skip to main content
10.1145/3481127.3481143acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicemeConference Proceedingsconference-collections
research-article

Analysis of External Auditor Intentions in Adopting Artificial Intelligence as Fraud Detection with the Unified Theory of Acceptance and Use of Technology (UTAUT) Approach

Published:02 December 2021Publication History

ABSTRACT

The industrial revolution is a process of rapid change in industrial activities previously carried out by humans, replaced by machines. Artificial Intelligence is expected to be able to detect fraud, especially in financial reports, because Artificial Intelligence can analyze complex data in real time and recognize signs of fraud that auditors may have missed. The purpose of this study is to analyze the external auditor acceptance model to adopt Artificial Intelligence as fraud detection. This research uses quantitative research methods. Sources of data are obtained from primary data and secondary data. The primary data is obtaining from questionnaire. Distributing questionnaires in this study was carried out using Google Form. The secondary data obtained from journals, articles, online books. The result of this research, it can be concluded that Performance Expectancy, Facilitating Conditions have a significant positive effect on external auditors' Behavioral Intention in adopting Artificial Intelligence as a fraud detection. The variable Effort Expectancy has a positive but not significant effect on external auditors' Behavioral Intention in adopting Artificial Intelligence as a fraud detection. The variable Social Influence has a negative but not significant effect on external auditors' Behavioral Intention in adopting Artificial Intelligence as a fraud detection.

