HALLMARK FEATURES ix
Flowcharts and Graphs
Detailed flowcharts and graphs help students visualize important processes.
2-8 Chapter 2 p rofessionalism and professional responsibilities
Step 1: Identify Threats CPAs interact with clients in a number of circumstances. CPAs
need to be alert to a possible relationship or situation that might cause a threat to their com-
pliance with ethical rules. The following is a discussion of seven common threats that CPAs in
public practice should be alert to, irrespective of the services the CPA is engaged to perform.
• Adverse interest threat. An adverse interest threat is the threat that a CPA will not
act with objectivity because the CPA’s interests are opposed to the client’s interests. For
example, an adverse interest threat exists if a client has expressed an intention to begin
litigation against the CPA regarding the quality of tax work previously performed.
• Advocacy threat. An advocacy threat is the threat that a CPA will promote a client’s inter-
ests or position to the point that his or her objectivity or independence is compromised. For
example, an advocacy threat exists if the CPA provides expert witness services to a client in
litigation or in a dispute with a customer regarding a licensing arrangement. Once the CPA is
advocating for a client, the CPA is no longer objective. An advocacy threat would also exist if
a firm acts as an investment adviser to an officer or director of a client.
• Familiarity threat. A familiarity threat is the threat that, due to a long or close rela-
tionship with a client, a CPA will become too sympathetic to the client’s interests or too
accepting of the client’s work or product. For example, a familiarity threat would exist if
a CPA’s immediate family member were employed by the client in a key position (such
as the CFO). A familiarity threat would also exist if a former partner or professional
employee of an audit firm joined the client as its CFO and had knowledge of the firm’s
policies and practices for the audit engagement.
• Management participation threat. A management participation threat is the
threat that a CPA will take on the role of client management or otherwise assume man-
agement responsibilities. For example, a CPA may have a small business client, and the
owner asks the CPA’s firm to do various bookkeeping services for the client. Providing
bookkeeping services may cause the CPA to make various management decisions, which
is a threat to the firm’s objectivity and independence. This may also put an accounting
firm in a position of auditing its own work.
• Self-interest threat. A self-interest threat is the threat that a CPA could benefit,
financially or otherwise, from an interest in, or relationship with, a client or persons asso-
ciated with the client. For example, a self-interest threat exists when a CPA has a financial
adverse interest threat the
threat that a CPA will not act
with objectivity because the
CPA’s interests are opposed to the
client’s interests
advocacy threat the threat that
a CPA will promote a client’s
interests or position to the point
that his or her objectivity or
independence is compromised
familiarity threat the threat
that, due to a long or close
relationship with a client, a CPA
will become too sympathetic
to the client’s interests or too
accepting of the client’s work or
product
management participation
threat the threat that a CPA
will take on the role of client
management or otherwise assume
management responsibilities
self-interest threat the threat
that a CPA could benefit, financially
or otherwise, from an interest in,
or a relationship with, a client or
persons associated with the client
Decline or
terminate
engagement
Threats
identified
Step 3
Identify
and apply
safeguards
Threats
significant
No
Yes
Proceed
with
engagement
Threats not
significant
No threats
identified
Are threats
at an acceptable
level?
Step 4
Evaluate the
efectiveness
of safeguards
Step 2
Evaluate
significance
of threats
Step 1
Identify
threats
Step 5
Document
threats and
safeguards
applied
ILLUSTRATION 2.2
Conceptual framework
flowchart
c02ProfessionalismAndProfessionalResponsibilities.indd 8 7/23/21 8:43 AM
3-18ChApteR 3 Risk Assessment part I: Audit Risk and Audit Strategy
• Significant subjectivity in measurement of financial information.
• Significant unusual transactions.
As part of risk assessment, auditors will document the identified inherent risks for the client,
including documenting which risks are considered significant. Knowing where the risks are
greatest assists the auditor in planning the best procedures for the audit.
Control RiskAfter assessing IR, the second step is to gain an understanding of the cli-
ent’s system of internal controls. The client should have controls in place to minimize the
risk of material misstatement caused by inherent risks. The auditors gain an understand-
ing of internal controls for the purpose of assessing control risk. Control risk (CR) is the
risk that a client’s internal controls will not prevent or detect a material misstatement on
a timely basis.
