1.Abu-Musa, A. A. (2002) Security of computerized accounting information systems: An integrated evaluation approach. Journal of American Academy of Business, 2(1), 141-159.
2.Agmon, N., & Ahituv, N. (1987). Assessing data reliability in an information system. Journal of Management Information Systems, 4(2), 34-44.
3.AICPA. (1976). Codification of Statement on Auditing Standards. Pars. 321.07 and 321.08。
4.Al-Mashari M., Irani, Z. & Zairi M. (2001). Business process reengineering: A survey of international experience. Business Process Management Journal, 7(5), 437-455.
5.Altamuro J., & Beatty A. (2010). How does internal control regulation affect financial reporting. Journal of Accounting and Economics, 49(1), 58-74.
6.Ashbaugh-Skaife, H., Collins, D. W., & Kinney Jr. W. R. (2007). The discovery and reporting of internal control deficiencies prior to SOX-mandated audits. Journal of Accounting and Economics, 44(1), 166-192.
7.Ashbaugh-Skaife, H., Collins, D. W., Kinney Jr., W. R., & Lafond, R.(2009). The effect of SOX internal control deficiencies on firm risk and cost equity. Journal of Accounting Research, 47(1), 1-43.
8.Attaran, M. (2004). Exploring the relationship between information and business process reengineering. Information & Management, 41(3), 585-596.
9.Bada, A. O. (2002). Local adaptations to global trends: A study of an IT-based organizational change program in a Nigerian Bank. The Information Society, 18(1), 77-86.
10.Bailey Jr., A.D., Duke, G..L., Gerlach, J., Ko, Chen-en, Meservy, R.D. & Whinston, A.B. (1985). TICOM and the analysis of internal controls. The Accounting Review, 35(1), 186-201.
11.Bailey, J. E. & Pearson, S. W. (1983). Development of a Tool for Measuring and Analyzing Computer User Satisfaction. Management Science, 29(5), 519-529.
12.Baird, D. G., & Rasmussen, R.K. (2002). Four (or Five) Easy lessons from Enron. Vanderbilt Law Review, 55(6), 1787-1808.
13.Ballou, D. P. & Pazer, H. L.(1985). Modeling Data and Process Quality in Multi-input, Multi-output Information Systems. Management Science, 31(2), pp.150-162.
14.Ballou, D. P., Wang, R., Pazer, H. L. & Giri, K.T. (1998). Modeling Information Manufacturing Systems to Determine Information Product Quality. Management Science, 44(4), 462-484.
15.Banks, I. D. (1977). Internal Control of On Line Real Time Computer Systems. Management Accounting, 58(1), 28-31.
16.Barra, R. A. (2010). The impact of controls and penalties on fraud. Journal of Information Systems, 24(1), 1-21.
17.Barrett, M., Grant, D. & Wailes, N. (2006). ICT and organizational change: Introduction to the special issue. The Journal of Applied Behavioral Science, 42(1), 6-22.
18.Bell, T. B. & Carcello, J. V. (2000). A decision aid for assessing the likelihood of fraudulent financial reporting. Auditing: A Journal of Practice & Theory, 19(1),169-185.
19.Bianco, M., & Casavola, P. (1999). Italian corporate goverance: effects on finanacial structure and firm performance. European Economic review, 43(1), 1057-1069.
20.Bierstaker, J. L., Burnaby, P., & Hass, S. (2003). Recent changes in internal auditors’ use of technology. Internal Auditing, 60(4), 39-46.
21.Bloch, G. D. (2003). Sarbanes-Oxley's effects on internal controls for revenue. The CPA Journal, 73(4), 68-70.
22.Bodnar, G. H. & Hopwood, W. S. (1998). Accounting Information Systems. New Jersey: Prentice-Hall Inc.
23.Boddy, D. (2000). Implementing interorganizational IT systems: lessons from a call centre project. Journal of Information Technology, 15(1), 29-37.
