Select Currency
Translate this page

AUDITOR’S PERCEPTION OF THE USEFULNESS OF COMPUTER ASSISTED AUDIT TECHNIQUES

Format: MS WORD  |  Chapter: 1-5  |  Pages: 95  |  1107 Users found this project useful  |  Price NGN5,000

  DOWNLOAD THE COMPLETE PROJECT

CHAPTER ONE
INTRODUCTION
1.1 Background to the Study
While the use of Information Technology (IT) in the business world has grown exponentially in the past two decades, the extent to which auditors have adopted IT such as Computer-Assisted Auditing Techniques (CAATS) to meet this growth remains an empirical question (Arnold and Sutton 1998; Curtis and Payne 2008; Janvrin et al 2009). CAATS are computer tools that extract and analyze data from computer applications (Braun and Davis 2003). CAATS permit auditors to increase their productivity as well as that of the audit function (Zhao et al. 2004, 389). For example, CAATS may automatic previously manual audit tests reducing total audit hours expended. They enable auditors to test 100 percent of the population rather than a sample, thereby increasing the reliability of conclusions based on that test (AICPA 2001; Curtis and Payne 2008). In addition, CAATS may be used to select sample transactions meeting specific criteria, sort transactions with specific characteristics, obtain evidence about control eectiveness, and evaluate inventory existence and completeness (AICPA 2006). Recent audit standards encourage auditors to adopt CAATS to improve audit eiciency and eectiveness (AICPA 2001, 2002a, 2002b, 2002c, 2006). For example SAS No 106 suggests that CAATS may be used to improve audit eiciency by recalculating information provided by audit clients (AICPA 2006). Furthermore, SAS No. 106 indicates CAATS increase audit eectiveness by allowing auditors to directly inspect evidence stored in electronic from (AICPA 2006). Improving audit eiciency and eectiveness in particularly important in today audit environment where auditors have enhanced responsibilities for detecting fraud due to SAS No. 999 requirement and internal control eectiveness as directed under Section 404 of the Subanes Oxieg Act and Public. Company Accounting oversight Board (PCAOB) Audit standard No. 5 Despite the current emphasis on CAATS, research indicates that auditors do not frequently and systematically use CAATS (Liang et al. 2001; Kalaba 2002; Debrecency et al 205. Shaikh 2005) Curtis and Payne 2008; Janriv et al 2009). Auditor acceptance of CAATS may be driven by both firm resource issues and individual user perceptions. Prior information systems research indicates that even when suicient resource exist to purchase IT, users may not use (i.e., accept) the new IT (Davis 1989). Thus, the primary purpose of our research is to examine factors that influence individual, auditor acceptance of CAATS. Information systems research has developed several models to predict user acceptance of IT. This study uses a recent technology acceptance model, the unified technology acceptance and use of technology theory (UTAUT) (Venkatesh et al. 2003). UTAUT integrates several previously accepted models to assess the likelihood of success for new technology introductions. Understanding the drivers of acceptance allows researchers and audit firm management to proactively design interventions (including training, marketing etc) targeted (including training, marketing etc) targeted at populations of auditors that may be less inclined to adopt and use new systems (Venkatesh et al 2003). UTAUT proposes that four factors influence user acceptance.
1. The expectation users hold regarding how well the system may improve their performance (i.e., performance expectancy)
2. The degree of effort users, believe will be needed to use the new system (i.e., degree expectancy).
3. The extent users perceive that individuals important to them encourage system usage (i.e., social influence).
4. The expectation users hold regarding the existence of an organization and technical infrastructure to support system usage (i.e. facilitating conditions).
1.2  Statement of Problem
Prior CAAT research is generally descriptive in nature. Braun and Davis (2003) surveyed government auditor regarding their usage of Audit command language (ACL), a commercially available CAAT. They found that while participants perceived the potential benefits associated with ACL, they displayed a lower confidence in their technical abilities to use ACL (Braun and Davis 2003). Debreceny et al (2005) interviewed bank internal auditors are external auditors in Singapore. They note that internal auditors tend to use CAATS for special investigations rather than as a foundation for their regular audit work. Furthermore, external auditors did not adopt CAATS citing its in-applicability to the nature of testing the financial statement assertions or the extent or quality of computerized internal controls.
Liang et al (2001) noted that auditors do not frequently and systematically adopt CAATS in practice and proposed a new electronic audit approach. Sheikh (2005) suggested a new CAAT based on the electronic auditing from work that includes most feature of existing generalized audit soware but can be designed and deployed independently from the auditor’s EDP system. Finally, Zhao et al (2004) describes how CAATS must exist in order to conduct continuous auditing.
