In other words, if the financial difficulties they encounter are the fault of the auditing firm, they will have protection from any legal ramifications they may have encountered from faulty accounting or auditing measures. Preventive measures are also part of the internal controls of the auditing firm itself, so that each person who works with that firm knows the measures that are to be taken to make sure auditing is performed correctly (Cascarino, 2012). The more preventive measures a company has, the more likely that company will be to have good, strong audits that work out acceptably for everyone involved. That may not always be the case, because having preventive measures does not mean that nothing can go wrong. Still, preventive measures typically cost less money and take less time than working to correct a problem after it has already occurred (Cascarino, 2012). Problems can quickly spread, becoming very expensive.
Risk has a strong relationship to the auditing process. There is always some risk in financial transactions, no matter how successful the business actually is or how much it has to offer. The business takes a risk in trusting the auditor, of course, but the auditor also takes a risk in trusting the business to provide it with the correct information on which the audit can be conducted (Cascarino, 2012). Some businesses will go out of their way to have books (or computer programs) that provide information that is not factual. By doing that, they assume that they can turn that information over to be audited and get through the audit without being detected. While companies may have gotten away with that in the past, and some may still be able to do so, most of the issues that could be covered up and hidden by companies can no longer be easily disguised. The auditing company takes on risk when it decides to audit a company and determine that the company has handled its financial transactional appropriately (Cascarino, 2012). Once the audit comes back "clean," the company is assumed to be safe and financially sound.
That is good news for the company, but it may be a problem for stakeholders if the company really is not as sound as was assumed. Those who invest their money into the company can lose out based on a bad audit (Cascarino, 2012). Overall, there are many good auditors available. There are also some that are less well-prepared and some that can be guided to take the direction the company they are auditing wants them to take. Enron was not the only scandal that showed accounting and auditing in a bad light, as there have been plenty of others where financial information that was assumed correct has changed and been a serious problem for the investors and stakeholders of the company who were not expecting any difficulties with the investment they had chosen. Investments are always risks, but poor auditing can provide more risk than would otherwise be expected.
There are advantages and disadvantages to audit planning. These audit plans are difficult or nearly impossible to accurately follow, however, because there are so many concerns that surround them. Depending on the database used, the information provided by the company, and the work done by the particular auditor, the plan may seem to differ greatly from another plan for another company (Cascarino, 2012). By planning an audit, it is easy to have a "blueprint" of sorts for the way it will be carried out (Cascarino, 2012). The work gets done faster and more easily and conveniently, because the auditor has a specific plan to follow (Cascarino, 2012). Any time a person has a good plan for the work he or she must do, it is possible for that person to move forward with courage and conviction, and to focus more directly on the task at hand (Cascarino, 2012). That is good news for the auditor, but it is also good news for the client who would like to see the audit completed as easily as possible in order to ensure that it does not take up too much time (Cascarino, 2012).
The reporting of the audit and the allocation of the work will be better with a plan (Cascarino, 2012). However, plans can be a detriment in some ways, because they provide too much structure and rigidity (Cascarino, 2012). If an auditor is not willing to have any flexibility, or if a company is too strict about the way their auditors process information, it...
Databases and Regulatory Compliance Challenges The advent of technology has increased the popularity of database usage in firms, yet the legislation regulating the field has yet to be finalized. The changing nature of the IT sector, coupled with the legislative traits, creates several situations in which the companies find it difficult to comply with the regulations. This paper recognizes some of those difficulties, and also proposes some solutions. Databases Regulatory challenges for databases No
Database Security The focus of this study is that of database security. Databases and database technology are such that play critical roles in the use of computers whether it be in business, electronic commerce, engineering, medicine, genetics, law, education or other such entities requiring the use of computer technology. A database is quite simply a collection of data that is related such as a database containing customer information, supplier information, employee
These factors further accelerate the value and TCO of databases over time. Describe the features, tools, and utilities of Structured Query Language (SQL). How can tasks be automated with SQL? SQL has specifically been designed with features, tools and utilities to enable programmers to support nth-tier data architectures in addition to legacy client-server computing scenarios. The development and continual improvement of the features, tools and utilities of SQL for automating tasks
Database Security Plan and Requirements Definition for a University Department The database security plan and requirements definition were developed. The plan included, at the outset, the inclusion of major stakeholder at the University and described their roles in initiating, implementing, and maintaining the plan. Individuals responsible for daily and other periodic tasks were developed. A major consideration in planning the security was the policy that governs granting of access. The need-to-know,
In addition to these two Director-level positions, the roles of the users of the databases and data mining applications also need to be taken into account. The sales, marketing, product management, product marketing, and services departments all need to have access to the databases and data mining applications. In addition, branch offices that access the company's applications over the shared T1 line will also need to have specific security
Design criteria exist at the levels of the technical, system integration aspects of the database to other systems through XML. This integration is critically important to ensure that the applications created can be effectively used over time and not have any scalability issues. There is also the need for designing the databases at the presentation layer to provide for scalability and flexibility of being able to create applications relatively quickly
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now