The Relationships between Computer Auditing Activity and. Performance

Similar documents
The Impact of Enterprise Resource Planning (ERP) System on the Cost and Price of Auditing Auditor s Perspective

An Empirical Analysis on the Performance Factors of Software Firm

Exploring the Drivers of E-Commerce through the Application of Structural Equation Modeling

A COMPARISON ANALYSIS ON THE INTENTION TO CONTINUED USE OF A LIFELONG LEARNING WEBSITE

Influence of Tactical Factors on ERP Projects Success

One Continuous Auditing Practice in China: Data-oriented Online Auditing(DOOA)

White Paper. Evolution of Auditing: From the Traditional Approach to the Future Audit 1. aicpa.org/frc

A PANEL STUDY FOR THE INFLUENTIAL FACTORS OF THE ADOPTION OF CUSTOMER RELATIONSHIP MANAGEMENT SYSTEM

Factors Influencing Audit Technology Acceptance by Audit Firms: A New I-TOE Adoption Framework

The Online Banking Usage in Indonesia: An Empirical Study

EXAMINING HEALTHCARE PROFESSIONALS ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS USING UTAUT

Innovations in Audit Technology: A Model of Continuous Audit Adoption

SYSTEMS INTEGRATION, MANAGEMENT INVOLVEMENT AND QUALITY OF INTERNAL CONTROLS AND AUDITING

An Instrument to Assess Organizational Readiness to Implement Knowledge Management Process

AC : ENTERPRISE RESOURCE PLANNING: A STUDY OF USER SATISFACTION WITH REFERENCE TO THE CONSTRUCTION INDUSTRY

Data & Analytics in Internal Audit. January 13, 2015

EFFECTIVENESS OF DETECTIVE AND PREVENTATIVE INFORMATION SECURITY CONTROLS IN INFORMATION SYSTEMS ORGANIZATIONS

Issues in Information Systems Volume 16, Issue I, pp , 2015

Continuous Controls Monitoring ISACA, Houston Chapter. August 17, 2006

Enterprise Resource Planning (ERP) Software Implementation Impacts on the Auditing Activities

An Empirical Study on the Effects of Software Characteristics on Corporate Performance

RELATIONSHIP BETWEEN ORGANIZATIONAL FACTORS, TECHNOLOGICAL FACTORS AND ENTERPRISE RESOURCE PLANNING SYSTEM IMPLEMENTATION

The Empirical Analysis Model on Critical Success Factors for Emergency Management Engineering Information System

EXAMINING STUDENTS ACCEPTANCE OF TABLET PC USING TAM

Relationship Quality as Predictor of B2B Customer Loyalty. Shaimaa S. B. Ahmed Doma

Technology Acceptance on Smart Board among Teachers in Terengganu Using UTAUT Model

ACHIEVING SARBANES-OXLEY COMPLIANCE WITH XBRL-BASED ERP AND CONTINUOUS AUDITING

Determinants of audit fees in Bahrain: An empirical study

Evaluating the Factors Affecting on Intension to Use of E-Recruitment

Continuous Auditing in Big Data Computing Environments: Towards an Integrated Audit Approach by Using CAATTs

A Systematic Change Management Capability Maturity Assessment Framework for Contracting Organizations

The Future of Audit. AICPA s ASEC (Assurance Services Executive Committee)

Factors Affecting the Adoption of Computer Assisted Audit Techniques in Audit Process: Findings from Jordan

Research of Female Consumer Behavior in Cosmetics Market Case Study of Female Consumers in Hsinchu Area Taiwan

The Performance of Customer Relationship Management System:

Adoption of Computer Assisted Audit Tools and Techniques (CAATTs) by Internal Auditors: Current issues in the UK

From CAATTs Adoption to Continuous Auditing Systems Implementation: An Analysis Based on Organizational Routines Theories

INVESTIGATING BUSINESS SCHOOLS INTENTIONS TO OFFER E-COMMERCE DEGREE-PROGRAMS

Cost Analysis on ERP System Implementation amongst Malaysian SMEs

E-learning: Students perceptions of online learning in hospitality programs. Robert Bosselman Hospitality Management Iowa State University ABSTRACT

Contents. xv xvii xxi. Case Studies Preface Acknowledgments

Modifying Business Continuity Plan (BCP) towards an effective automobile Business Continuity Management (BCM); a quantitative approach

How Consultant Participation Lead to ERP Implementation Satisfaction: A study Upon the Iranian Industries

Older-Users Acceptance of Smartcard Payment Systems: An Investigation of an Old-street Venders

The Impact of Information Technology on Knowledge Management Practices

Survey of more than 1,500 Auditors Concludes that Audit Professionals are Not Maximizing Use of Available Audit Technology

Curriculum Vitae John R. Kuhn, Jr. PhD, CPA, CISA

Leverage Your Financial System to Enable Sarbanes-Oxley Compliance: An Evaluator s Guide

An Investigation on Learning of College Students and the Current Application Situation of the Web-based Courses

Impact of Computer-Assisted Audit Techniques on Sarbanes-Oxley Act Sections 404 and 409. Scarlett Choi ACC 626

AIS Audit Support by Simulation and Simulation Criteria Definition

LINKING BUSINESS ANALYTICS TO DECISION MAKING EFFECTIVENESS: A PATH MODEL ANALYSIS

User Acceptance of a Key Performance Indicators Monitoring System (KPI-MS) in Higher Education: An Application of the Technology Acceptance Model

The Intersection of Internal Controls and Cyber Security

Data Analytics in Internal Audit. Elizabeth Dunkerley

Factors Affecting Bidding Strategy in Construction

The Contribution of Business Intelligence Use and Business Intelligence System Infrastructure Flexibility to Organizational Dynamic Capability.

engage. empower. evolve. SARBANES-OXLEY COMPLIANCE

CONTINUOUS CONTROLS MONITORING

The empirical link between the internet, firmspecific characteristics, market characteristics, export marketing strategy and performance

Using Theory of Planned Behavior in Predicting Intention to Invest : Case of Indonesia

Fraud prevention software and its impact on decision making. Esperanza Huerta. University of Texas at El Paso. TerryAnn Glandon

J. Appl. Environ. Biol. Sci., 5(12S) , , TextRoad Publication

Continuous Auditing in Big Data Computing Environments: Towards an Integrated Audit Approach by Using CAATTs

How To Understand And Understand Forensic Accounting

THE ASSESSMENT OF ERP SYSTEM IMPLEMENTATION IN THE OPERATIONAL MANAGEMENT - A CASE STUDY OF THE LOGISTIC TRADING FIRM IN THAILAND

A Preliminary Investigation of the Necessary Skills, Education Requirements, and Training Requirements for Forensic Accountants

A Casual Structure Analysis of Smart phone Addiction: Use Motives of Smart phone Users and Psychological Characteristics

A Survey on the Need to Offer Forensic Accounting Education in the Kingdom of Bahrain

The ERP AuditLab - A prototypical Framework for Evaluating Enterprise Resource Planning System Assurance

Research of Enterprise Accounting Information System Internal Control Based on ERP. Huiyin Zheng

Enterprise systems and the re-shaping of accounting systems: A call for research

How to gather and evaluate information

IT Support through CAATTs - Systematic Requirements Analysis and Design for Process Audit

Continuous Auditing technology adoption in leading internal audit organizations

JANUARY 2013 VOL 4, NO 9 AN INVESTIGATION ON ADOPTION OF LEAN PRODUCTION PRINCIPLES IN KITCHENWARE MANUFACTURING INDUSTRIES.

Leveraging Continuous Auditing / Continuous Monitoring in internal audit April 10, 2012

INVESTIGATION OF EFFECTIVE FACTORS IN USING MOBILE ADVERTISING IN ANDIMESHK. Abstract

An Empirical Study on the Performance of Software Company with Software Type

Fraud Risk Management Program Review

# # % &# # ( # ) + #, # #./0 /1 & 2 % & 6 4 & 4 # 6 76 /0 / 6 7 & 6 4 & 4 # // 8 / 5 & /0 /# 6222 # /90 8 /9: ; & /0 /!<!

Management Science Letters

Global Headquarters: 5 Speen Street Framingham, MA USA P F

ORACLE ENTERPRISE GOVERNANCE, RISK, AND COMPLIANCE MANAGER FUSION EDITION

The Predictive Audit Framework

EMPLOYING GENERALIZED AUDIT SOFTWARE IN THE FINANCIAL SERVICES SECTOR: CHALLENGES AND OPPORTUNITIES

Exploring Information Quality in Accounting Information Systems Adoption

Revisiting the Risks of Software Development Outsourcing Project

Continuous Auditing: Implications for Assurance, Monitoring, and Risk Assessment

TECHNOLOGY CONSULTING SERVICES DIRECTOR AH Consulting

Exploring the critical factors influencing online lending intentions

International Journal of Accounting Information Systems

Investigating the effective factors on Customer Relationship Management capability in central department of Refah Chain Stores

Business Performance Evaluation Model for the Taiwan Electronic Industry based on Factor Analysis and AHP Method