Illustration 3.7 shows inherent and control risks for a jewelry store. An inherent risk
for jewelry inventory is that it is susceptible to theft from both customers and employees. If
jewelry is stolen without the client knowing, the inventory account will be overstated because
stolen goods would remain recorded in the client’s records. The client knows that jewelry is
susceptible to theft; therefore, the client has put controls in place to minimize the risk of theft.
The control risk for this client would be the risk of one or more of these controls failing and
jewelry stolen without client management knowing.
control risk (CR) the risk that
a client’s system of internal con-
trols will not prevent or detect a
material misstatement on a
timely basis
Inherent Risk
3-1-8Contrl-r RContinisik-I tL8-n Rn U-STnArl-r RConOkkRsr n
1t88nL-nRl-Ci O -Nnt.nk8t-r ntinsrO1OC-nR.n U-n U-ST
Control Risk
p(ikn(oRru)krliruoEI rliIo)x rR I)nlktrIEe nERrEixrErR I)nlktrf)Enx7
hlRdr(mr(i r(nre(n r(mrk3 rI(ikn(oRrmElolifrEixrlis ik(nt
a lifrRk(o irClk3()krk3 rIol ikrdi(Clif7
ILLUSTRATION 3.7
Example of inherent and control risks
Note that IR and CR are the client’s risks and exist separately from the audit of the
financial statements. In other words, the auditors have no control over a client’s inherent
and control risks. Inherent risk is driven by industry, economic, and client factors that
are out of the control of the auditor. Control risk is impacted by the client’s design and
implementation of internal controls, which are also out of the auditor’s control. These two
risks combine to form the RMM.
c03RiskAssessmentPartI.indd 18 8/19/21 1:41 PM
The Professional Environment
Professional Environment features provide in-depth discussions
of how concepts in a chapter are applied in the business world.
5-20 CHAPTER 5 A udit Evidence
Using the Work of Internal Auditors
The role of the internal audit function was introduced in Chapter 1. Internal auditors are
employees of the client who perform assurance and consulting activities designed to evaluate
and improve the eff ectiveness of the entity’s governance, risk management, and internal con-
trol processes. Not every client will have an internal audit function. For example, small and
medium-sized companies, especially private companies, may not have the resources to staff
an internal audit function. But if the client does have an internal audit function, what role,
if any, do the internal auditors play in the fi nancial statement audit? According to AU-C 610 internal auditors employees
of the client who perform assur-
ance and consulting activities
designed to evaluate and improve
the eff ectiveness of the entity’s
governance, risk management,
and internal control processes
Cloud 9 - Continuing Case
Josh will take responsibility for obtaining a specialist’s opinion on
the derivatives. He knows that W&S Partners has other staff (who
are not part of the audit team) who can provide additional expertise.
However, because he believes the accounts are so material to the
audit and derivatives have become such a big issue in audits in recent
years, he deems an external specialist’s opinion is also required. He
has some experience of using a derivatives specialist on prior audits,
and he also plans to ask Jo Wadley (the partner) to recommend a
suitable specialist.
Josh plans to investigate any possible connections between
the specialist and Cloud 9 that could adversely impact the special-
ist’s objectivity before engaging him for this audit.
Professional Environment Working with IT Auditors
Specialist IT auditors are often used in audits of clients with com-
plex information technology (IT) environments because the eff ec-
tive audit of the IT systems contributes to overall audit quality.
Large audit fi rms usually have such specialists within the fi rm, but
smaller audit fi rms could engage external IT consultants for this
part of the fi nancial statement audit. In general, reliance on an
IT specialist is appropriate when the fi nancial statement auditor
complies with the conditions of AU-C 620.
If the IT expert and the fi nancial statement auditor do not
work well together, audit quality can be impaired. For this rea-
son, researchers have investigated the factors that aff ect the way
that fi nancial statement auditors work with specialist IT auditors.
