2008
DOI: 10.1016/j.im.2008.03.004
|View full text |Cite
|
Sign up to set email alerts
|

An auditing protocol for spreadsheet models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

2008
2008
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 26 publications
(25 citation statements)
references
References 16 publications
(18 reference statements)
0
9
0
Order By: Relevance
“…Powell et al (2008) cite spreadsheets in common practice to typically include formulas with more than 100 characters and 10 operators. Such formulas will certainly exceed the working memory capacity of all but the most expert spreadsheet programmers.…”
Section: Discussionmentioning
confidence: 99%
“…Powell et al (2008) cite spreadsheets in common practice to typically include formulas with more than 100 characters and 10 operators. Such formulas will certainly exceed the working memory capacity of all but the most expert spreadsheet programmers.…”
Section: Discussionmentioning
confidence: 99%
“…Regarding females, the main strategies with which they succeeded, code inspection and specification checking, are well respected in both the software engineering [3] and the spreadsheet auditing communities [21]. Yet, a recurring theme in our results is that these strategies by females are mismatched with the features available, in this environment and in most other end-user programming environments.…”
Section: Discussionmentioning
confidence: 64%
“…In spreadsheets, this translates to examining formulas to judge their correctness. Code inspection in spreadsheets is widely regarded as a necessary part of spreadsheet auditing processes [21], such as the one used at the U.K. Department of Revenue and Customs [2]. The WYSIWYT environment has the unusual (for spreadsheets) ability to display multiple formulas in the same view as values, which allowed code inspection to co-occur with testing ( Figure 4).…”
Section: Code Inspectionmentioning
confidence: 99%
“…ISACA's Risk IT Framework calls for expressing IT risks in clear business-relevant terms and developing risk scenarios based on the identified business risks. 6 We have proposed integrating the objectives categories from the COSO ERM model into the process of inventorying spreadsheets. The COSO ERM model should help to facilitate the determination of the three risk factors: the business relevance, the impact of the errors in business terms, and the time frame in which the errors will be seen.…”
Section: Putting It All Togethermentioning
confidence: 99%