SlideShare uma empresa Scribd logo
1 de 122
TABLE OF CONTENT



TABLE OF CONTENT .............................................................................................................. i

CHAPTER 1 ............................................................................................................................... 6

INTRODUCTION ...................................................................................................................... 6

   1.1       Introduction ................................................................................................................. 6

   1.2 Background of the study ................................................................................................... 6

      1.2.1         The important of quality audit performance......................................................... 7

      1.2.2         Impact of information technology on audit judgments performance. .................. 8

      1.2.3         Audit technology adoption by auditors ................................................................ 9

   1.2       Research Problem ...................................................................................................... 10

   1.4 Objective of the Study .................................................................................................... 11

   1.5 Rationale of the Study .................................................................................................... 12

   1.6 Contribution of the Study ............................................................................................... 13

   1.7 Definition of Terms Used ............................................................................................... 13

   1.8 Organization of the Thesis .............................................................................................. 14

CHAPTER 2 ............................................................................................................................. 15

LITERATURE REVIEW ......................................................................................................... 15

   2.1 Introduction .................................................................................................................... 15

   2.2 Technology Adoption ..................................................................................................... 15

      2.2.1 Standards and regulation of Technology Adoption in Auditing ............................. 16

      2.2.2 Computer-assisted audit tools and techniques and technology adoption ................. 20

      2.2.3. Audit technology adoption ...................................................................................... 21

      2.2.4 Audit Software Application in Audit Practices........................................................ 22

                                                                     i
2.3 Individual Performance .................................................................................................. 24

      2.3.1 Individual Performance Definition .......................................................................... 24

      2.3.2 Relationship between Technology Adoption and Individual Performance ............. 25

   2.4 Theoretical background .................................................................................................. 26

      2.4.1 The History of Technology Acceptance Model ....................................................... 26

      2.4.2 The Unified Theory of Acceptance and Use of Technology (UTAUT) Model....... 27

CHAPTER 3 ............................................................................................................................. 32

RESEARCH FRAMEWORK AND HYPOTHESES DEVELOPMENT ............................... 32

   3.1 Introduction .................................................................................................................... 32

   3.2 Research framework ....................................................................................................... 32

   3.3 Operationalization and measurement of variables .......................................................... 34

      3.3.1 Audit software adoption ........................................................................................... 34

      3.3.2 Determinant factors of audit software adoption. ..................................................... 35

      3.3.3 Individual performance ............................................................................................ 35

   3.4 Hypotheses Development ............................................................................................... 35

      3.4.1 Audit software application and audit performance .................................................. 36

      3.4.2 Determinant factors of audit software use ............................................................... 36

CHAPTER 4 ............................................................................................................................. 44

RESEARCH METHODOLOGY ............................................................................................. 44

   4.1 Introduction .................................................................................................................... 44

   4.2 Research design .............................................................................................................. 44

   4.3 Study One: Determinants of user intention to use Audit Command Language (ACL) and

   impact to audit performance ................................................................................................. 47

      4.3.1 The participants ........................................................................................................ 47

      4.3.2 Data collection method ............................................................................................ 47

                                                                    ii
4.3.3 The questionnaire and variables development ......................................................... 47

      4.3.4 Pre-test ..................................................................................................................... 47

      4.3.5 Validity and reliability ............................................................................................. 48

      4.3.6 Operationalisation of Variables ............................................................................... 49

      4.3.7 Control Variables ..................................................................................................... 52

      4.3.8 Techniques for Analysing Quantitative Data ........................................................... 52

   4.4 Study Two: Determinant factors and impact of audit software application to audit

   performance. ......................................................................................................................... 54

      4.4.1 The participants ........................................................................................................ 54

      4.4.2 Data collection method ............................................................................................ 54

      4.4.3 The questionnaire and variables development ......................................................... 55

      4.4.4 Pre-test ..................................................................................................................... 58

      4.4.5 Validity and reliability ............................................................................................. 59

      4.4.6 Operationalisation of Variables ............................................................................... 60

      4.4.7 Control Variables ..................................................................................................... 62

      4.4.8 Analysis of Structural Equation Modelling (SEM) ................................................. 62

   4.5 Summary ......................................................................................................................... 70

CHAPTER 5 ............................................................................................................................. 71

RESULTS AND DISCUSSIONS OF FINDINGS .................................................................. 71

STUDY ONE: DETERMINANTS OF USER INTENTION TO USE AUDIT COMMAND
LANGUAGE (ACL) AND IMPACT TO AUDIT PERFORMANCE .................................... 71

   5.1 Introduction .................................................................................................................... 71

   5.2 Preliminary analysis ....................................................................................................... 71

      5.2.1 Normality analysis ................................................................................................... 71

      5.2.2 Reliability analysis ................................................................................................... 72

      5.2.3 Factor analysis ......................................................................................................... 73


                                                                    iii
5.2.4 Descriptive Statistics of Participants ....................................................................... 73

      5.2.5 Correlation analysis ................................................................................................. 74

   5.3 Hypotheses Testing......................................................................................................... 75

   5.4 Discussion of Findings ................................................................................................... 77

   5.5 Summary ......................................................................................................................... 78

CHAPTER 6 ............................................................................................................................. 79

   RESULTS AND DISCUSSIONS OF FINDINGS ............................................................... 79

   STUDY TWO: DETERMINANT FACTORS AND IMPACT OF AUDIT SOFTWARE

   APPLICATION TO AUDIT PERFORMANCE .................................................................. 79

   6.1 Chapter Overview ........................................................................................................... 79

   6.2 Descriptive Statistics of Participants .............................................................................. 79

      6.2.1 Response rate .......................................................................................................... 79

      6.2.2 Demographic Profile ............................................... Error! Bookmark not defined.

      6.2.3 Descriptive Statistics of Constructs ......................... Error! Bookmark not defined.

   6.3 Measurement Model ....................................................................................................... 85

      6.3.1 Development of Measurement Model...................... Error! Bookmark not defined.

      6.3.2 Congeneric Measurement Model ............................................................................. 87

   6.4 Structural Model ............................................................................................................. 88

      6.4.1 Assessment of the Structural Model ...................................................................... 107

   6.5 Hypotheses Testing....................................................................................................... 108

   6.6 Discussions of Findings ................................................................................................ 108

   6.7 Summary ....................................................................................................................... 108

CHAPTER 7 ........................................................................................................................... 110

CONCLUSIONS, IMPLICATIONS, LIMITATION AND FUTURE RESEARCH ............ 110

                                                                    iv
7.1 Chapter Overview ......................................................................................................... 110

   7.2 Discussions of Findings ................................................................................................ 110

   7.3 Implication of the Findings........................................................................................... 110

      7.3.1 Theoretical Implications ........................................................................................ 110

      7.3.2 Practical Implications............................................................................................. 110

   7.4 Limitations of the Study ............................................................................................... 110

   7.5 Suggestions for Future Research .................................................................................. 110

   7.6 Summary ....................................................................................................................... 110

REFERENCES ....................................................................................................................... 111




                                                                    v
CHAPTER 1


                                      INTRODUCTION


1.1 Introduction
This thesis studies the level of audit software use in audit practice and it impact to individual
auditor performance. This study also looks into the determinant factors of audit software
adoption as tested in UnifiedTheory of Acceptance and Use of Technology (UTAUT) model.
The chapter aims at providing an overview of the thesis and its structural scheme. The first
section provides background to the research, followed by the research problem, research
objectives and questions. The rationale of carrying out this study is also explained in the
following section, together with brief explanation of contribution of this study to the
theoretical and practical point of view. The chapter concludes with an outline of the
organization of the thesis.

1.2 Background of the study
The emergence of information technology has had a tremendous impact on many areas of
human activities, including engineering, medicine, education as well as accounting and
auditing practices. Information technology (IT) or electronic data processing has changed the
way many organizations conduct business activities. In fact, IT is considered as one of the
major technological advances in businesses this decade. IT system has the ability to perform
many tasks, and IT providers continuously strive in finding new ways to enhance the use of
computer to promote efficiency and aid in decision making. Since many businesses at present
use computers to process their transactions, the auditing profession has to face with the need
and requirement to provide the audit services that can deal with the IT environment.


While the impact of information technology (IT) in business has grown exponentially, few
studies examine the use and perceived importance of IT, particularly outside of the largest
audit firms (Fischer 1996; Banker et al. 2002). This issue is important since IT has
dramatically changed the audit process. Standards now encourage auditors and audit firms to
adopt IT and use IT specialists when necessary (American Institute of Certified Public
Accountants [AICPA] 2001, 2002b, 2005, 2006; Public Company Accounting Oversight
Board [PCAOB] 2004b). However, auditing researchers and practitioners have little guidance
available on what IT has been or should be adopted.cp (Janvrin, Bierstaker, Lowe, 2007)

                                               6
Although studies have suggested that the adoption of IT in audit practices would increase
auditor‟s productivity (Zhao et al. 2004), the adoption of audit technology by auditors is still
low (Liang et al., 2001; Debreceny et al., 2005; Curtis and Payne, 2008). Apart from
perception that adoption of IT in audit practices particularly audit software is costly,
complicated to learn and use, other possible reasons for lack of usage could be due to
unconvincing evidence of the merits in using audit technology to enhance audit performance
(Ismail and Zainol Abidin, 2009). Usability is not sufficient and large potential gains in
effectiveness and performance will not be realized if users are not willing to use information
system in general (Davis F. D., 1993) and audit software in particular, therefore, adoption is
crucial.


The usage of audit software can be increased provided auditors are convinced of the positive
impact of audit software on audit performance.Based on attitude-behaviour theory, Doll &
Torkzadeh (1998) describe a „system to value chain‟ of system success construct from beliefs,
to attitudes, to behaviour, to the social and economic impacts of information technology.
Torkzadeh & Doll(1999) argued that impact is a pivotal concept that embodied downstream
effects. It is difficult to imagine how information technology can be assessed without
evaluating the impact it may have on the individual‟s work. Thus, in audit practice to assess
the audit technology adoption impact is through the assessment of the auditor‟s individual
performance impact.



1.2.1 The important of quality audit performance.
Many accounting firms all over the world have faced various forms of litigation. At the same
time, the threat of litigation has demanded audit firms to maintain and improve the quality of
audit work (Manson et al., 2001). There is evidence that the use of audit software could give
rise to more quality audit. In fact the use of audit software in the audit process has greatly
increased in the last few years. This is true in the case of large audit firms who are motivated
by the desire to improve their efficiency to compete for clients. Manson et al., (2001) pointed
out that audit automation has been used in most areas of the audit processes, more extensively
by the Big Four audit firms than others.

Therefore, arguably, accounting firms in Malaysia should also strive for better audit quality to
be at par with the global accounting giants. This is especially important given that the service


                                               7
sector may prove to be the main pillar of our economy after natural resources run out.For the
audit firm to survive in this competitive era, the highest quality of the audit judgment must be
maintained. However the audit quality of audit firms has undergone severe criticism this
decade due to various financial crisis and management fraud. The fiasco of the Enron Scandal
in 2001 has further alarmed regulators and the public in many countries about audit quality
including various parties in Malaysia. Obviously, huge efforts by the audit firms need to be
taken in order to restore public confidence in the auditors‟ integrity and ability and
subsequently uphold the reputation of the profession. One of the ways to increase the public
confidence in the auditors is to provide quality audit judgments consistently. Speed and
accuracy of audit judgment would certainly help build public confidence in the auditors.



Although many audit firms are introducing audit technology in accounting processes, not
many are actually using the software available and even those who are using, are not using the
higher end software. There are many reasons for the reluctance to incorporate audit
technology in audit processes such as negative perception and unconvincing benefit of the use
of audit technology. Ismail and Zainol Abidin (2009) investigated the level of information
technology knowledge and information technology important in the specific context of audit
work among auditors in Malaysia. Their study suggested that that information technology
knowledge among the auditors is still at the lower level.

1.2.2 Impact of information technology on audit performance.
Within the information technology literature, there are many studies that have examined the
impact of information technology on firms‟ performance in different industries such as
manufacturing (Barua et al. 1995), banking (Parson et al. 1993), insurance (Francalanci and
Galal, 1998), healthcare (Menon et al. 2000), and retailing (Reardon et al. 1996). However,
empirical research to examine the impact of information technology on audit performance in
the accounting practices is under-research. To this date, only one study has examined the
impact of information technology on firms‟ productivity in producing quality audits (Banker,
Chang and Kao, 2002). The other studies examined the factors influencing the use of
information technology (Janvrin, Bierstaker and Lowe, 2009; Curtis and Payne, 2008 and
Merhout, 2007) and perception of use and belief in using the technology (Bhattacherjee 2001,
2004; Venkatesh and Morris 2000; and Davies et al 1989).




                                               8
Although there is a general perception that information technology investments by public
accounting firms could improve firms‟ productivity in terms of consistent audit quality (Lee
and Arentzoff, 1991), the impact of information technology on auditors‟ performance is not
directly observable. To date there is still inadequate data available that could allow one to
examine in-depth processes involving the use of audit technology by auditors when
performing audit procedures (Zhang and Dhaliwal, 2009). Zhang and Dhalilal pointed out that
more data is needed to examine the influence of critical factors that may mediate or moderate
the performance value gained by the auditors when adopting audit technology.

1.2.3 Audit technology adoption by auditors
In audit situations where use of technology is optional, the implementation decision is
typically made by joint discussion between the audit manager and in-charge auditor (Houston,
1999) Auditing technology studies have primarily examined how the use of technology
affects cognitive processing and the resulting decisions auditors make.

Today, the extent to which auditors have adopted information technology, in particular audit
software in their audit process remains an empirical question (Arnold and Sutton 1998; Curtis
and Payne 2008; Janvrin et al. 2009). Audit software is an essential component of audit
technology, refers to computer tools that allow the extraction and analysis of data using
computer applications (Braun and Davis 2003). It is a type of computer program that performs
a wide range of audit management functions.

Although many studies have suggested effective usage of audit software would permits
auditors to increase their productivity in achieving quality audit judgments (Zhao et al. 2004),
the incorporation of audit technology by auditors is still low (Liang et al., 2001; Debreceny et
al., 2005; Shaikh, 2005; Curtis and Payne, 2008). Apart from the perception that the audit
software is costly, complicated to learn and use, other possible reasons for lack of usage could
be due to unconvincing evidence of the merits of using audit technology to enhance audit
performance (Ismail and Zainol Abidin, 2009). However, the usage of audit software can be
increased if they are convinced of the positive impact of audit software on audit judgment
performance.

This study seeks to identify the relationship between the adoptions of the audit software with
the individual audit performance. In other word, this study tries to justify that the individual
audit performance is increased with the increase in the level of audit software use among the
auditor. This study also aims at examining what influences the auditors to adopt audit

                                               9
technology in their practices. The finding of this study hopefully will be able to clarify many
facts about the factors that the auditors normally consider for them to be comfortable enough
with the audit technology.



1.2 Research Problem
    The relationship between investment in information technology (IT) and its effect on
    organizational performance continues to interest academics and practitioners. Most
    researches on audit technology success or its impact on business function such as auditing
    have focused on a firm‟s level. There is still very limited empirical evidence that
    investigate audit technology success from individual level dimension such as user
    adoption of audit technology and its impact to audit performance. Such investigation is
    required as uncertainty, resistance and dissatisfaction could occur among auditors due to
    new working style or culture in audit technology environment. Uncertainty, resistance
    and dissatisfaction would eventually, lead to the failure of the audit technology
    implementation in the audit practices, and ultimately affect audit performance.Measuring
    the audit technology adoption in term of level of use by auditorgives the management
    more accurate feedback about user‟s acceptance towards audit technology.



"Whether Information Technology (IT) use leads to better individual performance has
always been an intriguing topic in IS field. However, not many studies examined the
Information Technology use/individual performance relationship given the significance of
the topic. Researchers and practitioners simply assumed that more IT use lead to better
individual performance. A review of the literature presented a different, rather conflicting,
picture than the conventional wisdom. The current study thus aims at investigating IT
use/individual performance relationship by focusing on the measurement issue i.e. how
different richness level measurement of IT use and individual performance affects the
     use/individual performance relationship. Cp Shen 2009


    Venkatest et al., (2003) stated that one of the most important directions for future research
    is to tie this mature stream of research into other established streams of works. They
    further stated that little to no research has addressed the link between user acceptance and
    individual or organizational usage outcome. Thus, while it is often assumed that usage
    will result in positive outcomes, this remain to be tested..see venkatesh page 470. Straub
    (2009) pointed out that the TAM and



                                               10
The extensive use of IT in audit process especially among big audit firms has been
    motivated by the desire to improve efficiency to compete for clients (Manson et al.,
    2001). Audit firms justified their large investments in audit automation by the need to
    improve the quality of audit work and reduce audit costs. In other words, audit
    automation can be viewed as simply another technology that audit firms employ to
    maintain their competitiveness and profitability. Most of the studies on the technology
    adoption have revealed that much of what is term audit automation consist merely of
    word-processing and spreadsheet applications. There is little evidence on the manner in
    which external auditors employ audit software in the pursuits of their audit objectives.


    Although there were studies carry out on the use of Computer assisted Audit Tools and
    Techniques (CAATTs) and Generalised Audit Software (GAS), two main terms often
    associated with audit software, the focus was not on the use of audit software by the
    external auditors. For example, Wehner and Jessup (2005), Debreceny, Lee, Neo and Toh
    (2005) and Braun and Davis (2003) look into the adoption of GAS among internal
    auditors. Therefore this study is carry out to fill the gap that exist in the literature.



1.4 Objective of the Study
The main objective of this study is to empirically test the impact of application audit software
in practice to the audit performance. Audit software application is measured based on the
auditor‟s normal practice; planning, testing and report writing. Audit performance is measured
based on respondent‟s perception of the audit software impact to the quality, speed,
productivity and effectiveness of the work. This study also attempted to empirically test the
factors contributing to the application of audit software in practice among auditors in
Malaysia. Factors that drive audit software application are classified under three
characteristics; individual, organizational and external factors.

More specifically, the research objectives of the present study are:

   1. To examine the nature of relationship between application of audit software and
       individual audit performance.
   2. To investigate the extent to which individual factors (performance expectancy, effort
       expectancy), organizational factors (organizational supports, facilitating condition,
       technological and infrastructure support) and external factors (social influence and


                                                 11
client‟s technology) contributes to the application of audit software in practice among
       the auditors.
   3. To determine whether training moderates the individual factors (performance
       expectancy and effort expectancy) and audit performance relationship.
   4. To determine whether experience moderates the individual factors (performance
       expectancy and effort expectancy) and audit performance relationship.
   5. To investigate whether performance expectancy, effort expectancy, social influence
       and facilitating conditions have influenced on the behavioral intention to adopt audit
       software.
   6. To determine whether specific knowledge and experience moderate the performance
       expectance and effort expectancy relationship with the behavioral intention to adopt
       audit software.

The research objective 1 to 4 answered by the Study Two, while the research objective 5 and
6 answered by the Study One.

1.5 Rationale of the Study
Based on the development in audit practice and research, this study aims to promote audit
quality through the adoption of audit technology specifically audit software in audit practices.
The relationship between investment in information technology (IT) and its effect on
organizational performance continues to interest academics and practitioners. In many cases,
due to the nature of the research design employed, this stream of research has been unable to
identify the impact of individual technologies on organizational performance (Devaraj and
Kohli, 2003). As individual performance plays a great role in organizational performance, this
study aim to investigate the impact of the use of audit software in audit practices among
auditors to the individual audit performance.


