In: Accounting
Action Items
Information Systems and Internal Control.:
G1.02 Key Risk Factors
Key risk factors for Information Systems and Internal Control include the following:
G1.03 Background
The evolution of computer technology is remarkable. It is common today for office workers to have networked computers on their desks, mobile devices in their pockets, notebook computers to take with them on business trips, wireless connectivity to the office, and Internet and e-mail functionality built into all of these devices. The lower cost of hardware and the convenience of the technology have created an insatiable demand for computing solutions to fit the needs of business.
The rapid pace of change within the IS industry complicates the task of auditing information systems. New technologies often introduce new risks. Today's innovations can become obsolete tomorrow. For this reason, this chapter focuses on broad concepts of internal control within the IS environment. Although certain products are discussed here, internal auditors should gain a solid understanding of the IS environment within their company.
Internal audit departments have always had a chronic shortage of IS auditors, and this is unlikely to change anytime soon. Generally, IS professionals have not gravitated toward the internal audit profession because more challenging and financially rewarding opportunities exist in systems development, systems security, and database management. Due to supply and demand issues and limitations on the number of IS professionals who are well versed in control concepts like COSO and COBIT, internal audit departments cannot always attract sufficient talent. Because of this reality, chief audit executives must develop alternative means to ensure an appropriate level of IS audit coverage.
As the auditing profession continues to try to do more with less, technological advances may overwhelm those audit departments that have not prepared adequately. Computer viruses and other malicious code are being introduced on a weekly basis. Hackers now gain access to computer systems that were thought to be impervious. Million-dollar transactions are routinely carried out via the Internet. Companies are betrayed by employees who sabotage the systems they were entrusted to develop. Despite this gloomy assessment, chief audit executives have tools they can use to address the risks of the new technology.
The foundation for adequate audit coverage of IS risks is technological competence. If the audit department does not have such competence, or does not anticipate recruiting it in the near term, other alternatives must be considered. The chief audit executive may need to recruit from the company's existing IS expertise, such as a rotational assignment on specific audit engagements. By tapping the company's internal IS resources, the chief audit executive may be able to meet short-term audit requirements. Another alternative is to retain the services of an outside service provider, such as one of the Big Four accounting firms or a specialized professional services firm that does not perform financial statement audits. The latter can offer certain cost advantages as well as avoiding conflict of interest and independence issues. The cost of any such outsourcing, sometimes referred to as co-sourcing, will need to be balanced against the risks of the computing environment in question. Although the fees charged by such organizations may at first glance appear prohibitively expensive, given the high cost of training and retaining professionals with hard-to-find skills that must be continuously maintained, it is often cheaper to co-source specific with third party providers than cultivate and maintain these skills internally. Audit departments can also better leverage the cost of bringing in these outside consultants by assigning an internal auditor as a liaison. The assigned internal auditor can expedite the gathering of evidence, thereby reducing the level of effort for the higher-paid consultant, while shadowing these specialists to learn how to perform these technical audits internally.
Practitioner's Tip: Buying Computers
For prospective purchasers of desktop or notebook computers, making the right choice has generally come down to two decision points. The first is whether to buy a top-of-the-line brand name or one that is known more for its economical pricing. When making such a decision, one should carefully weigh the total cost of ownership (TCO). You may save money on the initial purchase, but support issues also factor into the cost equation. If you are a large shop and will require dozens if not hundreds of computers, then support can become a very significant issue, especially when you consider productivity losses when auditors cannot access the data on their desktop or notebook computers. Compatibility between devices can also become more problematic when dealing with lesser known second-tier machines. The second factor to consider is whether to lease or buy. More and more, organizations are choosing to lease computers in order to remain technologically up to date. This is not just a matter of wanting to have cutting-edge equipment. There are also many practical reasons for periodically refreshing equipment. As new business systems and client software are rolled out, incompatibilities with older equipment can result in serious performance issues, including system response time and stability. It is usually asking for trouble to load just-released software on a four- to five-year-old machine. Again, this is where TCO comes into play. If you try to squeeze an extra two years of life out of that three-year-old machine, you will pay several times that amount in loss of productivity and increased support costs.
Hello Buddy,
After reading the above given para's, the 2 practices or issues that I personally feel will have an impact on me as an accountant, are the following -
1) The Inherent risks associated while using such systems that are heavily dependent on IT systems or technology in general, are such that they may have an unexpected or surprising impact on the work of the accountant, causing loss of time and resources for one. Examples of such risks that exist are a) Access by unauthorized personnel, which can actually wreak havoc, b) Data getting lost or becoming corrupt or inaccessible.
Some inherent risks can be addressed, such as taking backup of data can reduce the risk of data loss or inaccessibility. However these risks, like all other risks, cannot be completely eliminated but only reduced to an acceptable and therefore the use of technologically oriented system, though make the work of an auditor easy, also increase the risks he is required to take, along with all other risks that were already associated with the auditing process.
2) The second practice that is very very important in my understanding is the term 'Technological Competence'. The role of accountant in business during the last years has changed and transformed from manual accounting to computerized accounting. The extensive use of IS in business has create the term “knowledge – worker” in order to describe the worker that operates within an IT environment as well as the competences possessed. These possession of appropriate skills will allow the creation of an environment where the IS technology will operate at an optimum resulting to the advantage of the entire business operation.
IT competences considered imperative for accountants in order to perform their tasks. The determination of these competences is essential for accountants but this involves, first, the determination of the roles of a modern accountant in business and second, the definition of term competences. The determination of the role of the modern accountant in business is important as it sets the framework within which an accountant operates and hence this affect the IT/IS tools it is required.
I hope the above solution is what you were looking for. For any further queries or doubts in the solution, please feel free to drop a comment. Please do leave a positive feedback, Thank you :)