CONSIDERATIONS ON APPLYING THE ANALYSIS MATRIX METHODS OF THE RISKS WITHIN THE AUDIT OF THE PROCUREMENT-PAYMENT CYCLE
Ecoforum Journal
View Archive InfoField | Value | |
Title |
CONSIDERATIONS ON APPLYING THE ANALYSIS MATRIX METHODS OF THE RISKS WITHIN THE AUDIT OF THE PROCUREMENT-PAYMENT CYCLE
|
|
Creator |
SLOBODEANU, Svetlana; Academy of Economic Studies of Moldova
MUNTEANU, Neli; Academy of Economic Studies of Moldova |
|
Subject |
financial audit; procurement-payments cycle; significant distortions; matrix method; risk for fraud
M42 Auditing |
|
Description |
In the article hereby we analyse the matrix method of analysis of the risks for fraud and error at the level of the procurement-payments cycle. The risk of presentation of certain fraudulent information regarding the accounts of the procurement-payments cycle becomes more and more accentuated in the enhancement of the administration’s wish to present financial indicators of performance. In these conditions, the auditor is to necessarily quantify the involvement of this phenomenon for the report of audit. As a consequence, the auditor is to evaluate the risk for fraud and apply additional audit procedures for identifying all the possible indicators for „remaking” the financial situations on the side of the accounts of suppliers, activity, as a last consequence of which may be a qualified opinion on audit.
|
|
Publisher |
Association of Educational and Cultural Cooperation Suceava from Stefan cel Mare Universit
|
|
Date |
2014-07-31
|
|
Type |
Peer-reviewed Article
|
|
Format |
application/pdf
|
|
Identifier |
http://www.ecoforumjournal.ro/index.php/eco/article/view/86
|
|
Source |
Ecoforum Journal; Vol 3, No 2 (2014); 11
|
|
Language |
en
|
|
Relation |
http://www.ecoforumjournal.ro/index.php/eco/article/download/86/214
http://www.ecoforumjournal.ro/index.php/eco/article/download/86/257 |
|
Rights |
An copyright form will have to accompany your submission (the signed copyright form has to be scanned). You can get the .PDF form version on-line (see the link bellow). Authors are responsible for obtaining any security clearances. All authors have to sign the copyright transfer form. There are some restrictions regarding the length of the copyright file, so please read carefully the instruction provided there.
|
|