1.3 Research Questions
The following research questions will help in the study under review;
i. Is there a significant relationship between computer assisted audit techniques (CAATS) and audit practice in Nigeria?
ii. Does a significant relationship exist between computer assisted audit techniques (CAATS) and effective financial reporting in an organization?
1.4  Objectives of the Study
“When a man does not know what harbor he is making for, no wind is the right wind”. These words is attributed to first century Roman philosophers Lucius Anneals Seneca, bear out a long recognized truth, for life (business) to have direction. Goals are essential when the following objectives of the study came to mind in the choice of the topic.
i. To determine whether there is a significant relationship between CAAT and audit practice.
ii. To determine if there is a significant relationship between CAATS and effective financial reporting in an organization.
iii. To determine how far company law in Nigeria has ensured Information auditors.
iv. To determine whether the audit committees served to play ensure auditor’s C.A.A.T is effectively used in the practice work.
1.5 Statement of Hypotheses
Hypothesis One
HO: There is no significant relationship between computer Assist Audit techniques (CAATS) and audit practice in Nigeria.
HI: There is a significant relationship between computer assist audit techniques (CAATS) and audit practice in Nigeria.
Hypothesis Two
HO: There is no significance relationship between computer assist audit techniques (CAATS) and eective financial reporting in an organization.
HI: There is a significance relationship between computer assist’ audit techniques (CAATS) and eective financial reporting in an organization.
1.6  Significance of the Study
Interestingly, there has been little or no formal research on the application of CAATS in general and GAS in particular to the assurance process (Boritz 2002). This study aims is to make a first step in filling this clear gap in the research literature. The study seeks to evaluate the nature and extent of the utilization of GAS in financial institutions. These economically significant entities typically make intensive use of information systems for many business processes. Many financial institutions are of a sufficient size to warrant investment in GAS by internal or external auditors. Financial institutions also are often subject to regulatory regimes that require monitoring of particular risks and potential malfeasance in areas such as money laundering. In particular, this study aims to establish how GAS assists internal auditors within banks and their external auditors in the process of substantive testing in the conduct of both financial statement audits as well as special audits. Second, in the event that banks do not make use of GAS to obtain audit evidence through substantive procedures, the second objective of this study is to examine the reasons for such limited usage. In addition, this study also attempts to examine the possibilities of how banks’ internal and external auditors would be able to better exploit GAS if they were given an opportunity to exploit their capabilities to the fullest. 1.7 Scope of the Study
This work is not intended to serve itself, but the generality of auditing firms and the public at large. The study is to appraise thoroughly the theoretical formation on which is acquainted with basic fact about the significance of information system security auditing in Nigeria business environment.
1.8  Limitations of the Study
The scope of this study is limited to the survey of some selected auditing firms in Benin City. This study would have been more relevant if data could be gathered from all existing auditing firms in Nigeria. However we are constrained by limited resources in terms of finance and time. Other factor includes delay in response to questionnaires to be administered.
1.9   Definition of Terms
Information Technology Audit: An information technology audit or information systems auditing is an examination of the management controls within an information technology (IT) infrastructure. The evaluation of obtained evidence determines if the information technology or system are safeguarding assets, maintaining data integrity and operating effectively to achieve the organization’s goals or objectives. These reviews may be performed in conjunction with a financial statement audit, internal audit, or other form of attestation engagement. (Gawde, 2004).
Audit Personnel: According to Webster Dictionary, it is an annual personnel administration inventory which is an analysis and measurement of a company’s personnel policies and practices to determine their effectiveness.
Security Risk: A measure of the extent to which an entity is threatened by potential circumstance or event and typically a function of (1) the adverse impact that would arise if the circumstance or event occurs, and (2) the likelihood of occurrence. Note information system- related security risk are those risk that arise from the loss of confidentiality, or availability of information or information systems and reflect the potential adverse impacts to organizational operations (including mission, functions, image, or reputation) organizations assets individuals other organizations, and the Nation (Larnpson, 2000). 

  DOWNLOAD THE COMPLETE PROJECT

AUDITOR’S PERCEPTION OF THE USEFULNESS OF COMPUTER ASSISTED AUDIT TECHNIQUES

Not The Topic You Are Looking For?



For Quick Help Chat with Us Now!

+234 813 292 6373

+233 55 397 8005


HOW TO GET THE COMPLETE PROJECT ON AUDITOR’S PERCEPTION OF THE USEFULNESS OF COMPUTER ASSISTED AUDIT TECHNIQUES INSTANTLY

  • Click on the Download Button above.
  • Select any option to get the complete project immediately.
  • Chat with Our Instant Help Desk on +234 813 292 6373 for further assistance.
  • All projects on our website are well researched by professionals with high level of professionalism.

Here's what our amazing customers are saying

Peace From Unilag
I cried not knowing how to go about my project but the day i searched online and saw iprojectmaster, i called and got my full project in less than 15minutes, i was shocked!
Excellent
Adam Alhassan Yakubu
UDS
Excellent work and delivery , I promise to share my testimonies everyone in need of this kind of work. You're the best
Excellent
Emmanuel Essential
Kogi state University
I actually took the risk,you know first time stuff But i was suprised i received as requested. I love you guys 🌟 🌟 🌟 🌟
Very Good
Uduak From Uniuyo
IProjectMaster is the best project site for students. Their works are unique and free of plagiarism!
Excellent
Abdulrazak Bello Marsha
Usman Dan fodio University
It was quite a better guide for project and paper presentation purpoting. Many thanks.
Average
Abdulrahman Jibrin
Nti Abaji
Nice one work prompt delivery tanx
Very Good
JONNAH EHIS
Ajayi Crowther University, Oyo
I was scared at first when I saw your website but I decided to risk my last 3k and surprisingly I got my complete project in my email box instantly. This is so nice!!!
Excellent
Musa From Ahmadu Bello University
Thank you iprojectmaster for saving my life, please keep it up and may God continue to bless you people.
Excellent
Samuel From Ajayi Crowther University
You guys just made life easier for students. Thanks alot iprojectmaster.com
Excellent
Temitayo Ayodele
Obafemi Awolowo University
My friend told me about iprojectmaster website, I doubted her until I saw her download her full project instantly, I tried mine too and got it instantly, right now, am telling everyone in my school about iprojectmaster.com, no one has to suffer any more writing their project. Thank you for making life easy for me and my fellow students... Keep up the good work
Very Good

FREQUENTLY ASKED QUESTIONS

How do I get this complete project on AUDITOR’S PERCEPTION OF THE USEFULNESS OF COMPUTER ASSISTED AUDIT TECHNIQUES?

Simply click on the Download button above and follow the procedure stated.

I have a fresh topic that is not on your website. How do I go about it?

How fast can I get this complete project on AUDITOR’S PERCEPTION OF THE USEFULNESS OF COMPUTER ASSISTED AUDIT TECHNIQUES?

Within 15 minutes if you want this exact project topic without adjustment

Is it a complete research project or just materials?

It is a Complete Research Project i.e Chapters 1-5, Abstract, Table of Contents, Full References, Questionnaires / Secondary Data

What if I want to change the case study for AUDITOR’S PERCEPTION OF THE USEFULNESS OF COMPUTER ASSISTED AUDIT TECHNIQUES, What do i do?

Chat with Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

How will I get my complete project?

Your Complete Project Material will be sent to your Email Address in Ms Word document format

Can I get my Complete Project through WhatsApp?

Yes! We can send your Complete Research Project to your WhatsApp Number

What if my Project Supervisor made some changes to a topic i picked from your website?

Call Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

Do you assist students with Assignment and Project Proposal?

Yes! Call Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

What if i do not have any project topic idea at all?

Smiles! We've Got You Covered. Chat with us on WhatsApp Now to Get Instant Help: +234 813 292 6373

How can i trust this site?

We are well aware of fraudulent activities that have been happening on the internet. It is regrettable, but hopefully declining. However, we wish to reinstate to our esteemed clients that we are genuine and duly registered with the Corporate Affairs Commission as "PRIMEDGE TECHNOLOGY". This site runs on Secure Sockets Layer (SSL), therefore all transactions on this site are HIGHLY secure and safe!