Sie sind auf Seite 1von 23

The Impacts of Electronic

Commerce on Auditing
Practices: An Auditing
Process Model for
Evidence Collection and
Validation
'' Chien-Chih Yu*, Hung-Chao Yu and
Chi-Chun Chou ' ,.
National ChengChi University, Taiwan. ROC

ABSTRACT The main puq^oses of this paper are twofold. First, the paper identifles and
discusses the potential impacts of eleclronic commerce on auditing practices in
the emerging paperless on-line transaction environment. Second, it provides
\ two auditing process models that incorporate modem network security tech-
- ' '' niques and show how an audit can be conducted in an EC environment. A
periodical auditing process modet (PAPM) is proposed to demonstrate how
secure electronic technologies can be used to facilitate the auditor's evidence
collection and validation process for annual and semi-annual audits. We also
present a cotttittuous auditing process model (CAPM) which extends the func-
tions of PAPM for continuous auditing. In CAPM, a real-time transaction
monitoring system is used to link lo firms' accounting information systems for
assisting the auditor to detect abnormal activities and generate exception reports
on a continuous basis. The CAPM approach intends not only to ensure integrity
and effectiveness of the entire accounting system, but also to guarantee the
correctness and usefulness of the constantly generated financial statements for
public dissemination. Tlie main contribution of this paper is that it illustrates
I a conceptual framework which shows the feasibility of continuously auditing
electronic transactions in the EC environment. Copyright 2000 John Wiley &
Sons, Ltd.

INTRODUCTION merce (EC). EC integrates network techno-


logies, information management, security
During the past few years, the rapid advance service, and value-added networks (VANs) to
of Internet technologies and World Wide Web provide on-line services such as product
(WWW) applications has significantly contrib- delivering, electronic shopping, home banking,
uted to the development of electronic com- and secured on-line payments.' Customers may

'Correspondence tot Chien-Chih Yu, Department of 'Some well-known EC examples include the Ama-
Management Information Systems, National Cheng zon BookStore, TravelWeb, FlowerShop, E*Trade,
Chi University, Taipei, Taiwan, ROC. Internet Shopping Network (ISN), Security First Net-
E-mail: ccyu@mis.nccu.edu.tw -^ . work Bank (SFNB), CUC International, Time
Received 10 September 1998
Revised 29 July 1999
Copyright 2000 John Wiley & Sons, Ltd. Accepted 7 March 2000

International Journal of Intelligent Systems in Accounting, Finance & Management


Int. J. Intell. Sys. Ace. Fin. Mgmt 9, 195-216 (2000)
directly inquire and order merchandise from Internet represented a turning point in FC by
their own remote browsers and make payments providing an open and easy-to-use technology
through secured payment mechanisms. Compa- solution to the problem of information pub-
nies can build their own homepages or Web lishing and dissemination (Kalakota and Whin-
sites to trade with other companies and individ- ston, 1997). In contrast to EDI, which requires
ual customers world-wide without time and substantial hardware investment and specific
space constraints. Technically speaking, almost intermediaries (i.e. standard formats and trans-
all business activities (e.g. sales, ordering, pur- lation software), the Web not only facilitates
chasing, and payment) can function well in an business transactions through general WWW
EC environment. Some specific types of pro- browsers, but also enables more diverse busi-
ducts (e.g. computer software, network ness activities to be conducted globally. The
publications) can even be transmitted and special characteristics of the Web (e.g. open
exchanged in electronic format. Through the environment, easy application setting, and low
application of Internet technologies, the rec- entry barrier) provide small and medium-sized
ording, authenticating, summarizing, and main- enterprises with an opportunity to compete on
taining of transaction documents can be a more equal technological footing with
accomplished in the cyberspace, leading to elec- resource-rich multinational companies. Because
tronically paperless transaction trails. Due to WWW introduces a more complicated business
EC's potential importance and contribution to environment than FDI, new control and audit-
future success, companies across various busi- ing issues have to be identified and addressed
ness domains are now considering the chal- in an FC environment. In the past few years,
lenges and opportunities of adopting FC to studies related to the implementation of FC
their business and management activities to various business domains have increased
(Borenstein ct al, 1996; Camp and Sirbu, 1997; substantially (Borenstein et al., 1996; Camp and
Graham, 1996; Kalakota and Whinston, 1996; Sirbu, 1997;' Kalakota and Whinston, 1996; Pan-
Kogan et al., 1996; Sivori, 1996; Tenenbaum et urach, 1996; Piven, 1997; Pyle, 1996; Tenenbaum
al., 1997). et a\., 1997). However, there is still a lack of
discussion about the impacts of FC on firms'
During the late 1970s and early 1980s, FC
overall internal control procedures and how an
became widely spread within companies in the
audit can be conducted in an EC environment.
form of electronic data interchange (FDD.
The success of FC depends heavily on con-
Related work in the literature focuses primarily
sumers' trust and confidence on protection
on FDI's importance (Ansary, 1993; Meier,
related to the legitimacy of online business, the
1992), implementation issues (Bruce, 1990;
privacy of personal information, and the secur-
Fmmelhainz, 1993; Gunther, 1994), communi-
ity of business transactions. In fact, many stud-
cation standards (Eckerson, 1991; Wheatman,
ies indicate that only about 20-25% of the
1991), audit and internal control issues (Chan,
online users are willing to complete a trans-
1991; CICA, 1993, 1996; Hansen and Hill, 1989;
action in the cyberspace.^ In response to cus-
Marcella et ai, 1992; Walden and Braganza,
tomers' concerns about the risk of trading elec-
1993), as well as security and legal issues
tronically, the American Institute of Certified
(Chalmers, 1990; Jones, 1992; Wright, 1992), but
Public Accountants (AlCPA) and the Canadian
seldom discusses whether the traditional audit
process is still appropriate in EDI and how
new security techniques can be incorporated - In mid-1997, the AICPA commissioned Yankelovich
(e.g. firewalls, data encryption methods, digital Partners to conduct a survey of 1003 Americans who
signature, and digital envelope) into an audit were 18 years old or older and who subscribed to
engagement. on-line service. The results indicated that most of
the subjects would not provide their income (91%),
In the 1990s, the advent of the WWW on the credit card number (85%), phone number (74%), and
address (67%) when shopping on-line. Lack of secur-
Warner's Pathfinder, Wall Street Joumal Interactive, ity was the primary reason for subjects not buying
and Disney On-line. products on-line.

Copyright 2000 John Wiley & Sons. Ltd. Inl J. Intell. Sys. Ace. Fin. Mgmt. 9, 195-216 (2000)

196 -C. YU ETAL.


Institute of Chartered Accountants (CICA) have nies' Web sites. It should be noted that these
recently issued a new guideline, the WebTrust models are not new computer-assisted auditing
Principles and Criteria for Business-to-Consumer techniques (CAATs), but may efficiently use
Electronic Commerce, to ensure thai an entity's the traditional CAATs in an EC environment.
Web site institutes effective controls and prac- The remainder of this paper is organized as
tices to protect consumer interests (AICPA and follows. The next section discusses important
CICA, 1999a).^ It should be noted that the CPA impacts and potential problems of EC on audit-
WebTrust only introduces a new assurance ser- ing practices. New audit risks and internal con-
vice opportunity to the public accounting pro- trols are identified. The third section proposes
fession, but provides few or no guidelines a conceptual framework for EC auditing and
about whether traditional auditing procedures introduces two EC auditing process models,
and standards are still appropriate to an EC the PAPM and the CAPM. A summary and
audit engagement. conclusion is provided in the final section.
The primary goal and contribution of this
paper are twofold. First, this study explores
some possible impacts of EC on auditing prac- THE IMPACTS OF EC ON AUDITING
tices. In particular, new audit risks and internal PRACTICES
control considerations are identified and dis-
cussed. Second, it proposes two new auditing In a paperless EC environment, the need for
process models that incorporate modern physical paper evidence will significantly
network security techniques and show how a decrease. In addition, since most of the business
typical audit can be conducted in an EC transactions will be done and more timely fin-
environment. In the periodical auditing process ancial statements will be requested and distrib-
model (PAPM), traditional annual and semi- uted through the Internet, companies have to
annual audits are conducted using current design new accounting information systems
secure electronic transaction technologies to which not only record and trace transaction
facilitate the collection and vahdation of elec- information instantaneously, but also cross-
tronic audit evidence.* The continuous auditing check internal and external documents auto-
process model (CAPM) extends the functions of matically. An even more important issue is the
PAPM using a real-time transaction monitoring need to design new internal control procedures
system and predefined auditing rules to detect to ensure the integrity and authentication of
abnormal events and generate exception reports EC transactions and protect the private key,
on a continuous basis. The CAPM aims at sup- digital signature, and the whole Web system
porting safe accounting operations and together witb related databases. These changes
allowing for timely dissemination of approved introduce new challenges to the auditing pro-
financial information and statements on compa- fession. In fact, EC is not, by itself, the driver
of audit impacts. It is the new business prac-
tices driven by the EC that require the auditing
^ Three principles are specified in the guideline: the
business practices disclosure principle (i.e. the entity profession to update its understanding of com-
discloses its EC business practices and executes panies' new business processes, reassess audit
transactions in accordance with its disclosed risks, and determine how these may affect the
practices), the transaction intcgriti/ principle (i.e. the overall audit.
entity maintains effective controls to provide an
assurance that customers' orders placed are com- This section discusses the impacts of EC on
pleted and billed as agreed), and the information audit risk assessment and the design of internal
protection principle (i.e. the entity maintains effective controls. We focus on these two issues because
controls to provide an assurance that private cus- of their relative importance in the overall audit
tomer information obtained is protected).
"^ In Taiwan, both the semi-annual and annual finan- process. As suggested in the AICPA (1983)
cial statements should be audited. In the USA, how- Statements of Auditing Standards (SAS) No. 47,
ever, only the annual financial statements should the audit risk concept should be used for plan-
be auditeid. ning purposes to decide how much evidence
Copyright 2000 John Wiley & Sons. Ltd. Int. J. Intel!. Sys. Ace. Fin. Mgmt. 9. 195-216 (2000)

