Professional Documents
Culture Documents
Course Syllabus Cis 2020-2021
Course Syllabus Cis 2020-2021
Course Syllabus Cis 2020-2021
DEPARTMENT of ACCOUNTANCY
This course comprehensively explains the theory and procedures behind and involving the audit of business entities that uses computer systems in processing their data or information. This
course also provides a background on how information is processed under a computerised system as comapred to a manual system. It also discusses the detailed processes of how an auditor may
conduct his/her audit under such environment. As an academic tool, this course will use the Audit Command Language Software or other Audit Software that will serve as a hands-on device for
students.
Course Plan
Page 2 of 14
After thorough discussion of
the topics, at the end of the
lecture the learner will be
able to:
● Understand the primary
objective of auditing.
● Know the difference
between attest services
and advisory services
and be able to explain its
2 relationship.
● Grasp the conceptual ● Lecture and discussion of the topic. Quiz 1 on the previous and current
Auditing, Assurance, and Internal Control elements of the ● PPT presentation for the assigned reporters. Information Technology topic.
systematic process of ● Giving an illustration and example. Auditing and Assurance
auditing.
● Understand internal
control presented in the
COSO framework.
● Comprehend the
ralationship between
general controls,
application controls, and
financial data integrity.
● Understand the technical
or role of an Audit
Committee.
Page 3 of 14
ensure the security of
an organization’s
computer facilities.
● Grasp the different
benefits, risks, and
audit issues related to
IT oursourcing.
● Understand the
elements of a disaster
recovery plan.
After thorough discussion of
the topics, at the end of the
lecture the learner will be
able to:
● Identify the principal
threats to the operating
system and the control
techniques used to
minimize the possibility
of actual exposures.
4-5 ● Familiarize with the
principal risk associated
with commerce
conducted over intranets ● Lecture/discussion Information Technology
Security Part I: Auditing Operating Systems and Networks and the internet. Quiz 3 on the topic.
● PPT presentation for the assigned reporters. Auditing and Assurance
● Understand the
management techniques
used to reduce the risks
from e-commerce and
from personal computing
systems.
● Recognize the unique
exposure that arise in
connection with
electronic data
interchange (EDI) and
understand how to
reduce the risk
associated with this
exposure.
After thorough discussion of
the topics, at the end of the
Information Technology Quiz 4 on the topic.
Security Part II: Auditing Database Systems lecture the learner will be ● Lecture/discussion on the topic Auditing and Assurance
able to: ● PPT presentation for the assigned reporters.
Page 4 of 14
● Understand the
operational problems
inherent in the flat-file
approach to data
management that give
6–7 rise to the database
management approach.
● Understand the
relationships among the
fundamental
componenets of the
database concept.
● Recognize the defining
characteristics of three
database models:
hierarchical, network and
relational.
● Understand the
operational features and
associated risks of
deploying centralized,
partitioned, and
replicated database
models in the distributed
data processing (DDP)
environment.
● Grasp audit objectives
and its procedures used
to test data management
controls.
Page 5 of 14
8 ● Understand the
importance of strategic
system planning.
● Grasp in general how
accountants participate
in the SDLC.
● Identify the basic
features of both the
structured and
object-oriented
approaches to systems
design.
● Explain the major steps
involved in a
cost-benefit analysis or
proposed inforation
systems.
● Understand fully the
advantages and
disadvantages of the
commercial software
option, and be able to
discuss the
decision-making process
used to select
commercial software.
● Exemplify the main
purpose of a system
walkthrough.
● Familiarize with the
different types of system
documentation and the
purpose they serve.
After thorough discussion of
the topics, at the end of the
lecture the learner will be
able to:
● Grasp the main
objectives of the three
transaction cycles and
the types of transactions
processed by each of ● Lecture/discussion on the topic Information Technology Quiz 6 on the topic.
them. ● PPT presentation for the assigned reporters.
Auditing and Assurance
Understand the
relationship between
Page 6 of 14
Transaction Processing and Financial Reporting Systems traditional accounting
9 Overview records and their digital
equivalents in
computer-based systems.
● Familiarize with the
documentation
techniques used to
represent the manual and
computer-based systems.
● Understand the
technologies used to
automate and reengineer
accounting information.