24.Boiney, L. G. (1998). Reaping the benefits of information technology in organizations: A framework guiding appropriation of group support systems. The Journal of Applied Behavioral Science, 34(3), 327-346.
25.Boone, C., Brabander, B. D., & Hellemans, J. (2000). Research note: CEO locus of control and small firm performance. Organization Studies, 21(3), 641-646.
26.Borthick, A. F., Curtis, M. B. & Sriram, R. S. (2005). Accelerating the acquisition of knowledge structure to improve performance in internal control reviews. Accountomg, Organization and Society, 30(3), 277-295.
27.Borthick, A. F. & Roth, H. P. (1993). EDI for reengineering business processes. Management Accounting, 75(4), 32-37.
28.Boudreau, M. C. & Robey, D. (2005). Enacting Integrated Information Technology: A Human Agency Perspective. Organization Science, 16(1), 3-18.
29.Brown, C. E., Wong, J. A. & Baldwin A. A. (2007). A review and analysis of the existing research streams in continuous auditing. Journal of Emerging Technologies in Accounting, 4(1), 1-27.
30.Bryant, S., Murthy, U., & Wheeler, P. (2009). The effects of cognitive style and feedback type on performance in an internal control task. Behavioral Research in Accounting, 21(1), 37-58.
31.Brynjolfsson, E., Malone, T. W., Gurbaxani, V. & Kambil, A. (1994). Does information technology lead to smaller firms?. Management Science, 40(12), 1625-1645.
32.Burch, J. G.. & Grudnitski, G.. (1989). Information Systems: Theory and Practice. 5th. Ed., New York: Wiley.
33.Burgelman, R.A. (1991). Intraorganizational ecology of strategy making and organizational adaptation: theory and field research. Organization Science, 2(3), 239-261.
34.Burnes, B. (2005). Complexity theories and organizational change. International Journal of Management Reviews, 7(2), 73-90.
35.Burton, R.N. (2000). Discussion of information technology-related activities of internal auditors. Journal of Information systems, 14(1), 57-60.
36.Burris, B. H. (1998). Computerization of workplace. Annual review of Sociology, 24(1), 141-157.
37.Camp, L. J. & Sirbu, M. (1997). Critical Issues in Internet Commerce. IEEE Communications Magazine, 35(1), 58-62.
38.Campbell-Kelly, M. (1996). Information technology and organizational change in the British census 1801-1911. Information Systems Research, 7(1), 22-37.
39.Changchit, C. & Holsapple, C. W. (2004). The development of an expert system for managerial evaluation of internal controls. Intelligent systems in Accounting, Finance and Management, 12(2), 103-120.
40.Cheh, J., & Frank, G. B. (2009). Bond ratings and the ephemeral effect of reporting internal control weakness. Corporate Finance Review, 13(4), 22-32.
41.Chen, K. & Rea, A. I. Jr. (2004). Protecting personal information online: A survey of user privacy concerns and control techniques. The Journal of Computer Information Systems, 44(4), 85-97.
42.Cheng, C. & Tang, B. (2000). A robust control method with applications in integrated information systems. Systems Research and Behavioral Science, 17(2), 173-181.
43.Cooper, R. B. (2000). Information technology development creativity: a case study of attempted radical change. MIS Quarterly, 24(1), 245-276.
44.Cooper, R. B. & Zmud, R. W. (1990). Information technology implementation research: a technological diffusion approach. Management Science, 36(2), 123-139.
45.Crokett, F. (1992). Revitalizing Executive Information Systems. Sloan Management Review, 37(2), 39-47.
46.Cunningham, L.A. (2004). The appeal and limits of internal controls to fight fraud, terrorism, other ills. Journal of Corporate Law, 29(2), 267-336.
47.Curtis, M. B. & Wu, F. H. (2000). The components of a comprehensive framework of internal control. The CPA Journal, 70(3), 64-69.
