Understanding Risk assessment in audit planning

audit planning and risk assessment case study

  • 70 Comments
  • Published on Dec 4 2023

Understanding Risk assessment in audit planning

Table of Contents

Definition of risk assessment in audit planning, the fundamentals of risk assessment, understanding the components of risk in audit, risk assessment procedures, risk assessment for ensuring audit effectiveness, challenges in risk assessment, strategies for overcoming challenges, become a certified information system auditor, final thought.

Risk assessment in audit planning is a crucial step in the auditing process, involving the careful evaluation of potential risks that could impact the success and reliability of an audit. Risk assessment essentially means identifying, analyzing, and understanding the various factors that may affect the outcome of an audit engagement. It's like a detective's work before solving a case – anticipating potential challenges and pitfalls.

In the world of audits, this process is essential to pinpoint areas where errors, fraud, and cybersecurity threats might occur. By clearly defining what risks might be present, including those related to cybersecurity planning , auditors can tailor their strategies accordingly, ensuring a more focused and effective approach to risk mitigation. Essentially, risk assessment acts as the compass, guiding auditors through the maze of financial data and potential cybersecurity challenges to ensure a thorough and reliable examination.

In this blog, we will delve into the fundamentals, components, and procedures of risk assessment, shedding light on its pivotal role in the effectiveness of the entire audit process. Let's embark on this journey to demystify the world of risk assessment in audit planning.

In the world of auditing, understanding Risk Assessment is like to having a reliable compass for navigating the intricate landscape of financial examination. To embark on this journey effectively, it's crucial to grasp the fundamental principles that underpin risk assessment in audit planning.

Risk assessment in audit planning-1

Before auditors jump into the nitty-gritty of risk assessment procedures and audit planning, a solid understanding of these fundamental concepts is paramount. Why? Because it forms the bedrock of a successful audit. Imagine trying to navigate a city without understanding cardinal directions—it would be challenging and prone to errors.

By grasping these fundamentals, auditors are better equipped to tailor their audit plans, ensuring they are attuned to the unique risks each business faces. In the next section, we will delve into the specific procedures that bring these principles to life.

In the realm of audit planning and Risk Assessment in Audit Planning , a crucial aspect is understanding the various components of risk that play a pivotal role in ensuring the reliability of the audit process. Let's delve into these components:

Identifying Key Components of Risk

Audit, at its core, faces three primary components of risk:

Inherent Risk

Inherent risk is like the DNA of a business; it's the risk that exists even if everything is operating as it should. This could be due to the nature of the industry, economic conditions, or the complexity of certain transactions. For instance, if a business operates in a volatile market, the inherent risk would be higher.

Control Risk

Now, imagine a set of traffic lights controlling the flow of cars. Control risk is akin to assessing how effective these traffic lights are in preventing accidents. It's the risk that the internal controls of a company may not catch or prevent errors or fraud. If a company lacks robust internal controls, the control risk is higher.

Detection Risk

Detection risk is about the auditor's ability to spot mistakes or irregularities during the audit. Think of it as the sharp eyes of a detective scanning through evidence. If an auditor is not thorough in their examination, detection risk increases, and potential issues may go unnoticed.

Interplay of These Components in the Audit Process

In the time of audit, these components interact dynamically. Imagine a delicate balance beam routine at the Olympics:

High Inherent Risk

The auditor recognizes a business operating in a high-risk industry. This means they need to be extra cautious and thorough in their audit procedures.

High Control Risk

If internal controls within a company are not up to snuff, the auditor may need to adjust their audit plan to account for this increased risk.

High Detection Risk

If an auditor's procedures are not meticulous, there's a risk they might miss critical errors or fraudulent activities during the audit.

Navigating through the intricacies of risk assessment, risk analysis, and audit planning with precision is key to a successful audit.

In the realm of audit planning, Risk Assessment Procedures play a pivotal role in ensuring a thorough and effective examination of financial statements and processes. These procedures serve as the compass, guiding auditors through the complex terrain of potential risks.

Risk assessment in audit planning-2

  • Risk Identification

Risk Identification marks the starting point of the audit journey. Auditors systematically unearth and recognize risks that could impact the accuracy of financial statements. These risks can stem from various sources, including internal processes, external market conditions, or regulatory changes.

  • Risk Analysis

Once risks are identified, the next step is Risk Analysis . Here, auditors delve deeper to understand the nature and magnitude of each risk. This involves evaluating the likelihood of occurrence and the potential impact on the financial statements. By assigning a level of significance to each risk, auditors prioritize their focus during the audit.

  • Risk Response

Armed with a comprehensive understanding of identified risks, auditors proceed to Risk Response. This phase involves developing strategies to mitigate or manage the identified risks. It's about crafting a tailored approach to address each risk, ensuring that the audit process remains robust and effective.

  • Ongoing Risk Assessment

Importantly, risk assessment isn't a one-time endeavor confined to the planning phase. Ongoing Risk Assessment is a continuous process that unfolds throughout the audit engagement. Auditors remain vigilant, adapting to changes in the business landscape and promptly addressing emerging risks.

Incorporating advanced tools and technologies, auditors can streamline these procedures, enhancing efficiency and precision. According to a survey by the Association of Certified Fraud Examiners, 80% of respondents reported that technology has had a positive impact on their ability to detect and prevent fraud during the audit process.

In the world of auditing, success hinges on a fundamental process: Risk Assessment. This critical step doesn't just tick a box; it's the compass guiding the entire audit journey. Let's delve into how a meticulous risk assessment isn't just a protocol but a key to unlocking more effective and streamlined audits.Top of Form

Strategic Insight

Risk assessment isn't a checkbox exercise; it's a strategic tool. It provides auditors with specialized lenses, allowing them to focus on the nuanced landscape of challenges and opportunities within an organization.

Components of Risk

Understanding the intricacies of risk components, such as inherent risk, control risk, and detection risk, gives auditors a tailored perspective and a comprehensive view of potential pitfalls.

Roadmap for Focus

A robust risk assessment isn't arbitrary; it's a roadmap. It guides auditors to concentrate on areas of genuine significance. Studies show that audits guided by thorough risk assessment are 25% more likely to meet their objectives.

Questioning for Precision

It's more than ticking boxes. A comprehensive risk assessment empowers auditors to pose the right questions: What threats exist to the organization's financial health? Where do internal controls need strengthening?

Efficiency Boost

Efficiency is the ally of effectiveness. A focused risk assessment doesn't just elevate audit quality; it streamlines the entire process. Organizations practicing effective risk assessment report a 15% reduction in audit time .

In essence, risk assessment isn't a bureaucratic hurdle; it's the secret ingredient to audit triumph. It provides clarity of vision, guides auditors with precision, and ensures each audit isn't merely a task completed but a mission accomplished.

Risk assessment is a crucial step in audit planning, but it comes with its fair share of challenges. Identifying and overcoming these challenges are essential for conducting effective and reliable audits.

Risk assessment in audit planning-3

  • Lack of Data Accuracy : One common hurdle is the availability and accuracy of data. In many cases, auditors may encounter incomplete or outdated information, making it difficult to assess risks accurately.
  • Subjectivity in Risk Perception : Another challenge is the subjective nature of risk perception. Different team members may have varied views on the severity of a risk, leading to potential discrepancies in the assessment process.
  • Dynamic Business Environments : Rapid changes in the business environment can pose challenges in risk assessment. Industries are evolving, and auditors must adapt to new technologies, regulations, and market trends.
  • Inadequate Communication : Poor communication among audit team members and with the client can impede the risk assessment process. Clear communication is vital to understanding the nuances of the business and potential risks involved.
  • Resource Constraints : Limited time and resources can hinder a thorough risk assessment. In a fast-paced business world, auditors may face pressures to complete assessments quickly, potentially overlooking critical details.

Challenges in risk assessment and audit planning are part of the audit landscape, but auditors can proactively address these issues with effective strategies. Here are practical solutions to navigate common challenges associated with risk assessment, risk analysis, and audit planning:

  • Data Quality Improvement: To combat issues related to data accuracy in Risk Assessment, auditors should advocate for regular data quality assessments. Establishing protocols for data validation and verification ensures that the information used in Risk Analysis and audit planning is reliable.
  • Standardized Risk Criteria: Addressing the subjectivity in Risk Perception involves implementing standardized risk criteria. Developing a clear framework with predefined risk categories and severity levels helps align the team's understanding of risks during Audit Planning and Risk Assessment.
  • Continuous Training and Education: In the face of dynamic business environments, ongoing training is essential for effective Risk Assessment and Audit Planning. Auditors should invest in professional development to stay updated on industry changes, emerging risks, and new technologies that could impact the audit process.
  • Enhanced Communication Protocols: Improving communication within the audit team and with the client is crucial for successful Risk Assessment and Audit Planning. Establishing regular meetings, feedback sessions, and transparent communication channels fosters a collaborative environment, ensuring everyone is on the same page during Risk Analysis.
  • Effective Time Management: Addressing resource constraints in Risk Assessment requires effective time management. Auditors should prioritize tasks based on risk significance during Audit Planning and allocate resources accordingly. This may involve setting realistic timelines and expectations with clients.

By adopting these strategies, auditors can enhance the overall effectiveness of the Risk Assessment process in Audit Planning.

In the dynamic field of auditing, staying ahead is not just a choice but a necessity. One effective way to boost your auditing prowess is by becoming a Certified Information Systems Auditor (CISA).

Why CISA Certification Matters?

In the realm of auditing, the Certified Information Systems Auditor (CISA) certification holds exceptional relevance. It signifies your expertise in auditing, controlling, and monitoring information systems—an invaluable asset in today's cybersecurity landscape.

Sprintzeal's CISA Course Benefits

Choosing Sprintzeal for your CISA journey brings several advantages:

  • Complete Coverage: Sprintzeal's course thoroughly addresses all CISA domains, ensuring comprehensive knowledge.
  • Expert Guidance: Learn from industry professionals, gaining practical insights to apply in real-world scenarios.
  • Flexibility: Opt for online or classroom training based on your schedule, making learning adaptable.
  • Exam Prep Support: Sprintzeal provides resources to ready you for the CISA exam, increasing your chances of success.
  • Career Boost: A CISA certification from Sprintzeal opens doors to new opportunities, enhancing your auditing career.

Investing in Sprintzeal's CISA course isn't just about a certification; it's a strategic move to empower your professional journey. The skills acquired will significantly strengthen your ability to conduct effective risk assessments in audit planning, a critical aspect of ensuring audit success.

In the world of auditing, a robust risk assessment is the linchpin for a triumphant audit process. Delving into the nuances of inherent, control, and detection risks empowers auditors to navigate challenges adeptly.

As we conclude, it's evident that a meticulous approach to risk identification, analysis, and response is indispensable for audit planning and effectiveness. Remember, the strength of a resilient audit plan lies in foreseeing, evaluating, and mitigating risks.

Ready to advance your skills? Explore the Certified Information Systems Auditor (CISA) course with Sprintzeal . For more details, visit Sprintzeal or click here to contact us.

What is a risk assessment in auditing?

A risk assessment in auditing is the process of identifying and evaluating potential risks to financial statement accuracy.

What is risk assessment in planning?

Risk assessment in planning for audits involves evaluating uncertainties to create an effective audit strategy.

What are risk factors in audit planning?

Risk factors in audit planning are conditions impacting financial statement reliability, guiding strategy development.

What does risk assessment mean?

Risk assessment is the proactive evaluation of potential risks' impact and likelihood, ensuring accurate reporting in auditing.

Subscribe to our Newsletters

Explore program.

captcha

Apply for Free Consultation

Niharika Chaurasia

Niharika Chaurasia

Niharika is a technical content writer in the education niche with vast experience in creating content for certifications and training programs. She creates engaging, easy-to-understand, and valuable content for both beginners and professionals aspiring to enhance their careers.

Popular Programs

CISSP®  - Certified Information System Security Professional

CISSP® - Certified Information System Security Professional

Live virtual training.

  • 4.8 (964 + Ratings)
  • 65k + Learners

CISA® - Certified Information System Auditor

CISA® - Certified Information System Auditor

  • 4.1 (426 + Ratings)
  • 69k + Learners

CISM® - Certified Information Security Manager

CISM® - Certified Information Security Manager

  • 4.8 (200 + Ratings)
  • 48k + Learners

COBIT® 2019 Foundation

COBIT® 2019 Foundation

  • 4.1 (862 + Ratings)
  • 6k + Learners

CompTIA Server+ Certification

CompTIA Server+ Certification

  • 4.3 (77 + Ratings)
  • 66k + Learners

CompTIA PenTest+ Certification

CompTIA PenTest+ Certification

  • 4.3 (300 + Ratings)
  • 12k + Learners

ISO 27001 Lead Auditor

ISO 27001 Lead Auditor

  • 4.8 (650 + Ratings)
  • 2k + Learners

CompTIA CySA+

CompTIA CySA+

  • 4 (280 + Ratings)

Cybersecurity Fundamentals ISACA®

Cybersecurity Fundamentals ISACA®

  • 4.1 (2345 + Ratings)
  • 55k + Learners

CCSP®  - Certified Cloud Security Professional

CCSP® - Certified Cloud Security Professional

  • 4.3 (964 + Ratings)
  • 59k + Learners

Cybersecurity Fundamentals Specialist

Cybersecurity Fundamentals Specialist

  • 4.4 (786 + Ratings)
  • 7k + Learners

Cybersecurity Risk Assessment Specialist

Cybersecurity Risk Assessment Specialist

  • 4.2 (678 + Ratings)
  • 38k + Learners

Trending Now

Which Certification is best for Cybersecurity?

Top 5 COMPELLING REASONS TO GET A CYBER SECURITY CERTIFICATION

How to Become IT Security Expert with CISSP Certification

Top 20 Reasons You Should Get a CISSP Certification

CISM certification cost and career benefits

What is CISSP? – Everything about CISSP Certification Explained

Pass CISSP Exam - How to Clear CISSP Exam in First Attempt 2024 (UPDATED)

CISSP Certification – Top 25 Career Benefits in 2024

Cybersecurity – Everything You Need to Know About it

Cybersecurity Strategy: Building a Strong Defense for Business

Cyber Attack Statistics and Trends to Know in 2024

Updated Google Certification Training Course list 2024

Which Cybersecurity Certification Should I Get First?

Cysa+ certification – Should you get it?

List of Top Security Certifications

Easiest Security Certification to Get

Cybersecurity Fundamentals Explained

ISACA Certifications List 2024

List of Top Information Security Certifications in 2024

CISM certification cost details

Safeguarding Digital Domain: 10 Most Common Cybercrimes

Mitigate the Cyber-Attack Risks with Best Cyber Security Protocols

Cybersecurity Interview Questions and Answers 2024

Data Leak - What is it, Prevention and Solutions

Top Cybersecurity Software Tools In 2024

What is Cryptography - A Comprehensive Guide

Information Security Analyst - Career, Job Role, and Top Certifications

Cyber Security Analyst - How to Become, Job Demand and Top Certifications

CompTIA A+ Certification Latest Exam Update 2024

What is the Department of Defense (DoD) Directive 8140

Information Assurance Model in Cybersecurity

What is Data Security - Types, Strategy, Compliance and Regulations

Data loss Prevention in Cyber Security Explained

Cybersecurity Controls Explained in Detail

Cybersecurity Framework - A Complete Guide

Cybersecurity Career Paths Guide

Future of Cybersecurity - Trends and Scope

Scope for Cybersecurity in 2024 - Update for 2024

Cyber Security Careers and Outlook - 2024 Guide

5 Cybersecurity Predictions in 2024 - Trends and Challenges

Ethical Hacking Career: A Career Guide for Ethical Hacker

Application Security: All You Need To Know

Cybersecurity Roles - Top Roles and Skills to Consider in 2024

How to Get Cyber Essentials Certified

Top 10 Cyber Security Threats and How to Prevent Them

Top 10 Network Scanning Tools of 2024

Cyber Incident Response Plan: A Comprehensive Guide

Information Assurance Careers - Exploring Career Paths

Cybersecurity Mesh Architecture: What It Is and How to Build It

What is Threat Modeling? Methodologies, Types, and Steps

What is Digital Forensics? Types, Process & Challenges

Recent Cyber Attacks & Data Breaches in 2024

How to Become an Information Security Analyst Salary, Skills, and More

List of Top Department of Defense (DoD) Approved 8570 Certification Courses

Top 5 Ransomware Attacks to Watch Out for in 2024

Job Prospects for DoD Certified Professionals: A Pathway to Success in cybersecurity

10 Biggest Data Breaches of the 21st Century

What is a Cybersecurity Incident?-Types, Impact, Response Process and More

Cyber Security Planning - A Detailed Guide for Risk Mitigation

What is Cybercrime? Exploring Types, Examples, and Prevention

Cybercrime Impacts On Business: 6 Major Effects

5 Types of Cyber Attacks You Should Be Aware of in 2024

Cloud Cyber Attacks: Causes, Types, Prevention and Protection

Cloud Malware: Types of Attacks and Security Measure

List Of Top Cybersecurity Threats In 2024

Risk-based Audit Planning Guide for Beginners

Demystifying Cloud-Based Cyber Attacks: A Comprehensive Guide

Prevent Cyber Attacks: Strategies to Protect Your Digital Assets

List of Top 10 Cybersecurity Careers in 2024

Top 20 Cybersecurity Trends to Watch Out for in 2024

How to Become Cybersecurity Engineer

Fundamentals of Risk-Based Auditing: A Strategic Framework

Top 8 Types of Cybersecurity Jobs and Salary Insights

A comprehensive guide to building risk-based internal audit plan.

Risk-Based Internal Auditing Approaches: 7 Steps to Explore

CompTIA Security+ 601 vs. 701: Understanding Key Differences

Why and How to Perform a Risk-Based Internal Audit

Risk-Based Auditing Techniques Explained

  • Agile Management 59
  • AI and Machine Learning 27
  • Big Data 46
  • Business Management 24
  • Cloud Computing 37
  • Digital Marketing 50
  • IT Hardware and Networking 13
  • IT Security 79
  • IT Service Management 28
  • Microsoft Program 2
  • Programming Language 29
  • Project Management 124
  • Quality Management 53

Trending Posts

audit planning and risk assessment case study

Last updated on Dec 19 2023

audit planning and risk assessment case study

Last updated on Jun 28 2023

audit planning and risk assessment case study

Last updated on May 12 2023

audit planning and risk assessment case study

Last updated on Feb 14 2024

audit planning and risk assessment case study

Last updated on Dec 11 2023

audit planning and risk assessment case study

Last updated on Jan 11 2023

download

  • Corporate Partners
  • Affiliate Program

QUICK LINKS

  • Terms & Conditions
  • Privacy Policy
  • Cookie Policy
  • Become an Instructor
  • Sprintzeal Reviews

SECURE PAYMENTS

Want To Reach Us

Top Trending Courses

People also bought.

© 2024 Sprintzeal Americas Inc. - All Rights Reserved.

  • PMP, PMI, PMBOK, CAPM, PgMP, PfMP, ACP, PBA, RMP and SP are registered marks of the Project Management Institute, Inc.
  • CBAP® - Is a registered trade mark of IIBA.
  • ITIL® is a registered trade mark of AXELOS Limited, used under permission of AXELOS Limited. The Swirl logoTM is a trademark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved
  • PRINCE2® is a registered trade mark of AXELOS Limited, used under permission of AXELOS Limited. The Swirl logoTM is a trademark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved
  • Certified ScrumMaster® (CSM) and Certified Scrum Trainer® (CST) are registered trademarks of SCRUM ALLIANCE®
  • Professional Scrum Master is a registered trademark of Scrum.org
  • The APMG-International Finance for Non-Financial Managers and Swirl Device logo is a trade mark of The APM Group Limited.
  • The Open Group®, TOGAF® are trademarks of The Open Group.
  • IIBA®, the IIBA® logo, BABOK® and Business Analysis Body of Knowledge® are registered trademarks owned by International Institute of Business Analysis.
  • CBAP® is a registered certification mark owned by International Institute of Business Analysis. Certified Business Analysis Professional, EEP and the EEP logo are trademarks owned by International Institute of Business Analysis..
  • COBIT® is a trademark of ISACA® registered in the United States and other countries.
  • CISA® is a Registered Trade Mark of the Information Systems Audit and Control Association (ISACA) and the IT Governance Institute.
  • CISSP® is a registered mark of The International Information Systems Security Certification Consortium ((ISC)2).
  • CompTIA A+, CompTIA Network+, CompTIA Security+ are registered marks of CompTIA Inc
  • CISCO®, CCNA®, and CCNP® are trademarks of Cisco and registered trademarks in the United States and certain other countries.
  • CSM®, CSPO®, CSD®, CSP®, A-CSPO®, A-CSM® are registered trademarks of Scrum Alliance®
  • TOGAF® is a registered trademark of The Open Group in the United States and other countries
  • All the online courses are accredited by respective governing bodies and belong to their respective owners.
  • Call us on +1 833 636 6366
  • Request a callback
  • Mail Your Queries

Enquire Now for Up to 30% Off!

WHO WILL BE FUNDING THE COURSE?

American Accounting Association

Continuous Auditing and Risk-Based Audit Planning—An Empirical Analysis

ORCID logo

We thank the participants and discussant of the 2019 AAA Information Systems Section Meeting in San Antonio, TX and the 2019 European Accounting Association Conference in Cyprus for helpful comments and suggestions.

Marc Eulerich, Christine Georgi, and Alexander Schmidt, University of Duisburg-Essen, Mercator School of Management, Duisburg, Germany.

Editor's note: Accepted by Jun Dai.

  • Article contents
  • Figures & tables
  • Supplementary Data
  • Peer Review
  • Get Permissions
  • Search Site
  • View This Citation
  • Add to Citation Manager

Marc Eulerich , Christine Georgi , Alexander Schmidt; Continuous Auditing and Risk-Based Audit Planning—An Empirical Analysis. Journal of Emerging Technologies in Accounting 1 September 2020; 17 (2): 141–155. https://doi.org/10.2308/JETA-2020-004

Download citation file:

  • Ris (Zotero)
  • Reference Manager

Due to rapidly changing risks in companies, a continuous alignment of internal audit activities with the relevant risks is required. Continuous auditing (CA) is one possible way to meet these requirements. Specifically, the internal audit function (IAF) could use CA as a methodology in order to add a continuous perspective to their risk assessment. This study examines factors associated with the use of CA information in the IAF's risk-based audit planning (RBAP). We use survey data from 264 chief audit executives to address our research question. We find several factors having a positive influence on the use of information from CA in RBAP. These factors include the importance of data analytics, the collaboration with the audit committee and external auditor, as well as the use of IAF's results for fraud prevention. Furthermore, our additional analysis presents various positive effects of CA on potential output measures of internal auditing.

