Information Systems Audit Framework to Improve the Quality of Audit in Higher Education in East Africa
Journal: Open Journal for Information Technology (Vol.3, No. 2)Publication Date: 2020-12-01
Authors : Jeremiah Osida Onunga;
Page : 53-62
Keywords : ISA Framework; data mining framework; anomaly detection technique; higher education.;
Abstract
There are some similarities between Financial Statement Audit (FSA) and Information System Audit (ISA). FSA is an examination of the reliability and integrity of financial statement records whereas ISA is a review and evaluation of the controls, risks, and system development within an Information system infrastructure to determine if the information systems are safeguards to protect against abuse, safeguards assets, maintains data integrity, and operates effectively to achieve the organization's going concern objective. Decision makers need to ensure that the process of collecting and evaluating evidence of an organization's information systems, practices, and operations are reliable. Data manipulation can be caused by external or internal threat. Internal manipulation threat is the most dangerous one because it is committed by authorized personnel which make it very difficult to be detected. In particular, the framework introduces an anomaly detection technique, one of the data mining methods, to determine the suspected transactions arise from both internal and external threat. Once the suspected transactions are identified, procedures and monitoring control will be in place to minimize each threat. The proposed framework is expected to help both universities and ministry of higher education managers at all levels to make a vital decision based on reliable and accurate information in East Africa.
Other Latest Articles
- Information and Communications Technologies as a Driver of Effective Internal Communication
- Using 360˚ Videos for Teaching Volleyball Skills to Primary School Students
- Social Inequalities and ICT Teacher’s In-Service Training
- MFF: Performance Interference-Aware VM Placement Algorithm for Reducing Energy Consumption in Data Centers
- Traffic Policy towards the Current of Refugees and Subscribers Movement in Reforming State Sovereignty
Last modified: 2023-01-08 05:59:59