Research Article Open Access

Designing a Generic Information Systems Audit Framework to Improve the Quality of Audit in Higher Education

Elfadil A. Mohamed1, Elgilani El. Elshareif2 and Omer Ishag Eldai Mohamed3
  • 1 Ajman University, United Arab Emirates
  • 2 Canadian University, United Arab Emirates
  • 3 University of Hafr Al-batin, Saudi Arabia

Abstract

There are some similarities between Financial Statement Audit (FSA) and Information Systems Audit (ISA). FSA is an examination of the reliability and integrity of financial statement records, whereas ISA is a review and evaluation of the controls, risks and system development within an information systems infrastructure to ensure that the safeguards protect against abuse, protect assets, maintain data integrity and operate effectively to achieve the organization's objectives. Decision makers need to ensure a reliable collection and evaluation of the evidence of an organization's information systems, practices and operations. Data manipulation can be caused by external or internal threat. Internal manipulation threat is the most dangerous because it is committed by authorized personnel, which makes it very difficult to detect. In particular, the framework introduces an anomaly detection technique, a data mining method, to determine if the suspected transactions arose from internal or external threats. Once the suspected transactions are identified, procedures and monitoring controls will be in place to minimize each threat. The proposed framework is expected to help university and ministry of higher education managers at all levels to make vital decisions based on reliable and accurate information.

Journal of Computer Science
Volume 15 No. 5, 2019, 664-672

DOI: https://doi.org/10.3844/jcssp.2019.664.672

Submitted On: 1 October 2018 Published On: 10 May 2019

How to Cite: Mohamed, E. A., Elshareif, E. E. & Eldai Mohamed, O. I. (2019). Designing a Generic Information Systems Audit Framework to Improve the Quality of Audit in Higher Education. Journal of Computer Science, 15(5), 664-672. https://doi.org/10.3844/jcssp.2019.664.672

  • 4,178 Views
  • 1,664 Downloads
  • 1 Citations

Download

Keywords

  • ISA Framework
  • Data Mining
  • Outlier Technique
  • Higher Education