SlideShare uma empresa Scribd logo
1 de 151
HAPTER 9 Auditing Computer-Based Information Systems
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],Planning
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],Collecting Evidence Planning
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],Evaluating Evidence Collecting Evidence Planning
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Communicating Audit Results Evaluating Evidence Collecting Evidence Planning
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Communicating Audit Results Evaluating Evidence Collecting Evidence Planning
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],Communicating Audit Results Evaluating Evidence Collecting Evidence Planning
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],Communicating Audit Results Evaluating Evidence Collecting Evidence Planning ,[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Communicating Audit Results Evaluating Evidence Collecting Evidence Planning ,[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Communicating Audit Results Evaluating Evidence Collecting Evidence Planning
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INFORMATION SYSTEMS AUDITS ,[object Object],[object Object],[object Object],[object Object],[object Object]
INFORMATION SYSTEMS AUDITS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IS COMPONENTS AND AUDIT OBJECTIVES Source Data Output Processing Source Data Data Entry Programs Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Files
IS COMPONENTS AND AUDIT OBJECTIVES Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Source Data Output Processing Source Data Data Entry Programs Files
OBJECTIVE 1:  OVERALL SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 1:  OVERALL SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 1:  OVERALL SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 1:  OVERALL SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 1:  OVERALL SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IS COMPONENTS AND AUDIT OBJECTIVES Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Source Data Output Processing Source Data Data Entry Programs Files
IS COMPONENTS AND AUDIT OBJECTIVES Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Source Data Output Processing Source Data Data Entry Programs Files
OBJECTIVE 2:  PROGRAM DEVELOPMENT AND ACQUISITION ,[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 2:  PROGRAM DEVELOPMENT AND ACQUISITION ,[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 2:  PROGRAM DEVELOPMENT AND ACQUISITION ,[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 2:  PROGRAM DEVELOPMENT AND ACQUISITION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 2:  PROGRAM DEVELOPMENT AND ACQUISITION ,[object Object],[object Object],[object Object],[object Object],[object Object]
IS COMPONENTS AND AUDIT OBJECTIVES Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Source Data Output Processing Source Data Data Entry Programs Files
IS COMPONENTS AND AUDIT OBJECTIVES Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Source Data Output Processing Source Data Data Entry Programs Files
OBJECTIVE 3:  PROGRAM MODIFICATION ,[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 3:  PROGRAM MODIFICATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 3:  PROGRAM MODIFICATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 3:  PROGRAM MODIFICATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 3:  PROGRAM MODIFICATION ,[object Object],[object Object],[object Object]
OBJECTIVE 3:  PROGRAM MODIFICATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 3:  PROGRAM MODIFICATION ,[object Object],[object Object],[object Object]
OBJECTIVE 3:  PROGRAM MODIFICATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IS COMPONENTS AND AUDIT OBJECTIVES Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Source Data Output Processing Source Data Data Entry Programs Files
IS COMPONENTS AND AUDIT OBJECTIVES Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Source Data Output Processing Source Data Data Entry Programs Files
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IS COMPONENTS AND AUDIT OBJECTIVES Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Source Data Output Processing Source Data Data Entry Programs Files
IS COMPONENTS AND AUDIT OBJECTIVES Source Data Output Processing Source Data Data Entry Programs Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Files
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object],[object Object]
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object],[object Object]
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object]
Record Name Employee Weekly Time Report Field Names
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IS COMPONENTS AND AUDIT OBJECTIVES Source Data Output Processing Source Data Data Entry Programs Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Files
IS COMPONENTS AND AUDIT OBJECTIVES Source Data Output Processing Source Data Data Entry Programs Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Files
OBJECTIVE 6:  DATA FILES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 6:  DATA FILES ,[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 6:  DATA FILES ,[object Object],[object Object],[object Object]
OBJECTIVE 6:  DATA FILES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 6:  DATA FILES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 6:  DATA FILES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 6:  DATA FILES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 6:  DATA FILES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 6:  DATA FILES ,[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OPERATIONAL AUDITS OF AN AIS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OPERATIONAL AUDITS OF AN AIS ,[object Object],[object Object],[object Object],[object Object]
OPERATIONAL AUDITS OF AN AIS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OPERATIONAL AUDITS OF AN AIS ,[object Object],[object Object],[object Object],[object Object]
OPERATIONAL AUDITS OF AN AIS ,[object Object],[object Object]
SUMMARY ,[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

