Dokumen - Pub Internal Auditing An Integrated Approach Third Edition
Dokumen - Pub Internal Auditing An Integrated Approach Third Edition
Internal auditing
Third edition
Third edition
Internal
auditing
An Integrated Approach
Internal Auditing – An Integrated Approach 3e covers the basic concepts, philosophy and principles
underlying the practice of Internal Auditing, and the relationships between the internal auditor,
management and the external auditor.
This updated edition is recommended for students of Internal Auditing preparing for BCom, BCom Hons
and BTech examinations and for the professional CIA examination of the Institute of Internal Auditors
Inc. It is also suitable for internal and external auditors employed in internal departments or professional
practices providing outsourced internal audit or management assurance services, as well as senior
financial personnel responsible for corporate governance, risk management and internal controls. It will
also be of interest to Chartered Accountants with a specialist interest in governance and control issues.
Richard Cascarino
• The “Cube” approach to risk assessment
Richard Cascarino
• ERM and Internal Audit
• Auditing Business Process Cycles
• Auditing Business Environments
• Current and emerging technology issues for internal auditors.
Internal
About the author
Third edition
Richard Cascarino is CEO of Richard Cascarino & Associates, a successful audit consulting and training
company based in Johannesburg, SA and Denver, USA. He has been involved in the development of
courses in Internal Auditing, IT Auditing and Governance for the School of Accountancy, University of
the Witwatersrand, Johannesburg. His books are used at universities worldwide and serve as reference
auditing
guides for Internal, IT and Forensic auditors. He is chairman of the Audit and Risk Committee of the
Department of Public Enterprises in South Africa.
Student Support
This book comes with the following online resources accessible from the resource page on the
Juta Academic website:
• Access to a demo version of IDEA® data analysis software
• Exam and study skills.
Third edition
All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means,
electronic or mechanical, including photocopying, recording, or any information storage or retrieval system, without
prior permission in writing from the publisher. Subject to any applicable licensing terms and conditions in the case of
electronically supplied publications, a person may engage in fair dealing with a copy of this publication for his or her
personal or private use, or his or her research or private study. See Section 12(1)(a) of the Copyright Act 98 of 1978.
The author and the publisher believe on the strength of due diligence exercised that this work does not contain any
material that is the subject of copyright held by another person. In the alternative, they believe that any protected
pre-existing material that may be comprised in it has been used with appropriate authority or has been used in
circumstances that make such use permissible under the law.
Contents
Preface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii
The Author . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv
Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv
Employee Ethics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Codes of Conduct. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Corporate Ethical Practices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
The Free Market and the Marxist Critique of The Free Market System. . . . . . . . . 28
Corporate Morality. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Ethical Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Resolving Ethical Conflicts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
The Role of Ethics in Distinguishing a Profession . . . . . . . . . . . . . . . . . . . . . . . . 33
Independence and Objectivity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
iv
Chapter 9: Communication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Learning objectives. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
The Elements of Communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Communication at Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Barriers to Communications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Overcoming the Barriers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Written Communications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Verbal and Non-verbal Communications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
vi
vii
viii
ix
Appendices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357
Appendix A Internal Auditors’ Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359
Appendix B Sample Audit Committee Charter. . . . . . . . . . . . . . . . . . . . . . . . . 360
Appendix C Sample Internal Audit Charter . . . . . . . . . . . . . . . . . . . . . . . . . . . 362
Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405
xi
The capital markets rocked with recent corporate scandals and business failures
are demanding sound corporate governance from corporations and those charged
with governance of public listed companies, financial services entities, large non-
governmental organizations and the public sector. Investor confidence has been
severely eroded by these events and the tangled web of multiple stakeholders
involved. It is in this context that the role of the internal auditor has come to the fore,
able to provide support to management in meeting its responsibilities for responsible,
accountable and transparent governance and risk management.
To restore public confidence in the governance processes, government regulations
have become more stringent, and corporate governance reports recommending
changes all include requirements for greater involvement by internal audit and an
enhanced role for audit committees. Auditing standards governing the external
auditors have become more demanding and legislation such as the Sarbanes-
Oxley Act in the United Stated reaches across the world in demanding evidence of
compliance from US listed companies and their affiliates anywhere in the world. The
internal auditor has an important role to play in this process, whether employed by
the organization or providing outsourced internal audit assurance services.
The Institute of Internal Auditors believes that organizations are best served by a
fully resourced and professionally competent internal auditing staff providing value-
added services which are critical to the efficient and effective management of an
organization.
This book addresses the area of professional competence within internal auditing
staff.
The text is designed primarily for lecturers and students of Internal Auditing at
an undergraduate and post-graduate level, intending to pursue a career in internal
auditing, as well as those with a specialist interest in governance, risk and control
issues for organizations. The basic concepts, philosophy and principles underlying
the practice of internal auditing, including the relationships between the internal
auditor, management and the external auditor are covered in the text.
In addition, the student will gain a knowledge and understanding of the nature
of an organization as well as risk management and the role of internal auditing in
managing organizational risks and understanding current developments in corporate
governance in both the public and private sectors.
The text will also prove an invaluable aid to those studying for the Certified Internal
Auditor professional qualification since it addresses the syllabus requirements of
the Institute of Internal Auditors and the Standards for the Professional Practice of
Internal Auditing and Competency Framework for Internal Auditors. Access to the
IDEA® data analysis software with the educational case study is an added bonus,
exposing students to a hands-on application of CAATs.
xiii
Acknowledgements
This textbook is the third edition of a book which was originally a dream that I had
for many years, and that Sandy van Esch had co-authored in its first edition. Without
Sandy’s encouragement there would have been no book.
There had been a demand for many years for an affordable internal auditing
textbook for students at universities and universities of technology in southern Africa
that incorporates local laws and regulations affecting the internal audit practitioner
in this region, while at the same time preparing students for the professional,
international CIA examinations. I hope that the text will go some way to address
these demands.
I wish to thank sincerely all those who contributed to the text along the way and
helped ensure that it reflects current practice, and for permissions granted to use
copyright material.
In particular my thanks go to:
➤➤ Margaret Cascarino and my family for their support.
➤➤ CaseWare International for permission to add the educational version of IDEA© as
downloadable with this book.
My sincere appreciation as well to the editorial and production team at Juta Academic.
Learning objectives
After studying this chapter, you should be able to:
➤ Outline briefly the origins and history of internal auditing
➤ Explain the development of the internal auditing profession in South Africa
➤ Explain the emerging role of internal auditing
➤ Explain the different responsibilities of an internal auditor
➤ Define the contents of an internal audit charter
This situation continued into the mid-1950s, with the two institutes dominat-
ing the business world in those countries and becoming an increasingly integrated
part of corporate life, to the extent that almost half of all qualified professional
accountants were employed outside audit firms.
By the start of the 1940s, professional internal control evaluators were employed
and distributed throughout organizations to such an extent that the differentiation
between internal and external auditors became a meaningful concept.
The statutory role of the external auditor has remained as the attest function,
confirming that the financial records of organizations have been fairly presented. The
role of the internal auditor has developed over the past 70 years to one of assisting
management in the discharge of their responsibilities by ensuring that the internal
control structures are appropriate to a given level of risk and function, as manage-
ment intended. Increasingly, internal auditors are called upon to act as internal
control, risk and corporate governance consultants within organizations.
Internal Auditing
Internal auditing has been defined by the IIA as follows:
‘Internal Auditing is an independent, objective assurance and consulting activ-
ity designed to add value and improve an organization‘s operations. It helps
an organization accomplish its objectives by bringing a systematic, disciplined
approach to evaluate and improve the effectiveness of risk management, con-
trol, and governance processes.
Independence is established by the organizational and reporting structure.
Objectivity is achieved by an appropriate mind-set. The internal audit activity
evaluates risk exposures relating to the organization‘s governance, operations
and information systems, in relation to:
➤ effectiveness and efficiency of operations;
➤ reliability and integrity of financial and operational information;
➤ safeguarding of assets;
➤ compliance with laws, regulations, and contracts.’ 2
1. www.theiia.org.
2. www.theiia.org.
What is Management?
Management can be defined as the optimization of the utilization of corporate
resources through the planning, organizing, leading and controlling of the members
of any organization. It is a process of continuous improvement in which the business
itself is constantly adapting to its environment, and management is changing in the
same way.
Establishing needs
Once an auditor has established the overall objectives and environment of the
business, he/she must decide on its overall needs. A study of the organization‘s
mission statement should clarify the general performance objectives. Management
should have established strategic plans and objectives in order to ensure that the
general performance objectives are achieved. By interviewing executive manage-
ment, employees, and perhaps even customers and suppliers, the auditor can
determine what the business needs to successfully accomplish the objectives.
➤ shareholders;
➤ management; and
➤ the board of directors.
Whilst internal audit charters have a common approach and structure, the details
of each individual charter must be uniquely formulated to meet the needs of a
given organization. Its function is to lay down the relationship and responsibilities
that should exist among the chief executive, the head of internal audit and the line
managers.
The chief executive should take a close interest in the drafting of the charter, since
it is a definition of the terms of reference for the head of internal audit. If these are
defined, they will provide top management with a reliable way of measuring the reli-
ability and quality of internal control within an organization. They also act as a point
of reference when internal audit‘s structure, plans or reports are being reviewed.
For the head of internal auditor, the charter provides an essential foundation con-
taining absolute directives and objectives that must always be kept in view. These
facilitate the drafting of job specifications and descriptions, as well as internal audit
manuals and audit plans.
To the main body of organizational managers, the charter indicates the level of
authority to act delegated to the head of internal audit in reviewing each of their
systems of internal control. They will, correctly, expect to see constraints within the
body of the document that preserve their rights as decision makers.
Content
The head of internal audit usually selects the form, content and wording of the
charter. These will be influenced by internal audit standards and should encourage
best professional practice. Both the chief executive and the chairman of the audit
committee will normally sign the charter (Appendix C contains a sample internal
audit charter).
10
➤➤ the adequacy of resources, skill levels, and budget to ensure the work plan is
achievable within the appropriate time; and
➤➤ the selection of internal audit projects, adequacy of performance and
appropriateness of recommendations.
The CAE needs to be up to date on appropriate governance best practices and trends
for the area within which the organization operates as well as its market sector. There
will always be a need to remain current on emerging issues and the audit committee
will seek reassurance in this area.
The audit committee also needs assurance that the internal auditors understand
the overall corporate strategy and have sufficient professional judgement to identify
all forms of risk at an early enough opportunity to facilitate management intervention
where appropriate. In order for the audit committee to be appropriately assured,
performance assessment of both the CAE and internal audit will be required.
Independence
The audit committee relies heavily on the internal audit function to provide objective
opinions, information and, when necessary, education to the audit committee while
the audit committee in turn will provide oversight and validation to the internal audit
function. In today’s environment this could include the outsourcing or co-sourcing of
all or part of the internal audit function but the audit committee should ensure that
the role of the chief audit executive remains within the organization itself.
As part of the audit committee’s responsibility for ensuring the independence
of internal audit, the audit committee is responsible for providing input into the
appointment, dismissal, evaluation, compensation, and succession planning of the
chief audit executive. This is a critical activity of the audit committee since the CAE
will, of neccessity, have a high degree of interaction with the audit committee. The
committee will typically seek to ensure that candidates for a CAE position have
distinguished themselves professionally. They would normally have an advanced
degree, the appropriate professional designation, and several years’ experience in
an audit supervisory role.
The committee is also responsible for ensuring that a continuous quality
assurance (QA) program within internal audit exists and that full disclosure of the
results be made to the audit committee, in order to give the audit committee assurance
that the work of the internal audit function is being conducted to internationally
accepted standards. The CAE is functionally required to ensure quality on an ongoing
basis. This may include benchmarking to develop an internal auditor scorecard for the
audit committee to use for assessing the performance of the internal audit function.
An objective and independent evaluation would, nevertheless, include such areas
as audit scope and coverage (including financial, compliance, operational, IT, and
fraud auditing), audit capabilities, independence, objectivity, supervision and project
quality control.
The Standards for the Professional Practice of Internal Auditing©3 promulgated
by the Institute of Internal Auditors requires that an external Quality Assurance
Review (QAR), performed by appropriately qualified reviewers and carried out to
professional standards, be conducted every five years.
11
4. Available from the Institute of Internal Auditors – The Three Lines of Defense in Effective Risk Management.
https://na.theiia.org/standards-guidance/Public%20Documents/PP%20The%20Three%20Lines%20
of%20Defense%20in%20Effective%20Risk%20Management%20and%20Control.pdf
12
The traditional audit role of independent adviser on value preservation through the
application of effective and efficient internal control structures, moves to a role
including the strategic issues leading the business and the improvement of value-
creation by supporting risk management across the organization. Overall, the range
of activities being performed by internal audit is increasingly trending towards an
advisory role and support for strategic initiatives.
In addition, the recognition that the overall Governance Risk and Compliance
activities are intrinsically interconnected and rely on common information sources,
technology and processes has meant the internal audit must, itself, morph into an
integrated discipline leveraging the insider knowledge of the organizational processes
and environment.
This means that internal audit has to comprehensively understand the stresses
operating on the business through the use of the appropriate data analytical tools
and methodologies. Internal audit is increasingly moving towards development of
improved skilled resources in order to achieve the data analytical capabilities required.
Overall, this means that internal audit must strike a balance between the assurance
and advisory functionality. Internationally, internal audit is seen to be playing a more
prominent role in strategic initiatives such as the implementation of major capital
projects and critical IT systems implementation. The strengthening of internal controls
in order to prevent fraud and corruption continue to be an imperative with particular
reference to the corporate needs to reduce costs overall.
In order to maximize benefits, an improved integration of internal audit with other
corporate risk interventions is required to avoid duplication of efforts. In small-to-
medium sized companies, internal audit is seen to play a pivotal role within ERM and
in some cases actually administer the programs.
13
Origins
In 1978, the IIA introduced the Standards for the Professional Practice of Internal
Auditing to be used around the world in order to provide international consis-
tency and as a measurement tool for audit quality assurance. These consisted of
five general and 25 specific Standards, together with numerous Statements on
Auditing Standards. The Standards are considered mandatory, while non-mandatory
GuideIines are also included.
The IIA Standards were intended to establish a yardstick for consistent measure-
ment of internal auditing operations. This allowed the unification of internal auditing
worldwide by improving internal audit practice; proclaiming the role, scope, per-
formance and objectives of internal auditing; promoting the recognition of internal
auditing as a profession; and promoting responsibility within the internal auditing
profession.
As part of its ongoing research into the evolving role of internal auditing, the IIA
undertook an extensive research project known as the Competency Framework for
Internal Auditing (CFIA). It was intended to update the common body of knowledge
(CBOK) expected from a professional internal auditor.
The CFIA included not only the competencies needed by auditors, but also how
these competencies would be assessed. Based on this research, the IIA brought
together an international group of audit professionals, the Guidance Task Force
(GTF), to formulate a guidance framework for the future.
This resulted in the Professional Practices Framework, which comprises manda-
tory, advisory and practical guidance in the forms of the Standards for the
Professional Practice of Internal Auditing, Practice Advisories, and Development and
Practice Aids, respectively.
In January 2002, the IIA adopted revised standards. Included within these revi-
sions is the new definition of internal auditing:
Mandatory
IIA Practice Advisory 1300-1: Internal Audit Quality Assurance and Improvement
Program, requires the following:
‘The Chief Audit Executive (CAE) is responsible for establishing an internal audit activity
whose scope of work includes all the activities in the Standards and in The IIA’s
definition of internal auditing’ (Introduction, p. 3).
Compliance with both the IIA’s Code of Ethics (Appendix A) and the Standards is
mandatory. All mandatory statements are first promulgated for discussion by the
entire profession through the issuing of exposure drafts. The individual internal
auditor or internal audit practitioner, and an internal audit function or department
in an organization will consider compliance with the IIA Standards essential for the
delivery of professional services.
Advisory
The Guidelines were replaced with Practice Advisories representing the best
approaches to implementation of the Standards. Essentially, the Practice Advisories
are designed to assist an auditor by interpreting the Standards in a variety of inter-
nal auditing environments. Practice Advisories will continue to be issued from time
to time, both as general aids and to meet specialized needs within a given industry,
geographic location or audit speciality.
An example of these requirements is contained in IIA Practice Advisory 1210-1:
Proficiency, which requires the following of an internal auditor:
Aids
The IIA has also developed or endorsed Development and Practice Aids. These
include educational products, research studies, seminars, conferences and other
aids related to the professional practice of internal auditing. These are not intended
to be either compulsory, as are the Standards, or advisory, as are the Practice
Advisories. They are intended solely to assist in the development of internal audit
staff by introducing them to techniques and processes developed by a variety of
experts in their fields.
15
Attribute Standards
These address the attributes of organizations and individuals performing internal
audit services, and apply to all internal audit services.
Performance Standards
These describe the nature of internal audit services provided and give quality crite-
ria against which the performance of these services can be measured.
Implementation Standards
These prescribe standards applicable in specific types of engagements in a variety
of industries, as well as specialist areas of service delivery.
The Standards for the Professional Practice of Internal Auditing, a list of the
current Practice Advisories are downloadable (see Appendix A).
16
17
18
Learning objectives
After studying this chapter, you should be able to:
➤ Outline briefly the need for quality reviews of the internal audit function
➤ Differentiate between internal and external reviews
➤ Identify acceptable external reviewers
➤ Describe the process for conducting an internal review
➤ Define the relationship between the IIA Standards and other standards bodies
In the modern world, the extremely low tolerance of failure of technical devices
such as nuclear power plants, or process such as life-saving operations has created
extremely refined approaches to Quality Assurance. Total Quality Control was the
revolutionary concept outlined in Feigenbaum’s book, Quality Control: Principles,
Practice, and Administration,6 and nowadays is taken to consist of 4 major focuses:
➤ continuous process improvement, to make processes visible, repeatable and
measureable;
➤ the intangible effects on processes and ways to optimize or reduce their effects;
➤ examining the way the user applies the product can lead to improvement in
the product itself; and
➤ broadening management concern beyond the immediate product.
Today, internal audit functions are increasingly under pressure to provide value.
Senior management and audit committees expect the internal audit function to be
composed of an informed, experienced and objective team of well-qualified individu-
als. Unfortunately, all internal audit functions are not created equal. Frederick Taylor
(1919) said as much nearly 100 years ago.
‘Among the various methods and implements used in each element of each trade there
is always one method and one implement which is quicker and
better than any of the rest.’ 7
6. F eigenbaum, A.V. 1951. Quality Control Principles, Practice and Administration. New York: McGraw-
Hill.
7. Taylor, F. 1919. The Principles of Scientific Management. New York: Harper & Brothers Publishers.
As such, many internal audit departments seek assurance of the professional qual-
ity of their work. They can obtain this through the performance of quality assurance
reviews or reviews of best practices for the internal audit function.
Quality Assurance Reviews (QARs) provide timely, independent and objective
reviews of Internal Audit Functions, their audits and their difficulties, including, but
not limited to, an assessment of the quality of deliverables
QARs serve the wider corporate interest of assuring the adequacy and effective-
ness of the internal audit function. To that end, QARs provide a common source of
reliable information to those charged with the oversight of internal audit.
Within Standard 1310, the IIA recommends the assessment of the quality of the
IA department through either an internal or external review.
The quality assurance review evaluates the degree to which the internal audit
department conforms to the IIA Standards and its own charter, plans, policies, pro-
cedures and systems; and the extent to which it meets the needs of its customers.
External reviews are needed every five years in order to independently appraise the
internal audit department’s operations. They should be conducted by qualified people
who are independent of the organization and who do not have a conflict of interest,
either real or apparent. QA professionals provide ongoing advice, counsel and recom-
mendations to internal audit, the Audit Committee and/or executive management.
The content of formal QA reports is consistent and provided in a timely manner to all
key decision-makers as defined under their scope of work, including normally internal
audit management, executive management and the audit committee. In addition to
external reviews, internal quality assurance reviews should be conducted annually
by members of the internal audit staff. This is a control self-assessment in order to
assess the ongoing quality of the audit work that is being performed.
The standard IIA quality assurance review methodology allows the review team
to assess:
➤ deviations in performance from acknowledged best practices for internal
auditing, from IIA Standards, and from the internally prescribed internal audit
func-tion procedures; and
➤ the operation of the internal auditing function as perceived by the internal
audit function’s members and customers.
The review team should also evaluate other issues that affect the internal audit
function, including:
➤ the integration of the concepts of business controls into the internal audit practice;
➤ the adding of value to the organization by providing insights into efficiency and
effectiveness;
➤ the optimization of internal audit staff performance;
➤ the effectiveness of communication with staff and company personnel;
➤ the development of internal audit staff, both personally and professionally;
➤ the use of technology to increase efficiency and effectiveness; and
➤ the effectiveness of ongoing internal quality assurance programs.
20
In order to evaluate the process against the IIA Standards, the quality assurance
review team needs a comprehensive understanding of the internal audit process
implemented within the organization. The team should also be up-to-date with the
latest of the IIA’s Practice Advisories in order to make acceptable recommendations
for improving the existing process.
21
Ongoing Improvement
The Japanese word kaizen has become popular in today’s organizational language
and stresses the importance of efforts to constantly improve. This concept is the
antithesis of commonly accepted notions of best practice. Some organizations con-
sider that, having adopted Best Practice in their Internal Audit processes, further
improvement is no longer a priority. Best Practice is a moving target involving the
definition of methods used to get things done and the benefits often include the
assurance of quality results and consistency when the process is followed.
As part of providing an effective service, ongoing quality improvement should
focus on the overall objective of the audit process, namely the achievement of maxi-
mum customer satisfaction. This can be done by developing an understanding of all
stakeholders’ needs and by attempting to exceed their expectations continuously.
Constant simplification and improvement of the effectiveness of the internal audit
processes will result in more efficient service delivery.
As part of ongoing supervision and the management process, an internal audit
should evaluate the degree to which it meets its stakeholders’ expectations.
Follow-up
As with any audit, the recommendations resulting from the quality assurance review
are of little value if they are not effectively implemented. The quality assurance
review team, together with the audit committee, must establish a clear follow-up
process to make sure that the action plan is implemented and effective.
22
Business Ethics
An understanding of business ethics is relevant for an internal auditor, who will
encounter ethical issues and dilemmas in his/her daily interaction with manage-
ment and auditees in an organization, and in the organization’s interaction with the
public sector, its employees, its customers, its suppliers and the community within
which it operates. Therefore, before briefly examining the underlying ethical theo-
ries that have evolved over the centuries, it is useful to understand that the gen-
eral areas of economic activity where management makes decisions often present
tensions between ethical and legal choices. Rossouw8 identifies three main areas:
➤ the macro- or systemic dimension, consisting of the policy framework created
by the state, which determines the basis for economic exchanges both nation-
ally and internationally;
➤ the meso- or institutional dimension, consisting of the relations among
economic organizations, such as public sector entities, private sector entities,
private individuals and those outside the organizations; and
➤ the micro- or intraorganizational dimension, consisting of the economic actions
and decisions of individuals within an organization.
Rossouw9 also uses the example of affirmative action in South Africa to demon-
strate how these three dimensions may be interrelated. Affirmative action has
become a strategic objective for government’s macroeconomic policy, as indicated
by the passing of enabling legislation, such as the Employment Equity Act No. 55
of 1998 and the Skills Development Act No. 97 of 1998. A private institution may
decide to participate in community upliftment programs in education or in support
of AIDS sufferers and orphans in previously disadvantaged communities to demon-
strate its commitment to corporate social responsibility. Within an organization, the
8. Rossouw, D. 2002. Business Ethics in Africa. 2nd ed. Cape Town: Oxford University Press,
Southern Africa.
9. Ibid., pp. 2–3.
implementation of affirmative action policies may give rise to conflicts in staff appoint-
ments and efforts to meet demographic quotas in staff recruitment policies.
Ethical Theories
Ethics are often confused with individual moral principles, but in fact go far beyond
them. They are designed to address issues from both practical and idealistic
standpoints, as a result of which the ideal may frequently be in conflict with the
practical. Ethics have thus been described as being ‘above the law but below the
ideal’.10
10. Kell W.G & Ziegler R.E. 1980. Modern Auditing. Boston: Warren Gordon & Lamont. p. 769.
11. Wheelwright, P. 1959. A Critical Introduction to Ethics. 3rd ed. New York: Odyssey Press. p. 4.
12. Kant, I. 1923. Fundamental Principles of the Metaphysics of Morals. 9th ed. New York: Longmans/
Green.
24
able’ to lie, cheat and steal as long as the organization benefits. Loyalty to
the cause or organization subordinates an individual’s sense of ethical behav-
ior. In this ethical system, consistency is a major requirement.
➤ Ethical theoreticians such as Plato, Aristotle and Adam Smith have espoused
classical theories of business ethics. Under classical theory, business has no
relationship to societal goals and social objectives.
➤ This philosophy has been modified over the years to show business as being
bent on achieving egotistical goals by following established rules for the benefit
of all. In this ethical system, business is seen to have distinct social responsibili-
ties. This view is held by moralists who believe that business should have spe-
cial (community) goals outside of its normal ones of survival and making profits.
This gives rise to Kant’s view of business as a good citizen.
A Conceptual Framework
Business executives are faced on a daily basis with the challenges of making ethical
decisions in complex competitive business environments with multiple goals and
objectives; cultural contradictions; changing regulatory environments; and pressure
for sustainability, accountability and transparency in their actions and decisions.
Public scrutiny of an organization’s activities is heightened especially where environ-
mental implications arise.
Given the dynamic and constantly changing regulatory environment in which busi-
ness operates on a global basis, decisions made by management could affect any
and all of these quadrants.
An internal auditor’s function may include auditing compliance with organization-
al values and regulatory requirements or assessing the effectiveness of processes
to accommodate ethical values. It may also include identifying and assessing fraud
arising from management decisions falling into Quadrant IV.
13. Chryssides, G. & Kaler, J. 2002. An Introduction to Business Ethics. London: Thomson Learning.
p. 56.
25
Codification
– Decisions
Manifestation
Corporate
Illegal Decisions Legal
Public
Scrutiny
Employee Ethics
Employees themselves have specific ethical obligations to comply with, including
those discussed below.
26
Codes of Conduct
One of the common controls in this area is the implementation of a corporate code
of conduct. Such codes are directive controls and do not, in themselves, enforce
‘ethical’ behavior. Where they are combined with detective controls designed to
identify breaches of the code and corrective controls designed to take effective
action where such breaches are identified, they may serve as a means of expelling
non-conforming members of a population.
Codes of conduct should be in place for all companies (as recommended in 1987
by the Treadway Commission and confirmed by King II14) and should be enforced.
They help to set an ethical tone at the top of the organization and must apply
to all levels from the top down. They open channels of communication between
management and employees and help prevent, for example, fraudulent reporting.
Gifts
Corporate positions on gifts to employees are generally determined by the degree to
which employees will be influenced or will be assumed to be influenced by such gifts.
Most companies have strict prohibitions on the receiving of gifts as such. Loans to
corporate officers are assumed to have bought influence, and entertainment accepted
that is on a lavish scale is also usually considered to be inappropriate.
Certain low-value gifts may be acceptable to the organization and these would
typically include normal business lunches, gifts of nominal value and normal promo-
tional gifts. A common measurement criterion for the value of gifts is whether the
gift was freely available or whether it was given only to selected people because of
their positions. The fundamental test applied is normally: Will employee actions or
decisions be affected by receipt of the gift?
Confidentiality
All information obtained in the course of employment is considered to be confiden-
tial. This means such information may not be privately used for the employee's or
14. Treadway, J. C. Jr et al. 1987. Report of the National Commission on Fraudulent Financial
Reporting, New York: National Commission on Fraudulent Financial Reporting; and Institute of
Directors (IOD). 2002.The King Report on Corporate Governance for South Africa, Johannesburg:
IOD.
27
for another's gain. Even without such gain, it must not be used to the company's
detriment. This includes divulging it to outsiders without authority.
Conflicts of Interest
In order to prevent conflicts of interest, employees must have no direct interest
in suppliers, customers or competitors. Also, there must be no indirect interest in
organizations dealing with the company, or in organizations where a relative has
an interest. No holding of public office should exist where a conflict of interest may
exist or be deemed to exist. For example, public sector entities have stringent regu-
lations laid down in the Public Finance Management Act and regulations to prevent
abuses of authority in tender practices and the awarding of contracts to related par-
ties. Instances of these are often reported in the media, eg infringements of tender
processes at hospitals in Mpumalanga, where contracts for the supply of expen-
sive medical equipment were awarded to close family members of senior hospital
administrators.
Ultimately, ethical standards are set by example and stem from the top of the orga-
nization. Good or bad, they devolve all the way down and affect all employees. They
may be blocked at any level by the active or passive actions of management.
The Free Market and the Marxist Critique of the Free Market System
A Free Market is a term used to describe a political or ideological perspective on policy
rather than an economic description. It may be defined as a market economy based
primarily on supply and demand and one in which government exercises little or no
control. In its purest form, a completely free market would be one in which buyers
28
and sellers can voluntarily agree to trade freely based upon mutual agreements on
price with no state intervention in the form of regulations, taxes or subsidies. Trade
is entered into without coercion and pricing structures are taken to be the results of
buying and selling decisions governed by the effects of supply and demand. Demand
is taken to be the pressure placed upon the market by those attempting to buy
specific goods, labor and services. Within this, sellers will operate a minimum price at
which they are prepared to deliver goods, labor and services while buyers will have
a maximum price which they are prepared to pay for such goods, labor and services.
The point at which these two intersect is known as equilibrium price which is taken to
be the point at which both buyers and sellers are satisfied as to the acceptability of
the trade.
In such a market, buyers and sellers are free to participate in the market, enter or
leave it at their discretion.
Each exchange would take the form of a voluntary agreement between two parties
to trade in goods or services. No restrictions would exist to prevent new competitors
from entering a market and no controls would exist other than the enforcement of
private contracts and such controls as are necessary to regulate the ownership of
property. In common parlance, this term is used to imply that the overall means of
production is under private control rather than state control.
In practice, the completely free market is impractical and probably impossible.
In most countries pressures, both social and political, mean that governments will
intervene in a variety of ways such as erection of price controls, subsidy of production,
introduction of minimum wages and other such interventions.
Regulated or controlled markets are those in which governments intervened to
actively regulate prices as well as supplies in either an indirect or direct manner. If this
intervention is substantial, the market may be classed as a mixed economy. Should
this intervention take the form of direct control in order to achieve specific goals, the
market is generally classed as a command economy.
In looking at the development of global economies, regard must be given to the
critique of capitalism by Karl Marx.15 Based upon his fundamental belief that capitalism
was morally exploitative, Marx was highly critical of the economic philosophies and
assumptions of his day such as those espoused by Adam Smith16 which saw the
acquisition of private property as being the driver motivating people to produce
wealth. One of the underlying fundamentals of capitalism is the concept of private
property which was seen by Marx to be primarily sustained by the power of the state.
This, according to Marx, resulted in one person’s ownership of an object denying its
benefits to another thus creating conflict over resources.
When this concept is applied to labor, the logical conclusion is that labor is reduced
to mere commodity and becomes alienated from those who own the results of such
labor. This concept of alienated labor was fundamental to his understanding of the
history and impact of the class struggle. This he defined as the division between the
bourgeoisie who owned a means of production and the proletariat who, as laborers,
had to sell themselves as a commodity. Under such a system, Marx believed,
15. Shumpeter, Joseph. 1952. 10 Great Economists: from Marx to Keynes. Taylor and Francis Group,
Unwin University Books, Edition 4, Vol 26.
16. Adam Smith, An Enquiry into the Nature and Causes of the Wealth of Nations. Project Gutenberg ebook.
http://www.gutenberg.org/files/3300/3300-h/3300-h.htm
29
irreconcilable conflict could be the only result since labor was the only real source of
wealth and all capital assets were simply the result of stored labor.
Of recent years, Marx’s belief in the labor theory of value has come into conflict with
the concept of automated labor. His argument that only humans can add value to raw
materials conflicts with today’s understanding that automated process with minimal
human intervention can be an effective way to improve the lot of the population as
a whole and that labor without direction can be totally ineffective. In addition, the
emergence of trade unions in the twentieth century as a significant party in economic
and political negotiations has changed the nature of the capitalist society. Many
countries class antagonism as described by Marx as having largely been replaced by
neo-liberalism.
Corporate Morality
Generally, corporate morality is taken to mean conformance to a recognized system
of rules for code regarding right and wrong and the degree of acceptable behavior.
Morality itself derives from the Latin word mores meaning habits. In sociology, the
term refers to norms which are generally acceptable within a given society and are
held to have more moral significance.
Business morality may then be seen as deriving from the ethical and moral
standards of the individual in the context of the political and cultural environment
encompassing the organization itself.
Johnson, Scholes and Whittington in their book Exploring Corporate Strategy17,
indicate that the organization purposes of a given entity are detailed within the
corporate values, mission and objectives. These, in turn, are derived with input from
the corporate governance beliefs, the business ethics in place, the stakeholders
served and the cultural context within which purposes are prioritized. They also draw
attention to issues affecting corporate morality such as:
➤➤ the moralities of marketing and markets;
➤➤ moral issues within employment practices;
➤➤ respect for human rights;
➤➤ moral issues regarding the environment;
➤➤ product safety;
➤➤ fairness of dealing with suppliers and customers; and
➤➤ corporate support for communities.
This, then, leads corporate morality in the direction of corporate social responsibility
where, from a non-altruistic perspective, commercial success may be seen to be
dependent upon showing the highest levels of good citizenship in the organization’s
behavior within the community, effectively migrating the organization from merely
its legal responsibilities through its ethical responsibilities into its voluntary
responsibilities. Corporate social responsibility invokes moral, ethical and philanthropic
responsibilities for organizations over and above their traditional responsibilities of
complying with the law while achieving a fair return on investment for shareholders.
17. Johnson, G., Scholes, K. & Whittington, R. 2008. Exploring Corporate Strategy. 8th ed. Prentice Hall:
New Jersey.
30
Ethical Management
In the traditional ‘classical’ economic model espoused by Adam Smith in the
eighteenth century, it was suggested that society’s needs could be accomplished
by individuals acting in a self-interested manner. This meant the delivering of goods
and services to meet the needs of others in a manner which would earn them profits.
Even at that stage it was recognized the marketplace participants must act honestly
and fairly towards each other in order to achieve a free market.
In the twentieth century regulations were enacted in many countries to rein in
the power of large corporations while the labor movement sought greater social
responsibility from corporate bodies. This is not to say that such concepts were
universally accepted. Many economists believed that it was not economically
feasible nor desirable for corporations to take on social and moral issues. It was
believed that assuming social responsibilities could place those corporations doing
so at a competitive disadvantage compared to those who did not undertake such
responsibilities. In some cases it is still believed that, lacking the knowledge and
skills required to deal with social issues, involvement at the corporate level may
exacerbate the problems found.
This view is contradicted by those believing that appropriate social involvement
can assist an organization to create an improved future operating environment with
long-term benefits to borrowing profitability.
A variation on the social involvement view is held by those advocating stakeholder
management as a corporate ethical position. Under this concept, taking into
consideration the legitimate interests and concerns of its own stakeholders can assist
the organization to enhance the ethics of this decision-making process. In this context,
stakeholder management goes beyond the convention definition of stakeholders as
owners, employees, customers, suppliers and government agencies to include all
groups or individuals who are impacted by, or can themselves influence, the products
and processes of the organization.
31
The first two options are not realistic, as they do not result in a solution acceptable
to the parties. Whereas the ethics theories presented earlier in this chapter gener-
ally focused on content (ie rights and wrongs), the purpose of the group decision-
making RIMS strategy is to structure a process that will result in morally sensitive
group discussions. RIMS is concerned with the structural features of the discussion
to reach a situation where all participants in the discourse are equal and all forms
of force or coercion are removed. Rossouw advocates four basic rules:
➤ ‘The only evidence that participants may introduce into the discourse is empiri-
cal experience which is objectively accessible.
➤ The process of communicative interaction is driven only by the force of the
strongest rational argument.
➤ Only those experiences, arguments and norms that can attain consensual
agreement are regarded as knowledge.
➤ Any knowledge formulated in this way is always open to future revision.’19
The RIMS strategy requires participation by stakeholders and the exercise of toler-
ance by all parties.
Thereafter, Rossouw suggests there are three basic steps to the RIMS process:
➤ ‘Step one: Generate and evaluate the arguments that satisfy the following
three criteria: The argument should take into consideration the interests of oth-
ers, as well as your own; it should be clear and intelligible; the facts should be
correct and logically coherent.
➤ Step two: Identify the implications – namely the positive and negative implica-
tions of the various arguments, rather than participants’ motives or moral con-
victions.
➤ Step three: Find solutions in a co-operative manner that will keep negative
implications to a minimum while retaining the positive aspects.’22
32
‘A code of ethics is necessary and appropriate for the profession of internal auditing,
founded as it is on the trust placed in its objective assurance about risk management,
control, and governance. The Institute's Code of Ethics extends beyond the definition
of internal auditing to include two essential components:
1. Principles that are relevant to the profession and practice of internal auditing;
2. Rules of Conduct that describe behavior norms expected of internal auditors. These
rules are an aid to interpreting the Principles into practical applications and are
intended to guide the ethical conduct of internal auditors.’
The IIA’s Code of Ethics, its Professional Practices Framework and other relevant
IIA pronouncements provide guidance to internal auditors serving others. ‘Internal
auditors’ are:
➤ IIA members;
➤ recipients of, or candidates for, IIA professional certifications; and
➤ those who provide internal auditing services within the definition of internal
auditing, including both individuals and entities that provide internal auditing
services.
33
➤ Integrity
The integrity of internal auditors establishes trust and thus provides the basis for
reliance on their judgment.
➤ Objectivity
Internal auditors should exhibit the highest level of professional objectivity in
gathering, evaluating and communicating information about the activity or process
they are examining. Internal auditors should make a balanced assessment of all the
relevant circumstances and should not be unduly influenced by their own interests
or by others in forming judgments.
➤ Confidentiality
Internal auditors respect the value and ownership of information they receive and
do not disclose information without appropriate authority, unless there is a legal
or professional obligation to do so.
➤ Competence
Internal auditors competently apply the knowledge, skills and experience needed
in the performance of internal auditing services.
34
Table 4.1 sets out the various IIA standards regarding independence and objec-
tivity and the related implementation guidance in the Practice Advisories:
IIA Related
Practice Advisory
IIA Standard (PA) Standard requirement
35
IIA Related
Practice Advisory
IIA Standard (PA) Standard requirement
36
Organizations satisfy a variety of needs, including, but not limited to, profit making
(usually for the benefit of the owners). Non-profit-making organizations also exist
and are designed to benefit the constituencies they serve. Most organizations are
geared to satisfy internal needs only.
In South Africa, business organizations may take several forms, which are briefly
discussed below.
Sole Proprietor
In this form of business operation, a single person wholly owns the business and it
operates to meet the needs of that person.
Partnership
This consists of two or more partners who agree to be jointly and severally liable
for the business affairs of the other partners. This form is generally restricted in the
number of partners, with the notable exception of external audit firms.
Private Company
In this formal organization, shares in a private company (designated by (Pty) Ltd),
are issued and ownership rests with the shareholders in proportion to the equity
they hold. Directors are appointed at general meetings by the shareholders, in
accordance with the articles of association of the company. Audited annual financial
statements are required by law to be presented to the shareholders at the annual
general meeting. Private companies, by their articles of association, restrict the right
to transfer their shares, which consequently may not be traded publicly on a securi-
ties exchange. There is a maximum of 50 shareholders and a minimum of one.
Incorporated Company
An incorporated company (designated by Inc.) is a form of private company that is
used by professionals such as accountants, engineers and architects to practice as
a legal entity. In terms of the Companies Act, the members must all be directors
and hold the relevant professional qualification, eg a registered auditor (RA), and
will continue to bear professional liability for the personal negligent performance
of members of the company.
38
Public Company
Companies are incorporated under the Companies Act of 1973 and must have a
minimum of seven shareholders, with no maximum.
Public companies have shares that may be owned by the general public. Where
the company is listed, for example on the Johannesburg Securities Exchange (JSE),
its shares are traded openly on the stock exchange. Subscriptions may be invited
from the public by means of a prospectus, and different classes of shares may be
issued.
Section 21 Company
Companies registered under section 21 of the Companies Act are not-for-profit organi-
zations. That is not to say that they do not trade at a profit, but the business intention
is not specifically to make profits, and tax is not payable. A Section 21 company may
not distribute profits to its members, but uses profits for the purpose for which the
entity was formed. The Institute of Internal Auditors (SA) is a Section 21 company, as
are many welfare organizations and NPOs (Non Profit Organizations) providing donor
funding to projects.
Public Entities
In addition to these various forms of private sector organizations, there are also
public sector utilities, parastatals and public entities. Public entities include govern-
ment organizations such as the Financial Services Board, the Department of Trade
and Industry, and municipalities, which are all governed by the Public Finance
Management Act. Public entities are audited by the auditor-general and are all
required by the Act to establish an audit committee and an internal audit function.
Other parastatals such as Eskom, Telkom, Transnet, the SA Airports Company and
Iscor are examples of large public entities providing strategic and infrastructure ser-
vices to South Africa and other countries.
The mission statement describes the fundamental reason that the organization or
function exists. The goals specify which results will further that mission, and strategic
interventions define the specific steps that must be taken to achieve these results.
39
➤ machines; and
➤ methodologies.
Performance Objectives
Operational auditors must have standards against which current operations can
be compared and evaluated. For financial auditing, the criteria for evaluating the
presentation of financial statements are generally accepted accounting principles.
But it is management's responsibility to develop and use appropriate standards to
evaluate operating activities. Operational auditors will usually start with criteria that
have been established by management (performance standards) or by some over-
sight board or agency.
In the absence of standards, operational auditors will have to borrow from other
sources or develop some type of criteria against which to compare performance.
This is often a difficult task, and auditors should get management's reaction to the
suitability of any criteria developed in this way. Reasonable criteria for evaluating
performance are absolutely essential for successful operational auditing, because
no evaluation of operations is possible without a standard for comparison. While
subjectivity cannot be completely avoided, objective criteria that are considered
appropriate and reasonable by both the internal auditors and auditees are neces-
sary for the process to be successful.
40
Performance Measurement
Performance measurement is a philosophy in which feedback is used to make ongo-
ing adjustments to the way in which an organization goes about achieving its vision.
For example, information from financial reports, client satisfaction feedback, and
feedback from programs and services may help the organization assess its effec-
tiveness in a variety of ways. Using this feedback, the organization can continue to
provide excellent programs and services in response to changes in both the internal
and external environments.
The process starts with the setting of business objectives and the development of
strategies and plans to achieve these objectives. This is followed by the development
of appropriate performance measures to assess progress towards the objectives.
Performance measurement systems provide the feedback information required
to assess whether executive management strategies have been effectively con-
verted into operational decisions.
Performance measurement is a balanced, methodical attempt to assess an
organization’s effectiveness in various terms – financial, client satisfaction, internal
business and innovation/learning.
41
Financial measures
This component traditionally deals with the measurement of the financial perfor-
mance of programs and services. The financial impact of programs and services
in the public service is normally measured through indicators such as actual ver-
sus budgeted revenue, actual versus budgeted expenditures, and achieving or
exceeding revenue projections.
Client satisfaction
This measures how effectively an organization's products and services satisfy client
needs. Examples of client satisfaction performance indicators in the public service
include the degree of service availability, prompt response to service requests, on-
time service delivery or ease of access to service providers.
42
Based on the results of the impact analysis, a pilot project may be started within one
of the service lines. This involves:
➤ building consensus on the long-term objectives of the pilot organizational unit;
➤ developing performance measurement architecture to assess the performance
of the organizational unit; and
➤ developing an implementation strategy to make the transition to a new perfor-
mance measurement environment.
43
reflect their expectations. Once agreed on, a working set of value drivers and a
concise, one-page scorecard can be created
A process for measuring what has been accomplished must be implemented in
order to gauge how successfully the value-enhancing actions were completed. Each
individual action step would need to have a complete set of success measures
attached to it.
To complete the process, a system for reporting results to key stakeholders must
be established. Communicating the results is a critical step in the scorecard pro-
cess. The balanced scorecard can then be fine-tuned to ensure that it accurately
matches evolving company priorities.
At the managerial level, management will become more effective if the company
strategy includes measurable goals that the company is trying to achieve and when
the measurement system encourages behavior that is good for the organization.
Integrated systems use measurement criteria such as money, units, time, feelings
and other expressions of actions and results. They are seen as discrete parts of a
single, overall depiction of all aspects of company activity. The measures that repre-
sent the performance of a particular unit of the organization reflect:
➤ the unit's performance;
➤ the connections between the unit and other organizational units;
➤ the connection between the unit and the organization as a whole;
➤ the quality concerns of production;
➤ the customer-satisfaction focus of sales and marketing; and
➤ the monetary discipline of accounting.
44
23. Canadian Institute of Chartered Accountants. 1995. Guidance on Control. Toronto: Canadian
Institute of Chartered Accountants.
45
➤ Monitoring and reporting quantify the extent to which key matters pertaining
to performance and organizational strengths are identified, reported and care-
fully monitored.
➤ Protection of assets evaluates the extent to which important assets such as
sources of supply, valuable property, key personnel, agreements and impor-
tant records or information are safeguarded so that the organization is pro-
tected from the danger of losses that could threaten its success, credibility,
continuity and perhaps its very existence.
Efficiency
This relates to the relationship between goods or services produced and the quanti-
ty of resources used to produce them. An efficient operation produces the maximum
output for any given set of resource inputs. Alternatively, it has minimum inputs for
any given level of goods or services produced.
Economy
This refers to the terms and conditions under which resources are acquired. An eco-
nomical operation procures an appropriate quantity of resources of an appropriate
quality at the lowest overall cost and at the right time.
46
Risk Assessment
Learning objectives
After studying this chapter, you should be able to:
➤ Explain the importance of risk management and internal control
➤ Define and discuss the nature and sources of risk to an organization
➤ Explain the methods used by an internal auditor to establish and document
the levels of inherent risk within an organization or a part of it
➤ Describe the role and limitations of internal controls in reducing risks to
acceptable levels
➤ Explain how an internal auditor evaluates the adequacy of the system of
internal controls
➤ Differentiate between the adequacy and the effectiveness of the control
structures
24. Bradshaw, W. & Willis, A. 1998. Learning about Risk: Choices, Connections and Competencies.
Toronto: Canadian Institute for Chartered Accountants.
There are three types of risk that are normally considered when using a risk-based
audit approach. They are inherent risk, control risk and detection risk, which is also
known as audit risk.
Inherent Risk
Inherent risk is the likelihood of a significant loss occurring before taking into account
any risk-reducing factors. In evaluating inherent risk, an auditor must consider what
the types and nature of risks are, as well as what factors indicate that a risk exists.
To achieve this, he/she must be familiar with the environment in which the entity
operates.
Control Risk
Control risk measures the likelihood that the control processes established to limit or
manage inherent risk are ineffective. In order to ensure that internal audit evaluates
the controls properly, an auditor must understand how to measure which controls
are effective. This will involve identifying those controls that provide the most assur-
ance that risks are being minimized within the business. Control effectiveness is
strongly affected by the quality of work and control supervision.
Controls in business operations provide the major defence against inherent risk.
In general, an auditor may assume that stronger controls reduce the amount of risk;
however, at some point, the cost of control may become prohibitive (in terms of both
financial and staff resources, as well as customer satisfaction).
Audit Risk
Audit risk is the risk that audit coverage will not address significant business expo-
sures. Pro forma audit programs can be developed in order to reduce audit risk.
These provide guidance as to which key controls should exist to address the risk,
and the recommended compliance and/or substantive test steps that should be
performed. These programs should be used with care and modified to reflect the
current business risk profile.
48
Ownership Risks
MacNamee went on to define ownership risks as including external threats, ie
forces outside of the control of the organization that can affect the organization’s
business processes and goals.
➤ Custodial risks are the risks associated with owning and safeguarding assets.
Since human assets have different characteristics, they are covered under
behavioral risks. Examples of custodial risks include obsolescence, damage in
handling or storing the assets, and theft from storage.
➤ Hazards (shared with process risks) are the risks to assets associated with loss
or damage through fire, natural or human-made disasters, and accidental loss.
➤ Opportunity costs (shared with behavioral risks) are the cost of making less-
than-optimum decisions about asset acquisition and disposition. Examples
include buying the wrong asset, paying too much, selling the asset too soon
or too late, selling the asset too cheaply, and disposing of the wrong asset.
49
Process Risks
Process risks include the following.
➤ Hazards (shared with custodial risks) are the risks to processes associated with
loss or impairment through fire, natural or human-made disasters, and acciden-
tal loss.
➤ Errors/omissions/delays are the risks to processes arising from random differ-
ences in human or machine activity in the process. Poor judgment in plans or
operations, inappropriate or outdated control mechanisms, and machine mal-
function are examples of these risks.
➤ Frauds are the risk to processes arising from intentional misrepresentation of
suppliers, employees and customers. Examples of these risks include theft, bid
rigging, bribery, kickback schemes and customer abuse.
➤ Productivity loss (shared with behavioral risks) includes the risks to the process
arising from poor design of the process or its control system. Examples include
scheduling conflicts, inappropriate work rules, missing controls, lack of monitor
ing control systems, underutilizing assets in the process, and goal conflicts.
Behavioral Risks
Behavioral risks include the following.
➤ Productivity loss (shared with process risks) include the risks arising from poor
management practices or poor worker commitment. Underutilizing human
assets, poor leadership, favoritism, lack of work structure and discipline, incon-
sistent management decisions, and personal/work goal conflicts are examples of
these risks.
➤ Dysfunctional workplaces include the risks to employees from a dysfunctional
work environment and the risks to the organization from employees working in
such an environment. Examples of these risks are gender/racial harassment, too
much pressure to meet objectives (without compensating relief valves), employ-
ee theft and sabotage, workplace injuries, employee lawsuits and work place
violence.
