1 / 17

The Antecedents of Internal Auditors’ Adoption of Continuous Auditing Technology: Exploring UTAUT in an Organizational C

The Antecedents of Internal Auditors’ Adoption of Continuous Auditing Technology: Exploring UTAUT in an Organizational Context. Ray Henrickson CA●IT, CA●CISA VP Information Systems and Technology Audit The Bank of Nova Scotia. Background. System environment Complex, integrated systems

basil
Download Presentation

The Antecedents of Internal Auditors’ Adoption of Continuous Auditing Technology: Exploring UTAUT in an Organizational C

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Antecedents of Internal Auditors’ Adoption of Continuous Auditing Technology: Exploring UTAUT in an Organizational Context Ray Henrickson CA●IT, CA●CISA VP Information Systems and Technology Audit The Bank of Nova Scotia

  2. Background • System environment • Complex, integrated systems • Millions of financial transactions a day • +1,000 systems • Thousands of changes per year • Total prohibition to access PROD • Comprehensive and mature user controls • Extensive use of end user computing for MIS • Audit environment • Limited audit resources • Deep and varied technical and business skills • Extensive collaboration with IT and business units

  3. CA in My Environment • Work with IT and business areas to develop and implement continuous “auditing” that is executed by them • Transaction level – online payments verification • System level – cyclical verification of changes • Process level – cyclical end point security scans • Each of the determinants is important but not equally at the same time • Key moderator = risk

  4. Why “This puzzling lag …” • Why isn’t continuous auditing the norm? • Doesn’t answer the question directly • Tested several hypotheses related to the adoption of CA through analysis of relationships among select determinants and moderators based on Unified Theory of Acceptance and Use of Technology (UTAUT)

  5. Two Sets of Conclusions • Likelihood of adoption is greater if: • The technology is easy to use • Superior instructs to implement • The auditor chooses to obey • No relationship with: • Usefulness and performance expectations • Availability of supporting tools or organization

  6. Revised Conclusion • Likelihood of adoption is greater if: • The technology is easy to use • Few organizational or technical infrastructure barriers • No relationship with : • usefulness and performance expectations • Influence of superiors • Willingness to implement

  7. Additional Observations • #1 Benefit of CA was accuracy, not timeliness • #1 Focus of CA was for fraud

  8. To This Practitioner … • Both conclusions appear reasonable and well supported with analysis although unexpected • Not able to concur or disagree because not enough context provided

  9. Issue – Survey Population • Institute of Management Accountants • Not auditors • Low response rate • 2.33 % • Limited respondent detail • Industry/business sector • Size/maturity of audit department • Uses for continuous auditing techniques • Why continuous auditing needed • One time or programmatic implementation • Decision to stop continuous auditing • Influence of risk assessment

  10. Issue – Jargon • Continuous what? • Continuous auditing • Continuous control assessment • Continuous risk assessment • Continuous monitoring • What is “continuous”? • Frequency of execution – short audit cycle • Timeliness of execution – real or near real time • Point of execution – close to evidence creation

  11. Issue - Methods • Type of technique • Embedded audit module • Independent review of data files/copies • Analysis of reports • Type of technology • Desktop technology – Access, Excel • Audit software – ACL, IDEA • Custom developed applications • Embedded functionality of vendor package • Special purpose analytical software

  12. Issue –Control Variable • Replace UTAUT control variables Gender, Age and Experience with Annual Sales • Implied bias towards financial transaction integrity • Could consider audit-related variables such as: • Internal Audit annual budget • Size of Audit Department • Volume/complexity of transactions

  13. But, Is the Premise Valid? • Implies new use of stand alone automated checking of transaction qualities • Reflects a “gotcha” objective – fraud, malice, error • Implied bias towards financial transaction integrity • Is there a definition issue? • Is there an expectation gap? • Is research too narrowly focused

  14. Today’s Reality • Many mature or modern systems now include embedded control functionality that can be optionally enabled • MIS – performance metrics • Reports of discrepancies • Posting to suspense accounts • Built in checks – auto balancing • There may be greater deployment of continuous auditing in organizations than recognized in literature

  15. Alternate Premise • Relate to how and how often the enterprise checks or verifies its automated events, transactions, or data in order to proved an opinion on its desired qualities • Maybe CA is not needed • Maybe CA is useful only for specific cases • Maybe CA is already pervasive

  16. Future Research • Follow up to see if the respondents realized their plans for future implementation • Where have CA techniques been most successfully applied and why • Why CA initiatives fail to continue

  17. Value of the Work • Most suitable for IS Assurance academics • Might be useful for standard setting or professional practice bodies such as IIA, ISACA, CICA, AICPA • Limited practical application

More Related