perform the roles and responsibilities required from
IS auditors it is essential for these individuals to
possess some skills and knowledge from both the IT
and auditing professions.
In the past research focused on how IT changes
the role of IS auditors, the available tools for IS
auditors, the scope of IS auditing, the importance of
training, IT governance, IT security, General
Computer Audits, Application Control Audits,
Computer Aided Audit Techniques (CAATs) and
the inclusion of audit software in the curricula for
undergraduate and postgraduate students. IS
auditing is a relatively new field and a limited
number of studies are available on the IS auditor’s
profile.
The purpose of this paper is to reflect on an
investigation done into the components of the IS
auditor’s profile, including the level of IT
knowledge, audit knowledge, the soft skills required
from IS auditors and the IS audit tools and
techniques used to assist the IS auditor in executing
an IS audit assignment.
In section 2 we give a short overview on
supporting theoretical work within IT and auditing.
In section 3 a short description is given on the
research approach used for data gathering. Section 4
reflects on the data gathered. Section 5 follows with
a description of the IS auditor’s profile and section 6
reports on the possible use of the profile.
2 BACKGROUND
Information Technology (IT) is defined by Whitten,
Bentley and Dittman (2001:8) as “… the
combination of computer technology (hardware and
software) with telecommunication technology (data,
image, and voice networks)”. Information Systems
(IS) are defined as “ …an arrangement of people,
data, processes, information presentation, and
information technology that interact to support and
improve day-to-day operations in a business as well
as to support the problem-solving and decision-
making needs of managers and users” (Whitten et
al., 2001:8).
Traditional auditing mainly focused on the
testing of IT processes and controls mitigating
identified business risks as well as the testing of
controls related to the fair representation of the
financial statements. Traditional auditing objectives
are therefore influenced by the impact of IT / IS,
where manual inputs and outputs are no longer
processed and more risks are threatening the security
of businesses, their financial statements and
fraudulent activities. Therefore, the two professions
of IT and auditing need to be integrated to execute
an effective IS audit.
Weber (1999:10) defines IS auditing as: “the
process of collecting and evaluating evidence to
determine whether a computer system safeguards
assets, maintains data integrity, and allows
organisational goals to be achieved effectively and
user resources efficiently”. Hinson (2004:5)
expands on this by stating that computer (IS)
auditing is all about, “… a branch of general
auditing concerned with governance (control) of
information and communication technologies
(computers). Computer auditors primarily study
computer systems and networks from the point of
view of examining the effectiveness of their
technical and procedural controls to minimize risks”.
According to Hall and Singleton (2005:3) an IS
audit is associated with “auditors who use technical
skills and knowledge to audit through the computer
systems, or provide audit services where processes
or data, or both, are embedded in technologies”.
Lucy (1999:44) summarises the definitions
effectively when he stated that “management utilises
Information Systems auditing as a tool for ensuring:
1) the reliability and integrity of information; 2)
compliances with IT policies and procedures; 3) the
safeguarding of IT assets; 4) the economical and
efficient use of IT resources; and 5) the
accomplishment of established IT objectives and
goals”.
It can therefore be concluded that Information
Systems Auditing is the examination of an
Information System and surrounding procedures to
express an opinion as to whether or not the data
involved in processing, from the initiation of the
transaction to its inclusion in the financial
statements, is fairly represented at a specific date, to
ensure completeness, accuracy, validity and
timeliness of data and transactions and to scrutinise
the controls implemented to mitigate identified risks
as well as to provide assurance on the safeguarding
of organisational assets and resources.
The evolution in audit and Information Systems
has forced auditors from auditing around the
computer to auditing with and through the computer
by incorporating the necessary knowledge and skills
from IT specialists. IS Auditors began to understand
that Information Systems can be used to their
advantage and used as a tool rather than be seen as
an adversary. Computer Systems reached the point
where auditors were forced to use computers as the
target of their audit, since all information was
processed internally.
AN INFORMATION SYSTEMS AUDITOR’S PROFILE
391