The increasing role of IT auditors in financial audit: risks and intelligent answers

    Gergő Barta Affiliation


Financial auditing cannot be imagined without the involvement of IT specialists since business processes are designed to be served by IT components such as ERP systems, online customer-facing applications, databases etc. Financial auditors therefore exposed to IT system and control reliance want to gain reasonable assurance that data and transactions stored in IT systems cannot be modified, access is controlled, and there is no suspicion of any fraud at business organizations. The paper tries to understand the current situation of IT audit involvement in financial auditing, interpret risks that parties face and provide some solutions by use of intelligent applications.

Keyword : financial audit, IT audit, IT controls, IT threats, risk management, machine learning

How to Cite
Barta, G. (2018). The increasing role of IT auditors in financial audit: risks and intelligent answers. Business, Management and Economics Engineering, 16, 81-93.
Published in Issue
Jul 13, 2018
Abstract Views
PDF Downloads
Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.


CVE Details. (2018). Microsoft: vulnerability statistics. Retrieved from

EY. (2016). Insights-Driven digital innovation. Retrieved from UAssets/EY-insightsdriven-digital-innovation/$FILE/EY-insights-driven-digital-innovation.pdf

Gartner. (2017a). Hype cycle for artificial intelligence, 2017. Retrieved from

Gartner. (2017b). Predicts 2018: artificial intelligence. Retrieved from

Haugeland, J. (1985). Artificial intelligence: the very idea. MIT Press, Cambridge, Massachusetts.

IFAC. (2009). International Standard on Auditing 200. Overall objectives of the independent auditor and the conduct of an audit in accordance with internation standards on auditing. Retrieved from

ISACA. (2004). IT control objectives for Sarbanes-Oxley. The importance of IT in the design, implemen-tation and sustainability of internal control over disclosure and financial reporting. Retrieved from

Issa, H., Ting, S., & Vasarhelyi, A. M. (2017). Research ideas for artifical intelligence in auditing. The formalization of audit and workforce supplementation. Journal of Emerging Technologies in Accounting, 13(2), 1-20.

KPMG. (2017). Digitalisation in accounting. Study of the Status Quo in German Companies. Retrieved from

KPMG. (2016). The impact of cognitive technology on business and financial reporting. Retrieved from

Kroll. (2015). Global Fraud Report. Vulnerabilities on the Rise. Annual Edition 2015/16. Retrieved from

Li, Y. (2010). The case analysis of the scandal of Enron. International Journal of Business and Management, 5(10), 37-41.

Manara, M., & Cavalleri, A. (2011). 100 Things You Should Know About Authorizations in SAP. Galielo Press Inc., Boston.

McCulloch, W. S., & Pitts, W. (1943). A logical calculus of the ideas immanent in nervous activity. The bulletin of mathematical biophysics, 5(4), 115-133.

MIT. (2016). AI drives better business decisions. Retrieved from

Mohapatra, R. P. (2015). Debugging for functional consultants. Retrieved from

Nillson, N. J. (1998). Artificial intelligence: a new synthesis. Morgan Kaufmann, San Mateo, California.

Norvig, P., & Russell, S. J. (2005). Mesterséges Intelligencia Modern Megközelítésben, Második, átdolgozott, bővített kiadás. Panem Kiadó, Budapest.

Palmas, E. (2011). IT General and Application Controls: The Model of Internalization. ISACA Journal, 5, 1-4.

Raschka, S. (2015). Python machine learning. Packt Publishing, Birmingham.

Statista. (2017a). Ransomware makes up small share of growing malware threat. Retrieved from

Statista. (2017b). Revenue of the Big Four accounting / audit firms worldwide in 2017 (in billion U.S. dollars). Retrieved from

Szatmári, J., Mucsi, L., Nagyváradi, L., Szabó, Sz., Barta, K., Bugya, T., Czigány, Sz., Pirkhoffer, E., Rábay, A., Tobak, Z., Boudewijn, L., Bartus, M., & Szatmári, J. (2013). Modellek a geoinformatikában. TÁMOP-4.1.2.A/1- 11/1 MSc Tananyagfejlesztés.

The Guardian. (2014). Tesco loses £2bn in value as investigation of profit overstatement begins. Retrieved from

The Telegraph. (2017). Petya cyber attack: everything to know about the global ransomware outbreak. Retrieved from