SlideShare une entreprise Scribd logo
1  sur  151
HAPTER 9 Auditing Computer-Based Information Systems
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],Planning
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],Collecting Evidence Planning
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],Evaluating Evidence Collecting Evidence Planning
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Communicating Audit Results Evaluating Evidence Collecting Evidence Planning
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Communicating Audit Results Evaluating Evidence Collecting Evidence Planning
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],Communicating Audit Results Evaluating Evidence Collecting Evidence Planning
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],Communicating Audit Results Evaluating Evidence Collecting Evidence Planning ,[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Communicating Audit Results Evaluating Evidence Collecting Evidence Planning ,[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Communicating Audit Results Evaluating Evidence Collecting Evidence Planning
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INFORMATION SYSTEMS AUDITS ,[object Object],[object Object],[object Object],[object Object],[object Object]
INFORMATION SYSTEMS AUDITS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IS COMPONENTS AND AUDIT OBJECTIVES Source Data Output Processing Source Data Data Entry Programs Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Files
IS COMPONENTS AND AUDIT OBJECTIVES Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Source Data Output Processing Source Data Data Entry Programs Files
OBJECTIVE 1:  OVERALL SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 1:  OVERALL SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 1:  OVERALL SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 1:  OVERALL SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 1:  OVERALL SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IS COMPONENTS AND AUDIT OBJECTIVES Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Source Data Output Processing Source Data Data Entry Programs Files
IS COMPONENTS AND AUDIT OBJECTIVES Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Source Data Output Processing Source Data Data Entry Programs Files
OBJECTIVE 2:  PROGRAM DEVELOPMENT AND ACQUISITION ,[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 2:  PROGRAM DEVELOPMENT AND ACQUISITION ,[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 2:  PROGRAM DEVELOPMENT AND ACQUISITION ,[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 2:  PROGRAM DEVELOPMENT AND ACQUISITION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 2:  PROGRAM DEVELOPMENT AND ACQUISITION ,[object Object],[object Object],[object Object],[object Object],[object Object]
IS COMPONENTS AND AUDIT OBJECTIVES Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Source Data Output Processing Source Data Data Entry Programs Files
IS COMPONENTS AND AUDIT OBJECTIVES Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Source Data Output Processing Source Data Data Entry Programs Files
OBJECTIVE 3:  PROGRAM MODIFICATION ,[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 3:  PROGRAM MODIFICATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 3:  PROGRAM MODIFICATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 3:  PROGRAM MODIFICATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 3:  PROGRAM MODIFICATION ,[object Object],[object Object],[object Object]
OBJECTIVE 3:  PROGRAM MODIFICATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 3:  PROGRAM MODIFICATION ,[object Object],[object Object],[object Object]
OBJECTIVE 3:  PROGRAM MODIFICATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IS COMPONENTS AND AUDIT OBJECTIVES Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Source Data Output Processing Source Data Data Entry Programs Files
IS COMPONENTS AND AUDIT OBJECTIVES Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Source Data Output Processing Source Data Data Entry Programs Files
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IS COMPONENTS AND AUDIT OBJECTIVES Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Source Data Output Processing Source Data Data Entry Programs Files
IS COMPONENTS AND AUDIT OBJECTIVES Source Data Output Processing Source Data Data Entry Programs Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Files
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object],[object Object]
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object],[object Object]
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object]
Record Name Employee Weekly Time Report Field Names
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IS COMPONENTS AND AUDIT OBJECTIVES Source Data Output Processing Source Data Data Entry Programs Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Files
IS COMPONENTS AND AUDIT OBJECTIVES Source Data Output Processing Source Data Data Entry Programs Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Files
OBJECTIVE 6:  DATA FILES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 6:  DATA FILES ,[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 6:  DATA FILES ,[object Object],[object Object],[object Object]
OBJECTIVE 6:  DATA FILES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 6:  DATA FILES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 6:  DATA FILES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 6:  DATA FILES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 6:  DATA FILES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 6:  DATA FILES ,[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OPERATIONAL AUDITS OF AN AIS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OPERATIONAL AUDITS OF AN AIS ,[object Object],[object Object],[object Object],[object Object]
OPERATIONAL AUDITS OF AN AIS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OPERATIONAL AUDITS OF AN AIS ,[object Object],[object Object],[object Object],[object Object]
OPERATIONAL AUDITS OF AN AIS ,[object Object],[object Object]
SUMMARY ,[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

Internal auditors’ roles and responsibilities
Internal auditors’ roles and responsibilitiesInternal auditors’ roles and responsibilities
Internal auditors’ roles and responsibilities
Salih Islam
 
Chapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraudChapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraud
VidaB
 
Chapter 2. audit planning procedures & documentation
Chapter 2. audit planning procedures & documentationChapter 2. audit planning procedures & documentation
Chapter 2. audit planning procedures & documentation
Thane
 

Tendances (20)

Forensic accounting
Forensic accountingForensic accounting
Forensic accounting
 
forensic accounting& role and function of forensic accountant
 forensic accounting& role and function of forensic accountant forensic accounting& role and function of forensic accountant
forensic accounting& role and function of forensic accountant
 
Audit of the acquisition and payment cycle
Audit of the acquisition and payment cycleAudit of the acquisition and payment cycle
Audit of the acquisition and payment cycle
 
Internal auditors’ roles and responsibilities
Internal auditors’ roles and responsibilitiesInternal auditors’ roles and responsibilities
Internal auditors’ roles and responsibilities
 
Forensic accounting
Forensic accountingForensic accounting
Forensic accounting
 
Accounting Information System BY Ahmed Yasir Khan.
Accounting Information System BY Ahmed Yasir Khan.Accounting Information System BY Ahmed Yasir Khan.
Accounting Information System BY Ahmed Yasir Khan.
 
Audit & Investigation Presentation Module 1.pptx
Audit & Investigation Presentation Module 1.pptxAudit & Investigation Presentation Module 1.pptx
Audit & Investigation Presentation Module 1.pptx
 
AUDIT CASE
AUDIT CASEAUDIT CASE
AUDIT CASE
 
Chapter 11, Tests of Controls
Chapter 11, Tests of ControlsChapter 11, Tests of Controls
Chapter 11, Tests of Controls
 
INTERNATIONAL AUDITING STANDARDS -PPT.pptx
INTERNATIONAL AUDITING STANDARDS -PPT.pptxINTERNATIONAL AUDITING STANDARDS -PPT.pptx
INTERNATIONAL AUDITING STANDARDS -PPT.pptx
 
Chapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraudChapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraud
 
Internal Audit
Internal AuditInternal Audit
Internal Audit
 
Lecture 10, chap 15, Chapter 15,Auditing Purchases, Payables and Payroll
Lecture 10,  chap 15, Chapter 15,Auditing Purchases, Payables and PayrollLecture 10,  chap 15, Chapter 15,Auditing Purchases, Payables and Payroll
Lecture 10, chap 15, Chapter 15,Auditing Purchases, Payables and Payroll
 
8. internal control new
8. internal control new8. internal control new
8. internal control new
 
Audit of the acquisition and payment cycle
Audit of the acquisition and payment cycleAudit of the acquisition and payment cycle
Audit of the acquisition and payment cycle
 
Internal controls
Internal controlsInternal controls
Internal controls
 
Chapter 2. audit planning procedures & documentation
Chapter 2. audit planning procedures & documentationChapter 2. audit planning procedures & documentation
Chapter 2. audit planning procedures & documentation
 
Topic 7 audit planning
Topic 7 audit planningTopic 7 audit planning
Topic 7 audit planning
 
Lecture slide, chapter 5, The Auditor’s Legal Liability
Lecture slide, chapter 5,    The Auditor’s Legal LiabilityLecture slide, chapter 5,    The Auditor’s Legal Liability
Lecture slide, chapter 5, The Auditor’s Legal Liability
 
AUDIT EVIDENCE
AUDIT EVIDENCE AUDIT EVIDENCE
AUDIT EVIDENCE
 

En vedette

Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6
Sharah Ayumi
 
Ais Romney 2006 Slides 11 The Expenditure Cycle
Ais Romney 2006 Slides 11 The Expenditure CycleAis Romney 2006 Slides 11 The Expenditure Cycle
Ais Romney 2006 Slides 11 The Expenditure Cycle
Sharing Slides Training
 
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
Rikesh Chaurasia
 

En vedette (20)

Ais Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesAis Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational Databases
 
Ais Romney 2006 Slides 02 Business Process
Ais Romney 2006 Slides 02 Business ProcessAis Romney 2006 Slides 02 Business Process
Ais Romney 2006 Slides 02 Business Process
 
Ais Romney 2006 Slides 15 Database Design Using The Rea
Ais Romney 2006 Slides 15 Database Design Using The ReaAis Romney 2006 Slides 15 Database Design Using The Rea
Ais Romney 2006 Slides 15 Database Design Using The Rea
 
