843 resultados para Audit Procedures
Resumo:
A presente pesquisa objetiva verificar se os procedimentos utilizados pela Auditoria Interna na detecção de fraudes em uma empresa privada operadora de planos de saúde permitiram a coleta de evidências confiáveis e suficientes para suportar as conclusões dos auditores sobre os fatos reportados nos relatórios de auditoria interna. Para realização do estudo, adotou-se como estratégia investigativa, o estudo de caso único. As técnicas utilizadas ao longo de toda a pesquisa foram as análises documentais e de conteúdo, baseadas nos objetivos propostos no estudo e na fundamentação teórica. A pesquisa concentrou-se nas análises dos relatórios de auditoria interna que reportaram ocorrências de fraudes na empresa estudada, emitidos nos anos de 2010, 2011 e 2012; contudo optou-se, também, por descrever as rotinas e práticas operacionais relacionadas à atuação do departamento de auditoria que contribuíram para uma melhor compreensão dos dados e do resultado do estudo. Os principais achados demonstram que os procedimentos utilizados pela Auditoria Interna na detecção de fraudes permitiram a coleta de evidências de auditoria confiáveis e suficientes para suportar as conclusões dos auditores. O resultado da pesquisa indica, também, que não existe um padrão de utilização dos procedimentos de auditoria. De acordo com o tipo de fraude e objetivo, o auditor interno deve definir quais os procedimentos de auditoria devem ser utilizados na obtenção de evidências de auditoria confiáveis e suficientes para suportar as suas conclusões.
Resumo:
Dissertação apresentada ao Instituto Superior de Contabilidade para a obtenção do Grau de Mestre em Auditoria Orientado por: Doutor Rodrigo Carvalho
Resumo:
Dissertação para obtenção do grau de Mestre em Engenharia na Área de especialização em Vias de Comunicação e Transportes
Resumo:
Dissertação de Mestrado apresentado ao Instituto de Contabilidade e Administração do Porto para a obtenção do grau de Mestre em Auditoria sob orientação da Doutora Alcina Portugal Dias
Resumo:
Dissertação de Mestrado apresentada ao Instituto de Contabilidade e Administração do Porto para a obtenção do grau de Mestre em Auditoria, sob orientação de Mestre Adalmiro Álvaro Malheiro de Castro Andrade Pereira
Resumo:
o objetivo deste estudo é verificar como a Marinha do Brasil vem buscando atualizar sua prática de auditoria em face da influência advinda das novas formas de atividades da Auditoria Governamental. Elenca, do mais amplo ao mais específico, conceitos básicos à compreensão do tema e faz uma introdução histórica da situação da Auditoria Governamental até o início da década de 90. Como metodologia, levanta o material escrito existente sobre o assunto, relacionando leis, normas, livros e artigos produzidos nos anos 90 e o compara com aquele em uso pela Marinha do Brasil e com a observação das práticas de auditoria no estudo de caso do Centro de Reparos e Suprimentos Especiais do Corpo de Fuzileiros Navais (Cresumar). Conclui com um quadro expondo em que grau as tendências da Auditoria Governamental se refletem na Marinha e apresenta algumas questões a serem estudadas posteriormente.
Resumo:
o objetivo deste estudo foi explorar a relação existente entre a li teratura sobre procedimentos de auditoria de PED e os procedimentos efetivamente utilizados pelas seis empresas de auditoria contábil no Brasil. Bus cou-se identificar a diferença entre os procedimentos de auditoria de PED utilizados pelas empresas nacionais e os utilizados pelas empresas de ori gem estrangei ra (Capitulo I). Na revisão de literatura, apresentam-se os atuais conhecimentos so bre a auditoria externa em empresas que utilizam sistemas complexos de com putador e as perspectivas previsiveis para o futuro (Capltulo 11). A seguir, apresenta-se a metodologia utilizada, justificando-se as razões de seu emprego neste tipo de estudo exploratório (Capltulo lU). Entrevistas utilizando um questionário contendo,em sua maioria, que~ tões abertas, possibilitaram uma descrição dos procedimentos de auditoria externa empregados pelas empresas de auditoria em clientes que utilizam computador (Capitulo IV). Os resultados obtidos possibilitaram uma análise dos procedimentos de auditoria de PED utilizados pelas seis empresas de auditoria pesquis~ das (Capitulo V). Finalmente, relacionando-se os resultados ã literatura existente, sao apresentadas conclusões, formuladas recomendações e sugeridos novos es tudos (Capitulo VI).
Resumo:
O Tribunal de Contas da União (TCU) fiscaliza as concessões públicas federais há mais de 20 anos. Quais os efeitos desse controle? Esta dissertação buscou verificar se a atuação do TCU inibe o surgimento de inovações em contratos de concessão pública. Por meio de uma análise qualitativa e quantitativa de dados referentes a contratos fiscalizados pelo TCU de 1993 a 2014, identificamos indícios de que um maior grau de intervencionismo do TCU está associado a uma menor quantidade de inovações em concessões públicas. Por outro lado, o aumento da burocracia nos processos de fiscalização do TCU não vem representando um obstáculo significativo para o surgimento de inovações nessa espécie de contrato.
