skip to main content
10.1145/3507485.3507505acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicsebConference Proceedingsconference-collections
research-article

Planned Behavior and Social Cognitive Model for Accounting Student Intention in Learning Audit Software

Published:08 March 2022Publication History

ABSTRACT

The industrial revolution 4.0 has penetrated all fields, including accounting and auditing. Higher education institutions and universities, in this case as labor printers, are also required to prepare graduates who are technologically savvy. We at the auditing scientific community also prepare students to become auditors who understand technology, in this case audit software. In order to become quality auditor in the future, literacy in audit software is mandatory for accounting student. We examine the factors that influence student interest in learning audio software. We use the approach of the theory of planned behavior and social cognitive theory. Our research is quantitative research, the object of our research is students who take the method and practice of computerized audit course. The data we process is primary data from questionnaires to respondents. We use statistical software for data analysis, namely Smart PLS 3. Our results state that the variables attitude, perceived behavioral control and self-efficacy have a significant effect, while subjective norms have no significant effect on student intention in learning audit software.

References

  1. A. A. Al-Ansi , “The effect of IT knowledge and IT training on IT utilization among yemeni external auditors: The mediating role of IT importance,” Int. J. Econ. Res., vol. 14, no. 16, pp. 413–432, 2017.Google ScholarGoogle Scholar
  2. S. Alwahaishi and V. Snásel, “Consumers’ Acceptance and Use of Information and Communications Technology: A UTAUT and Flow Based Theoretical Model,” J. Technol. Manag. Innov., vol. 8, no. 2, pp. 9–10, 2013, doi: 10.4067/S0718-27242013000200005.Google ScholarGoogle ScholarCross RefCross Ref
  3. R. Tatar and D. M. Enescu, “The impact of COVID-19 pandemic on the activity of a pediatric burn center in Bucharest, Romania,” Burns, vol. 46, no. 8, pp. 1977–1978, 2020, doi: 10.1016/j.burns.2020.07.002.Google ScholarGoogle ScholarCross RefCross Ref
  4. R. A. Teeter, M. G. Alles, and M. A. Vasarhelyi, “The remote audit,” J. Emerg. Technol. Account., vol. 7, no. 1, pp. 73–88, 2010, doi: 10.2308/jeta.2010.7.1.73.Google ScholarGoogle ScholarCross RefCross Ref
  5. J. O. Orumwense, “Implementation of Continuous Auditing for the Public Sector in Nigeria,” J. Accounting, Bus. Financ. Res., vol. 1, no. 1, pp. 19–23, 2017, doi: 10.20448/2002.11.19.23.Google ScholarGoogle ScholarCross RefCross Ref
  6. I. Ajzen, “The Theory of Planned Behavior,” Organ. Behav. Hum. Decis. Process, vol. 50, pp. 179–211, 1991.Google ScholarGoogle ScholarCross RefCross Ref
  7. A. Bandura, “Social cognitive theory of self-regulation,” Organ. Behav. Hum. Decis. Process., vol. 50, no. 2, pp. 248–287, 1991, doi: 10.1016/0749-5978(91)90022-L.Google ScholarGoogle ScholarCross RefCross Ref
  8. M. Fishbein and I. Ajzen, “Belief, Attitude, Intention and Behaviour: An Introduction to Theory and Research,” Read. MA AddisonWesley, no. August, p. 480, 1975, doi: 10.2307/2065853.Google ScholarGoogle Scholar
  9. P. Ifinedo, “Examining students’ intention to continue using blogs for learning: Perspectives from technology acceptance, motivational, and social-cognitive frameworks,” Comput. Human Behav., vol. 72, pp. 189–199, 2017, doi: 10.1016/j.chb.2016.12.049.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. A. Dhir, P. Kaur, and R. Rajala, “Continued Use of Mobile Instant Messaging Apps: A New Perspective on Theories of Consumption, Flow, and Planned Behavior,” Soc. Sci. Comput. Rev., vol. 38, no. 2, pp. 147–169, 2020, doi: 10.1177/0894439318806853.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. O. Mustapha, A. M. Ikotun, and A. O. Adejimi, “an Enhanced Technology Acceptance Model To Measure Customers ’ Willingness To Pay More for Secure Software Development,” pp. 103–118, 2016.Google ScholarGoogle Scholar
  12. K. Sohn and O. Kwon, “Technology acceptance theories and factors influencing artificial Intelligence-based intelligent products,” Telemat. Informatics, vol. 47, 2020, doi: 10.1016/j.tele.2019.101324.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. M. M. Rahman, M. F. Lesch, W. J. Horrey, and L. Strawderman, “Assessing the utility of TAM, TPB, and UTAUT for advanced driver assistance systems,” Accid. Anal. Prev., vol. 108, no. September, pp. 361–373, 2017, doi: 10.1016/j.aap.2017.09.011.Google ScholarGoogle ScholarCross RefCross Ref
  14. R. Widuri, B. L. Handoko, and I. E. Riantono, “Perception of Accounting Student on Learning of Generalized Audit Software,” 2019, doi: 10.1109/ICIMTech.2019.8843718.Google ScholarGoogle ScholarCross RefCross Ref
  15. E. M. Mansour, “Factors Affecting the Adoption of Computer Assisted Audit Techniques in Audit Process: Findings from Jordan,” Bus. Econ. Res., vol. 6, no. 1, p. 248, 2016, doi: 10.5296/ber.v6i1.8996.Google ScholarGoogle ScholarCross RefCross Ref
