Computer-Assisted Audit Tools and Techniques Application
Computer-Assisted Audit Tools and Techniques Application
Computer-Assisted Audit Tools and Techniques Application
ASSISTED AUDIT
TOOLS AND
TECHNIQUES
APPLICATION
RAGUIN, GELYN L.
CABILES, ERICKA O.
ARGUELLES, AILEEN L.
GALLEGO, PETER A.
GIMENO RIALBERT
CONTENTS
1. Background
2. Traditional Audit Vs. CAATTs
3. Objectives
4. Advantages
5. Disadvantages
6. Discussion of Each CAATTs
7. Advantages and Disadvantages of Each CAATTs
8. Test Data Method Application
9. References
BACKGROUND
Nowadays, as many businesses at present use IT to process their transactions, the auditing
profession is faced with a need to give increased guidance for audits conducted in an IT
environment. Various authoritative bodies, such as the American Institute of Certified Public
Accountants (AICPA), the International Federation of Accountants (IFAC), and the Information
Systems Audit and Control Association (ISACA) have issued standards in this area. Today’s
reality requires organizations to engage in the process of adopting technology to perform
better in line with the challenges of globalization. The use of Computer-Assisted Audit Tools and
Techniques (CAATTs) has been introduced to aid auditors in this regard.
Definition of CAATTs
Today’s auditors must become more highly trained, with new skills and areas of expertise in
order to be more useful and productive. Increasingly, auditors will be required to use
computer-assisted techniques to audit electronic transactions and application controls. Laws
like the U.S. Sarbanes-Oxley Act of 2002 are pushing audit departments to find new ways to link
specialty tools into the complex business systems. By harnessing the power of the computer,
auditors can improve their ability to critically review data and information and manage their
own activities more rationally. Due to the critical shortage of these skills and talents, they will
become even more valuable and marketable.
CAATTs are defined as computer-based tools and techniques that permit auditors to increase
their personal productivity as well as that of the audit function. CAATTs can significantly
improve audit effectiveness and efficiency during the planning, conduct, reporting, and follow-
up phases of the audit, as well as improving the overall management of the audit function. In
many cases, the use of the computer can enable auditors to perform tasks that would be
impossible or extremely time-consuming to perform manually. The computer is the ideal tool
for sorting, searching, matching, and performing various types of tests and mathematical
calculations on data. Automated tools can also remove the restrictions of following rigid
manual audit programs as a series of steps that must be performed. CAATTs allow auditors to
probe data and information interactively and to react immediately to the findings by modifying
and enhancing the initial audit approach.
CAATTs is the fundamental tool which is used by auditors. This tool facilitates them to make
search from the irregularities from the given data. With the help of this tool the auditor and
accountant of any firm will be able to provide more analytical result. These tools are used
through-out every business environment and also in the industry sector too. With the help of
Computer-Assisted Audit Tools and Techniques, more forensic accounting with more analysis
can be done. It’s really a helpful tool that helps the firm auditor to work in an efficient and
productive manner.
Evolution of CAATTs
Today’s microcomputer-based audit tools and techniques have their roots in mainframe
Computer Assisted Audit Tools and Techniques (CAATTs), which in turn are surprisingly rooted
in manual audit tools and techniques. These mainframe based tools were primarily used to
verify whether or not the controls for an application or computer system were working as
intended. In the 1970s, a second type of CAATTs evolved, which sought to improve the
functionality and efficiency of the individual auditor. These CAATTs provided auditors with the
capability to extract and analyze data in order to conduct audits of organizational entities rather
than simply review the controls of an application. A third type of CAATTs, and a more recent
use of automated audit tools, focuses on the audit function and consists of tools and
techniques aimed at improving the effectiveness of the audit organization as a whole.
Books written on computer controls and audit in the 1970s did not include sections on end user
computing or, at best, mentioned audit software only in passing. In fact, for the most part,
auditors avoided dealing with the computer and treated it as the black box. Audit
methodologies discussed the input and output controls, but largely ignored the processing
controls of the system. The methodology employed was one of auditing around the computer.
The main audit tools included questionnaires, control flowcharts, and application control
matrices. Audit software was specifically written in general-purpose programming languages,
was used primarily to verify controls, and parallel simulation was only beginning to gain ground.
