skip to main content
10.1145/3335484.3335500acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicbdcConference Proceedingsconference-collections
research-article

Adoption of Information Technology in Public Accounting Firm

Authors Info & Claims
Published:10 May 2019Publication History

ABSTRACT

The purpose of this study was to determine the auditor's acceptance of the use of audit technology in the process of financial audit work. This research is a quantitative research that uses primary data in the form of questionnaires distributed to research objects, namely auditors who work in public accountant offices. This research instrument refers to previous research developed by [1] and used by [2] which refers to Technical Organizational Environmental (TOE). This study examines hypotheses between variables using path analysis, while the independent variables in this study are Technical Context, Organizational Context and Environmental Context while the Firm Size moderating variable and the dependent variable are Adoption of Audit Technology. The results of this study are to knowing the adoption of auditors in information technology in their work processes. It is expected that it will provide an overview of the auditor's expectations on the use of information technology, so that it can improve the quality of work to be more effective and efficient, especially in terms of time and energy. The results of this study are expected to provide an overview of the adoption of audit technology by auditors in the financial audit process.

References

  1. L. Tornatzky and M. Fletscher, "The Deployment of Technology," in The Processes of Technological Innovation, 1990, pp. 118--147.Google ScholarGoogle Scholar
  2. K. Rosli, P. H. P. Yeow, and E.-G. Siew, "Adoption of Audit Technology in Audit Firms," Proc. 24th Australas. Conf. Inf. Syst., pp. 1--12, 2013.Google ScholarGoogle Scholar
  3. R. L. Braun and H. E. Davis, "Computer assisted audit tools and techniques: analysis and perspectives," Manag. Audit. J., vol. 18, no. 9, pp. 725--731, Dec. 2003.Google ScholarGoogle ScholarCross RefCross Ref
  4. A. Ahmi and S. Kent, "The utilisation of generalized audit software (GAS) by external auditors," Manag. Audit. J., vol. 28, no. 2, pp. 88--113, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  5. K. K. Y. Kuan and P. Y. K. Chau, "A perception-based model for EDI adoption in small businesses using a technology-organization-environment framework," Inf. Manag., vol. 38, no. 8, pp. 507--521, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. A. Scupola, "The adoption of internet commerce by SMES in the south of Italy: An environmental, technological and organizational perspective," J. Glob. Inf. Technol. Manag., vol. 6, no. 1, pp. 52--71, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  7. M. A. Aljowaidi, "A study of E-commerce Adoption Using the TOE Framework in Saudi Retailers: Firm Motivations, Implementation and Benefits A thesis submittied in fulfilment of the requirements for the," no. September, 2015.Google ScholarGoogle Scholar
  8. H. O. Awa, O. U. Ojiabo, and B. C. Emecheta, "Integrating TAM, TPB and TOE frameworks and expanding their characteristic constructs for e-commerce adoption by SMEs," J. Sci. Technol. Policy Manag., vol. 6, no. 1, pp. 76--94, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  9. C. Chiu, S. Chen, and C. Chen, "An Integrated Perspective of TOE Framework and Innovation Diffusion in Broadband Mobile Applications Adoption by Enterprises," Int. J. Manag. Econ. Soc. Sci., vol. 6, no. 1, pp. 14--39, 2017.Google ScholarGoogle Scholar
  10. M. Mckinnie, "Cloud Computing: TOE Adoption Factors By Service Model In Manufacturing," p. 131, 2016.Google ScholarGoogle Scholar
  11. B. L. Handoko, R. Widuri, and H. Sarjono, "The effect of third party auditor and quality of service through cloud storage security to cloud user trust," 2017 9th IEEE Int. Conf. Commun. Softw. Networks, ICCSN 2017, vol. 2017--January, pp. 1397--1401, 2017.Google ScholarGoogle Scholar
  12. F. D. Davis, "Perceived Usefulness, Perceived Ease Of Use, And User Acceptance," MIS Q., vol. 13, no. 3, pp. 319--339, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. R. Debreceny, S. Lee, W. Neo, and J. S. Toh, "Employing generalized audit software in the financial services sector Challenges and opportunities," vol. 20, no. 6, pp. 605--618.Google ScholarGoogle Scholar
  14. M. Fishbein and I. Ajzen, "Belief, Attitude, Intention and Behaviour: An Introduction to Theory and Research," Read. MA AddisonWesley, no. August, p. 480, 1975.Google ScholarGoogle Scholar
  15. P. Lai, "the Literature Review of Technology Adoption Models and Theories for the Novelty Technology," J. Inf. Syst. Technol. Manag., vol. 14, no. 1, pp. 21--38, 2017.Google ScholarGoogle Scholar
  16. I. Arpaci, Y. C. Yardimci, S. Ozkan, and O. Turetken, "Organizational Adoption of Information Technologies: a Literature Review," Int. J. Ebus. eGOVERNMENT Stud., vol. 4, no. 2, pp. 37--50, 2012.Google ScholarGoogle Scholar
  17. M. Ghobakhloo, T. S. Hong, M. S. Sabouri, and N. Zulkifli, "Strategies for Successful Information Technology Adoption in Small and Medium-sized Enterprises," Information, vol. 3, no. 4, pp. 36--67, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  18. N. K. Haslinda Hassan, Mohd Herry Mohd Nasir, "Factors Influencing Cloud Computing Adoption in," J. ICT, vol. 1, no. 1, pp. 21--41, 2017.Google ScholarGoogle Scholar
  19. M. A. Jacobs, E. Heim, and J. B. Chassan, "Intensive design in the study of differential therapeutic effects," Compr. Psychiatry, vol. 7, no. 4, pp. 278--289, 1966.Google ScholarGoogle ScholarCross RefCross Ref
  20. J. T. Roscoe, Fundamental Research Statistics for the Behavioural Sciences. New York: Holt Rinehart & Winston, 1975.Google ScholarGoogle Scholar
  21. U. Sekaran and R. Bougie, "Research methods for business," in Research methods for business, 2013, p. 436.Google ScholarGoogle Scholar

Index Terms

  1. Adoption of Information Technology in Public Accounting Firm

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICBDC '19: Proceedings of the 4th International Conference on Big Data and Computing
      May 2019
      353 pages
      ISBN:9781450362788
      DOI:10.1145/3335484

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 10 May 2019

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader