Spelling suggestions: "subject:"auditing - data processing."" "subject:"auditing - mata processing.""
1 |
METHODOLOGY FOR THE AUTOMATION OF THE AUDIT PROCESS INVOLVING THE EVALUATION OF THE PLAN OF INTERNAL CONTROLLieberman, Arthur Zale, 1951- January 1977 (has links)
No description available.
|
2 |
Internal control and systems software, including analysis of MVS/XA SP 2.2Boessenkool, Marnix Guillaume 27 March 2014 (has links)
M.Com. (Computer Auditing) / In this chapter the actual topic will be presented. The reason for this study will be motivated with reference to current audit developments. This chapter will also highlight the constraints of the study. This is necessary to clearly identify the application of this essay in practice. The reader of this essay should be able to identify the relevance and possible applications of this study after having read chapter 1. In the past few years substantial attention has been given to auditing aspects of system software. The way system software operates and interacts, and the impact on the auditability of computer based systems were issues discussed in the EDP auditing environment. Auditors are now concentrating on using technology to assist in the performance of their audit procedures. The reasons for this are multiple, but for the purposes of this document only the major reasons will be highlighted.
|
3 |
Audit evaluation of the controls in the Adabas database management systemVan Schalkwyk, R. 11 February 2014 (has links)
M.Com. (Computer Auditing) / Please refer to full text to view abstract
|
4 |
Auditing analysis of IBM's information management system/virtual storage data-base/data communication (DB/DC) systemPretorius, Gideon Joubert 11 February 2014 (has links)
M.Com. (Computer Auditing) / Please refer to full text to view abstract
|
5 |
The need for the external auditor to rely on internal E.D.P. auditors in complex computerised environments (with particular reference to financial institutions)Ford, John Charles 23 September 2014 (has links)
M.Com. (Accounting) / Please refer to full text to view abstract
|
6 |
Audit and control of the teleprocessing monitor with specific reference to IBM's customer information control system (CICS)Ferreira, H.M.S. 04 February 2014 (has links)
M.Comm. (Computer Auditing) / Please refer to full text to view abstract
|
7 |
Auditing database integrity with special reference to relational and relationallike database management systemsJohnston, Hester Nicolette 23 September 2014 (has links)
M.Com. (Accounting) / Please refer to full text to view abstract
|
8 |
Continuous auditing technologies and modelsBlundell, Adrian Wesley January 2007 (has links)
Continuous auditing is not a totally new concept, but it has not been widely implemented, and has existed mostly as a point of debate amongst the auditing fraternity. This may soon change, as continuous auditing has become a topic of great interest, especially in the last decade. This may be due to a combination of reasons. In the last decade, much of the confidence in auditors’ reports was lost due to corporate governance scandals. This also brought about a greater desire for faster, more reliable reporting on which to base decisions. This desire has been transposed into regulations such as the Sarbanes-Oxley act in the United States, which encourages real-time auditing activities, which would benefit from continuous auditing. A second, possible contributing factor to the heightened interest in continuous auditing is that much of the requisite technology has matured to a point where it can be successfully used to implement continuous auditing. It is the technologies which form the focus of this research. It is therefore, the primary objective of this research to investigate and identify the essential technologies, and identify and define their roles within a continuous auditing solution. To explore this area, three models of continuous auditing are compared according to the roles of the technologies within them. The roots of some auditing technologies which can be adapted to the paradigm of continuous auditing are explored, as well as new technologies, such as XML-based reporting languages. In order to fully explore these technologies, the concepts of data integrity and data quality are first defined and discussed, and some security measures which contribute to integrity are identified. An obstacle to implementing a continuous model is that even with the newly available technologies, the multitudes of systems which are used in organisations, produce data in a plethora of data formats. In performing an audit the continuous auditing system needs to first gather this data and then needs to be able to compare “apples with apples”. Therefore, the technologies which can be used to acquire and standardise the data are identified.
|
9 |
Die funksie van die eksterne ouditeur in die veranderende ouditsituasie meegebring deur die elektronieseverwerking van handelsdata met spesiale verwysing na die indeling van interne beheerpuntePretorius, Jacobus Petrus Steyn 23 September 2014 (has links)
M.Com. (Auditing) / Please refer to full text to view abstract
|
10 |
Change management in a distributed data processing environmentZulch, Hermanus Barend 17 February 2014 (has links)
M.Com. (Computer Auditing) / Please refer to full text to view abstract
|
Page generated in 0.1144 seconds