Business continuity planning guide
Business continuity planning guideBusiness continuity planning guide
Business continuity planning guideCenapSerdarolu
 
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)Muhammad Azmy
 
Introduction to it auditing
Introduction to it auditingIntroduction to it auditing
Introduction to it auditingDamilola Mosaku
 
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...Sreekanth Narendran
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems Jeffrey Paulette
 
Information System Audit and Control
Information System Audit and ControlInformation System Audit and Control
Information System Audit and ControlAsad Raza
 
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...Habib Ullah Qamar
 
Information System audit
Information System auditInformation System audit
Information System auditPratapchandra
 
Auditing application controls
Auditing application controlsAuditing application controls
Auditing application controlsCenapSerdarolu
 
Data analytics and audit coverage guide
Data analytics and audit coverage guideData analytics and audit coverage guide
Data analytics and audit coverage guideCenapSerdarolu
 
Ethics fraud & internal control ppt @ dom s
Ethics fraud & internal control ppt @ dom sEthics fraud & internal control ppt @ dom s
Ethics fraud & internal control ppt @ dom sBabasab Patil
 
Compliance Management | Compliance Solutions
Compliance Management | Compliance SolutionsCompliance Management | Compliance Solutions
Compliance Management | Compliance SolutionsCorporater
 
Ais Romney 2006 Slides 18 Introduction To Systems Development
Ais Romney 2006 Slides 18 Introduction To Systems DevelopmentAis Romney 2006 Slides 18 Introduction To Systems Development
Ais Romney 2006 Slides 18 Introduction To Systems DevelopmentSharing Slides Training
 
Auditing corporate governance guide
Auditing corporate governance guideAuditing corporate governance guide
Auditing corporate governance guideCenapSerdarolu
 

Mais procurados (19)

Internal controls in an IT environment
Internal controls in an IT environment Internal controls in an IT environment
Internal controls in an IT environment
 
Business continuity planning guide
Business continuity planning guideBusiness continuity planning guide
Business continuity planning guide
 
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
 
Introduction to it auditing
Introduction to it auditingIntroduction to it auditing
Introduction to it auditing
 
AIS Lecture 1
AIS Lecture 1AIS Lecture 1
AIS Lecture 1
 
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems
 
Information System Audit and Control
Information System Audit and ControlInformation System Audit and Control
Information System Audit and Control
 
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
 
3c 2 Information Systems Audit
3c   2   Information Systems Audit3c   2   Information Systems Audit
3c 2 Information Systems Audit
 
Information System audit
Information System auditInformation System audit
Information System audit
 
Auditing application controls
Auditing application controlsAuditing application controls
Auditing application controls
 
Simplifying IT GRC
Simplifying IT GRCSimplifying IT GRC
Simplifying IT GRC
 
Data analytics and audit coverage guide
Data analytics and audit coverage guideData analytics and audit coverage guide
Data analytics and audit coverage guide
 
Ethics fraud & internal control ppt @ dom s
Ethics fraud & internal control ppt @ dom sEthics fraud & internal control ppt @ dom s
Ethics fraud & internal control ppt @ dom s
 
Compliance Management | Compliance Solutions
Compliance Management | Compliance SolutionsCompliance Management | Compliance Solutions
Compliance Management | Compliance Solutions
 
Fix nix, inc
Fix nix, incFix nix, inc
Fix nix, inc
 
Ais Romney 2006 Slides 18 Introduction To Systems Development
Ais Romney 2006 Slides 18 Introduction To Systems DevelopmentAis Romney 2006 Slides 18 Introduction To Systems Development
Ais Romney 2006 Slides 18 Introduction To Systems Development
 
Auditing corporate governance guide
Auditing corporate governance guideAuditing corporate governance guide
Auditing corporate governance guide
 

