Discussion 1-1
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
693
Subject
Accounting
Date
Apr 3, 2024
Type
docx
Pages
2
Uploaded by MagistrateTurtleMaster890
First, introduce yourself to the class. Include your major and anything you would like to
share
about
yourself.
Then address the prompt below.
From the readings for this module, identify how the fraud triangle and analytical
procedures
can
be
used
in
a
computerized
investigation.
In response to peers' posts, discuss the additional training that may be needed to obtain the
skills necessary to perform the investigation methods mentioned by your peers and how
computer-assisted audit software such as Audit Command Language (ACL) can assist in
these investigations.
Hi Everyone! I’m Janieva. I currently live in MA with my husband and dog. I am taking
this course as a part of my MS in Accounting (with a concentration in Forensic Accounting)
degree. I am looking forward to learning a lot in this class! “The fraud triangle is a model showing the conditions that increase the likelihood of
fraud being committed.” (Bragg, 2023) The fraud triangle has three sides, pressure, opportunity,
and rationalization. Each side needs to be prevalent for fraud to occur. Analytical procedures are
“comparisons of recorded amounts, or ratios developed from recorded amounts to expectations
developed by the auditor.” (pcaobus.org, 2023) Analytical procedures are used to test evidential
matter. They are used by the auditor in “planning the nature, timing, and extent of other auditing
procedures.” (pcaobus.org, 2023) They also assist in the overall review of financial information
during an audit. Analytical procedures are considered an important part of an audit. They are
important because they “consist of evaluations of financial information made by a study of
plausible relationships among both financial and nonfinancial data.” (pcaobus.org, 2023)
ACL software prevents the opportunity to commit fraud, taking one side of the fraud
triangle out of the picture right away. The reason is ACL software is ‘read only’, which means
the information input cannot be changed after the fact. When using ACL software, the data is
time stamped to the date and time a table was created. The software also showcases what
commands were done and when they were done. ACL software is useful in identifying unusual
transactions and discrepancies between files. (Arens, et. al.,2017, p. 11-2) Is it because of the
reasons previously stated that ACL is useful in identifying fraud.
References
Arens, A. A., Elder, R. J., & Borsum, C. J. (2017). Data Analytics for auditing using ACL
. Armond Dalton. Au 329A analytical procedures
. Default. (n.d.). https://pcaobus.org/oversight/standards/archived-
standards/details/AU329A#:~:text=Analytical%20procedures%20involve%20comparisons
%20of,expectations%20developed%20by%20the%20auditor.
Bragg, S. (2023, November 25). Fraud triangle definition
. AccountingTools. https://www.accountingtools.com/articles/fraud-triangle
Hi Lori,
Nice to meet you! I look forward to the class with you. Also, I’d like to say your job sounds
incredibly interesting! Great post! I like that you went into detail about the fraud triangle and
how it can work well with analytical procedures. You gave me a different perspective of how the
fraud triangle can apply to an analytical procedure and an investigation. The example that you
used was clear and helped me better understand the discussion topic. Can you think of any real-
life scenarios where this was prevalent?
Thank you,
Janieva Hi Shayny,
Nice to meet you! Great post! I like that it gets straight to the point without losing any details.
The investigator can utilize both the fraud triangle and an understanding of analytical procedures
to catch fraudsters. I think they can utilize their knowledge of the fraud triangle to apply to their
investigation and create parameters to uncover fraud. Thank you,
Janieva
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Documents
Related Questions
1. Explain how client internal controls can be improved through the proper installation of IT. 2.
Distinguish between random error resulting from manual processing and systematic error resulting from
IT processing and give an example of each category of error. 3. Explain what is meant by auditing around
the computer, and describe what must be present for this approach to be effective in the audit of a client
that uses IT to process accounting information. 4. An audit client is in the process of creating an online
Web-based sales ordering system for customers to purchase products using personal credit cards for
payment. Identify three risks related to an online sales system that management should consider. For
each risk, identify an internal control that could be implemented to reduce that risk. 00000000000
arrow_forward
research data analytics in accounting information systems or emerging technologies in the accounting industry. Your presentation should focus on the impact of the selected topic on accounting information systems, internal controls, and benefits and challenges associated with its implementation.
As a PowerPoint presentation with voiceover.
The presentation should be 6-8 slides, not including the title page and the reference page.
Speaker Notes should be submitted as a Word Document. On the Word document, include a header for each slide followed by your notes.
Use this guide, APA7 Visual Presentations - CSU Global LibraryLinks to an external site., to record your voiceover for your presentation. You can also use Zoom to record your voiceover.
Your presentation should include the following headers:
Introduction – brief overview of the topic and its relevance to accounting information systems and/or emerging technologies
Impact on Accounting Information Systems – how this topic…
arrow_forward
Select the correct answer(s) for the following multiple-choice questions. Note that there may be more than one correct answer.
Cyber sleuths need the following skills:
a. Ability to do complex programming so they can develop their own software to examine corporate data and records.
b. Ability to follow a trail, think analytically, and be thorough.
