{"id":146,"date":"2009-01-02T23:18:43","date_gmt":"2009-01-02T22:18:43","guid":{"rendered":"http:\/\/www.auditsi.eu\/?p=146"},"modified":"2012-04-28T12:17:06","modified_gmt":"2012-04-28T10:17:06","slug":"extraction-et-exploitation-des-donnees-du-systeme-d%e2%80%99information-methodologie-et-cas-pratiques","status":"publish","type":"post","link":"https:\/\/www.auditsi.eu\/?p=146","title":{"rendered":"Extraction et exploitation des donn\u00e9es du syst\u00e8me d\u2019information : m\u00e9thodologie et cas pratiques"},"content":{"rendered":"<p style=\"text-align: justify;\">La production des comptes annuels des entreprises suit un processus qui prend sa source dans le syst\u00e8me d&#8217;information. La validation du fonctionnement du syst\u00e8me d&#8217;information permet de valider les \u00e9critures comptables courantes. Cette validation passe par une \u00e9tude approfondie du syst\u00e8me d&#8217;information : conception, proc\u00e9dures, contr\u00f4le interne&#8230; et syst\u00e8me informatique. Ces analyses passent notamment par l&#8217;extraction de donn\u00e9es informatiques. Ces extractions sont pratiqu\u00e9es par les auditeurs externes (commissaires aux comptes) et par les auditeurs internes.<\/p>\n<p style=\"text-align: justify;\">En vue d&#8217;obtenir le dipl\u00f4me d&#8217;expertise-comptable, j&#8217;ai r\u00e9dig\u00e9 mon m\u00e9moire sur le th\u00e8me des extractions de donn\u00e9es dans le cadre du commissariat aux comptes. Ce m\u00e9moire fournit une m\u00e9thodologie visant \u00e0 s\u00e9curiser les extractions de donn\u00e9es et leur exploitation ainsi que des cas pratiques. Les cas pratiques, \u00e9tablis \u00e0 partir de donn\u00e9es r\u00e9elles, t\u00e9moignent de ce que les extractions de donn\u00e9es apportent aux auditeurs dans leur d\u00e9marche d&#8217;audit (tests de proc\u00e9dure, contr\u00f4les de coh\u00e9rence, tests de fonctionnement du syst\u00e8me d&#8217;information et du syst\u00e8me informatique, d\u00e9tection de la fraude). Les diff\u00e9rents cas \u00e9tudi\u00e9s sont parfaitement adaptables et peuvent \u00eatre utilis\u00e9s dans un autre contexte que le commissariat aux comptes (audit interne, expertise-comptable&#8230;).<\/p>\n<p style=\"text-align: justify;\">Le m\u00e9moire peut \u00eatre t\u00e9l\u00e9charg\u00e9 gratuitement (apr\u00e8s inscription) \u00e0 cette adresse <a title=\"M\u00e9moire d'expertise-comptable\" href=\"http:\/\/www.auditsi.eu\/?page_id=459\">http:\/\/www.auditsi.eu\/?page_id=459<\/a> (lien A&amp;SI) ou contre paiement sur le site suivant <a href=\"http:\/\/www.bibliobaseonline.com\/notice.php?NUMERO=98188\" target=\"_blank\">http:\/\/www.bibliobaseonline.com\/notice.php?NUMERO=98188<\/a> (site d\u00e9pendant de l&#8217;Ordre des experts-comptables).<\/p>\n<div id=\"polls-5\" class=\"wp-polls\">\n\t<form id=\"polls_form_5\" class=\"wp-polls-form\" action=\"\/index.php\" method=\"post\">\n\t\t<p style=\"display: none;\"><input type=\"hidden\" id=\"poll_5_nonce\" name=\"wp-polls-nonce\" value=\"e916b2c7f1\" \/><\/p>\n\t\t<p style=\"display: none;\"><input type=\"hidden\" name=\"poll_id\" value=\"5\" \/><\/p>\n\t\t<p style=\"text-align: center;\"><strong>Dans le cadre de vos missions d'audit, effectuez-vous des extractions de donn\u00e9es informatiques<\/strong><\/p><div id=\"polls-5-ans\" class=\"wp-polls-ans\"><ul class=\"wp-polls-ul\">\n\t\t<li><input type=\"radio\" id=\"poll-answer-17\" name=\"poll_5\" value=\"17\" \/> <label for=\"poll-answer-17\">Oui<\/label><\/li>\n\t\t<li><input type=\"radio\" id=\"poll-answer-18\" name=\"poll_5\" value=\"18\" \/> <label for=\"poll-answer-18\">Non, j'estime que ce n'est pas n\u00e9cessaire<\/label><\/li>\n\t\t<li><input type=\"radio\" id=\"poll-answer-19\" name=\"poll_5\" value=\"19\" \/> <label for=\"poll-answer-19\">Non, parce que je ne sais pas comment faire<\/label><\/li>\n\t\t<\/ul><p style=\"text-align: center;\"><input type=\"button\" name=\"vote\" value=\"   Vote   \" class=\"Buttons\" onclick=\"poll_vote(5);\" onkeypress=\"poll_result(5);\" \/><\/p><p style=\"text-align: center;\"><a href=\"#ViewPollResults\" onclick=\"poll_result(5); return false;\" onkeypress=\"poll_result(5); return false;\" title=\"View Results Of This Poll\">View Results<\/a><\/p><\/div>\n\t<\/form>\n<\/div>\n<div id=\"polls-5-loading\" class=\"wp-polls-loading\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.auditsi.eu\/wp-content\/plugins\/wp-polls\/images\/loading.gif\" width=\"16\" height=\"16\" alt=\"Chargement ...