Question

Auditing an information system requires knowledge of both accounting and information technology. In today's business environment,...

Auditing an information system requires knowledge of both accounting and information technology. In today's business environment, how much computer and technical skills do you think an auditor should have to be an effective auditor? your initial response should be at least 200 words long.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

IT Audit professionals need to have technical and business knowledge to understand the scope of the assignment, conduct the assignment, assess findings and provide value added recommendations to the client. The technical knowledge varies as per the ERP the auditor is auditing. Eg, SAP will require different amount of knowledge when compared to JDE or Peoplesoft. Certifications such as Certified Information Systems Auditor (CISA) and the Certified Information Security Manager® (CISM®) demonstrate knowledge and competence of an individual to perform IT Audit. With an ever increasing regulations, rules, acts, standards, industry guidelines, it is imperative that IT auditor aligns business as well technical knowledge. This will not increase the relevance and practicality of IT Audit but also help in addressing the impact of the findings. IT auditing involves application of risk oriented audit approach, use of computer assisted audit tools (caats), assessment of information security and privacy issues etc. A lot of public accounting firms require IT Auditor to begin with financial audit to gain understanding organization’s audit methodologies. Business operations are changing at tremendous pace because of the advancement in technology. It has impacted how audits are conducted. IT Auditing has become integral part of the audit because it supports the judgment of the auditor who is relying on the information processed by the system.

Add a comment
Know the answer?
Add Answer to:
Auditing an information system requires knowledge of both accounting and information technology. In today's business environment,...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • The 21st Century Auditor" Please respond to the following: The 21st century auditor requires knowledge of...

    The 21st Century Auditor" Please respond to the following: The 21st century auditor requires knowledge of technology and accounting information systems in addition to his / her understanding of accounting concepts and guidelines. The degree of knowledge in technology and AIS will vary with each auditor. Recommend the top-five technology and AIS skills that the 21st century auditor should have. Justify your recommendations. Now, recommend a series of actions that need to be taken by auditors and their firms to...

  • The 21st Century Auditor" Please respond to the following: The 21st century auditor requires knowledge of...

    The 21st Century Auditor" Please respond to the following: The 21st century auditor requires knowledge of technology and accounting information systems in addition to his / her understanding of accounting concepts and guidelines. The degree of knowledge in technology and AIS will vary with each auditor. Recommend the top-five technology and AIS skills that the 21st century auditor should have. Justify your recommendations. Now, recommend a series of actions that need to be taken by auditors and their firms to...

  • In today’s technology environment, hackers present a substantial risk to a firm’s accounting or business system....

    In today’s technology environment, hackers present a substantial risk to a firm’s accounting or business system. As the result of these attacks, firms suffer huge losses, ranging from financial losses to losses in confidence by consumers, creditors, and suppliers. Firms may have made a significant investment in financial and non-financial resources to secure these systems. Imagine that Target uses a third-party accounting system. Assess the level of responsibility of the software provider to both the business and its clients. Provide...

  • In today’s technology environment, hackers present a substantial risk to a firm’s accounting or business system....

    In today’s technology environment, hackers present a substantial risk to a firm’s accounting or business system. As the result of these attacks, firms suffer huge losses, ranging from financial losses to losses in confidence by consumers, creditors, and suppliers. Firms may have made a significant investment in financial and non-financial resources to secure these systems. evaluate the level of responsibility of Target in terms of the effectiveness of the response to the security breach. Provide support for your rationale. Please...

  • In today’s technology environment, hackers present a substantial risk to a firm’s accounting or business system....

    In today’s technology environment, hackers present a substantial risk to a firm’s accounting or business system. As the result of these attacks, firms suffer huge losses, ranging from financial losses to losses in confidence by consumers, creditors, and suppliers. Firms may have made a significant investment in financial and non-financial resources to secure these systems. Provide at least three (3) recommendations for businesses to secure their systems and assets from hackers. Provide support for your recommendation. Please include any references...

  • In today’s technology environment, hackers present a substantial risk to a firm’s accounting or business system....

    In today’s technology environment, hackers present a substantial risk to a firm’s accounting or business system. As the result of these attacks, firms suffer huge losses, ranging from financial losses to losses in confidence by consumers, creditors, and suppliers. Firms may have made a significant investment in financial and non-financial resources to secure these systems. Create an argument for additional regulation as a preventative measure against businesses being hacked. Provide support for your argument.

  • Chapter 7 Accounting Information Systems ETH CH BTN 7-3 Erica Gray, CPA, is a sole practitioner....

    Chapter 7 Accounting Information Systems ETH CH BTN 7-3 Erica Gray, CPA, is a sole practitioner. She has been practicing as an auditor for 10 years. Recently a long-standing audit client asked Gray to design and implement an integrated computer-based accounting information system. The fees associated with this additional engagement with the client are very attractive. However, Gray wonders if she can remain objective on subsequent audits in her evaluation of the client's accounting system and its records if she...

  • Question 1 (0.2 points) The control principle for accounting information systems requires that the: Benefits from...

    Question 1 (0.2 points) The control principle for accounting information systems requires that the: Benefits from an activity outweigh the costs of the activity. System report useful, understandable, timely, and pertinent information for effective decision making, System must have methods and procedures allowing managers to control and monitor business activities. System is able to adjust to changes in the company, business environment, and needs of decision makers. System conforms to a company's activities, personnel, and structure.

  • a. Appropriate accounting and auditing research requires adequate technical reference materials. Each firm professional has online...

    a. Appropriate accounting and auditing research requires adequate technical reference materials. Each firm professional has online password access through the firm's Web site to electronic reference materials on accounting, auditing, tax, SEC, and other technical information, including industry data The partners accept responsibility for leading and promoting a quality assurance culture within the firm and for providing and maintaining a quality assurance manual and all other necessary practical aids and guidance to support engagement quality b. c. Each office of...

  • As a linux system administrator ,you will have teams/groups of employees of the following: Sales, Software Development, Accounting, and Information Technology. how would you solve this business requir...

    As a linux system administrator ,you will have teams/groups of employees of the following: Sales, Software Development, Accounting, and Information Technology. how would you solve this business requirement , both technically and securely as a new hire ?

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT