Abstract

There are some similarities between Financial Statement Audit (FSA) and Information Systems Audit (ISA). FSA is an examination of the reliability and integrity of financial statement records, whereas ISA is a review and evaluation of the controls, risks and system development within an information systems infrastructure to ensure that the safeguards protect against abuse, protect assets, maintain data integrity and operate effectively to achieve the organization's objectives. Decision makers need to ensure a reliable collection and evaluation of the evidence of an organization's information systems, practices and operations. Data manipulation can be caused by external or internal threat. Internal manipulation threat is the most dangerous because it is committed by authorized personnel, which makes it very difficult to detect. In particular, the framework introduces an anomaly detection technique, a data mining method, to determine if the suspected transactions arose from internal or external threats. Once the suspected transactions are identified, procedures and monitoring controls will be in place to minimize each threat. The proposed framework is expected to help university and ministry of higher education managers at all levels to make vital decisions based on reliable and accurate information.

Highlights

  • Most organizations and firms worldwide have replaced their manual systems with computerized ones in the form of information systems

  • The data stored in information systems in higher education institutions is of paramount importance for both the institutions as well as the body represented by the ministry of higher education

  • Prior research in Continuous Auditing (CA) and Continuous Monitoring (CM) of data demonstrates the existence of a solid connection between contemporary auditing practices and Information Systems Audit (ISA)

Read more

Summary

Introduction

Most organizations and firms worldwide have replaced their manual systems with computerized ones in the form of information systems. These changes require close monitoring and auditing of the data generated by such systems. Higher education institutions such as universities and colleges are facing numerous challenges; for example, their information systems transactions have grown in volume and complexity. These institutions exist in a highly regulated environment. The data stored in information systems in higher education institutions is of paramount importance for both the institutions as well as the body represented by the ministry of higher education. Higher education institutions have to ensure the integrity of the data, which means the data must not be tampered with by external nor internal sources

Objectives
Methods
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call