Rabu, 26 Juni 2019

AUDITING 2 INDIVIDUAL ASSIGNMENT

SPKN 2017
(Regulation of BPK RI Number 1 Year 2017)


The State Financial Examination Standard (abbreviated as SPKN) is a benchmark for examining the management and responsibility of state finances. The State Financial Examination Standard is stated in the form of Inspection Standard Statement (PSP). The State Financial Inspection Standards are used by the Supreme Audit Agency as a guideline in auditing financial statements.

In order to audit (checking) duty, BPK have been arranged audit standard for the first time at years 1995 which called Government Audit Standard (SAP). Nowadays, the constitutional and policy in audit keep moving continuesly so it causing at years 2007 BPK  arranging audit standard which called as State Financial Audit Standards (SPKN).  Thus, there are 3 sub-standars in audit standard based on UU Number 15 Years 2004 as the following :
1.      General Standard 
2.      Audit Implementation Standard 
3.      Audit Report Standard
The development of international audit standard in nowadays change from rule-based standards into principle-based standards. So that’s why SPKN 2007 is not appropriate anymore implement in this era. At beginnning years of 2017, BPK success finishing the amandment or correction for SPKN 2007 and applied as Regulation of BPK number 1 years of 2017. The content in this new regulation (BPK number 1 years of 2017) almost same with SPKN 2007 in which consist of :
a.       First attachment about Conceptual Framework
b.      Second attachment PSP 100 about General Standard
c.       Third attachment PSP 200 about Audit Implementation Standard
d.      Fourth attachment PSP 300 about Audit Report Standard

The first attachment is audit conceptual framework in which disscussion detail about general representation, elements, the principle, the development, and the relationship among conceptual framework, state regulation, audit standard and others certainty. In general representation of state financial audit there are disscuss regulation about mandate, independency, authority, definition, scope, types, benefit, transparency and accountability of state financial. Then next, the elements of state financial audit disscussing about the parties, subject matter and the information about it, audit criteria, audit evidence, audit result report, continuation controll of audit result.
Thus, the principle of state financial audit consist about ethics code, quality controll, management and skill of audit team, audit risk, materiality, audit documentation,and audit communication. Conceptual framework is not applying the certainty and audit procedures because it is regulated in audit standard but developed according with the conceptual framework and state regulation.
Declaration of audit standard (PSP) 100 is about general standard for doing the financial audit, performance audit, and PDTT. This general standard related to :
a.       Ethics
b.      Independency
c.       Integrity
d.      Professionalism
e.       Quality control
f.       Competence
g.      Consideration of non-compliance ,Fraud, and disobedience
h.      Audit communication and documentation
i.        examination in the implementation and reporting of examination results
j.        relationship with professional standards used by public accountants as well as obligations Government Internal Oversight Apparatus and public accountants in the examination state finances.

The detail explanation can be viewed at page 23 in SPKN 2017 (Regulation of BPK number 1 years 2017).
Declaration of audit standard (PSP) 200 is about audit implementation standard which  regulates the responsibilities of the auditor in carrying out the audit which includes :
1.      Planning
2.      Collecting evidence
3.      Development inspection findings
4.      Supervision
The purpose of implementing this standard is to planning the quality checks to be implemented efficiently and effectively, then designing and carrying out inspection procedures to obtain sufficient and appropriate evidence. The detail explanation can be viewed at page 41 in SPKN 2017 (Regulation of BPK number 1 years 2017).
Declaration of audit standard (PSP) 300 is about audit report standard which regulate the mandatory to making the audit result report for financial audit, performance audit, and PDTT. The audit result report (LHP) has several functions like in the following :
a.       Communicate the results of the examination to the party authorized parties based on applicable laws and regulations
b.      Avoid misunderstanding of the results of the examination
c.       Making results examination as material for carrying out corrective actions by the parties responsible
d.      Facilitate follow-up monitoring for determine the effect of the corrective action that should be taken.

The purpose of the Auditor implementing this reporting standard is to make a conclusion of the audit results based on the above evaluation proof of examination obtained and communicate the results of the examination to the parties concerned. The detail explanation can be viewed at page 56 in SPKN 2017 (Regulation of BPK number 1 years 2017).
In the final explanation of this regulation there are also provided the example illustration of all audit opini (unqualified, qualified, adverse, and disclaimer). This regulation can access in the legal website of BPK in www.bpk.go.id.

AUDITING 2 GROUP ASSIGNMENT


Group Members :
Rifda Nadifah                                      (C1I016020)
Fatikhah Geya Rizki Syah Putri          (C1I016035)
Safira Ulfa                                           (C1I016049)
Khoirunnisa Abidah                            (C1I016050)
 

Top Five Fraud Axioms IT Auditors Should Know
 
  
1  .      Professional Skeptism
Professional skepticism is a critical component of an auditor's duty of care that applies throughout any engagement.  It's an attitude that includes a questioning mind and a critical assessment of the appropriateness and sufficiency of audit evidence.  It requires being alert to conditions that may indicate possible misstatement due to error, neglect or fraud, and a critical assessment of audit evidence.
Therefore One of the first things with which IT auditorscneed to get comfortable is the realistic view of th scope of fraud. According to the Association of Certified Fraud Examiners (ACFE), the total loss from fraud in any one year in the US is between 5 and 7 percent of gross revenues, with the latest statistic estimating total losses in the US economy at almost US $1 billion. So, the conclusion is twofold: Fraud has a vast scope, and it can happen anywhere. Therefore, it is important to be consistent with professional skepticism. Also, the fraudster (white-collar criminal) is usually someone that is least suspected. In fact, fraudsters frequently do not look like crooks at all. Statistical profiles of white-collar criminals describe them as tending to be tenured at the entity, in a trusted position because they earned the trust of management, and relatively well educated.2 Again, professional skepticism is necessary to prevent one from being fooled, and, even then, there is a chance a fraudster can get away with a crime.
      In the International Standards on Auditing 200 (IAASB, 2009) too emphasized the importance of professional skepticism. It was stated that the auditor must plan and carry out the audit process based on scepticism professionals by being aware of possible material errors financial statements. The auditor's work is always related to proof and search for the truth of the evidence from documents and working papers, and from the procedure the standards they adhere to, but this does not mean the auditor only works to fulfill existing standard procedures, especially when important evidence is found, because without the courage to compete arguments about management assertions, the auditor will not be able to run its function as prevention and detection of fraud (Financial Reporting Council,2010). For this reason, the auditor must be able to apply the right level of professional skepticism.
2.      Toe In The Water
Toe in the water means trial and error, like a finger dipped in water to test and find out the temperature of the water. One theory of fraud suggests that fraudsters begin their slippery slope into crime with a “test.” That is, they put together a fraudulent transaction or event and “float” it out into the entity’s environment to see if they can get away with the fraud.

If they get a notification, they will apologize "oops, I made mistake" to defend themselves and cover up their actions. and if they don't get a notification they will continue the fraudulent action. IT Auditors must know actions like this and must be able to handle them properly, for example if the IT Auditor encounters irregularities, then the IT Auditor must meet the responsible party and follow up firmly. The IT auditor should exercise due diligence in obtaining independent verification where feasible and
should obtain it before approaching the party responsible for the transaction, where feasible—
Especially where circumstances increase suspicion. For example, in one fraud case, the auditor came to the responsible party and asked why a certain account amount was exactly double what it should have been. The accounting clerk stuttered, having been surprised, and the auditor himself gave the person an opportunity to use the “oops” defense, as he said to her, “You must have accidentally double paid the vendor.” In reality, it was a fraud scheme and not an overpayment.
3.    Escalation Of The Crime
Most fraudsters who get caught tend to escalate their crime. the fraudster who floats the test and finds that it goes unnoticed will decide to take more from the victim. That can be done by committing more fraudulent transactions in a shorter period of time, taking larger amounts in each transaction or adding a new scheme. But, this escalation is good news to those looking for evidence of fraud because it makes it easier to discover. for example IT Auditors can see from a significant increase in purchases from one vendor suspected of having a red flag.
4.      Tip From Iceberg
Often, fraud is discovered accidentally as the result of a deliberate procedure. In such cases, usually clever auditors see an event or transaction (for example, a check worth US $ 2,000), become suspicious for one reason or another (often described by experts as a "smell test"), and choose to dig deeper (for example, to find dozens of other checks totaling US $ 400,000 and other fraud schemes). This is the "tip of the iceberg" theory or what we often know as iceberg theory. The understanding of the tip of the iceberg theory states that behavior is determined by the subconscious which contains instincts or natural instincts and human biological impulses.
While in the unconscious mind we can never see the biggest part of the human mind. If this is related to the theory of success, we cannot argue that someone usually gets success after making various choices of actions or words that can be seen or actually done as in the theory of decision making in psychology.
Psychological conditions that are not always seen by Freud are divided into three structures of human consciousness, namely: conscious, conscious (unconscious), unconscious.
a.     Conscious
At this level, awareness contains all the things that have been observed at a certain time. It's just that a small part of mental life (memory, perception is fulfilled by things, feelings and thoughts) that will enter into this level of consciousness.
In all processes that occur at this level of consciousness (memories, perceptions, feelings and thoughts) are the results of screening which is regulated by stimulus and will not last long. So that the mental processes that occur will then be suppressed and enter into prejudice (preconscious) or unconscious (unconscious).
b.    Consciousness
Awareness or preconscious is part of available memory, where at this level it becomes a bridge between conscious and unconscious. Because its function is to become a bridge then at the level of the prasadar contains material that comes from conscious (unconscious) (unconscious).
When what has happened and experienced is no longer observed, all processes will be moved into the prasadar then then unconscious. But at any time, memories from the unconscious can appear to the preamble in symbolic form in the form of dreams, wrong speech or reflex movements and self-defense mechanisms.
c.     Unconscious
This part is the deepest level of the structure of human consciousness according to Freud. In particular, according to Freud he proved that unconsciousness is not hypothetical abstraction but an empirical reality.
On this unconscious level or more commonly known as the human subconscious it contains instincts or instincts, stimuli, natural impulses brought by humans from birth, and traumatic experiences that can be repressed or suppressed from the conscious level to the unconscious. All mental processes that are suppressed into unconscious thinking can last long and can affect human behavior without realizing it.
This certainly becomes a symbol that the ice that is always on the surface of the water will only leave a few parts that appear to the surface and most are below the surface of the water. This is the same as the level of human consciousness where more mental processes occur at the unconscious level and only a few are at the conscious level in the psychology of communication.
Ice which is mostly below the surface of the water is likened to the level of human unconscious thinking, while the parallel part of the ice on the surface of the water is the level of prejudice and ice that is at the top of the surface of the water is human consciousness.
In addition to dividing this mental process into three levels of consciousness, in its development Freud also divided the process of dynamics of human psychology into three important components that are interrelated and related to each other in producing behavior.
For example, if an IT auditor pays attention in data that an employee receives two checks in one pay period for the same gross amount and company policy does not allow more than one check per payment period, that would be an anomaly (red) flag). Someone might give reasons that sound legitimate for duplication ("oops"), but IT auditors should consider tracing these facts to see if there is more fraud and / or suspicious data there.
This concept extends to the invention of fraudsters. It is very common for fraudsters who are caught and choose to confess, recognizing the amount of fraud known to date, or a number far below the actual number (that is, claiming to be at the tip of the iceberg or significantly smaller than the entire iceberg). Obviously, fraudsters hope the victims will stop looking for and deal with lower amounts. For example, fraudsters can decide that it is easier to claim to be US $ 30,000 and repay it, rather than recognizing the actual US $ 400,000 fraud. Thus, IT auditors and fraud investigation teams must consider a thorough fraud audit to determine the amount of loss independent of the fraudster, to the extent practicable. Subsequent fraud audits will likely benefit from data mining and data analysis by IT auditors.
5.  Data Mining And Analysis
Data can be invaluable in a fraud investigation. Proper data mining and data analysis can lead to a proper description of the fraud, how it took place, what controls were thwarted, the approximate level of loss and even who committed the fraud. So the IT auditor can play an invaluable role in gathering data, mining it, analyzing it, and providing the lead investigator with evidence and information. Also, the IT auditor can be an invaluable resource to convert the mass of data into something that a judge or members of a jury can easily understand and assimilate into their thought processes (e.g., charts, diagrams, other high-tech visual aids).
But, usually, the data alone are insufficient to make a case, even if it is a corporate investigation. A court case will likely require more than just the data. Therefore, the IT auditor needs to work closely with the lead investigator and others on the investigation team, as the team will likely need to conduct interviews and perform other tasks to collect more evidence and information.
Witten and Frank defined data mining as the process of discovering patterns in data. The process must be automatic or (more usually) semi automatic. The patterns discovered must be meaningful in that they lead to some advantages, usually an economic advantage. The data is invariable present in substantial quantities. In other words, we could describe data mining as the use of sophisticated data search in order to discover patterns and connections in large pre-accessible databases.

In general, data mining techniques can be classified into two categories according to the type of the machine learning techniques as:
1)    Supervised Learning for Fraud Detection
This method uses supervised learning in which all the available records are classified as „fraudulent‟ and „non-fraudulent‟. Then machines are trained to identify records according to this classification. However, these methods are only capable of identifying frauds that has already occurred and about which the system has been trained.
2)   Unsupervised Learning for Fraud Detection
This method only identifies the likelihood of some records to be more fraudulent than others without statistical analysis assurance.
Fraud possibilities co-evolve with technology, esp. Information technology Business reengineering, reorganization or downsizing may weaken or eliminate control, while new information systems may present additional opportunities to commit fraud.
Traditional methods of data analysis have long been used to detect fraud. They require complex and time-consuming investigations that deal with different domains of knowledge like financial, economics, business practices and law. Fraud often consists of many instances or incidents involving repeated transgressions using the same method. Fraud instances can be similar in content and appearance but usually are not identical.
The first industries to use data analysis techniques to prevent fraud were the telephone companies, the insurance companies and the banks (Decker 1998). One early example of successful implementation of data analysis techniques in the banking industry is the FICO Falcon fraud assessment system, which is based on a neural network shell.
Retail industries also suffer from fraud at POS. Some supermarkets have started to make use of digitized closed-circuit television (CCTV) together with POS data of most susceptible transactions to fraud.

Conclusion
The IT auditor has a key role in fraud detection, prevention and investigation in today’s business world. It is important for the IT auditor to understand the key aspects of antifraud as it relates to IT audit. This knowledge could help the IT auditor be prepared to recognize a piece of fraud evidence, develop a sense of red flags and understand how certain fraud schemes are perpetrated. These five issues are a start in developing the knowledge and skills to be effective at detecting and investigating frauds.