Destaque

Chapter 4 : Security Part II Auditing Database System
Chapter 4 : Security Part II Auditing Database SystemChapter 4 : Security Part II Auditing Database System
Chapter 4 : Security Part II Auditing Database Systemrefidelia19
 
Information Risk Management Overview
Information Risk Management OverviewInformation Risk Management Overview
Information Risk Management Overviewelvinchan
 
Computer system administrator
Computer system administratorComputer system administrator
Computer system administratorTheZayne92
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network servicesUc Man
 
System Administration: Introduction to system administration
System Administration: Introduction to system administrationSystem Administration: Introduction to system administration
System Administration: Introduction to system administrationKhang-Ling Loh
 
Duties of a system administrator
Duties of a system administratorDuties of a system administrator
Duties of a system administratorKhang-Ling Loh
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsEd Tobias
 
13 Learning and Development Quotes to Spark Inspiration
13 Learning and Development Quotes to Spark Inspiration13 Learning and Development Quotes to Spark Inspiration
13 Learning and Development Quotes to Spark InspirationAllenComm
 
Audit Checklist for Information Systems
Audit Checklist for Information SystemsAudit Checklist for Information Systems
Audit Checklist for Information SystemsAhmad Tariq Bhatti
 
9 Learning Strategies from Knowledge to Know-How
9 Learning Strategies from Knowledge to Know-How9 Learning Strategies from Knowledge to Know-How
9 Learning Strategies from Knowledge to Know-HowLinkedIn Learning Solutions
 

Destaque (13)

ISO Diagram
ISO DiagramISO Diagram
ISO Diagram
 
Presentation 2, Audit methodologies, Workshop on System-based auditing, Tiran...
Presentation 2, Audit methodologies, Workshop on System-based auditing, Tiran...Presentation 2, Audit methodologies, Workshop on System-based auditing, Tiran...
Presentation 2, Audit methodologies, Workshop on System-based auditing, Tiran...
 
Sop 7
Sop 7Sop 7
Sop 7
 
Chapter 4 : Security Part II Auditing Database System
Chapter 4 : Security Part II Auditing Database SystemChapter 4 : Security Part II Auditing Database System
Chapter 4 : Security Part II Auditing Database System
 
Information Risk Management Overview
Information Risk Management OverviewInformation Risk Management Overview
Information Risk Management Overview
 
Computer system administrator
Computer system administratorComputer system administrator
Computer system administrator
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network services
 
System Administration: Introduction to system administration
System Administration: Introduction to system administrationSystem Administration: Introduction to system administration
System Administration: Introduction to system administration
 
Duties of a system administrator
Duties of a system administratorDuties of a system administrator
Duties of a system administrator
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT Auditors
 
13 Learning and Development Quotes to Spark Inspiration
13 Learning and Development Quotes to Spark Inspiration13 Learning and Development Quotes to Spark Inspiration
13 Learning and Development Quotes to Spark Inspiration
 
Audit Checklist for Information Systems
Audit Checklist for Information SystemsAudit Checklist for Information Systems
Audit Checklist for Information Systems
 
9 Learning Strategies from Knowledge to Know-How
9 Learning Strategies from Knowledge to Know-How9 Learning Strategies from Knowledge to Know-How
9 Learning Strategies from Knowledge to Know-How
 

Semelhante a Ais Romney 2006 Slides 09 Auditing Computer Based Is

Audits and Regulatory Compliance
Audits and Regulatory ComplianceAudits and Regulatory Compliance
Audits and Regulatory Compliancesomeshwar mankar
 
Kontrol & Audit Sistem Informasi
Kontrol & Audit Sistem InformasiKontrol & Audit Sistem Informasi
Kontrol & Audit Sistem Informasidwiki apsyarin
 
AUDIT - AUDITING STRATEGIES.pptx
AUDIT - AUDITING STRATEGIES.pptxAUDIT - AUDITING STRATEGIES.pptx
AUDIT - AUDITING STRATEGIES.pptxMohamed Fazil M
 
Chapter 1 auditing and internal control
Chapter 1 auditing and internal controlChapter 1 auditing and internal control
Chapter 1 auditing and internal controlTommy Zul Hidayat
 