Uthaya Chap 05 Input
Uthaya Chap 05 InputUthaya Chap 05 Input
Uthaya Chap 05 Input
 
Ais Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And AisAis Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And Ais
 
Ais Romney 2006 Slides 18 Introduction To Systems Development
Ais Romney 2006 Slides 18 Introduction To Systems DevelopmentAis Romney 2006 Slides 18 Introduction To Systems Development
Ais Romney 2006 Slides 18 Introduction To Systems Development
 
Ais Romney 2006 Slides 14 General Ledger And Reporting System
Ais Romney 2006 Slides 14 General Ledger And Reporting SystemAis Romney 2006 Slides 14 General Ledger And Reporting System
Ais Romney 2006 Slides 14 General Ledger And Reporting System
 
Ais Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesAis Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational Databases
 
Ais Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesAis Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational Databases
 
Ais Romney 2006 Slides 01 Overview
Ais Romney 2006 Slides 01 OverviewAis Romney 2006 Slides 01 Overview
Ais Romney 2006 Slides 01 Overview
 
Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
 
Ais Romney 2006 Slides 13 The Hr Cycle
Ais Romney 2006 Slides 13 The Hr CycleAis Romney 2006 Slides 13 The Hr Cycle
Ais Romney 2006 Slides 13 The Hr Cycle
 
Ais Romney 2006 Slides 11 The Expenditure Cycle
Ais Romney 2006 Slides 11 The Expenditure CycleAis Romney 2006 Slides 11 The Expenditure Cycle
Ais Romney 2006 Slides 11 The Expenditure Cycle
 
Accounting information system
Accounting information systemAccounting information system
Accounting information system
 
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Sppt chap017
Sppt chap017Sppt chap017
Sppt chap017
 
Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1
 
Ais Romney 2006 Slides 06 Control And Ais Part 1
Ais Romney 2006 Slides 06 Control And Ais Part 1Ais Romney 2006 Slides 06 Control And Ais Part 1
Ais Romney 2006 Slides 06 Control And Ais Part 1
 

Similaire à Ais Romney 2006 Slides 09 Auditing Computer Based Is

24201843 studdy-note-8
24201843 studdy-note-824201843 studdy-note-8
24201843 studdy-note-8
Akash Saxena
 
auditpresentation-121006061658-phpapp02.pdf
auditpresentation-121006061658-phpapp02.pdfauditpresentation-121006061658-phpapp02.pdf
auditpresentation-121006061658-phpapp02.pdf
owaissayyed0041
 
2008 Pioneering The Employment Services Audit In The Ontario College Sector
2008 Pioneering The Employment Services Audit In The Ontario College Sector2008 Pioneering The Employment Services Audit In The Ontario College Sector
2008 Pioneering The Employment Services Audit In The Ontario College Sector
Nikhat Rasheed
 

Similaire à Ais Romney 2006 Slides 09 Auditing Computer Based Is (20)

Audits and Regulatory Compliance
Audits and Regulatory ComplianceAudits and Regulatory Compliance
Audits and Regulatory Compliance
 
Kontrol & Audit Sistem Informasi
Kontrol & Audit Sistem InformasiKontrol & Audit Sistem Informasi
Kontrol & Audit Sistem Informasi
 
AUDIT - AUDITING STRATEGIES.pptx
AUDIT - AUDITING STRATEGIES.pptxAUDIT - AUDITING STRATEGIES.pptx
AUDIT - AUDITING STRATEGIES.pptx
 
Chapter 1 auditing and internal control
Chapter 1 auditing and internal controlChapter 1 auditing and internal control
Chapter 1 auditing and internal control
 
Chapter 1 auditing and internal control
Chapter 1 auditing and internal controlChapter 1 auditing and internal control
Chapter 1 auditing and internal control
 
Audit process
Audit processAudit process
Audit process
 
24201843 studdy-note-8
24201843 studdy-note-824201843 studdy-note-8
24201843 studdy-note-8
 
SEATA by TOMMY SEAH
SEATA by TOMMY SEAHSEATA by TOMMY SEAH
SEATA by TOMMY SEAH
 
Auditing concept
Auditing conceptAuditing concept
Auditing concept
 
auditpresentation-121006061658-phpapp02.pdf
auditpresentation-121006061658-phpapp02.pdfauditpresentation-121006061658-phpapp02.pdf
auditpresentation-121006061658-phpapp02.pdf
 
