• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 507
  • 186
  • 107
  • 58
  • 32
  • 17
  • 15
  • 15
  • 13
  • 12
  • 5
  • 5
  • 4
  • 4
  • 3
  • Tagged with
  • 1115
  • 279
  • 254
  • 243
  • 208
  • 180
  • 163
  • 159
  • 140
  • 121
  • 103
  • 100
  • 95
  • 95
  • 94
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
481

Auditor switching

Garach, Hematlal 11 1900 (has links)
Text in English / This study explores the phenomenon of auditor switching. The purpose of this study is to further contribute to the auditor switching literature by examining the reasons client companies in South Africa switch auditors, where the topic has not previously been studied and following a period of rapid and significant change in the auditing profession. Using previous literature as a foundation, forty-four variables that contribute to auditor switching are presented and tested based on empirical data elicited by means of a questionnaire survey of sample companies that experienced auditor switching during the period 1 January 1998 to 30 June 1999 as obtained from Practitioners in the KwaZulu-Natal Region. The factors motivating auditor switching were based on a questionnaire response of seventy-five companies (response rate 67% ). The empirical study also tested whether or not the switch variables thus identified are statistically related to auditor switching. The findings of this study revealed that audit fees are both the most frequently cited reason for switching auditors and found to be statistically significant at the 0.05 level of significance. Dissatisfaction over the overall quality of services provided by the auditor, lack of communication including the lack of responsiveness to client needs, poor working relationship with audit partner followed as switch factors but were not found to be statistically significant at 0. 05 level. The findings of this study revealed that two other variables, namely, management change and the need for group auditor rationalisation, appear to be significantly related to auditor switching at the 0.05 1evel of significance. / Auditing / M. Comm. (Auditing)
482

Revisionens påverkan på låneräntan : En datastudie inom kontantintensiva och mindre kontantintensiva branscher / The audit’s impact on the rate of interest

Hasselberg, Anton, Håkansson, Max, Leksell, Daniel January 2020 (has links)
Bakgrund: Revisionsplikten infördes i Sverige 1983 där ett av argumenten var att bidra till ökad insyn i företagen. År 2010 avskaffades denna revisionsplikt för småföretag. En övergripande anledning till att småföretagen valde att avstå en revisor, var den kostnadsbesparingen på 10 000 kr per år. Bolagsverket har kunnat konstatera att felaktiga bokslut från småföretagen har ökat markant sedan avskaffandet av revisionsplikten. Syfte: Syftet med studien är att förklara hur den slopade revisionsplikten påverkar småföretags låneränta, genom att undersöka kontantintensiva och mindre kontantintensiva branscher. Metod: En kvantitativ metod med ett hypotetiskt deduktivt arbetssätt, utförd genom en datastudie. Årsredovisningarna har hämtats från databasen Retriever Business. Vi har utfört analysen via en multipel regressionsanalys. Resultat: Revision har en positiv påverkan på räntan och är inte statistiskt signifikant för båda branscher. Slutsats: Vi kunde inte se någon påverkan av revision på räntan då den inte var signifikant. Det undersökningen resulterade i var att företagens storlek och dess andel materiella anläggningstillgångar var det som påverkade räntan i störst utsträckning. Vårt resultat blev även påverkat av det stora bortfallet och felaktigheter i datainhämtningen. / Background: The audit obligation was introduced in Sweden in 1983 where one of the arguments was to contribute to increased transparency in the companies. In 2010, this audit obligation for small businesses was abolished. A general reason for the small companies choosing to renounce an auditor was the cost savings of SEK 10,000 per year. Bolagsverket has been able to find that incorrect financial statements from small companies have increased significantly since the abolition of the audit obligation. Purpose: The purpose of the study is to explain how the delayed audit obligation affects small companies' loan interest rates, by examining cash-intensive and less cash-intensive industries. Method: A quantitative method with a hypothetical deductive method, performed by a computer study. The annual reports have been retrieved from the Retriever Business database. We performed the analysis via a multiple regression analysis. Result: Auditing has a positive impact on interest rates and is not statistically significant for both industries. Conclusion: We could not see any impact of the revision on the interest rate as it was not significant. The result of our research was that the size of the companies and their share of tangible fixed assets were the most affected by interest rates. Our results were also affected by the large drop-out and inaccuracies in data collection.
483