Many audit tasks, including workpaper documentation and review, increasinglyare performed
in electronic environments (e.g.. Croft 1992; Flagg, Glover, andSmith 1992; Knaster 1998;
Rothman 1997; Vezina 1997a, 1997b). Althoughmany believe that automation eliminates
human calculation errors, saves time andmoney, minimizes paper documentation, and
increases accuracy (Rothman 1997),there is little empirical data to support these claims.
Indeed, it has been observed,"although the use of IT to strengthen the audit function is
widespread, its impacton perfonnance has never been determined" (Vezina 1997a; p. 37).
Most disturbingis that performance may decline in electronic environments (Galletta, Hartzel,

                                                12
Johnson, Joseph, and Rustagi 1997). Cp Bible, Graham and Rosman (2005)


While there is a developing literature demonstrating audit technology and its possible benefits
of use by the auditors (e.g., Liang et al. 2001; Shaikh 2005), there is little research
investigating the extent of usage among auditors in practice and the factors that associated
with its use (Curtis, Jenkin, Bedard and Deis 2009). There is also limited study to present
empirical tests of its efficiency and effectivenes or in general its impact to audit performance.
Among the little was study by Janvrin et al. (2008) whose explored audit IT use and its
perceived importance across several audit application and across diverse group of audit firms.
Their study reported that some applications are used extensively and some are not. It also
reported that auditors are varies in opinion about the importance of several audit application,
although not used extensively. However their study did not aim at the impact of audit
application use to the individual audit performance. Thus, to fill the gap, this study is carry
out to examine the auditors perception of the impact of audit technology used to their
individual audit performance.


Previous studies has shown that the use of audit technology among auditors in general is
somewhat low (Quoted?). There are many reasons contribute to this scenario. Perhaps
individual auditors are uncomfortable with certain computer-related procedures because of
their own IT knowledge and experience limitations. It may also be caused by insufficient IT
training and support from the firm that

1.6 Contribution of the Study
This research distinctly contributed to the fields of accounting and information system by
exploring the adoption of audit technology and its impact to the individual performance. The
evolution of information system and the popularity of the technology acceptance theories,
particularly TAM and UTAUT, have made the research in this area became targeted by many
information systems as well as accounting researchers. Most researches involving audit
technology focused on the factors that contribute to the adoption of technology.

1.7 Definition of Terms Used
There are various terms used in this study. For the ease of the reader‟s understanding, the
following sub-sections give definition on some terms which are of interest in this study. The
define terms are auditors, audit software, audit software application, audit performance,



                                               13
1.7.1 Auditors

For the purpose of this study, auditors refer to “external” auditors or also known as the
“financial statement” auditors. External auditors are the individuals who work for an audit
firm that is completely independent of the company they are auditing (Leong, Coram,Cosserat
& Gill, 2001)

1.7.2 Audit software

1.8 Organization of the Thesis
The thesis is structured as follows: Chapter Two reviews relevant literature related to the
technology adoption in audit practices. Specifically it presents a comprehensive critical
review of the evolution of audit technology, the development of auditing standard pertaining
to the adoption of audit technology in audit practices, the impact of audit technology adoption
on the individual performance. The chapter then investigate existing literature on technology
adoption theories particularly the history of Technology Acceptance Model (TAM) and
Unified Theory of Acceptance and Use of Technology (UTAUT) model.

Chapter Three presents the research framework and hypotheses development. This chapter
discusses the components of the research variables, the operationalization as well as the
measurements of the variables, and lastly the proposed hypotheses.

Chapter Four highlights the research methodology adopted in this study. The chapter starts by
discussing the rationale for adopting quantitative survey as the method of the present study.
The chapter proceeds with the discussion of the research design for Study One followed by
discussion of Study Two. Basically, the discussion is concentrated on the participants, data
collection method, the questionnaire and variables development, pre-testing and
operationalization of variables in questionnaire. Validity and reliability measurement also
discuss as part of instrument development procedures. The chapter finally discusses the
techniques adopted for data analysis. Analysis of Variance (ANOVA) technique using SPSS
is used for data analysis in Study One and Structural Equation Modelling (SEM) using AMOS
is used for data analysis in Study Two.

Chapter Five details down the data analysis and report of Study One. It consists of three main
sections, which are the preliminary analysis, hypotheses testing and discussion of findings.
The preliminary analysis reports results related to the descriptive statistics of the sample,
normality and reliability analysis as well as factor analysis. The correlation analysis of the

                                              14
independent and dependent variables is also reported in this section. The results of the
hypotheses testing using multiple regressions analysis is reported next.

Chapter Six details down the data analysis and report of results of Study Two. It consist of
five main sections; descriptive statistics, measurement model, structural model, hypotheses
testing and discussion of findings.


                                        CHAPTER 2


                                  LITERATURE REVIEW


2.1 Introduction
This section discusses literature pertaining to the scope of present research. Section 2.2
discusses about the technology adoption and auditing, specifically, the definition, histories
and evolution of auditing software, modules and auditing application. Next, section 2.3
discusses the individual performance as a consequence of audit technology adoption. Section
2.4 presents a review of the determinant factors of audit technology adoption as per UTAUT
model. This section also discusses the ….. and experience that play a role as moderator
variables.

2.2 Technology Adoption
The technology adoption domain is a well researched area in the information system.
Research in this area has explored topics such as the adoption of mobile banking (Zhou et al.,
2010), internet banking (Foon and Fah 2011; AbuShanad and Pearson 2007; Tan and Teo
2000), the use of websites (Schaik 2009), electronic commerce (Grandon and Mykytyn
2004), software application (Davis et al. 1989; Mathieson 1991), e-mail usage (Szajna 1996),
telemedicine applications (Chau and Hu 2001) and computer usage (Compeau and Higgins
1995).
In term of definition, technology adoption is defines as the decision to accept, or invest in, a
technology (Dasgupta, Granger and McGarry 2002).……….

Technology adoption has been studied at two levels; the first is at the organizational level and
the other is at the individual level. Oliveira and Martins (2011) reviewed theories for adoption
models at the firm level used in information systems (IS) literature and discussed two
prominent models; diffusion on innovation (DOI); and the technology, organization and

                                              15
environment (TOE) framework. This study was motivated by the fact that there are not many
reviews of literature about the comparison of IT adoption models especially at the firm level.
Since most studies on IT adoption at the firm level are derived from these two theories
(Chong et at. 2009), such reviewed of the literature on these models aims to fill the gap.




At the individual level, the emphasis of the analysis is on the acceptance of the technology.
The Technology Acceptance Model (TAM) proposed by Davis (1989) has explained
acceptance of information technology. TAM states that and individual‟s adoption of
information technology is dependent on their perceived ease of use and perceived usefulness
of the technology. This model has been used and tested, and at a times modified, to study the
adoption of a number of different technologies in the past decade (

2.2.1 Standards and regulation of Technology Adoption in Auditing
Many business at present use computers to process their transactions, the auditing profession
has been faced with a need to provide increased guidance for audits conducted in an IT
environment. Various authoritative bodies, such as the American Institute of Certified Public
Accountants (AICPA) and the International Federation of Accountants and the Information
Systems Audit and Control Association (ISACA), have issued standards in this area to be
observed by their members in performing an IT audit (Yang and Guan, 2004). The following
sub sections explain the development of the standards relevant to technology adoption in
auditing.

2.2.1.1American Institute of Certified Public Accountants (AICPA) Standards.
Auditing Standards Board (ASB) is the senior technical body of American Institute of
Certified Public Accountants (AICPA) designated to issue pronouncements on auditing
matters. The ASB was formed in October 1978 and is responsible for the development and
promulgation of auditing standards and procedures known as Statement on Auditing
Standards (SAS) to be observed by members of the AICPA. The AICPA code of professional
conduct requires an AICPA member who performs an audit (the auditor) to comply with the
standards promulgated by the ASB. The auditors are expected to have sufficient knowledge of
the SASs to identify those that are applicable to them and should be prepared to justify
departures from the SASs.




                                               16
Over the years AICPA has issued numbers of SAS that are related directly to IT and audit
even before ASB was formed.SAS No. 3, “The effects of on the auditor‟s study and
evaluation of internal control” (AICPA, 1974) was issued in conjunction with the need for a
framework concerning auditing procedures in examining the financial statements of entities
that use IT in accounting applications. This was the first bold step in defining the auditing
standard for IT system (Jancura and Lilly, 1977 as quoted in Yang and Guan, 2004). The
statement provided guidance for audit conducted in IT environments and required auditor to
evaluate computer during their audit.

According to SAS No. 3, the objectives of accounting control are the same in both a manual
system and an IT system. However, the organization and procedures required to accomplish
these objectives may be influenced by the method of data processing used. Therefore, the
procedures used by an auditor in the evaluation of accounting control to determine the nature,
timing and extent of audit procedures to be applied in the examination of financial statements
may be affected.

SAS No. 3 has been superseded by SAS No. 48, “The effects of computer processing on the
examination of financial statements”. It was effective for the examination of financial
statements for periods beginning after 31 August 1984. It also amended SAS No. 22 on
“Planning and supervision” (AICPA, 1978a), SAS No. 23 on “Analytical review procedures”
(AICPA, 1978b), and SAS No. 31 on “Evidential matter” (AICPA, 1980) to include
additional guidance for audits of financial statements in IT environments.

The ASB was in the opinion that auditors should consider the method of data processing used
by the client, including the use of computers, in essentially the same way and at the same time
that they consider other significant factors that could affect the audit. The use of IT could
affect the nature, timing and extent of audit procedures, so the auditor should consider these
effects throughout the audit. Therefore, the ASB felt that the guidance concerning the effect
of computer processing on audit of financial statements should be integrated with existing
guidance rather than presented separately. This is the primary reason why SAS No. 48
amended so many other existing statements.

Before amendment, SAS No. 22 on “Planning and supervision” requires the work in an audit
engagement to be adequately planned, and assistance, if any, to be properly supervised. SAS
No. 22 also provides guidance for the auditor making an examination in accordance with
GAAS. The engagement must be adequately planned and supervised for the auditor to achieve

                                              17
the objectives of the examination, which is to gather the appropriate amount of sufficient
competent evidential matter to form the basis for an audit opinion on the financial statement.
SAS No. 48 came to place to amend SAS No. 22 by adding further planning considerations to
those already required. It requires the auditor to consider the methods (manual or
computerized) used by the client in processing significant accounting information.

SAS No. 23 which covers analytical review procedures superseded by SAS No. 56,
“Analytical procedures” (AICPA, 1988b), issued in April 1988. SAS No. 56 provides
guidance on the use of analytical procedures and requires the use of analytical procedures in
planning and overall review of all audits. When the client has an IT system, the auditor must
consider a particular factor in determining the usefulness of such procedures. This factor
relates to the increased availability of data prepared for management‟s use when computer
processing is used.

SAS No. 31 on “Evidential matters” states that once the auditor completes the study and
evaluation of internal control, substantive testing must be performed to obtain sufficient,
competent evidential matter on which the auditor can based his/her opinion. SAS No. 48
amended SAS No. 31 and states that audit evidence is not affected by computer processing,
but the methods used to gather audit evidence may be affected. In an IT environment, the
auditor may have to use computer-assisted audit techniques (CAAT) such as computer-aided
tracing and mapping, audit software, and embedded audit data collection to gather evidence.
The auditor will have to rely more heavily on CAAT methods for inspection and analytical
review procedures.

Later on, the AICPA issued a professional pronouncement on the implications of electronic
evidence, SAS No. 80, Amendment to Statement on Auditing Standard No. 31, Evidential
Matter. This amendment suggests that a system that predominantly consists of electronic
evidence, it might not be practical or possible to reduce detection risk to an acceptable level
by performing only substantive tests for one or more financial statement assertions. (Helms
and Fred, 2000). SAS No. 80 further notes that the auditor may find it difficult or impossible
to access certain information for inspection, inquiry, or confirmation without using IT. Hence
the auditor might use generalised audit software (GAS) or other computer-assisted audit
techniques to test system controls or access information.

SAS No. 94 “The effect of IT on the auditor‟s consideration of internal control in a financial
statement audit” (AICPA 2001) was released and came to effect for the audits of financial

                                              18
statement beginning on or after 1 June 2001. SAS No. 94 provides guidance to auditors about
the effect of IT on internal control, and on the auditors‟ understanding of internal control and
assessment of control risk. This indicates that, in computer intensive environments, auditors
should assign one or more computer assurance specialist (CAS) to the engagement in order to
appropriately determine the effect of IT on the audit, gain an understanding of controls, and
design and perform test of IT controls. SAS No. 94 also requires that an auditor planning to
perform only substantive tests on an engagement must be satisfied that such an approach will
be effective (Curtis, Jenkin, Bedard, & Deis, 2009)

The AICPA, in addition to issuing several standards for IT-related auditing, also publishes
Top 10 Technologies list annually to build member awareness about important and emerging
technologies that will contribute to the profession. Auditor knowledge levels are clearly
specified in the International Standard on Auditing (ISA) 401, paragraph 4, (IFAC, 1999)
which states that the auditors should have sufficient knowledge of the computer information
system (CIS) to plan, direct, supervise and review the work performed. (Ismail and Abidin,
2009)

2.2.1.2International Federation of Accountants (IFAC)

2.2.1.3 Information Systems Audit and Control Association (ISACA)
ASACA was formed in 1969 to meet the unique, diverse and high technology needs of the
burgeoning information technology field. In an industry in which progress is measured in
nano-seconds, ISACA has moved with agility and speed to bridge the needs of the
international business community and the information technology controls profession.

2.2.1.4 Public Company Accounting Oversight Board (PCAOB)
Public Company Accounting Oversight Board (PCAOB) ...see curtis, bedard for training.

The Public Oversight Board (2000) pointed out that auditors‟ professional capabilities in an
accounting information system (AIS) and the evaluation ability of a computer assurance
specialist (CAS) are the main factors of auditing quality (Lin and Wang, 2011). Brazel and
Agoglias (2004) has examined the impact of auditors‟ professional capability on CAS and
AIS auditing system. The finding suggested that auditor with high AIS professionalism would
formulate higher standards in risk assessment of computerized auditing environments, while
the auditors of high CAS capability would be able to provide more accurate auditing reports.




                                              19
2.2.2 Computer-assisted audit tools and techniques and technology adoption
CAATTs are computer tools and techniques that an auditor uses as part of their audit
procedures to process data of audit significance contained in an entity‟s information systems
(Singleton, 2003). Lin and Wang (2011) further referred CAATTs to software that helps
auditors to conduct control and confirmation tests, analysis and verification of financial
statement data, and continuous monitoring and auditing. It can be widely applied in analysis
of financial data and error inspections to identify frauds or false statements. Braun and Davis
(2003) defined CAATTs more broadly to include any use of technology to assist in the
completion of an audit. This definition would include automated working papers and
traditional word processing applications. More importantly CAATTs are defined as computer-
assisted tools that permit auditors to increase their productivity, as well as that of the audit
function (Zhao, Yen and Cheng, 2004).


The advantage of the CAATTs systems is the automated auditing procedures for overall
auditing, rather than sample auditing. Thus, it can enable auditors to enhance the validity of
the data and results and also enable them to expand the scope of audit to a more high risk area
(Lin and Wang, 2011).


The failure of CAATTs to meet the expectation of the users could be due to several factors.
First, GAS or CAATTs lack of common interface with IT systems, such as file formats,
operating systems, and application programs (Shaikh, 2005). He started with interactive data
extraction and analysis, IDEA, one of the most popular GAS package that is able to extract
several file formats, such as ASCII, DBASE III, and other with common interface. He found
that the problem is that auditors will have to design one specialized audit software for each
Electronic Data Processing (EDP) system if the EDP system uses proprietary file formats or
different operating systems (Liang et al., 2001).

Second, other concurrent CAATTs often requires special audit software modules be
embedded at the EDP system design stage (Pathak, 2003). Therefore, the early involvement of
auditors at the time when the system is under development become necessary (Liang et al.,
2001; Tongren,1999). Furthermore, any changes in auditing policy may also require major
modification not only to individual audit software modules, but also entire EDP systems
(Wells, 2001; Liang et al., 2001). Thus, in summary, applying these advanced CAATTs is
usually very costly even if it is possible.


                                               20
Third, as the auditees‟ EDP systems become more complex, it is essential for auditors to audit
through computers. The paper stream into and out of computers disappears and is replaced by
electronic data streams, which can only be analyzed in automated fashion. Most CAATTs
currently in use cannot directly access an auditee‟s live data. Auditors usually gather the
historical data file from the auditee‟s personnel. This situation creates the possibility to be
given manipulated or even fraudulent data.

From other perspective, CAATTs can be potrayed as the tools and techniques used to examine
directly the internal logic of an application as well as the tools and techniques used to draw
indirectly inferences upon an application‟s logic by examining the data processed by the
application (Hall, 2000). Of the five CAATTs that have been advanced in popular audit
literature, three – test data, integrated test facility, and parallel simulation – directly examine
the internal logic of the application. While the remaining are embedded audit module and
generalized audit software, examine the application‟s logic indirectly.




2.2.3.Audit technology adoption
Different authors have used different term to refer to the audit technology adoption in auditing
practices. Dowling and Leech (2007) and Dowling (2009) haveused the term audit support
system and decision aids to reflect the adoption of audit technology in auditing. Audit support
systems are the key terminology application deployed by audit firms to facilitate efficient and
effective audits (Dowling and Leech, 2007). They refers audit support systems to include
electronic workpapers, extensive help files, accounting and auditing stsndards, relevant
legislation, and decision aids. Dowling (2009) revealed that audit support systems are the
primary technology application audit firms deploy to control, facilitate, and support audit
work. His study investigates how several auditor, audit team, and audit firm factors influence
whether auditors use audit support systems the way audit firms intend them to be used.

Manson et al. (2001) used the term audit automation to reflect the IT use in the audit process.
They claimed that the increased use of IT is part of strategies being adopted by the big audit
firms to cope with a more competitive environment. Earlier, a survey by Manson et al. (1997)
found that audit automation was used in most aspects of the audit process, more extensively
by the Big Five audit firms than others, although much of what is termed audit automation
consists merely of word-processing and spreadsheet applications.



                                                21
Generalised Audit Software (GAS) is the most common computer-assisted audit tool and
techniques (CAATTs) used in recent years (Braun and Davis, 2003; Singleton, 2006). GAS is
software package which is used by auditors to analyse and audit either live or extracted data
from a wide range of applications (Debreceny et al., 2005).Gas allows auditors to undertake
data extraction, querying, manipulation, summarization, and analytical task (Debreceny et al.,
2005). Two most of the popular GAS are Audit Command Language (ACL), Interactive Data
Extraction and Analysis (IDEA) (Braun and Davis, 2003) and Panaudit Plus (Debreceney et
al., 2005). These packages contain general modules to read existing computer files and
perform sophisticated manipulations of data contained in the files to accomplish audit task.
GAS also has other products like CA‟s Easytrieve, Statistical Analysis System (SAS), and
Statistical Package for Social Sciences (SPSS) (Singleton, 2006)

GAS is rapidly increased in use by internal auditors in their profession and audit staffs who
are involve requires background in data analytic technologies to perform their audit
tasks(Bagranoff and Vendrzyk, 2000). Debreceney et al., (2005) also found that GAS are
frequently being used in special investigation audits of two large local bank in Singapore. The
key reasons for the widespread use of GAS include its relative simplicity of use requiring
little specialized information systems knowledge and its adaptability to a variety of
environments and users (Braun and Davis, 2003).

While studies show that GAS is widely used by internal auditors, recent surveys show,
however that CPAs do not frequently and systematically use these CAATTs in practice
(Kalaba, 2002). Other surveys (1998-2001) indicate that both ex-post and concurrent
CAATTs are used primarily in internal audit settings by proprietary implementation. There
are several research concentrate on the adoption of GAS (Wehner and Jessup 2005;
Debreceney et al. 2005; Braun and Davis 2003), but only few papers analyzed about its usage
by external auditor.

2.2.4 Audit Software Application in Audit Practices

2.2.4.1 Client acceptance and audit planning
       Technology is already having a major impact on audit planning. For example,
       computers are used to generate clientspecific internal control templates to help identify
       strengths and weaknesses in a system. To generate a client-specific internal control
       template, auditors input data into a computer-based questionnaire developed by the
       audit firm. In response to queries from the software, the computer can then be used to

                                               22
analyze a client's business processes, determine controls that are present or missing
       (based on a comparison with industry benchmarks), assess inherent and control risk,
       and generate a detailed series of audit tests to be performed. As audit work continues,
       the results of audit testing can then be entered into the software to
       determine if the risks identified during planning have been appropriately addressed.
       This helps to ensure that all significant risks have been addressed during the audit. cp
       (Bierstaker et al. 2001)



       Many firms have adopted a risk-based audit approach and developed or purchased
       software to help the auditor gain an understanding of how external and internal risk
       affect the audit. These software packages can also be used to help sell risk
       identification and/or risk management services to existing and potential clients. cp
       (Bierstaker et al. 2001)


       In term of sampling....The new risk standards(SAS Nos. 104-111) suggest that auditors
       use the computerized assisted auditing to select sampletransactions to audit from key
       electronic files, sort transactions with specific characteristics, test an entirepopulation
       instead of a sample, and obtain evidence about control effectiveness (AICPA 2006)


2.2.4.2 Audit substantive testing
       Every audit engagement involves testing management‟s assertions (e.g. existence of
       assets, liabilities and owner‟s equity, quality of earnings, reliability of internal control,
       compliance with applicable laws and regulations) by gathering sufficient and
       competent evidence.

2.2.4.3 Audit completion and report writing

       A major advantage of electronic working paper s that enhances efficiency is taht
       information can be shared among auditors at different locations through the use of e-
       mail or remote access software (Debreceney et al., 2005). As needed, working papers
       from prior years can easily be integrated into the current year working papers.




                                                23
2.3 Individual Performance
In many organizational life and other human affairs, individual performance plays a great role
in achieving the goals set. Different performance measurements are given in different
situations. For example, students in classroom at school or university, they are normally
evaluated based on their participation, assignments or capability to work in a group. In an
organizational context, the workers may be evaluated based on their productivity, quality of
their output, commitment skills, or integrity (Shen, 2009).




Due to the variety of context, individual performance was differently defined, so as the
measurements also different. In this section, individual performance definitions,
operationalization, measurements and it relationship with information technology that are
relevant to current study will be reviewed.

2.3.1 Individual Performance Definition
In recent years there has been a large increase in research related to individual performance
particularly in psychology, educational and learning, human resource as well as in general
management . Researchers have defined individual performance differently but consistent
over their respective area of study. In Information system (IS) literature however, researchers
seem to assume that performance is rather self-explanatory. This explains why in this research
area, clear definition of individual performance is still lacking.In addition, the review of IS
literature on the research in the individual performance found that the contexts, the construct
measured, or the theories based upon are not consistent.

Can put the summary of previous literature on Ind Performance in IS (in table form)

Most studies in IS literature developed their definitions of individual performance based on
“individual impact” definition from DeLone and McLean (1992). According to DeLone and
McLean (1992), IT use leads to three types of outcomes: user satisfaction, individual impact,
and organizational impact. Individual impact was defined as “the effect of information on the
behavior of the recipient”. Compared to individual performance, the term individual impact
was used loosely and it transcends mere individual performance and includes all other
outcomes under different contexts, for example, change in decision making productivity,
change in user activity, and user‟s perception of the importance of the system (DeLone and
McLean, 1992). Cp Chen Shen


                                              24
In auditing

2.3.2 Relationship between Technology Adoption and Individual Performance
The relationship between IT use and individual performance has not been well addressed in
previous studies(Sundarraj & Vuong, 2004). The general believe is that more use of IT will
lead to better individual performance. This can be traced back to DeLone & McLean‟s work.
In their study, the measurements of information systems success fall into six major categories
– system quality, information quality, use, user satisfaction, organizational impact and also
individual impact. After that, several studies based their model on this study, and overlooking
testing the link between IT use and individual performance (Almutairi & Subramaniam, 2005;
Livari, 2005, McGill, Hobbs, & Klobas, 2003). However, prior researches failed to reach
consensus on the nature and strength of the relationship between IT use and individual
performance. Only conflicting results were presented from previous studies, some found IT
use improves individual performance and some found negative relationship.

Different researcher study different nature of IT use and examine the impact to individual
performance. In fact, the linkage between information technology and individual performance
has been an ongoing concern in IS research (Goodhue and Thompson, 1995). Most of the
studies in organizational setting show a positive relationship between IT use and individual
performance. For example, Goodhue (1988) reported that information systems have a positive
impact on performance only when there is correspondence between their functionality and the
task requirements of users.Devaraj & Kohli (2003) argued that the driver of IT impact is not
the investment in the technology, but the actual usage of technology. Their study on the use of
technology in hospital resulted in finding that technology usage was positively and
significantly associated with measures of hospital revenue and quality.

There were also studies reported the negative relationship between IT use and performance.
Bible, Graham, & Rosman, (2005) examined the impact of electronic work environments on
auditor performance. Their assessment was on whether audit technology affects decision
making in a workpaper review task. The result of an experiment revealed that the electronic
environment negatively impact auditors‟ performance. Auditors in the electronic work
environment found to be less able to identify seeded errors and to use them properly in
evaluating loan covenants as compared to the auditors in the traditional paper environment.




                                              25
Many studies tested the association between “system use” and “individual impacts” and the
association was found to be significant in each of the studies. (DeLone and McLean,
2003)…to explain one by one..the seven studies

2.4 Theoretical background
The previous sections discussed the technology adoption and impact to individual
performance. For the technology to be of value it must be accepted and use. An important
model for studying technology adoption and usage is the Unified Theory of Acceptance and
Use of Technology (UTAUT).

The following sub-sections discuss the history of Technology Acceptance Model (TAM) of
which most of the basic variables tested in UTAUT model were adopted partly from this
model. This is followed by the discussion of the history of UTAUT model, the model tested in
this study. This sub-section lead the discussion into the introduction of the variables adopted
and tested in the current study.

2.4.1 The History of Technology Acceptance Model
Technology Acceptance Models (TAM) have been developed to measure system use,
acceptance, and user satisfaction of those systems (Davis, Bagozzi, & Warshaw, 1989). The
Davis model specifically focuses on information systems use and is based on the theory of
reasoned action (TRA) originally introduced by Ajzen and Fishbein in the early 80‟s (Ajzen
& Fishbein, 1980) and further refined by Ajzen as the extended TRA in 1991 (Ajzen, 1991).
TRA is a technology acceptance model that can be used to predict behavior in a wide variety
of situations, not just the adoption of information systems technology. Ajzen states that an
individual‟s beliefs influence his/her attitude towards various situations. The users‟ attitude
joins with subjective norms to shape the behavior intentions of each individual. (Cp Moran
2006)


This theory was further refined and called the theory of planned behavior (TPB) which is also
titled the extended theory of reasoned action. The TPB is a general behavior model which can
be used to study broader acceptance situations than the TAM but it has been applied to
information systems studies (Mathieson, 1991) & (Taylor & Todd, 2001). (Cp Moran 2006).
TPB includes many factors, or constructs, used to determine users‟ acceptance of innovations.
The three considerations are behavioral beliefs, normative beliefs, and control beliefs. These
are the users core beliefs about the consequences of the action, the expectations of others, and


                                              26
beliefs about how the user controls, or does not control, the end result of the behavior. Table 1
further describes the model parameters.



2.4.2 The Unified Theory of Acceptance and Use of Technology (UTAUT) Model.
The Unified Theory of Acceptance and Use of Technology (UTAUT) integrated the concepts
of previous….This synthesized model created to present more comprehensive pictures of
acceptance process than any previous model able to do. This model emerged from the
combination of components from eight models previously established in IS literature, all of
which had their origins in psychology, sociology and communications. Theses eight models
are the Theory of Reasoned Action (TRA); Motivational Model (MM); Theory of Planned
Behaviour (TPB); Decomposed Theory of Planned Behaviour (DTPB); Technology
Acceptance Model (TAM); the Motivational Model (MM); Combined TAM and TPB (C-
TAM-TPB); Model of PC Utilization (MPCU); Innovation Diffusion Theory (IDT) ; and
Social Cognitive Theory (SCT). Each model attempts to predict and explain the user behavior
using a variety of independent variables.



Researchers have analysed and compared the competing technology acceptance theories and
models as noted above in order to identify the most promising ones in respect of the ability to
predict and explain individual behaviour towards the acceptance and usage of technology. The
UTAUT model formulated after eight models have been thoroughly revieved and empirically
compared. The UTAUT model explained about 70 percent of the variance in intention to use
technology, vastly superior to variance explained by the eight individual model (Rosen,
2005). Although the UTAUT model is relatively new, its suitability, validity and reliability in
technology adoption studies in different context and across the country has been proven
(AlAwadhi and Morris, 2008; Venkatesh and Zhang, 2010).

The UTAUT aims to explain user intentions to use an information system and subsequent
usage behavior. The main variables tested in the UTAUT model are: performance expectancy,
effort expectancy, social influence, and facilitating factors. Venkatesh et al. (2003) explain
performance expectancy as the degree of performance gain after using a new system or a
technology. This is an important variable in predicting user behavior. Considering the fact that
many people take in-service training courses in order to pursue career enhancement
opportunities, it is logical to offer them something new that would contribute to their job

                                               27
performance. Therefore, high performance expectancy can encourage possible users to adopt
the new technology or the new system. Because of its importance, many theories have
adopted this construct in different ways.


The second main variable is effort expectancy. This variable measures the degree of effort
that a person needs to put forth when using a new technology or a new system. Research has
shown that users are more likely to adopt or use new technologies if they require a relatively
minimal amount of effort (Agarwal and Prasad, 1997; Konradt et al., 2006). It is likely that
resistance can be expected from the users, when employing a new technology, if the new
system requires them to work hard in order to learn it. It is a well known fact that many
people do not resist an innovation itself, but do resist learning a new thing that requires effort
instead of using a well known system. Therefore, this variable is also important in predicting
user behavior in terms of accepting or rejecting a new technology. Effort expectancy groups
several constructs fromother theories or models.



The third variable in the UTAUT is social influences. Social influences are the external and
internal factors that effect people when making a decision or displaying a behavior. In other
words, the degree that the people value significant other‟s opinions constitutes social
influences. Some people may feel pressure to comply with the proposed behavior, which in
this case can be the use of a new technology, while others may not. Social influence is used as
an independent variable in many models such as the “subjective norm in TRA, TAM2,
TPB/DTPB and C-TAMTPB, social factors in MPCU, and image in IDT” (Venkatesh et al.,
2003, p.451).



Finally, facilitating conditions is the last main variable in UTAUT. Venkatesh et al. (2003)
describes facilitating conditions as the state of readiness of the technological environment
with regards to its support for the user. Users may need support such as technical help in
using the new system or the new technology. If the technological environment offers such
support, users will be more likely to be in favor of using it. On the other hand, if the system
does not offer such support, it would be more difficult to encourage users to adopt the new
system or technology. Like the previous variables, facilitating conditions is included in earlier
models and theories, but in different formats. One example of this variable in a different


                                               28
format is the perceived behavioral control variable used in TPB. This variable is also used in
TAM.


This model also incorporates certain variables as moderators of the relationship described
above. In particular UTAUT model tested several user variables and posits that gender, age,
experience, and voluntariness of use (the demographic characteristics), mediate the impact of
the four key constructs on usage intention and behavior (Venkatesh et al., 2003).


Gender, which has received some recent attention, is one of the key moderating influence in
technology adoption. Park, Yang, and Lehto (2007) examined the adoption of mobile
technologies byconsumers in China. In their study, they surveyed 221 Chinese people in order
to understandtheir perceptions regarding mobile communication technologies. The results of
their analysisrevealed the role that gender plays in terms of affecting user intentions. They
further revealed that male users were more influenced by performance expectancy than
female users. In other words,male users were more focused on increasing their gains from
mobile technologies than femaleusers. This finding is consistent with the study by Wang and
Shih (2009). On the other hand, effortexpectancy was higher for females than males.
Interestingly, experience did not significantlyaffect user intentions in this study.


Wang, Wu, and Wang (2009) investigated the acceptance of mobile learning technologies and
focused on gender and age issues to see whether they make a difference in users‟ perceptions.
In contrast to previous studies, Wang et al. (2009) did not find age or gender to have
asignificant moderating effect on performance expectancy. On the other hand, both gender
and
age significantly moderated effort expectancy and social influences. Wang et al. (2009)
reportedthat effort expectancy was more important for older users than younger ones. While
this findingwas not unexpected, as older users tend to look for less complex systems to
operate, themoderating affect of gender differences on social influences was really
unanticipated.Interestingly, male users‟ social influences scores were higher than that of
female users; that is,male users were more affected by the opinions of significant others than
female users.


Age....


                                                29
Experience...
Many studies have explored the affects of moderating variables on user intentions.Koivumaki,
Ristola, and Kesti studied user perceptions towards mobile services (2008). Theresearchers
tested the University of Oulu‟s SmartRotuuari2 program on 243 people. The resultsindicated
that experience played a major role in determining user intentions.


Experiencepositively moderated performance expectancy and effort expectancy. On the other
hand,facilitating conditions was negatively moderated by experience. Particularly, Koivumaki
et al. (2008) noted that skilled users found the system useful and easy to use.Wang and Shih
(2009) study on 244 Taiwanese users of E-Government information kiosks alsoproduced
significant results in terms of moderating variables. According to the results,effort expectancy
was greater for old versus young users. Moreover, gender was significant in
determining user intentions. Wang and Shih found that performance expectancy was stronger
formen than women. Furthermore, social influences were stronger for women than men.


Voluntariness....


Figure 1 : UTAUT Model

      Performance
      Expectancy


         Effort
       Expectancy
                                                          Behavioral                Use
                                                           Intention             Behavior
          Social
        Influence


       Facilitating
        Condition




                        Gender              Age          Experience         Voluntariness
                                                                               of use


                                              30
2.4.2 Computer self-efficacy

2.4.2.1 Self-efficacy define

The concept of self-efficacy is derived from the work of Bandura and Social Cognitive
Theory (1986). Social Cognitive Theory (SCT) suggest that human behavior is reciprocally
influenced by environmental as well as cognitive factors, which include outcome expectation
and self-efficacy (Downey and McMurtrey, 2007). Self-efficacy is an individual‟s confidence
in their ability to successfully accomplish a given task or activity (Bandura, 1997). Self-
efficacy belief, therefore, determines how an individual feels, thinks, motivate themselves,
and how they behave and produce diverse effect through cognitive, motivational, effective,
and selection processes (Reid, 2008). Bandura (1986, 1997) holds that self-efficacy is more
than a belief in ability level; it also orchestrates the motivation necessary to conduct the
behavior. Self-efficacy helps determine what activities an individual engages in, the effort in
pursuing that activity, and the persistence in the face of adversity (Downey and McMurtrey,
2007).

General and specific CSE..see Argawal et al (2000) page 419..

Self-efficacy also applies to computing behavior. Several studies (Burkhardt and Brass, 1990;
Gist et al., 1989) have examined the relationship between self-efficacy with respect to using
computers and a variety of computer behaviors. Compeau and Higgins (1995b) define
computer self-efficacy as the judgment of one‟s capability to use an information technology.
They refer CSE as self-assessment of individual ability to apply computer skills to complete
the specific tasks. They remark on the relative paucity of prior research examining the
influence of self-efficacy in the context of computer training. Compeau and Higgins (1991,
1995a, 1995b, 199) are pioneers in studying the impact of CSE on human interaction with
computer.

This study extends current understanding of the concept of CSE in the context of the usage of
the audit software . See Argawal et al (2000) pg 419, para 4..explain about CSE concept in
audit software…and it‟s role as moderating factor to training.




                                              31
CHAPTER 3


         RESEARCH FRAMEWORK AND HYPOTHESES DEVELOPMENT


3.1 Introduction
The previous chapter has thoroughly reviewed the literature related to UTAUT and individual
performance. This chapter presents a research framework to determine the relationship
between research variables. The research variables are: (1) the level of audit software
application as technology adoption constructs (2) performance expectancy, effort expectancy,
social influence and facilitating conditions, organizational supports and training as the
antecedents of the technology adoption construct (3) experience and computer self-efficacy as
a moderator variables and (4) individual performance as the criterion variable. Then,
operationalization and specific measurements of these variables are discussed in detail.
Finally, the chapter discusses the research hypotheses to be tested.

3.2 Research framework
The comprehensive review of literature performed in the previous chapter found that most of
prior researches on technology adoption have stopped at the behavioral intention to adopt
information technology (…..quoted). Review of past studies revealed that only few researches
have been done on the actual usage and impact of technology, less little on the adoption of
audit software in audit practices.     Several models have been proposed to predict the
technology adoption such as Technology Acceptance Model (Davis et al. 1989), Theory of
Planned Behavior (Ajzen, 1991) and Unified Theory of Acceptance and Use of Technology
(Venkatesh et al. 2003). However these models focus on whether a system is used, not how it
is used (Dowling, 2009). A number of studies attempted to extend the technology acceptance
study further into the use of technology in audit practice. For example, Bierstaker, Burnaby,
& Thibodeau, (2001) assessed thecurrent impact of technology on the auditprocess, and the
future implicationsof technological trends for the auditingprofession.


Based on the reviews done on the several technology adoption model as well as mid-range
theories related to the technology adoption, the theoretical foundation of this study is
premised on the UTAUT model which was tested by Venkatesh et al. (2003).Venkatesh et al.,
(2003)also highlighted that the directions for future research need to be directed more to the


                                               32
outcome of the technology adoption. Until today, little to no research has addressed the link
between user acceptance and individual performance outcome. Thus, the assumption that
technology usage will always resulted in positive outcomes are still remains untested.
Therefore, this study is believed to be able to fill the gap that exists in the area of audit
technology.

Figure 2 : Research framework

         Performance
         Expectancy

            Effort
          Expectancy
                                                           Audit                    Individual
             Social
           Influence                                       Software               Performance
                                                           Application
          Facilitating
          Condition

            Client
          Technology


        Organizational
           Support

                                        Training            Experience
       Computer Self-
         Efficacy


Here need to explain about the adoption of audit software in auditing practices. Need to proof
that there is no attempt to investigate the adoption and impact to performance as well as the
determinat factors..




                                              33
3.3 Operationalization and measurement of variables
The present study is based on the UTAUT model which was developed and tested by
Venkatesh (2003). The focus of the study is to examine the factors that influence the
application of audit software amongst the auditors in different audit firms that adopting audit
software in practice. This study is also aimed to examine the impact of the audit software
application to the individual audit performance. As mentioned earlier (make sure this has been
mentioned), UTAUT model is in principle open for inclusion of other predictors if these
predictors   can explain significant variance in the technology adoption,in an attempt to
provide an even richer understanding of technology adoption and usage behavior. Give
example other studies that recommended other variables..