Brazel
12
reviewed this research evidence and drew the following
conclusions. First, responses from fi nancial statement auditors in
the United States who were surveyed about their experiences with
IT auditors indicated that they believe IT auditors’ competence
levels vary in practice. Financial statement auditors also said that
IT auditors appear to be overconfi dent in their abilities in some
settings, and questioned the value provided by IT auditors to the
fi nancial statement audit.
Second, Brazel suggests the research shows that both fi nan-
cial statement auditors’ IT ability and experience and the IT audi-
tor’s competence aff ect how these two professions interact on an
audit engagement. This indicates that audit fi rms need to ensure
that staff training and scheduling produce appropriate combi-
nations of fi nancial statement auditors and IT auditors on an
engagement.
Finally, Brazel argues that the research fi ndings demon-
strated that auditors need to consider the implications of fi nding
a balance between greater software-assisted audit techniques
training for financial statement auditors and greater use of IT
specialists for overall audit effi ciency and eff ectiveness.
The role of IT audit specialists could grow to become even
more than a support function for auditors. Some researchers
suggest that in e-businesses, the external fi nancial statement
auditor’s authority will be challenged by IT audit specialists be-
cause of technological change and its impact on auditing.
13
In
e-businesses, economic transactions are captured, measured,
and reported on a real-time basis without either internal human
intervention or paper documentation.
14
Auditing is likely to be-
come more real-time and continuous to refl ect the pattern of the
transactions. If traditional auditors are unwilling or unable to
adapt to the new environment, their role could be taken over by
IT specialists.
Other developments such as reporting using XBRL (eXten-
sible Business Reporting Language) provide challenges for au-
ditors as they have to adapt their techniques and approaches to
audit fi nancial information that is disaggregated and tagged. Us-
ers can extract and analyze XBRL data directly without re-entry
and the tag provides additional information about the calculation
and source of the data. This means auditors have to recognize that
their clients are reporting fi nancial data with diff erent levels of
information and users might have greater expectations of the data.
Learn more about XBRL at www.xbrl.org.
12
J. F. Brazel. “How do fi nancial statement auditors and IT auditors work together?” The CPA Journal,
November, 2008, pages 38–41.
13
A. Kotb, C. Roberts, & S. Sian. “E-business Audit: Advisory Jurisdiction or Occupational Invasion?” Critical
Perspectives on Accounting 23, no. 6 (2012), pages 468–82.
14
Kotb et al., 2012.
c05AuditEvidence.indd Page 5-20 1/15/19 9:44 PM f-1241 /208/WB02435/9781119401810/ch05/text_s
Audit Decision-Making
Framework
Each chapter concludes with an Audit
Decision-Making Example that takes stu-
dents through specific steps of the audit
process while offering solutions to issues
presented throughout the example.
Obtain Company Background Information and Dat
a
You have been assigned to the audit of inventory for a private company that owns and operates a chain
of retail jewelers. The company’s sales revenue has grown by 300% in the last two years, primarily
by acquisitions. Seventy-eight percent of the value of the company’s inventory is in wedding rings,
diamonds, gold necklaces, and high-end watches. Because the company has grown through acqui-
sition, the company has not yet brought two acquired companies (representing 35% of sales) under
the company’s inventory system. As a result, the company is currently operating with three different
inventory-control systems. The core inventory system being used by the retail stores represents 65%
of sales. Sixty percent of inventory was tested in the prior year and controls over the existence of
inventory were effective.
The CFO’s top priority is to put all retail operations under this one inventory-control system by the
end of the fiscal year (January 31). He is particularly concerned about lower-than-expected gross margins
at some of the acquired stores, and he expects that better inventory control will improve this situation. In
addition, gold prices have risen 15% in the last 12 months, and the company is making sure it is not selling
“conflict diamonds” illegally traded to fund conflict in war-torn areas of Africa. Your responsibility is to
develop an audit strategy for testing the existence of inventory.
?What Is the Audit Problem You Are Trying to Solve?
The focus of attention in this instance is to develop an audit strategy for testing the existence of inventory.
The auditor may develop a different audit strategy for testing the valuation of that inventory.
Gather Information and Evidence
Important information includes:
• A significant portion of the inventory is high in value, small in size, and susceptible to theft.