➤ Opportunity costs (shared with ownership risks) are the costs of making less-than-
optimum decisions about human asset (people, knowledge and skills) acquisition
and disposition. Hiring the wrong people or skills, a poor compensation system,
and letting the wrong people or skills leave the organization (through quitting,
firing or outsourcing) are examples of such risks.
50
51
Costs and benefits must be evaluated. Of these, costs are normally easier to quan-
tify. Theoretically, costs should be incurred until they exceed benefits, but in practice
this is a management decision and cost-benefit analysis usually results in some part
of the risk being managed and some part remaining. Given this and the fluctuating
nature of risk, management should review the residual risk regularly, assessing the
extent of the exposure.
Risk analysis is a far from foolproof technique and has inherent limitations, such
as poor judgment in decision-making, or access may not be available to data that is
complete, accurate or timely. People make wrong decisions or get tired and make
mistakes. Collusion (two or more people acting together) can occur. Management
override that bypasses the system of internal control may be possible.
Meaningful risk analysis can substantially increases the probability of achieving
objectives, since it alerts management to changes needed to control procedures and
links activity objectives to action. Risk analysis focuses effort on control procedures
and should become second nature. The process may be formal or informal; however,
it is the results, not the degree of formality, that matter.
Risk-based Auditing
Risk-based auditing involves an integrated approach, including the concepts of high-
level risk analysis and the overall audit plan. The audit plan itself may be differenti-
ated between:
➤ mandatory audit activities, ie those activities that must be carried out within
the time span of the audit plan because of legal or regulatory requirements or
to meet senior management requirements or external auditor liaison require-
ments; and
52
➤ discretionary audit activities, which use a small number of risk factors with
associated factor weights.
Detailed risk analysis involves the design of the audit steps. High-level risk analysis
is a broad-brush approach designed to arrive at an approximate evaluation of the
risks a business entity faces. This can define how often audits should occur, but not
necessarily depth or focus areas.
Mandatory audit activities will be given the greatest risk value to ensure that they
are automatically selected, but be careful that senior management requirements are
in fact requirements and not just nice-to-haves.
Discretionary audit activities should be chosen by limiting the risk factors to the
most important ten or less. These risk factors must apply to a variety of products
and services. Common risk factors could include:
➤ exposure (size and sensitivity of assets);
➤ the quality of internal controls;
➤ audit experience;
➤ accounting data;
➤ regulatory requirements;
➤ the value of transactions processed;
➤ the confidentiality of information;
➤ the potential for adverse publicity;
➤ the sensitivity of asset types (convertibility);
➤ the degree of automation in processing;
➤ the condition of suspense accounts:
◗ size,
◗ movements;
➤ the time since the last audit;
➤ the significance of findings at that time
➤ visibility and scope; and
➤ booking duration.
53
‘The definition of internal auditing calls for a disciplined approach to evaluate and
improve the effectiveness of risk management, control, and governance processes.
Internal auditors have a key role to play in an organization’s risk management process in
order to practise internal auditing in accordance with the Standards. This advisory seeks
to provide internal auditors with guidance for determining their role in an organization’s
risk management process and for complying with the Standards.’
54
‘The internal audit activity’s audit plan should be designed based on an assessment of
risk and exposures that may affect the organization. Ultimately, key audit objectives are
to provide management with information to mitigate the negative consequences
associated with accomplishing the organization’s objectives, as well as an assessment of
the effectiveness of management’s risk management activities. The degree or materiality
of exposure can be viewed as risk mitigated by establishing control activities.’
Selling the risk-based audit approach involves obtaining management buy-in to the
process. One effective way of achieving this is to ensure their participation in both
risk identification and risk evaluation.
It is operational management’s responsibility to identify, assess and manage risk.
It is internal audit’s responsibility to assist management in this process by identify-
ing and assessing risk and by assisting management to monitor how well risks are
actually being managed by the business.
Most organizations do not have the resources available to identify, analyze and
control all business risks. Implementing a formal risk assessment process helps by
providing a consistent method for choosing high-impact risks on which to focus audit
resources.
During the risk assessment, auditors must develop an understanding of the oper-
ation’s business in order to identify and assess significant risks. They then use this
assessment to allocate audit resources to areas within the organization that provide
executive management and the audit committee with the most efficient and effective
level of audit coverage. The output of the risk assessment is the primary basis for
allocating audit resources during the audit planning process.
An auditor must always bear in mind that individual managers have differing
attitudes to risk. Some managers or even organizations see the acceptance of risk
as fundamental to the making of profits, while others are highly risk-averse and
consider reducing risk a fundamental component of the business. This is called risk
tolerance. Unless the auditor understands this concept, it is likely that management
and auditors will talk at cross-purposes on risk and that management may consider
audit recommendations to be impractical or unacceptable.
Based on the individual risk positions adopted, companies will manage risk in a
number of ways, such as using insurance coverage, financial instruments, compli-
ance, and internal audit functions. Management must understand that internal audit
does not replace their responsibility to keep their own risk at acceptable levels.
Risks themselves can be categorized according to the organization’s response.
➤ Controllable risks are risks that exist within the processes of an organization
and can be managed by the organization.
➤ Uncontrollable risks are risks that arise outside the organization and cannot
be directly controlled or influenced, but which nevertheless call for a risk posi-
tion to be taken by the organization.
➤ Influenceable risks are risks that arise outside the organization, but can be
influenced by the organization.
55
While internal audit normally deals with all three risk types, owing to the limited
resources at its disposal, it normally prioritizes those areas where risk control is both
desirable and achievable. It then focuses on these areas.
Generally, auditors will have developed a basic understanding of the business and
control risks faced by the client before meeting the client. During initial client meet-
ings, the client’s expectations of internal audit services should have been clarified,
together with any significant risk and control issues that the client faces.
Risk analysis can be carried out in a variety of fashions. Qualitative analysis is
used to help identify both assets and resources at risk as well as those threats and
vulnerabilities to the assets and the safeguards already in place to mitigate the
threats. It can also be used to pick up on the controls which could be implemented
to reduce the risks to unacceptable level.
Qualitative analysis, as the name implies, does not attempt to quantify the finan-
cial value of assets at risk nor the frequency of the occurrence of the threats. In
addition the implementation costs of suggested controls is not usually included.
Quantitative analysis, on the other hand, attempts to identify potential losses in
value terms using objective criteria. Typically this will involve considerably greater
effort to put a value to specific threats but it does facilitate the evaluation of the
cost-effectiveness of suggested controls.
For most auditors a hybrid model combining the best of both quantitative and
qualitative analysis is probably the most appropriate.
In most organizations putting a value to assets is an everyday process where
tangible assets are concerned. Valuing intangible assets is a whole study area of its
own. Assets such as reputation, intellectual property, brand names and the like can
be valued in a variety of manners. Assessing the likelihood of damage to assets via
threats is also problematic since it is, in many cases, a subjective judgment and influ-
enced by the risk appetite of the person making the judgment call. Some managers
are risk averse while others will willingly accept risk as long as their perception of the
payback for accepting the risk is high. By the same token, the assets are not equally
vulnerable to every identified threat. Buildings are not commonly stolen and com-
pany vehicles do not suffer a loss of reputation. Anticipated losses must therefore
be calculated for individual assets and specific threats.
Internal controls can affect both the likelihood of an event having a detrimental
impact on the organization as well as the degree of impact which it can have. In
selecting internal controls the cost/benefit is normally one of the major measure-
ment criteria but it need not be the sole criteria. The ‘risk appetite’ is a measure-
ment of how much risk management is prepared to accept in exchange for a given
level of return.
56
57
intended to address those threats. It should be noted that the auditor will normally
assume that there is no specific intent to bypass controls at this stage and that
those individuals responsible for implementing controls will normally be competent
to carry out those controls. Testing of the controls will indicate where incompeten-
cies are occurring or where controls are not functioning as intended.
Many auditors will use a graphical methodology, perhaps in the form of a matrix, to
present these threats and controls to management to confirm their understanding of the
controls structures which management intend to be in place. At this stage the auditor is
in a position to assess the adequacy of the control structures intended to mitigate specific
threats. Where the controls do not adequately address the concerns, recommendations
can be made to ‘plug the gap’, normally by introducing additional controls.
Even if the control structures do not fully address the specific threats, testing
will normally be carried out on the key controls, ie those controls which address
significant parts of the threat in order to determine their effectiveness.
This risk assessment then forms the basis for the development of the audit pro-
gram as outlined in Chapter 17.
Diagram 1
58
As can be seen, at the core is the Organization’s Data which is the major asset to
be protected. This exists within, and under the control of, the Mainframe computer itself.
In order to gain access to the Mainframe, Mainframe Communications channels are used.
This communication is typically conducted from Servers or intermediate processors. These in
turn, communicate via routers and cabling through Wide Area Networking communications.
The Workstations are the point from where users can enter the system. In addition there are
frequently users who will access the data via the Internet and Mobile computing. These rings,
then, make up the first layer of the cube.
The architecture itself will consist of a number of components including among
others, typically:
➤➤ data;
➤➤ software;
➤➤ people; and
➤➤ hardware.
Each of these architect layers and components will be exposed to risks in a variety of
forms. Commonly the risks may include:
➤➤ system non-availability;
➤➤ loss of confidentiality;
➤➤ loss of integrity;
➤➤ inaccuracy and incompleteness;
➤➤ lack of monitoring;
➤➤ lack of compliance; and
➤➤ under-performance.
Diagram 2
59
Based upon the discussions with Operational and Technical staff at the organization,
a Cube of Risks, Systems Components and Architectural Components can be identified
and risk-ranked. This will typically result in a cuboid such as that shown in Diagram 3.
Diagram 3
When prioritized and structured, the organization’s risk profile may be represented by
higher ranked risks to more critical components that form the upper left-hand corner
of each architectural slice. Each architectural slice may then be evaluated separately
and the Operational, Security and Technical controls identified and allocated to
the specific cell representing a risk (such as unavailability) to a system component
(such as data). At this stage, no attempt is made to determine whether the controls
believed to exist, actually do exist and function as intended.
60
61
26. Enterprise Risk Management — Integrated Framework – Executive Summary, September 2004, are
available from: http://www.coso.org/documents/coso_erm_executivesummary.pdf
62
The net impact of an effective enterprise risk management includes the reduction
of the likelihood of negative consequences such as damage to reputation, failure to
comply with laws and regulations and financial damage while enhancing the likelihood
of the attainment of the overall objectives including:
➤➤ Strategic – high-level goals, aligned with and supporting its mission;
➤➤ Operations – effective and efficient use of its resources;
➤➤ Reporting – reliability of reporting; and
➤➤ Compliance – compliance with applicable laws and regulations.
63
64
Control Frameworks
Learning objectives
After studying this chapter, you should be able to:
➤ Outline briefly the major internationally recognized control models
➤ Explain their impact on the definition of control objectives
➤ Explain the use of control models in the internal audit process
➤ Explain the nature of controls
➤ Choose control types to achieve the desired impact on risks
➤ Explain the characteristics of an acceptable control structure
➤ Explain an internal auditor’s role in evaluating control structures
➤ Explain the major sources of threat to good control practices
➤ Explain the role of control self-assessment
Control Processes
A large part of the work of internal audit is involved with assessing and reporting on
control processes. This means an internal auditor must have a sound understanding
of the nature of business processes and control frameworks likely to be encountered
in a variety of organizations and be able to evaluate their effectiveness and, at times,
their efficiency and economy in achieving the objectives of a particular organization
in a variety of circumstances.
More detailed guidance as to an internal auditor’s responsibilities is provided in
IIA Standard 2120 and Practice Advisories 2120.A1-1 to A4-1. Practice Advisory
2120.A1-1: Assessing and Reporting on Control Processes recognizes the varying
responsibilities of management and the internal auditor for control processes in an
organization as follows.
‘1. One of the tasks of a board of directors is to establish and maintain the organiza-
tion’s governance processes and to obtain assurances concerning the effectiveness of
the risk management and control processes. Senior management’s role is to oversee
the establishment, administration, and assessment of that system of risk manage-
ment and control processes. The purpose of that multifaceted system of control pro-
cesses is to support people of the organization in the management of risks and the
achievement of the established and communicated objectives of the enterprise. More
specifically, those control processes are expected to ensure, among other things, that
the following conditions exist:
➤ Financial and operational information is reliable and possesses integrity.
➤ Operations are performed efficiently and achieve effective results.
➤ Assets are safeguarded.
➤ Actions and decisions of the organization are in compliance with laws, regulations,
and contracts.
65
In order to achieve these objectives, COSO defined five components that would
assist management in achieving these objectives. These are discussed below.
66
Effective Monitoring
To ensure the effectiveness of the control process, the entire control system must be
monitored to assess the quality of the system’s performance over time. Deficiencies
must be reported, with serious matters reported directly to top management.
Also, there should be separate, independent evaluations of the internal control
system. The scope and frequency of these independent evaluations depend mainly
on the assessment of risks and obstacles, and the effectiveness of ongoing monitor-
ing procedures.
Internal Controls
People are often confused about what exactly a control is. A control is any action
taken by management to increase the likelihood that an organization’s objectives
and goals will be achieved. It results from management’s planning, organizing and
directing, and the many variants (eg management control, internal control, etc) can
be included in the generic term.
Management controls are intended to ensure that an organization is working
towards its stated objectives.
➤ Corporate objectives and goals are the statement of corporate intent (eg
‘Costs will be reduced by 20 per cent over the next year’).
➤ Management objectives define how the corporate objectives will be met (eg
‘Costs will be reduced by reducing material wastage by 10 per cent and stock
theft by 60 per cent’).
67
Control Environment
The control environment is the overall infrastructure within which the other control
elements will function. Primary elements within this infrastructure are the following.
Organizational Structure
This defines individual managers’ responsibilities, sets limits of authority and allows
the proper segregation of duties. If the organizational structure is problematic, with
excessive powers granted to individuals, or if poor segregation of duties exists, the
effectiveness of the individual controls may be weakened irreparably.
68
Control Framework
The control framework includes the policies and procedures that describe the scope
of a function, its activities, its interrelationships with other departments, and the
external influences of laws and regulations, customs, union agreements and the com-
petitive environment within which an organization operates. The structures enforcing
controls may be complex or simple. Large organizations tend to have highly struc-
tured control frameworks, while smaller organizations often use personal contact
between employees.
In order to achieve this control, frameworks are established that involve the primary
elements discussed below.
Segregation of Duties
These are the policies and control procedures to ensure that those who physically
handle assets are not the same people who record asset movements, who reconcile
those records, or who authorize transactions. Controls should allow for the proce-
dures performed by one person to effectively provide a check on the procedures
of another in the transaction process. The critical issue in the segregation of duties
is that duties performed by different people should not be incompatible and that
individuals are adequately qualified and trained to perform the relevant control
procedures.
69
Accountability
For all decisions, transactions and actions taken, there must be controls that will
allow management to work out who did what with an acceptable degree of confi-
dence.
Adequate Resources
Controls that are inadequately resourced will generally fail whenever they come
under stress. Adequate resources include manpower, finance, equipment, materials
and methodologies.
Control Self-assessment
Control self-assessment (CSA) uses techniques performed by management to
quantify the impact of business risks and effectiveness of control structures at an
operational level in a way similar to the assessment processes followed by internal
audit. Self-assessment tools can be used to improve business processes and so add
immense value to an organization. CSA goes beyond the bounds of internal audit by
making the organization as a whole responsible for management control and gover-
nance through embracing, planning and operating a CSA process.
Although none of the control frameworks specifically mentions control self-assess-
ment, there is a general feeling in the auditing community that CSA is a significant
tool in implementing COSO (in the USA and generally worldwide), CoCo27 (in Canada),
Cadbury (in the UK) or King (in South Africa). These frameworks all include monitoring
and risk assessment among the fundamentals of internal control.
One of the main reasons for introducing CSA was the constraint on internal
audit resources due to budget cuts, coupled with the increased demands caused
by the growing awareness of the need for good corporate governance. Under a
CSA model, management accept full responsibility for internal control, although
some implementations of CSA involve collaboration between internal audit and
management so that they take joint responsibility for evaluating the adequacy and
effectiveness of the system of internal control.
27. Canadian Institute of Chartered Accountants. 1995. Guidance on Control (CoCo). Toronto: Canadian
Institute of Chartered Accountants.
70
Resources
Budget and staff cuts have caused audit management to realize that changes must
be made. CSA puts the main responsibility for the design, operation and main-
tenance of internal control back on management, ie where the IIA Statement of
Responsibilities has always maintained that it belongs.
Collaboration
As we have seen, CSA can be a collaborative process, with internal audit and man-
agement working together to achieve common goals. This is a reversal of the old-
fashioned philosophy of adversarial auditing.
Empowerment
CSA facilitates empowerment. The process is owned overall by management.
Management accept responsibility for internal control and exercise that responsibil-
ity. Empowerment, more than collaboration, is probably the single most significant
aspect of CSA for management.
Implementing CSA
CSA generates data in erratic quantities, instead of evenly over the course of an
extended audit schedule. CSA practitioners must be prepared to handle large quan-
tities of data over brief periods of time.
There are several methods for implementing CSA. These range from the most
mechanistic type of audit using internal control questionnaires (ICQs) to group
workshops.
Customized Questionnaires
One improvement on the normal ICQ approach is the use of customized structured
questionnaires. One form that this process may take is the internal control sign-
off on a folder of questions about various control activities. This usually contains
a description of the control activity and a schedule of when the activity must be
71
performed (daily, weekly, etc). These are normally permanent customized question-
naires. They can be verified by upper management and the internal auditor at any
time.
Folders such as this are often found in extremely high-risk areas such as nuclear
power generation or bank cash handling, or in highly regimented control environ-
ments such as military establishments.
The questions must be carefully considered and the answers must reflect the true
state of affairs. One weakness in the ICQ approach lies in the customized forms of
questionnaire, as well as in the fact that it is usually obvious that the ‘correct’ to
answer to many questions is ‘yes’.
Control Guides
Control guides are computerized folders containing a description of the expected
set of internal controls for the operations covered. They are still often used by
internal auditors who specialize in financial audits. In the CSA version, these con-
trol folders become internal control workbooks. The workbook is used to facilitate
discussion regarding operations, risks and controls. Internal auditors and manage-
ment discuss the completion of the workbook, and internal audit uses it as part
of its preliminary survey. One application is based on a series of interviews with
senior management.
Interview Techniques
Many internal audit departments interview senior management about issues, plans
and concerns as part of the annual planning cycle. The CSA approach using inter-
view techniques is a more structured tool than the use of ICQs or control guides.
Interviews allow for interaction between the information provider and information
gatherer. Using structured interviews to gather management’s input to the assess-
ment process ensures that the same questions are addressed in each session.
Workshops
A popular method of conducting CSA is to use the work group session model, which
derived from the original research at Gulf Resources (Canada) conducted by Bruce
McCuaig, Paul Makosz and Tim Leech at the end of the 1980s. They developed two
distinct versions of the workshop model.
72
One control framework often used in control model workshops has major cat-
egories that include:
➤ the definition and communication to participants of organizational goals and
objectives;
➤ the definition of commitment controls (derived from the Canadian Institute of
Chartered Accountants 1995 report referred to above), which are soft controls
that involve and unite the people in the organization and could include the cor-
porate vision, mission and purpose statements;
➤ planning and risk assessment processes;
➤ competence, training and continuous learning, involving the acquisition and
maintenance of the skills required to attain the organization’s goals;
➤ direct control activities and mechanisms;
➤ indicator controls, which are performance indicators of control problems; and
➤ monitoring/feedback, which is the process of gathering and using information to
adjust the control system.
Interactive workshops
These are process consultation workshops in which management and staff evaluate
the state of internal controls. In this model, the underlying philosophy is that man-
agement owns the concept of internal control, and management continues to own
the problem throughout the workshop. The facilitator then introduces the informa-
tion during the workshop. Interactive workshops differ from control model workshops
in that they require more facilitation skills, especially during the process consultation
phase. Interactive workshops have the advantage that they take less time, because
they do not emphasize the training element as control model workshops do.
Both workshop approaches use control frameworks to ensure that the relevant
issues are comprehensively covered. Some feel that control model workshops are
a substitute for traditional internal audit, while interactive workshops are normally
seen as another tool of the internal auditing function, ie they are a supplement to
traditional auditing approaches.
Workshops last a day or two, and each is facilitated by members of the internal
audit staff. To be successfully, participants must feel that they can express them-
selves freely on any subject; and there must be a strong commitment by all con-
cerned to the objectives of the process.
The workshop consists of analysis by the group of the strengths and weaknesses
of the internal control systems relied on by the department to help it achieve its
objectives.
Because of the high potential for conflict, facilitation skills are critical in these
sessions. It takes a great deal of effort to discuss and capture strengths and improve-
ments in internal control during interactive workshops. Once they have identified a
risk, the team must formulate an action plan.
73
Banking
The ‘Framework for Internal Control Systems in Banking Organisations’ produced
by the Basel Committee on Banking Supervision was produced as a response to
the Basel Accord (Basel II) which forces banks to renew their focus on risk. Banks
are required to measure, monitor, mitigate and disclose risk. Basel II Introduced the
concept of the ‘three pillars’ for effective control in banking, namely maintenance of
a minimum capital, an appropriate supervisory review process, and effective market
discipline. From an audit perspective, obviously the supervisory review process is of
primary importance. This is intended to focus the bank on internal risk management
capabilities via internal control reviews of residual risk relative to the risk ‘appetite’
of the bank and reviewing of the risks strategies and monitoring capabilities of the
bank. One of the critical aspects of the new accord includes a new and separate risk
activity termed ‘operational risk’.
To assist in controlling risk, the committee also produced a document named
‘Framework For Internal Control Systems in Banking Organizations’.28 This docu-
ment clearly defines the principles for the assessment of internal control systems
within banks and defines the types of control breakdowns in this environment into:
➤ ‘Lack of adequate management oversight and accountability, and failure to
develop a strong control culture within the bank.
➤ Inadequate recognition and assessment of the risk of certain banking activities,
whether on- or off-balance sheet.
➤ The absence or failure of key control structures and activities, such as segrega-
tion of duties, approvals, verifications, reconciliations, and reviews of operating
performance.
➤ Inadequate communication of information between levels of management within
the bank, especially in the upward communication of problems.
➤ Inadequate or ineffective audit programs and monitoring activities.’
IT
Control Objectives for Information and related Technology (COBIT®), produced by
the Information Systems Audit and Control Association (ISACA), is one of the most
widely accepted models of IT governance and control utilized to manage risks and
implement controls within an IT environment in order to achieve business objec-
tives.
COBIT was introduced in order to integrate existing IT standards and best prac-
tices into one cohesive structure designed to achieve international accepted gover-
nance standards. COBIT works from the strategic requirements of the organization,
28. http//www.bis.org/publ/bcbs40.pdf
74
CobIT®
Control Objectives for Information and related Technology (CobIT®) was originally
created by ISACA in 1996 as a framework for business managers, IT managers and
auditors. Since then, the CobIT framework has evolved to become an internationally
accepted approach for IT governance, management and assurance.
Following the increased focus on the enterprise governance of IT and the introduction
of legislation codes of practices such as KING III in South Africa, which was the
first national corporate governance code to specifically mandate IT governance as a
critical component, CobIT was extended until, in 2012, CobIT 5 was introduced to be
a comprehensive framework of globally accepted principles, practices, analytical tools
and models to assist an enterprise in the governance and management of information
and technology. The fifth edition brought together the concepts contained in CobIT,
ValIT and RiskIT into one integrated framework.
CobIT is designed to be utilized at different levels of management.
➤➤ Executive management can utilize it to ensure value is obtained from its significant
investment in information technology and to ensure that risk and control investment
is appropriately balanced.
➤➤ From an operational management perspective, CobIT facilitates the gaining of
assurance that the management and control of information technology services,
whether insourced or outsourced, is appropriate.
75
Processes now cover Evaluating, Directing and Monitoring; Aligning, Planning and
Organizing; Building, Acquiring and Implementing; Delivery, Service and Support;
Monitoring, Evaluating and Assessing.
76
77
Auditors familiar with CobIT 4.1, RiskIT and ValIT are generally familiar with the
process maturity models included in those frameworks. These models are used to
measure the current maturity of an enterprise’s IT-related processes, to define a
required future desired state of maturity, and to determine the gap between them
and how to improve the process to achieve the desired maturity level.
The CobIT 5 product set includes a process capability model, based on the
internationally recognised ISO/IEC 15504 Software Engineering–Process Assessment
standard.
This model is designed to achieve the same overall objectives of process assessment
and process improvement support and allows areas for improvement to be identified.
Further Information
Further information is available from the ISACA (www.isaca.org). Details of direct
interest to the IS auditor include the CobIT:
➤➤ Frameworks
➤➤ Enabler & Professional Guides
➤➤ Practical Guides
➤➤ IT Audit/Assurance Programs.
78
Audit Evidence
Learning objectives
After studying this chapter, you should be able to:
➤ Outline briefly the major types of audit evidence
➤ Differentiate between audit and legal evidence
➤ Choose the testing techniques needed to obtain the evidence you are looking
for
➤ Document the evidence in a quality working paper
IIA Practice Advisory 2240-1: Engagement Work Program gives the procedures that
an internal auditor uses to gather audit evidence.
80
out, who will carry out the tests, how they will be carried out, when they will be
done and how long they will take. As a planning tool, the audit program therefore
assists the auditor by providing a measurement tool regarding the scheduling and
budgeting as well as a measurement of the sufficiency of the evidence gathered.
Any audit program should be looked on as provisional and may be modified
based upon the evidence gathered during the audit itself. Many audit departments
use a standardized audit program based on the presumption of risk to be found
within the auditee area. These are very useful in carrying out a standard audit over
a variety of similar auditees such as geographically spread retail operations. Even
within such standardized programs, modification may be required where abnormal
conditions are found. New standardized audit programs should be prepared well in
advance of the audit since programs which are prepared late have a tendency to
omit critical evidence gathering steps.
The auditor must always remember that the evidence focus should be on cor-
porate risk and the gathering of the evidence should be designed to indicate the
degree to which the risk is acceptably mitigated.
The audit supervisor will typically review the audit program prior to implemen-
tation in order to ensure that the evidence it is intended to gather will satisfy the
objectives of the audit. This is a standard procedure and would be carried out as
part of normal project management techniques as indicated within chapter 16.
Overall, the audit supervisor must be satisfied with:
➤ the audit objectives;
➤ the audit scope;
➤ the degree of planning carried out prior to the audit;
➤ the accuracy of the control objectives agreed with the auditee;
➤ the evidence sought;
➤ the selection of the audit procedures for gathering the evidence;
➤ the appropriateness of the procedures for evaluation of the evidence gathered ;
➤ the procedures for communicating the results;
➤ the report preparation; and
➤ the follow-up procedures.
The actual program used will vary from audit to audit, depending on what you are
looking for. For example, if you want to check whether all purchase orders were
properly authorized, you might:
➤ interview the staff to find out who is supposed to authorize purchase orders;
➤ inspect the purchase orders themselves to check for signatures; and
➤ compare the signatures to a master copy of the signatures of the list of people
with signing powers.
81
After the audit program, the auditor selects and examines the evidence. This
involves the following processes.
Observation
Observation involves both seeing and noticing. It is visual examination with a purpose
and includes mental (or cognitive) comparison with standards and established criteria.
It is an evaluative viewing and is generally preliminary to other evaluation techniques.
Observations should ideally be confirmed through investigation and analysis and, while
these may be a factor of questioning, they may not tell the whole story.
An auditor may observe an operation such as placing a purchase order to check
whether the correct procedures are followed.
Questioning
This is perhaps the most common information-gathering technique. Questioning
may be oral or written and will continue throughout the assessment process.
It is not an easy technique to use effectively, particularly for a manager, since
answers often simply contain what the answerer believes the auditor wants to hear.
Questions should be open-ended and not directive (ie they should take the form
of ‘Tell me how orders are placed’ rather than ‘Do you sign all orders yourself?’),
and answers should, where possible, be confirmed independently.
Analyzing
Analyzing involves examining a complex thing or process in detail by dividing it into sim-
pler parts with the aim of discovering qualities, significance, etc. It may involve determin-
ing interrelationships, causes and effects; observing trends; and making comparisons.
For example, you could analyze absenteeism in August 2004 by measuring it
against TV coverage of the Athens Olympics to see whether there is any correlation.
Verifying
Verifying is the process of confirming truth, accuracy or validity of assertions. It is a delib
erate effort to establish truth by comparing something to known facts or standards.
A reported wrongdoing may be verified by examining supporting documentation.
Investigating
This management technique involves an enquiry to uncover hidden facts and a systematic
tracking down. Audits imply objectivity, but investigations generally look for evidence of
wrongdoing. In such circumstances, be careful not to go out of your depth and be mindful
of the legalities. Suspected fraud would typically result in an investigation.
82
Evaluating
Evaluation is a major management task involving the estimation of worth in order
to arrive at a judgment. Management must draw conclusions based on the facts
that have been accumulated and require auditors to exercise their professional
judgment to help them in this process.
An evaluative measurement usually involves comparing something to a standard,
such as the time taken for a task or rejection rates in manufacturing. If there are no
published and accepted standards, an auditor will have to develop them based on
the operation objective and the evaluator’s experience. If necessary, these standards
may be verified with a qualified expert or with executive management before any
evaluation is carried out.
83
the auditor can derive may be limited to the contents of the document itself, while
digital files may contain information which was not fully produced on the printout.
To make best use of the availability of such evidence, the auditor needs the
appropriate data interrogation software as well as the appropriate skills and
knowledge to implement such software. This is covered more extensively in
Chapter 29 dealing with The Use of CAATs in Auditing Computerized Systems.
84
The Environment of
Business
Communication
Learning objectives
After studying this chapter, you should be able to:
➤ Explain briefly why an internal auditor needs good communication skills
➤ Define the major components of any act of communication
➤ Explain the types and structures of communications at work
➤ Explain the barriers to effective communication and adopt overcoming strategies
➤ Explain the role of the listener and how to overcome bad listening habits
➤ Explain the importance and types of written communication used by an
internal auditor
➤ Outline briefly the steps in preparing and presenting an audit presentation
‘Internal auditors should be skilled in dealing with people and in communicating effec-
tively. Internal auditors should understand human relations and maintain satisfactory
relationships with engagement clients ….
Internal auditors should be skilled in oral and written communications so that they
can clearly and effectively convey such matters as engagement objectives, evaluations,
conclusions, and recommendations.’
Sender
The sender is responsible for the success or failure of an act of communication. He/
she chooses the message to be sent and the system and language to be used. The
sender’s message often may not be beneficial to the receiver, eg in order to carry
out an auditor’s duty, you may have to give bad news to management. In some
circumstances, the sender of a message may be the ultimate receiver, eg when an
auditor prepares working papers.
An important aspect of audit communications is how the receiver perceives the
status of the sender, which may affect the acceptability of the message. When deal-
ing with managers who are superior in the chain of command, you may encounter
resistance, because the manager perceives the situation as one in which a junior
Message
The message itself may be either a statement or a question. In either case, it must
make sense to both parties. Messages may be welcome or unwelcome, expected or
unexpected, or interesting or boring. Even silence may give a message (‘I know more
than I’m prepared to say’).
System
A communication system includes the finding, transmitting, storing and retrieving of
information. The human communication system includes:
➤ touch – from handshakes to pats on the back;
➤ vision – including gestures, nods, smiles, frowns, body language, pictures and
graphics;
➤ sound – including speech, tone, volume and music;
➤ smell – which may be offensive, seductive, etc; and
➤ taste – including sour, sweet, etc.
The technology systems for communicating messages have ranged from papyrus to
EDI, and from smoke signals and drums to multimedia and satellites.
Language
Language includes the symbols and sounds used to convey a message. Music,
sign language and pictograms have been used for centuries to convey messages.
Corporate logos may be the modern equivalent of the cavepeople’s pictograms. It is
believed that thought is primarily non-verbal and, as such, messages may be more
easily accepted if they are non-verbal. This means that using symbols, pictures,
graphs and charts in audit reports may increase their acceptability.
Verbal language is still the most important form of communication and its effec-
tive use involves knowledge of words, their meaning and spelling, and the ways they
combine according to the rules of grammar and syntax. In addition to reading and
88
writing, speaking and listening are key tasks of an auditor. In South Africa, in com-
mon with many other countries, the ability to speak several languages is a distinct
advantage. Language problems cause a great deal of miscommunication.
Receiver
The receiver is a badly neglected role that involves rebuilding the message, under-
standing it and accepting it. This requires time, patience and intelligence. Receivers
may have their own objectives, which can result in a type of selective hearing. The
message may be affected by his/her expectations, resulting in the receiver seeing
only items that interest him/her. The interpretations of messages may vary depend-
ing on the receiver’s perceptions. A manager telling his/her staff of a decision he/she
has arrived at and asking for feedback may be perceived by one listener as making
a statement reflecting his/her willingness to listen to advice. Another listener may
hear the same statement and understand it as reflecting an unbending manager
dictating to his/her staff.
Context
The context of the message includes the physical context, including distractions and
interference. The psychological context includes the relationship between receiver
and sender, and could include acceptance of a message, aggression aroused by an
unacceptable message or simply wariness inspired by an ambiguous message.
Communication at Work
Both formal and informal communications take place at work. People talk to each
other informally more or less continuously. An auditor must be aware of this and
make it work in his/her favor. Formal business structures normally follow a tree
structure. In this structure, a manager may have various spans of control. In a narrow
span, there will be many managers and few subordinates, and therefore very formal
communications will be required. In a wider span, there are usually few managers,
many subordinates and more informal communications. Spans of control vary by
industry, company and even department. When communicating formally, you should
understand the role of different types of authority.
Formal Authorities
➤ Hierarchical authority is a nominal status that is passed down through the chain
of command. It is the authority a manager possesses by right of his/her posi-
tion and status.
89
90
Barriers to Communications
Although communication is required at all levels in business and in our personal
lives, there are many barriers that stand in the way of effectively getting a message
across.
➤ Noise is any interference or disturbance that confuses the message or competes
against communication. This could include physical noise distracting either the
sender or receiver. Competing demands for attention based on personal or work
priorities may also interfere with the reception and acceptance of messages. If an
employee has work or personal problems on his/her mind, his/her concentration
may slip and the content of a message may be distorted. Feelings of insecurity
and unwillingness to accept the message, together with emotion caused by the
content of the message, can further disrupt the communication process and dis-
tort the meaning of a message. If the sender of a message lacks credibility, the
interference this causes can also be classified as noise.
➤ It is understandable that employees coming from different backgrounds all with
different experiences in the workplace may have differing perceptions of the
meaning of messages. A word of encouragement may be interpreted as giving
positive feedback to encourage future good behavior, or as fawning and curry-
ing favor. Positive criticism given to encourage an employee’s or manager’s per-
formance may be seen simply as criticism, which few people like. An auditor’s
opinion may be seen either as pointing out an unacceptable business practice
or as a direct criticism of management. Given that this is a factor of individual
sensitivities and that circumstances alter cases, there is no invariable rule to
help you in this area. You should also be aware that what may be acceptable
in a face-to-face meeting may be unacceptable in formal communication. An
employee may accept direct criticism if it is given unofficially and informally,
but if this criticism is repeated in a formal report, the employee may well
strongly resist or repudiate the opinion. Internally this may be a discussion, but
externally this may be viewed as criticism.
➤ Language problems are often a barrier to communication. The use of jargon in
specialized fields such as computers, financial accountancy, engineering or even
auditing can cause complications in that the speaker may be under the impres-
sion that he/she has expressed him-/herself clearly. In reality, common English
words may be used for subtly different meanings within specialist disciplines.
Expressions such as ‘unacceptable’ or ‘system of internal control’ may have
different meanings outside of the specialized discipline and may confuse the
message. Sometimes, the use of jargon can make a message totally incompre-
hensible to an uninitiated listener.
➤ Distrust and suspicion can cause major problems for auditor-to-auditee com-
munication. If the audit function has a track record of broken promises or loss
of confidentiality leading to a general lack of credibility, co-operation will be
limited and communication will inevitably break down.
91
➤ As previously stated, differences in status can cause problems. The receiver will
inevitably assess the status of the sender, and the importance and credibility
of the message may be increased or reduced by the perceived status. Should
you, as an auditor, find that it is difficult to communicate a message to a senior
auditee, it is probably better to get one of your superiors in the auditing team
to pass on the message, so that two equals are talking to each other, not a
superior and a subordinate. Where an auditor has a low self-image, resentment
may occur and recommendations may be seen as orders from someone with no
positional authority. Because of this, communications can break down for a long
time.
➤ Many people see change as a threat. Resistance to change and apathy are much
easier than confronting the need to change, and negative reactions such as avoid-
ing the issue, rejecting the message or even undermining the credibility of the
person recommending change may result. This can become a self-fulfilling
prophecy, as the resistance to change is translated into efforts to ensure that the
recommendations fail. Where audit can demonstrate a successful track record as
a facilitator of change, and where such change can be shown to have been good
for all concerned, resistance can disappear. Apathy, or a general lack of enthusi-
asm, can significantly distort messages, as can overenthusiasm.
➤ One of the most difficult obstacles for communication to overcome is emotion
on the part of either the receiver or the sender. Such emotion can be construc-
tive, but is more generally destructive. You can control the emotional content of
an act of communication by controlling the setting for the communications and
its tone, by making sure everyone is physically comfortable during presentations
and generally by avoiding minor irritations. Where the auditee is expecting posi-
tive feedback and receives negative feedback, this shock can generate negative
emotions. If auditees think that their methods or systems are being attacked, this
can trigger a defense mechanism involving a counter-attack on the credibility and
veracity of the audit communication and the auditors themselves.
Written Communications
While the end product of internal auditing is to help management improve their busi-
ness, the major immediate output is normally an audit report. Audit results are usually
reported in both interim and final reports. Interim reports may be verbal or written,
and draw management’s attention to items requiring urgent action or provide timely
feedback during an extended audit. A final written report will normally come at the
end of the audit process. Such reports should be objective, clear, concise, complete,
constructive and timely. Written reports are covered fully in Chapter 20.
92
93
Remember that much of communication is visual rather than simply verbal, and
that using body language and eye contact combined with appropriate use of your
voice can make the difference between a memorable presentation and an instantly
forgettable one.
The handling of questions is partly a matter of technique and partly one of per-
sonal preference. When you are faced with an awkward question, one possible solu-
tion is to pass it on to another member at the meeting or in the audience: ‘That’s
a good question; maybe John can help us answer it’ can work extremely well. It
may be possible to get questioners to answer their own questions by asking for fur-
ther information to clarify the question and leading the questioners to the correct
answers. If questions are interrupting the smooth flow of the meeting or presenta-
tion, say you will answer them later – but remember to do so. If you don’t know
the answer, the safest bet may be to admit you don’t know and promise to find out.
An unacceptable technique is to use the old politicians’ trick of answering a differ-
ent question altogether – one that you do know the answer to – and ignoring the
request for information.
94
Strategic Management
Learning objectives
After studying this chapter, you should be able to:
➤ Outline briefly the steps involved in a comprehensive strategic management
model and understand the relevance of such a model to an internal auditor
➤ Explain the impact of organizational culture on strategic management
➤ Explain the impact of the forces acting on an organization in a competitive
environment
➤ Define the strategic management phases and relate these to conventional
management activity
➤ Structure an audit plan of management’s strategic processes
96
Strategy Formulation
The strategy formulation phase involves clarifying the overall vision and mission of
the company. The mission is a statement of the ultimate purpose and direction of
the firm. It helps in the identification of its SBUs, and forms a basis for the allocation
of resources.
97
A mission statement should express the objectives of the firm based on its under-
lying values. These values should underpin an organization’s mission statement and
quantify the system of beliefs and ethics on which the business is based. The mission
statement should also state the primary markets within which the organization will
transact business.
Although it would appear obvious, this can be one of the most difficult phases to
accomplish and communicate effectively to all staff.
A common approach in this area is to conduct a SWOT analysis. This normally
involves staff at all levels coming together in a brainstorming session to identify the
strengths and weaknesses of the organization, together with the opportunities and
threats it faces. Strengths and weaknesses are usually identified by evaluating the
firm's capabilities and resources.
Once these are agreed upon, various strategies can be designed that capitalize
on the strengths, strengthen the weaknesses, take advantage of the opportunities
and defend against the threats in order to achieve the long-term objectives of the
organization. What the organization needs to do well or to have in great abundance
is known as core competencies. Core competencies build on the organization’s
strengths and are its primary source of competitive advantage.
Opportunities and threats can be identified by assessing the competitive fac-
tors in the industry within which the organization operates. The factors that can
be controlled by the company, such as suppliers, competitors and customers, are
known collectively as micro-environment factors, while purely external factors such
as social, cultural, demographic, political, legal and economic factors are known as
macro-environment factors.
Once the various strategies have been designed, those that seem most likely to
achieve the organization’s objectives need to be selected and then translated into
tactics, working objectives and action plans. At the corporate level, this could involve
decisions regarding the expansion of goods and services, the elimination of non-per-
forming parts of the business and the allocation of resources to achieve optimum
performance. Choices regarding diversification of the business and entering local
markets would be aggressive moves, while putting measures in place to protect the
business against global competition would be defensive strategies.
Strategy Implementation
One of the most difficult parts of strategic management is to move from planning
to implementation of the strategic decisions. The formulation of annual objectives,
amendments to corporate policies and procedures, and transformation of existing
control structures are all complex processes that have to be correctly and effec-
tively carried out. It is in this stage that management’s interpersonal skills are vital
in motivating employees to carry out change. Many people see change as a threat
to their comfort zone and the status quo. Change involves the unknown, and people
fear the unknown. It is at this stage that internal audit can delay or even prevent the
implementation of corporate strategy by insisting on maintaining the status quo and
previous internal control structures, and by fighting innovation.
Strategic plans must filter down through the organizational structure. This process
is more likely to be successful if the organizational structure encourages good com-
munications and if personnel have the necessary skills and abilities.
98
Strategy Evaluation
The final stage of strategic management is strategy evaluation. Strategic manage-
ment is a highly dynamic function in which today’s success creates new problems
for tomorrow and success today is no guarantee of survival tomorrow. As such, all
strategies developed today will almost certainly have to be modified some time in
the future, since stagnation leads inevitably to failure.
29. Porter, M.E. 1985. Competitive Strategy. New York: Free Press.
99
be the only factor that determines whether customers buy a particular product. In
these circumstances, price-cutting is rife and an overall decline in profitability will
probably occur. One defense against the substitution of a competitor’s product or
service is to raise the cost of switching suppliers. Customer loyalty programs reward
customers who do not switch to a competitor’s products and services. By the same
token, a competitor’s customers may be lured away by reducing the cost of trans-
ferring. In an industry where there is no dominant market leader, competition is
normally aggressive, as each firm tries to outdo its rivals.
Costs, too, can affect the rivalry among firms. Where participation in a market
sector requires a large fixed investment, a firm is pressured to operate as close
to full capacity as possible. In these circumstances, variable costs will normally be
squeezed down to permit aggressive competition in order to achieve volumes of
business. This applies also to industries where increased volumes of business come
at the cost of large increases in fixed investments. With all the players in the industry
trying to gain a price differential based on the economies of scale, overcapacity in
the market will result and the number of competitors will ultimately fall as unsuc-
cessful competitors either fail or merge with more successful rivals.
In highly competitive industries, rivals must constantly consider whether it is still
desirable to remain in the industry. As profitability in the sector declines, competi-
tors are less willing to accept the risks inherent in such rivalry. Under these circum-
stances, an organization may decide to exit a market sector. It will do this if the cost
of leaving the sector is low. A high exit cost may result in organizations remaining as
active players in a market sector long after it is desirable. Conversely, if exit costs
are known to be low, the market may be more desirable for new rivals to enter, since
failure in the sector will not lead to major losses. As such, many organizations try
to defend their markets against new entrants by making the price of market exit as
expensive as possible.
100
In the case of substitutes for a product or service, the more readily available an
acceptable substitute is, the more likely that demand will be elastic. An organiza-
tion concerned for the demand elasticity of its products and services will seriously
consider:
➤ its relative prices;
➤ the costs of switching to a substitute; and
➤ customers' inclination or willingness to substitute.
101
Competitive Strategies
Although profitability is normally a characteristic of the industry in which an orga-
nization participates, a critical factor is also its competitive position within that
industry. As noted above, organizations seek to differentiate themselves within an
industry by either product differentiation or price differentiation. In other words, ‘buy
from us because our product is the best/our product is the cheapest’. Porter has also
categorized the competitive scope within which strategies are formulated.
➤ A narrow scope will focus on a market segment or even a single product.
➤ A broad scope, on the other hand, can extend to attempts to influence an
entire industry.
102
Market
Competitor New Attractiveness
Rivalry Entrants
Suppliers Your
Customers
Company
Substitute Market
Products Profitability
Some organizations try to gain competitive advantage through their own lower
costs. Such firms can decide to charge a lower price to increase their market share
or, by retaining the industry average price, they may earn higher profits than their
competitors. This strategy is known as cost leadership. Cost advantages may be
gained by their domination of a raw material supply or through economies of scale.
Vertical integration (taking over key suppliers or customers) may also lead to a cost
advantage. In a cost leadership strategy, a company usually operates on high vol-
ume turnover and low profit margins. Here, control over operational efficiencies is
paramount, and reducing or eliminating waste becomes a major management objec-
tive. Management control usually involves monitoring costs in detail and reports are
provided regularly. Reward structures usually involve the achievement of numerical
performance goals.
Such strategies expose organizations to the potential risk that a competitor may
use superior methods, technology or even cloning of products to wipe out the price
differential. Also, a competitor who simply manages its cost better can also gain
additional advantages. A cost leadership strategy may also be vulnerable should a
competitor try to compete on a product differentiation basis.
Product differentiation is a strategy frequently favored by organizations that try
to achieve competitive advantage by providing a product or service that is obviously
different from those of its competitors. If the product or service is unique or close to
unique, or consumers think that few, if any, substitutes are available, the organiza-
tion may earn higher profits because consumers are willing to pay a price premium
for that uniqueness. The perception of uniqueness may be real and based on design
excellence or technical superiority. Alternatively, it may exist only in the mind of the
103
104
increase distribution effectiveness or control costs. A more negative aspect of this is the
use of planned obsolescence, resulting in new varieties of products being constantly
demanded by consumers. Alternatively, a company may seek new uses for an existing
product or service to attract consumers with no desire for the current use.
Kotler and Singh30 have defined the following defensive strategies:
➤ A position defense is designed to defend a position by strengthening the firm's
brand power.
➤ A pre-emptive defense is an attempt to anticipate a competitive attack. This may
involve covering every segment and niche within a market and flooding the mar-
ket with products, targeting specific competitors before they can attack or indi-
cating to the market the ways in which the leader intends to defend itself.
➤ A flank defense creates interventions in order to protect the leader's position. For
example, a competitor's price attack on a firm’s brand may be responded to by
introducing two new brands, one designed to be sold at the same price as the com-
petitor’s brand, and the second at a lower price in order to outflank the competitor.
➤ A mobile defense involves market broadening. This usually involves an attempt
to shift the emphasis from a specific product to the underlying need. An exam-
ple is the repositioning of television companies as multimedia companies. An
alternative to market broadening is market diversification, which involves the
mergers of firms in wholly different industries into conglomerates.
➤ An alternative defense involves concentrating corporate resources in the areas
of its greatest strength rather than defending all of the firm's positions.
➤ A contraction defense involves a strategic withdrawal from specific areas of
lesser strength.
➤ A counteroffensive defense may lead the organization to respond to a competi-
tor’s price cuts in one market sector by slashing prices in another market sector
considered to be more important to the competitor.
30. Kotler, P. & Singh R. 1981. ‘Marketing warfare in the 1980s’. Journal of Business Strategy, Winter,
30–40.
31. Kotler, P. 1994. Marketing Management, Analysis, Planning, Implementation and Control. 8th ed.
New York: Prentice Hall. pp. 382–405.
105
More specific strategies for the market challenger could include the following:
➤ Price discounting tends to succeed if buyers are price-sensitive, the product and
service are similar to the market leaders’, and discounts are not matched.
➤ Lower-priced goods of average quality may substantially outsell higher-quality
goods if the price is much lower.
➤ Prestige goods are high-quality items sold at a high price.
➤ Product proliferation is a strategy based on greater product variety.
➤ Other specific strategies emphasize improving service, developing a new distri-
bution channel, increasing the marketing budget, or improving manufacturing
efficiencies.
Even a market follower will face competition from other followers and will need strate-
gies to maintain its current customers, attract new ones, fend off challengers, protect
its advantages, lower its costs, and improve the quality of its products and services.
➤ Market niche strategies are adopted by small or medium-sized firms that
choose to compete in small markets. These markets are often ignored by larger
firms because they are not cost-effective to enter. Niches frequently specialize,
offer high-quality products and services at premium prices, and have low overall
costs. They substitute high profit margins for the high volumes of mass
marketers. One of the dangers of success in a niche market is the growth of the
market itself until it is no longer a niche and attracts larger competitors who
have better economies of scale.
106
Learning objectives
After studying this chapter, you should be able to:
➤ Outline briefly what we mean by the term ‘globalization’
➤ Explain the effect of cultural issues in international business
➤ Explain the primary drivers of global expansion
➤ Recognize and explain how supply and demand conditions influence the global
business environment
➤ Describe how a firm’s global organization affects its organizational and control
structures
➤ Evaluate whether there are performance-compromising influences in an
organization’s structures
➤ Explain the impact of corruption and political instability on control concepts in
international trading
Business Globalizaton
In recent years, companies have increasingly competed in a global environment. This
has brought undeniable opportunities with the potential to expand on a massive scale.
At the same time, the domestic market becomes less important to the firms involved
as the percentage of business done overseas increases. Of course, the reverse is also
true, in that overseas competition may now attack the domestic market.
Competing in larger markets gives organizations greater access to all the resources
needed to do so successfully; however, the larger market also means that organiza-
tions face competition from the best of the best. International competition normally
means attacking an already established market where the home team advantage lies
with organizations that are already competitive in both technology and management
structures.
Companies face a variety of pressures to go global. A recessional economy in
their own domestic market can force them to expand into international markets.
Many Western countries are experiencing demographic changes such as ageing
populations and declining birthrates, which can force companies to go abroad to
find fresh markets. Some organizations use international trade to extend a product’s
lifecycle and dispose of inventory by exporting technology to underdeveloped or
less-developed nations. Many countries offer tax incentives to incoming investors,
which makes the overseas market more attractive economically.
At the national level of globalization, governments must now try to create a
business environment that can both attract fixed investment from overseas firms
while simultaneously facilitating the opportunities for domestic firms to compete
in overseas markets. In order to achieve this, governments must come to grips
with the underlying fundamentals of market economies. They may face significant
resistance from internal pressure groups concerned with defending their local
market share in the face of increasing foreign competition. In order to avoid an
international economic trade war, unprecedented levels of international co-opera-
tion are required.
108
nations, and finally produced in developing nations with much lower labor costs and
re-exported back to the developed nations.
Once again, a theory may have been true and valid at that time, but the world
moves on. For the past 30 years, the increasing spread of internationalism in busi-
ness has meant that many products are now introduced at the same time in all world
markets.
Porter also acknowledges the roles played by both government and chance. Labor
laws, monopoly legislation and the implementation of internationally recognized
standards legislation can have a positive or negative impact on national competi-
tiveness. Chance, in the form of natural disasters or unexpected windfalls, can also
play a role.
Problems of Globalization
When an organization embarks on a policy of globalization, the complexity of its
management processes takes a quantum leap. Globalization involves competing in
a variety of political, economic, legal and cultural systems.
Within these overall structures, differing political systems also add complexity.
Totalitarianism, whether left- or right-wing, can be contrasted with the democratic
process, also potentially left- or right-wing.
32. Porter, M.E. 1990. ‘The Competitiveness of Nations’. Harvard Business Review, April/May.
109
Legal environments create their own complexities, even within similar political
structures. Activities that are acceptable – even the norm – in one country may be
socially unacceptable or even illegal in another country. Laws differ immensely from
country to country, even where there are generally accepted views on ethical and
moral principles. A country’s copyright law may attempt to comply with interna-
tional standards and agreements and nevertheless have local variations. Definitions
of fraud and theft, while generally agreed, differ in law from country to country and
must be complied with in international trading. Electronic trading complicates the
issues further, with some countries having clear and strict electronic trading laws,
while others have none or, at best, vague and confusing legislation. Laws over physi-
cal and intellectual property rights are similarly unique. In some countries, bribery
of public officials is seen as a minor offense, while others would view it as totally
unacceptable. Individual countries also differ in their views on ownership, with some
believing strongly in state ownership and nationalization, while others advocate pri-
vate ownership and deregulation.
110
South Africa range from four to seven weeks a year while in America three weeks is
the norm. Similarly, Europeans and Americans would see drinking alcohol as normal,
while strict Muslims would find it totally unacceptable.
It should not be taken that culture is the only influencing factor causing members
of groups to act in uniform, predictable ways. Each individual is also influenced by
other factors, such as social class, age and gender stereotypes.
The managing of cultural diversity creates opportunities within organizations to
create a synergy, because of the wider range of cultural experiences and educational
and professional backgrounds than in a single culture group. If properly managed,
long-term goodwill can be generated; if badly managed, negative stereotypes will
be reinforced.
Generally, people tend to handle new situations by making generalized assump-
tions based on past experiences. Thus, a manager handling an unknown group will
automatically make assumptions about the capacities of its members based on his/
her experience with similar groups. One way of generalizing about other people is
to stereotype them on the basis of their sex, age and racial background or culture.
This can lead to a rigidity in dealing with people, since inflexible stereotyping does
not allow for exceptions to the norm. Similarly, change as a result of transformation
may not be recognized, as old stereotypes tend to resist changes for considerable
periods of time.
For generalizations to be effective within management, a process of cultural analysis
will be required. This involves identification of behavior that seems unusual or unex-
pected in terms of the local culture. The manager must then collect data regarding the
unusual behavior and try to develop hypotheses (a set of alternative explanations) to
explain the behavior. Evaluating each alternative in terms of what is already known
about the other culture must then test these hypotheses. Those alternatives that
cannot be substantiated should be discarded. The most likely hypothesis would then
be selected to give a working generalization. As and when new data and examples of
behavior are recorded, the hypothesis would then be modified.
Many managers try to ignore cultural diversity or downplay the significance of
cultural differences within the workforce. This may be because they lack the skills
and resources to handle diversity appropriately or because they believe that the
negative effects of multiculture outweigh the positive ones.
Organizational Culture
Many definitions of the term organizational culture may be found in current manage-
ment literature. For our purposes, the term is taken to refer to the sum of percep-
tions that develop within an organization. This includes both perceptions developed
deliberately by top management and those based on the employees’ own experi-
ences. Organizational cultures benefit the individual member by providing a sense
of identity and act as a framework for interpreting reality. Each organization has its
own culture, and members of the organization have to learn that culture. For those
employees whose needs are met by such a culture, long careers of service will nor-
mally be the result. Where new recruits discover that the culture does not suit their
tastes, a high dropout rate will occur.
Periodically, management may wish to change the organizational culture and such
change is often painful, particularly where the culture has been well established.
Cultures can be made stronger by creating more efficient communication among
111
members, which creates conditions for greater cohesion. Cultures can be made more
positive by improving systems so that members see gains and losses to be shared
favorably, thus increasing their stakes in official outcomes.
Cross-cultural managers whose interaction with members of the other culture is
limited to the workplace will experience the values of the other culture only as they
appear in the workplace. This can cause problems for any attempt to implement
appropriate incentives to motivate workers. There can be major dangers in assuming
that what works as a motivator in one culture will have the same effect in a different
culture. Motivators must reflect the values held within a particular culture. Incentives
are more likely to succeed where they both reflect real needs and take practicalities
into account. Further details on motivational techniques can be found in the next
chapter.
In a cross-cultural environment, corruption may, like beauty, lie in the eye of the
beholder. Definitions and descriptions of corruption in dictionaries define corrup-
tion as the ‘impairment of integrity, virtue or moral principles’, ‘the perversion or
destruction of integrity in the discharge of public duties by bribery or favour’ and
‘moral deterioration or use of corrupt or tainted practices’. Words like ‘integrity’ and
‘moral principles’ may not only signify different things to different people, but are
also to a large extent culture-bound. What is officially defined as ‘corruption’ in one
society or organization may be the customary way of doing things, the accepted cost
of business transactions, or a traditional favor-for-favor exchange in others. Even the
sense of what constitutes ‘corrupt conduct’ can differ within a single organization.
What one group of managers may see as corrupt, another group may dismiss as ‘the
way in which things get done around here’.
In the landmark report of the Treadway Commission,33 the commission stated
that the control environment sets the tone of an organization, influencing the con-
trol conscientiousness of its people. It is the foundation for all other components
112
Fragmented Industries
Firms that have an insignificant market share and are not in a position to exert great
influence on industry outcomes are said to exist in a fragmented industry. This is par-
ticularly true where the industry has many small-to-medium-sized firms with no obvi-
ous market leader, and products that may or may not be significantly differentiated.
Economists would normally refer to such an industry as pure competition. Industries
can fragment for a variety of reasons. Low barriers to entry permit easy access to an
industry, which can under certain circumstances lead to fragmentation.
Some industries are fragmented for purely historical reasons, while for others,
economic causes for fragmentation exist. Small, flexible firms may have a market
advantage when quick responses are required to changes or customization of a
product line to the unique requirements of individual customers is needed. Even the
newness of an industry may be a reason for fragmentation. New firms may not have
the resources and abilities to achieve concentration for some time. When the cell-
phone industry started in South Africa, there was an abundance of small cellphone
providers associated with large cellphone infrastructure providers. Over a period of
time, through mergers and acquisitions, and the bankruptcies of some companies, a
more concentrated market has emerged.
Overcoming fragmentation can have significant strategic effects if the factors
preventing consolidation can be eliminated. It may be possible to use technology
to create economies of scale that ought to isolate the factor that is responsible for
fragmentation from the rest of the business. Another common approach is for a
single firm to use multiple brand names to appeal to the varying tastes of differing
customers. Recognizing the factors that can remove the cause of fragmentation can
provide a competitive advantage to an organization, which can influence those fac-
tors ahead of the competition.
Strategies to defeat fragmentation will be dependent on the situation in which an
organization finds itself. Where personal service or local control is critical to success-
ful operations, management may decide that tightly controlled decentralization may
be the right strategy. If the cause of fragmentation was the inability to differentiate
products or services, an appropriate strategy may be to add value to the product or
service in order to create the differentiation.
Obviously, management can adopt strategies that will make the situation worse.
Attempting to dominate a fragmented industry may be disastrous if no attempt is
made to change the basic industry structure. In fragmented industries, speed of
response and local knowledge may be critical to success. If this is the case, central-
izing the organizational structure could be disastrous.
113
Before selecting a strategy, management must identify the basis for fragmentation
and analyze what the right interventions would be to prevent it.
Emerging Industries
An industry is classed as emerging if it is new and small in size. Such industries may
result from new customer needs, innovation or changes in environmental factors.
Such industries are typified by uncertainties over products and production (tech-
nological uncertainty) or production and marketing (strategic uncertainty). Within
emerging industries, there will be many newly formed companies to begin with and
spin-offs from existing firms are common. Initial costs are usually high during set-
up, but they decrease rapidly. Marketing in such industries is problematic, since
customers have to be convinced that the risk of using the new product or service is
not high and that the benefits are there to be gained. Many such industries, based
on new technology, attract government subsidy or grants. While initially these may
be beneficial, in the long term they create market instability.
Due to the lack of standardization, product quality may be erratic and customer
confusion may arise because of the number of variations on the market. Such con-
fusion makes buying these products seem more risky to customers and may be
counterproductive.
Declining Industries
Industries are classed as being in decline when they have sustained a permanent
decrease in activity for some time. If an industry is in decline, a company within the
industry must make strategic choices to deal with the decline without overcapac-
ity and massive losses. During industry decline, the reality is that business activity
is decreasing and that too much competition will only accelerate the decline by
decreasing profits. In seasonal industries, it may be difficult to differentiate between
genuine decline and the normal seasonal variability of sales and thus it may be dif-
ficult for an organization to respond appropriately. The rate of decline will not be a
constant, but will increase as lower volumes increase the impact of variable costs.
Industry decline can be caused by a variety of factors, including product innovation
or the introduction of product substitutes. Customer demographics change over a
period of time because of economic factors, population age or even political change.
In specialized industries, it may be difficult for an organization to develop an exit
strategy, despite low returns, without affecting the image or financial standing of the
firm.
114
Organizational Behavior
Learning objectives
After studying this chapter, you should be able to:
➤ Outline briefly what managers do in the context of organizational behavior
➤ Explain the contingency approach to organizational behavior and its importance
to an internal auditor
➤ Explain the primary causes of conflict within an organization and provide
appropriate coping strategies
➤ Explain the fundamental concepts in group and individual decision making
➤ Decisional roles are roles that involve the making of choices. The entrepreneur
searches for opportunities and innovations, and will initiate new projects to
improve the organization’s performance levels. From time to time, management
will face unforeseen problems and be forced to act in the role of disturbance
handler. The manager’s role is also to choose his/her preferred method of allo-
cating resources in order to achieve these goals. Managers have at their dispos-
al a variety of resources, which are commonly grouped into the five Ms, namely:
◗ manpower
◗ money;
◗ materials;
◗ machinery; and
◗ methods.
This places management in the role of resource allocator. Finally, management will
periodically perform a negotiator role in which it bargains with other business units
to gain advantages for its own area of responsibility.
In the context of organizational behavior, management operates within an envi-
ronment characterized by the interactions of individuals, groups and structures
within organizations. Management is responsible for the application of such knowl-
edge with the aim of improving the organization’s effectiveness.
A group may be defined as two or more individuals who have chosen to come togeth-
er and interact to achieve specific objectives. Groups may be formal or informal.
➤ Formal groups are those defined within the organization structure that have
been allocated specific work assignments. Behavior within those groups is regu-
lated to the extent that the achievement of the organizational objectives is of
paramount importance.
➤ Informal groups are those that have come together spontaneously and are nei-
ther formally structured nor controlled by the organization. They are primarily
socially driven and appear as a response to social needs.
116
People join groups for many reasons. For some individuals, joining a group can
reduce the feeling of vulnerability involved in being on their own. If the group has
a positive reputation, membership may give a degree of status to an individual.
This can improve his/her self-esteem and sense of self-worth. In collective bargain-
ing, membership of a group may contribute to the power of the individual. Power
may also be achieved by using group membership to achieve supraordinate goals
(ie goals not achieved by working alone but that are possible for the group).
Several concepts must be understood with regard to groups.
Group Development
The traditional view of group development was based on Tuckman’s36 work in
1965. His five-stage model characterized groups as progressing through a stan-
dard sequence of forming, storming, norming, performing and adjourning.
➤ Forming, the first stage in group development, is characterized by uncertainty
about why the group exists, who will lead it and how it will be structured.
➤ The second stage is known as the storming stage, since it is at this stage that
conflict may arise over the control of the group. At the end of the stage, lead-
ership has normally been clarified and the way in which the group functions is
relatively clear.
➤ During the third stage, norming, the group comes together as a cohesive whole
and close relationships usually develop. At this stage, a strong sense of group
identity will exist.
➤ By the fourth stage, performing, the group is functioning efficiently and
becomes highly task-oriented. Under normal circumstances, this is the desirable
final stage for groups.
➤ For temporary groups, the final stage would be adjourning when the task has
been achieved and the group structure is no longer required.
Group Size
Another major factor in the functioning of groups is the group size. There is
evidence that smaller groups complete tasks faster than larger ones, but larger
36. Tuckman, B.W. 1965. ‘Developmental sequences in small groups’. Psychological Bulletin. June,
pp. 384–99.
37. Gersick, C.J.G. 1988. ‘Time and transition in work teams: Towards a new model of group devel-
opment’. Academy of Management Journal. March, pp. 9–41.
117
groups are significantly better at problem solving than smaller groups. In larger
groups, there appears to be a tendency for individuals to do less than they are
capable of if they were operating as individuals. This tendency is known as social
loafing and may be responsible for inefficiencies and ineffectiveness within larger
groups. It is believed to occur when individuals see other members underperform-
ing and reduce their own efforts in order to achieve equity (‘Why should I work
hard if he’s loafing?’). For management, this means that in addition to setting goal
objectives for the group, individual measurement criteria are required so that indi-
vidual efforts can be recognized and rewarded.
Group Roles
In any given group, individuals undertake different roles at different times. A number
of factors are involved here:
➤ How individuals react within groups is partly due to their role perception. This is
the individual’s interpretation of how he/she is supposed to behave and act in a
particular role.
➤ Role identity involves specific attitudes and behaviors consistent with the role
being played, and individuals will shift roles as circumstances change.
➤ Role expectations, on the other hand, define how others believe the individual
should act in a given situation and may lead to role stereotypes.
➤ When an individual is required to adopt multiple roles in a given situation, role
conflict may occur, eg a manager may have to discipline a personal friend.
Group Norms
All groups have established acceptable standards of behavior, which are shared
by the group’s members. These are known collectively as group norms. In a formal
group, these are laid down in policies and procedure manuals, but most of the norms
within organizations are informal. Common norms would include the appropriate
dress, norms regarding social interactions such as who eats lunch with whom, perfor-
mance-related norms regarding how hard individuals should work, and even norms
regarding who gets the latest equipment when it arrives.
Group Cohesion
Although management generally seeks group cohesion in order to achieve corporate
objectives, a highly cohesive but unskilled team is still an unskilled team. But even
if the skills are present, a cohesive group may develop its own goals and objectives
that are out of line with those of the organization or even contradictory to them. In
some highly cohesive groups, it becomes more critical that no one disagrees than
that objective appraisal takes place. This phenomenon, known as groupthink, can be
deadly to the decision-making process. In a strongly led group, overzealous group
members may perform unauthorized or even illegal activities because they believe
that the leaders of the group and the group as a whole will be pleased. This phe-
nomenon is known as ‘Ollieism’.
118
Conflict
Conflict has as many definitions as there are parties to the conflict. One generally
recognized definition is that there must be a perception that conflict exists. It is
commonly agreed that if no one is aware of the conflict, then no conflict actually
exists. Conflict can be seen as a process that begins when one party perceives that
another party is, or is about to be, in conflict with the first party.
There are further disagreements about the role of conflicts in organizations and
groups. Some management scientists argue that conflict is counterproductive, indi-
cates a problem within the group and must be avoided at all costs. Others argue
that conflict is natural within any group and can be a positive force in achieving high
performance by the group. Current thinking indicates that not only is it possible that
conflict can be positive, but that the group will stagnate and die without it and that
therefore conflict is an absolute necessity for effective performance.
Even with this opinion, the interactionist view is perceived as good. This view
differentiates between functional conflict, which is constructive, and dysfunctional
conflict, which is destructive.
Conflict Resolution
Conflict resolution will depend on the individual parties involved, but various options
can be identified.
➤ Collaborating involves each party seeking to resolve the situation by fully
meeting the needs of the other.
119
➤ Through avoidance, one party, recognizing the potential for conflict, may with-
draw from the situation.
➤ Accommodating refers to the intention of one party to place the opponent’s
interests above their own in order to appease the opponent.
➤ Compromise is the state when each party agrees to give up some of their
requirements in order to meet some of the requirements of the other party.
Group Decision-making
Advantages of Group Decision-making
It is common within organizations to use groups to help in the making of decisions.
Groups can offer the advantage of more complete information and more extensive
knowledge by bringing a variety of experiences and skills into the decision-making
process. This means that a variety of alternatives can be considered. Once the deci-
sion has been made, a greater commitment from individuals can be gained if the
individuals feel that they were part of the decision-making process. This commit-
ment can significantly increase the chances of success of any activity decided on. In
many cases within the South African context, group involvement increases the legiti-
macy of any decision arrived at. Because of this country’s history of a substantial
proportion of the population being denied any participation in the decision-making
process, involvement of this very large group has become essential.
Group Techniques
Most group decision-making takes place on a face-to-face basis, although increas-
ingly the use of technology can allow a group to reach consensus without ever
meeting.
In order to achieve effective group decision making without the disadvantages
noted above, specific techniques are required to ensure the effectiveness of the
decision-making process, eg brainstorming is a technique used to generate ideas
in a group discussion session by noting ideas expressed in an unstructured fashion
without ranking or criticizing either them or the people who propose them during
the idea-generation.
120
Management Skills
Learning objectives
After studying this chapter, you should be able to:
➤ Define the evolution of managerial practice
➤ Outline briefly the skills required of a modern manager
➤ Explain the challenges for managers in dealing with increasing business uncertainty
➤ Explain the role of management in problem solving
➤ Contrast the types of decisions a manager will be required to make
➤ Explain the impact on employees of values and job satisfaction
➤ Describe the major leadership theories and the impact of different leadership
styles on internal control
➤ Explain the basic concepts behind motivational theory and behavior modification
➤ Define work stress and explain potential remedies
➤ Explain the role of the manager in building staff competencies
The term management has been used in a number of different ways. It may be used
to refer to the group of people running an organization or to identify the processes
by which managers direct and control business activities.
procedures. Payment by results was instituted based on work study, and exten-
sive financial and operating records were maintained. Watt was also an innovator
in developing training schemes for both workers and management.
➤ Robert Owen (1771–1858) believed strongly in the need for a meaning-
ful understanding between employer and worker. He tried to implement this
through improvements in factory working conditions. A revolutionary in his time,
he believed that young children should not be employed in factories and that
working conditions for factory workers should be improved. He operated in the
textiles industry, where he introduced innovations in both social and working
conditions. He raised the minimum working age from 10 to 12, reduced the daily
working hours to 103/4 and provided education facilities and better housing.
➤ Charles Babbage (1792–1871) was a mathematician who is credited with the
creation of the world’s first computer by developing a ‘calculating machine’. In
the course of his research, he became interested in the economics of manufac-
turing processes, particularly in the virtues of division of labor. He argued that
specializing the production of a shoe reduced the time needed for learning the
job and the waste of materials during the learning stage. He also believed it
allowed for improvement in skill levels and allowed the matching of employees’
skills and abilities with specific tasks required. He also suggested that special-
ization was as relevant to mental work as it was to physical labor.
122
Taylor believed in detailed observations leading to the design of standards and that
workers should be paid on piece rates related to scientifically determined standards,
with reduction in pay for those who did not reach the standard. He also believed in
specialization of both management and workers, and pioneered what is now known
as industrial engineering. His approach is still widely used today and underlies many
management techniques, from work study to standard costing.
➤ F. B. Gilbreth38 (1868–1924) was an American manager and consultant. His
belief in the one best way of doing a job led him to develop time and motion
studies, assisted by his wife, who was a trained psychologist. Gilbreth laid
down rules for finding out which of the motions used in doing a job were nec-
essary and which were ‘wasted motions’: he called these the ‘rules for motion
economy and efficiency’.
➤ Henry Gantt (1861–1919) was a teacher and then a draughtsman before
becoming an assistant to F. W. Taylor. Gantt developed a variety of graphical
tools in the course of his work, the best known being the horizontal bar chart,
which bears his name (the Gantt chart).
➤ Max Weber (1864–1920) was a German sociologist whose main contribution
to management thought was his theory of authority structures. Weber distin-
guished three typical bases of authority, namely:
◗ charismatic, based upon the exceptional powers of the leader;
◗ traditional, based on precedent and usage; and
◗ rational, based on scientific principles and the rule of law.
Weber is credited with coining the word ‘bureaucracy’, meaning ‘rule by the
office’, without the later overtones of red tape and inefficiency, and considered
bureaucracy to be the dominant system in modern society and to be techni-
cally the most efficient.
➤ Henri Fayol (1841–1925) was a French manager who set out his own principles of
management, which became known as administrative theory. Fayol suggested that
all managers perform five principal functions (as briefly mentioned in Chapter 12,
above): planning, organizing, commanding, co-ordinating and controlling.
Fayol developed 14 principles of management:
◗ division of work, to increase efficiency through specialization;
◗ authority combined with responsibility, to authorize managers to give orders;
◗ discipline, resulting from effective leadership and a clear understanding of
the organization’s rules and the penalties for infringing those rules;
38. Gilbreth, F.B. 1911. Motion Study. New York: Van Nostrand.
123
◗ unity of command, such that each employee receives instructions from only
one superior;
◗ unity of direction, to ensure that one manager, using one plan, directs the
business affairs of each group;
◗ subordination of individual interests to the general interests, in order to
ensure that the interests of the organization as a whole take precedence
over the interests of employees or groups of employees;
◗ remuneration in the form of a fair wage;
◗ centralization in respect of involvement in decision making. A centralized
environment leaves decision-making in the hands of management, but the
decentralized environment involves subordinates in the process;
◗ a scalar chain of authority from top management to the most junior employ-
ees, which facilitates communication;
◗ order, to ensure that resources are in the right place at the right time;
◗ equity, so that managers are fair to their subordinates;
◗ stability of tenure, because of the inefficiencies involved in high employee
turnover. Effective personnel planning reduces employee turnover and
ensures that vacancies can be filled by available replacements;
◗ initiative, enabling managers and employees to initiate and implement their
own plans and so gain commitment from the employees; and
◗ esprit de corps, promoting harmony and unity within the group.
124
Decision theory is a derivation of systems theory that combines natural and behav-
ioral scientific approaches into a quantitative or mathematical systems approach.
125
In the 1970s and 1980s, the so-called New Westerners increased our general aware-
ness of quality issues through publishing them widely. Two of the best-known writers
in this group are Crosby and Peters.
➤ Philip C. Crosby (1926– ) believed that traditional quality control procedures
and tolerance limits for quality are, in fact, failures and that the system for
ensuring quality should focus on prevention and not detection (ie the aim
should be zero defects). This does not imply that no one will ever make a mis-
take, but rather that the company does not begin by expecting mistakes.
➤ Tom Peters (1944– ) suggested that excellent firms were those that believed in
continuous improvement. He identified leadership as being central to the qual-
ity improvement process and he coined the phrase ‘managing by wandering
around’ (MBWA).
Management must develop the skills to lead others to comply, not because they are
forced to, but because they want to.
The traditional view of managers has been of administrators who operate from a
short-term viewpoint to maintain control and generally work within existing norms.
Today’s managers must become innovators who take a long-term view and chal-
lenge the status quo through innovation and development.
group of managers can either completely envisage the environment and all of its
possible changes, or completely control and influence these changes.
Attempting to guess future directions is becoming increasingly hazardous to orga-
nizations. An alternative approach is therefore required to minimize the risk of com-
mitting significant corporate resources to the wrong plans or policies. By building in
flexibility, an organization can significantly improve its ability to survive changes in
the operational environment. A global perspective has ceased to be optional and
must now be viewed as a strategy for survival. Along with globalization has come
the threat or opportunity of advanced technology. Once again, the use of advanced
technology to gain competitive advantage is no longer an option. The business
imperative now is to use advanced technology to prevent competitive disadvantage.
That is to say, if you are not doing it, your competitors certainly are.
One of the most complex issues facing management is the development of prob-
lem-solving abilities.
Although this model has gained wide acceptance, other decision-making models
exist.
39. Harrison, E.F. 1981. The Managerial Decision-making Process. 2nd ed. Boston: Houghton Mifflin.
pp. 53–7 and 81–93.
127
Once again, culture may have an impact on the decision-making process. In many
Western countries, the implicit favorite model is used because, although a manager
may make an important decision intuitively, it is understood that it must appear to
have been reached in a rational and quantitative manner. In many Eastern coun-
tries, only very senior managers are empowered to make decisions, while in many
European countries, lower-ranking employees make operational decisions.
Leadership Styles
The difference between a manager and a leader is one of motivational ability
coupled with the ability to adapt situations rather than simply optimize the group’s
performance within a given situation. Subordinates must become followers and
managers must be clear articulators of the visions that can permit their followers to
attain their goals. Measuring the performance of leaders is, in itself, problematic.
Performance indices may be related to task outcome, but will also include the rat-
ings of operational effectiveness made by superiors, and the ratings of motivation
and satisfaction made by subordinates.
40. Rokeach, M. 1973. The Nature of Human Values. New York: Free Press. p. 5.
41. Alport, G.W., Vernon, P.E. & Lindzey, G. 1951. Study of Values, Boston: Houghton Mifflin.
128
Motivation
Motivational Theory
It is possible to draw direct links among the quality of leadership, job satisfaction
and overall unit or team performance. Leadership behavior using the proper moti-
vational techniques can improve performance, which in turn improves customer sat-
isfaction and loyalty, and can create high levels of unit performance. By motivating
his/her followers, a leader can improve follower job satisfaction, which in turn will
reduce staff turnover. Many of today’s motivational theories of leadership owe their
origins to the human relationship school of thought (see above).
Maslow
Maslow’s hierarchy of needs included:
➤ basic needs;
➤ security needs;
➤ social needs;
➤ esteem needs; and
➤ self-actualization needs.
➤ Basic needs
Individuals who are mainly preoccupied with basic needs are motivated by fulfilling
the desire for food, shelter, etc. In business, such individuals would respond to moti-
vators such as salary increases, pleasant working conditions, more luxury or more
leisure time.
➤ Security needs
Fulfilling the desire for assurance of continuity and continued fulfillment of basic
needs motivates individuals who are mainly preoccupied with security needs. In
business, such individuals would respond to fringe benefits, protective rules and
regulations, pension schemes and tenure protection.
➤ Esteem needs
Fulfilling the desire for recognition and praise motivates individuals who are mainly
preoccupied with esteem needs. Such individuals would respond to motivators such
as opportunities for advancement, recognition based on their merits, assignments
allowing them to display their skills, and inclusion in planning activities.
➤ Self-actualization needs
Individuals who are mainly preoccupied with self-actualization needs are motivated
by the desire for the freedom to be what they are. Such individuals would respond
to motivators such as being able to prove themselves to themselves, the merits of
the work itself, and the freedom to experiment and take risks.
129
Hertzberg
Hertzberg’s theory suggested the existence of both motivational and maintenance
factors.
Motivational factors are those that, if improved, could have a major impact on moti-
vation and performance. These include:
➤ opportunities for achievement;
➤ recognition for personal efforts;
➤ the nature of the work;
➤ opportunities for advancement; and
➤ opportunities to exercise responsibility.
Maintenance factors are those that, if they are acceptable, do not in themselves
motivate; but if they are not acceptable, could significantly demotivate. They
include:
➤ company policies and administration;
➤ supervision;
➤ interpersonal relationships;
➤ working conditions; and
➤ salary, status and security.
Expectancy Theory
Expectancy theory suggests that a person’s willingness to be influenced is primar-
ily control by his/her motivational strength, ie ‘How much effort is it worth making
to achieve the results?’ This in turn is influenced by three major factors, namely:
➤ the perceived value of rewards, or ‘Do I really value the reward on offer?’;
➤ the perceived effort-performance probability, or ‘What is the likelihood I will
achieve my objective if I put in the required effort?’; and
➤ the perceived performance-reward probability, or ‘What are the chances of my
obtaining the reward I want if I satisfactorily complete the job?’.
Job Enrichment
Job enrichment has been shown to increase staff motivation and therefore work
effectiveness by focusing on achieving specific critical psychological states.
Job Enlargement
Job enlargement involves improving motivation by ensuring that all jobs lead to
significant, identifiable results. This is normally achieved by taking a job that only
involves a small part of a process and enlarging it so that a more observable result
is achieved.
Work Stress
Stress can be defined as a condition in which an individual is confronted with an
opportunity, constraint or demand related to what is desired and an outcome that
is perceived to be important but uncertain.
130
Infuencing Factors:
1. Knowledge and Skill
2. Desire for Personal Growth
3. ‘Context’ Satisfactions
Stress is most commonly linked to constraints preventing the individual from doing
what is desired and demands for the loss of something that is desired. Sources of
stress exist within the business environment and include such threats as economic,
political or technological uncertainty. At the organizational level, stress may be
caused by the demands of the task to be carried out or pressure from the role an
individual undertakes. The nature of the organizational structure and leadership
can also increase stress levels. Each individual must also face his/her own personal
stress factors, which are dependent on his/her personality and economic situation,
and also on family problems.
The effects of stress range from physiological symptoms such as high blood
pressure and headaches through to psychological symptoms such as depression
and anxiety, and may eventually result in behavioral symptoms such as reduced
productivity, absenteeism or high staff turnover.
High levels of stress over a period of time can severely affect job productivity and
is therefore seen by senior management as a significant risk factor. Management
can reduce overall stress levels for employees by providing training in realistic
goal-setting, introducing participative decision making, improving the alignment of
individuals to jobs, and generally focusing on the employees’ physical and mental
condition.
Individuals have their own role to play in reducing stress levels. A major cause
of individual stress is poor time management, and improvements in this area can
significantly reduce stress levels. Physical exercise can raise endorphin levels,
131
increase heart and lung capacity, and improve overall fitness, all of which help an
individual deal with stress. Social support can also reduce the likelihood that high
levels of work stress can be damaging to employees.
Performance Management
Performance management can be defined as an ongoing communication process
involving both management and employees in:
➤ identifying and defining essential job functions and relating them to the mission
and goals of the organization (key performance areas);
➤ developing appropriate performance standards and measurement criteria (key
performance indicators);
➤ giving and receiving feedback about performance; and
➤ planning education and development opportunities to sustain, improve or build
on employee work performance.
132
Learning objectives
After studying this chapter, you should be able to:
➤ Identify the various types of business cycle
➤ Identify the functional interrelationships within the supply chain
➤ Identify risks within the supply chain
➤ Recognize red flags which may indicate fraudulent practices within the supply
chain
➤ Structure supply chain audits
➤ Identify the components of payroll and human resource cycles
➤ Structure audits within the human resources function
➤ Identify risks and structure audits within the R&D cycle
➤ Structure audits for the awarding of contracts
➤ Understand the problems inherent in conducting audits of corporate strategic
planning
due. This normally takes the form of acknowledgement of debt by customers and an
assessment of the adequacy of the provision for uncollectible accounts.
Internal audit’s role may take the form of reviewing supply chains including the
strengths and weaknesses in order to validate the corporate monitoring programs.
Additionally, audit may be called on to assist management identifying critical suppliers,
aid with compliance monitoring and improve the strength of risk control procedures.
Among the risks to supply chains are:
➤➤ Supply disruptions
➤➤ Supply delays
➤➤ Inaccurate requirement forecasts
➤➤ Poor inventory holding and accounting procedures
➤➤ Fraud.
The procurement process is by its nature a competitive activity which can operate
effectively only when competitors price independently and honestly. In many
organizations, procurement begins with a tender process which may itself be open to
such fraudulent techniques as price fixing, bid rigging, product substitution and cost
or labor mischarging.
42. Douglas, M.L. (2008), An Executive Summary of Supply Chain Management: Processes, Partnerships,
Performance. Sarasota, FL: Supply Chain Management Institute.
134
Information sought by the auditor in this area will therefore include records of the
requisition and ordering of goods or raw materials to be matched against records
of receipts of the goods or raw materials. Proof will also be sought of the controls
over the issuance of goods or raw materials from inventory as well as store-keeping
procedures to ensure the safety and condition of materials and finished goods held
in store. Inventory records also retain an inherent risk of material misstatement for
135
valuation and this would also be examined by internal audit. Tests of controls within
this area would include:
➤➤ Existence – observation and evaluation of proper segregation of duties and test
procedures for transfer and issuance of inventory;
➤➤ Rights and obligations – checking recorded inventory against both supplies
invoices and goods received notes;
➤➤ Completeness – checking the existence of all purchase orders through sequence
checking as well as their match to receiving reports and vouchers;
➤➤ Accuracy – examining testing procedures for ensuring physical inventory accuracy
as well as the development of cost information;
➤➤ Valuation – testing procedures for the identification of obsolete or slow-moving
inventory items; and
➤➤ Item classification – reviewing inventory classification to ensure compliance with
corporate accounting policies and international standards.
Inventory controls sought by the auditor would include physical controls over
inventory, the use of perpetual inventory records and the proper maintenance and
integration of unit and standard cost records.
The production cycle relates to the processes involved in conversion of raw materials
into finished goods. This includes production planning as well as control of the types and
quantities of goods to be manufactured, maintenance of appropriate inventory levels and
the events and transactions pertaining to the manufacturing process.
The production cycle differs from industry to industry and organization to
organization and the auditor must design an audit program suitable to the needs of
the company. In planning the audit, the auditor will typically take into consideration
the materiality of likely findings, the degree of inherent risk, and the use of analytical
procedures such as inventory turnover days or inventory growth in relation to cost-
of-sales growth. Other ratios produced could include finished goods produced to raw
material used, finished goods produced to direct labor or the percentage of product
defects. Once again, these are management measures but internal audit may do
time-series analysis in order to evaluate changes in control achievement.
136
Auditing within HR can take the forms of compliance auditing to determine the
degree of compliance with external laws and regulations as well as internal policies,
procedures and plans, program-results audits to determine the effectiveness of HR
procedures in areas such as health, employee relations, and performance appraisal
systems through to operational audits in terms of accuracy and completeness of
record-keeping, confidentiality, termination procedures and compensation structures.
It is unusual for all of these audit programs to be performed in one single audit.
Depending on the nature and risk inherent in the corporate use of HR, the audit
would normally be a compliance audit, an operational audit or a program-results
audit and the scope set accordingly.
In examining payroll activities the auditor may use analytical procedures such as
calculating:
➤➤ the average payroll cost per employee classification;
➤➤ the revenue per employee;
➤➤ payroll tax expenses as a percentage of gross payroll;
➤➤ time-series analysis of payroll expenses; and
➤➤ employee benefit expenses as a percentage of gross payroll.
Fraud within the payroll takes a form of payments to fictitious or ‘ghost’ employees,
payments to genuine employees for hours not worked or payments to employees at
rates higher than those authorized. Once again, typical controls the auditor would
look for would include:
➤➤ segregation of duties between the preparation and payment of the payroll;
➤➤ employee authentication on collection of cash sums;
➤➤ proper control and disposition of unclaimed payments; and
➤➤ controls to prevent duplicate payments.
137
money for expenditure in this area. Ensuring that expenditures have been made for
documented and authorized projects would involve reviews of:
➤➤ corporate R&D objectives;
➤➤ budgets;
➤➤ expenditures;
➤➤ documentation; and
➤➤ policies and procedures.
It should be noted that audits in this area are notoriously difficult and that auditors
must restrain themselves from ‘second guessing’ the R&D section and confine
themselves to examining the policies and procedures governing the section and their
compliance. Overall, the auditor seeks to answer the questions:
➤➤ What are the objectives?
➤➤ Are they being achieved?
➤➤ If not, what corrective actions are being taken?
➤➤ What procedures are in place?
➤➤ Are the procedures complied with?
➤➤ Is appropriate project management in place?
➤➤ What controls exist to ensure the intended purpose of the department is being
achieved?
➤➤ Is security maintained on all work-in-progress as well as results?
Contract Auditing
Conducted effectively, improvements in controls around the awarding of contracts
represent an opportunity to reduce risk and save money. As such, a contract audit is
taken to involve the evaluation and verification of the accuracy as well as propriety of
a contractor’s controls, policies and systems.
In order to achieve effective contract audits, certain critical elements need to be
in place including:
➤➤ appropriate executive-level support;
➤➤ the co-operation of both contractor and operational management;
➤➤ inclusion of a ‘right-to-audit’ clause in the contract; and
➤➤ clearly defined and understood audit objectives.
This type of audit is normally done through inspection of account books, transaction
records and operational logs. Over and above the awarding of contracts as noted in
supply chain above, a critical element for the auditor involves ensuring that all terms
and conditions within the contract have been complied with. The most common
reason for conducting a contract audit is to ensure that the contractor has complied
with the pricing structure since contract audits have a history of uncovering clerical
errors, overpayments and credits and debits which have been omitted. In addition to
these financial and administrative issues, the auditor will typically face the scope of
the audit around the perceived risk profile of the contractor and the contract itself.
Risk factors to be considered would include ensuring that:
➤➤ sub-contracted activity is appropriately authorized, effectively managed and
accurately reported;
➤➤ adequate control exists for the protection of customer-owned assets;
➤➤ reconciliations of supplies and materials are carried out in an appropriate manner;
138
Given the nature and size of expenditure covered in contracts within larger
organizations, the Enterprise Risk Management strategy should include contract
auditing as part of the devaluation of compliance with the overall organizational risk
appetite. The size and nature of specific contracts can prioritize them from an audit
perspective. The impact of a contract failure on corporate reputation may raise the
inherent risk factors to unacceptable levels requiring audit acceleration of the risk
to a priority level. Reputational risk can be drastically impacted either positively or
negatively by the perceived:
➤➤ safety of products or services;
➤➤ general quality of products and services;
➤➤ environmental impacts; and
➤➤ viability of strategic sourcing partners.
Contracts which have been evaluated and with a high enough risk rating to warrant
audit intervention should then be analyzed in order to develop the scope of the
audit in terms of potential exposures and areas requiring substantive testing. As with
any other audit, a blend of skills with appropriate knowledge levels of the contract
objectives will typically be required. Where insufficient skills exist in-house, internal
audit may draw upon external sources to supplement the audit team. The sources
could include operational areas within the organization, external audit service
providers or consultants or, where the need for such expertise will be ongoing,
recruitment or development of additional audit skills.
139
the business plan, alignment with the corporate objectives and to establish the
probabilities of the existing plan succeeding.
Business processes can then be mapped against the plan in order to determine
their strategic importance as well as resource requirements and measurement criteria
in respect of specific milestones as the plan progresses. Deficiencies identified in
the plan itself may point to deficiencies in the planning process. Over-optimism
regarding timescales and abilities, under-estimation of resource requirements and
guesswork in terms of the industry environment can result in a plan which looks ideal
on paper but where the probability of attainment is very low. Recommendations
under these circumstances would normally take the form of improvements to the
planning process and a recommendation that management revisit the plan using the
approved planning process.
140
Negotiation Skills
Learning objectives
After studying this chapter, you should be able to:
➤ Outline briefly the negotiating process
➤ Explain the conflict process and differentiate between functional and dysfunc-
tional conflict
➤ Explain the role of trust in effective negotiation
➤ Define the structure of negotiations from an internal audit perspective
➤ Identify the steps involved in carrying out a successful negotiation
➤ Explain potential roles of an internal auditor in acting as a third party during
organizational negotiations
Negotiation
Negotiation has been defined as ‘a process of interaction between parties directed
at achieving some form of agreement that will hold and that is based upon common
interests, the purpose of resolving conflict, despite widely dividing differences’.43
This involves an exchange of information in order to establish common ground and
create alternatives.
43. Spoelstra, M. & Pienaar, W. 1996. Negotiation Theories, Strategies & Skills. 2nd ed.
Cape Town: Juta. p. 3.
Once all preparations have been completed, negotiations can take place.
142
it is at this stage that the negotiating group may achieve cohesion and begin work-
ing as ‘we’ rather than ‘I’. When cohesion is achieved, constructive negotiation
and problem resolution can follow. The final stage of negotiation is closure – an
agreement is reached and future progress is approved.
Power
The outcome of negotiations will be strongly affected by the perception of the rela-
tive power of the negotiating parties. Where both parties perceive parity in power,
constructive negotiation is more likely to follow. Where there is a disparity, the pos-
sibility exists that the more powerful party will attempt to dominate the weaker one.
Power itself takes many forms.
➤ Legitimate power stems from someone’s ability to influence the negotiations
because of his/her authoritative position. Organizational rank is obviously
important here.
➤ Reward power stems from someone’s ability to reward compliance by another.
This may be a factor of legitimate power in that an organizational superior may
have the ability to promote, provide resources or offer financial inducement.
Reward power may take the form of intangible rewards such as praise, compli-
ments, eye contact, visible indications of agreement or praise for past perfor-
mance. Flattery is an example of the use of reward power.
➤ Coercive power is someone’s ability to punish another for non-compliance. It
143
is the opposite of reward power. This power is based on the fear by the vic-
tim that negative sanctions will be imposed. Coercive power can be an effec-
tive tool for short-term gains; however, reward power is more likely to deliver
long-term and sustainable results.
➤ Expert power is the power of someone who possesses expertise that is highly
valued by another. When someone is believed to be an expert in a particular
field, argument is less likely. If someone displays a lack of confidence in his/her
own opinion, disagreement and argument often follow. Expert power is the
power base from which auditors normally operate.
➤ Referent power involves the desire to be associated with someone or with their
opinions because of their personality or charisma. Parties to negotiation may
be strongly influenced by referent power when strong personalities are involved.
➤ It may seem like a contradiction in terms, but there can also be power in weak-
ness. Situations can be manipulated by invoking sympathy or feelings of guilt
within the other party. Children exploit their own vulnerability in negotiations
with parents about bedtimes or the buying of gifts and treats. In business nego-
tiations, this can also be an effective tactic on the basis that ‘You are so big,
you can afford it’ or ‘You have exploited us in the past’.
Power can be countered by trying to achieve parity with the other party. An effec-
tive way of achieving this may be to collapse your own power base. This involves
one party intentionally assuming the inferior position in order to prevent the other
side escalating their power base further. By simply apologizing for an acknowledged
wrongdoing, one party may be able to defuse the situation and prevent further
escalation.
It is important for negotiators to understand power, the use of power, sources of
power and how power may be countered.
Persuasion
Given that common ground has been found but that differences still exist, the
opposing party in a negotiation must be influenced so that the common ground is
increased because, very clearly, an amicable agreement has to be achieved before
negotiations can be completed. Negotiators will often encounter an opposing side
with strong attitudes about the issues under discussion. Under such circumstances,
a negotiator will have to start building a case with arguments that no one strongly
disagrees with, and continue to build it piece by piece until it has been made. This
is basically what persuasion is all about. Starting the negotiation with radical state-
ments is a high-risk tactic, even if the statements are true for you.
Negotiating Conflict
Himes44 defines social conflict as ‘purposeful struggles between collective actors
who use social power to defeat or remove opponents and to gain status, power
resources and other scarce values’.
Some conflict can be healthy in any relationship. Without conflict there can be
no negotiation. However, conflict can be dysfunctional and significantly hinder the
44. Himes, J.S. 1980. Conflict and Conflict Management. Athens: University of Georgia Press. p. 14.
144
achievement of the goals of both parties. The point where co-operation breaks
down and the generation of alternative solutions ceases is normally taken to be
that at which dysfunctional conflict has begun. In dysfunctional conflict, escalation
will result in mutual attacks and efforts to destroy the other party. Misjudgments
and misperceptions are magnified and the ability to survive may be jeopardized.
The probability of successfully achieving the participants’ goals will certainly be
compromised.
Conflict originates in differing goals, scarce resources, imbalances in power or
ambiguity. Such conflict can be moderated or aggravated by the tactics employed
within the negotiation. Individuals’ aspirations and perceptions, coupled with the
history of their relations (which can be good or bad), can increase or decrease the
potential for conflict. Conflict behavior may range from termination of relationships
through coercion to physical violence.
Interviewing
For an auditor, interviewing is a critical communications process. Often, you will
be in a position of receiving information in an interview, and therefore have a
responsibility to listen carefully. This is not as easy as it sounds. When dealing with
a series of interviews, it is difficult to maintain your focus. Listening is an active
function and it is an acquired skill. And, generally, we have a lifetime of bad habits
to overcome. Poor listening habits include losing your concentration by becom-
ing impatient with speakers, or simply allowing minor annoyances to distort their
message. This usually results in your interrupting the speaker in order to make
your point, instead of listening as a good receiver should. Boredom can lead to
‘scanning’ what is being said. In effect, you stop listening unless you hear a key
word that interests you. You may also allow yourself to be distracted by personal
priorities, prejudging of anticipated information or even taking dictation (ie writing
down every word heard, without trying to understand what is being said).
It is difficult to develop good listening habits, and, in particular, to maintain
interest in an otherwise boring information transfer. Nevertheless, you can learn
to encourage the person you are speaking to with non-verbal support (nods of the
head, paralinguistics, etc). In addition to giving non-verbal support, you can also
be alert to non-verbal behavior such as body language, gestures, etc. Summarizing
and recapping what has just been said gives the sender the message ‘I am listening
and I understand’. You must learn to be sensitive to the clues in the message the
sender is broadcasting and to be non-critical when you are evaluating the informa-
tion you are listening to.
In preparing for an interview, you must clarify in your own mind the aims and
objectives of the interview. The interview may be taking place for you to gain
knowledge or confirm facts. It may be intended to impart knowledge, to persuade
or to assist an auditee to make a decision.
145
research on the interviewee. By doing this, you can be aware of any of the inter-
viewee’s special requirements or priorities before the interview actually starts.
➤ The first phase of the interview is the introduction. During this phase, you
should try to relax the interviewee by establishing a rapport and removing, as
far as possible, any fears that the interviewee may be suffering from. For exam-
ple, by smoothing the status fears during diagonal communication, you may be
able to relax the other party and improve the discussion.
➤ When the interview is actually under way, you should set the scene. During this
phase, the interviewer may do most of the talking. The background, goals and
objectives of the audit or interview need to be explained. However, this phase
should not dominate the interview. Some auditors find visual aids such as dia-
grams, charts or even photographs may help here.
➤ Questioning may be structured or unstructured. A structured interview may
adopt the checklist approach, in which the interview follows the structure of
‘what happens next’. An alternative to sequential checklists is the less struc-
tured objective-based approach where questions are sequenced by business or
control objectives. This can keep the interview focused on the key perspectives
from your point of view, but can be disjointed in attempting to ensure that all
stages of a process have been covered.
The questions themselves should be open-ended, which basically lets the
interviewee set the direction the interview will take. This normally happens
when you have no background knowledge. Open-ended questions typically
begin: ‘Tell me about...’; or ‘Explain to me how…’. ‘Yes or no’ questions may be
conversation stoppers and eventually cause the interview to grind to a halt.
A useful technique is the hypothetical question. This would be along the lines
of: ‘What would happen if you were sick and a relief manager was brought in
to replace you?’ You should be aware that multiple choice questions may well
result in the answer the interviewee thinks you would like to hear.
Often in everyday conversation we anticipate the answer to a question and
start to formulate the next question before the first one is fully answered. In
an extreme case, this can make it obvious to the interviewee that you are not
listening. You must learn to listen, evaluate and perhaps modify your approach
based on the answers given. Paraphrasing or summarizing can leave the inter-
viewee with the impression that you have listened and understood.
➤ At the end of the interview, you should conclude by answering any final ques-
tions the interviewee might ask, explaining what will happen next and allowing
the interviewee to make any final statements. Common courtesy dictates that
you should thank the interviewee and make your farewells. Remember that,
even at this stage, a parting word from you, taken out of context, could be mis-
interpreted.
➤ Once the interview is concluded, you must document any salient points that
arose. Decisions taken or comments by the interviewee leading to new knowl-
edge must be recorded. If the interview involves a team of auditors, one of
them should be designated as the minute-taker to ensure that the permanent
written record of the meeting documents the facts as the team understands
them.
146
Negotiating/Interviewing as a Consultant
In some cases, auditors may find themselves negotiating in the role of a consultant.
There is an old saying: ‘Those who can, do; those who can't, consult’. So when you
are acting as a consultant, establishing credibility up front is critical. Consulting is
not simply a matter of offering advice. You can be a highly effective consultant sim-
ply by listening and permitting the auditees to talk through their problems and find
their own solutions. Above all, consultancy requires a non-judgmental approach.
As a consultant, you can be a supporter of management or a recommender of
action. This is probably the most common audit role in consulting. To carry it out
successfully requires you to be very confident about your abilities, since acting as
a catalyst for change will require the breaking of old bad habits. You are then in the
position of trying to move the auditee out of a comfort zone and may encounter a
great deal of resistance. Allowing the auditee to find his/her own solution if agree-
ment can be achieved on the problem may be more effective and less stressful for
both parties. From time to time, you may have to take the role of instructor or edu-
cator on good business practices. If this necessary, you must be sensitive to the fact
that you may not always be right and that the management team itself may have
some thoughts on what is good business practice for its particular business.
147
Learning objectives
After studying this chapter, you should be able to:
➤ Outline briefly and differentiate the nature and type of internal audits that
may be requested:
◗ Compliance audits
◗ Performance and operational audits
◗ Environmental audits
◗ Financial audits
◗ Fraud audits
◗ Quality audits
◗ Program results audits
◗ IT audits
◗ Audits of significant balances and classes of transactions
➤ Explain the effect of the nature of the audit on the skill mix required and the
timing of the audit
Compliance Audits
Compliance audits are carried out in order to determine whether a business entity
has complied with specific policies, plans, procedures, laws, regulations or contracts
that affect the organization. In order to successfully complete a compliance audit,
there must be established criteria against which the compliance can be measured.
Financial Audits
During a financial audit, an auditor looks for evidence relating to the reliability and
integrity of financial information. Within a financial audit, the normal measurement
criteria against which historical financial information is evaluated are recognised
financial reporting frameworks (the IFRS). When such audits are conducted by an
internal auditor, the information is normally intended to be used by management
for internal decision-making purposes. Under these circumstances, the audit may
include both operating and financial data. Financial audits normally include both a
review of the accuracy and completeness of the numbers themselves and an evalu-
ation of the adequacy and effectiveness of the controls that management have
implemented to safeguard assets.
These could include controls to ensure that the organization receives all funds to
which it is entitled, that the funds are adequately secured and maintained, and that
they are appropriately spent for authorized purposes.
Auditing of financial statements is directed at assessing the accuracy of financial
reports relating to financial conditions and operating performance. This form of
auditing is usually associated with external audit and includes ensuring the fairness
of financial reporting.
The term ‘operational audit’ is commonly used to cover a variety of audit types. An
operational audit may cover the evaluation of some or all of:
➤ internal controls;
➤ compliance with laws, regulations and company policies;
➤ the reliability and integrity of financial and operating information; and
➤ the effective and efficient use of resources.
Environmental Audits
Environmental auditing emerged as a compliance management tool in the USA in
the late 1970s. This was an era of rapidly expanding environmental regulation and
a number of highly publicized incidents of environmental pollution. While there is no
single, universally accepted definition of environmental auditing, there is broad con
sensus on what environmental auditing consists of and what it tries to accomplish.
Environmental auditing has been defined as a systematic, documented, periodic and
objective review by regulated entities of facility operations and practices related
to meeting environmental requirements. The development of environmental audit-
ing was further spurred by actions of the US Securities and Exchange Commission,
which in the early 1970s began to require companies to disclose significant costs of
complying with environmental standards.
During a typical environmental audit, a team of qualified inspectors conducts a
comprehensive examination of a plant or other facility to determine whether it is
complying with environmental laws and regulations. The team systematically verifies
compliance with applicable requirements using professional judgment and evalua
tions of on-site conditions. The team may also evaluate the effectiveness of systems
in place to manage compliance and assess the environmental risks associated with
the facility’s operations.
Effective environmental audit programs have a number of characteristics in com
mon. They require the strong support of their organization’s management. They
also require adequate allocation of resources to hire and train audit personnel. In
addition, to be effective, audit programs must operate with freedom from internal or
external pressure and employ quality assurance procedures to ensure the accuracy
and thoroughness of audits.
152
Fraud Audits
Fraud auditing involves assisting management in the creation of an environment that
encourages the detection and prevention of fraud in commercial transactions. This
may involve assisting in setting the standard for the organization with an appropriate
code of conduct and conflict-of-interest policy.
153
Quality Audits
Quality auditing may be defined as a systematic and independent examination to
determine quality-related activities are implemented effectively and comply with the
quality systems and/or quality standards.
Quality assurance (QA) is usually an ideology or set of aspirations that put quality
at the center of an organization. Unfortunately, the implementation of QA systems
seldom attains the ideal of achieving a quality-based corporate culture. In practice,
QA is normally left to managers to impose on employees by a new class of super-
visory regulators. In ineffective installations of QA programs, a throwback can be
seen to the early days of management science with the creation of bureaucratic
controls.
As seen by auditors, QA cannot be directly equated to assuring ‘quality’ in the
normal sense of the word synonymous with ‘excellence’. Quality auditing is a tech
nical term for auditing that is focused on systems and processes rather than out
comes. This follows the corporate governance concept that the properly constitut
ed organization should be based around a system of well-controlled systems and
processes.
Quality auditing has become associated with older forms of management of qual
ity such as TQM. As such, quality auditing is associated with quality enhancement
strategies rather than the traditional quality control inspections. Quality enhance
ment focuses on creating a corporate culture centered on quality, as opposed to
quality control, which was a reactive process after the event, and involved rejecting
sub-standard products and services.
If quality is viewed in terms of the appropriateness of systems and processes
rather than the more traditional achievement of the correct outcomes, auditing
moves from the necessity of having to define best practice and desirable outcomes
to evaluating the quality of the processes themselves. Defining the key performance
indicators has always been a contentious point in negotiating with management for
the audit. Reaching agreement on standard systems of practice is normally consid
erably easier, since little interpretation is required. From this, it follows that a prop
er organizational structure is comprehensively systemized and documented, and is
therefore fully auditable.
154
IT Audits
IT audits come in a variety of forms that are fully covered in Section 5. Furthermore,
any of the above types of internal audit could involve the use of computers or, for
that matter, the audit of computer systems.
Application Audits
Application audits such as the auditing of inventory, payroll, procurement, sales,
treasury and other specific business functions have their own specific characteris-
tics and the audit program will typically involve a certain degree of standard audit
tests, as in the examples below.
Payroll Audits
With payroll processing involving the disbursement of corporate assets, control
within this area is normally seen to be critical. As such, the auditor would examine
the current payroll procedures in order to ensure the proper separation of duties
exists and a proper supervisory control is exerted. Payroll records would be veri-
fied against original authorized transactions, for example overtime claimed, and the
accuracy of calculations determined by re-computing totals. The adequacy and fre-
155
quency of bank reconciliations would be determined and the error procedures for
handling discrepancies examined. The auditor would usually also seek to determine
whether duplicate checks had been cleared of whether checks were still outstanding
on the bank account.
Procurement Audits
Procurement audits usually seek to determine that corporate procedures for pro-
curement have been complied with in the areas of procurement procedures and
related documentation, authorization, purchase orders, receiving and inspection
and to ensure that the items procured are authorized, of appropriate quality, at
an agreed price, delivered to the correct place at the correct time and have been
procured from an authorized supplier. They may also seek to determine that the
purchasing function adequately addresses the needs of corporate users. Where
procurement involves a competitive bidding process, further audit tests may be
required to evaluate the process itself in order to ensure that no bias is introduced
into the contract awarding process. It should be noted that most organizations have
a separate procedure for the acquisition of minor items permitting the bypassing of
normal procurement procedures but this should be the exception rather than the
rule. arget achievement can also be reviewed, as can the degree to which achieve-
ment is successful.
Where commission payments are made based upon achievement of sales targets,
the auditor may further seek to determine that all payments are entitled to by the
person receiving them, payments have been accurately calculated and paid in a
timely and appropriate manner.
Control over sales based on credit may additionally involve the auditor in determin-
ing the procedures used to determine credit limits and creditworthiness of a customer
as well as those controls in place to recover debt in an acceptable time scale.
Treasury Audits
Audits of the treasury function involve three main areas: the front office, the back
office and general management. The front office, where the deals are made, nor-
mally requires that security be maintained over the dealing area and that all deals
are properly authorized to organizational standards and are within dealings limits.
Deals themselves must be recorded accurately and completely and proper controls
over the accounting for deals must be maintained. Within the back office, where the
recording of deals takes place, the processing of deals is of paramount importance
as is the recording of payments and reconciliation of deals to accounting records.
General management must ensure the appropriate segregation of duties between
front and back office and over incompatible duties within each.
156
Planning
Internal auditors must gain a thorough understanding of the client’s business objec-
tives and co-develop the expectations regarding internal audit’s alignment with
these business objectives. A mutual understanding is required of the scope of the
internal audit services among internal audit management, executive management,
the audit committee or board of directors, and the operational management of the
organization.
Risk Assessment
Once the business objectives have been clarified, there must be an assessment of
risks that potentially limit the achievement of the organization’s business objectives.
Many audit departments prefer to accentuate the positive aspects rather than stress
the negative effects of risks. As such, they may prefer to look on this phase as the
establishment of control objectives. The implication here is that if, for example, the
loss of confidentiality of client records is a major business risk, then the maintenance
of confidentiality would be a prime control objective. This will probably involve the
internal audit function in developing a risk assessment of the more important pro-
cesses and organizational components.
This risk assessment process establishes inherent risk (ie the risk level if there
were no controlling elements). Risk priorities for the auditable units form the pri-
mary, but not, only, basis for the allocation of audit frequencies in the audit plan.
Such a risk assessment would be reviewed and approved at least annually by the
client’s executive management and the audit committee.
Based on this, the functional area to be audited can be selected and the individual
audit process can start.
EXECUTION
Technique
Audit Programme
Preparation
Tool
REPORTING
Report Report
Follow-up Follow-up
EVALUATION
Evaluate Audit Evaluate Audit
Process Process
158
Audit Planning
In order to ensure a quantifiable probability of being able to achieve the audit
objectives, proper planning must take place to optimize the use of the scarce and
expensive internal audit resources. The audit plan identifies the individual audits to
be carried out during the period, the skills and resources required to execute the
audits, and their timing and duration.
Execution
Internal auditors carry out the audits of auditable units as set forth in the audit
plan. They may focus on the specific risks to the control objectives for that audit-
able unit. Even the agreed control objectives, however, may have to change as the
audit progresses.
Controls to manage the risks (preventative, detective, corrective and directive)
are identified and evaluated on the assumption that all controls function as intend-
ed. This permits an auditor to evaluate the theoretical adequacy of the system of
internal controls, ie if the controls function as intended, and if there is sufficient
control to reduce risk to a level acceptable by management.
Once the adequacy of control has been evaluated, the auditor proceeds to select
those control elements that are especially critical to adequacy of control. These key con-
trols are then tested to determine the effectiveness of the system of internal control.
It should be noted that the source of evidence of the effectiveness of a control might
not lie in the control itself. A lock and key on a door does not provide evidence as to
whether anyone ever turns the key or how many keys there are. A proper focus on
the objective of the control (a lock to keep people in, or a lock to keep people out)
can direct an auditor to other sources of evidence regarding the effectiveness of the
control. Is any record kept of strangers found in areas they are not allowed to be in,
159
for example? Typically, these sources of evidence will provide information about the
effectiveness of several controls simultaneously (locks, walls, bars, etc).
Evaluation
The final stage of the process is the evaluation phase, in which the auditors conduct
a quality assessment on their process in order to refine the audit process for future
audits. The objective is to determine what went right, what went wrong and what
lessons can be learned for the future.
These steps will now be discussed in greater detail.
160
of specific business functions will also help. Further information and confirmation
may be derived by comparing the current understanding of the controls to those
identified and in operation during previous reviews.
The KPAs are those activities that will make or break the organization.
161
Controls have to be frequently reviewed for ongoing relevance and for their effective-
ness, and must be modified and adapted where required.
162
5. The auditor, after deciding on the techniques, will select the appropriate meth-
odology or tool, such as interviewing, use of generalized audit software, use of
questionnaires, etc.
6. When the auditor has selected all the techniques and tools he/she will use, he/
she will conduct the tests in a structured format.
7. The evidence gathered would be evaluated against the standard of the evi-
dence sought in step 3, above. Depending on what has been found, the auditor
is in a position to decide whether the control objective has or has not been
achieved, and will or will not continue to be achieved.
8. The results of the evaluation, together with the substantiating evidence, the
auditor’s opinion and conclusions, and the appropriate recommendations will
be presented to management in the form of a formal audit report.
9. Agreed actions will be followed up to ensure they have been implemented or
that the risk of non-implementation has been accepted by the appropriate level
of management.
10. The audit process is concluded by an evaluation of the audit process itself in
order to refine it for future audits.
Planning
This phase consist of three main activities, namely:
➤ selection of the auditee;
➤ audit preparation; and
➤ the preliminary survey.
Audit preparation
Once the audit area has been selected, audit preparation must be carried out to
clarify:
➤ the overall business objectives of the area;
163
For each area, an auditor must determine the key performance areas, which are the
areas whose performance can make or break the operation, as well as the associ-
ated control objectives for each KPA. These could involve any of the general control
objectives, such as:
➤ control over assets;
➤ the reliability and safeguarding of information;
➤ compliance with policies, etc; and
➤ the effectiveness and efficiency of operations.
An auditor can usually determine the business and control objectives by reviewing
past working papers, talking to other auditors, determining the existence of corpo-
rate guidelines and standards, and verifying against industry norms where possible.
Preliminary survey
The preliminary survey enables the auditor to confirm the understanding he/she has
gained within the audit preparation section. In the event of this being the first audit
of an area, the two sections can be combined. In any event, the auditor should use
this opportunity to identify sources of information and contact personnel for the
detailed testing stage. At this stage, also, the auditor should start to gain a prelimi-
nary feel for the expected level of internal control.
Also, the detailed audit objectives, timing, reporting schedule, etc, will be con-
firmed with the client.
Execution
The execution phase contains three activities, namely:
➤ control description and analysis;
➤ preparation of the audit program; and
➤ expanded tests of control systems.
164
Often all four control objectives will form part of the audit, while limited audits such
as a fraud investigation usually result from a specific complaint.
➤ Controls may be designated as preventative, detective, corrective and direc-
tive, and a combination of all four types is usually required. Their adequacy is
determined by taking each control objective and determining which controls are
believed to assist in the attainment of the control objective. Such information
may be derived from discussions with auditees and management, and reviews
of standards and procedures to establish what is supposed to happen.
➤ Assuming the controls function as intended, the auditor must determine wheth-
er there is sufficient control to bring the level of the risk of non-achievement of
the control objective to that specified by management. If this is not the case,
recommendations will normally be made to increase the level of internal control
by either adding additional controls or by transferring the risk.
➤ Once the control structure has been found to be adequate, the auditor must then
determine where the evidence can be found that the controls actually function as
intended: which records, which personnel and which computers. From this, he/she
can establish how the evidence can be obtained: by examination, analysis, inter-
views or data interrogation. A detailed schedule of which controls will be tested,
how, and seeking what evidence, makes up the detailed audit program. It should
be noted that the audit program is always preliminary and may be changed,
depending on what is found when testing actually gets under way.
165
Audit Testing
Audit testing for purposes of gathering audit evidence may take many forms, as
discussed in detail in Chapter 19, to which the reader is referred.
Evaluating
Evaluating is the estimation of worth and arriving at a judgment. It involves conclu-
sions drawn from facts accumulated and is the basis for professional judgment.
Audit measurement is normally for comparison to a standard such as time taken
for a task or rejection rates in manufacturing. If there are no published standards,
an auditor may have to develop them. In these cases, the standard should be
based on the operation objective and the auditor's experience. Such standards
should be verified with a qualified expert before any evaluations are carried out.
Recommendations
Recommendations come in four forms:
➤ Make no changes.
➤ Increase internal control.
➤ Transfer risk.
➤ Change the required rate of return for a given risk level.
The recommendations selected may be made in conjunction with the auditee; how-
ever, the recommendation is ultimately the auditor's.
Reporting
This phase of the audit contains three activities, namely:
➤ the development of findings;
➤ reporting; and
➤ follow-up.
166
These activities map to steps 7, 8 and 9 of the generic audit process, given above.
Reporting
Reporting includes documenting and communicating results, and the reputation of
both the auditor and the internal audit function rests largely on the final report. As
a general rule, audit reports should contain:
➤ audit objectives;
➤ scope;
➤ questions;
➤ general procedures;
➤ findings; and
➤ recommendations.
Follow-up
If nothing happens as a result of the audit, the whole exercise was a waste of time. A
follow-up must be done to investigate, evaluate and report the effect of the audit. This
follow-up may be performed by executive management, in conjunction with auditees,
by another auditor, or the original team may do it, but it MUST be done.
167
The auditors must find out what action was taken and whether it was appropriate.
Follow-up reports are normally directed to those who received the original report,
and the key focus must be on the attainment of the control objectives, not neces-
sarily on the implementation of audit recommendations.
Audit Evaluation
The final phase is the same in both the generic audit process and the audit process
structure, namely audit evaluation.
This involves the auditors evaluating the audit process itself in the light of what
went wrong, what went right and what can be learned to improve future audits.
168
Learning objectives
After studying this chapter, you should be able to:
➤ Outline briefly the types of internal control an auditor is liable to encounter,
together with their strengths and weaknesses
➤ Differentiate between control objectives and the controls policies and
procedures intended to assist management in achieving them
➤ Design an appropriate detailed audit program to evaluate both the adequacy
and effectiveness of the internal control structures to an appropriate level
➤ Identify and select the critical controls for testing and select appropriate
testing methods
Internal Controls
While it is clearly management’s responsibility to design and implement internal
controls in an organization, the role of the internal auditor is one of assessing and
reporting on internal controls for a variety of different purposes. This responsibil-
ity is captured in the guidance in IIA Practice Advisory 2120.A1-1: Assessing and
Reporting on Control Processes.
A control is any action taken by management to increase the likelihood that the
objectives and goals they have established are achieved. It results from manage
ment’s planning, organizing and directing and the many variants (eg management
control, internal control, etc) can be included in the generic term.
Management controls are intended to ensure that an organization is working
towards its stated objectives.
Control responsibility is clearly management’s job and encompasses planning,
organizing and directing.
➤ Planning in this case is taken to mean the establishing of objectives and goals
as well as choosing the preferred methods of using resources.
➤ Organizing involves the gathering of the required resources and arranging them
so that the objectives may be attained.
➤ Directing includes the authorizing, instructing and monitoring of performance,
as well as periodically comparing actual to planned performance.
If we take operating objectives, for example, these direct the day-to-day activities
and may, in themselves, conflict, so that we find a conflict between the need for
control and the need for timeliness, ie there is a clash between efficiency and effec
tiveness. The overall prioritization of objectives directs the development of controls
and will affect the final, overall system of controls.
If the overall objectives are growth and providing service, in a dynamic and rapid
growth environment control systems may not keep pace and the risk is higher. As
such, the need for frequent audits is increased. If the objective is cost reduction, in
a stable environment control systems should be stabilized and risk is lower so the
frequency of audit would be reduced.
In practical terms, it is impossible to evaluate the adequacy of an internal control
or a set of internal controls unless the control objective has been clearly defined.
Unless it is known whether the lock on the door is designed to keep people in or to
170
keep people out, no valuation can be made of which side the key should be on. A
control objective is therefore a statement of intent, which controls are designed to
assure. Another way to look at this is to see control as the other side of the coin to
risk. If there is a risk of theft of assets, the control objective is then to ensure that
assets remain safe.
Cost/Benefit Considerations
Objectives must take into consideration the cost of trying to achieve them. ‘As quick-
ly as possible’ implies zero controls other than for speed, while ‘No rejects’ implies
strong internal controls covering all aspects of quality. Controls must be practical,
useful, achievable and compatible with both operating and control goals, and there
is always a trade-off between cost and benefit, since all controls cost money (is it
worth spending R200 to prevent a possible loss of R100?).
A control cycle is set out diagrammatically in Figure 18.1.
171
Safeguarding of assets
Normally the most visible controls include:
➤ locks on doors;
➤ safes; and
➤ security guards.
172
Under-control is cheap to implement but may cost you the organization, while over-
control is expensive and paralyzing.
173
174
Engagement Planning
Learning objectives
After studying this chapter, you should be able to:
➤ Describe the planning procedures that should be followed for each audit and
the factors that affect planning decisions
➤ Describe the procedures conducted in the preliminary survey of operations
➤ Explain how an internal auditor develops findings and recommendations from
the audit work performed
➤ Outline briefly the tasks of an audit supervisor in planning an individual audit
engagement
➤ Explain the techniques the supervisor may use to ensure the audit
engagement is proceeding to plan
➤ Define and explain the control techniques available to the audit supervisor in
controlling the engagement project
➤ Explain the ongoing nature and role of internal audit quality evaluation in
ensuring an effective service delivery
Engagement Planning
IIA Practice Advisory 2200-1: Engagement Planning sets out clearly the responsi
bilities of an internal auditor as follows.
‘The internal auditor is responsible for planning and conducting the engagement assign-
ment, subject to supervisory review and approval. The engagement program should:
➤ Document the internal auditor’s procedures for collecting, analyzing, interpreting,
and documenting information during the engagement.
➤ State the objectives of the engagement.
➤ Set forth the scope and degree of testing required to achieve the engagement
objectives in each phase of the engagement.
➤ Identify technical aspects, activity objectives, risks, processes, and transactions
that should be examined.
➤ State the nature and extent of testing required.
➤ Be prepared prior to the commencement of engagement work and modified, as
appropriate, during the course of the engagement.’
Planning
Planning is the cornerstone of successful auditing. Poor planning will result in fail-
ure to achieve audit objectives, as well as audits that are insufficient in scope with
unidentified risks and that make inefficient use of resources.
Basing planning on the nature and scope of the work to be performed ensures the
efficient and effective use of audit resources. A structured, documented audit plan
is essential to establish the criteria against which an audit will be measured and to
identify the measurement criteria. The extent and division of the planning process
will be dependent on the nature and complexity of the audit envisaged. If it is the
first time a specific area has been audited, more time will be required in the plan
ning process to handle a greater variety of unknown elements. If the area has been
audited in the past, time must be set aside to ensure that there have been no major
changes to structures or controls in the interim.
Such planning helps to establish the objectives and scope of the audit, anticipate
problems and achieve flexibility in identifying the control objectives and risks, as
well as the controls designed to achieve the objectives and manage the risks. The
planning process will typically follow the structure provided in Chapter 17 and
should cover all of the steps in the process. At any time up to the completion of
the audit, the plan should be looked on as provisional and subject to amendment,
depending on what is found. If a straightforward compliance audit uncovers red
flags of fraudulent activity, a choice must be made as to whether to continue with
the original audit or redesign it as a fraud investigation.
Where planning has been inadequate, it is much less likely that the full scope of
the audit will be achieved in a cost-effective manner.
It is very unwise to underestimate the time it takes to carry out comprehensive
planning. It should be done early enough in the process to ensure that the appro
priate resources can be made available and that the techniques of testing envisaged
are fully understood by all concerned. Once again, planning should be viewed as a
continuous process, with elements covering both the annual planning for the audit
function as a whole and the planning of the individual audit.
The annual audit plan is normally based on the overall risk assessment of the
organization, coupled with an inventory of the available audit resources. Any meth-
odology used to allocate audit resources must be applicable to a variety of lines of
business and services that firms offer.
The allocation itself can be simplified into mandatory audit activities and discre
tionary audit activities:
➤ Mandatory audit activities are those activities that must be carried out within the
time span of the audit plan. These activities could be to ensure compliance with
legal or regulatory requirements, senior management requirements or external
auditor liaison requirements. Usually these activities are assigned the greatest
risk values and are therefore automatically selected. Make sure that senior man
agement requirements are in fact requirements and not simply nice to have.
➤ Discretionary audit activities must then be allocated within the time remaining.
This is normally done within predefined risk limits.
176
Many audit departments maintain a five-year rolling plan of audit coverage reflecting
the complete audit universe. This plan is updated annually as part of the over-all
planning process and is maintained throughout the year to reflect ongoing changes
within the organization and its risk environment.
Detailed planning for each audit assignment is also carried out annually. Each
auditable entity scheduled for audit in the forthcoming year is analyzed so that any
component of the audit that requires advanced planning may be dealt with. Items
such as special support, access to information systems, co-ordination with other
audits and advanced training may then be planned as need requires. The actual
audit itself will be planned and conducted in the way given in Chapter 17.
The individual tasks that must be scheduled as part of the audit process will
involve notifying management of the audit prior to the starting date and obtaining
any information required to complete the audit planning. This information, together
with any records required as part of the planning process, should be delivered to
the supervising auditor before the start of the work. As part of the planning, con
sideration may be given to whether any records should remain under the control of
internal audit once management have been notified of the impending audit.
A key part of the planning process is to ascertain those records and individuals
that will enable an auditor to identify key controls and procedures that could have a
significant impact on the focus of the audit and the key controls to be audited. This
would involve the auditor reviewing previous working papers and any permanent
files maintained by internal audit in order to find relevant information. If the area
has been audited by the independent external auditors, they may be consulted to
give their input to the planning process.
An initial meeting with a client will be planned to confirm the auditors’ under
standing of the business and control objectives of the auditee entity, and the cur
rent operating environment. At that meeting, the auditor should ask about any
current business and operational plans that will affect the audit or the time period
to be commented on within the audit. Scrutiny of the operating objectives and
forthcoming budget for the area under review may help. The auditor may also look
for any external factors such as unique legal or regulatory requirements that could
influence the timing, extent or nature of the audit.
Although nominally part of the annual plan, in practice the general risk assess
ment is performed during both the annual audit planning process and during the
preliminary survey phase of the audit. The auditor in charge should review the annu
al planning documentation to familiarize him-/herself with the information contained
in that document and integrate it into the present audit plan.
Based on an agreed understanding of the auditee’s business, the next stage to
be planned is the identification of those controls that the auditee believes can be
relied on to mitigate the business risks. Key internal controls must be identified
and methods of deriving evidence as to the adequacy of these controls must be
designed. At this stage, an auditor must always bear in mind that assessing their
adequacy involves evaluating the controls as if all were working fully. It is only after
the adequacy has been evaluated that the key internal controls can be selected
for testing. If the system of internal controls itself is inadequate, ie it does not
adequately reduce the risk to an acceptable level, recommendations will be made
at this stage to improve the control situation. This normally involves the design of
new controls to plug the gap not currently covered.
177
Once the adequacy of the system of internal control has been determined, the
planning will proceed to those tests needed to assess the effectiveness of the chosen
controls. In addition to testing the controls as they currently operate, the auditor
may need to schedule time to test the consistency with which the controls were
applied throughout the time period under review. Planning this stage is a critical
element, which provides a transition into the fieldwork phase of the audit. Once the
methodology for testing the key controls has been established, the auditor must
assess the need for the use of specialized audit tools and information technology.
If the tools are not currently available, enough time must be given to acquire and
become familiar with them.
The final stage in the planning process for the audit assignment is the issuing of an
engagement letter to the auditee management. Spelled out in this letter are the:
➤ participants;
➤ timescales;
➤ requirements for auditee participation;
➤ areas to be covered; and
➤ areas to be excluded.
It is important that this letter documents the risks, major controls and control
objectives that will be audited.
Unplanned Work
It is always necessary to allocate a percentage of the internal audit budget for dis
cretionary or ad hoc projects. Such projects can include fraud investigation or other
specific investigations in areas where management have concerns. Many auditors fall
into the trap of budgeting an optimistically low percentage of their resources for this
category. If the audit function’s track record over previous years indicates that 20
per cent of resources have been used for ad hoc work, then budgeting 10 per cent
for the forthcoming year is an exercise in hope rather than good judgment.
Internal audit must also budget a percentage of the resources to cover time that is
not directly related to internal auditing. This could include training, leave, sick leave
and work that is not a part of internal auditing, such as liaison requirements for the
external independent auditors.
Project Management
A project may be defined as a temporary endeavor undertaken in order to create
a specific result. It is temporary in that it has a specific beginning and a finite end
and is brought into being in order to accomplish a temporary objective. It should be
noted that it is the project itself which is temporary and not necessarily the results
of the project. An audit project may last only a few days but its impact on the orga-
nization may endure for many years. Indeed, the intent is that the impact of an audit
project will be long lasting.
As with any other business endeavor, audit projects involve a degree of risk
including the risk of not achieving the audit objectives, achieving them in an unac-
ceptable time scale or achieving them at an unacceptable cost.
178
In order for the project to achieve its desired objectives, appropriate project
management will be required, utilizing a variety of management skills and disci-
plines as well as the implementation of appropriate tools and techniques. Project
management is generally accepted as comprising six specific elements:
➤ Project initiation
➤ Project planning
➤ Project execution
➤ Project monitoring
➤ Project controlling
➤ Project closing.
Project initiation involves scoping the audit based on the criteria established in
conjunction with the auditee, encompassing the control objectives of the auditee,
potential risks and exposures, and a selection of the appropriate forms the audit
should take (compliance, operational or any other form). From this an approxima-
tion of the size and composition of the project team may be established.
Project planning involves the breaking down of the audit into specific tasks to be
achieved, allocating work to individuals, and determining the timing and overlaps
of specific audit phases. Planning techniques such as the use of the Gantt charts,
CPM and the like may come into play, and scheduling of the work. At this stage
budget and cost estimates can be prepared, taking into consideration the logistics
of the audit, including travel and accommodation if appropriate. Planning will also
involve the selection of the appropriate monitoring techniques to be enacted dur-
ing the audit.
Project execution will involve the audit team leader in ensuring that the whole
audit process is directed towards achievement of the scope and objectives initially
established. This normally involves monitoring progress against the plan and,
where deviations occur, modifying the plan in order to put the project back online.
Project controlling involves the lead auditor maintaining the group focus, control
and quality of work done and ensuring that unforeseen circumstances or risks do
not inadvertently obstruct completion of the audit.
Project closing can be as difficult for audit as for any other project. The tempta-
tion exists to ‘just check one more thing’, resulting in a significant deviation from
the scope, timing, costing and quality of the overall audit. It is part of the role
of the lead auditor to bring the project to a successful conclusion, evaluate and
discuss with the team the successes, failures and learning points of the audit,
and determine which conclusions and evidence will be communicated onwards
via the audit report.
179
The lead auditor’s role is to ensure that, ultimately, the audit project achieves its
objective. This involves establishing clear objectives for the audit project and orga-
nizing resources to provide adequate assurance that the objectives will be achieved
within acceptable quality, cost and time constraints. Periodically, unforeseen circum-
stances will place competing demands on resource availability for the audit project,
and this will then involve adjustments to the audit approach, timing, and possibly
even the scope of the audit.
Project Plan
An audit project plan which delivers the desired impact on the business, to the scope
specified in the original audit engagement, at the time promised to the auditees and
within the cost constraints originally planned, would be classed as a high-quality
audit. The reality of the situation, however, is that few audit projects actually achieve
all of those desired deliverables specified above. Audit supervision will be required
to make decisions involving balancing those deliverables within the constraints of the
audit scope, time and resources available. In addition, all audit planning is carried
out based upon a supposition of what will be found. This uncertainty can result in
drastic changes to an audit plan if the control environment found does not match the
expectation. The changes can be positive as well as negative since, once the audit
has started, it may be discovered that the internal control structures are more robust
and effective than anticipated and the degree of direct testing may be reduced from
that originally planned. More commonly it will be found that internal control is not
at the level suggested by management during the preliminary survey and that audit
testing will have to be extended, resulting in changes to the cost and duration of the
audit. This uncertainty may be defined as project risk.
180
Managing the scope itself is essential to ensure that all of the work required to
complete the project, but only that work is fully undertaken and completed effec-
tively. A common problem that this stage is allowing ‘scope creep’ to occur, resulting
in considerably more work being undertaken than was required.
Once the scope has been agreed the processes to be undertaken to complete
the project can be defined and allocated against individual auditors, based on skill
requirements and availability. This work breakdown is essential, since the scheduling
of time is based upon the quantity of work that a specific individual can achieve at
a given task. The sequencing of these activities to ensure a smooth workflow is also
important because certain activities may be able to overlap, while others may be
dependent upon the successful completion of the preceding operation.
Once this breakdown has been done, the lead auditor can compare the overall
project plan to the resource constraints within which the project must occur so that
any modifications required to fine-tune the project plan can be made. Even at this
stage a project plan can be modified based on what is found in the course of the
audit activities.
For an audit project, cost management largely boils down to time management,
since the bulk of audit costs are the costs of human resources. To this end the plan-
ning, budgeting and estimating of time scales will largely dictate the project budget.
As the project is executed, time and cost resources expended can be monitored
against the planned budget and variations analyzed to determine whether they are
plan-related (ie the plan underestimated the amount of work to be carried out)
or performance-related (ie the people did not perform as planned). Variations will
occur in even the best planned projects and subsequent phases of the project may
need to be re-planned based upon known performance levels.
The management of the human resources making up the project team is critical
to the success of the overall audit project. Early involvement of team members in
the planning of the project as a whole and their role in particular can dramatically
strengthen the commitment of individuals to the accomplishment and success of the
audit project. For example, in an extended audit covering a capital project of long
duration, the individuals involved in the project may change, and new team mem-
bers must be accommodated within the overall framework of the plan. It is the lead
auditor’s responsibility to ensure that the appropriate knowledge, skills and compe-
tencies are available to the project team in order to ensure effective completion and
achievement of planned time and cost budgets.
In addition, team members must be developed to improve the overall competency
of the audit function and this involves the team leader as a mentor and a guide to
provide direction, offer feedback and advice, and resolve any issues of conflict within
the team.
As with any endeavor, the management of quality of work produced is of critical
importance to the ongoing reputation of the audit function. The appropriate poli-
cies and procedures must be implemented to ensure that all activities fall within the
ambit of the Standards for the Professional Practice of Internal Auditing. Once again,
the Standards should be seen as a living document to guide the auditor towards
acceptable levels of quality rather than a sterile set of instructions to be looked at
once a year. Quality control within the audit will involve the identification of key
indicators to be monitored as a measurement of quality achieved, the execution
of that monitoring, and the identification of improvements to address any areas of
unacceptable performance quality.
181
One of the main reasons for introducing project management is the commu-
nication of the status of the audit project at any given point in time. Auditing
within an organization should be seen as a continuous flow from project to proj-
ect and this means that any delay in a particular audit can cause a domino effect
in subsequent audits, since specific skills and personnel may not be available at
the time originally planned. In addition, auditees and management also require
knowledge of where an audit is in terms of its progress against the agreed plan.
Communicating in this manner facilitates the management of client expectations
as to deliverables, costs and timings for the audit. Obviously, this is more critical
in audits of longer duration.
182
Learning objectives
After studying this chapter, you should be able to:
➤ Outline briefly the uses and importance of internal audit reports to the various
users of audit services
➤ Outline in detail the basic structure of an internal audit report
➤ Use effective writing techniques for maximum impact
➤ Formulate and express an appropriate audit opinion
➤ Describe the use of auditee responses in the audit report
➤ Polish and edit your own or another auditor’s report
➤ Distribute the audit report for maximum impact
➤ Follow up on findings in an appropriate manner
Reporting
IIA Practice Advisory 2440-1: Recipients of Engagement Results provides guidance
for internal auditors with respect to their reporting responsibilities as follows.
Audit Reporting
Results of the audit are usually reported orally in the form of interim reports and
closing conferences, as well as in writing. At least a written report should be pro-
duced at the end of an audit, and other types of reporting should occur if necessary.
Reports generally should be:
➤ accurate;
➤ objective;
➤ clear;
➤ concise;
➤ complete;
➤ constructive; and
➤ on time.
Reports should be reviewed and approved by the internal audit manager before they
are issued.
The issued audit report is a reflection of the competence and professional image
of the whole internal audit department and internal auditing as a profession. In
many cases, this is the only exposure to internal auditing that senior management
will get. This image will be reflected not only in the report’s technical soundness but
also in its clarity, tone, organization and style. The message must be unambiguous
and questions raised in the reader’s mind must be anticipated and answered. Any
desired mood must be created by words alone.
184
by allowing a reader to scan for specific information. Many auditors feel that they
should discourage readers from scanning the report, but the alternative may be that
the report is not opened or read at all.
Other techniques for easing the reading of reports involve keeping the paragraphs
short, as well as the use of emphasis, white space, graphics and color. Remember
always that this is a working audit report, not a Christmas card, and do not make it
over-fancy. The report should not be padded for the sake of size, nor should there
be criticism just for something to say.
Preparing to Write
Preparing to write starts at the beginning of the audit. From the moment the scope
and objectives are approved, all audit work is done with the audit report in mind.
At the start of the audit, you should already have a mental picture of the report in
your mind. You know the anticipated audience, the subject matter, and the scope
and objectives of the report.
When the actual process of committing the report to paper starts, free writing
may help to loosen up your mental muscles. This technique involves the writing of
unrelated texts such as a letter before you start work on the report. The theory is
that this starts the brain moving in logical communication mode.
Usually an audit report will involve the co-ordination of several writers’ efforts. In
such cases is may be wise to read the report aloud in order to recognize the differ-
ences in the styles and methods of individual contributors. Reports should follow the
same methods and be written in the same style throughout.
185
Detailed Findings
Detailed findings usually constitute the body of the report. A finding comprises
four distinct parts:
Condition This details what the auditor found, ie what the evidence showed
Cause This indicates whether the condition was caused by the absence of an
internal control or the failure of one and, if so, which
The detailed findings should include enough information for the reader to under-
stand the findings. Exhibits and attachments are usually placed within the report,
but may be placed in an appendix if they are very long. All graphics, charts and
financial tabulations should be clearly labeled and, if in an appendix, should be
cross-referenced to the report.
Management will often want an internal audit opinion, as it provides an overall
perspective to the rest of the report and forces the auditors concerned to commit
themselves. However, it can cause a management overreaction, resulting in important
parts of the report being ignored, since audit results are normally mixed in nature.
At the discretion of the auditor, auditee responses may be included in the final
report. This can help provide balance and can lend credibility to the report, resulting
in less ‘sniping’ from the sidelines. Where such comments are included, they must
be reviewed with and agreed to by the auditee.
186
If the contents of the report are highly confidential, detective controls can be
implemented to trace individual copies should a leak occur. The most obvious of
these techniques is copy numbering, but intentional misspellings or rewording of
critical areas may also be used.
Interim Reporting
Interim reports are those prepared and issued while the audit is in progress. They
are usually used to either report progress on an extended audit or to notify the
auditee of a finding that warrants immediate attention. They may be either written
or verbal, although a written report in memo form can be a useful way of report-
ing a finding. The main advantages of interim reports are that the auditee receives
timely feedback, which in turn makes immediate action more likely. This can, in turn,
result in a more favorable final report if appropriate action is taken. Interim reports
effectively provide a follow-up opportunity during the audit itself.
Closing Conferences
Before the final audit report is issued, a closing conference is common. This permits
an overall review of the audit objectives and findings, and is the final opportunity to
clear up any misunderstandings or omissions before the report is issued. It ensures
a fair and balanced presentation and allows auditees to express their opinion. It
also gives the auditors concerned feedback on the way the audit was handled from
a client’s perspective
Follow-up Reporting
IIA Standard 2500-A1 states that:
‘The chief audit executive should establish a follow-up process to monitor and
ensure that management actions have been effectively implemented or that senior
management has accepted the risk of not taking action.’
The auditors must find out what action was taken and whether it was appropriate.
They would usually follow up on reports normally directed to the recipients of the
original report and they should focus on attainment of the control objectives, not
necessarily on audit recommendations.
The participants in the audit process all have distinct roles to play in the follow-up
process.
Auditors
It is the duty of the auditors to:
➤ perform follow-up reviews to ensure appropriate action was taken; and
187
➤ inform the auditee, executive management, board and audit committee in writ-
ing of the outcome of the follow-up review.
Internal auditors should make management aware of actual and potential risks, but
have no further responsibility if management decides to accept the risk. Auditors
must not interfere with the auditee’s operation during the follow-up review.
The Auditee
The auditee is expected to do the following:
➤ provide timely, complete responses to the audit report;
➤ help auditors with follow-up reviews;
➤ keep auditors and management informed of corrective actions;
➤ inform auditors and management of any major disagreements; and
➤ assess the cost-effectiveness of alternative corrective measure and choose an
appropriate alternative.
Executive Management
The role of executive management is to:
➤ monitor the follow-up process;
➤ assess the adequacy and cost-effectiveness of the auditee’s corrective action;
➤ not interfere with auditors’ follow-up reviews; and
➤ avoid compromising the auditors’ objectivity and independence.
188
to all managers. Such a statement should be clearly shown as coming from the
organization’s highest level of authority. The policy should specify to whom auditee
responses should be directed and must itself be in writing.
Additional success factors for ensuring that the actions taken are appropriate and
followed up would include the auditor discriminating between symptoms and causes
in the original report. The auditee action must address the cause, not the effect.
The follow-up findings should be attached to working papers and the follow-up
report attached to the original report. The auditor will need guidelines for rejecting
the auditee's corrective measures should this be necessary, but do not try to force
audit preferences on management.
The audit focus should be on control objectives and principles; management
focus should be on the controls themselves. To do otherwise is to risk becoming
the approver of the controls. Management must decide, not the auditor. Where you
reject a management action, never attack the individuals concerned. You must avoid
becoming emotionally involved in disagreements. State specifically in rejections why
the rejection has occurred and which control objectives are still threatened.
189
Learning objectives
After studying this chapter, you should be able to:
➤ Outline briefly the difference between statistical and non-statistical concepts
➤ Explain the differing sampling methods in common audit use and the factors
affecting sample size
➤ Choose from among the parametric and non-parametric techniques, depending
on the needs of the audit
➤ Design and administer surveys and questionnaires
➤ Conduct structured, semi-structured and unstructured interviews
➤ Explain the usage of financial analysis from an internal auditor's perspective
➤ Describe briefly the internal audit use of:
◗ Analytical techniques for sharper insight
◗ Operations research and models
◗ Analytical review procedures
◗ Linear programming
◗ Charting, queuing and game theory
◗ Simulations
What is Sampling?
Sampling is the process of testing a portion of a group of items in order to evaluate
and draw conclusions about the population as a whole.
The process of sampling may be broken down into the following sub-processes:
➤ An auditor is performing either a compliance test (test of controls), or a sub-
stantive test
➤ of either documented internal accounting controls or accounting source records
by applying procedures
➤ to less than 100 per cent of the items in the class of transactions or account
balance
➤ for the purpose of forming a conclusion about some characteristic of the class
or balance.
Why Do We Sample?
The underlying assumption of sampling is that the results of a sample yield accu-
rate information about the population from which the sample was taken. Sampling,
therefore, is an effective method of gathering audit evidence.
If auditors did not use sampling, every item comprising an account balance or
every transaction occurring within a class of transaction would need to be reviewed.
The cost of such an examination would (a) be prohibitive, because of the amount
of time required to perform such an examination and (b) far outweigh the benefit
obtained. Sampling provides an auditor with a means of obtaining almost identical
information, but at a much lower cost. Thus, sampling is also an efficient method of
gathering information.
Each approach represents a different way of handling audit risk. Therefore, each may
be appropriate for some populations but not for others. Choosing the right approach
involves answering some critical questions about risk, population characteristics and
the objectives of our testing. The answers lead us to the best approach and the most
efficient audit plan.
191
Statistical Approach
In statistical sampling, the sample is selected in such a way that it can be expected
to be representative of the population. By doing so, an auditor intends that the
relevant characteristics of the sample, such as the sizes or rates or errors, should
be mathematically proportional to those of the population. For this to be valid, an
appropriate sample selection technique, such as random selection, and an adequate
sample size must be chosen. The sample results may then be used to project to the
population (extrapolate) in order to estimate a specific value for the population. The
more representative a sample is, the more accurate the extrapolation. This effec-
tively means the larger the sample size, the more accurate the extrapolation.
Obviously, statistical sampling is less than 100 per cent reliable, and an auditor
must take into consideration the effect of sampling risk.
Sampling Risk
All auditing involves a certain amount of risk or uncertainty. The risk that mate-
rial irregularities or errors will not be detected either by internal control or by
the use of the appropriate auditing procedures is always present. The uncertainty
that exists in applying the audit procedures is called audit risk. When an auditor
chooses to use statistical sampling, he/she faces the possibility that, due to the
fact that there is less than 100 per cent certainty, the conclusions drawn about the
population may contain some material error. This audit risk comprises two specific
sub-sets.
➤ Sampling risk is the risk that the sample chosen may not appropriately reflect
the population as a whole.
➤ Non-sampling risk is the risk that, having obtained a representative sample, the
auditor still misses a significant error.
192
The auditor should also be concerned with sampling risk when performing substan-
tive tests. Here the risks are classified as follows:
➤ The risk of incorrect acceptance (beta risk) is the risk that the sample supports
the auditor's conclusion that the amount or quantity is not materially misstated
when in fact it is.
➤ The risk of incorrect rejection (alpha risk) is the risk that the sample leads the
auditor to believe that the amount or quantity is materially misstated when in
fact it is not.
Alpha characteristics of the population relate to the efficiency of the audit, while beta
risks relate to the effectiveness of the audit in the detection of material errors.
193
Audit Objectives
As with any audit, the auditor starts off by considering the control objectives of
the area under review. From this can be derived the source of audit evidence and
the nature of the audit testing required to evaluate that evidence. Where the audit
testing needs to be done using sampling techniques, the auditor may focus on the
specific objectives to be achieved by the tests that will be carried out on the sample
selected.
The sampling technique chosen will be dependent on the nature of the opinion
the auditor wishes to express. An opinion on error rates within the population would
normally dictate the use of attributes sampling techniques, while expressing an opin-
ion on the probable values of the population may call for the use of monetary unit
sampling or variable sampling.
Population Characteristics
The second stage of planning is to define the population about which an opinion will
be expressed in terms of its characteristics. For example, the auditor may choose to
express an opinion about high-value items, low-value items or all items. Any opin-
ions expressed based on a sample can only be in terms of the population that was
sampled in the first place. Should the auditor sample invoices within the previous six
months, any opinion expressed can only be valid in terms of the previous six months’
invoices. Any conclusions drawn about invoices beyond this period would be invalid.
Again, if the auditor wishes to express an opinion regarding customers exceed-
ing their credit limit, the appropriate population to examine would be the credi-
tors’ records and not the invoices. In testing to ensure that all orders have been
invoiced, the sample would be drawn from the orders and checked forward against
the invoices. If the auditor wishes to express an opinion regarding the authorization
of payments, the sample must be drawn from payments and checked backwards
against the authorized input documents.
In any population, a common evaluation technique is to determine the average
value of the population. Three averages are possible: the mean, the median and the
mode. In statistical sampling, the most commonly used average is the mean.
The mean, or arithmetic average value of a data set, is calculated as the sum of
all values, divided by the number of data points. For example, if three selections
are made by the auditor of invoices with values of R100, R140 and R180, then the
average value would be (100 + 140 + 180) ÷ 3, or R140.
The median represents the middle value in a population range. The mode repre-
sents the most frequently occurring value in a population.
In a census of a population, for example, there may be individuals with ages rang-
ing from 10 to 80 with a predominantly young population and an arithmetic average
age of 35. In such a population, the median may be found to be 45, the mean is 35
and the mode may be as low as 20 because of the population being skewed towards
younger people.
194
The main use from an audit perspective is the statistical fact that in a normal
(unskewed) population, 68 per cent of the population will lie within 1 standard
deviation from the mean, and 95 per cent of a population will lie within 1.96 stan-
dard deviations from the mean. In other words, when an auditor samples such a
population, there is a 95 per cent probability that all items selected will be drawn
from within ±1.96 standard deviations from the mean.
The skewness of a distribution refers to its lack of symmetry. A perfectly sym-
metrical distribution will result in a normal bell curve with a skewness of zero. Most
distributions have some degree of skew. A population with the majority of the popu-
lation distributed to the right of the mean is said to be negatively skewed, and a
distribution with the majority of the population distributed to the left of the mean is
said to be positively skewed.
The computation of skewness involves taking the deviations from the mean,
dividing them by the standard deviation, and raising them to the third power. These
figures are then added together and divided by the number of data points.
195
196
Cluster sampling Units in the popula- ➤ Quicker, easier ➤ Works best when
tion can often be and cheaper each cluster can
found in geographi- than other forms be regarded as a
cal groups or clus- of random sam- microcosm of the
ters, eg schools, pling population
households, etc. ➤ Does not require ➤ Larger sampling
A random sample complete popu- error than other
of clusters is taken, lation informa- forms of random
and then all units tion sampling
within those clus- ➤ Useful for face- ➤ If clusters are
ters are examined to-face interviews not small, it can
become expen-
sive
➤ A larger sample
size may be
needed to com-
pensate for
greater sampling
error
197
Quantitative Methods
In addition to statistical analysis, an auditor can use a variety of quantitative meth-
ods. These mathematical tools are commonly used to obtain an understanding of
operations, and permit the drawing of conclusions in a variety of circumstances
through analyzing the complexities of situations. Of the many quantitative methods,
the section examines the most commonly used.
Trend Analysis
Trend analysis is used to evaluate the behavior of a variable, such as the turnover
in a period of time. Such analyses can serve as evaluation criteria to determine the
reasonableness of fluctuations over an extended period. Comparisons of this year’s
turnover to last year’s or, alternatively, this month’s turnover to the same month last
year, are popular.
Chi-square Tests
Chi-square analyses are non-parametric tests capable of analyzing relationships
between qualitative data. For example, do operating units in the South have particu-
lar patterns of operation different from those in the North?
198
Chi-square tests can check for the independence of normal classifications and
ordinal data, and require no particular distributional pattern for the data.
Correlation Analysis
Correlation analysis is the measurement of the extent of association of one variable
with another. Two variables are said to be correlated when they move together in a
detectable pattern. A direct correlation is said to exist when both variables increase
or decrease in the same time, although not necessarily by the same amount. For
example, one would expect inventory to decrease as sales increase.
Correlation analysis is used by internal auditors to identify those factors that
appear to be related. An operational auditor, for example, may use correlation
analysis to determine whether corporate performance is in line with industry
standards by comparing the correlation of company costs of imported parts with
exchange rate fluctuations. Problems with how these statistics are computed,
shortcomings in an internal auditor’s understanding of auditees’ operations, or real
inefficiencies or misstatements can be pinpointed through correlation analysis.
Graphical Analysis
Graphical analysis can be useful to an internal auditor in identifying interrelation-
ships in data, anomalies and simple data errors.
A common form of graphical representation is a scatter diagram, which refers to
any graph of data points. The more discernible a pattern appears in the graph, the
more likely one variable is related to another and therefore can be used to predict
the other’s value. Where no pattern can be noted, there would appear to be a little,
if any, correlation between the two variables.
Where a strong correlation insists, either positive or negative, the correlation value
will approach 1. Where little correlation exists, the correlation value will approach
0. Unfortunately, correlation values only measure linear patterns. Where there is a
non-linear relationship, correlation statistics will not disclose this. Occasionally a
single data point, not conforming to the general pattern, can distort the correlation
value. While this can be readily seen on the graph, it is usually less obvious when
examining the correlation value.