THE IMPACTS OF ELECTRONIC COMMERCE ON AUDITING PROCESSES 197


to accumulate in each transaction cycle. SAS and undetected errors will become a crucial
No. 78 further Indicates that internal control issue to the eritity's success in EC. An unde-
is a process designed to provide reasonable tected error in a cash payment application, for
assurance regarding the achievement of reliable example, may adversely affect an entity's cash
financial reporting, effective and efficient oper- flows and its public confidence to customers
ations, and compliance with laws and regu- and suppliers. In fact, total systems dependence
lations. More important, the study of a firm's can also cause substantial losses that, in turn,
internal controls and the assessment of control raise doubts as to whether there was a failure
risks are the major components in the audit in the system (Rittenberg and Schwieger, 1997).
risk model. Several issues should be taken into consider-
ation when auditing an EC company:

New Audit Risks in an EC Environment (1) Errors in network processing and communi-
cation systems may result in the trans-
When an EC-based system is adopted by a mission of incorrect transaction information
business entity, a number of new features affect and the reporting of inaccurate information
the audit risk and its three components (i.e, to management. If not detected in time,
inherent risk, control risk, and detection risk) inaccurate and incomplete information may
in the following five respects. result in Inappropriate decisions and poten-
tial business losses, leading to higher con-
Economic Interdependence trol risk.
One of the main objectives of EC is to facilitate (2) Since the success of EC relies on good
an entity's transactions and business decisions internal controls built into the system, the
through the Internet with a large number of auditor should be able to find effective and
trading partners and individual customers. This efficient internal control procedures that
increased closeness of trading relationship and may reduce the control risk associated with
virtual business integration (e.g. a supply chain) management's assertions.
may affect the inherent and control risks in an
audit because a potential corruption in one In light of the increasing importance of infor-
trading partner's EC system may adversely mation systems to the success of business enti-
affect other partners and customers. Therefore, ties, the AICPA and the CICA have recently
the auditor should at least consider the follow- issued a new guideline, the SysTrust Principles
ing items in assessing the audit risk: and Criteria for Systems Reliability, to provide
assurance that an entity's systems are designed
(1) The economic interdependence between the and operated to generate reliable information."^
audit client and its major vendors, cus- In fact, this new service is part of a broader
tomers or other related entities. future goal to supply real-time assurance on
(2) The extent to which the client's internal databases and information systems. Since in an
control policies and procedures interact
with those of other trading partners. "^ According to SifsTnist, a reliable system is one that
(3) The changes in the client's internal control is capable of operating without material error, fault,
policies and procedures due to new EC or failure during a specified period in a specified
trading activities. environment. Four principles are suggested to evalu-
ate the reliability of a system: ai>aHability (i.e. the
(4) The control risk associated with financial system is available for operation and use at times
statement assertions which may be affected set forth in service-level statements or agreements),
by economic interdependence. security (i.e. the system is protected against uiiauthor-
.ized physical and logical access), intcgrit}/ (i.e. system
processing is complete, accurate, timely, and
Total Systems Dependence authorized), and maintainabiliti/ (i.e. the system can
As a business entity relies heavily on EC (and be updated when required in a manner that con-
thus on the Web system and related tinues to provide for system availability, security,
technologies), the corruption of applications and integrity).

Copyright 2000 John Wiley & Sons. Ltd, Int J. Intell. Sys. Ace. Fin. Mgmt. 9. 195-216 (2000)

198 C.-C, YU ETAL


EC environment business entities rely heavily the inherent and control risks in accounts
on systems, SysTrust will contribute to the pro- such as Cash and Sales.
gress of EC as system assurance services
become a reaUty (AICPA and CICA, 1999b). Reliance on Third Parties
A business entity will rely more on other third
Potential Loss of Transaction Trails and Data parties such as the Internet service providers
In an EC environment, there will be less paper (ISP) to ensure that transactions are communi-
available for verifying and reconciling trans- cated and processed correctly and are not inaj>-
actions. Much of the information generated propriately disclosed.*' Errors, security breaches,
from an entity's EC system will be in electronic and processing disruptions in the third party's
form. The validity of the internal and external system or network may have adverse impacts
electronic evidence depends heavily on new on the entity's operations. Examples ot such
security technologies and appropriate trans- threats include the disclosure of confidential
action protocols. Such a paperless environment information, the entry of invalid or unauthor-
may affect traditional audits in the following ized transactions, the incomplete or delayed
ways: transmission of data, and the penetration of
system and applications by viruses or hackers.
(1) Issues such as the validity of electronic evi- Therefore, the auditor should at least consider
dence, the security of transferring electronic the following issues in planning an audit:
information, the control of network appli-
(1) How the ISPs' control policies and
cations, and the standards and formats of
procedures may affect the three risk compo-
electronic audit trails will dramatically
nents associated with the audit client's
affect the determination of detection risk.
financial statement assertions.
(2) Policies for retention and recovery of trans-
(2) How the audit client's internal control poli-
action data are important. Without these
cies and procedures may interact with those
controls, an entity may not be able to pro-
of the ISPs.
vide adequate and appropriate evidence for
(3) The nature of services provided by the ISPs
cost-efficient audits.
(i.e. whether services are highly stan-
(3) Since the business cycle is compressed in dardized and used by many companies).
an EC environment, many of the balance
(4) The nature and sufficiency of auditable data
sheet accounts (e.g. inventory and accounts
owned by the audit client and the ISPs.
receivable) may be significantly reduced.
(5) The ISPs' capabilities and reputation (e.g.
This may have impacts on the inherent and
professional qualification, financial strength,
control risks of these accounts.
competence, and integrity).
(4) Similar to EDI, the implementation of EC
may result in a reduction of accounting After considering the importance of ISPs to
cycle periods between trading partners. the success of EC, the AICPA and the CICA
Therefore, traditional control procedures have recently issued the WebTrust-lSP Principles
such as a monthly accounts receivable state- and Criteria for Internet Service Providers in
ment prepared at the end of an accounting Electronic Commerce. This guideline provides
cycle may not be necessary because rec- assurance to the customers that the ISPs would
onciliation can be performed through the
Internet by product line, season, or other "According to Kalakota and Whinston (1997), the
operating factors (CICA, 1996). ISPs offer a wide variety of technologies and services
(5) Because individual customers can trade such as Internet access for customers and organiza-
with an entity through the Internet, compa- tions (e.g. America Online), network management,
system integration, and backbone access services (e.g.
nies face an increase in transactions with UUNET), client and server software for navigating
small dollar amounts (e.g. the purchase of and publishing material on the Internet (e.g.
NBA star cards by teenagers). These and Netscape), and payment systems for online pur-
other micro-payment transactions may affect chases (e.g. CyberCash).