Audit presentation
Audit presentationAudit presentation
Audit presentation
 
.POINTS TO REMEMBER ADVANCED AUDITING.pdf
.POINTS TO REMEMBER ADVANCED AUDITING.pdf.POINTS TO REMEMBER ADVANCED AUDITING.pdf
.POINTS TO REMEMBER ADVANCED AUDITING.pdf
 
Internal control.. control env
Internal control.. control envInternal control.. control env
Internal control.. control env
 
01 Auditing CH 1.ppt
01 Auditing CH 1.ppt01 Auditing CH 1.ppt
01 Auditing CH 1.ppt
 
Operational Auditing
Operational AuditingOperational Auditing
Operational Auditing
 
2008 Pioneering The Employment Services Audit In The Ontario College Sector
2008 Pioneering The Employment Services Audit In The Ontario College Sector2008 Pioneering The Employment Services Audit In The Ontario College Sector
2008 Pioneering The Employment Services Audit In The Ontario College Sector
 
Internal control and Control Self Assessment
Internal control and Control Self AssessmentInternal control and Control Self Assessment
Internal control and Control Self Assessment
 
Database auditing models
 Database auditing models  Database auditing models
Database auditing models
 
Internal audit
Internal auditInternal audit
Internal audit
 
Tugas mandiri audit novita dewi 11353202277
Tugas mandiri audit  novita dewi 11353202277Tugas mandiri audit  novita dewi 11353202277
Tugas mandiri audit novita dewi 11353202277
 

Plus de sharing notes123

Bliana Grp Twitter Presentation
Bliana Grp Twitter PresentationBliana Grp Twitter Presentation
Bliana Grp Twitter Presentation
sharing notes123
 
Jasmeet Grp Facebook It Group Assig
Jasmeet Grp Facebook It Group AssigJasmeet Grp Facebook It Group Assig
Jasmeet Grp Facebook It Group Assig
sharing notes123
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
sharing notes123
 
Chen-special-topic-01-Multimedia
Chen-special-topic-01-MultimediaChen-special-topic-01-Multimedia
Chen-special-topic-01-Multimedia
sharing notes123
 
Dennis Chap 09 Data Communication
Dennis Chap 09 Data CommunicationDennis Chap 09 Data Communication
Dennis Chap 09 Data Communication
sharing notes123
 
Amr Chap 08 Operating Systems & Utility Programs
Amr Chap 08 Operating Systems & Utility ProgramsAmr Chap 08 Operating Systems & Utility Programs
Amr Chap 08 Operating Systems & Utility Programs
sharing notes123
 
Pramilah Chap 04 System Unit
Pramilah Chap 04 System UnitPramilah Chap 04 System Unit
Pramilah Chap 04 System Unit
sharing notes123
 
Adeyinka Chap 03 Application Software
Adeyinka Chap 03 Application SoftwareAdeyinka Chap 03 Application Software
Adeyinka Chap 03 Application Software
sharing notes123
 
Jasmeet Chap 01 Intro To Computers
Jasmeet Chap 01 Intro To ComputersJasmeet Chap 01 Intro To Computers
Jasmeet Chap 01 Intro To Computers
sharing notes123
 
Gevita Chap 10 Database Management
Gevita Chap 10 Database ManagementGevita Chap 10 Database Management
Gevita Chap 10 Database Management
sharing notes123
 

Plus de sharing notes123 (20)

Amr Grp Friendster
Amr Grp FriendsterAmr Grp Friendster
Amr Grp Friendster
 
Bliana Grp Twitter Presentation
Bliana Grp Twitter PresentationBliana Grp Twitter Presentation
Bliana Grp Twitter Presentation
 
Jasmeet Grp Facebook It Group Assig
Jasmeet Grp Facebook It Group AssigJasmeet Grp Facebook It Group Assig
Jasmeet Grp Facebook It Group Assig
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
 
Chen-special-topic-01-Multimedia
Chen-special-topic-01-MultimediaChen-special-topic-01-Multimedia
Chen-special-topic-01-Multimedia
 
Faizan Chap 07 Storage
Faizan Chap 07 StorageFaizan Chap 07 Storage
Faizan Chap 07 Storage
 
Dennis Chap 09 Data Communication
Dennis Chap 09 Data CommunicationDennis Chap 09 Data Communication
Dennis Chap 09 Data Communication
 
Bliana Chap 02 Internet
Bliana Chap 02 InternetBliana Chap 02 Internet
Bliana Chap 02 Internet
 
Amr Chap 08 Operating Systems & Utility Programs
Amr Chap 08 Operating Systems & Utility ProgramsAmr Chap 08 Operating Systems & Utility Programs
Amr Chap 08 Operating Systems & Utility Programs
 