JEL Classifications:  G30; G32; G34; M42.

Member Login

Citing articles via, email alerts, affiliations.

  • Online ISSN 1558-7940
  • Print ISSN 1554-1908
  • Information for Authors
  • Authorship Policy
  • Plagiarism Policy
  • Data Integrity Policy
  • Citing Corrected Articles Policy
  • Minimizing Overlapping Decision Rights Policy
  • Prior Publication Policy

audit planning and risk assessment case study

  • Cookie Policy
  • Accessibility
  • Terms & Conditions
  • Get Adobe Acrobat Reader
  • © Copyright 1998 - 2023 American Accounting Association. All rights reserved.

This Feature Is Available To Subscribers Only

Sign In or Create an Account

The global body for professional accountants

  • Search jobs
  • Find an accountant
  • Technical activities
  • Help & support

Can't find your location/region listed? Please visit our global website instead

  • Middle East
  • Cayman Islands
  • Trinidad & Tobago
  • Virgin Islands (British)
  • United Kingdom
  • Czech Republic
  • United Arab Emirates
  • Saudi Arabia
  • State of Palestine
  • Syrian Arab Republic
  • South Africa
  • Africa (other)
  • Hong Kong SAR of China
  • New Zealand
  • Apply to become an ACCA student
  • Why choose to study ACCA?
  • ACCA accountancy qualifications
  • Getting started with ACCA
  • ACCA Learning
  • Register your interest in ACCA
  • Learn why you should hire ACCA members
  • Why train your staff with ACCA?
  • Recruit finance staff
  • Train and develop finance talent
  • Approved Employer programme
  • Employer support
  • Resources to help your organisation stay one step ahead
  • Support for Approved Learning Partners
  • Becoming an ACCA Approved Learning Partner
  • Tutor support
  • Computer-Based Exam (CBE) centres
  • Content providers
  • Registered Learning Partner
  • Exemption accreditation
  • University partnerships
  • Find tuition
  • Virtual classroom support for learning partners
  • Find CPD resources
  • Your membership
  • Member networks
  • AB magazine
  • Sectors and industries
  • Regulation and standards
  • Advocacy and mentoring
  • Council, elections and AGM
  • Tuition and study options
  • Study support resources
  • Practical experience
  • Our ethics modules
  • Student Accountant
  • Regulation and standards for students
  • Your 2024 subscription
  • Completing your EPSM
  • Completing your PER
  • Apply for membership
  • Skills webinars
  • Finding a great supervisor
  • Choosing the right objectives for you
  • Regularly recording your PER
  • The next phase of your journey
  • Your future once qualified
  • Mentoring and networks
  • Advance e-magazine
  • An introduction to professional insights
  • Meet the team
  • Global economics
  • Professional accountants - the future
  • Supporting the global profession
  • Download the insights app

Can't find your location listed? Please visit our global website instead

  • Audit and assurance case study questions
  • Study resources
  • Advanced Audit and Assurance (AAA)
  • Technical articles and topic explainers
  • Back to Advanced Audit and Assurance (AAA)
  • How to approach Advanced Audit and Assurance

The first article in this series of two on Paper P7 case study questions discussed question style, what to look for in the requirements, how higher-level skills are tested, and the meaning of professional marks within a question requirement. This second article goes through part of a typical Section A case study question, applying the recommended approach described in the previous article. This approach comprises four stages.

Stage 1 – understanding the requirement

The first thing to do is to read and fully understand the question requirement. Here is the requirement we will be looking at in this article:

‘Prepare a report, to be used by a partner in your firm, in which you identify and evaluate the professional, ethical, and other issues raised in deciding whether to accept the appointment as provider of an assurance opinion as requested by Petsupply Co.’ (12 marks)

Note: this requirement includes two professional marks.

Having read the requirement, break it down. You are asked to do two things:

  • identify, ie state from the information provided
  • evaluate, ie discuss from a critical point of view.

The requirement asks you to consider ‘professional, ethical, and other issues’. This could cover a wide range of considerations, such as:

  • ethics: independence, competence, conflicts of interest, confidentiality, assessing integrity
  • professional issues: the risk profile of the work requested, the fee – and whether it is sufficient to compensate for high risk, availability of staff, managing client expectations, logistical matters such as timing, legal and regulatory matters – such as money laundering, and (in some cases) obtaining professional clearance
  • other issues: whether the work ‘fits’ with the commercial strategy of the audit firm, the potential knock-on effect of taking on the work – such as the impact on other clients, or on other work performed for this client.

You are asked to produce a report, so remember that the professional marks available will be awarded for using the correct format, the use of professional business language, and for presenting your comments as a logical flow culminating in a conclusion.

From reading the requirement, you know that the question scenario will be based on a potential assurance assignment and will be broadly based around acceptance issues.

Stage 2 – reading the scenario

When reading through the detail of the scenario, you should now be alert to information relevant to this requirement. Highlight important points that you think are relevant to the scenario and remember to focus on issues that could affect your acceptance of a potential assurance assignment.

Now read the following extract from the scenario and highlight the salient points – remember to look out for any factors relevant to the ethical, professional, and other issues described above.

Extract: You are a senior manager in Dyke & Co, a small firm of Chartered Certified Accountants, which specialises in providing audits and financial statement reviews for small to medium-sized companies. You are responsible for evaluating potential assurance engagements, and for producing a brief report on each prospective piece of work to be used by the partners in your firm when deciding whether to accept or decline the engagement. Dyke & Co is keen to expand the assurance services offered, as a replacement for revenue lost from the many small‑company clients choosing not to have a statutory audit in recent years. It is currently May 2007.

Petsupply Co has been an audit client of Dyke & Co for the past three years. The company owns and operates a chain of retail outlets selling pet supplies. The finance director of Petsupply Co recently communicated with your firm to enquire about the provision of an assurance report on data provided in the Environmental Report published on the company’s website. The following is an extract from the e-mail sent to your firm from the finance director of Petsupply Co:

‘At the last board meeting, my fellow directors discussed the content of the Environmental Report. They are keen to ensure that the data contained in the report is credible, and they have asked whether your firm would be willing to provide some kind of opinion verifying the disclosures made. Petsupply Co is strongly committed to disclosing environmental data, and information gathered from our website indicates that our customers are very interested in environmental matters. It is therefore important to us that Petsupply Co reports positive information which should help to retain existing customers, and to attract new customers. I am keen to hear your views on this matter at your earliest convenience. We would like verification of the data as soon as possible.’

You have looked at Petsupply Co’s Environmental Report on the company website, and found a great deal of numerical data provided, some of which is shown below in Table 1.

Table 1: Petsupply Co's environmental report – numerical data

Stage 3 – take time to think about the requirement and the scenario.

As discussed in the previous article, you must take time and not rush to answer. When evaluating this particular scenario try to think widely about the information provided. Your answer should cover a broad range of issues rather than concentrating on one or two. Your comments must be tailored to the scenario. It is pointless, for example, to write about a general acceptance issue which is not specifically related to Petsupply Co.

It is important to appreciate that few marks will be available for stating the issue. The higher-level skill marks in this question will be awarded for a discussion of why the issue is relevant to the decision about whether or not to provide the assurance service to Petsupply Co. The requirement is to evaluate the scenario and therefore it is crucial to demonstrate an appreciation that there may be two conflicting sides to the discussion.

Table 2 shows an example of a thought process which identifies the issues and explains why each issue is relevant to the requirement; the issues are shown in the order in which they appear in the question.

