Auditing And Assurance Services
17th Edition
ISBN: 9780134897431
Author: ARENS, Alvin A.
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 16, Problem 32DQP
a.
To determine
Explain the factors which is considered for taking decision regarding the usage of email request, written confirmation, or direct access.
b.
To determine
Explain the points that to be note for the reliability of email responses, and who provides the email address and website link.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Leonard Moses is planning to grow its customer base and is in the process of creating an
online web-based sales ordering system for customers to purchase products using personal
credit cards for payment. At a recent meeting with the internal auditors, it was highlighted that
there are risk associated with this system. Identify three risks related to an online sales system
that management should consider. For each risk, identify an internal control that could be
implemented to reduce that risk.
Daisy CPAS are auditing the accounts of Focus Inc., a regional power cooperative. The audit team assigned to the audit of accounts receivable has noted from prior audit experience that the majority of clients pay their bills on time and in the correct amount. One of the audit team has also noted that the cooperative has hundreds of thousands of customers. Based on this information, what might be a prudent approach to substantive testing by Daisy CROS?
Your boss knows that you are taking a fraud examina- tion course at a local university. He is interested in learning more about data-driven fraud detection and asks you to prepare a short memo briefly explaining data-driven fraud detection methods and techniques. 1. List three data analysis methods and techniques and briefly explain them.
Chapter 16 Solutions
Auditing And Assurance Services
Ch. 16 - Prob. 1RQCh. 16 - Prob. 2RQCh. 16 - Prob. 3RQCh. 16 - Prob. 4RQCh. 16 - Explain why you agree or disagree with the...Ch. 16 - Prob. 6RQCh. 16 - Prob. 7RQCh. 16 - Prob. 8RQCh. 16 - Prob. 9RQCh. 16 - Prob. 10RQ
Ch. 16 - Prob. 11RQCh. 16 - Under what circumstances is it acceptable to...Ch. 16 - Prob. 13RQCh. 16 - Prob. 14RQCh. 16 - Prob. 15RQCh. 16 - Prob. 16RQCh. 16 - Prob. 17RQCh. 16 - Prob. 18RQCh. 16 - Prob. 19RQCh. 16 - Prob. 20.1MCQCh. 16 - Prob. 20.2MCQCh. 16 - Prob. 20.3MCQCh. 16 - The following questions deal with confirmation of...Ch. 16 - Prob. 21.2MCQCh. 16 - Prob. 21.3MCQCh. 16 - Prob. 22.1MCQCh. 16 - Prob. 22.2MCQCh. 16 - Prob. 22.3MCQCh. 16 - Prob. 23.1MCQCh. 16 - Which of the following is least likely to be a...Ch. 16 - The following questions concern auditor...Ch. 16 - Prob. 24DQPCh. 16 - Prob. 25DQPCh. 16 - Prob. 26DQPCh. 16 - The following misstatements are sometimes found in...Ch. 16 - Prob. 28DQPCh. 16 - Prob. 29DQPCh. 16 - Prob. 30DQPCh. 16 - Prob. 31DQPCh. 16 - Prob. 32DQPCh. 16 - Prob. 33DQPCh. 16 - Prob. 34DQPCh. 16 - Prob. 35DQPCh. 16 - Prob. 36DQPCh. 16 - Prob. 38DQPCh. 16 - Prob. 39ICA
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, accounting and related others by exploring similar questions and additional content below.Similar questions
- You are an auditor. The client's organization has recently implemented ERP system and data warehouse. During the engagement interview with the client, management has suggested that instead of running tests against the live operational database, you can draw the data from your tests of details from the data warehouse. This is because management believe that audit tests against the live operational database can disrupt operations. Management explains that data are updated weekly in the data warehouse. You need to think about their suggestion and get back to them with your answer. Required: write a memo to the management with your answer to their suggestion and your concerns (if any).arrow_forwardSandol Corporation has numerous customers. A customer file is kept on disk storage. Each customer file contains name, address, credit limit, and account balance. The auditor wishes to test this file to determine whether credit limits are being exceeded. The best procedure for the auditor to follow would be to: a. Develop test data that would cause some account balances to exceed the credit limit and determine if the system properly detects such situations. O b. Request a printout of a sample of account balances so they can be individually checked against the credit limits. c. Request a printout of all account balances so they can be manually checked against the credit limits. O d. Develop a program to compare credit limits with account balances and print out the details of any account with a balance exceeding its credit limit.arrow_forwardLamar LLC is in the process of updating its revenues and receivables systems with the implementation of new accounting software. James Loden, Inc. is an independent information technology consultant who is assisting Tamar with the project. James has developed the following checklist containing internal control points that the company should consider in this new implementation: Is it appropriate to program the system for general authorization of certain sales, within given limits?arrow_forward
