Preview

LBYMODT Notes

Satisfactory Essays
Open Document
Open Document
304 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
LBYMODT Notes
Jenevieve Limqueco (11117818) February 4, 2014 From yesterday’s lesson, I learned that IT governance is different from enterprise governance. Enterprise governance is the process of setting and implementing corporate strategy, making sure that the objectives are achieved efficiently & manage risks. While IT governance is the process for controlling an organization’s IT resources. In short, enterprise governance is the governance of the whole entity itself. While IT governance is the governance that makes sure enterprise governance is being accomplished. IT governance is a very important part of enterprise governance because of organizational dependency on information and communication. IT governance has 2 objectives: 1) set strategies for IT so that it would be aligned to the organizational’s goals. And, 2) use IT for maximum opportunity and minimum risk. Having 2 objectives gives rise to 2 parts to IT governance. 1) Use of IT to promote an organization’s objectives & enable business processes. 2) Manage & control IT-related risks. Financial auditors and IT auditors work hand-in-hand from the beginning of the engagement until the delivery of audit report because as financial auditors analyze the internal control system of an entity, they would need the help of an IT auditor, because only IT auditors can understand the audit “through” the computer. To be an IT auditor, you don’t need to be a CPA, you can be an IT graduate or computer science graduate, as long as you take and pass the exam for Certified Information Systems Security (CISA). Computer Assisted Audit Tools & Techniques (CAATTs) is a broader umbrella whose subcategories can be grouped into 2: 1) Software used to increase an auditor’s personal productivity & software used to perform data extraction & analysis. 2) Techniques used to increase the efficiency & effectiveness of the audit function. Computer Assisted Audit Techniques (CAATs) on the other hand, usually refers to the techniques

You May Also Find These Documents Helpful

  • Good Essays

    Computer Assisted Audit Tools or CAATs is one way to significantly streamline this process. CAATs are standard financial accounting software that performs audit functions that were formerly performed manually. Depending on the size shape and scope of the company modifications will be made to CAATs to fit the needs of the company in question. Generally, much of the same information is requested and analyzed as in a traditional audit. Once verified using computer techniques, data is retained so it can be used in other areas of the audit including error identification and segregation of transactions within accounts. Customized reports are generated by computer and a standard audit trail is maintained.…

    • 1023 Words
    • 5 Pages
    Good Essays
  • Better Essays

    It is recommended that Kudler use CAATs, because it will assist with streamlining the IT audit process. CAATs are techniques that “are used to increase the efficiency and effectiveness of the audit function” (Hunton, Bryant, & Bagranoff, 2004, pg. 178). Not only will CAATs assist with making Kudler’s audits go more smoothly, but it will also assist auditors with obtaining more reliable, relevant, sufficient, and useful information. There are 10 key steps of CAATs that can be implemented that will assist Kudler in creating a framework for their audits.…

    • 1049 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    In this assignment, you will be given a Request for Proposal (RFP) that includes a current IT policy…

    • 313 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Acctg 408 Question

    • 1115 Words
    • 5 Pages

    Independent CPAs perform audits on the financial statements of public companies. This type of auditing can best be described as…

    • 1115 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    ACCG 315 reflaction 2

    • 673 Words
    • 2 Pages

    According to industry partner’s presentation, that accountant has variety roles in the verification field. The auditor should ensure financial statements are not materially misstated and be able to giving a true and fair view. The auditor should demonstrate professional scepticism---being able to form an opinion. The auditor opinion is intended to provide reasonable assurance for financial statement and adding the value and credibility of the financial statement produced by management. Consequently increase the user confidence in rely on the financial statement and reduce investor’s risk. Accountant work in a professional firm as an auditor should Mitigating risk and acting as a third line of defence for clients. Using their knowledge of management accounting to help the client in controlling and minimising the risk of business, ensuring the operation of finance are in a right track. There are much more requirement for accountant working in auditing fields such as being compliance with regulatory standards, working in a collaborative team, be able to build a relationship with the client and other internal people.…