● Grasp the operational
features of the general
ledger system (GLS) and
the financial reporting
system (FRS).
MIDTERM DEPARTMENTAL EXAMINATION
After thorough discussion of
the topics, at the end of the
lecture the learner will be
able to:
● Grasp the ways to define
system requirements.
● Familiarize with the
10 classes of transaction
input controls used by
accounting application.
Computer-Assisted Audit Tools and Techniques (CAATTs) ● Understand the ● Lecture/discussion on the topic Information Technology
objectives and ● PPT presentation for the assigned reporters. Quiz 7 on the topic.
Auditing and Assurance
techniques used to ● Recitation
implement the
processing controls,
including run-to-run,
operator intervention,
and audit trail controls.
● Exemplify on how to use
and test application
controls.
● Discuss the methods
used to establish
effective output controls
Page 7 of 14
for both batch and
real-time systems.
Compare the difference
between black and white
box auditing.
● Grasp the key features of
CATT’s discussed in the
chapter.
● Understand and use
CAATTs for testing
controls.
After thorough discussion of
the topics, at the end of the
lecture the learner will be
able to:
● Grasp the procedures for
the data extraction and
analysis.
● Understand the
components of data
structures and how these
are used to achieve
data-processing
11 operations.
● Familiarize with the
structures used in ● Lecture/discussion on the topic
flat-file systems, Information Technology
Data Structures and CAATTs for Data Extraction ● PPT presentation for the assigned reporters. Quiz 8 on the topic.
including sequential, Auditing and Assurance
● Recitation
indexes, hashing, and
pointer structures.
● Familiarize with
relational database
structures and the
principles of
normalization.
● Enumerate and explain
the different features,
advantages, and
disadvantages of the
embeeded audit module
approach to data
extraction.
● Identify and know the
capabilities and primary
Page 8 of 14
features of generalized
audit software.
● Familiarize in using
Audit Command
Language (ACL).
After thorough discussion of
the topics, at the end of the
lecture the learner will be
able to:
● Understand the
operational tasks
associated with the
revenue cycle under
different
levels of technology.
● Grasp the objectives of
auditing those accounts
affecting revenue cycle.
● Familiarize with revenue
cycle control issues
related to alternative
technologies.
12 – 13 ● Recognize the
relationship between ● Lecture/discussion on the topic
revenue cycle audit ● PPT presentation for the assigned reporters.
Auditing the Revenue / Collection Cycle Information Technology Quiz 9 on the topic.
objectives, controls, and ● Recitation
test of controls. Auditing and Assurance
● Exemplify the nature of
substantive tests in
achieving revenue cycle
audit objectives.
● Familiarize with
common features and
functions of ACL that
are used to perform
substantive tests under
this cycle.
After thorough discussion of
the topics, at the end of the ● Lecture/discussion on the topic
lecture the learner will be ● PPT presentation for the assigned reporters. Information Technology
Auditing the Expenditure / Disbursement Cycle Quiz 10 on the topic.
able to: ● Recitation Auditing and Assurance
● Understand the
operational and primary
tasks associated with the
Page 9 of 14
expenditure cycle under
different levels of
technology.
● Grasp the objectives of
14 - 15 auditing those accounts
affecting expenditure
cycle.
● Familiarize with
expenditure cycle control
issues related to
alternative technologies.
● Recognize the
relationship between
expenditure cycle audit
objectives, controls, and
test of controls.
● Exemplify the nature of
substantive tests in
achieving expenditure
cycle audit objectives.
● Familiarize with
common features and
functions of ACL that
are used to perform
substantive tests under
this cycle.
After thorough discussion of
the topics, at the end of the
lecture the learner will be
able to:
● Understand the
operational and primary
tasks associated with the
different cycles under ● Lecture/discussion on the topic
Auditing the Payroll, Conversion and Production, Investing under this topic. Information Technology
● PPT presentation for the assigned reporters. Quiz 11 on the topic.
and Financing Cycle ● Grasp the objectives of Auditing and Assurance
● Recitation
16 auditing those accounts
affecting this different
cycles.
● Familiarize with these
fdiffrent cycles control
issues related to
alternative technologies.