• Although internal controls may be strong overall, there is risk they may not be operating effectively and uniformly in some locations.
• The weak gross margins in some stores may be evidence of inventory shrinkage or theft.
• Fraud risk may be high in some locations due to the opportunity offered by weak internal
controls.
• The auditor needs to determine how internal controls affect audit strategy and whether the auditor
wants one audit strategy for part of the inventory and another audit strategy for another part of the
inventory.
Perform the Analysis and Evaluate the Results
Analysis of risk:
• Inherent risk factors include valuable inventory that is subject to theft and misappropriation.
• Internal controls are not uniform. Based on the prior year’s evidence and a preliminary understand-
ing of the system in the current year, strong internal controls appear to operate over only 60% of
the inventory.
• It may be more efficient to physically inspect inventory as of one date and use one audit strategy for
all inventory testing.
• Fraud risk is considered to be high at locations where inventory controls are not strong.
!
Draw an Audit Conclusion
• Inherent risk is set at the maximum because inventory is high in value and susceptible to theft and misappropriation.
• Control risk is set at high, as 40% of inventory may not have sufficient internal controls.
• Fraud risk is considered high due to the opportunity offered by weak internal controls.
• These risk settings result in setting detection risk at low.
• Low detection risk impacts the nature, timing, and extent of substantive procedures. For exam-
ple, the auditor will plan testing of the physical existence of inventory at year-end, select a larger
number of locations to visit, and vary the extent of inventory testing at each location depending on
internal controls over the counting of inventory at each location.
Audit Decision-Making Example
Audit Decision-Making example 3-35
c03RiskAssessmentPartI.indd 35 7/23/21 8:20 AM
Real-World Illustrations
Many illustrations, such as working
papers and confirmations, present
documents that students will en-
counter in a real-world audit.
5-32 Chapter 5 a udit evidence
The trial balance is then referenced into the appropriate lead and supporting schedules where
audit work is documented for each account in the trial balance. At Bell & Bowerman, LLP,
the trial balance is referenced using the letter “A”; cash and cash equivalents in various banks
are referenced into the C Lead; accounts receivable are referenced into the E Lead; inventory
accounts are referenced into the F Lead; property, plant and equipment are referenced into
the K Lead; and so on.
The first working paper example is the cash and cash equivalents lead schedule
in Illustration 5.15. The purpose of this lead is to summarize all general ledger accounts that
are combined into the cash and cash equivalents account on the financial statements. The
lead schedule also has adjusting journal entries, if any, that are proposed by the auditor. In the
top-left corner of the lead schedule are the client name, period-end, and currency unit (in this
example, balances are rounded to the nearest thousand dollars). In the top center of the lead
schedule is section identification (C). In the top-right corner, details of the working paper pre-
parer and reviewers are documented. Next, details of the cash and cash equivalents balance
are listed. For each item listed in the lead schedule, the following are noted.
• General ledger account number, per the client records.
• General ledger account name, per the client records.
• Preadjusted balance, any adjustments, and the audit-adjusted current-year balance per
the client’s trial balance (TB).
• The prior-year balance, per the prior-year audit file (PY).
• Variance and percentage change, the calculated difference between the prior-year and
current-year balances.
• The cross-reference to the working paper where supporting documentary evidence is
kept for each balance (e.g., C02).
The final section of the lead working paper includes any relevant background information
about the account and comments based upon completed testing.
ILLUSTRATION 5.15 Working paper example: Cash lead schedule
Bell & Bowerman, LLPClient: New Millennium Ecoproducts
Period-end: 12/ 31/2025
Currency un it: $000
C–LEAD
Reference: C-Lead
Prepared by: KM 1/21/2026
Reviewed by: SO 1/22/2026
Reviewed by: MM 1/24/2026
Lead schedule:
Account
no. Account name
Pre-
adjusted
balance
12/31/2025 Adjustments
Adjusted
current-y ear
balance
12/31/2025
Prior-year
balance
12/31/2024 Variance Ref
Cash in Bank: We lls Fargo $ 11,000 $0 $ 11,000 TB PY 5% C01
Cash in Bank: U.S. Bank 134 0 134 TB PY 0% C02
Cash in Bank: Barclays 126 0 126 TB PY 0% C03
Cash in Bank: C itigroup 56 0 56TB PY 12% C0410400
10500
10100
10200
10300
Short -Term Deposits 5,796 0 5,796 TB PY 4% C05
Total Cash and Cash
Equivalents
$17,112 $0 $17,112
$ 10,500
134
126
50
5,600
$16,410
$500
0
0
6
196
$702 4%
Key to audit tick marks (TM):
TB Agrees to client’s trial balance.