48.Dahlberg, T. & Jarvinen, J. (1997). Challenges to IS Quality. Information and Software, 39(4), 809-818.
49.Daly, B. (1998). Reengineering: Internal Controls are more important than ever before. Journal of Applied Business Research, 14 (1), 19-27.
50.Dan, P. & Steve, G. (2003). Improving information quality through IT alignment planning: A case study, Information System Management, 6(2), 22-29.
51.Davidson, E. (2002). Technology frames and framing: a socio-cognitive investigation of requirements determination. MIS Quarterly, 26(4), 329-358.
52.Davidson, E. (2006). A technological frames perspective on information technology and organizational change. The Journal of Applied Behavioral Science, 42(1), 23-39.
53.Davis, G. B. & Weber, R. (1986). The impact of advanced computer systems on controls and audit procedures: a theory and an empirical test. Auditing: A Journal of Practice & Theory, 5(2), 35-49.![new window](/gs32/images/newin.png)
54.Dephart, R. (2004). Sense making and the media at work. American Behavioral Scientists, 48(1), 479-495.
55.Doty, E. A., Sen, A.& Wang, S. C. (1989). Effect of internal controls in data base design. Journal of Information Systems, 3(2), 70-91.
56.Doyle, J., Ge, W. & McVay, S. (2007). Determinants of weaknesses in internal control over financial reporting. Journal of Accounting and Economics, 44 (1), 193–223.
57.Drake, L. E. & Donohue, W. A. (1996). Communicative framing theory in conflict resolution. Communication Research, 23(3), 297-322.
58.Earle, J. S., Pagano, U. & Lesi, M. (2006). Information technology, organizational form and transition to the market. Journal of Economic Behavior & Organization, 60(2006), 471–489.
59.Eisenhardt, K. M. (1989). Building theories from case study research, The Academy of Management Review, 14(4), 532-550.
60.Galup, S. D. & Dattero, R. (2000/2001). Information engineering methodologies and organizational change: An exploratory study. The Journal of Computer Information Systems, 41(2), 48-51.
61.Gamson, W. A. (1988). Political discourse and collective action. In B. Klandermans, et al. (Eds.). International Social Movement Research, 1(1), Greenwich, CN: JAI Press.
62.Gelinas, U. J., Sutton, S. & Oram, A. E. (1999). Accounting Information Systems, Cincinnati: South-Western.
63.Gibbs, J. & Keating P. (1995) Reengineering Controls. Internal Auditor, , 52(5), 146-150.
64.Goffman, E. (1974). Frame analysis: An essay on the organization of experience. Cambridge, MA: Harvard University Press.
65.Grant, G. H., Karen, C. M. & Alali, F. (2008). The effect of IT controls on financial reporting. Managerial Auditing Journal, 23(8), 803-823.
66.Green Jr., K. W. & Inman, R. A. (2006). Does implementation of a IT-with-customers strategy change an organization’s structure?. Industrial Management & Data Systems, 106(8), 1077-1094.
67.Green, P., Best, p., Indulska, M. & Rowlands, T. (2005). Information systems audit and control issues for enterprise management systems: qualitative evidence. Australian accounting review, 15(3), 67-79.
68.Griffith, T. L. (1999). Technology features as triggers for sense making. The Academy of Management Review, 24(3), 472-488.
69.Gupta, P. P. & Nayar, N. (2006). Information content of control deficiency disclosures under The Sarbanes-Oxley Act: an empirical investigation. International Journal of Disclosure and Governance, 4(1), 3-23.
70.Hair, J. F., Black, B., Babin, B., Anderson, R. E., & Tatham, R. L. (1992). Multivariate Data Analysis (6th ed.), New York: Macmillan.
71.Hall, J. A. (2000). Information Systems Auditing and Assurance. Cincinnati: South-Western.
72.Hara, N. & Rosenbaum, H. (2008). Revising the Conceptualization of Computerization Movements. Information Society, 24(4), 229-245.
73.Hardy, C. & Reeve, R. (2000). A Study of the internal control structure for electronic data interchange systems using the analytic hierarchy process. Accounting and Finance, 40(2), 191-210.
74.Harper Jr., R. M. (1986). Internal control in Local Area Networks: An Accountant‘s Perspective. Computer & Security, 5(1), 28-35.
75.Harper Jr., R. M. (1986). Internal control of microcomputers in local area networks. Journal of Information Systems, 1(1), 67-80.
76.Haveman, H. A., Russo, M. V. & Meyer, A. D. (2001). Organizational environments in flux: The impact of regulatory punctuations on organizational domains, CEO succession, and performance. Organization Science, 12(3), 253-273.
77.Hawkins, K. W., Alhajjaj, S., & Kelley, S. S. (2003). Using CobiT to secure information assets. The Journal of Government Financial Management, 52(2), 23-32.
78.Henman, P. & Adler, M. (2001). Information technology and transformations in social security and administration: A review. International Social Security Review, 54(4), 23-47.
79.Hilary, I. (1992). Organizational structure and firm performance: An intertemporal performance. Journal of Economics Studies, 19(5), 19-35.
80.Hogan, C.E. & Wilkins, M.S. (2008). Evidence on the audit risk model: do auditors increase audit fees in the presence of internal control deficiencies?. Contemporary Accounting Research, 25(1), 219-242.
81.Hoitash, U., Hoitash, R., & Bedard J. C. (2009). Corporate governance and internal control over financial reporting: a comparison of regulatory regimes. The Accounting Review, 84(3), 839-867.
82.Hong, S. J. & Kar, Y. T. (2006). Understanding the adoption of multipurpose information appliances: the case of mobile data services. Information Systems Research, 17(2), 162-179.
83.Hughes, G. D. (2000). Managing high-tech product cycles. Academy of Management Executive, 4(2), 44-65.
84.Hunton, J. E., Mauldin, E. G. & Wheeler, P. R. (2008). Potential functional and dysfunctional effects of continuous monitoring. The Accounting Review, 83(6), 1551-1569.
85.Hwang S. S., Shin T. & Han, I. (2004). CRAS-CBR: Internal control risk assessment system using case-based reasoning. Expert Systems, 21(1), 22-33.
86.Ivancevich, S. H. & Joseph, G. W. (2001). Zacha Technology Corporation: Internal Control Assurance Service Reporting Issues in ane-Commerce Environment. Issues in Accounting Education, 16(3), 473-508.
87.Ives, B. L. (1984). The Information Systems as a Competitive Weapon. Communications of the ACM, 27(4), 1193-1201.
88.Jackson, C. (2000). Discussion of information technology-related activities of internal auditor. Journal of information systems, 14(1), 55-56.
89.Joseph, G. W. & Engle, T. J. (1996). Controlling an EDI Environment. Journal of Systems Management, 12(4), 42-55.
90.Kahn, B. K. (1983). Some Realities of Data Administration. CACM, 26(4), 794-799.
91. Karimi, J. & Konsynski, B. R. (1991). Globalization and Information Management Strategies. Journal of Management Information Systems, 7(4), 7-26.
92.Kim, L. S. (1997). Management Control Systems and Strategy: A Critical Review. Accounting Organization and Society, 22(2), 207-232.
93.Klamm, B. K. & Watson M. W. (2009). SOX 404 reported internal control weaknesses: a test of COSO framework components and information technology. Journal of Information Systems, 23(2), 1-23.![new window](/gs32/images/newin.png)
94.Kogan, A., Sudit, E. F. & Vasarhelyi, M. A. (1996). Implications of Internet Technology: On-line Auditing and Cryptography. IS Audit & Control Journal, 3(1), 42-47.
