ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

auditors and auditing

Updated on January 4, 2010

AUDITING AND AUDITORS

 

(NEWLY ASSIGNED ROLES IN INFORMATION SECURITY AND FRAUD PREVENTION)

Auditing and auditors has recently been assigned a new role by the unseen hands of business reality and challenges that is continually changing.

Auditing and auditors new role is necessitated by the fact that computers control almost all that we do in this new age. You rarely see a thing that does not have an e-version nowadays.

The deployment of computer applications and IT infrastructures in the process of business operations (accounting, marketing, production, etc) has significantly increased the risk associated with information security and fraud prevention. This is as a result of an increased vulnerability created by the use of this ‘gizmo’ computer.

Computer has become the primary working tool of our time. By simply pressing one red or blue button somewhere, a systems’ security can be greatly compromised there allowing fraud to take place.

Auditing is an aspect of assurance service that attempts to lend credibility to information. Stake holders in business needs assurance about assertions made in information meant for their consumption.

Auditing is the process of reviewing the use of a system (laws, standards, rules and principles), not a check of performance, but, rather to determine if misuse or abuse has occurred in the use of a system.

OFFICIAL DEFINITION (AMERICAN ACCOUNTING ASSOCIATION)

“Auditing is a systematic process of objectively obtaining and evaluating evidence regarding assertions about economic actions and events to ascertain the degree of correspondence between the assertions and established criteria and communicating the results to interested users”

Success of a business is purely measured by its ability to meet its ability to meet its objective(s). These objectives can be financial or non-financial.

Arguably, one of the most important objectives of companies is to protect their asset which includes information. Information is exposed to a number of dangers- it can be; compromised, stolen, misused, accidentally deleted, intentionally or unintentionally disclosed to competitors, etc

Fraud is an intentional deceptive act of an individual or group of people that is backed with the sole aim of taking advantage of others. Fraud is not the same thing as unintentional error(s).

OFFICIAL DEFINITION (DICTIONARY)

“Fraud is a generic term, and embraces all the multifarious means which human ingenuity can devise, which are resorted to by one individual, to get an advantage over another by false representations. No definite and invariable rule can be laid down as a general proposition in defining fraud, as it includes surprise, trickery, cunning and unfair ways by which another is cheated. The only boundaries defining it are those which limit human knavery.”

The above dictionary definition of fraud shows that fraud is a deceptive act with following elements; A representationabout a material point which is false and intentionally or recklessly so which is believed and acted upon by the victim to the victim’s damage.

The question now is, what are the roles of auditors and auditing in the quest to reduce information risks and the incidence of fraud?

Before I go on answering this question, I will like to point out one regrettable fact about ‘traditional auditing’ – the continuous widening ‘audit expectation gap’. Expectation gap is a term used to describe the gap between what people expects from audit and what audit is actually doing, which is to express professional opinion and to lend credibility to piece of information.

This has however slightly changed. Hence, this article

AUDITING AND AUDITORS ROLE

  • Fraud fighting/fraud fighters.

Fraud on the news has become rampant this days and a lot of calls have been made on authorities to re-write accounting and auditing curricular so that auditors will be well prepared to fight the fraud that is threatening to take over the business community.

There are skills that auditors need to acquire in other to be prepared for this enormous challenge.

Some of them are; analytical skills, communication skills, technology skills, proper understanding of accounting and business, a well honed ability to speak and understand foreign language, a working knowledge of civil and criminal laws, criminology, privacy issues, employee right, computer forensic tools, fraud statues and other fraud related issues.

This may however seem not going to be easy at first but is highly achievable. The above skills if acquired will place an auditor in a better position to meet the challenge of the new and ever changing business environment.

  • INFORMATION SECURITY OFFICERS

Accountants and Auditors are now called information professionals. This is to reflect the new role that accountants and auditors play in modern day business community. And as information professionals, there are skills that are indispensable for auditors to meet the requirement of this new role.

Some of such skills are; networking skills, a little programming skill, database management skills, use of basic security technology (VPN, Firewalls, IDS, Access control, etc)

  • SYSTEMS CONSULTANTS.

As business becomes more complex, the need for people with the ability and skill to develop and analyse systems become even more important. It is a known fact that those that commit fraud are people that have good knowledge of systems and how it works.

  • BUSINESS ADVISORS.

Business will definitely be better off if those that advise the business managers are themselves knowledgeable about business. Some business skills are a must for an auditor.

Wow! This is quite a lot of challenge that the new business world has given to the auditors and auditing as a profession. Well, if that is what is needed to restore the lost glory of Accounting as a profession, why not auditors face it squarely?

I have a blog post on auditing for information security loopholes you can check it out

Comments

    0 of 8192 characters used
    Post Comment

    • lions44 profile image

      CJ Kelly 

      4 years ago from Auburn, WA

      Great article. Being in the industry, I sometimes forgot what a wide array of opportunities exist for us. Thx. Voted up.

    working

    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://hubpages.com/privacy-policy#gdpr

    Show Details
    Necessary
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
    Features
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Marketing
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Statistics
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)