Abstract
Cuidar la calidad de la auditoria para la recaudación y gestión tributaria, es de gran importancia para revelar los problemas existentes en la recaudación tributaria, la gestión de las autoridades fiscales y promover un gobierno fiscal de acuerdo a la ley. El documento analiza la operación basada en la plataforma de auditoría asistida por computadora en la recaudación y gestión de impuestos; señala que algunos problemas residen en el proceso. A continuación, se presenta algunas sugerencias para perfeccionar la auditoría asistida por computadora en la recaudación de impuestos y la gestión tributaria. Los resultados de la investigación radican en que: Los auditores deben prestar mucha atención a las pistas descubiertas en las auditorías asistidas por computadora, leer más los archivos de recaudación de impuestos y de la gestión de las empresas relacionadas, para ir al sitio a verificar la realización, declaración, entrada y atrasos de impuestos sospechosos. La prueba de cumplimiento en la auditoría asistida por computador u ordenador es una prueba de la solidez y eficacia del control interno de las autoridades fiscales en el contexto de los actuales sistemas informatizadas.
References
Farkas, M., & Murthy, U. S. (2014). Nonprofessional investors' perceptions of the incremental value of continuous auditing and continuous controls monitoring: An experimental investigation. International Journal of Accounting Information Systems, 15(2), 102-121. doi:https://doi.org/10.1016/j.accinf.2013.11.002
Flores, F., Graves, M., Hartfield, B., & Winograd, T. (1988). Computer systems and the design of organizational interaction. ACM Transactions on Information Systems (TOIS), 6(2), 153-172.
Fortvingler, J., & Szívós, L. (2016). Different approaches to fraud risk assessment and their implications on audit planning. Periodica Polytechnica, Social and Management Sciences, 24(2), 102-112. doi:10.3311/PPso.8436
Garza, P. (2003). Adversarial interviews in technical investigations: Forensic interviews part II. Computer Security Journal, 19(1), 13-21.
Gottschalk, P. (2016). Knowledge management in criminal investigations: The case of fraud examiners. Journal of Information and Knowledge Management, 15(4). doi:10.1142/S021964921650043X
Ilias, A., & Zainudin, N. N. B. (2013). Factor affecting the Computerised Accounting System (CAS) usage in public sector. Journal of Internet Banking and Commerce, 18(1).
Lamport, L. (2000). How to make a mulitprocessor computer that correctly executes multiprocess programs. Paper presented at the Readings in computer architecture.
Lan, S., & Zhong, R. Y. (2016). An Evaluation Model for Financial Reporting Supply Chain Using DEMATEL-ANP. Procedia CIRP, 56, 516-519. doi:https://doi.org/10.1016/j.procir.2016.10.101
Li, B. C. (2014) Application research of computerized accounting technology in constructing innovative financial management of rural areas. Vol. 685 (pp. 719-722): Trans Tech Publications Ltd.
Manyanga, T., Tremblay, M. S., Chaput, J. P., Katzmarzyk, P. T., Fogelholm, M., Hu, G., . . . Pietrobelli, A. (2017). Socioeconomic status and dietary patterns in children from around the world: Different associations by levels of country human development? BMC Public Health, 17(1). doi:10.1186/s12889-017-4383-8
Mao, J., Li, Y., & Liu, X. (2014). Design and implementation of computerized accounting system.
Meldman, J. A. (1977). A structural model for computer-aided legal analysis. Rutgers J. Computers & L., 6, 27.
Minnick, K., & Noga, T. (2010). Do corporate governance characteristics influence tax management? Journal of Corporate Finance, 16(5), 703-718.
Ojo, M., & DiGabriele, J. A. (2016). Fundamental or enhancing roles? The dual roles of external auditors and forensic accountants Value Relevance of Accounting Information in Capital Markets (pp. 59-78): IGI Global.
Panigrahi, P. K. (2011). A framework for discovering internal financial fraud using analytics.
Prathap, G. (2017). Letter to the editor: comments on the paper of Lucio Bertoli-Barsotti and Tommaso Lando: a theoretical model of the relationship between the h-index and other simple citation indicators.
Scientometrics, 1-4. doi:10.1007/s11192-017-2404-0
Rikhardsson, P., & Dull, R. (2016). An exploratory study of the adoption, application and impacts of continuous auditing technologies in small businesses. International Journal of Accounting Information Systems, 20, 26-37. doi:https://doi.org/10.1016/j.accinf.2016.01.003
Schneider, A. (2009). Does the expectation of finding deficiencies impact internal audit work? Journal of Applied Accounting Research, 10(2), 122-131. doi:10.1108/09675420910984682
Szezyńska, M., Huebner, E., Bem, D., & Ruan, C. (2009) Methodology and tools of is audit and computer forensics - The common denominator. Vol. 5576 LNCS (pp. 110-121).
Wiles, J., & Rogers, R. (2007). Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators: Elsevier Inc.
Zhang, C. J., Zuo, X. Y., Zhang, C., & Wu, X. G. (2013). Knitting data ethernet transmission time accounting for computerized flat knitting machine. Wool Textile Journal, 41(3), 10-13.
You are free to:
Share — copy and redistribute the material in any medium or format.
Adapt — remix, transform, and build upon the material.
The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
NonCommercial — You may not use the material for commercial purposes.
ShareAlike — If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.
No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.