- 1
- 0
- 约7.47千字
- 约 3页
- 2018-01-31 发布于浙江
- 举报
International Journal of Accounting Information Systems
5 (2004) 207– 209
Discussion
Discussion of restoring auditor credibility:
tertiary monitoring and logging of
continuous auditing systems
Eckhardt Kriel *
Ernst and Young LLP, Canada
Received 1 January 2004; accepted 1 January 2004
This is a very interesting paper and is sure to generate a lot of comment and debate.
There is no doubt that the accounting profession is suffering from a lack of credibility at
this time. The paper is accordingly topical and relevant, if not a little provocative.
In my comments that follow, I have deliberately kept the focus at a high level rather
than delving into the details of whether, for example, one database technology is better
than another or whether one encryption technique is better than another. I am also
commenting from the point of view of a Canadian practitioner.
When I read the paper I was struck by the presumed implication that, in the business
failures we have seen to date, the auditors colluded with management in an attempt to
intentionally defraud the investors. This presumption is then used in the rest of the paper to
build the case for the auditors themselves to be monitored. Certainly, in a limited number
of instances, this may have been the case, but our research into significant corporate
failures over the last 10 years highlights the fact that the auditors themselves were often the
victims of collusive management fraud.
The version of the paper that I reviewed does not take into account the recent measures
put in place by the regulators through the U.S. ‘‘Public Company Accounting Reform and
Investor Prot
您可能关注的文档
- (2002)Financial Statement Audits, a Game of Chicken?.pdf
- (2002)Impact of Information Technology on Public Accounting Firm Productivity.pdf
- (2002)Information Technology, Internal Control,and Financial Statement Audits.pdf
- (2002)Innovative Uses of Computer Audit Techniques and Continuous Auditing.pdf
- (2002)Investigating the Impact of Auditor-Provided Systems Reliability Assurance on Potential Service Recipients.pdf
- (2002)Investigating the Reaction of Relatively Unsophisticated Investors to Audit Assurance on Firm-Released News Announcements.doc
- (2002)Holistic, Continuous Assurance Integration:e-Business Opportunities and Challenges.pdf
- (2002)predecisional distortion of evidence as a consequence of real-ime audit review.pdf
- (2002)replay_Discussion of restoring auditor credibility——tertiary monitoring and logging of continuous assurance systems.pdf
- (2002)Powert tools 2002 audit software usage survey.pdf
- (2004)Discussion of IT assurance competencies.pdf
- (2004)Discussion of supporting continuous monitoring using control charts.pdf
- (2004)Electronic versus Fact-to-Fact Review:The Effects of Alternative Forms of Review on Auditors' Performance.pdf
- (2004)E-commerce's Impact on Audit Practices.pdf
- (2004)Improving Fraud Risk Assessments through Analytical Procedures.pdf
- (2004)Get the most out of AUDIT TOOLS.pdf
- (2004)Information Technology Auditing and Cybercommerce:A Risk Perspective.pdf
- (2004)Machine-independent Audit Trail Analysis:A Tool for Continuous Audit Assurance.pdf
- (2004)Mining Textual Contents of Financial Reports.pdf
- (2004)On line Auditing.doc
最近下载
- 红楼梦英文版(杨宪益译)_精品.doc
- 16《电气控制及PLC技术》实验指导书(FX-TRN-BEG-C版本).pdf VIP
- 2025江苏省数学中考试题及答案下载.doc VIP
- 《有限空间作业安全技术规范》(GB 46768—2025)宣贯与培训.pptx
- 2025年湖北省工程专业技术职务水平能力测试(机械)历年参考题库含答案详解.docx VIP
- 近五年高考英语高频词汇汇编(打印版).pdf
- 光纤预制棒项目投资分析及可行性报告.docx VIP
- 七年级语文下册字帖.pdf VIP
- 2026年中国碳酸钡市场深度研究与投资战略研究报告.docx
- 【经典推荐】人教版历史七年级下册教学课件(全册).pptx VIP
原创力文档

文档评论(0)