Audit software packages were considered as specialized programming languages to meet the
needs of the auditor and required a great deal of programming expertise. The packages were
mainframe-family dependent and consequently were limited in data access flexibility and
completely batch-oriented.
By the 1980s, some of the more commonly used tools to verify an application system were test
decks, Integrated Test Facilities (ITF), System Control Audit Review File (SCARF), and Sample
Audit Review File (SARF) (Mair, Wood, and Davis [1978]). Other techniques included parallel
simulations, reasonableness tests and exception reports, and systematic transaction samples.
Some organizations were still achieving very effective results with these types of audit tools in
the 1990s.
Among computer auditing techniques, CAATTs are commonly employed to audit application
controls. CAATTs can integrate various system or database formats, and facilitate analysis to
achieve the audit objective. CAATTs can be applied to the accounts payable, accounts
receivable, anti-money laundering efforts, banking compliance, SOD, order-to-cash (OTC)
processes, etc. These applications include a number of general controls and all application
controls. CAATTs can also be used to write script for automated periodic audits and achieving
continuous auditing and continuous monitoring according to management objectives. The
analytic capabilities of CAATTs are data analysis, applied analytics, managed analytics,
continuous auditing, and continuous monitoring.
OBJECTIVES
2. To identify the major primary Computer-Assisted Audit Tools and Techniques(CAATTs) types
and their usage
Advantages of CAATTs
Disadvantages of CAATTs
CAATTs can be expensive and time consuming to set up, the software must either be
purchased or designed (in which case specialist IT staff will be needed);
Client permission and cooperation may be difficult to obtain;
Potential incompatibility with the client's computer system;
The audit team may not have sufficient IT skills and knowledge to create the complex
data extracts and programming required;
The audit team may not have the knowledge or training needed to understand the
results of the CAATTs; and
Data may be corrupted or lost during the application of CAATTs
TYPES OF CAATTs
The test data method is used to establish application integrity by processing specially prepared
sets of input data through production applications that are under review. The results of each
test are compared to predetermined expectations to obtain an objective assessment of
application logic and control effectiveness. To perform the test data technique, the auditor
must obtain a copy of the production version of the application. In addition, test transaction
files and test master files must be created. In addition, the auditor must review the updated
master files to determine that account balances have been correctly updated. The test results
are then compared with the auditor’s expected results to determine if the application is
functioning properly. This comparison may be performed manually or through special computer
software.
B. Base Case System Evaluation
Base case system evaluation (BCSE) is a variant of the test data approach. BCSE tests are
conducted with a set of test transactions containing all possible transaction types. These are
processed through repeated iterations during systems development testing until consistent and
valid results are obtained. These results are the base case. When subsequent changes to the
application occur during maintenance, their effects are evaluated by comparing current results
with base case results.
C. Tracing
Tracing performs an electronic walk-through of the application’s internal logic. The tracing
procedure involves three steps:
1. The application under review must undergo a special compilation to activate the trace
option.
3. The test data transactions are traced through all processing stages of the program, and a
listing is produced of all programmed instructions that were executed during the test.
The integrated test facility (ITF) approach is an automated technique that enables the auditor
to test an application’s logic and controls during its normal operation. The ITF involves one or
more audit modules designed into the application during the systems development process. In
addition, ITF databases contain dummy or test master file records integrated among legitimate
records. Some firms create a dummy company to which test transactions are posted. During
normal operations, test transactions are merged into the input stream of regular (production)
transactions and are processed against the files of the dummy company.
E. Parallel simulation
Parallel Simulation involves creating a program that simulates key features or processes of the
application under review. The simulated application is then used to reprocess transactions that
the production application previously processed. The results obtained from the simulation are
reconciled with the results of the original production run to determine if application processes
and controls are functioning correctly. Parallel Simulation involves the auditor writing a
computer program that replicates some part of a client's application system, processes actual
client data through an auditor's generalized audit software program and compares the output
obtained with output obtained from the client .The method verifies processing of actual
transactions and allows the auditor to verify actual client results.
Embedded audit module (EAM) techniques use one or more programmed modules embedded
in a host application to select, for subsequent analysis, transactions that meet predetermined
conditions. As the host application processes the selected transaction, a copy of it is stored on
an audit file for subsequent review. The EAM approach allows material transactions to be
captured throughout the audit period. The auditor retrieves captured transactions at period-
end or at any time during the period, thus significantly reducing the amount of work the auditor
must do to identify significant transactions for substantive testing. To begin data capturing, the
auditor specifies to the EAM the parameters and materiality thresholdof the transactions set to
be captured. Although primarily a substantive testing technique, EAMs may also be used to
monitor application controls on an ongoing basis.
