Preview

Position Paper: Cybercommerce: A Risk Perspective

Powerful Essays
Open Document
Open Document
2481 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Position Paper: Cybercommerce: A Risk Perspective
POSITION PAPER on:
Information Technology Auditing and Cybercommerce: A Risk Perspective by: Catherine L. Talita

I. SUMMARY OF ARTICLE
______________________________________________________________________________

Exponential growth of the Internet and the transmission bandwidth of the communication carrier is transforming the way businesses operate and communicate. In this technology-centric world, customers, partners, suppliers and employees are demanding unparalleled levels of service, collaboration and communications, to compete in the emerging market place. Technology has become so advanced and IT auditing advances as well. However, the fact still remains that even if technology has become very advanced risks and potential harm to integrity and accuracy of the data still remains especially in cyber commerce. Cyber commerce has three categories which are business-to-business (B2B), business-to-customers (B2C) and mobile commerce (m-commerce). Today, the term “e-commerce” includes all commercial activities performed through information technology and communication engineering, such as the Internet, virtual private networks (VPNs), automated teller machines (ATMs), electronic fund transfers (EFTs), electronic data interchange (EDI), e-supply chain management (e-SCM) and e-customer relationship management. E-commerce is now a trend and IT auditors must audit them to minimize the threats and risks that come with it. IT auditors look into existing internal controls, which might not have been optimized for the best results. There are several reasons why internal control cannot provide absolute assurance that objectives will be achieved: cost-benefit realities, collusion among employees and external events beyond an organization’s control.

To be able to provide ample assurance, the American Institute of Certified Public Accountants (AICPA) and the Canadian Institute of Chartered Accounts (CICA) comply organizations to obtain and maintain the

You May Also Find These Documents Helpful

  • Good Essays

    Before any strategy takes place, an auditor must determine the end result desired from the Information Technology being used as well as the type of technology being dealt with. The most important thing is security thus it is vital to know this technology in and out to be able to determine its strengths and weaknesses. This allows for proper compensation to combat such attacks whether they are fraudulent or accidental in nature. It is necessary to be familiar with different types of proven viable internal control setups to properly test and gage an IT’s internal control system. There are three different strategies use when testing internal controls. First includes assessing the controls using user control information. In this strategy, an auditor would gather computer-generated reports and compare those to all documentation on specific transactions. This process is also known as auditing around the computer because it deals with more hard copy documents. The next strategy entails using application controls to determine the level of risk…

    • 627 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    ACC 303 Week 2 Quiz 1

    • 3149 Words
    • 24 Pages

    13. The AICPA’s Code of Professional Conduct requires that members prepare financial statements in accordance with generally accepted…

    • 3149 Words
    • 24 Pages
    Satisfactory Essays
  • Good Essays

    Cga Case Study

    • 3778 Words
    • 16 Pages

    Pan The Certified General Accountants Association of Canada and Certified General Accountants Association of Prince Edward Island…

    • 3778 Words
    • 16 Pages
    Good Essays
  • Powerful Essays

    Acc/490 Week 4

    • 2141 Words
    • 9 Pages

    The generalized auditing software is designed to be used, and is adaptable to virtually any organization that requires auditing services. Audit software can be further selected as appropriate depending on the type of audit that needs to be performed. For example, an organization with a control environment that is high risk or ineffective can be tailored to by using auditing software that incorporates high fraud risk environments. Organizations that have a greater than average susceptibility to risk in the network environment should use auditing software specifically designed to address these…

    • 2141 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    E-Business is much more than just a shopping website. It expands individual’s knowledge and vision of the organization, gains new customers and evaluates the relevance of the products and personal preference of the clients. Safety and security is always necessary to protect intellectual properties and customers privacy. E-Business organizations use the best technology in order to grow and create strategies to maintain affordable prices.…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    the . Auditing: A Risk Analysis Approach, 5th Edition 16, contains a computer audit practice case. In addition, a practical…