Cloud computing : COBIT-mapped benefits, risks and controls for consumer enterprises

Enslin, Zacharias 03 1900 (has links)
Thesis (MComm)--Stellenbosch University, 2012. / ENGLISH ABSTRACT: Cloud computing has emerged as one of the most hyped information technology topics of the decade. Accordingly, many information technology service offerings are now termed as cloud offerings. Cloud computing has attracted, and continues to attract, extensive technical research attention. However, little guidance is given to prospective consumers of the cloud computing services who may not possess technical knowledge, or be interested in the in-depth technical aspects aimed at information technology specialists. Yet these consumers need to make sense of the possible advantages that may be gained from utilising cloud services, as well as the possible incremental risks it may expose an enterprise to. The aim of this study is to inform enterprise managers, who possess business knowledge and may also be knowledgeable on the main aspects of COBIT, on the topic of cloud computing. The study focuses on the significant benefits which the utilisation of cloud computing services may bring to a prospective consumer enterprise, as well as the significant incremental risks this new technological advancement may expose the enterprise to. Proposals of possible controls that the prospective consumer enterprise can implement to mitigate the incremental risks of cloud computing are also presented. / AFRIKAANSE OPSOMMING: “Cloud computing” (wolkbewerking) het na vore getree as een van die mees opspraakwekkende inligtingstegnologieverwante onderwerpe van die dekade. Gevolglik word talle inligtingstegnologie-dienste nou as “cloud”-dienste aangebied. Uitgebreide aandag in terme van tegnologiese navorsing is en word steeds deur “cloud computing” ontlok. Weinig aandag word egter geskenk aan leiding vir voornemende verbruikers van “cloud”-dienste, wie moontlik nie tegniese kennis besit nie, of nie belangstel in die diepgrondige tegniese aspekte wat op inligtingstegnologie-spesialiste gemik is nie. Tog moet hierdie verbruikers sin maak van die moontlike voordele wat die gebruik van “cloud”-dienste mag bied, asook die moontlike inkrementele risiko’s waaraan die onderneming blootgestel mag word. Die doel van hierdie studie is om die bestuurders van ondernemings, wie besigheidskennis besit en moontlik ook kundig is oor die hoof aspekte van COBIT, in te lig oor wat “cloud computing” is. Die studie fokus op die beduidende voordele wat die benutting van “cloud computing”-dienste aan die voornemende verbruikersonderneming mag bied, asook die beduidende inkrementele risiko’s waaraan die onderneming blootgestel mag word as gevolg van hierdie tegnologiese vooruitgang. Voorstelle van moontlike beheermaatreëls wat die voornemende verbruikersonderneming kan implementeer ten einde die inkrementele risiko’s van “cloud computing” teë te werk word ook aangebied.
484

The development of an integrated framework in order to implement information technology governance principles at a strategic and operational level for medium-to-large sized South African business