  16. S. Verma, S. S. Bhattacharyya, and S. Kumar, “An extension of the technology acceptance model in the big data analytics system implementation environment,” Inf. Process. Manag., vol. 54, no. 5, pp. 791–806, 2018, doi: 10.1016/j.ipm.2018.01.004.Google ScholarGoogle ScholarCross RefCross Ref
  17. S. Y. Park, “An Analysis of the Technology Acceptance Model in Understanding University Students’ Behavioral Intention to Use e-Learning,” Educ. Technol. Soc., vol. 12, no. 3, pp. 150–162, 2009, doi: 10.1007/s00340-009-3513-0.Google ScholarGoogle Scholar
  18. S. Kumar, “A Conceptual Paper on Dark Social – Social Cognitive and Social Capital Theory Perspective,” Int. J. Adv. Stud. Comput. Sci. Eng., vol. 6, no. 9, pp. 1–11, 2017, [Online]. Available: http://www.ijascse.org/volume-6-theme-based-issue-9/Social-capital-theory.pdf.Google ScholarGoogle Scholar
  19. M. Bradford, D. Henderson, R. J. Baxter, and P. Navarro, “Using generalized audit software to detect material misstatements, control deficiencies and fraud: How financial and IT auditors perceive net audit benefits,” Manag. Audit. J., vol. 35, no. 4, pp. 521–547, 2020, doi: 10.1108/MAJ-05-2019-2277.Google ScholarGoogle ScholarCross RefCross Ref
  20. R. Indrarini, M. K. Anwar, and C. Canggih, “Does Competency Certification Really Matter to Decrease Unemployment?,” in International Conference on Education, Sciences and Technology DOI:, 2019, vol. 2, pp. 179–185.Google ScholarGoogle Scholar
  21. C. M. Chao, “Factors determining the behavioral intention to use mobile learning: An application and extension of the UTAUT model,” Front. Psychol., vol. 10, no. JULY, pp. 1–14, 2019, doi: 10.3389/fpsyg.2019.01652.Google ScholarGoogle ScholarCross RefCross Ref
  22. C. H. Tsai, “Integrating social capital theory, social cognitive theory, and the technology acceptance model to explore a behavioral model of telehealth systems,” Int. J. Environ. Res. Public Health, vol. 11, no. 5, pp. 4905–4925, 2014, doi: 10.3390/ijerph110504905.Google ScholarGoogle ScholarCross RefCross Ref
  23. J. M. Su, S. C. Lee, S. B. Tsai, and T. L. Lu, “A comprehensive survey of the relationship between self-efficacy and performance for the governmental auditors,” Springerplus, vol. 5, no. 1, 2016, doi: 10.1186/s40064-016-2104-x.Google ScholarGoogle Scholar
  24. M. Laforce, E. Noble, and C. Blackwell, “Problem-based learning (PBL) and student interest in STEM careers: The roles of motivation and ability beliefs,” Educ. Sci., vol. 7, no. 4, 2017, doi: 10.3390/educsci7040092.Google ScholarGoogle Scholar
  25. A. M. Adam, “Sample Size Determination in Survey Research,” J. Sci. Res. Reports, vol. 26, no. 5, pp. 90–97, 2020, doi: 10.9734/jsrr/2020/v26i530263.Google ScholarGoogle Scholar
  26. M. N. Yakubu and S. I. Dasuki, “Factors affecting the adoption of e-learning technologies among higher education students in Nigeria: A structural equation modelling approach,” Inf. Dev., vol. 35, no. 3, pp. 492–502, 2019, doi: 10.1177/0266666918765907.Google ScholarGoogle ScholarCross RefCross Ref
  27. S. Vasantha and P. Sarika, “Empirical analysis of demographic factors affecting intention to use mobile wallet,” Int. J. Eng. Adv. Technol., vol. 8, no. 6 Special Issue, pp. 768–776, 2019, doi: 10.35940/ijeat.F1149.0886S19.Google ScholarGoogle Scholar
  28. J. Cohen, Y. Ding, C. Lesage, and H. Stolowy, “Corporate Fraud and Managers’ Behavior: Evidence from the Press,” J. Bus. Ethics, vol. 95, no. SUPPL. 2, pp. 271–315, 2010, doi: 10.1007/s10551-011-0857-2.Google ScholarGoogle ScholarCross RefCross Ref
  29. P. Kraft, J. Rise, S. Sutton, and E. Røysamb, “Perceived difficulty in the theory of planned behaviour: Perceived behavioural control or affective attitude?,” Br. J. Soc. Psychol., vol. 44, no. 3, pp. 479–496, 2005, doi: 10.1348/014466604X17533.Google ScholarGoogle ScholarCross RefCross Ref
  30. I. Ghozali and L. Hengky, Concept, Technique and Appliaction to Use Program of Smart PLS 3.0. 2015.Google ScholarGoogle Scholar
  31. T. Thomas, L. Singh, and K. Gaffar, “The utility of the UTAUT model in explaining mobile learning adoption in higher education in Guyana,” … J. Educ. …, vol. 9, no. 3, pp. 71–85, 2013, doi: 10.5539/ass.v10n11p84.Google ScholarGoogle Scholar
  32. M. I. Eraqi, W. Abou-Alam, M. Belal, and T. Fahmi, “Attitudes of Undergraduate Students Toward E-Learning in Tourism: The Case of Egypt,” J. Teach. Travel Tour., vol. 11, no. 4, pp. 325–348, 2011, doi: 10.1080/15313220.2011.624397.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICSEB '21: Proceedings of the 2021 5th International Conference on Software and e-Business
    December 2021
    153 pages
    ISBN:9781450385831
    DOI:10.1145/3507485

    Copyright © 2021 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 8 March 2022

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited
  • Article Metrics

    • Downloads (Last 12 months)11
    • Downloads (Last 6 weeks)2

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format