Learning Curves
In conducting operational audits of the quality of training of new staff, a learning
curve will normally be expected and observed in performance levels. In other words,
as employees gain experience with the new procedures or as a new employee
becomes more experienced, the length of time taken to perform the task should
decrease.
Learning curves are evaluated by computing the time required per unit of produc-
tion each time that the cumulative output is doubled. A decrease in production time
per unit of 25 per cent would result in a 75 per cent curve. A 60 per cent curve
would result if the production time were reduced by 40 per cent.
By measuring this curve, an auditor can determine how quickly a new procedure
or employee becomes productive. When a new procedure is recommended, calcu-
lating the initial time per unit under the old system and comparing it to a series of
199
observations over time using the new procedures can objectively determine whether
the new procedure is an improvement over the old.
Linear Programming
Linear programming is an operations research tool used to allocate scarce resources
or to determine optimal blends of raw materials. The constraints applicable are
reduced to algebraic formulae, which are then solved by simultaneous equations. For
example, in a production environment, machining may be capable of processing 100
units per machine while finishing can handle 35 units per machine. The question of
how many machines of each type should be used for optimum production can be
solved using linear programming.
200
B 2 Days C
2 Days 3 Days
1 Day 1 Day D
A 3 Days 1 Day
E
F G
2 Days 3 Days
H 4 Days I
The shortest time to get from A to E while completing all tasks is determined by
calculating the longest path.
➤ Path A-B-C-D-E takes 8 days.
➤ Path A-F-G-D-E takes 6 days.
➤ Path A-H-I-E takes 9 days.
This means that the bottom path would be the most critical. The reason for this is
that any delay in this path will postpone the final completion date. Any delay in the
middle path that does not exceed four days will have no effect on the final comple-
tion date. Should the top path experience a delay in any of the processes of, for
example, three days, then the top path will now take eleven days to complete and
will become the critical path. If, by the same token, the time taken for the critical
path can be reduced, then the final completion date can be brought forward.
Simulations
Monte Carlo Simulations
Computers can be used to accelerate timescales by carrying out activities over and
over again very rapidly. By combining this with the probability of events occurring,
a sophisticated model can be built.
One such approach is referred to as the Monte Carlo method. It uses the com-
puter to simulate uncertainty via random behavior based upon the probabilities
entered and then iterates specified models several times to determine average
performance.
201
Game Theory
The term game theory refers to mathematical models of optimal strategies under
various incentive schemes. This is used in competitive environments to explore ‘what
if’ scenarios.
A non-zero-sum game is said to exist when a profit is generated in which it is
possible for both participants to share. A zero-sum game denotes a situation where
a profit simply transfers from a loser to a winner. Game theory is used to help an
internal auditor in understanding the reasons particular strategies are pursued in
negotiation sessions or competitive price setting.
Queuing Theory
Businesses often have queues at service points. Elimination of these queues by
increasing the number of service points would result in service points often being
unused and costs increasing. Management must be able to decide how many service
points should be provided.
Queuing theory facilitates the use of mathematical models to minimize the total
cost for a given rate of arrivals. The minimized cost includes both service costs (facil-
ity and operating costs) and waiting costs (the idle resources involved in waiting in
line or having service points idle).
202
Business Analysis
Corporate Governance
Learning objectives
After studying this chapter, you should be able to:
➤ Outline the corporate governance developments nationally and internationally
affecting organizations
➤ Discuss the different corporate structures encountered in business organizations
➤ Outline briefly the nature and roles of the following stakeholders in achieving
sound corporate governance practices:
◗ Investors or owners
◗ Boards of directors and management
◗ The audit committee
◗ External audit
◗ Internal audit
➤ Explain the impact of a risk-based approach in prioritizing the internal audit plan
➤ Determine the resource requirement in terms of staff competencies and avail-
ability to carry out the audit plan
➤ Explain the implications of outsourcing internal audit
45. Cadbury Commission. 1992. Report on the Financial Aspects of Corporate Governance. London.
46. Institute of Directors (IOD). 1995. The King Report on Corporate Governance for South Africa.
Johannesburg: IOD.
47. Blue Ribbon Committee. 1998. Report and Recommendations of the Blue Ribbon Committee on
Improving the Effectiveness of Corporate Audit Committees. New York: New York Stock Exchange.
(New York Stock Exchange Listed Company Manual 303.01: Audit Committees.)
(2002), and in the UK, the recent Smith Report (2003)48 entitled Audit Committees
Combined Code Guidance, dealing with the role and responsibilities of ‘effective’
audit committees, and the Higgs Report (2003)49, entitled Review of the Role and
Effectiveness of Non-executive Directors. In Europe there has similarly been much
activity to strengthen corporate governance and company law standards. These
include the Cromme Code50 in Germany and the Bouton Report51 in France in
September 2002.
The Cadbury Commission was commissioned to report specifically on the financial
aspects of corporate governance in response to some spectacular company col-
lapses in the UK, such as BCCI Plc, Polypeck Plc and Barings Bank.
The Cadbury Report called for a strengthening of the board’s conformance and
compliance role. The report advocated the strengthening of the role of independent
non-executive directors, the creation of compliance committees using these non-
executive, independent directors in audit committees, remuneration committees to
oversee directors’ remuneration, and nomination committees concerned with the
nomination of new directors to the board.
Cadbury also recommended greater transparency on board matters and the
separation of the roles of the chairman of the board from the chief executive officer
(CEO) of the business.
In 1998, the Hampel Committee in the UK consolidated these ideas into a set of
Principles of Good Governance, and a Code of Best Practice for unitary boards
of listed companies was incorporated into the listing rules of the London Stock
Exchange, known as the City Code. The report recommended the following:
➤ Good corporate governance needs broad principles, not prescriptive rules.
Compliance with sound governance practices, such as the separation of board
chairmanship and the CEO function, should be flexible and relevant to each
company’s individual circumstances and not reduced to what the report calls a
‘box-ticking’ exercise. Self-regulation is the preferred approach: no additional
company legislation was considered necessary.
➤ The board is accountable to the company’s shareholders. There is no case for
reassigning directors’ responsibilities to other stakeholder groups.
➤ The unitary board is totally accepted in the UK. There is no interest in alterna-
tive governance structures or processes such as two-tier boards.
48. Smith, Sir R. et al. 2003. Audit Committees Combined Code Guidance, a report and proposed
guidance by a group appointed by the Financial Reporting Council chaired by Sir Robert Smith.
London. January.
49. Higgs, D. 2003. Review of the Role and Effectiveness of Non-executive Directors, a report and
recommendations to the Secretary of State for Trade and Industry. London. January.
50. Cromme, G. et al. 2002. Corporate Governance Report: Vortrag und Diskussionen der Konferenz
Deutscher and Corporate Governance Code. Germany.
51. Bouton, D. et al. 2002. Promoting Better Corporate Governance in Listed Companies, Paris:
Association Française des Enterprises Privées et Association des Grandes Entreprises Françaises
and Mouvement des Entreprises der France.
206
Africa, there have been the collapses of MacMed Medical Aid, Cape Trust Bank
and Regal Treasury Bank.
Corporate governance is affected by the relationships among participants in the
governance system. Controlling shareholders, who may be individuals, family hold-
ings, bloc alliances, or other corporations acting through a holding company or cross
shareholdings, can significantly influence corporate behavior. As owners of equity,
institutional investors are increasingly demanding a voice in corporate governance
in some markets. Individual shareholders usually do not try to exercise governance
rights, but may be highly concerned about obtaining fair treatment from controlling
shareholders and management.
Suppliers also play an important role in some governance systems and have the
potential to serve as external monitors over corporate performance. Employees and
other stakeholders play an important role in contributing to the long-term success
and performance of the corporation, while governments and securities exchanges
establish the overall institutional and legal framework for corporate governance.
The various reports all contain recommendations for enhancing corporate gover-
nance practices, some of which have subsequently been incorporated into changes
in corporate legislation and the listing requirements of stock exchanges.
The far-reaching Sarbanes-Oxley Act in the US provides stringent legal require-
ments to enforce sound corporate governance requirements on all US SEC reg-
istrants, as well as their subsidiaries and associated entities, wherever they are
operating in the world. All contain references to the important role of audit commit-
tees and internal audit in assisting management to ensure the effectiveness of the
corporate governance processes.
Corporate governance can be defined in a variety of ways, but generally it involves
the mechanisms by which a business enterprise is directed and controlled. It con-
cerns the mechanisms through which corporate management is held accountable for
corporate conduct and performance.
Corporate governance, in general, provides the framework within which the objec-
tives of a company are set and the means of attaining those objectives and monitor-
ing performance are determined. Good corporate governance requires the board
and management to pursue objectives that are in the interests of the company and
shareholders and therefore facilitate effective monitoring, which in turn encourages
firms to use resources more efficiently.
The corporate governance framework rests on the legal, regulatory and institu-
tional environment. Factors such as business ethics and corporate awareness of the
environmental and societal interests of the communities within which an organiza-
tion operates can also have an impact on the reputation and the long-term sustain-
ability of the organization.
Corporate governance is based on the belief that corporate officers operate best
when they are held to account for what they do. This involves holding the manage-
ment of an organization responsible for its performance. It entails evaluation of the
proper use of executive power such that individuals with responsibilities are account-
able for and must be prepared to defend their decisions.
207
Within public sector (government) structures, the term ‘corporate governance’ rep-
resents a collection of practices aimed at ensuring management accountability and
service delivery. Many of these are drawn from the private sector practices, such as:
➤ risk management;
➤ financial reporting;
➤ a code of ethics;
➤ internal audit; and
➤ audit committees.
The South African Public Finance Management Act No. 1 of 1999 regulates financial
management in the national and provincial governments and provides for the respon-
sibility of people entrusted with financial management in these governments. A key
responsibility is placed on the ‘accounting officer’ who is the head of the relevant pub-
lic enterprise or department. The act clarifies the division of responsibilities between
the accounting officer and the political head (called the ‘executive authority’ – either a
minister or MEC). The Guide for Accounting Officers, issued by the National Treasury
in 2000, formally requires an accounting officer, among other things, to establish an
internal audit function and audit committee. Chapter 6 of this publication, entitled
‘Corporate Management and Internal Controls’, indicates the structure, role and man-
date to be embodied in an internal audit charter and the operation of the internal
audit function. In addition, it provides for the composition of the audit committee, its
role and duties, terms of reference and timing of meetings.
King II recommends that these guiding principles be infused in the code of corporate
practices and conduct of the organizations affected, and are indeed valid principles
for all organizations, albeit that their implementation by different companies and
public sector entities may differ greatly. The report groups the key aspects of gover-
nance under the following headings:
➤ the constitution and operation of the board and its committees;
➤ performance evaluation and reward;
➤ risk management and internal control;
➤ sustainability;
➤ business ethics and organizational integrity;
➤ accounting and auditing; and
➤ disclosure practices.
208
Characteristic Nature
Discipline Commitment by the organization’s senior management to widely
accepted standards of correct and proper behavior
Transparency The ease with which an outsider can analyse the organization’s actions
and performance
Independence The extent to which conflicts of interest are avoided, such that the
organization’s best interests prevail at all times
Fairness Acknowledgement of, respect for and balance between the rights
and interests of the organization’s various stakeholders
Every company has key stakeholders that bring it to life and influence its activities
for better or worse during its existence.
An ongoing debate is the extent to which corporate governance practices should
be incorporated into legislation and policed, as opposed to relying on individuals
and corporate structures to ‘do the right thing’ and allowing stakeholders and the
capital markets to self-monitor and regulate the actions of the corporate leader-
ship.
This chapter discusses the roles of the following key players in ensuring sound cor-
porate governance practices are implemented:
➤ investors, qua owners;
➤ boards of directors and senior management;
➤ audit committees; and
➤ internal and external audit.
209
appointed as executive directors. In this way, they were able to exercise a consider-
able degree of control and influence over day-to-day operations. In millions of smaller
and owner-managed companies around the world, this is still the situation today.
But for major corporations, particularly those that have their shares listed on a
stock exchange, and who may trade globally, the governance situation has changed
significantly and their activities are subject to close scrutiny by the public, gov-
ernment agencies, ‘ethics monitoring groups’ and the media. In many countries,
the shares of public listed companies are now held by thousands of very diverse
shareholders – some are private individuals; a significant portion are institutional
investors such as banks, pension funds, insurance companies and asset managers
managing unit trust portfolios; and the remaining shares are held by other group
companies, who might have strategic business relationships with the company.
Nowadays, ownership structures of major public companies around the world are
often complex. Consequently, the first step in understanding the reality of corporate
governance in any company is to understand the ownership structure and hence
identify who has the potential to exercise power and influence over that company. In
the past, most institutional investors failed to actively exercise their rights as share-
holders, preferring to sell their shares rather than getting involved in challenging
poor corporate performance. However, this trend has reversed in recent years, with
some institutional investors, particularly in the US, the UK and Australia, becoming
proactive, calling for boards to produce better corporate performance, questioning
levels of directors’ remuneration, and calling for greater transparency on company
finances and greater accountability from directors.
Governance structures for organizations vary around the world, but three broad ver-
sions are generally recognized.
➤ In the unitary board model, all directors participate in a single board compris-
ing both executive and non-executive directors in varying proportions. This
approach to governance is generally shareholder-orientated. It is also called the
Anglo-Saxon approach to corporate governance, and is the basis of corporate
governance in the US, the UK, Canada, Australia and other Commonwealth
countries, including South Africa.
➤ In the two-tier board model, corporate governance is exercised through two
separate boards. The upper board supervises the executive board on behalf of
stakeholders. This approach to governance is usually more society-orientated
210
211
that relate to unitary boards emphasize the need for some compositional dis-
tinction between the members of the unitary board and members of the senior
management team. These codes invariably urge companies to appoint outside (or
non-executive) directors, and King II introduces the concept of ‘independent’ non-
executive directors being appointed to the board.
‘Independence’ in this context generally involves an absence of close fam-
ily ties or business relationships with company management and the controlling
shareholder(s). Codes that relate to unitary boards also frequently call for the posi-
tions of the chairman of the board and the CEO (or managing director) to be held
by different individuals. (This is already usually the case in two-tier board systems.)
Codes that relate to two-tier boards also emphasize the need for independence
between the supervisory and managerial bodies. For example, like the unitary board
codes, they tend to warn against the practice of naming (more than one or two)
retired managers to the supervisory board, because it may undermine supervisory
board independence.
The JSE listing requirements include a condition that the chairperson and CEO
positions be occupied by different people for listed companies. Failure to do so will
result in a penalty of R1 million being imposed on the company. Instances have been
encountered in the US and the UK, where the ‘independent directors’ appointed
have often been hand-picked ‘cronies’ of the CEO or chairperson or president of the
corporation willing to do the bidding of the CEO, and anything but ‘independent’.
This led directly to recent recommendations for an independent nominations com-
mittee to be established by the board.
Board Committees
Another interesting feature that has developed in the current demands for increased
responsibility and accountability is for boards of directors of public companies to
appoint greater numbers of non-executive, or independent non-executive directors
to the board. These do not have executive responsibilities and are expected to pro-
vide a means of ensuring that the executive directors are held accountable for their
management of the company. The codes reflect a trend toward reliance on board
committees to assist the board of directors to discharge their responsibilities, par-
ticularly in areas where the interests of management and the interests of the com-
pany may come into conflict, such as in areas of audit, executive remuneration and
nomination. All such committees should have formal terms of reference approved
by the board of directors.
212
Where appointed, the terms of reference of any such board committees must be
clear and should include at least:
➤ the extent of its powers;
➤ an indication of the responsibilities delegated to it;
➤ its lifespan;
➤ its role and functions;
➤ its reporting procedures; and
➤ its authority.
Concerns have been expressed that the constantly increased expectations of mem-
bers of audit committees have become unrealistic and have greatly increased the risk
exposure of the individuals involved. The available pool of people ‘qualified’ to serve
on audit committees is limited and many are executive directors of other companies
who, whilst they may have experience, have limited time to spend on any one audit
committee’s affairs. In times of increased accountability demands on directors, the
non-executive directors serving on audit committees are finding their personal risk
exposure is greatly increased. It is likely that remuneration of non-executive directors
will be increased to take account of the higher risks they face. It is notable that in the
case of the recent major corporate collapses, all had functioning audit committees who
did not seem able to prevent the collapse and in some instances, undoubtedly having
213
inside information of the parlous state of affairs, were party to unethical actions and
conduct in order to protect their personal interests in the company. An example of an
audit committee charter is contained in Appendix B.
The requirement for the appointment of an audit committee for South African
companies is presently contained in the JSE listing requirements and thus applies
to listed companies only. The Public Finance Management Act requires all public
entities regulated by the Act to appoint an audit committee, and the legislation
regulating the various types of financial institutions similarly requires the appoint-
ment of an audit committee.
214
External Audit
In South Africa, external auditors are required by statute to be appointed for
every company to report on the company’s annual financial statements, prepared
in accordance with a generally accepted accounting framework. Previously, this
framework was the South African Standards of Generally Accepted Accounting
Practice, but with effect from January 2005 is now in terms of International
Financial Reporting Standards (IFRS). In South Africa, the external auditor’s audit
responsibilities are governed by the relevant company legislation, the Public
Accountants’ and Auditors’ Act, and the regulatory requirements for particular
industry sectors, such as the Banks Act, the Insurance Act and the Pension Funds
Act, to mention a few. In addition, the client engagement letter should set out
additional services to be provided.
Following the publication of the new IFAC Code of Conduct for Professional
Accountants and the Sarbanes-Oxley Act in the US, the nature of additional ser-
vices provided to audit clients is restricted, and care should be taken to ensure
that any threats to the external auditors’ independence are dealt with and that
their independence is not compromised in any way. The South African Auditing
Standards (SAAS) are issued by the Public Accountants’ and Auditors’ Board and
set out requirements for the performance of the audit and review of financial state-
ments, as well as other assurance engagements. From 1 January 2005, South Africa
adopted the full set of the IAASB’s International Engagement Standards including
the International Standards on Auditing (ISA’s), International Standards on Review
Engagements (ISREI’s), International Standards on Assurance Engagements (ISAE’s)
and International Standards on Related Services Engagements (ISRS’s).
From the perspective of the audit of financial statements, external audit does not
report specifically on the corporate governance practices of the entity; however,
the increased corporate governance disclosures in the published audited financial
statements of listed entities required by securities exchanges around the world
has resulted in changes to auditing standards internationally, including imposing
additional requirements on auditors for fraud detection and communication of
significant weaknesses in internal controls to those responsible for organizational
governance. The Sarbanes-Oxley Act requires an independent external audit of the
effectiveness of internal controls affecting the financial reporting of all US-listed
entities.
Internal Audit
So how do these corporate governance developments nationally and internationally
affect what an internal auditor does? The IIA Standards and Code of Ethics (see
Appendix A), define the objective of internal auditing as follows:
King II contains the same definition of internal audit, as does the Public Finance
Management Act. Consequently, in order to perform the internal audit function,
215
‘Internal audit activities are performed in diverse legal and cultural environments; within
organizations that vary in purpose, size, and structure; and by persons within or outside
the organization. These differences may affect the practice of internal auditing in each
environment.’
And, in dealing with the responsibility of internal audit for governance matters, IIA
Standard 2130: Governance indicates the following:
‘The internal audit activity should contribute to the organization's governance process by
evaluating and improving the process through which (1) values and goals are established
and communicated, (2) the accomplishment of goals is monitored, (3) accountability is
ensured, and (4) values are preserved.’
Figure 22.1 reflects the changes in the role of internal audit that have occurred
during the past ten years in listed companies and public entities. What will quickly
become apparent from this figure is that as the focus of internal audit has changed,
the skills needed by internal audit personnel have had to adapt and change:
➤ Reactive: The initial focus was on auditing transactions in order to provide
assurance regarding financial risks within an organization.
➤ Proactive: This role developed into one of participating with management in
identifying risks that could lead to losses through weak or ineffective controls.
➤ Strategic: The role developed still further into the current one of supporting the
risk committees of the board to identify and assess strategic and operational
risks, and to provide cost-effective methods of dealing with them.
Not least has been the need for internal auditors to make greater use of sophisticated
technology and knowledge management systems in order to develop key performance
indicators and benchmark performance targets to assess the strategic and business
process risks critical for the sustainability of often complex and global organizations.
In addition, the importance of technology and systems and business continu-
ity plans must be recognized, and accordingly internal staff must develop the
necessary technological skills to assess an organization’s controls and business
processes. This is necessary to enable an internal auditor to present focused, high-
level and concise reports to the risk committee and board of directors regarding
risk management issues, so that they in turn can make better-informed decisions
for managing the organization.
216
217
➤ ‘The engagement’s objectives should address the risks, controls, and governance pro-
cesses associated with the activities under review.’
➤ ‘When planning the engagement, the internal auditor should identify and assess risks
relevant to the activity under review. The engagement objectives should reflect the
results of the risk assessment’ (IIA Standard 2210.A1).
➤ ‘The internal auditor should consider the probability of significant errors, irregulari-
ties, non-compliance, and other exposures when developing the engagement objec-
tives’ (IIA Standard 2210.A2).
These standards are in line with the principles of corporate governance discussed
earlier in this chapter. Readers are referred to Practice Advisory 2210.A1-1, which
provides further guidance in this regard, and to Chapter 6 for a detailed discussion
of the risk-based approach to internal audit.
As with any other department or function in an organization, internal audit will prob-
ably experience a turnover in staff with ongoing recruitment and training implica-
tions. Many organizations use internal audit as a means of exposing staff that show
potential for growth to the operation’s risks, controls and business processes, before
moving them into middle management positions in the organization. This staff move-
ment will also mean that at times the internal audit function may lack particular
skills needed to perform particular engagements. In such circumstances, the exper-
tise may be sought from professional firms offering internal audit or management
assurance services to clients.
218
‘Consulting engagement objectives should address risks, controls, and governance pro-
cesses to the extent agreed upon with the client.’
As the demands for improved corporate governance increased, the existing internal
audit functions in organizations failed to anticipate the changing role of internal
audit and remained in a reactive role focusing on transaction auditing. In addition,
the requirements of the Public Finance Management Act requiring the appointment
of internal audit functions at all public entities in South Africa found the internal
audit profession very short of suitably qualified persons to be appointed.
The large professional firms of accountants and auditors recognized this marketing
opportunity and moved aggressively into the gap to offer internal audit or manage-
ment assurance services to organizations, drawing on established firm reputations
and often offering better technologies to provide strategic and business process risk
assessments and more streamlined internal audit engagements.
The collapse of Enron, where the external auditors, Arthur Andersen, had been
heavily involved in providing both external and internal audit services, as well as
other consultation services, sounded alarm bells through the profession and resulted
in the Sarbanes-Oxley Act preventing external auditors of US-listed corporations
from offering, among other things, internal audit services to their external audit
clients. Such services are regarded as a threat to external auditor independence.
Consequently, different professional firms will generally become involved in provid-
ing external and internal audit services to a client where the latter are outsourced.
The scope of outsourced internal audit services must be agreed with management.
These services may involve a full internal audit service or, where the organization
also employs internal auditors in-house, may involve the external service providers
in specific areas of internal audit. Confidentiality and auditor liability issues arise for
outsourced internal audit engagements, as do issues around access by the external
auditors to working papers prepared for the outsourced internal audit engagement,
and consultation with external auditors of the organization. These should be dealt
with in the engagement letter appointing the external assurance providers.
219
Learning objectives
After studying this chapter, you should be able to:
➤ Discuss briefly current developments in international financial reporting stan-
dards Explain the role of internal audit in the financial reporting process
➤ Discuss the role and responsibilities of internal audit in the appointment of
external audit and outside consultants
➤ Explain how internal audit co-ordinates its plans and activities with those of
the external auditors
➤ Discuss the circumstances under which external audit may use the work performed
by internal audit in the corporate governance and financial reporting process
➤ Explain the possible role and responsibilities of internal audit in the quarterly
and annual financial reporting review process
➤ Discuss the implications for internal audit of the worldwide move by listed
companies to comply with international financial reporting standards
Financial Reporting
It is assumed that CIA students and others using this book will have completed
undergraduate courses in financial accounting and corporate finance. Consequently,
this chapter concentrates on the application of their knowledge in practice and does
not discuss the conceptual framework for accounting, nor individual accounting
standards.
Nevertheless it is worthwhile considering the reporting of financial information in
the published accounts of an organization. To be useful, financial information must
comply with certain characteristics, namely:
➤ Reliability where the financial information can be depended upon to represent
accurately the present state of financial affairs of the organization. This involves
ensuring:
◗ neutrality, such that the information is not biased;
◗ verifiability, so that independent evaluators can reach the same conclusions
using the same methods;
◗ faithful representation, such that the financial statements are in agreement
with the actual events they purport to represent.
➤ Comparability, such that financial statements of the organization can be
compared to those of other similar organizations.
➤ Relevance, where information must be usable and appropriate in decision-
making. This means that information must:
◗ have a predictive value, such that the outcome of future events can be
reliably predicted;
have a feedback value, such that reality can be compared to prior expecta-
◗
tions;
◗ be of a timely nature, such that the information is still relevant to decision-
making.
➤ Consistency such that the financial statements are comparable over periods of
time.
Many global companies boast turnovers and net assets in excess of the gross
domestic product of small countries and exercise considerable political and eco
nomic influence. In order to gain access to capital internationally to finance their
operations, many of these organizations are listed, for example, on the New York
Stock Exchange or the NASDAQ in the US, the London Stock Exchange in the UK,
the Hong Kong Stock Exchange and stock exchanges in several European Countries
and the Johannesburg Securities Exchange in South Africa. Each stock exchange
has strict requirements for listed companies to comply with, including requirements
to comply with national or international financial reporting standards. IOSCO – the
international organization that regulates stock exchanges worldwide – has also influ
enced international developments to find common standards of accounting inter
nationally.
Globalization of business operations is probably regarded as the most significant
change agent for accounting standards that has occurred during this period. It
has led to demands by businesspeople for comparable national and international
standards in the accounting treatment of transactions and disclosures in financial
statements nationally to make financial reporting comparable and comprehensible
to users.
221
The field of financial accounting has undergone sweeping changes in the past ten
to 20 years with accounting standards being developed nationally and internation
ally by standard setters that seek to harmonize ‘generally accepted accounting
frameworks’ of different countries with those developed internationally. In spite of
this, there are differences between the standards of several major countries and
international standards. The International Federation of Accountants (IFAC) and the
International Accounting Standards Board (IASB) has lead with the promulgation of
the International Financial Reporting Standards (IFRS), which dozens of countries
around the world are adopting as the accepted standards of financial reporting for
both listed and unlisted companies.
The ongoing collapses of large corporate entities in the US, the UK, Europe,
Australia and South Africa and many others are frequently followed by claims
that, in addition to blatant fraud by top management, companies have misapplied
accounting standards or manipulated them to misstate their financial results or have
used inappropriate accounting policies to mislead their shareholders and the public
with fraudulent financial reporting. There is a need to achieve greater accountability
and transparency by all organizations, whether profit-making, non-profit-making or
governmental. Consequently, management and regulators are looking to internal
audit and audit committees for assistance to improve the governance and financial
reporting process.
‘Financial Reporting
➤ Providing information relevant to the appointment of the independent accountants.
➤ Co-ordinating audit plans, coverage, and scheduling with the external auditors.
➤ Sharing audit results with the external auditors.
➤ Communicating pertinent observations with the external auditors and audit commit-
tee about accounting policies and policy decisions (including accounting decisions
for discretionary items and off-balance sheet transactions), specific components of
the financial reporting process, and unusual or complex financial transactions and
events (eg related-party transactions, mergers and acquisitions, joint ventures, and
partnership transactions).
➤ Participating in the financial reports and disclosures review process with the audit
committee, external auditors, and senior management; evaluating the quality of the
financial reports, including those filed with regulatory agencies.’
222
committees of many large organizations are given the responsibility for advising
the board of directors on external audit, and the head of internal audit advises on
appointments and approves external and internal audit fee budgets.
The IIA Standards require internal auditors to share information and co-ordinate
activities with other internal and external providers of relevant assurance and con
sulting services. Depending on the circumstances of the particular internal audit
structure within an organization, internal auditors may have some involvement in
the selection or retention of the external auditors and in the definition of the scope
of the work required, in addition to the external auditor’s statutory responsibilities
(further guidance is provided in IIA Practice Advisory 2050-2).
Appropriate policies for the selection or retention of external audit services should
consider addressing the following attributes:
➤ board or audit committee approval of the policy;
➤ the nature and type of services covered by the policy;
➤ the duration of the contract, the frequency of the formal request for services
and/or determining whether to retain the existing service providers;
➤ participants or members of the selection and evaluation team;
➤ any critical or primary criteria that should be considered in the evaluation;
➤ limitations on service fees and procedures for approving exceptions to the
policy; and
➤ regulatory or other governing requirements unique to specific industries or
countries.
The board of directors will also address the acquisition of consultant services other
than just financial statement audits that may be offered by external audit firms
and may delegate responsibility for negotiations to the audit committee. These
may include:
➤ tax services;
➤ consulting and other non-audit services;
➤ internal audit outsourcing and/or co-sourcing services;
➤ other outsourced or co-sourced services;
➤ special services, such as agreed service engagements;
➤ valuation, appraisal and actuarial services;
➤ temporary services such as recruiting, bookkeeping and technology services;
and
➤ legal services provided by external audit firms, such as forensic investigations.
A word of warning must be sounded here. Following the collapse of Enron and
WorldCom in the US, the Sarbanes-Oxley Act severely restricts the nature of the
consulting services that an external auditor may provide to an audit client listed
on the New York or NASDAQ Stock Exchanges, wherever in the world the organiza-
tion may have operations. This is intended to reinforce auditor independence and
prevent conflicts of interest. For example, an external audit firm may not provide
both external and internal audit services to the same US listed client. The large
audit firms worldwide have responded by selling off their consulting activities to
independent organizations and distancing their audit and assurance services from
their consulting services.
Some of the large audit firms have generally moved their statutory audit services
into incorporated companies and formed separate private companies to handle
223
the audit firm’s other assurance services, such as tax and audit advisory activi-
ties. This enables the audit firm to offer its services under the same firm branding
while limiting its liability on the non-statutory, other assurance and related services
engagements. Arrangements for external audit engagements and other assurance
and related services should be documented in a letter of engagement and signed
by both the service provider and the engagement client.
Internal auditors should determine how an organization monitors ongoing service
activities from external auditors. Compliance with the terms of service contracts and
other agreements should be assessed on a periodic basis. Assessment of the inde
pendence of the external auditors should include internal audit participation, be
performed at least annually, and be communicated to the audit committee.
224
➤ ‘Assessing the adequacy and effectiveness of the organization’s internal controls, spe-
cifically those controls over the financial reporting process; this assessment should
consider the organization’s susceptibility to fraud and the effectiveness of programs
and controls to mitigate or eliminate those exposures.
➤ Monitoring management’s compliance with the organization’s code of conduct and
ensuring that ethical policies and other procedures promoting ethical behavior are
being followed; an important factor in establishing an effective ethical culture in the
organization is when members of senior management set a good example of ethical
behaviour and provide open and truthful communications to employees, the board,
and outside stakeholders.’
Heavy penalties, including jail sentences and substantial fines, may be imposed on
any CEO and CFO who fails to comply with these requirements.
IIA Practice Advisory 2120.A1-4 suggests that the internal audit function should
allocate the internal audit’s resources to the financial reporting, governance and
225
226
Learning objectives
After studying this chapter, you should be able to:
➤ Explain the importance of cost and managerial accounting principles for the
work of an internal auditor
➤ Discuss how an internal auditor can add value to management in auditing
aspects of costing systems
➤ Describe some of the important cost and managerial accounting principles
➤ Discuss briefly the different audit work that an internal auditor may perform in
respect of an organization’s costing systems
➤ Explain the principles underlying cost and revenue decision models and the
role of internal audit in management’s decision processes
➤ Discuss briefly the issues that arise in determining cost allocations and how
this affects the evaluation of management
➤ Explain briefly the nature of quality control costs and the work of an internal
auditor in this regard
54. H
orngren, C.T., Foster, G. & Datar, S.M. 1994. Cost Acccounting: A Managerial Emphasis. 8th
ed. Englewood Cliffs: Prentice Hall. p. 3.
228
In order for management to make sound business decisions, the information pro
vided by the management accounting systems must have integrity and be focused
and relevant. Management will often establish benchmarks or key performance
indicators against which to continuously evaluate the actual performance or outputs
from the different business processes, in order to control costs and optimize pro
ductivity and revenues.
An internal auditor may therefore be asked to report on, or may identify, the fol
lowing areas for audit:
➤ key aspects of the management information system and its controls, in order to
verify the integrity of the information being reported to management;
➤ the analysis of particular cost aspects and behavioral aspects affecting the
effectiveness, efficiency and economy of the business processes, and the
achievement of the key performance indicators or benchmarks set by manage
ment; and
➤ the causes and quantum of unexpected losses, waste and fraud in any of the
business processes or individual areas of the value chain. (Internal audits for
losses, fraud and waste are dealt with more fully in Section 6.)
The reports of the internal auditor on any of these aspects should inform the strate
gic and operational decisions of management. Thus it is important that the internal
auditor understands the basic principles underlying costing systems in order to
ensure that appropriate audit procedures are applied, correct analyses of costs
are performed, and weaknesses in internal controls or business processes affecting
costs are identified and reported promptly to management.
229
◗ access to running water and electricity is provided to areas that have never
previously received such services; or
◗ the roll-out of medical programmes is implemented in accordance with pol
icy directives at government hospitals and clinics and is being complied with.
These are a few examples of the imperatives that government departments may
seek to meet and for which these departments will implement controls and opera
tional processes. Since such departments also incur both direct and indirect costs,
an internal auditor in the public sector similarly needs to understand the basis for
allocating costs according to departmental budgets and the types of performance
and compliance requirements that have to be met in order to identify problems and
report on them.
Different costing approaches and their implications will be encountered. These will
be determined not only by the specific business and product or service provided, but
also by the types of costing systems generally in use in the sector that the organiza-
tion is engaged in, such as manufacturing, service and merchandising sectors.
230
An internal auditor called upon to review the profitability of particular product lines
needs an understanding of the cost-profit-volume (CPV) analysis for determining
the breakeven point and contribution margins of the revenues generated by an
organization. Any analysis is subject to uncertainties, and management may often
look for ‘what if’ scenarios to be presented involving the application of a sensitiv-
ity analysis allowing for changes in the original predicted data or changes in the
underlying assumptions. These approaches are discussed in detail in Chapter 21.
Costing systems will generally involve a comparison between actual and budgeted
costs to allow for monitoring of profitability of products, services and departments,
and performance of employees and management. Many manufacturing organizations
use standard costing approaches. The standard costing variances provide informa-
tion about the process that enables management to monitor production. Price and
efficiency variances are amongst important cost performance measures that many
manufacturers monitor closely. It is also recognized that costs may be affected by
both quantitative and qualitative factors. Internal audit may conduct investigations
to identify qualitative factors affecting productivity and, indirectly, costs of products.
Historical data from costing systems also provide the basis for management’s pre-
dictions and budget estimations, affecting short-term and long-term strategic and
operational decisions. Hence, maintaining the integrity of the information provided
by the cost accounting systems is important.
231
Costing of Production
Spoilage, scrap, rework and waste
Under normal, efficient operating conditions, a certain degree of spoilage is to be
expected in the short run and should be treated as a cost of production of good
units. This is referred to as normal spoilage. Abnormal spoilage is classed as spoilage
which is not expected to occur under normal, efficient operating conditions. Such
costs must be identified separately so that management can monitor and correct
the conditions which led to the spoilage.
Scrap is taken to be raw materials left over from normal production and usable for
purposes other than those for which the material was originally intended. These
purposes could include usage within a different production process were being sold
off to third parties for a nominal amount. The scrap is usually taken to be a result of
normal production and the disposal value credited to the factory overhead account.
Rework costs are those associated with the conversion of defective production units
into saleable ones. If the costs can be identified against a specific job, then they are
normally allocated to that job, otherwise normal rework costs would be charged to
factory overhead.
Waste is taken to be those raw materials left over from the production process and
not saleable at any price.
Standard Costing
Standard costing involves a notional value of the cost to produce a given unit.
It is used to identify variances from production target costs when actual cost
differ from the budgeted standard cost. Standard costs are usually established
separately for materials, labor and factory overheads. It should be noted that
variances from standard cost can be favorable (where actual costs are less than
the budgeted standard cost) or unfavorable (were the actual costs exceed the
standard). Standard costs are also closely associated with a management decision
technique known as incremental costing. Incremental costs are the additional costs
incurred to produce one more unit. Under normal circumstances the incremental
costs would be for direct materials, direct labor, and any variable overhead
associated with production. Additional fixed costs would not normally be incurred
to produce one more unit, unless the additional production would involve the
232
acquisition of increased capacity (eg by hiring one more worker or purchasing one
more machine). Incremental costing is commonly used in decisions to make or buy,
should production capacity need to be expanded.
Management is often faced with making choices between cost and revenue alterna
tives, for example:
➤ rearranging production lines to achieve cost savings in labor by introducing
greater use of technology and then having to predict the effect on levels of out
put, production costs and savings, and quality of products;
➤ decisions regarding retention vs replacement of ageing plant, where new and
more sophisticated plant may have a greater production capacity;
➤ decisions on product mix, where a production line is working to capacity – typ
ically encountered by food processing plants offering different brands and
needing to maintain inventory levels in all product lines, or to meet a shortage
to fill a large customer order;
➤ decisions to outsource production or processing operations instead of running
them in-house; and
➤ changes in customers that may affect the products produced and open up
other more profitable opportunities.
In each of the examples above, management consider relevant revenue and costs
analyses to identify the key cost drivers. Of themselves, historical costs have no rel-
evance in making decisions affecting future courses of action. The predicted relevant
costs and revenues, based on historical data should changes not be made, do, how-
ever, provide a basis for comparison to the predicted future costs and benefits from
the available options. This enables management to determine the effect on business
profitability and its planned strategic directions before making an informed decision.
Due consideration must also be given to the opportunity cost from pursuing one
course of action rather than another. Internal auditors often assist in determining
which revenues and costs are relevant to such business decisions.
233
Internal audit may well become involved in auditing both costs and pricing models
to provide assurance that relevant costs have been taken into account, or to provide
evidence regarding the basis used for pricing the organization’s products.
234
allocated. Another challenge is the allocation of costs to joint products and byprod-
ucts. In the case of merchandise inventory, costs may be determined on the basis of
a percentage of sales prices. Organizations may apply a FIFO or weighted average
system for costing finished inventories. Both approaches have merit depending on the
type of inventory. However, tax considerations may influence the choices made.
A further consideration will be the costs of spoilage, reworked units and scrap
arising from the production process. Reworked items may finally be included in
inventory, but spoiled units and scrap are not part of the inventory output and
should be expensed.
An internal auditor may well become involved in auditing the calculations or
providing input on various cost allocation bases relevant to the organization or the
cost object affected in order to resolve disputes.
235
An internal auditor may audit the quality control processes or be called on to inves
tigate and identify the causes of poor quality performance in particular depart
ments. Refer to Chapters 16 and 18 for further discussions of performance audits.
236
Learning objectives
After studying this chapter, you should be able to:
➤ Outline briefly the legal and regulatory environment in which an internal audi-
tor operates
➤ Explain how the regulatory and legal environment in which an organization
operates affects the work of an internal auditor
➤ Design internal controls to identify and monitor any non-compliance with laws
and regulations that may adversely affect an organization
➤ Develop audit programs to evaluate the effectiveness of internal controls over
critical regulatory compliance areas
Penalties for non-compliance have been significantly increased and many breaches
are now classified as criminal activities, resulting in CEOs, CFOs, senior management
and external auditors facing jail terms if convicted of fraudulently misleading the
public or failing to comply with relevant laws.
The public sector has similarly responded with legislation entrenching corporate
governance requirements, such as the Public Finance Management Act and the
recent Municipal Finance Management Act in South Africa. Among other things,
these Acts require the appointment of an audit committee and internal audit func-
tion for every public entity to which they apply.
‘Internal auditors are encouraged to consult legal counsel in all matters involving legal
issues as requirements may vary significantly in different jurisdictions.’
238
Clearly management will weigh up the cost benefit of controls that ensure compli-
ance relative to the sanctions that might be imposed if non-compliance is detected
by the regulatory authority.
Several new laws in South Africa concerned with investor protection require organi-
zations affected to appoint compliance officers to perform specific duties under the
relevant Act, for example those regulating investment advisers and micro-lenders. In
such instances, an internal auditor would need to establish whether the compliance
officers have met their responsibilities in terms of the relevant statute.
239
240
Information Technology
Auditing Information
Technology
Learning objectives
After studying this chapter, you should be able to:
➤ Outline briefly the scope and objectives of an IT auditor
➤ Explain the essential jargon of IT and its meaning
➤ Explain the basic concepts within an IT environment
➤ Describe the impact of IT on risk, control objectives and audit objectives
➤ Define and describe the range of IT audit services offered by internal audit
➤ Define the nature and types of system controls
➤ Define the nature and type of general controls
‘Continuous changes in technology offer the internal auditing profession both great
opportunity and risk. Before attempting to provide assurance on the systems and pro-
cesses, an internal auditor should understand the changes in business and information
systems, the related risks, and the alignment of strategies with the enterprise’s design
and market requirements. The internal auditor should review management’s strategic
planning and risk assessment processes and its decisions.’
Hardware
Hardware consists of those components that can physically be touched and manipu-
lated. Principal among these components are the following:
CPU
The central processing unit is the heart of the computer. This is the logic unit, which
handles the arithmetic processing of all calculations.
Peripherals
Peripheral devices are those that attach to the CPU to handle, usually, inputs and
outputs. These include:
➤ screens and monitors;
➤ terminals;
➤ printers; and
➤ disk and tape devices.
Memory
In computers, memory takes the form of silicon chips capable of storing information.
In commercial computers, this information takes the form of 1 and 0 in the notation
known as binary. Memory comes in various forms:
➤ RAM: Random access memory is also called dynamic or volatile memory. Its
contents can be changed, but can also be lost if the power supply is interrupt-
ed.
➤ ROM: Read-only memory is a form of memory whereby instructions are
‘burned in’ and not lost in the event of a power failure. These programs cannot
be changed. This is also known as non-volatile memory.
➤ PROM: Programmable read-only memory is similar to ROM, but its contents
can be changed.
➤ EPROM: Erasable programmable read-only memory is similar to PROM, but the
instructions can be erased by ultraviolet light
➤ There is another version of memory known as non-volatile RAM. This is memory
that has been attached to a battery so that, in the event of a power failure, the
contents will not be lost.
Mainframe
Mainframe computers are the large (physically as well as in terms of power) com-
puters used by companies to carry out large-volume processing and concentrated
computing.
Mini-computers
Minicomputers are physically smaller than mainframes, although the power of many
minicomputers exceeds that of recent mainframes.
LANs
Local area networks are collections of computers linked together within a compara-
tively small area.
244
WANs
Wide area networks are collections of computers spread over a large geographical
area.
Storage
Data is stored in a variety of forms for both permanent and temporary retention.
➤ Bits are binary digits, individual ones and zeros.
➤ Bytes are collections of bits making up individual characters.
➤ Disks are large-capacity, generally magnetic, storage devices containing any-
thing from 10 Mb to several terabytes of data.
➤ Diskettes are small-capacity removable disks such as:
◗ floppies or stiffies that hold from 360 Kb to 100 Mb (plus) of data;
◗ optical disks which are laser-encoded disks such as compact disks (CDs) and
DVDs.
➤ Tapes – can be reel-to-reel or cassette.
➤ Memory sticks contain either volatile or non-volatile RAM.
Communications
In order to maximize the potential of the effective use of the information on comput-
ers, it is essential that isolated computers be able to communicate and share data,
programs and hardware devices.
Terminals
Terminals are remote devices allowing the input to and output from the computer
of data and programs.
Modem
A MOdulator/DEModulator translates digital computer signals into analogue signals
for telephone wires and retranslates them at the other end.
Multiplexer
This combines signals from a variety of devices to maximize utilization of expensive
communication lines.
Cables
These are metallic cables, usually copper, that carry the signals between computers.
They may be a ‘twisted pair’ cable, where two or more cables are strung together
within a plastic sleeve, or a coaxial cable, where a cable runs within a metallic braid-
ing in the same way as a television aerial cable.
Fiberoptics
These consist of fine strands of fiberglass or plastic filaments that carry light signals
without the need for electrical insulation. They have extremely high capacity and
transfer rates but are expensive.
245
Microwave
This form of communication involves sending high-power signals from a transmitter
to a receiver. They work on a direct line-of-sight basis and require no cabling.
Input
Inputs to computer systems have developed rapidly over the years. An auditor will
still occasionally encounter some of the earlier types.
Cards
Rarely seen nowadays, punched cards were among the first input and output media
and consisted of a cardboard sheet, some eight inches (20 cm) by four inches
(10 cm), with 80 columns where rectangular holes could be punched in combina-
tions to represent numeric, alphabetic and special characters.
Paper tape
Another early input/output medium, paper tape was a low-cost alternative to
punched cards and consisted of a one-inch (2,5 cm) wide paper tape with circular
holes punched to form the same range of characters as with punched cards.
Keyboard
The most common input device today (although this is changing), most keyboards
are still based on the original typist’s QWERTY keyboard design.
Mouse
This is an electromechanical pointing device used for inputting instructions in real
time.
Scanner
This is an optical device that can scan pictures into a digitized computer-readable
form. It can be used in combination with OCR (optical character recognition) soft-
ware to allow the computer to interpret the pictures of data into actual characters.
Bar code
This is optically recognizable printing that can be interpreted by low-cost scanners.
This type of coding is common in retail operations.
Voice recognition
Perhaps the future of computer input, this is a system whereby a computer user,
programmer or auditor simply dictates into a microphone and the computer
responds appropriately.
Output
As with inputs, outputs are changing rapidly. In early computing times, output came
in three basic forms. The most common of these was paper; however, quantities of
cards and paper tape were output for subsequent reprocessing. Nowadays most
outputs are via screens or directly onto magnetic media.
246
Paper
Still a popular output medium, paper may be in continuous stationery form, cut
sheet form, pre-printed business stock such as invoices, or negotiable instruments
such as checks.
Computer
Output directly to another computer is a growing trend with the coming of age of
electronic data interchange (EDI).
Screen
Output to screen is the current norm for the majority of outputs, with text, graphics,
tables and charts, and three-dimensional forms possible.
Microfilm/fiche
For the permanent, readable recording of outputs, and needing a small storage space,
microfilm is a popular output medium. Each frame contains one page of printed out-
put. An alternative is the creation of a microfiche measuring approximately six (15 cm)
inches by four (10 cm) inches and containing some 200 pages of printout.
Magnetic media
Output to disks, diskettes and tapes is commonly used to store large volumes of
information.
Voice
Where a permanent record is not required, another new output medium is voice.
Control
Within computer systems, control is exercised at a variety of points within the over-
all architecture. At each stage, opportunities exist to vary the manner in which the
systems perform to meet users’ needs.
Operating system
The operating system is the set of programs that controls the basic operations of the
computer. All other software runs under the direction of the operating system and
relies on its services for all the work it undertakes.
Applications
These systems perform the business functions required of the computer. They run
under the direct control of the operating system but contain many powerful control
elements themselves.
Parameters
These are user-defined variations adjusting the way in which programs normally
operate.
Run instructions
These are instructions to operators of computers instructing them on the jobs to be
run and responses to machine questions to be entered.
247
JCL
Job control language is a means of automating the job running process by giving the
computer the instructions in the form of batch programming language.
People
Operators
They run the computers on a day-to-day basis.
Programmers
They write the application programs that run on computers.
Systems designers
They design the overall structure of the application systems and specify the pro-
grams required.
Systems analysts
They analyze the business structures, applications and procedures to determine
what, if any, contribution Information Systems (IS) can make. They will also design
the outline business specifications of new systems.
Systems programmers
They are responsible for the well-being of the operating systems and the related
systems software components.
Database analysts
They are responsible for maintaining the database management system (DBMS),
which is the systems software controlling access to and the format of the data.
Network analysts
Network analysts are responsible for ensuring that availability, performance stan-
dards and security are achieved on networks.
Management
Management plan, organize and direct to ensure corporate objectives are
achieved.
Data
Data in IT terms consists of fields held in records, in turn held in files, and stored on
disk or any other storage medium discussed elsewhere in this section.
248
Systems software
Systems software includes computer programs and routines controlling computer
hardware, processing and non-user functions. This category includes the operating
systems, telecommunications software and data management software.
Applications software
Applications software includes computer programs written to support business
functions, such as the general ledger, payroll, stock systems, order processing and
other such line-of-business functions.
End-user systems are special types of application systems that are generated
outside the IS organization to meet specific user needs. These include microbased
and user-developed systems.
Control Procedures
In order to ensure that control over the corporate computer investment is ade-
quate, a range of controls is required.
General IS controls
These cover the environment within which the computer systems are utilized.
Application Controls
Application systems have their own sets of in-built controls, which are primarily
business systems-oriented. Generally they include such control objectives as accu-
racy, completeness and authorization. In addition, there may be compensating con-
trols, where weak controls in one area may be compensated for by other controls.
249
Classifications of Controls
Controls are usually classified into the general categories of preventative, detective
and corrective.
➤ Preventative controls prevent an undesirable event from occurring and include
controls such as restrictions on users, requirements for passwords and separate
authorization.
➤ Detective controls detect undesirable events after the fact so that action may
be taken. These include effective use of audit trails and the use of exception
reports.
➤ Corrective controls allow things to be put right and include such controls as rec-
onciliations, transaction inquiry and correction procedures, and disaster recov-
ery plans.
These are controlled through a variety of control objectives that address specific
threat areas.
