«Item type text; Dissertation-Reproduction (electronic) Authors DUNN, THURMAN STANLEY. Publisher The University of Arizona. Rights Copyright © is ...»
Summary Generalized audit packages such as those discussed above are typically oriented to assisting the internal or external auditor in forming conclusions regarding the acuracy and integrity of systems and their data. The audit traditionally has taken place after the fact, usually including processing for a given period or as of a certain date. This approach assumes, to a large extent, that certain internal controls and audit trails exist. Given that the necessary audit trails do exist, enabling the auditor to track transactions or activities all the way through the system, a fairly precise analysis can be performed.
However, as indicated in Appendix A, many systems today with real-time,
Appendix A will be necessary to evaluate systems with inadequate or suspicious audit trails.
REFERENCESAckoff, R.L., and Sasieni, M.W. Fundamentals of Operations Research.
New York: John Wiley &Sons, Inc., 1968.
Adams, Donald L., and Mullarkey, John F. "A Survey of Audit Software. II Journal of Accountancy, (September 1972): 39-66 Alderman, Tom. "Computer Crime." Journal of Systems Management, (September 1977): 32-35.
Allen, Brandt R. "Computer Fraud," Financial Executive, VOl. 39 (May 1971): 38-42.
___."Embezzler's Guide to the Computer," Harvard Busines Review, (July 1975): 79-89.
___ • liThe Biggest Computer Frauds: Lessons for.r.PA~s," Journal of Accountancy, Vol. 143 (May 1977): 52-62.
____ • liThe Menace of Computer Fraud," The Office, (August 1979):
Arkin, Herbert. Handbook of samelin g for Auditing and Accounting. New York: McGraw-Hill Book ompany, 1967.
Auerbach. Lessons to be Learned From Computer Fraud. 1978-80.
Bequai, August. Computer Crime. Lexington, Mass: Lexington Books, 1977 • Becker, Jay. "Computer Crime Fighters ••• Go To Boot Camp at FBI Academy," Security World, (September 1978): 30-31.
Boockholdt, J.L. "Prosecution of Computer Crime," Journal of Systems Management, Vol. 29 (December 1978): 6-11.
Comptroller General of the United States. Report to the Congress:
Computer-Related Crimes in Federal Programs. Washington D.C.:
General Accounting Office, April 27, 1976.
Cook, John W., and Winkle, Gary M. Auditing. Boston: Houghton Mifflin Company, 1980.
Davis, Gordon B. Auditing and EDP. American Institute of Certified Public Accountants, 1968.
Dunn, Thurman S. A Pricing Model. Unpublished, 1972.
Elliot, Robert K., and Willingham, John J. Management Fraud:
Detection and Deterrence. New York: Petrocelli Books, Inc., 1980.
Fitzgerald, Jerry. Internal Controls for Computerized Systems.
California: Jerry Fitzgerald and Associates, 1978.
Horne, John M. "EDP Controls to Check Fraud," Management Accounting, Vol. 56 (October 1974): 43-46.
Hsiao, David K., Kerr, Douglas S. and Madnick, Stuart E. Computer Security. New York: Academic Press,. 1979.
Kemeny, John G., Sness, Laurie J., and Thompson, Gerald L.
Introduction to Finite Mathematics. New Jersey: PrenticeHall, Inc., 1966.
Krauss, Leonard I., and MacGahan, Aileen. Computer Fraud and Countermeasures. New Jersey: Prentice-Hall, Inc., 1979.
Kwak, N.K. Mathematical Programming with Business Applications. New York: McGraw-Hill book Company, 1973.
Liebholz, Stephen W., and Wilson, Louis D. User's Guide to Computer
Crime, Its Commission, Detection and Prevention. Radnor, PA:
Chilton Book Company, 1974.
Lieberman, Arthur Zale. Methodoldgy for the Automation of the Audit Process Involvin the Evaluation of the Plan of Internal ontro. Arlzona: Unlverslty 0 Arlzona, 977 Doctoral Dissertation).
Linstone, Harold A., and Turoff, Murray. The Delphi Method:
Techniques and Applications. Mass: Addison-Wesley Publishing Co., 1975.
Lobel, Jerome. "Planning a Secure System," Journal of Systems Management, Vol. 27 (July 1976): 14-19.
NBS, Special Publication 500-25. An Analysis of Computer Security Safeguards for Detecting and Preventing Intentional Computer Misuse. Washington D.C: U.S. Department of Commerce, 1978.
_ _---" Special Publication 500-57. Audit and Evaluation of Computer Security II: System Vulnerability and Controls. Washington D.C.: U.S. Department of Commerce, 1980.
Parker, Donn B. Crime by Computer. New York: Scribner, 1976.
_ _ _ Computer Security Special Report, Jan/Feb 1979.
Perry, William E., and Kuong, Javier E. Generalized Comeuter Audit
Software Selection and Aeplication. Wellesley Hll1s, Mass:
Management Advisory Publlcations, 1980.
Randall, Robert F. "Computer Fraud:. A Growing Problem, II Management Accounting, Vol 59 (April 1978): 61-64.
Wagner, Charles, R. The CPA and Computer Fraud. Lexington, Mass:
Lexington Books, 1979.
Wong, Kenneth Kiu. Risk Analysis and Control: A Guide for DP