c. Ability to use their computer engineering experience to evaluate the hardware used by the company
d. Ability to think like a fraud perpetrator and use hacking tools and techniques.
e. Ability to use their legal training to properly prepare the evidence needed to prosecute perpetrators
arrow_forward
Which of the following is an example of an input control?
a.making sure report that are distributed to the proper people
b.monitoring the work of data entry clerks.
c. Collecting accurate statistics of historical transactions while gathering data.
d. Performing a check-digit test on a customer acount number
e.Having anothr person review the design of a business form
arrow_forward
Which of the following controls would most effectively minimize the need to correct failures to collect required information in the account opening process?
A quality review staff that checks paper applications to ensure all fields are complete
An automated account opening platform that required data entry prior to allowing the accoun to be opened
Requiring that a manager review and apprive all new account applications
Documenting a procedure that sets forth the steps required to open an account
arrow_forward
Match each word or phrase with the best description of it.
Descriptions
Words / Phrases related tocomputerized accounting systems
a.
Allows multiple users to access the system at the same time.
Audit trailInternal controlNetwork-compatibleEnterprise resource planning systemsEntry-level software
b.
Enables the tracking of all transactions.
Audit trailEnterprise resource planning systemsEntry-level softwareNetwork-compatibleInternal control
c.
Identifies suspicious transactions or likely mistakes such as wrong account numbers or duplicate transactions.
Audit trailInternal controlEntry-level softwareEnterprise resource planning systemsNetwork-compatible
d.
Large-scale computer systems that integrate all aspects of the organization including accounting, sales, human resource…
arrow_forward
CPAs may audit around or through computers in the audit of the financial statements of clients who use IT to process accounting data.
c. In auditing through the computer, CPAs may use test data.
(1) What are test data?
(2) Why do CPAs use test data?
arrow_forward
Explain all the five steps involved in the information system based audits in your own words. How would an auditor verify the source documents while auditing accounting information systems where business is conducted fully online?
arrow_forward
CPAs may audit around or through computers in the audit of the financial statements of clients who use IT to process accounting data.
a. Describe the auditing approach referred to as “auditing around the computer."
arrow_forward
CPAs may audit around or through computers in the audit of the financial statements of clients who use IT to process accounting data.
d. How can the CPAs be satisfied that the computer programs presented to them for testing are actually those used by the client for processing accounting data?
arrow_forward
Computer-assisted audit techniques (CAATs) are becoming more popular in recent years.
Select two CAATs and explain how they are useful in auditing.
Suggest a method that someone with fraudulent intentions could use to work around the CAAT for personal gains.
Be sure to respond to at least one of your classmates' posts.
arrow_forward
Auditors are required to document their understanding of internal control. Procedure’s manuals, organization charts, internal control questionnaires, and flowcharts are reviewed during this documentation process. Consider each of these information sources and decide which you believe provides the best detailed information to help create the required documentation. Defend your choice with examples.
arrow_forward
1. Computer Assisted Audit Techniques (CAATs) are important tools than an IS auditor uses to gather and analyze data during an IS audit. One type of tool is the Generalized Audit Software (GAS). In your own words, how does CAATs affect the work of an IS auditor? What are the benefits of using CAATs in conducting an Audit?
2. Every organization has controls in place. Such controls must be effective. They are effective if they prevent, detect, or contain incidents and enable recovery from events that cause risks. Enumerate those three types of control and explain how these controls effectively address those events that cause risks
arrow_forward
To complete an audit of accounting information system effectively, auditor will need to have some knowledge of computers and their accounting applications, but not necessarily every auditor needs to be a computer expert. Explain to which extent auditors of accounting information systems should possess computer expertise to be effective auditors.
arrow_forward
Explain the normal process an auditor would expect to find in the client's systems.
governing changes to computer programs. Why is an auditor concerned about
program changes?
arrow_forward
Your client has outsourced the majority of the accounting information system to a third-party data center. What impact does that have on your audit of the financial statements?
arrow_forward
You are currently working in a mid-tier accounting firm. In an engagement meeting with a client, the management of your client is concerned that the audit tests that you perform will disrupt operations. Your client has recently implemented a data warehouse and the management suggests that you draw the data for analytical reviews and substantive testing from the data warehouse instead of the operational database. The management points out that operational data are copied weekly into the data warehouse and all data you need are contained there. Q. Outline your response to the management’s proposal and mention any concerns you might have.
arrow_forward
Explain the benefits of using audit engagement management software.
arrow_forward
Describe the differences between auditing around the computer and auditing through the computer? Which one is more effective in a computerized accounting information system? Why?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you