Chapter 1 auditing and internal control
Chapter 1 auditing and internal controlChapter 1 auditing and internal control
Chapter 1 auditing and internal controljayussuryawan
 
24201843 studdy-note-8
24201843 studdy-note-824201843 studdy-note-8
24201843 studdy-note-8Akash Saxena
 
SEATA by TOMMY SEAH
SEATA by TOMMY SEAHSEATA by TOMMY SEAH
SEATA by TOMMY SEAHTommy Seah
 
auditpresentation-121006061658-phpapp02.pdf
auditpresentation-121006061658-phpapp02.pdfauditpresentation-121006061658-phpapp02.pdf
auditpresentation-121006061658-phpapp02.pdfowaissayyed0041
 
.POINTS TO REMEMBER ADVANCED AUDITING.pdf
.POINTS TO REMEMBER ADVANCED AUDITING.pdf.POINTS TO REMEMBER ADVANCED AUDITING.pdf
.POINTS TO REMEMBER ADVANCED AUDITING.pdfGauri More
 
Internal control.. control env
Internal control.. control envInternal control.. control env
Internal control.. control envPhillys Sebastiane
 
2008 Pioneering The Employment Services Audit In The Ontario College Sector
2008 Pioneering The Employment Services Audit In The Ontario College Sector2008 Pioneering The Employment Services Audit In The Ontario College Sector
2008 Pioneering The Employment Services Audit In The Ontario College SectorNikhat Rasheed
 
Internal control and Control Self Assessment
Internal control and Control Self AssessmentInternal control and Control Self Assessment
Internal control and Control Self AssessmentManoj Agarwal
 
Tugas mandiri audit novita dewi 11353202277
Tugas mandiri audit  novita dewi 11353202277Tugas mandiri audit  novita dewi 11353202277
Tugas mandiri audit novita dewi 11353202277novita dewi
 

Semelhante a Ais Romney 2006 Slides 09 Auditing Computer Based Is (20)

Audits and Regulatory Compliance
Audits and Regulatory ComplianceAudits and Regulatory Compliance
Audits and Regulatory Compliance
 
Kontrol & Audit Sistem Informasi
Kontrol & Audit Sistem InformasiKontrol & Audit Sistem Informasi
Kontrol & Audit Sistem Informasi
 
AUDIT - AUDITING STRATEGIES.pptx
AUDIT - AUDITING STRATEGIES.pptxAUDIT - AUDITING STRATEGIES.pptx
AUDIT - AUDITING STRATEGIES.pptx
 
Chapter 1 auditing and internal control
Chapter 1 auditing and internal controlChapter 1 auditing and internal control
Chapter 1 auditing and internal control
 
Chapter 1 auditing and internal control
Chapter 1 auditing and internal controlChapter 1 auditing and internal control
Chapter 1 auditing and internal control
 
Audit process
Audit processAudit process
Audit process
 
24201843 studdy-note-8
24201843 studdy-note-824201843 studdy-note-8
24201843 studdy-note-8
 
SEATA by TOMMY SEAH
SEATA by TOMMY SEAHSEATA by TOMMY SEAH
SEATA by TOMMY SEAH
 
Auditing concept
Auditing conceptAuditing concept
Auditing concept
 
auditpresentation-121006061658-phpapp02.pdf
auditpresentation-121006061658-phpapp02.pdfauditpresentation-121006061658-phpapp02.pdf
auditpresentation-121006061658-phpapp02.pdf
 
Audit presentation
Audit presentationAudit presentation
Audit presentation
 
.POINTS TO REMEMBER ADVANCED AUDITING.pdf
.POINTS TO REMEMBER ADVANCED AUDITING.pdf.POINTS TO REMEMBER ADVANCED AUDITING.pdf
.POINTS TO REMEMBER ADVANCED AUDITING.pdf
 
Internal control.. control env
Internal control.. control envInternal control.. control env
Internal control.. control env
 
