Please note that the digital access code that comes with the print book is valid for use in a specific Asia territory only.
CB VitalSource eBook – The ultimate eBook experience has arrived! Easily access our eBooks with features that will improve your reading experience, and tools to help you take notes and organize your studies.
Gain a thorough understanding of how modern audits are conducted in today's computer-driven business environment with INFORMATION TECHNOLOGY AUDITING, 4E. You gain valuable insights into state-of-the-art auditing issues as this leading accounting text provides you with the background you need to succeed in today's business world. This edition focuses on the latest information technology aspects of auditing with up-to-date coverage of auditor responsibilities, emerging legislation, and today's fraud techniques and detection. Expanded end-of-chapter questions, problems, and cases give you important hands-on practice for success in your future career.
Updated Overview and Initial Five Chapters Present The Latest General Control and Audit Issues. An Updated Chapter 1, "Auditing, Assurance, and Internal Control," overviews IT audit issues and auditor responsibilities that follow Sarbanes-Oxley (SOX) legislation, the COSO internal control model, and SAS 109. Revised Chapters 2, 3, 4, and 5 present general control and audit issues in accordance with SOX and COSO frameworks.
Extensively Revised Chapter Provides Working Understanding of Data Modeling Techniques. Today's accountant must be equipped to access invoices stored on normalized database tables, which requires understanding relational database structures. Chapter 8 now addresses this growing need for modern auditors to understand data modeling techniques. The chapter presents key characteristics of the relational database model, including data modeling, deriving relational tables from entity relationship (ER) diagrams, the creation of user views, and data normalization techniques.
Expanded Material Details Auditor Responsibilities and Fraud Techniques. An updated Chapter 12, "Ethics, Fraud Schemes and Fraud Detection," introduces how auditors detect fraud. Expanded coverage addresses a wide range of contemporary fraud techniques.
The Risk Analysis Approach In This Book Helps You Emphasize This Approach In Your Course. This text provides the tools to teach a risk-based approach to the identification of key threats. Students learn to develop appropriate audit tests and procedures in the following areas: Operating Systems (mainframes and PCs), Data Management, Systems Development, Electronic Commerce (including networks, EDI and Internet risks), Organizational Structure, Computer Center, and Computer Applications (Revenue and Expenditure cycle).
Today's Most Common Computer-Aided Audit Tools and Techniques (CAATTS) are highlighted. The book introduces popular computer-aided audit tools and techniques using clearly written presentations and graphical illustrations that form an easy-to-understand model for learning.