Goosen, Riana 03 1900 (has links)
Thesis (MComm)--Stellenbosch University, 2012. / ENGLISH ABSTRACT: In today's technologically advanced business environments, Information Technology (IT) has become the centre of most, if not all businesses' strategic and operational activities. It is for this reason that the King III report has dedicated a chapter to IT governance principles, in effect making the board of directors and senior management responsible for implementing such principles. King III's guidance on these principles is only described in broad terms and lack sufficient detail as how to implement these principles. Though various guidelines, in the form of IT control frameworks, -models and -standards exist, it remains highly theoretical in nature and companies tend to view these control frameworks, -models and -standards on an individual basis, implementing them in an ad hoc manner, resulting in the implementation of an inefficient IT governance system, that does not address the key strategic areas and risks in a business. The purpose of this study is to develop an IT best practices integrated framework which can assist management in implementing an effective IT governance system at both a strategic and operational level. The integrated framework was developed by performing a detailed literature review of a best practice control framework, -model and -standard, including its underlying processes. By combining and aligning the relevant processes of the control framework, -model and -standard to the business' imperatives, a framework was developed to implement IT governance principles at a strategic level. The integrated framework is extended to provide guidance on how to implement good IT controls at an operational level. The control techniques, of the applicable processes identified at a strategic level, are implemented as well as the controls around a company's various access paths, which are affected by a company's business imperatives. These access paths are controlled through the implementation of applicable configuration controls. By making use of the integrated framework which was developed, an effective and efficient IT governance system can be implemented, addressing all applicable IT risks relevant to the key focus areas of a business. / AFRIKAANSE OPSOMMING: In vandag se tegnologies gevorderde besigheids omgewings het Informasie Tegnologie (IT) die middelpunt geraak van die meeste, indien nie elke onderneming se strategiese en operasionele aktiwiteite nie. Dit is vir hierdie rede dat die King III verslag 'n hoofstuk aan die beginsels van IT korporatiewe beheer wy. Dié verslag hou die direkteure en bestuur verantwoordelik vir die implementering van hierdie beginsels. Die King III verslag verskaf egter slegs in breë trekke leiding in verband met die implementering van hierdie beginsels en 'n gebrek aan meer gedetailleerde beskrywings bestaan. Alhoewel verskeie riglyne, in die vorm van IT kontrole raamwerke, -modelle en -standaarde bestaan, bly dit steeds teoreties van aard en is maatskappye geneig om hierdie riglyne op 'n individuele vlak te hanteer en op 'n willekeurige wyse te implementeer. Hierdie proses lei tot die implementering van 'n ondoeltreffende IT korporatiewe beheerstelsel. Die doel van hierdie studie is om 'n geïntegreerde beste praktykraamwerk te ontwikkel wat deur die direkteure en bestuur van 'n onderneming gebruik kan word om op beide 'n strategiese en operasionele vlak 'n doeltreffende IT korporatiewe beheermaatstelsel in plek te stel. 'n Geïntegreerde raamwerk is ontwikkel deur 'n volledige literatuurstudie uit te voer, gebaseer op 'n beste praktyk IT kontrole raamwerk, -model en -standaard en die gepaardgaande prosesse. Deur die toepaslike prosesse van hierdie kontrole raamwerk, -model en -standaard te kombineer en te belyn met 'n besigheid se besigheidsimperatiewe, word IT korporatiewe beheerbeginsels op 'n strategiese vlak in plek gestel. Die geïntegreerde raamwerk sluit riglyne in om goeie IT kontroles op 'n operasionele vlak te implementeer. Die kontrole tegnieke, wat verbind word met die gepaardgaande prosesse wat tydens die strategiese vlak geïdentifiseerd is, word geimplementeer asook die die toepaslike konfigurasie kontroles oor die verskeie toegangspaaie wat beïnvloed word deur 'n besigheids se besigheidsimperatiewe. Deur gebruik te maak van die ontwikkelde geïntegreerde raamwerk kan alle geaffekteerde IT risikos nou aangespreek word en 'n doeltreffende IT korporatiewe beheerstelsel in plek gestel word.
485

