Project Topic

AUDITOR’S PERCEPTION OF THE USEFULNESS OF COMPUTER ASSISTED AUDIT TECHNIQUES

Project Attributes
 Format: MS word ::   Chapters: 1-5 ::   Pages: 96 ::   Attributes: Questionnaire, Data Analysis,Abstract  ::   1097 people found this useful

Project Department

Project Body
    1. Background to the Study

While the use of Information Technology (IT) in the business world has grown exponentially in the past two decades, the extent to which auditors have adopted IT such as Computer-Assisted Auditing Techniques (CAATS) to meet this growth remains an empirical question (Arnold and Sutton 1998; Curtis and Payne 2008; Janvrin et al 2009). CAATS are computer tools that extract and analyze data from computer applications (Braun and Davis 2003). CAATS permit auditors to increase their productivity as well as that of the audit function (Zhao et al. 2004, 389). For example, CAATS may automatic previously manual audit tests reducing total audit hours expended. They enable auditors to test 100 percent of the population rather than a sample, thereby increasing the reliability of conclusions based on that test (AICPA 2001; Curtis and Payne 2008). In addition, CAATS may be used to select sample transactions meeting specific criteria, sort transactions with specific characteristics, obtain evidence about control effectiveness, and evaluate inventory existence and completeness (AICPA
2006).

Recent audit standards encourage auditors to adopt CAATS to improve audit efficiency and effectiveness (AICPA 2001, 2002a, 2002b, 2002c, 2006). For example SAS No 106 suggests that CAATS may be used to improve audit efficiency by recalculating information provided by audit clients (AICPA 2006). Furthermore, SAS No. 106 indicates CAATS increase audit effectiveness by allowing auditors to directly inspect evidence stored in electronic from (AICPA 2006). Improving audit efficiency and effectiveness in particularly important in today audit environment where auditors have enhanced responsibilities for detecting fraud due to SAS No. 999 requirement and internal control effectiveness as directed under Section 404 of the Subanes Oxieg Act and Public. Company Accounting oversight Board (PCAOB) Audit standard No. 5 Despite the current emphasis on CAATS, research indicates that auditors do not frequently and systematically use CAATS (Liang et al. 2001; Kalaba 2002; Debrecency et al 205. Shaikh 2005) Curtis and Payne 2008; Janriv et al 2009). Auditor acceptance of CAATS may be driven by both firm resource issues and individual user perceptions. Prior information systems research indicates that even when sufficient resource exist to purchase IT, users may not use (i.e., accept) the new IT (Davis 1989). Thus, the primary purpose of our research is to examine factors that influence individual, auditor acceptance of CAATS.

Information systems research has developed several models to predict user acceptance of IT. This study uses a recent technology acceptance model, the unified technology acceptance and use of technology theory (UTAUT) (Venkatesh et al. 2003). UTAUT integrates several previously accepted models to assess the likelihood of success for new technology introductions. Understanding the drivers of acceptance allows researchers and audit firm management to proactively design interventions (including training, marketing etc) targeted (including training, marketing etc) targeted at populations of auditors that may be less inclined to adopt and use new systems (Venkatesh et al 2003). UTAUT proposes that four factors influence user acceptance.

1.     The expectation users hold regarding how well the system may improve their performance (i.e., performance expectancy)

2.     The degree of effort users, believe will be needed to use the new system (i.e., degree expectancy).

3.     The extent users perceive that individuals important to them encourage system usage (i.e., social influence).

4.     The expectation users hold regarding the existence of an organization and technical infrastructure to support system usage (i.e. facilitating conditions).

1.2   Statement of Problem

Prior CAAT research is generally descriptive in nature. Braun and Davis (2003) surveyed government auditor regarding their usage of Audit command language (ACL), a commercially available CAAT. They found that while participants perceived the potential benefits associated with ACL, they displayed a lower confidence in their technical abilities to use ACL (Braun and Davis 2003). Debreceny et al (2005) interviewed bank internal auditors are external auditors in Singapore. They note that internal auditors tend to use CAATS for special investigations rather than as a foundation for their regular audit work. Furthermore, external auditors did not adopt CAATS citing its inapplicability to the nature of testing the financial statement assertions or the extent or quality of computerized internal controls.

Liang et al (2001) noted that auditors do not frequently and systematically adopt CAATS in practice and proposed a new electronic audit approach. Sheikh (2005) suggested a new CAAT based on the electronic auditing from work that includes most feature of existing generalized audit software but can be designed and deployed independently from the auditor’s EDP system. Finally, Zhao et al (2004) describes how CAATS must exist in order to conduct continuous auditing.

1.3   Research Questions

The following research questions will help in the study under review;

i.      Is there a significant relationship between computer assisted audit techniques (CAATS) and audit practice in Nigeria?

ii.     Does a significant relationship exist between computer assisted audit techniques (CAATS) and effective financial reporting in an organization?  

1.4   Objectives of the Study

“When a man does not know what harbor he is making for, no wind is the right wind”. These words is attributed to first century Roman philosophers Lucius Anneals Seneca, bear out a long recognized truth, for life (business) to have direction. Goals are essential when the following objectives of the study came to mind in the choice of the topic.

  1. To determine whether there is a significant relationship between CAAT and audit practice.
  2. To determine if there is a significant relationship between CAATS and effective financial reporting in an organization.
  3. To determine how far company law in Nigeria has ensured Information auditors.
  4. To determine whether the audit committees served to play ensure auditor’s C.A.A.T is effectively used in the practice work.

1.5   Statement of Hypotheses

Hypothesis One

HO:   There is no significant relationship between
computer Assist Audit techniques (CAATS) and audit practice in Nigeria.

HI:    There is a significant relationship between computer assist audit techniques (CAATS) and audit practice in Nigeria.

 

 

 

 

 

Hypothesis Two

HO:   There is no significance relationship between computer assist audit techniques (CAATS) and effective financial reporting in an organization.

HI:    There is a significance relationship between computer assist’ audit techniques (CAATS) and effective financial reporting in an organization.

1.6   Significance of the Study

Interestingly, there has been little or no formal research on the application of CAATS in general and GAS in particular to the assurance process (Boritz 2002). This study aims is to make a first step in filling this clear gap in the research literature. The study seeks to evaluate the nature and extent of the utilization of GAS in financial institutions. These economically significant entities typically make intensive use of information systems for many business processes. Many financial institutions are of a sufficient size to warrant investment in GAS by internal or external auditors. Financial institutions also are often subject to regulatory regimes that require monitoring of particular risks and potential malfeasance in areas such as money laundering. In particular, this study aims to establish how GAS assists internal auditors within banks and their external auditors in the process of substantive testing in the conduct of both financial statement audits as well as special audits. Second, in the event that banks do not make use of GAS to obtain audit evidence through substantive procedures, the second objective of this study is to examine the reasons for such limited usage. In addition, this study also attempts to examine the possibilities of how banks’ internal and external auditors would be able to better exploit GAS if they were given an opportunity to exploit their capabilities to the fullest.

1.7   Scope of the Study

This work is not intended to serve itself, but the generality of auditing firms and the public at large. The study is to appraise thoroughly the theoretical formation on which is acquainted with basic fact about the significance of information system security auditing in Nigeria business environment.

 1.8  Limitations of the Study

The scope of this study is limited to the survey of some selected auditing firms in Benin City. This study would have been more relevant if data could be gathered from all existing auditing firms in Nigeria. However we are constrained by limited resources in terms of finance and time. Other factor includes delay in response to questionnaires to be administered.

1.9   Definition of Terms

Information Technology Audit: An information technology audit or information systems auditing is an examination of the management controls within an information technology (IT) infrastructure. The evaluation of obtained evidence determines if the information technology or system are safeguarding assets, maintaining data integrity and operating effectively to achieve the organization’s goals or objectives. These reviews may be performed in conjunction with a financial statement audit, internal audit, or other form of attestation engagement. (Gawde, 2004).

Audit Personnel: According to Webster Dictionary, it is an annual personnel administration inventory which is an analysis and measurement of a company’s personnel policies and practices to determine their effectiveness.

Security Risk: A measure of the extent to which an entity is threatened by potential circumstance or event and typically a function of (1) the adverse impact that would arise if the circumstance or event occurs, and (2) the likelihood of occurrence. Note information system- related security risk are those risk that arise from the loss of confidentiality, or availability of information or information systems and reflect the potential adverse impacts to organizational operations (including mission, functions, image, or reputation) organizations assets individuals other organizations, and the Nation (Larnpson, 2000).

Get the complete project »

Can't find what you are looking for?
Call 0906 809 7513

  • Subscribe to Free Job Alert
    Enter your email below and click subscribe

    LATEST JOB VACANCIES


    We require the services of an experienced Business Development Manager with a wide range of business clientele and a network of c... Read more

    Regulate day-to-day operations of unit in conjunction with Departmental Heads, Manager, Executive Chef, Security. Cordinate and l... Read more

    FINANCE OFFICER

    LEAD Enterprise Support Company Limited in (Lagos State)
    Job Objective: The Finance Officer will assist the Finance/Admin Manager in the implementation of the HMO’s accounting policies an... Read more

    Copyright © 2024 All Right Reserved CVClue
    A Subsidiary of EMINENT INFO TECH VENTURES