    • 2996 Words
    • 16 Pages
    Satisfactory Essays
  • Powerful Essays

    Exam Final ECOM 320

    • 3983 Words
    • 11 Pages

    Lesson 7: E-commerce security and controls Access control: Mechanism that determines who can legitimately use a network resource. Active tokens: Access token Authentication: Process to verify the real identify of an individual, computer, computer program, or EC website. Authorization: Determines whether a buyers card is active and whether the customer has sufficient funds. Biometric systems: Authentication systems that identify a person by measurement of biological characteristic, such as fingerprints, iris patterns, facial features, or voice. Biometric control: An automated method for verifying the identity of a person based on physical or behavioral characteristics. Botnet: A huge number of hijacked Internet computers that have been set up to forward traffic, including spam and viruses, to other computers on the Internet. Business continuity plan: A plan that keeps the business running after a disaster occurs. Each function in the business should have a valid recovery capability plan. Certificate authority (CA): Third parties that issue digital certificates. Ciphertext: a plaintext message after it has been encrypted into a machine-readable form. Confidentiality: Assurance data privacy and accuracy. Keeping private or sensitive information from being disclosed to unauthorized individuals, entities, or processes. Cybercrime: Intentional crimes carried out on the Internet. Cybercriminal: A person who intentionally carries out crimes over the Internet. Crackers: A malicious hacker who may represent a serious problem for a corporation. Cryptography: is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Data breach: A security incident in which sensitive, protected, or confidential, data is copied transmitted, viewed, stolen, or used by an individual unauthorized to do so. Denial-of-service (DoS) attack: An attack on a website in which an attacker uses specialized software to send a…

    • 3983 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    B. AICPA AT 501, “An examination of an entity’s internal control over financial reporting that is integrated with an audit of its financial statements.”…

    • 294 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    E-commerce has many drawbacks. I will be going through these drawbacks that risk an organisation of committing to an E-commerce system.…

    • 724 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Each e-commerce have to keep their online data safe such as customers personal details, their bank details and many more and in order to make sure that their data stays safe and secured, they have to be aware of all the frauds that is taking place now days because e-commerce have to deal with payments such as online banking, electronic transactions, using debit cards, credit cards and many other ways and because of these e-commerce’s have more compliance issues as they are at more risk from being targeted than other websites. Data’s can be stolen in many ways such as by hacking and by adding viruses into systems and many other ways.…

    • 646 Words
    • 3 Pages
    Good Essays
  • Better Essays

    American Institute of Certified Public Accountants. (2001). Statement of Auditing Standards No. 95, Generally Accepted Auditing Standards,…

    • 1198 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Pigman

    • 347 Words
    • 2 Pages

    1.The Canadian Institute of Chartered Accountants has established the standards for Canadian accountants. These standard are made available in the CICA Handbook.…

    • 347 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Binoy Study

    • 751 Words
    • 4 Pages

    with the goals (Pathak, 2005). 4.0 Changing Roles of the auditors The impact of information technology on Organisations audit processes, 2012 Page | 2…

    • 751 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Cobit Casestudy Tibo

    • 8174 Words
    • 33 Pages

    With more than 35,000 members in more than 100 countries, the Information Systems Audit and Control Association…

    • 8174 Words
    • 33 Pages
    Better Essays
  • Powerful Essays

    Auditing in a Cis

    • 8552 Words
    • 35 Pages

    Related PSAs/PAPSs: PSA 401; PAPS 1001, 1002, 1003, 1008 and 1009 PSA 401 – Auditing in a Computer Information Systems (CIS) Environment 1. Which statement is incorrect when auditing in a CIS environment? a. A CIS environment exists when a computer of any type or size is involved in the processing by the entity of financial information of significance to the audit, whether that computer is operated by the entity or by a third party. b. The auditor should consider how a CIS environment affects the audit. c. The use of a computer changes the processing, storage and communication of financial information and may affect the accounting and internal control systems employed by the entity. d. A CIS environment changes the overall objective and scope of an audit. 2. Which of the following standards or group of standards is mostly affected by a computerized information system environment? a. General standards c. Reporting standards b. Second standard of field work d. Standards of fieldwork 3. Which of the following is least considered if the auditor has to determine whether specialized CIS skills are needed in an audit? a. The auditor needs to obtain a sufficient understanding of the accounting and internal control system affected by the CIS environment. b. The auditor needs to determine the effect of the CIS environment on the assessment of overall risk and of risk at the account balance and class of transactions level. c. Design and perform appropriate tests of controls and substantive procedures. d. The need of the auditor to make analytical procedures during the completion stage of audit.…

    • 8552 Words
    • 35 Pages
    Powerful Essays