95.Kogan, A., Sudit, E. F. & Vasarhelyi, M. A. (1999). Continuous online auditing: A program of research. Journal of Information Systems,13(2), 87-103.
96.Kopp, L. S. & O’Donnell, E. (2005). The influence of a business-process focus on category knowledge and internal control evaluation. Accounting, Organization and Society, 30(4), 423-434.
97.Korvin, A. D., Shipley, M.F. & Omer, K. (2004). Assessing risks due to threats to internal control in a computer-based accounting information system: a pragmatic approach based on fuzzy set theory. Intelligent Systems in Accounting, Finance and Management, 12(2), 139-152.
98.Krishnan, R., Peters, J., Padman, R. & Kaplan, D. (2005). On data reliability assessment in accounting information systems. Information Systems Research, 16(3), 307-326.
99.Kuhn Jr., J. R. & Sutton, S. G. (2010). Continuous Auditing in ERP System Environments: The Current State and Future Directions. Journal of Information Systems, 24(1), 91-112.
100.Lainhart, J. W. (2001). An IT assurance framework for the future. Ohio CPA Journal, 60(1), 19-23.
101.Larsson, P., Lowstedt J. & Shani, A. B. (2001). It and the learning organization: Exploring myths of change. Organization Development Journal, 19(1), 73-91.
102.Lassila, K. S. & Brancheau, J. C. (1999). Adoption and utilization of commercial software packages: Exploring utilization, equilibria, transitions, triggers and tracks. Journal of Management Information Systems, 16(2), 63-90.
103.Lee, S. & Ahn, H. (2010). The organizational contexts, controls and implementation of e-business. Journal of Computer Information Systems, 51(1), 114-124.
104.Lehmann, C. M., Heagy, C .D. & Norman, C.S. (2007). The evaluation of application controls in accounting software: a short instructional case. Journal of Information Systems, 21(2), 87-98.
105.Leone, A. J. (2007). Factors related to internal control disclosure: A discussion of Ashbaugh, Collins, and Kinney (2007) and Doyle, Ge, and McVay (2007). Journal of Accounting and Economics, 44 (1), 224–237.
106.Lewis, M. A. (2003). Cause, consequence and control: towards a theoretical and practical model of operational risk. Journal of Operation Management, 21(2), 205-224.
107.Lim, J. & Jones, L. (2010). A baseline summary of framing research in public relations from 1990 to 2009. Public Relations Review, 36(2010), 292-297.
108.Little, A. & Best P. J. (2003). A framework for separation of duties in an SAP R/# environment. Managerial Auditing Journal, 18(5), 419-430.
109.Liu, T. M. (2005). The case analysis on failures of enterprise internal control in mainland China. Journal of American Academy of Business, 7(1), 92-103.
110.Lockman, A. & Minsky, N. (1984). Designing financial information systems for auditability. Journal of Management Information Systems, 1(1), 50-63.
111.Mao, J. Y., Lee, J. N. & Deng, C. P. (2008). Vendors’ perspectives on trust and control in offshore information systems. Information and management, 45(7), 482-492.
112.Markus, M. L. (2004). Technochange management: Using IT to drive organizational change. Journal of Information Technology, 19(1), 4-20.
113.Markus, M .L. & Robey, D. (1988). Information technology and organizational change: causal structure in theory and research. Management Science, 34(5), 583-598.
114.McCarthy, W. E. (1982). The REA accounting model. The accounting Review, 63(3), 554-578.
115.Mcfadden, F. R. & Hoffer, J. A. (1988). Data Base Management.(2nd). New York: The Benjamin/Camming Co.
116.Mcfarlan, F. W. (1981). Portfolio approach to information systems. Harvard Business Review, 59(5), 142-159.
117.McLeod, R. Jr. (1990). Management Information Systems. New York: Macmillan Publishing Company.
118.Merten, A. G. & Serverance, D. G. (1981). Data processing control: A state-of-the-art survey of attitudes and concerns of DP executives. MIS Quarterly, 5(1), 11-33.