● Recognize the
relationship between
Page 10 of 14
these cycles to audit
objectives, controls, and
test of controls.
● Exemplify the nature of
substantive tests in
achieving these cycles
audit objectives.
● Familiarize with
common features and
functions of ACL that
are used to perform
substantive tests under
these cycles.
After thorough discussion of
the topics, at the end of the
lecture the learner will be
able to:
● Grasp the general
functionality and key
elements of enterprise
resource planning system
17 (ERP).
● Understand how to
configure an ERP system
including servers,
databases, the use of
bolt-on software and the ● Lecture/discussion on the topic Information Technology
Enterprise Resource Planning System (ERP) risk associated with it. ● PPT presentation for the assigned reporters. Quiz 12 on the topic.
Auditing and Assurance
● Recognize the purpose ● Recitation
of data warehousing as a
strategic tool and
recognize the issues
related to the design,
maintenance, and
operation of a data
warehouse.
● Exemplify the key
considerations related to
implementing ERP.
● Recognize the internal
control and audit of
implications of an ERP
system.
Page 11 of 14
After thorough discussion of
the topics, at the end of the
lecture the learner will be
able to:
● Understand the broad
issues in regards to
business ethics and
what constitutes Information Technology
faudulent behavior. Auditing and Assurance
● Discuss further the
fraud-motivating forces.
● Acquire skills and
18 exemplify the typical
fraud schemes
perpetrated by managers
and employees. ● Lecture/discussion on the topic
Business Ethics, Fraud, and Fraud Detection and Audit ● Familiarize with Quiz 13 on the topic.
Command Language (ACL) ● PPT presentation for the assigned reporters.
common anti-fraud ● Recitation
techniques used in both ● Giving an illustration and example.
manual computer-based
systems.
● Infer and know how to
use ACL in the detection Application of Computers in
Print-out of audit reports and
of fraud. Accounting Series: Auditing in a
● Recognise the Hands-on activities using ACL Software related outputs to substantiate
Computerized Information System
responsibility of the results of the findings.
Environment
auditor for detecting
fraud.
● Grasp the relationship
between business ethics
and fraud.
Reference Section QA 76.9 A93H34 2011, Hall, James A., Information Technology Auditing and Assurance, 2011
Reference Section HF 5630 W388 2012, Weirich, Thomas R., Accounting and Auditing Research & Database: Practitioner’s Desk Reference, 2012
Circulation Section HF 5679 S55 2013, Simkim, Mark G., Accounting Information Systems, 2013
ONLINE/URL: ils@pup.edu.ph
Page 12 of 14
Practice Set/Hands-on Module Application of Computers in Accounting Series:Auditing in a Computerized Information System Environment by Prof. Leandro Fua / Prof. Glenn Magadia
Classroom Policy
The allowed number of absences for students enrolled in ACCO 30083 with once-a-week meeting is four (4). Request for excused absences or waiver of absences must be presented upon reporting back to class. Special examinations will
be allowed only in special cases, such as prolonged illness. It is the responsibility of the student to monitor his/her own tardy incidents and absences that might accumulate leading to a grade of “FA,” (Failed due to Absences). It is also
his/her responsibility to consult with the teacher, chair or dean should his/her case be of special nature.
Consultation Time
Schedule of meeting with the teacher to discuss a particular problem with a student in order to provide advice.
Noted By:
LILIAN DE LA MERCED-LITONJUA, CPA, MBA, Dean (Original Signed)
Approved By:
DR. MANUEL M. MUHI, Vice-President for Academic Affairs (Original Signed)
Page 13 of 14
Student’s Copy
I have read the course syllabus and I understand that I have to comply with the requirements of the course and the expectations from me as a student of ACCO 30083 during the Second Semester of SY 2020-2021. I am
fully aware of the consequences of non-compliance with the above-mentioned requirements and expectations.
____________________________________
Date
---------------------------------------------------------------------------------------------------------------------------
Teacher’s Copy
I have read the course syllabus and I understand that I have to comply with the requirements of the course and the expectations from me as a student of ACCO 30083 during the Second Semester of SY 2020-2021. I am
fully aware of the consequences of non-compliance with the above-mentioned requirements and expectations.
______________________________
Date
Page 14 of 14