
 
perform the roles and responsibilities required from 
IS auditors it is essential for these individuals to 
possess some skills and knowledge from both the IT 
and auditing professions.  
In the past research focused on how IT changes 
the role of IS auditors, the available tools for IS 
auditors, the scope of IS auditing, the importance of 
training, IT governance, IT security, General 
Computer Audits, Application Control Audits, 
Computer Aided Audit Techniques (CAATs) and 
the inclusion of audit software in the curricula for 
undergraduate and postgraduate students.  IS 
auditing is a relatively new field and a limited 
number of studies are available on the IS auditor’s 
profile.  
The purpose of this paper is to reflect on an 
investigation done into the components of the IS 
auditor’s profile, including the level of IT 
knowledge, audit knowledge, the soft skills required 
from IS auditors and the IS audit tools and 
techniques used to assist the IS auditor in executing 
an IS audit assignment.   
In section 2 we give a short overview on 
supporting theoretical work within IT and auditing.  
In section 3 a short description is given on the 
research approach used for data gathering. Section 4 
reflects on the data gathered.  Section 5 follows with 
a description of the IS auditor’s profile and section 6 
reports on the possible use of the profile. 
2 BACKGROUND  
Information Technology (IT) is defined by Whitten, 
Bentley and Dittman (2001:8) as “… the 
combination of computer technology (hardware and 
software) with telecommunication technology (data, 
image, and voice networks)”.  Information Systems 
(IS) are defined as “ …an arrangement of people, 
data, processes, information presentation, and 
information technology that interact to support and 
improve day-to-day operations in a business as well 
as to support the problem-solving and decision-
making needs of managers and users” (Whitten et 
al., 2001:8).    
Traditional auditing mainly focused on the 
testing of IT processes and controls mitigating 
identified business risks as well as the testing of 
controls related to the fair representation of the 
financial statements.  Traditional auditing objectives 
are therefore influenced by the impact of IT / IS, 
where manual inputs and outputs are no longer 
processed and more risks are threatening the security 
of businesses, their financial statements and 
fraudulent activities.  Therefore, the two professions 
of IT and auditing need to be integrated to execute 
an effective IS audit.   
Weber (1999:10) defines IS auditing as: “the 
process of collecting and evaluating evidence to 
determine whether a computer system safeguards 
assets, maintains data integrity, and allows 
organisational goals to be achieved effectively and 
user resources efficiently”.  Hinson (2004:5) 
expands on this by stating that computer (IS) 
auditing is all about, “… a branch of general 
auditing concerned with governance (control) of 
information and communication technologies 
(computers). Computer auditors primarily study 
computer systems and networks from the point of 
view of examining the effectiveness of their 
technical and procedural controls to minimize risks”.  
According to Hall and Singleton (2005:3) an IS 
audit is associated with “auditors who use technical 
skills and knowledge to audit through the computer 
systems, or provide audit services where processes 
or data, or both, are embedded in technologies”.  
Lucy (1999:44) summarises the definitions 
effectively when he stated that “management utilises 
Information Systems auditing as a tool for ensuring: 
1) the reliability and integrity of information; 2) 
compliances with IT policies and procedures; 3) the 
safeguarding of IT assets; 4) the economical and 
efficient use of IT resources; and 5) the 
accomplishment of established IT objectives and 
goals”.   
It can therefore be concluded that Information 
Systems Auditing is the examination of an 
Information System and surrounding procedures to 
express an opinion as to whether or not the data 
involved in processing, from the initiation of the 
transaction to its inclusion in the financial 
statements, is fairly represented at a specific date, to 
ensure completeness, accuracy, validity and 
timeliness of data and transactions and to scrutinise 
the controls implemented to mitigate identified risks 
as well as to provide assurance on the safeguarding 
of organisational assets and resources. 
The evolution in audit and Information Systems 
has forced auditors from auditing around the 
computer to auditing with and through the computer 
by incorporating the necessary knowledge and skills 
from IT specialists.  IS Auditors began to understand 
that Information Systems can be used to their 
advantage and used as a tool rather than be seen as 
an adversary.  Computer Systems reached the point 
where auditors were forced to use computers as the 
target of their audit, since all information was 
processed internally.   
AN INFORMATION SYSTEMS AUDITOR’S PROFILE
391