module 6 – part 1 an overview of information systems audit 1

5
Module 6 – Part 1 An Overview of Information Systems Audit 1

Upload: samantha-evans

Post on 29-Dec-2015

213 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Module 6 – Part 1 An Overview of Information Systems Audit 1

1

Module 6 – Part 1An Overview of Information Systems Audit

Page 2: Module 6 – Part 1 An Overview of Information Systems Audit 1

2

IntroductionToday computers perform much

of data processing required in both the private and public sectors of our economies.

Need to maintain the integrity of data processed by computers now seems to pervade our lives.

Fear of the substantially increased data-processing capabilities are not well controlled – computer abuse.

Page 3: Module 6 – Part 1 An Overview of Information Systems Audit 1

3

IntroductionConcerns with the privacy of data

exchange with organizations. E.g. tax department, medical authorities.

Uncontrolled use of computers can have a widespread impact on a society. E.g. inaccurate information causes

misallocation of resources within the economy and fraud can perpetrated because of inadequate system controls.

Those who suffer most often are those who can least afford to suffer.

Page 4: Module 6 – Part 1 An Overview of Information Systems Audit 1

4

Need for control & Audit of computersComputers are used extensively

to process data and to provide information for decision making.

Rapid decrease in the cost of computer technology , widespread availability of powerful microcomputers and their associated packaged software – resulted in the extensive use of computers in the workplace and at home.

Page 5: Module 6 – Part 1 An Overview of Information Systems Audit 1

5

Need for control & Audit of computersSeven major reasons for establishing a

function to examine controls over computer-based data processing.

Costs of incorrect decision making

Costs of computer

Abuse

Organization costs of data loss

Value of hardware, software, personnel

High costs of

computer error

Maintenance of

privacyControlled evolution

of computer

useORGANIZATIONS

Control and audit of

computer-based information

system