Table 2: Example of a thought process which identifies issues and shows relevance to the requirement

Table 2 is not an answer, it is a thought process. This is what you should be thinking about after reading through the scenario. The previous article stressed the importance of thinking through the scenario. It may help to jot these ideas down in an answer plan before making a start on your written answer, as this will help you to prioritise the points and give the report a logical flow.

Stage 4 – writing the report

The requirement states that two professional marks are available. As discussed in the previous article, these marks are not for the technical content of the answer, but for the way the relevant points are communicated. The report will be evaluated on the following:

  • Use of a report format – a brief introduction, clear separate sections each discussing a different point, and a final conclusion.
  • Style of writing – the report is addressed to the partner and so language should be appropriate. You do not need to explain things that would be obvious to a partner, and you must be tactful.
  • Clarity of explanation – make sure that each point is explained simply and precisely, and avoid ambiguity.
  • Evaluation skills – demonstrate that each point may have a positive and a negative side.

Remember, when answering any question requirement it is quality not quantity that counts. You should make each point succinctly and remain focused on the specific requirement. Questions can be time pressured, but it is important to remember that you should be able to read the requirement, think about it, and write an answer in the time available. This means that there is only a limited amount of time available for actually writing the answer, so keep it short and to the point. Irrelevant waffle earns no marks and will detract from the professional skills evaluation. What follows is an outline report format for this requirement:

Introduction

  • Report is internal, addressed to a partner, covering proposed assurance service for existing audit client

Section 1 – ethical matters

  • Provision of non-audit service
  • Impact on total fee from client
  • Competence to perform work – specialised engagement

Section 2 – risk-related matters

  • High inherent risk – figures prone to manipulation
  • Data highly subjective
  • Need to rely on systems put in place by client

Section 3 – commercial matters

  • Fee will have to be high enough to compensate for high risk
  • Fee may need to compensate for specialists if used
  • Strategic fit – assignment in line with commercial goals of Dyke & Co
  • Build up experience in non-audit service
  • Ascertain whether assignment will be recurring

Section 4 – other matters

  • Managing client expectation regarding type of opinion sought
  • Managing client expectation regarding timeframe
  • Summary of key issues and decision on acceptance

Note: not all of the above points are necessary to secure a pass mark; the marking scheme is also flexible enough to cater for comments that may not appear in the ‘model answer’.

This article shows how to approach one requirement from a typical Section A question in Paper P7. It is important to practise technique by attempting as many questions as possible, starting with the Pilot Paper for Paper P7.

Written by a member of the Paper P7 examining team

Related Links

  • Student Accountant hub page

Advertisement

  • ACCA Careers
  • ACCA Career Navigator
  • ACCA Learning Community
  • Your Future

Useful links

  • Make a payment
  • ACCA-X online courses
  • ACCA Rulebook
  • Work for us

Most popular

  • Professional insights
  • ACCA Qualification
  • Member events and CPD
  • Supporting Ukraine
  • Past exam papers

Connect with us

Planned system updates.

  • Accessibility
  • Legal policies
  • Data protection & cookies
  • Advertising

Risk based internal auditing within Greek banks: a case study approach

  • Published: 01 October 2008
  • Volume 13 , pages 101–130, ( 2009 )

Cite this article

  • Andreas G. Koutoupis 1 &
  • Anastasios Tsamis 1  

3031 Accesses

18 Citations

Explore all metrics

Internal Audit functions within Greek banks are imposed both by the Greek law for publicly listed enterprises (Law 3016/17.5.2002), as well as by the Bank of Greece (Bank of Greece Governor’s Act. Number 2577/9-3-2006). Based on the traditional approach of internal audit within Greek Banks, an inspection of branches and credit on a tick and check (compliance) basis was conducted. Recent research (Koutoupis and Tsamis, Fourth European Academic Conference on Internal Audit and Corporate Governance. Cass Business School, London, United Kingdom, 2006) comes to a conclusion that this approach does not result in adequate coverage of risks. In addition, new international regulations and best practices such as basel committee on banking supervision requirements, COSO enterprise risk management (ERM) suggested framework, as well as The Institute of internal auditors standards for professional practice of internal auditing (standards) were in most cases partially or fully ignored by the vast majority of Greek banks. However, minimum requirements regarding the operation of internal audit functions have been set up by the Bank of Greece, which in most cases are followed by the Greek banks, as well as periodically assessed by the above banking regulator. Risk based internal audit (RBIA) was an unknown concept for the vast majority of publicly listed and non-listed Greek enterprises until very recently. Only Greek subsidiaries of US and UK enterprises were aware of the RBIA audit concept (including big foreign banks which operate in Greece as subsidiaries), as they were periodically audited by group audit functions as an immediate result of relevant risk assessments. Also, the majority of Greek publicly listed enterprises use the audit cycle approach in developing their long term (3 year) and annual audit plans, which means that they audit specific business cycles and activities within a predefined time interval (1–3 years). Audit planning is based on the head’s of internal audit and internal auditors experience without formal application of risk assessment and audit planning techniques. All Greek banks that participated in the corporate governance and internal auditing survey (Koutoupis, Third European Academic Conference on Internal Audit and Corporate Governance, 2005) stated that they follow a risk-based audit approach and develop risk based audit plans; however the vast majority of them could not prove it through a clearly documented risk assessment and risk-based audit plan. Sarbanes–Oxley Act (2002) directed National Bank of Greece to adjust its audit planning process to a risk based one. Also, other big Greek banks (case study 1–3) are now either considering or adopting a RBIA approach, mostly because of Bank of Greece pressures. internal audit functions within small banks still follow the audit cycle approach. In this paper, current status of Greek banks RBIA approach will be discussed based on relevant references, as well as on three case study examples. This research will be based on relevant literature review, as well as authors’ professional experience in past and current projects related to risk assessment, audit planning and RBIA. Specifically, RBIA approach will be critically evaluated based on three big Greek banks analysis on a case study format and benchmark against basel requirements, ERM and standards for professional practice of internal auditing. Based on the relevant assessment, best practices and recommendations for improvement will be identified.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA) Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Rent this article via DeepDyve

Institutional subscriptions

Similar content being viewed by others

audit planning and risk assessment case study

The Ethical Implications of Using Artificial Intelligence in Auditing

Ivy Munoko, Helen L. Brown-Liburd & Miklos Vasarhelyi

audit planning and risk assessment case study

The role of the external auditor in managing environmental, social, and governance (ESG) reputation risk

Bright Asante-Appiah & Tamara A. Lambert

A review of the IFRS adoption literature

Emmanuel T. De George, Xi Li & Lakshmanan Shivakumar

For more about Risk based internal auditing (RBIA), see Risk Based Internal Auditing (Position Paper). The Institute of Internal Auditors, UK and Ireland, August 2003.

Enterprise Risk Management Framework. USA: Committee of Sponsoring Organizations (COSO), 2004.

For more about Risk Based Internal Auditing (RBIA) see Risk Based Internal Auditing (Position Paper). The Institute of Internal Auditors, UK and Ireland, August 2003.

Basel Committee on Banking Supervision: Internal Audit in Banks and the Supervisors Relationship with Auditors. Basel: August, 2001 , pp. 9–10.

The relevant information obtained by Risk Assessment and Internal Audit Manual of Case Study 3 Internal Audit division.

Abbreviations

Enterprise risk management

Chief audit executives

Risk based internal audit

A New Agenda for Corporate Governance Reform. The Institute of Internal Auditors, UK and Ireland, July 2002.

ATE Bank Risk Assessment and Audit Planning. (2005). Report prepared by PricewaterhouseCoopers. Athens.

Bank of Greece Governor’s Act. Number 2438/6.8.1998.

Bank of Greece Governor’s Act. Number 2560/1.4.2005.

Bank of Greece Governor’s Act. Number 2577/9.3.2006.