PY Agrees to prior-year audit file.
Background: No si gnificant changes in banks or bank accounts from the prior period. Note: Analytical review on movements in the cash flows has
been performed on the cas h flow schedul e — see A1.1.
Comments: Cash and cash equivalents: In line with budget and c hange c onsistent with level o f activity for the period (see also our review of the
statement of cash flows referenced in A1.1). Short-term deposits : Although the balance is very consistent with previous period, inclusion of
short-term deposits within cash and cash equivalents is accept able (refer to C5).
%
Variance
c05AuditEvidence.indd 32 7/23/21 8:20 AM
Real-World Examples
Audit Reasoning Examples apply chapter
concepts in brief real-world scenarios that
students might encounter in a professional
environment. They also provide real-world
company examples of chapter concepts.
Professional Skepticism and Audit Risk 3-15
Professional Skepticism
Auditors have a responsibility to plan and perform an audit with professional skepticism.
Professional skepticism is an attitude adopted by auditors when conducting all phases of the
audit. It means that auditors remain independent of the entity, its management, and its staff
when completing the audit work. In a practical sense, professional skepticism means au-
ditors maintain a questioning mind and thoroughly investigate all evidence presented by the
client (AS 1015.07). For example, AU-C 200.A22 states auditors should be skeptical if any of
the following arise during the audit:
• Audit evidence recently gathered that is contradictory to other evidence previously gathered.
• New information that brings into question the reliability of client documents or responses
to auditor inquiries.
• Conditions that may provide evidence of possible fraud.
• Situations that indicate the need for additional audit procedures beyond what is required
by generally accepted auditing standards.
Does maintaining professional skepticism mean auditors should assume client manage-
ment is being dishonest? The answer is no. Auditors should not assume management is dis-
honest, but at the same time, auditors should not assume management is always honest or
correct. Using professional skepticism means that even if auditors believe management and
those charged with governance are being honest, they should gather reliable evidence to sup-
port management’s responses to auditor inquiries and to support amounts and disclosures
in the fi nancial statements. Throughout all phases of the audit, auditors should keep these
questions in mind when gathering audit evidence: Is this information reliable? Do we need to
perform more audit procedures? When auditors exercise professional skepticism during the
risk assessment phase, it helps to ensure they are using appropriate assumptions when devel-
oping their audit strategy that will be used in the risk response phase. In the reporting phase,
auditors use professional skepticism when evaluating the evidence gathered and forming an
opinion that the fi nancial statements are presented fairly.
professional skepticism an
attitude that includes a question-
ing mind, being alert to condi-
tions that may indicate possible
misstatement due to fraud or
error, and a critical assessment of
audit evidence
Audit Reasoning Ex ample Professional Skepticism
An auditor was auditing a recreational vehicle (RV) dealership. The auditor had obtained some
initial fi nancial information from the client showing unaudited results for the end of the third
quarter. Sales were up and profi t margins were up, making it the best year so far for the client.
Interim records showed that inventory was also up, and the client’s inventory records showed over
300 RVs on hand at the end of the third quarter. The audit senior went to talk to the audit man-
ager about the good news and the client’s performance. The audit manager asked the senior a key
question. “You did the inventory observation last year. How many RVs did the client have then?”
“I think it was about 210,” the senior replied. Then the audit manager asked, “How full was the lot
last year?” The senior replied that it was “almost overfl owing” the year before. The manager then
said, “Let’s look at this more skeptically. I don’t think they have storage capacity for another 90
RVs even though sales are up. There could be an error in the inventory records. This information
makes me believe that the existence of inventory is a very high inherent risk.”