119.Middleton, P. & Harper, K. (2004). Organizational alignment: A precondition for information systems success?. Journal of Change Management, 4(4), 327-338.
120.Miller, H. (1996). The multiple dimensions of information quality. Software and Technology, 13(2), 79-87.
121.Mills, K. (2008). Critical analysis of policy measures for the advancement of the level of computerization of SMEs. Information Technology for Development , 14(3), 253-158.
122.Mishra, S. (2007). A framework for integrating Sarbanes-Oxley compliance into the systems development process. Communications of the Association for Information Systems, 20(3), 712- 727.
123.Mitchell, V. L., & Zmud, R. W. (2006). Endogenous Adaptation: The Effects of Technology Position and Planning Mode on IT-enabled change. Decision sciences, 37(3), 325-355.
124.Morris, S. A. & Marshall, T. E. (2004). Perceived controls in information systems, Journal of Organizational and End User Computing, 16(2), 38-56.
125.Morton, N.l A., Hu, Q. (2008). Implications of the fit between organizational structure and ERP: A structural contingency theory perspective. International Journal of Information Management, 28(2008), 391-402.
126.Murthy, U. S. (2004). An analysis of the effects of continuous monitoring controls on e-commerce system performance. Journal of Information Systems, 18(2), 29-47.
127.Mutsaers, E. J., Zee, H. V., & Giertz, H. (1998). The evolution of information technology. Information Management & Computer Security, 6(3), 115-127.
128.Nolan, R. L. (1979). Managing the crises in data processing. Harvard Business Review, 57(2), 115-126.
129.Nord, G. D., Nord, J. H. & Xu, H. (2005). An investigation of the impact of organization zize on data quality issues. Journal of Database Management, 16(3), 58-71.
130.Nunnally, J. C. (1978). Psychometric Theory(2nd), New York: McGraw-Hill.
131.Orlikowski, W. J. (1996). Improvising organizational transformation over time: A situated change perspective. Information Systems Research, 7(1), 63-93.
132.Orlikowski, W. J. (2000). Using technology and constituting structures: a practice lens for studying technology in organizations. Organization Science, 11(4), 404-428.
133.Orlikowski, W. J. & Debra, H. J. (1997). An improvisational model for change management: The case of g roupware Technologies. Sloan Management Review, 38(2), 11-21.
134.Orlikowski, W. J. & Gash, D. (1994). Technology frames: making sense of information technology in organizations. ACM transactions on Information Systems, 12(2), 174-207.
135.Orlikowski, W. J. & Marley, S. R. (2001). Technology and institutions: what can research on information technology and research on organizations learn from each other?. MIS Quarterly, 25(2), 145-165.
136.Orlikowski, W. J. & Robey, D. (1991). Information technology and the structuring of organizations. Information Systems research, 2(2), 143-169.
137.Pan, S. L., Pan, G. & Devadoss, P. R. (2008). Managing emerging technology and organizational transformation: An acculturative analysis. Information and Management, 45(2008), 153-163.
138.Pathak, J. (2003). IT auditing and electronic funds transfers. Internal Auditing, 18(5), 28-31.
139.Pathak, J. (2005). Risk management, internal controls and organizational vulnerabilities. Managerial Auditing Journal, 20(6),569-577.
140.Phelps, B. (2007). Electronic Information Systems and Organizational Boundaries. Technology Analysis & Strategic Management, 19(1), 17-29.
141.Pierce, E. M. (2004). Assessing data quality with control matrices. Communications of the ACM, 47(2), 82-87.
142.Pinsonneault, A. & Kraemer K. L. (2002). Exploring the Role of Information Technology in Organizational Downsizing: A Tale of Two American Cities. Organization Science, 13(2), 191-208.
143.Pitt, L. F., Kavan C. B. & Watson, R. T. (1995). Service Quality: A measure of information systems effectiveness. MIS Quarterly, 19(1), 173-187.