Copyright 2000 John Wiley & Sons. Ltd. Int J. Inteli Sys. Ace. F!n. Mgmt. 9, 195-216 (2000)

THE iMPACTS OF ELECTRONiC COMMERCE ON AUDiTlNG PROCESSES 199


follow a recognized set of principles in the tronic data processing (EDP) environment."
conduct of its EC business and would assist There are three key components in this frame-
their customers in obtaining a WebTrust Biisi- work: the general controls, the apphcation con-
ness-to-Consumer Seal of assurance for their Web trols, and the on-line real-time controls. Even
sites (AICPA and CICA, though most of these control components are
still appropriate in the EC environment, special
Loss of Confidentiality attention should also be paid to the following
In an EC environment, sensitive information new control features.
may be accidentally or intentionally disclosed
on the Web. In fact, a major security threat Security Controls of Electronic Documents
companies may encounter is the high exposure Transfer
and availability of transaction applications on Security controls ensure the integrity, confiden-
the Internet. Because of the high concentration tiality, privacy, authentication, and nonrepudi-
of data controlled by a few individuals, the ation of transaction information to avoid
high speeds of computer processing systems, security threats such as illegal access, sniffing,
and the increased accessibility to data, it eavesdropping, modification, repudiation and
becomes much easier for external parties to spoofing. Companies may need to carefully
observe or obtain an entity's information with- consider the following issues:
out its permission. For dealing with this situ-
ation, the auditor should at least consider the (1) How proper security control technologies
following items to assess the audit risk: (e.g. password, firewalls, data encryption,
digital signature and digital envelope) can
(1) The access control policies, processes, tech- be tested and used.
nologies, and security mechanisms adopted. (2) How appropriate secure electronic trans-
(2) The data encryption and decryption action protocols (e.g. the SET standard for
methods used. Internet payment security, the S-HTTP and
(3) The intrusion prevention and detection S/MIME protocols for application layer
functions applied. security, the SSL protocol for session layer
security, and the AH and ESP protocols for
New Internal Controls in an EC network layer security) can be adopted.
Environment (3) How certificate authorities (CA) should be
chosen for ensuring secure electronic trans-
SAS No. 56 and 78 provide general guidelines actions and safe electronic document inter-
for the internal control framework in an elec- changes.
WebTrust-lSP Principles and Criteria specify The communication control protocols and
three principles; the business practices disclosure prin- facilities should also include algorithms for pre-
ciple (i.e. the ISP discloses its business practices for determining whether noise or loss of signals
EC services and provides such services in accordance
with its disclosed business practices), the availabiliti/ has altered the content of messages during
principle (i.e. the ISP maintains effective controls to transmission and if so, automatically requesting
provide reasonable assurance that the customer's
acc^s to the ISP network access point and related
EC services i.s available as disclosed by the ISP), and " SAS No. 48, The Effects of Computer Processing on the
the security and privacy principle (i.e. the ISP maintains Audit of Finaiicial Statements, has been integrated
effective controls against unauthorized physical and within sections 311.03, 311,09-311.10, 318.07
electronic access to the ISP's EC operating systems (superseded by SAS No. 56), 320.33-320.34
and applications, and to private customer infor- (superseded by SAS No. 55), 320.37 (superseded by
mation obtained as a result of EC activities to pro- SAS No. 55), 320.57-320.58 (superseded by SAS No.
vide reasonable assurance that access to systems 55), 320.65 - 320.68 (superseded by SAS No. 55),
and customer accounts is restricted to authorized and 326.12. SAS No. 56 was later amended by SAS
individuals and that such private customer infor- No. 78 to incorporate the new definitions and
mation is protected from uses not related to the descriptions of internal controls specified in the
entity's business). COSO report.

Copyright 2000 John Wiley & Sons. Ltd. /n?. J. Intell. Sys. Aca. Fin. Mgmt, 9. 195-216 (2000)

200 C.-C,
message re-transmission or recovery. Table 1 ing period (through the use of electronic
summarizes some commonly used security con- time stamps). Acknowledgments between
trol methods (Bhimani, 1996; Carroll, 1997; buyers and sellers can ensure that trans-
Cobb, 1996; Herringshaw, 1997). actions are recorded on a timely basis and
transactions messages are understood by
Controls to Maintain Transaction Traits both parties, are genuine, and have not
Since the transaction trails will change from been altered.
physical documents to electronic format, a busi- (2) Use batch control totals when transactions
ness entity should concentrate more on the are initiated or received and develop dual
separation of duties and authorization and recording or parallel monitoring system to
should develop computer applications to record ensure the completeness and accuracy of
and maintain these transaction trails for transaction trails.
supporting nonrepudiation and future cross-
checking. In general, effective procedures of
controlling and maintaining transaction trails Security Controls of Electronic Signatures
include the following: Being different from the password, which is
(1) Create and design transaction logs in appro- often used to prevent illegal access to private
priate format to record processed and failed information, an electronic signature serves not
transactions, buyer-seller acknowledg- only as a means of ensuring the validity of
ments, and time sequence of processing. transaction trails, but also as a proof of trans-
These log files provide evidence that trans- action between seller and buyer. Because of its
actions are recorded in the correct accoimt- importance to business transactions, public and
private keys for electronic signature should be
safeguarded in a way that is different from
Table 1 Commonly used security methods for that of general assets. More specifically, safe-
electronic transactions guarding of private keys should be part of
the overall approval and authentication process
Security Security Security methods
requirements threats
because private keys should only be used to
digitally sign a document or open a digital
Integrity Illegal Serial number envelope when a transaction has been approved
modification, control, time or authenticated. Therefore, based on the prin-
data missing, stamp, MAG ciple of separation of duties, the safeguarding
replacement. code, digital of private keys should be independent of the
deletion, signature
destruction recording and executing of transactions. In gen-
Authentication Transaction User ID, eral, the responsibilities of key management
spoofing password, digital can be divided in the following ways:
signature
Non-repudiation Denial of Digital signature
message (1) The managers in charge of transaction
spending or approvals should be responsible for safe-
transaction guarding private keys.
making (2) The managers in charge of transaction
Confidentiality Eavesdropping, Data-encryption
illegal monitoring , methods, digital
executions should be responsible for safe-
sniffing envelope guarding encryption and decryption algor-
Access control Illegal user Qualified ithms.
access, misuse systems and
of data software, user
ID, password.
It should be noted that the protection of
firewall, intrusion public keys and its registration profiles depends
detection system on the feasible hierarchical structure set by the
certificate authorities.
Copyright 2CX)0 John Wiley & Sons. Ltd. Int J. Intell. Sys. Ace. Fin. Mgmt. 9. 195-216 (2000)

THE IMPACTS OF ELECTRONIC COMMERCE ON AUDITING PROCESSES 201


Security Controls of Application Programs and in case of disaster and the provision of con-
Software fidentiality.
As mentioned above, a major security threat
many companies may encounter is the high Earlier Preventive Control Points
exposure and availability of transaction appli- In an EC environment, preventive controls as
cations on the Internet. To overcome this prob- well as traditional detection controls should be
lem, companies may adopt control techniques embedded in transaction processing systems.
such as firewall or other end-to-end controls to This is analogous to the progress in total qual-
avoid inappropriate execution or destruction of ity management, where quality assurance based
these application programs and software. In on inspection and rework has been largely
addition to these access control problems, more replaced by the redesign of processes and pro-
and more application providers either use the ducts to eliminate the sources of defects (Elliott,
Java applets or other external programs with a 1995). More importantly, EC causes the control
common gateway interface (CGI) to execute or points to occur earlier than before. In a mer-
activate database retrieval or other computation chandising company, for example, controls over
processes across different application platforms. payments of accounts payable should be
In fact, verifying application programs and accomplished by automatically reconciling the
software will become a major part of the audi- vendor's invoices with vouchers generated by
tor's overall auditing process. Some security the company's acquisition systems. The com-
techniques for controlling mobile codes or web- pany then pays based on the trading partner
wares include firewalling and code signing agreements that have been built into the com-
(Fellen, 1997; Rubin and Geer, 1998). In general, puter applications which, in turn, automatically
the key control procedures in a company's attach a 'PAW mark to the vouchers. In this
transaction processing system and management example, it would be inefficient for the com-
information system should include: pany to use cv post detection controls such
as manually calculating the extensions on the
(1) Software/hardware controls, network man- vendor invoices to determine whether the
agement controls, and database access con- prices are correct. It should be noted that, ior
trols. companies to be successful in an EC environ-
(2) Firewalls set up, virus check. ment, preventive controls should be considered
(3) The examination of applications and during the analysis and design stage of
software distributed on the Internet. developing EC applications.