Input methods could include a mixture of online input, batch input, input from inter-
facing systems and EDI. Controls at this stage would typically include:
➤ the use of prenumbered documents;
➤ control total reconciliation;
➤ data validation in all its forms;
➤ activity logging;
250
➤ document scanning;
➤ access authorization; and
➤ document cancellation.
Processing types may include batch processing, interactive update (real-time) and
online batch processing, where the data is captured online but the processing takes
place in a batch environment.
Outputs could include hard-copy printouts, file output for onward processing or
online enquiry replies.
251
If these control objectives are adequately addressed and the appropriate controls
are implemented, then the risks within the computer systems should be effectively
minimized.
Batch vs Online
In the early days of commercial computing up to the late 1960s, most processing
took place in batches only. This meant that all inputs were collected centrally and
entered together in ‘batches’ of documents. This would usually take place using a
centralized data preparation function to convert the data from written form into
holes punched into either cards or continuous paper tape. The process was highly
error-prone and the input medium could be easily damaged.
In later batch systems, the data was entered through a terminal onto a file, which
would later be processed in batch mode.
In this type of system, the primary control objectives were the accuracy and com-
pleteness of capture.
Many highly effective controls were designed and implemented to ensure com-
pleteness of capture of batches of data, complete capture of all batches, and
accurate capturing of batches of input data. These controls included the manual
preparation of batch header documents for later comparison to computer-gener-
ated information, and double keystroke verification, whereby an operator entered
the data into a batch of cards or directly into a file containing a batch of input trans-
actions. This data was then re-entered by an independent data capture clerk and
system-compared to ensure accuracy and completeness.
With the advent of online systems, such controls fell away, since they were no
longer appropriate. In many cases within an online environment, very few alternative
controls were implemented and often an auditor will find that large assumptions are
made as to the adequacy of the controls surrounding the accuracy and complete-
ness of data input.
In today’s systems, capture and processing will normally take place using online,
real-time data capture with a small batch component. Input is typically through a
terminal with instantaneous update. Overnight report production in batch mode is
common. The terminals may be local or remote, and the remote terminals may be
either dial-up or dedicated. The terminals themselves may be of differing types, but
the principal control objectives remain as:
➤ availability;
➤ security;
252
➤ confidentiality; and
➤ accuracy.
In recent years, the Internet has become of increasing concern as well as use to
internal auditors. The Internet is a worldwide collection of computers connected
together loosely, and provides both a source of information and a source of external
risk.
Networks may be configured as point-to-point with separate direct links.
An alternative configuration could be a multidrop one, with multiple terminals
sharing a single line. Ring networks have no central computer: each machine is
classed as a ‘node’ on the network; while star networks have a single, central
computer co-ordinating all communications.
253
Areas where security could be threatened include the operating system and particu-
larly its management features, as well as intercomputer communication, including
dial-up access, gateways and poor network performance.
In any networked operation, availability is a major concern. This includes avail-
ability of the hardware components, the software, the data, the networking capabil-
ity and the human resources.
Typical controls in this area to protect against unavailability are the ensuring of:
➤ an adequate physical environment;
➤ adequate back-ups;
➤ multiple redundancies in equipment to ensure no reliance on a single piece;
➤ peer-to-peer networking to permit mutual back-up;
➤ adequate disaster recovery planning; and
➤ appropriate training.
Security itself is a factor of the hardware, the software and the human element.
➤ Hardware is liable to theft, sabotage and penetration.
➤ On the software side, the operating system software may itself be stolen, cor-
rupted or bypassed, while applications software may suffer a similar fate and
may also be substituted by an alternative application.
➤ Data is one of an organization’s most valuable assets and may be liable to
theft, corruption, substitution or manipulation.
Such security threats may come from normal users of the systems, deliberately
or accidentally, specialist insiders such as the IT staff, legitimate outsiders such as
computer engineers or even customers and suppliers who have been granted access
to the site, or outside hackers who attempt to penetrate an organization’s security
for fun or profit.
254
Auditing General
and Application Controls
Learning objectives
After studying this chapter, you should be able to:
➤ Outline briefly the exposures and control objectives within the various types of
information processing center
➤ Describe the controls normally used to mitigate the risks
➤ Formulate and implement an appropriate audit program to evaluate the ade-
quacy and effectiveness of general IT controls
➤ Modify such a program for use in distributed environments and networks
The control environment will include controls over the computer systems, which fall
into two broad categories: general controls and application controls.
General Controls
General controls comprise all the policies and procedures, both manual and
computerized, that govern the environment within which an organization’s computer
systems are developed, maintained and operated, and within which the application
controls operate. General controls include the systems development standards
operated by an organization, which are dealt with in Chapter 30, and those con-
trols that apply to the operation of the computer installation, such as its hardware
Application Controls
Application controls, on the other hand, are defined as the controls, both manual
and computerized, within the area of the business application that ensure that data
is processed accurately, completely and in a timeous manner. Application controls
are specific to individual applications and include:
➤ controls over input, such as data validation and batching;
➤ run-to-run controls designed to check the accuracy and completeness of pro-
cessing by checking file totals at prespecified stages in processing; and
➤ controls over output to ensure accuracy, completeness and confidentiality.
The computer operations department houses the staff involved in the day-to-day
operation of the information processing facility. This may be a large mainframe
environment or a small LAN. The operations function is responsible for many of the
routine tasks associated with the effective and efficient running of an installation,
including:
➤ mounting and dismounting data files;
➤ loading paper into printers;
➤ aligning special forms;
➤ scheduling runs;
➤ loading programs;
➤ balancing run priorities;
➤ responding to operating system prompts;
➤ responding to application system prompts;
➤ maintaining incident logs;
➤ performing routine housekeeping tasks;
➤ responding to equipment failures;
➤ producing back-up copies as defined;
➤ restoring from back-up when authorized; and
➤ handling ‘unpredictable’ conditions.
256
➤ computer operators, who are responsible for accurate and efficient operation
of the scheduled jobs on the computer and who report to the chief operator or
shift supervisor; and
➤ possibly a tape librarian to handle the vast quantity of physical tapes, disks and
other back-up media.
The operations department is responsible for maintaining physical security over the
computer, peripherals, magnetic media and stored data. This includes the various
measures designed to minimize the impact of such disasters as flood, fire, malicious
damage, etc.
Data must be secured against accidental or deliberate disclosure, modification or
destruction. Processing controls must exist to ensure that the organization receives com-
plete, accurate, timely and secure processing of data. This includes on-site and off-site file
and program libraries. Included in these libraries will be safety copies of data, as well as
program source and object codes. Automated library software can help to ensure that the
library is maintained in an appropriate form. Ensuring segregation of duties, handling the
distribution of output and despatch of hard copy, and controlling access to spool files and
networked printers are usually functions of the operations department.
Operations Exposures
These include the normal range of exposures, including human error, hardware fail-
ure, software failure, computer abuse and potential disasters. The prime error areas
in daily operation are the data entry procedures and operator commands entered
from the control console. Using wrong generations of files or wrong versions of pro-
grams can be catastrophic should they occur, and an ever-present danger is simple
media damage in handling.
Operations Controls
Controls within the operational area are primarily performance and compliance
controls associated with the running of computer jobs. These would usually include
the use of:
➤ predefined run schedules;
➤ computer and manual run logs;
➤ system performance statistics;
➤ budgetary controls; and
➤ supervision.
Personnel Controls
Since operations departments are so heavily dependent on people, it is vital to
ensure that the personnel aspects are adequately controlled. This includes the seg-
regation of duties, where we would institute controls to ensure that:
➤ IT staff cannot initiate transactions;
➤ systems and programming are independent from operations;
➤ programmers cannot operate the machine;
➤ operators cannot access file libraries;
➤ the IT librarian is an independent function; and
257
➤ IT staff have no control over corporate assets, other than access required to
meet their specific responsibilities for IT hardware and software operations.
In addition, we should ensure that IT operations staff have their duties rotated peri-
odically, are required to take holidays when leave is due, and do NOT attempt to
correct programs.
Supervisory Controls
The nature of the operations function makes it very easy to implement effective
supervisory controls. Such controls would include:
➤ approving run schedules;
➤ monitoring operations;
➤ scrutinizing the daily console log;
➤ reviewing the manual reports; and
➤ continuous observation.
Generally, 80 per cent of machine usage can be predicted, but there will always be
additional user demands, program reruns, reprocessing of files and the handling of
unforeseen problems.
Machine usage can itself be categorized into machine time spent in:
➤ compilation;
➤ testing;
➤ reruns;
➤ maintenance; and
➤ production.
Operations Audits
Reviewing an operations area involves initially obtaining an organization chart of the
function and job descriptions of the staff. These would then be reviewed to ensure
proper segregation of duties, particularly in smaller departments. In addition, lists of
equipment, networks, system software and running applications will be required.
The personnel of the operations section have hands-on access to the hardware, soft-
ware and networks of the organization. As such, it is imperative that the personnel
practices of this section are above reproach. The personnel policies of the operating
department must be reviewed with respect to delegation of duties when staff are
absent because of illness, leave or for any other reason. Termination procedures
must be scrutinized in order to ensure that no weakness occurs when staff resign or
retire or when their employment is terminated.
The view of the operations function itself would include scrutiny of computer room
access in order to determine:
258
Application Controls
Systems, generally, may be defined as a set of elements or components that interact
to accomplish goals and objectives. These systems may take the form of:
➤ systems that perform business-related activities (application systems); or
➤ systems that help the computer function (operating systems).
Application systems include payroll, sales, purchases, inventory, accounts payable and
accounts receivable, fixed asset registers and production processing applications. In
this section, we will concentrate on the auditing of application systems controls.
Well-controlled application systems can be distinguished by the quality of pro-
cessing and usability of the outputs they produce. At a minimum, application sys-
tems must process data accurately and completely and must do so in a reliable
manner. The data presented to the user must be relevant to the business function
and simple to use. It must be presented in a timely manner to permit the user to
carry out the business function timeously and the processing must be verifiable. In
achieving all of these control objectives, the system must operate in an acceptably
economic manner.
Systems themselves come in all shapes and sizes. They are categorized in Table
27.1 to assist us in evaluating the appropriateness of their handling of business
risk.
259
Simple vs Complex Simple and complex systems both face the normal risks of
inaccuracies, incompleteness, etc, but complex systems, by
their very nature, are more likely to experience these
problems, since the more complex a system becomes, the
harder it is to test adequately and the easier it is for a
system error to go undetected.
Open vs Closed Open systems are more vulnerable to both errors and
attempted penetration. This is a factor of the number of
sources of input and output, and the degree of systems
interactivity.
Stable vs Dynamic The higher the degree of instability of a system, the more
likely it is that changes will be made to it that are not clearly
thought through with all of the side effects taken into account.
There is also a greater probability of rushed and inadequate
testing in a highly dynamic system.
Systems Controls
Several individuals may exercise control in several ways using several application
systems. At a macro level, the business decision-maker will determine system vari-
ables to cover such issues as:
➤ Will the payroll be daily, weekly or monthly?
➤ Will the financial ledger be produced monthly or in 13 four-week periods?
Control Stages
Control over applications is exercised at every stage and commences at the start
of the development of the system. This takes two basic forms:
260
Major control stages would include the system design, system development, system
operation and system utilization. Controls will include both manual and computer-
ized (programmed) controls for each of the major control stages.
System Models
Systems may take several forms.
➤ The most basic types of systems are those that are used continuously to pro-
vide facilities for the day-to-day operations of an organization. These normally
involve the processing of everyday business transactions. Typical examples of
transaction processing systems would include sales order processing, inventory
control, purchasing, etc.
➤ In addition to these systems supporting normal business processing, manage-
ment constantly requires information to inform it of the status of various parts
of the organization. These management information systems could include
financial systems, manufacturing systems, marketing systems, personnel, etc.
➤ A further categorization of systems comes when the information is used by a
variety of decision makers to support business decisions. These decision sup-
port systems are becoming more and more sophisticated and may be found in
all business areas, such as financial, statistical analysis, project management
and data warehouses that, among other things, may be used to monitor busi-
ness operations, and control distribution of goods to outlets from central ware-
houses, etc.
261
262
Learning objectives
After studying this chapter you should be able to:
➤ Outline briefly the process involved in developing a new IT system
➤ Outline briefly the process involved in acquiring a packaged IT system
➤ Outline briefly the process involved in maintaining an IT system
➤ Describe the various possible roles of an IT auditor in a development environment
➤ Define the types of database management systems and describe the advan-
tages and disadvantages of database systems
➤ Explain the causes of systems development exposures and the control opportunities
available
➤ Explain the vareities of lifecycle models available
Auditors find the same problem in asking managers to explain how control is
achieved. Think how difficult it would be to explain to someone exactly how you
breathe. You have done it all your life, but would find it difficult to explain exactly
how you do it. It is part of the job of the IT staff to find out the users’ business needs
and translate these into potential computer support areas.
264
➤ Poor documentation
Many systems development projects work on the basis that the documentation will
be completed at the end of the project after the new system has stabilized. This is
a source of two distinct forms of problems. Firstly, the time when documentation is
most needed is at the design and coding stage, to ensure the final system is what
was intended. Secondly, completion of documentation at the end results in rushed
and scanty documentation and occasionally no documentation at all, since project
time has run out.
Systems Development
IIA Practice Advisory 2100-6: Control and Audit Implications of E-commerce
Activities provides guidance as to areas that an internal auditor should assess and
evaluate in circumstances where there are new and ongoing IT developments in the
business processes.
‘The internal auditor should evaluate how well business units are managing the e-com-
merce process. The following are some relevant topics.
➤ Project management reviews of individual initiatives and development projects.
➤ System Development Life Cycle reviews.
➤ Vendor selection, vendor capabilities, employee confidentiality, and bonding.
➤ Post-implementation economic reviews: Are anticipated benefits being achieved?
What metrics are being used to measure success?
➤ Post-implementation process reviews: Are new processes in place and working
effectively?’
One of the major controls over the development process is itself the systems devel
opment life cycle. This has the advantages of uniformity, enabling of performance
measurement, reducing the maintenance effort and improving the quality of the
finished product. It involves specific tasks, namely:
➤ drawing up requirements and proposals;
➤ systems design;
➤ detailed design;
➤ coding, testing and documentation; and
➤ systems testing.
265
because technology itself has changed. They may be required as a response to com
petitive forces. In all cases, the feasibility of the change and its cost desirability must
be assessed. This means that the outline systems design must be known. This out-
line design expresses the business requirements of the proposed system in terms of
user requirement specifications.
Specifications
User specifications identify:
➤ the business functionality required of the system;
➤ the actions the user is to take;
➤ the decision rules to apply;
➤ the services required of IS;
➤ the methods and timescales for user/IS interaction; and
➤ the assignment of responsibility.
Technical Specifications
Once the outline design has been agreed, the detailed design must be defined. This
involves taking the business design and interpreting it into computerese by defining:
➤ file and record layouts;
➤ operational constraints;
➤ processing logic definitions; and
➤ access rules.
Implementation Planning
Once the system has been designed successfully, it must be implemented. This
involves:
➤ reviewing the scope and objectives to ensure they are still appropriate;
266
➤ reassessing the timescales, budgets and benefits based on the fuller under
standing of the system now available;
➤ drawing up implementation timescales based on the full detailed design;
➤ allocating responsibilities for the development of the various parts of the sys-
tem; and
➤ conducting a pre-implementation review to ensure that problems encountered
in the past do not recur.
Implementation
Implementation itself involves:
➤ programming;
➤ coding;
➤ prototyping;
➤ unit testing;
➤ test-linking to other modules;
➤ documentation;
➤ installation;
➤ user acceptance testing;
➤ parallel running;
➤ user training;
➤ file conversion; and
➤ live running.
Some of these activities may be conducted simultaneously, but this, again, is a factor
of the effectiveness of the project planning process.
Conversion Activities
Once the system has been developed and adequately tested, conversion from the
previous manual or computer system must take place. This will usually involve:
➤ the acquisition of data;
➤ the identification of sources;
➤ the development of conversion programs;
➤ the sanitization of input data; and
➤ file conversion.
System conversion is a major task and requires strict control to be enforced. Poor
conversion may jeopardize the whole project on the principle ‘Rubbish in – rubbish
out’. Audit involvement is essential. Care should be taken to ensure that audit’s role
does not become one of IT quality assurance. Our role is to ensure that management
has adequate controls to ensure that conversion was effective. While all this is going
on, maintenance must continue on the current systems.
Post-implementation Review
The final stage of the SDLC is the post-implementation review. This is used to
determine what went/is going wrong with the development process, as well as what
went/is going right. Its objective is not to determine flaws in the developed system
267
but to refine the SDLC itself by identifying skill shortcomings and improving control
techniques.
From this point onwards, the system will be subject to ongoing maintenance for
the normal business reasons such as design corrections and ‘bugs’, mandatory
changes, enhancements as the business changes or to accommodate changes in
technology.
These may prove minor annoyances or major business catastrophes to the business,
depending on the organization and the system concerned. The primary causes of
development exposures may be summarized as:
➤ incomplete economic evaluation;
➤ management abdication;
➤ inadequate specifications;
➤ systems design errors;
➤ incompetent personnel;
➤ technical self-gratification;
➤ poor communications;
➤ no project ‘kill’ points;
➤ temptations to computer abuse; and
➤ incoherent direction.
268
Methodology
➤ Formalized, structured methodology will be followed.
➤ Roles and responsibilities will be clearly laid out and adhered to.
➤ Methodology will be kept up-to-date and in step with current developments.
Project initiation
➤ Each new project will be clearly scoped before work starts.
➤ The user department will be involved in the definition and authorization of new
or modified systems.
➤ Team assignment will result in the use of appropriately skilled and qualified
staff.
➤ The start of each phase will be preceded by the appropriate authorization.
Feasibility study
➤ Alternative courses of action will be evaluated in order that an appropriate
solution is selected.
➤ Technological feasibility of the recommended solution will be assured.
➤ All relevant costs will be included in the cost/benefit analysis.
➤ All relevant risks will have been identified and quantified.
➤ Project approval will be given by the appropriate levels of management based
on knowledge.
➤ The project will be capable of being monitored through its existence.
Systems design
➤ Design methodology is appropriate to the proposed system:
◗ lifecycle;
◗ structure;
◗ database;
269
◗ skeletal; and
◗ prototype.
➤ Documentation will be created to standard.
➤ Input validation requirements will be appropriate.
➤ File structures will conform to departmental standards.
➤ All requisite processing steps will be identified and designed into the system.
➤ All programs will be fully specified according to departmental standards.
➤ All sources of data required for the system will be identified and approved.
➤ The security requirements of the system will be fully defined and approved.
➤ Audit trails will be appropriate and approved.
➤ Documentation of the system design will adhere to departmental standards.
➤ The overall design will include the design of appropriate testing and verification
plans.
➤ Design approval will be obtained from the appropriate levels of management.
System operations
➤ All organizational controls will operate as designed and intended.
➤ Cost monitoring will ensure that the system operates efficiently.
➤ Modifications to the system will be permitted only by those authorized to carry
them out.
Post-implementation review
➤ Post-implementation review will be carried out by the appropriate staff and sys-
tems will be examined to determine their efficiency, effectiveness and economy.
➤ The systems will be examined to determine areas for improvement in the devel-
opment methodology.
The project life cycle has been defined as having identifiable start and end points
and passing through six distinct phases, namely:
➤ concept;
➤ definition;
270
➤ design;
➤ development;
➤ application; and
➤ post-completion.55
This led to the development of the Waterfall cycle, illustrated below in Figure 28.1.
Here we can see that each activity ‘cascades’ from the previous activity to lead the
fully developed information system. In this model, the difference you can see that
the major activities overlap significantly. The major difficulty with this model is that
software development’s need to progress iteratively is not catered for, since each
project remains within the identifiable start and end points.
System Requirements
Software Design
Analysis
Program Design
Coding
Testing
In 1988 Boehm proposed an iterative spiral model for the development and
enhancement of computer software.56 Boehm’s spiral involved five major func-
tions, namely:
➤ next stage planning;
➤ determining objectives, alternatives and constraints;
➤ evaluation of alternatives;
➤ identifying and resolving risk issues; and
➤ developing and verifying the next level product.
These functions started with the development of a baseline product and then moved
through several iterations until the final product was implemented.
An alternative development model based upon the waterfall cycle was suggested
by Fish57 and is known as the Vee cycle. This follows a sequence such as that
shown in Figure 28.2. Business requirements are dictated by business strategy,
which incorporates explicit user requirements. These then lead to the definition of
55. Archibald, R.D. 2003. Managing High-Technology Programs and Projects. 3rd ed. New York:
Wiley. p. 19.
56. Boehm, B. 1988. 'A Spiral Model of Software Development and Enhancement'. IEEE May. pp.
61–72.
57. Fish, E. 2002, 2003. An Improvement Project Lifecycle Model. Pandora Consulting, http://www.
maxwideman.com/guests/pic/intro.htm (Guest Department) updated.
271
Discovery Close-out
Functionality Review
Design Check
Sanction Construct
Figure 28.2 The ‘Vee cycle’
systems requirements and specifications. These, in turn, allow the formation of the
architectural design of the software and coding then creates the individual com-
ponents of the system, which is then tested ‘up’ the waterfall against the different
levels of specification. From a control and audit perspective, this form of systems
development is considered easier to audit since at each level there are standards
to match against, as well as the fact that there is a separate audit stage.
272
➤ Audit is the verification stage, which may be deemed to be complete when the
system can meet the functional, operational and control stipulations of the
detailed business specification. ISO 9000 defines this as validation, where tests
are applied to see if the customer’s requirements are addressed in reality.
➤ Close-out is the stage in which the cycle is completed by insuring the install
product matches the need identified during the discovery phase.
As can be seen from the model illustrated in Figure 28.2, the left hand side of the
Vee shows the planning stages, while the right hand side indicates the implementa-
tion or ‘doing’ stages.
Micro-based Systems
In-house developed micro-based systems should be subject to the same controls,
but often are not. They are frequently substituted for IS developed systems and
suffer the same SDLC problems, but, in addition, they fall under nobody’s control
and may be developed by amateurs with no specifications, documentation, con-
trols, cost/benefit analysis and back-ups.
273
Learning objectives
After studying this chapter, you should be able to:
➤ Outline briefly the major types of computer-assisted audit techniques (CAATs)
➤ Describe the benefits and limitations of CAATs
➤ Define the types of automated tools available to an IT auditor
➤ Select the appropriate technique and pick the appropriate tool
➤ Understand and use IDEA as generalized audit software
Standards of Evidence
IIA Practice Advisory 2310-1: Identifying Information indicates that audit evidence
should be:
➤ sufficient;
➤ reliable;
➤ relevant; and
➤ useful.
Information retrieval and analysis programs and procedures include programs that
organize, combine, extract and analyze information. This includes generalized audit
software, application software and industry-related software. Customized audit
software and information retrieval software, as well as standard utilities and online
enquiry may also be used for information retrieval and analysis. Where an auditor
has computer skills in programming, conventional programming languages may pro-
vide a viable alternative, but a lack of such skills does not preclude auditors from
using such techniques. The ready availability of microcomputer-based software,
which provides computing power without the requirement of technical expertise,
puts direct data analysis within the toolkit of any auditor. The primary requirement
is an understanding of the business application and how data relates.
Benefits
GAS cannot resolve all of an auditor’s problems, but it can help in many of the com-
mon problem areas. It is specifically designed for the handling of volumes of data.
The output can be used for further computer processing, allowing audits to be linked
together. The time to audit can be reduced and the auditor freed to spend time
interpreting results. Since limited programming skills are needed, the audit reliance
on IS staff is reduced.
Limitations
Hardware and software environments may be restrictive if an inappropriate pack-
age is selected. The number of files to be handled may be restrictive and the types
of record structures may not be comprehensive. Numbers of computations may
be limited and the number of reports per ‘pass’ may be restrictive. This makes the
selection of software a critical element in the effective use of GAS.
275
Utilities
Utilities are programs written to perform common tasks, such as copying, sorting,
printing, merging, selecting or editing. These programs are normally parameter
driven and can be used in combination with other software. They are extremely
powerful and the right to use them should be restricted. From an audit perspective,
they see data as it exists, which makes their results more reliable.
Online Enquiry
Interactive interrogation can provide comparison data for audit reports and confir-
mation of corrective action taken, and can be an additional source of audit informa-
tion. Effective use requires few IS skills, but an understanding of the information is
essential. Armed with the appropriate access authority, auditors can obtain ade-
quate audit evidence to meet their requirements. However, you must be sure about
what you are looking at, since it is easy to draw the wrong conclusions.
276
Microcomputer-based Software
Microcomputer-based software can prove a flexible and powerful tool for an
auditor and includes GAS, computer-aided software engineering (CASE), spread-
sheet packages (analysis, manipulation, recalculation, etc), specialized packages
(eg NCSS) and specialized software for auditing micros (eg CSAN).
➤ They have the advantages of being able to use input from multiple hardware/
software platforms, are comparatively inexpensive and mean that a user has
only to learn a set of portable software.
➤ Disadvantages include the fact that an auditor is not looking at the live data
and that the software may not handle all data formats from mainframes.
Test data
This technique involves using a copy of the live computer system through which a
series of transactions is passed in order to produce predetermined results. The vol-
ume of data that can be handled limits this technique, while it is effective in search-
ing for defects. Also, the results may be biased by the results an auditor expects.
Source-code review
This computer audit technique involves the review of the source code originally
written by the programmer. In the past, this has meant browsing through piles of
printout. In today’s environment, sophisticated searches can be implemented using
GAS to establish weaknesses in the source code.
277
Parallel Simulation
Parallel simulation is a technique involving the creation of software to simulate
some functional capability of the live system, such as a calculation. The live data is
processed through the simulating program in parallel with the live system, and the
outputs are compared.
278
Learning objectives
After studying this chapter, you should be able to:
➤ Outline briefly the major computer security risk areas and preferred security
mechanisms
➤ Explain the criteria for effective security
➤ Describe the basic building blocks of operational environments and operating
systems
➤ Select the appropriate methodology for reviewing computer security
➤ Describe the current legislative situation regarding IT privacy
Security
IIA Practice Advisory 2100-2: Information Security provides guidance as to the
responsibility of internal audit for evaluating information security and associated
risk exposures.
‘The chief audit executive should determine that the internal audit activity possesses, or
has access to, competent auditing resources to evaluate information security and associ-
ated risk exposures. This includes both internal and external risk exposures, including
exposures relating to the organization’s relationships with outside entities.’
The first issue affecting information security is identifying who has access to the
organization’s computer systems. This consists of both logical and physical access
aspects and must, in general, provide support for:
➤ management;
➤ users;
➤ data processing;
➤ internal audit;
➤ external auditors; and
➤ all parties concerned who have an interest.
Criteria
Hardware, firmware and software co-exist and an auditor cannot examine one aspect
in isolation. It is the interaction of these components that provides complexity and
an auditor should look on access control as a complex exercise in risk management
technology. This exercise may be aided by utilizing the features within the operat-
ing system itself, as well as security packages such as RACF, ACF2, TOP SECRET
and the like. Even librarian packages controlling access to source libraries such as
LIBRARIAN or PANVALET may help.
The overall objective is to ensure control over access to data files. This includes
preventing unauthorized amendments or disclosures, and means that access to
online data files, authorization of data file usage and physical security over data
files become essential. The use of standard utility programs to access such data
files directly must be controlled, whether by authorized users or by the members
of the IT function itself. Functional capabilities within application systems must be
segregated, which, in turn, means that there must be highly effective user authen-
tication. If there is not a high degree of certainty that a user is who he/she claims
to be, then the use of user profiles defining access authorities becomes ineffective.
User Authentication
IIA Practice Advisory 2100-8: The Internal Auditor’s Role in Evaluating an
Organization’s Privacy Framework states the following:
‘The internal auditor can contribute to ensuring good governance and accountability by
playing a role in helping an organization meet its privacy objectives. The internal audi-
tor is uniquely positioned to evaluate the privacy framework in their organization and
identify the significant risks along with the appropriate recommendations for their
mitigation.’
User authentication involves gaining the assurance that a user is who he/she claims
to be. Users may be authenticated by:
Passwords are the most common form of user authentication, but suffer from some
major drawbacks.
➤ The initial password assignment can be a problem in that, if users are not
forced to change the initial password, it will generally remain unchanged and
therefore be known to the security administrator.
➤ The system must hold a password file somewhere within itself. If this pass-
word file is not adequately protected, it becomes a separate source of vulner-
ability within the system.
➤ Users must remember their passwords and this leads to short, easily guessed
passwords. Longer or more difficult passwords are commonly written down
and kept near the terminal where they are needed. This causes obvious prob-
lems in that someone else can find and use them.
➤ Passwords must be changed periodically to be an effective control. Passwords
that remain unchanged for a long time will often become common knowledge.
➤ Users must enter their password into the system and someone can simply
watch them do it.
280
In a well-designed password system, the user must change the default password
before it can be used. Password changes must be system-enforced and must
exclude previous passwords. Passwords over communication lines must ALWAYS
be encrypted. Passwords themselves must be as long as possible, contain at least
one alpha and one numeric character and never be displayed on the screen.
Bypass Mechanisms
User authentication aims at confirming that a user is who he/she claims to be. These
controls can be circumvented by mechanisms such as trapdoors and backdoors.
These software loopholes are deliberately left in systems to permit unauthorized
entry. They are normally hidden and used when needed; however, anyone can use
them if they are aware of them and know how to activate them. Such bypass mecha-
nisms are very popular in mainframe environments and are normally introduced
by insiders, for various reasons. The systems programmers may claim they have to
modify O/S without an IPL. They may want to issue operator commands from a TSO
terminal or even require unlimited access at 3 a.m.
Generally, these are not a good idea for several reasons. The wrong persons may
find them and, since there is usually no inbuilt security, all access controls may be
bypassed. Therefore, all systems maintenance should go through change control sys-
tems, without exception. The operators and no one else should operate the machine,
and no one should be able to bypass the security system at will.
281
like. A more effective audit will involve using the computer to audit the computer.
This will typically involve the use of CAATs, such as GAS, specialized audit software
or utilities.
Before using CAATs, it is essential that an auditor knows what he/she wants to do.
General browsing is expensive, does not inspire confidence and, worst of all, gener-
ally does not work. From your manual audit you should know what you want to look
at, where to find it, how to get it and what you will do with it.
An auditor should basically never believe what the first printout tells him/her.
Ultimately, an auditor is not there to exercise control, the manager is, and the audi-
tor should check the controls the manager relies on.
Availability
Computer networks provide valuable services to their users. Users rely on these ser-
vices in order to perform jobs efficiently. When services are not available, a loss in
productivity and profitability results. A network may be rendered unusable by:
Flooding
A server is attacked by bombarding it with transmissions at a rate that it cannot
cope with. Unfriendly transmissions are hidden in the flooding transmissions, which
can now attack the targeted system.
Eavesdropping attack
An intruder eavesdrops on a connection session and, before the connection is
completed, inserts spurious transmissions into the stream in order to pick up the
connection.
Viruses
A virus can slow down or cripple a computer system. Viruses are self-replicating
pieces of software that spread by infecting a host program.
Logic bombs
A software logic bomb, sometimes called a time bomb, is a hostile software fragment
or program set to inflict damage under certain conditions.
Spam
Spam is unsolicited junk mail that mainly originates with individuals who have mass
e-mail lists and who use them for random mailings. Most spam in South Africa
282
Hostile programs
Mini-programs (applets), such as Java or Active-X components, are usually used to
create moving images or for other innocuous reasons. Some of these, however, may
have a more sinister purpose. The activities of hostile applets have ranged from the
redirection of telephone calls to overseas or premium-charged numbers all the way
up to the diversion of banking funds.
Threats to Confidentiality
There are four common ways that confidentiality may be breached.
➤ Information may be disclosed as a result of impersonation or an intruder mis-
representing someone else.
➤ Performing traffic analysis on communications networks may compromise infor-
mation. By analyzing the timing and frequency of communications, a great deal
about the purpose of the activity may be revealed.
➤ Information may be disclosed as a result of monitoring or tampering with com-
munications, either by logically intercepting the message with network or pack-
age sniffers, which can capture packets circulating through the network, or by
penetrating the communication medium itself.
➤ A security breach in a communications partner may occur in a network other
than the one controlled by the user, but may still result in that user’s system
being compromised.
283
Password Capture
Impersonation using someone else’s user identification and password is becoming
increasingly common. Passwords can be obtained from a variety of sources. Even
encrypted passwords may be obtained using keystroke-recording software, looking
in unprotected data directories or by using package sniffers.
Log Tampering
An attacker may be able to destroy or modify log or audit trail evidence if the files
are not properly protected.
284
Learning objectives
After studying this chapter, you should be able to:
➤ Outline briefly the distinguishing characteristics of the various types of contin-
gency plans
➤ Define the roles and responsibilities in producing a contingency plan
➤ Describe the internal audit role and strategies for auditing contingency planning
➤ Evaluate and test a corporate contingency plan
As you can see, many of these risks have nothing to do with computer systems, but
affect the enterprise as a whole. There is a tendency to focus on the information
systems to the exclusion of everything else within an organization, and this is as
dangerous as not looking at contingency planning at all.
Disasters may be grouped in four basic categories, as Table 31.1 shows. In all
these cases, a different approach to disaster recovery planning is required. A plan
for evacuation of the building is inappropriate if the disaster involves the loss of a
small but vital file. On the other hand, a disaster on the scale of the 11 September
2001 attack on the Twin Towers of the World Trade Center in New York, which
led to the complete collapse of both buildings in a matter of an hour, with the
loss of thousands of lives, and the destruction of business entities occupying the
DISASTER TYPE A
People Explosion
Buildings Aircraft crash
Factories Fire completely destroys building and
Finance contents
Credibility Flood
Materials Industrial action
Computers Earthquake
Sabotage
Sanctions
DISASTER TYPE B
Hardware Explosion
Software Fire
In-house data Flood
Temporary loss Industrial action
DISASTER TYPE C
DISASTER TYPE D
buildings, their complete records, information systems and equipment, may not be
possible to recover from, no matter how effective a disaster recovery and business
continuity plan an organization may have developed. However, it is noteworthy
that the New York Stock Exchange, located close to the Twin Towers and badly
affected by the destruction of electricity supplies and disruption of communication
links in that part of the city, restored its communications and restarted trading
around the world within five days of the disaster.
286
Consequences of Disruption
The consequences of disruption may include delays in invoicing leading to loss of
revenues, lost interest, lost current sales and lost future business, as well as addi-
tional incurred costs because of extra staffing and overtime required to reprocess
lost data. Loss of discounts and increased interest on loans may also occur, as may
general inefficiency.
From a production control perspective in a manufacturing company, problems
would typically include lost production and schedule disruption, while, from a legal
perspective, penalty clauses for failing to meet supply contracts could jeopardize the
whole enterprise. At minimum, there would be ill will generated among customers,
shareholders and staff.
The different levels of preparedness for a disaster may be categorized as in
Table 31.2.
Very Good Organization is ready for virtually any eventuality. Disaster should have
no material impact on the business.
Where to Start
IIA Practice Advisory 2110-2: The Internal Auditor’s Role in the Business Continuity
Process provides guidance as to the role of an internal auditor in assessing the
organization’s disaster recovery plan (DRP) and business continuity process (BCP)
planning. The principle is as follows:
‘Internal auditing activity should assess the organization’s business continuity planning
process on a regular basis to ensure that senior management is aware of the state of
disaster preparedness.’
As with any other form of business analysis, the beginning involves understanding
the business. In DRP terms this means modeling the business, identifying data flow
and dependencies and identifying the critical systems as well as any dependent
systems (including manual ones).
287
For the purposes of this book, we will use the loss of computing capability as
an example of such a disaster. For most modern organizations, IT is an essential,
although not the only, corporate resource. The techniques described apply equally
to any other form of disaster situation.
Computer systems may be identified by type, for example by operating
objectives. Systems may be centralized, distributed or stand-alone and may also
be real-time, online or batch processes.
These can then be assigned degrees of priority based upon their business loss
rating, the alternative service level required or maximum down-time tolerable.
Systems may be categorized by the impact of stoppage and by identifying any
essential interfacing systems identified (computer and manual).
Once systems have been prioritized, all systems, including manual ones, must be
documented. Relationships must be identified and the impact of stoppage quanti-
fied.
A factor commonly overlooked is ensuring that alternative accommodation for
people, stationery supplies, office equipment and interim control procedures have
been identified.
Data used within each system needs to be graded by application and therefore by
strategic importance, as well as by alternate method of sourcing and degree of pain
in loss. In a comprehensive plan, data may even be rated by potential disruption
period. Each application is therefore graded, although not all of its data is of equal
importance or priority.
288
‘The internal auditor should review the business continuity plan and determine if it has
been tested. Management should have devised an alternative means to process the
transactions in the event of an interruption. Management should have a process in place
to address the following potential conditions:
➤ Volume attacks
➤ Denial of service attacks inadequacies in interfacing between e-commerce and
financial management systems
➤ Back-up facilities
➤ Strategies to counter: hacking, intrusion, cracking, viruses, worms, Trojan horses,
and back doors.’
289
nator is to ensure that management at all levels understands the rationale behind
the plan so that it becomes an integral part of each manager’s normal responsibili-
ties. The co-ordinator can achieve the overall objective by following a predefined
methodology.
The success of the business is dependent on a variety of factors, some internal and
some external. Externally, government regulations, actions by competitors, positions
taken by unions and pressure groups can all have an influence. Customers, share-
holders and suppliers will also play their part. Internally, the success or failure of the
organization rests heavily on its internal control structures and its use of the right
IT systems. The broader the key relationships and back-up resources that each co-
ordinator can identify and provide for in the continuity plan, the greater the chance
of an effective plan being devised.
290
Once the analysis has been conducted, the co-ordinator should seek agreement
at board level from the sponsor on the results of the analysis. Once approval has
been granted, the process may continue to the next stage.
Risk Assessment
After the impact of various disaster scenarios on the business has been established,
a risk assessment is carried out to determine, for both the internal and external
threats, the likelihood of occurrence. There are many methodologies for carrying out
such a risk assessment and the co-ordinator should select the appropriate method-
ology for the specific organization. By combining the results of the risk assessment
and business impact analysis, a ranking may be achieved illustrating the most critical
areas to be addressed as part of the continuity strategy. Once again, approval from
both the sponsor and the board must be sought.
Continuity Strategies
Having identified those areas where the organization is most at risk, a decision has
to be made as to what approach is to be taken to protect the operation. With the
guidance of King II, this decision must be taken at board level.
Many possible responses to risk exist, and usually any strategy adopted will
consist of a number of these approaches. Whichever are chosen, there are certain
alternatives to bear in mind, as Table 31.3 indicates.
The strategy chosen must recognize the internal and external dependencies of the
organization and all management members involved should agree to it.
291
is based upon inputs derived from the analyses previously carried out and would
use the business continuity strategies agreed with executive management.
Emergency Response
This phase covers the development, testing and implementation of procedures for
responding to an emergency and stabilizing the situation following an incident. At
this stage also, co-ordination may be achieved with the emergency services in order
to clarify their powers, roles and responsibilities in the event of an emergency.
Detailed steps must be designed in order to ensure the initial assessment of the
impact is carried out and that, for the protection of personnel, decisions are made
under the overall direction of the emergency plan.
One commonly omitted step within the overall emergency response is the deter-
mination of the appropriate actions to be taken in order to salvage whatever is
salvageable and to determine the actual extent of the emergency. This includes
identification of those tasks to be taken immediately to mitigate losses and to sal-
vage whatever is possible.
As such, it is critical that the plan be up to date and known. The plan itself should
include the definition of the organization’s view of what constitutes a disaster as
opposed to a normal interruption in processing. The individual authorized to declare
a disaster must be noted. In addition, escalation procedures will be required to
attempt to contain an emergency that continues for a long time. Also contained
within the plan should be the description, responsibilities and organization of the
recovery teams, including the support staff required.
At some point in the process, the organization will want to change over from the
emergency response plan to the business continuity plan, and this phase must be
facilitated. The draft plan should be appropriate for the organizational risks. These
may be required for further plans at the departmental or functional level. Should
this be the case, it is critical that these are aligned with the overall corporate plan.
An organization is a dynamic entity and the plan should reflect this dynamism.
This means that ongoing maintenance should be seen as a normal part of the plan-
ning process and mechanisms to make changes to the plan should be designed at
an early stage.
In summary, the plan must define the business continuity procedures covering the
mission-critical process and functions of the organization. It must specify what the
key resources are and what processes are to be followed to recover these resources
and provide continuity to the business.
292
293
Learning objectives
After studying this chapter, you should be able to:
➤ Outline briefly the distinguishing characteristics of e-commerce
➤ Quantify the unique risks inherent in such an environment and select
appropriate control techniques
➤ Discuss the legal and contractual framework required to implement corporate
e-commerce effectively
➤ Discuss the impact of e-commerce on the internal audit paradigm
➤ Outline briefly the history and growth of the Internet
➤ Describe the major risk sources from the Internet and the appropriate control
mechanisms
➤ Explain the fundamentals behind the development and use of advanced
encryption techniques
➤ Define the strengths and weaknesses of firewalls
➤ Develop an appropriate audit program for using the Internet
Key technologies and their uses and impacts addressed include but are not limited
to:
➤ electronic data interchange (EDI);
➤ electronic funds transfer (EFT);
➤ electronic benefits transfer (EBT);
➤ the Internet;
➤ the World Wide Web (WWW, W3 or the Web);
➤ electronic trust and security;
➤ legal issues;
➤ effects on global economies;
➤ educational implications; and
➤ effects on accounting and auditing standards.
e-Commerce
What is e-Commerce?
At its simplest, electronic commerce (e-commerce) is the process of doing busi-
ness electronically. It encompasses automating a variety of business-to-business
and business-to-consumer transactions through reliable and secure connections.
Organizational structures and cultures must be realigned as e-commerce is imple-
mented. Similarly, policies, procedures and practices will have to be reformulated to
accommodate the movement to e-commerce.
‘The e-commerce risk and control environment is complex and evolving. Risk can be
defined as the uncertainty of an event occurring that could have a negative impact on
the achievement of objectives. Risk is inherent to every business or government entity.
Opportunity risks assumed by management are often drivers of organizational activi-
ties. Beyond these opportunities may be threats and other dangers that are not clearly
understood and fully evaluated and too easily accepted as part of doing business. In
striving to manage risk, it is essential to have an understanding of risk elements. It is
also important to be aware of new threats and changes in technology that open new vul-
nerabilities in information security.’
The advent of e-commerce affects the core elements of accounting and auditing
– the practices, techniques, skill and knowledge requirements, liabilities and services
offered.
Historical control models address mainly internal controls and the processes for
assuring their effectiveness. With e-commerce, the control model spans the globe,
and assurance processes range from internal systems and network administration
to having to rely on a trust model of second and third parties that may be otherwise
unknown to the organization. Furthermore, the sheer quantity of transactions and
their total financial value can be huge. This being the case, the providers of assur-
ance services (accountants and auditors) are challenged to find new and different
means of making assurance possible.
295
Each area of change requires that accountants and auditors review the basic prem-
ises and activities of the business and assess the effects on risk management and
related controls. The new techniques, risks and controls are vastly different from the
business processes they are supplanting. At the same time, organization manage-
ment at all levels will find they have new responsibilities to ensure control objectives
are met and can be measured and assessed using all the new tools and techniques
– many of which did not exist as short a time as one year before.
Technology
The accounting profession provided the first applications of business automation
with electronic accounting machinery (ie the calculator). But soon the technology
spread beyond accounting applications and into every area of business, informa-
tion and process management. At the same time, the auditing profession began to
recognize the need for information systems and technology specialists that would
expand audit practices into assessment of controls that did not previously exist,
but were increasingly to be found at the heart of issues surrounding the reliability
and integrity of information in every organization.
Today, the accounting profession needs technology specialists not only to imple-
ment advanced accounting systems, but also to oversee the accounting for assets
controlled by the technology, as well as the assets that the technology itself repre-
sents. Similarly, the auditing profession has developed the requirement for highly
specialized technologists to support virtually all auditing techniques, and to assess
controls within the detailed environments that manage complex risks.
Today, the CA, the CIA and the CISA must share both knowledge and responsibilities
as they evaluate and assess the technologies and applications of:
➤ digital/electronic signatures;
➤ data exchange protocols;
➤ secure electronic transactions (SETs);
➤ secure socket layers (SSLs);
➤ electronic licensing and security initiative (ELSI);
➤ encryption;
➤ public and private keys;
➤ key generation;
➤ key management (and custodianship);
➤ public and private key infrastructures (PKIs);
➤ token transactions;
➤ smartcards;
➤ electronic cash (Mondex, e-cash tokens);
➤ point of sale,
and much more.
296
As these examples from the relatively mature EDI environment illustrate, it is grow-
ing more difficult to assess controls and provide assurances by relying on traditional
accounting and auditing techniques and practices. Auditors and accountants must
apply techniques to focus not only on the messages managed within EDI, but also on
the processes and technologies that provide authentication and assurance against
security breaches.
297
Financial issues
Just as legal issues promise to bring global dimensions to e-commerce risk manage-
ment and control assessment, numerous financial issues must also be addressed.
Consider: taxes, duties, import fees (particularly soft goods such as software or
music, or services such as expert opinion or advice, where the goods or services
could be provided electronically and thereby become not as easily subjected to
inspection and/or confiscation), the flow of capital across boundaries, etc.
Audit implications
Many auditors today pride themselves on their expertise in internal controls. For a
growing number, this expertise is oriented toward controls in information systems
and technology. However, highly technical and complex esoteric systems and pro-
cesses provide an increasing percentage of the fundamental controls in e-commerce
environments. Individuals (including auditors) who are capable of understanding the
elements of control in such environments and who also understand the business,
legal, financial and other implications of such controls are rare indeed.
In its most simple terms, auditors will seek to verify that e-commerce environ-
ments provide:
298
Proof of:
➤ a transaction occurring;
➤ authorization for the transaction;
➤ authentication of the sender;
➤ non-repudiation of the transaction;
➤ compliance with legal requirements, laws and jurisdiction enforceability,
taxation, etc; and
➤ established audit trails to review and assess transactions.
Assurance that:
➤ opportunities and risks are identified and assessed;
➤ continuous controls and monitoring are essential system design elements;
➤ auditability features provide for the use of expert systems techniques,
and much more.
Or, to put it another way: there are no simple audit solutions. Fortunately, the same
organizations that build and use the technologies, and the technologies themselves,
will help to solve the problem of how to provide assurances in an environment of
constant change.
59. See Mair, W.C., Wood, D.R. & Davis, K.W. 1982. Computer Control and Audit. Florida: Institute
of Internal Auditors.
299
Conclusion
Electronic commerce is a broad, varied and technically complex field supporting
seemingly simple components. Understanding and assessing controls in this envi-
ronment could well be the fabled ‘straw that breaks the camel’s back’, so auditors
will be forced to apply techniques that have been used only infrequently to date.
Furthermore, e-commerce will provide an avenue back to auditing through separat-
ing it from systems analysis and control consulting. This is not to imply that auditors
will become any less skilled in investigation and analysis; indeed, they will become
more skilled and specialized. However, responsibility for controls will become more
recognizably a management function – not an audit requirement.
The Internet
The Internet has a history that stretches back into early computer history. Significant
events include:
1957 – Advanced Research Projects Agency (ARPA)
1962 – packet-switching networks
1969 – ARPANET commissioned by the US Department of Defense
1970 – ARPANET starts using network control protocol (NCP)
1972 – e-mail invented by Ray Tomlinson
300
From this it can be seen that the Internet has grown in a largely uncontrolled manner
at an exponential rate. As a tool it is, perhaps, unrivalled as an information reposi-
tory. It is, however, a potentially unreliable source of information, since the source
and accuracy cannot be guaranteed. Some data will be correct, some misleading
and some wrong.
Initially, Internet information was extremely unfriendly. There were no search
engines. Most of the useful Internet information was on ftp (file transfer protocol)
sites. The user needed to know the address of the ftp site required. To get hold of the
information, knowledge of the Unix programming language was required. Primarily,
scientists and academics whose main interest was in publishing their ideas and
enabling a peer review of their material used the Internet. Because they were all part
of a common community, they felt no need to check the identity of the information
provider. As a result, the Internet evolved with no perceived need for copyright,
security or other fundamental controls.
With the introduction of the World Wide Web, the Internet was transformed. By
1994, the Web could be used to send text and pictures and, eventually, even sound
and animation over the Internet. Powerful search engines made it easy to find infor-
mation and ‘surfing the Web’ became a major research and business tool.
Internet Communication
The Internet uses the concept of the ‘packet’ to transmit information, where a
packet is a collection of related data that is parcelled, addressed and dispatched to
a destination. Each packet travels independently across different networks using the
addresses of the sending and receiving computers. The packets are reassembled at
the other end into the full original message. Switches work out the fastest Internet
communication routes, or routers, located at intermediate stages.
Communication is achieved by using an agreed set of standards or layers, which
enable different users to speak in a mutually understandable language. Primary
among these layers in the Internet is the application layer.
301
Application layer
Defined by the application developer, the application layer fulfills specific business
needs, for example:
➤ file transfer protocol (ftp) is used to transfer files;
➤ simple mail transfer protocol (smtp) is used to deliver e-mail;
➤ network news transfer protocol (nntp) is used to deliver Usenet news; and
➤ hypertext transfer protocol (http) is used to transfer hypertext documents.
Addressing
In order for the Internet to work, the addresses used for sending and receiving mes-
sages must be common. This is achieved using TCP/IP addresses.
Internet addresses consist of a 12-digit, 32-bit number that is unique for every
machine across the network (ie unique in the world). The Network Information
Center (NIC) in the US (or its local counterpart) assigns addresses, which look like
this: 199.009.200.001.
The first three digits are the network number and the last three digits designate the
host. The rest represent the subnet and each group of three can go from 0 to 254.
These conventions are intended to permit communication for specific purposes,
some of which are discussed below.
E-mail
Using e-mail gives an immediate, practical use of the Internet. It follows the same
basic principle as normal mail. There is a message, which is placed in an envelope
with or without attachments. The envelope is addressed. A return address is added
and the mail is posted, but the communication is virtually instantaneous.
