pramilah Chap 04 System UnitPramilah Chap 04 System Unit
Pramilah Chap 04 System Unit
sharing notes123
 
Adeyinka Chap 03 Application Software
Adeyinka Chap 03 Application SoftwareAdeyinka Chap 03 Application Software
Adeyinka Chap 03 Application Software
sharing notes123
 
Jasmeet Chap 01 Intro To Computers
Jasmeet Chap 01 Intro To ComputersJasmeet Chap 01 Intro To Computers
Jasmeet Chap 01 Intro To Computers
sharing notes123
 
Gevita Chap 10 Database Management
Gevita Chap 10 Database ManagementGevita Chap 10 Database Management
Gevita Chap 10 Database Management
sharing notes123
 

Plus de sharing notes123 (20)

Amr Grp Friendster
Amr Grp FriendsterAmr Grp Friendster
Amr Grp Friendster
 
Bliana Grp Twitter Presentation
Bliana Grp Twitter PresentationBliana Grp Twitter Presentation
Bliana Grp Twitter Presentation
 
Jasmeet Grp Facebook It Group Assig
Jasmeet Grp Facebook It Group AssigJasmeet Grp Facebook It Group Assig
Jasmeet Grp Facebook It Group Assig
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
 
Chen-special-topic-01-Multimedia
Chen-special-topic-01-MultimediaChen-special-topic-01-Multimedia
Chen-special-topic-01-Multimedia
 
Faizan Chap 07 Storage
Faizan Chap 07 StorageFaizan Chap 07 Storage
Faizan Chap 07 Storage
 
Dennis Chap 09 Data Communication
Dennis Chap 09 Data CommunicationDennis Chap 09 Data Communication
Dennis Chap 09 Data Communication
 
Bliana Chap 02 Internet
Bliana Chap 02 InternetBliana Chap 02 Internet
Bliana Chap 02 Internet
 
Amr Chap 08 Operating Systems & Utility Programs
Amr Chap 08 Operating Systems & Utility ProgramsAmr Chap 08 Operating Systems & Utility Programs
Amr Chap 08 Operating Systems & Utility Programs
 
Pramilah Chap 04 System Unit
Pramilah Chap 04 System UnitPramilah Chap 04 System Unit
Pramilah Chap 04 System Unit
 
Adeyinka Chap 03 Application Software
Adeyinka Chap 03 Application SoftwareAdeyinka Chap 03 Application Software
Adeyinka Chap 03 Application Software
 
Mahendran Chap 06 Output
Mahendran Chap 06 OutputMahendran Chap 06 Output
Mahendran Chap 06 Output
 
Jasmeet Chap 01 Intro To Computers
Jasmeet Chap 01 Intro To ComputersJasmeet Chap 01 Intro To Computers
Jasmeet Chap 01 Intro To Computers
 
Gevita Chap 10 Database Management
Gevita Chap 10 Database ManagementGevita Chap 10 Database Management
Gevita Chap 10 Database Management
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
 
Ais Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development StrategiesAis Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development Strategies
 
Ais Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And AisAis Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And Ais
 
Ais Romney 2006 Slides 18 Introduction To Systems Development
Ais Romney 2006 Slides 18 Introduction To Systems DevelopmentAis Romney 2006 Slides 18 Introduction To Systems Development
Ais Romney 2006 Slides 18 Introduction To Systems Development
 
Ais Romney 2006 Slides 17 Special Topics In Rea
Ais Romney 2006 Slides 17 Special Topics In ReaAis Romney 2006 Slides 17 Special Topics In Rea
Ais Romney 2006 Slides 17 Special Topics In Rea
 
Ais Romney 2006 Slides 16 Implementing An Rea
Ais Romney 2006 Slides 16 Implementing An ReaAis Romney 2006 Slides 16 Implementing An Rea
Ais Romney 2006 Slides 16 Implementing An Rea
 

Dernier

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Dernier (20)

Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 

Ais Romney 2006 Slides 09 Auditing Computer Based Is

  • 1. HAPTER 9 Auditing Computer-Based Information Systems
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49. IS COMPONENTS AND AUDIT OBJECTIVES Source Data Output Processing Source Data Data Entry Programs Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Files
  • 50. IS COMPONENTS AND AUDIT OBJECTIVES Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Source Data Output Processing Source Data Data Entry Programs Files
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56. IS COMPONENTS AND AUDIT OBJECTIVES Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Source Data Output Processing Source Data Data Entry Programs Files
  • 57. IS COMPONENTS AND AUDIT OBJECTIVES Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Source Data Output Processing Source Data Data Entry Programs Files
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63. IS COMPONENTS AND AUDIT OBJECTIVES Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Source Data Output Processing Source Data Data Entry Programs Files
  • 64. IS COMPONENTS AND AUDIT OBJECTIVES Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Source Data Output Processing Source Data Data Entry Programs Files
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73. IS COMPONENTS AND AUDIT OBJECTIVES Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Source Data Output Processing Source Data Data Entry Programs Files
  • 74. IS COMPONENTS AND AUDIT OBJECTIVES Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Source Data Output Processing Source Data Data Entry Programs Files
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87.
  • 88.
  • 89.
  • 90.
  • 91.
  • 92.
  • 93.
  • 94.
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.
  • 101.
  • 102.
  • 103.
  • 104.
  • 105.
  • 106.
  • 107.
  • 108.
  • 109. IS COMPONENTS AND AUDIT OBJECTIVES Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Source Data Output Processing Source Data Data Entry Programs Files
  • 110. IS COMPONENTS AND AUDIT OBJECTIVES Source Data Output Processing Source Data Data Entry Programs Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Files
  • 111.
  • 112.
  • 113.
  • 114.
  • 115.
  • 116.
  • 117. Record Name Employee Weekly Time Report Field Names
  • 118.
  • 119.
  • 120.
  • 121.
  • 122. IS COMPONENTS AND AUDIT OBJECTIVES Source Data Output Processing Source Data Data Entry Programs Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Files
  • 123. IS COMPONENTS AND AUDIT OBJECTIVES Source Data Output Processing Source Data Data Entry Programs Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Files
  • 124.
  • 125.
  • 126.
  • 127.
  • 128.
  • 129.
  • 130.
  • 131.
  • 132.
  • 133.
  • 134.
  • 135.
  • 136.
  • 137.
  • 138.
  • 139.
  • 140.
  • 141.
  • 142.
  • 143.
  • 144.
  • 145.
  • 146.
  • 147.
  • 148.
  • 149.
  • 150.
  • 151.