Controls of Internet Service Providers Other Issues of EC Impacts on Overall


Control procedures adopted by the ISPs should Audit Process
also be considered to ascertain that sufficient
and valid transaction security and integrity While audit risk and internal controls are
exist. Most ISPs may provide automatic con- important components in the overall audit pro-
trols in the recovery of damaged data, protec- cess, there are other issues that deserve the
tion against data loss, and error-checking. public accounting profession's attention. Table 2
Depending on the extent of services provided provides a valuable reference for auditors to
by the ISPs, two considerations may be taken identify some possible impacts of EC on each
into account: stage of the audit process. It should be noted
that the study of the interactions between EC
(1) The auditor may wish to consider obtaining and auditing is still at an infant stage. In fact,
a report from a third-party specialist ensur- most of the issues proposed on Table 2 are
ing the adequacy and validity of network new concepts and ideas. Therefore, more effort
controls on the ISP's system. should be devoted by the profession and aca-
(2) The auditor should also pay attention to demics of auditing and information technology
issues such as the ISP's continuing service domains to provide some satisfactory solutions.
Copyright 20(X) John Wiley & Sons. Ltd. Int. J. Intell. Sys. Ace. Fin. Mgmt. 9, 195-216 (2000)

202 C.-C. YU ETAL


Table 2. Possible impacts of EC on the overall auditing process

Stages in auditing process EC's possible impacts

Acceptance/continuance of What additional factors should be considered in determining the acceptance


clients or continuance of clients? (e.g. Does the potential client provide real-time
financial information on its Web site?)
Where do we obtain information about these additional factors?
Audit planning How do we assess the materiality at both the individual account level and
the overall financial statement level?
Is there any new audit risk in an EC environment? Is the traditional audit
risk model still appropriate?
Are the traditional audit programs still appropriate? How do we modify
them?
Understanding of client's What are the key control points in an EC environment? How do we
ICS evaluate them?
How do we obtain an understanding of a client's ICS and make a
preliminary control risk assessment?
What constitutes "material weakness' in the client's ICS?
Tests of controls How do we test specific control points in the client's ICS (e.g. client's
secure transaction mechanisms)?
How do we determine the extent, nature, and timing of substantive tests?
(e.g. If the control risk is assessed at the minimum level, is it still necessary
to conduct substantive tests?)
Substantive tests of How do we verify the validity and authentication of the client's electronic
transactions and balances evidence?
Are the traditional five management assertions still appropriate in an EC
environment? {e.g. How do we verify the existence of inventory of a on-line
publishing company?) Is there any new assertion to be tested in an EC
environment?
What new audit technologies or procedures should the auditor use to test
transactions and account balances?
Completion of audit field How do we determine the sufficiency and competence of audit evidence?
work How do we evaluate the client's going concern in an EC environment?
How do we detect related-party transactions in an EC environment?
Issuance of audit report Should the auditor express an opinion on the validity of the client's EC
systems?
Should the content of the audit report change to accommodate the client's
use of EC operations?
Overall audit process Is the traditional audit process still appropriate? Are there any (new) stages
which should be eliminated (incorporated)?
What is the auditor's legal liability in an EC environment? (e.g. Should the
auditor be responsible for the validity of the clienfs EC systems?)
Are the formats and types of traditional working papers sliil apropriate?

AUDITING PROCESS MODELS IN THE EC demand for timely financial reporting, it is


ENVIRONMENT necessary to develop a new auditing process
model as a guideline for the auditing pro-
During a financial statement audit in an EC fession. Based on the time interval of audits,
environment, the auditor faces the problem of two EC auditing process models are proposed:
obtaining electronic transaction trails v^dth digi- The periodical auditing process model (PAPM) and
tal signatures from more diffused sources (e.g. the continuous auditing process model (CAPM).
a remote download in a client-server The basic frameworks of these two models,
architecture). In light of the transmission and together with real examples, are discussed in
authentication of electronic transactions and the detail below.
Copyright 2000 John Wiley & Sons, Ltd. tnt. J. tntell. Sys. Ace. Fin. Mgmt. 9. 195-216 (2000)

THE IMPACTS OF ELECTRONIC COMMERCE ON AUDITING PROCESSES 203


The Periodical Auditing Process Model (2) Approval of Applications of Vendor
(PAPM) Invoices: When a registered seller applies
blank vendor invoices and invoice serial
To facilitate our discussion, a vendor invoice
numbers from the DOT, a DOT agent
example is provided. The participants in this
should review the strength of the vendor's
example include a certificate authority (CA), a
intemal controls and decide whether to
vendor (seller) who sells goods and sends the
approve the application. Two criteria are
invoice to a buyer, and the buyer's auditor.
important in this approval process:
Figures 1 and 2 demonstrate the overall frame-
work of this example."' This example has two The auto-numbering control on the invoice-
distinct features. First, it shows how Internet generating system: To ensure unique issu-
security techniques can be used to maintain the ance of each blank invoice, the DOT has to
credibility of electronic transaction evidence in incorporate an auto-numbering mechanism
an EC environment. Second, it dues highlight on its invoice-generating system to prevent
some of the key EC control procedures for blank invoices from duplicate usage by
all entities and departments involved (to be the vendor.
discussed later). Due to the limitation of scope The time stamp control on the invoice-issu-
of the example, it is impossible to incorporate ance system: To maintain the validity of
all intemal controls detailed in the previous blank invoices for future use, the DOT must
section. However, with appropriate modifi- set up an automatic time stamp mechanism
cations to the participants (i.e. CA, vendor, and on its invoice-issuance system to ensure that
buyer), this proposed framework can also be no invoices can be used after a specific
applied to other transaction cycles. expiration date. This control procedure can
also avoid the vendor's repeated use of the
same invoice number.
Ttie Activities of the Certificate Authority
In Taiwan, the CA of vendor invoices is the (3) Issuance of Prenumbered Blank Invoices:
Department of Treasury (DOT). In our vendor After the approval of the invoice appli-
invoice example, the major activities of the CA cation, the DOT will first use the MD5
includf the following: method to encrypt the approved blank
invoices together with the serial numbers
(1) Authentication of Vendor Identity: The and expiry date into a message digest, and
DOT is responsible for the authentication then use its private key to encrypt the mess-
of vendor identities, the approval and issu- age digest into a digital signature #1.
ance of public key certificates for digital Finally, the DOT will use the vendor's pub-
signature, and the maintenance of the ven- lic key to encrypt both digital signature #1
dor's public key in the public database. and original invoice messages (i.e. the blank
Generally, these tasks can also be carried invoices, the serial numbers, and expiry
out by other qualified authority organiza- date) into a digital envelope #1 and send it
tions. to the vendor. The upper-left part of
Figure 1 demonstrates this process.
^ In current auditing practice, node 13 of Figure 2
should include a sequence of actions: return the The Activities of the Vendor
goods to the vendor, notify the purchasing depart-
ment to contact the vendor for an explanation, In our invoice example, the vendor has the
inform the accounts payable department for a debit following two major activities:
memo, and record the returned goods on the return (1) Authentication of Blank Invoices: The ven-
log file. However, incorporating all these actions dor uses a private key to open the digital
may complicate Figure 2. Because the main purpose envelope #1 received from DOT, and then
of Figure 2 is to demonstrate how the key internal
control procedures discussed above can be uses the IX)T's public key to verify the
implemented in the acquisition cycle, the term 'Dis- validity of digital signature #1 on the
agreement Handling' was used to represent the blank invoices.
whole sequence of actions. (2) Transmission of Invoices to the Buyer:
Copyright 2000 John Wiley & Sons. Ltd. Int. J. Intell. Sys. Ace. Fin. Mgmt. 9. 195-216 (2000)

204 C.-C. YV ETAL


Certificate Authority (DOT)

The Sellers
autheniicaied Original
invoica Message
numbers and 1
PrivBle
expiry dale Key*i

I Message
Digilal
Signalure
Auditor

MD5 I - Digesi 1 The Auditor examines ttie validity of


the audit evidence collected from:
(1) REC-LOGs in buyer's Accounts
Payable and Finance Departments,
and (2) Vendor auditor's evaluation
about vendor's IC

Digital Digits!
OriginsI Envelope i1
Signature Message
1*1

Digital
Envelope #2 ,, Buyer
Vendor

Digital
Signature OrigrnsI
1 Messaoe
2 Original
Message
Sailer's invoice
contenfa.
sulhenhc^atsd
invoice numbers Buyer's
and issuing hme
stamps Aquisition Cycle

(See Figure 2)

Digital
Signature
Digital
Signature
M2

MD5 = An encryption method that translates the initial message into message digest
RSA = A public key encryption algorithm invented by Rivest, Shamir, and Adieman.

Figure 1 The Vendor Invoice example.