144.Preuss, G. A. (2003). High performance work systems and organizational outcomes: The mediating role of information quality. Industrial and Labor Relations Review, 56(4), 590-605.
145.Rae, K., & Subramaniam, N. (2008). Quality of internal control procedures. Managerial Auditing Journal, 23(2), 104-124.
146.Rezaee, Z., Elam, R. & Sharbatoghlie, A. (2001). Continuous auditing: the audit of the future. Manegerial Auditing Journal, 16(3), 150-158.
147.Rezaee, Z., Sharbatoghlie, A., Elam, R. & McMickle P. L. (2002). Continuous auditing: Building automated auditing capability. Auditing: A Journal of Practice & Theory, 21(1), 147-163.
148.Robey, D. & Boudreau, M. (1999). Accounting for the contradictory organizational consequences of information systems: theoretical directions and methodological implications. Information Systems Research, 10(2), 167-184.
149.Romney, M. B., & Steinbart, P. J. (2009). Accounting Information Systems, New Jersey: Pearson Education, Inc.
150.Savage, A., Norman, C. S. & Lancaster, K. A. S. (2008). Using a Movie to Study the COSO Internal Control Framework: An Instructional Case. Journal of Information Systems, 22(1), 63-76.
151.Schultze, U. & Orlikowski, W. J. (2004). A Practice Perspective on Technology-Mediated Network Relations: The Use of Internet-Based Self-Serve Technologies. Information Systems Research, 15(1), 87–106.
152.Schwarz, G. M. (2002). Organizational hierarchy adaptation and information technology. Information and Organization, 12(3), 153-182.
153.Sherer, S. A., Kohli, R. & Baron, A. (2003). Complementary Investment in Change Management and IT Investment Payoff. Information Systems Frontiers, 5(3), 321-333.
154.Serenko, A., Cocosila, M., & Turel, O. (2008). The state and evolution of information systems research in Canada: a scientometric analysis. Canadian Journal of Administrative Sciences, 25(4), 279-294.
155.Snell, S. A. (1992). Control theory in strategic human resource management-The mediating effect of administrative information. Academy of Management Journal, 35(1), 125-137.
156.Snow, D. A., Rochford Jr., E. B., Worden, S. K. & Benford, R. D. (1986). Frame alignment processes, micromobilization, and movement participation. American Sociological Review, 51(4), 464-481.
157.Spitzmuller, C. & Stanton and J. M. (2006). Examining employee compliance with organizational surveillance and monitoring. Journal of Occupational and Organizational Psychology, 79(1), 245-272.
158.Stanley, W. (1995). Business Risk, Internal Control and Audit Implications of EDI. The CPA Journal, 65(2), pp.56-59.
159.Steffensen, S. K. (1998). Informational network industrialization and Japanese business management. Journal of Organizational Change Management, 11(6), 515-529.
160.Stringer, C. & Carey, P. (2002). Internal control re-design: An exploratory study of Australian organizations. Accounting, Accountability & Performance, 8(1), 61-86.
161.Sutton, S. G. (2000). Information systems reliability assurance: The inherent difficulty in structured analysis of dynamic processes. Accounting Forum, 24(3), 422-429.
162.Tanki, F. J. & Steinberg, R. M. (1993). Internal control- integrated framework” A landmark study. The CPA Journal, 63(6), 16-21.
163.Teo, H. H., Tan, B. C. & Wei, K. K. (1997). Organizational transformation using electronic data interchange: the case of TradeNet in Singapore. Journal of Management Information Systems, 13(4), 139-165.
164.Trites, G. (2004). Director responsibility for IT governance. International Journal of Accounting Information Systems, 5(2), 89-99.