E-mail is a low-cost and standard communication medium that offers substan-
tial advantages over fax or even normal mail in terms of speed, cost and security.
However, the major problem of e-mail lies in its reliability. Because it is so reliable,
it becomes unquestioned, but e-mail can be compromised as a result of deliberate
penetration. The use of an alias can allow unapproved users to get mail, and while
posing as someone else is generally considered highly unethical, even as a joke, nev-
ertheless it can and does happen. Communicating anonymously is possible for posi-
tive reasons – anonymous tip-offs – or negative reasons – harassment, libel, etc.
ftp
Ftp is both a program and a protocol and allows files to be copied to and from PCs,
Macs, minis or mainframes. It can permit the obtaining of directory listings, allow the
creation of directories and even permit the deletion or renaming of files. Usernames
and passwords are transmitted unencrypted and ftp can connect to any host on
the Net if the name or IP address is known. A variety of ftp, called anonymous ftp,
permits ftp by unknown users.
302
html
Hypertext mark-up language (html) is a plain ASCII language that interleaves plain
text with <tags>. Hypertext links to other pages are supported and there are several
editors available in the public domain, as well as commercial software products such
as Microsoft’s Front Page. The primary use of html is the design of web pages.
Personal access to the Internet is normally achieved via either SLIP or PPP. SLIP is
the serial line Internet protocol and is used for Internet connection vial dial-up. PPP
is the point-to-point protocol, which is a newer protocol doing the same job, but
better designed. Access generally has three requirements:
➤ an access phone number of a service provider;
➤ a personal user-ID; and
➤ a personal password.
These are obtained by registering with a service provider who provides Internet
access commercially to a variety of users.
Internet Security
Internet security is a potential risk area.
➤ Problems include entry to corporate systems through the Internet and loss of
confidentiality of messages.
➤ Message authentication problems exist that can lead to acceptance of false mes-
sages or instructions. Verification of authorization then becomes non-negotiable.
➤ User authentication is difficult unless specific efforts are made to ensure the
genuineness of claimed identity. At the same time, user anonymity cannot be
303
ensured and accesses can easily be traced back to source using the inbuilt
facilities of the browsers.
➤ Unattended terminals that are logged on to the Internet can lead to unauthor-
ized use. This in turn may lead to time wasting on a grand scale and huge
phone bills.
➤ Since many sites accessed are ‘untrusted’, uncontrolled downloading of
unknown software easily spreads viruses.
➤ E-mail overflow can result if insufficient space is reserved for incoming mes-
sages, and messages can be lost.
➤ Infrastructure observation and infrastructure interference may be possible if
external users have the capability of observing people and events on the inside
of a connected network.
➤ Standard vulnerabilities of computer systems, including back-up thefts, staff
bribery, password guessing, observation of password entry or ‘shoulder surfing’,
viewing poorly disposed of confidential output or ‘dumpster diving’ continue
to be problem areas. These are compounded by network-specific threats such
as the use of packet watching ‘sniffers’ or by wire closet attacks at the control
points of the physical network.
Combating these threats involves establishing the risk areas and defining an appro-
priate security architecture. This will typically include:
➤ the use of firewalls (hardware/software combinations that prevent unauthorized
outsider access);
➤ network address translation, which conceals origins of messages by providing a
barrier between the message sender and the receiver; and
➤ operating system hardening, which involves ensuring that all possible options to
enhance security are taken.
Internet/Intranet Security
Internet and internal network attacks on corporate enterprises seem inescapable in
today’s computing environment. Most companies admit to having been attacked at
some time in the past year. While the most costly attacks have been from the inside,
external attacks from hackers and competitors are rising dramatically. How do you
304
know when you are under attack? The chances are you already create enough audit
trail data, but who has time to look at it?
Intrusion detection tools solve this problem by automatically discovering and
responding to attacks. We will explore the need for intrusion detection, discuss les-
sons learned from early intrusion detection efforts, and explore the different types
of intrusion detection tools available. We will also compare and contrast the three
common methodologies used for intrusion detection, and discuss the advantages
and disadvantages inherent in various architectures.
Not so long ago, hacking took a lot of time and study. While expert hackers
still abound, the Internet has entered a new era. Using almost any search engine,
ordinary Internet users can quickly find information describing how to break into
systems by simply searching for such key words as ‘hacking’, ‘password cracking’
and ‘Internet security’.
Thousands of sites publish step-by-step instructions on how to break into Windows
NT systems, Web servers, UNIX systems, etc. The sites often include tools that auto-
mate the hacking process. In many cases, the tools have easy-to-use graphical inter-
faces. For instance, a tool called Crack automatically tries to guess UNIX passwords.
A similar tool called L0phtcrack breaks Windows NT passwords. A software probe
called SATAN discovers vulnerable systems in a network and reports on the specific
holes that can be exploited.
What does all this mean? Almost anyone with the motivation to break into sys-
tems can quickly obtain the technology to do so without having to become an expert
hacker.
To be effective, an intrusion detection solution must be capable of detecting
attacks from both inside and outside the network.
In the early 1980s, conventional wisdom dictated that the best way to detect
intrusions was to create logs or audit trails of all security-relevant activity. As a
result, most operating systems, databases, routers and mission-critical applications
generate audit trails. The original idea was that a security administrator would
review the audit logs looking for suspicious events.
This seemed like a fine idea when companies only had a few systems and a few
users. The industry quickly realized that no one had time to read all that audit trail
data. A few enterprising developers built query and reporting programs to help ana-
lyze the audit trail in an attempt to find trouble spots. For example, in 1984, Clyde
Digital Systems developed a product called AUDIT, which automatically searches
through OpenVMS audit trails looking for suspicious events. (Incidentally, this prod-
uct is still in use today.) In 1987, a US government-funded project called IDES at
Stanford Research Institute read audit trails and created profiles of normal use pat-
terns for users and then reported deviations.
Unfortunately, as the number of users, systems, applications and databases has
grown, the audit trails have also grown so large that now they can actually cause
denial of service problems from using up too much disk space. Many production
environments routinely turn off audit trails to avoid disruptions to production
systems. So, the current situation at most sites is that they plan to rely on audit
trails to detect intrusions. But without the staff to review the audit trails, these
sites turn off the audit trails to improve productivity.
305
Each of these categories has value and particular advantages and disadvantages.
306
The advantages of the packet analysis technique are that there are certain
network-oriented attacks (IP spoofing, packet storms, etc.) that are best detected
via packet examination. Also, you do not need to put software on various hosts
throughout the network. But remember that the basic definition of a network is an
organization of nodes and links. A packet analyzer monitors traffic on the links but
does not monitor the nodes, which are key pieces of any network. Referring to a
packet analyzer as ‘network-based’ intrusion detection ignores the basic definition
of a network, which includes nodes as well as links.
Real-time activity monitors can detect attacks such as attempts to access unau-
thorized sensitive files or to replace the login program with a new version. Unlike
packet sniffers, they can detect when a user illegally obtains ‘root’ or administrator
access. When suspicious activity is detected, the real-time activity monitor can take
307
immediate action before damage is done. This action can include notifying a con-
sole, sending an e-mail, beeping a pager, disabling a user account, terminating the
intruder’s process, terminating the intruder’s session, shutting the system down or
executing a command procedure.
308
e-Commerce has resulted in fundamental changes to many of the risks internal audi-
tors try to identify controls over, such as:
➤ Audit trails: Within an e-commerce system, the original transaction is paperless
and the official evidence is electronic. As such, an auditor will have to be able
to follow an electronic audit trail.
➤ Business continuity: As e-commerce expands, reliance on the effectiveness of
other organizations’ network security, back-up, recovery and processing conti-
nuity increases.
➤ Information security and privacy: Transactions passing through third-party net-
works may be exposed to unauthorized access.
➤ Potential legal liability: The audits conducted by and for other trading partners
could represent potential legal liability for an organization.
➤ Records retention: The replacement of paper by electronic records means that
retention controls require a consistently applied and fully recoverable technol-
ogy environment.
➤ Segregation of duties: Appropriate division of duties in an electronic environ-
ment can be achieved, but can also be compromised by inappropriate access
rights.
At the heart of e-commerce are the messages sent across the Internet. Encryption
and authentication of identity are vital issues. A number of cryptography technolo-
gies are available for e-commerce. These include symmetrical key cryptography,
asymmetrical (public key) cryptography and digital signatures.
Digital signature
In the world of e-commerce, the digital signature is perhaps the most impor-
tant application of public key cryptography. In written documents, handwritten
309
310
Learning objectives
After studying this chapter, you should be able to:
➤ Recognize the impact of new technology on the overall IT audit approach and
methodology
➤ Differentiate between continuous auditing and continuous monitoring
➤ Understand the audit role in IT governance
➤ Define the components of project management and identify internal audit’s role
➤ Recognize various types of IT outsourcing and the types of risks associated
➤ Identify the component parts of the negotiation of service level agreements
➤ Determine the degree of criticality of services outsourced
➤ Recognize the impact of the varying types of cloud computing
➤ Identify areas of potential audit participation
➤ Differentiate between the three basic types of smart mobility
➤ Recognize the risks inherent in the concept of Bring Your Own Device
➤ Recognize the risks to the organization inherent in social media
➤ Advise social media users on the use of privacy modes
➤ Identify risks inherent in Advanced Persistent Threats and the process nor-
mally adopted in such threats
Of recent years the emphasis in overall risk management has developed from
straightforward compliance and prevention through operating performance to the
current goals of enhancing shareholder value. When mapping these changes onto
the control of IT risk, a top-down approach is commonly used in determining the
areas of risk and the roles in implementing the control environment. Overall policy
formulation and control is part of the general IT governance layer while operationally,
management will dictate the implementation of the appropriate standards, structures
as well as physical and environmental controls. At the technical level system software
controls, system development controls and the overall application-based controls are
all impacted by the dictates of the higher layers.
Recent changes in technology have facilitated new directions and benefits for the
organization. These bring their own issues with concomitant changes to the technical
details integral to control, security and auditing.
In the past 10 years we have seen major changes in the form of:
➤➤ growth in distributed computing environments;
➤➤ integrated network support in voice, data and video transmissions;
➤➤ new types of network media and protocols;
➤➤ increased integration with external networks, clouds, etc;
➤➤ proliferation of sophisticated database technology providing transparent access
to data across dissimilar platforms; and
➤➤ increasing trends towards open systems.
Deriving from these technological changes we have seen major changes in our people
and our processes. From a human perspective, more users with higher levels of
computer literacy ensure information access over a wide spectrum of international
access routes. With enhanced customer connectivity has come the downsizing
and flattening of organizational structures. On the process side, e-commerce and
integrated systems have meant a shift in corporate speed-to-market requirements
with flexibility of systems becoming critical. In many organizations, revised technology
has been the driving force for the implementation of business process reengineering
(BPR) resulting in new rules for the gaining of competitive advantage.
These changes have required a rethink of the strategies, rules and relationships
in information technology management. Cost structures have changed as well as the
skills requirements, tools and methods of interaction to operate effectively in today’s
high volatility IT environment. These changes have also induced changes in the control,
security and auditing issues surrounding IT. The elimination of management control
layers due to the integration of system capabilities have resulted in the requirement
for new rules for separation of duties. Continuous control monitoring (CCM) and
continuous process auditing systems (CPAS) have become the order of the day.
The migration towards cloud-based systems has required the retraining of both
information technology and end-user staff. Multiple vendors selling package products
and application enablers abound and, while there exist undoubted benefits of
successful implementations, the risks inherent in failed migrations can threaten the
integrity and even corporate survival of organizations.
From an internal audit perspective, the audit approach must adapt because of
the changes in business requirements. The disappearance of hard-copy audit trails
and the sophistication of the IT systems in use means a revision of the automation
strategies employed by internal audit. Distributed activities and systems as well as
dramatic changes to hardware and software platforms mean that the auditor must
become adept at operating within a variety of environments with a variety of security
and control implications. At a technical level, there has been a quantum shift in the
minimum level of technical knowledge required for all auditors. This, in turn, has
forced the shift in the way we manage audits in an automated environment. There
will always be a need for the specialized conduct of technical system audits but when
and how these will be done is in a permanent state of flux. The use of technology to
facilitate continuous auditing has now become an imperative.
Faced with today’s audit challenges, including the massive increases in regulatory
requirements over the world-wide IP environment combined with the demand for
increasing internal audit value, and a growing shortage of skilled resources, the effect
312
IT Governance
IT governance has been defined as ‘specifying the framework for decision rights and
accountabilities to encourage desirable behavior and the use of IT’.60 It is seen to be
less about the specific decisions made and more about determining which decisions
are to be made, who makes each type of decision, how decisions are arrived at and
who will be held accountable for the results of the decision. Overlaid on this is the
government structure defining the composition of the bodies that are empowered to
make or execute joint decisions. As with any other form of governance, IT governance
directs the IT operations to ensure alignment with the enterprise in order to realize
the promised benefits by exploiting opportunities and maximizing benefits.
The board retains overall responsibility to drive the enterprise alignment and
directing management in the delivery of measurable value. A variety of models define
structures for IT controls including the COSO model and the CobIT© framework
referred to elsewhere in this book. IT governance is also specified as a requirement in
legislation such as the Sarbanes-Oxley Act, 2002 in the USA and the Basel Accords
governing financial institutions.
Project Management
The auditing of project management requires an understanding of the purpose and
structure of the computer project. Projects, as opposed to normal management
activities, are established on a temporary basis, to achieve a certain specific objective.
All projects must have a start point and a clearly defined end point. Four basic stages
exist in project management methodologies.
1. Project definition
2. Project planning
3. Implementation
4. Project completion.
60. Weill, Peter & Ross, Jeanne W. 2004. ‘IT governance on one page’. MIT Center for Information
Systems Research (CISR) WP 349.2.
313
Project definition includes having meetings and discussions with affected parties
in order to set the project boundaries and, when necessary, conducting feasibility
studies.
Project planning involves work-breakdown and the development of specifications
of the tasks to be undertaken. Part of the specification includes the resource planning
including costs, time, staff and other resources required. Where outside resources
are needed, the appropriate tendering process must be followed. The implementation
phase includes task prioritization, monitoring via the use of inspections, client
meetings, system testing, conversions, documentation, training and user acceptance
testing, while constantly identifying problem areas to solve or avoid. The project
completion phase includes final user acceptance and sign-off, the closedown of the
project team and the evaluation of the project process.
Difficulties encountered in project management include the span of today’s IT
projects which may entail virtually the whole organization’s information flow. There
is always a balancing exercise to be carried out between the delivery of quality and
functionality vs the speed to delivery and the associated costs. Overcoming these
difficulties will be dependent upon the skills and training of the project team itself.
Two types of project audit are possible: in-process project audits, which allow for
corrective changes if conditions have changed and focus on project progress and
performance; and post-project audits, which emphasize the improvement of future
projects and take a longer-term view of the project’s role in the organization.
From an audit perspective, it is recognized that a formal project management
methodology does not necessarily guarantee success, though the use of such a
methodology facilitates the identification of problems at an early stage allowing cost-
effective changes to be made and reducing the risk of project failure. Controls sought
may include:
➤➤ Project initiation reports
➤➤ Outputs of planning and estimation tools
➤➤ Ongoing project progress assessment reports
➤➤ Testing documentation
➤➤ The project costing reports
➤➤ Project team reviews.
A well-executed project audit can assist in the early diagnosis and resolution of
problems as well as facilitate identification of performance/cost/schedule/relationships
thus enabling the improvement of project performance. It can also have the benefit of
giving IT management an independent appraisal on the project status and prospects of
successful accomplishment as well as reconfirming the feasibility of that commitment
to the project as a whole.
The project audit typically follows predefined stages, namely:
➤➤ Analysis of the project’s context and stakeholders;
➤➤ Objectives analysis;
➤➤ Review of the plan of activities, resources and inputs required;
➤➤ Analysis of problems encountered;
➤➤ Review of indicators and measurements in use within the project;
➤➤ Risk analysis of events or decisions which could delay or impede the project
process; and
➤➤ Analysis of the ongoing validity of assumptions made at the inception of the
project.
314
The success or failure of a given project is commonly measured by the extent to which
it meets its objectives. From a customer impact and satisfaction perspective, the
quality, timeliness, degree of customer satisfaction and achievement of specifications
become the key measurement criteria. In terms of business success, improvements
in cash flow on market share as well as meeting expectations in return on investment
may be critical indicators. For a project in-process, efficiency in terms of cost efficiency
and schedule efficiency are normally evaluated.
Outsourcing
Outsourcing of IT has become a major outcome of the pressures involved in a modern
information processing environment. Significant technical expertise and skills are
required to operate effectively while time-to-market and technology dynamics require
rapid development and enhancement. Costs, too, have an impact. The cost to license
software or purchase services can be significantly lower than the cost to develop and
maintain a proprietary system. In today’s environment, there has been a shift in the
nature of outsourced functions to include mission-critical systems. Niche providers
and specialization frequently results in multiple vendor relationships. These dynamics
create new challenges for the management and audit of vendor oversight. Major
types of IT outsourcing include:
➤➤ Applications management
➤➤ Infrastructure management
➤➤ Independent testing and validation services
➤➤ Data center management
➤➤ Helpdesk services
➤➤ Security services.
315
➤➤ Setting of target measurements – what metrics will be used and where will these
be obtained?
➤➤ Establishing accountability – who will be responsible for what and how much risk
has been retained within the organization?
From an audit perspective, the internal auditor must determine the degree of
criticality of the services outsourced as well as the governance structure related
to the outsourced operations in terms of roles and responsibilities. Critical to the
process is the extent of detailed risk analysis which was performed at the time of
outsourcing and whether an ongoing risk analysis is being continued.
The auditor would also seek to determine whether formal service level agreements
exist and are kept current for the outsourced activities including the key performance
indicators for monitoring vendor performance. The auditor will seek evidence
of management’s monitoring of service performance and the mechanism used to
address any non-compliance issues with the service-level agreement. Outsourcing
can be effective in controlling costs and achieving strategic objectives where in-house
skills are not available or are cost-prohibitive.
Cloud Computing
Cloud computing is the term given to Internet-based computing whereby shared
resources, software and information may be provided to computers and other
devices on demand in the same manner as an electrical grid. Its origin lies in the days
of large-scale mainframe computers where an individual organization may not have
been able to justify the use of one single large computer and instead purchased time
on another organization’s computer as timesharing. At the base of cloud computing
is the concept of virtualization in which each user sees their own ‘virtual’ computer
which may, in fact, be scattered over a variety of machines in a variety of locations.
In practice, cloud computing has evolved into a variety of models delivering different
levels and types of service such as:
➤➤ Software as a service (SaaS)
➤➤ Platform as a service (PaaS)
➤➤ Infrastructure as a service (IaaS).
The overall definition is blurred giving rise to a variety of marketing concepts such
as Compute as a service (CaaS) and others. The overall model of business is the
pay-as-you-go where each type of service can be provided at a cost and adjusted as
corporate needs arise or decline. Cloud-based software services are now in a maturing
mode with applications that are specifically enabled for the cloud and support and
architecture capable of running multiple instances in a variety of locations. Such
services are normally paid on a subscription basis. The platform delivery model is
one that enables developers to write applications to specifically run on the cloud
while the scaling of infrastructure is comparatively new and consists of servers,
storage devices, databases and other peripherals with inbuilt security services. Both
platform and infrastructure offerings are currently in the early stages of development
compared to software services.
Although cloud computing appears to offer flexibility and cost effectiveness there
are, however, problems in its usage. The cloud appears to the clients as a huge
opaque box where they have little or no control over what happens inside the box.
316
Cloud computing does not remove the IT control objectives over data confidentiality,
integrity, availability and privacy but may expose the organization to additional risks
such as the difficulties involved in integrating with current in-house IT systems. In
some business environments regulatory requirements effectively prohibit the use of
cloud-based systems unless the cloud is a private client directly under the control of
the originating organization.
Where the cloud is a public cloud, security issues may also include loss of control since
the customer’s data application and resources are located with the service provider.
Thus user identity management, access rules, security policies and enforcement are
all managed by the service provider. In a public cloud, which is by definition a multi-
tenant environment, conflict may arise between tenants’ opposing goals since they
share a common pool of resources. The fact that multiple independent users may
share the same physical infrastructure can lead to vulnerability whereby an attacker
can legitimately be in the same physical machine as a target.
From an audit perspective, it becomes difficult to audit data held outside the
organization in a cloud and the obtaining of forensically acceptable data may also be
more difficult since the data is no longer maintained locally. Legal jurisdiction can also
be problematic with different regulatory requirements in the country of the cloud host
and further complications if the cloud provider sub-contracts to third party clouds.
In terms of audit’s additional roles in a cloud environment, IT audit may participate
by assisting management:
➤➤ identify their control requirements and evaluate the controls to be contracted with
the cloud provider;
➤➤ evaluate vendors to ensure balanced assessment and a drawing of appropriate
vendor contracts;
➤➤ evaluate the controls and procedures in place for managing vendor relationships;
and
➤➤ assess the scope and methods of planned data migrations into the cloud as well
as the potential for reversing the process if required.
Smart Mobility
Although the term smart mobility is used fairly randomly, there are three basic types
of mobility:
➤➤ Terminal mobility refers to the ability of a user terminal to continue to access and
network as the terminal moves.
➤➤ User mobility refers to the ability of a user to continue to access network services
from different terminals under the same user identity when the user moves around.
➤➤ Service mobility refers to the ability of a user to access the same services regardless
of where the user is.
The management of smart mobility includes the need to support all forms of mobility
for all types of application, across heterogeneous radio systems in the same or
different administrative domains, without interruption as the user moves around, with
the ability of the user to move into, and use, different operators’ networks.
Achieving this requires that the network be able to determine a mobile device’s
current location and use that information to deliver packets of information to the
device. At the same time it must be capable of handing over from one network
attachment point to another including the ability to roam and use different operators’
317
Social Media
Social media is a generic term for the various forms of user-generated content and
the collection of websites and applications enabling people to interact and share
information online. Generally, these can be categorized into:
➤➤ Social networking sites [Facebook, Twitter, Myspace]
➤➤ Blogs [Wordpress]
➤➤ Video sharing sites [YouTube]
���
. Global state of insecurity survey, 2012, PriceWaterhouse Coopers.
318
Social media can be a powerful tool for business enabling them to find customers
and build clientele by introducing the organization’s brand on an international basis.
E-marketing is a rich source of new customers reachable globally in a manner
hitherto unimagined. In addition to the new customers, the potential to influence
buyer behavior via electronic marketing by leveraging the information base of existing
purchasing behavior is enormous.
Social media, one of the most culture-changing trends in e-business, is the
integration of social media across all activities. The use of social media strategies
for marketing, sales, and service across the enterprise can not only increase market
awareness of an organization’s products and services but can also provide valuable
feedback on customer experience and branding. The use of technology such as Twitter
is now fully recognized as a means of rapid deployment of information to consumers
in matters ranging from one-day price reductions to early warning of severe weather,
depending on the nature of the organization.
From a small business perspective, professional blogging used as a corporate
tool for communicating with customers or for employees to share knowledge and
expertise, works well for knowledge workers such as consultants.
Once again, exposure of this nature introduces its own risks such as opportunities
for malicious action to systems and information and the exposure of sensitive or
private information. In many job applications these days, human resource departments
research applicants on the social media websites to evaluate the appropriateness of
employment within the corporate culture. Before use is made of social media posting
it is wise to consider the following questions:
➤➤ Will this post or picture cause a problem for me in the long term? (this has caused
recent problems with disclosed celebrity photographs)
➤➤ Would I make this comment in front of my mother? (aggressive or insulting Tweets
have led to lawsuits)
In order to use social media responsibly, most social media sites offer the user options
in privacy modes:
➤➤ mostly open where the default sharing mode is public and the individual user must
choose to keep their content private; and
➤➤ mostly closed where the default mode is private and the individual user must
choose to share content.
319
APTs have originated in nation states as well as organized crime groups. Hactivist
groups have also had APTs traced to them. The objectives of such attacks are
dependent upon the groups or individuals attacking. From a political perspective,
APTs may be used for suppression of the nation’s own population to maintain
stability. Militarily, APTs may be used to identify weaknesses to allow inferior military
forces to defeat superior military forces by exploiting the network weaknesses. From
a criminal perspective, the gaining of illicit competitive advantage or the theft of
intellectual property are common objectives. Frequent targets of hacker groups are
software houses where the objective is to obtain the source code for further exploit
development either for their own use or for sale to other APT groups. Generally, such
attacks are specifically designed to bypass the known anti-virus and anti-malware
software and take the form of low and slow attacks designed to move easily across
networks. Such attacks commonly follow a seven-step process:
1. Reconnaissance over a number of public website pages that targets contact
information may be extracted and subsequently used in targeted social engineering
attacks.
2. Initial intrusion into the network including spoofing of e-mails with attachments
are links to zip files containing software exploits or malware. Such attacks are
commonly carried out overnight (US time).
3. Establishing a back door to retain long-term access into the network. If an attacker
can obtain domain administrative credentials, they can utilize this to move laterally
through the network establishing multiple back doors with different configurations.
Malware introduced with these authority levels can infect registries and use the
legitimate user’s credentials to blend in with normal network traffic.
4. Obtaining user’s credentials through use of the administrative access rights. In this
manner attackers can obtain user accounts and password hashes in volume.
5. Installing various utilities to extract information, dump passwords, extract e-mails
from servers and other malicious tasks. When these utilities are installed, they
may reside in sleep mode for anything from a few days to a year or more.
6. Privilege escalation with lateral movement through the network and data
exfiltration. By using the rights of authentic, authorized users, firewalls can be
negotiated as legitimate system users.
320
For certain large-scale corporations and for government functions, hardening systems
against APTs is essential but for many smaller organizations taking the appropriate
steps to prepare for, and detect such attacks also makes sense. Such hardening takes
the form of ensuring robust logging is in place with servers and workstations using
the latest security patches and with users ensuring that their credentials are hard to
crack.
The conventional information security approach is to attempt to protect all
information assets equally. The advanced approach to control coverage is to identify
the most important assets and focus protection efforts in those areas. Preventive
controls such as firewalls and antivirus software are still essential, however, monitoring
and data analytics used as detective controls are also critical in this form of attack.
Overall security has moved from the concept of the peripheral defense when an
outside barrier will identify and authenticate the user, to a data-centric approach with
controls focused where the threat would be most damaging. Both IT and audit must
develop a deep understanding of the organization’s key assets and the IT environment
surrounding them. This will allow appropriate research on attackers’ chosen targets,
modus operandi and malware commonly in use.
321
Fraud Auditing
Learning objectives
After studying this chapter, you should be able to:
➤ Outline briefly the definitions and concepts underlying fraud, irregularities,
waste and abuse
➤ Explain the role of forensic accountants and other outsiders
➤ Understand the profiles and motivators of fraudsters
➤ Differentiate between fraud, waste and abuse
➤ Recognize likely fraud indicators and red flags
‘Internal auditors are responsible for assisting in the deterrence of fraud by examining
and evaluating the adequacy and the effectiveness of the system of internal control,
commensurate with the extent of the potential exposure/risk in the various segments
of the organization’s operations.’
Virtually any form of dishonest behavior can be classified as fraud in one form or
another. Under private law, fraud involves a false statement or a deliberate omission
intended to induce someone to place reliance upon it to his/her prejudice. Where it
can be shown that a contract was entered into because of a fraudulent inducement,
the contract can be set aside and the victim of the fraud may also be able to recover
any damages suffered in an action in delict.
In criminal law, the same conduct would result in criminal prosecution. In South
Africa, courts have ruled that the offense of fraud need not require a specific indi
vidual to be prejudiced. As such, it is not necessary that a victim be established for
the police to secure a conviction. Potential prejudice will be sufficient.
Many auditors confuse fraud and internal theft. The most significant difference
is that frauds are always planned while thefts may be planned or unplanned. Theft
tends to be an opportunistic crime occasionally arising out of genuine need. Frauds
usually arise out of genuine greed and must be concealed for the fraud to continue.
Fraud in South Africa is deemed to occur when the following elements exist:
➤ An untrue representation about a material fact or event is intentionally made
by an individual or an organization.
➤ Such an untrue representation is believed by the person or individual to whom
representation was made.
➤ The victim relies on the untrue representation and acts upon it.
➤ The victim suffers the loss of property and/or money as a result of acting upon
or relying on the untrue representation.
Fraud may be carried out for the benefit of an individual or an organization. The
benefits or gains made as a result of fraud carried out by an individual may be
direct, such as the receipt of property or money, or indirect in the form of bonuses,
promotion, power or influence. When fraud is carried out by an individual acting
on behalf of an organization, the benefits are normally direct and take the form
of financial gain. Business fraud is then taken to be any business activity in which
deceitful practices are resorted to by an organization or representative of an organ
ization with the intent to cause economic injury or deprive another of property or
other entitlements.
Over the years, South Africa has seen a variety of fraudulent activities. Common
types are discussed below.
326
Larceny
In this category, the perpetrator must have taken or converted the property of
another without the consent of the owner with the intent to permanently deprive
the owner of its possession.
Unsolicited Orders
Where an organization carries out most of its business through a normal sales force,
customers who approach the organization with unsolicited orders may be a source
of concern. ‘Golden opportunity’ may be a catch phrase to trap the unwary company
and lead it into providing assets with little hard information about the customer
and the company to which assets have been provided. Sudden, unexpected, urgent
orders can be used to create a willingness to cut corners in the checks and balances
normally carried out in order to land a large new customer. Such urgency, particu-
larly on credit, may indicate a higher risk.
Even if the customer is known, many fraudsters have first established their cred
ibility by placing small orders, which are paid for on time. Once credibility is estab
lished, larger orders are placed with no intention of ever paying for them.
Advance Fees
This type of fraud involves the offering of services that require an up-front payment
in order to cover costs. The fraudster then disappears with the advance fee. Many
such frauds in South Africa have involved offering the transfer of funds from anoth
er country with currency restrictions. The victim is offered a commission to be the
recipient of funds with no risk to him-/herself. The fraudster may offer official looking
documentation confirming that such funds are available and will be paid. All that is
required is the payment of an amount to cover initial expenses (always much smaller
than the commission to be paid). Unfortunately, the fraudster does not have such
funds available and therefore the victim, in order to obtain the commission, will be
asked to cover the initial expenses. Once the money has been handed over, the
fraudster disappears, together with all traces of the officials who confirmed that the
money was available.
327
Bribery
Bribery can be defined as the giving, receiving, offering or soliciting of any ‘thing
of value’ in order to influence an official in the performance of, or failure to perform,
the law for duties of that official. It may include soliciting the commission of any
other type of fraud or the influencing of an official to carry out any act that violates
the lawful duty of that official. Under such circumstances, bribery is defrauding the
employer of that official of the right to honest and loyal services by an employee.
Such bribery may include giving, receiving, offering or soliciting of a ‘thing of value’
because of an official act that has already taken place.
In the case of commercial bribery, the offense is the same, but the intent is to
influence some business decision without the organization’s knowledge or consent.
Conflicts of Interest
Closely allied to bribery is conflict of interest. When an organization or person acting
on behalf of another organization or individual has, or appears to have, a self inter-
est in the activity or a hidden bias that is potentially detrimental to the interests of
the party being represented, and such bias is not made known to the represented
party, a conflict of interest has occurred. Should such a conflict of interest result in a
loss to the represented party, a fraud has taken place. In the public sector, laws exist
that prohibit conflicts of interest in government employees and those doing business
with the government. In the private sector, conflicts of interest may not be a criminal
offense as such, although the results may be deemed to be unjust enrichment and
therefore a criminal offense.
Embezzlement
Embezzlement entails the fraudulent conversion of personal property by the person
in possession of that property where the possession was obtained as a result of trust
placed in the embezzler.
328
False Claims
A false claim fraud occurs when a person knowingly and intentionally makes a false
or fictitious representation or falsifies a material fact, which results in financial loss
to the victim to whom the false representation was made.
Extortion
The obtaining of something from an individual or organization through the use of
actual or threatened force or fear, including the fear of an official’s office or the
fear of an economic loss, is classified as extortion.
Conspiracy
Conspiracy occurs where there is intent that a crime be performed and there is an
agreement with another person or persons to engage in that crime, and where one
of the conspirators commits an overt act to further the conspiracy.
Lapping
Lapping involves the use of funds received in payments to conceal a theft of cash.
The fraudster will initially steal funds offered in payment of a debt. To conceal the
initial theft, a subsequent payment by a second party is used to make good the
shortage resulting from the original theft. Payment from a third customer is used to
cover the second shortage, and the process continues.
Kiting
Kiting is made possible when a financial institution permits the withdrawal of funds
from an account based on deposits of cheques that have not yet cleared. Under
such circumstances, the funds may be in transit or they may, in fact, be non-existent.
Money is obtained from legitimate sources of goods purchased by writing cheques
against the non-existent balances. By continuously ‘kiting’ from bank account to
bank account cheques drawn against non-existent balances, the fraud continues.
Fraudulent Affiliations
In order to establish credibility, a fraudulent company may often claim an associa
tion with a well-known and legitimate company. This may take the form of pretend
ing to be a branch or subsidiary of an existing and well-known organization.
Company names that resemble well-established brand names should be treated with
suspicion. Impressive trade names implying stature or international status may also
be misleading. Claims of overseas offices or foreign ownership, which is difficult to
confirm, are also popular.
With the intense competition that businesses have been subjected to over recent
years, there is pressure on all parties to move quickly, get the big order or get new cus
tomers. This pressure leads to the cutting of corners and the elimination of controls,
which make it easier for the fraudster to exploit the organization’s vulnerability.
329
Frauds often come to light as a result of an allegation from a third party regarding
misconduct on the part of the organization or an officer of the organization. In many
cases, such allegations are anonymous and there is a temptation to ignore them,
since to deal with them would require an uncomfortable decision. Other frauds are
detected when significant changes to profitability, market share or cash flow are
observed. Some frauds are noticed purely by accident when someone is looking for
something else.
Payroll
Indicators in this area may include high volumes of manually prepared statements;
major movements in total payroll or overtime not justified by increases in business
activity; easy access to payroll records, negotiable documents or electronic funds
transfer systems; and sudden decreases in staff turnover within a business area.
Cash Handling
Red flags for possible fraud opportunities could include lack of segregation of duties
over the receipt of cash, bank deposits and post into customer accounts; lack of
adequate safeguards over physical storage of cash; infrequency of bank deposits;
persistence shortages in cash itself; and excessive volumes of voided transactions.
Purchasing
Potential fraud indicators here could include volume of purchases from sole vendors;
buyer turnover; occurrences of missing or duplicate purchase order numbers; unusu-
al purchases in terms of the nature of the items of value of the items; and abnormal
rises in the volumes or prices of routinely purchased items.
330
Accounts Payable
Accounts payable involves monetary disbursements and are a favorite target for
fraudsters. Red flags here which could draw the auditors’ attention to potential
fraud occurrences could include: remittance addresses or bank accounts matching
employee addresses or bank accounts; recurring amounts from the same vendor
just below and authorization level; sequential invoice numbers from the same ven-
dor; lack of segregation of duties over processing of accounts payable invoices,
authorization of payment and execution of payment; inadequate authorization over
changes to vendors’ records; lack of authorization documentation for payments;
unauthorized credit adjustments for a specific vendor; comparatively new vendors
with slowly increasing credit utilization followed by a sudden increase in exceeding
the credit limit; paid invoices not properly cancelled; and easy access to negotiable
documents or electronic funds payment systems.
Accounts Receivable
In the same way as a fraud can be carried out where money leaves the organization,
manipulation of debt to the organization can equally lead to fraud. Red flags here
could include inadequate segregation of duties between the processing of accounts
receivables, recording the movements and recording the payment receipts; exces-
sive movements in the allowances for bad debts; inadequate controls over credit
note processing; and inadequate reconciliation of accounts receivable activity.
331
Triggering Events
What causes a trusted employee to begin fraudulent activity is varied, but most
commonly it is an emotional trauma in the individual’s life involving home, work,
marriage or some other aspect. This affects the person’s behavior pattern and may
well be noticed by his/her colleagues. The manager may assume responsibility for a
single client or a specific task, which he jealously guards as he continues the fraud.
Where the change involves heavy drinking, gambling, an expensive social life or
extra-marital sexual activity, a pattern of lies and deceptions may emerge. Such
deceptions are frequently believed because the individual has given long and honest
service before the fraud actually begins.
Most frauds are caused by a lack of internal controls. However, in many cases,
the con trols are there, but are not being adhered to and management is not
policing them.
Fraud Prevention
The biggest deterrent to fraud is not controls, but rather the perception of detec
tion. Ultimately, the best control may be for an organization to demonstrate its will
ingness and ability to catch and punish offenders. This increases the offender’s belief
that he/she will be caught, which is the strongest of all fraud deterrents.
In an ideal world, the responsibility for the prevention and detection of fraud
would rest solely with management, while the resolution of fraud would be seen as
the responsibility of the forensic auditor. To understand the difference between an
auditor and a forensic auditor, one needs to understand the fundamental difference
between auditing and forensic audit.
332
fraud. This includes obtaining evidence, taking statements, writing reports, testifying
to findings, and the detection and prevention of fraud.
Cash schemes
(occur frequently but rarely material) ➤ bank reconciliation
➤ cut-off bank statements
➤ surprise cash counts
➤ investigation of customer complaints
➤ review of journal entries
➤ review of sales/cash trends
Payroll schemes
➤ ghost employees ➤ independent payroll distribution
➤ overtime abuses ➤ cash flashing around
➤ withholding taxes ➤ matching addresses
333
The approach of a forensic auditor is the resolution of fraud with sufficient proof
to prove or disprove allegations of fraud. Forensic auditors must presume that all
cases will eventually end up in litigation.
A forensic auditor cannot conduct a forensic audit without credication or just
cause or a valid reason to suspect that a fraud has occurred.
Credication may be defined as that set of circumstances that would lead the
prudent, reasonable and professionally trained person to believe that a fraud has
occurred, is occurring or will occur.
Credication normally comes from a tip-off, but can also come from analytical data,
eg – for a retail company – a dramatic increase in the value of refunds or voids, or a
sudden decrease in the turnover figures. This can give credication to a forensic audi-
tor to conduct a forensic audit. Of recent years, with the advent of fraud ‘hot lines’,
tip-offs have become the biggest single source of fraud allegations.
Forensic audit must exclude any other possibility, eg that a mistake or error
has been made. To achieve this, forensic auditors often employ a concept called
‘reverse proof’. This means that, in order to prove that an allegation of fraud has
occurred, part of the proof must include attempts to prove that a fraud has not
occurred and vice versa. Both sides of an allegation must be examined.
In addition to technical auditing skills, forensic auditors must have the following
abilities:
➤ to elicit facts from witnesses in a fair, impartial and lawful manner;
➤ to report the results of a forensic audit accurately and completely;
➤ to be part accountant, part investigator and part criminologist; and
➤ to deal effectively with people – professionally, empathetically and thoroughly.
Fraud Prevention
The vast majority of internal frauds are discovered by accident rather than by plan.
Internal auditing is not designed to detect fraud, but to help managers to create
an environment in which fraud is unlikely to occur, but will be swiftly detected if
it does. The first defence against fraud is the hiring of the right person for a posi-
tion and this normally falls to human resource professionals. A human resources
professional identifies the skills required to complete the job successfully; assesses
the personality of co-workers, juniors and supervisors; and then begins searching
for the right candidate. If this is done effectively, the applicant will have the skills
and personality to do the job; however, whether the successful applicant is honest,
honest so far, or just not caught yet, remains unknown.
334
Fighting Corruption
Corruption in all shapes and forms has a corrosive impact on both local and over
seas market opportunities, as well as the broader business climate. From the indi
vidual piracy of DVDs or branded-name products to a worst-case scenario where it
may deter foreign investment, stifle economic growth and sustainable development,
distort prices, and undermine legal and judicial systems, corruption is a problem
in international business transactions, economic development projects and govern
ment procurement activities.
Developing a comprehensive anti-corruption compliance program may limit an
organization’s risk and help protect an organization’s reputation and long-term sur-
vival.
An effective corporate anti-corruption program is one that ultimately yields the
intended results of education, detection and deterrence. For such a program to be
effective, the full support of executive management is necessary, since the program
must be enforced at all levels. If executive management do not take corruption seri
ously, then neither will employees.
Codes of Conduct
A corporate code of conduct consists of a clear set of legal and ethical guidelines
for employees to follow. Such a code must exist in writing, be promulgated to all
employees and be understood by all involved. It may be necessary to translate
the code of conduct into the home languages of the employees, to make sure they
understand it fully. To be effective, penalties for violation must be clear and the code
must be effectively implemented and enforced at all times.
Such a code is a directive control and therefore not 100 per cent effective.
Nevertheless, a comprehensive and understood code of conduct may significantly
reduce the likelihood of misconduct by employees.
A compliance program may be instituted and run by either an individual or a
team of compliance officers, depending on the size and nature of the business.
Compliance officers and committees can be essential in producing and maintaining
codes of conduct, as well as in educating employees on compliance procedures. The
overall success of a code of conduct depends on the provision of legal and ethics
training and the creation of a culture of integrity. As such, regular ethics training pro-
grams are required for all management and employees from executive management
down through the hierarchy.
Violations of the code should be reported, but many employees are reluctant
to report wrongdoing, either because of fear of reprisals or, more commonly,
because they do not know who to report it to. It is critical that employees have a
clear and known line of communication that they can use to report wrongdoing,
anonymously if they prefer. Where fear of reprisals exists, an organizations must
be at pains to protect whistleblowers that are prepared to expose themselves
for its benefit. Suggestion boxes or anonymous ‘hot-lines’ make the reporting of
questionable conduct easier. Many employees, influenced perhaps by television
amateur sleuths, are under the impression that wrongdoing cannot be reported
unless the employee has ‘solved the case’ and has incontrovertible proof. This
belief must be overcome and employees encouraged to report their suspicions so
that professional investigators may find proof that will stand up in court.
335
Another common reason for non-reporting is the belief that nothing will be done
or, indeed, that nothing can be done. Feedback should be publicly given as to
actions taken as a result of tip-offs. This, in turn, will encourage the ongoing report
ing of violations of the code. Such violations need not be restricted to fraudulent
activity, but may also include racism, sexual harassment or other illegal or unethical
behavior.
Enforcement of the code of conduct is critical. Creation of a strong code with weak
enforcement may prove worse than not having a code at all. Employees effectively
have it pointed out to them that, while the company officially frowns on such behav-
ior, it is prepared to turn a blind eye to it.
Organizations may also have to provide guidance and assistance to employees
after a fraud has been uncovered. Innocent employees may need advice on how to
cope with and resolve stressful situations resulting from the investigation or prose
cution.
Internal Audit
The auditing and monitoring of systems of internal controls will themselves con
tribute toward the establishment of effective anti-corruption programs. The early
detection of inaccuracies and misconduct (eg bribery, fraud or corruption) can
swiftly create the climate of honesty sought by an organization.
336
Forensic Evidence
Learning objectives
After studying this chapter, you should be able to:
➤ Outline briefly the legal environment in South Africa and the court structures
➤ Differentiate among the differing forms of fraud and the elements of proof
➤ Define the key elements of audit as opposed to legal evidence
➤ Explain the role of the polygraph
Constitutional Court
The Constitutional Court consists of a president, a deputy president and nine other
judges. Any matter before the Constitutional Court must be heard by at least eight of
the judges. Although the Constitutional Court is the highest court in all constitutional
matters, it may decide only constitutional matters and it has the final say on whether
the matter is classed as a constitutional matter or not.
Only the Constitutional Court may decide disputes between the organs of state
regarding the constitutional status, powers or functions of those organs of state. It
may also decide on the constitutionality of any parliamentary or provincial bill, or
any amendment to the Constitution. It may also decide whether parliament or the
president has failed to fulfill a constitutional obligation.
High Court
The High Court may decide any constitutional matter except a matter that only the
Forensic Evidence
Evidence in general may be defined as anything perceivable by the five senses and
includes:
➤ testimony of witnesses;
➤ documents;
➤ facts or data;
➤ tangible objects legally presented; and
➤ direct or circumstantial evidence.
338
A general rule is that facts are allowable while opinions are not, unless they are
expert opinions.
Hearsay evidence is generally inadmissible, although dying declarations, valid
confessions, tacit admissions or res gestae statements (spontaneous exclamations
as part of the criminal act) may be accepted at the discretion of the court.
Threats by the suspect, the suspect's conduct and comments at the time of arrest
or evidence linking the suspect to the actual crime are also highly relevant. Any
attempt to conceal the fraudster’s identity or attempts to destroy evidence may also
be submitted to the court.
As each piece of evidence is collected, the auditor must maintain an inventory
reporting live data, location, time of collection and by whom the item was collected.
Original documents should be protected against damage, which could destroy future
opportunities to derive additional evidence. Originals would normally be stored in
an envelope or plastic folder and should not be altered or written on other than an
unobtrusive notation for identification purposes. Any copies made for working pur-
poses should be clearly marked ‘Copy’.
Chain of Custody
Forensic auditors must maintain the chain of custody of any evidence that comes
into their possession. Any break in the chain of custody may result in the item or
document being inadmissible at trial. This means that the evidence must be securely
stored with access controlled by an ‘evidence custodian’. Securing the location can
be as simple as keeping a door locked. From time to time, evidence must be trans-
ferred from one person to another and the transfer must be documented. Any move-
ment of evidence, including sending it to a crime laboratory, document examiner or
the police, must be accounted for as well. The simplest way to do this is to create
an evidence trail within the register that lists each item by number and description.
339
Any transfer of evidence is noted in the evidence register by the person designated
as evidence custodian, thus maintaining the item's chain of custody.
Forensic Examination
IIA Practice Advisory 1210.A2-1: Identification of Fraud recognizes that this is a
specialized area of work that may well involve experts in the field.
340
Polygraph Testing
A polygraph is a measuring device that makes a permanent recording of various
physiological changes taking place within the body of the subject as a result of
psychological stimuli. The stimulus is brought about by maintaining a certain envi-
ronmental and emotional climate during the polygraph examination and the asking
of questions that have been structured and phrased in a specific way. The questions
asked during the examination will have been developed beforehand with the subject
so that there are no surprise questions.
Two basic types of polygraph instruments are in current use, namely analogue
and computerized polygraphs. Both of these are state-of-the-art technology, which,
if used by a professional polygraph examiner in a satisfactory environment, can very
accurately distinguish between truth and deception.
During a pre-examination interview, the examiner gathers details on both the
case and the person to be tested. The examiner must establish a rapport with the
examinee and allay his/her fears, suspicion and general anxiety. The examinee would
then normally be questioned in a non-accusatory interview about his/her knowledge
regarding the alleged incident and the test questions would be developed. As men-
tioned above, the test questions should be discussed with the examinee in advance.
At no stage during the test should any surprise questions be put to the examinee.
During the examination itself, pneumographs, GSR (galvanic skin response) and
cardiograph sensors are attached to the examinee. The examinee is then asked each
of the test questions at least twice and the physiological responses are recorded.
The polygraph is not a lie detector. It is an instrument that uses what is referred
to as the autonomic nervous system, ie that part of the nervous system that we
cannot voluntarily control. There are two branches to the autonomic nervous
341
system, one having to do with growth and development, the other being an emer-
gency system. The emergency system becomes dominant only when there is some
threat and the individual becomes fearful.
The polygraph test measures such a response. If the truth is told, the body will
function at its normal level. If the examinee comes to a question in response to which
he/she intends to lie, he/she becomes afraid of being caught in that lie and the body
automatically shifts into the emergency system. All of the physiological changes will
take place and be recorded on the polygraph chart.
After the test, the examinee is questioned about the responses to the relevant
questions, if any, and a numerical scoring system is then employed to analyze the
examinee’s polygraph charts to determine if there are any significant physiological
responses to the relevant questions.
Since its invention, over 250 studies have been conducted on the accuracy of
polygraph testing. These studies suggest that when an established testing proce-
dure is used by a properly trained examiner, the accuracy of the decision made by
polygraph examiners can be around 95 per cent for specific issue investigations.62
The studies also indicate that, although it may be possible for someone lying to
be shown as truthful, it is highly unlikely that a person telling the truth will be
evaluated as lying. The polygraph is a useful aid with many applications, but is
not without its limitations. It cannot replace conventional investigation, since its
focused approach cannot be used to examine more than one specific issue at any
one time. It should be used to confirm or refute specific elements of information.
At present, there is no law in South Africa that prohibits the use of the polygraph,
but the examinee must agree to its use in writing before the examiner starts with the
test. There is no precedent set regarding the use of polygraph evidence in court at
present. It is at the discretion of the magistrate to decide what weight the polygraph
will carry as supporting evidence. In some countries, such as Israel, Germany and the
USA, the polygraph is widely accepted within the legal systems.
62. Barland, G.H. 1975. Detection of Deception in Criminal Suspects. A Field Validation Study.
PhD thesis, University of Utah.
342
Conducting Fraud
Investigations
Learning objectives
After studying this chapter, you should be able to:
➤ Outline briefly the elements of the crime of theft
➤ Understand and explain the rights and powers of an investigator
➤ Select the appropriate investigative techniques for a variety of crimes
➤ Describe how to prepare a case for court and how fraud should be reported
➤ Match the use of investigative techniques and the appropriate support agencies
➤ The third element is that the state must prove intent to steal, without which
the act is not a punishable offense. The intention must be to deprive the law-
ful owner of his/her ownership or a lawful possessor of his/her possession,
eg a hired car subsequently stolen.
➤ The fourth element is that the state must prove that it was the intention of the
accused to permanently deprive the owner of the object of his/her ownership. If
the intent was merely to deprive the owner temporarily, the accused is not pun-
ishable for theft. The accused would instead be charged with unlawfully using
somebody else’s property without their permission.
Whenever a theft has taken place, certain basic information must be gathered. A
statement should be taken from the complainant detailing the specific time and
date when the object stolen was last seen, together with the date and time of the
discovery of the theft. The complaint should also record that no one had the right
to steal the property or temporarily remove it. A full description of the article stolen
and of any identification marks are critical for proper identification in the event of
recovery. If the object was insured against theft, this must be recorded, together
with the name of the insurance company. The value of the objects stolen will also be
required both for prosecution and by the insurance company.