Copyright 2000 John Wiley & Sons. Ltd. Int. J. Intell. Sys. Ace. Fin. Mgmt. 9. 195-216 {2000}

THE IMPACTS OF ELECTRONIC COMMERCE ON AUDITING PROCESSES 205


o
j

>

O
LU
c

CM
O
3
ra
il
Copyright 2000 John Wiley & Sons. Ltd. ini. J. Inteti. Sys. Ace. Fin. Mgmt. 9. 195-216 (2000)

206 C.-C. YU ETAL.


Based on the time sequence of transactions, present the overall internal control structure.
the vendor uses his invoice-preparation Finally, to focus mainly on EC auditing prob-
application (which may has auto-numbering lems, we assume that the best practice of
and time stamp functions) to facilitate the internal controls is already known by the audi-
recording of original transaction messages tor. However, if more internal control knowl-
#2 (e.g. the goods sold, quantity, unit price, edge needs to be acquired through expert sys-
total price, and extensions) on the blank tems, an intelligent internal control analysis
invoice. Finally, the vendor will use his module such as the one proposed by Meservy
private key to encrypt the original invoice et ai (1986) can be included in this model.
messages #1, the original transaction mess- In our invoice example, two buyer's actix'ities
ages #2, the DOT'S digital signature #1, listed below are of major interest:
and the vendor's digital signature #2 into
a digital envelope U2 and send it to the (1) Authentication of Vendor's Invoice (node
buyer. The lower-left part of Figure 1 dem- 15): The buyer uses his private key to open
onstrates this process. digital envelope #2 and conducts two veri-
fications. First, the buyer uses DOT's public
Ttie Activities of the Buyer key #1 to verify the validity of the vendor's
To clearly describe how the auditor may con- invoice. The buyer then uses the vendor's
duct an audit in an EC environment, the public key #2 to verify the integrity and
internal control description language (ICDL) accuracy of the contents in the invoice. In
developed by Bailey et al. (1985) is used to Figure 2, this process is illustrated by the
create Figure 2.'" Three points related to upper-right box of node 15.
Figure 2 are worth mentioning. First, Figure 2 (2) Maintenance of Vendor's Invoice (node
incorporates several key EC control procedures 18): Based on the time sequence of
(as mentioned above) over input, process, and transactions, the buyer uses his accounting
output of all departments involved in the buy- applications (which may also has auto-
er's acc]uisition cycle. Second, the ICDL is not numbering and time stamp functions) to
the only tool for describing internal controls. record the content of original transaction
Other advanced modeling tools (e.g. the unified messages #2 into its accounts payable data-
modeling language, UML) can also be used to base and logs. The payable log file and
digital envelope #2 are maintained for
future auditing.
'"According to Bailey et al (1985), the ICDL was Two comments regarding the buyer's internal
designed to support the description specifications of
accounting internal controls. The ICDL consists of documents should be made. First, the reliability
four parts: agents (i.e. actors in an inforniation of internal electronic documents depends heav-
system), objects (i.e. things such as forms and records ily on the strength of the buyer's EC internal
that are manipulated by the information system), control structures. Because all internal docu-
repositories (i.e. storage facilities such as files for
objects), and commands (i.e. models of tasks to be ments are generated by the buyer's employees,
performed by agents). To encode the internal control their reliability will inevitably be lower than
representation, the precedent constraint (PC) concept that of the external documents (e.g. vendor's
is used. A sequential number is first assigned to invoice). Since in a highly-computerized com-
each operation node, and precedent constraints for pany almost all internal documents are in elec-
a given node are all nodes logically above the given
node. For example, in Figure 2, node 24 represents tronic form and can be compared and cross-
the Finance department's preparation of a cash dis- checked through system applications, the
bursement record. Tracing backwards through the impacts of EC on internal audit evidence
model, all operations from node 1 to node 23 should not be as large as those on the external
(including purchasing, receiving, bookkeeping of
liability, and transferring of money to vendor) evidence. Second, the generation and manage-
should be accomplished before recognizing cash dis- ment of internal electronic documents can be
bursement. See Bailey et al. (1985) for more detailed protected through the use of authentication and
discussions about the ICDL. authorization control mechanisms to restrict
Copyrigtit 2000 John Wiley & Sons. Ltd. Int. J. Intell. SyS- Ace. Fin. Mgmt. 9. 195-216 (2000)

THE IMPACTS OF ELECTRONIC COMMERCE ON AUDITING RROCESSES 207


employees' access to system applications. periodically collecting and assessing audit
Therefore, no public key or private key is neces- evidence, evaluating the strength of internal
sary. In fact, many Intranet software providers controls, and formulating an opinion on the
have now incorporated the digital signature fairness of financial statements. Therefore, there
function into their packages (e.g. Netscape and is no need for auditors to perform real-time
Lotus). The combination of electronic docu- monitoring operations. In the EC environment,
ments and digital signature may provide a new however, due to the rapid advances in Internet
way of secure authentication for internal docu- technologies and the increased demand by the
ments. public for real-time electronic access to corpor-
ate databases, many public companies (e.g.
The Activities of the Auditor AT&T, Microsoft, IBM) have already released
In auditing the buyer's acquisition cycle, the their financial and operating information on
auditor periodically collects three types of evi- their Web sites. In fact, there is strong evidence
dence: to believe that more and more public compa-
(1) Buyer's transaction log files from the Pur- nies will post their key financial information
chasing, Receiving, Accounts Payable, and on the Internet in the near future." The require-
Finance departments (correspondijig to ment for correct and timely financial infor-
nodes 5, 12, 18, and 25, respectively). The mation leads to the need for quality audit
auditor may use his own audit applications service from the auditor to support continuous
or softwares to cross-check the agreements verification and dissemination of accounting
among these log files to see if any exception information.^^ This brings new challenges to
exists. An exception report can be prepared the public accounting profession: companies
for further examination. and the public need the auditor's report to
(2) Vendor's digital envelope #2 received by accompany the financial information released
the buyer. The auditor should (a) examine on the Internet. Since in future we will be
the validity and authentication of the facing real-time business reporting with real-
original invoice messages #1, the original time auditing (Elliott, 1995), it is important for
transaction messages #2, the EKDT's digital the auditing profession and the related aca-
signature #1, the vendor's digital signature demic to explore, in advance, how real-time
#2, and the identity of the vendor, and auditing can be implemented to fulfil the state-
(b) verify the integrity and accuracy of the ment-users' needs.'^
contents in the invoice.
(3) Internal control evaluations from Vendor's " Liu et al. (1997) surveys the Fortune 500 companies'
auditor. Because errors, security breaches, Web sites and homepages and finds that 93.2% of
and processing disruptions in the vendor's the companies display their products and services
systems may adversely affect the validity and 86.1% of them provide company overview.
About 79.3% of the companies present interactive
of inputs to the buyer's operation systems, feedback and 71.1% of them show 'what is new'.
the buyer's auditor should review the ven- '^ Currently, a special task force of the Auditing Stan-
dor auditor's evaluation about the vendor's dards Board (ASB) is surveying CPAs on their experi-
control policies and procedures related to ence and beliefs relating to appropriate auditor
respon.sibility when a client's financial statements are
his revenue cycle. The main purpose of disseminated electronically, particularly on a Web
doing tliis is to make sure that adequate site. See Pany (1998) for more details about this sur-
controls have been established by the ven- vey.
dor to prevent errors, frauds, and illegal '* Currently, an AICPA committee is preparing for
acts. a world in which all company data may be instantly
accessible through a second generation of the Inter-
net and virtually al! businesses will interact elec-
The Continuous Auditing Process Modei tronically with the suppliers and customers. Essen-
(CAPM) tially, the committee is planning for audits on a
continuous basis in order to provide assurance about
In a traditional financial statement audit, the the data contained in that system (Rittenberg and
auditor's responsibilities focus mainly on Schwieger, 1997). Recently, a task force, sponsored

Copyright 2000 Jotin Wiley & Sons, Ltd. Int. J. Intell. Sys. Ace. Fin. Mgmt. 9. 195-216 (2000)