NoSQL database considerations and implications for businesses

Pretorius, Dawid Johannes 12 1900 (has links)
Thesis (MComm)--Stellenbosch University, 2013. / ENGLISH ABSTRACT: NoSQL databases, a new way of storing and retrieving data, can provide businesses with many benefits, although they also pose many risks for businesses. The lack of knowledge among decision-makers of businesses regarding NoSQL databases can lead to risks left unaddressed and missed opportunities. This study, by means of an extensive literature review, identifies the key drivers, characteristics and benefits of a NoSQL database, thereby providing a clear understanding of the subject. The business imperatives related to NoSQL databases are also identified and discussed. This can help businesses to determine whether a NoSQL database might be a viable solution, and to align business and information technology (IT) objectives. The key strategic and operational IT risks are also identified and discussed, based on the literature review. This can help business to ensure that the risks related to the use of NoSQL databases are appropriately addressed. Lastly, the identified risks were mapped to the processes of COBIT (Control Objectives for Information and Related Technology) to inform a business of the highest risk areas and the associated focus areas. / AFRIKAANSE OPSOMMING: NoSQL databasisse, 'n nuwe manier om data te stoor en herwin, het die potensiaal om baie voordele vir besighede in te hou, maar kan ook baie risiko's teweeg bring. Gebrekkige kennis onder besigheidsbesluitnemers oor NoSQL databasisse kan lei tot onaangespreekte risiko’s en verlore geleenthede. Hierdie studie, deur middel van 'n uitgebreide literatuuroorsig, identifiseer die sleutel eienskappe, kenmerke en voordele van 'n NoSQL databasis, om sodoende 'n duidelike begrip van die onderwerp te verkry. Die besigheidsimperatiewe wat verband hou met NoSQL databasisse is ook geïdentifiseer en bespreek. Dit kan besighede help om te bepaal of 'n NoSQL databasis 'n werkbare oplossing kan wees, asook sake- en inligtingstegnologie (IT) doelwitte in lyn met mekaar bring. Na aanleiding van die literatuurstudie is die sleutel-strategiese en operasionele IT-risiko's geïdentifiseer en bespreek. Dit kan help om aan besighede sekerheid te verskaf dat die risiko's wat verband hou met die gebruik van NoSQL databasisse toepaslik aangespreek word. Laastens is die geïdentifiseerde risiko's gekoppel aan die prosesse van COBIT om 'n besigheid van die hoë-risiko areas en die gepaardgaande fokusareas in te lig.
486

The governance of significant enterprise mobility security risks

Brand, Johanna Catherina 12 1900 (has links)
Thesis (MComm)--Stellenbosch University, 2013. / ENGLISH ABSTRACT: Enterprise mobility is emerging as a megatrend in the business world. Numerous risks originate from using mobile devices for business-related tasks and most of these risks pose a significant security threat to organisations’ information. Organisations should therefore apply due care during the process of governing the significant enterprise mobility security risks to ensure an effective process to mitigate the impact of these risks. Information technology (IT) governance frameworks, -models and -standards can provide guidance during this governance process to address enterprise mobility security risks on a strategic level. Due to the existence of the IT gap these risks are not effectively governed on an operational level as the IT governance frameworks, -models and -standards do not provide enough practical guidance to govern these risks on a technical, operational level. This study provides organisations with practical, implementable guidance to apply during the process of governing these risks in order to address enterprise mobility security risks in an effective manner on both a strategic and an operational level. The guidance given to organisations by the IT governance frameworks, -models and -standards can, however, lead to the governance process being inefficient and costly. This study therefore provides an efficient and cost-effective solution, in the form of a short list of best practices, for the governance of enterprise mobility security risks on both a strategic and an operational level. / AFRIKAANSE OPSOMMING: Ondernemingsmobiliteit kom deesdae as ‘n megatendens in die besigheidswêreld te voorskyn. Talle risiko's ontstaan as gevolg van die gebruik van mobiele toestelle vir sake-verwante take en meeste van hierdie risiko's hou 'n beduidende sekuriteitsbedreiging vir organisasies se inligting in. Organisasies moet dus tydens die risikobestuursproses van wesenlike mobiliteit sekuriteitsrisiko’s die nodige sorg toepas om ‘n doeltreffende proses te verseker ten einde die impak van hierdie risiko’s te beperk. Informasie tegnologie (IT)- risikobestuurraamwerke, -modelle en -standaarde kan op ‘n strategiese vlak leiding gee tydens die risikobestuursproses waarin mobiliteit sekuriteitsrisiko’s aangespreek word. As gevolg van die IT-gaping wat bestaan, word hierdie risiko’s nie effektief op ‘n operasionele vlak bestuur nie aangesien die ITrisikobestuurraamwerke, -modelle en -standaarde nie die nodige praktiese leiding gee om hierdie risiko’s op ‘n tegniese, operasionele vlak te bestuur nie. Om te verseker dat organisasies mobiliteit sekuriteitsrisiko’s op ‘n effektiewe manier op beide ‘n strategiese en operasionele vlak bestuur, verskaf hierdie studie praktiese, implementeerbare leiding aan organisasies wat tydens die bestuursproses van hierdie risiko’s toegepas kan word. Die leiding aan organisasies, soos verskaf in die IT-risikobestuurraamwerke, - modelle en -standaarde, kan egter tot’n ondoeltreffende en duur risikobestuursproses lei. Hierdie studie bied dus 'n doeltreffende, koste-effektiewe oplossing, in die vorm van 'n kort lys van beste praktyke, vir die bestuur van die mobiliteit sekuriteitsrisiko’s op beide 'n strategiese en 'n operasionele vlak.
487

