Academia.eduAcademia.edu

Information Systems Auditing

description17 papers
group436 followers
lightbulbAbout this topic
Information Systems Auditing is the process of evaluating and examining an organization's information systems, including their management, security, and controls, to ensure compliance with policies, regulations, and standards, while assessing the effectiveness and efficiency of these systems in supporting business objectives.
lightbulbAbout this topic
Information Systems Auditing is the process of evaluating and examining an organization's information systems, including their management, security, and controls, to ensure compliance with policies, regulations, and standards, while assessing the effectiveness and efficiency of these systems in supporting business objectives.

Key research themes

1. How can IT Governance audit methodologies enhance the effectiveness and risk management of organizational IT resources?

This research area focuses on developing audit methodologies specifically targeted at IT Governance to assess and improve the alignment of IT strategies with organizational objectives. Effective IT Governance audits help organizations identify and manage IT-related risks, ensure efficient resource utilization, and support compliance with regulatory frameworks. Given the increasing integration of IT into strategic processes and the complexity of IT risks, auditing IT Governance becomes critical for organizational success and sustainability.

Key finding: The paper proposes a risk-based IT Governance audit methodology that enables auditors to evaluate efficiency and effectiveness of IT Governance structures by focusing the audit mission on high-risk segments. It highlights... Read more
Key finding: This study presents a conceptual model-based framework to support managing and auditing information systems security aligned with ISO/IEC standards. It allows organizations to identify critical assets, vulnerabilities,... Read more
Key finding: This research demonstrates the importance of regular system and application auditing within the IT Governance context to identify vulnerabilities and weak security configurations. It emphasizes how digital auditing aids... Read more

2. What is the role and impact of emerging technologies like Artificial Intelligence and Computer Assisted Audit Techniques on auditing practices and audit effectiveness?

This theme investigates how technological innovations including AI, Machine Learning, and Computer Assisted Audit Techniques (CAATTs) transform traditional auditing by enhancing data analysis capabilities, increasing audit efficiency, and improving risk detection. Research explores factors affecting adoption, practical applications, benefits in continuous auditing processes, and challenges specific to integrating technology into audit methodologies. Understanding these technological contributions informs best practices for auditors and organizations to adapt to evolving audit environments.

Key finding: This systematic review identifies key factors influencing auditors’ adoption of CAATTs, such as time efficiency, work effectiveness, auditor confidence, and organizational support. It reveals that while CAATTs enhance... Read more
Key finding: The paper provides an extensive overview of AI applications in auditing, including anomaly detection, data pattern recognition, and risk assessment using machine learning and natural language processing. It identifies... Read more
Key finding: This case study illustrates how internal audit functions can lead continuous monitoring initiatives by implementing visual reporting tools that provide real-time data insights and reduce audit costs. It highlights a... Read more

3. How can audit report content and format be improved to better meet stakeholder decision-making needs and reduce the audit expectation gap?

This research examines the information communicated through audit reports, identifying gaps between stakeholder expectations and auditor responsibilities — the audit expectation gap. It focuses on how modifications to audit report format and content can enhance their decision usefulness, transparency, and credibility. The theme also considers technological supports to address the gap and stakeholders’ preferences, aiming to improve trust, communication, and audit quality perception.

Key finding: This survey-based study involving 103 auditors and 109 financial report users from Spain finds a strong consensus that audit reports have high decision-making value but could be improved by including additional information... Read more
Key finding: This literature review analyzes the nature and components of the audit expectation gap, characterizing it as the difference between what users expect and what auditors perceive as their duties, especially concerning... Read more
Key finding: Using quantitative analysis of 117 financial managers in Jordan, the study identifies that electronic auditing dimensions—relevance, competence, sufficiency, and especially timeliness—significantly enhance the credibility and... Read more