208 C.-C. YU ETAL


In response to the market's demand for CAPM differs from the PAPM only in the way
timely and reliable information, the AICPA and and frequency the auditor conducts an audit.
CICA have just completed a research report. Second, to perform real-time monitoring and
Continuous Auditing, to address the significant auditing tasks, the CAPS is set up at the audi-
issues auditors will encounter in performing tor's site and is connected to the client's AIS.
this type of service {AICPA and CICA, 1999d). The client's WWW server linking to its AIS
Although this research report has described the provides retrieval and delivery services of fin-
continuous audit framework in various aspects ancial information to the public. Finally, as
(e.g. the nature, purpose, scope, and conditions will be discussed later, the CAPM architecture
for a continuous audit) and has identified sig- illustrates how the auditor may conduct a
nificant matters auditors should consider (e.g. system audit and how the company may dis-
planning a continuous audit, collecting and seminate real-time and credible financial
evaluating evidence continuously, and information on its Web site.
reporting), there is still a lack of discussion on There are three layers in the auditor's CAPS:
how to apply modem Internet techniques to the data-capturing layer, the data-analysis
facilitate the implementation of continuous aud- layer, and the data-presentation layer. Each
iting.' In this section, we propose a technically layer is discussed in detail below.
feasible continuous auditing process model
(CAPM) that accommodates the spirit of real- The Data-capturing Layer
time and continuous auditing in an EC environ- This layer provides a bridge between the cli-
ment. ent's AIS and the auditor's CAPS which con-
tains a data-capture function. \
The CAPM extends the PAPM and adopts
the concept of a continuous process auditing sys- (1) The Client's AIS: The AIS consists of a
tem for internal auditing (Halper et ai, 1992; report-generation function, a memory
Kogan et ai, 1996; Vasarhelyi et al, 1991) to buffer, and a gateway to the CAPS. On a
meet the functional requirements of the external continuous basis, the client's AIS generates
continuous auditing process. The CAPM system and stores financial reports (such as the
architecture and its whole envirorunent are receiving report, perpetual inventory suin-
shown in Figure 3. mary, and cash payment summary in our
The overall CAPM operates in a client-server vendor invoice example) and transaction
environment which contains two major compo- log files (e.g. purchasing log, receiving log,
nents: the auditor's continuous auditing process payable log, and cash-disbursement log) in
system (CAPS) and the client's AIS on the the memory buffer. Tlie AlS's gateway
Intranet and WWW server on the Internet. The device retrieves the reports and transaction
client's AIS manages accounting information log files from the memory buffer, adds digi-
and generates financial reports. Three features tal signatures using the client's private key,
of the CAPM are worth noting. First, the cli- puts them into a digital envelope using the
ent's internal control procedures over the acqui- auditor's public key, and then stores the
sition cycle, as depicted in Figure 2, are still encrypted envelope for the auditor's CAPS
appropriate for the CAPM. This is because the to capture or sends it to the CAPS directly.
It also provides firewall and virtual private
networking services to perform access con-
by the AICPA and the CICA, has finished a draft trol for preventing intrusion and main-
on continuous auditing issues. A new auditing stan-
dard, SAS No. 82 {Considerations of Fraud in a Fimm-
taining audit trails as well as to facilitate
ciai Statement Audit), also calls for a continuous type the connection of CAPS to the corporate
of auditing to assist the auditor in preventing and Intranet.
detecting fraud (Landsittel and Bed^ird, 1997). (2) The Data Collector and Capturer: The data
'^ Kogan et al (1999) provide a historical and insti- capturer captures, on a continuous basis,
tutional background about the continuous online
auditing (COA) and lists a series of research issues the client's encrypted digital envelope using
related to COA. data-capturing facilities, opens the envelope
Copyright 2000 John Wiley & Sons, Ltd. tni J. Inteil. Sys. Ace. Fin. Mgmt. 9. 195-216 (2000)

THE IMPACTS OF ELECTRCNIC COMMERCE ON AUDITING PROCESSES 209


Auditor's CAPS
contlnuou*
Data Preaentatlon User Inierface
(alarms and oicepHon
tuito
Laymr
AuMDi'i Momax SyiHm

FeedlMcks Continuous
Audit Sal
ndAudtt
Rvport
Corporate'i AIS
(Include ICS, records.
documantB, forma, (c.)

*IE
Data Analjfaia Layar
Snfm

(seoountinB and aurtfBng

Browse and

Data Capturing Layer


conllnuom
bull
n
WWWuMrs
on udHor'a
raquast*
Outside Parties'
WEB Data Bases
{Vendor, Customer, Bank, etc.)

Figure 3 The CAPM architecture and system environment

using the auditor's private key, and checks The Data-analysis Layer
the digital signatures using the client's pub- This layer consists of an audit database and an
lic key. The original messages in the envel- audit knowledge-based system for supporting
ope (including the financial reports and the verification and analysis of financial reports.
associated transaction log files) will then be Once the validity and authentication of the
stored in the audit database in the data- client's digital envelope in the data-capturing
analysis layer for examinations. Since the layer has been verified, specific fields of the
financial reports and their associated log financial reports and transaction log files are
files are the main inputs to the CAPS, the identified and automatically read into the audit
system's capturing mechanism has to database. Because these retrieved data will be
implement input controls to make sure that: examined and analyzed using the knowledge-
(a) the received data are from the right based system and exception repwrt and alarms
client, (b) the received data are not modified will be generated accordingly when abnormal
or illegally accessed during network trans- activities occur, the data-analysis layer should
mission, and (c) the client cannot repudiate adopt certain control procedures to ensure that
the data transmitted. The data collector col- (a) the transactions comprising the financial
lects relevant information and documents reports and transaction logs are complete, and
from outside parties when further examin- (b) no modification has been made to trans-
ation is needed. actions that have been previously audited. At
Copyright 2000 John Wiley & Sons. Ltd. Int. J. Intel!. Sys Ace. Fin. Mgmt. 9. 195-216 (2000)

210 C-C, YU ETAL


least two control procedures are helpful to fulfil evaluated using these current GAAP and
these goals. First, all transactions that have been auditing standards for checking appropri-
previously audited are marked to ensure that ateness and accuracy. In the vendor invoice
only those that have not been previously exam- example, some typical auditing rules may
ined need to be examined. Only the unmarked appear as:
transactions will be transferred to the audit Rule #1: IF VENDOR_STATUS = "related-
database for further examination. This pro- party" AND ACCOUNTS-PAYABLE
cedure also facilitates the cutoff tests of trans- > $15,000
actions and account balances because the first THEN VENDOR-ALARM = "active".
unmarked transactions in the log files should Rule #2: IF CASH-PAYMENT > $10,000 AND
belong to the period under audit and the last DUPLICATE_CHECK < > "paid"
marked transactions should belong to the pre- THEN DUPLICATE-ALARM
vious audit period. Second, all transaction log "active",
files read into the audit database should be Rule #3: IF (INVENTORY-TURNOVER -
compared with the historical transaction logs 5-YEAR_AVG) < 0.05*(5_YEAK-
already stored in the audit database since the AVG)
last audit (these logs can be regarded as the , , THEN OBSOLETE-ALARM
electronic audit working paper). A 'difference "active",
report' listing differences in the marked trans- Rule #4: IF ACCOUNTS-PAYABLE > $5,000
actions should be generated and sent to the OR PAY-PAST_DUE-DAYS > 30
knowledge-based system for further examin- THEN OUTPUT "Vendor:", VEN-
ation of potential fraud. If the client's AIS pro- DOR, "account payable:",
vides a function of generating update logs that ACCOUNTS-PAYABLE, "days past
summarizes all modifications to the client's due:", PAY-PAST-DUE-DAYS.
audited (or marked) transaction log files, these (2) Auditor's preliminary assessments of
update logs should also be retrieved and stored risks: The knowledge-based system will
in the audit database to be compared with the revise the auditor's preliminary assessments
auditor's 'difference report'. Any disagreement of the overall audit risk, inherent risk, and
between the client's update logs and the audi- control risk periodically or confinuously
tor's 'difference report' may provide strong evi- based on the evaluation results from pre-
dence about the effectiveness of client's internal vious audits.
controls in detecting unauthorized or illegal (3) Descriptions of the best acquisition prac-
modifications to transaction master files. tices: The best acquisition practices in the
The audit knowledge-based system and its asso- client's industry as well as internal control
ciated knowledge base are the core in the structures (e.g. authorized requisition for
CAPS. To support all fundamental analyses, goods, authorized purchase of goods
diagnoses, verifications, and exception according to company policies, receipt of
reporting for a typical acquisition cycle, the goods, approval of items for payments, and
knowledge base and associated audit database cash disbursements) are described in a
should at least include the following: i structured way. Using the ICDL, for
(1) All applicable GAAP and auditing rules: example. Figure 2 can be stored in the audit
These rules are used to link accounting met- database and compared with the best prac-
rics to standards for measurement and Hces to detect substantial weaknesses in the
evaluation. For example, measurement and design of client's internal controls. To facili-
recognition criteria for inventory, accounts tate a system audit on a continuous basis,
payable, and various expenses, level of indi- the knowledge-based system is also struc-
cators, warning messages for evaluating the tured to evaluate the effectiveness of the
system operation, and cutoff tests of client's internal controls. To test whether
accounts payable are included as predefined the client can effectively prevent duplicate
rules. The extracted data are analyzed and payments, for example, the knowledge-
Copyright 2000 John Wiley & Sons. Ltd. Int. J. Inteil. Sys. Ace. Fin. Mgmt. 9. 195-216 (2000)