Accounting
Accounting
ISBN:9781337272094
Author:WARREN, Carl S., Reeve, James M., Duchac, Jonathan E.
Publisher:Cengage Learning,

Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,

Horngren's Cost Accounting: A Managerial Emphasis...
Accounting
ISBN:9780134475585
Author:Srikant M. Datar, Madhav V. Rajan
Publisher:PEARSON

Intermediate Accounting
Accounting
ISBN:9781259722660
Author:J. David Spiceland, Mark W. Nelson, Wayne M Thomas
Publisher:McGraw-Hill Education

Financial and Managerial Accounting
Accounting
ISBN:9781259726705
Author:John J Wild, Ken W. Shaw, Barbara Chiappetta Fundamental Accounting Principles
Publisher:McGraw-Hill Education
Related Questions
- 1. Explain how client internal controls can be improved through the proper installation of IT. 2. Distinguish between random error resulting from manual processing and systematic error resulting from IT processing and give an example of each category of error. 3. Explain what is meant by auditing around the computer, and describe what must be present for this approach to be effective in the audit of a client that uses IT to process accounting information. 4. An audit client is in the process of creating an online Web-based sales ordering system for customers to purchase products using personal credit cards for payment. Identify three risks related to an online sales system that management should consider. For each risk, identify an internal control that could be implemented to reduce that risk. 00000000000arrow_forwardresearch data analytics in accounting information systems or emerging technologies in the accounting industry. Your presentation should focus on the impact of the selected topic on accounting information systems, internal controls, and benefits and challenges associated with its implementation. As a PowerPoint presentation with voiceover. The presentation should be 6-8 slides, not including the title page and the reference page. Speaker Notes should be submitted as a Word Document. On the Word document, include a header for each slide followed by your notes. Use this guide, APA7 Visual Presentations - CSU Global LibraryLinks to an external site., to record your voiceover for your presentation. You can also use Zoom to record your voiceover. Your presentation should include the following headers: Introduction – brief overview of the topic and its relevance to accounting information systems and/or emerging technologies Impact on Accounting Information Systems – how this topic…arrow_forwardSelect the correct answer(s) for the following multiple-choice questions. Note that there may be more than one correct answer. Cyber sleuths need the following skills: a. Ability to do complex programming so they can develop their own software to examine corporate data and records. b. Ability to follow a trail, think analytically, and be thorough. c. Ability to use their computer engineering experience to evaluate the hardware used by the company d. Ability to think like a fraud perpetrator and use hacking tools and techniques. e. Ability to use their legal training to properly prepare the evidence needed to prosecute perpetratorsarrow_forward
- Which of the following is an example of an input control? a.making sure report that are distributed to the proper people b.monitoring the work of data entry clerks. c. Collecting accurate statistics of historical transactions while gathering data. d. Performing a check-digit test on a customer acount number e.Having anothr person review the design of a business formarrow_forwardWhich of the following controls would most effectively minimize the need to correct failures to collect required information in the account opening process? A quality review staff that checks paper applications to ensure all fields are complete An automated account opening platform that required data entry prior to allowing the accoun to be opened Requiring that a manager review and apprive all new account applications Documenting a procedure that sets forth the steps required to open an accountarrow_forwardMatch each word or phrase with the best description of it. Descriptions Words / Phrases related tocomputerized accounting systems a. Allows multiple users to access the system at the same time. Audit trailInternal controlNetwork-compatibleEnterprise resource planning systemsEntry-level software b. Enables the tracking of all transactions. Audit trailEnterprise resource planning systemsEntry-level softwareNetwork-compatibleInternal control c. Identifies suspicious transactions or likely mistakes such as wrong account numbers or duplicate transactions. Audit trailInternal controlEntry-level softwareEnterprise resource planning systemsNetwork-compatible d. Large-scale computer systems that integrate all aspects of the organization including accounting, sales, human resource…arrow_forward
- CPAs may audit around or through computers in the audit of the financial statements of clients who use IT to process accounting data. c. In auditing through the computer, CPAs may use test data. (1) What are test data? (2) Why do CPAs use test data?arrow_forwardExplain all the five steps involved in the information system based audits in your own words. How would an auditor verify the source documents while auditing accounting information systems where business is conducted fully online?arrow_forwardCPAs may audit around or through computers in the audit of the financial statements of clients who use IT to process accounting data. a. Describe the auditing approach referred to as “auditing around the computer."arrow_forward
- CPAs may audit around or through computers in the audit of the financial statements of clients who use IT to process accounting data. d. How can the CPAs be satisfied that the computer programs presented to them for testing are actually those used by the client for processing accounting data?arrow_forwardComputer-assisted audit techniques (CAATs) are becoming more popular in recent years. Select two CAATs and explain how they are useful in auditing. Suggest a method that someone with fraudulent intentions could use to work around the CAAT for personal gains. Be sure to respond to at least one of your classmates' posts.arrow_forwardAuditors are required to document their understanding of internal control. Procedure’s manuals, organization charts, internal control questionnaires, and flowcharts are reviewed during this documentation process. Consider each of these information sources and decide which you believe provides the best detailed information to help create the required documentation. Defend your choice with examples.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- AccountingAccountingISBN:9781337272094Author:WARREN, Carl S., Reeve, James M., Duchac, Jonathan E.Publisher:Cengage Learning,Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
- Horngren's Cost Accounting: A Managerial Emphasis...AccountingISBN:9780134475585Author:Srikant M. Datar, Madhav V. RajanPublisher:PEARSONIntermediate AccountingAccountingISBN:9781259722660Author:J. David Spiceland, Mark W. Nelson, Wayne M ThomasPublisher:McGraw-Hill EducationFinancial and Managerial AccountingAccountingISBN:9781259726705Author:John J Wild, Ken W. Shaw, Barbara Chiappetta Fundamental Accounting PrinciplesPublisher:McGraw-Hill Education


Accounting
Accounting
ISBN:9781337272094
Author:WARREN, Carl S., Reeve, James M., Duchac, Jonathan E.
Publisher:Cengage Learning,

Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,

Horngren's Cost Accounting: A Managerial Emphasis...
Accounting
ISBN:9780134475585
Author:Srikant M. Datar, Madhav V. Rajan
Publisher:PEARSON

Intermediate Accounting
Accounting
ISBN:9781259722660
Author:J. David Spiceland, Mark W. Nelson, Wayne M Thomas
Publisher:McGraw-Hill Education

Financial and Managerial Accounting
Accounting
ISBN:9781259726705
Author:John J Wild, Ken W. Shaw, Barbara Chiappetta Fundamental Accounting Principles
Publisher:McGraw-Hill Education