Critical Issues in International and Electronic Audit Evidence
Author(s)
Josiah, Mary , Izedonmi, P. F ,
Download Full PDF Pages: 1-14 | Views: 466 | Downloads: 134 | DOI: 10.5281/zenodo.3404679
Abstract
This paper is to examine the critical issues in international and electronic audit evidence. As entities process more data electronically, auditors should consider the validity completeness and integrity of such evidence. Today the development and convergences of information system allow for the saemless flow of information. Paperless environment are common place and in this context auditors gather electronic information as audit evidence. There are differences between paper work and electronic audit evidence. Auditors should focus on security issues by checking if the outsourcer shares valuable data and identify specific, local controls to prevent fraud and abuse especially when confidential information exist.
Keywords
CRITICAL ISSUES, ELECTRONIC, AUDIT EVIDENCE
References
i. Aggarwal, R. and Hughes, C. (1996). “Internal control in system development with CASE”. Internal auditing Vol;. 53. Winter, pp. 26-33.
ii. American Institute of Certified Public Accountants (1980). Evidential Matter Statement on Auditing Standards (SAS) No. 31,August.
iii. American Institute of Certified Public accountants (1988). Consideration of the Internal control Structure in a financial audit, SAS No. 55. April. American Institute of Certified Public accountants (1995). Consideration of Internal control in a financial Statement audit: amendment to SAS No. 55, December.
iv. American Institute of Certified Public accountants (1996). Amendment to Statement on auditing Standards No. 31, Evidential Matter, SAS No. 80 December.
v. American Institute of Certified Public Accountants (1997). The Information Technology Age Evidential Matter an Auditing Procedures Study.
vi. Carmichael, D. (1995). “Business risk internal control and audit implication of EDI”. The CPA Journal Vol. 65 November, pp. 56-61.
vii. Colbert, J. and Bowen, P. (1996). “A comparison of internal controls: COBIT. SAC, COSo, SAS 55/78”, IS Audit and control Journal Vol. 4 pp. 26-35.
viii. Gallegos, F. and Powell, S. (1996). “Telecommunications networks in virtual corporations”. IS audit and control Journal Vol. 3, pp. 26-8.
ix. Glover, S. and Romney, M. (1997). “Software – 20 hot trends”. The Internal auditor, Vol. 54 august, pp. 28-35.
x. Helms, C.. and Mancino, J. (1998). “The electronic auditor”. Journal of Accountancy, April pp. 45-8.
xi. Information systems audit and control foundation (1996). “COBIT control objectives for information and related technology”, IS Audit and control Journal, Vol. 4 pp. 12-12.
xii. Joseph, G. and Engle. T. (1996). “Controlling EDI environments consistent with COBIT and COSO”. IS audit and control Journal, Vol. 4 pp. 36-41.
xiii. Lainhart, J. (1996). “Arrival of cOBIt helps refine the valuable role of IS audit and control in the enterprise”. IS audit and control Journal, Vol. 4 pp. 20-3.
xiv. Louwers, T. and Pasewark, W. (1996). “The Internet: changing the way corporations tell their story”. The CPa Journal Vol. 66 November pp. 24-8.
xv. Mancuso,A. (1997). “Auditing Standard Board issues SAS No. 80”. The CPA Journal Vol. 67 March. P.74.
xvi. Marsch,H.L. (1991). “SAC is back the new systems audit ability and control report”. Management Accounting January pp. 57-60.
xvii. Moreland, K. (1997). “SAS 80 amends SAS 31 to address information technology”. The Ohio CPA Journal, July-Sepetember pp. 47-9.
xviii. Oz, E. (1998). Management Information Systems, 1st ed. Course Technology Cambridge, MA. Prawitt, D. and Romney, M. (1997). “Emerging business technologies”. The Internal Auditor vol. 54 February pp. 25-32.
xix. Rezace, Z and Aggarwal, R. (1996). “EDI risk assessment”. The Internal auditor Vol. 53 February pp. 40-4.
xx. Robertson, J.C. and Louwers, T.J. (1999). Auditing 9 th ed. Irwin McGraw Hill, Burr Ridge IL.
xxi. Roesh, L and Henry, I. (1997). “Client/server system”. Journal Auditing vol. 5 august pp. 40-3.
xxii. Simmons, M. (1997). “The standards and the framework”. The Internal auditor vol. 54 April, pp.50-5.
Cite this Article: