(2004)Restoring auditor credibility:tertiary monitoring and logging of continuous assurance systems.pdfVIP
- 0
- 0
- 约7.55万字
- 约 20页
- 2017-12-06 发布于浙江
- 举报
International Journal of Accounting Information Systems
5 (2004) 183– 202
Restoring auditor credibility: tertiary monitoring and
logging of continuous assurance systems
Michael G. Alles, Alexander Kogan *, Miklos A. Vasarhelyi
Rutgers Business School, 180 University Avenue, Newark, NJ 07102-1897, USA
Received 31 March 2003; received in revised form 30 November 2003; accepted 1 January 2004
Available online
Abstract
The continuing series of business scandals, from Enron to WorldCom, have undermined the
credibility of auditing and auditors. In response, the SEC and the AICPA have advocated greater
reliance on continuous assurance (CA), which utilizes on-line information technology to produce
audit results simultaneously with, or a short period of time after, the occurrence of relevant events. In
comparison with the traditional financial statements audit, CA aims to be timelier, more
comprehensive, more accurate and more supportive of the management process. However, even if
CA accomplishes that goal, will that be sufficient by itself to help restore investors’ faith in auditing?
We argue that while CA is certainly useful if the problem behind firm failure is lack of information
and analysis, it is no more effective than standard auditing in a setting in which managers and
auditors collude to deliberately mislead investors. Indeed, its reliance on automated analytics based
on auditor- and manager-determined benchmarks makes CA especially vulnerable in the event of
fraud. To overcome this potential weakness of future CA systems, we propose that they be
augmented with a ‘‘black box (BB) log file’’ that is a read-only, third-party-controlled record of the
actions of auditors, especially in rega
您可能关注的文档
- (2002)Powert tools 2002 audit software usage survey.pdf
- (2002)The Never-Ending Audit.doc
- (2002)Twenty-First Century Assurance.pdf
- (2002)Traditional and emerging methods of electronic assurance.pdf
- (2003) critical appraisal of customer satisfaction and e-commerce.pdf
- (2003)A model for Audit Engagement Planning for E-Commerce.pdf
- (2003)A primer for brainstorming fraud risks.pdf
- (2003)An assessment of human–computer interaction research in management information systems:topics and methods.pdf
- (2003)Assurance Reporting for XBRL:XARL (eXtensible Assurance Reporting Language).pdf
- (2003)Audit Trails in Evidence: Analysis of A Queensland Case Study.pdf
- (2004)Selecting an Audit Software Package for Classroom Use.pdf
- (2004)The PCAOB and the Social Responsibility of the Independent Auditor.pdf
- (2004)The reliance of external auditors on internal auditors.pdf
- (2004)The Effectiveness of Alternative Risk Assessment and Program Planning Tools in a Fraud Setting.pdf
- (2004)The top tech Assurance.pdf
- (2004)Using Control Charts to Monitor Financial Reporting of Public Companies.doc
- (2004)Utilization of Generalized Audit Software in an Information Systems Auditing Course.pdf
- (2004)Watchdog or Bloodhound?The Push and Pull Toward a New Audit Model.pdf
- (2004)建构稽核轨迹之延伸实体关系模式.pdf
- (2004-2-12)A continuous auditing web services model for XML-based accounting systems(Discussion2).pdf
最近下载
- 中诚信国际-2025年城投行业运行回顾与2026年展望-“退平台”倒计时下的城投风险再审视.pdf VIP
- 15-《渗透检测》第6-9章-张彦新概要.ppt
- cobas® cobas 系统 6800 8800 Systems p 680 instrument 说明书用户手册.pdf
- 项目总工手册(2023版).docx
- 北师大版三年级下册数学全册教学设计(配2026年春改版教材).docx
- 石化公司物资采购管理办法.pptx VIP
- DB31T 1661-2025 公共区域电子屏播控安全管理要求.docx VIP
- ANSI ESD S20.20-2021(完整中文版本).docx VIP
- 梅江会战扬威名.doc VIP
- 开工第一课(2026)课件.ppt
原创力文档

文档评论(0)