High cost of
implementation
BRIEF DESCRIPTION
In auditing through a computer, the test data method is used by auditors to test the procedures
contained within the program (also referred to as programmed controls). It is a method used to
establish application integrity by processing specially prepared sets of input data through
production applications that are under review. Test data is created by auditors to run through
the client's system testing audit procedures therein.
Test Data involves the auditor submitting, "dummy" data into the client's system to ensure that
the system correctly processes it and it prevents or detects and corrects mistatements. The
objective of test data method is to test the operation of application controls within the system.
NOTES:
1. Best test data is not the client's data, but data created by the auditor and procedures run on
test data do not reflect the accuracy or validity of the client's data.
2. Test Data are inputs containing both valid and invalid data.
Scenario: An auditor will examine the Sales Order Processing Application of one of the
leading Musical Instrument Manufacturing Company in the Philippines.
1. The Auditor has a pre-determined expectation or already set an expected output before
testing the operation of application controls within the system. The system is expected to
accept valid transactions and reject those that are invalid like the sales over credit limit.
2. To perform the test data technique, the auditor must first obtain a copy of the client's
production version of the Sales Order Processing Application.
3. The Auditor must create test transaction files and test master files. The test data created
by the Auditor contains both valid and invalid data. The Auditor use the Account Receivable
Master File.
3. Test transactions may enter the system from magnetic tape, disk, or via an input terminal.
4. The auditor must review the updated master files to determine that account balances have
been correctly updated. The following tables show the listing of the updated accounts
receivable master file.
ORIGINAL TEST ACCOUNT RECEIVABLE MASTER FILE
5. Results from the test run will be in the form of routine output reports, transaction listings,
and error reports. The table shows an error report of rejected transactions.
ERROR REPORT
7 193124 Flores, Lucas U-143 Ukulele Bag 12 150 1,795 Price Extension
Error
X
6. The test results are then compared with the auditor’s expected results to determine if the
application is functioning properly and to assess the effectiveness of the application
program's automated controls. This comparison may be performed manually or through
special computer software.
7. Any deviations between the actual results and those the auditor expects may indicate a
logic or control problem.
REFERENCES
https://kfknowledgebank.kaplan.co.uk/audit-and-assurance/audit-evidence/computer-
assisted-audit-technique
https://www.accaglobal.com/in/en/student/exam-support-resources/fundamentals-exams-
study-resources/f8/technical-articles/auditing-computer-environment.html
https://www.slideshare.net/mobile/kzoe1996/test-data-approach
https://www.ispartnersllc.com/blog/five-types-testing-methods-used-audits/
https://youtube.com/watch?v=dYCW9UKBCs8&feature=share
https:// /mobile/kzoe1996/parallel-simulation
https://www.slideshare.net/kzoe1996/integrated-test-facility
http://www.ef.uns.ac.rs/mis/archive-pdf/2009%20-%20No1/MIS2009_1_2.pdf
https://www.hkicpa.org.hk/professionaltechnical/pronouncements/handbook/volume3b/pn
1009.htm
https://www.google.com/url?
sa=t&source=web&rct=j&url=http://droidcode11.blogspot.com/2013/03/traditional-
auditing-vs-caats-computer.html%3Fm%3D1&ved=2ahUKEwjdr-
CZosHuAhV0KqYKHSQKARMQFjACegQIDhAB&usg=AOvVaw06Pmpmw9SAfv9y7kLIMWlw&cs
hid=1611927643774
https://www.google.com/url?
sa=t&source=web&rct=j&url=https://nscpolteksby.ac.id/ebook/files/Ebook/Accounting/Inter
nal%2520Audit%2520(2009)/4.%2520Chapter%25201%2520-%2520CAATTs
%2520History.pdf&ved=2ahUKEwjf3YGDosHuAhUUhZQKHYwJDEUQFjAAegQIARAB&usg=AO
vVaw3TvNBbGyqG7oVLw_mHSOSB
https://en.m.wikipedia.org/wiki/Integrated_test_facility