References

  1. ACFE, “Report To The Nations 2020 Global Study on Occupational Fraud and Abuse,” 2020.Google ScholarGoogle Scholar
  2. ACFE, “RTTN Asia Pacific Edition 2020,” 2020.Google ScholarGoogle Scholar
  3. ACFE Indonesia Chapter, Survei Fraud Indonesia 2019. 2019.Google ScholarGoogle Scholar
  4. R. Arief, “PERAN AUDIT INTERNAL ATAS KUALITAS PEMERIKSAAN LAPORAN KEUANGAN YANG DILAKUKAN OLEH AUDIT EKSTERNAL PADA SEBUAH PERUSAHAAN Rachmat,” J. Ekon., vol. 7, no. 1, 2016.Google ScholarGoogle Scholar
  5. O. Gillath, T. Ai, M. Branicky, S. Keshmiri, R. Davison, and R. Spaulding, “Attachment and trust in artificial intelligence,” Comput. Human Behav., vol. 115, 2020, doi: 10.1016/j.chb.2020.106607.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. ICAEW, “Artificial intelligence and the future of accountancy,” 2018.Google ScholarGoogle Scholar
  7. J. Raphael, “How Artificial Intelligence Can Boost Audit Quality,” CFO, 2015. https://www.cfo.com/auditing/2015/06/artificial-intelligence-can-boost-audit-quality/ (accessed Apr. 12, 2021).Google ScholarGoogle Scholar
  8. F. Persico and H. Sidhu, “How AI will turn auditors into analysts,” Accounting Today, 2017. https://www.accountingtoday.com/opinion/how-ai-will-turn-auditors-into-analysts (accessed Jun. 23, 2021).Google ScholarGoogle Scholar
  9. I. Munoko, H. L. Brown-Liburd, and M. Vasarhelyi, “The Ethical Implications of Using Artificial Intelligence in Auditing,” J. Bus. Ethics, vol. 167, no. 2, pp. 209–234, 2020, doi: 10.1007/s10551-019-04407-1.Google ScholarGoogle ScholarCross RefCross Ref
  10. D. Choi and K. Lee, “An Artificial Intelligence Approach to Financial Fraud Detection under IoT Environment: A Survey and Implementation,” Secur. Commun. Networks, vol. 2018, 2018, doi: 10.1155/2018/5483472.Google ScholarGoogle ScholarCross RefCross Ref
  11. Imagama.feb, “Artificial Intelligence for Audit: Beneficial or Damaging?,” IMAGAMA FEB UGM, 2017. https://imagama.feb.ugm.ac.id/artificial-intelligence/ (accessed Apr. 12, 2021).Google ScholarGoogle Scholar
  12. E. Fatmawati, “Technology Acceptance Model (TAM) Untuk Menganalisis Sistem Informasi Perpustakaan,” Iqra’ J. Perpust. Dan Inf., vol. 9, no. 1, pp. 1–13, 2015, [Online]. Available: http://jurnal.uinsu.ac.id/index.php/iqra/article/view/66.Google ScholarGoogle Scholar
  13. T. Handayani and S. Sudiana, “Analisis Penerapan Model Utaut (Unified Theory of Acceptance and Use of Technology) Terhadap Perilaku Pengguna Sistem Informasi (Studi Kasus: Sistem Informasi Akademik Pada Sttnas Yogyakarta),” Angkasa J. Ilm. Bid. Teknol., vol. 7, no. 2, pp. 165–180, 2015, doi: 10.28989/angkasa.v7i2.159.Google ScholarGoogle ScholarCross RefCross Ref
  14. Venkatesh, Morris, Davis, and Davis, “User Acceptance of Information Technology: Toward a Unified View,” MIS Q., vol. 27, no. 3, p. 425, Mar. 2003, doi: 10.2307/30036540.Google ScholarGoogle ScholarCross RefCross Ref
  15. D. I. Christiono and R. K. M. R. Brahmana, “Analisis Pengaruh Performance Expeciancy Terhadap Behavior Intention pada Online Marketplace,” Agora, vol. 6, no. 2, 2018.Google ScholarGoogle Scholar
  16. A. Rahmawaty, “Perempuan Dan Pemanfaatan Teknologi Internet Dengan Pendekatan Utaut,” PALASTREN J. Stud. Gend., vol. 9, no. 1, pp. 13–42, 2016, doi: 10.21043/palastren.v9i1.1746.Google ScholarGoogle ScholarCross RefCross Ref
  17. C. Andreas, “UTAUT and UTAUT 2: A Review and Agenda for Future Research,” The Winners, vol. 13, no. 2, pp. 106–114, 2012.Google ScholarGoogle Scholar
  18. L. Abdulwahab and Z. M. Dahalin, “A Conceptual Model of Unified Theory of Acceptance and Use of Technology ( UTAUT ) Modification with Management Effectiveness and Program Effectiveness in Context of Telecentre,” African Sci., vol. 11, no. 4, pp. 267–275, 2010.Google ScholarGoogle Scholar
  19. R. K. J. Bendi and Sri Andayani, “Analisis Perilaku Penggunaan Sistem Informasi Menggunakan Model UTAUT,” in Seminar Nasional Teknologi Informasi & Komunikasi Terapan 2013 (Semantik 2013), 2013, vol. 2013, no. November, pp. 277–282.Google ScholarGoogle Scholar
  20. S. T. Muntianah, E. S. Astuti, and D. F. Azizah, “Pengaruh Minat Perilaku Terhadap Actual Use Teknologi Informasi Dengan Pendekatan Technology Acceptance Model (TAM) (Studi kasus pada kegiatan belajar Mahasiswa Fakultas Ilmu Administrasi Universitas Brawijaya Malang),” Profit, vol. 6, no. 1, pp. 88–113, 2012.Google ScholarGoogle Scholar
  21. K. Rosli, P. Yeow, and E.-G. Siew, “Factors Influencing Audit Technology Acceptance by Audit Firms: A New I-TOE Adoption Framework,” J. Account. Audit. Res. Pract., pp. 1–11, Sep. 2012, doi: 10.5171/2012.876814.Google ScholarGoogle ScholarCross RefCross Ref
  22. A. Y. M. Tansil, R. Widuri, A. Gui, and M. M. Ali, “Generalised Audit Software use by external auditor: An empirical examination from UTAUT,” Int. J. Innov. Creat. Chang., vol. 5, no. 2, pp. 887–908, 2019.Google ScholarGoogle Scholar
  23. B. L. Handoko, S. Ariyanto, and D. L. Warganegara, “Perception of financial auditor on usage of computer assisted audit techniques,” Proc. - 3rd Int. Conf. Comput. Intell. Appl. ICCIA 2018, no. April 2019, pp. 235–239, 2018, doi: 10.1109/ICCIA.2018.00052.Google ScholarGoogle ScholarCross RefCross Ref