165.Vandenbosch, B. & Higgins, C. A. (1995). Executive support systems and learning: A model and empirical test. Journal of Management Information Systems, 12(1), 99-130.![new window](/gs32/images/newin.png)
166.Vendatraman, N. & Ramanujam, V. (1986). Measurement of business performance on strategy research:A comparison of approaches. Academy of Management Review, 11(4), 801-814.
167.Vaast, E. & Levina N. (2006). Multiple faces of codification: Organizational redesign in an IT organization. Organization Science, 17(2), 190-203.
168.Viator, R. E. & Curtis, M. B. (1998). Computer auditor reliance on automated and non-automated controls as a function of training and experience. Journal of Information Sytems, 12(1), 19-30.
169.Volonino, L., Gessner, G. H. & Kermis, G. F. (2004). Holistic compliance with Sarbanes-Oxley. Communications of the Association for Information Systems, 14(1), 219-233.
170.Walsh, J. P. & Seward, J. K. (1990). On the efficiency of internal and external corporate control mechanisms. The Academy of Management Review, 15(3), 421-458.
171.Wand, Y. & Weber, R. (1989). A model of control and audit procedure change in evolving data processing ystem. The Accounting Review, 64( 1), 87-107.
172.Wang, R.Y. (1998). A product perspective on total data quality management. Communications of the ACM, 41(1), 58-65.
173.Wang. R. Y., Lee Y. W., Pipino, L. L. & Strong, D. M. (1998). Manage your information as a product. MIT Sloan Management Review, 39(4), 95-106.
174.Wang, W. L., Pan, D. & Chen, M. H. (2006). Architecture-based software reliability modeling. The Journal of Systems and Software, 79(1), 132–146.
175.Ward, J., Griffiths, P., & Whitmore, P. (1990). Strategic Planning for Information Systems. Chichester: Wiley Publications.
176.Warren, J. & Myungsin, C. (2007). Culture, Organizational Dynamics and Workflow Implementation: The Case of a failed implementation. Journal of Information Technology Case and Application Research, 9(1), 20-37.
177.Warren, M. & Hutchinson, W. (2003). A security risk management approach for e-commerce. Information management & Computer security, 11(5), 238-242.
178.Watad, M. M. & Perez-Alvarez, C. (2006). Managers perceptions of the role of IT in organizational change. Academy of Information and Management Sciences Journal, 9(2), 21-31.
179.Watts, D. (2001). CEO's role in IT-driven organizational change. Journal of Information Technology Theory and Application, 3(3), 44-55.
180.Weber, R. (1982). Audit System Support in Advanced Computer-Based Accounting Systems. The Accounting Review, 17(2), 311-325.
181.Weerakkody, V. & Hinton, C.M. (1999). Exploiting information systems: an technology through business process improvement. Knowledge and Process Management, 6(1), 17-23.
182.Williams, C. (2005). Financial managers’ expanded role in internal controls. The Journal of Government Financial Management, 54(2), 15-27.
183.Winters, B. (2004). Choose the right tools for internal control reporting. Journal of Accountancy, 197(2), 34-40.
184.Xu, H., Nord, J. H., Brown, N. & Nord, G. D. (2002). Data quality issues in implementing an ERP. Industrial management + Data Systems, 102(1/2), 47-58.
185.Xu, H., Nord, J. H., Nord, G. D. & Lin, B. (2003). Key issues of accounting information quality management: Austrlian case studies. Industrial management + Data Systems, 103(17), 461-470.
186.Yang, D. C. & Guan, L. (2004). The evolution of IT auditing and internal control standards in financial statement audits. Managerial Auditing Journal, 19(4), 544-553.
187.Yin, R. K. (1994). The case study crisis: some answers. Administrative Science Quarterly, 26(1), 58-65.
188.Zhang, I. X. (2007). Economic consequences of the Sarbanes-Oxley Act of 2002. Journal of Accounting and Economics, 44(1), 74-115.
189.Zmud, R. W. (1978). An empirical investigation of dimensionality of the concept of information. Decision Science, 9(2) ,187-195.