Content deleted Content added
Mboverload (talk | contribs) m sp: Techiniques->Techniques, imbedded->embedded, theere->there |
m BOT - Unicodifying |
||
Line 1:
'''Data analysis''' is the means by which the information systems auditor determines the completeness and accuracy of an
Along with manual audit procedures, the auditor can employ [http://www.isaca.org/Content/ContentGroups/Standards2/Standards,_Guidelines,_Procedures_for_IS_Auditing/IS_Auditing_Guideline_G3_Use_of_Computer-Assisted_Audit_Techniques1.htm computer assisted auditing tools and techniques (
==Data analysis process==
Line 9:
#*The auditor determines audit objectives and identifies organizational systems containing potentially relevant data.
#'''Requesting Data from the Organization'''
#*In order to obtain sufficient, reliable, and relevant evidence to achieve their audit objectives, the auditor attempts to determine relevant data used to perform audit tests. The data is then requested from the
#'''Extracting Data'''
#*When data is extracted from an organization, the auditor must verify the integrity of the
#'''Data Importation'''
#*The auditor must determine the completeness and relevancy of data obtained by the organization.
#'''Data Profiling'''
#*The auditor performs relevancy checks on data. For example, checking an
#'''Data Analysis'''
#*The auditor analyzes the data to determine if sufficient evidence has been obtained to support their overall conclusions and findings of the audit.
Line 21:
#*The auditor must summarize the findings and then determine which type of audit report is most suitable to describe the outcome of the audit results. For example, an unqualified audit report vs. a qualified audit report.
#'''Documentation of Research Findings'''
#*The auditor must document their research findings in the forms of work papers, spreadsheets, flowcharts, and results of observations, to name a few. Audit documentation is essential to support the
[[Image:Data_analysis.JPG]]
Line 30:
Benefits of audit software include:
*They are independent of the system being audited and will use a read-only copy of the file to avoid any corruption of an
*Many audit-specific routines are used such as sampling.
*Provides documentation of each test performed in the software that can be used as documentation in the
===Data analysis software===
The most popular form of CAATTs, [http://www.isaca.org/Content/ContentGroups/Member_Content/Journal1/20033/Using_CAATs_to_Support_IS_Audit.htm data analysis software] is used to extract data from commonly used file formats and the tables of most database systems. This audit software can perform a variety of queries and other analyses on an
Line 51:
The following are types of query and analysis tools used by auditors while performing data analysis.
*'''Access''' &
*'''[[Audit Command Language|ACL]] & IDEA''' &
*'''Excel''' &
*'''CA-Examine''' &
*'''SAS Base''' &
*[http://www.categoric.com Categoric] Continuous Auditing technology. Connects to anything and provides real time monitoring of controls and KPIs
Data analysis programs use such techniques as:
*'''Histograms''' &
*'''Modeling''' &
*'''Comparative Analysis''' &
===Other uses of CAATT's for data analysis===
Line 77:
CAATTs can assist the auditor in detecting fraud by performing and creating the following, respectively:
#<u>''Analytical Tests''</u> &
#<u>''Data Analysis Reports''</u> &
Line 84:
*[http://www.theiia.org/itaudit/index.cfm?fuseaction=print&fid=5404 Continuous Monitoring]is an ongoing process for acquiring, analyzing, and reporting on business data to identify and respond to operational business risks. For auditors to ensure a comprehensive approach to acquire, analyze, and report on business data, they must make certain the organization continuously monitors user activity on all computer systems, business transactions and processes, and application controls.
Additionally, the auditor can install audit procedures into their audit software called embedded audit routines, which can continuously capture and analyze an
|