THE IMPACTS OF ELECTRONIC COMMERCE ON AUDITING PROCESSES 211


based system may randomly select samples duction techniques (e.g. Just-in-Time inven-
from the cash disbursement log and check tory system) requires the negotiation of
whether each selected payment is long-term contracts with major vendors.
accompanied by a 'PAID' seal or code. The The most important contents in a long-term
sample deviation rate will then be com- contract include the qualifications and qual-
pared with the predetermined tolerable ity of goods, terms of payment, delivery or
deviation rate or achieved upper limit to transportation policy, and goods-returning
revise the preliminary control risk assess- provisions. These contract contents serve as
ment which, in turn, determines the detec- guidelines for the knowledge-based system
tion risk. to determine inventory costs and identify
(4) Authorized vendor list and client's related liabilities for purchase commitments.
parties: The knowledge-based system sel- (7) Materiality levels for inventory, accounts
ects purchase transactions and accounts payable, and various expenses: Similarly,
payable balances to verify (a) whether the the knowledge-based system will revise
selected vendors are on the authorized ven- these materiality levels periodically or con-
dor list, (b) whether any selected vendor is tinuously based on the audit results from
a related-party to the client, and (c) whether previous audits.
the account balances are correct. The knowl- (8) Weaknesses and other significant prob-
edge-based system could randomly or judg- lems found: Internal control weaknesses
mental ly select account balances which and other significant problems included in
meet specific criteria (e.g. all accounts pay- the reportable condition letters and audi-
able balances in excess of $5000) and auto- tor's communications to the client's audit
matically send electronic confirmations to committee from previous audits are
those vendors selected with an inquiry recorded. During a system audit, the audi-
about the correctness of the account bal- tor may periodically or continuously use
ances. It should be noted that the requests the knowledge-based system to select ran-
of electronic confirmation and vendors' dom samples from the transaction logs to
responses are transmitted through the data- test whether the client has taken action on
capturing layer, as depicted in Figure 3, by the weaknesses of its internal controls
the dotted line connecting the knowledge- found in previous audits.
based system and the data collector and
capturer. The knowledge-based system In light of the importance of knowledge-
automates much of the selection process based system in the overall CAPS, two pro-
and monitors the correctness of vendor cessing control issues should be addressed.
accounts continuously, rather than at the First, since there are different knowledge bases
end of the year. and audit databases for different clients, the
(5) Analytical review applications and histori- knowledge-based system should ensure that
cal data: To locate a potential misstatement only the correct knowledge base and audit dat-
or to address the completeness in the cli- abase are used for analyzing a specific client.
ent's inventory account, for example, the The system may use a client ID to cross-link
knowledge-based system can compare the the retrieved transaction log files and their
inventory turnover during the audit period corresponding knowledge base and audit data-
with the industry and the client's historical base. Second, the system needs control
statistics over the past five years. Any procedures to ensure that all the unmarked
abnormal decrease (which should be prede- transactions in the log files are analyzed. In
fined in the knowledge base) in the turn- general, batch control totals can help determine
over may suggest a slow-moving or obsol- the completeness of processing unmarked
ete inventory. transactions, in addition to these control issues,
(6) Client's long-term purchase contracts with the knowledge-based system should also have
general control procedures to protect the
major vendors: In general, integrated pro-
Copyright 2000 John Wiley & Sons. Ltd. Int. J. Intell. Sys. Ace. Fin. Mgmt. 9, 195-216 (2000)

212 C.-C. YU ETAL


knowledge bases and audit databases from This seal can be displayed on the client's
being illegally modified or accessed by unau- financial information homepage together with
thorized staff within the CPA firm. Effective links to the auditor's report and other relevant
methods include the use of some authentication information.''^ The Web users who wish to
systems, IC smart cards, or other security- make sure that a company has earned its seal
control mechanisms. can click on the seal itself and go directly to
I an independent authority's Web page (which
The Data-presentation Layer may be similar to VeriSipi) to confirm the com-
This layer provides operational and presen- pany's status as a recipient of the seal. Further-
tational user interfaces for the auditor to more, a few points should be noted for the
browse, navigate, and review final outcome disseminated financial information and the CAS
summaries and related accounting information auditor report. First, since it is almost imposs-
and documents. Alarms will be triggered and ible for a company to disclose a full set of
exception reports be generated if abnormal situ- financial statements every week or month, a
ations occur from comparing transactions business entity will only disclose key financial
against existing standards in the previous data information on its Web site. Second, the audit
analysis layer. For example, if the randomly procedures the auditor carries out for a con-
selected vendor is one of the client's related tinuous audit may not be sufficient to express
parties and its account balance exceeds the pre- an opinion on the fairness of all financial state-
defined upper limit, an alarm will be presented ment items. Third, the audit report should
to the auditor's browser in this presentation identify the subject of the report, indicate the
layer. The auditor will then provide feedback audit procedures performed, state the auditor's
(e.g. an electronic reportable condition letter) findings, discLiim an opinion, and indicate that
to the client's audit committee for improve- the audit report does not extend to the client's
ments or explanation. financial statements taken as a whole.
[n light of the fast growing of real-time fin-
The Continuous Audit Seal (CAS) and Other ancial reporting, the CPA profession does need
Issues new auditing standards to guide the perform-
Once the auditor has examined the exception ance of continuous audits and the issuance of
reports and concluded that there is no material attestation seal and audit report on client's real-
misstatement in the client's financial reports time financial information. Unfortunately, there
and transaction logs, the auditor may attach is still a lack of new auditing rules such as the
credibihty to the client's financial information Continuous Audit seal of attestation, the Continu-
that will be disseminated to the public through ous Audit Principles, and the CAEAS. We believe
the Internet. A Continuous Audit seal of attest- that these areas deserve more comprehensive
ation (which may be similar to the AICPA's exploration to facilitate the continuous auditing
WebTrust seal of assurance) is necessary to in the future. The AICPA and CICA (1999d)
inform the public of the following: report on continuous auditing has clearly indi-
(1) The auditor has examined and evaluated cated the requirements of a continuous audit
whether the financial information posted on and marked a first step effort in this direction.
the client's Web site is in conformity with Ultimately, the CAPM proposed in this sec-
the Contitiuous Audit Principles. tion intends not only to ensure integrity and
(2) The auditor has issued an audit report indi- effectiveness of the entire accounting system
cating that such principles are being fol- but also to guarantee the correctness and use-
lowed in conformity with the generally
accepted electronic auditing standards
(GAEAS). '^ While the CPA WebTruiit seal prnvides periodical
assurance on whether a Web site institutes EC prac-
(3) To whom the seal was issued. tices to protect consumer interests, the Continuous
(4) Where the client awarded the seal is Audit seal attachts continuous credibility to firms'
located. financial information disseminated on the Internet.
Copyright 2000 John Wiley & Sons. Ltd. Int. J. Inteil. Sys. Ace. Fin. Mgmt. 9, 195-216 (20(X))

THE IMPACTS OF ELECTRONIC COMMERCE ON AUDITING PROCESSES 213


fulness of the constantly generated financial invoice applications between the CA and the
statements for public dissemination. Once the vendor. Second, the role and legal responsi-
continuous auditing process is carried out, the bility of the CA at the stage of invoice
transaction trails and the client's AIS operations validation should be specified. Finally, since
can be verified and validated on a continuous companies will disclose their financial infor-
basis, leading to a constant dissemination of mation to the public on a real-time and continu-
financial statements with high credibility. ous basis, there should be a set of generally
accepted electronic principles (GAFP) that specify
the content and format, the time interval and
SUMMARY AND CONCLUSIONS frequency, and the amount and extent of
such disclosures."^
Due to recent advances in network technologies
and the enhancement of cost effectiveness by
using Internet and World Wide Web appli- Acknowledgements
cations, the development and practice of elec-
tronic commerce have grown rapidly. Almost We would like to thank Dan O'Leary, anony-
all major business activities across various busi- mous reviewers of this article, and workshop
ness domains can be set up in the inter- participants at the National Chengchi Univer-
nationalized, virtual, and electronic business sity and the 7th Annual Research Workshop
environment with the aid of Web-based trans- on Artificial Intelligence and Emerging Techno-
action and payment mechanisms. The main logies in Accounting, Auditing and Tax (in
purposes of this paper have been twofold. First, conjunction with the 1998 AAA annual
this study identified possible impacts of EC on meeting) for their valuable comments on an
the auditing practices with a view to future early version of this paper.
development, challenges and opportunities.
New audit risks and internal control consider-
ations were discussed. Second, this paper pro- References
posed two new auditing process models that
incorporate modern network security tech- American Institute of Certified Public Accountants
niques and showed how an audit of a typical (AICPA) and Canadian Institute of Chartered
Accountants (CICA). Electronic Commerce Assur-
acquisition cycle can be conducted in an EC ance Services Task Force. 1999a. WebTrust Prin-
environment. A vendor invoice example was ciples and Criteria for Business-to-Consumer Electronic
provided to demonstrate the approaches for Commerce (February). Version 1.1.
auditing electronic evidence and supporting American [nstitute of Certified Public Accountants
real-time information dissemination. The main (AlCI'A) and Canadian Institute of Chartered
Accountants (CICA). Systems Reliability Task
contribution of this paper is that we propose a Force. 1999b. SysTrust Principles and Criteria for
conceptual framework and corresponding sol- Systems Reliability (July). Version 1.0.
ution processes for validating electronic trans- American Institute of Certified Public Accountants
actions and for conducting external continuous (AICPA) and Canadian Institute of Chartered
auditing in an EC environment. In particular, Accountants (CICA). Electronic Commerce Assur-
ance Services Task Force. 1999c. WebTnist-lSP Prin-
our CAPM provides a first step to answer sev- ciples and Criteria for Internet Service Providers in
eral issues proposed by Kogan et al. (1999) Electronic Commerce (August). Version 1.0.
related to continuous online auditing (COA) (e.g. American Institute of Certified Public Accountants
the architecture of COA, system audit, security (AICPA) and Canadian Institute of Chartered
of COA, and electronic records). Accountants (CICA). Study Group on Continuous
Three regulation issues that have been omit-
ted in our discussion deserve further research. '" Recently, the SEC Practice Section Professional
Issues Task Force released Practice Alert 97-1, Finan-
First, it is important to have legal rules guiding cial Statements on the Internet, to provide general
the separation and designation of duties on guidelines for the dissemination of accounting infor-
the development, modification, and control of mation on the Internet.
Copyright 2000 John Wiley & Sons. Ltd. Int. J. Inteil. Sys. Ace. Fm. Mgmt 9, 195-216 (2000)