An investigation of developments in Web 3.0 : opportunities, risks, safeguards and governance

Bruwer, Hendrik Jacobus 04 1900 (has links)
Thesis (MComm)--Stellenbosch University, 2014. / ENGLISH ABSTRACT: Many organisations consider technology as a significant asset to generate income and control cost. The World Wide Web (henceforth referred to as the Web), is recognised as the fastest growing publication medium of all time, now containing well over 1 trillion URLs. In order to stay competitive it is crucial to stay up to date with technological trends that create new opportunities for organisations, as well as creating risks. The Web acts as an enabler for technological advancement, and matures in its own unique way. From the static informative characteristics of Web 1.0, it progressed into the interactive experience Web 2.0 provides. The next phase of Web evolution, Web 3.0, is already in progress. Web 3.0 entails an integrated Web experience where the machine will be able to understand and catalogue data in a manner similar to humans. This will facilitate a world wide data warehouse where any format of data can be shared and understood by any device over any network. The evolution of the Web will bring forth new opportunities as well as challenges. Organisations need to be ready, and acquire knowledge about the opportunities and risks arising from Web 3.0 technologies. The purpose of this study is to define Web 3.0, and identify new opportunities and risks associated with Web 3.0 technologies by using a control framework. Identified opportunities can mainly be characterised as the autonomous integration of data and services which increases the pre-existing capabilities of Web services, as well as the creation of new functionalities. The identified risks mainly concern unauthorised access and manipulation of data; autonomous initiation of actions, and the development of scripts and languages. Risks will be mitigated by control procedures which organisations need to implement (examples include but is not limited to encryptions; access control; filtering; language and ontology development control procedures; education of consumers and usage policies). The findings will assist management in addressing the key focus areas of opportunities and risks when implementing a new technology. / AFRIKAANSE OPSOMMING: Baie organisasies beskou tegnologie as 'n belangrike bate om inkomste te genereer en kostes te beheer. Die Wêreldwye Web (voorts na verwys as die Web), word erken as die vinnigste groeiende publikasiemedium van alle tye, met tans meer as 1 triljoen URLs. Ten einde kompeterend te bly, is dit noodsaaklik om op datum te bly met tegnologiese tendense wat nuwe geleenthede, sowel as risikos, vir organisasies kan skep. Die Web fasiliteer tegnologiese vooruitgang, en ontwikkel op sy eie unieke manier. Vanaf die statiese informatiewe eienskappe van Web 1.0, het dit ontwikkel tot die interaktiewe ervaring wat Web 2.0 bied. Die volgende fase van Web-ontwikkeling, Web 3.0, is reeds in die proses van ontwikkeling. Web 3.0 behels 'n geïntegreerde Web-ervaring waar ʼn masjien in staat sal wees om data te verstaan en te kategoriseer op ʼn soortgelyke wyse as wat ʼn mens sou kon. Dit sal lei tot 'n wêreldwye databasis waar enige vorm van data gedeel en verstaan kan word deur enige toestel oor enige netwerk. Die ontwikkeling van die Web sal lei tot die ontstaan van nuwe geleenthede, sowel as uitdagings. Dit is noodsaaklik dat organisasies bewus sal wees hiervan, en dat hulle oor genoegsame kennis sal beskik met betrekking tot die geleenthede en risikos wat voortspruit uit Web 3.0 tegnologieë. Die doel van hierdie studie is om Web 3.0 te definieer, en nuwe geleenthede en risikos wat verband hou met Web 3.0 tegnologieë, te identifiseer deur gebruik te maak van ʼn kontrole raamwerk. Geleenthede wat geïdentifiseer is, word hoofsaaklik gekenmerk deur outonome integrasie van data en dienste wat lei tot ʼn toename in die vermoëns van reeds bestaande Webdienste, sowel as die skepping van nuwe funksionaliteite. Die risikos wat geïdentifiseer is, word hoofsaaklik gekenmerk deur ongemagtigde toegang en manipulasie van data; outonome inisieering van aksies, en die ontwikkeling van programskrifte en tale. Risikos wat geïdentifiseer is, sal aangespreek word deur die implementering van voorgestelde kontroleprosedures om sodanige risikos te verminder tot ʼn aanvaarbare vlak (voorbeelde sluit in maar is nie beperk tot enkripsie; toegangkontroles; filters; programmatuur taal en ontologie ontwikkels kontroles prosedures; opleiding van gebruikers en ontwikkelaars en beleide ten op sigte van gebruik van tegnologië). Die bevindinge sal bestuur in staat stel om die sleutelfokus-areas van geleenthede en risikos te adresseer gedurende die implementering van 'n nuwe tegnologie.
488

