2007
DOI: 10.1111/j.1099-1123.2007.00359.x
|View full text |Cite
|
Sign up to set email alerts
|

Meeting Challenges and Expectations of Continuous Auditing in the Context of Independent Audits of Financial Statements

Abstract: This paper proposes a continuous auditing model that provides external auditors the opportunity to audit clients continuously or on a more frequent basis while reducing the possibility of compromising auditor independence. The model requires the auditor's system to be separated from the auditee's system so that the two systems do not interfere with each other. The auditor's system must also communicate smoothly and effectively with the auditee's system to continuously process data captured from that system. We… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(17 citation statements)
references
References 14 publications
0
17
0
Order By: Relevance
“…In this approach the continuous monitoring and auditing system is separate from the client's enterprise system. MCLs are stand-alone systems that rely on comparisons of extracted transaction data with pre-determined constraints that allow for continuous monitoring of systems and identification of violations (Du and Roohani, 2007).…”
Section: Monitoring and Control Layer (Mcl)mentioning
confidence: 99%
“…In this approach the continuous monitoring and auditing system is separate from the client's enterprise system. MCLs are stand-alone systems that rely on comparisons of extracted transaction data with pre-determined constraints that allow for continuous monitoring of systems and identification of violations (Du and Roohani, 2007).…”
Section: Monitoring and Control Layer (Mcl)mentioning
confidence: 99%
“…A permanent communication connection to the auditing object is necessary (i.e., the cloud service). To enable a permanent communication, [15] developed a continuous auditing model, which effectively connects the auditor's systems to the auditee's systems, by using XML and CORBA. Similar auditing architectures include independent monitoring and control layers for continuously querying and analyzing auditing objects [3,42,52,53].…”
Section: System Architecturementioning
confidence: 99%
“…For example, [30] analyzed the OVAL (Open Vulnerability and Assessment Language) and the XCCDF (Extensible Configuration Checklist Description Format) to enable (semi-) automated IT controls checks, patch and configuration management validation, and vulnerability assessments. The provided tools, processes, and capabilities may differ based upon the extent, kind, and objectives of the used auditing system [15,42,52,53].…”
Section: System Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…This approach also has a rather long history in the context of information systems dating as far back as 1991 (Vasarhelyi & Halper 1991;Vasarhelyi et al 2004;Kuhn & Sutton 2005;Alles et al 2006;Kuhn & Sutton 2006;Du & Roohani 2007;Li et al 2007). The MCL differs from the EAM in that it is an independent non-integrated software solution that uses middleware to extract data from the enterprise system which is to be monitored.…”
Section: Continuous Assurancementioning
confidence: 99%