214 C.-C. YU ETAL


Auditing. 1999d. Continuous AiidiliTig. The Canad- Total Management Guide, 2nd edn. Van Nostrand
ian Institute of Chartered Accountants: Toronto, Reinhoid: Nev^^ York.
CA. Fellen EW. 1997. Webware security. Communications
American Institute of Certified Public Accountants of the ACM 40(4): April, 130.
(AICPA). 1983. Statement of Auditing Standards, Frook JE. 1995. Web-hit audit system called into
No. 47. Audit Risk and Materiality in Conducting an question. Communications Week. 18 December, 1, 60.
Audit. AICPA: New York. Graham JR. 1996, How to market and sell m a
American Institute of Certified Public Accountants cyberworld. Direct Marketing 59(6): October, 26-27.
(AICPA). 1988. Stalement of Auditing Standards, Gunther LJ. 1994. Implementing EDI in a controlled
No. 56. Analx/tical Procedures. AICPA: New York. environment. IS Audit & Control Journal 2: 42-46.
American Institute of Certified Public Accountants Halper FB, Snively J, Vasarhelyi MA, 1992. The con-
(AICPA). 1995. Statement of Auditing Standards. No. tinuous process audit system: knowledge acqui-
78. Consideration of Internal Control in a Financial sition and representation. EDPACS 20(4): October,
Statement Audit. AICPA: New York. 1-13.
Ansary HJ. 1993. The significance of EDI to corporate Hansen J, Hill N. 1989. Control and audit of elec-
survival in the 1990s. The journal of Electronic Data tronic data interchange. MIS Quarterly December,
Interchange 6(1): 10-13. 403-413.
Bailey AD Jr, Duke GL, Gerlach J, Ko C, Meservy Herringshaw C. 1997. Detecting attacks on networks.
RD, Whinston AB. 1985. TICOM and the analysis / Computer 30(12): December 16-17.
of internal controls. The Accounting Review LX: Jones P. 1992. Essentials of EDI lmi>s. EDI Council of
No. 2, April, 186-201. Canada Library Publication: Toronto, Canada,
Bhimani A. 1996. Securing the commercial Internet. Kalakota R, Whinston AB. 1996. Electronic Commerce:
Communications of the ACM 39(6): June, 29-35. A Manager's Guide. Addison-Wesley: Reading MA.
Borenstein NS cf al 1996. Perils and pitfalls of practi- Klur D. 1997. What an organization should know
cal cybercommerce. Communications of the ACM about using electronic cash. Information Strategy:
The Executive's Journal 13(3): Spring, 15-22.
39(6): June, 36-44.
Bruce DC. 1990. The future of EDI. TIte EDP Auditor Kogan A, Sudit EF, Vasarhelyi MA. 1996. Impli-
cations of Internet technology: on-line auditing
Journal 1: 11-13. and cryptography. IS Audit & Control lournal 3:
Bushaus D. 1991. ED! Billing Standard. Communi- 42-47.
cations Week 13 May. Kogan A, Sudit EF, Vasarhelyi MA. 1999. Continuous
Camp LJ, Sirbu M. 1997. Critical issues in Internet online auditing: a program or research. Journal of
commerce. / Communications Magazine 35: May, Information Systems 13(2): Fall, 87-104,
58-62. Landsittel DL, Bedard JC, 1997. Fraud and the audi-
Canadian Institute of Chartered Accountants (CICA). tor: current developments and ongoing challenges.
1993. D/ for Managers and Auditors. 2nd edn. The Auditor's Report 21(1): Fall, 3 ^ .
CICA: Toronto. Liu C, Arnett KP, Capella LM, Beatty RC. 1997.
Canadian Institute of Chartered Accountants (CICA). Websites of the fortune 500 companies: facing cus-
1996. Audit Implications of EDI. CICA: Toronto. tomers through homepages, information Manage-
Carroll M. 1997. In ter net-commerce security. Byte ment 31(6): January, 335-345.
22(5): May, 40IS25-40IS28. Marcella A, Sampias W, Kincaid J. 1992, Audit and
Chalmer LS. 1990, Data security and control new control issues surrounding electronic data inter-
technology introduces new risks. Journal of change. EDI Foruju 1: 48-52.
Accounting & EDP Winter, 28-30. Marcella A, Chan S. 1993. D/ Security, Control, and
Chan S. 1991. Managing and auditing EDI systems Audit. Artech House: Boston, MA.
development. CMA Magazine November, 12-15. Meier JJ. 1992. EDIA practical approach. CMA
Chang AM, Bailey AD Jr,'whinston AB. 1993. Multi- Magazine September, 29-31.
auditor decision making on internal control system Meservy RD, Bailey AD, Johnson PE. 1986. Internal
reliability: a default reasoning approach. Auditing: control evaluation: a computational model of the
A Journal of Practice & Theory 12(2): Fall, 1-21. review process. Auditing: A Journal of Practice ami
Cobb S. 1996. Auditor, firefighter, lumberjack. IS Theory 6(1): Fall, 44-74.'
Audit & Control lournal 1: 36-39. Panurach P. 1996, Money in electronic commerce:
Cohen JB. 1997. Web audits: a complex art. Editor & digital cash, electronic fund transfer, and E-cash.
PubUsher 30(6): 8 February 24i-27i. Communications of the ACM 39(6): June, 45-50.
Eckerson W. 1991. Car industry mulls move to EDI- Pany K. 1998. ASB update as of May 15, 1998. The
FACT. Network World 27 May. Auditor's Report 21(3): Summer, 3-4.
Elliott RK. 1995. The future of assurance services: Piven J. 1997. Resellers get set for SET. Computer
implications for academia. Accounting Horizon 9(4): Technology Rei'ieiv Spring, 28-31.
December, 118-127. Pyle R. 1996. Electronic commerce and the internet.
Emmelhainz MA. 1993. Electronic Data Interclwnge: A Communications of the ACM 39(6): June, 22-23.
Copyright 2000 John Wiley & Sons, Ltd. Inl. J. Intell. Sys. Ace. Fin. Mgmt. 9, 195-216 (2000)

THE IMPACTS OF ELECTRONIC COMMERCE ON AUDITING PROCESSES 215


Rittenberg LE, Schwieger BJ. 1997. Auditing: Concepts continuous process audit system: a UNIX-based
for a Changing Environment, 2nd edn. Dryden Press: auditing tool. The EDP Auditor Journal 3: 85-91.
New York. Walden I, Braganza A. 1993. EDI: Audit and Control.
Rubin AD, Geer DE Jr. 1998. A survey of Web NCC Blackwell: Oxford.
security. IEEE Computer 31(9): September, 3641. Wise TM. 1989. EDI: progressing toward the paper-
Sivori JR. 1996. Evaluated receipts and settlement at less office. Internal Auditing 5(1): Summer, 75-4J1.
Bell Atlantic. Communications of the ACM 39(6): Wheatman V. 1991. Is X.435 the EDI interconnection
June, 24-28. solution? Nefioork World 1 July, 24.
Tenenbaum JM, Chowdhry TS, Hughes C. 1997. Eco Wright B. 1992. The taxman has spoken: IRS Rule
System: an internet commerce architecture. IEEE 91-59. EDI Forum (Recordkeeping Issue, Special
Computer 30(5): May 48-55. Edition) June, 71-75.
Vasarhelyi MA, Halper F8, Ezawa KJ. 1991. The

Copyright 2000 John Wiley & Sons, Ltd, Int J. Inteil. Sys. Ace. Fin. Mgmt. 9, 195-216 (2000)

216 C,-C. YU ETAL.

Das könnte Ihnen auch gefallen