344
Private individuals may also be called upon by a police official to assist in arrest-
ing a person or in detaining a person so arrested. Failure to assist the police in this
matter without sufficient cause is an offense.
Entry into premises for the purpose of effecting an arrest may be gained by an
individual who may lawfully arrest another and who reasonably suspects that the
other person is on the premises. Certain procedures must be followed to make the
entry lawful. The individual must first audibly demand entry into such premises and
notify those inside of the reason for which he/she seeks entry. He/she may then, if
necessary, break open, enter and search the premises in order to make the arrest.
The use of force in effecting an arrest is permissible to an authorized person where
the suspect resists arrest and cannot be arrested without the use of force, or where
the suspect flees when it is clear that an attempt to arrest is being made. Only such
force as may be necessary to overcome the resistance or prevent the flight may be
used.
Corporate Investigation
IIA Practice Advisory 1210.A2-1: Identification of Fraud indicates that fraud detec-
tion is not a primary function of internal audit and that internal auditors’ knowledge
and experience is not equivalent to that of a fraud investigator. Consequently, while
fraud may be detected in the course of internal audit procedures, this is not a guar-
antee that all such fraud has been detected, and this in turn does not imply that an
internal auditor has not exercised due professional care.
‘Internal auditors are not expected to have knowledge equivalent to that of a person
whose primary responsibility is detecting and investigating fraud. Also, audit procedures
alone, even when carried out with due professional care, do not guarantee that fraud will
be detected.’
This is not to say that in the present environment of endemic fraud, management of
large organizations may not establish a forensic audit department employing special-
ist investigators or may not appoint external service providers for these services.
When management becomes aware of possible wrongdoing within an organiza-
tion, it has a duty to ascertain the truth and extent of the wrongdoing. This normally
involves conducting an investigation. Such an investigation must be professionally
planned and executed to avoid the normal emotional reaction that occurs when
indications of impropriety arise. Hasty overreactions can compromise an investiga-
tion before it even starts.
Generally, people’s initial reaction when faced with the first indications of possible
wrongdoing is an instant judgment regarding the extent of the problem and the
potential wrongdoers. Suspicion abounds when fraud is revealed and the behavior
patterns of innocent people become suspect. Such knee-jerk reactions can be highly
damaging both to the futures and reputations of innocent people and to the orga-
nization itself. The suspected fraud should be treated as a management issue and
careful planning should be carried out prior to the investigation.
At the planning stage, information regarding the suspected fraud should be restrict-
ed to those who have a need to know. The extent of this restriction will depend on the
individual or individuals suspected, the nature of the fraud and the authority levels
of the suspects. Maintaining secrecy at this stage increases the possibility of gaining
345
346
end point are normally genuine events and time periods. It is what happened
in between and when it happened that is fabricated and where the sequence
series of events claimed can be forgotten.
➤ Lying by minimization is used to deceive by downplaying negative aspects of
the suspect’s behavior or performance. Careful questioning and healthy skepti-
cism on the part of the investigator can normally uncover the truth.
➤ In the same way, exaggeration may also be used as a lie and is frequently used
when a job applicant exaggerates his/her qualifications, work experience and
responsibilities. Once again, careful questioning may reveal the truth.
Detecting Lies
In the absence of a polygraph, investigators will use observation of the interviewees’
behavior patterns to identify areas of possible concern.
Delays in responding to questions involving the simple recollection of facts may
alert the investigator to a possible attempt at deception, as the liar has to consider
his/her version of the facts to ensure consistency with what he/she has already said.
People who are telling the truth can normally answer promptly, as they are simply
recalling a memory. Care should be taken, however, to distinguish between the delay
before a lie and the delay of a person taking sufficient time to ensure the question
is answered accurately. Questions that require an answer based on the individual’s
judgment will normally involve some form of delay. Delay over ‘yes’ or ‘no’-type
questions indicates the weighing of the pros and cons of a given answer.
Repeating the question may be a tactic used by the interviewee to delay answer-
ing while weighing the options. Once again, the delay may be caused by a genuine
attempt to give the best possible answer.
Lying can also be indicated by the use of qualifiers in answering questions.
Expressions such as ‘as far as I can remember’, ‘to the best of my knowledge’ and
‘probably’ can be used to conceal deception. They may signify omissions and areas
that the interviewee wishes to avoid.
Analyzing an individual’s behavior and body language is a skilled science. When
used effectively, it can provide focus for further investigations and questioning, and
assists identification of areas where a deception may be occurring. It is, however,
easy to draw the wrong conclusions and such analysis should be taken as a guideline
rather than as actual evidence.
One of the final steps an investigator takes in concluding the inquiry is confronting
the target of the investigation. Often, the ultimate outcome of the case may depend
on whether the suspect confesses. Confession is responsible for more successful
investigations than all the other forensic techniques combined.
Confronting a suspect is a complicated process. The individual’s age, education,
job, experience with the criminal justice system, and his/her awareness of the inves-
tigation must be considered when preparing to confront a suspect and trying to get
a confession.
347
348
IT Fraud Investigation
Learning objectives
After studying this chapter, you should be able to:
➤ Outline briefly the fundamental goals and methodologies of an IT fraud investigation
➤ Define appropriate policies and procedures to facilitate an IT fraud
investigation
➤ Explain the basic technology in IT forensics and sources of evidence
➤ Define the elements required in preplanning for an IT fraud investigation
➤ Design an appropriate IT fraud response toolkit
➤ Describe the current legislative basis for using computer evidence
➤ Input frauds normally take the form of amended or forged transactions entered
into the computer and unauthorized changes to standing data on masterfile so
that valuable assets, normally cash, can be obtained. This type of fraud does
not need any specific IT expertise and is a common form of user-level data
entry fraud.
➤ Processing or throughput frauds usually involve modifications to live programs
in order to enter unauthorized codes for improper purposes. Viruses, trap-doors
and Trojan horses are all examples of such coding.
➤ Output frauds commonly occur when correct and valid outputs are intercepted
and amended before they are used. This may take the form of altered pay
ments or breaches of confidentiality.
Once more, with the advent of the Internet, computer hacking has become a source
of risk to computer systems. Perhaps fortunately, hacking for fraudulent purposes is
not yet widespread.
Many IT fraud investigators have a fundamental fear of computers, but are being
called in to investigate computer-related crime, and are therefore happy to leave
such investigations to specialist auditors or outside consultants. This fear has built
up over the years as a result of the air of secrecy surrounding IT and the techni-
cal jargon associated with. Once the technical jargon has been got out of the way,
understanding the risks and controls within computer systems and the means of
investigating an IT fraud become clear.
IT fraud often comes to light because of its impact on the organization; however,
the most common way in which computer crime is uncovered occurs when another
person, who may or may not be an employee, tips off the organization. When an
IT fraud is suspected, the first objective of the IT auditor or security personnel is
to confirm whether an incident has actually occurred. If there appears to be a case
for believing such an occurrence has taken place, all subsequent steps must be
350
Pre-incident Preparation
The objective of pre-incident preparation is to ensure that, should an incident occur,
the organization is in a position to identify what exactly happened and to what sys
tems. From this it may be determined what information was compromised, what files
were created/modified, and who may have caused the incident. It is also useful to
prepare, in advance, who should be notified and what steps will be required to get
back to normal.
Major steps in the process would include identifying the vital assets in advance
and conducting a risk analysis to determine what would be the most likely nature
of exposure faced. Individual hosts could then be prepared to detect incidents by
producing cryptographic checksums of critical files and enabling secure logging.
Preventative measures would include hardening the hosts’ defenses in a variety of
ways. Back-ups of critical data stored securely can help protect against the threat
of non-availability leading to fraud. Directive controls would include comprehensive
user education about host-based security.
Networks should be prepared by installing firewalls and intrusion detection sys
tems (IDS), as well as by the use of access control lists on routers. Companies can
create a topography conducive to monitoring, encrypt network traffic and require
authentication beyond the password level.
351
The appropriate response may, in fact, vary based on the circumstances of the
incident. If, for example, a hacker is detected, it may be more beneficial to the
organization to allow the hacker to believe the system penetration is successful and
let him63 in. This would allow time to gather forensically acceptable evidence for
his future prosecution, as well as facilitate tracing the hacker to his lair. Obviously
such a policy would require a very high level of confidence that the activities of the
hacker could be traced and limited.
From the audit and investigation perspective, preparation could include the
building of a forensic response toolkit. Such a toolkit would normally consist of a
hardware/software combination to promote the demonstrably uncorrupting nature
of the investigation. The hardware would usually be a high-end processor with a
large memory capacity and a large-capacity empty drive. A DVD-RW drive, a high-
capacity tape drive and a large number of cables for creating multiple connections
would be needed for the interchange of information. An uninterruptible power
supply would be necessary to prove that no corruption took place during the
investigation phase because of power outages. DVD/Rs and labels, together with
external hard disks and a high-capacity memory stick, would also prove essential.
In addition, the standard tools for forensic examination including folders and labels
for evidence; a digital camera so that evidence might be captured directly into
the system; lockable evidence storage containers; a printer and paper; and finally
burn bags to dispose of evidence securely when approval is given by legal counsel,
would all be required.
On the software side, response software would include two or three native
operating systems (W98/WNT/LINUX); forensic duplication tools such as EnCase,
Imagecast or Expert Witness; all the drivers for all your hardware on all platforms;
a file viewer such as Quickview Plus or Handy Vue, capable of handling a variety of
file structures and formats; as well as disk-write blocking routines.
With this toolkit, an auditor should be able to conduct forensically acceptable
examinations.
An incident response team should be established to respond to all security inci
dents and conduct a complete, unbiased investigation. The team must confirm or dis
pel an incident quickly and assess the damage and scope. A 24/7 hot-line should be
established to allow the team early notification so that they can control and contain
the incident. The team’s job is to collect and document all evidence while maintain
ing a chain of custody, to protect privacy rights and to provide expert testimony.
63. S
ince hackers are apparently always male, the use of ‘him’ and not ‘him/her’ seems
justified here.
352
Detection of Incidents
Incidents may be detected via intrusion detection systems, firewalls, suspicious
account activity, malfunctioning services or even defaced websites. In all cases, it is
essential that the discoverer note the critical details, such as:
➤ the current date and time;
➤ who/what is reporting;
➤ the nature of the incident;
➤ when the incident occurred;
➤ the hardware and software affected; and
➤ contacts for involved personnel.
Initial Response
The initial response should be directed towards finding out what probably happened
and what the best response strategy is. At all times, an investigator must be mindful
of the legalities and must ensure that all searches are carried out within the letter
of the law.
This will typically involve an examination of network topologies and verifying
policies, and investigating the incident by conducting personnel interviews, systems
administrators interviews, management interviews and interviews of the end-user.
Only then should hands-on action be taken.
All actions taken must follow the fundamental rules, everything the investigator
does must be documented, and every care should be taken to ensure that the evi
dence itself is not compromised during the investigation.
Acquiring the evidence will first involve securing the physical area. Before any
thing is disturbed, photographic evidence should be gathered of the system itself,
the monitor and all cable interfaces. Photographs should also be taken of the sur
rounding area and all papers and disks should be inventoried and collected.
The IT system should then be shut down by unplugging it directly from the power
supply. Under no circumstances should the keyboard be touched or the power
switch used to power down the machine. Shutting down the machine in the normal
way may activate software traps to encrypt or delete sensitive data. At a minimum
it will alter the data held in virtual memory.
Before the computer itself is moved, it should be sealed and all cables and con
nectors clearly labeled. Once the computer is in the place where it is to be exam
ined, the computer case may be opened and, once again, photographs should be
taken of the inside before anything is touched. Disconnecting the power leads prior
to starting the system should isolate all hard drives.
The system can then be started so that the date and time may be collected from
the setup menu. This will be used in later examination to compare to date and time
stamps and other evidence. At this stage it is also recommended that the BIOS be
changed to ensure that the system boots only from a floppy drive.
The machine should then be switched off once more. An unused hard drive will be
connected to the system to be the target drive for the forensic back-up. This drive
should become drive 0, with the original drive classed as drive 1. This prevents the
system from attempting to boot from the original drive. A bootable diskette contain
ing the forensic copying software should be placed in the diskette drive and the
system restarted.
353
The forensic copy of the hard disk should then be made. All drives should then be
removed from the system, placed in anti-static banks and sealed. The sealed disks
should be dated and signed and placed in a secure environment.
Forensic Back-ups
Forensic examinations should never be performed on the original medium. An exact
clone of the medium should be made and the original evidence must then be stored
securely. Care must be taken to ensure that the cloned medium is in fact a complete
copy of the original evidence. Most back-up software available on the market today
does not copy information in a way that would be acceptable for further investiga
tion. In the normal course of events, data that has been deleted still remains on the
magnetic medium until it is overwritten. This data can be a rich source of forensic
evidence. Most copying, cloning and back-up software will copy only current files
from the medium. To be acceptable, the copy must be made bit by bit and sector
by sector. Only in this way can the investigator assert that the working copy was a
true reflection of the original evidence.
In addition, encryption technology should be used so that the investigator in court
can state that the working copy could not be adulterated in an undetectable manner
or even read by an individual without personal supervision by the investigator.
When the copy is made, the medium used for copying to should be forensically
sterile. Preferably, the target medium should be brand new and unused, or alterna
tively scrubbed clean to internationally acceptable standards prior to use. The
forensic investigator must understand that the examination must be carried out in
a way that ensures that the evidence remains unmodified. Even looking at a file on
computer modifies its file attributes. Where such modifications are not preventable,
the maintenance of an investigation log detailing all accesses becomes critical.
As with any forensic examination, the chain of custody of evidence must be main
tained at all times.
Common mistakes at this stage include the failure to maintain proper documen
tation throughout the investigation process. Failure to notify decision makers within
the organization may jeopardize the legality of any evidence gathered. If digital evi
dence is not properly controlled and secured, its forensic acceptability may also be
challenged.
Failure to report the incident in a timely manner may lead to problems with
authorities, as such reporting is a matter of law. Such failure may confuse the issue
and allow the perpetrators of the wrongdoing enough time to defeat the ends of the
investigation.
One of the most common mistakes involves simply underestimating the scope of
the incident. If too narrow a focus is applied, some evidence may be omitted or even
destroyed during the course of the investigation.
At the technical level, altering date and time stamps on evidence systems before
recording them can occur, inadvertently destroying the forensic nature of the evi
dence. Failure to record the commands used or the use of untrustworthy commands
and tools can also raise questions about the validity of any evidence gathered. Even
the very act of installing the tools, if done wrongly, can overwrite significant evidence
and cast doubt on the remaining evidence.
354
Investigation
Once a working copy of the data is available, the investigator must decide what evi
dence is to be sought. Depending on the nature of the investigation, files accessed,
e-mails sent and received, Internet sites visited, programs executed and graphic files
accessed may all be of interest to the investigator.
In its simplest form, an investigator seeking evidence of the presence on the
computer of illicit or illegal files or software may simply have to do a search for a
specific file name or file type. Even this may be complicated if the files concerned
have been deleted, and the investigator may have to resurrect such deleted files
before examining them.
Where fraud has occurred, the files accessed, the date and time of access, the
network paths taken and the software executed can be critical. Most modern oper
ating systems have the capacity to record such accesses. Log files and registry
entries can contain such information as user names, passwords, recently accessed
files and network connections used. Unfortunately, having the capacity does not
necessarily mean that such records are created and retained. Once again, the inves
tigator will have to search for such files, possibly now deleted, before suspects can
be interrogated.
Network Monitoring
In the course of the investigation of an ongoing fraud, investigators may have to
monitor traffic flowing over the communication network. This will typically involve
using packet sniffers to monitor traffic flow. Such activity is, by nature, detective, and
is designed to confirm or dispel suspicions of fraud or irregular transactions. The
accumulated evidence may be used to verify the scope and extent of the system
compromise by identifying compromised systems, user accounts and passwords. It
may be possible to identify source addresses on the network, as well as to intercept
stolen files, pornography or downloaded hacker tools.
At its best, such monitoring can identify the parties involved, determine the time
lines of an event and possibly even assess the skill level or numbers of individuals
involved in the illicit activity.
In a covert investigation into activities on a specific machine, monitoring software
can be placed on the machine to record all e-mail sent and received, keystrokes,
images on screen, and mouse clicks when Internet and intranet sites are visited.
Such software would run in stealth mode and gather the information for later retriev-
al. The software can be used to send the information gathered automatically to the
investigator’s machine. In all cases, care should be taken to ensure that the evidence
gathered is stored in an acceptably secure manner both on the target’s machine and
while in transit to the investigator.
Investigators should be aware that many anti-virus and spyware detectors can
detect such monitoring and care should be taken to ensure the specific software
cannot be detected on the target’s computer.
Recovery
Recovery is the process of restoring the systems to their normal, secure status. The
nature of the recovery process will be dependent upon the nature of the specific
fraud and the recovery strategy selected by the organization. At the end of the
355
investigation the auditor should be aware of which parts of the system were com-
promised and what needs to be done to repair the damage. The recovery strategy
itself may involve the rebuilding of the system from backup or from original source
media.
In all cases, the system itself must be adequately secured prior to the introduc-
tion to the live environment. This may involve the acquisition or implementation of
additional security measures in order to prevent the fraud from recurring.
356
List of Appendices
https://na.theiia.org/standards-guidance/mandatory-guidance/Pages/Standards.aspx
They are free to IIA members and available to purchase for non-members.
1. Purpose
To assist the XXXXXXXXXXXX in fulfilling the oversight responsibilities for the financial
reporting process, the system of internal control over financial reporting, the audit
process, the organization’s process for monitoring compliance with laws and regula-
tions, and the code of conduct.
2. Mission
To provide professional advice to assist the Accounting Officer and Executive
Management to secure transparency; accountability; and sound management of
revenue, expenditure, assets and liabilities of the organization.
3. Composition
The Audit Committee will consist of at least three external and two internal mem-
bers, with alternatives where necessary.
The Executive Committee will appoint members and the Audit Committee will
elect its own Committee Chair.
4. Meetings
The committee will meet at least four times a year, with the authority to convene
additional meetings as circumstances require. The committee will invite members
of management, auditors or others to attend meetings and provide pertinent infor-
mation as necessary. It will hold private meetings with the Head of Internal Audit.
Meeting agendas will be prepared and provided in advance to members, along with
appropriate briefing materials. Minutes will be prepared.
5. Responsibilities
The committee will carry out the following responsibilities:
5.5 Compliance
➤ Review the effectiveness of the system for monitoring compliance with laws
and regulations and the results of management’s investigation and follow-up
(including disciplinary action) of any instances of non-compliance.
➤ Review the findings of any examinations by regulatory agencies, and any audi-
tor observations.
➤ Review the process for communicating the code of conduct to the organization’s
personnel, and for monitoring compliance therewith.
➤ Obtain regular updates from management and the organization’s legal counsel
regarding compliance matters.
6. Other Responsibilities
➤ Perform other activities related to this charter as requested by the
Management Board.
➤ Institute and oversee special investigations as needed.
➤ Review and assess the adequacy of the committee charter annually, requesting
board approval for proposed changes.
➤ Confirm annually that all responsibilities outlined in this charter have been car-
ried out.
➤ Evaluate the committee’s and individual members’ performance on a regular
basis.
_______________________________ __________
Chairperson: Audit Committee Date
______________________________ __________
CEO/CFO or Accounting Officer Date
361
The scope of work of the internal audit activity is to determine whether the organiza-
tion’s network of risk management, control and governance processes, as designed
and represented by management, is adequate and functioning in a manner that will
ensure the following:
➤ Risks are appropriately identified and managed.
➤ Interaction with the various governance groups occurs as needed.
➤ Significant financial, managerial and operating information is accurate, reliable
and timely.
➤ Employees’ actions are in compliance with policies, standards and procedures,
and applicable laws and regulations.
➤ Resources are acquired economically, used efficiently and adequately protect-
ed.
➤ Programs, plans and objectives are achieved.
➤ Quality and continuous improvement are fostered in the organization’s control
processes.
➤ Significant legislative or regulatory issues affecting the organization are recog-
nized and addressed properly.
2. Accountability
The Head of Internal Audit (HIA), in the discharge of his/her duties, shall be account-
able to management and the Audit Committee to:
➤ provide annually an assessment on the adequacy and effectiveness of the orga-
nization’s processes for controlling its activities and managing its risks in the
areas set forth under the mission and scope of work;
➤ report significant issues related to the processes for controlling the activities
of the organization and its affiliates, including potential improvements to those
processes, and provide information concerning such issues through resolution;
➤ provide information periodically on the status and results of the annual audit
plan and the sufficiency of department resources; and
➤ co-ordinate with and provide oversight of other control and monitoring func-
tions (risk management, compliance, security, legal, ethics, environmental and
external audit).
3. Independence
➤ To provide for the independence of the internal audit activity, its personnel
should report to the HIA, who reports functionally and administratively to the
xxxxxx and periodically to the Audit Committee in a manner outlined in the
above section on Accountability. It will include as part of its reports to the Audit
Committee a regular report on internal audit personnel.
4. Responsibility
The HIA and staff of the internal audit activity have responsibility to:
➤ develop a flexible annual audit plan using appropriate risk-based methodology,
including any risks or control concerns identified by management, and submit
that plan to the audit committee for review and approval;
➤ implement the annual audit plan, as approved, including, as appropriate, any
special tasks or projects requested by management and the Audit Committee;
➤ maintain a professional audit staff with sufficient knowledge, skills, experience
and professional certifications to meet the requirements of this charter;
➤ establish a quality assurance program by which the HIA assures the operations
of internal auditing activities;
➤ perform consulting services beyond internal auditing’s assurance services to
assist management in meeting its objectives. Examples may include facilitation,
process design, training and advisory services;
➤ evaluate and assess significant merging/consolidating functions and new or
changing services, processes, operations and control processes coincident with
their development, implementation and/or expansion;
➤ issue periodic reports to the Audit Committee and management summarizing
results of audit activities;
➤ keep the Audit Committee informed of emerging trends and successful prac-
tices in internal auditing;
➤ provide a list of significant measurement goals and results to the Audit
Committee;
➤ assist in the investigation of significant suspected fraudulent activities within the
organization and notify management and the Audit Committee of the results;
and
➤ consider the scope of work of the external auditors and regulators, as appropri-
ate, for the purpose of providing optimal audit coverage to the organization at a
reasonable overall cost.
5. Authority
The HIA and staff of the internal audit activity are authorized to:
➤ have unrestricted access to all functions, records, property and personnel; and
➤ have full and free access to the Audit Committee.
363
6. Audit Management
Audit management will:
➤ allocate resources, set frequencies, select subjects, determine scopes of work
and apply the techniques required to accomplish audit objectives; and
➤ obtain the necessary assistance of personnel in units of the organization where
they perform audits, as well as other specialized services from within or outside
the organization.
________________________________ __________________________
Head of Internal Audit Chief Executive Officer
________________________________
Audit Committee Chairperson
Dated ___________________________
364
Working Papers
2. Working Papers
Working papers should promote efficiency in the planning and performing of indi-
vidual assignments throughout the current audit, as well as for subsequent audits/
reviews. They serve as a reference guide for information, notations, quantitative
data, etc, and support all material contained in the report during, and subsequent
to, the completion of the audit.
Working papers evidence the scope and depth of coverage of the examination,
while supervisor and external auditors use working papers to help them assess and/
or review the adequacy and quality of the work performed.
Working papers provide evidence of the auditor's adherence to generally accepted
auditing and IIA standards by documenting the planning and supervising of the audit,
the procedures followed, the evidence obtained and the conclusions reached.
The findings, recommendations and statistics contained in the audit report must
be supported in the working papers. They must stand on their own to the extent that
a reviewer should be able to understand clearly the objective for each test, as well
as the conclusion reached without further explanation from the auditor.
There is no definitive guideline for the inclusion or exclusion of data; however, the
above list may aid in the decision-making process and in preparing your working
papers.
366
6.1 Selection
This section is used for documenting the audit selection planning. This is where the
results of any risk assessment are recorded. All of the planning efforts and docu-
ments should be recorded in this section.
367
368
6.13 Administrative/Correspondence
This section contains all minutes of meetings, together with administrative and/or
correspondence memos and documents. Specifically, it contains:
➤ the engagement memo; and
➤ the closing meeting memo/minutes.
The audit engagement memo should be addressed to the business manager that you
will be working with during the audit. This memo should be sent by the audit man-
ager in order to explain your plans and reasons for conducting the audit. It includes
the agreed scope and objectives of the audit, together with the timescales.
This section also includes minutes summarizing the closing meeting where the audit
report is discussed and the tickmark schedule.
369
1. Cross-referencing
Cross-referencing serves two useful purposes. Firstly, it promotes accuracy in the
preparation of working papers, because it means that a member of the audit team has
compared two findings and found them to be the same. Of more importance, however,
is the second purpose. Many of the elements of operational and financial information
that are considered during the audit are interrelated. Cross-referencing demonstrates
that the audit team understands and has considered such interrelationships.
2. Tickmarks
Tickmarks are numbers and letters that are marked on the schedules. These are
used:
➤ to reference a particular explanation to a specific item; and
➤ to reference a series of items to one explanation.
Tickmarks should always be letters or numbers and be written on the right of the
item.
A useful standard is to ensure that numbers are used for remarks, notes or where
no errors are detected. Lettered explanations are used when errors are detected
while performing the audit work or when the audit work cannot be completed as
planned.
The typical tickmarks (ie checkmarks, crosses) are not used, to allow for consis-
tency between manually prepared working papers and automated working papers
generated using MS Word. Each tickmark should have a clear and precise expla-
nation of what it represents. This explanation should include a verb describing
what was done, an object on which the work was done and, where appropriate, a
description of the results of the work.
Ticking an item means that the work indicated was completed. Thus an item on
a working paper should not be ticked until the work has been completed exactly as
indicated in the tickmark explanation.
Tickmark explanations should be placed on the schedule. When the same tick-
marks are used throughout a file, a standard tickmark sheet can be very helpful.
The standard tickmark sheet should be placed in the administrative/correspondence
section of the file and can be referred to whenever standard tickmarks are used on
a working paper.
Tickmark use can greatly reduce the need for lengthy explanations, thus saving
time in doing and reviewing the audit work.
3. Notes
Notes are commonly used to describe the purpose, source and scope of a test when
the reason for the test is not obvious and/or not described by the audit program.
They may also be used to describe work done relating to most of or all the items on
a schedule, as described in the audit program, or to describe work done on items
not appearing on a schedule but relating to that schedule.
Notes should be placed in a conspicuous location so that the reviewer will read
them when starting the review. As with all documentation, the information presented
in the notes should be complete yet concise. You should be careful not to put too
much or too little information in the notes. In the case of underdocumentation, you
would have to go back later and add information. This could lead to inefficiencies
or possibly a duplication of efforts. In the case of overdocumentation, time is spent
on unnecessary information. Thus, you should not include details that are irrelevant
or redundant.
371
372
Audit Staff
Department
Manager
Departmental Objectives
Audit Objectives
Report Recipients
File Contents
Audit Title Audit Reference
1. Selection
➤ Risk Factors
➤ Evaluation
➤ Audit Frequency
➤ Last Audited
➤ Audit Due
2. Client Background
➤ Business Objectives
➤ Control Objectives
➤ Principal Control Structures
➤ Overall Impression of Internal Control
➤ Management Structure and Contacts
➤ Major Sources of Evidence
3. Internal Control Descriptions
4. Audit Program
5. Results of Audit Tests
6. Audit Comment Worksheets
7. Report Planning Worksheets
8. Copy of Audit Report
9. Follow-up Program
10. Follow-up Report
11. Audit Evaluation
12. Ongoing Concerns
13. Administrative/Correspondence
Examples of working papers for each of the above file contents 1–13 follow on the
next pages.
374
1. Selection
Risk Factors _________________________________________________________
Evaluation ___________________________________________________________
Audit Frequency ______________________________________________________
Last Audited _________________________________________________________
Audit Due ____________________________________________________________
Notes ________________________________________________________________
2. Client Background
Business Objectives ___________________________________________________
375
Control Objective
Preventative Controls
Detective Controls
Corrective Controls
Directive Controls
376
4. Audit Program
Audit Objective
Control Tested
Source of Evidence
Testing Method
Audit Objective
Control Tested
Source of Evidence
Testing Method
Audit Objective
Control Tested
Source of Evidence
Testing Method
Audit Objective
Control Tested
Source of Evidence
Testing Method
Audit Objective
Control Tested
Source of Evidence
Testing Method
377
Same in Last Audit? Yes No
Directive or Procedure Involved
Tests Made:
Population Size Sample Size
Selection Method Percentage
Discrepancies
Causes
Corrective Action
1.
2.
3.
Comments by Auditees:
1.
2.
3.
378
6. Audit Comment Worksheets
Condition
Criteria
Cause
Effect
Recommendations
379
7. Report Planning Worksheets
Report Topic or Section
380
8. Copy of Audit Report
9. Follow-up Program
10. Follow-up Report
381
11. Audit Evaluation
What Went Wrong
What Can We Learn?
12. Ongoing Concerns
382
13. Administrative/Correspondence
383
Typical job descriptions are provided in this appendix for the seven positions
indicated below.
Job Descriptions: Position Title for ‘THE COMPANY’ Page No.
1. Audit Manager
384
2. Supervising Auditor
386
3. Senior Auditor
387
4. Financial Auditor and Operational Auditor 389
5. Auditor/Associate Auditor 390
6. Information Systems Audit Supervisor 391
7. Auditor Senior/Auditor Specialist 394
Position Summary
This position is responsible for identifying, planning, organizing, controlling and
directing audits necessary to assure management that organizational goals and
objectives are met efficiently and economically.
The principal job responsibilities of this position include the following require-
ments:
➤ the development of an annual and five-year audit plan and strategy to present
to the Audit Committee and the operating management of THE COMPANY for
their review and approval;
➤ the training of a proficient audit staff to meet the audit plan;
➤ financial audits to ensure that the THE COMPANY’s financial accounts are pre-
sented according to generally accepted accounting principles;
➤ managerial audits to ensure that the means used to accumulate financial/
operational data result in complete, accurate, timely, reliable and relevant
information;
➤ operational audits to ensure that control systems are in place to safeguard THE
COMPANY’s assets and that such assets are employed with optimal economy
and efficiency;
➤ compliance audits to ensure that functional activities are conducted according
to plans, policies, procedures, laws and regulations;
➤ investigation of misappropriation to determine wrongdoing, identify parties
involved, quantify loss, negotiate terms for restitution, and make recommenda-
tions for criminal or civil prosecution;
➤ evaluations of audits to make sure that audits are conducted according to
audit standards, that sufficient evidence is obtained, and that procedures are
properly documented to support audit findings;
➤ follow-up on audit findings to ensure adequacy and timeliness of corrective
action;
➤ proficiency in and knowledge of the profession, including auditing and account-
ing standards, and changes in financial reporting requirements and in laws and
regulations promulgated by government agencies;
➤ participation at professional seminars, classes and meetings;
➤ promotion of the profession by preparing articles and speeches, and partici-
pating in professional organizations;
➤ satisfactory interpersonal relationships with auditors and executive manage-
ment; and
➤ semi-annual reviews with executive management of audit results and corrective
action.
In addition to sound auditing and accounting knowledge and skills, the audit man-
ager must possess a broad business knowledge, experience, insight and maturity.
Knowledge of the requirements of the Statement of Audit Standards of the PAAB
and Financial Accounting Standards is essential, since the position is responsible for
directing all financial auditing for the internal audit department.
Audits of compliance and controls to monitor compliance with government regula-
tions require the audit manager to be familiar with THE COMPANY’s requirements
and regulations. This person must be broadly experienced in order to understand
the organization, its goals and the peculiarities of the business areas in which he/she
is functioning. The audit manager must be management- and systems-oriented and
have problem-solving and -finding abilities and possess knowledge of business and
functional procedures. Also, he/she must be capable of developing these traits in
the staff.
The audit manager must possess sound behavioral and motivational skills and
be able to supervise audits. This responsibility covers the entire audit cycle, from
385
definition of audit goals and objectives through the preliminary survey, execution,
documentation and reporting stages of the audit.
The ability to communicate orally and in writing is essential, because the audit
manager will frequently deal with all levels of corporate management.
The audit manager must hold at least an undergraduate degree. A graduate
degree, CIA or CA certification is an additional advantage. In addition, this position
requires at least six years of audit business experience and two years of supervisory
experience.
The position requires about 25 per cent travel time away from home.
Principal Accountabilities
The audit manager:
➤ ensures the effective accomplishment of annual and long-range audit strategy
for THE COMPANY’s audit staff functions;
➤ ensures the development of long- and short-range group audit plans;
➤ conducts acquisition reviews and special assignments timeously and reliably;
➤ conducts evaluations of audits and reviews of auditors to meet audit standards
and procedures;
➤ promotes the professional development of staff and him-/herself;
➤ ensures the professional proficiency of audit staff;
➤ ensures effective audit coverage of assigned locations outside South Africa;
and
➤ makes sure significant concerns are brought to the attention of the Audit
Committee and appropriate executive management.
Definition
Under general direction, this employee supervises and directs financial and opera-
tions audits conducted by the audit staff and reviews audits performed by contract
auditors.
Description of Tasks
➤ Schedules, assigns, supervises and directs audits; discusses audits and recom-
mendations with departmental officials; and clarifies internal audit's viewpoint.
➤ Prepares preliminary evaluations to determine the audit scope and the extent
that staff audits may encompass special problems.
➤ Reviews pertinent laws and ordinances; co-ordinates and confers with outside
auditors, the district attorney, the sheriff, and other agencies about investiga-
tive reviews; and conducts training in audit policies, methods and procedures.
386
Distinguishing Characteristics
The incumbent is responsible for the scheduling, timeliness, quality and quantity of
audits performed.
Employment Standards
The incumbent must be a graduate from an accredited college or university with
specialization in accounting.
Additional auditing or accounting experience above the minimal requirement
and supplemented by at least 12 units of accounting course work as per the NQF,
including intermediate accounting, may be substituted for university education on a
year-for-year basis. A passing score on an accounting proficiency test approved or
administered by the company may be substituted for accounting course work.
The incumbent must have three years of auditing or accounting experience,
including at least one year in a capacity comparable to a senior accountant. An
advanced degree in a related field may be substituted for one year's experience.
The incumbent must have knowledge of the principles, theories, techniques and
practices of accounting and auditing; basic trends and developments in the auditing
profession; generally accepted accounting principles and auditing standards; and IS
techniques, concepts and operating procedures.
The incumbent must be able to apply the principles, theories, techniques and
practices of professional auditing; apply knowledge of operations, procedures and
legislation applicable to activities under audit; gather, assemble, consolidate and
analyze facts and draw conclusions; solve complex problems; make oral and written
reports and presentations clearly, concisely and effectively; and anticipate the effect
of changes recommended.
Definition
Under direction, this employee conducts audits of fiscal and operational activities of
departments or other agencies. This person also audits new and revised accounting
and management systems as required.
Description of Tasks
Duties for financial auditors include the ability to resolve difficult technical prob-
lems; analyze, develop, co-ordinate and revise accounting systems and procedures;
improve internal controls; discuss accounting and management problems and other
387
significant points disclosed in audits with responsible officials; audit the receipts of
commercial firms having percentage contracts with the company; audit and analyze
the company's insurance coverage; prepare working papers, schedules and reports;
and perform special assignments as required.
Duties for operational auditors include the ability to analyze information systems
and procedures; analyze management controls; verify conformance with pertinent
laws and program achievements; prepare working papers, schedules and reports
for completed audits; discuss audit results with responsible officials; and perform
special assignments as required.
Distinguishing Characteristics
This position differs from that of the supervising auditor in that the latter is respon-
sible for supervising audits. It differs from assistant auditors (11) in that incumbents
perform the most complex audits requiring greater technical knowledge, have the
ability to resolve difficult problems (whether financial or operational in nature), and
possess a specified accounting education. They also generally have one or more
subordinate auditors assigned to work with them.
Employment Standards
Financial auditors must have a Bachelor's degree from an accredited university with
a major in accounting or its equivalent. Courses should include basic, intermediate
and advanced levels; cost accounting; and auditing.
Operational auditors must have a Bachelor's degree from an accredited university
with a major in administrative or quantitative fields or their equivalent, preferably
including at least two courses from among those listed for financial auditors, with
the balance from among management and analytical courses: computer science,
financial administration, organizational management, statistics and quantitative
methods.
These employees must complete accounting and auditing courses at a minimum
of one course per semester and two semesters per year after being hired.
Incumbents must have two years or more of experience in either auditing or
accounting. Experience in both financial and operational auditing is preferred.
The office of the audit manager will assess prior work experience.
These auditors should have knowledge of management control and general
accounting and auditing principles, methods and procedures and the ability to apply
these in performing audits. They should be able to:
➤ perform complex analytical-critical reviews of the company’s records;
➤ perform difficult analytical and critical examinations of auditee records and to
establish and maintain effective relations with fellow employees;
➤ earn and maintain the confidence of auditees while conducting financial or
operational audits and resolving difficult problems; and
➤ communicate effectively orally and in writing.
388
Definition
Under general supervision, these auditors conduct audits of departments' or other
agencies' fiscal or operational activities, assist in audits of new or revised accounting
or management systems, and perform work as required.
Description of Tasks
The financial auditor conducts financial audits of average difficulty and assists in
complex audits. Duties include the ability to analyze accounting systems and proce-
dures; analyze internal controls; review costs and financial data; verify conformance
with pertinent laws and ordinances; prepare audit reports, working papers and
audit schedules; discuss audit results with responsible officials; and perform special
assignments as required. He/she may also conduct operational audits.
The operational auditor conducts operational audits of average difficulty and
assists in complex audits. Duties include the ability to analyze information systems
and procedures; analyze management controls; verify conformance with pertinent
laws and ordinances; perform reviews for economy and efficiency of operations and
program achievement; prepare audit reports, working papers and audit schedules;
discuss audit results with responsible officials; and perform special assignments as
required.
Distinguishing Characteristics
This class differs from the senior auditor in that incumbents are not expected to
have experience in both financial and operational areas, are not required to have an
accounting education (when performing as an operational auditor), are not assigned
the responsibility that is characteristic of a senior auditor, and are supervised by the
latter. It differs from associate auditor in that incumbents exercise more indepen-
dent judgment and perform audits of average difficulty.
389
Other Criteria
Extensive (more than three years) related work experience may be substituted
for up to three semester (five quarter) hours of specified course work. The auditor
controller's office will assess the acceptability of work experience.
Major Responsibilities
The appointee will:
➤ perform financial and operational audits of regional offices to determine com-
pliance with THE COMPANY, government and contract requirements, and to
evaluate the effectiveness of internal controls;
➤ inspect, identify and document systems of internal financial and operational con-
trols through interviews, documents, questionnaires, manuals and publications;
➤ prepare flowcharts of systems and determine reliability and compliance by
testing key control points; and
➤ help prepare audit reports on findings; give opinions on whether financial
statements are prepared according to company, government and contract
requirements; and recommend improvements in systems of internal control.
Requirements
The appointee will have knowledge of:
➤ accounting, auditing techniques, taxation principles, concepts, techniques, ter-
minology and procedures used in THE COMPANY;
➤ sources of information to ascertain THE COMPANY’s policy and contractual
requirements; and
➤ IS methods, systems analysis and computer programming.
390
Distinguishing Characteristics
Auditor Associate
This entry-level classification is for employees who work on routine audits and assist
other auditors on audits of moderate difficulty or complexity. Work is done accord-
ing to audit plans and under close supervision.
Auditor
This classification is for employees with some auditing experience who work on
assignments of moderate difficulty and complexity. Work is performed under general
direction.
The descriptions given here are not exhaustive and do not explain all the duties and
responsibilities in detail.
Position Summary
This position is responsible for supervising and performing audits of Information
Systems (IS), operational and financial functions. It assists audit management in
cross-training, integrating and co-ordinating the functions of the audit department,
and monitoring and controlling the department's training program. It also assists the
IS audit manager in the management of the IS audit function.
Dimensions
It covers THE COMPANY's worldwide financial, operational and IS functions and
activities.
391
392
➤ sees that audits are conducted according to generally accepted auditing proce-
dures and departmental procedures;
➤ performs or participates in special reviews assigned by audit management and
is responsible for technical aspects of these reviews, including software support
as necessary;
➤ maintains proficiency and knowledge of the profession, including auditing and
accounting standards, laws, philosophies, IS hardware, software and technology
trends; attends professional seminars, classes and meetings; reads audit- and
IS-related literature; and promotes the profession through articles and speech-
es; and
➤ controls, monitors and administers the audit department's IS training program.
This includes maintaining staff skills, advising about course alternatives, moni-
toring class attendance and controlling related expenditures.
Principal Accountabilities
The appointee ensures:
➤ the timely and accurate completion of IS audits according to the annual audit
plan;
➤ the proper use of audit software to accomplish the objectives of financial/oper-
ational audits;
➤ the communication of significant audit concerns to audit management and to
the management of the area reviewed;
➤ quality training for auditors in subjects that are pertinent to their work; and
➤ the conduct of IS audits according to the Standards for the Professional
Practice of Internal Auditing.
393
Major Responsibilities
The appointee:
➤ performs financial and operational audits of groups, divisions, subsidiaries and
subcontractors to determine compliance with company, government and con-
tract requirements and to evaluate the effectiveness of internal controls;
➤ inspects, identifies and documents systems of financial and operational con-
trols through interviews, documents, questionnaires, manuals and publications;
➤ prepares flowcharts of systems and determines reliability and compliance by
testing key control points;
➤ performs substantive tests on financial and account balances to determine the
propriety of presentations;
➤ prepares audit reports on findings;
➤ issues opinions on whether financial statements are produced according to
company, government and contract requirements; and
➤ recommends improvements to systems of internal control.
Requirements
The appointee should have knowledge of:
➤ accounting, auditing and taxation concepts; and techniques, terminology and
procedures used in the company;
➤ cost-accounting principles and government cost-accounting regulations;
➤ flowcharting and key control point testing, and financial account balance test-
ing;
➤ sources of information to ascertain the company's policy and contract require-
ments; and
➤ IS methods, operations and systems analysis.
394
He/she will be accountable for determining the accuracy of account balances; evalu-
ating the effectiveness, compliance and integrity of internal control systems; recom-
mending improvements; and maintaining documentation.
Distinguishing Characteristics
Auditor Senior
This classification is for experienced auditors who regularly work on assignments
of moderate to high complexity or areas involving significant financial or technical
considerations. Work is performed under general direction. This person may give
technical assistance to less-experienced auditors.
Auditor Specialist
This classification is for experienced and qualified auditors who perform the full
spectrum of audit assignments effectively with minimal guidance. This person helps
develop audit plans and provides guidance and technical direction to other audi-
tors.
395
Date
To: Distribution List
From: Internal Audit Management
The audit will be conducted between <date> and <date> by a team consisting
of <auditors’ names>. The team will be headed by <lead auditor> who may be
contacted at <telephone number and e-mail address> should you require any
clarification.
The primary focus areas of the audit will be: <areas agreed>, although these may
be modified based upon findings as the audit progresses.
During the audit, as agreed, we will need access to the following staff, premises and
records: <list of agreed accesses>.
All findings will be discussed with operational management prior to the issuance of
our report. The anticipated date for discussion of our draft report is <due date>.
Should our findings result in any amendment to this date, we will inform you in
advance.
We agree that, from this audit, you are seeking the following benefits: <measure-
ment criteria>, and we will report on the achievement of these at the end of the
audit process.
Additionally we will require your feedback on the audit process using the form
attached.
________________________________
Head of Internal Audit Department
These audit programs are given as examples of typical audit programs. All audit
programs should be thoughtful, and tailored to meet the risk and control needs of
the users.
Computer Security
Access Paths
Passwords
398
399
Audit Report
Private and Confidential
Copy 1 of 5
I Executive Summary
This review was carried out at the request of the Internal Audit of Smith & Co. during
January 2005 with the following specific briefs:
➤ Examine the adequacy of back-up procedures at the disaster recovery site and
the adequacy of the site itself.
➤ Examine the adequacy of controls over access control and security procedures
in the Novell network.
➤ Examine the adequacy of Internet firewalls.
General Conclusion
Our review of Smith & Co. security reveals a comparatively well-controlled site with
the appropriate controls in place that are generally effective. Improvements need to
be made in the contingency planning area, and logical access control, particularly
within UNIX, could be strengthened. Nevertheless, the recommendations made
should be seen as improving on an already effective system of internal control
structures.
Recommendation
We recommend that formal procedures be documented as a matter of
standard procedure.
Management Comments
Accepted and in progress. Recovery documentation is lacking, with the disaster
recovery plan relying heavily on the expertise of staff who may not be available in
an emergency with inadequate documented procedures. For example, the executive
committee is held responsible for the execution of the plan, but contact numbers
are missing and formal recovery plans are absent. Testing of systems recovery has
been carried out, but full contingency testing of a total extended outage, which is
what the off-site facility is intended to cater for, is yet to come.
Recommendation
We recommend that serious consideration be given to the implementation of a cor-
porate, structured contingency plan, identifying IS as only one of the key resources
to be protected and to cater for a variety of disaster categories from total loss
through denial-of-service attack to software disasters that may not require the use
of the off-site facility. This would involve the assessment of the risk and nature of
probable disasters, together with the formulation of several response scenarios,
depending on the severity of the problem encountered.
Management Comments
A corporate, structured contingency plan is in an advanced stage of development
and will be presented to the Executive Committee for consideration and evaluation
when completed.
401
These controls are appropriate and in line with the best industry practice.
It was noted, however, that improvements can be made, as indicated below.
➤ Network access
New accounts are created from scratch every time instead of using standard tem-
plates. This is time-consuming and mistakes in access rights can creep in.
Recommendation
We recommend that, wherever practical, standard templates be used in assigning
access rights.
Management Comments
This is not practical, owing to limited new users and unique access required.
Audit Response
While we agree that there are limited numbers of new users, nevertheless Smith &
Co. currently has more profiles than users and our recommendation on standardiza-
tion remains.
➤ Logins
1. No scrutiny is done of invalid login attempts. Only back-up logs are scrutinized
in the system.
Recommendation
We recommend that all invalid access attempts be logged and the logs scrutinized
weekly in order to identify early any patterns of access break-in attempts.
Management Comments
A recording system for invalid login attempts is under investigation.
2. Access accounts for employees on planned leave are not disabled. This means
that an employee, while on leave, could enter the systems and process transactions,
or alternate users could use the access rights of the person on leave by impersonat-
ing that person. This should not be possible without management authority.
Recommendation
We recommend that, for planned leave, a procedure be introduced whereby user
management notifies MIS of impending leave so that access may be temporarily
suspended.
402
Management Comments
Accepted and implemented.
➤ Password access
1. A number of user accounts exist with no password required. This means that
these accounts can be used to access the system with no user authentication.
Recommendation
This is an obvious security risk and we recommend that these accounts are either
removed, if not in use, or require a password immediately.
Management Comments
Accepted and rectified.
2. No expiry date exists for passwords. If passwords do not expire, they will not be
changed. At present, four users have the same password as their user ID.
Recommendation
We recommend that all passwords be subject to password expiry.
Management Comments
Agreed, will implement.
403
406
407
408
409
410
411
412
413
414
opportunity costs 49–50, review 6–7, 160, 162 preparation of audit 163–
233 standards 16, 40 164
optical disks 245 performance audits 152 prestige goods 106
organizational performing stage of groups preventative controls 173,
behavior 115–120 117 250
changes 264 peripheral devices 244 prevention
culture 111–112 permanent IT system 260 costs 235
performance 39–40 personal computers (PCs) fraud 333–334
structure 68 244 Prevention of Corruption
Ouchi, W. (1943– ) 125 personal identity numbers Act 28
output (PINs) 280 prevention of fraud 332–
computers 246 personnel controls 257–258 335
frauds 349–350 persuasion 144 price
stage 251, 262 PERT 200–201 differentiation 102–103
outsourcing 218, 233, Peters, Tom (1944– ) 126 discounting 106
315–316 PGP 304 elasticity of demand 101
overreliance on controls physical equilibrium 29
193 evidence 80 maximum 29
Owen, Robert (1771–1858) security controls 249 minimum 29
122 PINs 280 pricing 234
owners plan privacy 279–284, 297, 309
distribution to 221 disaster recovery 287– private
investment by 221 289 companies 38
ownership risk 49 project 180 key 309
planning law 326
P engagement 175–182 proactive
packet analysis 306–307 implementation 266–267 auditing 153
packet-sniffing methodology internal auditing 157–159, role 216
306–307 163–166 probability proportional to
paper 247 IT systems 266–267 size (PPS) 197
paper tape 246 process 176–178 problem-solving 127
paralinguistics 94 project 179, 313–314 process
parallel simulation 278 sampling 194 costing systems 231
parameters 247 strategic 39–40 IT control objectives 262
partnerships 37 plants risks 49–50
password capture 284 retention vs replacement structure of audit 163–
passwords 280–281, 284 233 166
payroll playback of recording 283 processing
auditing 136–137, policies frauds 349–350
155–156 follow-up 188–189 stage 251
fraud schemes 330, 333 polygraph testing 341–342 procurement audits 156
PCs 244 poor social skills 332 production
Pension Funds Act 215 population auditing 136
perceptions 91 characteristics 194 costing of 232
performance size 195 outsourcing 233
areas (KPAs) 6–7, 161 position defense 105 rearranging lines 233
balanced scorecard positively skewed 195 value chain for business
41–44 post-event audit trail 228
defining measurements analysis 306 productivity loss 50
171 post-project audit 314 product(s)
evaluation 6–7, 160, 162, potential for conflict 119 by 232
169–174 power of negotiating parties differentiation 102–104
indicators (KPIs) 161 143–144 joint 232
management 132 PPS 197 life-cycle approach 109
measurement 41–45, predictive value 220 mix 233
171–172 pre-emptive defense 105 pricing 234
objectives 6–7, 40, 46, pre-incident preparations proliferation 106
160–161 351–352 professionalism 8, 33–34
organizational 39–40 preliminary survey 164
415
416
417
418
419