Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Prepared by Anthony Wilson for ACCG358 Semester 1, 2019 1 ACCG358 INFORMATION SYSTEMS AUDIT AND ASSURANCE Department of Accounting and Corporate Governance IS Audit Report Important note: • This is an...

1 answer below »
Prepared by Anthony Wilson for ACCG358 Semester 1, 2019


1
ACCG358
INFORMATION SYSTEMS AUDIT AND ASSURANCE
Department of Accounting and Corporate Governance



IS Audit Report
Important note:
• This is an individual assignment. You must complete the task independently. If you submit a
eport that is similar to any of your classmate’s reports it will be considered academic
dishonesty.
• Refer to the Macquarie University Academic Honesty Procedure and associated documents.
• Please also refer to the submission instruction as per unit guide.

Estimated student workload: 30 hours

Task

Failures of, or
eakdowns in IS controls can sometimes be revealed in highly public and
emba
assing circumstances for the company or organisation concerned. Conduct a web search on
ecent (in the past 3 years) IS events to find an interesting case study, such as news articles in relation
to IS risks.

You will need to attach the original version of the case study or provide the URL link to the original
case in the appendix when you submit the assignment. Uniqueness of the case study should be
considered by students as it is more difficult to differentiate your work against many others using the
same case.

You are to assume that you are an IS external auditor, and as such, have prepared an IS audit plan and
eport to the management of your client (i.e. the company at the centre of the case study). Assume the
event in the case study has occu
ed and you are conducting an audit after the event to identify
weaknesses in the control environment and make appropriate recommendations.

The document must include the following:

1) Executive Summary
You will need to prepare an executive summary document (0.5-page maximum) suitable for
presentation to the board of directors of the affected organisation.

2) Background to the Case
Provide the background to the client’s business and computerised environment. This is to demonstrate
your understanding of the client’s business and IS environment.

3) IS Risks
Identify IS risks from the case study, including analysing the likelihood, level of risks and
implications to the business. This should include not only the risks that eventuated in the case study
ut any other risks you identify in the organisation’s IS environment.

4) Audit Plan, Objectives and Procedures
Prepare an audit plan outlining the areas that you propose to audit. In addition, you will need
to include audit objectives and audit procedures for each of the area(s) that you plan to audit.
Prepared by Anthony Wilson for ACCG358 Semester 1, 2019


2

5) Audit Questions and Documents
For each of the audit objectives, provide at least three examples of interview questions that you
will use to gather evidence from the client’s employees, including naming relevant documents that
you may want to obtain for the audit.

6) Control Recommendations
Provide recommendations of control mechanism(s) to mitigate each of the IS risks identified in part 3.
Identify the benefits of your recommendations to your client, and if there is significant expense
involved in implementing your recommendation, the justification for this expenditure.

Required

Write a report that addresses all of the above sections.

• Format requirements: “Times New Roman” size 12 with 1.5 line spacing, approximately
XXXXXXXXXXwords in total (not including references). You must include the total of words used
in your report. The report should have appropriate headings and subheadings (including the
Executive Summary for the Board and your recommendations).
• You must acknowledge the use of the work of others (e.g. the academic journal articles on
which your report is based) using the Harvard referencing style (see
http:
www.lib.mq.edu.au
esearch
eferencing.html). Any ideas or quotations must be
co
ectly cited in the body of your report and a reference list must be provided at the end of
your report.
• Once you have submitted your report, check the originality report in turn-it-in and ensure
similarity with other sources is referenced. You can resubmit your report until the due date.
• Please note that the originality report for a resubmission takes 24 hours to be produced. Please
ensure that you allow adequate time, if you are considering resubmission.
• Review the marking ru
ic on the following page so that you understand the expected
standards and how you will receive feedback.

Submission

• Students will need to upload their assignment to http:
ilearn.mq.edu.au (Turn-it-in) by
11:59 pm Friday 12th April (week 7). Otherwise your assignment will be considered late.
• Late assignments must also be submitted via Turn-it-in.

Penalties

• Late tasks will be accepted up to 72* hours after the submission deadline. There will be a
deduction of 20%* of the total available marks made from the total awarded mark for each
24-hour period or part thereof that the submission is late (for example, 25 hours late in
submission – a 40% penalty will apply).

* This penalty does not apply for cases in which an application for an extension has been
approved.


Prepared by Anthony Wilson for ACCG358 Semester 1, 2019


3
Marking Criteria
The following criteria are how IS audit report will be marked.

Not attempted
Fail Pass Credit Distinction High Distinction
1) Selection of
the case study
and risk
analysis (30%)
No attempt,
or
the answer
is copied or
substantially
copied from
materials or
other
sources.
Poor selection of
the case study.
Report indicates
poor or no
understanding of
the case study
and its
associated risks.
Average selection
of the case
study. Report
indicates some
understanding
of the case
study and its
associated
isks.
Good selection of
the case study.
Report indicates
good
understanding of
the case study
and its
associated risks.
Good selection of
the case study
showing several IS
issues.
Report indicates
high level of
understanding of
the case study
and
its associated
isks.
Unique case study
selection
epresenting
many IS issues.
Report indicates
in‐depth
understanding of
the case study
and
comprehensive
isk analysis.
2) Critical
analysis of the
case, quality of
audit plan and
ecommendation
to target
audience.
(50%)
No attempt,
or
the answer
is copied or
substantially
copied from
materials or
other
sources.
Report indicates
poor or no
understanding of
an audit plan and
inappropriate
ecommendation
to target
audience.
Report
indicates some
understanding
of an audit plan
and provides an
appropriate
ecommendation
to target
audience.
Report indicates
good
understanding of
an audit plan and
is able to provide
multiple
appropriate
ecommendations
to target
audience.
Report indicates
high level
understanding of
audit plan and
able to provide
many appropriate
ecommendations
to target
audience.
Report indicates
advanced
understanding of
audit plan and
able
to provide
appropriate
ecommendations
for all risks
identified to
target audience.
3) Structure of
the text
(10%)
No attempt,
or
the answer
is copied or
substantially
copied from
materials or
other
sources
Report does not
follow the
structure given
and information
is not generally
clearly organised
within each
section.
Report mostly
follows the
structure given
and
information is
generally
clearly
organised
within each
section.
Report follows
the structure
given and
information is
generally clearly
organised within
each section.
Report follows
the structure
given and
information in
each section is
organised in a
clear and logical
way.
Report follows the
structure given
and information
in each
section is
presented in a
clear logical way
that supports the
overall point
argument of
that section.
4) Professional
presentation
including
formatting,
spelling,
grammar,
eferencing
(10%)
No attempt,
or
the answer
is copied or
substantially
copied from
materials or
other
sources
Presentation is of
a very poor
standard, with
numerous
e
ors /
inconsistencies.
Presentation is
of a basic
standard, with
some
formatting,
spelling,
grammar,
eferencing
e
ors /
inconsistencies
Presentation is of
a good standard,
with infrequent
formatting,
spelling,
grammar,
eferencing
e
ors/
inconsistencies.
Presentation is of
a very good
standard,
with little or no
formatting,
spelling,
grammar,
eferencing
e
ors/
inconsistencies.
Presentation is of
a professional
standard, with
little or no
formatting,
spelling,
grammar,
eferencing
e
ors/
inconsistencies.
Answered Same Day Mar 12, 2021 ACCG 358

Solution

Pranjal answered on Mar 24 2021
144 Votes
IS AUDIT REPORT: CASE STUDY OF AMAZON
Table of Contents
1.0 Executive Summary    3
2.0 Background to Case    4
2.1 Overview of the Organisation and its IT Environment    4
2.2 Overview of Case Scenario    4
3.0 IS Risks    6
4.0 Audit Plan, Objectives and Procedures    8
4.1 Audit Plan    8
4.2 Audit Objectives    8
4.3 Audit Procedures    9
5.0 Audit Questions and Documents    11
6.0 Control Recommendations    13
6.1 Recommendation for Electronic Threats    13
6.2 Recommendation for Human E
or    13
6.3 Recommendation for Infrastructure Failure    13
References    14
1.0 Executive Summary
Information System (IS) may be considered to be one of the most crucial and success-critical aspects of business operations. In today’s complex and technologically advanced business world, proper functioning of IS within the business operations is of paramount importance. Therefore, the management must take due care with respect to the existence, functioning and effective running of the given system within with operation (Peltier, 2016). In this context, the need of IS audit has also been felt widely and the IS auditors have gained much prominence because of their contribution towards their roles in terms of checking the usefulness and efficiency of the IS within the business framework. The given piece of paper
iefly describes the concept of IS audit in the context of real-world business, Amazon.
The structure of the paper has been manifold and organised to provide a smooth reading experience and insight into the theoretical as well as practical aspects of the topic. At the very outset of the study, the researcher provides a
ief introduction to the topic followed by the background of the case study chosen for the given purpose. In the latter part of the study, the researcher attempts to evaluate the IS risks embedded within the given case and identifies the process and system loopholes. In addition, the audit plan with objectives has also been chalked out based on the risk assessment. In the last part of the paper, the researcher provides a
ief questionnaire that may be applicable in the given case scenario. Finally, the control recommendations have been provided based on the findings and analysis thereof.
2.0 Background to the Case
2.1 Overview of the Organisation and its IT Environment
Amazon Inc (hereinafter may be refe
ed to as “Amazon”, or the company, as the case may be) is a multinational technology company based in the USA. The company specialises in e-commerce, cloud computing and artificial intelligence service (AI) and may be considered as one of the largest online retailers across the world. As per the Fortune 500 global list, Amazon ranks top as an internet company in the world in terms of its market capitalisation of $177,866 million in the year 2018 (Fortune, 2019).
As for it's business and information technology (IT) environment is concerned, the e-commerce segment has been one of the primary business segments for the firm and the platform acts as a medium between end users and also the business houses (Whittaker and Constine, 2018). In other words, the company is engaged in both B2B (Business to Business) and B2C (Business to Consumer) framework.
2.2 Overview of the Case Scenario
The case study revolves around one of the incidents confirming IS security
each caused in Amazon in the year 2018. The issue consisted of disclosing customer's sensitive data on the website of Amazon. It was observed that due to a technical e
or, as confirmed by the management of Amazon, later on, some of the customers' name and emails address were being displayed on the official website of Amazon without the knowledge of anyone from Amazon for the same. The issue persisted for a few days before it was resolved (Brignall, 2018). The management of Amazon assured that there is no need to change the email address or password for any of the customers. In order to explain the issue, the management stated that the issue was primarily attributable to...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here