  24. I. S. Mohamed, N. H. M. Muhayyidin, and N. Rozzani, “Auditing and data analytics via computer assisted audit techniques (CAATs): Determinants of adoption intention among auditors in Malaysia,” 2019, doi: 10.1145/3361758.3361773.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. A. Al-hiyari, N. Al Said, and E. Hattab, “FACTORS THAT INFLUENCE THE USE OF COMPUTER ASSISTED AUDIT TECHNIQUES ( CAATS ) BY INTERNAL AUDITORS IN JORDAN,” Acad. Account. Financ. Stud. J., vol. 23, no. 3, 2019, doi: 10.13140/RG.2.2.28525.23522.Google ScholarGoogle ScholarCross RefCross Ref
  26. A. N. Awanto, Y. T. Ardianto, and D. A. Prasetya, “UTAUT Model Implementation On User Behavior In Use Of Information Technology,” J. Teknol. dan Manaj. Inform., vol. 6, no. 1, pp. 53–59, 2020, doi: 10.26905/jtmi.v6i1.4156.Google ScholarGoogle ScholarCross RefCross Ref
  27. K. Sohn and O. Kwon, “Technology acceptance theories and factors influencing artificial Intelligence-based intelligent products,” Telemat. Informatics, vol. 47, 2020, doi: 10.1016/j.tele.2019.101324.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. G. Cao, Y. Duan, J. S. Edwards, and Y. K. Dwivedi, “Understanding managers’ attitudes and behavioral intentions towards using artificial intelligence for organizational decision-making,” Technovation, Vol. 106, vol. 106, 2021, doi: https://doi.org/10.1016/j.technovation.2021.102312.Google ScholarGoogle ScholarCross RefCross Ref
  29. C. Martins, T. Oliveira, and A. Popovič, “Understanding the internet banking adoption: A unified theory of acceptance and use of technology and perceived risk application,” Int. J. Inf. Manage., vol. 34, no. 1, 2014, doi: 10.1016/j.ijinfomgt.2013.06.002.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. L. Ferri, R. Spanò, G. Ginesti, and G. Theodosopoulos, “Ascertaining auditors’ intentions to use blockchain technology: evidence from the Big 4 accountancy firms in Italy,” Meditari Account. Res., 2020, doi: 10.1108/MEDAR-03-2020-0829.Google ScholarGoogle ScholarCross RefCross Ref
  31. J. Bierstaker, D. Janvrin, and D. J. Lowe, “What factors influence auditors’ use of computer-assisted audit techniques?,” Adv. Account., vol. 30, no. 1, pp. 67–74, 2014, doi: 10.1016/j.adiac.2013.12.005.Google ScholarGoogle ScholarCross RefCross Ref
  32. N. N. Normahazan, I. S. Mohamed, and N. Rozzani, “Drivers Contributing to the Implementation of Generalized Audit Software (GAS) within Audit Firms in Malaysia,” Bus. Econ. Res., vol. 10, no. 2, p. 341, 2020, doi: 10.5296/ber.v10i2.16862.Google ScholarGoogle ScholarCross RefCross Ref
  33. N. Duli, Metodologi Penelitian Kuantitatif: Beberapa Konsep Dasar Untuk Penulisan Skripsi & Analisis Data dengan SPSS. 2019.Google ScholarGoogle Scholar
  34. A. Febriansyah and V. Herviani, “Tinjauan Atas Proses Penyusunan Laporan Keuangan Pada Young Enterpreneur Academy Indonesia Bandung,” J. Ris. Akunt., vol. 8, no. 2, 2016, doi: 10.34010/jra.v8i2.525.Google ScholarGoogle ScholarCross RefCross Ref
  35. N. I. Pratiwi, “Penggunaan Media Video Call dalam Teknologi Komunikasi,” J. Ilm. Din. Sos., vol. 1, no. 2, pp. 202–224, 2017.Google ScholarGoogle Scholar
  36. J. T. Roscoe, Fundamental Research Statistics for the Behavioural Sciences. New York: Holt Rinehart & Winston, 1975.Google ScholarGoogle Scholar
  37. G. Anuraga, E. Sulistiyawan, and S. Munadhiroh, “Structural Equation Modeling - PLS Untuk Pemodelan IPKM Jawa Timur,” pp. 257–263, 2017.Google ScholarGoogle Scholar
  38. R. Heale and A. Twycross, “Validity and reliability in quantitative studies,” Evid. Based. Nurs., vol. 18, no. 3, pp. 66–67, 2015, doi: 10.1136/eb-2015-102129.Google ScholarGoogle ScholarCross RefCross Ref
  39. W. W. Chin, “The Partial Least Squares Approach to Structural Modeling,” Mod. Methods Bus. Res., 1998.Google ScholarGoogle Scholar
  40. W. Abdillah and J. Hartono, Konsep Aplikasi PLS (Partial Least Square) untuk penelitian empiris, Edisi Pert. Yogyakarta: BPFE, 2014.Google ScholarGoogle Scholar
  41. D. Muijs, Doing Quantitative Research in Education with SPSS. 2012.Google ScholarGoogle Scholar
  42. N. Golafshani, “Understanding Reliability and Validity in Qualitative Research,” Qual. Rep., vol. 8, no. 4, pp. 597–606, 2015, doi: 10.46743/2160-3715/2003.1870.Google ScholarGoogle ScholarCross RefCross Ref
  43. N. H. Md Ghazali, “A Reliability and Validity of an Instrument to Evaluate the School-Based Assessment System: A Pilot Study,” Int. J. Eval. Res. Educ., vol. 5, no. 2, p. 148, 2016, doi: 10.11591/ijere.v5i2.4533.Google ScholarGoogle ScholarCross RefCross Ref

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICEME '21: Proceedings of the 2021 12th International Conference on E-business, Management and Economics
    July 2021
    882 pages
    ISBN:9781450390064
    DOI:10.1145/3481127

    Copyright © 2021 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 2 December 2021

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited
  • Article Metrics

    • Downloads (Last 12 months)166
    • Downloads (Last 6 weeks)22

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format