The Remote Audit

ABSTRACT: Audit practitioners have been progressively adopting communications and analytic technology to extend the scope, change the timing, and reduce the costs of audit processes. These efforts ...

[1]  David C. Yen,et al.  Auditing in the e-commerce era , 2004, Inf. Manag. Comput. Secur..

[2]  Clarence A. Ellis,et al.  Groupware: some issues and experiences , 1991, CACM.

[3]  Miklos A. Vasarhelyi,et al.  Continuous Assurance for the Now Economy , 2010 .

[4]  Jay C. Thibodeau,et al.  The impact of information technology on the audit process: an assessment of the state of the art and implications for the future , 2001 .

[5]  Mignona Cote,et al.  Committee of Sponsoring Organizations (COSO) , 2007, Information Security Management Handbook, 6th ed..

[6]  D. Hamilton,et al.  The Social and Academic Standing of the Information Systems Discipline: General Theory Considered as Cultural Capital , 2004 .

[7]  John Campbell,et al.  Defining a conceptual framework for telework and an agenda for research in accounting and finance , 2009, Int. J. Bus. Inf. Syst..

[8]  Sirkka L. Jarvenpaa,et al.  Communication and Trust in Global Virtual Teams , 1999 .

[9]  Miklos A. Vasarhelyi,et al.  Principles of Analytic Monitoring for Continuous Assurance , 2004 .

[10]  Paul Dourish,et al.  Extending document management systems with user-specific active properties , 2000, TOIS.

[11]  Vincent Cho,et al.  A study on the impact of Organisational Learning to the effectiveness of Electronic Document Management Systems , 2010, Int. J. Technol. Manag..

[12]  C. Handy Trust and the virtual organization , 1999 .

[13]  Rick Elam,et al.  Continuous Auditing: Building Automated Auditing Capability , 2002 .

[14]  James E. Hunton,et al.  Behavioral Self-Regulation of Telework Locations: Interrupting Interruptions! , 2005, J. Inf. Syst..

[15]  Marilyn M. Greenstein,et al.  Underlying principles of the electronization of business: a research agenda , 2003, Int. J. Account. Inf. Syst..

[16]  L. DeYoung Hypertext challenges in the auditing domain , 1989 .

[17]  S. Raghuram,et al.  Communication Patterns As Determinants of Organizational Identification in a Virtual Organization , 1999 .

[18]  Miklos A. Vasarhelyi,et al.  Process Mining of Event Logs in Auditing: Opportunities and Challenges , 2010 .

[19]  Robert L. Braun,et al.  Computer‐assisted audit tools and techniques: analysis and perspectives , 2003 .

[20]  Benson Rosen,et al.  Training for virtual teams: An investigation of current practices and future needs , 2006 .

[21]  James E. Hunton,et al.  Potential Functional and Dysfunctional Effects of Continuous Monitoring (Retracted) , 2008 .

[22]  Alexander Kogan,et al.  Measuring Information Latency , 2006 .

[23]  Randy H. Katz,et al.  Above the Clouds: A Berkeley View of Cloud Computing , 2009 .

[24]  Miklos A. Vasarhelyi,et al.  Continuous monitoring of business process controls: A pilot implementation of a continuous auditing system at Siemens , 2006, Int. J. Account. Inf. Syst..

[25]  Marilyn Prosch,et al.  Protecting personal information using Generally Accepted Privacy Principles (GAPP) and Continuous Control Monitoring to enhance corporate governance , 2008 .

[26]  Roger Debreceny,et al.  Employing generalized audit software in the financial services sector: Challenges and opportunities , 2005 .

[27]  Miklos A. Vasarhelyi,et al.  Feasibility and Economics of Continuous Assurance , 2002 .

[28]  James E. Hunton,et al.  A model for investigating telework in accounting , 2004, Int. J. Account. Inf. Syst..

[29]  Roderick M. Kramer,et al.  Swift trust and temporary groups. , 1996 .

[30]  Samprit Chatterjee,et al.  Statistical Techniques for Analytical Review in Auditing , 1986 .

[31]  Gerard Brennan,et al.  Aiding the Audit: Using the IT Audit as a Springboard for Continuous Controls Monitoring , 2010 .

[32]  F. Selto,et al.  Management Control Systems and Boundaries of the Firm: Why do Firms Outsource Internal Auditing Activities? , 1999 .

[33]  M. Nigrini,et al.  The Use of Benford's Law as an Aid in Analytical Procedures , 1997 .

[34]  Judith A. Holton,et al.  Building trust and collaboration in a virtual team , 2001 .

[35]  Jean C. Bedard,et al.  Using Electronic Audit Workpaper Systems in Audit Practice: Task Analysis, Learning, and Resistance , 2006 .

[36]  Miklos A. Vasarhelyi,et al.  Putting Continuous Auditing Theory into Practice: Lessons from Two Pilot Implementations , 2008, J. Inf. Syst..

[37]  Lee Nelson,et al.  Stepping into continuous audit: a health-care audit shop shares its strategy for making real-time auditing a success , 2004 .

[38]  Sirkka L. Jarvenpaa,et al.  Is Anybody Out There? Antecedents of Trust in Global Virtual Teams , 1998, J. Manag. Inf. Syst..

[39]  Uday S. Murthy An Analysis of the Effects of Continuous Monitoring Controls on e-Commerce System Performance , 2004, J. Inf. Syst..

[40]  Jon B. Woodroof,et al.  Continuous audit: Model development and implementation within a debt covenant compliance domain , 2001, Int. J. Account. Inf. Syst..

[41]  Peter R. Monge,et al.  Introduction to the Special Issue: Communication Processes for Virtual Organizations , 1999 .

[42]  Ralph H. Sprague,et al.  Electronic Document Management: Challenges and Opportunities for Information Systems Managers , 1995, MIS Q..

[43]  Anthony R. Hendrickson,et al.  Virtual teams: Technology and the workplace of the future , 1998 .

[44]  David Gefen,et al.  Some antecedents and effects of trust in virtual communities , 2002, J. Strateg. Inf. Syst..

[45]  Carol E. Brown,et al.  A Review and Analysis of the Existing Research Streams in Continuous Auditing , 2007 .

[46]  U. Meyerfeldt,et al.  Advances in remote monitoring of implantable pacemakers, cardioverter defibrillators and cardiac resynchronization therapy systems , 2008, Journal of Interventional Cardiac Electrophysiology.

[47]  Bradley L. Kirkman,et al.  The Dimensions and Antecedents of Team Virtuality , 2005 .

[48]  Miklos A. Vasarhelyi,et al.  ASSURING HOMELAND SECURITY : CONTINUOUS MONITORING , CONTROL & ASSURANCE OF EMERGENCY PREPAREDNESS , 2005 .

[49]  Michael Hammer,et al.  Reengineering Work: Don’t Automate, Obliterate , 1990 .