ACCT
Acct Tech Final Study Guide

Caats computer assisted audit techniques used in

Info icon This preview shows pages 4–5. Sign up to view the full content.

CAATS- Computer-assisted audit techniques used in: -tests of details of transactions and balances -analytical review procedures -compliance tests of IT controls -OS and network vulnerability controls -Application security testing and source code security scans -Penetration testing CAAT Approaches -Auditing Around the computer->Black-box approach -Auditing through the computer->White-box approach Test data technique Parallel simulation Integrated test facility Embedded audit module GAS- Generalized audit software Standard software that has the capability to directly read & access data from various data platforms. Continuous Audit - A performing audit-related activities on a continuous basis
Image of page 4

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

Chapter 13 Balanced Scorecard- a performance measurement framework that allows managers to measure the firm’s performance from multiple perspectives. Balanced scorecard perspectives Learning and Growth -Addresses firms goals for investments in human, information, and organizational capital Process Perspective -Describes the firm’s objectives for its business processes. Customer perspective -Customer satisfaction focus Financial perspective -Accounting-based performance that is used as a lagging indicator of firm performance Strategy map - A one page map representation of the firm’s strategic priorities and the cause and effect linkages among those strategic priorities. Information capital - Computing hardware - Infrastructure - Applications - Employee abilities Categories of IT - Function IT- those that perform a single function - Network IT- Those that allow people to communicate with other people - Enterprise IT- Those that restructure interactions within the company as well as external partner Enterprise IT capabilities - Transaction automation - Process management automation - Process integration - Customer service - Performance monitoring and decision support The value of IT - The value of IT is usually not within the IT itself but instead in how it supports other processes.
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.
  • Spring '10
  • LyleSchmardebeck
  • Accounting, Wireless Networks, Computer network, Virtual private network, control activities, network vulnerability controls, opportunity w/o risk

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern