:::

詳目顯示

回上一頁
題名:會計師對電腦審計軟體之認知與使用決策之研究
作者:周玲儀
作者(外文):Ling-Yi Chou
校院名稱:國立中正大學
系所名稱:會計與資訊科技研究所
指導教授:黃士銘
林岳喬
學位類別:博士
出版日期:2015
主題關鍵詞:電腦審計風險管理持續性稽核法規遵循會計師事務所Computer AuditingRisk ManagementContinuous AuditingComplianceAccounting Firms
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:0
為了提高企業管理效率和效益,會計資訊系統已成為企業骨幹,資訊系統的可靠性越來越重要。然而,電子資料容易地修改、操縱,並相對地容易刪除。因此,對於稽核人員來說,確保資訊系統被適當的控制與保護,並且如預期的產出正確的資訊是很重要的。然而,若稽核人員不知道的資訊系統中的資料結構和資訊系統的流程,資訊系統的審計是很困難的事。以前的研究都強調利用電腦輔助審計軟體可以提升企業的經營業績(Bierstaker, Janvrin, & Lowe, 2014; Braun & Davis, 2003; Pedrosa & Costa, 2012; Saygili, 2010).。為了提高審計效率和效益,審計人員使用電腦輔助審計技術和工具,如ACL軟體來做資料分析,以彌補所缺乏對資訊系統資料結構與流程的知識。然而,電腦輔助審計技術目前仍然沒有被會計事務所廣泛使用。因此,目前仍有許多研究在探索小型和中型會計師事務所外部稽核使用通用稽核軟體(GAS)之利用率。本研究的主要目的是使用情境理論中的情境模型與延伸的科技接受度與使用整合模型(UTAUT),發展一種認知模式。本研究探討哪些因素會影響會計師事務所採用的電腦輔助審計軟體,以提高電腦輔助審計軟體於台灣會計師事務所的使用率,並且本研究結果預期可以提供國內會計師與和電腦輔助審計軟體代理商一個採用與推廣的建議。此外,本研究採用重要-績效表現之期望分析方法,衡量會計師對電腦輔助審計技術所帶來的資訊技術能力效益,並討論會計師預期電腦審計實施步驟中電腦輔助審計軟體能帶給他們的效益,以確認會計師對其在審計流程中的期望。
Accounting information systems can be used to increase efficiency and effectiveness, and thus the reliability of such systems is becoming increasingly important. However, electronic data can be easily changed, manipulated, and destroyed, and so it is important for auditors to ensure that such information systems are adequately controlled and secured, and function as intended. Moreover, it is difficult for auditors to audit information systems if they do not know the related data structure and information system process flow. Previous studies have emphasized that using IT can enhance the business performance of firms, such as with the application of computer-assisted audit techniques and tools (CAATs) (Bierstaker, Janvrin, & Lowe, 2014; Braun & Davis, 2003; Pedrosa & Costa, 2012; Saygili, 2010), like the ACL software, which can make up a lack of knowledge about information systems. However, CAATs are still not in widespread use among accounting firms, and previous studies mainly explore the use of generalized audit software (GAS) by external auditors in small- and medium-sized audit firms. The main objectives of this study are thus to use contingency theory to develop a cognitive model by extending the unified theory of acceptance and use of technology (UTAUT). This study examines what factors affect the adoption of the CAATs among accounting firms in order to improve CAAT usage in Taiwan, and the results are then used to provide suggestions for CPAs and software service providers. In addition, this study uses an expectation method for the importance-performance analysis to measure the benefits of CAATs from the perspectives of CPAs, and discusses the information technology capabilities that are related to carrying out computer auditing for ensuring that the audit process meets CPAs’ expectation.
Keyword: Computer Auditing, Risk Management, Continuous Auditing, Compliance, Accounting Firms
Ahmi, A., & Kent, S. (2012). The utilisation of generalized audit software (GAS) by external auditors. Managerial Auditing Journal, 28(2), 88-113.
Ajzen, I. (1991). The theory of planned behavior. Organizational behavior and human decision processes, 50(2), 179-211.
Alles, M. G., Kogan, A., & Vasarhelyi, M. A. (2002). Feasibility and economics of continuous assurance. Auditing: A Journal of Practice & Theory, 21(1), 125-138.
Alles, M. G., Kogan, A., & Vasarhelyi, M. A. (2013). Collaborative design research: Lessons from continuous auditing. International Journal of Accounting Information Systems, 14(2), 104-112.
Arnold, V., Lampe, J. C., Masselli, J. J., & Sutton, S. G. (2000). An analysis of the market for systems reliability assurance services. Journal of Information Systems, 14(s-1), 65-82.
Axelsen, M., Coram, P., Green, P., & Ridley, G. (2011). Examining the role of IS audit in the public sector.
Bagranoff, N. A., & Vendrzyk, V. P. (2000). The changing role of IS audit among the big five US-based accounting firms. Information systems control journal, 5, 33-37.
Bierstaker, J., Janvrin, D., & Lowe, D. J. (2014). What factors influence auditors' use of computer-assisted audit techniques? Advances in Accounting, 30(1), 67-74.
Braun, R. L., & Davis, H. E. (2003). Computer-assisted audit tools and techniques: Analysis and perspectives. Managerial Auditing Journal, 18(9), 725-731.
Chen, Chia-Mei (2008). The impact of information technology on productivity of CPA firms, National Yunlin University of Science and Technology. Retrieved from http://handle.ncl.edu.tw/11296/ndltd/46040569178027793408
Chen, Hsueh-ju, Huang, Shaio-Yan, & Guo shu-yun. (2006). A Study on Computer Literacy of Practicing Auditors from Senior Managers' Viewpoint in CPA Firms. Chung Hua Journal of Management, 7(4), 15-27.
Chin, W. W. (1998). The partial least squares approach to structural equation modeling. Modern methods for business research, 295(2), 295-336.
Chin, W. W., Marcolin, B. L., & Newsted, P. R. (2003). A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic-Mail Emotion/Adoption Study. Information systems research, 14(2), 189-217. doi: doi:10.1287/isre.14.2.189.16018
Chiu, Ching-Ping (2011). The Factors and Benefit Analysis of Accounting Firms' Utilizing IT Audit Techniques. National Chung Cheng University. Retrieved from http://handle.ncl.edu.tw/11296/ndltd/67205019946208552581
Compeau, D. R., & Higgins, C. A. (1995). Computer self-efficacy: Development of a measure and initial test. MIS quarterly, 189-211.
Compeau, D., Higgins, C. A., & Huff, S. (1999). Social cognitive theory and individual reactions to computing technology: A longitudinal study. MIS quarterly, 145-158.
Curtis, M. B., & Payne, E. A. (2008). An examination of contextual factors and individual characteristics affecting technology implementation decisions in auditing. International Journal of Accounting Information Systems, 9(2), 104-121.
Curtis, M. B., & Payne, E. A. (2014). Modeling voluntary CAAT utilization decisions in auditing. Managerial Auditing Journal, 29(4), 304-326.
Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: a comparison of two theoretical models. Management science, 35(8), 982-1003.
Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1992). Extrinsic and Intrinsic Motivation to Use Computers in the Workplace1. Journal of Applied Social Psychology, 22(14), 1111-1132. doi: 10.1111/j.1559-1816.1992.tb00945.x
De Haes, S., Van Grembergen, W., & Debreceny, R. S. (2013). COBIT 5 and enterprise governance of information technology: Building blocks and research opportunities. Journal of Information Systems, 27(1), 307-324.
Debreceny, R., Lee, S.-L., Neo, W., & Toh, J. S. (2005). Employing generalized audit software in the financial services sector: Challenges and opportunities. Managerial Auditing Journal, 20(6), 605-618.
DuBrin, A. (2012). Leadership: Research findings, practice, and skills: Cengage Learning.
Eagly, A. H., & Johnson, B. T. (1990). Gender and leadership style: A meta-analysis. Psychological bulletin, 108(2), 233.
Eilifsen, A., Knechel, W. R., & Wallage, P. (2001). Application of the business risk audit model: A field study. Accounting Horizons, 15(3), 193-207.
ETU, T. (2012). Personality, group decision-making and leadership.
Fiedler, F. E. (1967). A theory of leadership effectiveness.
Fiedler, F. E. (1974). The contingency model: New directions for leadership utilization. Journal of Contemporary Business, 3(4), 65-79.
Fischer, M. J. (1996). “Real-izing” the benefits of new technologies as a source of audit evidence: An interpretive field study. Accounting, Organizations and Society, 21(2), 219-242.
Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of marketing research, 39-50.
Gonzalez, G. C., Sharma, P. N., & Galletta, D. F. (2012). The antecedents of the use of continuous auditing in the internal auditing context. International Journal of Accounting Information Systems, 13(3), 248-262.
Guadagnolo, F. (1985). The importance-performance analysis: An evaluation and marketing tool. Journal of Park and Recreation Administration, 3(2).
Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E., & Tatham, R. L. (2006). Multivariate data analysis (Vol. 6): Pearson Prentice Hall Upper Saddle River, NJ.
Hersey, P., & Blanchard, K. H. (1969). Life cycle theory of leadership. Training & Development Journal.
Hersey, P., & Blanchard, K. H. (1982). Leadership style: Attitudes and behaviors.
House, R. J. (1971). A path goal theory of leader effectiveness. Administrative science quarterly, 321-339.
ISACA. (2012). CISA Review Manual 2013: Isaca.
Janvrin, D., Bierstaker, J., & Lowe, D. J. (2009). An investigation of factors influencing the use of computer-related audit procedures. Journal of Information Systems, 23(1), 97-118.
Janvrin, D., Lowe, D. J., & Bierstaker, J. (2008). Auditor acceptance of computer-assisted audit techniques. Iowa State University, Arizona State University and Villanova University, 4.
Jasperson, J. S., Carter, P. E., & Zmud, R. W. (2005). A comprehensive conceptualization of post-adoptive behaviors associated with information technology enabled work systems. MIS quarterly, 29(3), 525-557.
Karahanna, E., Straub, D. W., & Chervany, N. L. (1999). Information technology adoption across time: a cross-sectional comparison of pre-adoption and post-adoption beliefs. MIS quarterly, 183-213.
Kwon, S. Y., Lim, Y., & Simnett, R. (2014). The effect of mandatory audit firm rotation on audit quality and audit fees: Empirical evidence from the Korean audit market. Auditing: A Journal of Practice and Theory.
Lanza, R. B. (1998). Take My Manual Audit, PLEASE. Journal of Accountancy, 185(6), 33-36.
Lawshe, C. H. (1975). A quantitative approach to content validity1. Personnel psychology, 28(4), 563-575.
Mahzan, N., & Lymer, A. (2014a). Examining the adoption of computer-assisted audit tools and techniques. Managerial Auditing Journal, 29(4), 327-349. doi: doi:10.1108/MAJ-05-2013-0877
Mahzan, N., & Lymer, A. (2014b). Examining the adoption of computer-assisted audit tools and techniques: Cases of generalized audit software use by internal auditors. Managerial Auditing Journal, 29(4), 327-349.
Majchrzak, A., Rice, R. E., Malhotra, A., King, N., & Ba, S. (2000). Technology adaptation: The case of a computer-supported inter-organizational virtual team. MIS quarterly, 569-600.
Martilla, J. A., & James, J. C. (1977). Importance-performance analysis. The journal of marketing, 77-79.
McLean, R. D., Zhang, T., & Zhao, M. (2012). Why does the law matter? Investor protection and its effects on investment, finance, and growth. The journal of finance, 67(1), 313-350.
Moore, G. C., & Benbasat, I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information systems research, 2(3), 192-222.
Morris, M. G., & Venkatesh, V. (2000). Age differences in technology adoption decisions: Implications for a changing work force. Personnel psychology, 53(2), 375-403.
O Donnell, J. B., & Rechtman, Y. (2005). Navigating the standards for information technology controls. CPA JOURNAL, 75(7), 64.
Pathak, J., Debreceny, R., Lee, S.-L., Neo, W., & Shuling Toh, J. (2005). Employing generalized audit software in the financial services sector: Challenges and opportunities. Managerial Auditing Journal, 20(6), 605-618.
Pedrosa, I., & Costa, C. J. (2012). Computer Assisted Audit Tools and Techniques in Real World: CAATT's Applications and Approaches in Context. International Journal of Computer Information Systems and Industrial Management Applications, 4, 161-168.
Sayana, S. A., & CISA, C. (2002). The IS Audit Process. Information systems control journal, 1, 20-22.
Saygili, A. T. (2010). Taking Advantage of Computer Assisted Audit Tools and Techniques during Testing Phase in Financial Audits: An Empirical Study in a Food Processing Company in Turkey. Global Journal of Management And Business Research, 10(2).
Sharma, R., & Yetton, P. (2003). The contingent effects of management support and task interdependence on successful information systems implementation. MIS quarterly, 533-556.
Sharma, R., & Yetton, P. (2007). The contingent effects of training, technical complexity, and task interdependence on successful information systems implementation. MIS quarterly, 219-238.
Taylor, S., & Todd, P. A. (1995). Understanding information technology usage: a test of competing models. Information systems research, 6(2), 144-176.
Thompson, R. L., Higgins, C. A., & Howell, J. M. (1991). Personal computing: toward a conceptual model of utilization. MIS quarterly, 125-143.
Thompson, R. L., Higgins, C. A., & Howell, J. M. (1994). Influence of experience on personal computer utilization: testing a conceptual model. J. Manage. Inf. Syst., 11(1), 167-187.
Tseng, Mei-Ling (2004). A study of critical factors for a CPA firm to evaluate client's information technology internal control environment. National Chung Cheng University. Retrieved from http://handle.ncl.edu.tw/11296/ndltd/63815773503570001221
Tucker, G. H. (2001). IT and the Audit. Journal of Accountancy, 192(3), 41-43.
Vendrzyk, V. P., & Bagranoff, N. A. (2003). The evolving role of IS audit: A field study comparing the perceptions of IS and financial auditors. Advances in Accounting, 20, 141-163.
Venkatesh, V., & Morris, M. G. (2000). Why don't men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior. MIS quarterly, 115-139.
Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS quarterly, 425-478.
Venkatesh, V., Thong, J. Y., & Xu, X. (2012). Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS quarterly, 36(1), 157-178.
Vîlsănoiu, D., & Şerban, M. (2010). Changing methodologies in financial audit and their impact on information systems audit. Informatica Economica, 14(1).
Weber, R. (1999). Information systems control and audit: Prentice Hall Upper Saddle River.
Zhao, N., Yen, D. C., & Chang, I.-C. (2004). Auditing in the e-commerce era. Information Management & Computer Security, 12(5), 389-400.
Zhou, W., & Wang, N. (2012). Can CPA Mandatory Rotation Improve Audit Quality? An Empirical Research Based on Audit Tenure and Economic Dependence of Accounting Firms. China Accounting Review, 1, 009. Lin Cody (2008). The Establishment of IT General Controls Risk Assessment Model for Sarbanes-Oxley, National Cheng Cheng University. Retrieve from http://handle.ncl.edu.tw/11296/ndltd/17070352556621272034

 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關博士論文
 
無相關書籍
 
無相關著作
 
無相關點閱
 
QR Code
QRCODE