Audit Risk
Audit risk is the risk that an auditor expresses an inappropriate audit opinion when fi nancial
statements are materially misstated (AU-C 200 Overall Objectives of the Independent Auditor
and the Conduct of an Audit in Accordance With Generally Accepted Auditing Standards and
AS 1101 Audit Risk). This means the audit report states the fi nancial statements are presented
fairly, in all material respects, when in actuality the fi nancial statements contain a material
error or fraud. While it is impossible to eliminate audit risk, auditors aim to reduce it to an
c03RiskAssessmentPartI.indd Page 3-15 24/01/19 9:35 PM F-0590 /208/WB02435/9781119401810/ch03/text_s
3-28 CHAPTER 3 Risk Assessment Part I
• Ongoing losses.
• Rapid growth.
• Poor cash fl ows combined with high earnings.
• Pressure to meet market expectations and profi t targets.
• Planning to list on a stock exchange.
• Planning to raise debt or renegotiate a loan.
• The client being about to enter into a signifi cant new contract.
• A signifi cant proportion of remuneration tied to earnings (that is, bonuses or stock options).
Audit Reasoning Ex ample Fraud at Toshiba: Part I
You may be familiar with Toshiba Corporation, a publicly traded Japanese company headquar-
tered in Tokyo that makes consumer electronics, household electronics, offi ce equipment, and more. In July 2015, the CEO of Toshiba announced he was resigning amid an accounting scandal
in which profi ts had been overstated for the past seven years by approximately $1.9 billion (224.8
billion yen). What incentives and pressures were involved that led to the fraud? The technology
industry is extremely competitive and Toshiba’s upper management set aggressive profi t targets.
The home electronics and appliances division was showing losses and the memory chip division
was feeling pressure because of decreasing demand from Chinese electronics companies.
6
As an
example, in September 2012, the head of the digital products and service division was told by the
CEO to improve a 24.8 billion yen loss into a 12 billion yen profi t in just three days!
7
Think about
how the external auditor would learn about the incentives given to lower-level management. How
might an internal auditor learn about these incentives? Opportunities to Perpetrate a Fraud
After identifying one or more incentives or pressures to commit a fraud, auditors assess
whether a client’s employees have an opportunity to perpetrate a fraud. Auditors utilize their
knowledge of how other frauds have been perpetrated to assess whether the same opportuni-
ties exist at the client. While the examples below of opportunities to commit a fraud suggest
a fraud may have been committed, their existence does not mean a fraud has defi nitely oc-
curred. Auditors must use professional judgment to assess each opportunity in the context of
other risk indicators and consider available evidence thoroughly.
Examples of opportunities that increase the risk that a fraud may have been perpetrated
include:
• Accounts that rely on estimates and judgment (discussed further in Chapter 9).
• A high volume of transactions close to year-end.
• Signifi cant adjusting entries and reversals after year-end.
• Signifi cant related-party transactions (discussed further in Chapter 4).
• Poor corporate governance mechanisms.
• Poor system of internal control (discussed further in Chapters 6 and 8).
• A high turnover of staff with accounting or internal control responsibilities.
6
E. Pfanner and M. Fujikawa, M. “Toshiba Slashes Earnings for Past Seven Years,” The Wall Street Journal,
September 7, 2015. https://www.wsj.com/articles/toshiba-slashes-earnings-for-past-7-years-1441589473
7
K. Nagata. “Pressure to show a profi t led to Toshiba’s accounting scandal,” The Japan Times, September 18,
2015. http://www.japantimes.co.jp/news/2015/09/18/business/corporate-business/pressure-to-show-a-profi t-
led-to-toshibas-accounting-scandal/#.WNJjNmQrLjA
c03RiskAssessmentPartI.indd Page 3-28 24/01/19 9:35 PM F-0590 /208/WB02435/9781119401810/ch03/text_s
Conceptual Illustrations
NEW situational art helps students
conceptualize auditing concepts.
Johnson_FM.indd 9 8/24/21 9:42 AMGet Complete eBook Download By email at
[email protected] Get Complete eBook Download By email at
[email protected]