Pramilah Chap 04 System Unit
Pramilah Chap 04 System UnitPramilah Chap 04 System Unit
Pramilah Chap 04 System Unit
 
Adeyinka Chap 03 Application Software
Adeyinka Chap 03 Application SoftwareAdeyinka Chap 03 Application Software
Adeyinka Chap 03 Application Software
 
Mahendran Chap 06 Output
Mahendran Chap 06 OutputMahendran Chap 06 Output
Mahendran Chap 06 Output
 
Jasmeet Chap 01 Intro To Computers
Jasmeet Chap 01 Intro To ComputersJasmeet Chap 01 Intro To Computers
Jasmeet Chap 01 Intro To Computers
 
Gevita Chap 10 Database Management
Gevita Chap 10 Database ManagementGevita Chap 10 Database Management
Gevita Chap 10 Database Management
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
 
Ais Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development StrategiesAis Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development Strategies
 
Ais Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And AisAis Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And Ais
 
Ais Romney 2006 Slides 18 Introduction To Systems Development
Ais Romney 2006 Slides 18 Introduction To Systems DevelopmentAis Romney 2006 Slides 18 Introduction To Systems Development
Ais Romney 2006 Slides 18 Introduction To Systems Development
 
Ais Romney 2006 Slides 17 Special Topics In Rea
Ais Romney 2006 Slides 17 Special Topics In ReaAis Romney 2006 Slides 17 Special Topics In Rea
Ais Romney 2006 Slides 17 Special Topics In Rea
 
Ais Romney 2006 Slides 16 Implementing An Rea
Ais Romney 2006 Slides 16 Implementing An ReaAis Romney 2006 Slides 16 Implementing An Rea
Ais Romney 2006 Slides 16 Implementing An Rea
 

Dernier

Dernier (20)

Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 

Ais Romney 2006 Slides 09 Auditing Computer Based Is

  • 1. HAPTER 9 Auditing Computer-Based Information Systems
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49. IS COMPONENTS AND AUDIT OBJECTIVES Source Data Output Processing Source Data Data Entry Programs Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Files
  • 50. IS COMPONENTS AND AUDIT OBJECTIVES Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Source Data Output Processing Source Data Data Entry Programs Files
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56. IS COMPONENTS AND AUDIT OBJECTIVES Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Source Data Output Processing Source Data Data Entry Programs Files
  • 57. IS COMPONENTS AND AUDIT OBJECTIVES Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Source Data Output Processing Source Data Data Entry Programs Files
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63. IS COMPONENTS AND AUDIT OBJECTIVES Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Source Data Output Processing Source Data Data Entry Programs Files
  • 64. IS COMPONENTS AND AUDIT OBJECTIVES Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Source Data Output Processing Source Data Data Entry Programs Files
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73. IS COMPONENTS AND AUDIT OBJECTIVES Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Source Data Output Processing Source Data Data Entry Programs Files
  • 74. IS COMPONENTS AND AUDIT OBJECTIVES Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Source Data Output Processing Source Data Data Entry Programs Files
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87.
  • 88.
  • 89.
  • 90.
  • 91.
  • 92.
  • 93.
  • 94.
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.
  • 101.
  • 102.
  • 103.
  • 104.
  • 105.
  • 106.
  • 107.
  • 108.
  • 109. IS COMPONENTS AND AUDIT OBJECTIVES Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Source Data Output Processing Source Data Data Entry Programs Files
  • 110. IS COMPONENTS AND AUDIT OBJECTIVES Source Data Output Processing Source Data Data Entry Programs Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Files
  • 111.
  • 112.
  • 113.
  • 114.
  • 115.
  • 116.
  • 117. Record Name Employee Weekly Time Report Field Names
  • 118.
  • 119.
  • 120.
  • 121.
  • 122. IS COMPONENTS AND AUDIT OBJECTIVES Source Data Output Processing Source Data Data Entry Programs Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Files
  • 123. IS COMPONENTS AND AUDIT OBJECTIVES Source Data Output Processing Source Data Data Entry Programs Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Files
  • 124.
  • 125.
  • 126.
  • 127.
  • 128.
  • 129.
  • 130.
  • 131.
  • 132.
  • 133.
  • 134.
  • 135.
  • 136.
  • 137.
  • 138.
  • 139.
  • 140.
  • 141.
  • 142.
  • 143.
  • 144.
  • 145.
  • 146.
  • 147.
  • 148.
  • 149.
  • 150.
  • 151.