Risk Assessment Questionnaire

End User Satisfaction With a Food Manufacturing ERP

Qi Liu Rutgers Business School ISACA New York 2013

Success factors in ERP systems implementations: lessons from practice Piotr Soja Cracow University of Economics, Cracow, Poland

Decision Support Systems

Determinants of Internet Entrepreneurship Intentions among Business School Students

Transcription:

2015 International Workshop on Computer Auditing Education 1 The Relationships between Computer Auditing Activity and Performance Tung-Hsien Wu, Feng Chia University, Taiwan, thwu33@gmail.com Abstract The majority of previous studies on CAATTs have discussed implementation willingness and the factors that influence willingness. However, few studies have addressed how internal auditing performance can be improved after implementing CAATTs. The implementation of CAATTs in the industry remains in the early stages, and the effectiveness of the CAATTs used by corporations is difficult to observe. Therefore, this study examined the relationships between the performance and computer auditing activity. The result found computer auditing activity significantly and positively influenced internal auditing performance. Keywords: computer audit, performance, internal audit, CAATTs Introduction With the rise in global competition, firms seek innovation as the primary means to obtain a competitive advantage and improve operational efficiency. Innovations in information technology (IT) play a key role in achieving these goals. Since the introduction of material requirement planning (MRP) and enterprise resource planning (ERP), IT has facilitated product innovation, process innovation, and increased efficiency. Furthermore, IT innovations typically result in enterprise growth. However, over the past 10 years, fraud, financial turbulence and crises, and transnational litigation have caused economic losses throughout the world. Following the Enron and WorldCom scandals in the United States, the U.S. Sarbanes-Oxley Act and similar legislation in other countries have demanded increased corporate governance. Nevertheless, according to an investigation conducted by the Association of Certified Fraud Examiners (ACFE) in 2010, global enterprise losses resulting from fraud amounted to more than US$2.9 trillion dollars. The clear increase in losses for

2015 International Workshop on Computer Auditing Education 2 2010 compared to that for 2008 indicate that fraud continues to rise despite the Sarbanes-Oxley Act reinforcing internal audit controls. Therefore, the internal control environment of corporate has changed with the rapid development of IT. In an environment where audit trails have declined significantly or even disappeared, audit risk has increased for internal auditors. To improve their work efficiency and effectiveness, auditors must adopt IT to satisfy the work demands of the IT era. CAATTs enable internal auditors to focus on high-risk business activities, reduce audit costs, improve efficiency, and enhance audit quality [4]. CAATTs are automated auditing techniques that if fully employed, allow companies to conduct continuous auditing or continuous monitoring to benefit business activities and improve information processing efficiency [6]. Previous studies on computer auditing have addressed several topics. For example, Kuhn and Sutton (2010) [12] investigated various models of operation for computer auditing. They held that two operation models exist, that is, embedded audit modules (EAMs) and monitoring control layers (MCLs), and compared the advantages and disadvantages between the two. Gonzalez, Sharma, and Galletta (2012) [7] used unified theory of acceptance and use of technology (UTAUT) to discuss the purposes of implementing computer auditing. Vasarhelyi, Alles, Kuenkaikaew, and Littley (2012) [16] discussed computer auditing maturity models. They used audit maturity models to divide computer auditing ability into five stages and investigated the computer auditing ability of various companies. Although previous studies have addressed a number of issues within computer auditing, few have made empirical contributions and conducted empirical investigations regarding the performance for enterprises following the implementation of computer auditing. Based on the research problems, the study investigated the correlations between performance and computer auditing activity by using partial least squares (PLS) methods. Literature Review CAATTs Computer auditing is one aspect of internal auditing that enables internal auditors to extract data from information systems and identify exceptions. Computer auditing differs from traditional auditing. The traditional auditing method employs sample and manual to execute audit work. Traditional audits require considerable human resources and time to execute. Furthermore, because traditional audits do not retain the audit trail in an information system, auditors cannot obtain sufficient and appropriate evidence to conduct comprehensive audit activities and maintain audit quality (Table 1).