All papers in Information Systems Auditing

The inherent quality of business processes increasingly plays a significant role in the economic success of an organization. More and more business processes are supported through IT processes. In this contribution, we present a new... more
This paper reports on the potential of process mining as a basis for security audits of business process and corresponding business process management systems. In particular, it focuses on process discovery as a means to reconstruct... more
Information System/Information Technology (IS/IT) has important role to accelerate and enhance bureaucratic reform in government institutions. Ministry of Energy and Mineral Resources (MEMR) Republic of Indonesia requires IS/IT to improve... more
Information Technology (IT) has rounded into a technology which hardly assist even determine level of performance a company. For the agenda of increasing performance, Bina Sarana Informatika (BSI) has been supported by information... more
Application of Benford's Law in the field of financial analysis is very rarely covered. In this paper it is researched possibility of usage of this law in analysis of stock prices and stock turnover in Zagreb stock exchange. On the basis... more
Application of Benford’s Law in the field of financial analysis is very rarely covered. In this paper it is researched possibility of usage of this law in analysis of stock prices and stock turnover in Zagreb stock exchange. On the basis... more
Application of Benford's Law in the field of financial analysis is very rarely covered. In this paper it is researched possibility of usage of this law in analysis of stock prices and stock turnover in Zagreb stock exchange. On the basis... more
While there is increasing awareness of the Year 2000 computer date problem, most organizations have yet to take sufficient action to ensure that their systems are "millennium-proof." This lack of progress is particularly troubling given... more
Information systems auditing activities are mandatory in today business environments. There are numerous useful methods that can be conducted in such audits. One of contemporary methods is application of so-called Benford's Law. In... more
The paper aims to explore the usefulness of e-audit implementation in enhancing government auditor performance. It scrutinized in depth the auditor behavior change related the new audit technique based on information technology. The study... more
The paper aims to explore the usefulness of e-audit implementation in enhancing government auditor performance. It scrutinized in depth the auditor behavior change related the new audit technique based on information technology. The study... more
Management processes without responsive to abnormal activity that might occur can affect the performance of an organization. The Publishing Workflow Ontology (PWO) will be modified for detect abnormal activity, such as wrong pattern,... more
Information technology develops rapidly. It makes all the existing business processes in an organization cannot be separated from the use of computers. One of the existing business processes in an organization that use the benefits of IT... more
In the company environment, the management team is responsible for producing normative models. The normative model is considered a standard model that aims at auditing all business processes in the same context. In this regard, the audit... more
Nowadays, business IT alignment has become a priority in most large organization. It is a question of aligning the information system on the business strategies of the organization. This step is aimed at increasing the practical value of... more
The paper aims to explore the usefulness of e-audit implementation in enhancing government auditor performance. It scrutinized in depth the auditor behavior change related the new audit technique based on information technology. The study... more
Information System/Information Technology (IS/IT) has important role to accelerate and enhance bureaucratic reform in government institutions. Ministry of Energy and Mineral Resources (MEMR) Republic of Indonesia requires IS/IT to improve... more
To master ongoing market competitiveness, manufacturing companies try to increase process efficiency through process improvements. Mapping the endto-end order processing is particularly important, as one needs to consider all... more
Management processes without responsive to abnormal activity that might occur can affect the performance of an organization. The Publishing Workflow Ontology (PWO) will be modified for detect abnormal activity, such as wrong pattern,... more
A learning management system is a system that supports the management of teaching and learning activities in an educational institution. Telkom University has its own learning management system called CeLOE which was developed based on... more
ISACA’s COBIT is widely used to assess the maturity of process capability in many enterprises. It’s last version is COBIT 5, which proposes a process assessment as a part of a process improvement initiative or as part of a capability... more
This report documents the program and the outcomes of Dagstuhl Seminar 13481 "Unleashing Operational Process Mining". Process mining is a young research discipline connecting computational intelligence and data mining on the one... more
This report documents the program and the outcomes of Dagstuhl Seminar 13481 “Unleashing Operational Process Mining”. Process mining is a young research discipline connecting computational intelligence and data mining on the one hand and... more
This report documents the program and the outcomes of Dagstuhl Seminar 13481 "Unleashing Operational Process Mining". Process mining is a young research discipline connecting computational intelligence and data mining on the one hand and... more
Information systems auditing activities are mandatory in today business environments. There are numerous useful methods that can be conducted in such audits. One of contemporary methods is application of so-called Benford's Law. In... more
Law enforcement agencies being the primary security organs in a country are highly prone to information and network attacks due to the sensitivity nature of the information they deal with in their day to day operations. Information... more
Law enforcement agencies being the primary security organs in a country are highly prone to information and network attacks due to the sensitivity nature of the information they deal with in their day to day operations. Information... more
Law enforcement agencies being the primary security organs in a country are highly prone to information and network attacks due to the sensitivity nature of the information they deal with in their day to day operations. Information... more
Production planning and scheduling decisions are based on underlying models and their parameters which are typically considered granted, accurate and up-to-date. However, changes and uncertainties may force the production to change, shift... more
Nowadays, hotel industry become a business that very interested for many people that can manage the hotel asset very well, in order to giving faster and satisfy services. Every process in Mahkota hotel still manage manually, and this... more
Seiring dengan perkembangan zaman, penggunaan sistem informasi sangat diperlukan untuk menunjang dan meningkatkan kegiatan bisnis dalam suatu perusahaan. Untuk itu diperlukan suatu sistem informasi yang berkualitas bagi sebuah... more
Today, unauthorized access to data, propagation and modification of data bring many problems.
 ISO/IEC 15504-4 identifies process assessment as an activity that can be performed either as part of a process improvement initiative or as part of a capability determination approach.  The purpose of process improvement is to... more
Life can be made better and easier with the growing information and communication technology. Efficient Software and Hardware together play a vital role giving relevant information which helps improving ways we do business, learn,... more
ISACA’s COBIT is widely used to assess the maturity of process capability in many enterprises. It’s last version is COBIT 5, which proposes a process assessment as a part of a process improvement initiative or as part of a capability... more
The specialized nature of Information Systems auditing and the professional skills and credibility necessary to perform such audits, require standards that would apply specifically to IS auditing. Standards, procedures and guidelines have... more
Mathra Tool, Inc. (MTI) is a small business manufacturing case. It can be used by undergraduate or graduate students studying management controls and auditing in a computerized setting. Students integrate accounting, auditing, and... more
The process of student registration in IT Telkom needs to be evaluated to enable the continual improvements. For this purpose, the process mining was used to obtain a real overview of the actual process happening on student's... more
Download research papers for free!