Assurance of corporate stand-alone reporting : evidence from the UK

Al-Hamadeen, Radhi Mousa January 2007 (has links)
Since the early 1990’s the number of corporate stand-alone reports produced by various organisations worldwide has increased considerably (Kolk, 2004; Owen, 2006). It is argued that introducing an assurance statement with the stand-alone report may contribute to enhancing the credibility of the reported information (FEE, 2002; Dando and Swift, 2003; ACCA and AccountAbility, 2004). This thesis reports on a multi-level analysis of assurance statements attached to stand-alone reports that were produced by the UK FTSE100 companies during the reporting years 2000-2004. Drawing on a research instrument (which itself has been informed by previous literature, namely O’Dwyer and Owen, 2005) as well as the most recent assurance guidelines and standards (such as FEE, 2002; GRI, 2002, AA1000AS, 2003; and ISAE3000, 2004), this thesis examines the extent to which assurance statements disclose information about crucial elements of the assurance engagement, the amount of disclosure as well as factors associated with the information disclosed. In this context, particular attention is given to issues of independence of the assurance provider; the methodology used to conduct the assurance engagement; the degree to which stakeholders have been engaged and their issues taken account of within the assurance process; and assurance results (namely presentation of the assurance opinion, findings and recommendations). The research results suggest that, despite the increased amount and quality of information disclosed within the assurance statements over the years, engagement of stakeholders and taking adequate account of their issues within the assurance process is still lacking compared to other dimensions of assurance. In the absence of generally accepted stand-alone reporting criteria and assurance standards for this type of reporting, various assurance approaches have emerged and these correspond to the nature of the assurance provider (for example, accountancy, consultancy and certification body). The FTSE100 companies (in almost in two-thirds of the conducted engagements) rely most heavily on consultancy firms for assurance and as a result, this approach dominates UK assurance practice. As a consequence, there are noticeable variations in the assurance methodologies, results of the assurance engagements (findings, opinions and recommendations) and shape of the assurance statements over the study. There are also changes that emerge over time and these are most strongly associated with the standards that are used to govern the assurance engagement and also the type of information being assured. These findings raise concerns about whether it is possible to harmonise assurance practice of the corporate stand-alone reports. This thesis concludes with some practical implications for the assurance of stand-alone reports, as well as recommendations for future research.
489

Big 4 global networks: degree of homogeneity of audit quality among affiliates and relevance of PCAOB inspections

Unknown Date (has links)
The Big 4 global networks (Deloitte, Ernst & Young [E&Y], KPMG, and PricewaterhouseCoopers [PwC]) market themselves as providers of worldwide seamless services and consistent audit quality through their members. Under the current environment in which these auditors operate, there are three types of global network members: inspected non-U.S. affiliates (inspected affiliates, hereafter), non-inspected non-U.S. affiliates (non-inspected affiliates, hereafter), and inspected U.S. offices (U.S. offices, hereafter). The recent suspension of the China-based Big 4 affiliates from auditing U.S.-listed companies calls into question whether these global networks can deliver the same level of audit quality across all their members and whether those located in jurisdictions denying access to the Public Company Accounting Oversight Board (PCAOB or Board, hereafter) to conduct inspections may benefit from such inspections. This study examines the effect of being an affiliate and the effect of PCAOB inspections on perceived audit quality. I use earnings response coefficients (ERCs) as a proxy for perceived audit quality. / Includes bibliography. / Dissertation (Ph.D.)--Florida Atlantic University, 2015. / FAU Electronic Theses and Dissertations Collection
490