Basel Committee on Banking Supervision: Framework for the Evaluation of Internal Control Systems. Basel: January 1998.

Basel Committee on Banking Supervision: Enhancing Corporate Governance for Banking Organisations. Basel: September, 1999.

Basel Committee on Banking Supervision.: Internal Audit in Banks and the Supervisors Relationship with Auditors. Basel: August, 2001.

Basle Committee on Banking Supervision: Compliance and the Compliance function in Banks. (2005). Basel: April 2005.

Commission Decision of 28 April 2005 establishing a group of non governmental experts on corporate governance and company law (2005/380/EC). Official Journal of the European Union, L126/40, 19-5-2005.

Committee of Sponsoring Organization of the Tradeway Commission (COSO). (1992). Internal control—integrated framework . Jersey City (USA): AICPA/COSO.

Google Scholar  

Corporate Governance Law 3016/ 17-5-2002. Hellenic Republic, 2002.

Enterprise Risk Management Framework. Committee of Sponsoring Organizations of the Treadway Commission (COSO Report). (2005). USA: 2005.

Greek Postal Savings Bank Audit Planning Report prepared by PricewaterhouseCoopers. Athens, 2006.

Group Audit for International Business Internal Audit & Risk Assessment Manual: Alpha Bank, Athens 2006.

Koutoupis, A. (2004). Corporate governance and internal control systems. Athens: Economic Chronicles Journal , Issue Number 126 (March–April 2004).

Koutoupis, A. G. (2005). Corporate governance and internal audit in Greece, Panteion University of Social and Political Sciences. In Third European Academic Conference on Internal Audit and Corporate Governance .

Koutoupis, A. G. (2006). Corporate governance & business risk management regulations and best practices impact on internal controls & internal audit activities within Greek publicly listed enterprises. In Fourth European Academic Conference on Internal Audit and Corporate Governance .

Koutoupis, A., & Marios, M. (2004). Internal auditing and risk assessment. Naftemporiki Newspaper , Athens, 27/4/2004.

Koutoupis, A., & Tsamis, A. (2006). Reengineering internal audit and compliance functions within Greek banks. In Fourth European Academic Conference on Internal Audit and Corporate Governance (Main Conference—6 April 2006), Cass Business School, London, United Kingdom (5–7 April 2006).

McNamee, D., & Selim, M. G. (1998). Risk management: Changing the internal auditor’s paradigm . Altamonte Springs, FL: The Institute of Internal Auditors.

Melville, R. (1997). Re-engineering audit: Quality, control self assessment and the balanced scorecard . Management Working Paper, City University Business School.

Risk Based Internal Auditing (RBIA)—Position Paper. The Institute of Internal Auditors UK and Ireland, August 2003.

Risk Management and Internal Control in the EU—Discussion Paper. FEE, March 2005.

Selim, G., & McNamee, D. (1999a). The risk management and internal auditing relationship: Developing and validating a model. International Journal of Auditing, 3 , 159–174.

Article   Google Scholar  

Selim, G., & McNamee, D. (1999b). Risk management and internal auditing: What are the essential building blocks for a successful paradigm change? International Journal of Auditing, 3 , 147–155.

Standards and Guidelines for the Professional Practice of Internal Auditing. London: The Institute of Internal Auditors-U.K., 2004.

The Combined Code: Principles of Good Governance and Code of Best Practice. UK: June 1998.

The Sarbanes–Oxley Act—An Overview (Unpublished Presentation). PricewaterhouseCoopers, 2002.

Download references

Author information

Authors and affiliations.

Department of Public Administration, Auditing & Taxation Sector, Panteion University of Social and Political Sciences, 268 Kifisias st., Chalandri, Athens, Greece

Andreas G. Koutoupis & Anastasios Tsamis

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Andreas G. Koutoupis .

1.1 Case study 2 custom measures

1.1.1 branches.

As far as for the branches network the qualitative and quantitative criteria used:

Code and serial number of branch;

The code refers to the number that is assigned to the branch on the "ON-LINE" system of the bank;

State and category of the branch;

Additional products offered by the branch This relates to all products offered by the branch that are in addition to the basic products offered. These may be offered by each branch within the approved limits based on its category;

Number of personnel in each branch The data were collected from the relevant central division, which provided internal audit division with the relevant chart showing the actual number of personnel in each branch;

Branch financial results The branch financial results were provided by the financial division for the year ended 31/12/2004;

Number and balance of depository accounts, and repos The data were collected from "electronic system of the bank" with accounting balance on 31/12/2004;

Number and balance of loan accounts The data were collected from "electronic system of the bank" with accounting balance on 31/12/2004;

Existence of organizational changes within the year The data was collected from the relevant central division of the bank, which provided internal audit with the relevant chart showing all the organizational changes during last year (2004 and after) for managerial and sub-managerial positions within the branch;

Years elapsed since last audit conducted by the internal audit division These data refer to audits performed from 2000 and onwards. Prior audits are not considered given that a period of more than 6 years elapsed. Audits performed in collaboration with external advisors are included in the audit work performed by the management. Likewise branches that have never been audited are marked with a high risk score;

Data since last audit from Central Bank of Greece or any other regulatory authorities;

Areas covered during last audit and type of audit The data were extracted using the audit reports issued, found in the database of the division;

Special issues The data were collected from the Department of Examination of Special Issues. Only the most important special issues were included. Basic categories of special issues are: financing issues, cash deficiencies, depository accounts related issues, ΑΤΜs, robberies, card skimming, employee disputes, commitment to the branch budgeted finance and deposits (credit divisions).

The following data were taken in consideration for the calculation: industry data, market data, geographic data, competition data, amount of transactions in the past years.

1.1.2 Central divisions

In relation to central divisions, the qualitative and quantitative data used:

Operations of central divisions The operations referred are directly related to the organization of the bank;

Existence of documented procedures Acceptable answers in this field: exist and are fully documented, exist with some omissions, no documented procedures;

Organizational changes within the year The data were collected from the relevant central division of the bank, which provided internal audit division with the relevant chart showing all the organizational changes during 2004 and after, for managerial, and sub-managerial positions within the central division, and the sub-division the change relates to;

Information systems changes within the year The data were collected from the information systems control sub-division and relates to changes that will be made to information systems and electronic banking divisions;

Years elapsed since last audit performed by the internal audit division These data refers to audits performed from 2000 and onwards. Prior audits are not considered given that a period of more than 6 years elapsed. Audits performed in collaboration with external advisors are included in the audit work performed by the management. Likewise central divisions that have never been audited are marked with a high risk score;

Areas covered during last audit and type of audit;

Audit performed by external auditors;

Special issues;

Commitment to the central division budget The data were collected from central finance division with accounting balance on 31/12/2004.

1.1.3 Subsidiaries

In relation to subsidiaries the qualitative, and quantitative data used:

Industry and location The industry the subsidiary operates in and its location;

Shareholding of the bank The data were collected by the Department of Subsidiaries of Internal Audit Division of the bank with data dated January 2005. The shareholding is a result derived both from direct and indirect shareholdings of the bank;

Basic products The basic products the subsidiary deals with according to data provided by subsidiaries department;

Activities/transaction cycles The activities and main transaction cycles of subsidiaries were identified. As far as industrial companies for which no audit schedules were devised the activities used were derived from the general audit schedule of industrial companies;

Personnel number The data were collected by the strategic division of the bank, which provided us with the relevant chart showing the number of personnel in each subsidiary;

Existence of internal audit division/number of auditors , The existence of internal audit division and the number of personnel employed;

Financial results The financial results were provided by the division of group strategy for the year ended 31/12/2004;

Organizational changes within the year The data were collected from the division of group strategy, and relates to all organizational changes of subsidiaries during last year (2004 and after) for managing director or director positions in the company;

Years elapsed since last audit performed by internal audit division These data refer to audits performed from 2000 and onwards. Prior audits are not considered given that a period of more than 6 years elapsed. Likewise subsidiaries that have never been audited are marked with a high risk score;

Audit performed from external auditors;

Special issues.

