مشخصات مقاله | |
ترجمه عنوان مقاله | حسابرسی مستمر برنامه های پایگاه داده: رویکرد معیاری حسابرسی تعبیه شده |
عنوان انگلیسی مقاله | Continuous Auditing of Database Applications: An Embedded Audit Module Approach |
انتشار | مقاله سال 2018 |
تعداد صفحات مقاله انگلیسی | 21 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
پایگاه داده | نشریه امرالد |
نوع نگارش مقاله |
مقاله فصلی (Chapter Item) |
مقاله بیس | این مقاله بیس نمیباشد |
فرمت مقاله انگلیسی | |
رشته های مرتبط | حسابداری |
گرایش های مرتبط | حسابرسی |
مجله / کنفرانس | حسابرسی پیوسته – Continuous Auditing |
شناسه دیجیتال – doi |
https://doi.org/10.1108/978-1-78743-413-420181005 |
کد محصول | E10489 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
فهرست مطالب مقاله: |
Abstract Need for EAMS in DBMS Environments Database Control and Security, and EAMS Auditing Database Applications Using EAMS Advantages and Drawbacks of EAMS Conclusion References |
بخشی از متن مقاله: |
Abstract
This paper demonstrates an approach to address the unique control and security concerns in database environments by using audit modules embedded into application programs. Embedded audit modules (EAM) are sections of code built into application programs that capture information of audit significance on a continuous basis. The implementation of EAMs is presented using INGRESS a relational database management system. An interface which enables the auditor to access audit-related information stored in the database is also presented. The use of EAMs as an audit tool for compliance and substantive testing is discussed. Advantages and disadvantages of employing EAMs in database environments and future directions in this line of research are discussed. ADVANCES in computer technology over the past several years have made computer-based accounting systems increasingly complex. With the virtual elimination of the traditional audit trail in computerized systems [Weber, 1982), internal control and system security are critical concerns. With recent improvements in computer technology and reductions in hardware costs, database management systems [DBMS] have become commonly used for business data processing. While there are unique control and security concerns relative to DBMS applications [Fernandez et al., 1981, p. 151), there is some evidence that auditors do not sufficiently adjust their audit procedures in the environment of DBMS [Roberts, 1980]. A variety of computer audit techniques have been discussed in the literature [Cash et al., 1977]. Though auditors have developed generalized audit software [GAS] to obtain audit evidence in advanced computer systems, such software packages are generally incompatible with the complex file structures of database systems [Cash et al., 1977, p. 824; Fernandez et al., 1981, p. 164]. Access to client database systems using GAS is most often done through intermediate sequential files extracted from the database. Embedded audit modules [EAM] are an example of concurrent auditing techniques [CAT] which continuously monitor transaction processing. Weber [1982, p. 475] highlights the increased need for CATs in the environment of database systems due to the integration of sub-systems and the sharing of data. Further, EAMs are perceived by auditors to be very efficient methods of auditing advanced computer-based systems [Tobison & Davis, 1981; Garsombke & Tabor, 1986]. The purpose of this paper is to describe an approach to the continuous auditing of database-driven accounting applications using EAMs. The objectives of this paper are to discuss (1) a selected number of unique control and security issues related to DBMS-driven accounting systems, (2) the use of a relational DBMS to construct and implement EAMs in a sales application, and (3) the utilization of EAMs as an audit tool. The significance of this paper lies in the demonstration of how audit modules embedded in a DBMS-driven application can address the unique control and security aspects of database environments. In addition, we demonstrate how the DBMS might enable the auditor to access audit-related information collected by the EAMs. In this manner, the illustration presented in this paper would assist auditors contemplating the use of EAMs in DBMS environments. |