2015 International Workshop on Computer Auditing Education 3 Traditional auditing Uses sampling to conduct audits Adopts manual methods to perform audits Requires substantial time Incurs significant costs Cannot retain audit trails in the Information system Repeat audit work must be conducted manually Computer auditing Obtains all available data to conduct audits Automatically performs audits Timely executes audits and submits the audit analysis results Reduces internal audit costs Saves audit trails in information system Audit programs can automatically repeat audit work Table 1. Comparison between traditional auditing and computer auditing Resource: Chan and Vasarhelyi (2011) Among computer auditing techniques, CAATTs are commonly employed to audit application controls [8]. CAATTs can integrate various system or database formats, and facilitate analysis to achieve the audit objective. CAATTs can be applied to the accounts payable, accounts receivable, anti-money laundering efforts, banking compliance, SOD, order-to-cash (OTC) processes, etc. These applications include a number of general controls and all application controls. CAATTs can also be used to write script for automated periodic audits and achieving continuous auditing and continuous monitoring according to management objectives [6]. The analytic capabilities of CAATTs are data analysis, applied analytics, managed analytics, continuous auditing, and continuous monitoring [1]. Computer Auditing Activity and Performance CAATTs assist internal auditors by automatically obtaining complete data and executing analyses. Internal auditors can repeat audit work by executing automatic audits, thereby reducing audit time and costs. In actual cases, Siemens, Sonae Distribuição Brasil, and MTN Nigeria substantially reduced their audit costs by employing computer auditing (Table 2). Therefore, companies aiming for efficient internal auditing must implement CAATTs.

2015 International Workshop on Computer Auditing Education 4 Company Siemens Sonae Distribuição Brasil MTN Nigeria Benefit Reduced stalled Reduced manual inventory by compliance costs to US$2.15 million in US$19 million four months Reduced the costs of monitoring potential leakages and fraud to US$60 million Table 2. Benefits of implementing CAATTs Resource: Alles et al. (2006), ACL (2012), and ACL (2012) The primary function of computer auditing is to assist with the performance of internal audits [18]. The goal of internal auditing is to ensure the effectiveness of internal control, which are designed to facilitate sound company management. It is to reasonably guarantee the achievement of the following three goals: (1) Operational effectiveness and efficiency, which refers to achieving company profit objective, and asset security; (2) reliability in financial reporting to ensure external financial statements,; and (3) regulatory compliance, which refers to all operations of a company meeting regulatory requirements without violating any laws. Internal auditing develops audit policies based on these three goals and set audit objectives for the execution of audit after assessing risks. Internal auditors should also develop a scope and projects for their computer auditing activities based on the developed audit policies. If the planned computer auditing activities can be completed according to schedule and the expected quality attained, the computer auditing team has successfully maintained the quality and efficiency of their auditing work. Relevant performance can be measured using indicators or metrics of team project performance, such as efficiency, completeness, compliance or accommodation with work progress, outcome quality, interaction, and communication [9] [17] [11] [13]. Therefore, the implementation of computer auditing can increase enterprise efficiency and benefits. Previous studies have also found that complete computer auditing establishment can conserve internal auditors manpower resources, reduce audit costs, reduce the time spent executing audit tasks, increase audit quality, and enable enterprises to improve operating efficiency [16] [7] [14] [10] [15]. Vasarhelyi et al. (2012) [16] conducted interviews with companies and found that they were all required to adhere to the Sarbanes-Oxley Act and had established specific departments to monitor and confirm their compliance. Computer auditing can assist in implementing Sarbanes-Oxley Act requirements, as well as facilitating monitoring activities and reducing monitoring time. Therefore, improvements to computer auditing activities may enhance enterprise efficiency and benefits. The study proposes Hypothesis as

2015 International Workshop on Computer Auditing Education 5 follows: Therefore, the study propose Hypothesis as follows: H: The computer auditing activities positively influences computer auditing activity performance. Research Design Measurement The study referenced studies from literature to measure the computer auditing activities [16] [5] [12] [17]. The study categorized these items into the categories of planning, audit execution, and reporting. For performance, the study explored the participants cognition regarding the performance of implementing computer auditing activities. The study examined prior studies from literature review to construct dimension of performance [16] [3]. The study investigated the correlations between performance and computer auditing activity by using partial least squares (PLS) methods. We use education, industry, licenses, position, and audit experience for the company as control variables. Questionnaires were distributed for member of the Institute of Internal Auditors in Taiwan. We use 7-point Likert scale to measure items. Result There are 246 valid questionnaires of 340 questionnaires and 188 questionnaires were filled out by internal auditors who company implementation CAATTs. Therefore, our test sample had 188 questionnaires. All factor loadings were exceeding 0.5, and all factor loadings exceeded the cross-loadings, the composite reliability exceeded the standard of 0.6. Further, Cronbach s alpha exceeded the standard of 0.7. The AVE exceeded 0.5, the square root of the AVE for each construct was greater than all other cross-correlations. Hence the model had fitted convergent validity and discriminant validity. This study examined the relationship model on the sample (Figure1). The results showed that computer auditing activity had a significant effect on performance (β = 0.551 at p < 0.001). Thus, hypothesis was also supported.

