Transcribed Image Text
Information Produced by the EntityExample 3 – Audit procedures to address audit risksrelated to IPE from a transaction processComplete the following table, indicating the audit procedurethat would be performed to address the identified risk.Risk 1: The IT application is not processing data correctly(incomplete or inaccurate).Information about ABC’s shipments is input manually into the ITapplication by the shipping clerk. The risk is that the shippingclerk mistypes the quantity shipped.Audit procedure to address the risk:Risk 2: The IT application is not collecting data correctlyfor output (incomplete or inaccurate).The auditor obtains from the accounts receivable clerk an agedcustomer list of unpaid amounts. The risks include that the dataextracted includes paid invoices, does not include all unpaidinvoices (e.g., excludes the unpaid invoices for one line ofbusiness) or includes all unpaid invoices but excludes unmatchedcredit notes.Audit procedure to address the risk:Risk 3: The IT application is not computing or categorizingdata correctly for output (inaccurate).The auditor obtains from the accounts receivable clerk an agedcustomer list of unpaid amounts. The risk includes that theinvoices may be aged differently than expected or the aging columnsmay not be totaled accurately (e.g., the aging column content maybe different than expected because the user expects aging of theinvoice date but the IT application ages according to the due date,or the user expects the total to be the sum of the numbers in thecolumn but the IT application obtains the total number from asummary data table rather than creating the sum of the detailsdisplayed).Audit procedure to address the risk:Risk 4: The output from the IT application into the EUC toolis modified or lost in the transfer to the tool (incomplete orinaccurate).The auditor obtains from the accounts receivable clerk an agedcustomer list of unpaid amounts that was exported from the accountspayable application into Excel. The risk is that the data did nottransfer correctly, including such issues as larger numbers beingtruncated when exported or lines of information being dropped inthe transfer.Audit procedure to address the risk:Risk 5: The output from the IT application into the EUC toolor the output from the EUC tool is incomplete (data is missing) orinaccurate (data has been added, changed, computed or categorizedincorrectly).The auditor obtains from the accounts receivable clerk an agedcustomer list of unpaid amounts that was exported from the accountspayable application into Excel. The risk is that fictitious unpaidinvoices are inserted into the spreadsheet or formulas intended tocalculate a provision for old, unpaid amounts are incorrect.Audit procedure to address the risk:Information Produced by the Entity (IPE)Example 4 – Examples of IPE from an ITprocessComplete the following table, indicating whether the item is anexample of IPE from an IT process and explain why or why not.ItemIPE?Why or why not?An Excel log of actions by programmers who have access toproduction programs that comprise IT applicationsAn email exchange evidencing approval for a program changeA report of IT system settings of a particular financialreporting systemA listing of all program changes made during a given period ofthe year, from which the auditor plans to select a sample fortesting Information Produced by the EntityExample 5 – Audit risks associated with IPE from an ITprocessComplete the following table, indicating which risk (by numberand description) is associated with each processing error.Processing errorRisk numberRisk descriptionThe quarterly user access review is initiated by the businessanalyst, who generates a report from the IT application and exportsit into Excel. The Excel spreadsheet then separates the listinginto five different reports based on the user’s business unit (BU).In categorizing the user by BU, Excel excludes all new employeesfrom the listing and, thus, those individuals are not subject tothe review by the respective BU director.You have requested a system-generated listing of PeopleSoftusers with a create date from 1/1/2XX2 through 6/30/2XX2. Thecompany runs a report, but mistakenly inputs the end date as6/1/2XX2.You have requested a system-generated listing of productiondirectories and files for a UNIX server that supports an in-scopeapplication. The client exports the results of the query to anExcel file. The client uses Excel 2003 and, because there is alimit of 65,000 rows, all remaining rows are dropped in thetransfer process.
Other questions asked by students
1. Explain, in your own words, characteristics that make a firm a good candidate for an...
In the Knaster procedure, why is it important that the bids be sealed? Do the bids have...
Analyze the sociocultural relationship between mental illness and poverty.
Calculate the final speed of an object dropped on Earth from altitude of 8 times the...
Tutorial Exercise You may need to use the appropriate appendix table or technology to answer...
Other data: 1. Raw materials inventory totaled $19,200 on January 1. During the...
On January 1,2023, a company issued 5-year, 7% bonds with a par value of $400,000....
Tinkers cost of goods sold in the year of sale (2014) was $760,000 and 2013...