01 Auditing CH 1.ppt
01 Auditing CH 1.ppt01 Auditing CH 1.ppt
01 Auditing CH 1.ppt
 
Operational Auditing
Operational AuditingOperational Auditing
Operational Auditing
 
2008 Pioneering The Employment Services Audit In The Ontario College Sector
2008 Pioneering The Employment Services Audit In The Ontario College Sector2008 Pioneering The Employment Services Audit In The Ontario College Sector
2008 Pioneering The Employment Services Audit In The Ontario College Sector
 
Internal control and Control Self Assessment
Internal control and Control Self AssessmentInternal control and Control Self Assessment
Internal control and Control Self Assessment
 
Database auditing models
 Database auditing models  Database auditing models
Database auditing models
 
Internal audit
Internal auditInternal audit
Internal audit
 
Tugas mandiri audit novita dewi 11353202277
Tugas mandiri audit  novita dewi 11353202277Tugas mandiri audit  novita dewi 11353202277
Tugas mandiri audit novita dewi 11353202277
 

Mais de Sharing Slides Training

Ais Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesAis Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesSharing Slides Training
 
Ais Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesAis Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesSharing Slides Training
 
Ais Romney 2006 Slides 17 Special Topics In Rea
Ais Romney 2006 Slides 17 Special Topics In ReaAis Romney 2006 Slides 17 Special Topics In Rea
Ais Romney 2006 Slides 17 Special Topics In ReaSharing Slides Training
 
Ais Romney 2006 Slides 16 Implementing An Rea
Ais Romney 2006 Slides 16 Implementing An ReaAis Romney 2006 Slides 16 Implementing An Rea
Ais Romney 2006 Slides 16 Implementing An ReaSharing Slides Training
 
Ais Romney 2006 Slides 15 Database Design Using The Rea
Ais Romney 2006 Slides 15 Database Design Using The ReaAis Romney 2006 Slides 15 Database Design Using The Rea
Ais Romney 2006 Slides 15 Database Design Using The ReaSharing Slides Training
 
Ais Romney 2006 Slides 14 General Ledger And Reporting System
Ais Romney 2006 Slides 14 General Ledger And Reporting SystemAis Romney 2006 Slides 14 General Ledger And Reporting System
Ais Romney 2006 Slides 14 General Ledger And Reporting SystemSharing Slides Training
 
Ais Romney 2006 Slides 12 The Production Cycle
Ais Romney 2006 Slides 12 The Production CycleAis Romney 2006 Slides 12 The Production Cycle
Ais Romney 2006 Slides 12 The Production CycleSharing Slides Training
 
Ais Romney 2006 Slides 11 The Expenditure Cycle
Ais Romney 2006 Slides 11 The Expenditure CycleAis Romney 2006 Slides 11 The Expenditure Cycle
Ais Romney 2006 Slides 11 The Expenditure CycleSharing Slides Training
 
Ais Romney 2006 Slides 10 The Revenue Cycle
Ais Romney 2006 Slides 10 The Revenue CycleAis Romney 2006 Slides 10 The Revenue Cycle
Ais Romney 2006 Slides 10 The Revenue CycleSharing Slides Training
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseSharing Slides Training
 

Mais de Sharing Slides Training (12)

Ais Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesAis Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational Databases
 
Ais Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesAis Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational Databases
 
Ais Romney 2006 Slides 20 System Design
Ais Romney 2006 Slides 20 System DesignAis Romney 2006 Slides 20 System Design
Ais Romney 2006 Slides 20 System Design
 
Ais Romney 2006 Slides 17 Special Topics In Rea
Ais Romney 2006 Slides 17 Special Topics In ReaAis Romney 2006 Slides 17 Special Topics In Rea
Ais Romney 2006 Slides 17 Special Topics In Rea
 
Ais Romney 2006 Slides 16 Implementing An Rea
Ais Romney 2006 Slides 16 Implementing An ReaAis Romney 2006 Slides 16 Implementing An Rea
Ais Romney 2006 Slides 16 Implementing An Rea
 
Ais Romney 2006 Slides 15 Database Design Using The Rea
Ais Romney 2006 Slides 15 Database Design Using The ReaAis Romney 2006 Slides 15 Database Design Using The Rea
Ais Romney 2006 Slides 15 Database Design Using The Rea
 