1.2 Case study 2 risk rating per auditable unit

Red = High risk units, branches, subsidaries, and central divisions

Yellow = Medium risk units, branches, subsidaries, and central divisions

Green = Low risk units, branches, subsidaries, and central divisions

1.3 Case studies 1, 2 & 3 comparative table

Rights and permissions.

Reprints and permissions

About this article

Koutoupis, A.G., Tsamis, A. Risk based internal auditing within Greek banks: a case study approach. J Manag Gov 13 , 101–130 (2009). https://doi.org/10.1007/s10997-008-9072-7

Download citation

Received : 01 December 2007

Revised : 01 March 2008

Accepted : 21 July 2008

Published : 01 October 2008

Issue Date : May 2009

DOI : https://doi.org/10.1007/s10997-008-9072-7

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Audit cycle approach
  • Audit planning
  • Bank of Greece
  • Basel requirements
  • Enterprise risk management (ERM)
  • Greek banks
  • Internal auditing
  • Internal controls
  • Risk assessment
  • Risk based internal audit (RBIA)
  • Standards for the professional practice of internal auditing (standards)
  • Find a journal
  • Publish with us
  • Track your research

TAPA Institute Logo

TAPA Institute

Case study ii - human resources audit - planning phase.

Gain insights into strategic planning, risk assessment, and scoping for an impactful audit. Learn how to ensure HR compliance, optimize processes, and enhance employee management through effective audit planning and execution.

Course Curriculum

How to perform a human resources audit.

Audit Leadership - How to Perform a Human Resources Audit

Learning Objectives

Key Functions of a Human Resource Department

Course Evaluation

Case Study II - Human Resources Audit Assignment

Case Study II - HR Audit - HR Narrative

Case Study II - HR Audit - HR Findings

Risk Control Matrix for the Human Resources Audit

Risk Control Matrix for the Human Resources Audit Answer Key

Document Request List for the Human Resources Audit

Document Request List for the Human Resources Audit Answer Key

Announcement Memo for the Human Resources Audit

Case Study II - HR Audit Announcement Memo - Answer Key

Quality Control Checklist - Planning Phase

audit planning and risk assessment case study

About this course

  • 0 hours of video content
  • ERM Resource Center
  • Full Resource Center Archive
  • ERM Fundamentals
  • ERM Leadership and Governance
  • ERM and Strategy
  • Risk Identification and Assessment
  • Risk Appetite and Response
  • Risk Monitoring and Communications
  • ERM Frameworks and Best Practices
  • ERM Expert Insights
  • Emerging Risks
  • ERM Roundtable Summit
  • Training and Events
  • Advanced ERM
  • ERM in Higher Ed
  • ERM in Non-Profits
  • ERM Fellows
  • ERM Custom Training
  • Master of Management, Risk & Analytics
  • Master of Accounting, ERM Concentration
  • ERM Initiative Team
  • ERM Advisory Board
  • Contact ERM

New Case Study: Using Scenario Planning to Consider Emerging Risks

Downloadable Case Study

Looking for how organizations use scenario planning to address risks and capitalize on opportunities?

Scenario Planning cover

The case study focuses on the use of scenario planning as part of an Enterprise Risk Management (ERM) process, by examining the objectives for scenario planning, the development and evaluation of scenarios, and the ways that outcomes from scenario planning are used.

Examples of Scenario Planning

The case study is based on input from 20 companies covering 12 different industries including healthcare, financial services, pharmaceuticals, apparel, personal products, beverages, utilities, and others.  In addition, the study identifies critical success factors, areas targeted for improvement, common barriers, and the use of technology in the process.

Tips for Effective Scenario Planning

The case study addresses these topics:

  • Identifying and defining the purpose of the scenario planning workshop:
  • Planning the scenario planning activities and how the sessions will be structured and facilitated.
  • Pinpointing both internal and external inputs to the process, such as subject matter experts, risk owners, senior management and ERM leaders.
  • Summarizing and aggregating outcomes from the various scenario planning activities.
  • Managing critical factors for a successful scenario planning workshop, including common barriers to the process
  • Leveraging technologies tools to help facilitate scenario planning activities.

The case study ends with a summary of several best practices.

Original Article Source: “A Look into The Future with Scenario Planning: A Survey of ERM Practices”, Kiersten Woodring, Carson Chrismon, Justin Yim, and Danny O’Dirling, NC State University ERM Initiative, February 2020

Download the case study

  • Operational Risk
  • Risk Assessment
  • Case Studies
  • Tools and Templates

More From Enterprise Risk Management Initiative

What is enterprise risk management (erm), report: executive perspectives on top risks for 2024 and a decade later, integrating erm with other risk and assurance functions.

Content Search

Case study: women’s tech hubs moldova.

  • War Child UK

Attachments

Preview of Case Study Women's Tech Hubs Moldova.pdf

1. AN INTRODUCTION TO TECH HUBS

The tech hub approach is derived from a collaboration between WCUK, Humans in the Loop, and FiftyEight in the Democratic Republic of Congo. It is defined as the establishment of a one-stop-shop for online livelihoods, such that participants can access: electricity, the internet, relevant hardware and software; training on IT skills, including basic IT skills, basic facility with major internet languages, and/or vocational skills such as digital annotation; and linkages to the online labour market.

The purpose of a tech hub is to enhance access to all relevant inputs to the internet and to ensure that participants are capacitated to enjoy the advantages that the internet has to offer both in terms of greater remuneration and ability to access key services, information, networks, and educational opportunities. The tech hub approach both prepares participants for employment online and also enables youth to take advantage of the internet as a gateway to other services and tools. Built into the tech hub approach are requisite safeguarding standards in recognition of the danger that the internet also poses

The tech hub also addresses a major blind spot in livelihoods programming that treats unemployment amongst youth as purely a supply-side issue (youth are deemed under-capacitated and training will allow them to find jobs) rather than a demand-side issue (the domestic market has a surplus of labour and weak demand).

Tech hubs therefore address this issue by connecting participants to the global market, which is more diversified and therefore offers more consistent oppertunites than relying exclusively on domestic markets. This is especially the case in rural areas, especially in WCUK’s countries of operation which are conflict affected and have low or even negative economic growth. For tech hubs, WCUK targets ‘digital deserts’ which are areas where there is little or no internet connectivity, and where the majority of inhabitants have few IT skills

Related Content

Moldova + 1 more

GBV Sub-Working Group Moldova: 2024 Refugee Response Plan (RRP) GBV Indicators Guidance (January 2024)

Moldova gender task force for the ukraine refugee response: 2023 year in review, country-level action plan to prevent and respond to sexual exploitation and abuse and sexual harassment in moldova - 2024, protection from sexual exploitation and abuse (psea): inter-agency risk assessment republic of moldova.