- Lamar LLC is in the process of updating its revenues and receivables systems with the implementation of new accounting software. James Loden, Inc. is an independent information technology consultant who is assisting Tamar with the project. James has developed the following checklist containing internal control points that the company should consider in this new implementation: Will all data entry clerks and accounting personnel have their own PCs with log‐in IDs and password protection?arrow_forwardAn IT auditor is conducting data analysis procedures on an employee expense report file and notices several expenses for $24.99 from the same individual. The company’s policy requires that any expenses that are under $25.00 do not require a receipt. The IT auditor should: [SELECT ALL THAT APPLY a) Maintain professional skepticism and investigate these transactions further b) Pass on investigating these items further, focusing on higher dollar amounts c) Evaluate the business process approval controls, and related procedures d) Discuss fraud awareness and detection programs with management to gain an understanding of management’s commitment to fraud prevention and related entity-level anti-fraud controls.arrow_forwardYou are an independent auditor attending an engagement interview with the client. The client’s organization has recently implemented a data warehouse. Management is concerned that the audit tests that you perform will disrupt operations and suggests that instead of running tests against the live operational database, you draw the data for your analytical reviews and substantive tests of details from the data warehouse. Management points out that operational data are copied weekly into the warehouse and everything you need will be contained there. This will enable you to perform your tests without disrupting routine operations. You agree to give this some thought and get back to the client with your answer. Required Draft a memo to the client outlining your response to their proposal. Mention any concerns you might have.arrow_forward
- Computer-assisted audit techniques (CAATs) are becoming more popular in recent years. Select two CAATs and explain how they are useful in auditing. Suggest a method that someone with fraudulent intentions could use to work around the CAAT for personal gains. Be sure to respond to at least one of your classmates' posts.arrow_forwardLamar LLC is in the process of updating its revenues and receivables systems with the implementation of new accounting software. James Loden, Inc. is an independent information technology consultant who is assisting Tamar with the project. James has developed the following checklist containing internal control points that the company should consider in this new implementation: Has the company identified an off‐site alternative computer processing location?arrow_forwardYou are an auditor working with JUMAN audit firm. JUMAN audit firm accepted two engagements to audit the financial statements of MUNER company and MUHEET company. Explain how risk of material misstatement should he assessed and what effect that assessment will have on detection risk for the following audit clients: MUHEET Corporationis one of several companies engaged in the manufacture of high- speed, high- capacity data storage devices. The industry is very competitive and subject to quick changes in technology. MUHEET’s operating results would place the company in the second quartile in terms of profitability and financial position. The company has never been the leader in the industry, with its products typically slightly behind the industry leaders in terms of performance.arrow_forward
- After finishing your accounting degree, you joined an accounting firm. This is a medium-size accountingfirm with a reasonable range of clients. You are in an engagement meeting with one of your clients, andyour client's management raises some concerns. In particular, the management is concerned that theaudit tests that you perform will disrupt operations. Your client has recently implemented a datawarehouse. The management suggests that you draw the data for analytical reviews and substantivetesting from the data warehouse instead of the operational database. Further, the management pointsout that operational data are copied weekly into the data warehouse, and all data you need are containedthere.Required: Based on the given scenario, outline your response to the management's proposal and mentionany concerns you might have.arrow_forwardA multimediacourse graduate used design software to create paychecks that lookedidentical to those of a company in his town.The paychecks were deposited electronically into ofhis friends’ accounts. What type of fraud did hecommit? Select one: a. output fraud. b. input fraud. c. computer instruction fraud. d. processor fraud.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- AccountingAccountingISBN:9781337272094Author:WARREN, Carl S., Reeve, James M., Duchac, Jonathan E.Publisher:Cengage Learning,Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
- Horngren's Cost Accounting: A Managerial Emphasis...AccountingISBN:9780134475585Author:Srikant M. Datar, Madhav V. RajanPublisher:PEARSONIntermediate AccountingAccountingISBN:9781259722660Author:J. David Spiceland, Mark W. Nelson, Wayne M ThomasPublisher:McGraw-Hill EducationFinancial and Managerial AccountingAccountingISBN:9781259726705Author:John J Wild, Ken W. Shaw, Barbara Chiappetta Fundamental Accounting PrinciplesPublisher:McGraw-Hill Education
Accounting
Accounting
ISBN:9781337272094
Author:WARREN, Carl S., Reeve, James M., Duchac, Jonathan E.
Publisher:Cengage Learning,
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Horngren's Cost Accounting: A Managerial Emphasis...
Accounting
ISBN:9780134475585
Author:Srikant M. Datar, Madhav V. Rajan
Publisher:PEARSON
Intermediate Accounting
Accounting
ISBN:9781259722660
Author:J. David Spiceland, Mark W. Nelson, Wayne M Thomas
Publisher:McGraw-Hill Education
Financial and Managerial Accounting
Accounting
ISBN:9781259726705
Author:John J Wild, Ken W. Shaw, Barbara Chiappetta Fundamental Accounting Principles
Publisher:McGraw-Hill Education