As stated previously, the UTAUT model is open for inclusion (make sure this is mentioned
previously) of other variables pertinent to behavior usage of audit software. Therefore,
besides the main variables tested in UTAUT model, the conceptual framework of the present
study also includes computer self-efficacy (Compeau and Higgins,1995;           Burkhardt and
Brass, 1990; Gist et al., 1989 ), training factorsas one of the elements influence the usage
behavior, elements, the present study also includes additional variables that can explain more .
The main variables introduced in UTAUT model are performance expectancy, effort
expectancy, social influence and facilitating condition. The study introduced two new
variables to the existing UTAUT model; client technology and computer self-efficacy. This
study tested the moderating effect of experience to the relationship of performance and effort
expectancy to the audit software application as tested in UTAUT model. To consider the
contribution of this study, new moderating variable was also tested to see the interaction
effect of training to the relationship of performance and effort expectancy to the audit
software application as tested in UTAUT model.

3.3.1 Audit software application
This study used the term audit software application to describe software used to assist auditors
in completing one or more tasks. Reviewed of prior literature and discussion held with
practitioners and academician resulted in the identification of 15 audit software applications.
The applications of audit software included those examined in previous research for example,
analytical procedures (Knechel, 1988),identifying samples (Kachelmeier & Messier, 1990).
They also included recent audit software applications in audit tasks, for example fraud review
(Bell & Carcello, 2000), testing online transactions (Wright, 2002). This study grouped the
audit applications

                                              34
3.3.2 Determinant factors of audit software adoption.



3.3.3 Individual performance
The choice of performance measures is one of the most critical challenging facing
organizations. Performance measurement systems play a key role in developing strategic
plans, evaluating the achievement of organizational objectives, and compensating managers
(Ittner and Larcker, 1998). The individual performance is the ultimate dependent variable or
the criterion variable in this present research. Generally, individual performance is intended to
identify the extent to which users believe that adopting technology in performing the task
gives impact to their job performance. Individual performance also has been examined in its
specific aspects such as use of new technology enrich the work …………………In this
present research, individual performance is defined as the extent to which auditors believe
that using audit software in performing their audit task can increase the performance of audit
works.

Individual performance has been measured in audit technology context by several researchers.
For example ……

3.4 Hypotheses Development
According to Vierra, Pollack and Golez (1998) researchers normally restate research
questions as hypotheses because hypotheses can be subjected to empirical testing. This means
they can be tested using some form of research procedure such as observations or surveys. In
this way, the investigation can be confirmed if the prediction is empirically sound. (Singh,
Fook and Sidhu, 2006). The hypotheses of this study are developed on the basis of the
observation of past literatures according to the richness of measurement. When there are
mixed results from literature, this study consider the majority results to develop the
hypothesis.

Generally, the relationships investigated in the present research and their related hypotheses
can be classified as: (1) between audit software application and audit performance, (2)
between the determinant factors and audit software application, and (3) between the
determinants factors and audit software application with the interaction of moderator
variables. Details of the above are discussed in the following subsections.




                                               35
3.4.1 Audit software application and audit performance
Results of previous studies that have tested the IT use and individual performance relationship
shown mixed results. McGill, Hobbs, & Klobas (2003) and Livari (2005) did not find
significant relationship between IT use and individual performance. Both of them used
frequency as the IT use measure. For the performance measurements, McGill et al., (2003)
measured the subjective effectiveness, productivity, and performance of user-developd
application. Livari (2005) measured the perceived efficiency, productivity nad effectiveness
of a financial accounting system.

3.4.2 Determinant factors of audit software use
Although UTAUT is quite a new theory, dating to 2003, the literature review
revealedhundreds of research studies that use UTAUT as a theoretical background. This is an
indicator ofthe high degree of acceptance of UTAUT by scholars from many disciplines. In
the followingsection, some of these studies are detailed, providing information regarding
variables used in themodel and their level of significance in the respective studies. (cp
odabasi, 2010)



3.4.2.1 Performance Expectancy
This variable is considered to be the most important one in the UTAUT model. The
performance expectancy variable in the UTAUT predicts a positive relationship between
intention to use technology and gains in job performance. Actually,in most user acceptance
studies, performance-related variables such as perceived usefulnessattract the most attention.
In order to determine whether this variable is indeed the mostimportant variable, results from
studies in different disciplines are listed below.Anderson et al. (2006) applied the UTAUT
model to understanding the perceptions ofuniversity faculty toward tablet personal computer
(PC) usage. They surveyed 50 facultymembers by using web-based survey methods. As a
result of their study, Anderson et al. Foundthat performance expectancy was the “strongest
predictor” (Anderson et al. 2006, p.430). According to theirstudy, performance expectancy
positively affected the usage of the tablet PC. In other words, thefaculty who believed that
using a tablet PC increased their work performance tended to use thetablet PC more than the
faculty who thought otherwise.


Performance expectancy produced similar results in Wang and Shih (2009) study
ofinformation kiosk systems. They explored the perceptions of 244Taiwanese users in their

                                              36
use of an E-Government information kiosk. Performance expectancy was operationalised as
the increased gain in accessing government relatedinformation and concluded that their
intention to use the information kiosks was heavilyinfluenced by their level of performance
expectancy. Therefore, increasing theperformance expectancy level of the users guaranteed a
high usage of the E-government kiosks.In addition to the E-Government and academic
environments, performance expectancywas also found to be the most influential factor in
adopting technology in business settings.


Wang, Archer, and Zheng (2006) examined the use of electronic marketplace (EM)
applications and theperceptions of their intended users. They associated performance
expectancy with greatereconomic benefits, such as increased customer contact and
improvement of business processes.They assumed that a system which increases the ability of
a company to contact buyers andsellers would be acceptable to that company. Furthermore, if
the system resulted in animprovement in business processes, it would attract more users.
Employing a case studymethodology with UTAUT as the theoretical background, Wang et.al.
(2006) determined thatperformance expectancy was a major variable in inducing the business
sector to use EM. In otherwords, the results of their study confirmed the significant affect of
performance expectancy onthe intention to use the EM.


In another study, Bandyopadhyay and Fraccastoro (2007) used the UTAUT model in order
tounderstand the perceptions of users towards prepayment metering systems. Theresearchers
hypothesized that consumers would prefer to use the prepayment meter technologyover
traditional payment methods, if they believe it is a useful system for managing theirelectricity
usage. The results of the study confirmed this hypothesis in the finding of asignificant
relationship between performance expectancy and the intention to use the system. Inother
words, people who thought that using the prepayment metering system would be helpful
inelectricity account management intended to use the system more than people who
thoughtotherwise. Furthermore, like many other scholars, Bandyopadhyay and Fraccastoro
(2007) determinedthat performance expectancy was the strongest variable within the
theoretical model.
With regards to the use of audit software, ..........(find study on audit software adoption)
Look at Bierstaker, burnaby and Thibodeu (2001) – explain the audit process                    ; audit
planning, testing ad documenttaion
Hence, the following is hypothesised:

                                                37
H2 : Auditors with high performance expectancy are associated with high usage of audit
software.



3.4.2.2Effort Expectancy
Like performance expectancy, effort expectancy is considered to be an importantdeterminant
of user intentions. In the user acceptance literature, most of the studies found asignificant
relationship between effort expectancy and intention. However, the relationship wasnot as
strong as with performance expectancy.Lin and Anol (2008) studied online social support and
network IT usage among 317Taiwan university students by employing the UTAUT. They
operationalized effort expectancy asthe degree of easiness in using the network IT. An
analysis of the survey revealed a significantrelationship between effort expectancy and user
intentions. Students who found the system easyto use were more likely to use the system than
those who found the system difficult to use.


Wu, Tao, and Yang (2007) also used UTAUT as a theoretical background in theirresearch
study. They studied the perceptions of users of 3G mobile communication systems
andhypothesized that effort expectancy would play a major role in increasing the intention
scores ofthe users. The researchers surveyed 394 users, by using an online questionnaire.
Using structuralequation modeling, Wu et al. found a significant relationship between effort
expectancy and theintention to use 3G mobile technologies. Therefore, they demonstrated
their hypothesis abouteffort expectancy boosting user intentions to be correct.


Im, Hong, and Kang (2007) studied mp3 player and internet banking technologies in
twodifferent settings, namely Korea and the United States. They wanted to compare
theperceptions of users from both countries to see whether there were any differences. Im et
al. (2007) collected data from 501 users including Korean college students and US
undergraduate students.They defined effort expectancy as the easiness of using the mp3
players and internet banking.Notwithstanding the differences in nationality, the results
demonstrated a significant relationshipbetween effort expectancy and user intentions for both
Korean and US students. Users whofound using both the mp3 players and Internet banking
easy had high intention scores.Although a majority of the studies demonstrate a significant
relationship between effortexpectancy and user intentions, there are a limited number of
studies that show otherwise.Anderson, Schwager, and Kerns (2006) studied the perceptions of


                                               38
college faculty in their use of tablet PCs. They hypothesized that the ease of use of the tablet
PCs would positively affect userintentions. In other words, they expected to see higher
intention scores from users who found thetablet PC easy to operate. However, the study did
not produce any significant results in terms ofeffort expectancy, and their hypothesis was
rejected.


Adapting effort expectancy into the use of audit technology. Need to find support for this...
Hence, the following is hypothesised;
H3: Auditors with high effort expectancy are associated with high usage of audit software.

3.4.2.3 Social Influences
Marchewka et al. (2007) examined the Blackboard application which is a type ofeducational
software widely used by the university community. Their sampling frame wasuniversity
students    both   at   the   graduate   and   undergraduate   levels.   After   surveying 132
universitystudents, they concluded that there was a significant relationship between social
influences andintention to use the Blackboard system. According to the results, students are
affected by theirsignificant others‟ opinions in terms of their use of the Blackboard system. If
they believe thatthey are encouraged by those people, they were more likely to use the system.


Armida (2008) used UTAUT as a theoretical framework for her study on VOIP systems.She
hypothesized that social influence scores would positively affect users‟ intention to use
theVOIP systems. In other words, users would decide whether to use the system based on
theopinions of people whom they consider important. Armida surveyed 475 respondents
fromvarious states in order to conduct her study. After statistical analysis, Armida concluded
thatsocial influences were a significant predictor of intention to use the VOIP systems.


Neufeld, Dong, and Higgins investigated the relationship between charismatic leadershipand
the adoption of information technology (2007). Neufeld et al. collected a sample of
207respondents from 7 organizations. and hypothesized that social influence was a
determinant of ITadoption. An analysis of their data resulted in positive scores for social
influences. In other
words, the results supported their hypothesis and found a significant relationship between
socialinfluences and intention to use the new IT system.
Adapting social influence into the use of audit software...Need to find past study to support..


                                                39
Thus, the following is hypothesised;
H4: Social influence will significantly affect the use of audit software among auditors.



3.4.2.4 Facilitating Conditions
Facilitating   conditions     include    the    support     function    of     the    technology
implementations.Depending on the complexity of the systems, facilitating conditions can
affect intention to use asystem. Research findings from different studies display varying
results for facilitatingconditions. While some studies report significant relationships, other
studies found no significantrelationship between facilitating conditions and intention to use a
system.One of the studies that produced significant results was conducted by AlAwadhi and
Morris (2008). The researchers examined E-government services in Kuwait and surveyed
880university students in order to obtain their data. AlAwadhi and Morris (2008)
operationalizedfacilitating conditions by two measures: first, having the knowledge to use the
e-governmentservices and second, getting support when needed. The results of their study
indicate thatfacilitating conditions is a significant determinant in using a new system.


Wills, El-Gayar, and Bennett (2008) also found a significant relationship between
facilitatingconditions and intention to use a new system in their study of electronic medical
records.In this study, Wills et al. (2008) studied professionals working in the field of
healthcare. They definedhealthcare professionals as “registered nurses, physician assistants or
certified nurse practitionersin the state of South Dakota” (p398). They surveyed 52 healthcare
professionals in order toobtain their data. As noted earlier, the results demonstrated a
significant relationship betweenfacilitating conditions and intention to use electronic medical
records.


Al-Gahtani, Hubona, and Wang (2007) used the UTAUT model in order to understandthe
perceptions of Saudi Arabian users in terms of IT acceptance. Al-Gahtani et al. (2007)
surveyed1190 workers from companies that are located in four major cities. They
hypothesized thatfacilitating conditions would positively affect users‟ behaviors in terms of
using computersystems. However, the study did not produce significant results and their
hypothesis wasrejected.
Adapting fracilitating conditions into the use of audit software...Need to find past study to
support..


                                               40
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing
Thesis writing

Mais conteúdo relacionado

Mais procurados

Supplier-PPAP-Manual.pdf
Supplier-PPAP-Manual.pdfSupplier-PPAP-Manual.pdf
Supplier-PPAP-Manual.pdfPhanHngBin
 
Protective Device Coordination
Protective Device CoordinationProtective Device Coordination
Protective Device Coordinationjoeengi
 
Soa In The Real World
Soa In The Real WorldSoa In The Real World
Soa In The Real Worldssiliveri
 
Configuration-Release management
Configuration-Release managementConfiguration-Release management
Configuration-Release managementRavindranath Tagore
 
First Sporting Code V20081029.3
First Sporting Code V20081029.3First Sporting Code V20081029.3
First Sporting Code V20081029.3guestdd6bb4
 
Improving software testing efficiency using automation methods by thuravupala...
Improving software testing efficiency using automation methods by thuravupala...Improving software testing efficiency using automation methods by thuravupala...
Improving software testing efficiency using automation methods by thuravupala...Ravindranath Tagore
 
SchoolAdmin - School Fees Collection & Accounting Software
SchoolAdmin - School Fees Collection & Accounting SoftwareSchoolAdmin - School Fees Collection & Accounting Software
SchoolAdmin - School Fees Collection & Accounting SoftwareRanganath Shivaram
 
Sap mm configuration document ramesh kamishetty
Sap mm  configuration document ramesh kamishettySap mm  configuration document ramesh kamishetty
Sap mm configuration document ramesh kamishettyRamesh Kamishetty
 
Bhuma learning portal_ui
Bhuma learning portal_uiBhuma learning portal_ui
Bhuma learning portal_uiDebjani Roy
 
Guidelines of osh in ci management v3_final for public comment
Guidelines of osh in ci management v3_final for public commentGuidelines of osh in ci management v3_final for public comment
Guidelines of osh in ci management v3_final for public commentDr. Mohammad Anati
 
100 toeic preparation tests
100 toeic preparation tests100 toeic preparation tests
100 toeic preparation testsdkhanhle
 

Mais procurados (15)

Supplier-PPAP-Manual.pdf
Supplier-PPAP-Manual.pdfSupplier-PPAP-Manual.pdf
Supplier-PPAP-Manual.pdf
 
Protective Device Coordination
Protective Device CoordinationProtective Device Coordination
Protective Device Coordination
 
C cheat sheet
C cheat sheetC cheat sheet
C cheat sheet
 
GSUInnovators_v05
GSUInnovators_v05GSUInnovators_v05
GSUInnovators_v05
 
Soa In The Real World
Soa In The Real WorldSoa In The Real World
Soa In The Real World
 
Configuration-Release management
Configuration-Release managementConfiguration-Release management
Configuration-Release management
 
First Sporting Code V20081029.3
First Sporting Code V20081029.3First Sporting Code V20081029.3
First Sporting Code V20081029.3
 
Improving software testing efficiency using automation methods by thuravupala...
Improving software testing efficiency using automation methods by thuravupala...Improving software testing efficiency using automation methods by thuravupala...
Improving software testing efficiency using automation methods by thuravupala...
 
Oscom23 old
Oscom23 oldOscom23 old
Oscom23 old
 
SchoolAdmin - School Fees Collection & Accounting Software
SchoolAdmin - School Fees Collection & Accounting SoftwareSchoolAdmin - School Fees Collection & Accounting Software
SchoolAdmin - School Fees Collection & Accounting Software
 
Atlas User Guide
Atlas User GuideAtlas User Guide
Atlas User Guide
 
Sap mm configuration document ramesh kamishetty
Sap mm  configuration document ramesh kamishettySap mm  configuration document ramesh kamishetty
Sap mm configuration document ramesh kamishetty
 
Bhuma learning portal_ui
Bhuma learning portal_uiBhuma learning portal_ui
Bhuma learning portal_ui
 
Guidelines of osh in ci management v3_final for public comment
Guidelines of osh in ci management v3_final for public commentGuidelines of osh in ci management v3_final for public comment
Guidelines of osh in ci management v3_final for public comment
 
100 toeic preparation tests
100 toeic preparation tests100 toeic preparation tests
100 toeic preparation tests
 

Destaque

_mobile learning lecturers versus students on usage and perception using the ...
_mobile learning lecturers versus students on usage and perception using the ..._mobile learning lecturers versus students on usage and perception using the ...
_mobile learning lecturers versus students on usage and perception using the ...Lenandlar Singh
 
Mobile learning adoption in higher education in guyana
Mobile learning adoption in higher education in guyanaMobile learning adoption in higher education in guyana
Mobile learning adoption in higher education in guyanaLenandlar Singh
 
Biiml mobifest march_2014
Biiml mobifest march_2014Biiml mobifest march_2014
Biiml mobifest march_2014debbieholley1
 
A framework for measuring mobile learning success
A framework for measuring mobile learning successA framework for measuring mobile learning success
A framework for measuring mobile learning successMichelle Lac
 
研究方法報告:Applying the Technology Acceptance Model and Flow Theory to Online Con...
研究方法報告:Applying the Technology Acceptance Model and Flow Theory to Online Con...研究方法報告:Applying the Technology Acceptance Model and Flow Theory to Online Con...
研究方法報告:Applying the Technology Acceptance Model and Flow Theory to Online Con...Hsin-lin Cheng
 
Acceptance models for Free Software and other technologies in education
Acceptance models for Free Software and other technologies in educationAcceptance models for Free Software and other technologies in education
Acceptance models for Free Software and other technologies in educationFrederik Questier
 
EDUCARNIVAL 2016 at IIT DELHI - Presentation by Kunal Kala
EDUCARNIVAL 2016 at IIT DELHI - Presentation by Kunal KalaEDUCARNIVAL 2016 at IIT DELHI - Presentation by Kunal Kala
EDUCARNIVAL 2016 at IIT DELHI - Presentation by Kunal KalaEduexcellence
 
Unified theory of acceptance and use of technology
Unified theory of acceptance and use of technologyUnified theory of acceptance and use of technology
Unified theory of acceptance and use of technologyMuhammad Farhan Javed
 
TCC TAM applied to online education
TCC TAM applied to online educationTCC TAM applied to online education
TCC TAM applied to online educationNational University
 
Learning English reading in a mobile-assisted extensive reading program
Learning English reading in a mobile-assisted extensive reading programLearning English reading in a mobile-assisted extensive reading program
Learning English reading in a mobile-assisted extensive reading program怡娟 黃
 
Challenges In E Learning Adoption - Dec\'06
Challenges In E Learning Adoption - Dec\'06Challenges In E Learning Adoption - Dec\'06
Challenges In E Learning Adoption - Dec\'06Education e-Solutions
 
An online flea market in higher education using c2 c e commerce model a requi...
An online flea market in higher education using c2 c e commerce model a requi...An online flea market in higher education using c2 c e commerce model a requi...
An online flea market in higher education using c2 c e commerce model a requi...Struggler Ever
 
Factors influencing the adoption of e learning in jordan
Factors influencing the adoption of e learning in jordanFactors influencing the adoption of e learning in jordan
Factors influencing the adoption of e learning in jordanAlexander Decker
 
Consumer acceptance of app only model of e commerce
Consumer acceptance of app only model of e commerceConsumer acceptance of app only model of e commerce
Consumer acceptance of app only model of e commerceAkash Gupta
 
Creating e lectrifying e-lectronic student dramas through integrated skills
Creating e lectrifying e-lectronic student dramas through integrated skillsCreating e lectrifying e-lectronic student dramas through integrated skills
Creating e lectrifying e-lectronic student dramas through integrated skillsamydelis
 
Perceived Usability Evaluation of Learning Management Systems: A First Step t...
Perceived Usability Evaluation of Learning Management Systems: A First Step t...Perceived Usability Evaluation of Learning Management Systems: A First Step t...
Perceived Usability Evaluation of Learning Management Systems: A First Step t...Nikolaos Tselios
 

Destaque (20)

_mobile learning lecturers versus students on usage and perception using the ...
_mobile learning lecturers versus students on usage and perception using the ..._mobile learning lecturers versus students on usage and perception using the ...
_mobile learning lecturers versus students on usage and perception using the ...
 
Mobile learning adoption in higher education in guyana
Mobile learning adoption in higher education in guyanaMobile learning adoption in higher education in guyana
Mobile learning adoption in higher education in guyana
 
Comcam 2016-09-09
Comcam 2016-09-09Comcam 2016-09-09
Comcam 2016-09-09
 
Biiml mobifest march_2014
Biiml mobifest march_2014Biiml mobifest march_2014
Biiml mobifest march_2014
 
A framework for measuring mobile learning success
A framework for measuring mobile learning successA framework for measuring mobile learning success
A framework for measuring mobile learning success
 
研究方法報告:Applying the Technology Acceptance Model and Flow Theory to Online Con...
研究方法報告:Applying the Technology Acceptance Model and Flow Theory to Online Con...研究方法報告:Applying the Technology Acceptance Model and Flow Theory to Online Con...
研究方法報告:Applying the Technology Acceptance Model and Flow Theory to Online Con...
 
Acceptance models for Free Software and other technologies in education
Acceptance models for Free Software and other technologies in educationAcceptance models for Free Software and other technologies in education
Acceptance models for Free Software and other technologies in education
 
EDUCARNIVAL 2016 at IIT DELHI - Presentation by Kunal Kala
EDUCARNIVAL 2016 at IIT DELHI - Presentation by Kunal KalaEDUCARNIVAL 2016 at IIT DELHI - Presentation by Kunal Kala
EDUCARNIVAL 2016 at IIT DELHI - Presentation by Kunal Kala
 
Unified theory of acceptance and use of technology
Unified theory of acceptance and use of technologyUnified theory of acceptance and use of technology
Unified theory of acceptance and use of technology
 
TCC TAM applied to online education
TCC TAM applied to online educationTCC TAM applied to online education
TCC TAM applied to online education
 
Learning English reading in a mobile-assisted extensive reading program
Learning English reading in a mobile-assisted extensive reading programLearning English reading in a mobile-assisted extensive reading program
Learning English reading in a mobile-assisted extensive reading program
 
Mobile Learning Adoption from Informal into Formal: An Extended TAM Model to ...
Mobile Learning Adoption from Informal into Formal: An Extended TAM Model to ...Mobile Learning Adoption from Informal into Formal: An Extended TAM Model to ...
Mobile Learning Adoption from Informal into Formal: An Extended TAM Model to ...
 
Challenges In E Learning Adoption - Dec\'06
Challenges In E Learning Adoption - Dec\'06Challenges In E Learning Adoption - Dec\'06
Challenges In E Learning Adoption - Dec\'06
 
Mobile Acceptance among Pre-Service Teachers: A Descriptive Study Using a TAM...
Mobile Acceptance among Pre-Service Teachers: A Descriptive Study Using a TAM...Mobile Acceptance among Pre-Service Teachers: A Descriptive Study Using a TAM...
Mobile Acceptance among Pre-Service Teachers: A Descriptive Study Using a TAM...
 
An online flea market in higher education using c2 c e commerce model a requi...
An online flea market in higher education using c2 c e commerce model a requi...An online flea market in higher education using c2 c e commerce model a requi...
An online flea market in higher education using c2 c e commerce model a requi...
 
Factors influencing the adoption of e learning in jordan
Factors influencing the adoption of e learning in jordanFactors influencing the adoption of e learning in jordan
Factors influencing the adoption of e learning in jordan
 
Presente perfecto
Presente perfectoPresente perfecto
Presente perfecto
 
Consumer acceptance of app only model of e commerce
Consumer acceptance of app only model of e commerceConsumer acceptance of app only model of e commerce
Consumer acceptance of app only model of e commerce
 
Creating e lectrifying e-lectronic student dramas through integrated skills
Creating e lectrifying e-lectronic student dramas through integrated skillsCreating e lectrifying e-lectronic student dramas through integrated skills
Creating e lectrifying e-lectronic student dramas through integrated skills
 
Perceived Usability Evaluation of Learning Management Systems: A First Step t...
Perceived Usability Evaluation of Learning Management Systems: A First Step t...Perceived Usability Evaluation of Learning Management Systems: A First Step t...
Perceived Usability Evaluation of Learning Management Systems: A First Step t...
 

Semelhante a Thesis writing

Managing sap upgrade_projects
Managing sap upgrade_projectsManaging sap upgrade_projects
Managing sap upgrade_projectsKishore Kumar
 
Implementation Guidelines KQMH
Implementation Guidelines KQMHImplementation Guidelines KQMH
Implementation Guidelines KQMHgizhsp2
 
nasa-safer-using-b-method
nasa-safer-using-b-methodnasa-safer-using-b-method
nasa-safer-using-b-methodSylvain Verly
 
BizTalk Practical Course Preview
BizTalk Practical Course PreviewBizTalk Practical Course Preview
BizTalk Practical Course PreviewMoustafaRefaat
 
WebIT2 Consultants Proposal
WebIT2 Consultants ProposalWebIT2 Consultants Proposal
WebIT2 Consultants ProposalSarah Killey
 
Web2.0 And Business Schools Dawn Henderson
Web2.0 And Business Schools   Dawn HendersonWeb2.0 And Business Schools   Dawn Henderson
Web2.0 And Business Schools Dawn HendersonDawn Henderson
 
QP_PRACTICAL_GUIDE_08062018_online (1).pdf
QP_PRACTICAL_GUIDE_08062018_online (1).pdfQP_PRACTICAL_GUIDE_08062018_online (1).pdf
QP_PRACTICAL_GUIDE_08062018_online (1).pdfalbeetar11
 
Project appraisal system at APSFC
Project appraisal system at APSFCProject appraisal system at APSFC
Project appraisal system at APSFCSharath Malkani
 
Endversion1 skriptum characterization of miscellaneous multi parametrical sil...
Endversion1 skriptum characterization of miscellaneous multi parametrical sil...Endversion1 skriptum characterization of miscellaneous multi parametrical sil...
Endversion1 skriptum characterization of miscellaneous multi parametrical sil...EjderCevher
 
Sg247692 Websphere Accounting Chargeback For Tuam Guide
Sg247692 Websphere Accounting Chargeback For Tuam GuideSg247692 Websphere Accounting Chargeback For Tuam Guide
Sg247692 Websphere Accounting Chargeback For Tuam Guidebrzaaap
 
Software Engineering
Software EngineeringSoftware Engineering
Software EngineeringSoftware Guru
 

Semelhante a Thesis writing (20)

Managing sap upgrade_projects
Managing sap upgrade_projectsManaging sap upgrade_projects
Managing sap upgrade_projects
 
Implementation Guidelines KQMH
Implementation Guidelines KQMHImplementation Guidelines KQMH
Implementation Guidelines KQMH
 
Lesson 1...Guide
Lesson 1...GuideLesson 1...Guide
Lesson 1...Guide
 
Bwl red book
Bwl red bookBwl red book
Bwl red book
 
nasa-safer-using-b-method
nasa-safer-using-b-methodnasa-safer-using-b-method
nasa-safer-using-b-method
 
BizTalk Practical Course Preview
BizTalk Practical Course PreviewBizTalk Practical Course Preview
BizTalk Practical Course Preview
 
It project development fundamentals
It project development fundamentalsIt project development fundamentals
It project development fundamentals
 
WebIT2 Consultants Proposal
WebIT2 Consultants ProposalWebIT2 Consultants Proposal
WebIT2 Consultants Proposal
 
Web2.0 And Business Schools Dawn Henderson
Web2.0 And Business Schools   Dawn HendersonWeb2.0 And Business Schools   Dawn Henderson
Web2.0 And Business Schools Dawn Henderson
 
dissertation
dissertationdissertation
dissertation
 
affTA00 - 10 Daftar Isi
affTA00 - 10 Daftar IsiaffTA00 - 10 Daftar Isi
affTA00 - 10 Daftar Isi
 
QP_PRACTICAL_GUIDE_08062018_online (1).pdf
QP_PRACTICAL_GUIDE_08062018_online (1).pdfQP_PRACTICAL_GUIDE_08062018_online (1).pdf
QP_PRACTICAL_GUIDE_08062018_online (1).pdf
 
Project appraisal system at APSFC
Project appraisal system at APSFCProject appraisal system at APSFC
Project appraisal system at APSFC
 
Bioteksa Model For Technology And Innovation Management
Bioteksa Model For Technology And Innovation ManagementBioteksa Model For Technology And Innovation Management
Bioteksa Model For Technology And Innovation Management
 
Endversion1 skriptum characterization of miscellaneous multi parametrical sil...
Endversion1 skriptum characterization of miscellaneous multi parametrical sil...Endversion1 skriptum characterization of miscellaneous multi parametrical sil...
Endversion1 skriptum characterization of miscellaneous multi parametrical sil...
 
Derivatives
DerivativesDerivatives
Derivatives
 
Sg247692 Websphere Accounting Chargeback For Tuam Guide
Sg247692 Websphere Accounting Chargeback For Tuam GuideSg247692 Websphere Accounting Chargeback For Tuam Guide
Sg247692 Websphere Accounting Chargeback For Tuam Guide
 
Software Engineering
Software EngineeringSoftware Engineering
Software Engineering
 
Fraser_William
Fraser_WilliamFraser_William
Fraser_William
 
Graduation Report
Graduation ReportGraduation Report
Graduation Report
 

Thesis writing

  • 1. TABLE OF CONTENT TABLE OF CONTENT .............................................................................................................. i CHAPTER 1 ............................................................................................................................... 6 INTRODUCTION ...................................................................................................................... 6 1.1 Introduction ................................................................................................................. 6 1.2 Background of the study ................................................................................................... 6 1.2.1 The important of quality audit performance......................................................... 7 1.2.2 Impact of information technology on audit judgments performance. .................. 8 1.2.3 Audit technology adoption by auditors ................................................................ 9 1.2 Research Problem ...................................................................................................... 10 1.4 Objective of the Study .................................................................................................... 11 1.5 Rationale of the Study .................................................................................................... 12 1.6 Contribution of the Study ............................................................................................... 13 1.7 Definition of Terms Used ............................................................................................... 13 1.8 Organization of the Thesis .............................................................................................. 14 CHAPTER 2 ............................................................................................................................. 15 LITERATURE REVIEW ......................................................................................................... 15 2.1 Introduction .................................................................................................................... 15 2.2 Technology Adoption ..................................................................................................... 15 2.2.1 Standards and regulation of Technology Adoption in Auditing ............................. 16 2.2.2 Computer-assisted audit tools and techniques and technology adoption ................. 20 2.2.3. Audit technology adoption ...................................................................................... 21 2.2.4 Audit Software Application in Audit Practices........................................................ 22 i
  • 2. 2.3 Individual Performance .................................................................................................. 24 2.3.1 Individual Performance Definition .......................................................................... 24 2.3.2 Relationship between Technology Adoption and Individual Performance ............. 25 2.4 Theoretical background .................................................................................................. 26 2.4.1 The History of Technology Acceptance Model ....................................................... 26 2.4.2 The Unified Theory of Acceptance and Use of Technology (UTAUT) Model....... 27 CHAPTER 3 ............................................................................................................................. 32 RESEARCH FRAMEWORK AND HYPOTHESES DEVELOPMENT ............................... 32 3.1 Introduction .................................................................................................................... 32 3.2 Research framework ....................................................................................................... 32 3.3 Operationalization and measurement of variables .......................................................... 34 3.3.1 Audit software adoption ........................................................................................... 34 3.3.2 Determinant factors of audit software adoption. ..................................................... 35 3.3.3 Individual performance ............................................................................................ 35 3.4 Hypotheses Development ............................................................................................... 35 3.4.1 Audit software application and audit performance .................................................. 36 3.4.2 Determinant factors of audit software use ............................................................... 36 CHAPTER 4 ............................................................................................................................. 44 RESEARCH METHODOLOGY ............................................................................................. 44 4.1 Introduction .................................................................................................................... 44 4.2 Research design .............................................................................................................. 44 4.3 Study One: Determinants of user intention to use Audit Command Language (ACL) and impact to audit performance ................................................................................................. 47 4.3.1 The participants ........................................................................................................ 47 4.3.2 Data collection method ............................................................................................ 47 ii
  • 3. 4.3.3 The questionnaire and variables development ......................................................... 47 4.3.4 Pre-test ..................................................................................................................... 47 4.3.5 Validity and reliability ............................................................................................. 48 4.3.6 Operationalisation of Variables ............................................................................... 49 4.3.7 Control Variables ..................................................................................................... 52 4.3.8 Techniques for Analysing Quantitative Data ........................................................... 52 4.4 Study Two: Determinant factors and impact of audit software application to audit performance. ......................................................................................................................... 54 4.4.1 The participants ........................................................................................................ 54 4.4.2 Data collection method ............................................................................................ 54 4.4.3 The questionnaire and variables development ......................................................... 55 4.4.4 Pre-test ..................................................................................................................... 58 4.4.5 Validity and reliability ............................................................................................. 59 4.4.6 Operationalisation of Variables ............................................................................... 60 4.4.7 Control Variables ..................................................................................................... 62 4.4.8 Analysis of Structural Equation Modelling (SEM) ................................................. 62 4.5 Summary ......................................................................................................................... 70 CHAPTER 5 ............................................................................................................................. 71 RESULTS AND DISCUSSIONS OF FINDINGS .................................................................. 71 STUDY ONE: DETERMINANTS OF USER INTENTION TO USE AUDIT COMMAND LANGUAGE (ACL) AND IMPACT TO AUDIT PERFORMANCE .................................... 71 5.1 Introduction .................................................................................................................... 71 5.2 Preliminary analysis ....................................................................................................... 71 5.2.1 Normality analysis ................................................................................................... 71 5.2.2 Reliability analysis ................................................................................................... 72 5.2.3 Factor analysis ......................................................................................................... 73 iii
  • 4. 5.2.4 Descriptive Statistics of Participants ....................................................................... 73 5.2.5 Correlation analysis ................................................................................................. 74 5.3 Hypotheses Testing......................................................................................................... 75 5.4 Discussion of Findings ................................................................................................... 77 5.5 Summary ......................................................................................................................... 78 CHAPTER 6 ............................................................................................................................. 79 RESULTS AND DISCUSSIONS OF FINDINGS ............................................................... 79 STUDY TWO: DETERMINANT FACTORS AND IMPACT OF AUDIT SOFTWARE APPLICATION TO AUDIT PERFORMANCE .................................................................. 79 6.1 Chapter Overview ........................................................................................................... 79 6.2 Descriptive Statistics of Participants .............................................................................. 79 6.2.1 Response rate .......................................................................................................... 79 6.2.2 Demographic Profile ............................................... Error! Bookmark not defined. 6.2.3 Descriptive Statistics of Constructs ......................... Error! Bookmark not defined. 6.3 Measurement Model ....................................................................................................... 85 6.3.1 Development of Measurement Model...................... Error! Bookmark not defined. 6.3.2 Congeneric Measurement Model ............................................................................. 87 6.4 Structural Model ............................................................................................................. 88 6.4.1 Assessment of the Structural Model ...................................................................... 107 6.5 Hypotheses Testing....................................................................................................... 108 6.6 Discussions of Findings ................................................................................................ 108 6.7 Summary ....................................................................................................................... 108 CHAPTER 7 ........................................................................................................................... 110 CONCLUSIONS, IMPLICATIONS, LIMITATION AND FUTURE RESEARCH ............ 110 iv
  • 5. 7.1 Chapter Overview ......................................................................................................... 110 7.2 Discussions of Findings ................................................................................................ 110 7.3 Implication of the Findings........................................................................................... 110 7.3.1 Theoretical Implications ........................................................................................ 110 7.3.2 Practical Implications............................................................................................. 110 7.4 Limitations of the Study ............................................................................................... 110 7.5 Suggestions for Future Research .................................................................................. 110 7.6 Summary ....................................................................................................................... 110 REFERENCES ....................................................................................................................... 111 v
  • 6. CHAPTER 1 INTRODUCTION 1.1 Introduction This thesis studies the level of audit software use in audit practice and it impact to individual auditor performance. This study also looks into the determinant factors of audit software adoption as tested in UnifiedTheory of Acceptance and Use of Technology (UTAUT) model. The chapter aims at providing an overview of the thesis and its structural scheme. The first section provides background to the research, followed by the research problem, research objectives and questions. The rationale of carrying out this study is also explained in the following section, together with brief explanation of contribution of this study to the theoretical and practical point of view. The chapter concludes with an outline of the organization of the thesis. 1.2 Background of the study The emergence of information technology has had a tremendous impact on many areas of human activities, including engineering, medicine, education as well as accounting and auditing practices. Information technology (IT) or electronic data processing has changed the way many organizations conduct business activities. In fact, IT is considered as one of the major technological advances in businesses this decade. IT system has the ability to perform many tasks, and IT providers continuously strive in finding new ways to enhance the use of computer to promote efficiency and aid in decision making. Since many businesses at present use computers to process their transactions, the auditing profession has to face with the need and requirement to provide the audit services that can deal with the IT environment. While the impact of information technology (IT) in business has grown exponentially, few studies examine the use and perceived importance of IT, particularly outside of the largest audit firms (Fischer 1996; Banker et al. 2002). This issue is important since IT has dramatically changed the audit process. Standards now encourage auditors and audit firms to adopt IT and use IT specialists when necessary (American Institute of Certified Public Accountants [AICPA] 2001, 2002b, 2005, 2006; Public Company Accounting Oversight Board [PCAOB] 2004b). However, auditing researchers and practitioners have little guidance available on what IT has been or should be adopted.cp (Janvrin, Bierstaker, Lowe, 2007) 6
  • 7. Although studies have suggested that the adoption of IT in audit practices would increase auditor‟s productivity (Zhao et al. 2004), the adoption of audit technology by auditors is still low (Liang et al., 2001; Debreceny et al., 2005; Curtis and Payne, 2008). Apart from perception that adoption of IT in audit practices particularly audit software is costly, complicated to learn and use, other possible reasons for lack of usage could be due to unconvincing evidence of the merits in using audit technology to enhance audit performance (Ismail and Zainol Abidin, 2009). Usability is not sufficient and large potential gains in effectiveness and performance will not be realized if users are not willing to use information system in general (Davis F. D., 1993) and audit software in particular, therefore, adoption is crucial. The usage of audit software can be increased provided auditors are convinced of the positive impact of audit software on audit performance.Based on attitude-behaviour theory, Doll & Torkzadeh (1998) describe a „system to value chain‟ of system success construct from beliefs, to attitudes, to behaviour, to the social and economic impacts of information technology. Torkzadeh & Doll(1999) argued that impact is a pivotal concept that embodied downstream effects. It is difficult to imagine how information technology can be assessed without evaluating the impact it may have on the individual‟s work. Thus, in audit practice to assess the audit technology adoption impact is through the assessment of the auditor‟s individual performance impact. 1.2.1 The important of quality audit performance. Many accounting firms all over the world have faced various forms of litigation. At the same time, the threat of litigation has demanded audit firms to maintain and improve the quality of audit work (Manson et al., 2001). There is evidence that the use of audit software could give rise to more quality audit. In fact the use of audit software in the audit process has greatly increased in the last few years. This is true in the case of large audit firms who are motivated by the desire to improve their efficiency to compete for clients. Manson et al., (2001) pointed out that audit automation has been used in most areas of the audit processes, more extensively by the Big Four audit firms than others. Therefore, arguably, accounting firms in Malaysia should also strive for better audit quality to be at par with the global accounting giants. This is especially important given that the service 7
  • 8. sector may prove to be the main pillar of our economy after natural resources run out.For the audit firm to survive in this competitive era, the highest quality of the audit judgment must be maintained. However the audit quality of audit firms has undergone severe criticism this decade due to various financial crisis and management fraud. The fiasco of the Enron Scandal in 2001 has further alarmed regulators and the public in many countries about audit quality including various parties in Malaysia. Obviously, huge efforts by the audit firms need to be taken in order to restore public confidence in the auditors‟ integrity and ability and subsequently uphold the reputation of the profession. One of the ways to increase the public confidence in the auditors is to provide quality audit judgments consistently. Speed and accuracy of audit judgment would certainly help build public confidence in the auditors. Although many audit firms are introducing audit technology in accounting processes, not many are actually using the software available and even those who are using, are not using the higher end software. There are many reasons for the reluctance to incorporate audit technology in audit processes such as negative perception and unconvincing benefit of the use of audit technology. Ismail and Zainol Abidin (2009) investigated the level of information technology knowledge and information technology important in the specific context of audit work among auditors in Malaysia. Their study suggested that that information technology knowledge among the auditors is still at the lower level. 1.2.2 Impact of information technology on audit performance. Within the information technology literature, there are many studies that have examined the impact of information technology on firms‟ performance in different industries such as manufacturing (Barua et al. 1995), banking (Parson et al. 1993), insurance (Francalanci and Galal, 1998), healthcare (Menon et al. 2000), and retailing (Reardon et al. 1996). However, empirical research to examine the impact of information technology on audit performance in the accounting practices is under-research. To this date, only one study has examined the impact of information technology on firms‟ productivity in producing quality audits (Banker, Chang and Kao, 2002). The other studies examined the factors influencing the use of information technology (Janvrin, Bierstaker and Lowe, 2009; Curtis and Payne, 2008 and Merhout, 2007) and perception of use and belief in using the technology (Bhattacherjee 2001, 2004; Venkatesh and Morris 2000; and Davies et al 1989). 8
  • 9. Although there is a general perception that information technology investments by public accounting firms could improve firms‟ productivity in terms of consistent audit quality (Lee and Arentzoff, 1991), the impact of information technology on auditors‟ performance is not directly observable. To date there is still inadequate data available that could allow one to examine in-depth processes involving the use of audit technology by auditors when performing audit procedures (Zhang and Dhaliwal, 2009). Zhang and Dhalilal pointed out that more data is needed to examine the influence of critical factors that may mediate or moderate the performance value gained by the auditors when adopting audit technology. 1.2.3 Audit technology adoption by auditors In audit situations where use of technology is optional, the implementation decision is typically made by joint discussion between the audit manager and in-charge auditor (Houston, 1999) Auditing technology studies have primarily examined how the use of technology affects cognitive processing and the resulting decisions auditors make. Today, the extent to which auditors have adopted information technology, in particular audit software in their audit process remains an empirical question (Arnold and Sutton 1998; Curtis and Payne 2008; Janvrin et al. 2009). Audit software is an essential component of audit technology, refers to computer tools that allow the extraction and analysis of data using computer applications (Braun and Davis 2003). It is a type of computer program that performs a wide range of audit management functions. Although many studies have suggested effective usage of audit software would permits auditors to increase their productivity in achieving quality audit judgments (Zhao et al. 2004), the incorporation of audit technology by auditors is still low (Liang et al., 2001; Debreceny et al., 2005; Shaikh, 2005; Curtis and Payne, 2008). Apart from the perception that the audit software is costly, complicated to learn and use, other possible reasons for lack of usage could be due to unconvincing evidence of the merits of using audit technology to enhance audit performance (Ismail and Zainol Abidin, 2009). However, the usage of audit software can be increased if they are convinced of the positive impact of audit software on audit judgment performance. This study seeks to identify the relationship between the adoptions of the audit software with the individual audit performance. In other word, this study tries to justify that the individual audit performance is increased with the increase in the level of audit software use among the auditor. This study also aims at examining what influences the auditors to adopt audit 9
  • 10. technology in their practices. The finding of this study hopefully will be able to clarify many facts about the factors that the auditors normally consider for them to be comfortable enough with the audit technology. 1.2 Research Problem The relationship between investment in information technology (IT) and its effect on organizational performance continues to interest academics and practitioners. Most researches on audit technology success or its impact on business function such as auditing have focused on a firm‟s level. There is still very limited empirical evidence that investigate audit technology success from individual level dimension such as user adoption of audit technology and its impact to audit performance. Such investigation is required as uncertainty, resistance and dissatisfaction could occur among auditors due to new working style or culture in audit technology environment. Uncertainty, resistance and dissatisfaction would eventually, lead to the failure of the audit technology implementation in the audit practices, and ultimately affect audit performance.Measuring the audit technology adoption in term of level of use by auditorgives the management more accurate feedback about user‟s acceptance towards audit technology. "Whether Information Technology (IT) use leads to better individual performance has always been an intriguing topic in IS field. However, not many studies examined the Information Technology use/individual performance relationship given the significance of the topic. Researchers and practitioners simply assumed that more IT use lead to better individual performance. A review of the literature presented a different, rather conflicting, picture than the conventional wisdom. The current study thus aims at investigating IT use/individual performance relationship by focusing on the measurement issue i.e. how different richness level measurement of IT use and individual performance affects the use/individual performance relationship. Cp Shen 2009 Venkatest et al., (2003) stated that one of the most important directions for future research is to tie this mature stream of research into other established streams of works. They further stated that little to no research has addressed the link between user acceptance and individual or organizational usage outcome. Thus, while it is often assumed that usage will result in positive outcomes, this remain to be tested..see venkatesh page 470. Straub (2009) pointed out that the TAM and 10
  • 11. The extensive use of IT in audit process especially among big audit firms has been motivated by the desire to improve efficiency to compete for clients (Manson et al., 2001). Audit firms justified their large investments in audit automation by the need to improve the quality of audit work and reduce audit costs. In other words, audit automation can be viewed as simply another technology that audit firms employ to maintain their competitiveness and profitability. Most of the studies on the technology adoption have revealed that much of what is term audit automation consist merely of word-processing and spreadsheet applications. There is little evidence on the manner in which external auditors employ audit software in the pursuits of their audit objectives. Although there were studies carry out on the use of Computer assisted Audit Tools and Techniques (CAATTs) and Generalised Audit Software (GAS), two main terms often associated with audit software, the focus was not on the use of audit software by the external auditors. For example, Wehner and Jessup (2005), Debreceny, Lee, Neo and Toh (2005) and Braun and Davis (2003) look into the adoption of GAS among internal auditors. Therefore this study is carry out to fill the gap that exist in the literature. 1.4 Objective of the Study The main objective of this study is to empirically test the impact of application audit software in practice to the audit performance. Audit software application is measured based on the auditor‟s normal practice; planning, testing and report writing. Audit performance is measured based on respondent‟s perception of the audit software impact to the quality, speed, productivity and effectiveness of the work. This study also attempted to empirically test the factors contributing to the application of audit software in practice among auditors in Malaysia. Factors that drive audit software application are classified under three characteristics; individual, organizational and external factors. More specifically, the research objectives of the present study are: 1. To examine the nature of relationship between application of audit software and individual audit performance. 2. To investigate the extent to which individual factors (performance expectancy, effort expectancy), organizational factors (organizational supports, facilitating condition, technological and infrastructure support) and external factors (social influence and 11
  • 12. client‟s technology) contributes to the application of audit software in practice among the auditors. 3. To determine whether training moderates the individual factors (performance expectancy and effort expectancy) and audit performance relationship. 4. To determine whether experience moderates the individual factors (performance expectancy and effort expectancy) and audit performance relationship. 5. To investigate whether performance expectancy, effort expectancy, social influence and facilitating conditions have influenced on the behavioral intention to adopt audit software. 6. To determine whether specific knowledge and experience moderate the performance expectance and effort expectancy relationship with the behavioral intention to adopt audit software. The research objective 1 to 4 answered by the Study Two, while the research objective 5 and 6 answered by the Study One. 1.5 Rationale of the Study Based on the development in audit practice and research, this study aims to promote audit quality through the adoption of audit technology specifically audit software in audit practices. The relationship between investment in information technology (IT) and its effect on organizational performance continues to interest academics and practitioners. In many cases, due to the nature of the research design employed, this stream of research has been unable to identify the impact of individual technologies on organizational performance (Devaraj and Kohli, 2003). As individual performance plays a great role in organizational performance, this study aim to investigate the impact of the use of audit software in audit practices among auditors to the individual audit performance. Many audit tasks, including workpaper documentation and review, increasinglyare performed in electronic environments (e.g.. Croft 1992; Flagg, Glover, andSmith 1992; Knaster 1998; Rothman 1997; Vezina 1997a, 1997b). Althoughmany believe that automation eliminates human calculation errors, saves time andmoney, minimizes paper documentation, and increases accuracy (Rothman 1997),there is little empirical data to support these claims. Indeed, it has been observed,"although the use of IT to strengthen the audit function is widespread, its impacton perfonnance has never been determined" (Vezina 1997a; p. 37). Most disturbingis that performance may decline in electronic environments (Galletta, Hartzel, 12
  • 13. Johnson, Joseph, and Rustagi 1997). Cp Bible, Graham and Rosman (2005) While there is a developing literature demonstrating audit technology and its possible benefits of use by the auditors (e.g., Liang et al. 2001; Shaikh 2005), there is little research investigating the extent of usage among auditors in practice and the factors that associated with its use (Curtis, Jenkin, Bedard and Deis 2009). There is also limited study to present empirical tests of its efficiency and effectivenes or in general its impact to audit performance. Among the little was study by Janvrin et al. (2008) whose explored audit IT use and its perceived importance across several audit application and across diverse group of audit firms. Their study reported that some applications are used extensively and some are not. It also reported that auditors are varies in opinion about the importance of several audit application, although not used extensively. However their study did not aim at the impact of audit application use to the individual audit performance. Thus, to fill the gap, this study is carry out to examine the auditors perception of the impact of audit technology used to their individual audit performance. Previous studies has shown that the use of audit technology among auditors in general is somewhat low (Quoted?). There are many reasons contribute to this scenario. Perhaps individual auditors are uncomfortable with certain computer-related procedures because of their own IT knowledge and experience limitations. It may also be caused by insufficient IT training and support from the firm that 1.6 Contribution of the Study This research distinctly contributed to the fields of accounting and information system by exploring the adoption of audit technology and its impact to the individual performance. The evolution of information system and the popularity of the technology acceptance theories, particularly TAM and UTAUT, have made the research in this area became targeted by many information systems as well as accounting researchers. Most researches involving audit technology focused on the factors that contribute to the adoption of technology. 1.7 Definition of Terms Used There are various terms used in this study. For the ease of the reader‟s understanding, the following sub-sections give definition on some terms which are of interest in this study. The define terms are auditors, audit software, audit software application, audit performance, 13
  • 14. 1.7.1 Auditors For the purpose of this study, auditors refer to “external” auditors or also known as the “financial statement” auditors. External auditors are the individuals who work for an audit firm that is completely independent of the company they are auditing (Leong, Coram,Cosserat & Gill, 2001) 1.7.2 Audit software 1.8 Organization of the Thesis The thesis is structured as follows: Chapter Two reviews relevant literature related to the technology adoption in audit practices. Specifically it presents a comprehensive critical review of the evolution of audit technology, the development of auditing standard pertaining to the adoption of audit technology in audit practices, the impact of audit technology adoption on the individual performance. The chapter then investigate existing literature on technology adoption theories particularly the history of Technology Acceptance Model (TAM) and Unified Theory of Acceptance and Use of Technology (UTAUT) model. Chapter Three presents the research framework and hypotheses development. This chapter discusses the components of the research variables, the operationalization as well as the measurements of the variables, and lastly the proposed hypotheses. Chapter Four highlights the research methodology adopted in this study. The chapter starts by discussing the rationale for adopting quantitative survey as the method of the present study. The chapter proceeds with the discussion of the research design for Study One followed by discussion of Study Two. Basically, the discussion is concentrated on the participants, data collection method, the questionnaire and variables development, pre-testing and operationalization of variables in questionnaire. Validity and reliability measurement also discuss as part of instrument development procedures. The chapter finally discusses the techniques adopted for data analysis. Analysis of Variance (ANOVA) technique using SPSS is used for data analysis in Study One and Structural Equation Modelling (SEM) using AMOS is used for data analysis in Study Two. Chapter Five details down the data analysis and report of Study One. It consists of three main sections, which are the preliminary analysis, hypotheses testing and discussion of findings. The preliminary analysis reports results related to the descriptive statistics of the sample, normality and reliability analysis as well as factor analysis. The correlation analysis of the 14
  • 15. independent and dependent variables is also reported in this section. The results of the hypotheses testing using multiple regressions analysis is reported next. Chapter Six details down the data analysis and report of results of Study Two. It consist of five main sections; descriptive statistics, measurement model, structural model, hypotheses testing and discussion of findings. CHAPTER 2 LITERATURE REVIEW 2.1 Introduction This section discusses literature pertaining to the scope of present research. Section 2.2 discusses about the technology adoption and auditing, specifically, the definition, histories and evolution of auditing software, modules and auditing application. Next, section 2.3 discusses the individual performance as a consequence of audit technology adoption. Section 2.4 presents a review of the determinant factors of audit technology adoption as per UTAUT model. This section also discusses the ….. and experience that play a role as moderator variables. 2.2 Technology Adoption The technology adoption domain is a well researched area in the information system. Research in this area has explored topics such as the adoption of mobile banking (Zhou et al., 2010), internet banking (Foon and Fah 2011; AbuShanad and Pearson 2007; Tan and Teo 2000), the use of websites (Schaik 2009), electronic commerce (Grandon and Mykytyn 2004), software application (Davis et al. 1989; Mathieson 1991), e-mail usage (Szajna 1996), telemedicine applications (Chau and Hu 2001) and computer usage (Compeau and Higgins 1995). In term of definition, technology adoption is defines as the decision to accept, or invest in, a technology (Dasgupta, Granger and McGarry 2002).………. Technology adoption has been studied at two levels; the first is at the organizational level and the other is at the individual level. Oliveira and Martins (2011) reviewed theories for adoption models at the firm level used in information systems (IS) literature and discussed two prominent models; diffusion on innovation (DOI); and the technology, organization and 15
  • 16. environment (TOE) framework. This study was motivated by the fact that there are not many reviews of literature about the comparison of IT adoption models especially at the firm level. Since most studies on IT adoption at the firm level are derived from these two theories (Chong et at. 2009), such reviewed of the literature on these models aims to fill the gap. At the individual level, the emphasis of the analysis is on the acceptance of the technology. The Technology Acceptance Model (TAM) proposed by Davis (1989) has explained acceptance of information technology. TAM states that and individual‟s adoption of information technology is dependent on their perceived ease of use and perceived usefulness of the technology. This model has been used and tested, and at a times modified, to study the adoption of a number of different technologies in the past decade ( 2.2.1 Standards and regulation of Technology Adoption in Auditing Many business at present use computers to process their transactions, the auditing profession has been faced with a need to provide increased guidance for audits conducted in an IT environment. Various authoritative bodies, such as the American Institute of Certified Public Accountants (AICPA) and the International Federation of Accountants and the Information Systems Audit and Control Association (ISACA), have issued standards in this area to be observed by their members in performing an IT audit (Yang and Guan, 2004). The following sub sections explain the development of the standards relevant to technology adoption in auditing. 2.2.1.1American Institute of Certified Public Accountants (AICPA) Standards. Auditing Standards Board (ASB) is the senior technical body of American Institute of Certified Public Accountants (AICPA) designated to issue pronouncements on auditing matters. The ASB was formed in October 1978 and is responsible for the development and promulgation of auditing standards and procedures known as Statement on Auditing Standards (SAS) to be observed by members of the AICPA. The AICPA code of professional conduct requires an AICPA member who performs an audit (the auditor) to comply with the standards promulgated by the ASB. The auditors are expected to have sufficient knowledge of the SASs to identify those that are applicable to them and should be prepared to justify departures from the SASs. 16
  • 17. Over the years AICPA has issued numbers of SAS that are related directly to IT and audit even before ASB was formed.SAS No. 3, “The effects of on the auditor‟s study and evaluation of internal control” (AICPA, 1974) was issued in conjunction with the need for a framework concerning auditing procedures in examining the financial statements of entities that use IT in accounting applications. This was the first bold step in defining the auditing standard for IT system (Jancura and Lilly, 1977 as quoted in Yang and Guan, 2004). The statement provided guidance for audit conducted in IT environments and required auditor to evaluate computer during their audit. According to SAS No. 3, the objectives of accounting control are the same in both a manual system and an IT system. However, the organization and procedures required to accomplish these objectives may be influenced by the method of data processing used. Therefore, the procedures used by an auditor in the evaluation of accounting control to determine the nature, timing and extent of audit procedures to be applied in the examination of financial statements may be affected. SAS No. 3 has been superseded by SAS No. 48, “The effects of computer processing on the examination of financial statements”. It was effective for the examination of financial statements for periods beginning after 31 August 1984. It also amended SAS No. 22 on “Planning and supervision” (AICPA, 1978a), SAS No. 23 on “Analytical review procedures” (AICPA, 1978b), and SAS No. 31 on “Evidential matter” (AICPA, 1980) to include additional guidance for audits of financial statements in IT environments. The ASB was in the opinion that auditors should consider the method of data processing used by the client, including the use of computers, in essentially the same way and at the same time that they consider other significant factors that could affect the audit. The use of IT could affect the nature, timing and extent of audit procedures, so the auditor should consider these effects throughout the audit. Therefore, the ASB felt that the guidance concerning the effect of computer processing on audit of financial statements should be integrated with existing guidance rather than presented separately. This is the primary reason why SAS No. 48 amended so many other existing statements. Before amendment, SAS No. 22 on “Planning and supervision” requires the work in an audit engagement to be adequately planned, and assistance, if any, to be properly supervised. SAS No. 22 also provides guidance for the auditor making an examination in accordance with GAAS. The engagement must be adequately planned and supervised for the auditor to achieve 17
  • 18. the objectives of the examination, which is to gather the appropriate amount of sufficient competent evidential matter to form the basis for an audit opinion on the financial statement. SAS No. 48 came to place to amend SAS No. 22 by adding further planning considerations to those already required. It requires the auditor to consider the methods (manual or computerized) used by the client in processing significant accounting information. SAS No. 23 which covers analytical review procedures superseded by SAS No. 56, “Analytical procedures” (AICPA, 1988b), issued in April 1988. SAS No. 56 provides guidance on the use of analytical procedures and requires the use of analytical procedures in planning and overall review of all audits. When the client has an IT system, the auditor must consider a particular factor in determining the usefulness of such procedures. This factor relates to the increased availability of data prepared for management‟s use when computer processing is used. SAS No. 31 on “Evidential matters” states that once the auditor completes the study and evaluation of internal control, substantive testing must be performed to obtain sufficient, competent evidential matter on which the auditor can based his/her opinion. SAS No. 48 amended SAS No. 31 and states that audit evidence is not affected by computer processing, but the methods used to gather audit evidence may be affected. In an IT environment, the auditor may have to use computer-assisted audit techniques (CAAT) such as computer-aided tracing and mapping, audit software, and embedded audit data collection to gather evidence. The auditor will have to rely more heavily on CAAT methods for inspection and analytical review procedures. Later on, the AICPA issued a professional pronouncement on the implications of electronic evidence, SAS No. 80, Amendment to Statement on Auditing Standard No. 31, Evidential Matter. This amendment suggests that a system that predominantly consists of electronic evidence, it might not be practical or possible to reduce detection risk to an acceptable level by performing only substantive tests for one or more financial statement assertions. (Helms and Fred, 2000). SAS No. 80 further notes that the auditor may find it difficult or impossible to access certain information for inspection, inquiry, or confirmation without using IT. Hence the auditor might use generalised audit software (GAS) or other computer-assisted audit techniques to test system controls or access information. SAS No. 94 “The effect of IT on the auditor‟s consideration of internal control in a financial statement audit” (AICPA 2001) was released and came to effect for the audits of financial 18
  • 19. statement beginning on or after 1 June 2001. SAS No. 94 provides guidance to auditors about the effect of IT on internal control, and on the auditors‟ understanding of internal control and assessment of control risk. This indicates that, in computer intensive environments, auditors should assign one or more computer assurance specialist (CAS) to the engagement in order to appropriately determine the effect of IT on the audit, gain an understanding of controls, and design and perform test of IT controls. SAS No. 94 also requires that an auditor planning to perform only substantive tests on an engagement must be satisfied that such an approach will be effective (Curtis, Jenkin, Bedard, & Deis, 2009) The AICPA, in addition to issuing several standards for IT-related auditing, also publishes Top 10 Technologies list annually to build member awareness about important and emerging technologies that will contribute to the profession. Auditor knowledge levels are clearly specified in the International Standard on Auditing (ISA) 401, paragraph 4, (IFAC, 1999) which states that the auditors should have sufficient knowledge of the computer information system (CIS) to plan, direct, supervise and review the work performed. (Ismail and Abidin, 2009) 2.2.1.2International Federation of Accountants (IFAC) 2.2.1.3 Information Systems Audit and Control Association (ISACA) ASACA was formed in 1969 to meet the unique, diverse and high technology needs of the burgeoning information technology field. In an industry in which progress is measured in nano-seconds, ISACA has moved with agility and speed to bridge the needs of the international business community and the information technology controls profession. 2.2.1.4 Public Company Accounting Oversight Board (PCAOB) Public Company Accounting Oversight Board (PCAOB) ...see curtis, bedard for training. The Public Oversight Board (2000) pointed out that auditors‟ professional capabilities in an accounting information system (AIS) and the evaluation ability of a computer assurance specialist (CAS) are the main factors of auditing quality (Lin and Wang, 2011). Brazel and Agoglias (2004) has examined the impact of auditors‟ professional capability on CAS and AIS auditing system. The finding suggested that auditor with high AIS professionalism would formulate higher standards in risk assessment of computerized auditing environments, while the auditors of high CAS capability would be able to provide more accurate auditing reports. 19
  • 20. 2.2.2 Computer-assisted audit tools and techniques and technology adoption CAATTs are computer tools and techniques that an auditor uses as part of their audit procedures to process data of audit significance contained in an entity‟s information systems (Singleton, 2003). Lin and Wang (2011) further referred CAATTs to software that helps auditors to conduct control and confirmation tests, analysis and verification of financial statement data, and continuous monitoring and auditing. It can be widely applied in analysis of financial data and error inspections to identify frauds or false statements. Braun and Davis (2003) defined CAATTs more broadly to include any use of technology to assist in the completion of an audit. This definition would include automated working papers and traditional word processing applications. More importantly CAATTs are defined as computer- assisted tools that permit auditors to increase their productivity, as well as that of the audit function (Zhao, Yen and Cheng, 2004). The advantage of the CAATTs systems is the automated auditing procedures for overall auditing, rather than sample auditing. Thus, it can enable auditors to enhance the validity of the data and results and also enable them to expand the scope of audit to a more high risk area (Lin and Wang, 2011). The failure of CAATTs to meet the expectation of the users could be due to several factors. First, GAS or CAATTs lack of common interface with IT systems, such as file formats, operating systems, and application programs (Shaikh, 2005). He started with interactive data extraction and analysis, IDEA, one of the most popular GAS package that is able to extract several file formats, such as ASCII, DBASE III, and other with common interface. He found that the problem is that auditors will have to design one specialized audit software for each Electronic Data Processing (EDP) system if the EDP system uses proprietary file formats or different operating systems (Liang et al., 2001). Second, other concurrent CAATTs often requires special audit software modules be embedded at the EDP system design stage (Pathak, 2003). Therefore, the early involvement of auditors at the time when the system is under development become necessary (Liang et al., 2001; Tongren,1999). Furthermore, any changes in auditing policy may also require major modification not only to individual audit software modules, but also entire EDP systems (Wells, 2001; Liang et al., 2001). Thus, in summary, applying these advanced CAATTs is usually very costly even if it is possible. 20
  • 21. Third, as the auditees‟ EDP systems become more complex, it is essential for auditors to audit through computers. The paper stream into and out of computers disappears and is replaced by electronic data streams, which can only be analyzed in automated fashion. Most CAATTs currently in use cannot directly access an auditee‟s live data. Auditors usually gather the historical data file from the auditee‟s personnel. This situation creates the possibility to be given manipulated or even fraudulent data. From other perspective, CAATTs can be potrayed as the tools and techniques used to examine directly the internal logic of an application as well as the tools and techniques used to draw indirectly inferences upon an application‟s logic by examining the data processed by the application (Hall, 2000). Of the five CAATTs that have been advanced in popular audit literature, three – test data, integrated test facility, and parallel simulation – directly examine the internal logic of the application. While the remaining are embedded audit module and generalized audit software, examine the application‟s logic indirectly. 2.2.3.Audit technology adoption Different authors have used different term to refer to the audit technology adoption in auditing practices. Dowling and Leech (2007) and Dowling (2009) haveused the term audit support system and decision aids to reflect the adoption of audit technology in auditing. Audit support systems are the key terminology application deployed by audit firms to facilitate efficient and effective audits (Dowling and Leech, 2007). They refers audit support systems to include electronic workpapers, extensive help files, accounting and auditing stsndards, relevant legislation, and decision aids. Dowling (2009) revealed that audit support systems are the primary technology application audit firms deploy to control, facilitate, and support audit work. His study investigates how several auditor, audit team, and audit firm factors influence whether auditors use audit support systems the way audit firms intend them to be used. Manson et al. (2001) used the term audit automation to reflect the IT use in the audit process. They claimed that the increased use of IT is part of strategies being adopted by the big audit firms to cope with a more competitive environment. Earlier, a survey by Manson et al. (1997) found that audit automation was used in most aspects of the audit process, more extensively by the Big Five audit firms than others, although much of what is termed audit automation consists merely of word-processing and spreadsheet applications. 21
  • 22. Generalised Audit Software (GAS) is the most common computer-assisted audit tool and techniques (CAATTs) used in recent years (Braun and Davis, 2003; Singleton, 2006). GAS is software package which is used by auditors to analyse and audit either live or extracted data from a wide range of applications (Debreceny et al., 2005).Gas allows auditors to undertake data extraction, querying, manipulation, summarization, and analytical task (Debreceny et al., 2005). Two most of the popular GAS are Audit Command Language (ACL), Interactive Data Extraction and Analysis (IDEA) (Braun and Davis, 2003) and Panaudit Plus (Debreceney et al., 2005). These packages contain general modules to read existing computer files and perform sophisticated manipulations of data contained in the files to accomplish audit task. GAS also has other products like CA‟s Easytrieve, Statistical Analysis System (SAS), and Statistical Package for Social Sciences (SPSS) (Singleton, 2006) GAS is rapidly increased in use by internal auditors in their profession and audit staffs who are involve requires background in data analytic technologies to perform their audit tasks(Bagranoff and Vendrzyk, 2000). Debreceney et al., (2005) also found that GAS are frequently being used in special investigation audits of two large local bank in Singapore. The key reasons for the widespread use of GAS include its relative simplicity of use requiring little specialized information systems knowledge and its adaptability to a variety of environments and users (Braun and Davis, 2003). While studies show that GAS is widely used by internal auditors, recent surveys show, however that CPAs do not frequently and systematically use these CAATTs in practice (Kalaba, 2002). Other surveys (1998-2001) indicate that both ex-post and concurrent CAATTs are used primarily in internal audit settings by proprietary implementation. There are several research concentrate on the adoption of GAS (Wehner and Jessup 2005; Debreceney et al. 2005; Braun and Davis 2003), but only few papers analyzed about its usage by external auditor. 2.2.4 Audit Software Application in Audit Practices 2.2.4.1 Client acceptance and audit planning Technology is already having a major impact on audit planning. For example, computers are used to generate clientspecific internal control templates to help identify strengths and weaknesses in a system. To generate a client-specific internal control template, auditors input data into a computer-based questionnaire developed by the audit firm. In response to queries from the software, the computer can then be used to 22
  • 23. analyze a client's business processes, determine controls that are present or missing (based on a comparison with industry benchmarks), assess inherent and control risk, and generate a detailed series of audit tests to be performed. As audit work continues, the results of audit testing can then be entered into the software to determine if the risks identified during planning have been appropriately addressed. This helps to ensure that all significant risks have been addressed during the audit. cp (Bierstaker et al. 2001) Many firms have adopted a risk-based audit approach and developed or purchased software to help the auditor gain an understanding of how external and internal risk affect the audit. These software packages can also be used to help sell risk identification and/or risk management services to existing and potential clients. cp (Bierstaker et al. 2001) In term of sampling....The new risk standards(SAS Nos. 104-111) suggest that auditors use the computerized assisted auditing to select sampletransactions to audit from key electronic files, sort transactions with specific characteristics, test an entirepopulation instead of a sample, and obtain evidence about control effectiveness (AICPA 2006) 2.2.4.2 Audit substantive testing Every audit engagement involves testing management‟s assertions (e.g. existence of assets, liabilities and owner‟s equity, quality of earnings, reliability of internal control, compliance with applicable laws and regulations) by gathering sufficient and competent evidence. 2.2.4.3 Audit completion and report writing A major advantage of electronic working paper s that enhances efficiency is taht information can be shared among auditors at different locations through the use of e- mail or remote access software (Debreceney et al., 2005). As needed, working papers from prior years can easily be integrated into the current year working papers. 23
  • 24. 2.3 Individual Performance In many organizational life and other human affairs, individual performance plays a great role in achieving the goals set. Different performance measurements are given in different situations. For example, students in classroom at school or university, they are normally evaluated based on their participation, assignments or capability to work in a group. In an organizational context, the workers may be evaluated based on their productivity, quality of their output, commitment skills, or integrity (Shen, 2009). Due to the variety of context, individual performance was differently defined, so as the measurements also different. In this section, individual performance definitions, operationalization, measurements and it relationship with information technology that are relevant to current study will be reviewed. 2.3.1 Individual Performance Definition In recent years there has been a large increase in research related to individual performance particularly in psychology, educational and learning, human resource as well as in general management . Researchers have defined individual performance differently but consistent over their respective area of study. In Information system (IS) literature however, researchers seem to assume that performance is rather self-explanatory. This explains why in this research area, clear definition of individual performance is still lacking.In addition, the review of IS literature on the research in the individual performance found that the contexts, the construct measured, or the theories based upon are not consistent. Can put the summary of previous literature on Ind Performance in IS (in table form) Most studies in IS literature developed their definitions of individual performance based on “individual impact” definition from DeLone and McLean (1992). According to DeLone and McLean (1992), IT use leads to three types of outcomes: user satisfaction, individual impact, and organizational impact. Individual impact was defined as “the effect of information on the behavior of the recipient”. Compared to individual performance, the term individual impact was used loosely and it transcends mere individual performance and includes all other outcomes under different contexts, for example, change in decision making productivity, change in user activity, and user‟s perception of the importance of the system (DeLone and McLean, 1992). Cp Chen Shen 24
  • 25. In auditing 2.3.2 Relationship between Technology Adoption and Individual Performance The relationship between IT use and individual performance has not been well addressed in previous studies(Sundarraj & Vuong, 2004). The general believe is that more use of IT will lead to better individual performance. This can be traced back to DeLone & McLean‟s work. In their study, the measurements of information systems success fall into six major categories – system quality, information quality, use, user satisfaction, organizational impact and also individual impact. After that, several studies based their model on this study, and overlooking testing the link between IT use and individual performance (Almutairi & Subramaniam, 2005; Livari, 2005, McGill, Hobbs, & Klobas, 2003). However, prior researches failed to reach consensus on the nature and strength of the relationship between IT use and individual performance. Only conflicting results were presented from previous studies, some found IT use improves individual performance and some found negative relationship. Different researcher study different nature of IT use and examine the impact to individual performance. In fact, the linkage between information technology and individual performance has been an ongoing concern in IS research (Goodhue and Thompson, 1995). Most of the studies in organizational setting show a positive relationship between IT use and individual performance. For example, Goodhue (1988) reported that information systems have a positive impact on performance only when there is correspondence between their functionality and the task requirements of users.Devaraj & Kohli (2003) argued that the driver of IT impact is not the investment in the technology, but the actual usage of technology. Their study on the use of technology in hospital resulted in finding that technology usage was positively and significantly associated with measures of hospital revenue and quality. There were also studies reported the negative relationship between IT use and performance. Bible, Graham, & Rosman, (2005) examined the impact of electronic work environments on auditor performance. Their assessment was on whether audit technology affects decision making in a workpaper review task. The result of an experiment revealed that the electronic environment negatively impact auditors‟ performance. Auditors in the electronic work environment found to be less able to identify seeded errors and to use them properly in evaluating loan covenants as compared to the auditors in the traditional paper environment. 25
  • 26. Many studies tested the association between “system use” and “individual impacts” and the association was found to be significant in each of the studies. (DeLone and McLean, 2003)…to explain one by one..the seven studies 2.4 Theoretical background The previous sections discussed the technology adoption and impact to individual performance. For the technology to be of value it must be accepted and use. An important model for studying technology adoption and usage is the Unified Theory of Acceptance and Use of Technology (UTAUT). The following sub-sections discuss the history of Technology Acceptance Model (TAM) of which most of the basic variables tested in UTAUT model were adopted partly from this model. This is followed by the discussion of the history of UTAUT model, the model tested in this study. This sub-section lead the discussion into the introduction of the variables adopted and tested in the current study. 2.4.1 The History of Technology Acceptance Model Technology Acceptance Models (TAM) have been developed to measure system use, acceptance, and user satisfaction of those systems (Davis, Bagozzi, & Warshaw, 1989). The Davis model specifically focuses on information systems use and is based on the theory of reasoned action (TRA) originally introduced by Ajzen and Fishbein in the early 80‟s (Ajzen & Fishbein, 1980) and further refined by Ajzen as the extended TRA in 1991 (Ajzen, 1991). TRA is a technology acceptance model that can be used to predict behavior in a wide variety of situations, not just the adoption of information systems technology. Ajzen states that an individual‟s beliefs influence his/her attitude towards various situations. The users‟ attitude joins with subjective norms to shape the behavior intentions of each individual. (Cp Moran 2006) This theory was further refined and called the theory of planned behavior (TPB) which is also titled the extended theory of reasoned action. The TPB is a general behavior model which can be used to study broader acceptance situations than the TAM but it has been applied to information systems studies (Mathieson, 1991) & (Taylor & Todd, 2001). (Cp Moran 2006). TPB includes many factors, or constructs, used to determine users‟ acceptance of innovations. The three considerations are behavioral beliefs, normative beliefs, and control beliefs. These are the users core beliefs about the consequences of the action, the expectations of others, and 26
  • 27. beliefs about how the user controls, or does not control, the end result of the behavior. Table 1 further describes the model parameters. 2.4.2 The Unified Theory of Acceptance and Use of Technology (UTAUT) Model. The Unified Theory of Acceptance and Use of Technology (UTAUT) integrated the concepts of previous….This synthesized model created to present more comprehensive pictures of acceptance process than any previous model able to do. This model emerged from the combination of components from eight models previously established in IS literature, all of which had their origins in psychology, sociology and communications. Theses eight models are the Theory of Reasoned Action (TRA); Motivational Model (MM); Theory of Planned Behaviour (TPB); Decomposed Theory of Planned Behaviour (DTPB); Technology Acceptance Model (TAM); the Motivational Model (MM); Combined TAM and TPB (C- TAM-TPB); Model of PC Utilization (MPCU); Innovation Diffusion Theory (IDT) ; and Social Cognitive Theory (SCT). Each model attempts to predict and explain the user behavior using a variety of independent variables. Researchers have analysed and compared the competing technology acceptance theories and models as noted above in order to identify the most promising ones in respect of the ability to predict and explain individual behaviour towards the acceptance and usage of technology. The UTAUT model formulated after eight models have been thoroughly revieved and empirically compared. The UTAUT model explained about 70 percent of the variance in intention to use technology, vastly superior to variance explained by the eight individual model (Rosen, 2005). Although the UTAUT model is relatively new, its suitability, validity and reliability in technology adoption studies in different context and across the country has been proven (AlAwadhi and Morris, 2008; Venkatesh and Zhang, 2010). The UTAUT aims to explain user intentions to use an information system and subsequent usage behavior. The main variables tested in the UTAUT model are: performance expectancy, effort expectancy, social influence, and facilitating factors. Venkatesh et al. (2003) explain performance expectancy as the degree of performance gain after using a new system or a technology. This is an important variable in predicting user behavior. Considering the fact that many people take in-service training courses in order to pursue career enhancement opportunities, it is logical to offer them something new that would contribute to their job 27
  • 28. performance. Therefore, high performance expectancy can encourage possible users to adopt the new technology or the new system. Because of its importance, many theories have adopted this construct in different ways. The second main variable is effort expectancy. This variable measures the degree of effort that a person needs to put forth when using a new technology or a new system. Research has shown that users are more likely to adopt or use new technologies if they require a relatively minimal amount of effort (Agarwal and Prasad, 1997; Konradt et al., 2006). It is likely that resistance can be expected from the users, when employing a new technology, if the new system requires them to work hard in order to learn it. It is a well known fact that many people do not resist an innovation itself, but do resist learning a new thing that requires effort instead of using a well known system. Therefore, this variable is also important in predicting user behavior in terms of accepting or rejecting a new technology. Effort expectancy groups several constructs fromother theories or models. The third variable in the UTAUT is social influences. Social influences are the external and internal factors that effect people when making a decision or displaying a behavior. In other words, the degree that the people value significant other‟s opinions constitutes social influences. Some people may feel pressure to comply with the proposed behavior, which in this case can be the use of a new technology, while others may not. Social influence is used as an independent variable in many models such as the “subjective norm in TRA, TAM2, TPB/DTPB and C-TAMTPB, social factors in MPCU, and image in IDT” (Venkatesh et al., 2003, p.451). Finally, facilitating conditions is the last main variable in UTAUT. Venkatesh et al. (2003) describes facilitating conditions as the state of readiness of the technological environment with regards to its support for the user. Users may need support such as technical help in using the new system or the new technology. If the technological environment offers such support, users will be more likely to be in favor of using it. On the other hand, if the system does not offer such support, it would be more difficult to encourage users to adopt the new system or technology. Like the previous variables, facilitating conditions is included in earlier models and theories, but in different formats. One example of this variable in a different 28
  • 29. format is the perceived behavioral control variable used in TPB. This variable is also used in TAM. This model also incorporates certain variables as moderators of the relationship described above. In particular UTAUT model tested several user variables and posits that gender, age, experience, and voluntariness of use (the demographic characteristics), mediate the impact of the four key constructs on usage intention and behavior (Venkatesh et al., 2003). Gender, which has received some recent attention, is one of the key moderating influence in technology adoption. Park, Yang, and Lehto (2007) examined the adoption of mobile technologies byconsumers in China. In their study, they surveyed 221 Chinese people in order to understandtheir perceptions regarding mobile communication technologies. The results of their analysisrevealed the role that gender plays in terms of affecting user intentions. They further revealed that male users were more influenced by performance expectancy than female users. In other words,male users were more focused on increasing their gains from mobile technologies than femaleusers. This finding is consistent with the study by Wang and Shih (2009). On the other hand, effortexpectancy was higher for females than males. Interestingly, experience did not significantlyaffect user intentions in this study. Wang, Wu, and Wang (2009) investigated the acceptance of mobile learning technologies and focused on gender and age issues to see whether they make a difference in users‟ perceptions. In contrast to previous studies, Wang et al. (2009) did not find age or gender to have asignificant moderating effect on performance expectancy. On the other hand, both gender and age significantly moderated effort expectancy and social influences. Wang et al. (2009) reportedthat effort expectancy was more important for older users than younger ones. While this findingwas not unexpected, as older users tend to look for less complex systems to operate, themoderating affect of gender differences on social influences was really unanticipated.Interestingly, male users‟ social influences scores were higher than that of female users; that is,male users were more affected by the opinions of significant others than female users. Age.... 29
  • 30. Experience... Many studies have explored the affects of moderating variables on user intentions.Koivumaki, Ristola, and Kesti studied user perceptions towards mobile services (2008). Theresearchers tested the University of Oulu‟s SmartRotuuari2 program on 243 people. The resultsindicated that experience played a major role in determining user intentions. Experiencepositively moderated performance expectancy and effort expectancy. On the other hand,facilitating conditions was negatively moderated by experience. Particularly, Koivumaki et al. (2008) noted that skilled users found the system useful and easy to use.Wang and Shih (2009) study on 244 Taiwanese users of E-Government information kiosks alsoproduced significant results in terms of moderating variables. According to the results,effort expectancy was greater for old versus young users. Moreover, gender was significant in determining user intentions. Wang and Shih found that performance expectancy was stronger formen than women. Furthermore, social influences were stronger for women than men. Voluntariness.... Figure 1 : UTAUT Model Performance Expectancy Effort Expectancy Behavioral Use Intention Behavior Social Influence Facilitating Condition Gender Age Experience Voluntariness of use 30
  • 31. 2.4.2 Computer self-efficacy 2.4.2.1 Self-efficacy define The concept of self-efficacy is derived from the work of Bandura and Social Cognitive Theory (1986). Social Cognitive Theory (SCT) suggest that human behavior is reciprocally influenced by environmental as well as cognitive factors, which include outcome expectation and self-efficacy (Downey and McMurtrey, 2007). Self-efficacy is an individual‟s confidence in their ability to successfully accomplish a given task or activity (Bandura, 1997). Self- efficacy belief, therefore, determines how an individual feels, thinks, motivate themselves, and how they behave and produce diverse effect through cognitive, motivational, effective, and selection processes (Reid, 2008). Bandura (1986, 1997) holds that self-efficacy is more than a belief in ability level; it also orchestrates the motivation necessary to conduct the behavior. Self-efficacy helps determine what activities an individual engages in, the effort in pursuing that activity, and the persistence in the face of adversity (Downey and McMurtrey, 2007). General and specific CSE..see Argawal et al (2000) page 419.. Self-efficacy also applies to computing behavior. Several studies (Burkhardt and Brass, 1990; Gist et al., 1989) have examined the relationship between self-efficacy with respect to using computers and a variety of computer behaviors. Compeau and Higgins (1995b) define computer self-efficacy as the judgment of one‟s capability to use an information technology. They refer CSE as self-assessment of individual ability to apply computer skills to complete the specific tasks. They remark on the relative paucity of prior research examining the influence of self-efficacy in the context of computer training. Compeau and Higgins (1991, 1995a, 1995b, 199) are pioneers in studying the impact of CSE on human interaction with computer. This study extends current understanding of the concept of CSE in the context of the usage of the audit software . See Argawal et al (2000) pg 419, para 4..explain about CSE concept in audit software…and it‟s role as moderating factor to training. 31
  • 32. CHAPTER 3 RESEARCH FRAMEWORK AND HYPOTHESES DEVELOPMENT 3.1 Introduction The previous chapter has thoroughly reviewed the literature related to UTAUT and individual performance. This chapter presents a research framework to determine the relationship between research variables. The research variables are: (1) the level of audit software application as technology adoption constructs (2) performance expectancy, effort expectancy, social influence and facilitating conditions, organizational supports and training as the antecedents of the technology adoption construct (3) experience and computer self-efficacy as a moderator variables and (4) individual performance as the criterion variable. Then, operationalization and specific measurements of these variables are discussed in detail. Finally, the chapter discusses the research hypotheses to be tested. 3.2 Research framework The comprehensive review of literature performed in the previous chapter found that most of prior researches on technology adoption have stopped at the behavioral intention to adopt information technology (…..quoted). Review of past studies revealed that only few researches have been done on the actual usage and impact of technology, less little on the adoption of audit software in audit practices. Several models have been proposed to predict the technology adoption such as Technology Acceptance Model (Davis et al. 1989), Theory of Planned Behavior (Ajzen, 1991) and Unified Theory of Acceptance and Use of Technology (Venkatesh et al. 2003). However these models focus on whether a system is used, not how it is used (Dowling, 2009). A number of studies attempted to extend the technology acceptance study further into the use of technology in audit practice. For example, Bierstaker, Burnaby, & Thibodeau, (2001) assessed thecurrent impact of technology on the auditprocess, and the future implicationsof technological trends for the auditingprofession. Based on the reviews done on the several technology adoption model as well as mid-range theories related to the technology adoption, the theoretical foundation of this study is premised on the UTAUT model which was tested by Venkatesh et al. (2003).Venkatesh et al., (2003)also highlighted that the directions for future research need to be directed more to the 32
  • 33. outcome of the technology adoption. Until today, little to no research has addressed the link between user acceptance and individual performance outcome. Thus, the assumption that technology usage will always resulted in positive outcomes are still remains untested. Therefore, this study is believed to be able to fill the gap that exists in the area of audit technology. Figure 2 : Research framework Performance Expectancy Effort Expectancy Audit Individual Social Influence Software Performance Application Facilitating Condition Client Technology Organizational Support Training Experience Computer Self- Efficacy Here need to explain about the adoption of audit software in auditing practices. Need to proof that there is no attempt to investigate the adoption and impact to performance as well as the determinat factors.. 33
  • 34. 3.3 Operationalization and measurement of variables The present study is based on the UTAUT model which was developed and tested by Venkatesh (2003). The focus of the study is to examine the factors that influence the application of audit software amongst the auditors in different audit firms that adopting audit software in practice. This study is also aimed to examine the impact of the audit software application to the individual audit performance. As mentioned earlier (make sure this has been mentioned), UTAUT model is in principle open for inclusion of other predictors if these predictors can explain significant variance in the technology adoption,in an attempt to provide an even richer understanding of technology adoption and usage behavior. Give example other studies that recommended other variables.. As stated previously, the UTAUT model is open for inclusion (make sure this is mentioned previously) of other variables pertinent to behavior usage of audit software. Therefore, besides the main variables tested in UTAUT model, the conceptual framework of the present study also includes computer self-efficacy (Compeau and Higgins,1995; Burkhardt and Brass, 1990; Gist et al., 1989 ), training factorsas one of the elements influence the usage behavior, elements, the present study also includes additional variables that can explain more . The main variables introduced in UTAUT model are performance expectancy, effort expectancy, social influence and facilitating condition. The study introduced two new variables to the existing UTAUT model; client technology and computer self-efficacy. This study tested the moderating effect of experience to the relationship of performance and effort expectancy to the audit software application as tested in UTAUT model. To consider the contribution of this study, new moderating variable was also tested to see the interaction effect of training to the relationship of performance and effort expectancy to the audit software application as tested in UTAUT model. 3.3.1 Audit software application This study used the term audit software application to describe software used to assist auditors in completing one or more tasks. Reviewed of prior literature and discussion held with practitioners and academician resulted in the identification of 15 audit software applications. The applications of audit software included those examined in previous research for example, analytical procedures (Knechel, 1988),identifying samples (Kachelmeier & Messier, 1990). They also included recent audit software applications in audit tasks, for example fraud review (Bell & Carcello, 2000), testing online transactions (Wright, 2002). This study grouped the audit applications 34
  • 35. 3.3.2 Determinant factors of audit software adoption. 3.3.3 Individual performance The choice of performance measures is one of the most critical challenging facing organizations. Performance measurement systems play a key role in developing strategic plans, evaluating the achievement of organizational objectives, and compensating managers (Ittner and Larcker, 1998). The individual performance is the ultimate dependent variable or the criterion variable in this present research. Generally, individual performance is intended to identify the extent to which users believe that adopting technology in performing the task gives impact to their job performance. Individual performance also has been examined in its specific aspects such as use of new technology enrich the work …………………In this present research, individual performance is defined as the extent to which auditors believe that using audit software in performing their audit task can increase the performance of audit works. Individual performance has been measured in audit technology context by several researchers. For example …… 3.4 Hypotheses Development According to Vierra, Pollack and Golez (1998) researchers normally restate research questions as hypotheses because hypotheses can be subjected to empirical testing. This means they can be tested using some form of research procedure such as observations or surveys. In this way, the investigation can be confirmed if the prediction is empirically sound. (Singh, Fook and Sidhu, 2006). The hypotheses of this study are developed on the basis of the observation of past literatures according to the richness of measurement. When there are mixed results from literature, this study consider the majority results to develop the hypothesis. Generally, the relationships investigated in the present research and their related hypotheses can be classified as: (1) between audit software application and audit performance, (2) between the determinant factors and audit software application, and (3) between the determinants factors and audit software application with the interaction of moderator variables. Details of the above are discussed in the following subsections. 35
  • 36. 3.4.1 Audit software application and audit performance Results of previous studies that have tested the IT use and individual performance relationship shown mixed results. McGill, Hobbs, & Klobas (2003) and Livari (2005) did not find significant relationship between IT use and individual performance. Both of them used frequency as the IT use measure. For the performance measurements, McGill et al., (2003) measured the subjective effectiveness, productivity, and performance of user-developd application. Livari (2005) measured the perceived efficiency, productivity nad effectiveness of a financial accounting system. 3.4.2 Determinant factors of audit software use Although UTAUT is quite a new theory, dating to 2003, the literature review revealedhundreds of research studies that use UTAUT as a theoretical background. This is an indicator ofthe high degree of acceptance of UTAUT by scholars from many disciplines. In the followingsection, some of these studies are detailed, providing information regarding variables used in themodel and their level of significance in the respective studies. (cp odabasi, 2010) 3.4.2.1 Performance Expectancy This variable is considered to be the most important one in the UTAUT model. The performance expectancy variable in the UTAUT predicts a positive relationship between intention to use technology and gains in job performance. Actually,in most user acceptance studies, performance-related variables such as perceived usefulnessattract the most attention. In order to determine whether this variable is indeed the mostimportant variable, results from studies in different disciplines are listed below.Anderson et al. (2006) applied the UTAUT model to understanding the perceptions ofuniversity faculty toward tablet personal computer (PC) usage. They surveyed 50 facultymembers by using web-based survey methods. As a result of their study, Anderson et al. Foundthat performance expectancy was the “strongest predictor” (Anderson et al. 2006, p.430). According to theirstudy, performance expectancy positively affected the usage of the tablet PC. In other words, thefaculty who believed that using a tablet PC increased their work performance tended to use thetablet PC more than the faculty who thought otherwise. Performance expectancy produced similar results in Wang and Shih (2009) study ofinformation kiosk systems. They explored the perceptions of 244Taiwanese users in their 36
  • 37. use of an E-Government information kiosk. Performance expectancy was operationalised as the increased gain in accessing government relatedinformation and concluded that their intention to use the information kiosks was heavilyinfluenced by their level of performance expectancy. Therefore, increasing theperformance expectancy level of the users guaranteed a high usage of the E-government kiosks.In addition to the E-Government and academic environments, performance expectancywas also found to be the most influential factor in adopting technology in business settings. Wang, Archer, and Zheng (2006) examined the use of electronic marketplace (EM) applications and theperceptions of their intended users. They associated performance expectancy with greatereconomic benefits, such as increased customer contact and improvement of business processes.They assumed that a system which increases the ability of a company to contact buyers andsellers would be acceptable to that company. Furthermore, if the system resulted in animprovement in business processes, it would attract more users. Employing a case studymethodology with UTAUT as the theoretical background, Wang et.al. (2006) determined thatperformance expectancy was a major variable in inducing the business sector to use EM. In otherwords, the results of their study confirmed the significant affect of performance expectancy onthe intention to use the EM. In another study, Bandyopadhyay and Fraccastoro (2007) used the UTAUT model in order tounderstand the perceptions of users towards prepayment metering systems. Theresearchers hypothesized that consumers would prefer to use the prepayment meter technologyover traditional payment methods, if they believe it is a useful system for managing theirelectricity usage. The results of the study confirmed this hypothesis in the finding of asignificant relationship between performance expectancy and the intention to use the system. Inother words, people who thought that using the prepayment metering system would be helpful inelectricity account management intended to use the system more than people who thoughtotherwise. Furthermore, like many other scholars, Bandyopadhyay and Fraccastoro (2007) determinedthat performance expectancy was the strongest variable within the theoretical model. With regards to the use of audit software, ..........(find study on audit software adoption) Look at Bierstaker, burnaby and Thibodeu (2001) – explain the audit process ; audit planning, testing ad documenttaion Hence, the following is hypothesised: 37
  • 38. H2 : Auditors with high performance expectancy are associated with high usage of audit software. 3.4.2.2Effort Expectancy Like performance expectancy, effort expectancy is considered to be an importantdeterminant of user intentions. In the user acceptance literature, most of the studies found asignificant relationship between effort expectancy and intention. However, the relationship wasnot as strong as with performance expectancy.Lin and Anol (2008) studied online social support and network IT usage among 317Taiwan university students by employing the UTAUT. They operationalized effort expectancy asthe degree of easiness in using the network IT. An analysis of the survey revealed a significantrelationship between effort expectancy and user intentions. Students who found the system easyto use were more likely to use the system than those who found the system difficult to use. Wu, Tao, and Yang (2007) also used UTAUT as a theoretical background in theirresearch study. They studied the perceptions of users of 3G mobile communication systems andhypothesized that effort expectancy would play a major role in increasing the intention scores ofthe users. The researchers surveyed 394 users, by using an online questionnaire. Using structuralequation modeling, Wu et al. found a significant relationship between effort expectancy and theintention to use 3G mobile technologies. Therefore, they demonstrated their hypothesis abouteffort expectancy boosting user intentions to be correct. Im, Hong, and Kang (2007) studied mp3 player and internet banking technologies in twodifferent settings, namely Korea and the United States. They wanted to compare theperceptions of users from both countries to see whether there were any differences. Im et al. (2007) collected data from 501 users including Korean college students and US undergraduate students.They defined effort expectancy as the easiness of using the mp3 players and internet banking.Notwithstanding the differences in nationality, the results demonstrated a significant relationshipbetween effort expectancy and user intentions for both Korean and US students. Users whofound using both the mp3 players and Internet banking easy had high intention scores.Although a majority of the studies demonstrate a significant relationship between effortexpectancy and user intentions, there are a limited number of studies that show otherwise.Anderson, Schwager, and Kerns (2006) studied the perceptions of 38
  • 39. college faculty in their use of tablet PCs. They hypothesized that the ease of use of the tablet PCs would positively affect userintentions. In other words, they expected to see higher intention scores from users who found thetablet PC easy to operate. However, the study did not produce any significant results in terms ofeffort expectancy, and their hypothesis was rejected. Adapting effort expectancy into the use of audit technology. Need to find support for this... Hence, the following is hypothesised; H3: Auditors with high effort expectancy are associated with high usage of audit software. 3.4.2.3 Social Influences Marchewka et al. (2007) examined the Blackboard application which is a type ofeducational software widely used by the university community. Their sampling frame wasuniversity students both at the graduate and undergraduate levels. After surveying 132 universitystudents, they concluded that there was a significant relationship between social influences andintention to use the Blackboard system. According to the results, students are affected by theirsignificant others‟ opinions in terms of their use of the Blackboard system. If they believe thatthey are encouraged by those people, they were more likely to use the system. Armida (2008) used UTAUT as a theoretical framework for her study on VOIP systems.She hypothesized that social influence scores would positively affect users‟ intention to use theVOIP systems. In other words, users would decide whether to use the system based on theopinions of people whom they consider important. Armida surveyed 475 respondents fromvarious states in order to conduct her study. After statistical analysis, Armida concluded thatsocial influences were a significant predictor of intention to use the VOIP systems. Neufeld, Dong, and Higgins investigated the relationship between charismatic leadershipand the adoption of information technology (2007). Neufeld et al. collected a sample of 207respondents from 7 organizations. and hypothesized that social influence was a determinant of ITadoption. An analysis of their data resulted in positive scores for social influences. In other words, the results supported their hypothesis and found a significant relationship between socialinfluences and intention to use the new IT system. Adapting social influence into the use of audit software...Need to find past study to support.. 39
  • 40. Thus, the following is hypothesised; H4: Social influence will significantly affect the use of audit software among auditors. 3.4.2.4 Facilitating Conditions Facilitating conditions include the support function of the technology implementations.Depending on the complexity of the systems, facilitating conditions can affect intention to use asystem. Research findings from different studies display varying results for facilitatingconditions. While some studies report significant relationships, other studies found no significantrelationship between facilitating conditions and intention to use a system.One of the studies that produced significant results was conducted by AlAwadhi and Morris (2008). The researchers examined E-government services in Kuwait and surveyed 880university students in order to obtain their data. AlAwadhi and Morris (2008) operationalizedfacilitating conditions by two measures: first, having the knowledge to use the e-governmentservices and second, getting support when needed. The results of their study indicate thatfacilitating conditions is a significant determinant in using a new system. Wills, El-Gayar, and Bennett (2008) also found a significant relationship between facilitatingconditions and intention to use a new system in their study of electronic medical records.In this study, Wills et al. (2008) studied professionals working in the field of healthcare. They definedhealthcare professionals as “registered nurses, physician assistants or certified nurse practitionersin the state of South Dakota” (p398). They surveyed 52 healthcare professionals in order toobtain their data. As noted earlier, the results demonstrated a significant relationship betweenfacilitating conditions and intention to use electronic medical records. Al-Gahtani, Hubona, and Wang (2007) used the UTAUT model in order to understandthe perceptions of Saudi Arabian users in terms of IT acceptance. Al-Gahtani et al. (2007) surveyed1190 workers from companies that are located in four major cities. They hypothesized thatfacilitating conditions would positively affect users‟ behaviors in terms of using computersystems. However, the study did not produce significant results and their hypothesis wasrejected. Adapting fracilitating conditions into the use of audit software...Need to find past study to support.. 40