IMAGES

  1. Audit Risk Assessment

    audit planning and risk assessment case study

  2. A Complete Guide to the Risk Assessment Process

    audit planning and risk assessment case study

  3. Case studypempal audit planning risk assessment eng

    audit planning and risk assessment case study

  4. Audit Risk Assessment Template

    audit planning and risk assessment case study

  5. Internal Audit Risk Assessment Template

    audit planning and risk assessment case study

  6. Risk Assessment Process in Audit Planning

    audit planning and risk assessment case study

VIDEO

  1. Risk Assessment in Operational Audit

  2. BL5 Audit Risk Assessment Case Study / 18 Dec 2020 Session 3

  3. AA (5) Risk

  4. CA Final Audit May 2024 exams revision classes

  5. ACCA Audit & Assurance F8 Past paper Audit risk & Auditor response.planning & Risk Assessment

  6. Assessment Case study

COMMENTS

  1. PDF CASE STUDY AUDIT PLANNING & RISK ASSESSMENT 1. INTRODUCTION

    STEP THREE: Risk assessment can enhance audit resource planning and allocation. Risk assessment also has a direct impact on overall audit planning. From the information available and the outcomes of Steps One and Two, identify those generic risk factors that will help you to prioritise the areas of highest risk.

  2. PDF Developing a Risk-based Internal Audit Plan

    internal audit engagements based on a risk assessment performed at least annually. This practice guide describes a systematic approach to creating and maintaining a risk-based internal audit plan. The CAE and assigned internal auditors work together to: Understand the organization. Identify, assess, and prioritize risks.

  3. PDF Conducting an Internal Audit Risk Assessment Using an Audit ...

    Why perform a risk assessment as a basis for putting together internal audit's plan of engagements or activity? For most internal audit leaders, the risk assessment has been, at the very least, a best practice or a ... CONDUCTING AN INTERNAL AUDIT RISK ASSESSMENT USING AN AUDIT UNIVERSE AND RISK FACTOR SCORING APPROACH STEP 1: IDENTIFYING THE ...

  4. PDF Planning an Audit

    Planning an Audit 277 AU-CSection300 Planning an Audit Source:SASNo.122;SASNo.128;SASNo.134. ... 278 Risk Assessment and Response to Assessed Risks Requirements ... the case in a smaller entity,may be used,provided that they are tailored to

  5. PDF RISK ASSESSMENT IN PERFORMANCE AUDITS

    is a detailed guide for the auditor on how to perform risk assessment in the planning of a performance audit. A case study, illustrating how a risk assessment is carried out in practice, is annexed to this guideline. The case is adapted from the audit on Translation Expenditure of the Institutions. 2. List of related documents . Risk_my audit.xls

  6. Understanding the Role of Risk assessment in audit planning

    Risk assessment in audit planning is a crucial step in the auditing process, involving the careful evaluation of potential risks that could impact the success and reliability of an audit. Risk assessment essentially means identifying, analyzing, and understanding the various factors that may affect the outcome of an audit engagement.

  7. Continuous Auditing and Risk-Based Audit Planning—An Empirical Analysis

    Specifically, the internal audit function (IAF) could use CA as a methodology in order to add a continuous perspective to their risk assessment. This study examines factors associated with the use of CA information in the IAF's risk-based audit planning (RBAP). We use survey data from 264 chief audit executives to address our research question.

  8. Risk Assessment and Planning

    Risk assessment, planning, and budgeting of audits are essential precursors to the successful audit. ... For audits performed by an outside audit firm, risk assessment is a very crucial stage before accepting an audit engagement. It is an integral part of determining the audit tasks that will be performed in the audit program. ... In this case ...

  9. Case studypempal audit planning risk assessment eng

    CASE STUDY AUDIT PLANNING & RISK ASSESSMENT 1. INTRODUCTION. The objective of this case study is to reinforce the messages contained in the Audit Planning & Risk Assessment Guide through the completion of a practitioner based case study that will cover the following key stages in the audit planning and risk assessment cycle:

  10. Best Practices for Risk Assessment and Audit Planning

    Summary. To continue meeting its assurance mandate in an increasingly complex risk landscape, audit departments need to continuously refine their approach to risk assessment and audit planning. This research provides audit leaders guidance in developing best practice approaches.

  11. Continuous Auditing and Risk-Based Audit Planning

    A real-life case study of the development of an integrated risk-based annual audit plan is presented, and sensitivity analysis is performed to illustrate the validity of the proposed approach.

  12. PDF Combined Risk Assessment Study and Audit Plan Final 7 17-MGO

    - ANNUAL AUDIT WORK PLAN FISCAL YEAR 2019 - 3 Risk Assessment Approach In accordance with the IIA Standard 2010.A1, this internal audit plan is based on a documented risk assessment and input from Internal Audits. Figure 1.0 below depicts the general process MGO undertook as part of this assessment. Figure 1.0: Risk Assessment Process Overview

  13. Audit and assurance case study questions

    Audit and assurance case study questions. The first article in this series of two on Paper P7 case study questions discussed question style, what to look for in the requirements, how higher-level skills are tested, and the meaning of professional marks within a question requirement. This second article goes through part of a typical Section A ...

  14. Risk based internal auditing within Greek banks: a case study approach

    This study focuses on the evaluation of RBIA approach within three big Greek banks. Each selected bank internal audit division represents different risk assessment and audit planning practices. Case study 1 represents the vast majority of Greek banks internal audit divisions and includes those that do not adopt RBIA practice at all.

  15. The business risk audit

    The case is based on the audit work papers for a client of a large accounting firm over the period 1996-2000, supplemented by interviews with members of the audit team and reference to the documented methodology of the audit firm. A case study approach was chosen because it allowed for an in-depth review of the nature and extent of planning ...

  16. PDF Constructing the Audit Risk Assessment by the Audit Team Leader When

    The aim of this study is to construct the assessment of the expected audit risk by the audit team leader (ATL) during the planification phase of the audit. To do so, the use of fsQCA has powerful potential into the audit arena, as the audit risk assessment is critically related to auditors' judgement and perception.

  17. Internal audit: A case study of impact and quality of an internal

    Based on a single-case study, the management letters from IAF and the supporting process in a large financial institution were analysed. In the case study, IAF is organised, staffed and working in such a way that EA can rely on the work delivered at a level of high control reliance. IAF performs only auditing and is not involved in any other roles.

  18. PDF Optimization of Safety Audit Planning: A Case Study of Process Plant in

    Safety audit planning is the predetermining activity of what, how, where, when and by whom the audit will be carried out to achieve its objective. Safety audit planning is a complex process and an anticipatory function which will provide audit activity on time with the least audit risk and cost by assigning the auditors with the

  19. case studypempal audit planning risk assessment eng

    1 CASE STUDY AUDIT PLANNING & RISK ASSESSMENT 1. INTRODUCTION The objective of this case study is to reinforce the messages contained in the Audit Planning & Risk Assessment Guide through the completion of a practitioner based case study that will cover the following key stages in the audit planning and risk assessment cycle: Identification of the Audit Universe and related objectives ...

  20. Case Study II

    Delve into Case Study II of planning the Human Resources Audit. Gain insights into strategic planning, risk assessment, and scoping for an impactful audit. Learn how to ensure HR compliance, optimize processes, and enhance employee management through effective audit planning and execution.

  21. Assignment 1 Audit Planning and Controls Case Study- Ankur Mahajan

    Assignment 1: Audit Planning and Controls Case Study. By: Ankur Mahajan. Answer A: The Audit Firm should consider these three criteria before take the engagement: Integrity. This is an important aspect for the course of the audit, FoodBots seems to have been in a dangerous situation in terms of internal control, risk management, and the ability and willingness to provide essential information.

  22. New Case Study: Using Scenario Planning to Consider Emerging Risks

    Recent events have highlighted the importance of planning for an uncertain future. The ERM Initiative is excited to release this new case study "A Look into The Future with Scenario Planning: A Survey of ERM Practices" that looks at ways multiple organizations use scenario planning to address uncertainty and identify the risks and opportunities that may arise under different conditions.

  23. Case Study: Women's Tech Hubs Moldova

    Analysis in English on Moldova about Gender and Protection and Human Rights; published on 9 Apr 2024 by UN Women, War Child UK and 2count other organizations