    • 673 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    How does one achieve hero status? To me, there are two definitions of hero, (1) a person who is regarded as a model that is respected for qualities or achievements, and (2) anyone that in the face of danger and adversity or from a position of weakness displays courage and the will for self-sacrifice. The heroes or heroines in The Help are the latter. The Help by Kathryn Stockett is a novel about black maids in Jackson, Mississippi in 1962. The black maids work with Skeeter Phelan, a young white woman, to write a tell-all book about what it’s like to work as a black maid in the white homes of the segregated South. The chapters are narrated through the eyes of the three main heroes—Aibileen, Minny, and Skeeter. Skeeter Phelan is an aspiring writer who wants to create a series of truthful interviews with local black maids. “I’d like to write this showing the point of view of the help…They raise a white child and then twenty years later the child becomes the employer. It’s that irony, that they love us, yet…We don’t even allow them to use the toilet in the house. (p. 123).” Even if they're published anonymously, the risk is great; still, Aibileen and Minnie agree to participate, and they boldly recruit other maids to…

    • 586 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Auditors are interested in “verifying” the financial statements. They work with the existing system. Developers, on the other hand, are interested in creating and maintaining the system that produces the financial statements.…

    • 486 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Information Security Governance can be defined specifically as the methods and processes that an organization or business will utilize as a means of controlling their IT Security Management program. There is an important distinction which needs to be made however as governance should be considered as separate from IT Security Management as a discipline that is based around the need to identify and control risks.…

    • 1212 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Ms2 Case Approach

    • 437 Words
    • 2 Pages

    Key Areas of Focus – Use Heading and Bullet Points Options & pros and cons…

    • 437 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    AligningWithBusiness

    • 1035 Words
    • 4 Pages

    References: McKeen, J. D., & Smith, H. A. (2012). IT Strategy: Issues and Practices (2nd ed.). Upper Saddle River, NJ: Pearson Education.…

    • 1035 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Corporate accountants now have a great advantage with the development and advancement in technology. Accountants can now retain more information and can retrieve various information within its organization. There are numerous internal software that help individuals access company financial records, balance sheets and various personal information, also known as the intranet. The new technology helps companies’ project revenue and company performance.…

    • 850 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Binoy Study

    • 751 Words
    • 4 Pages

    with the goals (Pathak, 2005). 4.0 Changing Roles of the auditors The impact of information technology on Organisations audit processes, 2012 Page | 2…

    • 751 Words
    • 4 Pages
    Satisfactory Essays
  • Best Essays

    The information technology advancements continue to impact the workplace, societies and cultures. In today’s world, information technology is almost part of every business, educational institute, and even personal activity (Brooks, 2010). Computer and internet access have found their way to households, schools, libraries, people’s cell phones, banks, hospitals, governments, coffee shops, and other public places. As the industry evolves, so do the needs and special niches of society from mainframe systems, to micro systems, to PC-based LAN and WAN systems, to virtual systems and the internet.…

    • 1836 Words
    • 8 Pages
    Best Essays
  • Best Essays

    IM/IT governance and decision rights consist of helping the organization make a wise business decision more accurately and in a timelier manner. IM/IT operations help expand information technology to be used effectively that helps support the strategic priorities of the organization. In addition, high priorities are a result in strategic IM/IT planning. To address chapter 3 in a more detail explanation I will explain and discuss these following questions:…

    • 1622 Words
    • 7 Pages
    Best Essays
  • Good Essays

    Code Of Ethics Analysis

    • 423 Words
    • 2 Pages

    The IT department will be developing and implementing a robust architecture-information technology infrastructure, which will improve the effectiveness of information technology management. There will be several stages in this strategy, complete over haul of information infrastructure, security infrastructure, technology application, data management and migration.…

    • 423 Words
    • 2 Pages
    Good Essays