1 / 10

Chapter Eight

Chapter Eight. Using Computer Assisted Audit Tools and Techniques (CAATTs). Two Categories of CAATTs. 1) Computer Assisted Audit Tools 2) Computer Assisted Audit Techniques. Computer Assisted Audit Tools. Productivity Tools Generalized Audit Software Tools. Productivity Tools. Include:

Download Presentation

Chapter Eight

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter Eight Using Computer Assisted Audit Tools and Techniques (CAATTs)

  2. Two Categories of CAATTs • 1) Computer Assisted Audit Tools • 2) Computer Assisted Audit Techniques

  3. Computer Assisted Audit Tools • Productivity Tools • Generalized Audit Software Tools

  4. Productivity Tools • Include: • E-workpapers • Groupware • Time and billing software • Reference libraries • Document management

  5. Generalized Audit Software Tools • Include: • ACL • Audit expert systems • Utility and statistical software

  6. ACL • Widely used for data extraction and analysis • Allows for virtual 100% testing of client data

  7. Computer Assisted Audit Techniques • CAATs to Validate Audit Techniques • Test desks • Integrated test facility • Parallel simulation • CAATs to Verify Data Integrity • Data extraction and analysis • Fraud detection • Continuous auditing techniques

  8. 10 Steps to Using CAATs • 1. Set key audit objectives • 2. Identify CAATs to be used • 3. Identify which data files are needed • 4. Determine which format you need • 5. Request files from client in preferred format • 6. Import data into ACL

  9. 10 Steps (Con’t) • 7. Use CAATs to verify the data import process • 8. Perform other CAATs • 9. Investigate and reconcile exceptions • 10. Document results in workpapers

  10. CAATs to Detect Fraud • Digital analysis • Benford’s Law for a series of naturally occurring numbers • Deals with expected frequency of first digits • Exponential distribution • Requires large sample size

More Related