مقاله انگلیسی رایگان در مورد حسابرسی پیوسته سیستم های آنلاین – امرالد 2018

 

مشخصات مقاله
انتشار مقاله سال 2018
تعداد صفحات مقاله انگلیسی 19 صفحه
هزینه دانلود مقاله انگلیسی رایگان میباشد.
منتشر شده در نشریه امرالد
نوع مقاله ISI
عنوان انگلیسی مقاله The Continuous Audit of Online Systems
ترجمه عنوان مقاله حسابرسی پیوسته سیستم های آنلاین
فرمت مقاله انگلیسی  PDF
رشته های مرتبط حسابداری
گرایش های مرتبط حسابرسی
مجله حسابرسی پیوسته – Continuous Auditing
کد محصول E6272
وضعیت ترجمه مقاله  ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید.
دانلود رایگان مقاله دانلود رایگان مقاله انگلیسی
سفارش ترجمه این مقاله سفارش ترجمه این مقاله

 

بخشی از متن مقاله:
Introduction

This paper develops the concept and explores key issues in an alternate audit approach called the Continuous Process Audit Methodology (CPAM). The paper focuses on an implementation of this methodology, the Continuous Process Audit System (CPAS), developed at AT&T Bell Laboratories for the AT&T internal audit organization. Features of the methodology may also be applicable to external audit functions. The paper is divided into three sections. In the remainder of the Introduction, changes in management information systems (MIS) that affect traditional auditing are discussed. In the second section, CPAM and CPAS are described and contrasted with the traditional audit approach. The audit implications related to the introduction of a CPAS-like technology also are examined. The last section discusses some of the knowledge issues involved in the implementation of a CPAS application and suggests paths for future work.

Technology and the Auditor

Traditional auditing (both internal and external) has changed considerably in recent years, primarily as a result of changes in the data processing environment [Roussey, 1986; Elliott, 1986; Vasarhelyi and Lin, 1988; Bailey et al., 1989]. These changes have created major challenges in performing the verification and attestation functions2 . These changes and the resulting technical challenges created for auditors are summarized in Table 1. For example, the introduction of technology precluded auditors from directly reading data from its source (magnetic tape) and, unlike paper and indelible ink, this source could be modified without leaving a trace (phases 1 and 2 in Table 1); the advent of time sharing and data communications has allowed continuous access to data from many locations (phase 3) creating access exposures; database systems have added more complexity to auditing due to the lack of obvious mapping between the physical and logical organization of data (phase 4).

دیدگاهتان را بنویسید

نشانی ایمیل شما منتشر نخواهد شد. بخش‌های موردنیاز علامت‌گذاری شده‌اند *

دکمه بازگشت به بالا