Ais Romney 2006 Slides 14 General Ledger And Reporting System
Ais Romney 2006 Slides 14 General Ledger And Reporting SystemAis Romney 2006 Slides 14 General Ledger And Reporting System
Ais Romney 2006 Slides 14 General Ledger And Reporting System
 
Ais Romney 2006 Slides 12 The Production Cycle
Ais Romney 2006 Slides 12 The Production CycleAis Romney 2006 Slides 12 The Production Cycle
Ais Romney 2006 Slides 12 The Production Cycle
 
Ais Romney 2006 Slides 11 The Expenditure Cycle
Ais Romney 2006 Slides 11 The Expenditure CycleAis Romney 2006 Slides 11 The Expenditure Cycle
Ais Romney 2006 Slides 11 The Expenditure Cycle
 
Ais Romney 2006 Slides 10 The Revenue Cycle
Ais Romney 2006 Slides 10 The Revenue CycleAis Romney 2006 Slides 10 The Revenue Cycle
Ais Romney 2006 Slides 10 The Revenue Cycle
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
 
Ais Romney 2006 Slides 01 Overview
Ais Romney 2006 Slides 01 OverviewAis Romney 2006 Slides 01 Overview
Ais Romney 2006 Slides 01 Overview
 

Último

Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesShubhangi Sonawane
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxNikitaBankoti2
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Último (20)

INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

Ais Romney 2006 Slides 09 Auditing Computer Based Is

  • 1. HAPTER 9 Auditing Computer-Based Information Systems
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49. IS COMPONENTS AND AUDIT OBJECTIVES Source Data Output Processing Source Data Data Entry Programs Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Files
  • 50. IS COMPONENTS AND AUDIT OBJECTIVES Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Source Data Output Processing Source Data Data Entry Programs Files
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56. IS COMPONENTS AND AUDIT OBJECTIVES Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Source Data Output Processing Source Data Data Entry Programs Files
  • 57. IS COMPONENTS AND AUDIT OBJECTIVES Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Source Data Output Processing Source Data Data Entry Programs Files
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63. IS COMPONENTS AND AUDIT OBJECTIVES Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Source Data Output Processing Source Data Data Entry Programs Files
  • 64. IS COMPONENTS AND AUDIT OBJECTIVES Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Source Data Output Processing Source Data Data Entry Programs Files
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73. IS COMPONENTS AND AUDIT OBJECTIVES Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Source Data Output Processing Source Data Data Entry Programs Files
  • 74. IS COMPONENTS AND AUDIT OBJECTIVES Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Source Data Output Processing Source Data Data Entry Programs Files
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87.
  • 88.
  • 89.
  • 90.
  • 91.
  • 92.
  • 93.
  • 94.
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.
  • 101.
  • 102.
  • 103.
  • 104.
  • 105.
  • 106.
  • 107.
  • 108.
  • 109. IS COMPONENTS AND AUDIT OBJECTIVES Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Source Data Output Processing Source Data Data Entry Programs Files
  • 110. IS COMPONENTS AND AUDIT OBJECTIVES Source Data Output Processing Source Data Data Entry Programs Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Files
  • 111.
  • 112.
  • 113.
  • 114.
  • 115.
  • 116.
  • 117. Record Name Employee Weekly Time Report Field Names
  • 118.
  • 119.
  • 120.
  • 121.
  • 122. IS COMPONENTS AND AUDIT OBJECTIVES Source Data Output Processing Source Data Data Entry Programs Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Files
  • 123. IS COMPONENTS AND AUDIT OBJECTIVES Source Data Output Processing Source Data Data Entry Programs Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Files
  • 124.
  • 125.
  • 126.
  • 127.
  • 128.
  • 129.
  • 130.
  • 131.
  • 132.
  • 133.
  • 134.
  • 135.
  • 136.
  • 137.
  • 138.
  • 139.
  • 140.
  • 141.
  • 142.
  • 143.
  • 144.
  • 145.
  • 146.
  • 147.
  • 148.
  • 149.
  • 150.
  • 151.