2015 International Workshop on Computer Auditing Education 6 Computer auditing activity 0.551*** Performance Control variables: Industry, license, education, position, audit experience for the company Note: * = significant when p <.05, ** = significant when p <.01, and ** = significant when p <.001 Figure 1 The result of the relationships between computer auditing activity and performance Conclusion Computer auditing activity significantly and positively influenced internal auditing performance. This indicates internal auditors that companies with CAATTs implementation thought that the computer auditing activity influenced their performance. For practical applications, the results of this study show enterprises how computer auditing activity to enhance internal auditing performance. Hence, when company want to enhance internal auditing performance, they need consider how to construct computer audit and strengthen the computer audit process. Reference [1] ACL (2011) The ACL Audit Analytic Capability Model: Navigating the journey from basic data analysis to continuous monitoring - A White Paper [2] Alles, M. G., Kogan, A., & Vasarhelyi, M. A. (2002). Feasibility and economics of continuous assurance. Auditing: A Journal of Practice & Theory, Vol. 21, No.1, pp.125-138. [3] Alles, M. G., Kogan, A., & Vasarhelyi, M. A. (2008). Putting continuous auditing theory into practice: Lessons from two pilot implementations. Journal of Information Systems, Vol. 22, No.2, pp.195-214. [4] Braun, R.L. & H.E. Davis. 2003. Computer-assisted audit tools and techniques:

2015 International Workshop on Computer Auditing Education 7 Analysis and perspectives. Managerial Auditing Journal Vol. 18, No. 9, pp.725-731. [5] Chan, D. Y., & Vasarhelyi, M. A. (2011). Innovation and practice of continuous auditing. International Journal of Accounting Information Systems, Vol. 12, No.2, pp.152-160. [6] Sun, Chia Ming, "The Adaptation and Routinization Processes of A Continuous Auditing System Implementation" (July 29, 2012). AMCIS 2012 Proceedings. Paper 21. [7] Gonzalez, G. C., Sharma, P. N., & Galletta, D. F. (2012). The antecedents of the use of continuous auditing in the internal auditing context. International Journal of Accounting Information Systems. Vol. 13, No.3, pp.248-262. [8] Hall, J. A. (2010). Information technology auditing and assurance. South-Western Pub. [9] Henderson, J. C., & Lee, S. (1992). Managing I/S design teams: a control theories perspective. Management Science, Vol 38, No.6, pp.757-777. [10] Janvrin, D., Bierstaker, J., & Lowe, D. J. (2008). An examination of audit information technology use and perceived importance. Accounting Horizons, Vol. 22, No. 1, pp.1-21. [11] Keil, M., Rai, A., & Liu, S. (2012). How user risk and requirements risk moderate the effects of formal and informal control on the process performance of IT projects. European Journal of Information Systems. Vol. 22, No.6, pp.650-672 [12] Kuhn Jr, J. R., & Sutton, S. G. (2010). Continuous auditing in ERP system environments: The current state and future directions. Journal of Information Systems, Vol.24, No. 1, pp. 91-112. [13] Lu, Y., Xiang, C., Wang, B., & Wang, X. (2011). What affects information systems development team performance? An exploratory study from the perspective of combined socio-technical theory and coordination theory.computers in Human Behavior, Vol. 27, No. 2, pp.811-822. [14] Masli, A., Peters, G. F., Richardson, V. J., & Sanchez, J. M. (2010). Examining the potential benefits of internal control monitoring technology. The Accounting Review, Vol. 85, No.3, pp.1001-1034. [15] Rezaee, Z., Sharbatoghlie, A., Elam, R., & McMickle, P. L. (2002). Continuous auditing: Building automated auditing capability. Auditing: A Journal of Practice & Theory, Vol. 21, No. 1, pp.147-163. [16] Vasarhelyi, M. A., Alles, M., Kuenkaikaew, S., & Littley, J. (2012). The acceptance and adoption of continuous auditing by internal auditors: A micro analysis. International Journal of Accounting Information Systems, Vol.13, pp.267-281.

2015 International Workshop on Computer Auditing Education 8 [17] Wang, E. T., Ju, P. H., Jiang, J. J., & Klein, G. (2008). The effects of change control and management review on software flexibility and project performance.information & management, Vol. 45, No.7, pp.438-443. [18] Zhang, L., Pawlicki, A. R., McQuilken, D., & Titera, W. R. (2012). The AICPA Assurance Services Executive Committee Emerging Assurance Technologies Task Force: The Audit Data Standards (ADS) Initiative. Journal of Information Systems, Vol. 26, No. 1, pp.199-205.