Resumo:
The importance of establishing controls that allow you to diminish the inherent risk that has the data contained in a database make necessary implement audit procedures. Two types of audits applicable to the database exist essentially, the audit of object and the audit of transactions, some system database manager provide mechanisms for the first type, whereas to make the audits of transaction, is necessary to create our own procedures or to go to solution of third.
Resumo:
The safety, effectiveness and capabilities of therapeutic upper fibreoptic endoscopy in children undergoing therapeutic endoscopic procedures (n = 443) was studied. Therapy for gastrointestinal bleeding formed the major group (injection sclerotherapy for varices, n = 197 procedures; thermocoagulation for haemorrhagic gastritis, n = 1; and photocoaulation for Dieulafoy's disease, n = 1). Sclerotherapy was 97% effective in controlling acute bleeding and 84% effective in obliterating varices with no serious complications or deaths. Oesophageal dilatations for surgical, caustic, congenital and peptic strictures and achalasia (n = 193) were performed with no oesophageal perforations or deaths. Foreign bodies were retrieved (n = 34) with no failures or complications. Percutaneous endoscopic gastrostomy was performed (n = 11) with one failure, proceeding to an unsuccessful surgical gastrostomy. Miscellaneous procedures included endoscopic transpyloric tube placement (n = 5) and endoscopic diathermy of pyloric web (n = 1). Therapeutic fibreoptic endoscopy is therefore concluded to be safe and effective in children, replacing rigid oesophagoscopy and some traditional surgical approaches.
Resumo:
Description based on: June 30, 1979.
Resumo:
"December 1982."
Resumo:
The purpose of this project is to develop a Policy and Procedures Manual as a written guidance for applicable and required procedures to identify processes which will improve the effectiveness of risk management, control, and governance process through the Department of Internal Audit of the South Carolina Office of the State Treasurer's Internal Audit functions.
Resumo:
This research used the Queensland Police Service, Australia, as a major case study. Information on principles, techniques and processes used, and the reason for the recording, storing and release of audit information for evidentiary purposes is reported. It is shown that Law Enforcement Agencies have a two-fold interest in, and legal obligation pertaining to, audit trails. The first interest relates to the situation where audit trails are actually used by criminals in the commission of crime and the second to where audit trails are generated by the information systems used by the police themselves in support of the recording and investigation of crime. Eleven court cases involving Queensland Police Service audit trails used in evidence in Queensland courts were selected for further analysis. It is shown that, of the cases studied, none of the evidence presented was rejected or seriously challenged from a technical perspective. These results were further analysed and related to normal requirements for trusted maintenance of audit trail information in sensitive environments with discussion on the ability and/or willingness of courts to fully challenge, assess or value audit evidence presented. Managerial and technical frameworks for firstly what is considered as an environment where a computer system may be considered to be operating “properly” and, secondly, what aspects of education, training, qualifications, expertise and the like may be considered as appropriate for persons responsible within that environment, are both proposed. Analysis was undertaken to determine if audit and control of information in a high security environment, such as law enforcement, could be judged as having improved, or not, in the transition from manual to electronic processes. Information collection, control of processing and audit in manual processes used by the Queensland Police Service, Australia, in the period 1940 to 1980 was assessed against current electronic systems essentially introduced to policing in the decades of the 1980s and 1990s. Results show that electronic systems do provide for faster communications with centrally controlled and updated information readily available for use by large numbers of users who are connected across significant geographical locations. However, it is clearly evident that the price paid for this is a lack of ability and/or reluctance to provide improved audit and control processes. To compare the information systems audit and control arrangements of the Queensland Police Service with other government departments or agencies, an Australia wide survey was conducted. Results of the survey were contrasted with the particular results of a survey, conducted by the Australian Commonwealth Privacy Commission four years previous, to this survey which showed that security in relation to the recording of activity against access to information held on Australian government computer systems has been poor and a cause for concern. However, within this four year period there is evidence to suggest that government organisations are increasingly more inclined to generate audit trails. An attack on the overall security of audit trails in computer operating systems was initiated to further investigate findings reported in relation to the government systems survey. The survey showed that information systems audit trails in Microsoft Corporation's “Windows” operating system environments are relied on quite heavily. An audit of the security for audit trails generated, stored and managed in the Microsoft “Windows 2000” operating system environment was undertaken and compared and contrasted with similar such audit trail schemes in the “UNIX” and “Linux” operating systems. Strength of passwords and exploitation of any security problems in access control were targeted using software tools that are freely available in the public domain. Results showed that such security for the “Windows 2000” system is seriously flawed and the integrity of audit trails stored within these environments cannot be relied upon. An attempt to produce a framework and set of guidelines for use by expert witnesses in the information technology (IT) profession is proposed. This is achieved by examining the current rules and guidelines related to the provision of expert evidence in a court environment, by analysing the rationale for the separation of distinct disciplines and corresponding bodies of knowledge used by the Medical Profession and Forensic Science and then by analysing the bodies of knowledge within the discipline of IT itself. It is demonstrated that the accepted processes and procedures relevant to expert witnessing in a court environment are transferable to the IT sector. However, unlike some discipline areas, this analysis has clearly identified two distinct aspects of the matter which appear particularly relevant to IT. These two areas are; expertise gained through the application of IT to information needs in a particular public or private enterprise; and expertise gained through accepted and verifiable education, training and experience in fundamental IT products and system.