An??lise de conte??do aplicada aos relat??rios de auditoria das empresas de tecnologia da informa????o no Brasil

Ricci, Angela Aparecida Rosseto Vitti 19 March 2014 (has links)
Made available in DSpace on 2015-12-03T18:35:30Z (GMT). No. of bitstreams: 1 Angela_Aparecida_Rosseto_Vitti_Ricci.pdf: 835030 bytes, checksum: dc92d1d49577f22a800805ae5ac4152d (MD5) Previous issue date: 2014-03-19 / The several crises and many scandals occurred in the recent history of the Financial Market, brings about discussions concerning audit work aiming auditing report issuance. Therefore, this research aims to determine the level of regulatory compliance relating to the audit report established by Resolutions n??. CFC 1.231/09 - ISA 700, CFC n?? 1.232/09 - ISA 705, CFC n??. 1.233/09 - ISA 706 on the auditing reports issued by companies of information technology sector, available on the website of BM&FBovespa. To reach the proposed goal we have performed a study based on the technique of document analysis and content analysis, in which we have attempted to identify the content of the reports of selected audits adequacy, determined by the existing rules for the issuance of the auditing report. The research is descriptive and qualitative approach have been used, checking the contents of 25 audit reports of companies in the information technology industry in which we have compared the mandatory content established by the standard with the contents of the reports. It has been found that: the reports issued by independent auditing firms on the financial statements of the Information Technology companies for the period 2010-2012. It can be concluded that the reports analyzed, show adequacy to the regulations currently in force, in 10 of the 16 mandatory items established by those rules. However, it has been verified inadequacy as to the way exception is presented in the reports, i.e., through an emphasis paragraph, when it should be in an specific paragraph for exceptions. All the information collected is described and analyzed in the development of this work / A hist??ria recente do mercado financeiro por for??a das crises e dos muitos esc??ndalos corporativos traz ?? tona discuss??es a respeito dos trabalhos de auditoria, que t??m por finalidade a emiss??o do relat??rio de auditoria. Diante de tal exposto, esta pesquisa tem como objetivo a verifica????o do n??vel de adequa????o ??s normas relativas ao relat??rio de auditoria definidas pelas resolu????es CFC n??. 1.231/09 - NBC TA 700, CFC n??. 1.232/09 - NBC TA 705, CFC n??. 1.233/09 - NBC TA 706, dos relat??rios de auditoria emitidos pelas empresas do setor de tecnologia da informa????o, as quais disponibilizam suas informa????es no s??tio da BM&FBovespa. Para atingir o objetivo proposto, realizou-se um estudo baseado na t??cnica de an??lise documental e an??lise de conte??do, com as quais se buscou identificar, no conte??do dos relat??rios das auditorias selecionados a adequa????o determinada pelas normas em vigor para emiss??o de relat??rios. A pesquisa tem car??ter descritivo e utilizou a abordagem qualitativa, para averiguar o conte??do de 25 relat??rios de auditoria das empresas do setor de tecnologia da informa????o, tendo-se comparado o conte??do obrigat??rio institu??do pela norma com o conte??do dos relat??rios. Constatou-se que: os relat??rios emitidos pelas firmas de auditoria independente acerca das demonstra????es cont??beis das empresas de Tecnologia da Informa????o relativos ao per??odo de 2010 a 2012 apresentam adequa????o ?? norma vigente em 10 itens dos 16 itens obrigat??rios institu??dos pela referidas normas. Verificou-se inadequa????o quanto ?? forma de ressalva apresentada nos relat??rios, visto que a ressalva se d?? pelo par??grafo de ??nfase, quando o correto seria em par??grafo espec??fico de ressalva. Todos os dados coletados s??o descritos e analisados no desenvolvimento deste trabalho

Page generated in 0.0494 seconds