|
Ahmi, A., & Kent, S. (2012). The utilisation of generalized audit software (GAS) by external auditors. Managerial Auditing Journal, 28(2), 88-113. Ajzen, I. (1991). The theory of planned behavior. Organizational behavior and human decision processes, 50(2), 179-211. Alles, M. G., Kogan, A., & Vasarhelyi, M. A. (2002). Feasibility and economics of continuous assurance. Auditing: A Journal of Practice & Theory, 21(1), 125-138. Alles, M. G., Kogan, A., & Vasarhelyi, M. A. (2013). Collaborative design research: Lessons from continuous auditing. International Journal of Accounting Information Systems, 14(2), 104-112. Arnold, V., Lampe, J. C., Masselli, J. J., & Sutton, S. G. (2000). An analysis of the market for systems reliability assurance services. Journal of Information Systems, 14(s-1), 65-82. Axelsen, M., Coram, P., Green, P., & Ridley, G. (2011). Examining the role of IS audit in the public sector. Bagranoff, N. A., & Vendrzyk, V. P. (2000). The changing role of IS audit among the big five US-based accounting firms. Information systems control journal, 5, 33-37. Bierstaker, J., Janvrin, D., & Lowe, D. J. (2014). What factors influence auditors' use of computer-assisted audit techniques? Advances in Accounting, 30(1), 67-74. Braun, R. L., & Davis, H. E. (2003). Computer-assisted audit tools and techniques: Analysis and perspectives. Managerial Auditing Journal, 18(9), 725-731. Chen, Chia-Mei (2008). The impact of information technology on productivity of CPA firms, National Yunlin University of Science and Technology. Retrieved from http://handle.ncl.edu.tw/11296/ndltd/46040569178027793408 Chen, Hsueh-ju, Huang, Shaio-Yan, & Guo shu-yun. (2006). A Study on Computer Literacy of Practicing Auditors from Senior Managers' Viewpoint in CPA Firms. Chung Hua Journal of Management, 7(4), 15-27. Chin, W. W. (1998). The partial least squares approach to structural equation modeling. Modern methods for business research, 295(2), 295-336. Chin, W. W., Marcolin, B. L., & Newsted, P. R. (2003). A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic-Mail Emotion/Adoption Study. Information systems research, 14(2), 189-217. doi: doi:10.1287/isre.14.2.189.16018 Chiu, Ching-Ping (2011). The Factors and Benefit Analysis of Accounting Firms' Utilizing IT Audit Techniques. National Chung Cheng University. Retrieved from http://handle.ncl.edu.tw/11296/ndltd/67205019946208552581 Compeau, D. R., & Higgins, C. A. (1995). Computer self-efficacy: Development of a measure and initial test. MIS quarterly, 189-211. Compeau, D., Higgins, C. A., & Huff, S. (1999). Social cognitive theory and individual reactions to computing technology: A longitudinal study. MIS quarterly, 145-158. Curtis, M. B., & Payne, E. A. (2008). An examination of contextual factors and individual characteristics affecting technology implementation decisions in auditing. International Journal of Accounting Information Systems, 9(2), 104-121. Curtis, M. B., & Payne, E. A. (2014). Modeling voluntary CAAT utilization decisions in auditing. Managerial Auditing Journal, 29(4), 304-326. Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: a comparison of two theoretical models. Management science, 35(8), 982-1003. Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1992). Extrinsic and Intrinsic Motivation to Use Computers in the Workplace1. Journal of Applied Social Psychology, 22(14), 1111-1132. doi: 10.1111/j.1559-1816.1992.tb00945.x De Haes, S., Van Grembergen, W., & Debreceny, R. S. (2013). COBIT 5 and enterprise governance of information technology: Building blocks and research opportunities. Journal of Information Systems, 27(1), 307-324. Debreceny, R., Lee, S.-L., Neo, W., & Toh, J. S. (2005). Employing generalized audit software in the financial services sector: Challenges and opportunities. Managerial Auditing Journal, 20(6), 605-618. DuBrin, A. (2012). Leadership: Research findings, practice, and skills: Cengage Learning. Eagly, A. H., & Johnson, B. T. (1990). Gender and leadership style: A meta-analysis. Psychological bulletin, 108(2), 233. Eilifsen, A., Knechel, W. R., & Wallage, P. (2001). Application of the business risk audit model: A field study. Accounting Horizons, 15(3), 193-207. ETU, T. (2012). Personality, group decision-making and leadership. Fiedler, F. E. (1967). A theory of leadership effectiveness. Fiedler, F. E. (1974). The contingency model: New directions for leadership utilization. Journal of Contemporary Business, 3(4), 65-79. Fischer, M. J. (1996). “Real-izing” the benefits of new technologies as a source of audit evidence: An interpretive field study. Accounting, Organizations and Society, 21(2), 219-242. Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of marketing research, 39-50. Gonzalez, G. C., Sharma, P. N., & Galletta, D. F. (2012). The antecedents of the use of continuous auditing in the internal auditing context. International Journal of Accounting Information Systems, 13(3), 248-262. Guadagnolo, F. (1985). The importance-performance analysis: An evaluation and marketing tool. Journal of Park and Recreation Administration, 3(2). Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E., & Tatham, R. L. (2006). Multivariate data analysis (Vol. 6): Pearson Prentice Hall Upper Saddle River, NJ. Hersey, P., & Blanchard, K. H. (1969). Life cycle theory of leadership. Training & Development Journal. Hersey, P., & Blanchard, K. H. (1982). Leadership style: Attitudes and behaviors. House, R. J. (1971). A path goal theory of leader effectiveness. Administrative science quarterly, 321-339. ISACA. (2012). CISA Review Manual 2013: Isaca. Janvrin, D., Bierstaker, J., & Lowe, D. J. (2009). An investigation of factors influencing the use of computer-related audit procedures. Journal of Information Systems, 23(1), 97-118. Janvrin, D., Lowe, D. J., & Bierstaker, J. (2008). Auditor acceptance of computer-assisted audit techniques. Iowa State University, Arizona State University and Villanova University, 4. Jasperson, J. S., Carter, P. E., & Zmud, R. W. (2005). A comprehensive conceptualization of post-adoptive behaviors associated with information technology enabled work systems. MIS quarterly, 29(3), 525-557. Karahanna, E., Straub, D. W., & Chervany, N. L. (1999). Information technology adoption across time: a cross-sectional comparison of pre-adoption and post-adoption beliefs. MIS quarterly, 183-213. Kwon, S. Y., Lim, Y., & Simnett, R. (2014). The effect of mandatory audit firm rotation on audit quality and audit fees: Empirical evidence from the Korean audit market. Auditing: A Journal of Practice and Theory. Lanza, R. B. (1998). Take My Manual Audit, PLEASE. Journal of Accountancy, 185(6), 33-36. Lawshe, C. H. (1975). A quantitative approach to content validity1. Personnel psychology, 28(4), 563-575. Mahzan, N., & Lymer, A. (2014a). Examining the adoption of computer-assisted audit tools and techniques. Managerial Auditing Journal, 29(4), 327-349. doi: doi:10.1108/MAJ-05-2013-0877 Mahzan, N., & Lymer, A. (2014b). Examining the adoption of computer-assisted audit tools and techniques: Cases of generalized audit software use by internal auditors. Managerial Auditing Journal, 29(4), 327-349. Majchrzak, A., Rice, R. E., Malhotra, A., King, N., & Ba, S. (2000). Technology adaptation: The case of a computer-supported inter-organizational virtual team. MIS quarterly, 569-600. Martilla, J. A., & James, J. C. (1977). Importance-performance analysis. The journal of marketing, 77-79. McLean, R. D., Zhang, T., & Zhao, M. (2012). Why does the law matter? Investor protection and its effects on investment, finance, and growth. The journal of finance, 67(1), 313-350. Moore, G. C., & Benbasat, I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information systems research, 2(3), 192-222. Morris, M. G., & Venkatesh, V. (2000). Age differences in technology adoption decisions: Implications for a changing work force. Personnel psychology, 53(2), 375-403. O Donnell, J. B., & Rechtman, Y. (2005). Navigating the standards for information technology controls. CPA JOURNAL, 75(7), 64. Pathak, J., Debreceny, R., Lee, S.-L., Neo, W., & Shuling Toh, J. (2005). Employing generalized audit software in the financial services sector: Challenges and opportunities. Managerial Auditing Journal, 20(6), 605-618. Pedrosa, I., & Costa, C. J. (2012). Computer Assisted Audit Tools and Techniques in Real World: CAATT's Applications and Approaches in Context. International Journal of Computer Information Systems and Industrial Management Applications, 4, 161-168. Sayana, S. A., & CISA, C. (2002). The IS Audit Process. Information systems control journal, 1, 20-22. Saygili, A. T. (2010). Taking Advantage of Computer Assisted Audit Tools and Techniques during Testing Phase in Financial Audits: An Empirical Study in a Food Processing Company in Turkey. Global Journal of Management And Business Research, 10(2). Sharma, R., & Yetton, P. (2003). The contingent effects of management support and task interdependence on successful information systems implementation. MIS quarterly, 533-556. Sharma, R., & Yetton, P. (2007). The contingent effects of training, technical complexity, and task interdependence on successful information systems implementation. MIS quarterly, 219-238. Taylor, S., & Todd, P. A. (1995). Understanding information technology usage: a test of competing models. Information systems research, 6(2), 144-176. Thompson, R. L., Higgins, C. A., & Howell, J. M. (1991). Personal computing: toward a conceptual model of utilization. MIS quarterly, 125-143. Thompson, R. L., Higgins, C. A., & Howell, J. M. (1994). Influence of experience on personal computer utilization: testing a conceptual model. J. Manage. Inf. Syst., 11(1), 167-187. Tseng, Mei-Ling (2004). A study of critical factors for a CPA firm to evaluate client's information technology internal control environment. National Chung Cheng University. Retrieved from http://handle.ncl.edu.tw/11296/ndltd/63815773503570001221 Tucker, G. H. (2001). IT and the Audit. Journal of Accountancy, 192(3), 41-43. Vendrzyk, V. P., & Bagranoff, N. A. (2003). The evolving role of IS audit: A field study comparing the perceptions of IS and financial auditors. Advances in Accounting, 20, 141-163. Venkatesh, V., & Morris, M. G. (2000). Why don't men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior. MIS quarterly, 115-139. Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS quarterly, 425-478. Venkatesh, V., Thong, J. Y., & Xu, X. (2012). Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS quarterly, 36(1), 157-178. Vîlsănoiu, D., & Şerban, M. (2010). Changing methodologies in financial audit and their impact on information systems audit. Informatica Economica, 14(1). Weber, R. (1999). Information systems control and audit: Prentice Hall Upper Saddle River. Zhao, N., Yen, D. C., & Chang, I.-C. (2004). Auditing in the e-commerce era. Information Management & Computer Security, 12(5), 389-400. Zhou, W., & Wang, N. (2012). Can CPA Mandatory Rotation Improve Audit Quality? An Empirical Research Based on Audit Tenure and Economic Dependence of Accounting Firms. China Accounting Review, 1, 009. Lin Cody (2008). The Establishment of IT General Controls Risk Assessment Model for Sarbanes-Oxley, National Cheng Cheng University. Retrieve from http://handle.ncl.edu.tw/11296/ndltd/17070352556621272034
|