\" title=\"Chargement ...\" class=\"wp-polls-image\" \/>&nbsp;Chargement ...<\/div>\n\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img decoding=\"async\" src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Extraction%20et%20exploitation%20des%20donn%C3%A9es%20du%20syst%C3%A8me%20d%E2%80%99information%20%3A%20m%C3%A9thodologie%20et%20cas%20pratiques\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"excerpt":{"rendered":"<p>La production des comptes annuels des entreprises suit un processus qui prend sa source dans le syst\u00e8me d&#8217;information. La validation du fonctionnement du syst\u00e8me d&#8217;information permet de valider les \u00e9critures comptables courantes. Cette validation passe par une \u00e9tude approfondie du syst\u00e8me d&#8217;information : conception, proc\u00e9dures, contr\u00f4le interne&#8230; et syst\u00e8me informatique. Ces analyses passent notamment par &#8230;<\/p>\n<p><a href=\"https:\/\/www.auditsi.eu\/?p=146\" class=\"more-link\">Continue reading &lsquo;Extraction et exploitation des donn\u00e9es du syst\u00e8me d\u2019information : m\u00e9thodologie et cas pratiques&rsquo; &raquo;<\/a><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Extraction%20et%20exploitation%20des%20donn%C3%A9es%20du%20syst%C3%A8me%20d%E2%80%99information%20%3A%20m%C3%A9thodologie%20et%20cas%20pratiques\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"ngg_post_thumbnail":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[50,28,39,40,10,8,4,46,29,6,21,469,27,282,24,470],"tags":[60,166,940,23,1634,1626,942,1631,941,1632,1622,939,41,1639,17,1633,52,22,99,1621,43,639,1623,394,301,26,1629,57,42,44,1624,68,182,56],"class_list":["post-146","post","type-post","status-publish","format-standard","hentry","category-audit-de-donnees","category-bibliographie","category-cas-pratiques","category-controle-des-comptes","category-controle-interne","category-extractions-de-donnees","category-fraude","category-integrite-des-donnees-systeme-informatique","category-livres-ouvrages","category-mission-du-commissaire-aux-comptes","category-nep","category-reglementation-et-demarche-daudit","category-sondages","category-sql","category-systeme-dinformation","category-techniques-daudit","tag-access","tag-analyse-de-donnees","tag-ascii","tag-audit","tag-audit-de-donnees","tag-bibliographie","tag-boi-du-24012006","tag-cas-pratiques","tag-controle-des-comptabilites-informatisees","tag-controle-des-comptes","tag-controle-interne","tag-csv","tag-cycle-clients","tag-cycle-stocks","tag-demarche-daudit","tag-excel","tag-exploitation-des-donnees","tag-extraction-de-donnees","tag-faille-de-securite","tag-fraude","tag-integrite-des-donnees","tag-loi-de-benford","tag-nep","tag-nep-240","tag-normes-dexercice-professionnel","tag-prevention-de-la-fraude","tag-protection-des-donnees","tag-requete-sql","tag-revue-analytique","tag-separation-des-fonctions","tag-systeme-dinformation","tag-tableau-croise-dynamique","tag-tcd","tag-tracabilite"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":false,"_links":{"self":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/146","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=146"}],"version-history":[{"count":4,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/146\/revisions"}],"predecessor-version":[{"id":148,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/146\/revisions\/148"}],"wp:attachment":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=146"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=146"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=146"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}